bug#42420: git-fetch origins produce same store output when set recursive is set to true or false

2020-11-27 Thread Maxim Cournoyer
Hello,

Marius Bakke  writes:

> pkill9  writes:
>
>> I built a source that uses git-fetch - by default (recursive? #f) - and
>> the package failed to build, then I remembered it uses submodules, so I
>> set (recursive? #t) but it failed with the same error. The problem is
>> that the store path of the source is the same for both, so it didn't
>> try to rebuild the git checkout with submodules checked out.
>>
>> After garbage collecting the source so it rebuilds it, I can build the
>> package.
>
> Could it be that you did not update the sha256 checksum of the package
> after setting (recursive? #t), so Guix thought it already had the
> complete checkout in the store?

Yes, that just happened to me.  It's confusing, but I don't see how we
can improve on that. pkill, next time this happens, you might want to
force a check on the cached source via 'guix build --source --check'.  I
believe this would flag the discrepancy.

Is there an action to do here, or should we simply close it?

Thanks,

Maxim





bug#37309: ‘ssh-daemon’ service fails to start at boot

2020-11-27 Thread Marius Bakke
Christopher Lemmer Webber  skriver:

> Giovanni Biscuolo writes:
>
>> Hi,
>>
>> following a recent discussion on guix-sysadmin I have to confirm the
>> ssh-daemon issue since it is still happening on some of the machines I
>> administer
>>
>> Previous possibly related bug reports are
>> https://issues.guix.gnu.org/issue/30993 and
>> https://issues.guix.gnu.org/issue/32197
>>
>> Unfortunately this issue is *not* well reproducible, it depends on some
>> mysterious (to me) timing factor; AFAIU it does *not* depend on the
>> shepherd version, probably it depends on "something" related to IPv6
>> (read below the details)
>
> This issue continues to plauge me, and has ever since I started to use
> GuixSD.  However it is much worse now that I am running Guix on
> servers... I frequently have to log in via Linode's (nonfree!) web
> console on every server that is rebooted and kick herd to restart
> openssh.  Once I do that it's fine.

Can you share an excerpt of /var/log/messages (ideally the whole boot
sequence) from when SSH failed to start?

> I don't think my linode machine is on "spinning rust" so I don't think
> this is the cause.  IPv6, maybe?  Dunno what.
>
> However I think that it's probably really a dependency issue somewhere;
> herd is starting opensshd before some other dependent service is
> spawned.  But what?  Maybe something authentication related like
> networking, or something.  But hm, networking is required...
>
> I'm assuming others must be experiencing this still too... right?

FWIW I have never encountered this.  :-/

> Would really like to see it fixed.  It's one of the few things holding
> me back from recommending Guix on servers to others.
>
> Do others have any idea?
>
> I noticed the lsh daemon requires networking.  Why doesn't openssh?

It's really for legacy reasons, from before we had the Guix System
installer.  Then a common way to install was to run dhclient and
"herd start ssh-daemon" manually on the live image, so people could
do the installation over SSH:

  https://issues.guix.gnu.org/26548#5

Nowadays, the installer gives a nice and quick way to deploy a minimal
system, and I suspect the SSH method has fallen out of favor.

> What about the following "fix"?

[...]

>(list (shepherd-service
>   (documentation "OpenSSH server.")
> - (requirement '(syslogd loopback))
> + (requirement '(syslogd networking loopback))

If it works for you, let's do this.  It would be good to find the
underlying cause though...

Not sure what to do about the installer however: perhaps create
yet-another undocumented field of openssh-service-type that makes the
networking requirement optional?


signature.asc
Description: PGP signature


bug#44906: Substitute requests fail if URL has trailing slash

2020-11-27 Thread zimoun
Dear,

Thank you for the report.


Tweaking the function such as:

--8<---cut here---start->8---
(define (narinfo-request cache-url path)
  "Return an HTTP request for the narinfo of PATH at CACHE-URL."
  (let ((url (string-append cache-url "/" (store-path-hash-part path)
".narinfo"))
(headers '((User-Agent . "GNU Guile"
(format #t "~%Narinfo request: ~a~%~%" url)
(build-request (string->uri url) #:method 'GET #:headers headers)))
--8<---cut here---end--->8---

and removing the cache adequately, then running:

--8<---cut here---start->8---
./pre-inst-env guix weather \
 --substitute-urls="https://ci.guix.gnu.org/ https://ci.guix.gnu.org; \
 hello
computing 1 package derivations for x86_64-linux...

looking for 1 store items on https://ci.guix.gnu.org/...

Narinfo request: 
https://ci.guix.gnu.org//a462kby1q51ndvxdv3b6p0rsixxrgx1h.narinfo

updating substitutes from 'https://ci.guix.gnu.org/'... 100.0%
https://ci.guix.gnu.org/
  0.0% substitutes available (0 out of 1)

[...]

  'https://ci.guix.gnu.org//api/queue?nr=1000' returned 400 ("Bad Request")

looking for 1 store items on https://ci.guix.gnu.org...

Narinfo request: 
https://ci.guix.gnu.org/a462kby1q51ndvxdv3b6p0rsixxrgx1h.narinfo

updating substitutes from 'https://ci.guix.gnu.org'... 100.0%
https://ci.guix.gnu.org
  100.0% substitutes available (1 out of 1)

[...]

  at least 1,000 queued builds

[...]

  build rate: 36.89 builds per hour

[...]
--8<---cut here---end--->8---


On Fri, 27 Nov 2020 at 22:19, Hartmut Goebel  
wrote:

> According to RFC 7230, sec 2.7.3 "http and https URI Normalization and
> Comparison" [1]:
>
>[…] an empty
>path component is equivalent to an absolute path of "/", so the
>normal form is to provide a path of "/" instead.
>
> [1] https://tools.ietf.org/html/rfc7230#section-2.7.3

Now, the question is where should the fix go?  “guix publish” exposing
the narinfos or “guix weather“?  Or both?


>From my understanding, one fix should go to ‘guix publish’ exposing the
narinfos since:

   https://ci.guix.gnu.org//a462kby1q51ndvxdv3b6p0rsixxrgx1h.narinfo

should be a valid URL and return the narinfo file.  However, taking this
road, it means that the cache folder will not be the same:

~/.cache/guix/substitute/x2wcz6gz3evwlqcrz3fqstmezkfcfnpfb5kfyxbz7kjikc7upkiq/
~/.cache/guix/substitute/4refhwxbjmeua2kwg2nmzhv4dg4d3dorpjefq7kiciw2pfhaf26a/

https://ci.guix.gnu.org/ resp. https://ci.guix.gnu.org  Therefore, ‘guix
weather’ should be fixed too.


WDYT?

All the best,
simon





bug#37309: ‘ssh-daemon’ service fails to start at boot

2020-11-27 Thread Christopher Lemmer Webber
Giovanni Biscuolo writes:

> Hi,
>
> following a recent discussion on guix-sysadmin I have to confirm the
> ssh-daemon issue since it is still happening on some of the machines I
> administer
>
> Previous possibly related bug reports are
> https://issues.guix.gnu.org/issue/30993 and
> https://issues.guix.gnu.org/issue/32197
>
> Unfortunately this issue is *not* well reproducible, it depends on some
> mysterious (to me) timing factor; AFAIU it does *not* depend on the
> shepherd version, probably it depends on "something" related to IPv6
> (read below the details)

This issue continues to plauge me, and has ever since I started to use
GuixSD.  However it is much worse now that I am running Guix on
servers... I frequently have to log in via Linode's (nonfree!) web
console on every server that is rebooted and kick herd to restart
openssh.  Once I do that it's fine.

I don't think my linode machine is on "spinning rust" so I don't think
this is the cause.  IPv6, maybe?  Dunno what.

However I think that it's probably really a dependency issue somewhere;
herd is starting opensshd before some other dependent service is
spawned.  But what?  Maybe something authentication related like
networking, or something.  But hm, networking is required...

I'm assuming others must be experiencing this still too... right?

Would really like to see it fixed.  It's one of the few things holding
me back from recommending Guix on servers to others.

Do others have any idea?

I noticed the lsh daemon requires networking.  Why doesn't openssh?

What about the following "fix"?

diff --git a/gnu/services/ssh.scm b/gnu/services/ssh.scm
index 1891db0487..c9bd62bab7 100644
--- a/gnu/services/ssh.scm
+++ b/gnu/services/ssh.scm
@@ -508,7 +508,7 @@ of user-name/file-like tuples."
 
   (list (shepherd-service
  (documentation "OpenSSH server.")
- (requirement '(syslogd loopback))
+ (requirement '(syslogd networking loopback))
  (provision '(ssh-daemon ssh sshd))
  (start #~(make-forkexec-constructor #$openssh-command
  #:pid-file #$pid-file))





bug#44914: gnutls-dane does not build: failed test status-request-revoked

2020-11-27 Thread Dr. Arne Babenhauserheide
I cannot update Guix right now, because gnutls-dane fails to build.

The build log is attached.

make[4]: Entering directory 
'/tmp/guix-build-gnutls-dane-3.6.12.drv-0/gnutls-3.6.12/tests'
…
FAIL: status-request-revoked



q6971vxd8k1vhx8qp13al2lp3y11rc-gnutls-dane-3.6.12.drv.bz2
Description: Binary data

Best wishes,
Arne
-- 
Unpolitisch sein
heißt politisch sein
ohne es zu merken


signature.asc
Description: PGP signature


bug#44898: (No Subject)

2020-11-27 Thread guixuser6392 via Bug reports for GNU Guix
I would like to clarify that whenever I wrote "boot parameters", I meant 
installation arguments passed to grub-install.





bug#44827: tests/channels.scm: Test failures building on Debian i386 or armhf with libgit2-dev 1.0.1

2020-11-27 Thread Vagrant Cascadian
On 2020-11-27, Ludovic Courtès wrote:
> Vagrant Cascadian  skribis:
>> On 2020-11-26, Ludovic Courtès wrote:

>>> In particular, Guile-Git 0.4.0 has this thing compile-time check to make
>>> sure it matches the ABI of the underlying libgit2 version (0.28 or 1.0):
>>>
>>>   
>>> https://gitlab.com/guile-git/guile-git/-/commit/2b4d077c6f55648f42af31ae783ca4d8c1c5f1de
>>>
>>> So if you change libgit2 versions, you need to rebuild Guile-Git.
>>
>> Oh, this will be fun to keep track of in debian... :/ :)
>
> Note that the problem is the same for packages written in C since it’s
> an ABI change in libgit2.  (Except that in C perhaps you get a SONAME
> mismatch at load time rather than an error at run time…)
>
>> Yeah, the guile-git was built with the older 0.28 version of libgit2-dev
>> (although also with all the architectures).
>>
>> Interestingly enough, guix pull completely fails with the older
>> libgit2-dev version installed, but installing the new version it works
>> fine.
>>
>> I'll build a newer guile-git version and force it to use the newer
>> libgit2-dev package, and see if that fixes the issues.
>>
>> Then I'll have to come up with complicated versioned dependencies to
>> ensure it keeps working in Debian and it becomes detectable when it
>> needs to be rebuilt...
>
> Heheh.  Let me know how it goes!

Rebuilding guile-git against the newer libgit2 seems to resolve the
issues; the test suites passed on amd64, armhf, i386 (the only platforms
currently buildable on Debian).


live well,
  vagrant


signature.asc
Description: PGP signature


bug#44906: Substitute requests fail if URL has trailing slash

2020-11-27 Thread Hartmut Goebel
If the substitute-URL ends with a slash, api requests fail.

Expected behavior:

Substitute-URLs with and without trailing slash should behave the same.
This is especially true for substitute-URLs with empty path
("http://server;) and path "/" (http://server/;) - for which the RFCs
explicitly state to be equivalent.

According to RFC 7230, sec 2.7.3 "http and https URI Normalization and
Comparison" [1]:

   […] an empty
   path component is equivalent to an absolute path of "/", so the
   normal form is to provide a path of "/" instead.

[1] https://tools.ietf.org/html/rfc7230#section-2.7.3


How to reproduce:

no trailing slash:

$ guix weather --substitute-urls="https://ci.guix.gnu.org; gcc-toolchain
…
https://ci.guix.gnu.org
  100.0% substitutes available (3 out of 3)
…

Trailing slash:

$ guix weather --substitute-urls="https://ci.guix.gnu.org/; gcc-toolchain
…
https://ci.guix.gnu.org/
  0.0% substitutes available (0 out of 3)
…
  'https://ci.guix.gnu.org//api/queue?nr=1000' returned 400 ("Bad Request")

-- 
Regards
Hartmut Goebel

| Hartmut Goebel  | h.goe...@crazy-compilers.com   |
| www.crazy-compilers.com | compilers which you thought are impossible |






bug#44820: MPD fails after respawning too often

2020-11-27 Thread Simon Streit


Martin Becze writes:

> I also ran into this problem. Here is the relevnat part of
> /var/run/mpd//log
>
>> exception: Failed to create pid file "/var/run/mpd//pid": 
>> Permission denied
>
> A quick dirty fix is just to chown the /var/run/mpd folder so that mpd
> can create its pid file.

I have the the same error message in my log file too, and chowning
ownership of directories helps too.



>
> On 11/27/20 4:31 AM, Ludovic Courtès wrote:
>> Hi,
>> Simon  skribis:
>>
>>> On a recent pull, MPD will not start any more.
>>>
>>> Herd status reports:
>>>
>>> Status of mpd:
>>>It is stopped.
>>>It is disabled.
>>>Provides (mpd).
>>>Requires (user-processes).
>>>Conflicts with ().
>>>Will be respawned.
>>>Last respawned on Mon Nov 23 10:22:07+0100 2020.
>>>
>>>
>>> Reading my messages, I find:
>>>
>>> Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
>>> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
>>> Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
>>> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
>>> Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
>>> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
>>> Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
>>> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
>>> Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
>>> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
>>> Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
>>> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
>>> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been disabled.
>>> Nov 23 10:22:07 localhost shepherd[1]:   (Respawning too fast.)
>>>
>>>
>>> Unfortunately, there are no further messages as to why the service is
>>> disabled, or why the daemon is respawning too often.
>> Does /var/log/mpd/mpd.log or similar contain useful info?
>> Could you share your ‘mpd-configuration’?
>> There have been two changes recently, which fixed the mpd system
>> test,
>> but perhaps they introduced other issues:
>>
>> https://git.savannah.gnu.org/cgit/guix.git/log?id=bb124f6e9c0af0a23736f233c2ea2c9c9b4a40a6
>> Thanks for reporting the issue,
>> Ludo’.


If I read it correctly in the changes made above, ownership of the
directory should be changed, but it is not.  I just deleted the
directory in /run/mpd and did a reboot.  The user directory is
recreated, and .mpd too, but only ownership is changed in .mpd.

Too bad that my knowledge in guile is too limited at the moment to
provide a solution.  But I'd really love too at the moment. :)

But I believe ownership of the parent directory should be changed
according to the user.

Sorry that I can't provide any better solution at the moment.


Cheers,
Simon





bug#44891: Chromium does not start

2020-11-27 Thread Giovanni Biscuolo
Andrea Rossi via Bug reports for GNU Guix  writes:

> On 27/11/20 09:32, Giovanni Biscuolo wrote:
>> [...]
>> 1. sudo sysctl -w kernel.unprivileged_userns_clone=1
>> 2. sudo su -c "echo 'kernel.unprivileged_userns_clone=1' > 
>> /etc/sysctl.d/00-local-userns.conf" 
>
> It works!

