newbe question
hi everyone! is there any example of command line application written in common lisp and packed with guix?
Re: newbe question
Adam Kandur via skribis: > hi everyone! > is there any example of command line application written in common lisp and > packed with guix? There is uglify-js or tinmop I think. If what you want is examples of standalone Common Lisp programs, you could also look at stumpwm or nyxt. signature.asc Description: PGP signature
Re: newbe question
o, thank you =) May 11, 2021, 18:22 by g...@posteo.net: > Adam Kandur via skribis: > >> hi everyone! >> is there any example of command line application written in common lisp and >> packed with guix? >> > > There is uglify-js or tinmop I think. > If what you want is examples of standalone Common Lisp programs, you > could also look at stumpwm or nyxt. >
`guix pull` of an ssh channel fails
I have a substitute server that needs to build a couple of packages with patches: * inetutlis version 2.0 from the core-updates branch instead of 1.9.4 from the master branch ** https://issues.guix.gnu.org/issue/48214#10 * glib with longer test timeout ** https://issues.guix.gnu.org/issue/48024#12 * offlineimap without tests ** https://issues.guix.gnu.org/issue/48213#2 I am trying to setup a channel for this substitute server's patched Guix repository. `guix pull` is failing. On a client of the substitute server I have reconfigured with this in it's system configuration: ``` (service guix-service-type (guix-configuration (authorized-keys (list (local-file "/path/to/signing-key.pub") ``` Where signing-key.pub is the substitute server's public signing key. I have added the ssh public key of the substitute server to the client with `ssh-copy-id`. The substitute server's ssh public key is in ~/.ssh/authorize_keys. I have also done the reverse with the client's ssh public key and it is on the substitute server's ~/.ssh/authorize_keys. This is the contents of ~/.config/guix/channels.scm: ``` (list (channel (name 'guix) (url "ssh://@:22/path/to/patched-guix-repo/") (branch "master"))) ``` When I run `guix pull` I get this error. ``` Updating channel 'guix' from Git repository at 'ssh://@:22/path/to/patched-guix-repo/'... guix pull: error: Git error: error authenticating: no auth sock variable ``` I can successfully run `git clone ssh://@:22/path/to/patched-guix-repo`. I can successfully transfer files from the substitute server to the client with scp without entering a password. Can a channel use a ssh url?
Re: mount.davfs: program is not setuid root
Efraim Flashner writes: > On Mon, Apr 19, 2021 at 08:47:08PM -0400, Leo Famulari wrote: > I've attached a diff against guix and also a davfs.scm for building just > the modified davfs2. Can you try building it with `guix build -f > davfs.scm` and then use the mount.davfs from there to try mounting your > davfs mountpoint? Thanks for posting the diff. I did manage to build the package locally, but that in itself isn't of much use. I'm afraid I have to ask now, how to I apply this package into my declaration so that it is available from my system to test? Unfortunately my packaging skills aren't that far yet where I can plug modified system packages. Is there maybe a part of documentation you could show me? I've been looking around, but haven't found this scenario yet. Cheers Simon
Re: mount.davfs: program is not setuid root
On Tue, May 11, 2021 at 07:42:40PM +0200, Simon Streit wrote: > Thanks for posting the diff. I did manage to build the package locally, > but that in itself isn't of much use. I'm afraid I have to ask now, how > to I apply this package into my declaration so that it is available from > my system to test? If I understand your use case correctly, you can use the built mount.davfs program directly from /gnu/store, like this: $(guix build -f davfs2)/sbin/mount.davfs [...]
Re: mount.davfs: program is not setuid root
Leo Famulari writes: > On Tue, May 11, 2021 at 07:42:40PM +0200, Simon Streit wrote: >> Thanks for posting the diff. I did manage to build the package locally, >> but that in itself isn't of much use. I'm afraid I have to ask now, how >> to I apply this package into my declaration so that it is available from >> my system to test? > > If I understand your use case correctly, you can use the built > mount.davfs program directly from /gnu/store, like this: > > $(guix build -f davfs2)/sbin/mount.davfs [...] hm.. alright, then I did test that already. It fails saying: --8<---cut here---start->8--- ./sbin/mount.davfs: program is not setuid root --8<---cut here---end--->8--- and nothing else. :/
Re: mount.davfs: program is not setuid root
On Tue, May 11, 2021 at 09:30:56PM +0200, Simon Streit wrote: > Leo Famulari writes: > > > On Tue, May 11, 2021 at 07:42:40PM +0200, Simon Streit wrote: > >> Thanks for posting the diff. I did manage to build the package locally, > >> but that in itself isn't of much use. I'm afraid I have to ask now, how > >> to I apply this package into my declaration so that it is available from > >> my system to test? > > > > If I understand your use case correctly, you can use the built > > mount.davfs program directly from /gnu/store, like this: > > > > $(guix build -f davfs2)/sbin/mount.davfs [...] > > hm.. alright, then I did test that already. It fails saying: > --8<---cut here---start->8--- > ./sbin/mount.davfs: program is not setuid root > --8<---cut here---end--->8--- > and nothing else. :/ Sorry, I don't remember the earlier discussion or what you are trying to accomplish. But it's expected that nothing in /gnu/store is setuid. You'd have to use sudo or become root.
Re: mount.davfs: program is not setuid root
Leo Famulari writes: > On Tue, May 11, 2021 at 09:30:56PM +0200, Simon Streit wrote: >> Leo Famulari writes: >> >> > On Tue, May 11, 2021 at 07:42:40PM +0200, Simon Streit wrote: >> >> Thanks for posting the diff. I did manage to build the package locally, >> >> but that in itself isn't of much use. I'm afraid I have to ask now, how >> >> to I apply this package into my declaration so that it is available from >> >> my system to test? >> > >> > If I understand your use case correctly, you can use the built >> > mount.davfs program directly from /gnu/store, like this: >> > >> > $(guix build -f davfs2)/sbin/mount.davfs [...] >> >> hm.. alright, then I did test that already. It fails saying: >> --8<---cut here---start->8--- >> ./sbin/mount.davfs: program is not setuid root >> --8<---cut here---end--->8--- >> and nothing else. :/ > > Sorry, I don't remember the earlier discussion or what you are trying to > accomplish. But it's expected that nothing in /gnu/store is setuid. > You'd have to use sudo or become root. The problem is, that davfs2 mount points can't be mounted as user, despite the binary being setuid. To make that work I added a line in my declaration. But it doesn't work as expected. Hence Efraim's patch, that should test if this would make a difference. Mounting with as root has been working all the time and no errors are returned. So the next step would be to have this patched package put into my system declaration to test and see if setuid has been set now. My knowledge is to limited to go this far yet. Will just leave it as where it is for now. I don't need to access this mount point very often. Cheers, Simon
GNU Guix 1.3.0 released
We are pleased to announce the release of GNU Guix 1.3.0! This release corresponds to 8,300 commits over almost 6 months by 212 people. Support for the POWER9 platform is now offered as technological preview. This release adds new features, refines the user experience and improves performance. It also includes many new packages and services along bug fixes--see below for a list of changes. Read more about today’s announcement at: https://guix.gnu.org/en/blog/2021/gnu-guix-1.3.0-released • About GNU Guix is a transactional package manager and an advanced distribution of the GNU system that respects user freedom. Guix can be used on top of any system running the Hurd or the Linux kernel, or it can be used as a standalone operating system distribution for i686, x86_64, ARMv7, AArch64 and POWER9 machines. In addition to standard package management features, Guix supports transactional upgrades and roll-backs, unprivileged package management, per-user profiles, and garbage collection. When used as a standalone GNU/Linux distribution, Guix offers a declarative, stateless approach to operating system configuration management. Guix is highly customizable and hackable through Guile programming interfaces and extensions to the Scheme language. https://guix.gnu.org • Download Here are the compressed sources and a GPG detached signature[*]: https://ftp.gnu.org/gnu/guix/guix-1.3.0.tar.gz (39MB) https://ftp.gnu.org/gnu/guix/guix-1.3.0.tar.gz.sig Here are the bootable USB installation images and their signatures[*]: https://ftp.gnu.org/gnu/guix/guix-system-install-1.3.0.i686-linux.iso (610MB) https://ftp.gnu.org/gnu/guix/guix-system-install-1.3.0.i686-linux.iso.sig https://ftp.gnu.org/gnu/guix/guix-system-install-1.3.0.x86_64-linux.iso (612MB) https://ftp.gnu.org/gnu/guix/guix-system-install-1.3.0.x86_64-linux.iso.sig Here is the QCOW2 virtual machine (VM) image and its signature[*]: https://ftp.gnu.org/gnu/guix/guix-system-vm-image-1.3.0.x86_64-linux.qcow2 (972MB) https://ftp.gnu.org/gnu/guix/guix-system-vm-image-1.3.0.x86_64-linux.qcow2.sig Here are the binary tarballs and their signatures[*]: https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.aarch64-linux.tar.xz (83MB) https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.aarch64-linux.tar.xz.sig https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.armhf-linux.tar.xz (83MB) https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.armhf-linux.tar.xz.sig https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.i686-linux.tar.xz (88MB) https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.i686-linux.tar.xz.sig https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.powerpc64le-linux.tar.xz (85MB) https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.powerpc64le-linux.tar.xz.sig https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.x86_64-linux.tar.xz (87MB) https://ftp.gnu.org/gnu/guix/guix-binary-1.3.0.x86_64-linux.tar.xz.sig Use a mirror for higher download bandwidth: https://www.gnu.org/order/ftp.html Here are the MD5 and SHA1 checksums: 406fc1948b8147fa8047a661e3544d4c guix-1.3.0.tar.gz b4820b4c9fc85e2980201bf2e9e9eeb9 guix-binary-1.3.0.aarch64-linux.tar.xz 5b5e76c48a886866fa2c4267b25107e4 guix-binary-1.3.0.armhf-linux.tar.xz 79fba3f8f6b1a4c71ba8a1ec394e6e56 guix-binary-1.3.0.i686-linux.tar.xz d5f638e498a73d7b238981aef1258a42 guix-binary-1.3.0.powerpc64le-linux.tar.xz 99ea26fb47b2a8a1ed04a60b30d4fd8c guix-binary-1.3.0.x86_64-linux.tar.xz 7565231d32dedcd417fae4985b4ca486 guix-system-vm-image-1.3.0.x86_64-linux.qcow2 7d0c42c7b53507b4fccabe865dbd78fa guix-system-install-1.3.0.i686-linux.iso d1aa177eafb9becf2fdcd86f9e1f9790 guix-system-install-1.3.0.x86_64-linux.iso 6c4536c0995d5c487d281cddc63ddda9df2eb749 guix-1.3.0.tar.gz 414916ebfb8504e9b608d62c22c9f21c9ee6f243 guix-binary-1.3.0.aarch64-linux.tar.xz 5753f12bdc400e5b848c5c8042f79da7efd390ad guix-binary-1.3.0.armhf-linux.tar.xz ad8ab3957d00add7d0133084dee3d3f00d671246 guix-binary-1.3.0.i686-linux.tar.xz fd20ff962ceae612d5c1f19ccb8d9a8068372173 guix-binary-1.3.0.powerpc64le-linux.tar.xz c2a805775a6490b2546c30faf967a2db87d8806b guix-binary-1.3.0.x86_64-linux.tar.xz 1fbda19d14d8291d13a4bb1ed8a50516fac220c4 guix-system-vm-image-1.3.0.x86_64-linux.qcow2 87f94f0d656fbca8bafdeabef52d69f52bffb898 guix-system-install-1.3.0.i686-linux.iso 56cfb1d413344479590bc788ffb99d35dd526d90 guix-system-install-1.3.0.x86_64-linux.iso [*] Use a .sig file to verify that the corresponding file (without the .sig suffix) is intact. First, be sure to download both the .sig file and the corresponding tarball. Then, run a command like this: gpg --verify guix-1.3.0.tar.gz.sig If that command fails because you don't have the required public key, then run this command to import it: gpg --keyserver keys.gnupg.net --recv-keys 27D586A4F8900854329FF09F1260E46482E63562 and rerun t