Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Toolchain docs: describe macOS un-quarantine procedure #23168

Closed
snej opened this issue Feb 28, 2020 · 1 comment · Fixed by #23264
Closed

Toolchain docs: describe macOS un-quarantine procedure #23168

snej opened this issue Feb 28, 2020 · 1 comment · Fixed by #23264
Assignees
Labels
area: Documentation area: Toolchains Toolchains Enhancement Changes/Updates/Additions to existing features

Comments

@snej
Copy link

snej commented Feb 28, 2020

I'm new to Zephyr and embedded development, but an experienced Mac/iOS developer. I'm following the Getting Started guide.

When building the "blinky" program, I get an onscreen alert saying that the app "arm-none-eabi-gcc" is from an unknown developer and can't be opened. The only options are to cancel (which causes the build to fail, of course) or delete the binary.

I'm used to this with apps and know the workaround (right-click, choose Open, click OK). This works with raw binaries as well once I find them in the Finder; however, this keeps happening for every different binary in the GCC toolchain.

I found the answer on StackOverflow: run xattr -r -d com.apple.quarantine . in the GCC toolchain root directory (not just its bin subdirectory!)

This would be very useful to add to your 3rd-party-toolchain documentation, since I imagine a lot of developers won't have run into this issue before — I haven't, probably because HomeBrew un-quarantines binaries automatically.

@snej snej added the Enhancement Changes/Updates/Additions to existing features label Feb 28, 2020
@carlescufi
Copy link
Member

carlescufi commented Mar 3, 2020

Thanks for reporting this @snej. We were actually discussing this very issue yesterday with @mbolivar, and I agree that it should be documented.

There is also an "easier" and "universal" way, see this screenshot:

image

Would you mind sending a pull request @snej? Otherwise I can do it as well.

@carlescufi carlescufi self-assigned this Mar 3, 2020
carlescufi added a commit to carlescufi/zephyr that referenced this issue Mar 4, 2020
Describe how to work around the Gatekeeper enforcement of security
policies in apps launched from the Terminal.

Fixes zephyrproject-rtos#23168.

Signed-off-by: Carles Cufi <[email protected]>
jhedberg pushed a commit that referenced this issue Mar 5, 2020
Describe how to work around the Gatekeeper enforcement of security
policies in apps launched from the Terminal.

Fixes #23168.

Signed-off-by: Carles Cufi <[email protected]>
hakehuang pushed a commit to hakehuang/zephyr that referenced this issue Mar 18, 2020
Describe how to work around the Gatekeeper enforcement of security
policies in apps launched from the Terminal.

Fixes zephyrproject-rtos#23168.

Signed-off-by: Carles Cufi <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area: Documentation area: Toolchains Toolchains Enhancement Changes/Updates/Additions to existing features
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants