Embedded OTA Rollback Testing
workflow:embedded-ota-rollback-testing
Workflowworkflows/workflows/workflows-deeper-domains.yaml·Open in Graph → {
"id": "workflow:embedded-ota-rollback-testing",
"_kind": "Workflow",
"_file": "workflows/workflows/workflows-deeper-domains.yaml",
"_cluster": "workflows",
"attributes": {
"displayName": "Embedded OTA Rollback Testing",
"workflowKind": "operational",
"triggerType": "event-driven",
"typicalCadence": "per-release",
"complexity": "single-team",
"description": "Tests over-the-air firmware update and rollback mechanisms for embedded\ndevices -- validating OTA package signing and integrity verification on\ntarget hardware, simulating network interruptions at each download stage\nto confirm resume-capability, testing atomic update application with\nautomatic rollback on boot-failure detection, verifying A/B partition\nswitching under power-loss scenarios, measuring update-time budgets\nagainst field-deployment constraints, validating rollback preserves user\nconfiguration and calibration data, testing fleet-wide staged-rollout\ngating with canary device cohorts, and confirming telemetry reporting of\nupdate success and failure states. Produces OTA rollback test report and\nfirmware-update certification record. Excludes OTA server infrastructure\ndesign.\n"
},
"outgoingEdges": [
{
"from": "workflow:embedded-ota-rollback-testing",
"to": "role:staff-engineer",
"kind": "involves_role",
"attributes": {}
},
{
"from": "workflow:embedded-ota-rollback-testing",
"to": "role:implementer",
"kind": "involves_role",
"attributes": {}
},
{
"from": "workflow:embedded-ota-rollback-testing",
"to": "skill-area:firmware-development",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:embedded-ota-rollback-testing",
"to": "skill-area:bootloader-design",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:embedded-ota-rollback-testing",
"to": "domain:embedded-systems",
"kind": "applies_to_domain",
"attributes": {}
},
{
"from": "workflow:embedded-ota-rollback-testing",
"to": "domain:security",
"kind": "applies_to_domain",
"attributes": {}
},
{
"from": "workflow:embedded-ota-rollback-testing",
"to": "responsibility:approve-deploys",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:embedded-ota-rollback-testing",
"to": "responsibility:run-security-scans",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:embedded-ota-rollback-testing",
"to": "org-unit:engineering",
"kind": "performed_by_org_unit",
"attributes": {}
},
{
"from": "workflow:embedded-ota-rollback-testing",
"to": "org-unit:quality-engineering",
"kind": "performed_by_org_unit",
"attributes": {}
}
],
"incomingEdges": []
}