Runtime Migration Validation¶
Use this runbook to prove that runtime migration work did not quietly break canonical execution, legacy compatibility, or release coverage.
Validation Model¶
flowchart TB
change["runtime migration change"]
boundary["runtime boundary contracts"]
ledger["migration ledger freshness and coverage"]
release["release matrix and artifact coverage"]
parity["compatibility parity checks"]
verdict["migration is releasable or blocked"]
change --> boundary
boundary --> ledger
ledger --> release
release --> parity
parity --> verdict
This page should make migration validation feel like a release gate with several linked proofs, not one extra command at the end of a release checklist.
Validation Command¶
Run the dedicated suite from repository root:
What It Proves¶
- lower-layer packages do not import runtime by accident
- the migration ledger is fresh and covers the full legacy module set
- tracked API artifacts under
apis/*/v1still match runtime expectations - release matrices still include both canonical runtime and compatibility surfaces where required
- compatibility import, CLI, and API parity tests still hold
Coordinated Release Order¶
- confirm package metadata and changelog entries for every affected package
- run shared repository checks such as
make quality,make security, andmake test - run
make quality-runtime-migration-validation - verify release matrix variables and workflow coverage
- confirm release language still names
agentic-proteinsas compatibility andbijux-proteomics-runtimeas the canonical execution owner
First Proof Check¶
make quality-runtime-migration-validation- release workflow inputs and tracked API artifacts
- migration ledger outputs under
docs/09-bijux-proteomics-runtime/migration-ledger/
Design Pressure¶
The common drift is to run the migration suite as a ritual without checking whether the ledger, release matrices, and compatibility proofs still tell the same story.