THIS IS A TEST INSTANCE. ALL YOUR CHANGES WILL BE LOST!!!!
...
- Are the LICENSE and NOTICE files present in the source root and complete?
- Specifically look in the nifi-${MINIFI_VERSION}-sources-release.zip artifact and ensure these files are present at the root of the archive.
- Evaluate the sources and dependencies.
- Does the overall LICENSE and NOTICE appear correct?
- Do all licenses fit within the ASF approved licenses?Here is an example path to a sources artifact that has been prepared but not released:
https://repository.apache.org/content/repositories/${STAGING_REPO_ID}/org/apache/nifi/nifi/${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip
- Is there a README available that explains how to build the application and to execute it?
- Look in the *-sources.zip artifact root for the readme.
- Are the signatures and hashes correct for the source release?
- Validate the hashes of the sources artifact do in fact match
- Validate the signature of the source artifact.:https://repository.apache.org/content/repositories/${STAGING_REPO_ID}/org/apache/nifi/nifi/${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.md5https://repository.apache.org/content/repositories/${STAGING_REPO_ID}/org/apache/nifi/nifi/${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.sha1Validate the signature of the source artifact. Here is an example path:https://repository.apache.org/content/repositories/${STAGING_REPO_ID}/org/apache/nifi/nifi/${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.asc
- Need a quick reminder on how to verify a signature?
- Do all sources have necessary headers?
- Unzip the sources file into a directory and execute mvn install -Pcontrib-check
- Are there no unexpected binary files in the release?
- The only thing we'd expect would be potentially test resources files.
- Does the app (if appropriate) execute and function as expected?
...
- Create a JIRA ticket for the release tasks for version ${NIFI
MINIFI_VERSION}.
_The resulting JIRA ticket number is referred to as ${JIRA_TICKET} in this guide. - Create the next version in JIRA, if it doesn't already exist, so work can continue towards that release.
- Create meaningful release notes for this version if not already created. Enter them here https://cwiki.apache.org/confluence/display/MINIFI/Release+Notes#ReleaseNotes-MiNiFi(C++) on the MiNiFi wiki.
- Create a new branch off 'master' named after the JIRA ticket.
$ git checkout -b MINIFICPP-${JIRA_TICKET}-RC${RC} ${BRANCH} - Verify that you have the needed dependencies to build and run MiNiFi
- Ensure the the full application builds, all tests work, and source passes linting by executing the following:
TODO/DISCUSS: Should likely ensure all options are enabled to do a full build of all extensions.
mkdir build && cd build && cmake .. && make package && make package_source && make test && make linter && make docker - Startup and test the application with from the build folder:
tar xf nifi-minifi-cpp-0.2.0${MINIFI_VERSION}-bin.tar.gz && ./nifi-minifi-cpp-0.2.0${MINIFI_VERSION}/bin/minifi.sh start - Evaluate and ensure the appropriate license headers are present on all source files.
- Ensure LICENSE and NOTICE files are complete and accurate. (Developers should always be keeping these up to date as they go along adding source and modifying dependencies to keep this burden manageable.)
- The validated artifacts all look good then push the branch to origin release branch to the ASF repository.
$ git push asf MINIFI-CPP-${JIRA_TICKET}-RC${RC}
Generate convenience binaries
TODO/DISCUSS: Which platforms should we provide convenience binaries for? How do we handle optional extensions?Generate convenience binaries
OS X
Linux - RHEL based
...
gsha256sum ${artifact} | cut -d" " -f1 > ${artifact}.sha256
done
- ASCII armored GPG signatures (--digest-algo=SHA512 select the SHA512 hash algorithm). Configure GPG to always prefer stronger hashes.
$ gpg -a -b --digest-algo=SHA512 nifi-${
NIFI- ASCII armored GPG signatures (--digest-algo=SHA512 select the SHA512 hash algorithm). Configure GPG to always prefer stronger hashes.
- MINIFI_VERSION}-source-release.zip # produces nifi-${
NIFI- MINIFI_VERSION}-source-release.zip.asc
$ gpg -a -b --digest-algo=SHA512 nifi-${
NIFI- MINIFI_VERSION}-source-release.zip.asc
- MINIFI_VERSION}-bin.tar.gz # produces nifi-${
NIFI- MINIFI_VERSION}-bin.tar.gz.asc
$ gpg -a -b --digest-algo=SHA512 nifi-${
NIFI- MINIFI_VERSION}-bin.tar.gz.asc
- MINIFI_VERSION}-bin.zip # produces nifi-${
NIFI- MINIFI_VERSION}-bin.zip.asc
- Generate md5 hash summaries.
$ md5sum nifi-${
NIFI- MINIFI_VERSION}-source-release.zip | cut -d" " -f1 > nifi-${
NIFI- MINIFI_VERSION}-source-release.zip.md5
$ md5sum nifi-${
NIFI- MINIFI_VERSION}-source-release.zip.md5
- MINIFI_VERSION}-bin.tar.gz | cut -d" " -f1 > nifi-${
NIFI- MINIFI_VERSION}-bin.tar.gz.md5
$ md5sum nifi-${
NIFI- MINIFI_VERSION}-bin.tar.gz.md5
- MINIFI_VERSION}-bin.zip | cut -d" " -f1 > nifi-${
NIFI- MINIFI_VERSION}-bin.zip.md5
- Generate SHA1 hash summaries.
$ sha1sum nifi-${
NIFI- MINIFI_VERSION}-source-release.zip | cut -d" " -f1 > nifi-${RELEASAE}-source-release.zip.sha1
$ sha1sum nifi-${
NIFI- MINIFI_VERSION}-source-release.zip | cut -d" " -f1 > nifi-${RELEASAE}-source-release.zip.sha1
- MINIFI_VERSION}-bin.tar.gz | cut -d" " -f1 > nifi-${RELEASAE}-bin.tar.gz.sha1
$ sha1sum nifi-${
NIFI- MINIFI_VERSION}-bin.tar.gz | cut -d" " -f1 > nifi-${RELEASAE}-bin.tar.gz.sha1
- MINIFI_VERSION}-bin.zip | cut -d" " -f1 > nifi-${RELEASAE}-bin.zip.sha1
- Generate SHA256 hash summaries.
$ shasum -a 256 nifi-${
NIFI- MINIFI_VERSION}-source-release.zip | cut -d" " -f1 > nifi-${
NIFI- MINIFI_VERSION}-source-release.zip.sha256
$ shasum -a 256 nifi-${
NIFI- MINIFI_VERSION}-source-release.zip.sha256
- MINIFI_VERSION}-bin.tar.gz | cut -d" " -f1 > nifi-${
NIFI- MINIFI_VERSION}-bin.tar.gz.sha256
$ shasum -a 256 nifi-${
NIFI- MINIFI_VERSION}-bin.tar.gz.sha256
- MINIFI_VERSION}-bin.zip | cut -d" " -f1 > nifi-${
NIFI- MINIFI_VERSION}-bin.zip.sha256
- For reviewing of the release candidate, commit the source release and convenience binaries files along with their hashes and signatures to https://dist.apache.org/repos/dist/dev/nifi/nifi-minifi-cpp/${VERSION}
...
- RM sends a vote request email to the NiFi Developers Mailing List.
- TO: dev@nifi.apache.org
- FROM: ${RM_USERID}@apache.org
- SUBJECT: [VOTE] Release Apache NiFi MiNiFi C++ ${NIFIMINIFI_VERSION}
Hello,
I am pleased to be calling this vote for the source release of Apache NiFi nifi-${NIFIMINIFI_VERSION}.
