k9iser
Analyse configs, infer constraints, generate K9 contracts with cryptographic attestation.
Install
cargo install k9iser
What It Does
k9iser analyses TOML, YAML, JSON, and Nickel configuration files, infers the implicit
constraints they embody, generates formal K9 contracts,
validates configs against those contracts, and attests compliance with cryptographic signatures.
Think "JSON Schema on steroids with cryptographic attestation."
The Four Pillars
must — Required constraints, value ranges, type invariants. Violation = hard failure.
trust — Verified sources, signing keys, provenance chains.
dust — Cleanup rules, stale keys, migration paths.
intend — Intent declarations catching semantically wrong configs.
Quick Start
k9iser init # creates k9iser.toml manifest
k9iser generate # analyse configs, infer constraints, emit K9 contracts
k9iser validate # check configs against their contracts
Use Cases
- CI/CD config validation — gate merges on K9 contract compliance
- Infrastructure-as-code compliance — validate Terraform / Ansible / Nix configs
- Dependency manifest auditing — validate Cargo.toml / package.json against constraints
- Deployment config gates — attest configs before deploy pipelines proceed
- Config drift detection — compare live configs against K9 contracts