2 File: PrivilegedOperations.c
4 Abstract: Interface to "ddnswriteconfig" setuid root tool.
6 Copyright: (c) Copyright 2005 Apple Computer, Inc. All rights reserved.
8 Disclaimer: IMPORTANT: This Apple software is supplied to you by Apple Computer, Inc.
9 ("Apple") in consideration of your agreement to the following terms, and your
10 use, installation, modification or redistribution of this Apple software
11 constitutes acceptance of these terms. If you do not agree with these terms,
12 please do not use, install, modify or redistribute this Apple software.
14 In consideration of your agreement to abide by the following terms, and subject
15 to these terms, Apple grants you a personal, non-exclusive license, under Apple's
16 copyrights in this original Apple software (the "Apple Software"), to use,
17 reproduce, modify and redistribute the Apple Software, with or without
18 modifications, in source and/or binary forms; provided that if you redistribute
19 the Apple Software in its entirety and without modifications, you must retain
20 this notice and the following text and disclaimers in all such redistributions of
21 the Apple Software. Neither the name, trademarks, service marks or logos of
22 Apple Computer, Inc. may be used to endorse or promote products derived from the
23 Apple Software without specific prior written permission from Apple. Except as
24 expressly stated in this notice, no other rights or licenses, express or implied,
25 are granted by Apple herein, including but not limited to any patent rights that
26 may be infringed by your derivative works or by other works in which the Apple
27 Software may be incorporated.
29 The Apple Software is provided by Apple on an "AS IS" basis. APPLE MAKES NO
30 WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED
31 WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
32 PURPOSE, REGARDING THE APPLE SOFTWARE OR ITS USE AND OPERATION ALONE OR IN
33 COMBINATION WITH YOUR PRODUCTS.
35 IN NO EVENT SHALL APPLE BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL OR
36 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
37 GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
38 ARISING IN ANY WAY OUT OF THE USE, REPRODUCTION, MODIFICATION AND/OR DISTRIBUTION
39 OF THE APPLE SOFTWARE, HOWEVER CAUSED AND WHETHER UNDER THEORY OF CONTRACT, TORT
40 (INCLUDING NEGLIGENCE), STRICT LIABILITY OR OTHERWISE, EVEN IF APPLE HAS BEEN
41 ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
44 #include "PrivilegedOperations.h"
45 #include "ConfigurationAuthority.h"
46 #include <CoreFoundation/CoreFoundation.h>
47 #include <SystemConfiguration/SystemConfiguration.h>
53 #include <AssertMacros.h>
54 #include <Security/Security.h>
56 Boolean gToolApproved
= false;
58 static pid_t
execTool(const char *args
[])
59 // fork/exec and return new pid
66 execv(args
[0], (char *const *)args
);
67 printf("exec of %s failed; errno = %d\n", args
[0], errno
);
68 _exit(-1); // exec failed
74 OSStatus
EnsureToolInstalled(void)
75 // Make sure that the tool is installed in the right place, with the right privs, and the right version.
81 const char *args
[] = { kToolPath
, "0", "V", NULL
};
82 char toolSourcePath
[PATH_MAX
] = {};
83 char toolInstallerPath
[PATH_MAX
] = {};
88 // Check version of installed tool
89 toolPID
= execTool(args
);
92 waitpid(toolPID
, &status
, 0);
93 if (WIFEXITED(status
) && WEXITSTATUS(status
) == PRIV_OP_TOOL_VERS
)
97 // Locate our in-bundle copy of privop tool
98 bundleURL
= CFBundleCopyBundleURL(CFBundleGetBundleWithIdentifier(CFSTR("com.apple.preference.bonjour")) );
99 if (bundleURL
!= NULL
)
101 CFURLGetFileSystemRepresentation(bundleURL
, false, (UInt8
*) toolSourcePath
, sizeof toolSourcePath
);
102 if (strlcat(toolSourcePath
, "/Contents/Resources/" kToolName
, sizeof toolSourcePath
) >= sizeof toolSourcePath
) return(-1);
103 CFURLGetFileSystemRepresentation(bundleURL
, false, (UInt8
*) toolInstallerPath
, sizeof toolInstallerPath
);
104 if (strlcat(toolInstallerPath
, "/Contents/Resources/" kToolInstaller
, sizeof toolInstallerPath
) >= sizeof toolInstallerPath
) return(-1);
107 return coreFoundationUnknownErr
;
109 // Obtain authorization and run in-bundle copy as root to install it
111 AuthorizationItem aewpRight
= { kAuthorizationRightExecute
, strlen(toolInstallerPath
), toolInstallerPath
, 0 };
112 AuthorizationItemSet rights
= { 1, &aewpRight
};
113 AuthorizationRef authRef
;
115 err
= AuthorizationCreate(&rights
, (AuthorizationEnvironment
*) NULL
,
116 kAuthorizationFlagInteractionAllowed
| kAuthorizationFlagExtendRights
|
117 kAuthorizationFlagPreAuthorize
, &authRef
);
120 char *installerargs
[] = { toolSourcePath
, NULL
};
121 err
= AuthorizationExecuteWithPrivileges(authRef
, toolInstallerPath
, 0, installerargs
, (FILE**) NULL
);
123 int pid
= wait(&status
);
124 if (pid
> 0 && WIFEXITED(status
)) {
125 err
= WEXITSTATUS(status
);
127 gToolApproved
= true;
133 (void) AuthorizationFree(authRef
, kAuthorizationFlagDefaults
);
141 static OSStatus
ExecWithCmdAndParam(const char *subCmd
, CFDataRef paramData
)
142 // Execute our privop tool with the supplied subCmd and parameter
144 OSStatus err
= noErr
;
150 const char *args
[] = { kToolPath
, NULL
, "A", NULL
, NULL
};
151 AuthorizationExternalForm authExt
;
153 err
= ExternalizeAuthority(&authExt
);
154 require_noerr(err
, AuthFailed
);
156 dataLen
= CFDataGetLength(paramData
);
157 buff
= (UInt8
*) malloc(dataLen
* sizeof(UInt8
));
158 require_action(buff
!= NULL
, AllocBuffFailed
, err
=memFullErr
;);
160 CFRange all
= { 0, dataLen
};
161 CFDataGetBytes(paramData
, all
, buff
);
164 commFD
= fileno(tmpfile());
165 sprintf(fileNum
, "%d", commFD
);
169 // write authority to pipe
170 len
= 0; // tag, unused
171 write(commFD
, &len
, sizeof len
);
172 len
= sizeof authExt
; // len
173 write(commFD
, &len
, sizeof len
);
174 write(commFD
, &authExt
, len
);
176 // write parameter to pipe
177 len
= 0; // tag, unused
178 write(commFD
, &len
, sizeof len
);
179 len
= dataLen
; // len
180 write(commFD
, &len
, sizeof len
);
181 write(commFD
, buff
, len
);
183 child
= execTool(args
);
186 waitpid(child
, &status
, 0);
187 if (WIFEXITED(status
))
188 err
= WEXITSTATUS(status
);
189 //fprintf(stderr, "child exited; status = %d (%ld)\n", status, err);
201 WriteBrowseDomain(CFDataRef domainArrayData
)
203 if (!CurrentlyAuthorized())
205 return ExecWithCmdAndParam("Wb", domainArrayData
);
209 WriteRegistrationDomain(CFDataRef domainArrayData
)
211 if (!CurrentlyAuthorized())
213 return ExecWithCmdAndParam("Wd", domainArrayData
);
217 WriteHostname(CFDataRef domainArrayData
)
219 if (!CurrentlyAuthorized())
221 return ExecWithCmdAndParam("Wh", domainArrayData
);
225 SetKeyForDomain(CFDataRef secretData
)
227 if (!CurrentlyAuthorized())
229 return ExecWithCmdAndParam("Wk", secretData
);