From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp11.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms5.migadu.com with LMTPS id 6MzgHk40z2JtWAAAbAwnHQ (envelope-from ) for ; Wed, 13 Jul 2022 23:08:30 +0200 Received: from aspmx1.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp11.migadu.com with LMTPS id aP73Hk40z2JmOAAA9RJhRA (envelope-from ) for ; Wed, 13 Jul 2022 23:08:30 +0200 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 8FB9211D20 for ; Wed, 13 Jul 2022 23:08:29 +0200 (CEST) Received: from localhost ([::1]:35934 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1oBjau-0003Ko-6S for larch@yhetil.org; Wed, 13 Jul 2022 17:08:28 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:47200) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1oBjaW-0003J1-5a for bug-guix@gnu.org; Wed, 13 Jul 2022 17:08:05 -0400 Received: from debbugs.gnu.org ([209.51.188.43]:53959) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1oBjaU-0004PG-Kk for bug-guix@gnu.org; Wed, 13 Jul 2022 17:08:03 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1oBjaU-0008Q1-Ep for bug-guix@gnu.org; Wed, 13 Jul 2022 17:08:02 -0400 X-Loop: help-debbugs@gnu.org Subject: bug#55936: dockerd fails to start on boot Resent-From: Maxim Cournoyer Original-Sender: "Debbugs-submit" Resent-CC: bug-guix@gnu.org Resent-Date: Wed, 13 Jul 2022 21:08:02 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 55936 X-GNU-PR-Package: guix X-GNU-PR-Keywords: To: Oleg Pykhalov Cc: 55936@debbugs.gnu.org Received: via spool by 55936-submit@debbugs.gnu.org id=B55936.165774642632281 (code B ref 55936); Wed, 13 Jul 2022 21:08:02 +0000 Received: (at 55936) by debbugs.gnu.org; 13 Jul 2022 21:07:06 +0000 Received: from localhost ([127.0.0.1]:47856 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oBjZZ-0008Oa-PG for submit@debbugs.gnu.org; Wed, 13 Jul 2022 17:07:05 -0400 Received: from mail-qv1-f46.google.com ([209.85.219.46]:35782) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oBjZY-0008O2-67 for 55936@debbugs.gnu.org; Wed, 13 Jul 2022 17:07:04 -0400 Received: by mail-qv1-f46.google.com with SMTP id l2so73784qvt.2 for <55936@debbugs.gnu.org>; Wed, 13 Jul 2022 14:07:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:references:date:in-reply-to:message-id :user-agent:mime-version; bh=sOU5oM3/OUDVJatmwPplLhdNCs+qJbibJ8r/hGew/qs=; b=Q0hVHPNa5bCgjzUz7JhIT/Tdg/DBwp0FN1Y3YMFhMr7Q/HDmwtAgrAr7Pn3Xk/YVYC ZQ5U3p1BoarQ6ixCe++WRHa3HuvXLovHZ2iSAh+PyoZb+45uk1IzVi7OfbZu6e6/y+DW hDlA4XxoPI6wO9giMaQxreMxUB9MK20MOW7DW9jtAULcpddw0OHP3/7bJuME/Kur8ZDd eo7ZzPMgs/JbhX4UsdU+pZwejd8gO3mqCg6UZz3ErAI0q/eY+V6pFn1s0ZlQ9nWUT1G1 uej2+CVMPbI0buEOP0bM/paMEJ9mT2Hb5MJ8Eu8Nccb15vVhUEfCNSivLNgDEeICylxx GKoA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:references:date:in-reply-to :message-id:user-agent:mime-version; bh=sOU5oM3/OUDVJatmwPplLhdNCs+qJbibJ8r/hGew/qs=; b=bT0RESad900ra1otPb7KO4f1fCgJ85rJ8EtLFFEaD3/V3xrUfEzNtEn+ZTTZ4Vpbig EIP3xOQeHA0vBtiCYuuNdQl89Ts0Ht5MkD5rtVoWe3aIIIvyF705bQ6Fpz3G/94THzMY JfAlkAXfjrQvrGtgPN4L03OAUJGX2sgkw67vxgcp9RywYXkfOZk1kdlCAA5i6xN7ySHn BDXcvTK7gRShmc6jSNXx1yAqJ/DdzjI/qhK/3Kshhzk+oIUgmSDNjdRg0zCCraV/Fkb3 nS5+DPFwQrJ7tJfl+AA55qRAiCdXmVnR8cx2jJfhxdptDMB/DmxqPUExaWAAv3IKj8zK jnUQ== X-Gm-Message-State: AJIora/QLSvT43Fipe/dAT1NPRHFoY7JTzEy1sIZPU9bvgDDhlNFx8GJ nflAB/dY9j2gYfvGHijuT3FaVJGsQka492aV X-Google-Smtp-Source: AGRyM1svEMW3MbcYlmxT5/tMgeyRIEbALqKUUPa3d4P9jXvq+Ccv6PQeF8d+P7gOCl6CkdtSqtcTTA== X-Received: by 2002:a05:6214:2308:b0:432:e69f:5d71 with SMTP id gc8-20020a056214230800b00432e69f5d71mr4972272qvb.19.1657746418039; Wed, 13 Jul 2022 14:06:58 -0700 (PDT) Received: from hurd (dsl-10-133-49.b2b2c.ca. [72.10.133.49]) by smtp.gmail.com with ESMTPSA id k18-20020a05620a415200b006b58fce19dasm8156417qko.20.2022.07.13.14.06.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Jul 2022 14:06:57 -0700 (PDT) From: Maxim Cournoyer References: <20220702104106.16997-1-go.wigust@gmail.com> <878rp1ft82.fsf@gmail.com> Date: Wed, 13 Jul 2022 17:06:56 -0400 In-Reply-To: <878rp1ft82.fsf@gmail.com> (Maxim Cournoyer's message of "Sun, 10 Jul 2022 01:10:37 -0400") Message-ID: <87wncgyb67.fsf_-_@gmail.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: bug-guix@gnu.org List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: bug-guix-bounces+larch=yhetil.org@gnu.org Sender: "bug-Guix" X-Migadu-Flow: FLOW_IN X-Migadu-To: larch@yhetil.org X-Migadu-Country: US ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1657746509; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:resent-cc:resent-from:resent-sender: resent-message-id:in-reply-to:in-reply-to:references:references: list-id:list-help:list-unsubscribe:list-subscribe:list-post: dkim-signature; bh=sOU5oM3/OUDVJatmwPplLhdNCs+qJbibJ8r/hGew/qs=; b=ShCTAUmEKhFBzOygDsmvbGtN4++K7jv3halJ5viQ4DH3F/LIwF2Aun0iv0GGC8JUUFuuCq xioS3derJi3ivWNb7jbE+dyZA+kzunXSE9EW+BZo9klTJXxJE63152JJC9LI/YBNC77NyC xhf1F3kQc+hby8FdgKhDDEKU6F8KjsUTfUqi54K8jRvDCxg/rU2S842sOkbRLWofTzUjyy P1ggufYHh1rKKEMsdbn/IC8AmM74I/qoQoPYZlCZ1re0YgKfgouSM3ITzCFZyUl5iAIUu5 jOX/5iaJFMNGtO72/Zv4peBlpJ14thNeJa2/4I3bN2HFEIOlwfJdp3ZVqV0CFA== ARC-Seal: i=1; s=key1; d=yhetil.org; t=1657746509; a=rsa-sha256; cv=none; b=GSlCBmXeiY3Mm7N/ubfj0BntgDtFmMOXegmFbvAi5F5VXHOrpD6yBZruDv6sFBZj8nsnPA BkC05/8QNRa8ZV6sn+vSjyQakZKz/9mIlnyTmhdiKduqpkUrPA0DVkqj4uU99kvKe4nk36 C1WQ80IKcqroFZbht5Rx/555rPCRg29teVgkxL0OEW0Xq+ZnZRNdE0tsTWoJhU9CY5hiVv RQacTozBHGYnUR8v+mlfvswYD2TDI3KHC4sLtORee/oJ+uq0BGw0eUE6KXyP/5WyBGeZKY cdDNTpzUZjtlGqBxDhL1q9bNGbH5x4KNyWOhZL678G4imESB2vcAVsbP/nRc9A== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gmail.com header.s=20210112 header.b=Q0hVHPNa; dmarc=fail reason="SPF not aligned (relaxed)" header.from=gmail.com (policy=none); spf=pass (aspmx1.migadu.com: domain of "bug-guix-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="bug-guix-bounces+larch=yhetil.org@gnu.org" X-Migadu-Spam-Score: 6.06 Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gmail.com header.s=20210112 header.b=Q0hVHPNa; dmarc=fail reason="SPF not aligned (relaxed)" header.from=gmail.com (policy=none); spf=pass (aspmx1.migadu.com: domain of "bug-guix-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="bug-guix-bounces+larch=yhetil.org@gnu.org" X-Migadu-Queue-Id: 8FB9211D20 X-Spam-Score: 6.06 X-Migadu-Scanner: scn1.migadu.com X-TUID: sRSEwcE6paCv Hi, Maxim Cournoyer writes: > Hi Oleg, > > Oleg Pykhalov writes: > >> Fixes . >> >> * gnu/packages/patches/containerd-create-pid-file.patch: New file. >> * gnu/local.mk (dist_patch_DATA): Add this. >> * gnu/packages/docker.scm (containerd)[source]: Add this patch. >> * gnu/services/docker.scm >> (containerd-shepherd-service): Add #:pid-file and #:pid-file-timeout. >> * gnu/services/docker.scm (docker-shepherd-service): Add --containerd flag. > > Thanks for this, it looks promising! > > Before we go forward though, had you consider using a > 'make-systemd-constructor' as now available in Shepherd 0.9+ ? I > remember Docker supports systemd socket activation for synchronizing its > services; it could be a simpler, no-code solution. I've researched more on the topic, and it appears what I had on mind is rather systemd's socket *notification* (what they call 'sdNotify') rather than activation. Activation is just to lazy start things... it probably wouldn't help here, rather it seems it'd be a bad idea, as realized elsewhere [0]. [0] https://github.com/containerd/containerd/issues/164#issuecomment-657536515 All that to say that I shall be reviewing your patches shortly :-). Thank you, Maxim