The source zip, including signatures, digests, etc. can be found at:
https://repository.apache.org/content/repositories/orgapachenifi-nnnn
The Git tag is nifi-${NIFI_VERSION}-RC${RC}
The Git commit ID is <40-BYTE-COMMIT-HASH>
https://git-wip-us.apache.org/repos/asf?p=nifi.git;a=commit;h=<40-BYTE-COMMIT-HASH>
Checksums of nifi-x.y.z-source-release.zip:
MD5: <32-BYTE-MD5SUM-HASH>
SHA1: <40-BYTE-SHA1SUM-HASH>
Release artifacts are signed with the following key:
https://people.apache.org/keys/committer/${RM_USERID}.asc
KEYS file available here:
https://dist.apache.org/repos/dist/release/nifi/KEYS
8 issues were closed/resolved for this release:
https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12316020&version=12329307
Release note highlights can be found here:
https://cwiki.apache.org/confluence/display/NIFI/Release+Notes#ReleaseNotes-Version${NIFI_VERSION}
The vote will be open for 72 hours.
Please download the release candidate and evaluate the necessary items including checking hashes, signatures, build
from source, and test. The please vote:
[ ] +1 Release this package as nifi-${NIFI_VERSION}
[ ] +0 no opinion
[ ] -1 Do not release this package because because...
- RM sends the following helper email to the NiFi Developers Mailing List.
- TO: dev@nifi.apache.org
- FROM: ${RM_USERID}@apache.org
- SUBJECT: Apache NiFi ${NIFI_VERSION} RC${RC} Release Helper Guide
Hello Apache NiFi community,
Please find the associated guidance to help those interested in validating/verifying the release so they can vote.
# Download latest KEYS file:
https://dist.apache.org/repos/dist/dev/nifi/KEYS
# Import keys file:
gpg --import KEYS
# [optional] Clear out local maven artifact repository
# Pull down nifi-${NIFI_VERSION} source release artifacts for review:
wget https://dist.apache.org/repos/dist/dev/nifi/nifi-${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip
wget https://dist.apache.org/repos/dist/dev/nifi/nifi-${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.asc
wget https://dist.apache.org/repos/dist/dev/nifi/nifi-${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.md5
wget https://dist.apache.org/repos/dist/dev/nifi/nifi-${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.sha1
wget https://dist.apache.org/repos/dist/dev/nifi/nifi-${NIFI_VERSION}/nifi-${NIFI_VERSION}-source-release.zip.sha256
# Verify the signature
gpg --verify nifi-${MINIFI_VERSION}-source-release.zip.asc
# Verify the hashes (md5, sha1, sha256) match the source and what was provided in the vote email thread
md5sum nifi-${MINIFI_VERSION}-source-release.zip
sha1sum nifi-${MINIFI_VERSION}-source-release.zip
sha256sum nifi-${MINIFI_VERSION}-source-release.zip
# Unzip nifi-${MINIFI_VERSION}-source-release.zip
# Verify the build works including release audit tool (RAT) checks
cd nifi-${MINIFI_VERSION}
mvn clean install -Pcontrib-check
# Verify the contents contain a good README, NOTICE, and LICENSE.
# Verify the git commit ID is correct
# Verify the RC was branched off the correct git commit ID
# Look at the resulting convenience binary as found in nifi-assembly/target
# Make sure the README, NOTICE, and LICENSE are present and correct
# Run the resulting convenience binary and make sure it works as expected
# Send a response to the vote thread indicating a +1, 0, -1 based on your findings.
Thank you for your time and effort to validate the release!
- Developers in the community review the release candiate and reply to the vote email with their vote.
- After 72 hours if
- at least 3 binding (PMC members) cast +1 votes, and
- the positive binding votes out number any negative binding votes
- the vote passes and the release candidate is officially released. If the vote does not pass, corrections are made on the release branch and a new release candidate is put forward for a new vote.
- RM sends vote result email.
- TO: dev@nifi.apache.org
- FROM: ${RM_USERID}@apache.org
- SUBJECT: [RESULT][VOTE] Release Apache NiFi MiNiFi C++ ${NIFI_VERSION}
Apache NiFi Community,
I am pleased to announce that the ${NIFI_VERSION} release of Apache NiFi MiNiFi C++ passes with
X +1 (binding) votes
Y -1 (binding) votes
0 0 votes
0 -1 votes
Thanks to all who helped make this release possible.
Here is the PMC vote thread: ${VOTE_THREAD_URL}
...