2 Commits

2 changed files with 24 additions and 4 deletions

View File

@@ -18,6 +18,7 @@ Used to categorize tests by importance:
- `@critical` - Critical path tests that must always pass - `@critical` - Critical path tests that must always pass
- `@basic` - Basic functionality tests - `@basic` - Basic functionality tests
- `@advanced` - Advanced or edge case scenarios - `@advanced` - Advanced or edge case scenarios
- `@nice_to_have` - Optional features that would be nice to have but aren't critical
### Component Tags ### Component Tags
Used to categorize tests by system component: Used to categorize tests by system component:
@@ -32,6 +33,24 @@ Used to exclude tests from execution:
- `@todo` - Tests with pending step implementations - `@todo` - Tests with pending step implementations
- `@skip` - Tests that should be skipped entirely - `@skip` - Tests that should be skipped entirely
### Nice-to-Have Tag
The `@nice_to_have` tag is used to mark scenarios that test optional features or enhancements. These are features that would be beneficial to have but aren't critical for the core functionality of the system.
**Usage:**
- Add `@nice_to_have` to scenarios testing optional features
- These scenarios are typically excluded from critical path testing
- Useful for marking "stretch goal" functionality
**Example:**
```gherkin
@nice_to_have @greet
Scenario: Greeting with custom formatting options
Given the server is running
When I request a greeting with bold formatting
Then the response should contain HTML bold tags
```
### Work In Progress Tag ### Work In Progress Tag
Used to override exclusions for active development: Used to override exclusions for active development:
- `@wip` - Work In Progress - overrides exclusion tags to allow focused development - `@wip` - Work In Progress - overrides exclusion tags to allow focused development
@@ -206,6 +225,7 @@ Feature: Health Endpoint
| `@critical` | Critical path | `@critical` on essential scenarios | | `@critical` | Critical path | `@critical` on essential scenarios |
| `@basic` | Basic functionality | `@basic` on standard scenarios | | `@basic` | Basic functionality | `@basic` on standard scenarios |
| `@advanced` | Advanced scenarios | `@advanced` on edge cases | | `@advanced` | Advanced scenarios | `@advanced` on edge cases |
| `@nice_to_have` | Optional features | `@nice_to_have` on stretch goal scenarios |
| `@auth` | Authentication | `@auth` on auth features | | `@auth` | Authentication | `@auth` on auth features |
| `@config` | Configuration | `@config` on config scenarios | | `@config` | Configuration | `@config` on config scenarios |
| `@api` | API endpoints | `@api` on endpoint tests | | `@api` | API endpoints | `@api` on endpoint tests |

View File

@@ -89,7 +89,7 @@ Feature: JWT Secret Retention Policy
Then I should receive configuration validation error Then I should receive configuration validation error
And the error should mention "retention_factor must be 1.0" And the error should mention "retention_factor must be 1.0"
@todo @todo @nice_to_have
Scenario: Metrics for secret retention Scenario: Metrics for secret retention
Given I have enabled Prometheus metrics Given I have enabled Prometheus metrics
When the cleanup job removes expired secrets When the cleanup job removes expired secrets
@@ -97,7 +97,7 @@ Feature: JWT Secret Retention Policy
And I should see "jwt_secrets_active_count" metric decrease And I should see "jwt_secrets_active_count" metric decrease
And I should see "jwt_secret_retention_duration_seconds" histogram update And I should see "jwt_secret_retention_duration_seconds" histogram update
@todo @todo @nice_to_have
Scenario: Log masking for security Scenario: Log masking for security
Given I add a new JWT secret "super-secret-key-123456" Given I add a new JWT secret "super-secret-key-123456"
When the cleanup job runs When the cleanup job runs
@@ -151,7 +151,7 @@ Feature: JWT Secret Retention Policy
And existing secrets should be reevaluated And existing secrets should be reevaluated
And cleanup should use new retention periods And cleanup should use new retention periods
@todo @todo @nice_to_have
Scenario: Audit trail for secret operations Scenario: Audit trail for secret operations
Given I enable audit logging Given I enable audit logging
When I add a new JWT secret When I add a new JWT secret
@@ -176,7 +176,7 @@ Feature: JWT Secret Retention Policy
And new tokens should use the emergency secret And new tokens should use the emergency secret
And cleanup should remove compromised secrets And cleanup should remove compromised secrets
@todo @todo @nice_to_have
Scenario: Monitoring and alerting Scenario: Monitoring and alerting
Given I have monitoring configured Given I have monitoring configured
When the cleanup job fails repeatedly When the cleanup job fails repeatedly