forked from dashpay/dash
-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
721dd15
commit 0760a0b
Showing
4 changed files
with
858 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,225 @@ | ||
# Bootstrappable Bitcoin Core Builds | ||
|
||
This directory contains the files necessary to perform bootstrappable Bitcoin | ||
Core builds. | ||
|
||
[Bootstrappability][b17e] furthers our binary security guarantees by allowing us | ||
to _audit and reproduce_ our toolchain instead of blindly _trusting_ binary | ||
downloads. | ||
|
||
We achieve bootstrappability by using Guix as a functional package manager. | ||
|
||
## Requirements | ||
|
||
Conservatively, a x86_64 machine with: | ||
|
||
- 4GB of free disk space on the partition that /gnu/store will reside in | ||
- 24GB of free disk space on the partition that the Bitcoin Core git repository | ||
resides in | ||
|
||
> Note: these requirements are slightly less onerous than those of Gitian builds | ||
## Setup | ||
|
||
### Installing Guix | ||
|
||
If you're just testing this out, you can use the | ||
[Dockerfile][fanquake/guix-docker] for convenience. It automatically speeds up | ||
your builds by [using substitutes](#speeding-up-builds-with-substitute-servers). | ||
If you don't want this behaviour, refer to the [next | ||
section](#choosing-your-security-model). | ||
|
||
Otherwise, follow the [Guix installation guide][guix/bin-install]. | ||
|
||
> Note: For those who like to keep their filesystems clean, Guix is designed to | ||
> be very standalone and _will not_ conflict with your system's package | ||
> manager/existing setup. It _only_ touches `/var/guix`, `/gnu`, and | ||
> `~/.config/guix`. | ||
### Choosing your security model | ||
|
||
Guix allows us to achieve better binary security by using our CPU time to build | ||
everything from scratch. However, it doesn't sacrifice user choice in pursuit of | ||
this: users can decide whether or not to bootstrap and to use substitutes. | ||
|
||
After installation, you may want to consider [adding substitute | ||
servers](#speeding-up-builds-with-substitute-servers) to speed up your build if | ||
that fits your security model (say, if you're just testing that this works). | ||
This is skippable if you're using the [Dockerfile][fanquake/guix-docker]. | ||
|
||
If you prefer not to use any substitutes, make sure to set | ||
`ADDITIONAL_GUIX_ENVIRONMENT_FLAGS` like the following snippet. The first build | ||
will take a while, but the resulting packages will be cached for future builds. | ||
|
||
```sh | ||
export ADDITIONAL_GUIX_ENVIRONMENT_FLAGS='--no-substitutes' | ||
``` | ||
|
||
Likewise, to perform a bootstrapped build (takes even longer): | ||
|
||
```sh | ||
export ADDITIONAL_GUIX_ENVIRONMENT_FLAGS='--bootstrap --no-substitutes' | ||
``` | ||
|
||
### Using a version of Guix with `guix time-machine` capabilities | ||
|
||
> Note: This entire section can be skipped if you are already using a version of | ||
> Guix that has [the `guix time-machine` command][guix/time-machine]. | ||
Once Guix is installed, if it doesn't have the `guix time-machine` command, pull | ||
the latest `guix`. | ||
|
||
```sh | ||
guix pull --max-jobs=4 # change number of jobs accordingly | ||
``` | ||
|
||
Make sure that you are using your current profile. (You are prompted to do this | ||
at the end of the `guix pull`) | ||
|
||
```bash | ||
export PATH="${HOME}/.config/guix/current/bin${PATH:+:}$PATH" | ||
``` | ||
|
||
## Usage | ||
|
||
### As a Development Environment | ||
|
||
For a Bitcoin Core depends development environment, simply invoke | ||
|
||
```sh | ||
guix environment --manifest=contrib/guix/manifest.scm | ||
``` | ||
|
||
And you'll land back in your shell with all the build dependencies required for | ||
a `depends` build injected into your environment. | ||
|
||
### As a Tool for Deterministic Builds | ||
|
||
From the top of a clean Bitcoin Core repository: | ||
|
||
```sh | ||
./contrib/guix/guix-build.sh | ||
``` | ||
|
||
After the build finishes successfully (check the status code please), compare | ||
hashes: | ||
|
||
```sh | ||
find output/ -type f -print0 | sort -z | xargs -r0 sha256sum | ||
``` | ||
|
||
#### Recognized environment variables | ||
|
||
* _**HOSTS**_ | ||
|
||
Override the space-separated list of platform triples for which to perform a | ||
bootstrappable build. _(defaults to "x86\_64-linux-gnu | ||
arm-linux-gnueabihf aarch64-linux-gnu riscv64-linux-gnu")_ | ||
|
||
> Windows and OS X platform triplet support are WIP. | ||
* _**SOURCES_PATH**_ | ||
|
||
Set the depends tree download cache for sources. This is passed through to the | ||
depends tree. Setting this to the same directory across multiple builds of the | ||
depends tree can eliminate unnecessary redownloading of package sources. | ||
|
||
* _**MAX_JOBS**_ | ||
|
||
Override the maximum number of jobs to run simultaneously, you might want to | ||
do so on a memory-limited machine. This may be passed to `make` as in `make | ||
--jobs="$MAX_JOBS"` or `xargs` as in `xargs -P"$MAX_JOBS"`. _(defaults to the | ||
value of `nproc` outside the container)_ | ||
|
||
* _**SOURCE_DATE_EPOCH**_ | ||
|
||
Override the reference UNIX timestamp used for bit-for-bit reproducibility, | ||
the variable name conforms to [standard][r12e/source-date-epoch]. _(defaults | ||
to the output of `$(git log --format=%at -1)`)_ | ||
|
||
* _**V**_ | ||
|
||
If non-empty, will pass `V=1` to all `make` invocations, making `make` output | ||
verbose. | ||
|
||
* _**ADDITIONAL_GUIX_ENVIRONMENT_FLAGS**_ | ||
|
||
Additional flags to be passed to `guix environment`. For a fully-bootstrapped | ||
build, set this to `--bootstrap --no-substitutes` (refer to the [security | ||
model section](#choosing-your-security-model) for more details). Note that a | ||
fully-bootstrapped build will take quite a long time on the first run. | ||
|
||
## Tips and Tricks | ||
|
||
### Speeding up builds with substitute servers | ||
|
||
_This whole section is automatically done in the convenience | ||
[Dockerfiles][fanquake/guix-docker]_ | ||
|
||
For those who are used to life in the fast _(and trustful)_ lane, you can use | ||
[substitute servers][guix/substitutes] to enable binary downloads of packages. | ||
|
||
> For those who only want to use substitutes from the official Guix build farm | ||
> and have authorized the build farm's signing key during Guix's installation, | ||
> you don't need to do anything. | ||
#### Authorize the signing keys | ||
|
||
For the official Guix build farm at https://ci.guix.gnu.org, run as root: | ||
|
||
``` | ||
guix archive --authorize < ~root/.config/guix/current/share/guix/ci.guix.gnu.org.pub | ||
``` | ||
|
||
For dongcarl's substitute server at https://guix.carldong.io, run as root: | ||
|
||
```sh | ||
wget -qO- 'https://guix.carldong.io/signing-key.pub' | guix archive --authorize | ||
``` | ||
|
||
#### Use the substitute servers | ||
|
||
The official Guix build farm at https://ci.guix.gnu.org is automatically used | ||
unless the `--no-substitutes` flag is supplied. | ||
|
||
This can be overridden for all `guix` invocations by passing the | ||
`--substitute-urls` option to your invocation of `guix-daemon`. This can also be | ||
overridden on a call-by-call basis by passing the same `--substitute-urls` | ||
option to client tools such at `guix environment`. | ||
|
||
To use dongcarl's substitute server for Bitcoin Core builds after having | ||
[authorized his signing key](#authorize-the-signing-keys): | ||
|
||
``` | ||
export ADDITIONAL_GUIX_ENVIRONMENT_FLAGS='--substitute-urls="https://guix.carldong.io https://ci.guix.gnu.org"' | ||
``` | ||
|
||
## FAQ | ||
|
||
### How can I trust the binary installation? | ||
|
||
As mentioned at the bottom of [this manual page][guix/bin-install]: | ||
|
||
> The binary installation tarballs can be (re)produced and verified simply by | ||
> running the following command in the Guix source tree: | ||
> | ||
> make guix-binary.x86_64-linux.tar.xz | ||
### When will Guix be packaged in debian? | ||
|
||
Vagrant Cascadian has been making good progress on this | ||
[here][debian/guix-package]. We have all the pieces needed to put up an APT | ||
repository and will likely put one up soon. | ||
|
||
[b17e]: http://bootstrappable.org/ | ||
[r12e/source-date-epoch]: https://reproducible-builds.org/docs/source-date-epoch/ | ||
|
||
[guix/install.sh]: https://git.savannah.gnu.org/cgit/guix.git/plain/etc/guix-install.sh | ||
[guix/bin-install]: https://www.gnu.org/software/guix/manual/en/html_node/Binary-Installation.html | ||
[guix/env-setup]: https://www.gnu.org/software/guix/manual/en/html_node/Build-Environment-Setup.html | ||
[guix/substitutes]: https://www.gnu.org/software/guix/manual/en/html_node/Substitutes.html | ||
[guix/substitute-server-auth]: https://www.gnu.org/software/guix/manual/en/html_node/Substitute-Server-Authorization.html | ||
[guix/time-machine]: https://guix.gnu.org/manual/en/html_node/Invoking-guix-time_002dmachine.html | ||
|
||
[debian/guix-package]: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850644 | ||
[fanquake/guix-docker]: https://github.com/fanquake/core-review/tree/master/guix |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,119 @@ | ||
#!/usr/bin/env bash | ||
