boinc/clientgui/mac/Mac_GUI.cpp

80 lines
2.6 KiB
C++

// Berkeley Open Infrastructure for Network Computing
// http://boinc.berkeley.edu
// Copyright (C) 2005 University of California
//
// This is free software; you can redistribute it and/or
// modify it under the terms of the GNU Lesser General Public
// License as published by the Free Software Foundation;
// either version 2.1 of the License, or (at your option) any later version.
//
// This software is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
// See the GNU Lesser General Public License for more details.
//
// To view the GNU Lesser General Public License visit
// http://www.gnu.org/copyleft/lesser.html
// or write to the Free Software Foundation, Inc.,
// 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
// Mac_GUI.cpp
#include <Security/Authorization.h>
#include <Security/AuthorizationTags.h>
#include <unistd.h>
#include "util.h" // For g_use_sandbox
// Determine if the currently logged-in user is auhorized to
// perform operations which have potential security risks.
// An example is "Attach to Project", where a dishonest user might
// attach to a rogue project which could then read private files
// belonging to the user who owns the BOINC application. This
// would be possible because the BOINC Manager runs with the
// effectve user ID of its owner on the Mac.
Boolean Mac_Authorize()
{
static Boolean sIsAuthorized = false;
AuthorizationRef ourAuthRef = NULL;
AuthorizationRights ourAuthRights;
AuthorizationFlags ourAuthFlags;
AuthorizationItem ourAuthItem[1];
OSStatus err = noErr;
if (sIsAuthorized)
return true;
uid_t effectiveUserID, realUserID;
if (g_use_sandbox) {
effectiveUserID = geteuid();
realUserID = getuid();
if (effectiveUserID == realUserID)
{
// Logged in user is also the owner
sIsAuthorized = true;
return true;
}
}
// User is not the owner, so require admin authorization
ourAuthItem[0].name = kAuthorizationRightExecute;
ourAuthItem[0].value = NULL;
ourAuthItem[0].valueLength = 0;
ourAuthItem[0].flags = 0;
ourAuthRights.count = 1;
ourAuthRights.items = ourAuthItem;
ourAuthFlags = kAuthorizationFlagInteractionAllowed | kAuthorizationFlagExtendRights;
err = AuthorizationCreate (&ourAuthRights, kAuthorizationEmptyEnvironment, ourAuthFlags, &ourAuthRef);
if (err == noErr)
sIsAuthorized = true;
return sIsAuthorized;
}