You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you need to develop against a local liblsl source tree (e.g., testing liblsl changes alongside your app), see [App-LabRecorder](https://github.com/labstreaminglayer/App-LabRecorder/) for an example of a more advanced liblsl discovery setup that supports `LSL_SOURCE_DIR`.
For local development, the build automatically applies ad-hoc signing with network entitlements. This allows the app to use LSL's multicast discovery.
154
+
For local development, the build automatically applies ad-hoc signing with network entitlements, allowing the app to use LSL's multicast discovery.
162
155
163
-
For distribution, use the signing script:
156
+
For distribution, apps must be signed with a Developer ID certificate and notarized. See `scripts/sign_and_notarize.sh` and Apple's [Notarizing macOS Software Before Distribution](https://developer.apple.com/documentation/security/notarizing_macos_software_before_distribution) guide.
|`APPLE_CODE_SIGN_IDENTITY_APP`| Extracted from imported certificate (e.g., `Developer ID Application: Name (TEAMID)`) |
175
+
|`APPLE_NOTARIZE_KEYCHAIN_PROFILE`| Created via `notarytool store-credentials` using the three `NOTARIZATION` secrets |
176
+
|`ENTITLEMENTS_FILE`| Set to `app.entitlements` in the repo |
187
177
188
-
**Important:** These organization secrets must be shared with your repository. In GitHub:
189
-
1. Go to Organization Settings → Secrets and variables → Actions
190
-
2. For each secret, click to edit and under "Repository access" select the repositories that need access
178
+
To run the script locally, install your Developer ID certificate in Keychain, create a notarization profile with `xcrun notarytool store-credentials`, and set these environment variables.
0 commit comments