* What’s next? @ 2017-05-24 13:11 Ludovic Courtès 2017-05-24 13:23 ` Ricardo Wurmus ` (4 more replies) 0 siblings, 5 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-05-24 13:11 UTC (permalink / raw) To: guix-devel [-- Attachment #1: Type: text/plain, Size: 2421 bytes --] Hello Guix! I think it’s time to think about what we want to work on next, ideally before the next release, and ideally said release should be in a couple of months rather than in 5 months. Here are some important items I can think of: • Merge the ncurses installer (the ‘wip-installer’) branch. • We’re supposed to freeze ‘core-updates’ in a couple of days and we have defined a couple of important goals: <https://lists.gnu.org/archive/html/guix-devel/2017-04/msg00120.html>. I have a vague feeling that the ‘wip-build-systems-gexp’ merge is not for this time yet… • ‘guix offload’ terrible bug: <https://bugs.gnu.org/26976>. • Guile 2.2 compiler terrible issue: <https://lists.gnu.org/archive/html/guile-devel/2017-05/msg00033.html>. • Adjust the release process so we don’t find ourselves without substitutes for the ‘guix’ package, as reported at <https://bugs.gnu.org/27032>. • Prepare to migrate to the new build farm: the hardware of bayfront.guixsd.org has been fixed (it was unreliable until we changed its CPUs), so now we need to fix a couple of issues in Cuirass and generally improve it so we can, via its HTTP interface, add new jobsets and so on. Of course we’ll have to work on that incrementally. • Finalize the new bootloader API and support for new bootloaders: <https://bugs.gnu.org/26339>. • Merge the potluck! <https://bugs.gnu.org/26645> I think everything above could pretty much go into a 0.13.1 release not far away. And the missing bits, IMO, for a “1.0” label would be: • Improve the UI: add colors (yay!), hide build logs by default for most commands, improve progress reports, display how much will be downloaded, etc. • Implement channels: <https://bugs.gnu.org/22629>. A first step may be to fix some of the obvious shortcomings of ‘guix pull’: use (guix git) to optimize bandwidth usage, and compute the derivation of the new ‘guix’ and use that. • Authenticate Git checkouts: <https://bugs.gnu.org/22883>. What do people think? I think the key idea is that we should fix all the annoyances and bugs, many of which seasoned Guix hackers more or less got used to, but which are nevertheless a serious hindrance when using Guix “normally.” Ludo’. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 13:11 What’s next? Ludovic Courtès @ 2017-05-24 13:23 ` Ricardo Wurmus 2017-05-27 10:01 ` Ludovic Courtès 2017-05-24 15:52 ` Brendan Tildesley ` (3 subsequent siblings) 4 siblings, 1 reply; 83+ messages in thread From: Ricardo Wurmus @ 2017-05-24 13:23 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Ludovic Courtès <ludo@gnu.org> writes: > Hello Guix! > > I think it’s time to think about what we want to work on next, ideally > before the next release, and ideally said release should be in a couple > of months rather than in 5 months. Here are some important items I can > think of: […] Excellent points! > I think the key idea is that we should fix all the annoyances and bugs, > many of which seasoned Guix hackers more or less got used to, but which > are nevertheless a serious hindrance when using Guix “normally.” Here are some other annoyances: * the verbosity of reporting hash mismatches. You posted a neat little change for that some time ago, but I cannot find it any more. * texlive. I’m working on splitting the package up. (An aggressive firewall at work put a stop to that work, but I’ll try to resume very soon.) * very explicit but cryptic stack traces. I think that all errors should be reported more nicely. The error can still be printed (on demand?), but Guix probably should not spill its innards too readily. -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 13:23 ` Ricardo Wurmus @ 2017-05-27 10:01 ` Ludovic Courtès 2017-05-27 21:44 ` Ricardo Wurmus 0 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2017-05-27 10:01 UTC (permalink / raw) To: Ricardo Wurmus; +Cc: guix-devel Hello! Ricardo Wurmus <rekado@elephly.net> skribis: > Here are some other annoyances: > > * the verbosity of reporting hash mismatches. You posted a neat little > change for that some time ago, but I cannot find it any more. Oh right, see attached. > * texlive. I’m working on splitting the package up. (An aggressive > firewall at work put a stop to that work, but I’ll try to resume very > soon.) Good point! Looking forward to that. > * very explicit but cryptic stack traces. I think that all errors > should be reported more nicely. The error can still be printed (on > demand?), but Guix probably should not spill its innards too readily. I agree with this direction, but we’ll have to work on concrete cases here. Bug reports of the form “when I do this I get a stack trace instead of an error message” are welcome! Thanks, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-27 10:01 ` Ludovic Courtès @ 2017-05-27 21:44 ` Ricardo Wurmus 2017-05-28 20:44 ` Ludovic Courtès 0 siblings, 1 reply; 83+ messages in thread From: Ricardo Wurmus @ 2017-05-27 21:44 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Ludovic Courtès <ludo@gnu.org> writes: > Hello! > > Ricardo Wurmus <rekado@elephly.net> skribis: > >> Here are some other annoyances: >> >> * the verbosity of reporting hash mismatches. You posted a neat little >> change for that some time ago, but I cannot find it any more. > > Oh right, see attached. I think you forgot to attach it. >> * texlive. I’m working on splitting the package up. (An aggressive >> firewall at work put a stop to that work, but I’ll try to resume very >> soon.) > > Good point! Looking forward to that. Me too! >> * very explicit but cryptic stack traces. I think that all errors >> should be reported more nicely. The error can still be printed (on >> demand?), but Guix probably should not spill its innards too readily. > > I agree with this direction, but we’ll have to work on concrete cases > here. Bug reports of the form “when I do this I get a stack trace > instead of an error message” are welcome! Danny submitted bug #27100 for this with two examples. -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-27 21:44 ` Ricardo Wurmus @ 2017-05-28 20:44 ` Ludovic Courtès 2017-05-28 21:36 ` Ricardo Wurmus 0 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2017-05-28 20:44 UTC (permalink / raw) To: Ricardo Wurmus; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 445 bytes --] Ricardo Wurmus <rekado@elephly.net> skribis: > Ludovic Courtès <ludo@gnu.org> writes: > >> Hello! >> >> Ricardo Wurmus <rekado@elephly.net> skribis: >> >>> Here are some other annoyances: >>> >>> * the verbosity of reporting hash mismatches. You posted a neat little >>> change for that some time ago, but I cannot find it any more. >> >> Oh right, see attached. > > I think you forgot to attach it. Oops. Here we go: [-- Warning: decoded text below may be mangled, UTF-8 assumed --] [-- Attachment #2: Type: text/x-patch, Size: 1380 bytes --] modified nix/libstore/build.cc @@ -2449,8 +2449,11 @@ void DerivationGoal::registerOutputs() Hash h2 = recursive ? hashPath(ht, actualPath).first : hashFile(ht, actualPath); if (h != h2) throw BuildError( - format("output path `%1%' should have %2% hash `%3%', instead has `%4%'") - % path % i->second.hashAlgo % printHash16or32(h) % printHash16or32(h2)); + format("%1% hash mismatch for output path `%2%'\n" + " expected: %3%\n" + " actual: %4%") + % i->second.hashAlgo % path + % printHash16or32(h) % printHash16or32(h2)); } /* Get rid of all weird permissions. This also checks that @@ -3096,7 +3099,9 @@ void SubstitutionGoal::finished() Hash expectedHash = parseHash16or32(hashType, string(expectedHashStr, n + 1)); Hash actualHash = hashType == htSHA256 ? hash.first : hashPath(hashType, destPath).first; if (expectedHash != actualHash) - throw SubstError(format("hash mismatch in downloaded path `%1%': expected %2%, got %3%") + throw SubstError(format("hash mismatch in downloaded path `%1%'\n" + " expected: %2%\n" + " actual: %3%") % storePath % printHash(expectedHash) % printHash(actualHash)); } [-- Attachment #3: Type: text/plain, Size: 314 bytes --] Should we apply it? >> I agree with this direction, but we’ll have to work on concrete cases >> here. Bug reports of the form “when I do this I get a stack trace >> instead of an error message” are welcome! > > Danny submitted bug #27100 for this with two examples. Great. Thanks, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-28 20:44 ` Ludovic Courtès @ 2017-05-28 21:36 ` Ricardo Wurmus 2017-05-30 15:55 ` Ludovic Courtès 0 siblings, 1 reply; 83+ messages in thread From: Ricardo Wurmus @ 2017-05-28 21:36 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Ludovic Courtès <ludo@gnu.org> writes: > Ricardo Wurmus <rekado@elephly.net> skribis: > >> Ludovic Courtès <ludo@gnu.org> writes: >> >>> Hello! >>> >>> Ricardo Wurmus <rekado@elephly.net> skribis: >>> >>>> Here are some other annoyances: >>>> >>>> * the verbosity of reporting hash mismatches. You posted a neat little >>>> change for that some time ago, but I cannot find it any more. >>> >>> Oh right, see attached. >> >> I think you forgot to attach it. > > Oops. Here we go: > > modified nix/libstore/build.cc > @@ -2449,8 +2449,11 @@ void DerivationGoal::registerOutputs() > Hash h2 = recursive ? hashPath(ht, actualPath).first : hashFile(ht, actualPath); > if (h != h2) > throw BuildError( > - format("output path `%1%' should have %2% hash `%3%', instead has `%4%'") > - % path % i->second.hashAlgo % printHash16or32(h) % printHash16or32(h2)); > + format("%1% hash mismatch for output path `%2%'\n" > + " expected: %3%\n" > + " actual: %4%") > + % i->second.hashAlgo % path > + % printHash16or32(h) % printHash16or32(h2)); > } > > /* Get rid of all weird permissions. This also checks that > @@ -3096,7 +3099,9 @@ void SubstitutionGoal::finished() > Hash expectedHash = parseHash16or32(hashType, string(expectedHashStr, n + 1)); > Hash actualHash = hashType == htSHA256 ? hash.first : hashPath(hashType, destPath).first; > if (expectedHash != actualHash) > - throw SubstError(format("hash mismatch in downloaded path `%1%': expected %2%, got %3%") > + throw SubstError(format("hash mismatch in downloaded path `%1%'\n" > + " expected: %2%\n" > + " actual: %3%") > % storePath % printHash(expectedHash) % printHash(actualHash)); > } > > Should we apply it? Yes, please. This looks much better! Thank you! -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-28 21:36 ` Ricardo Wurmus @ 2017-05-30 15:55 ` Ludovic Courtès 0 siblings, 0 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-05-30 15:55 UTC (permalink / raw) To: Ricardo Wurmus; +Cc: guix-devel Ricardo Wurmus <rekado@elephly.net> skribis: > Ludovic Courtès <ludo@gnu.org> writes: [...] >> Oops. Here we go: >> >> modified nix/libstore/build.cc >> @@ -2449,8 +2449,11 @@ void DerivationGoal::registerOutputs() >> Hash h2 = recursive ? hashPath(ht, actualPath).first : hashFile(ht, actualPath); >> if (h != h2) >> throw BuildError( >> - format("output path `%1%' should have %2% hash `%3%', instead has `%4%'") >> - % path % i->second.hashAlgo % printHash16or32(h) % printHash16or32(h2)); >> + format("%1% hash mismatch for output path `%2%'\n" >> + " expected: %3%\n" >> + " actual: %4%") >> + % i->second.hashAlgo % path >> + % printHash16or32(h) % printHash16or32(h2)); >> } >> >> /* Get rid of all weird permissions. This also checks that >> @@ -3096,7 +3099,9 @@ void SubstitutionGoal::finished() >> Hash expectedHash = parseHash16or32(hashType, string(expectedHashStr, n + 1)); >> Hash actualHash = hashType == htSHA256 ? hash.first : hashPath(hashType, destPath).first; >> if (expectedHash != actualHash) >> - throw SubstError(format("hash mismatch in downloaded path `%1%': expected %2%, got %3%") >> + throw SubstError(format("hash mismatch in downloaded path `%1%'\n" >> + " expected: %2%\n" >> + " actual: %3%") >> % storePath % printHash(expectedHash) % printHash(actualHash)); >> } >> >> Should we apply it? > > Yes, please. This looks much better! Thank you! Applied! Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 13:11 What’s next? Ludovic Courtès 2017-05-24 13:23 ` Ricardo Wurmus @ 2017-05-24 15:52 ` Brendan Tildesley 2017-05-27 10:04 ` Ludovic Courtès 2017-05-24 16:09 ` Catonano ` (2 subsequent siblings) 4 siblings, 1 reply; 83+ messages in thread From: Brendan Tildesley @ 2017-05-24 15:52 UTC (permalink / raw) To: guix-devel Ludovic Courtès 於 2017-05-24 23:11 寫道: > Hello Guix! > > I think it’s time to think about what we want to work on next, ideally > before the next release, and ideally said release should be in a couple > of months rather than in 5 months. Here are some important items I can > think of: [...] > I think the key idea is that we should fix all the annoyances and bugs, > many of which seasoned Guix hackers more or less got used to, but which > are nevertheless a serious hindrance when using Guix “normally.” > > Ludo’. One little annoyance I have is that guix takes every opportunity to update the list of substitutes when guix build, guix package -u, etc... is run, and fills my terminal with output like: substitute: updating list of substitutes from 'https://mirror.hydra.gnu.org'... 100.0% substitute: updating list of substitutes from 'https://mirror.hydra.gnu.org'... 100.0% substitute: updating list of substitutes from 'https://mirror.hydra.gnu.org'... 100.0% substitute: updating list of substitutes from 'https://mirror.hydra.gnu.org'... 100.0% ... It will output this line a different number each time based on some rule I couldn't guess, and renders the percentage measurement meaningless. Currently I am running `guix system init config.scm --substitute-urls="http://10.1.1.61:8080 https://mirror.hydra.gnu.org/" --fallback' from the 0.13 installer, and it his been outputting hundreds of these lines for the last half an hour. I'm not sure if it is ever going to stop, perhaps I've stumbled across a genuine bug? In any case, the minor annoyance version is something I've noticed for a while. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 15:52 ` Brendan Tildesley @ 2017-05-27 10:04 ` Ludovic Courtès 2017-05-28 20:41 ` Maxim Cournoyer 0 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2017-05-27 10:04 UTC (permalink / raw) To: Brendan Tildesley; +Cc: guix-devel Hi Brendan, Brendan Tildesley <brendan.tildesley@openmailbox.org> skribis: > One little annoyance I have is that guix takes every opportunity to > update the list of substitutes when guix build, guix package -u, etc... > is run, and fills my terminal with output like: > > substitute: updating list of substitutes from > 'https://mirror.hydra.gnu.org'... 100.0% > substitute: updating list of substitutes from > 'https://mirror.hydra.gnu.org'... 100.0% > substitute: updating list of substitutes from > 'https://mirror.hydra.gnu.org'... 100.0% > substitute: updating list of substitutes from > 'https://mirror.hydra.gnu.org'... 100.0% > ... I agree, it’s actually a huge annoyance. It relates to grafts and how they are implemented; I took a stab at fixing this a while back but the approach turned out to be (mostly?) misguided: https://bugs.gnu.org/22990 Would be worth thinking through it again! Thanks, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-27 10:04 ` Ludovic Courtès @ 2017-05-28 20:41 ` Maxim Cournoyer 2017-05-30 15:17 ` Ludovic Courtès 0 siblings, 1 reply; 83+ messages in thread From: Maxim Cournoyer @ 2017-05-28 20:41 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Hi, ludo@gnu.org (Ludovic Courtès) writes: > Hi Brendan, > > Brendan Tildesley <brendan.tildesley@openmailbox.org> skribis: > >> One little annoyance I have is that guix takes every opportunity to >> update the list of substitutes when guix build, guix package -u, etc... >> is run, and fills my terminal with output like: >> >> substitute: updating list of substitutes from >> 'https://mirror.hydra.gnu.org'... 100.0% >> substitute: updating list of substitutes from >> 'https://mirror.hydra.gnu.org'... 100.0% >> substitute: updating list of substitutes from >> 'https://mirror.hydra.gnu.org'... 100.0% >> substitute: updating list of substitutes from >> 'https://mirror.hydra.gnu.org'... 100.0% >> ... > > I agree, it’s actually a huge annoyance. It relates to grafts and how > they are implemented; I took a stab at fixing this a while back but the > approach turned out to be (mostly?) misguided: > > https://bugs.gnu.org/22990 > > Would be worth thinking through it again! Maybe we could make a timer variable configurable, so that at least it doesn't try to refresh this information at *every* guix command? Default could be at least one hour. I care about my security, but refreshing this at every command seems pretty wasteful in terms of resources. Maxim ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-28 20:41 ` Maxim Cournoyer @ 2017-05-30 15:17 ` Ludovic Courtès 2017-06-03 21:16 ` Maxim Cournoyer 0 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2017-05-30 15:17 UTC (permalink / raw) To: Maxim Cournoyer; +Cc: guix-devel Maxim Cournoyer <maxim.cournoyer@gmail.com> skribis: > Hi, > > ludo@gnu.org (Ludovic Courtès) writes: > >> Hi Brendan, >> >> Brendan Tildesley <brendan.tildesley@openmailbox.org> skribis: >> >>> One little annoyance I have is that guix takes every opportunity to >>> update the list of substitutes when guix build, guix package -u, etc... >>> is run, and fills my terminal with output like: >>> >>> substitute: updating list of substitutes from >>> 'https://mirror.hydra.gnu.org'... 100.0% >>> substitute: updating list of substitutes from >>> 'https://mirror.hydra.gnu.org'... 100.0% >>> substitute: updating list of substitutes from >>> 'https://mirror.hydra.gnu.org'... 100.0% >>> substitute: updating list of substitutes from >>> 'https://mirror.hydra.gnu.org'... 100.0% >>> ... >> >> I agree, it’s actually a huge annoyance. It relates to grafts and how >> they are implemented; I took a stab at fixing this a while back but the >> approach turned out to be (mostly?) misguided: >> >> https://bugs.gnu.org/22990 >> >> Would be worth thinking through it again! > > Maybe we could make a timer variable configurable, so that at least it > doesn't try to refresh this information at *every* guix command? That’s not what’s happening. When you see repeated lines that go directly to 100%, that’s because it’s fetching metadata for just a single package, and does that one by one. In other cases, it fetches as many as possible at once, and uses HTTP pipelining to send all these requests to hydra.gnu.org. Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-30 15:17 ` Ludovic Courtès @ 2017-06-03 21:16 ` Maxim Cournoyer 0 siblings, 0 replies; 83+ messages in thread From: Maxim Cournoyer @ 2017-06-03 21:16 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Hello Ludovic, ludo@gnu.org (Ludovic Courtès) writes: > Maxim Cournoyer <maxim.cournoyer@gmail.com> skribis: > >> Hi, >> >> ludo@gnu.org (Ludovic Courtès) writes: >> >>> Hi Brendan, >>> >>> Brendan Tildesley <brendan.tildesley@openmailbox.org> skribis: >>> >>>> One little annoyance I have is that guix takes every opportunity to >>>> update the list of substitutes when guix build, guix package -u, etc... >>>> is run, and fills my terminal with output like: >>>> >>>> substitute: updating list of substitutes from >>>> 'https://mirror.hydra.gnu.org'... 100.0% >>>> substitute: updating list of substitutes from >>>> 'https://mirror.hydra.gnu.org'... 100.0% >>>> substitute: updating list of substitutes from >>>> 'https://mirror.hydra.gnu.org'... 100.0% >>>> substitute: updating list of substitutes from >>>> 'https://mirror.hydra.gnu.org'... 100.0% >>>> ... >>> >>> I agree, it’s actually a huge annoyance. It relates to grafts and how >>> they are implemented; I took a stab at fixing this a while back but the >>> approach turned out to be (mostly?) misguided: >>> >>> https://bugs.gnu.org/22990 >>> >>> Would be worth thinking through it again! >> >> Maybe we could make a timer variable configurable, so that at least it >> doesn't try to refresh this information at *every* guix command? > > That’s not what’s happening. When you see repeated lines that go > directly to 100%, that’s because it’s fetching metadata for just a > single package, and does that one by one. > > In other cases, it fetches as many as possible at once, and uses HTTP > pipelining to send all these requests to hydra.gnu.org. My observation was that for the same exact command (I just tried: "guix environment emacs-el-mock") entered twice: --8<---------------cut here---------------start------------->8--- $ guix environment emacs-el-mock substitute: updating list of substitutes from 'https://bayfront.guixsd.org'... 0.0 substitute: updating list of substitutes from 'https://bayfront.guixsd.org'... 33.3 [...] # (downloads a bunch of substitute) [env]$ exit $ guix environment emacs-el-mock substitute: updating list of substitutes from 'https://bayfront.guixsd.org'... 100.0% substitute: updating list of substitutes from 'https://bayfront.guixsd.org'... 100.0% substitute: updating list of substitutes from 'https://bayfront.guixsd.org'... 100.0% [env]$ --8<---------------cut here---------------end--------------->8--- We can see that a connection is made to the substitute server(s) and data is retrieved each time the command is entered. Why does it need to refresh the list of substitutes the second time? Everything needed is already in the store. Maxim ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 13:11 What’s next? Ludovic Courtès 2017-05-24 13:23 ` Ricardo Wurmus 2017-05-24 15:52 ` Brendan Tildesley @ 2017-05-24 16:09 ` Catonano 2017-05-24 16:25 ` Jan Nieuwenhuizen 2017-10-04 15:12 ` Release! Ludovic Courtès 4 siblings, 0 replies; 83+ messages in thread From: Catonano @ 2017-05-24 16:09 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 1351 bytes --] 2017-05-24 15:11 GMT+02:00 Ludovic Courtès <ludo@gnu.org>: > Hello Guix! > > I think it’s time to think about what we want to work on next, ideally > one little ting I'd love is Janneke's and Jlicht's solution to use "binary" nodejs packages That would allow me to play with some projects that depend on nodejs The problem of evaluating the adherence of the nodejs collection to the Guix diistribution guidelines could be faced later ( I posted a thread that I think is relevant in this regard) > • ‘guix offload’ terrible bug: <https://bugs.gnu.org/26976>. > > • Guile 2.2 compiler terrible issue: > <https://lists.gnu.org/archive/html/guile-devel/2017-05/msg00033.html > >. > terrible bugs are terrible bugs. They should be regarded as priorities > • Improve the UI: add colors (yay!), hide build logs by default for > most commands, improve progress reports, display how much will be > downloaded, etc. > This might be regarded as a small thing but to me this is very important I use to watch Fedora's colorful terminals with longing > I think the key idea is that we should fix all the annoyances and bugs, > many of which seasoned Guix hackers more or less got used to, but which > are nevertheless a serious hindrance when using Guix “normally.” > yeah [-- Attachment #2: Type: text/html, Size: 2401 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 13:11 What’s next? Ludovic Courtès ` (2 preceding siblings ...) 2017-05-24 16:09 ` Catonano @ 2017-05-24 16:25 ` Jan Nieuwenhuizen 2017-05-24 18:40 ` Adonay Felipe Nogueira ` (3 more replies) 2017-10-04 15:12 ` Release! Ludovic Courtès 4 siblings, 4 replies; 83+ messages in thread From: Jan Nieuwenhuizen @ 2017-05-24 16:25 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Ludovic Courtès writes: > I think it’s time to think about what we want to work on next, ideally > before the next release, and ideally said release should be in a couple > of months rather than in 5 months. Here are some important items I can > think of: Great points! > • Implement channels: <https://bugs.gnu.org/22629>. A first step may > be to fix some of the obvious shortcomings of ‘guix pull’: use (guix > git) to optimize bandwidth usage, and compute the derivation of the > new ‘guix’ and use that. > > I think the key idea is that we should fix all the annoyances and bugs, > many of which seasoned Guix hackers more or less got used to, but which > are nevertheless a serious hindrance when using Guix “normally.” +1 A friend of mine is having a second look at Guix (not SD yet) and one of the most confusing things initially is `guix pull'. "When/how do I use that," he asks...and I can only say: I'm not using that...I think we want this to work--or something like this, we talked about this at FOSDEM, but AFAIK everyone is using Guix with Git. He responds with: then *why* is it in the manual. I have no answer. Possibly I'm wrong and/or my information is outdated? Greetings, janneke -- Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 16:25 ` Jan Nieuwenhuizen @ 2017-05-24 18:40 ` Adonay Felipe Nogueira 2017-05-24 19:34 ` Catonano ` (2 subsequent siblings) 3 siblings, 0 replies; 83+ messages in thread From: Adonay Felipe Nogueira @ 2017-05-24 18:40 UTC (permalink / raw) To: guix-devel As an average Guix user, I use `guix pull`. In fact, I avoid `git pull and the pre-inst-env stuff`. I prefer to work with GUIX_PACKAGE_PATH in order to work only with `guix package` and `guix build` if I do have the need to install or build something that I changed. -- - [[https://libreplanet.org/wiki/User:Adfeno]] - Palestrante e consultor sobre /software/ livre (não confundir com gratis). - "WhatsApp"? Ele não é livre, por isso não uso. Iguais a ele prefiro GNU Ring, ou Tox. Quer outras formas de contato? Adicione o vCard que está no endereço acima aos teus contatos. - Pretende me enviar arquivos .doc, .ppt, .cdr, ou .mp3? OK, eu aceito, mas não repasso. Entrego apenas em formatos favoráveis ao /software/ livre. Favor entrar em contato em caso de dúvida. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 16:25 ` Jan Nieuwenhuizen 2017-05-24 18:40 ` Adonay Felipe Nogueira @ 2017-05-24 19:34 ` Catonano 2017-05-24 19:56 ` Ricardo Wurmus 2017-05-24 21:47 ` Leo Famulari 2017-05-24 21:45 ` Leo Famulari 2017-05-27 10:09 ` Ludovic Courtès 3 siblings, 2 replies; 83+ messages in thread From: Catonano @ 2017-05-24 19:34 UTC (permalink / raw) To: Jan Nieuwenhuizen; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 1166 bytes --] 2017-05-24 18:25 GMT+02:00 Jan Nieuwenhuizen <janneke@gnu.org>: > > > +1 > > A friend of mine is having a second look at Guix (not SD yet) and one of > the most confusing things initially is `guix pull'. "When/how do I use > that," he asks...and I can only say: I'm not using that...I think we > want this to work--or something like this, we talked about this at > FOSDEM, but AFAIK everyone is using Guix with Git. > > He responds with: then *why* is it in the manual. I have no answer. > Possibly I'm wrong and/or my information is outdated? > This is an important point for me too I realized that everyone is using git and not guix pull just yesterday I have been using guix pull until today because I didn' t know any better The manual mentions something that only beginners use and doesn' t mention something that the majority of the community is using. Probably in many of the footages in which Ludo appears, the use of git over guix pull is assumed. I think this is a problem. It' s unfair to newcomers and it damages Guix as a project because it makes the learning curve steeper with not so much of a point why. I kinda agree with myglc2, on this. [-- Attachment #2: Type: text/html, Size: 1702 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 19:34 ` Catonano @ 2017-05-24 19:56 ` Ricardo Wurmus 2017-05-30 0:09 ` myglc2 2017-05-24 21:47 ` Leo Famulari 1 sibling, 1 reply; 83+ messages in thread From: Ricardo Wurmus @ 2017-05-24 19:56 UTC (permalink / raw) To: Catonano; +Cc: guix-devel Catonano <catonano@gmail.com> writes: > 2017-05-24 18:25 GMT+02:00 Jan Nieuwenhuizen <janneke@gnu.org>: […] >> A friend of mine is having a second look at Guix (not SD yet) and one of >> the most confusing things initially is `guix pull'. "When/how do I use >> that," he asks...and I can only say: I'm not using that...I think we >> want this to work--or something like this, we talked about this at >> FOSDEM, but AFAIK everyone is using Guix with Git. >> >> He responds with: then *why* is it in the manual. I have no answer. >> Possibly I'm wrong and/or my information is outdated? >> > > This is an important point for me too > > I realized that everyone is using git and not guix pull just yesterday […] > I think this is a problem. It' s unfair to newcomers and it damages Guix as > a project because it makes the learning curve steeper with not so much of a > point why. There are two reasons why developers use Guix from git: * it allows them to add new packages and features to Guix itself. This is something “guix pull” doesn’t support well. * it doesn’t require compiling all of Guix on each update. The latter is a defect in “guix pull” that we are aware of and working on. Progress has already been made in improving “guix pull”, but it takes time. It is not by design that “guix pull” is currently less desirable than working from a git checkout. -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 19:56 ` Ricardo Wurmus @ 2017-05-30 0:09 ` myglc2 0 siblings, 0 replies; 83+ messages in thread From: myglc2 @ 2017-05-30 0:09 UTC (permalink / raw) To: Ricardo Wurmus; +Cc: guix-devel On 05/24/2017 at 21:56 Ricardo Wurmus writes: > Catonano <catonano@gmail.com> writes: > >> 2017-05-24 18:25 GMT+02:00 Jan Nieuwenhuizen <janneke@gnu.org>: > […] >>> A friend of mine is having a second look at Guix (not SD yet) and one of >>> the most confusing things initially is `guix pull'. "When/how do I use >>> that," he asks...and I can only say: I'm not using that...I think we >>> want this to work--or something like this, we talked about this at >>> FOSDEM, but AFAIK everyone is using Guix with Git. >>> >>> He responds with: then *why* is it in the manual. I have no answer. >>> Possibly I'm wrong and/or my information is outdated? >>> >> >> This is an important point for me too >> >> I realized that everyone is using git and not guix pull just yesterday > […] >> I think this is a problem. It' s unfair to newcomers and it damages Guix as >> a project because it makes the learning curve steeper with not so much of a >> point why. > > There are two reasons why developers use Guix from git: > > * it allows them to add new packages and features to Guix itself. This > is something “guix pull” doesn’t support well. > > * it doesn’t require compiling all of Guix on each update. Hmm, that explains how it feels. Why doesn't it just pull the compiled guix files? ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 19:34 ` Catonano 2017-05-24 19:56 ` Ricardo Wurmus @ 2017-05-24 21:47 ` Leo Famulari 1 sibling, 0 replies; 83+ messages in thread From: Leo Famulari @ 2017-05-24 21:47 UTC (permalink / raw) To: Catonano; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 415 bytes --] On Wed, May 24, 2017 at 09:34:14PM +0200, Catonano wrote: > I think this is a problem. It' s unfair to newcomers and it damages Guix as > a project because it makes the learning curve steeper with not so much of a > point why. It's true, we collectively worked around some problems with `guix pull` for too long. Let's all eat the dog food when we don't actually need to work from Git. I promise it tastes okay :) [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 16:25 ` Jan Nieuwenhuizen 2017-05-24 18:40 ` Adonay Felipe Nogueira 2017-05-24 19:34 ` Catonano @ 2017-05-24 21:45 ` Leo Famulari 2017-05-25 8:11 ` What???s next? Pjotr Prins 2017-05-25 14:57 ` What’s next? Chris Marusich 2017-05-27 10:09 ` Ludovic Courtès 3 siblings, 2 replies; 83+ messages in thread From: Leo Famulari @ 2017-05-24 21:45 UTC (permalink / raw) To: Jan Nieuwenhuizen; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 2398 bytes --] On Wed, May 24, 2017 at 06:25:40PM +0200, Jan Nieuwenhuizen wrote: > A friend of mine is having a second look at Guix (not SD yet) and one of > the most confusing things initially is `guix pull'. "When/how do I use > that," he asks...and I can only say: I'm not using that...I think we > want this to work--or something like this, we talked about this at > FOSDEM, but AFAIK everyone is using Guix with Git. `guix pull` is one of the primary tools of Guix. For those who are new to Guix, it should be described as a per-user `apt-get update`. That is, it updates the list of available packages. The finer differences and extra features are not important for new users to learn at the beginning. With the recent commit adding '--fallback' to `guix pull` [0], the main reason for Guix users who are not Guix developers to resort to Git has been removed. So, I use and recommend `guix pull`! Do you think the manual can be more clear about this? I'd really like to hear which parts of the manual your friend read. Maybe we need to rearrange or rewrite some sections. I think the most immediate problem with `guix pull` is that it doesn't support Git commit signature verification. So, you end up trusting different things: basically, a subset of the X.509 PKI vs PGP+SHA1 [1,2]. I think we can fix this while making `guix pull` use (guix git). Building Guix from Git is the normal way to develop Guix, and it avoids downloading a Guix tarball from Savannah in the default case, so developers will learn and use it, but it brings its own pitfalls. [0] https://git.savannah.gnu.org/cgit/guix.git/commit/?id=4902d3c4e0376974356481f222583580b49f39e1 [1] `guix pull` verifies the certificate of <git.savannah.gnu.org> against the Let's Encrypt trust chain *only*. [2] If I understand correctly, Git commit signatures are of the SHA1 hash, not the actual commit data. So... not great if I'm correct, but it will get better as Git introduces a new hash function. And SHA1 collisions are rather obvious to detect, at least according the public research. An attempt at collision detection was added in Git 2.13.0. > He responds with: then *why* is it in the manual. I have no answer. > Possibly I'm wrong and/or my information is outdated? Since we are all Guix developers, we talk about developing Guix, but not as much the day-to-day use. So our impressions may not match actual usage patterns. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What???s next? 2017-05-24 21:45 ` Leo Famulari @ 2017-05-25 8:11 ` Pjotr Prins 2017-05-27 10:16 ` Ludovic Courtès 2017-05-25 14:57 ` What’s next? Chris Marusich 1 sibling, 1 reply; 83+ messages in thread From: Pjotr Prins @ 2017-05-25 8:11 UTC (permalink / raw) To: Leo Famulari; +Cc: guix-devel On Wed, May 24, 2017 at 05:45:39PM -0400, Leo Famulari wrote: > [1] `guix pull` verifies the certificate of <git.savannah.gnu.org> > against the Let's Encrypt trust chain *only*. This brings up another annoyance. Before a first 'git pull' as a newbie you have to go through a number of steps which are, arguably, redundant. I am talking about installing a first key to trust the guix server. Well, if we have installed guix AND we use guix pull, I think we can assume the guix server is trusted (by the user). Therefore, that key should work out of the box (it is what people install from the tree anyway!). It is a redundant step. Debian also uses keys and works out of the box. The other thing is permissions. Sometimes the user profile needs explicit permission settings. This is not right. I can see it is useful on a server setup controlled by an administrator, but arguably it should just work. The administrator can revert on that. So, if possible, the default should be allowing guix to work once the daemon runs. Pj. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What???s next? 2017-05-25 8:11 ` What???s next? Pjotr Prins @ 2017-05-27 10:16 ` Ludovic Courtès 2017-05-28 7:30 ` What's next? Pjotr Prins 2017-05-28 20:37 ` What???s next? Maxim Cournoyer 0 siblings, 2 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-05-27 10:16 UTC (permalink / raw) To: Pjotr Prins; +Cc: guix-devel Pjotr Prins <pjotr.public12@thebird.nl> skribis: > On Wed, May 24, 2017 at 05:45:39PM -0400, Leo Famulari wrote: >> [1] `guix pull` verifies the certificate of <git.savannah.gnu.org> >> against the Let's Encrypt trust chain *only*. > > This brings up another annoyance. Before a first 'git pull' as a > newbie you have to go through a number of steps which are, arguably, > redundant. Note that the Let’s Encrypt certificate check by ‘guix pull’ works out of the box: users don’t need to install ‘nss-certs’, define a bunch of environment variables, etc. > I am talking about installing a first key to trust the guix server. > Well, if we have installed guix AND we use guix pull, I think we can > assume the guix server is trusted (by the user). Therefore, that key > should work out of the box (it is what people install from the tree > anyway!). It is a redundant step. Debian also uses keys and works > out of the box. Substitute servers are fundamentally different from servers that provide Guix packages, which is why it’s treated differently. On GuixSD, the key of hydra.gnu.org and bayfront.guixsd.org are always registered by default. We cannot do that for someone installing Guix on a foreign distro because that involves creating a file in /etc. > The other thing is permissions. Sometimes the user profile needs > explicit permission settings. What do you mean? Thanks, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What's next? 2017-05-27 10:16 ` Ludovic Courtès @ 2017-05-28 7:30 ` Pjotr Prins 2017-05-28 20:48 ` Ludovic Courtès 2017-05-28 20:37 ` What???s next? Maxim Cournoyer 1 sibling, 1 reply; 83+ messages in thread From: Pjotr Prins @ 2017-05-28 7:30 UTC (permalink / raw) To: Ludovic Court??s; +Cc: guix-devel On Sat, May 27, 2017 at 12:16:45PM +0200, Ludovic Court??s wrote: > On GuixSD, the key of hydra.gnu.org and bayfront.guixsd.org are always > registered by default. We cannot do that for someone installing Guix on > a foreign distro because that involves creating a file in /etc. Many installs are not on GuixSD. Can't we use the key that is stored in the store itself? If /etc does not exist then use what comes with the installation. > > The other thing is permissions. Sometimes the user profile needs > > explicit permission settings. > > What do you mean? I encountered that /var/guix/profiles/ permissions need to be set for every user. But maybe that has changed, or I got it wrong. Pj. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What's next? 2017-05-28 7:30 ` What's next? Pjotr Prins @ 2017-05-28 20:48 ` Ludovic Courtès 2017-05-28 22:05 ` Roel Janssen 2017-05-29 2:31 ` Maxim Cournoyer 0 siblings, 2 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-05-28 20:48 UTC (permalink / raw) To: Pjotr Prins; +Cc: guix-devel Pjotr Prins <pjotr.public12@thebird.nl> skribis: > On Sat, May 27, 2017 at 12:16:45PM +0200, Ludovic Court??s wrote: >> On GuixSD, the key of hydra.gnu.org and bayfront.guixsd.org are always >> registered by default. We cannot do that for someone installing Guix on >> a foreign distro because that involves creating a file in /etc. > > Many installs are not on GuixSD. Can't we use the key that is stored > in the store itself? If /etc does not exist then use what comes > with the installation. The current behavior is to print a warning when /etc/guix/acl (the list of authorized keys) is empty or nonexistent. Your suggestion would be to automatically populate it, right? I’m mildly reluctant to that, because we’d stealthily force every user into trusting our substitute servers. OTOH I agree that the current situation is not optimal. What do people think? Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What's next? 2017-05-28 20:48 ` Ludovic Courtès @ 2017-05-28 22:05 ` Roel Janssen 2017-05-30 15:19 ` Ludovic Courtès 2017-05-29 2:31 ` Maxim Cournoyer 1 sibling, 1 reply; 83+ messages in thread From: Roel Janssen @ 2017-05-28 22:05 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Ludovic Courtès writes: > Pjotr Prins <pjotr.public12@thebird.nl> skribis: > >> On Sat, May 27, 2017 at 12:16:45PM +0200, Ludovic Court??s wrote: >>> On GuixSD, the key of hydra.gnu.org and bayfront.guixsd.org are always >>> registered by default. We cannot do that for someone installing Guix on >>> a foreign distro because that involves creating a file in /etc. >> >> Many installs are not on GuixSD. Can't we use the key that is stored >> in the store itself? If /etc does not exist then use what comes >> with the installation. > > The current behavior is to print a warning when /etc/guix/acl (the list > of authorized keys) is empty or nonexistent. > > Your suggestion would be to automatically populate it, right? > > I’m mildly reluctant to that, because we’d stealthily force every user > into trusting our substitute servers. OTOH I agree that the current > situation is not optimal. > > What do people think? Maybe we could find a mid-way here by doing the same as Fedora does with RPMfusion repositories: It asks the user for trusting the signing keys before enabling the repository. So in our case it would be something like: $ guix package -i emacs A `substitute' is available for this package on https://mirror.hydra.gnu.org. This means we can download the binary output for this package, instead of compiling it from its source code. Do you want to use this substitute server with key ... for this package, and for future packages? [y/N] We need to find the proper wording for this message. Using this, we can still let the user decide, but we can make it a lot easier for the user to make a decision -- a 'yes' or 'no' answer to a question is easier than a paragraph in the manual with instructions to enable it. Kind regards, Roel Janssen ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What's next? 2017-05-28 22:05 ` Roel Janssen @ 2017-05-30 15:19 ` Ludovic Courtès 2017-05-30 20:15 ` Pjotr Prins 0 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2017-05-30 15:19 UTC (permalink / raw) To: Roel Janssen; +Cc: guix-devel Roel Janssen <roel@gnu.org> skribis: > Ludovic Courtès writes: > >> Pjotr Prins <pjotr.public12@thebird.nl> skribis: >> >>> On Sat, May 27, 2017 at 12:16:45PM +0200, Ludovic Court??s wrote: >>>> On GuixSD, the key of hydra.gnu.org and bayfront.guixsd.org are always >>>> registered by default. We cannot do that for someone installing Guix on >>>> a foreign distro because that involves creating a file in /etc. >>> >>> Many installs are not on GuixSD. Can't we use the key that is stored >>> in the store itself? If /etc does not exist then use what comes >>> with the installation. >> >> The current behavior is to print a warning when /etc/guix/acl (the list >> of authorized keys) is empty or nonexistent. >> >> Your suggestion would be to automatically populate it, right? >> >> I’m mildly reluctant to that, because we’d stealthily force every user >> into trusting our substitute servers. OTOH I agree that the current >> situation is not optimal. >> >> What do people think? > > Maybe we could find a mid-way here by doing the same as Fedora does with > RPMfusion repositories: It asks the user for trusting the signing keys > before enabling the repository. > > So in our case it would be something like: > $ guix package -i emacs > A `substitute' is available for this package on > https://mirror.hydra.gnu.org. This means we can download the binary > output for this package, instead of compiling it from its source code. > Do you want to use this substitute server with key ... for this package, > and for future packages? [y/N] It cannot work this way because the decision has to be made by the sysadmin, not by unprivileged users. Also, I like that ‘guix package’ is non-interactive. Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What's next? 2017-05-30 15:19 ` Ludovic Courtès @ 2017-05-30 20:15 ` Pjotr Prins 0 siblings, 0 replies; 83+ messages in thread From: Pjotr Prins @ 2017-05-30 20:15 UTC (permalink / raw) To: Ludovic Court??s; +Cc: guix-devel On Tue, May 30, 2017 at 05:19:09PM +0200, Ludovic Courtes wrote: > > A `substitute' is available for this package on > > https://mirror.hydra.gnu.org. This means we can download the binary > > output for this package, instead of compiling it from its source code. > > Do you want to use this substitute server with key ... for this package, > > and for future packages? [y/N] > > It cannot work this way because the decision has to be made by the > sysadmin, not by unprivileged users. The first time guix is run it is by a system administrator (almost 100% certain), typically from a binary installation. > Also, I like that 'guix package' is non-interactive. Sure. But it is a step that is not required on GuixSD. The key comes with the base install of the guix package. Can't we just fetch the key from the store? Why does it have to be /etc? First look in /etc. If that does not exist, fetch from the guix package itself. It is there. /etc overrides the key in the store. Now it is a needless manual step. I say, it is an easy thing to automate. Automate if you can. Maybe not the highest priority, but if we come with a solution it should be easy to do. Pj. -- ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What's next? 2017-05-28 20:48 ` Ludovic Courtès 2017-05-28 22:05 ` Roel Janssen @ 2017-05-29 2:31 ` Maxim Cournoyer 1 sibling, 0 replies; 83+ messages in thread From: Maxim Cournoyer @ 2017-05-29 2:31 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel ludo@gnu.org (Ludovic Courtès) writes: > Pjotr Prins <pjotr.public12@thebird.nl> skribis: > >> On Sat, May 27, 2017 at 12:16:45PM +0200, Ludovic Court??s wrote: >>> On GuixSD, the key of hydra.gnu.org and bayfront.guixsd.org are always >>> registered by default. We cannot do that for someone installing Guix on >>> a foreign distro because that involves creating a file in /etc. >> >> Many installs are not on GuixSD. Can't we use the key that is stored >> in the store itself? If /etc does not exist then use what comes >> with the installation. > > The current behavior is to print a warning when /etc/guix/acl (the list > of authorized keys) is empty or nonexistent. > > Your suggestion would be to automatically populate it, right? > > I’m mildly reluctant to that, because we’d stealthily force every user > into trusting our substitute servers. OTOH I agree that the current > situation is not optimal. > Maybe there could be a prompt that tells the user the current message (no keys in /etc/guix/acl) and then asks them if they'd like to register the default Guix substitute server keys? That'd be a middle ground solution. Maxim ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What???s next? 2017-05-27 10:16 ` Ludovic Courtès 2017-05-28 7:30 ` What's next? Pjotr Prins @ 2017-05-28 20:37 ` Maxim Cournoyer 2017-05-28 21:34 ` Ricardo Wurmus 2017-05-30 15:14 ` Ludovic Courtès 1 sibling, 2 replies; 83+ messages in thread From: Maxim Cournoyer @ 2017-05-28 20:37 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Hello, ludo@gnu.org (Ludovic Courtès) writes: [...] > On GuixSD, the key of hydra.gnu.org and bayfront.guixsd.org are always > registered by default. We cannot do that for someone installing Guix on > a foreign distro because that involves creating a file in /etc. The bayfront key is now registered by default? Does it mean that bayfront is ready to be part of the `%default-substitute-urls'? It doesn't seem to be the case currently: --8<---------------cut here---------------start------------->8--- (define %default-substitute-urls ;; Default list of substituters. This is *not* the list baked in ;; 'guix-daemon', but it is used by 'guix-service-type' and and a couple of ;; clients ('guix build --log-file' uses it.) (map (if (false-if-exception (resolve-interface '(gnutls))) (cut string-append "https://" <>) (cut string-append "http://" <>)) '("mirror.hydra.gnu.org"))) --8<---------------cut here---------------end--------------->8--- Maxim ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What???s next? 2017-05-28 20:37 ` What???s next? Maxim Cournoyer @ 2017-05-28 21:34 ` Ricardo Wurmus 2017-05-30 15:14 ` Ludovic Courtès 1 sibling, 0 replies; 83+ messages in thread From: Ricardo Wurmus @ 2017-05-28 21:34 UTC (permalink / raw) To: Maxim Cournoyer; +Cc: guix-devel Maxim Cournoyer <maxim.cournoyer@gmail.com> writes: > Hello, > > ludo@gnu.org (Ludovic Courtès) writes: > > [...] > >> On GuixSD, the key of hydra.gnu.org and bayfront.guixsd.org are always >> registered by default. We cannot do that for someone installing Guix on >> a foreign distro because that involves creating a file in /etc. > > The bayfront key is now registered by default? Does it mean that > bayfront is ready to be part of the `%default-substitute-urls'? It > doesn't seem to be the case currently: No, but the mirror may soon be distributing substitutes that have been created on and signed by bayfront. -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What???s next? 2017-05-28 20:37 ` What???s next? Maxim Cournoyer 2017-05-28 21:34 ` Ricardo Wurmus @ 2017-05-30 15:14 ` Ludovic Courtès 1 sibling, 0 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-05-30 15:14 UTC (permalink / raw) To: Maxim Cournoyer; +Cc: guix-devel Hi, Maxim Cournoyer <maxim.cournoyer@gmail.com> skribis: > ludo@gnu.org (Ludovic Courtès) writes: > > [...] > >> On GuixSD, the key of hydra.gnu.org and bayfront.guixsd.org are always >> registered by default. We cannot do that for someone installing Guix on >> a foreign distro because that involves creating a file in /etc. > > The bayfront key is now registered by default? Yes! > Does it mean that bayfront is ready to be part of the > `%default-substitute-urls'? Not yet! Currently it only builds for x86_64/i686, it doesn’t offload anywhere, etc. But the fact that it’s registered means that we should eventually be able to transition transparently (for GuixSD users at least). Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 21:45 ` Leo Famulari 2017-05-25 8:11 ` What???s next? Pjotr Prins @ 2017-05-25 14:57 ` Chris Marusich 2017-05-25 18:32 ` Leo Famulari 2017-05-25 20:01 ` Ricardo Wurmus 1 sibling, 2 replies; 83+ messages in thread From: Chris Marusich @ 2017-05-25 14:57 UTC (permalink / raw) To: Leo Famulari; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 694 bytes --] Leo Famulari <leo@famulari.name> writes: > So, I use and recommend `guix pull`! I use it too. Statements by others in this thread that "nobody" uses it or that "everyone" is using Git are mistaken. I use Git when I want to hack on Guix. Otherwise, I use 'guix pull'. IMO, the biggest problem with 'guix pull' is that there is no easy rollback. I can live with long execution times (--fallback is fine, but it'd be nice if substitutes were available more often), and I can live with 'guix pull' causing me to get a version of guix that's broken somehow, but the inability to easily roll back when things go south makes me hesitant to run 'guix pull' regularly. -- Chris [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-25 14:57 ` What’s next? Chris Marusich @ 2017-05-25 18:32 ` Leo Famulari 2017-05-25 20:01 ` Ricardo Wurmus 1 sibling, 0 replies; 83+ messages in thread From: Leo Famulari @ 2017-05-25 18:32 UTC (permalink / raw) To: Chris Marusich; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 669 bytes --] On Thu, May 25, 2017 at 07:57:41AM -0700, Chris Marusich wrote: > I use Git when I want to hack on Guix. Otherwise, I use 'guix pull'. > IMO, the biggest problem with 'guix pull' is that there is no easy > rollback. I can live with long execution times (--fallback is fine, but > it'd be nice if substitutes were available more often), and I can live > with 'guix pull' causing me to get a version of guix that's broken > somehow, but the inability to easily roll back when things go south > makes me hesitant to run 'guix pull' regularly. It's not "easy rollback", but you can at least use it to deploy any Guix commit, from any source, with the '--url=' argument. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-25 14:57 ` What’s next? Chris Marusich 2017-05-25 18:32 ` Leo Famulari @ 2017-05-25 20:01 ` Ricardo Wurmus 2017-05-25 20:41 ` Adonay Felipe Nogueira 2017-05-27 10:13 ` Ludovic Courtès 1 sibling, 2 replies; 83+ messages in thread From: Ricardo Wurmus @ 2017-05-25 20:01 UTC (permalink / raw) To: Chris Marusich; +Cc: guix-devel Chris Marusich <cmmarusich@gmail.com> writes: > Leo Famulari <leo@famulari.name> writes: > >> So, I use and recommend `guix pull`! > > I use it too. Statements by others in this thread that "nobody" uses it > or that "everyone" is using Git are mistaken. > > I use Git when I want to hack on Guix. Otherwise, I use 'guix pull'. > IMO, the biggest problem with 'guix pull' is that there is no easy > rollback. I can live with long execution times (--fallback is fine, but > it'd be nice if substitutes were available more often), and I can live > with 'guix pull' causing me to get a version of guix that's broken > somehow, but the inability to easily roll back when things go south > makes me hesitant to run 'guix pull' regularly. I believe this can be fixed by adding more links to “.config/guix”, i.e. before creating “latest” it would create “2017-05-24:08:21:01.123” and then link from there to “latest”. On update it would create a new link “2017-05-25:17:45:45.123” and link that to latest. Roll back would be a matter of pointing “2017-05-24:08:21:01.123” to “latest”. (“latest” should be renamed to “current” to better match the intent in this case.) Timestamped names like this are ugly, but that’s what’s at the top of my head. -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-25 20:01 ` Ricardo Wurmus @ 2017-05-25 20:41 ` Adonay Felipe Nogueira 2017-05-27 10:13 ` Ludovic Courtès 1 sibling, 0 replies; 83+ messages in thread From: Adonay Felipe Nogueira @ 2017-05-25 20:41 UTC (permalink / raw) To: guix-devel I think we can try either using: - ISO dates: [Full year number]-[Two digit month number]-[Two digit day number]T[Two digit hour in 24-hour clock]:[Two digit minutes]:[Two digit seconds] - A numeric sufix: Like "latest.1" for the first generation, "latest.2" for the second, and so on, and "latest" for the numbered backup being considered as current. Thus, the date and time information would be kept in the file metadata, not in the name, specially considering that names with ":" might be problematic in some file systems. I of course don't know, from a developer point of view, what is the best option, but I thought about giving my "personal" two cents on the matter. :) -- - [[https://libreplanet.org/wiki/User:Adfeno]] - Palestrante e consultor sobre /software/ livre (não confundir com gratis). - "WhatsApp"? Ele não é livre, por isso não uso. Iguais a ele prefiro GNU Ring, ou Tox. Quer outras formas de contato? Adicione o vCard que está no endereço acima aos teus contatos. - Pretende me enviar arquivos .doc, .ppt, .cdr, ou .mp3? OK, eu aceito, mas não repasso. Entrego apenas em formatos favoráveis ao /software/ livre. Favor entrar em contato em caso de dúvida. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-25 20:01 ` Ricardo Wurmus 2017-05-25 20:41 ` Adonay Felipe Nogueira @ 2017-05-27 10:13 ` Ludovic Courtès 2017-05-29 23:28 ` myglc2 2017-06-08 14:35 ` Ricardo Wurmus 1 sibling, 2 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-05-27 10:13 UTC (permalink / raw) To: Ricardo Wurmus; +Cc: guix-devel Ricardo Wurmus <rekado@elephly.net> skribis: > Chris Marusich <cmmarusich@gmail.com> writes: > >> Leo Famulari <leo@famulari.name> writes: >> >>> So, I use and recommend `guix pull`! >> >> I use it too. Statements by others in this thread that "nobody" uses it >> or that "everyone" is using Git are mistaken. >> >> I use Git when I want to hack on Guix. Otherwise, I use 'guix pull'. >> IMO, the biggest problem with 'guix pull' is that there is no easy >> rollback. I can live with long execution times (--fallback is fine, but >> it'd be nice if substitutes were available more often), and I can live >> with 'guix pull' causing me to get a version of guix that's broken >> somehow, but the inability to easily roll back when things go south >> makes me hesitant to run 'guix pull' regularly. > > I believe this can be fixed by adding more links to “.config/guix”, > i.e. before creating “latest” it would create “2017-05-24:08:21:01.123” > and then link from there to “latest”. On update it would create a new > link “2017-05-25:17:45:45.123” and link that to latest. Roll back would > be a matter of pointing “2017-05-24:08:21:01.123” to “latest”. There would be some similarity with profiles. Should we simply use profiles, and effectively turn ~/.config/guix/latest into a profile, with generations etc.? Food for thought… :-) Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-27 10:13 ` Ludovic Courtès @ 2017-05-29 23:28 ` myglc2 2017-06-08 14:35 ` Ricardo Wurmus 1 sibling, 0 replies; 83+ messages in thread From: myglc2 @ 2017-05-29 23:28 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel On 05/27/2017 at 12:13 Ludovic Courtès writes: > Ricardo Wurmus <rekado@elephly.net> skribis: > >> Chris Marusich <cmmarusich@gmail.com> writes: >> >>> Leo Famulari <leo@famulari.name> writes: >>> >>>> So, I use and recommend `guix pull`! >>> >>> I use it too. Statements by others in this thread that "nobody" uses it >>> or that "everyone" is using Git are mistaken. >>> >>> I use Git when I want to hack on Guix. Otherwise, I use 'guix pull'. >>> IMO, the biggest problem with 'guix pull' is that there is no easy >>> rollback. I can live with long execution times (--fallback is fine, but >>> it'd be nice if substitutes were available more often), and I can live >>> with 'guix pull' causing me to get a version of guix that's broken >>> somehow, but the inability to easily roll back when things go south >>> makes me hesitant to run 'guix pull' regularly. >> >> I believe this can be fixed by adding more links to “.config/guix”, >> i.e. before creating “latest” it would create “2017-05-24:08:21:01.123” >> and then link from there to “latest”. On update it would create a new >> link “2017-05-25:17:45:45.123” and link that to latest. Roll back would >> be a matter of pointing “2017-05-24:08:21:01.123” to “latest”. > > There would be some similarity with profiles. Should we simply use > profiles, and effectively turn ~/.config/guix/latest into a profile, > with generations etc.? +1 ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-27 10:13 ` Ludovic Courtès 2017-05-29 23:28 ` myglc2 @ 2017-06-08 14:35 ` Ricardo Wurmus 1 sibling, 0 replies; 83+ messages in thread From: Ricardo Wurmus @ 2017-06-08 14:35 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Ludovic Courtès <ludo@gnu.org> writes: > Ricardo Wurmus <rekado@elephly.net> skribis: > >> Chris Marusich <cmmarusich@gmail.com> writes: >> >>> Leo Famulari <leo@famulari.name> writes: >>> >>>> So, I use and recommend `guix pull`! >>> >>> I use it too. Statements by others in this thread that "nobody" uses it >>> or that "everyone" is using Git are mistaken. >>> >>> I use Git when I want to hack on Guix. Otherwise, I use 'guix pull'. >>> IMO, the biggest problem with 'guix pull' is that there is no easy >>> rollback. I can live with long execution times (--fallback is fine, but >>> it'd be nice if substitutes were available more often), and I can live >>> with 'guix pull' causing me to get a version of guix that's broken >>> somehow, but the inability to easily roll back when things go south >>> makes me hesitant to run 'guix pull' regularly. >> >> I believe this can be fixed by adding more links to “.config/guix”, >> i.e. before creating “latest” it would create “2017-05-24:08:21:01.123” >> and then link from there to “latest”. On update it would create a new >> link “2017-05-25:17:45:45.123” and link that to latest. Roll back would >> be a matter of pointing “2017-05-24:08:21:01.123” to “latest”. > > There would be some similarity with profiles. Should we simply use > profiles, and effectively turn ~/.config/guix/latest into a profile, > with generations etc.? That’s not a bad idea! It sure beats messing with a single link and it makes it possible to more easily manage different versions of Guix. -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: What’s next? 2017-05-24 16:25 ` Jan Nieuwenhuizen ` (2 preceding siblings ...) 2017-05-24 21:45 ` Leo Famulari @ 2017-05-27 10:09 ` Ludovic Courtès 3 siblings, 0 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-05-27 10:09 UTC (permalink / raw) To: Jan Nieuwenhuizen; +Cc: guix-devel Hi! Jan Nieuwenhuizen <janneke@gnu.org> skribis: > A friend of mine is having a second look at Guix (not SD yet) and one of > the most confusing things initially is `guix pull'. "When/how do I use > that," he asks...and I can only say: I'm not using that...I think we > want this to work--or something like this, we talked about this at > FOSDEM, but AFAIK everyone is using Guix with Git. > > He responds with: then *why* is it in the manual. I have no answer. > Possibly I'm wrong and/or my information is outdated? I think there’s a lot of (well deserved, as far as its implementation goes) badmouthing against ‘guix pull’ on #guix ;-), but nevertheless, I think it’s a useful tool for users who don’t want to manage their own Guix checkout etc. by themselves. The manual does mention in several places what it’s for, I think. Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Release! 2017-05-24 13:11 What’s next? Ludovic Courtès ` (3 preceding siblings ...) 2017-05-24 16:25 ` Jan Nieuwenhuizen @ 2017-10-04 15:12 ` Ludovic Courtès 2017-10-05 19:18 ` Release! Christopher Baines 2017-10-06 18:30 ` Release! Ricardo Wurmus 4 siblings, 2 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-10-04 15:12 UTC (permalink / raw) To: guix-devel, Danny Milosavljevic, Ricardo Wurmus Hello Guix! ludo@gnu.org (Ludovic Courtès) skribis: > I think it’s time to think about what we want to work on next, ideally > before the next release, and ideally said release should be in a couple > of months rather than in 5 months. Oops, that was 5 months ago… :-) > Here are some important items I can think of: > > • Merge the ncurses installer (the ‘wip-installer’) branch. > > • We’re supposed to freeze ‘core-updates’ in a couple of days and we > have defined a couple of important goals: > <https://lists.gnu.org/archive/html/guix-devel/2017-04/msg00120.html>. > I have a vague feeling that the ‘wip-build-systems-gexp’ merge is > not for this time yet… > > • ‘guix offload’ terrible bug: <https://bugs.gnu.org/26976>. > > • Guile 2.2 compiler terrible issue: > <https://lists.gnu.org/archive/html/guile-devel/2017-05/msg00033.html>. > > • Adjust the release process so we don’t find ourselves without > substitutes for the ‘guix’ package, as reported at > <https://bugs.gnu.org/27032>. > > • Prepare to migrate to the new build farm: the hardware of > bayfront.guixsd.org has been fixed (it was unreliable until we > changed its CPUs), so now we need to fix a couple of issues in > Cuirass and generally improve it so we can, via its HTTP interface, > add new jobsets and so on. Of course we’ll have to work > on that incrementally. > > • Finalize the new bootloader API and support for new bootloaders: > <https://bugs.gnu.org/26339>. > > • Merge the potluck! <https://bugs.gnu.org/26645> Good news is that we made progress on some of these issues, but not all; we also made progress on other things which are really cool, such as the ISO installer. Regardless, I think we should be planning for a release within a couple of weeks. An important question to me is ‘wip-installer’: what do we do, Danny? John? I would have loved to have a fix to at least mitigate Guile’s compiler resource consumption issue. I made some progress at <https://bugs.gnu.org/28590> notably, but it’s not over yet. In the meantime, it would be great if people could run an installation from an ISO image and report bugs and glitches: https://www.gnu.org/software/guix/manual/html_node/Building-the-Installation-Image.html Thoughts? Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-04 15:12 ` Release! Ludovic Courtès @ 2017-10-05 19:18 ` Christopher Baines 2017-10-06 13:01 ` Release! Ludovic Courtès 2017-10-06 18:30 ` Release! Ricardo Wurmus 1 sibling, 1 reply; 83+ messages in thread From: Christopher Baines @ 2017-10-05 19:18 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 1423 bytes --] On Wed, 04 Oct 2017 17:12:36 +0200 ludo@gnu.org (Ludovic Courtès) wrote: > In the meantime, it would be great if people could run an installation > from an ISO image and report bugs and glitches: > > https://www.gnu.org/software/guix/manual/html_node/Building-the-Installation-Image.html > > Thoughts? Unfortunately, building the ISO image has broken since I was successfully using it [1]. One other issue I was thinking of recently was the size of the image. I checked an ISO of the installation system I generated a while ago, and it's 1.1GB in size. A actual CD can only hold 0.7GB of data. This might be something that just needs documenting, saying that this is for a DVD, and not a CD, or, it the size could be reduced so that it fits on a CD. When I build the installation system, and run guix size, it says 1031.0 MiB, so I guess looking at the breakdown there and trying to reduce it would be a way to start, if this is a worthwhile objective. I don't have any use for a physical CD installation image, so if anyone is interested in having this, now is the time to say so? 1: guix system disk-image --file-system-type=iso9660 gnu/system/install.scm error: changing mode of `/tmp/root//gnu/store/jjna4ivyidxfq40mq78g97yzg0wfzcqy-shadow-4.5/bin/su' to 100555: Operation not permitted ERROR: In procedure scm-error: ERROR: failed to register store items "/xchg/system" [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 963 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-05 19:18 ` Release! Christopher Baines @ 2017-10-06 13:01 ` Ludovic Courtès 2017-10-09 7:25 ` Release! Christopher Baines 0 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2017-10-06 13:01 UTC (permalink / raw) To: Christopher Baines; +Cc: guix-devel Heya! Christopher Baines <mail@cbaines.net> skribis: > Unfortunately, building the ISO image has broken since I was > successfully using it [1]. Oops, weird. Let’s investigate. > One other issue I was thinking of recently was the size of the image. I > checked an ISO of the installation system I generated a while ago, and > it's 1.1GB in size. A actual CD can only hold 0.7GB of data. This might > be something that just needs documenting, saying that this is for a > DVD, and not a CD, or, it the size could be reduced so that it fits on > a CD. > > When I build the installation system, and run guix size, it says 1031.0 > MiB, so I guess looking at the breakdown there and trying to reduce it > would be a way to start, if this is a worthwhile objective. We can do both. :-) I think reducing the size of package closures in general is worthwhile—there’s room for progress. Yet, we probably won’t make it fit in 650 MiB this easily, so we should document this. Thanks for your feedback, Ludo’. > 1: guix system disk-image --file-system-type=iso9660 > gnu/system/install.scm > > error: changing mode of > `/tmp/root//gnu/store/jjna4ivyidxfq40mq78g97yzg0wfzcqy-shadow-4.5/bin/su' > to 100555: Operation not permitted ERROR: In procedure scm-error: > ERROR: failed to register store items "/xchg/system" ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-06 13:01 ` Release! Ludovic Courtès @ 2017-10-09 7:25 ` Christopher Baines 2017-10-09 16:25 ` Release! Ludovic Courtès 0 siblings, 1 reply; 83+ messages in thread From: Christopher Baines @ 2017-10-09 7:25 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 524 bytes --] On Fri, 06 Oct 2017 15:01:42 +0200 ludo@gnu.org (Ludovic Courtès) wrote: > Heya! > > Christopher Baines <mail@cbaines.net> skribis: > > > Unfortunately, building the ISO image has broken since I was > > successfully using it [1]. > > Oops, weird. Let’s investigate. I'm very glad that now I've removed the setuid binaries from the store, the building of the ISO image, and the associated iso-image-installer system test are now working for me :) Thanks for investigating and fixing this Ludo :D [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 963 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-09 7:25 ` Release! Christopher Baines @ 2017-10-09 16:25 ` Ludovic Courtès 0 siblings, 0 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-10-09 16:25 UTC (permalink / raw) To: Christopher Baines; +Cc: guix-devel Christopher Baines <mail@cbaines.net> skribis: > On Fri, 06 Oct 2017 15:01:42 +0200 > ludo@gnu.org (Ludovic Courtès) wrote: > >> Heya! >> >> Christopher Baines <mail@cbaines.net> skribis: >> >> > Unfortunately, building the ISO image has broken since I was >> > successfully using it [1]. >> >> Oops, weird. Let’s investigate. > > I'm very glad that now I've removed the setuid binaries from the store, > the building of the ISO image, and the associated iso-image-installer > system test are now working for me :) Awesome, thanks for checking! I really didn’t expect such a bug to crop up… Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-04 15:12 ` Release! Ludovic Courtès 2017-10-05 19:18 ` Release! Christopher Baines @ 2017-10-06 18:30 ` Ricardo Wurmus 2017-10-06 23:31 ` Release! David Pirotte ` (4 more replies) 1 sibling, 5 replies; 83+ messages in thread From: Ricardo Wurmus @ 2017-10-06 18:30 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Hi Ludo, >> Here are some important items I can think of: […] >> • Guile 2.2 compiler terrible issue: >> <https://lists.gnu.org/archive/html/guile-devel/2017-05/msg00033.html>. One way to side-step this issue for the upcoming release is to use one Guile process per file when running “guix pull”. This will make it run a lot slower, but that would be better than the current situation. Maybe we could make parallel compilation within the same Guile process an option, so that it won’t be needlessly slow on machines within the RAM goldilocks zone. I’ve reverted f07041f7d25badb7d74b8fad6ee446a12af04f63 locally on my i686 netbook with 1GB RAM and tested it with “guix pull --url=/path/to/guix”. This seems to work — it’s still running… :) One annoyance is that after compiling one file it prints this message: Some deprecated features have been used. Set the environment variable GUILE_WARN_DEPRECATED to "detailed" and rerun the program to get more information. Set it to "no" to suppress this message. I suppose we should suppress this for “guix pull”. Do you want to make this behaviour optional, e.g. through a command line switch like “--sloth”? Or should this be the default until the problem in Guile/libgc is fixed? >> • Prepare to migrate to the new build farm: the hardware of >> bayfront.guixsd.org has been fixed (it was unreliable until we >> changed its CPUs), so now we need to fix a couple of issues in >> Cuirass and generally improve it so we can, via its HTTP interface, >> add new jobsets and so on. Of course we’ll have to work >> on that incrementally. I guess we’ll be using berlin.guixsd.org instead of bayfront, no? I’m currently installing additional servers (we’re now at 13 build servers, I’ll get this up to 18 this week). >> • Merge the potluck! <https://bugs.gnu.org/26645> About that… We now have a JSON importer, so maybe it’s worth using the even simpler JSON package format instead of the simplified S-expression format that Andy proposed. What do you think? Should we discuss this at <https://bugs.gnu.org/26645>? Who would like to help us squash some bugs before the release? Let’s try to fix at least 5 more bugs! -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-06 18:30 ` Release! Ricardo Wurmus @ 2017-10-06 23:31 ` David Pirotte 2017-10-07 9:18 ` Release! Hartmut Goebel 2017-10-07 21:30 ` Release! Ricardo Wurmus 2017-10-07 4:06 ` [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) Mark H Weaver ` (3 subsequent siblings) 4 siblings, 2 replies; 83+ messages in thread From: David Pirotte @ 2017-10-06 23:31 UTC (permalink / raw) To: Ricardo Wurmus; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 805 bytes --] Hi Recardo, Hi Ludo, > >> • Merge the potluck! <https://bugs.gnu.org/26645> > About that… We now have a JSON importer, so maybe it’s worth using the > even simpler JSON package format instead of the simplified S-expression > format that Andy proposed. What do you think? Should we discuss this > at <https://bugs.gnu.org/26645>? FWIW, I much prefer s-exp, and the generated file is a scheme file right? I very much doubt guix and potluck package developers can't easily read (and write :)) s-exp, so why would we 'abandon' s-exp, what would we win here? These files will never be processed by anything else but guix and/or potluck, and the 'package developers' do all know scheme perfectly well... my 2c :) Thanks for the fantastic work, both Guix and potluck! David [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 488 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-06 23:31 ` Release! David Pirotte @ 2017-10-07 9:18 ` Hartmut Goebel 2017-10-07 12:21 ` Release! David Pirotte 2017-10-07 21:30 ` Release! Ricardo Wurmus 1 sibling, 1 reply; 83+ messages in thread From: Hartmut Goebel @ 2017-10-07 9:18 UTC (permalink / raw) To: guix-devel Am 07.10.2017 um 01:31 schrieb David Pirotte: > so why would we 'abandon' s-exp, what would we win here? It might be interesting to *create* these files using tools written in other programming languages. And modules for creating *JSON* are available for most programming languages. (OTOH TOML[]1] could be a better format than JSON – it's much like .ini-files, but more formal specification. A scheme implementation is available [2].) [1] https://en.wikipedia.org/wiki/TOML [2] 0f52bab3e3cfeb261110f9217c39eb03e78d026a -- Regards Hartmut Goebel | Hartmut Goebel | h.goebel@crazy-compilers.com | | www.crazy-compilers.com | compilers which you thought are impossible | ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-07 9:18 ` Release! Hartmut Goebel @ 2017-10-07 12:21 ` David Pirotte 0 siblings, 0 replies; 83+ messages in thread From: David Pirotte @ 2017-10-07 12:21 UTC (permalink / raw) To: Hartmut Goebel; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 1350 bytes --] Hello Hartmut, > > so why would we 'abandon' s-exp, what would we win here? > It might be interesting to *create* these files using tools written in > other programming languages. And modules for creating *JSON* are > available for most programming languages. But that would be another tool, another package manager, not potluck... written by we don't know who, neither when ... and that would be a totally separate effort, that would not contribute to potluck ... which needs help (I wish I had the time...) Potluck package definitions are generated, adjusted 'by hand' - mostly to update the description, sometimes the copyright - then that is used to generated a Guix package, which is a Guile scheme module: It makes no sense to me that the potluck package representation would be anything but s-expr: actually, most guilers do the exact opposite :) - when an app or a lib either produces or needs xml, html, json ... the first thing they do is to transform these into s-expr, so these become (a lot more) readable and hackable ... > (OTOH TOML[]1] could be a better format than JSON – it's much like > .ini-files, but more formal specification... Absolutely terrible :):) I hope we never do that, at least not for the 'official' and maintained potluck package representation. Again, my 2c. David [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 488 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-06 23:31 ` Release! David Pirotte 2017-10-07 9:18 ` Release! Hartmut Goebel @ 2017-10-07 21:30 ` Ricardo Wurmus 2017-10-08 13:08 ` Release! Hartmut Goebel 1 sibling, 1 reply; 83+ messages in thread From: Ricardo Wurmus @ 2017-10-07 21:30 UTC (permalink / raw) To: David Pirotte; +Cc: guix-devel, Andy Wingo Hi David, >> >> • Merge the potluck! <https://bugs.gnu.org/26645> > >> About that… We now have a JSON importer, so maybe it’s worth using the >> even simpler JSON package format instead of the simplified S-expression >> format that Andy proposed. What do you think? Should we discuss this >> at <https://bugs.gnu.org/26645>? > > FWIW, I much prefer s-exp, and the generated file is a scheme file right? I very > much doubt guix and potluck package developers can't easily read (and write :)) > s-exp, so why would we 'abandon' s-exp, what would we win here? These files will > never be processed by anything else but guix and/or potluck, and the 'package > developers' do all know scheme perfectly well... I’m not saying that JSON is “better” than s-exps. Part of the potluck effort as I understood it is to simplify packaging. The potluck package definition is strictly simpler than Guix package definitions in that there’s less boilerplate and inputs are really just strings. Taking that aspect of simplifying packaging even farther we can reduce the syntax even more. The target audience here has little overlap with Guix developers. Guix won’t adopt JSON as a packaging format; that’s not what this is about. The goal I had in mind when I worked on the JSON importer was to make packaging even simpler for people who don’t really care all that much about packaging — if they did they would probably want to learn about how to contribute to Guix, and thus would want to learn the S-expr syntax we use in Guix. There are users of Guix who benefit from its features as a personal package manager. Users can already add their own packages via GUIX_PACKAGE_PATH. We support those who don’t feel comfortable writing Scheme by offering a JSON importer; with just a minor change to “guix build” we can even build JSON packages directly, without making people convert them to Scheme modules first. I think that this feature can be useful within the context of the potluck. -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-07 21:30 ` Release! Ricardo Wurmus @ 2017-10-08 13:08 ` Hartmut Goebel 0 siblings, 0 replies; 83+ messages in thread From: Hartmut Goebel @ 2017-10-08 13:08 UTC (permalink / raw) To: guix-devel Am 07.10.2017 um 23:30 schrieb Ricardo Wurmus: > The target audience here has little overlap with Guix developers. […] > The goal I had in mind when I worked on the JSON importer was to make > packaging even simpler for people who don’t really care all that much > about packaging – […] +1 -- Regards Hartmut Goebel | Hartmut Goebel | h.goebel@crazy-compilers.com | | www.crazy-compilers.com | compilers which you thought are impossible | ^ permalink raw reply [flat|nested] 83+ messages in thread
* [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) 2017-10-06 18:30 ` Release! Ricardo Wurmus 2017-10-06 23:31 ` Release! David Pirotte @ 2017-10-07 4:06 ` Mark H Weaver 2017-10-07 19:35 ` Efraim Flashner ` (2 more replies) 2017-10-09 7:53 ` Release! Ludovic Courtès ` (2 subsequent siblings) 4 siblings, 3 replies; 83+ messages in thread From: Mark H Weaver @ 2017-10-07 4:06 UTC (permalink / raw) To: Ricardo Wurmus; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 1461 bytes --] Ricardo Wurmus <rekado@elephly.net> writes: > Hi Ludo, > >>> Here are some important items I can think of: > […] >>> • Guile 2.2 compiler terrible issue: >>> <https://lists.gnu.org/archive/html/guile-devel/2017-05/msg00033.html>. > > One way to side-step this issue for the upcoming release is to use one > Guile process per file when running “guix pull”. This will make it run > a lot slower, but that would be better than the current situation. I've attached a workaround that I've been using for the last 6 weeks on my MIPS-based Yeeloong running GuixSD, since it only has 1 GB of RAM and otherwise it would not be able to successfully build the 'guix' package. Note that I never use 'guix pull', so I'm not sure off-hand whether this solves the problem there, but it certainly greatly reduces the memory needed to run 'make' and thus to build the 'guix' package. This patch modifies build-aux/compile-all.scm to work as follows: after loading all modules in the parent process, it then forks off a child and compiles 20 modules in parallel within that child while the parent waits. When the child is finished compiling those 20 modules, the child exits (thus freeing the memory leaked during compilation), and then the parent spawns a new child to compile the next 20 modules, and so on, until all the modules are compiled. We should probably consider applying this to master. Thoughts? Mark [-- Attachment #2: [PATCH] DRAFT: build: Compile scheme modules in batches --] [-- Type: text/x-patch, Size: 3684 bytes --] From 05d5581ff71eb3b48773a5d46b612202de0492fb Mon Sep 17 00:00:00 2001 From: Mark H Weaver <mhw@netris.org> Date: Tue, 22 Aug 2017 03:26:10 -0400 Subject: [PATCH] DRAFT: build: Compile scheme modules in batches. --- build-aux/compile-all.scm | 48 ++++++++++++++++++++++++++++++++++++++++------- 1 file changed, 41 insertions(+), 7 deletions(-) diff --git a/build-aux/compile-all.scm b/build-aux/compile-all.scm index 147bb8019..96658e069 100644 --- a/build-aux/compile-all.scm +++ b/build-aux/compile-all.scm @@ -1,6 +1,7 @@ ;;; GNU Guix --- Functional package management for GNU ;;; Copyright © 2016 Taylan Ulrich Bayırlı/Kammer <taylanbayirli@gmail.com> ;;; Copyright © 2016, 2017 Ludovic Courtès <ludo@gnu.org> +;;; Copyright © 2017 Mark H Weaver <mhw@netris.org> ;;; ;;; This file is part of GNU Guix. ;;; @@ -19,6 +20,7 @@ (use-modules (system base target) (system base message) + (srfi srfi-1) (ice-9 match) (ice-9 threads) (guix build utils)) @@ -118,13 +120,45 @@ ((_ . files) (let ((files (filter file-needs-compilation? files))) (for-each load-module-file files) - (let ((mutex (make-mutex))) - ;; Make sure compilation related modules are loaded before starting to - ;; compile files in parallel. - (compile #f) - (par-for-each (lambda (file) - (compile-file* file mutex)) - files))))) + ;; Make sure compilation related modules are loaded before starting to + ;; compile files in parallel. + (compile #f) + ;; Flush all ports before entering the fork loop, to avoid flushing them + ;; more than once within the child processes created below. + (flush-all-ports) + + ;; FIXME The following loop works around the apparent memory leak in the + ;; compiler of guile-2.2.2, where compiling scheme modules requires + ;; increasing amounts of memory, up to nearly 2 gigabytes when all guix + ;; sources are compiled within a single process. + ;; + ;; Ideally, we would simply apply 'par-for-each' to the entire set of + ;; files. For now, to work around the memory leak, we spawn subprocesses + ;; to compile the files in batches of up to 20 files each. + (let fork-loop ((files files)) + (unless (null? files) + (call-with-values (lambda () + (split-at files (min 20 (length files)))) + (lambda (current-batch remaining-files) + ;; IMPORTANT: as noted in the Guile manual, it is unsafe to fork a + ;; process that has multiple threads running. Here we avoid this + ;; difficulty by spawning threads only within the child processes, + ;; which never call fork. + (match (primitive-fork) + (0 + ;; This is the child. It spawns threads but never forks. + (let ((mutex (make-mutex))) + (par-for-each (lambda (file) + (compile-file* file mutex)) + current-batch)) + (primitive-exit)) + (child-pid + ;; This is the parent. It forks but never spawns threads. + (match (waitpid child-pid) + ((_ . 0) + (fork-loop remaining-files)) + ((_ . status) + (primitive-exit (or (status:exit-val status) 1))))))))))))) ;;; Local Variables: ;;; eval: (put 'with-target 'scheme-indent-function 1) -- 2.14.1 ^ permalink raw reply related [flat|nested] 83+ messages in thread
* Re: [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) 2017-10-07 4:06 ` [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) Mark H Weaver @ 2017-10-07 19:35 ` Efraim Flashner 2017-10-08 9:19 ` Ricardo Wurmus 2017-10-09 7:42 ` Ludovic Courtès 2 siblings, 0 replies; 83+ messages in thread From: Efraim Flashner @ 2017-10-07 19:35 UTC (permalink / raw) To: Mark H Weaver; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 2121 bytes --] On Sat, Oct 07, 2017 at 12:06:51AM -0400, Mark H Weaver wrote: > Ricardo Wurmus <rekado@elephly.net> writes: > > > Hi Ludo, > > > >>> Here are some important items I can think of: > > […] > >>> • Guile 2.2 compiler terrible issue: > >>> <https://lists.gnu.org/archive/html/guile-devel/2017-05/msg00033.html>. > > > > One way to side-step this issue for the upcoming release is to use one > > Guile process per file when running “guix pull”. This will make it run > > a lot slower, but that would be better than the current situation. > > I've attached a workaround that I've been using for the last 6 weeks on > my MIPS-based Yeeloong running GuixSD, since it only has 1 GB of RAM and > otherwise it would not be able to successfully build the 'guix' package. > > Note that I never use 'guix pull', so I'm not sure off-hand whether this > solves the problem there, but it certainly greatly reduces the memory > needed to run 'make' and thus to build the 'guix' package. > > This patch modifies build-aux/compile-all.scm to work as follows: after > loading all modules in the parent process, it then forks off a child and > compiles 20 modules in parallel within that child while the parent > waits. When the child is finished compiling those 20 modules, the child > exits (thus freeing the memory leaked during compilation), and then the > parent spawns a new child to compile the next 20 modules, and so on, > until all the modules are compiled. > > We should probably consider applying this to master. Thoughts? > > Mark > > Can we give it a set to compile in order? For example building guix/build[-system] and then gnu/build, and then only at the end build gnu/services {guix,gnu}/tests? It might be slightly faster to build the modules that don't pull in gnu/packages/* first and then end with those that would use those modules. -- Efraim Flashner <efraim@flashner.co.il> אפרים פלשנר GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351 Confidentiality cannot be guaranteed on emails sent or received unencrypted [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) 2017-10-07 4:06 ` [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) Mark H Weaver 2017-10-07 19:35 ` Efraim Flashner @ 2017-10-08 9:19 ` Ricardo Wurmus 2017-10-08 12:03 ` Ricardo Wurmus 2017-10-09 7:42 ` Ludovic Courtès 2 siblings, 1 reply; 83+ messages in thread From: Ricardo Wurmus @ 2017-10-08 9:19 UTC (permalink / raw) To: Mark H Weaver; +Cc: guix-devel Hi Mark, > I've attached a workaround that I've been using for the last 6 weeks on > my MIPS-based Yeeloong running GuixSD, since it only has 1 GB of RAM and > otherwise it would not be able to successfully build the 'guix' package. > > Note that I never use 'guix pull', so I'm not sure off-hand whether this > solves the problem there, but it certainly greatly reduces the memory > needed to run 'make' and thus to build the 'guix' package. thank you for this patch. I’m trying it on my i686 with 1GB of RAM now. My own attempt to revert the commit to build all files in one process resulted in a guix pull that would only go to 20.4% and then sit there doing nothing. I’ll report back once I manage to run “guix pull --url=/path/to/guix” with this patch. -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) 2017-10-08 9:19 ` Ricardo Wurmus @ 2017-10-08 12:03 ` Ricardo Wurmus 2017-10-08 13:26 ` Ricardo Wurmus 0 siblings, 1 reply; 83+ messages in thread From: Ricardo Wurmus @ 2017-10-08 12:03 UTC (permalink / raw) To: Mark H Weaver; +Cc: guix-devel Ricardo Wurmus <rekado@elephly.net> writes: >> I've attached a workaround that I've been using for the last 6 weeks on >> my MIPS-based Yeeloong running GuixSD, since it only has 1 GB of RAM and >> otherwise it would not be able to successfully build the 'guix' package. >> >> Note that I never use 'guix pull', so I'm not sure off-hand whether this >> solves the problem there, but it certainly greatly reduces the memory >> needed to run 'make' and thus to build the 'guix' package. > > thank you for this patch. I’m trying it on my i686 with 1GB of RAM now. > My own attempt to revert the commit to build all files in one process > resulted in a guix pull that would only go to 20.4% and then sit there > doing nothing. > > I’ll report back once I manage to run “guix pull --url=/path/to/guix” > with this patch. 20 files at once is still too much when running “guix pull” on my i686 netbook. I tried lowering this to 10 files and still ran out of memory (after 70 minutes of compiling). I’m now trying with 3 files at a time. -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) 2017-10-08 12:03 ` Ricardo Wurmus @ 2017-10-08 13:26 ` Ricardo Wurmus 2017-10-09 7:38 ` Ludovic Courtès 0 siblings, 1 reply; 83+ messages in thread From: Ricardo Wurmus @ 2017-10-08 13:26 UTC (permalink / raw) To: Mark H Weaver; +Cc: guix-devel Ricardo Wurmus <rekado@elephly.net> writes: > Ricardo Wurmus <rekado@elephly.net> writes: > >>> I've attached a workaround that I've been using for the last 6 weeks on >>> my MIPS-based Yeeloong running GuixSD, since it only has 1 GB of RAM and >>> otherwise it would not be able to successfully build the 'guix' package. >>> >>> Note that I never use 'guix pull', so I'm not sure off-hand whether this >>> solves the problem there, but it certainly greatly reduces the memory >>> needed to run 'make' and thus to build the 'guix' package. >> >> thank you for this patch. I’m trying it on my i686 with 1GB of RAM now. >> My own attempt to revert the commit to build all files in one process >> resulted in a guix pull that would only go to 20.4% and then sit there >> doing nothing. >> >> I’ll report back once I manage to run “guix pull --url=/path/to/guix” >> with this patch. Well… I just noticed that guix pull doesn’t even use compile-all.scm; it uses build-self.scm, so this patch has no effect on “guix pull”. I’ll try to come up with another fix for guix pull. -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) 2017-10-08 13:26 ` Ricardo Wurmus @ 2017-10-09 7:38 ` Ludovic Courtès 2017-10-09 11:32 ` Ricardo Wurmus 0 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2017-10-09 7:38 UTC (permalink / raw) To: Ricardo Wurmus; +Cc: guix-devel Ricardo Wurmus <rekado@elephly.net> skribis: > Ricardo Wurmus <rekado@elephly.net> writes: > >> Ricardo Wurmus <rekado@elephly.net> writes: >> >>>> I've attached a workaround that I've been using for the last 6 weeks on >>>> my MIPS-based Yeeloong running GuixSD, since it only has 1 GB of RAM and >>>> otherwise it would not be able to successfully build the 'guix' package. >>>> >>>> Note that I never use 'guix pull', so I'm not sure off-hand whether this >>>> solves the problem there, but it certainly greatly reduces the memory >>>> needed to run 'make' and thus to build the 'guix' package. >>> >>> thank you for this patch. I’m trying it on my i686 with 1GB of RAM now. >>> My own attempt to revert the commit to build all files in one process >>> resulted in a guix pull that would only go to 20.4% and then sit there >>> doing nothing. >>> >>> I’ll report back once I manage to run “guix pull --url=/path/to/guix” >>> with this patch. > > Well… I just noticed that guix pull doesn’t even use compile-all.scm; it > uses build-self.scm, so this patch has no effect on “guix pull”. Right, this should be tested with “make”. If it works fine here, we can port it to (guix build pull). (And factorize it eventually…) Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) 2017-10-09 7:38 ` Ludovic Courtès @ 2017-10-09 11:32 ` Ricardo Wurmus 2017-10-10 6:52 ` Ricardo Wurmus 0 siblings, 1 reply; 83+ messages in thread From: Ricardo Wurmus @ 2017-10-09 11:32 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel >> Well… I just noticed that guix pull doesn’t even use compile-all.scm; it >> uses build-self.scm, so this patch has no effect on “guix pull”. > > Right, this should be tested with “make”. > > If it works fine here, we can port it to (guix build pull). Okay. I’ll try this some time this week, as soon as I can. Maybe tonight. -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) 2017-10-09 11:32 ` Ricardo Wurmus @ 2017-10-10 6:52 ` Ricardo Wurmus 0 siblings, 0 replies; 83+ messages in thread From: Ricardo Wurmus @ 2017-10-10 6:52 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Ricardo Wurmus <rekado@elephly.net> writes: >>> Well… I just noticed that guix pull doesn’t even use compile-all.scm; it >>> uses build-self.scm, so this patch has no effect on “guix pull”. >> >> Right, this should be tested with “make”. >> >> If it works fine here, we can port it to (guix build pull). > > Okay. I’ll try this some time this week, as soon as I can. Maybe > tonight. “make” crashed when I ran this on the netbook. It ran out of memory when compiling python.scm, as it always does. I cannot discern if this is an improvement, because the result is ultimately the same on my hardware; but since Mark uses this successfully on a Yeeloong with 1GB RAM, I have no objections to pushing this to master. Thanks! -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) 2017-10-07 4:06 ` [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) Mark H Weaver 2017-10-07 19:35 ` Efraim Flashner 2017-10-08 9:19 ` Ricardo Wurmus @ 2017-10-09 7:42 ` Ludovic Courtès 2 siblings, 0 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-10-09 7:42 UTC (permalink / raw) To: Mark H Weaver; +Cc: guix-devel Hi, Mark H Weaver <mhw@netris.org> skribis: > Ricardo Wurmus <rekado@elephly.net> writes: > >> Hi Ludo, >> >>>> Here are some important items I can think of: >> […] >>>> • Guile 2.2 compiler terrible issue: >>>> <https://lists.gnu.org/archive/html/guile-devel/2017-05/msg00033.html>. >> >> One way to side-step this issue for the upcoming release is to use one >> Guile process per file when running “guix pull”. This will make it run >> a lot slower, but that would be better than the current situation. > > I've attached a workaround that I've been using for the last 6 weeks on > my MIPS-based Yeeloong running GuixSD, since it only has 1 GB of RAM and > otherwise it would not be able to successfully build the 'guix' package. > > Note that I never use 'guix pull', so I'm not sure off-hand whether this > solves the problem there, but it certainly greatly reduces the memory > needed to run 'make' and thus to build the 'guix' package. > > This patch modifies build-aux/compile-all.scm to work as follows: after > loading all modules in the parent process, it then forks off a child and > compiles 20 modules in parallel within that child while the parent > waits. When the child is finished compiling those 20 modules, the child > exits (thus freeing the memory leaked during compilation), and then the > parent spawns a new child to compile the next 20 modules, and so on, > until all the modules are compiled. > > We should probably consider applying this to master. Thoughts? That sounds like a good idea. If it works, I’m all for it. We’ll need to do something similar in (guix scripts pull). I’ve been working on having ‘guix pull’ build modules as several derivations as part of <https://bugs.gnu.org/27284>. I’ll try to post a prototype hopefully later today. Thanks, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-06 18:30 ` Release! Ricardo Wurmus 2017-10-06 23:31 ` Release! David Pirotte 2017-10-07 4:06 ` [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) Mark H Weaver @ 2017-10-09 7:53 ` Ludovic Courtès 2017-11-20 22:07 ` Release! Ludovic Courtès 2017-11-30 10:40 ` Release! Ludovic Courtès 4 siblings, 0 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-10-09 7:53 UTC (permalink / raw) To: Ricardo Wurmus; +Cc: guix-devel Heya, Ricardo Wurmus <rekado@elephly.net> skribis: >>> Here are some important items I can think of: > […] >>> • Guile 2.2 compiler terrible issue: >>> <https://lists.gnu.org/archive/html/guile-devel/2017-05/msg00033.html>. I should mention that I spent entire days on this, and some of the conclusions are described here: https://lists.gnu.org/archive/html/guile-devel/2017-09/msg00031.html https://bugs.gnu.org/28590 I invite the Guilers among us to join the fun. :-) A bug that serious is a problem for Guile. From a Guix perspective, we have to find alternate solutions to improve scalability anyway: https://bugs.gnu.org/27284 >>> • Prepare to migrate to the new build farm: the hardware of >>> bayfront.guixsd.org has been fixed (it was unreliable until we >>> changed its CPUs), so now we need to fix a couple of issues in >>> Cuirass and generally improve it so we can, via its HTTP interface, >>> add new jobsets and so on. Of course we’ll have to work >>> on that incrementally. > > I guess we’ll be using berlin.guixsd.org instead of bayfront, no? Yes. > I’m currently installing additional servers (we’re now at 13 build > servers, I’ll get this up to 18 this week). Woohoo, thank you! >>> • Merge the potluck! <https://bugs.gnu.org/26645> > > About that… We now have a JSON importer, so maybe it’s worth using the > even simpler JSON package format instead of the simplified S-expression > format that Andy proposed. What do you think? Should we discuss this > at <https://bugs.gnu.org/26645>? Yeah I think we need to reopen the discussion. We discussed it at the GHM but this should take place here on guix-devel I guess. > Who would like to help us squash some bugs before the release? Let’s > try to fix at least 5 more bugs! Yes, let’s squash bugs! There are many ways people can help, and one of them is triage: close bugs that are already fixed, determine whether old bugs are still relevant and close those that are obsolete, retitle bugs to better reflect what the problem is, ping people asking for more information. After that, there are more-or-less “easy” packaging bugs in the list that can be a good starting point. Thanks, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-06 18:30 ` Release! Ricardo Wurmus ` (2 preceding siblings ...) 2017-10-09 7:53 ` Release! Ludovic Courtès @ 2017-11-20 22:07 ` Ludovic Courtès 2017-11-30 10:40 ` Release! Ludovic Courtès 4 siblings, 0 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-11-20 22:07 UTC (permalink / raw) To: Ricardo Wurmus; +Cc: guix-devel Hello Guix, I think we can start preparing the release for good now! The situation of ‘guix pull’ is mitigated by the split of python.scm and other big files into several pieces. This is of course not ideal, but it’s an improvement over 0.13.0 anyway. I think the main tasks to prepare the release are (1) testing the GuixSD ISO, and (2) updating ‘NEWS’. Let’s get that done! Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-10-06 18:30 ` Release! Ricardo Wurmus ` (3 preceding siblings ...) 2017-11-20 22:07 ` Release! Ludovic Courtès @ 2017-11-30 10:40 ` Ludovic Courtès 2017-12-01 2:57 ` Release! Maxim Cournoyer 2017-12-01 18:30 ` Release! Leo Famulari 4 siblings, 2 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-11-30 10:40 UTC (permalink / raw) To: Ricardo Wurmus; +Cc: guix-devel Hello! Time flies, but I think we’re about ready for the release. I’d like to aim for next Tuesday (Dec. 5th) and fix small hickups and annoyances by then, particularly regarding GuixSD installation. Ricardo Wurmus <rekado@elephly.net> skribis: >>> Here are some important items I can think of: > […] >>> • Guile 2.2 compiler terrible issue: >>> <https://lists.gnu.org/archive/html/guile-devel/2017-05/msg00033.html>. There’s more going on on the Guile side, but for now the recent split of the big package files has helped reduce peak memory consumption noticeably. > One annoyance is that after compiling one file it prints this message: > > Some deprecated features have been used. Set the environment > variable GUILE_WARN_DEPRECATED to "detailed" and rerun the > program to get more information. Set it to "no" to suppress > this message. This was also showing up a lot in ‘guix system init’ et al, when compiling modules. I think a912c723f76d9762072ce27204a9227a64bcb625 removes most of these. >>> • Prepare to migrate to the new build farm: the hardware of >>> bayfront.guixsd.org has been fixed (it was unreliable until we >>> changed its CPUs), so now we need to fix a couple of issues in >>> Cuirass and generally improve it so we can, via its HTTP interface, >>> add new jobsets and so on. Of course we’ll have to work >>> on that incrementally. > > I guess we’ll be using berlin.guixsd.org instead of bayfront, no? Yes. Questions: 1. Do we pre-register berlin’s key on GuixSD? 2. Do we add berlin.guixsd.org to the list of substitute servers on GuixSD? On Guix? The drawback is that ‘guix’ sometimes talks to both servers when retrieve substitute lists, which can be slightly slower/annoying, but otherwise I think it’s a win. Thoughts? The main GuixSD annoying messages that I think we should address by Tuesday are: 1. “Error in finalization thread: Bad file descriptor” coming from the Shepherd; 2. “udevd[304]: RUN{builtin}: 'uaccess' unknown /gnu/store/q7c8yayywf76ai3sgvz16pmbz07gj4bp-udev-rules/lib/udev/rules.d/73-seat-late.rules:15” Both are harmless but they may give users a false sense that something’s broken. Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-11-30 10:40 ` Release! Ludovic Courtès @ 2017-12-01 2:57 ` Maxim Cournoyer 2017-12-01 18:30 ` Release! Leo Famulari 1 sibling, 0 replies; 83+ messages in thread From: Maxim Cournoyer @ 2017-12-01 2:57 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Hi! ludo@gnu.org (Ludovic Courtès) writes: [...] >> >> I guess we’ll be using berlin.guixsd.org instead of bayfront, no? > > Yes. Questions: > > 1. Do we pre-register berlin’s key on GuixSD? Isn't this already the case? [...] > > The main GuixSD annoying messages that I think we should address by > Tuesday are: [...] > > 2. “udevd[304]: RUN{builtin}: 'uaccess' unknown /gnu/store/q7c8yayywf76ai3sgvz16pmbz07gj4bp-udev-rules/lib/udev/rules.d/73-seat-late.rules:15” > I had researched about that error a bit and it seems that it caused by eudev lacking support for 'uaccess'[0]; so not something to fix in Guix proper. [0] https://github.com/gentoo/eudev/issues/145 Maxim ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-11-30 10:40 ` Release! Ludovic Courtès 2017-12-01 2:57 ` Release! Maxim Cournoyer @ 2017-12-01 18:30 ` Leo Famulari 2017-12-01 19:32 ` Release! Ricardo Wurmus 2017-12-04 8:52 ` Release! Ludovic Courtès 1 sibling, 2 replies; 83+ messages in thread From: Leo Famulari @ 2017-12-01 18:30 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 1302 bytes --] On Thu, Nov 30, 2017 at 11:40:16AM +0100, Ludovic Courtès wrote: > 1. Do we pre-register berlin’s key on GuixSD? I vote yes. > 2. Do we add berlin.guixsd.org to the list of substitute servers on > GuixSD? On Guix? The drawback is that ‘guix’ sometimes talks to > both servers when retrieve substitute lists, which can be slightly > slower/annoying, but otherwise I think it’s a win. I think it's worth the extra source of substitutes. Since adding berlin.guixsd.org to my list of substitute URLs, it seems like I need to build less often. In my experience, it's annoying to query multiple servers when my network connection is slow or unreliable. But, it's also annoying in that situation to need to download source files from a variety of upstream sites. > The main GuixSD annoying messages that I think we should address by > Tuesday are: > > 1. “Error in finalization thread: Bad file descriptor” coming from the > Shepherd; I'm not sure how to start debugging this :/ If I get some advice, I could try to fix it on Sunday and Monday. > 2. “udevd[304]: RUN{builtin}: 'uaccess' unknown /gnu/store/q7c8yayywf76ai3sgvz16pmbz07gj4bp-udev-rules/lib/udev/rules.d/73-seat-late.rules:15” I haven't seen this one before. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-12-01 18:30 ` Release! Leo Famulari @ 2017-12-01 19:32 ` Ricardo Wurmus 2017-12-04 8:53 ` Release! Ludovic Courtès 2017-12-04 8:58 ` ISO image available for testing! Ludovic Courtès 2017-12-04 8:52 ` Release! Ludovic Courtès 1 sibling, 2 replies; 83+ messages in thread From: Ricardo Wurmus @ 2017-12-01 19:32 UTC (permalink / raw) To: Leo Famulari; +Cc: guix-devel Leo Famulari <leo@famulari.name> writes: > On Thu, Nov 30, 2017 at 11:40:16AM +0100, Ludovic Courtès wrote: >> 1. Do we pre-register berlin’s key on GuixSD? > > I vote yes. > >> 2. Do we add berlin.guixsd.org to the list of substitute servers on >> GuixSD? On Guix? The drawback is that ‘guix’ sometimes talks to >> both servers when retrieve substitute lists, which can be slightly >> slower/annoying, but otherwise I think it’s a win. > > I think it's worth the extra source of substitutes. Since adding > berlin.guixsd.org to my list of substitute URLs, it seems like I need to > build less often. > > In my experience, it's annoying to query multiple servers when my > network connection is slow or unreliable. But, it's also annoying in > that situation to need to download source files from a variety of > upstream sites. I’d like to add berlin.guix.org to the list of default substitute servers, but before I can allow this with a good conscience I need to increase space on the head node. We were very busy, so the new head node and storage aren’t ready yet, and the old node that’s currently coordinating builds on berlin.guix.org has very limited storage. I’ll try to get the new storage ready on Monday. >> 2. “udevd[304]: RUN{builtin}: 'uaccess' unknown /gnu/store/q7c8yayywf76ai3sgvz16pmbz07gj4bp-udev-rules/lib/udev/rules.d/73-seat-late.rules:15” > > I haven't seen this one before. I have seen it, but only when checking the output of dmesg. I guess we could just remove that rule. -- Ricardo GPG: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC https://elephly.net ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-12-01 19:32 ` Release! Ricardo Wurmus @ 2017-12-04 8:53 ` Ludovic Courtès 2017-12-04 8:58 ` ISO image available for testing! Ludovic Courtès 1 sibling, 0 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-12-04 8:53 UTC (permalink / raw) To: Ricardo Wurmus; +Cc: guix-devel Hello! Ricardo Wurmus <rekado@elephly.net> skribis: > Leo Famulari <leo@famulari.name> writes: > >> On Thu, Nov 30, 2017 at 11:40:16AM +0100, Ludovic Courtès wrote: >>> 1. Do we pre-register berlin’s key on GuixSD? >> >> I vote yes. >> >>> 2. Do we add berlin.guixsd.org to the list of substitute servers on >>> GuixSD? On Guix? The drawback is that ‘guix’ sometimes talks to >>> both servers when retrieve substitute lists, which can be slightly >>> slower/annoying, but otherwise I think it’s a win. >> >> I think it's worth the extra source of substitutes. Since adding >> berlin.guixsd.org to my list of substitute URLs, it seems like I need to >> build less often. >> >> In my experience, it's annoying to query multiple servers when my >> network connection is slow or unreliable. But, it's also annoying in >> that situation to need to download source files from a variety of >> upstream sites. > > I’d like to add berlin.guix.org to the list of default substitute > servers, but before I can allow this with a good conscience I need to > increase space on the head node. We were very busy, so the new head > node and storage aren’t ready yet, and the old node that’s currently > coordinating builds on berlin.guix.org has very limited storage. > > I’ll try to get the new storage ready on Monday. Awesome. Let us know how it goes and what we should do! Thanks, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* ISO image available for testing! 2017-12-01 19:32 ` Release! Ricardo Wurmus 2017-12-04 8:53 ` Release! Ludovic Courtès @ 2017-12-04 8:58 ` Ludovic Courtès 2017-12-04 21:35 ` Christopher Baines 1 sibling, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2017-12-04 8:58 UTC (permalink / raw) To: guix-devel [-- Attachment #1: Type: text/plain, Size: 560 bytes --] Hello there! I’ve uploaded a GuixSD installation ISO image for testing: http://web.fdn.fr/~lcourtes/software/guix/guixsd-install-0.13.0.8d7f1d736.x86_64-linux.iso.xz SHA256: 7e04017494c419bb6ca654cff05dc7e5ba4fdfd3c2812fba9ba6d929b319e93b http://web.fdn.fr/~lcourtes/software/guix/guixsd-install-0.13.0.8d7f1d736.x86_64-linux.iso.xz.sig It was built with “guix system disk-image -t iso9660 gnu/system/install.scm” on commit 8d7f1d736. Note that it’s 1.1G uncompressed so it won’t fit on a CD. Feedback welcome! Ludo’. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 832 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: ISO image available for testing! 2017-12-04 8:58 ` ISO image available for testing! Ludovic Courtès @ 2017-12-04 21:35 ` Christopher Baines 2017-12-04 22:34 ` Ludovic Courtès 2017-12-05 22:47 ` Ludovic Courtès 0 siblings, 2 replies; 83+ messages in thread From: Christopher Baines @ 2017-12-04 21:35 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 1417 bytes --] Ludovic Courtès writes: > Hello there! > > I’ve uploaded a GuixSD installation ISO image for testing: > > http://web.fdn.fr/~lcourtes/software/guix/guixsd-install-0.13.0.8d7f1d736.x86_64-linux.iso.xz > SHA256: 7e04017494c419bb6ca654cff05dc7e5ba4fdfd3c2812fba9ba6d929b319e93b > > http://web.fdn.fr/~lcourtes/software/guix/guixsd-install-0.13.0.8d7f1d736.x86_64-linux.iso.xz.sig > > It was built with “guix system disk-image -t iso9660 > gnu/system/install.scm” on commit 8d7f1d736. > > Note that it’s 1.1G uncompressed so it won’t fit on a CD. > > Feedback welcome! Hey, I've attempted to use this to install GuixSD on a Bytemark VM. Unfortunately I haven't succeeded yet. I managed to get as far as running guix system init, but when I did, it started downloading the bootstrap binaries, and then building binutils. When I run guix system build, or guix build with the --dry-run options, it says that it will download, rather than building, but it doesn't. I also made a few other notes during the installation process: - The documentation mentions ipconfig to get the wired interface up, but it isn't available in the image. I had to run ip link set eth0 up. - The documentation says that the ssh server needs to be started, but it was running without me starting it. Any tips on debugging the building from source issue? Thanks, Chris [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 962 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: ISO image available for testing! 2017-12-04 21:35 ` Christopher Baines @ 2017-12-04 22:34 ` Ludovic Courtès 2017-12-05 22:47 ` Ludovic Courtès 1 sibling, 0 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-12-04 22:34 UTC (permalink / raw) To: Christopher Baines; +Cc: guix-devel Hello, Christopher Baines <mail@cbaines.net> skribis: > I've attempted to use this to install GuixSD on a Bytemark > VM. Unfortunately I haven't succeeded yet. I managed to get as far as > running guix system init, but when I did, it started downloading the > bootstrap binaries, and then building binutils. > > When I run guix system build, or guix build with the --dry-run options, > it says that it will download, rather than building, but it doesn't. I’m pretty sure the building-from-source comes from grafts where the package replacements, for some reason, are not getting built by Hydra. I thought this had been fixed by b574cee361bdabf21f5506252b6a183dcfcd028d, but clearly it hasn’t. I’ll investigate tomorrow. > I also made a few other notes during the installation process: > > - The documentation mentions ipconfig to get the wired interface up, > but it isn't available in the image. I had to run ip link set eth0 > up. It mentions “ifconfig” (with an “f”) and that one is present. Or am I missing something? > - The documentation says that the ssh server needs to be started, but > it was running without me starting it. Indeed. I’ve pushed a fix as aab322d909c0b4abec132ef7aff31c31a1208841 in the new ‘version-0.14.0’ branch (note that it changes the ABI of (gnu services ssh)). Thanks, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: ISO image available for testing! 2017-12-04 21:35 ` Christopher Baines 2017-12-04 22:34 ` Ludovic Courtès @ 2017-12-05 22:47 ` Ludovic Courtès 2017-12-06 0:52 ` Mark H Weaver 2017-12-07 20:09 ` Christopher Baines 1 sibling, 2 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-12-05 22:47 UTC (permalink / raw) To: Christopher Baines; +Cc: guix-devel Hi Chris, Christopher Baines <mail@cbaines.net> skribis: > I've attempted to use this to install GuixSD on a Bytemark > VM. Unfortunately I haven't succeeded yet. I managed to get as far as > running guix system init, but when I did, it started downloading the > bootstrap binaries, and then building binutils. > > When I run guix system build, or guix build with the --dry-run options, > it says that it will download, rather than building, but it doesn't. It turned out to be issues related to grafts and to what Hydra builds, fixed with these commits: 3e442f85f * gnu: ghostscript-with-cups: Turn into a public variable. 91c9b5d01 * packages: 'package-grafts' trims native inputs. ff0e0041f * packages: 'fold-bag-dependencies' honors nativeness in recursive calls. f00b85ff8 * gnu: commencement: Do not graft early bootstrap packages. The Binutils issue is fixed by f00b85ff8. Commit 91c9b5d01 notably fixes the “expat issue”: coreutils had expat in its dependency graph, via gettext. Thus, the expat graft was picked up as a candidate graft. However, expat itself was subject to the glibc graft, and since there was no substitute for this particular expat, we’d have to build it first, just to throw it away later on because coreutils does not refer to it at run time. Long story short: we were flagging native inputs as potential sources of grafts even though, by definition, native inputs are not referred to at run time. The last commit ensures that Hydra builds the replacement for ‘ghostscript-with-cups’. What’s tricky is that one doesn’t notice these issues unless starting from a fresh store. I’ve uploaded an updated ISO image, which I used to test substitute availability and grafts. If you have time in the coming hours, feedback welcome: http://web.fdn.fr/~lcourtes/software/guix/guixsd-install-0.13.0.91c9b5d01.x86_64-linux.iso.xz http://web.fdn.fr/~lcourtes/software/guix/guixsd-install-0.13.0.91c9b5d01.x86_64-linux.iso.xz.sig Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: ISO image available for testing! 2017-12-05 22:47 ` Ludovic Courtès @ 2017-12-06 0:52 ` Mark H Weaver 2017-12-06 1:17 ` Ben Woodcroft ` (3 more replies) 2017-12-07 20:09 ` Christopher Baines 1 sibling, 4 replies; 83+ messages in thread From: Mark H Weaver @ 2017-12-06 0:52 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Hi Ludovic, ludo@gnu.org (Ludovic Courtès) writes: > 91c9b5d01 * packages: 'package-grafts' trims native inputs. [...] > Long story short: we were flagging native inputs as potential sources of > grafts even though, by definition, native inputs are not referred to at > run time. I agree that this *should* never happen, but I see little reason for confidence that it never happens in actual fact. What would happen if a reference to a native-input *was* present in the build outputs? The reason I ask is that, for security reasons, it's obviously very important to reliably avoid using ungrafted software at run time. I'm concerned that this recent change could cause minor nearly-undetectable packaging mistakes to become major security holes. One solution would be to explicitly check build outputs for references to native-inputs, and to force a build failure in that case. What do you think? Regards, Mark ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: ISO image available for testing! 2017-12-06 0:52 ` Mark H Weaver @ 2017-12-06 1:17 ` Ben Woodcroft 2017-12-06 2:16 ` native-inputs ending up as run-time references [was: ISO image available for testing!] Tobias Geerinckx-Rice ` (2 subsequent siblings) 3 siblings, 0 replies; 83+ messages in thread From: Ben Woodcroft @ 2017-12-06 1:17 UTC (permalink / raw) To: Mark H Weaver, Ludovic Courtès; +Cc: guix-devel On 06/12/17 10:52, Mark H Weaver wrote: > Hi Ludovic, > > ludo@gnu.org (Ludovic Courtès) writes: >> 91c9b5d01 * packages: 'package-grafts' trims native inputs. > [...] > >> Long story short: we were flagging native inputs as potential sources of >> grafts even though, by definition, native inputs are not referred to at >> run time. > I agree that this *should* never happen, but I see little reason for > confidence that it never happens in actual fact. > > What would happen if a reference to a native-input *was* present in the > build outputs? The reason I ask is that, for security reasons, it's > obviously very important to reliably avoid using ungrafted software at > run time. > > I'm concerned that this recent change could cause minor > nearly-undetectable packaging mistakes to become major security holes. > > One solution would be to explicitly check build outputs for references > to native-inputs, and to force a build failure in that case. I believe there are a number of cases of this that happen when binaries are wrapped with paths derived from getenv, e.g. this phase in bamm: (add-after 'install 'wrap-executable (lambda* (#:key outputs #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (path (getenv "PATH"))) (wrap-program (string-append out "/bin/bamm") `("PATH" ":" prefix (,path)))) #t)) It would be good to stop using getenv for this, for the reasons described here and others e.g. non-reproducibility, unnecessary dependencies etc. Is there some easy way to "getenv" excluding unwanted components of an environment variable? Thanks, ben ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: native-inputs ending up as run-time references [was: ISO image available for testing!] 2017-12-06 0:52 ` Mark H Weaver 2017-12-06 1:17 ` Ben Woodcroft @ 2017-12-06 2:16 ` Tobias Geerinckx-Rice 2017-12-06 3:18 ` Leo Famulari 2017-12-06 8:04 ` ISO image available for testing! Mark H Weaver 2017-12-06 8:14 ` Ludovic Courtès 3 siblings, 1 reply; 83+ messages in thread From: Tobias Geerinckx-Rice @ 2017-12-06 2:16 UTC (permalink / raw) To: ludo, mhw; +Cc: guix-devel Mark! Ludovic! Mark H Weaver wrote on 06/12/17 at 01:52: > ludo@gnu.org (Ludovic Courtès) writes: >> Long story short: we were flagging native inputs as potential >> sources of grafts even though, by definition, native inputs are >> not referred to at run time. > > I agree that this *should* never happen, but I see little reason for > confidence that it never happens in actual fact. Hold on. I thought this happened *all the actual time*. To me, the output of ‘guix graph’ implies that ghc[*] refers directly to perl, and ghc-haddock-library to hspec-discover, and that both of those are native inputs. These are just the first two examples of packages with native inputs that I happened to pull out of my haskell.scm. While Haskell does seem particularly naughty, I've no reason to believe it's unique. Are these not ‘run-time references’? Is your use of the term narrower than mine? > One solution would be to explicitly check build outputs for > references to native-inputs, and to force a build failure in that > case. I was surprised to learn this was not already the case (before I started slowly dragging hissing Haskell packages into the present). I suggest we don't make any security assumptions about it until it is. Kind regards, T G-R ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: native-inputs ending up as run-time references [was: ISO image available for testing!] 2017-12-06 2:16 ` native-inputs ending up as run-time references [was: ISO image available for testing!] Tobias Geerinckx-Rice @ 2017-12-06 3:18 ` Leo Famulari 2017-12-06 3:48 ` Tobias Geerinckx-Rice 0 siblings, 1 reply; 83+ messages in thread From: Leo Famulari @ 2017-12-06 3:18 UTC (permalink / raw) To: Tobias Geerinckx-Rice; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 1325 bytes --] On Wed, Dec 06, 2017 at 03:16:45AM +0100, Tobias Geerinckx-Rice wrote: > Hold on. I thought this happened *all the actual time*. > > To me, the output of ‘guix graph’ implies that ghc[*] refers directly to > perl, and ghc-haddock-library to hspec-discover, and that both of those > are native inputs. > > These are just the first two examples of packages with native inputs > that I happened to pull out of my haskell.scm. While Haskell does seem > particularly naughty, I've no reason to believe it's unique. > > Are these not ‘run-time references’? Is your use of the term narrower > than mine? I think of "run-time references" as explicit store references (file-names) found in the build output by the post-build reference scanner and recorded in /var/guix/db. These references are what grafting rewrites. `guix gc --references` can be used to query the database for a given store item. `guix graph`, on the other hand, shows the graphs of package definitions. That is, the list of inputs, native-inputs, propagated-inputs, etc. Some of these inputs could be totally superfluous, and the build output would ideally not contain any explicit references to them at all. The term "reference" has a few meanings in Guix, but I think that Mark is talking about explicit store paths. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: native-inputs ending up as run-time references [was: ISO image available for testing!] 2017-12-06 3:18 ` Leo Famulari @ 2017-12-06 3:48 ` Tobias Geerinckx-Rice 0 siblings, 0 replies; 83+ messages in thread From: Tobias Geerinckx-Rice @ 2017-12-06 3:48 UTC (permalink / raw) To: leo; +Cc: guix-devel [-- Attachment #1.1: Type: text/plain, Size: 1986 bytes --] Leo, Leo Famulari wrote on 06/12/17 at 04:18: > I think of "run-time references" as explicit store references > (file-names) found in the build output by the post-build reference > scanner and recorded in /var/guix/db. These references are what grafting > rewrites. All right, that was my idea too (though there might be some sloppiness in my mental model yet). > `guix gc --references` can be used to query the database for a given > store item. > > `guix graph`, on the other hand, shows the graphs of package > definitions. That is, the list of inputs, native-inputs, > propagated-inputs, etc. Some of these inputs could be totally > superfluous, and the build output would ideally not contain any > explicit references to them at all. Thanks for the clarification! I've never actually found a use for ‘guix graph’ myself, but can't imagine a Guix talk without it. :-) Unfortunately, I sent you after a red herring: ‘graph’ was a typo. I did, in fact, mean ‘guix gc’: $ guix gc --references `guix build ghc` | grep perl /gnu/store/9g4fpfz86vjkx83v5696vm5dzg2sc9qj-perl-5.26.0 $ grep -r /gnu/store/9g4fpfz86vjkx83v5696vm5dzg2sc9qj-perl-5.26.0 \ `guix build ghc` .../ghc-split:#!/gnu/store/...-perl-5.26.0/bin/perl .../settings: ("perl command", "/gnu/store/...-perl-5.26.0/bin/perl"), And: $ guix gc --references `guix build ghc-haddock-library` | grep hspec-d /gnu/store/xfh89fmdn2xvd4aw76164zqz0941xw01-hspec-discover-2.2.0 $ grep -r xfh89fmdn2xvd4aw76164zqz0941xw01-hspec-discover-2.2.0 \ `guix build ghc-haddock-library` [very long paths snipped with great prejudice] Binary file /gnu/store/.../package.cache matches Binary file /gnu/store/.../libHShaddock-library-1.2.1-...-ghc7.10.2.so matches > The term "reference" has a few meanings in Guix, but I think that Mark > is talking about explicit store paths. I'm afraid we're on the same page then. Kind regards, T G-R [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 248 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: ISO image available for testing! 2017-12-06 0:52 ` Mark H Weaver 2017-12-06 1:17 ` Ben Woodcroft 2017-12-06 2:16 ` native-inputs ending up as run-time references [was: ISO image available for testing!] Tobias Geerinckx-Rice @ 2017-12-06 8:04 ` Mark H Weaver 2017-12-06 8:14 ` Ludovic Courtès 3 siblings, 0 replies; 83+ messages in thread From: Mark H Weaver @ 2017-12-06 8:04 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel I wrote: > One solution would be to explicitly check build outputs for references > to native-inputs, and to force a build failure in that case. More precisely, we could force a build failure when any build output contains a reference to a component (store path) in the following set: requisites(native-inputs) - requisites(inputs) Mark ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: ISO image available for testing! 2017-12-06 0:52 ` Mark H Weaver ` (2 preceding siblings ...) 2017-12-06 8:04 ` ISO image available for testing! Mark H Weaver @ 2017-12-06 8:14 ` Ludovic Courtès 2017-12-06 16:29 ` Tobias Geerinckx-Rice 3 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2017-12-06 8:14 UTC (permalink / raw) To: Mark H Weaver; +Cc: guix-devel Hi Mark, Mark H Weaver <mhw@netris.org> skribis: > ludo@gnu.org (Ludovic Courtès) writes: >> 91c9b5d01 * packages: 'package-grafts' trims native inputs. > > [...] > >> Long story short: we were flagging native inputs as potential sources of >> grafts even though, by definition, native inputs are not referred to at >> run time. > > I agree that this *should* never happen, but I see little reason for > confidence that it never happens in actual fact. > > What would happen if a reference to a native-input *was* present in the > build outputs? The reason I ask is that, for security reasons, it's > obviously very important to reliably avoid using ungrafted software at > run time. > > I'm concerned that this recent change could cause minor > nearly-undetectable packaging mistakes to become major security holes. Given the examples that Tobias and Ben were quick to find, I’m afraid you’re right and I was overconfident. I’m reverting the change. > One solution would be to explicitly check build outputs for references > to native-inputs, and to force a build failure in that case. We could do that, though I suppose a lot of packages would break. Thanks to the quick reply, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: ISO image available for testing! 2017-12-06 8:14 ` Ludovic Courtès @ 2017-12-06 16:29 ` Tobias Geerinckx-Rice 0 siblings, 0 replies; 83+ messages in thread From: Tobias Geerinckx-Rice @ 2017-12-06 16:29 UTC (permalink / raw) To: ludo; +Cc: guix-devel Ludovic Courtès wrote on 06/12/17 at 09:14: >> One solution would be to explicitly check build outputs for references >> to native-inputs, and to force a build failure in that case. I started a rudimentary PoC for this last week, after realising how bad the situation is in ghc-* alone. We'll see what comes of it. > We could do that, though I suppose a lot of packages would break. We *should* do it, though. Just not before the pending release. Kind regards, T G-R ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: ISO image available for testing! 2017-12-05 22:47 ` Ludovic Courtès 2017-12-06 0:52 ` Mark H Weaver @ 2017-12-07 20:09 ` Christopher Baines 2017-12-07 21:19 ` Ludovic Courtès 1 sibling, 1 reply; 83+ messages in thread From: Christopher Baines @ 2017-12-07 20:09 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel [-- Attachment #1: Type: text/plain, Size: 2953 bytes --] Ludovic Courtès writes: > Hi Chris, > > Christopher Baines <mail@cbaines.net> skribis: > >> I've attempted to use this to install GuixSD on a Bytemark >> VM. Unfortunately I haven't succeeded yet. I managed to get as far as >> running guix system init, but when I did, it started downloading the >> bootstrap binaries, and then building binutils. >> >> When I run guix system build, or guix build with the --dry-run options, >> it says that it will download, rather than building, but it doesn't. > > It turned out to be issues related to grafts and to what Hydra builds, > fixed with these commits: > > 3e442f85f * gnu: ghostscript-with-cups: Turn into a public variable. > 91c9b5d01 * packages: 'package-grafts' trims native inputs. > ff0e0041f * packages: 'fold-bag-dependencies' honors nativeness in recursive calls. > f00b85ff8 * gnu: commencement: Do not graft early bootstrap packages. > > The Binutils issue is fixed by f00b85ff8. > > Commit 91c9b5d01 notably fixes the “expat issue”: coreutils had expat in > its dependency graph, via gettext. Thus, the expat graft was picked up > as a candidate graft. However, expat itself was subject to the glibc > graft, and since there was no substitute for this particular expat, we’d > have to build it first, just to throw it away later on because coreutils > does not refer to it at run time. > > Long story short: we were flagging native inputs as potential sources of > grafts even though, by definition, native inputs are not referred to at > run time. > > The last commit ensures that Hydra builds the replacement for > ‘ghostscript-with-cups’. > > What’s tricky is that one doesn’t notice these issues unless starting > from a fresh store. > > I’ve uploaded an updated ISO image, which I used to test substitute > availability and grafts. If you have time in the coming hours, feedback > welcome: Thanks for fixing this Ludo, and congratulations on the release. I'm glad to say that I've now managed to install GuixSD using the 0.14.0 x86_64 ISO, however I did encounter some difficulties. I tried a few times with both the ISO you replied with here, and the released ISO, but each time the virtual machine I was installing on to appeared to restart while guix system init was running. It's difficult to get more information, but the last messages I got out of guix system init relate to grafting and collisions. This evening when I tried again I passed --no-grafts to guix system init, and this time it successfully finished the installation. Interestingly, this is also what is actually tested by the iso-image-installer system test, as it sets the GUIX_BUILD_OPTIONS environment variable. This isn't conclusive, but I'd be very interested to hear from anyone that has had similar issues, or successes in using the ISO installer, both with and without the --no-grafts option. Thanks again, Chris [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 962 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: ISO image available for testing! 2017-12-07 20:09 ` Christopher Baines @ 2017-12-07 21:19 ` Ludovic Courtès 0 siblings, 0 replies; 83+ messages in thread From: Ludovic Courtès @ 2017-12-07 21:19 UTC (permalink / raw) To: Christopher Baines; +Cc: guix-devel Hello Chris, Christopher Baines <mail@cbaines.net> skribis: > Thanks for fixing this Ludo, and congratulations on the release. I'm > glad to say that I've now managed to install GuixSD using the 0.14.0 > x86_64 ISO, however I did encounter some difficulties. > > I tried a few times with both the ISO you replied with here, and the > released ISO, but each time the virtual machine I was installing on to > appeared to restart while guix system init was running. It's difficult > to get more information, but the last messages I got out of guix system > init relate to grafting and collisions. I wonder how the VM can restart. Could it be an out-of-memory condition? Though even that should not lead to a reboot. Could you see if you can get more details from the VM? Thanks, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-12-01 18:30 ` Release! Leo Famulari 2017-12-01 19:32 ` Release! Ricardo Wurmus @ 2017-12-04 8:52 ` Ludovic Courtès 2017-12-05 2:47 ` Release! Maxim Cournoyer 1 sibling, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2017-12-04 8:52 UTC (permalink / raw) To: Leo Famulari; +Cc: guix-devel, Maxim Cournoyer Hello! Leo Famulari <leo@famulari.name> skribis: > On Thu, Nov 30, 2017 at 11:40:16AM +0100, Ludovic Courtès wrote: >> 1. Do we pre-register berlin’s key on GuixSD? > > I vote yes. > >> 2. Do we add berlin.guixsd.org to the list of substitute servers on >> GuixSD? On Guix? The drawback is that ‘guix’ sometimes talks to >> both servers when retrieve substitute lists, which can be slightly >> slower/annoying, but otherwise I think it’s a win. > > I think it's worth the extra source of substitutes. Since adding > berlin.guixsd.org to my list of substitute URLs, it seems like I need to > build less often. > > In my experience, it's annoying to query multiple servers when my > network connection is slow or unreliable. But, it's also annoying in > that situation to need to download source files from a variety of > upstream sites. Sounds reasonable. Let’s wait for a green light from Ricardo. >> The main GuixSD annoying messages that I think we should address by >> Tuesday are: >> >> 1. “Error in finalization thread: Bad file descriptor” coming from the >> Shepherd; > > I'm not sure how to start debugging this :/ If I get some advice, I > could try to fix it on Sunday and Monday. I investigated and fixed it yesterday: https://git.savannah.gnu.org/cgit/guix.git/commit/?id=4bd70904c7f555a953808a9a4f892f462ffd352f The thing is that there’s a separate finalization thread in Guile, which takes care of finalizing dead objects. For file ports, finalization means closing the underlying file descriptor. As it turns out, ‘close-port’ in Guile 2.0 would ignore EBADF errors, whereas ‘close-port’ in 2.2 reports them, hence the error. The fix is to take extra care to close ports and not just the underlying file descriptors. >> 2. “udevd[304]: RUN{builtin}: 'uaccess' unknown /gnu/store/q7c8yayywf76ai3sgvz16pmbz07gj4bp-udev-rules/lib/udev/rules.d/73-seat-late.rules:15” > > I haven't seen this one before. I compared the source of eudev and systemd, and indeed, like Maxim wrote, the issue is that eudev does not support a “uaccess” built-in tag. So I pushed a fix that simply comments out that line: https://git.savannah.gnu.org/cgit/guix.git/commit/?id=f8446df663fecb5aa34e5c6dfa477544d3271d1e There’s still room for improvement, but the console output is less messy now. :-) Thanks, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release! 2017-12-04 8:52 ` Release! Ludovic Courtès @ 2017-12-05 2:47 ` Maxim Cournoyer 0 siblings, 0 replies; 83+ messages in thread From: Maxim Cournoyer @ 2017-12-05 2:47 UTC (permalink / raw) To: Ludovic Courtès; +Cc: guix-devel Hi! ludo@gnu.org (Ludovic Courtès) writes: [...] (Great fix! :) >>> 2. “udevd[304]: RUN{builtin}: 'uaccess' unknown /gnu/store/q7c8yayywf76ai3sgvz16pmbz07gj4bp-udev-rules/lib/udev/rules.d/73-seat-late.rules:15” >> >> I haven't seen this one before. > > I compared the source of eudev and systemd, and indeed, like Maxim > wrote, the issue is that eudev does not support a “uaccess” built-in > tag. So I pushed a fix that simply comments out that line: > > https://git.savannah.gnu.org/cgit/guix.git/commit/?id=f8446df663fecb5aa34e5c6dfa477544d3271d1e Nitpick: Maybe we could reference to the issue so that a maintainer can decide to remove that alteration after the "uaccess" issue gets properly fixed (implemented). > There’s still room for improvement, but the console output is less messy > now. :-) Thank you for it! Maxim ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release v1.4?
@ 2022-06-03 16:41 Ludovic Courtès
2022-06-06 21:17 ` Merging ‘staging’? Ludovic Courtès
0 siblings, 1 reply; 83+ messages in thread
From: Ludovic Courtès @ 2022-06-03 16:41 UTC (permalink / raw)
To: zimoun; +Cc: Guix Devel, GNU Guix maintainers
Hello!
zimoun <zimon.toutoune@gmail.com> skribis:
> Schedule a release is the occasion to tackle some not-so-fun tasks as
> merging the ’staging’ branch [1], many upgrades as Haskell [2] or Julia,
> etc.
Thanks for the heads-up! I think merging ‘staging’ should be
top-priority. People are welcome to upgrade/reconfigure from it with:
guix time-machine --branch=staging -- …
Remaining things to check:
- [ ] system tests
- [ ] status on non-x86_64 architectures
Ludo’.
^ permalink raw reply [flat|nested] 83+ messages in thread
* Merging ‘staging’? 2022-06-03 16:41 Release v1.4? Ludovic Courtès @ 2022-06-06 21:17 ` Ludovic Courtès 2022-06-08 11:50 ` Efraim Flashner 0 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2022-06-06 21:17 UTC (permalink / raw) To: zimoun; +Cc: Guix Devel, GNU Guix maintainers Hi, Ludovic Courtès <ludo@gnu.org> skribis: > Thanks for the heads-up! I think merging ‘staging’ should be > top-priority. People are welcome to upgrade/reconfigure from it with: > > guix time-machine --branch=staging -- … > > Remaining things to check: > > - [ ] system tests I set up a jobset and we’re doing okay compared to ‘master’: https://ci.guix.gnu.org/jobset/staging-tests The main regression is the timescaledb test, because timescaledb fails its tests on that branch (help welcome!). Then there’s what looks like a transient failure of the installation test, which is more worrisome but not a regression I believe: --8<---------------cut here---------------start------------->8--- Jun 5 17:44:46 localhost installer[252]: command ("guix" "system" "init" "--fallback" "--no-grafts" "--no-substitutes" "/mnt/etc/config.scm" "/mnt") succeeded conversation expecting pattern ((quote installation-complete)) Jun 5 17:44:46 localhost shepherd[1]: Service guix-daemon has been stopped. Jun 5 17:44:46 localhost shepherd[1]: Service guix-daemon has been started. Jun 5 17:44:46 localhost installer[252]: crashing due to uncaught exception: system-error ("umount" "~S: ~A" ("/remove" "Device or resource busy") (16)) Jun 5 17:44:47 localhost installer[252]: running form #<newt-form 21d9960> ("Unexpected problem") with 1 clients Jun 5 17:44:47 localhost installer[252]: form #<newt-form 21d9960> ("Unexpected problem"): client 20 replied #t /gnu/store/87wf3r1v18an9cj8d2jkh0240g07dqd6-shepherd-marionette.scm:1:1718: ERROR: 1. &pattern-not-matched: pattern: ((quote installation-complete)) sexp: (contents-dialog (title "Unexpected problem") (text "The installer has encountered an unexpected problem. The backtrace is displayed below. You may choose to exit or create a dump archive.") (content "In ./gnu/installer/steps.scm:\n 144:13 19 (run ((substitutes . #f) (network (select-technology . #<<technology> name: \"Wired\" type: \"ethernet\" powered?: #t connected?: #t>) (power-technology . #<unspecified>) (# . #<<???>) ???) ???) ???)\n 144:13 18 (run ((user #<<user> name: \"root\" real-name: \"\" group: \"users\" password: <secret> home-directory: \"/root\"> #<<user> name: \"alice\" real-name: \"Alice\" group: \"users\" password: <s???> ???) ???) ???)\n 144:13 17 (run ((services #<<system-service> name: \"GNOME\" type: desktop recommended?: #f snippet: ((service gnome-desktop-service-type)) packages: ()> #<<system-service> name: \"Xfce\" ty???> ???) ???) ???)\n 142:23 16 (run ((partition #<<user-partition> name: #f type: normal file-name: \"/dev/vda1\" disk-file-name: \"/dev/vda\" crypt-label: #f crypt-password: #f fs-type: ext4 bootable?: #t esp?:???> ???) ???) ???)\nIn ./gnu/installer/newt/final.scm:\n 128:11 15 (run-final-page ((partition #<<user-partition> name: #f type: normal file-name: \"/dev/vda1\" disk-file-name: \"/dev/vda\" crypt-label: #f crypt-password: #f fs-type: ext4 bootable???> ???) ???) ???)\n 101:21 14 (run-install-shell \"en_HK.utf8\" #:users _)\nIn ./gnu/installer/final.scm:\n 191:5 13 (install-system \"en_HK.utf8\" #:users _)\n 113:13 12 (call-with-mnt-container #<procedure 7f6f6b992080 at ./gnu/installer/final.scm:192:7 ()>)\nIn gnu/build/linux-container.scm:\n 265:16 11 (run-container _ _ (mnt) _ #<procedure 7f6f6b992080 at ./gnu/installer/final.scm:192:7 ()> #:guest-uid _ #:guest-gid _)\nIn ./gnu/installer/final.scm:\n 222:13 10 (_)\nIn gnu/build/install.scm:\n 270:5 9 (unmount-cow-store \"/mnt\" \"/tmp/guix-inst\")\nIn guix/build/syscalls.scm:\n 588:8 8 (_ _ _ #:update-mtab? _)\nIn ice-9/boot-9.scm:\n 1685:16 7 (raise-exception _ #:continuable? _)\n 1780:13 6 (_ #<&compound-exception components: (#<&external-error> #<&origin origin: \"umount\"> #<&message message: \"~S: ~A\"> #<&irritants irritants: (\"/remove\" \"Device or resource busy\")> #<&ex???>)\nIn ice-9/eval.scm:\n 619:8 5 (_ #(#(#(#<directory (guile-user) 7f6f74584c80>) system-error (\"umount\" \"~S: ~A\" (\"/remove\" \"Device or resource busy\") (16))) #<variable 7f6f60988c40 value: #<unspecified>> #<varia???> ???))\n 626:19 4 (_ #(#(#(#<directory (guile-user) 7f6f74584c80>) system-error (\"umount\" \"~S: ~A\" (\"/remove\" \"Device or resource busy\") (16))) #<variable 7f6f60988c40 value: #<unspecified>> #<varia???> ???))\nIn ./gnu/installer/dump.scm:\n 54:4 3 (prepare-dump system-error (\"umount\" \"~S: ~A\" (\"/remove\" \"Device or resource busy\") (16)) #:result _)\nIn ice-9/ports.scm:\n 433:17 2 (call-with-output-file _ _ #:binary _ #:encoding _)\nIn ./gnu/installer/dump.scm:\n 56:27 1 (_ #<output: installer-backtrace 7>)\nIn unknown file:\n 0 (make-stack #t)\n./gnu/installer/dump.scm:58:36: In procedure umount: \"/remove\": Device or resource busy\n")) Jun 5 17:44:47 localhost installer[196]: unmounting "/mnt/" Backtrace: 2 (primitive-load "/gnu/store/58r38d916naqslddflkwf8xavyv?") In ice-9/eval.scm: 191:35 1 (_ #f) 619:8 0 (_ #(#<directory (guile-user) 7fffeffcfc80> #<variabl?>)) ice-9/eval.scm:619:8: Throw to key `marionette-eval-failure' with args `((quote (complete-installation installer-socket)))'. builder for `/gnu/store/zmg87adhblg5c7jv0c06wsb7rancxxq0-installation.drv' failed with exit code 1 @ build-failed /gnu/store/zmg87adhblg5c7jv0c06wsb7rancxxq0-installation.drv - 1 builder for `/gnu/store/zmg87adhblg5c7jv0c06wsb7rancxxq0-installation.drv' failed with exit code 1 cannot build derivation `/gnu/store/2lr3d1yapxf8azx7mzxkmgxc4zgl9sky-gui-installed-desktop-os-encrypted.drv': 1 dependencies couldn't be built --8<---------------cut here---------------end--------------->8--- (From <https://ci.guix.gnu.org/build/958038/details>.) > - [ ] status on non-x86_64 architectures ‘guix weather -s i686-linux’ says 89% (which is underestimated, because it wrongfully checks for all the packages, including unsupported packages), which sounds good. We have to check for AArch64 & co. Any takers? Overall it seems to me we should be able to merge ‘staging’ within a couple of days. Thoughts? Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Merging ‘staging’? 2022-06-06 21:17 ` Merging ‘staging’? Ludovic Courtès @ 2022-06-08 11:50 ` Efraim Flashner 2022-06-08 21:24 ` Ludovic Courtès 0 siblings, 1 reply; 83+ messages in thread From: Efraim Flashner @ 2022-06-08 11:50 UTC (permalink / raw) To: Ludovic Courtès; +Cc: zimoun, Guix Devel, GNU Guix maintainers [-- Attachment #1: Type: text/plain, Size: 971 bytes --] On Mon, Jun 06, 2022 at 11:17:47PM +0200, Ludovic Courtès wrote: > Hi, > > Ludovic Courtès <ludo@gnu.org> skribis: > > ‘guix weather -s i686-linux’ says 89% (which is underestimated, because > it wrongfully checks for all the packages, including unsupported > packages), which sounds good. > > We have to check for AArch64 & co. Any takers? > > Overall it seems to me we should be able to merge ‘staging’ within a > couple of days. Thoughts? Currently ci.guix.gnu.org isn't building any of the aarch64 packages, and it looks like it hasn't since about May 26th. Once those start building again I expect we'll see it's doing well. Minus perhaps the rust stuff since I'm not sure the offload build machines can handle that. -- Efraim Flashner <efraim@flashner.co.il> אפרים פלשנר GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351 Confidentiality cannot be guaranteed on emails sent or received unencrypted [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Merging ‘staging’? 2022-06-08 11:50 ` Efraim Flashner @ 2022-06-08 21:24 ` Ludovic Courtès 2022-06-10 7:57 ` Efraim Flashner 0 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2022-06-08 21:24 UTC (permalink / raw) To: zimoun; +Cc: Guix Devel, GNU Guix maintainers Hey Efraim, Efraim Flashner <efraim@flashner.co.il> skribis: > On Mon, Jun 06, 2022 at 11:17:47PM +0200, Ludovic Courtès wrote: >> Hi, >> >> Ludovic Courtès <ludo@gnu.org> skribis: >> >> ‘guix weather -s i686-linux’ says 89% (which is underestimated, because >> it wrongfully checks for all the packages, including unsupported >> packages), which sounds good. >> >> We have to check for AArch64 & co. Any takers? >> >> Overall it seems to me we should be able to merge ‘staging’ within a >> couple of days. Thoughts? > > Currently ci.guix.gnu.org isn't building any of the aarch64 packages, > and it looks like it hasn't since about May 26th. Once those start > building again I expect we'll see it's doing well. Minus perhaps the > rust stuff since I'm not sure the offload build machines can handle > that. Hmm the situation is bad indeed: --8<---------------cut here---------------start------------->8--- $ ./pre-inst-env guix weather -s aarch64-linux -c200 computing 18,932 package derivations for aarch64-linux... looking for 19,704 store items on https://ci.guix.gnu.org... https://ci.guix.gnu.org 17.1% substitutes available (3,360 out of 19,704) at least 22,303.1 MiB of nars (compressed) 24,029.2 MiB on disk (uncompressed) 0.006 seconds per request (114.2 seconds in total) 172.5 requests per second 5.3% (870 out of 16,344) of the missing items are queued at least 1,000 queued builds aarch64-linux: 840 (84.0%) x86_64-linux: 84 (8.4%) powerpc64le-linux: 72 (7.2%) armhf-linux: 4 (.4%) build rate: 143.62 builds per hour i686-linux: 99.96 builds per hour x86_64-linux: 31.51 builds per hour aarch64-linux: 25.66 builds per hour powerpc64le-linux: 3.14 builds per hour 729 packages are missing from 'https://ci.guix.gnu.org' for 'aarch64-linux', among which: 14236 libxft@2.3.3 /gnu/store/2smylcjq5cppxcrj2mn229hlmh6bf7w4-libxft-2.3.3 10066 icu4c@69.1 /gnu/store/n9nx5rmnhdf3hdswhvns31diayq9vfq2-icu4c-69.1 7723 jbig2dec@0.19 /gnu/store/lrpczm2m0agx0x5rp6kmn8c46mc85l35-jbig2dec-0.19 6552 libxt@1.2.1 /gnu/store/rqqkla9kqjq3182gdqynkq2jb4jf2bl5-libxt-1.2.1-doc /gnu/store/82pzzkny0gwdfkfa5zvnyy4vbzxqnwyy-libxt-1.2.1 4555 openblas@0.3.20 /gnu/store/wc8cbkcvgqkdf65fj7drb82plkf8igyw-openblas-0.3.20 4231 libxfixes@6.0.0 /gnu/store/h70i9gyvif5kzpw7a8bdaxhw7sqiv7wz-libxfixes-6.0.0 3788 libxrandr@1.5.2 /gnu/store/9gqkb75sr60lxic9a3nx543a6wxz0866-libxrandr-1.5.2 3320 libxkbfile@1.1.0 /gnu/store/kk0xk8j8ffgxvfs5kz1vxp2ipz28xwh4-libxkbfile-1.1.0 3297 xcb-util@0.4.0 /gnu/store/n2x5kvy5zxbnh28ak7rbvw6brp97z1c9-xcb-util-0.4.0 3279 xcb-util-wm@0.4.1 /gnu/store/hhasmz0l5f10f9nfg0nx378c7bcgf9v0-xcb-util-wm-0.4.1 3263 libxres@1.2.1 /gnu/store/5mpjhsyq2bbri006g7lh6h82239s8fb8-libxres-1.2.1 1383 xprop@1.2.5 /gnu/store/61x7vscvrz8zqda73dlq5x35anhz8f8k-xprop-1.2.5 1381 xdg-user-dirs@0.17 /gnu/store/gab0ycim14xflaxzp8arg8hfapx73z3l-xdg-user-dirs-0.17 1368 docbook2x@0.8.8 /gnu/store/cclsrji5p14aj8bg3kmhkj5532k7l5m4-docbook2x-0.8.8 1286 perl-net-ssleay@1.92 /gnu/store/cn77pic9249j7h002a9701v0xzpi28yk-perl-net-ssleay-1.92 1179 emacs-minimal@28.1 /gnu/store/c768r60pj3f2af2ysbjqdnlxwpgwmmpp-emacs-minimal-28.1 1121 go-std@1.17.9 /gnu/store/fqdkzg6nlzhj93ysjqxrmqsz8srq2l9r-go-std-1.17.9 1021 ruby-activemodel@6.1.3 /gnu/store/12gm34s68siqdfagc16ldjdp03klc5xw-ruby-activemodel-6.1.3 1005 ruby-shoulda-matchers@2.8.0 /gnu/store/zcbdlp0qqb3axsmfvd8rdmn70kwdiw11-ruby-shoulda-matchers-2.8.0 1001 ruby-webmock@2.3.2 /gnu/store/jfrng4404avghlkyxw2y5hqpdn8v3mih-ruby-webmock-2.3.2 976 ruby-sawyer@0.8.2 /gnu/store/w0aaby4lvdcz0dr5006mx2ik6l1v2s5l-ruby-sawyer-0.8.2 634 jikes@1.22 /gnu/store/nwkrhbzbd8s9dysgik58af93b2kjm4w3-jikes-1.22 622 nss-certs@3.71 /gnu/store/01k1v00g7vc7n90y5yr9bacrnr3ml46p-nss-certs-3.71 576 texlive-latex-cmap@59745 /gnu/store/zdws0y31a1hhgxb80qc2lx4smmp9pmgc-texlive-latex-cmap-59745 558 libxft@2.3.3 /gnu/store/2smylcjq5cppxcrj2mn229hlmh6bf7w4-libxft-2.3.3 491 xmodmap@1.0.10 /gnu/store/rm8ww2flazqypwiagizbbsslv0g86h67-xmodmap-1.0.10 489 ucd@14.0.0 /gnu/store/f3hkrqnsj9dadliaixrlh17z4c9bsjfl-ucd-14.0.0 400 jbig2dec@0.19 /gnu/store/lrpczm2m0agx0x5rp6kmn8c46mc85l35-jbig2dec-0.19 317 icu4c@69.1 /gnu/store/n9nx5rmnhdf3hdswhvns31diayq9vfq2-icu4c-69.1 309 libxt@1.2.1 /gnu/store/rqqkla9kqjq3182gdqynkq2jb4jf2bl5-libxt-1.2.1-doc /gnu/store/82pzzkny0gwdfkfa5zvnyy4vbzxqnwyy-libxt-1.2.1 290 libxfixes@6.0.0 /gnu/store/h70i9gyvif5kzpw7a8bdaxhw7sqiv7wz-libxfixes-6.0.0 272 libunwind-julia@1.3.1 /gnu/store/i8c1hpdxdjb86vn4bqjiml5gad6mnrw5-libunwind-julia-1.3.1 268 ocaml@4.14.0 /gnu/store/zvz0xlwm7mvipr7c8q15fw7r6r25nn4s-ocaml-4.14.0 256 mailutils@3.15 /gnu/store/6c5sd4z84p8mbck8b5vn4vd6s05mkbrc-mailutils-3.15 246 libxrandr@1.5.2 /gnu/store/9gqkb75sr60lxic9a3nx543a6wxz0866-libxrandr-1.5.2 241 libxkbfile@1.1.0 /gnu/store/kk0xk8j8ffgxvfs5kz1vxp2ipz28xwh4-libxkbfile-1.1.0 238 xcb-util@0.4.0 /gnu/store/n2x5kvy5zxbnh28ak7rbvw6brp97z1c9-xcb-util-0.4.0 237 xcb-util-wm@0.4.1 /gnu/store/hhasmz0l5f10f9nfg0nx378c7bcgf9v0-xcb-util-wm-0.4.1 237 libxres@1.2.1 /gnu/store/5mpjhsyq2bbri006g7lh6h82239s8fb8-libxres-1.2.1 233 openblas@0.3.20 /gnu/store/wc8cbkcvgqkdf65fj7drb82plkf8igyw-openblas-0.3.20 226 xdg-user-dirs@0.17 /gnu/store/gab0ycim14xflaxzp8arg8hfapx73z3l-xdg-user-dirs-0.17 223 xprop@1.2.5 /gnu/store/61x7vscvrz8zqda73dlq5x35anhz8f8k-xprop-1.2.5 223 docbook2x@0.8.8 /gnu/store/cclsrji5p14aj8bg3kmhkj5532k7l5m4-docbook2x-0.8.8 --8<---------------cut here---------------end--------------->8--- There are currently three Overdrive machines processing the AArch64 build backlog: https://ci.guix.gnu.org/workers I propose to let them do more work overnight and merge tomorrow afternoon CEST. How does that sound? Thanks, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Merging ‘staging’? 2022-06-08 21:24 ` Ludovic Courtès @ 2022-06-10 7:57 ` Efraim Flashner 2022-06-11 9:53 ` Ludovic Courtès 0 siblings, 1 reply; 83+ messages in thread From: Efraim Flashner @ 2022-06-10 7:57 UTC (permalink / raw) To: Ludovic Courtès; +Cc: zimoun, Guix Devel, GNU Guix maintainers [-- Attachment #1: Type: text/plain, Size: 6648 bytes --] On Wed, Jun 08, 2022 at 11:24:22PM +0200, Ludovic Courtès wrote: > Hey Efraim, > > Efraim Flashner <efraim@flashner.co.il> skribis: > > > On Mon, Jun 06, 2022 at 11:17:47PM +0200, Ludovic Courtès wrote: > >> Hi, > >> > >> Ludovic Courtès <ludo@gnu.org> skribis: > >> > >> ‘guix weather -s i686-linux’ says 89% (which is underestimated, because > >> it wrongfully checks for all the packages, including unsupported > >> packages), which sounds good. > >> > >> We have to check for AArch64 & co. Any takers? > >> > >> Overall it seems to me we should be able to merge ‘staging’ within a > >> couple of days. Thoughts? > > > > Currently ci.guix.gnu.org isn't building any of the aarch64 packages, > > and it looks like it hasn't since about May 26th. Once those start > > building again I expect we'll see it's doing well. Minus perhaps the > > rust stuff since I'm not sure the offload build machines can handle > > that. > > Hmm the situation is bad indeed: > > --8<---------------cut here---------------start------------->8--- > $ ./pre-inst-env guix weather -s aarch64-linux -c200 > computing 18,932 package derivations for aarch64-linux... > looking for 19,704 store items on https://ci.guix.gnu.org... > https://ci.guix.gnu.org > 17.1% substitutes available (3,360 out of 19,704) > at least 22,303.1 MiB of nars (compressed) > 24,029.2 MiB on disk (uncompressed) > 0.006 seconds per request (114.2 seconds in total) > 172.5 requests per second > > 5.3% (870 out of 16,344) of the missing items are queued > at least 1,000 queued builds > aarch64-linux: 840 (84.0%) > x86_64-linux: 84 (8.4%) > powerpc64le-linux: 72 (7.2%) > armhf-linux: 4 (.4%) > build rate: 143.62 builds per hour > i686-linux: 99.96 builds per hour > x86_64-linux: 31.51 builds per hour > aarch64-linux: 25.66 builds per hour > powerpc64le-linux: 3.14 builds per hour > 729 packages are missing from 'https://ci.guix.gnu.org' for 'aarch64-linux', among which: > 14236 libxft@2.3.3 /gnu/store/2smylcjq5cppxcrj2mn229hlmh6bf7w4-libxft-2.3.3 > 10066 icu4c@69.1 /gnu/store/n9nx5rmnhdf3hdswhvns31diayq9vfq2-icu4c-69.1 > 7723 jbig2dec@0.19 /gnu/store/lrpczm2m0agx0x5rp6kmn8c46mc85l35-jbig2dec-0.19 > 6552 libxt@1.2.1 /gnu/store/rqqkla9kqjq3182gdqynkq2jb4jf2bl5-libxt-1.2.1-doc /gnu/store/82pzzkny0gwdfkfa5zvnyy4vbzxqnwyy-libxt-1.2.1 > 4555 openblas@0.3.20 /gnu/store/wc8cbkcvgqkdf65fj7drb82plkf8igyw-openblas-0.3.20 > 4231 libxfixes@6.0.0 /gnu/store/h70i9gyvif5kzpw7a8bdaxhw7sqiv7wz-libxfixes-6.0.0 > 3788 libxrandr@1.5.2 /gnu/store/9gqkb75sr60lxic9a3nx543a6wxz0866-libxrandr-1.5.2 > 3320 libxkbfile@1.1.0 /gnu/store/kk0xk8j8ffgxvfs5kz1vxp2ipz28xwh4-libxkbfile-1.1.0 > 3297 xcb-util@0.4.0 /gnu/store/n2x5kvy5zxbnh28ak7rbvw6brp97z1c9-xcb-util-0.4.0 > 3279 xcb-util-wm@0.4.1 /gnu/store/hhasmz0l5f10f9nfg0nx378c7bcgf9v0-xcb-util-wm-0.4.1 > 3263 libxres@1.2.1 /gnu/store/5mpjhsyq2bbri006g7lh6h82239s8fb8-libxres-1.2.1 > 1383 xprop@1.2.5 /gnu/store/61x7vscvrz8zqda73dlq5x35anhz8f8k-xprop-1.2.5 > 1381 xdg-user-dirs@0.17 /gnu/store/gab0ycim14xflaxzp8arg8hfapx73z3l-xdg-user-dirs-0.17 > 1368 docbook2x@0.8.8 /gnu/store/cclsrji5p14aj8bg3kmhkj5532k7l5m4-docbook2x-0.8.8 > 1286 perl-net-ssleay@1.92 /gnu/store/cn77pic9249j7h002a9701v0xzpi28yk-perl-net-ssleay-1.92 > 1179 emacs-minimal@28.1 /gnu/store/c768r60pj3f2af2ysbjqdnlxwpgwmmpp-emacs-minimal-28.1 > 1121 go-std@1.17.9 /gnu/store/fqdkzg6nlzhj93ysjqxrmqsz8srq2l9r-go-std-1.17.9 > 1021 ruby-activemodel@6.1.3 /gnu/store/12gm34s68siqdfagc16ldjdp03klc5xw-ruby-activemodel-6.1.3 > 1005 ruby-shoulda-matchers@2.8.0 /gnu/store/zcbdlp0qqb3axsmfvd8rdmn70kwdiw11-ruby-shoulda-matchers-2.8.0 > 1001 ruby-webmock@2.3.2 /gnu/store/jfrng4404avghlkyxw2y5hqpdn8v3mih-ruby-webmock-2.3.2 > 976 ruby-sawyer@0.8.2 /gnu/store/w0aaby4lvdcz0dr5006mx2ik6l1v2s5l-ruby-sawyer-0.8.2 > 634 jikes@1.22 /gnu/store/nwkrhbzbd8s9dysgik58af93b2kjm4w3-jikes-1.22 > 622 nss-certs@3.71 /gnu/store/01k1v00g7vc7n90y5yr9bacrnr3ml46p-nss-certs-3.71 > 576 texlive-latex-cmap@59745 /gnu/store/zdws0y31a1hhgxb80qc2lx4smmp9pmgc-texlive-latex-cmap-59745 > 558 libxft@2.3.3 /gnu/store/2smylcjq5cppxcrj2mn229hlmh6bf7w4-libxft-2.3.3 > 491 xmodmap@1.0.10 /gnu/store/rm8ww2flazqypwiagizbbsslv0g86h67-xmodmap-1.0.10 > 489 ucd@14.0.0 /gnu/store/f3hkrqnsj9dadliaixrlh17z4c9bsjfl-ucd-14.0.0 > 400 jbig2dec@0.19 /gnu/store/lrpczm2m0agx0x5rp6kmn8c46mc85l35-jbig2dec-0.19 > 317 icu4c@69.1 /gnu/store/n9nx5rmnhdf3hdswhvns31diayq9vfq2-icu4c-69.1 > 309 libxt@1.2.1 /gnu/store/rqqkla9kqjq3182gdqynkq2jb4jf2bl5-libxt-1.2.1-doc /gnu/store/82pzzkny0gwdfkfa5zvnyy4vbzxqnwyy-libxt-1.2.1 > 290 libxfixes@6.0.0 /gnu/store/h70i9gyvif5kzpw7a8bdaxhw7sqiv7wz-libxfixes-6.0.0 > 272 libunwind-julia@1.3.1 /gnu/store/i8c1hpdxdjb86vn4bqjiml5gad6mnrw5-libunwind-julia-1.3.1 > 268 ocaml@4.14.0 /gnu/store/zvz0xlwm7mvipr7c8q15fw7r6r25nn4s-ocaml-4.14.0 > 256 mailutils@3.15 /gnu/store/6c5sd4z84p8mbck8b5vn4vd6s05mkbrc-mailutils-3.15 > 246 libxrandr@1.5.2 /gnu/store/9gqkb75sr60lxic9a3nx543a6wxz0866-libxrandr-1.5.2 > 241 libxkbfile@1.1.0 /gnu/store/kk0xk8j8ffgxvfs5kz1vxp2ipz28xwh4-libxkbfile-1.1.0 > 238 xcb-util@0.4.0 /gnu/store/n2x5kvy5zxbnh28ak7rbvw6brp97z1c9-xcb-util-0.4.0 > 237 xcb-util-wm@0.4.1 /gnu/store/hhasmz0l5f10f9nfg0nx378c7bcgf9v0-xcb-util-wm-0.4.1 > 237 libxres@1.2.1 /gnu/store/5mpjhsyq2bbri006g7lh6h82239s8fb8-libxres-1.2.1 > 233 openblas@0.3.20 /gnu/store/wc8cbkcvgqkdf65fj7drb82plkf8igyw-openblas-0.3.20 > 226 xdg-user-dirs@0.17 /gnu/store/gab0ycim14xflaxzp8arg8hfapx73z3l-xdg-user-dirs-0.17 > 223 xprop@1.2.5 /gnu/store/61x7vscvrz8zqda73dlq5x35anhz8f8k-xprop-1.2.5 > 223 docbook2x@0.8.8 /gnu/store/cclsrji5p14aj8bg3kmhkj5532k7l5m4-docbook2x-0.8.8 > --8<---------------cut here---------------end--------------->8--- > > There are currently three Overdrive machines processing the AArch64 > build backlog: > > https://ci.guix.gnu.org/workers > > I propose to let them do more work overnight and merge tomorrow > afternoon CEST. How does that sound? > My main concern is that so few of the missing items are queued to be built. I've restarted some of them manually, but we're going to need to tell cuirass to rebuild those packages. -- Efraim Flashner <efraim@flashner.co.il> אפרים פלשנר GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351 Confidentiality cannot be guaranteed on emails sent or received unencrypted [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Merging ‘staging’? 2022-06-10 7:57 ` Efraim Flashner @ 2022-06-11 9:53 ` Ludovic Courtès 2022-06-12 3:58 ` Efraim Flashner 0 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2022-06-11 9:53 UTC (permalink / raw) To: zimoun; +Cc: Guix Devel, GNU Guix maintainers Hi, Efraim Flashner <efraim@flashner.co.il> skribis: > My main concern is that so few of the missing items are queued to be > built. I wonder if that info is accurate. For instance, https://ci.guix.gnu.org/build/716980/details shows the derivation for /gnu/store/2smylcjq5cppxcrj2mn229hlmh6bf7w4-libxft-2.3.3. It is queued, just not being processed (yet). > I've restarted some of them manually, but we're going to need to tell > cuirass to rebuild those packages. It went from 17.1% to 17.3% in two days, even though the AArch64 machines have been busy all along it seems. Maybe they’ve been processing the backlog that had accumulated on ‘master’ rather than the things we care about. --8<---------------cut here---------------start------------->8--- $ ./pre-inst-env guix weather -s aarch64-linux -c200 computing 18,932 package derivations for aarch64-linux... looking for 19,704 store items on https://ci.guix.gnu.org... https://ci.guix.gnu.org 17.3% substitutes available (3,410 out of 19,704) at least 22,359.4 MiB of nars (compressed) 24,158.2 MiB on disk (uncompressed) 0.008 seconds per request (127.0 seconds in total) 128.7 requests per second 0.0% (0 out of 16,294) of the missing items are queued at least 1,000 queued builds powerpc64le-linux: 987 (98.7%) aarch64-linux: 12 (1.2%) x86_64-linux: 1 (.1%) build rate: 40.03 builds per hour x86_64-linux: 16.83 builds per hour aarch64-linux: 11.23 builds per hour i686-linux: 9.03 builds per hour powerpc64le-linux: 3.04 builds per hour 1496 packages are missing from 'https://ci.guix.gnu.org' for 'aarch64-linux', among which: 14236 libxft@2.3.3 /gnu/store/2smylcjq5cppxcrj2mn229hlmh6bf7w4-libxft-2.3.3 12379 nghttp2@1.44.0 /gnu/store/4cs553aj8x1xbavfzfdh4gn5idf5ij81-nghttp2-1.44.0-lib /gnu/store/4phvjrp12n8bfpncyp89414q2pa4d46q-nghttp2-1.44.0 10066 icu4c@69.1 /gnu/store/n9nx5rmnhdf3hdswhvns31diayq9vfq2-icu4c-69.1 7723 jbig2dec@0.19 /gnu/store/lrpczm2m0agx0x5rp6kmn8c46mc85l35-jbig2dec-0.19 6989 ninja@1.10.2 /gnu/store/jdq3xrcj0am4j698xr81hwgj8skcn7xq-ninja-1.10.2 6927 python-libxml2@2.9.12 /gnu/store/swgvpb6pb6nf84a08m8flmy7fjhxwvni-python-libxml2-2.9.12 6924 mallard-ducktype@1.0.2 /gnu/store/662lari1slhz56q8333sdczq1av9f799-mallard-ducktype-1.0.2 6552 libxt@1.2.1 /gnu/store/rqqkla9kqjq3182gdqynkq2jb4jf2bl5-libxt-1.2.1-doc /gnu/store/82pzzkny0gwdfkfa5zvnyy4vbzxqnwyy-libxt-1.2.1 6503 python-fonttools@4.28.5 /gnu/store/vp3g1ddrv067gay8zk1xd7c0kcgq1cv5-python-fonttools-4.28.5 5120 python-wheel@0.37.0 /gnu/store/0rmkfrmrjsvf2hvl9px7h3g91zypmycz-python-wheel-0.37.0 5113 python-flit-core-bootstrap@3.5.1 /gnu/store/pcwmq56r3wb8wdv8blj8ajfsmvcj6wm1-python-flit-core-bootstrap-3.5.1 4555 openblas@0.3.20 /gnu/store/wc8cbkcvgqkdf65fj7drb82plkf8igyw-openblas-0.3.20 4231 libxfixes@6.0.0 /gnu/store/h70i9gyvif5kzpw7a8bdaxhw7sqiv7wz-libxfixes-6.0.0 4041 python-markupsafe@2.0.1 /gnu/store/1k63s700a1sy3pvcms0kax7csqsjzxdr-python-markupsafe-2.0.1 3788 libxrandr@1.5.2 /gnu/store/9gqkb75sr60lxic9a3nx543a6wxz0866-libxrandr-1.5.2 3563 eudev@3.2.11 /gnu/store/nvdlxv30l6f06nclls7j6zi4s8cm1jnc-eudev-3.2.11 /gnu/store/5ja9bj947iir15ypmqzrwxk04w6vhiyz-eudev-3.2.11-static 3360 libpsl@0.21.1 /gnu/store/5jyxcfsgk0hsj6rzfsz84wnap6bn57ka-libpsl-0.21.1 3329 libevent@2.1.12 /gnu/store/28iivyxgqvnp2alx2fyqqx18md7pwja8-libevent-2.1.12-bin /gnu/store/cvvsdqkcb8z78bh7rhzirv2n4sb4svgg-libevent-2.1.12 3320 libxkbfile@1.1.0 /gnu/store/kk0xk8j8ffgxvfs5kz1vxp2ipz28xwh4-libxkbfile-1.1.0 3297 xcb-util@0.4.0 /gnu/store/n2x5kvy5zxbnh28ak7rbvw6brp97z1c9-xcb-util-0.4.0 3279 xcb-util-wm@0.4.1 /gnu/store/hhasmz0l5f10f9nfg0nx378c7bcgf9v0-xcb-util-wm-0.4.1 3263 libxres@1.2.1 /gnu/store/5mpjhsyq2bbri006g7lh6h82239s8fb8-libxres-1.2.1 3215 python-flit-core@3.5.1 /gnu/store/zldar3i40q3l40fypm8n6fh3kpddxhzq-python-flit-core-3.5.1 3213 python-pytz@2022.1 /gnu/store/byyn7jzs85r2n11hdbk98dk2ikb74z9n-python-pytz-2022.1 3205 python-pycparser@2.21 /gnu/store/4a5l67ama5msmd2qi8w7mvlq64b04znb-python-pycparser-2.21-doc /gnu/store/98g8chr9pcxyz0czp9fq2w3q8rm2sn14-python-pycparser-2.21 3201 python-idna@3.3 /gnu/store/fj5sc68s4g0rh5gycnzvx2nkmviphfyb-python-idna-3.3 3170 python-pretend@1.0.9 /gnu/store/ksyw3ffmmhizh25ql0jp7yfv5llg55km-python-pretend-1.0.9 3132 python-semantic-version@2.8.5 /gnu/store/0g95jbn19fwr52f5l5j1ibv7h9g7dsyl-python-semantic-version-2.8.5 3127 python-asn1crypto@1.4.0 /gnu/store/12xs95mcz9v9swwyinsagfdn0qa74rgw-python-asn1crypto-1.4.0 3126 python-cryptography-vectors@3.4.8 /gnu/store/5ww2a12dzyq8fbazwkqhn26wv5ahk1xj-python-cryptography-vectors-3.4.8 2754 python-pyyaml@6.0 /gnu/store/pxxnkbrljhizypjpfdl27djjzsyflnic-python-pyyaml-6.0 2542 python-dnspython@2.1.0 /gnu/store/m66znr3nwqb7w132yiw9iznzqif2z84r-python-dnspython-2.1.0 2539 python-pyasn1@0.4.8 /gnu/store/y8xmfzmigvkhx5qz30r1hviyrbl351gf-python-pyasn1-0.4.8 2499 talloc@2.3.3 /gnu/store/3a4kjg0gza37nww955wmn2fvr47vhcg2-talloc-2.3.3 2485 tdb@1.4.5 /gnu/store/mih377grfg6a0p29d9g073h2asgz2qhb-tdb-1.4.5 2474 sane-backends-minimal@1.0.32 /gnu/store/irsdxn937lk7kwzbzynv5jfsg23dg00w-sane-backends-minimal-1.0.32 2466 iso-codes@4.5.0 /gnu/store/wh8wjbcl3ra9rgqm8k03bvv44592d21q-iso-codes-4.5.0 2404 python-pygments@2.12.0 /gnu/store/daikb3nxqvqf26xaz0g07r9mpk3qppf9-python-pygments-2.12.0 2387 python-execnet@1.9.0 /gnu/store/d8bch78szsdzhwcf1xv2s33czqjngylp-python-execnet-1.9.0 2381 python-pytest-forked@1.3.0 /gnu/store/2sd0qgv2ahmfhrjqkffc95ha2vkg0v7l-python-pytest-forked-1.3.0 2356 python-docutils@0.17.1 /gnu/store/6lmz781dvgv32vri4yz3zabb7xb2ba9c-python-docutils-0.17.1 2145 python-pbr-minimal@5.5.1 /gnu/store/ylicyzxc1xi7jld73lnfay4vkkkzj3v2-python-pbr-minimal-5.5.1 2045 python-parameterized@0.7.4 /gnu/store/4avvz5qb327l5nv6vs8s9fvi3w0hnpg3-python-parameterized-0.7.4 2044 python-pyserial@3.5 /gnu/store/42s9wkvmb1mxwk2bcshhhhinkqa1fk62-python-pyserial-3.5 2036 python-scour@0.38.2 /gnu/store/vdbf89hbs3md00iaiz181d2lnxv6n0ph-python-scour-0.38.2 […] --8<---------------cut here---------------end--------------->8--- Anyway, I think we must address that, but I also think we can’t afford to delay the merge any longer or the updates will be stale. Thus I propose to merge today, for real this time. Objections? Thanks, Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Merging ‘staging’? 2022-06-11 9:53 ` Ludovic Courtès @ 2022-06-12 3:58 ` Efraim Flashner 2022-06-12 21:08 ` Ludovic Courtès 0 siblings, 1 reply; 83+ messages in thread From: Efraim Flashner @ 2022-06-12 3:58 UTC (permalink / raw) To: Ludovic Courtès, zimoun; +Cc: Guix Devel, GNU Guix maintainers On June 11, 2022 9:53:14 AM UTC, "Ludovic Courtès" <ludo@gnu.org> wrote: >Hi, > >Efraim Flashner <efraim@flashner.co.il> skribis: > >> My main concern is that so few of the missing items are queued to be >> built. > >I wonder if that info is accurate. > >For instance, https://ci.guix.gnu.org/build/716980/details shows the >derivation for /gnu/store/2smylcjq5cppxcrj2mn229hlmh6bf7w4-libxft-2.3.3. >It is queued, just not being processed (yet). > >> I've restarted some of them manually, but we're going to need to tell >> cuirass to rebuild those packages. > >It went from 17.1% to 17.3% in two days, even though the AArch64 >machines have been busy all along it seems. Maybe they’ve been >processing the backlog that had accumulated on ‘master’ rather than the >things we care about. > >--8<---------------cut here---------------start------------->8--- >$ ./pre-inst-env guix weather -s aarch64-linux -c200 >computing 18,932 package derivations for aarch64-linux... >looking for 19,704 store items on https://ci.guix.gnu.org... >https://ci.guix.gnu.org > 17.3% substitutes available (3,410 out of 19,704) > at least 22,359.4 MiB of nars (compressed) > 24,158.2 MiB on disk (uncompressed) > 0.008 seconds per request (127.0 seconds in total) > 128.7 requests per second > > 0.0% (0 out of 16,294) of the missing items are queued > at least 1,000 queued builds > powerpc64le-linux: 987 (98.7%) > aarch64-linux: 12 (1.2%) > x86_64-linux: 1 (.1%) > build rate: 40.03 builds per hour > x86_64-linux: 16.83 builds per hour > aarch64-linux: 11.23 builds per hour > i686-linux: 9.03 builds per hour > powerpc64le-linux: 3.04 builds per hour >1496 packages are missing from 'https://ci.guix.gnu.org' for 'aarch64-linux', among which: > 14236 libxft@2.3.3 /gnu/store/2smylcjq5cppxcrj2mn229hlmh6bf7w4-libxft-2.3.3 > 12379 nghttp2@1.44.0 /gnu/store/4cs553aj8x1xbavfzfdh4gn5idf5ij81-nghttp2-1.44.0-lib /gnu/store/4phvjrp12n8bfpncyp89414q2pa4d46q-nghttp2-1.44.0 > 10066 icu4c@69.1 /gnu/store/n9nx5rmnhdf3hdswhvns31diayq9vfq2-icu4c-69.1 > 7723 jbig2dec@0.19 /gnu/store/lrpczm2m0agx0x5rp6kmn8c46mc85l35-jbig2dec-0.19 > 6989 ninja@1.10.2 /gnu/store/jdq3xrcj0am4j698xr81hwgj8skcn7xq-ninja-1.10.2 > 6927 python-libxml2@2.9.12 /gnu/store/swgvpb6pb6nf84a08m8flmy7fjhxwvni-python-libxml2-2.9.12 > 6924 mallard-ducktype@1.0.2 /gnu/store/662lari1slhz56q8333sdczq1av9f799-mallard-ducktype-1.0.2 > 6552 libxt@1.2.1 /gnu/store/rqqkla9kqjq3182gdqynkq2jb4jf2bl5-libxt-1.2.1-doc /gnu/store/82pzzkny0gwdfkfa5zvnyy4vbzxqnwyy-libxt-1.2.1 > 6503 python-fonttools@4.28.5 /gnu/store/vp3g1ddrv067gay8zk1xd7c0kcgq1cv5-python-fonttools-4.28.5 > 5120 python-wheel@0.37.0 /gnu/store/0rmkfrmrjsvf2hvl9px7h3g91zypmycz-python-wheel-0.37.0 > 5113 python-flit-core-bootstrap@3.5.1 /gnu/store/pcwmq56r3wb8wdv8blj8ajfsmvcj6wm1-python-flit-core-bootstrap-3.5.1 > 4555 openblas@0.3.20 /gnu/store/wc8cbkcvgqkdf65fj7drb82plkf8igyw-openblas-0.3.20 > 4231 libxfixes@6.0.0 /gnu/store/h70i9gyvif5kzpw7a8bdaxhw7sqiv7wz-libxfixes-6.0.0 > 4041 python-markupsafe@2.0.1 /gnu/store/1k63s700a1sy3pvcms0kax7csqsjzxdr-python-markupsafe-2.0.1 > 3788 libxrandr@1.5.2 /gnu/store/9gqkb75sr60lxic9a3nx543a6wxz0866-libxrandr-1.5.2 > 3563 eudev@3.2.11 /gnu/store/nvdlxv30l6f06nclls7j6zi4s8cm1jnc-eudev-3.2.11 /gnu/store/5ja9bj947iir15ypmqzrwxk04w6vhiyz-eudev-3.2.11-static > 3360 libpsl@0.21.1 /gnu/store/5jyxcfsgk0hsj6rzfsz84wnap6bn57ka-libpsl-0.21.1 > 3329 libevent@2.1.12 /gnu/store/28iivyxgqvnp2alx2fyqqx18md7pwja8-libevent-2.1.12-bin /gnu/store/cvvsdqkcb8z78bh7rhzirv2n4sb4svgg-libevent-2.1.12 > 3320 libxkbfile@1.1.0 /gnu/store/kk0xk8j8ffgxvfs5kz1vxp2ipz28xwh4-libxkbfile-1.1.0 > 3297 xcb-util@0.4.0 /gnu/store/n2x5kvy5zxbnh28ak7rbvw6brp97z1c9-xcb-util-0.4.0 > 3279 xcb-util-wm@0.4.1 /gnu/store/hhasmz0l5f10f9nfg0nx378c7bcgf9v0-xcb-util-wm-0.4.1 > 3263 libxres@1.2.1 /gnu/store/5mpjhsyq2bbri006g7lh6h82239s8fb8-libxres-1.2.1 > 3215 python-flit-core@3.5.1 /gnu/store/zldar3i40q3l40fypm8n6fh3kpddxhzq-python-flit-core-3.5.1 > 3213 python-pytz@2022.1 /gnu/store/byyn7jzs85r2n11hdbk98dk2ikb74z9n-python-pytz-2022.1 > 3205 python-pycparser@2.21 /gnu/store/4a5l67ama5msmd2qi8w7mvlq64b04znb-python-pycparser-2.21-doc /gnu/store/98g8chr9pcxyz0czp9fq2w3q8rm2sn14-python-pycparser-2.21 > 3201 python-idna@3.3 /gnu/store/fj5sc68s4g0rh5gycnzvx2nkmviphfyb-python-idna-3.3 > 3170 python-pretend@1.0.9 /gnu/store/ksyw3ffmmhizh25ql0jp7yfv5llg55km-python-pretend-1.0.9 > 3132 python-semantic-version@2.8.5 /gnu/store/0g95jbn19fwr52f5l5j1ibv7h9g7dsyl-python-semantic-version-2.8.5 > 3127 python-asn1crypto@1.4.0 /gnu/store/12xs95mcz9v9swwyinsagfdn0qa74rgw-python-asn1crypto-1.4.0 > 3126 python-cryptography-vectors@3.4.8 /gnu/store/5ww2a12dzyq8fbazwkqhn26wv5ahk1xj-python-cryptography-vectors-3.4.8 > 2754 python-pyyaml@6.0 /gnu/store/pxxnkbrljhizypjpfdl27djjzsyflnic-python-pyyaml-6.0 > 2542 python-dnspython@2.1.0 /gnu/store/m66znr3nwqb7w132yiw9iznzqif2z84r-python-dnspython-2.1.0 > 2539 python-pyasn1@0.4.8 /gnu/store/y8xmfzmigvkhx5qz30r1hviyrbl351gf-python-pyasn1-0.4.8 > 2499 talloc@2.3.3 /gnu/store/3a4kjg0gza37nww955wmn2fvr47vhcg2-talloc-2.3.3 > 2485 tdb@1.4.5 /gnu/store/mih377grfg6a0p29d9g073h2asgz2qhb-tdb-1.4.5 > 2474 sane-backends-minimal@1.0.32 /gnu/store/irsdxn937lk7kwzbzynv5jfsg23dg00w-sane-backends-minimal-1.0.32 > 2466 iso-codes@4.5.0 /gnu/store/wh8wjbcl3ra9rgqm8k03bvv44592d21q-iso-codes-4.5.0 > 2404 python-pygments@2.12.0 /gnu/store/daikb3nxqvqf26xaz0g07r9mpk3qppf9-python-pygments-2.12.0 > 2387 python-execnet@1.9.0 /gnu/store/d8bch78szsdzhwcf1xv2s33czqjngylp-python-execnet-1.9.0 > 2381 python-pytest-forked@1.3.0 /gnu/store/2sd0qgv2ahmfhrjqkffc95ha2vkg0v7l-python-pytest-forked-1.3.0 > 2356 python-docutils@0.17.1 /gnu/store/6lmz781dvgv32vri4yz3zabb7xb2ba9c-python-docutils-0.17.1 > 2145 python-pbr-minimal@5.5.1 /gnu/store/ylicyzxc1xi7jld73lnfay4vkkkzj3v2-python-pbr-minimal-5.5.1 > 2045 python-parameterized@0.7.4 /gnu/store/4avvz5qb327l5nv6vs8s9fvi3w0hnpg3-python-parameterized-0.7.4 > 2044 python-pyserial@3.5 /gnu/store/42s9wkvmb1mxwk2bcshhhhinkqa1fk62-python-pyserial-3.5 > 2036 python-scour@0.38.2 /gnu/store/vdbf89hbs3md00iaiz181d2lnxv6n0ph-python-scour-0.38.2 > >[…] >--8<---------------cut here---------------end--------------->8--- > >Anyway, I think we must address that, but I also think we can’t afford >to delay the merge any longer or the updates will be stale. > >Thus I propose to merge today, for real this time. > >Objections? > >Thanks, >Ludo’. Let's do it -- Sent from my Android device with K-9 Mail. Please excuse my brevity. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Merging ‘staging’? 2022-06-12 3:58 ` Efraim Flashner @ 2022-06-12 21:08 ` Ludovic Courtès 2022-06-13 7:03 ` Ludovic Courtès 0 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2022-06-12 21:08 UTC (permalink / raw) To: Efraim Flashner; +Cc: zimoun, Guix Devel, GNU Guix maintainers Hi, Efraim Flashner <efraim@flashner.co.il> skribis: > Let's do it Soooo… turns out commit e31ab8c24848a7691a838af8df61d3e7097cddbc on ‘master’ unwillingly triggered a rebuild of 2K packages. It’s too late to revert (they’ve been built anyway), but I’ve merged ‘master’ in ‘staging’ so they can be built there. Which means I’ll merge ‘staging’ in ‘master’ tomorrow morning if nothing has collapsed by then. :-) Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Merging ‘staging’? 2022-06-12 21:08 ` Ludovic Courtès @ 2022-06-13 7:03 ` Ludovic Courtès 2022-06-14 10:32 ` Release ? (was: Merging ‘staging’?) zimoun 0 siblings, 1 reply; 83+ messages in thread From: Ludovic Courtès @ 2022-06-13 7:03 UTC (permalink / raw) To: Efraim Flashner; +Cc: zimoun, Guix Devel, GNU Guix maintainers Hello Guix, Ludovic Courtès <ludo@gnu.org> skribis: > Which means I’ll merge ‘staging’ in ‘master’ tomorrow morning if nothing > has collapsed by then. :-) Merged, enjoy! :-) Thanks to everyone who helped on the way! Next up: release and ‘core-updates’. Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
* Release ? (was: Merging ‘staging’?) 2022-06-13 7:03 ` Ludovic Courtès @ 2022-06-14 10:32 ` zimoun 2022-06-14 13:08 ` Efraim Flashner 0 siblings, 1 reply; 83+ messages in thread From: zimoun @ 2022-06-14 10:32 UTC (permalink / raw) To: Ludovic Courtès, Efraim Flashner; +Cc: Guix Devel, GNU Guix maintainers Hi, On Mon, 13 Jun 2022 at 09:03, Ludovic Courtès <ludo@gnu.org> wrote: > Merged, enjoy! :-) Cool! > Next up: release and ‘core-updates’. Do you want to do a ’core-updates’ merge before the release? I think a release on July would be very welcome. WDYT? Cheers, simon ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release ? (was: Merging ‘staging’?) 2022-06-14 10:32 ` Release ? (was: Merging ‘staging’?) zimoun @ 2022-06-14 13:08 ` Efraim Flashner 2022-06-15 9:21 ` Release ? Ludovic Courtès 0 siblings, 1 reply; 83+ messages in thread From: Efraim Flashner @ 2022-06-14 13:08 UTC (permalink / raw) To: zimoun; +Cc: Ludovic Courtès, Guix Devel, GNU Guix maintainers [-- Attachment #1: Type: text/plain, Size: 692 bytes --] On Tue, Jun 14, 2022 at 12:32:13PM +0200, zimoun wrote: > Hi, > > On Mon, 13 Jun 2022 at 09:03, Ludovic Courtès <ludo@gnu.org> wrote: > > > Merged, enjoy! :-) > > Cool! > > > > Next up: release and ‘core-updates’. > > Do you want to do a ’core-updates’ merge before the release? I think a > release on July would be very welcome. WDYT? I think we do release and then core-updates, before we get bogged down in fixing packages in core-updates. -- Efraim Flashner <efraim@flashner.co.il> אפרים פלשנר GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351 Confidentiality cannot be guaranteed on emails sent or received unencrypted [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 83+ messages in thread
* Re: Release ? 2022-06-14 13:08 ` Efraim Flashner @ 2022-06-15 9:21 ` Ludovic Courtès 0 siblings, 0 replies; 83+ messages in thread From: Ludovic Courtès @ 2022-06-15 9:21 UTC (permalink / raw) To: zimoun; +Cc: Guix Devel, GNU Guix maintainers Efraim Flashner <efraim@flashner.co.il> skribis: > I think we do release and then core-updates, before we get bogged down > in fixing packages in core-updates. Agreed! Ludo’. ^ permalink raw reply [flat|nested] 83+ messages in thread
end of thread, other threads:[~2022-06-15 9:22 UTC | newest] Thread overview: 83+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2017-05-24 13:11 What’s next? Ludovic Courtès 2017-05-24 13:23 ` Ricardo Wurmus 2017-05-27 10:01 ` Ludovic Courtès 2017-05-27 21:44 ` Ricardo Wurmus 2017-05-28 20:44 ` Ludovic Courtès 2017-05-28 21:36 ` Ricardo Wurmus 2017-05-30 15:55 ` Ludovic Courtès 2017-05-24 15:52 ` Brendan Tildesley 2017-05-27 10:04 ` Ludovic Courtès 2017-05-28 20:41 ` Maxim Cournoyer 2017-05-30 15:17 ` Ludovic Courtès 2017-06-03 21:16 ` Maxim Cournoyer 2017-05-24 16:09 ` Catonano 2017-05-24 16:25 ` Jan Nieuwenhuizen 2017-05-24 18:40 ` Adonay Felipe Nogueira 2017-05-24 19:34 ` Catonano 2017-05-24 19:56 ` Ricardo Wurmus 2017-05-30 0:09 ` myglc2 2017-05-24 21:47 ` Leo Famulari 2017-05-24 21:45 ` Leo Famulari 2017-05-25 8:11 ` What???s next? Pjotr Prins 2017-05-27 10:16 ` Ludovic Courtès 2017-05-28 7:30 ` What's next? Pjotr Prins 2017-05-28 20:48 ` Ludovic Courtès 2017-05-28 22:05 ` Roel Janssen 2017-05-30 15:19 ` Ludovic Courtès 2017-05-30 20:15 ` Pjotr Prins 2017-05-29 2:31 ` Maxim Cournoyer 2017-05-28 20:37 ` What???s next? Maxim Cournoyer 2017-05-28 21:34 ` Ricardo Wurmus 2017-05-30 15:14 ` Ludovic Courtès 2017-05-25 14:57 ` What’s next? Chris Marusich 2017-05-25 18:32 ` Leo Famulari 2017-05-25 20:01 ` Ricardo Wurmus 2017-05-25 20:41 ` Adonay Felipe Nogueira 2017-05-27 10:13 ` Ludovic Courtès 2017-05-29 23:28 ` myglc2 2017-06-08 14:35 ` Ricardo Wurmus 2017-05-27 10:09 ` Ludovic Courtès 2017-10-04 15:12 ` Release! Ludovic Courtès 2017-10-05 19:18 ` Release! Christopher Baines 2017-10-06 13:01 ` Release! Ludovic Courtès 2017-10-09 7:25 ` Release! Christopher Baines 2017-10-09 16:25 ` Release! Ludovic Courtès 2017-10-06 18:30 ` Release! Ricardo Wurmus 2017-10-06 23:31 ` Release! David Pirotte 2017-10-07 9:18 ` Release! Hartmut Goebel 2017-10-07 12:21 ` Release! David Pirotte 2017-10-07 21:30 ` Release! Ricardo Wurmus 2017-10-08 13:08 ` Release! Hartmut Goebel 2017-10-07 4:06 ` [PATCH] DRAFT: build: Compile scheme modules in batches (was Re: Release!) Mark H Weaver 2017-10-07 19:35 ` Efraim Flashner 2017-10-08 9:19 ` Ricardo Wurmus 2017-10-08 12:03 ` Ricardo Wurmus 2017-10-08 13:26 ` Ricardo Wurmus 2017-10-09 7:38 ` Ludovic Courtès 2017-10-09 11:32 ` Ricardo Wurmus 2017-10-10 6:52 ` Ricardo Wurmus 2017-10-09 7:42 ` Ludovic Courtès 2017-10-09 7:53 ` Release! Ludovic Courtès 2017-11-20 22:07 ` Release! Ludovic Courtès 2017-11-30 10:40 ` Release! Ludovic Courtès 2017-12-01 2:57 ` Release! Maxim Cournoyer 2017-12-01 18:30 ` Release! Leo Famulari 2017-12-01 19:32 ` Release! Ricardo Wurmus 2017-12-04 8:53 ` Release! Ludovic Courtès 2017-12-04 8:58 ` ISO image available for testing! Ludovic Courtès 2017-12-04 21:35 ` Christopher Baines 2017-12-04 22:34 ` Ludovic Courtès 2017-12-05 22:47 ` Ludovic Courtès 2017-12-06 0:52 ` Mark H Weaver 2017-12-06 1:17 ` Ben Woodcroft 2017-12-06 2:16 ` native-inputs ending up as run-time references [was: ISO image available for testing!] Tobias Geerinckx-Rice 2017-12-06 3:18 ` Leo Famulari 2017-12-06 3:48 ` Tobias Geerinckx-Rice 2017-12-06 8:04 ` ISO image available for testing! Mark H Weaver 2017-12-06 8:14 ` Ludovic Courtès 2017-12-06 16:29 ` Tobias Geerinckx-Rice 2017-12-07 20:09 ` Christopher Baines 2017-12-07 21:19 ` Ludovic Courtès 2017-12-04 8:52 ` Release! Ludovic Courtès 2017-12-05 2:47 ` Release! Maxim Cournoyer -- strict thread matches above, loose matches on Subject: below -- 2022-06-03 16:41 Release v1.4? Ludovic Courtès 2022-06-06 21:17 ` Merging ‘staging’? Ludovic Courtès 2022-06-08 11:50 ` Efraim Flashner 2022-06-08 21:24 ` Ludovic Courtès 2022-06-10 7:57 ` Efraim Flashner 2022-06-11 9:53 ` Ludovic Courtès 2022-06-12 3:58 ` Efraim Flashner 2022-06-12 21:08 ` Ludovic Courtès 2022-06-13 7:03 ` Ludovic Courtès 2022-06-14 10:32 ` Release ? (was: Merging ‘staging’?) zimoun 2022-06-14 13:08 ` Efraim Flashner 2022-06-15 9:21 ` Release ? Ludovic Courtès
Code repositories for project(s) associated with this external index https://git.savannah.gnu.org/cgit/guix.git This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.