Document version 1.0
Status: v0.5 test in progress…
...
Test Server (upgrade tests): https://ir-upgrade-test.test.mattermost.cloud
Build Hash: ed34468996e6906003c9b3cab0d21ac121ec553f
EE Build Hash: 9547727aa1779259a9dcd847c81e4c29a0db0845
Webapp Build Hash: b8a75b515bd4646d2084da2c72d12588b233ded5
...
Test Area - Plugin Setup | ||||
---|---|---|---|---|
Test ID | Test Case | Test Procedure | Result | Notes |
1 | Admin can install plugin in a non-EE instance |
| Pass |
|
2 | Admin can install plugin in an E10 instance |
| Pass |
|
3 | Admin can install plugin in an E20 instance |
| Pass |
|
4 | Admin can enable plugin |
| Pass |
|
5 | Plugin functionality is available to admin |
| Pass |
|
6 | Plugin functionality is available to normal user |
| Pass |
|
7 | Admin can disable plugin |
| Pass |
|
8 | Admin can remove plugin |
| Pass |
|
9 | Plugin upgrades normally from v0.3 to v0.5 |
| Pass | |
10 | Plugin upgrades normally from v0.4 to v0.5 |
| Pass |
|
11 |
|
|
| Not valid for upgrade to 0.5 |
12 |
|
|
| Not valid for upgrade to 0.5 |
13 |
|
| Not valid for upgrade to 0.5 |
Test Area - Limit incident access to only participants As an incident participant, I can make an incident and its channel private so that non-participants don’t know it exists let alone access its content. | ||||
---|---|---|---|---|
Test ID | Test Case | Test Procedure | Result | Notes |
14 |
Incident cannot be created without selecting a playbook |
| ||
15 | User can make a public incident |
| #7 is a bug. | |
16 | User can make a private incident |
| #9: RHS incident list may go away. | |
17 | Converting a public incident channel into private, makes the incident private |
| ||
18 | Non participant cannot access a previously public incident converted to a private incident | Continue the test from above.
| ||
19 | Non participant cannot access a new private incident |
| ||
20 | Private incidents cannot be searched in backstage by non-participants. | Continue from the above test.
| ||
21 | Public incidents are visible only within the incident’s team |
| ||
22 | Private incidents are visible only within the incident’s team |
| ||
23 | Public incidents cannot be searched in a different team’s incident backstage |
| ||
24 |
|
| Invalid - user has to be added to the IR channel to be able to launch anything about the incident in the RHS. | |
25 |
| Continue from the above test.
| Need to find out more about the mechanism to view the incident details on RHS if the details view is going to be tightly coupled with the channel view. | |
26 | Non participant cannot view private incident details in RHS | Is this test case correct? Non-participant can’t see private channels. | ||
27 | System administrator can see a private incident |
| Won’t see private channel, but if permalink known, can simply browse to channel and self-join. | |
28 | System administrator can join a private incident | Continue from the above test.
| Won’t be in LHS, but definitely can join channel with permalink. | |
29 | System administrator can view a private incident details | Continue from the above test.
| ||
30 | System administrator can check and uncheck items in private incidents | Continue from the above test.
| ||
31 | System administrator can add and remove checklist items in a private incident | Continue from the above test.
| ||
32 | System administrator can end a private incident | Continue from the above test.
| ||
33 | Team administrator can see a private incident |
| ||
34 | Team administrator can join a private incident | Continue from the above test.
| ||
35 | Team administrator can view a private incident details | Continue from the above test.
| ||
36 | Team administrator can check and uncheck items in private incidents | Continue from the above test.
| ||
37 | Team administrator can add and remove checklist items in a private incident | Continue from the above test.
| ||
38 | Team administrator can end a private incident | Continue from the above test.
|
Test Area - Configure playbooks to create public/private incidents As an incident manager, I can configure playbooks to create either public or private incidents so that it defaults to the correct permission when executed. | ||||
---|---|---|---|---|
Test ID | Test Case | Test Procedure | Result | Notes |
39 | Playbook can be configured to create a public incident |
| ||
40 | Playbook can be configured to create a private incident |
| ||
41 | Playbook can be edited to change public incident creation setting to private | Continue from the above tests.
| ||
42 | Playbook can be edited to change private incident creation setting to public | Continue from the above tests.
|
Test Area - Prioritize incidents that the user is a participant of As an incident participant, I can easily tell apart the incidents that are relevant to me so that it’s I can get there more quickly. | ||||
---|---|---|---|---|
Test ID | Test Case | Test Procedure | Result | Notes |
43 | Incidents in backstage will be listed in priority order |
| Is the order correct in step 6 and 10? | |
Effect of search on priority ordering in backstage | ||||
Effect of sorting on priority ordering in backstage | ||||
Effect on LHS channel order for priority ordering |
Test Area - Limit the ability to create playbooks to Team Administrators As a system administrator, I can restrict who can create playbooks so that the incident response process can be better standardized. | ||||
---|---|---|---|---|
Test ID | Test Case | Test Procedure | Result | Notes |
44 | System administrator can create a public playbook |
| Is step #4 correct? | |
45 | System administrator can create a private playbook |
| #4 correct? | |
46 | Team admin can create a public playbook |
| #4 correct? | |
47 | Team admin can create a private playbook |
| #4 correct? | |
48 | A non-admin user cannot create a playbook |
| Is #3 correct? | |
49 |
| N/A due to the test above this one. Is this correct? | ||
50 | Private playbook is initially only visible to playbook creator |
| Are steps 13-18 correct? Are private playbooks visible to/accessible by system admins? Or do they need to be invited to the playbook to access them as well? | |
51 | Private playbook is only available within the team it was created in |
| ||
52 | Public playbook is visible to all the members of a team |
| ||
53 | Public playbook can be edited by member user of the team | Continue from the above tests.
| ||
54 | Team member can “invite” other team members to manage public playbook | Not sure about steps to invite other members to manage playbook. | ||
55 | Team member can create an incident using public playbook | Continue from the above test.
| ||
56 | Public playbook can be deleted by team member |
| ||
57 | Private playbook cannot be edited by a non-admin team member |
| Using a direct PUT to test here because the user will not be able to find the private playbook in the UI. | |
58 | Private playbook cannot be deleted by member user of the team | Continue from the above test.
| ||
59 | Non-admin team member cannot “invite” other team members to manage private playbook | Continue from the above test.
| ||
60 |
| Covered by #45 |
Test Area - Limit playbook access to specific users As a playbook creator, I can specify who else can see and edit the playbook so that sensitive content wouldn’t be unintentionally revealed. | ||||
---|---|---|---|---|
Test ID | Test Case | Test Procedure | Result | Notes |
61 | Team admin can limit playbook access to specific users |
| ||
62 | Team admin can edit users who have access to playbook | Continue from the above test.
| ||
63 | User removed by team admin can no longer access playbook | Continue from the above test.
| ||
64 | System admin can limit playbook access to specific users |
| ||
65 | System admin can edit users who have access to playbook | Continue from the above test.
| ||
66 | User removed by system admin can no longer access playbook | Continue from the above test.
|
...