* feat(cli): wire release command and add installer scripts
- Wire up `core build release` subcommand (was orphaned)
- Wire up `core monitor` command (missing import in full variant)
- Add installer scripts for Unix (.sh) and Windows (.bat)
- setup: Interactive with variant selection
- ci: Minimal for CI/CD environments
- dev: Full development variant
- go/php/agent: Targeted development variants
- All scripts include security hardening:
- Secure temp directories (mktemp -d)
- Architecture validation
- Version validation after GitHub API call
- Proper cleanup on exit
- PowerShell PATH updates on Windows (avoids setx truncation)
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat(build): add tar.xz support and unified installer scripts
- Add tar.xz archive support using Borg's compress package
- ArchiveXZ() and ArchiveWithFormat() for configurable compression
- Better compression ratio than gzip for release artifacts
- Consolidate 12 installer scripts into 2 unified scripts
- install.sh and install.bat with BunnyCDN edge variable support
- Subdomains: setup.core.help, ci.core.help, dev.core.help, etc.
- MODE and VARIANT transformed at edge based on subdomain
- Installers prefer tar.xz with automatic fallback to tar.gz
- Fixed CodeRabbit issues: HTTP status patterns, tar error handling,
verify_install params, VARIANT validation, CI PATH persistence
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* chore: add build and release config files
- .core/build.yaml - cross-platform build configuration
- .core/release.yaml - release workflow configuration
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* chore: move plans from docs/ to tasks/
Consolidate planning documents in tasks/plans/ directory.
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* fix(install): address CodeRabbit review feedback
- Add curl timeout (--max-time) to prevent hanging on slow networks
- Rename TMPDIR to WORK_DIR to avoid clobbering system env var
- Add chmod +x to ensure binary has execute permissions
- Add error propagation after subroutine calls in batch file
- Remove System32 install attempt in CI mode (use consistent INSTALL_DIR)
- Fix HTTP status regex for HTTP/2 compatibility
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat(rag): add Go RAG implementation with Qdrant + Ollama
Add RAG (Retrieval Augmented Generation) tools for storing documentation
in Qdrant vector database and querying with semantic search. This replaces
the Python tools/rag implementation with a native Go solution.
New commands:
- core rag ingest [directory] - Ingest markdown files into Qdrant
- core rag query [question] - Query vector database with semantic search
- core rag collections - List and manage Qdrant collections
Features:
- Markdown chunking by sections and paragraphs with overlap
- UTF-8 safe text handling for international content
- Automatic category detection from file paths
- Multiple output formats: text, JSON, LLM context injection
- Environment variable support for host configuration
Dependencies:
- github.com/qdrant/go-client (gRPC client)
- github.com/ollama/ollama/api (embeddings API)
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat(deploy): add pure-Go Ansible executor and Coolify API integration
Implement infrastructure deployment system with:
- pkg/ansible: Pure Go Ansible executor
- Playbook/inventory parsing (types.go, parser.go)
- Full execution engine with variable templating, loops, blocks,
conditionals, handlers, and fact gathering (executor.go)
- SSH client with key/password auth and privilege escalation (ssh.go)
- 35+ module implementations: shell, command, copy, template, file,
apt, service, systemd, user, group, git, docker_compose, etc. (modules.go)
- pkg/deploy/coolify: Coolify API client wrapping Python swagger client
- List/get servers, projects, applications, databases, services
- Generic Call() for any OpenAPI operation
- pkg/deploy/python: Embedded Python runtime for swagger client integration
- internal/cmd/deploy: CLI commands
- core deploy servers/projects/apps/databases/services/team
- core deploy call <operation> [params-json]
This enables Docker-free infrastructure deployment with Ansible-compatible
playbooks executed natively in Go.
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* fix(deploy): address linter warnings and build errors
- Fix fmt.Sprintf format verb error in ssh.go (remove unused stat command)
- Fix errcheck warnings by explicitly ignoring best-effort operations
- Fix ineffassign warning in cmd_ansible.go
All golangci-lint checks now pass for deploy packages.
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* style(deploy): fix gofmt formatting
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* fix(deploy): use known_hosts for SSH host key verification
Address CodeQL security alert by using the user's known_hosts file
for SSH host key verification when available. Falls back to accepting
any key only when known_hosts doesn't exist (common in containerized
or ephemeral environments).
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat(ai,security,ide): add agentic MVP, security jobs, and Core IDE desktop app
Wire up AI infrastructure with unified pkg/ai package (metrics JSONL,
RAG integration), move RAG under `core ai rag`, add `core ai metrics`
command, and enrich task context with Qdrant documentation.
Add `--target` flag to all security commands for external repo scanning,
`core security jobs` for distributing findings as GitHub Issues, and
consistent error logging across scan/deps/alerts/secrets commands.
Add Core IDE Wails v3 desktop app with Angular 20 frontend, MCP bridge
(loopback-only HTTP server), WebSocket hub, and Claude Code bridge.
Production-ready with Lethean CIC branding, macOS code signing support,
and security hardening (origin validation, body size limits, URL scheme
checks, memory leak prevention, XSS mitigation).
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* fix: address PR review comments from CodeRabbit, Copilot, and Gemini
Fixes across 25 files addressing 46+ review comments:
- pkg/ai/metrics.go: handle error from Close() on writable file handle
- pkg/ansible: restore loop vars after loop, restore become settings,
fix Upload with become=true and no password (use sudo -n), honour
SSH timeout config, use E() helper for contextual errors, quote git
refs in checkout commands
- pkg/rag: validate chunk config, guard negative-to-uint64 conversion,
use E() helper for errors, add context timeout to Ollama HTTP calls
- pkg/deploy/python: fix exec.ExitError type assertion (was os.PathError),
handle os.UserHomeDir() error
- pkg/build/buildcmd: use cmd.Context() instead of context.Background()
for proper Ctrl+C cancellation
- install.bat: add curl timeouts, CRLF line endings, use --connect-timeout
for archive downloads
- install.sh: use absolute path for version check in CI mode
- tools/rag: fix broken ingest.py function def, escape HTML in query.py,
pin qdrant-client version, add markdown code block languages
- internal/cmd/rag: add chunk size validation, env override handling
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* fix(build): make release dry-run by default and remove darwin/amd64 target
Replace --dry-run (default false) with --we-are-go-for-launch (default
false) so `core build release` is safe by default. Remove darwin/amd64
from default build targets (arm64 only for macOS). Fix cmd_project.go
to use command context instead of context.Background().
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
---------
Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>
375 lines
12 KiB
Go
375 lines
12 KiB
Go
// cmd_project.go implements the main project build logic.
|
|
//
|
|
// This handles auto-detection of project types (Go, Wails, Docker, LinuxKit, Taskfile)
|
|
// and orchestrates the build process including signing, archiving, and checksums.
|
|
|
|
package buildcmd
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strings"
|
|
|
|
"github.com/host-uk/core/pkg/build"
|
|
"github.com/host-uk/core/pkg/build/builders"
|
|
"github.com/host-uk/core/pkg/build/signing"
|
|
"github.com/host-uk/core/pkg/i18n"
|
|
)
|
|
|
|
// runProjectBuild handles the main `core build` command with auto-detection.
|
|
func runProjectBuild(ctx context.Context, buildType string, ciMode bool, targetsFlag string, outputDir string, doArchive bool, doChecksum bool, configPath string, format string, push bool, imageName string, noSign bool, notarize bool, verbose bool) error {
|
|
// Get current working directory as project root
|
|
projectDir, err := os.Getwd()
|
|
if err != nil {
|
|
return fmt.Errorf("%s: %w", i18n.T("common.error.failed", map[string]any{"Action": "get working directory"}), err)
|
|
}
|
|
|
|
// Load configuration from .core/build.yaml (or defaults)
|
|
buildCfg, err := build.LoadConfig(projectDir)
|
|
if err != nil {
|
|
return fmt.Errorf("%s: %w", i18n.T("common.error.failed", map[string]any{"Action": "load config"}), err)
|
|
}
|
|
|
|
// Detect project type if not specified
|
|
var projectType build.ProjectType
|
|
if buildType != "" {
|
|
projectType = build.ProjectType(buildType)
|
|
} else {
|
|
projectType, err = build.PrimaryType(projectDir)
|
|
if err != nil {
|
|
return fmt.Errorf("%s: %w", i18n.T("common.error.failed", map[string]any{"Action": "detect project type"}), err)
|
|
}
|
|
if projectType == "" {
|
|
return fmt.Errorf("%s", i18n.T("cmd.build.error.no_project_type", map[string]interface{}{"Dir": projectDir}))
|
|
}
|
|
}
|
|
|
|
// Determine targets
|
|
var buildTargets []build.Target
|
|
if targetsFlag != "" {
|
|
// Parse from command line
|
|
buildTargets, err = parseTargets(targetsFlag)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else if len(buildCfg.Targets) > 0 {
|
|
// Use config targets
|
|
buildTargets = buildCfg.ToTargets()
|
|
} else {
|
|
// Fall back to current OS/arch
|
|
buildTargets = []build.Target{
|
|
{OS: runtime.GOOS, Arch: runtime.GOARCH},
|
|
}
|
|
}
|
|
|
|
// Determine output directory
|
|
if outputDir == "" {
|
|
outputDir = "dist"
|
|
}
|
|
|
|
// Determine binary name
|
|
binaryName := buildCfg.Project.Binary
|
|
if binaryName == "" {
|
|
binaryName = buildCfg.Project.Name
|
|
}
|
|
if binaryName == "" {
|
|
binaryName = filepath.Base(projectDir)
|
|
}
|
|
|
|
// Print build info (verbose mode only)
|
|
if verbose && !ciMode {
|
|
fmt.Printf("%s %s\n", buildHeaderStyle.Render(i18n.T("cmd.build.label.build")), i18n.T("cmd.build.building_project"))
|
|
fmt.Printf(" %s %s\n", i18n.T("cmd.build.label.type"), buildTargetStyle.Render(string(projectType)))
|
|
fmt.Printf(" %s %s\n", i18n.T("cmd.build.label.output"), buildTargetStyle.Render(outputDir))
|
|
fmt.Printf(" %s %s\n", i18n.T("cmd.build.label.binary"), buildTargetStyle.Render(binaryName))
|
|
fmt.Printf(" %s %s\n", i18n.T("cmd.build.label.targets"), buildTargetStyle.Render(formatTargets(buildTargets)))
|
|
fmt.Println()
|
|
}
|
|
|
|
// Get the appropriate builder
|
|
builder, err := getBuilder(projectType)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Create build config for the builder
|
|
cfg := &build.Config{
|
|
ProjectDir: projectDir,
|
|
OutputDir: outputDir,
|
|
Name: binaryName,
|
|
Version: buildCfg.Project.Name, // Could be enhanced with git describe
|
|
LDFlags: buildCfg.Build.LDFlags,
|
|
// Docker/LinuxKit specific
|
|
Dockerfile: configPath, // Reuse for Dockerfile path
|
|
LinuxKitConfig: configPath,
|
|
Push: push,
|
|
Image: imageName,
|
|
}
|
|
|
|
// Parse formats for LinuxKit
|
|
if format != "" {
|
|
cfg.Formats = strings.Split(format, ",")
|
|
}
|
|
|
|
// Execute build
|
|
artifacts, err := builder.Build(ctx, cfg, buildTargets)
|
|
if err != nil {
|
|
if !ciMode {
|
|
fmt.Printf("%s %v\n", buildErrorStyle.Render(i18n.T("common.label.error")), err)
|
|
}
|
|
return err
|
|
}
|
|
|
|
if verbose && !ciMode {
|
|
fmt.Printf("%s %s\n", buildSuccessStyle.Render(i18n.T("common.label.success")), i18n.T("cmd.build.built_artifacts", map[string]interface{}{"Count": len(artifacts)}))
|
|
fmt.Println()
|
|
for _, artifact := range artifacts {
|
|
relPath, err := filepath.Rel(projectDir, artifact.Path)
|
|
if err != nil {
|
|
relPath = artifact.Path
|
|
}
|
|
fmt.Printf(" %s %s %s\n",
|
|
buildSuccessStyle.Render("*"),
|
|
buildTargetStyle.Render(relPath),
|
|
buildDimStyle.Render(fmt.Sprintf("(%s/%s)", artifact.OS, artifact.Arch)),
|
|
)
|
|
}
|
|
}
|
|
|
|
// Sign macOS binaries if enabled
|
|
signCfg := buildCfg.Sign
|
|
if notarize {
|
|
signCfg.MacOS.Notarize = true
|
|
}
|
|
if noSign {
|
|
signCfg.Enabled = false
|
|
}
|
|
|
|
if signCfg.Enabled && runtime.GOOS == "darwin" {
|
|
if verbose && !ciMode {
|
|
fmt.Println()
|
|
fmt.Printf("%s %s\n", buildHeaderStyle.Render(i18n.T("cmd.build.label.sign")), i18n.T("cmd.build.signing_binaries"))
|
|
}
|
|
|
|
// Convert build.Artifact to signing.Artifact
|
|
signingArtifacts := make([]signing.Artifact, len(artifacts))
|
|
for i, a := range artifacts {
|
|
signingArtifacts[i] = signing.Artifact{Path: a.Path, OS: a.OS, Arch: a.Arch}
|
|
}
|
|
|
|
if err := signing.SignBinaries(ctx, signCfg, signingArtifacts); err != nil {
|
|
if !ciMode {
|
|
fmt.Printf("%s %s: %v\n", buildErrorStyle.Render(i18n.T("common.label.error")), i18n.T("cmd.build.error.signing_failed"), err)
|
|
}
|
|
return err
|
|
}
|
|
|
|
if signCfg.MacOS.Notarize {
|
|
if err := signing.NotarizeBinaries(ctx, signCfg, signingArtifacts); err != nil {
|
|
if !ciMode {
|
|
fmt.Printf("%s %s: %v\n", buildErrorStyle.Render(i18n.T("common.label.error")), i18n.T("cmd.build.error.notarization_failed"), err)
|
|
}
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
// Archive artifacts if enabled
|
|
var archivedArtifacts []build.Artifact
|
|
if doArchive && len(artifacts) > 0 {
|
|
if verbose && !ciMode {
|
|
fmt.Println()
|
|
fmt.Printf("%s %s\n", buildHeaderStyle.Render(i18n.T("cmd.build.label.archive")), i18n.T("cmd.build.creating_archives"))
|
|
}
|
|
|
|
archivedArtifacts, err = build.ArchiveAll(artifacts)
|
|
if err != nil {
|
|
if !ciMode {
|
|
fmt.Printf("%s %s: %v\n", buildErrorStyle.Render(i18n.T("common.label.error")), i18n.T("cmd.build.error.archive_failed"), err)
|
|
}
|
|
return err
|
|
}
|
|
|
|
if verbose && !ciMode {
|
|
for _, artifact := range archivedArtifacts {
|
|
relPath, err := filepath.Rel(projectDir, artifact.Path)
|
|
if err != nil {
|
|
relPath = artifact.Path
|
|
}
|
|
fmt.Printf(" %s %s %s\n",
|
|
buildSuccessStyle.Render("*"),
|
|
buildTargetStyle.Render(relPath),
|
|
buildDimStyle.Render(fmt.Sprintf("(%s/%s)", artifact.OS, artifact.Arch)),
|
|
)
|
|
}
|
|
}
|
|
}
|
|
|
|
// Compute checksums if enabled
|
|
var checksummedArtifacts []build.Artifact
|
|
if doChecksum && len(archivedArtifacts) > 0 {
|
|
checksummedArtifacts, err = computeAndWriteChecksums(ctx, projectDir, outputDir, archivedArtifacts, signCfg, ciMode, verbose)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
} else if doChecksum && len(artifacts) > 0 && !doArchive {
|
|
// Checksum raw binaries if archiving is disabled
|
|
checksummedArtifacts, err = computeAndWriteChecksums(ctx, projectDir, outputDir, artifacts, signCfg, ciMode, verbose)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// Output results
|
|
if ciMode {
|
|
// Determine which artifacts to output (prefer checksummed > archived > raw)
|
|
var outputArtifacts []build.Artifact
|
|
if len(checksummedArtifacts) > 0 {
|
|
outputArtifacts = checksummedArtifacts
|
|
} else if len(archivedArtifacts) > 0 {
|
|
outputArtifacts = archivedArtifacts
|
|
} else {
|
|
outputArtifacts = artifacts
|
|
}
|
|
|
|
// JSON output for CI
|
|
output, err := json.MarshalIndent(outputArtifacts, "", " ")
|
|
if err != nil {
|
|
return fmt.Errorf("%s: %w", i18n.T("common.error.failed", map[string]any{"Action": "marshal artifacts"}), err)
|
|
}
|
|
fmt.Println(string(output))
|
|
} else if !verbose {
|
|
// Minimal output: just success with artifact count
|
|
fmt.Printf("%s %s %s\n",
|
|
buildSuccessStyle.Render(i18n.T("common.label.success")),
|
|
i18n.T("cmd.build.built_artifacts", map[string]interface{}{"Count": len(artifacts)}),
|
|
buildDimStyle.Render(fmt.Sprintf("(%s)", outputDir)),
|
|
)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// computeAndWriteChecksums computes checksums for artifacts and writes CHECKSUMS.txt.
|
|
func computeAndWriteChecksums(ctx context.Context, projectDir, outputDir string, artifacts []build.Artifact, signCfg signing.SignConfig, ciMode bool, verbose bool) ([]build.Artifact, error) {
|
|
if verbose && !ciMode {
|
|
fmt.Println()
|
|
fmt.Printf("%s %s\n", buildHeaderStyle.Render(i18n.T("cmd.build.label.checksum")), i18n.T("cmd.build.computing_checksums"))
|
|
}
|
|
|
|
checksummedArtifacts, err := build.ChecksumAll(artifacts)
|
|
if err != nil {
|
|
if !ciMode {
|
|
fmt.Printf("%s %s: %v\n", buildErrorStyle.Render(i18n.T("common.label.error")), i18n.T("cmd.build.error.checksum_failed"), err)
|
|
}
|
|
return nil, err
|
|
}
|
|
|
|
// Write CHECKSUMS.txt
|
|
checksumPath := filepath.Join(outputDir, "CHECKSUMS.txt")
|
|
if err := build.WriteChecksumFile(checksummedArtifacts, checksumPath); err != nil {
|
|
if !ciMode {
|
|
fmt.Printf("%s %s: %v\n", buildErrorStyle.Render(i18n.T("common.label.error")), i18n.T("common.error.failed", map[string]any{"Action": "write CHECKSUMS.txt"}), err)
|
|
}
|
|
return nil, err
|
|
}
|
|
|
|
// Sign checksums with GPG
|
|
if signCfg.Enabled {
|
|
if err := signing.SignChecksums(ctx, signCfg, checksumPath); err != nil {
|
|
if !ciMode {
|
|
fmt.Printf("%s %s: %v\n", buildErrorStyle.Render(i18n.T("common.label.error")), i18n.T("cmd.build.error.gpg_signing_failed"), err)
|
|
}
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
if verbose && !ciMode {
|
|
for _, artifact := range checksummedArtifacts {
|
|
relPath, err := filepath.Rel(projectDir, artifact.Path)
|
|
if err != nil {
|
|
relPath = artifact.Path
|
|
}
|
|
fmt.Printf(" %s %s\n",
|
|
buildSuccessStyle.Render("*"),
|
|
buildTargetStyle.Render(relPath),
|
|
)
|
|
fmt.Printf(" %s\n", buildDimStyle.Render(artifact.Checksum))
|
|
}
|
|
|
|
relChecksumPath, err := filepath.Rel(projectDir, checksumPath)
|
|
if err != nil {
|
|
relChecksumPath = checksumPath
|
|
}
|
|
fmt.Printf(" %s %s\n",
|
|
buildSuccessStyle.Render("*"),
|
|
buildTargetStyle.Render(relChecksumPath),
|
|
)
|
|
}
|
|
|
|
return checksummedArtifacts, nil
|
|
}
|
|
|
|
// parseTargets parses a comma-separated list of OS/arch pairs.
|
|
func parseTargets(targetsFlag string) ([]build.Target, error) {
|
|
parts := strings.Split(targetsFlag, ",")
|
|
var targets []build.Target
|
|
|
|
for _, part := range parts {
|
|
part = strings.TrimSpace(part)
|
|
if part == "" {
|
|
continue
|
|
}
|
|
|
|
osArch := strings.Split(part, "/")
|
|
if len(osArch) != 2 {
|
|
return nil, fmt.Errorf("%s", i18n.T("cmd.build.error.invalid_target", map[string]interface{}{"Target": part}))
|
|
}
|
|
|
|
targets = append(targets, build.Target{
|
|
OS: strings.TrimSpace(osArch[0]),
|
|
Arch: strings.TrimSpace(osArch[1]),
|
|
})
|
|
}
|
|
|
|
if len(targets) == 0 {
|
|
return nil, fmt.Errorf("%s", i18n.T("cmd.build.error.no_targets"))
|
|
}
|
|
|
|
return targets, nil
|
|
}
|
|
|
|
// formatTargets returns a human-readable string of targets.
|
|
func formatTargets(targets []build.Target) string {
|
|
var parts []string
|
|
for _, t := range targets {
|
|
parts = append(parts, t.String())
|
|
}
|
|
return strings.Join(parts, ", ")
|
|
}
|
|
|
|
// getBuilder returns the appropriate builder for the project type.
|
|
func getBuilder(projectType build.ProjectType) (build.Builder, error) {
|
|
switch projectType {
|
|
case build.ProjectTypeWails:
|
|
return builders.NewWailsBuilder(), nil
|
|
case build.ProjectTypeGo:
|
|
return builders.NewGoBuilder(), nil
|
|
case build.ProjectTypeDocker:
|
|
return builders.NewDockerBuilder(), nil
|
|
case build.ProjectTypeLinuxKit:
|
|
return builders.NewLinuxKitBuilder(), nil
|
|
case build.ProjectTypeTaskfile:
|
|
return builders.NewTaskfileBuilder(), nil
|
|
case build.ProjectTypeNode:
|
|
return nil, fmt.Errorf("%s", i18n.T("cmd.build.error.node_not_implemented"))
|
|
case build.ProjectTypePHP:
|
|
return nil, fmt.Errorf("%s", i18n.T("cmd.build.error.php_not_implemented"))
|
|
default:
|
|
return nil, fmt.Errorf("%s: %s", i18n.T("cmd.build.error.unsupported_type"), projectType)
|
|
}
|
|
}
|