Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Include hardened-runtime flag during DMG signing #41

Open
ll78912 opened this issue Apr 23, 2024 · 3 comments
Open

Include hardened-runtime flag during DMG signing #41

ll78912 opened this issue Apr 23, 2024 · 3 comments

Comments

@ll78912
Copy link

ll78912 commented Apr 23, 2024

Currently DMG files are signed without hardened-runtime which may cause apple notarization process to fail. Can this flag be added to DMG signing logic?

@RangoW
Copy link

RangoW commented Apr 23, 2024

Specify hardened-runtime only when signing .app:

relic sign -k devid -f foo-darwin-amd64 --hardened-runtime

https://github.com/sassoftware/relic/blob/master/doc/macos.md#signing-macos-binaries

@ll78912 ll78912 closed this as completed Apr 25, 2024
@ll78912
Copy link
Author

ll78912 commented Apr 25, 2024

thanks!

@ll78912 ll78912 reopened this Apr 29, 2024
@ll78912
Copy link
Author

ll78912 commented Apr 29, 2024

@RangoW : I have tried to sign .app file directly but it is not working. Should we first sign all the executables within the .app file?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants