mirror of https://github.com/BOINC/boinc.git
975 lines
32 KiB
C++
975 lines
32 KiB
C++
// This file is part of BOINC.
|
|
// http://boinc.berkeley.edu
|
|
// Copyright (C) 2018 University of California
|
|
//
|
|
// BOINC is free software; you can redistribute it and/or modify it
|
|
// under the terms of the GNU Lesser General Public License
|
|
// as published by the Free Software Foundation,
|
|
// either version 3 of the License, or (at your option) any later version.
|
|
//
|
|
// BOINC is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
|
// See the GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with BOINC. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
/* AddRemoveUser.cpp */
|
|
|
|
#define VERBOSE 0
|
|
#define VERBOSE_SPAWN 0 /* for debugging callPosixSpawn */
|
|
|
|
#define USE_OSASCRIPT_FOR_ALL_LOGGED_IN_USERS false
|
|
|
|
#include <Carbon/Carbon.h>
|
|
|
|
#include <unistd.h> // getlogin
|
|
#include <sys/types.h> // getpwname, getpwuid, getuid
|
|
#include <sys/time.h>
|
|
#include <pwd.h> // getpwname, getpwuid, getuid
|
|
#include <grp.h> // getgrnam
|
|
#include <sys/param.h> // for MAXPATHLEN
|
|
#include <sys/stat.h> // for chmod
|
|
#include "mac_util.h"
|
|
#include "filesys.h"
|
|
#include "util.h"
|
|
#include "mac_branding.h"
|
|
|
|
void printUsage(long brandID);
|
|
Boolean SetLoginItemOSAScript(long brandID, Boolean deleteLogInItem, char *userName);
|
|
Boolean SetLoginItemLaunchAgent(long brandID, Boolean deleteLogInItem, passwd *pw);
|
|
Boolean SetLoginItemLaunchAgentShellScript(long brandID, Boolean deleteLogInItem, passwd *pw);
|
|
Boolean SetLoginItemLaunchAgentFinishInstallApp(long brandID, Boolean deleteLogInItem, passwd *pw);
|
|
OSErr GetCurrentScreenSaverSelection(passwd *pw, char *moduleName, size_t maxLen);
|
|
OSErr SetScreenSaverSelection(passwd *pw, char *moduleName, char *modulePath, int type);
|
|
pid_t FindProcessPID(char* name, pid_t thePID);
|
|
#if USE_OSASCRIPT_FOR_ALL_LOGGED_IN_USERS
|
|
static Boolean IsUserLoggedIn(const char *userName);
|
|
#endif
|
|
static char * PersistentFGets(char *buf, size_t buflen, FILE *f);
|
|
static void SleepSeconds(double seconds);
|
|
long GetBrandID(void);
|
|
static int parse_posic_spawn_command_line(char* p, char** argv);
|
|
int callPosixSpawn(const char *cmd);
|
|
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
long brandID = 0;
|
|
Boolean AddUsers = false;
|
|
Boolean SetSavers = false;
|
|
Boolean isBMGroupMember, isBPGroupMember;
|
|
Boolean saverIsSet = false;
|
|
passwd *pw;
|
|
uid_t saved_uid;
|
|
group grpBOINC_master, *grpBOINC_masterPtr;
|
|
group grpBOINC_project, *grpBOINC_projectPtr;
|
|
char bmBuf[32768];
|
|
char bpBuf[32768];
|
|
char loginName[256];
|
|
short index, i;
|
|
FILE *f;
|
|
int flag;
|
|
char *p;
|
|
char s[1024], buf[1024];
|
|
OSStatus err;
|
|
|
|
brandID = GetBrandID();
|
|
|
|
#ifndef _DEBUG
|
|
if (getuid() != 0) {
|
|
printf("This program must be run as root\n");
|
|
printUsage(brandID);
|
|
return 0;
|
|
}
|
|
#endif
|
|
saved_uid = geteuid();
|
|
|
|
if (argc < 3) {
|
|
printUsage(brandID);
|
|
return 0;
|
|
}
|
|
|
|
if (strcmp(argv[1], "-a") == 0) {
|
|
AddUsers = true;
|
|
} else if (strcmp(argv[1], "-s") == 0) {
|
|
AddUsers = true;
|
|
SetSavers = true;
|
|
} else if (strcmp(argv[1], "-r") != 0) {
|
|
printUsage(brandID);
|
|
return 0;
|
|
}
|
|
|
|
printf("\n");
|
|
|
|
if (!check_branding_arrays(s, sizeof(s))) {
|
|
printf("Branding array has too few entries: %s\n", s);
|
|
return -1;
|
|
}
|
|
|
|
loginName[0] = '\0';
|
|
strncpy(loginName, getenv("USER"), sizeof(loginName)-1);
|
|
|
|
err = getgrnam_r("boinc_master", &grpBOINC_master, bmBuf, sizeof(bmBuf), &grpBOINC_masterPtr);
|
|
if (err) { // Should never happen unless buffer too small
|
|
puts("getgrnam(\"boinc_master\") failed\n");
|
|
return -1;
|
|
}
|
|
|
|
err = getgrnam_r("boinc_project", &grpBOINC_project, bpBuf, sizeof(bpBuf), &grpBOINC_projectPtr);
|
|
if (err) { // Should never happen unless buffer too small
|
|
puts("getgrnam(\"boinc_project\") failed\n");
|
|
return -1;
|
|
}
|
|
|
|
for (index=2; index<argc; index++) {
|
|
// getpwnam works with either the full / login name (pw->pw_gecos)
|
|
// or the short / Posix name (pw->pw_name)
|
|
pw = getpwnam(argv[index]);
|
|
if ((pw == NULL) || (pw->pw_uid < 501)) {
|
|
printf("User %s not found.\n\n", argv[index]);
|
|
continue;
|
|
}
|
|
|
|
flag = 0;
|
|
sprintf(s, "dscl . -read \"/Users/%s\" NFSHomeDirectory", pw->pw_name);
|
|
f = popen(s, "r");
|
|
if (!f) {
|
|
flag = 1;
|
|
} else {
|
|
while (PersistentFGets(buf, sizeof(buf), f)) {
|
|
p = strrchr(buf, ' ');
|
|
if (p) {
|
|
if (strstr(p, "/var/empty") != NULL) {
|
|
flag = 1;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
pclose(f);
|
|
}
|
|
|
|
if (flag) {
|
|
sprintf(s, "dscl . -read \"/Users/%s\" UserShell", pw->pw_name);
|
|
f = popen(s, "r");
|
|
if (!f) {
|
|
flag |= 2;
|
|
} else {
|
|
while (PersistentFGets(buf, sizeof(buf), f)) {
|
|
p = strrchr(buf, ' ');
|
|
if (p) {
|
|
if (strstr(p, "/usr/bin/false") != NULL) {
|
|
flag |= 2;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
pclose(f);
|
|
}
|
|
}
|
|
|
|
if (flag == 3) { // if (Home Directory == "/var/empty") && (UserShell == "/usr/bin/false")
|
|
printf("%s is not a valid user name.\n\n", argv[index]);
|
|
continue;
|
|
}
|
|
|
|
printf("%s user %s (/Users/%s)\n", AddUsers? "Adding" : "Removing", pw->pw_gecos, pw->pw_name);
|
|
|
|
isBMGroupMember = false;
|
|
i = 0;
|
|
while ((p = grpBOINC_master.gr_mem[i]) != NULL) { // Step through all users in group boinc_master
|
|
if (strcmp(p, pw->pw_name) == 0) { // Only the short / Posix names are in the list
|
|
// User is a member of group boinc_master
|
|
isBMGroupMember = true;
|
|
break;
|
|
}
|
|
++i;
|
|
}
|
|
|
|
isBPGroupMember = false;
|
|
i = 0;
|
|
while ((p = grpBOINC_project.gr_mem[i]) != NULL) { // Step through all users in group boinc_project
|
|
if (strcmp(p, pw->pw_name) == 0) { // Only the short / Posix names are in the list
|
|
// User is a member of group boinc_master
|
|
isBPGroupMember = true;
|
|
break;
|
|
}
|
|
++i;
|
|
}
|
|
|
|
if ((!isBMGroupMember) && AddUsers) {
|
|
sprintf(s, "dscl . -merge /groups/boinc_master GroupMembership %s", pw->pw_name);
|
|
callPosixSpawn(s);
|
|
}
|
|
|
|
if ((!isBPGroupMember) && AddUsers) {
|
|
sprintf(s, "dscl . -merge /groups/boinc_project GroupMembership %s", pw->pw_name);
|
|
callPosixSpawn(s);
|
|
}
|
|
|
|
if (isBMGroupMember && (!AddUsers)) {
|
|
sprintf(s, "dscl . -delete /Groups/boinc_master GroupMembership %s", pw->pw_name);
|
|
callPosixSpawn(s);
|
|
}
|
|
|
|
if (isBPGroupMember && (!AddUsers)) {
|
|
sprintf(s, "dscl . -delete /Groups/boinc_project GroupMembership %s", pw->pw_name);
|
|
callPosixSpawn(s);
|
|
}
|
|
|
|
if (!AddUsers) {
|
|
// Delete per-user BOINC Manager and screensaver files
|
|
sprintf(s, "rm -fR \"/Users/%s/Library/Application Support/BOINC\"", pw->pw_name);
|
|
callPosixSpawn (s);
|
|
}
|
|
|
|
// Set or remove login item for this user
|
|
bool useOSASript = false;
|
|
|
|
if ((compareOSVersionTo(10, 13) < 0)
|
|
|| (strcmp(loginName, pw->pw_name) == 0)
|
|
|| (strcmp(loginName, pw->pw_gecos) == 0)) {
|
|
useOSASript = true;
|
|
}
|
|
#if USE_OSASCRIPT_FOR_ALL_LOGGED_IN_USERS
|
|
if (! useOSASript) {
|
|
useOSASript = IsUserLoggedIn(pw->pw_name);
|
|
}
|
|
#endif
|
|
if (useOSASript) {
|
|
snprintf(s, sizeof(s), "/Users/%s/Library/LaunchAgents/edu.berkeley.boinc.plist", pw->pw_name);
|
|
boinc_delete_file(s);
|
|
SetLoginItemOSAScript(brandID, !AddUsers, pw->pw_name);
|
|
} else {
|
|
SetLoginItemLaunchAgent(brandID, !AddUsers, pw);
|
|
}
|
|
|
|
saverIsSet = false;
|
|
err = GetCurrentScreenSaverSelection(pw, s, sizeof(s) -1);
|
|
#if VERBOSE
|
|
