From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp1 ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms11 with LMTPS id 2C/WHNlNw14lBAAA0tVLHw (envelope-from ) for ; Tue, 19 May 2020 03:09:13 +0000 Received: from aspmx1.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp1 with LMTPS id gOKiGNlNw14/YAAAbx9fmQ (envelope-from ) for ; Tue, 19 May 2020 03:09:13 +0000 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 7BA3794053E for ; Tue, 19 May 2020 03:09:12 +0000 (UTC) Received: from localhost ([::1]:40680 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1jascw-0006bW-OV for larch@yhetil.org; Mon, 18 May 2020 23:09:10 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:49538) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jasco-0006bK-UP for bug-guix@gnu.org; Mon, 18 May 2020 23:09:02 -0400 Received: from debbugs.gnu.org ([209.51.188.43]:37244) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1jasco-00071s-Lp for bug-guix@gnu.org; Mon, 18 May 2020 23:09:02 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1jasco-0003K2-Hk for bug-guix@gnu.org; Mon, 18 May 2020 23:09:02 -0400 X-Loop: help-debbugs@gnu.org Subject: bug#41387: "Building from Git" on foreign distro starting with NO guix? Resent-From: Bengt Richter Original-Sender: "Debbugs-submit" Resent-CC: bug-guix@gnu.org Resent-Date: Tue, 19 May 2020 03:09:02 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: report 41387 X-GNU-PR-Package: guix X-GNU-PR-Keywords: To: 41387@debbugs.gnu.org X-Debbugs-Original-To: New-Bug Received: via spool by submit@debbugs.gnu.org id=B.158985769012691 (code B ref -1); Tue, 19 May 2020 03:09:02 +0000 Received: (at submit) by debbugs.gnu.org; 19 May 2020 03:08:10 +0000 Received: from localhost ([127.0.0.1]:48790 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1jasbt-0003IV-U8 for submit@debbugs.gnu.org; Mon, 18 May 2020 23:08:10 -0400 Received: from lists.gnu.org ([209.51.188.17]:39744) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1jasbs-0003IO-MU for submit@debbugs.gnu.org; Mon, 18 May 2020 23:08:05 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:49482) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jasbs-0006Ki-IO for bug-guix@gnu.org; Mon, 18 May 2020 23:08:04 -0400 Received: from imta-36.everyone.net ([216.200.145.36]:53756 helo=imta-38.everyone.net) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jasbq-0006vq-OI for bug-guix@gnu.org; Mon, 18 May 2020 23:08:04 -0400 Received: from pps.filterd (omta002.sj2.proofpoint.com [127.0.0.1]) by imta-38.everyone.net (8.16.0.27/8.16.0.27) with SMTP id 04J37TmG007893 for ; Mon, 18 May 2020 20:07:54 -0700 X-Eon-Originating-Account: eZH_ne-54FKWQCvD6alOGkAy5EfQ8m4kdY6hnM4bbH8 X-Eon-Dm: m0116952.ppops.net Received: by m0116952.mta.everyone.net (EON-AUTHRELAY2 - 5a81c847) id m0116952.5e67f932.7c98f7 for ; Mon, 18 May 2020 20:07:52 -0700 X-Eon-Sig: AQMHrIJew02IpipcNAIAAAAB,685a3181cdda55bbf0ea64bae1601a08 X-Eip: XG0-Tny_G-BNyZS7cs7oNgNR_Fjz5NtJTTS6XeG6q7s Date: Tue, 19 May 2020 05:07:42 +0200 From: Bengt Richter Message-ID: <20200519030742.GA16910@LionPure> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit User-Agent: Mutt/1.10.1 (2018-07-13) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216, 18.0.676 definitions=2020-05-18_11:2020-05-15, 2020-05-18 signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1034 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-2004280000 definitions=main-2005190025 Received-SPF: pass client-ip=216.200.145.36; envelope-from=bokr@oz.net; helo=imta-38.everyone.net X-detected-operating-system: by eggs.gnu.org: First seen = 2020/05/18 23:07:54 X-ACL-Warn: Detected OS = Linux 3.x [generic] X-Spam_score_int: -22 X-Spam_score: -2.3 X-Spam_bar: -- X-Spam_report: (-2.3 / 5.0 requ) BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001 autolearn=_AUTOLEARN X-Spam_action: no action X-Spam-Score: -1.1 (-) X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-Spam-Score: -2.1 (--) X-BeenThere: bug-guix@gnu.org List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: Bengt Richter Errors-To: bug-guix-bounces+larch=yhetil.org@gnu.org Sender: "bug-Guix" X-Scanner: scn0 Authentication-Results: aspmx1.migadu.com; dkim=none; dmarc=none; spf=pass (aspmx1.migadu.com: domain of bug-guix-bounces@gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=bug-guix-bounces@gnu.org X-Spam-Score: 0.49 X-TUID: RA2eISkfVogc Hi, Playing with guix-install.sh, which is binary installation, I got into reading a bit at [1], and decided I'd like to try it. [1] https://guix.gnu.org/manual/en/html_node/Building-from-Git.html#Building-from-Git Is there anyone here who has succeeded installing guix following the directions at "14.1 Building from Git" on a "foreign distro" WITH NO TRACE OF GUIX on it to start? ^^^^^^^^^^^^^^^^^^^^^ I read, --8<---------------cut here---------------start------------->8--- 14.1 Building from Git If you want to hack Guix itself, it is recommended to use the latest version from the Git repository: git clone https://git.savannah.gnu.org/git/guix.git --8<---------------cut here---------------end--------------->8--- Great, my foreign /usr/bin/git cloned that handily (that was the intent right?) Onwards, --8<---------------cut here---------------start------------->8--- How do you ensure that you obtained a genuine copy of the repository? Guix itself provides a tool to authenticate your checkout, but you must first make sure this tool is genuine in order to “bootstrap” the trust chain. To do that, run: git verify-commit `git log --format=%H build-aux/git-authenticate.scm` --8<---------------cut here---------------end--------------->8--- Guix itself? How is that meant? Really looks like my git again, albeit showing info probably from guix :) Anyway, it worked. At least I counted 19 or so repeat outputs of this: --8<---------------cut here---------------start------------->8--- gpg: Signature made Fri 27 Dec 2019 01:52:49 PM CET gpg: using RSA key 3CE464558A84FDC69DB40CFB090B11993D9AEBB5 gpg: Good signature from "Ludovic Court\u00e8s " [unknown] gpg: aka "Ludovic Court\u00e8s " [unknown] gpg: aka "Ludovic Court\u00e8s (Inria) " [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: 3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5 --8<---------------cut here---------------end--------------->8--- I don't know what in the repo was signed, but I recognize the name ;-) Ok, next step. No brick wall yet ;-) --8<---------------cut here---------------start------------->8--- >From there on, you can authenticate all the commits included in your checkout by running: make authenticate The first run takes a couple of minutes, but subsequent runs are faster. Note: You are advised to run make authenticate after every git pull invocation. This ensures you keep receiving valid changes to the repository --8<---------------cut here---------------end--------------->8--- First bump, misunderstood that it wasn't time *right now* to do "make authenticate": --8<---------------cut here---------------start------------->8--- [21:17 ~/wb/guix110git/guix]$ make authenticate make: *** No rule to make target 'authenticate'. Stop. --8<---------------cut here---------------end--------------->8--- After being distracted and feeling a bit teased reading about what I could do easily if I already had guix installed I overlooked the "(see Requirements)" and just checked on the list following. (Gettext needed unmentioned Autopoint, BTW, but NBD :) on to ./bootstrap ... mostly ok --8<---------------cut here---------------start------------->8--- If you are unable to use Guix when building Guix from a checkout, the following are the required packages in addition to those mentioned in the installation instructions (see Requirements). GNU Autoconf; GNU Automake; GNU Gettext; GNU Texinfo; Graphviz; GNU Help2man (optional). On Guix, extra dependencies can be added by instead running guix environment with --ad-hoc: guix environment guix --pure --ad-hoc help2man git strace Run ./bootstrap to generate the build system infrastructure using Autoconf and Automake. If you get an error like this one: configure.ac:46: error: possibly undefined macro: PKG_CHECK_MODULES --8<---------------cut here---------------end--------------->8--- Well, didn't get that one, but did get --8<---------------cut here---------------start------------->8--- configure.ac:23: warning: The 'AM_PROG_MKDIR_P' macro is deprecated, and its use is discouraged. configure.ac:23: You should use the Autoconf-provided 'AC_PROG_MKDIR_P' macro instead, configure.ac:23: and use '$(MKDIR_P)' instead of '$(mkdir_p)'in your Makefile.am files. --8<---------------cut here---------------end--------------->8--- and --8<---------------cut here---------------start------------->8--- Makefile.am:649: warning: AM_GNU_GETTEXT used but 'po' not in SUBDIRS --8<---------------cut here---------------end--------------->8--- So, onwards again :) --8<---------------cut here---------------start------------->8--- Then, run ./configure as usual. Make sure to pass --localstatedir=directory where directory is the localstatedir value used by your current installation (see The Store, for information about this). We recommend to use the value /var. --8<---------------cut here---------------end--------------->8--- My "current installation" ?? I don't have one yet ;-( Ok, run ./configure in any case: I decided to make a test directory for --prefix Fumbled the absolute directory, but then it ran ... --8<---------------cut here---------------start------------->8--- [~/wb/guix110git/guix]$ mkdir -p mybuild/var [~/wb/guix110git/guix]$ ./configure --prefix=./mybuild configure: error: expected an absolute directory name for --prefix: ./mybuild [~/wb/guix110git/guix]$ ./configure --prefix=$(realpath ./mybuild) checking for a BSD-compatible install... /usr/bin/install -c checking whether build environment is sane... yes ... ... checking pkg-config is at least version 0.9.0... yes configure: checking for guile 3.0 configure: checking for guile 2.2 configure: found guile 2.2 checking for guile-2.2... /usr/bin/guile-2.2 checking for Guile version >= 2.2... 2.2.4 checking for guild-2.2... /usr/bin/guild-2.2 checking for guile-config-2.2... /usr/bin/guile-config-2.2 checking for GUILE... yes checking if (gnutls) is available... no configure: error: The Guile bindings of GnuTLS are missing; please install them. --8<---------------cut here---------------end--------------->8--- Well, it was looking for guile 3.0 and my foreign distro only has 2.2.4 --8<---------------cut here---------------start------------->8--- guile (GNU Guile) 2.2.4 Packaged by Debian (2.2.4-deb+1-2) Copyright (C) 2018 Free Software Foundation, Inc. --8<---------------cut here---------------end--------------->8--- which it seemed ok with, but I don't seem to be able get my distro's GnuTLS hooked up with this installation procedure, and suspect a GnuTLS/Guile version mismatch problem or such, but then I ran out of enthusiasm :) Debian's packages on my system matching tls are: [~/bs]$ dpkg -l '*tls*' --8<---------------cut here---------------start------------->8--- Desired=Unknown/Install/Remove/Purge/Hold | Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend |/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad) ||/ Name Version Architecture Description +++-=======================-================-============-============================================================= un exim-tls (no description available) ii gnutls-bin 3.6.7-4+deb10u3 amd64 GNU TLS library - commandline utilities ii gnutls-doc 3.6.7-4+deb10u3 all GNU TLS library - documentation and examples ii libcurl3-gnutls:amd64 7.64.0-4+deb10u1 amd64 easy-to-use client-side URL transfer library (GnuTLS flavour) un libcurl4-gnutls-dev (no description available) ii libgnutls-dane0:amd64 3.6.7-4+deb10u3 amd64 GNU TLS library - DANE security support ii libgnutls30:amd64 3.6.7-4+deb10u3 amd64 GNU TLS library - main runtime library ii libneon27-gnutls:amd64 0.30.2-3 amd64 HTTP and WebDAV client library (GnuTLS enabled) ii libxmlsec1-gnutls:amd64 1.2.27-2 amd64 Gnutls engine for the XML security library un rsyslog-gnutls (no description available) --8<---------------cut here---------------end--------------->8--- I thought maybe I could cheat and find a path into the cloned repo, since all the magic has to be there somehow, but that way seems pretty kludgey. Any help past this GnuTLS obstacle is welcome! BTW, could I check out at a commit prior to the guile3 introduction so that my distro might have a matching GnuTLS for that? If so, which commit would be best? In the meanwhile, back to hacking guix-install.sh :) Thanks for reading. -- Regards, Bengt Richter