> undocumented support for xml output. I don't know how anyone discovered that; there is no mention of it that I can find at developer.apple.com. for those watching this thread, --output-format xml should be added to the command line. If you can find an official reference, that would be welcomed.
Undocumented? Run "xcrun altool --help" or "man altool"
> Hundreds of other develpers I've spoken to are in the same camp as me.
Hundreds, eh?
> I'm not sure the size and scope and complexity of the apps you build
hehehe...and you never will. 😉
> It is completely unreasonable to expect every enterprise app company to attempt to do what notarization does in their build pipeline.
Yes, exactly. That's why notarization shouldn't be there.
> do I actually want to create a notarization record for that 3rd party using my credentials? Uh, no.
It's Apple, not Virus Total. Your notarization failures aren't made public. You don't have to worry about self-taught "internet security researchers" using your Notarization submissions in their libel campaigns against your company.
> Do I want to wait until I'm ready to release before I discover that a 3rd party library I rely upon that I took a security fix is missing codesigning?
You should probably review how codesigning works and perhaps how your bundles are being constructed. You should be re-signing the entire bundle as part of your Notarization process. But the hardened runtime is a requirement for Notarization. Testing the hardened runtime is something that should have already happened. Notarization is not necessary for that.
> Or that is has some identified malware?
> Or they had a regression in their pipeline and it isn't built against the correct SDK?
> No.
> As I said, it is really unreasonable if Apple expects every enterprise developer to build an internal system that attempts to do what notarization does.
Notarization is not a service for developers. It is a requirement. It is part of Apple's overall platform security that it provides to its users. If you think there is a serious risk that malware is going to infect your systems and only be detected by Notarization, then Notarization is the least of your problems. The same is true for 3rd party products that are unreliable but you have nevertheless integrated into your system without proper testing.
Notarization is only ever triggered by a download that attaches quarantine attributes to a file. Until you get to that point, then you don't need it. You should be testing your software internally before distributing it to the general public. It is your own responsibility to scan your network for malware. It would be a shame if Windows users learned that Apple's Notarization was your only company's only malware check.
All that being said, if you still want to integrate Notarization into your build pipeline, then do it. It isn't difficult. It is many times easier than anything you've said about your existing build pipeline. To return to your original questions... A command line tool with documented XML output is not difficult to use. I really don't see the point of demanding an interface that is more difficult to use. As far as a test endpoint goes, you can always create an additional developer account and use it just for testing notarization. Given your concerns about malware infecting your build pipeline, it would probably be a good idea to keep your public-facing credentials on a separate, locked-down network.