Fine! Closing this bug.

Ciao, Gio'

-- 
Giovanni Biscuolo

Xelera IT Infrastructures


signature.asc
Description: PGP signature


bug#44891: Chromium does not start

2020-11-27 Thread Andrea Rossi via Bug reports for GNU Guix
On 27/11/20 09:32, Giovanni Biscuolo wrote:
> [...]
> 1. sudo sysctl -w kernel.unprivileged_userns_clone=1
> 2. sudo su -c "echo 'kernel.unprivileged_userns_clone=1' > 
> /etc/sysctl.d/00-local-userns.conf"
> 

It works!

Thanks,
Andrea





bug#44898: [wishlist] Make the GRUB installation procedure smarter

2020-11-27 Thread guixuser6392 via Bug reports for GNU Guix
Every time the operating system is instantiated the GRUB boot-loader is 
inexplicitly re-installed. This behaviour leads to unsolicited changes to the 
user's boot configuration on UEFI systems; and leads to unnecessary write 
operations on the ESP, and/or the MBR, which, in case they are abruptly aborted 
during the building of the install-bootloader derivation, can leave the system 
in an unbootable state. Futhermore, frequent writes to the platform's NV-RAM 
may negatively impact its lifespan.

NixOS stores the GRUB derivation as well as boot parameters in a state file, 
and only re-installs the boot-loader if the computed state is different from 
the stored state: 
https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/system/boot/loader/grub/install-grub.pl#L626.
 However, unless I am mistaken, that alone will not prevent GRUB from altering 
the user's boot configuration in a scenario, in which we want GRUB to be 
re-installed because it has received an update.

To summarize, I think that consecutive grub-install invocations should not be 
allowed to modify the user's boot configuration on UEFI systems, and that we 
should teach Guix to only re-install the boot-loader if the boot parameters has 
been changed and/or the GRUB package has been upgraded.

Although other boot-loaders are not in the scope of this wish, brining their 
installation procedures to the same high standard would be beneficial, too.





bug#44872: Fw: bug#44872: GuixSD 1.2.0 installer fails with exception when formatting drive

2020-11-27 Thread Tim Magee
> It looks like the UUID extraction of an "ext4" partition failed. Did you
use automatic or manual partitioning?


I used automatic partitioning this time. But it failed with an exception when I 
had previously tried manual partitioning as well. Though I believe it was a 
different error then.






bug#44862:

2020-11-27 Thread Tomás Ortín via Bug reports for GNU Guix
I've been experiencing the same since I started using Guix some months ago. In 
my experience, this happens only with manually added shortcuts, it seems XFCE 
links directly to the store in that case. It can be fixed manually, although I 
agree it would be nice if it wasn't necessary.

In case znavko finds it helpful here's a manual workaround: to fix the shortcut 
for 'foo', run 'which foo' and copy the path (it should be to the profile 
instead of to the store). Then right click on the shortcut for 'foo'', click on 
"edit" and replace the old path to the store with the path to the profile.

Hope it helps!

Tomás

bug#44820: MPD fails after respawning too often

2020-11-27 Thread Martin Becze
I also ran into this problem. Here is the relevnat part of 
/var/run/mpd//log



exception: Failed to create pid file "/var/run/mpd//pid": Permission 
denied


A quick dirty fix is just to chown the /var/run/mpd folder so that mpd 
can create its pid file.


On 11/27/20 4:31 AM, Ludovic Courtès wrote:

Hi,

Simon  skribis:


On a recent pull, MPD will not start any more.

Herd status reports:

Status of mpd:
   It is stopped.
   It is disabled.
   Provides (mpd).
   Requires (user-processes).
   Conflicts with ().
   Will be respawned.
   Last respawned on Mon Nov 23 10:22:07+0100 2020.


Reading my messages, I find:

Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been disabled.
Nov 23 10:22:07 localhost shepherd[1]:   (Respawning too fast.)


Unfortunately, there are no further messages as to why the service is
disabled, or why the daemon is respawning too often.


Does /var/log/mpd/mpd.log or similar contain useful info?

Could you share your ‘mpd-configuration’?

There have been two changes recently, which fixed the mpd system test,
but perhaps they introduced other issues:

   
https://git.savannah.gnu.org/cgit/guix.git/log?id=bb124f6e9c0af0a23736f233c2ea2c9c9b4a40a6

Thanks for reporting the issue,
Ludo’.









bug#44881: glib build fail for armhf

2020-11-27 Thread Ludovic Courtès
Hi Mathieu,

Mathieu Othacehe  skribis:

> The glib build is broken on armhf due to a timeout in the test suite,
> see:
> https://ci.guix.gnu.org/log/m6rd864j30khc6k60gr2wqr1pz40f1di-glib-2.62.6-bin.
>
> It looks like it's also broken on the 1.2.0 branch.

Yeah.  We were discussing it with Chris Baines on IRC.  My hypothesis is
that those tests time out on low-end ARMv7 devices (like
guix-x15.sjd.se).

Previously, we were building them on the more powerful OverDrives
probably, and indeed, the tests pass there.  Berlin now has a substiute
for this one built on an OverDrive.

> This prevents the evaluation of the guix-modular specification, see:
> https://ci.guix.gnu.org/eval/19035/log/raw. I disabled the armhf-linux
> system for that specification until this is understood.

I think we can re-enable it now?

Thanks,
Ludo’.





bug#44820: MPD fails after respawning too often

2020-11-27 Thread Ludovic Courtès
Hi,

Simon  skribis:

> On a recent pull, MPD will not start any more.
>
> Herd status reports:
>
> Status of mpd:
>   It is stopped.
>   It is disabled.
>   Provides (mpd).
>   Requires (user-processes).
>   Conflicts with ().
>   Will be respawned.
>   Last respawned on Mon Nov 23 10:22:07+0100 2020.
>
>
> Reading my messages, I find:
>
> Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
> Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
> Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
> Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
> Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
> Nov 23 10:22:07 localhost shepherd[1]: Respawning mpd.
> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been started.
> Nov 23 10:22:07 localhost shepherd[1]: Service mpd has been disabled.
> Nov 23 10:22:07 localhost shepherd[1]:   (Respawning too fast.)
>
>
> Unfortunately, there are no further messages as to why the service is
> disabled, or why the daemon is respawning too often.

Does /var/log/mpd/mpd.log or similar contain useful info?

Could you share your ‘mpd-configuration’?

There have been two changes recently, which fixed the mpd system test,
but perhaps they introduced other issues:

  
https://git.savannah.gnu.org/cgit/guix.git/log?id=bb124f6e9c0af0a23736f233c2ea2c9c9b4a40a6

Thanks for reporting the issue,
Ludo’.





bug#44827: tests/channels.scm: Test failures building on Debian i386 or armhf with libgit2-dev 1.0.1

2020-11-27 Thread Ludovic Courtès
Hi,

Vagrant Cascadian  skribis:

> On 2020-11-26, Ludovic Courtès wrote:

[...]

>> In particular, Guile-Git 0.4.0 has this thing compile-time check to make
>> sure it matches the ABI of the underlying libgit2 version (0.28 or 1.0):
>>
>>   
>> https://gitlab.com/guile-git/guile-git/-/commit/2b4d077c6f55648f42af31ae783ca4d8c1c5f1de
>>
>> So if you change libgit2 versions, you need to rebuild Guile-Git.
>
> Oh, this will be fun to keep track of in debian... :/ :)

Note that the problem is the same for packages written in C since it’s
an ABI change in libgit2.  (Except that in C perhaps you get a SONAME
mismatch at load time rather than an error at run time…)

> Yeah, the guile-git was built with the older 0.28 version of libgit2-dev
> (although also with all the architectures).
>
> Interestingly enough, guix pull completely fails with the older
> libgit2-dev version installed, but installing the new version it works
> fine.
>
> I'll build a newer guile-git version and force it to use the newer
> libgit2-dev package, and see if that fixes the issues.
>
> Then I'll have to come up with complicated versioned dependencies to
> ensure it keeps working in Debian and it becomes detectable when it
> needs to be rebuilt...

Heheh.  Let me know how it goes!

Thanks,
Ludo’.





bug#44891: Chromium does not start

2020-11-27 Thread Giovanni Biscuolo
Hi raingloom,

raingloom  writes:

> On Thu, 26 Nov 2020 16:53:29 +0100
> Andrea Rossi via Bug reports for GNU Guix  wrote:

[...]

>> [20998:20998:1126/122306.639343:FATAL:zygote_host_impl_linux.cc(117)]
>> No usable sandbox! Update your kernel or see
>> https://chromium.9oo91esource.qjz9zk/chromium/src/+/master/docs/linux/suid_sandbox_development.md
>> for more information on developing with the SUID sandbox. If you want
>> to live dangerously and need an immediate workaround, you can try
>> using --no-sandbox.

[...]

> Saw a similar issue on Arch recently, my guess is that the sandbox
> binary (I don't remember its name or path) is missing the execute
> permission bit.

As reported in my previous reply to Andrea, AFAIU (thanks Marius Bakke)
Chromium can use two methods to start the sandbox:

1. use the SUID binary
2. use user namespaces

AFAIU the second is better and anyway it's the method used by Guix
ungoogled-chromium

> Not sure how to fix that on Guix, since modifying a store item is
> generally a big no-no. You could maybe write a quick and dirty package
> that takes ungoogled-chromium as its only input, copies it (or just
> creates symlinks?), and runs chmod +x on the sandbox binary.
> That way you don't have to recompile the whole package.

Non need for all this :-D

Thanks, Gio'

-- 
Giovanni Biscuolo

Xelera IT Infrastructures


signature.asc
Description: PGP signature


bug#44891: Chromium does not start

2020-11-27 Thread Giovanni Biscuolo
Ciao Andrea,

To the list: Andrea is a friend and a collegue, I'm helping him starting
using Guix as a package manager.

Andrea: next time when reporting bugs on Guix please mention you are
using it on a foreign distro (not as Guix System), in your case Debian.

Andrea Rossi via Bug reports for GNU Guix  writes:

> after the installation of ungoogled-chromium I tried to run it,
> receiving this message:
>
> [20998:20998:1126/122306.639343:FATAL:zygote_host_impl_linux.cc(117)] No
> usable sandbox! Update your kernel or see
> https://chromium.9oo91esource.qjz9zk/chromium/src/+/master/docs/linux/suid_sandbox_development.md
> for more information on developing with the SUID sandbox. If you want to
> live dangerously and need an immediate workaround, you can try using
> --no-sandbox.
>
> Maybe I'm missing something, or is the case of a proper bug?

In Jan this year I had the same issue, reported in help-guix, on Debian
as foreign distro and Marius Bakke [1] helped me solve it:

1. sudo sysctl -w kernel.unprivileged_userns_clone=1
2. sudo su -c "echo 'kernel.unprivileged_userns_clone=1' > 
/etc/sysctl.d/00-local-userns.conf"

This is because (ungoogled-)chromium sandbox relies on user namespaces
support in the kernel but Debian [2] disables user namespaces by
default, the above commands enables them for your current boot session
and permanently for next reboots.

Andrea please try the above fixes and tell us if they solve your issue.

Ciao, Gio'


[1] https://lists.gnu.org/archive/html/help-guix/2020-01/msg00059.html

[2] Chromium on Debian uses an alternative sandboxing method that relies
on a setuid binary, Guix do not use this :-)

-- 
Giovanni Biscuolo

Xelera IT Infrastructures


signature.asc
Description: PGP signature