DeBleeder Terminal Commands Components

The following instructions are instructions for using the terminal in OSX to deal with the security issues introduced in Mojave and Catalina. To run them goto your application folder and then into the utilities folder, in this folder you will see the program called terminal, launch that. These instructions assume you have already placed the file in the appropriate directory using the finder. This FAQ https://wilkinsonaudio.com/pages/debleeder-faq describes at the bottom how to make the finder reveal hidden folders. Once the component file is moved to  the 

/Library/Audio/Plug-Ins/Components  folder these commands can than be used.  Note Catalina must use only the 64 bit version so don't put the 32 bit version in as well. 

Copy and paste each line one at time into the terminal and hit return after pasting it in


cd /Library/Audio/Plug-Ins/Components 

(Note if you are using Studio One its default location is different, they place the files in the library under the username. If this is the case you need the file in that location and the above command would change to cd ~/Library/Audio/Plug-Ins/Components )


ls -l@

You should see DeBleeder_64.component displayed as an output. If it not there you have placed it in the wrong place. Remember there are actually 2 libraries one under the username and one under the main hard drive name, you want to have it under the main hard drive name normally. Probably the DeBleeder_64.component file will have an attribute called com.apple.quarantine showing on it. This attribute needs to be removed. The following command does that. 


xattr -d com.apple.quarantine DeBleeder_64.component

 ls -l@

You should see DeBleeder_64.component in still there but it should no longer have the com.apple.quarantine flag on it.

Reboot your mac.

Run Logic it should be there will be under Wilkinson Audio DeBleeder

 

For those not familiar with the use of the terminal this video should be of help. May put you to sleep but covers the use of the terminal and these commands. 

https://drive.google.com/file/d/1cA-Eh18XQoG7sSpPxhOMbyiIDa1PFAbO/view?usp=share_link