-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: Capability Access Parser doesn't seem to find anything useful for our app #30
Comments
Just to confirm, between your step 1 (start-profiling) and step 2 (stop-profiling), did you use your application? What action did you try? For example, you said maybe some file is accessed, what file did you access during your app execution? |
@tiangao-ms Good catch. I updated the repro steps above with the activities I performed. Source code is also available if needed. |
Another thing to confirm, sorry if it was obvious. Did you package your app according to the instructions? For the app you executed, did you change the manifest? Do you mind sharing the manifest after your change? |
Oh I did not make any changes. That part of the documentation was unclear to me and read like I just needed to generally have a MSIX packaged app. I'll re-read it more carefully, sounds like I missed something :( |
LOL that's fine. Let us know if there are specific parts that are confusing to you, we can make improvements. In order to isolate your app, you need to edit your manifest(not only "package it to MSIX") so your app can run at low privilege. Only with these changes, can you profile your app and check the accesses from your app. |
OK sounds like I have to modify the app as listed here: https://github.com/microsoft/win32-app-isolation/blob/main/docs/packaging/msix-packaging-tool.md#msix---isolated-win32 It's very strange that I have to silo my app, before knowing what capabilities I need, to profile my app, to then get a list of capabilities I need. |
Yes, we are aware that it is probably not the most intuitive process, but without isolating your app first, we can't intercept the "unordinary accesses" from your app (because it has access to everything) so we can't profile what capabilities the app needs. It's permissive learning mode. |
Manifesting our app is not compatible with our dev workflow (#31) but I was able to get it working. Closing this issue as resolved. |
Version
Windows vNext: 25375.1
Win32 App Isolation: 0.1.0
Developer mode enabled
Repro Steps
Start-Profiling -PackageFullName 40459File-New-Project.EarTrumpet_2.2.2.38_x86__725pr5jq8wr8a
Stop-Profiling -TracePath eartrumpet.etl
Get-ProfilingResults -ETLFilePaths eartrumpet.etl -ManifestPath "C:\Program Files\WindowsApps\40459File-New-Project.EarTrumpet_2.2.2.38_x86__725pr5jq8wr8a\AppxManifest.xml"
AccessAttemptRecords.csv
generatedsummary.txt
generated and looks like copy included belowExpected to see capabilities around system tray access and perhaps writing to the disk/registry + shelling out to launch control panel applets/windows processes.
Unexpected Results
The text was updated successfully, but these errors were encountered: