Avatar
norio_nomura 4/1/2020 3:20 AM
Swift PlaygroundsはSourceKitをsandbox下で動かしてる様に見える…
3:22 AM
あー、たくさんentitlementsがついてた。 The code signature contains entitlements.  iCloud entitlements: iCloud store: “BVNY5T73P8.com.apple.Playgrounds”. iCloud containers: “iCloud.com.apple.Playgrounds”. Sandbox entitlements: User-selected files, read/write access: YES. Allow outgoing network connections: YES. Allow incoming network connections: YES. Allow camera access: YES. Application identifier: “BVNY5T73P8.com.apple.PlaygroundsMac”. com.apple.developer.ClassKit-environment: “production”. com.apple.developer.associated-domains: “applinks:developer.apple.com”. com.apple.developer.icloud-services: “CloudDocuments”. com.apple.developer.associated-application-identifier: “BVNY5T73P8.com.apple.Playgrounds”. com.apple.developer.icloud-container-identifiers: “iCloud.com.apple.Playgrounds”. Temporary exception entitlements: files.home-relative-path.read-write: “/Documents/Playgrounds/”. iokit-user-client-class: “AppleMobileFileIntegrityUserClient”. shared-preference.read-only: “com.apple.AssetCacheLocator”. mach-lookup.global-name: “com.apple.rtcreportingd”, “com.apple.AssetCacheLocatorService”, “com.apple.security.syspolicy.exec”. Apple private exception entitlements: tcc.policy-override: YES. amfi.can-load-cdhash: YES. MobileContainerManager.wipeContainer: “com.apple.PlaygroundsMac.ExecutionExtension”. syspolicy.execution-policy-bypass: YES. rtcreportingd: YES. tcc.allow-prompting: “kTCCServiceAll”.