I am being careful. You're wrong. I'm not asking about the app container folder, I'm asking about the sandbox as a whole set of constraints. I don't want my binary to have any extra permissions other than the ones the XPC will have. Then I suggest research how the sandbox works with respect to entitlements and inheritance so that your questions will be more clear.
Great, the only problem is apparently you can't execute them. Speak for yourself. I can execute them just fine in the sandbox.
Sorry you can put two and two together. As you can too. Someone with more experience in these things than both of us put together told you to run it from the bundle. You dismissed that advice because of some other, likely unrelated, problem. That's the answer. I understand that it didn't work when you tried that. But the fact there is some other problem in your code doesn't change the fact that this is the answer.
I don't care about distribution right now. Having a sandbox, regardless of distribution, is better for everyone, users, developers and other apps. On Apple's platforms, distribution is always an important factor. I agree that the sandbox is better for users, that's why it is required for the Mac App Store and recommended everywhere else. But it is not necessarily "better" for developers as it adds complications, some of which cannot be overcome even by entitlements. However, this is just a pedantic talking point. In your specific case, you are simply doing it wrong, regardless of sandboxing or distribution. The fact that it works when the sandbox is disabled does not necessarily mean it is correct.
I don't know what you mean by hacking. I need a process to do something. It's not short. It's not unlawful. A "hack" has nothing to do with malware or exploitations of vulnerabilities. It simply means you are doing something in an ad-hoc, non-standard way that is likely to break under a future and/or more restrictive environment. Apple regularly increases security levels in the operating system. Sometime of these changes may impose additional restrictions even on non-sandboxed apps. Apple made major changes like this in Catalina. What you are proposing is at relatively high risk of breaking in some future update.
That’s all you had to say! The rest is unnecessary and unhelpful. Good luck then!
Topic:
App & System Services
SubTopic:
General
Tags: