Last active
September 15, 2024 17:58
-
-
Save brunerd/d9ea487b7d2faab9712a221592a2ee58 to your computer and use it in GitHub Desktop.
A hacky example to clean the com.apple.macl attribute from a file using zip to sidestep SIP on Catalina
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#clean the com.apple.macl attribute from a file or folders using zip to sidestep SIP on Catalina | |
#WARNING: This will overwrite the original file/folders with the zipped version - DO NOT use on production data | |
#hold down command key at launch or touch /tmp/debug to enable xtrace command expansion | |
commandKeyDown=$(/usr/bin/python -c 'import Cocoa; print Cocoa.NSEvent.modifierFlags() & Cocoa.NSCommandKeyMask > 1') | |
[ "$commandKeyDown" = "True" -o -f /tmp/debug ] && set -x && xtraceFlag=1 | |
#hacky example to clean the com.apple.macl attribute from a file using zip to sidestep SIP | |
: <<-EOL | |
MIT License | |
Copyright (c) 2020 Joel Bruner | |
Permission is hereby granted, free of charge, to any person obtaining a copy | |
of this software and associated documentation files (the "Software"), to deal | |
in the Software without restriction, including without limitation the rights | |
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
copies of the Software, and to permit persons to whom the Software is | |
furnished to do so, subject to the following conditions: | |
The above copyright notice and this permission notice shall be included in all | |
copies or substantial portions of the Software. | |
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | |
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | |
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | |
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | |
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | |
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE | |
SOFTWARE. | |
EOL | |
############# | |
# VARIABLES # | |
############# | |
target="${1}" | |
OSVersionString=$(sw_vers -productVersion) | |
majorVersion=$(cut -d. -f1 <<< $OSVersionString) | |
minorVersion=$(cut -d. -f2 <<< $OSVersionString) | |
############# | |
# FUNCTIONS # | |
############# | |
function maclZipClean | |
{ | |
local target="${1}" | |
local randomeZipName="maclClean-${RANDOM}.zip" | |
#separate the filename from the folder | |
local fileName="$(basename "$target")" | |
local fileFolder="$(dirname "$target")" | |
#go into the folder - this method avoid the parent folders above | |
cd "$fileFolder" | |
#make a zip in the home folder (the only guaranteed folder we have access to) of the filename | |
zip -r ~/"$randomeZipName" "$fileName" | |
local exitCode=$? | |
#if something goes wrong bail | |
if [ "${exitCode}" -ne 0 ]; then | |
echo "Something went wrong zipping $fileName (${exitCode}), exiting." | |
exit | |
fi | |
#otherwise remove the target we zipped | |
rm -rf "$target" | |
#unzip the zip file with the cleaned file(s) inside, overwriting/updating | |
unzip -u ~/"$randomeZipName" -d "$fileFolder" | |
#remove the temp zip | |
rm ~/"$randomeZipName" | |
} | |
function maclCleanXattr | |
{ | |
local target="${1}" | |
#perhaps you are running this script on 10.14 and under, why do it the hard way then?! | |
xattr -rd com.apple.macl "$target" | |
} | |
######## | |
# MAIN # | |
######## | |
#if we are 10.14 and below use xattr (Big Sur seems to let you but in some cases not, so err on caution) | |
if [ "${majorVersion}" -eq 10 ] && [ "${minorVersion}" -le 14 ]; then | |
maclCleanXattr "${target}" | |
#otherwise we'll do our nifty zip way | |
else | |
maclZipClean "${target}" | |
fi |
As mentioned above, you only need to use another app with access to the file to remove an existing MACL.
The only tricky case now is if you only have one Terminal app and you want to remove access from Terminal - there's a catch-22 in that you'll probably be trying to run xattr
from the same app you want to remove access from!
A workaround is you basically install another Terminal app, e.g. kitty
, that you can grant access to the directory to (or Full Disk Access), and finally run your xattr -d
or xattr -c
command.
thanks for this! I'm a fan of "bash strict mode" and suggest adding set -euo pipefail
at the top.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
I found that MACL attribute can be removed by executingxattr -d "com.apple.macl" filename
in Recovery Mode.It seems that MACL is not difficult to remove anymore, any progress can remove it if