This script allows to create notarized application builds. It's primarily used by GitHub Actions release workflow, but it can also be run locally as needed.
- Makes notarized builds for Product Reviews and public releases.
- Outputs the app and compressed dSYMs.
- Can optionally output a DMG image ready for distribution.
- If making a public release, it can update the Asana release task passed as a parameter; it will then upload the DMG and dSYMs to the task, and mark relevant subtasks as complete.
To run locally you'll need a valid installation of Xcode. Make sure that
xcode-select -p
prints out the path to Developer directory inside Xcode.app
bundle, e.g. /Applications/Xcode-13.3.0.app/Contents/Developer
.
Optionally you'll need:
create-dmg
, to create DMG images,jq
, to handle Asana tasks,xcpretty
, to beautifyxcodebuild
output.
App notarization happens on Apple servers and the app can only be uploaded by an authorized member of the DDG Apple Developer Program. The script currently does not support multi-factor authentication, which means that you'd have to create an app-specific password for your Apple ID associated with the developer account:
- Go to https://appleid.apple.com/ and sign in.
- Select App-specific passwords
- Add new password using
+
button - Copy the password and pass it to the script when asked. The password will be securely stored in your login keychain for later use.
To use Asana integration, you'll need to create Asana Personal Access Token:
- Go to https://app.asana.com/0/my-apps.
- Select Create new token and follow on-screen instructions.
- Copy the generated token and pass it to the script when asked. The token will be securely stored in your login keychain for later use. Any updates to Asana tasks made by your instance of the script will be performed as your user (because it's your personal token).
To make a review build:
$ ./scripts/archive.sh review
To make a release build and a DMG:
$ ./scripts/archive.sh release -d
Display all available parameters:
$ ./scripts/archive.sh -h
This script checks a compiled app binary for references to private Obj-C selectors.
Private is defined by starting with an underscore. It uses otool
to retrieve
Obj-C selector pointers from the binary (see this SO answer
for a bit more info). Results are then filtered and formatted and if there are any
selectors on the list that start with an underscore, the check fails
and outputs an error message.
No 3rd party software is required to run the script. It uses built-in macOS toolchain utilities: lipo and otool.
The check should work for any release build, but for debug builds it only works when
the binary is compiled for both x86_64 and arm64 architectures, hence by default
this is checked. The check can be skipped with a -f
flag.
To check for private API symbols in the app:
$ ./scripts/find_private_symbols.sh DuckDuckGo.app/Contents/MacOS/DuckDuckGo
This script imitates real-life scenario of automatic app update via Sparkle.
We use Sparkle to notify users about app updates. The working principle is as follows:
- we upload our app's DMGs to an online storage
- we generate an XML file (in RSS feed format) called
appcast.xml
and keep it online alongside the DMGs - the app uses Sparkle framework to check the
appcast.xml
file for updates and presents a pop-up window to users whenever there is an update available.
For this to work, we need an online storage, and we only have a single, production storage. This script helps with that by creating a temporary online storage from your local machine and crafting two application builds that would use this temporary storage for reading update info.
- Create a directory called
cdn
under main directory of the repository. - Run
ngrok
to create a HTTPS tunnel from your local machine's cdn directory to the internet. - Update
SUFeedURL
entry in the appInfo.plist
file. - Make a notarized Product Review build and put the DMG in the
cdn
directory. - Bump the version by 0.0.1 and repeat the step above.
- Generate
appcast.xml
file for these two DMG images. - Wait here and let the user test the setup.
- Stop
ngrok
when the user is done testing.
- Ngrok tunnel creates a semi-random URL that is available publicly.
To increase security, the script generates random Basic Auth credentials and
makes
ngrok
require them for authentication. - Script can be paused before building both app versions, so that you can make changes to files, or even switch branches. The script itself is copied over to a temporary directory so that you could switch to an old branch that didn't have this script.
Important: When testing a new feature, be sure to use interactive mode (-i
)
and create the first build from the main branch (to simulate upgrading from
a previous release).
You will need ngrok
version 3 or above to run this script. To create file
tunnels, you need to be a registered ngrok user which means you need to create
a free account. Go to https://ngrok.com and follow instructions to sign up and
set up ngrok installation. Most importantly, you need to provide the authtoken
so that the app recognizes your user.
The script calls archive.sh
to create notarized builds, so all the
requirements related to Apple account and app-specific password apply here too.
Asana access token is not required, but create-dmg
and jq
are required.
To generate appcast.xml
files the generate_appcast
binary from Sparkle release is required. It should be present in $PATH
.
Run the script with 2 builds off the current branch:
$ ./scripts/sparkle-sandbox.sh
Run in interactive mode:
$ ./scripts/sparkle-sandbox.sh -i
Display all available parameters:
$ ./scripts/sparkle-sandbox.sh -h
This script checks app's source code for ETag values of Tracker Data Set and Privacy Config files embedded in the app, downloads new versions of the files if they appear outdated and updates relevant entries in the source code to reflect the metadata (ETag and SHA256 sum) of downloaded files.
It may update the following files:
- DuckDuckGo/Content Blocker/AppPrivacyConfigurationDataProvider.swift
- DuckDuckGo/Content Blocker/AppTrackerDataSetProvider.swift
- DuckDuckGo/Content Blocker/macos-config.json
- DuckDuckGo/Content Blocker/trackerData.json
No 3rd party software is required to run the script. It uses built-in command line utilities and curl.
To update embedded files if needed:
$ ./scripts/update_embedded.sh
Make sure that unit tests pass after updating files. These test cases verify embedded data correctness:
EmbeddedTrackerDataTests.testWhenEmbeddedDataIsUpdatedThenUpdateSHAAndEtag
AppPrivacyConfigurationTests.testWhenEmbeddedDataIsUpdatedThenUpdateSHAAndEtag