You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@apr.apache.org by co...@apache.org on 2023/01/31 15:04:43 UTC

svn commit: r1907149 - /apr/site/trunk/tools/release.sh

Author: covener
Date: Tue Jan 31 15:04:43 2023
New Revision: 1907149

URL: http://svn.apache.org/viewvc?rev=1907149&view=rev
Log:
tweaks to order



Modified:
    apr/site/trunk/tools/release.sh

Modified: apr/site/trunk/tools/release.sh
URL: http://svn.apache.org/viewvc/apr/site/trunk/tools/release.sh?rev=1907149&r1=1907148&r2=1907149&view=diff
==============================================================================
--- apr/site/trunk/tools/release.sh (original)
+++ apr/site/trunk/tools/release.sh Tue Jan 31 15:04:43 2023
@@ -40,13 +40,13 @@
 #      4. Add any CVE details if applicable to the CHANGES and commit.
 #      5. Update CHANGES-* on dist/release/apr
 #         e.g. https://www.apache.org/dist/apr/CHANGES-APR-1.7
-#      5. Send announce emails to apr and announce@
+#      5. Send announce emails to apr and announce@ (see r6-announce.sh in this dir)
 #         # Process the CVEs that have been part of the release:
 #      6. set CVEs to READY on the cveprocess site
-#         - Fill in a 'reference' tag 'vendor-advisory' with the URL to your public post about
-#           this issue.  A link to CHANGES doc updated above is sufficient.
 #         - Use the 'OSS/ASF Emails' tab for the emails you should send to oss-security
 #           and to Apache lists.
+#         - Fill in a 'reference' tag 'vendor-advisory' with the URL to your public post about
+#           this issue (the same emails ent in the preceding sub-bullet(
 #         - ASF Security will be notified and will submit to the CVE
 #           project and then set state to 'PUBLIC'.
 #      7. Clean up prior release artifacts