* Offloading to use Guile-SSH instead of lsh
@ 2016-11-05 15:41 Ludovic Courtès
2016-11-06 7:47 ` Efraim Flashner
` (2 more replies)
0 siblings, 3 replies; 12+ messages in thread
From: Ludovic Courtès @ 2016-11-05 15:41 UTC (permalink / raw)
To: guix-devel
Hello!
The ‘wip-guile-ssh’ branch is finally getting into shape. As soon as
a new Guile-SSH release is out, I’ll merge it on master.
The goal of this branch is to use Guile-SSH (libssh bindings) instead of
invoking ‘lsh’ when offloading builds (see
<https://www.gnu.org/software/guix/manual/html_node/Daemon-Offload-Setup.html>
for background.)
The new code is shorter(!), more efficient, more elegant, and hopefully
more reliable. The efficiency gains come from the fact that we can
reuse SSH sessions in an intelligent way. The elegance has to do with
the fact that we have direct access to the SSH API, as opposed to
invoking ‘lsh’ and checking its exit status.
Improved reliability (well, modulo new bugs ;-)) comes from the fact
that we open a direct connection to the remote guix-daemon for the
duration of the offload, which allows us to better control GC root
registration—we can use the ‘add-temp-root’ RPC directly instead of
writing indirect root files in $HOME.
Before we put it in production on hydra.gnu.org :-), I’d welcome more
testing! To do that you need a current Guile-SSH (with the
‘channel-send-eof!’ procedure), and the ‘build-machine’ form is
slightly different than before: it has a new ‘host-key’ field to contain
the OpenSSH-formatted host key of the machine. I’ve updated the doc to
reflect that.
Feedback welcome!
Ludo’.
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Offloading to use Guile-SSH instead of lsh
2016-11-05 15:41 Offloading to use Guile-SSH instead of lsh Ludovic Courtès
@ 2016-11-06 7:47 ` Efraim Flashner
2016-11-06 17:40 ` Ludovic Courtès
2016-11-25 22:50 ` Ludovic Courtès
2016-12-06 9:34 ` Offloading to use Guile-SSH instead of lsh Ludovic Courtès
2 siblings, 1 reply; 12+ messages in thread
From: Efraim Flashner @ 2016-11-06 7:47 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: guix-devel
[-- Attachment #1: Type: text/plain, Size: 1882 bytes --]
On Sat, Nov 05, 2016 at 04:41:41PM +0100, Ludovic Courtès wrote:
> Hello!
>
> The ‘wip-guile-ssh’ branch is finally getting into shape. As soon as
> a new Guile-SSH release is out, I’ll merge it on master.
>
> The goal of this branch is to use Guile-SSH (libssh bindings) instead of
> invoking ‘lsh’ when offloading builds (see
> <https://www.gnu.org/software/guix/manual/html_node/Daemon-Offload-Setup.html>
> for background.)
>
> The new code is shorter(!), more efficient, more elegant, and hopefully
> more reliable. The efficiency gains come from the fact that we can
> reuse SSH sessions in an intelligent way. The elegance has to do with
> the fact that we have direct access to the SSH API, as opposed to
> invoking ‘lsh’ and checking its exit status.
>
> Improved reliability (well, modulo new bugs ;-)) comes from the fact
> that we open a direct connection to the remote guix-daemon for the
> duration of the offload, which allows us to better control GC root
> registration—we can use the ‘add-temp-root’ RPC directly instead of
> writing indirect root files in $HOME.
>
> Before we put it in production on hydra.gnu.org :-), I’d welcome more
> testing! To do that you need a current Guile-SSH (with the
> ‘channel-send-eof!’ procedure), and the ‘build-machine’ form is
> slightly different than before: it has a new ‘host-key’ field to contain
> the OpenSSH-formatted host key of the machine. I’ve updated the doc to
> reflect that.
>
> Feedback welcome!
>
> Ludo’.
>
So to clarify, I need to switch just the master to the wip-guile-ssh
branch, or also the slaves?
--
Efraim Flashner <efraim@flashner.co.il> אפרים פלשנר
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 801 bytes --]
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Offloading to use Guile-SSH instead of lsh
2016-11-06 7:47 ` Efraim Flashner
@ 2016-11-06 17:40 ` Ludovic Courtès
0 siblings, 0 replies; 12+ messages in thread
From: Ludovic Courtès @ 2016-11-06 17:40 UTC (permalink / raw)
To: Efraim Flashner; +Cc: guix-devel
Efraim Flashner <efraim@flashner.co.il> skribis:
> So to clarify, I need to switch just the master to the wip-guile-ssh
> branch, or also the slaves?
Just the master node.
The requirements for build machines are unchanged: they need to have
‘guile’ in $PATH and have guix-daemon running.
Ludo’.
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Offloading to use Guile-SSH instead of lsh
2016-11-05 15:41 Offloading to use Guile-SSH instead of lsh Ludovic Courtès
2016-11-06 7:47 ` Efraim Flashner
@ 2016-11-25 22:50 ` Ludovic Courtès
2016-11-26 4:42 ` Leo Famulari
2016-12-06 9:34 ` Offloading to use Guile-SSH instead of lsh Ludovic Courtès
2 siblings, 1 reply; 12+ messages in thread
From: Ludovic Courtès @ 2016-11-25 22:50 UTC (permalink / raw)
To: guix-devel
Hi!
ludo@gnu.org (Ludovic Courtès) skribis:
> The ‘wip-guile-ssh’ branch is finally getting into shape. As soon as
> a new Guile-SSH release is out, I’ll merge it on master.
Done!
It seems to work well in my own tests, but more feedback is welcome.
Ludo’.
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Offloading to use Guile-SSH instead of lsh
2016-11-25 22:50 ` Ludovic Courtès
@ 2016-11-26 4:42 ` Leo Famulari
2016-11-26 15:11 ` 宋文武
0 siblings, 1 reply; 12+ messages in thread
From: Leo Famulari @ 2016-11-26 4:42 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: guix-devel
On Fri, Nov 25, 2016 at 11:50:22PM +0100, Ludovic Courtès wrote:
> Hi!
>
> ludo@gnu.org (Ludovic Courtès) skribis:
>
> > The ‘wip-guile-ssh’ branch is finally getting into shape. As soon as
> > a new Guile-SSH release is out, I’ll merge it on master.
>
> Done!
>
> It seems to work well in my own tests, but more feedback is welcome.
It looks like there is a spurious module import of (ssh key) with the
latest code:
$ guix pull
Starting download of /tmp/guix-file.rr3z8q
From http://git.savannah.gnu.org/cgit/guix.git/snapshot/master.tar.gz...
….tar.gz 2.7MiB/s 00:04 | 10.7MiB transferred
unpacking '/gnu/store/7agpxhdimc0gbyjmryfjnnpd1ahzdx4q-guix-latest.tar.gz'...
The following derivation will be built:
/gnu/store/z958zcva82idmanswyw7zg00zyack221-guix-latest.drv
building path(s) `/gnu/store/q3kckrsgqdnrka24aavbbk423y6zhlkj-guix-latest'
copying and compiling to '/gnu/store/q3kckrsgqdnrka24aavbbk423y6zhlkj-guix-latest'...
loading... 20.5% of 547 filesBacktrace:
In ice-9/boot-9.scm:
1727: 19 [%start-stack load-stack #<procedure 8fdb60 at ice-9/boot-9.scm:4047:10 ()>]
1732: 18 [#<procedure 8fe6f0 ()>]
In unknown file:
?: 17 [primitive-load "/gnu/store/waghfcxyknvhd4ribwz6cxq8b5437y9d-guix-latest-builder"]
In ./guix/build/pull.scm:
57: 16 [build-guix "/gnu/store/q3kckrsgqdnrka24aavbbk423y6zhlkj-guix-latest" ...]
123: 15 [#<procedure c0f280 at ./guix/build/pull.scm:57:2 ()>]
In ice-9/boot-9.scm:
2867: 14 [resolve-interface (guix scripts offload) #:select ...]
2792: 13 [#<procedure 852d80 at ice-9/boot-9.scm:2780:4 (name #:optional autoload version #:key ensure)> # ...]
3068: 12 [try-module-autoload (guix scripts offload) #f]
2404: 11 [save-module-excursion #<procedure cf0c90 at ice-9/boot-9.scm:3069:17 ()>]
3088: 10 [#<procedure cf0c90 at ice-9/boot-9.scm:3069:17 ()>]
In unknown file:
?: 9 [primitive-load-path "guix/scripts/offload" ...]
In ice-9/eval.scm:
505: 8 [#<procedure 79c6e0 at ice-9/eval.scm:499:4 (exp)> (define-module # # ...)]
In ice-9/psyntax.scm:
1106: 7 [expand-top-sequence ((define-module # # # ...)) () ((top)) ...]
989: 6 [scan ((define-module (guix scripts offload) #:use-module ...)) () ...]
279: 5 [scan ((#(syntax-object let # ...) (#) (# #) ...)) () ...]
In ice-9/eval.scm:
411: 4 [eval # ()]
In ice-9/boot-9.scm:
2954: 3 [define-module* (guix scripts offload) #:filename ...]
2929: 2 [resolve-imports (((ssh key)) ((ssh auth)) ((ssh session)) ...)]
2870: 1 [resolve-interface (ssh key) #:select ...]
In unknown file:
?: 0 [scm-error misc-error #f "~A ~S" ("no code for module" (ssh key)) #f]
ERROR: In procedure scm-error:
ERROR: no code for module (ssh key)
builder for `/gnu/store/z958zcva82idmanswyw7zg00zyack221-guix-latest.drv' failed with exit code 1
guix pull: error: build failed: build of `/gnu/store/z958zcva82idmanswyw7zg00zyack221-guix-latest.drv' failed
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Offloading to use Guile-SSH instead of lsh
2016-11-26 4:42 ` Leo Famulari
@ 2016-11-26 15:11 ` 宋文武
2016-11-27 22:10 ` Ludovic Courtès
0 siblings, 1 reply; 12+ messages in thread
From: 宋文武 @ 2016-11-26 15:11 UTC (permalink / raw)
To: Leo Famulari; +Cc: guix-devel
Leo Famulari <leo@famulari.name> writes:
> On Fri, Nov 25, 2016 at 11:50:22PM +0100, Ludovic Courtès wrote:
>> Hi!
>>
>> ludo@gnu.org (Ludovic Courtès) skribis:
>>
>> > The ‘wip-guile-ssh’ branch is finally getting into shape. As soon as
>> > a new Guile-SSH release is out, I’ll merge it on master.
>>
>> Done!
>>
>> It seems to work well in my own tests, but more feedback is welcome.
>
> It looks like there is a spurious module import of (ssh key) with the
> latest code:
>
> $ guix pull
>
> ...
> 2870: 1 [resolve-interface (ssh key) #:select ...]
> In unknown file:
> ?: 0 [scm-error misc-error #f "~A ~S" ("no code for module" (ssh key)) #f]
>
> ERROR: In procedure scm-error:
> ERROR: no code for module (ssh key)
> builder for `/gnu/store/z958zcva82idmanswyw7zg00zyack221-guix-latest.drv' failed with exit code 1
> guix pull: error: build failed: build of `/gnu/store/z958zcva82idmanswyw7zg00zyack221-guix-latest.drv' failed
I push a commit 5aed7f10f to add guile-ssh to the load-path of the pull
builder (the commit message refers a wrong commit, sorry) to fix it.
But as ng0 report in #guix, the 0.11 install media is still broken.
Since I add guile-ssh's go files to load-compiled-path, which are
broken before commit 92b7258.
