| Index: chrome/browser/cocoa/authorization_util.h
|
| ===================================================================
|
| --- chrome/browser/cocoa/authorization_util.h (revision 0)
|
| +++ chrome/browser/cocoa/authorization_util.h (revision 0)
|
| @@ -0,0 +1,58 @@
|
| +// Copyright (c) 2009 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#ifndef CHROME_BROWSER_COCOA_AUTHORIZATION_UTIL_H_
|
| +#define CHROME_BROWSER_COCOA_AUTHORIZATION_UTIL_H_
|
| +
|
| +// AuthorizationExecuteWithPrivileges fork()s and exec()s the tool, but it
|
| +// does not wait() for it. It also doesn't provide the caller with access to
|
| +// the forked pid. If used irresponsibly, zombie processes will accumulate.
|
| +//
|
| +// Apple's really gotten us between a rock and a hard place, here.
|
| +//
|
| +// Fortunately, AuthorizationExecuteWithPrivileges does give access to the
|
| +// tool's stdout (and stdin) via a FILE* pipe. The tool can output its pid
|
| +// to this pipe, and the main program can read it, and then have something
|
| +// that it can wait() for.
|
| +//
|
| +// The contract is that any tool executed by the wrappers declared in this
|
| +// file must print its pid to stdout on a line by itself before doing anything
|
| +// else.
|
| +//
|
| +// http://developer.apple.com/mac/library/samplecode/BetterAuthorizationSample/listing1.html
|
| +// (Look for "What's This About Zombies?")
|
| +
|
| +#include <Security/Authorization.h>
|
| +#include <stdio.h>
|
| +#include <sys/types.h>
|
| +
|
| +namespace authorization_util {
|
| +
|
| +// Calls straight through to AuthorizationExecuteWithPrivileges. If that
|
| +// call succeeds, |pid| will be set to the pid of the executed tool. If the
|
| +// pid can't be determined, |pid| will be set to -1. |pid| must not be NULL.
|
| +// |pipe| may be NULL, but the tool will always be executed with a pipe in
|
| +// order to read the pid from its stdout.
|
| +OSStatus ExecuteWithPrivilegesAndGetPID(AuthorizationRef authorization,
|
| + const char* tool_path,
|
| + AuthorizationFlags options,
|
| + const char** arguments,
|
| + FILE** pipe,
|
| + pid_t* pid);
|
| +
|
| +// Calls ExecuteWithPrivilegesAndGetPID, and if that call succeeds, calls
|
| +// waitpid() to wait for the process to exit. If waitpid() succeeds, the
|
| +// exit status is placed in |exit_status|, otherwise, -1 is stored.
|
| +// |exit_status| may be NULL and this function will still wait for the process
|
| +// to exit.
|
| +OSStatus ExecuteWithPrivilegesAndWait(AuthorizationRef authorization,
|
| + const char* tool_path,
|
| + AuthorizationFlags options,
|
| + const char** arguments,
|
| + FILE** pipe,
|
| + int* exit_status);
|
| +
|
| +} // namespace authorization_util
|
| +
|
| +#endif // CHROME_BROWSER_COCOA_AUTHORIZATION_UTIL_H_
|
|
|
| Property changes on: chrome/browser/cocoa/authorization_util.h
|
| ___________________________________________________________________
|
| Added: svn:eol-style
|
| + LF
|
|
|
|
|