Re: Sticker Giveaway: Read code 

2024-03-31 Thread Vagrant Cascadian
On 2024-04-01, kpcyrd wrote:
> in February I printed about 2k stickers to manifest the concept of 
> reviewing source code, picturing a bug throwing a party within the 
> codebases nobody reads.
>
> I usually spread these in my communities in person, due to recent events 
> I've decided to give some of them away by mail. To keep things simple 
> I'm going to eat the shipping cost.

Does shipping include the cat? Or was that just to demonstrate size?

live well,
  vagrant


signature.asc
Description: PGP signature


OBS/rpm & java-21 success

2024-03-31 Thread Bernhard M. Wiedemann via rb-general

Hi,

today I want to share with you two successes on our path to total 
reproducibility in openSUSE:


Through the persistence of my colleague Jan Zerebecki and the help of 
mls (SUSE's rpm maintainer) we made nice progress on

https://bugzilla.opensuse.org/show_bug.cgi?id=1148824
to finally normalize mtimes in official openSUSE Tumbleweed rpms.

Together with a workaround for
https://github.com/rpm-software-management/rpm/issues/2965
this allowed me to create bit-identical rpms to the ones pulled from 
build.opensuse.org , processed with rpm --delsign


Now everything that was reproducible in my QA-tests is also 
reproducible+verifiable in practice.



The other success is that I saw 2 bit-identical java-21-openjdk rpm 
builds, but only when both were done on 1-core VMs, so there might only 
be some raciness left. [1]

javadoc output still has an issue from filesystem-readdir-order.
We have a build-tool workaround for that in place [2]


Ciao
Bernhard M.


[1] 
https://rb.zq1.de/compare.factory-20240331/diffs/java-21-openjdk-compare.out
[2] 
https://github.com/bmwiedemann/openSUSE/blob/54e27e1/packages/_/_project/_config#L19-L20


OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: Two questions about build-path reproducibility in Debian

2024-03-31 Thread Chris Lamb
Hi James,

> Approximately thirty are still set to other severity levels, and I plan to
> update those with the following adjusted messaging […]

Looks good to me. :)

Completely out of interest, are any of those 30 bugs tagged both
"buildpath" and "toolchain"? It's written nowhere in Policy (and I
can't remember if it's ever been discussed before), but if package X
is causing package Y to be unreproducible, I feel that has some
bearing on the severity of the bug for that issue filed against X…
completely independent of whether package X is reproducible itself or
not.  :)

Just to underscore that this is simply my curiosity before you
reassign: in the particular case of *buildpath* AND toolchain, these
should almost certainly be wishlist anyway because, as discussed, we
"aren't testing buildpath".


Best wishes,

-- 
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 
⬊   ⬋
  o



Re: Reproducible Builds for recent Debian security updates

2024-03-31 Thread Salvatore Bonaccorso
Hi,

On Sat, Mar 30, 2024 at 03:30:57PM -0700, Vagrant Cascadian wrote:
> On 2024-03-30, Vagrant Cascadian wrote:
> > On 2024-03-30, Salvatore Bonaccorso wrote:
> >> On Fri, Mar 29, 2024 at 07:38:35PM -0700, Vagrant Cascadian wrote:
> >>> Philipp Kern asked about trying to do reproducible builds checks for
> >>> recent security updates to try to gain confidence about Debian's buildd
> >>> infrastructure, given that they run builds in sid chroots which may have
> >>> used or built or run a vulnerable xz-utils...
> > ...
> >> There would be an upcoming (or actually postponed) util-linux update
> >> as well. Could you as extra paranoia please verify these here as well
> >> (I assume its enough for you that the source package is signed, I
> >> stripped the signature from the changes):
> >>
> >> https://people.debian.org/~carnil/tmp/util-linux/
> >
> > I don't see any source packages there, just .deb .changes and signed
> > .buildinfo files! The signed .buildinfo files are great, but would
> > definitely need the source code ... looks like the util-linux changes
> > are in a git branch, but a signed .dsc would be nice just to be sure I
> > am testing the same thing. That said, testing from git and getting
> > bit-for-bit identical results ... would be confidence inspiring!
> > Hmmm. Might just go for it, and if we have issues, maybe try to dig up
> > the .dsc? :)
> 
> Hah. Almost in the time it took me to wonder about git vs. .dsc builds,
> even with some minor differences in the build-depends, managed a
> bit-for-bit identical build of util-linux:amd64 and util-linux:all!
> 
> Tarball of build logs and .buildinfo files:
> 
>   
> https://people.debian.org/~vagrant/util-linux-2.38.1-5+deb12u1.verification.tar.zst

