-
Notifications
You must be signed in to change notification settings - Fork 687
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release SecureDrop 0.8.0 #3512
Comments
Please update the table in the issue with an additional ✔️ or ❌ once testing is complete, and log issues as required. ChecklistFor both upgrades and fresh installs, here is a list of functionality that requires testing. You can use this for copy/pasting into your QA report. Basic Server Testing
Command Line User Generation
Administration
Application Acceptance TestingSource InterfaceLanding page base cases
First submission base cases
Returning source base cases
Journalist InterfaceLogin base cases
Index base cases
Individual source page
0.8.0 specific testingWhen reporting the results, please specify: 4.4.135 Kernel Testing (#3494)
Alembic testingIf you are doing an upgrade test
If you are doing a clean install test
Other 0.8.0 functionality
|
0.7.0 w/ 3.14.79 -> 0.8.0 upgrade, Mac mini with HTTPS on source interface (In progress)Basic Server Testing
Command Line User Generation
Administration
Application Acceptance TestingSource InterfaceLanding page base cases
First submission base cases
Returning source base cases
Journalist InterfaceLogin base cases
Index base cases
Individual source page
0.8.0 specific testingWhen reporting the results, please specify: 4.4.135 Kernel Testing (#3494)
Alembic testingIf you are doing an upgrade test
If you are doing a clean install test
Other 0.8.0 functionality
|
0.8.0~rc1 fresh install in VMsHardware: VMs Basic Server Testing
Command Line User Generation
Administration
0.8.0 specific testing4.4.135 Kernel Testing (#3494)
Alembic testing
Other 0.8.0 functionality
|
0.8.0~rc1 fresh install on Gigabyte BrixCredit goes to @edenemmanuel for the meticulous setup here, I'm just stepping in to run through the checklist. Skipping the application acceptance testing, since the focus was to validate hardware support, particularly with the kernel version bump. Hardware: Gigabyte Brix Basic Server Testing
Command Line User Generation
Administration
0.8.0 specific testing4.4.135 Kernel Testing (#3494)
Alembic testing
Other 0.8.0 functionality
|
0.8.0~rc2 fresh install in VMsHardware: VMs Basic Server Testing
Command Line User Generation
Administration
Application Acceptance TestingSource InterfaceLanding page base cases
First submission base cases
Returning source base cases
Journalist InterfaceLogin base cases
Index base cases
Individual source page
0.8.0 specific testing4.4.135 Kernel Testing (#3494)
Alembic testing
Other 0.8.0 functionality
|
0.8.0~rc2 upgrade testing with 3.14 kernel hold-back on HWHardware: NUCs 4.4.135 Kernel Testing (#3494)
Alembic testingIf you are doing an upgrade test
Other 0.8.0 functionality
|
0.8.0~rc2 rolled back upgrade test on 1U serversHardware: HP Proliant DL385 G7 & PowerEdge R620 Basic Server Testing
Command Line User Generation
Administration
0.8.0 specific testing4.4.135 Kernel Testing (#3494)
Alembic testing
Other 0.8.0 functionality
|
0.7.0 w/ 4.4.115 kernel-> 0.8.0~rc2 upgradeHardware: Mac minis Basic Server Testing
Command Line User Generation
Administration
0.8.0 specific testing4.4.135 Kernel Testing (#3494)
Alembic testing
Other 0.8.0 functionality
|
See notes in the testing matrix, related to the rolled back upgrade test above. Notably the PowerEdge was still showing Spectre problems. I assume that a BIOS update would resolve, but have not tried this to confirm. The new kernel was stable, so I don't view this as a release blocker, but something we should keep an eye on. |
@conorsch the current 4.4.135 rc kernel should be not vulnerable to the following:
Mitigations for the following should not yet be present:
Given incomplete upstream mitigations and lack of QA time, I suggest we wait until the next release to address these (noting that an attacker would need code execution on the machine to exploit these)
|
U2 Servers Test (fresh install using rc2 debs)Basic Server Testing
Command Line User Generation
0.8.0 specific testing4.4.135 Kernel Testing (#3494)
If you are doing a clean install test
Other 0.8.0 functionality
|
0.8.0~rc3 update in VMsHardware: VMs Basic Server Testing
Command Line User Generation
Administration
Application Acceptance TestingSource InterfaceLanding page base cases
First submission base cases
Returning source base cases
Journalist InterfaceLogin base cases
Index base cases
Individual source page
0.8.0 specific testing4.4.135 Kernel Testing (#3494)
Alembic testing
Other 0.8.0 functionality
|
This is a tracking issue for the upcoming release of SecureDrop 0.8.0 - tasks may get added or modified.
Feature freeze: June 12, 2018
String freeze: June 19, 2018
Pre-release announcement: June 19, 2018
Release date: June 26, 2018
SecureDrop maintainers and testers: As you QA 0.8.0, please report back your testing results as comments on this ticket. File GitHub issues for any problems found, tag them "QA: Release", and associate them with the 0.8 milestone for tracking.
Test debian packages will be posted on https://apt-test.freedom.press signed with the test key. An Ansible playbook testing the upgrade path is here.
Prepare release candidate (0.8.0~rc1)
0.3.3.7
is currently on apt-test)release/0.8
offdevelop
- @redshiftzero0.8.0~rc1
on test apt server - @emkllQA Matrix for SecureDrop 0.8.0
After each test, please update the QA matrix and post details for Basic Server Testing, Application Acceptance Testing and 0.8.0-specific testing below.
Final release
linux-image
,linux-firmware
, andtor
)The text was updated successfully, but these errors were encountered: