Zero-Config CI/CD TIBET Integration — one line to audit your entire pipeline
Project description
tibet-ci — Zero-Config CI/CD TIBET Integration
One line to audit your entire pipeline.
Every stage is a TIBET token. Every build has provenance.
tibet-ci auto-detects your project, runs the right tools, and wraps every pipeline stage in a TIBET provenance chain. Python? Node? Rust? Go? Java? tibet-ci knows what to do.
The CI/CD Multiplier
One line in your pipeline config — TIBET audits everything:
# .github/workflows/tibet.yml
name: TIBET CI
on: [push, pull_request]
jobs:
tibet:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: humotica/tibet-ci@v1
That's it. tibet-ci will:
- Detect your project type (Python, Node, Rust, Go, Java)
- Run
tibet-polon pipeline steps (process integrity) - Run
tibet-auditon compliance checks - Run
tibet-forgeon code quality - Output a TIBET badge + checksum rapport
Pipeline Flow
┌────────────┐
│ detect │ Auto-detect language, build tool, test runner
└─────┬──────┘
│
┌─────▼──────┐
│ install_deps│ Install dependencies (pip/npm/cargo/go mod)
└─────┬──────┘
│
┌─────▼──────┐
│ lint │ Run linter (ruff/eslint/clippy/vet)
└─────┬──────┘
│
┌─────▼──────┐
│ test │ Run tests (pytest/jest/cargo test/go test)
└─────┬──────┘
│
┌─────▼──────┐
│ audit │ TIBET compliance audit
└─────┬──────┘
│
┌─────▼──────┐
│ build │ Build package/binary
└─────┬──────┘
│
┌─────▼──────┐
│ report │ Generate badge + checksum rapport
└─────┬──────┘
│
┌─────▼──────┐
│ TIBET Chain │ Every stage = token. Chain = audit trail.
└────────────┘
Each stage produces a TIBET token with:
| Layer | Content |
|---|---|
| ERIN | What ran: stage name, command, exit code, output hash |
| ERAAN | Previous stage token, dependency chain |
| EROMHEEN | CI platform, runner, commit SHA, branch |
| ERACHTER | Intent: "CI pipeline stage: {name}" |
Install
pip install tibet-ci
With optional integrations:
pip install tibet-ci[full] # includes tibet-pol, tibet-audit, tibet-forge, rich
CLI Usage
# Detect project type
tibet-ci detect .
# → Python (pyproject.toml), build_tool=hatch, test=pytest, lint=ruff
# Run full pipeline
tibet-ci run .
# → detect → install_deps → lint → test → audit → build → report
# → TIBET badge: PASSING (7/7 stages, checksum: a3f7c2...)
# Run specific stages only
tibet-ci run . --stages detect,lint,test
# Output as JSON
tibet-ci run . --json
# Generate badge status
tibet-ci badge .
# Demo run with simulated project
tibet-ci demo
# Concept overview
tibet-ci info
Works With
| CI Platform | Detection |
|---|---|
| GitHub Actions | GITHUB_ACTIONS env var |
| GitLab CI | GITLAB_CI env var |
| Bitbucket Pipelines | BITBUCKET_PIPELINES env var |
| Jenkins | JENKINS_URL env var |
| Local | Fallback — works everywhere |
Project Auto-Detection
| Files Found | Language | Build Tool | Test Command | Lint Command |
|---|---|---|---|---|
pyproject.toml / setup.py |
Python | pip/hatch | pytest |
ruff check . |
package.json |
Node | npm/yarn | npm test |
npx eslint . |
Cargo.toml |
Rust | cargo | cargo test |
cargo clippy |
go.mod |
Go | go | go test ./... |
go vet ./... |
pom.xml |
Java | maven | mvn test |
mvn checkstyle:check |
build.gradle |
Java | gradle | gradle test |
gradle check |
Python API
from tibet_ci import PipelineRunner, detect_project
# Detect
info = detect_project(".")
print(info.language) # "python"
print(info.build_tool) # "hatch"
print(info.test_command) # "pytest"
# Run full pipeline
runner = PipelineRunner()
result = runner.run(".")
print(result.badge_status) # "PASSING"
print(result.checksum) # "a3f7c2b1..."
for stage in result.stages:
status = "PASS" if stage.passed else "FAIL"
print(f" [{status}] {stage.name} ({stage.duration_ms}ms)")
# Run specific stages
result = runner.run(".", stages=["detect", "lint", "test"])
Part of the TIBET Ecosystem
| Package | Purpose |
|---|---|
tibet-core |
Protocol core |
tibet-y2k38 |
Y2K38 Time Bridge |
tibet-pol |
Process Integrity Checker |
tibet-pqc |
Post-Quantum Crypto Router |
tibet-overlay |
Identity Overlay |
tibet-twin |
Digital Twin Guard |
| tibet-ci | CI/CD Multiplier |
License
MIT — Humotica AI Lab 2025-2026
Authors
- J. van de Meent — jasper@humotica.com
- R. AI (Root AI) — root_idd@humotica.nl
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file tibet_ci-0.1.0.tar.gz.
File metadata
- Download URL: tibet_ci-0.1.0.tar.gz
- Upload date:
- Size: 13.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
cbfdfc0335ad724f61e027e98f2abf1e82f79fe787d266e5cf861c78740460b6
|
|
| MD5 |
c363c28fb44c27c4d9b728fbb2abd94a
|
|
| BLAKE2b-256 |
bac42eaca10000b98826f603b0bc91f7597e94aab23394905adc38e253e8c738
|
File details
Details for the file tibet_ci-0.1.0-py3-none-any.whl.
File metadata
- Download URL: tibet_ci-0.1.0-py3-none-any.whl
- Upload date:
- Size: 16.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
ea7efbb377729d6409fae9c1cfc52c3ddbe750e70d796cbff5ddcdb40609f1b9
|
|
| MD5 |
004c4a863879b90689c4f1065f9a94ac
|
|
| BLAKE2b-256 |
fb366a59c84120087e51d6b2f07a7ac02498f1dba6f21f8afaffe9a0c944b99d
|