-
Notifications
You must be signed in to change notification settings - Fork 3.3k
macos-15 fails on sudo security authorizationdb write com.apple.trust-settings.admin allow
with error NO (-60005)
#11893
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi @JarLob , |
Hi @JarLob, The error code sudo security authorizationdb write com.apple.trust-settings.admin allow Reason for Discrepancy Between macOS-14 and macOS-15GitHub-hosted macOS 15 runners enforce stricter security protocols compared to macOS-14, resulting in the following challenges:
Consequently, commands that attempt to modify Recommendations: To mitigate this issue and ensure compatibility with macOS-15 runners, we recommend the following approaches: Utilize Local Keychains: GitHub-hosted macOS runners provide support for local keychains. Adopting this method eliminates the requirement to modify the System.keychain and ensures compatibility with the security restrictions of macOS-15. Leverage Environment Variables or Configuration Files for Trust Settings: Instead of attempting to modify system-level trust databases, consider utilizing environment variables or application-specific configuration files to manage trust settings. This approach circumvents the permission restrictions encountered on macOS-15. |
Hi @JarLob, Following up on my previous comment regarding the -60005 error on macOS-15 runners, have you had a chance to review the information and the suggested recommendations for utilizing local keychains or environment variables/configuration files for trust settings? |
Hi @archita105 I have time to look at it yet. Do you have more information about P.S. Out of curiosity, was the #11893 (comment) ChatGPT generated? |
Hi @JarLob , If you possess valid code signing identities or developer certificates obtained from Apple Developer Certificates, you can import them into your local keychain. To import your certificate into a specific local keychain, use the following command, adjusting the file path and keychain name accordingly: To access the certificates within your local keychain during your CI/CD workflow, you can store the local keychain file as a secret in your repository settings. Subsequently, you can unlock the keychain in your workflow using the following steps:
You can then list the available code signing identities within the unlocked keychain using a command like:
Above steps will avoid the permission issues associated with modifying the system-wide certificate store. Or else if the environment remains in its default security state, you can also follow GitHub's built-in permissions system instead of GitHubSecurityLab/actions-permissions/monitor@macos-15.
|
Hi @JarLob ! |
Hi @JarLob ! |
The goal is to intercept all users, so the workaround is not an option. Since there is nothing that can be fixed at runner-images, I'm closing the issue. |
Description
The run fails with
Warning: NO (-60005)
See in the same run it works on Macos-14
Platforms affected
Runner images affected
Image version and build link
20250120.596
Is it regression?
Regression from Macos-14
Expected behavior
Pass as it does on Macos-14
Actual behavior
Fails with
Repro steps
macos-15
branch.It runs this script which can be simplified:
https://github.com/GitHubSecurityLab/actions-permissions/blob/5c0f276d58deb0ba6463350caaff6b8e8c392125/monitor/setup.sh#L21-L56
The text was updated successfully, but these errors were encountered: