- Created a comprehensive remediation plan for the security test suite, detailing test results, issues, and implementation roadmap.
- Introduced a separate remediation plan for skipped tests, identifying bugs, locator issues, and accessibility enhancements.
- Added URL validation for notification providers to ensure only valid http/https URLs are accepted.
- Implemented tests for URL validation scenarios in the Notifications component.
- Updated translations for error messages related to invalid URLs in multiple languages.
- Introduced new hooks for managing security headers and access lists in tests.
- Enhanced the ProviderForm component to reset state correctly when switching between add and edit modes.
- Improved user feedback with update indicators after saving changes to notification providers.
- Added mock implementations for new hooks in various test files to ensure consistent testing behavior.
- Updated design documentation to reflect the new Playwright-first approach for frontend testing, including orchestration flow and runbook notes.
- Revised requirements to align with the new frontend test iteration strategy, emphasizing E2E environment management and coverage thresholds.
- Expanded tasks to outline phased implementation for frontend testing, including Playwright E2E baseline, backend triage, and coverage validation.
- Enhanced QA report to capture frontend coverage failures and type errors, with detailed remediation steps for accessibility compliance.
- Created new security validation and accessibility remediation reports for CrowdSec configuration, addressing identified issues and implementing fixes.
- Adjusted package.json scripts to prioritize Firefox for Playwright tests.
- Added canonical links for requirements and tasks documentation.
- Standardized E2E base URL to 127.0.0.1 to resolve cookie domain 401 errors
- Updated playwright config to strictly exclude security tests from main shards
- Refactored waitForModal helper to prevent strict mode violations on complex modals
- Fixed leak of crowdsec diagnostics tests into standard chromium project
Moved "Group B: Security Configuration Workflow" from the integration
suite to the dedicated security suite. These tests require Cerberus
middleware to be enabled, which is only present in the security shard.
Extracted Group B tests to workflow-security.spec.ts
Removed Group B from multi-feature-workflows.spec.ts
Prevents false validation failures in non-security CI environments
Changed 4 files
Fixed syntax errors in playwright.config.js (duplicate identifiers)
Verified all E2E and Integration workflows have correct push triggers
Confirmed immediate feedback loop for feature/hotfix branches
Validated E2E environment by running core test suite (100% pass)
Corrected JSX syntax errors in CrowdSecConfig and ProxyHostForm
Refactored ProxyHostForm to use shadcn Dialog, fixing z-index issues and unclickable modals
Removed duplicate logic blocks causing YAML errors in crowdsec-integration and e2e-tests workflows
Synced .version file with current git tag to satisfy validation checks
Restructure 7 modal components to use 3-layer architecture preventing
native select dropdown menus from being blocked by modal overlays.
Components fixed:
- ProxyHostForm: ACL selector and Security Headers dropdowns
- User management: Role and permission mode selection
- Uptime monitors: Monitor type selection (HTTP/TCP)
- Remote servers: Provider selection dropdown
- CrowdSec: IP ban duration selection
The fix separates modal background overlay (z-40) from form container
(z-50) and enables pointer events only on form content, allowing
native dropdown menus to render above all modal layers.
Resolves user inability to select security policies, user roles,
monitor types, and other critical configuration options through
the UI interface.
Replace name-based bouncer validation with actual LAPI authentication
testing. The previous implementation checked if a bouncer NAME existed
but never validated if the API KEY was accepted by CrowdSec LAPI.
Key changes:
- Add testKeyAgainstLAPI() with real HTTP authentication against
/v1/decisions/stream endpoint
- Implement exponential backoff retry (500ms → 5s cap) for transient
connection errors while failing fast on 403 authentication failures
- Add mutex protection to prevent concurrent registration race conditions
- Use atomic file writes (temp → rename) for key persistence
- Mask API keys in all log output (CWE-312 compliance)
Breaking behavior: Invalid env var keys now auto-recover by registering
a new bouncer instead of failing silently with stale credentials.
Includes temporary acceptance of 7 Debian HIGH CVEs with documented
mitigation plan (Alpine migration in progress - issue #631).
- Implemented `diagnose-crowdsec.sh` script for checking CrowdSec connectivity and configuration.
- Added E2E tests for CrowdSec console enrollment, including API checks for enrollment status, diagnostics connectivity, and configuration validation.
- Created E2E tests for CrowdSec diagnostics, covering configuration file validation, connectivity checks, and configuration export.
Phase 3 coverage improvement campaign achieved primary objectives
within budget, bringing all critical code paths above quality thresholds
while identifying systemic infrastructure limitations for future work.
Backend coverage increased from 83.5% to 84.2% through comprehensive
test suite additions spanning cache invalidation, configuration parsing,
IP canonicalization, URL utilities, and token validation logic. All five
targeted packages now exceed 85% individual coverage, with the remaining
gap attributed to intentionally deferred packages outside immediate scope.
Frontend coverage analysis revealed a known compatibility conflict between
jsdom and undici WebSocket implementations preventing component testing of
real-time features. Created comprehensive test suites totaling 458 cases
for security dashboard components, ready for execution once infrastructure
upgrade completes. Current 84.25% coverage sufficiently validates UI logic
and API interactions, with E2E tests providing WebSocket feature coverage.
Security-critical modules (cerberus, crypto, handlers) all exceed 86%
coverage. Patch coverage enforcement remains at 85% for all new code.
QA security assessment classifies current risk as LOW, supporting
production readiness.
Technical debt documented across five prioritized issues for next sprint,
with test infrastructure upgrade (MSW v2.x) identified as highest value
improvement to unlock 15-20% additional coverage potential.
All Phase 1-3 objectives achieved:
- CI pipeline unblocked via split browser jobs
- Root cause elimination of 91 timeout anti-patterns
- Coverage thresholds met for all priority code paths
- Infrastructure constraints identified and mitigation planned
Related to: #609 (E2E Test Triage and Beta Release Preparation)
- Updated access-lists-crud.spec.ts to replace multiple instances of page.waitForTimeout with waitForModal and waitForDebounce for improved test reliability.
- Modified authentication.spec.ts to replace a fixed wait time with waitForDebounce to ensure UI reacts appropriately to API calls.
- Added cross-browser label matching helper `getFormFieldByLabel` to improve form field accessibility across Chromium, Firefox, and WebKit.
- Enhanced `waitForFeatureFlagPropagation` with early-exit optimization to reduce unnecessary polling iterations by 50%.
- Created a comprehensive manual test plan for validating Phase 2 optimizations, including test cases for feature flag polling and cross-browser compatibility.
- Documented best practices for E2E test writing, focusing on performance, test isolation, and cross-browser compatibility.
- Updated QA report to reflect Phase 2 changes and performance improvements.
- Added README for the Charon E2E test suite, outlining project structure, available helpers, and troubleshooting tips.
- Added initial feature flag state verification before tests to ensure a stable starting point.
- Implemented retry logic with exponential backoff for toggling feature flags, improving resilience against transient failures.
- Introduced `waitForFeatureFlagPropagation` utility to replace hard-coded waits with condition-based verification for feature flag states.
- Added advanced test scenarios for handling concurrent toggle operations and retrying on network failures.
- Updated existing tests to utilize the new retry and propagation utilities for better reliability and maintainability.
Implemented global 401 response handling to properly redirect users
to login when their session expires:
Changes:
frontend/src/api/client.ts: Added setAuthErrorHandler() callback
pattern and enhanced 401 interceptor to notify auth context
frontend/src/context/AuthContext.tsx: Register auth error handler
that clears state and redirects to /login on 401 responses
tests/core/authentication.spec.ts: Fixed test to clear correct
localStorage key (charon_auth_token)
The implementation uses a callback pattern to avoid circular
dependencies while keeping auth state management centralized.
Auth endpoints (/auth/login, /auth/me) are excluded from the
redirect to prevent loops during initial auth checks.
All 16 authentication E2E tests now pass including:
should redirect to login when session expires
should handle 401 response gracefully
Closes frontend-auth-guard-reload.md
Fixed TEST issues (5 tests):
proxy-hosts.spec.ts: Added dismissDomainDialog() helper to handle
"New Base Domain Detected" modal before Save button clicks
auth-fixtures.ts: Updated logoutUser() to use text-based selector
that matches emoji button (🚪 Logout)
authentication.spec.ts: Added wait time for 401 response handling
to allow UI to react before assertion
Tracked CODE issue (1 test):
Created frontend-auth-guard-reload.md for session
expiration redirect failure (requires frontend code changes)
Test results: 247/252 passing (98% pass rate)
Before fixes: 242/252 (96%)
Improvement: +5 tests, +2% pass rate
Part of E2E testing initiative per Definition of Done
- Updated current specification to reflect the integration of Staticcheck into pre-commit hooks.
- Added problem statement, success criteria, and implementation plan for Staticcheck integration.
- Enhanced QA validation report to confirm successful implementation of Staticcheck pre-commit blocking.
- Created new Playwright configuration and example test cases for frontend testing.
- Updated package.json and package-lock.json to include Playwright and related dependencies.
- Archived previous QA report for CI workflow documentation updates.
- Mark current specification as complete and ready for the next task.
- Document completed work on CI/CD workflow fixes, including implementation summary and QA report links.
- Archive previous planning documents related to GitHub security warnings.
- Revise QA report to reflect the successful validation of CI workflow documentation updates, with zero high/critical issues found.
- Add new QA report for Grype SBOM remediation implementation, detailing security scans, validation results, and recommendations.
- Removed outdated security remediation plan for DoD failures, indicating no active specifications.
- Documented recent completion of Grype SBOM remediation, including implementation summary and QA report.
- Updated QA report to reflect successful validation of security scans with zero HIGH/CRITICAL findings.
- Deleted the previous QA report file as its contents are now integrated into the current report.