<arxbrt>nckx: I thinks it's not a problem that is easy to solve quickly, maybe I should consider a alternative plan
<arxbrt>lle-bout, nckx: Thanks again for your help
<Whyvn>i am still trying to learn correct scheme formatting and applying it from the documentation. I want to enable the bluetooth service, would I just add something like (service bluetooth-service #:auto-enable #t) to the appended list of services under operating-system?
<bdju>what should a channels.scm file look like if I just want the normal repo? I wanted to remove a channel I had listed with cons + %default-channels but it's not working. deleting the file seems extreme
<bdju>I guess I don't care that much. I'll delete the file. the manual didn't have an answer either
<xelxebar_>bdju: It looks like channels.scm just contains a list of `channel` objects. %default-channels is, indeed, already a list of just that.
***amfl_ is now known as amfl
<janneke>wingo, spk121: looking at it now, after wingo's comment i'm wondering if we shouldn't use size_t, ssize_t instead of intptr_t, uintptr_t throughout?
<janneke>or possibly (try to) distinguish between where "pointer/pointer sized" is intended (*inttptr_t) and where it's a number/fixnum (*size_t)
<nckx>yoctocell: emacsy's closure was about 10x that of emacsy-minimal (which was added for Nomad). Now, the difference is that emacsy-minimal builds whilst emacsy doesn't, and the two have drifted apart.
<nckx>But when minimal was added it omitted all propagated-inputs and disabled examples.
<mbakke>lle-bout_: I looked into the chromium crash on https://ci.guix.gnu.org/metrics and found that it works with '--disable-features=UseSkiaRenderer', suggesting a problem with the Skia acceleration.
<mbakke>possibly a conflict between Mesas libGL and Chromiums ANGLE
<mbakke>unfortunately it does not crash when run through a debugger, instead just hangs indefinitely
<mbakke>...my attempts at building a debug-enabled chromium binary have so far not been successful
<mbakke>is it possible to define a replacement (graft) for a gexp?
<pkill9>does anyone know of a way of viewing a simple indented text file with the ability to collapse the indentations?
<Telc[m]>pkill9: both emacs and vim have code folding
<pkill9>i looked into it but it was a bit clunky, didn't try with emacs
<davidl>How can I create a container that runs cuirass? After creating a container with an OS config that contains a cuirass service I am getting an error saying that says that remounting cuirass is an operations that is not permitted.
<nckx>I thought it might be a profile or path issue (like installing git & git:send-email into 2 different profiles won't end well), but can't reproduce it with ‘git clone’ in a pure environment with only git & nss-certs.
<nckx>[Running ahead here but need to go AFK] If it doesn't, you can try creating a boot entry for Guix with ‘efibootmgr --create --disk <your /boot device, e.g., /dev/sda> --part <your /boot partition number> --loader '\EFI\Guix\grubx64.efi' --label Guix’.
<nckx>screwedupgrub: I made a thinko. It should be your *EFI* partition's device and number (so whatever you'd mount at /boot/efi), not /boot's (which is probably /, since Guix System doesn't support separate /boot AFAIK).
<nckx>So there was no ‘Guix’ entry already present in the ‘efibootmgr’ output?
<rekado>“guix build -d” shows the derivation to be built; “guix package” has no such option. Is there a convenient way to get the derivation of a profile without having to parse the output of “guix package -n -m manifest”?
<nckx>screwedupgrub: Which machine is this? My also-Lenovo X230T has forgot the Guix boot entry once or twice in the past, for what appeared to be no reason.
<rekado>“guix build -d -m manifest” shows not the derivation of the profile but the derivations of the individual packages to be built.
<southerntofu>hello, i'm new around here but i've been following the blog for a while, i'm curious if there's some chan/community dedicated to building selfhosting distribution with guix? (like a declarative yunohost)
<nckx>Do you remember any unusual/suspicious last lines after guix system reconfigure?
<southerntofu>nckx: yes that's what i had in mind! like functional/reproducible infrastructure for hosting cooperatives
<rekado>I came up with this clunker, but it gives me a different derivation: echo '(begin (use-modules (gnu packages) (guix derivations) (guix profiles) (guix store)) (derivation-file-name (with-store store (run-with-store store (profile-derivation (specifications->manifest (list "hello" "htop")))))))' | guix repl -t machine
<southerntofu>> That makes it surprisingly easy to deploy otherwise complex services such as applications (...) We’d love to see to what extent this helps people self-host services—sort of similar to what FreedomBox and YunoHost have been focusing on.
<nckx>screwdupgrub: I can't blame you for the ‘transactional’ quip, but you got very unlucky. The GRUB installation is the Achilles' heel in the whole process: we can't really do it transactionally, certainly not as long as we just trustingly invoke GRUB to do it.
<southerntofu>but i was curious if there was any development since then, or a place i could follow discussions about that
<rekado>the snippet above returns the same derivation as “guix environment -m manifest -n”, so maybe that’s good enough
<nckx>southerntofu: That's a pretty optimistic statement TBH. I self-host some services on Guix but there's still a lot of string and chewing gum keeping things together.
<nckx>However, the stringum is somewhat declaratively documented in a file instead of the result of running 325 commands 3 years ago, so there is certainly progress!
<nckx>So... that *didn't* happen in the rescue system? That's odd too.
<roptat>southerntofu, I'm also self-hosted with guix, but I don't think there's anything as easy to use as yunohost
<Telc[m]>packaging yunohost itself would be a good step along the way if thats interesting to anyone
<Telc[m]>and then work on the modifications to have it push scm files around
<southerntofu>nckx: the missing sentence i cut in the quote was giving links to one-liner examples for cgit and zabbix, though of course for more complex setup it's more complex
<southerntofu>roptat: i'm not looking for something like yunohost exactly, i mentioned it as an example selfhosting distro that takes care of configuring everything with sane defaults, but i don't care for the web interface or their package system in their precise implementation :)
<nckx>screwdupgrub: I wonder if that's something we *could* programatically recover from, and how...
<southerntofu>(where entire server is described in a global config file, but roles like the webserver can also be composed by other roles, so i'm programming my sysadmin in YAML and that's a terrible state of affairs :P)
<southerntofu>not exactly just yet, i've been learning rust for a while and i've never been happier with a programming language's ecosystem
<southerntofu>but i've always been tempted to learn lisp and more functional programming, and guix project is really tempting technically and politicaly
<southerntofu>i'm just afraid of the tradeoff of spending months learning new tech instead of focusing on the problems i'm trying to solve :)
<southerntofu>which is why i'm asking if other folks (or a group) are on the same page as me, because if it's a collective effort i'll be drawn in for sure
<southerntofu>that is, if i can contribute some sysadmin concerns, plus feedback from actual end-users (including myself but not only) and learn guile along the way that'd be a good approach for me, but i don't feel like starting alone a tentacular project in an ecossytem i have no clue about, if that makes sense to you
<southerntofu>Telc[m]: rust for guix no i don't see the point (though guix for rust makes sense), but writing high level sysadmin abstractions in rust would make perfect sense, in fact we had a discussion about this on lemmy.ml newsboard which then moved to a bugtracker: https://codeberg.org/prefab/prefab/issues/1
<nckx>I'm just curious how many entries you have, and if ‘no space left’ is a reasonable complaint.
<southerntofu>from what i read (maybe it has changed since then) guix only manages services via shepherd so using guix on foreign distros is limited to basic package management from my understanding
<southerntofu>like i can't setup and enable service for nginx (for example) on a distro that is not guix system?
<roptat>oh yes, but you can always create VMs and use giux deploy to other machines that are guix system from a foreign distro
<roptat>no indeed, not on your local machine at least
<southerntofu>yes but i don't have a lot of resources for VMs and such.. i administer only two of those and they're on debian because of reasons (i didn't want to setup a system noone else knows to maintain)
<roptat>the way it manages nginx for instance is by generating a full operating system that has the configuration you declare, so everything is managed by it, reproducible, etc
<roptat>and nothing messes with your configuration
<southerntofu>if we could do that kind of stuff with guix i'd be thrilled
<Telc[m]>thats kind of my concern with shepherd overall
<southerntofu>(that's the README for the project but each role has its own README with documented interface)
<Telc[m]>is that systemd has a lot of nice things baked in now
<roptat>I don't know much about ansible, so I don't know how much I can understand
<Telc[m]>including syscall restrictions in the service description
<southerntofu>roptat: the READMEs are only about semantic configuration interface, there should not be anything specific to ansible in there and it should be possible to implement the same semantics in any language or configuration format
<l00p>Hello, I'd like to submit wallpaper art for GuixSD. Where can I apply?
<roptat>hi l00p! I think you could send them to guix-devel at gnu.org
<southerntofu>(ah damn i broke links when i moved roles into a submodule)
<roptat>it's kinda reversed in terms of semantics though
<southerntofu>then each service can dynamically call other services, like for a typical web setup, webserver service calls tls service to setup TLS certificate (letsencrypt), which in turn calls webserver service to setup a vhost without TLS for answering ACME challenges
<southerntofu>(though i plan to implement DNS challenges at some point, when i have time to take care of nameserver service)
<roptat>the only difference I see is that the webserver service does not extend the let's encrypt service
<roptat>and I think that's by design, because the certificate could come from another source
<southerntofu>roptat: also what's different semantically/functionally in "my" approach is that a profile extends a service, but is agnostic to the implementation (it's a well-known interface and nothing more).. for example webserver can be fully implemented with apache instead of nginx without changing a single line of config theoretically
<southerntofu>yes yes yes i love that roptat thanks you made my night :D
<southerntofu>i mean we're basically reinventing the wheel.. well-known specified configuration across programs
<southerntofu>but it's a foundational element most sysadmins i know don't care about because they value their handcraft (which i appreciate in another sense, but does not encourage learning/customization/reproducibility/forkability)