UNPKG

bc-code-intelligence-mcp

Version:

BC Code Intelligence MCP Server - Complete Specialist Bundle with AI-driven expert consultation, seamless handoffs, and context-preserving workflows

80 lines (58 loc) 4.14 kB
--- title: "Temporary Table Operation Validation Patterns" domain: "quinn-tester" difficulty: "intermediate" bc_versions: "14+" tags: ["validation", "temporary-tables", "data-integrity", "operation-safety", "preconditions"] prerequisites: ["al-tables", "validation-patterns"] samples: "samples/temporary-table-operation-validation.md" --- # Temporary Table Operation Validation Patterns ## Overview Temporary table operation validation ensures data manipulation procedures correctly identify and handle temporary versus permanent tables, preventing unintended data modifications and maintaining operation safety through systematic validation patterns. **Validation Principle**: Validate table characteristics and operational context before executing data modifications to ensure operations match intended scope and safety requirements. ## Strategic Framework ### Validation Layer Architecture - **Precondition validation**: Verify table state before operation execution - **Operation scoping**: Ensure operations match table characteristics - **Context awareness**: Validate operations against business rules and data constraints - **Safety enforcement**: Prevent operations that violate data integrity principles ### Multi-Level Validation Strategy - **Table-level checks**: Validate table properties and characteristics - **Operation-level checks**: Ensure operation appropriateness for table type - **Data-level checks**: Verify data consistency and integrity requirements - **Business rule validation**: Confirm operations align with business logic ## Architecture Patterns ### Precondition Validation Framework Implement systematic validation that checks table properties, operation parameters, and business context before allowing data manipulation operations to proceed. ### Conditional Operation Pattern Design operations that adapt their behavior based on table validation results, providing different execution paths for temporary versus permanent tables. ### Validation Chain Architecture Build validation sequences that check multiple conditions in logical order, failing fast when validation criteria are not met. ## Implementation Guidelines ### Validation Sequence Design - **Early validation**: Check conditions before resource allocation or lock acquisition - **Logical ordering**: Validate quick checks before expensive operations - **Clear failure points**: Provide specific validation failure information - **Recovery guidance**: Include corrective action suggestions in validation messages ### Table Characteristic Validation Implement checks for table temporariness, permissions, field availability, and other characteristics that affect operation safety and appropriateness. ### Operation Context Validation Validate that proposed operations are appropriate for current business context, user permissions, and data state conditions. ## Best Practices ### Comprehensive Validation Coverage - **Complete condition checking**: Validate all relevant preconditions systematically - **Consistent validation patterns**: Apply similar validation approaches across related operations - **Performance optimization**: Balance thoroughness with execution efficiency - **Maintainable validation**: Design validation rules that are easy to update and extend ### Error Communication Strategy Provide clear, specific error messages that help developers understand validation failures and guide them toward correct implementation approaches. ### Testing Integration Include validation testing in unit test suites, ensuring validation logic correctly identifies valid and invalid operation scenarios. ## Anti-Patterns ### Avoid These Approaches - **Incomplete validation**: Missing critical precondition checks - **Late validation**: Checking conditions after beginning modifications - **Silent validation failures**: Not providing clear feedback when validation fails - **Inconsistent validation**: Different validation approaches for similar operations - **Performance-over-safety**: Skipping validation for perceived performance benefits