procedure call summary: 382 RPCs
built-in-builders ... 1
add-to-store/tree ... 3
add-to-store ...48
add-text-to-store ... 330
Garbage collection statistics:
heap size:79.57 MiB
allocated:122.75 MiB
On Mon, Nov 04, 2024 at 11:34:50PM +0100, Ludovic Courtès wrote:
> Hello,
>
> Efraim Flashner skribis:
>
> > On Sun, Nov 03, 2024 at 04:57:09PM +0100, Denis 'GNUtoo' Carikli wrote:
> >> Hi,
> >>
> >> On Sun, 3 Nov 2024 15:19:04 +0200
&
target_cpu" - only building utilities])
platform=none
;;
esac
else
platform="$with_platform"
fi
I'm pretty sure grub-efi builds for ppc64le, but it looks like you've
selected grub above.
--
Efraim Flashner אפרים פלשנר
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
On Sun, Nov 03, 2024 at 04:57:09PM +0100, Denis 'GNUtoo' Carikli wrote:
> Hi,
>
> On Sun, 3 Nov 2024 15:19:04 +0200
> Efraim Flashner wrote:
>
> > Announcing the initial release of shepherd-run!
> >
> > Do you have experience with systemd and sy
n with Guix System already fully running on some of the aarch64
and riscv64 (and even armhf) machines that are already available?
--
Efraim Flashner אפרים פלשנר
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
more
> relevant approach! I added a comment about doing the migration
> automatically with Guix, but I won't be able to handle that quickly
> either.
No, I try to stay away from needing a database, I don't want to have to
administer it. I just like being able to apply CVE pa
know if
> you'd wish I write this patch + news item.
>
> > Andreas
> >
>
I feel like there is room for an 'upgrade action for postgresql, to dump
a database (also useful for a 'backup action!) and then re-import it,
but I didn't want to come anywhere near touc
n't like it because I'm sure it's overkill and would probably add
strain on the substitute servers, but it would decrease the number of
times 'searching for substitutes' is printed.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
himself back onto the board of the FSF a few years ago.
To phrase it diplomatically, it is not his Free Software positions that
give people pause. I will not try to list or go into detail the
different reasons people don't want to associate with him, but I will be
explicit that it is not be
contributions easier/faster or
more productive. With the idea of paying for things, not paying people
directly for their time.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
rson event (or online) where we
would get together and spend our time working on documentation or trying
to clear out all the pending patches or something else, and then have
the funding go toward travel and lodging and food.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D
On Tue, Oct 22, 2024 at 11:16:44AM -0400, Brennan Vincent wrote:
> Efraim Flashner writes:
>
> > On Tue, Oct 22, 2024 at 07:51:07AM -0400, Brennan Vincent wrote:
> >> Efraim Flashner writes:
> >>
> >> > On Tue, Oct 22, 2024 at 07:31:05AM +, Divya
On Tue, Oct 22, 2024 at 07:51:07AM -0400, Brennan Vincent wrote:
> Efraim Flashner writes:
>
> > On Tue, Oct 22, 2024 at 07:31:05AM +, Divya wrote:
> >> On 21 October 2024 18:08:44 GMT, Brennan Vincent
> >> wrote:
> >> >Note that we already have
ct help-debb...@gnu.org with problems
> > End of forwarded message
> >
>
> Hello Brennan,
>
> That sounds like good news then. It should be available in the guix channel
> soon then?
I'm not sure I have the time to d
ut, you can do this:
> >./etc/teams.scm show rust
> >
> > ...
> > members:
> > + Efraim Flashner
> >
> > Well, so a team can be one person ;-)
> > I think Efraim reads this list, but feel free to cc him.
>
> Thanks for that tip, Andreas!
>
ormat
> of the author field?
>
> I did not find anything regarding this in the manual.
>
> (I personally think it is bit sub-optimal, but before contacting the
> committers, I though I would check here whether there even is some
> policy regarding this.)
The best is to have the
t as punycode or
> > as noé dot eu ?
>
> Your address actually breaks my client, and all emails from you show up as
> being from "Guix Devel"
>
Previous email:
From: Noé Lopez via Development of GNU Guix and the GNU System distribution.
This email:
To: "n...@
t; recognize those packages.
>
> What is going wrong?
Try installing R and the R packages in the same profile. I'd suggest
installing R as a user instead of system-wide, but that's up to you.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D
ection, but I just haven’t allocated time to review it yet.
> Apologies!
>
> Could someone from the embedded or core teams (Cc’d) give a hand?
I'm currently traveling and won't be back home with my other devices
until the beginning of September. In the meantime I can see a
upported the old librsvg because the new one depends on
rust, instead we've worked around it so that those that can't use the
new one use the old one, and those packages which can't use the old one
specifically use the new one, with the side effect that gnome isn't
supported on all arc
er is
we're well covered on that front.)
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
On Fri, Jul 05, 2024 at 11:00:52AM +0200, Ludovic Courtès wrote:
> Hi,
>
> Efraim Flashner skribis:
>
> > * gnu/ci.scm (%dead-platform-triplets): New variable.
> > (cross-jobs): Also don't build for systems listed in
> > %dead-p
current active aarch64/armv7 capacity.
Also looking at our current infrastructure at MDC, part of the reason we
have so many x86_64 machines is because that's what was bought with the
donated money, not because we actually needed quite that many, so some
of the numbers might be higher tha
python-team branch is farther up the queue it is
> not actually ready to be merged, pushing up kde-team, rust-team, and
> r-team. What is the status of the other branches in the queue?
The rust-team has no objections to you merging first.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E5
o, I'd like to publicly thank everyone who took part in this process.
> Especially Andrius, for all those sleepless nights we spent fixing weird
> compiler errors.
>
> Let's make this finally happen!
>
> Ekaitz
So close!
I have a couple of changes I've w
ch system
((or "x86_64-linux" "i686-linux")
(if (string-contains target "mingw")
base-commit: ab41f5ec1cf559708165e1cd28e15538e6a197d6
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
On Thu, Jun 27, 2024 at 03:09:16PM +0200, Tomas Volf wrote:
> Hello,
>
> On 2024-06-27 05:50:02 -0700, Felix Lechner via Development of GNU Guix and
> the GNU System distribution. wrote:
> > Hi Efraim,
> >
> > On Wed, Jun 26 2024, Efraim Flashner wrote:
> &g
machines (citation needed).
I suggest that we stop cross-compiling packages to mips64el since it is
really dead-dead, and not just mostly-dead or nearly-dead.
¹ https://alpha.gnu.org/gnu/guix/
² https://en.wikipedia.org/wiki/Loongson#Loongson_microprocessor_specifications
³ https://www.debian.org/po
On Wed, Jun 26, 2024 at 10:46:56AM +0300, Efraim Flashner wrote:
> On Tue, Jun 25, 2024 at 08:48:12AM -0700, Ian Eure wrote:
> > Hi Efraim,
> >
> > Efraim Flashner writes:
> >
> > > [[PGP Signed Part:Undecided]]
> > > On Thu, Jun 20, 2024 at 05:10:1
On Tue, Jun 25, 2024 at 08:48:12AM -0700, Ian Eure wrote:
> Hi Efraim,
>
> Efraim Flashner writes:
>
> > [[PGP Signed Part:Undecided]]
> > On Thu, Jun 20, 2024 at 05:10:11PM -0700, Ian Eure wrote:
> > > Hi Guixers,
> > >
> > > I want to updat
g the SWH linter tie-in as shooting ourselves in the foot and
not likely to make any difference to the SWH.
On a personal level it is always possible to run 'guix lint' with the
'--no-network' flag or the '--exclude=archival' flag.
--
Efraim Flashner רנש
ailable, and
the newest version is 1.79. After merging the current branch I hope to
be able to move the version of rust on the rust-team branch to whatever
the latest version is.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality
e'll keep it in mind.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
d off any potential misunderstanding, I followed the link above
and the line "Only wimps ..." is an old quote from Linus Torvalds, not
Greg assuming your gender :).
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
in should be the default at the
> very least, and the process should be transparent to everybody putting
> code into SH. Archiving source code is a good cause. This is why
> I said to approach them in official Guix capacity :)
One of our packages, dbxfs, left Github a while ago and contin
ould make it easier to merge master
into core-updates since there would be less drift between the two.
What is the correct way to apply a patch to multiple branches?
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
e issue of
> the zfs package depending on a kernel package that may or may not be needed
> (and which it may not compile against), and the user having to create a
> custom non-substitutable version--including all of the user-space tools--for
> the specific kernel they are running.
I
e, but on my other machines using ext4 I think the space cleared
and what I'm expecting to have free to use do actually match up, but I
don't remember paying that much attention to the numbers previously on
those machines.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55
On Fri, May 31, 2024 at 03:03:47PM -0700, Felix Lechner wrote:
> Hi Efraim,
>
> On Tue, May 28 2024, Efraim Flashner wrote:
>
> > As your store grows larger the inherent deduplication from the
> > guix-daemon approaches a 3:1 file deduplication ratio.
>
> Thank
on approaches a 3:1 file deduplication ratio. If two files are
the same then they are hardlinked to the same actual block on the drive
and you save some space.
I have found that if you switch to btrfs and add zstd (level 3)
compression then you get about another 2:1 on top of that, for around
5.5:1.
suggestion is to delete them by default, or move them to a 'libtool'
> output when one is available (similarly to how we handle debug symbol
> files).
>
> --
> Thanks,
> Maxim
It would be interesting to move them to a 'static' or a 'libtool' output
by default.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
e-property
lint-hidden-cves to list the CVEs which are covered by the diff, and
that'll hide the CVEs from 'guix lint'.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
be nice to have everything Guix related under /gnu,
then we could also have the option of giving it its own btrfs subvolume.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
What do others think?
I think changing the defaults to use /var and /etc by default would be a
good change. If someone needs to use the /usr/local/{var,etc}
directories they're able to change back to the previous defaults
themselves.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40
nning. :-)
Indeed. It first needs to rebuild guix with all your commits on top.
> Thanks for looking into this!
>
> Ludo’.
>
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
at can be patched or if it's a
case of the software not supporting 32-bit architectures.
¹ https://qa.guix.gnu.org/branch/master
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
a
> native-inputs field.
There's also the package property updater-extra-{native-,propagated-,}inputs
to add a package even if it's not shown as required by the importer.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality
here [4], and I've sent a patch for improvements here [5].
>
> 4:
> https://guix.gnu.org/en/manual/devel/en/html_node/Managing-Patches-and-Branches.html
> 5: https://issues.guix.gnu.org/70549
>
> Let me know if you have any thoughts or questions!
>
> Thanks,
>
&
afe to move pango (and
others as needed) to propagated inputs. Make sure to make the necessary
changes to librsvg-2.40 also.
I haven't had any problems building the rust based librsvg on
core-updates, so I'd suggest leaving that alone for now.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
On Wed, Apr 24, 2024 at 11:58:22AM -0400, Jason Conroy wrote:
>
> Efraim Flashner writes:
> > On the other hand, by generating it during the build of each package we
> > make sure to pull in all the crates which exist in the build, so we
> > could add into a profile/
On Thu, Apr 18, 2024 at 12:54:02PM -0400, Jason Conroy wrote:
>
> Efraim Flashner writes:
>
> > Currently if you were to pull in rust-rand-0.8 and rust-rand-0.7 then
> > you'd have both rand-0.*.crate files in the registry but only one of
> > them would be list
t remaining problems
> would manifest in the form of missing inputs, due to transitive libtool
> dependencies causing overlinking and the new pkgconf being smart enough
> to optimize away some previously captured link directives that would be
> baked in the RUNPATH and sastify libtool overli
oes sound like it jeopardizes this specific project. In a way,
> that’s a good problem to have as a project, but it does mean that
> Zachary would need to look for another project (which could still be
> related to ‘guix pack’).
>
> Thoughts?
There's always the option of tryi
://git.sr.ht/~efraim/guix-config/tree/master/item/vim
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
" This file is a per-project '.exrc' file.
" To eas
ifics, etc. For
all people. If a person chooses to go by their "maiden name" or their
"married name" or a pseudonym, that's their prerogative.
>
> --
> Regards
> Hartmut Goebel
>
> | Hartmut Goebel | h.goe...@crazy-compilers.com |
On Thu, Mar 07, 2024 at 11:48:53AM -0500, Jason Conroy wrote:
> On Thu, Mar 7, 2024 at 3:08 AM Efraim Flashner
> wrote:
>
> > The transitive dependencies getting pulled in automatically should work
> > automatically if we ever finish the antioxidant-build-system.
>
or working as intended.
>
> [1] https://lists.gnu.org/archive/html/guix-devel/2022-12/msg00310.html
>
I've added a rust-cargo package in rust-apps.scm and a note in
crates-io.scm to remove it with the next rust-team merge.
--
Efraim Flashner רנשלפ םירפא
GPG key = A2
GNUnet integration
> > no mentor available
> >
> > Adding modules in support of continuous integration to cuirass
> > Ludovic Courtès (civodul)
> >
> > Continue rewrite build daemon in Guile Scheme
> > Ludovic Courtès (civodul)
> >
> > I myself am available to co-mentor, and also to be the formal mentor
> > in case someone does not feel like doing the official dance with
> > Google. Currently I can commit to devoting two hours a week to this.
> >
> > Regards,
> > g_bor
> >
>
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
On Wed, Mar 06, 2024 at 12:53:44PM -0500, Jason Conroy wrote:
> On Wed, Mar 6, 2024 at 4:06 AM Efraim Flashner
> wrote:
>
> > On Mon, Feb 26, 2024 at 09:24:29PM -0500, Jason Conroy wrote:
> > > Hello Efraim,
> > >
> > > Thanks for investigating thi
8v65rbg2di4qhgdbvhfcjf31rdzby-profile/share/cargo/registry/index/ra/nd
> /gnu/store/zf88v65rbg2di4qhgdbvhfcjf31rdzby-profile/share/cargo/registry/index/ra/nd/rand
> /gnu/store/zf88v65rbg2di4qhgdbvhfcjf31rdzby-profile/share/cargo/registry/rand-0.8.5.crate
> /gnu/store/zf88v65rbg2di4qhgdbvhfc
On Thu, Feb 08, 2024 at 02:33:35PM +0200, Efraim Flashner wrote:
> On Mon, Jan 29, 2024 at 05:36:52PM +0100, Ludovic Courtès wrote:
> > Hi,
> >
> > Vagrant Cascadian skribis:
> >
> > > This is because the default grub theme generates a .png from an .svg
&g
y.
Seeing how often we add an extra-config field for just about every other
service I don't think that should be a hindrance.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
t;
> $ git log origin/master
> commit f29f80c194d0c534a92354b2bc19022a9b70ecf8 (origin/master, origin/HEAD)
> Merge: c034088e37 7947d47c9b
> Author: Efraim Flashner
> Date: Wed Feb 28 12:18:45 2024 +0200
> Merge branch 'rust-team'
> Change-Id: Iee31c5de29c357c822f60df4fa8ce758779
I can continue with Hyprland!
The README and Cargo.toml disagree about what commands to call, but I
can add a hyprland variant of the xremap package if there's interest.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be
inally pushed
> to the go-team branch.
Also can you pull in the patch from bug#67505? Thanks.
¹ I have to look up the phrasing each time.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
for other things too. It should be possible to flash
u-boot separately and then use grub-efi (or something like it) but it's
not currently supported out of the box. I look forward to seeing how
this might look.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14
nto Guix.
> I'll see if I can find someone motivated and competent to do that.
I've been carrying around this diff for a while but I don't think I'm
currently ready to finish it off. It adds aarch64 and armhf bootstrap
binaries for GHC and gets started on the path to buildi
As far as tracking back from git-annex to ghc to see that it's not
supported on aarch64, I'm not sure how you would find that information.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
sing a guile-rsvg variant that depends on ‘librsvg-2.40’, the
> last version written in C?
>
> That’s easy to do and would address the immediate problem.
I bet we could switch it to use guile-cairo. Also, is guile-png too low
level?
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3
debbugs is to open or close bugs; I
do not know how to look at user tags, or any other tags, in debbugs,
although I would guess that it might be possible from the web frontend.
Similarly, I don't know if a bug has been closed by someone else, I just
assume it to be so when a patch is applied
avoid the trap of the perfect-as-the-first-try.
>
>
> Well, let recover from these awesome Guix Days and from FOSDEM and then
> resume this proposal.
>
> Cheers,
> simon
>
> 1: https://guix.gnu.org/manual/devel/en/guix.html#Reviewing-the-Work-of-Others
>
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
a remote `git annex addurl https://path/to/the/video`
and it'll just be available in the repo.
¹ https://github.com/RichiH/conference_proceedings
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
8833nmrml4b823irf954h-bootstrap-binaries-0/bin/tar"
> ...]
>
> guix/build/utils.scm:816:6: In procedure invoke:
> guix/build/utils.scm:816:6: Throw to key `srfi-34' with args `(# &invoke-error [program:
> "/gnu/store/sb4x78r4d5l8833nmrml4b823irf954h-bootstrap-binaries-0/bin/tar"
> arguments: ("cvfa"
> "/gnu/store/wflsiizcin3s61qyjw4flkdg2s8mg3vz-make-4.4.1.tar.zst" "--mtime=@1"
> "--owner=root:0" "--group=root:0" "--sort=name" "make-4.4.1") exit-status: 2
> term-signal: #f stop-signal: #f] 61b780>)'.
> builder for
> `/gnu/store/g17dphzhaw5c7lbxjr1ixvk0krrgmrr3-make-4.4.1.tar.zst.drv' failed
> with exit code 1
> @ build-failed
> /gnu/store/g17dphzhaw5c7lbxjr1ixvk0krrgmrr3-make-4.4.1.tar.zst.drv - 1
> builder for
> `/gnu/store/g17dphzhaw5c7lbxjr1ixvk0krrgmrr3-make-4.4.1.tar.zst.drv' failed
> with exit code 1
> derivation
> '/gnu/store/g17dphzhaw5c7lbxjr1ixvk0krrgmrr3-make-4.4.1.tar.zst.drv'
> offloaded to 'kluit.dezyne.org' failed: build of
> `/gnu/store/g17dphzhaw5c7lbxjr1ixvk0krrgmrr3-make-4.4.1.tar.zst.drv' failed
> build of /gnu/store/g17dphzhaw5c7lbxjr1ixvk0krrgmrr3-make-4.4.1.tar.zst.drv
> failed
> View build log at
> '/var/log/guix/drvs/g1/7dphzhaw5c7lbxjr1ixvk0krrgmrr3-make-4.4.1.tar.zst.drv.gz'.
> cannot build derivation
> `/gnu/store/zbp7rf2qm32qb2mq0w67pnn973892d3w-make-boot0-4.4.1.drv': 1
> dependencies couldn't be built
> guix build: error: build of
> `/gnu/store/zbp7rf2qm32qb2mq0w67pnn973892d3w-make-boot0-4.4.1.drv' failed
> [1]10:22:08 janneke@drakenpad:~/src/guix/core-updates
> $
> --8<---cut here---end--->8---
>
> --
> Janneke Nieuwenhuizen | GNU LilyPond https://LilyPond.org
> Freelance IT https://www.JoyOfSource.com | Avatar® https://AvatarAcademy.com
>
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
that derivation again if it's already known to fail. I don't
think there's something like '--keep-failed' for guix-daemon.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
for how the CLI stuff is organized seems
> like a good thing to me, even if it just stops or slows the addition of more
> commands with unique expressions.
>
> It seems like a lot of work to change, and backwards compatibility also is
> an issue. One option I could see working is
just the page size on
jemalloc on aarch64 to be at least 64k so that people running guix
software on apple silicon don't have issues. I think we should add it
for core-updates so it doesn't get forgotten, I've seen it come up on
IRC at least once a week.
--
Efraim Flashner
quot;)
> + (if (target-hurd?)
> + '("--enable-languages=c,c++")
> + '("--enable-languages=c,c++,objc,obj-c++"))
> + '("--disable-multilib"
>
--8<---cut here---end--->8---
>
> Just my 2 cents, I imagine every person here has their own workflow.
I'm going to suggest 'git am -3' that someone else here suggested to me.
When a patch fails to apply cleanly git will try harder and leave the
failed-to-apply bits inside the code, making it easier to clean-up the
patch than to manually apply it.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
it a warning based on
> whether or not “builtin:git-download” is available, but maybe that’s too
> early?
builtin:git-download sometimes bites me on my machines since I don't
upgrade my aarch64/riscv64 installs that often.
Also, 2018 is now about 5 years ago. It might be a good idea to
ting some cross derivations for a subset of rust packages [4].
>
> 4: https://lists.gnu.org/archive/html/guix-devel/2024-01/msg00053.html
list-all-cargo-build-system-packages is actually a script I have locally
that I should probably put in the etc/teams/rust folder. I've attache
gt;
> Let's Wish them a warm welcome!
Welcome!
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
98 entries
real0m18.215s
user0m14.492s
sys 0m0.469s
After:
time GUIX_PROFILING="object-cache" ./pre-inst-env guix build --no-grafts
$(./pre-inst-env ~/list-all-cargo-build-system-packages | grep rust- | head -n
100) --target=aarch64-linux-gnu -d
Object Cache:
fresh caches:
ably more than a week to build out to rust itself, and then the
packages which depend on it. Currently, on master, Berlin already is
running behind on building rust, and it wasn't until after the previous
mesa-updates merge that it caught up with building rust.
--
Efraim Flashner
On Thu, Jan 04, 2024 at 05:13:46AM +, John Kehayias wrote:
> Hi Efraim and guix-devel
>
> On Mon, Dec 25, 2023 at 08:44 AM, Efraim Flashner wrote:
>
> > On Fri, Dec 22, 2023 at 09:19:27AM +0200, Efraim Flashner wrote:
> >> On Thu, Dec 21, 2023 at 09:18:50PM
gt; > defines
> > > a subset of docker-cli startup arguments. The problem is that
> > > `docker
> > > run` command has 96 options and the configuration only uses a
> > > handful,
> > > lacking a way to provide the remaining ones.
> >
> >
ridden, just added/replaced.
Is there a specific version of pydantic that you need? I might be able
to put together something either using the crates in the master branch
or a newer version on the rust-team branch.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 1
'll work the way I
wrote above. I'll see about getting them into a state I'm happy with
for the rust-team branch.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be gua
On Fri, Dec 22, 2023 at 09:19:27AM +0200, Efraim Flashner wrote:
> On Thu, Dec 21, 2023 at 09:18:50PM +, John Kehayias wrote:
> > Hi all,
> >
> > On Mon, Dec 18, 2023 at 12:57 AM, John Kehayias wrote:
> >
> > > Hi Kaelyn and everyone,
> > >
&
er binary from rust:tools since we don't have a way to
deprecate packages and point them to alternate outputs.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
Bordeaux, but I don't know where to get
> a sense of that coverage. For what it is worth, Efraim has manually
> built xorgproto and mesa at least on powerpc64le, riscv64, without
> issues.
I had berlin build for powerpc64le and that went without any problems.
Locally I built for riscv64 and powe
gnu/store/fbjr5b0nfhq490x2ys1rzi7sg7rjpz95-tk-8.6.12/lib
-L/gnu/store/0scbhmjkll66vpgvgh7d77hayxgy1cc2-tcl-8.6.12/lib -ltk8.6
-ltkstub8.6 -ltcl8.6 -ltclstub8.6
I do wonder if we could substitute TCLTK_LIBS to be:
"`pkg-config --libs tcl tk`" and if that would work.
--
Efraim Flash
On Wed, Dec 13, 2023 at 10:34:11AM +0200, Efraim Flashner wrote:
> * Compiled rust packages currently have a 'package' phase, which runs
> the command used to crate a 'crate tarball', and is installed in
> %output/share/cargo/registry, with unpacked sources in
> %ou
dex,
which is likely necessary to actually make use of this. Additionally, I
am unsure how to use '$GUIX_ENVIRONMENT' in ~/.cargo/config so that it
is expanded and not taken as a literal string.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA
ger size that
would take care of most of them, but until something is setup to make it
possible I'm not sure it's possible to support them for Guix System
without also adding an OS config for the offsets for the root file
system.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3
nt package: cl-py4cl@0.0.0-2.2f2a008
cl-py4cl@0.0.0-2.2f2a008 does appear in the list
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
> list. :-)
>
> 2. Change the code to interpret extra inputs are regexps instead of
> names.
I like both ideas
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
e good to formalize some of these processes to
make it clearer about what's expected and what's going on.
Actually, in terms of suggestions, I'd add the rfc/ folder in
etc/teams.scm to set guix-devel as one of the team members.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3
we're referring to previous mails sent to that mailing list.
Alternatively, we could just get rid of it, that extra link only saves 1
click if you wanted to go and see the archives.
--
Efraim Flashner רנשלפ םירפא
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
le with a term of say 6 months to a year? Happy to
> >> provide more information and discuss here or privately; in short I'm
> >> not a security expert but have time and bandwidth to keep things
> >> moving and want to learn.
> >
> > Thank you for getting th
branch is ready to merge so soon then I think we should just
get that merged and then I'll rebase the rust-team branch on top of new
master. The rust-team branch is also ready to merge, but we're way
behind on aarch64 substitutes. Either way the substitute servers will
be rebuilding al
1 - 100 of 1018 matches
Mail list logo