fprintf(stderr, "Current Screensaver Selection for user %s is: \"%s\"\n", pw->pw_name, s);
|
|
#endif
|
|
if (err == noErr) {
|
|
if (!strcmp(s, saverName[brandID])) {
|
|
saverIsSet = true;
|
|
}
|
|
}
|
|
|
|
if (SetSavers) {
|
|
if (saverIsSet) {
|
|
printf("Screensaver already set to %s for user %s (/Users/%s)\n", saverName[brandID], pw->pw_gecos, pw->pw_name);
|
|
} else {
|
|
printf("Setting screensaver to %s for user %s (/Users/%s)\n", saverName[brandID], pw->pw_gecos, pw->pw_name);
|
|
}
|
|
}
|
|
|
|
if ((!saverIsSet) && SetSavers) {
|
|
seteuid(pw->pw_uid); // Temporarily set effective uid to this user
|
|
sprintf(s, "/Library/Screen Savers/%s.saver", saverName[brandID]);
|
|
err = SetScreenSaverSelection(pw, saverName[brandID], s, 0);
|
|
#if VERBOSE
|
|
fprintf(stderr, "SetScreenSaverSelection for user %s (uid %d) to \"%s\" returned error %d\n", pw->pw_name, geteuid(), saverName[brandID], err);
|
|
#endif
|
|
seteuid(saved_uid); // Set effective uid back to privileged user
|
|
// This seems to work also:
|
|
// sprintf(buf, "su -l \"%s\" -c 'defaults -currentHost write com.apple.screensaver moduleDict -dict moduleName \"%s\" path \"%s\ type 0'", pw->pw_name, saverName[brandID], s);
|
|
// callPosixSpawn(s);
|
|
}
|
|
|
|
if (saverIsSet && (!AddUsers)) {
|
|
printf("Setting screensaver to Flurry for user %s (/Users/%s)\n", pw->pw_gecos, pw->pw_name);
|
|
seteuid(pw->pw_uid); // Temporarily set effective uid to this user
|
|
err = SetScreenSaverSelection(pw, "Flurry", "/System/Library/Screen Savers/Flurry.saver", 0);
|
|
#if VERBOSE
|
|
fprintf(stderr, "SetScreenSaverSelection for user %s (%d) to Flurry returned error %d\n", pw->pw_name, geteuid(), err);
|
|
#endif
|
|
seteuid(saved_uid); // Set effective uid back to privileged user
|
|
}
|
|
|
|
seteuid(saved_uid); // Set effective uid back to privileged user
|
|
|
|
printf("\n");
|
|
}
|
|
|
|
printf("WARNING: Changes may require a system restart to take effect.\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
void printUsage(long brandID) {
|
|
printf("Usage: sudo AddRemoveUser [-a | -s | -r] [user1 [user2 [user3...]]]\n");
|
|
printf(" -a: add users to those with permission to run %s.\n", appName[brandID]);
|
|
printf(" -s: same as -a plus set users' screensaver to %s.\n", brandName[brandID]);
|
|
printf(" -r: remove users' permission to run %s, and \n", appName[brandID]);
|
|
printf(" if their screensaver was set to %s change it to Flurry.\n", brandName[brandID]);
|
|
printf("\n");
|
|
}
|
|
|
|
enum {
|
|
kSystemEventsCreator = 'sevs'
|
|
};
|
|
CFStringRef kSystemEventsBundleID = CFSTR("com.apple.systemevents");
|
|
char *systemEventsAppName = "System Events";
|
|
|
|
Boolean SetLoginItemOSAScript(long brandID, Boolean deleteLogInItem, char *userName)
|
|
{
|
|
int i, j;
|
|
char cmd[2048];
|
|
char systemEventsPath[1024];
|
|
pid_t systemEventsPID;
|
|
OSErr err = 0, err2 = 0;
|
|
#if USE_OSASCRIPT_FOR_ALL_LOGGED_IN_USERS
|
|
// NOTE: It may not be necessary to kill and relaunch the
|
|
// System Events application for each logged in user under High Sierra
|
|
Boolean isHighSierraOrLater = (compareOSVersionTo(10, 13) >= 0);
|
|
#endif
|
|
|
|
#if VERBOSE
|
|
fprintf(stderr, "Adjusting login items for user %s\n", userName);
|
|
fflush(stderr);
|
|
#endif
|
|
|
|
// We must launch the System Events application for the target user
|
|
err = noErr;
|
|
systemEventsPath[0] = '\0';
|
|
|
|
err = GetPathToAppFromID(kSystemEventsCreator, kSystemEventsBundleID, systemEventsPath, sizeof(systemEventsPath));
|
|
#if VERBOSE
|
|
if (err == noErr) {
|
|
fprintf(stderr, "SystemEvents is at %s\n", systemEventsPath);
|
|
} else {
|
|
fprintf(stderr, "GetPathToAppFromID(kSystemEventsCreator, kSystemEventsBundleID) returned error %d ", (int) err);
|
|
}
|
|
#endif
|
|
|
|
if (err == noErr) {
|
|
// Find SystemEvents process. If found, quit it in case
|
|
// it is running under a different user.
|
|
#if VERBOSE
|
|
fprintf(stderr, "Telling System Events to quit (at start of SetLoginItemOSAScript)\n");
|
|
fflush(stderr);
|
|
#endif
|
|
systemEventsPID = FindProcessPID(systemEventsAppName, 0);
|
|
if (systemEventsPID != 0) {
|
|
err = kill(systemEventsPID, SIGKILL);
|
|
}
|
|
#if VERBOSE
|
|
if (err != noErr) {
|
|
fprintf(stderr, "(systemEventsPID, SIGKILL) returned error %d \n", (int) err);
|
|
fflush(stderr);
|
|
}
|
|
#endif
|
|
// Wait for the process to be gone
|
|
for (i=0; i<50; ++i) { // 5 seconds max delay
|
|
SleepSeconds(0.1); // 1/10 second
|
|
systemEventsPID = FindProcessPID(systemEventsAppName, 0);
|
|
if (systemEventsPID == 0) break;
|
|
}
|
|
if (i >= 50) {
|
|
#if VERBOSE
|
|
fprintf(stderr, "Failed to make System Events quit\n");
|
|
fflush(stderr);
|
|
#endif
|
|
err = noErr;
|
|
goto cleanupSystemEvents;
|
|
}
|
|
sleep(4);
|
|
}
|
|
|
|
if (systemEventsPath[0] != '\0') {
|
|
#if VERBOSE
|
|
fprintf(stderr, "Launching SystemEvents for user %s\n", userName);
|
|
fflush(stderr);
|
|
#endif
|
|
|
|
for (j=0; j<5; ++j) {
|
|
sprintf(cmd, "sudo -u \"%s\" -b \"%s/Contents/MacOS/System Events\" &", userName, systemEventsPath);
|
|
err = callPosixSpawn(cmd);
|
|
#if VERBOSE
|
|
if (err) {
|
|
fprintf(stderr, "Command: %s returned error %d (try %d of 5)\n", cmd, (int) err, j);
|
|
fflush(stderr);
|
|
}
|
|
#endif
|
|
// Wait for the process to start
|
|
for (i=0; i<50; ++i) { // 5 seconds max delay
|
|
SleepSeconds(0.1); // 1/10 second
|
|
systemEventsPID = FindProcessPID(systemEventsAppName, 0);
|
|
if (systemEventsPID != 0) break;
|
|
}
|
|
if (i < 50) break; // Exit j loop on success
|
|
}
|
|
if (j >= 5) {
|
|
#if VERBOSE
|
|
fprintf(stderr, "Failed to launch System Events for user %s\n", userName);
|
|
fflush(stderr);
|
|
#endif
|
|
err = noErr;
|
|
goto cleanupSystemEvents;
|
|
}
|
|
}
|
|
sleep(2);
|
|
|
|
#if VERBOSE
|
|
fprintf(stderr, "Deleting any login items containing %s for user %s\n", appName[brandID], userName);
|
|
fflush(stderr);
|
|
#endif
|
|
#if USE_OSASCRIPT_FOR_ALL_LOGGED_IN_USERS
|
|
if (isHighSierraOrLater) {
|
|
sprintf(cmd, "su -l \"%s\" -c 'osascript -e \"tell application \\\"System Events\\\" to delete login item \\\"%s\\\"\"'", userName, appName[i]);
|
|
} else
|
|
#endif
|
|
{
|
|
sprintf(cmd, "sudo -u \"%s\" osascript -e 'tell application \"System Events\" to delete login item \"%s\"'", userName, appName[i]);
|
|
}
|
|
err = callPosixSpawn(cmd);
|
|
#if VERBOSE
|
|
if (err) {
|
|
fprintf(stderr, "Command: %s\n", cmd);
|
|
fprintf(stderr, "Delete login item containing %s returned error %d\n", appName[brandID], err);
|
|
fflush(stderr);
|
|
}
|
|
#endif
|
|
|
|
if (deleteLogInItem) {
|
|
err = noErr;
|
|
goto cleanupSystemEvents;
|
|
}
|
|
|
|
#if VERBOSE
|
|
fprintf(stderr, "Making new login item %s for user %s\n", appName[brandID], userName);
|
|
fflush(stderr);
|
|
#endif
|
|
#if USE_OSASCRIPT_FOR_ALL_LOGGED_IN_USERS
|
|
if (isHighSierraOrLater) {
|
|
sprintf(cmd, "su -l \"%s\" -c 'osascript -e \"tell application \\\"System Events\\\" to make new login item at end with properties {path:\\\"%s\\\", hidden:true, name:\\\"%s\\\"}\"'", userName, appPath[brandID], appName[brandID]);
|
|
} else
|
|
#endif
|
|
{
|
|
sprintf(cmd, "sudo -u \"%s\" osascript -e 'tell application \"System Events\" to make new login item at end with properties {path:\"%s\", hidden:true, name:\"%s\"}'", userName, appPath[brandID], appName[brandID]);
|
|
}
|
|
err = callPosixSpawn(cmd);
|
|
#if VERBOSE
|
|
if (err) {
|
|
fprintf(stderr, "Command: %s\n", cmd);
|
|
printf("[Make login item for %s returned error %d\n", appPath[brandID], err);
|
|
}
|
|
#endif
|
|
fflush(stderr);
|
|
|
|
cleanupSystemEvents:
|
|
// Clean up in case this was our last user
|
|
#if VERBOSE
|
|
fprintf(stderr, "Telling System Events to quit (at end of SetLoginItemOSAScript)\n");
|
|
fflush(stderr);
|
|
#endif
|
|
systemEventsPID = FindProcessPID(systemEventsAppName, 0);
|
|
err2 = noErr;
|
|
if (systemEventsPID != 0) {
|
|
err2 = kill(systemEventsPID, SIGKILL);
|
|
}
|
|
#if VERBOSE
|
|
if (err2 != noErr) {
|
|
fprintf(stderr, "kill(systemEventsPID, SIGKILL) returned error %d \n", (int) err2);
|
|
fflush(stderr);
|
|
}
|
|
#endif
|
|
// Wait for the process to be gone
|
|
for (i=0; i<50; ++i) { // 5 seconds max delay
|
|
SleepSeconds(0.1); // 1/10 second
|
|
systemEventsPID = FindProcessPID(systemEventsAppName, 0);
|
|
if (systemEventsPID == 0) break;
|
|
}
|
|
#if VERBOSE
|
|
if (i >= 50) {
|
|
fprintf(stderr, "Failed to make System Events quit\n");
|
|
fflush(stderr);
|
|
}
|
|
#endif
|
|
|
|
sleep(4);
|
|
|
|
return (err == noErr);
|
|
}
|
|
|
|
|
|
// Under OS 10.13 High Sierra, telling System Events to modify Login Items for
|
|
// users who are not currently logged in no longer works, even when System Events
|
|
// is running as that user.
