Close scratch iteration 009 grouped policy and VEX audit repairs

This commit is contained in:
master
2026-03-13 19:25:48 +02:00
parent 6954ac7967
commit bf4ff5bfd7
41 changed files with 2413 additions and 553 deletions

View File

@@ -850,6 +850,29 @@ stella exception status <request-id>
- [Trust Lattice Policy Gates](#63--trust-lattice-policy-gates)
- [Budget Attestation](./budget-attestation.md)
### Governance Compatibility Endpoints
The console governance workspaces also depend on a tenant-scoped compatibility surface under `/api/v1/governance/*` that lives in the Policy gateway.
- `GET /api/v1/governance/trust-weights`
- `PUT /api/v1/governance/trust-weights/{weightId}`
- `POST /api/v1/governance/trust-weights/preview-impact`
- `GET /api/v1/governance/staleness/config`
- `PUT /api/v1/governance/staleness/config/{dataType}`
- `GET /api/v1/governance/staleness/status`
- `GET /api/v1/governance/conflicts/dashboard`
- `GET /api/v1/governance/conflicts`
- `POST /api/v1/governance/conflicts/{conflictId}/resolve`
- `POST /api/v1/governance/conflicts/{conflictId}/ignore`
Contract requirements:
- All requests are tenant-scoped and may include an optional `projectId`.
- Console clients must resolve live tenant scope from the active session/context and must not rely on legacy placeholder aliases.
- Conflict dashboard/list responses remain deterministic so scratch rebuilds and replayed Playwright sweeps see stable cards, trend buckets, and action affordances.
Implementation reference:
- `src/Policy/StellaOps.Policy.Gateway/Endpoints/GovernanceCompatibilityEndpoints.cs`
---
## 7·Security & Tenancy