2.9 KiB
		
	
	
	
	
	
	
	
			
		
		
	
	
			2.9 KiB
		
	
	
	
	
	
	
	
WHOOSH ↔ CHORUS Integration Demo Plan (SEC-SLURP Track)
Demo Objectives
- Showcase end-to-end persistence → UCXL beacon → Pin Steward → WHOOSH artifact submission flow.
- Validate role-based agent interactions with SLURP contexts (resolver + temporal graph) prior to DHT hardening.
- Capture metrics/telemetry needed for SEC-SLURP exit criteria and WHOOSH Phase 1 sign-off.
Sequenced Milestones
- 
Persistence Validation Session - Run GOWORK=off go test ./pkg/slurp/...with stubs patched; demo LevelDB warm/load usingslurp_persistence_test.go.
- Inspect beacon manifests via CLI (slurpctl beacon list).
- Deliverable: test log + manifest sample archived in UCXL.
 
- Run 
- 
Beacon → Pin Steward Dry Run - Replay stored manifests through Pin Steward worker with mock DHT backend.
- Show replication planner queue + telemetry counters (pin_steward_replica_heal_total).
- Deliverable: decision record linking manifest to replication outcome.
 
- 
WHOOSH SLURP Proxy Alignment - Point WHOOSH dev stack (npm run dev) at local SLURP with beacon API enabled.
- Walk through council formation, capture SLURP artifact submission with beacon confirmation modal.
- Deliverable: screen recording + WHOOSH DB entry referencing beacon manifest id.
 
- Point WHOOSH dev stack (
- 
DHT Resilience Checkpoint - Switch Pin Steward to libp2p DHT (once wired) and run replication + provider TTL check.
- Fail one node intentionally, demonstrate heal path + alert surfaced in WHOOSH UI.
- Deliverable: telemetry dump + alert screenshot.
 
- 
Governance & Telemetry Wrap-Up - Export Prometheus metrics (cache hit/miss, beacon writes, replication heals) into KACHING dashboard.
- Publish Decision Record documenting UCXL address flow, referencing SEC-SLURP docs.
 
Roles & Responsibilities
- SLURP Team: finalize persistence build, implement beacon APIs, own Pin Steward worker.
- WHOOSH Team: wire beacon client, expose replication/encryption status in UI, capture council telemetry.
- KACHING/SHHH Stakeholders: validate telemetry ingestion and encryption custody notes.
- Program Management: schedule demo rehearsal, ensure Decision Records and UCXL addresses recorded.
Tooling & Environments
- Local cluster via docker compose up slurp whoosh pin-steward(to be scripted incommands/).
- Use make demo-sec-slurptarget to run integration harness (to be added).
- Prometheus/Grafana docker compose for metrics validation.
Success Criteria
- Beacon manifest accessible from WHOOSH UI within 2s average latency.
- Pin Steward resolves under-replicated manifest within demo timeline (<30s) and records healing event.
- All demo steps logged with UCXL references and SHHH redaction checks passing.
Open Items
- Need sample repo/issues to feed WHOOSH analyzer (consider project-queues/active/WHOOSH/demo-data).
- Determine minimal DHT cluster footprint for the demo (3 vs 5 nodes).
- Align on telemetry retention window for demo (24h?).
