mirror of
https://github.com/pgadmin-org/pgadmin4.git
synced 2024-11-22 08:46:39 -06:00
Tighten up macOS entitlements, and add comments explaining.
Note that this re-enables executable page protection, which was disabled for unknown reasons.
This commit is contained in:
parent
8875d8b741
commit
cc55c8db89
@ -2,11 +2,62 @@
|
||||
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||
<plist version="1.0">
|
||||
<dict>
|
||||
<!--
|
||||
Disable Sandboxing. This must be enabled for the app store, but it will
|
||||
cause NWjs to fail to start with an error like:
|
||||
|
||||
[1004/170922.238911:ERROR:directory_reader_posix.cc(42)] opendir /dev/fd: Operation not permitted (1)
|
||||
|
||||
We should figure out why that happens and fix it one day, but for now
|
||||
we just don't support the app store.
|
||||
-->
|
||||
<key>com.apple.security.app-sandbox</key>
|
||||
<false/>
|
||||
|
||||
<!--
|
||||
Set the app group name for IPC and access to shared containers between
|
||||
our processes.
|
||||
-->
|
||||
<key>com.apple.security.application-groups</key>
|
||||
<string>%TEAMID%.org.pgadmin.pgadmin4</string>
|
||||
|
||||
<!--
|
||||
We have no need for JIT.
|
||||
-->
|
||||
<key>com.apple.security.cs.allow-jit</key>
|
||||
<false/>
|
||||
|
||||
<!--
|
||||
Explicitly disallow executable code overwriting/patching.
|
||||
-->
|
||||
<key>com.apple.security.cs.allow-unsigned-executable-memory</key>
|
||||
<false/>
|
||||
|
||||
<!--
|
||||
Explicitly disallow use of dynamic loader environment variables that
|
||||
could be used for code injection.
|
||||
-->
|
||||
<key>com.apple.security.cs.allow-dyld-environment-variables</key>
|
||||
<false/>
|
||||
|
||||
<!--
|
||||
Explicitly ensure that library validation is enabled so we only load
|
||||
libraries and frameworks signed by us or Apple.
|
||||
-->
|
||||
<key>com.apple.security.cs.disable-library-validation</key>
|
||||
<false/>
|
||||
|
||||
<!--
|
||||
Ensure we can't modify our own executables.
|
||||
-->
|
||||
<key>com.apple.security.cs.disable-executable-page-protection</key>
|
||||
<true/>
|
||||
<false/>
|
||||
|
||||
<!--
|
||||
We're not a debugger (well, except for procedural languages in Postgres,
|
||||
but that doesn't count).
|
||||
-->
|
||||
<key>com.apple.security.cs.debugger</key>
|
||||
<false/>
|
||||
</dict>
|
||||
</plist>
|
Loading…
Reference in New Issue
Block a user