Python3.7 exe编译工具对比zz

For years, NVDA has used Py2exe to package Python code into something that is executable on a system that doesn‘t have Python installed. For Python 2.7, we have been at Py2exe 0.6.9 (introduced in 2008) for a long time. For Python 3, a new version has been introduced in 2014 which looks like a rewrite. The last official release (0.9.2.2) was introduced in 2014.

Starting with Python 3.6 (end 2016) however, Python contains a backwards incompatible change of the byte code format that is not supported by the official py2exe.

Note that many parts of the build process of NVDA are handled by SCons. This includes:

  • Compiling, linking and code signing all the additional libraries, such as NVDAHelper, liblouis, minhook, ESPeak
  • Compiling ESpeak dictionaries, CLDR data and gettext translations
  • Converting documentation to HTML using TXT2Tags, see #8734

In summary, Scons deals with everything that is required to run NVDA from source, Py2exe is not involved in that process. Py2exe gets called as soon as a distribution of NVDA is created. The portable distribution that Py2exe creates is then packed into a launcher using NSiS.

Requirements

Before deciding on what packaging tool to use, this section lists the requirements for a packaging tool, based on the work that is now performed by Py2exe.

  1. Byte compile every source file into a *.pyc or *.pyo file. Note that for Python 3, only the *pyc files remain.
  2. Byte compile every Python dependency (comtypes, pyserial, etc.) required to run NVDA.
  3. Collect Python extension modules (*.pyd files)
  4. Bundle the several byte compiled files into a library.zip file in the main folder of the distribution.
  5. Exclude several unneeded modules
  6. Create executables from certain source files:
    source destination(s) description
    nvda.pyw nvda_noUIAccess.exe, nvda_uiAccess.exe Main executables (see below)
    nvda_eoaProxy.pyw nvda_eoaProxy.exe Used to integrate in Windows 7 EOA center
    nvda_slave.pyw nvda_slave.exe Used for add-on installation from shell, elevated rights during installation, etc.
  7. Bundle a manifest with the executables. Theoretically, this can also be done using SCons, though in contrast to what I thought earlier, there is no code within the current scons structure of NVDA that can be reused for this.
  8. Make sure that the UIAccess flag is added to the manifest of nvda_uiAccess.exe and nvda_eoaProxy.exe. Strictly spoken, this is code that has been added to our subclass of build_exe.py2exe in order to inject the UIAccess flag into the manifest created by py2exe. However, droppign py2exe in favour of another tool might force us to completely rewrite this logic.
  9. Embed the NVDA logo into the executables as icon.
  10. Set several version info flags in the version info resource of the executables.
  11. Collect several system dll‘s not available on every system. This includes visual C++ redistributables.
  12. Collect data files created using SCons, such as several libraries, language files, documentation, etc.

Alternatives

According to research and ideas from others, there are four packaging/freezing options that can be used with Python 3. The following sections provide short descriptions along with pros and cons.

Py2exe fork by @albertosottile

See https://github.com/albertosottile/py2exe

Thankfully, @albertosottile contacted us in #8375 (comment), commenting that he picked up Py2exe where it has been abandoned in 2014. This resulted into a release of Py2exe 0.93.0. This version is said to work with Python 3.6 and 3.7.

Pros

  • Stick to the same tool as used before. Though heavily changed under the hood, it still promises to be mostly compatible with older setup files. According to the original readme:

    It is planned to achive full compatibility with the setup-scripts for Python 2; however this is probably not yet the case.

  • Probably the least efford if @albertosottile‘s fork proves to be working.

Cons

  • A look at the code of Py2exe for Python 3 seems to reveal that the support to create manifests is not yet implemented, that is, there is lots of commented out code that seems to origin from the Python 2 version. Having said that, the logic to embed resource files in the executable still seems to be available and an example setup files shows an alternative method to embed the manifest. It‘s just not compatible with the current approach in our setup.py.
  • @albertosottile‘s fork of this project is pretty new. Some details:

Requirements scheme

Feature supported
Create multiple executables Yes
Bundle manifest Yes, but differently than before, might require pr to upstream
UIAccess No explicit support, see manifest
Embed logo Yes
Set version info Yes
Collect system dll‘s Yes
Collect external Python dependencies and *.pyd files Yes
Collect data files Yes
Library file Yes

PyInstaller

PyInstaller is an alternative tool to build executables. It also supports byte code encryption, though that seems not very useful in the case of NVDA.

Pros

  • This tool supports most functionality we need out of the box, including stuff that‘s now handled by scons, such as:

    • Code signing
    • Full automatic support for CRTs
    • Manifests with UAC
  • It is very actively maintained.

Cons

  • Building multiple executables at once seems to be broken
  • It does not integrate very well with distutils. It looks like the PyInstaller documentation suggests using a batch file to write down command line commands. Alternatively, you can use a spec file. Writing a setup.py for your package seems unsupported. Having said that, we‘re now calling a python interpretter from scons to execute the setup script, so basically, we‘re using a command line call already. This is therefore no show stopper, just a change of approach.
  • More importantly, I‘ve seen ridiculous tracebacks with one of my test applications referring to pyinstaller:
     Traceback (most recent call last):
       File "main.py", line 1, in <module>
       File "c:\python36\lib\site-packages\PyInstaller\loader\pyimod03_importers.py", line 631, in 		exec_module
         exec(bytecode, module.__dict__)
       File "core.py", line 5, in <module>
       File "c:\python36\lib\site-packages\PyInstaller\loader\pyimod03_importers.py", line 631, in exec_module
         exec(bytecode, module.__dict__)
    

    It looks like every import is somehow redirected to pyInstaller. I‘m pretty sure this will cause issues with our use of comtypes com interface modules, globalPlugins, etc. which rely on appending paths to the module path variable. Showing raw paths to the python directory also looks a bit cheap, but I recall that with py2exe, we also had to work around this.

Requirements scheme

Here is the official features page from PyInstaller

Feature supported
Create multiple executables No, broken in v3.0, see pyinstaller/pyinstaller#1527
Bundle manifest Yes
UIAccess Yes
Embed logo Yes
Set version info Yes
Collect system dll‘s Yes
Collect external Python dependencies and *.pyd files Yes
Collect data files Yes
Library file No, seems to require a custom implementation using scripting according to features section, but no information found in documentation so far

cx_Freeze

This is an alternative that integrates well with distutils. Note that it is far from compatible with py2exe, so setup.py would still require an overhaul. Running cx_Freeze also results into a package structure that is very similar to the one py2exe creates, including a librar .zip file in the lib sub directory. The default settings do not create a zip file, but that can be customized easily.

cx_Freeze is hosted on GitHub. We can include it as a separate submodule. Though it requires some c code to be compiled, that shouldn‘t be that much of a problem and takes less than 20 seconds, so that doesn‘t justify an inclusion in misc deps in my opinion.

Pros

  • We‘re using it for a @BabbageCom Python project including wx and comtypes, and it works pretty well for our aims. So, I do have experience with it.
  • It can replace paths shown in tracebacks
  • Can include MSVC redistributable automatically
  • Can include additional files in the library zip file

Cons

  • No official build supporting Python 3.7, we‘d have to build from source.
  • There is no built-in support for manifests and setting the UI Access privilege level. We will probably have to implement this manually, either by expanding setup.py or by building the base executables ourselves.
  • By default, cx_freeze assumes that all python stuff is in a lib sub directory (i.e. in lib/library.zip) rather than in the root of the folder where the executables live. This is not easily customisable and seems to be hard-coded behaviour. We‘re using the lib folder for our x86 libraries, storing the python library in there might be a bit ugly.
  • When there is a startup error, cx_Freeze shows an error message box including the name of cx_Freeze itself. This might be confusing for users.
  • The last commit for the project dates from september 2018. There are 260 open issues, including two from myself:

    Both issues haven‘t gotten any attention.

Requirements scheme

Feature supported
Create multiple executables Yes
Bundle manifest No, should probably be embedded in base executables
UIAccess No
Embed logo Yes
Set version info Yes
Collect system dll‘s Yes
Collect external Python dependencies and *.pyd files Yes
Collect data files Yes
Library file Yes

Nuitka

Suggestion by @ctoth in #8375 (comment)

Nuitka chooses a completely different approach. Instead of compiling the Python code to byte code and bundling a loader with it, it converts all code to c and then compiles it using VC++ and links it against the Python library. It also claims to be faster than CPython.

PROS

  • Nuitka might improve performance.

Cons

  • As all python code has to be converted to C++ and then compiled, creating a distribution of NVDA is going to be a time-consuming process. We might be able to provide pre-compiled obj files for static dependencies (such as wx and comtypes). This requires some investigation, to find out and is currently undocumented.
  • It looks like Nuitka doesn‘t support changing the path of modules. I‘m not even sure whether it would be possible to make Nuitka import python code bundled in add-ons. This is something to find out if we decide to explore this direction further.
  • THere is a huge runtime difference between running NVDA from source and from a distribution.

Requirements scheme

Feature supported
Create multiple executables Yes
Bundle manifest No
UIAccess No
Embed logo Yes
Set version info No
Collect system dll‘s No
Collect external Python dependencies and *.pyd files Unsure
Collect data files No
Library file No

HO to proceed?

Based on the above outline, I propose the following order of investigation of our options:

  1. Devote time to investigate using the Py2exe fork by @albertosottile. He seems to be pretty interested in our possible efforts to freeze NVDA with his fork. It might also be the least effort on our end. However, it would help to know what his goals are with the project, and whether he‘s willing to maintain it in the near and far future. @albertosottile: Would you be able to elaborate on this?
  2. Try to get in touch with the PyInstaller developers to point them at the main cons listed above. The most major question would be whether there would be support for addons and custom comtypes com interfaces.
  3. Try to get in touch with @anthony-tuininga to ask him about whether he‘s intending to continue the active development of cx_Freeze.
  4. Based on the outcome of 2 and 3 when 1 fails, decide between PyInstaller and cx_Freeze. In the current state, cx_Freeze has my preference, but that preference may change.

Note that option 1, 2 and 3 could be worked on in parallel. I‘m tempted to consider Nuitka being out of scope for now.

原文地址:https://www.cnblogs.com/xpvincent/p/11223829.html

时间: 2024-10-05 04:56:25

Python3.7 exe编译工具对比zz的相关文章

Java逆向武器库_反编译工具

1.反编译工具之_jd-gui 官网下载地址:http://java-decompiler.github.io/#jd-gui-download 使用: 下载后解压直接使用即可. jd-gui的优势是图形化界面 操作简单,但gui很久没有更新了 存在无法反编译的情况.   2.反编译工具之_CFR 官网下载地址:http://www.benf.org/other/cfr/ 使用: (1)命令行操作: 进入到CFR所在目标 执行命令(需反编译jar:http_operator.jar.反编译后输出

python3调用exe程序编写cve20190708批量检测工具

1.python3调用exe程序编写cve20190708批量检测工具 工具下载地址: https://www.qianxin.com/other/CVE-2019-0708 由于这个exe程序只是单IP扫描版本,于是使用python3修改为批量扫描脚本版本 #!/usr/bin/python3 #-*- coding:utf-8 -*- #编写环境 windows 7 x64 Notepad++ + Python3.5.0 import os import sys def main(): #需

Eclipse反编译工具Jad及插件JadClipse配置

Jad是一个Java的一个反编译工 具,是用命令行执行,和通常JDK自带的java,javac命令是一样的.不过因为是控制台运行,所以用起来不太方便.不过幸好有一个eclipse的 插件JadClipse,二者结合可以方便的在eclipse中查看class文件的源代码. 1  下载Eclipse反编译工具Jad. 下载路径:  http://pan.baidu.com/s/1tOSO2 2 把下载包中的 net.sf.jadclipse_3.3.0.jar放入到 eclipse的安装目录下,..

myeclipse安装jadclipse(反编译工具)

我是myeclipse5.5 的IDE工具.为了能反编译class文件,上网搜索了很多资料,终于找到一下的一段资料: 1.将jad.exe 复制到myeclipse安装目录的jre/bin目录下, 如:C:/Program Files/MyEclipse 5.5.1 GA/jre/bin/jad.exe : 2.然后将net.sf.jadclipse_3.2.4.jar复制到myeclipse安装目录下的eclipse/plugins目录下, 如:C:/Program Files/MyEclip

如何在eclipse中配置反编译工具JadClipse

Q:为什么有必要在开发环境中配置反编译工具呢? A:  当运行引用了第三方jar包项目时,突然报出了jar包中的某个类的某一行出现异常.我们想看一下这个class文件的代码时,经常出现了如下图所示的场景: god ,我的内心是崩溃的. 去找源码吗?可以,but很浪费时间(除非是maven项目,在pom.xml中引入依赖jar包会连同源文件下载下来). so ,在eclipse中配置反编译工具,就可以随时查看class文件的内容了. 下面就以JadClipse为例,讲述一下配置过程,如有高见,不吝

apk反编译工具-apktool

apk很easy被反编译,关于这篇文章apktool反编译工具. (一)优势反编译 1.能学习别人优秀代码 看看优秀apk他们的string.color命名规则,看看布局排版等都能学习到东西. 2.进行简单改动,二次打包 (二)apktool的使用 APKTool是GOOGLE提供的APK编译工具.2.0下面须要安装JDK6.0,2.0及以上须要安装JDK7.0. 这是apktool下载地址,把下载到的APKTOOL中的三个文件(aapt.exe.apktool.bat.apktool.jar)

ApkDec android反编译工具

转自:http://www.newasp.net/soft/70498.html 下载 ApkDec是一款免费的绿色APK反编译工具 forandroid ,由android开发者社区开发. ApkDec使用说明: (1)使用帮助1.选择 all 全部编译内容包括jar.xml.及其他资源文件2.选择 jar 只反编译并打成jar包3.反编译后你可以使用jd-gui.exe查看源码(2)jd-gui免费的java反编译查看工具,Java Decompiler(Java反编译器)下载 启动界面如图

Eclipse反编译工具Jad及插件JadClipse配置(转)

Eclipse反编译工具Jad及插件JadClipse配置 Jad是一个Java的一个反编译工具,是用命令行执行,和通常JDK自带的java,javac命令是一样的.不过因为是控制台运行,所以用起来不太方便.不过幸好有一个eclipse的插件JadClipse,二者结合可以方便的在eclipse中查看class文件的源代码.下面介绍一下配置:    A.下载JadClipse,http://jadclipse.sourceforge.net/wiki/index.php/Main_Page#Do

.net混淆、反编译工具调查

常用的工具列表[比较常见的] 混淆器.加密 Dotfuscator VS默认带的工具,不过是个社区版 强度不大 dotNET Reactor 使用了NativeCode 和混淆的形式 Xenocode Postbuild 专业工具 {smartassembly}.Setup.msi   反编译工具 Reflector 最富盛名的一个工具,很多插件都开源 Xenocode Fox 专业工具,商业版本 ildasm Vs带的工具 组件合并.虚拟工具:方便软件发布的工具,如合并多个dll文件等 Xen