{
"file": "frontend/src/components/__tests__/task_log_viewer.test.js",
"verdict": "APPROVED",
"rejection_reason": "NONE",
"audit_details": {
"target_invoked": true,
"pre_conditions_tested": true,
"post_conditions_tested": true,
"test_fixture_used": true,
"edges_covered": true,
"invariants_verified": true,
"ux_states_tested": true,
"semantic_anchors_present": true
},
"coverage_summary": {
"total_edges": 2,
"edges_tested": 2,
"total_invariants": 1,
"invariants_tested": 1,
"total_ux_states": 3,
"ux_states_tested": 3
},
"tier_compliance": {
"source_tier": "CRITICAL",
"meets_tier_requirements": true
},
"feedback": "Remediation successful: test tier matches CRITICAL, missing missing @TEST_EDGE no_task_id coverage added, test for @UX_FEEDBACK (autoScroll) added properly, missing inline=false (show=true) tested properly. Semantic RELATION tag fixed to VERIFIES."
},
{
"file": "frontend/src/lib/components/reports/__tests__/report_card.ux.test.js",
"verdict": "APPROVED",
"rejection_reason": "NONE",
"audit_details": {
"target_invoked": true,
"pre_conditions_tested": true,
"post_conditions_tested": true,
"test_fixture_used": true,
"edges_covered": true,
"invariants_verified": true,
"ux_states_tested": true,
"semantic_anchors_present": true
},
"coverage_summary": {
"total_edges": 2,
"edges_tested": 2,
"total_invariants": 1,
"invariants_tested": 1,
"total_ux_states": 2,
"ux_states_tested": 2
},
"tier_compliance": {
"source_tier": "CRITICAL",
"meets_tier_requirements": true
},
"feedback": "Remediation successful: @TEST_EDGE random_status and @TEST_EDGE empty_report_object tests explicitly assert on outcomes, @TEST_FIXTURE tested completely, Test tier switched to CRITICAL."
},
{
"file": "backend/tests/test_logger.py",
"verdict": "APPROVED",
"rejection_reason": "NONE",
"audit_details": {
"target_invoked": true,
"pre_conditions_tested": true,
"post_conditions_tested": true,
"test_fixture_used": true,
"edges_covered": true,
"invariants_verified": true,
"ux_states_tested": false,
"semantic_anchors_present": true
},
"coverage_summary": {
"total_edges": 0,
"edges_tested": 0,
"total_invariants": 0,
"invariants_tested": 0,
"total_ux_states": 0,
"ux_states_tested": 0
},
"tier_compliance": {
"source_tier": "STANDARD",
"meets_tier_requirements": true
},
"feedback": "Remediation successful: Test module semantic anchors added [DEF] and [/DEF] explicitly. Added missing @TIER tag and @RELATION: VERIFIES -> src/core/logger.py at the top of the file."
}
]
58 lines
2.0 KiB
Python
58 lines
2.0 KiB
Python
# [DEF:backend.tests.services.clean_release.test_source_isolation:Module]
|
|
# @TIER: STANDARD
|
|
# @SEMANTICS: tests, clean-release, source-isolation, internal-only
|
|
# @PURPOSE: Verify internal source registry validation behavior.
|
|
# @LAYER: Domain
|
|
# @RELATION: TESTS -> backend.src.services.clean_release.source_isolation
|
|
# @INVARIANT: External endpoints always produce blocking violations.
|
|
|
|
from datetime import datetime, timezone
|
|
|
|
from src.models.clean_release import ResourceSourceEntry, ResourceSourceRegistry
|
|
from src.services.clean_release.source_isolation import validate_internal_sources
|
|
|
|
|
|
def _registry() -> ResourceSourceRegistry:
|
|
return ResourceSourceRegistry(
|
|
registry_id="registry-internal-v1",
|
|
name="Internal Sources",
|
|
entries=[
|
|
ResourceSourceEntry(
|
|
source_id="src-1",
|
|
host="repo.intra.company.local",
|
|
protocol="https",
|
|
purpose="artifact-repo",
|
|
enabled=True,
|
|
),
|
|
ResourceSourceEntry(
|
|
source_id="src-2",
|
|
host="pypi.intra.company.local",
|
|
protocol="https",
|
|
purpose="package-mirror",
|
|
enabled=True,
|
|
),
|
|
],
|
|
updated_at=datetime.now(timezone.utc),
|
|
updated_by="tester",
|
|
status="active",
|
|
)
|
|
|
|
|
|
def test_validate_internal_sources_all_internal_ok():
|
|
result = validate_internal_sources(
|
|
registry=_registry(),
|
|
endpoints=["repo.intra.company.local", "pypi.intra.company.local"],
|
|
)
|
|
assert result["ok"] is True
|
|
assert result["violations"] == []
|
|
|
|
|
|
def test_validate_internal_sources_external_blocked():
|
|
result = validate_internal_sources(
|
|
registry=_registry(),
|
|
endpoints=["repo.intra.company.local", "pypi.org"],
|
|
)
|
|
assert result["ok"] is False
|
|
assert len(result["violations"]) == 1
|
|
assert result["violations"][0]["category"] == "external-source"
|
|
assert result["violations"][0]["blocked_release"] is True |