Blame SOURCES/0001-gcredentialsprivate-Document-the-various-private-mac.patch

76d899
From ef1035d9d86464ea0b5dde60a7a0e190895fdf5b Mon Sep 17 00:00:00 2001
76d899
From: Simon McVittie <smcv@collabora.com>
76d899
Date: Mon, 14 Oct 2019 08:22:24 +0100
76d899
Subject: [PATCH] gcredentialsprivate: Document the various private macros
76d899
76d899
Signed-off-by: Simon McVittie <smcv@collabora.com>
76d899
---
76d899
 gio/gcredentialsprivate.h | 59 +++++++++++++++++++++++++++++++++++++++
76d899
 1 file changed, 59 insertions(+)
76d899
76d899
diff --git a/gio/gcredentialsprivate.h b/gio/gcredentialsprivate.h
76d899
index 4d1c420a8..06f0aed19 100644
76d899
--- a/gio/gcredentialsprivate.h
76d899
+++ b/gio/gcredentialsprivate.h
76d899
@@ -22,6 +22,65 @@
76d899
 #include "gio/gcredentials.h"
76d899
 #include "gio/gnetworking.h"
76d899
 
76d899
+/*
76d899
+ * G_CREDENTIALS_SUPPORTED:
76d899
+ *
76d899
+ * Defined to 1 if GCredentials works.
76d899
+ */
76d899
+#undef G_CREDENTIALS_SUPPORTED
76d899
+
76d899
+/*
76d899
+ * G_CREDENTIALS_USE_LINUX_UCRED, etc.:
76d899
+ *
76d899
+ * Defined to 1 if GCredentials uses Linux `struct ucred`, etc.
76d899
+ */
76d899
+#undef G_CREDENTIALS_USE_LINUX_UCRED
76d899
+#undef G_CREDENTIALS_USE_FREEBSD_CMSGCRED
76d899
+#undef G_CREDENTIALS_USE_NETBSD_UNPCBID
76d899
+#undef G_CREDENTIALS_USE_OPENBSD_SOCKPEERCRED
76d899
+#undef G_CREDENTIALS_USE_SOLARIS_UCRED
76d899
+
76d899
+/*
76d899
+ * G_CREDENTIALS_NATIVE_TYPE:
76d899
+ *
76d899
+ * Defined to one of G_CREDENTIALS_TYPE_LINUX_UCRED, etc.
76d899
+ */
76d899
+#undef G_CREDENTIALS_NATIVE_TYPE
76d899
+
76d899
+/*
76d899
+ * G_CREDENTIALS_NATIVE_SIZE:
76d899
+ *
76d899
+ * Defined to the size of the %G_CREDENTIALS_NATIVE_TYPE
76d899
+ */
76d899
+#undef G_CREDENTIALS_NATIVE_SIZE
76d899
+
76d899
+/*
76d899
+ * G_CREDENTIALS_UNIX_CREDENTIALS_MESSAGE_SUPPORTED:
76d899
+ *
76d899
+ * Defined to 1 if we have a message-passing API in which credentials
76d899
+ * are attached to a particular message, such as `SCM_CREDENTIALS` on Linux
76d899
+ * or `SCM_CREDS` on FreeBSD.
76d899
+ */
76d899
+#undef G_CREDENTIALS_UNIX_CREDENTIALS_MESSAGE_SUPPORTED
76d899
+
76d899
+/*
76d899
+ * G_CREDENTIALS_SOCKET_GET_CREDENTIALS_SUPPORTED:
76d899
+ *
76d899
+ * Defined to 1 if we have a `getsockopt()`-style API in which one end of
76d899
+ * a socket connection can directly query the credentials of the process
76d899
+ * that initiated the other end, such as `getsockopt SO_PEERCRED` on Linux
76d899
+ * or `getpeereid()` on multiple operating systems.
76d899
+ */
76d899
+#undef G_CREDENTIALS_SOCKET_GET_CREDENTIALS_SUPPORTED
76d899
+
76d899
+/*
76d899
+ * G_CREDENTIALS_SPOOFING_SUPPORTED:
76d899
+ *
76d899
+ * Defined to 1 if privileged processes can spoof their credentials when
76d899
+ * using the message-passing API.
76d899
+ */
76d899
+#undef G_CREDENTIALS_SPOOFING_SUPPORTED
76d899
+
76d899
 #ifdef __linux__
76d899
 #define G_CREDENTIALS_SUPPORTED 1
76d899
 #define G_CREDENTIALS_USE_LINUX_UCRED 1
76d899
-- 
76d899
2.23.0
76d899