From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp2 ([2001:41d0:8:6d80::]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) by ms0.migadu.com with LMTPS id ICDELSU1YWD85gAAgWs5BA (envelope-from ) for ; Mon, 29 Mar 2021 04:02:13 +0200 Received: from aspmx1.migadu.com ([2001:41d0:8:6d80::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp2 with LMTPS id UKqmJyU1YWCFTwAAB5/wlQ (envelope-from ) for ; Mon, 29 Mar 2021 02:02:13 +0000 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id D340523060 for ; Mon, 29 Mar 2021 04:02:12 +0200 (CEST) Received: from localhost ([::1]:59472 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1lQhEH-0002eu-Oa for larch@yhetil.org; Sun, 28 Mar 2021 22:02:09 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:56322) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1lQhE9-0002en-Ug for bug-guix@gnu.org; Sun, 28 Mar 2021 22:02:01 -0400 Received: from debbugs.gnu.org ([209.51.188.43]:35830) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1lQhE9-0005us-ND for bug-guix@gnu.org; Sun, 28 Mar 2021 22:02:01 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1lQhE9-00047H-Jy for bug-guix@gnu.org; Sun, 28 Mar 2021 22:02:01 -0400 X-Loop: help-debbugs@gnu.org Subject: bug#47442: guix system delete-generations does not use bootloader configuration References: In-Reply-To: Resent-From: raid5atemyhomework Original-Sender: "Debbugs-submit" Resent-CC: bug-guix@gnu.org Resent-Date: Mon, 29 Mar 2021 02:02:01 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 47442 X-GNU-PR-Package: guix X-GNU-PR-Keywords: To: "47442@debbugs.gnu.org" <47442@debbugs.gnu.org> Received: via spool by 47442-submit@debbugs.gnu.org id=B47442.161698330115797 (code B ref 47442); Mon, 29 Mar 2021 02:02:01 +0000 Received: (at 47442) by debbugs.gnu.org; 29 Mar 2021 02:01:41 +0000 Received: from localhost ([127.0.0.1]:47376 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1lQhDp-00046j-DN for submit@debbugs.gnu.org; Sun, 28 Mar 2021 22:01:41 -0400 Received: from mail4.protonmail.ch ([185.70.40.27]:47964) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1lQhDn-00046V-8p for 47442@debbugs.gnu.org; Sun, 28 Mar 2021 22:01:40 -0400 Date: Mon, 29 Mar 2021 02:01:24 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com; s=protonmail; t=1616983292; bh=BSS2zSH736vwnKI7a+4DpUZPrBeSVSkLgY7iaPf4QHc=; h=Date:To:From:Reply-To:Subject:From; b=AVwY6Hvre5fjv/oavVFuo8/Tb/BJvgTctxqoy1jC51lo3425nzZSa9/O0Kwl8bhmB qjFyFs+fPmCigKamQyPG27RxPa6MmOTH8gX50zbR5Glk4hG+C+qYtEw7odUql5+rWd vhddgh4m/1+orbug4/MQbRkoRlBCsu3US5n3Ssvw= Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: bug-guix@gnu.org List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: bug-guix-bounces+larch=yhetil.org@gnu.org Sender: "bug-Guix" Reply-to: raid5atemyhomework X-ACL-Warn: , raid5atemyhomework From: raid5atemyhomework via Bug reports for GNU Guix X-Migadu-Flow: FLOW_IN ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1616983333; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:resent-cc: resent-from:resent-sender:resent-message-id:in-reply-to:in-reply-to: references:references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:dkim-signature; bh=BSS2zSH736vwnKI7a+4DpUZPrBeSVSkLgY7iaPf4QHc=; b=OXgh66d001ww6tGtOT7NmJWTuBsF9OuUDgDMNcsa0BJFc4VeOlJPRwdUZNcu3wobkkZUNi 4dEc+EepcvghNwpDUCJrxhlqROmMyjLYkOzqw+8f2PQs7MtFusrJnfrPfrRRL/5AvoCxHK iy2ESJp/QWA05gcT4rs91DxBR36eIcAVSZ1XNhdwh/zSAORdJaMucQBMbCdtScRJAH/Bs7 h7hHCim3Eg3I4cstZAKrBO0WhMANbu9SH7XI046pm2D+anF1L+1o8p8B7Wzwmye2kkZH77 a3yAsw/YRZ4yJ7bdCJP1pbRI0q3UYxhI0dsNAiz4Y0lBtbdj6YCFWs3F+h77Bw== ARC-Seal: i=1; s=key1; d=yhetil.org; t=1616983333; a=rsa-sha256; cv=none; b=i9sI6pe1QBIIIqP5Zktyk9S/U7VE2QX60txZBEI6h9W7Pvl/EwFmQWtwjkFTwNYE97JpP+ g10xbUThqn/me2HhHuJjnUvTZLR3gZebuaW2/cw4ObGtAAQe5vTXQQxB9EPPrm3LyPxHMS 2FRs+W24VOiB6EJBVfJOp5mVS4frmdrSIbgz0OxIdWJqVVyuf0fSFM+XcQoGVoP3NVODW5 ZUAMghtQYufYrJLSKOH3vWqTqVdeSNtOkTilvcK+JZzKJV3BTAZ4XyQ8T1e9+kFn1AFLKn Gt+r/lIZwlHiEVBQBfKwXcC91x26RAExLLx9Miv4p6Ma5q/mmpe/KOisxZs1Lw== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=protonmail.com header.s=protonmail header.b=AVwY6Hvr; dmarc=pass (policy=none) header.from=gnu.org; spf=pass (aspmx1.migadu.com: domain of bug-guix-bounces@gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=bug-guix-bounces@gnu.org X-Migadu-Spam-Score: -2.92 Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=protonmail.com header.s=protonmail header.b=AVwY6Hvr; dmarc=pass (policy=none) header.from=gnu.org; spf=pass (aspmx1.migadu.com: domain of bug-guix-bounces@gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=bug-guix-bounces@gnu.org X-Migadu-Queue-Id: D340523060 X-Spam-Score: -2.92 X-Migadu-Scanner: scn0.migadu.com X-TUID: RUNN0YSy54pE Note as well that keyboard layouts at Grub time are also broken by this. A= s the keyboard layout is used when accepting passphrases for cryptodisks, t= his can leave a user potentially unable to boot at all without expert GRUB = knowledge, if they selected a passphrase including characters not available= on default US keyboard. An alternative solution is to split the `grub.cfg` file into two pieces: on= e containing the bootloader configuration settings, the other containing th= e entries. Then `reinstall-bootloader` just changes the entries. On alternative bootloaders, there is usually little to no configuration. * `depthcharge` - No configuration. * `extlinux` - Only `timeout` configuration. * `u-boot` - Based on `extlinux` (so only `timeout` configuration). So a possible design would be to have a "split" generation of the configura= tion file. This affects how `bootloader-configuration-file-generator` is used, however= . This affects three points: * `gnu/machine/ssh.scm` - This is given a `bootloader-configuration` from t= he actual OS on the machine, so probably OK to use this legacy interface. * `gnu/system.scm` - Like the above, given a `bootloader-configuration` fro= m the actual OS on the machine. * `gnu/scripts/system.scm` - This is the problem point identified before. Yet another solution would be to augment `boot-parameters` with the fields = of `bootloader-configuration`, but that violates DRY --- fields added to `b= ootloader-configuration` in the future need to be added to `boot-parameters= ` as well, so I think this is undesirable. Thanks raid5atemyhomework