-
-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Starting from Big Sur 11.3 certificate installation requires user interaction #415
Comments
@potatoqualitee where is the add-certificate.swift ? |
I got it to compile but then received a "Certificate can't be read" error when I ran it. Since I don't know swift or Apple security well enough, I ran a config override that is acceptable in a CI/CD process but not something I'd want run on my macbook, as it opens the keychain to all users. |
This comment was marked as off-topic.
This comment was marked as off-topic.
Does the Swift script still work as of macOS 12.3.1? I tried it and the By the way, that's a pretty bad script. The return code of |
Unfortunately, I have no idea. GitHub would know more. Because my use-case was CI/CD, I just used a command that was way too permissive. |
Looks like GitHub is indeed still using this script. I tried figuring out why it works on their runners and couldn't reproduce uninteractive behavior. https://github.com/actions/virtual-environments/blob/main/images/macos/provision/configuration/configure-machine.sh |
I'll see who I can ping and let you know! Thanks for looking into this |
Whatever is going on is inconsistent with the
https://developer.apple.com/documentation/security/1399119-sectrustsettingssettrustsettings @timsutton found the relevant entry in the Big Sur release notes: #322 (comment)
Which seems to imply this is intentional. I wonder if the Configurator path is viable for mkcert. If this is intentional, though, it seems weird it can be defeated with We could mention |
Hmm. The Configurator idea I think won't help here: besides requiring an extra download, Apple ID sign-in and "purchase" of a free app, you still can't install configuration profiles automatically starting with Big Sur either. Apple removed local profiles installation in the same OS release they also took away an officially-supported way to trust a root cert at the command line. It seems weird about the workaround being possible, but I think there's a few possible reasons:
It is possible to afterwards revert the authorizationdb settings for |
Don't know if this is too severe, but a documented flag can also be added like @timsutton -- seems you may also be suggesting to wait for workarounds to appear? also valid and clean(er). |
I was just suggesting that I think it's acceptable if the tool doesn't want to own a system configuration change that could be risky (and instead to document how users can do it at their own risk). I'm not thinking 'risky' in the sense that one needs to temporarily reduce security policy, but risky in the sense that it's a change that Apple doesn't have a documented public API for and can easily break or change in the future, and that reverting the setting may take some time effort to get right. So if IMO the trickier details of the authorization database is the rules nomenclature and how to revert them after changing the configuration. 'eskimo' (an Apple engineer who posts a lot of very helpful replies on Apple's developer forums) has some good details provided here. The "allow" setting is easy to apply, and I think it's straightforward enough to put back a rule for the right (by piping the correct plist into stdin of |
Sill an issue in Sonoma. |
There is new issue occurs in new MacOS 15 version while adding certificates through MDM, before that it was working using below cmd
|
First, thank you so much for mkcert! I love it and use it often ⭐
It seems that some default behavior may have changed in macOS 11, as mkcert isn't working out of the box on GitHub Actions with
macos-latest
. (Ah yes, I just read an issue I referenced and it saidStarting from Big Sur 11.3 certificate installation requires user interaction, however it can be bypassed by using SecItemAdd method.
)I'm getting the same error as reported in #94
And I was advised that I could compile some swift code to solve my issue, similar to what they did in this PR actions/runner-images#3311.
By the time I was done, however, I wasn't using
mkcert
anymore. I thought this would be a more appropriate solution to build into mkcert.The text was updated successfully, but these errors were encountered: