This is an automated email from the ASF dual-hosted git repository.

ptoth pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/spark-website.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 0ca0223f29 Update gpg key generation
0ca0223f29 is described below

commit 0ca0223f29b707f922fc9f7cbbf3b1f472ec5468
Author: Peter Toth <peter.t...@gmail.com>
AuthorDate: Fri Sep 19 19:48:26 2025 +0200

    Update gpg key generation
    
    This PR:
    - updates `release-process.md` with an up to date gpg key generation 
process using ECC keys
    - adds a note that the `Release Apache Spark` GitHub action only works with 
gpg keys that contain `apache.org` email
    
    Author: Peter Toth <peter.t...@gmail.com>
    
    Closes #634 from peter-toth/update-gpg-key-generation.
---
 release-process.md        | 43 ++++++++++++++++++++++++-------------------
 site/release-process.html | 43 ++++++++++++++++++++++++-------------------
 2 files changed, 48 insertions(+), 38 deletions(-)

diff --git a/release-process.md b/release-process.md
index a5aac61211..13ca67993b 100644
--- a/release-process.md
+++ b/release-process.md
@@ -54,40 +54,46 @@ You can skip this section if you have already uploaded your 
key.
 
 <h4 id="generate-key">Generate key</h4>
 
-Here's an example of gpg 2.0.12. If you use gpg version 1 series, please refer 
to <a 
href="https://www.apache.org/dev/openpgp.html#generate-key";>generate-key</a> 
for details.
+Here's an example of gpg 2.4.8. If you use gpg version 1 series, please refer 
to <a 
href="https://www.apache.org/dev/openpgp.html#generate-key";>generate-key</a> 
for details.
+Note that you need an `@apache.org` email address to prepare a Spark release 
with the `Release Apache Spark` GitHub action.
 
 ```
 $ gpg --full-gen-key
-gpg (GnuPG) 2.0.12; Copyright (C) 2009 Free Software Foundation, Inc.
+gpg (GnuPG) 2.4.8; Copyright (C) 2025 g10 Code GmbH
 This is free software: you are free to change and redistribute it.
 There is NO WARRANTY, to the extent permitted by law.
 
 Please select what kind of key you want:
-   (1) RSA and RSA (default)
+   (1) RSA and RSA
    (2) DSA and Elgamal
    (3) DSA (sign only)
    (4) RSA (sign only)
+   (9) ECC (sign and encrypt) *default*
+  (10) ECC (sign only)
+  (14) Existing key from card
+Your selection? 9
+Please select which elliptic curve you want:
+   (1) Curve 25519 *default*
+   (4) NIST P-384
+   (6) Brainpool P-256
 Your selection? 1
-RSA keys may be between 1024 and 4096 bits long.
-What keysize do you want? (2048) 4096
-Requested keysize is 4096 bits
 Please specify how long the key should be valid.
          0 = key does not expire
       <n>  = key expires in n days
       <n>w = key expires in n weeks
       <n>m = key expires in n months
       <n>y = key expires in n years
-Key is valid for? (0) 
+Key is valid for? (0) 0
 Key does not expire at all
 Is this correct? (y/N) y
 
 GnuPG needs to construct a user ID to identify your key.
 
-Real name: Robert Burrell Donkin
-Email address: rdon...@apache.org
+Real name: Peter Test
+Email address: pt...@apache.org
 Comment: CODE SIGNING KEY
 You selected this USER-ID:
-    "Robert Burrell Donkin (CODE SIGNING KEY) <rdon...@apache.org>"
+    "Peter Test (CODE SIGNING KEY) <pt...@apache.org>"
 
 Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
 We need to generate a lot of random bytes. It is a good idea to perform
@@ -98,24 +104,23 @@ We need to generate a lot of random bytes. It is a good 
idea to perform
 some other action (type on the keyboard, move the mouse, utilize the
 disks) during the prime generation; this gives the random number
 generator a better chance to gain enough entropy.
-gpg: key 04B3B5C426A27D33 marked as ultimately trusted
-gpg: revocation certificate stored as 
'/home/ubuntu/.gnupg/openpgp-revocs.d/08071B1E23C8A7E2CA1E891A04B3B5C426A27D33.rev'
+gpg: revocation certificate stored as 
'/Users/ptest/.gnupg/openpgp-revocs.d/69DD5A189B3C274353A677214926E0E83FF6D044.rev'
 public and secret key created and signed.
 
-pub   rsa4096 2021-08-19 [SC]
-      08071B1E23C8A7E2CA1E891A04B3B5C426A27D33
-uid                      Jack (test) <j...@mail.com>
-sub   rsa4096 2021-08-19 [E]
+pub   ed25519 2025-09-18 [SC]
+      69DD5A189B3C274353A677214926E0E83FF6D044
+uid                      Peter Test (CODE SIGNING KEY) <pt...@apache.org>
+sub   cv25519 2025-09-18 [E]
 ```
 
