TenantAtlas/tests/Feature/Console/TenantpilotSeedBackupHealthBrowserFixtureCommandTest.php
ahmido 6f8eb28ca2 feat: add tenant backup health signals (#212)
## Summary
- add the Spec 180 tenant backup-health resolver and value objects to derive absent, stale, degraded, healthy, and schedule-follow-up posture from existing backup and schedule truth
- surface backup posture and reason-driven drillthroughs in the tenant dashboard and preserve continuity on backup-set and backup-schedule destinations
- add deterministic local/testing browser-fixture seeding plus a local fixture-login helper for the blocked drillthrough `403` scenario, along with the related spec artifacts and focused regression coverage

## Testing
- `vendor/bin/sail artisan test --compact tests/Feature/Auth/BackupHealthBrowserFixtureLoginTest.php tests/Feature/Console/TenantpilotSeedBackupHealthBrowserFixtureCommandTest.php`
- `vendor/bin/sail artisan test --compact tests/Unit/Support/BackupHealth/TenantBackupHealthResolverTest.php tests/Feature/Filament/DashboardKpisWidgetTest.php tests/Feature/Filament/NeedsAttentionWidgetTest.php tests/Feature/Filament/TenantDashboardTruthAlignmentTest.php tests/Feature/Filament/TenantDashboardTenantScopeTest.php tests/Feature/Filament/TenantDashboardDbOnlyTest.php tests/Feature/Filament/BackupSetListContinuityTest.php tests/Feature/Filament/BackupSetEnterpriseDetailPageTest.php tests/Feature/BackupScheduling/BackupScheduleLifecycleTest.php tests/Feature/Auth/BackupHealthBrowserFixtureLoginTest.php tests/Feature/Console/TenantpilotSeedBackupHealthBrowserFixtureCommandTest.php`

## Notes
- Filament v5 / Livewire v4 compliant; no panel-provider change was needed, so `bootstrap/providers.php` remains unchanged
- no new globally searchable resource was introduced, so global-search behavior is unchanged
- no new destructive action was added; existing destructive actions and confirmation behavior remain unchanged
- no new asset registration was added; the existing deploy-time `php artisan filament:assets` step remains sufficient
- the local fixture login helper route is limited to `local` and `testing` environments
- the focused and broader Spec 180 packs are green; the full suite was not rerun after these changes

Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de>
Reviewed-on: #212
2026-04-07 21:35:58 +00:00

75 lines
3.0 KiB
PHP

<?php
declare(strict_types=1);
use App\Filament\Pages\TenantDashboard;
use App\Filament\Resources\BackupSetResource;
use App\Filament\Widgets\Dashboard\DashboardKpis;
use App\Filament\Widgets\Dashboard\NeedsAttention;
use App\Models\BackupItem;
use App\Models\BackupSet;
use App\Models\Tenant;
use App\Models\User;
use App\Models\Workspace;
use App\Services\Auth\CapabilityResolver;
use App\Support\Auth\Capabilities;
use App\Support\Rbac\UiTooltips;
use App\Support\Workspaces\WorkspaceContext;
use Filament\Facades\Filament;
use Livewire\Livewire;
it('seeds a deterministic blocked drill-through browser fixture for backup health', function (): void {
$this->artisan('tenantpilot:backup-health:seed-browser-fixture', ['--no-interaction' => true])
->assertSuccessful()
->expectsOutputToContain('Fixture login URL')
->expectsOutputToContain('Dashboard URL');
$workspaceConfig = config('tenantpilot.backup_health.browser_smoke_fixture.workspace');
$userConfig = config('tenantpilot.backup_health.browser_smoke_fixture.user');
$scenarioConfig = config('tenantpilot.backup_health.browser_smoke_fixture.blocked_drillthrough');
$tenantRouteKey = $scenarioConfig['tenant_id'] ?? $scenarioConfig['tenant_external_id'];
$workspace = Workspace::query()->where('slug', $workspaceConfig['slug'])->first();
$user = User::query()->where('email', $userConfig['email'])->first();
$tenant = Tenant::query()->where('external_id', $tenantRouteKey)->first();
expect($workspace)->not->toBeNull();
expect($user)->not->toBeNull();
expect($tenant)->not->toBeNull();
expect(BackupSet::query()->where('tenant_id', $tenant->getKey())->where('name', $scenarioConfig['backup_set_name'])->exists())->toBeTrue();
expect(BackupItem::query()->where('tenant_id', $tenant->getKey())->where('policy_identifier', $scenarioConfig['policy_external_id'])->exists())->toBeTrue();
$resolver = app(CapabilityResolver::class);
$resolver->clearCache();
expect($resolver->isMember($user, $tenant))->toBeTrue();
expect($resolver->can($user, $tenant, Capabilities::TENANT_VIEW))->toBeFalse();
$this->actingAs($user)->withSession([
WorkspaceContext::SESSION_KEY => (int) $workspace->getKey(),
]);
session()->put(WorkspaceContext::SESSION_KEY, (int) $workspace->getKey());
$this->get(route('filament.admin.pages.choose-tenant'))
->assertOk()
->assertSee((string) $tenant->name);
$this->get(TenantDashboard::getUrl(tenant: $tenant))
->assertOk();
Filament::setCurrentPanel(Filament::getPanel('tenant'));
Filament::setTenant($tenant, true);
Livewire::test(DashboardKpis::class)
->assertSee('Backup posture')
->assertSee('Stale');
Livewire::test(NeedsAttention::class)
->assertSee('Latest backup is stale')
->assertSee('Open latest backup')
->assertSee(UiTooltips::INSUFFICIENT_PERMISSION);
$this->get(BackupSetResource::getUrl('index', tenant: $tenant))
->assertForbidden();
});