[Git][reproducible-builds/reproducible-website][master] 2022-09: mention that excluding timestamps were not exactly well recieved.

Vagrant Cascadian (@vagrant) gitlab at salsa.debian.org
Wed Oct 5 20:17:38 UTC 2022



Vagrant Cascadian pushed to branch master at Reproducible Builds / reproducible-website


Commits:
33474f9f by Vagrant Cascadian at 2022-10-05T13:16:58-07:00
2022-09: mention that excluding timestamps were not exactly well recieved.

- - - - -


1 changed file:

- _reports/2022-09.md


Changes:

=====================================
_reports/2022-09.md
=====================================
@@ -32,7 +32,7 @@ More details can be found in the `README.md` file [within the code repository](h
 
 David Wheeler also pointed out that there are some potential upcoming changes to the [OpenSSF Best Practices](https://bestpractices.coreinfrastructure.org/en) badge for open source software in relation to reproducibility. Whilst the badge programme has [three certification levels](https://bestpractices.coreinfrastructure.org/en/criteria) ("passing", "silver" and "gold"), the "gold" level includes the criterion that "The project MUST have a reproducible build".
 
-However, [David reported](https://lists.reproducible-builds.org/pipermail/rb-general/2022-September/002696.html) that some projects have argued that this reproducibility criterion should be slightly relaxed as outlined in an [issue on the `best-practices-badge`](https://github.com/coreinfrastructure/best-practices-badge/issues/1865) GitHub project. Essentially, though, the claim is that the reproducibility requirement doesn't make sense for projects that do not release built software, and that timestamp differences by *themselves* don't necessarily indicate malicious changes.
+However, [David reported](https://lists.reproducible-builds.org/pipermail/rb-general/2022-September/002696.html) that some projects have argued that this reproducibility criterion should be slightly relaxed as outlined in an [issue on the `best-practices-badge`](https://github.com/coreinfrastructure/best-practices-badge/issues/1865) GitHub project. Essentially, though, the claim is that the reproducibility requirement doesn't make sense for projects that do not release built software, and that timestamp differences by *themselves* don't necessarily indicate malicious changes. Numerous pragmitic problems around excluding timestamps we raised in the discussion of the issue.
 
 ---
 



View it on GitLab: https://salsa.debian.org/reproducible-builds/reproducible-website/-/commit/33474f9f7c550b41ca88c9206dfe9d5df71be707

-- 
View it on GitLab: https://salsa.debian.org/reproducible-builds/reproducible-website/-/commit/33474f9f7c550b41ca88c9206dfe9d5df71be707
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.reproducible-builds.org/pipermail/rb-commits/attachments/20221005/7b0bcefb/attachment.htm>


More information about the rb-commits mailing list