blueprint-platform/docs/consumption/restaurant-demo-flow-validation.md
2026-03-31 20:32:14 -06:00

3.5 KiB

Restaurant Demo Flow Validation

Scope

This document records the restaurant demo validation passes across Stage 48, the Stage 49 propagation follow-up, and the Stage 53 hardening pass hosted behind the public dream-views.com demo domains.

Validated On

  • Date: 2026-03-31
  • Auth entrypoint: https://auth.dream-views.com
  • Demo hosts:
    • https://waiter-floor-demo.dream-views.com
    • https://customer-orders-demo.dream-views.com
    • https://kitchen-ops-demo.dream-views.com
    • https://pos-transactions-demo.dream-views.com

Confirmed Working

  • Public Thalos session login and cookie-backed session validation work through the public host path.
  • The restaurant runtime was refreshed from current repo state, including operations-dal, kitchen-dal, operations-service, kitchen-service, waiter-floor-bff, customer-orders-bff, kitchen-ops-bff, and pos-transactions-bff.
  • Public routes for waiter, customer, kitchen, and POS demos return 200.
  • Customer-origin orders propagate through the shared lifecycle:
    • submission is accepted
    • customer status and detail show the new order
    • kitchen board derives a queued ticket for that order
    • kitchen transitions advance the order into a payable POS check
    • POS capture succeeds for that check
    • customer detail now moves to paid after full capture
  • Waiter-origin orders also propagate into waiter activity and kitchen visibility through the same shared lifecycle.
  • New kitchen-derived work-item and ticket IDs now use the full order identity and do not collide for similar numeric suffixes.
  • Kitchen transition responses now return transitioned: true when the upstream mutation is applied successfully.

Important Runtime Note

  • Session cookies are scoped to the public dream-views.com hosts.
  • Validation against 127.0.0.1 BFF ports does not accurately exercise the deployed session behavior because those cookies do not round-trip on localhost.
  • End-to-end validation for the deployed demo should use the public auth host plus the public demo hosts.

Validation Evidence

Customer-origin flow

  • Submitted order: ORD-S53-CUSTOMER-002
  • Kitchen board derived WK-ORD-S53-CUSTOMER-002 and KT-ORD-S53-CUSTOMER-002
  • Kitchen transitions returned transitioned: true for prepare, ready, and served steps
  • POS exposed payable check CHK-ORD-S53-CUSTOMER-002
  • POS capture succeeded and customer detail became paid

Waiter-origin flow

  • Submitted order: ORD-S53-WAITER-002
  • Waiter activity reflected the new submission immediately
  • Kitchen board derived WK-ORD-S53-WAITER-002 and KT-ORD-S53-WAITER-002

Accepted Runtime Note

The live demo still contains historical records created before the collision-safe kitchen ID fix. Those pre-fix rows remain visible until the restaurant demo is reseeded, but newly created orders now derive unique kitchen identifiers correctly.

Stage Status

  • Stage 48 blocked finding is resolved for the core restaurant flow.
  • Stage 49 runtime rollout is complete.
  • Stage 53 hardening is complete for:
    • payment-to-order closure
    • collision-safe kitchen identifier derivation for new orders
    • truthful kitchen transition success reporting
  • The remaining restaurant follow-up is demo reseed hygiene, not runtime propagation correctness.
  • execute ARC-RESTAURANT-DEMO-RESEED-1140 when we want the VPS database reset to a fresh deterministic walkthrough baseline
  • optionally remove or archive pre-fix demo records after the reseed so the board starts from a cleaner demo state