unofficial mirror of guix-devel@gnu.org 
 help / color / mirror / code / Atom feed
* Re: 02/05: gnu: nss, nss-certs: Update to 3.29.3.
       [not found] ` <20170313174040.C5C6B20CAB@vcs0.savannah.gnu.org>
@ 2017-03-14  6:24   ` Mark H Weaver
  2017-03-14  6:31     ` Mark H Weaver
  2017-03-14  9:14     ` Marius Bakke
  0 siblings, 2 replies; 12+ messages in thread
From: Mark H Weaver @ 2017-03-14  6:24 UTC (permalink / raw)
  To: Marius Bakke; +Cc: guix-devel

Hi Marius,

mbakke@fastmail.com (Marius Bakke) writes:
> mbakke pushed a commit to branch master
> in repository guix.
>
> commit 4f3dcdd99ba13ab3bdbf1e014afcd076cd95fac7
> Author: Marius Bakke <mbakke@fastmail.com>
> Date:   Mon Mar 13 16:53:27 2017 +0100
>
>     gnu: nss, nss-certs: Update to 3.29.3.
>     
>     * gnu/packages/gnuzilla.scm (nss): Update to 3.29.3.

Hydra has tried to build nss-3.29.3 on x86_64 twice, and the test suite
failed both times.

  https://hydra.gnu.org/build/1905330

The first time, we got this:

[  FAILED  ] 1 test, listed below:
[  FAILED  ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8, where GetParam() = ("DTLS", 770, 4, true)

and the second time, this:

[  FAILED  ] 1 test, listed below:
[  FAILED  ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0, where GetParam() = ("TLS", 770)

This is the first time I've ever seen NSS fail to build on x86_64.  It's
quite serious since it means around 230 dependency failures, including
IceCat, GNOME and Qt/KDE.

  https://hydra.gnu.org/eval/109538#tabs-now-fail

If this problem cannot be fixed very soon, we'll need to revert this
update.  Did it build successfully on your machine?  If so, which
architecture did you test it on?

      Mark

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: 02/05: gnu: nss, nss-certs: Update to 3.29.3.
  2017-03-14  6:24   ` 02/05: gnu: nss, nss-certs: Update to 3.29.3 Mark H Weaver
@ 2017-03-14  6:31     ` Mark H Weaver
  2017-03-14  9:14     ` Marius Bakke
  1 sibling, 0 replies; 12+ messages in thread
From: Mark H Weaver @ 2017-03-14  6:31 UTC (permalink / raw)
  To: Marius Bakke; +Cc: guix-devel

I wrote:
> If this problem cannot be fixed very soon, we'll need to revert this
> update.

One more thing: If you decide to revert the nss update (commit
4f3dcdd99b), please also revert commit 87f1c7efc1 (gnu: nss: Use
'modify-phases' syntax), to save Hydra from needlessly rebuilding
several hundred packages.  These two commits should be reverted
together, and then re-applied together when the problem is ultimately
resolved.

      Thanks,
        Mark

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: 02/05: gnu: nss, nss-certs: Update to 3.29.3.
  2017-03-14  6:24   ` 02/05: gnu: nss, nss-certs: Update to 3.29.3 Mark H Weaver
  2017-03-14  6:31     ` Mark H Weaver
@ 2017-03-14  9:14     ` Marius Bakke
  2017-03-14 21:02       ` Mark H Weaver
  1 sibling, 1 reply; 12+ messages in thread
From: Marius Bakke @ 2017-03-14  9:14 UTC (permalink / raw)
  To: Mark H Weaver; +Cc: guix-devel

[-- Attachment #1: Type: text/plain, Size: 2417 bytes --]

Mark H Weaver <mhw@netris.org> writes:

> Hi Marius,
>
> mbakke@fastmail.com (Marius Bakke) writes:
>> mbakke pushed a commit to branch master
>> in repository guix.
>>
>> commit 4f3dcdd99ba13ab3bdbf1e014afcd076cd95fac7
>> Author: Marius Bakke <mbakke@fastmail.com>
>> Date:   Mon Mar 13 16:53:27 2017 +0100
>>
>>     gnu: nss, nss-certs: Update to 3.29.3.
>>     
>>     * gnu/packages/gnuzilla.scm (nss): Update to 3.29.3.
>
> Hydra has tried to build nss-3.29.3 on x86_64 twice, and the test suite
> failed both times.
>
>   https://hydra.gnu.org/build/1905330
>
> The first time, we got this:
>
> [  FAILED  ] 1 test, listed below:
> [  FAILED  ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8, where GetParam() = ("DTLS", 770, 4, true)
>
> and the second time, this:
>
> [  FAILED  ] 1 test, listed below:
> [  FAILED  ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0, where GetParam() = ("TLS", 770)
>
> This is the first time I've ever seen NSS fail to build on x86_64.  It's
> quite serious since it means around 230 dependency failures, including
> IceCat, GNOME and Qt/KDE.
>
>   https://hydra.gnu.org/eval/109538#tabs-now-fail
>
> If this problem cannot be fixed very soon, we'll need to revert this
> update.  Did it build successfully on your machine?  If so, which
> architecture did you test it on?

Hi Mark,

I have built this without trouble on two different x86_64 systems. The
release notes[0] lists a single entry[1] which looks innocuous[2], so I
doubt the failure is related to the upgrade.

I can't find the build log of the first run, but note how in the second
failure the test took more than five seconds:

[  FAILED  ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0, where GetParam() = ("TLS", 770) (5543 ms)
(from https://hydra.gnu.org/build/1905330/nixlog/6/raw )

This is reminiscent of the trouble we had getting 3.29.2 to build on
armhf[3]. Something caused the build to stall for a few seconds, which
in turn makes the test fail due to exceeding time treshold.

Can you try restarting the build once more?

0: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.29.3_release_notes
1: https://bugzilla.mozilla.org/show_bug.cgi?id=1342358
2: https://hg.mozilla.org/projects/nss/rev/4e9aee9c5343
3: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=25974#17

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 487 bytes --]

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: 02/05: gnu: nss, nss-certs: Update to 3.29.3.
  2017-03-14  9:14     ` Marius Bakke
@ 2017-03-14 21:02       ` Mark H Weaver
  2017-03-14 21:27         ` Leo Famulari
  0 siblings, 1 reply; 12+ messages in thread
From: Mark H Weaver @ 2017-03-14 21:02 UTC (permalink / raw)
  To: Marius Bakke; +Cc: guix-devel

Marius Bakke <mbakke@fastmail.com> writes:

> I have built this without trouble on two different x86_64 systems. The
> release notes[0] lists a single entry[1] which looks innocuous[2], so I
> doubt the failure is related to the upgrade.
>
> I can't find the build log of the first run,

When restarting builds on Hydra, the log for the first build attempt is
lost.  However, I'm in the habit of making private copies of these logs
before restarting jobs, so I have a copy of both.

> but note how in the second failure the test took more than five seconds:
>
> [  FAILED  ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0, where GetParam() = ("TLS", 770) (5543 ms)
> (from https://hydra.gnu.org/build/1905330/nixlog/6/raw )
>
> This is reminiscent of the trouble we had getting 3.29.2 to build on
> armhf[3]. Something caused the build to stall for a few seconds, which
> in turn makes the test fail due to exceeding time treshold.

The nss-3.29.3 build on armhf also failed:

  https://hydra.gnu.org/build/1906025

> Can you try restarting the build once more?

This is not really sustainable.  A single build attempt takes 7 hours on
armhf, and about 40 hours on mips.  When the failure occurs, it causes
hundreds of other dependency failures, which must be restarted manually,
one at a time, via the web interface.  (We have a way to restart *all*
dependency failures, but that results in a huge amount of wasted work
for Hydra).

We need test suites to be robust on heavily loaded build machines.

Is there a compelling reason not to revert this update for now?

