Files
beads/cmd/bd/doctor/config_values.go
Steve Yegge 1611f16751 refactor: remove unused bd pin/unpin/hook commands (bd-x0zl)
Analysis found these commands are dead code:
- gt never calls `bd pin` - uses `bd update --status=pinned` instead
- Beads.Pin() wrapper exists but is never called
- bd hook functionality duplicated by gt mol status
- Code comment says "pinned field is cosmetic for bd hook visibility"

Removed:
- cmd/bd/pin.go
- cmd/bd/unpin.go
- cmd/bd/hook.go

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2025-12-27 16:02:15 -08:00

435 lines
14 KiB
Go

package doctor
import (
"database/sql"
"fmt"
"os"
"path/filepath"
"regexp"
"strconv"
"strings"
"time"
_ "github.com/ncruces/go-sqlite3/driver"
_ "github.com/ncruces/go-sqlite3/embed"
"github.com/spf13/viper"
"github.com/steveyegge/beads/internal/beads"
"github.com/steveyegge/beads/internal/configfile"
)
// validRoutingModes are the allowed values for routing.mode
var validRoutingModes = map[string]bool{
"auto": true,
"maintainer": true,
"contributor": true,
}
// validBranchNameRegex validates git branch names
// Git branch names can't contain: space, ~, ^, :, \, ?, *, [
// Can't start with -, can't end with ., can't contain ..
var validBranchNameRegex = regexp.MustCompile(`^[a-zA-Z0-9][a-zA-Z0-9._/-]*[a-zA-Z0-9]$|^[a-zA-Z0-9]$`)
// validActorRegex validates actor names (alphanumeric with dashes, underscores, dots, and @ for emails)
var validActorRegex = regexp.MustCompile(`^[a-zA-Z0-9][a-zA-Z0-9._@-]*$`)
// validCustomStatusRegex validates custom status names (alphanumeric with underscores)
var validCustomStatusRegex = regexp.MustCompile(`^[a-z][a-z0-9_]*$`)
// CheckConfigValues validates configuration values in config.yaml and metadata.json
// Returns issues found, or OK if all values are valid
func CheckConfigValues(repoPath string) DoctorCheck {
var issues []string
// Check config.yaml values
yamlIssues := checkYAMLConfigValues(repoPath)
issues = append(issues, yamlIssues...)
// Check metadata.json values
metadataIssues := checkMetadataConfigValues(repoPath)
issues = append(issues, metadataIssues...)
// Check database config values (status.custom, etc.)
dbIssues := checkDatabaseConfigValues(repoPath)
issues = append(issues, dbIssues...)
if len(issues) == 0 {
return DoctorCheck{
Name: "Config Values",
Status: "ok",
Message: "All configuration values are valid",
}
}
return DoctorCheck{
Name: "Config Values",
Status: "warning",
Message: fmt.Sprintf("Found %d configuration issue(s)", len(issues)),
Detail: strings.Join(issues, "\n"),
Fix: "Edit config files to fix invalid values. Run 'bd config' to view current settings.",
}
}
// checkYAMLConfigValues validates values in config.yaml
func checkYAMLConfigValues(repoPath string) []string {
var issues []string
// Load config.yaml if it exists
v := viper.New()
v.SetConfigType("yaml")
configPath := filepath.Join(repoPath, ".beads", "config.yaml")
if _, err := os.Stat(configPath); os.IsNotExist(err) {
// No config.yaml, check user config dirs
configPath = ""
if configDir, err := os.UserConfigDir(); err == nil {
userConfigPath := filepath.Join(configDir, "bd", "config.yaml")
if _, err := os.Stat(userConfigPath); err == nil {
configPath = userConfigPath
}
}
if configPath == "" {
if homeDir, err := os.UserHomeDir(); err == nil {
homeConfigPath := filepath.Join(homeDir, ".beads", "config.yaml")
if _, err := os.Stat(homeConfigPath); err == nil {
configPath = homeConfigPath
}
}
}
}
if configPath == "" {
// No config.yaml found anywhere
return issues
}
v.SetConfigFile(configPath)
if err := v.ReadInConfig(); err != nil {
issues = append(issues, fmt.Sprintf("config.yaml: failed to parse: %v", err))
return issues
}
// Validate flush-debounce (should be a valid duration)
if v.IsSet("flush-debounce") {
debounceStr := v.GetString("flush-debounce")
if debounceStr != "" {
_, err := time.ParseDuration(debounceStr)
if err != nil {
issues = append(issues, fmt.Sprintf("flush-debounce: invalid duration %q (expected format like \"30s\", \"1m\", \"500ms\")", debounceStr))
}
}
}
// Validate remote-sync-interval (should be a valid duration, min 5s)
if v.IsSet("remote-sync-interval") {
intervalStr := v.GetString("remote-sync-interval")
if intervalStr != "" {
d, err := time.ParseDuration(intervalStr)
if err != nil {
issues = append(issues, fmt.Sprintf("remote-sync-interval: invalid duration %q (expected format like \"30s\", \"1m\", \"5m\")", intervalStr))
} else if d > 0 && d < 5*time.Second {
issues = append(issues, fmt.Sprintf("remote-sync-interval: %q is too low (minimum 5s to prevent excessive load)", intervalStr))
}
}
}
// Validate issue-prefix (should be alphanumeric with dashes/underscores, reasonably short)
if v.IsSet("issue-prefix") {
prefix := v.GetString("issue-prefix")
if prefix != "" {
if len(prefix) > 20 {
issues = append(issues, fmt.Sprintf("issue-prefix: %q is too long (max 20 characters)", prefix))
}
if !regexp.MustCompile(`^[a-zA-Z][a-zA-Z0-9_-]*$`).MatchString(prefix) {
issues = append(issues, fmt.Sprintf("issue-prefix: %q is invalid (must start with letter, contain only letters, numbers, dashes, underscores)", prefix))
}
}
}
// Validate routing.mode (should be "auto", "maintainer", or "contributor")
if v.IsSet("routing.mode") {
mode := v.GetString("routing.mode")
if mode != "" && !validRoutingModes[mode] {
validModes := make([]string, 0, len(validRoutingModes))
for m := range validRoutingModes {
validModes = append(validModes, m)
}
issues = append(issues, fmt.Sprintf("routing.mode: %q is invalid (valid values: %s)", mode, strings.Join(validModes, ", ")))
}
}
// Validate sync-branch (should be a valid git branch name if set)
if v.IsSet("sync-branch") {
branch := v.GetString("sync-branch")
if branch != "" {
if !isValidBranchName(branch) {
issues = append(issues, fmt.Sprintf("sync-branch: %q is not a valid git branch name", branch))
}
}
}
// Validate routing paths exist if set
for _, key := range []string{"routing.default", "routing.maintainer", "routing.contributor"} {
if v.IsSet(key) {
path := v.GetString(key)
if path != "" && path != "." {
// Expand ~ to home directory
if strings.HasPrefix(path, "~") {
if home, err := os.UserHomeDir(); err == nil {
path = filepath.Join(home, path[1:])
}
}
// Check if path exists (only warn, don't error - it might be created later)
if _, err := os.Stat(path); os.IsNotExist(err) {
issues = append(issues, fmt.Sprintf("%s: path %q does not exist", key, v.GetString(key)))
}
}
}
}
// Validate actor (should be alphanumeric with common special chars if set)
if v.IsSet("actor") {
actor := v.GetString("actor")
if actor != "" && !validActorRegex.MatchString(actor) {
issues = append(issues, fmt.Sprintf("actor: %q is invalid (must start with letter/number, contain only letters, numbers, dashes, underscores, dots, or @)", actor))
}
}
// Validate db path (should be a valid file path if set)
if v.IsSet("db") {
dbPath := v.GetString("db")
if dbPath != "" {
// Check for invalid path characters (null bytes, etc.)
if strings.ContainsAny(dbPath, "\x00") {
issues = append(issues, fmt.Sprintf("db: %q contains invalid characters", dbPath))
}
// Check if it has a valid database extension
if !strings.HasSuffix(dbPath, ".db") && !strings.HasSuffix(dbPath, ".sqlite") && !strings.HasSuffix(dbPath, ".sqlite3") {
issues = append(issues, fmt.Sprintf("db: %q has unusual extension (expected .db, .sqlite, or .sqlite3)", dbPath))
}
}
}
// Validate boolean config values are actually booleans
for _, key := range []string{"json", "no-daemon", "no-auto-flush", "no-auto-import", "no-db", "auto-start-daemon"} {
if v.IsSet(key) {
// Try to get as string first to check if it's a valid boolean representation
strVal := v.GetString(key)
if strVal != "" {
// Valid boolean strings: true, false, 1, 0, yes, no, on, off (case insensitive)
if !isValidBoolString(strVal) {
issues = append(issues, fmt.Sprintf("%s: %q is not a valid boolean value (expected true/false, yes/no, 1/0, on/off)", key, strVal))
}
}
}
}
// Validate sync.require_confirmation_on_mass_delete (should be boolean)
if v.IsSet("sync.require_confirmation_on_mass_delete") {
strVal := v.GetString("sync.require_confirmation_on_mass_delete")
if strVal != "" && !isValidBoolString(strVal) {
issues = append(issues, fmt.Sprintf("sync.require_confirmation_on_mass_delete: %q is not a valid boolean value", strVal))
}
}
// Validate repos.primary (should be a directory path if set)
if v.IsSet("repos.primary") {
primary := v.GetString("repos.primary")
if primary != "" {
expandedPath := expandPath(primary)
if info, err := os.Stat(expandedPath); err == nil {
if !info.IsDir() {
issues = append(issues, fmt.Sprintf("repos.primary: %q is not a directory", primary))
}
} else if !os.IsNotExist(err) {
issues = append(issues, fmt.Sprintf("repos.primary: cannot access %q: %v", primary, err))
}
// Note: path not existing is OK - might be created later
}
}
// Validate repos.additional (should be directory paths if set)
if v.IsSet("repos.additional") {
additional := v.GetStringSlice("repos.additional")
for _, path := range additional {
if path != "" {
expandedPath := expandPath(path)
if info, err := os.Stat(expandedPath); err == nil {
if !info.IsDir() {
issues = append(issues, fmt.Sprintf("repos.additional: %q is not a directory", path))
}
}
// Note: path not existing is OK - might be created later
}
}
}
return issues
}
// isValidBoolString checks if a string represents a valid boolean value
func isValidBoolString(s string) bool {
lower := strings.ToLower(strings.TrimSpace(s))
switch lower {
case "true", "false", "yes", "no", "1", "0", "on", "off", "t", "f", "y", "n":
return true
}
// Also check if it parses as a bool
_, err := strconv.ParseBool(s)
return err == nil
}
// expandPath expands ~ to home directory and resolves the path
func expandPath(path string) string {
if strings.HasPrefix(path, "~") {
if home, err := os.UserHomeDir(); err == nil {
path = filepath.Join(home, path[1:])
}
}
return path
}
// checkMetadataConfigValues validates values in metadata.json
func checkMetadataConfigValues(repoPath string) []string {
var issues []string
beadsDir := filepath.Join(repoPath, ".beads")
cfg, err := configfile.Load(beadsDir)
if err != nil {
issues = append(issues, fmt.Sprintf("metadata.json: failed to load: %v", err))
return issues
}
if cfg == nil {
// No metadata.json, that's OK
return issues
}
// Validate database filename
if cfg.Database != "" {
if strings.Contains(cfg.Database, string(os.PathSeparator)) || strings.Contains(cfg.Database, "/") {
issues = append(issues, fmt.Sprintf("metadata.json database: %q should be a filename, not a path", cfg.Database))
}
if !strings.HasSuffix(cfg.Database, ".db") && !strings.HasSuffix(cfg.Database, ".sqlite") && !strings.HasSuffix(cfg.Database, ".sqlite3") {
issues = append(issues, fmt.Sprintf("metadata.json database: %q has unusual extension (expected .db, .sqlite, or .sqlite3)", cfg.Database))
}
}
// Validate jsonl_export filename
if cfg.JSONLExport != "" {
switch cfg.JSONLExport {
case "deletions.jsonl", "interactions.jsonl", "molecules.jsonl":
issues = append(issues, fmt.Sprintf("metadata.json jsonl_export: %q is a system file and should not be configured as a JSONL export (expected issues.jsonl)", cfg.JSONLExport))
}
if strings.Contains(cfg.JSONLExport, string(os.PathSeparator)) || strings.Contains(cfg.JSONLExport, "/") {
issues = append(issues, fmt.Sprintf("metadata.json jsonl_export: %q should be a filename, not a path", cfg.JSONLExport))
}
if !strings.HasSuffix(cfg.JSONLExport, ".jsonl") {
issues = append(issues, fmt.Sprintf("metadata.json jsonl_export: %q should have .jsonl extension", cfg.JSONLExport))
}
}
// Validate deletions_retention_days
if cfg.DeletionsRetentionDays < 0 {
issues = append(issues, fmt.Sprintf("metadata.json deletions_retention_days: %d is invalid (must be >= 0)", cfg.DeletionsRetentionDays))
}
return issues
}
// checkDatabaseConfigValues validates configuration values stored in the database
func checkDatabaseConfigValues(repoPath string) []string {
var issues []string
beadsDir := filepath.Join(repoPath, ".beads")
if _, err := os.Stat(beadsDir); os.IsNotExist(err) {
return issues // No .beads directory, nothing to check
}
// Get database path
dbPath := filepath.Join(beadsDir, beads.CanonicalDatabaseName)
// Check metadata.json for custom database name
if cfg, err := configfile.Load(beadsDir); err == nil && cfg != nil && cfg.Database != "" {
dbPath = cfg.DatabasePath(beadsDir)
}
if _, err := os.Stat(dbPath); os.IsNotExist(err) {
return issues // No database, nothing to check
}
// Open database in read-only mode
db, err := sql.Open("sqlite3", sqliteConnString(dbPath, true))
if err != nil {
return issues // Can't open database, skip
}
defer db.Close()
// Check status.custom - custom status names should be lowercase alphanumeric with underscores
var statusCustom string
err = db.QueryRow("SELECT value FROM config WHERE key = 'status.custom'").Scan(&statusCustom)
if err == nil && statusCustom != "" {
statuses := strings.Split(statusCustom, ",")
for _, status := range statuses {
status = strings.TrimSpace(status)
if status == "" {
continue
}
if !validCustomStatusRegex.MatchString(status) {
issues = append(issues, fmt.Sprintf("status.custom: %q is invalid (must start with lowercase letter, contain only lowercase letters, numbers, and underscores)", status))
}
// Check for conflicts with built-in statuses
switch status {
case "open", "in_progress", "blocked", "closed":
issues = append(issues, fmt.Sprintf("status.custom: %q conflicts with built-in status", status))
}
}
}
// Check sync.branch if stored in database (legacy location)
var syncBranch string
err = db.QueryRow("SELECT value FROM config WHERE key = 'sync.branch'").Scan(&syncBranch)
if err == nil && syncBranch != "" {
if !isValidBranchName(syncBranch) {
issues = append(issues, fmt.Sprintf("sync.branch (database): %q is not a valid git branch name", syncBranch))
}
}
return issues
}
// isValidBranchName checks if a string is a valid git branch name
func isValidBranchName(name string) bool {
if name == "" {
return false
}
// Can't start with -
if strings.HasPrefix(name, "-") {
return false
}
// Can't end with . or /
if strings.HasSuffix(name, ".") || strings.HasSuffix(name, "/") {
return false
}
// Can't contain ..
if strings.Contains(name, "..") {
return false
}
// Can't contain these characters: space, ~, ^, :, \, ?, *, [
invalidChars := []string{" ", "~", "^", ":", "\\", "?", "*", "[", "@{"}
for _, char := range invalidChars {
if strings.Contains(name, char) {
return false
}
}
// Can't end with .lock
if strings.HasSuffix(name, ".lock") {
return false
}
return true
}