Skip to main content

Zero-Config CI/CD TIBET Integration — one line to audit your entire pipeline

Project description

tibet-ci — Zero-Config CI/CD TIBET Integration

One line to audit your entire pipeline.

Every stage is a TIBET token. Every build has provenance.

tibet-ci auto-detects your project, runs the right tools, and wraps every pipeline stage in a TIBET provenance chain. Python? Node? Rust? Go? Java? tibet-ci knows what to do.

The CI/CD Multiplier

One line in your pipeline config — TIBET audits everything:

# .github/workflows/tibet.yml
name: TIBET CI
on: [push, pull_request]

jobs:
  tibet:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - uses: humotica/tibet-ci@v1

That's it. tibet-ci will:

  1. Detect your project type (Python, Node, Rust, Go, Java)
  2. Run tibet-pol on pipeline steps (process integrity)
  3. Run tibet-audit on compliance checks
  4. Run tibet-forge on code quality
  5. Output a TIBET badge + checksum rapport

Pipeline Flow

  ┌────────────┐
  │   detect    │  Auto-detect language, build tool, test runner
  └─────┬──────┘
        │
  ┌─────▼──────┐
  │ install_deps│  Install dependencies (pip/npm/cargo/go mod)
  └─────┬──────┘
        │
  ┌─────▼──────┐
  │    lint     │  Run linter (ruff/eslint/clippy/vet)
  └─────┬──────┘
        │
  ┌─────▼──────┐
  │    test     │  Run tests (pytest/jest/cargo test/go test)
  └─────┬──────┘
        │
  ┌─────▼──────┐
  │   audit     │  TIBET compliance audit
  └─────┬──────┘
        │
  ┌─────▼──────┐
  │   build     │  Build package/binary
  └─────┬──────┘
        │
  ┌─────▼──────┐
  │   report    │  Generate badge + checksum rapport
  └─────┬──────┘
        │
  ┌─────▼──────┐
  │ TIBET Chain │  Every stage = token. Chain = audit trail.
  └────────────┘

Each stage produces a TIBET token with:

Layer Content
ERIN What ran: stage name, command, exit code, output hash
ERAAN Previous stage token, dependency chain
EROMHEEN CI platform, runner, commit SHA, branch
ERACHTER Intent: "CI pipeline stage: {name}"

Install

pip install tibet-ci

With optional integrations:

pip install tibet-ci[full]  # includes tibet-pol, tibet-audit, tibet-forge, rich

CLI Usage

# Detect project type
tibet-ci detect .
# → Python (pyproject.toml), build_tool=hatch, test=pytest, lint=ruff

# Run full pipeline
tibet-ci run .
# → detect → install_deps → lint → test → audit → build → report
# → TIBET badge: PASSING (7/7 stages, checksum: a3f7c2...)

# Run specific stages only
tibet-ci run . --stages detect,lint,test

# Output as JSON
tibet-ci run . --json

# Generate badge status
tibet-ci badge .

# Demo run with simulated project
tibet-ci demo

# Concept overview
tibet-ci info

Works With

CI Platform Detection
GitHub Actions GITHUB_ACTIONS env var
GitLab CI GITLAB_CI env var
Bitbucket Pipelines BITBUCKET_PIPELINES env var
Jenkins JENKINS_URL env var
Local Fallback — works everywhere

Project Auto-Detection

Files Found Language Build Tool Test Command Lint Command
pyproject.toml / setup.py Python pip/hatch pytest ruff check .
package.json Node npm/yarn npm test npx eslint .
Cargo.toml Rust cargo cargo test cargo clippy
go.mod Go go go test ./... go vet ./...
pom.xml Java maven mvn test mvn checkstyle:check
build.gradle Java gradle gradle test gradle check

Python API

from tibet_ci import PipelineRunner, detect_project

# Detect
info = detect_project(".")
print(info.language)    # "python"
print(info.build_tool)  # "hatch"
print(info.test_command) # "pytest"

# Run full pipeline
runner = PipelineRunner()
result = runner.run(".")
print(result.badge_status)  # "PASSING"
print(result.checksum)      # "a3f7c2b1..."

for stage in result.stages:
    status = "PASS" if stage.passed else "FAIL"
    print(f"  [{status}] {stage.name} ({stage.duration_ms}ms)")

# Run specific stages
result = runner.run(".", stages=["detect", "lint", "test"])

Part of the TIBET Ecosystem

Package Purpose
tibet-core Protocol core
tibet-y2k38 Y2K38 Time Bridge
tibet-pol Process Integrity Checker
tibet-pqc Post-Quantum Crypto Router
tibet-overlay Identity Overlay
tibet-twin Digital Twin Guard
tibet-ci CI/CD Multiplier

License

MIT — Humotica AI Lab 2025-2026

Authors

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tibet_ci-0.2.0.tar.gz (17.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

tibet_ci-0.2.0-py3-none-any.whl (21.5 kB view details)

Uploaded Python 3

File details

Details for the file tibet_ci-0.2.0.tar.gz.

File metadata

  • Download URL: tibet_ci-0.2.0.tar.gz
  • Upload date:
  • Size: 17.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_ci-0.2.0.tar.gz
Algorithm Hash digest
SHA256 50ae4840eabe638c994882f7f387df35a9d1c7d5617ed4a24976420c8ddf36de
MD5 bf5b40a5971be232ac254ad269635157
BLAKE2b-256 46cc4b16c02563d85e0e9e760510ad4a5fc66b18c49a7f4f1b8ebc9af974dcef

See more details on using hashes here.

File details

Details for the file tibet_ci-0.2.0-py3-none-any.whl.

File metadata

  • Download URL: tibet_ci-0.2.0-py3-none-any.whl
  • Upload date:
  • Size: 21.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_ci-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 ab73a79f7933b4de1797a00996ab446d4ea558e5a6ce6dbc3cb184d8777c2b7d
MD5 8660507bc21f7c9bf7493773b5297ba5
BLAKE2b-256 bc15e52015b3272078324bd09fec8890a85a6d27fcfa0c0d042cc2278b8e780e

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page