mirror of
https://github.com/freedomofpress/dangerzone.git
synced 2025-04-28 18:02:38 +02:00
Update our release/QA instructions for Qubes
Update the release/QA instructions for Qubes, so that they take into account the fact that we can now publish a Qubes RPM through our official repos.
This commit is contained in:
parent
c94c8c8ba5
commit
af7087af65
2 changed files with 22 additions and 39 deletions
36
RELEASE.md
36
RELEASE.md
|
@ -61,20 +61,13 @@ and newer platforms, we have to do the following:
|
|||
- [ ] Run the Dangerzone tests.
|
||||
- [ ] Create an .rpm package and install it system-wide.
|
||||
- [ ] Test some QA scenarios (see [Scenarios](#Scenarios) below).
|
||||
- [ ] Create a test build in the most recent Fedora template in Qubes OS (Fedora 38 as of
|
||||
writing this) and make sure it works:
|
||||
- [ ] Create a test build in the most recent Qubes Fedora template (Fedora 38 as
|
||||
of writing this) and make sure it works:
|
||||
- [ ] Create a new development environment with Poetry.
|
||||
- [ ] Build the container image and ensure the development environment uses
|
||||
the new image.
|
||||
- [ ] Run the Dangerzone tests and confirm that the tests are ran using containers
|
||||
instead of disposable qubes
|
||||
- [ ] Run the Dangerzone tests with the env var `QUBES_CONVERSION=1` and confirm that
|
||||
the tests are ran using diposable qubes instead of containers
|
||||
- [ ] Create an .rpm with `./install/linux/build-rpm.py` package and
|
||||
install it in a fedora qube and make sure conversions run with containers
|
||||
- [ ] Create an .rpm with `./install/linux/build-rpm.py --qubes` package and
|
||||
install it following the instructions in `BUILD.md`
|
||||
- [ ] Test some QA scenarios (see [Scenarios](#Scenarios) below).
|
||||
- [ ] Run the Dangerzone tests.
|
||||
- [ ] Create a Qubes .rpm package and install it system-wide.
|
||||
- [ ] Test some QA scenarios (see [Scenarios](#Scenarios) below) and make sure
|
||||
they spawn disposable qubes.
|
||||
|
||||
### Scenarios
|
||||
|
||||
|
@ -166,13 +159,6 @@ REPOSITORY TAG IMAGE ID CREATED SIZE
|
|||
dangerzone.rocks/dangerzone latest <different ID> <newer date> <different size>
|
||||
```
|
||||
|
||||
#### 10. Ensure in Qubes disposable qubes are used by default
|
||||
|
||||
_(Only for Qubes OS)_
|
||||
|
||||
Run a conversion on Qubes and ensure that it uses disposable qubes by default.
|
||||
|
||||
|
||||
## Pre-release
|
||||
|
||||
Before making a release, all of these should be complete:
|
||||
|
@ -330,6 +316,16 @@ Create a .rpm:
|
|||
Publish the .rpm under `./dist` to the
|
||||
[`freedomofpress/yum-tools-prod`](https://github.com/freedomofpress/yum-tools-prod) repo, by sending a PR. Follow the instructions in that repo on how to do so.
|
||||
|
||||
#### Qubes
|
||||
|
||||
Create a .rpm for Qubes:
|
||||
|
||||
```sh
|
||||
./install/linux/build-rpm.py --qubes
|
||||
```
|
||||
|
||||
and similarly publish it to the [`freedomofpress/yum-tools-prod`](https://github.com/freedomofpress/yum-tools-prod)
|
||||
repo.
|
||||
|
||||
## Publishing the release
|
||||
|
||||
|
|
|
@ -62,20 +62,13 @@ and newer platforms, we have to do the following:
|
|||
- [ ] Run the Dangerzone tests.
|
||||
- [ ] Create an .rpm package and install it system-wide.
|
||||
- [ ] Test some QA scenarios (see [Scenarios](#Scenarios) below).
|
||||
- [ ] Create a test build in the most recent Fedora template in Qubes OS (Fedora 38 as of
|
||||
writing this) and make sure it works:
|
||||
- [ ] Create a test build in the most recent Qubes Fedora template (Fedora 38 as
|
||||
of writing this) and make sure it works:
|
||||
- [ ] Create a new development environment with Poetry.
|
||||
- [ ] Build the container image and ensure the development environment uses
|
||||
the new image.
|
||||
- [ ] Run the Dangerzone tests and confirm that the tests are ran using containers
|
||||
instead of disposable qubes
|
||||
- [ ] Run the Dangerzone tests with the env var `QUBES_CONVERSION=1` and confirm that
|
||||
the tests are ran using diposable qubes instead of containers
|
||||
- [ ] Create an .rpm with `./install/linux/build-rpm.py` package and
|
||||
install it in a fedora qube and make sure conversions run with containers
|
||||
- [ ] Create an .rpm with `./install/linux/build-rpm.py --qubes` package and
|
||||
install it following the instructions in `BUILD.md`
|
||||
- [ ] Test some QA scenarios (see [Scenarios](#Scenarios) below).
|
||||
- [ ] Run the Dangerzone tests.
|
||||
- [ ] Create a Qubes .rpm package and install it system-wide.
|
||||
- [ ] Test some QA scenarios (see [Scenarios](#Scenarios) below) and make sure
|
||||
they spawn disposable qubes.
|
||||
"""
|
||||
|
||||
CONTENT_QA_SCENARIOS = r"""### Scenarios
|
||||
|
@ -167,12 +160,6 @@ $ podman images dangerzone.rocks/dangerzone:latest
|
|||
REPOSITORY TAG IMAGE ID CREATED SIZE
|
||||
dangerzone.rocks/dangerzone latest <different ID> <newer date> <different size>
|
||||
```
|
||||
|
||||
#### 10. Ensure in Qubes disposable qubes are used by default
|
||||
|
||||
_(Only for Qubes OS)_
|
||||
|
||||
Run a conversion on Qubes and ensure that it uses disposable qubes by default.
|
||||
"""
|
||||
|
||||
CONTENT_BUILD_DEBIAN_UBUNTU = r"""## Debian/Ubuntu
|
||||
|
|
Loading…
Reference in a new issue