Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

upgrade dependencies to enable hardened runtime for easier install? #71

Closed
4 tasks
micahstubbs opened this issue Aug 10, 2019 · 4 comments
Closed
4 tasks

Comments

@micahstubbs
Copy link

micahstubbs commented Aug 10, 2019

Got the project to build locally 🎉

I have an enhancement idea 💡

We could upgrade the dependencies to enable hardened runtime. If we do this, I think that it makes it easier for some users on the latest versions of MacOS to install Dozer.

This is what I see when I try to validate the build with Apple:
Screen Shot 2019-08-10 at 4 48 46 PM

I think that these are the dependencies that would need to be updated or configured to support this:

  • submit
  • uploadDYSM
  • Autoupdate.app (Sparkle)
  • fileop

research

https://developer.apple.com/documentation/security/notarizing_your_app_before_distribution

or alternately do some code-signing work-around like the one described here: insidegui/WWDC#540 (comment)

more discussion here: sparkle-project/Sparkle#1389

@Mortennn
Copy link
Owner

Mortennn commented Aug 11, 2019

Are you testing this on master because the problem is solved using this script?

Also, Dozer is not sandboxed at the moment so it can't be validated by Apple.

@micahstubbs
Copy link
Author

yes, testing on master.

ah hah! this does look one solution the login friction. https://github.com/Mortennn/Dozer/blob/master/Scripts/SignFrameworks.sh

Curious, do you think would it be practical / worth the effort to sandbox Dozer sometime in the future? Does the permissions that it needs to manage the task bar somehow make this difficult to do?

@Mortennn
Copy link
Owner

Initially, Dozer used accessibility API's which meant it couldn't be sandboxed.

It doesn't anymore so it is possible now.

The "only" benefit of sanboxing is that it limits what Dozer has access to:

App Sandbox provides a last line of defense against stolen, corrupted, or deleted user data if malicious code exploits your app. App Sandbox also minimizes the damage from coding errors in your app or in frameworks you link against. source.

Though, I don't think sandboxing is worth it because it limits future features from being implemented: #38 #51 #55 #67 #69. Also, Dozer has hardened runtime enabled which should at least add some extra protection.

@micahstubbs
Copy link
Author

makes sense, thanks for the reply and linking to the other issues. will close this one for now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants