mirror of
https://github.com/lightningnetwork/lnd.git
synced 2024-11-20 02:27:21 +01:00
f4901d8ff9
This readme file is better located in the docs directory as we are going to move the release script itself as well in the next commit.
71 lines
3.5 KiB
Markdown
71 lines
3.5 KiB
Markdown
# `lnd`'s Reproducible Build System
|
|
|
|
This package contains the build script that the `lnd` project uses in order to
|
|
build binaries for each new release. As of `go1.13`, with some new build flags,
|
|
binaries are now reproducible, allowing developers to build the binary on
|
|
distinct machines, and end up with a byte-for-byte identical binary. However,
|
|
this wasn't _fully_ solved in `go1.13`, as the build system still includes the
|
|
directory the binary is built into the binary itself. As a result, our scripts
|
|
utilize a work around needed until `go1.13.2`.
|
|
|
|
## Building a New Release
|
|
|
|
### macOS/Linux/Windows (WSL)
|
|
|
|
No prior set up is needed on Linux or macOS is required in order to build the
|
|
release binaries. However, on Windows, the only way to build the release
|
|
binaries at the moment is by using the Windows Subsystem Linux. One can build
|
|
the release binaries following these steps:
|
|
|
|
1. `git clone https://github.com/lightningnetwork/lnd.git`
|
|
2. `cd lnd`
|
|
3. `make release tag=<TAG> # <TAG> is the name of the next release/tag`
|
|
|
|
This will then create a directory of the form `lnd-<TAG>` containing archives
|
|
of the release binaries for each supported operating system and architecture,
|
|
and a manifest file containing the hash of each archive.
|
|
|
|
## Verifying a Release
|
|
|
|
With `go1.13`, it's now possible for third parties to verify release binaries.
|
|
Before this version of `go`, one had to trust the release manager(s) to build the
|
|
proper binary. With this new system, third parties can now _independently_ run
|
|
the release process, and verify that all the hashes of the release binaries
|
|
match exactly that of the release binaries produced by said third parties.
|
|
|
|
To verify a release, one must obtain the following tools (many of these come
|
|
installed by default in most Unix systems): `gpg`/`gpg2`, `shashum`, and
|
|
`tar`/`unzip`.
|
|
|
|
Once done, verifiers can proceed with the following steps:
|
|
|
|
1. Acquire the archive containing the release binaries for one's specific
|
|
operating system and architecture, and the manifest file along with its
|
|
signature.
|
|
2. Verify the signature of the manifest file with `gpg --verify
|
|
manifest-<TAG>.txt.sig`. This will require obtaining the PGP keys which
|
|
signed the manifest file, which are included in the release notes.
|
|
3. Recompute the `SHA256` hash of the archive with `shasum -a 256 <filename>`,
|
|
locate the corresponding one in the manifest file, and ensure they match
|
|
__exactly__.
|
|
|
|
At this point, verifiers can use the release binaries acquired if they trust
|
|
the integrity of the release manager(s). Otherwise, one can proceed with the
|
|
guide to verify the release binaries were built properly by obtaining `shasum`
|
|
and `go` (matching the same version used in the release):
|
|
|
|
4. Extract the release binaries contained within the archive, compute their
|
|
hashes as done above, and note them down.
|
|
5. Ensure `go` is installed, matching the same version as noted in the release
|
|
notes.
|
|
6. Obtain a copy of `lnd`'s source code with `git clone
|
|
https://github.com/lightningnetwork/lnd` and checkout the source code of the
|
|
release with `git checkout <TAG>`.
|
|
7. Proceed to verify the tag with `git verify-tag <TAG>` and compile the
|
|
binaries from source for the intended operating system and architecture with
|
|
`make release sys=OS-ARCH tag=<TAG>`.
|
|
8. Extract the archive found in the `lnd-<TAG>` directory created by the
|
|
release script and recompute the `SHA256` hash of the release binaries (lnd
|
|
and lncli) with `shasum -a 256 <filename>`. These should match __exactly__
|
|
as the ones noted above.
|