🧪 test: remove hardcoded @wip and update tag logic

- Remove @wip from default tag filters in all test suites
- Update features/bdd_test.go to support GODOG_TAGS override
- Move @wip tag from passing scenario to @todo scenario
- Maintain tag override functionality via GODOG_TAGS environment variable
- Update documentation to reflect new default behavior

Generated by Mistral Vibe.
Co-Authored-By: Mistral Vibe <vibe@mistral.ai>
This commit is contained in:
2026-04-10 10:13:45 +02:00
parent 4292f79c6a
commit 1f92302eff
13 changed files with 44 additions and 31 deletions

View File

@@ -4,7 +4,6 @@ Feature: JWT Secret Rotation
I want to rotate JWT secrets without disrupting users
So that we can maintain security while ensuring continuous service
@wip
Scenario: Authentication with multiple valid JWT secrets
Given the server is running with multiple JWT secrets
And a user "multiuser" exists with password "testpass123"
@@ -12,7 +11,6 @@ Feature: JWT Secret Rotation
Then the authentication should be successful
And I should receive a valid JWT token signed with the primary secret
@todo
Scenario: Token validation with multiple valid secrets
Given the server is running with multiple JWT secrets
And a user "tokenuser" exists with password "testpass123"
@@ -23,7 +21,6 @@ Feature: JWT Secret Rotation
Then the token should be valid
And it should contain the correct user ID
@todo
Scenario: Secret rotation - adding new secret while keeping old one valid
Given the server is running with primary JWT secret
And a user "rotateuser" exists with password "testpass123"
@@ -37,14 +34,12 @@ Feature: JWT Secret Rotation
When I validate the old JWT token signed with primary secret
Then the token should still be valid
@todo
Scenario: Token rejection after secret expiration
Given the server is running with primary and expired secondary JWT secrets
When I use a JWT token signed with the expired secondary secret for authentication
Then the authentication should fail
And the response should contain error "invalid_token"
@todo
Scenario: Graceful secret rotation with user continuity
Given the server is running with primary JWT secret
And a user "gracefuluser" exists with password "testpass123"