Skip to content

Fix/version workflow#519

Open
harshithad0703 wants to merge 28 commits intodevelopmentfrom
fix/version-workflow
Open

Fix/version workflow#519
harshithad0703 wants to merge 28 commits intodevelopmentfrom
fix/version-workflow

Conversation

@harshithad0703
Copy link
Contributor

No description provided.

AniketDev7 and others added 24 commits January 22, 2026 17:30
- Rewrite API tests for comprehensive SDK coverage (487 tests)
- Add 2FA/TOTP authentication test cases
- Add test utilities for request logging, assertions, and cleanup
- Implement stack cleanup using direct API calls
- Add complex mock schemas from exported CDA stack
- Add test:sanity-nocov script for Node.js v22 compatibility
- Fix test reliability with proper delays and error handling
- Remove obsolete test files and unused mock data
- Add sanity-check-backup/ to gitignore
- Add .vscode/ to gitignore
- Remove env.example.txt (credentials should be managed separately)
- Improve authentication handling for bulk job status API
- Add better error handling for branch creation
- Skip dependent tests gracefully if resource creation fails
- Increase wait time after branch creation for API propagation
- Asset, Release, and Workflow tests now fetch environment from testData
- Fallback to querying API if testData not available
- Prevents failures when environment names include timestamps
- Fix publish rules to use correct SDK method (workflow().publishRule())
- Make workflow, asset, and release tests self-contained by creating temp environments if needed
- Increase timeouts for global field and asset tests
- Preserve user-created management tokens in cleanup (only delete test-created ones)
- Improve webhook cleanup with sequential deletion and logging
- Use shorter environment names (max 10 chars)
Add comprehensive test coverage for asset_fields[] parameter in Entry API:
- Fetch with single/multiple asset_fields values
- Query with single/multiple asset_fields values
- Combined with other query params (locale, include_workflow, etc.)
- Edge case: empty asset_fields array
- All 4 supported values: user_defined_fields, embedded, ai_suggested, visual_markups

Note: Tests are disabled by default. Set DAM_2_0_ENABLED=true in .env to enable
once the AM 2.0 feature is available in the test environment.
- Dynamic stack/token setup; Expected vs Actual + cURL in Mochawesome reports
- ContentstackClient: use instrumented client by default, new client when authtoken passed
- Fix token validation assertions, audit log expected status, MEMBER_EMAIL usage
- Security: replace blt UIDs and testcs@contentstack.com with placeholders
- Update .talismanrc checksums for modified sanity test files
- Refactor passed-test context: compute Expected vs Actual once and add in single place
- Prevents missing block when cURL/API Request are present (e.g. organization teams)
- Use nullish coalescing for lastRequest fields to avoid undefined in output
- Add test-curls.txt to .gitignore
- Add trackedExpect import and key success-path assertions in:
  globalfield, branch, bulkOperation, entryVariants, terms,
  ungroupedVariants, variants, contentType, branchAlias,
  taxonomy, previewToken, team, webhook, variantGroup,
  token, environment, extension, label, role
- Mochawesome report now shows specific Expected vs Actual in
  Assertions Verified for easier debugging
- Update .talismanrc checksums for modified sanity files
Unit tests (test/unit/mock/objects.js) import singlepageCT from
../../sanity-check/mock/content-type. Add content-type.js so
test:unit:report:json runs and report.json is generated in CI.
- asset-test.js: fix trailing spaces, remove unused uploadedAssetUid,
  add no-unused-expressions disables for Chai expect() (lint check)
- Add test/sanity-check/mock/customUpload.html and upload.html so
  unit tests (asset-test, concurrency-Queue-test) find expected files
  and Build & Test passes (622 passes, 0 failures)
- branch-test: remove unused mock imports and createdBranch; fix trailing spaces, padded-blocks
- auditlog-test: remove unused testData; fix trailing spaces, padded-blocks, no-unused-expressions
- Remove unused shortId import
- Fix trailing spaces, padded-blocks (via eslint --fix)
- Add no-unused-expressions disables for Chai expect()
Chai expect() triggers no-unused-expressions in Standard. Override for
test/**/*.js so test files don't need eslint-disable on every expect().
- Remove unused testData import
- Fix trailing spaces, prefer-const (jobIds) via eslint --fix
- Update .talismanrc checksum for bulkOperation-test.js
- Add trackedExpect to sanity API tests for Mochawesome expected/actual reporting
- Fix no-unused-vars, no-undef across sanity-check API tests and helpers
- Remove unused imports and variables (contentType, entry, role, workflow, etc.)
- Fix no-return-await in role-test; add after/before to stack-test and team-test
- ESLint: no-useless-escape off for test/**; promise/param-names fix in testSetup
- Remove unused formatValueCompact and headersToCurl from testHelpers; sanity.js import cleanup
- Update .talismanrc checksums for modified sanity test files
- environment-test: use separate temp env for 'update name' test so shared
  development env is never renamed; bulk/entry/release/workflow keep using
  testData.environments.development
- bulkOperation-test: use testData.environments.development.name (envName)
  instead of hardcoded 'development' for all publish/unpublish payloads
- .talismanrc: update checksums for modified test files and merge artifacts
- No sensitive data: only process.env.API_KEY and env var references
…odified in production files, improving accuracy of versioning logic.
@harshithad0703 harshithad0703 requested a review from a team as a code owner March 11, 2026 12:35
@github-actions
Copy link

🔒 Security Scan Results

ℹ️ Note: Only vulnerabilities with available fixes (upgrades or patches) are counted toward thresholds.

Check Type Count (with fixes) Without fixes Threshold Result
🔴 Critical Severity 0 0 10 ✅ Passed
🟠 High Severity 0 0 25 ✅ Passed
🟡 Medium Severity 0 0 500 ✅ Passed
🔵 Low Severity 0 0 1000 ✅ Passed

⏱️ SLA Breach Summary

✅ No SLA breaches detected. All vulnerabilities are within acceptable time thresholds.

Severity Breaches (with fixes) Breaches (no fixes) SLA Threshold (with/no fixes) Status
🔴 Critical 0 0 15 / 30 days ✅ Passed
🟠 High 0 0 30 / 120 days ✅ Passed
🟡 Medium 0 0 90 / 365 days ✅ Passed
🔵 Low 0 0 180 / 365 days ✅ Passed

✅ BUILD PASSED - All security checks passed

…hange detection, ensuring only relevant production changes trigger version checks.
@github-actions
Copy link

github-actions bot commented Mar 11, 2026

Coverage report for commit: 982de2d
File: coverage/clover.xml

Cover ┌─────────────────────────┐ Freq.
   0% │ ░░░░░░░░░░░░░░░░░░░░░░░ │  0.0%
  10% │ ░░░░░░░░░░░░░░░░░░░░░░░ │  0.0%
  20% │ ██░░░░░░░░░░░░░░░░░░░░░ │  2.2%
  30% │ ░░░░░░░░░░░░░░░░░░░░░░░ │  0.0%
  40% │ ░░░░░░░░░░░░░░░░░░░░░░░ │  0.0%
  50% │ ░░░░░░░░░░░░░░░░░░░░░░░ │  0.0%
  60% │ ░░░░░░░░░░░░░░░░░░░░░░░ │  0.0%
  70% │ ██████░░░░░░░░░░░░░░░░░ │  8.7%
  80% │ ███████████████████████ │ 39.1%
  90% │ █████████████░░░░░░░░░░ │ 21.7%
 100% │ █████████████████░░░░░░ │ 28.3%
      └─────────────────────────┘
 *Legend:* █ = Current Distribution 
Summary - Lines: 82.41% | Methods: 95.88% | Branches: 65.60%
FilesLinesMethodsBranches
lib
   contentstack.js100.00%100.00%100.00%
   contentstackClient.js83.02%92.86%69.49%
   contentstackCollection.js94.12%100.00%86.96%
   entity.js76.22%100.00%61.34%
lib/core
   Util.js77.68%94.44%61.65%
   concurrency-queue.js71.84%72.22%62.02%
   contentstackError.js100.00%100.00%100.00%
   contentstackHTTPClient.js85.71%92.31%80.00%
   errorMessages.js100.00%100.00%71.43%
   oauthHandler.js90.85%100.00%67.14%
   pkceStorage.js100.00%100.00%94.12%
lib/organization
   index.js72.73%100.00%48.68%
lib/organization/teams
   index.js89.47%100.00%61.11%
lib/organization/teams/stackRoleMappings
   index.js78.57%100.00%47.50%
lib/organization/teams/teamUsers
   index.js100.00%100.00%87.50%
lib/query
   index.js73.91%100.00%56.25%
lib/stack/asset/folders
   index.js100.00%100.00%94.44%
lib/stack/asset
   index.js86.42%100.00%72.34%
lib/stack/auditlog
   index.js91.67%100.00%69.70%
lib/stack/branch
   compare.js68.18%100.00%56.67%
   index.js94.87%100.00%77.78%
   mergeQueue.js83.33%100.00%57.89%
lib/stack/branchAlias
   index.js79.31%100.00%58.54%
lib/stack/contentType/entry
   index.js83.04%100.00%57.43%
lib/stack/contentType/entry/variants
   index.js79.31%100.00%58.97%
lib/stack/contentType
   index.js84.85%100.00%67.57%
lib/stack/deliveryToken
   index.js95.24%80.00%85.00%
lib/stack/deliveryToken/previewToken
   index.js21.43%25.00%7.14%
lib/stack/environment
   index.js100.00%100.00%94.74%
lib/stack/extension
   index.js93.88%100.00%80.95%
lib/stack/globalField
   index.js91.67%100.00%80.77%
lib/stack
   index.js80.66%92.86%67.74%
lib/stack/label
   index.js100.00%100.00%93.33%
lib/stack/locale
   index.js100.00%100.00%94.74%
lib/stack/managementToken
   index.js100.00%100.00%89.47%
lib/stack/release
   index.js80.00%100.00%58.33%
lib/stack/roles
   index.js100.00%100.00%94.12%
lib/stack/taxonomy
   index.js80.60%100.00%54.76%
lib/stack/taxonomy/terms
   index.js78.57%100.00%56.41%
lib/stack/variantGroup
   index.js81.58%100.00%57.14%
lib/stack/variantGroup/variants
   index.js77.50%100.00%52.00%
lib/stack/variants
   index.js76.32%100.00%50.00%
lib/stack/webhook
   index.js84.48%100.00%63.64%
lib/stack/workflow
   index.js83.64%100.00%66.10%
lib/stack/workflow/publishRules
   index.js100.00%100.00%94.74%
lib/user
   index.js91.43%100.00%73.08%

🤖 comment via lucassabreu/comment-coverage-clover

@github-actions
Copy link

🔒 Security Scan Results

ℹ️ Note: Only vulnerabilities with available fixes (upgrades or patches) are counted toward thresholds.

Check Type Count (with fixes) Without fixes Threshold Result
🔴 Critical Severity 0 0 10 ✅ Passed
🟠 High Severity 0 0 25 ✅ Passed
🟡 Medium Severity 0 0 500 ✅ Passed
🔵 Low Severity 0 0 1000 ✅ Passed

⏱️ SLA Breach Summary

✅ No SLA breaches detected. All vulnerabilities are within acceptable time thresholds.

Severity Breaches (with fixes) Breaches (no fixes) SLA Threshold (with/no fixes) Status
🔴 Critical 0 0 15 / 30 days ✅ Passed
🟠 High 0 0 30 / 120 days ✅ Passed
🟡 Medium 0 0 90 / 365 days ✅ Passed
🔵 Low 0 0 180 / 365 days ✅ Passed

✅ BUILD PASSED - All security checks passed

…ion, ensuring consistency and accuracy in versioning checks.
@github-actions
Copy link

🔒 Security Scan Results

ℹ️ Note: Only vulnerabilities with available fixes (upgrades or patches) are counted toward thresholds.

Check Type Count (with fixes) Without fixes Threshold Result
🔴 Critical Severity 0 0 10 ✅ Passed
🟠 High Severity 0 0 25 ✅ Passed
🟡 Medium Severity 0 0 500 ✅ Passed
🔵 Low Severity 0 0 1000 ✅ Passed

⏱️ SLA Breach Summary

✅ No SLA breaches detected. All vulnerabilities are within acceptable time thresholds.

Severity Breaches (with fixes) Breaches (no fixes) SLA Threshold (with/no fixes) Status
🔴 Critical 0 0 15 / 30 days ✅ Passed
🟠 High 0 0 30 / 120 days ✅ Passed
🟡 Medium 0 0 90 / 365 days ✅ Passed
🔵 Low 0 0 180 / 365 days ✅ Passed

✅ BUILD PASSED - All security checks passed

@github-actions
Copy link

🔒 Security Scan Results

ℹ️ Note: Only vulnerabilities with available fixes (upgrades or patches) are counted toward thresholds.

Check Type Count (with fixes) Without fixes Threshold Result
🔴 Critical Severity 0 0 10 ✅ Passed
🟠 High Severity 0 0 25 ✅ Passed
🟡 Medium Severity 0 0 500 ✅ Passed
🔵 Low Severity 0 0 1000 ✅ Passed

⏱️ SLA Breach Summary

✅ No SLA breaches detected. All vulnerabilities are within acceptable time thresholds.

Severity Breaches (with fixes) Breaches (no fixes) SLA Threshold (with/no fixes) Status
🔴 Critical 0 0 15 / 30 days ✅ Passed
🟠 High 0 0 30 / 120 days ✅ Passed
🟡 Medium 0 0 90 / 365 days ✅ Passed
🔵 Low 0 0 180 / 365 days ✅ Passed

✅ BUILD PASSED - All security checks passed

@github-actions
Copy link

🔒 Security Scan Results

ℹ️ Note: Only vulnerabilities with available fixes (upgrades or patches) are counted toward thresholds.

Check Type Count (with fixes) Without fixes Threshold Result
🔴 Critical Severity 0 0 10 ✅ Passed
🟠 High Severity 0 0 25 ✅ Passed
🟡 Medium Severity 0 0 500 ✅ Passed
🔵 Low Severity 0 0 1000 ✅ Passed

⏱️ SLA Breach Summary

✅ No SLA breaches detected. All vulnerabilities are within acceptable time thresholds.

Severity Breaches (with fixes) Breaches (no fixes) SLA Threshold (with/no fixes) Status
🔴 Critical 0 0 15 / 30 days ✅ Passed
🟠 High 0 0 30 / 120 days ✅ Passed
🟡 Medium 0 0 90 / 365 days ✅ Passed
🔵 Low 0 0 180 / 365 days ✅ Passed

✅ BUILD PASSED - All security checks passed

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants