Commit 1bd9083e authored by Bernhard M. Wiedemann's avatar Bernhard M. Wiedemann

Use consistent openSUSE capitalization

only in the early days, the company was S.u.S.E. and then SuSE
(Software und System-Entwicklung)
parent 5264dc9d
......@@ -83,7 +83,7 @@ Patches filed in Debian:
* Daniel Kahn Gillmor:
* [#881152](https://bugs.debian.org/881152) filed against [npth](https://tracker.debian.org/pkg/npth) - build path.
Patches filed in OpenSUSE:
Patches filed in openSUSE:
* Bernhard M. Wiedemann:
* [i4l-base](https://build.opensuse.org/request/show/539442) (merged) -
......
......@@ -74,7 +74,7 @@ Patches filed in Debian:
* [#882639](https://bugs.debian.org/882639) filed against [sfepy](https://tracker.debian.org/pkg/sfepy) timestamps.
* [#882727](https://bugs.debian.org/882727) filed against [libffi-platypus-perl](https://tracker.debian.org/pkg/libffi-platypus-perl) randomness.
Patches filed in OpenSUSE:
Patches filed in openSUSE:
* Bernhard M. Wiedemann:
* [cloud-init](https://bugzilla.opensuse.org/show_bug.cgi?id=1069635) - randomness from python's `mkdtemp`
......
......@@ -57,7 +57,7 @@ Patches filed in Debian:
* [#883913](https://bugs.debian.org/883913) filed against [pylint](https://tracker.debian.org/pkg/pylint).
* [#884047](https://bugs.debian.org/884047) filed against [bibledit](https://tracker.debian.org/pkg/bibledit).
Patches filed in OpenSUSE:
Patches filed in openSUSE:
* Bernhard M. Wiedemann:
* [build-compare](https://github.com/openSUSE/build-compare/pull/19) (merged) - handle .egg as .zip
......
......@@ -130,7 +130,7 @@ We should…
- We should commit publicly to r-b efforts (on mailing lists for example)
- We should have another reproducible builds summit
- We should keep in touch and share knowledge on the solutions and tools to solve reproducibility issues
- We should invite OpenSUSE at next meeting
- We should invite openSUSE at next meeting
- We should encourage more users to reproduce builds
- We should think about multi-sigs for reprod.software
- We should encourage source code signing
......@@ -161,7 +161,7 @@ Don't forget…
--------------
- Don't forget to take a stab and try pushing patches from Debian elsewhere too
- Don't forget to invite OpenSuse and Fedora/RM people next time
- Don't forget to invite openSUSE and Fedora/RM people next time
- Don't forget to send some practical details pior to event e.g. at least be @ “x” at “y” am a week before
- Don't forget to confirm hotel sponsorship!
- Don't forget to buy stock in 3M & sharpie
......@@ -169,7 +169,7 @@ Don't forget…
- Don't forget about documenting how different projects are regarding r-b
- Don't forget we need lots of Internet
- Don't forget to invite `xorriso` upstream
- Don't forget to invite OpenSuse people next time
- Don't forget to invite openSUSE people next time
- Don't forget to invite cloud (e.g. docker, rocket) people next time
- Don't forget to solve verification of multiple identical builds by users
- Don't forget to thank Holger, Lunar, Gunner & all organizers & facilitators
......
......@@ -10,7 +10,7 @@ permalink: /events/berlin2016/RPM/
- Open build service ( [http://openbuildservice.org/](http://openbuildservice.org/) ) that runs various configuration for RPM. Vary environment / ... easy.
- Build service sign the binaries that get published to the mirror infrastructure
- Discussion point: signatures, you can copy signatures to on the newly built package to obtain the same package.
- OpenSUSE might still have MD5 in some places, Fedora has switched to SHA-256.
- openSUSE might still have MD5 in some places, Fedora has switched to SHA-256.
- for fedora "Mock" creates the environment and chroot, install build dependencies and build. So build is failing when missing dependency.
- Needs to set SOURCE_DATE_EPOCH? Timestamp will be different, but timestamp is in the spec file? A end-user might want to download a source package from anywhere.
......
......@@ -56,7 +56,7 @@ distro / project-specific pages!
* LEDE
* NetBSD
* NixOS
* openSuSe
* openSUSE
* OpenWRT: ask lynxis
* Tails: Public development list: tails-dev@boum.org
......
......@@ -9,7 +9,7 @@ permalink: /events/berlin2016/documentationIII/
### Todo
* mirror on github [https://github.com/reproducible-builds](https://github.com/reproducible-builds))
* Collecting talks on reproducible builds add to talk page (look at the tweet history)
* E.g., the recent openSuSE talk, which isn't listed yet
* E.g., the recent openSUSE talk, which isn't listed yet
* Organize talk page and add dates (organized by project and cronologically within)
* Move information of the Debian wiki to the r-b.org page
* Add more arguments to the "buy-in" page (update page using [Use cases]({{ "/events/berlin2016/usecases/" | prepend: site.baseurl }}))
......
......@@ -2324,7 +2324,7 @@ buildinfo query
- Fedora has multiple `.buildinfo` files which can be fetched by a webservice
- OpenSUSE build system has a file with list of installed packages and their version. **"buildenv"**
- openSUSE build system has a file with list of installed packages and their version. **"buildenv"**
- `.buildinfo` files are to new, so RPM build utilities doesn't create it.
......
......@@ -32,7 +32,7 @@ not match here, python recompile the file each run
PEP 552 - use source hash instead of mtime
OpenSUSE: open build service, produce "buildenv file", including hashes of build inputs
openSUSE: open build service, produce "buildenv file", including hashes of build inputs
osc - client tool to build package locally; this tool is also packaged for Debian
......@@ -40,7 +40,7 @@ build path doesn't matter, it is constant (chroot env)
interesting topic: use reprotest for rpm packages
reproducibility testing in OpenSUSE: not automatically, but there are manual results
reproducibility testing in openSUSE: not automatically, but there are manual results
further tasks:
- document current status, environment
......
......@@ -35,7 +35,7 @@ responsibly and with care for those who further receive the software.
The Reproducible Builds project is already working with [many
crucial and well-known free software projects](https://reproducible-builds.org/who/)
such as [Coreboot](https://www.coreboot.org/) (also a Conservancy project!),
OpenSUSE OpenWrt, Tails, GNU Guix, bootstrappable.org, FreeBSD, Arch Linux and
openSUSE, OpenWrt, Tails, GNU Guix, bootstrappable.org, FreeBSD, Arch Linux and
[Tor](https://www.torproject.org). In the past, the Core Infrastructure
Initiative [generously funded](https://www.coreinfrastructure.org/announcements/the-linux-foundations-core-infrastructure-initiative-renews-funding-for-reproducible-builds-project/)
work on the project but this has since ceased. The work has continued in the
......
......@@ -112,7 +112,7 @@ permalink: /funding/
now offer reproducible ISO images based heavily on our work, and
<a href="https://www.netbsd.org/">NetBSD</a>
offer a reproducible base system to complement considerable progress
from <a href="https://f-droid.org/en/">F-Droid</a>, <a href="https://www.opensuse.org/">OpenSUSE</a>
from <a href="https://f-droid.org/en/">F-Droid</a>, <a href="https://www.opensuse.org/">openSUSE</a>
and <a href="https://www.archlinux.org/">ArchLinux</a>. In addition, we are also
providing continuous reproducible builds testing for eight Linux
distributions.
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment