5.1. Setup¶
5.1.1. Masonry Scripts¶
The masonry scripts are bundled with VisIt’s source code. You will need to download
the source code and extract masonry from visit/src/tools/dev
. There are a few options
for downloading the source code. If you want a released version of VisIt then go to the
source code downloads page and look for the VisIt sources
link. The other option is to download from the git repository.
Once you have the source code, copy visit/src/tools/dev/masonry
to a location of your choosing.
5.1.2. Configuration¶
- In the
opts
directory copy one of the*.json
files and rename it as desired. For example:cp mb-3.1.1-darwin-10.14-x86_64-release.json mb-3.1.2-darwin-10.14-x86_64-release.json
- Open the JSON configuration file (see Figure 5.55) created in step 1 and modify or add the following options as needed:
arch
: required- The build architecture (e.g., darwin-x86_64).
boost_dir
: optional- The path to boost if installed on your system. This also triggers the setting of two CMake options (VISIT_USE_BOOST:BOOL and BOOST_ROOT:PATH).
branch
: required- The git branch to checkout and build.
build_dir
: optional- The directory to place all of the files generated from the build process. If this option isn’t specified the build directory will default to
build-<json_base>
(e.g., build-mb-3.1.2-darwin-10.14-x86_64-release) in your current working directory. build_types
: required- A list of builds for masonry to create.
build_visit
: requiredAllows you to set the
build_visit
options.cmake_ver
: required - the CMake version to useargs
: optional - arguments forbuild_visits
libs
: optional - third-party libraries to buildmake_flags
: optional - Make flagsbuild_xdb
: optional- Set the VISIT_ENABLE_XDB:BOOL option to ON if true.
cert
: required for signing/notarization- The Developer ID signing certificate Common Name.
cmake_extra_args
: optional- Specify extra arguments for CMake.
config_site
: optional- Specify a path for the config site file.
cxx_compiler
: optional- Specify the C++ compiler
c_compiler
: optional- Specify the C compiler
entitlements
: required for notarization- Specify the location of VisIt’s entitlements file. The one used for VisIt releases is located in the
opts
directory and is named visit.entitlements. See Hardened Runtime for more details on entitlements. force_clean
: optional- Removes all files and directories from your build folder.
git
: requiredmode
: required - set this option to ssh or httpsgit_uname
: optional - github usernamedepth
: optional - specify an integer value for a shallow clone with a history truncated to the specified number of commits.make_nthreads
: optional- The number of parallel threads to use when building the source code.
notarize
: required for notarizationSpecify the options needed for notarization.
username
: - Apple ID emailpassword
: - App-specific password or keychain string containing the App-specific passwordasc_provider
: - Provider short namebundle_id
: - VisIt’s bundle identifierplatform
: optional- Specify the platform (osx or linux)
skip_checkout
: optional- if you have to restart masonry and already have the source code checked out you can skip that step by setting this option to yes.
tarball
: optional- Specify the path to the source tar file. This option is currently not being used.
version
: required- The version of VisIt you are building.
5.1.3. You Might Have to Adjust your PATH¶
There are cases where individual package’s configuration processes wind up executing tools in your path ($PATH
) to help set variables used in compilation.
For example, the MPICH
configuration winds up using pkg-config
, if it is found in your path, to help set CPPFLAGS
and LDFLAGS
.
In one case, libxml2
was installed in both /opt/local/lib
and in /usr/lib
but because /opt/local/bin
was first in $PATH
, /opt/local/bin/pkg-config
was used to set paths for libxml2
to /opt/local/include
and /opt/local/lib
.
This results in a build of MPICH
using non-system libxml2
which will fail the macOS
(otool -L
) @rpath
validation checks on each of the shared libs VisIt is built with later.
The solution is to be sure your $PATH
variable is set such that nothing non-standard can be found in your path prior to running masonry.
One way to do this is to echo $PATH | tr ':' '\n'
to display, line-by-line, each path defined in $PATH
and then remove from that list all non-standard (for example, anything beginning with /opt
) paths
set STD_PATH=`echo $PATH | tr ':' '\n' | grep -v '/opt' | tr '\n' ':'`
env PATH=$STD_PATH python3 src/tools/dev/masonry/bootstrap_visit.py src/tools/dev/masonry/opts/mb-3.3.0-darwin-10.14-x86_64-release.json
5.1.4. What Can Go Wrong?¶
Apart from commonly encountered issues building each third party library built by a bv_xxx.sh
script, there are many other ways getting the macOS release ready can fail.
There are at least 3 levels of certifications (from your macOS keychain) involved.
- The Apple Root Certificate Authority (CA) certificates (
Apple Root CA
orApple Root CA - G2
orApple Root CA - G3
- Apple Worldwide Developer Relations Certificate Authority certificates (also called the intermediate certificate authority)
- Developer ID Certificate Authority for the organization (Lawrence Livermore) and yourself. These all need to be correctly configured and tied to each other from the lowest level (also called a leaf certificate), yourself to the root.
- The Apple Root Certificate Authority (CA) certificates (
Sometimes Apple expires its certificates and you may need to go get updated certificates.
Sometimes your own certificate can expire. Currently, Charles Heizer is the LLNL point of contact for adding developers and updating their expired certificates.
You might need to evaluate the validity of your certificate using Apple KeyChain Certificate Assistant to confirm its all working.
If you are VPN’d into LLNL, codesigning and notorizing a release may fail.
If you have MacPorts, Homebrew, Fink or other macOS package managers, python package builds may wind up enabling (and then creating a release that is dependent upon) libraries that are available only to users with similar package managers installed. Worse, you won’t have any idea this has happend until you give the release to another developer who has a mac that is not using said package managers and they try to use it and it doesn’t work due to missing libraries. You can use
otool
combined withfind
to try to find any cases where the release has such dependences. For example, the commandfind /Volumes/VisIt-3.3.0/VisIt.app/Contents/Resources/3.3.0/darwin-x86_64 -name '*.so -o -name '*.dylib' -exec otool -L {} \; -print | grep -v rpath
will find cases of non-rpath’d library dependencies build into either shared (
.so
) or dynamic (.dylib
) libraries. Note, however, that sometimes Python EGG’s contained Zip-compressed.so
files that this check won’t find.Just removing associated stuff from your
$PATH
will not prevent these build dependencies. Fixing them likely means finding some of the individual packages inbv_python.sh
and addingsite.cfg
files or otherwise finding build switches that explicitly disable the features creating the need for these dependencies.Sometimes, a python package winds up using the python interpreter in
Xcode
instead of the one built for the release of VisIt you are preparing. For example, Sphinx can wind up getting installed with all command-line scripts using a shebang which is an absolute path toXcode
’s python interpreter. We’ve added patching code tobv_python.sh
to help correct for this.You can check whether
VisIt.app
is properly codesigned using this commandcodesign -v -v /Volumes/VisIt-3.3.0/VisIt.app
which should produce output like so…
/Volumes/VisIt-3.3.0/VisIt.app: valid on disk /Volumes/VisIt-3.3.0/VisIt.app: satisfies its Designated Requirement
You can check whether
VisIt.app
is properly notarized using this commandspctl -a -t exec -vv /Volumes/VisIt-3.3.0/VisIt.app
which should produce output like so…
/Volumes/VisIt-3.3.0/VisIt.app: accepted source=Notarized Developer ID origin=Developer ID Application: Lawrence Livermore National Laboratory (A827VH86QR)
You can get more details about why a notorization failed using the command
xcrun altool --notarization-info ``uuid`` --username ``username-email`` --password @keychain:VisIt
where
uuid
(also called the request identifier) is the id you get (in email or printed by masonry to the logs) andusername-email
is your Apple developer ID email address. And, this should produce output like so…No errors getting notarization info. Date: 2022-07-18 18:59:44 +0000 Hash: af5e1231bae06e051e5f1a0cfa37219ec4cb5ec2f76971557d9389f1d8edcadd LogFileURL: https://osxapps-ssl.itunes.apple.com/itunes-assets/Enigma122/v4/d6/a7/08/d6a7083b-c6d7-6e8f-8a3c-0db0d406d3da/developer_log.json?accessKey=1658530108_1173406174696701459_H%2BzLM3o4PjKeGN8jgdqPBTVz5wUY5BMY7R7Lvh8UrBmn6kxu%2F4XVdkvSsUE5wrAlbmW%2FCCLSRzU%2FUHBGNhgOa1DZDoXQXtXOAUx3sk1ptivix7dQhzQa11SU9EnbESN6PkZ5je9g4IOrqMdibbB7hhxhTgMvQhiKEO9BXjne9xs%3D RequestUUID: 1a8b8756-9c4c-4908-b6db-387a5144ce43 Status: invalid Status Code: 2 Status Message: Package Invalid
