Reputation: 27335
Is it possible to inspect the insides of a provisioning profile? I am dealing with a code signing error because the entitlements do not match. Fixing this is rather difficult as I don't know how to inspect the entitlements in the provisioning profile. Hence I am shooting in the dark.
Related questions, none of which seem to help in my case:
Upvotes: 46
Views: 22133
Reputation: 21
Posting this in case anyone needs it nowadays.
You can check it out here inside the Unpack Profile section.
A provisioning profile is a property list wrapped within a Cryptographic Message Syntax (CMS) signature. To view the original property list, remove the CMS wrapper using the security tool:
% security cms -D -i Profile_Explainer_iOS_Dev.mobileprovision -o Profile_Explainer_iOS_Dev-payload.plist
% cat Profile_Explainer_iOS_Dev-payload.plist
…
<dict>
… lots of properties …
</dict>
</plist>
Upvotes: 0
Reputation: 9243
You can also do a text dump by typing
security cms -D -i <prov>
FWIW
security
is to Administer Keychains, keys, certificates and the Security framework.
cms
is a command within the security
framework it stands for Cryptographic Message Syntax
-D
is for decoding
-i
means infile use infile as source of data (default: stdin)
Upvotes: 124
Reputation: 2244
Right click and select "Get Info". It will show you certificates, provisioned devices and entitlements.
Upvotes: 0
Reputation: 736
A number of Quick Look plug-ins have been developed to inspect provisioning profiles:
After installing, just select the provisioning profile file in Finder and press space!
Upvotes: 8
Reputation: 657
No need for an external app. The quickest and easiest way to observe the contents on a mac is by clicking on the profile in the Finder. The preview will list the following things (as well as others):
Upvotes: 7
Reputation: 35052
Simply select the embedded.mobileprovision
and Open With...
your favorite Text Editor. It may show a variety of encoding errors, but the parts you're concerned with, such as Entitlements and other keys, should be readily visible:
0Å *H÷ ¶0²10 +0 +0 Ì!YëýI¬nuèzÑöçö°
...
<plist version="1.0">
<dict>
<key>AppIDName</key>
<string>Your App Name</string>
...
<key>Entitlements</key>
<dict>
...
<key>aps-environment</key>
<string>production</string>
Upvotes: 3
Reputation: 3042
You can more
(or less
) it in the terminal (Applications -> Utilities -> Terminal). Just respond with y
to the question about viewing binary data.
The xml part is readable. For example you can view the ApplicationIdentifierPrefix
and the keychain-access-groups
. In the past those gave me some headaches.
Upvotes: 9