Compare commits
5 Commits
v1.1.0
...
6919061240
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
6919061240 | ||
|
|
7b739e04c8 | ||
|
|
98ea91f2df | ||
|
|
532f6a98d8 | ||
|
|
a3e2b4e44e |
@@ -1,4 +1,4 @@
|
||||
name: Prepare Release
|
||||
name: Release
|
||||
|
||||
on:
|
||||
workflow_dispatch:
|
||||
@@ -24,7 +24,7 @@ jobs:
|
||||
run:
|
||||
shell: bash
|
||||
env:
|
||||
SUMMARY_FILE: ${{ runner.temp }}/prepare-release-summary.md
|
||||
SUMMARY_FILE: ${{ runner.temp }}/release-prepare-summary.md
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@v4
|
||||
@@ -39,6 +39,12 @@ jobs:
|
||||
cache: true
|
||||
cache-dependency-path: go.sum
|
||||
|
||||
- name: Install release build tools
|
||||
run: |
|
||||
set -euo pipefail
|
||||
apt-get update
|
||||
apt-get install -y upx-ucl || apt-get install -y upx
|
||||
|
||||
- name: Validate formatting
|
||||
run: test -z "$(gofmt -l .)"
|
||||
|
||||
@@ -242,6 +248,15 @@ jobs:
|
||||
run: |
|
||||
set -euo pipefail
|
||||
|
||||
if command -v upx >/dev/null 2>&1; then
|
||||
upx_cmd=upx
|
||||
elif command -v upx-ucl >/dev/null 2>&1; then
|
||||
upx_cmd=upx-ucl
|
||||
else
|
||||
echo "UPX is not available on PATH after installation." >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
mkdir -p dist
|
||||
|
||||
for target in linux/amd64 linux/arm64; do
|
||||
@@ -250,6 +265,7 @@ jobs:
|
||||
|
||||
bin="vociferate_${RELEASE_VERSION}_${os}_${arch}"
|
||||
GOOS="$os" GOARCH="$arch" go build -trimpath -ldflags="-s -w" -o "dist/${bin}" ./cmd/vociferate
|
||||
"${upx_cmd}" --best --lzma "dist/${bin}"
|
||||
done
|
||||
|
||||
(
|
||||
@@ -329,6 +345,7 @@ jobs:
|
||||
echo "- Tag: ${TAG_NAME}"
|
||||
echo "- Release notes sourced from changelog entry ${RELEASE_VERSION}."
|
||||
echo "- Published assets: vociferate_${RELEASE_VERSION}_linux_amd64, vociferate_${RELEASE_VERSION}_linux_arm64, checksums.txt"
|
||||
echo "- Release binaries were compressed with UPX before upload."
|
||||
} >> "$SUMMARY_FILE"
|
||||
else
|
||||
{
|
||||
@@ -1,4 +1,4 @@
|
||||
name: Do Release
|
||||
name: Update Release
|
||||
|
||||
on:
|
||||
push:
|
||||
@@ -29,7 +29,7 @@ jobs:
|
||||
shell: bash
|
||||
env:
|
||||
RELEASE_TOKEN: ${{ secrets.RELEASE_PAT }}
|
||||
SUMMARY_FILE: ${{ runner.temp }}/do-release-summary.md
|
||||
SUMMARY_FILE: ${{ runner.temp }}/update-release-summary.md
|
||||
steps:
|
||||
- name: Checkout
|
||||
uses: actions/checkout@v4
|
||||
@@ -59,7 +59,6 @@ jobs:
|
||||
id: resolve-version
|
||||
env:
|
||||
INPUT_TAG: ${{ inputs.tag }}
|
||||
CALLER_TAG: ${{ needs.prepare.outputs.tag }}
|
||||
DETECTED_TAG: ${{ steps.detect-tag.outputs.detected_tag }}
|
||||
run: |
|
||||
set -euo pipefail
|
||||
@@ -79,17 +78,11 @@ jobs:
|
||||
}
|
||||
|
||||
input_tag="$(normalize_candidate "${INPUT_TAG}")"
|
||||
caller_tag="$(normalize_candidate "${CALLER_TAG}")"
|
||||
detected_tag="$(normalize_candidate "${DETECTED_TAG}")"
|
||||
|
||||
# Try explicit input first.
|
||||
requested_tag="$input_tag"
|
||||
|
||||
# Fall back to caller workflow output when workflow_call input forwarding is unreliable.
|
||||
if [[ -z "$requested_tag" && -n "$caller_tag" ]]; then
|
||||
requested_tag="$caller_tag"
|
||||
fi
|
||||
|
||||
# Fall back to detected tag if neither input nor caller tag is available.
|
||||
if [[ -z "$requested_tag" && -n "$detected_tag" ]]; then
|
||||
requested_tag="$detected_tag"
|
||||
@@ -107,7 +100,6 @@ jobs:
|
||||
else
|
||||
echo "Error: Could not resolve release version" >&2
|
||||
echo " - inputs.tag(raw): '$INPUT_TAG'" >&2
|
||||
echo " - needs.prepare.outputs.tag(raw): '$CALLER_TAG'" >&2
|
||||
echo " - detected_tag(raw): '${DETECTED_TAG}'" >&2
|
||||
echo " - GITHUB_REF: '$GITHUB_REF'" >&2
|
||||
exit 1
|
||||
@@ -130,6 +122,12 @@ jobs:
|
||||
cache: true
|
||||
cache-dependency-path: go.sum
|
||||
|
||||
- name: Install release build tools
|
||||
run: |
|
||||
set -euo pipefail
|
||||
apt-get update
|
||||
apt-get install -y upx-ucl || apt-get install -y upx
|
||||
|
||||
- name: Preflight release API access
|
||||
env:
|
||||
TAG_NAME: ${{ steps.resolve-version.outputs.tag }}
|
||||
@@ -172,6 +170,15 @@ jobs:
|
||||
run: |
|
||||
set -euo pipefail
|
||||
|
||||
if command -v upx >/dev/null 2>&1; then
|
||||
upx_cmd=upx
|
||||
elif command -v upx-ucl >/dev/null 2>&1; then
|
||||
upx_cmd=upx-ucl
|
||||
else
|
||||
echo "UPX is not available on PATH after installation." >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
mkdir -p dist
|
||||
|
||||
for target in linux/amd64 linux/arm64; do
|
||||
@@ -180,6 +187,7 @@ jobs:
|
||||
|
||||
bin="vociferate_${RELEASE_VERSION}_${os}_${arch}"
|
||||
GOOS="$os" GOARCH="$arch" go build -trimpath -ldflags="-s -w" -o "dist/${bin}" ./cmd/vociferate
|
||||
"${upx_cmd}" --best --lzma "dist/${bin}"
|
||||
done
|
||||
|
||||
(
|
||||
@@ -194,7 +202,27 @@ jobs:
|
||||
run: |
|
||||
set -euo pipefail
|
||||
|
||||
release_api="${GITHUB_API_URL:-${GITHUB_SERVER_URL%/}/api/v1}/repos/${GITHUB_REPOSITORY}/releases/${RELEASE_ID}/assets"
|
||||
raw_release_id="$(printf '%s' "${RELEASE_ID:-}" | sed 's/^[[:space:]]\+//; s/[[:space:]]\+$//')"
|
||||
if [[ "$raw_release_id" =~ ^%\!t\(string=(.*)\)$ ]]; then
|
||||
raw_release_id="${BASH_REMATCH[1]}"
|
||||
fi
|
||||
|
||||
release_id="$(printf '%s' "$raw_release_id" | sed 's/^[[:space:]]\+//; s/[[:space:]]\+$//')"
|
||||
if ! [[ "$release_id" =~ ^[0-9]+$ ]]; then
|
||||
echo "Invalid release id from publish step: '${RELEASE_ID}'" >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
release_detail_api="${GITHUB_API_URL:-${GITHUB_SERVER_URL%/}/api/v1}/repos/${GITHUB_REPOSITORY}/releases/${release_id}"
|
||||
if ! curl --fail-with-body -sS \
|
||||
-H "Authorization: token ${RELEASE_TOKEN}" \
|
||||
-H "Content-Type: application/json" \
|
||||
"$release_detail_api" >/dev/null; then
|
||||
echo "Resolved release endpoint is not accessible: ${release_detail_api}" >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
release_api="${GITHUB_API_URL:-${GITHUB_SERVER_URL%/}/api/v1}/repos/${GITHUB_REPOSITORY}/releases/${release_id}/assets"
|
||||
|
||||
for asset in dist/*; do
|
||||
name="$(basename "$asset")"
|
||||
@@ -223,25 +251,32 @@ jobs:
|
||||
--data-binary "@${asset}"
|
||||
done
|
||||
|
||||
- name: Summarize published release
|
||||
- name: Summary
|
||||
if: ${{ always() }}
|
||||
env:
|
||||
TAG_NAME: ${{ steps.publish.outputs.tag }}
|
||||
RELEASE_VERSION: ${{ steps.publish.outputs.version }}
|
||||
PUBLISH_OUTCOME: ${{ steps.publish.outcome }}
|
||||
run: |
|
||||
set -euo pipefail
|
||||
|
||||
if [[ "${PUBLISH_OUTCOME}" == "success" ]]; then
|
||||
{
|
||||
echo "## Release Published"
|
||||
echo
|
||||
echo "- Tag: ${TAG_NAME}"
|
||||
echo "- Release notes sourced from changelog entry ${RELEASE_VERSION}."
|
||||
echo "- Published assets: vociferate_${RELEASE_VERSION}_linux_amd64, vociferate_${RELEASE_VERSION}_linux_arm64, checksums.txt"
|
||||
echo "- Release binaries were compressed with UPX before upload."
|
||||
} >> "$SUMMARY_FILE"
|
||||
|
||||
- name: Summary
|
||||
if: ${{ always() }}
|
||||
run: |
|
||||
set -euo pipefail
|
||||
else
|
||||
{
|
||||
echo "## Release Failed"
|
||||
echo
|
||||
echo "- Tag: ${TAG_NAME:-unknown}"
|
||||
echo "- Create or update release step did not complete successfully."
|
||||
} >> "$SUMMARY_FILE"
|
||||
fi
|
||||
|
||||
echo 'Summary'
|
||||
echo
|
||||
@@ -268,7 +303,7 @@ jobs:
|
||||
run:
|
||||
shell: bash
|
||||
env:
|
||||
SUMMARY_FILE: ${{ runner.temp }}/do-release-validate-summary.md
|
||||
SUMMARY_FILE: ${{ runner.temp }}/update-release-validate-summary.md
|
||||
steps:
|
||||
- name: Checkout tagged revision
|
||||
uses: actions/checkout@v4
|
||||
47
AGENTS.md
47
AGENTS.md
@@ -30,8 +30,8 @@ Apply these checks before invoking actions:
|
||||
|
||||
- Checkout repository first.
|
||||
- For prepare/publish flows that depend on tags/history, use full history checkout (`fetch-depth: 0`).
|
||||
- Use `secrets.RELEASE_PAT` for release/tag/update operations (prepare/publish/do-release) so tag pushes trigger downstream workflows reliably.
|
||||
- `do-release` and `decorate-pr` now run preflight API checks and fail fast when token credentials are missing or insufficient.
|
||||
- Use `secrets.RELEASE_PAT` for release/tag/update operations (`prepare`, `publish`, `release`, `update-release`) so authenticated release changes can be pushed and published reliably.
|
||||
- `release`, `update-release`, and `decorate-pr` run preflight API checks and fail fast when token credentials are missing or insufficient.
|
||||
- Set required vars/secrets for coverage uploads:
|
||||
- `vars.ARTEFACT_BUCKET_NAME`
|
||||
- `vars.ARTEFACT_BUCKET_ENDPONT`
|
||||
@@ -83,41 +83,26 @@ Minimal template:
|
||||
|
||||
## Minimal Integration Patterns
|
||||
|
||||
### 1. Prepare Then Publish
|
||||
|
||||
```yaml
|
||||
jobs:
|
||||
prepare:
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
with:
|
||||
fetch-depth: 0
|
||||
- id: prepare
|
||||
uses: https://git.hrafn.xyz/aether/vociferate/prepare@v1.1.0
|
||||
|
||||
publish:
|
||||
needs: prepare
|
||||
uses: https://git.hrafn.xyz/aether/vociferate/.gitea/workflows/do-release.yml@v1.1.0
|
||||
with:
|
||||
tag: ${{ needs.prepare.outputs.version }}
|
||||
secrets: inherit
|
||||
```
|
||||
|
||||
### 2. Publish Existing Tag
|
||||
### 1. Full Release Workflow
|
||||
|
||||
```yaml
|
||||
jobs:
|
||||
release:
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
uses: https://git.hrafn.xyz/aether/vociferate/.gitea/workflows/release.yml@v1.1.0
|
||||
with:
|
||||
fetch-depth: 0
|
||||
- id: publish
|
||||
uses: https://git.hrafn.xyz/aether/vociferate/publish@v1.1.0
|
||||
version: ${{ inputs.version }}
|
||||
secrets: inherit
|
||||
```
|
||||
|
||||
### 2. Update Existing Release Tag
|
||||
|
||||
```yaml
|
||||
jobs:
|
||||
release:
|
||||
uses: https://git.hrafn.xyz/aether/vociferate/.gitea/workflows/update-release.yml@v1.1.0
|
||||
with:
|
||||
version: v1.2.3
|
||||
tag: v1.2.3
|
||||
secrets: inherit
|
||||
```
|
||||
|
||||
### 3. Coverage Badge Publication
|
||||
|
||||
@@ -13,12 +13,18 @@ A `### Breaking` section is used in addition to Keep a Changelog's standard sect
|
||||
|
||||
### Added
|
||||
|
||||
- Extracted `coverage-gate` action and tool from Cue for reuse across Æther projects.
|
||||
- Coverage gate now available as reusable composite action with JSON metrics output (`passes`, `total_coverage`, `packages_checked`, `packages_failed`).
|
||||
- Support for per-package coverage threshold policy via JSON configuration in `coverage-gate` tool.
|
||||
|
||||
### Changed
|
||||
|
||||
### Removed
|
||||
|
||||
### Fixed
|
||||
|
||||
- Hardened `coverage-gate` file input handling by validating and normalizing policy/profile paths before opening files, resolving `G304` findings in `coverage-gate/parse.go`.
|
||||
|
||||
## [1.1.0] - 2026-03-21
|
||||
|
||||
### Breaking
|
||||
@@ -43,6 +49,8 @@ A `### Breaking` section is used in addition to Keep a Changelog's standard sect
|
||||
- Composite actions now share a centralized `run-vociferate` orchestration flow, with binary-versus-source execution delegated through shared composite actions and single-use runtime/download logic folded back into `run-vociferate.binary`.
|
||||
- `run-vociferate` now contains both binary and source execution flows directly in a single action implementation, removing nested local action wrappers for better runner compatibility.
|
||||
- Release automation now requires `secrets.RELEASE_PAT` for prepare/publish/do-release operations instead of defaulting to `GITHUB_TOKEN`/`GITEA_TOKEN`.
|
||||
- Renamed the reusable Gitea workflows to `release.yml` and `update-release.yml`, and inlined release publication into the main `release` workflow for clearer per-step job output.
|
||||
- Release binary builds now compress published linux artifacts with UPX before checksum generation and upload.
|
||||
|
||||
### Removed
|
||||
|
||||
@@ -62,6 +70,7 @@ A `### Breaking` section is used in addition to Keep a Changelog's standard sect
|
||||
- Fixed nested local composite-action references to use repository-local `./run-vociferate` paths so strict runners do not misparse parent-directory (`../`) action references as malformed remote coordinates.
|
||||
- Consolidated `run-vociferate` binary and source execution flows directly into the main `run-vociferate` action to avoid nested local-action path resolution issues on strict runners.
|
||||
- Hardened workflow module hygiene by retrying `go mod verify` after a module-cache refresh (`go clean -modcache` + `go mod download`) when runners report modified cached dependency directories.
|
||||
- Synced `update-release.yml` with the active release pipeline fixes for Teacup-wrapped outputs, release-id normalization, upload endpoint validation, and accurate success or failure summaries.
|
||||
|
||||
## [1.0.2] - 2026-03-21
|
||||
|
||||
|
||||
@@ -154,8 +154,8 @@ if err != nil {
|
||||
**Workflows analyzed:**
|
||||
|
||||
- [push-validation.yml](.gitea/workflows/push-validation.yml)
|
||||
- [prepare-release.yml](.gitea/workflows/prepare-release.yml)
|
||||
- [do-release.yml](.gitea/workflows/do-release.yml)
|
||||
- [release.yml](.gitea/workflows/release.yml)
|
||||
- [update-release.yml](.gitea/workflows/update-release.yml)
|
||||
|
||||
#### What's Implemented
|
||||
|
||||
@@ -171,7 +171,7 @@ if err != nil {
|
||||
- ✅ Coverage badge publication
|
||||
- ✅ Release tag recommendation on `main` branch
|
||||
|
||||
**prepare-release.yml:**
|
||||
**release.yml:**
|
||||
|
||||
- ✅ Go setup and caching
|
||||
- ✅ Tests run before release preparation
|
||||
@@ -361,7 +361,7 @@ validate
|
||||
|
||||
**Effort Invested:**
|
||||
|
||||
- CI/CD improvements: workflow hardening in `push-validation.yml` and `prepare-release.yml`
|
||||
- CI/CD improvements: workflow hardening in `push-validation.yml` and `release.yml`
|
||||
- Code organization: injected service boundaries for filesystem, environment, and git access
|
||||
- Local automation: `justfile` validation parity for format, modules, tests, and security
|
||||
- **Primary commits:** 7cb7b05, 383aad4, 5c903c9
|
||||
|
||||
14
README.md
14
README.md
@@ -1,8 +1,8 @@
|
||||
# vociferate
|
||||
|
||||
[](https://git.hrafn.xyz/aether/vociferate/actions/runs/latest?workflow=push-validation.yml&branch=main&event=push)
|
||||
[](https://git.hrafn.xyz/aether/vociferate/actions/runs/latest?workflow=prepare-release.yml)
|
||||
[](https://git.hrafn.xyz/aether/vociferate/actions/runs/latest?workflow=do-release.yml)
|
||||
[](https://git.hrafn.xyz/aether/vociferate/actions/runs/latest?workflow=release.yml)
|
||||
[](https://git.hrafn.xyz/aether/vociferate/actions/runs/latest?workflow=update-release.yml)
|
||||
[](https://s3.hrafn.xyz/aether-workflow-report-artefacts/vociferate/branch/main/coverage.html)
|
||||
|
||||
`vociferate` is an `Æther` release orchestration tool written in Go for repositories that
|
||||
@@ -24,7 +24,7 @@ For agentic coding partners, see [`AGENTS.md`](AGENTS.md) for a direct integrati
|
||||
### `prepare` — update files, commit, and push tag
|
||||
|
||||
```yaml
|
||||
name: Prepare Release
|
||||
name: Release
|
||||
|
||||
on:
|
||||
workflow_dispatch:
|
||||
@@ -47,7 +47,7 @@ jobs:
|
||||
|
||||
publish:
|
||||
needs: prepare
|
||||
uses: https://git.hrafn.xyz/aether/vociferate/.gitea/workflows/do-release.yml@v1.1.0
|
||||
uses: https://git.hrafn.xyz/aether/vociferate/.gitea/workflows/update-release.yml@v1.1.0
|
||||
with:
|
||||
tag: ${{ needs.prepare.outputs.version }}
|
||||
secrets: inherit
|
||||
@@ -75,7 +75,7 @@ Pass `token: ${{ secrets.RELEASE_PAT }}` when invoking the action.
