I am seeking to set up a specific app on my mac the usage of playcover,
The app is going thru applicationDidFinishLaunching and applicationDidBecomeActive however in an instant crashes because of a segfault,
I used to be ready to get round this by means of manually putting in the ipa each week the usage of sideloadly and a loose developer account however its getting truly tedious
How does sideloadly set up the app for private checking out functions?
The app put in with sideloadly has the construct model because the freshly unzipped ipa
Load command 9 cmd LC_VERSION_MIN_IPHONEOS cmdsize 16 model 9.0 sdk 15.2
while PlayCover adjustments it to maccatalyst
Load command 66 cmd LC_BUILD_VERSION cmdsize 24 platform MACCATALYST minos 11.0 sdk 14.0 ntools 0
That is what PlayCover recently makes use of to put in an app:
- unzip the app
- save its entitlements to a folder
- get a listing of all machos
- patch the app executable with the playtools executable (for keymapping)
- signal the app
"/usr/bin/codesign -fs- (executable trail) --deep --preserve-metadata=entitlements"
- for each macho from the checklist:
- substitute
@/rpath/libswiftUIKit.dylib
with
/Machine/iOSSupport/usr/lib/swift/libswiftUIKit.dylib
the usage of install_name_tool - set the platform to maccatalyst, minos to 11.0, and sdk to fourteen.0 the usage of vtool
- signal the macho the usage of
"/usr/bin/codesign -fs- (trail)"
- substitute
- set
0o755
permission at the document - delete
embedded.mobileprovision
- set
MinimumOSVersion
of information.plist to no less than 11 // the damaged app at first has a model of 13 - signal the app with entitlements
"/usr/bin/codesign -fs- (executable trail) --deep --entitlements (entitlements trail)")
with default entitlements {
"com.apple.safety.app-sandbox": true,
"com.apple.safety.belongings.motion pictures.read-write": true,
"com.apple.safety.belongings.song.read-write": true,
"com.apple.safety.belongings.footage.read-write": true,
"com.apple.safety.tool.audio-input": true,
"com.apple.safety.tool.bluetooth": true,
"com.apple.safety.tool.digital camera": true,
"com.apple.safety.tool.usb": true,
"com.apple.safety.recordsdata.downloads.read-write": true,
"com.apple.safety.recordsdata.user-selected.read-write": true,
"com.apple.safety.community.consumer": true,
"com.apple.safety.community.server": true,
"com.apple.safety.personal-information.addressbook": true,
"com.apple.safety.personal-information.calendars": true,
"com.apple.safety.personal-information.location": true,
"com.apple.safety.print": true,
"com.apple.safety.temporary-exception.sbpl": ["(allow user-preference-write (preference-domain ".GlobalPreferences"))", "(allow user-preference-read (preference-domain ".GlobalPreferences"))", "(allow file* file-read* file-write* file-write-data file-read-metadata file-ioctl (literal "/Users/user/Library/Preferences/playcover.plist"))", "(allow file* file-read* file-read-metadata file-ioctl (subpath "/Users/user/Library/Frameworks/PlayTools.framework"))"]
}
I’ve attempted skipping step 4 to peer if it’s the one breaking the app, and
Atmosphere permission 755 and codesigning the executable, then transferring it to the wrapper folder within a legitimate ios app put in at the mac
However each failed.
Additionally, for private use is ad-hoc signing the similar as signing with a certificates?