mirror of https://github.com/BOINC/boinc.git
1307 lines
46 KiB
C++
1307 lines
46 KiB
C++
// This file is part of BOINC.
|
|
// http://boinc.berkeley.edu
|
|
// Copyright (C) 2008 University of California
|
|
//
|
|
// BOINC is free software; you can redistribute it and/or modify it
|
|
// under the terms of the GNU Lesser General Public License
|
|
// as published by the Free Software Foundation,
|
|
// either version 3 of the License, or (at your option) any later version.
|
|
//
|
|
// BOINC is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
|
// See the GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with BOINC. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
/* uninstall.cpp */
|
|
|
|
#define TESTING 0 /* for debugging */
|
|
|
|
#include <Carbon/Carbon.h>
|
|
#include <Security/Authorization.h>
|
|
#include <Security/AuthorizationTags.h>
|
|
|
|
#include <grp.h>
|
|
|
|
#include <unistd.h> // geteuid, seteuid
|
|
#include <pwd.h> // passwd, getpwnam
|
|
#include <dirent.h>
|
|
#include <sys/param.h> // for MAXPATHLEN
|
|
#include <string.h>
|
|
#include <vector>
|
|
#include <string>
|
|
|
|
using std::vector;
|
|
using std::string;
|
|
|
|
#define SEARCHFORALLBOINCMANAGERS 0
|
|
|
|
#include "LoginItemAPI.h"
|
|
|
|
static OSStatus DoUninstall(void);
|
|
static OSStatus CleanupAllVisibleUsers(void);
|
|
static OSStatus DeleteOurBundlesFromDirectory(CFStringRef bundleID, char *extension, char *dirPath);
|
|
static OSStatus GetAuthorization(AuthorizationRef * authRef, const char *pathToTool, char *brandName);
|
|
static OSStatus DoPrivilegedExec(char *brandName, const char *pathToTool, char *arg1, char *arg2, char *arg3, char *arg4, char *arg5);
|
|
static void DeleteLoginItemOSAScript(char* user, char* appName);
|
|
static void DeleteLoginItemAPI(void);
|
|
static void DeleteLoginItemFromPListFile(void);
|
|
static char * PersistentFGets(char *buf, size_t buflen, FILE *f);
|
|
OSErr GetCurrentScreenSaverSelection(char *moduleName, size_t maxLen);
|
|
OSErr SetScreenSaverSelection(char *moduleName, char *modulePath, int type);
|
|
int GetCountOfLoginItemsFromPlistFile(void);
|
|
OSErr GetLoginItemNameAtIndexFromPlistFile(int index, char *name, size_t maxLen);
|
|
OSErr DeleteLoginItemNameAtIndexFromPlistFile(int index);
|
|
static OSErr FindProcess (OSType typeToFind, OSType creatorToFind, ProcessSerialNumberPtr processSN);
|
|
static pid_t FindProcessPID(char* name, pid_t thePID);
|
|
static OSStatus QuitOneProcess(OSType signature);
|
|
static void SleepTicks(UInt32 ticksToSleep);
|
|
static Boolean ShowMessage(Boolean allowCancel, Boolean continueButton, const char *format, ...);
|
|
#if SEARCHFORALLBOINCMANAGERS
|
|
static OSStatus GetpathToBOINCManagerApp(char* path, int maxLen, FSRef *theFSRef);
|
|
#endif
|
|
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
char pathToSelf[MAXPATHLEN], appName[256], *p;
|
|
ProcessSerialNumber ourPSN;
|
|
FSRef ourFSRef;
|
|
Boolean cancelled = false;
|
|
OSStatus err = noErr;
|
|
|
|
// Determine whether this is the intial launch or the relaunch with privileges
|
|
if ( (argc == 2) && (strcmp(argv[1], "--privileged") == 0) ) {
|
|
if (geteuid() != 0) { // Confirm that we are running as root
|
|
ShowMessage(false, false, "Permission error after relaunch");
|
|
return permErr;
|
|
}
|
|
|
|
ShowMessage(false, true, "Removal may take several minutes.\nPlease be patient.");
|
|
|
|
return DoUninstall();
|
|
}
|
|
|
|
// This is the initial launch. Authenticate and relaunch ourselves with privileges.
|
|
|
|
// Get the full path to our executable inside this application's bundle
|
|
err = GetCurrentProcess (&ourPSN);
|
|
if (err == noErr) {
|
|
err = GetProcessBundleLocation(&ourPSN, &ourFSRef);
|
|
}
|
|
if (err == noErr) {
|
|
err = FSRefMakePath (&ourFSRef, (UInt8*)pathToSelf, sizeof(pathToSelf));
|
|
}
|
|
if (err != noErr) {
|
|
ShowMessage(false, false, "Couldn't get path to self. Error %d", err);
|
|
return err;
|
|
}
|
|
|
|
// To allow for branding, assume name of executable inside bundle is same as name of bundle
|
|
p = strrchr(pathToSelf, '/'); // Assume name of executable inside bundle is same as name of bundle
|
|
if (p == NULL)
|
|
p = pathToSelf - 1;
|
|
strlcpy(appName, p+1, sizeof(appName));
|
|
p = strrchr(appName, '.'); // Strip off bundle extension (".app")
|
|
if (p)
|
|
*p = '\0';
|
|
|
|
strlcat(pathToSelf, "/Contents/MacOS/", sizeof(pathToSelf));
|
|
strlcat(pathToSelf, appName, sizeof(pathToSelf));
|
|
|
|
p = strchr(appName, ' ');
|
|
p += 1; // Point to brand name following "Uninstall "
|
|
|
|
if (GetResource('ALRT', 128)) {
|
|
// BOINC uses custom dialog with custom PICT
|
|
cancelled = (Alert(128, NULL) == cancel);
|
|
} else {
|
|
// Grid Republic uses generic dialog with Uninstall application's icon
|
|
cancelled = ! ShowMessage(true, false, "Are you sure you want to completely remove %s from your computer?\n\n"
|
|
"This will remove the executables but will not touch %s data files.", p, p);
|
|
}
|
|
|
|
if (! cancelled) {
|
|
err = DoPrivilegedExec(p, pathToSelf, "--privileged", NULL, NULL, NULL, NULL);
|
|
}
|
|
|
|
if (cancelled || (err == errAuthorizationCanceled)) {
|
|
ShowMessage(false, false, "Canceled: %s has not been touched.", p);
|
|
return err;
|
|
}
|
|
|
|
#if TESTING
|
|
ShowMessage(false, false, "DoPrivilegedExec returned %d", err);
|
|
#endif
|
|
|
|
if (err)
|
|
ShowMessage(false, false, "An error occurred: error code %d", err);
|
|
else
|
|
ShowMessage(false, false, "Removal completed.\n\n You may want to remove the following remaining items using the Finder: \n"
|
|
"\"/Library/Application Support/BOINC Data\" directory\n\nfor each user, the file\n"
|
|
"\"/Users/[username]/Library/Preferences/BOINC Manager Preferences\".");
|
|
|
|
return err;
|
|
}
|
|
|
|
|
|
static OSStatus DoUninstall(void) {
|
|
pid_t coreClientPID = 0;
|
|
char cmd[1024];
|
|
char *p;
|
|
passwd *pw;
|
|
OSStatus err = noErr;
|
|
#if SEARCHFORALLBOINCMANAGERS
|
|
char myRmCommand[MAXPATHLEN+10], plistRmCommand[MAXPATHLEN+10];
|
|
char notBoot[] = "/Volumes/";
|
|
FSRef theFSRef;
|
|
int pathOffset, i;
|
|
#endif
|
|
|
|
#if TESTING
|
|
ShowMessage(false, false, "Permission OK after relaunch");
|
|
#endif
|
|
|
|
QuitOneProcess('BNC!'); // Quit any old instance of BOINC manager
|
|
sleep(2);
|
|
|
|
// Core Client may still be running if it was started without Manager
|
|
coreClientPID = FindProcessPID("boinc", 0);
|
|
if (coreClientPID)
|
|
kill(coreClientPID, SIGTERM); // boinc catches SIGTERM & exits gracefully
|
|
|
|
#if SEARCHFORALLBOINCMANAGERS
|
|
// Phase 1: try to find all our applications using LaunchServices
|
|
for (i=0; i<100; i++) {
|
|
strlcpy(myRmCommand, "rm -rf \"", 10);
|
|
pathOffset = strlen(myRmCommand);
|
|
|
|
err = GetpathToBOINCManagerApp(myRmCommand+pathOffset, MAXPATHLEN, &theFSRef);
|
|
if (err)
|
|
break;
|
|
|
|
strlcat(myRmCommand, "\"", sizeof(myRmCommand));
|
|
|
|
#if TESTING
|
|
ShowMessage(false, false, "manager: %s", myRmCommand);
|
|
#endif
|
|
|
|
p = strstr(myRmCommand, notBoot);
|
|
|
|
if (p == myRmCommand+pathOffset) {
|
|
#if TESTING
|
|
ShowMessage(false, false, "Not on boot volume: %s", myRmCommand);
|
|
#endif
|
|
break;
|
|
} else {
|
|
|
|
// First delete just the application's info.plist file and update the
|
|
// LaunchServices Database; otherwise LSFindApplicationForInfo might
|
|
// return this application again after it's been deleted.
|
|
strlcpy(plistRmCommand, myRmCommand, sizeof(plistRmCommand));
|
|
strlcat(plistRmCommand, "/Contents/info.plist", sizeof(plistRmCommand));
|
|
#if TESTING
|
|
ShowMessage(false, false, "Deleting info.plist: %s", plistRmCommand);
|
|
#endif
|
|
system(plistRmCommand);
|
|
err = LSRegisterFSRef(&theFSRef, true);
|
|
#if TESTING
|
|
if (err)
|
|
ShowMessage(false, false, "LSRegisterFSRef returned error %d", err);
|
|
#endif
|
|
system(myRmCommand);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
// Phase 2: step through default Applications directory searching for our applications
|
|
err = DeleteOurBundlesFromDirectory(CFSTR("edu.berkeley.boinc"), "app", "/Applications");
|
|
|
|
// Phase 3: step through default Screen Savers directory searching for our screen savers
|
|
err = DeleteOurBundlesFromDirectory(CFSTR("edu.berkeley.boincsaver"), "saver", "/Library/Screen Savers");
|
|
|
|
// Phase 4: Delete our files and directories at our installer's default locations
|
|
// Remove everything we've installed, whether BOINC, GridRepublic, Progress Thru Processors or
|
|
// Charity Engine
|
|
// These first 4 should already have been deleted by the above code, but do them anyway for safety
|
|
system ("rm -rf /Applications/BOINCManager.app");
|
|
system ("rm -rf \"/Library/Screen Savers/BOINCSaver.saver\"");
|
|
|
|
system ("rm -rf \"/Applications/GridRepublic Desktop.app\"");
|
|
system ("rm -rf \"/Library/Screen Savers/GridRepublic.saver\"");
|
|
|
|
system ("rm -rf \"/Applications/Progress\\ Thru\\ Processors\\ Desktop.app\"");
|
|
system ("rm -rf \"/Library/Screen Savers/Progress\\ Thru\\ Processors.saver\"");
|
|
|
|
system ("rm -rf \"/Applications/Charity\\ Engine\\ Desktop.app\"");
|
|
system ("rm -rf \"/Library/Screen Savers/Charity\\ Engine.saver\"");
|
|
|
|
// Delete any receipt from an older installer (which had
|
|
// a wrapper application around the installer package.)
|
|
system ("rm -rf /Library/Receipts/GridRepublic.pkg");
|
|
system ("rm -rf /Library/Receipts/Progress\\ Thru\\ Processors.pkg");
|
|
system ("rm -rf /Library/Receipts/Charity\\ Engine.pkg");
|
|
system ("rm -rf /Library/Receipts/BOINC.pkg");
|
|
|
|
// Delete any receipt from a newer installer (a bare package.)
|
|
system ("rm -rf /Library/Receipts/GridRepublic\\ Installer.pkg");
|
|
system ("rm -rf /Library/Receipts/Progress\\ Thru\\ Processors\\ Installer.pkg");
|
|
system ("rm -rf /Library/Receipts/Charity\\ Engine\\ Installer.pkg");
|
|
system ("rm -rf /Library/Receipts/BOINC\\ Installer.pkg");
|
|
|
|
// Phase 5: Set BOINC Data owner and group to logged in user
|
|
// We don't customize BOINC Data directory name for branding
|
|
// system ("rm -rf \"/Library/Application Support/BOINC Data\"");
|
|
p = getlogin();
|
|
pw = getpwnam(p);
|
|
sprintf(cmd, "chown -R %d:%d \"/Library/Application Support/BOINC Data\"", pw->pw_uid, pw->pw_gid);
|
|
system (cmd);
|
|
system("chmod -R u+rw-s,g+r-w-s,o+r-w \"/Library/Application Support/BOINC Data\"");
|
|
system("chmod 600 \"/Library/Application Support/BOINC Data/gui_rpc_auth.cfg\"");
|
|
|
|
// Phase 6: step through all users and do user-specific cleanup
|
|
CleanupAllVisibleUsers();
|
|
|
|
system ("dscl . -delete /users/boinc_master");
|
|
system ("dscl . -delete /groups/boinc_master");
|
|
system ("dscl . -delete /users/boinc_project");
|
|
system ("dscl . -delete /groups/boinc_project");
|
|
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static OSStatus DeleteOurBundlesFromDirectory(CFStringRef bundleID, char *extension, char *dirPath) {
|
|
DIR *dirp;
|
|
dirent *dp;
|
|
CFStringRef urlStringRef = NULL;
|
|
int index;
|
|
CFStringRef thisID = NULL;
|
|
CFBundleRef thisBundle = NULL;
|
|
CFURLRef bundleURLRef = NULL;
|
|
char myRmCommand[MAXPATHLEN+10], *p;
|
|
int pathOffset;
|
|
|
|
dirp = opendir(dirPath);
|
|
if (dirp == NULL) { // Should never happen
|
|
ShowMessage(false, false, "opendir(\"%s\") failed", dirPath);
|
|
return -1;
|
|
}
|
|
|
|
index = -1;
|
|
while (true) {
|
|
index++;
|
|
|
|
dp = readdir(dirp);
|
|
if (dp == NULL)
|
|
break; // End of list
|
|
|
|
p = strrchr(dp->d_name, '.');
|
|
if (p == NULL)
|
|
continue;
|
|
|
|
if (strcmp(p+1, extension))
|
|
continue;
|
|
|
|
strlcpy(myRmCommand, "rm -rf \"", 10);
|
|
pathOffset = strlen(myRmCommand);
|
|
strlcat(myRmCommand, dirPath, sizeof(myRmCommand));
|
|
strlcat(myRmCommand, "/", sizeof(myRmCommand));
|
|
strlcat(myRmCommand, dp->d_name, sizeof(myRmCommand));
|
|
urlStringRef = CFStringCreateWithCString(kCFAllocatorDefault, myRmCommand+pathOffset, CFStringGetSystemEncoding());
|
|
if (urlStringRef) {
|
|
bundleURLRef = CFURLCreateWithFileSystemPath(kCFAllocatorDefault, urlStringRef, kCFURLPOSIXPathStyle, false);
|
|
if (bundleURLRef) {
|
|
thisBundle = CFBundleCreate( kCFAllocatorDefault, bundleURLRef );
|
|
if (thisBundle) {
|
|
thisID = CFBundleGetIdentifier(thisBundle);
|
|
if (thisID) {
|
|
strlcat(myRmCommand, "\"", sizeof(myRmCommand));
|
|
if (CFStringCompare(thisID, bundleID, 0) == kCFCompareEqualTo) {
|
|
#if TESTING
|
|
ShowMessage(false, false, "Bundles: %s", myRmCommand);
|
|
#endif
|
|
|
|
system(myRmCommand);
|
|
} else {
|
|
#if TESTING
|
|
// ShowMessage(false, false, "Bundles: Not deleting %s", myRmCommand+pathOffset);
|
|
#endif
|
|
}
|
|
|
|
|
|
} // if (thisID)
|
|
#if TESTING
|
|
else
|
|
ShowMessage(false, false, "CFBundleGetIdentifier failed for index %d", index);
|
|
#endif
|
|
CFRelease(thisBundle);
|
|
} //if (thisBundle)
|
|
#if TESTING
|
|
else
|
|
ShowMessage(false, false, "CFBundleCreate failed for index %d", index);
|
|
#endif
|
|
CFRelease(bundleURLRef);
|
|
} // if (bundleURLRef)
|
|
#if TESTING
|
|
else
|
|
ShowMessage(false, false, "CFURLCreateWithFileSystemPath failed");
|
|
#endif
|
|
|
|
CFRelease(urlStringRef);
|
|
} // if (urlStringRef)
|
|
#if TESTING
|
|
else
|
|
ShowMessage(false, false, "CFStringCreateWithCString failed");
|
|
#endif
|
|
} // while true
|
|
|
|
closedir(dirp);
|
|
|
|
return noErr;
|
|
}
|
|
|
|
|
|
enum {
|
|
kSystemEventsCreator = 'sevs'
|
|
};
|
|
|
|
|
|
// Find all visible users and delete their login item to launch BOINC Manager.
|
|
// Remove each user from groups boinc_master and boinc_project.
|
|
// For now, don't delete user's BOINC Preferences file.
|
|
static OSStatus CleanupAllVisibleUsers(void)
|
|
{
|
|
long OSVersion = 0;
|
|
passwd *pw;
|
|
vector<string> human_user_names;
|
|
vector<uid_t> human_user_IDs;
|
|
uid_t saved_uid, saved_euid;
|
|
char human_user_name[256];
|
|
int i;
|
|
int userIndex;
|
|
int flag;
|
|
char buf[256];
|
|
char s[1024];
|
|
char cmd[2048];
|
|
char systemEventsPath[1024];
|
|
ProcessSerialNumber SystemEventsPSN;
|
|
FSRef appRef;
|
|
FILE *f;
|
|
char *p;
|
|
int id;
|
|
OSStatus err;
|
|
Boolean changeSaver;
|
|
|
|
err = Gestalt(gestaltSystemVersion, &OSVersion);
|
|
if (err != noErr) {
|
|
OSVersion = 0;
|
|
}
|
|
|
|
saved_uid = getuid();
|
|
saved_euid = geteuid();
|
|
|
|
// First, find all users on system
|
|
f = popen("dscl . list /Users UniqueID", "r");
|
|
if (f) {
|
|
while (PersistentFGets(buf, sizeof(buf), f)) {
|
|
p = strrchr(buf, ' ');
|
|
if (p) {
|
|
id = atoi(p+1);
|
|
if (id < 501) {
|
|
#if TESTING
|
|
// printf("skipping user ID %d\n", id);
|
|
// fflush(stdout);
|
|
#endif
|
|
continue;
|
|
}
|
|
|
|
while (p > buf) {
|
|
if (*p != ' ') break;
|
|
--p;
|
|
}
|
|
|
|
*(p+1) = '\0';
|
|
human_user_names.push_back(string(buf));
|
|
human_user_IDs.push_back((uid_t)id);
|
|
#if TESTING
|
|
ShowMessage(false, false, "user ID %d: %s\n", id, buf);
|
|
#endif
|
|
*(p+1) = ' ';
|
|
}
|
|
}
|
|
pclose(f);
|
|
}
|
|
|
|
for (userIndex=human_user_names.size(); userIndex>0; --userIndex) {
|
|
flag = 0;
|
|
strlcpy(human_user_name, human_user_names[userIndex-1].c_str(), sizeof(human_user_name));
|
|
|
|
// Check whether this user is a login (human) user
|
|
sprintf(s, "dscl . -read \"/Users/%s\" NFSHomeDirectory", human_user_name);
|
|
f = popen(s, "r");
|
|
if (f) {
|
|
while (PersistentFGets(buf, sizeof(buf), f)) {
|
|
p = strrchr(buf, ' ');
|
|
if (p) {
|
|
if (strstr(p, "/var/empty") != NULL) flag = 1;
|
|
}
|
|
}
|
|
pclose(f);
|
|
}
|
|
|
|
sprintf(s, "dscl . -read \"/Users/%s\" UserShell", human_user_name);
|
|
f = popen(s, "r");
|
|
if (f) {
|
|
while (PersistentFGets(buf, sizeof(buf), f)) {
|
|
p = strrchr(buf, ' ');
|
|
if (p) {
|
|
if (strstr(p, "/usr/bin/false") != NULL) flag |= 2;
|
|
}
|
|
}
|
|
pclose(f);
|
|
}
|
|
|
|
// Skip all non-human (non-login) users
|
|
if (flag == 3) { // if (Home Directory == "/var/empty") && (UserShell == "/usr/bin/false")
|
|
#if TESTING
|
|
ShowMessage(false, false, "Flag=3: skipping user ID %d: %s", human_user_IDs[userIndex-1], buf);
|
|
#endif
|
|
continue;
|
|
}
|
|
|
|
pw = getpwnam(human_user_name);
|
|
if (pw == NULL)
|
|
continue;
|
|
|
|
#if TESTING
|
|
ShowMessage(false, false, "Deleting login item for user %s: Posix name=%s, Full name=%s, UID=%d",
|
|
human_user_name, pw->pw_name, pw->pw_gecos, pw->pw_uid);
|
|
#endif
|
|
|
|
// Remove user from groups boinc_master and boinc_project
|
|
sprintf(s, "dscl . -delete /groups/boinc_master users \"%s\"", human_user_name);
|
|
system (s);
|
|
|
|
sprintf(s, "dscl . -delete /groups/boinc_project users \"%s\"", human_user_name);
|
|
system (s);
|
|
|
|
#if TESTING
|
|
// ShowMessage(false, false, "Before seteuid(%d) for user %s, euid = %d", pw->pw_uid, human_user_name, geteuid());
|
|
#endif
|
|
|
|
if (OSVersion >= 0x1060) {
|
|
setuid(0);
|
|
}
|
|
// Delete our login item(s) for this user
|
|
if (OSVersion < 0x1070) {
|
|
seteuid(pw->pw_uid); // Temporarily set effective uid to this user
|
|
DeleteLoginItemAPI();
|
|
seteuid(saved_euid); // Set effective uid back to privileged user
|
|
} else if (OSVersion >= 0x1080) {
|
|
seteuid(pw->pw_uid); // Temporarily set effective uid to this user
|
|
DeleteLoginItemFromPListFile();
|
|
seteuid(saved_euid); // Set effective uid back to privileged user
|
|
} else { // OS 10.7.x
|
|
// We must leave effective user ID as privileged user (root)
|
|
// because the target user may not be in the sudoers file.
|
|
|
|
// We must launch the System Events application for the target user
|
|
|
|
#if TESTING
|
|
ShowMessage(false, false, "Telling System Events to quit (before DeleteLoginItemOSAScript)");
|
|
#endif
|
|
// Find SystemEvents process. If found, quit it in case
|
|
// it is running under a different user.
|
|
err = QuitOneProcess(kSystemEventsCreator);
|
|
#if TESTING
|
|
if (err != noErr) {
|
|
ShowMessage(false, false, "QuitOneProcess(kSystemEventsCreator) returned error %d ", (int) err);
|
|
}
|
|
#endif
|
|
// Wait for the process to be gone
|
|
for (i=0; i<50; ++i) { // 5 seconds max delay
|
|
SleepTicks(6); // 6 Ticks == 1/10 second
|
|
err = FindProcess ('APPL', kSystemEventsCreator, &SystemEventsPSN);
|
|
if (err != noErr) break;
|
|
}
|
|
#if TESTING
|
|
if (i >= 50) {
|
|
ShowMessage(false, false, "Failed to make System Events quit");
|
|
}
|
|
#endif
|
|
sleep(2);
|
|
|
|
err = LSFindApplicationForInfo(kSystemEventsCreator, NULL, NULL, &appRef, NULL);
|
|
if (err != noErr) {
|
|
#if TESTING
|
|
ShowMessage(false, false, "LSFindApplicationForInfo(kSystemEventsCreator) returned error %d ", (int) err);
|
|
#endif
|
|
} else {
|
|
FSRefMakePath(&appRef, (UInt8*)systemEventsPath, sizeof(systemEventsPath));
|
|
#if TESTING
|
|
ShowMessage(false, false, "SystemEvents is at %s", systemEventsPath);
|
|
ShowMessage(false, false, "Launching SystemEvents for user %s", pw->pw_name);
|
|
#endif
|
|
|
|
sprintf(cmd, "sudo -iu \"%s\" \\\"%s/Contents/MacOS/System Events\\\" &", pw->pw_name, systemEventsPath);
|
|
err = system(cmd);
|
|
if (err == noErr) {
|
|
// Wait for the process to start
|
|
for (i=0; i<50; ++i) { // 5 seconds max delay
|
|
SleepTicks(6); // 6 Ticks == 1/10 second
|
|
err = FindProcess ('APPL', kSystemEventsCreator, &SystemEventsPSN);
|
|
if (err == noErr) break;
|
|
}
|
|
#if TESTING
|
|
if (i >= 50) {
|
|
ShowMessage(false, false, "Failed to launch System Events for user %s", pw->pw_name);
|
|
}
|
|
#endif
|
|
sleep(2);
|
|
|
|
DeleteLoginItemOSAScript(pw->pw_name, "BOINCManager");
|
|
DeleteLoginItemOSAScript(pw->pw_name, "GridRepublic Desktop");
|
|
DeleteLoginItemOSAScript(pw->pw_name, "Progress Thru Processors Desktop");
|
|
DeleteLoginItemOSAScript(pw->pw_name, "Charity Engine Desktop");
|
|
#if TESTING
|
|
} else {
|
|
ShowMessage(false, false, "[2] Command: %s returned error %d", cmd, (int) err);
|
|
#endif
|
|
}
|
|
}
|
|
}
|
|
|
|
// We don't delete the user's BOINC Manager preferences
|
|
// sprintf(s, "rm -f \"/Users/%s/Library/Preferences/BOINC Manager Preferences\"", human_user_name);
|
|
// system (s);
|
|
|
|
// Set screensaver to "Computer Name" default screensaver only
|
|
// if it was BOINC, GridRepublic, Progress Thru Processors or Charity Engine.
|
|
changeSaver = false;
|
|
seteuid(pw->pw_uid); // Temporarily set effective uid to this user
|
|
if (OSVersion < 0x1060) {
|
|
f = popen("defaults -currentHost read com.apple.screensaver moduleName", "r");
|
|
if (f) {
|
|
while (PersistentFGets(s, sizeof(s), f)) {
|
|
if (strstr(s, "BOINCSaver")) {
|
|
changeSaver = true;
|
|
break;
|
|
}
|
|
if (strstr(s, "GridRepublic")) {
|
|
changeSaver = true;
|
|
break;
|
|
}
|
|
if (strstr(s, "Progress Thru Processors")) {
|
|
changeSaver = true;
|
|
break;
|
|
}
|
|
if (strstr(s, "Charity Engine")) {
|
|
changeSaver = true;
|
|
break;
|
|
}
|
|
}
|
|
pclose(f);
|
|
}
|
|
} else {
|
|
err = GetCurrentScreenSaverSelection(s, sizeof(s) -1);
|
|
if (err == noErr) {
|
|
if (strstr(s, "BOINCSaver")) {
|
|
changeSaver = true;
|
|
}
|
|
if (strstr(s, "GridRepublic")) {
|
|
changeSaver = true;
|
|
}
|
|
if (strstr(s, "Progress Thru Processors")) {
|
|
changeSaver = true;
|
|
}
|
|
if (strstr(s, "Charity Engine")) {
|
|
changeSaver = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (changeSaver) {
|
|
if (OSVersion < 0x1060) {
|
|
system ("defaults -currentHost write com.apple.screensaver moduleName \"Computer Name\"");
|
|
system ("defaults -currentHost write com.apple.screensaver modulePath \"/System/Library/Frameworks/ScreenSaver.framework/Versions/A/Resources/Computer Name.saver\"");
|
|
} else {
|
|
err = SetScreenSaverSelection("Computer Name",
|
|
"/System/Library/Frameworks/ScreenSaver.framework/Versions/A/Resources/Computer Name.saver", 0);
|
|
}
|
|
}
|
|
|
|
seteuid(saved_euid); // Set effective uid back to privileged user
|
|
|
|
#if TESTING
|
|
// ShowMessage(false, false, "After seteuid(%d) for user %s, euid = %d, saved_uid = %d", pw->pw_uid, human_user_name, geteuid(), saved_uid);
|
|
#endif
|
|
} // End userIndex loop
|
|
|
|
sleep(1);
|
|
|
|
if (OSVersion >= 0x1070) {
|
|
#if TESTING
|
|
ShowMessage(false, false, "Telling System Events to quit (at end)");
|
|
#endif
|
|
err = QuitOneProcess(kSystemEventsCreator);
|
|
#if TESTING
|
|
if (err != noErr) {
|
|
ShowMessage(false, false, "QuitOneProcess(kSystemEventsCreator) returned error %d ", (int) err);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
return noErr;
|
|
}
|
|
|
|
|
|
static OSStatus GetAuthorization(AuthorizationRef * authRef, const char *pathToTool, char *brandName) {
|
|
static Boolean sIsAuthorized = false;
|
|
AuthorizationRights ourAuthRights;
|
|
AuthorizationFlags ourAuthFlags;
|
|
AuthorizationItem ourAuthRightsItem[1];
|
|
AuthorizationEnvironment ourAuthEnvironment;
|
|
AuthorizationItem ourAuthEnvItem[1];
|
|
char prompt[256];
|
|
OSStatus err = noErr;
|
|
|
|
if (sIsAuthorized)
|
|
return noErr;
|
|
|
|
sprintf(prompt, "Enter administrator password to completely remove %s from you computer.\n\n", brandName);
|
|
|
|
ourAuthRights.count = 0;
|
|
ourAuthRights.items = NULL;
|
|
|
|
err = AuthorizationCreate (&ourAuthRights, kAuthorizationEmptyEnvironment, kAuthorizationFlagDefaults, authRef);
|
|
if (err != noErr) {
|
|
ShowMessage(false, false, "AuthorizationCreate returned error %d", err);
|
|
return err;
|
|
}
|
|
|
|
ourAuthRightsItem[0].name = kAuthorizationRightExecute;
|
|
ourAuthRightsItem[0].value = (void *)pathToTool;
|
|
ourAuthRightsItem[0].valueLength = strlen (pathToTool);
|
|
ourAuthRightsItem[0].flags = 0;
|
|
ourAuthRights.count = 1;
|
|
ourAuthRights.items = ourAuthRightsItem;
|
|
|
|
ourAuthEnvItem[0].name = kAuthorizationEnvironmentPrompt;
|
|
ourAuthEnvItem[0].value = prompt;
|
|
ourAuthEnvItem[0].valueLength = strlen (prompt);
|
|
ourAuthEnvItem[0].flags = 0;
|
|
|
|
ourAuthEnvironment.count = 1;
|
|
ourAuthEnvironment.items = ourAuthEnvItem;
|
|
|
|
|
|
ourAuthFlags = kAuthorizationFlagInteractionAllowed | kAuthorizationFlagExtendRights;
|
|
|
|
// When this is called from the installer, the installer has already authenticated.
|
|
// In that case we are already running with full root privileges so AuthorizationCopyRights()
|
|
// does not request a password from the user again.
|
|
err = AuthorizationCopyRights (*authRef, &ourAuthRights, &ourAuthEnvironment, ourAuthFlags, NULL);
|
|
|
|
if (err == noErr)
|
|
sIsAuthorized = true;
|
|
|
|
return err;
|
|
}
|
|
|
|
|
|
|
|
static OSStatus DoPrivilegedExec(char *brandName, const char *pathToTool, char *arg1, char *arg2, char *arg3, char *arg4, char *arg5) {
|
|
AuthorizationRef authRef = NULL;
|
|
short i;
|
|
char *args[8];
|
|
OSStatus err;
|
|
FILE *ioPipe;
|
|
char *p, junk[256];
|
|
|
|
err = GetAuthorization(&authRef, pathToTool, brandName);
|
|
if (err != noErr) {
|
|
if (err != errAuthorizationCanceled)
|
|
ShowMessage(false, false, "GetAuthorization returned error %d", err);
|
|
return err;
|
|
}
|
|
|
|
for (i=0; i<5; i++) { // Retry 5 times if error
|
|
args[0] = arg1;
|
|
args[1] = arg2;
|
|
args[2] = arg3;
|
|
args[3] = arg4;
|
|
args[4] = arg5;
|
|
args[5] = NULL;
|
|
|
|
err = AuthorizationExecuteWithPrivileges (authRef, pathToTool, 0, args, &ioPipe);
|
|
// We use the pipe to signal us when the command has completed
|
|
if (ioPipe) {
|
|
do {
|
|
p = fgets(junk, sizeof(junk), ioPipe);
|
|
} while (p);
|
|
|
|
fclose (ioPipe);
|
|
}
|
|
|
|
if (err == noErr)
|
|
break;
|
|
}
|
|
|
|
if (err != noErr)
|
|
ShowMessage(false, false, "\"%s %s %s %s %s %s\" returned error %d", pathToTool,
|
|
arg1 ? arg1 : "", arg2 ? arg2 : "", arg3 ? arg3 : "",
|
|
arg4 ? arg4 : "", arg5 ? arg5 : "", err);
|
|
|
|
return err;
|
|
}
|
|
|
|
|
|
// Used for OS 10.7.x
|
|
static void DeleteLoginItemOSAScript(char* user, char* appName)
|
|
{
|
|
char cmd[2048];
|
|
OSErr err;
|
|
|
|
sprintf(cmd, "sudo -u \"%s\" osascript -e 'tell application \"System Events\"' -e 'delete (every login item whose name contains \"%s\")' -e 'end tell'", user, appName);
|
|
err = system(cmd);
|
|
#if TESTING
|
|
if (err) {
|
|
ShowMessage(false, false, "Command: %s returned error %d", cmd, err);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
|
|
// Used for OS < OS 10.7
|
|
static void DeleteLoginItemAPI(void)
|
|
{
|
|
Boolean success;
|
|
int numberOfLoginItems, counter;
|
|
char *p, *q;
|
|
|
|
success = false;
|
|
|
|
numberOfLoginItems = GetCountOfLoginItems(kCurrentUser);
|
|
|
|
// Search existing login items in reverse order, deleting ours
|
|
for (counter = numberOfLoginItems ; counter > 0 ; counter--)
|
|
{
|
|
p = ReturnLoginItemPropertyAtIndex(kCurrentUser, kApplicationNameInfo, counter-1);
|
|
q = p;
|
|
while (*q)
|
|
{
|
|
// It is OK to modify the returned string because we "own" it
|
|
*q = toupper(*q); // Make it case-insensitive
|
|
q++;
|
|
}
|
|
|
|
if (strcmp(p, "BOINCMANAGER.APP") == 0)
|
|
success = RemoveLoginItemAtIndex(kCurrentUser, counter-1);
|
|
if (strcmp(p, "GRIDREPUBLIC DESKTOP.APP") == 0)
|
|
success = RemoveLoginItemAtIndex(kCurrentUser, counter-1);
|
|
if (strcmp(p, "PROGRESS THRU PROCESSORS DESKTOP.APP") == 0)
|
|
success = RemoveLoginItemAtIndex(kCurrentUser, counter-1);
|
|
if (strcmp(p, "CHARITY ENGINE DESKTOP.APP") == 0)
|
|
success = RemoveLoginItemAtIndex(kCurrentUser, counter-1);
|
|
}
|
|
}
|
|
|
|
|
|
// Used for OS 10.8
|
|
static void DeleteLoginItemFromPListFile(void)
|
|
{
|
|
Boolean success;
|
|
int numberOfLoginItems, counter;
|
|
char theName[256], *q;
|
|
|
|
success = false;
|
|
|
|
numberOfLoginItems = GetCountOfLoginItemsFromPlistFile();
|
|
|
|
// Search existing login items in reverse order, deleting ours
|
|
for (counter = numberOfLoginItems ; counter > 0 ; counter--)
|
|
{
|
|
GetLoginItemNameAtIndexFromPlistFile(counter-1, theName, sizeof(theName));
|
|
q = theName;
|
|
while (*q)
|
|
{
|
|
// It is OK to modify the returned string because we "own" it
|
|
*q = toupper(*q); // Make it case-insensitive
|
|
q++;
|
|
}
|
|
|
|
if (strstr(theName, "BOINCMANAGER"))
|
|
success = DeleteLoginItemNameAtIndexFromPlistFile(counter-1);
|
|
if (strstr(theName, "GRIDREPUBLIC DESKTOP"))
|
|
success = DeleteLoginItemNameAtIndexFromPlistFile(counter-1);
|
|
if (strstr(theName, "PROGRESS THRU PROCESSORS DESKTOP"))
|
|
success = DeleteLoginItemNameAtIndexFromPlistFile(counter-1);
|
|
if (strstr(theName, "CHARITY ENGINE DESKTOP"))
|
|
success = DeleteLoginItemNameAtIndexFromPlistFile(counter-1);
|
|
}
|
|
}
|
|
|
|
|
|
static char * PersistentFGets(char *buf, size_t buflen, FILE *f) {
|
|
char *p = buf;
|
|
size_t len = buflen;
|
|
size_t datalen = 0;
|
|
|
|
*buf = '\0';
|
|
while (datalen < (buflen - 1)) {
|
|
fgets(p, len, f);
|
|
if (feof(f)) break;
|
|
if (ferror(f) && (errno != EINTR)) break;
|
|
if (strchr(buf, '\n')) break;
|
|
datalen = strlen(buf);
|
|
p = buf + datalen;
|
|
len -= datalen;
|
|
}
|
|
return (buf[0] ? buf : NULL);
|
|
}
|
|
|
|
|
|
OSErr GetCurrentScreenSaverSelection(char *moduleName, size_t maxLen) {
|
|
OSErr err = noErr;
|
|
CFStringRef nameKey = CFStringCreateWithCString(NULL,"moduleName",kCFStringEncodingASCII);
|
|
CFStringRef moduleNameAsCFString;
|
|
CFDictionaryRef theData;
|
|
|
|
theData = (CFDictionaryRef)CFPreferencesCopyValue(CFSTR("moduleDict"),
|
|
CFSTR("com.apple.screensaver"),
|
|
kCFPreferencesCurrentUser,
|
|
kCFPreferencesCurrentHost
|
|
);
|
|
if (theData == NULL) {
|
|
CFRelease(nameKey);
|
|
return (-1);
|
|
}
|
|
|
|
if (CFDictionaryContainsKey(theData, nameKey) == false)
|
|
{
|
|
moduleName[0] = 0;
|
|
CFRelease(nameKey);
|
|
CFRelease(theData);
|
|
return(-1);
|
|
}
|
|
|
|
moduleNameAsCFString = CFStringCreateCopy(NULL, (CFStringRef)CFDictionaryGetValue(theData, nameKey));
|
|
CFStringGetCString(moduleNameAsCFString, moduleName, maxLen, kCFStringEncodingASCII);
|
|
|
|
CFRelease(nameKey);
|
|
CFRelease(theData);
|
|
CFRelease(moduleNameAsCFString);
|
|
return err;
|
|
}
|
|
|
|
|
|
OSErr SetScreenSaverSelection(char *moduleName, char *modulePath, int type) {
|
|
OSErr err = noErr;
|
|
CFStringRef preferenceName = CFSTR("com.apple.screensaver");
|
|
CFStringRef mainKeyName = CFSTR("moduleDict");
|
|
CFDictionaryRef emptyData;
|
|
CFMutableDictionaryRef newData;
|
|
Boolean success;
|
|
|
|
CFStringRef nameKey = CFStringCreateWithCString(NULL, "moduleName", kCFStringEncodingASCII);
|
|
CFStringRef nameValue = CFStringCreateWithCString(NULL, moduleName, kCFStringEncodingASCII);
|
|
|
|
CFStringRef pathKey = CFStringCreateWithCString(NULL, "path", kCFStringEncodingASCII);
|
|
CFStringRef pathValue = CFStringCreateWithCString(NULL, modulePath, kCFStringEncodingASCII);
|
|
|
|
CFStringRef typeKey = CFStringCreateWithCString(NULL, "type", kCFStringEncodingASCII);
|
|
CFNumberRef typeValue = CFNumberCreate(NULL, kCFNumberIntType, &type);
|
|
|
|
emptyData = CFDictionaryCreate(NULL, NULL, NULL, 0, NULL, NULL);
|
|
if (emptyData == NULL) {
|
|
CFRelease(nameKey);
|
|
CFRelease(nameValue);
|
|
CFRelease(pathKey);
|
|
CFRelease(pathValue);
|
|
CFRelease(typeKey);
|
|
CFRelease(typeValue);
|
|
return(-1);
|
|
}
|
|
|
|
newData = CFDictionaryCreateMutableCopy(NULL,0, emptyData);
|
|
|
|
if (newData == NULL)
|
|
{
|
|
CFRelease(nameKey);
|
|
CFRelease(nameValue);
|
|
CFRelease(pathKey);
|
|
CFRelease(pathValue);
|
|
CFRelease(typeKey);
|
|
CFRelease(typeValue);
|
|
CFRelease(emptyData);
|
|
return(-1);
|
|
}
|
|
|
|
CFDictionaryAddValue(newData, nameKey, nameValue);
|
|
CFDictionaryAddValue(newData, pathKey, pathValue);
|
|
CFDictionaryAddValue(newData, typeKey, typeValue);
|
|
|
|
CFPreferencesSetValue(mainKeyName, newData, preferenceName, kCFPreferencesCurrentUser, kCFPreferencesCurrentHost);
|
|
success = CFPreferencesSynchronize(preferenceName, kCFPreferencesCurrentUser, kCFPreferencesCurrentHost);
|
|
|
|
if (!success) {
|
|
err = -1;
|
|
}
|
|
|
|
CFRelease(nameKey);
|
|
CFRelease(nameValue);
|
|
CFRelease(pathKey);
|
|
CFRelease(pathValue);
|
|
CFRelease(typeKey);
|
|
CFRelease(typeValue);
|
|
CFRelease(emptyData);
|
|
CFRelease(newData);
|
|
|
|
return err;
|
|
}
|
|
|
|
|
|
int GetCountOfLoginItemsFromPlistFile() {
|
|
CFArrayRef arrayOfLoginItemsFixed;
|
|
int valueToReturn = -1;
|
|
CFStringRef loginItemArrayKeyName = CFSTR("CustomListItems");
|
|
CFDictionaryRef topLevelDict;
|
|
|
|
topLevelDict = (CFDictionaryRef)CFPreferencesCopyValue(CFSTR("SessionItems"), CFSTR("com.apple.loginitems"), kCFPreferencesCurrentUser, kCFPreferencesAnyHost);
|
|
if (topLevelDict == NULL) {
|
|
return (0);
|
|
}
|
|
|
|
if (CFDictionaryContainsKey(topLevelDict, loginItemArrayKeyName) == false)
|
|
{
|
|
CFRelease(topLevelDict);
|
|
return(0);
|
|
}
|
|
|
|
arrayOfLoginItemsFixed = (CFArrayRef)CFDictionaryGetValue(topLevelDict, loginItemArrayKeyName);
|
|
if( arrayOfLoginItemsFixed == NULL)
|
|
{
|
|
CFRelease(topLevelDict);
|
|
return(0);
|
|
}
|
|
|
|
valueToReturn = (int) CFArrayGetCount(arrayOfLoginItemsFixed);
|
|
|
|
CFRelease(topLevelDict);
|
|
return(valueToReturn);
|
|
}
|
|
|
|
|
|
// Returns empty string on failure
|
|
OSErr GetLoginItemNameAtIndexFromPlistFile(int index, char *name, size_t maxLen) {
|
|
CFArrayRef arrayOfLoginItemsFixed = NULL;
|
|
CFStringRef loginItemArrayKeyName = CFSTR("CustomListItems");
|
|
CFDictionaryRef topLevelDict = NULL;
|
|
CFDictionaryRef loginItemDict = NULL;
|
|
CFStringRef nameKey = CFSTR("Name");
|
|
CFStringRef nameAsCFString = NULL;
|
|
|
|
*name = 0; // Prepare for failure
|
|
|
|
topLevelDict = (CFDictionaryRef)CFPreferencesCopyValue(CFSTR("SessionItems"), CFSTR("com.apple.loginitems"), kCFPreferencesCurrentUser, kCFPreferencesAnyHost);
|
|
if (topLevelDict == NULL) {
|
|
return (-1);
|
|
}
|
|
|
|
if (CFDictionaryContainsKey(topLevelDict, loginItemArrayKeyName) == false)
|
|
{
|
|
CFRelease(topLevelDict);
|
|
return(-1);
|
|
}
|
|
|
|
arrayOfLoginItemsFixed = (CFArrayRef) CFDictionaryGetValue(topLevelDict, loginItemArrayKeyName);
|
|
if( arrayOfLoginItemsFixed == NULL)
|
|
{
|
|
CFRelease(topLevelDict);
|
|
return(-1);
|
|
}
|
|
|
|
loginItemDict = (CFDictionaryRef) CFArrayGetValueAtIndex(arrayOfLoginItemsFixed, (CFIndex)index);
|
|
if (loginItemDict == NULL)
|
|
{
|
|
CFRelease(topLevelDict);
|
|
return(-1);
|
|
}
|
|
|
|
if (CFDictionaryContainsKey(loginItemDict, nameKey) == false)
|
|
{
|
|
CFRelease(topLevelDict);
|
|
return(-1);
|
|
}
|
|
|
|
nameAsCFString = CFStringCreateCopy(NULL, (CFStringRef)CFDictionaryGetValue(loginItemDict, nameKey));
|
|
CFStringGetCString(nameAsCFString, name, maxLen, kCFStringEncodingASCII);
|
|
|
|
CFRelease(topLevelDict);
|
|
CFRelease(nameAsCFString);
|
|
return(noErr);
|
|
}
|
|
|
|
|
|
OSErr DeleteLoginItemNameAtIndexFromPlistFile(int index){
|
|
CFArrayRef arrayOfLoginItemsFixed = NULL;
|
|
CFMutableArrayRef arrayOfLoginItemsModifiable;
|
|
CFStringRef topLevelKeyName = CFSTR("SessionItems");
|
|
CFStringRef preferenceName = CFSTR("com.apple.loginitems");
|
|
CFStringRef loginItemArrayKeyName = CFSTR("CustomListItems");
|
|
CFDictionaryRef oldTopLevelDict = NULL;
|
|
CFMutableDictionaryRef newTopLevelDict = NULL;
|
|
Boolean success;
|
|
OSErr err = noErr;
|
|
|
|
oldTopLevelDict = (CFDictionaryRef)CFPreferencesCopyValue(topLevelKeyName, preferenceName, kCFPreferencesCurrentUser, kCFPreferencesAnyHost);
|
|
if (oldTopLevelDict == NULL) {
|
|
return (-1);
|
|
}
|
|
|
|
if (CFDictionaryContainsKey(oldTopLevelDict, loginItemArrayKeyName) == false)
|
|
{
|
|
CFRelease(oldTopLevelDict);
|
|
return(-1);
|
|
}
|
|
|
|
arrayOfLoginItemsFixed = (CFArrayRef) CFDictionaryGetValue(oldTopLevelDict, loginItemArrayKeyName);
|
|
if( arrayOfLoginItemsFixed == NULL)
|
|
{
|
|
CFRelease(oldTopLevelDict);
|
|
return(-1);
|
|
}
|
|
|
|
arrayOfLoginItemsModifiable = CFArrayCreateMutableCopy(NULL, 0, arrayOfLoginItemsFixed);
|
|
if( arrayOfLoginItemsModifiable == NULL)
|
|
{
|
|
CFRelease(oldTopLevelDict);
|
|
return(-1);
|
|
}
|
|
|
|
CFArrayRemoveValueAtIndex(arrayOfLoginItemsModifiable, (CFIndex) index);
|
|
|
|
newTopLevelDict = CFDictionaryCreateMutableCopy(NULL, 0, oldTopLevelDict);
|
|
CFDictionaryReplaceValue(newTopLevelDict, loginItemArrayKeyName, arrayOfLoginItemsModifiable);
|
|
|
|
CFPreferencesSetValue(topLevelKeyName, newTopLevelDict, preferenceName, kCFPreferencesCurrentUser, kCFPreferencesAnyHost);
|
|
success = CFPreferencesSynchronize(preferenceName, kCFPreferencesCurrentUser, kCFPreferencesAnyHost);
|
|
|
|
if (!success) {
|
|
err = -1;
|
|
}
|
|
|
|
CFRelease(oldTopLevelDict);
|
|
CFRelease(newTopLevelDict);
|
|
|
|
return(err);
|
|
|
|
}
|
|
|
|
|
|
// ---------------------------------------------------------------------------
|
|
/* This runs through the process list looking for the indicated application */
|
|
/* Searches for process by file type and signature (creator code) */
|
|
// ---------------------------------------------------------------------------
|
|
static OSErr FindProcess (OSType typeToFind, OSType creatorToFind, ProcessSerialNumberPtr processSN)
|
|
{
|
|
ProcessInfoRec tempInfo;
|
|
FSSpec procSpec;
|
|
Str31 processName;
|
|
OSErr myErr = noErr;
|
|
/* null out the PSN so we're starting at the beginning of the list */
|
|
processSN->lowLongOfPSN = kNoProcess;
|
|
processSN->highLongOfPSN = kNoProcess;
|
|
/* initialize the process information record */
|
|
tempInfo.processInfoLength = sizeof(ProcessInfoRec);
|
|
tempInfo.processName = processName;
|
|
tempInfo.processAppSpec = &procSpec;
|
|
/* loop through all the processes until we */
|
|
/* 1) find the process we want */
|
|
/* 2) error out because of some reason (usually, no more processes) */
|
|
do {
|
|
myErr = GetNextProcess(processSN);
|
|
if (myErr == noErr)
|
|
GetProcessInformation(processSN, &tempInfo);
|
|
}
|
|
while ((tempInfo.processSignature != creatorToFind || tempInfo.processType != typeToFind) &&
|
|
myErr == noErr);
|
|
return(myErr);
|
|
}
|
|
|
|
|
|
static pid_t FindProcessPID(char* name, pid_t thePID)
|
|
{
|
|
FILE *f;
|
|
char buf[1024];
|
|
size_t n = 0;
|
|
pid_t aPID;
|
|
|
|
if (name != NULL) // Search ny name
|
|
n = strlen(name);
|
|
|
|
f = popen("ps -a -x -c -o command,pid", "r");
|
|
if (f == NULL)
|
|
return 0;
|
|
|
|
while (PersistentFGets(buf, sizeof(buf), f))
|
|
{
|
|
if (name != NULL) { // Search by name
|
|
if (strncmp(buf, name, n) == 0)
|
|
{
|
|
aPID = atol(buf+16);
|
|
pclose(f);
|
|
return aPID;
|
|
}
|
|
} else { // Search by PID
|
|
aPID = atol(buf+16);
|
|
if (aPID == thePID) {
|
|
pclose(f);
|
|
return aPID;
|
|
}
|
|
}
|
|
}
|
|
pclose(f);
|
|
return 0;
|
|
}
|
|
|
|
|
|
static OSStatus QuitOneProcess(OSType signature) {
|
|
bool done = false;
|
|
ProcessSerialNumber thisPSN;
|
|
ProcessInfoRec thisPIR;
|
|
OSStatus err = noErr;
|
|
Str63 thisProcessName;
|
|
AEAddressDesc thisPSNDesc;
|
|
AppleEvent thisQuitEvent, thisReplyEvent;
|
|
|
|
|
|
thisPIR.processInfoLength = sizeof (ProcessInfoRec);
|
|
thisPIR.processName = thisProcessName;
|
|
thisPIR.processAppSpec = nil;
|
|
|
|
thisPSN.highLongOfPSN = 0;
|
|
thisPSN.lowLongOfPSN = kNoProcess;
|
|
|
|
while (done == false) {
|
|
err = GetNextProcess(&thisPSN);
|
|
if (err == procNotFound)
|
|
done = true; // apparently the demo app isn't running. Odd but not impossible
|
|
else {
|
|
err = GetProcessInformation(&thisPSN,&thisPIR);
|
|
if (err != noErr)
|
|
goto bail;
|
|
|
|
if (thisPIR.processSignature == signature) { // is it or target process?
|
|
err = AECreateDesc(typeProcessSerialNumber, (Ptr)&thisPSN,
|
|
sizeof(thisPSN), &thisPSNDesc);
|
|
if (err != noErr)
|
|
goto bail;
|
|
|
|
// Create the 'quit' Apple event for this process.
|
|
err = AECreateAppleEvent(kCoreEventClass, kAEQuitApplication, &thisPSNDesc,
|
|
kAutoGenerateReturnID, kAnyTransactionID, &thisQuitEvent);
|
|
if (err != noErr) {
|
|
AEDisposeDesc (&thisPSNDesc);
|
|
goto bail; // don't know how this could happen, but limp gamely onward
|
|
}
|
|
|
|
// send the event
|
|
err = AESend(&thisQuitEvent, &thisReplyEvent, kAEWaitReply,
|
|
kAENormalPriority, kAEDefaultTimeout, 0L, 0L);
|
|
AEDisposeDesc (&thisQuitEvent);
|
|
AEDisposeDesc (&thisPSNDesc);
|
|
#if 0
|
|
if (err == errAETimeout) {
|
|
pid_t thisPID;
|
|
|
|
err = GetProcessPID(&thisPSN , &thisPID);
|
|
if (err == noErr)
|
|
err = kill(thisPID, SIGKILL);
|
|
}
|
|
#endif
|
|
done = true; // we've killed the process, presumably
|
|
}
|
|
}
|
|
}
|
|
|
|
bail:
|
|
return err;
|
|
}
|
|
|
|
|
|
// Uses usleep to sleep for full duration even if a signal is received
|
|
static void SleepTicks(UInt32 ticksToSleep) {
|
|
UInt32 endSleep, timeNow, ticksRemaining;
|
|
|
|
timeNow = TickCount();
|
|
ticksRemaining = ticksToSleep;
|
|
endSleep = timeNow + ticksToSleep;
|
|
while ( (timeNow < endSleep) && (ticksRemaining <= ticksToSleep) ) {
|
|
usleep(16667 * ticksRemaining);
|
|
timeNow = TickCount();
|
|
ticksRemaining = endSleep - timeNow;
|
|
}
|
|
}
|
|
|
|
|
|
static Boolean ShowMessage(Boolean allowCancel, Boolean continueButton, const char *format, ...) {
|
|
va_list args;
|
|
char s[1024];
|
|
short itemHit;
|
|
AlertStdAlertParamRec alertParams;
|
|
|
|
ProcessSerialNumber ourProcess;
|
|
|
|
va_start(args, format);
|
|
s[0] = vsprintf(s+1, format, args);
|
|
va_end(args);
|
|
|
|
alertParams.movable = true;
|
|
alertParams.helpButton = false;
|
|
alertParams.filterProc = NULL;
|
|
alertParams.defaultText = continueButton? "\pContinue..." : (StringPtr)-1;
|
|
alertParams.cancelText = allowCancel ? (StringPtr)-1 : NULL;
|
|
alertParams.otherText = NULL;
|
|
alertParams.defaultButton = kAlertStdAlertOKButton;
|
|
alertParams.cancelButton = allowCancel ? kAlertStdAlertCancelButton : 0;
|
|
alertParams.position = kWindowDefaultPosition;
|
|
|
|
::GetCurrentProcess (&ourProcess);
|
|
::SetFrontProcess(&ourProcess);
|
|
|
|
StandardAlert (kAlertNoteAlert, (StringPtr)s, NULL, &alertParams, &itemHit);
|
|
|
|
return (itemHit == kAlertStdAlertOKButton);
|
|
}
|
|
|
|
|
|
#if SEARCHFORALLBOINCMANAGERS
|
|
static OSStatus GetpathToBOINCManagerApp(char* path, int maxLen, FSRef *theFSRef)
|
|
{
|
|
CFStringRef bundleID = CFSTR("edu.berkeley.boinc");
|
|
OSType creator = 'BNC!';
|
|
OSStatus status = noErr;
|
|
|
|
status = LSFindApplicationForInfo(creator, bundleID, NULL, theFSRef, NULL);
|
|
if (status) {
|
|
#if TESTING
|
|
ShowMessage(false, false, "LSFindApplicationForInfo returned error %d", status);
|
|
#endif
|
|
return status;
|
|
}
|
|
|
|
status = FSRefMakePath(theFSRef, (unsigned char *)path, maxLen);
|
|
#if TESTING
|
|
if (status)
|
|
ShowMessage(false, false, "GetpathToBOINCManagerApp FSRefMakePath returned error %d, %s", status, path);
|
|
#endif
|
|
|
|
return status;
|
|
}
|
|
#endif // SEARCHFORALLBOINCMANAGERS
|