Search results for

Apple Maps Guides

154,040 results found

Post

Replies

Boosts

Views

Activity

Accept a Review Rejection Defeat or Play Along with Reviewer
I have a desktop application developed in SwiftUI that shows property locations on the map. That's NOT the main feature. IF you give the application permission to access your location, the blue dot will appear on the map. If you don't, the blue user dot won't appear. That's the only difference with location services. In other words, the application has no use of user's current position beyond showing it on the map. Since it's just the matter of showing or not showing the blue dot on the map, the application doesn't really need to use the location service. Anyway, the reviewer is talking about something else by rejecting the application in two aspects. Guideline 5.1.1 - Legal - Privacy - Data Collection and Storage Guideline 5.1.5 - Legal - Privacy - Location Services As I said earlier, the application only wants to show the blue dot on the map so that you can see your property locations relative to your current location. In code, it's something like the following.
3
0
148
1w
Reply to Biometrics prompt + private key access race condition on since iOS 26.1
Well, that’s not good. I suggest you retry this on the current 26.3 beta, just in case. Assuming the problem shows up there as well, you should file a bug about it. Make sure to include a sysdiagnose log taken shortly after reproducing the problem, ideally as soon as you see the fuzzy screen you showed in your screenshot. Once you’re done, please post your bug number and I’ll take another look. At the API level, one option you have is to create an LAContext and pass it in to each SecItemCopyMatching call via kSecUseAuthenticationContext. It’s not clear whether you’re doing that or not. Please confirm either way. It’s also not clear if it’s even the right thing to do. This technique makes sense when the user performs a single high-level operation that requires multiple cryptographic operations with the same key. However, if the user performs two separate high-level operations back-to-back and that reproduces this issue, then trying to work around this using kSecUseAuthenticationContext isn’t really the right c
Topic: Privacy & Security SubTopic: General Tags:
1w
Reply to All notarization submissions stuck "In Progress" for 24+ hours — first-time Electron app
[quote='875615022, daniel-l, /thread/814827?answerId=875615022#875615022, /profile/daniel-l'] Is this a known service-side delay? [/quote] That depends on what you mean by “delay”. I recommend you read my up-thread post that discusses the “in-depth analysis” path. [quote='875615022, daniel-l, /thread/814827?answerId=875615022#875615022, /profile/daniel-l'] should I just wait? [/quote] Yes. If it stays stuck longer than a week, write back here and I’ll dig deeper. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: Code Signing SubTopic: Notarization Tags:
1w
Reply to Notarization stuck "In Progress" for 48+ hours - 6 submissions (Team ID: Y7T24GD249)
[quote='875490022, digitalbrandingmasters, /thread/815000?answerId=875490022#875490022, /profile/digitalbrandingmasters'] All 6 submissions stuck. [/quote] Yep. That’s typical of what I’ve seen developer report in cases like this. [quote='875490022, digitalbrandingmasters, /thread/815000?answerId=875490022#875490022, /profile/digitalbrandingmasters'] my oldest submission is now over 63 hours stuck In Progress [/quote] Indeed. That’s longer that typical, but certainly not unheard of. If it stays stuck that way for longer than a week, ping me here and I’ll dig deeper. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
1w
Reply to Inter-app Communication with Third Party SDK
Doing what you’re suggesting on iOS isn’t really feasible. There are two potential sticking points: Running in the background Inter-process communication (IPC) I talk about the first in general terms in iOS Background Execution Limits. However, in your case this might not be a showstopper because you’re interacting with a Bluetooth LE accessory, and Core Bluetooth does have background execution facilities [1]. The second point is much more problematic. In general, iOS doesn’t allow unmediated IPC between apps from different teams. This isn’t a limitation, but a deliberate design decision based on security and privacy policy. The only path forward I see here is for you to ship an SDK that interacts with the Bluetooth accessory directly, that is, from within the process of the app that adopts the SDK. However, that presents other challenges: Each app will need to request the Bluetooth privilege from the user. You have to find a way to mediate access from multiple apps. You can’t do that on the iOS side because
1w
Reply to trapping specific standard system registers
I have filed FB21917334 Thanks! however not in a Hypervisor Framework category as it does not exist Virtualization is fine. But that’s not a problem; it’ll find its way to the right place. ps It’s better to reply as a reply, rather than in the comments; see Quinn’s Top Ten DevForums Tips for this and other titbits. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: App & System Services SubTopic: Core OS Tags:
1w
Reply to Reproducible EXC_BAD_ACCESS in NEDNSProxyProvider when using async/await variants of NEAppProxyUDPFlow
OK, cool. Well, not cool, but you know what I mean (-: Given that you can reproduce this so easily, I recommend that you file a bug about it now. When doing that: Make sure to enable additional VPN logging, per the VPN (Network Extension) instructions on our Bug Reporting > Profiles and Logs page. After reproducing the problem, grab a sysdiagnose and attach it to your bug report. Once you’re done, post your bug number here. My plan is then to grab the crash report from your sysdiagnose log and dig a bit deeper. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
1w
Reply to How can I create a more complex XPCPeerRequirement?
Entitlements and code-signing requirements are very different. See the following for more background on each: TN3125 Inside Code Signing: Provisioning Profiles TN3127 Inside Code Signing: Requirements You can use a code-signing requirement to check for an entitlement, for example: % codesign --verify -R '=entitlement [com.apple.security.app-sandbox] exists' -v /Applications/Pages.app … /Applications/Pages.app: explicit requirement satisfied % codesign --verify -R '=entitlement [com.apple.security.app-sandbox] exists' -v /usr/bin/true … test-requirement: code failed to satisfy specified code requirement(s) However, entitlements are tricky to use in this situation because: You can’t create a provisioning profile that authorises a custom requirement. Many of of the popular entitlements are either unrestricted on macOS, or only restricted in that they clear the entitlement-validate flag [1]. Given that, I think maintaining your previous approach makes sense, that is, check for the Team ID and a list of code-signi
Topic: Code Signing SubTopic: Entitlements Tags:
1w
How can I create a more complex XPCPeerRequirement?
I have been updating some NSXPCConnection code in my macOS 26 app (not sandboxed) to use XPCSession and friends instead. And it is working well and the experience has been generally good. But I have run into a problem when using XPCSession.setPeerRequirement() which I really want to use. It works well when I use something simple like XPCPeerRequirement.isFromSameTeam() but I want to check some more requirements and also use the code from multiple apps (but same team). That is, I want to check for multiple identifiers and team ID and version (and perhaps also in the future that the certificate is a Developer ID). And previously I would use SecRequirementCreateWithString with an entitlement string conceptually like this: var entitlement = anchor apple generic and ( entitlement += identifier idA entitlement += or identifier idB entitlement += ) entitlement += and certificate leaf[subject.OU] = TeamID entitlement += # and info [CFBundleShortVersionString] >= 1.0# and it works just as it should when
1
0
216
1w
Reply to iOS 26+ (some users only) Keychain item readable right after save, but missing after app relaunch (errSecItemNotFound -25300)
Most of the weird keychain failures I see like this are caused by folks using the keychain API incorrectly. I talk about this a lot of in: SecItem: Fundamentals SecItem: Pitfalls and Best Practices However, your additem and readitem summaries look pretty reasonable. It’s hard to see how you could hit the symptoms you’ve described based on this setup. Are you able to reproduce this on a device that you control? Or are you investing this based solely on reports coming in from your users? Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: Privacy & Security SubTopic: General Tags:
1w
Reply to iOS Keychain + Derived Credentials: Technical help needed!
Thanks for bringing this to the Apple Developer Forums. First up, I want to double check that this is for iOS. You mentioned the “System Keychain”, which is a macOS thing [1]. On iOS there is only one keychain, known as the data protection keychain. Within that keychain, credentials exist within a keychain access group. Your app’s access to keychain access groups is moderated by entitlements, as explained in Sharing access to keychain items among a collection of apps. Note For a lot more background on keychain APIs, see: SecItem: Fundamentals SecItem: Pitfalls and Best Practices Next, let’s look at your specific questions: [quote='815135021, HSB, /thread/815135, /profile/HSB'] 1- Is there an API that allows us to create a signature without us having to pass the private key itself [/quote] No. iOS does have the ability to work with keys where the key material isn’t directly accessible to your app. We use this, for example, to allow keys to be protected by the Secure Enclave and to support keys stored
Topic: Privacy & Security SubTopic: General Tags:
1w