macos-installer-builder | Generate macOS installers for your applications | DevOps library
kandi X-RAY | macos-installer-builder Summary
kandi X-RAY | macos-installer-builder Summary
Generate macOS installers for your applications and products from one command. For more detailed process please refer medium blog about the macOS installer builder:
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of macos-installer-builder
macos-installer-builder Key Features
macos-installer-builder Examples and Code Snippets
Community Discussions
Trending Discussions on macos-installer-builder
QUESTION
I'm building a Github Actions job to build, sign and notarize a PKG file.
I'm using an Apple Id account (the workflow needs username and password) as well as a Developer Id Installer certificate with private key (encrypted). Both are saved as secrets (base64) and will be converted in the workflow to a .p12 file, then added to keychain.
This job is part of a bigger workflow in a private repository, that generates first the files (using Pyinstaller) from the software, and then export the PKG on a AWS S3 Bucket.
The implementation ...ANSWER
Answered 2022-Mar-29 at 20:50After setting the devbotsxyz/xcode-notarize@v1
field verbose:true
, I observed that Apple returns a link to a JSON explaining why the package is INVALID for notarization.
In this JSON, it was informed that all the files composing my PKG (there are many as I couldn't use --onefile
with Pyinstaller in my context) were invalid because they weren't signed and timestamped.
After some researches, I found this post on the Apple Developer Forum and understood that PKG files need to be sign INSIDE OUT: First, you sign each file generated by Pyinstaller, then sign the PKG gathering all those files.
To do so, you can't use the productsign
command (as it only work for .pkg, .zip and .dmg) but codesign
.
However, codesign
doesn't use a Developer Id Installer certificate
, but a Developer Id Application certificate
, so I had to add this new certificate to the workflow as well.
Note that as my PKG would be composed of hundreds of files, I also needed a bash script to use codesign to sign each one of them.
My final workflow looks like this:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install macos-installer-builder
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page