all messages for Guix-related lists mirrored at yhetil.org
 help / color / mirror / code / Atom feed
* bug#20037: 'guix system reconfigure' without 'gnu/system/linux.go' fails with duplicates login pam-service
@ 2015-03-08 10:32 宋文武
  2015-03-10 17:13 ` Ludovic Courtès
  2015-04-02 15:24 ` bug#20037: problem still persist Tomáš Čech
  0 siblings, 2 replies; 5+ messages in thread
From: 宋文武 @ 2015-03-08 10:32 UTC (permalink / raw)
  To: 20037

[-- Attachment #1: Type: text/plain, Size: 2400 bytes --]

I can reproduce the issue Tomáš Čech (Sleep_Walker) reported at IRC,
but only when reconfigure under 'pre-inst-env' and without 'gnu/system/linux.go':

$ cd guix; make clean-go
# .../guix/pre-inst-env guix system reconfigure config.scm

;;; Failed to autoload make-session in (gnutls):
;;; ERROR: missing interface for module (gnutls)
;;; Failed to autoload connection-end/client in (gnutls):
;;; ERROR: missing interface for module (gnutls)
;;; Failed to autoload make-session in (gnutls):
;;; ERROR: missing interface for module (gnutls)
The following derivations will be built:
   /gnu/store/8576w1km2a8ij7k66k6n37gyhxzpxda4-system.drv
   /gnu/store/8jg5iqrd04hj1k8nx6fzcm9lz16nmk4r-grub.cfg.drv
   /gnu/store/d53lbndj9yryrzgb3p4vjlb9gyh1rri0-activate.drv
   /gnu/store/y3i8spghyv4dg8d8yl78bvkjb3xcbarb-boot.drv
   /gnu/store/mrlw80nawfbc8mhq3pz6gbxxpgjbabij-pam.d.drv
   /gnu/store/sf3n6ijagmc64ik7mn96p8c69xk30nmv-etc.drv
Backtrace:
In ice-9/boot-9.scm:
 157: 10 [catch #t #<catch-closure e365c0> ...]
In unknown file:
   ?: 9 [apply-smob/1 #<catch-closure e365c0>]
In ice-9/boot-9.scm:
  63: 8 [call-with-prompt prompt0 ...]
In ice-9/eval.scm:
 432: 7 [eval # #]
In ice-9/boot-9.scm:
2401: 6 [save-module-excursion #<procedure e53980 at ice-9/boot-9.scm:4045:3 ()>]
4050: 5 [#<procedure e53980 at ice-9/boot-9.scm:4045:3 ()>]
1724: 4 [%start-stack load-stack #<procedure e66ae0 at ice-9/boot-9.scm:4041:10 ()>]
1729: 3 [#<procedure e6af00 ()>]
In unknown file:
   ?: 2 [primitive-load "/gnu/store/dmsgr6bsp9k0x7c2dmcvhqrgrqqal7kb-pam.d-builder"]
In ice-9/boot-9.scm:
 775: 1 [for-each #<procedure eec7e0 at ice-9/eval.scm:416:20 (a)> (# # # # ...)]
In unknown file:
   ?: 0 [symlink "/gnu/store/pn2wmdczwcknksxhdn4jl6sh49h0vidm-login" ...]

ERROR: In procedure symlink:
ERROR: In procedure symlink: File exists
builder for `/gnu/store/mrlw80nawfbc8mhq3pz6gbxxpgjbabij-pam.d.drv' failed with exit code 1
cannot build derivation `/gnu/store/sf3n6ijagmc64ik7mn96p8c69xk30nmv-etc.drv': 1 dependencies couldn't be built
cannot build derivation `/gnu/store/8576w1km2a8ij7k66k6n37gyhxzpxda4-system.drv': 1 dependencies couldn't be built
killing process 2317
guix system: error: build failed: build of `/gnu/store/8576w1km2a8ij7k66k6n37gyhxzpxda4-system.drv' failed


the pam.d-builder contains duplicates login entries
(I have 3 mingetty-service)

