-
Notifications
You must be signed in to change notification settings - Fork 685
0.13.0 Test plan
- NUC5s
- NUC7s
- Mac Minis
- 1U servers in SF
For both upgrades and fresh installs, here is a list of functionality that requires testing. You can use this for copy/pasting into your QA report. Feel free to edit this message to update the plan as appropriate.
If you have submitted a QA report already for a 0.13.0 release candidate with successful basic server testing and application acceptance testing sections, then you can skip these sections in subsequent reports, unless otherwise indicated by the Release Manager. This is to ensure that you focus your QA effort on the 0.13.0-specific changes as well as changes since the previous release candidate.
Note: if you are testing an upgrade scenario, you should create several sources and submit a large number of files of varying sizes up to the 500MB limit before performing the upgrade. A large dataset is required in order to test the long-running database migration task implemented in #4134.
- Install target:
- Tails version:
- Test Scenario:
- SSH over Tor:
- Release candidate:
- General notes:
- I can access both the source and journalist interfaces
- I can SSH into both machines over Tor
- AppArmor is loaded on app
- 0 processes are running unconfined
- AppArmor is loaded on mon
- 0 processes are running unconfined
- Both servers are running grsec kernels
- iptables rules loaded
- OSSEC emails begin to flow after install
- OSSEC emails are decrypted to correct key and I am able to decrypt them
- QA Matrix checks pass
- Can successfully add admin user and login
- I have backed up and successfully restored the app server following the documentation here: https://docs.securedrop.org/en/latest/backup_and_restore.html
- If doing upgrade testing, make a backup on 0.12.2 and restore this backup on 0.13.0
- "Send Test OSSEC Alert" button in the journalist triggers an OSSEC alert and an email is sent.
- JS warning bar does not appear when using Security Slider high
- JS warning bar does appear when using Security Slider Low (#4211)
- On generate page, refreshing codename produces a new 7-word codename
- On submit page, empty submissions produce flashed message
- On submit page, short message submitted successfully
- On submit page, file greater than 500 MB produces "The connection was reset" in Tor Browser quickly before the entire file is uploaded
- On submit page, file less than 500 MB submitted successfully
- Nonexistent codename cannot log in
- Empty codename cannot log in
- Legitimate codename can log in
- Returning user can view journalist replies - need to log into journalist interface to test
- Can log in with 2FA tokens
- incorrect password cannot log in
- invalid 2fa token cannot log in
- 2fa immediate reuse cannot log in
- Filter by codename works
- Starring and unstarring works
- Click select all selects all submissions
- Selecting all and clicking "Download" works
- You can submit a reply and a flashed message and new row appears
- You cannot submit an empty reply
- Clicking "Delete Source And Submissions" and the source and docs are deleted
- You can click on a document and successfully decrypt using application private key
After updating to this release candidate and running securedrop-admin tailsconfig
- The Updater GUI appears on boot
- Updating occurs without issue
- The message to sources that have been flagged for reply has been updated as implemented in #4428. Verify this by changing line 201 in
/var/www/securedrop/source_app/main.py
fromif entropy_avail >= 2400:
toif entropy_avail >= 2400 and False:
, restarting Apache, creating a source, flagging the source in the Journalist Interface, and logging back in as the source. - When a user attempts to log in twice on the source interface, a single 500 error is returned and the user is logged out, as per #4391. Verify this by opening a browser tab and visiting
/generate
, then opening a second tab and logging in or creating a new codename via/create
, then returning to the first tab and attempting to log in. - The sha256 checksum of a given encrypted submission or reply is returned as the ETag header value in API download responses, as per #4314:
- Upgrade Only: BEFORE upgrade, run the QA loader (https://docs.securedrop.org/en/release-0.12.2/development/database_migrations.html#release-testing-migrations) and also upload a few very large files (~100 MB+). Following the postinst migration task, the
checksum
field in thesubmissions
andreplies
tables is populated with the sha256 hash of the corresponding files. Verify this by checking the Application Servers sqlite database and comparing values. - After a submission has been uploaded and the
checksum
field has been asynchronously updated, the ETag header value in the response to an API request for a file contains the sha256 hash of the file. Verify this by comparing the ETag value of a response to the value in the database - After a submission has been uploaded, but before the
checksum
field has been asynchronously updated, the ETag header value in the response to an API request for a file contains the sha256 hash of the file. Verify this by setting thechecksum
field of a submission tonull
in the database, then dowloading via the API comparing the ETag value of a response to the value in the database after the download.
- Upgrade Only: BEFORE upgrade, run the QA loader (https://docs.securedrop.org/en/release-0.12.2/development/database_migrations.html#release-testing-migrations) and also upload a few very large files (~100 MB+). Following the postinst migration task, the
(API-specific):
- API responses to
/api/v1/sources
include the GPG fingerprint for sources' reply keys in their respectivekey
objects, as implemented in #4436. - Calling
/api/v1/logout
invalidates the user's current authorization token, causing subsequent calls using the same token to fail, as implemented in #4349. - After the time set in
TOKEN_EXPIRATION_MINS
insecuredrop/journalist_app/api.py
, an unused authorization token is invalidated, causing subsequent calls to fail, as implemented in #4349. Verify this by settingTOKEN_EXPIRATION_MINS
to a low value, restarting Apache, creating an auth token, and waiting for the timeout before using it in a call - API calls using the HTTP DELETE method to the
/api/v1/sources/$UUID
endpoint successfully delete the source with uuid$UUID
, along with all related files, as implemented in #4023.
- Ensure the builder image is up-to-date on release day
These tests should be performed the day of release prior to live debian packages on apt.freedom.press
- Install or upgrade occurs without error
- Source interface is available and version string indicates it is 0.13.0
- A message can be successfully submitted
- The updater GUI appears on boot
- The update successfully occurs to 0.13.0
- After reboot, updater GUI no longer appears