3.5 KiB
3.5 KiB
Restaurant Demo Flow Validation
Scope
This document records the restaurant demo validation passes across Stage 48, the Stage 49 propagation follow-up, and the Stage 53 hardening pass hosted behind the public dream-views.com demo domains.
Validated On
- Date:
2026-03-31 - Auth entrypoint:
https://auth.dream-views.com - Demo hosts:
https://waiter-floor-demo.dream-views.comhttps://customer-orders-demo.dream-views.comhttps://kitchen-ops-demo.dream-views.comhttps://pos-transactions-demo.dream-views.com
Confirmed Working
- Public Thalos session login and cookie-backed session validation work through the public host path.
- The restaurant runtime was refreshed from current repo state, including
operations-dal,kitchen-dal,operations-service,kitchen-service,waiter-floor-bff,customer-orders-bff,kitchen-ops-bff, andpos-transactions-bff. - Public routes for waiter, customer, kitchen, and POS demos return
200. - Customer-origin orders propagate through the shared lifecycle:
- submission is accepted
- customer status and detail show the new order
- kitchen board derives a queued ticket for that order
- kitchen transitions advance the order into a payable POS check
- POS capture succeeds for that check
- customer detail now moves to
paidafter full capture
- Waiter-origin orders also propagate into waiter activity and kitchen visibility through the same shared lifecycle.
- New kitchen-derived work-item and ticket IDs now use the full order identity and do not collide for similar numeric suffixes.
- Kitchen transition responses now return
transitioned: truewhen the upstream mutation is applied successfully.
Important Runtime Note
- Session cookies are scoped to the public
dream-views.comhosts. - Validation against
127.0.0.1BFF ports does not accurately exercise the deployed session behavior because those cookies do not round-trip on localhost. - End-to-end validation for the deployed demo should use the public auth host plus the public demo hosts.
Validation Evidence
Customer-origin flow
- Submitted order:
ORD-S53-CUSTOMER-002 - Kitchen board derived
WK-ORD-S53-CUSTOMER-002andKT-ORD-S53-CUSTOMER-002 - Kitchen transitions returned
transitioned: truefor prepare, ready, and served steps - POS exposed payable check
CHK-ORD-S53-CUSTOMER-002 - POS capture succeeded and customer detail became
paid
Waiter-origin flow
- Submitted order:
ORD-S53-WAITER-002 - Waiter activity reflected the new submission immediately
- Kitchen board derived
WK-ORD-S53-WAITER-002andKT-ORD-S53-WAITER-002
Accepted Runtime Note
The live demo still contains historical records created before the collision-safe kitchen ID fix. Those pre-fix rows remain visible until the restaurant demo is reseeded, but newly created orders now derive unique kitchen identifiers correctly.
Stage Status
- Stage 48 blocked finding is resolved for the core restaurant flow.
- Stage 49 runtime rollout is complete.
- Stage 53 hardening is complete for:
- payment-to-order closure
- collision-safe kitchen identifier derivation for new orders
- truthful kitchen transition success reporting
- The remaining restaurant follow-up is demo reseed hygiene, not runtime propagation correctness.
Recommended Follow-Up
- execute
ARC-RESTAURANT-DEMO-RESEED-1140when we want the VPS database reset to a fresh deterministic walkthrough baseline - optionally remove or archive pre-fix demo records after the reseed so the board starts from a cleaner demo state