bc-code-intelligence-mcp
Version:
BC Code Intelligence MCP Server - Complete Specialist Bundle with AI-driven expert consultation, seamless handoffs, and context-preserving workflows
80 lines (58 loc) • 4.14 kB
Markdown
title: "Temporary Table Operation Validation Patterns"
domain: "quinn-tester"
difficulty: "intermediate"
bc_versions: "14+"
tags: ["validation", "temporary-tables", "data-integrity", "operation-safety", "preconditions"]
prerequisites: ["al-tables", "validation-patterns"]
samples: "samples/temporary-table-operation-validation.md"
# Temporary Table Operation Validation Patterns
## Overview
Temporary table operation validation ensures data manipulation procedures correctly identify and handle temporary versus permanent tables, preventing unintended data modifications and maintaining operation safety through systematic validation patterns.
**Validation Principle**: Validate table characteristics and operational context before executing data modifications to ensure operations match intended scope and safety requirements.
## Strategic Framework
### Validation Layer Architecture
- **Precondition validation**: Verify table state before operation execution
- **Operation scoping**: Ensure operations match table characteristics
- **Context awareness**: Validate operations against business rules and data constraints
- **Safety enforcement**: Prevent operations that violate data integrity principles
### Multi-Level Validation Strategy
- **Table-level checks**: Validate table properties and characteristics
- **Operation-level checks**: Ensure operation appropriateness for table type
- **Data-level checks**: Verify data consistency and integrity requirements
- **Business rule validation**: Confirm operations align with business logic
## Architecture Patterns
### Precondition Validation Framework
Implement systematic validation that checks table properties, operation parameters, and business context before allowing data manipulation operations to proceed.
### Conditional Operation Pattern
Design operations that adapt their behavior based on table validation results, providing different execution paths for temporary versus permanent tables.
### Validation Chain Architecture
Build validation sequences that check multiple conditions in logical order, failing fast when validation criteria are not met.
## Implementation Guidelines
### Validation Sequence Design
- **Early validation**: Check conditions before resource allocation or lock acquisition
- **Logical ordering**: Validate quick checks before expensive operations
- **Clear failure points**: Provide specific validation failure information
- **Recovery guidance**: Include corrective action suggestions in validation messages
### Table Characteristic Validation
Implement checks for table temporariness, permissions, field availability, and other characteristics that affect operation safety and appropriateness.
### Operation Context Validation
Validate that proposed operations are appropriate for current business context, user permissions, and data state conditions.
## Best Practices
### Comprehensive Validation Coverage
- **Complete condition checking**: Validate all relevant preconditions systematically
- **Consistent validation patterns**: Apply similar validation approaches across related operations
- **Performance optimization**: Balance thoroughness with execution efficiency
- **Maintainable validation**: Design validation rules that are easy to update and extend
### Error Communication Strategy
Provide clear, specific error messages that help developers understand validation failures and guide them toward correct implementation approaches.
### Testing Integration
Include validation testing in unit test suites, ensuring validation logic correctly identifies valid and invalid operation scenarios.
## Anti-Patterns
### Avoid These Approaches
- **Incomplete validation**: Missing critical precondition checks
- **Late validation**: Checking conditions after beginning modifications
- **Silent validation failures**: Not providing clear feedback when validation fails
- **Inconsistent validation**: Different validation approaches for similar operations
- **Performance-over-safety**: Skipping validation for perceived performance benefits