On 11/02/2012 07:06 PM, Jasha Joachimsthal wrote:
On 1 November 2012 23:50, Ate Douma <[email protected]> wrote:

Discussion thread for vote on 0.17 release candidate.

For more information on the release process, checkout -
http://www.apache.org/dev/**release.html<http://www.apache.org/dev/release.html>

Some of the things to check before voting are:
- can you run the demo binaries

yes

- can you build the contents of source-release.zip and svn tag

yes

- do all of the staged jars/zips contain the required LICENSE and NOTICE
files

yes

- are all of the staged artifacts signed and the signature verifiable


rave-portal-0.17.war contains a jar that is not the one from Maven Central.
wookie-java-connector-0.10.0-incubating.jar was built by you, probably to
test its release.
Ah, good catch :)


Apparently I made a similar mistake with Rave 0.16.
shindig-common-2.5.0-beta3.jar in Rave 0.17 is from Maven central, the one
in Rave 0.16 was built by me. I thought I had built 0.16 against an empty
local repository, but apparently not. It also happened with the
wookie-java-connector in Rave 0.15 built by Matt.
Right, its an easy to overlook thing.
I agree this isn't 'proper', but I don't think it is a big deal either.

Note that this concerns 'non-source' artifacts which we build and bundle as convenience for the community. These are *not* the release itself, which only is the sources tarball.

While I didn't intend to have my locally build version of wookie bundled up, it doesn't make much difference if you compare that with other 3rd party artifacts we bundle up likewise. Including many non-Apache 3rd party artifacts which were also build and released outside 'our' (Apache) release process.

Who is verifying those other 3rd party artifacts contents and by whom they were build? Having as much as possible of these 3rd party artifacts coming from an official and *verifiable* Apache release definitely helps, and therefore bundling a locally (re)build of the wookie jar is less ideal. But as we still have, and probably always will have, many other 3rd party artifacts bundled up as well, it doesn't make much difference in the *assurance* level of these binaries.

With regards to this specific wookie jar: you'll have to trust me I didn't 'hack' it to inject some nasty virus or likewise. Neither did I do such thing while building the rave sources ... To be sure though you would have to decompile both this wookie jar *and* all the rave jars as well, and try to verify them that way. Which should make clear that isn't the point.

What remains therefore, and what *is* important for the community, is that what we provide (as convenience) and release (as source) is properly signed and thus verifiable the same artifacts we voted upon. And this is why we say only the voted upon and signed *sources* constitute the release. Binaries are just provided for convenience and remains the responsibility of the end-user to verify and trust, or else better build themselves.

Actually in Java/Maven land we have it quite easy: compare this with providing native builds, which might *require* the Release Manager to build many 3rd party sources locally first...

In short: I don't think this really matter much, certainly not enough to cancel or redo a release for. Not would it be if it happens again in the future. But also: the more we use verifiable Apache or other 3rd party artifacts, the easier it is to verify and trust it, so we should strive for not making such accidental mistakes.

Thanks, Ate


- is the signing key in the project's KEYS file and on a public server

yes


Reply via email to