// This file is part of BOINC.
// http://boinc.berkeley.edu
// Copyright (C) 2011 University of California
//
// BOINC is free software; you can redistribute it and/or modify it
// under the terms of the GNU Lesser General Public License
// as published by the Free Software Foundation,
// either version 3 of the License, or (at your option) any later version.
//
// BOINC is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
// See the GNU Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public License
// along with BOINC. If not, see .
// Mac_GUI.cpp
#include
#include
#include
#include "sandbox.h"
#include "miofile.h"
#include "BOINCGUIApp.h"
#include "SkinManager.h"
using std::min;
using std::max;
/* Begin items to include "BOINC Manager" Mac menu items in localization templates */
void ThisDummyRoutineIsNeverCalled() {
wxString (_("Services"));
wxString (_("Hide %s"));
wxString (_("Hide Others"));
wxString (_("Show All"));
wxString (_("Quit %s"));
}
/* End items to include "BOINC Manager" Mac menu items in localization templates */
// Determine if the currently logged-in user is authorized to
// perform operations which have potential security risks.
// An example is "Attach to Project", where a dishonest user might
// attach to a rogue project which could then read private files
// belonging to the user who owns the BOINC application. This
// would be possible because the BOINC Manager runs with the
// effective user ID of its owner on the Mac.
Boolean Mac_Authorize()
{
static Boolean sIsAuthorized = false;
AuthorizationRef ourAuthRef = NULL;
AuthorizationRights ourAuthRights;
AuthorizationFlags ourAuthFlags;
AuthorizationItem ourAuthItem[1];
OSStatus err = noErr;
if (sIsAuthorized)
return true;
// User is not the owner, so require admin authentication
ourAuthItem[0].name = kAuthorizationRightExecute;
ourAuthItem[0].value = NULL;
ourAuthItem[0].valueLength = 0;
ourAuthItem[0].flags = 0;
ourAuthRights.count = 1;
ourAuthRights.items = ourAuthItem;
ourAuthFlags = kAuthorizationFlagInteractionAllowed | kAuthorizationFlagExtendRights;
err = AuthorizationCreate (&ourAuthRights, kAuthorizationEmptyEnvironment, ourAuthFlags, &ourAuthRef);
if (err == noErr) {
sIsAuthorized = true;
// We have authenticated user's credentials; we won't actually use the
// privileges / rights so destroy / discard them.
err = AuthorizationFree(ourAuthRef, kAuthorizationFlagDestroyRights);
}
return sIsAuthorized;
}