Hello,
I'm sending a patch supposed to fix https://issues.guix.gnu.org/68848 .
Please let me know if this is ok for you and fixes your issues.
Thank you,
giacomo
Hm, I'm hitting this bug while trying to work on the openSUSE package.
They offer a way to build RPM packages from the most recent master
commit, but it's get the wrong version (1.3.0 instead of 1.4.0) due to
this `git describe` result.
So in the end the package looks like `guix-1.3.0+git*.rpm`
Hi all,
I just tried the previous command on Device C, an x86_64-linux Guix System:
~ $ guix time-machine --commit=deeb7d1f53d7ddfa977b3eadd760312bbd0a2509 --
build qtwebengine --derivations --system=aarch64-linux --no-grafts --dry-run
Hi Randy,
"Randy Farmer" writes:
> ERROR: In procedure %resolve-variable:
> error: go-github-com-tdewolff-minify-v2: unbound variable
This should have been fixed by c4687f5437ad89a7e87deed1933b60f6eac83176.
Can you retry a new guix pull?
Closing for now, if you still encounter the same issue,
On Wed, Jan 31 2024, André Batista wrote:
> Hi Clément,
>
> qua 31 jan 2024 às 03:19:26 (1706681966), clem...@lassieur.org enviou:
>> Hello André,
>>
>> I thought about it, and I even started working on a fix. But I stopped
>> working on it because I thought it added too much complexity for too
On Wed, Jan 31 2024, Carlo Zancanaro wrote:
>>> + (< attempt 12)) ; 12 * 10 seconds = 2 minutes
>> ^--
>> This comment is not true because certbot takes time to execute (around 15s
>> on my vm). I don't
Hi Clément,
qua 31 jan 2024 às 03:19:26 (1706681966), clem...@lassieur.org enviou:
> Hello André,
>
> I thought about it, and I even started working on a fix. But I stopped
> working on it because I thought it added too much complexity for too
> little gain. See:
>
>
From: Jean-Pierre De Jesus DIAZ
* modules/past/packages/tls.scm (openssl-1.0): Fix a time bomb in
cms-test.pl due to expired certificates.
---
modules/past/packages/tls.scm | 16 +++-
1 file changed, 15 insertions(+), 1 deletion(-)
diff --git a/modules/past/packages/tls.scm
>guix pull
Updating channel 'guix' from Git repository at
'https://git.savannah.gnu.org/git/guix.git'...
Building from this channel:
guix https://git.savannah.gnu.org/git/guix.git 7a63fba
Computing Guix derivation for 'x86_64-linux'... \Backtrace:
In ice-9/boot-9.scm:
222:29 19 (map1 _)
Hello,
when I try to execute rgrep over a tramp connection, I get the following error:
/bin/sh: /gnu/store/sk8rxsrj3drr4arypicnhy899vgn3prr-findutils-4.9.0/bin/find:
not found
That is somewhat expected, since the remote machine is not a Guix one, but even
if it were, it would require to have
Hi,
On Tue, Jan 30, 2024 at 5:29 PM Ludovic Courtès
wrote:
>
> Hi,
>
> Jean-Pierre De Jesus Diaz skribis:
>
> > And the from the error file that the test writes:
> >
> > $ cat /tmp/guix-build-openssl-1.0.2u.drv-0/openssl-1.0.2u/test/cms.err
> > Verification failure
> >
Hi Janneke, thank you for the report. I already pointed out this at
https://issues.guix.gnu.org/60521 . there was a fix that was removed by a
misunderstanding on the requirements of the service since the code contradicts
documentation as you pointed out . It should be pretty easy to apply the
Hi,
When I follow the documentation, and have
dotfiles/guix/.config/guix/channels.scm
that shows suing tree -a ./dotfiles
dotfiles
└── guix
└── .config
└── guix
└── channels.scm
similar to the documentaion, and using
(service
On Wed, Jan 31 2024, Clément Lassieur wrote:
Removing guix-devel.
I've also removed Brice.
On Tue, Jan 30 2024, Carlo Zancanaro wrote:
(format #t "Acquiring or renewing
certificate: ~a~%" name)
Here we could add ‘(force-output)’, because otherwise
* gnu/services/certbot.scm (certbot-deploy-hook): Reload nginx.
* doc/guix.texi (Certificate services): Remove deploy-hook from example.
Change-Id: Ibb10481170a6fda7df72492072b939dd6a6ad176
---
I've pulled the nginx reloading into the regular deployment hook
here. I also removed the explicit
Carlo Zancanaro (4):
services: certbot: Symlink certificates to /etc/certs.
services: certbot: Create self-signed certificates before certbot
runs.
services: certbot: Reload nginx in deploy hook.
services: certbot: Add one-shot service to renew certificates.
doc/guix.texi
* gnu/services/certbot.scm (): Add
start-self-signed? field.
(generate-certificate-gexp): New procedure.
(certbot-activation): Generate self-signed certificates when
start-self-signed? is #t.
* doc/guix.texi (Certificate services): Document start-self-signed?.
Change-Id:
* gnu/services/certbot.scm (certbot-renewal-one-shot): New procedure.
(certbot-service-type)[extensions]: Add it to shepherd-root extension.
(certbot-command): Make connection errors return a different exit code.
(certbot-activation): Remove message with certificate renewal instructions.
* gnu/services/certbot.scm (certbot-deploy-hook): New procedure.
(certbot-command): Pass new deploy hook to certbot.
* doc/guix.texi: Replace "letsencrypt/live" with "certs" throughout, except in
the certbot deploy-hook description.
Change-Id: I2ba5e4903d1e293e566b732a84b07d5a134b697d
---
Hi Oleg,
Sharlatan Hellseher writes:
> Long story short, how to resolve package inheritance which would not
> break CI ;-) ?
>
> [...]
>
> My rational was to keep golang module in (gnu packages golang-web) and
> the new inherited package providing executable in (gnu packages web)
> which
Ludovic Courtès skribis:
> When a channel is specified both implicitly, as the dependency of
> another channel, and explicitly, in the user-provided channels file, the
> “most specific” one wins—the one that has a non-#f ‘commit’ field.
>
> However, the dependencies of that channel may be read
21 matches
Mail list logo