Skip to content

Operations Checklist

This chapter defines the detailed checklist for the operations area of TQS-S/W certification. The operations checklist consists of 3 areas: configuration management, CI/CD, and testing standards. Each item is classified as mandatory (O), recommended (R), or optional (S), with the verification method specified.


32.4.1. Configuration Management

The configuration management checklist verifies standards compliance for Git-based source code version control, branch strategy, commit conventions, and PR operations.

No.ItemClassificationVerification Method
1GitHub Flow branch strategy is appliedOBranch list and operational history verification
2Commit messages are written in Conventional Commits formatOCommit log verification
3PR template is included in the projectOVerify .github/PULL_REQUEST_TEMPLATE.md file existence
4A minimum of 1 PR reviewer is assignedOPR history verification
5.gitignore file conforms to TQS standardsO.gitignore file content verification
6Semantic Versioning (SemVer) is appliedOTag and release history verification
7Protection rules are configured on the main branch (direct push prohibited)RGitHub repository settings verification
8GPG or SSH signing is applied to commitsSCommit log signature verification

Configuration management is the foundation for systematically managing a project's change history. The GitHub Flow branch strategy provides a simple yet effective workflow, and Conventional Commits serves as the basis for automated changelog generation and version management.

32.4.1.1. Configuration Management Verification Detailed Criteria

Compliance with the GitHub Flow branch strategy is determined based on the following criteria.

  • The main branch must always be maintained in a deployable state.
  • Feature development must be performed on feature branches branched from main.
  • Feature branches must be merged into main through PRs; direct pushes are not permitted.

Compliance with Conventional Commits is verified based on the most recent 50 commits. A pass is granted when 90% or more of commit messages follow the Conventional Commits format (feat:, fix:, docs:, refactor:, etc.).


32.4.2. CI/CD

The CI/CD checklist verifies the configuration of the CircleCI-based continuous integration and deployment pipeline.

No.ItemClassificationVerification Method
9CircleCI pipeline is configuredOVerify .circleci/config.yml file existence
10Lint verification step is included in the pipelineOVerify lint step in CircleCI configuration file
11Test execution step is included in the pipelineOVerify test step in CircleCI configuration file
12Build step is included in the pipelineOVerify build step in CircleCI configuration file
13All of the last 5 builds are in success stateOCircleCI build history verification
14Security scan step is included in the pipelineRVerify security scan step in CircleCI configuration file
15Deployment automation is implementedRVerify deployment step in CircleCI configuration file
16Pipelines are separated by environment (dev / staging / prod)RVerify workflows in CircleCI configuration file

CI/CD is the core infrastructure that continuously verifies code quality and ensures deployment stability. The pipeline must include a minimum of 3 mandatory steps: lint verification, test execution, and build.

32.4.2.1. CI/CD Verification Detailed Criteria

CircleCI pipeline verification is performed based on the following criteria.

  • The .circleci/config.yml file must exist at the project root.
  • Each pipeline step (lint, test, build) must be independently executable.
  • Pipeline execution time of 15 minutes or less is recommended.
  • Build history is verified through the CircleCI dashboard or API.

32.4.3. Testing Standards

The testing standards checklist verifies the backend testing framework, writing patterns, coverage criteria, and test isolation level.

No.ItemClassificationVerification Method
17JUnit 5 is used as the test frameworkOVerify dependencies in pom.xml
18Tests are written using the Given-When-Then patternOTest code review
19Line coverage of 80% or above is achievedOJaCoCo report verification
20Branch coverage of 70% or above is achievedOJaCoCo report verification
21Each test is independently executable (no dependencies between tests)OTest code review
22Test method names clearly express the test intentOTest code review
23Testcontainers is used for integration testingRVerify dependencies in pom.xml and test code
24Test data is managed independently per test (no shared data)RTest code review
25Boundary value tests are includedRTest code review

Testing standards are a core area that ensures code reliability and maintainability. JUnit 5 and the Given-When-Then pattern ensure test readability and structure, and coverage criteria quantitatively verify test sufficiency.

32.4.3.1. Testing Verification Detailed Criteria

Test coverage is measured based on JaCoCo reports. The following rules are applied when calculating coverage.

  • Auto-generated code (jOOQ codegen, etc.) is excluded from coverage calculation.
  • Configuration classes (@Configuration) may be excluded from coverage calculation.
  • Simple data objects such as DTOs and VOs may be excluded from coverage calculation.

Compliance with the Given-When-Then pattern is verified through manual review. The structure of test methods must be clearly separated into preparation (Given), execution (When), and verification (Then) phases.


32.4.4. Item Summary

The total number of items and distribution by classification for the operations checklist are as follows.

AreaMandatory (O)Recommended (R)Optional (S)Total
Configuration Management6118
CI/CD5308
Testing Standards6309
Total177125

The operations checklist consists of a total of 25 items. All 17 mandatory items must be met to obtain Basic certification, and the compliance rate of the 7 recommended items determines whether the Advanced or Premier certification grade is achieved. The 1 optional item is not included in the certification grade calculation.


32.4.5. Operations Verification Notes

The following points must be observed when verifying the operations checklist.

  • Configuration management items are verified by directly inspecting the project's GitHub repository. For private repositories, read access must be granted to the TQS Committee.
  • CI/CD items are verified by examining both the pipeline configuration file and execution history. If only the configuration file exists without actual execution history, the item is judged as non-compliant.
  • Testing standards items are verified through a combination of automated verification (coverage metrics) and manual review (test code quality).
  • Commit history and PR history are verified based on activity within the most recent 3 months.

TIENIPIA QUALIFIED STANDARD