Thank you, as you mentioned, the issue I am facing is mainly due to two reasons. On the one hand, there are problems with the packaging and signing methods I am using, which I have been working on modifying in the past few days. On the other hand, I lack some necessary permissions, such as
com. apple. security. cs.allow extended executable memory
and
com. apple. security. cs.allow jit.
it can now be downloaded and opened normally from testflight,!
But there is still a functional issue that I hope to receive your help
Background: When my app is running, it will monitor the USB devices currently connected to the Mac and obtain the hid related configurations for each USB device, such as:
{vendorId: 10168,
productId: 493,
path: 'IOService:/ AppleACPIPl...HIDDevice@14210000 0
serialNumber: '20002E8C',
manufacturer: 'ThingM',
product: 'blink(1) mk2',
release: 2,
interface: -1,
usagePage: 65280,
usage: 1}
Originally running normally, but in sandbox mode, I found that there were some missing information in obtaining device information, specifically the path of each USB device obtained (e.g. 'IOService:/ AppleACPIPl...HIDDevice@14210000 0 ') are all lost (with empty content), but they can be obtained in non sandbox environments. Do i need any additional permissions for this?
PS: I have been keeping it on: com. apple. security. device. usb
Topic:
App Store Distribution & Marketing
SubTopic:
App Store Connect
Tags: