Cabal mismatch in ghc-lucid; long-term archiving Haskell?

2022-08-20 Thread zimoun
Hi, Let try to build the Haskell package ghc-lucid. --8<---cut here---start->8--- $ guix build ghc-lucid substitute: updating substitutes from 'https://ci.guix.gnu.org'... 100.0% The following derivations will be built: /gnu/store/9m71fs1i0anv89f5zq44hbh2wn2l

Failure with “guix copy“

2022-08-20 Thread zimoun
Hi, Using Guix 65cabb0, I do not understand why ‘guix copy’ fails. Well, I have some items in the store of my remote desktop machine. --8<---cut here---start->8--- $ ssh desktop -t guix build hledger ghc-lucid /gnu/store/f23gh2padz9xwsjgz5znfk9azn5l101z-ghc-l

secure boot

2022-08-20 Thread Antonio Carlos Padoan Junior
Hello, I hope my question makes sense. It concerns Guix grub UEFI bootloaders. I would like to understand in which extent Guix functional approach helps to secure the computer with regards to an early boot malicious code/malware infection. As far as I understand, Guix doesn't provide means to au

Re: secure boot

2022-08-20 Thread Tobias Platen
That would be interesting, even on a Talos II, which has owner controlled secure boot. There will be no need to sign with a Microsoft key as most UEFI implementations do. There are two Microsoft keys, one for Windows and one for all other OSes. On Sat, 2022-08-20 at 13:23 +0200, Antonio Carlos Pad

Re: Cabal mismatch in ghc-lucid; long-term archiving Haskell?

2022-08-20 Thread Lars-Dominik Braun
Hi zimoun, > Is it a manual in-place replacement? Or is it an automatic in-place > update by Hackage infrastructure? Or do I miss a point? > > In all cases, these revised Cabal files are not archived elsewhere than > in Hackage, right? The question is thus, where could we archive them? > > No

Re: secure boot

2022-08-20 Thread kiasoc5
Hi Antonio, On Sat, 2022-08-20 at 13:23 +0200, Antonio Carlos Padoan Junior wrote: > As far as I understand, Guix doesn't provide means to automatically > sign > bootloaders and kernels in order to use UEFI secure boot after each > system > reconfigure (assuming a PKI is properly implemented).  He