2019-10-10 01:50:11 +03:00
|
|
|
# `lnd`'s Reproducible Build System
|
2019-09-27 02:17:45 +03:00
|
|
|
|
2019-10-10 01:50:11 +03:00
|
|
|
This package contains the build script that the `lnd` project uses in order to
|
|
|
|
build binaries for each new release. As of `go1.13`, with some new build flags,
|
2019-09-27 02:17:45 +03:00
|
|
|
binaries are now reproducible, allowing developers to build the binary on
|
2019-10-10 01:50:11 +03:00
|
|
|
distinct machines, and end up with a byte-for-byte identical binary. However,
|
|
|
|
this wasn't _fully_ solved in `go1.13`, as the build system still includes the
|
2019-09-27 02:17:45 +03:00
|
|
|
directory the binary is built into the binary itself. As a result, our scripts
|
2019-10-10 01:50:11 +03:00
|
|
|
utilize a work around needed until `go1.13.2`.
|
2019-09-27 02:17:45 +03:00
|
|
|
|
|
|
|
## Building a New Release
|
|
|
|
|
2021-01-08 12:40:17 +03:00
|
|
|
### MacOS
|
|
|
|
|
|
|
|
The first requirement is to have [`docker`](https://www.docker.com/)
|
|
|
|
installed locally and running. The second requirement is to have `make`
|
|
|
|
installed. Everything else (including `golang`) is included in the release
|
|
|
|
helper image.
|
|
|
|
|
|
|
|
To build a release, run the following commands:
|
|
|
|
|
2021-01-17 16:58:57 +03:00
|
|
|
```shell
|
|
|
|
⛰ git clone https://github.com/lightningnetwork/lnd.git
|
|
|
|
⛰ cd lnd
|
|
|
|
⛰ git checkout <TAG> # <TAG> is the name of the next release/tag
|
|
|
|
⛰ make docker-release tag=<TAG>
|
|
|
|
```
|
2021-01-08 12:40:17 +03:00
|
|
|
|
|
|
|
Where `<TAG>` is the name of the next release of `lnd`.
|
|
|
|
|
|
|
|
### Linux/Windows (WSL)
|
2019-09-27 02:17:45 +03:00
|
|
|
|
2019-10-10 01:50:11 +03:00
|
|
|
No prior set up is needed on Linux or macOS is required in order to build the
|
|
|
|
release binaries. However, on Windows, the only way to build the release
|
|
|
|
binaries at the moment is by using the Windows Subsystem Linux. One can build
|
|
|
|
the release binaries following these steps:
|
2019-09-27 02:17:45 +03:00
|
|
|
|
2021-01-17 16:58:57 +03:00
|
|
|
```shell
|
|
|
|
⛰ git clone https://github.com/lightningnetwork/lnd.git
|
|
|
|
⛰ cd lnd
|
|
|
|
⛰ git checkout <TAG> # <TAG> is the name of the next release/tag
|
|
|
|
⛰ make release tag=<TAG>
|
|
|
|
```
|
2019-09-27 02:17:45 +03:00
|
|
|
|
2019-10-10 01:50:11 +03:00
|
|
|
This will then create a directory of the form `lnd-<TAG>` containing archives
|
|
|
|
of the release binaries for each supported operating system and architecture,
|
|
|
|
and a manifest file containing the hash of each archive.
|
2019-09-27 02:17:45 +03:00
|
|
|
|
|
|
|
## Verifying a Release
|
|
|
|
|
2019-10-10 01:50:11 +03:00
|
|
|
With `go1.13`, it's now possible for third parties to verify release binaries.
|
|
|
|
Before this version of `go`, one had to trust the release manager(s) to build the
|
|
|
|
proper binary. With this new system, third parties can now _independently_ run
|
|
|
|
the release process, and verify that all the hashes of the release binaries
|
|
|
|
match exactly that of the release binaries produced by said third parties.
|
|
|
|
|
|
|
|
To verify a release, one must obtain the following tools (many of these come
|
|
|
|
installed by default in most Unix systems): `gpg`/`gpg2`, `shashum`, and
|
|
|
|
`tar`/`unzip`.
|
|
|
|
|
|
|
|
Once done, verifiers can proceed with the following steps:
|
|
|
|
|
|
|
|
1. Acquire the archive containing the release binaries for one's specific
|
|
|
|
operating system and architecture, and the manifest file along with its
|
|
|
|
signature.
