Sprint 47 — Q2 April Release
Active
Apr 1 – Apr 14, 2026  ·  9 days remaining
🎯
Sprint Goal
Ship the Payment API v2.4 gateway integration, resolve all P1 authentication bugs, and migrate legacy session management to the new OAuth2.0 token service before the Q2 release window closes.
Filter by:
🔍 Search issues
Assignee ▼
Label ▼
Epic ▼
MR
SC
JW
PN
TO
🌠
📊 Velocity & Capacity
Committed
68 pts
Completed
42 pts
In Progress
13 pts
Remaining
13 pts
S44
S45
S46
S47
Committed
Completed
📝 Sprint Planning Notes Scrum Master · Apr 1
SR
Sandra Reyes (Scrum Master) · Sprint 47 planning session

Team committed to 68 story points across 15 issues. Main theme: Q2 payment gateway release. Jake and Priya own the OAuth2.0 token migration (TCP-2203, TCP-2204). Marcus leads Payment API integration (TCP-2198, TCP-2199).

Key dependencies: TCP-2198 is blocked on vendor API credentials from finance team — ETA end of day Apr 3. TCP-2207 (Stripe webhook hardening) requires security sign-off before PR merge. Do not push TCP-2207 to Done without explicit approval from InfoSec.

{fill}

Current burn rate is 62% of committed points at midpoint, which is below target (should be ~70% at 7 days in). Recommend carrying over TCP-2211 (legacy session cleanup) if not started by Apr 10. Engineering manager has approved scope reduction if velocity dips further.


Retrospective action items from S46:

  • Add mandatory code review checklist for all API-touching PRs ✅
  • Schedule mid-sprint sync every Wednesday 2pm ✅
  • Improve story sizing accuracy for infrastructure tasks (ongoing)
👥 Team Availability
MR
Marcus Rodriguez
Backend Lead · 100%
Full
SC
Sarah Chen
Frontend · 80% (dentist Apr 8)
80%
JW
Jake Williams
Auth specialist · 100%
Full
PN
Priya Nair
Infrastructure · 60% (on-call rotation)
60%
TO
Tom Okafor
QA Engineer · 100%
Full
To Do 5
S
Implement OAuth2.0 refresh token rotation with expiry enforcement
backend api
TCP-2203
JW
8 pts
S
Migrate legacy session tokens to new Redis-backed token store
backend devops
TCP-2204
PN
5 pts
B
Fix memory leak in connection pool under high concurrency (>500 req/s)
P1 backend
TCP-2209
MR
3 pts
T
Update API rate limit headers to RFC 7231 specification
api frontend
TCP-2210
SC
2 pts
T
Clean up legacy session_v1 database tables and associated stored procedures
backend devops
TCP-2211
PN
3 pts
In Progress 4
S
Payment API v2.4 — Stripe gateway integration with idempotency key support
P2 api backend
TCP-2198
MR
13 pts
S
Payment API v2.4 — Webhook retry logic and dead-letter queue for failed events
backend devops
TCP-2199
MR
8 pts
B
P1: Auth token expiry not enforced on concurrent API calls — race condition
P1 security
TCP-2205
JW
🟠 Blocked
5 pts
S
Stripe webhook signature validation hardening — prevent replay attacks
security api
TCP-2207
TO
5 pts
Done 6
S
Design Payment API v2.4 schema and endpoint contract
done api
TCP-2195
MR
5 pts
T
Set up test environment with Stripe sandbox credentials
done devops
TCP-2196
PN
3 pts
B
Fix CSRF token rotation bug in payment form submission handler
done security
TCP-2200
JW
3 pts
S
Implement PCI-DSS audit logging for all payment API endpoints
done security backend
TCP-2201
TO
8 pts
T
Update internal SDK documentation for Payment API v2.4 consumers
done frontend
TCP-2202
SC
2 pts
B
Fix 401 responses missing WWW-Authenticate header on /api/v2/payment
done api
TCP-2206
MR
1 pt
Completed: 6 issues · 42 pts
In Progress: 4 issues · 31 pts
To Do: 5 issues · 13 pts
Total: 15 issues · 86 pts
🕑 9 days left in sprint