Author: joewitt
Date: Tue Oct 29 18:08:40 2019
New Revision: 1869121
URL: http://svn.apache.org/viewvc?rev=1869121&view=rev
Log:
NIFI-6733 updating release guidance
Modified:
nifi/site/trunk/people.html
nifi/site/trunk/release-guide.html
Modified: nifi/site/trunk/people.html
URL:
http://svn.apache.org/viewvc/nifi/site/trunk/people.html?rev=1869121&r1=1869120&r2=1869121&view=diff
==============================================================================
--- nifi/site/trunk/people.html (original)
+++ nifi/site/trunk/people.html Tue Oct 29 18:08:40 2019
@@ -373,6 +373,11 @@
<td>Rob Fellows</td>
<td></td>
</tr>
+ <tr>
+ <td>turcsanyi</td>
+ <td>Peter Turcsanyi</td>
+ <td></td>
+ </tr>
</table>
</div>
</div>
Modified: nifi/site/trunk/release-guide.html
URL:
http://svn.apache.org/viewvc/nifi/site/trunk/release-guide.html?rev=1869121&r1=1869120&r2=1869121&view=diff
==============================================================================
--- nifi/site/trunk/release-guide.html (original)
+++ nifi/site/trunk/release-guide.html Tue Oct 29 18:08:40 2019
@@ -202,7 +202,7 @@ present at the root of the archive.</li>
<li>Does the overall LICENSE and NOTICE appear correct?</li>
<li>Do all licenses fit within the ASF approved licenses?</li>
<li>Here is an example path to a sources artifact that has been prepared but
not released:<br>
-<code>https://repository.apache.org/content/repositories/${STAGING_REPO_ID}/org/apache/nifi/nifi/${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip</code></li>
+<code>https://dist.apache.org/repos/dist/dev/nifi/nifi-${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip</code></li>
</ul></li>
<li>Is there a README available that explains how to build the application and
to execute it?
<ul>
@@ -211,10 +211,10 @@ present at the root of the archive.</li>
<li>Are the signatures and hashes correct for the source release?
<ul>
<li>Validate the hashes of the sources artifact do in fact match:<br>
-<code>https://repository.apache.org/content/repositories/${STAGING_REPO_ID}/org/apache/nifi/nifi/${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.sha256</code><br>
-<code>https://repository.apache.org/content/repositories/${STAGING_REPO_ID}/org/apache/nifi/nifi/${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.sha512</code></li>
+<code>https://dist.apache.org/repos/dist/dev/nifi/nifi-${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.sha256</code><br>
+<code>https://dist.apache.org/repos/dist/dev/nifi/nifi-${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.sha512</code></li>
<li>Validate the signature of the source artifact. Here is an example
path:<br>
-<code>https://repository.apache.org/content/repositories/${STAGING_REPO_ID}/org/apache/nifi/nifi/${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.asc</code></li>
+<code>https://dist.apache.org/repos/dist/dev/nifi/nifi-${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.asc</code></li>
<li>Need a quick reminder on how to <a
href="https://www.apache.org/dev/release-signing.html#verifying-signature">verify
a signature</a>?</li>
</ul></li>
<li>Do all sources have necessary headers?
@@ -343,7 +343,9 @@ login with your Apache committer credent
click on that you can inspect the various staged artifacts.</p></li>
<li><p>Validate that all the various aspects of the staged artifacts appear
correct</p>
<ul>
-<li>Download the sources. Do they compile cleanly? If the result is a build
does it execute?</li>
+<li>Download the sources and signature at the following URL. Do they compile
cleanly? If the result is a build does it execute? We download the sources
and signature from the nexus artifacts so that these sources and signature
match what we put in dist and thus all signatures and such match. If you pull
the sources from your local build it will differ and can create confusion
during RC validation. These are the first two primary artifacts you need for
the voting (the sources and the signature). You'll gather other artifacts and
signatures and generate hashes below.<br>
+<code>wget
https://repository.apache.org/service/local/repositories/orgapachenifi-nnnn/content/org/apache/nifi/nifi/${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip</code><br>
+<code>wget
https://repository.apache.org/service/local/repositories/orgapachenifi-nnnn/content/org/apache/nifi/nifi/${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.asc</code></li>
<li>Validate the hashes match.</li>
<li>Validate that the sources contain no unexpected binaries.</li>
<li>Validate the signature for the build and hashes. <a
href="https://nifi.apache.org/gpg.html#verifying-a-release-signature">Verifying
a release signature</a>.</li>
@@ -357,11 +359,10 @@ click on that you can inspect the variou
<li><p>Push the tag created by the release:prepare step to the ASF
repository.</p>
<pre><code>git push asf nifi-${NIFI_VERSION}-RC${RC}
</code></pre></li>
-<li><p>Create the signature and hashes for the source release and convenience
binary files.</p>
+<li><p>Create the signature and hashes for the source release and convenience
binary files. You take the source release and signature from steps above. You
grab the other conveniece binaries from your local build directories.</p>
<ol>
<li>ASCII armored GPG signatures (<code>--digest-algo=SHA512</code> select the
SHA512 hash algorithm). <a
href="https://www.apache.org/dev/openpgp.html#key-gen-avoid-sha1">Configure GPG
to always prefer stronger hashes</a>.
-<pre><code>$ gpg -a -b --digest-algo=SHA512
nifi-${NIFI_VERSION}-source-release.zip # produces
nifi-${NIFI_VERSION}-source-release.zip.asc
-$ gpg -a -b --digest-algo=SHA512 nifi-${NIFI_VERSION}-bin.tar.gz #
produces nifi-${NIFI_VERSION}-bin.tar.gz.asc
+<pre><code>$ gpg -a -b --digest-algo=SHA512 nifi-${NIFI_VERSION}-bin.tar.gz
# produces nifi-${NIFI_VERSION}-bin.tar.gz.asc
$ gpg -a -b --digest-algo=SHA512 nifi-${NIFI_VERSION}-bin.zip #
produces nifi-${NIFI_VERSION}-bin.zip.asc
$ gpg -a -b --digest-algo=SHA512 nifi-toolkit-${NIFI_VERSION}-bin.zip #
produces nifi-toolkit-${NIFI_VERSION}-bin.zip.asc
$ gpg -a -b --digest-algo=SHA512 nifi-toolkit-${NIFI_VERSION}-bin.tar.gz #
produces nifi-toolkit-${NIFI_VERSION}-bin.tar.gz.asc
@@ -382,7 +383,7 @@ $ shasum -a 512 nifi-toolkit-${NIFI_VERS
</code></pre></li>
</ol></li>
<li><p>For reviewing of the release candidate, commit the source release and
convenience binaries files along with their<br>
-hashes and signatures to
<code>https://dist.apache.org/repos/dist/dev/nifi/nifi-${NIFI_VERSION}</code>.</p></li>
+hashes and signatures to
<code>https://dist.apache.org/repos/dist/dev/nifi/nifi-${NIFI_VERSION}</code>.
There should be in total 20 files (5 primary artifacts, 5 signatures, 5 sha256,
5 sha512).</p></li>
</ol>
<h3>Step 4. Error recovery (RM)</h3>
<p>If anything isn't correct about the staged artifacts you can drop the
staged repo from repository.apache.org and delete<br>
@@ -413,6 +414,9 @@ I am pleased to be calling this vote for
The source zip, including signatures, digests, etc. can be found at:
https://repository.apache.org/content/repositories/orgapachenifi-nnnn
+The source being voted upon and the convenience binaries can be found at:
+https://dist.apache.org/repos/dist/dev/nifi/nifi-${NIFI_VERSION}/
+
The Git tag is nifi-${NIFI_VERSION}-RC${RC}
The Git commit ID is ${RC_TAG_COMMIT_ID}
https://gitbox.apache.org/repos/asf?p=nifi.git;a=commit;h=${RC_TAG_COMMIT_ID}