Cut and paste the
LogFileURL
into a browser to go examine the results. Doing so for the above example yielded a json page like so…{ "logFormatVersion": 1, "jobId": "1a8b8756-9c4c-4908-b6db-387a5144ce43", "status": "Invalid", "statusSummary": "Archive contains critical validation errors", "statusCode": 4000, "archiveFilename": "VisIt.dmg", "uploadDate": "2022-07-18T18:59:44Z", "sha256": "af5e1231bae06e051e5f1a0cfa37219ec4cb5ec2f76971557d9389f1d8edcadd", "ticketContents": null, "issues": [ { "severity": "error", "code": null, "path": "VisIt.dmg/VisIt.app/Contents/Resources/3.3.0/darwin-x86_64/lib/python/lib/python3.7/site-packages/Pillow-7.1.2-py3.7-macosx-10.15-x86_64.egg/PIL/_webp.cpython-37m-darwin.so", "message": "The binary is not signed.", "docUrl": null, "architecture": "x86_64" }, { "severity": "error", "code": null, "path": "VisIt.dmg/VisIt.app/Contents/Resources/3.3.0/darwin-x86_64/lib/python/lib/python3.7/site-packages/Pillow-7.1.2-py3.7-macosx-10.15-x86_64.egg/PIL/_webp.cpython-37m-darwin.so", "message": "The signature does not include a secure timestamp.", "docUrl": null, "architecture": "x86_64" }, { "severity": "error", "code": null, "path": "VisIt.dmg/VisIt.app/Contents/Resources/3.3.0/darwin-x86_64/lib/python/lib/python3.7/site-packages/Pillow-7.1.2-py3.7-macosx-10.15-x86_64.egg/PIL/_imagingft.cpython-37m-darwin.so", "message": "The binary is not signed.", "docUrl": null, "architecture": "x86_64" }, { "severity": "error", "code": null, "path": "VisIt.dmg/VisIt.app/Contents/Resources/3.3.0/darwin-x86_64/lib/python/lib/python3.7/site-packages/Pillow-7.1.2-py3.7-macosx-10.15-x86_64.egg/PIL/_imagingft.cpython-37m-darwin.so", "message": "The signature does not include a secure timestamp.", "docUrl": null, "architecture": "x86_64" } ] }
5.1.5. Signing macOS Builds¶
To code sign your VisIt build, you must be enrolled in the Apple Developer Program and have a valid Developer ID certificate. Below are simple steps to get started, reference the links for more detailed information.
- Enroll in the Apple Developer Program, if needed, and create your Developer ID certificates.
- Install Apple certificates into your keychain
- From Xcode go to the account preferences (
Xcode->Preferences->Account
) and select the Manage Certificates… button. - Click the + to add your certificates (see Figure 5.56).
- From Xcode go to the account preferences (
- Add the Developer ID signing certificate Common Name to the cert option in the masonry JSON configuration file.
Warning
Remain disconnected from VPN when building and code signing a VisIt release. The code signing process talks to Apple servers and validates credentials with them. If you are on VPN, the validation may fail with a message similar to:
Certificate trust evaluation did not return expected result. (5) [leaf AnchorApple ChainLength CheckIntermediateMarkerOid CheckLeafMarkersProdAndQA]
Certificate trust evaluation for api.apple-cloudkit.com did not return expected result. No error..
Certificate trust evaluation did not return expected result. (5) [leaf AnchorApple ChainLength CheckIntermediateMarkerOid CheckLeafMarkersProdAndQA]
Certificate trust evaluation for api.apple-cloudkit.com did not return expected result. No error..
Could not establish secure connection to api.apple-cloudkit.com
Read more about Apple’s Code Signing documentation.
5.1.6. App-Specific Password¶
To create an app-specific password go to: https://appleid.apple.com/account/manage . Generate the app-specific password by navigating to: Security->App-Specific Password.
To avoid having a plain-text password in your config file, you can add the app-specific password to your macOS keychain. To do this, run the following command:
security add-generic-password -a "apple-id-email" -w "app-specific password" -s "notarizing-name"
The -s
parameter is the name that this item will have in your keychain. Apple’s documentation on Customizing the Notarization Workflow provides a good overview of the notarization process and a link detailing how to generate and manage app-specific passwords.