export LC_ALL=C | ||
set -e -o pipefail | ||
|
||
# Determine the maximum number of jobs to run simultaneously (overridable by | ||
# environment) | ||
MAX_JOBS="${MAX_JOBS:-$(nproc)}" | ||
|
||
# Download the depends sources now as we won't have internet access in the build | ||
# container | ||
make -C "${PWD}/depends" -j"$MAX_JOBS" download ${V:+V=1} ${SOURCES_PATH:+SOURCES_PATH="$SOURCES_PATH"} | ||
|
||
# Determine the reference time used for determinism (overridable by environment) | ||
SOURCE_DATE_EPOCH="${SOURCE_DATE_EPOCH:-$(git log --format=%at -1)}" | ||
|
||
# Execute "$@" in a pinned, possibly older version of Guix, for reproducibility | ||
# across time. | ||
time-machine() { | ||
guix time-machine --url=https://github.com/dongcarl/guix.git \ | ||
--commit=b066c25026f21fb57677aa34692a5034338e7ee3 \ | ||
-- "$@" | ||
} | ||
|
||
# Function to be called when building for host ${1} and the user interrupts the | ||
# build | ||
int_trap() { | ||
cat << EOF | ||
** INT received while building ${1}, you may want to clean up the relevant | ||
output, deploy, and distsrc-* directories before rebuilding | ||
Hint: To blow everything away, you may want to use: | ||
$ git clean -xdff --exclude='/depends/SDKs/*' | ||
Specifically, this will remove all files without an entry in the index, | ||
excluding the SDK directory. Practically speaking, this means that all ignored | ||
and untracked files and directories will be wiped, allowing you to start anew. | ||
EOF | ||
} | ||
|
||
# Deterministically build Bitcoin Core for HOSTs (overridable by environment) | ||
# shellcheck disable=SC2153 | ||
for host in ${HOSTS=x86_64-linux-gnu arm-linux-gnueabihf aarch64-linux-gnu riscv64-linux-gnu x86_64-w64-mingw32}; do | ||
|
||
# Display proper warning when the user interrupts the build | ||
trap 'int_trap ${host}' INT | ||
|
||
( | ||
# Required for 'contrib/guix/manifest.scm' to output the right manifest | ||
# for the particular $HOST we're building for | ||
export HOST="$host" | ||
|
||
# Run the build script 'contrib/guix/libexec/build.sh' in the build | ||
# container specified by 'contrib/guix/manifest.scm'. | ||
# | ||
# Explanation of `guix environment` flags: | ||
# | ||
# --container run command within an isolated container | ||
# | ||
# Running in an isolated container minimizes build-time differences | ||
# between machines and improves reproducibility | ||
# | ||
# --pure unset existing environment variables | ||
# | ||
# Same rationale as --container | ||
# | ||
# --no-cwd do not share current working directory with an | ||
# isolated container | ||
# | ||
# When --container is specified, the default behavior is to share | ||
# the current working directory with the isolated container at the | ||
# same exact path (e.g. mapping '/home/satoshi/bitcoin/' to | ||
# '/home/satoshi/bitcoin/'). This means that the $PWD inside the | ||
# container becomes a source of irreproducibility. --no-cwd disables | ||
# this behaviour. | ||
# | ||
# --share=SPEC for containers, share writable host file system | ||
# according to SPEC | ||
# | ||
# --share="$PWD"=/bitcoin | ||
# | ||
# maps our current working directory to /bitcoin | ||
# inside the isolated container, which we later cd | ||
# into. | ||
# | ||
# While we don't want to map our current working directory to the | ||
# same exact path (as this introduces irreproducibility), we do want | ||
# it to be at a _fixed_ path _somewhere_ inside the isolated | ||
# container so that we have something to build. '/bitcoin' was | ||
# chosen arbitrarily. | ||
# | ||
# ${SOURCES_PATH:+--share="$SOURCES_PATH"} | ||
# | ||
# make the downloaded depends sources path available | ||
# inside the isolated container | ||
# | ||
# The isolated container has no network access as it's in a | ||
# different network namespace from the main machine, so we have to | ||
# make the downloaded depends sources available to it. The sources | ||
# should have been downloaded prior to this invocation. | ||
# | ||
# shellcheck disable=SC2086 | ||
time-machine environment --manifest="${PWD}/contrib/guix/manifest.scm" \ | ||
--container \ | ||
--pure \ | ||
--no-cwd \ | ||
--share="$PWD"=/bitcoin \ | ||
--expose="$(git rev-parse --git-common-dir)" \ | ||
${SOURCES_PATH:+--share="$SOURCES_PATH"} \ | ||
${ADDITIONAL_GUIX_ENVIRONMENT_FLAGS} \ | ||
-- env HOST="$host" \ | ||
MAX_JOBS="$MAX_JOBS" \ | ||
SOURCE_DATE_EPOCH="${SOURCE_DATE_EPOCH:?unable to determine value}" \ | ||
${V:+V=1} \ | ||
${SOURCES_PATH:+SOURCES_PATH="$SOURCES_PATH"} \ | ||
bash -c "cd /bitcoin && bash contrib/guix/libexec/build.sh" | ||
) | ||
|
||
done |
Oops, something went wrong.