Search results for

“codesign”

3,222 results found

Post

Replies

Boosts

Views

Activity

Reply to WeatherKit error on iOS 17 - macOS 14
This is still a problem for me on Xcode 15 beta 2. I inspected the built .app using codesign: codesign --display --entitlements :- YourApp.app And it is in fact missing the com.apple.developer.weatherkit entitlement, despite the fact that it is included in the project's Entitlements file.
Topic: UI Frameworks SubTopic: SwiftUI Tags:
Jun ’23
trusting the team_id codesign naming scheme?
I have a question about the amount of trust I should have in the team_id for an executable. I've been looking at the signing_id and team_id values in Apple's endpoint es_process_t, and almost all code follows the reverse naming scheme for their team_id. They have names like: com.getdropbox.dropbox com.microsoft.teams.helper com.apple.mdworker_shared com.apple.spctl But Google (at least) violates this reverse DNS pattern when signing many of their binaries. They have team IDs such as ksfetch GoogleSoftwareUpdateDaemon crashpad_handler Should I not trust the TLD (e.g., com.apple or com.microsoft) for the team ID? For example, could Google (or a malicious organization) sign their binary com.microsoft.ksfetch making me think it came from Microsoft?
3
0
1.5k
Apr ’23
codesign CLI throws error on OSX 12 (M1) and Xcode 12/13
Until I migrated to a new M1 machine running OSX 12, this used to work fine: codesign --sign --force --timestamp --options runtime Now, the exact same command (same cert, same binary) throws an error errSecInternalComponent internal error in Code Signing subsystem I found a vague reference that there might be some problems currently with Monterey in this regard and that ENABLE_BITCODE=NO might need to be used but it's not clear how to set that for CLI use like this. Any ideas much appreaciated.
4
0
3.1k
Jan ’22
Reply to NetworkExtension Flow source of traffic
You can do this using codesign: $ codesign -d --requirements - /Applications/TextEdit.app Executable=/Applications/TextEdit.app/Contents/MacOS/TextEdit designated => identifier com.apple.TextEdit and anchor apple $ $ codesign -d -v /Applications/TextEdit.app Executable=/Applications/TextEdit.app/Contents/MacOS/TextEdit Identifier=com.apple.TextEdit …Share and Enjoy — Quinn “The Eskimo!” Apple Developer Relations, Developer Technical Support, Core OS/Hardware let myEmail = eskimo + 1 + @apple.com
Mar ’18
Codesigning a non App Store application
Hi everyone, I am trying to build an app created by a software company that supplies its applications to us. They have their own Installation Maker for Mac. The builder requires an Apple Developer ID and the App password. I have created the App password, but I am lost with where I should find the Developer ID. We have a Team ID in the Dashboard and I also created a Developer ID Application certificate on my Mac via the dev website. I still cannot find the Developer ID. The new certificate is named Apple Development: Name Surname (XXYYYWWW). Is the ID in the brackets the Developer ID?
2
0
907
Aug ’20
Unable to run react native IOS application on device due to codesign errors
I have a react native application (that I deploy with expo). I am trying to run on ios. I had a app under a different account under the build identifier com.bcc.quickpass. There, the build was working fine. I transferred the app along with the build identifier to my current account. I then tried to run the app under my current account account using automated signing. The app builds but the following comes up: Here is the XCode Log: Could not launch “QuickPass” Domain: IDEDebugSessionErrorDomain Code: 3 Failure Reason: The operation couldn’t be completed. Unable to launch com.bcc.quickpass because it has an invalid code signature, inadequate entitlements or its profile has not been explicitly trusted by the user. User Info: { DVTErrorCreationDateKey = 2022-12-06 06:01:22 +0000; DVTRadarComponentKey = 855031; IDERunOperationFailingWorker = DBGLLDBLauncher; RawUnderlyingErrorMessage = The operation couldnU2019t be completed. Unable to launch com.bcc.quickpass because it has an invalid code signature, inadequate
1
0
1.5k
Dec ’22
Reply to Pkg installation package uploaded to macstore email prompt ITMS-90296
First things first, the TestFlight issue (ITMS-90886) is covered by TestFlight, Provisioning Profiles, and the Mac App Store. Regarding the App Sandbox issue (ITMS-90296), there’s a variety of potential causes for this. I recommend that you check whether App Sandbox is actually enabled on the binary that you submitted to App Store Connect. To do that: Locate the installer package (.pkg) you submitted. Unpack that. I usually do this with a third-party app (Pacifist), but Unpacking Apple Archives explains how to do it the hard way. Run codesign against the resulting app to confirm that its signature is valid: % codesign --verify -vvv /path/to/your.app Run codesign again to check that you have App Sandbox enabled: % codesign --display --entitlements - /path/to/your.app I’d expect to see output like this: % codesign --display --entitlements - /Applications/PCalc.app … [Dict] … [Key] com.apple.security.app-sandbox [Value] [Bool] true … Share and Enjoy — Quinn “The Eskim
