72 lines
2.1 KiB
PHP
72 lines
2.1 KiB
PHP
<?php
|
|
|
|
declare(strict_types=1);
|
|
|
|
use Tests\Support\OpsUx\SourceFileScanner;
|
|
|
|
it('does not emit database notifications from OperationRun-producing jobs or start surfaces', function (): void {
|
|
$root = SourceFileScanner::projectRoot();
|
|
|
|
$allowlist = [
|
|
$root.'/app/Services/OperationRunService.php',
|
|
$root.'/app/Notifications/OperationRunCompleted.php',
|
|
];
|
|
|
|
$files = SourceFileScanner::phpFiles([$root.'/app'], $allowlist);
|
|
|
|
$violations = [];
|
|
|
|
foreach ($files as $file) {
|
|
$source = SourceFileScanner::read($file);
|
|
|
|
if (! str_contains($source, 'sendToDatabase(')) {
|
|
continue;
|
|
}
|
|
|
|
$hasOperationRunSignal = str_contains($source, 'OperationRun')
|
|
|| str_contains($source, 'operationRun')
|
|
|| str_contains($source, 'OperationRunLinks')
|
|
|| str_contains($source, 'OperationUxPresenter');
|
|
|
|
if (! $hasOperationRunSignal) {
|
|
continue;
|
|
}
|
|
|
|
if (! preg_match_all('/sendToDatabase\s*\(/', $source, $matches, PREG_OFFSET_CAPTURE)) {
|
|
continue;
|
|
}
|
|
|
|
foreach ($matches[0] as [, $offset]) {
|
|
if (! is_int($offset)) {
|
|
continue;
|
|
}
|
|
|
|
$line = substr_count(substr($source, 0, $offset), "\n") + 1;
|
|
|
|
$violations[] = [
|
|
'file' => SourceFileScanner::relativePath($file),
|
|
'line' => $line,
|
|
'snippet' => SourceFileScanner::snippet($source, $line),
|
|
];
|
|
}
|
|
}
|
|
|
|
if ($violations !== []) {
|
|
$messages = array_map(static function (array $violation): string {
|
|
return sprintf(
|
|
"%s:%d\n%s",
|
|
$violation['file'],
|
|
$violation['line'],
|
|
$violation['snippet'],
|
|
);
|
|
}, $violations);
|
|
|
|
$this->fail(
|
|
"Forbidden OperationRun-related database notification emission found (use canonical OperationRunService terminal notification / toast-only start feedback):\n\n"
|
|
.implode("\n\n", $messages)
|
|
);
|
|
}
|
|
|
|
expect($violations)->toBe([]);
|
|
})->group('ops-ux');
|