Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

look into HashDist's jailtool #540

Open
boegel opened this issue Mar 18, 2013 · 8 comments
Open

look into HashDist's jailtool #540

boegel opened this issue Mar 18, 2013 · 8 comments

Comments

@boegel
Copy link
Member

boegel commented Mar 18, 2013

We should look whether the jailtool that HashDist provides can help us to avoid missing dependencies when building (new) software packages.

https://github.com/hashdist/hdist-jail

This should increase the confidence that all dependencies are captured when pull requests are issues for new software.

@fgeorgatos
Copy link
Collaborator

and perhaps also look at combining it wiht http://docker.io/,
since that might help to deliver 100% reproducible builds and even runs (out of a common original template).

@fgeorgatos
Copy link
Collaborator

following a suggestion of Kenneth, here is some reference info for docker-io,
which could be a good candidate for reinforcing total build reproducibility, esp. if combined with hashdist
(and among other benefits, permit the parallel builds of blact/ncbi-toolkit and other such software):

Date: Fri, 6 Dec 2013 15:04:14 -0600
From: Lokesh Mandvekar <lsm5@fedoraproject.org>
To: devel-announce@lists.fedoraproject.org
Cc: golang@lists.fedoraproject.org
Subject: docker-io rpm and docs
Message-ID: <20131206210414.GB18031@naruto.usersys.redhat.com>
Content-Type: text/plain; charset="utf-8"

Hi lists,

docker-io 0.7.0 has made its way into yum stable repos for 19, 20 and epel
and 0.7.1 is being pushed out to testing by Vincent Batts currently.
Please test and add karma here:
https://admin.fedoraproject.org/updates/docker-io

The fedora docs have been merged in the master branch and can be found here:
http://docs.docker.io/en/master/installation/fedora/

This will probably be pushed to the 'latest' branch when 0.7.2 is released,
so until then, if you click on the fedora icon here:
http://www.docker.io/gettingstarted/#h_installation, all you'll see is
http://docs.docker.io/en/latest/installation/fedora/

Comments, suggestions welcome :)
-- 
Lokesh

@fgeorgatos
Copy link
Collaborator

btw. Just for the record, Docker v0.7 (26/11/2013) seems to be of major importance because
a) it no longer requires a patched Linux kernel and seems to run fine on a plenty of unmodified envs
b) it has been now adopted by a number of other parties, including Google Compute Engine, RedHat v6.5 etc
http://www.redhat.com/about/news/press-archive/2013/11/red-hat-launches-latest-version-of-red-hat-enterprise-linux-6

@wpoely86
Copy link
Member

wpoely86 commented Dec 9, 2013

Docker seems very cool 😎 and much better then HashDist. LXC contains are really 'waterproof': the even separate the process trees.

@wpoely86
Copy link
Member

wpoely86 commented Dec 9, 2013

Using docker will be quite a bit of work. We will need a basic Linux image (with the same glibc version as our install target). Maybe using unionfs or something similar will help? The builds hosts of then needs to have a very basic Linux version.

@fgeorgatos
Copy link
Collaborator

Getting a default image is no different than, say, downloading the source
of one intel compiler.

Then, the next step is how to spawn the whole machinery is user-space,
obtaining proper builds,
presumably allowing for the first time checkinstall-like features (ie.
auto-create .rpm, .deb etc).

hashdist still has a role, fi. when you play with vars like DISPLAY, TERM,
LC_* etc;
this aspect has not yet been confined all that much within easybuild
and I'm not 100% sure that docker-io is the final say as regards that
aspect...

In fact, IMHO, the cake of these layers should give you very very
reproducible and rich buildsets:

  • docker-io -(vm/core image) > hashist -(env. tuning) > easybuild -(build
    process) > hpcbios (composite sw stacks)
    I can see how someone could obtain a major "repro" objective with just two
    of the above layers,
    yet I am not certain that all possible use-cases & needs are met in such a
    case.

@boegel
Copy link
Member Author

boegel commented Jan 31, 2015

the Nix package manager looks very interested for providing a jail tool for EasyBuild...

@boegel boegel modified the milestone: v1.X Jun 24, 2015
@boegel boegel modified the milestone: 3.x May 2, 2017
@boegel boegel modified the milestones: 3.x, 4.x Feb 20, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants