2
0

export_plugin.cpp 106 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422
  1. /**************************************************************************/
  2. /* export_plugin.cpp */
  3. /**************************************************************************/
  4. /* This file is part of: */
  5. /* GODOT ENGINE */
  6. /* https://godotengine.org */
  7. /**************************************************************************/
  8. /* Copyright (c) 2014-present Godot Engine contributors (see AUTHORS.md). */
  9. /* Copyright (c) 2007-2014 Juan Linietsky, Ariel Manzur. */
  10. /* */
  11. /* Permission is hereby granted, free of charge, to any person obtaining */
  12. /* a copy of this software and associated documentation files (the */
  13. /* "Software"), to deal in the Software without restriction, including */
  14. /* without limitation the rights to use, copy, modify, merge, publish, */
  15. /* distribute, sublicense, and/or sell copies of the Software, and to */
  16. /* permit persons to whom the Software is furnished to do so, subject to */
  17. /* the following conditions: */
  18. /* */
  19. /* The above copyright notice and this permission notice shall be */
  20. /* included in all copies or substantial portions of the Software. */
  21. /* */
  22. /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */
  23. /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */
  24. /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */
  25. /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */
  26. /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */
  27. /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */
  28. /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */
  29. /**************************************************************************/
  30. #include "export_plugin.h"
  31. #include "codesign.h"
  32. #include "lipo.h"
  33. #include "logo_svg.gen.h"
  34. #include "macho.h"
  35. #include "run_icon_svg.gen.h"
  36. #include "core/io/image_loader.h"
  37. #include "core/io/plist.h"
  38. #include "core/string/translation.h"
  39. #include "drivers/png/png_driver_common.h"
  40. #include "editor/editor_node.h"
  41. #include "editor/editor_paths.h"
  42. #include "editor/editor_scale.h"
  43. #include "editor/editor_string_names.h"
  44. #include "editor/import/resource_importer_texture_settings.h"
  45. #include "scene/resources/image_texture.h"
  46. #include "modules/modules_enabled.gen.h" // For svg and regex.
  47. #ifdef MODULE_SVG_ENABLED
  48. #include "modules/svg/image_loader_svg.h"
  49. #endif
  50. void EditorExportPlatformMacOS::get_preset_features(const Ref<EditorExportPreset> &p_preset, List<String> *r_features) const {
  51. r_features->push_back(p_preset->get("binary_format/architecture"));
  52. String architecture = p_preset->get("binary_format/architecture");
  53. if (architecture == "universal" || architecture == "x86_64") {
  54. r_features->push_back("s3tc");
  55. r_features->push_back("bptc");
  56. } else if (architecture == "arm64") {
  57. r_features->push_back("etc2");
  58. r_features->push_back("astc");
  59. } else {
  60. ERR_PRINT("Invalid architecture");
  61. }
  62. }
  63. String EditorExportPlatformMacOS::get_export_option_warning(const EditorExportPreset *p_preset, const StringName &p_name) const {
  64. if (p_preset) {
  65. int dist_type = p_preset->get("export/distribution_type");
  66. bool ad_hoc = false;
  67. int codesign_tool = p_preset->get("codesign/codesign");
  68. int notary_tool = p_preset->get("notarization/notarization");
  69. switch (codesign_tool) {
  70. case 1: { // built-in ad-hoc
  71. ad_hoc = true;
  72. } break;
  73. case 2: { // "rcodesign"
  74. ad_hoc = p_preset->get_or_env("codesign/certificate_file", ENV_MAC_CODESIGN_CERT_FILE).operator String().is_empty() || p_preset->get_or_env("codesign/certificate_password", ENV_MAC_CODESIGN_CERT_FILE).operator String().is_empty();
  75. } break;
  76. #ifdef MACOS_ENABLED
  77. case 3: { // "codesign"
  78. ad_hoc = (p_preset->get("codesign/identity") == "" || p_preset->get("codesign/identity") == "-");
  79. } break;
  80. #endif
  81. default: {
  82. };
  83. }
  84. if (p_name == "application/bundle_identifier") {
  85. String identifier = p_preset->get("application/bundle_identifier");
  86. String pn_err;
  87. if (!is_package_name_valid(identifier, &pn_err)) {
  88. return TTR("Invalid bundle identifier:") + " " + pn_err;
  89. }
  90. }
  91. if (p_name == "codesign/certificate_file" || p_name == "codesign/certificate_password" || p_name == "codesign/identity") {
  92. if (dist_type == 2) {
  93. if (ad_hoc) {
  94. return TTR("App Store distribution with ad-hoc code signing is not supported.");
  95. }
  96. } else if (notary_tool > 0 && ad_hoc) {
  97. return TTR("Notarization with an ad-hoc signature is not supported.");
  98. }
  99. }
  100. if (p_name == "codesign/apple_team_id") {
  101. String team_id = p_preset->get("codesign/apple_team_id");
  102. if (team_id.is_empty()) {
  103. if (dist_type == 2) {
  104. return TTR("Apple Team ID is required for App Store distribution.");
  105. } else if (notary_tool > 0) {
  106. return TTR("Apple Team ID is required for notarization.");
  107. }
  108. }
  109. }
  110. if (p_name == "codesign/provisioning_profile" && dist_type == 2) {
  111. String pprof = p_preset->get_or_env("codesign/provisioning_profile", ENV_MAC_CODESIGN_PROFILE);
  112. if (pprof.is_empty()) {
  113. return TTR("Provisioning profile is required for App Store distribution.");
  114. }
  115. }
  116. if (p_name == "codesign/installer_identity" && dist_type == 2) {
  117. String ident = p_preset->get("codesign/installer_identity");
  118. if (ident.is_empty()) {
  119. return TTR("Installer signing identity is required for App Store distribution.");
  120. }
  121. }
  122. if (p_name == "codesign/entitlements/app_sandbox/enabled" && dist_type == 2) {
  123. bool sandbox = p_preset->get("codesign/entitlements/app_sandbox/enabled");
  124. if (!sandbox) {
  125. return TTR("App sandbox is required for App Store distribution.");
  126. }
  127. }
  128. if (p_name == "codesign/codesign") {
  129. if (dist_type == 2) {
  130. if (codesign_tool == 2 && Engine::get_singleton()->has_singleton("GodotSharp")) {
  131. return TTR("'rcodesign' doesn't support signing applications with embedded dynamic libraries (GDExtension or .NET).");
  132. }
  133. if (codesign_tool == 0) {
  134. return TTR("Code signing is required for App Store distribution.");
  135. }
  136. if (codesign_tool == 1) {
  137. return TTR("App Store distribution with ad-hoc code signing is not supported.");
  138. }
  139. } else if (notary_tool > 0) {
  140. if (codesign_tool == 0) {
  141. return TTR("Code signing is required for notarization.");
  142. }
  143. if (codesign_tool == 1) {
  144. return TTR("Notarization with an ad-hoc signature is not supported.");
  145. }
  146. }
  147. }
  148. if (notary_tool == 2 || notary_tool == 3) {
  149. if (p_name == "notarization/apple_id_name" || p_name == "notarization/api_uuid") {
  150. String apple_id = p_preset->get_or_env("notarization/apple_id_name", ENV_MAC_NOTARIZATION_APPLE_ID);
  151. String api_uuid = p_preset->get_or_env("notarization/api_uuid", ENV_MAC_NOTARIZATION_UUID);
  152. if (apple_id.is_empty() && api_uuid.is_empty()) {
  153. return TTR("Neither Apple ID name nor App Store Connect issuer ID name not specified.");
  154. }
  155. if (!apple_id.is_empty() && !api_uuid.is_empty()) {
  156. return TTR("Both Apple ID name and App Store Connect issuer ID name are specified, only one should be set at the same time.");
  157. }
  158. }
  159. if (p_name == "notarization/apple_id_password") {
  160. String apple_id = p_preset->get_or_env("notarization/apple_id_name", ENV_MAC_NOTARIZATION_APPLE_ID);
  161. String apple_pass = p_preset->get_or_env("notarization/apple_id_password", ENV_MAC_NOTARIZATION_APPLE_PASS);
  162. if (!apple_id.is_empty() && apple_pass.is_empty()) {
  163. return TTR("Apple ID password not specified.");
  164. }
  165. }
  166. if (p_name == "notarization/api_key_id") {
  167. String api_uuid = p_preset->get_or_env("notarization/api_uuid", ENV_MAC_NOTARIZATION_UUID);
  168. String api_key = p_preset->get_or_env("notarization/api_key_id", ENV_MAC_NOTARIZATION_KEY_ID);
  169. if (!api_uuid.is_empty() && api_key.is_empty()) {
  170. return TTR("App Store Connect API key ID not specified.");
  171. }
  172. }
  173. } else if (notary_tool == 1) {
  174. if (p_name == "notarization/api_uuid") {
  175. String api_uuid = p_preset->get_or_env("notarization/api_uuid", ENV_MAC_NOTARIZATION_UUID);
  176. if (api_uuid.is_empty()) {
  177. return TTR("App Store Connect issuer ID name not specified.");
  178. }
  179. }
  180. if (p_name == "notarization/api_key_id") {
  181. String api_key = p_preset->get_or_env("notarization/api_key_id", ENV_MAC_NOTARIZATION_KEY_ID);
  182. if (api_key.is_empty()) {
  183. return TTR("App Store Connect API key ID not specified.");
  184. }
  185. }
  186. }
  187. if (codesign_tool > 0) {
  188. if (p_name == "privacy/microphone_usage_description") {
  189. String discr = p_preset->get("privacy/microphone_usage_description");
  190. bool enabled = p_preset->get("codesign/entitlements/audio_input");
  191. if (enabled && discr.is_empty()) {
  192. return TTR("Microphone access is enabled, but usage description is not specified.");
  193. }
  194. }
  195. if (p_name == "privacy/camera_usage_description") {
  196. String discr = p_preset->get("privacy/camera_usage_description");
  197. bool enabled = p_preset->get("codesign/entitlements/camera");
  198. if (enabled && discr.is_empty()) {
  199. return TTR("Camera access is enabled, but usage description is not specified.");
  200. }
  201. }
  202. if (p_name == "privacy/location_usage_description") {
  203. String discr = p_preset->get("privacy/location_usage_description");
  204. bool enabled = p_preset->get("codesign/entitlements/location");
  205. if (enabled && discr.is_empty()) {
  206. return TTR("Location information access is enabled, but usage description is not specified.");
  207. }
  208. }
  209. if (p_name == "privacy/address_book_usage_description") {
  210. String discr = p_preset->get("privacy/address_book_usage_description");
  211. bool enabled = p_preset->get("codesign/entitlements/address_book");
  212. if (enabled && discr.is_empty()) {
  213. return TTR("Address book access is enabled, but usage description is not specified.");
  214. }
  215. }
  216. if (p_name == "privacy/calendar_usage_description") {
  217. String discr = p_preset->get("privacy/calendar_usage_description");
  218. bool enabled = p_preset->get("codesign/entitlements/calendars");
  219. if (enabled && discr.is_empty()) {
  220. return TTR("Calendar access is enabled, but usage description is not specified.");
  221. }
  222. }
  223. if (p_name == "privacy/photos_library_usage_description") {
  224. String discr = p_preset->get("privacy/photos_library_usage_description");
  225. bool enabled = p_preset->get("codesign/entitlements/photos_library");
  226. if (enabled && discr.is_empty()) {
  227. return TTR("Photo library access is enabled, but usage description is not specified.");
  228. }
  229. }
  230. }
  231. }
  232. return String();
  233. }
  234. bool EditorExportPlatformMacOS::get_export_option_visibility(const EditorExportPreset *p_preset, const String &p_option) const {
  235. // Hide irrelevant code signing options.
  236. if (p_preset) {
  237. int codesign_tool = p_preset->get("codesign/codesign");
  238. switch (codesign_tool) {
  239. case 1: { // built-in ad-hoc
  240. if (p_option == "codesign/identity" || p_option == "codesign/certificate_file" || p_option == "codesign/certificate_password" || p_option == "codesign/custom_options" || p_option == "codesign/team_id") {
  241. return false;
  242. }
  243. } break;
  244. case 2: { // "rcodesign"
  245. if (p_option == "codesign/identity") {
  246. return false;
  247. }
  248. } break;
  249. #ifdef MACOS_ENABLED
  250. case 3: { // "codesign"
  251. if (p_option == "codesign/certificate_file" || p_option == "codesign/certificate_password") {
  252. return false;
  253. }
  254. } break;
  255. #endif
  256. default: { // disabled
  257. if (p_option == "codesign/identity" || p_option == "codesign/certificate_file" || p_option == "codesign/certificate_password" || p_option == "codesign/custom_options" || p_option.begins_with("codesign/entitlements") || p_option == "codesign/team_id") {
  258. return false;
  259. }
  260. } break;
  261. }
  262. // Distribution type.
  263. int dist_type = p_preset->get("export/distribution_type");
  264. if (dist_type != 2 && p_option == "codesign/installer_identity") {
  265. return false;
  266. }
  267. if (dist_type == 2 && p_option.begins_with("notarization/")) {
  268. return false;
  269. }
  270. if (dist_type != 2 && p_option == "codesign/provisioning_profile") {
  271. return false;
  272. }
  273. String custom_prof = p_preset->get("codesign/entitlements/custom_file");
  274. if (!custom_prof.is_empty() && p_option != "codesign/entitlements/custom_file" && p_option.begins_with("codesign/entitlements/")) {
  275. return false;
  276. }
  277. // Hide sandbox entitlements.
  278. bool sandbox = p_preset->get("codesign/entitlements/app_sandbox/enabled");
  279. if (!sandbox && p_option != "codesign/entitlements/app_sandbox/enabled" && p_option.begins_with("codesign/entitlements/app_sandbox/")) {
  280. return false;
  281. }
  282. // Hide SSH options.
  283. bool ssh = p_preset->get("ssh_remote_deploy/enabled");
  284. if (!ssh && p_option != "ssh_remote_deploy/enabled" && p_option.begins_with("ssh_remote_deploy/")) {
  285. return false;
  286. }
  287. // Hide irrelevant notarization options.
  288. int notary_tool = p_preset->get("notarization/notarization");
  289. switch (notary_tool) {
  290. case 1: { // "rcodesign"
  291. if (p_option == "notarization/apple_id_name" || p_option == "notarization/apple_id_password") {
  292. return false;
  293. }
  294. } break;
  295. case 2: { // "notarytool"
  296. // All options are visible.
  297. } break;
  298. default: { // disabled
  299. if (p_option == "notarization/apple_id_name" || p_option == "notarization/apple_id_password" || p_option == "notarization/api_uuid" || p_option == "notarization/api_key" || p_option == "notarization/api_key_id") {
  300. return false;
  301. }
  302. } break;
  303. }
  304. }
  305. // These entitlements are required to run managed code, and are always enabled in Mono builds.
  306. if (Engine::get_singleton()->has_singleton("GodotSharp")) {
  307. if (p_option == "codesign/entitlements/allow_jit_code_execution" || p_option == "codesign/entitlements/allow_unsigned_executable_memory" || p_option == "codesign/entitlements/allow_dyld_environment_variables") {
  308. return false;
  309. }
  310. }
  311. return true;
  312. }
  313. List<String> EditorExportPlatformMacOS::get_binary_extensions(const Ref<EditorExportPreset> &p_preset) const {
  314. List<String> list;
  315. if (p_preset.is_valid()) {
  316. int dist_type = p_preset->get("export/distribution_type");
  317. if (dist_type == 0) {
  318. #ifdef MACOS_ENABLED
  319. list.push_back("dmg");
  320. #endif
  321. list.push_back("zip");
  322. #ifndef WINDOWS_ENABLED
  323. list.push_back("app");
  324. #endif
  325. } else if (dist_type == 1) {
  326. #ifdef MACOS_ENABLED
  327. list.push_back("dmg");
  328. #endif
  329. list.push_back("zip");
  330. } else if (dist_type == 2) {
  331. #ifdef MACOS_ENABLED
  332. list.push_back("pkg");
  333. #endif
  334. }
  335. }
  336. return list;
  337. }
  338. void EditorExportPlatformMacOS::get_export_options(List<ExportOption> *r_options) const {
  339. #ifdef MACOS_ENABLED
  340. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "export/distribution_type", PROPERTY_HINT_ENUM, "Testing,Distribution,App Store"), 1, true));
  341. #else
  342. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "export/distribution_type", PROPERTY_HINT_ENUM, "Testing,Distribution"), 1, true));
  343. #endif
  344. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "binary_format/architecture", PROPERTY_HINT_ENUM, "universal,x86_64,arm64", PROPERTY_USAGE_STORAGE), "universal"));
  345. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "custom_template/debug", PROPERTY_HINT_GLOBAL_FILE, "*.zip"), ""));
  346. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "custom_template/release", PROPERTY_HINT_GLOBAL_FILE, "*.zip"), ""));
  347. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "debug/export_console_wrapper", PROPERTY_HINT_ENUM, "No,Debug Only,Debug and Release"), 1));
  348. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "application/icon", PROPERTY_HINT_FILE, "*.icns,*.png,*.webp,*.svg"), ""));
  349. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "application/icon_interpolation", PROPERTY_HINT_ENUM, "Nearest neighbor,Bilinear,Cubic,Trilinear,Lanczos"), 4));
  350. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "application/bundle_identifier", PROPERTY_HINT_PLACEHOLDER_TEXT, "com.example.game"), "", false, true));
  351. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "application/signature"), ""));
  352. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "application/app_category", PROPERTY_HINT_ENUM, "Business,Developer-tools,Education,Entertainment,Finance,Games,Action-games,Adventure-games,Arcade-games,Board-games,Card-games,Casino-games,Dice-games,Educational-games,Family-games,Kids-games,Music-games,Puzzle-games,Racing-games,Role-playing-games,Simulation-games,Sports-games,Strategy-games,Trivia-games,Word-games,Graphics-design,Healthcare-fitness,Lifestyle,Medical,Music,News,Photography,Productivity,Reference,Social-networking,Sports,Travel,Utilities,Video,Weather"), "Games"));
  353. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "application/short_version", PROPERTY_HINT_PLACEHOLDER_TEXT, "Leave empty to use project version"), ""));
  354. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "application/version", PROPERTY_HINT_PLACEHOLDER_TEXT, "Leave empty to use project version"), ""));
  355. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "application/copyright"), ""));
  356. r_options->push_back(ExportOption(PropertyInfo(Variant::DICTIONARY, "application/copyright_localized", PROPERTY_HINT_LOCALIZABLE_STRING), Dictionary()));
  357. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "application/min_macos_version"), "10.12"));
  358. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "application/export_angle", PROPERTY_HINT_ENUM, "Auto,Yes,No"), 0, true));
  359. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "display/high_res"), true));
  360. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "application/additional_plist_content", PROPERTY_HINT_MULTILINE_TEXT), ""));
  361. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "xcode/platform_build"), "14C18"));
  362. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "xcode/sdk_version"), "13.1"));
  363. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "xcode/sdk_build"), "22C55"));
  364. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "xcode/sdk_name"), "macosx13.1"));
  365. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "xcode/xcode_version"), "1420"));
  366. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "xcode/xcode_build"), "14C18"));
  367. #ifdef MACOS_ENABLED
  368. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "codesign/codesign", PROPERTY_HINT_ENUM, "Disabled,Built-in (ad-hoc only),rcodesign,Xcode codesign"), 3, true));
  369. #else
  370. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "codesign/codesign", PROPERTY_HINT_ENUM, "Disabled,Built-in (ad-hoc only),rcodesign"), 1, true, true));
  371. #endif
  372. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "codesign/installer_identity", PROPERTY_HINT_PLACEHOLDER_TEXT, "3rd Party Mac Developer Installer: (ID)"), "", false, true));
  373. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "codesign/apple_team_id", PROPERTY_HINT_PLACEHOLDER_TEXT, "ID"), "", false, true));
  374. // "codesign" only options:
  375. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "codesign/identity", PROPERTY_HINT_PLACEHOLDER_TEXT, "Type: Name (ID)"), ""));
  376. // "rcodesign" only options:
  377. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "codesign/certificate_file", PROPERTY_HINT_GLOBAL_FILE, "*.pfx,*.p12", PROPERTY_USAGE_DEFAULT | PROPERTY_USAGE_SECRET), ""));
  378. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "codesign/certificate_password", PROPERTY_HINT_PASSWORD, "", PROPERTY_USAGE_DEFAULT | PROPERTY_USAGE_SECRET), ""));
  379. // "codesign" and "rcodesign" only options:
  380. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "codesign/provisioning_profile", PROPERTY_HINT_GLOBAL_FILE, "*.provisionprofile", PROPERTY_USAGE_DEFAULT | PROPERTY_USAGE_SECRET), "", false, true));
  381. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "codesign/entitlements/custom_file", PROPERTY_HINT_GLOBAL_FILE, "*.plist"), "", true));
  382. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/allow_jit_code_execution"), false));
  383. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/allow_unsigned_executable_memory"), false));
  384. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/allow_dyld_environment_variables"), false));
  385. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/disable_library_validation"), false));
  386. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/audio_input"), false));
  387. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/camera"), false));
  388. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/location"), false));
  389. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/address_book"), false));
  390. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/calendars"), false));
  391. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/photos_library"), false));
  392. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/apple_events"), false));
  393. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/debugging"), false));
  394. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/app_sandbox/enabled"), false, true, true));
  395. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/app_sandbox/network_server"), false));
  396. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/app_sandbox/network_client"), false));
  397. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/app_sandbox/device_usb"), false));
  398. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "codesign/entitlements/app_sandbox/device_bluetooth"), false));
  399. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "codesign/entitlements/app_sandbox/files_downloads", PROPERTY_HINT_ENUM, "No,Read-only,Read-write"), 0));
  400. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "codesign/entitlements/app_sandbox/files_pictures", PROPERTY_HINT_ENUM, "No,Read-only,Read-write"), 0));
  401. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "codesign/entitlements/app_sandbox/files_music", PROPERTY_HINT_ENUM, "No,Read-only,Read-write"), 0));
  402. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "codesign/entitlements/app_sandbox/files_movies", PROPERTY_HINT_ENUM, "No,Read-only,Read-write"), 0));
  403. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "codesign/entitlements/app_sandbox/files_user_selected", PROPERTY_HINT_ENUM, "No,Read-only,Read-write"), 0));
  404. r_options->push_back(ExportOption(PropertyInfo(Variant::ARRAY, "codesign/entitlements/app_sandbox/helper_executables", PROPERTY_HINT_ARRAY_TYPE, itos(Variant::STRING) + "/" + itos(PROPERTY_HINT_GLOBAL_FILE) + ":"), Array()));
  405. r_options->push_back(ExportOption(PropertyInfo(Variant::PACKED_STRING_ARRAY, "codesign/custom_options"), PackedStringArray()));
  406. #ifdef MACOS_ENABLED
  407. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "notarization/notarization", PROPERTY_HINT_ENUM, "Disabled,rcodesign,Xcode notarytool"), 0, true));
  408. #else
  409. r_options->push_back(ExportOption(PropertyInfo(Variant::INT, "notarization/notarization", PROPERTY_HINT_ENUM, "Disabled,rcodesign"), 0, true));
  410. #endif
  411. // "notarytool" only options:
  412. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "notarization/apple_id_name", PROPERTY_HINT_PLACEHOLDER_TEXT, "Apple ID email", PROPERTY_USAGE_DEFAULT | PROPERTY_USAGE_SECRET), "", false, true));
  413. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "notarization/apple_id_password", PROPERTY_HINT_PASSWORD, "Enable two-factor authentication and provide app-specific password", PROPERTY_USAGE_DEFAULT | PROPERTY_USAGE_SECRET), "", false, true));
  414. // "notarytool" and "rcodesign" only options:
  415. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "notarization/api_uuid", PROPERTY_HINT_PLACEHOLDER_TEXT, "App Store Connect issuer ID UUID", PROPERTY_USAGE_DEFAULT | PROPERTY_USAGE_SECRET), "", false, true));
  416. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "notarization/api_key", PROPERTY_HINT_GLOBAL_FILE, "*.p8", PROPERTY_USAGE_DEFAULT | PROPERTY_USAGE_SECRET), "", false, true));
  417. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "notarization/api_key_id", PROPERTY_HINT_PLACEHOLDER_TEXT, "App Store Connect API key ID", PROPERTY_USAGE_DEFAULT | PROPERTY_USAGE_SECRET), "", false, true));
  418. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "privacy/microphone_usage_description", PROPERTY_HINT_PLACEHOLDER_TEXT, "Provide a message if you need to use the microphone"), "", false, true));
  419. r_options->push_back(ExportOption(PropertyInfo(Variant::DICTIONARY, "privacy/microphone_usage_description_localized", PROPERTY_HINT_LOCALIZABLE_STRING), Dictionary()));
  420. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "privacy/camera_usage_description", PROPERTY_HINT_PLACEHOLDER_TEXT, "Provide a message if you need to use the camera"), "", false, true));
  421. r_options->push_back(ExportOption(PropertyInfo(Variant::DICTIONARY, "privacy/camera_usage_description_localized", PROPERTY_HINT_LOCALIZABLE_STRING), Dictionary()));
  422. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "privacy/location_usage_description", PROPERTY_HINT_PLACEHOLDER_TEXT, "Provide a message if you need to use the location information"), "", false, true));
  423. r_options->push_back(ExportOption(PropertyInfo(Variant::DICTIONARY, "privacy/location_usage_description_localized", PROPERTY_HINT_LOCALIZABLE_STRING), Dictionary()));
  424. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "privacy/address_book_usage_description", PROPERTY_HINT_PLACEHOLDER_TEXT, "Provide a message if you need to use the address book"), "", false, true));
  425. r_options->push_back(ExportOption(PropertyInfo(Variant::DICTIONARY, "privacy/address_book_usage_description_localized", PROPERTY_HINT_LOCALIZABLE_STRING), Dictionary()));
  426. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "privacy/calendar_usage_description", PROPERTY_HINT_PLACEHOLDER_TEXT, "Provide a message if you need to use the calendar"), "", false, true));
  427. r_options->push_back(ExportOption(PropertyInfo(Variant::DICTIONARY, "privacy/calendar_usage_description_localized", PROPERTY_HINT_LOCALIZABLE_STRING), Dictionary()));
  428. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "privacy/photos_library_usage_description", PROPERTY_HINT_PLACEHOLDER_TEXT, "Provide a message if you need to use the photo library"), "", false, true));
  429. r_options->push_back(ExportOption(PropertyInfo(Variant::DICTIONARY, "privacy/photos_library_usage_description_localized", PROPERTY_HINT_LOCALIZABLE_STRING), Dictionary()));
  430. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "privacy/desktop_folder_usage_description", PROPERTY_HINT_PLACEHOLDER_TEXT, "Provide a message if you need to use Desktop folder"), "", false, true));
  431. r_options->push_back(ExportOption(PropertyInfo(Variant::DICTIONARY, "privacy/desktop_folder_usage_description_localized", PROPERTY_HINT_LOCALIZABLE_STRING), Dictionary()));
  432. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "privacy/documents_folder_usage_description", PROPERTY_HINT_PLACEHOLDER_TEXT, "Provide a message if you need to use Documents folder"), "", false, true));
  433. r_options->push_back(ExportOption(PropertyInfo(Variant::DICTIONARY, "privacy/documents_folder_usage_description_localized", PROPERTY_HINT_LOCALIZABLE_STRING), Dictionary()));
  434. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "privacy/downloads_folder_usage_description", PROPERTY_HINT_PLACEHOLDER_TEXT, "Provide a message if you need to use Downloads folder"), "", false, true));
  435. r_options->push_back(ExportOption(PropertyInfo(Variant::DICTIONARY, "privacy/downloads_folder_usage_description_localized", PROPERTY_HINT_LOCALIZABLE_STRING), Dictionary()));
  436. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "privacy/network_volumes_usage_description", PROPERTY_HINT_PLACEHOLDER_TEXT, "Provide a message if you need to use network volumes"), "", false, true));
  437. r_options->push_back(ExportOption(PropertyInfo(Variant::DICTIONARY, "privacy/network_volumes_usage_description_localized", PROPERTY_HINT_LOCALIZABLE_STRING), Dictionary()));
  438. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "privacy/removable_volumes_usage_description", PROPERTY_HINT_PLACEHOLDER_TEXT, "Provide a message if you need to use removable volumes"), "", false, true));
  439. r_options->push_back(ExportOption(PropertyInfo(Variant::DICTIONARY, "privacy/removable_volumes_usage_description_localized", PROPERTY_HINT_LOCALIZABLE_STRING), Dictionary()));
  440. String run_script = "#!/usr/bin/env bash\n"
  441. "unzip -o -q \"{temp_dir}/{archive_name}\" -d \"{temp_dir}\"\n"
  442. "open \"{temp_dir}/{exe_name}.app\" --args {cmd_args}";
  443. String cleanup_script = "#!/usr/bin/env bash\n"
  444. "kill $(pgrep -x -f \"{temp_dir}/{exe_name}.app/Contents/MacOS/{exe_name} {cmd_args}\")\n"
  445. "rm -rf \"{temp_dir}\"";
  446. r_options->push_back(ExportOption(PropertyInfo(Variant::BOOL, "ssh_remote_deploy/enabled"), false, true));
  447. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "ssh_remote_deploy/host"), "user@host_ip"));
  448. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "ssh_remote_deploy/port"), "22"));
  449. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "ssh_remote_deploy/extra_args_ssh", PROPERTY_HINT_MULTILINE_TEXT), ""));
  450. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "ssh_remote_deploy/extra_args_scp", PROPERTY_HINT_MULTILINE_TEXT), ""));
  451. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "ssh_remote_deploy/run_script", PROPERTY_HINT_MULTILINE_TEXT), run_script));
  452. r_options->push_back(ExportOption(PropertyInfo(Variant::STRING, "ssh_remote_deploy/cleanup_script", PROPERTY_HINT_MULTILINE_TEXT), cleanup_script));
  453. }
  454. void _rgba8_to_packbits_encode(int p_ch, int p_size, Vector<uint8_t> &p_source, Vector<uint8_t> &p_dest) {
  455. int src_len = p_size * p_size;
  456. Vector<uint8_t> result;
  457. result.resize(src_len * 1.25); //temp vector for rle encoded data, make it 25% larger for worst case scenario
  458. int res_size = 0;
  459. uint8_t buf[128];
  460. int buf_size = 0;
  461. int i = 0;
  462. while (i < src_len) {
  463. uint8_t cur = p_source.ptr()[i * 4 + p_ch];
  464. if (i < src_len - 2) {
  465. if ((p_source.ptr()[(i + 1) * 4 + p_ch] == cur) && (p_source.ptr()[(i + 2) * 4 + p_ch] == cur)) {
  466. if (buf_size > 0) {
  467. result.write[res_size++] = (uint8_t)(buf_size - 1);
  468. memcpy(&result.write[res_size], &buf, buf_size);
  469. res_size += buf_size;
  470. buf_size = 0;
  471. }
  472. uint8_t lim = i + 130 >= src_len ? src_len - i - 1 : 130;
  473. bool hit_lim = true;
  474. for (int j = 3; j <= lim; j++) {
  475. if (p_source.ptr()[(i + j) * 4 + p_ch] != cur) {
  476. hit_lim = false;
  477. i = i + j - 1;
  478. result.write[res_size++] = (uint8_t)(j - 3 + 0x80);
  479. result.write[res_size++] = cur;
  480. break;
  481. }
  482. }
  483. if (hit_lim) {
  484. result.write[res_size++] = (uint8_t)(lim - 3 + 0x80);
  485. result.write[res_size++] = cur;
  486. i = i + lim;
  487. }
  488. } else {
  489. buf[buf_size++] = cur;
  490. if (buf_size == 128) {
  491. result.write[res_size++] = (uint8_t)(buf_size - 1);
  492. memcpy(&result.write[res_size], &buf, buf_size);
  493. res_size += buf_size;
  494. buf_size = 0;
  495. }
  496. }
  497. } else {
  498. buf[buf_size++] = cur;
  499. result.write[res_size++] = (uint8_t)(buf_size - 1);
  500. memcpy(&result.write[res_size], &buf, buf_size);
  501. res_size += buf_size;
  502. buf_size = 0;
  503. }
  504. i++;
  505. }
  506. int ofs = p_dest.size();
  507. p_dest.resize(p_dest.size() + res_size);
  508. memcpy(&p_dest.write[ofs], result.ptr(), res_size);
  509. }
  510. void EditorExportPlatformMacOS::_make_icon(const Ref<EditorExportPreset> &p_preset, const Ref<Image> &p_icon, Vector<uint8_t> &p_data) {
  511. Vector<uint8_t> data;
  512. data.resize(8);
  513. data.write[0] = 'i';
  514. data.write[1] = 'c';
  515. data.write[2] = 'n';
  516. data.write[3] = 's';
  517. struct MacOSIconInfo {
  518. const char *name;
  519. const char *mask_name;
  520. bool is_png;
  521. int size;
  522. };
  523. static const MacOSIconInfo icon_infos[] = {
  524. { "ic10", "", true, 1024 }, //1024×1024 32-bit PNG and 512×512@2x 32-bit "retina" PNG
  525. { "ic09", "", true, 512 }, //512×512 32-bit PNG
  526. { "ic14", "", true, 512 }, //256×256@2x 32-bit "retina" PNG
  527. { "ic08", "", true, 256 }, //256×256 32-bit PNG
  528. { "ic13", "", true, 256 }, //128×128@2x 32-bit "retina" PNG
  529. { "ic07", "", true, 128 }, //128×128 32-bit PNG
  530. { "ic12", "", true, 64 }, //32×32@2× 32-bit "retina" PNG
  531. { "ic11", "", true, 32 }, //16×16@2× 32-bit "retina" PNG
  532. { "il32", "l8mk", false, 32 }, //32×32 24-bit RLE + 8-bit uncompressed mask
  533. { "is32", "s8mk", false, 16 } //16×16 24-bit RLE + 8-bit uncompressed mask
  534. };
  535. for (uint64_t i = 0; i < (sizeof(icon_infos) / sizeof(icon_infos[0])); ++i) {
  536. Ref<Image> copy = p_icon->duplicate();
  537. copy->convert(Image::FORMAT_RGBA8);
  538. copy->resize(icon_infos[i].size, icon_infos[i].size, (Image::Interpolation)(p_preset->get("application/icon_interpolation").operator int()));
  539. if (icon_infos[i].is_png) {
  540. // Encode PNG icon.
  541. Vector<uint8_t> png_buffer;
  542. Error err = PNGDriverCommon::image_to_png(copy, png_buffer);
  543. if (err == OK) {
  544. int ofs = data.size();
  545. uint64_t len = png_buffer.size();
  546. data.resize(data.size() + len + 8);
  547. memcpy(&data.write[ofs + 8], png_buffer.ptr(), len);
  548. len += 8;
  549. len = BSWAP32(len);
  550. memcpy(&data.write[ofs], icon_infos[i].name, 4);
  551. encode_uint32(len, &data.write[ofs + 4]);
  552. }
  553. } else {
  554. Vector<uint8_t> src_data = copy->get_data();
  555. // Encode 24-bit RGB RLE icon.
  556. {
  557. int ofs = data.size();
  558. data.resize(data.size() + 8);
  559. _rgba8_to_packbits_encode(0, icon_infos[i].size, src_data, data); // Encode R.
  560. _rgba8_to_packbits_encode(1, icon_infos[i].size, src_data, data); // Encode G.
  561. _rgba8_to_packbits_encode(2, icon_infos[i].size, src_data, data); // Encode B.
  562. int len = data.size() - ofs;
  563. len = BSWAP32(len);
  564. memcpy(&data.write[ofs], icon_infos[i].name, 4);
  565. encode_uint32(len, &data.write[ofs + 4]);
  566. }
  567. // Encode 8-bit mask uncompressed icon.
  568. {
  569. int ofs = data.size();
  570. int len = copy->get_width() * copy->get_height();
  571. data.resize(data.size() + len + 8);
  572. for (int j = 0; j < len; j++) {
  573. data.write[ofs + 8 + j] = src_data.ptr()[j * 4 + 3];
  574. }
  575. len += 8;
  576. len = BSWAP32(len);
  577. memcpy(&data.write[ofs], icon_infos[i].mask_name, 4);
  578. encode_uint32(len, &data.write[ofs + 4]);
  579. }
  580. }
  581. }
  582. uint32_t total_len = data.size();
  583. total_len = BSWAP32(total_len);
  584. encode_uint32(total_len, &data.write[4]);
  585. p_data = data;
  586. }
  587. void EditorExportPlatformMacOS::_fix_plist(const Ref<EditorExportPreset> &p_preset, Vector<uint8_t> &plist, const String &p_binary) {
  588. String str;
  589. String strnew;
  590. str.parse_utf8((const char *)plist.ptr(), plist.size());
  591. Vector<String> lines = str.split("\n");
  592. for (int i = 0; i < lines.size(); i++) {
  593. if (lines[i].find("$binary") != -1) {
  594. strnew += lines[i].replace("$binary", p_binary) + "\n";
  595. } else if (lines[i].find("$name") != -1) {
  596. strnew += lines[i].replace("$name", GLOBAL_GET("application/config/name")) + "\n";
  597. } else if (lines[i].find("$bundle_identifier") != -1) {
  598. strnew += lines[i].replace("$bundle_identifier", p_preset->get("application/bundle_identifier")) + "\n";
  599. } else if (lines[i].find("$short_version") != -1) {
  600. strnew += lines[i].replace("$short_version", p_preset->get_version("application/short_version")) + "\n";
  601. } else if (lines[i].find("$version") != -1) {
  602. strnew += lines[i].replace("$version", p_preset->get_version("application/version")) + "\n";
  603. } else if (lines[i].find("$signature") != -1) {
  604. strnew += lines[i].replace("$signature", p_preset->get("application/signature")) + "\n";
  605. } else if (lines[i].find("$app_category") != -1) {
  606. String cat = p_preset->get("application/app_category");
  607. strnew += lines[i].replace("$app_category", cat.to_lower()) + "\n";
  608. } else if (lines[i].find("$copyright") != -1) {
  609. strnew += lines[i].replace("$copyright", p_preset->get("application/copyright")) + "\n";
  610. } else if (lines[i].find("$min_version") != -1) {
  611. strnew += lines[i].replace("$min_version", p_preset->get("application/min_macos_version")) + "\n";
  612. } else if (lines[i].find("$highres") != -1) {
  613. strnew += lines[i].replace("$highres", p_preset->get("display/high_res") ? "\t<true/>" : "\t<false/>") + "\n";
  614. } else if (lines[i].find("$additional_plist_content") != -1) {
  615. strnew += lines[i].replace("$additional_plist_content", p_preset->get("application/additional_plist_content")) + "\n";
  616. } else if (lines[i].find("$platfbuild") != -1) {
  617. strnew += lines[i].replace("$platfbuild", p_preset->get("xcode/platform_build")) + "\n";
  618. } else if (lines[i].find("$sdkver") != -1) {
  619. strnew += lines[i].replace("$sdkver", p_preset->get("xcode/sdk_version")) + "\n";
  620. } else if (lines[i].find("$sdkname") != -1) {
  621. strnew += lines[i].replace("$sdkname", p_preset->get("xcode/sdk_name")) + "\n";
  622. } else if (lines[i].find("$sdkbuild") != -1) {
  623. strnew += lines[i].replace("$sdkbuild", p_preset->get("xcode/sdk_build")) + "\n";
  624. } else if (lines[i].find("$xcodever") != -1) {
  625. strnew += lines[i].replace("$xcodever", p_preset->get("xcode/xcode_version")) + "\n";
  626. } else if (lines[i].find("$xcodebuild") != -1) {
  627. strnew += lines[i].replace("$xcodebuild", p_preset->get("xcode/xcode_build")) + "\n";
  628. } else if (lines[i].find("$usage_descriptions") != -1) {
  629. String descriptions;
  630. if (!((String)p_preset->get("privacy/microphone_usage_description")).is_empty()) {
  631. descriptions += "\t<key>NSMicrophoneUsageDescription</key>\n";
  632. descriptions += "\t<string>" + (String)p_preset->get("privacy/microphone_usage_description") + "</string>\n";
  633. }
  634. if (!((String)p_preset->get("privacy/camera_usage_description")).is_empty()) {
  635. descriptions += "\t<key>NSCameraUsageDescription</key>\n";
  636. descriptions += "\t<string>" + (String)p_preset->get("privacy/camera_usage_description") + "</string>\n";
  637. }
  638. if (!((String)p_preset->get("privacy/location_usage_description")).is_empty()) {
  639. descriptions += "\t<key>NSLocationUsageDescription</key>\n";
  640. descriptions += "\t<string>" + (String)p_preset->get("privacy/location_usage_description") + "</string>\n";
  641. }
  642. if (!((String)p_preset->get("privacy/address_book_usage_description")).is_empty()) {
  643. descriptions += "\t<key>NSContactsUsageDescription</key>\n";
  644. descriptions += "\t<string>" + (String)p_preset->get("privacy/address_book_usage_description") + "</string>\n";
  645. }
  646. if (!((String)p_preset->get("privacy/calendar_usage_description")).is_empty()) {
  647. descriptions += "\t<key>NSCalendarsUsageDescription</key>\n";
  648. descriptions += "\t<string>" + (String)p_preset->get("privacy/calendar_usage_description") + "</string>\n";
  649. }
  650. if (!((String)p_preset->get("privacy/photos_library_usage_description")).is_empty()) {
  651. descriptions += "\t<key>NSPhotoLibraryUsageDescription</key>\n";
  652. descriptions += "\t<string>" + (String)p_preset->get("privacy/photos_library_usage_description") + "</string>\n";
  653. }
  654. if (!((String)p_preset->get("privacy/desktop_folder_usage_description")).is_empty()) {
  655. descriptions += "\t<key>NSDesktopFolderUsageDescription</key>\n";
  656. descriptions += "\t<string>" + (String)p_preset->get("privacy/desktop_folder_usage_description") + "</string>\n";
  657. }
  658. if (!((String)p_preset->get("privacy/documents_folder_usage_description")).is_empty()) {
  659. descriptions += "\t<key>NSDocumentsFolderUsageDescription</key>\n";
  660. descriptions += "\t<string>" + (String)p_preset->get("privacy/documents_folder_usage_description") + "</string>\n";
  661. }
  662. if (!((String)p_preset->get("privacy/downloads_folder_usage_description")).is_empty()) {
  663. descriptions += "\t<key>NSDownloadsFolderUsageDescription</key>\n";
  664. descriptions += "\t<string>" + (String)p_preset->get("privacy/downloads_folder_usage_description") + "</string>\n";
  665. }
  666. if (!((String)p_preset->get("privacy/network_volumes_usage_description")).is_empty()) {
  667. descriptions += "\t<key>NSNetworkVolumesUsageDescription</key>\n";
  668. descriptions += "\t<string>" + (String)p_preset->get("privacy/network_volumes_usage_description") + "</string>\n";
  669. }
  670. if (!((String)p_preset->get("privacy/removable_volumes_usage_description")).is_empty()) {
  671. descriptions += "\t<key>NSRemovableVolumesUsageDescription</key>\n";
  672. descriptions += "\t<string>" + (String)p_preset->get("privacy/removable_volumes_usage_description") + "</string>\n";
  673. }
  674. if (!descriptions.is_empty()) {
  675. strnew += lines[i].replace("$usage_descriptions", descriptions);
  676. }
  677. } else {
  678. strnew += lines[i] + "\n";
  679. }
  680. }
  681. CharString cs = strnew.utf8();
  682. plist.resize(cs.size() - 1);
  683. for (int i = 0; i < cs.size() - 1; i++) {
  684. plist.write[i] = cs[i];
  685. }
  686. }
  687. /**
  688. * If we're running the macOS version of the Godot editor we'll:
  689. * - export our application bundle to a temporary folder
  690. * - attempt to code sign it
  691. * - and then wrap it up in a DMG
  692. */
  693. Error EditorExportPlatformMacOS::_notarize(const Ref<EditorExportPreset> &p_preset, const String &p_path) {
  694. int notary_tool = p_preset->get("notarization/notarization");
  695. switch (notary_tool) {
  696. case 1: { // "rcodesign"
  697. print_verbose("using rcodesign notarization...");
  698. String rcodesign = EDITOR_GET("export/macos/rcodesign").operator String();
  699. if (rcodesign.is_empty()) {
  700. add_message(EXPORT_MESSAGE_ERROR, TTR("Notarization"), TTR("rcodesign path is not set. Configure rcodesign path in the Editor Settings (Export > macOS > rcodesign)."));
  701. return Error::FAILED;
  702. }
  703. List<String> args;
  704. args.push_back("notary-submit");
  705. if (p_preset->get_or_env("notarization/api_uuid", ENV_MAC_NOTARIZATION_UUID) == "") {
  706. add_message(EXPORT_MESSAGE_ERROR, TTR("Notarization"), TTR("App Store Connect issuer ID name not specified."));
  707. return Error::FAILED;
  708. }
  709. if (p_preset->get_or_env("notarization/api_key", ENV_MAC_NOTARIZATION_KEY) == "") {
  710. add_message(EXPORT_MESSAGE_ERROR, TTR("Notarization"), TTR("App Store Connect API key ID not specified."));
  711. return Error::FAILED;
  712. }
  713. args.push_back("--api-issuer");
  714. args.push_back(p_preset->get_or_env("notarization/api_uuid", ENV_MAC_NOTARIZATION_UUID));
  715. args.push_back("--api-key");
  716. args.push_back(p_preset->get_or_env("notarization/api_key_id", ENV_MAC_NOTARIZATION_KEY_ID));
  717. if (!p_preset->get_or_env("notarization/api_key", ENV_MAC_NOTARIZATION_KEY).operator String().is_empty()) {
  718. args.push_back("--api-key-path");
  719. args.push_back(p_preset->get_or_env("notarization/api_key", ENV_MAC_NOTARIZATION_KEY));
  720. }
  721. args.push_back(p_path);
  722. String str;
  723. int exitcode = 0;
  724. Error err = OS::get_singleton()->execute(rcodesign, args, &str, &exitcode, true);
  725. if (err != OK) {
  726. add_message(EXPORT_MESSAGE_WARNING, TTR("Notarization"), TTR("Could not start rcodesign executable."));
  727. return err;
  728. }
  729. int rq_offset = str.find("created submission ID:");
  730. if (exitcode != 0 || rq_offset == -1) {
  731. print_line("rcodesign (" + p_path + "):\n" + str);
  732. add_message(EXPORT_MESSAGE_WARNING, TTR("Notarization"), TTR("Notarization failed, see editor log for details."));
  733. return Error::FAILED;
  734. } else {
  735. print_verbose("rcodesign (" + p_path + "):\n" + str);
  736. int next_nl = str.find("\n", rq_offset);
  737. String request_uuid = (next_nl == -1) ? str.substr(rq_offset + 23, -1) : str.substr(rq_offset + 23, next_nl - rq_offset - 23);
  738. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), vformat(TTR("Notarization request UUID: \"%s\""), request_uuid));
  739. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), TTR("The notarization process generally takes less than an hour."));
  740. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), "\t" + TTR("You can check progress manually by opening a Terminal and running the following command:"));
  741. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), "\t\t\"rcodesign notary-log --api-issuer <api uuid> --api-key <api key> <request uuid>\"");
  742. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), "\t" + TTR("Run the following command to staple the notarization ticket to the exported application (optional):"));
  743. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), "\t\t\"rcodesign staple <app path>\"");
  744. }
  745. } break;
  746. #ifdef MACOS_ENABLED
  747. case 2: { // "notarytool"
  748. print_verbose("using notarytool notarization...");
  749. if (!FileAccess::exists("/usr/bin/xcrun") && !FileAccess::exists("/bin/xcrun")) {
  750. add_message(EXPORT_MESSAGE_ERROR, TTR("Notarization"), TTR("Xcode command line tools are not installed."));
  751. return Error::FAILED;
  752. }
  753. List<String> args;
  754. args.push_back("notarytool");
  755. args.push_back("submit");
  756. args.push_back(p_path);
  757. if (p_preset->get_or_env("notarization/apple_id_name", ENV_MAC_NOTARIZATION_APPLE_ID) == "" && p_preset->get_or_env("notarization/api_uuid", ENV_MAC_NOTARIZATION_UUID) == "") {
  758. add_message(EXPORT_MESSAGE_ERROR, TTR("Notarization"), TTR("Neither Apple ID name nor App Store Connect issuer ID name not specified."));
  759. return Error::FAILED;
  760. }
  761. if (p_preset->get_or_env("notarization/apple_id_name", ENV_MAC_NOTARIZATION_APPLE_ID) != "" && p_preset->get_or_env("notarization/api_uuid", ENV_MAC_NOTARIZATION_UUID) != "") {
  762. add_message(EXPORT_MESSAGE_ERROR, TTR("Notarization"), TTR("Both Apple ID name and App Store Connect issuer ID name are specified, only one should be set at the same time."));
  763. return Error::FAILED;
  764. }
  765. if (p_preset->get_or_env("notarization/apple_id_name", ENV_MAC_NOTARIZATION_APPLE_ID) != "") {
  766. if (p_preset->get_or_env("notarization/apple_id_password", ENV_MAC_NOTARIZATION_APPLE_PASS) == "") {
  767. add_message(EXPORT_MESSAGE_ERROR, TTR("Notarization"), TTR("Apple ID password not specified."));
  768. return Error::FAILED;
  769. }
  770. args.push_back("--apple-id");
  771. args.push_back(p_preset->get_or_env("notarization/apple_id_name", ENV_MAC_NOTARIZATION_APPLE_ID));
  772. args.push_back("--password");
  773. args.push_back(p_preset->get_or_env("notarization/apple_id_password", ENV_MAC_NOTARIZATION_APPLE_PASS));
  774. } else {
  775. if (p_preset->get_or_env("notarization/api_key_id", ENV_MAC_NOTARIZATION_KEY_ID) == "") {
  776. add_message(EXPORT_MESSAGE_ERROR, TTR("Notarization"), TTR("App Store Connect API key ID not specified."));
  777. return Error::FAILED;
  778. }
  779. args.push_back("--issuer");
  780. args.push_back(p_preset->get_or_env("notarization/api_uuid", ENV_MAC_NOTARIZATION_UUID));
  781. if (!p_preset->get_or_env("notarization/api_key", ENV_MAC_NOTARIZATION_KEY).operator String().is_empty()) {
  782. args.push_back("--key");
  783. args.push_back(p_preset->get_or_env("notarization/api_key", ENV_MAC_NOTARIZATION_KEY));
  784. }
  785. args.push_back("--key-id");
  786. args.push_back(p_preset->get_or_env("notarization/api_key_id", ENV_MAC_NOTARIZATION_KEY_ID));
  787. }
  788. args.push_back("--no-progress");
  789. if (p_preset->get("codesign/apple_team_id")) {
  790. args.push_back("--team-id");
  791. args.push_back(p_preset->get("codesign/apple_team_id"));
  792. }
  793. String str;
  794. int exitcode = 0;
  795. Error err = OS::get_singleton()->execute("xcrun", args, &str, &exitcode, true);
  796. if (err != OK) {
  797. add_message(EXPORT_MESSAGE_WARNING, TTR("Notarization"), TTR("Could not start xcrun executable."));
  798. return err;
  799. }
  800. int rq_offset = str.find("id:");
  801. if (exitcode != 0 || rq_offset == -1) {
  802. print_line("notarytool (" + p_path + "):\n" + str);
  803. add_message(EXPORT_MESSAGE_WARNING, TTR("Notarization"), TTR("Notarization failed, see editor log for details."));
  804. return Error::FAILED;
  805. } else {
  806. print_verbose("notarytool (" + p_path + "):\n" + str);
  807. int next_nl = str.find("\n", rq_offset);
  808. String request_uuid = (next_nl == -1) ? str.substr(rq_offset + 4, -1) : str.substr(rq_offset + 4, next_nl - rq_offset - 4);
  809. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), vformat(TTR("Notarization request UUID: \"%s\""), request_uuid));
  810. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), TTR("The notarization process generally takes less than an hour."));
  811. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), "\t" + TTR("You can check progress manually by opening a Terminal and running the following command:"));
  812. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), "\t\t\"xcrun notarytool log <request uuid> --issuer <api uuid> --key-id <api key id> --key <api key path>\" or");
  813. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), "\t\t\"xcrun notarytool log <request uuid> --apple-id <your email> --password <app-specific pwd>>\"");
  814. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), "\t" + TTR("Run the following command to staple the notarization ticket to the exported application (optional):"));
  815. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), "\t\t\"xcrun stapler staple <app path>\"");
  816. }
  817. } break;
  818. #endif
  819. default: {
  820. };
  821. }
  822. return OK;
  823. }
  824. Error EditorExportPlatformMacOS::_code_sign(const Ref<EditorExportPreset> &p_preset, const String &p_path, const String &p_ent_path, bool p_warn) {
  825. int codesign_tool = p_preset->get("codesign/codesign");
  826. switch (codesign_tool) {
  827. case 1: { // built-in ad-hoc
  828. print_verbose("using built-in codesign...");
  829. #ifdef MODULE_REGEX_ENABLED
  830. String error_msg;
  831. Error err = CodeSign::codesign(false, true, p_path, p_ent_path, error_msg);
  832. if (err != OK) {
  833. add_message(EXPORT_MESSAGE_WARNING, TTR("Code Signing"), vformat(TTR("Built-in CodeSign failed with error \"%s\"."), error_msg));
  834. return Error::FAILED;
  835. }
  836. #else
  837. add_message(EXPORT_MESSAGE_WARNING, TTR("Code Signing"), TTR("Built-in CodeSign require regex module."));
  838. #endif
  839. } break;
  840. case 2: { // "rcodesign"
  841. print_verbose("using rcodesign codesign...");
  842. String rcodesign = EDITOR_GET("export/macos/rcodesign").operator String();
  843. if (rcodesign.is_empty()) {
  844. add_message(EXPORT_MESSAGE_ERROR, TTR("Code Signing"), TTR("Xrcodesign path is not set. Configure rcodesign path in the Editor Settings (Export > macOS > rcodesign)."));
  845. return Error::FAILED;
  846. }
  847. List<String> args;
  848. args.push_back("sign");
  849. if (p_path.get_extension() != "dmg") {
  850. args.push_back("--entitlements-xml-path");
  851. args.push_back(p_ent_path);
  852. }
  853. String certificate_file = p_preset->get_or_env("codesign/certificate_file", ENV_MAC_CODESIGN_CERT_FILE);
  854. String certificate_pass = p_preset->get_or_env("codesign/certificate_password", ENV_MAC_CODESIGN_CERT_PASS);
  855. if (!certificate_file.is_empty() && !certificate_pass.is_empty()) {
  856. args.push_back("--p12-file");
  857. args.push_back(certificate_file);
  858. args.push_back("--p12-password");
  859. args.push_back(certificate_pass);
  860. }
  861. args.push_back("--code-signature-flags");
  862. args.push_back("runtime");
  863. args.push_back("-v"); /* provide some more feedback */
  864. args.push_back(p_path);
  865. String str;
  866. int exitcode = 0;
  867. Error err = OS::get_singleton()->execute(rcodesign, args, &str, &exitcode, true);
  868. if (err != OK) {
  869. add_message(EXPORT_MESSAGE_WARNING, TTR("Code Signing"), TTR("Could not start rcodesign executable."));
  870. return err;
  871. }
  872. if (exitcode != 0) {
  873. print_line("rcodesign (" + p_path + "):\n" + str);
  874. add_message(EXPORT_MESSAGE_WARNING, TTR("Code Signing"), TTR("Code signing failed, see editor log for details."));
  875. return Error::FAILED;
  876. } else {
  877. print_verbose("rcodesign (" + p_path + "):\n" + str);
  878. }
  879. } break;
  880. #ifdef MACOS_ENABLED
  881. case 3: { // "codesign"
  882. print_verbose("using xcode codesign...");
  883. if (!FileAccess::exists("/usr/bin/codesign") && !FileAccess::exists("/bin/codesign")) {
  884. add_message(EXPORT_MESSAGE_ERROR, TTR("Code Signing"), TTR("Xcode command line tools are not installed."));
  885. return Error::FAILED;
  886. }
  887. bool ad_hoc = (p_preset->get("codesign/identity") == "" || p_preset->get("codesign/identity") == "-");
  888. List<String> args;
  889. if (!ad_hoc) {
  890. args.push_back("--timestamp");
  891. args.push_back("--options");
  892. args.push_back("runtime");
  893. }
  894. if (p_path.get_extension() != "dmg") {
  895. args.push_back("--entitlements");
  896. args.push_back(p_ent_path);
  897. }
  898. PackedStringArray user_args = p_preset->get("codesign/custom_options");
  899. for (int i = 0; i < user_args.size(); i++) {
  900. String user_arg = user_args[i].strip_edges();
  901. if (!user_arg.is_empty()) {
  902. args.push_back(user_arg);
  903. }
  904. }
  905. args.push_back("-s");
  906. if (ad_hoc) {
  907. args.push_back("-");
  908. } else {
  909. args.push_back(p_preset->get("codesign/identity"));
  910. }
  911. args.push_back("-v"); /* provide some more feedback */
  912. args.push_back("-f");
  913. args.push_back(p_path);
  914. String str;
  915. int exitcode = 0;
  916. Error err = OS::get_singleton()->execute("codesign", args, &str, &exitcode, true);
  917. if (err != OK) {
  918. add_message(EXPORT_MESSAGE_WARNING, TTR("Code Signing"), TTR("Could not start codesign executable, make sure Xcode command line tools are installed."));
  919. return err;
  920. }
  921. if (exitcode != 0) {
  922. print_line("codesign (" + p_path + "):\n" + str);
  923. add_message(EXPORT_MESSAGE_WARNING, TTR("Code Signing"), TTR("Code signing failed, see editor log for details."));
  924. return Error::FAILED;
  925. } else {
  926. print_verbose("codesign (" + p_path + "):\n" + str);
  927. }
  928. } break;
  929. #endif
  930. default: {
  931. };
  932. }
  933. return OK;
  934. }
  935. Error EditorExportPlatformMacOS::_code_sign_directory(const Ref<EditorExportPreset> &p_preset, const String &p_path,
  936. const String &p_ent_path, bool p_should_error_on_non_code) {
  937. static Vector<String> extensions_to_sign;
  938. if (extensions_to_sign.is_empty()) {
  939. extensions_to_sign.push_back("dylib");
  940. extensions_to_sign.push_back("framework");
  941. extensions_to_sign.push_back("");
  942. }
  943. Error dir_access_error;
  944. Ref<DirAccess> dir_access{ DirAccess::open(p_path, &dir_access_error) };
  945. if (dir_access_error != OK) {
  946. return dir_access_error;
  947. }
  948. dir_access->list_dir_begin();
  949. String current_file{ dir_access->get_next() };
  950. while (!current_file.is_empty()) {
  951. String current_file_path{ p_path.path_join(current_file) };
  952. if (current_file == ".." || current_file == ".") {
  953. current_file = dir_access->get_next();
  954. continue;
  955. }
  956. if (extensions_to_sign.find(current_file.get_extension()) > -1) {
  957. Error code_sign_error{ _code_sign(p_preset, current_file_path, p_ent_path, false) };
  958. if (code_sign_error != OK) {
  959. return code_sign_error;
  960. }
  961. if (is_executable(current_file_path)) {
  962. // chmod with 0755 if the file is executable.
  963. FileAccess::set_unix_permissions(current_file_path, 0755);
  964. }
  965. } else if (dir_access->current_is_dir()) {
  966. Error code_sign_error{ _code_sign_directory(p_preset, current_file_path, p_ent_path, p_should_error_on_non_code) };
  967. if (code_sign_error != OK) {
  968. return code_sign_error;
  969. }
  970. } else if (p_should_error_on_non_code) {
  971. add_message(EXPORT_MESSAGE_WARNING, TTR("Code Signing"), vformat(TTR("Cannot sign file %s."), current_file));
  972. return Error::FAILED;
  973. }
  974. current_file = dir_access->get_next();
  975. }
  976. return OK;
  977. }
  978. Error EditorExportPlatformMacOS::_copy_and_sign_files(Ref<DirAccess> &dir_access, const String &p_src_path,
  979. const String &p_in_app_path, bool p_sign_enabled,
  980. const Ref<EditorExportPreset> &p_preset, const String &p_ent_path,
  981. bool p_should_error_on_non_code_sign) {
  982. static Vector<String> extensions_to_sign;
  983. if (extensions_to_sign.is_empty()) {
  984. extensions_to_sign.push_back("dylib");
  985. extensions_to_sign.push_back("framework");
  986. extensions_to_sign.push_back("");
  987. }
  988. Error err{ OK };
  989. if (dir_access->dir_exists(p_src_path)) {
  990. #ifndef UNIX_ENABLED
  991. add_message(EXPORT_MESSAGE_INFO, TTR("Export"), vformat(TTR("Relative symlinks are not supported, exported \"%s\" might be broken!"), p_src_path.get_file()));
  992. #endif
  993. print_verbose("export framework: " + p_src_path + " -> " + p_in_app_path);
  994. err = dir_access->make_dir_recursive(p_in_app_path);
  995. if (err == OK) {
  996. err = dir_access->copy_dir(p_src_path, p_in_app_path, -1, true);
  997. }
  998. } else {
  999. print_verbose("export dylib: " + p_src_path + " -> " + p_in_app_path);
  1000. err = dir_access->copy(p_src_path, p_in_app_path);
  1001. }
  1002. if (err == OK && p_sign_enabled) {
  1003. if (dir_access->dir_exists(p_src_path) && p_src_path.get_extension().is_empty()) {
  1004. // If it is a directory, find and sign all dynamic libraries.
  1005. err = _code_sign_directory(p_preset, p_in_app_path, p_ent_path, p_should_error_on_non_code_sign);
  1006. } else {
  1007. if (extensions_to_sign.find(p_in_app_path.get_extension()) > -1) {
  1008. err = _code_sign(p_preset, p_in_app_path, p_ent_path, false);
  1009. }
  1010. if (dir_access->file_exists(p_in_app_path) && is_executable(p_in_app_path)) {
  1011. // chmod with 0755 if the file is executable.
