!UUYziobKGGxpovWyAN:nixos.org

Robotnix

239 Members
Build Android (AOSP) using Nix | https://github.com/danielfullmer/robotnix74 Servers

Load older messages


SenderMessageTime
5 Nov 2025
@atemu12:matrix.orgatemu12ccache can cut build time by ~half12:01:17
@atemu12:matrix.orgatemu12There's also some validation stuff you can disable; I've done it in my config12:05:32
@magic_rb:matrix.redalder.orgmagic_rbisnt ccache deprecated?12:07:39
@magic_rb:matrix.redalder.orgmagic_rbthats what the docs said12:07:46
@atemu12:matrix.orgatemu12Still worked with 22.214:54:33
6 Nov 2025
@puffnfresh:chat.home.brianmckenna.orgpuffnfreshhttps://github.com/nix-community/robotnix/pull/32406:12:16
@cyclopentane:aidoskyneen.eupentane ⭔nice, thanks, gonna test it one of these days!21:48:32
@cyclopentane:aidoskyneen.eupentane ⭔which method did you use to get a list of all new APEX packages in android 16? looking into apkcerts.txt in the target files package, or something in these lines?21:49:17
@cyclopentane:aidoskyneen.eupentane ⭔ bit of context: I'm a bit catious about declaring signing as "officially supported" again, since the AOSP sign_target_files_apks tool doesn't validate whether all APKs that were signed with the test keys during the main build have in fact been re-signed with the release ones. I'm considering writing some sort of validation script that looks at META/apkcerts.txt and META/apexkeys.txt in target_files.zip to validate whether the key mappings and APEX package names defined in the module systems cover everything that needs to be re-signed 22:29:24
7 Nov 2025
@puffnfresh:chat.home.brianmckenna.orgpuffnfreshthe signing process complained when a key was missing, I just tried to sign, it would fail, I'd add that01:01:41
@emma:rory.gay@emma:rory.gay left the room.22:44:02
8 Nov 2025
@cyclopentane:aidoskyneen.eupentane ⭔ yeah, that's for keys that you specify with --extra-apks or --key-mapping that turn out to not exist on your filesystem 21:45:57
@cyclopentane:aidoskyneen.eupentane ⭔ but as far as I understand, sign_target_files_apks will happily leave the test keys in place if you don't specify that you wanna re-sign the APKs in question with release keys 21:46:29
@cyclopentane:aidoskyneen.eupentane ⭔what were the exact error messages you were getting?22:18:57
@cyclopentane:aidoskyneen.eupentane ⭔ also, I'm a bit confused. shouldn't sign_target_files_apks have complained about the missing gmscompat_lib key (see https://github.com/GrapheneOS/script/blob/16/generate-keys#L16?) 22:27:02
@cyclopentane:aidoskyneen.eupentane ⭔ * also, I'm a bit confused. shouldn't sign_target_files_apks have complained about the missing gmscompat_lib key (see https://github.com/GrapheneOS/script/blob/16/generate-keys#L16)? 22:27:05
@cyclopentane:aidoskyneen.eupentane ⭔ * also, I'm a bit confused. shouldn't sign_target_files_apks have complained about the missing gmscompat_lib key in your case (see https://github.com/GrapheneOS/script/blob/16/generate-keys#L16)? 22:27:13
9 Nov 2025
@puffnfresh:chat.home.brianmckenna.orgpuffnfresh

Error getting public key: b'Could not open file or uri for loading private key of public key from packages/modules/Virtualization/build/apex/com.android.virt.pem: No such file or directory\n'

04:41:44
@puffnfresh:chat.home.brianmckenna.orgpuffnfreshat the time, I hadn't specified that as an extra-apk, and specifying it solved the problem - so I think it's opposite to what you're saying04:42:20
@puffnfresh:chat.home.brianmckenna.orgpuffnfreshI actually generated my keys from the official scripts, so I do have that07:22:11
@puffnfresh:chat.home.brianmckenna.orgpuffnfreshand that's why the PR includes support for 4096 keys - that's what I'm using07:22:28
@puffnfresh:chat.home.brianmckenna.orgpuffnfreshI haven't tested Robotnix's key generation since my first attempt at signing, so gmscompat_lib being missing would probably be a problem07:23:25
@cyclopentane:aidoskyneen.eupentane ⭔Okay it seems like we're talking about two different things09:53:58
@cyclopentane:aidoskyneen.eupentane ⭔ this error message refers to the payload private key of the APEX in question 09:57:12
@cyclopentane:aidoskyneen.eupentane ⭔ the test-keys variant of that payload private key is present in the GrapheneOS source tree (see https://github.com/GrapheneOS/platform_packages_modules_Virtualization/tree/16/build/apex), but not in the otaTools derivation which releaseScript cds into 09:59:45
@cyclopentane:aidoskyneen.eupentane ⭔ okay, scratch that. so I investigated this, and it seems like the otatools AOSP build target (i.e. otatools.zip in the config.build.android version) erroneously doesn't include the APEX payload test keys 10:05:23
@cyclopentane:aidoskyneen.eupentane ⭔so that was the reason for why you were getting these error messages10:05:33
@cyclopentane:aidoskyneen.eupentane ⭔ I don't see rn though why there should be a guarantee that this happens consistently (for instance, looking into the otaTools derivation, the APEX container test keys are there, and likewise for the normal APK signing keys) 10:06:47
@cyclopentane:aidoskyneen.eupentane ⭔ if you're interested - I'm currently experimenting with patching sign_target_files_apks to throw error messages if one of the test keys hasn't been replaced. Don't think we should do that in production though, I'd probably write a small validation program in Rust that takes META/apkcerts.txt and META/apexkeys.txt, and the signTargetFilesArgs from target_files.zip as an option to check whether the args exhaustively cover all the keys 10:09:06
@cyclopentane:aidoskyneen.eupentane ⭔ FWIW here's my current patch for https://github.com/GrapheneOS/platform_build: 10:10:03

Show newer messages


Back to Room ListRoom Version: 6