From mboxrd@z Thu Jan 1 00:00:00 1970 From: Chris Marusich Subject: Re: 'guix build' and garbage collection Date: Thu, 06 Apr 2017 20:47:06 -0700 Message-ID: <87inmgg9qd.fsf@gmail.com> References: <878tnjk489.fsf@gmail.com> <87inmnb1ha.fsf@gnu.org> <871stakn8v.fsf@gmail.com> <87shlprhxn.fsf@gnu.org> <87vaqlmp33.fsf@gmail.com> <877f30tlph.fsf@gnu.org> Mime-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha256; protocol="application/pgp-signature" Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:42218) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1cwKri-0000Tl-Ma for guix-devel@gnu.org; Thu, 06 Apr 2017 23:47:15 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1cwKrh-0000LH-QN for guix-devel@gnu.org; Thu, 06 Apr 2017 23:47:14 -0400 In-Reply-To: <877f30tlph.fsf@gnu.org> ("Ludovic \=\?utf-8\?Q\?Court\=C3\=A8s\=22'\?\= \=\?utf-8\?Q\?s\?\= message of "Tue, 04 Apr 2017 14:13:14 +0200") List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org Sender: "Guix-devel" To: Ludovic =?utf-8?Q?Court=C3=A8s?= Cc: guix-devel@gnu.org --=-=-= Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable ludo@gnu.org (Ludovic Court=C3=A8s) writes: > Hi! > > Chris Marusich skribis: > >> Do you know why the intensional model hasn't been deployed in the 11 >> years since the thesis was published? To learn more, I can think of a >> few places to look (Nix email lists, other Nix-related research papers), >> but if you have specific recommendations, it would be helpful! > > The intensional model (content-address item) works well if and only if > packages are 100% bit-reproducible, which they are not (yet!). > > Also I=E2=80=99m not sure how substitutes could work with this model sinc= e one > cannot refer to the build result until it=E2=80=99s available. FYI, section 6.4.4 (p. 157) of Eelco's thesis describes how substitution works in the intensional model. When performing substitution for a store path p, if a trusted substitute for p has been registered, then it is tried, and the substitution is considered successful if and only if the output's content-addressed store path equals p. If I learn more about why Nix doesn't use the intensional model, I'll let you know. =2D-=20 Chris --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEy/WXVcvn5+/vGD+x3UCaFdgiRp0FAljnC7oACgkQ3UCaFdgi Rp1b3A/+JWaEKY0tqQFBXzfzohmGH6BhXueKtb0hOrfV1ojPP7fk10eR/ulTKZUJ ++mXCOultGTtUicXy3H8sslzFesNe7vKBkUxxTB7kUPE5fkXW7HywB4lQM8XuKt6 smtY/pGfeiCSyzE//iSP05ydkmNiRDzT0+sTXOZj28kFj8qXAr3tZCqBG1VyEUWG E86v8wwv7yRyOMk7G6mJQa6Qd3ed966GxazCaHRufph7j7HNQKeH53Vervp3JX+X j+aiKlR+ZZ3N/fLiaECevmemTUutTLksXKoi20B2u3GGiwiX/UrQGTJEZ6Kvw9y4 JytFgoyu3omO8yFpCi6ZQgHQUzQwkKEBvKK/eiGWejpQislakbaJK0nMYNVNOmu/ WV6sdPwMqcllfBXkB92ukZD9boPWaPYEc5RH98QL30iTcU27TBVnhP9nIQ9jwTpR 38DaD6k/MZR8z7Djs1HCLhLuxu69ayj2Geq67pwo3nuOUWIucGmEvNdMk25eI5tB rIpJytSoKRQC2FJNcbH1pPTQKpl7moApcbQZ67AEL0/glkRnV7BhINb7WqNaV73K okJOa/cIP2oJOy6hu6Waz9+QQq7A9vmNMvcUpk/I4fNbP3jOK016QCqjaNYODo5p 52bKm5UTQfbbW6qvf2eaHkjBlfcyoyzdHktP5YazlA0QIRsSIr0= =BbJe -----END PGP SIGNATURE----- --=-=-=--