Posts

Post not yet marked as solved
3 Replies
To show badge label, application should be authorized to do it. You should call: UNUserNotificationCenter requestAuthorizationWithOptions with UNAuthorizationOptionBadge on applicationDidFinishLaunching before assigning any badge. After completionHandler is done, you became able to assign badges and them should appear.
Post marked as solved
2 Replies
What I did found about this issue: The key of described issue is in the answering for ES_EVENT_TYPE_AUTH_OPEN event. How ep_client should answer: If allow all open operations: ep_client should answer with 0xffffffff flag. es_respond_flags_result(aClient, _esMessage, 0xffffffff, aCacheFlag); if deny all open operations: 0x0 if deny only read: 0xffffffff & ~FREAD if deny only write: 0xffffffff & ~FWRITE if deny only read and write but allow others: int32_t flags = 0xffffffff; flags = flags & ~FWRITE; flags = flags & ~FREAD; es_respond_flags_result(aClient, _esMessage, flags, aCacheFlag); Answering in other ways may cause to undefined system behavior, such as described above.
Post marked as solved
4 Replies
Can you post a code example of how your includedNetworkRules and excludedNetworkRules are setup on your NETransparentProxyNetworkSettings? I believe I get the gist of them but I want to make sure I understand your wildcard rule. The reason why I raise this question is that AirDrop is not working if my extension is up. I thought that I should exclude AirDrop port 8770 from connections. That is why I asked about exclude rules. Code example. Here is how my extension start: - (void)startProxyWithOptions:(NSDictionary *)options   completionHandler:(void (^)(NSError *))completionHandler {   NETransparentProxyNetworkSettings *settings =       [[NETransparentProxyNetworkSettings alloc]         initWithTunnelRemoteAddress:@"127.0.0.1"];   NENetworkRule *rule = [[NENetworkRule alloc]     initWithRemoteNetwork:nil     remotePrefix:0     localNetwork:nil     localPrefix:0     protocol:NENetworkRuleProtocolTCP     direction:NETrafficDirectionOutbound];   settings.includedNetworkRules =     @[       rule     ];   [self setTunnelNetworkSettings:settings     completionHandler:^(NSError * _Nullable error)     {       if (error)       {         NSLog(@"setTunnelNetworkSettings: %@", error.localizedDescription);       }     }];   if (completionHandler != nil)   {     completionHandler(nil);   } } And I always return NO in handleNewFlow: - (BOOL)handleNewFlow:(NEAppProxyFlow *)flow {   return NO; } And AirDrop is not working.
Post not yet marked as solved
1 Replies
Because your application is under sandbox. Remove sandbox from Signing and Capabilities - it should help.
Post not yet marked as solved
2 Replies
Here is the answer: https://wiki.freepascal.org/Hardened_runtime_for_macOS
Post marked as solved
1 Replies
Post marked as solved
2 Replies
How can I ecologically prevent user to read/write from USB drive? If I deny access to one processes, and allow to other it may brake system consistency. I found that open and save panel is also driven by separate process.
Post marked as solved
8 Replies
No. The end result here is a provisioning profile template. This allows you to add extra entitlements to a profile when you create it via the developer web site. Xcode is not aware of these templates, so you’ll need to switch to manual signing.Where can I read about this? It should be explained in the request approval email?What will be my next steps once my request approved?In the Xcode project switch to manual signing.Go to Developer account -> "Certificates, Identifiers & Profiles".Click the "+" button, to register a New Provisional Profile.In case if I want to register a profile for distribution, choose "Developer ID" option. Click the "Continue" button.Select App Id, click "Continue" button.Choose your "Developer ID Application" certificate. What if I have a certificate "With Kext"? Should I use it on this step?Enter a profile name, click "Generate" button.To ensure that I am able to use Endpoint Security Client entitlement do the next:Download the generated profile.Quick view it with the space button in Finder.It should have "com.apple.developer.endpoint-security.client: true" listed in the "ENTITLEMENTS" section.Are these steps correct?
Post marked as solved
2 Replies
Thank You very much 🙂