On 14 Jan 2013, at 17:59, Mike Abdullah <cocoa...@mikeabdullah.net> wrote:

> 
>> 
> 
> Go watch the sandboxing videos from WWDC this year. They cover automation 
> quite a bit, and all will be made much clearer.
> 
You want session 206 - Secure automation techniques in OS X.

If you don't have access we can probably paraphrase the main points.

To run User supplied scripts will entail the use of NSUserAppleScriptTask et al.
The sandbox will allow your app to read user scripts from ~/Library/Application 
Scripts/code-signing-identifier aka NSApplicationScriptsDirectory.
The crucial point is that your app has no write access to 
NSApplicationScriptsDirectory.
The user has to manually move scripts into that folder.
This move signals user interaction, in the same way that running a script from 
the command line does, and the script is permitted to escape the sandbox.

The sandbox places no restriction on receiving AppleEvents.
The restriction is on sending them.

Regards

Jonathan Mitchell
Mugginsoft LLP



_______________________________________________

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to