https://github.com/seccomp/libseccomp
This is the process that should be followed when creating a new libseccomp release.
# make check-syntax
# ./autogen.sh
# ./configure --enable-python
# make check
# (cd tests; ./regression -T live)
# make distcheck
# make coverity-tarball
<submit tarball manually>
... or ...
# git push -f coverity-scan
<leverage existing Travis CI infrastructure>
- Fedora Rawhide
- Red Hat Enterprise Linux
- etc.
# ./doc/credits_updater > CREDITS
... the results can be sanity checked with the following git command:
# git log --pretty=format:"%aN <%aE>" | sort -u
# stg branch -c "release-X.Y"
... or ...
# git branch "release-X.Y"
# git tag -m "version X.Y.Z" vX.Y.Z
# git push --tags
# make clean
# ./autogen.sh
# make dist-gzip
<unpack the release tarball in a temporary directory>
# ./configure --enable-python
# make check
# (cd tests; ./regression -T live)
# sha256sum <tarball> > libseccomp-X.Y.Z.tar.gz.SHA256SUM
# gpg --armor --detach-sign libseccomp-X.Y.Z.tar.gz
# gpg --clearsign libseccomp-X.Y.Z.tar.gz.SHA256SUM
16. Create a new GitHub release using the associated tag; added the relevant section from the CHANGELOG file, and upload the following files
- libseccomp-X.Y.Z.tar.gz
- libseccomp-X.Y.Z.tar.gz.asc
- libseccomp-X.Y.Z.tar.gz.SHA256SUM
- libseccomp-X.Y.Z.tar.gz.SHA256SUM.asc