The two SHA256 sums printed above from a) the downloaded CDN image and b) the locally built image,
must be identical, and must match the SHA256 from the payload of the NNS proposal.
It has come to our attention that the URL list in the proposal does not include the link to the gzipped tarball, only to the tarball compressed with zstd. This is an oversight that I take responsibility for. Weβve been gearing up to distributing more highly-compressed replica updates in order for all of us to save bandwidth, and in the process of producing a viable release, I forgot to include the less-compressed replica update in the proposal.
URLs that should have been embedded in the proposal:
Fortunately, the images will build reproducibly, and you can verify yourself that the two images we distribute for this update are identical. To verify that the gzipped tarball and the zstd-compressed tarball images are identical, you can download both images then check with code as follows:
# This assumes your shell is bash or bash-compatible.
cd # return to home directory
mkdir -p tmp/extraordinaryverification # create a temporary directory
cd tmp/extraordinaryverification
# now obtain the two update image tarballs
wget -c https://download.dfinity.systems/ic/69e1408347723dbaa7a6cd2faa9b65c42abbe861/guest-os/update-img/update-img.tar.zst https://download.dfinity.systems/ic/69e1408347723dbaa7a6cd2faa9b65c42abbe861/guest-os/update-img/update-img.tar.gz
# calculate the sum of both, uncompressed
zcat update-img.tar.gz | sha256sum - ; zstdcat update-img.tar.zst | sha256sum -
# output ought to be identical for both commands, verifying they contain the same data when uncompressed
# e43d0638dd47afb08ba69f93769155fdd7842f74b912d1e5c05968bffea0de37 -
# e43d0638dd47afb08ba69f93769155fdd7842f74b912d1e5c05968bffea0de37 -
# verify sum of the supplied zstd-compressed tarball
sha256sum update-img.tar.zst
# update-img.tar.zst 972df53a4d2fac0279c237289e579b94d9ccbbd28a626e6dc734e10519467df8"
# will match the sha256_hex noted in https://dashboard.internetcomputer.org/proposal/126095
# release disk space after this verification step
rm -f update-img.tar.zst update-img.tar.gz
# return to previous directory
cd -
I apologize for this extraordinary circumstance. To err is human β I guess I was a bit extra human today .
@dmanu thank you for making this comment on the forum. It saved the CodeGov team from asking several questions. Everyone seemed to understand what happened based on your explanation.
At the time of this comment on the forum there are still 2 days left in the voting period, which means there is still plenty of time for others to review the proposal and vote independently.
We had several very good reviews of the Release Notes on these proposals by @Zane, @cyberowl, @ZackDS, @massimoalbarello, and @ilbert. The IC-OS Verification was also performed by @Gekctek, @tiago89, and @jwiegley. I recommend folks talk a look and see the excellent work that was performed on these reviews by the entire CodeGov team. Feel free to comment here if you have any questions or suggestions.
@ZackDS made a few interesting observations in his review. Nothing in particular that was a question or concern, but he did provide some references to additional information that is directly related to the changes in several of the commits. It was interesting to see how he can connect changes to other information.