Huh. That's curious because this is not what's happening according to our testing (my last comment above).
This is what I am currently observing when a process that runs in the daemon context tries to perform a POST request to a HTTP address.
2022-03-03 11:51:55.384 E daemonnamed[1467:2af9] [subsystem:category] Error occurred while trying to send data: Error Domain=NSURLErrorDomain Code=-1022 "The resource could not be loaded because the App Transport Security policy requires the use of a secure connection." UserInfo={NSUnderlyingError=0x7ffbadf0ddd0 Unknown macro: {Error Domain=kCFErrorDomainCFNetwork Code=-1022 "(null)"}, NSErrorFailingURLStringKey=http://concealed, NSErrorFailingURLKey=http://concealed, NSLocalizedDescription=The resource could not be loaded because the App Transport Security policy requires the use of a secure connection.}
So if I read this message correctly, ATS is restricting it from performing a network request due to an insecure connection.
If I restore the URL to its original form (HTTPS), then the request is successful.
is the comment about not having ATS protection in daemon context is about it being limited in some other way?
So it's not the same as for user apps?