  1012. FileAccess::set_unix_permissions(p_in_app_path, 0755);
  1013. }
  1014. }
  1015. }
  1016. return err;
  1017. }
  1018. Error EditorExportPlatformMacOS::_export_macos_plugins_for(Ref<EditorExportPlugin> p_editor_export_plugin,
  1019. const String &p_app_path_name, Ref<DirAccess> &dir_access,
  1020. bool p_sign_enabled, const Ref<EditorExportPreset> &p_preset,
  1021. const String &p_ent_path) {
  1022. Error error{ OK };
  1023. const Vector<String> &macos_plugins{ p_editor_export_plugin->get_macos_plugin_files() };
  1024. for (int i = 0; i < macos_plugins.size(); ++i) {
  1025. String src_path{ ProjectSettings::get_singleton()->globalize_path(macos_plugins[i]) };
  1026. String path_in_app{ p_app_path_name + "/Contents/PlugIns/" + src_path.get_file() };
  1027. error = _copy_and_sign_files(dir_access, src_path, path_in_app, p_sign_enabled, p_preset, p_ent_path, false);
  1028. if (error != OK) {
  1029. break;
  1030. }
  1031. }
  1032. return error;
  1033. }
  1034. Error EditorExportPlatformMacOS::_create_pkg(const Ref<EditorExportPreset> &p_preset, const String &p_pkg_path, const String &p_app_path_name) {
  1035. List<String> args;
  1036. if (FileAccess::exists(p_pkg_path)) {
  1037. OS::get_singleton()->move_to_trash(p_pkg_path);
  1038. }
  1039. args.push_back("productbuild");
  1040. args.push_back("--component");
  1041. args.push_back(p_app_path_name);
  1042. args.push_back("/Applications");
  1043. String ident = p_preset->get("codesign/installer_identity");
  1044. if (!ident.is_empty()) {
  1045. args.push_back("--timestamp");
  1046. args.push_back("--sign");
  1047. args.push_back(ident);
  1048. }
  1049. args.push_back("--quiet");
  1050. args.push_back(p_pkg_path);
  1051. String str;
  1052. Error err = OS::get_singleton()->execute("xcrun", args, &str, nullptr, true);
  1053. if (err != OK) {
  1054. add_message(EXPORT_MESSAGE_ERROR, TTR("PKG Creation"), TTR("Could not start productbuild executable."));
  1055. return err;
  1056. }
  1057. print_verbose("productbuild returned: " + str);
  1058. if (str.find("productbuild: error:") != -1) {
  1059. add_message(EXPORT_MESSAGE_ERROR, TTR("PKG Creation"), TTR("`productbuild` failed."));
  1060. return FAILED;
  1061. }
  1062. return OK;
  1063. }
  1064. Error EditorExportPlatformMacOS::_create_dmg(const String &p_dmg_path, const String &p_pkg_name, const String &p_app_path_name) {
  1065. List<String> args;
  1066. if (FileAccess::exists(p_dmg_path)) {
  1067. OS::get_singleton()->move_to_trash(p_dmg_path);
  1068. }
  1069. args.push_back("create");
  1070. args.push_back(p_dmg_path);
  1071. args.push_back("-volname");
  1072. args.push_back(p_pkg_name);
  1073. args.push_back("-fs");
  1074. args.push_back("HFS+");
  1075. args.push_back("-srcfolder");
  1076. args.push_back(p_app_path_name);
  1077. String str;
  1078. Error err = OS::get_singleton()->execute("hdiutil", args, &str, nullptr, true);
  1079. if (err != OK) {
  1080. add_message(EXPORT_MESSAGE_ERROR, TTR("DMG Creation"), TTR("Could not start hdiutil executable."));
  1081. return err;
  1082. }
  1083. print_verbose("hdiutil returned: " + str);
  1084. if (str.find("create failed") != -1) {
  1085. if (str.find("File exists") != -1) {
  1086. add_message(EXPORT_MESSAGE_ERROR, TTR("DMG Creation"), TTR("`hdiutil create` failed - file exists."));
  1087. } else {
  1088. add_message(EXPORT_MESSAGE_ERROR, TTR("DMG Creation"), TTR("`hdiutil create` failed."));
  1089. }
  1090. return FAILED;
  1091. }
  1092. return OK;
  1093. }
  1094. bool EditorExportPlatformMacOS::is_shebang(const String &p_path) const {
  1095. Ref<FileAccess> fb = FileAccess::open(p_path, FileAccess::READ);
  1096. ERR_FAIL_COND_V_MSG(fb.is_null(), false, vformat("Can't open file: \"%s\".", p_path));
  1097. uint16_t magic = fb->get_16();
  1098. return (magic == 0x2123);
  1099. }
  1100. bool EditorExportPlatformMacOS::is_executable(const String &p_path) const {
  1101. return MachO::is_macho(p_path) || LipO::is_lipo(p_path) || is_shebang(p_path);
  1102. }
  1103. Error EditorExportPlatformMacOS::_export_debug_script(const Ref<EditorExportPreset> &p_preset, const String &p_app_name, const String &p_pkg_name, const String &p_path) {
  1104. Ref<FileAccess> f = FileAccess::open(p_path, FileAccess::WRITE);
  1105. if (f.is_null()) {
  1106. add_message(EXPORT_MESSAGE_ERROR, TTR("Debug Script Export"), vformat(TTR("Could not open file \"%s\"."), p_path));
  1107. return ERR_CANT_CREATE;
  1108. }
  1109. f->store_line("#!/bin/sh");
  1110. f->store_line("echo -ne '\\033c\\033]0;" + p_app_name + "\\a'");
  1111. f->store_line("");
  1112. f->store_line("function app_realpath() {");
  1113. f->store_line(" SOURCE=$1");
  1114. f->store_line(" while [ -h \"$SOURCE\" ]; do");
  1115. f->store_line(" DIR=$(dirname \"$SOURCE\")");
  1116. f->store_line(" SOURCE=$(readlink \"$SOURCE\")");
  1117. f->store_line(" [[ $SOURCE != /* ]] && SOURCE=$DIR/$SOURCE");
  1118. f->store_line(" done");
  1119. f->store_line(" echo \"$( cd -P \"$( dirname \"$SOURCE\" )\" >/dev/null 2>&1 && pwd )\"");
  1120. f->store_line("}");
  1121. f->store_line("");
  1122. f->store_line("BASE_PATH=\"$(app_realpath \"${BASH_SOURCE[0]}\")\"");
  1123. f->store_line("\"$BASE_PATH/" + p_pkg_name + "\" \"$@\"");
  1124. f->store_line("");
  1125. return OK;
  1126. }
  1127. Error EditorExportPlatformMacOS::export_project(const Ref<EditorExportPreset> &p_preset, bool p_debug, const String &p_path, int p_flags) {
  1128. ExportNotifier notifier(*this, p_preset, p_debug, p_path, p_flags);
  1129. const String base_dir = p_path.get_base_dir();
  1130. if (!DirAccess::exists(base_dir)) {
  1131. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), vformat(TTR("Target folder does not exist or is inaccessible: \"%s\""), base_dir));
  1132. return ERR_FILE_BAD_PATH;
  1133. }
  1134. EditorProgress ep("export", TTR("Exporting for macOS"), 3, true);
  1135. String src_pkg_name;
  1136. if (p_debug) {
  1137. src_pkg_name = p_preset->get("custom_template/debug");
  1138. } else {
  1139. src_pkg_name = p_preset->get("custom_template/release");
  1140. }
  1141. if (src_pkg_name.is_empty()) {
  1142. String err;
  1143. src_pkg_name = find_export_template("macos.zip", &err);
  1144. if (src_pkg_name.is_empty()) {
  1145. add_message(EXPORT_MESSAGE_ERROR, TTR("Prepare Templates"), TTR("Export template not found.") + "\n" + err);
  1146. return ERR_FILE_NOT_FOUND;
  1147. }
  1148. }
  1149. Ref<FileAccess> io_fa;
  1150. zlib_filefunc_def io = zipio_create_io(&io_fa);
  1151. if (ep.step(TTR("Creating app bundle"), 0)) {
  1152. return ERR_SKIP;
  1153. }
  1154. unzFile src_pkg_zip = unzOpen2(src_pkg_name.utf8().get_data(), &io);
  1155. if (!src_pkg_zip) {
  1156. add_message(EXPORT_MESSAGE_ERROR, TTR("Prepare Templates"), vformat(TTR("Could not find template app to export: \"%s\"."), src_pkg_name));
  1157. return ERR_FILE_NOT_FOUND;
  1158. }
  1159. int ret = unzGoToFirstFile(src_pkg_zip);
  1160. String architecture = p_preset->get("binary_format/architecture");
  1161. String binary_to_use = "godot_macos_" + String(p_debug ? "debug" : "release") + "." + architecture;
  1162. String pkg_name;
  1163. if (String(GLOBAL_GET("application/config/name")) != "") {
  1164. pkg_name = String(GLOBAL_GET("application/config/name"));
  1165. } else {
  1166. pkg_name = "Unnamed";
  1167. }
  1168. pkg_name = OS::get_singleton()->get_safe_dir_name(pkg_name);
  1169. String export_format;
  1170. if (p_path.ends_with("zip")) {
  1171. export_format = "zip";
  1172. } else if (p_path.ends_with("app")) {
  1173. export_format = "app";
  1174. #ifdef MACOS_ENABLED
  1175. } else if (p_path.ends_with("dmg")) {
  1176. export_format = "dmg";
  1177. } else if (p_path.ends_with("pkg")) {
  1178. export_format = "pkg";
  1179. #endif
  1180. } else {
  1181. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), TTR("Invalid export format."));
  1182. return ERR_CANT_CREATE;
  1183. }
  1184. // Create our application bundle.
  1185. String tmp_app_dir_name = pkg_name + ".app";
  1186. String tmp_base_path_name;
  1187. String tmp_app_path_name;
  1188. String scr_path;
  1189. if (export_format == "app") {
  1190. tmp_base_path_name = p_path.get_base_dir();
  1191. tmp_app_path_name = p_path;
  1192. scr_path = p_path.get_basename() + ".command";
  1193. } else {
  1194. tmp_base_path_name = EditorPaths::get_singleton()->get_cache_dir().path_join(pkg_name);
  1195. tmp_app_path_name = tmp_base_path_name.path_join(tmp_app_dir_name);
  1196. scr_path = tmp_base_path_name.path_join(pkg_name + ".command");
  1197. }
  1198. print_verbose("Exporting to " + tmp_app_path_name);
  1199. Error err = OK;
  1200. Ref<DirAccess> tmp_app_dir = DirAccess::create_for_path(tmp_base_path_name);
  1201. if (tmp_app_dir.is_null()) {
  1202. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), vformat(TTR("Could not create directory: \"%s\"."), tmp_base_path_name));
  1203. err = ERR_CANT_CREATE;
  1204. }
  1205. if (FileAccess::exists(scr_path)) {
  1206. DirAccess::remove_file_or_error(scr_path);
  1207. }
  1208. if (DirAccess::exists(tmp_app_path_name)) {
  1209. String old_dir = tmp_app_dir->get_current_dir();
  1210. if (tmp_app_dir->change_dir(tmp_app_path_name) == OK) {
  1211. tmp_app_dir->erase_contents_recursive();
  1212. tmp_app_dir->change_dir(old_dir);
  1213. }
  1214. }
  1215. Array helpers = p_preset->get("codesign/entitlements/app_sandbox/helper_executables");
  1216. // Create our folder structure.
  1217. if (err == OK) {
  1218. print_verbose("Creating " + tmp_app_path_name + "/Contents/MacOS");
  1219. err = tmp_app_dir->make_dir_recursive(tmp_app_path_name + "/Contents/MacOS");
  1220. if (err != OK) {
  1221. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), vformat(TTR("Could not create directory \"%s\"."), tmp_app_path_name + "/Contents/MacOS"));
  1222. }
  1223. }
  1224. if (err == OK) {
  1225. print_verbose("Creating " + tmp_app_path_name + "/Contents/Frameworks");
  1226. err = tmp_app_dir->make_dir_recursive(tmp_app_path_name + "/Contents/Frameworks");
  1227. if (err != OK) {
  1228. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), vformat(TTR("Could not create directory \"%s\"."), tmp_app_path_name + "/Contents/Frameworks"));
  1229. }
  1230. }
  1231. if ((err == OK) && helpers.size() > 0) {
  1232. print_line("Creating " + tmp_app_path_name + "/Contents/Helpers");
  1233. err = tmp_app_dir->make_dir_recursive(tmp_app_path_name + "/Contents/Helpers");
  1234. if (err != OK) {
  1235. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), vformat(TTR("Could not create directory \"%s\"."), tmp_app_path_name + "/Contents/Helpers"));
  1236. }
  1237. }
  1238. if (err == OK) {
  1239. print_verbose("Creating " + tmp_app_path_name + "/Contents/Resources");
  1240. err = tmp_app_dir->make_dir_recursive(tmp_app_path_name + "/Contents/Resources");
  1241. if (err != OK) {
  1242. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), vformat(TTR("Could not create directory \"%s\"."), tmp_app_path_name + "/Contents/Resources"));
  1243. }
  1244. }
  1245. Dictionary appnames = GLOBAL_GET("application/config/name_localized");
  1246. Dictionary microphone_usage_descriptions = p_preset->get("privacy/microphone_usage_description_localized");
  1247. Dictionary camera_usage_descriptions = p_preset->get("privacy/camera_usage_description_localized");
  1248. Dictionary location_usage_descriptions = p_preset->get("privacy/location_usage_description_localized");
  1249. Dictionary address_book_usage_descriptions = p_preset->get("privacy/address_book_usage_description_localized");
  1250. Dictionary calendar_usage_descriptions = p_preset->get("privacy/calendar_usage_description_localized");
  1251. Dictionary photos_library_usage_descriptions = p_preset->get("privacy/photos_library_usage_description_localized");
  1252. Dictionary desktop_folder_usage_descriptions = p_preset->get("privacy/desktop_folder_usage_description_localized");
  1253. Dictionary documents_folder_usage_descriptions = p_preset->get("privacy/documents_folder_usage_description_localized");
  1254. Dictionary downloads_folder_usage_descriptions = p_preset->get("privacy/downloads_folder_usage_description_localized");
  1255. Dictionary network_volumes_usage_descriptions = p_preset->get("privacy/network_volumes_usage_description_localized");
  1256. Dictionary removable_volumes_usage_descriptions = p_preset->get("privacy/removable_volumes_usage_description_localized");
  1257. Dictionary copyrights = p_preset->get("application/copyright_localized");
  1258. Vector<String> translations = GLOBAL_GET("internationalization/locale/translations");
  1259. if (translations.size() > 0) {
  1260. {
  1261. String fname = tmp_app_path_name + "/Contents/Resources/en.lproj";
  1262. tmp_app_dir->make_dir_recursive(fname);
  1263. Ref<FileAccess> f = FileAccess::open(fname + "/InfoPlist.strings", FileAccess::WRITE);
  1264. f->store_line("/* Localized versions of Info.plist keys */");
  1265. f->store_line("");
  1266. f->store_line("CFBundleDisplayName = \"" + GLOBAL_GET("application/config/name").operator String() + "\";");
  1267. if (!((String)p_preset->get("privacy/microphone_usage_description")).is_empty()) {
  1268. f->store_line("NSMicrophoneUsageDescription = \"" + p_preset->get("privacy/microphone_usage_description").operator String() + "\";");
  1269. }
  1270. if (!((String)p_preset->get("privacy/camera_usage_description")).is_empty()) {
  1271. f->store_line("NSCameraUsageDescription = \"" + p_preset->get("privacy/camera_usage_description").operator String() + "\";");
  1272. }
  1273. if (!((String)p_preset->get("privacy/location_usage_description")).is_empty()) {
  1274. f->store_line("NSLocationUsageDescription = \"" + p_preset->get("privacy/location_usage_description").operator String() + "\";");
  1275. }
  1276. if (!((String)p_preset->get("privacy/address_book_usage_description")).is_empty()) {
  1277. f->store_line("NSContactsUsageDescription = \"" + p_preset->get("privacy/address_book_usage_description").operator String() + "\";");
  1278. }
  1279. if (!((String)p_preset->get("privacy/calendar_usage_description")).is_empty()) {
  1280. f->store_line("NSCalendarsUsageDescription = \"" + p_preset->get("privacy/calendar_usage_description").operator String() + "\";");
  1281. }
  1282. if (!((String)p_preset->get("privacy/photos_library_usage_description")).is_empty()) {
  1283. f->store_line("NSPhotoLibraryUsageDescription = \"" + p_preset->get("privacy/photos_library_usage_description").operator String() + "\";");
  1284. }
  1285. if (!((String)p_preset->get("privacy/desktop_folder_usage_description")).is_empty()) {
  1286. f->store_line("NSDesktopFolderUsageDescription = \"" + p_preset->get("privacy/desktop_folder_usage_description").operator String() + "\";");
  1287. }
  1288. if (!((String)p_preset->get("privacy/documents_folder_usage_description")).is_empty()) {
  1289. f->store_line("NSDocumentsFolderUsageDescription = \"" + p_preset->get("privacy/documents_folder_usage_description").operator String() + "\";");
  1290. }
  1291. if (!((String)p_preset->get("privacy/downloads_folder_usage_description")).is_empty()) {
  1292. f->store_line("NSDownloadsFolderUsageDescription = \"" + p_preset->get("privacy/downloads_folder_usage_description").operator String() + "\";");
  1293. }
  1294. if (!((String)p_preset->get("privacy/network_volumes_usage_description")).is_empty()) {
  1295. f->store_line("NSNetworkVolumesUsageDescription = \"" + p_preset->get("privacy/network_volumes_usage_description").operator String() + "\";");
  1296. }
  1297. if (!((String)p_preset->get("privacy/removable_volumes_usage_description")).is_empty()) {
  1298. f->store_line("NSRemovableVolumesUsageDescription = \"" + p_preset->get("privacy/removable_volumes_usage_description").operator String() + "\";");
  1299. }
  1300. f->store_line("NSHumanReadableCopyright = \"" + p_preset->get("application/copyright").operator String() + "\";");
  1301. }
  1302. HashSet<String> languages;
  1303. for (const String &E : translations) {
  1304. Ref<Translation> tr = ResourceLoader::load(E);
  1305. if (tr.is_valid() && tr->get_locale() != "en") {
  1306. languages.insert(tr->get_locale());
  1307. }
  1308. }
  1309. for (const String &lang : languages) {
  1310. String fname = tmp_app_path_name + "/Contents/Resources/" + lang + ".lproj";
  1311. tmp_app_dir->make_dir_recursive(fname);
  1312. Ref<FileAccess> f = FileAccess::open(fname + "/InfoPlist.strings", FileAccess::WRITE);
  1313. f->store_line("/* Localized versions of Info.plist keys */");
  1314. f->store_line("");
  1315. if (appnames.has(lang)) {
  1316. f->store_line("CFBundleDisplayName = \"" + appnames[lang].operator String() + "\";");
  1317. }
  1318. if (microphone_usage_descriptions.has(lang)) {
  1319. f->store_line("NSMicrophoneUsageDescription = \"" + microphone_usage_descriptions[lang].operator String() + "\";");
  1320. }
  1321. if (camera_usage_descriptions.has(lang)) {
  1322. f->store_line("NSCameraUsageDescription = \"" + camera_usage_descriptions[lang].operator String() + "\";");
  1323. }
  1324. if (location_usage_descriptions.has(lang)) {
  1325. f->store_line("NSLocationUsageDescription = \"" + location_usage_descriptions[lang].operator String() + "\";");
  1326. }
  1327. if (address_book_usage_descriptions.has(lang)) {
  1328. f->store_line("NSContactsUsageDescription = \"" + address_book_usage_descriptions[lang].operator String() + "\";");
  1329. }
  1330. if (calendar_usage_descriptions.has(lang)) {
  1331. f->store_line("NSCalendarsUsageDescription = \"" + calendar_usage_descriptions[lang].operator String() + "\";");
  1332. }
  1333. if (photos_library_usage_descriptions.has(lang)) {
  1334. f->store_line("NSPhotoLibraryUsageDescription = \"" + photos_library_usage_descriptions[lang].operator String() + "\";");
  1335. }
  1336. if (desktop_folder_usage_descriptions.has(lang)) {
  1337. f->store_line("NSDesktopFolderUsageDescription = \"" + desktop_folder_usage_descriptions[lang].operator String() + "\";");
  1338. }
  1339. if (documents_folder_usage_descriptions.has(lang)) {
  1340. f->store_line("NSDocumentsFolderUsageDescription = \"" + documents_folder_usage_descriptions[lang].operator String() + "\";");
  1341. }
  1342. if (downloads_folder_usage_descriptions.has(lang)) {
  1343. f->store_line("NSDownloadsFolderUsageDescription = \"" + downloads_folder_usage_descriptions[lang].operator String() + "\";");
  1344. }
  1345. if (network_volumes_usage_descriptions.has(lang)) {
  1346. f->store_line("NSNetworkVolumesUsageDescription = \"" + network_volumes_usage_descriptions[lang].operator String() + "\";");
  1347. }
  1348. if (removable_volumes_usage_descriptions.has(lang)) {
  1349. f->store_line("NSRemovableVolumesUsageDescription = \"" + removable_volumes_usage_descriptions[lang].operator String() + "\";");
  1350. }
  1351. if (copyrights.has(lang)) {
  1352. f->store_line("NSHumanReadableCopyright = \"" + copyrights[lang].operator String() + "\";");
  1353. }
  1354. }
  1355. }
  1356. // Now process our template.
