/*
- * Copyright (c) 2000 Apple Computer, Inc. All rights reserved.
+ * Copyright (c) 2000, 2001, 2005-2007, 2009-2012, 2014, 2016-2019 Apple Inc. All rights reserved.
*
* @APPLE_LICENSE_HEADER_START@
*
- * The contents of this file constitute Original Code as defined in and
- * are subject to the Apple Public Source License Version 1.1 (the
- * "License"). You may not use this file except in compliance with the
- * License. Please obtain a copy of the License at
- * http://www.apple.com/publicsource and read it before using this file.
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this
+ * file.
*
- * This Original Code and all software distributed under the License are
- * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
- * License for the specific language governing rights and limitations
- * under the License.
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
*
* @APPLE_LICENSE_HEADER_END@
*/
#define _S_SESSION_H
#include <sys/cdefs.h>
+#include <os/availability.h>
+#include <TargetConditionals.h>
+
+#define DISPATCH_MACH_SPI 1
+#import <dispatch/private.h>
+
+/*
+ * SCDynamicStore write access entitlement
+ *
+ * Key : "com.apple.SystemConfiguration.SCDynamicStore-write-access"
+ * Value : Boolean
+ * TRUE == allow SCDynamicStore write access for this process
+ *
+ * Dictionary
+ * Key : "keys"
+ * Value : <array> of CFString with write access allowed for
+ * each SCDynamicStore key matching the string(s)
+ *
+ * Key : "patterns"
+ * Value : <array> of CFString with write access allowed for
+ * each SCDynamicStore key matching the regex pattern(s)
+ */
+#define kSCWriteEntitlementName CFSTR("com.apple.SystemConfiguration.SCDynamicStore-write-access")
+
+
+typedef enum { NO = 0, YES, UNKNOWN } lazyBoolean;
+
/* Per client server state */
typedef struct {
+ // base CFType information
+ CFRuntimeBase cfBase;
+
/* mach port used as the key to this session */
mach_port_t key;
- /* mach port associated with this session */
- CFMachPortRef serverPort;
- CFRunLoopSourceRef serverRunLoopSource;
+ /* mach channel associated with this session */
+ dispatch_mach_t serverChannel;
/* data associated with this "open" session */
+ CFMutableArrayRef changedKeys;
+ CFStringRef name;
+ CFMutableArrayRef sessionKeys;
SCDynamicStoreRef store;
/* credentials associated with this "open" session */
- int callerEUID;
- int callerEGID;
+ uid_t callerEUID;
+
+ /* Mach security audit trailer for evaluating credentials */
+ audit_token_t auditToken;
+
+ /* root access credential associated with this "open" session */
+ lazyBoolean callerRootAccess;
+
+ /*
+ * write access entitlement associated with this "open" session
+ *
+ * kCFNull caller entitlements unknown (need to fetch)
+ * NULL no entitlement
+ * CFBoolean true/false
+ * CFDictionary "keys" = CFArray[writable keys]
+ * "patterns" = CFArray[writable patterns]
+ */
+ CFTypeRef callerWriteEntitlement;
} serverSession, *serverSessionRef;
__BEGIN_DECLS
+serverSessionRef addClient (mach_port_t server,
+ audit_token_t audit_token);
+
+serverSessionRef addServer (mach_port_t server);
+
serverSessionRef getSession (mach_port_t server);
-serverSessionRef addSession (CFMachPortRef server);
+serverSessionRef getSessionNum (CFNumberRef serverKey);
+
+serverSessionRef getSessionStr (CFStringRef serverKey);
+
+serverSessionRef tempSession (mach_port_t server,
+ CFStringRef name,
+ audit_token_t auditToken);
+
+void cleanupSession (serverSessionRef session);
+
+void closeSession (serverSessionRef session);
+
+void listSessions (FILE *f);
-void removeSession (mach_port_t server);
+Boolean hasRootAccess (serverSessionRef session);
-void cleanupSession (mach_port_t server);
+Boolean hasWriteAccess (serverSessionRef session,
+ const char *op,
+ CFStringRef key);
-void listSessions ();
+Boolean hasPathAccess (serverSessionRef session,
+ const char *path);
__END_DECLS
-#endif /* !_S_SESSION_H */
+#endif /* !_S_SESSION_H */