From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp10.migadu.com ([2001:41d0:403:478a::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms9.migadu.com with LMTPS id +ArUI3qODWWfuAAAG6o9tA:P1 (envelope-from ) for ; Fri, 22 Sep 2023 14:54:18 +0200 Received: from aspmx1.migadu.com ([2001:41d0:403:478a::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp10.migadu.com with LMTPS id +ArUI3qODWWfuAAAG6o9tA (envelope-from ) for ; Fri, 22 Sep 2023 14:54:18 +0200 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 6171844D45 for ; Fri, 22 Sep 2023 14:54:18 +0200 (CEST) Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gnu.org header.s=fencepost-gnu-org header.b=hBotmSNA; spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org"; dmarc=pass (policy=none) header.from=gnu.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1695387258; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:resent-cc: resent-from:resent-sender:resent-message-id:list-id:list-help: list-unsubscribe:list-subscribe:list-post:dkim-signature; bh=lq8K8dMi+KVea48r7S7IdT1m3buQEnjwhZ0EqyNcQVo=; b=axmjqa4FToP6mnIJga+sKJeQgOPdE7jHoOgXRzUx3jdFyR0TGUXGgpieygGzjyUaX9EeS6 1iKrCzK2kOfOBbvgpZP+Xgm1KBJT+haIr5f6KMuA4BwWN+CJT3X+OUH5lLIIM/lBLDHoS7 4JFneIVNy6m+2fJyJQJhhZALNIjPhsBGnyxKz3qyNw+jT9IDWAg12v4XsJsvsRCptBjzb+ pIrLlqW7vymmc5Lru/i/m0p6L08tm30DSNt5jjDy/rPvJ5Aq9MpKBxwj8jcgwfEQtrwKUV qUc6TDhUqFUD4PqJM6x+TFVrxbVb4xQRrwNn4t4MHVPb9NXukeAhavEepGhpSg== ARC-Seal: i=1; s=key1; d=yhetil.org; t=1695387258; a=rsa-sha256; cv=none; b=ZeoMg4K39dtwKmokXkYgKn+CTsJIXgnEt1AelwlCVWt0ksikm88axtSwns78aHI/TUl0CP ENzmHm0a1iqpMhrPBk8u/H1esUbrrNEq8yTfglk+3ZhwTGiagcYGUDnyS9XRuPfDolSk/8 86TRtIrdWIuVt6EwdnSNWqG/SrDv/TA+CE3XNWmv3J4GaF2AEF8cUAZVHDnyugkP5j5axQ 8PpFtBl4YQshLiaPTWPvMKGDQMVxlbU+yjiN5FSMxgSs4P1aIOBwYiNeAy14vXebMPEYtv 4HdzlwKU8dDBl3/kyRsJ96Hh+37+JqB2Y2PKS3UNMzaqTz6wOnYC8O8HABkubw== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gnu.org header.s=fencepost-gnu-org header.b=hBotmSNA; spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org"; dmarc=pass (policy=none) header.from=gnu.org Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1qjffN-0000rA-Q9; Fri, 22 Sep 2023 08:53:53 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qjffL-0000lu-L5 for guix-patches@gnu.org; Fri, 22 Sep 2023 08:53:51 -0400 Received: from debbugs.gnu.org ([2001:470:142:5::43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1qjffL-0007bL-BZ for guix-patches@gnu.org; Fri, 22 Sep 2023 08:53:51 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1qjffV-0005ce-Sv for guix-patches@gnu.org; Fri, 22 Sep 2023 08:54:01 -0400 X-Loop: help-debbugs@gnu.org Subject: [bug#66156] [PATCH 00/12] Introducing Smart Hurdloading Resent-From: Ludovic =?UTF-8?Q?Court=C3=A8s?= Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Fri, 22 Sep 2023 12:54:01 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: report 66156 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: 66156@debbugs.gnu.org Cc: Ludovic =?UTF-8?Q?Court=C3=A8s?= , Josselin Poiret , Janneke Nieuwenhuizen X-Debbugs-Original-To: guix-patches@gnu.org Received: via spool by submit@debbugs.gnu.org id=B.169538718621537 (code B ref -1); Fri, 22 Sep 2023 12:54:01 +0000 Received: (at submit) by debbugs.gnu.org; 22 Sep 2023 12:53:06 +0000 Received: from localhost ([127.0.0.1]:35546 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1qjfec-0005bJ-6i for submit@debbugs.gnu.org; Fri, 22 Sep 2023 08:53:06 -0400 Received: from lists.gnu.org ([2001:470:142::17]:58300) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1qjfea-0005ah-JI for submit@debbugs.gnu.org; Fri, 22 