Thank you Suresh, for your guidance. I added my Apache email to my gpg key
-
https://keyserver.ubuntu.com/pks/lookup?search=FEA3B727837F1FD607A9A4CB33F4F7D7D7406083&fingerprint=on&op=index

Lahiru

On Mon, Nov 25, 2024 at 9:07 PM Suresh Marru <sma...@apache.org> wrote:

> Lahiru,
>
> Your key does not have your apache.org email, can you add it? This is
> what I see -
> https://keyserver.ubuntu.com/pks/lookup?search=FEA3B727837F1FD607A9A4CB33F4F7D7D7406083&fingerprint=on&op=index
>
> Here is my key for reference -
> https://keyserver.ubuntu.com/pks/lookup?search=2477158D2F31E2858063346579B3F4FD617DDBAD&fingerprint=on&op=index
>
> You can follow these instructions -
> https://infra.apache.org/openpgp.html#generate-key it is a good practice
> to have your apache.org email with a comment “CODE SIGNING KEY”
>
> Suresh
>
> On Nov 25, 2024, at 8:57 PM, Lahiru Jayathilake <
> lahirujayathil...@gmail.com> wrote:
>
> Hi Suresh,
>
> Yes, I need to get my key signed. I've had my GPG key signed by one Apache
> committer and need two additional signatures to meet the recommended three.
> My GPG Key ID is *FEA3B727837F1FD607A9A4CB33F4F7D7D7406083*.
>
> Thanks,
> Lahiru
>
> On Mon, Nov 25, 2024 at 7:02 PM Suresh Marru <sma...@apache.org> wrote:
>
>> Hi Lahiru,
>>
>> Thanks for championing this release. Please let me know if you need help.
>>
>> Do you have your keys signed? Can you share your gpg key id?
>>
>> Suresh
>>
>> On Nov 3, 2024, at 11:59 PM, Lahiru Jayathilake <
>> lahirujayathil...@gmail.com> wrote:
>>
>> Hi all,
>>
>> I would like to propose initiating the second release of Apache Airavata
>> Custos, version 1.1.0.
>> Key Details:
>>
>>    - *Current Version:* 1.1-SNAPSHOT
>>    - *Last Commit Hash:* 19b6f5e06fb44007cdeaef2b1b2b2a6cd25ab1be
>>    - *Initial Release:* Custos Initial Code Base
>>
>> Major Changes Since the Initial Release:
>>
>>    - *Keycloak Upgrade:* Upgraded from version 9.0.2 to 24.0.0 for
>>    improved security and features.
>>    - *Service-to-Service Communication: *Simplified service interactions
>>    by refactoring them into dependency-based communication.
>>    - *OIDC Standards Implementation:* Updated the authorization, token,
>>    and OIDC endpoints to comply with OIDC standards, with changes to
>>    parameters and response formats.
>>    - *Nginx Proxy Removal:* Removed Nginx as a reverse proxy; SSL
>>    termination is now handled by the deployment architecture.
>>    - *PKCE Flow:* Introduced support for PKCE flow, suitable for Single
>>    Page Applications (SPA).
>>    - *JWKS Endpoint:* Added a JWKS endpoint to enable public key
>>    verification.
>>    - *Token Customization:* Added group and scope injection for
>>    fine-grained authorization.
>>
>> New Module Architecture:
>>
>>    - *custos-application:* Entry point, configuration, and API
>>    integration.
>>    - *custos-core:* Core business logic, entities, and repositories.
>>    - *custos-services:* Service classes for implementing business logic.
>>    - *custos-api:* REST controllers to expose application functionality.
>>
>> Infrastructure and Deployment Changes (for context):
>>
>>    - Terraform deployment scripts were added for AWS, including network
>>    layer (VPC, private/public subnets, etc.), Keycloak deployment, and Vault
>>    deployment.
>>
>>
>> I would appreciate any feedback or suggestions on these changes. Once
>> we've gathered input and reached a consensus within the community, I'll
>> move forward with preparing the release candidate.
>>
>> Looking forward to your thoughts.
>>
>> Thanks,
>> Lahiru
>>
>>
>>
>

Reply via email to