| Index: chrome/browser/mac/authorization_util.h
|
| diff --git a/chrome/browser/mac/authorization_util.h b/chrome/browser/mac/authorization_util.h
|
| deleted file mode 100644
|
| index c25f0cb13d9146dcf2f2f04ad7f13d1e88ffe5d5..0000000000000000000000000000000000000000
|
| --- a/chrome/browser/mac/authorization_util.h
|
| +++ /dev/null
|
| @@ -1,67 +0,0 @@
|
| -// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#ifndef CHROME_BROWSER_MAC_AUTHORIZATION_UTIL_H_
|
| -#define CHROME_BROWSER_MAC_AUTHORIZATION_UTIL_H_
|
| -#pragma once
|
| -
|
| -// AuthorizationExecuteWithPrivileges fork()s and exec()s the tool, but it
|
| -// does not wait() for it. It also doesn't provide the caller with access to
|
| -// the forked pid. If used irresponsibly, zombie processes will accumulate.
|
| -//
|
| -// Apple's really gotten us between a rock and a hard place, here.
|
| -//
|
| -// Fortunately, AuthorizationExecuteWithPrivileges does give access to the
|
| -// tool's stdout (and stdin) via a FILE* pipe. The tool can output its pid
|
| -// to this pipe, and the main program can read it, and then have something
|
| -// that it can wait() for.
|
| -//
|
| -// The contract is that any tool executed by the wrappers declared in this
|
| -// file must print its pid to stdout on a line by itself before doing anything
|
| -// else.
|
| -//
|
| -// http://developer.apple.com/library/mac/#samplecode/BetterAuthorizationSample/Listings/BetterAuthorizationSampleLib_c.html
|
| -// (Look for "What's This About Zombies?")
|
| -
|
| -#include <CoreFoundation/CoreFoundation.h>
|
| -#include <Security/Authorization.h>
|
| -#include <stdio.h>
|
| -#include <sys/types.h>
|
| -
|
| -namespace authorization_util {
|
| -
|
| -// Obtains an AuthorizationRef that can be used to run commands as root. If
|
| -// necessary, prompts the user for authentication. If the user is prompted,
|
| -// |prompt| will be used as the prompt string and an icon appropriate for the
|
| -// application will be displayed in a prompt dialog. Note that the system
|
| -// appends its own text to the prompt string. Returns NULL on failure.
|
| -AuthorizationRef AuthorizationCreateToRunAsRoot(CFStringRef prompt);
|
| -
|
| -// Calls straight through to AuthorizationExecuteWithPrivileges. If that
|
| -// call succeeds, |pid| will be set to the pid of the executed tool. If the
|
| -// pid can't be determined, |pid| will be set to -1. |pid| must not be NULL.
|
| -// |pipe| may be NULL, but the tool will always be executed with a pipe in
|
| -// order to read the pid from its stdout.
|
| -OSStatus ExecuteWithPrivilegesAndGetPID(AuthorizationRef authorization,
|
| - const char* tool_path,
|
| - AuthorizationFlags options,
|
| - const char** arguments,
|
| - FILE** pipe,
|
| - pid_t* pid);
|
| -
|
| -// Calls ExecuteWithPrivilegesAndGetPID, and if that call succeeds, calls
|
| -// waitpid() to wait for the process to exit. If waitpid() succeeds, the
|
| -// exit status is placed in |exit_status|, otherwise, -1 is stored.
|
| -// |exit_status| may be NULL and this function will still wait for the process
|
| -// to exit.
|
| -OSStatus ExecuteWithPrivilegesAndWait(AuthorizationRef authorization,
|
| - const char* tool_path,
|
| - AuthorizationFlags options,
|
| - const char** arguments,
|
| - FILE** pipe,
|
| - int* exit_status);
|
| -
|
| -} // namespace authorization_util
|
| -
|
| -#endif // CHROME_BROWSER_MAC_AUTHORIZATION_UTIL_H_
|
|
|