|
|
|
|
2. Verify the signature of the manifest file with `gpg --verify
|
|
|
|
manifest-<TAG>.txt.sig`. This will require obtaining the PGP keys which
|
|
|
|
signed the manifest file, which are included in the release notes.
|
|
|
|
3. Recompute the `SHA256` hash of the archive with `shasum -a 256 <filename>`,
|
|
|
|
locate the corresponding one in the manifest file, and ensure they match
|
|
|
|
__exactly__.
|
|
|
|
|
|
|
|
At this point, verifiers can use the release binaries acquired if they trust
|
|
|
|
the integrity of the release manager(s). Otherwise, one can proceed with the
|
|
|
|
guide to verify the release binaries were built properly by obtaining `shasum`
|
|
|
|
and `go` (matching the same version used in the release):
|
|
|
|
|
|
|
|
4. Extract the release binaries contained within the archive, compute their
|
|
|
|
hashes as done above, and note them down.
|
|
|
|
5. Ensure `go` is installed, matching the same version as noted in the release
|
|
|
|
notes.
|
|
|
|
6. Obtain a copy of `lnd`'s source code with `git clone
|
|
|
|
https://github.com/lightningnetwork/lnd` and checkout the source code of the
|
|
|
|
release with `git checkout <TAG>`.
|
|
|
|
7. Proceed to verify the tag with `git verify-tag <TAG>` and compile the
|
|
|
|
binaries from source for the intended operating system and architecture with
|
2020-04-21 11:20:29 +03:00
|
|
|
`make release sys=OS-ARCH tag=<TAG>`.
|
2019-10-10 01:50:11 +03:00
|
|
|
8. Extract the archive found in the `lnd-<TAG>` directory created by the
|
|
|
|
release script and recompute the `SHA256` hash of the release binaries (lnd
|
|
|
|
and lncli) with `shasum -a 256 <filename>`. These should match __exactly__
|
|
|
|
as the ones noted above.
|
2021-01-13 16:58:50 +03:00
|
|
|
|
2021-01-20 06:09:55 +03:00
|
|
|
## Verifying Docker Images
|
2021-01-13 16:58:50 +03:00
|
|
|
|
|
|
|
To verify the `lnd` and `lncli` binaries inside the
|
|
|
|
[official provided docker images](https://hub.docker.com/r/lightninglabs/lnd)
|
|
|
|
against the signed, reproducible release binaries, there is a verification
|
|
|
|
script in the image that can be called (before starting the container for
|
|
|
|
example):
|
|
|
|
|
|
|
|
```shell
|
|
|
|
$ docker pull lightninglabs/lnd:v0.12.0-beta
|
|
|
|
$ docker run --rm --entrypoint="" lightninglabs/lnd:v0.12.0-beta /verify-install.sh
|
|
|
|
$ OK=$?
|
|
|
|
$ if [ "$OK" -ne "0" ]; then echo "Verification failed!"; exit 1; done
|
|
|
|
$ docker run lightninglabs/lnd [command-line options]
|
|
|
|
```
|
2021-01-20 06:09:55 +03:00
|
|
|
|
|
|
|
# Signing an Existing Manifest File
|
|
|
|
|
|
|
|
If you're a developer of `lnd` and are interested in attaching your signature
|
|
|
|
to the final release archive, the manifest MUST be signed in a manner that
|
|
|
|
allows your signature to be verified by our verify script
|
|
|
|
`scripts/verify-install.sh`.
|
|
|
|
|
|
|
|
Assuming you've done a local build for _all_ release targets, then you should
|
|
|
|
have a file called `manifest-TAG.txt` where `TAG` is the actual release tag
|
|
|
|
description being signed. The release script expects a particular file name for
|
|
|
|
each included signature, so we'll need to modify the name of our output
|
|
|
|
signature during signing.
|
|
|
|
|
|
|
|
Assuming `USERNAME` is your current nick as a developer, then the following
|
|
|
|
command will generate a proper signature:
|
|
|
|
```
|
|
|
|
gpg --detach-sig --output manifest-USERNAME-TAG-txt.asc --clear-sign manifest-TAG.txt
|
|
|
|
```
|
|
|
|
|
|
|
|
|