| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef BASE_MAC_AUTHORIZATION_UTIL_H_ |
| #define BASE_MAC_AUTHORIZATION_UTIL_H_ |
| |
| // AuthorizationExecuteWithPrivileges fork()s and exec()s the tool, but it |
| // does not wait() for it. It also doesn't provide the caller with access to |
| // the forked pid. If used irresponsibly, zombie processes will accumulate. |
| // |
| // Apple's really gotten us between a rock and a hard place, here. |
| // |
| // Fortunately, AuthorizationExecuteWithPrivileges does give access to the |
| // tool's stdout (and stdin) via a FILE* pipe. The tool can output its pid |
| // to this pipe, and the main program can read it, and then have something |
| // that it can wait() for. |
| // |
| // The contract is that any tool executed by the wrappers declared in this |
| // file must print its pid to stdout on a line by itself before doing anything |
| // else. |
| // |
| // http://developer.apple.com/library/mac/#samplecode/BetterAuthorizationSample/Listings/BetterAuthorizationSampleLib_c.html |
| // (Look for "What's This About Zombies?") |
| |
| #include <CoreFoundation/CoreFoundation.h> |
| #include <Security/Authorization.h> |
| #include <stdio.h> |
| #include <sys/types.h> |
| |
| #include "base/base_export.h" |
| |
| namespace base { |
| namespace mac { |
| |
| // Obtains an AuthorizationRef that can be used to run commands as root. If |
| // necessary, prompts the user for authentication. If the user is prompted, |
| // |prompt| will be used as the prompt string and an icon appropriate for the |
| // application will be displayed in a prompt dialog. Note that the system |
| // appends its own text to the prompt string. Returns NULL on failure. |
| BASE_EXPORT |
| AuthorizationRef AuthorizationCreateToRunAsRoot(CFStringRef prompt); |
| |
| // Calls straight through to AuthorizationExecuteWithPrivileges. If that |
| // call succeeds, |pid| will be set to the pid of the executed tool. If the |
| // pid can't be determined, |pid| will be set to -1. |pid| must not be NULL. |
| // |pipe| may be NULL, but the tool will always be executed with a pipe in |
| // order to read the pid from its stdout. |
| BASE_EXPORT |
| OSStatus ExecuteWithPrivilegesAndGetPID(AuthorizationRef authorization, |
| const char* tool_path, |
| AuthorizationFlags options, |
| const char** arguments, |
| FILE** pipe, |
| pid_t* pid); |
| |
| // Calls ExecuteWithPrivilegesAndGetPID, and if that call succeeds, calls |
| // waitpid() to wait for the process to exit. If waitpid() succeeds, the |
| // exit status is placed in |exit_status|, otherwise, -1 is stored. |
| // |exit_status| may be NULL and this function will still wait for the process |
| // to exit. |
| BASE_EXPORT |
| OSStatus ExecuteWithPrivilegesAndWait(AuthorizationRef authorization, |
| const char* tool_path, |
| AuthorizationFlags options, |
| const char** arguments, |
| FILE** pipe, |
| int* exit_status); |
| |
| } // namespace mac |
| } // namespace base |
| |
| #endif // BASE_MAC_AUTHORIZATION_UTIL_H_ |