|
||||
### `publish` — create release with changelog notes
|
||||
|
||||
```yaml
|
||||
name: Do Release
|
||||
name: Update Release
|
||||
|
||||
on:
|
||||
workflow_dispatch:
|
||||
@@ -86,7 +86,7 @@ on:
|
||||
|
||||
jobs:
|
||||
release:
|
||||
uses: https://git.hrafn.xyz/aether/vociferate/.gitea/workflows/do-release.yml@v1.1.0
|
||||
uses: https://git.hrafn.xyz/aether/vociferate/.gitea/workflows/update-release.yml@v1.1.0
|
||||
with:
|
||||
tag: ${{ inputs.tag }}
|
||||
secrets: inherit
|
||||
@@ -96,7 +96,7 @@ Reads the matching section from `CHANGELOG.md` and creates or updates the
|
||||
Gitea/GitHub release with those notes. The `version` input is optional — when
|
||||
omitted it is derived from the current tag ref automatically.
|
||||
|
||||
The reusable `Do Release` workflow now runs preflight checks before publish to
|
||||
The reusable `Update Release` workflow now runs preflight checks before publish to
|
||||
fail fast when the release token is missing or lacks API access. Set
|
||||
`secrets.RELEASE_PAT` and use it for prepare/publish release operations.
|
||||
|
||||
|
||||
85
coverage-gate/README.md
Normal file
85
coverage-gate/README.md
Normal file
@@ -0,0 +1,85 @@
|
||||
# coveragegate
|
||||
|
||||
Standalone coverage-threshold enforcement tool for this repository.
|
||||
|
||||
This tool is a quality gate. It is not part of Cue runtime orchestration.
|
||||
|
||||
## What it does
|
||||
|
||||
- Reads a Go coverage profile (for example `_build/coverage.out`).
|
||||
- Loads package coverage policy from JSON.
|
||||
- Discovers packages under a source root using `go list ./...`.
|
||||
- Evaluates per-package statement coverage against policy thresholds.
|
||||
- Prints a package table and returns a non-zero exit code when any package fails.
|
||||
|
||||
## Repository integration
|
||||
|
||||
Primary repository flow:
|
||||
|
||||
1. `just test-coverage` runs tests in `src/` and writes `_build/coverage.out`.
|
||||
2. `scripts/check-core-coverage.sh` runs this tool from `tools/coveragegate/`.
|
||||
3. The script currently passes:
|
||||
- `--profile $ROOT_DIR/_build/coverage.out`
|
||||
- `--policy $ROOT_DIR/docs/coverage-thresholds.json`
|
||||
- `--src-root $ROOT_DIR/src`
|
||||
|
||||
## Usage
|
||||
|
||||
From repository root:
|
||||
|
||||
```bash
|
||||
cd tools/coveragegate
|
||||
go run . \
|
||||
--profile ../../_build/coverage.out \
|
||||
--policy ../../docs/coverage-thresholds.json \
|
||||
--src-root ../../src
|
||||
```
|
||||
|
||||
Or use the repository wrapper:
|
||||
|
||||
```bash
|
||||
bash scripts/check-core-coverage.sh
|
||||
```
|
||||
|
||||
## Flags
|
||||
|
||||
- `--profile`: Path to Go coverage profile.
|
||||
- `--policy`: Path to JSON policy file.
|
||||
- `--src-root`: Directory where packages are discovered with `go list ./...`.
|
||||
|
||||
## Exit codes
|
||||
|
||||
- `0`: All in-scope packages meet threshold.
|
||||
- `1`: Policy/profile/load failure or one or more packages below threshold.
|
||||
- `2`: Invalid CLI arguments.
|
||||
|
||||
## Policy model (current)
|
||||
|
||||
The tool expects a JSON object with at least:
|
||||
|
||||
- `minimum_statement_coverage` (number)
|
||||
- `critical_packages` (array)
|
||||
|
||||
Each critical package may include:
|
||||
|
||||
- `package` (string)
|
||||
- `minimum_statement_coverage` (number)
|
||||
- `include` (boolean)
|
||||
- `exclusions` (array of strings)
|
||||
|
||||
Behavior notes:
|
||||
|
||||
- If a package has no policy override, the global minimum is used.
|
||||
- Generated/composition files are excluded by built-in rules.
|
||||
- Packages with no statements are treated as passing.
|
||||
|
||||
## Development
|
||||
|
||||
Run tests:
|
||||
|
||||
```bash
|
||||
cd tools/coveragegate
|
||||
go test ./...
|
||||
```
|
||||
|
||||
Keep code `gofmt` and `go vet` clean.
|
||||
91
coverage-gate/action.yml
Normal file
91
coverage-gate/action.yml
Normal file
@@ -0,0 +1,91 @@
|
||||
name: vociferate/coverage-gate
|
||||
description: >
|
||||
Enforce per-package code coverage thresholds against Go coverage profiles.
|
||||
Supports JSON policy files with per-package overrides and global minimums.
|
||||
|
||||
inputs:
|
||||
profile:
|
||||
description: Path to Go coverage profile file (output from `go test -coverprofile=...`).
|
||||
required: false
|
||||
default: coverage.out
|
||||
policy:
|
||||
description: Path to JSON file defining coverage thresholds and per-package overrides.
|
||||
required: false
|
||||
default: docs/coverage-thresholds.json
|
||||
src-root:
|
||||
description: Source root directory for package discovery (passed to `go list ./...`).
|
||||
required: false
|
||||
default: .
|
||||
summary-file:
|
||||
description: Optional file path to append markdown summary of coverage results.
|
||||
required: false
|
||||
default: ''
|
||||
|
||||
outputs:
|
||||
passed:
|
||||
description: 'Boolean: true if all packages meet threshold, false if any failed.'
|
||||
value: ${{ steps.gate.outputs.passed }}
|
||||
total-coverage:
|
||||
description: Repository-wide statement coverage percentage.
|
||||
value: ${{ steps.gate.outputs.total_coverage }}
|
||||
packages-checked:
|
||||
description: Number of packages evaluated against policy.
|
||||
value: ${{ steps.gate.outputs.packages_checked }}
|
||||
packages-failed:
|
||||
description: Number of packages below threshold.
|
||||
value: ${{ steps.gate.outputs.packages_failed }}
|
||||
|
||||
runs:
|
||||
using: composite
|
||||
steps:
|
||||
- id: gate
|
||||
shell: bash
|
||||
working-directory: ${{ github.action_path }}
|
||||
env:
|
||||
PROFILE: ${{ inputs.profile }}
|
||||
POLICY: ${{ inputs.policy }}
|
||||
SRC_ROOT: ${{ inputs.src-root }}
|
||||
SUMMARY_FILE: ${{ inputs.summary-file }}
|
||||
run: |
|
||||
set -euo pipefail
|
||||
|
||||
# Run coverage gate and capture output
|
||||
EXIT_CODE=0
|
||||
OUTPUT=$(go run . \
|
||||
--profile "$PROFILE" \
|
||||
--policy "$POLICY" \
|
||||
--src-root "$SRC_ROOT" \
|
||||
) || EXIT_CODE=$?
|
||||
|
||||
echo "$OUTPUT"
|
||||
|
||||
# Parse summary from output (tool prints JSON stats on last line)
|
||||
SUMMARY_LINE=$(echo "$OUTPUT" | tail -1)
|
||||
|
||||
# Determine pass/fail
|
||||
if [[ $EXIT_CODE -eq 0 ]]; then
|
||||
echo "passed=true" >> "$GITHUB_OUTPUT"
|
||||
else
|
||||
echo "passed=false" >> "$GITHUB_OUTPUT"
|
||||
fi
|
||||
|
||||
# Extract metrics (tool outputs: packages_checked, packages_failed, total_coverage on summary line)
|
||||
if echo "$SUMMARY_LINE" | jq . &>/dev/null; then
|
||||
echo "total_coverage=$(echo "$SUMMARY_LINE" | jq -r '.total_coverage')" >> "$GITHUB_OUTPUT"
|
||||
echo "packages_checked=$(echo "$SUMMARY_LINE" | jq -r '.packages_checked')" >> "$GITHUB_OUTPUT"
|
||||
echo "packages_failed=$(echo "$SUMMARY_LINE" | jq -r '.packages_failed')" >> "$GITHUB_OUTPUT"
|
||||
|
||||
# Append to summary file if provided
|
||||
if [[ -n "$SUMMARY_FILE" ]]; then
|
||||
{
|
||||
echo "## Coverage Gate Results"
|
||||
echo
|
||||
echo "- **Passed:** $([ "$EXIT_CODE" -eq 0 ] && echo '✓ Yes' || echo '✗ No')"
|
||||
echo "- **Total Coverage:** $(echo "$SUMMARY_LINE" | jq -r '.total_coverage')%"
|
||||
echo "- **Packages Checked:** $(echo "$SUMMARY_LINE" | jq -r '.packages_checked')"
|
||||
echo "- **Packages Failed:** $(echo "$SUMMARY_LINE" | jq -r '.packages_failed')"
|
||||
} >> "$SUMMARY_FILE"
|
||||
fi
|
||||
fi
|
||||
|
||||
exit $EXIT_CODE
|
||||
3
coverage-gate/go.mod
Normal file
3
coverage-gate/go.mod
Normal file
@@ -0,0 +1,3 @@
|
||||
module git.hrafn.xyz/aether/vociferate/coverage-gate
|
||||
|
||||
go 1.26.1
|
||||
26
coverage-gate/integration_test.go
Normal file
26
coverage-gate/integration_test.go
Normal file
@@ -0,0 +1,26 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"os"
|
||||
"path/filepath"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestRun_ExitCodeOnInvalidProfile(t *testing.T) {
|
||||
t.Parallel()
|
||||
tmp := t.TempDir()
|
||||
policyPath := filepath.Join(tmp, "policy.json")
|
||||
if err := os.WriteFile(policyPath, []byte(`{"minimum_statement_coverage":80,"critical_packages":[]}`), 0600); err != nil {
|
||||
t.Fatalf("write policy: %v", err)
|
||||
}
|
||||
|
||||
exit := run(
|
||||
[]string{"--profile", filepath.Join(tmp, "missing.out"), "--policy", policyPath, "--src-root", "."},
|
||||
os.Stdout,
|
||||
os.Stderr,
|
||||
func(_ string) ([]string, error) { return []string{"git.hrafn.xyz/aether/cue/service/llm"}, nil },
|
||||
)
|
||||
if exit != 1 {
|
||||
t.Fatalf("expected exit 1 for missing profile, got %d", exit)
|
||||
}
|
||||
}
|
||||
118
coverage-gate/main.go
Normal file
118
coverage-gate/main.go
Normal file
@@ -0,0 +1,118 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"flag"
|
||||
"fmt"
|
||||
"io"
|
||||
"os"
|
||||
"os/exec"
|
||||
"sort"
|
||||
"strings"
|
||||
)
|
||||
|
||||
type discoverPackagesFunc func(srcRoot string) ([]string, error)
|
||||
|
||||
func main() {
|
||||
os.Exit(run(os.Args[1:], os.Stdout, os.Stderr, discoverPackages))
|
||||
}
|
||||
|
||||
func run(args []string, stdout io.Writer, stderr io.Writer, discover discoverPackagesFunc) int {
|
||||
fs := flag.NewFlagSet("coveragegate", flag.ContinueOnError)
|
||||
fs.SetOutput(stderr)
|
||||
|
||||
profilePath := fs.String("profile", "../_build/coverage.out", "path to go coverprofile")
|
||||
policyPath := fs.String("policy", "../specs/003-testing-time/contracts/coverage-thresholds.json", "path to coverage policy json")
|
||||
srcRoot := fs.String("src-root", ".", "path to src workspace root")
|
||||
|
||||
if err := fs.Parse(args); err != nil {
|
||||
return 2
|
||||
}
|
||||
|
||||
policy, err := LoadPolicy(*policyPath)
|
||||
if err != nil {
|
||||
fmt.Fprintf(stderr, "coverage gate: %v\n", err)
|
||||
return 1
|
||||
}
|
||||
|
||||
aggByPkg, err := ParseCoverProfile(*profilePath, policy)
|
||||
if err != nil {
|
||||
fmt.Fprintf(stderr, "coverage gate: %v\n", err)
|
||||
return 1
|
||||
}
|
||||
|
||||
pkgs, err := discover(*srcRoot)
|
||||
if err != nil {
|
||||
fmt.Fprintf(stderr, "coverage gate: %v\n", err)
|
||||
return 1
|
||||
}
|
||||
|
||||
results := EvaluateCoverage(pkgs, aggByPkg, policy)
|
||||
if len(results) == 0 {
|
||||
fmt.Fprintln(stderr, "coverage gate: no in-scope packages found")
|
||||
return 1
|
||||
}
|
||||
|
||||
fmt.Fprintln(stdout, "Package coverage results:")
|
||||
fmt.Fprintln(stdout, "PACKAGE\tCOVERAGE\tTHRESHOLD\tSTATUS")
|
||||
|
||||
failed := false
|
||||
totalCoverage := 0.0
|
||||
for _, r := range results {
|
||||
status := "PASS"
|
||||
if !r.Pass {
|
||||
status = "FAIL"
|
||||
failed = true
|
||||
}
|
||||
fmt.Fprintf(stdout, "%s\t%.2f%%\t%.2f%%\t%s\n", r.Package, r.Percent, r.Threshold, status)
|
||||
totalCoverage += r.Percent
|
||||
}
|
||||
if len(results) > 0 {
|
||||
totalCoverage /= float64(len(results))
|
||||
}
|
||||
|
||||
packagesFailed := 0
|
||||
for _, r := range results {
|
||||
if !r.Pass {
|
||||
packagesFailed++
|
||||
}
|
||||
}
|
||||
|
||||
// Output JSON metrics for CI consumption
|
||||
metrics := map[string]interface{}{
|
||||
"passed": !failed,
|
||||
"total_coverage": fmt.Sprintf("%.2f", totalCoverage),
|
||||
"packages_checked": len(results),
|
||||
"packages_failed": packagesFailed,
|
||||
}
|
||||
metricsJSON, _ := json.Marshal(metrics)
|
||||
fmt.Fprintln(stdout, string(metricsJSON))
|
||||
|
||||
if failed {
|
||||
fmt.Fprintln(stderr, "coverage gate: one or more packages are below threshold")
|
||||
return 1
|
||||
}
|
||||
fmt.Fprintln(stdout, "coverage gate: all in-scope packages meet threshold")
|
||||
return 0
|
||||
}
|
||||
|
||||
func discoverPackages(srcRoot string) ([]string, error) {
|
||||
cmd := exec.Command("go", "list", "./...")
|
||||
cmd.Dir = srcRoot
|
||||
out, err := cmd.Output()
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("discover packages with go list: %w", err)
|
||||
}
|
||||
|
||||
lines := strings.Split(strings.TrimSpace(string(out)), "\n")
|
||||
pkgs := make([]string, 0, len(lines))
|
||||
for _, line := range lines {
|
||||
line = strings.TrimSpace(line)
|
||||
if line == "" {
|
||||
continue
|
||||
}
|
||||
pkgs = append(pkgs, line)
|
||||
}
|
||||
sort.Strings(pkgs)
|
||||
return pkgs, nil
|
||||
}
|
||||
85
coverage-gate/main_test.go
Normal file
85
coverage-gate/main_test.go
Normal file
@@ -0,0 +1,85 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strings"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestRun_FailsWhenBelowThreshold(t *testing.T) {
|
||||
t.Parallel()
|
||||
tmp := t.TempDir()
|
||||
policyPath := filepath.Join(tmp, "policy.json")
|
||||
profilePath := filepath.Join(tmp, "coverage.out")
|
||||
|
||||
policy := `{
|
||||
"minimum_statement_coverage": 80,
|
||||
"critical_packages": []
|
||||
}`
|
||||
if err := os.WriteFile(policyPath, []byte(policy), 0600); err != nil {
|
||||
t.Fatalf("write policy: %v", err)
|
||||
}
|
||||
|
||||
profile := "mode: set\n" +
|
||||
"git.hrafn.xyz/aether/cue/service/llm/validator.go:1.1,2.1 10 0\n"
|
||||
if err := os.WriteFile(profilePath, []byte(profile), 0600); err != nil {
|
||||
t.Fatalf("write profile: %v", err)
|
||||
}
|
||||
|
||||
var out bytes.Buffer
|
||||
var errOut bytes.Buffer
|
||||
exit := run(
|
||||
[]string{"--profile", profilePath, "--policy", policyPath, "--src-root", "."},
|
||||
&out,
|
||||
&errOut,
|
||||
func(_ string) ([]string, error) {
|
||||
return []string{"git.hrafn.xyz/aether/cue/service/llm"}, nil
|
||||
},
|
||||
)
|
||||
if exit != 1 {
|
||||
t.Fatalf("expected exit 1, got %d\nstdout: %s\nstderr: %s", exit, out.String(), errOut.String())
|
||||
}
|
||||
if !strings.Contains(errOut.String(), "below threshold") {
|
||||
t.Fatalf("expected threshold error, got: %s", errOut.String())
|
||||
}
|
||||
}
|
||||
|
||||
func TestRun_PassesWhenAllMeetThreshold(t *testing.T) {
|
||||
t.Parallel()
|
||||
tmp := t.TempDir()
|
||||
policyPath := filepath.Join(tmp, "policy.json")
|
||||
profilePath := filepath.Join(tmp, "coverage.out")
|
||||
|
||||
policy := `{
|
||||
"minimum_statement_coverage": 80,
|
||||
"critical_packages": []
|
||||
}`
|
||||
if err := os.WriteFile(policyPath, []byte(policy), 0600); err != nil {
|
||||
t.Fatalf("write policy: %v", err)
|
||||
}
|
||||
|
||||
profile := "mode: set\n" +
|
||||
"git.hrafn.xyz/aether/cue/service/llm/validator.go:1.1,2.1 10 1\n"
|
||||
if err := os.WriteFile(profilePath, []byte(profile), 0600); err != nil {
|
||||
t.Fatalf("write profile: %v", err)
|
||||
}
|
||||
|
||||
var out bytes.Buffer
|
||||
var errOut bytes.Buffer
|
||||
exit := run(
|
||||
[]string{"--profile", profilePath, "--policy", policyPath, "--src-root", "."},
|
||||
&out,
|
||||
&errOut,
|
||||
func(_ string) ([]string, error) {
|
||||
return []string{"git.hrafn.xyz/aether/cue/service/llm"}, nil
|
||||
},
|
||||
)
|
||||
if exit != 0 {
|
||||
t.Fatalf("expected exit 0, got %d\nstdout: %s\nstderr: %s", exit, out.String(), errOut.String())
|
||||
}
|
||||
if !strings.Contains(out.String(), "all in-scope packages meet threshold") {
|
||||
t.Fatalf("expected success summary, got: %s", out.String())
|
||||
}
|
||||
}
|
||||
235
coverage-gate/parse.go
Normal file
235
coverage-gate/parse.go
Normal file
@@ -0,0 +1,235 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"sort"
|
||||
"strconv"
|
||||
"strings"
|
||||
)
|
||||
|
||||
// Policy describes coverage threshold configuration.
|
||||
type Policy struct {
|
||||
MinimumStatementCoverage float64 `json:"minimum_statement_coverage"`
|
||||
CriticalPackages []PackagePolicy `json:"critical_packages"`
|
||||
}
|
||||
|
||||
// PackagePolicy overrides defaults for a specific package.
|
||||
type PackagePolicy struct {
|
||||
Package string `json:"package"`
|
||||
MinimumStatementCoverage float64 `json:"minimum_statement_coverage"`
|
||||
Include bool `json:"include"`
|
||||
Exclusions []string `json:"exclusions"`
|
||||
}
|
||||
|
||||
// Coverage aggregates covered and total statements for a package.
|
||||
type Coverage struct {
|
||||
Covered int64
|
||||
Total int64
|
||||
}
|
||||
|
||||
// PackageResult is the policy-evaluated coverage result for one package.
|
||||
type PackageResult struct {
|
||||
Package string
|
||||
Covered int64
|
||||
Total int64
|
||||
Percent float64
|
||||
Threshold float64
|
||||
Pass bool
|
||||
}
|
||||
|
||||
// LoadPolicy reads policy JSON from disk.
|
||||
func LoadPolicy(path string) (Policy, error) {
|
||||
f, err := openValidatedReadOnlyFile(path, ".json", "policy")
|
||||
if err != nil {
|
||||
return Policy{}, err
|
||||
}
|
||||
defer f.Close()
|
||||
|
||||
var p Policy
|
||||
if err := json.NewDecoder(f).Decode(&p); err != nil {
|
||||
return Policy{}, fmt.Errorf("decode policy: %w", err)
|
||||
}
|
||||
if p.MinimumStatementCoverage <= 0 {
|
||||
p.MinimumStatementCoverage = 80.0
|
||||
}
|
||||
return p, nil
|
||||
}
|
||||
|
||||
// ParseCoverProfile parses a Go coverprofile and aggregates package coverage.
|
||||
func ParseCoverProfile(profilePath string, policy Policy) (map[string]Coverage, error) {
|
||||
f, err := openValidatedReadOnlyFile(profilePath, "", "coverage profile")
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
defer f.Close()
|
||||
|
||||
coverage := make(map[string]Coverage)
|
||||
s := bufio.NewScanner(f)
|
||||
lineNo := 0
|
||||
for s.Scan() {
|
||||
lineNo++
|
||||
line := strings.TrimSpace(s.Text())
|
||||
if lineNo == 1 {
|
||||
if !strings.HasPrefix(line, "mode:") {
|
||||
return nil, fmt.Errorf("invalid coverage profile header")
|
||||
}
|
||||
continue
|
||||
}
|
||||
if line == "" {
|
||||
continue
|
||||
}
|
||||
|
||||
parts := strings.Fields(line)
|
||||
if len(parts) != 3 {
|
||||
return nil, fmt.Errorf("invalid coverage line %d", lineNo)
|
||||
}
|
||||
fileAndRange := parts[0]
|
||||
numStmts, err := strconv.ParseInt(parts[1], 10, 64)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("invalid statements count at line %d: %w", lineNo, err)
|
||||
}
|
||||
execCount, err := strconv.ParseInt(parts[2], 10, 64)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("invalid execution count at line %d: %w", lineNo, err)
|
||||
}
|
||||
|
||||
idx := strings.Index(fileAndRange, ":")
|
||||
if idx < 0 {
|
||||
return nil, fmt.Errorf("invalid file segment at line %d", lineNo)
|
||||
}
|
||||
filePath := fileAndRange[:idx]
|
||||
pkg := filepath.ToSlash(filepath.Dir(filePath))
|
||||
if isExcludedFile(pkg, filePath, policy) {
|
||||
continue
|
||||
}
|
||||
|
||||
agg := coverage[pkg]
|
||||
agg.Total += numStmts
|
||||
if execCount > 0 {
|
||||
agg.Covered += numStmts
|
||||
}
|
||||
coverage[pkg] = agg
|
||||
}
|
||||
if err := s.Err(); err != nil {
|
||||
return nil, fmt.Errorf("scan coverage profile: %w", err)
|
||||
}
|
||||
|
||||
return coverage, nil
|
||||
}
|
||||
|
||||
func openValidatedReadOnlyFile(path string, requiredExt string, label string) (*os.File, error) {
|
||||
cleaned := filepath.Clean(strings.TrimSpace(path))
|
||||
if cleaned == "" || cleaned == "." {
|
||||
return nil, fmt.Errorf("invalid %s path", label)
|
||||
}
|
||||
|
||||
if requiredExt != "" {
|
||||
ext := strings.ToLower(filepath.Ext(cleaned))
|
||||
if ext != strings.ToLower(requiredExt) {
|
||||
return nil, fmt.Errorf("invalid %s file extension: got %q, want %q", label, ext, requiredExt)
|
||||
}
|
||||
}
|
||||
|
||||
absPath, err := filepath.Abs(cleaned)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("resolve %s path: %w", label, err)
|
||||
}
|
||||
|
||||
info, err := os.Stat(absPath)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("stat %s: %w", label, err)
|
||||
}
|
||||
if info.IsDir() {
|
||||
return nil, fmt.Errorf("%s path must be a file, got directory", label)
|
||||
}
|
||||
|
||||
// #nosec G304 -- path is explicitly cleaned, normalized, and pre-validated as an existing file.
|
||||
f, err := os.Open(absPath)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("open %s: %w", label, err)
|
||||
}
|
||||
|
||||
return f, nil
|
||||
}
|
||||
|
||||
// EvaluateCoverage evaluates package coverage against policy thresholds.
|
||||
func EvaluateCoverage(packages []string, byPackage map[string]Coverage, policy Policy) []PackageResult {
|
||||
results := make([]PackageResult, 0, len(packages))
|
||||
for _, pkg := range packages {
|
||||
if !isPackageIncluded(pkg, policy) {
|
||||
continue
|
||||
}
|
||||
agg := byPackage[pkg]
|
||||
percent := 100.0
|
||||
if agg.Total > 0 {
|
||||
percent = float64(agg.Covered) * 100.0 / float64(agg.Total)
|
||||
}
|
||||
threshold := thresholdForPackage(pkg, policy)
|
||||
pass := agg.Total == 0 || percent >= threshold
|
||||
results = append(results, PackageResult{
|
||||
Package: pkg,
|
||||
Covered: agg.Covered,
|
||||
Total: agg.Total,
|
||||
Percent: percent,
|
||||
Threshold: threshold,
|
||||
Pass: pass,
|
||||
})
|
||||
}
|
||||
sort.Slice(results, func(i, j int) bool {
|
||||
return results[i].Package < results[j].Package
|
||||
})
|
||||
return results
|
||||
}
|
||||
|
||||
func thresholdForPackage(pkg string, policy Policy) float64 {
|
||||
for _, entry := range policy.CriticalPackages {
|
||||
if entry.Package == pkg && entry.MinimumStatementCoverage > 0 {
|
||||
return entry.MinimumStatementCoverage
|
||||
}
|
||||
}
|
||||
if policy.MinimumStatementCoverage > 0 {
|
||||
return policy.MinimumStatementCoverage
|
||||
}
|
||||
return 80.0
|
||||
}
|
||||
|
||||
func isPackageIncluded(pkg string, policy Policy) bool {
|
||||
for _, entry := range policy.CriticalPackages {
|
||||
if entry.Package == pkg {
|
||||
return entry.Include
|
||||
}
|
||||
}
|
||||
return true
|
||||
}
|
||||
|
||||
func isExcludedFile(pkg string, filePath string, policy Policy) bool {
|
||||
base := filepath.Base(filePath)
|
||||
|
||||
// Exclude known generated artifacts and thin composition wiring.
