Loading...
Loading...
Author agentic verification plans for Eve-compatible apps. Use when building structured test suites that verify app correctness AND Eve platform conformance — CLI parity, manifest conventions, SSO auth, managed migrations, fixture-driven ingestion, and agent efficiency.
npx skill4agent add incept5/eve-skillpacks eve-verification-plans# 1. Create the verification directory in your project
mkdir -p e2e-verification/00-smoke
# 2. Copy the smoke template
cp templates/00-smoke-test-plan.md e2e-verification/00-smoke/
# 3. Customize for your app (endpoints, services, agents)
# 4. Run it| Dimension | Tool | When | Conformance Check |
|---|---|---|---|
| Platform conformance | Eve CLI + manifest inspection | Always | CLI parity, manifest conventions, secrets model |
| Service layer | Eve CLI + REST API | Always | Every endpoint reachable via CLI; no kubectl needed |
| Input / ingestion | Repo fixtures + upload commands | When app accepts files | Deterministic fixtures, real parsing flows |
| Data layer | Eve CLI + DB migrations | When app has DB | Migrations via Eve pipeline, not manual SQL |
| UI / visual | agent-browser or Playwright | When frontend exists | SSO login, dark/light mode, agent-testable |
| Agent behavior | | When app has agents | Efficient completion, no blind alleys |
# Scenario NN: <Name>
**Time:** ~Nm
**Environment:** staging | local | both
**Parallel Safe:** Yes/No
**Requires:** LLM | Browser | None
<one-paragraph description>
## Prerequisites
- What must be true before running
- Required secrets, auth, prior scenarios
## Fixtures
- File paths used by this scenario
- Provenance or generation command for each
- Why these files are representative
## Setup
\```bash
# Environment detection + auth
# Project/org setup
# Fixture validation or generation
\```
## Phases
### Phase 1: <Name>
\```bash
# Commands to execute
\```
**Expected:**
- Bullet list of assertions
- Each assertion is pass/fail verifiable
### Phase 2: ...
## Success Criteria
- [ ] Checkboxes for every pass/fail assertion
- [ ] Grouped by phase
## Debugging
| Symptom | Diagnostic | Fix |
|---------|-----------|-----|
| ... | ... | ... |
## Cleanup
\```bash
# Teardown commands
\```EVE_API_URLExpected:.eve/manifest.yamleve project sync --dry-runnameprojecteve secretsagents.yamleve pipeline runreferences/eve-conformance-checks.mdTOKEN=$(eve auth token --raw)
# Health check (always first)
curl -sf "${APP_SCHEME}://api.${APP_DOMAIN}/health" | jq '.'
# App API via auth token
curl -sf -H "Authorization: Bearer $TOKEN" \
"${APP_SCHEME}://api.${APP_DOMAIN}/endpoint" | jq '.field'curleve-app-clicurleve auth minteve auth token --rawreferences/fixture-patterns.md# Mint an SSO token via CLI
SSO_TOKEN=$(eve auth mint --email user@example.com --org $ORG_ID --format sso-jwt)
# Use agent-browser with the token
agent-browser --session verify open "${APP_URL}/auth/callback?token=${SSO_TOKEN}"
agent-browser --session verify wait --url "**/dashboard"
agent-browser --session verify screenshot ./e2e-verification/artifacts/dashboard.pngreferences/ui-verification-patterns.mdeve job follow <job-id>eve job receipt <job-id>eve-agent-optimisationreferences/agent-verification-patterns.mddiscover bug → fix code → commit → tag release-v* → push tag →
wait for CI (publish-images → infra dispatch → deploy) →
re-run failed scenariodiscover bug → fix code → pnpm build →
./bin/eh k8s-image push → ./bin/eh k8s deploy →
re-run failed scenarioreferences/deploy-cycle-patterns.md| Scenario | Required | What It Covers |
|---|---|---|
| Always | Health, auth, connectivity + Eve conformance checklist |
| Always | Build, release, deploy via pipeline, verify endpoints |
| Always | Primary user journey end-to-end (CLI + API) |
| If frontend | Screenshot verification, SSO login, dark/light mode |
| If uploads/imports | Fixture upload, parsing, storage, error handling |
| If database | Migrations via pipeline, schema correct, data integrity |
| If agents | Agents complete primary tasks correctly |
| If agents | Baseline metrics + optimization pass |
| If pipelines | Each pipeline runs end-to-end, steps succeed in order |
# Run scenarios in order
for plan in e2e-verification/*/; do
echo "=== Running: $plan ==="
# Agent reads and executes the plan document
doneParallel Safe: Yes00-smoke01-deploy03-ui-visual06-07# In CI, set environment and run
export EVE_API_URL=https://api.eh1.incept5.dev
eve auth login --email $CI_EMAIL --ssh-key $CI_SSH_KEY
# Run all scenarios, collect artifacts
mkdir -p e2e-verification/artifacts
# Agent executes each plan, screenshots/logs go to artifacts/<project-root>/
e2e-verification/
README.md # Index of all scenarios
00-smoke/
00-smoke-test-plan.md
01-deploy/
01-deploy-test-plan.md
02-core-flow/
02-core-flow-test-plan.md
fixtures/
README.md
test-data.json
03-ui-visual/
03-ui-visual-test-plan.md
04-input-ingestion/
04-input-ingestion-test-plan.md
fixtures/
README.md
sample-document.pdf
sample-import.csv
scripts/
make-fixtures.sh
artifacts/ # Generated during runs (gitignored)NN-kebab-name/NN-kebab-name-test-plan.mdfixtures/fixtures/README.mdreferences/test-plan-format.mdreferences/eve-conformance-checks.mdreferences/fixture-patterns.mdreferences/deploy-cycle-patterns.mdreferences/ui-verification-patterns.mdreferences/agent-verification-patterns.mdtemplates/00-smoke-test-plan.mdtemplates/scenario-test-plan.mdtemplates/upload-ingest-test-plan.md| Skill | Relationship |
|---|---|
| Called from agent verification scenarios |
| UI verification tool |
| Deploy cycle troubleshooting |
| CLI commands used in service-layer tests |
| Manifest conventions that conformance checks validate |
| App CLI patterns — verification asserts CLI parity |
| Pipeline conventions tested by pipeline scenarios |
| Auth + secrets model validated by conformance checks |
| General debugging when verification fails |
| Reference source for current CLI/manifest/auth behavior |
| Design principles encoded in conformance checks |