| ▲ | What if Python was natively distributable?(medium.com) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 49 points by bzurak 3 days ago | 24 comments | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | ok123456 3 minutes ago | parent | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
https://decomposition.al/CSE232-2024-09/readings/note-distri... | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | MomsAVoxell 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
I ask this question, but instead: I ask it of Lua. As in, what if there was a Linux distro that focused, primarily, on building a Lua layer on top of everything, system-wise. Just replace all the standard stuff with one single, system-friendly language: Lua. C/C++ everything as it currently is: put Lua on top all the way to the Desktop. It’s only a thought experiment, except there are cases where I can see a way to use it, and in fact have done it, only not to the desktop, such as of course embedded. Realtime data collection, processing and management. In this case, it is superlative to have a single system/app language on top of C/C++. So I think there may be a point in the future where this ‘single language for everything’ becomes a mantra in distro land. I see the immense benefit. Lua table state can be easily transferred, give or take a bit of resource management vis a vis sync’ing state and restoring it appropriately. Lua Bytecode, itself, in a properly defined manner can serve as a perfectly cromulant wire spec. Do it properly and nobody will ever know it isn’t just a plain ol’ C struct on an event handler, one of the fastest, except it’ll be very well abstracted to the application. Oh, and if things are doing bytecode, may as well have playback and transactions intrinsically… it is all, after all, just a stream. App state as gstreamer plugin? Within grasp, imho… | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | schmichael 25 minutes ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Absolutely wild to see none of the long lineage of similar attempts mentioned here. The earliest I could find with a quick search was Pyro which started in 1998 and still seems to be going: https://pyro4.readthedocs.io/en/stable/ RPyC came along in the aughts. There's a long history of "transparent clustering and rpc" efforts in Python that could be used or drawn on. Sad to see that history ignored here. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | ericreg92 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Whats curious to me here is that the github repo linked to in the article seems to exactly recreate the "operating system" that is called an "opinion in the wrong layer". Perhaps I am misunderstanding this, but after looking at the code what exactly are we achieving here over other frameworks? The repo is obviously very new (and the author certainly seems busy), so perhaps a better question is what do we aim to achieve? So far it seems like the exact same pattern with some catchy naming. Regardless, I love ambitious projects furiously coded by one crazy person. And I mean "crazy" in the best sense of the word, not as an insult. This is what open source is all about. Please prove us all wrong. If you fail, you'll learn a ton! | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | kimi 34 minutes ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Answering the question: it would be called "the Erlang VM", and you'd use Elixir to program it. https://elixir-lang.readthedocs.io/en/latest/mix_otp/10.html | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | blopker 2 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Every time I see something like this (turn function calls into a network call), I reflect fondly on the list of fallacies in distributed computing [0]. These are issues that largely have to be handled in an application-specific way, and cannot be solved in the general case. This list alone has saved me many late debugging nights, just by not making or using systems that ignore the list. [0]: https://en.wikipedia.org/wiki/Fallacies_of_distributed_compu... | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | lelanthran 2 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Pah - all these newcomers with interpreted/bytecode languages for remote functions! It's easy to send text or bytecode to another instance of your runtime. I did a distributed system sending native code functions to be executed remotely. Fair enough, it was for academic purposes, but it worked[1]. ------------------------------------- [1] By "worked" I mean got a passing grade on a thesis that got an IMDB number. Probably still got the actual PDF somewhere, or maybe it was indexed by google at some point. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | mohamedkoubaa 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
The distributed object fallacy is never going away, is it? https://martinfowler.com/articles/distributed-objects-micros... | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | hosh 2 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
Meanwhile, in BEAM land, this is a solved problem, and just watching different languages converge into towards the set of primitives and constraints. It is hard to replicate BEAM’s premptive scheduler, but I would not be surprised if someone will end up thinking they invented something novel by adding queues (mailboxes), or failing that, something like go channels. And even then, once you have a workable set of primitives, it turns out that there are some orchestration patterns that recurs over and over again, so people will converge towards OTP once the primitives are there. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | petcat 3 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
I don't have much experience with this kind of thing, but from here it looks like a program written this way would be nearly impossible to reason about performance when something as simple as a function call in your Python interpreter can have wild fluctuations in predictability just due to underlying network latency, remote host saturation, etc. It seems like you would need an entire observability framework built and instrumented on top of this to ever really be that useful. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | extr 2 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
LLM generated article. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | westurner 2 hours ago | parent | prev [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
cloudpickle serializes code without signatures; which is an RCE vuln. It is much safer to distribute signed code in signed packages out of band and send only non-executable data in messages. It is more safe to store distributed messages in a page with the NX bit flipped. A compromise of any client in this system results in DOS and arbitrary RCE; but that's an issue with most distributed task worker systems. To take a zero trust approach, you can't rely on the shared TLS key or the workers never being compromised. mDNS doesn't scale beyond a broadcast segment without mDNS repeaters (which don't scale) which are on multiple network segments. Something centralized like Dask, for example, can log and track state centrally to handle task retries on network, task, and worker failure. But Dask doesn't satisfy zero trust design guidelines either. How are these systems distinct from botnets with a shared TLS key and no certificate revocation? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||