This change might save some time during the release steps PR-URL: https://github.com/nodejs/node/pull/45197 Reviewed-By: Michaël Zasso <targos@protonmail.com> Reviewed-By: Antoine du Hamel <duhamelantoine1995@gmail.com> Reviewed-By: Rich Trott <rtrott@gmail.com> Reviewed-By: Ruy Adorno <ruyadorno@google.com> Reviewed-By: Michael Dawson <midawson@redhat.com> Reviewed-By: Juan José Arboleda <soyjuanarbol@gmail.com>
43 KiB
Node.js release process
This document describes the technical aspects of the Node.js release process. The intended audience is those who have been authorized by the Node.js Technical Steering Committee (TSC) to create, promote, and sign official release builds for Node.js, hosted on https://nodejs.org/.
Table of contents
- Who can make a release?
- How to create a release
- 0. Pre-release steps
- 1. Update the staging branch
- 2. Create a new branch for the release
- 3. Update
src/node_version.h
- 4. Update the changelog
- 5. Create release commit
- 6. Propose release on GitHub
- 7. Ensure that the release branch is stable
- 8. Produce a nightly build (optional)
- 9. Produce release builds
- 10. Test the build
- 11. Tag and sign the release commit
- 12. Set up for the next release
- 13. Cherry-pick the release commit to
main
- 14. Push the release tag
- 15. Promote and sign the release builds
- 16. Check the release
- 17. Create a blog post
- 18. Create the release on GitHub
- 19. Cleanup
- 20. Announce
- 21. Celebrate
- LTS releases
- Major releases
Who can make a release?
Release authorization is given by the Node.js TSC. Once authorized, an individual must have the following:
1. Jenkins release access
There are three relevant Jenkins jobs that should be used for a release flow:
a. Test runs: node-test-pull-request is used for a final full-test run to ensure that the current HEAD is stable.
b. Nightly builds: (optional) iojs+release can be used to create a nightly release for the current HEAD if public test releases are required. Builds triggered with this job are published straight to https://nodejs.org/download/nightly/ and are available for public download.
c. Release builds: iojs+release does all of the work to build all required release assets. Promotion of the release files is a manual step once they are ready (see below).
The Node.js build team is able to provide this access to individuals authorized by the TSC.
2. <nodejs.org> access
The dist user on nodejs.org controls the assets available in https://nodejs.org/download/. https://nodejs.org/dist/ is an alias for https://nodejs.org/download/release/.
The Jenkins release build workers upload their artifacts to the web server as the staging user. The dist user has access to move these assets to public access while, for security, the staging user does not.
Nightly builds are promoted automatically on the server by a cron task for the dist user.
Release builds require manual promotion by an individual with SSH access to the server as the dist user. The Node.js build team is able to provide this access to individuals authorized by the TSC.
3. A publicly-listed GPG key
A SHASUMS256.txt
file is produced for every promoted build, nightly, and
releases. Additionally for releases, this file is signed by the individual
responsible for that release. In order to be able to verify downloaded binaries,
the public should be able to check that the SHASUMS256.txt
file has been
signed by someone who has been authorized to create a release.
The GPG keys should be fetchable from a known third-party keyserver. The SKS Keyservers at https://sks-keyservers.net are recommended. Use the submission form to submit a new GPG key. You'll need to do an ASCII-armored export of your key first:
$ gpg --armor --export email@server.com > ~/nodekey.asc
Keys should be fetchable via:
$ gpg --keyserver pool.sks-keyservers.net --recv-keys <FINGERPRINT>
The key you use may be a child/subkey of an existing key.
Additionally, full GPG key fingerprints for individuals authorized to release should be listed in the Node.js GitHub README.md file.
How to create a release
Notes:
- Dates listed below as "YYYY-MM-DD" should be the date of the release as
UTC. Use
date -u +'%Y-%m-%d'
to find out what this is. - Version strings are listed below as "vx.y.z" or "x.y.z". Substitute for the release version.
- Examples will use the fictional release version
1.2.3
. - When preparing a security release, follow the security steps in the details sections.
0. Pre-release steps
Before preparing a Node.js release, the Build Working Group must be notified at least one business day in advance of the expected release. Coordinating with Build is essential to make sure that the CI works, release files are published, and the release blog post is available on the project website.
Build can be contacted best by opening up an issue on the Build issue tracker.
When preparing a security release, contact Build at least two weekdays in
advance of the expected release. To ensure that the security patch(es) can be
properly tested, run a node-test-pull-request
job against the main
branch
of the nodejs-private/node-private
repository a day or so before the
CI lockdown procedure begins. This is to confirm that Jenkins can properly
access the private repository.
1. Update the staging branch
Checkout the staging branch locally.
$ git remote update
$ git checkout v1.x-staging
$ git reset --hard upstream/v1.x-staging
If the staging branch is not up to date relative to main
, bring the
appropriate PRs and commits into it.
Go through PRs with the label vN.x
. e.g. PRs with the v8.x
label.
For each PR:
- Run or check that there is a passing CI.
- Check approvals (you can approve yourself).
- Check that the commit metadata was not changed from the
main
commit. - If there are merge conflicts, ask the PR author to rebase. Simple conflicts can be resolved when landing.
When landing the PR add the Backport-PR-URL:
line to each commit. Close the
backport PR with Landed in ...
. Update the label on the original PR from
backport-requested-vN.x
to backported-to-vN.x
.
You can add the Backport-PR-URL
metadata by using --backport
with
git node land
$ git node land --backport $PR-NUMBER
To determine the relevant commits, use
branch-diff
. The tool is available on
npm and should be installed globally or run with npx
. It depends on our commit
metadata, as well as the GitHub labels such as semver-minor
and
semver-major
. One drawback is that when the PR-URL
metadata is accidentally
omitted from a commit, the commit will show up because it's unsure if it's a
duplicate or not.
For a list of commits that could be landed in a patch release on v1.x:
$ branch-diff v1.x-staging main --exclude-label=semver-major,semver-minor,dont-land-on-v1.x,backport-requested-v1.x,backport-blocked-v1.x,backport-open-v1.x,backported-to-v1.x --filter-release --format=simple
Previously released commits and version bumps do not need to be cherry-picked.
Carefully review the list of commits:
- Checking for errors (incorrect
PR-URL
) - Checking semver status - Commits labeled as
semver-minor
orsemver-major
should only be cherry-picked when appropriate for the type of release being made. - If you think it's risky and the change should wait for a while, add the
baking-for-lts
tag.
When you are ready to cherry-pick commits, you can automate with the following
command. (For semver-minor releases, make sure to remove the semver-minor
tag
from exclude-label
.)
$ branch-diff v1.x-staging main --exclude-label=semver-major,semver-minor,dont-land-on-v1.x,backport-requested-v1.x,backport-blocked-v1.x,backport-open-v1.x,backported-to-v1.x --filter-release --format=sha --reverse | xargs git cherry-pick
When cherry-picking commits, if there are simple conflicts you can resolve
them. Otherwise, add the backport-requested-vN.x
label to the original PR
and post a comment stating that it does not land cleanly and will require a
backport PR. You can refer the owner of the PR to the "Backporting to Release
Lines" guide.
If commits were cherry-picked in this step, check that the test still pass.
$ make test
Then, push to the staging branch to keep it up-to-date.
$ git push upstream v1.x-staging
Security release
Security releases with private patches need to be prepared in the nodejs-private
GitHub organisation.
Add the nodejs-private
remote:
$ git remote add private git@github.com:nodejs-private/node-private.git
For security releases, we generally try to only include the security patches.
As there may already be commits on the vN.x-staging
branch, it is preferable
to checkout the vN.x
branch and build up the release directly in a proposal
branch.
$ git checkout vN.x
$ git reset --hard upstream/vN.x
The list of patches to include should be listed in the "Next Security Release"
issue in nodejs-private
. Ask the security release steward if you're unsure.
The git node land
tool does not work with the nodejs-private
organisation. To land a PR in Node.js private, use git cherry-pick
to apply
each commit from the PR. You will also need to manually apply the PR
metadata (PR-URL
, Reviewed-by
, etc.) by amending the commit messages. If
known, additionally include CVE-ID: CVE-XXXX-XXXXX
in the commit metadata.
Note: Do not run CI on the PRs in nodejs-private
until CI is locked down.
You can integrate the PRs into the proposal without running full CI.
2. Create a new branch for the release
Create a new branch named vx.y.z-proposal
, off the corresponding staging
branch.
$ git checkout -b v1.2.3-proposal upstream/v1.x-staging
Security release
When performing Security Releases, the vN.x.x-proposal
branch should be
branched off of vN.x
.
$ git checkout -b v1.2.3-proposal upstream/v1.x
git cherry-pick ... # cherry-pick nodejs-private PR commits directly into the proposal
3. Update src/node_version.h
Set the version for the proposed release using the following macros, which are
already defined in src/node_version.h
:
#define NODE_MAJOR_VERSION x
#define NODE_MINOR_VERSION y
#define NODE_PATCH_VERSION z
Set the NODE_VERSION_IS_RELEASE
macro value to 1
. This causes the build to
be produced with a version string that does not have a trailing pre-release tag:
#define NODE_VERSION_IS_RELEASE 1
4. Update the changelog
Step 1: Collect the formatted list of changes
Collect a formatted list of commits since the last release. Use
changelog-maker
to do this:
$ changelog-maker --group --markdown
changelog-maker
counts commits since the last tag and if the last tag
in the repository was not on the current branch you may have to supply a
--start-ref
argument:
$ changelog-maker --group --markdown --filter-release --start-ref v1.2.2
--filter-release
will remove the release commit from the previous release.
Step 2: Update the appropriate doc/changelogs/CHANGELOG_*.md file
There is a separate CHANGELOG_Vx.md
file for each major Node.js release line.
These are located in the doc/changelogs/
directory. Once the formatted list of
changes is collected, it must be added to the top of the relevant changelog file
in the release branch (e.g. a release for Node.js v4 would be added to the
/doc/changelogs/CHANGELOG_V4.md
).
Please do not add the changelog entries to the root CHANGELOG.md
file.
The new entry should take the following form:
<a id="x.y.x"></a>
## YYYY-MM-DD, Version x.y.z (Release Type), @releaser
### Notable changes
* List interesting changes here
* Particularly changes that are responsible for minor or major version bumps
* Also be sure to look at any changes introduced by dependencies such as npm
* ... and include any notable items from there
### Commits
* Include the full list of commits since the last release here. Do not include "Working on X.Y.Z+1" commits.
The release type should be either Current, LTS, or Maintenance, depending on the type of release being produced.
You can use branch-diff
to get a list of commits with the notable-change
label:
$ branch-diff upstream/v1.x v1.2.3-proposal --require-label=notable-change --plaintext
Be sure that the <a>
tag, as well as the two headings, are not indented at
all.
Security release
For security releases, it is necessary to include more detailed information including which vulnerabilities have been fixed, and any revert flags or workarounds to revert to the old behaviour.
You can use the following template as a guide:
<a id="x.y.x"></a>
## YYYY-MM-DD, Version x.y.z (Release Type), @releaser
This is a security release.
### Notable changes
* <CVE Title> (High|Medium|Low)(CVE-XXXX-XXXXX)
* ...
### Commits
* Include the full list of commits since the last release here. Do not include "Working on X.Y.Z+1" commits.
Alternatively, refer to one of the previous security release changelog entries to get an idea of the structure and level of detail.
For each fix, use your judgement as to whether a subheading is necessary to
describe the fix in more detail. Much of this information should be able to be
lifted from the "post-release" announcement (should be available in
nodejs-private
). If the CVE is being fixed in multiple release lines, try to
coordinate the changelog content between the other release so the descriptions
are consistent.
At the top of the root CHANGELOG.md
file, there is a table indexing all
releases in each major release line. A link to the new release needs to be added
to it. Follow the existing examples and be sure to add the release to the top
of the list. The most recent release for each release line is shown in bold
in the index. When updating the index, please make sure to update the display
accordingly by removing the bold styling from the previous release.
Run make format-md
to ensure the CHANGELOG_Vx.md
and CHANGELOG.md
files
are formatted correctly.
Step 3: Update any REPLACEME and DEP00XX tags in the docs
If this release includes new APIs then it is necessary to document that they
were first added in this version. The relevant commits should already include
REPLACEME
tags as per the example in the
docs README. Check for these tags with
grep REPLACEME doc/api/*.md
and substitute this node version with
sed -i "s/REPLACEME/$VERSION/g" doc/api/*.md
or
perl -pi -e "s/REPLACEME/$VERSION/g" doc/api/*.md
$VERSION
should be prefixed with a v
.
If this release includes any new deprecations it is necessary to ensure that
those are assigned a proper static deprecation code. These are listed in the
docs (see doc/api/deprecations.md
) and in the source as DEP00XX
. The code
must be assigned a number (e.g. DEP0012
). This assignment should
occur when the PR is landed, but a check will be made when the release build is
run.
5. Create release commit
The CHANGELOG.md
, doc/changelogs/CHANGELOG_Vx.md
, src/node_version.h
, and
REPLACEME
changes should be the final commit that will be tagged for the
release. When committing these to git, use the following message format:
YYYY-MM-DD, Version x.y.z (Release Type)
Notable changes:
* Copy the notable changes list here, reformatted for plain-text
PR-URL: TBD
Security release
For security releases, begin the commit message with the phrase
This is a security release.
to allow the
distribution indexer to
identify it as such:
YYYY-MM-DD, Version x.y.z (Release Type)
This is a security release.
Notable changes:
* Copy the notable changes list here, reformatted for plain-text
PR-URL: TBD
Note: Ensure to push the proposal branch to the nodejs-private repository. Otherwise, you will leak the commits before the security release.
6. Propose release on GitHub
Push the release branch to nodejs/node
, not to your own fork. This allows
release branches to more easily be passed between members of the release team if
necessary.
Create a pull request targeting the correct release line. For example, a
v5.3.0-proposal
PR should target v5.x
, not main
. Paste the CHANGELOG
modifications into the body of the PR so that collaborators can see what is
changing. These PRs should be left open for at least 24 hours, and can be
updated as new commits land. If the CHANGELOG pasted into the pull request
is long enough that it slows down the GitHub UI, consider pasting the commits
into <details>
tags or in follow up comments.
If using the <details>
tag, use the following format:
<details>
<summary>Commits</summary>
* Full list of commits...
</details>
If you need any additional information about any of the commits, this PR is a good place to @-mention the relevant contributors.
After opening the PR, update the release commit to include PR-URL
metadata and
force-push the proposal.
Security release
If there are private security patches, remember to push and open the proposal
in the nodejs-private
GitHub repository.
7. Ensure that the release branch is stable
Run a node-test-pull-request
test run to ensure that the build is stable and the HEAD commit is ready for
release.
Also run a node-test-commit-v8-linux
test run if the release contains changes to deps/v8
.
Perform some smoke-testing. There is the
citgm-smoker
CI job for this
purpose. Run it once with the base vx.x
branch as a reference and with the
proposal branch to check if new regressions could be introduced in the
ecosystem.
Security release
If there are private security patches, do not run any CI jobs on the proposal until CI has been locked down. The security steward should be coordinating this with the Build Working Group.
8. Produce a nightly build (optional)
If there is a reason to produce a test release for the purpose of having others try out installers or specifics of builds, produce a nightly build using iojs+release and wait for it to drop in https://nodejs.org/download/nightly/. Follow the directions and enter a proper length commit SHA, enter a date string, and select "nightly" for "disttype".
This is particularly recommended if there has been recent work relating to the macOS or Windows installers as they are not tested in any way by CI.
Security release
Do not produce a release candidate build.
9. Produce release builds
Use iojs+release to produce release artifacts. Enter the commit that you want to build from and select "release" for "disttype".
Artifacts from each worker are uploaded to Jenkins and are available if further testing is required. Use this opportunity particularly to test macOS and Windows installers if there are any concerns. Click through to the individual workers for a run to find the artifacts.
All release workers should achieve "SUCCESS" (and be green, not red). A release with failures should not be promoted as there are likely problems to be investigated.
You can rebuild the release as many times as you need prior to promoting them if you encounter problems.
If you have an error on Windows and need to start again, be aware that you'll get immediate failure unless you wait up to 2 minutes for the linker to stop from previous jobs. i.e. if a build fails after having started compiling, that worker will still have a linker process that's running for another couple of minutes which will prevent Jenkins from clearing the workspace to start a new one. This isn't a big deal, it's just a hassle because it'll result in another failed build if you start again!
10. Test the build
Jenkins collects the artifacts from the builds, allowing you to download and install the new build. Make sure that the build appears correct. Check the version numbers, and perform some basic checks to confirm that all is well with the build before moving forward. Use the following list as a baseline:
process.version
is as expectedprocess.release
is as expectedprocess.versions
is as expected (for example,openssl
orllhttp
version must be in the expected updated version)- npm version (check it matches what we expect)
- Run the test suite against the built binaries (optional)
- Remember to use the proposal branch
- Run
make build-addons
before running the tests - Remove
config.gypi
file
./tools/test.py --shell ~/Downloads/node-v18.5.0-linux-x64/bin/node
11. Tag and sign the release commit
Once you have produced builds that you're happy with, create a new tag. By waiting until this stage to create tags, you can discard a proposed release if something goes wrong or additional commits are required. Once you have created a tag and pushed it to GitHub, you must not delete and re-tag. If you make a mistake after tagging then you'll have to version-bump and start again and count that tag/version as lost.
Tag summaries have a predictable format. Look at a recent tag to see:
git tag -v v6.0.0
The message should look something like
2016-04-26 Node.js v6.0.0 (Current) Release
.
Install git-secure-tag
npm module:
$ npm install -g git-secure-tag
Create a tag using the following command:
$ git secure-tag <vx.y.z> <commit-sha> -sm "YYYY-MM-DD Node.js vx.y.z (<release-type>) Release"
The commit-sha is the release commit. You can get it easily by running git rev-parse HEAD
release-type
is either "Current" or "LTS". For LTS releases, you should also
include the release code name.
2019-10-22 Node.js v10.17.0 'Dubnium' (LTS) Release
The tag must be signed using the GPG key that's listed for you on the project README.
Note: Don't push the tag to remote at this point.
12. Set up for the next release
On release proposal branch, edit src/node_version.h
again and:
- Increment
NODE_PATCH_VERSION
by one - Change
NODE_VERSION_IS_RELEASE
back to0
Commit this change with the following commit message format:
Working on vx.y.z # where 'z' is the incremented patch number
PR-URL: <full URL to your release proposal PR>
This sets up the branch so that nightly builds are produced with the next version number and a pre-release tag.
Merge your release proposal branch into the stable branch that you are releasing from and rebase the corresponding staging branch on top of that.
$ git checkout v1.x
$ git merge --ff-only v1.2.3-proposal
$ git push upstream v1.x
$ git checkout v1.x-staging
$ git rebase v1.x
$ git push upstream v1.x-staging
Security release
For security releases, you can start merging the release in the nodejs-private
GitHub organisation in advance by following the same steps:
$ git checkout v1.x
$ git merge --ff-only v1.2.3-proposal
$ git push private v1.x
$ git checkout v1.x-staging
$ git rebase v1.x
$ git push private v1.x-staging
Once all releasers are ready, you can push each of the branches to the public repository.
13. Cherry-pick the release commit to main
$ git checkout main
$ git pull upstream main
$ git cherry-pick v1.x^
Git should stop to let you fix conflicts.
Revert all changes that were made to src/node_version.h
:
$ git checkout --ours HEAD -- src/node_version.h
Major version release
On the main branch, instead of reverting changes made to src/node_version.h
edit it instead and:
- Increment
NODE_MAJOR_VERSION
by one - Reset
NODE_PATCH_VERSION
to0
- Change
NODE_VERSION_IS_RELEASE
back to0
Amend the current commit to apply the changes:
$ git commit --amend
Even if there are no conflicts, ensure that you revert all the changes that were
made to src/node_version.h
.
If there are conflicts in doc
due to updated REPLACEME
placeholders (that happens when a change previously landed on another release
branch), keep both version numbers. Convert the YAML field to an array if it is
not already one.
It's possible that the cherry-pick
step will end up adding and/or
changing unwanted lines,
please validate the changes in doc/
folder files before confirming/continuing
the cherry-pick step.
Then finish cherry-picking and push the commit upstream:
$ git add src/node_version.h doc
$ git diff --staged src doc # read output to validate that changes shows up as expected
$ git cherry-pick --continue
$ make lint-md && make lint-cpp
$ git push upstream main
Do not cherry-pick the "Working on vx.y.z" commit to main
.
Security release
For security releases, you will also need to land the fixes on the main
branch (if they apply there). Often, you can just cherry-pick the same commit
that landed in the current
security release which should already have the
metadata.
It is useful to first push the patches to private/main
to check that the
GitHub actions runs pass, before pushing to upstream/main
:
$ git checkout main
$ git reset --hard upstream/main
$ git cherry-pick ... # apply the patches which apply to main
$ git push private main # push to private main first run GitHub actions
$ git push upstream main
14. Push the release tag
Push the tag to the repository before you promote the builds. If you haven't pushed your tag first, then build promotion won't work properly. Push the tag using the following command:
$ git push upstream v1.2.3
Note: Please do not push the tag unless you are ready to complete the remainder of the release steps.
15. Promote and sign the release builds
The same individual who signed the release tag must be the one
to promote the builds as the SHASUMS256.txt
file needs to be signed with the
same GPG key!
Use tools/release.sh
to promote and sign the build. Before doing this, you'll
need to ensure you've loaded the correct ssh key, or you'll see the following:
# Checking for releases ...
Enter passphrase for key '/Users/<user>/.ssh/id_rsa':
dist@direct.nodejs.org's password:
The key can be loaded either with ssh-add
:
# Substitute node_id_rsa with whatever you've named the key
$ ssh-add ~/.ssh/node_id_rsa
or at runtime with:
# Substitute node_id_rsa with whatever you've named the key
$ ./tools/release.sh -i ~/.ssh/node_id_rsa
tools/release.sh
will perform the following actions when run:
a. Select a GPG key from your private keys. It will use a command similar
to: gpg --list-secret-keys
to list your keys. If you don't have any keys, it
will bail. If you have only one key, it will use that. If you have more than
one key it will ask you to select one from the list. Be sure to use the same
key that you signed your git tag with.
b. Log in to the server via SSH and check for releases that can be promoted,
along with the list of artifacts. It will use the dist-promotable
command on
the server to find these. You will be asked, for each promotable release,
whether you want to proceed. If there is more than one release to promote (there
shouldn't be), be sure to only promote the release you are responsible for.
c. Log in to the server via SSH and run the promote script for the given
release. The command on the server will be similar to: dist-promote vx.y.z
.
After this step, the release artifacts will be available for download and a
SHASUMS256.txt
file will be present. The release will still be unsigned,
however.
d. Use scp
to download SHASUMS256.txt
to a temporary directory on your
computer.
e. Sign the SHASUMS256.txt
file using a command similar to: gpg --default-key YOURKEY --digest-algo SHA256 --clearsign /path/to/SHASUMS256.txt
.
You will be prompted by GPG for your password. The signed file will be named
SHASUMS256.txt.asc.
f. Output an ASCII armored version of your public GPG key using a command
similar to: gpg --default-key YOURKEY --digest-algo SHA256 --detach-sign /path/to/SHASUMS256.txt
.
You will be prompted by GPG for your password. The signed file will be named
SHASUMS256.txt.sig.
g. Upload the SHASUMS256.txt
files back to the server into the release
directory.
It is possible to only sign a release by running ./tools/release.sh -s vX.Y.Z
.
16. Check the release
Your release should be available at https://nodejs.org/dist/vx.y.z/
and
https://nodejs.org/dist/latest/. Check that the appropriate files are in
place. You may want to check that the binaries are working as appropriate and
have the right internal version strings. Check that the API docs are available
at https://nodejs.org/api/. Check that the release catalog files are correct
at https://nodejs.org/dist/index.tab and https://nodejs.org/dist/index.json.
17. Create a blog post
There is an automatic build that is kicked off when you promote new builds, so within a few minutes nodejs.org will be listing your new version as the latest release. However, the blog post is not yet fully automatic.
Create a new blog post by running the nodejs.org release-post.js script.
This script will use the promoted builds and changelog to generate the post. Run
npm run serve
to preview the post locally before pushing to the
nodejs.org repository.
-
You can add a short blurb just under the main heading if you want to say something important, otherwise the text should be publication ready.
-
The links to the download files won't be complete unless you waited for the ARMv6 builds. Any downloads that are missing will have
*Coming soon*
next to them. It's your responsibility to manually update these later when you have the outstanding builds. -
The
SHASUMS256.txt.asc
content is at the bottom of the post. When you update the list of tarballs you'll need to copy/paste the new contents of this file to reflect those changes. -
Always use pull-requests on the nodejs.org repository. Be respectful of the website team, but you do not have to wait for PR sign-off. Please use the following commit message format:
Blog: vX.Y.Z release post Refs: <full URL to your release proposal PR>
-
Changes to the base branch,
main
, on the nodejs.org repository will trigger a new build of nodejs.org so your changes should appear a few minutes after pushing.
18. Create the release on GitHub
- Go to the New release page.
- Select the tag version you pushed earlier.
- For release title, copy the title from the changelog.
- For the description, copy the rest of the changelog entry.
- If you are not releasing the latest "Current", uncheck "Set as the latest release".
- Click on the "Publish release" button.
19. Cleanup
Close your release proposal PR and delete the proposal branch.
20. Announce
The nodejs.org website will automatically rebuild and include the new version. To announce the build on Twitter through the official @nodejs account, email pr@nodejs.org with a message such as:
v5.8.0 of @nodejs is out: https://nodejs.org/en/blog/release/v5.8.0/ … something here about notable changes
To ensure communication goes out with the timing of the blog post, please allow 24 hour prior notice. If known, please include the date and time the release will be shared with the community in the email to coordinate these announcements.
Ping the IRC ops and the other Partner Communities liaisons.
Security release
Let the security release steward know the releases are available.
21. Celebrate
In whatever form you do this...
LTS Releases
Marking a release line as LTS
The process of marking a release line as LTS has been automated using node-core-utils.
Start by checking out the staging branch for the release line that is going to be marked as LTS, e.g:
$ git checkout v1.x-staging
Next, make sure you have node-core-utils installed:
$ npm i -g node-core-utils
Run the prepare LTS release command:
$ git node release --prepare --startLTS
Manual steps for reference.
To mark a release line as LTS, the following changes must be made to
src/node_version.h
:
- The
NODE_MINOR_VERSION
macro must be incremented by one - The
NODE_PATCH_VERSION
macro must be set to0
- The
NODE_VERSION_IS_LTS
macro must be set to1
- The
NODE_VERSION_LTS_CODENAME
macro must be set to the code name selected for the LTS release.
For example:
-#define NODE_MINOR_VERSION 12
-#define NODE_PATCH_VERSION 1
+#define NODE_MINOR_VERSION 13
+#define NODE_PATCH_VERSION 0
-#define NODE_VERSION_IS_LTS 0
-#define NODE_VERSION_LTS_CODENAME ""
+#define NODE_VERSION_IS_LTS 1
+#define NODE_VERSION_LTS_CODENAME "Erbium"
-#define NODE_VERSION_IS_RELEASE 0
+#define NODE_VERSION_IS_RELEASE 1
The changes must be made as part of a new semver-minor release.
Updating changelogs to properly reflect the changes between Current and Long Term Support is also necessary, along with adding a reference to the current LTS codename in its release line changelog file.
The test/parallel/test-process-release.js
file might also need to be updated.
In case you can not run the automated node-core-utils
command and you are
currently running these steps manually it's a good idea to refer to previous
LTS proposal PRs and make sure all required changes are covered.
Update release labels
The lts-watch-vN.x
issue label must be created, with the same color as other
existing labels for that release line, such as vN.x
.
If the release is transitioning from Active LTS to Maintenance, the
backport-requested-vN.x
label must be deleted.
Add new codename to nodejs-latest-linker
In order to make sure a download URL
(e.g: https://nodejs.org/download/release/latest-codename/) will be available
for the new LTS release line you need to submit a PR to
https://github.com/nodejs/nodejs-latest-linker and add a new entry for the
new LTS codename in its ltsNames
map located in the ./latest-linker.js
file.
Make sure to reach out to the Build WG in order to validate that the new URL is available as part of the LTS release promotion.
Update Release repo info
Add the new LTS codename to the release schedule table located in the
./README.md
file located at the https://github.com/nodejs/Release
repository along with the addition of the new codename to the ./schedule.json
file in that same repo.
Major releases
The process for cutting a new Node.js major release has a number of differences from cutting a minor or patch release.
Schedule
New Node.js Major releases happen twice per year:
- Even-numbered releases are cut in April.
- Odd-numbered releases are cut in October.
Major releases should be targeted for the third Tuesday of the release month.
A major release must not slip beyond the release month. In other words, major releases must not slip into May or November.
The release date for the next major release should be announced immediately following the current release (e.g. the release date for 13.0.0 should be announced immediately following the release of 12.0.0).
Release branch
Approximately two months before a major release, new vN.x
and
vN.x-staging
branches (where N
indicates the major release) should be
created as forks of the main
branch. Up until one week before the release
date, these must be kept in sync with main
.
The vN.x
and vN.x-staging
branches must be kept in sync with one another
up until the date of the release.
