On Thu, Mar 07, 2024 at 02:09:32PM +0000, Steve George wrote: > > Hi, > > I had a couple of ideas - but would need help from someone to mentor > > 1. Moldable development in Guix > Exploratory REPL experience is one of the hall-marks of 'moldable' systems. This shortens the development cycle and improves the ability of users to explore Guix. > > The best REPL experience today is through Emacs. We have a modern nREPL implementation that is compatible with Guile. This needs further development and the Guix client side improved. > > * Develop a basic CLI Nrepl experience in guile-ares-rs (https://git.sr.ht/~abcdw/guile-ares-rs) > * Add further CLI REPL functions to Guix > * Stretch goal to add a Guix / Guile Scheme nrepl support to Conjure > (https://github.com/Olical/conjure/issues/549) > > This would need co-ordination with Andrew Tropin (abcw) and Oliver Caldwell (Olical), and some help from a Guix mentor. > > 2. Improving Docker image output (guix pack) > Docker containers are a common deployment method for applications. While they may be good for deployment, they have weak reproducibilty which Guix solves. Docker containers generated by Guix for deployment are large compared to similar deployments using Nix or Alpine. The purpose of this project is to optimise the build and deployment pipeline in Guix. > > * Examine the current 'guix pack' process for optimisations > * Optimise the build process to add docker specific capabilities like multi-stage builds > * Explore using grafts or masking to reduce final image size > > ** NOTE:** I know this is a bit weak - I don't know enough about this myself yet - is this even a good target - I think it's interesting for scientific computing? This would also be useful for "deploy this guix service as a docker container". > 3. Add sandboxing to guix packages > Improving the security for end-users by implementing optional sandboxing for desktop applications. The likes of Bubblewrap and Flatseal are available for Linux. There's some existing Nix prior-art that could be a good starting point (https://nixos.wiki/wiki/Firejail) and (https://sr.ht/~fgaz/nix-bubblewrap/) > > * Figure out which of the available options is the most sustainable > * Integrate policys and implementation into high-profile packages > * Stretch would be to create a Guile native library / approach > > Anyone interested in these - willing to mentor/co-mentor with me? > > On 4 Mar, Gábor Boskovits wrote: > > Hello guix, > > > > I coordinated with the GNU org admins, and we can still do this round, > > but we have to go fast to make this happen. I have already taken the > > initiative to try to get an ideas page up, now I would like to confirm > > if the mentors from last year are still available, and that the ideas > > are still valid. > > > > Hereby I quickly collected the projects with the respective mentors, > > please pm me your availability: > > > > Decentralized substitute distribution > > pukkamustard (pukkamustard [at] posteo [dot] net) > > attila.lendvai (ethswarm.org, scheme) > > > > Robustify long-term support for Reproducible Research > > Simon Tournier (zimoun) > > > > Develop a Web interface to configure Guix System > > Ludovic Courtès (civodul) > > > > Trusted computing: Goblins for GNU Guix > > Christopher Webber, Ludovic Courtès and Pjotr Prins > > > > Guix Data Service revision processing instrumentation and performance > > Christopher Baines > > > > Guile based build-tool > > Pjotr Prins > > > > GNU Guix system monitor > > Pjotr Prins > > > > Booting via network > > Danny Milosavljevic > > > > Syntax and semantics of systemd units in the Shepherd > > Ludovic Courtès (civodul) > > > > GNUnet integration > > no mentor available > > > > Adding modules in support of continuous integration to cuirass > > Ludovic Courtès (civodul) > > > > Continue rewrite build daemon in Guile Scheme > > Ludovic Courtès (civodul) > > > > I myself am available to co-mentor, and also to be the formal mentor > > in case someone does not feel like doing the official dance with > > Google. Currently I can commit to devoting two hours a week to this. > > > > Regards, > > g_bor > > > -- Efraim Flashner רנשלפ םירפא GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351 Confidentiality cannot be guaranteed on emails sent or received unencrypted