+1

On Mon, Jun 23, 2025 at 12:27 AM Yuan Zhuang <yu...@apache.org> wrote:

> +1 (binding)
> I have checked:
> - The signature (from Zhaofeng Chen) and hashes are correct.
> - I'm able to build from source and all tests passed.
>
>
> On 2025/06/20 13:54:12 Zhaofeng Chen wrote:
> > Hi,
> >
> > The KEYS file and .asc signature have been updated. As the original
> release
> > artifacts remain unchanged, this vote can continue without restarting.
> >
> > Please feel free to proceed with your verification.
> >
> > Best regards,
> > Zhaofeng
> >
> > On Thu, Jun 19, 2025 at 1:57 PM Xuanwo <xua...@apache.org> wrote:
> >
> > > Thank you for this change. I don't have other questions and will
> continue
> > > the verify after your updates.
> > >
> > > On Thu, Jun 19, 2025, at 13:55, Zhaofeng Chen wrote:
> > > > Hi Xuanwo,
> > > >
> > > > Thanks for raising these excellent points — we really appreciate the
> > > > thoughtful feedback.
> > > >
> > > > - Who will pay for the hardware?
> > > >    The PMC member who physically maintains the hardware-backed key
> > > (e.g., a
> > > > YubiKey) covers the cost themselves.
> > > >
> > > > - Will all PMC members receive this hardware?
> > > >   No. Our intention isn’t to distribute hardware to every PMC
> member, but
> > > > rather to offer an optional, secure signing path. Access to the
> > > > hardware-backed key is permissioned, and signing operations are
> handled
> > > > through an offline, controlled process. This setup doesn’t restrict
> > > others
> > > > from managing releases — it’s just one way to offload key management
> for
> > > > those who prefer it.
> > > >
> > > > - Can PMC members who do not have this hardware still sign releases?
> > > >   Yes, absolutely. This setup is complementary, not a replacement.
> PMC
> > > > members can still sign releases using their own GPG keys, as per
> standard
> > > > ASF policy. The shared signing workflow is only intended to reduce
> the
> > > > operational burden for those who want stronger security without
> > > maintaining
> > > > their own key infrastructure.
> > > >
> > > > Ultimately, I hope we can make the release process both easier and
> more
> > > > secure, and potentially encourage more contributors to serve as
> Release
> > > > Managers.
> > > > However, after another round of reviewing ASF’s release signing
> > > > guidelines[1], I realized that our idea shares similarities with
> Apache’s
> > > > automated signing infrastructure, which is maintained by the Infra
> team.
> > > In
> > > > particular, it supports:
> > > > - Centralized signing keys managed securely by Infra
> > > > - CI-based artifact generation, reproducibility, and offline
> verification
> > > > - Strong separation between signing infrastructure and project
> > > maintainers
> > > >
> > > > This might be a promising long-term direction for us. In the future,
> we
> > > > could explore working with Infra to request a project-specific
> signing
> > > key.
> > > >
> > > > [1]
> > >
> https://infra.apache.org/release-signing.html#automated-release-signing
> > > >
> > > > To avoid any potential confusion for this release, I will revert to
> the
> > > > standard model and proceed with signing the artifacts using my
> personal
> > > GPG
> > > > key, which will be added to the KEYS file accordingly. Since the
> original
> > > > release artifacts remain unchanged, and only the .asc signature file
> will
> > > > be updated, I plan to reuse this vote thread for continuity.
> > > >
> > > > Any feedback is greatly appreciated.
> > > >
> > > > Best,
> > > > Zhaofeng
> > > >
> > > > On Thu, Jun 19, 2025 at 1:14 PM Xuanwo <xua...@apache.org> wrote:
> > > >
> > > >> Thank you Zhaofeng for the explanation.
> > > >>
> > > >> > We understand that the current key name may be confusing. To make
> its
> > > >> > shared nature clearer, we plan to introduce a new key entry with
> > > identity
> > > >> > set to something like "Teaclave Release Signing Key", which makes
> it
> > > more
> > > >> > reasonable for people who are trying to verify the artifacts.
> > > >>
> > > >> This looks good to me.
> > > >>
> > > >> > In the new setup, the shared GPG key is hardware-backed (e.g.,
> > > YubiKey),
> > > >> > PIN-protected, with expiration date, and maintained by a small
> group
> > > of
> > > >> > administrators.
> > > >>
> > > >> This can sometimes be challenging, as it may restrict some PMC
> members
> > > >> from making releases. I know that's not your intention, but it can
> give
> > > the
> > > >> impression that the project is controlled by a small group of
> people.
> > > >>
> > > >> Here are some questions:
> > > >>
> > > >> - Who will pay for the hardware?
> > > >> - Will all PMC members receive this hardware?
> > > >> - Can PMC members who do not have this hardware still sign releases?
> > > >>
> > > >> However, this isn't a blocker for the release. We can address these
> > > issues
> > > >> gradually.
> > > >>
> > > >> On Thu, Jun 19, 2025, at 13:08, Zhaofeng Chen wrote:
> > > >> > Hi Xuanwo,
> > > >> >
> > > >> > Thanks for the helpful input.
> > > >> >
> > > >> > - We’ll update future emails to use the official CDN link:
> > > >> > https://downloads.apache.org/incubator/teaclave/KEYS . For
> > > verification
> > > >> > purpose, the file content is identical.
> > > >> >
> > > >> > Regarding the signing key:
> > > >> > We’re moving toward a model where multiple release managers can
> > > securely
> > > >> > use the same high-assurance signing key. Previously, each release
> > > manager
> > > >> > generated and managed their own GPG key independently, which led
> to
> > > >> > inconsistent security practices and made key rotation more
> difficult.
> > > >> >
> > > >> > In the new setup, the shared GPG key is hardware-backed (e.g.,
> > > YubiKey),
> > > >> > PIN-protected, with expiration date, and maintained by a small
> group
> > > of
> > > >> > administrators. Release managers don’t personally own the key but
> can
> > > >> > request access to perform signing operations in a controlled,
> offline
> > > >> > process. This approach improves key protection, simplifies key
> > > lifecycle
> > > >> > management, and ensures better privilege separation.
> > > >> >
> > > >> > We understand that the current key name may be confusing. To make
> its
> > > >> > shared nature clearer, we plan to introduce a new key entry with
> > > identity
> > > >> > set to something like "Teaclave Release Signing Key", which makes
> it
> > > more
> > > >> > reasonable for people who are trying to verify the artifacts.
> > > >> >
> > > >> > I'd love to hear any feedback the community may have on this
> plan. If
> > > it
> > > >> > sounds reasonable and compliant with Apache's policy, I can
> proceed
> > > with
> > > >> > updating the KEYS file with the new key name and the corresponding
> > > >> > signature files.
> > > >> >
> > > >> > Best,
> > > >> > Zhaofeng
> > > >> >
> > > >> > On Thu, Jun 19, 2025 at 10:53 AM Xuanwo <xua...@apache.org>
> wrote:
> > > >> >
> > > >> >> Hi, Zhaofeng
> > > >> >>
> > > >> >> Thank you for working on this release. This is my first time
> > > reviewing
> > > >> >> releases, so please let me know if there's any context I should
> be
> > > >> aware of
> > > >> >> beforehand.
> > > >> >>
> > > >> >> Here are some questsions I have:
> > > >> >>
> > > >> >> - It's better to use our CDN for the GPG key download URL:
> > > >> >> https://downloads.apache.org/incubator/teaclave/KEYS
> > > >> >> - I noticed that the release is signed by a different key,
> > > >> >> yu...@apache.org, which does not belong to Zhaofeng. Is it
> signed
> > > >> >> automatically in CI?
> > > >> >>
> > > >> >> On Thu, Jun 19, 2025, at 08:03, Zhaofeng Chen wrote:
> > > >> >> > Hi all,
> > > >> >> >
> > > >> >> > I am pleased to be calling this vote for the release of Apache
> > > >> Teaclave
> > > >> >> > TrustZone SDK (incubating) 0.5.0 (release candidate 1).
> > > >> >> >
> > > >> >> > Although this release follows shortly after the approval of the
> > > >> v0.4.0 on
> > > >> >> > June 3, please note that the earlier release was initiated
> back on
> > > >> >> February
> > > >> >> > 27 and was significantly delayed due to a prolonged voting
> process.
> > > >> Since
> > > >> >> > then, we’ve made improvements to streamline the process and
> hope
> > > this
> > > >> >> > release proceeds more smoothly.
