Language Selection

English French German Italian Portuguese Spanish

SUSE

MariaDB, VLC, Plopper, Apache Packages Update in Tumbleweed

Filed under
SUSE

There have been three openSUSE Tumbleweed snapshots released this week.

The snapshots brought new versions of VLC, Apache, Plopper and an update of the Linux Kernel.

Snapshot 20190824 delivered a fix that was made to the swirl option, which produced an unexpected result, with the update of ImageMagick’s 7.0.8.61 version. Improved adaptive streaming and a fix for stuttering for low framerate videos became available in VLC 3.0.8; 13 issues, including 5 buffer overflows we fixed and 11 Common Vulnerabilities and Exposures were assigned and addressed in the media player version. More than a handful of CVEs were addressed with the apache2 2.4.41 update. One of the CVEs addressed was that of a malicious client that could perform a Denial of Services attack by flooding a connection with requests and basically never reading responses on the TCP connection. The new version also improves the balancer-manager protection against XSS/XSRF attacks from trusted users. The x86 emulation library fixed a compiler warning in the 2.4 version and the X11 RandR utility updated the geometry text file configure.ac for gitlab migration with the xrandr 1.5.1 version. The snapshot is trending at a rating of 86, according to the Tumbleweed snapshot reviewer.

Read more

Finally, I Can Make Multiboot USB of openSUSE from Ubuntu

Filed under
SUSE
Ubuntu
HowTos

As you may know, my multiboot making tools were MultiSystem (since 2015), then Sundar's MultiBootUSB (2018), and recently GLIM (2019), but they all cannot work for openSUSE. Thanks to Aguslr, his program Multiboot USB (not to be confused with MultiBootUSB above) solved this problem for me! This means up to today I never managed to make openSUSE multiboot in a USB while I always managed to make other GNU/Linux distros work successfully such as Ubuntu family, Mint, Trisquel, Debian Regular, Elementary, even Fedora. In this article, I just report my success in making openSUSE Leap 15.1 multibootable USB and then installing it on a laptop. However, this article is just my report and I planned to publish tutorial on this Aguslr's Multiboot USB as soon as possible. Anyway, go ahead and happy working!

Read more

Servers: Ampere Computing, SUSE and Red Hat

Filed under
Red Hat
Server
SUSE
  • Ampere Computing Is Keeping Close Track Of The Linux Performance For Their ARM Servers

    Hardware vendor Ampere Computing with their impressive ARM servers is doing a great job on closely following their hardware's Linux performance as part of a rigorous continuous testing regiment or ensuring quality, compatibility, and stability while being fully-automated.

    Ampere Computing's Travis Lazar talked at this week's Linux Foundation events in San Diego over the importance of continuous regression testing for software and hardware development by talking about their internal workflow and software in place. Their internal system is the "Totally Automated Regression System" or TARS for short. TARS makes use of various open-source components including the Phoronix Test Suite and its vast collection of benchmarks for providing comprehensive test coverage plus Ampere's own "extensions" to the Phoronix Test Suite. TARS also incorporates the provisioning/configuration responsibilities as well as analysis of the data.

  • [SUSE] Learn how the Multimodal OS can benefit your organization.
  • From ProdOps to DevOps: Surviving and thriving

    For many of us in Production Operations (ProdOps), change is the enemy. If something changes, there is now an opportunity for things that were working just fine to experience problems. It is like a game of Jenga. When will the tower fall because a seemingly minor change unbalances the whole stack of pieces? ProdOps teams hate change so much, that countless frameworks have been invented to "manage" changes; in reality, these frameworks make the procedure for effecting a change so onerous that most people give up and accept the status quo.

    Actually, that statement is a bit unfair. These frameworks are an attempt to wrap planning and consensus around production changes, thus minimizing potential downtime caused by random or rogue changes (see Why the lone wolf mentality is a sysadmin mistake).

  • Meet Red Hat at VMworld

    As Red Hat’s Ashesh Badani said in his blog post about the reference architecture for OpenShift on VMware’s SDDC stack “… this is just the first step — Red Hat OpenShift 4 brings optimized installation capabilities to a variety of infrastructures and for this, the companies are working towards a VMware Validated Design. We are excited that VMware is working closely with Red Hat to deliver a simplified experience there in the coming months.”

Xfce, A Model GTK Based Desktop | Late Summer Blathering

Filed under
GNU
Linux
SUSE

n full disclosure, Plasma is my Desktop Environment of choice, it is very easy to customize and to make my own with very little effort. As of late, there isn’t a whole lot of customizing I do, it’s all pretty minor. A couple tweaks to the the visuals, make it dark, change some sound effects to make it more Star Trek The Next Generation, add a couple Plasmoids and set up KDE Connect. Then I am ready to go.

Since KDE 3 and later Plasma, each release adds and refines existing features, all of which seems as though they are doing so in a sustainable fashion. New releases of Plasma are always met with excitement and anticipation. I can count on new features and refinements and an overall better experience. I didn’t look anywhere else but then, Xfce wondered into my world and although slow to change has become that desktop too. Historically, Xfce has been [for me] just there, nothing particularly exciting. It has held the spot of a necessary, minimal viable desktop… but not anymore.

Read more

Xfce 4.14 Lands in Tumbleweed

Filed under
GNU
Linux
SUSE

Ahoy! openSUSE Xfce team is pleased to announce that the long awaited Xfce 4.14 has been released for Tumbleweed.

After a long development cycle (4 years!), all of the core components and applications have been ported to GTK 3.

Among the main new features and improvements, the xfwm4 window manager has finally gained support for VSync, HiDPI, hardware GLX and various compositor improvements.

You can check out the neat new features in the official Xfce 4.14 tour and the official release announcement.

Read more

Richard Brown: Changing of the Guard

Filed under
SUSE

After six years on the openSUSE Board and five as its Chairperson, I have decided to step down as Chair of the openSUSE Board effective today, August 19.

This has been a very difficult decision for me to make, with reasons that are diverse, interlinked, and personal. Some of the key factors that led me to make this step include the time required to do the job properly, and the length of time I’ve served. Five years is more than twice as long as any of my predecessors. The time required to do the role properly has increased and I now find it impossible to balance the demands of the role with the requirements of my primary role as a developer in SUSE, and with what I wish to achieve outside of work and community. As difficult as it is to step back from something I’ve enjoyed doing for so long, I am looking forward to achieving a better balance between work, community, and life in general.

Serving as member and chair of the openSUSE Board has been an absolute pleasure and highly rewarding. Meeting and communicating with members of the project as well as championing the cause of openSUSE has been a joyous part of my life that I know I will miss going forward.

openSUSE won’t get rid of me entirely. While I do intend to step back from any governance topics, I will still be working at SUSE in the Future Technology Team. Following SUSE’s Open Source policy, we do a lot in openSUSE. I am especially looking forward to being able to focus on Kubic & MicroOS much more than I have been lately.

As I’m sure it’s likely to be a question, I wish to make it crystal clear that my decision has nothing to do with the Board’s ongoing efforts to form an independent openSUSE Foundation.

The Board’s decision to form a Foundation had my complete backing as Chairperson, and will continue to have as a regular openSUSE contributor. I have absolute confidence in the openSUSE Board; Indeed, I don’t think I would be able to make this decision at this time if I wasn’t certain that I was leaving openSUSE in good hands.

On that note, SUSE has appointed Gerald Pfeifer as my replacement as Chair. Gerald is SUSE’s EMEA-based CTO, with a long history as a Tumbleweed user, an active openSUSE Member, and upstream contributor/maintainer in projects like GCC and Wine.

Read more

Kata Containers Packages are Available officially in openSUSE Tumbleweed

Filed under
SUSE

Kata Containers is an open source container runtime that is crafted to seamlessly plug into the containers ecosystem.

We are now excited to announce that the Kata Containers packages are finally available in the official openSUSE Tumbleweed repository.

It is worthwhile to spend few words explaining why this is a great news, considering the role of Kata Containers (a.k.a. Kata) in fulfilling the need for security in the containers ecosystem, and given its importance for openSUSE and Kubic.

Read more

SUSE: Uyuni, openSUSE and Tumbleweed

Filed under
SUSE
  • openSUSE News: New 4.0.2 Version of Uyuni is Released

    Contributors of Uyuni Project have released a new version of Uyuni 4.0.2, which is an open-source infrastructure management solution tailored for software-defined infrastructure.

    Uyuni, a fork of the Spacewalk project, modernizing Spacewalk with SaltStack, provides more operating systems support and better scalability capabilities. Uyuni is now the upstream for SUSE Manager.

    With this release, Uyuni provides powerful new features such as monitoring, content lifecycle management and virtual machine management.

  • openSUSE Tumbleweed ? Review of the weeks 2019/31 & 32

    As you certainly know, there are more snapshots tested than we release in the end. In the last two weeks, for example, we tested 9 snapshots. Of those, only 4 made it to the mirrors and to you ? the users. During the last two weeks, these were snapshots 0726, 0730, 0805 and 0806.

  • Communities in the distrowatch.org top 20

    Only well-funded corporate sponsored Linux distributions (Fedora, Ubuntu, OpenSUSE) have all categories checked. That doesn’t mean that anyone is getting paid. I believe this means that employees are probably the chief contributors and that means there are more people putting in resources to help.

    Some distributions are “Pat’s distribution”. Pat’s group owns it and Pat doesn’t want a steering committee or any other say in how the distro works. Though contributions by means of bug reports may be accepted.

    A few distributions “outsource” resources to other distributions. Elementary allows Stack Exchange to provide their forum. Parrot Linux refers users to the Debian wiki. Mint suggests that you put in bug reports with the upstream provider unless it is a specific Mint create application.

    There are a few Linux distributions that leave me scratching my head. How is this in the top 20 distros on distrowatch? There’s nothing here and the forum, if there is one, is nearly empty. Who uses this?

  • Vagrant Boxes with openSUSE Tumbleweed – Check it Out!

    As part of the SUSE Developer Engagement, we recently kicked off the activity to automatically produce and validate Vagrant boxes for the openSUSE Tumbleweed distribution. The creation of Vagrant boxes for SUSE Linux Enterprise Server is currently work in progress. We will update you as soon as they are available for consumption.
    But for now, we are happy to announce that the infrastructure to automatically build, version and validate Vagrant box images is ready to use – and we are already producing Vagrant boxes for libvirt and Virtualbox – for openSUSE Tumbleweed.

Servers, SUSE, Red Hat and Fedora

Filed under
GNU
Linux
Red Hat
Server
SUSE
  • My Favorite Infrastructure

    PCI policy pays a lot of attention to systems that manage sensitive cardholder data. These systems are labeled as "in scope", which means they must comply with PCI-DSS standards. This scope extends to systems that interact with these sensitive systems, and there is a strong emphasis on compartmentation—separating and isolating the systems that are in scope from the rest of the systems, so you can put tight controls on their network access, including which administrators can access them and how.

    Our architecture started with a strict separation between development and production environments. In a traditional data center, you might accomplish this by using separate physical network and server equipment (or using abstractions to virtualize the separation). In the case of cloud providers, one of the easiest, safest and most portable ways to do it is by using completely separate accounts for each environment. In this way, there's no risk that a misconfiguration would expose production to development, and it has a side benefit of making it easy to calculate how much each environment is costing you per month.

    When it came to the actual server architecture, we divided servers into individual roles and gave them generic role-based names. We then took advantage of the Virtual Private Cloud feature in Amazon Web Services to isolate each of these roles into its own subnet, so we could isolate each type of server from others and tightly control access between them.

    By default, Virtual Private Cloud servers are either in the DMZ and have public IP addresses, or they have only internal addresses. We opted to put as few servers as possible in the DMZ, so most servers in the environment only had a private IP address. We intentionally did not set up a gateway server that routed all of these servers' traffic to the internet—their isolation from the internet was a feature!

    Of course, some internal servers did need some internet access. For those servers, it was only to talk to a small number of external web services. We set up a series of HTTP proxies in the DMZ that handled different use cases and had strict whitelists in place. That way we could restrict internet access from outside the host itself to just the sites it needed, while also not having to worry about collecting lists of IP blocks for a particular service (particularly challenging these days since everyone uses cloud servers).

    [...]

    Although I covered a lot of ground in this infrastructure write-up, I still covered only a lot of the higher-level details. For instance, deploying a fault-tolerant, scalable Postgres database could be an article all by itself. I also didn't talk much about the extensive documentation I wrote that, much like my articles in Linux Journal, walks the reader through how to use all of these tools we built.

    As I mentioned at the beginning of this article, this is only an example of an infrastructure design that I found worked well for me with my constraints. Your constraints might be different and might lead to a different design. The goal here is to provide you with one successful approach, so you might be inspired to adapt it to your own needs.

  • A Blunt Reminder About Security for Embedded Computing

    The ICS Advisory (ICSA-19-211-01) released on July 30th by the Cybersecurity and Infrastructure Security Agency (CISA) is chilling to read. According to the documentation, VxWorks is “exploitable remotely” and requires “low skill level to exploit.” Elaborating further, CISA risk assessment concludes, “Successful exploitation of these vulnerabilities could allow remote code execution.”
    The potential consequences of this security breech are astounding to measure, particularly when I look back on my own personal experiences in this space, and now as an Account Executive for Embedded Systems here at SUSE.

    [...]

    At the time, VxWorks was the standard go-to OS in the majority of the embedded production platforms I worked with. It was an ideal way to replace the legacy stove-piped platforms with an Open Architecture (OA) COTS solution. In light of the recent CISA warning, however, it is concerning to know that many of those affected systems processed highly-classified intelligence data at home and abroad.

  • Red Hat Recognized as a Leader by Independent Research Firm in Infrastructure Automation Platforms Evaluation [Ed: Forrester is not “Independent Research Firm”; It’s taking bribes to lie.]
  • Why Red Hat can take over the cloud sooner than you think
  • Red Hat Enterprise Linux 7.7: Final Full Support Update
  • Transport Layer Security version 1.3 in Red Hat Enterprise Linux 8

    TLS 1.3 is the sixth iteration of the Secure Sockets Layer (SSL) protocol. Originally designed by Netscape in the mid-1990’s to serve the purposes of online shopping, it quickly became the primary security protocol of the Internet. Now not limited just to web browsing, among other things, it secures email transfers, database accesses or business to business communication.

    Because it had its roots in the early days of public cryptography, when public knowledge about securely designing cryptographic protocols was limited, the first two iterations: SSLv2 and SSLv3 are now quite thoroughly broken. The next two iterations, TLS 1.0 and TLS 1.1 depend on the security of Message Digest 5 (MD5) and Secure Hash Algorithm 1 (SHA1).

  • Cute Qt applications in Fedora Workstation

    Fedora Workstation is all about Gnome and it has been since the beginning, but that doesn’t mean we don’t care about Qt applications, the opposite is true. Many users use Qt applications, even on Gnome, mainly because many KDE/Qt applications don’t have adequate replacement written in Gtk or they are just used to them and don’t really have reason to switch to another one.

    For Qt integration, there is some sort of Gnome support in Qt itself, which includes a platform theme reading Gnome configuration, like fonts and icons. This platform theme also provides native file dialogs, but don’t expect native look of Qt applications. There used to be a gtk2 style, which used gtk calls directly to render natively looking Qt widgets, but it was moved from qtbase to qt5-styleplugins, because it cannot be used today in combination with gtk3.

    For reasons mentioned above, we have been working on a Qt style to make Qt applications look natively in Gnome. This style is named adwaita-qt and from the name you can guess that it makes Qt applications look like Gtk applications with Adwaita style. Adwaita-qt is actually not a new project, it’s been there for years and it was developed by Martin Bříza. Unfortunately, Martin left Red Hat long time ago and since then a new version of Gnome’s Adwaita was released, completely changing colors and made the Adwaita theme look more modern. Being the one who takes care of these things nowadays, I started slowly updating adwaita-qt to make it look like the current Gnome Adwaita theme and voilà, a new version was released after 3 months of intermittent work.

  • Fedora Community Blog: Friday with Infra

    Friday with Infra is a new event done by CPE (Community Platform Engineering) Team, that will help potential contributors to start working on some of the applications we maintain. During this event members of the CPE team will help you to start working on those applications and help you with any issue you may encounter. At the end of this event you should be able to maintain the application by yourself.

SUSE and IBM/Red Hat Leftovers

Filed under
Red Hat
Server
SUSE
  • No More Sleepless Nights and Long Weekends Doing Maintenance

    Datacenter maintenance – you dread it, right? Staying up all night to make sure everything runs smoothly and nothing crashes, or possibly losing an entire weekend to maintenance if something goes wrong. Managing your datacenter can be a real drag. But it doesn’t have to be that way.

    At SUSECON 2019, Raine and Stephen discussed how SUSE can help ease your pain with SUSE Manager, a little Salt and a few best practices for datacenter management and automation.

  • Fedora Has Formed A Minimization Team To Work On Shrinking Packaged Software

    The newest initiative within the Fedora camp is a "Minimization Team" seeking to reduce the size of packaged applications, run-times, and other software available on Fedora Linux.

    The hope of the Fedora Minimization Team is that they can lead to smaller containers, eliminating package dependencies where not necessary, and reducing the patching foot-print.

  • DevNation Live: Easily secure your cloud-native microservices with Keycloak

    DevNation Live tech talks are hosted by the Red Hat technologists who create our products. These sessions include real solutions and code and sample projects to help you get started. In this talk, you’ll learn about Keycloak from Sébastien Blanc, Principal Software Engineer at Red Hat.

    This tutorial will demonstrate how Keycloak can help you secure your microservices. Regardless of whether it’s a Node.js REST Endpoint, a PHP app, or a Quarkus service, Keycloak is completely agnostic of the technology being used by your services. Learn how to obtain a JWT token and how to propagate this token between your different secured services. We will also explain how to add fine-grained authorizations to these services.

Syndicate content

More in Tux Machines

10 Things To Do After Installing Ubuntu 19.10

For the record, we’ve written a list of ‘things to do after installing Ubuntu’ for the past 20 Ubuntu releases. That’s two lists a year, every year, for a decade — and each list is specifically tailored to each version of Ubuntu. Our rundown for Ubuntu 19.10? Well, it’s no exception! As always: we never suggest you do anything that would damage or harm your install. So for tips on how to butcher Eoan with beta software, unstable drivers, and deep-level config meddling, you’ll need to look elsewhere! Otherwise read on for plenty of useful pointers and pertinent advice on how to get the most from your spangly new Linux system. Let’s go! Read more

today's leftovers

  • Google Ejects Open-Source WireGuard From Android Play Store Over Donation Link In App

    Apparently Google doesn't appreciate donation links/buttons within programs found on the Google Play Store even when it's one of the main sources of revenue for open-source programs. WireGuard has been reportedly dropped over this according to WireGuard lead developer Jason Donenfeld. After waiting days for Google to review the latest version of their secure VPN tunnel application, it was approved and then removed and delisted -- including older versions of WireGuard. The reversal comes on the basis of violating their "payments policy". Of course, Google would much prefer payments be routed through them so they can take their cut...

  • [Older] Sourcehut makes BSD software better

    Every day, Sourcehut runs continuous integration for FreeBSD and OpenBSD for dozens of projects, and believe it or not, some of them don’t even use Sourcehut for distribution! Improving the BSD software ecosystem is important to us, and as such our platform is designed to embrace the environment around it, rather than building a new walled garden. This makes it easy for existing software projects to plug into our CI infastructure, and many BSD projects take advantage of this to improve their software.

    Some of this software is foundational stuff, and their improvements trickle down to the entire BSD ecosystem. Let’s highlight a few great projects that take advantage of our BSD offerings.

  • Security updates for Thursday

    Security updates have been issued by Arch Linux (sudo), Debian (libsdl1.2 and libsdl2), Mageia (e2fsprogs, kernel, libpcap and tcpdump, nmap, and sudo), openSUSE (GraphicsMagick and sudo), Oracle (java-1.8.0-openjdk, java-11-openjdk, jss, and kernel), Red Hat (java-1.8.0-openjdk and java-11-openjdk), Scientific Linux (jss), SUSE (gcc7 and libreoffice), and Ubuntu (leading to a double-free, libsdl1.2, and tiff).

  • Grasp Docker networking basics with these commands and tips

    Docker communicates over network addresses and ports. Within Docker hosts, this occurs with host or bridge networking. With host networking, the Docker host sends all communications via named pipes. This method, however, can pose a security risk, as all traffic flows across the same set of containers with no segregation. The other approach from Docker, bridge networking, provides an internal network that connects to the external one. Use the docker network ls command to see a list of available networks. This command should return results that look similar to the output in Figure 1.

OSS: Events, WordPress and Licensing

  • Director Digital Business Solutions to kick off ApacheCon Europe in Berlin

    The European Commission, a long-time user of open source software, is strengthening its relationship with the Apache Foundation. At the Hackathon in May, the Commission brought together more than 30 developers involved in six different Apache projects. Attendees came from Croatia, Ireland, Poland and Romania, and even from Russia and the United States. At the meeting, many developers met in person for the first time. The hackathon helped the project members build connections and strengthen bonds.

  • FOSSCOMM 2019 aftermath

    FOSSCOMM (Free and Open Source Software Communities Meeting) is a Greek conference aiming at free-software and open-source enthusiasts, developers, and communities. This year was held at Lamia from October 11 to October 13. It is a tradition for me to attend to this conference. Usually I have presentations and of course booths to inform the attendees about the projects I represent. This year the structure of the conference was kind of different. Usually the conference starts on Friday with "beer event". Now it started with registration and a presentation. Personally I made my plan to leave from Thessaloniki by bus. It took me about 4 hours on the road. So when I arrived, I went to my hotel and then waited for Pantelis to go to the University and setup our booths.

  • Automattic Announces Mark Davies as Chief Financial Officer

    Automattic Inc., the parent company of WordPress.com, WooCommerce, and Tumblr, among other products, has announced that Mark Davies has joined the company as Chief Financial Officer. Davies comes to Automattic from Vivint, a $1B+ annual revenue smart home technology company, where he served as chief financial officer since 2013. The news follows Automattic's recent $300 million Series D investment round from Salesforce Ventures, and its acquisition in September of the social blogging platform Tumblr.

  • Empowering Generations of Digital Natives

    Technology is changing faster each year. Digital literacy can vary between ages but there are lots of ways different generations can work together and empower each as digital citizens. No matter whether you’re a parent or caregiver, teacher or mentor, it’s hard to know the best way to teach younger generations the skills needed to be an excellent digital citizen. If you’re not confident about your own tech skills, you may wonder how you can help younger generations become savvy digital citizens. But using technology responsibly is about more than just technical skills. By collaborating across generations, you can also strengthen all your family members’ skills, and offer a shared understanding of what the internet can provide and how to use it to help your neighborhoods and wider society.

  • How to Verify Smart Contracts on Etherscan

    You have your smart contract written, tested, and deployed. However, customers aren’t willing to do business with you unless they know the contract’s source code. After all, it could be set up in a way that’s not in their interest. Thankfully, Etherscan offers a neat tool that allows you to verify smart contracts so interested parties can see the source code and verify for themselves that everything is as it should be. While the process is simple, there are intricacies that might cause problems, especially to people not very familiar with Ethereum and the Solidity programming language.

  • Ethical Open Source: Is the world ready?

    Given its incredible popularity in the marketplace, there is no question that many software developers (and their respective companies) today see great value in using software that is subject to open source licenses. Users focus on the advantages to be had by gaining access, usually at no or minimal charge, to the software’s source code and to the thriving open source community supporting such projects. Powered by a worldwide community supporting the code base, open source code is generally perceived to be more reliable, robust and flexible than so-called proprietary software, with increased transparency leading to better code stability, faster bug fixes, and more frequent updates and enhancements. Historically the question of ethics and open source software (OSS) has mainly focussed on the goal of obtaining and guaranteeing certain “software freedoms,” namely the freedom to use, study, share and modify the software (as exemplified by the Free Software Definition and copyleft licenses such as the GPL family), and to ensure that derivative works were distributed under the same license terms to end “predatory vendor lock-in.”

Programming: SystemView, JDK, VimL and Bazel

  • New SystemView Verification Tool from SEGGER is Compatible with Windows, Linux, and macOS
  • 5 steps for an easy JDK 13 install on Ubuntu
  • Basic Data Types in Python 3: Strings
  • Excellent Free Books to Learn VimL

    VimL is a powerful scripting language of the Vim editor. You can use this dynamic, imperative language to design new tools, automate tasks, and redefine existing features of Vim. At an entry level, writing VimL consists of editing the vimrc file. Users can mould Vim to their personal preferences. But the language offers so much more; writing complete plugins that transform the editor. Learning VimL also helps improve your efficiency in every day editing. VimL supports many common language features: variables, control structures, built-in functions, user-defined functions, expressions first-class strings, high-level data structures (lists and dictionaries), terminal and file I/O, regex pattern matching, exceptions, as well as an integrated debugger. Vim’s runtime features are written in VimL.

  • Google Releases Bazel 1.0 Build System With Faster Build Performance

    Bazel is Google's preferred build system used by many of their own software projects. Bazel is focused on providing automated testing and release processes while supporting "language and platform diversity" and other features catered towards their workflow. Bazel 1.0 comes at a time when many open-source projects have recently been switching to Meson+Ninja as the popular build system these days for its fast build times and great multi-platform build support. Bazel also still has to compete with the likes of CMake and many others.

  • Bazel Reaches 1.0 Milestone!

    Bazel was born of Google's own needs for highly scalable builds. When we open sourced Bazel back in 2015, we hoped that Bazel could fulfill similar needs in the software development industry. A growing list of Bazel users attests to the widespread demand for scalable, reproducible, and multi-lingual builds. Bazel helps Google be more open too: several large Google open source projects, such as Angular and TensorFlow, use Bazel. Users have reported 3x test time reductions and 10x faster build speeds after switching to Bazel.