From c59cc2383d6620f6ebbed80ce1feecae41a64d69 Mon Sep 17 00:00:00 2001 From: Ludovic Courtès Date: Sun, 18 Apr 2021 15:37:20 +0200 Subject: import: Remove Nix importer. This importer has suffered from bitrot and no longer works with current Nix and Nixpkgs. See and . * guix/import/snix.scm, guix/scripts/import/nix.scm, tests/snix.scm: Remove. * Makefile.am (MODULES, SCM_TESTS): Remove them. * guix/scripts/import.scm (importers): Remove "nix". * build-aux/test-env.in: Remove NIXPKGS variable. * configure.ac: Remove '--with-nixpkgs' option. * doc/guix.texi (Invoking guix import): Remove bit about "guix import nix". * etc/completion/fish/guix.fish: Likewise. --- doc/guix.texi | 30 ------------------------------ 1 file changed, 30 deletions(-) (limited to 'doc') diff --git a/doc/guix.texi b/doc/guix.texi index 58bcfbdbb5..2fe7ad3a2a 100644 --- a/doc/guix.texi +++ b/doc/guix.texi @@ -11417,36 +11417,6 @@ and outputs a package expression: guix import json hello.json @end example -@item nix -Import metadata from a local copy of the source of the -@uref{https://nixos.org/nixpkgs/, Nixpkgs distribution}@footnote{This -relies on the @command{nix-instantiate} command of -@uref{https://nixos.org/nix/, Nix}.}. Package definitions in Nixpkgs are -typically written in a mixture of Nix-language and Bash code. This -command only imports the high-level package structure that is written in -the Nix language. It normally includes all the basic fields of a -package definition. - -When importing a GNU package, the synopsis and descriptions are replaced -by their canonical upstream variant. - -Usually, you will first need to do: - -@example -export NIX_REMOTE=daemon -@end example - -@noindent -so that @command{nix-instantiate} does not try to open the Nix database. - -As an example, the command below imports the package definition of -LibreOffice (more precisely, it imports the definition of the package -bound to the @code{libreoffice} top-level attribute): - -@example -guix import nix ~/path/to/nixpkgs libreoffice -@end example - @item hackage @cindex hackage Import metadata from the Haskell community's central package archive -- cgit v1.2.3 From f06685a98594488dd5be2085cc8a10c295873179 Mon Sep 17 00:00:00 2001 From: Julien Lepiller Date: Sat, 24 Apr 2021 14:58:12 +0200 Subject: doc: Fix cross-reference URL to translated manual. * doc/htmlxref.cnf: Fix translated manual URL. --- doc/htmlxref.cnf | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) (limited to 'doc') diff --git a/doc/htmlxref.cnf b/doc/htmlxref.cnf index 960f0f08fe..c1589453ed 100644 --- a/doc/htmlxref.cnf +++ b/doc/htmlxref.cnf @@ -397,15 +397,15 @@ guile-gtk node ${GS}/guile-gtk/docs/guile-gtk/ guile-rpc mono ${GS}/guile-rpc/manual/guile-rpc.html guile-rpc node ${GS}/guile-rpc/manual/html_node/ -guix.de mono ${GS}/guix/manual/de/guix.html +guix.de mono ${GS}/guix/manual/de/guix.de.html guix.de node ${GS}/guix/manual/de/html_node/ -guix.es mono ${GS}/guix/manual/es/guix.html +guix.es mono ${GS}/guix/manual/es/guix.es.html guix.es node ${GS}/guix/manual/es/html_node/ -guix.fr mono ${GS}/guix/manual/fr/guix.html +guix.fr mono ${GS}/guix/manual/fr/guix.fr.html guix.fr node ${GS}/guix/manual/fr/html_node/ -guix.ru mono ${GS}/guix/manual/ru/guix.html +guix.ru mono ${GS}/guix/manual/ru/guix.ru.html guix.ru node ${GS}/guix/manual/ru/html_node/ -guix.zh_CN mono ${GS}/guix/manual/zh-cn/guix.html +guix.zh_CN mono ${GS}/guix/manual/zh-cn/guix.zh_CN.html guix.zh_CN node ${GS}/guix/manual/zh-cn/html_node/ guix mono ${GS}/guix/manual/en/guix.html guix node ${GS}/guix/manual/en/html_node/ -- cgit v1.2.3 From 10cf742cbc8c887cfd370ceeeb36c9c5c05c33d0 Mon Sep 17 00:00:00 2001 From: Maxim Cournoyer Date: Mon, 3 May 2021 09:47:47 -0400 Subject: doc: Update the URL of the system VM image. This is a follow up to commit ebf5d77eab, which added the qcow2 file extension to the VM image file name. * doc/guix.texi (Running Guix in a VM): Update URL. --- doc/guix.texi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'doc') diff --git a/doc/guix.texi b/doc/guix.texi index 2fe7ad3a2a..e23e831676 100644 --- a/doc/guix.texi +++ b/doc/guix.texi @@ -33515,7 +33515,7 @@ Whether or not the droplet should be created with IPv6 networking. @cindex virtual machine To run Guix in a virtual machine (VM), one can use the pre-built Guix VM image distributed at -@url{@value{BASE-URL}/guix-system-vm-image-@value{VERSION}.x86_64-linux.xz}. +@url{@value{BASE-URL}/guix-system-vm-image-@value{VERSION}.x86_64-linux.qcow2.xz}. This image is a compressed image in QCOW format. You will first need to decompress with @command{xz -d}, and then you can pass it to an emulator such as QEMU (see below for details). -- cgit v1.2.3 From 66072a00d78270fb363866438087066e0910add4 Mon Sep 17 00:00:00 2001 From: Julien Lepiller Date: Mon, 3 May 2021 12:35:55 -0400 Subject: nls: Guard against the list of translated Texinfo files becoming stale. This change is so that the list of translated Texinfo files remain in sync with the list of supported (translated) languages. * doc/local.mk (MANUAL_LANGUAGES, COOKBOOK_LANGUAGES): New variables. (lang_to_texinfos): New function. (TRANSLATED_INFO): Use it to construct the list of files. Modified-by: Maxim Cournoyer Signed-off-by: Maxim Cournoyer --- doc/local.mk | 28 +++++++++++++++------------- 1 file changed, 15 insertions(+), 13 deletions(-) (limited to 'doc') diff --git a/doc/local.mk b/doc/local.mk index 70e102bdef..34321d6656 100644 --- a/doc/local.mk +++ b/doc/local.mk @@ -4,7 +4,7 @@ # Copyright © 2013 Andreas Enge # Copyright © 2016 Taylan Ulrich Bayırlı/Kammer # Copyright © 2016, 2018 Mathieu Lirzin -# Copyright © 2018 Julien Lepiller +# Copyright © 2018, 2021 Julien Lepiller # # This file is part of GNU Guix. # @@ -21,6 +21,16 @@ # You should have received a copy of the GNU General Public License # along with GNU Guix. If not, see . +# If adding a language, update the following variables, and info_TEXINFOS. +MANUAL_LANGUAGES = de es fa fr it ko pt_BR ru sk zh_CN +COOKBOOK_LANGUAGES = de fa fr ko zh_Hans + +# Arg1: A list of languages codes. +# Arg2: The file name stem. +lang_to_texinfo = $(foreach lang,$(1),%D%/$(2).$(lang).texi) + +# Automake does not understand GNU Make non-standard extensions, +# unfortunately, so we cannot use the above patsubst-based function here. info_TEXINFOS = %D%/guix.texi \ %D%/guix.de.texi \ %D%/guix.es.texi \ @@ -70,18 +80,10 @@ OS_CONFIG_EXAMPLES_TEXI = \ %D%/os-config-desktop.texi \ %D%/os-config-lightweight-desktop.texi -TRANSLATED_INFO = \ - %D%/guix.de.texi \ - %D%/guix.es.texi \ - %D%/guix.fr.texi \ - %D%/guix.ru.texi \ - %D%/guix.zh_CN.texi \ - %D%/contributing.de.texi \ - %D%/contributing.es.texi \ - %D%/contributing.fr.texi \ - %D%/contributing.ru.texi \ - %D%/contributing.zh_CN.texi \ - %D%/guix-cookbook.de.texi +TRANSLATED_INFO = \ + $(call lang_to_texinfo,$(MANUAL_LANGUAGES),guix) \ + $(call lang_to_texinfo,$(MANUAL_LANGUAGES),contributing) \ + $(call lang_to_texinfo,$(COOKBOOK_LANGUAGES),guix-cookbook) # Bundle this file so that makeinfo finds it in out-of-source-tree builds. BUILT_SOURCES += $(OS_CONFIG_EXAMPLES_TEXI) $(TRANSLATED_INFO) -- cgit v1.2.3 From 82c0f34c7e62366c415470a3fe1a6a0c46e3d946 Mon Sep 17 00:00:00 2001 From: Ludovic Courtès Date: Sun, 2 May 2021 23:16:48 +0200 Subject: maint: Do not xz-compress ISO images. The xz-compressed image is 23% smaller than the original ISO image (with built-in zlib compression), but the extra decompression step is unconventional and often a hindrance for users. See discussion at . * Makefile.am (release): Do not compress ISO images. * doc/guix.texi (USB Stick and DVD Installation): Remove ".xz" suffix from URL and file name. (Copying to a USB Stick, Burning on a DVD): Remove introductory words, @enumerate, and first item. Signed-off-by: Maxim Cournoyer --- Makefile.am | 6 +++--- doc/guix.texi | 30 +++--------------------------- 2 files changed, 6 insertions(+), 30 deletions(-) (limited to 'doc') diff --git a/Makefile.am b/Makefile.am index de32a0a42b..0a4bb13e5b 100644 --- a/Makefile.am +++ b/Makefile.am @@ -886,9 +886,9 @@ release: dist-with-updated-version all echo "failed to produced Guix installation image for $$system" >&2 ; \ exit 1 ; \ fi ; \ - xz < "$$image" > "$(releasedir)/$(GUIX_SYSTEM_IMAGE_BASE).$$system.iso.xz.tmp" ; \ - mv "$(releasedir)/$(GUIX_SYSTEM_IMAGE_BASE).$$system.iso.xz.tmp" \ - "$(releasedir)/$(GUIX_SYSTEM_IMAGE_BASE).$$system.iso.xz" ; \ + cp "$$image" "$(releasedir)/$(GUIX_SYSTEM_IMAGE_BASE).$$system.iso.tmp" ; \ + mv "$(releasedir)/$(GUIX_SYSTEM_IMAGE_BASE).$$system.iso.tmp" \ + "$(releasedir)/$(GUIX_SYSTEM_IMAGE_BASE).$$system.iso" ; \ done # Generate the VM images. for system in $(GUIX_SYSTEM_VM_SYSTEMS) ; do \ diff --git a/doc/guix.texi b/doc/guix.texi index e23e831676..ff592ce364 100644 --- a/doc/guix.texi +++ b/doc/guix.texi @@ -2099,7 +2099,7 @@ about their support in GNU/Linux. An ISO-9660 installation image that can be written to a USB stick or burnt to a DVD can be downloaded from -@indicateurl{@value{BASE-URL}/guix-system-install-@value{VERSION}.x86_64-linux.iso.xz}, +@indicateurl{@value{BASE-URL}/guix-system-install-@value{VERSION}.x86_64-linux.iso}, where you can replace @code{x86_64-linux} with one of: @table @code @@ -2115,8 +2115,8 @@ Make sure to download the associated @file{.sig} file and to verify the authenticity of the image against it, along these lines: @example -$ wget @value{BASE-URL}/guix-system-install-@value{VERSION}.x86_64-linux.iso.xz.sig -$ gpg --verify guix-system-install-@value{VERSION}.x86_64-linux.iso.xz.sig +$ wget @value{BASE-URL}/guix-system-install-@value{VERSION}.x86_64-linux.iso.sig +$ gpg --verify guix-system-install-@value{VERSION}.x86_64-linux.iso.sig @end example If that command fails because you do not have the required public key, @@ -2140,17 +2140,6 @@ It is meant to be copied @emph{as is} to a large-enough USB stick or DVD. @unnumberedsubsec Copying to a USB Stick -To copy the image to a USB stick, follow these steps: - -@enumerate -@item -Decompress the image using the @command{xz} command: - -@example -xz -d guix-system-install-@value{VERSION}.x86_64-linux.iso.xz -@end example - -@item Insert a USB stick of 1@tie{}GiB or more into your machine, and determine its device name. Assuming that the USB stick is known as @file{/dev/sdX}, copy the image with: @@ -2161,21 +2150,9 @@ sync @end example Access to @file{/dev/sdX} usually requires root privileges. -@end enumerate @unnumberedsubsec Burning on a DVD -To copy the image to a DVD, follow these steps: - -@enumerate -@item -Decompress the image using the @command{xz} command: - -@example -xz -d guix-system-install-@value{VERSION}.x86_64-linux.iso.xz -@end example - -@item Insert a blank DVD into your machine, and determine its device name. Assuming that the DVD drive is known as @file{/dev/srX}, copy the image with: @@ -2185,7 +2162,6 @@ growisofs -dvd-compat -Z /dev/srX=guix-system-install-@value{VERSION}.x86_64-lin @end example Access to @file{/dev/srX} usually requires root privileges. -@end enumerate @unnumberedsubsec Booting -- cgit v1.2.3 From 0f583f60f882d74f4cf2332c85343a2db67410c7 Mon Sep 17 00:00:00 2001 From: Maxim Cournoyer Date: Sat, 1 May 2021 22:35:09 -0400 Subject: doc: Update to cover for an additional OpenPGP signing key. The upcoming 1.3.0 release will be signed with my OpenPGP key; subsequent releases may also be. * doc/guix.texi (OPENPGP-SIGNING-KEY-ID, OPENPGP-SIGNING-KEY-URL): Rename to... (OPENPGP-SIGNING-KEY-ID-1, OPENPGP-SIGNING-KEY-URL-1): ... these, respectively. (OPENPGP-SIGNING-KEY-ID-2, OPENPGP-SIGNING-KEY-URL-2): New variables. (Binary Installation): Adjust to cover for the new key. (USB Stick and DVD Installation): Likewise. (Invoking guix refresh): Adjust accordingly. --- doc/guix.texi | 18 ++++++++++++------ 1 file changed, 12 insertions(+), 6 deletions(-) (limited to 'doc') diff --git a/doc/guix.texi b/doc/guix.texi index ff592ce364..5cb7c2bb96 100644 --- a/doc/guix.texi +++ b/doc/guix.texi @@ -9,9 +9,11 @@ @include version.texi -@c Identifier of the OpenPGP key used to sign tarballs and such. -@set OPENPGP-SIGNING-KEY-ID 3CE464558A84FDC69DB40CFB090B11993D9AEBB5 -@set OPENPGP-SIGNING-KEY-URL https://sv.gnu.org/people/viewgpg.php?user_id=15145 +@c Identifier of the OpenPGP keys used to sign tarballs and such. +@set OPENPGP-SIGNING-KEY-ID-1 3CE464558A84FDC69DB40CFB090B11993D9AEBB5 @c ludo +@set OPENPGP-SIGNING-KEY-URL-1 https://sv.gnu.org/people/viewgpg.php?user_id=15145 +@set OPENPGP-SIGNING-KEY-ID-2 27D586A4F8900854329FF09F1260E46482E63562 @c maxim +@set OPENPGP-SIGNING-KEY-URL-2 https://sv.gnu.org/people/viewgpg.php?user_id=127547 @c Base URL for downloads. @set BASE-URL https://ftp.gnu.org/gnu/guix @@ -653,7 +655,9 @@ If that command fails because you do not have the required public key, then run this command to import it: @example -$ wget '@value{OPENPGP-SIGNING-KEY-URL}' \ +$ wget '@value{OPENPGP-SIGNING-KEY-URL-1}' \ + -qO - | gpg --import - +$ wget '@value{OPENPGP-SIGNING-KEY-URL-2}' \ -qO - | gpg --import - @end example @@ -2123,7 +2127,9 @@ If that command fails because you do not have the required public key, then run this command to import it: @example -$ wget @value{OPENPGP-SIGNING-KEY-URL} \ +$ wget @value{OPENPGP-SIGNING-KEY-URL-1} \ + -qO - | gpg --import - +$ wget @value{OPENPGP-SIGNING-KEY-URL-2} \ -qO - | gpg --import - @end example @@ -11888,7 +11894,7 @@ Likewise, you can fetch keys to a specific keybox file like this: @example gpg --no-default-keyring --keyring mykeyring.kbx \ - --recv-keys @value{OPENPGP-SIGNING-KEY-ID} + --recv-keys @value{OPENPGP-SIGNING-KEY-ID-1} @end example @xref{GPG Configuration Options, @option{--keyring},, gnupg, Using the GNU -- cgit v1.2.3 From f40b0fa8e686c64196ae3e4fa9eca32a1ffce9c6 Mon Sep 17 00:00:00 2001 From: Maxim Cournoyer Date: Wed, 5 May 2021 11:25:24 -0400 Subject: Revert "doc: Update to cover for an additional OpenPGP signing key." This reverts commit b9fb13b28437a254683273094f189396a6e1421d. Per discussions simply updating OPENPGP-SIGNING-KEY-ID and OPENPGP-SIGNING-KEY-URL will be enough. --- doc/guix.texi | 18 ++++++------------ 1 file changed, 6 insertions(+), 12 deletions(-) (limited to 'doc') diff --git a/doc/guix.texi b/doc/guix.texi index 5cb7c2bb96..ff592ce364 100644 --- a/doc/guix.texi +++ b/doc/guix.texi @@ -9,11 +9,9 @@ @include version.texi -@c Identifier of the OpenPGP keys used to sign tarballs and such. -@set OPENPGP-SIGNING-KEY-ID-1 3CE464558A84FDC69DB40CFB090B11993D9AEBB5 @c ludo -@set OPENPGP-SIGNING-KEY-URL-1 https://sv.gnu.org/people/viewgpg.php?user_id=15145 -@set OPENPGP-SIGNING-KEY-ID-2 27D586A4F8900854329FF09F1260E46482E63562 @c maxim -@set OPENPGP-SIGNING-KEY-URL-2 https://sv.gnu.org/people/viewgpg.php?user_id=127547 +@c Identifier of the OpenPGP key used to sign tarballs and such. +@set OPENPGP-SIGNING-KEY-ID 3CE464558A84FDC69DB40CFB090B11993D9AEBB5 +@set OPENPGP-SIGNING-KEY-URL https://sv.gnu.org/people/viewgpg.php?user_id=15145 @c Base URL for downloads. @set BASE-URL https://ftp.gnu.org/gnu/guix @@ -655,9 +653,7 @@ If that command fails because you do not have the required public key, then run this command to import it: @example -$ wget '@value{OPENPGP-SIGNING-KEY-URL-1}' \ - -qO - | gpg --import - -$ wget '@value{OPENPGP-SIGNING-KEY-URL-2}' \ +$ wget '@value{OPENPGP-SIGNING-KEY-URL}' \ -qO - | gpg --import - @end example @@ -2127,9 +2123,7 @@ If that command fails because you do not have the required public key, then run this command to import it: @example -$ wget @value{OPENPGP-SIGNING-KEY-URL-1} \ - -qO - | gpg --import - -$ wget @value{OPENPGP-SIGNING-KEY-URL-2} \ +$ wget @value{OPENPGP-SIGNING-KEY-URL} \ -qO - | gpg --import - @end example @@ -11894,7 +11888,7 @@ Likewise, you can fetch keys to a specific keybox file like this: @example gpg --no-default-keyring --keyring mykeyring.kbx \ - --recv-keys @value{OPENPGP-SIGNING-KEY-ID-1} + --recv-keys @value{OPENPGP-SIGNING-KEY-ID} @end example @xref{GPG Configuration Options, @option{--keyring},, gnupg, Using the GNU -- cgit v1.2.3 From ace67239467fe3325f4ae2b6e11f02c23090db8a Mon Sep 17 00:00:00 2001 From: Maxim Cournoyer Date: Wed, 5 May 2021 11:26:26 -0400 Subject: doc: Update the OpenPGP key used to sign the release. It was discussed on guix-devel that the manual only needs to have correct instructions for the latest release. * doc/guix.texi (OPENPGP-SIGNING-KEY-ID): Update to my public OpenPGP key. (OPENPGP-SIGNING-KEY-URL): Adjust URL. --- doc/guix.texi | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'doc') diff --git a/doc/guix.texi b/doc/guix.texi index ff592ce364..7f54ddfb3c 100644 --- a/doc/guix.texi +++ b/doc/guix.texi @@ -10,8 +10,8 @@ @include version.texi @c Identifier of the OpenPGP key used to sign tarballs and such. -@set OPENPGP-SIGNING-KEY-ID 3CE464558A84FDC69DB40CFB090B11993D9AEBB5 -@set OPENPGP-SIGNING-KEY-URL https://sv.gnu.org/people/viewgpg.php?user_id=15145 +@set OPENPGP-SIGNING-KEY-ID 27D586A4F8900854329FF09F1260E46482E63562 +@set OPENPGP-SIGNING-KEY-URL https://sv.gnu.org/people/viewgpg.php?user_id=127547 @c Base URL for downloads. @set BASE-URL https://ftp.gnu.org/gnu/guix -- cgit v1.2.3 From b1b41a23f4e48e35bafe282029190bba32cb7218 Mon Sep 17 00:00:00 2001 From: Maxim Cournoyer Date: Wed, 5 May 2021 15:18:05 -0400 Subject: build: Do not compress the (already compressed) VM qcow2 images. The qcow2 format supports compression, and the qcow2 type supported by 'guix system image' produces compressed qcow2 images. * Makefile.am (release): Do not re-compress the qcow2 VM images with xz. * doc/guix.texi (Running Guix in a VM): Adjust VM image URL. --- Makefile.am | 4 +--- doc/guix.texi | 2 +- 2 files changed, 2 insertions(+), 4 deletions(-) (limited to 'doc') diff --git a/Makefile.am b/Makefile.am index c6028c586a..d06e1779ca 100644 --- a/Makefile.am +++ b/Makefile.am @@ -900,9 +900,7 @@ release: dist-with-updated-version all echo "failed to produced Guix VM image for $$system" >&2 ; \ exit 1 ; \ fi ; \ - xz < "$$image" > "$(releasedir)/$(GUIX_SYSTEM_VM_IMAGE_BASE).$$system.qcow2.xz.tmp" ; \ - mv "$(releasedir)/$(GUIX_SYSTEM_VM_IMAGE_BASE).$$system.qcow2.xz.tmp" \ - "$(releasedir)/$(GUIX_SYSTEM_VM_IMAGE_BASE).$$system.qcow2.xz" ; \ + cp "$$image" "$(releasedir)/$(GUIX_SYSTEM_VM_IMAGE_BASE).$$system.qcow2"; \ done @echo @echo "Congratulations! All the release files are now in $(releasedir)." diff --git a/doc/guix.texi b/doc/guix.texi index 7f54ddfb3c..9beef61c94 100644 --- a/doc/guix.texi +++ b/doc/guix.texi @@ -33491,7 +33491,7 @@ Whether or not the droplet should be created with IPv6 networking. @cindex virtual machine To run Guix in a virtual machine (VM), one can use the pre-built Guix VM image distributed at -@url{@value{BASE-URL}/guix-system-vm-image-@value{VERSION}.x86_64-linux.qcow2.xz}. +@url{@value{BASE-URL}/guix-system-vm-image-@value{VERSION}.x86_64-linux.qcow2}. This image is a compressed image in QCOW format. You will first need to decompress with @command{xz -d}, and then you can pass it to an emulator such as QEMU (see below for details). -- cgit v1.2.3