Delete rag_knowledge_base.txt
Browse files- rag_knowledge_base.txt +0 -63
rag_knowledge_base.txt
DELETED
@@ -1,63 +0,0 @@
|
|
1 |
-
### QA BEST PRACTICES
|
2 |
-
|
3 |
-
- Always align test cases with the acceptance criteria of the user story.
|
4 |
-
- Use boundary value analysis to catch edge case bugs.
|
5 |
-
- Include negative test cases (e.g., invalid inputs, unauthorized access).
|
6 |
-
- Consider accessibility and responsive testing for UI components.
|
7 |
-
- Verify compliance requirements (GDPR, OWASP Top 10, etc.) when applicable.
|
8 |
-
- Use exploratory testing to discover unexpected behavior in workflows.
|
9 |
-
|
10 |
-
### COMMON TEST TYPES
|
11 |
-
|
12 |
-
- Functional Testing: Verifies core functionality works as expected.
|
13 |
-
- Regression Testing: Ensures existing functionality is unaffected by new changes.
|
14 |
-
- Integration Testing: Verifies interfaces and interactions between modules/services.
|
15 |
-
- Security Testing: Identifies vulnerabilities like XSS, CSRF, authentication flaws.
|
16 |
-
- Performance Testing: Measures system speed, scalability, and reliability under load.
|
17 |
-
- Usability Testing: Validates the ease of use and clarity of workflows.
|
18 |
-
|
19 |
-
### TEST CASE EXAMPLES
|
20 |
-
|
21 |
-
**Scenario: Login System**
|
22 |
-
- Verify user can login with valid credentials.
|
23 |
-
- Verify error is shown for incorrect password.
|
24 |
-
- Check account lockout after 5 failed login attempts.
|
25 |
-
- Test password reset flow with valid and invalid emails.
|
26 |
-
- Ensure password input field is masked.
|
27 |
-
- Attempt login from multiple devices concurrently.
|
28 |
-
|
29 |
-
**Scenario: Shopping Cart**
|
30 |
-
- Verify product is added to cart and cart total updates.
|
31 |
-
- Check removal of an item updates cart total.
|
32 |
-
- Add same item multiple times and validate quantity logic.
|
33 |
-
- Test cart persistence after page refresh or relogin.
|
34 |
-
- Simulate network delay and ensure cart sync is retained.
|
35 |
-
|
36 |
-
**Scenario: API-based System**
|
37 |
-
- Validate GET /users returns 200 with correct schema.
|
38 |
-
- Ensure POST /create-user fails without required fields.
|
39 |
-
- Test rate-limiting behavior under rapid API calls.
|
40 |
-
- Check unauthorized access returns 401.
|
41 |
-
|
42 |
-
### EDGE CASES
|
43 |
-
|
44 |
-
- Inputs with special characters (e.g., %, $, <, >, `).
|
45 |
-
- Extremely long strings (e.g., 500+ characters in a name field).
|
46 |
-
- Input empty fields where mandatory.
|
47 |
-
- Date/time edge values: Feb 29, 2038 year bug, etc.
|
48 |
-
- Simulate backend unavailability (503, 504 errors).
|
49 |
-
|
50 |
-
### TEST DESIGN TEMPLATES
|
51 |
-
|
52 |
-
- Given [pre-condition], When [action], Then [expected result].
|
53 |
-
- Use test data sets with both valid and invalid combinations.
|
54 |
-
- Prioritize based on risk and usage frequency.
|
55 |
-
|
56 |
-
### SECURITY COMPLIANCE
|
57 |
-
|
58 |
-
- Enforce password policies: min length, complexity.
|
59 |
-
- Ensure sensitive fields (password, token) are never logged.
|
60 |
-
- Validate user input on both client and server sides.
|
61 |
-
- CSRF protection for form submissions.
|
62 |
-
- Encrypt data at rest and in transit.
|
63 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|