From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp2 ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms11 with LMTPS id 8DsOL5UepV8AAgAA0tVLHw (envelope-from ) for ; Fri, 06 Nov 2020 09:59:49 +0000 Received: from aspmx1.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp2 with LMTPS id U6jbKpUepV8sJgAAB5/wlQ (envelope-from ) for ; Fri, 06 Nov 2020 09:59:49 +0000 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 72D929403A9 for ; Fri, 6 Nov 2020 09:59:48 +0000 (UTC) Received: from localhost ([::1]:56784 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1kayX5-0000KV-Ew for larch@yhetil.org; Fri, 06 Nov 2020 04:59:47 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:42924) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kayWs-0000KB-O5 for guix-devel@gnu.org; Fri, 06 Nov 2020 04:59:34 -0500 Received: from fencepost.gnu.org ([2001:470:142:3::e]:50437) by eggs.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1kayWr-0006s7-Qm; Fri, 06 Nov 2020 04:59:33 -0500 Received: from [2a01:e0a:1d:7270:af76:b9b:ca24:c465] (port=57224 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from ) id 1kayWr-0002Pb-Dt; Fri, 06 Nov 2020 04:59:33 -0500 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: Danny Milosavljevic Subject: Re: Releasing guix binary in Docker format too? References: <20200922115019.08d40bec@scratchpost.org> <20200924095904.49411b47@scratchpost.org> <87mu0g7xiu.fsf@gnu.org> <87eelr37rn.fsf@gnu.org> <20201104154316.548b26e3@scratchpost.org> X-URL: http://www.fdn.fr/~lcourtes/ X-Revolutionary-Date: 16 Brumaire an 229 de la =?utf-8?Q?R=C3=A9volution?= X-PGP-Key-ID: 0x090B11993D9AEBB5 X-PGP-Key: http://www.fdn.fr/~lcourtes/ludovic.asc X-PGP-Fingerprint: 3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5 X-OS: x86_64-pc-linux-gnu Date: Fri, 06 Nov 2020 10:59:32 +0100 In-Reply-To: <20201104154316.548b26e3@scratchpost.org> (Danny Milosavljevic's message of "Wed, 4 Nov 2020 15:43:16 +0100") Message-ID: <87imai24cb.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-BeenThere: guix-devel@gnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Guix Devel Errors-To: guix-devel-bounces+larch=yhetil.org@gnu.org Sender: "Guix-devel" X-Scanner: ns3122888.ip-94-23-21.eu Authentication-Results: aspmx1.migadu.com; dkim=none; dmarc=pass (policy=none) header.from=gnu.org; spf=pass (aspmx1.migadu.com: domain of guix-devel-bounces@gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=guix-devel-bounces@gnu.org X-Spam-Score: -0.51 X-TUID: YDz7bnG/sdQA Hi! Danny Milosavljevic skribis: > On Wed, 21 Oct 2020 17:42:36 +0200 > Ludovic Court=C3=A8s wrote: > >> zimoun skribis: >>=20 >> > The tool is 'skopeo' and packaged in Guix. >> > >> > However, push to DockerHub requires an account (by Guix project) which >> > requires... probably non-free JS, at least once.=20=20 >>=20 >> Hmm OK. Users of Docker wouldn=E2=80=99t have to create an account and = run the >> non-free JS, so this is probably acceptable. >>=20 >> The next problem is: what would this image contain? =E2=80=98guix pack = guix=E2=80=99 is >> probably not enough because people expect the daemon to be running. >> Adding =E2=80=98--entry-point=3Dbin/guix-daemon=E2=80=99 probably isn=E2= =80=99t good either >> because =E2=80=98guix-daemon=E2=80=99 never exits, which I think is cont= rary to what >> users expect. > > It really depends on how people use the images. > > It's totally normal for docker containers to start services they need in > the foreground on container startup, and people then entering that > running container from the outside anyway (!) using docker tools. OK so this: guix pack guix -f docker -S /bin=3Dbin \ --entry-point=3D"bin/guix-daemon --disable-chroot" might work, right? Someone needs to try because the devil is in the details. To me there are still important unknowns regarding an official Docker image (how to build it, how to upload it), so I=E2=80=99m not confident abo= ut getting that done in time for 1.2, but progress on that front is welcome anytime! Thanks, Ludo=E2=80=99.