# QA Audit Remediation Plan: DNS Provider E2E Test Fixes ## Executive Summary **Date**: February 1, 2026 **Source**: QA Audit Report (`docs/reports/qa_report_dns_provider_e2e_fixes.md`) **Status**: **🔴 CRITICAL - 3 Blocking Issues Require Resolution** **Approval Gate**: Must resolve Issues 1 & 2 before merge approval **Planning Agent**: Principal Architect (Planning Mode) **Confidence Score**: 90% (High Confidence - Clear requirements, established patterns) This plan addresses three critical issues identified during comprehensive QA audit: 1. **E2E Firefox Test Instability** (CRITICAL - BLOCKS MERGE) 2. **Backend Coverage 24.7%** (CRITICAL - BLOCKS MERGE) 3. **Docker Image 7 HIGH CVEs** (HIGH - REQUIRES DOCUMENTATION) **Classification**: **Multi-Phase Remediation** - Test stability fixes, coverage verification, and security documentation. **Original CI Job**: https://github.com/Wikid82/Charon/actions/runs/21558579945/job/62119064955?pr=583 --- ## Phase 1: ANALYZE ### Requirements (EARS Notation) **REQ-1: Firefox E2E Test Stability** (CRITICAL) - WHEN a Playwright E2E test selects Webhook or RFC2136 provider type, THE SYSTEM SHALL reliably wait for the "Credentials" section to appear before asserting field visibility - WHEN running 10 consecutive Firefox tests, THE SYSTEM SHALL pass all tests without timeout failures - IF a test waits for the "Credentials" section, THEN THE SYSTEM SHALL use a data-testid attribute with a timeout of at least 10 seconds to accommodate slower Firefox rendering **REQ-2: Backend Coverage Verification** (CRITICAL) - WHEN backend tests are executed with coverage enabled, THE SYSTEM SHALL generate coverage ≥85% total after excluding infrastructure packages - WHEN coverage is measured, THE SYSTEM SHALL use fresh test data from current code state, not stale coverage files - IF coverage is below 85%, THEN THE SYSTEM SHALL identify specific uncovered packages and functions for targeted test addition **REQ-3: Docker Security Documentation** (HIGH) - WHEN 7 HIGH severity CVEs are detected in base OS libraries, THE SYSTEM SHALL document risk acceptance with justification - WHEN CVEs have no patches available, THE SYSTEM SHALL establish monitoring process for Debian security advisories - WHERE Docker image is deployed, THE SYSTEM SHALL communicate risk to stakeholders and security team ### Confidence Score: 90% **Rationale**: - ✅ **Clear Requirements**: QA report provides specific error messages, file paths, and recommendations - ✅ **Established Patterns**: Similar test fixes exist in codebase (e.g., wait for network idle, semantic locators) - ✅ **Tooling Available**: Backend coverage skill, E2E rebuild skill, and testing protocols documented - ⚠️ **Coverage Unknown**: Backend coverage of 24.7% may be stale; requires verification before proceeding - ✅ **Risk Assessment**: CVE impact analysis provided in QA report with mitigation factors **Execution Strategy**: High Confidence → Proceed with comprehensive plan, skip PoC phase. --- ## Phase 2: DESIGN ### Technical Specifications #### Issue 1: Firefox E2E Test Instability **Root Cause Analysis** (per Supervisor Review): 1. **Element Type**: "Credentials" is a `