// Berkeley Open Infrastructure for Network Computing // http://boinc.berkeley.edu // Copyright (C) 2005 University of California // // This is free software; you can redistribute it and/or // modify it under the terms of the GNU Lesser General Public // License as published by the Free Software Foundation; // either version 2.1 of the License, or (at your option) any later version. // // This software is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. // See the GNU Lesser General Public License for more details. // // To view the GNU Lesser General Public License visit // http://www.gnu.org/copyleft/lesser.html // or write to the Free Software Foundation, Inc., // 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA // Mac_GUI.cpp #include #include #include #include "util.h" // For g_use_sandbox // Determine if the currently logged-in user is auhorized to // perform operations which have potential security risks. // An example is "Attach to Project", where a dishonest user might // attach to a rogue project which could then read private files // belonging to the user who owns the BOINC application. This // would be possible because the BOINC Manager runs with the // effectve user ID of its owner on the Mac. Boolean Mac_Authorize() { static Boolean sIsAuthorized = false; AuthorizationRef ourAuthRef = NULL; AuthorizationRights ourAuthRights; AuthorizationFlags ourAuthFlags; AuthorizationItem ourAuthItem[1]; OSStatus err = noErr; if (sIsAuthorized) return true; uid_t effectiveUserID, realUserID; if (g_use_sandbox) { effectiveUserID = geteuid(); realUserID = getuid(); if (effectiveUserID == realUserID) { // Logged in user is also the owner sIsAuthorized = true; return true; } } // User is not the owner, so require admin authorization ourAuthItem[0].name = kAuthorizationRightExecute; ourAuthItem[0].value = NULL; ourAuthItem[0].valueLength = 0; ourAuthItem[0].flags = 0; ourAuthRights.count = 1; ourAuthRights.items = ourAuthItem; ourAuthFlags = kAuthorizationFlagInteractionAllowed | kAuthorizationFlagExtendRights; err = AuthorizationCreate (&ourAuthRights, kAuthorizationEmptyEnvironment, ourAuthFlags, &ourAuthRef); if (err == noErr) sIsAuthorized = true; return sIsAuthorized; }