|
|
// So we create a LaunchAgent for that user. The next time that user logs in, the
|
|
// LaunchAgent will make the desired changes to that user's Login Items, launch
|
|
// BOINC Manager if appropriate, and delete itself.
|
|
//
|
|
// While we could just use a LaunchAgent to launch BOINC Manager on every login
|
|
// instead of using it to create a Login Item, I prefer Login Items because:
|
|
// * they are more readily visible to a less technically aware user through
|
|
// System Preferences, and
|
|
// * they are more easily added or removed through System Preferences, and
|
|
// * continuing to use them is consistent with older versions of BOINC Manager.
|
|
//
|
|
Boolean SetLoginItemLaunchAgent(long brandID, Boolean deleteLogInItem, passwd *pw)
|
|
{
|
|
struct stat sbuf;
|
|
char s[2048];
|
|
|
|
// Create a LaunchAgent for the specified user, replacing any LaunchAgent created
|
|
// previously (such as by Ininstaller or by installing a differently branded BOINC.)
|
|
|
|
// Create LaunchAgents directory for this user if it does not yet exist
|
|
snprintf(s, sizeof(s), "/Users/%s/Library/LaunchAgents", pw->pw_name);
|
|
if (stat(s, &sbuf) != 0) {
|
|
mkdir(s, 0755);
|
|
chown(s, pw->pw_uid, pw->pw_gid);
|
|
}
|
|
|
|
snprintf(s, sizeof(s), "/Library/Application Support/BOINC Data/%s_Finish_Install", appName[brandID]);
|
|
if (stat(s, &sbuf) != 0) {
|
|
return SetLoginItemLaunchAgentShellScript(brandID, deleteLogInItem, pw);
|
|
} else {
|
|
return SetLoginItemLaunchAgentFinishInstallApp(brandID, deleteLogInItem, pw);
|
|
}
|
|
}
|
|
|
|
|
|
Boolean SetLoginItemLaunchAgentShellScript(long brandID, Boolean deleteLogInItem, passwd *pw) {
|
|
char s[2048];
|
|
|
|
snprintf(s, sizeof(s), "/Users/%s/Library/LaunchAgents/edu.berkeley.boinc.plist", pw->pw_name);
|
|
FILE* f = fopen(s, "w");
|
|
if (!f) return false;
|
|
fprintf(f, "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n");
|
|
fprintf(f, "<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">\n");
|
|
fprintf(f, "<plist version=\"1.0\">\n");
|
|
fprintf(f, "<dict>\n");
|
|
fprintf(f, "\t<key>Label</key>\n");
|
|
fprintf(f, "\t<string>edu.berkeley.test</string>\n");
|
|
fprintf(f, "\t<key>ProgramArguments</key>\n");
|
|
fprintf(f, "\t<array>\n");
|
|
fprintf(f, "\t\t<string>sh</string>\n");
|
|
fprintf(f, "\t\t<string>-c</string>\n");
|
|
fprintf(f, "\t\t<string>");
|
|
fprintf(f, "osascript -e 'tell application \"System Events\" to delete login item \"%s\"';", appName[brandID]);
|
|
if (deleteLogInItem) {
|
|
// If this user was previously authorized to run the Manager, there
|
|
// may still be a Login Item for this user, and the Login Item may
|
|
// launch the Manager before the LaunchAgent deletes the Login Item.
|
|
// To guard against this, we have the LaunchAgent kill the Manager
|
|
// (for this user only) if it is running.
|
|
//
|
|
fprintf(f, "killall -u %d -9 \"%s\";", pw->pw_uid, appName[brandID]);
|
|
} else {
|
|
fprintf(f, "osascript -e 'tell application \"System Events\" to make login item at end with properties {path:\"%s\", hidden:true, name:\"%s\"}';", appPath[brandID], appName[brandID]);
|
|
fprintf(f, "open -jg \"%s\";", appPath[brandID]);
|
|
}
|
|
fprintf(f, "rm -f ~/Library/LaunchAgents/edu.berkeley.boinc.plist</string>\n");
|
|
fprintf(f, "\t</array>\n");
|
|
fprintf(f, "\t<key>RunAtLoad</key>\n");
|
|
fprintf(f, "\t<true/>\n");
|
|
fprintf(f, "</dict>\n");
|
|
fprintf(f, "</plist>\n");
|
|
fclose(f);
|
|
|
|
chmod(s, 0644);
|
|
chown(s, pw->pw_uid, pw->pw_gid);
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
Boolean SetLoginItemLaunchAgentFinishInstallApp(long brandID, Boolean deleteLogInItem, passwd *pw){
|
|
char s[2048];
|
|
|
|
snprintf(s, sizeof(s), "/Users/%s/Library/LaunchAgents/edu.berkeley.boinc.plist", pw->pw_name);
|
|
FILE* f = fopen(s, "w");
|
|
if (!f) return false;
|
|
fprintf(f, "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n");
|
|
fprintf(f, "<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">\n");
|
|
fprintf(f, "<plist version=\"1.0\">\n");
|
|
fprintf(f, "<dict>\n");
|
|
fprintf(f, "\t<key>Label</key>\n");
|
|
fprintf(f, "\t<string>edu.berkeley.fix_login_items</string>\n");
|
|
fprintf(f, "\t<key>ProgramArguments</key>\n");
|
|
fprintf(f, "\t<array>\n");
|
|
fprintf(f, "\t\t<string>/Library/Application Support/BOINC Data/%s_Finish_Install</string>\n", appName[brandID]);
|
|
if (deleteLogInItem) {
|
|
// If this user was previously authorized to run the Manager, there
|
|
// may still be a Login Item for this user, and the Login Item may
|
|
// launch the Manager before the LaunchAgent deletes the Login Item.
|
|
// To guard against this, we have the LaunchAgent kill the Manager
|
|
// (for this user only) if it is running.
|
|
//
|
|
fprintf(f, "\t\t<string>-d</string>\n");
|
|
fprintf(f, "\t\t<string>%s</string>\n", appName[brandID]);
|
|
} else {
|
|
fprintf(f, "\t\t<string>-a</string>\n");
|
|
fprintf(f, "\t\t<string>%s</string>\n", appName[brandID]);
|
|
}
|
|
fprintf(f, "</string>\n");
|
|
fprintf(f, "\t</array>\n");
|
|
fprintf(f, "\t<key>RunAtLoad</key>\n");
|
|
fprintf(f, "\t<true/>\n");
|
|
fprintf(f, "</dict>\n");
|
|
fprintf(f, "</plist>\n");
|
|
fclose(f);
|
|
|
|
chmod(s, 0644);
|
|
chown(s, pw->pw_uid, pw->pw_gid);
|
|
|
|
return true;
|
|
|
|
|
|
}
|
|
|
|
|
|
pid_t FindProcessPID(char* name, pid_t thePID)
|
|
{
|
|
FILE *f;
|
|
char buf[1024];
|
|
size_t n = 0;
|
|
pid_t aPID;
|
|
|
|
if (name != NULL) // Search ny name
|
|
n = strlen(name);
|
|
|
|
f = popen("ps -a -x -c -o command,pid", "r");
|
|
if (f == NULL) {
|
|
return 0;
|
|
}
|
|
|
|
while (PersistentFGets(buf, sizeof(buf), f))
|
|
{
|
|
if (name != NULL) { // Search by name
|
|
if (strncmp(buf, name, n) == 0)
|
|
{
|
|
aPID = atol(buf+16);
|
|
pclose(f);
|
|
return aPID;
|
|
}
|
|
} else { // Search by PID
|
|
aPID = atol(buf+16);
|
|
if (aPID == thePID) {
|
|
pclose(f);
|
|
return aPID;
|
|
}
|
|
}
|
|
}
|
|
pclose(f);
|
|
return 0;
|
|
}
|
|
|
|
|
|
OSErr GetCurrentScreenSaverSelection(passwd *pw, char *moduleName, size_t maxLen) {
|
|
char buf[1024];
|
|
FILE *f;
|
|
char *p, *q;
|
|
int i;
|
|
|
|
*moduleName = '\0';
|
|
sprintf(buf, "su -l \"%s\" -c 'defaults -currentHost read com.apple.screensaver moduleDict'", pw->pw_name);
|
|
f = popen(buf, "r");
|
|
if (f == NULL) {
|
|
fprintf(stderr, "Could not get current screensaver selection for user %s\n", pw->pw_name);
|
|
fflush(stderr);
|
|
return fnfErr;
|
|
}
|
|
|
|
while (PersistentFGets(buf, sizeof(buf), f))
|
|
{
|
|
p = strstr(buf, "moduleName = ");
|
|
if (p) {
|
|
p += 13; // Point past "moduleName = "
|
|
q = moduleName;
|
|
