You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**WHEN** the core runtime adds or removes implicit TypeScript preprocessing behavior
11
-
-**THEN**`docs/quickstart.mdx`, `docs/api-reference.mdx`, `docs/runtimes/node.mdx`, `docs/node-compatability.mdx`, `docs-internal/arch/overview.md`, and `docs-internal/friction.md` MUST be updated in the same change
11
+
-**THEN**`docs/quickstart.mdx`, `docs/api-reference.mdx`, `docs/runtimes/node.mdx`, `docs/nodejs-compatibility.mdx`, `docs-internal/arch/overview.md`, and `docs-internal/friction.md` MUST be updated in the same change
12
12
13
13
#### Scenario: Companion TypeScript tooling API changes
14
14
-**WHEN** the public API of the companion TypeScript tooling package changes
15
15
-**THEN**`docs/quickstart.mdx` and `docs/api-reference.mdx` MUST be updated in the same change so project/source helper semantics remain accurate
Changes affecting bridged or polyfilled Node APIs MUST keep `docs/node-compatability.mdx` synchronized with the actual runtime surface, including supported, limited, and unsupported modules/APIs. Every module entry in the matrix MUST include an explicit support-tier classification (Bridge, Polyfill, Stub, Deferred, or Unsupported) as defined by the `node-stdlib` spec. The page MUST include a top-of-page target Node version statement.
18
+
Changes affecting bridged or polyfilled Node APIs MUST keep `docs/nodejs-compatibility.mdx` synchronized with the actual runtime surface, including supported, limited, and unsupported modules/APIs. Every module entry in the matrix MUST include an explicit support-tier classification (Bridge, Polyfill, Stub, Deferred, or Unsupported) as defined by the `node-stdlib` spec. The page MUST include a top-of-page target Node version statement.
19
19
20
20
#### Scenario: Bridge API surface changes
21
21
-**WHEN** a change adds, removes, or materially alters bridged Node API behavior
22
-
-**THEN** the compatibility matrix page at `docs/node-compatability.mdx` MUST be updated in the same change to reflect the new runtime contract
22
+
-**THEN** the compatibility matrix page at `docs/nodejs-compatibility.mdx` MUST be updated in the same change to reflect the new runtime contract
-**WHEN** a repository document or spec source references the legacy internal stdlib compatibility document
26
-
-**THEN** the reference MUST be replaced with `docs/node-compatability.mdx` before the change is considered complete
26
+
-**THEN** the reference MUST be replaced with `docs/nodejs-compatibility.mdx` before the change is considered complete
27
27
28
28
#### Scenario: Target Node version callout is missing
29
-
-**WHEN**`docs/node-compatability.mdx` is updated
29
+
-**WHEN**`docs/nodejs-compatibility.mdx` is updated
30
30
-**THEN** the page MUST retain an explicit target Node version statement at the top
31
31
32
32
### Requirement: Node Compatibility Target Version Tracks Test Type Baseline
@@ -38,7 +38,7 @@ The runtime compatibility target MUST align with the `@types/node` package major
38
38
39
39
#### Scenario: `@types/node` target major is upgraded
40
40
-**WHEN** the workspace intentionally upgrades `@types/node` to a new major version used by secure-exec validation
41
-
-**THEN** the same change MUST update `docs/node-compatability.mdx` and related compatibility-governance references to the new target Node major line
41
+
-**THEN** the same change MUST update `docs/nodejs-compatibility.mdx` and related compatibility-governance references to the new target Node major line
42
42
43
43
#### Scenario: Compatibility target is documented
44
44
-**WHEN** compatibility requirements or docs declare a target Node version
@@ -67,10 +67,10 @@ Unexpected issues, workarounds, and integration friction encountered during secu
67
67
-**THEN** its log entry MUST be updated to indicate resolution and summarize the fix
68
68
69
69
### Requirement: Run Bridge Type Conformance Tests After Bridge Changes
70
-
Any change to files under `packages/secure-exec-core/src/bridge` MUST run bridge type conformance checks via `pnpm run check-types:test` in `packages/secure-exec` before completion.
70
+
Any change to files under `packages/nodejs/src/bridge` MUST run bridge type conformance checks via `pnpm run check-types:test` in `packages/secure-exec` before completion.
71
71
72
72
#### Scenario: Bridge source file is modified
73
-
-**WHEN** a commit modifies one or more files in `packages/secure-exec-core/src/bridge`
73
+
-**WHEN** a commit modifies one or more files in `packages/nodejs/src/bridge`
74
74
-**THEN**`pnpm run check-types:test` MUST be executed and failures MUST be addressed before the change is considered complete
@@ -221,15 +221,15 @@ Changes to runtime or bridge filesystem metadata/rename behavior SHALL update co
221
221
-**THEN** the compatibility project-matrix MUST include fixture coverage that exercises the changed behavior under host Node and secure-exec comparison
222
222
223
223
### Requirement: Governance References Use Canonical Secure-Exec Package Family Naming
224
-
Governance artifacts that reference runtime package imports SHALL use the `@secure-exec/*` scoped package names (`@secure-exec/core`, `@secure-exec/node`, `@secure-exec/browser`, `@secure-exec/python`) or the `secure-exec` barrel. Source paths SHALL use the corresponding workspace directories (`packages/secure-exec-core`, `packages/secure-exec-node`, `packages/secure-exec-browser`, `packages/secure-exec-python`, `packages/secure-exec`).
224
+
Governance artifacts that reference runtime package imports SHALL use the `@secure-exec/*` scoped package names (`@secure-exec/core`, `@secure-exec/nodejs`, `@secure-exec/browser`, `@secure-exec/python`) or the `secure-exec` barrel. Source paths SHALL use the corresponding workspace directories (`packages/core`, `packages/nodejs`, `packages/browser`, `packages/python`, `packages/secure-exec`).
-**WHEN** a governance document or spec requirement describes runtime source directories
232
-
-**THEN** it MUST use the appropriate `packages/secure-exec-*` workspace path for the component being referenced
232
+
-**THEN** it MUST use the appropriate `packages/*` workspace path for the component being referenced
233
233
234
234
### Requirement: Module-Access Boundary Changes MUST Update Security and Friction Documentation
235
235
Any change that introduces or modifies driver-managed host module projection or overlay boundaries MUST update compatibility/friction and security-model documentation in the same change.
@@ -251,7 +251,7 @@ Any change that introduces or modifies runtime log-capture defaults or hook-base
251
251
252
252
#### Scenario: Runtime introduces or changes log-stream hook behavior
-**THEN**`docs/security-model.mdx` MUST describe trust-boundary and resource-consumption implications and `docs/node-compatability.mdx` MUST reflect user-visible behavior changes where applicable
254
+
-**THEN**`docs/security-model.mdx` MUST describe trust-boundary and resource-consumption implications and `docs/nodejs-compatibility.mdx` MUST reflect user-visible behavior changes where applicable
255
255
256
256
#### Scenario: Logging changes include exploit regression coverage
257
257
-**WHEN** logging/output behavior is changed in runtime or bridge paths
@@ -261,7 +261,7 @@ Any change that introduces or modifies runtime log-capture defaults or hook-base
261
261
Any change that modifies runtime-driver behavior or runtime orchestration contracts MUST run shared integration suites against both node and browser runtime-driver targets.
-**WHEN** a change modifies runtime contracts or driver behavior under `packages/secure-exec-core/src/`, `packages/secure-exec-node/src/`, or `packages/secure-exec-browser/src/`
264
+
-**WHEN** a change modifies runtime contracts or driver behavior under `packages/core/src/`, `packages/nodejs/src/`, or `packages/browser/src/`
265
265
-**THEN** the change MUST execute shared integration suites for both node and browser targets before completion
266
266
267
267
#### Scenario: Shared suites are reused between targets
-**THEN** navigation MUST include `quickstart`, `security-model`, and `node-compatability` as available documentation pages
11
+
-**THEN** navigation MUST include `quickstart`, `security-model`, and `nodejs-compatibility` as available documentation pages
12
12
13
13
#### Scenario: Node compatibility page path is resolvable
14
14
-**WHEN** a user selects the Node Compatibility page from navigation
15
-
-**THEN** the docs site MUST resolve and render `node-compatability.mdx` successfully
15
+
-**THEN** the docs site MUST resolve and render `nodejs-compatibility.mdx` successfully
16
16
17
17
### Requirement: Quickstart Uses Steps With Runnable Example
18
18
The Quickstart page SHALL present onboarding steps using Mintlify `<Steps>` and SHALL include at least one basic runnable example that verifies setup success using the current runtime logging contract.
