
Security News
vlt Launches "reproduce": A New Tool Challenging the Limits of Package Provenance
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
expo-permissions
Advanced tools
If you're using Cocoapods, add the dependency to your Podfile
:
pod 'EXPermissions'
and run pod install
.
Libraries
➜ Add Files to [your project's name]
node_modules
➜ expo-permissions
and add EXPermissions.xcodeproj
libEXPermissions.a
to your project's Build Phases
➜ Link Binary With Libraries
Cmd+R
).android/settings.gradle
:
include ':expo-permissions'
project(':expo-permissions').projectDir = new File(rootProject.projectDir, '../node_modules/expo-permissions/android')
and if not already included
include ':expo-permissions-interface'
project(':expo-permissions-interface').projectDir = new File(rootProject.projectDir, '../node_modules/expo-permissions-interface/android')
android/app/build.gradle
:
compile project(':expo-permissions')
and if not already included
compile project(':expo-permissions-interface')
When it comes to adding functionality that can access potentially sensitive information on a user's device, such as their location, or possibly send them possibly unwanted push notifications, you will need to ask the user for their permission first. Unless you've already asked their permission, then no need. And so we have the Permissions
module.
If you are deploying your app to the Apple iTunes Store, you should consider adding additional metadata to your app in order to customize the system permissions dialog and explain why your app requires permissions. See more info in the App Store Deployment Guide.
Permissions.getAsync(type)
Determines whether your app has already been granted access to the provided permission type.
Returns a Promise
that is resolved with the information about the permission, including status, expiration and scope (if it applies to the permission type).
import { Permissions } from 'expo-permissions';
async function alertIfRemoteNotificationsDisabledAsync() {
const { status } = await Permissions.getAsync(Permissions.NOTIFICATIONS);
if (status !== 'granted') {
alert('Hey! You might want to enable notifications for my app, they are good.');
}
}
Permissions.askAsync(type)
Prompt the user for a permission. If they have already granted access, response will be success.
Returns a Promise
that is resolved with the information about the permission, including status, expiration and scope (if it applies to the permission type).
import { Location } from 'expo';
import { Permissions } from 'expo-permissions';
async function getLocationAsync() {
const { status } = await Permissions.askAsync(Permissions.LOCATION);
if (status === 'granted') {
return Location.getCurrentPositionAsync({enableHighAccuracy: true});
} else {
throw new Error('Location permission not granted');
}
}
Permissions.NOTIFICATIONS
The permission type for user-facing notifications and remote push notifications.
Note: On iOS, asking for this permission asks the user not only for permission to register for push/remote notifications, but also for showing notifications as such. At the moment remote notifications will only be received when notifications are permitted to play a sound, change the app badge or be displayed as an alert. As iOS is more detailed when it comes to notifications permissions, this permission status will contain not only
status
andexpires
, but also Boolean values forallowsSound
,allowsAlert
andallowsBadge
.
Note: On iOS, this does not disambiguate
undetermined
fromdenied
and so will only ever returngranted
orundetermined
. This is due to the way the underlying native API is implemented.
Note: Android does not differentiate between permissions for local and remote notifications, so status of permission for
NOTIFICATIONS
should always be the same as the status forUSER_FACING_NOTIFICATIONS
.
Permissions.USER_FACING_NOTIFICATIONS
The permission type for user-facing notifications. This does not register your app to receive remote push notifications; see the NOTIFICATIONS
permission.
Note: iOS provides more detailed permissions, so the permission status will contain not only
status
andexpires
, but also Boolean values forallowsSound
,allowsAlert
andallowsBadge
.
Note: Android does not differentiate between permissions for local and remote notifications, so status of permission for
USER_FACING_NOTIFICATIONS
should always be the same as the status forNOTIFICATIONS
.
Permissions.LOCATION
The permission type for location access.
Permissions.CAMERA
The permission type for photo and video taking.
Permissions.AUDIO_RECORDING
The permission type for audio recording.
Permissions.CONTACTS
The permission type for reading contacts.
Permissions.CAMERA_ROLL
The permission type for reading or writing to the camera roll.
Permissions.CALENDAR
The permission type for reading or writing to the calendar.
Permissions.REMINDERS
The permission type for reading or writing reminders (iOS only).
FAQs
Allows you prompt for various permissions to access device sensors, personal data, etc.
The npm package expo-permissions receives a total of 7,424 weekly downloads. As such, expo-permissions popularity was classified as popular.
We found that expo-permissions demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 30 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
Research
Security News
Socket researchers uncovered a malicious PyPI package exploiting Deezer’s API to enable coordinated music piracy through API abuse and C2 server control.
Research
The Socket Research Team discovered a malicious npm package, '@ton-wallet/create', stealing cryptocurrency wallet keys from developers and users in the TON ecosystem.