RFC: Rust code integration #17090

issue fanquake openend this issue on October 9, 2019
  1. fanquake commented at 9:01 pm on October 9, 2019: member

    Moving the discussion from #15798 here, as it makes more sense to have it in an issue instead of a PR. #15798 no longer reflects the current proposed Rust changes, and Rust related work is now happening across multiple others.

    Corys thoughts / introduction from #15798:

    This is not intended to be merged as-is, but instead to serve as a reference for anyone who might be interested in trying out some rust code inside of Bitcoin Core. I have no idea what works. I have lots of questions about debugging, threading, etc. But instead of trying to hack and document how things work, we thought it’d be fun for everyone to be able to poke at it and scratch our heads together :). If something interesting comes out of it, a discussion about merging can happen then.

    It is surprisingly functional. The rust tools are impeccable. I would’ve thought this would be a project that would take months/years, but the rust devs have done such a good job that mostly everything already just works. The gitian descriptors have been modified to actually incorporate working rust code. All of our currently supported platforms seem to already work (even macOS cross!) with the exception of 32bit windows and ancient linux distros. The specific issues are documented in the gitian descriptors. For now, Gitian needs net access and a larger disk volume, but those are both very temporary issues

    Why rust? I don’t know. Maybe not. But I think it’s a fair assumption to say that Rust code will eventually end up in Bitcoin Core as the result of adding a new dependency. Adoption is happing quickly. So, I think it prudent to look ahead and not only be prepared, but actively help usher it in. Already I have a few things that I would like to work on and upstream to rust-lang to make our integration nicer, and I assume that more will be uncovered as it actually gets used.

    Anybody have any fun ideas?

    There’s still discussion to be had / documentation to be added around various Rust related decisions, such as:

    • Whether to use/require the 2015 or 2018 Editions.
    • A minimum required version of the language.
    • How failures in the Rust code are (expected to be) handled by the c++ code.

    As well as higher level discussions around how far we might take the Rust integration/re-writing of certain parts of the code, and the complexities that could introduce in regards which contributors can/can’t write/review Rust, or have more/less experience with the language compared to C++ etc.

    Personally, I’d like to think that we’ll have some off-by-default Rust as part of the Bitcoin Core 0.20.0 release; and I think something like #16834 might be a good first approach. Regardless of approach, the idea of using Rust inside Bitcoin Core seems to resonate with some of the (still limited set) of other contributors I’ve discussed it with.

    Using rustc directly instead of Cargo

    The initial Rust integration PR used Cargo for managing compiling, dependencies etc. Since then, the Rust changes have been refactored to remove the cbindgen dependency and drop any usage of Cargo altogether, in favour of using rustc directly.

    See also the recent Security advisory for Cargo.

    Fetch Headers over DNS Rust-based Backup over-REST block downloader Add Parallel P2P Client in Rust

    Bootstrapping Rust using Guix

  2. fanquake added the label Brainstorming on Oct 9, 2019
  3. fanquake added the label Build system on Oct 9, 2019
  4. fanquake added the label Needs Conceptual Review on Oct 9, 2019
  5. fanquake added this to the milestone 0.20.0 on Oct 9, 2019
  6. TheBlueMatt commented at 9:39 pm on October 9, 2019: contributor

    A number of comments:

    • Obviously my favorite path to rust in core right now is the “make it easy to add new modules to download blocks/headers for anti-censorship”, which #16834 and #16762 obviously are first steps/demos of. I think its nice cause it is completely optional, both at build-time, and in the sense that we can have threads that are doing that crash (without bringing down the rest of Core due to panic catches) without it making the rest of Core broken.
    • I think we should air towards “minimum version of the language we can get by with” until we have a reason not to, and we can discuss it more then. Largely, I think #16834 is ready-to-go enough (mod review) that we can pretty much move forward with it without committing to a lot of these decisions today.
    • WRT cargo-vs-rustc: I don’t see a lot of reason to use cargo. The major benefit it provides is downloading arbitrary code from github, building it, and linking it into your program. Obviously this isn’t helpful for us, and we’ll almost certainly subtree any dependencies we take, and I went and tested linking dependencies that are subtree’d without cargo and its just a few more flags to rustc.
  7. MarcoFalke commented at 9:50 pm on October 9, 2019: member

    Be reminded that there has been an IRC discussion about this topic: http://www.erisian.com.au/bitcoin-core-dev/log-2019-04-11.html#l-392 There was no strong support for rust, but I’d like to reiterate on a few worries that have been brought up:

    On concern was that it might be a blocker for compiling Bitcoin Core on exotic systems, but that seems to be addressed by only using it for additional (optional) features.

    Another concern was that most Bitcoin Core developers and reviewers don’t have any background in rust, so rust code might be of lower quality. However, this is a chicken-and-egg problem and can be solved by adding rust in small steps.

    Finally, a concern was that we aren’t running into many bugs that rust could prevent. Rust can prevent memory and race issues, but not logic errors. While I initially agreed with this point, I concluded that switching to rust will help us with memory issues (at least for the code written in rust). Just to dig up some examples from master, that would have been impossible in rust: #6636, #16796, #13351. Happy to dig out more, but I think they are good illustrations. On top of that, I (and other people, such as a resident in the recent Chaincode Summer residency) am running into segfaults and other memory issues on a regular basis. Those runtime errors require a lot of developer attention (running in gdb, valgrind, sanitizers). Rust makes them impossible and might thus speed up the workflow.

  8. TheBlueMatt commented at 11:36 pm on October 9, 2019: contributor

    Right, I’ll note that previous discussions had a little less clear projects that might use rust in Core. The specific work in #16834 and #16762 is pretty different in nature.

    I agree with most of your concerns, but, indeed, as you point out, the specific proposals sidestep them (at least in the immediate future) somewhat. The advantage I like for Rust in this vein is that review is a little bit easier by offloading some classes of issues onto the compiler, hopefully allowing us to move a bit faster, which is uniquely important for censorship-resistance and -detection block/header fetching (as more is better, and critical).

  9. laanwj commented at 9:36 am on October 10, 2019: member

    FWIW I’m all for using Rust for non-required, non-critical functionality in Bitcoin Core. I think it’s way too early to require it for build.

    Another concern was that most Bitcoin Core developers and reviewers don’t have any background in rust

    Given what I’ve heard a lot of bitcoin developers have side-projects in rust. But as for a personal anecdote, I prefer reviewing rust code over C++. I’ve been very much disillusioned with C++ over the last years, especially the eternal issues around what is Undefined Behavior and what is not (just grep for commits and PRs by @practicalswift to find tons of them).

    Finally, a concern was that we aren’t running into many bugs that rust could prevent.

    Also because we very much tiptoe around things that might cause those kind of bugs. We’ve been extremely careful around introducing concurrency, for example, or refactoring it to be finer-grained (e.g. @TheBlueMatt’s PRs are just so scary to review), because it’s so hard to get correct in C++. And even then, there have been a few nasty race conditions. Rust could allow us to be bolder around those things, resulting in more performant code in the end.

  10. practicalswift commented at 11:06 am on October 10, 2019: contributor

    @MarcoFalke

    Finally, a concern was that we aren’t running into many bugs that rust could prevent. Rust can prevent memory and race issues, but not logic errors.

    FWIW, a small scale bug shootout:

    Both implementations written by extremely skilled and security conscious developers :) @laanwj

    I’ve been very much disillusioned with C++ over the last years, especially the eternal issues around what is Undefined Behavior and what is not (just grep for commits and PRs by @practicalswift to find tons of them).

    Three points:

    1. The UB situation in C++ is a problematic, but with some help from the sanitizers (which we are finally using!) it is not too hard to avoid relying on UB in modern C++ code. FWIW, poorly written unsafe Rust code will have UB too :)
    2. Usually it is pretty clear if something is UB or not. Any discussion is typically around the priority of fixing, and/or if relying on the specific UB is “safe in practice” (in other words: what is the likelihood of a future compiler optimisation pass exploiting this specific UB?).
    3. As always when discussing defects: don’t shoot the messenger :)

    FWIW I don’t think UB is a big problem in our code base as of today. I think our lack of continuous large-scale fuzz testing is a larger problem - something which I plan to address :)

  11. elichai commented at 12:20 pm on October 10, 2019: contributor

    I agree with most of what was said here with a few exceptions:

    1. Even though I don’t know of any security critical bug bitcoin had that was memory related I think in the long term rust can help a lot with both review time and implementation time. Because right now when someone opens a PR with a function that for example accepts a raw pointer part of the review is to look everywhere that function is used and make sure there’s no way to get to a dangling pointer or to accidentally dereference a null pointer. All of these problems are no-ops in safe rust. so even if currently the bitcoin review process is good at eliminating most of these problems Rust can help save review time.

    2. Personally and I’ll guess for other non C++ experts, writing C++ sometimes feel scary because you’re not 100% there’s no UB in your code and there’s not some edge case with memory issue, this problem is mitigated with sanitizers, valgrind and good review process. but it’s better to know your code does what you think it does. (again this is only about memory un-clearity not logic)

    Now about rust itself:

    1. I think that if we plan to make this experimental and optional for a while i’ll go for the latest rust compiler available right now. because when and if it will ever be an inherit part of bitcoin mrustc will probably support newer versions(already at the verge of 1.29 support[1] ) and maybe even a gcc frontend will arise by then[2]

    2. I do understand the idea of not requiring any version newer than what is shipped with latest distros, but I think that any safety feature we’ll miss because of “supporting the oldest compiler possible” will make us miss the entire point of using rust.

    3. I see no point in using Edition 2015, as Edition 2018 was stabilized in Rust 1.31. That said this is only an esthetic change, so I don’t have strong feelings about it.

    4. Cargo vs. rustc. I think that as long as we can get away with using rustc directly it’s fine, but I don’t think this will work for the long term.

    5. Combining point 4 and 1, I think that when we will want cargo and when we will have dependencies then we will want a feature like cargo vendor which was added to cargo in 1.37 so that’s another reason for using an up to date rust version. on top of that the mentioned security advisory(I found btw) is an example on why it’s problematic to use old versions of fast evolving tools. I hope the rust and cargo team will learn from that experience for future features but I would argue that we should try and use an up to date rust version.

    Quick simple example of dependencies we will want to use if we continue to integrate rust is cbindgen and rust-bindgen as FFI calling is a very easy way to introduce UB that no compiler will warn about (if the rust and C declarations won’t match correctly).

    P.S. If people want I can try and give a list of examples of features we might need that aren’t available in old rustc versions. and that’s without talking about changes to the borrow checker that makes writing rust code way easier.

    [1] https://github.com/thepowersgang/mrustc/issues/95#issuecomment-538747289 [2] https://users.rust-lang.org/t/call-for-help-implementing-an-independent-rust-frontend-for-gcc/32163

  12. MarcoFalke commented at 3:03 pm on October 10, 2019: member

    I do understand the idea of not requiring any version newer than what is shipped with latest distros, but I think that any safety feature we’ll miss because of “supporting the oldest compiler possible” will make us miss the entire point of using rust.

    Another point to consider here is whether we want to ship it with the official binaries (either gitian running on Bionic or guix). If we don’t ship it and it is disabled by default when compiling from source, you could argue that no one is using it, nor testing it. So we might save us from the hassle by not adding it in the first place?

  13. elichai commented at 3:20 pm on October 10, 2019: contributor

    @MarcoFalke what about other optional compilations? (i.e. upnp) are they shipped in binaries?

    FYI currently this is what bionic has in the repos: https://packages.ubuntu.com/bionic/rustc. 1.36 is pretty up to date. and it seems like most distros are maximum 1-3 versions behind (the speculation for why are they so up to date is because they need to compile firefox heh)

  14. TheBlueMatt commented at 6:39 pm on October 10, 2019: contributor
    Right, my preference would be off-by-default-and-in-release-binaries in 0.20, but hopefully (pending guix work and mrustc-in-guix) we can change both of those in 0.21. Note that just because we support older compilers doesn’t mean we build by default with older compilers in guix/release binaries.
  15. laanwj commented at 6:46 pm on October 10, 2019: member

    FWIW, poorly written unsafe Rust code will have UB too

    Yes, I don’t think anyone doubts that. The point is that if you write rust code without unsafe, you can rely that it won’t have certain issues (excepting bugs in rust’s compiler and runtime itself). The parts that are unsafe (if needed at all) automatically draw attention.

    I think our lack of continuous large-scale fuzz testing is a larger problem - something which I plan to address

    Fuzz testing is good in any language, be it C++, C, Rust, Python … using a different language doesn’t change anything in the need for testing.

    Another point to consider here is whether we want to ship it with the official binaries

    That should be the goal.

  16. TheBlueMatt commented at 6:46 pm on October 10, 2019: contributor

    Another point is I dont think we need to fully decide this now. While I’m really skeptical of requiring rustc newer than 1.34 (Debian buster/stable for the next many years), we can start with that and revisit the question as we have newer, larger features that may want more features.

    As for cbindgen/rust-bindgen, I’m really dubious of the value of using them at build-time, but a really cool project may be running them on travis as a linter to check that the checked-in bindings are “correct”.

  17. jgarzik commented at 6:53 pm on October 10, 2019: contributor

    An Ode To Simplicity

    Rather infamously, in a recent talk, a developer related the story of a manager who chose to reward programmers based on LOC committed. One engineer responded by making an extra effort to go through the company’s codebase and delete code, ensuring they would rank at the very bottom of the chart, with negative LOC each month.

    From the standpoint of must-be-secure high quality code, less is more. Less code probablistically produces fewer bugs, fewer LOC to review and analyze, and is easier to prove secure.

    This was the origin of the --disable-wallet compile time flag. This permits eliding GUI and wallet code, focusing on the network-security-sensitive kernel as the minimized runtime attack surface for validating nodes.

    Integrating two languages tends to go in the opposite direction from complexity reduction. FFI and unsafe rust and hidden sand traps galore. It takes another 10 years to move the C++/Rust boundary to 75+% rust.

    Trying to take a step back and think holistically,

    1. There is a numerically large userbase for “the kernel” - the network validating engine - and numerically small userbase for the GUI and wallet.
    2. The kernel should be in a repo by itself, without a kitchen sink of other code such as wallet or GUI. Those accessories can live in git repos that use the kernel repo as a submodule. This creates incentives for the kernel repo (and issues and workflow) become more simple, less complex over time.
    3. Build a separate, safe Rust validating engine. Run in parallel with C++ to observe A/B differences in field operation.
    4. Migrate wallet/GUI to use REST/zmq/etc. interfaces.
    5. At this point, switch to Rust engine can safely be done.

    End result in medium term is a less complex core. End result in longer term is less complex core… in Rust.

  18. TheBlueMatt commented at 6:59 pm on October 10, 2019: contributor
    @jgarzik It looks like you missed all the current context and didn’t really add much with your comment. Please go read #16834 first. Specifically, no one is proposing, nor even really considering doing any kind of validation in Rust, nor migrating existing code towards it.
  19. jgarzik commented at 7:29 pm on October 10, 2019: contributor
    Context was not missed. Re-read assuming this context is known, looking at another 10 years of development, and the author is observing that this is a choice point in development, where the ship could be steered towards reduced or greater complexity.
  20. TheBlueMatt commented at 7:51 pm on October 10, 2019: contributor

    This was discussed extensively at the meeting, conclusions as I understand them are as follows:

    • Target Rust 1.34.2 for now. If we end up needing something more, we can revisit then, but as an initial target it should do (probably implies we need to test it in Travis in #16834).
    • No direct conclusion on rustc-vs-cargo, but for now I don’t see any strong disagreement to move forward with rustc and be willing to revisit in the future.
    • Be willing to ship on-in-release-binaries immediately in 0.20, using gitian/Canonical’s rustc as it doesn’t (massively) change our trust model within Gitian of trusting the Canonical toolchain, instead of gating on the ongoing Guix work. Note that this (obviously) will result in release builds using a newer rustc than our “minimum supported”.
    • No significant objection to moving forward here!
  21. JeremyRubin commented at 8:22 pm on October 10, 2019: contributor

    As for cbindgen/rust-bindgen, I’m really dubious of the value of using them at build-time, but a really cool project may be running them on travis as a linter to check that the checked-in bindings are “correct”.

