Przeszukaj pomoc

Unikaj oszustw związanych z pomocą.Nigdy nie będziemy prosić Cię o dzwonienie na numer telefonu, wysyłanie SMS-ów ani o udostępnianie danych osobowych. Zgłoś podejrzaną aktywność, korzystając z opcji „Zgłoś nadużycie”.

Więcej informacji

Deploying Firefox ESR for Mac with policies.json

  • 1 odpowiedź
  • 1 osoba ma ten problem
  • 1 wyświetlenie
  • Ostatnia odpowiedź od D3xbot

more options

I'm working on building a deployment for Firefox 78.1.0 ESR in a mixed Windows/macOS environment. I've got a policies.json file that works, and was able to install it on Windows via a batch script that runs the installer MSI, creates the distribution directory, and copies the policies.json to that location.

Where I'm struggling is getting this deployed on the Mac side of things. I've followed the directions to apply policy and remove the quarantine here: https://support.mozilla.org/en-US/kb/deploying-firefox-customizations-macos While this works on my Mac, when I deploy it to my test collection (via AirDrop, Self-Service, or by running the PKG file made by JAMF Composer), macOS says the app is damaged and should be deleted.

Does anyone know a way around that?

I'm working on building a deployment for Firefox 78.1.0 ESR in a mixed Windows/macOS environment. I've got a policies.json file that works, and was able to install it on Windows via a batch script that runs the installer MSI, creates the distribution directory, and copies the policies.json to that location. Where I'm struggling is getting this deployed on the Mac side of things. I've followed the directions to apply policy and remove the quarantine here: https://support.mozilla.org/en-US/kb/deploying-firefox-customizations-macos While this works on ''my'' Mac, when I deploy it to my test collection (via AirDrop, Self-Service, or by running the PKG file made by JAMF Composer), macOS says the app is damaged and should be deleted. Does anyone know a way around that?

Wybrane rozwiązanie

In speaking with my supervisor, I found that in building a policy, I can instruct JAMF to install Firefox and run a script post-install. This allowed me to customize Firefox without worrying about signing apps or gatekeeper.

Script:

#! /bin/bash

cd /Applications mkdir ./Firefox.app/Contents/Resources/distribution printf "Your minified JSON\n formatted to Firefox's liking with printf" > ./Firefox.app/Contents/Resources/distribution/policies.json xattr -r -d com.apple.quarantine Firefox.app

Mind the whitespace - when I tried to collapse the spaces, Firefox did not like it. For instance: {

 "policies": {
   "Bookmarks": [
    {
     "Placement": "toolbar",
     "Title": "Google",
     "URL": "https://www.google.com"
    }
   ]
 }

} would become {\n "policies": {\n "Bookmarks": [\n {\n "Placement": "toolbar",\n "Title": "Google",\n "URL": "https://www.google.com"\n }\n ]\n }\n}

Przeczytaj tę odpowiedź w całym kontekście 👍 0

Wszystkie odpowiedzi (1)

more options

Wybrane rozwiązanie

In speaking with my supervisor, I found that in building a policy, I can instruct JAMF to install Firefox and run a script post-install. This allowed me to customize Firefox without worrying about signing apps or gatekeeper.

Script:

#! /bin/bash

cd /Applications mkdir ./Firefox.app/Contents/Resources/distribution printf "Your minified JSON\n formatted to Firefox's liking with printf" > ./Firefox.app/Contents/Resources/distribution/policies.json xattr -r -d com.apple.quarantine Firefox.app

Mind the whitespace - when I tried to collapse the spaces, Firefox did not like it. For instance: {

 "policies": {
   "Bookmarks": [
    {
     "Placement": "toolbar",
     "Title": "Google",
     "URL": "https://www.google.com"
    }
   ]
 }

} would become {\n "policies": {\n "Bookmarks": [\n {\n "Placement": "toolbar",\n "Title": "Google",\n "URL": "https://www.google.com"\n }\n ]\n }\n}