spack VS rfcs

Compare spack vs rfcs and see what are their differences.

spack

A flexible package manager that supports multiple versions, configurations, platforms, and compilers. (by spack)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
spack rfcs
52 49
3,949 488
2.3% 5.5%
10.0 5.0
4 days ago 3 days ago
Python
Apache-2.0 or MIT Creative Commons Attribution Share Alike 4.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

spack

Posts with mentions or reviews of spack. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-06.
  • Autodafe: "freeing your freeing your project from the clammy grip of autotools."
    4 projects | news.ycombinator.com | 6 Apr 2024
    > Are we talking about the same autotools?

    Yes. Instead of figuring out how to do something particular with every single software package, I can do a --with-foo or --without-bar or --prefix=/opt/baz-1.2.3, and be fairly confident that it will work the way I want.

    Certainly with package managers or (FreeBSD) Ports a lot is taken care of behind the scenes, but the above would also help the package/port maintainers as well. Lately I've been using Spack for special-needs compiles, but maintainer ease also helps there, but there are still cases one a 'fully manual' compile is still done.

    > Suffice it to say, I prefer to work with handwritten makefiles.

    Having everyone 'roll their own' system would probably be worse, because any "mysteriously failure" then has to be debugged specially for each project.

    Have you tried Spack?

    * https://spack.io

    * https://spack.readthedocs.io/en/latest/

  • FreeBSD has a(nother) new C compiler: Intel oneAPI DPC++/C++
    2 projects | news.ycombinator.com | 7 Mar 2024
    Well, good luck with that, cause it's broken.

    Previous release miscompiled Python [1]

    Current release miscompiles bison [2]

    [1] https://github.com/spack/spack/issues/38724

    [2] https://github.com/spack/spack/issues/37172#issuecomment-181...

  • Essential Command Line Tools for Developers
    29 projects | dev.to | 15 Jan 2024
    gh is available via Homebrew, MacPorts, Conda, Spack, Webi, and as a…
  • The Curious Case of MD5
    4 projects | news.ycombinator.com | 3 Jan 2024
    > I can't count the number of times I've seen people say "md5 is fine for use case xyz" where in some counterintuitive way it wasn't fine.

    I can count many more times that people told me that md5 was "broken" for file verification when, in fact, it never has been.

    My main gripe with the article is that it portrays the entire legal profession as "backwards" and "deeply negligent" when they're not actually doing anything unsafe -- or even likely to be unsafe. And "tech" knows better. Much of tech, it would seem, has no idea about the use cases and why one might be safe or not. They just know something's "broken" -- so, clearly, we should update.

    > Just use a safe one, even if you think you "don't need it".

    Here's me switching 5,700 or so hashes from md5 to sha256 in 2019: https://github.com/spack/spack/pull/13185

    Did I need it? No. Am I "compliant"? Yes.

    Really, though, the main tangible benefit was that it saved me having to respond to questions and uninformed criticism from people unnecessarily worried about md5 checksums.

  • Spack Package Manager v0.21.0
    1 project | news.ycombinator.com | 12 Nov 2023
  • Show HN: FlakeHub – Discover and publish Nix flakes
    2 projects | news.ycombinator.com | 22 Aug 2023
  • Nixhub: Search Historical Versions of Nix Packages
    3 projects | news.ycombinator.com | 20 Jul 2023
    [1] https://github.com/spack/spack/blob/develop/var/spack/repos/...
  • Cython 3.0 Released
    4 projects | news.ycombinator.com | 18 Jul 2023
    In Spack [1] we can express all these constraints for the dependency solver, and we also try to always re-cythonize sources. The latter is because bundled cythonized files are sometimes forward incompatible with Python, so it's better to just regenerate those with an up to date cython.

    [1] https://github.com/spack/spack/

  • Linux server for physics simulations
    1 project | /r/linux | 7 Jul 2023
    You want to look at the tools used for HPC systems, these are generally very well tried and tested and can be setup for single machine usage. Remote access - we use ssh, but web interfaces such as Open On Demand exist - https://openondemand.org/. For managing Jobs, Slurm is currently the most popular option - https://slurm.schedmd.com/documentation.html. For a module system (to load software and libraries per user), Spack is a great - https://spack.io/. You might also want to consider containerisation options, https://apptainer.org/ is a good option.
  • Simplest way to get latest gcc for any platform ?
    3 projects | /r/cpp | 31 May 2023
    git clone https://github.com/spack/spack.git ./spack/bin/spack install gcc

rfcs

Posts with mentions or reviews of rfcs. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-22.
  • Eelco Dolstra's leadership is corrosive to the Nix project
    6 projects | news.ycombinator.com | 22 Apr 2024
    > (after eelco ignored the PR for quite a while, also!)

    Clicking that link takes us to a PR that was opened on 2024-02-02. The initial response from the Nix author comes 7 minutes later. Puck has multiple back and forths with other members Github, but her next interaction with the Nix author comes the next day on 2024-02-03. This is also the first time in the conversation where she "reminds him ... to even read her PR message". There's a second interaction later that same day during which she does similar, but it's worth noting this is pointing to a different message and appears to be less a "reminder to read" and more re-iterating what they feel is their argument against the Nix author's own arguments. Puck then continues to have back and forth with other commenters but as of today, there has been no further comments from the Nix author after 2024-02-03, and no further comments from Puck after 2024-02-08.

    This hardly to my mind qualifies either as "having to remind him multiple times to even read her PR message at all" or "after eelco ignored the PR for quite a while, also!" So as I said it's a fairly weak claim, and feels more like a "bastard eating crackers" reaction to the PR than an actual showing of poor behavior.

    As for the "Meson example", I didn't ignore it. As I stated in my comment, I had at that point read two of the referenced discussions in detail, and thus commented on them. I didn't comment in the "Meson example" for the simple reason that I hadn't read it.

    I have read it now, and equally find it confusing.

    1) The claim in the letter is that the proposal has "passed RFC, for five years", yet the RFC itself only appears to have been opened 2022-08-24. It's been a while since grade school for me, and I'll admit COVID has warped all our sense of time, but I'm pretty sure 2022 is not 5 years ago.

    2) The first completed working implementation of the change doesn't appear to have been done until 2023-01-18 (https://github.com/NixOS/rfcs/pull/132#issuecomment-13874661...). Again this is much less than 5 years old.

    3) On 2023-03-20, the author of the PR for this change states:

    > the RFC has made it past most of the early stages and the current goal is to achieve parity with the current buildsystem before replacing it.

    (https://github.com/NixOS/rfcs/pull/132#issuecomment-14768433...)

    Again, this doesn't seem to fit at all with the claim that the proposal has "passed RFC, for five years"

    4) On 2023-11-01, the Nix author themselves asks for updates on the RFC implementation, an action which doesn't seem congruent with someone who is willy nilly single handedly blocking things and being a disruption to the process. And the author of the PR states:

    >the main block is actually a lack of free time for the main devs!

    (https://github.com/NixOS/rfcs/pull/132#issuecomment-17890770...)

    This doesn't seem to point to evidence that the Nix author is single handedly holding up this process.

    5) On 2024-03-21 the PR author notes:

    > currently working on adding support to build nix-perl, waiting for assistance

    (https://github.com/NixOS/rfcs/pull/132#issuecomment-20135356...)

    Not to sound like a broken record, but if the issue isn't finished as of a few weeks ago, it can hardly be considered to be held up by the Nix author for 5 years.

    I agree that one of the links in the open letter is to a comment on a PR from 2019, which is indeed 5 year ago, and does indeed contain the Nix author commenting that they are skeptical of the change because "he doesn't know meson but knows his own build system". But given that there's an entire wealth of history on the topic since then, including progress on the feature that appears completely unobstructed by the Nix author and an open PR that is a mere 3 weeks old for a current implementation, I find myself again unconvinced of this rampant bad behavior on the part of the Nix author. And I reiterate again that these complaints are very weak and don't do much to support the open letter at best, and act as contrary evidence at worst.

    Again there might be other context to be had that is missing, but if one is going to write a massive "open letter" complaining about bad behavior, I expect the links in that letter to point to actual bad behavior, and or provide the relevant context necessary to show how what appears to be normal dissent is a passive aggressive continuation of obstruction. I have to assume the links one provides in an open letter is their strongest evidence, and if this is all the authors have... I am unconvinced.

  • Build System Schism: The Curse of Meta Build Systems
    3 projects | news.ycombinator.com | 19 Mar 2024
    Nix with dynamic derivations (RFC92) could potentially beat this curse.

    https://github.com/NixOS/rfcs/blob/master/rfcs/0092-plan-dyn...

  • Show HN: Flox 1.0 – Open-source dev env as code with Nix
    17 projects | news.ycombinator.com | 13 Mar 2024
    See: A plan to stabilize the new CLI and Flakes incrementally https://github.com/NixOS/rfcs/pull/136
  • RSS can be used to distribute all sorts of information
    9 projects | news.ycombinator.com | 20 Nov 2023
  • I like gentoo's package deprecation process
    4 projects | news.ycombinator.com | 5 Nov 2023
    NixOS recently introduced "problem" infrastructure to deal with such problems more gracefully and explicitly:

    https://github.com/NixOS/rfcs/blob/master/rfcs/0127-issues-w...

  • NixOS and Flakes Book: An unofficial book for beginners (free)
    6 projects | news.ycombinator.com | 9 Oct 2023
    For some more context: Flawed as they are, Flakes solve a large number of problems Nix experiences without them. This is why I, and presumably many others, use them even in their current experimental state.

    An RFC was recently accepted to commit to forming a plan towards stabilization of Flakes: https://github.com/NixOS/rfcs/pull/136

    Personally, I don't believe there won't be any breaking changes, but I also believe that the stabilization of Flakes is still a ways away and hope that there will be a reasonable migration path.

  • NixOS RFC 136 approved: A plan to stabilize the new CLI and Flakes incrementally
    1 project | /r/hackernews | 14 Aug 2023
  • NixOS RFC 136 accepted: A plan to stabilize the new CLI and Flakes incrementally
    11 projects | news.ycombinator.com | 12 Aug 2023
  • The NixOS Foundation's Call to Action: S3 Costs Require Community Support
    1 project | /r/linux | 4 Jun 2023
    NixOS needs to merge https://github.com/NixOS/rfcs/pull/133 to solve the issue
  • Bootspec
    1 project | news.ycombinator.com | 1 Jun 2023

What are some alternatives?

When comparing spack and rfcs you can also consider the following projects:

HomeBrew - 🍺 The missing package manager for macOS (or Linux)

nix-ros-overlay - ROS overlay for the Nix package manager

nixpkgs - Nix Packages collection & NixOS

not-os - An operating system generator, based on NixOS, that, given a config, outputs a small (47 MB), read-only squashfs for a runit-based operating system, with support for iPXE and signed boot.

nix-processmgmt - Experimental Nix-based process management framework

Ansible - Ansible is a radically simple IT automation platform that makes your applications and systems easier to deploy and maintain. Automate everything from code deployment to network configuration to cloud management, in a language that approaches plain English, using SSH, with no agents to install on remote systems. https://docs.ansible.com.

nix - Nix, the purely functional package manager

ohpc - OpenHPC Integration, Packaging, and Test Repo

emacs-overlay - Bleeding edge emacs overlay [maintainer=@adisbladis]

NixOS-docker - DEPRECATED! Dockerfiles to package Nix in a minimal docker container

nix-1p - A (more or less) one page introduction to Nix, the language.