By default the Tor Browser build is done inside containers, which we run using runc, which require root access.
In some cases, such as F-Droid builds (#27539 (moved)), this can be a problem. I think we should be able to add an option to do the builds without using containers.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
By default the Tor Browser build is done inside containers, which we run using runc, which require root access.
In some cases, such as F-Droid builds (#27539 (moved)), this can be a problem. I think we should be able to add an option to do the builds without using containers.
How would that help the F-Droid case given that F-Droid is taking just the signature for an app and applying that one to the built they made themselves? I mean the non-container build would then need to match our build done in a containerized setup so that F-Droid would get a bit-for-bit identical output. Maybe I am too pessimistic here but I'd be surprised if that worked out-of-the-box...
By default the Tor Browser build is done inside containers, which we run using runc, which require root access.
In some cases, such as F-Droid builds (#27539 (moved)), this can be a problem. I think we should be able to add an option to do the builds without using containers.
How would that help the F-Droid case given that F-Droid is taking just the signature for an app and applying that one to the built they made themselves? I mean the non-container build would then need to match our build done in a containerized setup so that F-Droid would get a bit-for-bit identical output. Maybe I am too pessimistic here but I'd be surprised if that worked out-of-the-box...
If the F-Droid build VM is using Debian Strech too, then I think the main differences between our build environment and the F-Droid build environment would be:
the username of the build user. In the rbm build we use an rbm user, but I think we can add an option to change it if that is an issue.
the list of packages installed. In our case we build each component with only the minimum set of dependencies required to build this component, while in the F-Droid case they would always have the dependencies required to build all of the components. I think in most cases the additional packages should not change the output of the build. Maybe in some cases it will requires some changes to avoid the effect of some additional package.
Unless I'm forgetting an other important difference, I think it should not be very difficult to get matching builds. Although I did not try it, so maybe I'm too optimistic.
I started working on a patch for that, and after comparing a build done without containers, and a normal build with containers, I get an almost matching apk. The only difference is:
It seems to be because the tor-browser step is done in a buster container. The debug signature is also causing the build without containers to stall.
So I think if we find an other workaround for the debug signature that doesn't require using buster, we should be able to get matching build without and without containers.
Wow, you have achieved reproducible builds then! The oracle version number diff can be solved by using apksigner rather than jarsigner to make the APK Signatures. apksigner is what the Android SDK has been using by default for about 2 years now, and is reproducibly built in Debian stretch and buster:
If you need the newer apksigner in Debian/stretch, I can backport it. As far as I remember, the changes are only to support APK v2 and v3 signatures better, and were not security fixes. But it might be worth double checking my memory.
Technically, you don't need to update to apksigner although there is nothing wrong with it.
You can override the default manifest Oracle. First create the a manifest.txt to use to override entries
{{{
Created-By: Tor Build
}}}
Then use the 'm' flag
{{{
jar -cvfm tor-browser.jar manifest.txt
}}}
The generated manifest will be
{{{
Manifest-Version: 1.0
Created-By: Tor Build
}}}
The main issue is not that some entries in the manifest are different, but that the signing is stalling when we do it with faketime on stretch, which is the reason we currently have to do it in a buster container.
If apksigner does not stall when used with faketime on stretch (or doesn't need faketime to produce reproducible output), then that would solve the issue.
While you are at it, you should also drop faketime for signing. The Android tools have been zeroing out the dates in the ZIP header for a while now, like 2+ years. If TBA doesn't use a version of the Android tools that does that, it is not hard to do it with a tool or with Python or something as a post-build, pre-signing process.
Wow, great progress! That sort order issue is frustrating. My experience is that doing post-processing of APKs with zip or other tools usually leads to random repro issues like that. The Android tools have been getting better, but they still have repro quirks. It seems that the zip commands are used for adding and removing static assets. I can help move that to the pre-packaging phase of the Android build, if gradle is in use.
While still testing the changes here come some preliminary comments:
commit e38b5d94a19caff488382d92968dbd8cd85b18eb
The change to the README says "Adding the no_containers target will disable the use of containers", but the first thing that happens is actually building a container (called "empty"). So, we might want to be a bit more verbose explaining what is happening here to avoid confusion.
"and install build dependencies for all the components that are built" We are listing build dependencies in the README file. I think we should list all the additional build dependencies needed for building without containers as well while we are talking about them. There should be no need for builders that want to build without containers to try figuring that out themselves.
commit 069c880961e93fe2f5052ae6d428b2f9efdd1d4e
"Add the extensions in sorted order" it's not only extensions it seems? So, please adjust the commit message accordingly.
I wonder why we need container/use_container and container/disable as two separate options. If use_container is false then cleary I build without containers, no? In other words: why can't we just use/amend the already existing use_container option to avoid creating another one that seems to do the same thing but just (slightly) differently?
Trac: Status: needs_review to needs_revision Keywords: TorBrowserTeam201904R deleted, TorBrowserTeam201904 added
Alright, I started a build on two different machines, both on commit 069c880961e93fe2f5052ae6d428b2f9efdd1d4e (boklm/bug_29981_v5). One machine is building with containers and one without. While this setup builds reproducibly on each machine the *.apks on one machine differ from those on the second one.
The differing parts are essentially all the Firefox .so files in assets/ or lib/. Both machines built from the same tor-browser commit (c722d57604db58695140d95565a78433989fe9ca).
I attached two .so files showing the issue.
FWIW: I built on the bare stretch machine without installing bison, yasm, and openjdk-8-jdk. (However, openjdk-8-jre is installed it seems)