Coremodule (talk | contribs) (Created page with "== Basic Objectives == The objectives for all Branched and Rawhide nightly composes, as well as Beta and Final releases, are to: # P...") |
Coremodule (talk | contribs) (Added IoT criteria to the base QA criteria) |
||
Line 26: | Line 26: | ||
{{hidden|header=Supported firmware types|content=Release-blocking images must boot from all system firmware types that are commonly found on the primary architectures. For the x86_64 architecture, UEFI with Secure Boot configured in accordance with Microsoft's Windows certification requirements is considered a 'commonly found' firmware type.|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | {{hidden|header=Supported firmware types|content=Release-blocking images must boot from all system firmware types that are commonly found on the primary architectures. For the x86_64 architecture, UEFI with Secure Boot configured in accordance with Microsoft's Windows certification requirements is considered a 'commonly found' firmware type.|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | ||
{{hidden|header=Supported ARM platforms|content=Supported ARM platforms are those listed by the ARM team at [[Architectures/ARM/Supported_Platforms]].|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | {{hidden|header=Supported ARM platforms|content=Supported ARM platforms are those listed by the ARM team at [[Architectures/ARM/Supported_Platforms]].|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | ||
{{hidden|header=Supported IoT devices|content=Supported IoT platforms are those listed by the IoT team | {{hidden|header=Supported IoT devices|content=Supported IoT platforms are those listed by the IoT team [https://docs.fedoraproject.org/en-US/iot/release-criteria/ here].|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | ||
{{hidden|header=Supported cloud environments|content=Release-blocking cloud images must boot in the [[Infrastructure/FedoraCloud|Fedora OpenStack Cloud]] and in [https://aws.amazon.com/ec2/ Amazon EC2].|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | {{hidden|header=Supported cloud environments|content=Release-blocking cloud images must boot in the [[Infrastructure/FedoraCloud|Fedora OpenStack Cloud]] and in [https://aws.amazon.com/ec2/ Amazon EC2].|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | ||
{{hidden|header=Supported media types|content=Release-blocking live and dedicated installer images must boot when written to a USB stick with '''at least one''' of the [[How_to_create_and_use_Live_USB|officially supported methods]]. Release-blocking ARM disk images must boot when written to a medium bootable by the platform under test, according to the instructions for the platform under test.|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | {{hidden|header=Supported media types|content=Release-blocking live and dedicated installer images must boot when written to a USB stick with '''at least one''' of the [[How_to_create_and_use_Live_USB|officially supported methods]]. Release-blocking ARM disk images must boot when written to a medium bootable by the platform under test, according to the instructions for the platform under test.|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | ||
Line 48: | Line 48: | ||
* Release-blocking ARM disk images must boot to the initial-setup utility. | * Release-blocking ARM disk images must boot to the initial-setup utility. | ||
* Release-blocking cloud images must allow login with the user authentication configuration requested during instance creation. | * Release-blocking cloud images must allow login with the user authentication configuration requested during instance creation. | ||
* Release blocking IoT images must boot and be configurable by the Zezere utility. | |||
{{hidden|header=Boot menu contents|content=The boot menu for all supported installer and live images should include an entry which causes both installation and the installed system to attempt to use a generic, highly compatible video driver (such as 'vesa').|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | {{hidden|header=Boot menu contents|content=The boot menu for all supported installer and live images should include an entry which causes both installation and the installed system to attempt to use a generic, highly compatible video driver (such as 'vesa').|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | ||
{{hidden|header=System-specific bugs|content=System-specific bugs don't necessarily constitute an infringement of this criterion - for instance, if the installer or desktop fails to start because of a bug in support for some specific graphics card, that is unlikely to constitute a violation. See [[Blocker_Bug_FAQ]] for more discussion of this.|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | {{hidden|header=System-specific bugs|content=System-specific bugs don't necessarily constitute an infringement of this criterion - for instance, if the installer or desktop fails to start because of a bug in support for some specific graphics card, that is unlikely to constitute a violation. See [[Blocker_Bug_FAQ]] for more discussion of this.|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | ||
Line 67: | Line 68: | ||
The installer must run when launched normally from the release-blocking images. | The installer must run when launched normally from the release-blocking images. | ||
