TenantAtlas/tests/Unit/Badges/OperatorOutcomeTaxonomyTest.php
ahmido 3c3daae405 feat: normalize operator outcome taxonomy (#186)
## Summary
- introduce a shared operator outcome taxonomy with semantic axes, severity bands, and next-action policy
- apply the taxonomy to operations, evidence/review completeness, baseline semantics, and restore semantics
- harden badge rendering, tenant-safe filtering/search behavior, and operator-facing summary/notification wording
- add the spec kit artifacts, reference documentation, and regression coverage for diagnostic-vs-primary state handling

## Testing
- focused Pest coverage for taxonomy registry and badge guardrails
- operations presentation and notification tests
- evidence, baseline, restore, and tenant-scope regression tests

## Notes
- Livewire v4.0+ compliance is preserved in the existing Filament v5 stack
- panel provider registration remains unchanged in bootstrap/providers.php
- no new globally searchable resource was added; adopted resources remain tenant-safe and out of global search where required
- no new destructive action family was introduced; existing actions keep their current authorization and confirmation behavior
- no new frontend asset strategy was introduced; existing deploy flow with filament:assets remains unchanged

Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de>
Reviewed-on: #186
2026-03-22 12:13:34 +00:00

59 lines
2.9 KiB
PHP

<?php
declare(strict_types=1);
use App\Support\Badges\BadgeCatalog;
use App\Support\Badges\BadgeDomain;
use App\Support\Badges\BadgeSpec;
use App\Support\Badges\OperatorNextActionPolicy;
use App\Support\Badges\OperatorOutcomeTaxonomy;
use App\Support\Badges\OperatorSemanticAxis;
use App\Support\Badges\OperatorStateClassification;
it('defines curated examples for the first-slice adoption set', function (): void {
expect(OperatorOutcomeTaxonomy::curatedExamples())->toHaveCount(12);
});
it('registers taxonomy metadata for every first-slice entry', function (): void {
foreach (OperatorOutcomeTaxonomy::all() as $entries) {
foreach ($entries as $entry) {
expect($entry['axis'])->toBeInstanceOf(OperatorSemanticAxis::class)
->and($entry['classification'])->toBeInstanceOf(OperatorStateClassification::class)
->and($entry['next_action_policy'])->toBeInstanceOf(OperatorNextActionPolicy::class)
->and($entry['label'])->not->toBe('')
->and($entry['notes'])->not->toBe('');
}
}
});
it('qualifies overloaded operator-facing labels in the first slice', function (): void {
expect(BadgeCatalog::spec(BadgeDomain::OperationRunStatus, 'queued')->label)->toBe('Queued for execution')
->and(BadgeCatalog::spec(BadgeDomain::OperationRunOutcome, 'blocked')->label)->toBe('Blocked by prerequisite')
->and(BadgeCatalog::spec(BadgeDomain::EvidenceCompleteness, 'missing')->label)->toBe('Not collected yet')
->and(BadgeCatalog::spec(BadgeDomain::TenantReviewCompleteness, 'stale')->label)->toBe('Refresh review inputs')
->and(BadgeCatalog::spec(BadgeDomain::BaselineSnapshotFidelity, 'unsupported')->label)->toBe('Support limited')
->and(BadgeCatalog::spec(BadgeDomain::RestoreRunStatus, 'partial')->label)->toBe('Applied with follow-up')
->and(BadgeCatalog::spec(BadgeDomain::RestoreResultStatus, 'manual_required')->label)->toBe('Manual follow-up needed')
->and(BadgeCatalog::spec(BadgeDomain::RestoreCheckSeverity, 'warning')->label)->toBe('Review before running');
});
it('rejects diagnostic warning or danger taxonomy combinations', function (): void {
expect(fn (): BadgeSpec => new BadgeSpec(
label: 'Invalid diagnostic warning',
color: 'warning',
semanticAxis: OperatorSemanticAxis::EvidenceDepth,
classification: OperatorStateClassification::Diagnostic,
nextActionPolicy: OperatorNextActionPolicy::None,
))->toThrow(InvalidArgumentException::class);
});
it('rejects primary warning badges without a next-action policy', function (): void {
expect(fn (): BadgeSpec => new BadgeSpec(
label: 'Invalid primary warning',
color: 'warning',
semanticAxis: OperatorSemanticAxis::ExecutionOutcome,
classification: OperatorStateClassification::Primary,
nextActionPolicy: OperatorNextActionPolicy::None,
))->toThrow(InvalidArgumentException::class);
});