IRC channel logs

2021-03-11.log

back to list of logs

<zimoun`>cbaines, <https://data.guix.gnu.org/repository/1/branch/master/package/<package>/output-history> take 15-20 seconds to display. And it is not my network. :-) From where the slowness could come from?
<nckx>pkill9: Thanks!
<kcurtet>Hi im trying to build a ruby gem anystyle-cli. after the build the ruby-build-system tries to test the gem but it throws an error no Rakefile found. I want to bypass the tests to check myself the package.
*kcurtet going for a cup of coffe
<kcurtet>How to get info about the build systems? your read the code?
<jackhill>kcurtet: to your first question: you may want to look in the code for other packages that set #:tests? #f or (modify-phases … (replace 'test …
<jackhill>I think what knowledge I have as come from reading the code/working with them. I can't remember if there is a particularly helpful section of the manual or not (if not, there probably should be ☺)
<kcurtet>jackhill: thx.
<jackhill>your welcome
<Gooberpatrol66>Is it possible to build a guix image that is larger than the root drive?
<kcurtet>Ok, thats works
<zimoun`>nckx: thanks for the GHC substitutes!
<zimoun`>nckx, if you feel pushing stuff for the release, the python-numpy update could be nice :-) See patch#45698 <http://issues.guix.gnu.org/issue/45698>.
<lle-bout>we werent accepted for GSoC it seems?
<lle-bout>iyzsong-w: hello! :-D Is there a way there could be some mentoring on writing GNU Guix services you could do?
<lle-bout>iyzsong-w: Two services come to mind; qemu-ga (guest agent) and netdata (https://issues.guix.gnu.org/46435)
<iyzsong-w>lle-bout: hello, I think I can't give a detail guide, but can answer specified questions.
<lle-bout>iyzsong-w: okay! Maybe next time you write a service you can record yourself doing it so we can learn from your way of doing it!
<lle-bout>iyzsong-w: When I try to tackle these services I will make sure to ask, thanks a lot!
<iyzsong-w>lle-bout: a simple example is 'sysctl-service-type', it add a shepherd-service to run 'sysctl --load'
<lfam>nckx: Around?
<lle-bout>lfam: hello :-)
<lfam>Howdy
<lle-bout>lfam: still patching CVEs
<lfam>Fighting the good fight
<lle-bout>almost half way into the list from 'guix lint -c cve'
<lle-bout>we must not go this late ever again
<bone-baboon>I am having trouble installing Guix on a x86-64 computer. I have tried several Guix x86-64 installer images including latest, 1.2.0, 1.1.0 and 1.0.1. The system becomes unresponsive after the grub menu but before I am able to get to the graphical installer or a terminal. I am not able to switch to a terminal with `C-A-<function-key>`. Here is the output before the system becomes unresponsive for the different instal
<bone-baboon>l images: https://termbin.com/uzmp
<dongcarl>Not sure if people saw but here’s a guy trying out Guix and failing at partitioning: https://youtu.be/W4t6SlZl-ts
<lle-bout>bone-baboon: graphics card?
<lfam>bone-baboon: The main thing you can do to aid debugging is to share your config.scm and tell us what kind of computer you are using
<bone-baboon>lle-bout: `lspci | grep VGA` outputs "00:02.0 VGA compatible controller: Intel Corporation Mobile 945GM/GMS, 943/940GML Express Integrated Graphics Controller (rev 03)"
<lle-bout>bone-baboon: I guess follow lfam advice now
<lle-bout>we need logs otherwise can't say
<bone-baboon>lfam: The system became unresponsive before I could see or edit config.scm. `uname -mpi` outputs "x86_64 AMD Ryzen 5 3500U with Radeon Vega Mobile Gfx AuthenticaAMD".
<bone-baboon>lle-bout: How would you suggest I get logs from an unreponsive system that is working off a live CD?
<lfam>If you are able to mount the disk from another machine, you could get the config.scm. Are you able to do that?
<lle-bout>lfam: they are using the installer
<lfam>Yes, I know
<lfam>It sounds like the installation completes, but the computer fails to reboot. This means the config.scm should be on the disk
<lle-bout>lfam: mhm I guess there is different interpretations of their message but if they are talking about GRUB it must mean things are installed..? Not sure.
<lle-bout>bone-baboon: I would suggest maybe downgrading/upgrading kernel version during install if you could even get to that.
<bone-baboon>lfam: To clarify the installation does not even begin installation before the system becomes unresponsive. The grub menu is for selecting to begin the installation process from the install image.
<lle-bout>lfam: see that's what I thought
<lfam>My bad
<lle-bout>bone-baboon: if you tried all installer versions I don't think there's much we can do, it must be a kernel bug or freedom issue.
<lfam>How are you interacting with the computer? With a monitor? Over VGA? HDMI? Or over a serial console?
<lfam>It could also be a bug in the installer, to be honest. There have been some serious bugs in them
<lfam>Alright I have to afk. I'll probably be back in a couple hours
<lle-bout>lfam: getting the computer unresponsive..?
<lfam>Idk, could be
<bone-baboon>lle-bout: At what point in the insatall do I have the option to upgrade/downgrade the kernel version?
<lfam>I don't see why it would fail to boot entirely
***iyzsong-- is now known as iyzsong-w
*lfam afk
<bone-baboon>lfam: I am interacting with the computer by keyboard and laptop screen.
<bone-baboon>lle-bout: Are there freedom issues with that graphics card or processor?
<lle-bout>bone-baboon: I don't know, you would have to investigate here.
<lle-bout>bone-baboon: most (all?) such issues are due to freedom issues and linux-libre hard way of getting rid of them.
<wehlutyk>Hello guix
<lle-bout>wehlutyk: hello!
<lle-bout>so I believe that Cuirass at ci.guix.gnu.org being broken we are no longer getting new substitutes.
<wehlutyk>Following up with my question about poetry <https://www.mail-archive.com/help-guix@gnu.org/msg11274.html>, I'm getting Phil's and zimoun's drift that I should stick with guix for packaging, so considering introducing colleagues to guix. So question: does anyone have experience installing guix on macOS? Is it possible? Should I try to discuss this on other channels as it involves a non-free OS?
<lle-bout>wehlutyk: macOS is completely unsupported AFAICT. Use GNU/Linux.
<wehlutyk>lle-bout: is it not supported because nobody did it, or because it goes against policies?
<wehlutyk>I'm asking because in many research environments the primary laptops are macs, and while HPC infrastructure runs GNU/Linux, people will already be doing a lot directly on their laptops whenever possible. That is at least my experience in several research institutions, whether they are more or less computation-oriented.
<lle-bout>wehlutyk: It's going to be quite an amount of work, but I don't think it goes against policy. Nor do I think people have much motivation to get GNU Guix working there.
<lle-bout>wehlutyk: GNU/Linux works well on Apple computers!
<lle-bout>Just choose a distribution, maybe not GNU Guix System, but another then install GNU Guix on top.
<wehlutyk>lle-bout: I don't have the resources to convince my colleagues to move away from macOS, but I do have them to convince them to use guix if I can make it work on macOS (and I know they have incentives to do that). Then flipping them could be a second step, but I think it involves a lot more convincing, so it's not my topic here 😛
<lle-bout>wehlutyk: Supporting macOS in GNU Guix will takes years (to actually get to a support as good as on GNU/Linux), so that gives you plenty of time for convincing, the latter is certainly easier :-)
<bone-baboon>Using the 0.16.0 installer I am able to attempt a manual install. This is better than the system going unresponsive as it does with the 1.x.x series of installer images. However I get an error at the last step `guix system init /mnt/etc/config.scm /mnt`. The error as well as other relevant information including config, partition information, file system information and luks information are here: https://termbin.com/
<bone-baboon>f7pi1
<bone-baboon> https://termbin.com/f7pi1
<lle-bout>bone-baboon: try disabling substitutes altogether
<lle-bout>I suppose that the way GNU Guix handles substitutes has changed since then
<bone-baboon>lle-bout: How would I disable substitutes entirely?
<lle-bout>bone-baboon: --no-substitutes on GNU Guix commands but I really don't know how 0.16.x installer works.
<bone-baboon>lle-bout: Okay I will try using that flag to disable substitues.
<lle-bout>bone-baboon: beware, it will try to build everything from source, but that's the only thing you can do.
<bone-baboon>lle-bout: I expect it to take a while. I will check back here when that attempt is completed and will share the results.
*bone-baboon begins Guix manual install with 0.16.0 installer
<lle-bout>seems I screwed up a bit on the docker update, forgot to update source hashes that also depended on that %docker-version variable. Doing so now.
<wehlutyk>lle-bout: (sorry for the lag, had to go to lunch.) Again, I don't see a macOS->GNU/Linux conversion of colleagues happening in the time span of my contract here, and I'll have to start over with new colleagues at the next contract (whereas support for macOS is something I can transfer to another lab). If you think support for macOS would be a bad idea (as in providing the benefits of guix without bringing people to a
<wehlutyk>free/libre OS), then maybe we can discuss that. I think macOS support could bring a big change to scientific reproducibility, so I'm interested in what kind of effort that could be 🙂
<wehlutyk>More to the point: I had no idea it would take years to get support comparable to that on GNU/Linux... where should I start looking if I wanted to dig deeper there?
<lle-bout>wehlutyk: You will need to create a new bootstrap path, e.g. x86_64-darwin
<lle-bout>wehlutyk: have a look at the wip-ppc64le branch, similar thing but for powerpc64le-linux
<wehlutyk>lle-bout: thanks
<lle-bout>wehlutyk: But many details of GNU Guix depend on GNU/Linux and it is likely even more complex that this port to powerpc64le-linux we have been undertaking. There's areas of totally new research for me there, so I wont be able to help on everything.
<lle-bout>I don't know if glibc works on darwin at all
<lle-bout>I suppose it does
<brendyyn>lle-bout: i think the issue is that it requires proprietary compilers to build for macos and those arent ever going to be included in guix
<lle-bout>wehlutyk: You will need to get GNU Guile to work on macOS, first.
<wehlutyk>I'm starting to see the scale of this with the wip-ppc64le branch...
<lle-bout>brendyyn: GCC works on macOS AFAICT.
<lle-bout>wehlutyk: only the last commits are specific to the branch just to clarify
<lle-bout>wehlutyk: your first step is getting GNU Guix dependencies to work natively on macOS, so GNU Guile, and the libraries on top.
<lle-bout>wehlutyk: It seems brew may help you there
<wehlutyk>lle-bout: yes, https://github.com/Homebrew/homebrew-core/blob/HEAD/Formula/guile.rb
<lle-bout>wehlutyk: so few steps: package (or install) all deps of GNU Guix within brew, cross-compile 'bootstrap-tarballs' package to x86_64-darwin from GNU/Linux
<lle-bout>wehlutyk: build GNU Guix with --with-courage added as arg to ./configure on macOS, add previously cross-compiled 'bootstrap-tarballs' to GNU Guix sources, try to get './pre-inst-env guix build hello' to work natively on macOS.
<lle-bout>Once you're there, you've probably done the most difficult work.
<lle-bout>wehlutyk: also read: https://www.gnu.org/software/guix/manual/html_node/Porting.html
<lle-bout>wehlutyk: and read this: https://lists.gnu.org/archive/html/guix-devel/2017-10/msg00111.html
<lle-bout>wehlutyk: marusich says it's not feasible: https://lists.gnu.org/archive/html/guix-devel/2017-10/msg00216.html
<wehlutyk>Yes, that thread is very interesting
<lle-bout>wehlutyk: they suggest using Docker to run GNU Guix inside it on macOS, Docker runs a GNU/Linux VM under the hood so :-P - Install GNU/Linux still kind of wins.
<wehlutyk>Thanks for all this information, I'm still sieving through
<wehlutyk>lle-bout: yes, I'm also thinking it's the simplest and maybe best way
<wehlutyk>lle-bout: So that thread (<https://lists.gnu.org/archive/html/guix-devel/2017-10/msg00111.html>) is very helpful indeed, and explored all options I think. The best option does seem to be making a Docker image. Thanks again for the pointers and help!
<Whyvn>I am trying to edit my /etc/pulse/default.pa but since its from gnu/store I cannot. What is the recommened way of editing this? I am trying to comment out a line so that .esd_auth is not im my $HOME dir and people suggest commenting out the line module-esound-protocol-unix.so inside of /etc/pulse/default.pa
***iyzsong-- is now known as iyzsong-w
***regtur_ is now known as regtur
<bone-baboon>When using the 0.1.0 installer `guix system --no-substitutes init /mnt/etc/config.scm /mnt` has this error: https://termbin.com/fnfv which has this build log: https://termbin.com/1xqm
<i1l>sneek: botsnack.
<sneek>:)
<i1l>sneek: seen minetest?
<sneek>Not as far as I can remember.
<efraim>lle-bout: can you try out the wip-ppc64le-for-master branch? I want to see how it works on ppc64le hardware
<bone-baboon>Is there a way to have Guix skip building and running test when using the `--no-substitutes` flag?
<nckx>bone-baboon: Not without editing the package definition. (I assume 0.1.0 is a typo for 1.1.0? 0.1 is from 2013)
<nckx>bone-baboon: If nobody can help you here, please send a bug report with the above output to bug-guix at gnu.org.
*nckx has to go, but the error doesn't look familiar at all.
<nckx>bone-baboon: But first try the 1.2.0 installer, 1.1.0 is not the latest either.
<civodul>Hello Guix!
<sneek>civodul, you have 1 message!
<sneek>civodul, rlb says: guile-3.0 3.0.5-3 is in debian unstable now, with the gmp fix -- thanks again
<n1x_>does anyone have any advice for handling circular dependencies? I'm taking the new golang importer for a spin and running into a bunch
***iyzsong-- is now known as iyzsong-w
<lle-bout>hello! :-D
<lle-bout>efraim: hey!
<lle-bout>still here?
<lle-bout>nckx: can we give access to efraim to p9.tobias.gr?
<civodul>hi lle-bout! thanks for all the security updates!
<lle-bout>civodul: :-D
<lle-bout>civodul: I have security updates to apply to desktop packages in GNOME or KDE eco-systems and since these are very interdependant it is more complicated.. right now I am thinking gvfs or kdeconnect
<lle-bout>Let's say security situation is GNOME/KDE desktop in GNU Guix right now is uncertain, on the other hand, since XFCE is easy to bump in general, we're pretty much clear there.
<civodul>yeah
<raghavgururajan>Hello Guix!
<db48x>hello raghavgururajan
<raghavgururajan>lle-bout: I just responded to the email. Let me re-start the work on GNOME/wip-desktop.
<lle-bout>raghavgururajan: thank you so much!
<lle-bout>raghavgururajan: We should at least stay in the GNOME supported releases, at this time, 3.36 is still supported AFAICT, but I am not so knowledgeable about GNOME release policies.
<lle-bout>raghavgururajan: if not GNOME upstream supported, I think we should look at the support some other mainstream distro is providing like Ubuntu, Debian or Red Hat then nourish ourselves from their work by closely following the versions they are supporting to lower our maintenance load.
<lle-bout>civodul: one rather severe security update to review: https://issues.guix.gnu.org/47034
<raghavgururajan>lle-bout: I understand. Also, then reason GNOME work got messed up is that, in wip-desktop, [1] I was not just working gnome packages, but also its dependencies [2] Work involved not just updates, but also improvements. This kinda complicated the "update stuff" norm.
<lle-bout>raghavgururajan: That's great, maybe we want to get stuff merged as soon as possible then work from there instead of delaying bunch of changes for too long because they would be WIP
<lle-bout>I think we are suffering the same kind of syndrome (somewhat) in wip-ppc64le
<efraim>lle-bout: I'm in and out a lot today, right now I'm not at home
<raghavgururajan>lle-bout: On a note, I put more work on myself. When I was working on wip-desktop, I made larget commits instead of 'one change per commit'. So after a discussion, I was asked to split them into smaller chunks. So I need to get #42958 out of the way.
<raghavgururajan>rekado rekado_: ^
<raghavgururajan>dannym: Hi Danny! Are you available? :-)
<raghavgururajan>Btw, how is the current health of c-u?
<lle-bout>raghavgururajan: ah.. yes that's annoying
<rekado_>raghavgururajan: what’s up?
<rekado_>(I’m not very attentive)
<rekado_>raghavgururajan: should I review 42958?
<raghavgururajan>rekado_: I wanted to ammend my email with my messages above. That is all. :-)
<rekado_>raghavgururajan: got it :)
<rekado_>thank you for the update!
<rekado_>I just replied to your mail: I do think that we can build things on ci.guix.gnu.org
<rekado_>effective build farm capacity has increased dramatically since mothacehe’s improvements, so I think we should make use of it.
<lle-bout>rekado_: ohh is that recent or are you speaking of older improvements?
<raghavgururajan>Cool!
<jlicht>lle-bout: over the last ~6 weeks, afaik
<lle-bout>jlicht: okay, yes :-) - was wondering what the recent outage of Cuirass was about, if it was just removing "hydra" support or.. else.
<jlicht>Could it be our current mono package bundles quite a lot of pre-built binaries [note: very uncertain could]? Or, are these binaries bundled, but regenerated in the build process?
***vlorentz1 is now known as vlorentz
<leoprikler>raghavgururajan, lle-bout: what about wip-gnome3.36? Is that a good base?
<raghavgururajan>leoprikler: I have to look.
<leoprikler>I'm currently rebasing it onto master and it seems to be ~100 commits
<nckx>jlicht: It could certainly be; don't ever hesitate to ask/investigate such things. If they are bundled and rebuilt, they should never be included in ‘guix build --source mono’; that's a bug in itself if they are.
<lle-bout>leoprikler: no idea, 3.36 sounds better than 3.34 though, but 3.38 wouldnt hurt
<leoprikler>thing is we don't have a wip-3.38 branch and it's have to go to c-u first anyways unless we squint really really hard
<leoprikler>s/it's/it'd/
<cbaines>leoprikler, hey, just looking at #44492 (fractal)
<cbaines>seems like the Guix Data Service failed to process the revision https://data.guix-patches.cbaines.net/job/11536#bottom
*lle-bout compiles efraim's wip-ppc64le-for-master branch
<cbaines>something about rust-pangocairo-0.10 being unbound
<leoprikler>interesting
<montxero>I just installed Guix System with gnome. However, Gnome does not start. I subsequently installed xfce but cannot launch that either
<leoprikler>i've skipped some patches, because of merge conflicts (usually meaning they've already been applied to master)
<lle-bout>montxero: what happens exactly?
*lle-bout worries some of the security updates may actually have broken desktop on GNU Guix
<leoprikler>but pangocairo is indeed missing
<montxero>It boots into a terminal, when I try gnome-session, I get lots of warnings. The first is `gnome-session-binary[495]: Warning: Falling back to non-systemd startup procedure due to error: GDBus.Error.ServiceUnknown: The name org.freedesktop.systemd1 was not provided by any .service files`
<montxero>then a while page of more errors and warnings
<nckx>efraim: Your Savannah GPG key has expired. Could you update it?
<cbaines>civodul, just looking at the Guix Data Service processing of the wip-build-systems-gexp again. Looks like the profile-collisions checker generates some invalid G-expression input error
<montxero>With xfce4, when I try `xfce4-session`, I get `Unable to init server: Could not connect: Connection refused
<lle-bout>montxero: can you send output of 'guix system describe' and your config.scm?
<montxero>xfce4-session: Cannot open display: .
<nckx>n1x_: You'll have to try to build ‘minimal’ versions of such packages for others to depend on. They can be private (‘define’ instead of ‘define-public’) or public depending on how useful they are for end users.
<leoprikler>cbaines: does patchwork test intermediate commits as well or only the series as a whole?
<cbaines>leoprikler, the series as a whole (although checks are reported per-patch)
<i1l>montxero: https://github.com/swaywm/sway/wiki
<n1x_>nckx: thanks, that what I was thinking I'd probably have to do based off the other packages I see in the repo
<nckx>I can't think of another way around it, but I don't know anything about Go. If it has anything approaching ‘./configure --disable-foo --without-blah’.
<lle-bout>nckx: our go package needs security update but I think it is a difficult one to graft, so can we just push it to master even though it would cause rebuilds of 450+ packages?
<leoprikler>cbaines: yep, the commit for pangocairo seems missing, it should be between 26/46 and 27/46
*nckx points at caveat above‌ 😛 Are Go packages cheap by any chance? That would be an argument.
<nckx>Depends on the nature of the CVE, I'd say. 450 isn't terrible...
<lle-bout>nckx: they build faster AFAIK
<lle-bout>nckx: there's like 10+ CVEs there
<nckx>lle-bout: I've added efraim BTW but don't have a GPG key to send the password.
<lle-bout>nckx: alright! that's really good!
<lle-bout>nckx: savannah doesnt publish ssh keys?
<nckx>It does.
<lle-bout>nckx: okay! sudo (root) password then I guess
<nckx>E.g. https://savannah.gnu.org/people/viewgpg.php?user_id=238245
<nckx>But efraim's key on Sav & SKS pool expired in 2020.
<nckx>Oh, sorry, you said ssh.
<nckx>No, I don't think so.
***chrislck_ is now known as chrislck
<lle-bout>nckx: so to push or not to push go?
<nckx>I can only speak for myself but it's OK for me.
<lle-bout>nckx: do you use ci.guix.gnu.org substitutes?
<nckx>Machine time for 150 extra packages is cheaper than your time doing a tricky graft (which has its own risks) & I trust your judgment.
<nckx>lle-bout: Sometimes.
<nckx>I mean, on some machines. Why?
<lle-bout>civodul: to push or not to push go package update fixing 10+ CVEs without graft? It causes 450+ rebuilds but difficult to graft.
<leoprikler>difficult how? ABI-incompatibility?
<lle-bout>leoprikler: go std library
<leoprikler>I have no experience with Go, so that tells me nothing.
<lle-bout>I don't think it has an ABI? go packages are static? Grafting would not rebuild dependents and not fix the issues I think.
<leoprikler>Ahh, like Rust then.
<nckx>Is Go sane re: dynamic linking or is one of those broken static-linking-was-cool-in-2019 langs? If the latter the discussion is moot anyway.
<nckx>OK.
<nckx>You've answered that. Sigh. Then I don't see what a graft would buy us and you should push.
<lle-bout>nckx: I am not certain of my answer, I don't know if we dynamically build go things in GNU Guix somehow.
<lle-bout>But I doubt Golang has a stable ABI of it's own, it would be bigger news otherwise
<nckx>Go ahead.
<nckx>(Ew, no pun intended.)
<lle-bout>nckx: alright!
<nckx>Add a short comment to the commit message.
<nckx>So people don't mail the list thinking they've discovered something.
<lle-bout>nckx: pushed 500189b4d2f1e3a2d4ee8ab73d889e3d8ac70632
<montxero>lle-bout: Outputs of config.scm and guix describe system: https://pastebin.com/7Ea0npyC
<pretzel>Hi. I'm using a guix.git mirror (which failed to pull). By chance I stumbled across [1]. Please consider announcing (on info-guix@?) events that will require manual intervention. Thanks. [1]: https://lists.gnu.org/archive/html/guix-devel/2021-03/msg00156.html
<lle-bout>montxero: looking
<nckx>pretzel: Sure, I would've if it had crossed my mind. But mirror operators should be prepared to deal with that; there was no problem for ‘normal’ users of the main Savannah repository.
<nckx>But thanks for mentioning it.
<lle-bout>montxero: can you also look at /var/log/messages? Don't share that just yet it may contain sensitive info but do look for odd things or other errors.
<montxero>lle-bout: looking
<nckx>If your mirror silently stops updating without sending you mail, you're not going to have a good time.
<lle-bout>efraim: I am building hello on your wip-ppc64le-for-master branch
<montxero>lle-bout: `kernel reports TUNE_ERROR: 0x41: Clock Unsynchronized
<nckx>pretzel: I've send a note to info-guix@.
<lle-bout>montxero: that looks non-critical
<montxero>i1l: do I have to install sway?
<pretzel>nckx: Thank you. :) (Re 'should be prepared' & 'sending you mail': I agree.)
<montxero>i1l: in order to use gnome?
<nckx>pretzel: Please ask your mirror operator to change their configuration so it requires no manual intervention. It's not a security feature to do so.
<nckx>pretzel: We'll try to fix our processes so this ‘never’ happens again, but... 😉
<i1l>montxero: do not use gnome. use sway.
<i1l>then fix gnome
<lle-bout>i1l: it should be fine for them to use XFCE or GNOME, we just have to find whyt his happens.
<i1l>+1
<pretzel>nckx: Will do, thanks again. :)
<i1l>but sway will most likely work, and can be started from console. and He will get access to GUI at least for now. untill it fixed
<lle-bout>montxero: also check other files in /var/log
<lle-bout>montxero: I forgot, xorg logs are separate
<i1l>(sway is wayland: true;)
<nckx>pretzel: Thanks for bringing it up. I forget about mirrors being a thing.
<raghavgururajan>nckx: Do I need to do anything for the mirror https://git.disroot.org/guix/guix/
<raghavgururajan>Seems like last sync was 3hours ago. So things are fine I guess.
<nckx>No.
<nckx>Yes.
<raghavgururajan>Cool.
<nckx>raghavgururajan: This is the ‘good’ re-sign of the ‘bad’ commit: https://git.disroot.org/guix/guix/commit/b1eb7448370bbd4d494cf9f3fddae88dd0de2ca3
<nckx>All is well.
*nckx has been moderated by their own info list. Sigh. Let's hope I have the password written down on an old sock.
<lle-bout>nckx: I was asking for ci.guix.gnu.org to figure out if your opinion came from a substitute user or not.
<montxero>lle-bout: this may be interesing. It is the tail of /var/log/gdm/greeter.log
<montxero> https://pastebin.com/NPdGJMi8
<lle-bout>If anyone is interested, fixing security issues in GNU Guix is often only about knowing about them, so you can follow <https://nvd.nist.gov/feeds/xml/cve/misc/nvd-rss.xml> with an rss reader and at a glance you can view the most recent entries any day you can and filter out the ones about nonfree software or unpackaged free software with few GNU Guix searches.
<nckx>Well, I build my own substitutes, so I'm not average. I also don't use Go.
<lle-bout>It is average traffic RSS feed (~10 entries per day)
<nckx>lle-bout: Do you know about any good (Free) RSS-to-e-mail adapters?
<nckx>I'd actually read it then.
<lle-bout>nckx: oh well they may also offer email service directly, let me check, but I do not, but should be easy to find I think.
<lle-bout>I use quiterss which is quite good for following lots of feeds and getting info from summaries quickly
<nckx>I know myself enough to know that a separate programme just for CVEs will not be opened after the first week.
<nckx>Or allowed to consume resources in the background.
<lle-bout>NVD doesnt provide email service
<nckx>OK, thanks.
<nckx>I can always run a script on my VPS or something.
<lle-bout>nckx: <https://github.com/randombit/grab-rss>?
<nckx>Pre-Python 3, but yeah, something like that.
<lle-bout>a bit too old yep.. well popular seems rss2email
<zimoun>“guix weather” is really slow… when it does not break.
<nckx>zimoun: I've been running ‘until guix weather … :; done’ for close to 24h and it has yet to succeed.
<zimoun>yeah, I am doing similar thing. But the feedback loop is really slow to spot out the missing substitues and then fix for the next release.
<lle-bout>nckx: https://pypi.org/project/rss2email
<zimoun>and https://data.guix.gnu.org/repository/1/branch/master/package/<package>/output-history is also really slow (15-20 seconds) to render the webpage. Why the Data Service is so slow?
<lle-bout>efraim: https://paste.debian.net/plain/1188813 - fails glibc-intermediate
<lle-bout>nckx: we can set paste.debian.net in topic again now it's up
<raghavgururajan>sneek, later tell dannym: I am re-working patches in #42958, for applying them on current c-u.
<sneek>Okay.
<nckx>The problem is the frequency with which is down, I'm kind of sick of manually dancing around that. I'd prefer something as uppy & Free as paste.gnome.org with a longer default expiry.
<nckx>lle-bout: ☝
<nckx>Suggestions welcome but I'm sticking with p.g.o otherwise.
<lle-bout>nckx: oh okay never seen it down before besides the other day.
<nckx>I've had to change the topic too often :)
<raghavgururajan>lle-bout: Would you be able to apply the patches (0001 to 0011) on the last message of this thread (https://issues.guix.gnu.org/issue/42958), to core-updates?
<leoprikler>I personally like the default of 30 minutes in p.g.o., much privacy :)
<lle-bout>raghavgururajan: yes, why exactly?
<lle-bout>raghavgururajan: have you considered applying for commit access?
<raghavgururajan>lle-bout: It is the part of merging process from wip-desktop.
<raghavgururajan>lle-bout: I was thinking about it. Have to started the process.
<lle-bout>zimoun: have you considered applying for commit access?
<lle-bout>raghavgururajan: Shoot an email to people who reviewed your code, I think they will be happy to vouch for you. After that, no doubt approval is near.
<lle-bout>raghavgururajan: I'll apply, but it's a bit blind now
<raghavgururajan>lle-bout: Danny was about to push those 11 patches, but then the c-u breakage happened. I think now c-u is healthy and danny is busy. :-)
<lle-bout>raghavgururajan: I see
<leoprikler>"those 11 patches" referring to what exactly?
<raghavgururajan>> ‎lle-bout‎: raghavgururajan: Shoot an email to people who reviewed your code, I think they will be happy to vouch for you. After that, no doubt approval is near.
<raghavgururajan>Yeah, I was gonna do it. Have been on packaging spree these past days. Will be doing it soon.
<lle-bout>raghavgururajan: doesnt apply cleanly :-S
<lle-bout>raghavgururajan: thanks a lot for all the work :-)
<raghavgururajan>lle-bout: Shoot! Gimme few minutes.
<raghavgururajan>My pleasure! :-)
<lle-bout>leoprikler: I am guessing: https://issues.guix.gnu.org/issue/42958#59
<leoprikler>Ahh, thanks for the hint.
<leoprikler>raghavgururajan: would you mind rebasing those packages onto current c-u and sending a revised patch set?
<raghavgururajan>leoprikler: Yeah, working on it. That's why I said "Shoot! Gimme few minutes." :-)
<leoprikler>It would also help if you could send them via git send-email --reroll-count=2, so that patchwork can pick them up as well
<efraim>wow, so many messages. nckx, lle-bout I updated my gpg key on savannah
<raghavgururajan>leoprikler: Do you know how to apply select part of a patch?
<lle-bout>it seems ENABLED_ENCRYPTED_MEDIA=ON (DRM) has been explicitly enabled on wpewebkit, why ever?
<lle-bout>raghavgururajan: aaa you did it
<raghavgururajan>lle-bout: Ouch! I must have mistakenly typed ON instead of OFF.
<lle-bout>raghavgururajan: I am updating them as well as disabling that DRM stuff right about now
<lle-bout>since there has been many security issues since then
<raghavgururajan>lle-bout: Thanks!
<zimoun>lle-bout: about your question, yeah it is not the first time someone says so. :-) The idea is to explore how it is possible to contribute to Guix without commit access. As it is pointed out, yesterday for example, more committers means more potential weakness. And from my point of view, there is too much granted people and until we will not have a clear rule to ungrant people (who do not often use their commit access or do not review,
<zimoun>for instance), then I will not apply.
<lle-bout>zimoun: I think that we can trust committers, but we need to provide better tools for them to secure their computing, e.g. require hardware security key for PGP signing of commits somehow (that GNU Guix can fund)
<nckx>zimoun: A simple ‘commit access is removed after N months of inactivity and can easily be rerequested’ policy has been suggested, but as you say the problem is deeper.
<nckx>efraim: Thanks! I've sent you ~encrypted mail~.
<nckx>Or, as it's called in Belgium this week, crime-mail.
<nckx>Don't ask.
<zimoun>nckx, I agree and I even did stats to evaluate this N and sent the result to guix-maintainers I guess. :-)
<nckx>Thank you. I haven't read all my mail.
<lle-bout>Today GNU Guix without as many committers would grind to a halt due to human bottleneck issues, it already kind of does. We need better review tooling and better flows of information for everyone to see easily.
<nckx>lle-bout: Eek, nice catch.
<zimoun>lle-bout: no, it is not a technical problem but a social problem. Anyway.
<nckx>I think both are true.
<lle-bout>zimoun: the hardware security key thing reduces risk of compromise to near zero
<apteryx>does someone knows what provides the GNOME 'gio' abstraction in Guix? It seems it might be glib, as it has a gio.pc file
<lle-bout>apteryx: yes glib
<apteryx>know*
<apteryx>OK, thank you
<apteryx>I was a bit confused because upstream has a distinct release for it: https://developer.gnome.org/gio/; I guess glib bundles it.
<nckx>lle-bout: [citation needed] (and I don't agree or even think it mitigates anything, but it's another low-level implementation detail)
<zimoun>does someone plan to work on this <https://lwn.net/Articles/848893/>? It could be nice to have it in the next release. And maybe guile-git needs an update to?
<lle-bout>nckx: hardware security key is e.g. over USB and has interactive button + screen to validate cryptographic operations, malware can't extract keys or validate malicious requests
<nckx>I know what it is.
<lle-bout>even if your machine was infected you still could push commits and ensure it's what's being signed on the key
<lle-bout>so I do think it reduces risk to near zero
<nckx>Your screenkey is fancier than mine. How does it protect against a compromised machine?
*nckx AFK.
<zimoun>any committer, if you are in review mood, this trivial update <http://issues.guix.gnu.org/issue/45698> could be cool to have in the next release.
<lle-bout>nckx: I don't understand your question it should be obvious how it does already, it would protect GNU Guix from committer's compromised machines
<lle-bout>zimoun: I tried this earlier, breaks dependents
<lle-bout>I tried it independently
<lle-bout>pandas, ..
<apteryx>could you say so in the issue, and mentionning how they can find this out? (e.g., trying to build the dependent packages that can be gotten from 'guix refresh -l python-numpy')
<apteryx>so that they have something to chew on
<lle-bout>apteryx: very tired now about to go sleep sorry :-(
<lle-bout>in the middle of webkit upgrade but can't finish before going to sleep I think..
<apteryx>OK, good night then :-)
<nckx>lle-bout: <it would protect GNU Guix from committer's compromised machine> How?
<nckx>Oh, go to sleep :)
<lle-bout>nckx: because malware will not be able to sign commits without the committer explicitly pressing the button and approving the malicious request displayed on screen which will raise concerns to the committer (or should)
<nckx>I don't know what's displayed on the screen, I've never had such a key.
<nckx>It displays the commit hash?
<apteryx>lle-bout: whatever pops a message on screen could be altered if the attacker had gained control of the machine, no?
<lle-bout>nckx: information to verify the request, so full text or hash inside signature, whatever you want, it could display commit hash
<nckx>Sent by the compromised machine.
<lle-bout>nckx: the key would have to receive the whole repo with the commit to actually display commit hash
<nckx>Unless the key mandates some kind of structure.
<lle-bout>so unlikely in a key
<lle-bout>but it would be really convenient
<nckx>Then no, it's not obvious how this protects against a compromised machin, or how ‘malware will not be able to sign commits’ in any way.
<nckx>BTW I agree that it's a *layer* of protection. It means malware can't sign commits at the hour it would like. But nothing more, I think, and far from the original ‘close to zero’ claim.
<lle-bout>it is obvious, if screen's big enough you can display the whole text being signed
<nckx>Do you have example models of such a device? I've never seen one that could do that. (Which means little.)
<apteryx>any suggestion of one of these keys? I'm curious to try for myself. I have an old mini yubikey (before they went closed source), could this do?
<apteryx>(sorry for keeping you awake with questions)
<lle-bout>apteryx, nckx: the trezor model T is quite nice because programmable and sizeable screen
<nckx>Thanks.
<lle-bout>it can be plugged into gpg
<lle-bout>or ssh-agent
<nckx>So you programme this device to (say) display the entire signed commit text, and it's then locked? (All the images I find are marketing logos/simple keypads.)
<lle-bout>one would have to find the best way to implement screen verification for the git use case and program it inside the trezor model T with an app
<lle-bout>transfering git repo and using commit hash sounds best to me, but one needs to find a way to securely parse a git repo
<lle-bout>nckx: https://github.com/trezor/trezor-firmware
<lle-bout>nckx: can't say for sure for the Trezor Model T, don't own one, will have to do extensive study how this can be done.
<lle-bout>but for sure it's possible
<nckx>Thanks. This is turning from ‘we could buy a thing’ into ‘we could design a thing’, though.
<leoprikler>raghavgururajan: you can cut diffs with text tools, but I think `git commit -p` after applying might be your friend
<leoprikler>sorry for the delay btw., graph theory keeping me busy rn
<lle-bout>nckx: Trezor Model T is explicitly programmable so
<leoprikler>re: hardware solutions, what if the USB key is lost or compromised?
<nckx>(hardware is €200/key without the cost of actually making it work, by the way.)
<nckx>Good thing we're removing committers.
<nckx>I hope this is not an example screenshot: https://wiki.trezor.io/images/GPG_init.png
<nckx>‘Sign the GCC backdoor that malware just substituted for your GNU hello update? [Y/n]’
***janneke_ is now known as janneke`
<lle-bout>nckx: seems to be for key creation this
<lle-bout>nckx: but I don't exclude it may still contain unsophisticated verification screens, I do agree there has something specific to git to be done for it to be really convenient to verify
*nckx in class, so browsing slowly.
***modula is now known as defaultxr
<leoprikler>When we're saying reproducible builds, we don't mean reproducible signing keys.
<nckx>lle-bout: Not just convenient, but actually secure. If malware can send whatever it wants to the key, a hardware ‘sign’ button isn't security. Unless the key shows the actual data being signed in a readable form, a screen isn't either.
<lle-bout>nckx: the point of the screen is not the computer sends whatever it wants to the key, it never does that
<leoprikler>It's actually less secure than the same information on the computer screen.
<lle-bout>it's the key gets data being signed and produces useful verification screen inside the key
<lle-bout>I don't know if commit hashes can be produced standalone or need the whole repo to generate
<raghavgururajan>leoprikler: Thanks!
<lle-bout>Good night!
<raghavgururajan>lle-bout, night o/
<lle-bout>webkitgtk,wpewebkit,libwpe,wpebackend-fdo has many unpatched CVEs if you feel bored
<leoprikler>btw. once you grok text files, cutting diffs manually (e.g. via emacs) can really be helpful
***janneke` is now known as janneke
<raghavgururajan>leoprikler: Any more thoughts on nextcloud package rename?
<raghavgururajan>Oh thanks for the tip.
<raghavgururajan>A patch failed to apply, was wondering if I could ignore the conflicting chunk.
<leoprikler>you'd better do git mergetool or something on that then
*raghavgururajan looks
<leoprikler>No particular feelings either way; I won't commit it rn, but I won't stop you from committing if you feel strongly about it once you have commit access.
*leoprikler → afk
<raghavgururajan>😳️
<nckx>lle-bout: Thanks for the explanation, that's a relief at least.
***aweinsto1k is now known as aweinstock
<i1l>if i will see a price tag of 200 for an usb thing irl, i will be relieved really fast.
<i1l>and will need to visit Eliza for unscheduled talk
<i1l>an
<nckx>‘What kind of idi--‘ “USB Bitcoin Wallet”’ ‘...oh.’
<efraim>nckx: I'm still not able to connect
<nckx>I haven't read your mail yet, sec.
<efraim>ah
<nckx>OK, done.
<efraim>thanks
<pineapples>o/
<nckx>Ciao pineapples.
<pineapples>I got this error while I was upgrading packages: https://paste.debian.net/1188849/ The "Bad Response-line" line worries me the most
<pineapples>Hi, nckx!
<pineapples>I want to know if it's nothing serious. Whatever that garbled mess is, it doesn't evoke a positive connotation; I saw similar "stuff" used to run arbitary code..
<roptat>I've already seen that before, I thought it was fixed
<nckx>pineapples: It just means there was a ‘network error’. It should not be anything serious, although it is worrying from a reliability PoV.
<roptat> https://issues.guix.gnu.org/45828#3
<nckx>pineapples: I understand that '\x1d...’ looks worrying in HTTP logs, but it's not here.
<roptat>I think it's confused (compressed) data for http headers
<pineapples>Oh, okay! Thanks nckx and roptat. Nevertheless, it's updating now :)
<nckx>I have the very subjective impression that Guix networking has become more unreliable the past few months or weeks.
<pineapples>I have noticed a few connection issues here and there but they weren't a huge deal to me
<pineapples>They were relatively few in number
<roptat>yeah, we've had more reports related to networking issues lately I think
<nckx>I still need to respond to zimoun's answer to a similar bug report, I just *really really* dislike debugging network stuff ☺
<pineapples>Oh, and, in unrelated news, I have packaged `seatd' and `basu' for Guix :') Both are working with Sway
<pkill9>what's seatd?
<nckx>What's basu?
<nckx>It's not searchable if you don't know what it does ;)
<nckx>pkill9: “Seatd is a minimal seat management daemon, and a universal seat management library. Seat management takes care of mediating access to shared devices (graphics, input), without requiring applications like Wayland compositors being granted root privileges”
<pkill9>ok
<i1l>ah, the new part of systemd to be!
<pkill9>i'll just search
<nckx>i1l: I don't think so?
<pineapples>As for `basu': https://github.com/emersion/basu
<pkill9>ohh so seatd replaces elogind
<i1l>systemd-seatd
<pkill9>oh nvm
<nckx>pkill9: I thought it was a good description...
<pkill9>huh nckx?
<pkill9>i think i extrapolated from 'why not (e)logind' section
<nckx>pkill9: I think it can replace elogind, but only for software that uses its own libseat...
<nckx>...think.
<pineapples>nckx, it's said it supports (e)logind; though, I only tested it with Sway, without libseatd support compiled-in
<nckx>What's ‘it’ here though.
<pkill9>and basu is systemd-sdbus
<pineapples>Correct
<pkill9>i think anbox needs that
<pkill9>i was trying to package somethign that needed the sdbus part
<pineapples>I need it for mako and xdg-desktop-portal-wlr, which I also packaged
<pkill9>mako is already packaged?
<pineapples>I meant the latter
<nckx>pineapples: So Sway without libseat support was still able to use seatd instead of elogind?
<pkill9>ah
<pkill9>oh desktop-portal is designed to work with things other than flatpak,t hat's good
<nckx><without libseatd support> Not sure if that means seatd or libseat (there is no libseatd mentioned on the home page).
<pkill9>that's good*
<pkill9>that way it can be used with sandbox native applications with firejail
<pineapples>nckx: Hold on. I think I'm wrong. I think I only tested sway with libseatd support compiled in, with elogind, not seatd, to see if I was to implement a change that allows Sway users to use seatd wouldn't affect elogind users
<pkill9>looks like they dont like dbus https://github.com/netblue30/firejail/issues/811
<pineapples>Either way, if anyone wants to upstream my packages for me, I'm open for suggestions
<bone-baboon>nckx: Yes that version number of the installer was a typo.
<bone-baboon>I am trying to install Guix on a x86_64 computer. I have tries several x86_64 installer images but am running into different issues.
<bone-baboon>When I try the latest, 1.2.0, 1.1.0, 1.0.1 installers the system becomes unresponsive before the install is able to begin and before I can get to the graphical installer or a terminal. This is the output I get when I try using those installers: https://termbin.com/xkk1
<bone-baboon>With the 0.16.0 installer I was able to work through a manual install but when I try running the last command `guix system init /mnt/etc/config/scm /mnt` I get this error: https://termbin.com/n2w6
<bone-baboon>With the 0.16.0 installer and that same same manual install setup described previously when I try to run `guix system --no-substitutes /mnt/etc/config.scm /mnt` I get this error and build log.
<bone-baboon>Error: https://termbin.com/3rrn
<bone-baboon>Build log: https://termbin.com/3akvb
<bone-baboon>I am not sure what else to try but still want to install Guix.
<pineapples>nckx: Nevertheless, I daemonised seatd (copied auditd service and modified it), and it's been working great for the last two weeks
<pineapples>Apart from Sway, Wayfire also adopted libseatd AFAIK
***zimoun` is now known as zimoun
<i1l>bone-baboon: did you tried to re-run `guix system init`? also, try append 'nomodeset' in GRUB with newest image (idk, but maybe?)
***sneek_ is now known as sneek
<apteryx>yikes, there's no substitutes for rust for the staging branch
<apteryx>and I don't have 16 hours...
<roptat>only 16 hours?
<roptat>I thought the chain took more than a day to build
<rekado_>does it really take that long even on the build farm?
<apteryx>roptat: that's on the fastest machine I can get my hands on
<apteryx>Ryzen 3900x
<apteryx>on core-updates it now takes 'only' 8 hours
<apteryx>rekado_: the problem is that it's sequential
<apteryx>the inital bootstrap from mrust takes close to 1 h
<apteryx>he rest is about 15 minutes per rust
<apteryx>all chained
<apteryx>so the CI cannot do better
<apteryx>(much better anyway)
<apteryx>and every new version of rust (every 6 months?) adds up; so we depend on mrust to improve and be able to bootstrap newer rust otherwise the chain will just grow and grow
<roptat>every 6 weeks, I think
<leoprikler>iiuc mrustc can get us to 1.39-ish on c-u tho, am i correct?
<apteryx>I don't think it's ready yet
<apteryx>haven't checked in a month about
<apteryx>(mrustc was working on it)
<jackhill>Even less ready than mrustc, but I have hopes for https://rust-gcc.github.io/ :)
<bone-baboon>i1l: Yes I have tries to rerun the `guix system init` commands and they have the same result.
<bone-baboon>i1l: I am unfamiliar with Grub. I searched the Grub manual for "nomodeset" and did not find anything. https://www.gnu.org/software/grub/manual/grub/grub.html
<rekado_>bone-baboon: it’s a Linux thing, not a Grub thing.
<apteryx>bone-baboon: that's a linux kernel flag
<apteryx>what rekado said
<apteryx>;-)
<bone-baboon>rekado_: apteryx: Thanks. I am not sure how I would use that Linux kernel flag to help resolve the Guix install issues that I mentioned.
<paniash>hi! are there any alternate init systems for guix other than shepherd?
<lfam>No
<lfam>It's very highly integrated with the rest of the system
<paniash>lfam: i see. thanks!
<paniash>also, is it possible to run proprietary bits in guix?
<paniash>like say I need nvidia drivers for my graphics card
<Noisytoot>paniash: noveau exists, which is free software, and might work
<rekado_>paniash: Guix does not prevent you from running proprietary software.
<Noisytoot>There are nonfree channels, but they are unofficial and not recommended
<lfam>I'm still struggling with the sysctl-service-type: https://lists.gnu.org/archive/html/help-guix/2021-03/msg00066.html
<lfam>It would be great to get some help here
<roptat>lfam, maybe drop the "service" bit? default-sysctl-settings is a procedure that takes a configuration and returns a service
*lfam tries it
<roptat>well, actually I don't know what it returns, I can't find it in the repo
<lfam>It's defined in my diff, from the email
<roptat>ah right
<roptat>so yes, you defined it as a procedure
<roptat>with service, the first argument needs to be a service-type record type (the struct that the error message is talking about)
<paniash>Noisytoot: noveau is pretty shit tbh
<lfam>Ah
<lfam>I was wondering, which struct is it talking about?
<roptat>also, your simple-service-type won't work: it expects something that can extend the sysctl-service-type, not a sysctl-configuration
<lfam>I see
<lfam>As you can tell, I don't understand services on Guix
<Noisytoot>*nouveau
<roptat>if you look at the definition for sysctl-service-type (gnu/services/sysctl.scm), you can extend it by passing a "settings", which is whatever can go inside the settings field of the sysctl-configuration
<roptat>so, I'd pass '(("fs.protected_hardlinks" . 1) ...) to the simple-service, not the whole sysctl-configuration record
<roptat>paniash, we don't propose non free software, but we don't prevent you from using them either
<lfam>It's not crashing immediately roptat. Thank you so much!
<roptat>:)
<lfam>I really was banging my head
<roptat>yeah, tricky and not very well documented
<roptat>there was a talk by ludo I think, it gave a very good overview of the way service extension works
<lfam>I think it might actually be easier for me if I didn't know a lot about other areas, like packaging. These two very different levels of knowledge are hard to reconcile
<lfam>I did read the manual section on services very closely, and studied some other services
<lfam>I'm going to take your advice and re-read those sections with it in mind
<lfam>I think it will help
<paniash>roptat: I understand, i'd rather use a piece of software which is officially supported. but good to know that proprietary blobs can run. thanks!
<roptat>paniash, if you're talking about firmware in the kernel, we use linux-libre wich will actively prevent you from loading binary blobs. Though, you can still build your own kernel from mainline and use it in your system declaration
<nckx>lfam: This network seems to block mail (whut?) but LGTM on the ping.
<roptat>we don't officially support that, but it's not too hard either (and most likely already documented elsewhere)
<lfam>Thanks nckx
<lfam>Just to clarify... you're not talking about my mail server blocking your messages, right?
<nckx>No.
<nckx>Public wi-fi blocks ports 25 & 587 (somewhat explicitly, or IRC wouldn't work).
<nckx>I think it's a sorry comment on the reality of how many people still use real mail over the big Webmails.
<nckx>Anyway, AFK.
<lfam>Ah, this happens when I "tether" through my mobile phone
<roptat>oh, I guess this didn't get any attention (ocaml bindings for z3): https://issues.guix.gnu.org/46329
<roptat>it builds the bindings in a separate output, instead of a separate package, because they're part of the same source, and it doesn't look like it's possible to build them separately
<roptat>if nobody answers, I think I'll push tonight
<roptat>it's been more than a month ^^
<lfam>Yes, I think that that's fine. As long as you are confident it works, committers can push without review after a couple of weeks
<roptat>oh yes it works, I use it at work :)
<lfam>Great :)
<lfam>Then you are the expert
<roptat>I'm just not very happy it's part of the same package, because it's less discoverable
<roptat>vs ocaml-z3
<lfam>Right :/
<lfam>Multiple outputs are very often overlooked
<lfam>Maybe the package UI could display them as separate packages
<roptat>it might increase the clutter though, especially if you have lots of *:debug
<lfam>And it could automagically munge the package name. Like, it would accept the concatenation of the package name and the output name
<lfam>Well, since we are creating magic, we could leave the debug outputs within the UI report of the main output
<lfam>I'm just "brainstorming", maybe it's too windy
<lfam>;)
<roptat>:)
<roptat>I guess other distros do it too
<lfam>I do think we should try to find an improvement here. People often are missing the outputs of Git
<roptat>do we match against output names (other than the common ones)?
<lfam>Or, maybe the UI could include descriptions of the outputs. And then peole wouldn't miss them
<roptat>in guix search, I mean
<lfam>I don't know...
<roptat>ah yes, we could have per-output description, that would be great
<lfam>That's better than my first idea
<roptat>(for the UI, but probably hell for packagers who'll have to come up with more text ^^)
<lfam>Just a little bit!
<lfam>send-email: Git program for sending patches with email
<lfam>Etc
<roptat>oh, just a small synopsis then?
<lfam>I think we ought to be documenting the outputs anyways
<PotentialUser-47>Hello!
<lfam>Yeah, I suppose
<lfam>Howdy PotentialUser-47
<Noisytoot>What's the difference between multiple outputs and the different packages?
<lfam> https://guix.gnu.org/manual/en/html_node/Packages-with-Multiple-Outputs.html
<roptat>we could do that inside the outputs field directly, maybe: (output '("out" ("send-email" "Git program for sending patches with email")))
<lfam>Basically, you build the package and then split it up into different store items, Noisytoot
<jas4711>what's the problem with updating inetutils to 2.0? i see it was committed and then reverted because of caused rebuild of lots of packages, is that a problem?
<PotentialUser-47>Good apps have been added to the Guix Wishlist, great if these are packaged soon!
<PotentialUser-47> https://libreplanet.org/wiki/Group:Guix/Wishlist
<roptat>jas4711, when a change introduces lots of rebuilds, the build farm cannot keep up, and users end up building dependents for ages
<roptat>so we push these changes to staging or core-updates usually
<lfam>It's described in this section of the manual: https://guix.gnu.org/manual/en/html_node/Submitting-Patches.html
<PotentialUser-47>Bottles, Passbook, Fractal, Kooha, Clapper!
<apteryx>bone-baboon: from the grub menu, you can press 'e' to edit a menu entry, then you'd add nomodeset at the end of the kernel line, IIRC
*roptat has no idea what these apps are ^^'
<apteryx>bone-baboon: it's also possible to add it to the kernel-arguments of you operating-system declaration once you've found something that works
<lfam>Thanks PotentialUser-47 :) I'm sure someone will pick them up eventually.
<lfam>jas4711: You can explore this area with the command `guix refresh --list-dependent inetutils`
<lfam>Sometimes, this command doesn't report all of the packages that will be rebuilt. It's based on the full graph of Guix package dependencies, but it doesn't account for changes to Guix build-systems
<jas4711>lfam: ah thanks for explanation.
<lfam>And it's like roptat said. We batch big changes together, to save time, human energy (debugging), and electricity
<lfam>And it also provides something like a stable base for the system
<lfam>Although, that's not an explicit goal
<roptat>PotentialUser-47, looking at kooha, the first commit is from 8 days ago, so no wonder I didn't know about it ^^
<roptat>it doesn't look too hard to package though :)
<PotentialUser-47>Yes, the program will be stable soon...
<roptat>it's not very clear from the "manual" build instructions how to build it from source though ^^'
<roptat>but I guess just meson, python and maybe some gnome stuff are all it needs
<roptat>PotentialUser-47, do you want to give it a try?
<zimoun>roptat: from how “guix search” works today, to have ocaml z3 more discoverable, the only way is to have a separate package with a specific synopsis+description.
<zimoun>because in “guix search ocaml z3” the “ocaml“ term will only be granted by 1 of weight (output)
***warren_ is now known as warren
<roptat>well, then it'll be discoverable, "guix search ocaml z3" doesn't return anything now
<zimoun>:-)
<PotentialUser-47>roptat: I am not a professional. I may cause damage 😁️
<roptat>PotentialUser-47, it's fine, we're all volunteers and your patches will be reviewed anyway ;)
<roptat>also guix is pretty solid, there's no way you can damage it with a bad package declaration
<lfam>Maybe we could have a contest ;)
<roptat>(unless you intentionally package a malware)
<lfam>Guix demolition derby
<zimoun>roptat: yeah, personally I am always confused by the multi-output, fetching and building a lot of stuff that I am not necessary interested in, as for git:send-email. And now ‘guix build z3’ will drag ocaml.
<PotentialUser-47>roptat: 😆️ you win! 😅️
<roptat>zimoun, but I don't really have a choice, it's part of the same repository, and if I build it separately, it rebuilds z3
<roptat>and doesn't link to the one we currently have :/
<roptat>and, hopefully, you get substitutes, so you don't have to pull in ocaml for z3 itself
<roptat>PotentialUser-47, if you've never packaged anything before, you can have a look at https://guix.gnu.org/cookbook/en/html_node/Packaging-Tutorial.html#Packaging-Tutorial
<roptat>and of course, ask any question you might have here, we're here to help!
<zimoun>roptat: yeah, that’s just I do not like the multioutputs stuff. :-) Maybe one day <https://git.savannah.gnu.org/cgit/guix.git/tree/TODO#n37> ;-)
<roptat>ah right, that'd be great
<zimoun>BTW, patch#46329 LGTM
***aidalgol_ is now known as aidalgol
<roptat>zimoun, thanks
<bone-baboon>apteryx: Thanks
<PotentialUser-50>Hi Guix!
<roptat>hey :)
<mdevos>Hi
<PotentialUser-50>Friends, what do you think about this new app? And this is a free software?
<PotentialUser-50> https://github.com/Pato05/uploadgram-app
<lfam>The license is AGPL 3, which is a free license
<roptat>now, it's an android app, which is... hard to package in guix :)
<lfam>One would need to poke around in the source code and check if there were other programs "bundled". But if that's not the case, then it is free software
<PotentialUser-50>Thank you
<lfam>roptat is correct, it will be hard to use in Guix
<roptat>(though not impossible, just a matter of dedicating a few years of hard work :p)
<roptat>maybe add one or two years for the javascript stuff too :/
<leoprikler>Fun how Fractal got added to the list after two separate efforts of packaging it.
<leoprikler>Cuttlefish looks like it'd be fun to package were it not for c++2a.
<Noisytoot>nckx: Could you use Tor or a VPN to access your email?
<leoprikler>Oh and GTK4 it seems.
<nckx>Noisytoot: Yes, I could use an SSH tunnel or Wireguard.
***soheil_ is now known as soheil
<nckx>(Unless they did DPI which I seriously doubt.)
<Noisytoot>What's DPI?
<lfam>Deep packet inspection
<lfam>Techniques for surveilling encrypted traffic
<jackhill>leoprikler: what is Cuuttlefish? I found something that assists in doing mass emailings, which I think is a different cuttlefish :)
<leoprikler>Referring to the one in the wishlist: https://gitlab.shinice.net/artectrex/Cuttlefish
<jackhill>looks cool, thanks
<nckx>Noisytoot: It's a fancy (and somewhat ‘marketing’) name for looking at the data instead of just the metadata. A normal firewall just (dis)allows specific ports, IP addresses, other ‘envelope’-type stuff; DPI will try to open them & decode the packets themselves.
<roptat>oh emoji in commit messages /o\
<nckx>Let's reset master again.
<nckx>Oh, not ours.
<roptat>not ours
*nckx cancels the air strike.
<jackhill>leoprikler: at least it's not rust ;) I was wondering when we'd need GTK4
<lfam>What's wrong emoji in commit messages? :)
<Noisytoot>lfam: They might not display in some fonts
<lfam>That's true
<leoprikler>oof, don't remind me about rust
<lfam>Could be the case for other non-English languages as well, though, and we have put that in our commit messages
<Noisytoot>Why do they block SMTP ports?
<lfam>It's an anti-spam thing
<nckx>They're less clear than text and rely a lot on cultural/temporal/meme context.
<lfam>That's true, nckx
<lfam>Well, we avoid colloquial language in commit messages, usually
<lfam>Or, maybe we don't, and I'm too mono-lingual to notice
<nckx>I'm not anti-emoji 🍑.
<lfam>I love emojis
<lfam>I'd use them more here if it was easier to type them on my system
<leoprikler>Emoji are not serious business enough for commit messages.
<roptat>I remember someone telling they had trouble hitchhiking in a country where having a thumb up is basically the same as the middle finger in the US :)
<roptat>you have to be careful
<leoprikler>That said, they're the logical conclusion to https://xkcd.com/1296/.
<lfam>Heh
<Noisytoot>gnunet-guile2 might have them soon
<lfam>The good news is that Guix is not a business ;)
<lfam>So we can be funny
<nckx>Good point, really. We have pretty ‘serious’ commit messages. For projects that use ‘fix it’ and ‘dammit’ emojis would improve the information density.
<lfam>Our commit messages have spoiled me for other Git repos
<mdevos>Noisytoot: what's up with gnunet-guile2?
<Noisytoot>mdevos: The commit messages aren't very good: https://git.gnunet.org/gnunet-guile2.git/log/
<Noisytoot>But not as bad as https://paste.debian.net/plain/1188770
<roptat>interesting... :D
<nckx>Noisytoot: Hey! I shared that in good faith!
<Noisytoot>nckx: It would be in the IRC logs
<nckx>Not for long.
<leoprikler>logs.guix.gnu.org remembers everything.
<nckx>paste.debian.net does not.
<lfam>It's interesting to read the recent pastes on the debian paste site
<lfam>And, logs.guix.gnu.org doesn't quite remember everything. It automatically removes certain things, and maybe some admins remove other things manually
<leoprikler>hank you for creating a pull request to contribute to FreeCAD!
<nckx>Maybe.
<leoprikler>s/hank/Thank/
<leoprikler>Arara, which things get filtered?
<lfam>Sometimes, if you load the IRC logs web site at the right moment, it will display some lines at the bottom that haven't been removed yet. I guess the cleaning process is batch-oriented
<lfam>It removes the "user joined" messages, to avoid displaying their IP addresses to the web
<nckx>lfam: Good guess, but it's just an artefact of the algorithm. The actual logs are not modified, in batches or otherwise.
<lfam>I see
<nckx>I sed out the porn, that's it.
<leoprikler>Meanwhile in some R&D centre: "Could we train an AI to do that?"
<lfam>Where do you think sneek came from?
<lfam>sneek: botsnack
<sneek>:)
<apteryx>ah, fun, I think I discovered why a local build of Jami was not able to load its SVG icons
<bandali>oh, why?
<apteryx>on our packaged jami: ldd $(guix build jami)/bin/jami-gnome | grep -i svg => libgdk_pixbuf-2.0.so.0 => /gnu/store/irjan5wq7j25fa2m6n2xhl8mglsaqxn4-gdk-pixbuf+svg-2.40.0/lib/libgdk_pixbuf-2.0.so.0 (0x00007fe3a965a000)
<apteryx>in my dev tree (jami build from an environment): ldd jami-gnome | grep -i svg => nothing
<bandali>hah!
<apteryx>it seems to have linked against plain gdk-pixbuf instead of gdk-pixbuf+svg, despite gtk+@3 propagating it
<bandali>ahh, that sounds like it'd be relevant indeed
<lfam>Hey bandali, I was wondering if you had a sense of the process for getting videos hosted at http://audio-video.gnu.org/
<lfam>It's okay if that's not your thing. Your name was suggested as somebody who might know about it
<bandali>hey lfam, yeah, somewhat
<bandali>i think it's typically done by opening a request in one of the trackers of https://savannah.gnu.org/p/audio-video
<leoprikler>I knew it had to do with gdk-pixbuf!
<lfam>We had submitted a ticket on Savannah: https://savannah.gnu.org/support/?110409
<bandali>right, yup
<lfam>Maybe there is something I can do to make it easier to review, or whatever the process requires
<bandali>so i'm not intimately familiar with the process myself, but i can try nudging the audio-video folks to have a look at it
<bandali>it may have gone unnoticed because it was reported to the 'support' tracker, whereas it seems most other requests for that project are under the 'tasks' tracker
<lfam>Oh
<lfam>I can re-submit it as a task
<bandali>though it may be completely unrelated; i'm just guessing :-)
<lfam>I can also remove the level of indirection about where the videos are currently hosted
<bandali>am not sure. but anyway, i'll ping two of the people in charge about it, and see if i also could help move things along
<bandali>indirection in what sense?
<lfam>In the ticket, it says "These videos are currently stored on personal server (see the links in the announce)."
<lfam>It's just a little extra friction
<lfam>Better to include the link in the request
<roptat>they're still on my server :)
<lfam>I still have a copy too :)
<roptat>and they should still be available on ipfs too, I think
<bandali>aha. that shouldn't really be an issue. i'll just ping the right people and see if it's on their radar, or if they're too busy whether i could help do it
<lfam>Okay. Don't hesitate to let me know if I can do some work to help
<bandali>will do, thanks!
<lfam>Thanks for you assistance, too
<bandali>and sorry these couple of things have been taking some time. past few weeks/months have been crazier than ever for me :-/
<bandali>cheers, happy to help
<lfam>I totally understand
<bandali>:-) ty
<ngz>Hello. It seems that https://guix.gnu.org/packages/ has not been updated since yesterday.
<roptat>could it be a side effect of the master branch reset?
<ngz>It sounds plausible.
<civodul>master branch reset?
<roptat>if the server did pull the faulty commit, it can't advance further now
*civodul is missing out
<roptat>civodul, we had to remove one commit from master yesterday because it was signed with an unauthorized key
<civodul>oh, so it finally happened :-)
<roptat>nothing malicious, just a mistake
<civodul>ok
<roptat>we noticed quickly since guix pull failed as expected :)
<civodul>that's good :-)
<civodul>actually i'm surprised it didn't happen before
<civodul>it's always the same problem with fault tolerance features: you don't see them until you need them
<civodul>so in a way, it was a good way to show the feature actually _is_ in place
<civodul>like the burning data center is a good way to demonstrate there are backups
<civodul>(or no backups)
<roptat>could you reset the cached checkout the website uses to generate the list of packages?
<janneke>always remember to first make backups before you burn the data center
*vagrantc hopes civodul doesn't get any dangerous ideas about visiting ci.guix.gnu.org
<nckx>civodul: You didn't see any of the mails? 😮
<lfam>The question is... which mails ;) There are so many
<nckx>The good mails.
<nckx>Not the bad mails.
<lfam>Lol
*nckx has no right to participate in any convo on inbox hygiene and esses the f u.
<nckx> * [bu] Unread messages (8525/8525)
<nckx>Halp.
<roptat>set them all as read
<roptat>then, no unread messages ;)
<nckx>But I've done that twice already.
<civodul>nckx: i'm lagging behind as always, and trying to focus
<nckx>* Professional halp.
<civodul>which is kinda hard for me these days
<nckx>Sure.
<lfam>Don't worry about missing this civodul. I think the issue was handled well and is now resolved
*civodul takes the heavy-handed approach to fix <https://issues.guix.gnu.org/46967>: in-process gunzip
<nckx>No worries. It all went remarkably well, considered. IIRC I thanked your ‘sane guix pull’ design in the report & I meant it.
<lfam>Yeah, everything worked as expected
<nckx>If not, I thought it...
<civodul>lfam, nckx: i'm not worried, i'm confident y'all did the right thing :-)
*vagrantc cackles sinisterly
<lfam>The only thing that could be improved is that it would be nice if we could manually reset the Savannah repo on our own, but it's not a big deal
<nckx>One hitch was: I had to ping rwp in #savannah to do the actual rewinding, luckily they responded immediately. Even ‘maintainers’ can't undo a DoS which is problematic. That and of course the remote hook not catching it despite lfam's old bug report.
<civodul>vagrantc: the data center of a major hoster in France/EU burnt yesterday, leaving thousands of web sites off-line
<lfam>I think, it's always been known the remote hook wouldn't catch this kind of thing
<lfam>These kinds of mistakes are a risk when people come back after a long absence
<civodul>yeah
<nckx>lfam: Right, I meant that that's (very mildly) worse than if we hadn't known.
<lfam>But, that's a "good problem" to have
<lfam>Yes, it's true nckx
<nckx>We knew and DID‌ NOTHING.
<lfam>Lol
<lfam>We did EVERYTHING ELSE
<civodul>nckx: you weren't able to delete and push?
<nckx>As far as fire alarms go this one went well.
<nckx>No!
<lfam>Oh, another thing that could be improved is if `guix pull`'s rejection of the unauthorized commits would not be cached, so allow-downgrades was not necessary later
<nckx>*drills
<apteryx>libnotify propagates gdk-pixbuf, which clashes which gtk+'s own propagation of gdk-pixbuf+svg
<apteryx>should be update libnotify to propagate the later instead?