|
||||
if strings.HasSuffix(base, "_gen.go") ||
|
||||
base == "generated.go" ||
|
||||
base == "models_gen.go" ||
|
||||
base == "schema.resolvers.go" ||
|
||||
base == "main.go" {
|
||||
return true
|
||||
}
|
||||
|
||||
for _, entry := range policy.CriticalPackages {
|
||||
if entry.Package != pkg {
|
||||
continue
|
||||
}
|
||||
for _, ex := range entry.Exclusions {
|
||||
if ex == "" {
|
||||
continue
|
||||
}
|
||||
if strings.HasSuffix(filePath, ex) || strings.Contains(filePath, "/"+ex) {
|
||||
return true
|
||||
}
|
||||
}
|
||||
}
|
||||
return false
|
||||
}
|
||||
119
coverage-gate/parse_test.go
Normal file
119
coverage-gate/parse_test.go
Normal file
@@ -0,0 +1,119 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strings"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestParseCoverProfile_AppliesExclusions(t *testing.T) {
|
||||
t.Parallel()
|
||||
tmp := t.TempDir()
|
||||
profile := filepath.Join(tmp, "coverage.out")
|
||||
content := "mode: set\n" +
|
||||
"git.hrafn.xyz/aether/cue/api/graph/generated.go:1.1,2.1 2 1\n" +
|
||||
"git.hrafn.xyz/aether/cue/api/graph/resolver.go:1.1,2.1 2 1\n" +
|
||||
"git.hrafn.xyz/aether/cue/service/llm/validator.go:1.1,2.1 2 0\n"
|
||||
if err := os.WriteFile(profile, []byte(content), 0600); err != nil {
|
||||
t.Fatalf("write profile: %v", err)
|
||||
}
|
||||
|
||||
policy := Policy{
|
||||
MinimumStatementCoverage: 80,
|
||||
CriticalPackages: []PackagePolicy{
|
||||
{Package: "git.hrafn.xyz/aether/cue/api/graph", Include: true, Exclusions: []string{"generated.go"}},
|
||||
},
|
||||
}
|
||||
|
||||
got, err := ParseCoverProfile(profile, policy)
|
||||
if err != nil {
|
||||
t.Fatalf("ParseCoverProfile() error = %v", err)
|
||||
}
|
||||
|
||||
api := got["git.hrafn.xyz/aether/cue/api/graph"]
|
||||
if api.Total != 2 || api.Covered != 2 {
|
||||
t.Fatalf("api coverage mismatch: got %+v", api)
|
||||
}
|
||||
llm := got["git.hrafn.xyz/aether/cue/service/llm"]
|
||||
if llm.Total != 2 || llm.Covered != 0 {
|
||||
t.Fatalf("llm coverage mismatch: got %+v", llm)
|
||||
}
|
||||
}
|
||||
|
||||
func TestEvaluateCoverage_UsesPolicyThresholds(t *testing.T) {
|
||||
t.Parallel()
|
||||
pkgs := []string{
|
||||
"git.hrafn.xyz/aether/cue/service/llm",
|
||||
"git.hrafn.xyz/aether/cue/service/orchestrator",
|
||||
}
|
||||
byPkg := map[string]Coverage{
|
||||
"git.hrafn.xyz/aether/cue/service/llm": {Covered: 8, Total: 10},
|
||||
"git.hrafn.xyz/aether/cue/service/orchestrator": {Covered: 3, Total: 10},
|
||||
}
|
||||
policy := Policy{
|
||||
MinimumStatementCoverage: 80,
|
||||
CriticalPackages: []PackagePolicy{
|
||||
{Package: "git.hrafn.xyz/aether/cue/service/orchestrator", MinimumStatementCoverage: 30, Include: true},
|
||||
},
|
||||
}
|
||||
|
||||
results := EvaluateCoverage(pkgs, byPkg, policy)
|
||||
if len(results) != 2 {
|
||||
t.Fatalf("expected 2 results, got %d", len(results))
|
||||
}
|
||||
if !results[0].Pass {
|
||||
t.Fatalf("expected llm to pass at default threshold: %+v", results[0])
|
||||
}
|
||||
if !results[1].Pass {
|
||||
t.Fatalf("expected orchestrator to pass at overridden threshold: %+v", results[1])
|
||||
}
|
||||
}
|
||||
|
||||
func TestEvaluateCoverage_NoStatementsPasses(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
pkg := "git.hrafn.xyz/aether/cue/repository/vector"
|
||||
results := EvaluateCoverage(
|
||||
[]string{pkg},
|
||||
map[string]Coverage{pkg: {Covered: 0, Total: 0}},
|
||||
Policy{MinimumStatementCoverage: 80},
|
||||
)
|
||||
|
||||
if len(results) != 1 {
|
||||
t.Fatalf("expected 1 result, got %d", len(results))
|
||||
}
|
||||
if !results[0].Pass {
|
||||
t.Fatalf("expected pass for no-statement package, got %+v", results[0])
|
||||
}
|
||||
}
|
||||
|
||||
func TestLoadPolicy_RejectsNonJSONPath(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
tmp := t.TempDir()
|
||||
policyPath := filepath.Join(tmp, "policy.yaml")
|
||||
if err := os.WriteFile(policyPath, []byte("minimum_statement_coverage: 80\n"), 0600); err != nil {
|
||||
t.Fatalf("write policy file: %v", err)
|
||||
}
|
||||
|
||||
_, err := LoadPolicy(policyPath)
|
||||
if err == nil {
|
||||
t.Fatal("expected LoadPolicy to fail for non-json extension")
|
||||
}
|
||||
if !strings.Contains(err.Error(), "invalid policy file extension") {
|
||||
t.Fatalf("expected extension error, got: %v", err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestParseCoverProfile_RejectsDirectoryPath(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
_, err := ParseCoverProfile(t.TempDir(), Policy{MinimumStatementCoverage: 80})
|
||||
if err == nil {
|
||||
t.Fatal("expected ParseCoverProfile to fail for directory path")
|
||||
}
|
||||
if !strings.Contains(err.Error(), "coverage profile path must be a file") {
|
||||
t.Fatalf("expected directory path error, got: %v", err)
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user