<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>[283897] trunk/Source/WebKit</title>
</head>
<body>

<style type="text/css"><!--
#msg dl.meta { border: 1px #006 solid; background: #369; padding: 6px; color: #fff; }
#msg dl.meta dt { float: left; width: 6em; font-weight: bold; }
#msg dt:after { content:':';}
#msg dl, #msg dt, #msg ul, #msg li, #header, #footer, #logmsg { font-family: verdana,arial,helvetica,sans-serif; font-size: 10pt;  }
#msg dl a { font-weight: bold}
#msg dl a:link    { color:#fc3; }
#msg dl a:active  { color:#ff0; }
#msg dl a:visited { color:#cc6; }
h3 { font-family: verdana,arial,helvetica,sans-serif; font-size: 10pt; font-weight: bold; }
#msg pre { overflow: auto; background: #ffc; border: 1px #fa0 solid; padding: 6px; }
#logmsg { background: #ffc; border: 1px #fa0 solid; padding: 1em 1em 0 1em; }
#logmsg p, #logmsg pre, #logmsg blockquote { margin: 0 0 1em 0; }
#logmsg p, #logmsg li, #logmsg dt, #logmsg dd { line-height: 14pt; }
#logmsg h1, #logmsg h2, #logmsg h3, #logmsg h4, #logmsg h5, #logmsg h6 { margin: .5em 0; }
#logmsg h1:first-child, #logmsg h2:first-child, #logmsg h3:first-child, #logmsg h4:first-child, #logmsg h5:first-child, #logmsg h6:first-child { margin-top: 0; }
#logmsg ul, #logmsg ol { padding: 0; list-style-position: inside; margin: 0 0 0 1em; }
#logmsg ul { text-indent: -1em; padding-left: 1em; }#logmsg ol { text-indent: -1.5em; padding-left: 1.5em; }
#logmsg > ul, #logmsg > ol { margin: 0 0 1em 0; }
#logmsg pre { background: #eee; padding: 1em; }
#logmsg blockquote { border: 1px solid #fa0; border-left-width: 10px; padding: 1em 1em 0 1em; background: white;}
#logmsg dl { margin: 0; }
#logmsg dt { font-weight: bold; }
#logmsg dd { margin: 0; padding: 0 0 0.5em 0; }
#logmsg dd:before { content:'\00bb';}
#logmsg table { border-spacing: 0px; border-collapse: collapse; border-top: 4px solid #fa0; border-bottom: 1px solid #fa0; background: #fff; }
#logmsg table th { text-align: left; font-weight: normal; padding: 0.2em 0.5em; border-top: 1px dotted #fa0; }
#logmsg table td { text-align: right; border-top: 1px dotted #fa0; padding: 0.2em 0.5em; }
#logmsg table thead th { text-align: center; border-bottom: 1px solid #fa0; }
#logmsg table th.Corner { text-align: left; }
#logmsg hr { border: none 0; border-top: 2px dashed #fa0; height: 1px; }
#header, #footer { color: #fff; background: #636; border: 1px #300 solid; padding: 6px; }
#patch { width: 100%; }
#patch h4 {font-family: verdana,arial,helvetica,sans-serif;font-size:10pt;padding:8px;background:#369;color:#fff;margin:0;}
#patch .propset h4, #patch .binary h4 {margin:0;}
#patch pre {padding:0;line-height:1.2em;margin:0;}
#patch .diff {width:100%;background:#eee;padding: 0 0 10px 0;overflow:auto;}
#patch .propset .diff, #patch .binary .diff  {padding:10px 0;}
#patch span {display:block;padding:0 10px;}
#patch .modfile, #patch .addfile, #patch .delfile, #patch .propset, #patch .binary, #patch .copfile {border:1px solid #ccc;margin:10px 0;}
#patch ins {background:#dfd;text-decoration:none;display:block;padding:0 10px;}
#patch del {background:#fdd;text-decoration:none;display:block;padding:0 10px;}
#patch .lines, .info {color:#888;background:#fff;}
--></style>
<div id="msg">
<dl class="meta">
<dt>Revision</dt> <dd><a href="http://trac.webkit.org/projects/webkit/changeset/283897">283897</a></dd>
<dt>Author</dt> <dd>commit-queue@webkit.org</dd>
<dt>Date</dt> <dd>2021-10-11 09:04:38 -0700 (Mon, 11 Oct 2021)</dd>
</dl>

<h3>Log Message</h3>
<pre>Add AdAttributionDaemon sandbox on iOS
https://bugs.webkit.org/show_bug.cgi?id=231308

Patch by Alex Christensen <achristensen@webkit.org> on 2021-10-11
Reviewed by Brent Fulgham.

This makes it so that AdAttributionDaemon has enough permission to access the network and its storage file and not much else.

* Configurations/AdAttributionDaemon.xcconfig:
* Resources/SandboxProfiles/ios/com.apple.WebKit.AdAttributionDaemon.sb: Added.
* Scripts/process-entitlements.sh:
* Shared/EntryPointUtilities/Cocoa/Daemon/PCMDaemonEntryPoint.mm:
(WebKit::enterSandbox):
* WebKit.xcodeproj/project.pbxproj:</pre>

<h3>Modified Paths</h3>
<ul>
<li><a href="#trunkSourceWebKitChangeLog">trunk/Source/WebKit/ChangeLog</a></li>
<li><a href="#trunkSourceWebKitConfigurationsAdAttributionDaemonxcconfig">trunk/Source/WebKit/Configurations/AdAttributionDaemon.xcconfig</a></li>
<li><a href="#trunkSourceWebKitScriptsprocessentitlementssh">trunk/Source/WebKit/Scripts/process-entitlements.sh</a></li>
<li><a href="#trunkSourceWebKitSharedEntryPointUtilitiesCocoaDaemonPCMDaemonEntryPointmm">trunk/Source/WebKit/Shared/EntryPointUtilities/Cocoa/Daemon/PCMDaemonEntryPoint.mm</a></li>
<li><a href="#trunkSourceWebKitWebKitxcodeprojprojectpbxproj">trunk/Source/WebKit/WebKit.xcodeproj/project.pbxproj</a></li>
</ul>

<h3>Added Paths</h3>
<ul>
<li><a href="#trunkSourceWebKitResourcesSandboxProfilesioscomappleWebKitAdAttributionDaemonsb">trunk/Source/WebKit/Resources/SandboxProfiles/ios/com.apple.WebKit.AdAttributionDaemon.sb</a></li>
</ul>

</div>
<div id="patch">
<h3>Diff</h3>
<a id="trunkSourceWebKitChangeLog"></a>
<div class="modfile"><h4>Modified: trunk/Source/WebKit/ChangeLog (283896 => 283897)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/Source/WebKit/ChangeLog    2021-10-11 15:55:01 UTC (rev 283896)
+++ trunk/Source/WebKit/ChangeLog       2021-10-11 16:04:38 UTC (rev 283897)
</span><span class="lines">@@ -1,3 +1,19 @@
</span><ins>+2021-10-11  Alex Christensen  <achristensen@webkit.org>
+
+        Add AdAttributionDaemon sandbox on iOS
+        https://bugs.webkit.org/show_bug.cgi?id=231308
+
+        Reviewed by Brent Fulgham.
+
+        This makes it so that AdAttributionDaemon has enough permission to access the network and its storage file and not much else.
+
+        * Configurations/AdAttributionDaemon.xcconfig:
+        * Resources/SandboxProfiles/ios/com.apple.WebKit.AdAttributionDaemon.sb: Added.
+        * Scripts/process-entitlements.sh:
+        * Shared/EntryPointUtilities/Cocoa/Daemon/PCMDaemonEntryPoint.mm:
+        (WebKit::enterSandbox):
+        * WebKit.xcodeproj/project.pbxproj:
+
</ins><span class="cx"> 2021-10-11  Per Arne Vollan <pvollan@apple.com>
</span><span class="cx"> 
</span><span class="cx">         [iOS] Sort syscall filters in the WebContent process' sandbox
</span></span></pre></div>
<a id="trunkSourceWebKitConfigurationsAdAttributionDaemonxcconfig"></a>
<div class="modfile"><h4>Modified: trunk/Source/WebKit/Configurations/AdAttributionDaemon.xcconfig (283896 => 283897)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/Source/WebKit/Configurations/AdAttributionDaemon.xcconfig  2021-10-11 15:55:01 UTC (rev 283896)
+++ trunk/Source/WebKit/Configurations/AdAttributionDaemon.xcconfig     2021-10-11 16:04:38 UTC (rev 283897)
</span><span class="lines">@@ -28,5 +28,7 @@
</span><span class="cx"> OTHER_LDFLAGS = -framework WebKit;
</span><span class="cx"> FRAMEWORK_SEARCH_PATHS = $(BUILT_PRODUCTS_DIR);
</span><span class="cx"> 
</span><ins>+WK_PROCESSED_XCENT_FILE=$(TEMP_FILE_DIR)/$(FULL_PRODUCT_NAME).entitlements
+
</ins><span class="cx"> INSTALL_PATH[sdk=iphone*] = $(WEBKIT_FRAMEWORKS_DIR)/WebKit.framework/Daemons;
</span><span class="cx"> INSTALL_PATH[sdk=macosx*] = $(WEBKIT_FRAMEWORKS_DIR)/WebKit.framework/Versions/A/Daemons;
</span></span></pre></div>
<a id="trunkSourceWebKitResourcesSandboxProfilesioscomappleWebKitAdAttributionDaemonsb"></a>
<div class="addfile"><h4>Added: trunk/Source/WebKit/Resources/SandboxProfiles/ios/com.apple.WebKit.AdAttributionDaemon.sb (0 => 283897)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/Source/WebKit/Resources/SandboxProfiles/ios/com.apple.WebKit.AdAttributionDaemon.sb                                (rev 0)
+++ trunk/Source/WebKit/Resources/SandboxProfiles/ios/com.apple.WebKit.AdAttributionDaemon.sb   2021-10-11 16:04:38 UTC (rev 283897)
</span><span class="lines">@@ -0,0 +1,117 @@
</span><ins>+; Copyright (C) 2021 Apple Inc. All rights reserved.
+;
+; Redistribution and use in source and binary forms, with or without
+; modification, are permitted provided that the following conditions
+; are met:
+; 1. Redistributions of source code must retain the above copyright
+; notice, this list of conditions and the following disclaimer.
+; 2. Redistributions in binary form must reproduce the above copyright
+; notice, this list of conditions and the following disclaimer in the
+; documentation and/or other materials provided with the distribution.
+;
+; THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
+; AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
+; THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+; PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
+; BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+; CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+; SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+; INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+; CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+; ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
+; THE POSSIBILITY OF SUCH DAMAGE.
+
+(version 1)
+(deny default (with partial-symbolication))
+(allow system-audit file-read-metadata)
+
+(import "system.sb")
+
+(define (allow-read-write-directory-contents path)
+    (if path
+        (begin
+            (allow file-read* (subpath path))
+            (allow file-read* file-write*
+                (regex (string-append "^" (regex-quote path) "/")))
+            (allow file-write-create
+                file-write-data
+                (require-all (vnode-type DIRECTORY) (literal path))))))
+
+(define (allow-read-directory-and-issue-read-extensions path)
+    (if path
+        (begin
+            (allow file-read* (subpath path))
+            (allow file-issue-extension (require-all (extension-class "com.apple.app-sandbox.read") (subpath path))))))
+
+;; Utility functions for home directory relative path filters
+(define (home-regex home-relative-regex)
+    (regex (string-append "^" (regex-quote (param "HOME_DIR")) home-relative-regex)))
+
+(define (home-subpath home-relative-subpath)
+    (subpath (string-append (param "HOME_DIR") home-relative-subpath)))
+
+(define (home-literal home-relative-literal)
+    (literal (string-append (param "HOME_DIR") home-relative-literal)))
+
+(allow file-read* file-write* (home-subpath "/var/mobile/Library/com.apple.webkit.addattributiond/Version1"))
+
+(allow-read-write-directory-contents (param "DARWIN_USER_CACHE_DIR"))
+(allow-read-write-directory-contents (param "DARWIN_USER_TEMP_DIR"))
+
+(allow-read-directory-and-issue-read-extensions (param "FRAMEWORKS_DIR"))
+
+;; AWD
+(allow mach-lookup
+    (global-name
+        "com.apple.analyticsd"
+        "com.apple.awdd"))
+
+;; Various services required by CFNetwork and other frameworks
+(allow mach-lookup
+    (global-name
+        "com.apple.usymptomsd"
+        "com.apple.cookied"
+        "com.apple.distributed_notifications@Uv3"
+        "com.apple.CoreServices.coreservicesd"
+        "com.apple.lsd.mapdb"
+        "com.apple.lsd.modifydb"))
+
+;; Security framework
+(allow mach-lookup (global-name "com.apple.SecurityServer")
+(global-name "com.apple.ocspd"))
+(allow file-read*
+    (subpath "/Library/Keychains")
+    (subpath "/private/var/db/mds")
+    (literal "/Library/Preferences/com.apple.security.plist")
+    (home-literal "/Library/Preferences/com.apple.security.plist"))
+
+(allow file-read* (subpath "/usr/share/zoneinfo"))
+
+(allow file-read* (literal "/Library/Application Support/CrashReporter/SubmitDiagInfo.domains"))
+
+(allow ipc-posix-shm-read-data
+    (ipc-posix-name "com.apple.AppleDatabaseChanged"))
+(allow ipc-posix-shm-write-data
+    (ipc-posix-name "com.apple.AppleDatabaseChanged"))
+
+;; Read-only preferences and data
+(allow file-read*
+    ;; Basic system paths
+    (subpath "/Library/Managed Preferences")
+
+    ;; System and user preferences
+    (literal "/Library/Preferences/.GlobalPreferences.plist")
+    (home-literal "/Library/Preferences/.GlobalPreferences.plist")
+    (home-regex #"/Library/Preferences/ByHost/\.GlobalPreferences\."))
+
+(allow system-fsctl (fsctl-command (_IO "h" 47)))
+
+(system-network)
+(allow network-outbound
+    ;; Local mDNSResponder for DNS, arbitrary outbound TCP
+    (literal "/private/var/run/mDNSResponder")
+    (remote tcp))
+
+;; Needed for CFNetworkAgent, see 33386291
+(allow mach-lookup
+    (global-name "com.apple.cfnetwork.cfnetworkagent"))
</ins></span></pre></div>
<a id="trunkSourceWebKitScriptsprocessentitlementssh"></a>
<div class="modfile"><h4>Modified: trunk/Source/WebKit/Scripts/process-entitlements.sh (283896 => 283897)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/Source/WebKit/Scripts/process-entitlements.sh      2021-10-11 15:55:01 UTC (rev 283896)
+++ trunk/Source/WebKit/Scripts/process-entitlements.sh 2021-10-11 16:04:38 UTC (rev 283897)
</span><span class="lines">@@ -368,6 +368,12 @@
</span><span class="cx">     plistbuddy Add :seatbelt-profiles:0 string com.apple.WebKit.WebAuthn
</span><span class="cx"> }
</span><span class="cx"> 
</span><ins>+function ios_family_process_adattributiond_entitlements()
+{
+    plistbuddy Add :seatbelt-profiles array
+    plistbuddy Add :seatbelt-profiles:0 string com.apple.WebKit.AdAttributionDaemon
+}
+
</ins><span class="cx"> function ios_family_process_network_entitlements()
</span><span class="cx"> {
</span><span class="cx">     plistbuddy Add :com.apple.private.webkit.adattributiondaemon bool YES
</span><span class="lines">@@ -405,7 +411,9 @@
</span><span class="cx"> # Simulator entitlements should be added to Resources/ios/XPCService-ios-simulator.entitlements
</span><span class="cx"> if [[ "${WK_PLATFORM_NAME}" =~ .*simulator ]]
</span><span class="cx"> then
</span><del>-    cp "${CODE_SIGN_ENTITLEMENTS}" "${WK_PROCESSED_XCENT_FILE}"
</del><ins>+    if [[ "${PRODUCT_NAME}" != AdAttributionDaemon ]]; then
+        cp "${CODE_SIGN_ENTITLEMENTS}" "${WK_PROCESSED_XCENT_FILE}"
+    fi
</ins><span class="cx"> elif [[ "${WK_PLATFORM_NAME}" == macosx ]]
</span><span class="cx"> then
</span><span class="cx">     [[ "${RC_XBS}" != YES ]] && plistbuddy Add :com.apple.security.get-task-allow bool YES
</span><span class="lines">@@ -439,6 +447,8 @@
</span><span class="cx">     elif [[ "${PRODUCT_NAME}" == com.apple.WebKit.Plugin.64 ]]; then ios_family_process_plugin_entitlements
</span><span class="cx">     elif [[ "${PRODUCT_NAME}" == com.apple.WebKit.GPU ]]; then ios_family_process_gpu_entitlements
</span><span class="cx">     elif [[ "${PRODUCT_NAME}" == com.apple.WebKit.WebAuthn ]]; then ios_family_process_webauthn_entitlements
</span><ins>+    elif [[ "${PRODUCT_NAME}" == AdAttributionDaemon ]]; then
+        ios_family_process_adattributiond_entitlements
</ins><span class="cx">     else echo "Unsupported/unknown product: ${PRODUCT_NAME}"
</span><span class="cx">     fi
</span><span class="cx"> else
</span></span></pre></div>
<a id="trunkSourceWebKitSharedEntryPointUtilitiesCocoaDaemonPCMDaemonEntryPointmm"></a>
<div class="modfile"><h4>Modified: trunk/Source/WebKit/Shared/EntryPointUtilities/Cocoa/Daemon/PCMDaemonEntryPoint.mm (283896 => 283897)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/Source/WebKit/Shared/EntryPointUtilities/Cocoa/Daemon/PCMDaemonEntryPoint.mm       2021-10-11 15:55:01 UTC (rev 283896)
+++ trunk/Source/WebKit/Shared/EntryPointUtilities/Cocoa/Daemon/PCMDaemonEntryPoint.mm  2021-10-11 16:04:38 UTC (rev 283897)
</span><span class="lines">@@ -125,7 +125,9 @@
</span><span class="cx"> 
</span><span class="cx"> static void enterSandbox()
</span><span class="cx"> {
</span><ins>+#if PLATFORM(MAC)
</ins><span class="cx">     // FIXME: Enter a sandbox here. We should only need read/write access to our database and network access and nothing else.
</span><ins>+#endif
</ins><span class="cx"> }
</span><span class="cx"> 
</span><span class="cx"> int PCMDaemonMain(int argc, const char** argv)
</span></span></pre></div>
<a id="trunkSourceWebKitWebKitxcodeprojprojectpbxproj"></a>
<div class="modfile"><h4>Modified: trunk/Source/WebKit/WebKit.xcodeproj/project.pbxproj (283896 => 283897)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/Source/WebKit/WebKit.xcodeproj/project.pbxproj     2021-10-11 15:55:01 UTC (rev 283896)
+++ trunk/Source/WebKit/WebKit.xcodeproj/project.pbxproj        2021-10-11 16:04:38 UTC (rev 283897)
</span><span class="lines">@@ -4505,6 +4505,7 @@
</span><span class="cx">          5C1427141C23F8B000D41183 /* LegacyCustomProtocolManager.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = LegacyCustomProtocolManager.h; sourceTree = "<group>"; };
</span><span class="cx">          5C1427151C23F8B000D41183 /* LegacyCustomProtocolManager.messages.in */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text; path = LegacyCustomProtocolManager.messages.in; sourceTree = "<group>"; };
</span><span class="cx">          5C14271B1C23F8CC00D41183 /* LegacyCustomProtocolManagerCocoa.mm */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.cpp.objcpp; path = LegacyCustomProtocolManagerCocoa.mm; sourceTree = "<group>"; };
</span><ins>+               5C1578E5270E0DBC00ED5280 /* com.apple.WebKit.AdAttributionDaemon.sb */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text; path = com.apple.WebKit.AdAttributionDaemon.sb; sourceTree = "<group>"; };
</ins><span class="cx">           5C19A51E1FD0B14600EEA323 /* URLSchemeTaskParameters.cpp */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.cpp.cpp; path = URLSchemeTaskParameters.cpp; sourceTree = "<group>"; };
</span><span class="cx">          5C19A51F1FD0B14700EEA323 /* URLSchemeTaskParameters.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = URLSchemeTaskParameters.h; sourceTree = "<group>"; };
</span><span class="cx">          5C1B38DF2667140700B1545B /* WebPageNetworkParameters.h */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; path = WebPageNetworkParameters.h; sourceTree = "<group>"; };
</span><span class="lines">@@ -9994,6 +9995,7 @@
</span><span class="cx">          A78CCDD6193AC9E3005ECC25 /* ios */ = {
</span><span class="cx">                  isa = PBXGroup;
</span><span class="cx">                  children = (
</span><ins>+                               5C1578E5270E0DBC00ED5280 /* com.apple.WebKit.AdAttributionDaemon.sb */,
</ins><span class="cx">                           2DB96052239886B900102791 /* com.apple.WebKit.GPU.sb */,
</span><span class="cx">                          A78CCDD8193AC9E3005ECC25 /* com.apple.WebKit.Networking.sb */,
</span><span class="cx">                          57EFC77D2550EB8500F9477D /* com.apple.WebKit.WebAuthn.sb */,
</span><span class="lines">@@ -13505,6 +13507,7 @@
</span><span class="cx">                          5CAF7A9C26F93A750003F19E /* Headers */,
</span><span class="cx">                          5CAF7A9D26F93A750003F19E /* Sources */,
</span><span class="cx">                          5CAF7A9F26F93A750003F19E /* Frameworks */,
</span><ins>+                               5C1578E6270E129400ED5280 /* Process AdAttributionDaemon Entitlements */,
</ins><span class="cx">                   );
</span><span class="cx">                  buildRules = (
</span><span class="cx">                  );
</span><span class="lines">@@ -14011,6 +14014,7 @@
</span><span class="cx">                          "$(SRCROOT)/Resources/SandboxProfiles/ios/com.apple.WebKit.Networking.sb",
</span><span class="cx">                          "$(SRCROOT)/Resources/SandboxProfiles/ios/com.apple.WebKit.GPU.sb",
</span><span class="cx">                          "$(SRCROOT)/Resources/SandboxProfiles/ios/com.apple.WebKit.WebAuthn.sb",
</span><ins>+                               "$(SRCROOT)/Resources/SandboxProfiles/ios/com.apple.WebKit.AdAttributionDaemon.sb",
</ins><span class="cx">                   );
</span><span class="cx">                  name = "Copy iOS Sandbox Profiles for Manual Sandboxing";
</span><span class="cx">                  outputPaths = (
</span><span class="lines">@@ -14132,6 +14136,26 @@
</span><span class="cx">                  shellPath = /bin/sh;
</span><span class="cx">                  shellScript = "Scripts/process-entitlements.sh\n";
</span><span class="cx">          };
</span><ins>+               5C1578E6270E129400ED5280 /* Process AdAttributionDaemon Entitlements */ = {
+                       isa = PBXShellScriptBuildPhase;
+                       buildActionMask = 2147483647;
+                       files = (
+                       );
+                       inputFileListPaths = (
+                       );
+                       inputPaths = (
+                               "$(SRCROOT)/Scripts/process-entitlements.sh",
+                       );
+                       name = "Process AdAttributionDaemon Entitlements";
+                       outputFileListPaths = (
+                       );
+                       outputPaths = (
+                               "$(WK_PROCESSED_XCENT_FILE)",
+                       );
+                       runOnlyForDeploymentPostprocessing = 0;
+                       shellPath = /bin/sh;
+                       shellScript = "Scripts/process-entitlements.sh\n";
+               };
</ins><span class="cx">           5DF408C5131DD46700130071 /* Check For Weak VTables and Externals */ = {
</span><span class="cx">                  isa = PBXShellScriptBuildPhase;
</span><span class="cx">                  buildActionMask = 2147483647;
</span></span></pre>
</div>
</div>

</body>
</html>