* bug#20037: 'guix system reconfigure' without 'gnu/system/linux.go' fails with duplicates login pam-service
@ 2015-03-08 10:32 宋文武
2015-03-10 17:13 ` Ludovic Courtès
2015-04-02 15:24 ` bug#20037: problem still persist Tomáš Čech
0 siblings, 2 replies; 5+ messages in thread
From: 宋文武 @ 2015-03-08 10:32 UTC (permalink / raw)
To: 20037
[-- Attachment #1: Type: text/plain, Size: 2400 bytes --]
I can reproduce the issue Tomáš Čech (Sleep_Walker) reported at IRC,
but only when reconfigure under 'pre-inst-env' and without 'gnu/system/linux.go':
$ cd guix; make clean-go
# .../guix/pre-inst-env guix system reconfigure config.scm
;;; Failed to autoload make-session in (gnutls):
;;; ERROR: missing interface for module (gnutls)
;;; Failed to autoload connection-end/client in (gnutls):
;;; ERROR: missing interface for module (gnutls)
;;; Failed to autoload make-session in (gnutls):
;;; ERROR: missing interface for module (gnutls)
The following derivations will be built:
/gnu/store/8576w1km2a8ij7k66k6n37gyhxzpxda4-system.drv
/gnu/store/8jg5iqrd04hj1k8nx6fzcm9lz16nmk4r-grub.cfg.drv
/gnu/store/d53lbndj9yryrzgb3p4vjlb9gyh1rri0-activate.drv
/gnu/store/y3i8spghyv4dg8d8yl78bvkjb3xcbarb-boot.drv
/gnu/store/mrlw80nawfbc8mhq3pz6gbxxpgjbabij-pam.d.drv
/gnu/store/sf3n6ijagmc64ik7mn96p8c69xk30nmv-etc.drv
Backtrace:
In ice-9/boot-9.scm:
157: 10 [catch #t #<catch-closure e365c0> ...]
In unknown file:
?: 9 [apply-smob/1 #<catch-closure e365c0>]
In ice-9/boot-9.scm:
63: 8 [call-with-prompt prompt0 ...]
In ice-9/eval.scm:
432: 7 [eval # #]
In ice-9/boot-9.scm:
2401: 6 [save-module-excursion #<procedure e53980 at ice-9/boot-9.scm:4045:3 ()>]
4050: 5 [#<procedure e53980 at ice-9/boot-9.scm:4045:3 ()>]
1724: 4 [%start-stack load-stack #<procedure e66ae0 at ice-9/boot-9.scm:4041:10 ()>]
1729: 3 [#<procedure e6af00 ()>]
In unknown file:
?: 2 [primitive-load "/gnu/store/dmsgr6bsp9k0x7c2dmcvhqrgrqqal7kb-pam.d-builder"]
In ice-9/boot-9.scm:
775: 1 [for-each #<procedure eec7e0 at ice-9/eval.scm:416:20 (a)> (# # # # ...)]
In unknown file:
?: 0 [symlink "/gnu/store/pn2wmdczwcknksxhdn4jl6sh49h0vidm-login" ...]
ERROR: In procedure symlink:
ERROR: In procedure symlink: File exists
builder for `/gnu/store/mrlw80nawfbc8mhq3pz6gbxxpgjbabij-pam.d.drv' failed with exit code 1
cannot build derivation `/gnu/store/sf3n6ijagmc64ik7mn96p8c69xk30nmv-etc.drv': 1 dependencies couldn't be built
cannot build derivation `/gnu/store/8576w1km2a8ij7k66k6n37gyhxzpxda4-system.drv': 1 dependencies couldn't be built
killing process 2317
guix system: error: build failed: build of `/gnu/store/8576w1km2a8ij7k66k6n37gyhxzpxda4-system.drv' failed
the pam.d-builder contains duplicates login entries
(I have 3 mingetty-service)
[-- Attachment #2: dmsgr6bsp9k0x7c2dmcvhqrgrqqal7kb-pam.d-builder --]
[-- Type: application/octet-stream, Size: 1215 bytes --]
(begin (use-modules (ice-9 match)) (mkdir ((@ (guile) getenv) "out")) (for-each (match-lambda ((name file) (symlink file (string-append ((@ (guile) getenv) "out") "/" name)))) (quote (("other" "/gnu/store/cr80d2l4qq7d16f9p7w6w8ll1vfnq6w0-other") ("su" "/gnu/store/ja108kxwjxdm9nfkcpjh4d19wyfpqz6p-su") ("passwd" "/gnu/store/gc3cgf42a9zb1lwn0fgjhlba0d6jz376-passwd") ("sudo" "/gnu/store/9dl3npnipnh22ggn8dc3z3b1d9fc2gy5-sudo") ("xlock" "/gnu/store/0pmvrvhj8af5gp3jp9vyy0zqdk8lh3ki-xlock") ("xscreensaver" "/gnu/store/a0fdzjxs3fq6gghi4ig63zcy2qay2ar4-xscreensaver") ("useradd" "/gnu/store/w4v4c4ha8h6ycxh4bkyr8siqns8lnv21-useradd") ("userdel" "/gnu/store/190wssinpswngihm1hn04nkd9487y1v3-userdel") ("usermod" "/gnu/store/13lmzlq3qzx220ngawvw1gfy15nws3z0-usermod") ("groupadd" "/gnu/store/3vy2rwfajsvaipxq1zfz32krbwnskk59-groupadd") ("groupdel" "/gnu/store/dpggh2fyrfplw2hr8d3ff3808c0gbzb8-groupdel") ("groupmod" "/gnu/store/5wd5dx25xrn4n3n358ik2iqhhz1jlpv4-groupmod") ("login" "/gnu/store/pn2wmdczwcknksxhdn4jl6sh49h0vidm-login") ("login" "/gnu/store/pn2wmdczwcknksxhdn4jl6sh49h0vidm-login") ("login" "/gnu/store/pn2wmdczwcknksxhdn4jl6sh49h0vidm-login") ("slim" "/gnu/store/g3yhrx6ryvqhy292hbkfkrsd83ylclic-slim")))))
[-- Attachment #3: Type: text/plain, Size: 74 bytes --]
After add '(pretty-print services)' to 'pam-services->directory', I get:
[-- Attachment #4: x --]
[-- Type: application/octet-stream, Size: 25168 bytes --]
(#<<pam-service> name: "other" account: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>)>
#<<pam-service> name: "su" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "passwd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "sudo" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "xlock" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "xscreensaver" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "useradd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "userdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "usermod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "groupadd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "groupdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "groupmod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 36ebd50>)>)>
#<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 36ed210>)>)>
#<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 36f63c0>)>)>
#<<pam-service> name: "slim" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>)
(#<<pam-service> name: "other" account: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>)>
#<<pam-service> name: "su" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "passwd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "sudo" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "xlock" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "xscreensaver" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "useradd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "userdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "usermod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "groupadd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "groupdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "groupmod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 3dff4b0>)>)>
#<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 3e10ea0>)>)>
#<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 3e15900>)>)>
#<<pam-service> name: "slim" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>)
(#<<pam-service> name: "other" account: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>)>
#<<pam-service> name: "su" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "passwd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "sudo" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "xlock" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "xscreensaver" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "useradd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "userdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "usermod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "groupadd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "groupdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "groupmod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) a1f6900>)>)>
#<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) a1f9120>)>)>
#<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) a22bae0>)>)>
#<<pam-service> name: "slim" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>)
(#<<pam-service> name: "other" account: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_deny.so" arguments: ()>)>
#<<pam-service> name: "su" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "passwd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "sudo" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "xlock" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "xscreensaver" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "useradd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "userdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "usermod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "groupadd" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "groupdel" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "groupmod" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "sufficient" module: "pam_rootok.so" arguments: ()>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>
#<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 6a1e540>)>)>
#<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 6a25bd0>)>)>
#<<pam-service> name: "login" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()> #<<pam-entry> control: "optional" module: "pam_motd.so" arguments: (#<gexp (string-append "motd=" ("/gnu/store/svnsdsv082fq492p291pww7c7cv1qdms-motd")) 6a284b0>)>)>
#<<pam-service> name: "slim" account: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) auth: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ("nullok")>) password: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>) session: (#<<pam-entry> control: "required" module: "pam_unix.so" arguments: ()>)>)
[-- Attachment #5: Type: text/plain, Size: 76 bytes --]
After 'make gnu/system/linux.go', it works with a different pam.d-builder:
[-- Attachment #6: 1g1ik6jp04x8j204482hkzvfq4dxly0h-pam.d-builder --]
[-- Type: application/octet-stream, Size: 1091 bytes --]
(begin (use-modules (ice-9 match)) (mkdir ((@ (guile) getenv) "out")) (for-each (match-lambda ((name file) (symlink file (string-append ((@ (guile) getenv) "out") "/" name)))) (quote (("other" "/gnu/store/cr80d2l4qq7d16f9p7w6w8ll1vfnq6w0-other") ("su" "/gnu/store/ja108kxwjxdm9nfkcpjh4d19wyfpqz6p-su") ("passwd" "/gnu/store/gc3cgf42a9zb1lwn0fgjhlba0d6jz376-passwd") ("sudo" "/gnu/store/9dl3npnipnh22ggn8dc3z3b1d9fc2gy5-sudo") ("xlock" "/gnu/store/0pmvrvhj8af5gp3jp9vyy0zqdk8lh3ki-xlock") ("xscreensaver" "/gnu/store/a0fdzjxs3fq6gghi4ig63zcy2qay2ar4-xscreensaver") ("useradd" "/gnu/store/w4v4c4ha8h6ycxh4bkyr8siqns8lnv21-useradd") ("userdel" "/gnu/store/190wssinpswngihm1hn04nkd9487y1v3-userdel") ("usermod" "/gnu/store/13lmzlq3qzx220ngawvw1gfy15nws3z0-usermod") ("groupadd" "/gnu/store/3vy2rwfajsvaipxq1zfz32krbwnskk59-groupadd") ("groupdel" "/gnu/store/dpggh2fyrfplw2hr8d3ff3808c0gbzb8-groupdel") ("groupmod" "/gnu/store/5wd5dx25xrn4n3n358ik2iqhhz1jlpv4-groupmod") ("login" "/gnu/store/pn2wmdczwcknksxhdn4jl6sh49h0vidm-login") ("slim" "/gnu/store/g3yhrx6ryvqhy292hbkfkrsd83ylclic-slim")))))
^ permalink raw reply [flat|nested] 5+ messages in thread
* bug#20037: 'guix system reconfigure' without 'gnu/system/linux.go' fails with duplicates login pam-service
2015-03-08 10:32 bug#20037: 'guix system reconfigure' without 'gnu/system/linux.go' fails with duplicates login pam-service 宋文武
@ 2015-03-10 17:13 ` Ludovic Courtès
2015-04-02 15:24 ` bug#20037: problem still persist Tomáš Čech
1 sibling, 0 replies; 5+ messages in thread
From: Ludovic Courtès @ 2015-03-10 17:13 UTC (permalink / raw)
To: 宋文武; +Cc: 20037-done
宋文武 <iyzsong@gmail.com> skribis:
> I can reproduce the issue Tomáš Čech (Sleep_Walker) reported at IRC,
> but only when reconfigure under 'pre-inst-env' and without 'gnu/system/linux.go':
Thanks a lot for finding it out, it’s an interesting bug!
The problem was that ‘pam-service->directory’ would get a different list
of objects depending on whether (gnu packages linux) is evaluated or
running from bytecode: when evaluated, the list would contain duplicate
services, leading to the build error you reported, but when running from
bytecode, the list is deduplicated.
This is because (gnu system) would call ‘delete-duplicates’ on the list
of PAM services, thereby using ‘equal?’ to compare them. But since
<pam-service> include gexps, which include closures, ‘equal?’ could
return #t when running the compiled code (because in effect the gexps in
‘unix-pam-service’ would not lead to the allocation of fresh closures at
each call, so the gexps would be ‘eq?’), whereas with the evaluated
code, it would systematically return #f (we get fresh closures at each
‘unix-pam-service’ call.)
Commit 11dddd8 fixes that.
Thanks to both of you!
Ludo’.
^ permalink raw reply [flat|nested] 5+ messages in thread
* bug#20037: problem still persist
2015-03-08 10:32 bug#20037: 'guix system reconfigure' without 'gnu/system/linux.go' fails with duplicates login pam-service 宋文武
2015-03-10 17:13 ` Ludovic Courtès
@ 2015-04-02 15:24 ` Tomáš Čech
2015-04-05 21:05 ` Ludovic Courtès
1 sibling, 1 reply; 5+ messages in thread
From: Tomáš Čech @ 2015-04-02 15:24 UTC (permalink / raw)
To: 20037
[-- Attachment #1: Type: text/plain, Size: 5135 bytes --]
I'm afraid I can reproduce it.
I'm at revision bfe3c6857251c1fff24317da602b9cd762c1c112, running guix from
GIT through pre-inst-env.
I was able to remove all my local modifications so no GUIX_PACKAGE_PATH is in
place.
----------------------%<----my-config.scm----begin---->%-------------------
(use-modules (gnu))
(use-package-modules
;; generic guix packages modules
admin autotools avahi base bash commencement cryptsetup curl
emacs enlightenment gdb glib gnutls gnuzilla grub links linux lsh mail
mc patchutils slim synergy texinfo version-control video wget wicd
xfce xorg dwm avahi ssh xorg vpn openssl)
(use-service-modules
avahi base dbus networking ssh xorg)
(operating-system
(host-name "venom")
(timezone "Europe/Prague")
(locale "cs_CZ.utf8")
(bootloader (grub-configuration
(device "/dev/sda")
(menu-entries
(list
(menu-entry
(label "Gentoo")
(linux "/vmlinuz-gentoo")
(linux-arguments (list
"root=/dev/venom/gentoo"
"init=/usr/lib/systemd/systemd"))
(initrd "/initramfs-gentoo")
)))))
(file-systems (append (list (file-system
(device "/dev/sda3") ; or partition label
(mount-point "/")
(type "ext4"))
;; (file-system
;; (device "/dev/venom/home")
;; (mount-point "/home")
;; (type "ext4"))
)
%base-file-systems))
(swap-devices '("/dev/sda2"))
(users (list (user-account
(name "tcech")
(uid 1000) (group "users")
(comment "Tomas Cech")
(password "password")
(home-directory "/home/tcech"))))
(packages
(append
(list
;; absolutely necessary
emacs lvm2 mc bash texinfo
grub nss-mdns procps cryptsetup alsa-utils
;; networking
iw iproute wicd links wpa-supplicant dbus
vpnc openconnect openssl lsh
;; minimal Xorg
slim xrandr xterm slock
;; mail
mutt mu gnutls
;; web
icecat wget curl
;; enlightenment
terminology enlightenment
;; xfce
xfce
;; other X stuff
synergy
;; multimedia
mplayer mplayer2 vlc
;; mpv
;; development
git magit subversion cvs rcs quilt patchutils patch gcc-toolchain-4.9 gnu-make
automake autoconf gdb
strace ltrace
;; other
htop
;; not packaged yet
;; isync cmus cscope ctags the-silver-searcher
)
%base-packages))
(services
(append
(list
(lsh-service #:port-number 22 #:root-login? #t #:initialize? #t)
(slim-service)
(wicd-service)
(avahi-service)
(dbus-service (list avahi wicd))
(mingetty-service "ttyS0"))
%base-services))
)
----------------------%<----my-config.scm----end------>%-------------------
As I lost ability to boot after repartitioning so I run it from chroot from
openSUSE. Guix daemon is started from chroot.
Failure is happening with:
$ guix system reconfigure my-config.scm
substitute-binary: updating list of substitutes from 'http://hydra.gnu.org'...
The following derivations will be built:
/gnu/store/igkyyxgpyvizzpkygji34dkyiivrbqbj-system.drv
/gnu/store/khgv41ycwz0vg6sadgzrbrpsl93mii5c-grub.cfg.drv
/gnu/store/j1s6vh555l6bjmf343wf9f1iyzdzwnv8-activate.drv
/gnu/store/mx0rmnfqi998lpdv8iaywj66wdjnhmsy-boot.drv
/gnu/store/wnj7qwhn1i7akk6crkg6s0diksi3lhyr-pam.d.drv
/gnu/store/7dm59cc020dfma43b24pilrp98zgsbs8-etc.drv
Backtrace:
In ice-9/boot-9.scm:
157: 10 [catch #t #<catch-closure 1143920> ...]
In unknown file:
?: 9 [apply-smob/1 #<catch-closure 1143920>]
In ice-9/boot-9.scm:
63: 8 [call-with-prompt prompt0 ...]
In ice-9/eval.scm:
432: 7 [eval # #]
In ice-9/boot-9.scm:
2401: 6 [save-module-excursion #<procedure 1160980 at ice-9/boot-9.scm:4045:3 ()>]
4050: 5 [#<procedure 1160980 at ice-9/boot-9.scm:4045:3 ()>]
1724: 4 [%start-stack load-stack ...]
1729: 3 [#<procedure 1176f00 ()>]
In unknown file:
?: 2 [primitive-load "/gnu/store/b027n4gx00y19bpyi1h5hasvnpp95ff4-pam.d-builder"]
In srfi/srfi-1.scm:
616: 1 [for-each #<procedure 1217de0 at ice-9/eval.scm:416:20 (a)> (# # # # ...)]
In unknown file:
?: 0 [symlink "/gnu/store/z95z25d73kjza99s3w95lrdsiqlcdv0a-login" ...]
ERROR: In procedure symlink:
ERROR: In procedure symlink: File exists
builder for `/gnu/store/wnj7qwhn1i7akk6crkg6s0diksi3lhyr-pam.d.drv' failed with exit code 1
cannot build derivation `/gnu/store/7dm59cc020dfma43b24pilrp98zgsbs8-etc.drv': 1 dependencies couldn't be built
cannot build derivation `/gnu/store/igkyyxgpyvizzpkygji34dkyiivrbqbj-system.drv': 1 dependencies couldn't be built
killing process 7202
guix system: error: build failed: build of `/gnu/store/igkyyxgpyvizzpkygji34dkyiivrbqbj-system.drv' failed
It seems to be identical to the report. Furthermore - `make clean' in my GIT
repository is not helping so right now I'm not sure how to progress.
I'd appreciate if you have any other hints how to progress or what else to
wipe.
S_W
[-- Attachment #2: Digital signature --]
[-- Type: application/pgp-signature, Size: 181 bytes --]
^ permalink raw reply [flat|nested] 5+ messages in thread
* bug#20037: problem still persist
2015-04-02 15:24 ` bug#20037: problem still persist Tomáš Čech
@ 2015-04-05 21:05 ` Ludovic Courtès
2015-04-06 21:06 ` Tomáš Čech
0 siblings, 1 reply; 5+ messages in thread
From: Ludovic Courtès @ 2015-04-05 21:05 UTC (permalink / raw)
To: Tomáš Čech; +Cc: 20037
Tomáš Čech <sleep_walker@gnu.org> skribis:
> I'm afraid I can reproduce it.
It’s a different problem this time. :-)
> ----------------------%<----my-config.scm----begin---->%-------------------
[...]
> (packages
> (append
> (list
> ;; absolutely necessary
> emacs lvm2 mc bash texinfo
(Unrelated, but I personally find it more convenient to have only core
packages in the global profile, and then have the rest in user
profiles.)
[...]
> (services
> (append
> (list
> (lsh-service #:port-number 22 #:root-login? #t #:initialize? #t)
> (slim-service)
> (wicd-service)
> (avahi-service)
> (dbus-service (list avahi wicd))
> (mingetty-service "ttyS0"))
[...]
> ?: 0 [symlink "/gnu/store/z95z25d73kjza99s3w95lrdsiqlcdv0a-login" ...]
>
> ERROR: In procedure symlink:
> ERROR: In procedure symlink: File exists
The culprit is the ‘mingetty-service’ call above: since it uses a #:motd
different from that used in the other ‘mingetty-service’ calls in
%base-services, the thing tries to create a different pam.d/login file
for it, but that fails because there’s already a pam.d/login file.
The workaround is to write:
(mingetty-service "ttyS0"
#:motd (text-file "motd" "
This is the GNU operating system, welcome!\n\n"))
Since this is the same motd as the other mingetty services, everything
is fine.
This is of course unsatisfactory. The more general issue is that
service procedures need to be able to share state/configuration info,
which I hope we can fix soon.
Thanks,
Ludo’.
^ permalink raw reply [flat|nested] 5+ messages in thread
* bug#20037: problem still persist
2015-04-05 21:05 ` Ludovic Courtès
@ 2015-04-06 21:06 ` Tomáš Čech
0 siblings, 0 replies; 5+ messages in thread
From: Tomáš Čech @ 2015-04-06 21:06 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: 20037
On Sun, Apr 05, 2015 at 11:05:34PM +0200, Ludovic Courtès wrote:
>Tomáš Čech <sleep_walker@gnu.org> skribis:
>
>> I'm afraid I can reproduce it.
>
>It’s a different problem this time. :-)
>
>> ----------------------%<----my-config.scm----begin---->%-------------------
>
>[...]
>
>> (packages
>> (append
>> (list
>> ;; absolutely necessary
>> emacs lvm2 mc bash texinfo
>
>(Unrelated, but I personally find it more convenient to have only core
>packages in the global profile, and then have the rest in user
>profiles.)
(
I do agree with you, but
emacs - default editor and interface for Guix
lvm2 - I need it to mount filesystems
mc - OK, this can be ommited
bash - regardless being BASH fan and user - this de-facto standard, my
scripts relies on bashism for speed and cleaner code (really! :)
texinfo - I really need to access DMD and Guix manuals to be able to use
them (already happened to me when I got lost without Internet
connection)
)
>
>[...]
>
>> (services
>> (append
>> (list
>> (lsh-service #:port-number 22 #:root-login? #t #:initialize? #t)
>> (slim-service)
>> (wicd-service)
>> (avahi-service)
>> (dbus-service (list avahi wicd))
>> (mingetty-service "ttyS0"))
>
>[...]
>
>> ?: 0 [symlink "/gnu/store/z95z25d73kjza99s3w95lrdsiqlcdv0a-login" ...]
>>
>> ERROR: In procedure symlink:
>> ERROR: In procedure symlink: File exists
>
>The culprit is the ‘mingetty-service’ call above: since it uses a #:motd
>different from that used in the other ‘mingetty-service’ calls in
>%base-services, the thing tries to create a different pam.d/login file
>for it, but that fails because there’s already a pam.d/login file.
>
>The workaround is to write:
>
> (mingetty-service "ttyS0"
> #:motd (text-file "motd" "
>This is the GNU operating system, welcome!\n\n"))
FTR (in case someone will face the same problem), text-file is in (guix store)
module so you will need to add that one as well.
>Since this is the same motd as the other mingetty services, everything
>is fine.
>
>This is of course unsatisfactory. The more general issue is that
>service procedures need to be able to share state/configuration info,
>which I hope we can fix soon.
Thanks for your analysis. I can confirm that your workaround worked and I can
use Guix once again. Sorry for not recognizing this as another issue.
Thanks,
S_W
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2015-04-06 21:07 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-03-08 10:32 bug#20037: 'guix system reconfigure' without 'gnu/system/linux.go' fails with duplicates login pam-service 宋文武
2015-03-10 17:13 ` Ludovic Courtès
2015-04-02 15:24 ` bug#20037: problem still persist Tomáš Čech
2015-04-05 21:05 ` Ludovic Courtès
2015-04-06 21:06 ` Tomáš Čech
Code repositories for project(s) associated with this external index
https://git.savannah.gnu.org/cgit/guix.git
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.