The TSC should be informed of any SEMVER-MAJOR
commits that land within one
month of the release.
Create release labels
The following issue labels must be created:
vN.x
backport-blocked-vN.x
backport-open-vN.x
backport-requested-vN.x
backported-to-vN.x
dont-land-on-vN.x
The label description can be copied from existing labels of previous releases. The label color must be the same for all new labels, but different from the labels of previous releases.
Release proposal
A draft release proposal should be created 6 weeks before the release. A
separate vN.x-proposal
branch should be created that tracks the vN.x
branch. This branch will contain the draft release commit (with the draft
changelog).
Notify the @nodejs/npm
team in the release proposal PR to inform them of the
upcoming release. npm
maintains a list of supported versions
that will need updating to include the new major release.
Update NODE_MODULE_VERSION
This macro in src/node_version.h
is used to signal an ABI version for native
addons. It currently has two common uses in the community:
- Determining what API to work against for compiling native addons, e.g. NAN uses it to form a compatibility-layer for much of what it wraps.
- Determining the ABI for downloading pre-built binaries of native addons, e.g.
node-pre-gyp uses this value as
exposed via
process.versions.modules
to help determine the appropriate binary to download at install-time.
The general rule is to bump this version when there are breaking ABI changes and also if there are non-trivial API changes. The rules are not yet strictly defined, so if in doubt, please confer with someone that will have a more informed perspective, such as a member of the NAN team.
A registry of currently used NODE_MODULE_VERSION
values is maintained at
https://github.com/nodejs/node/blob/HEAD/doc/abi_version_registry.json.
When bumping NODE_MODULE_VERSION
, you should choose a new value not listed
in the registry. Also include a change to the registry in your commit to
reflect the newly used value. Ensure that the release commit removes the
-pre
suffix for the major version being prepared.
It is current TSC policy to bump major version when ABI changes. If you
see a need to bump NODE_MODULE_VERSION
outside of a major release then
you should consult the TSC. Commits may need to be reverted or a major
version bump may need to happen.
Test releases and release candidates
Test builds should be generated from the vN.x-proposal
branch starting at
about 6 weeks before the release.
Release Candidates should be generated from the vN.x-proposal
branch starting
at about 4 weeks before the release, with a target of one release candidate
per week.
Always run test releases and release candidates through the Canary in the Goldmine tool for additional testing.
Changelogs
Generating major release changelogs is a bit more involved than minor and patch changelogs.
Create the changelog file
In the doc/changelogs
directory, create a new CHANGELOG_V{N}.md
file where
{N}
is the major version of the release. Follow the structure of the existing
CHANGELOG_V*.md
files.
The navigation headers in all of the CHANGELOG_V*.md
files must be
updated to account for the new CHANGELOG_V{N}.md
file.
Once the file is created, the root CHANGELOG.md
file must be updated to
reference the newly-created major release CHANGELOG_V{N}.md
.
Generate the changelog
To generate a proper major release changelog, use the branch-diff
tool to
compare the vN.x
branch against the vN-1.x
branch (e.g. for Node.js 12.0,
we compare the v12.x
branch against the up to date v11.x
branch). Make sure
that the local copy of the downlevel branch is up to date.
The commits in the generated changelog must then be organized:
- Remove all release commits from the list
- Remove all reverted commits and their reverts
- Separate all SEMVER-MAJOR, SEMVER-MINOR, and SEMVER-PATCH commits into lists
Generate the notable changes
For a major release, all SEMVER-MAJOR commits that are not strictly internal, test, or doc-related are to be listed as notable changes. Some SEMVER-MINOR commits may be listed as notable changes on a case-by-case basis. Use your judgment there.
Update the expected assets
The promotion script does a basic check that the expected files are present.
Open a pull request in the Build repository to add the list of expected files
for the new release line as a new file, v{N}.x
(where {N}
is the major
version of the release), in the expected assets folder. The change will
need to be deployed onto the web server by a member of the build-infra team
before the release is promoted.
Snap
The Node.js Snap package has a "default" for installs where the user hasn't specified a release line ("track" in Snap terminology). This should be updated to point to the most recently activated LTS. A member of the Node.js Build Infrastructure team is able to perform the switch of the default. An issue should be opened on the Node.js Snap management repository requesting this take place once a new LTS line has been released.