OSX Sandboxing: security scoped bookmarks for all filesystem access
Bug #1257340 reported by
RJ Skerry-Ryan
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Mixxx |
Fix Released
|
High
|
RJ Skerry-Ryan |
Bug Description
Whenever we access files we must have permission from the OSX sandbox. To acquire permission from the user and store it we have to implement Security Scoped Bookmarks.
We need to keep track of paths that we have access to (maybe in SQlite) and when we try to access a resource we don't have access to yet, we have to ask the user for it.
Changed in mixxx: | |
importance: | Undecided → High |
tags: | added: mas osx sandbox |
Changed in mixxx: | |
milestone: | none → 1.12.0 |
assignee: | nobody → RJ Ryan (rryan) |
status: | New → In Progress |
Changed in mixxx: | |
status: | In Progress → Fix Committed |
Changed in mixxx: | |
status: | Fix Committed → Fix Released |
To post a comment you must log in.
that there is a fantastic user experience. We can't even load files read-only outside the sandbox?
This stackoverflow thread talks about getting an exception:
http:// stackoverflow. com/questions/ 10952225/ is-there- any-way- to-give- my-sandboxed- mac-app- read-only- access- to-files- in-lib
https:/ /developer. apple.com/ library/ ios/documentati on/Miscellaneou s/Reference/ EntitlementKeyR eference/ Chapters/ AppSandboxTempo raryExceptionEn titlements. html
If we are very specific about which folders we want to access, and only access them read-only, that might be enough for the App Store folks.