[-- Attachment #2: dmsgr6bsp9k0x7c2dmcvhqrgrqqal7kb-pam.d-builder --]
[-- Type: application/octet-stream, Size: 1215 bytes --]

(begin (use-modules (ice-9 match)) (mkdir ((@ (guile) getenv) "out")) (for-each (match-lambda ((name file) (symlink file (string-append ((@ (guile) getenv) "out") "/" name)))) (quote (("other" "/gnu/store/cr80d2l4qq7d16f9p7w6w8ll1vfnq6w0-other") ("su" "/gnu/store/ja108kxwjxdm9nfkcpjh4d19wyfpqz6p-su") ("passwd" "/gnu/store/gc3cgf42a9zb1lwn0fgjhlba0d6jz376-passwd") ("sudo" "/gnu/store/9dl3npnipnh22ggn8dc3z3b1d9fc2gy5-sudo") ("xlock" "/gnu/store/0pmvrvhj8af5gp3jp9vyy0zqdk8lh3ki-xlock") ("xscreensaver" "/gnu/store/a0fdzjxs3fq6gghi4ig63zcy2qay2ar4-xscreensaver") ("useradd" "/gnu/store/w4v4c4ha8h6ycxh4bkyr8siqns8lnv21-useradd") ("userdel" "/gnu/store/190wssinpswngihm1hn04nkd9487y1v3-userdel") ("usermod" "/gnu/store/13lmzlq3qzx220ngawvw1gfy15nws3z0-usermod") ("groupadd" "/gnu/store/3vy2rwfajsvaipxq1zfz32krbwnskk59-groupadd") ("groupdel" "/gnu/store/dpggh2fyrfplw2hr8d3ff3808c0gbzb8-groupdel") ("groupmod" "/gnu/store/5wd5dx25xrn4n3n358ik2iqhhz1jlpv4-groupmod") ("login" "/gnu/store/pn2wmdczwcknksxhdn4jl6sh49h0vidm-login") ("login" "/gnu/store/pn2wmdczwcknksxhdn4jl6sh49h0vidm-login") ("login" "/gnu/store/pn2wmdczwcknksxhdn4jl6sh49h0vidm-login") ("slim" "/gnu/store/g3yhrx6ryvqhy292hbkfkrsd83ylclic-slim")))))

[-- Attachment #3: Type: text/plain, Size: 74 bytes --]


After add '(pretty-print services)' to 'pam-services->directory', I get:

[-- Attachment #4: x --]
[-- Type: application/octet-stream, Size: 25168 bytes --]

(#<<pam-service> name: "other" account: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>)>
 #<<pam-service> name: "su" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "passwd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "sudo" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "xlock" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "xscreensaver" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "useradd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "userdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "usermod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "groupadd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "groupdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "groupmod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 36ebd50>)>)>
 #<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 36ed210>)>)>
 #<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 36f63c0>)>)>
 #<<pam-service> name: "slim" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>)
(#<<pam-service> name: "other" account: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>)>
 #<<pam-service> name: "su" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "passwd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "sudo" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "xlock" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "xscreensaver" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "useradd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "userdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "usermod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "groupadd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "groupdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "groupmod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 3dff4b0>)>)>
 #<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 3e10ea0>)>)>
 #<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 3e15900>)>)>
 #<<pam-service> name: "slim" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>)
(#<<pam-service> name: "other" account: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>)>
 #<<pam-service> name: "su" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "passwd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "sudo" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "xlock" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "xscreensaver" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "useradd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "userdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "usermod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "groupadd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "groupdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "groupmod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) a1f6900>)>)>
 #<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) a1f9120>)>)>
 #<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) a22bae0>)>)>
 #<<pam-service> name: "slim" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>)
(#<<pam-service> name: "other" account: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>)>
 #<<pam-service> name: "su" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "passwd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "sudo" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "xlock" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "xscreensaver" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "useradd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "userdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "usermod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "groupadd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "groupdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "groupmod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
 #<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 6a1e540>)>)>
 #<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 6a25bd0>)>)>
 #<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 6a284b0>)>)>
 #<<pam-service> name: "slim" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>)

[-- Attachment #5: Type: text/plain, Size: 76 bytes --]


After 'make gnu/system/linux.go', it works with a different pam.d-builder:

[-- Attachment #6: 1g1ik6jp04x8j204482hkzvfq4dxly0h-pam.d-builder --]
[-- Type: application/octet-stream, Size: 1091 bytes --]

(begin (use-modules (ice-9 match)) (mkdir ((@ (guile) getenv) "out")) (for-each (match-lambda ((name file) (symlink file (string-append ((@ (guile) getenv) "out") "/" name)))) (quote (("other" "/gnu/store/cr80d2l4qq7d16f9p7w6w8ll1vfnq6w0-other") ("su" "/gnu/store/ja108kxwjxdm9nfkcpjh4d19wyfpqz6p-su") ("passwd" "/gnu/store/gc3cgf42a9zb1lwn0fgjhlba0d6jz376-passwd") ("sudo" "/gnu/store/9dl3npnipnh22ggn8dc3z3b1d9fc2gy5-sudo") ("xlock" "/gnu/store/0pmvrvhj8af5gp3jp9vyy0zqdk8lh3ki-xlock") ("xscreensaver" "/gnu/store/a0fdzjxs3fq6gghi4ig63zcy2qay2ar4-xscreensaver") ("useradd" "/gnu/store/w4v4c4ha8h6ycxh4bkyr8siqns8lnv21-useradd") ("userdel" "/gnu/store/190wssinpswngihm1hn04nkd9487y1v3-userdel") ("usermod" "/gnu/store/13lmzlq3qzx220ngawvw1gfy15nws3z0-usermod") ("groupadd" "/gnu/store/3vy2rwfajsvaipxq1zfz32krbwnskk59-groupadd") ("groupdel" "/gnu/store/dpggh2fyrfplw2hr8d3ff3808c0gbzb8-groupdel") ("groupmod" "/gnu/store/5wd5dx25xrn4n3n358ik2iqhhz1jlpv4-groupmod") ("login" "/gnu/store/pn2wmdczwcknksxhdn4jl6sh49h0vidm-login") ("slim" "/gnu/store/g3yhrx6ryvqhy292hbkfkrsd83ylclic-slim")))))

^ permalink raw reply	[flat|nested] 5+ messages in thread

* bug#20037: 'guix system reconfigure' without 'gnu/system/linux.go' fails with duplicates login pam-service
  2015-03-08 10:32 bug#20037: 'guix system reconfigure' without 'gnu/system/linux.go' fails with duplicates login pam-service 宋文武
@ 2015-03-10 17:13 ` Ludovic Courtès
  2015-04-02 15:24 ` bug#20037: problem still persist Tomáš Čech
  1 sibling, 0 replies; 5+ messages in thread
From: Ludovic Courtès @ 2015-03-10 17:13 UTC (permalink / raw)
  To: 宋文武; +Cc: 20037-done

宋文武 <iyzsong@gmail.com> skribis:

> I can reproduce the issue Tomáš Čech (Sleep_Walker) reported at IRC,
> but only when reconfigure under 'pre-inst-env' and without 'gnu/system/linux.go':

Thanks a lot for finding it out, it’s an interesting bug!

The problem was that ‘pam-service->directory’ would get a different list
of objects depending on whether (gnu packages linux) is evaluated or
running from bytecode: when evaluated, the list would contain duplicate
services, leading to the build error you reported, but when running from
bytecode, the list is deduplicated.

This is because (gnu system) would call ‘delete-duplicates’ on the list
of PAM services, thereby using ‘equal?’ to compare them.  But since
<pam-service> include gexps, which include closures, ‘equal?’ could
return #t when running the compiled code (because in effect the gexps in
‘unix-pam-service’ would not lead to the allocation of fresh closures at
each call, so the gexps would be ‘eq?’), whereas with the evaluated
code, it would systematically return #f (we get fresh closures at each
‘unix-pam-service’ call.)

Commit 11dddd8 fixes that.

Thanks to both of you!

Ludo’.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* bug#20037: problem still persist
  2015-03-08 10:32 bug#20037: 'guix system reconfigure' without 'gnu/system/linux.go' fails with duplicates login pam-service 宋文武
  2015-03-10 17:13 ` Ludovic Courtès
@ 2015-04-02 15:24 ` Tomáš Čech
  2015-04-05 21:05   ` Ludovic Courtès
  1 sibling, 1 reply; 5+ messages in thread
From: Tomáš Čech @ 2015-04-02 15:24 UTC (permalink / raw)
  To: 20037

[-- Attachment #1: Type: text/plain, Size: 5135 bytes --]

I'm afraid I can reproduce it.

I'm at revision bfe3c6857251c1fff24317da602b9cd762c1c112, running guix from
GIT through pre-inst-env.

I was able to remove all my local modifications so no GUIX_PACKAGE_PATH is in
place.

----------------------%<----my-config.scm----begin---->%-------------------
(use-modules (gnu))
(use-package-modules
  ;; generic guix packages modules
  admin autotools avahi base bash commencement cryptsetup curl
  emacs enlightenment gdb glib gnutls gnuzilla grub links linux lsh mail
  mc patchutils slim synergy texinfo version-control video wget wicd
  xfce xorg dwm avahi ssh xorg vpn openssl)
(use-service-modules
  avahi base dbus networking ssh xorg)

(operating-system
  (host-name "venom")
  (timezone "Europe/Prague")
  (locale "cs_CZ.utf8")
  (bootloader (grub-configuration
	      (device "/dev/sda")
	      (menu-entries
	       (list
		(menu-entry
		 (label "Gentoo")
		 (linux "/vmlinuz-gentoo")
		 (linux-arguments (list
				   "root=/dev/venom/gentoo"
				   "init=/usr/lib/systemd/systemd"))
		 (initrd "/initramfs-gentoo")
		 )))))
  (file-systems (append (list (file-system
			      (device "/dev/sda3") ; or partition label
			      (mount-point "/")
			      (type "ext4"))
;;			     (file-system
;;			      (device "/dev/venom/home")
;;			      (mount-point "/home")
;;			      (type "ext4"))
			     )
		       %base-file-systems))
  (swap-devices '("/dev/sda2"))
  (users (list (user-account
	       (name "tcech")
	       (uid 1000) (group "users")
	       (comment "Tomas Cech")
	       (password "password")
	       (home-directory "/home/tcech"))))
  (packages
   (append
    (list
     ;; absolutely necessary
     emacs lvm2 mc bash texinfo
     grub nss-mdns procps cryptsetup alsa-utils
     
     ;; networking
     iw iproute wicd links wpa-supplicant dbus
     vpnc openconnect openssl lsh
     
     ;; minimal Xorg
     slim xrandr xterm slock
     
     ;; mail
     mutt mu gnutls

     ;; web
     icecat wget curl
     
     ;; enlightenment
     terminology enlightenment

     ;; xfce
     xfce

     ;; other X stuff
     synergy
     ;; multimedia
     mplayer mplayer2 vlc
     ;; mpv
     ;; development
     git magit subversion cvs rcs quilt patchutils patch gcc-toolchain-4.9 gnu-make
     automake autoconf gdb
     strace ltrace

     ;; other
     htop
     ;; not packaged yet
     ;; isync cmus cscope ctags the-silver-searcher
     )
    %base-packages))
  (services
   (append
    (list
     (lsh-service #:port-number 22 #:root-login? #t #:initialize? #t)
     (slim-service)
     (wicd-service)
     (avahi-service)
     (dbus-service (list avahi wicd))
     (mingetty-service "ttyS0"))
    %base-services))
  )
----------------------%<----my-config.scm----end------>%-------------------

As I lost ability to boot after repartitioning so I run it from chroot from
openSUSE. Guix daemon is started from chroot.

Failure is happening with:

$ guix system reconfigure my-config.scm
substitute-binary: updating list of substitutes from 'http://hydra.gnu.org'...
The following derivations will be built:
    /gnu/store/igkyyxgpyvizzpkygji34dkyiivrbqbj-system.drv
    /gnu/store/khgv41ycwz0vg6sadgzrbrpsl93mii5c-grub.cfg.drv
    /gnu/store/j1s6vh555l6bjmf343wf9f1iyzdzwnv8-activate.drv
    /gnu/store/mx0rmnfqi998lpdv8iaywj66wdjnhmsy-boot.drv
    /gnu/store/wnj7qwhn1i7akk6crkg6s0diksi3lhyr-pam.d.drv
    /gnu/store/7dm59cc020dfma43b24pilrp98zgsbs8-etc.drv
Backtrace:
In ice-9/boot-9.scm:
  157: 10 [catch #t #<catch-closure 1143920> ...]
In unknown file:
    ?: 9 [apply-smob/1 #<catch-closure 1143920>]
In ice-9/boot-9.scm:
   63: 8 [call-with-prompt prompt0 ...]
In ice-9/eval.scm:
  432: 7 [eval # #]
In ice-9/boot-9.scm:
2401: 6 [save-module-excursion #<procedure 1160980 at ice-9/boot-9.scm:4045:3 ()>]
4050: 5 [#<procedure 1160980 at ice-9/boot-9.scm:4045:3 ()>]
1724: 4 [%start-stack load-stack ...]
1729: 3 [#<procedure 1176f00 ()>]
In unknown file:
    ?: 2 [primitive-load "/gnu/store/b027n4gx00y19bpyi1h5hasvnpp95ff4-pam.d-builder"]
In srfi/srfi-1.scm:
  616: 1 [for-each #<procedure 1217de0 at ice-9/eval.scm:416:20 (a)> (# # # # ...)]
In unknown file:
    ?: 0 [symlink "/gnu/store/z95z25d73kjza99s3w95lrdsiqlcdv0a-login" ...]

ERROR: In procedure symlink:
ERROR: In procedure symlink: File exists
builder for `/gnu/store/wnj7qwhn1i7akk6crkg6s0diksi3lhyr-pam.d.drv' failed with exit code 1
cannot build derivation `/gnu/store/7dm59cc020dfma43b24pilrp98zgsbs8-etc.drv': 1 dependencies couldn't be built
cannot build derivation `/gnu/store/igkyyxgpyvizzpkygji34dkyiivrbqbj-system.drv': 1 dependencies couldn't be built
killing process 7202
guix system: error: build failed: build of `/gnu/store/igkyyxgpyvizzpkygji34dkyiivrbqbj-system.drv' failed



It seems to be identical to the report. Furthermore - `make clean' in my GIT
repository is not helping so right now I'm not sure how to progress.

I'd appreciate if you have any other hints how to progress or what else to
wipe.


S_W

[-- Attachment #2: Digital signature --]
[-- Type: application/pgp-signature, Size: 181 bytes --]

^ permalink raw reply	[flat|nested] 5+ messages in thread

* bug#20037: problem still persist
  2015-04-02 15:24 ` bug#20037: problem still persist Tomáš Čech
@ 2015-04-05 21:05   ` Ludovic Courtès
  2015-04-06 21:06     ` Tomáš Čech
  0 siblings, 1 reply; 5+ messages in thread
From: Ludovic Courtès @ 2015-04-05 21:05 UTC (permalink / raw)
  To: Tomáš Čech; +Cc: 20037

Tomáš Čech <sleep_walker@gnu.org> skribis:

> I'm afraid I can reproduce it.

It’s a different problem this time.  :-)

> ----------------------%<----my-config.scm----begin---->%-------------------

[...]

>  (packages
>   (append
>    (list
>     ;; absolutely necessary
>     emacs lvm2 mc bash texinfo

(Unrelated, but I personally find it more convenient to have only core
packages in the global profile, and then have the rest in user
profiles.)


[...]

>  (services
>   (append
>    (list
>     (lsh-service #:port-number 22 #:root-login? #t #:initialize? #t)
>     (slim-service)
>     (wicd-service)
>     (avahi-service)
>     (dbus-service (list avahi wicd))
>     (mingetty-service "ttyS0"))

[...]

>    ?: 0 [symlink "/gnu/store/z95z25d73kjza99s3w95lrdsiqlcdv0a-login" ...]
>
> ERROR: In procedure symlink:
> ERROR: In procedure symlink: File exists

The culprit is the ‘mingetty-service’ call above: since it uses a #:motd
different from that used in the other ‘mingetty-service’ calls in
%base-services, the thing tries to create a different pam.d/login file
for it, but that fails because there’s already a pam.d/login file.

The workaround is to write:

    (mingetty-service "ttyS0"
                      #:motd (text-file "motd" "
This is the GNU operating system, welcome!\n\n"))

Since this is the same motd as the other mingetty services, everything
is fine.

This is of course unsatisfactory.  The more general issue is that
service procedures need to be able to share state/configuration info,
which I hope we can fix soon.

Thanks,
Ludo’.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* bug#20037: problem still persist
  2015-04-05 21:05   ` Ludovic Courtès
@ 2015-04-06 21:06     ` Tomáš Čech
  0 siblings, 0 replies; 5+ messages in thread
From: Tomáš Čech @ 2015-04-06 21:06 UTC (permalink / raw)
  To: Ludovic Courtès; +Cc: 20037

On Sun, Apr 05, 2015 at 11:05:34PM +0200, Ludovic Courtès wrote:
>Tomáš Čech <sleep_walker@gnu.org> skribis:
>
>> I'm afraid I can reproduce it.
>
>It’s a different problem this time.  :-)
>
>> ----------------------%<----my-config.scm----begin---->%-------------------
>
>[...]
>
>>  (packages
>>   (append
>>    (list
>>     ;; absolutely necessary
>>     emacs lvm2 mc bash texinfo
>
>(Unrelated, but I personally find it more convenient to have only core
>packages in the global profile, and then have the rest in user
>profiles.)

(
I do agree with you, but
    emacs - default editor and interface for Guix
    lvm2 - I need it to mount filesystems
    mc - OK, this can be ommited
    bash - regardless being BASH fan and user - this de-facto standard, my
           scripts relies on bashism for speed and cleaner code (really! :)
    texinfo - I really need to access DMD and Guix manuals to be able to use
      	     them (already happened to me when I got lost without Internet
      	     connection)
)

>
>[...]
>
>>  (services
>>   (append
>>    (list
>>     (lsh-service #:port-number 22 #:root-login? #t #:initialize? #t)
>>     (slim-service)
>>     (wicd-service)
>>     (avahi-service)
>>     (dbus-service (list avahi wicd))
>>     (mingetty-service "ttyS0"))
>
>[...]
>
>>    ?: 0 [symlink "/gnu/store/z95z25d73kjza99s3w95lrdsiqlcdv0a-login" ...]
>>
>> ERROR: In procedure symlink:
>> ERROR: In procedure symlink: File exists
>
>The culprit is the ‘mingetty-service’ call above: since it uses a #:motd
>different from that used in the other ‘mingetty-service’ calls in
>%base-services, the thing tries to create a different pam.d/login file
>for it, but that fails because there’s already a pam.d/login file.
>
>The workaround is to write:
>
>    (mingetty-service "ttyS0"
>                      #:motd (text-file "motd" "
>This is the GNU operating system, welcome!\n\n"))

FTR (in case someone will face the same problem), text-file is in (guix store)
module so you will need to add that one as well.

>Since this is the same motd as the other mingetty services, everything
>is fine.
>
>This is of course unsatisfactory.  The more general issue is that
>service procedures need to be able to share state/configuration info,
>which I hope we can fix soon.

Thanks for your analysis. I can confirm that your workaround worked and I can
use Guix once again. Sorry for not recognizing this as another issue.

Thanks,

S_W

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2015-04-06 21:07 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-03-08 10:32 bug#20037: 'guix system reconfigure' without 'gnu/system/linux.go' fails with duplicates login pam-service 宋文武
2015-03-10 17:13 ` Ludovic Courtès
2015-04-02 15:24 ` bug#20037: problem still persist Tomáš Čech
2015-04-05 21:05   ` Ludovic Courtès
2015-04-06 21:06     ` Tomáš Čech

Code repositories for project(s) associated with this external index

	https://git.savannah.gnu.org/cgit/guix.git

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.