      Mark

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: 02/05: gnu: nss, nss-certs: Update to 3.29.3.
  2017-03-14 21:02       ` Mark H Weaver
@ 2017-03-14 21:27         ` Leo Famulari
  2017-03-14 21:39           ` Marius Bakke
  0 siblings, 1 reply; 12+ messages in thread
From: Leo Famulari @ 2017-03-14 21:27 UTC (permalink / raw)
  To: Mark H Weaver; +Cc: guix-devel

[-- Attachment #1: Type: text/plain, Size: 1264 bytes --]

On Tue, Mar 14, 2017 at 05:02:12PM -0400, Mark H Weaver wrote:
> This is not really sustainable.  A single build attempt takes 7 hours on
> armhf, and about 40 hours on mips.  When the failure occurs, it causes
> hundreds of other dependency failures, which must be restarted manually,
> one at a time, via the web interface.  (We have a way to restart *all*
> dependency failures, but that results in a huge amount of wasted work
> for Hydra).
> 
> We need test suites to be robust on heavily loaded build machines.

I agree that this situation is not sustainable. If we are committed to
offering substitutes, we can't have such a critical package not building
reliably.

But, it seems unsatisfactory to not update NSS / nss-certs without
working towards a real solution.

Nss-certs provides the CA certificate store in Guix. It does get updated
along with NSS [0], although not in every NSS release.

I think we should find a way to decouple the certificate store from NSS,
since we can't build NSS reliably.

> Is there a compelling reason not to revert this update for now?

Since there were no changes to the certificates between 3.29.2 and
3.29.3, I think it's fine to revert.

[0]
https://wiki.mozilla.org/NSS:Release_Versions

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: 02/05: gnu: nss, nss-certs: Update to 3.29.3.
  2017-03-14 21:27         ` Leo Famulari
@ 2017-03-14 21:39           ` Marius Bakke
  2017-03-14 21:59             ` Leo Famulari
  0 siblings, 1 reply; 12+ messages in thread
From: Marius Bakke @ 2017-03-14 21:39 UTC (permalink / raw)
  To: Leo Famulari, Mark H Weaver; +Cc: guix-devel

[-- Attachment #1: Type: text/plain, Size: 1879 bytes --]

Leo Famulari <leo@famulari.name> writes:

> On Tue, Mar 14, 2017 at 05:02:12PM -0400, Mark H Weaver wrote:
>> This is not really sustainable.  A single build attempt takes 7 hours on
>> armhf, and about 40 hours on mips.  When the failure occurs, it causes
>> hundreds of other dependency failures, which must be restarted manually,
>> one at a time, via the web interface.  (We have a way to restart *all*
>> dependency failures, but that results in a huge amount of wasted work
>> for Hydra).
>> 
>> We need test suites to be robust on heavily loaded build machines.
>
> I agree that this situation is not sustainable. If we are committed to
> offering substitutes, we can't have such a critical package not building
> reliably.
>
> But, it seems unsatisfactory to not update NSS / nss-certs without
> working towards a real solution.
>
> Nss-certs provides the CA certificate store in Guix. It does get updated
> along with NSS [0], although not in every NSS release.
>
> I think we should find a way to decouple the certificate store from NSS,
> since we can't build NSS reliably.
>
>> Is there a compelling reason not to revert this update for now?
>
> Since there were no changes to the certificates between 3.29.2 and
> 3.29.3, I think it's fine to revert.

NSS is a crypto library in addition to a certificate store and 3.29.3
resolves a crash when TLS 1.3 is enabled. I don't know how serious this
issue is, but we should try to keep up on both packages.

Nevertheless, I've reverted the commits for now so the old substitutes
should be valid again.

Going forward, I wonder if there could be any unintended side effects by
simply increasing the timeouts in nss/gtests/ssl_gtest/tls_connect.cc
from 5000 ms to something like 20000. If a 0-day is discovered in "nss",
we don't want to wait several days to get a successful build.

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 487 bytes --]

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: 02/05: gnu: nss, nss-certs: Update to 3.29.3.
  2017-03-14 21:39           ` Marius Bakke
@ 2017-03-14 21:59             ` Leo Famulari
  2017-03-14 22:12               ` Marius Bakke
  0 siblings, 1 reply; 12+ messages in thread
From: Leo Famulari @ 2017-03-14 21:59 UTC (permalink / raw)
  To: Marius Bakke; +Cc: guix-devel

[-- Attachment #1: Type: text/plain, Size: 475 bytes --]

On Tue, Mar 14, 2017 at 10:39:48PM +0100, Marius Bakke wrote:
> Going forward, I wonder if there could be any unintended side effects by
> simply increasing the timeouts in nss/gtests/ssl_gtest/tls_connect.cc
> from 5000 ms to something like 20000. If a 0-day is discovered in "nss",
> we don't want to wait several days to get a successful build.

If these failures seem to be timeout issues, I think we should try this.
We do have other packages that make similar changes.

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: 02/05: gnu: nss, nss-certs: Update to 3.29.3.
  2017-03-14 21:59             ` Leo Famulari
@ 2017-03-14 22:12               ` Marius Bakke
  2017-03-15 13:12                 ` Marius Bakke
  0 siblings, 1 reply; 12+ messages in thread
From: Marius Bakke @ 2017-03-14 22:12 UTC (permalink / raw)
  To: Leo Famulari; +Cc: guix-devel


[-- Attachment #1.1: Type: text/plain, Size: 954 bytes --]

Leo Famulari <leo@famulari.name> writes:

> On Tue, Mar 14, 2017 at 10:39:48PM +0100, Marius Bakke wrote:
>> Going forward, I wonder if there could be any unintended side effects by
>> simply increasing the timeouts in nss/gtests/ssl_gtest/tls_connect.cc
>> from 5000 ms to something like 20000. If a 0-day is discovered in "nss",
>> we don't want to wait several days to get a successful build.
>
> If these failures seem to be timeout issues, I think we should try this.
> We do have other packages that make similar changes.

I'm currently building NSS (on x86_64) with timeouts increased from 5s
to 25s. The recent armhf test failure took 22725ms, and when we
struggled with 3.29.2 it took ~20000ms too.

Patch attached. I *think* the two values are for client and server
respectively, but will study the source and build logs some more to make
sure we're adjusting the right knobs.

I suggest we try this on 'core-updates' if the patch is correct.


[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #1.2: 0001-gnu-nss-Increase-test-timeouts.patch --]
[-- Type: text/x-patch, Size: 2940 bytes --]

From c8e0b85953133328e27f0bfcc9a9a0330e36ce5a Mon Sep 17 00:00:00 2001
From: Marius Bakke <mbakke@fastmail.com>
Date: Tue, 14 Mar 2017 22:54:41 +0100
Subject: [PATCH] gnu: nss: Increase test timeouts.

* gnu/packages/patches/nss-increase-test-timeout.patch: New file.
* gnu/local.mk (dist_patch_DATA): Add it.
* gnu/packages/gnuzilla.scm (nss)[source]: Use it.
---
 gnu/local.mk                                         |  1 +
 gnu/packages/gnuzilla.scm                            |  3 ++-
 gnu/packages/patches/nss-increase-test-timeout.patch | 20 ++++++++++++++++++++
 3 files changed, 23 insertions(+), 1 deletion(-)
 create mode 100644 gnu/packages/patches/nss-increase-test-timeout.patch

diff --git a/gnu/local.mk b/gnu/local.mk
index c1b076a5f..7fb22ebb5 100644
--- a/gnu/local.mk
+++ b/gnu/local.mk
@@ -780,6 +780,7 @@ dist_patch_DATA =						\
   %D%/packages/patches/ninja-tests.patch			\
   %D%/packages/patches/ninja-zero-mtime.patch			\
   %D%/packages/patches/node-9077.patch				\
+  %D%/packages/patches/nss-increase-test-timeout.patch		\
   %D%/packages/patches/nss-pkgconfig.patch			\
   %D%/packages/patches/ntfs-3g-CVE-2017-0358.patch		\
   %D%/packages/patches/nvi-assume-preserve-path.patch		\
diff --git a/gnu/packages/gnuzilla.scm b/gnu/packages/gnuzilla.scm
index e6e24f665..1d84e7a9a 100644
--- a/gnu/packages/gnuzilla.scm
+++ b/gnu/packages/gnuzilla.scm
@@ -199,7 +199,8 @@ in the Mozilla clients.")
                (base32
                 "149807rmzb76hnh48rw4m9jw83iw0168njzchz0hmbsgc8mk0i5w"))
               ;; Create nss.pc and nss-config.
-              (patches (search-patches "nss-pkgconfig.patch"))))
+              (patches (search-patches "nss-pkgconfig.patch"
+                                       "nss-increase-test-timeout.patch"))))
     (build-system gnu-build-system)
     (outputs '("out" "bin"))
     (arguments
diff --git a/gnu/packages/patches/nss-increase-test-timeout.patch b/gnu/packages/patches/nss-increase-test-timeout.patch
new file mode 100644
index 000000000..76d4853ba
--- /dev/null
+++ b/gnu/packages/patches/nss-increase-test-timeout.patch
@@ -0,0 +1,20 @@
+--- a/nss/gtests/ssl_gtest/tls_connect.cc	2017-03-14 22:47:30.855813629 +0100
++++ b/nss/gtests/ssl_gtest/tls_connect.cc	2017-03-14 22:48:49.042335273 +0100
+@@ -245,7 +245,7 @@
+ 
+   ASSERT_TRUE_WAIT((client_->state() != TlsAgent::STATE_CONNECTING) &&
+                        (server_->state() != TlsAgent::STATE_CONNECTING),
+-                   5000);
++                   25000);
+ }
+ 
+ void TlsConnectTestBase::EnableExtendedMasterSecret() {
+@@ -387,7 +387,7 @@
+   } else {
+     fail_agent = server_;
+   }
+-  ASSERT_TRUE_WAIT(fail_agent->state() == TlsAgent::STATE_ERROR, 5000);
++  ASSERT_TRUE_WAIT(fail_agent->state() == TlsAgent::STATE_ERROR, 25000);
+ }
+ 
+ void TlsConnectTestBase::ConfigureVersion(uint16_t version) {
-- 
2.12.0


[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 487 bytes --]

^ permalink raw reply related	[flat|nested] 12+ messages in thread

* Re: 02/05: gnu: nss, nss-certs: Update to 3.29.3.
  2017-03-14 22:12               ` Marius Bakke
@ 2017-03-15 13:12                 ` Marius Bakke
  2017-03-15 16:26                   ` Ludovic Courtès
  2017-03-15 18:42                   ` Mark H Weaver
  0 siblings, 2 replies; 12+ messages in thread
From: Marius Bakke @ 2017-03-15 13:12 UTC (permalink / raw)
  To: Leo Famulari; +Cc: guix-devel


[-- Attachment #1.1: Type: text/plain, Size: 543 bytes --]

Marius Bakke <mbakke@fastmail.com> writes:

> Patch attached. I *think* the two values are for client and server
> respectively, but will study the source and build logs some more to make
> sure we're adjusting the right knobs.
>
> I suggest we try this on 'core-updates' if the patch is correct.

The patch builds fine on x86_64, and I've verified that these are the
correct settings by decreasing the values instead of increasing.

What do you think? Should we check if 25s is high enough on
'core-updates' or push it directly to 'master'?


[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #1.2: 0001-gnu-nss-Increase-test-timeouts.patch --]
[-- Type: text/x-patch, Size: 3150 bytes --]

From 33bbf7bc60b222adc6effc7257440fd8222ef04b Mon Sep 17 00:00:00 2001
From: Marius Bakke <mbakke@fastmail.com>
Date: Tue, 14 Mar 2017 22:54:41 +0100
Subject: [PATCH] gnu: nss: Increase test timeouts.

* gnu/packages/patches/nss-increase-test-timeout.patch: New file.
* gnu/local.mk (dist_patch_DATA): Add it.
* gnu/packages/gnuzilla.scm (nss)[source]: Use it.
---
 gnu/local.mk                                       |  1 +
 gnu/packages/gnuzilla.scm                          |  3 ++-
 .../patches/nss-increase-test-timeout.patch        | 25 ++++++++++++++++++++++
 3 files changed, 28 insertions(+), 1 deletion(-)
 create mode 100644 gnu/packages/patches/nss-increase-test-timeout.patch

diff --git a/gnu/local.mk b/gnu/local.mk
index c1b076a5f..7fb22ebb5 100644
--- a/gnu/local.mk
+++ b/gnu/local.mk
@@ -780,6 +780,7 @@ dist_patch_DATA =						\
   %D%/packages/patches/ninja-tests.patch			\
   %D%/packages/patches/ninja-zero-mtime.patch			\
   %D%/packages/patches/node-9077.patch				\
+  %D%/packages/patches/nss-increase-test-timeout.patch		\
   %D%/packages/patches/nss-pkgconfig.patch			\
   %D%/packages/patches/ntfs-3g-CVE-2017-0358.patch		\
   %D%/packages/patches/nvi-assume-preserve-path.patch		\
diff --git a/gnu/packages/gnuzilla.scm b/gnu/packages/gnuzilla.scm
index e6e24f665..1d84e7a9a 100644
--- a/gnu/packages/gnuzilla.scm
+++ b/gnu/packages/gnuzilla.scm
@@ -199,7 +199,8 @@ in the Mozilla clients.")
                (base32
                 "149807rmzb76hnh48rw4m9jw83iw0168njzchz0hmbsgc8mk0i5w"))
               ;; Create nss.pc and nss-config.
-              (patches (search-patches "nss-pkgconfig.patch"))))
+              (patches (search-patches "nss-pkgconfig.patch"
+                                       "nss-increase-test-timeout.patch"))))
     (build-system gnu-build-system)
     (outputs '("out" "bin"))
     (arguments
diff --git a/gnu/packages/patches/nss-increase-test-timeout.patch b/gnu/packages/patches/nss-increase-test-timeout.patch
new file mode 100644
index 000000000..c6aac6ac0
--- /dev/null
+++ b/gnu/packages/patches/nss-increase-test-timeout.patch
@@ -0,0 +1,25 @@
+We've seen some tests take more than 20s to complete on a busy armhf
+machine. Even a busy x86_64 machine can use more than 5s on some tests.
+
+Increase timeouts to increase chances of a successful build.
+
+--- a/nss/gtests/ssl_gtest/tls_connect.cc	2017-03-14 22:47:30.855813629 +0100
++++ b/nss/gtests/ssl_gtest/tls_connect.cc	2017-03-14 22:48:49.042335273 +0100
+@@ -245,7 +245,7 @@
+ 
+   ASSERT_TRUE_WAIT((client_->state() != TlsAgent::STATE_CONNECTING) &&
+                        (server_->state() != TlsAgent::STATE_CONNECTING),
+-                   5000);
++                   25000);
+ }
+ 
+ void TlsConnectTestBase::EnableExtendedMasterSecret() {
+@@ -387,7 +387,7 @@
+   } else {
+     fail_agent = server_;
+   }
+-  ASSERT_TRUE_WAIT(fail_agent->state() == TlsAgent::STATE_ERROR, 5000);
++  ASSERT_TRUE_WAIT(fail_agent->state() == TlsAgent::STATE_ERROR, 25000);
+ }
+ 
+ void TlsConnectTestBase::ConfigureVersion(uint16_t version) {
-- 
2.12.0


[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 487 bytes --]

^ permalink raw reply related	[flat|nested] 12+ messages in thread

* Re: 02/05: gnu: nss, nss-certs: Update to 3.29.3.
  2017-03-15 13:12                 ` Marius Bakke
@ 2017-03-15 16:26                   ` Ludovic Courtès
  2017-03-15 17:04                     ` Marius Bakke
  2017-03-15 18:42                   ` Mark H Weaver
  1 sibling, 1 reply; 12+ messages in thread
From: Ludovic Courtès @ 2017-03-15 16:26 UTC (permalink / raw)
  To: Marius Bakke; +Cc: guix-devel

Marius Bakke <mbakke@fastmail.com> skribis:

> Marius Bakke <mbakke@fastmail.com> writes:
>
>> Patch attached. I *think* the two values are for client and server
>> respectively, but will study the source and build logs some more to make
>> sure we're adjusting the right knobs.
>>
>> I suggest we try this on 'core-updates' if the patch is correct.
>
> The patch builds fine on x86_64, and I've verified that these are the
> correct settings by decreasing the values instead of increasing.
>
> What do you think? Should we check if 25s is high enough on
> 'core-updates' or push it directly to 'master'?

Good catch.

It might be best to push to ‘core-updates’ to focus our build
resources.  No strong opinion though.

Thanks!

Ludo’.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: 02/05: gnu: nss, nss-certs: Update to 3.29.3.
  2017-03-15 16:26                   ` Ludovic Courtès
@ 2017-03-15 17:04                     ` Marius Bakke
  0 siblings, 0 replies; 12+ messages in thread
From: Marius Bakke @ 2017-03-15 17:04 UTC (permalink / raw)
  To: Ludovic Courtès; +Cc: guix-devel

[-- Attachment #1: Type: text/plain, Size: 844 bytes --]

Ludovic Courtès <ludo@gnu.org> writes:

> Marius Bakke <mbakke@fastmail.com> skribis:
>
>> Marius Bakke <mbakke@fastmail.com> writes:
>>
>>> Patch attached. I *think* the two values are for client and server
>>> respectively, but will study the source and build logs some more to make
>>> sure we're adjusting the right knobs.
>>>
>>> I suggest we try this on 'core-updates' if the patch is correct.
>>
>> The patch builds fine on x86_64, and I've verified that these are the
>> correct settings by decreasing the values instead of increasing.
>>
>> What do you think? Should we check if 25s is high enough on
>> 'core-updates' or push it directly to 'master'?
>
> Good catch.
>
> It might be best to push to ‘core-updates’ to focus our build
> resources.  No strong opinion though.

I pushed it to 'core-updates'.

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 487 bytes --]

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: 02/05: gnu: nss, nss-certs: Update to 3.29.3.
  2017-03-15 13:12                 ` Marius Bakke
  2017-03-15 16:26                   ` Ludovic Courtès
@ 2017-03-15 18:42                   ` Mark H Weaver
  1 sibling, 0 replies; 12+ messages in thread
From: Mark H Weaver @ 2017-03-15 18:42 UTC (permalink / raw)
  To: Marius Bakke; +Cc: guix-devel

Marius Bakke <mbakke@fastmail.com> writes:

> Marius Bakke <mbakke@fastmail.com> writes:
>
>> Patch attached. I *think* the two values are for client and server
>> respectively, but will study the source and build logs some more to make
>> sure we're adjusting the right knobs.
>>
>> I suggest we try this on 'core-updates' if the patch is correct.
>
> The patch builds fine on x86_64, and I've verified that these are the
> correct settings by decreasing the values instead of increasing.

This seems like the right approach, thanks!

> What do you think? Should we check if 25s is high enough on
> 'core-updates' or push it directly to 'master'?

I'd be okay with pushing this to master.  Thank you!

     Mark

^ permalink raw reply	[flat|nested] 12+ messages in thread

end of thread, other threads:[~2017-03-15 18:42 UTC | newest]

Thread overview: 12+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <20170313174039.25881.89989@vcs0.savannah.gnu.org>
     [not found] ` <20170313174040.C5C6B20CAB@vcs0.savannah.gnu.org>
2017-03-14  6:24   ` 02/05: gnu: nss, nss-certs: Update to 3.29.3 Mark H Weaver
2017-03-14  6:31     ` Mark H Weaver
2017-03-14  9:14     ` Marius Bakke
2017-03-14 21:02       ` Mark H Weaver
2017-03-14 21:27         ` Leo Famulari
2017-03-14 21:39           ` Marius Bakke
2017-03-14 21:59             ` Leo Famulari
2017-03-14 22:12               ` Marius Bakke
2017-03-15 13:12                 ` Marius Bakke
2017-03-15 16:26                   ` Ludovic Courtès
2017-03-15 17:04                     ` Marius Bakke
2017-03-15 18:42                   ` Mark H Weaver

Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).