Ekaitz Zarraga talks about the mission to achieve a full source bootstrap of the RISC-V architecture on Guix Linux. He introduces RISC-V and what makes it different. Discusses the importance of a full source bootstrap for security and trust in computing. Then talks through the multi-year mission to make it a reality on Guix.
It is specifically convenient using Guix-the-system within a foreign distribution,
such as Debian, for development and tests. The package management
system can be used on top of the system, but I find it quite interesting to
explore the potential of the Guix distribution in the context of virtualized
environments. For personal use, that is also the ideal way to avoid breaking
your own daily boxes every couple of days with daredevil approaches to personal
computing.
Let's give a second look at Guix-the-system the main GNU Project distribution
I dealt with in a previous
post. This post is not
specifically limited to the distribution, it is also of interest when using Guix
in a foreign distribution, even if some configuration details change.
Docker is known to have less than optimal security defaults, hence the hype for Podman. If you want to run rootless containers in your Guix System, it is sufficient to add the following to your operating-system configuration.
In the last few days, I got familiar with Guix, which is both a modern package
management system and the main GNU Project distribution for Linux and Hurd (the Guix system).
As a package management system, it can be installed on most foreign distributions,
including Debian and any other, as an alternative/additional packaging system.
Samba or CIFS file sharing is a finicky area at best, but widely used,
especially since it was heavily pushed by Microsoft in the Windows
ecosystem, This makes it widely used in corporate and NAS environments
and even for Linux file sharing.
Having promoted Guix as one of the tools to support reproducible
research workflows, we are happy that it is now officially presented as
one way to produce and review software artifacts that accompany articles
submitted to SuperComputing 2024
(SC24), the leading HPC conference. In this post we look at what this
entails and reflect on the role of reproducible software deployment on
conference artifact evaluation.
In the first part of this post, last month, I described my attempt at using my
Guix home server as a virtualisation environment. With a clever use of the Guile
programming language (haha, really, by copying other people's code from the
internet!) I was able to set up a small number of services, each one in its
dedicated virtual machine for security-through-compartmentalisation.
About
Planet Guix is a meta-blog that collects posts from the blogs of various Guix hackers and contributors.