Post

Replies

Boosts

Views

Activity

Reply to Cannot sign app with xcodebuild and authenticationKey
@Artem_XZ can you describe how did you manage to work Cloud-managed distribution certificates, please? Even using the Admin API key, I get the following error: Error Domain=IDEDistributionErrorDomain Code=10 "Failed to log in." UserInfo={IDEDistributionErrorsAccountIssues=( ), NSLocalizedDescription=Failed to log in., NSLocalizedRecoverySuggestion=App Store Connect access for “$TEAM_ID” is required. Ensure that your Apple ID account usernames and passwords are correct in the Accounts preference pane.} Does the API key-based distribution still work for you?
Jan ’22
Reply to Failed to create provisionning.... Please Help
I don't have a developer program without any iOS devices so cannot check it.It seems that you cannot create a development provision profile with an empty device list. As a workaround, I suppose you can register iOS device with some random UDID (possibly you have to look up some record on the internet, for example, '00008020-008D4548007B4F26') and include this device in generated provisions.
Mar ’20
Reply to SecTrustedApplicationCreateFromPath replacement
I would like to setup identities and few generic passwords (Xcode-Token and Xcode-AlternateDSID) to the login keychain with allowed access for /usr/bin/codesign, /usr/bin/security and /usr/bin/productbuild (application list taken from fastlane). This terminal application designed to be called mostly on CI machines with initial credentials (.p12 files and source keychain with included SecItems) stored inside the private repository. I see two already available alternatives:1. Create SecAccess with nil trustedApplicationList to make default Restricted ACL available for any application. I would like to avoid such a case because of security concerns.2. Call terminal app /usr/bin/security import with -T argument to pass required apps. While this solution will work, it still feels alien in the Swift macOS application. Another point is the influence of the same deprecation on security tool. 3. The weirdest solution (not guaranteed also, and not encouraged by Apple) to look for workaround based on Security opensource project. It's absolutely should be avoided in 99,9% of cases but still worth a point in the list.
Mar ’20