Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add missing git tag for 0.11.3 release #167

Closed
koobs opened this issue May 14, 2019 · 6 comments
Closed

Add missing git tag for 0.11.3 release #167

koobs opened this issue May 14, 2019 · 6 comments

Comments

@koobs
Copy link

koobs commented May 14, 2019

Using the GitHub sources to grab packages tests until they ship in the PyPI sdist (See #166), I noticed the git tag for the latest 0.11.3 release is missing.

This is a request to add that git tag for the commit hash which corresponds to the currently released 0.11.3 tarball on PyPI.

Our FreeBSD ports (by default), use the canonical version (0.11.3) as an argument to pass to GitHub's API to fetch a specific version of the sources. In the absence of a matching git tag, we need to use a commit hash, which can be unreliable (not exactly the specific version uploaded to PyPI)

Thanks!

uqs pushed a commit to freebsd/freebsd-ports that referenced this issue May 14, 2019
…rpose routines

securesystemslib supports public-key and general-purpose cryptography,
such as ECDSA, Ed25519, RSA, SHA256, SHA512, etc. Most of the
cryptographic operations are performed by the cryptography and PyNaCl
libraries, but verification of Ed25519 signatures can be done in pure
Python.

WWW: https://github.com/secure-systems-lab/securesystemslib

[1] secure-systems-lab/securesystemslib#166
[2] secure-systems-lab/securesystemslib#167


git-svn-id: svn+ssh://svn.freebsd.org/ports/head@501637 35697150-7ecd-e111-bb59-0022644237b5
uqs pushed a commit to freebsd/freebsd-ports that referenced this issue May 14, 2019
…rpose routines

securesystemslib supports public-key and general-purpose cryptography,
such as ECDSA, Ed25519, RSA, SHA256, SHA512, etc. Most of the
cryptographic operations are performed by the cryptography and PyNaCl
libraries, but verification of Ed25519 signatures can be done in pure
Python.

WWW: https://github.com/secure-systems-lab/securesystemslib

[1] secure-systems-lab/securesystemslib#166
[2] secure-systems-lab/securesystemslib#167
swills pushed a commit to swills/freebsd-ports that referenced this issue May 14, 2019
…rpose routines

securesystemslib supports public-key and general-purpose cryptography,
such as ECDSA, Ed25519, RSA, SHA256, SHA512, etc. Most of the
cryptographic operations are performed by the cryptography and PyNaCl
libraries, but verification of Ed25519 signatures can be done in pure
Python.

WWW: https://github.com/secure-systems-lab/securesystemslib

[1] secure-systems-lab/securesystemslib#166
[2] secure-systems-lab/securesystemslib#167


git-svn-id: svn+ssh://svn.freebsd.org/ports/head@501637 35697150-7ecd-e111-bb59-0022644237b5
Jehops pushed a commit to Jehops/freebsd-ports-legacy that referenced this issue May 14, 2019
…rpose routines

securesystemslib supports public-key and general-purpose cryptography,
such as ECDSA, Ed25519, RSA, SHA256, SHA512, etc. Most of the
cryptographic operations are performed by the cryptography and PyNaCl
libraries, but verification of Ed25519 signatures can be done in pure
Python.

WWW: https://github.com/secure-systems-lab/securesystemslib

[1] secure-systems-lab/securesystemslib#166
[2] secure-systems-lab/securesystemslib#167


git-svn-id: svn+ssh://svn.freebsd.org/ports/head@501637 35697150-7ecd-e111-bb59-0022644237b5
@lukpueh
Copy link
Member

lukpueh commented May 16, 2019

@koobs, the 0.11.3-release was git-tagged as sslibv0.11.3, you can check the signatures on the release page over the corresponding files on PyPI. Or is the tag-name an issue?

@awwad, do you know why we switched to prefixing sslib? AFICS the prevalent tag-formats are v<semver> or just <semver>.

@koobs
Copy link
Author

koobs commented May 31, 2019

@lukpueh It's an issue with regard to automatic update detectors that downstreams use (incl FreeBSD) that look for either (or both) pure-version tags or name-version tags upstream to detect new versions.

The most standard convention that's easiest to predict/parse is: X.Y.X (no prefix/suffix)

@lukpueh
Copy link
Member

lukpueh commented May 31, 2019

Okay, noted for upcoming releases, @koobs. Is there anything you need us to do for past releases?

Out of curiosity, do you (others?) not scan for v<semver> release tags? They seem to be pretty common too (see e.g. this not yet released semver FAQ).

@koobs
Copy link
Author

koobs commented May 31, 2019

Anything consistent is fine, as we can codify that prefix into the 'distribution version'. That aside I prefer prefix/suffix-less (and I see more python package upstreams dropping 'v' lately), but I won't die on that hill :)

@koobs
Copy link
Author

koobs commented May 31, 2019

As far as past/future releases go, other than #166 it looks OK

@lukpueh
Copy link
Member

lukpueh commented Sep 9, 2019

I made a mental note to go back to vX.Y.Z in future releases. And I also opened a ticket to make this a guideline (see secure-systems-lab/lab-guidelines#20). Thanks again for your valuable input, @koobs! Closing here...

@lukpueh lukpueh closed this as completed Sep 9, 2019
svmhdvn pushed a commit to svmhdvn/freebsd-ports that referenced this issue Jan 10, 2024
…rpose routines

securesystemslib supports public-key and general-purpose cryptography,
such as ECDSA, Ed25519, RSA, SHA256, SHA512, etc. Most of the
cryptographic operations are performed by the cryptography and PyNaCl
libraries, but verification of Ed25519 signatures can be done in pure
Python.

WWW: https://github.com/secure-systems-lab/securesystemslib

[1] secure-systems-lab/securesystemslib#166
[2] secure-systems-lab/securesystemslib#167
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants