Proposal for making Multi-Arch:same binNMU-safe

Adrian Bunk bunk at debian.org
Thu Apr 23 15:06:33 BST 2026


On Thu, Apr 23, 2026 at 03:17:46PM +0200, Johannes Schauer Marin Rodrigues wrote:
>...
> Translating the binNMU +bX suffix into X additional seconds sounds like a hack
> which shows the limitations of the current tooling and which is actually a lie
> because it would create a debian/changelog entry with a date of the past. As a
> human reader I imagine I could find it confusing to read that timestamp.
> Embedding the actual timestamp of when the binNMU was triggered sounds like
> less of a lie and more like the expected thing to happen, at least to me.
>...

I am not sure whether the debian/changelog entry needs a date in the 
past here, my understanding of the problem is that this is only about 
the timestamps of files.

>...
> Why can
> whatever tooling is used (that's not something I'm familiar with) to transform
> "wb nmu <package> . ANY" into the actual command which triggers a rebuild not
> pass a common timestamp as well? The timestamp will be chose by the part which
> processes the "wb nmu <package> . ANY" line and then make sure that on each
> architecture, sbuild is called with the same --binNMU-timestamp=XXX argument.
>...

New architectures are an interesting corner case.

  wb nmu 1 <package> . ANY . -m "Rebuild for time_t"
  # 2 years later:
  wb nmu 1 <package> . loong64 . -m "Rebuild to sync binNMU versions"

This is not a hypothetical example, the "sync binNMU versions" 
binNMUs for loong64 happened this month.

Everything discussed so far is a hack, but a simple and robust hack 
would be preferable.

Would dh_strip_nondeterminism obtaining the binNMU number (which might 
be 0) and adding it to get_non_binnmu_date_epoch() be sufficient for
making Multi-Arch:same binNMU-safe?

> Thanks!
> 
> cheers, josch

cu
Adrian



More information about the Reproducible-builds mailing list