Hello,
Title states it basically. I have a java program (launched via shell script) running as a service using launchd which is running as a user (not root) and it does not request Local Network permissions ever.
I feel like i'm missing something here. I combed through all of the Local Network FAQs and don't really see this use case addressed.
I do see that there is an open ticket for an API to trigger the request, but no update on that and the ticket is not visible publicly.
Is there is a way to accomplish this for java or other programs running via launchd with a user other than root? something like an entitlement or an API to seed the permission of Local Network when installing the service via launchctl etc?
Sure. But using a real user is problematic in the general case. The canonical example of this is FileVault 1, where the user’s home directory was stored an a disk image that could only be mounted with the user’s password. That would leave your daemon running without a home directory O-:
While FileVault 1 is a thing of the past, you can encounter similar problems if the user has a network home directory.
And that’s not the end of your problems. Consider the various file system permission mechanism described in On File System Permissions. Of those, only the first two, BSD and ACLs, are keyed off the current process’s user ID. If your daemon-running-as-a-real-user hits a MAC check — for example, it tries to access the Desktop folder — it’s completely unclear as to what’ll actually happen.
macOS is not a traditional Unix system. Its permission model is not gated solely by the traditional BSD execution context: UID, GID, and so on. This is not a new development (look at the date on TN2083!) but, as time goes by, more and more subsystems start to depend on the macOS-specific execution context. If you run in a mixed context then you will encounter weird problems.
Now, you could reasonably make an argument that a daemon running as a role account should be treated like a daemon when it comes to local network privacy. In fact, I’d probably agree with you (-: But my opinions don’t matter here, you need to make your case in Feedback Assistant.
However, that’s about role accounts. I don’t think it makes sense to file an ER for the real user case. Such daemons have many other problems besides local network privacy.
If your want to run background code as a real user, set it up as a launchd
agent.
Thanks for that.
Unlikely. That just puts the job into its own unique session, which further separates it from the running-as-root global session that’s a known place where local network privacy stays out of your way.
Share and Enjoy
—
Quinn “The Eskimo!” @ Developer Technical Support @ Apple
let myEmail = "eskimo" + "1" + "@" + "apple.com"