Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

tools: add release tool, remove old tools (WIP) #681

Closed
wants to merge 1 commit into from

Conversation

rvagg
Copy link
Member

@rvagg rvagg commented Jan 31, 2015

Not finished, pushing now in case people want to give feedback.

This is a release tool to be used by those authorized by the TC to create and promote releases. The person doing the releases will need to:

  • Have a commit-bit to be able to commit in src/node_version.h, update the changelog and tag a release
  • Have access to Jenkins to run the iojs+release job
  • Be able to access the dist@iojs.org account by having their SSH key on the server (the dist user controls the /releases/ directory, the staging user is used by the release build servers to upload their binaries prior to them being promoted by the dist account).
  • Have their GPG key fingerprint listed on the README so the SHASUMS file for their release(s) can be verified

This is nearly ready, I just have some minor items to sort out but we'll get this in to use for the 1.1.0 in #674 where @chrisdickinson will be my guinea-pig! There should also be a document in doc/ to go along with this to explain the process and how to cut a release.

I also need to update the server-side scripts that pair with this in the https://github.com/iojs/build repo, some of it is already there but I need to be able to publicly show the whole lot of this process.

@Fishrock123 Fishrock123 added this to the v1.1.0 milestone Jan 31, 2015
@rvagg
Copy link
Member Author

rvagg commented Feb 1, 2015

Should be ready to merge now I think. Please review @chrisdickinson (and anyone else that wants to).

I've added a verbose releases.md document that describes the release process for anyone authorized to make a release. I don't see this as a final state but simply documenting how it works now; I imagine we'll be iterating on this over time and we'll need to keep this updated.

Also, @chrisdickinson, can you give me your SSH pubkey, you have 3 listed here.

I just need to get Chris' key onto the web server and this is ready to roll I think. I also need to get more stuff into the build repo so I can show what's actually running on the server to make this work, that's not blocking a release but I'll get to it ASAP.

@rvagg
Copy link
Member Author

rvagg commented Feb 1, 2015

Oh, I changed the README to include a section on downloading binaries and some stuff about how to verify checksums and verify checksum files using GPG.

@@ -0,0 +1,121 @@
#!/bin/bash
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

how about env bash instead? bash lives elsewhere on FreeBSD and some other systems.

@rvagg
Copy link
Member Author

rvagg commented Feb 1, 2015

  • changed to #!/usr/bin/env bash as per @jbergstroem's suggestion
  • introduced a cat and prompt once SHASUMS256.txt has been signed to allow the user to see what they are uploading, as per @jbergstroem's suggestion
  • introduced a check that the git tag for vx.y.z is signed with the same key you're using to sign a release
  • introduced a separate release.sh -s version mode where you can do only the checksum & sign step for a version that's already been prompted--in case something goes wrong with the original signing (like you get your GPG password wrong 3 times and it bails)

| sed -E 's|__VERSION__|v'$(python tools/getnodeversion.py)'|g' \
> out/doc/changelog.html

rm out/doc/changelog-body.html
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What do we use for the changelog now?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nada, that stuff was for changelog.html, which we don't publish (yet); we just point people to CHANGELOG.md currently.

When we come up with a better strategy we can fix this, however I think this might be something that the @iojs/website team takes responsibility for building something for coming up wtih something much prettier for.

For details on how to build the CHANGELOG.md entry itself, see doc/releases.md above.

@rvagg
Copy link
Member Author

rvagg commented Feb 2, 2015

  • Removed the stale changelog & email targets from the Makefile, we don't use them and if we do I'm sure the website team can come up with something better

@@ -209,6 +265,7 @@ information about the governance of the io.js project, see
* **Colin Ihrig** ([@cjihrig](https://github.com/cjihrig)) <cjihrig@gmail.com> (Technical Committee)
* **Mikeal Rogers** ([@mikeal](https://github.com/mikeal)) <mikeal.rogers@gmail.com>
* **Rod Vagg** ([@rvagg](https://github.com/rvagg)) <rod@vagg.org>
<br>Release GPG key: DD8F2338BAE7501E3DD5AC78C273792F7D83545D
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe a naive question but can't we use a single master key with as many sub-keys as there are release managers? It would make all releases be signed by "io.js Release Engineering <releng@iojs.org>" (or whatever we decide to call ourselves) and it makes revocation a little easier. Master key management is an open issue, though; who gets to own it?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good question, to which I don't have a simple answer unfortunately.

My personal bias is towards decentralising this and making individuals responsible for signing their releases with their own keys, simply because I think decentralisation in most aspects of the project are more healthy for the community focus and ethos that we're trying to foster. It also makes that individual properly responsible for that release rather than it just being a mechanical task.

However, I don't have any strong technical objections to a more rigid signing mechanism if others prefer that. Perhaps a question for @iojs/tc.

Also added binary download documentation to the README.md and
GPG release key fingerprint for @rvagg.

A SHASUMS256.txt file is produced for every promoted build, nightly and releases. Additionally for releases, this file is signed by the individual responsible for that release. In order to be able to verify downloaded binaries, the public should be able to check that the SHASUMS256.txt file has been signed by someone who has been authorized to create a release.

The GPG keys should be fetchable from a known third-party keyserver, currently the SKS Keyservers at <https://sks-keyservers.net> are recommended. Use the [submission](https://sks-keyservers.net/i/#submit) form to submit a new GPG key. Keys should be fetchable via:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm getting an insecure connection warning when I try to submit my pubkey to this server. Is this something I should be worried about?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Btw, is there any reason to not use https://pgp.mit.edu/ ?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Eventually went ahead with sending my pubkey despite the insecure connection. Was rewarded with a 500 Internal Server Error. ):

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The only reason I chose sks-keyservers.net was because the only precedent I'm aware of for checking signed shasums is in the Docker images for both Node (official Docker ones) and io.js and that's what they've chosen to use. I don't know the reasoning behind this but I went with that as an established convention.

I'm happy to change based on recommendation, @bnoordhuis also had some thoughts about PGP keys so we should chat about this tomorrow at TC.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok, sounds like a good topic for @iojs/tc agenda. @rvagg let's land it the way it is for now, we will fix it later.

@bnoordhuis
Copy link
Member

LGTM FWIW

rvagg added a commit that referenced this pull request Feb 3, 2015
Also added binary download documentation to the README.md and
GPG release key fingerprint for @rvagg.

PR-URL: #681
Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
Reviewed-By: Fedor Indutny <fedor@indutny.com>
@rvagg
Copy link
Member Author

rvagg commented Feb 3, 2015

landed @ df48faf, thanks


```
git push origin branch vx.y.z
# where "branch" is the working branch and "vx.y.z" the the release version
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(we may later add e.g., v1.x here)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants