Disables permission verification for DEBUG builds

This commit is contained in:
Riley Testut
2023-05-26 15:19:34 -05:00
parent b2b0fd4c6f
commit 5bc8e609e8
2 changed files with 11 additions and 1 deletions

View File

@@ -1142,7 +1142,8 @@ private extension AppManager
/* Verify App */
let verifyOperation = VerifyAppOperation(permissionsMode: permissionReviewMode, context: context)
let permissionsMode = UserDefaults.shared.permissionCheckingDisabled ? .none : permissionReviewMode
let verifyOperation = VerifyAppOperation(permissionsMode: permissionsMode, context: context)
verifyOperation.resultHandler = { (result) in
do
{

View File

@@ -62,6 +62,8 @@ public extension UserDefaults
// Including "MacDirtyCow" in name triggers false positives with malware detectors 🤷
@NSManaged var isCowExploitSupported: Bool
@NSManaged var permissionCheckingDisabled: Bool
class func registerDefaults()
{
let ios13_5 = OperatingSystemVersion(majorVersion: 13, minorVersion: 5, patchVersion: 0)
@@ -80,6 +82,12 @@ public extension UserDefaults
(ProcessInfo.processInfo.isOperatingSystemAtLeast(ios14) && !ProcessInfo.processInfo.isOperatingSystemAtLeast(ios15_7_2)) ||
(ProcessInfo.processInfo.isOperatingSystemAtLeast(ios16) && !ProcessInfo.processInfo.isOperatingSystemAtLeast(ios16_2))
#if DEBUG
let permissionCheckingDisabled = true
#else
let permissionCheckingDisabled = false
#endif
let defaults = [
#keyPath(UserDefaults.isBackgroundRefreshEnabled): true,
#keyPath(UserDefaults.isLegacyDeactivationSupported): isLegacyDeactivationSupported,
@@ -88,6 +96,7 @@ public extension UserDefaults
#keyPath(UserDefaults.requiresAppGroupMigration): true,
#keyPath(UserDefaults.ignoreActiveAppsLimit): false,
#keyPath(UserDefaults.isCowExploitSupported): isMacDirtyCowSupported,
#keyPath(UserDefaults.permissionCheckingDisabled): permissionCheckingDisabled,
]
UserDefaults.standard.register(defaults: defaults)