Posts

Post not yet marked as solved
1 Replies
2.3k Views
Can we safely assume that App Store server notifications will originate from 17.0.0.0/8 address block?  More specifically, does the Technical Note TN2265 - https://developer.apple.com/library/ios/technotes/tn2265/_index.html#//apple_ref/doc/uid/DTS40010376-CH1-TNTAG41 about push notifications also apply for App Store server-to-server notifications? The IP address range for the push service is subject to change [...] However, the entire 17.0.0.0/8 address block is assigned to Apple, so you can specify that range in your firewall rules
Posted
by roman_mb.
Last updated
.
Post not yet marked as solved
1 Replies
523 Views
Hi,Is it supported to distribute a Catalyst app with NEPacketTunnelProvider using Developer ID signing?So far I tried 2 approaches, none of them worked for me1. When using App Extension, signing a Catalyst app with “packet-tunnel-provider” entitlements using Developer ID results in a crashException Type: EXC_CRASH (Code Signature Invalid)Exception Codes: 0x0000000000000000, 0x0000000000000000Exception Note: EXC_CORPSE_NOTIFYTermination Reason: Namespace CODESIGNING, Code 0x12. Using System Extension in a Catalyst app also seems impossible. I tried adding a macOS bundle in a catalyst app to be able to call SystemExtensions APIs (which are not available from under Catalyst directly). But submitting OSSystemExtensionRequest to OSSystemExtensionManager anyway results in OSSystemExtensionErrorDomain Code=1Regards
Posted
by roman_mb.
Last updated
.