Nov ’24
Reply to Simultaneous access to Keychain
Just in case anybody experiences the same problem and google leads to this thread: I've been able to fix it by making a wrapper around codesign which prevents parallel execution.Background: We use a smartcard to store the code signing key and use OpenSC to make it available in the keychain. The build process requires multiple codesign operations. The first sign-operation takes a while to complete. It completes successfully. But before it completes, several other sign-operations are started. These operations exit immediately with an error, before the first sign-operation completes.As a workaround, I have deactivated System Integrity Protection so that I can edit /usr/bin/. Then I have renamed /usr/bin/codesign to /usr/bin/codesign.orig and added the following script as /usr/bin/codesign:#!/bin/bash # This wrapper around codesign ensures that only one codesign operation is # running at the same time. When the signing is performed on a smart card # (via OpenS
Topic: App & System Services SubTopic: Core OS Tags:
Oct ’18
Notarization service says signature invalid, but codesign says it's fine
I'm trying to get an app notarized, which fails with this error: The signature of the binary is invalid. However, locally checking the signature does succeed: $ codesign -vvv --deep --strict TheApp.app […] TheApp.app: valid on disk TheApp.app: satisfies its Designated Requirement Performing this check on every single item in the app's MacOS folder also succeeds. Context: embedded prebuilt binaries Now, the app has something unusual about it: it embeds prebuilt binaries, arranged in various nested folders. So, the app bundle's MacOS folder actually contains another folder with a whole tree of executables and libraries: Removing these (before building) does fix the notarization issue, but obviously I'd like to keep them in. I did my best to properly sign these items: At build time, they're copied into the product by a Copy Files phase (but not signed), then signed by a script phase That signing uses the same signing identity as the running Xcode build, and enables the hardened runtime The app builds an
8
0
208
Apr ’25
Codesigning/Testflight differences for macOS distributed apps for macOS 12 and 13/14
We have run into a very unique situation with codesigning and testing the apps under TestFlight under macOS 12 and macOS 13/14. We have existing apps on the macApp store and we are trying to basically update them. When we run the newly updated versions via Testflight under macOS 12, everything is working. However, the same apps under macOS 13/14 and Testflight crashes and we have narrowed it to a codesigned dylib issue of ours. We are getting a invalid code signature message when we try to load a dylib under macOS 13/14 and the app crashes as we cant get the dylib code pointer. Basically CFBundleGetFunctionPointerForName returns an invalid value. Just to explain we build our dylibs/bundles and codesign them outside - as these are built at the command line level and finally we package these within our apps under XCODE and go through the whole app building/archiving, code signing, validation and uploading that to the appstore. The crash log shows - Code Type: ARM-64 (Native) Parent Pr
1
0
720
Nov ’23
Reply to notarization error : The signature of the binary is invalid
Anyone can give me some help to pass the notarization service? Below is my codesign command for the bundle, and the --deep parameter affects the signature of the main executable file. sudo codesign --force --deep --timestamp --options=runtime -s Developer ID Application: Some Company (XXXXXX) ./XXXX.app And I also tried to codesign the single executable file yyyy directly, but the error remained. I need more info to move forward. Or somebody can tell me how to connect with Apple Notarization Service Team. Their notarization response cannot point out what blocks my executable file.
Topic: App & System Services SubTopic: Core OS Tags:
Apr ’21
Reply to WeatherKit error on iOS 17 - macOS 14
This is still a problem for me on Xcode 15 beta 2. I inspected the built .app using codesign: codesign --display --entitlements :- YourApp.app And it is in fact missing the com.apple.developer.weatherkit entitlement, despite the fact that it is included in the project's Entitlements file.
Topic: UI Frameworks SubTopic: SwiftUI Tags:
Replies
Boosts
Views
Activity
Jun ’23
trusting the team_id codesign naming scheme?
I have a question about the amount of trust I should have in the team_id for an executable. I've been looking at the signing_id and team_id values in Apple's endpoint es_process_t, and almost all code follows the reverse naming scheme for their team_id. They have names like: com.getdropbox.dropbox com.microsoft.teams.helper com.apple.mdworker_shared com.apple.spctl But Google (at least) violates this reverse DNS pattern when signing many of their binaries. They have team IDs such as ksfetch GoogleSoftwareUpdateDaemon crashpad_handler Should I not trust the TLD (e.g., com.apple or com.microsoft) for the team ID? For example, could Google (or a malicious organization) sign their binary com.microsoft.ksfetch making me think it came from Microsoft?
Replies
3
Boosts
0
Views
1.5k
Activity
Apr ’23
Reply to Trust evaluate failure: [leaf TemporalValidity]
Thanks for the answer. Is this enough to run codesign -dv --verbose=4 /path/to/executable_or_dylib to track down the issue ? I'll check if device time is properly set and I'll try to get codesign output as well. Thanks !
Topic: Privacy & Security SubTopic: General Tags:
Replies
Boosts
Views
Activity
Jan ’21
codesign CLI throws error on OSX 12 (M1) and Xcode 12/13
Until I migrated to a new M1 machine running OSX 12, this used to work fine: codesign --sign --force --timestamp --options runtime Now, the exact same command (same cert, same binary) throws an error errSecInternalComponent internal error in Code Signing subsystem I found a vague reference that there might be some problems currently with Monterey in this regard and that ENABLE_BITCODE=NO might need to be used but it's not clear how to set that for CLI use like this. Any ideas much appreaciated.
Replies
4
Boosts
0
Views
3.1k
Activity
Jan ’22
Reply to NetworkExtension Flow source of traffic
You can do this using codesign: $ codesign -d --requirements - /Applications/TextEdit.app Executable=/Applications/TextEdit.app/Contents/MacOS/TextEdit designated => identifier com.apple.TextEdit and anchor apple $ $ codesign -d -v /Applications/TextEdit.app Executable=/Applications/TextEdit.app/Contents/MacOS/TextEdit Identifier=com.apple.TextEdit …Share and Enjoy — Quinn “The Eskimo!” Apple Developer Relations, Developer Technical Support, Core OS/Hardware let myEmail = eskimo + 1 + @apple.com
Replies
Boosts
Views
Activity
Mar ’18
Codesigning a non App Store application
Hi everyone, I am trying to build an app created by a software company that supplies its applications to us. They have their own Installation Maker for Mac. The builder requires an Apple Developer ID and the App password. I have created the App password, but I am lost with where I should find the Developer ID. We have a Team ID in the Dashboard and I also created a Developer ID Application certificate on my Mac via the dev website. I still cannot find the Developer ID. The new certificate is named Apple Development: Name Surname (XXYYYWWW). Is the ID in the brackets the Developer ID?
Replies
2
Boosts
0
Views
907
Activity
Aug ’20
Unable to run react native IOS application on device due to codesign errors
I have a react native application (that I deploy with expo). I am trying to run on ios. I had a app under a different account under the build identifier com.bcc.quickpass. There, the build was working fine. I transferred the app along with the build identifier to my current account. I then tried to run the app under my current account account using automated signing. The app builds but the following comes up: Here is the XCode Log: Could not launch “QuickPass” Domain: IDEDebugSessionErrorDomain Code: 3 Failure Reason: The operation couldn’t be completed. Unable to launch com.bcc.quickpass because it has an invalid code signature, inadequate entitlements or its profile has not been explicitly trusted by the user. User Info: { DVTErrorCreationDateKey = 2022-12-06 06:01:22 +0000; DVTRadarComponentKey = 855031; IDERunOperationFailingWorker = DBGLLDBLauncher; RawUnderlyingErrorMessage = The operation couldnU2019t be completed. Unable to launch com.bcc.quickpass because it has an invalid code signature, inadequate
Replies
1
Boosts
0
Views
1.5k
Activity
Dec ’22
Reply to "No identity found" error when codesigning app
codesign -f -s 3rd Party Mac Developer Application: MyName (MyNumber) MyApp.app Here you just have to provide MyNumber to -s arg. Here is how it gets done: codesign -f -s MyNumber MyApp.app Happy Code Signing!
Topic: Code Signing SubTopic: General Tags:
Replies
Boosts
Views
Activity
Aug ’20
Reply to Pkg installation package uploaded to macstore email prompt ITMS-90296
First things first, the TestFlight issue (ITMS-90886) is covered by TestFlight, Provisioning Profiles, and the Mac App Store. Regarding the App Sandbox issue (ITMS-90296), there’s a variety of potential causes for this. I recommend that you check whether App Sandbox is actually enabled on the binary that you submitted to App Store Connect. To do that: Locate the installer package (.pkg) you submitted. Unpack that. I usually do this with a third-party app (Pacifist), but Unpacking Apple Archives explains how to do it the hard way. Run codesign against the resulting app to confirm that its signature is valid: % codesign --verify -vvv /path/to/your.app Run codesign again to check that you have App Sandbox enabled: % codesign --display --entitlements - /path/to/your.app I’d expect to see output like this: % codesign --display --entitlements - /Applications/PCalc.app … [Dict] … [Key] com.apple.security.app-sandbox [Value] [Bool] true … Share and Enjoy — Quinn “The Eskim
