[Git][reproducible-builds/reproducible-website][master] 2 commits: Misc cosmetic changes.

Chris Lamb gitlab at salsa.debian.org
Sat Oct 5 20:43:56 UTC 2019



Chris Lamb pushed to branch master at Reproducible Builds / reproducible-website


Commits:
f338c383 by Chris Lamb at 2019-10-05T20:43:25Z
Misc cosmetic changes.

- - - - -
552a9e7e by Chris Lamb at 2019-10-05T20:43:45Z
published as https://reproducible-builds.org/reports/2019-09/

- - - - -


2 changed files:

- _reports/2019-09.md
- images/reports/2019-09/summit.jpg


Changes:

=====================================
_reports/2019-09.md
=====================================
@@ -3,7 +3,8 @@ layout: report
 year: "2019"
 month: "09"
 title: "Reproducible Builds in September 2019"
-draft: true
+draft: false
+published: 2019-10-05 20:43:45
 ---
 
 **Welcome to the September 2019 report from the [Reproducible Builds]({{ "/" | prepend: site.baseurl }}) project!**
@@ -11,7 +12,7 @@ draft: true
 
 [![]({{ "/images/reports/2019-09/reproducible-builds.png#right" | prepend: site.baseurl }})]({{ "/" | prepend: site.baseurl }})
 
-In these reports we outline the most important things that we have been up over the past month. As a quick refresher of what our project is about, whilst anyone can inspect the source code of free software for malicious flaws, most software is distributed to end users or server systems as precompiled binaries. The motivation behind the reproducible builds effort is to ensure zero changes have been introduced during these compilation processes. This is achieved by promising identical results are always generated from a given source thus allowing multiple third-parties to come to a consensus on whether a build was changed or even compromised.
+In these reports we outline the most important things that we have been up over the past month. As a quick refresher of what our project is about, whilst anyone can inspect the source code of free software for malicious changes, most software is distributed to end users or servers as precompiled binaries. The motivation behind the reproducible builds effort is to ensure zero changes have been introduced during these compilation processes. This is achieved by promising identical results are always generated from a given source, thus allowing multiple third-parties to come to a consensus on whether a build was compromised.
 
 In September's report, we cover:
 
@@ -19,8 +20,7 @@ In September's report, we cover:
 * **Upstream news** — *kernel reproducibility, grafana, systemd, etc.*
 * **Distribution work** — *reproducible images in Arch Linux, policy changes in Debian, etc.*
 * **Software development** — *yet more work on diffoscope, upstream patches, etc.*
-* **Misc news** — *from our mailing lists, etc.*
-* **Getting in touch** — *how to contribute, etc*
+* **Misc news & getting in touch** — *from our mailing list how to contribute, etc*
 
 If you are interested in contributing to our project, please visit our [*Contribute*]({{ "/contribute/" | prepend: site.baseurl }}) page on our website.
 
@@ -32,14 +32,13 @@ If you are interested in contributing to our project, please visit our [*Contrib
 
 This month Vagrant Cascadian attended the [2019 GNU Tools Cauldron](https://gcc.gnu.org/wiki/cauldron2019) in Montréal, Canada and gave a presentation entitled [*Reproducible Toolchains for the Win*](https://gcc.gnu.org/wiki/cauldron2019#cauldron2019talks.Reproducible_Toolchains_For_The_Win) ([video](https://www.youtube.com/watch?v=56nRFxA7lPY)).
 
-In addition, our project [was highlighted as part of a presentation](https://media.ccc.de/v/ASG2019-146-rootless-reproducible-hermetic-secure-container-build-showdown#t=407) by [Andrew Martin](https://twitter.com/sublimino) at the [All Systems Go](https://all-systems-go.io/) conference in Berlin titled [*Rootless, Reproducible & Hermetic: Secure Container Build Showdown*](https://cfp.all-systems-go.io/ASG2019/talk/PVYETJ/)
-and [Björn Michaelsen](https://en.wikipedia.org/wiki/Bj%C3%B6rn_Michaelsen) from the [Document Foundation](https://www.documentfoundation.org/) presented at the [2019 LibreOffice Conference](https://libocon.org/) in Almería, Spain on the status of reproducible builds in the [LibreOffice office suite](https://www.libreoffice.org/).
+In addition, [our project was highlighted as part of a presentation](https://media.ccc.de/v/ASG2019-146-rootless-reproducible-hermetic-secure-container-build-showdown#t=407) by [Andrew Martin](https://twitter.com/sublimino) at the [All Systems Go](https://all-systems-go.io/) conference in Berlin titled [*Rootless, Reproducible & Hermetic: Secure Container Build Showdown*](https://cfp.all-systems-go.io/ASG2019/talk/PVYETJ/), and [Björn Michaelsen](https://en.wikipedia.org/wiki/Bj%C3%B6rn_Michaelsen) from the [Document Foundation](https://www.documentfoundation.org/) presented at the [2019 LibreOffice Conference](https://libocon.org/) in Almería in Spain on the status of reproducible builds in the [LibreOffice office suite](https://www.libreoffice.org/).
 
-Anastasis Keliris and Michail Maniatakos from the [New York University Tandon School of Engineering](https://engineering.nyu.edu/) published a paper titled *ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries* ([PDF](https://arxiv.org/pdf/1812.03478.pdf)) that speaks to concerns regarding the security of Industrial Control Systems (ICS) such as those attacked via [Stuxnet](https://en.wikipedia.org/wiki/Stuxnet) that outlines their [ICSREF](https://github.com/momalab/ICSREF) tool for reverse-engineering binaries from such systems and furthermore demonstrating a scenario whereby a commercial smartphone could be easily used to compromise this infrastructure.
+In academia, Anastasis Keliris and Michail Maniatakos from the [New York University Tandon School of Engineering](https://engineering.nyu.edu/) published a paper titled *ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries* ([PDF](https://arxiv.org/pdf/1812.03478.pdf)) that speaks to concerns regarding the security of Industrial Control Systems (ICS) such as those attacked via [Stuxnet](https://en.wikipedia.org/wiki/Stuxnet). The paper outlines their [ICSREF](https://github.com/momalab/ICSREF) tool for reverse-engineering binaries from such systems and furthermore demonstrates a scenario whereby a commercial smartphone equipped with ICSREF could be easily used to compromise such infrastructure.
 
 [![]({{ "/images/reports/2019-09/seagl.png#right" | prepend: site.baseurl }})](https://seagl.org/)
 
-It was announced that Vagrant Cascadian will present a talk at [SeaGL](https://seagl.org) in Seattle, Washington during November titled [*There and Back Again, Reproducibly*](https://osem.seagl.org/conferences/seagl2019/program/proposals/671).
+Lastly, It was announced that Vagrant Cascadian will present a talk at [SeaGL](https://seagl.org) in Seattle, Washington during November titled [*There and Back Again, Reproducibly*](https://osem.seagl.org/conferences/seagl2019/program/proposals/671).
 
 ---
 
@@ -47,7 +46,7 @@ It was announced that Vagrant Cascadian will present a talk at [SeaGL](https://s
 
 [![]({{ "/images/reports/2019-09/summit.jpg#right" | prepend: site.baseurl }})]({{ "/events/Marrakesh2019/" | prepend: site.baseurl }})
 
-Registration for [our fifth annual Reproducible Builds summit]({{ "/events/Marrakesh2019/" | prepend: site.baseurl }}) that will take place between 1st → 8th December in Marrakesh, Morocco has opened and [personal invitation](https://lists.reproducible-builds.org/pipermail/rb-general/2019-September/001651.html) have been sent out.
+Registration for [our fifth annual Reproducible Builds summit]({{ "/events/Marrakesh2019/" | prepend: site.baseurl }}) that will take place between 1st → 8th December in Marrakesh, Morocco has opened and [personal invitations](https://lists.reproducible-builds.org/pipermail/rb-general/2019-September/001651.html) have been sent out.
 
 Similar to previous incarnations of the event, the heart of the workshop will be three days of moderated sessions with surrounding "hacking" days and will include a huge diversity of participants from Arch Linux, coreboot, Debian, F-Droid, GNU Guix, Google, Huawei, in-toto, MirageOS, NYU, openSUSE, OpenWrt, Tails, Tor Project and many more. If you would like to learn more about the event and how to register, please visit our [our dedicated event page](https://reproducible-builds.org/events/Marrakesh2019/).
 
@@ -56,11 +55,11 @@ Similar to previous incarnations of the event, the heart of the workshop will be
 
 ## Upstream news
 
-Ben Hutchings [added documentation to the Linux kernel](https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=fe013f8bc160d79c6e33bb66d9bb0cd24949274c) regarding how to make reproducible builds. As he mentioned in the commit message, the kernel is actually reproducible but the solution was not previously documented in one place and thus Ben listed the workflow and environment needed to ensure a reproducible build.
+Ben Hutchings [added documentation to the Linux kernel](https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=fe013f8bc160d79c6e33bb66d9bb0cd24949274c) regarding how to make the build reproducible. As he mentioned in the commit message, the kernel is "actually" reproducible but the end-to-end process was not previously documented in one place and thus Ben describes the workflow and environment needed to ensure a reproducible build.
 
-[Daniel Edgecumbe](https://esotericnonsense.com) kindly [submitted a pull request](https://github.com/systemd/systemd/pull/13482) that was subsequently merged to the logging/journaling component of [systemd](https://www.freedesktop.org/wiki/Software/systemd/) in order that the output of e.g. `journalctl --update-catalog` does not differ between subsequent runs despite there being no changes in the input files.
+[Daniel Edgecumbe](https://esotericnonsense.com) submitted [a pull request](https://github.com/systemd/systemd/pull/13482) which was subsequently merged to the logging/journaling component of [systemd](https://www.freedesktop.org/wiki/Software/systemd/) in order that the output of e.g. `journalctl --update-catalog` does not differ between subsequent runs despite there being no changes in the input files.
 
-Jelle van der Waa noticed that if the [grafana](https://grafana.com/) monitoring tool was built within a source tree devoid of [Git](https://git-scm.com/) metadata then the current timestamp was used, leading to an unreproducible build. To avoid this, Jelle [submitted a pull request](https://github.com/grafana/grafana/pull/18953) in order that it use [`SOURCE_DATE_EPOCH`]({{ "/docs/source-date-epoch/" | prepend: site.baseurl }}) if available.
+Jelle van der Waa noticed that if the [grafana](https://grafana.com/) monitoring tool was built within a source tree devoid of [Git](https://git-scm.com/) metadata then the current timestamp was used instead, leading to an unreproducible build. To avoid this, Jelle [submitted a pull request](https://github.com/grafana/grafana/pull/18953) in order that it use [`SOURCE_DATE_EPOCH`]({{ "/docs/source-date-epoch/" | prepend: site.baseurl }}) if available.
 
 [Mes](https://gitlab.com/janneke/mes) (a Scheme-based compiler for our "sister" [bootstrappable builds](http://bootstrappable.org) effort) [announced their 0.20 release](https://lists.reproducible-builds.org/pipermail/rb-general/2019-September/001649.html).
 
@@ -71,17 +70,17 @@ Jelle van der Waa noticed that if the [grafana](https://grafana.com/) monitoring
 
 [![]({{ "/images/reports/2019-09/opensuse.png#right" | prepend: site.baseurl }})](https://www.opensuse.org/)
 
-Bernhard M. Wiedemann posted [his monthly Reproducible Builds status update](https://lists.opensuse.org/opensuse-factory/2019-09/msg00244.html) for the [openSUSE](https://opensuse.org/) distribution. [Thunderbird](https://www.thunderbird.net/) and `kernel-vanilla` packages are among the larger ones to become reproducible soon, and Python patches to help reproducibility issues of builds of Python modules with C bindings.
+Bernhard M. Wiedemann posted [his monthly Reproducible Builds status update](https://lists.opensuse.org/opensuse-factory/2019-09/msg00244.html) for the [openSUSE](https://opensuse.org/) distribution. [Thunderbird](https://www.thunderbird.net/) and `kernel-vanilla` packages will be among the larger ones to become reproducible soon and there were additional Python patches to help reproducibility issues of modules written in this language that have C bindings.
 
 [![]({{ "/images/reports/2019-09/openwrt.png#right" | prepend: site.baseurl }})](https://openwrt.org/)
 
-[OpenWrt](https://openwrt.org/) is a Linux-based operating system targeting embedded devices such as wireless network routers. This month, Paul Spooren (*aparcar*) switched the toolchain the use the [GCC](https://gcc.gnu.org/) version 8 by default in order to support the `-ffile-prefix-map=` which permits a varying build path without affecting the binary result of the build. [[...](https://lists.infradead.org/pipermail/openwrt-devel/2019-September/019156.html)] In addition, Paul [updated the `kernel-defaults` package](https://lists.infradead.org/pipermail/openwrt-devel/2019-September/019166.html) to ensure that the [`SOURCE_DATE_EPOCH` environment variable]({{ "/docs/source-date-epoch/" | prepend: site.baseurl }}) is considered when creating the the `/init` directory.
+[OpenWrt](https://openwrt.org/) is a Linux-based operating system targeting embedded devices such as wireless network routers. This month, Paul Spooren (*aparcar*) switched the toolchain the use the [GCC](https://gcc.gnu.org/) version 8 by default in order to support the `-ffile-prefix-map=` which permits a varying build path without affecting the binary result of the build [[...](https://lists.infradead.org/pipermail/openwrt-devel/2019-September/019156.html)]. In addition, Paul [updated the `kernel-defaults` package](https://lists.infradead.org/pipermail/openwrt-devel/2019-September/019166.html) to ensure that the [`SOURCE_DATE_EPOCH` environment variable]({{ "/docs/source-date-epoch/" | prepend: site.baseurl }}) is considered when creating the the `/init` directory.
 
 [![]({{ "/images/reports/2019-09/coreboot.png#right" | prepend: site.baseurl }})](https://www.coreboot.org/)
 
-Alexander "*lynxis*" Couzens began work on working on [a set of build scripts](https://github.com/system-transparency/build.git) for creating firmware and operating system artifacts in the [coreboot](https://www.coreboot.org/) distribution.
+Alexander "*lynxis*" Couzens began work on working on [a set of build scripts](https://github.com/system-transparency/build.git) for creating firmware and operating system artifacts in the [*coreboot*](https://www.coreboot.org/) distribution.
 
-Lukas Pühringer prepared an upload (which was sponsored by Holger Levsen) of [python-securesystemslib 0.11.3-1](https://tracker.debian.org/news/1061049/accepted-python-securesystemslib-0113-1-source-all-into-unstable-unstable/) to Debian unstable. python-securesystemslib is a dependency of [in-toto](https://github.com/in-toto/in-toto).
+Lukas Pühringer prepared an upload which was sponsored by Holger Levsen of [`python-securesystemslib` version 0.11.3-1](https://tracker.debian.org/news/1061049/accepted-python-securesystemslib-0113-1-source-all-into-unstable-unstable/) to Debian unstable. `python-securesystemslib`is a dependency of [in-toto](https://github.com/in-toto/in-toto), a framework to protect the integrity of software supply chains.
 
 #### Arch Linux
 
@@ -91,7 +90,7 @@ The `mkinitcpio` component of [Arch Linux](https://www.archlinux.org/) was updat
 
 > Timestamps within the initramfs are set to the Unix epoch of 1970-01-01. Note that in order for the build to be fully reproducible, the compressor specified (e.g. gzip, xz) must also produce reproducible archives. At the time of writing, as an inexhaustive example, the lzop compressor is incapable of producing reproducible archives due to the insertion of a runtime timestamp.
 
-In addition, a bug was created to [track progress on making the Arch Linux ISO images reproducible](https://bugs.archlinux.org/task/63683?project=6).
+In addition, a bug was created to track progress on [making the Arch Linux ISO images reproducible](https://bugs.archlinux.org/task/63683?project=6).
 
 #### Debian
 
@@ -114,10 +113,10 @@ The Reproducible Builds project detects, dissects and attempts to fix as many cu
 * Bernhard M. Wiedemann:
     * [`blender`](https://developer.blender.org/D5756) (Python date)
     * [`buzztrax`](https://github.com/Buzztrax/buzztrax/pull/88) (shell date)
-    * [`colobot-data`](https://build.opensuse.org/request/show/733640) (sort Python `readdir`, [forwarded upstream](https://github.com/colobot/colobot-data/pull/41))
+    * [`colobot-data`](https://build.opensuse.org/request/show/733640) (sort a Python `readdir`, [forwarded upstream](https://github.com/colobot/colobot-data/pull/41))
     * [`enblend-enfuse`](https://build.opensuse.org/request/show/731759) (date/host/user)
     * [`gmsh`](https://build.opensuse.org/request/show/731075) (hostname/username)
-    * [`griefly`](https://build.opensuse.org/request/show/733637) (sort Python `readdir`, [forwarded upstream](https://github.com/griefly/griefly/pull/508))
+    * [`griefly`](https://build.opensuse.org/request/show/733637) (sort a Python `readdir`, [forwarded upstream](https://github.com/griefly/griefly/pull/508))
     * [`guile`](https://build.opensuse.org/request/show/732638) (disable parallelism)
     * [`latex2html`](https://build.opensuse.org/request/show/733232) (drop LaTeX log file with date)
     * [`MozillaFirefox`](https://build.opensuse.org/request/show/733089) (make [Profile-Guided Optimisation](https://en.wikipedia.org/wiki/Profile-guided_optimization) optional)
@@ -125,26 +124,26 @@ The Reproducible Builds project detects, dissects and attempts to fix as many cu
     * [`ninja`](https://github.com/ninja-build/ninja/pull/1651) (build failure when build without parallelism)
     * [`python-futures`](https://github.com/agronholm/pythonfutures/pull/92) (fix build failure)
     * [`python-holidays`](https://github.com/dr-prodigy/python-holidays/pull/235) (fix build failure in 2020)
-    * [`python-iminuit`](https://github.com/scikit-hep/iminuit/pull/355) (sort Python [glob](https://docs.python.org/3/library/glob.html))
+    * [`python-iminuit`](https://github.com/scikit-hep/iminuit/pull/355) (sort a Python [glob](https://docs.python.org/3/library/glob.html))
     * [`python-ioflo`](https://github.com/ioflo/ioflo/pull/41) (fix build failure via security certificate renewal)
     * [`python-keystoneauth1`](https://review.opendev.org/681103) (fix build failure in 2020)
     * [`python-openstackdocstheme`](https://build.opensuse.org/request/show/732328) (date issue)
     * [`python3`](https://build.opensuse.org/request/show/733152)/[`python`](https://build.opensuse.org/request/show/733188) (toolchain, sort `readdir`)
     * [`volk`](https://bugzilla.opensuse.org/show_bug.cgi?id=1152001) (report compile-time CPU-detection)
-    * [`wget2`](https://gitlab.com/gnuwget/wget2/merge_requests/450) (drop build date)
+    * [`wget2`](https://gitlab.com/gnuwget/wget2/merge_requests/450) (drop a build date)
 
 * Chris Lamb ("*lamby*"):
-    * [#939546](https://bugs.debian.org/939546) filed against [libnbd](https://tracker.debian.org/pkg/libnbd) ([forwarded upstream](https://github.com/libguestfs/libnbd/pull/2))
-    * [#939547](https://bugs.debian.org/939547) filed against [libubootenv](https://tracker.debian.org/pkg/libubootenv) ([forwarded upstream](https://github.com/sbabic/libubootenv/pull/3))
-    * [#939548](https://bugs.debian.org/939548) filed against [dsdp](https://tracker.debian.org/pkg/dsdp).
-    * [#939549](https://bugs.debian.org/939549) filed against [sdaps](https://tracker.debian.org/pkg/sdaps) ([forwarded upstream](https://github.com/sdaps/sdaps/pull/182))
-    * [#939650](https://bugs.debian.org/939650) filed against [libvdpau](https://tracker.debian.org/pkg/libvdpau).
-    * [#940013](https://bugs.debian.org/940013) filed against [apophenia](https://tracker.debian.org/pkg/apophenia).
-    * [#940156](https://bugs.debian.org/940156) filed against [pydantic](https://tracker.debian.org/pkg/pydantic) ([forwarded upstream](https://github.com/samuelcolvin/pydantic/pull/805))
-    * [#940639](https://bugs.debian.org/940639) filed against [vala-panel](https://tracker.debian.org/pkg/vala-panel).
-    * [#941072](https://bugs.debian.org/941072) filed against [kivy](https://tracker.debian.org/pkg/kivy).
-    * [#941116](https://bugs.debian.org/941116) filed against [fathom](https://tracker.debian.org/pkg/fathom).
-    * Several [libguestfs](http://libguestfs.org/) components [have received a patch](https://www.redhat.com/archives/libguestfs/2019-September/msg00037.html) to support [`SOURCE_DATE_EPOCH`]({{ "/docs/source-date-epoch/" | prepend: site.baseurl }}).
+    * [#939546](https://bugs.debian.org/939546) filed against [`libnbd`](https://tracker.debian.org/pkg/libnbd) ([forwarded upstream](https://github.com/libguestfs/libnbd/pull/2))
+    * [#939547](https://bugs.debian.org/939547) filed against [`libubootenv`](https://tracker.debian.org/pkg/libubootenv) ([forwarded upstream](https://github.com/sbabic/libubootenv/pull/3))
+    * [#939548](https://bugs.debian.org/939548) filed against [`dsdp`](https://tracker.debian.org/pkg/dsdp).
+    * [#939549](https://bugs.debian.org/939549) filed against [`sdaps`](https://tracker.debian.org/pkg/sdaps) ([forwarded upstream](https://github.com/sdaps/sdaps/pull/182))
+    * [#939650](https://bugs.debian.org/939650) filed against [`libvdpau`](https://tracker.debian.org/pkg/libvdpau).
+    * [#940013](https://bugs.debian.org/940013) filed against [`apophenia`](https://tracker.debian.org/pkg/apophenia).
+    * [#940156](https://bugs.debian.org/940156) filed against [`pydantic`](https://tracker.debian.org/pkg/pydantic) ([forwarded upstream](https://github.com/samuelcolvin/pydantic/pull/805))
+    * [#940639](https://bugs.debian.org/940639) filed against [`vala-panel`](https://tracker.debian.org/pkg/vala-panel).
+    * [#941072](https://bugs.debian.org/941072) filed against [`kivy`](https://tracker.debian.org/pkg/kivy).
+    * [#941116](https://bugs.debian.org/941116) filed against [`fathom`](https://tracker.debian.org/pkg/fathom).
+    * Several [`libguestfs`](http://libguestfs.org/) components [have received a patch](https://www.redhat.com/archives/libguestfs/2019-September/msg00037.html) to support [`SOURCE_DATE_EPOCH`]({{ "/docs/source-date-epoch/" | prepend: site.baseurl }}).
 
 * Rebecca N. Palmer:
     * [#941309](https://bugs.debian.org/941309) filed against [node-browserify-lite](https://tracker.debian.org/pkg/node-browserify-lite).
@@ -173,7 +172,7 @@ This month, Chris Lamb uploaded versions `123`, `124` and `125` and made the fol
 
 * Many code cleanups, including dropping some unnecessary control flow [[...](https://salsa.debian.org/reproducible-builds/diffoscope.git/commit/ff57b86)], dropping unnecessary `pass` statements [[...](https://salsa.debian.org/reproducible-builds/diffoscope.git/commit/e066e77)] and dropping explicitly inheriting from `object` class as it unnecessary in Python 3 [[...](https://salsa.debian.org/reproducible-builds/diffoscope.git/commit/7c21ed3)].
 
-In addition, Marc Herbert completely overhauled the handling of ELF binaries particularly around many assumptions that were previously being made via file extensions, etc. [[...](https://salsa.debian.org/reproducible-builds/diffoscope/commit/ce6c03f)][[...](https://salsa.debian.org/reproducible-builds/diffoscope/commit/ec7b3ae)][[...](https://salsa.debian.org/reproducible-builds/diffoscope/commit/bee2a11)] and updated the testsuite to support a never version of the [coreboot](https://www.coreboot.org/) utilities. [[...](https://salsa.debian.org/reproducible-builds/diffoscope/commit/29da4e4)]. Mattia Rizzolo then ensured that *diffoscope* does not crash when the progress bar module is missing but the functionality was requested [[...](https://salsa.debian.org/reproducible-builds/diffoscope/commit/7294ff9)] and made our version checking code more lenient [[...](https://salsa.debian.org/reproducible-builds/diffoscope/commit/e07dfbe)]. Lastly, Vagrant Cascadian not only updated *diffoscope* to versions [123](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=3ec8c0ca942409da6ce06c38f6d8b6ccfc2a943a) and [125](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=3fb581ca9f18fe61e070195f4f8d1a670931b722), he enabled a more complete test suite in the [GNU Guix](https://guix.gnu.org/) distribution. [[...](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=3eb4adc2c41896c202f3d9131c36160c0a1311e6)][[...](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=68620d62f5cd49d6455c351f3a68e3c41dc6ce22)][[...](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=6ec872231fdf746bd6e11b97f8a6b3a23498806c)][[...](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=af760990e9651be865ccd20b935863d85f605f2e)][[...](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=4d83157cd806aeb864664ebb380c19f6be04648c)][[...](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=f315673d9e56f4f2398098590ebdc080b63ce8b1)]
+In addition, Marc Herbert completely overhauled the handling of ELF binaries particularly around many assumptions that were previously being made via file extensions, etc. [[...](https://salsa.debian.org/reproducible-builds/diffoscope/commit/ce6c03f)][[...](https://salsa.debian.org/reproducible-builds/diffoscope/commit/ec7b3ae)][[...](https://salsa.debian.org/reproducible-builds/diffoscope/commit/bee2a11)] and updated the testsuite to support a never version of the [*coreboot*](https://www.coreboot.org/) utilities. [[...](https://salsa.debian.org/reproducible-builds/diffoscope/commit/29da4e4)]. Mattia Rizzolo then ensured that *diffoscope* does not crash when the progress bar module is missing but the functionality was requested [[...](https://salsa.debian.org/reproducible-builds/diffoscope/commit/7294ff9)] and made our version checking code more lenient [[...](https://salsa.debian.org/reproducible-builds/diffoscope/commit/e07dfbe)]. Lastly, Vagrant Cascadian not only updated *diffoscope* to versions [123](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=3ec8c0ca942409da6ce06c38f6d8b6ccfc2a943a) and [125](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=3fb581ca9f18fe61e070195f4f8d1a670931b722), he enabled a more complete test suite in the [GNU Guix](https://guix.gnu.org/) distribution. [[...](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=3eb4adc2c41896c202f3d9131c36160c0a1311e6)][[...](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=68620d62f5cd49d6455c351f3a68e3c41dc6ce22)][[...](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=6ec872231fdf746bd6e11b97f8a6b3a23498806c)][[...](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=af760990e9651be865ccd20b935863d85f605f2e)][[...](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=4d83157cd806aeb864664ebb380c19f6be04648c)][[...](https://git.savannah.gnu.org/cgit/guix.git/commit/?id=f315673d9e56f4f2398098590ebdc080b63ce8b1)]
 
 #### Project website
 
@@ -200,9 +199,9 @@ In addition, Cindy Kim added [in-toto](https://in-toto.io/) to our "[Who is Invo
 [strip-nondeterminism](https://tracker.debian.org/pkg/strip-nondeterminism) is our tool to remove specific non-deterministic results from successful builds. This month, Marc Herbert made a huge number of changes including:
 
 * GNU [ar](https://en.wikipedia.org/wiki/Ar_(Unix)) handler:
-    * Don't corrupt the pseudo-filemode of the symbols table `/`.
-    * Add test files for symtab (`/`) and long names (`//`).
-    * Stop corrupting the SystemV/GNU table of long filenames.
+    * Don't corrupt the pseudo file mode of the symbols table.
+    * Add test files for "symtab" (`/`) and long names (`//`).
+    * Don't corrupt the SystemV/GNU table of long filenames.
 
 * Add a new `$File::StripNondeterminism::verbose` global and, if enabled, tell the user that `ar(1)` could not set the symbol table's [mtime](https://en.wikipedia.org/wiki/Mtime).
 
@@ -237,13 +236,9 @@ The usual node maintenance was performed by Holger Levsen [[...](https://sa
 
 ---
 
-## Misc news
+## Misc news & getting in touch
 
-On [our mailing list](https://lists.reproducible-builds.org/pipermail/rb-general/) Rebecca N. Palmer started a thread titled [Addresses in (I)Python output](https://lists.reproducible-builds.org/pipermail/rb-general/2019-September/001657.html) which points out and attempts to find a solution to a problem with Python packages, whereby objects that don't have an explicit string representation have a default one that includes their memory address. This causes problems with reproducible builds if/when such output appears in generated documentation.
-
----
-
-## Getting in touch
+On [our mailing list](https://lists.reproducible-builds.org/pipermail/rb-general/) Rebecca N. Palmer started a thread titled [Addresses in IPython output](https://lists.reproducible-builds.org/pipermail/rb-general/2019-September/001657.html) which points out and attempts to find a solution to a problem with Python packages, whereby objects that don't have an explicit string representation have a default one that includes their memory address. This causes problems with reproducible builds if/when such output appears in generated documentation.
 
 If you are interested in contributing the Reproducible Builds project, please visit our [*Contribute*]({{ "/contribute/" | prepend: site.baseurl }}) page on our website. However, you can get in touch with us via:
 


=====================================
images/reports/2019-09/summit.jpg
=====================================
Binary files a/images/reports/2019-09/summit.jpg and b/images/reports/2019-09/summit.jpg differ



View it on GitLab: https://salsa.debian.org/reproducible-builds/reproducible-website/compare/1101475c5fb29e15be80404a70a38788cbe6b890...552a9e7e14eb50b249859706cd67a12f15c4d18b

-- 
View it on GitLab: https://salsa.debian.org/reproducible-builds/reproducible-website/compare/1101475c5fb29e15be80404a70a38788cbe6b890...552a9e7e14eb50b249859706cd67a12f15c4d18b
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.reproducible-builds.org/pipermail/rb-commits/attachments/20191005/574267bb/attachment.html>


More information about the rb-commits mailing list