    This is a good point in particular – I agree that cbindgen outputs should be committed. Prefer linting to happen during the regular local build/testing though rather than just in Travis, and think that we should have tooling which makes it simple to emit bindings to be committed to keep development flow simple. We should also be careful to not allow bindings which aren’t generatable from CBindgen, so even if we aren’t relying on it for build we can be sure it’s in line with what could be machine generated.

  22. elichai commented at 8:27 pm on October 10, 2019: contributor
    oh I 100% agree that if and when we’ll use cbindgen/rust-bindgen the output should be committed to track changes. we could also run them as commands manually(or as part of some special make flag) every release. don’t need to have it in a build.rs(or it can be an optional feature in the build.rs)
  23. elichai commented at 2:53 pm on November 4, 2019: contributor
    Saw this: #17208 (comment) So something to note, is that rust requires floating points to be IEEE-754. (though it does support platforms without floats at all using llvm’s soft-float) https://doc.rust-lang.org/reference/types/numeric.html#floating-point-types
  24. mimirmim commented at 8:38 am on November 26, 2019: none
    Is it possible to see the meeting notes relating to why Rust 1.34.2 was chosen?
  25. elichai commented at 8:50 am on November 26, 2019: contributor
    @mimirmim It was in the meeting of 10-10-2019, so search for “rust” here: http://www.erisian.com.au/bitcoin-core-dev/log-2019-10-10.html
  26. metalicjames commented at 8:06 pm on December 12, 2019: none

    I made a branch where I replaced GetRandBytes and GetStrongRandBytes with Rust’s rand library, using its thread_rng CSPRNG. This would optionally replace Bitcoin Core’s current custom RNG implementation with the goal of simplifying the overall randomness pipeline. The thread safety is handled by rand so no extra mutexes are required along with the initialisation of an RNG per thread and its seeding using OS randomness. This branch builds off Cory’s PR because it requires Cargo to download and build the rand dependency. If there’s interest in this concept of RNG in Rust I’ll send up the branch as a PR.

    The branch: https://github.com/metalicjames/bitcoin/tree/rust_csprng The diff: https://github.com/bitcoin/bitcoin/compare/master...metalicjames:rust_csprng?expand=1 The rand lib from Rust: https://github.com/rust-random/rand

  27. JeremyRubin commented at 8:37 pm on December 12, 2019: contributor
    I think having randomness be dependency free in Bitcoin has been a long-term goal recently acheived, so replacing it with an external lib would mark a regression in that regard.
  28. michaelfolkson commented at 5:38 pm on January 27, 2020: contributor

    It seems convincing that Rust could bring significant benefits to Core in future and it is certainly an idea worth pursuing. Introducing Rust to Core is an investment though in that young ecosystem. @TheBlueMatt is engaging with the Rust community which is great and we certainly need people like Matt to do this to ensure Rust continues to be attractive to Core. Concerns that he highlights here don’t impact the Core PRs.

    Longer term, there could be a Rust-like language created in future that capitalizes on some of Rust’s strengths but doesn’t make mistakes with regards to design and community decision pitfalls that every language is in danger of making.

    In that case would we be happy having C++, Rust and this future language in Core? Would we look into replacing Rust code with this new language? As we go further down this road do we become more and more tied to Rust at this early stage in its life cycle? Should Core be a (relatively) early adopter of new languages?

    it’s a fair assumption to say that Rust code will eventually end up in Bitcoin Core as the result of adding a new dependency

    I’m not convinced this is inevitable. Using this inevitability as an argument to introduce Rust into Core seems like a flimsy argument to me. If we really wanted to we could avoid Rust dependencies.

  29. elichai commented at 3:10 pm on March 4, 2020: contributor
    I guess it won’t happen in 0.20.0. Where do we stand on this?
  30. michaelfolkson commented at 0:49 am on March 6, 2020: contributor

    Are you a Concept NACK on Rust ad infinitum @luke-jr? Would you like to see more maturity or are you dead set against ever introducing Rust code? I know you aren’t the only one with misgivings but you most recently NACKed this (now closed) Rust PR #16762 (comment)

    I’m guessing the PRs @TheBlueMatt recently closed weren’t attracting review due to the Concept NACKs rather than “lack of interest”. Many seem interested.

  31. luke-jr commented at 1:57 am on March 6, 2020: member

    At the very least, I’d like to see Rust easily bootstrappable without trusting third party binaries. Right now, you have to compile a sequence of like a dozen different versions, and it only works on x86 (step 1 is a poorly written Rust compiler in C).

    Ideally, it would be nice to wait for Rust to have a sane ABI situation, so libraries can be installed like normal software and dynamically linked.

  32. elichai commented at 10:38 am on March 6, 2020: contributor

    I won’t hold my breath for a stable ABI, it might never happen. Having an unstable ABI gives the compiler devs a huge amount of freedom and flexibility, and it helps removing a lot of paddings by re ordering structs and packing them however they want (unless you specify a specific packing method)

    I personally do not think a stable ABI is a requirement, for important dependencies we use static linking anyway(secp256k1, leveldb, univalue)

  33. michaelfolkson commented at 2:21 pm on March 6, 2020: contributor

    @luke-jr did say “ideally” on the stable ABI. His first point seems like a fair first bar.

    I hope the work on this continues and we can establish prerequisites that need to be met to reconsider this. I know a lot of people are enthusiastic about Rust, some great work has already been done and personally I find it promising/interesting.

  34. jgarzik commented at 2:45 pm on March 6, 2020: contributor
    The overall added complexity of ensuring a security-sensitive application remains secure becomes far more difficult when building with 2x languages and 2x toolchains, versus 1x.
  35. michaelfolkson commented at 3:09 pm on March 6, 2020: contributor
    I think everyone here already appreciates that hence a very particular approach in the Rust PRs. But unless we are saying never under any circumstances we should attempt to establish prerequisites that need to be met to reconsider.
  36. luke-jr commented at 3:34 pm on March 6, 2020: member

    Having an unstable ABI gives the compiler devs a huge amount of freedom and flexibility,

    ABI-breaking changes can be batched into major version bumps like G++ has.

    and it helps removing a lot of paddings by re ordering structs and packing them however they want

    I can’t think of any reason this can’t be deterministic…?

  37. MarcoFalke removed this from the milestone 0.20.0 on Mar 25, 2020
  38. michaelfolkson commented at 3:12 pm on June 3, 2020: contributor
    Just adding a link to this anonymized Sydney Socratic Seminar transcript (May 2020) as Rust code integration was discussed at length and there were a number of interesting observations/thoughts from people like fanquake and Rusty. This discussion will inevitably start up again at some stage.
  39. elichai commented at 5:57 pm on June 6, 2020: contributor

    Just adding a link to this anonymized Sydney Socratic Seminar transcript (May 2020) as Rust code integration was discussed at length and there were a number of interesting observations/thoughts from people like fanquake and Rusty. This discussion will inevitably start up again at some stage.

    I wrote a response for some the comments in that discussion: https://gist.github.com/elichai/673b031fb235655cd254397eb8d04233

  40. yancyribbens commented at 2:43 pm on July 13, 2020: contributor

    @luke-jr This looks pretty interesting: https://github.com/dtolnay/bootstrap

    While I understand the desire for a secure way to build rustc without third-party deps, perhaps we could move forward with a unstable testing build and recommend only for testnet/regtest while the build tools mature. Also, I like the approach Tor uses to vendor the cargo dependencies in a separate repo. @michaelfolkson recently there was an email recently for Linux Kernel in-tree support for Rust. To me this is a signal that Rust has matured to the point that if the linux kernel is considering support, so might other projects regardless of what the next language after Rust might be.

  41. vasild commented at 9:26 am on May 3, 2021: contributor

    Using many languages in a project reduces the number of developers that can contribute effectively to it. Bitcoin Core already uses C++ and Python.

    I don’t see enough justification on having parts of the code written in another language. IMO bugs are developers’ fault, not programming language’s fault. Surely language X makes it impossible to have bugs that are possible in language Y, but isn’t the opposite also true? And what about programming language Z which is “even better” than X and Y?

  42. dpc commented at 7:08 pm on January 19, 2022: none

    IMO, Mixing C++ and Rust code is just a bad idea, that will just slow down everyone involved. As a primarily Rust developer, I don’t want to be touching C++. And I can’t blame a C++ developer for not wanting to touch Rust either. Why force devs into a bad marriage that a lot of existing and potential new contributors will not be really happy with anyway?

    Even though C++ and Rust are superficially similar, about everything about actually working with them is different. The way you structure your program, the way you build your APIs, the way you review code. These two will not mix well.

    Linux kernel example is not a good example because it is integrating C and not C++ with Rust, and there is no alternative practical approach other than mixing them, and they have good clear boundaries (driver layer, for now at least) at which they can build APIs around. In case of Bitcoin Core there is a better alternative: the network consensus layer.

    I know that the dogma historically has been that having multiple client implementations is a bad idea, but I personally never agreed with the reasoning there. Having single vs multiple implementations doesn’t have a simple binary answer. It has benefits (like overall ecosystem robustness) and drawbacks (like having to do the same work twice, making coordination harder (tell miners to stick with one implementation to avoid chain splits!, etc.)). Think what you will about it, but now there’s actually an additional reason to make an exception even if someone thinks in general it’s not a best situation.

    Effectively rust-bitcoin is already building alternative implementation of chunks of Bitcoin Core for larger ecosystem. Bitcoin Core is not impossibly huge body of software, and is also not one known for changing at some rapid pace. There has even already been an alternative Rust implementation (like it or not :D). Lowest level primitives can be (and are already) reused between C++ and Rust. And rewriting stuff in Rust is just a fun thing to do.

    What’s needed here is a general agreement that yes, this is a course of action that larger developer Bitcoin community will generally support (preferred to forcing all core developers into a Rust++ marriage inside one codebase) and enough commitment from people and organizations that can and want to actually work on it. I mean - if there isn’t enough people that want it, then why bother having this github issue open in the first place - clearly there’s not enough interest, at least yet. Once people more enthusiastic about Rust can actually deliver something, figure out all the relevant details, we can compare the results, benchmark, judge the codebase, community interest, etc. Maybe support both codebases for decades to come, maybe phase out one that is clearly not having traction anymore, maybe something else entirely because situation changed.

  43. MarcoFalke commented at 8:04 pm on January 19, 2022: member
    Beside C++, and Python we also use bash and “qt-c++” (gui code is different from “normal” c++), so adding another language to write new/optional stuff in (not rewriting existing code) isn’t going to make a large difference. I also mentioned this in #23049 (comment): As long as there are enough reviewers to review the rust code, there shouldn’t be an issue. Though, it doesn’t seem like there are enough right now.
  44. MarcoFalke commented at 1:13 pm on August 15, 2022: member
    I think there was enough general discussion, so closing for now. Further discussion can be held on a case-by-case basis for the module/code/pull request that is added in rust
  45. MarcoFalke closed this on Aug 15, 2022

  46. bitcoin locked this on Aug 15, 2023

github-metadata-mirror

This is a metadata mirror of the GitHub repository bitcoin/bitcoin. This site is not affiliated with GitHub. Content is generated from a GitHub metadata backup.
generated: 2024-11-21 12:12 UTC

This site is hosted by @0xB10C
More mirrored repositories can be found on mirror.b10c.me