Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Jakarta Server Faces 2.3 #82

Merged
merged 5 commits into from Sep 9, 2019
Merged

Jakarta Server Faces 2.3 #82

merged 5 commits into from Sep 9, 2019

Conversation

arjantijms
Copy link
Contributor

@arjantijms arjantijms commented Aug 6, 2019

Signed-off-by: arjantijms arjan.tijms@gmail.com

Specification PR template

When creating a specification project release review, create two PRs with the content divided as follows.

Include the following in PR#1:

Signed-off-by: arjantijms <arjan.tijms@gmail.com>
@smillidge
Copy link
Contributor

api jar doesn't include NOTICE and LICENSE files in the Manifest.

@arjantijms
Copy link
Contributor Author

@smillidge

api jar doesn't include NOTICE and LICENSE files in the Manifest.

Good catch Steve, thx! Updated it right away.

* Removed version from doctitle
* Updated spec doc links
* Added TCK link
* Updated Compatible implementation link

Signed-off-by: arjantijms <arjan.tijms@gmail.com>
* Added spec index

* Updated version to 2 digits

Signed-off-by: arjantijms <arjan.tijms@gmail.com>
Signed-off-by: arjantijms <arjan.tijms@gmail.com>
@NottyCode
Copy link
Member

NottyCode commented Aug 19, 2019

Spec Review Checklist

  1. Spec PR
  1. _index.md
  1. javadocs
  • Footer contains Eclipse copyright and link to license
  • ESFL license is included, usually as doc-files/speclicense.html
  • no META-INF directory in PR
  • javadocs-jar artifact matches apidocs (optional for this release)
  1. Spec PDF
  • Correct spec title
  • Version number of the form x.y, not x.y.z
  • Correct Eclipse copyright line
  • No DRAFT or SNAPSHOT
  • Correct Logo
  1. Spec HTML
  • Same as PDF
  1. TCK zip file
  • README file (optional for this release)
  • EFTL license file, preferably named LICENSE.md
  • User's Guide (or equivalent documentation)
  • How to test the Compatible Implementation(s) listed in _index.md above with the TCK (may be in UG)
  1. TCK User's Guide (or equivalent documentation)
  • Software requirements listed
  • Installation and configuration described
  • How to run tests
  • Where to file challenges
  1. Compatibility certification request
  • Request follows template
  • SHA-256 fingerprint matches staged TCK zip file
  • Request issue has certification label.
  1. TCK results summary
  • Page is hosted by Compatible Implementation project
  • Includes all information from certification request
  • Summary includes number of tests passed, failed, errors
  • SHA-256 fingerprint matches staged TCK zip file on cert request

@NottyCode
Copy link
Member

I found a small number of issues:

  1. I couldn't find the instructions for running it against the CI linked in here. I can find instructions for running against a CI of my choice, or another vendor CI, but I'd been interpreting this step of the checklist relative to the CI listed in this PR.
  2. The TCK certification link lists this SHA has db9a385010cd8544bc1f2468a1fbcaca16f14014fa341e5343c487616f8670dc but when I run shasum -a 256 on the downloaded tck zip I get this 77375ad39f8b736034dbfd554152bbd3e3931a9c9ef1760049c60c5fa87a06d9

@arjantijms
Copy link
Contributor Author

@NottyCode

Thanks for the feedback! You are right about running it, it's not fully trivial. The Faces and Mojarra projects are aware that this is an issue.

I'm not 100% were I should exactly put the instructions and what the format is. @bshannon ?

The short of it is as follows:

  1. Build and stage Mojarra using https://jenkins.eclipse.org/mojarra/job/1_mojarra-build-and-stage
  2. Run the TCK against the staged build using https://jenkins.eclipse.org/mojarra/job/2_mojarra-run-tck-against-staged-build/
  3. Extract and stage the API from the Mojarra build that was staged and passed the TCK using https://ci.eclipse.org/faces/job/1_faces-build-and-stage

We're fully aware that "Extract the API from the Mojarra build" is non-intuitive, and it will be a priority going forward to separate out the API properly into the API project.

I'm going to re-run the TCK and will post the SHA that was actually used during the test to address your second point. Thanks again!

@arjantijms
Copy link
Contributor Author

@NottyCode

TCK now running with artefacts:

  • SHA256_GF=SHA256(/home/jenkins/workspace/2_mojarra-run-tck-against-staged-build/download/glassfish.zip)= 26f3fa6463d24c5ed3956e4cab24a97e834ca37d7a23d341aadaa78d9e0093ce
  • SHA256_API=SHA256(/home/jenkins/workspace/2_mojarra-run-tck-against-staged-build/download/jakarta.faces.jar)= 4b8a7b1e91154dcbbbdc952fa599a9071370aad5ce6a377b3c2eacef7972a319
  • SHA256_TCK=SHA256(/home/jenkins/workspace/2_mojarra-run-tck-against-staged-build/download/facestck.zip)= 77375ad39f8b736034dbfd554152bbd3e3931a9c9ef1760049c60c5fa87a06d9

@arjantijms
Copy link
Contributor Author

TCK passed using the above SHAs: https://jenkins.eclipse.org/mojarra/view/Release/job/2_mojarra-run-tck-against-staged-build/4/consoleText

I'll update the SHA.

@bshannon
Copy link
Contributor

@NottyCode

Thanks for the feedback! You are right about running it, it's not fully trivial. The Faces and Mojarra projects are aware that this is an issue.

I'm not 100% were I should exactly put the instructions and what the format is. @bshannon ?

The instructions are supposed to be in the TCK Users Guide here, in the config chapter.
Looks like the implementation-specific instructions were lost in the conversion to AsciiDoc.
Let me see if I can add them back manually...

@starksm64
Copy link
Contributor

The https://eclipse-ee4j.github.io/mojarra/certifications/jakarta-faces/2.3/TCK-Results still has the old SHA rather than 77375ad39f8b736034dbfd554152bbd3e3931a9c9ef1760049c60c5fa87a06d9

@kwsutter
Copy link
Contributor

kwsutter commented Aug 21, 2019

@arjantijms Could you also file a PR for updating jakartaee-api pom.xml with the proper Jakarta Faces API version (2.3.2?). Thanks!

https://github.com/eclipse-ee4j/jakartaee-api/pulls

@kwsutter
Copy link
Contributor

@arjantijms Could you also file a PR for updating jakartaee-api pom.xml with the proper Jakarta Faces API version (2.3.2?). Thanks!

https://github.com/eclipse-ee4j/jakartaee-api/pulls

Never mind. If you are good with the 2.3.2 version, I have updated the pom in jakartaee-api for you via PR #34. If you decide on an alternate version, then please submit another PR. Thank you.

@arjantijms
Copy link
Contributor Author

Never mind. If you are good with the 2.3.2 version, I have updated the pom in jakartaee-api for you via PR #34.

Thanks Kevin! 2.3.2 should be perfect. I'm still working on the Authorization updates, and when that is done move back to Faces to address the remaining issues here.

Note to self and others:

As an exception this project also needs additional artefacts published, such as the VDL docs.

@arjantijms
Copy link
Contributor Author

@starksm64

The https://eclipse-ee4j.github.io/mojarra/certifications/jakarta-faces/2.3/TCK-Results still has the old SHA rather than 77375ad39f8b736034dbfd554152bbd3e3931a9c9ef1760049c60c5fa87a06d9

Fixed! Thanks.

@arjantijms
Copy link
Contributor Author

@NottyCode

  1. The TCK certification link lists this SHA has db9a385010cd8544bc1f2468a1fbcaca16f14014fa341e5343c487616f8670dc but when I run shasum -a 256 on the downloaded tck zip I get this 77375ad39f8b736034dbfd554152bbd3e3931a9c9ef1760049c60c5fa87a06d9

Should now be fixed, can you check again and if correct set the checkboxes? Thx!

Signed-off-by: arjantijms <arjan.tijms@gmail.com>
@starksm64 starksm64 added final Ready for Vote and removed draft Work in Progress labels Aug 23, 2019
@waynebeaton waynebeaton added the ballot Delivered to the Specification Committee for ballot label Aug 26, 2019
@waynebeaton waynebeaton added the approved The ballot was approved by the Specification Committee label Sep 9, 2019
@bshannon
Copy link
Contributor

bshannon commented Sep 9, 2019

  • On ballot completion
  • The designated specification committee representative adds this final checklist to the main PR.
  • The specification committee representative merges the specification and apidocs PRs.
  • The designated specification committee representative calculates the staged EFTL TCK signature and promotes it to the committee download area
    using the https://ci.eclipse.org/jakartaee-spec-committee/job/promote-release/ job.
  • The specification project member who created the staging release promotes the specification api jars to maven central. An example release job script can be found here https://wiki.eclipse.org/MavenReleaseScript.
  • The EMO updates the specification page with the ballot results.
    This list goes on the committed spec index page.
  • The specification project team should go through the merged spec website page to verify all the links are valid.
  • The specification project team should approve the compatibility request.
  • The compatible implementation project/vendor MUST send an email tck@eclipse.org for approval of the compatible implementation for trademark usage.
  • The specification project team should merge any final release branch as appropriate for the branch management for the project.

@bshannon bshannon merged commit bde243f into jakartaee:master Sep 9, 2019
@arjantijms
Copy link
Contributor Author

Final release branch PR: jakartaee/faces#1478

@arjantijms
Copy link
Contributor Author

Mail sent

@bshannon
Copy link
Contributor

@arjantijms Looks like the API jar file hasn't been released.

@arjantijms
Copy link
Contributor Author

@bshannon you're right, but it's there now:

https://repo1.maven.org/maven2/jakarta/faces/jakarta.faces-api/2.3.2/

Thx!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved The ballot was approved by the Specification Committee ballot Delivered to the Specification Committee for ballot final Ready for Vote
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

7 participants