Skip to content

2.12.0 Test Plan

Cory Francis Myers edited this page Mar 5, 2025 · 5 revisions

2.12.0 QA Checklist

For both upgrades and fresh installs, here is a list of functionality that requires testing. You can use this for copy/pasting into your QA report.

If you have submitted a QA report already for a release candidate with successful basic server testing and application acceptance testing sections, then you can skip these sections in subsequent reports, unless otherwise indicated by the Release Manager. This is to ensure that you focus your QA effort on the release-specific changes as well as changes since the previous release candidate.

Notes:

  • if testing an upgrade scenario, the initial 2.11.1 install should include hi as a supported locale, to facilitate testing its removal in 2.12.0

Environment

  • Install target:
  • Tails version:
  • Test Scenario:
    • Noble fresh install
    • focal 2.11.1 upgrade to focal 2.12.0
    • focal 2.11.1 upgrade to focal 2.12.0, auto-update to noble
    • focal 2.11.1 upgrade to focal 2.12.0, triggered update to noble
  • SSH over Tor?:
  • Tor PoW enabled?:
  • Release candidate:
  • General notes:

Basic Server Testing

  • After installing the testinfra dependencies, all tests in ./securedrop-admin verify are passing:
    • Install dependencies on Admin Workstation with cd ~/Persistent/securedrop && ./securedrop-admin setup -t
    • Run tests with ./securedrop-admin verify (this will take a while)
    • Remove test dependencies: rm -rf admin/.venv3/ && ./securedrop-admin setup
  • QA Matrix checks pass

Command Line User Generation

  • Can successfully add admin user and login

(Optional) Administration

  • I have backed up and successfully restored the app server following the backup documentation
  • If doing upgrade testing, make a backup on 2.11.1 and restore this backup on this release candidate, verifying that the Redis password in /etc/redis/redis.conf changes
  • "Send Test OSSEC Alert" button in the journalist triggers an OSSEC alert and an email is sent
  • Can successfully add journalist account with HOTP authentication

(Optional after first pass) Application Acceptance Testing

Source Interface

Landing page base cases
  • JS warning bar does not appear when using Security Slider high
  • JS warning bar does appear when using Security Slider Low
First submission base cases
  • On generate page, refreshing page produces a new 7-word codename
  • On submit page, empty submissions produce flashed message
  • On submit page, short message submitted successfully
  • On submit page, file greater than 500 MB produces "The connection was reset" in Tor Browser quickly before the entire file is uploaded
  • On submit page, file less than 500 MB submitted successfully
Returning source base cases
  • Nonexistent codename cannot log in
  • Empty codename cannot log in
  • Legitimate codename can log in
  • Returning user can view journalist replies - need to log into journalist interface to test

Journalist Interface

Login base cases
  • Can log in with 2FA tokens
  • incorrect password cannot log in
  • invalid 2fa token cannot log in
  • 2fa immediate reuse cannot log in
  • Journalist account with HOTP can log in
Index base cases
  • Filter by codename works
  • Starring and unstarring works
  • Click select all selects all submissions
  • Selecting all and clicking "Download" works
Individual source page
  • You can submit a reply and a flashed message and new row appears
  • You cannot submit an empty reply
  • Clicking "Delete Source Account" and the source and docs are deleted
  • You can click on a document and successfully decrypt using application private key

Basic Tails Testing

After updating to this release candidate and running securedrop-admin tailsconfig

  • The Updater GUI appears on boot

2.12.0 release-specific changes

Support disabling languages (#7443, #7451)

  • upgrade-only - verify that after upgrading an installation initially configured with hi as a locale, hi is no longer available in the dropdown
  • verify that hi is not available as an option when stepping through ./securedrop-admin sdconfig

Noble manual upgrade (#7427)

Upgrade-only On both servers, when testing against RCs:

  • Add the apt-test public key with cat <keyfile> | apt-key add -
  • edit /lib/systemd/system/securedrop-noble-migration-upgrade.service to add the line Environment=EXTRA_APT_SOURCE="deb [trusted=yes] https://apt-test.freedom.press/ noble main" On the Admin Workstation:
  • Ensure the Admin Workstation securedrop code is updated to 2.12.0 (or the latest RC)
  • Run ./securedrop-admin --force noble_migration and verify that it completes successfully

Once the migration is complete:

  • Verify that ./securedrop-admin verify passes
  • Verify that acceptance tests above still pass
  • Verify that OSSEC alerts are being received.

Noble automated upgrade (#7406)

On the app server:

  • Add the apt-test public key with cat <keyfile> | apt-key add -
  • edit /lib/systemd/system/securedrop-noble-migration-upgrade.service to add the line Environment=EXTRA_APT_SOURCE="deb [trusted=yes] https://apt-test.freedom.press noble main"
  • verify /etc/securedrop-noble-migration-state.json was created with {"finished": None, "bucket": 1-5}.
  • edit /usr/share/securedrop/noble-upgrade.json, to set app.enabled = true and app.bucket = 5.
  • Verify that the securedrop-noble-migration-upgrade systemd timer starts within 3 minutes approx.
  • Verify that the server reboots and that /etc/securedrop-noble-migration-state.json shows that the upgrade has finished the PendingUpdates stage.
  • Verify that the securedrop-noble-migration-upgrade systemd timer starts again within 3 minutes approx and apt updates begin.
  • Verify that the SI/JI are unreachable (apache is masked) during the upgrade process
  • Verify that the system reboots again, and on reboot /etc/securedrop-noble-migration-state.json,s stage should be Reboot.
  • Verify that the time triggers again and that the stage moves to Done soon after.
  • Verify that the OS is now Noble via cat /etc/os-release.

On the mon server:

  • Add the apt-test public key with cat <keyfile> | apt-key add -
  • edit /lib/systemd/system/securedrop-noble-migration-upgrade.service to add the line Environment=EXTRA_APT_SOURCE="deb [trusted=yes] https://apt-test.freedom.press noble main"
  • verify /etc/securedrop-noble-migration-state.json was created with {"finished": None, "bucket": 1-5}.
  • edit /usr/share/securedrop/noble-upgrade.json, to set mon.enabled = true and mon.bucket = 5.
  • Verify that the securedrop-noble-migration-upgrade systemd timer starts within 3 minutes approx.
  • Verify that the server reboots and that /etc/securedrop-noble-migration-state.json shows that the upgrade has finished the PendingUpdates stage.
  • Verify that the securedrop-noble-migration-upgrade systemd timer starts again within 3 minutes approx and apt updates begin.
  • Verify that the system reboots again, and on reboot /etc/securedrop-noble-migration-state.json,s stage should be Reboot.
  • Verify that the time triggers again and that the stage moves to Done soon after.
  • Verify that the OS is now Noble via cat /etc/os-release.

Once both servers are updated:

  • Verify that ./securedrop-admin verify passes
  • Verify that acceptance tests above still pass
  • Verify that OSSEC alerts are being received.

Preflight testing

Basic testing

  • Install or upgrade occurs without error (from apt-qa.freedom.press per preflight procedure)
  • Source interface is available and version string indicates it is 2.12.0
  • A message can be successfully submitted

Tails

  • The updater GUI appears on boot
  • The update successfully occurs to 2.12.0
  • After reboot, updater GUI no longer appears
Clone this wiki locally