Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Test with Tor Browser 14 / Firefox 128 ESR #7229

Closed
legoktm opened this issue Sep 16, 2024 · 4 comments
Closed

Test with Tor Browser 14 / Firefox 128 ESR #7229

legoktm opened this issue Sep 16, 2024 · 4 comments
Assignees

Comments

@legoktm
Copy link
Member

legoktm commented Sep 16, 2024

Description

Tor Browser 14 is currently going through alpha testing right now: https://blog.torproject.org/new-alpha-release-tor-browser-140a1/

This brings in Firefox ESR 128 (from 115), we should test that basic SI and JI functionality works correctly.

Previously: #6956.

@legoktm legoktm moved this to Ready to go in SecureDrop dev cycle Sep 16, 2024
@nathandyer nathandyer self-assigned this Sep 17, 2024
@nathandyer nathandyer moved this from Ready to go to In Progress in SecureDrop dev cycle Sep 17, 2024
@nathandyer
Copy link
Contributor

Spent a while this afternoon thoroughly testing Tor Browser 14 (14.0a5) with both the Source and Journalist Interfaces of my personal SD instance. The short version is, everything is working perfectly and appears no different than with the current stable release of Tor Browser. Specifically, I tested:

Source Interface

  • Generating a new code name with the "Get Started" button
  • Sending a message
  • Sending a document
  • Viewing a Journalist reply
  • Deleting a Journalist reply
  • Logging out
  • Logging back in with existing code name

Journalist Interface

  • Logging in with username, passphrase, and 2FA token
  • Viewing a submission
  • Downloading messages and documents
  • Sending a reply
  • Starring/unstarring submissions
  • Selecting and downloading a submission
  • Selecting and downloading unread submissions

Going to tentatively mark this as done, but happy to test any additional items I might have missed

@nathandyer nathandyer moved this from In Progress to Done in SecureDrop dev cycle Sep 17, 2024
@legoktm
Copy link
Member Author

legoktm commented Sep 17, 2024

Yay! The only other thing I can think of testing is short onion names.

@nathandyer
Copy link
Contributor

Good idea! I confirmed that the SD HTTPS-everywhere-ruleset is still present in about:rulesets, and I was able to load a well-known public SecureDrop instance using their Short Onion Name.

@legoktm
Copy link
Member Author

legoktm commented Oct 23, 2024

Note that our CI needed some updates for TB14 (74ff170), but that's all taken care of now.

@legoktm legoktm closed this as completed Oct 23, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Archived in project
Development

No branches or pull requests

2 participants