|
|
|
@ -256,13 +256,17 @@ While hashes provide a signature that the content of the downloads is what it
|
|
|
|
|
was generated, signed packages provide traceability of where the package came
|
|
|
|
|
from.
|
|
|
|
|
|
|
|
|
|
To do this follow the following steps:
|
|
|
|
|
To do this, run the following `make` commands:
|
|
|
|
|
|
|
|
|
|
1. Download each of the release bundles generated by the CI system
|
|
|
|
|
2. Sign each of them using GnuPG using the command `gpg --armor --detach-sign [FILE NAME]`.
|
|
|
|
|
This will generate a file name `[FILE NAME].asc` with an ascii armored signature.
|
|
|
|
|
```shell
|
|
|
|
|
make clean
|
|
|
|
|
make fetch-dist
|
|
|
|
|
make sign
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Each of the signature files needs to be uploaded to the release on GitHub.
|
|
|
|
|
This will generate ascii armored signature files for each of the files pushed by CI.
|
|
|
|
|
|
|
|
|
|
All of the signature files need to be uploaded to the release on GitHub.
|
|
|
|
|
|
|
|
|
|
## 8. Write the Release Notes
|
|
|
|
|
|
|
|
|
@ -346,8 +350,9 @@ git log --no-merges --pretty=format:'- %s %H (%aN)' $PREVIOUS_RELEASE..$RELEASE_
|
|
|
|
|
After generating the changelog, you will need to categorize the changes as shown
|
|
|
|
|
in the example above.
|
|
|
|
|
|
|
|
|
|
Once finished, go into GitHub and edit the release notes for the tagged release
|
|
|
|
|
with the notes written here.
|
|
|
|
|
Once finished, go into GitHub and edit the release notes for the tagged release with the notes written here.
|
|
|
|
|
|
|
|
|
|
Remember to attach the ascii armored signatures generated in the previous step to the release notes.
|
|
|
|
|
|
|
|
|
|
## 9. Evangelize
|
|
|
|
|
|
|
|
|
|