TenantAtlas/apps/platform/.pnpm-store/v10/files/fa/d81cbcce15a62dfb7c3bb9e9296ff6cd58e2c0e743726cccb1df449b9e6a3348788356f7e846cbb1f93c10fba5f5ca319d78e52baa7d9d1429919fa010a5c6
ahmido 1fec9c6f9d
Some checks failed
Main Confidence / confidence (push) Failing after 45s
feat: compress governance operator outcomes (#253)
## Summary
- introduce surface-aware compressed governance outcomes and reuse the shared truth/explanation seams for operator-first summaries
- apply the compressed outcome hierarchy across baseline, evidence, review, review-pack, canonical review/evidence, and artifact-oriented operation-run surfaces
- expand spec 214 fixtures and Pest coverage, and fix tenant-panel route assertions by generating explicit tenant-panel URLs in the affected Filament tests

## Validation
- `cd apps/platform && ./vendor/bin/sail bin pint --dirty --format agent`
- focused governance compression suite from `specs/214-governance-outcome-compression/quickstart.md` passed (`68` tests, `445` assertions)
- `cd apps/platform && ./vendor/bin/sail artisan test --compact tests/Feature/Filament/InventoryItemResourceTest.php tests/Feature/Filament/BackupSetUiEnforcementTest.php tests/Feature/Filament/RestoreRunUiEnforcementTest.php` passed (`18` tests, `81` assertions)

Co-authored-by: Ahmed Darrazi <ahmed.darrazi@live.de>
Reviewed-on: #253
2026-04-19 12:30:36 +00:00

44 lines
1.5 KiB
Plaintext

import { bigserial, pgSchema, text, timestamp, uuid, varchar } from "../pg-core/index.js";
import { pgRole } from "../pg-core/roles.js";
import { sql } from "../sql/sql.js";
const anonRole = pgRole("anon").existing();
const authenticatedRole = pgRole("authenticated").existing();
const serviceRole = pgRole("service_role").existing();
const postgresRole = pgRole("postgres_role").existing();
const supabaseAuthAdminRole = pgRole("supabase_auth_admin").existing();
const auth = pgSchema("auth");
const authUsers = auth.table("users", {
id: uuid().primaryKey().notNull(),
email: varchar({ length: 255 }),
phone: text().unique(),
emailConfirmedAt: timestamp("email_confirmed_at", { withTimezone: true }),
phoneConfirmedAt: timestamp("phone_confirmed_at", { withTimezone: true }),
lastSignInAt: timestamp("last_sign_in_at", { withTimezone: true }),
createdAt: timestamp("created_at", { withTimezone: true }),
updatedAt: timestamp("updated_at", { withTimezone: true })
});
const realtime = pgSchema("realtime");
const realtimeMessages = realtime.table(
"messages",
{
id: bigserial({ mode: "bigint" }).primaryKey(),
topic: text().notNull(),
extension: text({
enum: ["presence", "broadcast", "postgres_changes"]
}).notNull()
}
);
const authUid = sql`(select auth.uid())`;
const realtimeTopic = sql`realtime.topic()`;
export {
anonRole,
authUid,
authUsers,
authenticatedRole,
postgresRole,
realtimeMessages,
realtimeTopic,
serviceRole,
supabaseAuthAdminRole
};
//# sourceMappingURL=rls.js.map