<narispo>efraim: I checked the license before updating mongodb and it's not the case, license still AGPL there
<lfam>A helpful rwp appears
<nckx>Lol. ‘They're gossiping about you on #guix.’
<nckx>‘It's good gossip.’
<rwp>Hi! :-)
<rwp>I am here because I was going to ask if something has changed with regards to guix-ci mailing list recently?
<lfam>Hm, I know that mothacehe was working on Cuirass / CI yesterday
<rwp>But as to the other topic, if you guys have different hooks then that would be awesome too. :-)
<lfam>Looks like guix-ci has been quite busy
<rwp>Yes. Thousands and thousands of messages busy.
<rwp>I am trying to understand what the situation is and if there has been any recent changes to account for the huge amount of mail today.
<euandreh>I just found out (after a lot of hitting my head against the wall) that Perl's MakeMaker doesn't honer $LIBRARY_PATH
<lfam>I think we will have to ping mothacehe about this via email, rwp
<narispo>I think the right medium for guix-ci is RSS :-/
<lfam>Do you want me to CC you?
<roptat>automatic messages it seems, like this: https://lists.gnu.org/archive/html/guix-ci/2021-03/msg10561.html
<lfam>Yes, perhaps narispo
<apteryx>we really should rename gdk-pixbuf+svg to gdk-pixbuf, and have the later variant gdk-pixbuf-sans-svg or somethhing; that's confusing
<lfam>As you see fit, apteryx
<rwp>lfam, Yes please CC me on it. That would be great.
<lfam>Alright
<rwp>I woke up to having about 3,500 messages of queued mail through the anti-spam today. And about 2,800 of those messages were from the guix-ci.
<lfam>Urgh
<rwp>Yes. Things are a little backlogged today due to the queue. So I started digging trying to figure out what might be different today over other days.
<rwp>Yesterday the queue load was high but things were getting processed through spamassassin okay. So I didn't dig into it further at that time.
<rwp>It looks like this new process is new since Feb 22, 2021 so it's still new and not yet fully mature yet.
<lfam>Alright I sent the message
<efraim>narispo: https://www.mongodb.com/licensing/server-side-public-license
<narispo>efraim: what matters is what is in the repo?
<narispo>otherwise, let's just remove that package
<efraim> https://github.com/mongodb/mongo/commit/5851c894963cb2d675f2c0628e2dc782e23e65a9#diff-a6c435b3896676a02de5a04e7c5a1712576496c0b3f174f458b4fba8a7869e14
<narispo>version 3.4.x is under AGPL, even for latest versions AFAICT
<rwp>lfam, Perfect! I added some more information to it too. But I think I am getting a handle on things now. So I know how to tune things.
<narispo>efraim: did you look at the branch? because I explictly checked before updating.
<narispo>efraim: https://github.com/mongodb/mongo/blob/r3.4.24/GNU-AGPL-3.0.txt
<narispo>3.4.24
<narispo>I wouldnt have pushed the thing if that wasnt the case
<efraim>narispo: it looks like I was mistaken, I thought all the code after the switch was changed to the new license
<narispo>efraim: check the release tarball just to be sure (I didnt do that), but yes, should be fine still
<lfam>mongodb in Guix is stuck using the unsupported openssl. Am I too optimistic that 3.4.24 can use current openssl?
<nckx>rwp: Sorry if this was mentioned above, but could we exempt the ci list from spam filtering + disable posting by anyone except the CI?
<efraim>narispo: I'll revert my reversion and update the note
<narispo>In fact, even much later versions are still under AGPL
<lfam>That's good to hear
<narispo>3.7.9 also is
<narispo>4.0.0 too
<rwp>nckx, Yes. And that is basically what I have half done already to mitigate the wave. But was wanting to understand the context before I just made changes.
<lfam>Oof, I made a typo in addressing that message to guix-sysadmin
<rwp>Yep!
<narispo>efraim: switch to SSPL happened at 4.0.4 it seems
<narispo>efraim: thanks
<efraim>narispo: I should've double checked before reverting the update
<narispo>efraim: No worries, I could've included something more precise in the commit message, but now we know, collectively, what the licensing situation is actually like for mongodb
<nckx>rwp: Thanks.
<narispo>it seems some branches like 3.6.22 also are under SSPL
<narispo>3.4.x is EOL by mongodb now, 3.6.x isnt but switched to SSPL as well
<narispo>so if 3.4.x doesnt support openssl 1.1.1 then we will remove the mongodb package shortly it seems
<lfam>Yeah, it seems that mongo is on its last legs
<lfam>Pity, after all the work that went into it
<narispo>3.4.x release branch supports openssl 1.1.1
<narispo> https://jira.mongodb.org/browse/SERVER-37135
<narispo>So maybe not
<lle-bout>3.4.24 has no known CVE for now, so
<lle-bout>we can keep it around for longer, probably
<lle-bout>(even if EOL)
<lfam>I tried to make it use openssl 1.1 but IIRC it didn't work
<lfam>But, I don't recall the details now
<lle-bout>lfam: when is that? It seems 3.4.24 may have changed something
<lfam>It was a few months ago
<lfam>I did an initial survey of openssl 1.0 in Guix
<lle-bout>lfam: but mongodb wasnt updated to 3.4.24 so let's try again now (doing so)
<lfam>Great :)
<lle-bout>lfam: you got a compiler error or at runtime? seems it built for me
<lfam>I don't recall the details now
<lfam>I would have made it use openssl 1.1 if it had worked
<lle-bout>lfam: okay, because I can't test mongodb for much, don't have a scenario
<lfam>I don't think we need to worry about comprehensive testing. It's not widely used in Guix and their test suite should work
<lle-bout>alright
<lle-bout>I'm not sure we have even a single current user of our mongodb package..
<lfam>There are some mongo-related packages that depend on it
<efraim>I suppose the mongo test uses it
<lle-bout>test suite, right
<efraim>no i mean I think there's a system test
<lle-bout>efraim: oh okay! cool!
<lfam> https://www.openssl.org/policies/releasestrat.html
<lfam>For your reference
<lfam>"Version 1.1.1 will be supported until 2023-09-11"
<lfam>Maybe next time we will be able to work on their schedule
<lle-bout>lfam: :-P
<lfam>And maybe by that time, we can improve our Rust bootstrap to not depend on openssl 1.0
<lfam>It's not a security risk, but it's kind of annoying
<lle-bout>lfam: not sure why a bootstrap should ever depend on a TLS lib, since it couldnt do networking
<lfam>Well, it does
<lfam>I'm not familiar with the details
<lle-bout>Oh maybe cargo
<lfam>Also, openssl is widely used to provide cryptographic implementations, not just networking
<lle-bout>ah right
<lfam>Speaking of removing unsupported software... https://lists.gnu.org/archive/html/guix-devel/2016-02/msg00596.html
<lfam>The process of removing Qt 4 started in 2016
<lfam>I think we could do it more quickly in other cases
<lle-bout>lfam: yes.. also telegram-desktop? will it go?
<lfam>No, the packages were tweaked to avoid depending on Qt 4
<lle-bout>ah great! that would have been sad.
<lfam>Yeah, really sad
<lfam>The good thing is that Qt 4 has been abandoned upstream for so long that nothing really depends on it anymore
<lfam>It was already abandoned in 2016
<lfam>But at that time, we were focused on adding packages, not removing them. The project was too young to have developed a workflow around this
<efraim>looks like they still target python27 for building
<lle-bout>efraim: running your new wip-ppc64le-for-master branch now!
<lfam>efraim: What targets python27?
<efraim>mongodb-3.4.24
<efraim>also it needs more than 32GB of ram to compile on 24 cores
<lfam>Well, we will probably keep python 2 for a bit longer. There is still some support from other distros
<efraim>I have 64 but I left tmpfs as a ramdisk, which defaults to 50% of ram
<efraim>*left tmpfs as a default ramdisk
<lfam>I actually am considering updating to python 2.7.18 (final version) for the upcoming release. We are changing the python package anyways, by ungrafting a security patch update
<lle-bout>"[testsuite] Fatal Assertion 28561 at src/mongo/db/storage/wiredtiger/wiredtiger_kv_engine.cpp 274" - after openssl 1.1.1 upgrade, maybe non-deterministic, will try again
<lfam>It would be less "safe" of an update for what is supposed to be a minor release
<efraim>wiredtiger might also just be old
<lfam>I'm concerned that we don't have the coordination to fix any fallout in time
<lle-bout>lfam: fallout?
<lfam>Like, if a lot of dependent packages need to be adjusted
<lfam>Extra work
<lle-bout>ah yes
<lfam>Whereas a single minor patch probably won't break anything
<lfam>It's the kind of things we have to think about when scheduling releases or big branch merges
<lle-bout>What I find great about security it's that it gives a reason to move forward and don't keep things ancient, it actually ensures we only package supported things more or less
<lfam>Yeah
<lfam>It's a good point
<lle-bout>Which boots package quality, unrelated to security
<efraim>if wip-ppc64le-for-desktop works I might do the same for 32-bit ppc and mark it as just experimentally supported in the manual
<lle-bout>boosts *
<lfam>But a contrary point is that it's important to give some advance notice about removing important things, like python 2
<lle-bout>efraim: it doesnt cause world rebuilds for non-ppc?
<efraim>i'd slide it in like with ppc64le and then fully merge it in core-updates
<efraim>that's the plan anyway for wip-ppc64le-for-master
<rwp>lfam, nckx, I think the mailing list issues are all solved now. Have the mail queues drained out and things seem good to go moving forward.
<lfam>Great
<lle-bout>efraim: I mean your wip-ppc64le-for-master branch already doesnt cause world rebuilds for non-ppc[64le]? If so that's really awesome!
<lfam>Thanks for your efforts rwp :)
<lle-bout>rwp: thanks!
<nckx>rwp: Thanks and sorry you had to deal with that. It certainly wasn't expected.
<efraim>lle-bout: yeah, it took a couple of tries to make sure everything worked
<lle-bout>efraim: hooray!
<rwp>Things change and then there are unintended consequences. It's not a big deal. Not in the long term. Just in the short term there are growing pains!
<lfam>While the channel is busy, I should just ask: Should we try to update Python 2 to the final version in this upcoming release?
<nckx>True words Fireman Bob.
<lfam>Or should we stick to the "safer" option of just ungrafting a patch
<efraim>the safe option
<lfam>Actually, it would be nice to schedule a chat about coordinating for this next release. I think there are a number of things to decide
<nckx>♥ putting scare quotes around the word safe.
<lfam>Noted efraim
<efraim>we can bump it in core-updates
<lfam>It's already in core-updates
<efraim>yeah
<lfam>I guess it was epxected that we'd be finishing core-updates now
<nckx>I agree with efraim, do the actually safer thing on master, hope the tests will catch any regressions.
<lfam>Okay
<lfam>Other questions I'm wondering about: What architectures do we officially support in the next release (armhf...)? When should we start building the release branch, for an April 18 release? And who will actually "do" the release?
<efraim>oh wow, I've been holding my ppc binutils-final patch for almost a year
<apteryx>this code (https://notabug.org/apteryx/guix-api-examples/src/master/propagate-some-package.scm) says the following packages propagate gdk-pixbuf: ("weasyprint" "libgsf" "libgweather" "librsvg-next" "cheese" "libnotify" "mutter" "cogl" "librsvg" "appstream-glib"). Now to check if it's true ;-)
<lfam>nckx: Wait, which is the acually safer option? The full update? Or just ungrafting the patch?
<apteryx>lfam: I volunteer to participate closely in the release process
<lfam>Thanks apteryx
<apteryx>I haven't done a release by myself yet, so I'll need some guidance, but I've studied the process relatively well during the last one.
<zimoun>lfam, for the previous release, we branched something like a couple of days before releasing. So when we are almost done, one week of string freeze, then branching, then release.
<lfam>I see
<lfam>So, we should start building the release branch now. I think it will probably take several days to build
<zimoun>about the architecture, I am not following closely. We can disable some architectures.
<lfam>We aren't building armhf substitutes at all anymore
<lfam>aarch64 is barely being built
<zimoun>so armf will not be included in 1.2,1. As it was not in 1.2.0
<zimoun>what do you mean by «building the release branch now»?
<lfam>It will take longer than a couple days to build the changes on that branch
<lfam>For one thing, it has to bootstrap rust
<lfam> https://git.savannah.gnu.org/cgit/guix.git/log/?h=wip-next-release
<roptat>but we don't really want to have too much difference between that branch and master
<lfam>It's not very different. It undoes the grafts, and removes some obsolete packages
<apteryx>lfam: I guess this was the reason some applications failed to display some icons, perhaps
<roptat>I mean, we'd like to have that in master too, right?
<lfam>Sure
<apteryx>gdk-pixbuf is not able to render scalable SVG icons (pretty basic stuff nowadays for an application)
<lfam>We can build it now, merge it to master, and then create the release-1.2.1 branch
<lfam>The important thing is that the release shouldn't include any grafts
<roptat>what I mean is that we'd like to prepare the release on master, branch when ready and make sure we have substitute for everything on that branch (in addition to what cuirass managed to build), then release
<lfam>This might mean delaying some grafts, or rebuilding the world twice
<lfam>Okay
<roptat>so we can have a wip-release or whatever, but we should merge to master before we branch release-1.2.1 out
<lfam>I'll update the wip branch now. There are some new grafts
<roptat>thanks for the hard work :)
<lfam>The other side of this is coordinating access to the CI resources
<lfam>But, I think we are in good shape for x86_64, which is what really matters
<lfam>It would be nice to get the rest of the overdrives connected to the build farm, but I don't know if it's going to happen
<zimoun>ah sorry, I have overlooked at wip-next-release because for 1.2 we did (almost) everything directly on master.
<lfam>I've been discussing it in the email thread you started
<lfam>We can't really do these things on master since they will rebuild almost every package
<zimoun>yeah, I agree. That’s my fault. And I agree about ungrafting too.
<lfam>But given my recent experiences with grafts masking serious problems, I think it's important to avoid including grafts in the release
<lfam>Alright, I'm going to update that branch today, and then I'll coordinate with mothacehe about building the branch
<lfam>I think we can merge it to master within a week, assuming there are no big problems
<lfam>I guess I am doing things a little backwards from how they've been done in the past. Sorry about that
<zimoun>ok, thanks. Well, currently I am checking the avaibility of substitutes on master. And try to fix «important» (to my eyes) packages that are broken.
<apteryx>raghavgururajan: as a GNOME package maintainer I think this is an important detail that you should know: anything that propagates gdk-pixbuf should propagate gdk-pixbuf+svg to stay in harmony with gtk+'s own propagated libs.
<apteryx>lfam: just to be clear, that 1.2.1 would include ungrafting changes mostly?
<lle-bout>if anyone can review unzip security fixes: https://issues.guix.gnu.org/47034
<zimoun>apteryx: yeah, and packges updates. And minor improvements.
<apteryx>OK
<lfam>Yes, ungrafting, update of tzdata, and removal of Qt 4
<zimoun>Bioconductor update I guess, etc.
<lfam>lle-bout: I'm curious, do you see anything that will be grafted in the next week or two?
<lfam>If so, we could delay building this release branch until then
<lfam>I'm trying to avoid release 1.2.1 with grafts in place
<lle-bout>lfam: well.. run: 'guix lint -c cve' I'm not done yet
<efraim>glibc?
<lfam>Yeah
<lle-bout>I see GNOME 3.34 things
<lle-bout>efraim: glibc has few CVEs.. unsure what to do
<lfam>I mean, considering that this work will never be "done"
<lle-bout>lfam: I think it can! Just we are very late now.
<lfam>Yeah
<zimoun>apteryx, lfam: one thing is to test the installer and the script.
<lle-bout>It's unlikely we get more than 2-3 security updates per day then
<lfam>Yes, we should coordinate a "test" weekend where we all try things
<lle-bout>Most of which will be trivial
<lle-bout>For example, today was flatpak
<lle-bout>Nothing more
<lfam>Right, I don't expect that you can see the future. But if you had anything in mind, that you know you are going to do soon
<lle-bout>flatpak and go 1.15.x / 1.16.x
<lle-bout>(we don't package go 1.15.x / 1.16.x yet)
<lle-bout>lfam: well I don't check for if grafting is needed actually *before* doing them
<lle-bout>but I am guessing glibc yes
<lfam>Go is technically too big to change on the master branch, but I think we can relax the rules there. Go packages are usually very cheap to build
<lfam>Yes, glibc is one
<lle-bout>lfam: gnupg?
<lfam>But, I don't think we can do it before April 18.
<lfam>gnupg is done on master
<lle-bout>"gnupg@1.4.23: probably vulnerable to CVE-2019-13050, CVE-2019-14855, CVE-2018-12020"
<zimoun>lfam: about the installer, could you confirm that the patch in <http://issues.guix.gnu.org/46871#1> fixes the issue?
<lle-bout>"librsvg@2.40.21: probably vulnerable to CVE-2018-1000041" (part of the GNOME series sort of)
<lfam>Updating glibc requires a core-updates cycle. It can't really be done in isolation
<lle-bout>openjpeg
<lfam>zimoun: I will check, thanks
<lle-bout>libjpeg-turbo
<zimoun>lfam, lle-bout: about security, there is Git <https://lwn.net/Articles/848893/> WDYT?
<lfam>Already done zimoun :)
<lle-bout>zimoun: done already!
<zimoun>Cool! Awesome!
<zimoun>And guile-git?
<lfam>Hm, dunno
<lfam>If `guix pull` still works, then we are okay
<zimoun>:-)
<lfam>Alright, this is a fruitful conversation but I have to go afk soon
<lle-bout>lfam: java
<lle-bout>openjdk
<lfam>I think java stuff can be done on master, not sure anymore though
<lle-bout>fuse?
<lle-bout>f2fs-tools?
<lle-bout>lua?
<zimoun>lfam, I will send an email to report the elements of the discussion.
<lfam>Thank you zimoun!
<lfam>It's really valuable to have a coordinator
<lle-bout>zimoun: :-D
<lle-bout>lfam: oh yes wpewebkit and friends. but unsure needs grafting
<lle-bout>doesnt
<lle-bout>lfam: perl has at least one 'high' severity one
<lle-bout> perl@5.30.2: probably vulnerable to CVE-2020-10543, CVE-2020-10878, CVE-2020-12723
<zimoun>civodul: about lint git-protocol, using match instead of eq? as done in <http://issues.guix.gnu.org/46182#1>, is it not “better”?
<lle-bout>lfam: sqlite
<lfam>In terms of what to do for the next release, I would focus on packages with a lot of dependents (`guix refresh -l`) and bugs that are remotely exploitable
<lle-bout>lfam: well as you can see, there's few left, at least sqlite, perl and openjpeg.
<lfam>It's a matter of judgment, but that's my approach
<lfam>Yeah
<lle-bout>we should have severity colors in guix lint
<lfam>Heh, that's a good idea
<lle-bout>(cve that is)
<lle-bout>if someone knows Scheme, please do! color CVEs according to severity in guix lint -c cve
<lle-bout>I may be able to do it, not sure
<lle-bout>Will check
<lle-bout>lfam: also that unzip one..
<lle-bout>lfam: grub!
<lle-bout>lfam: patch!
*lle-bout feels overwhelmed by what's left
<lfam>Yeah, it can be that way
<lle-bout>Let's not be late like this ever again :-)
<lfam>It's tricky because we had to delay major rebuilding for a while, so a lot of fixes that would have landed via core-updates are pretty delayed
<nckx>lle-bout: The dirty ANSI code work is already done in (guix colors). But don't burn yourself out over pretty colours please :)
<lle-bout>nckx: they would be really useful to me *right now*, if you mean I shouldnt do it
<nckx>I just meant it's not as ‘important’ as the CVE work you're doing, but (a) do whatever the hell you want, you deserve it and (b) if it helps, even better.
<lle-bout>nckx: if you can do it for me :-)
<lle-bout>nckx: I'm not burning out, I don't think so, I like what I am doing now :-D
<lle-bout>The major problem is me not knowing Scheme well enough
<lle-bout>I was reading the GNU Guile manual in full the other day but had to stop because security updates don't wait
<lfam>Taking 'patch' as an example
<lfam> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20969
<lfam>For the most part, Guix uses patch in the build sandbox
<lfam>It would be helpful if there was a new release of GNU Patch
<lle-bout>lfam: yes.. I asked on the mailing list to start building GNU Patch from git
<lle-bout>lfam: https://yhetil.org/guix/6d01d537754ce50b10035903d8e7d205699c4b39.camel@zaclys.net/
<lfam>The patch development seems ... low activity
<lle-bout>well it works, so :-)
<lfam>Well, except for these bugs, where it doesn't work right at all :)
<lfam>unzip hasn't been updated since 2009. There's no fixes available upstream, from what I can see
<lfam>Debian made a patch for it, which broke things, and they had to write a followup patch
<lfam>I would say, it's clear why unzip has been allowed to linger in Guix with these CVEs
<lfam>On the other hand, it's an important program that handles untrusted input
<nckx>Because it's freaking unzip.
<lle-bout>yes..
<nckx>I'm sure there are tools that do the same job, but I'd be unable to name them by name :)
<lle-bout>Fedora made a quite good patchset so I just imported that.
<lfam>That's great
<lfam>Fedora is a great source for things like this
<lle-bout>nckx: p7zip I think
<lle-bout>Fedora and Gentoo have the best security teams I think
<lfam>I use Debian so I rely on them often
<lfam>And, they have a comfortable user interface for security issues
<nckx>lle-bout: I could try adding colours if it would really help you.
<lle-bout>nckx: oh yesss!!
<lfam>E.g.: https://security-tracker.debian.org/tracker/CVE-2021-3177
<jackhill>nckx: I bet libarchive (aka bsdtar) could handle unzipping as well :)
<lle-bout>nckx: it would help be prioritize work on most critical issues
<lle-bout>me*
<lfam>Alright, now I'm really going afk
<lle-bout>lfam: see you soon (aww you left already)
<nckx>N.B. not today, and tomorrow is full-time non-desk work, but Saturday evening with some luck.
<lle-bout>nckx: okay :-D
<nckx>What kind of highlighting or is that written above?
<lle-bout>nckx: CVSS scores as they become known
<lle-bout>there's a color code for them, just use that
<lle-bout>nckx: there's reporter score and NVD review score, so use NVD review score if it exists otherwise reporter score, if nothing at all, then no color