$ zip -9 -y -r /path/to/appname.ipa /path/to/Payload
Check this with the command security find-identity -p codesigning: $ security find-identity -p codesigningġ) AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA "iPhone Distribution: XXX S.p.A."ġ3) CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC "iPhone Developer: Name Surname (DDDDDDDDDD)"Īfter the ipa zip archive creation, you can use the Gem ipa_analyzer ( ) to verify if the app is correctly signed: MacOS keychain should contains the Apple certificate used to create the mobile provisioning profile, which is also utilized to distribute the app we’re signing. path/to/Payload/appname.app: signed app bundle with Mach-O universal (armv7 arm64) path/to/Payload/appname.app: replacing existing signature Cydia Impactor Failed To Verify Code Signature - complasopa. local: codesign -f -generate-entitlement-der -vv -s "iPhone Distribution: XXX S.p.A." -entitlements "/path/to/Payload/appname.app/ist" /path/to/Payload/appname.app local: xattr -rc /path/to/Payload/appname.app local: cp /path/to/embedded.mobileprovision "/path/to/Payload/appname.app" Local("codesign -f -generate-entitlement-der -vv -s \"%s\" -entitlements \"%s/ist\" %s" % (Įnv.code_sign_identity, app_full_path, app_full_path) Click again to stop watching or visit your profile/homepage to manage your watched threads. Local('cp %s "%s"' % ("/path/to/embedded.mobileprovision", app_full_path)) Xcode 12.5 'code signature version is no longer supported' You’re now watching this thread and will receive emails when there’s activity.
I can sign my app with Xcode 10.3 using this python 2.7 (tried both on MacOS Mojave 10.14 and MacOS Catalina 10.15) snippet code: from fabric.api import local As pointed out in other responses, now to sign ios app with codesign command on MacOS prior to Big Sur add the -generate-entitlement-der flag.