Keychains | keychain wrapper that is so easy to use that your cat | Identity Management library
kandi X-RAY | Keychains Summary
kandi X-RAY | Keychains Summary
A keychain wrapper that is so easy to use that your cat could use it.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of Keychains
Keychains Key Features
Keychains Examples and Code Snippets
Community Discussions
Trending Discussions on Keychains
QUESTION
I try to install php on a mac M1 monterey, but this simple code is not interpretated :
...ANSWER
Answered 2022-Apr-09 at 00:04As I mentioned in the comments you probably done most the steps but this guide I found has one last step it mentions for PHP. Here is the link:
https://wpbeaches.com/updating-to-php-versions-7-4-and-8-on-macos-12-monterey/
Also I found a lot of my issues went away when I started using homebrew Apache instead.
I am glad the guide was able to help you get it working.
For anyone else who is stuck, here is the relevant section from the guide:
PHP 8 and macOS Apache
One extra step is needed for PHP 8 and macOS bundled Apache:
QUESTION
I am struggling for the past 2 weeks with publishing the .pkg.
If I execute codesign -dvv app-version.pkg
I get app-version.pkg: code object is not signed at all
Then I want to sign it with productsign --sign "3rd Party Mac Developer Installer: xxx (yyy)" ./app-version.pkg ./app-version-signed.pkg
The output is:
...ANSWER
Answered 2021-Dec-28 at 19:26Short answer: use pkgutil --check-signature
instead of codesign -dvv
.
Long answer: flat packages use a somewhat different signing format than other things, and you need to use different tools to sign them & check the signatures. Specifically, use productsign
instead of codesign
to sign them, and pkgutil
instead of codesign
to check the signature.
When you use codesign -dvv
on a package, it's looking for its format of signature, and indeed there isn't one there.
QUESTION
I'm having an issue why trying to build a KMM project using a Jenkins pipeline and fastlane for the iOS part.
Kotlin version: 1.5.31
XCode version: 13.1
Fastlane version: 2.198.1
Ruby version: 2.6.3p62
When executing these steps locally it breaks as well. The Error that fastlane throws is import shared: no such module 'shared'
I figured out that if you run pod install && fastlane xcode_build
the build brakes, but if you repeat it a second time it succeeds and creates the project.app file in the DerivedData folder of XCode.
The Jenkinsfile is working correctly on another iOS project which is not a KMM one.
Here is the Jenkinsfile
...ANSWER
Answered 2021-Dec-16 at 12:13so I figured it out. If anyone has the same issue, the fix for this current problem is that you have to run a gradle task in the root directory of the project, before building the iOS part.
./gradlew generateDummyFramework
In my case with Jenkins I added sh './gradlew generateDummyFramework
before the sh 'pod install'
shell command in the Build stage. This fixed the issue in question.
The problem was caused from Cocoapods not being able to access the framework file, hence pod install
can't configure the framework correctly. The reason for the build to fail on the first build but not on the second is because the framework file is generated when you run a build in XCode. After that Cocoapods can configure the file correctly.
If anyone has a different answer I'm eager to know about it!
QUESTION
When using fastlane to build and export an app all of our build machines have started failing to codesign
during the export process. The only thing that has changed is the recent expiration of certificates related to TestFlight deployments that were regenerated by fastlane.
The builder runs as a launchd
service that starts gitlab-runner
.
I have cleared all expired certificates and invalid provisioning profiles from the keychains and validate the complete certificate chain exists in each.
I have written a stripped down example of the issue, a simple script runner.sh
to illustrate the problem and pretend to be the CI runner:
runner.sh
...ANSWER
Answered 2021-Oct-06 at 11:16After 3-weeks of messing around with keychains, rewriting our codesign scripts to directly call the Security.framework CoreFoundtion APIs, validating keychain dumps for correct trusted app and partition list settings and testing countless other theories, it is this simple, you can no longer have the WWDR Intermediates in any keychain other than the System.keychain
. Once installed there, it magically works.
https://www.apple.com/certificateauthority/
This is a change made by Apple in newer versions of the keychain search mechanism and maybe related to the deprecation of the custom keychain APIs in the Security.framework.
Keychain Services API documentationJust look at all of the deprecated APIs. This effectively kills off custom keychains.
https://developer.apple.com/documentation/security/keychain_services/keychains?language=objc
InstallationAs an aside to the solution, the next bit of pain is getting these certificates into the System.keychain
. Apple has gone out of its way to make remote administration of dozens of machines as painful as possible.