  1357. bool found_binary = false;
  1358. int export_angle = p_preset->get("application/export_angle");
  1359. bool include_angle_libs = false;
  1360. if (export_angle == 0) {
  1361. include_angle_libs = String(GLOBAL_GET("rendering/gl_compatibility/driver.macos")) == "opengl3_angle";
  1362. } else if (export_angle == 1) {
  1363. include_angle_libs = true;
  1364. }
  1365. while (ret == UNZ_OK && err == OK) {
  1366. // Get filename.
  1367. unz_file_info info;
  1368. char fname[16384];
  1369. ret = unzGetCurrentFileInfo(src_pkg_zip, &info, fname, 16384, nullptr, 0, nullptr, 0);
  1370. if (ret != UNZ_OK) {
  1371. break;
  1372. }
  1373. String file = String::utf8(fname);
  1374. Vector<uint8_t> data;
  1375. data.resize(info.uncompressed_size);
  1376. // Read.
  1377. unzOpenCurrentFile(src_pkg_zip);
  1378. unzReadCurrentFile(src_pkg_zip, data.ptrw(), data.size());
  1379. unzCloseCurrentFile(src_pkg_zip);
  1380. // Write.
  1381. file = file.replace_first("macos_template.app/", "");
  1382. if (((info.external_fa >> 16L) & 0120000) == 0120000) {
  1383. #ifndef UNIX_ENABLED
  1384. add_message(EXPORT_MESSAGE_INFO, TTR("Export"), TTR("Relative symlinks are not supported on this OS, the exported project might be broken!"));
  1385. #endif
  1386. // Handle symlinks in the archive.
  1387. file = tmp_app_path_name.path_join(file);
  1388. if (err == OK) {
  1389. err = tmp_app_dir->make_dir_recursive(file.get_base_dir());
  1390. if (err != OK) {
  1391. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), vformat(TTR("Could not create directory \"%s\"."), file.get_base_dir()));
  1392. }
  1393. }
  1394. if (err == OK) {
  1395. String lnk_data = String::utf8((const char *)data.ptr(), data.size());
  1396. err = tmp_app_dir->create_link(lnk_data, file);
  1397. if (err != OK) {
  1398. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), vformat(TTR("Could not created symlink \"%s\" -> \"%s\"."), lnk_data, file));
  1399. }
  1400. print_verbose(vformat("ADDING SYMLINK %s => %s\n", file, lnk_data));
  1401. }
  1402. ret = unzGoToNextFile(src_pkg_zip);
  1403. continue; // next
  1404. }
  1405. if (file == "Contents/Frameworks/libEGL.dylib") {
  1406. if (!include_angle_libs) {
  1407. ret = unzGoToNextFile(src_pkg_zip);
  1408. continue; // skip
  1409. }
  1410. }
  1411. if (file == "Contents/Frameworks/libGLESv2.dylib") {
  1412. if (!include_angle_libs) {
  1413. ret = unzGoToNextFile(src_pkg_zip);
  1414. continue; // skip
  1415. }
  1416. }
  1417. if (file == "Contents/Info.plist") {
  1418. _fix_plist(p_preset, data, pkg_name);
  1419. }
  1420. if (file.begins_with("Contents/MacOS/godot_")) {
  1421. if (file != "Contents/MacOS/" + binary_to_use) {
  1422. ret = unzGoToNextFile(src_pkg_zip);
  1423. continue; // skip
  1424. }
  1425. found_binary = true;
  1426. file = "Contents/MacOS/" + pkg_name;
  1427. }
  1428. if (file == "Contents/Resources/icon.icns") {
  1429. // See if there is an icon.
  1430. String icon_path;
  1431. if (p_preset->get("application/icon") != "") {
  1432. icon_path = p_preset->get("application/icon");
  1433. } else if (GLOBAL_GET("application/config/macos_native_icon") != "") {
  1434. icon_path = GLOBAL_GET("application/config/macos_native_icon");
  1435. } else {
  1436. icon_path = GLOBAL_GET("application/config/icon");
  1437. }
  1438. if (!icon_path.is_empty()) {
  1439. if (icon_path.get_extension() == "icns") {
  1440. Ref<FileAccess> icon = FileAccess::open(icon_path, FileAccess::READ);
  1441. if (icon.is_valid()) {
  1442. data.resize(icon->get_length());
  1443. icon->get_buffer(&data.write[0], icon->get_length());
  1444. }
  1445. } else {
  1446. Ref<Image> icon;
  1447. icon.instantiate();
  1448. err = ImageLoader::load_image(icon_path, icon);
  1449. if (err == OK && !icon->is_empty()) {
  1450. _make_icon(p_preset, icon, data);
  1451. }
  1452. }
  1453. }
  1454. }
  1455. if (data.size() > 0) {
  1456. print_verbose("ADDING: " + file + " size: " + itos(data.size()));
  1457. // Write it into our application bundle.
  1458. file = tmp_app_path_name.path_join(file);
  1459. if (err == OK) {
  1460. err = tmp_app_dir->make_dir_recursive(file.get_base_dir());
  1461. if (err != OK) {
  1462. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), vformat(TTR("Could not create directory \"%s\"."), file.get_base_dir()));
  1463. }
  1464. }
  1465. if (err == OK) {
  1466. Ref<FileAccess> f = FileAccess::open(file, FileAccess::WRITE);
  1467. if (f.is_valid()) {
  1468. f->store_buffer(data.ptr(), data.size());
  1469. f.unref();
  1470. if (is_executable(file)) {
  1471. // chmod with 0755 if the file is executable.
  1472. FileAccess::set_unix_permissions(file, 0755);
  1473. }
  1474. } else {
  1475. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), vformat(TTR("Could not open \"%s\"."), file));
  1476. err = ERR_CANT_CREATE;
  1477. }
  1478. }
  1479. }
  1480. ret = unzGoToNextFile(src_pkg_zip);
  1481. }
  1482. // We're done with our source zip.
  1483. unzClose(src_pkg_zip);
  1484. if (!found_binary) {
  1485. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), vformat(TTR("Requested template binary \"%s\" not found. It might be missing from your template archive."), binary_to_use));
  1486. err = ERR_FILE_NOT_FOUND;
  1487. }
  1488. // Save console wrapper.
  1489. if (err == OK) {
  1490. int con_scr = p_preset->get("debug/export_console_wrapper");
  1491. if ((con_scr == 1 && p_debug) || (con_scr == 2)) {
  1492. err = _export_debug_script(p_preset, pkg_name, tmp_app_path_name.get_file() + "/Contents/MacOS/" + pkg_name, scr_path);
  1493. FileAccess::set_unix_permissions(scr_path, 0755);
  1494. if (err != OK) {
  1495. add_message(EXPORT_MESSAGE_ERROR, TTR("Export"), TTR("Could not create console wrapper."));
  1496. }
  1497. }
  1498. }
  1499. if (err == OK) {
  1500. if (ep.step(TTR("Making PKG"), 1)) {
  1501. return ERR_SKIP;
  1502. }
  1503. // See if we can code sign our new package.
  1504. bool sign_enabled = (p_preset->get("codesign/codesign").operator int() > 0);
  1505. bool ad_hoc = false;
  1506. int codesign_tool = p_preset->get("codesign/codesign");
  1507. switch (codesign_tool) {
  1508. case 1: { // built-in ad-hoc
  1509. ad_hoc = true;
  1510. } break;
  1511. case 2: { // "rcodesign"
  1512. ad_hoc = p_preset->get_or_env("codesign/certificate_file", ENV_MAC_CODESIGN_CERT_FILE).operator String().is_empty() || p_preset->get_or_env("codesign/certificate_password", ENV_MAC_CODESIGN_CERT_PASS).operator String().is_empty();
  1513. } break;
  1514. #ifdef MACOS_ENABLED
  1515. case 3: { // "codesign"
  1516. ad_hoc = (p_preset->get("codesign/identity") == "" || p_preset->get("codesign/identity") == "-");
  1517. } break;
  1518. #endif
  1519. default: {
  1520. };
  1521. }
  1522. String pack_path = tmp_app_path_name + "/Contents/Resources/" + pkg_name + ".pck";
  1523. Vector<SharedObject> shared_objects;
  1524. err = save_pack(p_preset, p_debug, pack_path, &shared_objects);
  1525. bool lib_validation = p_preset->get("codesign/entitlements/disable_library_validation");
  1526. if (!shared_objects.is_empty() && sign_enabled && ad_hoc && !lib_validation) {
  1527. add_message(EXPORT_MESSAGE_INFO, TTR("Entitlements Modified"), TTR("Ad-hoc signed applications require the 'Disable Library Validation' entitlement to load dynamic libraries."));
  1528. lib_validation = true;
  1529. }
  1530. if (!shared_objects.is_empty() && sign_enabled && codesign_tool == 2) {
  1531. add_message(EXPORT_MESSAGE_ERROR, TTR("Code Signing"), TTR("'rcodesign' doesn't support signing applications with embedded dynamic libraries."));
  1532. }
  1533. String ent_path = p_preset->get("codesign/entitlements/custom_file");
  1534. String hlp_ent_path = EditorPaths::get_singleton()->get_cache_dir().path_join(pkg_name + "_helper.entitlements");
  1535. if (sign_enabled && (ent_path.is_empty())) {
  1536. ent_path = EditorPaths::get_singleton()->get_cache_dir().path_join(pkg_name + ".entitlements");
  1537. Ref<FileAccess> ent_f = FileAccess::open(ent_path, FileAccess::WRITE);
  1538. if (ent_f.is_valid()) {
  1539. ent_f->store_line("<?xml version=\"1.0\" encoding=\"UTF-8\"?>");
  1540. ent_f->store_line("<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">");
  1541. ent_f->store_line("<plist version=\"1.0\">");
  1542. ent_f->store_line("<dict>");
  1543. if (Engine::get_singleton()->has_singleton("GodotSharp")) {
  1544. // These entitlements are required to run managed code, and are always enabled in Mono builds.
  1545. ent_f->store_line("<key>com.apple.security.cs.allow-jit</key>");
  1546. ent_f->store_line("<true/>");
  1547. ent_f->store_line("<key>com.apple.security.cs.allow-unsigned-executable-memory</key>");
  1548. ent_f->store_line("<true/>");
  1549. ent_f->store_line("<key>com.apple.security.cs.allow-dyld-environment-variables</key>");
  1550. ent_f->store_line("<true/>");
  1551. } else {
  1552. if ((bool)p_preset->get("codesign/entitlements/allow_jit_code_execution")) {
  1553. ent_f->store_line("<key>com.apple.security.cs.allow-jit</key>");
  1554. ent_f->store_line("<true/>");
  1555. }
  1556. if ((bool)p_preset->get("codesign/entitlements/allow_unsigned_executable_memory")) {
  1557. ent_f->store_line("<key>com.apple.security.cs.allow-unsigned-executable-memory</key>");
  1558. ent_f->store_line("<true/>");
  1559. }
  1560. if ((bool)p_preset->get("codesign/entitlements/allow_dyld_environment_variables")) {
  1561. ent_f->store_line("<key>com.apple.security.cs.allow-dyld-environment-variables</key>");
  1562. ent_f->store_line("<true/>");
  1563. }
  1564. }
  1565. if (lib_validation) {
  1566. ent_f->store_line("<key>com.apple.security.cs.disable-library-validation</key>");
  1567. ent_f->store_line("<true/>");
  1568. }
  1569. if ((bool)p_preset->get("codesign/entitlements/audio_input")) {
  1570. ent_f->store_line("<key>com.apple.security.device.audio-input</key>");
  1571. ent_f->store_line("<true/>");
  1572. }
  1573. if ((bool)p_preset->get("codesign/entitlements/camera")) {
  1574. ent_f->store_line("<key>com.apple.security.device.camera</key>");
  1575. ent_f->store_line("<true/>");
  1576. }
  1577. if ((bool)p_preset->get("codesign/entitlements/location")) {
  1578. ent_f->store_line("<key>com.apple.security.personal-information.location</key>");
  1579. ent_f->store_line("<true/>");
  1580. }
  1581. if ((bool)p_preset->get("codesign/entitlements/address_book")) {
  1582. ent_f->store_line("<key>com.apple.security.personal-information.addressbook</key>");
  1583. ent_f->store_line("<true/>");
  1584. }
  1585. if ((bool)p_preset->get("codesign/entitlements/calendars")) {
  1586. ent_f->store_line("<key>com.apple.security.personal-information.calendars</key>");
  1587. ent_f->store_line("<true/>");
  1588. }
  1589. if ((bool)p_preset->get("codesign/entitlements/photos_library")) {
  1590. ent_f->store_line("<key>com.apple.security.personal-information.photos-library</key>");
  1591. ent_f->store_line("<true/>");
  1592. }
  1593. if ((bool)p_preset->get("codesign/entitlements/apple_events")) {
  1594. ent_f->store_line("<key>com.apple.security.automation.apple-events</key>");
  1595. ent_f->store_line("<true/>");
  1596. }
  1597. if ((bool)p_preset->get("codesign/entitlements/debugging")) {
  1598. ent_f->store_line("<key>com.apple.security.get-task-allow</key>");
  1599. ent_f->store_line("<true/>");
  1600. }
  1601. int dist_type = p_preset->get("export/distribution_type");
  1602. if (dist_type == 2) {
  1603. String pprof = p_preset->get_or_env("codesign/provisioning_profile", ENV_MAC_CODESIGN_PROFILE);
  1604. String teamid = p_preset->get("codesign/apple_team_id");
  1605. String bid = p_preset->get("application/bundle_identifier");
  1606. if (!pprof.is_empty() && !teamid.is_empty()) {
  1607. ent_f->store_line("<key>com.apple.developer.team-identifier</key>");
  1608. ent_f->store_line("<string>" + teamid + "</string>");
  1609. ent_f->store_line("<key>com.apple.application-identifier</key>");
  1610. ent_f->store_line("<string>" + teamid + "." + bid + "</string>");
  1611. }
  1612. }
  1613. if ((bool)p_preset->get("codesign/entitlements/app_sandbox/enabled")) {
  1614. ent_f->store_line("<key>com.apple.security.app-sandbox</key>");
  1615. ent_f->store_line("<true/>");
  1616. if ((bool)p_preset->get("codesign/entitlements/app_sandbox/network_server")) {
  1617. ent_f->store_line("<key>com.apple.security.network.server</key>");
  1618. ent_f->store_line("<true/>");
  1619. }
  1620. if ((bool)p_preset->get("codesign/entitlements/app_sandbox/network_client")) {
  1621. ent_f->store_line("<key>com.apple.security.network.client</key>");
  1622. ent_f->store_line("<true/>");
  1623. }
  1624. if ((bool)p_preset->get("codesign/entitlements/app_sandbox/device_usb")) {
  1625. ent_f->store_line("<key>com.apple.security.device.usb</key>");
  1626. ent_f->store_line("<true/>");
  1627. }
  1628. if ((bool)p_preset->get("codesign/entitlements/app_sandbox/device_bluetooth")) {
  1629. ent_f->store_line("<key>com.apple.security.device.bluetooth</key>");
  1630. ent_f->store_line("<true/>");
  1631. }
  1632. if ((int)p_preset->get("codesign/entitlements/app_sandbox/files_downloads") == 1) {
  1633. ent_f->store_line("<key>com.apple.security.files.downloads.read-only</key>");
  1634. ent_f->store_line("<true/>");
  1635. }
  1636. if ((int)p_preset->get("codesign/entitlements/app_sandbox/files_downloads") == 2) {
  1637. ent_f->store_line("<key>com.apple.security.files.downloads.read-write</key>");
  1638. ent_f->store_line("<true/>");
  1639. }
  1640. if ((int)p_preset->get("codesign/entitlements/app_sandbox/files_pictures") == 1) {
  1641. ent_f->store_line("<key>com.apple.security.files.pictures.read-only</key>");
  1642. ent_f->store_line("<true/>");
  1643. }
  1644. if ((int)p_preset->get("codesign/entitlements/app_sandbox/files_pictures") == 2) {
  1645. ent_f->store_line("<key>com.apple.security.files.pictures.read-write</key>");
  1646. ent_f->store_line("<true/>");
  1647. }
  1648. if ((int)p_preset->get("codesign/entitlements/app_sandbox/files_music") == 1) {
  1649. ent_f->store_line("<key>com.apple.security.files.music.read-only</key>");
  1650. ent_f->store_line("<true/>");
  1651. }
  1652. if ((int)p_preset->get("codesign/entitlements/app_sandbox/files_music") == 2) {
  1653. ent_f->store_line("<key>com.apple.security.files.music.read-write</key>");
  1654. ent_f->store_line("<true/>");
  1655. }
  1656. if ((int)p_preset->get("codesign/entitlements/app_sandbox/files_movies") == 1) {
  1657. ent_f->store_line("<key>com.apple.security.files.movies.read-only</key>");
  1658. ent_f->store_line("<true/>");
  1659. }
  1660. if ((int)p_preset->get("codesign/entitlements/app_sandbox/files_movies") == 2) {
  1661. ent_f->store_line("<key>com.apple.security.files.movies.read-write</key>");
  1662. ent_f->store_line("<true/>");
  1663. }
  1664. if ((int)p_preset->get("codesign/entitlements/app_sandbox/files_user_selected") == 1) {
  1665. ent_f->store_line("<key>com.apple.security.files.user-selected.read-only</key>");
  1666. ent_f->store_line("<true/>");
  1667. }
  1668. if ((int)p_preset->get("codesign/entitlements/app_sandbox/files_user_selected") == 2) {
  1669. ent_f->store_line("<key>com.apple.security.files.user-selected.read-write</key>");
  1670. ent_f->store_line("<true/>");
  1671. }
  1672. }
  1673. ent_f->store_line("</dict>");
  1674. ent_f->store_line("</plist>");
  1675. } else {
  1676. add_message(EXPORT_MESSAGE_ERROR, TTR("Code Signing"), TTR("Could not create entitlements file."));
  1677. err = ERR_CANT_CREATE;
  1678. }
  1679. if ((err == OK) && helpers.size() > 0) {
  1680. ent_f = FileAccess::open(hlp_ent_path, FileAccess::WRITE);
  1681. if (ent_f.is_valid()) {
  1682. ent_f->store_line("<?xml version=\"1.0\" encoding=\"UTF-8\"?>");
  1683. ent_f->store_line("<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">");
  1684. ent_f->store_line("<plist version=\"1.0\">");
  1685. ent_f->store_line("<dict>");
  1686. ent_f->store_line("<key>com.apple.security.app-sandbox</key>");
  1687. ent_f->store_line("<true/>");
  1688. ent_f->store_line("<key>com.apple.security.inherit</key>");
  1689. ent_f->store_line("<true/>");
  1690. ent_f->store_line("</dict>");
  1691. ent_f->store_line("</plist>");
  1692. } else {
  1693. add_message(EXPORT_MESSAGE_ERROR, TTR("Code Signing"), TTR("Could not create helper entitlements file."));
  1694. err = ERR_CANT_CREATE;
  1695. }
  1696. }
  1697. }
  1698. if ((err == OK) && helpers.size() > 0) {
  1699. Ref<DirAccess> da = DirAccess::create(DirAccess::ACCESS_FILESYSTEM);
  1700. for (int i = 0; i < helpers.size(); i++) {
  1701. String hlp_path = helpers[i];
  1702. err = da->copy(hlp_path, tmp_app_path_name + "/Contents/Helpers/" + hlp_path.get_file());
  1703. if (err == OK && sign_enabled) {
  1704. err = _code_sign(p_preset, tmp_app_path_name + "/Contents/Helpers/" + hlp_path.get_file(), hlp_ent_path, false);
  1705. }
  1706. FileAccess::set_unix_permissions(tmp_app_path_name + "/Contents/Helpers/" + hlp_path.get_file(), 0755);
  1707. }
  1708. }
  1709. if (err == OK) {
  1710. Ref<DirAccess> da = DirAccess::create(DirAccess::ACCESS_FILESYSTEM);
  1711. for (int i = 0; i < shared_objects.size(); i++) {
  1712. String src_path = ProjectSettings::get_singleton()->globalize_path(shared_objects[i].path);
  1713. if (shared_objects[i].target.is_empty()) {
  1714. String path_in_app = tmp_app_path_name + "/Contents/Frameworks/" + src_path.get_file();
  1715. err = _copy_and_sign_files(da, src_path, path_in_app, sign_enabled, p_preset, ent_path, true);
  1716. } else {
  1717. String path_in_app = tmp_app_path_name.path_join(shared_objects[i].target);
  1718. tmp_app_dir->make_dir_recursive(path_in_app);
  1719. err = _copy_and_sign_files(da, src_path, path_in_app.path_join(src_path.get_file()), sign_enabled, p_preset, ent_path, false);
  1720. }
  1721. if (err != OK) {
  1722. break;
  1723. }
  1724. }
  1725. Vector<Ref<EditorExportPlugin>> export_plugins{ EditorExport::get_singleton()->get_export_plugins() };
  1726. for (int i = 0; i < export_plugins.size(); ++i) {
  1727. err = _export_macos_plugins_for(export_plugins[i], tmp_app_path_name, da, sign_enabled, p_preset, ent_path);
  1728. if (err != OK) {
  1729. break;
  1730. }
  1731. }
  1732. }
  1733. if (err == OK && sign_enabled) {
  1734. int dist_type = p_preset->get("export/distribution_type");
  1735. if (dist_type == 2) {
  1736. String pprof = p_preset->get_or_env("codesign/provisioning_profile", ENV_MAC_CODESIGN_PROFILE).operator String();
  1737. if (!pprof.is_empty()) {
  1738. Ref<DirAccess> da = DirAccess::create(DirAccess::ACCESS_FILESYSTEM);
  1739. err = da->copy(pprof, tmp_app_path_name + "/Contents/embedded.provisionprofile");
  1740. }
  1741. }
  1742. if (ep.step(TTR("Code signing bundle"), 2)) {
  1743. return ERR_SKIP;
  1744. }
  1745. err = _code_sign(p_preset, tmp_app_path_name, ent_path);
  1746. }
  1747. if (export_format == "dmg") {
  1748. // Create a DMG.
  1749. if (err == OK) {
  1750. if (ep.step(TTR("Making DMG"), 3)) {
  1751. return ERR_SKIP;
  1752. }
  1753. err = _create_dmg(p_path, pkg_name, tmp_base_path_name);
  1754. }
  1755. // Sign DMG.
  1756. if (err == OK && sign_enabled && !ad_hoc) {
  1757. if (ep.step(TTR("Code signing DMG"), 3)) {
  1758. return ERR_SKIP;
  1759. }
  1760. err = _code_sign(p_preset, p_path, ent_path, false);
  1761. }
  1762. } else if (export_format == "pkg") {
  1763. // Create a Installer.
  1764. if (err == OK) {
  1765. if (ep.step(TTR("Making PKG installer"), 3)) {
  1766. return ERR_SKIP;
  1767. }
  1768. err = _create_pkg(p_preset, p_path, tmp_app_path_name);
  1769. }
  1770. } else if (export_format == "zip") {
  1771. // Create ZIP.
  1772. if (err == OK) {
  1773. if (ep.step(TTR("Making ZIP"), 3)) {
  1774. return ERR_SKIP;
  1775. }
  1776. if (FileAccess::exists(p_path)) {
  1777. OS::get_singleton()->move_to_trash(p_path);
  1778. }
  1779. Ref<FileAccess> io_fa_dst;
  1780. zlib_filefunc_def io_dst = zipio_create_io(&io_fa_dst);
  1781. zipFile zip = zipOpen2(p_path.utf8().get_data(), APPEND_STATUS_CREATE, nullptr, &io_dst);
  1782. zip_folder_recursive(zip, tmp_base_path_name, "", pkg_name);
  1783. zipClose(zip, nullptr);
  1784. }
  1785. }
  1786. bool noto_enabled = (p_preset->get("notarization/notarization").operator int() > 0);
  1787. if (err == OK && noto_enabled) {
  1788. if (export_format == "app" || export_format == "pkg") {
  1789. add_message(EXPORT_MESSAGE_INFO, TTR("Notarization"), TTR("Notarization requires the app to be archived first, select the DMG or ZIP export format instead."));
  1790. } else {
  1791. if (ep.step(TTR("Sending archive for notarization"), 4)) {
  1792. return ERR_SKIP;
  1793. }
  1794. err = _notarize(p_preset, p_path);
  1795. }
  1796. }
  1797. // Clean up temporary entitlements files.
  1798. if (FileAccess::exists(hlp_ent_path)) {
  1799. DirAccess::remove_file_or_error(hlp_ent_path);
  1800. }
  1801. // Clean up temporary .app dir and generated entitlements.
  1802. if ((String)(p_preset->get("codesign/entitlements/custom_file")) == "") {
  1803. tmp_app_dir->remove(ent_path);
  1804. }
  1805. if (export_format != "app") {
  1806. if (tmp_app_dir->change_dir(tmp_base_path_name) == OK) {
  1807. tmp_app_dir->erase_contents_recursive();
  1808. tmp_app_dir->change_dir("..");
  1809. tmp_app_dir->remove(pkg_name);
  1810. }
  1811. }
  1812. }
  1813. return err;
  1814. }
  1815. bool EditorExportPlatformMacOS::has_valid_export_configuration(const Ref<EditorExportPreset> &p_preset, String &r_error, bool &r_missing_templates, bool p_debug) const {
  1816. String err;
  1817. // Look for export templates (official templates first, then custom).
  1818. bool dvalid = exists_export_template("macos.zip", &err);
  1819. bool rvalid = dvalid; // Both in the same ZIP.
  1820. if (p_preset->get("custom_template/debug") != "") {
  1821. dvalid = FileAccess::exists(p_preset->get("custom_template/debug"));
  1822. if (!dvalid) {
  1823. err += TTR("Custom debug template not found.") + "\n";
  1824. }
  1825. }
  1826. if (p_preset->get("custom_template/release") != "") {
  1827. rvalid = FileAccess::exists(p_preset->get("custom_template/release"));
  1828. if (!rvalid) {
  1829. err += TTR("Custom release template not found.") + "\n";
  1830. }
  1831. }
  1832. bool valid = dvalid || rvalid;
  1833. r_missing_templates = !valid;
  1834. // Check the texture formats, which vary depending on the target architecture.
  1835. String architecture = p_preset->get("binary_format/architecture");
  1836. if (architecture == "universal" || architecture == "x86_64") {
  1837. if (!ResourceImporterTextureSettings::should_import_s3tc_bptc()) {
  1838. err += TTR("Cannot export for universal or x86_64 if S3TC BPTC texture format is disabled. Enable it in the Project Settings (Rendering > Textures > VRAM Compression > Import S3TC BPTC).") + "\n";
  1839. valid = false;
  1840. }
  1841. }
  1842. if (architecture == "universal" || architecture == "arm64") {
  1843. if (!ResourceImporterTextureSettings::should_import_etc2_astc()) {
  1844. err += TTR("Cannot export for universal or arm64 if ETC2 ASTC texture format is disabled. Enable it in the Project Settings (Rendering > Textures > VRAM Compression > Import ETC2 ASTC).") + "\n";
  1845. valid = false;
  1846. }
  1847. }
  1848. if (architecture != "universal" && architecture != "x86_64" && architecture != "arm64") {
  1849. ERR_PRINT("Invalid architecture");
  1850. }
  1851. if (!err.is_empty()) {
  1852. r_error = err;
  1853. }
  1854. return valid;
  1855. }
  1856. bool EditorExportPlatformMacOS::has_valid_project_configuration(const Ref<EditorExportPreset> &p_preset, String &r_error) const {
  1857. String err;
  1858. bool valid = true;
  1859. int dist_type = p_preset->get("export/distribution_type");
  1860. bool ad_hoc = false;
  1861. int codesign_tool = p_preset->get("codesign/codesign");
  1862. int notary_tool = p_preset->get("notarization/notarization");
  1863. switch (codesign_tool) {
  1864. case 1: { // built-in ad-hoc
  1865. ad_hoc = true;
  1866. } break;
  1867. case 2: { // "rcodesign"
  1868. ad_hoc = p_preset->get_or_env("codesign/certificate_file", ENV_MAC_CODESIGN_CERT_FILE).operator String().is_empty() || p_preset->get_or_env("codesign/certificate_password", ENV_MAC_CODESIGN_CERT_PASS).operator String().is_empty();
  1869. } break;
  1870. #ifdef MACOS_ENABLED
  1871. case 3: { // "codesign"
  1872. ad_hoc = (p_preset->get("codesign/identity") == "" || p_preset->get("codesign/identity") == "-");
  1873. } break;
  1874. #endif
  1875. default: {
  1876. };
  1877. }
  1878. const String &additional_plist_content = p_preset->get("application/additional_plist_content");
  1879. if (!additional_plist_content.is_empty()) {
  1880. const String &plist = vformat("<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n"
  1881. "<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">"
  1882. "<plist version=\"1.0\">"
  1883. "<dict>\n"
  1884. "%s\n"
  1885. "</dict>\n"
  1886. "</plist>\n",
  1887. additional_plist_content);
  1888. String plist_err;
  1889. Ref<PList> plist_parser;
  1890. plist_parser.instantiate();
  1891. if (!plist_parser->load_string(plist, plist_err)) {
  1892. err += TTR("Invalid additional PList content: ") + plist_err + "\n";
  1893. valid = false;
  1894. }
  1895. }
  1896. List<ExportOption> options;
  1897. get_export_options(&options);
  1898. for (const EditorExportPlatform::ExportOption &E : options) {
  1899. if (get_export_option_visibility(p_preset.ptr(), E.option.name)) {
  1900. String warn = get_export_option_warning(p_preset.ptr(), E.option.name);
  1901. if (!warn.is_empty()) {
  1902. err += warn + "\n";
  1903. if (E.required) {
  1904. valid = false;
  1905. }
  1906. }
  1907. }
  1908. }
  1909. if (dist_type != 2) {
  1910. if (notary_tool > 0) {
  1911. if (notary_tool == 2 || notary_tool == 3) {
  1912. if (!FileAccess::exists("/usr/bin/xcrun") && !FileAccess::exists("/bin/xcrun")) {
  1913. err += TTR("Notarization: Xcode command line tools are not installed.") + "\n";
  1914. valid = false;
  1915. }
  1916. } else if (notary_tool == 1) {
  1917. String rcodesign = EDITOR_GET("export/macos/rcodesign").operator String();
  1918. if (rcodesign.is_empty()) {
  1919. err += TTR("Notarization: rcodesign path is not set. Configure rcodesign path in the Editor Settings (Export > macOS > rcodesign).") + "\n";
  1920. valid = false;
  1921. }
  1922. }
  1923. } else {
  1924. err += TTR("Warning: Notarization is disabled. The exported project will be blocked by Gatekeeper if it's downloaded from an unknown source.") + "\n";
  1925. if (codesign_tool == 0) {
  1926. err += TTR("Code signing is disabled. The exported project will not run on Macs with enabled Gatekeeper and Apple Silicon powered Macs.") + "\n";
  1927. }
  1928. }
  1929. }
  1930. if (codesign_tool > 0) {
  1931. if (ad_hoc) {
  1932. err += TTR("Code signing: Using ad-hoc signature. The exported project will be blocked by Gatekeeper") + "\n";
  1933. }
  1934. if (codesign_tool == 3) {
  1935. if (!FileAccess::exists("/usr/bin/codesign") && !FileAccess::exists("/bin/codesign")) {
  1936. err += TTR("Code signing: Xcode command line tools are not installed.") + "\n";
  1937. valid = false;
  1938. }
  1939. } else if (codesign_tool == 2) {
  1940. String rcodesign = EDITOR_GET("export/macos/rcodesign").operator String();
  1941. if (rcodesign.is_empty()) {
  1942. err += TTR("Code signing: rcodesign path is not set. Configure rcodesign path in the Editor Settings (Export > macOS > rcodesign).") + "\n";
  1943. valid = false;
  1944. }
  1945. }
  1946. }
  1947. if (!err.is_empty()) {
  1948. r_error = err;
  1949. }
  1950. return valid;
  1951. }
  1952. Ref<Texture2D> EditorExportPlatformMacOS::get_run_icon() const {
  1953. return run_icon;
  1954. }
  1955. bool EditorExportPlatformMacOS::poll_export() {
  1956. Ref<EditorExportPreset> preset;
  1957. for (int i = 0; i < EditorExport::get_singleton()->get_export_preset_count(); i++) {
  1958. Ref<EditorExportPreset> ep = EditorExport::get_singleton()->get_export_preset(i);
  1959. if (ep->is_runnable() && ep->get_platform() == this) {
  1960. preset = ep;
  1961. break;
  1962. }
  1963. }
  1964. int prev = menu_options;
  1965. menu_options = (preset.is_valid() && preset->get("ssh_remote_deploy/enabled").operator bool());
  1966. if (ssh_pid != 0 || !cleanup_commands.is_empty()) {
  1967. if (menu_options == 0) {
  1968. cleanup();
  1969. } else {
  1970. menu_options += 1;
  1971. }
  1972. }
  1973. return menu_options != prev;
  1974. }
  1975. Ref<ImageTexture> EditorExportPlatformMacOS::get_option_icon(int p_index) const {
  1976. return p_index == 1 ? stop_icon : EditorExportPlatform::get_option_icon(p_index);
  1977. }
  1978. int EditorExportPlatformMacOS::get_options_count() const {
  1979. return menu_options;
  1980. }
  1981. String EditorExportPlatformMacOS::get_option_label(int p_index) const {
  1982. return (p_index) ? TTR("Stop and uninstall") : TTR("Run on remote macOS system");
  1983. }
  1984. String EditorExportPlatformMacOS::get_option_tooltip(int p_index) const {
  1985. return (p_index) ? TTR("Stop and uninstall running project from the remote system") : TTR("Run exported project on remote macOS system");
  1986. }
  1987. void EditorExportPlatformMacOS::cleanup() {
  1988. if (ssh_pid != 0 && OS::get_singleton()->is_process_running(ssh_pid)) {
  1989. print_line("Terminating connection...");
  1990. OS::get_singleton()->kill(ssh_pid);
  1991. OS::get_singleton()->delay_usec(1000);
  1992. }
  1993. if (!cleanup_commands.is_empty()) {
  1994. print_line("Stopping and deleting previous version...");
  1995. for (const SSHCleanupCommand &cmd : cleanup_commands) {
  1996. if (cmd.wait) {
  1997. ssh_run_on_remote(cmd.host, cmd.port, cmd.ssh_args, cmd.cmd_args);
  1998. } else {
  1999. ssh_run_on_remote_no_wait(cmd.host, cmd.port, cmd.ssh_args, cmd.cmd_args);
  2000. }
  2001. }
  2002. }
  2003. ssh_pid = 0;
  2004. cleanup_commands.clear();
  2005. }
  2006. Error EditorExportPlatformMacOS::run(const Ref<EditorExportPreset> &p_preset, int p_device, int p_debug_flags) {
  2007. cleanup();
  2008. if (p_device) { // Stop command, cleanup only.
  2009. return OK;
  2010. }
  2011. EditorProgress ep("run", TTR("Running..."), 5);
  2012. const String dest = EditorPaths::get_singleton()->get_cache_dir().path_join("macos");
  2013. Ref<DirAccess> da = DirAccess::create(DirAccess::ACCESS_FILESYSTEM);
  2014. if (!da->dir_exists(dest)) {
  2015. Error err = da->make_dir_recursive(dest);
  2016. if (err != OK) {
  2017. EditorNode::get_singleton()->show_warning(TTR("Could not create temp directory:") + "\n" + dest);
  2018. return err;
  2019. }
  2020. }
  2021. String pkg_name;
  2022. if (String(ProjectSettings::get_singleton()->get("application/config/name")) != "") {
  2023. pkg_name = String(ProjectSettings::get_singleton()->get("application/config/name"));
  2024. } else {
  2025. pkg_name = "Unnamed";
  2026. }
  2027. pkg_name = OS::get_singleton()->get_safe_dir_name(pkg_name);
  2028. String host = p_preset->get("ssh_remote_deploy/host").operator String();
  2029. String port = p_preset->get("ssh_remote_deploy/port").operator String();
  2030. if (port.is_empty()) {
  2031. port = "22";
  2032. }
  2033. Vector<String> extra_args_ssh = p_preset->get("ssh_remote_deploy/extra_args_ssh").operator String().split(" ", false);
  2034. Vector<String> extra_args_scp = p_preset->get("ssh_remote_deploy/extra_args_scp").operator String().split(" ", false);
  2035. const String basepath = dest.path_join("tmp_macos_export");
  2036. #define CLEANUP_AND_RETURN(m_err) \
  2037. { \
  2038. if (da->file_exists(basepath + ".zip")) { \
  2039. da->remove(basepath + ".zip"); \
  2040. } \
  2041. if (da->file_exists(basepath + "_start.sh")) { \
  2042. da->remove(basepath + "_start.sh"); \
  2043. } \
  2044. if (da->file_exists(basepath + "_clean.sh")) { \
  2045. da->remove(basepath + "_clean.sh"); \
  2046. } \
  2047. return m_err; \
  2048. } \
  2049. ((void)0)
  2050. if (ep.step(TTR("Exporting project..."), 1)) {
  2051. return ERR_SKIP;
  2052. }
  2053. Error err = export_project(p_preset, true, basepath + ".zip", p_debug_flags);
  2054. if (err != OK) {
  2055. DirAccess::remove_file_or_error(basepath + ".zip");
  2056. return err;
  2057. }
  2058. String cmd_args;
  2059. {
  2060. Vector<String> cmd_args_list;
  2061. gen_debug_flags(cmd_args_list, p_debug_flags);
  2062. for (int i = 0; i < cmd_args_list.size(); i++) {
  2063. if (i != 0) {
  2064. cmd_args += " ";
  2065. }
  2066. cmd_args += cmd_args_list[i];
  2067. }
  2068. }
  2069. const bool use_remote = (p_debug_flags & DEBUG_FLAG_REMOTE_DEBUG) || (p_debug_flags & DEBUG_FLAG_DUMB_CLIENT);
  2070. int dbg_port = EditorSettings::get_singleton()->get("network/debug/remote_port");
  2071. print_line("Creating temporary directory...");
  2072. ep.step(TTR("Creating temporary directory..."), 2);
  2073. String temp_dir;
  2074. err = ssh_run_on_remote(host, port, extra_args_ssh, "mktemp -d", &temp_dir);
  2075. if (err != OK || temp_dir.is_empty()) {
  2076. CLEANUP_AND_RETURN(err);
  2077. }
  2078. print_line("Uploading archive...");
  2079. ep.step(TTR("Uploading archive..."), 3);
  2080. err = ssh_push_to_remote(host, port, extra_args_scp, basepath + ".zip", temp_dir);
  2081. if (err != OK) {
  2082. CLEANUP_AND_RETURN(err);
  2083. }
  2084. {
  2085. String run_script = p_preset->get("ssh_remote_deploy/run_script");
  2086. run_script = run_script.replace("{temp_dir}", temp_dir);
  2087. run_script = run_script.replace("{archive_name}", basepath.get_file() + ".zip");
  2088. run_script = run_script.replace("{exe_name}", pkg_name);
  2089. run_script = run_script.replace("{cmd_args}", cmd_args);
  2090. Ref<FileAccess> f = FileAccess::open(basepath + "_start.sh", FileAccess::WRITE);
  2091. if (f.is_null()) {
  2092. CLEANUP_AND_RETURN(err);
  2093. }
  2094. f->store_string(run_script);
  2095. }
  2096. {
  2097. String clean_script = p_preset->get("ssh_remote_deploy/cleanup_script");
  2098. clean_script = clean_script.replace("{temp_dir}", temp_dir);
  2099. clean_script = clean_script.replace("{archive_name}", basepath.get_file() + ".zip");
  2100. clean_script = clean_script.replace("{exe_name}", pkg_name);
  2101. clean_script = clean_script.replace("{cmd_args}", cmd_args);
  2102. Ref<FileAccess> f = FileAccess::open(basepath + "_clean.sh", FileAccess::WRITE);
  2103. if (f.is_null()) {
  2104. CLEANUP_AND_RETURN(err);
  2105. }
  2106. f->store_string(clean_script);
  2107. }
  2108. print_line("Uploading scripts...");
  2109. ep.step(TTR("Uploading scripts..."), 4);
  2110. err = ssh_push_to_remote(host, port, extra_args_scp, basepath + "_start.sh", temp_dir);
  2111. if (err != OK) {
  2112. CLEANUP_AND_RETURN(err);
  2113. }
  2114. err = ssh_run_on_remote(host, port, extra_args_ssh, vformat("chmod +x \"%s/%s\"", temp_dir, basepath.get_file() + "_start.sh"));
  2115. if (err != OK || temp_dir.is_empty()) {
  2116. CLEANUP_AND_RETURN(err);
  2117. }
  2118. err = ssh_push_to_remote(host, port, extra_args_scp, basepath + "_clean.sh", temp_dir);
  2119. if (err != OK) {
  2120. CLEANUP_AND_RETURN(err);
  2121. }
  2122. err = ssh_run_on_remote(host, port, extra_args_ssh, vformat("chmod +x \"%s/%s\"", temp_dir, basepath.get_file() + "_clean.sh"));
  2123. if (err != OK || temp_dir.is_empty()) {
  2124. CLEANUP_AND_RETURN(err);
  2125. }
  2126. print_line("Starting project...");
  2127. ep.step(TTR("Starting project..."), 5);
  2128. err = ssh_run_on_remote_no_wait(host, port, extra_args_ssh, vformat("\"%s/%s\"", temp_dir, basepath.get_file() + "_start.sh"), &ssh_pid, (use_remote) ? dbg_port : -1);
  2129. if (err != OK) {
  2130. CLEANUP_AND_RETURN(err);
  2131. }
  2132. cleanup_commands.clear();
  2133. cleanup_commands.push_back(SSHCleanupCommand(host, port, extra_args_ssh, vformat("\"%s/%s\"", temp_dir, basepath.get_file() + "_clean.sh")));
  2134. print_line("Project started.");
  2135. CLEANUP_AND_RETURN(OK);
  2136. #undef CLEANUP_AND_RETURN
  2137. }
  2138. EditorExportPlatformMacOS::EditorExportPlatformMacOS() {
  2139. if (EditorNode::get_singleton()) {
  2140. #ifdef MODULE_SVG_ENABLED
  2141. Ref<Image> img = memnew(Image);
  2142. const bool upsample = !Math::is_equal_approx(Math::round(EDSCALE), EDSCALE);
  2143. ImageLoaderSVG::create_image_from_string(img, _macos_logo_svg, EDSCALE, upsample, false);
  2144. logo = ImageTexture::create_from_image(img);
  2145. ImageLoaderSVG::create_image_from_string(img, _macos_run_icon_svg, EDSCALE, upsample, false);
  2146. run_icon = ImageTexture::create_from_image(img);
  2147. #endif
  2148. Ref<Theme> theme = EditorNode::get_singleton()->get_editor_theme();
  2149. if (theme.is_valid()) {
  2150. stop_icon = theme->get_icon(SNAME("Stop"), EditorStringName(EditorIcons));
  2151. } else {
  2152. stop_icon.instantiate();
  2153. }
  2154. }
  2155. }