It's required by the Apache Release process:
http://www.apache.org/dev/release-distribution
<http://www.apache.org/dev/release-distribution>
For every artifact distributed to the public through Apache channels, the PMC
• MUST supply a valid OpenPGP-compatible ASCII-armored detached
signature file
• MUST supply at least one checksum file
• SHOULD supply a SHA-256 and/or SHA-512 checksum file
• SHOULD NOT supply a MD5 or SHA-1 checksum file (because these are
deprecated)
For new releases, PMCs MUST supply SHA-256 and/or SHA-512; and SHOULD NOT
supply MD5 or SHA-1. Existing releases do not need to be changed.
> On Oct 9, 2019, at 6:50 PM, Andor Molnar <[email protected]> wrote:
>
> Checking.
> Why do we generated SHA512 sums for the gpg signatures?
> Is that intentional?
>
> Andor
>
>
>
>> On 2019. Oct 8., at 22:36, Enrico Olivelli <[email protected]> wrote:
>>
>> This is a bugfix release candidate for 3.5.6.
>>
>> It fixes 29 issues, including upgrade of third party libraries,
>> TTL Node APIs for C API, support for PCKS12 Keystores, upgrade of Netty 4
>> and better procedure for the upgrade of servers from 3.4 to 3.5.
>>
>> The full release notes is available at:
>>
>> https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12310801&version=12345243
>>
>> *** Please download, test and vote by October 11th 2019, 23:59 UTC+0. ***
>>
>> Source files:
>> https://people.apache.org/~eolivelli/zookeeper-3.5.6-candidate-4
>>
>> Maven staging repo:
>> https://repository.apache.org/content/repositories/orgapachezookeeper-1044
>>
>> The release candidate tag in git to be voted upon: release-3.5.6-rc4
>> https://github.com/apache/zookeeper/tree/release-3.5.6-rc4
>>
>> ZooKeeper's KEYS file containing PGP keys we use to sign the release:
>> https://www.apache.org/dist/zookeeper/KEYS
>>
>> Should we release this candidate?
>>
>> Enrico Olivelli
>