The way that this works is "containerization" or "sandboxing",
which can give an IP to anything ranging from one running binary
to a large collection. I started the current effort using Docker
containerization, but its standard setups require a lot of
filesystem recreation, each Docker container has an entire working
OS filesystem apart from the kernel; but during the studies for
Docker, I blundered into something else called firejail, and
firejail appears to be just what the doctor ordered, it seems to
do just about everything while using the existing filesystem, and
one can very easily turn off the features one doesn't need.
To cut to the chase, after boot and system prep, first one creates
an IP bridge:
sudo brctl addbr br0
sudo ifconfig br0 10.99.99.1/24
and then starts JACK in the sandboxes:
# The master hardware sandbox is named MASTER, the
QJackCTL profile is named MASTER,
# the JACK server is named MASTER.
nohup firejail --name=MASTER --noprofile --net=br0
--ip=10.99.99.10 \
/usr/bin/jackd -n MASTER -m -dalsa -r48000 -p256
-n2 -Xseq -D -Chw:NVidia -Phw:NVidia \
> ~/LOGS/jack-master.log &
# The SRO hardware sandbox is named SRO, the QJackCTL
profile for it is named SRO,
# the JACK server is named SRO.
nohup firejail --name=SRO --noprofile --net=br0
--ip=10.99.99.15 \
/usr/bin/jackd -n SRO -dnetone \
> ~/LOGS/jack-sro.log &
# Ditto for STRINGS.
nohup firejail --name=STRINGS --noprofile --net=br0
--ip=10.99.99.20 \
/usr/bin/jackd -n STRINGS -dnetone \
> ~/LOGS/jack-strings.log &
And then connects the JACK servers, by adding jack_netsource
processes into the existing MASTER sandbox:
#!/bin/bash
# SRO
nohup firejail --join=MASTER jack_netsource -s MASTER
-H 10.99.99.15 > ~/LOGS/netsource-sro.log &
# STRINGS
nohup firejail --join=MASTER jack_netsource -s MASTER
-H 10.99.99.20 > ~/LOGS/netsource-strings.log &
I have not tested further yet, no clients -- am working on
something closer to production now -- but this is looking very
good, the connections are reported successful, zero xruns, and on
this prototyping box -- 2.6GHz AMD quad, ten-plus years old --
0.8% DSP in use on all three JACK servers and very low memory
usage. This is considerably better than I had hoped.
The sandboxed binaries above, cannot reach outside the one box as
written above, but the excellent and very responsive developer of
Firejail has provided
a method.
As a result this could all be done box-independently -- for
instance, if one's "monolith is the building" (going to have to
remember that, Patrick), one could have all indicated motherboards
NFS or SMB to one file server, and then use a central control GUI
machine to run all firejails on whichever hardware was proven most
appropriate, and testing could become much easier. Along the way
I also found 'xpra' likely to be a very good way to setup such a
central control, am going to test that as a side project.
I tried using netjack2 first, but ran into mystery behavior, xruns
started piling huge when the second slave connected. So I went
with netjack1, especially because
Patrick Shirkey already proved the above paradigm in multibox mode
using netjack1. I am currently using netjack1 under jackd2, but
will change to netjack under jackd1 if a reason to do so appears.
I am now working on a working dual-JACK prototype, in a
near-production design, as a next step towards a generally
transportable MultiJACK Patch Management methodology and the next
big build of my Box of No Return :-)
Cheers, and thanks everyone!!!!