Skip to main content

Check for private API "usage” yourself?



So, we all know Apple forbids using private or undocumented APIs in iOS apps. I have no problem with this, as there are sound technical reasons for why this is a good idea. However, twice now I've had an app rejected for using private APIs, when this was not actually the case. It's not difficult -- the private APIs include symbols like connectionState , setThumbnail , setOrder and so on. Any calls you make to methods named as such will be flagged as a private API use, even if the method being called is something you have defined yourself. For a program doing something with connections, thumbnails or the order of things, the above mentioned method names aren't all that unlikely. Getting rejected for this and having to rename a method and resubmit delays everything by at least a week while you wait for a new review.





So is there a way, using nm , class dumps of the iOS frameworks, etc to find out for yourself if your method names conflicts with anything in there? If so, we could have a chance of correcting this before release and avoiding unnecessary rejection.


Comments

  1. I'd suggest using App Scanner. It analyzes your .app file for private API method usage. The current version doesn't support private API instance variables but that might get worked into a future version.

    It will catch methods that have been named the same as a private API method, even if it has it's own implementation. Also, it'll catch @selectors inside methods (just like the official iOS automated checker).

    link --> http://www.chimpstudios.com/appscanner/

    ReplyDelete
  2. Have you tried turning on Validate Build Product in the settings? It is supposed to perform all the initial checks done on your app during the review process

    ReplyDelete
  3. This is not exactly what you're looking for, but Xcode has two validate options that are probably worth trying.

    The first is a build setting. It's not entirely clear what it checks -- the documentation doesn't say and even the WWDC talks didn't really elaborate -- but it is potentially useful. My guess is that it does not check for private APIs.

    The second option is in the Organizer. In the "Archived Apps" view you can submit your app to Apple for validation. Again, they don't really nail down exactly what the checks are but I understand that this is more like the automated tests that they run before "manually" reviewing. My guess is that this does check for private API calls.

    ReplyDelete
  4. Erica Sadun is currently working on something she calls APIKit which is a utility that scans your code and proactively warns you about private API usage. http://ericasadun.com/2009/12/apikit-goes-beta/#c2

    The only problem is that I can't find anything to do with it anywhere. It's apparently in beta, but that was announced around 8 months ago.

    I don't know of it's current status or whether or not it's actually available, but it's something you could look into. Maybe even try contacting her yourself? Erica hangs out in the #iphone-dev channel on IRC on freenode now and again, you might catch her there.

    ReplyDelete

Post a Comment

Popular posts from this blog

Slow Android emulator

I have a 2.67 GHz Celeron processor, 1.21 GB of RAM on a x86 Windows XP Professional machine. My understanding is that the Android emulator should start fairly quickly on such a machine, but for me it does not. I have followed all instructions in setting up the IDE, SDKs, JDKs and such and have had some success in staring the emulator quickly but is very particulary. How can I, if possible, fix this problem?

CCNA 3 Final Exam => latest version

1 . Which security protocol or measure would provide the greatest protection for a wireless LAN? WPA2 cloaking SSIDs shared WEP key MAC address filtering   2 . Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message? only computer 4 computer 3 and RTR-A computer 4 and RTR-A computer 1, computer 2, computer 4, and RTR-A computer 1, computer 2, computer 3, computer 4, and RTR-A all of the computers and the router   3 . Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal? only hosts A and B only hosts A, B, and C only hosts A, B, C, and D only hosts A, B, C, and E   4 . Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161...