Thanks a lot!

Regards,
Salvatore


Irregular status update about reproducible live-build ISO images

2024-03-31 Thread Roland Clobus

Hello lists,

here is the 24th update of the status for reproducible live-build ISO 
images [1].


Single line summary: 79.5% reproducible live images (yup, lower than 
last time; see below for the calculation)


Reproducible status:
* All major desktops build reproducibly with bullseye, bookworm, trixie ...
** ... provided they are built for a second time within the same DAK run 
(i.e. 6 hours)
* All major desktops built reproducibly for the official Debian live 
images for bookworm (12.5.0) at any later moment ...
** ... except for KDE, which has only 1 issue left in 12.5.0 (fix is 
prepared for 12.6.0 [2])

* For sid the images cannot be generated, ...
** ... occasionally debootstrap breaks (due to the 64-bit time_t transition)
** ... currently the installer FTBFS (due to the 64-bit time_t transition)
** ... currently the installer FTBFS (due to a version mismatch of 
grub-efi-amd64-signed and grub-common)
** ... but the smallest image can be generated, however only with 
shim-support for secure UEFI boot


Functionality status:
* On sid the smallest image only has the shim boot, so you'll need to 
enroll the hash for the grubx64.efi file yourself (see openQA for the 
steps [3])
* Calamares got (temporarily) removed from trixie during the 64-bit 
time_t transition [4]


My activities in March:
* Visit to the MiniDebCamp in Hamburg [5]
** Worked with ema on arm64 native and cross-builds (MR pending)
** Worked with elbrus on stabilising a flaky test [6]
** Worked with fil on openQA tests
* Prepared a small documentation update for the live-manual [7]
* Bug report on diffoscope [8]
* Added support for shim without signed grub [9]

Work to be done:
* Currently in progress: disable apt updates when persistence is not 
used (saves bandwidth and stabilises tests)

* Currently in progress: finalise arm64 support (native and cross-build)
* Currently in progress: firmware support in live-build (it looks like 
/usr-merge affects the location of the firmware files)

* See the TODO page [10]

With kind regards,
Roland Clobus

[1] https://wiki.debian.org/ReproducibleInstalls/LiveImages
[2] https://salsa.debian.org/live-team/live-build/-/merge_requests/339
[3] https://openqa.debian.net/tests/246742#step/bootwalk_0/2
Breadcrumb: Debian Live | *_sid_smallest_build | 
walk-boot-options@uefi-secure | bootwalk_0

[4] https://bugs.debian.org/1061330
[5] https://wiki.debian.org/DebianEvents/de/2024/MiniDebCampHamburg
[6] 
https://salsa.debian.org/reproducible-builds/reproducible-website/-/commit/e9cae80b3792ff97bf79d01c506a06ab7497eab3

[7] https://salsa.debian.org/live-team/live-manual/-/merge_requests/36
[8] https://salsa.debian.org/reproducible-builds/diffoscope/-/issues/367 
and https://bugs.debian.org/1065498

[9] https://salsa.debian.org/live-team/live-build/-/merge_requests/344
[10] https://wiki.debian.org/DebianLive/TODO

79.5%: based on 4 versions x 9 variants + 8 variants; 8 FTBFS, 1 
non-reproducible


OpenPGP_signature.asc
Description: OpenPGP digital signature