bool launcherApplication::Elevate(const StringArray& commandLineArray) { #if defined(JUCE_LINUX) || defined(JUCE_BSD) if (geteuid() == 0) { return true; } String parameters("--user root /usr/bin/env "); const char *var; var = getenv("DISPLAY"); if (var) { String s("DISPLAY=" + String(var)); if (s.contains(" ")) { s = s.quoted(); } parameters += s + " "; } var = getenv("XAUTHORITY"); if (var) { String s("XAUTHORITY=" + String(var)); if (s.contains(" ")) { s = s.quoted(); } parameters += s + " "; } String launcher(File::getSpecialLocation(File::currentExecutableFile).getFullPathName()); if (launcher.contains(" ")) { launcher = launcher.quoted(); } parameters += String(" ") + launcher; for (int i = 0; i < commandLineArray.size(); i++) { parameters += " "; if (commandLineArray[i].contains(" ")) { parameters += commandLineArray[i].quoted(); } else { parameters += commandLineArray[i]; } } File pkexec("/usr/bin/pkexec"); if (pkexec.exists() && pkexec.startAsProcess(parameters)) { launcherApplication::quit(); } pkexec = "/usr/local/bin/pkexec"; if (pkexec.exists() && pkexec.startAsProcess(parameters)) { launcherApplication::quit(); } #endif #if defined(JUCE_WINDOWS) BOOL fIsRunAsAdmin = FALSE; DWORD dwError = ERROR_SUCCESS; PSID pAdministratorsGroup = NULL; SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY; if (!AllocateAndInitializeSid(&NtAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &pAdministratorsGroup)) { dwError = GetLastError(); goto cleanup; } if (!CheckTokenMembership(NULL, pAdministratorsGroup, &fIsRunAsAdmin)) { dwError = GetLastError(); goto cleanup; } cleanup: if (pAdministratorsGroup) { FreeSid(pAdministratorsGroup); pAdministratorsGroup = NULL; } if (dwError != ERROR_SUCCESS) { throw dwError; } if (fIsRunAsAdmin) { return true; } TCHAR szPath[MAX_PATH]; if (!GetModuleFileName(NULL, szPath, ARRAYSIZE(szPath))) { dwError = GetLastError(); throw dwError; } String commandLine; for (int i = 0; i < commandLineArray.size(); i++) { if (commandLineArray[i].contains(" ")) { commandLine += String("\"") + commandLineArray[i] + String("\""); } else { commandLine += commandLineArray[i]; } if (i + 1 < commandLineArray.size()) { commandLine += " "; } } SHELLEXECUTEINFO sei = { 0 }; sei.cbSize = sizeof(SHELLEXECUTEINFO); sei.lpVerb = _T("runas"); sei.lpFile = szPath; sei.lpParameters = commandLine.toUTF8(); sei.nShow = SW_NORMAL; if (ShellExecuteEx(&sei)) { _exit(1); } #endif return false; }
bool launcherApplication::Elevate(const StringArray& commandLineArray) { #if defined(JUCE_LINUX) || defined(JUCE_BSD) if (geteuid() == 0) { return true; } String parameters("--user root /usr/bin/env "); const char *var = getenv("DISPLAY"); if (var) { String s("DISPLAY=" + String(var).quoted()); parameters += s + " "; } var = getenv("XAUTHORITY"); if (var) { String s("XAUTHORITY=" + String(var).quoted()); parameters += s + " "; } String launcher(File::getSpecialLocation( File::currentExecutableFile).getFullPathName()); if (launcher.contains(" ")) { launcher = launcher.quoted(); } parameters += String(" ") + launcher; for (int i = 0; i < commandLineArray.size(); i++) { parameters += " "; if (commandLineArray[i].contains(" ")) parameters += commandLineArray[i].quoted(); else parameters += commandLineArray[i]; } File pkexec("/usr/bin/pkexec"); if (pkexec.exists() && pkexec.startAsProcess(parameters)) { quit(); } pkexec = "/usr/local/bin/pkexec"; if (pkexec.exists() && pkexec.startAsProcess(parameters)) { quit(); } #elif defined(JUCE_WINDOWS) BOOL fIsRunAsAdmin = FALSE; DWORD dwError = ERROR_SUCCESS; PSID pAdministratorsGroup = NULL; SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY; if (!AllocateAndInitializeSid(&NtAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &pAdministratorsGroup)) { dwError = GetLastError(); goto cleanup; } if (!CheckTokenMembership(NULL, pAdministratorsGroup, &fIsRunAsAdmin)) { dwError = GetLastError(); goto cleanup; } cleanup: if (pAdministratorsGroup) { FreeSid(pAdministratorsGroup); pAdministratorsGroup = NULL; } if (dwError != ERROR_SUCCESS) { throw dwError; } if (fIsRunAsAdmin) { return true; } TCHAR szPath[MAX_PATH]; if (!GetModuleFileName(NULL, szPath, ARRAYSIZE(szPath))) { dwError = GetLastError(); throw dwError; } String commandLine; for (int i = 0; i < commandLineArray.size(); i++) { if (commandLineArray[i].contains(" ")) { commandLine += String("\"") + commandLineArray[i] + String("\""); } else { commandLine += commandLineArray[i]; } if (i + 1 < commandLineArray.size()) { commandLine += " "; } } SHELLEXECUTEINFO sei = { 0 }; sei.cbSize = sizeof(SHELLEXECUTEINFO); sei.lpVerb = _T("runas"); sei.lpFile = szPath; sei.lpParameters = commandLine.toUTF8(); sei.nShow = SW_NORMAL; if (ShellExecuteEx(&sei)) { _exit(1); } #elif defined(JUCE_MAC) if (geteuid() == 0) { return true; } String launcher(File::getSpecialLocation( File::currentExecutableFile).getFullPathName()); const char * execpath = launcher.toRawUTF8(); char * args[] = { NULL }; OSStatus err; AuthorizationRef ref; AuthorizationFlags flags; flags = kAuthorizationFlagDefaults; err = AuthorizationCreate(NULL, kAuthorizationEmptyEnvironment, flags, &ref); if ( err != errAuthorizationSuccess ) { quit(); } AuthorizationItem _temp = { kAuthorizationRightExecute, 0, NULL, 0 }; AuthorizationRights rights = { 1, &_temp }; flags = kAuthorizationFlagDefaults | kAuthorizationFlagInteractionAllowed | kAuthorizationFlagPreAuthorize | kAuthorizationFlagExtendRights; err = AuthorizationCopyRights(ref, &rights, NULL, flags, NULL); if ( err != errAuthorizationSuccess ) { AuthorizationFree(ref, kAuthorizationFlagDefaults); quit(); } flags = kAuthorizationFlagDefaults; err = AuthorizationExecuteWithPrivileges(ref, execpath, flags, args, NULL); AuthorizationFree(ref, kAuthorizationFlagDefaults); // Probably overkill. if ( err != errAuthorizationSuccess ) { quit(); } #endif // JUCE_MAC return false; }