> > > >> >> >
> > > >> >> > The release note is available in:
> > > >> >> > -
> > > >> >> >
> > > >> >>
> > > >>
> > >
> https://github.com/apache/incubator-teaclave-trustzone-sdk/releases/tag/v0.5.0-rc.1
> > > >> >> >
> > > >> >> > The release candidate to be voted over is available at:
> > > >> >> > -
> > > >> >> >
> > > >> >>
> > > >>
> > >
> https://dist.apache.org/repos/dist/dev/incubator/teaclave/trustzone-sdk-0.5.0-rc.1/
> > > >> >> >
> > > >> >> > The release candidate is signed with a GPG key available at:
> > > >> >> > -
> > > https://dist.apache.org/repos/dist/release/incubator/teaclave/KEYS
> > > >> >> >
> > > >> >> > Instructions to verify the release candidate’s signature:
> > > >> >> > -
> > > >> >>
> > >
> https://teaclave.apache.org/download/#verify-the-integrity-of-the-files
> > > >> >> >
> > > >> >> > Incubator release checklist for reference:
> > > >> >> > -
> > > >> >> >
> > > >> >>
> > > >>
> > >
> https://cwiki.apache.org/confluence/display/INCUBATOR/Incubator+Release+Checklist
> > > >> >> >
> > > >> >> > The release artifacts have passed all GitHub Actions CI
> checks. You
> > > >> can
> > > >> >> > also reproduce the build process manually from source using the
> > > >> >> > following
> > > >> >> > commands:
> > > >> >> > ```
> > > >> >> > $ wget
> > > >> >> >
> > > >> >>
> > > >>
> > >
> https://dist.apache.org/repos/dist/dev/incubator/teaclave/trustzone-sdk-0.5.0-rc.1/apache-teaclave-trustzone-sdk-0.5.0-incubating.tar.gz
> > > >> >> > $ tar zxvf
> apache-teaclave-trustzone-sdk-0.5.0-incubating.tar.gz
> > > >> >> > $ cd apache-teaclave-trustzone-sdk-0.5.0-incubating
> > > >> >> > $ docker run --rm -it -v$(pwd):/teaclave-trustzone-sdk -w \
> > > >> >> > /teaclave-trustzone-sdk
> yuanz0/teaclave-trustzone-sdk:ubuntu-24.04
> > > \
> > > >> >> > bash -c "./setup.sh && (./build_optee_libraries.sh optee) &&
> > > source \
> > > >> >> > environment && make && (cd ci && ./ci.sh)"
> > > >> >> > ```
> > > >> >> >
> > > >> >> > The vote will be open for at least 72 hours. Anyone can
> participate
> > > >> >> > in testing and voting, not just committers, please feel free
> to try
> > > >> >> > out the release candidate and provide your votes to this thread
> > > >> >> > explicitly.
> > > >> >> >
> > > >> >> > [ ] +1 approve
> > > >> >> > [ ] +0 no opinion
> > > >> >> > [ ] -1 disapprove with the reason
> > > >> >> >
> > > >> >> > Best,
> > > >> >> > Zhaofeng
> > > >> >>
> > > >> >> --
> > > >> >> Xuanwo
> > > >> >>
> > > >> >> https://xuanwo.io/
> > > >> >>
> > > >> >>
> ---------------------------------------------------------------------
> > > >> >> To unsubscribe, e-mail: dev-unsubscr...@teaclave.apache.org
> > > >> >> For additional commands, e-mail: dev-h...@teaclave.apache.org
> > > >> >>
> > > >> >>
> > > >>
> > > >> --
> > > >> Xuanwo
> > > >>
> > > >> https://xuanwo.io/
> > > >>
> > > >>
> ---------------------------------------------------------------------
> > > >> To unsubscribe, e-mail: dev-unsubscr...@teaclave.apache.org
> > > >> For additional commands, e-mail: dev-h...@teaclave.apache.org
> > > >>
> > > >>
> > >
> > > --
> > > Xuanwo
> > >
> > > https://xuanwo.io/
> > >
> > > ---------------------------------------------------------------------
> > > To unsubscribe, e-mail: dev-unsubscr...@teaclave.apache.org
> > > For additional commands, e-mail: dev-h...@teaclave.apache.org
> > >
> > >
> >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@teaclave.apache.org
> For additional commands, e-mail: dev-h...@teaclave.apache.org
>
>

Reply via email to