Search results for

“codesign”

3,222 results found

Post

Replies

Boosts

Views

Activity

Reply to jpackage bombing on codesign/libnet.dylib (but only on M2 MacBook)
The jpackage command tool provided by Oracle: It specifies some options for MacOS code signing: --mac-sign --mac-package-signing-prefix ST_DFG2D_ARM --mac-signing-key-user-name Pierre Bierre that it reformats when it runs and calls Apple's codesign. Maybe you can show me how to translate these options into a discrete call to codesign? [14:06:05.820] java.io.IOException: Command [/usr/bin/codesign, -s, Developer ID Application: Pierre Bierre (SL7L4YU8GT), -vvvv, --timestamp, --options, runtime, --prefix, ST_DFG2D_ARM, /var/folders/v7/06pp2_5d6gz9593k96n2z0v40000gn/T/jdk.jpackage8264959517592888307/images/image-10714515757680011645/DataflowGeometry2D.app/Contents/runtime/Contents/Home/lib/libnet.dylib] exited with 1 code I tried this guess: codesign --sign Pierre Bierre (SL7L4YU8GT) --force --options runtime --verbose --timestamp ~/DFG2D_MacOS_Manufacturing/MacOSInstallers/DFG2D_Mac_J17010_295 The response was: error: The specified item could not be found in the keychain. Not
Topic: Code Signing SubTopic: General
Jun ’25
resource fork, Finder information, or similar detritus not allowed Command /usr/bin/codesign failed with exit code 1
When trying to build two objective C apps under Xcode 8.1 I get an error:resource fork, Finder information, or similar detritus not allowedCommand /usr/bin/codesign failed with exit code 1Following the advice I found on this forum I went to the termial app and executedMac-Pro:~ bruce$ cd My Projects/PerPuzzleMac-Pro:PerPuzzle bruce$ xattr -rcMac-Pro:PerPuzzle bruce$ cd DerivedDataMac-Pro:DerivedData bruce$ xattr -rcThis procedure had no effect.Does anyone have any advice on how I might proceed?
1
0
2.2k
Nov ’16
Reply to jpackage java.io.IOException libnet.dylib
continued... I attempted to rerun codesign to get more info: % codesign --timestamp --options runtime -s 'Developer ID Installer: firstName lastName (redactedCode)' --prefix com.neogenesis.pfaat. -vvvv --keychain /Users/dcaffrey/Library/Keychains/login.keychain-db /var/folders/rh/2slcpd4s0qn46fgfz32680_80000gn/T/jdk.jpackage17110438044419986386/images/image-8953270622600972312/Pfaat.app/Contents/runtime/Contents/Home/lib/libnet.dylib Developer ID Installer: firstName lastName (redactedCode): **this identity cannot be used for signing code**
Topic: Code Signing SubTopic: General Tags:
Feb ’22
Reply to codesign doesn't use the keychain path passed via --keychain
I’m not entirely sure what’s going on with the --keychain parameter but the best way to solve this issue: I have two certs with same name so prevent the ambiguity that codesign has when it finds two certs with same name is to pass the hash of the signing identity’s certificate to codesign. I talk about this in Creating Distribution-Signed Code for Mac (search the doc for SHA-1). Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: Code Signing SubTopic: General Tags:
May ’22
Reply to Moving signing to a new machine
I raise this question again. Earlier you suggested: The easiest way to do this is use Xcode’s import/export feature. Launch Xcode, choose Xcode > Settings, select Accounts, select the account in question, then choose Export Apple ID and Code Signing Assets from the action (…) menu. In Xcode 16 I cannot find any import/export commands to move existing codesign certificates/keys to my second Mac. Probably it will easier to create a NEW individual codesign certificate for EVERY Mac I use?
Mar ’25
Reply to Does Mac OS support any HSM integration for code signing?
The codesign utility uses standard keychain APIs to access the digital identity it uses for signing, so it should be compatible with hardware tokens that integrate with the keychain (this presumes you have some way to load the Apple-issued certificate on to the hardware token). If yes, please describe the process as well.I don’t have any direct experience with this, alas. However, the usual setup for hardware tokens is that they appear as a keychain, so if your token is configured correctly, you shouldn’t need to do anything special on the codesign side of things. That is, you’d just pass a string that identifies the digital identity to codesign in the same way you currently do (see the Signing Identities section of codesignman page). Share and Enjoy — Quinn “The Eskimo!” Apple Developer Relations, Developer Technical Support, Core OS/Hardware let myEmail = eskimo + 1 + @apple.com
Topic: Privacy & Security SubTopic: General Tags:
Oct ’19
Reply to Endpoint security extension installing but getting binary is improperly signed error
Yes, I have been granted access. Hmmm. That suggests that you’ve not applied the entitlement correctly. Run these commands: % codesign -v -vvv --deep /path/to/your/container.app % codesign -d --entitlements :- /path/to/your/container.app % security cms -D -i /path/to/your/container.app/Contents/embedded.provisionprofile % codesign -d --entitlements :- /path/to/your/container.app/Contents/Library/SystemExtensions/your.systemextension % security cms -D -i /path/to/your/container.app/Library/Contents/SystemExtensions/your.systemextension/Contents/embedded.provisionprofile The goal is to check that: Your code is correctly signed. Every entitlement claimed by your code signature is in the allowlist within the provisioning profile. For both the app and the sysex. Your app has the com.apple.developer.system-extension.install entitlement. Your sysex has the com.apple.developer.endpoint-security.client entitlement. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple l
Topic: App & System Services SubTopic: Drivers Tags:
Mar ’21
Reply to Accessibility permission in sandboxed app
I’m not able to reverse engineer other developer’s apps on your behalf, but I can offer some general advice. You can tell whether an app is sandboxed using codesign. For example, BBEdit is sandboxed: % codesign -d --entitlements - /Applications/BBEdit.app | grep -A 2 com.apple.security.app-sandbox … [Key] com.apple.security.app-sandbox [Value] [Bool] true but Xcode is not: % codesign -d --entitlements - /Applications/Xcode.app | grep -A 2 com.apple.security.app-sandbox … % Not all Mac App Store apps are sandboxed. Some apps shipped on the store before sandboxing was required. So, when you see an app that does something that’s seemingly impossible, it’s a good idea to check whether it’s actually sandboxed or not. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Sep ’25
Command CodeSign failed with a nonzero exit code In Xcode 11.3 in Big Sur OS and Lock/unLock Login is Disabled in Keychain Access
Hi Guys, Currently, I'm working on iOS native App. When I tried to run the App on iOS Device. I have received the Command CodeSign failed with a nonzero exit code As per the developer forum, I need to Lock and unlock the Login certificate in Keychain Access But When I open the Keychain All option are disabled in macOS Big Sur. I don't know what to do with that. Please provide the solution. Thanks in Advance.
0
0
503
May ’21
Reply to Xcode 12.5 "code signature version is no longer supported"
What’s the output of this command for your app, and any other bundles in your app (ie frameworks, app extensions, etc)? codesign -dv /path/to/MyApp.app
Replies
Boosts
Views
Activity
May ’21
Reply to Gatekeeper does not allow a bundle to run before manually running spctl --assess of contained dylib files
I've included the plug-in's file structure at the top of the question above. I've skipped just the files created by codesign and spctl.
Topic: Code Signing SubTopic: General Tags:
Replies
Boosts
Views
Activity
Feb ’20
Reply to SceneKit Xcode 15 Beta3
Sorry forgot to mention this the instant crash error error seems to be some what bogus any way : Command CodeSign failed with a nonzero exit code
Topic: Graphics & Games SubTopic: GameKit Tags:
Replies
Boosts
Views
Activity
Jul ’23
Reply to jpackage bombing on codesign/libnet.dylib (but only on M2 MacBook)
The jpackage command tool provided by Oracle: It specifies some options for MacOS code signing: --mac-sign --mac-package-signing-prefix ST_DFG2D_ARM --mac-signing-key-user-name Pierre Bierre that it reformats when it runs and calls Apple's codesign. Maybe you can show me how to translate these options into a discrete call to codesign? [14:06:05.820] java.io.IOException: Command [/usr/bin/codesign, -s, Developer ID Application: Pierre Bierre (SL7L4YU8GT), -vvvv, --timestamp, --options, runtime, --prefix, ST_DFG2D_ARM, /var/folders/v7/06pp2_5d6gz9593k96n2z0v40000gn/T/jdk.jpackage8264959517592888307/images/image-10714515757680011645/DataflowGeometry2D.app/Contents/runtime/Contents/Home/lib/libnet.dylib] exited with 1 code I tried this guess: codesign --sign Pierre Bierre (SL7L4YU8GT) --force --options runtime --verbose --timestamp ~/DFG2D_MacOS_Manufacturing/MacOSInstallers/DFG2D_Mac_J17010_295 The response was: error: The specified item could not be found in the keychain. Not
Topic: Code Signing SubTopic: General
Replies
Boosts
Views
Activity
Jun ’25
Reply to Notarization: 'Unable to validate your application' error
Hi Massimo,have you signed with the hardened runtime entitlement file?Codesign --verify doesn't care about hardened runtime, but notarisation does.GreetingsBrigitte
Topic: Code Signing SubTopic: General Tags:
Replies
Boosts
Views
Activity
Sep ’19
Reply to Big Sur Problem?: "You do not have permission to open the application"
Use this. It worked for me - codesign --force --deep --sign - /Applications/SpringToolSuite4.app It will try to force sign the app and give you permission to run it.
Topic: App & System Services SubTopic: Core OS Tags:
Replies
Boosts
Views
Activity
Jul ’21
resource fork, Finder information, or similar detritus not allowed Command /usr/bin/codesign failed with exit code 1
When trying to build two objective C apps under Xcode 8.1 I get an error:resource fork, Finder information, or similar detritus not allowedCommand /usr/bin/codesign failed with exit code 1Following the advice I found on this forum I went to the termial app and executedMac-Pro:~ bruce$ cd My Projects/PerPuzzleMac-Pro:PerPuzzle bruce$ xattr -rcMac-Pro:PerPuzzle bruce$ cd DerivedDataMac-Pro:DerivedData bruce$ xattr -rcThis procedure had no effect.Does anyone have any advice on how I might proceed?
Replies
1
Boosts
0
Views
2.2k
Activity
Nov ’16
Reply to macOS file provider error -2001
Turns out that PluginKit error was due to --deep codesigning flag enabled for the app target. The original error was caused by lack of $(TeamIdentifierPrefix) prefix in NSExtensionFileProviderDocumentGroup.
Topic: App & System Services SubTopic: Core OS Tags:
Replies
Boosts
Views
Activity
Mar ’22
Reply to jpackage java.io.IOException libnet.dylib
continued... I attempted to rerun codesign to get more info: % codesign --timestamp --options runtime -s 'Developer ID Installer: firstName lastName (redactedCode)' --prefix com.neogenesis.pfaat. -vvvv --keychain /Users/dcaffrey/Library/Keychains/login.keychain-db /var/folders/rh/2slcpd4s0qn46fgfz32680_80000gn/T/jdk.jpackage17110438044419986386/images/image-8953270622600972312/Pfaat.app/Contents/runtime/Contents/Home/lib/libnet.dylib Developer ID Installer: firstName lastName (redactedCode): **this identity cannot be used for signing code**
Topic: Code Signing SubTopic: General Tags:
Replies
Boosts
Views
Activity
Feb ’22
Reply to codesign doesn't use the keychain path passed via --keychain
I’m not entirely sure what’s going on with the --keychain parameter but the best way to solve this issue: I have two certs with same name so prevent the ambiguity that codesign has when it finds two certs with same name is to pass the hash of the signing identity’s certificate to codesign. I talk about this in Creating Distribution-Signed Code for Mac (search the doc for SHA-1). Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: Code Signing SubTopic: General Tags:
Replies
Boosts
Views
Activity
May ’22
Reply to Moving signing to a new machine
I raise this question again. Earlier you suggested: The easiest way to do this is use Xcode’s import/export feature. Launch Xcode, choose Xcode > Settings, select Accounts, select the account in question, then choose Export Apple ID and Code Signing Assets from the action (…) menu. In Xcode 16 I cannot find any import/export commands to move existing codesign certificates/keys to my second Mac. Probably it will easier to create a NEW individual codesign certificate for EVERY Mac I use?
Replies
Boosts
Views
Activity
Mar ’25
Reply to Does Mac OS support any HSM integration for code signing?
The codesign utility uses standard keychain APIs to access the digital identity it uses for signing, so it should be compatible with hardware tokens that integrate with the keychain (this presumes you have some way to load the Apple-issued certificate on to the hardware token). If yes, please describe the process as well.I don’t have any direct experience with this, alas. However, the usual setup for hardware tokens is that they appear as a keychain, so if your token is configured correctly, you shouldn’t need to do anything special on the codesign side of things. That is, you’d just pass a string that identifies the digital identity to codesign in the same way you currently do (see the Signing Identities section of codesignman page). Share and Enjoy — Quinn “The Eskimo!” Apple Developer Relations, Developer Technical Support, Core OS/Hardware let myEmail = eskimo + 1 + @apple.com
Topic: Privacy & Security SubTopic: General Tags:
Replies
Boosts
Views
Activity
Oct ’19
Reply to Endpoint security extension installing but getting binary is improperly signed error
Yes, I have been granted access. Hmmm. That suggests that you’ve not applied the entitlement correctly. Run these commands: % codesign -v -vvv --deep /path/to/your/container.app % codesign -d --entitlements :- /path/to/your/container.app % security cms -D -i /path/to/your/container.app/Contents/embedded.provisionprofile % codesign -d --entitlements :- /path/to/your/container.app/Contents/Library/SystemExtensions/your.systemextension % security cms -D -i /path/to/your/container.app/Library/Contents/SystemExtensions/your.systemextension/Contents/embedded.provisionprofile The goal is to check that: Your code is correctly signed. Every entitlement claimed by your code signature is in the allowlist within the provisioning profile. For both the app and the sysex. Your app has the com.apple.developer.system-extension.install entitlement. Your sysex has the com.apple.developer.endpoint-security.client entitlement. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple l
Topic: App & System Services SubTopic: Drivers Tags:
Replies
Boosts
Views
Activity
Mar ’21
Reply to Accessibility permission in sandboxed app
I’m not able to reverse engineer other developer’s apps on your behalf, but I can offer some general advice. You can tell whether an app is sandboxed using codesign. For example, BBEdit is sandboxed: % codesign -d --entitlements - /Applications/BBEdit.app | grep -A 2 com.apple.security.app-sandbox … [Key] com.apple.security.app-sandbox [Value] [Bool] true but Xcode is not: % codesign -d --entitlements - /Applications/Xcode.app | grep -A 2 com.apple.security.app-sandbox … % Not all Mac App Store apps are sandboxed. Some apps shipped on the store before sandboxing was required. So, when you see an app that does something that’s seemingly impossible, it’s a good idea to check whether it’s actually sandboxed or not. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Replies
Boosts
Views
Activity
Sep ’25
Command CodeSign failed with a nonzero exit code In Xcode 11.3 in Big Sur OS and Lock/unLock Login is Disabled in Keychain Access
Hi Guys, Currently, I'm working on iOS native App. When I tried to run the App on iOS Device. I have received the Command CodeSign failed with a nonzero exit code As per the developer forum, I need to Lock and unlock the Login certificate in Keychain Access But When I open the Keychain All option are disabled in macOS Big Sur. I don't know what to do with that. Please provide the solution. Thanks in Advance.
Replies
0
Boosts
0
Views
503
Activity
May ’21