Three issues Dalidou Claude surfaced during the first real deploy
of commit e877e5b to the live service (report from 2026-04-08).
Bug 1 was the critical one — a schema init ordering bug that would
have bitten every future upgrade from a pre-Phase-9 schema — and
the other two were usability traps around hostname resolution.
Bug 1 (CRITICAL): schema init ordering
--------------------------------------
src/atocore/models/database.py
SCHEMA_SQL contained CREATE INDEX statements that referenced
columns added later by _apply_migrations():
CREATE INDEX IF NOT EXISTS idx_memories_project ON memories(project);
CREATE INDEX IF NOT EXISTS idx_interactions_project_name ON interactions(project);
CREATE INDEX IF NOT EXISTS idx_interactions_session ON interactions(session_id);
On a FRESH install, CREATE TABLE IF NOT EXISTS creates the tables
with the Phase 9 shape (columns present), so the CREATE INDEX runs
cleanly and _apply_migrations is effectively a no-op.
On an UPGRADE from a pre-Phase-9 schema, CREATE TABLE IF NOT EXISTS
is a no-op (the tables already exist in the old shape), the columns
are NOT added yet, and the CREATE INDEX fails with
"OperationalError: no such column: project" before
_apply_migrations gets a chance to add the columns.
Dalidou Claude hit this exactly when redeploying from 0.1.0 to
0.2.0 — had to manually ALTER TABLE to add the Phase 9 columns
before the container could start.
The fix is to remove the Phase 9-column indexes from SCHEMA_SQL.
They already exist in _apply_migrations() AFTER the corresponding
ALTER TABLE, so they still get created on both fresh and upgrade
paths — just after the columns exist, not before.
Indexes still in SCHEMA_SQL (all safe — reference columns that
have existed since the first release):
- idx_chunks_document on source_chunks(document_id)
- idx_memories_type on memories(memory_type)
- idx_memories_status on memories(status)
- idx_interactions_project on interactions(project_id)
Indexes moved to _apply_migrations (already there — just no longer
duplicated in SCHEMA_SQL):
- idx_memories_project on memories(project)
- idx_interactions_project_name on interactions(project)
- idx_interactions_session on interactions(session_id)
- idx_interactions_created_at on interactions(created_at)
Regression test: tests/test_database.py
---------------------------------------
New test_init_db_upgrades_pre_phase9_schema_without_failing:
- Seeds the DB with the exact pre-Phase-9 shape (no project /
last_referenced_at / reference_count on memories; no project /
client / session_id / response / memories_used / chunks_used on
interactions)
- Calls init_db() — which used to raise OperationalError before
the fix
- Verifies all Phase 9 columns are present after the call
- Verifies the migration indexes exist
Before the fix this test would have failed with
"OperationalError: no such column: project" on the init_db call.
After the fix it passes. This locks the invariant "init_db is
safe on any legacy schema shape" so the bug can't silently come
back.
Full suite: 216 passing (was 215), 1 warning. The +1 is the new
regression test.
Bug 3 (usability): deploy.sh DNS default
----------------------------------------
deploy/dalidou/deploy.sh
ATOCORE_GIT_REMOTE defaulted to http://dalidou:3000/Antoine/ATOCore.git
which requires the "dalidou" hostname to resolve. On the Dalidou
host itself it didn't (no /etc/hosts entry for localhost alias),
so deploy.sh had to be run with the IP as a manual workaround.
Fix: default ATOCORE_GIT_REMOTE to http://127.0.0.1:3000/Antoine/ATOCore.git.
Loopback always works on the host running the script. Callers
from a remote host (e.g. running deploy.sh from a laptop against
the Dalidou LAN) set ATOCORE_GIT_REMOTE explicitly. The script
header's Environment Variables section documents this with an
explicit reference to the 2026-04-08 Dalidou deploy report so the
rationale isn't lost.
docs/dalidou-deployment.md gets a new "Troubleshooting hostname
resolution" subsection and a new example invocation showing how
to deploy from a remote host with an explicit ATOCORE_GIT_REMOTE
override.
Bug 2 (usability): atocore_client.py ATOCORE_BASE_URL documentation
-------------------------------------------------------------------
scripts/atocore_client.py
Same class of issue as bug 3. BASE_URL defaults to
http://dalidou:8100 which resolves fine from a remote caller
(laptop, T420/OpenClaw over Tailscale) but NOT from the Dalidou
host itself or from inside the atocore container. Dalidou Claude
saw the CLI return
{"status": "unavailable", "fail_open": true}
while direct curl to http://127.0.0.1:8100 worked.
The fix here is NOT to change the default (remote callers are
the common case and would break) but to DOCUMENT the override
clearly so the next operator knows what's happening:
- The script module docstring grew a new "Environment variables"
section covering ATOCORE_BASE_URL, ATOCORE_TIMEOUT_SECONDS,
ATOCORE_REFRESH_TIMEOUT_SECONDS, and ATOCORE_FAIL_OPEN, with
the explicit override example for on-host/in-container use
- It calls out the exact symptom (fail-open envelope when the
base URL doesn't resolve) so the diagnosis is obvious from
the error alone
- docs/dalidou-deployment.md troubleshooting section mirrors
this guidance so there's one place to look regardless of
whether the operator starts with the client help or the
deploy doc
What this commit does NOT do
----------------------------
- Does NOT change the default ATOCORE_BASE_URL. Doing that would
break the T420 OpenClaw helper and every remote caller who
currently relies on the hostname. Documentation is the right
fix for this case.
- Does NOT fix /etc/hosts on Dalidou. That's a host-level
configuration issue that the user can fix if they prefer
having the hostname resolve; the deploy.sh fix makes it
unnecessary regardless.
- Does NOT re-run the validation on Dalidou. The next step is
for the live service to pull this commit via deploy.sh (which
should now work without the IP workaround) and re-run the
Phase 9 loop test to confirm nothing regressed.
484 lines
19 KiB
Python
484 lines
19 KiB
Python
"""Operator-facing API client for live AtoCore instances.
|
|
|
|
This script is intentionally external to the app runtime. It is for admins
|
|
and operators who want a convenient way to inspect live project state,
|
|
refresh projects, audit retrieval quality, manage trusted project-state
|
|
entries, and drive the Phase 9 reflection loop (capture, extract, queue,
|
|
promote, reject).
|
|
|
|
Environment variables
|
|
---------------------
|
|
|
|
ATOCORE_BASE_URL
|
|
Base URL of the AtoCore service (default: ``http://dalidou:8100``).
|
|
|
|
When running ON the Dalidou host itself or INSIDE the Dalidou
|
|
container, override this with loopback or the real IP::
|
|
|
|
ATOCORE_BASE_URL=http://127.0.0.1:8100 \\
|
|
python scripts/atocore_client.py health
|
|
|
|
The default hostname "dalidou" is meant for cases where the
|
|
caller is a remote machine (laptop, T420/OpenClaw, etc.) with
|
|
"dalidou" in its /etc/hosts or resolvable via Tailscale. It does
|
|
NOT reliably resolve on the host itself or inside the container,
|
|
and when it fails the client returns
|
|
``{"status": "unavailable", "fail_open": true}`` — the right
|
|
diagnosis when that happens is to set ATOCORE_BASE_URL explicitly
|
|
to 127.0.0.1:8100 and retry.
|
|
|
|
ATOCORE_TIMEOUT_SECONDS
|
|
Request timeout for most operations (default: 30).
|
|
|
|
ATOCORE_REFRESH_TIMEOUT_SECONDS
|
|
Longer timeout for project refresh operations which can be slow
|
|
(default: 1800).
|
|
|
|
ATOCORE_FAIL_OPEN
|
|
When "true" (default), network errors return a small fail-open
|
|
envelope instead of raising. Set to "false" for admin operations
|
|
where you need the real error.
|
|
"""
|
|
|
|
from __future__ import annotations
|
|
|
|
import argparse
|
|
import json
|
|
import os
|
|
import re
|
|
import sys
|
|
import urllib.error
|
|
import urllib.parse
|
|
import urllib.request
|
|
from typing import Any
|
|
|
|
|
|
BASE_URL = os.environ.get("ATOCORE_BASE_URL", "http://dalidou:8100").rstrip("/")
|
|
TIMEOUT = int(os.environ.get("ATOCORE_TIMEOUT_SECONDS", "30"))
|
|
REFRESH_TIMEOUT = int(os.environ.get("ATOCORE_REFRESH_TIMEOUT_SECONDS", "1800"))
|
|
FAIL_OPEN = os.environ.get("ATOCORE_FAIL_OPEN", "true").lower() == "true"
|
|
|
|
# Bumped when the subcommand surface or JSON output shapes meaningfully
|
|
# change. See docs/architecture/llm-client-integration.md for the
|
|
# semver rules. History:
|
|
# 0.1.0 initial stable-ops-only client
|
|
# 0.2.0 Phase 9 reflection loop added: capture, extract,
|
|
# reinforce-interaction, list-interactions, get-interaction,
|
|
# queue, promote, reject
|
|
CLIENT_VERSION = "0.2.0"
|
|
|
|
|
|
def print_json(payload: Any) -> None:
|
|
print(json.dumps(payload, ensure_ascii=True, indent=2))
|
|
|
|
|
|
def fail_open_payload() -> dict[str, Any]:
|
|
return {"status": "unavailable", "source": "atocore", "fail_open": True}
|
|
|
|
|
|
def request(
|
|
method: str,
|
|
path: str,
|
|
data: dict[str, Any] | None = None,
|
|
timeout: int | None = None,
|
|
) -> Any:
|
|
url = f"{BASE_URL}{path}"
|
|
headers = {"Content-Type": "application/json"} if data is not None else {}
|
|
payload = json.dumps(data).encode("utf-8") if data is not None else None
|
|
req = urllib.request.Request(url, data=payload, headers=headers, method=method)
|
|
try:
|
|
with urllib.request.urlopen(req, timeout=timeout or TIMEOUT) as response:
|
|
body = response.read().decode("utf-8")
|
|
except urllib.error.HTTPError as exc:
|
|
body = exc.read().decode("utf-8")
|
|
if body:
|
|
print(body)
|
|
raise SystemExit(22) from exc
|
|
except (urllib.error.URLError, TimeoutError, OSError):
|
|
if FAIL_OPEN:
|
|
print_json(fail_open_payload())
|
|
raise SystemExit(0)
|
|
raise
|
|
|
|
if not body.strip():
|
|
return {}
|
|
return json.loads(body)
|
|
|
|
|
|
def parse_aliases(aliases_csv: str) -> list[str]:
|
|
return [alias.strip() for alias in aliases_csv.split(",") if alias.strip()]
|
|
|
|
|
|
def detect_project(prompt: str) -> dict[str, Any]:
|
|
payload = request("GET", "/projects")
|
|
prompt_lower = prompt.lower()
|
|
best_project = None
|
|
best_alias = None
|
|
best_score = -1
|
|
|
|
for project in payload.get("projects", []):
|
|
candidates = [project.get("id", ""), *project.get("aliases", [])]
|
|
for candidate in candidates:
|
|
candidate = (candidate or "").strip()
|
|
if not candidate:
|
|
continue
|
|
pattern = rf"(?<![a-z0-9]){re.escape(candidate.lower())}(?![a-z0-9])"
|
|
matched = re.search(pattern, prompt_lower) is not None
|
|
if not matched and candidate.lower() not in prompt_lower:
|
|
continue
|
|
score = len(candidate)
|
|
if score > best_score:
|
|
best_project = project.get("id")
|
|
best_alias = candidate
|
|
best_score = score
|
|
|
|
return {"matched_project": best_project, "matched_alias": best_alias}
|
|
|
|
|
|
def classify_result(result: dict[str, Any]) -> dict[str, Any]:
|
|
source_file = (result.get("source_file") or "").lower()
|
|
heading = (result.get("heading_path") or "").lower()
|
|
title = (result.get("title") or "").lower()
|
|
text = " ".join([source_file, heading, title])
|
|
|
|
labels: list[str] = []
|
|
if any(token in text for token in ["_archive", "/archive", "archive/", "pre-cleanup", "pre-migration", "history"]):
|
|
labels.append("archive_or_history")
|
|
if any(token in text for token in ["status", "dashboard", "current-state", "current state", "next-steps", "next steps"]):
|
|
labels.append("current_status")
|
|
if any(token in text for token in ["decision", "adr", "tradeoff", "selected architecture", "selection"]):
|
|
labels.append("decision")
|
|
if any(token in text for token in ["requirement", "spec", "constraints", "baseline", "cdr", "sow"]):
|
|
labels.append("requirements")
|
|
if any(token in text for token in ["roadmap", "milestone", "plan", "workflow", "calibration", "contract"]):
|
|
labels.append("execution_plan")
|
|
if not labels:
|
|
labels.append("reference")
|
|
|
|
return {
|
|
"score": result.get("score"),
|
|
"title": result.get("title"),
|
|
"heading_path": result.get("heading_path"),
|
|
"source_file": result.get("source_file"),
|
|
"labels": labels,
|
|
"is_noise_risk": "archive_or_history" in labels,
|
|
}
|
|
|
|
|
|
def audit_query(prompt: str, top_k: int, project: str | None) -> dict[str, Any]:
|
|
response = request(
|
|
"POST",
|
|
"/query",
|
|
{"prompt": prompt, "top_k": top_k, "project": project or None},
|
|
)
|
|
classifications = [classify_result(result) for result in response.get("results", [])]
|
|
broad_prompt = len(prompt.split()) <= 2
|
|
noise_hits = sum(1 for item in classifications if item["is_noise_risk"])
|
|
current_hits = sum(1 for item in classifications if "current_status" in item["labels"])
|
|
decision_hits = sum(1 for item in classifications if "decision" in item["labels"])
|
|
requirements_hits = sum(1 for item in classifications if "requirements" in item["labels"])
|
|
|
|
recommendations: list[str] = []
|
|
if broad_prompt:
|
|
recommendations.append("Prompt is broad; prefer a project-specific question with intent, artifact type, or constraint language.")
|
|
if noise_hits:
|
|
recommendations.append("Archive/history noise is present; prefer current-status, decision, requirements, and baseline docs in the next ingestion/ranking pass.")
|
|
if current_hits == 0:
|
|
recommendations.append("No current-status docs surfaced in the top results; Wave 2 should ingest or strengthen trusted operational truth.")
|
|
if decision_hits == 0:
|
|
recommendations.append("No decision docs surfaced in the top results; add or freeze decision logs for the active project.")
|
|
if requirements_hits == 0:
|
|
recommendations.append("No requirements/baseline docs surfaced in the top results; prioritize baseline and architecture-freeze material.")
|
|
if not recommendations:
|
|
recommendations.append("Ranking looks healthy for this prompt.")
|
|
|
|
return {
|
|
"prompt": prompt,
|
|
"project": project,
|
|
"top_k": top_k,
|
|
"broad_prompt": broad_prompt,
|
|
"noise_hits": noise_hits,
|
|
"current_status_hits": current_hits,
|
|
"decision_hits": decision_hits,
|
|
"requirements_hits": requirements_hits,
|
|
"results": classifications,
|
|
"recommendations": recommendations,
|
|
}
|
|
|
|
|
|
def project_payload(
|
|
project_id: str,
|
|
aliases_csv: str,
|
|
source: str,
|
|
subpath: str,
|
|
description: str,
|
|
label: str,
|
|
) -> dict[str, Any]:
|
|
return {
|
|
"project_id": project_id,
|
|
"aliases": parse_aliases(aliases_csv),
|
|
"description": description,
|
|
"ingest_roots": [{"source": source, "subpath": subpath, "label": label}],
|
|
}
|
|
|
|
|
|
def build_parser() -> argparse.ArgumentParser:
|
|
parser = argparse.ArgumentParser(description="AtoCore live API client")
|
|
sub = parser.add_subparsers(dest="command", required=True)
|
|
|
|
for name in ["health", "sources", "stats", "projects", "project-template", "debug-context", "ingest-sources"]:
|
|
sub.add_parser(name)
|
|
|
|
p = sub.add_parser("detect-project")
|
|
p.add_argument("prompt")
|
|
|
|
p = sub.add_parser("auto-context")
|
|
p.add_argument("prompt")
|
|
p.add_argument("budget", nargs="?", type=int, default=3000)
|
|
p.add_argument("project", nargs="?", default="")
|
|
|
|
for name in ["propose-project", "register-project"]:
|
|
p = sub.add_parser(name)
|
|
p.add_argument("project_id")
|
|
p.add_argument("aliases_csv")
|
|
p.add_argument("source")
|
|
p.add_argument("subpath")
|
|
p.add_argument("description", nargs="?", default="")
|
|
p.add_argument("label", nargs="?", default="")
|
|
|
|
p = sub.add_parser("update-project")
|
|
p.add_argument("project")
|
|
p.add_argument("description")
|
|
p.add_argument("aliases_csv", nargs="?", default="")
|
|
|
|
p = sub.add_parser("refresh-project")
|
|
p.add_argument("project")
|
|
p.add_argument("purge_deleted", nargs="?", default="false")
|
|
|
|
p = sub.add_parser("project-state")
|
|
p.add_argument("project")
|
|
p.add_argument("category", nargs="?", default="")
|
|
|
|
p = sub.add_parser("project-state-set")
|
|
p.add_argument("project")
|
|
p.add_argument("category")
|
|
p.add_argument("key")
|
|
p.add_argument("value")
|
|
p.add_argument("source", nargs="?", default="")
|
|
p.add_argument("confidence", nargs="?", type=float, default=1.0)
|
|
|
|
p = sub.add_parser("project-state-invalidate")
|
|
p.add_argument("project")
|
|
p.add_argument("category")
|
|
p.add_argument("key")
|
|
|
|
p = sub.add_parser("query")
|
|
p.add_argument("prompt")
|
|
p.add_argument("top_k", nargs="?", type=int, default=5)
|
|
p.add_argument("project", nargs="?", default="")
|
|
|
|
p = sub.add_parser("context-build")
|
|
p.add_argument("prompt")
|
|
p.add_argument("project", nargs="?", default="")
|
|
p.add_argument("budget", nargs="?", type=int, default=3000)
|
|
|
|
p = sub.add_parser("audit-query")
|
|
p.add_argument("prompt")
|
|
p.add_argument("top_k", nargs="?", type=int, default=5)
|
|
p.add_argument("project", nargs="?", default="")
|
|
|
|
# --- Phase 9 reflection loop surface --------------------------------
|
|
#
|
|
# capture: record one interaction (prompt + response + context used).
|
|
# Mirrors POST /interactions. response is positional so shell
|
|
# callers can pass it via $(cat file.txt) or heredoc. project,
|
|
# client, and session_id are optional positionals with empty
|
|
# defaults, matching the existing script's style.
|
|
p = sub.add_parser("capture")
|
|
p.add_argument("prompt")
|
|
p.add_argument("response", nargs="?", default="")
|
|
p.add_argument("project", nargs="?", default="")
|
|
p.add_argument("client", nargs="?", default="")
|
|
p.add_argument("session_id", nargs="?", default="")
|
|
p.add_argument("reinforce", nargs="?", default="true")
|
|
|
|
# extract: run the Phase 9 C rule-based extractor against an
|
|
# already-captured interaction. persist='true' writes the
|
|
# candidates as status='candidate' memories; default is
|
|
# preview-only.
|
|
p = sub.add_parser("extract")
|
|
p.add_argument("interaction_id")
|
|
p.add_argument("persist", nargs="?", default="false")
|
|
|
|
# reinforce: backfill reinforcement on an already-captured interaction.
|
|
p = sub.add_parser("reinforce-interaction")
|
|
p.add_argument("interaction_id")
|
|
|
|
# list-interactions: paginated listing with filters.
|
|
p = sub.add_parser("list-interactions")
|
|
p.add_argument("project", nargs="?", default="")
|
|
p.add_argument("session_id", nargs="?", default="")
|
|
p.add_argument("client", nargs="?", default="")
|
|
p.add_argument("since", nargs="?", default="")
|
|
p.add_argument("limit", nargs="?", type=int, default=50)
|
|
|
|
# get-interaction: fetch one by id
|
|
p = sub.add_parser("get-interaction")
|
|
p.add_argument("interaction_id")
|
|
|
|
# queue: list the candidate review queue
|
|
p = sub.add_parser("queue")
|
|
p.add_argument("memory_type", nargs="?", default="")
|
|
p.add_argument("project", nargs="?", default="")
|
|
p.add_argument("limit", nargs="?", type=int, default=50)
|
|
|
|
# promote: candidate -> active
|
|
p = sub.add_parser("promote")
|
|
p.add_argument("memory_id")
|
|
|
|
# reject: candidate -> invalid
|
|
p = sub.add_parser("reject")
|
|
p.add_argument("memory_id")
|
|
|
|
return parser
|
|
|
|
|
|
def main() -> int:
|
|
args = build_parser().parse_args()
|
|
cmd = args.command
|
|
|
|
if cmd == "health":
|
|
print_json(request("GET", "/health"))
|
|
elif cmd == "sources":
|
|
print_json(request("GET", "/sources"))
|
|
elif cmd == "stats":
|
|
print_json(request("GET", "/stats"))
|
|
elif cmd == "projects":
|
|
print_json(request("GET", "/projects"))
|
|
elif cmd == "project-template":
|
|
print_json(request("GET", "/projects/template"))
|
|
elif cmd == "debug-context":
|
|
print_json(request("GET", "/debug/context"))
|
|
elif cmd == "ingest-sources":
|
|
print_json(request("POST", "/ingest/sources", {}))
|
|
elif cmd == "detect-project":
|
|
print_json(detect_project(args.prompt))
|
|
elif cmd == "auto-context":
|
|
project = args.project or detect_project(args.prompt).get("matched_project") or ""
|
|
if not project:
|
|
print_json({"status": "no_project_match", "source": "atocore", "mode": "auto-context"})
|
|
else:
|
|
print_json(request("POST", "/context/build", {"prompt": args.prompt, "project": project, "budget": args.budget}))
|
|
elif cmd in {"propose-project", "register-project"}:
|
|
path = "/projects/proposal" if cmd == "propose-project" else "/projects/register"
|
|
print_json(request("POST", path, project_payload(args.project_id, args.aliases_csv, args.source, args.subpath, args.description, args.label)))
|
|
elif cmd == "update-project":
|
|
payload: dict[str, Any] = {"description": args.description}
|
|
if args.aliases_csv.strip():
|
|
payload["aliases"] = parse_aliases(args.aliases_csv)
|
|
print_json(request("PUT", f"/projects/{urllib.parse.quote(args.project)}", payload))
|
|
elif cmd == "refresh-project":
|
|
purge_deleted = args.purge_deleted.lower() in {"1", "true", "yes", "y"}
|
|
path = f"/projects/{urllib.parse.quote(args.project)}/refresh?purge_deleted={str(purge_deleted).lower()}"
|
|
print_json(request("POST", path, {}, timeout=REFRESH_TIMEOUT))
|
|
elif cmd == "project-state":
|
|
suffix = f"?category={urllib.parse.quote(args.category)}" if args.category else ""
|
|
print_json(request("GET", f"/project/state/{urllib.parse.quote(args.project)}{suffix}"))
|
|
elif cmd == "project-state-set":
|
|
print_json(request("POST", "/project/state", {
|
|
"project": args.project,
|
|
"category": args.category,
|
|
"key": args.key,
|
|
"value": args.value,
|
|
"source": args.source,
|
|
"confidence": args.confidence,
|
|
}))
|
|
elif cmd == "project-state-invalidate":
|
|
print_json(request("DELETE", "/project/state", {"project": args.project, "category": args.category, "key": args.key}))
|
|
elif cmd == "query":
|
|
print_json(request("POST", "/query", {"prompt": args.prompt, "top_k": args.top_k, "project": args.project or None}))
|
|
elif cmd == "context-build":
|
|
print_json(request("POST", "/context/build", {"prompt": args.prompt, "project": args.project or None, "budget": args.budget}))
|
|
elif cmd == "audit-query":
|
|
print_json(audit_query(args.prompt, args.top_k, args.project or None))
|
|
# --- Phase 9 reflection loop surface ------------------------------
|
|
elif cmd == "capture":
|
|
body: dict[str, Any] = {
|
|
"prompt": args.prompt,
|
|
"response": args.response,
|
|
"project": args.project,
|
|
"client": args.client or "atocore-client",
|
|
"session_id": args.session_id,
|
|
"reinforce": args.reinforce.lower() in {"1", "true", "yes", "y"},
|
|
}
|
|
print_json(request("POST", "/interactions", body))
|
|
elif cmd == "extract":
|
|
persist = args.persist.lower() in {"1", "true", "yes", "y"}
|
|
print_json(
|
|
request(
|
|
"POST",
|
|
f"/interactions/{urllib.parse.quote(args.interaction_id, safe='')}/extract",
|
|
{"persist": persist},
|
|
)
|
|
)
|
|
elif cmd == "reinforce-interaction":
|
|
print_json(
|
|
request(
|
|
"POST",
|
|
f"/interactions/{urllib.parse.quote(args.interaction_id, safe='')}/reinforce",
|
|
{},
|
|
)
|
|
)
|
|
elif cmd == "list-interactions":
|
|
query_parts: list[str] = []
|
|
if args.project:
|
|
query_parts.append(f"project={urllib.parse.quote(args.project)}")
|
|
if args.session_id:
|
|
query_parts.append(f"session_id={urllib.parse.quote(args.session_id)}")
|
|
if args.client:
|
|
query_parts.append(f"client={urllib.parse.quote(args.client)}")
|
|
if args.since:
|
|
query_parts.append(f"since={urllib.parse.quote(args.since)}")
|
|
query_parts.append(f"limit={int(args.limit)}")
|
|
query = "?" + "&".join(query_parts)
|
|
print_json(request("GET", f"/interactions{query}"))
|
|
elif cmd == "get-interaction":
|
|
print_json(
|
|
request(
|
|
"GET",
|
|
f"/interactions/{urllib.parse.quote(args.interaction_id, safe='')}",
|
|
)
|
|
)
|
|
elif cmd == "queue":
|
|
query_parts = ["status=candidate"]
|
|
if args.memory_type:
|
|
query_parts.append(f"memory_type={urllib.parse.quote(args.memory_type)}")
|
|
if args.project:
|
|
query_parts.append(f"project={urllib.parse.quote(args.project)}")
|
|
query_parts.append(f"limit={int(args.limit)}")
|
|
query = "?" + "&".join(query_parts)
|
|
print_json(request("GET", f"/memory{query}"))
|
|
elif cmd == "promote":
|
|
print_json(
|
|
request(
|
|
"POST",
|
|
f"/memory/{urllib.parse.quote(args.memory_id, safe='')}/promote",
|
|
{},
|
|
)
|
|
)
|
|
elif cmd == "reject":
|
|
print_json(
|
|
request(
|
|
"POST",
|
|
f"/memory/{urllib.parse.quote(args.memory_id, safe='')}/reject",
|
|
{},
|
|
)
|
|
)
|
|
else:
|
|
return 1
|
|
return 0
|
|
|
|
|
|
if __name__ == "__main__":
|
|
raise SystemExit(main())
|