Files
Charon/test-output.txt
GitHub Actions c3b20bff65 test: implement Caddy import E2E gap tests
Add 11 Playwright E2E tests covering Caddy import functionality gaps:

Success modal navigation and button actions (Gap 1)
Conflict details expansion with side-by-side comparison (Gap 2)
Overwrite resolution flow for existing hosts (Gap 3)
Session resume via banner (Gap 4 - skipped, documented limitation)
Custom name editing in review table (Gap 5)
Fixes:

backend/internal/caddy/importer.go: Handle errcheck lint errors
Result: 9 tests passing, 2 skipped with documented reason
2026-01-31 02:15:13 +00:00

75 lines
3.4 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters
This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
[dotenv@17.2.3] injecting env (2) from .env -- tip: ⚙️ suppress all logs with { quiet: true }
🧹 Running global test setup...
🔐 Validating emergency token configuration...
🔑 Token present: f51dedd6...346b
✓ Token length: 64 chars (valid)
✓ Token format: Valid hexadecimal
✓ Token appears to be unique (not a placeholder)
✅ Emergency token validation passed
📍 Base URL: http://localhost:8080
⏳ Waiting for container to be ready at http://localhost:8080...
✅ Container ready after 1 attempt(s) [2000ms]
└─ Hostname: localhost
├─ Port: 8080
├─ Protocol: http:
├─ IPv6: No
└─ Localhost: Yes
📊 Port Connectivity Checks:
🔍 Checking Caddy admin API health at http://localhost:2019...
✅ Caddy admin API (port 2019) is healthy [10ms]
🔍 Checking emergency tier-2 server health at http://localhost:2020...
✅ Emergency tier-2 server (port 2020) is healthy [7ms]
✅ Connectivity Summary: Caddy=✓ Emergency=✓
🔓 Performing emergency security reset...
🔑 Token configured: f51dedd6...346b (64 chars)
📍 Emergency URL: http://localhost:2020/emergency/security-reset
📊 Emergency reset status: 200 [16ms]
✅ Emergency reset successful [16ms]
✓ Disabled modules: security.rate_limit.enabled, security.crowdsec.enabled, security.crowdsec.mode, feature.cerberus.enabled, security.cerberus.enabled, security.acl.enabled, security.waf.enabled
⏳ Waiting for security reset to propagate...
✅ Security reset complete [520ms]
🔍 Checking application health...
✅ Application is accessible
🗑️ Cleaning up orphaned test data...
Force cleanup completed: {"proxyHosts":0,"accessLists":0,"dnsProviders":0,"certificates":0}
No orphaned test data found
✅ Global setup complete
🔓 Performing emergency security reset...
🔑 Token configured: f51dedd6...346b (64 chars)
📍 Emergency URL: http://localhost:2020/emergency/security-reset
📊 Emergency reset status: 200 [12ms]
✅ Emergency reset successful [12ms]
✓ Disabled modules: security.crowdsec.mode, feature.cerberus.enabled, security.cerberus.enabled, security.acl.enabled, security.waf.enabled, security.rate_limit.enabled, security.crowdsec.enabled
⏳ Waiting for security reset to propagate...
✅ Security reset complete [515ms]
✓ Authenticated security reset complete
🔒 Verifying security modules are disabled...
✅ Security modules confirmed disabled
Running 173 tests using 2 workers
[dotenv@17.2.3] injecting env (0) from .env -- tip: ✅ audit secrets and track compliance: https://dotenvx.com/ops
[1/173] [setup] tests/auth.setup.ts:26:1 authenticate
[setup] tests/auth.setup.ts:26:1 authenticate
Logging in as test user...
Login successful
Auth state saved to /projects/Charon/playwright/.auth/user.json
✅ Cookie domain "localhost" matches baseURL host "localhost"
[dotenv@17.2.3] injecting env (0) from .env -- tip: ⚙️ write to custom object with { processEnv: myObject }
[2/173] [security-tests] tests/security/audit-logs.spec.ts:26:5 Audit Logs Page Loading should display audit logs page
[3/173] [security-tests] tests/security/audit-logs.spec.ts:47:5 Audit Logs Page Loading should display log data table
[4/173] [security-tests] tests/security/audit-logs.spec.ts:88:5 Audit Logs Log Table Structure should display timestamp column