newbe question

2021-05-11 Thread Adam Kandur via
hi everyone!
is there any example of command line application written in common lisp and 
packed with guix?



Re: newbe question

2021-05-11 Thread Guillaume Le Vaillant
Adam Kandur via  skribis:

> hi everyone!
> is there any example of command line application written in common lisp and 
> packed with guix?

There is uglify-js or tinmop I think.
If what you want is examples of standalone Common Lisp programs, you
could also look at stumpwm or nyxt.


signature.asc
Description: PGP signature


Re: newbe question

2021-05-11 Thread Adam Kandur via
o, thank you =)



May 11, 2021, 18:22 by g...@posteo.net:

> Adam Kandur via  skribis:
>
>> hi everyone!
>> is there any example of command line application written in common lisp and 
>> packed with guix?
>>
>
> There is uglify-js or tinmop I think.
> If what you want is examples of standalone Common Lisp programs, you
> could also look at stumpwm or nyxt.
>



`guix pull` of an ssh channel fails

2021-05-11 Thread Bone Baboon
I have a substitute server that needs to build a couple of packages with
patches:

* inetutlis version 2.0 from the core-updates branch instead of 1.9.4
  from the master branch
** https://issues.guix.gnu.org/issue/48214#10

* glib with longer test timeout
** https://issues.guix.gnu.org/issue/48024#12

* offlineimap without tests
** https://issues.guix.gnu.org/issue/48213#2

I am trying to setup a channel for this substitute server's patched Guix
repository. `guix pull` is failing.

On a client of the substitute server I have reconfigured with this in
it's system configuration:

```
(service guix-service-type
 (guix-configuration
  (authorized-keys
   (list
(local-file
 "/path/to/signing-key.pub")
```
Where signing-key.pub is the substitute server's public signing key.

I have added the ssh public key of the substitute server to the client
with `ssh-copy-id`.  The substitute server's ssh public key is in
~/.ssh/authorize_keys.  I have also done the reverse with the client's
ssh public key and it is on the substitute server's
~/.ssh/authorize_keys.

This is the contents of ~/.config/guix/channels.scm:

```
(list
 (channel
  (name 'guix)
  (url "ssh://@:22/path/to/patched-guix-repo/")
  (branch "master")))
```

When I run `guix pull` I get this error.

```
Updating channel 'guix' from Git repository at 
'ssh://@:22/path/to/patched-guix-repo/'...
guix pull: error: Git error: error authenticating: no auth sock variable
```

I can successfully run `git clone
ssh://@:22/path/to/patched-guix-repo`.

I can successfully transfer files from the substitute server to the
client with scp without entering a password.

Can a channel use a ssh url?



Re: mount.davfs: program is not setuid root

2021-05-11 Thread Simon Streit
Efraim Flashner  writes:

> On Mon, Apr 19, 2021 at 08:47:08PM -0400, Leo Famulari wrote:
> I've attached a diff against guix and also a davfs.scm for building just
> the modified davfs2. Can you try building it with `guix build -f
> davfs.scm` and then use the mount.davfs from there to try mounting your
> davfs mountpoint?

Thanks for posting the diff.  I did manage to build the package locally,
but that in itself isn't of much use.  I'm afraid I have to ask now, how
to I apply this package into my declaration so that it is available from
my system to test?

Unfortunately my packaging skills aren't that far yet where I can plug
modified system packages.  Is there maybe a part of documentation you
could show me?  I've been looking around, but haven't found this
scenario yet.


Cheers
Simon



Re: mount.davfs: program is not setuid root

2021-05-11 Thread Leo Famulari
On Tue, May 11, 2021 at 07:42:40PM +0200, Simon Streit wrote:
> Thanks for posting the diff.  I did manage to build the package locally,
> but that in itself isn't of much use.  I'm afraid I have to ask now, how
> to I apply this package into my declaration so that it is available from
> my system to test?

If I understand your use case correctly, you can use the built
mount.davfs program directly from /gnu/store, like this:

$(guix build -f davfs2)/sbin/mount.davfs [...]



Re: mount.davfs: program is not setuid root

2021-05-11 Thread Simon Streit
Leo Famulari  writes:

> On Tue, May 11, 2021 at 07:42:40PM +0200, Simon Streit wrote:
>> Thanks for posting the diff.  I did manage to build the package locally,
>> but that in itself isn't of much use.  I'm afraid I have to ask now, how
>> to I apply this package into my declaration so that it is available from
>> my system to test?
>
> If I understand your use case correctly, you can use the built
> mount.davfs program directly from /gnu/store, like this:
>
> $(guix build -f davfs2)/sbin/mount.davfs [...]

hm.. alright, then I did test that already.  It fails saying:
--8<---cut here---start->8---
./sbin/mount.davfs: program is not setuid root
--8<---cut here---end--->8---
and nothing else. :/



Re: mount.davfs: program is not setuid root

2021-05-11 Thread Leo Famulari
On Tue, May 11, 2021 at 09:30:56PM +0200, Simon Streit wrote:
> Leo Famulari  writes:
> 
> > On Tue, May 11, 2021 at 07:42:40PM +0200, Simon Streit wrote:
> >> Thanks for posting the diff.  I did manage to build the package locally,
> >> but that in itself isn't of much use.  I'm afraid I have to ask now, how
> >> to I apply this package into my declaration so that it is available from
> >> my system to test?
> >
> > If I understand your use case correctly, you can use the built
> > mount.davfs program directly from /gnu/store, like this:
> >
> > $(guix build -f davfs2)/sbin/mount.davfs [...]
> 
> hm.. alright, then I did test that already.  It fails saying:
> --8<---cut here---start->8---
> ./sbin/mount.davfs: program is not setuid root
> --8<---cut here---end--->8---
> and nothing else. :/

Sorry, I don't remember the earlier discussion or what you are trying to
accomplish. But it's expected that nothing in /gnu/store is setuid.
You'd have to use sudo or become root.



Re: mount.davfs: program is not setuid root

2021-05-11 Thread Simon Streit
Leo Famulari  writes:

> On Tue, May 11, 2021 at 09:30:56PM +0200, Simon Streit wrote:
>> Leo Famulari  writes:
>> 
>> > On Tue, May 11, 2021 at 07:42:40PM +0200, Simon Streit wrote:
>> >> Thanks for posting the diff.  I did manage to build the package locally,
>> >> but that in itself isn't of much use.  I'm afraid I have to ask now, how
>> >> to I apply this package into my declaration so that it is available from
>> >> my system to test?
>> >
>> > If I understand your use case correctly, you can use the built
>> > mount.davfs program directly from /gnu/store, like this:
>> >
>> > $(guix build -f davfs2)/sbin/mount.davfs [...]
>> 
>> hm.. alright, then I did test that already.  It fails saying:
>> --8<---cut here---start->8---
>> ./sbin/mount.davfs: program is not setuid root
>> --8<---cut here---end--->8---
>> and nothing else. :/
>
> Sorry, I don't remember the earlier discussion or what you are trying to
> accomplish. But it's expected that nothing in /gnu/store is setuid.
> You'd have to use sudo or become root.

The problem is, that davfs2 mount points can't be mounted as user,
despite the binary being setuid.  To make that work I added a line in my
declaration.  But it doesn't work as expected.  Hence Efraim's patch,
that should test if this would make a difference.

Mounting with as root has been working all the time and no errors are
returned.

So the next step would be to have this patched package put into my
system declaration to test and see if setuid has been set now.  My
knowledge is to limited to go this far yet.  Will just leave it as where
it is for now.  I don't need to access this mount point very often.


Cheers,
Simon



GNU Guix 1.3.0 released

2021-05-11 Thread Maxim Cournoyer
We are pleased to announce the release of GNU Guix 1.3.0!

This release corresponds to 8,300 commits over almost 6 months by 212
people.  Support for the POWER9 platform is now offered as technological
preview.  This release adds new features, refines the user experience
and improves performance.  It also includes many new packages and
services along bug fixes--see below for a list of changes.

Read more about today’s announcement at:

  https://guix.gnu.org/en/blog/2021/gnu-guix-1.3.0-released

• About

  GNU Guix is a transactional package manager and an advanced
  distribution of the GNU system that respects user freedom.  Guix can
  be used on top of any system running the Hurd or the Linux kernel, or
  it can be used as a standalone operating system distribution for i686,
  x86_64, ARMv7, AArch64 and POWER9 machines.

  In addition to standard package management features, Guix supports
  transactional upgrades and roll-backs, unprivileged package
  management, per-user profiles, and garbage collection.  When used as a
  standalone GNU/Linux distribution, Guix offers a declarative,
  stateless approach to operating system configuration management.  Guix
  is highly customizable and hackable through Guile programming
  interfaces and extensions to the Scheme language.

  https://guix.gnu.org

• Download

  Here are the compressed sources and a GPG detached signature[*]:
https://ftp.gnu.org/gnu/guix/guix-1.3.0.tar.gz   (39MB)
https://ftp.gnu.org/gnu/guix/guix-1.3.0.tar.gz.sig

  Here are the bootable USB installation images and their signatures[*]:
https://ftp.gnu.org/gnu/guix/guix-system-install-1.3.0.i686-linux.iso   
(610MB)
https://ftp.gnu.org/gnu/guix/guix-system-install-1.3.0.i686-linux.iso.sig
https://ftp.gnu.org/gnu/guix/guix-system-install-1.3.0.x86_64-linux.iso   
(612MB)
https://ftp.gnu.org/gnu/guix/guix-system-install-1.3.0.x86_64-linux.iso.sig

  Here is the QCOW2 virtual machine (VM) image and its signature[*]:
https://ftp.gnu.org/gnu/guix/guix-system-vm-image-1.3.0.x86_64-linux.qcow2 
(972MB)

https://ftp.gnu.org/gnu/guix/guix-system-vm-image-1.3.0.x86_64-linux.qcow2.sig

  Here are the binary tarballs and their signatures[*]:
https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.aarch64-linux.tar.xz   (83MB)
https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.aarch64-linux.tar.xz.sig
https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.armhf-linux.tar.xz   (83MB)
https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.armhf-linux.tar.xz.sig
https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.i686-linux.tar.xz   (88MB)
https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.i686-linux.tar.xz.sig
https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.powerpc64le-linux.tar.xz   
(85MB)
https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.powerpc64le-linux.tar.xz.sig
https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.x86_64-linux.tar.xz   (87MB)
https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.x86_64-linux.tar.xz.sig

  Use a mirror for higher download bandwidth:
https://www.gnu.org/order/ftp.html

  Here are the MD5 and SHA1 checksums:

  406fc1948b8147fa8047a661e3544d4c  guix-1.3.0.tar.gz
  b4820b4c9fc85e2980201bf2e9e9eeb9  guix-binary-1.3.0.aarch64-linux.tar.xz
  5b5e76c48a886866fa2c4267b25107e4  guix-binary-1.3.0.armhf-linux.tar.xz
  79fba3f8f6b1a4c71ba8a1ec394e6e56  guix-binary-1.3.0.i686-linux.tar.xz
  d5f638e498a73d7b238981aef1258a42  guix-binary-1.3.0.powerpc64le-linux.tar.xz
  99ea26fb47b2a8a1ed04a60b30d4fd8c  guix-binary-1.3.0.x86_64-linux.tar.xz
  7565231d32dedcd417fae4985b4ca486  
guix-system-vm-image-1.3.0.x86_64-linux.qcow2
  7d0c42c7b53507b4fccabe865dbd78fa  guix-system-install-1.3.0.i686-linux.iso
  d1aa177eafb9becf2fdcd86f9e1f9790  guix-system-install-1.3.0.x86_64-linux.iso
  6c4536c0995d5c487d281cddc63ddda9df2eb749  guix-1.3.0.tar.gz
  414916ebfb8504e9b608d62c22c9f21c9ee6f243  
guix-binary-1.3.0.aarch64-linux.tar.xz
  5753f12bdc400e5b848c5c8042f79da7efd390ad  guix-binary-1.3.0.armhf-linux.tar.xz
  ad8ab3957d00add7d0133084dee3d3f00d671246  guix-binary-1.3.0.i686-linux.tar.xz
  fd20ff962ceae612d5c1f19ccb8d9a8068372173  
guix-binary-1.3.0.powerpc64le-linux.tar.xz
  c2a805775a6490b2546c30faf967a2db87d8806b  
guix-binary-1.3.0.x86_64-linux.tar.xz
  1fbda19d14d8291d13a4bb1ed8a50516fac220c4  
guix-system-vm-image-1.3.0.x86_64-linux.qcow2
  87f94f0d656fbca8bafdeabef52d69f52bffb898  
guix-system-install-1.3.0.i686-linux.iso
  56cfb1d413344479590bc788ffb99d35dd526d90  
guix-system-install-1.3.0.x86_64-linux.iso

  [*] Use a .sig file to verify that the corresponding file (without the
  .sig suffix) is intact.  First, be sure to download both the .sig file
  and the corresponding tarball.  Then, run a command like this:

gpg --verify guix-1.3.0.tar.gz.sig

  If that command fails because you don't have the required public key,
  then run this command to import it:

gpg --keyserver keys.gnupg.net --recv-keys 
27D586A4F8900854329FF09F1260E46482E63562

  and rerun t