QUESTION
when I using fastlane to publish ios app in github:
...ANSWER
Answered 2021-Dec-01 at 05:39I see that is_ci
also ran. Does your match
command look like this:
match(.., readonly: is_ci, ...)
and are you running the command on a CI service like Jenkins or some other one?
If so, run it locally first, that will generate all the relevant certs and provisioning profiles needed. Then run it on your CI service again.
QUESTION
Because the personal developer only could have 3 distribution certificate(https://help.apple.com/xcode/mac/current/#/dev3a05256b8), I have more than 3 apps, so I have to make different app use the same certificate, this is what I am trying to do.
Step 1: export the certificate from keychain
step 2: generate the cert file and pem file by using this command:
...ANSWER
Answered 2021-Aug-20 at 03:32If you want to use a single developer and/or distribution certificate for multiple apps belonging to the same development team, you may use the same signing identities repository and branch to store the signing identities for your apps:
Matchfile example for both App #1 and #2:
QUESTION
Now I am using this command to generate a distribution certificate using fastlane match in macOS Big Sur:
...ANSWER
Answered 2021-Aug-19 at 05:37It said, it lacks git_url
, and username
.
QUESTION
I have a huge problem with the new GitHub update on 13 AUG 2021.
I have a repo and I wanted to upload my new commit and I realized that GitHub changed its rules for uploading from password to token, So I generate a new token from my GitHub account and paste it into a password in github.com in Keychain address. And trying to push then it gives me an error:
Permission to myUserName/app.git denied to myUserName. fatal: unable to access 'https://github.com/myUserName/app.git/': The requested URL returned error: 403
So I delete everything in keychains that related to GitHub and trying to push again and gave me the same err after asking me about my username and password - (I tried to give it my real password and it gives me an err because pushing requires a token, Then I typed my token and give the same err above)
Even when I'm trying to pull my private repos it gave me the err below:
remote: Repository not found.
fatal: repository 'https://github.com/MyUserName/app.git/' not found
I've created a new repos and gave me the same errs. And I've just one account on my machine and GitHub also.
...ANSWER
Answered 2021-Aug-16 at 21:48I've solved the issue by two things :
1- Should enable two factor authentication In github
2- In token setting it should to Select scopes to manage access In general So I checked ( repo, workflow and gist ).
QUESTION
I need encrypt a file. In my keychains I have many private keys. How can I specify which key to use to encrypt a file?
...ANSWER
Answered 2021-May-01 at 00:54Try using the option: -u
QUESTION
I'm trying to develop a quick command line tool that will install a root CA into a MacOS System keychain. This is a chunk of the code that does the job.
...ANSWER
Answered 2021-Apr-23 at 00:23A user with "admin" privileges is still only a normal, non-root user, but one which is allowed to perform certain operations as root, for example under 'sudo' or the MacOS authorization prompts (which would enable certificate additions, but would require a user prompt and registration with the database at /var/db/auth.db). Authorizations can be popped up using AuthorizationExecuteWithPrivileges, with a good example being "security execute-with-privileges", which pops up the authentication and uses /usr/libexec/security_authtrampoline - a Setuid root binary.
You're right about writing to System being reserved for root only, and the situation becomes even more complication with System Integrity Protection (SIP), and with MacOS's move (in 10.15) to a read-only mounted root filesystem. The former (SIP) adds protections such that, without the proper com.apple.rootless.* entitlement you won't be able to modify files, even as root, and the latter (r/o mount) means that nothing (short of remounting, and/or holding system installer entitlement) won't enable you to write anything.
The "direct" approach you specify, of modifying the files in /Library/keychains will fail because note that the keychain file ownership is root's.
Adding certificates programmatically will require either root, or the com.apple.private.system-keychain entitlement (or one of its siblings - I forget which - see http://newosxbook.com/ent.jl?ent=com.apple.private.system-keychain&osVer=MacOS13 for a full list of entitlements).
Also note, that messing with the keychain could have some serious impact. This is where everything that is secret and holy to macOS - root certs, passwords, Apple ID, etc - is held. Beware. Once a root CA is installed, it can be trusted for all sorts of applications (including, to some extents, code signing, website proxying, and even more sinister uses). So there's a pretty good reason it's not given too just any user - since a batch operation without a prompt could surreptitiously inject such a CA, and open up avenues for malware.
References: "*OS Internals, Volume III", which deals with this in Chapter 11 and the authorizations in chapter 6. Website: newosxbook.com
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install Keychains
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page