Summary
The runtime blocker from #754 appears fixed, but the official Homebrew path is still blocked by macOS distribution/signing state.
As of April 24, 2026, the latest macOS arm64 release binary from v14.2.1 now runs successfully with --version, so the earlier exit 137 problem is gone.
However, the macOS asset still does not appear to be Gatekeeper-clean enough for an official Homebrew submission.
Current state
What now works:
curl -fL https://github.com/can1357/oh-my-pi/releases/download/v14.2.1/omp-darwin-arm64 -o /tmp/omp-darwin-arm64
chmod +x /tmp/omp-darwin-arm64
TMP_HOME=$(mktemp -d)
HOME="$TMP_HOME" /tmp/omp-darwin-arm64 --version
Observed:
What still looks wrong for distribution quality:
spctl -a -t exec -vv /tmp/omp-darwin-arm64
Observed on this machine:
internal error in Code Signing subsystem
codesign -dv --verbose=4 on the same binary reports an ad-hoc signature rather than a normal Developer ID distribution signature.
Why this matters for Homebrew
Homebrew policy still makes this relevant even though the binary now launches:
homebrew/cask rejects software that fails with Gatekeeper enabled on Apple Silicon Macs.
- Open-source CLI-only software should still try
homebrew/core first.
- But even if
homebrew/core ends up being rejected for source-build/distribution reasons, the fallback homebrew-cask route still needs macOS assets that are clean under Gatekeeper.
So the next real blocker is no longer runtime correctness. It is release signing/notarization quality.
What upstream likely needs to do
-
Use a real Apple Developer distribution identity
- obtain or use a
Developer ID Application certificate
- if a
.pkg installer is used, also use a Developer ID Installer certificate
-
Sign the shipped macOS artifacts properly
- sign
omp-darwin-arm64 and omp-darwin-x64 with Developer ID
- include hardened runtime
- include secure timestamps
- if sidecar
.node files remain part of the macOS release story, sign those too
-
Ship a notarization-friendly macOS deliverable
- ideally a
.pkg
- otherwise a
.zip or .dmg
- a raw standalone executable is awkward here because stapling is not available for standalone binaries
-
Notarize the macOS deliverable
- submit with
xcrun notarytool submit ... --wait
- staple when the format supports it (
.pkg, .dmg, .app)
-
Add release validation in CI
- verify signature with
codesign --verify --strict --verbose=4
- verify Gatekeeper assessment with
spctl -a -t exec -vv or spctl -a -t install -vv depending on artifact type
- verify actual launch on a clean runtime home with
--version
Suggested acceptance criteria
- The latest macOS arm64 release artifact passes
codesign --verify --strict --verbose=4.
- The latest macOS arm64 release artifact has a clean
spctl assessment on Apple Silicon.
- A clean download of the shipped macOS artifact runs
omp --version successfully.
- The release workflow documents or automates signing + notarization.
- We can make a credible official Homebrew attempt afterward.
Maintainer feedback wanted
The remaining work looks like Apple Developer signing/notarization setup rather than application logic. Are you open to adding Developer ID signing + notarization to the macOS release workflow so the project can move forward with an official Homebrew submission?
References
Summary
The runtime blocker from #754 appears fixed, but the official Homebrew path is still blocked by macOS distribution/signing state.
As of April 24, 2026, the latest macOS arm64 release binary from
v14.2.1now runs successfully with--version, so the earlierexit 137problem is gone.However, the macOS asset still does not appear to be Gatekeeper-clean enough for an official Homebrew submission.
Current state
What now works:
Observed:
What still looks wrong for distribution quality:
spctl -a -t exec -vv /tmp/omp-darwin-arm64Observed on this machine:
codesign -dv --verbose=4on the same binary reports an ad-hoc signature rather than a normal Developer ID distribution signature.Why this matters for Homebrew
Homebrew policy still makes this relevant even though the binary now launches:
homebrew/caskrejects software that fails with Gatekeeper enabled on Apple Silicon Macs.homebrew/corefirst.homebrew/coreends up being rejected for source-build/distribution reasons, the fallbackhomebrew-caskroute still needs macOS assets that are clean under Gatekeeper.So the next real blocker is no longer runtime correctness. It is release signing/notarization quality.
What upstream likely needs to do
Use a real Apple Developer distribution identity
Developer ID Applicationcertificate.pkginstaller is used, also use aDeveloper ID InstallercertificateSign the shipped macOS artifacts properly
omp-darwin-arm64andomp-darwin-x64with Developer ID.nodefiles remain part of the macOS release story, sign those tooShip a notarization-friendly macOS deliverable
.pkg.zipor.dmgNotarize the macOS deliverable
xcrun notarytool submit ... --wait.pkg,.dmg,.app)Add release validation in CI
codesign --verify --strict --verbose=4spctl -a -t exec -vvorspctl -a -t install -vvdepending on artifact type--versionSuggested acceptance criteria
codesign --verify --strict --verbose=4.spctlassessment on Apple Silicon.omp --versionsuccessfully.Maintainer feedback wanted
The remaining work looks like Apple Developer signing/notarization setup rather than application logic. Are you open to adding Developer ID signing + notarization to the macOS release workflow so the project can move forward with an official Homebrew submission?
References