From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp11.migadu.com ([2001:41d0:8:6d80::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms0.migadu.com with LMTPS id cDZWF0yn4GFIMgEAgWs5BA (envelope-from ) for ; Thu, 13 Jan 2022 23:27:24 +0100 Received: from aspmx1.migadu.com ([2001:41d0:8:6d80::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp11.migadu.com with LMTPS id CAmjFEyn4GF4YwEA9RJhRA (envelope-from ) for ; Thu, 13 Jan 2022 23:27:24 +0100 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id E88ED23377 for ; Thu, 13 Jan 2022 23:27:23 +0100 (CET) Received: from localhost ([::1]:34336 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1n88Z1-0008GR-1I for larch@yhetil.org; Thu, 13 Jan 2022 17:27:23 -0500 Received: from eggs.gnu.org ([209.51.188.92]:40772) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1n88Yn-0008F1-FM for guix-patches@gnu.org; Thu, 13 Jan 2022 17:27:09 -0500 Received: from debbugs.gnu.org ([209.51.188.43]:41916) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1n88Yf-0005mN-TI for guix-patches@gnu.org; Thu, 13 Jan 2022 17:27:09 -0500 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1n88Yf-0005EV-MM for guix-patches@gnu.org; Thu, 13 Jan 2022 17:27:01 -0500 X-Loop: help-debbugs@gnu.org Subject: [bug#53238] [PATCH] gnu: tree: Remove stddata feature. Resent-From: Maxim Cournoyer Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Thu, 13 Jan 2022 22:27:01 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 53238 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: Olivier Dion Cc: Tobias Geerinckx-Rice , 53238@debbugs.gnu.org Received: via spool by 53238-submit@debbugs.gnu.org id=B53238.164211279120064 (code B ref 53238); Thu, 13 Jan 2022 22:27:01 +0000 Received: (at 53238) by debbugs.gnu.org; 13 Jan 2022 22:26:31 +0000 Received: from localhost ([127.0.0.1]:34819 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1n88YB-0005DX-0g for submit@debbugs.gnu.org; Thu, 13 Jan 2022 17:26:31 -0500 Received: from mail-qv1-f42.google.com ([209.85.219.42]:37415) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1n88Y6-0005DB-O3 for 53238@debbugs.gnu.org; Thu, 13 Jan 2022 17:26:29 -0500 Received: by mail-qv1-f42.google.com with SMTP id fo11so8379943qvb.4 for <53238@debbugs.gnu.org>; Thu, 13 Jan 2022 14:26:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:references:date:in-reply-to:message-id :user-agent:mime-version; bh=+owQf6rbF8Em5c4wewuv8Ji1HUH7+LXzjgvlm51+Sb4=; b=GRiJavjYHJRGPIjwOgDz7IjzgO+yyfUiYxzjhi/R870EfCbdXvmzE6WiiyV+V/UrdZ Rd/DCA8Ed1xd/SIr1AJ38usPvMzt/Q7UbIurmFl2tqUB/mtuO8g53pMvk7KgBkqkCKYB 0SmMytgv/dyR2Vj1QsdU7yaQDMr9xJexPP5GOv+tBaBVJQCvSnu1f2Zyho3PGr1QFSnT 3drKtZhpiZBL009mX7uKFFXYCbi8stcwnbeaCIP+ljvoh9db3/qmT4QMqc91NrLXbRZk OiFRetWnpefSplZh1DRZwngr7rTCOaiH8kzZ0l3YZLRRYGGlZuh2bJsr60kb/yWeiLUT i2FA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:references:date:in-reply-to :message-id:user-agent:mime-version; bh=+owQf6rbF8Em5c4wewuv8Ji1HUH7+LXzjgvlm51+Sb4=; b=JiLsxWuRt07xVEdd20FXbfo+mPtfcHoybw0XjwhU6mF5RQdtmqR4lkAzV/911dU069 i+3XVceHFsqdf3hrcam1xx6c6Mk8heiPSrO1MD0IoWePZi+VfG4JntNfqYytkzqOq88J 48/hWtEbKZVAafOdFQ701S0Ub0gOm6zXAvwJ8URu2GG+mMx1ViegNv8Oli98e8vMy0cA 9umxahUqM2uf8XwJYNRXKyhS1/v02n4slGgSr/gUV2MId8O1It1kraD8AQAEWRdn6RvU 0FiaCYeztYccQj07tKl5XshU5BeWY/462KGJ0Yl0BIU+FkJ59gm6u8pxog8WNhT49zxJ WoIQ== X-Gm-Message-State: AOAM530cnVZyUHoaGjf/r0Hk1dLluwpHMP2m+F+SlcF/KL47btyY6+yB bo3/TaCbRAoUG0wyjoM8dq1e0SAT4uL0ug== X-Google-Smtp-Source: ABdhPJxzTwz3/u6EkMzr+LKZKlUIHuFkeEU2hX8llucfxarXN9BUiLO3P7sNVCTkgZyEE2Pqrl6Czg== X-Received: by 2002:a05:6214:2686:: with SMTP id gm6mr6125706qvb.24.1642112780897; Thu, 13 Jan 2022 14:26:20 -0800 (PST) Received: from hurd (dsl-152-155.b2b2c.ca. [66.158.152.155]) by smtp.gmail.com with ESMTPSA id x10sm2906586qtw.60.2022.01.13.14.26.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 13 Jan 2022 14:26:20 -0800 (PST) From: Maxim Cournoyer References: <87ee5bcqhy.fsf@nckx> <87ee5bwdzw.fsf@laura> Date: Thu, 13 Jan 2022 17:26:19 -0500 In-Reply-To: <87ee5bwdzw.fsf@laura> (Olivier Dion's message of "Thu, 13 Jan 2022 15:57:07 -0500") Message-ID: <87r19bxofo.fsf_-_@gmail.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux) MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="=-=-=" X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+larch=yhetil.org@gnu.org Sender: "Guix-patches" X-Migadu-Flow: FLOW_IN X-Migadu-Country: US ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1642112844; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:resent-cc:resent-from:resent-sender: resent-message-id:in-reply-to:in-reply-to:references:references: list-id:list-help:list-unsubscribe:list-subscribe:list-post: dkim-signature; bh=+owQf6rbF8Em5c4wewuv8Ji1HUH7+LXzjgvlm51+Sb4=; b=UxkabzwRDYfyGca/wfRTAwkH6P6xQ0iijQ/4V/OrJ1MK7VYJowWdJ3AOdxGrE79IVd1skp z8ZuwmEA2zCnvwTns49Qu30skCSk0OR4RveDswsWs8ZY4U920VgRswSp6Rm0qya4B3WQvq 0mcb8jZD434lTsefPv81MDabnO9Wps7LOQTKcVLFeMDuF7XkyLJLiz/DetKlX0O6d3me0S pR/670/6GdpL0FEDR/GZfbQ5n1fyr35zMOTMLkOgWCXs3nEKq2u/MHu5fRVebAf4AGyios Twvr2CEZRbw6Tp4qwak+EJ23K6sdsCv9+KL+xgIwl+Pcypug/NAI7BZUaa7bfg== ARC-Seal: i=1; s=key1; d=yhetil.org; t=1642112844; a=rsa-sha256; cv=none; b=HF9lKUnFgFIFX82Nj2QCJQd7uzP+PsxBblgdOmw+Eu8xCil9LbogvhoWKUZWynBYSPe7kq Y80dv8365qekmSr4RWuVqKqNTvwceytOx1+t/bUnTavJwGc1EanNVeK3QqAb3H9UPliNNC gT173fIZNHuXybxLFIYAWKk/eK4kZqrrkKXVZLHjKZIFwLtlH2lYcQsiMmoN5I8mOzG4sA /WmtKdm2mmMu+ztbZTu7J/k0hlguqJK+EdIoDFwisfCmx5LknOawoK34g9XgNil7tTWubL urePV0F4NB0VxJqKZ2VAE7gsR9fLHMii0aPD7xCIfDjx/j9JHpcxFhg5VWPXUg== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gmail.com header.s=20210112 header.b=GRiJavjY; dmarc=fail reason="SPF not aligned (relaxed)" header.from=gmail.com (policy=none); spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org" X-Migadu-Spam-Score: -4.12 Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gmail.com header.s=20210112 header.b=GRiJavjY; dmarc=fail reason="SPF not aligned (relaxed)" header.from=gmail.com (policy=none); spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org" X-Migadu-Queue-Id: E88ED23377 X-Spam-Score: -4.12 X-Migadu-Scanner: scn0.migadu.com X-TUID: CDDB07wocgA9 --=-=-= Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Hi, Olivier Dion writes: > On Thu, 13 Jan 2022, Tobias Geerinckx-Rice wrote: >> Olivier, >> >> Thanks again for tracking down this weird bug! >> >> Olivier Dion via Guix-patches via =E5=86=99=E9=81=93=EF=BC=9A >>> This feature breaks some UNIX utilities. Fix it by disabling=20 >>> the feature. >> >> Hm=E2=80=A6 How long would we have to carry this fork? My fear is we'd= =20 >> do so indefinitely. > > I've contacted the maintainer asking for removal of the feature in its > next release. I'm not sure if this will have some impact. Feel free to > do the same at , maybe adding more weight > in the balance would help. > >> How about creating a (possibly hidden) tree-without-stddata=20 >> package variant, to use as input to packages who currently break=20 >> with this feature enabled? That lets us refcount the need for it. > > It's more than just packages, it's also user scripts that can be broken > and believe me when I say that this is not an easy bug to track down ;-). I'm on the fence about this, it does indeed seem an undesirable change, especially since there's a --json option, but I am not the author of the 'tree' software. Attached is an alternative that adjusts password-store instead of removing this new tree "feature"... --=-=-= Content-Type: text/x-patch Content-Disposition: attachment; filename=0001-gnu-password-store-Fix-test-failure-following-tree-u.patch >From 2a30d95c46ff1eb0bdac9307c5d6bb8e460de02f Mon Sep 17 00:00:00 2001 From: Maxim Cournoyer Date: Thu, 13 Jan 2022 15:09:54 -0500 Subject: [PATCH] gnu: password-store: Fix test failure following 'tree' update. Thanks to Olivier Dion for diagnosing the source of the problem! * gnu/packages/password-utils.scm (password-store): Delete trailing #t. [phases]{adjust-for-tree-2}: New phase. --- gnu/packages/password-utils.scm | 21 +++++++++++++++++---- 1 file changed, 17 insertions(+), 4 deletions(-) diff --git a/gnu/packages/password-utils.scm b/gnu/packages/password-utils.scm index 0ff8608c9c..16d889344b 100644 --- a/gnu/packages/password-utils.scm +++ b/gnu/packages/password-utils.scm @@ -487,6 +487,21 @@ (define-public password-store (arguments '(#:phases (modify-phases %standard-phases + (add-after 'unpack 'adjust-for-tree-2 + (lambda _ + ;; XXX: tree 2.0.1 has this new "stddata pipe" that is + ;; automatically used to output in JSON if the file descriptor 3 + ;; is available. This conflicts with the test harness use of + ;; file descriptor 3, causing one of the tests to fail. + ;; Increment the file descriptors used by the harness by one to + ;; avoid the conflict. + (substitute* "tests/sharness.sh" + (("exec 4>&2 3>&1") + "exec 5>&2 4>&1") + (("exec 4>/dev/null 3>/dev/null") + "exec 5>/dev/null 4>/dev/null") + (("&4") "&5") + (("&3") "&4")))) (delete 'configure) (delete 'build) (add-before 'install 'patch-system-extension-dir @@ -500,8 +515,7 @@ (define-public password-store (string-append " SYSTEM_EXTENSION_DIR=\"" "${PASSWORD_STORE_SYSTEM_EXTENSION_DIR:-" extension-dir - "}\"\n")))) - #t)) + "}\"\n")))))) (add-before 'install 'patch-passmenu-path ;; FIXME Wayland support requires ydotool and dmenu-wl packages ;; We are ignoring part of the script that gets executed if @@ -530,8 +544,7 @@ (define-public password-store '("coreutils" "getopt" "git" "gnupg" "qrencode" "sed" "tree" "which" "wl-clipboard" "xclip")))) (wrap-program (string-append out "/bin/pass") - `("PATH" ":" prefix (,(string-join path ":")))) - #t)))) + `("PATH" ":" prefix (,(string-join path ":")))))))) #:make-flags (list "CC=gcc" (string-append "PREFIX=" %output) "WITH_ALLCOMP=yes" (string-append "BASHCOMPDIR=" -- 2.34.0 --=-=-= Content-Type: text/plain Thanks, Maxim --=-=-=--