@@ -30,17 +30,17 @@ The Quickstart page SHALL present onboarding steps using Mintlify `<Steps>` and
30
30
-**THEN** it MUST use hook-based log streaming examples and MUST NOT instruct users to read `result.stdout` or `result.stderr`
31
31
32
32
### Requirement: Node Compatibility Page Declares Target Version and Matrix
33
-
The docs site MUST provide `docs/node-compatability.mdx` with an explicit target Node version statement near the top of the page and a clean compatibility matrix table that summarizes module support tier and runtime notes.
33
+
The docs site MUST provide `docs/nodejs-compatibility.mdx` with an explicit target Node version statement near the top of the page and a clean compatibility matrix table that summarizes module support tier and runtime notes.
34
34
35
35
#### Scenario: Target Node version is visible at top of page
36
-
-**WHEN**`node-compatability.mdx` is rendered
36
+
-**WHEN**`nodejs-compatibility.mdx` is rendered
37
37
-**THEN** users MUST see the targeted Node version before the compatibility matrix content
38
38
39
39
#### Scenario: Compatibility matrix uses concise tabular format
40
-
-**WHEN**`node-compatability.mdx` is rendered
40
+
-**WHEN**`nodejs-compatibility.mdx` is rendered
41
41
-**THEN** it MUST include a simple table with module/support-tier/status details migrated from the internal compatibility source
42
42
43
43
#### Scenario: Permission model scope stays at runtime and bridge contract
-**THEN** it MUST describe core runtime/bridge permission enforcement and MUST NOT present driver-construction convenience defaults as the canonical security contract
The isolate-runtime source tree SHALL organize host-injected entry scripts under `packages/secure-exec-core/isolate-runtime/src/inject/` and shared reusable modules under `packages/secure-exec-core/isolate-runtime/src/common/`.
7
+
The isolate-runtime source tree SHALL organize host-injected entry scripts under `packages/core/isolate-runtime/src/inject/` and shared reusable modules under `packages/core/isolate-runtime/src/common/`.
8
8
9
9
#### Scenario: Existing inject sources are migrated to canonical layout
10
10
-**WHEN** isolate-runtime injection sources are maintained or refactored
11
-
-**THEN** entry scripts evaluated by host runtime MUST live under `packages/secure-exec-core/isolate-runtime/src/inject/` and shared helpers/types MUST live under `packages/secure-exec-core/isolate-runtime/src/common/`
11
+
-**THEN** entry scripts evaluated by host runtime MUST live under `packages/core/isolate-runtime/src/inject/` and shared helpers/types MUST live under `packages/core/isolate-runtime/src/common/`
12
12
13
13
#### Scenario: New isolate injection source is added
14
14
-**WHEN** contributors introduce a new host-to-isolate injected script
15
-
-**THEN** the source file MUST be added under `packages/secure-exec-core/isolate-runtime/src/inject/` and MUST NOT be placed in legacy flat isolate-runtime paths
15
+
-**THEN** the source file MUST be added under `packages/core/isolate-runtime/src/inject/` and MUST NOT be placed in legacy flat isolate-runtime paths
16
16
17
17
### Requirement: Inject Entrypoints SHALL Compile as Standalone Runtime Artifacts
18
18
Inject entrypoint files SHALL be compiled into standalone executable source payloads suitable for host runtime injection, including any shared code imported from `src/common`.
-**THEN** bridge handling MUST return entry type information without a repeated `readDir` probe for each entry
118
118
119
119
### Requirement: Bridge Boundary Contracts SHALL Be Defined In A Canonical Shared Type Module
120
-
Bridge global keys and host/isolate boundary type contracts SHALL be defined in one canonical shared type module under `packages/secure-exec-core/src/shared/` and reused across host runtime setup and bridge modules.
120
+
Bridge global keys and host/isolate boundary type contracts SHALL be defined in canonical shared type modules — bridge-contract types in `packages/nodejs/src/bridge-contract.ts` and global-exposure helpers in `packages/core/src/shared/global-exposure.ts` — and reused across host runtime setup and bridge modules.
0 commit comments