Search results for

“codesign”

3,223 results found

Post

Replies

Boosts

Views

Activity

Issues with Invalid Binary Signatures During macOS Notarization of Electron App
Hello Apple Developer Community, I've been working on notarizing my macOS application, Deep Focus, built using Electron, but I'm encountering persistent issues with binary signatures being reported as invalid during the notarization process. I followed Apple's notarization documentation and ensured that all necessary configurations are in place, but I'm still seeing multiple Invalid errors in the notarization log. Here’s the process I've followed so far: 1. System and Tools Setup: macOS version: Apple M1 Pro Sonoma 14.5 macOS SDK: macOS 15.0 Xcode version: Version 16.0 (16A242d) (Using VSCode instead of XCode since this is an Electron /JavaScript project.) Link to source code for inspection 2. Notarization Process: Successfully stored credentials in Keychain using xcrun notarytool store-credentials. Signed all app components, including frameworks, using the command: for framework in dist/Deep Focus-darwin-arm64/Deep Focus.app/Contents/Frameworks/*.framework; do codesign --force --deep --options runti
2
0
887
Oct ’24
xcodebuild is very slow unless you set CODE_SIGNING_ALLOWED=NO"
Incremental builds using xcodebuild are very slow, around 3x slower when compared to the same build using Xcode. Recently, I discovered that CODE_SIGNING_ALLOWED=NO fixed the issue, but of course, I can't then run iOS app. It seems like automatic signing using xcodebuild is somehow broken. Therefore, I think I could set CODE_SIGNING_ALLOWED=NO and sign it manually later. However, I'm not sure how to do that. I checked what Xcode does and it's: /usr/bin/codesign --force --sign - --entitlements /Users/wkulik/Library/Developer/Xcode/DerivedData/XYZ-hblnhsksxjrctzekqmlevcflnsji/Build/Intermediates.noindex/XYZ.build/Debug-iphonesimulator/XYZ.build/XYZ.app.xcent --timestamp=none --generate-entitlement-der /Users/wkulik/Library/Developer/Xcode/DerivedData/XYZ-hblnhsksxjrctzekqmlevcflnsji/Build/Products/Debug-iphonesimulator/XYZ.app However, if I run xcodebuild with disabled signing I don't have XYZ.app.xcent required by this command. I also tried: codesign --force --deep --sign Apple Development: J
1
0
1.1k
Oct ’24
Reply to Issues with Embedding Python Interpreter in MacOS App Distributed via TestFlight
Hello, thanks a lot for your guidance. This is the error I am facing at the moment, tried some things but I am stuck: Prompting policy for hardened runtime; service: kTCCServiceAppleEvents requires entitlement com.apple.security.automation.apple-events but it is missing for accessing={TCCDProcess: identifier={APP_IDENTIFIER}, pid=63455, auid=502, euid=502, binary_path=[PATH_APP]}, requesting={TCCDProcess: identifier=com.apple.appleeventsd, pid=756, auid=55, euid=55, binary_path=/System/Library/CoreServices/appleeventsd}, What I did since last conversation was to move python libraries to the app and only the python executable is located in the bundle. Python.bundle/Contents Python.bundle/Contents/Info.plist Python.bundle/Contents/MacOS Python.bundle/Contents/MacOS/python3.11 Added to bundle Info.plist: CFBundleExecutable python3.11 Added to Python.entitlements: com.apple.security.inherit, with a Boolean value of true. Python bundle entitlements now looks like this: com.apple.security.app-sandbox com.apple.sec
Topic: Code Signing SubTopic: Entitlements Tags:
Oct ’24
“a sealed resource is missing or invalid” on an installed, notarized application
We have a native ARM64 application. The application is a development environment and native compiler for the language Common Lisp. CL has a foreign function interface, which allows loading of .dylib files into CL and calling functions in them from CL. For this reason, we add certain entitlements. See below. It is notarized and installed on macOS 14.7. When I run spctl on it I get this: $ spctl --assess -v /Applications/AllegroCL64.app /Applications/AllegroCL64.app: rejected (the code is valid but does not seem to be an app) That’s before I run it. Which is odd because the app is notarized. When I run the app, it asks for a license file and installs it into /Applications/AllegroCL64.app/Contents/Resources/ and after that, the spctl shows this: $ spctl --assess -v /Applications/AllegroCL64.app /Applications/AllegroCL64.app: a sealed resource is missing or invalid I assume the mere act of copying the license (a file called devel.lic which is a small text file) is causing this. Why does it say it “does not seem t
7
0
1.4k
Oct ’24
Issues with Embedding Python Interpreter in MacOS App Distributed via TestFlight
Hello Apple Community, many thanks in advance for your help. My macOS app embeds a Python interpreter, compiled from source, including the Python executable and its associated libraries. The top-level app is built with Xcode 16.1 and it's written 100% in Swift6. For test purposes we are running the app on MacOS Sequoia 15.0, 15.1 and Sonoma 14.4. The app can be downloaded via TestFlight and Console app shows the next errors: Crash Reports python3.11 Application Specific Signatures: Unable to get bundle identifier for container id python3: Unable to get bundle identifier because Info.plist from code signature information has no value for kCFBundleIdentifierKey. tccd process error Prompting policy for hardened runtime; service: kTCCServiceAppleEvents requires entitlement com.apple.security.automation.apple-events but it is missing for accessing={TCCDProcess: identifier=[IDENTIFIER]], pid=62822, auid=502, euid=502, binary_path=[PATH TO SAMPLEAPP]]}, requesting={TCCDProcess: identifier=com.apple.appleeventsd, pid
16
0
1.6k
Oct ’24
Reply to Apple Notarization service failing on app that notarized successfully some weeks ago
[quote='808809022, bradleymcgill, /thread/764017?answerId=808809022#808809022, /profile/bradleymcgill'] we are using Maven so I believe this would be the link where the Jar we are getting is from … [/quote] Ta! I downloaded that, unzipped it, and looked at the signature: % codesign -d -vvv --entitlements - jffi-1.3.10-native/jni/Darwin/libjffi-1.2.jnilib … CodeDirectory v=20400 size=1547 flags=0x2(adhoc) hashes=42+2 location=embedded Hash type=sha256 size=32 … That looks reasonable enough. It’s ad hoc signed, which is pretty typical for this sort of thing. It has modern hashes, which is good. And it has no entitlements, which is also good. It also has a reasonable SDK value: % vtool -show-build jffi-1.3.10-native/jni/Darwin/libjffi-1.2.jnilib jffi-1.3.10-native/jni/Darwin/libjffi-1.2.jnilib (architecture x86_64): Load command 8 … version 10.6 sdk 12.0 jffi-1.3.10-native/jni/Darwin/libjffi-1.2.jnilib (architecture arm64): Load command 9 … minos 11.0 sdk 12.0 … Note The Intel deployment target is a bit
Oct ’24
Reply to A timestamp was expected but was not found
Run this in the same environment in which you’re running codesign: % curl -D /dev/stderr http://timestamp.apple.com What do you get back? Does it yield the same level of inconsistency, that is, working sometimes and failing others? Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: Code Signing SubTopic: General
Oct ’24
Reply to PAM module connecting to an XPC Service where service uses setCodeSigningRequirement
[quote='766224021, pnelson, /thread/766224, /profile/pnelson'] There should be a way to build a PAM module (dynamic Library ) so it can be code signed. [/quote] It’s certainly possible to sign a PAM module: % cp /usr/lib/pam/pam_deny.so.2 . % codesign -s - -f pam_deny.so.2 pam_deny.so.2: replacing existing signature However, that won’t help when it comes to -setCodeSigningRequirement:. macOS enforces security as process boundaries. PAM modules are in-process plug-ins, so they can’t be distinguished from any other code running in that process. Thus, from the perspective of the XPC remote peer, you can’t tell whether the request came from the PAM module running inside the process or any other code running inside that process. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: Code Signing SubTopic: General Tags:
Oct ’24
A timestamp was expected but was not found
We are facing following message A timestamp was expected but was not found during codesign for following .dylib and .pkg and it cause notarization process failed. We are facing this issue for last 3 days. we have access for timestamp.apple.com and 17.0.0.0/8 and we didn't change firewall settings. We are facing this issue randomly and not for all time(scenario is 3:1). We tried the below command to sign the package, codesign --verbose --deep --force --timestamp --options=runtime --sign Kindly let us know how to fix this probelm. traceroute timestamp.apple.com traceroute to timestamp.v.aaplimg.com (17.157.80.35), 64 hops max, 52 byte packets .... 10 17.0.9.19 (17.0.9.19) 185.693 ms 17.0.9.17 (17.0.9.17) 180.932 ms 189.060 ms 11 * * * 12 17.0.17.141 (17.0.17.141) 191.513 ms * 17.0.17.137 (17.0.17.137) 183.086 ms 13 * * * 14 * * *
Topic: Code Signing SubTopic: General
3
0
598
Oct ’24
Issue while adding App to Archive
CodeSign /Users/abc007/Library/Developer/Xcode/DerivedData/App-fjztkcxqsstohgfvqdfnedgpwltj/Build/Intermediates.noindex/ArchiveIntermediates/App/InstallationBuildProductsLocation/Applications/App.app (in target 'App' from project 'App') cd /Users/abc007/Documents/WorkSpace/RegulusIT/Release_Oct_2024/UI Backup/ios/App Signing Identity: Apple Development: Yatin Ghat (JS84GYN3O4) Provisioning Profile: iOS Team Provisioning Profile: www.rightschool.net (bdc0759d-b9d0-4470-8e3f-b5b67d3c2586) /usr/bin/codesign --force --sign 82C0E5904219E333688CE627A21522F732446038 --entitlements /Users/abc007/Library/Developer/Xcode/DerivedData/App-fjztkcxqsstohgfvqdfnedgpwltj/Build/Intermediates.noindex/ArchiveIntermediates/App/IntermediateBuildFilesPath/App.build/Release-iphoneos/App.build/App.app.xcent --generate-entitlement-der /Users/abc007/Library/Developer/Xcode/DerivedData/App-fjztkcxqsstohgfvqdfnedgpwltj/Build/Intermediates.noindex/ArchiveIntermediates/App/InstallationBuildProductsLocation/Applications/A
1
0
573
Oct ’24
Reply to DriverKit: embedded.mobileprofile has the wildcard USB Vendor ID instead of my assigned Vendor ID
A bit of a late reply on this, but I have a few things to share: As far as I can tell Xcode 16 has fixed all of these issues. Set codesigning to automatic, configure your capabilities in Xcode, and it signs everything exactly the way it should. I haven't specifically tested enterprise distribution (I don't have an account of that type at hand), but the automatic flows have worked perfectly for Developer ID and Mac App Store Test Flight. If it's all possible, I think building and signing with Xcode 16 is the easiest solution to all this. If you must use Xcode 15.4, then you need to be very careful about he exact flow involved. You're right that this is the underlying issue: I'm assuming this has to do with the fact that the entitlements plist is using the wildcard * instead of a proper vendor id. The wildcard value is why the development profiles can work with everything, which is also what breaks distribution signing. Here is what you can try to resolve this: I'm not sure how this stands in Xcode 15.
Oct ’24
Reply to Apple Notarization service failing on app that notarized successfully some weeks ago
Hi Quinn, The jar we are trying to sign is jffi from https://github.com/jnr/jffi/releases/tag/jffi-1.3.10. We are extracting the libjffi-1.2.jnilib from the jar and signing before re-packing them. This step goes fine with nothing going wrong. We then get issues when trying to notarize the application where it says the binary isn't signed, the signature isn't valid and there isn't a valid timestamp. sign-jar-force ./Contents/Resources/xx/drivers/jffi-1.3.10-native.jar jni/Darwin/libjffi-1.2.jnilib sign-jar() { if [ -e $$app_path/$1 ]; then echo Signing (jar): $1 $2 unzip $app_path/$1 $2 -d $temp_path || echo (jar $1): unzipping $2 failed > $temp_path/.failed codesign --sign $sign_identity --timestamp $temp_path/$2 || echo (jar $app_path/$1): $temp_path/$2 > $temp_path/.failed jar -ufv $app_path/$1 $temp_path/$2 || echo (jar $1) zipping $temp_path/$2 > $temp_path/.failed rm -f $temp_path/$2 else echo Skipping: $1 (path not found) fi } This is our method for signing the jar. We have also tried
Oct ’24
Reply to Notarised and Stapled App is not running Embedded Python Interpreter
Hello, I've made a very good progress. following the changes you indicated the app works :) There is only a little detail, if python executable is moved to: SampleApp.app/Contents/MacOS/python3.11 It appears a pop up asking 'Allow [APP] to find devices on local networks?'. I tested the app placing python here: SampleApp.app/Contents/MacOS/bin/python3.11 and the app works the same but the pop up is not appearing. This is a capability is not requested in the app... I'm very curious to know why this happens. Let me share the changes that were applied: This is the new entitlements: com.apple.security.app-sandbox I enabled Hardened Runtime in Build Settings - Signing section. What about lib/python3.11. That’s not a single file, right? It’s a directory containing a hierarchy of Python goo, right? Yes, it is a folder with all the libraries, etc. Is it ok when the folder stays in Resources? Last change I made is to remove the --deep when signing python executable, now it looks like this: codesign --force --
Topic: Code Signing SubTopic: General Tags:
Oct ’24
Reply to macOS app with com.apple.developer.persistent-content-capture entitlement crashing on macOS 10.13.6
Your app has a number of code signing issues that will cause problems. First, the immediate problem you’re seeing is caused by the absence of the App ID entitlement in your main app’s code signature: % codesign -d --entitlements - Remote for Mac.app Executable=/Users/quinn/Desktop/Remote for Mac.app/Contents/MacOS/Remote for Mac [Dict] [Key] com.apple.developer.networking.multicast [Value] [Bool] true [Key] com.apple.developer.persistent-content-capture [Value] [Bool] true [Key] com.apple.security.automation.apple-events [Value] [Bool] true Without this, older systems are unable to match up your app’s profile with its code. See Check for Required Entitlements within Resolving Code Signing Crashes on Launch. Note That’s part of my Resolving Trusted Execution Problems, which contains answers to all the weird trusted execution problems I’ve encountered over the years. Beyond that, I see other concerns. Your app contains a bunch of executables: % find Remote for Mac.app -print0 | xargs -0 file | grep exe
Topic: Code Signing SubTopic: Entitlements Tags:
Oct ’24
macOS app with com.apple.developer.persistent-content-capture entitlement crashing on macOS 10.13.6
After adding com.apple.developer.persistent-content-capture entitlement the app crashes on macOS 10.13.6 with following crash report Process: Remote for Mac [20489] Path: /Applications/Remote for Mac.app/Contents/MacOS/Remote for Mac Identifier: com.cherpake.macrc.server Version: ??? Code Type: X86-64 (Native) Parent Process: ??? [1] Responsible: Remote for Mac [20489] User ID: 501 Date/Time: 2024-10-09 09:28:35.482 +0300 OS Version: Mac OS X 10.13.6 (17G14042) Report Version: 12 Anonymous UUID: A2BB761B-2A18-0E9E-2470-21BD6C22E7A8 Time Awake Since Boot: 780000 seconds System Integrity Protection: enabled Crashed Thread: 0 Exception Type: EXC_CRASH (Code Signature Invalid) Exception Codes: 0x0000000000000000, 0x0000000000000000 Exception Note: EXC_CORPSE_NOTIFY Termination Reason: Namespace CODESIGNING, Code 0x1 kernel messages: VM Regions Near 0 (cr2): --> __TEXT 0000000105bdc000-0000000105cdd000 [ 1028K] r-x/r-x SM=COW Thread 0 Crashed: 0 ??? 0x00000001099bb19c _dyld_start + 0 Thread 0 crashed w
2
0
1.1k
Oct ’24
Issues with Invalid Binary Signatures During macOS Notarization of Electron App
Hello Apple Developer Community, I've been working on notarizing my macOS application, Deep Focus, built using Electron, but I'm encountering persistent issues with binary signatures being reported as invalid during the notarization process. I followed Apple's notarization documentation and ensured that all necessary configurations are in place, but I'm still seeing multiple Invalid errors in the notarization log. Here’s the process I've followed so far: 1. System and Tools Setup: macOS version: Apple M1 Pro Sonoma 14.5 macOS SDK: macOS 15.0 Xcode version: Version 16.0 (16A242d) (Using VSCode instead of XCode since this is an Electron /JavaScript project.) Link to source code for inspection 2. Notarization Process: Successfully stored credentials in Keychain using xcrun notarytool store-credentials. Signed all app components, including frameworks, using the command: for framework in dist/Deep Focus-darwin-arm64/Deep Focus.app/Contents/Frameworks/*.framework; do codesign --force --deep --options runti
Replies
2
Boosts
0
Views
887
Activity
Oct ’24
xcodebuild is very slow unless you set CODE_SIGNING_ALLOWED=NO"
Incremental builds using xcodebuild are very slow, around 3x slower when compared to the same build using Xcode. Recently, I discovered that CODE_SIGNING_ALLOWED=NO fixed the issue, but of course, I can't then run iOS app. It seems like automatic signing using xcodebuild is somehow broken. Therefore, I think I could set CODE_SIGNING_ALLOWED=NO and sign it manually later. However, I'm not sure how to do that. I checked what Xcode does and it's: /usr/bin/codesign --force --sign - --entitlements /Users/wkulik/Library/Developer/Xcode/DerivedData/XYZ-hblnhsksxjrctzekqmlevcflnsji/Build/Intermediates.noindex/XYZ.build/Debug-iphonesimulator/XYZ.build/XYZ.app.xcent --timestamp=none --generate-entitlement-der /Users/wkulik/Library/Developer/Xcode/DerivedData/XYZ-hblnhsksxjrctzekqmlevcflnsji/Build/Products/Debug-iphonesimulator/XYZ.app However, if I run xcodebuild with disabled signing I don't have XYZ.app.xcent required by this command. I also tried: codesign --force --deep --sign Apple Development: J
Replies
1
Boosts
0
Views
1.1k
Activity
Oct ’24
Reply to Issues with Embedding Python Interpreter in MacOS App Distributed via TestFlight
Hello, thanks a lot for your guidance. This is the error I am facing at the moment, tried some things but I am stuck: Prompting policy for hardened runtime; service: kTCCServiceAppleEvents requires entitlement com.apple.security.automation.apple-events but it is missing for accessing={TCCDProcess: identifier={APP_IDENTIFIER}, pid=63455, auid=502, euid=502, binary_path=[PATH_APP]}, requesting={TCCDProcess: identifier=com.apple.appleeventsd, pid=756, auid=55, euid=55, binary_path=/System/Library/CoreServices/appleeventsd}, What I did since last conversation was to move python libraries to the app and only the python executable is located in the bundle. Python.bundle/Contents Python.bundle/Contents/Info.plist Python.bundle/Contents/MacOS Python.bundle/Contents/MacOS/python3.11 Added to bundle Info.plist: CFBundleExecutable python3.11 Added to Python.entitlements: com.apple.security.inherit, with a Boolean value of true. Python bundle entitlements now looks like this: com.apple.security.app-sandbox com.apple.sec
Topic: Code Signing SubTopic: Entitlements Tags:
Replies
Boosts
Views
Activity
Oct ’24
“a sealed resource is missing or invalid” on an installed, notarized application
We have a native ARM64 application. The application is a development environment and native compiler for the language Common Lisp. CL has a foreign function interface, which allows loading of .dylib files into CL and calling functions in them from CL. For this reason, we add certain entitlements. See below. It is notarized and installed on macOS 14.7. When I run spctl on it I get this: $ spctl --assess -v /Applications/AllegroCL64.app /Applications/AllegroCL64.app: rejected (the code is valid but does not seem to be an app) That’s before I run it. Which is odd because the app is notarized. When I run the app, it asks for a license file and installs it into /Applications/AllegroCL64.app/Contents/Resources/ and after that, the spctl shows this: $ spctl --assess -v /Applications/AllegroCL64.app /Applications/AllegroCL64.app: a sealed resource is missing or invalid I assume the mere act of copying the license (a file called devel.lic which is a small text file) is causing this. Why does it say it “does not seem t
Replies
7
Boosts
0
Views
1.4k
Activity
Oct ’24
Issues with Embedding Python Interpreter in MacOS App Distributed via TestFlight
Hello Apple Community, many thanks in advance for your help. My macOS app embeds a Python interpreter, compiled from source, including the Python executable and its associated libraries. The top-level app is built with Xcode 16.1 and it's written 100% in Swift6. For test purposes we are running the app on MacOS Sequoia 15.0, 15.1 and Sonoma 14.4. The app can be downloaded via TestFlight and Console app shows the next errors: Crash Reports python3.11 Application Specific Signatures: Unable to get bundle identifier for container id python3: Unable to get bundle identifier because Info.plist from code signature information has no value for kCFBundleIdentifierKey. tccd process error Prompting policy for hardened runtime; service: kTCCServiceAppleEvents requires entitlement com.apple.security.automation.apple-events but it is missing for accessing={TCCDProcess: identifier=[IDENTIFIER]], pid=62822, auid=502, euid=502, binary_path=[PATH TO SAMPLEAPP]]}, requesting={TCCDProcess: identifier=com.apple.appleeventsd, pid
Replies
16
Boosts
0
Views
1.6k
Activity
Oct ’24
Reply to Apple Notarization service failing on app that notarized successfully some weeks ago
[quote='808809022, bradleymcgill, /thread/764017?answerId=808809022#808809022, /profile/bradleymcgill'] we are using Maven so I believe this would be the link where the Jar we are getting is from … [/quote] Ta! I downloaded that, unzipped it, and looked at the signature: % codesign -d -vvv --entitlements - jffi-1.3.10-native/jni/Darwin/libjffi-1.2.jnilib … CodeDirectory v=20400 size=1547 flags=0x2(adhoc) hashes=42+2 location=embedded Hash type=sha256 size=32 … That looks reasonable enough. It’s ad hoc signed, which is pretty typical for this sort of thing. It has modern hashes, which is good. And it has no entitlements, which is also good. It also has a reasonable SDK value: % vtool -show-build jffi-1.3.10-native/jni/Darwin/libjffi-1.2.jnilib jffi-1.3.10-native/jni/Darwin/libjffi-1.2.jnilib (architecture x86_64): Load command 8 … version 10.6 sdk 12.0 jffi-1.3.10-native/jni/Darwin/libjffi-1.2.jnilib (architecture arm64): Load command 9 … minos 11.0 sdk 12.0 … Note The Intel deployment target is a bit
Replies
Boosts
Views
Activity
Oct ’24
Reply to A timestamp was expected but was not found
Run this in the same environment in which you’re running codesign: % curl -D /dev/stderr http://timestamp.apple.com What do you get back? Does it yield the same level of inconsistency, that is, working sometimes and failing others? Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: Code Signing SubTopic: General
Replies
Boosts
Views
Activity
Oct ’24
Reply to PAM module connecting to an XPC Service where service uses setCodeSigningRequirement
[quote='766224021, pnelson, /thread/766224, /profile/pnelson'] There should be a way to build a PAM module (dynamic Library ) so it can be code signed. [/quote] It’s certainly possible to sign a PAM module: % cp /usr/lib/pam/pam_deny.so.2 . % codesign -s - -f pam_deny.so.2 pam_deny.so.2: replacing existing signature However, that won’t help when it comes to -setCodeSigningRequirement:. macOS enforces security as process boundaries. PAM modules are in-process plug-ins, so they can’t be distinguished from any other code running in that process. Thus, from the perspective of the XPC remote peer, you can’t tell whether the request came from the PAM module running inside the process or any other code running inside that process. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Topic: Code Signing SubTopic: General Tags:
Replies
Boosts
Views
Activity
Oct ’24
A timestamp was expected but was not found
We are facing following message A timestamp was expected but was not found during codesign for following .dylib and .pkg and it cause notarization process failed. We are facing this issue for last 3 days. we have access for timestamp.apple.com and 17.0.0.0/8 and we didn't change firewall settings. We are facing this issue randomly and not for all time(scenario is 3:1). We tried the below command to sign the package, codesign --verbose --deep --force --timestamp --options=runtime --sign Kindly let us know how to fix this probelm. traceroute timestamp.apple.com traceroute to timestamp.v.aaplimg.com (17.157.80.35), 64 hops max, 52 byte packets .... 10 17.0.9.19 (17.0.9.19) 185.693 ms 17.0.9.17 (17.0.9.17) 180.932 ms 189.060 ms 11 * * * 12 17.0.17.141 (17.0.17.141) 191.513 ms * 17.0.17.137 (17.0.17.137) 183.086 ms 13 * * * 14 * * *
Topic: Code Signing SubTopic: General
Replies
3
Boosts
0
Views
598
Activity
Oct ’24
Issue while adding App to Archive
CodeSign /Users/abc007/Library/Developer/Xcode/DerivedData/App-fjztkcxqsstohgfvqdfnedgpwltj/Build/Intermediates.noindex/ArchiveIntermediates/App/InstallationBuildProductsLocation/Applications/App.app (in target 'App' from project 'App') cd /Users/abc007/Documents/WorkSpace/RegulusIT/Release_Oct_2024/UI Backup/ios/App Signing Identity: Apple Development: Yatin Ghat (JS84GYN3O4) Provisioning Profile: iOS Team Provisioning Profile: www.rightschool.net (bdc0759d-b9d0-4470-8e3f-b5b67d3c2586) /usr/bin/codesign --force --sign 82C0E5904219E333688CE627A21522F732446038 --entitlements /Users/abc007/Library/Developer/Xcode/DerivedData/App-fjztkcxqsstohgfvqdfnedgpwltj/Build/Intermediates.noindex/ArchiveIntermediates/App/IntermediateBuildFilesPath/App.build/Release-iphoneos/App.build/App.app.xcent --generate-entitlement-der /Users/abc007/Library/Developer/Xcode/DerivedData/App-fjztkcxqsstohgfvqdfnedgpwltj/Build/Intermediates.noindex/ArchiveIntermediates/App/InstallationBuildProductsLocation/Applications/A
Replies
1
Boosts
0
Views
573
Activity
Oct ’24
Reply to DriverKit: embedded.mobileprofile has the wildcard USB Vendor ID instead of my assigned Vendor ID
A bit of a late reply on this, but I have a few things to share: As far as I can tell Xcode 16 has fixed all of these issues. Set codesigning to automatic, configure your capabilities in Xcode, and it signs everything exactly the way it should. I haven't specifically tested enterprise distribution (I don't have an account of that type at hand), but the automatic flows have worked perfectly for Developer ID and Mac App Store Test Flight. If it's all possible, I think building and signing with Xcode 16 is the easiest solution to all this. If you must use Xcode 15.4, then you need to be very careful about he exact flow involved. You're right that this is the underlying issue: I'm assuming this has to do with the fact that the entitlements plist is using the wildcard * instead of a proper vendor id. The wildcard value is why the development profiles can work with everything, which is also what breaks distribution signing. Here is what you can try to resolve this: I'm not sure how this stands in Xcode 15.
Replies
Boosts
Views
Activity
Oct ’24
Reply to Apple Notarization service failing on app that notarized successfully some weeks ago
Hi Quinn, The jar we are trying to sign is jffi from https://github.com/jnr/jffi/releases/tag/jffi-1.3.10. We are extracting the libjffi-1.2.jnilib from the jar and signing before re-packing them. This step goes fine with nothing going wrong. We then get issues when trying to notarize the application where it says the binary isn't signed, the signature isn't valid and there isn't a valid timestamp. sign-jar-force ./Contents/Resources/xx/drivers/jffi-1.3.10-native.jar jni/Darwin/libjffi-1.2.jnilib sign-jar() { if [ -e $$app_path/$1 ]; then echo Signing (jar): $1 $2 unzip $app_path/$1 $2 -d $temp_path || echo (jar $1): unzipping $2 failed > $temp_path/.failed codesign --sign $sign_identity --timestamp $temp_path/$2 || echo (jar $app_path/$1): $temp_path/$2 > $temp_path/.failed jar -ufv $app_path/$1 $temp_path/$2 || echo (jar $1) zipping $temp_path/$2 > $temp_path/.failed rm -f $temp_path/$2 else echo Skipping: $1 (path not found) fi } This is our method for signing the jar. We have also tried
Replies
Boosts
Views
Activity
Oct ’24
Reply to Notarised and Stapled App is not running Embedded Python Interpreter
Hello, I've made a very good progress. following the changes you indicated the app works :) There is only a little detail, if python executable is moved to: SampleApp.app/Contents/MacOS/python3.11 It appears a pop up asking 'Allow [APP] to find devices on local networks?'. I tested the app placing python here: SampleApp.app/Contents/MacOS/bin/python3.11 and the app works the same but the pop up is not appearing. This is a capability is not requested in the app... I'm very curious to know why this happens. Let me share the changes that were applied: This is the new entitlements: com.apple.security.app-sandbox I enabled Hardened Runtime in Build Settings - Signing section. What about lib/python3.11. That’s not a single file, right? It’s a directory containing a hierarchy of Python goo, right? Yes, it is a folder with all the libraries, etc. Is it ok when the folder stays in Resources? Last change I made is to remove the --deep when signing python executable, now it looks like this: codesign --force --
Topic: Code Signing SubTopic: General Tags:
Replies
Boosts
Views
Activity
Oct ’24
Reply to macOS app with com.apple.developer.persistent-content-capture entitlement crashing on macOS 10.13.6
Your app has a number of code signing issues that will cause problems. First, the immediate problem you’re seeing is caused by the absence of the App ID entitlement in your main app’s code signature: % codesign -d --entitlements - Remote for Mac.app Executable=/Users/quinn/Desktop/Remote for Mac.app/Contents/MacOS/Remote for Mac [Dict] [Key] com.apple.developer.networking.multicast [Value] [Bool] true [Key] com.apple.developer.persistent-content-capture [Value] [Bool] true [Key] com.apple.security.automation.apple-events [Value] [Bool] true Without this, older systems are unable to match up your app’s profile with its code. See Check for Required Entitlements within Resolving Code Signing Crashes on Launch. Note That’s part of my Resolving Trusted Execution Problems, which contains answers to all the weird trusted execution problems I’ve encountered over the years. Beyond that, I see other concerns. Your app contains a bunch of executables: % find Remote for Mac.app -print0 | xargs -0 file | grep exe
Topic: Code Signing SubTopic: Entitlements Tags:
Replies
Boosts
Views
Activity
Oct ’24
macOS app with com.apple.developer.persistent-content-capture entitlement crashing on macOS 10.13.6
After adding com.apple.developer.persistent-content-capture entitlement the app crashes on macOS 10.13.6 with following crash report Process: Remote for Mac [20489] Path: /Applications/Remote for Mac.app/Contents/MacOS/Remote for Mac Identifier: com.cherpake.macrc.server Version: ??? Code Type: X86-64 (Native) Parent Process: ??? [1] Responsible: Remote for Mac [20489] User ID: 501 Date/Time: 2024-10-09 09:28:35.482 +0300 OS Version: Mac OS X 10.13.6 (17G14042) Report Version: 12 Anonymous UUID: A2BB761B-2A18-0E9E-2470-21BD6C22E7A8 Time Awake Since Boot: 780000 seconds System Integrity Protection: enabled Crashed Thread: 0 Exception Type: EXC_CRASH (Code Signature Invalid) Exception Codes: 0x0000000000000000, 0x0000000000000000 Exception Note: EXC_CORPSE_NOTIFY Termination Reason: Namespace CODESIGNING, Code 0x1 kernel messages: VM Regions Near 0 (cr2): --> __TEXT 0000000105bdc000-0000000105cdd000 [ 1028K] r-x/r-x SM=COW Thread 0 Crashed: 0 ??? 0x00000001099bb19c _dyld_start + 0 Thread 0 crashed w
Replies
2
Boosts
0
Views
1.1k
Activity
Oct ’24