From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp1.migadu.com ([2001:41d0:1008:1e59::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms8.migadu.com with LMTPS id UBe1Mwcbe2Uy0gAAkFu2QA (envelope-from ) for ; Thu, 14 Dec 2023 16:11:03 +0100 Received: from aspmx1.migadu.com ([2001:41d0:303:e16b::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp1.migadu.com with LMTPS id YK/JMAcbe2WNLgAA62LTzQ (envelope-from ) for ; Thu, 14 Dec 2023 16:11:03 +0100 X-Envelope-To: larch@yhetil.org Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gmail.com header.s=20230601 header.b=m8Wx4GM7; spf=pass (aspmx1.migadu.com: domain of "guix-devel-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-devel-bounces+larch=yhetil.org@gnu.org"; dmarc=none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1702566663; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type:in-reply-to:in-reply-to: references:references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:dkim-signature; bh=O73tSB2dJQiFMAm0s2ATtipX9+vrkFH97mEfFXsmcQ4=; b=EZdE9zFqgYey4TfuD5x4R7U+y1mceKhSZ9FNEH5VH/RiSdb10np595sjQSMIG0lWZxWJW3 U/HamLC5RQMIy3f2fgkt99v4qLTvrjMWf7q267dBjXrq7vYPImgXx+5gWKZs724oug65qV pLpHqlP0kHo2mEViGCk0YaHDqq4/qMQqtfHAsXYgHqa/zMzLJbu2GE289BrUEiOZgvFi3K o9aGZfH+okwANGp8gbk45gEMon6iNKH2T37jDotMGO3wBvFQXu4d8Sy1yW9zaRNJXcDvx3 JnvVA4ZKiDEh29JsC75nonYwLgtatWhVReXFanrMXY6CWfPWuQbp7SYWOiLl8Q== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gmail.com header.s=20230601 header.b=m8Wx4GM7; spf=pass (aspmx1.migadu.com: domain of "guix-devel-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-devel-bounces+larch=yhetil.org@gnu.org"; dmarc=none ARC-Seal: i=1; s=key1; d=yhetil.org; t=1702566663; a=rsa-sha256; cv=none; b=dCeY55dHRBx8GZF/eqhdfb7/sRjbLZm3vovHMWO5Kx2TTcmECEP8XGToD57zV17C6nCA0d JyLluh2SMR/h6W9GUNTjW9xYobyJ8SRsUztLwriZCTzSRzFydx45BU9DjxuKGyU382AUJp 1EkpEJ9JuJimp8UR7PU9KfMRKYkAewWeTGfOKfdTZxw23soajL9XsJh+N1oem75AdwOjrD aPIu5wZTILeTUJhNDKuYZMq++7HkLxcwNMbkBfcyCWp8AuJt5czi1vhvHTgxtkePcXnXkY +Guy1LyccnxU7TQvYNCn780ImNskR5gHR8BAbnuce41pq2ivG2zWCqtMyVkitA== Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 79E76655F1 for ; Thu, 14 Dec 2023 16:11:03 +0100 (CET) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1rDnMA-00089k-Tp; Thu, 14 Dec 2023 10:10:34 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1rDnM6-00089X-7Q for guix-devel@gnu.org; Thu, 14 Dec 2023 10:10:30 -0500 Received: from mail-wm1-x32b.google.com ([2a00:1450:4864:20::32b]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1rDnLx-0003Vp-MN for guix-devel@gnu.org; Thu, 14 Dec 2023 10:10:29 -0500 Received: by mail-wm1-x32b.google.com with SMTP id 5b1f17b1804b1-40c29f7b068so77923225e9.0 for ; Thu, 14 Dec 2023 07:10:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1702566620; x=1703171420; darn=gnu.org; h=in-reply-to:content-disposition:mime-version:references :mail-followup-to:message-id:subject:to:from:date:sender:from:to:cc :subject:date:message-id:reply-to; bh=O73tSB2dJQiFMAm0s2ATtipX9+vrkFH97mEfFXsmcQ4=; b=m8Wx4GM7iamJ2WIKeP8n4D75CSWNje4EiArZiIS35tV3QNdh0FOje/+TIZ0V4hqNYR 7oxYaoaPBlAGY1L1tAqg7m7/jQS9EadP+mA+NXnYIjrXQdork8zHOyD5u4GjTvRfbOMn lvflrC7fNf/2M8lOAcNeNT0TWV04LJa3lFL3aFkDmoNqLUdBjbUWvBMuPC7vsPFuC8W3 RqGottwL3EXGnbicv1o/yiI1ZVSY3vorW1s/eju2CuJCR7T6bcfy4DcBMlyu2pzxCYy5 yF8NLyJZydrRK1Kx4tjcRqgzChfbo78ijG6HZANTBjpwHn9492TxUFLOsQ1Yyy+18Xf0 1qlg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702566620; x=1703171420; h=in-reply-to:content-disposition:mime-version:references :mail-followup-to:message-id:subject:to:from:date:sender :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=O73tSB2dJQiFMAm0s2ATtipX9+vrkFH97mEfFXsmcQ4=; b=EAYWX8E7ucyssNIZ6Hu2LPVb3RdrYJ+odeZiPt2EHojOqDw9zEtS0zpfDnpnel1RUo GL9cESjP24oOZGxsLupQik62uCY6PhLQxoVATw7V/zAMGYptN3MkW9oka22k/AfaOWo9 TJq+IzjvdbNzykKsaCq7KxTXv4AQCk7NkW+sJLDvVqZ4Nsx/80Cu4/Me3mgU74p/w3/d rw1YvUArxU/2HHpe70+Ohpq6+Z+NutfxILJw8NNkrgeo46kOQBdkNwxq6H4eC+KMsNqG EjIrGCR7v8UrfcoDjUX7J80c2+MXIGUWBMgmFqBJy65k1ZNOITcGWpxr0tk3JvhzkyaP fNmA== X-Gm-Message-State: AOJu0Yyxp//G6aJs5Nv923f6d0a5wemOpyrhTGZ4SOchAW2+7irTL4G5 i88xrRKJaGdy9JrNvx8skFHMn9fF5sg= X-Google-Smtp-Source: AGHT+IHbVNCX5bj7+SwqG3m821k5McIBGp5Wc5RJFfCCut9CPlvnZ7KZ6d/aXUNiAAWKBwITFyPXHg== X-Received: by 2002:a05:600c:2946:b0:40c:296e:7bfe with SMTP id n6-20020a05600c294600b0040c296e7bfemr5060596wmd.140.1702566619602; Thu, 14 Dec 2023 07:10:19 -0800 (PST) Received: from localhost ([188.120.129.233]) by smtp.gmail.com with ESMTPSA id a11-20020adfeecb000000b00333b17432c0sm16265026wrp.28.2023.12.14.07.10.17 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Dec 2023 07:10:18 -0800 (PST) Date: Thu, 14 Dec 2023 17:10:16 +0200 From: Efraim Flashner To: guix-devel@gnu.org Subject: Re: rust-team branch merged Message-ID: Mail-Followup-To: guix-devel@gnu.org References: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="jvSWemrTDBWfr9P9" Content-Disposition: inline In-Reply-To: X-PGP-Key-ID: 0x41AAE7DCCA3D8351 X-PGP-Key: https://flashner.co.il/~efraim/efraim_flashner.asc X-PGP-Fingerprint: A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351 Received-SPF: pass client-ip=2a00:1450:4864:20::32b; envelope-from=efraim.flashner@gmail.com; helo=mail-wm1-x32b.google.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.249, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: guix-devel@gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+larch=yhetil.org@gnu.org Sender: guix-devel-bounces+larch=yhetil.org@gnu.org X-Migadu-Country: US X-Migadu-Flow: FLOW_IN X-Migadu-Scanner: mx13.migadu.com X-Migadu-Spam-Score: -6.75 X-Spam-Score: -6.75 X-Migadu-Queue-Id: 79E76655F1 X-TUID: IBFvPvu7f3iA --jvSWemrTDBWfr9P9 Content-Type: multipart/mixed; boundary="rbnX9zn2eqJB6Izk" Content-Disposition: inline --rbnX9zn2eqJB6Izk Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Dec 13, 2023 at 10:34:11AM +0200, Efraim Flashner wrote: > * Compiled rust packages currently have a 'package' phase, which runs > the command used to crate a 'crate tarball', and is installed in > %output/share/cargo/registry, with unpacked sources in > %output/share/cargo/src. In theory it should be possible to use these > for local rust development. The benefits include everything that comes > with being a guix package, including pre-patched shebangs. Currently no > index file is created in $GUIX_ENVIRONMENT/share/cargo/registry/index, > which is likely necessary to actually make use of this. Additionally, I > am unsure how to use '$GUIX_ENVIRONMENT' in ~/.cargo/config so that it > is expanded and not taken as a literal string. In the Guix London meetup someone mentioned that they were interested in playing around with using Guix for rust development. I've adjusted the cargo-build-system to produce the registry index files and I added a profile hook to generate the config.json to locate the packaged crates. toml files can't process environment variables (which is probably a good thing ...) but that means its a little harder to test out. with the two patches applied create an environment with the crates you want and get the location of GUIX_ENVIRONMENT: `env | grep GUIX_ENVIRONMENT | cut -f2 -d=3D` in ~/.cargo/config: [source.crates-io] local-registry =3D '/share/cargo/registry' 'cargo build' should pull from the local crates in the GUIX_ENVIRONMENT. I'm not sure what happens if it doesn't have those crates available and would need to get them from crates.io. --=20 Efraim Flashner =D7=A8=D7=A0=D7=A9=D7=9C=D7=A4 = =D7=9D=D7=99=D7=A8=D7=A4=D7=90 GPG key =3D A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351 Confidentiality cannot be guaranteed on emails sent or received unencrypted --rbnX9zn2eqJB6Izk Content-Type: text/plain; charset=utf-8 Content-Disposition: attachment; filename="0001-build-cargo-build-system-Produce-registry-index-file.patch" Content-Transfer-Encoding: quoted-printable =46rom 84d2f06e9facec9a1646afd53adcbf2b95da4da0 Mon Sep 17 00:00:00 2001 Message-ID: <84d2f06e9facec9a1646afd53adcbf2b95da4da0.1702565894.git.efraim= @flashner.co.il> In-Reply-To: References: =46rom: Efraim Flashner Date: Thu, 14 Dec 2023 16:49:58 +0200 Subject: [PATCH 1/2] build: cargo-build-system: Produce registry index file= s. * guix/build/cargo-build-system.scm (rewrite-deps): New procedure. (package): Obtain output from 'cargo manifest' of the current package when the package will be installed. (install): Don't install cargo crates and source. (install-source): New phase. Install cargo crates. Generate cargo registry index files and install them in a known location. (%standard-phases): Add 'install-source phase after 'install. Change-Id: I6ce6c5b33fe3eb7667f86964daef798320724a25 --- guix/build/cargo-build-system.scm | 102 +++++++++++++++++++++++++----- 1 file changed, 87 insertions(+), 15 deletions(-) diff --git a/guix/build/cargo-build-system.scm b/guix/build/cargo-build-sys= tem.scm index ffb2ec898e..f1e35a5c65 100644 --- a/guix/build/cargo-build-system.scm +++ b/guix/build/cargo-build-system.scm @@ -73,6 +73,21 @@ (define (crate-src? path) " | cut -d/ -f2" " | grep -q '^Cargo.toml$'")))= )) =20 +(define (rewrite-deps cargo-deps) + (map (lambda (dependency) + `(@ ("name" . ,(assoc-ref dependency "name")) + ("req" . ,(assoc-ref dependency "req")) + ("features" . ,(assoc-ref dependency "features")) + ("optional" . ,(assoc-ref dependency "optional")) + ("default_features" . ,(assoc-ref dependency + "uses_default_features")) + ("target" . ,(assoc-ref dependency "target")) + ("kind" . ,(match (assoc-ref dependency "kind") + (null? "normal") + (kind kind))) + ("registry" . ,(assoc-ref dependency "registry")))) + cargo-deps)) + (define* (unpack-rust-crates #:key inputs vendor-dir #:allow-other-keys) (define (inputs->rust-inputs inputs) "Filter using the label part from INPUTS." @@ -271,7 +286,8 @@ (define* (package #:key install-source? (cargo-package-flags '("--no-metadata" "--no-verify")) #:allow-other-keys) - "Run 'cargo-package' for a given Cargo package." + "Run 'cargo-package' for a given Cargo package. Also generate metadata = so we can +create a package index for the crates." (if install-source? (if skip-build? (begin @@ -322,19 +338,24 @@ (define* (package #:key (delete-file-recursively dir))) (find-files "." "\\.crate$"))))) (format #t "Not installing cargo sources, skipping `cargo package`.~%"= )) - #t) + + (when install-source? + ;; First generate the metadata so we can create the index file. + ;; https://doc.rust-lang.org/cargo/commands/cargo-metadata.html#json-f= ormat + (with-output-to-file "cargo-metadata.json" + (lambda _ + (invoke "cargo" "metadata" + "--manifest-path" "Cargo.toml" + "--format-version" "1" + "--no-deps"))))) =20 (define* (install #:key - inputs outputs skip-build? - install-source? features #:allow-other-keys) "Install a given Cargo package." - (let* ((out (assoc-ref outputs "out")) - (registry (string-append out "/share/cargo/registry")) - (sources (string-append out "/share/cargo/src"))) + (let ((out (assoc-ref outputs "out"))) (mkdir-p out) =20 ;; Make cargo reuse all the artifacts we just built instead @@ -346,21 +367,71 @@ (define* (install #:key (or skip-build? (not (has-executable-target?)) (invoke "cargo" "install" "--no-track" "--path" "." "--root" out - "--features" (string-join features))) + "--features" (string-join features))))) + +(define* (install-sources #:key + name + outputs + install-source? + #:allow-other-keys) + "Install a given Cargo package." + (let* ((out (assoc-ref outputs "out")) + (registry (string-append out "/share/cargo/registry/")) + (name+ver (if (string-prefix? "rust-" name) + (string-drop name 5) + name)) + ;; Strip the version if it exists. + (pkgname (if (char-set-every + (lambda (item) + (char-set-contains? + (list->char-set (list #\- #\.) char-set:digit= ) item)) + (string->char-set + (string-drop name+ver (string-index-right name+= ver #\-)))) + (string-take name+ver (string-index-right name+ver #\= -)) + name+ver))) =20 (when install-source? ;; Install crate tarballs and unpacked sources for later use. - ;; TODO: Is there a better format/directory for these files? - (mkdir-p sources) (for-each (lambda (crate) (install-file crate registry)) (find-files "target/package" "\\.crate$")) =20 - (for-each (lambda (crate) - (invoke "tar" "xzf" crate "-C" sources)) - (find-files registry "\\.crate$"))) + (let ((path (match (string-length pkgname) + (1 "1") + (2 "2") + (3 (string-append "3/" (string-take pkgname 1))) + (else (string-append (substring pkgname 0 2) "/" + (substring pkgname 2 4))))) + (cargo-metadata (match (call-with-input-file + "cargo-metadata.json" read-json) + (('@ . alist) alist))) + (sha256sum (read-delimited + " " + (open-pipe* OPEN_READ + "sha256sum" "--" + (first (find-files registry pkgname))= )))) =20 - #t)) + ;; Now it's time to generate the actual index file: + ;; https://doc.rust-lang.org/cargo/reference/registry-index.html#j= son-schema + (call-with-output-file pkgname + (lambda (out) + (write-json + `(@ ("name" . ,(assoc-ref + (first (assoc-ref cargo-metadata "packages"= )) + "name")) + ("vers" . ,(assoc-ref + (first (assoc-ref cargo-metadata "packages"= )) + "version")) + ("deps" . ,(rewrite-deps (assoc-ref + (first (assoc-ref cargo-metadata "packages"= )) + "dependencies"))) + ("cksum" . ,sha256sum) + ("features" . ,(assoc-ref + (first (assoc-ref cargo-metadata "packa= ges")) + "features")) + ("yanked" . #f)) + out))) + (install-file pkgname (string-append registry "/index/" path)))))) =20 (define %standard-phases (modify-phases gnu:%standard-phases @@ -372,7 +443,8 @@ (define %standard-phases (add-after 'build 'package package) (add-after 'unpack 'check-for-pregenerated-files check-for-pregenerate= d-files) (add-after 'check-for-pregenerated-files 'unpack-rust-crates unpack-ru= st-crates) - (add-after 'patch-generated-file-shebangs 'patch-cargo-checksums patch= -cargo-checksums))) + (add-after 'patch-generated-file-shebangs 'patch-cargo-checksums patch= -cargo-checksums) + (add-after 'install 'install-sources install-sources))) =20 (define* (cargo-build #:key inputs (phases %standard-phases) #:allow-other-keys #:rest args) --=20 Efraim Flashner =D7=A8=D7=A0=D7=A9=D7=9C=D7=A4 = =D7=9D=D7=99=D7=A8=D7=A4=D7=90 GPG key =3D A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351 Confidentiality cannot be guaranteed on emails sent or received unencrypted --rbnX9zn2eqJB6Izk Content-Type: text/plain; charset=utf-8 Content-Disposition: attachment; filename="0002-guix-profiles-Add-cargo-registry-profile-hook.patch" Content-Transfer-Encoding: quoted-printable =46rom 1dca2772f81df7d9a66f7a97668c3f9acca141a8 Mon Sep 17 00:00:00 2001 Message-ID: <1dca2772f81df7d9a66f7a97668c3f9acca141a8.1702565894.git.efraim= @flashner.co.il> In-Reply-To: References: =46rom: Efraim Flashner Date: Thu, 14 Dec 2023 16:54:11 +0200 Subject: [PATCH 2/2] guix: profiles: Add cargo-registry profile hook. * guix/profiles.scm (cargo-registry): New profile-hook. (%default-profile-hooks): Add cargo-registry. Change-Id: I8642e116e7ff7df2ae2dde77c98d5cfeed85f99d --- guix/profiles.scm | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) diff --git a/guix/profiles.scm b/guix/profiles.scm index ce2f8337bf..129448b2b1 100644 --- a/guix/profiles.scm +++ b/guix/profiles.scm @@ -13,6 +13,7 @@ ;;; Copyright =C2=A9 2020 Danny Milosavljevic ;;; Copyright =C2=A9 2014 David Thompson ;;; Copyright =C2=A9 2022 Arun Isaac +;;; Copyright =C2=A9 2023 Efraim Flashner ;;; ;;; This file is part of GNU Guix. ;;; @@ -1193,6 +1194,29 @@ (define* (ca-certificate-bundle manifest #:optional = system) `((type . profile-hook) (hook . ca-certificate-bundle)))) =20 +(define* (cargo-registry manifest #:optional system) + (define build + (with-imported-modules '((guix build utils)) + #~(begin + (use-modules (guix build utils)) + (let ((registry (string-append #$output "/share/cargo/registry")= )) + (mkdir-p registry) + ;; https://doc.rust-lang.org/cargo/reference/registry-index.ht= ml#index-configuration + (with-output-to-file (string-append registry "/config.json") + (lambda _ + (format #t "{~@ + \"dl\": \"~a/{crate}-{version}.crate\",~@ + }~%" + registry))))))) + + (gexp->derivation "cargo-registry" build + #:system system + #:local-build? #t + #:substitutable? #f + #:properties + `((type . profile-hook) + (hook . cargo-registry)))) + (define* (emacs-subdirs manifest #:optional system) (define build (with-imported-modules (source-module-closure @@ -1932,6 +1956,7 @@ (define %default-profile-hooks fonts-dir-file ghc-package-cache-file ca-certificate-bundle + cargo-registry emacs-subdirs gdk-pixbuf-loaders-cache-file glib-schemas --=20 Efraim Flashner =D7=A8=D7=A0=D7=A9=D7=9C=D7=A4 = =D7=9D=D7=99=D7=A8=D7=A4=D7=90 GPG key =3D A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351 Confidentiality cannot be guaranteed on emails sent or received unencrypted --rbnX9zn2eqJB6Izk-- --jvSWemrTDBWfr9P9 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEoov0DD5VE3JmLRT3Qarn3Mo9g1EFAmV7GtUACgkQQarn3Mo9 g1Gakg//bAJ0UuGvkWo43GQ9p+vX/CIBrirHf0uhFsC18F66/gdA0pBoHbcQ8JkM r+ofkZUSCXrF1gL6FNKjgLFL15RKB71CTTf/DB9iZDnh2J5HiS6GZWaKpqtNUsoE KbEFf2i6voLKeAQipI706y9EXZCyW/vqjvivkl1gV99YF7AVbUzebZ1OQVn0ibgE aM53BkPxjT4k+0L8epv4FQBXdWCGu0OiUZOf8gK++Sfte4o8fFn1PAOSPnT4MNp/ 2CZXguYP2IK3wqBKs6Vxo4gYKdpO39OfDPTYmjpcu6/OjYmJWq1Kk+cMDs25Hdv1 CvblxtZpxBcbK92yQiWvtikkbP3LLbsB59qMvOO/dy7w/I+cKmIKZF6vfZlTwry7 pb5H0JTUYY5pmWErtmQT1yiwwWsdnZuq1Q/bBUBQwo1eu+TFh4I1CfGg35/uJr59 E4D0ZpVKlCQ9hpnq6U3n0mWxlVpzvK/LTRTFJoJKTTUJi2oDxFTErKfzlQjp6hen y+sSSfac9A37htTjuZqZHJEtt8Vja9IdSpWBSbbnMzjeQ+MG4QMZF2rUYbfDgFrL vFkjUOLlbkHmc+mvTCfgg7Ct5a2ishIHfCVMR6jqRX1LwOUMzXS3nlwngQM4zYe6 eG6o1KphuWD7/gPQRA+p7wSUbtAcI5YfwbHFtbOprhsCxQVrVDU= =eiOF -----END PGP SIGNATURE----- --jvSWemrTDBWfr9P9--