view deploy/linux/AppRun @ 2265:d33dff02b39b sandbox-notarize

Work on sandboxing (possibly) and using the hardened runtime for notarization. Supply appropriate bundle ID for helpers as well as main application, and request inherited sandbox entitlements. Currently works with sandboxing (apparently) but not yet with the hardened runtime, where we can't load plugins signed by third parties even with the com.apple.security.cs.disable-library-validation entitlement because their team IDs don't match the host. Possibly that exception is supposed to be requested some other way?
author Chris Cannam
date Thu, 25 Apr 2019 16:46:02 +0100
parents 1f01a4c5c968
children d07cf8e01d51
line wrap: on
line source
#!/bin/sh

mydir=$(dirname "$0")
case "$mydir" in
    /*) ;;
    *) mydir="$PWD/$mydir";;
esac

echo "AppImage root is $mydir"

PATH="$mydir/usr/bin:$mydir/bin:$PATH"
export PATH

LD_LIBRARY_PATH="$mydir/usr/lib:$mydir/usr/lib/x86_64-linux-gnu:$mydir/usr/lib64:$LD_LIBRARY_PATH"
export LD_LIBRARY_PATH

QT_PLUGIN_PATH="$mydir/usr/lib/qt5/plugins/:$mydir/usr/lib/x86_64-linux-gnu/qt5/plugins/:$mydir/usr/lib64/qt5/plugins/:$QT_PLUGIN_PATH"
export QT_PLUGIN_PATH

XDG_DATA_DIRS="$mydir/usr/share:$XDG_DATA_DIRS:/usr/local/share:/usr/share"
export XDG_DATA_DIRS

GSETTINGS_SCHEMA_DIR="$mydir/usr/share/glib-2.0/schemas:$GSETTINGS_SCHEMA_DIR"
export GSETTINGS_SCHEMA_DIR

exec "$mydir/usr/bin/sonic-visualiser" "$@"