Files
CHORUS/docs/development/sec-slurp-whoosh-integration-demo.md
2025-09-27 21:03:12 +10:00

2.9 KiB

WHOOSH ↔ CHORUS Integration Demo Plan (SEC-SLURP Track)

Demo Objectives

  • Showcase end-to-end persistence → UCXL beacon → Pin Steward → WHOOSH artifact submission flow.
  • Validate role-based agent interactions with SLURP contexts (resolver + temporal graph) prior to DHT hardening.
  • Capture metrics/telemetry needed for SEC-SLURP exit criteria and WHOOSH Phase 1 sign-off.

Sequenced Milestones

  1. Persistence Validation Session

    • Run GOWORK=off go test ./pkg/slurp/... with stubs patched; demo LevelDB warm/load using slurp_persistence_test.go.
    • Inspect beacon manifests via CLI (slurpctl beacon list).
    • Deliverable: test log + manifest sample archived in UCXL.
  2. Beacon → Pin Steward Dry Run

    • Replay stored manifests through Pin Steward worker with mock DHT backend.
    • Show replication planner queue + telemetry counters (pin_steward_replica_heal_total).
    • Deliverable: decision record linking manifest to replication outcome.
  3. WHOOSH SLURP Proxy Alignment

    • Point WHOOSH dev stack (npm run dev) at local SLURP with beacon API enabled.
    • Walk through council formation, capture SLURP artifact submission with beacon confirmation modal.
    • Deliverable: screen recording + WHOOSH DB entry referencing beacon manifest id.
  4. DHT Resilience Checkpoint

    • Switch Pin Steward to libp2p DHT (once wired) and run replication + provider TTL check.
    • Fail one node intentionally, demonstrate heal path + alert surfaced in WHOOSH UI.
    • Deliverable: telemetry dump + alert screenshot.
  5. Governance & Telemetry Wrap-Up

    • Export Prometheus metrics (cache hit/miss, beacon writes, replication heals) into KACHING dashboard.
    • Publish Decision Record documenting UCXL address flow, referencing SEC-SLURP docs.

Roles & Responsibilities

  • SLURP Team: finalize persistence build, implement beacon APIs, own Pin Steward worker.
  • WHOOSH Team: wire beacon client, expose replication/encryption status in UI, capture council telemetry.
  • KACHING/SHHH Stakeholders: validate telemetry ingestion and encryption custody notes.
  • Program Management: schedule demo rehearsal, ensure Decision Records and UCXL addresses recorded.

Tooling & Environments

  • Local cluster via docker compose up slurp whoosh pin-steward (to be scripted in commands/).
  • Use make demo-sec-slurp target to run integration harness (to be added).
  • Prometheus/Grafana docker compose for metrics validation.

Success Criteria

  • Beacon manifest accessible from WHOOSH UI within 2s average latency.
  • Pin Steward resolves under-replicated manifest within demo timeline (<30s) and records healing event.
  • All demo steps logged with UCXL references and SHHH redaction checks passing.

Open Items

  • Need sample repo/issues to feed WHOOSH analyzer (consider project-queues/active/WHOOSH/demo-data).
  • Determine minimal DHT cluster footprint for the demo (3 vs 5 nodes).
  • Align on telemetry retention window for demo (24h?).