pandoc, (edited ) to random

A number of formats, including #EPUB, #ODT, #docx, and #PDF (via #TeXLaTeX, #Typst, ...) include the document's build time. This can be an issue for reproducible builds. Set the SOURCE_DATE_EPOCH environment variable to an integer value¹ to use a fixed time instead.

SOURCE_DATE_EPOCH=682984800 pandoc …

¹ Seconds in the Unix epoch. Get the current epoch time with date +%s.

#pandoc #reproduciblebuilds

civodul, to random
@civodul@toot.aquilenet.fr avatar

Mapping upstream source code tarballs back to downstream distros:
https://whatsrc.org/

👍 to hacker kpcyrd for developing this!

vagrantc, to guix
@vagrantc@floss.social avatar

So, a serious issue was discovered in March ... but achieved a near-total eclipse of nearly all other issues...

The security update of guix as packaged in was finally released today!

https://lists.debian.org/debian-security-announce/2024/msg00078.html

I am also pleased to say the official build servers for Debian produced a bit-for-bit identical .deb as my local build on bookworm amd64. Yay yay!

janneke, to guix
@janneke@todon.nl avatar

This morning, my "[PATCH v3 0/4] Reproducible `make dist' tarball: Avoid override stamp-N warnings." was included in master. The title is somewhat misleading, but the gist is that we now have reproducible source tarballs. Hopefully the discussion on minimal/pure source tarballs continues.

https://issues.guix.gnu.org/70380#19

@reproducible_builds

civodul, to random
@civodul@toot.aquilenet.fr avatar

“Reproducible and minimal source-only tarballs”, by @jas4711:
https://blog.josefsson.org/2024/04/13/reproducible-and-minimal-source-only-tarballs/

Great work providing reproducible tarballs (similar to what @janneke did for Guix), source-only tarballs, and setting up continuous integration to detect non-reproducibility across a variety of Linux distros. 👍

Foxboron, to random
@Foxboron@chaos.social avatar

NixOS linking to reproducible builds in their wiki 🤌

I should post the spicy post.

Foxboron,
@Foxboron@chaos.social avatar
civodul, to random
@civodul@toot.aquilenet.fr avatar

“Towards reproducible minimal source code tarballs?” by @jas4711:
https://blog.josefsson.org/2024/04/01/towards-reproducible-minimal-source-code-tarballs-please-welcome-src-tar-gz/

I think “make dist”-generated tarballs are just one part of the xz debacle (and not the most frightening part), but at least we can do something about them: when they’re the byproduct of a build process, we can build them from source (like Debian does); when they add something that’s not in the VCS (such as .po files), we can at least ensure a reproducible build process as Simon advocates here.

janneke, (edited )
@janneke@todon.nl avatar

@civodul @jas4711 Just posted V2; when this is merged, building the Guix source tarball is fully reproducible.

https://issues.guix.gnu.org/70169/#21

That sounds like a rather trivial effort, but standards mandate inclusion of pre-built documentation...and there seems to be a "let's add a timestamp" fetishism that has spread like a virus.

There are several tools to change the timestamp of a PDF; and there is a specification (v1.7 I believe) that mandates the new timestamp to be appended. Which all of these tools now do.

Probably @reproducible_builds should also move into standardization committies if we're ever going to get/keep our builds reproducible.

https://issues.guix.gnu.org/70169/#21

Andres4NY, to random
@Andres4NY@social.ridetrans.it avatar

lol, the people are finally having their day in the sun

(and hey good for them, they've done a lot of work to get to this place!)

https://lists.reproducible-builds.org/pipermail/rb-general/2024-March/003323.html

vagrantc, to random
@vagrantc@floss.social avatar

So, Philipp Kern dropped by asking if we could do some verifications of recent Debian Security updates, given, well the whole mess... and that our build infrastructure may have run compromised code at some point...

So I did a quick pass at a handful of updates and everything verified ok so far, though I skipped some of the probably more juicy targets such as chromium and firefox:

https://lists.reproducible-builds.org/pipermail/rb-general/2024-March/003321.html

Debian is reproducible enough to at least try this sort of thing!

archlinux, to archlinux
@archlinux@fosstodon.org avatar
civodul, to guix
@civodul@toot.aquilenet.fr avatar

“Adventures on the quest for long-term reproducible deployment”
https://guix.gnu.org/en/blog/2024/adventures-on-the-quest-for-long-term-reproducible-deployment/

On addressing build reproducibility problems on “old” packages, in particular time-related, to ensure and with .

Cc: @reproducible_builds

reproducible_builds, to random

There was a bunch of activity around Reproducible Builds at ! A 🧵...

On the main stage, core dev Holger 'h01ger' Levsen presented "Titled Reproducible Builds: The First Ten Years" giving an overview: how it started with a small BoF at DebConf13 (and before), then grew from being a Debian effort to something many projects work on together, until in 2021 it was mentioned in an Executive Order of the President of the United States.

https://fosdem.org/2024/schedule/event/fosdem-2024-3353-reproducible-builds-the-first-ten-years/

vagrantc, to random
@vagrantc@floss.social avatar

A thorn in my side for the last few months...

I set up some shiny new virtual machines mostly for on a packed with 64GB of ram and 16 cores of modest ARM compute power...
only to be stumped on the networking.

The virtual machines were set up to use macvtap via virt-manager in the same way as several other machines... no network.

Today I tried using a USB ethernet adatper. Worked like a charm!

What could cause to not work with the onboard ?

rml, to blender
@rml@functional.cafe avatar

I'm someone who used to be a huge video art junkie, regularly scheduling viewing sessions at Electronic Arts Intermix where I'd spend hours working through their extensive catalogue (massive shame its not online), but I've never been a cinephile, having a handful of directors I absolutely love (Farocki, Godard, Pasolini, Vertov, Suleiman, Lynch and some others), with computer animated films being something I never got into, despite working in (mostly live/realtime/for events) 3D professionally since I was 20. But I've started subscribing to and have really enjoyed digging into their "open movies", which at the level of craft are truly impressive, and its a fun way to support development, which I am more than happy to do -- Blender has become simply the most powerful design tool on the planet, and the first production non-linear editor that I've ever actually enjoyed using, and it improves rapidly and as well as gracefully.

That being said, I think there is a massive missed opportunity with the Blender open movies, because AFAIK the studio internally collaborates over to version their films, yet there is no advertised links to download the repositories. I imagine they are massive, but I would still love to spend a weekend working through the history of . Its also somewhere should prove to be indispensable.

civodul, to guix
@civodul@toot.aquilenet.fr avatar

Virtual build machines to the rescue of software archaeologists:
https://issues.guix.gnu.org/68677

Not just archaeologists actually: it’s something you need to rebuild packages that include “time traps” (fail to build after some time). It’s relatively rare, but when you need them, you’d rather have a simple way to work around the problem.

lunar, to random

There is some satisfaction to see bugs resolved after 8 years:
https://bugzilla.gnome.org/show_bug.cgi?id=751621
https://gitlab.gnome.org/GNOME/libxslt/-/commit/82f6cbf8ca61b1f9e00dc04aa3b15d563e7bbc6d

Turns out the faulty behavior was a security hazard the whole time.

sterophonick, to random
@sterophonick@bitbang.social avatar

this is like 9/11 for the /g/ board

kkarhan,
@kkarhan@mstdn.social avatar

@macmittens @sterophonick OFC it is a quality-of-life improvement to have the option to grab a binary instead if having to compile it yourself, and espechally on -SX and early machines I can see having an install take minutes or hours instead of days or a week as a undisputed bonus.

I do kinda follow the same with OS/1337 in that I want things to be provided as binaries ready to go but also make the norm and thus allow full verifyability of everything!

zacchiro, to random
@zacchiro@mastodon.xyz avatar

Very glad to receive best paper award (for year 2022) for "Reproducible Builds: Increasing the Integrity of Software Supply Chains" with C. Lamb https://ieeexplore.ieee.org/document/9403390 ( preprint also available). I hope it will help to spread the word even more about the importance of among both researchers and practitioners.

reproducible_builds, to random

Busy November in land — Check out our report here: https://reproducible-builds.org/reports/2023-11/ @opensuse
@debian @conservancy etc.

janneke, to random
@janneke@todon.nl avatar

Mes 0.26 released: With greatly enhanced compatibility, Guile-style modules, and supporting Gash and Gash-Utils.

https://lists.gnu.org/archive/html/info-gnu/2023-12/msg00000.html

Thanks to the amazing work of Timothy Sample (and myself :)





@fsf
@fsfe

sebastian, to php
@sebastian@phpc.social avatar

PHPUnit 8.5.35, PHPUnit 9.6.14, and PHPUnit 10.5.0 are the first versions of PHPUnit where composer.lock is under version control and part of the (signed, of course) release tag.

The PHAR binary of PHPUnit now has a --composer-lock CLI option that prints the composer.lock that was used to build the PHAR.

Making the build of PHPUnit's PHAR reproducible is another step towards a more secure .

jbzfn, to guix
@jbzfn@mastodon.social avatar

🔣 The Full-Source Bootstrap: Building from source all the way down | GNU Guix

"Software is bootstrappable when it does not depend on a binary seed that cannot be built from source. Software that is not bootstrappable---even if it is free software---is a serious security risk (supply chain security) for a variety of reasons. The Bootstrappable Builds project aims to reduce the number and size of binary seeds to a bare minimum."

https://guix.gnu.org/de/blog/2023/the-full-source-bootstrap-building-from-source-all-the-way-down/

#Guix #ReproducibleBuilds #Opensource

reproducible_builds, to random

Check out what's been going on in the world of during October 2023… including an awesome summit in Hamburg, Germany. \o/ 👉 https://reproducible-builds.org/reports/2023-10/ 👈

janneke, to random
@janneke@todon.nl avatar
indieterminacy, to random

@janneke You may appreciate a breakdown of Ken Thompson's in/famous compiler backdoor, which he alluded to in his famous lecture, Reflections On Trusting Trust:
https://research.swtch.com/nih

c/o https://irreal.org/blog/?p=11754

Like others, Im surprised that nobody has asked him sooner to look at the backdoor (99 LOC and 20 LOC script).

janneke,
@janneke@todon.nl avatar

@indieterminacy Yes, that was an interesting read.
Also, quite encouraging that is finally gaining some influence, and similarly discouraging that and the full-source Bootstrap isn't widely known about.

https://bootstrappable.org
https://todon.nl/@janneke/110265435316816890

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • megavids
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • provamag3
  • tester
  • Leos
  • JUstTest
  • All magazines