Lion 可访问性可信流程最佳实践
我想我在某处读到可以在 Lion 的 plist 或权利文件中将应用程序标记为 AXIsProcessTrusted True。现在我正在搜索它,我没有看到任何比 2008 年更新的文档或最佳实践更新。
是否可以在其构建(plist 等)中制作和应用 AXMakeProcessTrusted?
如果是这样,是否仍然需要用户按照旧文档所述进行 root 身份验证才能启用此功能?
最后,我正在查看示例应用程序 UIElementInspector,但我没有看到该应用程序在任何地方调用过此函数。那么为什么它值得信任,和/或我的应用程序如何获得与此应用程序相同级别的访问权限,同时给用户带来最小的痛苦?
I thought that I read somewhere that it was possible to flag an app as AXIsProcessTrusted True inside a plist or entitlement file in Lion. Now that I'm searching for it, I don't see any documentation or best practice update newer than 2008.
Is it possible to make and app AXMakeProcessTrusted in its build (plist etc)?
If so or not, is it still going to require the user authenticating as root as the older docs state in order to enable this?
Finally, I am looking at the sample app UIElementInspector and I don't see anywhere that the app ever calls this function. Why is it trusted then, and/or how can my app get the same level of access as this app with the minimal pain for the user?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
我可以明确地回答第 3 部分(但不是第 1 部分和第 2 部分):如果您打开应用程序沙箱,UIElementInspector 就会中断(正如我在我的应用程序中所做的那样 - 毕竟,该应用程序不仅仅是为了修补)。沙箱显然降低了仅本地进程的可访问性(大概除非 AXMakeProcessTrusted 已成功执行)。
I can answer part 3 definitively (not 1 and 2 though): UIElementInspector breaks if you turn on app sandboxing (as I had in my app - after all, the app isn't just for tinkering around). Sandboxing apparently reduces Accessibility to only the local process (presumably unless AXMakeProcessTrusted has been executed successfully).