{{hidden|header=Launched normally?|content='Launched normally' means from the boot menu on a dedicated installer image, and from the desktop on a live image.|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | {{hidden|header=Launched normally?|content='Launched normally' means from the boot menu on a dedicated installer image, and from the desktop on a live image.|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | ||
{{hidden|header=References|content=Test cases: see test cases for [[#release-blocking-images-must-boot|"Release-blocking images must boot"]]|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | {{hidden|header=References|content= | ||
* Test cases: see test cases for [[#release-blocking-images-must-boot|"Release-blocking images must boot"]] | |||
* See [https://docs.fedoraproject.org/en-US/iot/reference-platforms/ IoT reference platforms] | |||
|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | |||
{{anchor|remote-package-sources}} | {{anchor|remote-package-sources}} | ||
Line 230: | Line 235: | ||
* Modification to cover modules, rpm-ostree and potentially other 'update' types [https://pagure.io/fesco/issue/1889 agreed by FESCo and implemented on 2018-05-11]. | * Modification to cover modules, rpm-ostree and potentially other 'update' types [https://pagure.io/fesco/issue/1889 agreed by FESCo and implemented on 2018-05-11]. | ||
* Modification to cover installing and removing (as well as updating) software [https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org/thread/LQIXML42QXJLFJWOYMYXW36QNWFG4FII/ proposed 2018-06-12], [https://lists.fedoraproject.org/archives/list/desktop@lists.fedoraproject.org/message/VDZ6SQQANYNCZDN2Y7IGC7UGEYVP6UP2/ implemented 2018-07-26] | * Modification to cover installing and removing (as well as updating) software [https://lists.fedoraproject.org/archives/list/test@lists.fedoraproject.org/thread/LQIXML42QXJLFJWOYMYXW36QNWFG4FII/ proposed 2018-06-12], [https://lists.fedoraproject.org/archives/list/desktop@lists.fedoraproject.org/message/VDZ6SQQANYNCZDN2Y7IGC7UGEYVP6UP2/ implemented 2018-07-26] | ||
* Test cases: [[QA: | * Test cases: [[QA:Testcase_RpmOstree_Upgrade]], [[QA:Testcase_package_install_remove]] | ||
|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | |headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | ||
Line 292: | Line 297: | ||
* Revision to be less strict and pervasive proposed [https://lists.fedoraproject.org/pipermail/test/2012-August/109712.html 2012-08-28], implemented [https://lists.fedoraproject.org/pipermail/test/2012-September/109818.html 2012-09-04]. | * Revision to be less strict and pervasive proposed [https://lists.fedoraproject.org/pipermail/test/2012-August/109712.html 2012-08-28], implemented [https://lists.fedoraproject.org/pipermail/test/2012-September/109818.html 2012-09-04]. | ||
* Test case: [[QA:Testcase_base_artwork_release_identification]], | * Test case: [[QA:Testcase_base_artwork_release_identification]], | ||
|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | |||
{{anchor|Zezere user provisioning (''IoT'')}} | |||
==== Zezere user provisioning (''IoT'')==== | |||
The zezere-ignition service must run on all IoT images and allow users to provision a user key for a privileged user (administrator) account. | |||
{{hidden|header=References|content= | |||
* Test case: [[QA:Testcase_Zezere_Ignition]] | |||
|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | |||
{{anchor|rpm-ostree (''IoT'')}} | |||
==== rpm-ostree (''IoT'') ==== | |||
* When a new ostree is composed and made available, it must be possible to upgrade an existing host using rpm-ostree upgrade. | |||
* After upgrading to the latest ostree, it must be possible to rollback to an older version using the rpm-ostree rollback command. | |||
* It must be possible to rebase to a different IoT release by using the rpm-ostree rebase command. | |||
* It must be possible to install additional software with rpm-ostree install command. Software installation must also include dependencies where necessary and installed software should provide the intended functionality. | |||
{{hidden|header=References|content= | |||
* Test cases: | |||
** [[QA:Testcase_RpmOstree_Upgrade]] | |||
** [[QA:Testcase_RpmOstree_Rebase]] | |||
** [[QA:Testcase_RpmOstree_Package_Layering]] | |||
|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | |||
{{anchor|Podman container runtime (''IoT'')}} | |||
==== Podman container runtime (''IoT'') ==== | |||
The Podman container runtime must be present on all images and installed by default when using the ISO installer. It must be possible to deploy a container image. | |||
{{hidden|header=References|content= | |||
* Test case: [[QA:Testcase_Podman]] | |||
|headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | |headerstyle=background:#e5e5e5|fw1=normal|ta1=left}} | ||
Revision as of 15:38, 23 September 2020
Basic Objectives
The objectives for all Branched and Rawhide nightly composes, as well as Beta and Final releases, are to:
- Publicly release installable media versions of a test release
- Test accepted Changes for future releases
- Identify as many Beta blocker bugs as possible
- Identify as many Final blocker bugs as possible
Basic Release Requirements
In order to be released to the general public, a compose must meet all of the following criteria. This is intended to make the decision process as clear and straightforward as possible. Mostly met items are incomplete until they are met. Optional and nice to have items should not be included in this list.
There may be times where a requirement is unmet only in a particular configuration, such as with some keyboard layouts but not others, or if a particular character is used in a username, password or passphrase. In such cases, the release team should use their judgement and refer to precedent to determine whether or not the issue should be considered to block the release. They should consider the number of users likely to be affected by the issue, the severity of the case when the issue is encountered, and the ease or otherwise with which the issue can be avoided by both informed and uninformed users.
The term release-blocking desktops means all the desktop environments in which bugs are currently considered capable of blocking a Fedora release. The current set of release-blocking desktops for x86_64 is GNOME and KDE, and for aarch64 is GNOME. Note that bugs in desktops that are not part of this set which would infringe these criteria automatically qualify for freeze exception status, according to the freeze exception bug process.
The term release-blocking images means all the images in which bugs are currently considered capable of blocking a Fedora release. The current set of release-blocking images includes the images defined by the three Editions - Server, Workstation and IoT - in their product requirement documents and/or technical specifications, the Everything network install image, key Cloud images, and the KDE live image. The canonical list of release-blocking images for Fedora 42 is on this page.
Correct checksums
A correct checksum must be published for each official release image.
Violations of this criterion for release-blocking images are considered "automatic blockers", they do not have to go through the review process. See QA:SOP_blocker_bug_process#Automatic_blockers for more details on the automatic blocker procedure.
Initialization requirements
Release-blocking images must boot
All release-blocking images must boot in their supported configurations.
Supported architectures are the Fedora primary architectures. All images are not necessarily expected to be available for all primary architectures.
Release-blocking images must boot from all system firmware types that are commonly found on the primary architectures. For the x86_64 architecture, UEFI with Secure Boot configured in accordance with Microsoft's Windows certification requirements is considered a 'commonly found' firmware type.
Supported ARM platforms are those listed by the ARM team at Architectures/ARM/Supported_Platforms.
Supported IoT platforms are those listed by the IoT team here.
Release-blocking cloud images must boot in the Fedora OpenStack Cloud and in Amazon EC2.
Release-blocking live and dedicated installer images must boot when written to a USB stick with at least one of the officially supported methods. Release-blocking ARM disk images must boot when written to a medium bootable by the platform under test, according to the instructions for the platform under test.
System-specific bugs don't necessarily constitute an infringement of this criterion - for instance, if the image fails to boot because of a bug in some specific system's firmware, that is unlikely to constitute a violation unless the system is an extremely popular one. See Blocker_Bug_FAQ for more discussion of this.
Expected image boot behavior
- Release-blocking dedicated installer images must boot to the expected boot menu, and then after a reasonable timeout to the installer.
- Release-blocking live images must boot to the expected boot menu, and then to a desktop or to a login prompt where it is clear how to log in to a desktop.
- Release-blocking ARM disk images must boot to the initial-setup utility.
- Release-blocking cloud images must allow login with the user authentication configuration requested during instance creation.
- Release blocking IoT images must boot and be configurable by the Zezere utility.
The boot menu for all supported installer and live images should include an entry which causes both installation and the installed system to attempt to use a generic, highly compatible video driver (such as 'vesa').
System-specific bugs don't necessarily constitute an infringement of this criterion - for instance, if the installer or desktop fails to start because of a bug in support for some specific graphics card, that is unlikely to constitute a violation. See Blocker_Bug_FAQ for more discussion of this.
- Bugzilla: #614488 was proposed as Alpha blocker for F14. Bug was fixed before before blocker status was confirmed or rejected.
- Proposed 2010-07-16.
- Implemented 2010-07-23.
- Rewritten as part of major Fedora 19 criteria revision.
- 'Basic graphics' mode portion split between Beta and Final 2019-04-02
- Test cases: see test cases for "Release-blocking images must boot"
Installer requirements
Except where otherwise specified, each of these requirements applies to all supported configurations described above. These requirements do not apply to images which do not use the installer.
Installer must run
The installer must run when launched normally from the release-blocking images.
'Launched normally' means from the boot menu on a dedicated installer image, and from the desktop on a live image.
- Test cases: see test cases for "Release-blocking images must boot"
- See IoT reference platforms
Remote package sources
When using a release-blocking dedicated installer image, the installer must be able to use either HTTP or FTP repositories (or both) as package sources. Release-blocking network install images must default to a valid publicly-accessible package source.
Media package source
When using a dedicated installer image that contains packages, the installer must be able to use the install medium as a package source.
Test case: QA:Testcase_Boot_default_install
Installation interfaces
When using a dedicated installer image, the installer must be able to complete an installation using the text, graphical and VNC installation interfaces.
This criterion covers showstopper bugs in the installer for which there isn't any other specific criterion: obviously, it can't 'complete an installation' if there's a showstopper. However, it does not mean that any failed installation test at all constitutes a release blocking issue: an installer which works fine in most cases but crashes when you attach it to a Hitachi hard disk on a wet Thursday is still 'able to complete an installation'.
Package sets
When installing with a release-blocking dedicated installer image, the installer must be able to install the default package set.
- Modification from 'default package set' proposed 2012-09-06.
- Idea to cover the release blocking desktops and minimal package set proposed 2012-09-06, implemented 2012-09-26.
- Reversion back to covering only default package set (due to deliverable changes as part of Fedora.next): proposed 2014-12-23, implemented 2015-01-30.
- Test case: QA:Testcase_Boot_default_install (for each covered image)
Disk selection
The user must be able to select which of the disks connected to the system will be affected by the installation process.
Disks not selected as installation targets must not be affected by the installation process in any way.
- Proposed 2012-10-01, implemented 2012-10-02.
- Test case: QA:Testcase_partitioning_guided_multi_select
Storage interfaces
The installer must be able to complete an installation using any supported locally connected storage interface.
'Locally connected storage interfaces' include PATA, SATA, NVMe, SAS, and SCSI.
Disk layouts
The installer must be able to complete an installation to a single disk using automatic partitioning.
...well, so long as the disk is big enough, of course. It must work whether the disk is formatted or not and whether or not it contains any existing data - but before Beta, it's OK if it can only install to a disk with existing data by overwriting it.
- Proposed 2012-10-01, implemented 2012-10-02.
- Test case: QA:Testcase_partitioning_guided_empty
Scripted user creation
The scripted installation mechanism must provide a working function for creating local user accounts, including the ability to specify a hashed password, and for specifying a hashed password for the root account.
- Part of Fedora 22 Server release criteria drafts, added 2014-06-26
- Test case: QA:Testcase_kickstart_user_creation
Update image
The installer must be able to download and use an installer update image from an HTTP server.
- Proposed 2012-01-30, implemented 2012-02-20.
- Test case: QA:Testcase_Anaconda_updates.img_via_URL
Failure reporting
The installer must be able to report failures to Bugzilla, with appropriate information included.
No, silly - we mean crashes, really. This is about the crash reporting capabilities: when the installer crashes, it should pop up some dialogs that let you send a report containing data on the crash.
Virtualization requirements
Guest on current stable release
The release must install and boot successfully as a virtual guest in a situation where the virtual host is running the current stable Fedora release.
This criterion applies only to the recommended Fedora virtualization tools - the qemu/kvm - libvirt - virt-manager stack.
- Initial virtualization criterion was part of initial Fedora 13 criteria revision
- Revision to explicitly cover both guest and host functionality was proposed 2011-09-07
- Proposal was heavily amended after discussion, particularly a suggestion by Albert Graham, to be more concise and to cover guest functionality when host runs previous release
- Amended proposal was implemented 2011-10-14
- Moved from Beta to Alpha 2017-04-05
- Test case: QA:Testcase_Install_to_Previous_KVM
Post-install requirements
Except where otherwise specified, each of these requirements applies to all supported configurations described above. These requirements are not applicable to Cloud images.
Expected installed system boot behavior
- A working mechanism to create a user account must be clearly presented during installation and/or first boot of the installed system.
- A system installed with a release-blocking desktop must boot to a log in screen where it is possible to log in to a working desktop using a user account created during installation or a 'first boot' utility.
- A system installed without a graphical package set must boot to a state where it is possible to log in through at least one of the default virtual consoles.
In all of the above cases, if any system partitions were encrypted as part of the installation, the boot process must prompt for the passphrase(s) and correctly unlock the partition(s) when provided with the correct passphrase(s).
In all of the above cases, the boot should proceed without any unexpected user intervention being required. On a graphical install, if the user explicitly intervenes to prevent graphical boot by passing a bootloader parameter, the non-graphical requirement comes into effect.
System-specific bugs don't necessarily constitute an infringement of this criterion - for instance, if the system fails to boot because of a bug in the support some specific system's hardware, that is unlikely to constitute a violation unless the system is an extremely popular one. See Blocker_Bug_FAQ for more discussion of this.
These criteria can be used to cover known severe issues in applying post-release updates. For instance, if there was a bug that meant the system would install and boot fine but would break as soon as the user ran 'yum update', that may well be covered by these criteria.
On the first boot after installation, a utility for creating user accounts and other configuration may (may, not must) run prior to a log in screen appearing.
- Requirement for graphical installs to boot to desktop was in original Fedora 13 criteria revision.
- Changes to cover non-graphical installs were proposed 2010-08-12, implemented 2010-08-16.
- Changes to cover firstboot were proposed 2011-03-17, implemented 2011-03-29.
- Change to stop requiring text mode firstboot to work was proposed 2011-08-08, implemented 2011-08-17.
- Wording was simplified and clarified as part of the major Fedora 19 criteria revision.
- Change to reflect F19 firstboot->initial-setup/gnome-initial-setup migration and anaconda user creation proposed 2013-07-18, implemented 2013-07-24.
- Test cases:
System service manipulation
The default system init daemon (e.g. systemd) must be capable of starting, stopping, enabling and disabling correctly-defined services.
This criterion is not intended to require there are no broken services in the distribution, but that the init daemon itself works. The criterion is not violated by a buggy service script, only if the init daemon itself is broken. A sufficiently-important service being broken might constitute a violation of another criterion - for instance, a service for a logging daemon being broken might violate the requirement that logging works - but not this one.
- Proposed 2014-07-04, revised proposal 2014-07-07
- Test case: QA:Testcase_base_service_manipulation
Installing, removing and updating software
The installed system must be able appropriately to install, remove, and update software with the default console tool for the relevant software type (e.g. default console package manager). This includes downloading of packages to be installed/updated.
This includes - but is not necessarily limited to - non-module packages, official module streams that are enabled (including any enabled by default in a release-blocking deployment), and rpm-ostree updates and rollbacks for any release-blocking rpm-ostree-based deployment. The criterion should also be reasonably interpreted to cover any other form of software distribution that we invent in future and include in an otherwise release-blocking deployment of Fedora, but have not yet updated this text to specifically refer to.
Appropriately means that the relevant software mechanism(s) for any given deployment must choose the software to be installed, updated or removed in ways that are broadly in line with the user's intent and typical expectations, and the project's intent as to which software should be provided from which repositories etc. To give a specific example of why this wording is included, there was previously a case where newer package versions from modules were being installed as 'updates' to systems which did not have those modules installed, only the package with the same name from the non-modular system repositories. This would be an example of 'inappropriate' updating that violated this criterion. Other examples might include installing packages from the wrong module stream, or failing to include available updates from an enabled official repository.
A bug in some particular package will not usually constitute a violation of this criterion. It's really about the mechanism functioning correctly. So if the default console package manager is working fine, but the update transaction fails because there happen to be two conflicting packages in the repositories, that's not a release blocking problem.
On the other hand, it is established by precedent - e.g. RHBZ #1261569 - that a bug which prevents newly-installed kernels from becoming the default boot choice is considered to violate this criterion, especially if that bug itself cannot be satisfactorily fixed with an update. Similar cases - where a media/installer bug prevents a package update from behaving as intended, and the consequences are significant - may well also constitute violations.
This criterion applies only to Fedora-provided and controlled update mechanisms for Fedora-provided content. It should not be interpreted to cover any other 'mechanisms' which may be included in the distribution (e.g. if an application includes a plugin system and an install/remove/update mechanism for those plugins, that mechanism is not covered here).
- Requirement was in force for 'default desktop' in original Fedora 13 criteria revision.
- Modification to cover 'release-blocking desktops' was proposed 2011-05-17, implemented 2011-05-31.
- Modification to move graphical update requirement to Beta or Final agreed during 2013-09-18 blocker review meeting.
- Modification to cover modules, rpm-ostree and potentially other 'update' types agreed by FESCo and implemented on 2018-05-11.
- Modification to cover installing and removing (as well as updating) software proposed 2018-06-12, implemented 2018-07-26
- Test cases: QA:Testcase_RpmOstree_Upgrade, QA:Testcase_package_install_remove
System logging
A system logging infrastructure must be available, enabled by default, and working.
Well, it must provide at least basic local file-based logging of kernel messages, and allow other components to write log messages. This must be done in accordance with relevant standards accepted by the Fedora Project.
- Thread 'Syslog not running' 2011-05-16.
- Proposed 2011-05-16, implemented 2011-05-17 as part of initial Fedora 16 Alpha criteria page creation.
- Test case: QA:Testcase_base_system_logging
SELinux configuration
Unless explicitly specified otherwise, after system installation SELinux must be enabled and in enforcing mode.
- Part of initial Server release criteria proposal, 2014-06-06
- In fact applies to all flavors, so moved to generic criteria as part of combined Fedora 22 Alpha criteria draft, 2014-07-07
- Test case: QA:Testcase_base_selinux
Shutdown
It must be possible to trigger a clean system shutdown using standard console commands.
The system must shut down in such a way that storage volumes (e.g. simple partitions, LVs and PVs, RAID arrays) are taken offline safely and the system's BIOS or EFI is correctly requested to power down the system.
- Proposed 2011-07-22, Implemented 2011-07-27.
- Test case: QA:Testcase_desktop_login
Self-identification
Any component which prominently identifies a Fedora release version number, code name, milestone (Beta, Final), or Edition (Workstation, Server, Atomic) must do so correctly.
- Initial artwork criteria proposed 2010-10-10, implemented 2010-10-13.
- Revision to be less strict and pervasive proposed 2012-08-28, implemented 2012-09-04.
- Extended to cover Editions 2018-02-01 (obvious extension, not reviewed)
- Test case: QA:Testcase_base_artwork_release_identification
Required applications
It must be possible to run the default web browser and a terminal application from all release-blocking desktop environments.
The web browser must be able to download files, load extensions (if applicable), and log into FAS.
- Requirement was in force for 'default desktop' in original Fedora 13 criteria revision.
- Modification to cover 'release-blocking desktops' was proposed 2011-05-17, implemented 2011-05-31.
- Test cases:
Desktop background
The default desktop background must be different from that of the last two stable releases.
- Initial artwork criteria proposed 2010-10-10, implemented 2010-10-13.
- Revision to be less strict and pervasive proposed 2012-08-28, implemented 2012-09-04.
- Test case: QA:Testcase_base_artwork_release_identification,
Zezere user provisioning (IoT)
The zezere-ignition service must run on all IoT images and allow users to provision a user key for a privileged user (administrator) account.
- Test case: QA:Testcase_Zezere_Ignition
rpm-ostree (IoT)
- When a new ostree is composed and made available, it must be possible to upgrade an existing host using rpm-ostree upgrade.
- After upgrading to the latest ostree, it must be possible to rollback to an older version using the rpm-ostree rollback command.
- It must be possible to rebase to a different IoT release by using the rpm-ostree rebase command.
- It must be possible to install additional software with rpm-ostree install command. Software installation must also include dependencies where necessary and installed software should provide the intended functionality.
Podman container runtime (IoT)
The Podman container runtime must be present on all images and installed by default when using the ISO installer. It must be possible to deploy a container image.
- Test case: QA:Testcase_Podman
Server Flavor requirements
These requirements apply only to the Server flavor.
FreeIPA server requirements
It must be possible to configure a Fedora Server system installed according to the above criteria as a FreeIPA domain controller, using the official deployment tools provided in the distribution FreeIPA packages. Once deployed, the system must handle multiple client enrolments and unenrolments, and client authentication via Kerberos. The web UI must be available and allow at least basic configuration of user accounts and permissions. Prior to Beta, it is acceptable if moderate workarounds are necessary to allow the above.
For instance, if a service needs to be manually enabled or a configuration file minimally tweaked, this is acceptable.
- Converted 2018-07 from the former Server Role requirements, which were proposed 2014-09-29, second draft 2014-09-30, implemented 2014-10-01
- Test cases:
PostgreSQL server requirements
It must be possible to configure a Fedora Server system installed according to the above criteria as a postgresql database server, using the official deployment tools provided in the distribution postgresql packages. Once deployed, the system must serve requests from the local system on port 5432. The core command line utilities for PostgreSQL must be available and correctly handle basic configuration of the PostgreSQL instance itself, and basic SQL interactions, including creation, modification, deletion, and simple querying of users, tables, columns, and rows. Multiple clients must be able to connect simultaneously to the PostgreSQL instance. Prior to Beta, it is acceptable if moderate workarounds are necessary to allow the above.
For instance, if a service needs to be manually enabled or a configuration file minimally tweaked, this is acceptable.
- Converted 2018-07 from the former Server Role requirements, which were proposed 2014-09-29, second draft 2014-09-30, implemented 2014-10-01
- Test cases:
Remote authentication
It must be possible to join the system to a FreeIPA or Active Directory domain at install time and post-install, and the system must respect the identity, authentication and access control configuration provided by the domain.
The install-time capability is not required to be interactive (i.e. it is acceptable for it to be possible by kickstart only).
This criterion is understood to mandate that there must be no requirement for a local user account to be created during install or first boot of a Server system.
- Part of initial Server release criteria proposal, 2014-06-06
- Test cases:
Firewall configuration
After system installation without explicit firewall configuration, the system firewall must be active on all non-loopback interfaces. The only ports which may be open to incoming traffic are port 22 (ssh) and port 9090 (Cockpit web interface). Supported install-time firewall configuration options must work correctly.
To explain the last part of this criterion - it is possible to include firewall configuration options in a kickstart-driven installation, and the criterion requires that those options work as expected. The options considered to be 'supported' are those documented at Anaconda/Kickstart#firewall.
- Part of initial Server release criteria proposal, 2014-06-06. Tweaked to remove Server Role-related content 2018-07.
- Test cases:
Cockpit management interface
Unless explicitly specified otherwise, after system installation the Cockpit web management interface must be running and accessible on its default port (9090).
- Part of initial Server release criteria proposal, 2014-06-06
- Test case: QA:Testcase_Server_cockpit_default
Confirming Basic Requirements
For nightly composes, compliance with these criteria is enforced via automated testing: composes which fail the automated test suite are not released to mirrors. For milestone candidate composes, QA has the responsibility of determining whether the criteria for the release has been met (as outlined above) through discussion with Development and Release Engineering. QA's findings will be reviewed and discussed at the Go/No-Go Meeting.