+1 (advisory)

* Verified sha512 checksum was correct for source tarball
* Verified signature was correct for source tarball (not verified trust)
* Built source code from tarball on Ubuntu 20.04 (x86) and OpenJDK 8 in Amazon 
EC2
* Verified source tarball matches content of RC0 tag on GitHub
* Verified S3A (hadoop-tools/hadoop-aws) unit tests passing from src
* Verified S3A (hadoop-tools/hadoop-aws) integ tests passing from src against 
Amazon S3 in eu-west-1
  * There is a single failure, already known and described in 
https://issues.apache.org/jira/browse/HADOOP-18168

- Danny

On 03/05/2022, 12:25, "Steve Loughran" <ste...@cloudera.com> wrote:

    I have put together a release candidate (rc0) for Hadoop 3.3.3

    The RC is available at:
    https://dist.apache.org/repos/dist/dev/hadoop/3.3.3-RC0/

    The git tag is release-3.3.3-RC0, commit d37586cbda3

    The maven artifacts are staged at
    https://repository.apache.org/content/repositories/orgapachehadoop-1348/

    You can find my public key at:
    https://dist.apache.org/repos/dist/release/hadoop/common/KEYS

    Change log
    https://dist.apache.org/repos/dist/dev/hadoop/3.3.3-RC0/CHANGELOG.md

    Release notes
    https://dist.apache.org/repos/dist/dev/hadoop/3.3.3-RC0/RELEASENOTES.md

    There's a very small number of changes, primarily critical code/packaging
    issues and security fixes.


       - The critical fixes which shipped in the 3.2.3 release.
       -  CVEs in our code and dependencies
       - Shaded client packaging issues.
       - A switch from log4j to reload4j


    reload4j is an active fork of the log4j 1.17 library with the classes which
    contain CVEs removed. Even though hadoop never used those classes, they
    regularly raised alerts on security scans and concen from users. Switching
    to the forked project allows us to ship a secure logging framework. It will
    complicate the builds of downstream maven/ivy/gradle projects which exclude
    our log4j artifacts, as they need to cut the new dependency instead/as well.

    See the release notes for details.

    This is my first release through the new docker build process, do please
    validate artifact signing &c to make sure it is good. I'll be trying builds
    of downstream projects.

    We know there are some outstanding issues with at least one library we are
    shipping (okhttp), but I don't want to hold this release up for it. If the
    docker based release process works smoothly enough we can do a followup
    security release in a few weeks.

    Please try the release and vote. The vote will run for 5 days.

    -Steve

Reply via email to