-Note that the last 8 digits (26A27D33) of the public key is the <a 
href="https://infra.apache.org/release-signing.html#key-id";>key ID</a>.
+Note that the last 8 digits (3FF6D044) of the public key is the <a 
href="https://infra.apache.org/release-signing.html#key-id";>key ID</a>.
 
 <h4 id="upload-key">Upload key</h4>
 
 After generating the public key, we should upload it to <a 
href="https://infra.apache.org/release-signing.html#keyserver";>public key 
server</a>:
 
 ```
-$ gpg --keyserver hkps://keys.openpgp.org --send-key 26A27D33
+$ gpg --keyserver hkps://keys.openpgp.org --send-key 3FF6D044
 ```
 
 Please refer to <a 
href="https://infra.apache.org/release-signing.html#keyserver-upload";>keyserver-upload</a>
 for details.
@@ -125,7 +130,7 @@ Please refer to <a 
href="https://infra.apache.org/release-signing.html#keyserver
 To get the code signing key (a.k.a ASCII-armored public key), run the command:
 
 ```
-$ gpg --export --armor 26A27D33
+$ gpg --export --armor 3FF6D044
 ```
 
 And then append the generated key to the KEYS file by:
diff --git a/site/release-process.html b/site/release-process.html
index 737b2079af..0cb9a754f0 100644
--- a/site/release-process.html
+++ b/site/release-process.html
@@ -220,39 +220,45 @@
 
 <h4 id="generate-key">Generate key</h4>
 
-<p>Here&#8217;s an example of gpg 2.0.12. If you use gpg version 1 series, 
please refer to <a 
href="https://www.apache.org/dev/openpgp.html#generate-key";>generate-key</a> 
for details.</p>
+<p>Here&#8217;s an example of gpg 2.4.8. If you use gpg version 1 series, 
please refer to <a 
href="https://www.apache.org/dev/openpgp.html#generate-key";>generate-key</a> 
for details.
+Note that you need an <code class="language-plaintext 
highlighter-rouge">@apache.org</code> email address to prepare a Spark release 
with the <code class="language-plaintext highlighter-rouge">Release Apache 
Spark</code> GitHub action.</p>
 
 <div class="language-plaintext highlighter-rouge"><div class="highlight"><pre 
class="highlight"><code>$ gpg --full-gen-key
-gpg (GnuPG) 2.0.12; Copyright (C) 2009 Free Software Foundation, Inc.
+gpg (GnuPG) 2.4.8; Copyright (C) 2025 g10 Code GmbH
 This is free software: you are free to change and redistribute it.
 There is NO WARRANTY, to the extent permitted by law.
 
 Please select what kind of key you want:
-   (1) RSA and RSA (default)
+   (1) RSA and RSA
    (2) DSA and Elgamal
    (3) DSA (sign only)
    (4) RSA (sign only)
+   (9) ECC (sign and encrypt) *default*
+  (10) ECC (sign only)
+  (14) Existing key from card
+Your selection? 9
+Please select which elliptic curve you want:
+   (1) Curve 25519 *default*
+   (4) NIST P-384
+   (6) Brainpool P-256
 Your selection? 1
-RSA keys may be between 1024 and 4096 bits long.
-What keysize do you want? (2048) 4096
-Requested keysize is 4096 bits
 Please specify how long the key should be valid.
          0 = key does not expire
       &lt;n&gt;  = key expires in n days
       &lt;n&gt;w = key expires in n weeks
       &lt;n&gt;m = key expires in n months
       &lt;n&gt;y = key expires in n years
-Key is valid for? (0) 
+Key is valid for? (0) 0
 Key does not expire at all
 Is this correct? (y/N) y
 
 GnuPG needs to construct a user ID to identify your key.
 
-Real name: Robert Burrell Donkin
-Email address: rdon...@apache.org
+Real name: Peter Test
+Email address: pt...@apache.org
 Comment: CODE SIGNING KEY
 You selected this USER-ID:
-    "Robert Burrell Donkin (CODE SIGNING KEY) &lt;rdon...@apache.org&gt;"
+    "Peter Test (CODE SIGNING KEY) &lt;pt...@apache.org&gt;"
 
 Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
 We need to generate a lot of random bytes. It is a good idea to perform
@@ -263,23 +269,22 @@ We need to generate a lot of random bytes. It is a good 
idea to perform
 some other action (type on the keyboard, move the mouse, utilize the
 disks) during the prime generation; this gives the random number
 generator a better chance to gain enough entropy.
-gpg: key 04B3B5C426A27D33 marked as ultimately trusted
-gpg: revocation certificate stored as 
'/home/ubuntu/.gnupg/openpgp-revocs.d/08071B1E23C8A7E2CA1E891A04B3B5C426A27D33.rev'
+gpg: revocation certificate stored as 
'/Users/ptest/.gnupg/openpgp-revocs.d/69DD5A189B3C274353A677214926E0E83FF6D044.rev'
 public and secret key created and signed.
 
-pub   rsa4096 2021-08-19 [SC]
-      08071B1E23C8A7E2CA1E891A04B3B5C426A27D33
-uid                      Jack (test) &lt;j...@mail.com&gt;
-sub   rsa4096 2021-08-19 [E]
+pub   ed25519 2025-09-18 [SC]
+      69DD5A189B3C274353A677214926E0E83FF6D044
+uid                      Peter Test (CODE SIGNING KEY) &lt;pt...@apache.org&gt;
+sub   cv25519 2025-09-18 [E]
 </code></pre></div></div>
 
-<p>Note that the last 8 digits (26A27D33) of the public key is the <a 
href="https://infra.apache.org/release-signing.html#key-id";>key ID</a>.</p>
+<p>Note that the last 8 digits (3FF6D044) of the public key is the <a 
href="https://infra.apache.org/release-signing.html#key-id";>key ID</a>.</p>
 
 <h4 id="upload-key">Upload key</h4>
 
 <p>After generating the public key, we should upload it to <a 
href="https://infra.apache.org/release-signing.html#keyserver";>public key 
server</a>:</p>
 
-<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre 
class="highlight"><code>$ gpg --keyserver hkps://keys.openpgp.org --send-key 
26A27D33
+<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre 
class="highlight"><code>$ gpg --keyserver hkps://keys.openpgp.org --send-key 
3FF6D044
 </code></pre></div></div>
 
 <p>Please refer to <a 
href="https://infra.apache.org/release-signing.html#keyserver-upload";>keyserver-upload</a>
 for details.</p>
@@ -288,7 +293,7 @@ sub   rsa4096 2021-08-19 [E]
 
 <p>To get the code signing key (a.k.a ASCII-armored public key), run the 
command:</p>
 
-<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre 
class="highlight"><code>$ gpg --export --armor 26A27D33
+<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre 
class="highlight"><code>$ gpg --export --armor 3FF6D044
 </code></pre></div></div>
 
 <p>And then append the generated key to the KEYS file by:</p>


---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscr...@spark.apache.org
For additional commands, e-mail: commits-h...@spark.apache.org

Reply via email to