Blame SOURCES/0001-gcredentialsprivate-Document-the-various-private-mac.patch

d896e1
From ef1035d9d86464ea0b5dde60a7a0e190895fdf5b Mon Sep 17 00:00:00 2001
d896e1
From: Simon McVittie <smcv@collabora.com>
d896e1
Date: Mon, 14 Oct 2019 08:22:24 +0100
d896e1
Subject: [PATCH] gcredentialsprivate: Document the various private macros
d896e1
d896e1
Signed-off-by: Simon McVittie <smcv@collabora.com>
d896e1
---
d896e1
 gio/gcredentialsprivate.h | 59 +++++++++++++++++++++++++++++++++++++++
d896e1
 1 file changed, 59 insertions(+)
d896e1
d896e1
diff --git a/gio/gcredentialsprivate.h b/gio/gcredentialsprivate.h
d896e1
index 4d1c420a8..06f0aed19 100644
d896e1
--- a/gio/gcredentialsprivate.h
d896e1
+++ b/gio/gcredentialsprivate.h
d896e1
@@ -22,6 +22,65 @@
d896e1
 #include "gio/gcredentials.h"
d896e1
 #include "gio/gnetworking.h"
d896e1
 
d896e1
+/*
d896e1
+ * G_CREDENTIALS_SUPPORTED:
d896e1
+ *
d896e1
+ * Defined to 1 if GCredentials works.
d896e1
+ */
d896e1
+#undef G_CREDENTIALS_SUPPORTED
d896e1
+
d896e1
+/*
d896e1
+ * G_CREDENTIALS_USE_LINUX_UCRED, etc.:
d896e1
+ *
d896e1
+ * Defined to 1 if GCredentials uses Linux `struct ucred`, etc.
d896e1
+ */
d896e1
+#undef G_CREDENTIALS_USE_LINUX_UCRED
d896e1
+#undef G_CREDENTIALS_USE_FREEBSD_CMSGCRED
d896e1
+#undef G_CREDENTIALS_USE_NETBSD_UNPCBID
d896e1
+#undef G_CREDENTIALS_USE_OPENBSD_SOCKPEERCRED
d896e1
+#undef G_CREDENTIALS_USE_SOLARIS_UCRED
d896e1
+
d896e1
+/*
d896e1
+ * G_CREDENTIALS_NATIVE_TYPE:
d896e1
+ *
d896e1
+ * Defined to one of G_CREDENTIALS_TYPE_LINUX_UCRED, etc.
d896e1
+ */
d896e1
+#undef G_CREDENTIALS_NATIVE_TYPE
d896e1
+
d896e1
+/*
d896e1
+ * G_CREDENTIALS_NATIVE_SIZE:
d896e1
+ *
d896e1
+ * Defined to the size of the %G_CREDENTIALS_NATIVE_TYPE
d896e1
+ */
d896e1
+#undef G_CREDENTIALS_NATIVE_SIZE
d896e1
+
d896e1
+/*
d896e1
+ * G_CREDENTIALS_UNIX_CREDENTIALS_MESSAGE_SUPPORTED:
d896e1
+ *
d896e1
+ * Defined to 1 if we have a message-passing API in which credentials
d896e1
+ * are attached to a particular message, such as `SCM_CREDENTIALS` on Linux
d896e1
+ * or `SCM_CREDS` on FreeBSD.
d896e1
+ */
d896e1
+#undef G_CREDENTIALS_UNIX_CREDENTIALS_MESSAGE_SUPPORTED
d896e1
+
d896e1
+/*
d896e1
+ * G_CREDENTIALS_SOCKET_GET_CREDENTIALS_SUPPORTED:
d896e1
+ *
d896e1
+ * Defined to 1 if we have a `getsockopt()`-style API in which one end of
d896e1
+ * a socket connection can directly query the credentials of the process
d896e1
+ * that initiated the other end, such as `getsockopt SO_PEERCRED` on Linux
d896e1
+ * or `getpeereid()` on multiple operating systems.
d896e1
+ */
d896e1
+#undef G_CREDENTIALS_SOCKET_GET_CREDENTIALS_SUPPORTED
d896e1
+
d896e1
+/*
d896e1
+ * G_CREDENTIALS_SPOOFING_SUPPORTED:
d896e1
+ *
d896e1
+ * Defined to 1 if privileged processes can spoof their credentials when
d896e1
+ * using the message-passing API.
d896e1
+ */
d896e1
+#undef G_CREDENTIALS_SPOOFING_SUPPORTED
d896e1
+
d896e1
 #ifdef __linux__
d896e1
 #define G_CREDENTIALS_SUPPORTED 1
d896e1
 #define G_CREDENTIALS_USE_LINUX_UCRED 1
d896e1
-- 
d896e1
2.23.0
d896e1