From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp11.migadu.com ([2001:41d0:2:bcc0::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms0.migadu.com with LMTPS id qPGGOXOCVGKkKQAAgWs5BA (envelope-from ) for ; Mon, 11 Apr 2022 21:33:07 +0200 Received: from aspmx1.migadu.com ([2001:41d0:2:bcc0::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp11.migadu.com with LMTPS id wEyeNnOCVGKrYwEA9RJhRA (envelope-from ) for ; Mon, 11 Apr 2022 21:33:07 +0200 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 6CC3213261 for ; Mon, 11 Apr 2022 21:33:07 +0200 (CEST) Received: from localhost ([::1]:50292 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1ndzmc-00040D-J5 for larch@yhetil.org; Mon, 11 Apr 2022 15:33:06 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:51350) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1ndzmS-000404-7H for guix-devel@gnu.org; Mon, 11 Apr 2022 15:32:56 -0400 Received: from mail-40140.protonmail.ch ([185.70.40.140]:15681) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1ndzmQ-00044q-5E for guix-devel@gnu.org; Mon, 11 Apr 2022 15:32:55 -0400 Date: Mon, 11 Apr 2022 19:32:39 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com; s=protonmail; t=1649705564; bh=5zOleR4StpOHe9CfNkQYkepAVP8MJhHw8Wi9As/8qyc=; h=Date:To:From:Cc:Reply-To:Subject:Message-ID:In-Reply-To: References:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID; b=xWQqjkpopYW8gMMn7BkoL+SDfrSszasy+aWm9dn7ht/L2uriCNi4oTtBJkYQFTYdr r99gkvHVCbXtGu2w53cZgH1P2ypBJYWyOQMe7+p2qR1VW8gwLZRTafplAEEg7FieBD CCzAamAXgHHLlozRjFaOs+48zoWUkYlOh+3bqZ+Bf9+F0wkkBVfvkDY6F2QGgVMFUN vOA8ESxElQu3i2XjuDWUmK8WPmy5ba0z5mX1typ9c4heTvIRR8H7+F1y62Ma7+XREz nn5SqxebArgYbU0I8IBEtYSif2d3v8CmgOxQUARippv4fP9hWDPPiYCYbDuRThaZ8a GQLgcOhOh/IeQ== To: Justin Veilleux From: Kaelyn Cc: guix-devel@gnu.org Subject: Re: service extensions to guix-service-type Message-ID: In-Reply-To: <346fbbef-02b7-55a3-1d4a-92efa768c163@cock.li> References: <346fbbef-02b7-55a3-1d4a-92efa768c163@cock.li> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Received-SPF: pass client-ip=185.70.40.140; envelope-from=kaelyn.alexi@protonmail.com; helo=mail-40140.protonmail.ch X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: guix-devel@gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: Kaelyn Errors-To: guix-devel-bounces+larch=yhetil.org@gnu.org Sender: "Guix-devel" X-Migadu-Flow: FLOW_IN X-Migadu-To: larch@yhetil.org X-Migadu-Country: US ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1649705587; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:list-id:list-help: list-unsubscribe:list-subscribe:list-post:dkim-signature; bh=5zOleR4StpOHe9CfNkQYkepAVP8MJhHw8Wi9As/8qyc=; b=SqyNlq+dYr3weKOD2W7/eeQyX053V89WlmhG+Q4e1uRT4G97CmU6JBrIQsNPGry+e8oplT gc8BP/OOeUrn/AsGIJZmAslb9Th3tagpNy8o9ciBh63Q1dUKbSaH8fgz0BNHwVeSvtM20o CDSJCScVT7bxsHZR8VVl8l3dI6WAnARy8iDp6SdGDu+e5sROJr1PNuaqYZr1bK5QvtU7tV y1QllK1fqFHO0BszZL6kZWJVtlvaD3FYkqTTx9sdowovnXBOQR6ntNqhveEbdtxCT6Q8NM ckJ6ujQ1FHb2bbKzqq/xlPTnG9Nk+P+M5TI/AmPJYRGuNVYRRJNbq2V4xGpSfQ== ARC-Seal: i=1; s=key1; d=yhetil.org; t=1649705587; a=rsa-sha256; cv=none; b=qVlFWrkVtWOMdReafbHyX3AEoLP9/7153tyZK257fWp5Hl/uhkiju+xkyad8Mvqso4vhai sL0Uaq0bMSx3YlPVRuA+ePwP/L4TEo/vDa1TsJQ4xkfrRGSxVxbYqwthF47hJ0RxScbgPm SHRlnPQYxMy7ocH0OLnQka+LKVFc/QgiwAdegdLnPvzBJW638FRVfTAQsvwv2Exy3HULRp dCW5C0BxPTNKKLFLBH1dc/OuWMV3b+c/J3YfiHAil+bukfcduNjlwVIaIxn9Ql2YIzKa2f HxmKoU4iIoTCpnnLBAm3LIpQGtTtTJBoHYmgOjjZmd1/Zr9K43mL99+LFTyk3A== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=pass header.d=protonmail.com header.s=protonmail header.b=xWQqjkpo; dmarc=pass (policy=quarantine) header.from=protonmail.com; spf=pass (aspmx1.migadu.com: domain of "guix-devel-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-devel-bounces+larch=yhetil.org@gnu.org" X-Migadu-Spam-Score: -4.07 Authentication-Results: aspmx1.migadu.com; dkim=pass header.d=protonmail.com header.s=protonmail header.b=xWQqjkpo; dmarc=pass (policy=quarantine) header.from=protonmail.com; spf=pass (aspmx1.migadu.com: domain of "guix-devel-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-devel-bounces+larch=yhetil.org@gnu.org" X-Migadu-Queue-Id: 6CC3213261 X-Spam-Score: -4.07 X-Migadu-Scanner: scn0.migadu.com X-TUID: 7eahhp4b6C3b ------- Original Message ------- On Sunday, April 10th, 2022 at 8:19 PM, Justin Veilleux wrote: > Hi guix-devel. > > For my os.scm, I want to create a service which encapsulates the process > of adding channels to the global channels file, adding substitute urls > to the daemon and also adding authorized keys to the daemon. With the > service extension system, I was able to do the first thing by extending > `special-files-service-type`. However, I cannot do the last two things, > because the current definition of guix-service-type only exposes > chroot-directories (what is the use case for this, btw?). > > Is there a reason for this particular design? I will probably submit a > patch to add this functionality. > > Cheers. Hi Justin, You should be able to add authorized keys and substitute URLs by modifying = the guix-service-type's config in your OS's list of services. For example: (modify-services %desktop-services (guix-service-type config =3D> (guix-configuration (inherit config) (substitute-urls (cons* "http://myserver:8880" (guix-configuration-substitute-urls config))) (authorized-keys (cons* (gexp:local-file "myserver-signing-key.pub") (guix-configuration-authorized-keys config))))= )) (More info on the guix-configuration fields can be found at https://guix.gn= u.org/en/manual/devel/en/html_node/Base-Services.html#Base-Services :) Hope that helps! Cheers, Kaelyn