// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef BASE_MAC_AUTHORIZATION_UTIL_H_ #define BASE_MAC_AUTHORIZATION_UTIL_H_ // AuthorizationExecuteWithPrivileges fork()s and exec()s the tool, but it // does not wait() for it. It also doesn't provide the caller with access to // the forked pid. If used irresponsibly, zombie processes will accumulate. // // Apple's really gotten us between a rock and a hard place, here. // // Fortunately, AuthorizationExecuteWithPrivileges does give access to the // tool's stdout (and stdin) via a FILE* pipe. The tool can output its pid // to this pipe, and the main program can read it, and then have something // that it can wait() for. // // The contract is that any tool executed by the wrappers declared in this // file must print its pid to stdout on a line by itself before doing anything // else. // // http://developer.apple.com/library/mac/#samplecode/BetterAuthorizationSample/Listings/BetterAuthorizationSampleLib_c.html // (Look for "What's This About Zombies?") #include #include #include #include #include "base/base_export.h" namespace base { namespace mac { // Obtains an AuthorizationRef for the rights indicated by |rights|. If // necessary, prompts the user for authentication. If the user is prompted, // |prompt| will be used as the prompt string and an icon appropriate for the // application will be displayed in a prompt dialog. Note that the system // appends its own text to the prompt string. |extraFlags| will be ORed // together with the default flags. Returns NULL on failure. BASE_EXPORT AuthorizationRef GetAuthorizationRightsWithPrompt( AuthorizationRights* rights, CFStringRef prompt, AuthorizationFlags extraFlags); // Obtains an AuthorizationRef (using |GetAuthorizationRightsWithPrompt|) that // can be used to run commands as root. BASE_EXPORT AuthorizationRef AuthorizationCreateToRunAsRoot(CFStringRef prompt); // Calls straight through to AuthorizationExecuteWithPrivileges. If that // call succeeds, |pid| will be set to the pid of the executed tool. If the // pid can't be determined, |pid| will be set to -1. |pid| must not be NULL. // |pipe| may be NULL, but the tool will always be executed with a pipe in // order to read the pid from its stdout. BASE_EXPORT OSStatus ExecuteWithPrivilegesAndGetPID(AuthorizationRef authorization, const char* tool_path, AuthorizationFlags options, const char** arguments, FILE** pipe, pid_t* pid); // Calls ExecuteWithPrivilegesAndGetPID, and if that call succeeds, calls // waitpid() to wait for the process to exit. If waitpid() succeeds, the // exit status is placed in |exit_status|, otherwise, -1 is stored. // |exit_status| may be NULL and this function will still wait for the process // to exit. BASE_EXPORT OSStatus ExecuteWithPrivilegesAndWait(AuthorizationRef authorization, const char* tool_path, AuthorizationFlags options, const char** arguments, FILE** pipe, int* exit_status); } // namespace mac } // namespace base #endif // BASE_MAC_AUTHORIZATION_UTIL_H_