for (i=0; i<maxLen-1; ++i) {
|
|
if (*p == '"') {
|
|
++p;
|
|
continue;
|
|
}
|
|
if (*p == ';') break;
|
|
*q++ = *p++;
|
|
}
|
|
*q = '\0';
|
|
pclose(f);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
pclose(f);
|
|
return fnfErr;
|
|
}
|
|
|
|
|
|
OSErr SetScreenSaverSelection(passwd *pw, char *moduleName, char *modulePath, int type) {
|
|
OSErr err = noErr;
|
|
CFStringRef preferenceName = CFSTR("com.apple.screensaver");
|
|
CFStringRef mainKeyName = CFSTR("moduleDict");
|
|
CFDictionaryRef emptyData;
|
|
CFMutableDictionaryRef newData;
|
|
Boolean success;
|
|
|
|
CFStringRef nameKey = CFStringCreateWithCString(NULL, "moduleName", kCFStringEncodingASCII);
|
|
CFStringRef nameValue = CFStringCreateWithCString(NULL, moduleName, kCFStringEncodingASCII);
|
|
|
|
CFStringRef pathKey = CFStringCreateWithCString(NULL, "path", kCFStringEncodingASCII);
|
|
CFStringRef pathValue = CFStringCreateWithCString(NULL, modulePath, kCFStringEncodingASCII);
|
|
|
|
CFStringRef typeKey = CFStringCreateWithCString(NULL, "type", kCFStringEncodingASCII);
|
|
CFNumberRef typeValue = CFNumberCreate(NULL, kCFNumberIntType, &type);
|
|
|
|
emptyData = CFDictionaryCreate(NULL, NULL, NULL, 0, NULL, NULL);
|
|
if (emptyData == NULL) {
|
|
fprintf(stderr, "Could not set screensaver for user %s\n", pw->pw_name);
|
|
fflush(stderr);
|
|
CFRelease(nameKey);
|
|
CFRelease(nameValue);
|
|
CFRelease(pathKey);
|
|
CFRelease(pathValue);
|
|
CFRelease(typeKey);
|
|
CFRelease(typeValue);
|
|
return(-1);
|
|
}
|
|
|
|
newData = CFDictionaryCreateMutableCopy(NULL,0, emptyData);
|
|
|
|
if (newData == NULL)
|
|
{
|
|
fprintf(stderr, "Could not set screensaver for user %s\n", pw->pw_name);
|
|
fflush(stderr);
|
|
CFRelease(nameKey);
|
|
CFRelease(nameValue);
|
|
CFRelease(pathKey);
|
|
CFRelease(pathValue);
|
|
CFRelease(typeKey);
|
|
CFRelease(typeValue);
|
|
CFRelease(emptyData);
|
|
return(-1);
|
|
}
|
|
|
|
CFDictionaryAddValue(newData, nameKey, nameValue);
|
|
CFDictionaryAddValue(newData, pathKey, pathValue);
|
|
CFDictionaryAddValue(newData, typeKey, typeValue);
|
|
|
|
CFPreferencesSetValue(mainKeyName, newData, preferenceName, kCFPreferencesCurrentUser, kCFPreferencesCurrentHost);
|
|
success = CFPreferencesSynchronize(preferenceName, kCFPreferencesCurrentUser, kCFPreferencesCurrentHost);
|
|
|
|
if (!success) {
|
|
fprintf(stderr, "Could not set screensaver for user %s\n", pw->pw_name);
|
|
fflush(stderr);
|
|
err = -1;
|
|
}
|
|
|
|
CFRelease(nameKey);
|
|
CFRelease(nameValue);
|
|
CFRelease(pathKey);
|
|
CFRelease(pathValue);
|
|
CFRelease(typeKey);
|
|
CFRelease(typeValue);
|
|
CFRelease(emptyData);
|
|
CFRelease(newData);
|
|
|
|
return err;
|
|
}
|
|
|
|
|
|
#if USE_OSASCRIPT_FOR_ALL_LOGGED_IN_USERS
|
|
static Boolean IsUserLoggedIn(const char *userName){
|
|
char s[1024];
|
|
|
|
sprintf(s, "w -h \"%s\"", userName);
|
|
FILE *f = popen(s, "r");
|
|
if (f) {
|
|
if (PersistentFGets(s, sizeof(s), f) != NULL) {
|
|
pclose (f);
|
|
printf("User %s is currently logged in\n", userName);
|
|
return true; // this user is logged in (perhaps via fast user switching)
|
|
}
|
|
pclose (f);
|
|
}
|
|
return false;
|
|
}
|
|
#endif
|
|
|
|
|
|
static char * PersistentFGets(char *buf, size_t buflen, FILE *f) {
|
|
char *p = buf;
|
|
size_t len = buflen;
|
|
size_t datalen = 0;
|
|
|
|
*buf = '\0';
|
|
while (datalen < (buflen - 1)) {
|
|
fgets(p, len, f);
|
|
if (feof(f)) break;
|
|
if (ferror(f) && (errno != EINTR)) break;
|
|
if (strchr(buf, '\n')) break;
|
|
datalen = strlen(buf);
|
|
p = buf + datalen;
|
|
len -= datalen;
|
|
}
|
|
return (buf[0] ? buf : NULL);
|
|
}
|
|
|
|
|
|
// Uses usleep to sleep for full duration even if a signal is received
|
|
static void SleepSeconds(double seconds) {
|
|
double end_time = dtime() + seconds - 0.01;
|
|
// sleep() and usleep() can be interrupted by SIGALRM,
|
|
// so we may need multiple calls
|
|
//
|
|
while (1) {
|
|
if (seconds >= 1) {
|
|
sleep((unsigned int) seconds);
|
|
} else {
|
|
usleep((int)fmod(seconds*1000000, 1000000));
|
|
}
|
|
seconds = end_time - dtime();
|
|
if (seconds <= 0) break;
|
|
}
|
|
}
|
|
|
|
|
|
long GetBrandID()
|
|
{
|
|
long iBrandId;
|
|
|
|
iBrandId = 0; // Default value
|
|
|
|
FILE *f = fopen("/Library/Application Support/BOINC Data/Branding", "r");
|
|
if (f) {
|
|
fscanf(f, "BrandId=%ld\n", &iBrandId);
|
|
fclose(f);
|
|
}
|
|
if ((iBrandId < 0) || (iBrandId > (NUMBRANDS-1))) {
|
|
iBrandId = 0;
|
|
}
|
|
return iBrandId;
|
|
}
|
|
|
|
|
|
#define NOT_IN_TOKEN 0
|
|
#define IN_SINGLE_QUOTED_TOKEN 1
|
|
#define IN_DOUBLE_QUOTED_TOKEN 2
|
|
#define IN_UNQUOTED_TOKEN 3
|
|
|
|
static int parse_posic_spawn_command_line(char* p, char** argv) {
|
|
int state = NOT_IN_TOKEN;
|
|
int argc=0;
|
|
|
|
while (*p) {
|
|
switch(state) {
|
|
case NOT_IN_TOKEN:
|
|
if (isspace(*p)) {
|
|
} else if (*p == '\'') {
|
|
p++;
|
|
argv[argc++] = p;
|
|
state = IN_SINGLE_QUOTED_TOKEN;
|
|
break;
|
|
} else if (*p == '\"') {
|
|
p++;
|
|
argv[argc++] = p;
|
|
state = IN_DOUBLE_QUOTED_TOKEN;
|
|
break;
|
|
} else {
|
|
argv[argc++] = p;
|
|
state = IN_UNQUOTED_TOKEN;
|
|
}
|
|
break;
|
|
case IN_SINGLE_QUOTED_TOKEN:
|
|
if (*p == '\'') {
|
|
if (*(p-1) == '\\') break;
|
|
*p = 0;
|
|
state = NOT_IN_TOKEN;
|
|
}
|
|
break;
|
|
case IN_DOUBLE_QUOTED_TOKEN:
|
|
if (*p == '\"') {
|
|
if (*(p-1) == '\\') break;
|
|
*p = 0;
|
|
state = NOT_IN_TOKEN;
|
|
}
|
|
break;
|
|
case IN_UNQUOTED_TOKEN:
|
|
if (isspace(*p)) {
|
|
*p = 0;
|
|
state = NOT_IN_TOKEN;
|
|
}
|
|
break;
|
|
}
|
|
p++;
|
|
}
|
|
argv[argc] = 0;
|
|
return argc;
|
|
}
|
|
|
|
|
|
#include <spawn.h>
|
|
|
|
int callPosixSpawn(const char *cmdline) {
|
|
char command[1024];
|
|
char progName[1024];
|
|
char progPath[MAXPATHLEN];
|
|
char* argv[100];
|
|
int argc = 0;
|
|
char *p;
|
|
pid_t thePid = 0;
|
|
int result = 0;
|
|
int status = 0;
|
|
extern char **environ;
|
|
|
|
// Make a copy of cmdline because parse_posic_spawn_command_line modifies it
|
|
strlcpy(command, cmdline, sizeof(command));
|
|
argc = parse_posic_spawn_command_line(const_cast<char*>(command), argv);
|
|
strlcpy(progPath, argv[0], sizeof(progPath));
|
|
strlcpy(progName, argv[0], sizeof(progName));
|
|
p = strrchr(progName, '/');
|
|
if (p) {
|
|
argv[0] = p+1;
|
|
} else {
|
|
argv[0] = progName;
|
|
}
|
|
|
|
#if VERBOSE_SPAWN
|
|
fprintf(stderr, "***********");
|
|
for (int i=0; i<argc; ++i) {
|
|
fprintf(stderr, "argv[%d]=%s", i, argv[i]);
|
|
}
|
|
fprintf(stderr, "***********\n");
|
|
#endif
|
|
|
|
errno = 0;
|
|
|
|
result = posix_spawnp(&thePid, progPath, NULL, NULL, argv, environ);
|
|
#if VERBOSE_SPAWN
|
|
fprintf(stderr, "callPosixSpawn command: %s", cmdline);
|
|
fprintf(stderr, "callPosixSpawn: posix_spawnp returned %d: %s", result, strerror(result));
|
|
#endif
|
|
if (result) {
|
|
return result;
|
|
}
|
|
// CAF int val =
|
|
waitpid(thePid, &status, WUNTRACED);
|
|
// CAF if (val < 0) printf("first waitpid returned %d\n", val);
|
|
if (status != 0) {
|
|
#if VERBOSE_SPAWN
|
|
fprintf(stderr, "waitpid() returned status=%d", status);
|
|
#endif
|
|
result = status;
|
|
} else {
|
|
if (WIFEXITED(status)) {
|
|
result = WEXITSTATUS(status);
|
|
if (result == 1) {
|
|
#if VERBOSE_SPAWN
|
|
fprintf(stderr, "WEXITSTATUS(status) returned 1, errno=%d: %s", errno, strerror(errno));
|
|
#endif
|
|
result = errno;
|
|
}
|
|
#if VERBOSE_SPAWN
|
|
else if (result) {
|
|
fprintf(stderr, "WEXITSTATUS(status) returned %d", result);
|
|
}
|
|
#endif
|
|
} // end if (WIFEXITED(status)) else
|
|
} // end if waitpid returned 0 sstaus else
|
|
|
|
return result;
|
|
}
|