2004-06-18 01:23:51 +04:00
|
|
|
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
2012-05-21 15:12:37 +04:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2004-06-18 01:23:51 +04:00
|
|
|
|
|
|
|
#include "MacLaunchHelper.h"
|
|
|
|
|
2016-05-25 05:25:16 +03:00
|
|
|
#include "MacAutoreleasePool.h"
|
2015-12-17 20:37:47 +03:00
|
|
|
#include "mozilla/UniquePtr.h"
|
2016-05-25 05:25:16 +03:00
|
|
|
#include "nsIAppStartup.h"
|
|
|
|
#include "nsMemory.h"
|
2008-02-20 20:34:21 +03:00
|
|
|
|
2016-05-25 05:25:16 +03:00
|
|
|
#include <Cocoa/Cocoa.h>
|
2010-10-01 23:59:26 +04:00
|
|
|
#include <crt_externs.h>
|
2016-05-25 05:25:16 +03:00
|
|
|
#include <ServiceManagement/ServiceManagement.h>
|
|
|
|
#include <Security/Authorization.h>
|
|
|
|
#include <spawn.h>
|
|
|
|
#include <stdio.h>
|
2004-06-18 01:23:51 +04:00
|
|
|
|
2011-10-11 09:50:08 +04:00
|
|
|
using namespace mozilla;
|
|
|
|
|
2016-08-30 11:54:29 +03:00
|
|
|
namespace {
|
|
|
|
cpu_type_t pref_cpu_types[2] = {
|
|
|
|
#if defined(__i386__)
|
|
|
|
CPU_TYPE_X86,
|
|
|
|
#elif defined(__x86_64__)
|
|
|
|
CPU_TYPE_X86_64,
|
|
|
|
#elif defined(__ppc__)
|
|
|
|
CPU_TYPE_POWERPC,
|
|
|
|
#endif
|
|
|
|
CPU_TYPE_ANY };
|
|
|
|
|
|
|
|
cpu_type_t cpu_i386_types[2] = {
|
|
|
|
CPU_TYPE_X86,
|
|
|
|
CPU_TYPE_ANY };
|
|
|
|
|
|
|
|
cpu_type_t cpu_x64_86_types[2] = {
|
|
|
|
CPU_TYPE_X86_64,
|
|
|
|
CPU_TYPE_ANY };
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
void LaunchChildMac(int aArgc, char** aArgv,
|
|
|
|
uint32_t aRestartType, pid_t *pid)
|
2004-06-18 01:23:51 +04:00
|
|
|
{
|
2016-08-30 11:54:29 +03:00
|
|
|
// "posix_spawnp" uses null termination for arguments rather than a count.
|
|
|
|
// Note that we are not duplicating the argument strings themselves.
|
|
|
|
auto argv_copy = MakeUnique<char*[]>(aArgc + 1);
|
|
|
|
for (int i = 0; i < aArgc; i++) {
|
|
|
|
argv_copy[i] = aArgv[i];
|
|
|
|
}
|
|
|
|
argv_copy[aArgc] = NULL;
|
2011-02-03 20:27:00 +03:00
|
|
|
|
2016-08-30 11:54:29 +03:00
|
|
|
// Initialize spawn attributes.
|
|
|
|
posix_spawnattr_t spawnattr;
|
|
|
|
if (posix_spawnattr_init(&spawnattr) != 0) {
|
|
|
|
printf("Failed to init posix spawn attribute.");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
cpu_type_t *wanted_type = pref_cpu_types;
|
|
|
|
size_t attr_count = ArrayLength(pref_cpu_types);
|
|
|
|
|
|
|
|
if (aRestartType & nsIAppStartup::eRestarti386) {
|
|
|
|
wanted_type = cpu_i386_types;
|
|
|
|
attr_count = ArrayLength(cpu_i386_types);
|
|
|
|
} else if (aRestartType & nsIAppStartup::eRestartx86_64) {
|
|
|
|
wanted_type = cpu_x64_86_types;
|
|
|
|
attr_count = ArrayLength(cpu_x64_86_types);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set spawn attributes.
|
|
|
|
size_t attr_ocount = 0;
|
|
|
|
if (posix_spawnattr_setbinpref_np(&spawnattr, attr_count, wanted_type, &attr_ocount) != 0 ||
|
|
|
|
attr_ocount != attr_count) {
|
|
|
|
printf("Failed to set binary preference on posix spawn attribute.");
|
|
|
|
posix_spawnattr_destroy(&spawnattr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Pass along our environment.
|
|
|
|
char** envp = NULL;
|
|
|
|
char*** cocoaEnvironment = _NSGetEnviron();
|
|
|
|
if (cocoaEnvironment) {
|
|
|
|
envp = *cocoaEnvironment;
|
|
|
|
}
|
|
|
|
|
|
|
|
int result = posix_spawnp(pid, argv_copy[0], NULL, &spawnattr, argv_copy.get(), envp);
|
|
|
|
|
|
|
|
posix_spawnattr_destroy(&spawnattr);
|
|
|
|
|
|
|
|
if (result != 0) {
|
|
|
|
printf("Process spawn failed with code %d!", result);
|
2006-02-28 06:43:49 +03:00
|
|
|
}
|
2004-06-18 01:23:51 +04:00
|
|
|
}
|
2016-05-25 05:25:16 +03:00
|
|
|
|
|
|
|
BOOL InstallPrivilegedHelper()
|
|
|
|
{
|
|
|
|
AuthorizationRef authRef = NULL;
|
|
|
|
OSStatus status = AuthorizationCreate(NULL,
|
|
|
|
kAuthorizationEmptyEnvironment,
|
|
|
|
kAuthorizationFlagDefaults |
|
|
|
|
kAuthorizationFlagInteractionAllowed,
|
|
|
|
&authRef);
|
|
|
|
if (status != errAuthorizationSuccess) {
|
|
|
|
// AuthorizationCreate really shouldn't fail.
|
|
|
|
NSLog(@"AuthorizationCreate failed! NSOSStatusErrorDomain / %d",
|
|
|
|
(int)status);
|
|
|
|
return NO;
|
|
|
|
}
|
|
|
|
|
|
|
|
BOOL result = NO;
|
|
|
|
AuthorizationItem authItem = { kSMRightBlessPrivilegedHelper, 0, NULL, 0 };
|
|
|
|
AuthorizationRights authRights = { 1, &authItem };
|
|
|
|
AuthorizationFlags flags = kAuthorizationFlagDefaults |
|
|
|
|
kAuthorizationFlagInteractionAllowed |
|
|
|
|
kAuthorizationFlagPreAuthorize |
|
|
|
|
kAuthorizationFlagExtendRights;
|
|
|
|
|
|
|
|
// Obtain the right to install our privileged helper tool.
|
|
|
|
status = AuthorizationCopyRights(authRef,
|
|
|
|
&authRights,
|
|
|
|
kAuthorizationEmptyEnvironment,
|
|
|
|
flags,
|
|
|
|
NULL);
|
|
|
|
if (status != errAuthorizationSuccess) {
|
|
|
|
NSLog(@"AuthorizationCopyRights failed! NSOSStatusErrorDomain / %d",
|
|
|
|
(int)status);
|
|
|
|
} else {
|
|
|
|
CFErrorRef cfError;
|
|
|
|
// This does all the work of verifying the helper tool against the
|
|
|
|
// application and vice-versa. Once verification has passed, the embedded
|
|
|
|
// launchd.plist is extracted and placed in /Library/LaunchDaemons and then
|
|
|
|
// loaded. The executable is placed in /Library/PrivilegedHelperTools.
|
|
|
|
result = (BOOL)SMJobBless(kSMDomainSystemLaunchd,
|
|
|
|
(CFStringRef)@"org.mozilla.updater",
|
|
|
|
authRef,
|
|
|
|
&cfError);
|
|
|
|
if (!result) {
|
|
|
|
NSLog(@"Unable to install helper!");
|
|
|
|
CFRelease(cfError);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
void AbortElevatedUpdate()
|
|
|
|
{
|
|
|
|
mozilla::MacAutoreleasePool pool;
|
2016-05-25 05:26:15 +03:00
|
|
|
|
2016-05-25 05:25:16 +03:00
|
|
|
id updateServer = nil;
|
2016-08-25 23:14:11 +03:00
|
|
|
int currTry = 0;
|
|
|
|
const int numRetries = 10; // Number of IPC connection retries before
|
|
|
|
// giving up.
|
|
|
|
while (currTry < numRetries) {
|
|
|
|
@try {
|
2016-05-25 05:26:15 +03:00
|
|
|
updateServer = (id)[NSConnection
|
|
|
|
rootProxyForConnectionWithRegisteredName:
|
|
|
|
@"org.mozilla.updater.server"
|
|
|
|
host:nil
|
|
|
|
usingNameServer:[NSSocketPortNameServer sharedInstance]];
|
|
|
|
if (updateServer &&
|
|
|
|
[updateServer respondsToSelector:@selector(abort)]) {
|
|
|
|
[updateServer performSelector:@selector(abort)];
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
NSLog(@"Server doesn't exist or doesn't provide correct selectors.");
|
|
|
|
sleep(1); // Wait 1 second.
|
|
|
|
currTry++;
|
2016-08-25 23:14:11 +03:00
|
|
|
} @catch (NSException* e) {
|
|
|
|
NSLog(@"Encountered exception, retrying: %@: %@", e.name, e.reason);
|
|
|
|
sleep(1); // Wait 1 second.
|
|
|
|
currTry++;
|
2016-05-25 05:25:16 +03:00
|
|
|
}
|
|
|
|
}
|
2016-05-25 05:26:15 +03:00
|
|
|
NSLog(@"Unable to clean up updater.");
|
2016-05-25 05:25:16 +03:00
|
|
|
}
|
|
|
|
|
2016-08-30 11:54:29 +03:00
|
|
|
bool LaunchElevatedUpdate(int argc, char** argv, uint32_t aRestartType,
|
|
|
|
pid_t* pid)
|
2016-05-25 05:25:16 +03:00
|
|
|
{
|
2016-08-30 11:54:29 +03:00
|
|
|
LaunchChildMac(argc, argv, aRestartType, pid);
|
2016-05-25 05:25:16 +03:00
|
|
|
bool didSucceed = InstallPrivilegedHelper();
|
|
|
|
if (!didSucceed) {
|
|
|
|
AbortElevatedUpdate();
|
|
|
|
}
|
|
|
|
return didSucceed;
|
|
|
|
}
|