- Make sure all milestones issues have been addressed
- Make sure the ChangeLog is up to date, with actual release date
- Update MSYS/MinGW and run a test release in case breakage was introduced
- Update
Readme.md
if relevant (major new feature, etc.) - Run
.\gen_listing.ps1
inres\appstore
- Commit and tag release
- Git push release commit
- Wait for VS2022 builds and download all artifacts to
res\appstore\
Make sure to pick the artifacts from tagged release! - Run
res\appstore\packme.cmd
. This will sign the MSVC executables - Wait for MinGW build and download x86 artifact (as
rufus-#.##.exe
) - Sign the MinGW executables
- Upload signed executables to VT Monitor, VirusTotal and AVG whitelist
- Run a limited set of tests with actual release binary
- Upload all the binaries (including
_arm
&_arm64
) to staging server and create arufus-#.#p.exe
- Run
./_sign.sh
script to create.sig
- Edit github.io's
downloads/index.html
page to include the new download links by sourcing the staging server's download page - Validate github.io's
downloads/index.html
page - Update
index.php
in rufus-web and copy it to staging serverNote: Make sure that anyhref
's in the ChangeLog havetarget="_blank"
due to using a frame. - (OPTIONAL) Upload new 1x and 2x screenshots if needed
- Run
_refresh.sh
from MinGW in github.io directory to updateindex_##.html
pages (also update)en_US
if different - Run
_create_pot.sh
to updatelocale/index.pot
- Validate at least
en/index.html
andfr/index.html
- Also Update
Loc.ver
to point to latest version - Create a draft release and upload binaries to github release (if BETA, need to create a temporary
v#.#_BETA
tag). Don't forget to upload the.sig
as well as the portable version. Also don't forget to uploade portable executable. - Commit and push github.io's modified content.
- Submit executable to Windows Defender so that they don't get tricked AGAIN into a false positive
- Test download links (including latest source tarball)
- Update AppStore submission and upload new package as well as a new folder with
.csv
- Update reboot.pro download
- Update FossHub downloads
- Announce release on reboot.pro and mydigitallife relevant threads
- Update Wikipedia page
- Close milestone
- Edit this page for the download counters
~24 hours after release
- Update
Rufus_win.ver
on staging server - Run
_sign.sh
script to create.ver.sig
- Update and push github.io
- Test automatic update
Post-Release
- Wait ~1 week and edit download's
index.html
to remove the BETA links - Delete the BETA git tags and remove BETA release
-
_chver.sh
to rufus-next
VirusTotal links
- rufus-3.22.exe
- rufus-3.22_BETA.exe (signed)
- rufus-3.22_BETA.exe (unsigned)
- rufus-3.21.exe
- rufus-3.21_BETA.exe (signed)
- rufus-3.21_BETA.exe (unsigned)
- rufus-3.20.exe
- rufus-3.20.exe (unsigned)
- rufus-3.20_BETA.exe
- rufus-3.19.exe
- rufus-3.19_BETA.exe
- rufus-3.18.exe
- rufus-3.17.exe
- rufus-3.16.exe
- rufus-3.15.exe
- rufus-3.14.exe
- rufus-3.13.exe
- rufus-3.12.exe
- rufus-3.11.exe
- rufus-3.10.exe
- rufus-3.9.exe
- rufus-3.8.exe
- rufus-3.7.exe
- rufus-3.6.exe
- rufus-3.5.exe
- rufus-3.4.exe
- rufus-3.3.exe
- rufus-3.2.exe
- rufus-3.1.exe
- rufus-3.0.exe
- rufus-2.18.exe
Windows Defender Submission Data
- frigging!
- rufus-3.21_BETA (unsigned)
- rufus-3.20 (unsigned)
- rufus-3.2.exe =
0d146748-b734-4780-84a3-813fd40e0b30
- rufus-3.3.exe =
0d0f5e2a-c233-4a37-a57d-b125ca741a03
- rufus-3.4.exe =
e63f2589-2284-43dc-9511-d5b8df8e5184
- rufus-3.5.exe =
8b1fc457-395f-4b64-8aed-fdab0d6430c5
Windows Defender Submission Extra
From an elevated command prompt, change to directory %programfiles%\windows defender
and execute mpcmdrun.exe
with option GetFiles
:
cd "%programfiles%\windows defender"
mpcmdrun.exe -GetFiles
All created log files will be compressed into MPSupportFiles.cab
. Please send us the detected file and MPSupportFiles.cab
using https://aka.ms/wdsi We will continue the investigation once we receive the support log files.