unofficial mirror of bug-guix@gnu.org 
 help / color / mirror / code / Atom feed
* bug#48240: “guix copy” to host with daemon listening on TCP fails
@ 2021-05-05 16:04 Ricardo Wurmus
  2021-05-05 21:32 ` bug#48240: [PATCH 1/4] store: 'open-connection' never returns #f Ludovic Courtès
                   ` (2 more replies)
  0 siblings, 3 replies; 14+ messages in thread
From: Ricardo Wurmus @ 2021-05-05 16:04 UTC (permalink / raw)
  To: 48240

There are two hosts running Guix.  The target host runs 
“guix-daemon” with “--listen=0.0.0.0:9999”; it does not listen on 
a local socket file.  Trying to copy store items to the target 
host fails with this backtrace:

--8<---------------cut here---------------start------------->8---
[me@here:~] (1028) $ guix copy --to=there /gnu/store/…-profile
Backtrace:
          12 (primitive-load 
          "/gnu/store/9qjkzhlwj2792iczsyfx9n7c23g…")
In guix/ui.scm:
  2165:12 11 (run-guix-command _ . _)
In ice-9/boot-9.scm:
  1736:10 10 (with-exception-handler _ _ #:unwind? _ # _)
  1731:15  9 (with-exception-handler #<procedure 7fa3ef9d0150 at 
  ic…> …)
  1736:10  8 (with-exception-handler _ _ #:unwind? _ # _)
In guix/store.scm:
   636:37  7 (thunk)
   1305:8  6 (call-with-build-handler _ _)
   1305:8  5 (call-with-build-handler #<procedure 7fa3ef9db5d0 at 
   g…> …)
In guix/status.scm:
    799:4  4 (call-with-status-report _ _)
In guix/scripts/copy.scm:
    76:25  3 (_)
In guix/ssh.scm:
   485:39  2 (send-files #<store-connection 256.99 7fa3ef9d6f00> _ 
   #f …)
In ice-9/boot-9.scm:
  1669:16  1 (raise-exception _ #:continuable? _)
  1669:16  0 (raise-exception _ #:continuable? _)

ice-9/boot-9.scm:1669:16: In procedure raise-exception:
In procedure struct-vtable: Wrong type argument in position 1 
(expecting struct): #f
--8<---------------cut here---------------end--------------->8---

The (guix ssh) appears to assume that the remote daemon listens on 
a socket file.  Telling the daemon to also listen on a socket file 
works around this problem<.

-- 
Ricardo




^ permalink raw reply	[flat|nested] 14+ messages in thread

* bug#48240: [PATCH 1/4] store: 'open-connection' never returns #f.
  2021-05-05 16:04 bug#48240: “guix copy” to host with daemon listening on TCP fails Ricardo Wurmus
@ 2021-05-05 21:32 ` Ludovic Courtès
  2021-05-05 21:32   ` bug#48240: [PATCH 2/4] ssh: 'connect-to-remote-daemon' raises a nicer message upon error Ludovic Courtès
                     ` (2 more replies)
  2021-05-08 13:10 ` bug#48240: “guix copy” to host with daemon listening on TCP fails Ludovic Courtès
  2021-05-11  8:43 ` bug#48240: “guix_ " Simon Streit
  2 siblings, 3 replies; 14+ messages in thread
From: Ludovic Courtès @ 2021-05-05 21:32 UTC (permalink / raw)
  To: 48240

* guix/store.scm (open-connection)[handshake-error]: New procedure.
Call it in code paths that would previously return #f.
---
 guix/store.scm | 66 +++++++++++++++++++++++++++-----------------------
 1 file changed, 36 insertions(+), 30 deletions(-)

diff --git a/guix/store.scm b/guix/store.scm
index 37ae6cfedd..315ae4cdce 100644
--- a/guix/store.scm
+++ b/guix/store.scm
@@ -548,13 +548,16 @@ space on the file system so that the garbage collector can still operate,
 should the disk become full.  When CPU-AFFINITY is true, it must be an integer
 corresponding to an OS-level CPU number to which the daemon's worker process
 for this connection will be pinned.  Return a server object."
+  (define (handshake-error)
+    (raise (condition
+            (&store-connection-error (file (or port uri))
+                                     (errno EPROTO))
+            (&message (message "build daemon handshake failed")))))
+
   (guard (c ((nar-error? c)
              ;; One of the 'write-' or 'read-' calls below failed, but this is
              ;; really a connection error.
-             (raise (condition
-                     (&store-connection-error (file (or port uri))
-                                              (errno EPROTO))
-                     (&message (message "build daemon handshake failed"))))))
+             (handshake-error)))
     (let*-values (((port)
                    (or port (connect-to-daemon uri)))
                   ((output flush)
@@ -562,32 +565,35 @@ for this connection will be pinned.  Return a server object."
                                           (make-bytevector 8192))))
       (write-int %worker-magic-1 port)
       (let ((r (read-int port)))
-        (and (= r %worker-magic-2)
-             (let ((v (read-int port)))
-               (and (= (protocol-major %protocol-version)
-                       (protocol-major v))
-                    (begin
-                      (write-int %protocol-version port)
-                      (when (>= (protocol-minor v) 14)
-                        (write-int (if cpu-affinity 1 0) port)
-                        (when cpu-affinity
-                          (write-int cpu-affinity port)))
-                      (when (>= (protocol-minor v) 11)
-                        (write-int (if reserve-space? 1 0) port))
-                      (letrec* ((built-in-builders
-                                 (delay (%built-in-builders conn)))
-                                (conn
-                                 (%make-store-connection port
-                                                         (protocol-major v)
-                                                         (protocol-minor v)
-                                                         output flush
-                                                         (make-hash-table 100)
-                                                         (make-hash-table 100)
-                                                         vlist-null
-                                                         built-in-builders)))
-                        (let loop ((done? (process-stderr conn)))
-                          (or done? (process-stderr conn)))
-                        conn)))))))))
+        (unless (= r %worker-magic-2)
+          (handshake-error))
+
+        (let ((v (read-int port)))
+          (unless (= (protocol-major %protocol-version)
+                     (protocol-major v))
+            (handshake-error))
+
+          (write-int %protocol-version port)
+          (when (>= (protocol-minor v) 14)
+            (write-int (if cpu-affinity 1 0) port)
+            (when cpu-affinity
+              (write-int cpu-affinity port)))
+          (when (>= (protocol-minor v) 11)
+            (write-int (if reserve-space? 1 0) port))
+          (letrec* ((built-in-builders
+                     (delay (%built-in-builders conn)))
+                    (conn
+                     (%make-store-connection port
+                                             (protocol-major v)
+                                             (protocol-minor v)
+                                             output flush
+                                             (make-hash-table 100)
+                                             (make-hash-table 100)
+                                             vlist-null
+                                             built-in-builders)))
+            (let loop ((done? (process-stderr conn)))
+              (or done? (process-stderr conn)))
+            conn))))))
 
 (define* (port->connection port
                            #:key (version %protocol-version))
-- 
2.31.1





^ permalink raw reply related	[flat|nested] 14+ messages in thread

* bug#48240: [PATCH 2/4] ssh: 'connect-to-remote-daemon' raises a nicer message upon error.
  2021-05-05 21:32 ` bug#48240: [PATCH 1/4] store: 'open-connection' never returns #f Ludovic Courtès
@ 2021-05-05 21:32   ` Ludovic Courtès
  2021-05-05 21:32   ` bug#48240: [PATCH 3/4] store: Export 'connect-to-daemon' Ludovic Courtès
  2021-05-05 21:32   ` bug#48240: [PATCH 4/4] ssh: Honor GUIX_DAEMON_SOCKET on the target machine Ludovic Courtès
  2 siblings, 0 replies; 14+ messages in thread
From: Ludovic Courtès @ 2021-05-05 21:32 UTC (permalink / raw)
  To: 48240

* guix/ssh.scm (connect-to-remote-daemon): Catch
'store-connection-error?' and rethrow.
---
 guix/ssh.scm | 9 +++++++--
 1 file changed, 7 insertions(+), 2 deletions(-)

diff --git a/guix/ssh.scm b/guix/ssh.scm
index 457d1890f9..b39b90f733 100644
--- a/guix/ssh.scm
+++ b/guix/ssh.scm
@@ -302,8 +302,13 @@ EXP never returns or calls 'primitive-exit' when it's done."
                                     "/var/guix/daemon-socket/socket"))
   "Connect to the remote build daemon listening on SOCKET-NAME over SESSION,
 an SSH session.  Return a <store-connection> object."
-  (open-connection #:port (remote-daemon-channel session socket-name)))
-
+  (guard (c ((store-connection-error? c)
+             ;; Raise a more focused error condition.
+             (raise (formatted-message
+                     (G_ "failed to connect over SSH to daemon at '~a', socket ~a")
+                     (session-get session 'host)
+                     socket-name))))
+    (open-connection #:port (remote-daemon-channel session socket-name))))
 
 (define (store-import-channel session)
   "Return an output port to which archives to be exported to SESSION's store
-- 
2.31.1





^ permalink raw reply related	[flat|nested] 14+ messages in thread

* bug#48240: [PATCH 3/4] store: Export 'connect-to-daemon'.
  2021-05-05 21:32 ` bug#48240: [PATCH 1/4] store: 'open-connection' never returns #f Ludovic Courtès
  2021-05-05 21:32   ` bug#48240: [PATCH 2/4] ssh: 'connect-to-remote-daemon' raises a nicer message upon error Ludovic Courtès
@ 2021-05-05 21:32   ` Ludovic Courtès
  2021-05-05 21:32   ` bug#48240: [PATCH 4/4] ssh: Honor GUIX_DAEMON_SOCKET on the target machine Ludovic Courtès
  2 siblings, 0 replies; 14+ messages in thread
From: Ludovic Courtès @ 2021-05-05 21:32 UTC (permalink / raw)
  To: 48240

* guix/store.scm (connect-to-daemon): Make public.  Improve docstring.
---
 guix/store.scm | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/guix/store.scm b/guix/store.scm
index 315ae4cdce..9d706ae590 100644
--- a/guix/store.scm
+++ b/guix/store.scm
@@ -90,6 +90,7 @@
             hash-algo
             build-mode
 
+            connect-to-daemon
             open-connection
             port->connection
             close-connection
@@ -501,7 +502,10 @@
 
 (define (connect-to-daemon uri)
   "Connect to the daemon at URI, a string that may be an actual URI or a file
-name."
+name, and return an input/output port.
+
+This is a low-level procedure that does not perform the initial handshake with
+the daemon.  Use 'open-connection' for that."
   (define (not-supported)
     (raise (condition (&store-connection-error
                        (file uri)
-- 
2.31.1





^ permalink raw reply related	[flat|nested] 14+ messages in thread

* bug#48240: [PATCH 4/4] ssh: Honor GUIX_DAEMON_SOCKET on the target machine.
  2021-05-05 21:32 ` bug#48240: [PATCH 1/4] store: 'open-connection' never returns #f Ludovic Courtès
  2021-05-05 21:32   ` bug#48240: [PATCH 2/4] ssh: 'connect-to-remote-daemon' raises a nicer message upon error Ludovic Courtès
  2021-05-05 21:32   ` bug#48240: [PATCH 3/4] store: Export 'connect-to-daemon' Ludovic Courtès
@ 2021-05-05 21:32   ` Ludovic Courtès
  2 siblings, 0 replies; 14+ messages in thread
From: Ludovic Courtès @ 2021-05-05 21:32 UTC (permalink / raw)
  To: 48240

Fixes <https://bugs.gnu.org/48240>.
Reported by Ricardo Wurmus <rekado@elephly.net>.

* guix/ssh.scm (remote-daemon-channel)[redirect]: Define
'connect-to-daemon'.  Use the same-named procedure from (guix store)
when available, and honor GUIX_DAEMON_SOCKET.
---
 guix/ssh.scm | 21 +++++++++++++++++----
 1 file changed, 17 insertions(+), 4 deletions(-)

diff --git a/guix/ssh.scm b/guix/ssh.scm
index b39b90f733..77a9732ce5 100644
--- a/guix/ssh.scm
+++ b/guix/ssh.scm
@@ -1,5 +1,5 @@
 ;;; GNU Guix --- Functional package management for GNU
-;;; Copyright © 2016, 2017, 2018, 2019, 2020 Ludovic Courtès <ludo@gnu.org>
+;;; Copyright © 2016, 2017, 2018, 2019, 2020, 2021, 2021 Ludovic Courtès <ludo@gnu.org>
 ;;;
 ;;; This file is part of GNU Guix.
 ;;;
@@ -253,7 +253,22 @@ EXP never returns or calls 'primitive-exit' when it's done."
        (use-modules (ice-9 match) (rnrs io ports)
                     (rnrs bytevectors))
 
-       (let ((sock    (socket AF_UNIX SOCK_STREAM 0))
+       (define connect-to-daemon
+         ;; XXX: 'connect-to-daemon' used to be private and before that it
+         ;; didn't even exist, hence these shenanigans.
+         (let ((connect-to-daemon
+                (false-if-exception (module-ref (resolve-module '(guix store))
+                                                'connect-to-daemon))))
+           (lambda (uri)
+             (if connect-to-daemon
+                 (connect-to-daemon uri)
+                 (let ((sock (socket AF_UNIX SOCK_STREAM 0)))
+                   (connect sock AF_UNIX ,socket-name)
+                   sock)))))
+
+       ;; Use 'connect-to-daemon' to honor GUIX_DAEMON_SOCKET.
+       (let ((sock    (connect-to-daemon (or (getenv "GUIX_DAEMON_SOCKET")
+                                             socket-name)))
              (stdin   (current-input-port))
              (stdout  (current-output-port))
              (select* (lambda (read write except)
@@ -272,8 +287,6 @@ EXP never returns or calls 'primitive-exit' when it's done."
          (setvbuf stdin 'block 65536)
          (setvbuf sock 'block 65536)
 
-         (connect sock AF_UNIX ,socket-name)
-
          (let loop ()
            (match (select* (list stdin sock) '() '())
              ((reads () ())
-- 
2.31.1





^ permalink raw reply related	[flat|nested] 14+ messages in thread

* bug#48240: “guix copy” to host with daemon listening on TCP fails
  2021-05-05 16:04 bug#48240: “guix copy” to host with daemon listening on TCP fails Ricardo Wurmus
  2021-05-05 21:32 ` bug#48240: [PATCH 1/4] store: 'open-connection' never returns #f Ludovic Courtès
@ 2021-05-08 13:10 ` Ludovic Courtès
  2021-05-11  8:43 ` bug#48240: “guix_ " Simon Streit
  2 siblings, 0 replies; 14+ messages in thread
From: Ludovic Courtès @ 2021-05-08 13:10 UTC (permalink / raw)
  To: Ricardo Wurmus; +Cc: 48240-done

Hi,

Ricardo Wurmus <rekado@elephly.net> skribis:

> There are two hosts running Guix.  The target host runs 
> “guix-daemon” with “--listen=0.0.0.0:9999”; it does not listen on 
> a local socket file.  Trying to copy store items to the target 
> host fails with this backtrace:

I pushed the four patches as 3270308eebe82075d2f02517c5a2b1599928495c.

Let me know if anything’s amiss!

Thanks,
Ludo’.




^ permalink raw reply	[flat|nested] 14+ messages in thread

* bug#48240: “guix_ copy” to host with daemon listening on TCP fails
  2021-05-05 16:04 bug#48240: “guix copy” to host with daemon listening on TCP fails Ricardo Wurmus
  2021-05-05 21:32 ` bug#48240: [PATCH 1/4] store: 'open-connection' never returns #f Ludovic Courtès
  2021-05-08 13:10 ` bug#48240: “guix copy” to host with daemon listening on TCP fails Ludovic Courtès
@ 2021-05-11  8:43 ` Simon Streit
  2021-05-11  9:56   ` bug#48240: “guix " Ludovic Courtès
  2021-05-11 10:52   ` Ludovic Courtès
  2 siblings, 2 replies; 14+ messages in thread
From: Simon Streit @ 2021-05-11  8:43 UTC (permalink / raw)
  To: 48240

Hello!

After reinstalling my system last night, I run into this problem too,
that I couldn't offload.

Then it was suggested I checkout to commit
dd14678b9b9843be20e2bbb98ceb30d2433dab82 and force downgrade my new
system.  While doing so, I noticed that guix-daemon would still offload,
while if I'd type in `guix offload test`, I'd get a response:
--8<---------------cut here---------------start------------->8---
guix offload: testing 1 build machines defined in '/etc/guix/machines.scm'...
guix offload: Guix is usable on 'host' (test returned "/gnu/store/883yjkl46dxw9mzykykmbs0yzwyxm17z-test")
guix offload: 'host' is running GNU Guile 3.0.5
guix offload: error: failed to connect over SSH to daemon at 'host', socket /var/guix/daemon-socket/socket
--8<---------------cut here---------------end--------------->8---

Anyway, back to this old commit offloading works for all users. 

The commit with this broken behaviour is at:
87b4b0e4385149b40ee87ae2d57712679452746b.


Cheers
Simon




^ permalink raw reply	[flat|nested] 14+ messages in thread

* bug#48240: “guix copy” to host with daemon listening on TCP fails
  2021-05-11  8:43 ` bug#48240: “guix_ " Simon Streit
@ 2021-05-11  9:56   ` Ludovic Courtès
  2021-05-12  7:48     ` Simon Streit
  2021-05-11 10:52   ` Ludovic Courtès
  1 sibling, 1 reply; 14+ messages in thread
From: Ludovic Courtès @ 2021-05-11  9:56 UTC (permalink / raw)
  To: Simon Streit; +Cc: 48240

Hi,

Simon Streit <simon@netpanic.org> skribis:

> Then it was suggested I checkout to commit
> dd14678b9b9843be20e2bbb98ceb30d2433dab82 and force downgrade my new
> system.  While doing so, I noticed that guix-daemon would still offload,
> while if I'd type in `guix offload test`, I'd get a response:
>
> guix offload: testing 1 build machines defined in '/etc/guix/machines.scm'...
> guix offload: Guix is usable on 'host' (test returned "/gnu/store/883yjkl46dxw9mzykykmbs0yzwyxm17z-test")
> guix offload: 'host' is running GNU Guile 3.0.5
> guix offload: error: failed to connect over SSH to daemon at 'host', socket /var/guix/daemon-socket/socket
>
> Anyway, back to this old commit offloading works for all users. 

Is the socket file name displayed above correct?  Or did you specify
something else in the <build-machine> record?

Is the ‘GUIX_DAEMON_SOCKET’ environment variable defined on that
machine?

How do you run guix-daemon on the head node?  The patches discussed here
haven’t made it into the ‘guix’ package yet AFAIK.

Thanks for reporting the issue!

Ludo’.




^ permalink raw reply	[flat|nested] 14+ messages in thread

* bug#48240: “guix copy” to host with daemon listening on TCP fails
  2021-05-11  8:43 ` bug#48240: “guix_ " Simon Streit
  2021-05-11  9:56   ` bug#48240: “guix " Ludovic Courtès
@ 2021-05-11 10:52   ` Ludovic Courtès
  2021-05-11 14:01     ` Bone Baboon via Bug reports for GNU Guix
                       ` (2 more replies)
  1 sibling, 3 replies; 14+ messages in thread
From: Ludovic Courtès @ 2021-05-11 10:52 UTC (permalink / raw)
  To: Simon Streit; +Cc: 48240

Hi,

Simon Streit <simon@netpanic.org> skribis:

> Then it was suggested I checkout to commit
> dd14678b9b9843be20e2bbb98ceb30d2433dab82 and force downgrade my new
> system.  While doing so, I noticed that guix-daemon would still offload,
> while if I'd type in `guix offload test`, I'd get a response:
>
> guix offload: testing 1 build machines defined in '/etc/guix/machines.scm'...
> guix offload: Guix is usable on 'host' (test returned "/gnu/store/883yjkl46dxw9mzykykmbs0yzwyxm17z-test")
> guix offload: 'host' is running GNU Guile 3.0.5
> guix offload: error: failed to connect over SSH to daemon at 'host', socket /var/guix/daemon-socket/socket
>
> Anyway, back to this old commit offloading works for all users. 
>
> The commit with this broken behaviour is at:
> 87b4b0e4385149b40ee87ae2d57712679452746b.

Fixed in da28efef36af8925bcd9e40a81cbf552cf8c2d02.  Let me know if it
works for you!

Thanks,
Ludo’.




^ permalink raw reply	[flat|nested] 14+ messages in thread

* bug#48240: “guix copy” to host with daemon listening on TCP fails
  2021-05-11 10:52   ` Ludovic Courtès
@ 2021-05-11 14:01     ` Bone Baboon via Bug reports for GNU Guix
  2021-05-11 21:22       ` Ludovic Courtès
  2021-05-12  7:49     ` Simon Streit
  2021-05-12 19:44     ` Simon Streit
  2 siblings, 1 reply; 14+ messages in thread
From: Bone Baboon via Bug reports for GNU Guix @ 2021-05-11 14:01 UTC (permalink / raw)
  To: Ludovic Courtès; +Cc: simon, 48240

Ludovic Courtès writes:
> Fixed in da28efef36af8925bcd9e40a81cbf552cf8c2d02.  Let me know if it
> works for you!

This commit appears to have fixed a problem with guix copy that I was
having yesterday.  I was getting this error "guix copy: error: failed to
connect over SSH to daemon at '<ip-address>', socket
/var/guix/daemon-socket/socket".

Now I can successfully run guix copy.




^ permalink raw reply	[flat|nested] 14+ messages in thread

* bug#48240: “guix copy” to host with daemon listening on TCP fails
  2021-05-11 14:01     ` Bone Baboon via Bug reports for GNU Guix
@ 2021-05-11 21:22       ` Ludovic Courtès
  0 siblings, 0 replies; 14+ messages in thread
From: Ludovic Courtès @ 2021-05-11 21:22 UTC (permalink / raw)
  To: Bone Baboon; +Cc: simon, 48240

Bone Baboon <bone.baboon@disroot.org> skribis:

> Ludovic Courtès writes:
>> Fixed in da28efef36af8925bcd9e40a81cbf552cf8c2d02.  Let me know if it
>> works for you!
>
> This commit appears to have fixed a problem with guix copy that I was
> having yesterday.  I was getting this error "guix copy: error: failed to
> connect over SSH to daemon at '<ip-address>', socket
> /var/guix/daemon-socket/socket".
>
> Now I can successfully run guix copy.

Thanks for confirming!




^ permalink raw reply	[flat|nested] 14+ messages in thread

* bug#48240: “guix copy” to host with daemon listening on TCP fails
  2021-05-11  9:56   ` bug#48240: “guix " Ludovic Courtès
@ 2021-05-12  7:48     ` Simon Streit
  0 siblings, 0 replies; 14+ messages in thread
From: Simon Streit @ 2021-05-12  7:48 UTC (permalink / raw)
  To: Ludovic Courtès; +Cc: 48240

Ludovic Courtès <ludo@gnu.org> writes:
> Simon Streit <simon@netpanic.org> skribis:
>> Anyway, back to this old commit offloading works for all users. 
>
> Is the socket file name displayed above correct?  Or did you specify
> something else in the <build-machine> record?

No, nothing that I'm aware about.  I haven't made any special changes. 
>
> Is the ‘GUIX_DAEMON_SOCKET’ environment variable defined on that
> machine?

No.
>
> How do you run guix-daemon on the head node?  The patches discussed here
> haven’t made it into the ‘guix’ package yet AFAIK.

That is a Guix system, where I've got an extra user with no extra group
permisions that takes the requests for offloading the clients make.
Thinking about it, the host isn't fully updated. Its current checkout
is, or was at the time of reporting to this issue:
407e0af6aa465479d08dafb125d06d50109f1822


Cheers!




^ permalink raw reply	[flat|nested] 14+ messages in thread

* bug#48240: “guix copy” to host with daemon listening on TCP fails
  2021-05-11 10:52   ` Ludovic Courtès
  2021-05-11 14:01     ` Bone Baboon via Bug reports for GNU Guix
@ 2021-05-12  7:49     ` Simon Streit
  2021-05-12 19:44     ` Simon Streit
  2 siblings, 0 replies; 14+ messages in thread
From: Simon Streit @ 2021-05-12  7:49 UTC (permalink / raw)
  To: Ludovic Courtès; +Cc: 48240

Ludovic Courtès <ludo@gnu.org> writes:
> Fixed in da28efef36af8925bcd9e40a81cbf552cf8c2d02.  Let me know if it
> works for you!

I'll try it later.  I missed this mail yesterday.


Cheers! 




^ permalink raw reply	[flat|nested] 14+ messages in thread

* bug#48240: “guix copy” to host with daemon listening on TCP fails
  2021-05-11 10:52   ` Ludovic Courtès
  2021-05-11 14:01     ` Bone Baboon via Bug reports for GNU Guix
  2021-05-12  7:49     ` Simon Streit
@ 2021-05-12 19:44     ` Simon Streit
  2 siblings, 0 replies; 14+ messages in thread
From: Simon Streit @ 2021-05-12 19:44 UTC (permalink / raw)
  To: Ludovic Courtès; +Cc: 48240

Ludovic Courtès <ludo@gnu.org> writes:

> Hi,
>
> Simon Streit <simon@netpanic.org> skribis:
>
>> Then it was suggested I checkout to commit
>> dd14678b9b9843be20e2bbb98ceb30d2433dab82 and force downgrade my new
>> system.  While doing so, I noticed that guix-daemon would still offload,
>> while if I'd type in `guix offload test`, I'd get a response:
>>
>> guix offload: testing 1 build machines defined in '/etc/guix/machines.scm'...
>> guix offload: Guix is usable on 'host' (test returned "/gnu/store/883yjkl46dxw9mzykykmbs0yzwyxm17z-test")
>> guix offload: 'host' is running GNU Guile 3.0.5
>> guix offload: error: failed to connect over SSH to daemon at 'host', socket /var/guix/daemon-socket/socket
>>
>> Anyway, back to this old commit offloading works for all users.
>>
>> The commit with this broken behaviour is at:
>> 87b4b0e4385149b40ee87ae2d57712679452746b.
>
> Fixed in da28efef36af8925bcd9e40a81cbf552cf8c2d02.  Let me know if it
> works for you!

Offloading works with this commit!  Thanks
>
> Thanks,
> Ludo’.




^ permalink raw reply	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2021-05-12 20:14 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2021-05-05 16:04 bug#48240: “guix copy” to host with daemon listening on TCP fails Ricardo Wurmus
2021-05-05 21:32 ` bug#48240: [PATCH 1/4] store: 'open-connection' never returns #f Ludovic Courtès
2021-05-05 21:32   ` bug#48240: [PATCH 2/4] ssh: 'connect-to-remote-daemon' raises a nicer message upon error Ludovic Courtès
2021-05-05 21:32   ` bug#48240: [PATCH 3/4] store: Export 'connect-to-daemon' Ludovic Courtès
2021-05-05 21:32   ` bug#48240: [PATCH 4/4] ssh: Honor GUIX_DAEMON_SOCKET on the target machine Ludovic Courtès
2021-05-08 13:10 ` bug#48240: “guix copy” to host with daemon listening on TCP fails Ludovic Courtès
2021-05-11  8:43 ` bug#48240: “guix_ " Simon Streit
2021-05-11  9:56   ` bug#48240: “guix " Ludovic Courtès
2021-05-12  7:48     ` Simon Streit
2021-05-11 10:52   ` Ludovic Courtès
2021-05-11 14:01     ` Bone Baboon via Bug reports for GNU Guix
2021-05-11 21:22       ` Ludovic Courtès
2021-05-12  7:49     ` Simon Streit
2021-05-12 19:44     ` Simon Streit

Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).