TenantAtlas/apps/platform/tests/Feature/Console/TenantpilotSeedBackupHealthBrowserFixtureCommandTest.php
ahmido f1a73490e4 feat: finalize dashboard recovery honesty (#215)
## Summary
- add a dedicated Recovery Readiness dashboard widget for backup posture and recovery evidence
- group Needs Attention items by domain and elevate the recovery call-to-action
- align restore-run and recovery posture tests with the extracted widget and continuity flows
- include the related spec artifacts for 184-dashboard-recovery-honesty

## Verification
- `cd /Users/ahmeddarrazi/Documents/projects/TenantAtlas/apps/platform && ./vendor/bin/sail bin pint --dirty --format agent`
- `cd /Users/ahmeddarrazi/Documents/projects/TenantAtlas/apps/platform && ./vendor/bin/sail artisan test --compact --filter="DashboardKpisWidget|DashboardRecoveryPosture|TenantDashboardDbOnly|TenantpilotSeedBackupHealthBrowserFixtureCommand|NeedsAttentionWidget"`
- browser smoke verified on the calm, unvalidated, and weakened dashboard states

## Notes
- Livewire v4.0+ compliant with Filament v5
- no panel provider changes; Laravel 11+ provider registration remains in `bootstrap/providers.php`
- Recovery Readiness stays within the existing tenant dashboard asset strategy; no new Filament asset registration required

Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de>
Reviewed-on: #215
2026-04-08 23:21:36 +00:00

75 lines
3.0 KiB
PHP

<?php
declare(strict_types=1);
use App\Filament\Pages\TenantDashboard;
use App\Filament\Resources\BackupSetResource;
use App\Filament\Widgets\Dashboard\NeedsAttention;
use App\Filament\Widgets\Dashboard\RecoveryReadiness;
use App\Models\BackupItem;
use App\Models\BackupSet;
use App\Models\Tenant;
use App\Models\User;
use App\Models\Workspace;
use App\Services\Auth\CapabilityResolver;
use App\Support\Auth\Capabilities;
use App\Support\Rbac\UiTooltips;
use App\Support\Workspaces\WorkspaceContext;
use Filament\Facades\Filament;
use Livewire\Livewire;
it('seeds a deterministic blocked drill-through browser fixture for backup health', function (): void {
$this->artisan('tenantpilot:backup-health:seed-browser-fixture', ['--no-interaction' => true])
->assertSuccessful()
->expectsOutputToContain('Fixture login URL')
->expectsOutputToContain('Dashboard URL');
$workspaceConfig = config('tenantpilot.backup_health.browser_smoke_fixture.workspace');
$userConfig = config('tenantpilot.backup_health.browser_smoke_fixture.user');
$scenarioConfig = config('tenantpilot.backup_health.browser_smoke_fixture.blocked_drillthrough');
$tenantRouteKey = $scenarioConfig['tenant_id'] ?? $scenarioConfig['tenant_external_id'];
$workspace = Workspace::query()->where('slug', $workspaceConfig['slug'])->first();
$user = User::query()->where('email', $userConfig['email'])->first();
$tenant = Tenant::query()->where('external_id', $tenantRouteKey)->first();
expect($workspace)->not->toBeNull();
expect($user)->not->toBeNull();
expect($tenant)->not->toBeNull();
expect(BackupSet::query()->where('tenant_id', $tenant->getKey())->where('name', $scenarioConfig['backup_set_name'])->exists())->toBeTrue();
expect(BackupItem::query()->where('tenant_id', $tenant->getKey())->where('policy_identifier', $scenarioConfig['policy_external_id'])->exists())->toBeTrue();
$resolver = app(CapabilityResolver::class);
$resolver->clearCache();
expect($resolver->isMember($user, $tenant))->toBeTrue();
expect($resolver->can($user, $tenant, Capabilities::TENANT_VIEW))->toBeFalse();
$this->actingAs($user)->withSession([
WorkspaceContext::SESSION_KEY => (int) $workspace->getKey(),
]);
session()->put(WorkspaceContext::SESSION_KEY, (int) $workspace->getKey());
$this->get(route('filament.admin.pages.choose-tenant'))
->assertOk()
->assertSee((string) $tenant->name);
$this->get(TenantDashboard::getUrl(tenant: $tenant))
->assertOk();
Filament::setCurrentPanel(Filament::getPanel('tenant'));
Filament::setTenant($tenant, true);
Livewire::test(RecoveryReadiness::class)
->assertSee('Backup posture')
->assertSee('Stale');
Livewire::test(NeedsAttention::class)
->assertSee('Latest backup is stale')
->assertSee('Open latest backup')
->assertSee(UiTooltips::INSUFFICIENT_PERMISSION);
$this->get(BackupSetResource::getUrl('index', tenant: $tenant))
->assertForbidden();
});