Replies
Boosts
Views
Activity
Nov ’24
Reply to Cannot build project due to Code sign error /invalid resource specification rule(s)/
Remove CFBundleResourceSpecification key from Info.plist and codesign works
Replies
Boosts
Views
Activity
Sep ’16
Reply to iOS manually built framework fails when installing app with Application Signature Not Valid
Please provide the output of running codesign as suggested.
Replies
Boosts
Views
Activity
Jan ’16
Reply to Simultaneous access to Keychain
Just in case anybody experiences the same problem and google leads to this thread: I've been able to fix it by making a wrapper around codesign which prevents parallel execution.Background: We use a smartcard to store the code signing key and use OpenSC to make it available in the keychain. The build process requires multiple codesign operations. The first sign-operation takes a while to complete. It completes successfully. But before it completes, several other sign-operations are started. These operations exit immediately with an error, before the first sign-operation completes.As a workaround, I have deactivated System Integrity Protection so that I can edit /usr/bin/. Then I have renamed /usr/bin/codesign to /usr/bin/codesign.orig and added the following script as /usr/bin/codesign:#!/bin/bash # This wrapper around codesign ensures that only one codesign operation is # running at the same time. When the signing is performed on a smart card # (via OpenS
Topic: App & System Services SubTopic: Core OS Tags:
Replies
Boosts
Views
Activity
Oct ’18
Notarization service says signature invalid, but codesign says it's fine
I'm trying to get an app notarized, which fails with this error: The signature of the binary is invalid. However, locally checking the signature does succeed: $ codesign -vvv --deep --strict TheApp.app […] TheApp.app: valid on disk TheApp.app: satisfies its Designated Requirement Performing this check on every single item in the app's MacOS folder also succeeds. Context: embedded prebuilt binaries Now, the app has something unusual about it: it embeds prebuilt binaries, arranged in various nested folders. So, the app bundle's MacOS folder actually contains another folder with a whole tree of executables and libraries: Removing these (before building) does fix the notarization issue, but obviously I'd like to keep them in. I did my best to properly sign these items: At build time, they're copied into the product by a Copy Files phase (but not signed), then signed by a script phase That signing uses the same signing identity as the running Xcode build, and enables the hardened runtime The app builds an
Replies
8
Boosts
0
Views
208
Activity
Apr ’25
Codesigning/Testflight differences for macOS distributed apps for macOS 12 and 13/14
We have run into a very unique situation with codesigning and testing the apps under TestFlight under macOS 12 and macOS 13/14. We have existing apps on the macApp store and we are trying to basically update them. When we run the newly updated versions via Testflight under macOS 12, everything is working. However, the same apps under macOS 13/14 and Testflight crashes and we have narrowed it to a codesigned dylib issue of ours. We are getting a invalid code signature message when we try to load a dylib under macOS 13/14 and the app crashes as we cant get the dylib code pointer. Basically CFBundleGetFunctionPointerForName returns an invalid value. Just to explain we build our dylibs/bundles and codesign them outside - as these are built at the command line level and finally we package these within our apps under XCODE and go through the whole app building/archiving, code signing, validation and uploading that to the appstore. The crash log shows - Code Type: ARM-64 (Native) Parent Pr
Replies
1
Boosts
0
Views
720
Activity
Nov ’23
Reply to notarization error : The signature of the binary is invalid
Anyone can give me some help to pass the notarization service? Below is my codesign command for the bundle, and the --deep parameter affects the signature of the main executable file. sudo codesign --force --deep --timestamp --options=runtime -s Developer ID Application: Some Company (XXXXXX) ./XXXX.app And I also tried to codesign the single executable file yyyy directly, but the error remained. I need more info to move forward. Or somebody can tell me how to connect with Apple Notarization Service Team. Their notarization response cannot point out what blocks my executable file.
Topic: App & System Services SubTopic: Core OS Tags:
Replies
Boosts
Views
Activity
Apr ’21