Closed arjantijms closed 2 years ago
Approved.
Sha256 does not match the staged TCK. $ sha256sum jakarta-servlet-tck-6.0.0.zip e9bfc33bd3974529b4f91cfde993bd754256fbdb7af2c11d50d37df467131fb6 jakarta-servlet-tck-6.0.0.zip
@ivargrimstad the TCK was run against GF at the 20th, but it seems the TCK was updated again on the 26th:
Date and size: date: 2022-04-26 05:02:31.000000000 +0000, size(b): 20149135
SHA256SUM: e9bfc33bd3974529b4f91cfde993bd754256fbdb7af2c11d50d37df467131fb6
Yes, that's usually the case. Anyway, the CCR submitted with results from running the correct version of the TCK. If you have a CI job updating the TCK in the /staged folder, you need to turn that off or move the file to a promoted folder. That is the one that will be published on the Spec page. The SHA must match this one, otherwise, the CCR is not valid.
I'm running the TCK again right now. It will take about two more hours. The JDK 18 run already passed with 'e9bfc33bd3974529b4f91cfde993bd754256fbdb7af2c11d50d37df467131fb6':
I'm running the TCK again right now. It will take about two more hours. The JDK 18 run already passed with 'e9bfc33bd3974529b4f91cfde993bd754256fbdb7af2c11d50d37df467131fb6':
When you're done, update the SHA, and make sure the TCK isn't updated going forward. Then we're all good :)
I created this issue to stop the Servlet TCK from being updated: https://github.com/eclipse-ee4j/jakartaee-tck/issues/949
I created this issue to stop the Servlet TCK from being updated: eclipse-ee4j/jakartaee-tck#949
Yes, I think that is the correct way of doing it. @scottmarlow can confirm this I hope...
I just checked and it is all right $ sha256sum.exe jakarta-servlet-tck-6.0.0.zip e9bfc33bd3974529b4f91cfde993bd754256fbdb7af2c11d50d37df467131fb6 *jakarta-servlet-tck-6.0.0.zip
Will follow up on the ballot
e9bfc33bd3974529b4f91cfde993bd754256fbdb7af2c11d50d37df467131fb6