* refactor: introduce provider plugin registry * refactor: move provider CLI to plugins * docs: add provider plugin implementation notes * refactor: shift provider runtime logic into plugins * refactor: add plugin defaults and summaries * docs: update provider plugin notes * feat(commands): add /commands slash list * Auto-reply: tidy help message * Auto-reply: fix status command lint * Tests: align google shared expectations * Auto-reply: tidy help message * Auto-reply: fix status command lint * refactor: move provider routing into plugins * test: align agent routing expectations * docs: update provider plugin notes * refactor: route replies via provider plugins * docs: note route-reply plugin hooks * refactor: extend provider plugin contract * refactor: derive provider status from plugins * refactor: unify gateway provider control * refactor: use plugin metadata in auto-reply * fix: parenthesize cron target selection * refactor: derive gateway methods from plugins * refactor: generalize provider logout * refactor: route provider logout through plugins * refactor: move WhatsApp web login methods into plugin * refactor: generalize provider log prefixes * refactor: centralize default chat provider * refactor: derive provider lists from registry * refactor: move provider reload noops into plugins * refactor: resolve web login provider via alias * refactor: derive CLI provider options from plugins * refactor: derive prompt provider list from plugins * style: apply biome lint fixes * fix: resolve provider routing edge cases * docs: update provider plugin refactor notes * fix(gateway): harden agent provider routing * refactor: move provider routing into plugins * refactor: move provider CLI to plugins * refactor: derive provider lists from registry * fix: restore slash command parsing * refactor: align provider ids for schema * refactor: unify outbound target resolution * fix: keep outbound labels stable * feat: add msteams to cron surfaces * fix: clean up lint build issues * refactor: localize chat provider alias normalization * refactor: drive gateway provider lists from plugins * docs: update provider plugin notes * style: format message-provider * fix: avoid provider registry init cycles * style: sort message-provider imports * fix: relax provider alias map typing * refactor: move provider routing into plugins * refactor: add plugin pairing/config adapters * refactor: route pairing and provider removal via plugins * refactor: align auto-reply provider typing * test: stabilize telegram media mocks * docs: update provider plugin refactor notes * refactor: pluginize outbound targets * refactor: pluginize provider selection * refactor: generalize text chunk limits * docs: update provider plugin notes * refactor: generalize group session/config * fix: normalize provider id for room detection * fix: avoid provider init in system prompt * style: formatting cleanup * refactor: normalize agent delivery targets * test: update outbound delivery labels * chore: fix lint regressions * refactor: extend provider plugin adapters * refactor: move elevated/block streaming defaults to plugins * refactor: defer outbound send deps to plugins * docs: note plugin-driven streaming/elevated defaults * refactor: centralize webchat provider constant * refactor: add provider setup adapters * refactor: delegate provider add config to plugins * docs: document plugin-driven provider add * refactor: add plugin state/binding metadata * refactor: build agent provider status from plugins * docs: note plugin-driven agent bindings * refactor: centralize internal provider constant usage * fix: normalize WhatsApp targets for groups and E.164 (#631) (thanks @imfing) * refactor: centralize default chat provider * refactor: centralize WhatsApp target normalization * refactor: move provider routing into plugins * refactor: normalize agent delivery targets * chore: fix lint regressions * fix: normalize WhatsApp targets for groups and E.164 (#631) (thanks @imfing) * feat: expand provider plugin adapters * refactor: route auto-reply via provider plugins * fix: align WhatsApp target normalization * fix: normalize WhatsApp targets for groups and E.164 (#631) (thanks @imfing) * refactor: centralize WhatsApp target normalization * feat: add /config chat config updates * docs: add /config get alias * feat(commands): add /commands slash list * refactor: centralize default chat provider * style: apply biome lint fixes * chore: fix lint regressions * fix: clean up whatsapp allowlist typing * style: format config command helpers * refactor: pluginize tool threading context * refactor: normalize session announce targets * docs: note new plugin threading and announce hooks * refactor: pluginize message actions * docs: update provider plugin actions notes * fix: align provider action adapters * refactor: centralize webchat checks * style: format message provider helpers * refactor: move provider onboarding into adapters * docs: note onboarding provider adapters * feat: add msteams onboarding adapter * style: organize onboarding imports * fix: normalize msteams allowFrom types * feat: add plugin text chunk limits * refactor: use plugin chunk limit fallbacks * feat: add provider mention stripping hooks * style: organize provider plugin type imports * refactor: generalize health snapshots * refactor: update macOS health snapshot handling * docs: refresh health snapshot notes * style: format health snapshot updates * refactor: drive security warnings via plugins * docs: note provider security adapter * style: format provider security adapters * refactor: centralize provider account defaults * refactor: type gateway client identity constants * chore: regen gateway protocol swift * fix: degrade health on failed provider probe * refactor: centralize pairing approve hint * docs: add plugin CLI command references * refactor: route auth and tool sends through plugins * docs: expand provider plugin hooks * refactor: document provider docking touchpoints * refactor: normalize internal provider defaults * refactor: streamline outbound delivery wiring * refactor: make provider onboarding plugin-owned * refactor: support provider-owned agent tools * refactor: move telegram draft chunking into telegram module * refactor: infer provider tool sends via extractToolSend * fix: repair plugin onboarding imports * refactor: de-dup outbound target normalization * style: tidy plugin and agent imports * refactor: data-drive provider selection line * fix: satisfy lint after provider plugin rebase * test: deflake gateway-cli coverage * style: format gateway-cli coverage test * refactor(provider-plugins): simplify provider ids * test(pairing-cli): avoid provider-specific ternary * style(macos): swiftformat HealthStore * refactor(sandbox): derive provider tool denylist * fix(sandbox): avoid plugin init in defaults * refactor(provider-plugins): centralize provider aliases * style(test): satisfy biome * refactor(protocol): v3 providers.status maps * refactor(ui): adapt to protocol v3 * refactor(macos): adapt to protocol v3 * test: update providers.status v3 fixtures * refactor(gateway): map provider runtime snapshot * test(gateway): update reload runtime snapshot * refactor(whatsapp): normalize heartbeat provider id * docs(refactor): update provider plugin notes * style: satisfy biome after rebase * fix: describe sandboxed elevated in prompt * feat(gateway): add agent image attachments + live probe * refactor: derive CLI provider options from plugins * fix(gateway): harden agent provider routing * fix(gateway): harden agent provider routing * refactor: align provider ids for schema * fix(protocol): keep agent provider string * fix(gateway): harden agent provider routing * fix(protocol): keep agent provider string * refactor: normalize agent delivery targets * refactor: support provider-owned agent tools * refactor(config): provider-keyed elevated allowFrom * style: satisfy biome * fix(gateway): appease provider narrowing * style: satisfy biome * refactor(reply): move group intro hints into plugin * fix(reply): avoid plugin registry init cycle * refactor(providers): add lightweight provider dock * refactor(gateway): use typed client id in connect * refactor(providers): document docks and avoid init cycles * refactor(providers): make media limit helper generic * fix(providers): break plugin registry import cycles * style: satisfy biome * refactor(status-all): build providers table from plugins * refactor(gateway): delegate web login to provider plugin * refactor(provider): drop web alias * refactor(provider): lazy-load monitors * style: satisfy lint/format * style: format status-all providers table * style: swiftformat gateway discovery model * test: make reload plan plugin-driven * fix: avoid token stringification in status-all * refactor: make provider IDs explicit in status * feat: warn on signal/imessage provider runtime errors * test: cover gateway provider runtime warnings in status * fix: add runtime kind to provider status issues * test: cover health degradation on probe failure * fix: keep routeReply lightweight * style: organize routeReply imports * refactor(web): extract auth-store helpers * refactor(whatsapp): lazy login imports * refactor(outbound): route replies via plugin outbound * docs: update provider plugin notes * style: format provider status issues * fix: make sandbox scope warning wrap-safe * refactor: load outbound adapters from provider plugins * docs: update provider plugin outbound notes * style(macos): fix swiftformat lint * docs: changelog for provider plugins * fix(macos): satisfy swiftformat * fix(macos): open settings via menu action * style: format after rebase * fix(macos): open Settings via menu action --------- Co-authored-by: LK <luke@kyohere.com> Co-authored-by: Luke K (pr-0f3t) <2609441+lc0rp@users.noreply.github.com> Co-authored-by: Xin <xin@imfing.com>
507 lines
17 KiB
Swift
507 lines
17 KiB
Swift
import AppKit
|
|
import ApplicationServices
|
|
import AVFoundation
|
|
import ClawdbotIPC
|
|
import CoreGraphics
|
|
import CoreLocation
|
|
import Foundation
|
|
import Observation
|
|
import Speech
|
|
import UserNotifications
|
|
|
|
enum PermissionManager {
|
|
static func isLocationAuthorized(status: CLAuthorizationStatus, requireAlways: Bool) -> Bool {
|
|
if requireAlways { return status == .authorizedAlways }
|
|
switch status {
|
|
case .authorizedAlways, .authorizedWhenInUse:
|
|
return true
|
|
case .authorized: // deprecated, but still shows up on some macOS versions
|
|
return true
|
|
default:
|
|
return false
|
|
}
|
|
}
|
|
|
|
static func ensure(_ caps: [Capability], interactive: Bool) async -> [Capability: Bool] {
|
|
var results: [Capability: Bool] = [:]
|
|
for cap in caps {
|
|
results[cap] = await self.ensureCapability(cap, interactive: interactive)
|
|
}
|
|
return results
|
|
}
|
|
|
|
private static func ensureCapability(_ cap: Capability, interactive: Bool) async -> Bool {
|
|
switch cap {
|
|
case .notifications:
|
|
await self.ensureNotifications(interactive: interactive)
|
|
case .appleScript:
|
|
await self.ensureAppleScript(interactive: interactive)
|
|
case .accessibility:
|
|
await self.ensureAccessibility(interactive: interactive)
|
|
case .screenRecording:
|
|
await self.ensureScreenRecording(interactive: interactive)
|
|
case .microphone:
|
|
await self.ensureMicrophone(interactive: interactive)
|
|
case .speechRecognition:
|
|
await self.ensureSpeechRecognition(interactive: interactive)
|
|
case .camera:
|
|
await self.ensureCamera(interactive: interactive)
|
|
case .location:
|
|
await self.ensureLocation(interactive: interactive)
|
|
}
|
|
}
|
|
|
|
private static func ensureNotifications(interactive: Bool) async -> Bool {
|
|