Should I remove guile-ssh from %load-compiled-path in
build-aux/build-self.scm? (assuming the offload script build fine with
guile-ssh-0.9.0 of the guix-0.11)
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Offloading to use Guile-SSH instead of lsh
2016-11-26 15:11 ` 宋文武
@ 2016-11-27 22:10 ` Ludovic Courtès
2016-11-28 10:06 ` Efraim Flashner
0 siblings, 1 reply; 12+ messages in thread
From: Ludovic Courtès @ 2016-11-27 22:10 UTC (permalink / raw)
To: 宋文武; +Cc: guix-devel
iyzsong@member.fsf.org (宋文武) skribis:
> Leo Famulari <leo@famulari.name> writes:
>
>> On Fri, Nov 25, 2016 at 11:50:22PM +0100, Ludovic Courtès wrote:
>>> Hi!
>>>
>>> ludo@gnu.org (Ludovic Courtès) skribis:
>>>
>>> > The ‘wip-guile-ssh’ branch is finally getting into shape. As soon as
>>> > a new Guile-SSH release is out, I’ll merge it on master.
>>>
>>> Done!
>>>
>>> It seems to work well in my own tests, but more feedback is welcome.
>>
>> It looks like there is a spurious module import of (ssh key) with the
>> latest code:
>>
>> $ guix pull
>>
>> ...
>> 2870: 1 [resolve-interface (ssh key) #:select ...]
>> In unknown file:
>> ?: 0 [scm-error misc-error #f "~A ~S" ("no code for module" (ssh key)) #f]
>>
>> ERROR: In procedure scm-error:
>> ERROR: no code for module (ssh key)
>> builder for `/gnu/store/z958zcva82idmanswyw7zg00zyack221-guix-latest.drv' failed with exit code 1
>> guix pull: error: build failed: build of `/gnu/store/z958zcva82idmanswyw7zg00zyack221-guix-latest.drv' failed
>
> I push a commit 5aed7f10f to add guile-ssh to the load-path of the pull
> builder (the commit message refers a wrong commit, sorry) to fix it.
>
> But as ng0 report in #guix, the 0.11 install media is still broken.
> Since I add guile-ssh's go files to load-compiled-path, which are
> broken before commit 92b7258.
>
> Should I remove guile-ssh from %load-compiled-path in
> build-aux/build-self.scm? (assuming the offload script build fine with
> guile-ssh-0.9.0 of the guix-0.11)
Bah, what a mess!
‘guix offload’ needs Guile-SSH 0.10.2, but ‘guix offload’ is only
invoked from guix-daemon, and guix-daemon is not updated using ‘guix
pull’ anyway.
I committed a workaround as aa28ecc40af91d7cdff2fb3ab4ad86ad10d43ab7.
Fundamentally, it illustrates that the current strategy of ‘guix pull’
of relying on user-provided packages is flawed: we can get a broken
Guile-SSH, or one with the wrong version, or none at all, and that
really sucks.
Updating Guix should be like updating a normal package: you get the
package itself and all its dependencies that are known to work.
Ludo’.
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Offloading to use Guile-SSH instead of lsh
2016-11-27 22:10 ` Ludovic Courtès
@ 2016-11-28 10:06 ` Efraim Flashner
2016-11-28 14:13 ` ‘guix pull’ and external dependencies Ludovic Courtès
0 siblings, 1 reply; 12+ messages in thread
From: Efraim Flashner @ 2016-11-28 10:06 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: guix-devel
[-- Attachment #1: Type: text/plain, Size: 3015 bytes --]
On Sun, Nov 27, 2016 at 11:10:53PM +0100, Ludovic Courtès wrote:
> iyzsong@member.fsf.org (宋文武) skribis:
>
> > Leo Famulari <leo@famulari.name> writes:
> >
> >> On Fri, Nov 25, 2016 at 11:50:22PM +0100, Ludovic Courtès wrote:
> >>> Hi!
> >>>
> >>> ludo@gnu.org (Ludovic Courtès) skribis:
> >>>
> >>> > The ‘wip-guile-ssh’ branch is finally getting into shape. As soon as
> >>> > a new Guile-SSH release is out, I’ll merge it on master.
> >>>
> >>> Done!
> >>>
> >>> It seems to work well in my own tests, but more feedback is welcome.
> >>
> >> It looks like there is a spurious module import of (ssh key) with the
> >> latest code:
> >>
> >> $ guix pull
> >>
> >> ...
> >> 2870: 1 [resolve-interface (ssh key) #:select ...]
> >> In unknown file:
> >> ?: 0 [scm-error misc-error #f "~A ~S" ("no code for module" (ssh key)) #f]
> >>
> >> ERROR: In procedure scm-error:
> >> ERROR: no code for module (ssh key)
> >> builder for `/gnu/store/z958zcva82idmanswyw7zg00zyack221-guix-latest.drv' failed with exit code 1
> >> guix pull: error: build failed: build of `/gnu/store/z958zcva82idmanswyw7zg00zyack221-guix-latest.drv' failed
> >
> > I push a commit 5aed7f10f to add guile-ssh to the load-path of the pull
> > builder (the commit message refers a wrong commit, sorry) to fix it.
> >
> > But as ng0 report in #guix, the 0.11 install media is still broken.
> > Since I add guile-ssh's go files to load-compiled-path, which are
> > broken before commit 92b7258.
> >
> > Should I remove guile-ssh from %load-compiled-path in
> > build-aux/build-self.scm? (assuming the offload script build fine with
> > guile-ssh-0.9.0 of the guix-0.11)
>
> Bah, what a mess!
>
> ‘guix offload’ needs Guile-SSH 0.10.2, but ‘guix offload’ is only
> invoked from guix-daemon, and guix-daemon is not updated using ‘guix
> pull’ anyway.
>
> I committed a workaround as aa28ecc40af91d7cdff2fb3ab4ad86ad10d43ab7.
>
> Fundamentally, it illustrates that the current strategy of ‘guix pull’
> of relying on user-provided packages is flawed: we can get a broken
> Guile-SSH, or one with the wrong version, or none at all, and that
> really sucks.
>
> Updating Guix should be like updating a normal package: you get the
> package itself and all its dependencies that are known to work.
>
> Ludo’.
>
If I understand it correctly, as part of `guix pull' we get the latest
package definitions, but `guix' and `guix-daemon' are at the
guix-snapshot version, aka 0.11.0-4. If instead `guix-daemon' was from
the tip of master then it'd be at the equivalant of running
'./pre-inst-env guix-daemon --build-users...', which would have all
these changes.
--
Efraim Flashner <efraim@flashner.co.il> אפרים פלשנר
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
^ permalink raw reply [flat|nested] 12+ messages in thread
* ‘guix pull’ and external dependencies
2016-11-28 10:06 ` Efraim Flashner
@ 2016-11-28 14:13 ` Ludovic Courtès
2016-11-29 1:58 ` Chris Marusich
0 siblings, 1 reply; 12+ messages in thread
From: Ludovic Courtès @ 2016-11-28 14:13 UTC (permalink / raw)
To: Efraim Flashner; +Cc: guix-devel, 22629
Hi!
Efraim Flashner <efraim@flashner.co.il> skribis:
> If I understand it correctly, as part of `guix pull' we get the latest
> package definitions, but `guix' and `guix-daemon' are at the
> guix-snapshot version, aka 0.11.0-4. If instead `guix-daemon' was from
> the tip of master then it'd be at the equivalant of running
> './pre-inst-env guix-daemon --build-users...', which would have all
> these changes.
What ‘guix pull’ does is fetch the latest code, build *the Scheme
subset* of that code, and install it in ~/.config/guix/latest.
Thus, it gives you the latest package recipes as well as the latest
‘guix’ sub-commands.
What it does not give you is:
1. The latest C++ code (guix-daemon, guix-register).
2. The latest locales.
3. The latest elisp code.
4. The latest dependencies (the Guile that appears in the shebang of
the ‘guix’ command, zlib, Guile-SSH, Guile-JSON, etc.)