Sep 2023 08:53:04 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qjfeI-0008Vk-Va for guix-patches@gnu.org; Fri, 22 Sep 2023 08:52:47 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qjfeE-0007UY-AQ; Fri, 22 Sep 2023 08:52:43 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=gnu.org; s=fencepost-gnu-org; h=MIME-Version:Date:Subject:To:From:in-reply-to: references; bh=lq8K8dMi+KVea48r7S7IdT1m3buQEnjwhZ0EqyNcQVo=; b=hBotmSNAEchxMV zKdUtoo3OcLfWJkMCAOPlZUjp8u4LN3rAfewEpNNHarOytYu97Oz2b0akhLF/UrIufvdBPJDQ5DVH pm4fU8bZnt9ptd+vFKWRYb4EmtPBWS7EbJDpY6tTVrpef14qnvlkyMQmZ5dA6/bKEcGbnTPayyqgn xfvID5yypkOkJb2sY+I7H1dtuUyFSUcdacdCb3TcssXQetBJcSUPSwHAlXxVfofQ2SBHh5MCh/9up p3cDW61B/XqhMyGzmdSgROCfdHGJ4eAuASMFK/m5JZMzW7kPIE5tK2960olvLH2so6CaaZZsZwOn6 EqGZ6GDm1ZGSFS6IHMNw==; From: Ludovic =?UTF-8?Q?Court=C3=A8s?= Date: Fri, 22 Sep 2023 14:52:27 +0200 Message-ID: X-Mailer: git-send-email 2.41.0 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+larch=yhetil.org@gnu.org Sender: guix-patches-bounces+larch=yhetil.org@gnu.org X-Migadu-Flow: FLOW_IN X-Migadu-Country: US X-Migadu-Scanner: mx0.migadu.com X-Migadu-Spam-Score: -5.94 X-Spam-Score: -5.94 X-Migadu-Queue-Id: 6171844D45 X-TUID: KlaX8zVveXx3 This patch series, my friends, sets up Smart Hurdloading™, sometimes referred to as “Hurd auto-offloading”. (Yeah I worked hard on branding…) Concretely, if you add (service hurd-vm-service-type), you can now run: guix build libreoffice -s i586-gnu on your machine, and the childhurd will take care of keeping one CPU core busy for a while. There’s no configuration involved beyond this one (service hurd-vm-service-type) line: no need to exchange SSH keys, substitute keys, write /etc/guix/machines.scm, and all that. It’s all taken care off automatically. One key element here is support for declarative and extensible offloading configuration—meaning that /etc/guix/machines.scm is now optionally generated straight from your ‘operating-system’ config. The rest is about generating keys, authorizing them, etc. The series is a bit of a potpourri: I fixed Hurd issues here and there (currently offloading to a childhurd doesn’t work on ‘master’, because of the locale issue, for instance), improved documentation, etc. I also took a couple of long detours not shown here that might lead to further improvements in the future. My goal is to extend this mechanism beyond the Hurd, to have a generic mechanism to spin up Guix System VMs we can easily offload to. Thoughts? Ludo’. Ludovic Courtès (12): system: vm: Remove unused variable. secret-service: Increase default handshake timeout. services: hurd-vm: Use the default SSH port number. gnu: glibc-utf8-locales: Reintroduce input labels. services: guix: Use the right locale package on GNU/Hurd. services: guix: Support declarative offloading setup. services: childhurd: Authorize the childhurd’s key on the host. services: hurd-vm: ‘image’ field has to be an record. tests: hurd-vm: Remove custom disk image configuration. services: hurd-vm: Disable password-based authentication for root. doc: Give an example showing how to add an account in the childhurd. services: hurd-vm: Implement zero-configuration offloading. doc/guix.texi | 167 ++++++++++++++++++++++++++------ gnu/build/secret-service.scm | 2 +- gnu/packages/base.scm | 4 +- gnu/services/base.scm | 58 ++++++++++- gnu/services/virtualization.scm | 153 ++++++++++++++++++++++++++--- gnu/system/vm.scm | 41 ++------ gnu/tests/virtualization.scm | 68 ++++++++++--- 7 files changed, 394 insertions(+), 99 deletions(-) base-commit: 3d8d67ef6928f5d81118c97f03372cd341eab8b0 -- 2.41.0