let center = UNUserNotificationCenter.current()
|
|
let settings = await center.notificationSettings()
|
|
|
|
switch settings.authorizationStatus {
|
|
case .authorized, .provisional, .ephemeral:
|
|
return true
|
|
case .notDetermined:
|
|
guard interactive else { return false }
|
|
let granted = await (try? center.requestAuthorization(options: [.alert, .sound, .badge])) ?? false
|
|
let updated = await center.notificationSettings()
|
|
return granted &&
|
|
(updated.authorizationStatus == .authorized || updated.authorizationStatus == .provisional)
|
|
case .denied:
|
|
if interactive {
|
|
NotificationPermissionHelper.openSettings()
|
|
}
|
|
return false
|
|
@unknown default:
|
|
return false
|
|
}
|
|
}
|
|
|
|
private static func ensureAppleScript(interactive: Bool) async -> Bool {
|
|
let granted = await MainActor.run { AppleScriptPermission.isAuthorized() }
|
|
if interactive, !granted {
|
|
await AppleScriptPermission.requestAuthorization()
|
|
}
|
|
return await MainActor.run { AppleScriptPermission.isAuthorized() }
|
|
}
|
|
|
|
private static func ensureAccessibility(interactive: Bool) async -> Bool {
|
|
let trusted = await MainActor.run { AXIsProcessTrusted() }
|
|
if interactive, !trusted {
|
|
await MainActor.run {
|
|
let opts: NSDictionary = ["AXTrustedCheckOptionPrompt": true]
|
|
_ = AXIsProcessTrustedWithOptions(opts)
|
|
}
|
|
}
|
|
return await MainActor.run { AXIsProcessTrusted() }
|
|
}
|
|
|
|
private static func ensureScreenRecording(interactive: Bool) async -> Bool {
|
|
let granted = ScreenRecordingProbe.isAuthorized()
|
|
if interactive, !granted {
|
|
await ScreenRecordingProbe.requestAuthorization()
|
|
}
|
|
return ScreenRecordingProbe.isAuthorized()
|
|
}
|
|
|
|
private static func ensureMicrophone(interactive: Bool) async -> Bool {
|
|
let status = AVCaptureDevice.authorizationStatus(for: .audio)
|
|
switch status {
|
|
case .authorized:
|
|
return true
|
|
case .notDetermined:
|
|
guard interactive else { return false }
|
|
return await AVCaptureDevice.requestAccess(for: .audio)
|
|
case .denied, .restricted:
|
|
if interactive {
|
|
MicrophonePermissionHelper.openSettings()
|
|
}
|
|
return false
|
|
@unknown default:
|
|
return false
|
|
}
|
|
}
|
|
|
|
private static func ensureSpeechRecognition(interactive: Bool) async -> Bool {
|
|
let status = SFSpeechRecognizer.authorizationStatus()
|
|
if status == .notDetermined, interactive {
|
|
await withUnsafeContinuation { (cont: UnsafeContinuation<Void, Never>) in
|
|
SFSpeechRecognizer.requestAuthorization { _ in
|
|
DispatchQueue.main.async { cont.resume() }
|
|
}
|
|
}
|
|
}
|
|
return SFSpeechRecognizer.authorizationStatus() == .authorized
|
|
}
|
|
|
|
private static func ensureCamera(interactive: Bool) async -> Bool {
|
|
let status = AVCaptureDevice.authorizationStatus(for: .video)
|
|
switch status {
|
|
case .authorized:
|
|
return true
|
|
case .notDetermined:
|
|
guard interactive else { return false }
|
|
return await AVCaptureDevice.requestAccess(for: .video)
|
|
case .denied, .restricted:
|
|
if interactive {
|
|
CameraPermissionHelper.openSettings()
|
|
}
|
|
return false
|
|
@unknown default:
|
|
return false
|
|
}
|
|
}
|
|
|
|
private static func ensureLocation(interactive: Bool) async -> Bool {
|
|
guard CLLocationManager.locationServicesEnabled() else {
|
|
if interactive {
|
|
await MainActor.run { LocationPermissionHelper.openSettings() }
|
|
}
|
|
return false
|
|
}
|
|
let status = CLLocationManager().authorizationStatus
|
|
switch status {
|
|
case .authorizedAlways, .authorizedWhenInUse, .authorized:
|
|
return true
|
|
case .notDetermined:
|
|
guard interactive else { return false }
|
|
let updated = await LocationPermissionRequester.shared.request(always: false)
|
|
return self.isLocationAuthorized(status: updated, requireAlways: false)
|
|
case .denied, .restricted:
|
|
if interactive {
|
|
await MainActor.run { LocationPermissionHelper.openSettings() }
|
|
}
|
|
return false
|
|
@unknown default:
|
|
return false
|
|
}
|
|
}
|
|
|
|
static func voiceWakePermissionsGranted() -> Bool {
|
|
let mic = AVCaptureDevice.authorizationStatus(for: .audio) == .authorized
|
|
let speech = SFSpeechRecognizer.authorizationStatus() == .authorized
|
|
return mic && speech
|
|
}
|
|
|
|
static func ensureVoiceWakePermissions(interactive: Bool) async -> Bool {
|
|
let results = await self.ensure([.microphone, .speechRecognition], interactive: interactive)
|
|
return results[.microphone] == true && results[.speechRecognition] == true
|
|
}
|
|
|
|
static func status(_ caps: [Capability] = Capability.allCases) async -> [Capability: Bool] {
|
|
var results: [Capability: Bool] = [:]
|
|
for cap in caps {
|
|
switch cap {
|
|
case .notifications:
|
|
let center = UNUserNotificationCenter.current()
|
|
let settings = await center.notificationSettings()
|
|
results[cap] = settings.authorizationStatus == .authorized
|
|
|| settings.authorizationStatus == .provisional
|
|
|
|
case .appleScript:
|
|
results[cap] = await MainActor.run { AppleScriptPermission.isAuthorized() }
|
|
|
|
case .accessibility:
|
|
results[cap] = await MainActor.run { AXIsProcessTrusted() }
|
|
|
|
case .screenRecording:
|
|
if #available(macOS 10.15, *) {
|
|
results[cap] = CGPreflightScreenCaptureAccess()
|
|
} else {
|
|
results[cap] = true
|
|
}
|
|
|
|
case .microphone:
|
|
results[cap] = AVCaptureDevice.authorizationStatus(for: .audio) == .authorized
|
|
|
|
case .speechRecognition:
|
|
results[cap] = SFSpeechRecognizer.authorizationStatus() == .authorized
|
|
|
|
case .camera:
|
|
results[cap] = AVCaptureDevice.authorizationStatus(for: .video) == .authorized
|
|
|
|
case .location:
|
|
let status = CLLocationManager().authorizationStatus
|
|
results[cap] = CLLocationManager.locationServicesEnabled()
|
|
&& self.isLocationAuthorized(status: status, requireAlways: false)
|
|
}
|
|
}
|
|
return results
|
|
}
|
|
}
|
|
|
|
enum NotificationPermissionHelper {
|
|
static func openSettings() {
|
|
let candidates = [
|
|
"x-apple.systempreferences:com.apple.Notifications-Settings.extension",
|
|
"x-apple.systempreferences:com.apple.preference.notifications",
|
|
]
|
|
|
|
for candidate in candidates {
|
|
if let url = URL(string: candidate), NSWorkspace.shared.open(url) {
|
|
return
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
enum MicrophonePermissionHelper {
|
|
static func openSettings() {
|
|
let candidates = [
|
|
"x-apple.systempreferences:com.apple.preference.security?Privacy_Microphone",
|
|
"x-apple.systempreferences:com.apple.preference.security",
|
|
]
|
|
|
|
for candidate in candidates {
|
|
if let url = URL(string: candidate), NSWorkspace.shared.open(url) {
|
|
return
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
enum CameraPermissionHelper {
|
|
static func openSettings() {
|
|
let candidates = [
|
|
"x-apple.systempreferences:com.apple.preference.security?Privacy_Camera",
|
|
"x-apple.systempreferences:com.apple.preference.security",
|
|
]
|
|
|
|
for candidate in candidates {
|
|
if let url = URL(string: candidate), NSWorkspace.shared.open(url) {
|
|
return
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
enum LocationPermissionHelper {
|
|
static func openSettings() {
|
|
let candidates = [
|
|
"x-apple.systempreferences:com.apple.preference.security?Privacy_LocationServices",
|
|
"x-apple.systempreferences:com.apple.preference.security",
|
|
]
|
|
|
|
for candidate in candidates {
|
|
if let url = URL(string: candidate), NSWorkspace.shared.open(url) {
|
|
return
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
@MainActor
|
|
final class LocationPermissionRequester: NSObject, CLLocationManagerDelegate {
|
|
static let shared = LocationPermissionRequester()
|
|
private let manager = CLLocationManager()
|
|
private var continuation: CheckedContinuation<CLAuthorizationStatus, Never>?
|
|
private var timeoutTask: Task<Void, Never>?
|
|
|
|
override init() {
|
|
super.init()
|
|
self.manager.delegate = self
|
|
}
|
|
|
|
func request(always: Bool) async -> CLAuthorizationStatus {
|
|
let current = self.manager.authorizationStatus
|
|
if PermissionManager.isLocationAuthorized(status: current, requireAlways: always) {
|
|
return current
|
|
}
|
|
|
|
return await withCheckedContinuation { cont in
|
|
self.continuation = cont
|
|
self.timeoutTask?.cancel()
|
|
self.timeoutTask = Task { [weak self] in
|
|
try? await Task.sleep(nanoseconds: 3_000_000_000)
|
|
await MainActor.run { [weak self] in
|
|
guard let self else { return }
|
|
guard self.continuation != nil else { return }
|
|
LocationPermissionHelper.openSettings()
|
|
self.finish(status: self.manager.authorizationStatus)
|
|
}
|
|
}
|
|
if always {
|
|
self.manager.requestAlwaysAuthorization()
|
|
} else {
|
|
self.manager.requestWhenInUseAuthorization()
|
|
}
|
|
|
|
// On macOS, requesting an actual fix makes the prompt more reliable.
|
|
self.manager.requestLocation()
|
|
}
|
|
}
|
|
|
|
private func finish(status: CLAuthorizationStatus) {
|
|
self.timeoutTask?.cancel()
|
|
self.timeoutTask = nil
|
|
guard let cont = self.continuation else { return }
|
|
self.continuation = nil
|
|
cont.resume(returning: status)
|
|
}
|
|
|
|
// nonisolated for Swift 6 strict concurrency compatibility
|
|
nonisolated func locationManagerDidChangeAuthorization(_ manager: CLLocationManager) {
|
|
let status = manager.authorizationStatus
|
|
Task { @MainActor in
|
|
self.finish(status: status)
|
|
}
|
|
}
|
|
|
|
// Legacy callback (still used on some macOS versions / configurations).
|
|
nonisolated func locationManager(
|
|
_ manager: CLLocationManager,
|
|
didChangeAuthorization status: CLAuthorizationStatus)
|
|
{
|
|
Task { @MainActor in
|
|
self.finish(status: status)
|
|
}
|
|
}
|
|
|
|
nonisolated func locationManager(_ manager: CLLocationManager, didFailWithError error: Error) {
|
|
let status = manager.authorizationStatus
|
|
Task { @MainActor in
|
|
if status == .denied || status == .restricted {
|
|
LocationPermissionHelper.openSettings()
|
|
}
|
|
self.finish(status: status)
|
|
}
|
|
}
|
|
|
|
nonisolated func locationManager(_ manager: CLLocationManager, didUpdateLocations locations: [CLLocation]) {
|
|
let status = manager.authorizationStatus
|
|
Task { @MainActor in
|
|
self.finish(status: status)
|
|
}
|
|
}
|
|
}
|
|
|
|
enum AppleScriptPermission {
|
|
private static let logger = Logger(subsystem: "com.clawdbot", category: "AppleScriptPermission")
|
|
|
|
/// Sends a benign AppleScript to Terminal to verify Automation permission.
|
|
@MainActor
|
|
static func isAuthorized() -> Bool {
|
|
let script = """
|
|
tell application "Terminal"
|
|
return "clawdbot-ok"
|
|
end tell
|
|
"""
|
|
|
|
var error: NSDictionary?
|
|
let appleScript = NSAppleScript(source: script)
|
|
let result = appleScript?.executeAndReturnError(&error)
|
|
|
|
if let error, let code = error["NSAppleScriptErrorNumber"] as? Int {
|
|
if code == -1743 { // errAEEventWouldRequireUserConsent
|
|
Self.logger.debug("AppleScript permission denied (-1743)")
|
|
return false
|
|
}
|
|
Self.logger.debug("AppleScript check failed with code \(code)")
|
|
}
|
|
|
|
return result != nil
|
|
}
|
|
|
|
/// Triggers the TCC prompt and opens System Settings → Privacy & Security → Automation.
|
|
@MainActor
|
|
static func requestAuthorization() async {
|
|
_ = self.isAuthorized() // first attempt triggers the dialog if not granted
|
|
|
|
// Open the Automation pane to help the user if the prompt was dismissed.
|
|
let urlStrings = [
|
|
"x-apple.systempreferences:com.apple.preference.security?Privacy_Automation",
|
|
"x-apple.systempreferences:com.apple.preference.security",
|
|
]
|
|
|
|
for candidate in urlStrings {
|
|
if let url = URL(string: candidate), NSWorkspace.shared.open(url) {
|
|
break
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
@MainActor
|
|
@Observable
|
|
final class PermissionMonitor {
|
|
static let shared = PermissionMonitor()
|
|
|
|
private(set) var status: [Capability: Bool] = [:]
|
|
|
|
private var monitorTimer: Timer?
|
|
private var isChecking = false
|
|
private var registrations = 0
|
|
private var lastCheck: Date?
|
|
private let minimumCheckInterval: TimeInterval = 0.5
|
|
|
|
func register() {
|
|
self.registrations += 1
|
|
if self.registrations == 1 {
|
|
self.startMonitoring()
|
|
}
|
|
}
|
|
|
|
func unregister() {
|
|
guard self.registrations > 0 else { return }
|
|
self.registrations -= 1
|
|
if self.registrations == 0 {
|
|
self.stopMonitoring()
|
|
}
|
|
}
|
|
|
|
func refreshNow() async {
|
|
await self.checkStatus(force: true)
|
|
}
|
|
|
|
private func startMonitoring() {
|
|
Task { await self.checkStatus(force: true) }
|
|
|
|
if ProcessInfo.processInfo.isRunningTests {
|
|
return
|
|
}
|
|
self.monitorTimer = Timer.scheduledTimer(withTimeInterval: 1.0, repeats: true) { [weak self] _ in
|
|
guard let self else { return }
|
|
Task { @MainActor in
|
|
await self.checkStatus(force: false)
|
|
}
|
|
}
|
|
}
|
|
|
|
private func stopMonitoring() {
|
|
self.monitorTimer?.invalidate()
|
|
self.monitorTimer = nil
|
|
self.lastCheck = nil
|
|
}
|
|
|
|
private func checkStatus(force: Bool) async {
|
|
if self.isChecking { return }
|
|
let now = Date()
|
|
if !force, let lastCheck, now.timeIntervalSince(lastCheck) < self.minimumCheckInterval {
|
|
return
|
|
}
|
|
|
|
self.isChecking = true
|
|
|
|
let latest = await PermissionManager.status()
|
|
if latest != self.status {
|
|
self.status = latest
|
|
}
|
|
self.lastCheck = Date()
|
|
|
|
self.isChecking = false
|
|
}
|
|
}
|
|
|
|
enum ScreenRecordingProbe {
|
|
static func isAuthorized() -> Bool {
|
|
if #available(macOS 10.15, *) {
|
|
return CGPreflightScreenCaptureAccess()
|
|
}
|
|
return true
|
|
}
|
|
|
|
@MainActor
|
|
static func requestAuthorization() async {
|
|
if #available(macOS 10.15, *) {
|
|
_ = CGRequestScreenCaptureAccess()
|
|
}
|
|
}
|
|
}
|