It worked OK when Guix was self-contained, and assuming people would
update guix-daemon through other ways (‘guix system reconfigure’ on
GuixSD). But now we see that these shortcomings are starting to bite.
So I think what we need to do is for “guix pull-ng” to build and install
a complete ‘guix’ package, and to manage it pretty much like other
packages is managed, except not in the user’s main profile (because that
could lead to undesirable behavior, where upgrading Guix creates a new
generation, or, in theory, unrecoverable problems, where you cannot
roll back because previous generations use an old Guix that does not
understand the new manifest format.)
The difficulty is that ./configure && make && make install in Guix takes
some time, and we probably wouldn’t want to do that on each ‘guix pull’
invocation (esp. with Guile 2.2’s compilation times.)
So we may have to provide substitutes of Guix itself, and arrange so
that ‘guix pull’ pulls up to a tag for which we have substitutes.
Ideas welcome! See <https://bugs.gnu.org/22629>.
Ludo’.
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: ‘guix pull’ and external dependencies
2016-11-28 14:13 ` ‘guix pull’ and external dependencies Ludovic Courtès
@ 2016-11-29 1:58 ` Chris Marusich
2016-11-29 14:54 ` Ludovic Courtès
0 siblings, 1 reply; 12+ messages in thread
From: Chris Marusich @ 2016-11-29 1:58 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: guix-devel, 22629
[-- Attachment #1: Type: text/plain, Size: 3659 bytes --]
Hi Ludo`,
ludo@gnu.org (Ludovic Courtès) writes:
> So I think what we need to do is for “guix pull-ng” to build and install
> a complete ‘guix’ package, and to manage it pretty much like other
> packages is managed,
I think that's very reasonable. It seems more intuitive than the
current way 'guix pull' works. I suspect that managing the installed
version of Guix via the same Guix mechanisms that we use to manage any
other package might be the best, most intuitive solution.
Would it simplify the problem if we packaged the "Guix client stuff",
the "Guix daemon stuff", and maybe the "Guix package definition stuff"
separately? Then a user could just install the "Guix client stuff"
package if she wanted to upgrade the Guix client tools, or the "Guix
package definition stuff" package if she wanted to get the latest
package definitions.
> except not in the user’s main profile (because that could lead to
> undesirable behavior,
If we don't store Guix in the user's main profile, where would it go? A
system profile (like in GuixSD)? What if another user wants to run a
different version of Guix? It might be nice to let them do that.
It's not clear to me why it's riskier to store Guix in a profile rather
than outside the profile (but still in the store via the
$HOME/.config/guix/latest symlink), which is what 'guix pull' does now.
You seem to think it's riskier; I'm curious to know more about why.
> where upgrading Guix creates a new generation,
Why should upgrading Guix NOT create a new generation? I thought that a
new profile generation would be created any time you upgrade a package,
and I thought that was a good thing because it facilitates easy,
transactional roll-back. Perhaps I'm missing something.
> or, in theory, unrecoverable problems, where you cannot roll back
> because previous generations use an old Guix that does not understand
> the new manifest format.)
Why would a change in manifest format be unrecoverable? It looks like
each profile generation contains a manifest file. Assuming that the new
Guix functions well enough to perform roll back, couldn't we just roll
back to the previous profile generation, where we would have both (1)
the old profile's manifest file, and (2) the previous Guix, which
understands that format? Since rolling back a profile is basically just
a symlink flip, I think the new Guix could probably do that even if it
didn't understand the old manifest format.
> The difficulty is that ./configure && make && make install in Guix takes
> some time, and we probably wouldn’t want to do that on each ‘guix pull’
> invocation (esp. with Guile 2.2’s compilation times.)
>
> So we may have to provide substitutes of Guix itself, and arrange so
> that ‘guix pull’ pulls up to a tag for which we have substitutes.
What if we had a special package version of Guix (e.g., "v0.11.0") which
we kept up to date via some mechanism? Maybe something as simple as a
Git hook could help increase the likelihood of that version being
substitutable. For example, we could have a Git hook that prevents
someone from checking in a change if the latest Git tag does not
correspond to a Guix package version. Maybe we can do better.
I actually think it would be a good thing if we can run "guix pull"
without substitutes available. But it should use a substitute by
default, and "build from source" should be a fallback mechanism that the
user has to explicitly request, just like when installing new packages.
That would help avoid unexpectedly long "guix pull" invocations.
--
Chris
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 818 bytes --]
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: ‘guix pull’ and external dependencies
2016-11-29 1:58 ` Chris Marusich
@ 2016-11-29 14:54 ` Ludovic Courtès
0 siblings, 0 replies; 12+ messages in thread
From: Ludovic Courtès @ 2016-11-29 14:54 UTC (permalink / raw)
To: Chris Marusich; +Cc: guix-devel, 22629
Hello,
Chris Marusich <cmmarusich@gmail.com> skribis:
> ludo@gnu.org (Ludovic Courtès) writes:
>
>> So I think what we need to do is for “guix pull-ng” to build and install
>> a complete ‘guix’ package, and to manage it pretty much like other
>> packages is managed,
>
> I think that's very reasonable. It seems more intuitive than the
> current way 'guix pull' works. I suspect that managing the installed
> version of Guix via the same Guix mechanisms that we use to manage any
> other package might be the best, most intuitive solution.
>
> Would it simplify the problem if we packaged the "Guix client stuff",
> the "Guix daemon stuff", and maybe the "Guix package definition stuff"
> separately? Then a user could just install the "Guix client stuff"
> package if she wanted to upgrade the Guix client tools, or the "Guix
> package definition stuff" package if she wanted to get the latest
> package definitions.
It would be bad to separate package definitions from the rest because
they are very much intertwined: package definitions depend on the
definition of ‘package’, on build system implementations, and so on.
We could have guix-sans-daemon though, if that helps (which I suspect is
not the case).
>> except not in the user’s main profile (because that could lead to
>> undesirable behavior,
>
> If we don't store Guix in the user's main profile, where would it go?
In “some sort of a profile” in ~/.config/guix/latest or similar.
> It's not clear to me why it's riskier to store Guix in a profile rather
> than outside the profile (but still in the store via the
> $HOME/.config/guix/latest symlink), which is what 'guix pull' does now.
> You seem to think it's riskier; I'm curious to know more about why.
There’s the manifest format change issue I mentioned, or the inability
to roll back if you install a broken Guix.
>> where upgrading Guix creates a new generation,
>
> Why should upgrading Guix NOT create a new generation? I thought that a
> new profile generation would be created any time you upgrade a package,
> and I thought that was a good thing because it facilitates easy,
> transactional roll-back. Perhaps I'm missing something.
I’m suggesting that upgrading Guix creates a new generation (so we agree
here), just not in the user’s profile.
>> or, in theory, unrecoverable problems, where you cannot roll back
>> because previous generations use an old Guix that does not understand
>> the new manifest format.)
>
> Why would a change in manifest format be unrecoverable? It looks like
> each profile generation contains a manifest file. Assuming that the new
> Guix functions well enough to perform roll back, couldn't we just roll
> back to the previous profile generation, where we would have both (1)
> the old profile's manifest file, and (2) the previous Guix, which
> understands that format? Since rolling back a profile is basically just
> a symlink flip, I think the new Guix could probably do that even if it
> didn't understand the old manifest format.
Yeah, I think you’re right. :-)
In general, I think my concern is more that we cannot promise that
downgrading Guix will work, considering the potential for on-disk format
changes. It’s a bit theoretical, but not entirely sci-fi either.
>> The difficulty is that ./configure && make && make install in Guix takes
>> some time, and we probably wouldn’t want to do that on each ‘guix pull’
>> invocation (esp. with Guile 2.2’s compilation times.)
>>
>> So we may have to provide substitutes of Guix itself, and arrange so
>> that ‘guix pull’ pulls up to a tag for which we have substitutes.
>
> What if we had a special package version of Guix (e.g., "v0.11.0") which
> we kept up to date via some mechanism? Maybe something as simple as a
> Git hook could help increase the likelihood of that version being
> substitutable. For example, we could have a Git hook that prevents
> someone from checking in a change if the latest Git tag does not
> correspond to a Guix package version. Maybe we can do better.
Right, we could do something like that. There are still non-zero
chances that someone running ‘guix pull’ at an arbitrary point in time
will have to build locally, which is not great.
> I actually think it would be a good thing if we can run "guix pull"
> without substitutes available. But it should use a substitute by
> default, and "build from source" should be a fallback mechanism that the
> user has to explicitly request, just like when installing new packages.
> That would help avoid unexpectedly long "guix pull" invocations.
Yes, using substitutes or falling back to source builds is always the
default.
Thanks for your feedback!
Ludo’.
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Offloading to use Guile-SSH instead of lsh
2016-11-05 15:41 Offloading to use Guile-SSH instead of lsh Ludovic Courtès
2016-11-06 7:47 ` Efraim Flashner
2016-11-25 22:50 ` Ludovic Courtès
@ 2016-12-06 9:34 ` Ludovic Courtès
2 siblings, 0 replies; 12+ messages in thread
From: Ludovic Courtès @ 2016-12-06 9:34 UTC (permalink / raw)
To: guix-devel
ludo@gnu.org (Ludovic Courtès) skribis:
> The ‘wip-guile-ssh’ branch is finally getting into shape. As soon as
> a new Guile-SSH release is out, I’ll merge it on master.
[...]
> Before we put it in production on hydra.gnu.org :-)
It’s now used on hydra.gnu.org and seems to work well, though we’ll have
to see if new bugs pop up.
There were few hickups as evidenced by the commits in that area
yesterday ;-), but nothing serious.
I added a new sub-command to test whether offloading is properly set up
and that helped a lot:
--8<---------------cut here---------------start------------->8---
~# guix offload test ~hydra/maintenance/hydra/machines.scm.test
guix offload: testing 1 build machines defined in '/home/hydra/maintenance/hydra/machines.scm.test'...
guix offload: 'hydra-slave1.netris.org' is running guile (GNU Guile) 2.0.11
guix offload: Guix is usable on 'hydra-slave1.netris.org' (test returned "/gnu/store/883yjkl46dxw9mzykykmbs0yzwyxm17z-test")
sending 1 store item to 'hydra-slave1.netris.org'...
exporting path `/gnu/store/x9ab32kjqldyqlcb96n5i6ipiwfz5npc-export-test'
guix offload: 'hydra-slave1.netris.org' successfully imported '/gnu/store/x9ab32kjqldyqlcb96n5i6ipiwfz5npc-export-test'
guix offload: successfully imported '/gnu/store/z289jx28vzwfahvqa8h622ljzfja2hv4-import-test' from 'hydra-slave1.netris.org'
--8<---------------cut here---------------end--------------->8---
Ludo’.
^ permalink raw reply [flat|nested] 12+ messages in thread
end of thread, other threads:[~2016-12-06 9:34 UTC | newest]
Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-11-05 15:41 Offloading to use Guile-SSH instead of lsh Ludovic Courtès
2016-11-06 7:47 ` Efraim Flashner
2016-11-06 17:40 ` Ludovic Courtès
2016-11-25 22:50 ` Ludovic Courtès
2016-11-26 4:42 ` Leo Famulari
2016-11-26 15:11 ` 宋文武
2016-11-27 22:10 ` Ludovic Courtès
2016-11-28 10:06 ` Efraim Flashner
2016-11-28 14:13 ` ‘guix pull’ and external dependencies Ludovic Courtès
2016-11-29 1:58 ` Chris Marusich
2016-11-29 14:54 ` Ludovic Courtès
2016-12-06 9:34 ` Offloading to use Guile-SSH instead of lsh Ludovic Courtès
Code repositories for project(s) associated with this public inbox
https://git.savannah.gnu.org/cgit/guix.git
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).