mirror of https://github.com/cutefishos/calamares
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
4.9 KiB
4.9 KiB
Calamares Release Process
Calamares releases are now rolling when-they-are-ready releases. Releases are made from calamares and tagged there. When, in future, LTS releases resume, these steps may be edited again.
Most things are automated through the release script RELEASE.sh
(1) Preparation
- Make sure all tests pass.
Note that all means all-that-make-sense. The partition-manager tests need an additional environment variable to be set for some tests, which will destroy an attached disk. This is not always desirable. There are some sample config-files that are empty and which fail the config-tests.make make test
- Pull latest translations from Transifex. We only push / pull translations
from master, so longer-lived branches (e.g. 3.1.x) don't get translation
updates. This is to keep the translation workflow simple. The script
automatically commits changes to the translations.
sh ci/txpull.sh
- Update the list of enabled translation languages in
CMakeLists.txt
. Check the [translation site][transifex] for the list of languages with fairly complete translations, or useci/txstats.py
for an automated suggestion. If there are changes, commit them. - Push the changes.
- Check defaults in
settings.conf
and other configuration files. - Drop the RC variable to 0 in
CMakeLists.txt
, CALAMARES_VERSION_RC. - Edit
CHANGES
and set the date of the release. - Commit both. This is usually done with commit-message Changes: pre-release housekeeping.
(2) Release Day
- Run the helper script
ci/RELEASE.sh
or follow steps below. The script checks:- for uncommitted local changes,
- if translations are up-to-date and translators have had enough time to chase new strings,
- that the build is successful (with gcc and clang, if available),
- tests pass,
- tarball can be created,
- tarball can be signed. On success, it prints out a suitable signature- and SHA256 blurb for use in the release announcement.
(3) Release
Follow the instructions printed by the release script.
- Push the tags.
- Create a new release on GitHub.
- Upload tarball and signature.
- Publish release article on
calamares.io
. - Close associated milestone on GitHub if it's entirely done.
- Update topic on #calamares IRC channel.
(4) Post-Release
- Bump the version number in
CMakeLists.txt
in theproject()
command. - Set CALAMARES_VERSION_RC back to 1.
- Add a placeholder entry for the next release in
CHANGES
with date text not released yet. - Commit and push that, usually with the message Changes: post-release housekeeping.
# 3.2.XX (unreleased) #
This release contains contributions from (alphabetically by first name):
- No external contributors yet
## Core ##
- No core changes yet
## Modules ##
- No module changes yet
Related Material
This section isn't directly related to any specific release, but bears on all releases.
GPG Key Maintainence
Calamares uses GPG Keys for signing the tarballs and some commits (tags, mostly). Calamares uses the maintainer's personal GPG key for this. This section details some GPG activities that the maintainer should do with those keys.
- Signing sub-key. It's convenient to use a signing sub-key specifically
for the signing of Calamares. To do so, add a key to the private key.
It's recommended to use key expiry, and to update signing keys periodically.
- Run
gpg -K
to find the key ID of your personal GPG secret key. - Run
gpg --edit-key <keyid>
to edit that personal GPG key. - In gpg edit-mode, use
addkey
, then pick a key type that is sign-only (e.g. type 4, RSA (sign only)), then pick a keysize (3072 seems ok as of 2020) and set a key expiry time, (e.g. in 18 months time). - After generation, the secret key information is printed again, now
including the new signing subkey:
- Run
ssb rsa3072/0xCFDDC96F12B1915C created: 2020-07-11 expires: 2022-01-02 usage: S
- Update the `RELEASE.sh` script with a new signing sub-key ID when a new
one is generated. Also announce the change of signing sub-key (e.g. on
the Calmares site or as part of a release announcement).
- Send the updated key to keyservers with `gpg --send-keys <keyid>`
- Optional: sanitize the keyring for use in development machines.
Export the current subkeys of the master key and keep **only** those
secret keys around. There is documentation
[here](https://blog.tinned-software.net/create-gnupg-key-with-sub-keys-to-sign-encrypt-authenticate/)
but be careful.
- Export the public key material with `gpg --export --armor <keyid>`,
possibly also setting an output file.
- Upload that public key to the relevant GitHub profile.
- Upload that public key to the Calamares site.