[Version closed beta] 2022/4/30 Internal Testing For deepin
Events 1387 views · 0 replies ·
zimo1
deepin
2022-04-30 22:13
Author
Dear deepin friends, in order to ensure version quality of the next update, we're now launching internal testing seeking participation from all members in this team.
Changelog:
Updated the Stable kernel to 5.15.34 by following the upstream.
Added the V5.17.3 kernel to the repository.
Updated the drivers of rtw89 and bcm network adapters to adapt to V5.17 kernel.
Updated the NVIDIA graphics card driver to the latest version 510.
Updated gnutls28.
Updated QT to 5.15.3.
Fixed the problem of application installation failure on some devices.
Fixed security vulnerabilities to improve system security.
Connect to the internal source and upgrade the system to the latest edition.
Upgrade method:(The internal test version may be unstable. Please do not use it in production environment)
Change the sources, run in terminal:sudo deepin-editor /etc/apt/sources.list
Paste the following contents to sources.list, then save and exit.
## Generated by deepin-installer deb [by-hash=force] https://community-packages.deepin.com/deepin/ apricot main contrib non-free #deb-src https://community-packages.deepin.com/deepin/ apricot main contrib non-free deb [trusted=yes] https://proposed-packages.deepin.com/dde-apricot unstable main contrib non-free
Execute sudo apt-get update && sudo apt-get dist-upgrade command in terminal. After upgrade successful, please reboot your computer.
Dear deepin friends, in order to ensure version quality of the next update, we're now launching internal testing seeking participation from all members in this team.
Changelog:
Updated the Stable kernel to 5.15.34 by following the upstream.
Added the V5.17.3 kernel to the repository.
Updated the drivers of rtw89 and bcm network adapters to adapt to V5.17 kernel.
Updated the NVIDIA graphics card driver to the latest version 510.
Updated gnutls28.
Updated QT to 5.15.3.
Fixed the problem of application installation failure on some devices.
Fixed security vulnerabilities to improve system security.
Testing Schedule
2022.4.30: Commence testing.
2022.4.30——2022.5.6: Test and fill out the questionnaire (https://shimo.im/forms/FBMm8Cel2rk9U1X4/fill) to give feedback on your questions.
2022.5.6: End testing.
Test Procedure
Connect to the internal source and upgrade the system to the latest edition.
Upgrade method:(The internal test version may be unstable. Please do not use it in production environment)
Change the sources, run in terminal:sudo deepin-editor /etc/apt/sources.list
Paste the following contents to sources.list, then save and exit.
Execute sudo apt-get update && sudo apt-get dist-upgrade command in terminal. After upgrade successful, please reboot your computer.
Test and fill out the questionnaire (https://shimo.im/forms/FBMm8Cel2rk9U1X4/fill) to give feedback on your questions.
Note:
Upgrade your kernel to 5.15:sudo apt install linux-image-deepin-stable-amd64 linux-headers-deepin-stable-amd64
Upgrade your kernel to 5.17:sudo apt install linux-image-deepin-experiment-amd64 linux-headers-deepin-experiment-amd64
Attention
The internal testing is limited to members. Click here to join it.
All members of Internal Testing Team will participate by default.
Members who consecutively absent themselves for 3 times without asking for leave, will be dismissed from the Team.
Please do not distribute the content and data of the Internal Testing. Otherwise you will be dismissed from the Team.
Acknowledgments
Many thanks to all the Internal Testing Team members for your active participation!