Ludovic Courtès writes: > Hi Marius, > > Marius Bakke skribis: > >> Ludovic Courtès writes: >> >>> Hello, >>> >>> Ludovic Courtès skribis: >>> >>>> cve: Rewrite to read the JSON feed instead of the XML feed. >>>> lint: Re-enable CVE checker. >>> >>> Pushed as 9efa2c28a4f842b7ca1977e084299de441842856. >>> >>> Please let me know if you notice anything fishy with ‘guix lint -c cve’: >>> CVEs not showing up, CVEs showing up that should not, etc. >> >> Here is what I get (on ee42e9f9f): >> >> $ ./pre-inst-env guix lint -c cve ao >> fetching CVE database for 2019...]... >> Backtrace: >> 11 (apply-smob/1 #) >> In ice-9/boot-9.scm: >> 705:2 10 (call-with-prompt _ _ #) >> In ice-9/eval.scm: >> 619:8 9 (_ #(#(#))) >> In guix/ui.scm: >> 1730:12 8 (run-guix-command _ . _) >> In srfi/srfi-1.scm: >> 640:9 7 (for-each # ("ao")) >> In guix/scripts/lint.scm: >> 57:4 6 (run-checkers _ _) >> In srfi/srfi-1.scm: >> 640:9 5 (for-each # (#< name: c…>)) >> In guix/scripts/lint.scm: >> 64:17 4 (_ _) >> In guix/lint.scm: >> 999:4 3 (check-vulnerabilities _) >> 994:9 2 (_ _) >> In unknown file: >> 1 (force #>) >> In guix/lint.scm: >> 983:24 0 (_) >> >> guix/lint.scm:983:24: Throw to key `srfi-34' with args `(#)'. >> >> I tried downloading the .json.gz files manually and they seem fine. > > I don’t encounter this problem. Is it reproducible for you? I still get this when using './pre-inst-env', even after a 'make clean-go'. It works without the './pre-inst-env script'(!?).