02-10-2024 11:45 PM
xattr -l /path/to/application.app
xattr -dr com.apple.quarantine /path/to/application.app
Solved! Go to Solution.
02-10-2024 11:55 PM
The Post-Processing VI that creates the
Application.app/Support/LabVIEW 23.3 Runtime.framework
for native LV 2023 Q3 on arm64
02-21-2024 05:37 PM
For Apple Silicon native LV 2023 Q3, you can embed the LabVIEW 23.0 Runtime.framework, etc., so as to create a standalone application by drag and drop copying from /Library/Frameworks/LabVIEW 23.0 Runtime.framework, etc. directly to the Application.app/Contents/Resources folder. This entails entering your admin or equivalent password to preserve security information that is lost if you cp, ditto, rsync, AppleScripts etc. over the frameworks using a Post-Processing vi. A kludge, but it works to send standalone applications out with involving a client a trip to ni.com to download the RTE or to involve creating an installer.app to bundle installing an RTE.
For those who wish to stick with a Post-Processing vi for Apple Silicon native LV 2023 Q3:
-Rework the above Install Runtime Engine.vi substituting arm64 for x86_64 (or i386).
-Modify the paths created to place the frameworks at Application.app/Contents/Resources
-Use
sudo -S cp -Rp '/Library/Frameworks/%s/' '%s/%s'
to allow the copying to proceed completely in the Application.app without the need to involve drag and drop copying from /Library/Frameworks/LabVIEW 23.0 Runtime.framework, etc.
-Modify the sudoers list via sudo visudo, to include
<username> ALL=(ALL) NOPASSWD: /bin/cp
This effectively "whitelists" cp command at its path "/bin/cp" to have sudo privileges.
NB: Consider how to "sandbox" the time you allow even one command to have sudo privileges.
When finished building apps to test or deploy with this shortcut, REVERT to baseline security by deleting the entry in the sudoers list.