-
Notifications
You must be signed in to change notification settings - Fork 149
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ability to view code signing entitlements in the application binary #3
Comments
Viewing application binary with a hex editor and search for text keyword like "keychain" will reveal the presence of such entitlements |
Interesting, thanks, I'll check it out. |
Closing, as it already displays all bundled entitlements. |
@ealeksandrov I'm talking about the entitlements that you would see from running |
My workflow currently involves unzipping the IPA and then run the above command to display entitlements info encoded into application binary, and then compare that with entitlement info in the provisioning profile (which is what provisionQL displays). It would be super nice if these things were right there alongside each other. |
Thanks for mentioning it! |
+1 for this one. For us it's super important, because provisioning profile will always have
But the actual entitlements are like this:
So it would be very useful if we could look at those with the plugin instead of running shell commands each time. |
See PR #16 |
Fix Issue #3: Read code signing entitlements from the application binary
This will help debugging issues such as the following.
http://www.karlmonaghan.com/2012/08/09/invalid-ipa-the-keychain-access-group-in-the-embedded-mobileprovision-and-your-binary-dont-match/
The text was updated successfully, but these errors were encountered: