-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update to 2022.07 #50
Conversation
Outside of the gpg stuff this is pretty much the same as the change made for the last update: #46 |
Earlier today I pushed this key to keys.openpgp.org. But it's doesn't have a verified email address associated yet. (Should happen in the coming days.) |
It would make it easier for people to sign the key if nothing else. |
I'm happy for either this to go ahead as is, or wait if there are any objections to the current key setup. |
@jonathanstowe Sadly keys.openpgp.org strips all signing info off of the keys. That's one of the reasons why I put the keys on rakudo.org as well (the keys there aren't stripped). @m-dango If you verify the fingerprint by just hard-coding it (this PR doesn't anymore) then it doesn't matter if the key is loaded from rakudo.org or a keyserver. Can you make it so? |
@patrickbkr I wasn't quite sure what you meant, I've added a line which should error if the specified key has not been imported. |
@m-dango Yes, that should do it. |
Who usually merges PRs in this repo? Is there any procedure apart from pushing the "merge" button? |
2022.06.1/alpine3.16/Dockerfile
Outdated
&& gpg --batch --keyserver $keyserver --recv-keys $keyfp \ | ||
&& wget $pubkeyurl -O ${tmpdir}/${keyfp}.asc \ | ||
&& gpg --import ${tmpdir}/${keyfp}.asc \ | ||
&& gpg --check-signatures $keyfp \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Doesn't this just verify that $keyfp
is in the set of keys imported?
(I think this still leaves it open to an extra key getting injected into the file on the server which will then satisfy --batch --verify
as long as the original key exists in the imported file too)
In cases like this previously I've suggested something like gpg --import ... && gpg --export FULL-FINGERPRINT > some-new-file && rm -rf GNUPGHOME && gpg --import some-new-file
🙈
I'm on a mobile connection so can't test locally at the moment, bear with me… |
Why use |
Just picked what I saw was latest, hadn't realised it wasn't a stable release! |
@AntonOks Do you know where the |
@patrickbkr Yes, that's a "hand made Star-only" release... made after your latest GPG / signing fixes there. Remember, the GH workflows were not running for some time... so after our discussion, I rolled-back your changes, a GH workflow build was successfully done and a Star-2022.06 release was created and deployed. |
@AntonOks OK. Then I understand.
Are you aware of the build revision number in the release files (the `-01` thing in the filename)? The idea is to increment that number when doing a rebuild of the same underlying Rakudo release. Then there won't be a collision should Rakudo do a fixup release as well and it's obvious which version of Rakudo was used. (I think there actually was some discussion around a potential 2022.06.1 Rakudo release, but it luckily didn't materialize.)
I think this time it's better to leave the star release 2022.06.1 up (instead of replacing it with a 2022.06-01).
On July 8, 2022 2:12:36 PM GMT+02:00, Anton Oks ***@***.***> wrote:
>
***@***.*** Yes, that's a "hand made Star-only" release... made after your latest GPG / signing fixes there.
…
Remember, the GH workflows were not running for some time... so after our discussion, I rolled-back your changes, a GH workflow build was successfully done and a Star-2022.06 release was created and deployed.
The you found some time to fix the signing thing, you re-undid my undo and the GH workflow was still / again successful.
As ppl may have had installed the previous 2020.06 already, the newest release had to have another name. So I adopted the latest release to "patch 1".
--
Reply to this email directly or view it on GitHub:
#50 (comment)
You are receiving this because you were mentioned.
Message ID: ***@***.***>
|
@m-dango Sorry to intervene once more. Can you change the PR to name the docker image 2022.06 (without the .1)? That will hopefully limit the confusion surrounding a non-existing 2022.06.1 Rakudo release. @AntonOks I'm not sure about this. Will changing the version number to 2022.06 do the right thing? |
Well, I'm aware of the description on https://rakudo.org/downloads in the "Binary Releases" => Should
And is
And does this mean, As you see, for me it's still not clear when to change which of those patch numbers. I was looking for a good docu / explanation months ago but didn't find something, which helped me to figure it out... |
"do the right thing" where? Are you talking about this docker file / build / release? If so, I must admit, I have no idea how and where the docker magic happens today. There is rakudo/star#171 and I looked at this one some time ago. But as said above, couldn't figure out why there seem to be different docker files / builds
and when which is used where.... Maybe you, or somebody else, can enlighten me? |
The idea is:
That's it.
I'm sorry about that. Currently there is no documentation. The best place I can think of to put this would be |
Yes, I'm talking about the downstream docker stuff. (Unsure what exactly that encompasses.)
Looking at the commiters in https://github.com/docker-library/official-images/blob/master/library/rakudo-star. Ping @jmaslak, @m-dango. |
No. Any place would be good, I guess... |
@patrickbkr I'm not sure where the first link you have listed comes into play, I don't think I've seen that one before. I'll likely bump this to 2022.07. |
This reverts commit a765a57.
I guess this is good to go then. |
At the time of writing, the specified key is not available on a public keyserver.