bug#66072: Duplicate/conflicting definitions for ocl-icd

2023-09-21 Thread Guillaume Le Vaillant
As the duplicate has been removed, I'm closing the issue.
If one day we find a conflict between open-icd-loader and ocl-icd, we'll
open a new bug report.


signature.asc
Description: PGP signature


bug#66140: ghc-memory not maintained anymore

2023-09-21 Thread Denis 'GNUtoo' Carikli
Hi,

The ghc-memory package uses the https://github.com/vincenthz/hs-memory
git repository.

Days ago[1] that repository was "archived" / made read-only, so is is
not maintained anymore.

The bad news is that ghc-memory package is used directly or indirectly
by about 1400 packages.

It only happened days ago and that other GNU/Linux distributions and
many upstream projects are affected as well but I'm unsure if they know
about this issue yet, so there is still a lot of unknown.

As a side note it might be interesting to try to see if it's easy or not
to detect cases like that with guix lint, as github might have some API
that enable to detect if a project is archived or not. Though I've no
idea how much work or maintenance something like that would require.

If something like that is ever made, it would also probably only
work for packages that don't have bundled dependencies.

References:
---
[1]Probably around the 20th september[2].
[2]https://github.com/vincenthz/hs-memory/pull/98#event-10418690170

Denis.


pgpP40iIy7vt9.pgp
Description: OpenPGP digital signature


bug#30434: magit won’t work over TRAMP

2023-09-21 Thread Simon Tournier
Hi,

This bug#30434 [1] had been closed on 14 Feb 2018 and then reopened on
18 May 2022.

1: https://issues.guix.gnu.org/issue/30434

On Thu, 21 Jul 2022 at 00:04, Maxim Cournoyer  wrote:

>> More concretely, try "guix shell emacs emacs-magit --pure -- emacs"
>> followed by "M-x magit-status" in a Git checkout, it will fail due to
>> not finding the 'git' executable.
>>
>> So my idea is to use the new magit changes to both make the remote
>> TRAMP work and _also_ make local things work in a pure environment,
>> undoing the regression that was caused by reverting the
>> git->/gnu/store/.../bin/git substitution without creating new
>> regressions.
>
> Sounds good to me!  I'll be happy to review any patch implementing it.

Now, we are 1 year, 17 weeks, 6 later after this message.  So I propose
to close this issue and then open another one for this potential patch.

WDYT?

Cheers,
simon





bug#65056: https://issues.guix.gnu.org available through Tor again

2023-09-21 Thread Giovanni Biscuolo
Altadil via Bug reports for GNU Guix  writes:

> Hi,
>
> it seems https://issues.guix.gnu.org can again be accessed when using
> Tor Browser.

Thank you!  I'm closing this bug, feel free to reopen it if needed.

Best regards, Gio'

-- 
Giovanni Biscuolo

Xelera IT Infrastructures


signature.asc
Description: PGP signature


bug#65056: https://issues.guix.gnu.org/ cannot be accessed through Tor

2023-09-21 Thread Giovanni Biscuolo
Hello,

Ricardo Wurmus  writes:

[...]

> IT had installed some DoS attack protection thing for the DMZ with
> different thresholds based on past access patterns.

Probably some of us is using access patterns the "thing" considers
DoS :-)

> Upon my request they have now disabled this completely for our IPs
> corresponding to ci.guix.gnu.org and its sibling node.

Thanks a lot!  We should probably consider this (disable any firewall
protection) as a requirement when one or more of our public facing hosts
firewalling is not under our direct control.

Now we only have berlin and bayfront as public facing hosts... but for
example milan.guix-1 is connected by our build farm via its public IP
(ehrm, time to set up wireguard for that, too).

Anyway, AFAIU this "thing" in berlin network is no more an issue, we do
not need a new bug report IMO.

Thank you!

[...]

-- 
Giovanni Biscuolo

Xelera IT Infrastructures


signature.asc
Description: PGP signature