-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release securedrop-workstation 0.3.0 #548
Comments
(Added draft test plan to issue body.) |
Scenario: UninstallStarting with uninstall of my automatically updated RPM so I can do a fresh install of RC1:
Tag removal output:
|
Fresh install
Note: I did see #519 during the first run, but unfortunately lost the output from that. Second run resolved. |
Scenario: Running preflight updater#522, and #531 (merged in #532)
Scenario: Post-install configuration#526 and #529 (merged in #533)
|
Scenario: fedora-31 upgradeEnvironment type: Qubes staging, Updated to fedora-31.
Now re-testing export flow. |
🎉 USB auto-attach logic to |
Scenario: Post-install configuration
|
Closed via freedomofpress/securedrop-yum-prod#7 |
This is a placeholder to track the release of the securedrop-workstation 0.3.0 RPM containing updated provisioning code.
QA Period
Final Release
Release-specific test plan
Draft added by @eloquence below, 2020-05-19
Scenario: Fresh install
Fixes for #527 (merged in #530) and #514 (merged in #535)
Scenario: Running preflight updater
#522, and #531 (merged in #532)
tail -f ~/.securedrop_launcher/logs/launcher.logs
in adom0
terminal (you cantouch
the file to create it if it does not exist yet). This will give you a real-time view of log entries added by the updater.dom0
using/opt/securedrop/launcher/sdw-launcher.py --skip-delta 0
(this ensures that it will run even if no updates are available)sd-app-buster-template
.sd-app-buster-template
is shut down in the final stage of the updatesys-usb
is successfully restarted after updatesScenario: Post-install configuration
#526 and #529 (merged in #533)
sd-send-app-clipboard
,sd-receive-app-clipboard
andsd-receive-logs
tag to select VMs by following the end user documentation. See the detailed test plan in freedomofpress/securedrop-workstation#533, as well:qvm-copy
are in effect where expectedqvm-copy
andqvm-copy-to-vm
commands are still prohibited for VMs not whitelisted via tagsScenario: Uninstall
#526
/etc/qubes-rpc/policy/qubes.ClipboardPaste
and/etc/qubes-rpc/policy/qubes.Filecopy
are reset to their original valuesThe text was updated successfully, but these errors were encountered: