Skip to content

Comments

test: add tier-11 scenarios and CI validation#51

Merged
davidahmann merged 1 commit intomainfrom
codex/adhoc-interop-plan
Feb 18, 2026
Merged

test: add tier-11 scenarios and CI validation#51
davidahmann merged 1 commit intomainfrom
codex/adhoc-interop-plan

Conversation

@davidahmann
Copy link
Collaborator

Problem

The repo lacked a deterministic scenario-fixture lane that validates higher-risk Gate and artifact behaviors in a reusable, CI-enforced way.

Changes

  • add internal/scenarios scenario execution + fixture validation tests
  • add Tier 1.1 scenario fixtures under scenarios/gait/*
  • add helper scripts: scripts/run_scenarios.sh and scripts/validate_scenarios.sh
  • wire scenario checks into CI and fast-PR workflows
  • update Makefile, go.mod, go.sum, and CODEOWNERS for scenario coverage and ownership

Validation

  • gait doctor --json (pass)
  • make prepush-full (pass, includes lint/vet/gosec/govulncheck/tests/coverage/codeql)
  • pre-push hook make prepush during git push (pass)

@davidahmann davidahmann merged commit de12b60 into main Feb 18, 2026
5 checks passed
@davidahmann davidahmann deleted the codex/adhoc-interop-plan branch February 18, 2026 19:31
Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 1e90375ed9

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

if errors.As(err, &exitErr) {
return strings.TrimSpace(string(output)), exitErr.ExitCode()
}
t.Fatalf("run command %v: %v output=%s", args, err, string(output))

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Stop invoking Fatalf-capable helper from worker goroutines

runConcurrentScenario calls runCommand inside spawned goroutines, and runCommand calls t.Fatalf on non-exit execution errors. In Go tests, Fatalf/FailNow must run on the main test goroutine; when a command cannot be started (for example, bad binary path/permissions or OS exec failure), this can trigger FailNow from a worker goroutine and produce unstable failures instead of a clean per-run error report. Return this path as an error through errCh rather than calling t.Fatalf from the helper used concurrently.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant