diff options
Diffstat (limited to 'src/ca/scaweb.cpp')
| -rw-r--r-- | src/ca/scaweb.cpp | 1187 |
1 files changed, 1187 insertions, 0 deletions
diff --git a/src/ca/scaweb.cpp b/src/ca/scaweb.cpp new file mode 100644 index 00000000..0452fb0b --- /dev/null +++ b/src/ca/scaweb.cpp | |||
| @@ -0,0 +1,1187 @@ | |||
| 1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
| 2 | |||
| 3 | #include "precomp.h" | ||
| 4 | |||
| 5 | //Adding this because delivery doesn't have the updated specstrings.h that windows build does | ||
| 6 | #ifndef __in_xcount | ||
| 7 | #define __in_xcount(size) | ||
| 8 | #endif | ||
| 9 | |||
| 10 | // sql queries | ||
| 11 | |||
| 12 | enum eWebBaseQuery { wbqWeb = 1, wbqId, wbqIP, wbqPort, wbqHeader, wbqSecure, wbqDescription }; | ||
| 13 | |||
| 14 | |||
| 15 | // prototypes for private helper functions | ||
| 16 | static SCA_WEB* NewWeb(); | ||
| 17 | static void FreeWeb(SCA_WEB *pswDelete); | ||
| 18 | static SCA_WEB* AddWebToList( | ||
| 19 | __in SCA_WEB* pswList, | ||
| 20 | __in SCA_WEB* psw | ||
| 21 | ); | ||
| 22 | static HRESULT ScaWebFindBase( | ||
| 23 | __in IMSAdminBase* piMetabase, | ||
| 24 | __in SCA_WEB* pswList, | ||
| 25 | __in_z LPCWSTR wzWeb, | ||
| 26 | __in int iSiteId, | ||
| 27 | __in_z LPCWSTR wzIP, | ||
| 28 | __in int iPort, | ||
| 29 | __in_z LPCWSTR wzHeader, | ||
| 30 | __in BOOL fSecure, | ||
| 31 | __in_z LPCWSTR wzDescription, | ||
| 32 | __out_ecount(cchWebBase) LPWSTR wzWebBase, | ||
| 33 | __in DWORD cchWebBase | ||
| 34 | ); | ||
| 35 | static HRESULT ScaWebFindFreeBase( | ||
| 36 | __in IMSAdminBase* piMetabase, | ||
| 37 | __in_xcount(unknown) SCA_WEB* pswList, | ||
| 38 | __in int iSiteId, | ||
| 39 | __in_z LPCWSTR wzDescription, | ||
| 40 | __out_ecount(cchWebBase) LPWSTR wzWebBase, | ||
| 41 | __in DWORD cchWebBase | ||
| 42 | ); | ||
| 43 | static HRESULT ScaWebWrite( | ||
| 44 | __in IMSAdminBase* piMetabase, | ||
| 45 | __in SCA_WEB* psw, | ||
| 46 | __in SCA_APPPOOL * psapList | ||
| 47 | ); | ||
| 48 | static HRESULT ScaWebRemove( | ||
| 49 | __in IMSAdminBase* piMetabase, | ||
| 50 | __in const SCA_WEB* psw); | ||
| 51 | static DWORD SiteIdFromDescription( | ||
| 52 | __in_z LPCWSTR wzDescription | ||
| 53 | ); | ||
| 54 | static void Sort( | ||
| 55 | __in_ecount(cArray) DWORD dwArray[], | ||
| 56 | __in int cArray | ||
| 57 | ); | ||
| 58 | |||
| 59 | |||
| 60 | HRESULT ScaWebsRead( | ||
| 61 | __in IMSAdminBase* piMetabase, | ||
| 62 | __in SCA_MIMEMAP** ppsmmList, | ||
| 63 | __in SCA_WEB** ppswList, | ||
| 64 | __in SCA_HTTP_HEADER** ppshhList, | ||
| 65 | __in SCA_WEB_ERROR** ppsweList, | ||
| 66 | __in WCA_WRAPQUERY_HANDLE hUserQuery, | ||
| 67 | __in WCA_WRAPQUERY_HANDLE hWebDirPropQuery, | ||
| 68 | __in WCA_WRAPQUERY_HANDLE hSslCertQuery, | ||
| 69 | __in WCA_WRAPQUERY_HANDLE hWebLogQuery, | ||
| 70 | __in WCA_WRAPQUERY_HANDLE hWebAppQuery, | ||
| 71 | __in WCA_WRAPQUERY_HANDLE hWebAppExtQuery, | ||
| 72 | __inout LPWSTR *ppwzCustomActionData | ||
| 73 | ) | ||
| 74 | { | ||
| 75 | Assert(piMetabase && ppswList); | ||
| 76 | |||
| 77 | HRESULT hr = S_OK; | ||
| 78 | |||
| 79 | MSIHANDLE hRec; | ||
| 80 | MSIHANDLE hRecAddresses; | ||
| 81 | |||
| 82 | SCA_WEB* psw = NULL; | ||
| 83 | LPWSTR pwzData = NULL; | ||
| 84 | int iSiteId; | ||
| 85 | |||
| 86 | DWORD dwLen = 0; | ||
| 87 | WCA_WRAPQUERY_HANDLE hQueryWebSite = NULL; | ||
| 88 | WCA_WRAPQUERY_HANDLE hQueryWebAddress = NULL; | ||
| 89 | |||
| 90 | hr = WcaBeginUnwrapQuery(&hQueryWebSite, ppwzCustomActionData); | ||
| 91 | ExitOnFailure(hr, "Failed to unwrap query for ScaWebsRead"); | ||
| 92 | |||
| 93 | hr = WcaBeginUnwrapQuery(&hQueryWebAddress, ppwzCustomActionData); | ||
| 94 | ExitOnFailure(hr, "Failed to unwrap query for ScaWebsRead"); | ||
| 95 | |||
| 96 | if (0 == WcaGetQueryRecords(hQueryWebSite)) | ||
| 97 | { | ||
| 98 | WcaLog(LOGMSG_VERBOSE, "Required tables not present"); | ||
| 99 | ExitFunction1(hr = S_FALSE); | ||
| 100 | } | ||
| 101 | |||
| 102 | // loop through all the webs | ||
| 103 | while (S_OK == (hr = WcaFetchWrappedRecord(hQueryWebSite, &hRec))) | ||
| 104 | { | ||
| 105 | psw = NewWeb(); | ||
| 106 | ExitOnNull(psw, hr, E_OUTOFMEMORY, "Failed to allocate memory for web object in memory"); | ||
| 107 | |||
| 108 | // get the darwin information | ||
| 109 | hr = WcaGetRecordString(hRec, wqWeb, &pwzData); | ||
| 110 | ExitOnFailure(hr, "Failed to get Web"); | ||
| 111 | hr = ::StringCchCopyW(psw->wzKey, countof(psw->wzKey), pwzData); | ||
| 112 | ExitOnFailure(hr, "Failed to copy key string to web object"); | ||
| 113 | |||
| 114 | if (*pwzData && *ppsmmList) | ||
| 115 | { | ||
| 116 | hr = ScaGetMimeMap(mmptWeb, pwzData, ppsmmList, &psw->psmm); | ||
| 117 | ExitOnFailure(hr, "Failed to get mimemap for VirtualDir"); | ||
| 118 | } | ||
| 119 | |||
| 120 | // get component install state | ||
| 121 | hr = WcaGetRecordString(hRec, wqComponent, &pwzData); | ||
| 122 | ExitOnFailure(hr, "Failed to get Component for Web"); | ||
| 123 | hr = ::StringCchCopyW(psw->wzComponent, countof(psw->wzComponent), pwzData); | ||
| 124 | ExitOnFailure(hr, "Failed to copy component string to web object"); | ||
| 125 | if (*(psw->wzComponent)) | ||
| 126 | { | ||
| 127 | psw->fHasComponent = TRUE; | ||
| 128 | |||
| 129 | hr = WcaGetRecordInteger(hRec, wqInstalled, (int *)&psw->isInstalled); | ||
| 130 | ExitOnFailure(hr, "Failed to get web Component's installed state"); | ||
| 131 | |||
| 132 | WcaGetRecordInteger(hRec, wqAction, (int *)&psw->isAction); | ||
| 133 | ExitOnFailure(hr, "Failed to get web Component's action state"); | ||
| 134 | |||
| 135 | if (!WcaIsInstalling(psw->isInstalled, psw->isAction) && !WcaIsUninstalling(psw->isInstalled, psw->isAction) | ||
| 136 | && !WcaIsReInstalling(psw->isInstalled, psw->isAction)) | ||
| 137 | { | ||
| 138 | FreeWeb(psw); | ||
| 139 | psw = NULL; | ||
| 140 | |||
| 141 | continue; // If we aren't acting on this component, skip it | ||
| 142 | } | ||
| 143 | } | ||
| 144 | |||
| 145 | hr = WcaGetRecordInteger(hRec, wqId, &iSiteId); | ||
| 146 | ExitOnFailure(hr, "Failed to get SiteId for Web"); | ||
| 147 | |||
| 148 | // Get the web's key address. | ||
| 149 | hr = WcaGetRecordString(hRec, wqAddress, &pwzData); | ||
| 150 | ExitOnFailure(hr, "Failed to get Address for Web"); | ||
| 151 | hr = ::StringCchCopyW(psw->swaKey.wzKey, countof(psw->swaKey.wzKey), pwzData); | ||
| 152 | ExitOnFailure(hr, "Failed to copy key string to web object"); | ||
| 153 | |||
| 154 | hr = WcaGetRecordString(hRec, wqIP, &pwzData); | ||
| 155 | ExitOnFailure(hr, "Failed to get IP for Web"); | ||
| 156 | hr = ::StringCchCopyW(psw->swaKey.wzIP, countof(psw->swaKey.wzIP), pwzData); | ||
| 157 | ExitOnFailure(hr, "Failed to copy IP string to web object"); | ||
| 158 | |||
| 159 | hr = WcaGetRecordString(hRec, wqPort, &pwzData); | ||
| 160 | ExitOnFailure(hr, "Failed to get Web Address port"); | ||
| 161 | psw->swaKey.iPort = wcstol(pwzData, NULL, 10); | ||
| 162 | |||
| 163 | hr = WcaGetRecordString(hRec, wqHeader, &pwzData); | ||
| 164 | ExitOnFailure(hr, "Failed to get Header for Web"); | ||
| 165 | hr = ::StringCchCopyW(psw->swaKey.wzHeader, countof(psw->swaKey.wzHeader), pwzData); | ||
| 166 | ExitOnFailure(hr, "Failed to copy header string to web object"); | ||
| 167 | |||
| 168 | hr = WcaGetRecordInteger(hRec, wqSecure, &psw->swaKey.fSecure); | ||
| 169 | ExitOnFailure(hr, "Failed to get if Web is secure"); | ||
| 170 | if (S_FALSE == hr) | ||
| 171 | { | ||
| 172 | psw->swaKey.fSecure = FALSE; | ||
| 173 | } | ||
| 174 | |||
| 175 | // Get the web's description. | ||
| 176 | hr = WcaGetRecordString(hRec, wqDescription, &pwzData); | ||
| 177 | ExitOnFailure(hr, "Failed to get Description for Web"); | ||
| 178 | hr = ::StringCchCopyW(psw->wzDescription, countof(psw->wzDescription), pwzData); | ||
| 179 | ExitOnFailure(hr, "Failed to copy description string to web object"); | ||
| 180 | |||
| 181 | // Try to find the web root in case it already exists. | ||
| 182 | dwLen = METADATA_MAX_NAME_LEN; | ||
| 183 | hr = ScaWebFindBase(piMetabase, *ppswList, | ||
| 184 | psw->wzKey, | ||
| 185 | iSiteId, | ||
| 186 | psw->swaKey.wzIP, | ||
| 187 | psw->swaKey.iPort, | ||
| 188 | psw->swaKey.wzHeader, | ||
| 189 | psw->swaKey.fSecure, | ||
| 190 | psw->wzDescription, | ||
| 191 | psw->wzWebBase, dwLen); | ||
| 192 | if (S_OK == hr) | ||
| 193 | { | ||
| 194 | psw->fBaseExists = TRUE; | ||
| 195 | } | ||
| 196 | else if (S_FALSE == hr) // didn't find the web site. | ||
| 197 | { | ||
| 198 | psw->fBaseExists = FALSE; | ||
| 199 | |||
| 200 | // If we're actually configuring the web site. | ||
| 201 | if (psw->fHasComponent) | ||
| 202 | { | ||
| 203 | if (WcaIsInstalling(psw->isInstalled, psw->isAction)) | ||
| 204 | { | ||
| 205 | hr = ScaWebFindFreeBase(piMetabase, *ppswList, iSiteId, psw->wzDescription, psw->wzWebBase, countof(psw->wzWebBase)); | ||
| 206 | ExitOnFailure(hr, "Failed to find free web root."); | ||
| 207 | } | ||
| 208 | else if (WcaIsUninstalling(psw->isInstalled, psw->isAction)) | ||
| 209 | { | ||
| 210 | WcaLog(LOGMSG_VERBOSE, "Web site: '%ls' was already removed, skipping.", psw->wzKey); | ||
| 211 | |||
| 212 | hr = S_OK; | ||
| 213 | continue; | ||
| 214 | } | ||
| 215 | } | ||
| 216 | } | ||
| 217 | ExitOnFailure(hr, "Failed to find web root"); | ||
| 218 | |||
| 219 | // get any extra web addresses | ||
| 220 | WcaFetchWrappedReset(hQueryWebAddress); | ||
| 221 | while (S_OK == (hr = WcaFetchWrappedRecordWhereString(hQueryWebAddress, 2, psw->wzKey, &hRecAddresses))) | ||
| 222 | { | ||
| 223 | if (MAX_ADDRESSES_PER_WEB <= psw->cExtraAddresses) | ||
| 224 | { | ||
| 225 | hr = HRESULT_FROM_WIN32(ERROR_INSUFFICIENT_BUFFER); | ||
| 226 | ExitOnFailure(hr, "Failure to get more extra web addresses, max exceeded."); | ||
| 227 | } | ||
| 228 | |||
| 229 | hr = WcaGetRecordString(hRecAddresses, waqAddress, &pwzData); | ||
| 230 | ExitOnFailure(hr, "Failed to get extra web Address"); | ||
| 231 | |||
| 232 | // if this isn't the key address add it | ||
| 233 | if (0 != lstrcmpW(pwzData, psw->swaKey.wzKey)) | ||
| 234 | { | ||
| 235 | hr = ::StringCchCopyW(psw->swaExtraAddresses[psw->cExtraAddresses].wzKey, countof(psw->swaExtraAddresses[psw->cExtraAddresses].wzKey), pwzData); | ||
| 236 | ExitOnFailure(hr, "Failed to copy extra addresses key string to web object"); | ||
| 237 | |||
| 238 | hr = WcaGetRecordString(hRecAddresses, waqIP, &pwzData); | ||
| 239 | ExitOnFailure(hr, "Failed to get extra web IP"); | ||
| 240 | hr = ::StringCchCopyW(psw->swaExtraAddresses[psw->cExtraAddresses].wzIP, countof(psw->swaExtraAddresses[psw->cExtraAddresses].wzIP), pwzData); | ||
| 241 | ExitOnFailure(hr, "Failed to copy extra addresses IP string to web object"); | ||
| 242 | |||
| 243 | hr = WcaGetRecordString(hRecAddresses, waqPort, &pwzData); | ||
| 244 | ExitOnFailure(hr, "Failed to get port for extra web IP"); | ||
| 245 | psw->swaExtraAddresses[psw->cExtraAddresses].iPort= wcstol(pwzData, NULL, 10); | ||
| 246 | |||
| 247 | hr = WcaGetRecordString(hRecAddresses, waqHeader, &pwzData); | ||
| 248 | ExitOnFailure(hr, "Failed to get header for extra web IP"); | ||
| 249 | hr = ::StringCchCopyW(psw->swaExtraAddresses[psw->cExtraAddresses].wzHeader, countof(psw->swaExtraAddresses[psw->cExtraAddresses].wzHeader), pwzData); | ||
| 250 | ExitOnFailure(hr, "Failed to copy extra addresses header string to web object"); | ||
| 251 | |||
| 252 | hr = WcaGetRecordInteger(hRecAddresses, waqSecure, &psw->swaExtraAddresses[psw->cExtraAddresses].fSecure); | ||
| 253 | ExitOnFailure(hr, "Failed to get if secure extra web IP"); | ||
| 254 | if (S_FALSE == hr) | ||
| 255 | psw->swaExtraAddresses[psw->cExtraAddresses].fSecure = FALSE; | ||
| 256 | |||
| 257 | ++psw->cExtraAddresses; | ||
| 258 | } | ||
| 259 | } | ||
| 260 | |||
| 261 | if (E_NOMOREITEMS == hr) | ||
| 262 | hr = S_OK; | ||
| 263 | ExitOnFailure(hr, "Failure occured while getting extra web addresses"); | ||
| 264 | |||
| 265 | hr = WcaGetRecordInteger(hRec, wqConnectionTimeout, &psw->iConnectionTimeout); | ||
| 266 | ExitOnFailure(hr, "Failed to get connection timeout for Web"); | ||
| 267 | |||
| 268 | if (psw->fHasComponent) // If we're installing it, it needs a dir | ||
| 269 | { | ||
| 270 | // get the web's directory | ||
| 271 | if (INSTALLSTATE_SOURCE == psw->isAction) | ||
| 272 | { | ||
| 273 | hr = WcaGetRecordString(hRec, wqSourcePath, &pwzData); | ||
| 274 | } | ||
| 275 | else | ||
| 276 | { | ||
| 277 | hr = WcaGetRecordString(hRec, wqTargetPath, &pwzData); | ||
| 278 | } | ||
| 279 | ExitOnFailure(hr, "Failed to get Source/TargetPath for Directory"); | ||
| 280 | |||
| 281 | // remove trailing backslashes | ||
| 282 | while (lstrlenW(pwzData) > 0 && pwzData[lstrlenW(pwzData)-1] == L'\\') | ||
| 283 | { | ||
| 284 | pwzData[lstrlenW(pwzData)-1] = 0; | ||
| 285 | } | ||
| 286 | hr = ::StringCchCopyW(psw->wzDirectory, countof(psw->wzDirectory), pwzData); | ||
| 287 | ExitOnFailure(hr, "Failed to copy directory string to web object"); | ||
| 288 | } | ||
| 289 | |||
| 290 | hr = WcaGetRecordInteger(hRec, wqState, &psw->iState); | ||
| 291 | ExitOnFailure(hr, "Failed to get state for Web"); | ||
| 292 | |||
| 293 | hr = WcaGetRecordInteger(hRec, wqAttributes, &psw->iAttributes); | ||
| 294 | ExitOnFailure(hr, "Failed to get attributes for Web"); | ||
| 295 | |||
| 296 | // get the dir properties for this web | ||
| 297 | hr = WcaGetRecordString(hRec, wqProperties, &pwzData); | ||
| 298 | ExitOnFailure(hr, "Failed to get directory property record for Web"); | ||
| 299 | if (*pwzData) | ||
| 300 | { | ||
| 301 | hr = ScaGetWebDirProperties(pwzData, hUserQuery, hWebDirPropQuery, &psw->swp); | ||
| 302 | ExitOnFailure(hr, "Failed to get directory properties for Web"); | ||
| 303 | |||
| 304 | psw->fHasProperties = TRUE; | ||
| 305 | } | ||
| 306 | |||
| 307 | // get the application information for this web | ||
| 308 | hr = WcaGetRecordString(hRec, wqApplication, &pwzData); | ||
| 309 | ExitOnFailure(hr, "Failed to get application identifier for Web"); | ||
| 310 | if (*pwzData) | ||
| 311 | { | ||
| 312 | hr = ScaGetWebApplication(NULL, pwzData, hWebAppQuery, hWebAppExtQuery, &psw->swapp); | ||
| 313 | ExitOnFailure(hr, "Failed to get application for Web"); | ||
| 314 | |||
| 315 | psw->fHasApplication = TRUE; | ||
| 316 | } | ||
| 317 | |||
| 318 | // get the SSL certificates | ||
| 319 | hr = ScaSslCertificateRead(psw->wzKey, hSslCertQuery, &(psw->pswscList)); | ||
| 320 | ExitOnFailure(hr, "Failed to get SSL Certificates."); | ||
| 321 | |||
| 322 | // get the custom headers | ||
| 323 | if (*ppshhList) | ||
| 324 | { | ||
| 325 | hr = ScaGetHttpHeader(hhptWeb, psw->wzKey, ppshhList, &(psw->pshhList)); | ||
| 326 | ExitOnFailure(hr, "Failed to get Custom HTTP Headers"); | ||
| 327 | } | ||
| 328 | |||
| 329 | // get the errors | ||
| 330 | if (*ppsweList) | ||
| 331 | { | ||
| 332 | hr = ScaGetWebError(weptWeb, psw->wzKey, ppsweList, &(psw->psweList)); | ||
| 333 | ExitOnFailure(hr, "Failed to get Custom Errors"); | ||
| 334 | } | ||
| 335 | |||
| 336 | // get the log information for this web | ||
| 337 | hr = WcaGetRecordString(hRec, wqLog, &pwzData); | ||
| 338 | ExitOnFailure(hr, "Failed to get log identifier for Web"); | ||
| 339 | if (*pwzData) | ||
| 340 | { | ||
| 341 | hr = ScaGetWebLog(piMetabase, pwzData, hWebLogQuery, &psw->swl); | ||
| 342 | ExitOnFailure(hr, "Failed to get Log for Web."); | ||
| 343 | |||
| 344 | psw->fHasLog = TRUE; | ||
| 345 | } | ||
| 346 | |||
| 347 | *ppswList = AddWebToList(*ppswList, psw); | ||
| 348 | psw = NULL; // set the web NULL so it doesn't accidentally get freed below | ||
| 349 | } | ||
| 350 | |||
| 351 | if (E_NOMOREITEMS == hr) | ||
| 352 | { | ||
| 353 | hr = S_OK; | ||
| 354 | } | ||
| 355 | |||
| 356 | LExit: | ||
| 357 | // if anything was left over after an error clean it all up | ||
| 358 | WcaFinishUnwrapQuery(hQueryWebSite); | ||
| 359 | WcaFinishUnwrapQuery(hQueryWebAddress); | ||
| 360 | |||
| 361 | if (psw) | ||
| 362 | { | ||
| 363 | ScaWebsFreeList(psw); | ||
| 364 | } | ||
| 365 | |||
| 366 | ReleaseStr(pwzData); | ||
| 367 | |||
| 368 | return hr; | ||
| 369 | } | ||
| 370 | |||
| 371 | |||
| 372 | HRESULT ScaWebsGetBase( | ||
| 373 | __in IMSAdminBase* piMetabase, | ||
| 374 | __in SCA_WEB* pswList, | ||
| 375 | __in LPCWSTR wzWeb, | ||
| 376 | __out_ecount(cchWebBase) LPWSTR wzWebBase, | ||
| 377 | __in DWORD cchWebBase, | ||
| 378 | __in WCA_WRAPQUERY_HANDLE hWrapQuery | ||
| 379 | ) | ||
| 380 | { | ||
| 381 | HRESULT hr = S_OK; | ||
| 382 | MSIHANDLE hRec; | ||
| 383 | |||
| 384 | int iSiteId; | ||
| 385 | WCHAR wzIP[MAX_PATH]; | ||
| 386 | int iPort = -1; | ||
| 387 | WCHAR wzHeader[MAX_PATH]; | ||
| 388 | BOOL fSecure = FALSE; | ||
| 389 | |||
| 390 | LPWSTR pwzData = NULL; | ||
| 391 | |||
| 392 | // get the web information | ||
| 393 | WcaFetchWrappedReset(hWrapQuery); | ||
| 394 | |||
| 395 | hr = WcaFetchWrappedRecordWhereString(hWrapQuery, 1, wzWeb, &hRec); | ||
| 396 | if (S_OK == hr) | ||
| 397 | { | ||
| 398 | // get the data to search for | ||
| 399 | hr = WcaGetRecordInteger(hRec, wbqId, &iSiteId); | ||
| 400 | ExitOnFailure(hr, "Failed to get SiteId for Web for VirtualDir"); | ||
| 401 | |||
| 402 | hr = WcaGetRecordString(hRec, wbqIP, &pwzData); | ||
| 403 | ExitOnFailure(hr, "Failed to get IP for Web for VirtualDir"); | ||
| 404 | hr = ::StringCchCopyW(wzIP, countof(wzIP), pwzData); | ||
| 405 | ExitOnFailure(hr, "Failed to copy IP for Web for VirtualDir"); | ||
| 406 | |||
| 407 | hr = WcaGetRecordString(hRec, wbqPort, &pwzData); | ||
| 408 | ExitOnFailure(hr, "Failed to get port for extra web IP"); | ||
| 409 | iPort = wcstol(pwzData, NULL, 10); | ||
| 410 | |||
| 411 | hr = WcaGetRecordString(hRec, wbqHeader, &pwzData); | ||
| 412 | ExitOnFailure(hr, "Failed to get Header for Web for VirtualDir"); | ||
| 413 | hr = ::StringCchCopyW(wzHeader, countof(wzHeader), pwzData); | ||
| 414 | ExitOnFailure(hr, "Failed to copy Header for Web for VirtualDir"); | ||
| 415 | |||
| 416 | hr = WcaGetRecordInteger(hRec, wbqSecure, &fSecure); | ||
| 417 | if (S_FALSE == hr) | ||
| 418 | fSecure = FALSE; | ||
| 419 | |||
| 420 | hr = WcaGetRecordString(hRec, wbqDescription, &pwzData); | ||
| 421 | ExitOnFailure(hr, "Failed to get Description for Web"); | ||
| 422 | |||
| 423 | // find the web or find the next free web location | ||
| 424 | hr = ScaWebFindBase(piMetabase, pswList, wzWeb, iSiteId, wzIP, iPort, wzHeader, fSecure, pwzData, wzWebBase, cchWebBase); | ||
| 425 | if (S_FALSE == hr) | ||
| 426 | hr = HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND); | ||
| 427 | ExitOnFailure(hr, "Failed to find Web base"); | ||
| 428 | } | ||
| 429 | else if (S_FALSE == hr) | ||
| 430 | hr = HRESULT_FROM_WIN32(ERROR_NOT_FOUND); | ||
| 431 | |||
| 432 | // Let's check that there isn't more than one record found - if there is, throw an assert like WcaFetchSingleRecord() would | ||
| 433 | HRESULT hrTemp = WcaFetchWrappedRecordWhereString(hWrapQuery, 1, wzWeb, &hRec); | ||
| 434 | if (SUCCEEDED(hrTemp)) | ||
| 435 | { | ||
| 436 | AssertSz(E_NOMOREITEMS == hrTemp, "ScaWebsGetBase found more than one record"); | ||
| 437 | } | ||
| 438 | |||
| 439 | LExit: | ||
| 440 | ReleaseStr(pwzData); | ||
| 441 | |||
| 442 | return hr; | ||
| 443 | } | ||
| 444 | |||
| 445 | |||
| 446 | HRESULT ScaWebsInstall( | ||
| 447 | __in IMSAdminBase* piMetabase, | ||
| 448 | __in SCA_WEB* pswList, | ||
| 449 | __in SCA_APPPOOL * psapList | ||
| 450 | ) | ||
| 451 | { | ||
| 452 | HRESULT hr = S_OK; | ||
| 453 | SCA_WEB* psw = pswList; | ||
| 454 | |||
| 455 | while (psw) | ||
| 456 | { | ||
| 457 | // if we are installing the web site | ||
| 458 | if (psw->fHasComponent && WcaIsInstalling(psw->isInstalled, psw->isAction)) | ||
| 459 | { | ||
| 460 | hr = ScaWebWrite(piMetabase, psw, psapList); | ||
| 461 | ExitOnFailure(hr, "failed to write web '%ls' to metabase", psw->wzKey); | ||
| 462 | } | ||
| 463 | |||
| 464 | psw = psw->pswNext; | ||
| 465 | } | ||
| 466 | |||
| 467 | LExit: | ||
| 468 | return hr; | ||
| 469 | } | ||
| 470 | |||
| 471 | |||
| 472 | HRESULT ScaWebsUninstall( | ||
| 473 | __in IMSAdminBase* piMetabase, | ||
| 474 | __in SCA_WEB* pswList | ||
| 475 | ) | ||
| 476 | { | ||
| 477 | HRESULT hr = S_OK; | ||
| 478 | SCA_WEB* psw = pswList; | ||
| 479 | |||
| 480 | while (psw) | ||
| 481 | { | ||
| 482 | // if we are uninstalling the web site | ||
| 483 | if (psw->fHasComponent && WcaIsUninstalling(psw->isInstalled, psw->isAction)) | ||
| 484 | { | ||
| 485 | hr = ScaWebRemove(piMetabase, psw); | ||
| 486 | ExitOnFailure(hr, "Failed to remove web '%ls' from metabase", psw->wzKey); | ||
| 487 | } | ||
| 488 | |||
| 489 | psw = psw->pswNext; | ||
| 490 | } | ||
| 491 | |||
| 492 | LExit: | ||
| 493 | return hr; | ||
| 494 | } | ||
| 495 | |||
| 496 | |||
| 497 | void ScaWebsFreeList( | ||
| 498 | __in SCA_WEB* pswList | ||
| 499 | ) | ||
| 500 | { | ||
| 501 | SCA_WEB* pswDelete = pswList; | ||
| 502 | while (pswList) | ||
| 503 | { | ||
| 504 | pswDelete = pswList; | ||
| 505 | pswList = pswList->pswNext; | ||
| 506 | |||
| 507 | // Free the SSL, headers and errors list first | ||
| 508 | FreeWeb(pswDelete); | ||
| 509 | } | ||
| 510 | } | ||
| 511 | |||
| 512 | |||
| 513 | // private helper functions | ||
| 514 | |||
| 515 | static void FreeWeb(SCA_WEB *pswDelete) | ||
| 516 | { | ||
| 517 | ScaSslCertificateFreeList(pswDelete->pswscList); | ||
| 518 | ScaHttpHeaderFreeList(pswDelete->pshhList); | ||
| 519 | ScaWebErrorFreeList(pswDelete->psweList); | ||
| 520 | MemFree(pswDelete); | ||
| 521 | } | ||
| 522 | |||
| 523 | static SCA_WEB* NewWeb() | ||
| 524 | { | ||
| 525 | SCA_WEB* psw = static_cast<SCA_WEB*>(MemAlloc(sizeof(SCA_WEB), TRUE)); | ||
| 526 | Assert(psw); | ||
| 527 | return psw; | ||
| 528 | } | ||
| 529 | |||
| 530 | |||
| 531 | static SCA_WEB* AddWebToList( | ||
| 532 | __in SCA_WEB* pswList, | ||
| 533 | __in SCA_WEB* psw | ||
| 534 | ) | ||
| 535 | { | ||
| 536 | if (pswList) | ||
| 537 | { | ||
| 538 | SCA_WEB* pswTemp = pswList; | ||
| 539 | while (pswTemp->pswNext) | ||
| 540 | { | ||
| 541 | pswTemp = pswTemp->pswNext; | ||
| 542 | } | ||
| 543 | |||
| 544 | pswTemp->pswNext = psw; | ||
| 545 | } | ||
| 546 | else | ||
| 547 | { | ||
| 548 | pswList = psw; | ||
| 549 | } | ||
| 550 | |||
| 551 | return pswList; | ||
| 552 | } | ||
| 553 | |||
| 554 | |||
| 555 | static HRESULT ScaWebFindBase( | ||
| 556 | __in IMSAdminBase* piMetabase, | ||
| 557 | __in SCA_WEB* pswList, | ||
| 558 | __in_z LPCWSTR wzWeb, | ||
| 559 | __in int iSiteId, | ||
| 560 | __in_z LPCWSTR wzIP, | ||
| 561 | __in int iPort, | ||
| 562 | __in_z LPCWSTR wzHeader, | ||
| 563 | __in BOOL fSecure, | ||
| 564 | __in_z LPCWSTR wzDescription, | ||
| 565 | __out_ecount(cchWebBase) LPWSTR wzWebBase, | ||
| 566 | __in DWORD cchWebBase | ||
| 567 | ) | ||
| 568 | { | ||
| 569 | Assert(piMetabase); | ||
| 570 | |||
| 571 | HRESULT hr = S_OK; | ||
| 572 | |||
| 573 | WCHAR wzKey[METADATA_MAX_NAME_LEN]; | ||
| 574 | WCHAR wzSubkey[METADATA_MAX_NAME_LEN]; | ||
| 575 | LPWSTR wzFoundKey = NULL; | ||
| 576 | |||
| 577 | METADATA_RECORD mr; | ||
| 578 | ::ZeroMemory(&mr, sizeof(mr)); | ||
| 579 | |||
| 580 | METADATA_RECORD mrCompare; | ||
| 581 | ::ZeroMemory(&mrCompare, sizeof(mrCompare)); | ||
| 582 | |||
| 583 | // try to find the web in memory first | ||
| 584 | for (SCA_WEB* psw = pswList; psw; psw = psw->pswNext) | ||
| 585 | { | ||
| 586 | if (0 == lstrcmpW(wzWeb, psw->wzKey)) | ||
| 587 | { | ||
| 588 | if ((0 == lstrcmpW(wzIP, psw->swaKey.wzIP) || 0 == lstrcmpW(wzIP, L"*") || 0 == lstrcmpW(psw->swaKey.wzIP, L"*")) && | ||
| 589 | iPort == psw->swaKey.iPort && | ||
| 590 | 0 == lstrcmpW(wzHeader, psw->swaKey.wzHeader) && | ||
| 591 | fSecure == psw->swaKey.fSecure) | ||
| 592 | { | ||
| 593 | if (0 == lstrlenW(psw->wzWebBase)) | ||
| 594 | { | ||
| 595 | WcaLog(LOGMSG_STANDARD, "A matching web object in memory was found, but the web object in memory has no associated base"); | ||
| 596 | ExitFunction1(hr = S_FALSE); | ||
| 597 | } | ||
| 598 | |||
| 599 | hr = ::StringCchCopyW(wzKey, countof(wzKey), psw->wzWebBase); | ||
| 600 | ExitOnFailure(hr, "Failed to copy web base into key."); | ||
| 601 | |||
| 602 | wzFoundKey = wzKey; | ||
| 603 | break; | ||
| 604 | } | ||
| 605 | else | ||
| 606 | { | ||
| 607 | WcaLog(LOGMSG_STANDARD, "Found web `%ls` but data did not match.", wzWeb); | ||
| 608 | hr = E_UNEXPECTED; | ||
| 609 | break; | ||
| 610 | } | ||
| 611 | } | ||
| 612 | } | ||
| 613 | ExitOnFailure(hr, "Failure occured while searching for web in memory"); | ||
| 614 | |||
| 615 | // If we didn't find a web in memory matching look in the metabase. | ||
| 616 | if (!wzFoundKey) | ||
| 617 | { | ||
| 618 | mr.dwMDIdentifier = MD_KEY_TYPE; | ||
| 619 | mr.dwMDAttributes = METADATA_INHERIT; | ||
| 620 | mr.dwMDUserType = IIS_MD_UT_SERVER; | ||
| 621 | mr.dwMDDataType = ALL_METADATA; | ||
| 622 | mr.dwMDDataLen = 0; | ||
| 623 | mr.pbMDData = NULL; | ||
| 624 | |||
| 625 | // If we're looking based on the old WebAddress detection (NULL) or the new | ||
| 626 | // Web description detection (-1) | ||
| 627 | if (MSI_NULL_INTEGER == iSiteId || -1 == iSiteId) | ||
| 628 | { | ||
| 629 | if (MSI_NULL_INTEGER == iSiteId) | ||
| 630 | { | ||
| 631 | mrCompare.dwMDIdentifier = (fSecure) ? MD_SECURE_BINDINGS : MD_SERVER_BINDINGS; | ||
| 632 | } | ||
| 633 | else | ||
| 634 | { | ||
| 635 | mrCompare.dwMDIdentifier = MD_SERVER_COMMENT; | ||
| 636 | } | ||
| 637 | mrCompare.dwMDAttributes = METADATA_INHERIT; | ||
| 638 | mrCompare.dwMDUserType = IIS_MD_UT_SERVER; | ||
| 639 | mrCompare.dwMDDataType = ALL_METADATA; | ||
| 640 | mrCompare.dwMDDataLen = 0; | ||
| 641 | mrCompare.pbMDData = NULL; | ||
| 642 | |||
| 643 | // Loop through the "web keys" looking for the "IIsWebServer" key that matches our search criteria. | ||
| 644 | for (DWORD dwIndex = 0; SUCCEEDED(hr); ++dwIndex) | ||
| 645 | { | ||
| 646 | hr = piMetabase->EnumKeys(METADATA_MASTER_ROOT_HANDLE, L"/LM/W3SVC", wzSubkey, dwIndex); | ||
| 647 | if (SUCCEEDED(hr)) | ||
| 648 | { | ||
| 649 | hr = ::StringCchPrintfW(wzKey, countof(wzKey), L"/LM/W3SVC/%s", wzSubkey); | ||
| 650 | ExitOnFailure(hr, "Failed to copy web subkey."); | ||
| 651 | |||
| 652 | hr = MetaGetValue(piMetabase, METADATA_MASTER_ROOT_HANDLE, wzKey, &mr); | ||
| 653 | if (MD_ERROR_DATA_NOT_FOUND == hr || HRESULT_FROM_WIN32(ERROR_PATH_NOT_FOUND) == hr) | ||
| 654 | { | ||
| 655 | hr = S_FALSE; // didn't find anything, try next one | ||
| 656 | continue; | ||
| 657 | } | ||
| 658 | ExitOnFailure(hr, "Failed to get key from metabase while searching for web servers"); | ||
| 659 | |||
| 660 | // If we have an IIsWebServer check to see if this is the site we are searching for. | ||
| 661 | if (0 == lstrcmpW(L"IIsWebServer", (LPCWSTR)mr.pbMDData)) | ||
| 662 | { | ||
| 663 | hr = MetaGetValue(piMetabase, METADATA_MASTER_ROOT_HANDLE, wzKey, &mrCompare); | ||
| 664 | if (MD_ERROR_DATA_NOT_FOUND == hr || NULL == mrCompare.pbMDData) | ||
| 665 | { | ||
| 666 | hr = S_FALSE; | ||
| 667 | continue; | ||
| 668 | } | ||
| 669 | ExitOnFailure(hr, "Failed to get address/description from metabase while searching for web servers"); | ||
| 670 | |||
| 671 | LPWSTR pwzExists = (LPWSTR)mrCompare.pbMDData; | ||
| 672 | if (MSI_NULL_INTEGER == iSiteId) | ||
| 673 | { | ||
| 674 | // Break down the address into its constituent parts (IP:Port:Header). | ||
| 675 | while (S_OK == hr && *pwzExists) | ||
| 676 | { | ||
| 677 | LPCWSTR pwzIPExists = pwzExists; | ||
| 678 | pwzExists = const_cast<LPWSTR>(wcsstr(pwzIPExists, L":")); | ||
| 679 | ExitOnNull(pwzExists, hr, E_INVALIDARG, "Invalid web address. IP was not separated by a colon."); | ||
| 680 | *pwzExists = L'\0'; | ||
| 681 | |||
| 682 | LPCWSTR pwzPortExists = pwzExists + 1; | ||
| 683 | pwzExists = const_cast<LPWSTR>(wcsstr(pwzPortExists, L":")); | ||
| 684 | ExitOnNull(pwzExists, hr, E_INVALIDARG, "Invalid web address. Port was not separated by a colon."); | ||
| 685 | *pwzExists = L'\0'; | ||
| 686 | int iPortExists = wcstol(pwzPortExists, NULL, 10); | ||
| 687 | |||
| 688 | LPCWSTR pwzHeaderExists = pwzExists + 1; | ||
| 689 | |||
| 690 | // compare the passed in address with the address listed for this web | ||
| 691 | if ((0 == lstrcmpW(wzIP, pwzIPExists) || 0 == lstrcmpW(wzIP, L"*")) && | ||
| 692 | iPort == iPortExists && | ||
| 693 | 0 == lstrcmpW(wzHeader, pwzHeaderExists)) | ||
| 694 | { | ||
| 695 | wzFoundKey = wzKey; | ||
| 696 | break; | ||
| 697 | } | ||
| 698 | |||
| 699 | // move to the next block of data, this may move beyond the available | ||
| 700 | // data and exit the while loop above. | ||
| 701 | pwzExists = const_cast<LPWSTR>(pwzHeaderExists + lstrlenW(pwzHeaderExists) + 1); | ||
| 702 | } | ||
| 703 | } | ||
| 704 | else | ||
| 705 | { | ||
| 706 | if (0 == lstrcmpW(wzDescription, pwzExists)) | ||
| 707 | { | ||
| 708 | wzFoundKey = wzKey; | ||
| 709 | } | ||
| 710 | } | ||
| 711 | |||
| 712 | // If we found the key we were looking for, no point in continuing to search. | ||
| 713 | if (wzFoundKey) | ||
| 714 | { | ||
| 715 | break; | ||
| 716 | } | ||
| 717 | } | ||
| 718 | } | ||
| 719 | } | ||
| 720 | |||
| 721 | if (E_NOMOREITEMS == hr) | ||
| 722 | { | ||
| 723 | Assert(!wzFoundKey); | ||
| 724 | hr = S_FALSE; | ||
| 725 | } | ||
| 726 | } | ||
| 727 | else // we're looking a specific SiteId | ||
| 728 | { | ||
| 729 | hr = ::StringCchPrintfW(wzKey, countof(wzKey), L"/LM/W3SVC/%d", iSiteId); | ||
| 730 | ExitOnFailure(hr, "Failed to allocate metabase key string."); | ||
| 731 | |||
| 732 | // if we have an IIsWebServer store the key | ||
| 733 | hr = MetaGetValue(piMetabase, METADATA_MASTER_ROOT_HANDLE, wzKey, &mr); | ||
| 734 | |||
| 735 | if (SUCCEEDED(hr) && NULL != mr.pbMDData && 0 == lstrcmpW(L"IIsWebServer", (LPCWSTR)mr.pbMDData)) | ||
| 736 | { | ||
| 737 | wzFoundKey = wzKey; | ||
| 738 | } | ||
| 739 | else if (MD_ERROR_DATA_NOT_FOUND == hr || NULL == mrCompare.pbMDData || NULL == mr.pbMDData) | ||
| 740 | { | ||
| 741 | hr = S_FALSE; | ||
| 742 | } | ||
| 743 | } | ||
| 744 | } | ||
| 745 | |||
| 746 | if (wzFoundKey) | ||
| 747 | { | ||
| 748 | Assert(S_OK == hr); | ||
| 749 | |||
| 750 | hr = ::StringCchCopyW(wzWebBase, cchWebBase, wzFoundKey); | ||
| 751 | ExitOnFailure(hr, "Buffer not larger enough for found base key."); | ||
| 752 | } | ||
| 753 | |||
| 754 | LExit: | ||
| 755 | MetaFreeValue(&mr); | ||
| 756 | MetaFreeValue(&mrCompare); | ||
| 757 | |||
| 758 | if (!wzFoundKey && SUCCEEDED(hr)) | ||
| 759 | { | ||
| 760 | hr = S_FALSE; | ||
| 761 | } | ||
| 762 | |||
| 763 | return hr; | ||
| 764 | } | ||
| 765 | |||
| 766 | |||
| 767 | static HRESULT ScaWebFindFreeBase( | ||
| 768 | __in IMSAdminBase* piMetabase, | ||
| 769 | __in_xcount(unknown) SCA_WEB* pswList, | ||
| 770 | __in int iSiteId, | ||
| 771 | __in_z LPCWSTR wzDescription, | ||
| 772 | __out_ecount(cchWebBase) LPWSTR wzWebBase, | ||
| 773 | __in DWORD cchWebBase | ||
| 774 | ) | ||
| 775 | { | ||
| 776 | Assert(piMetabase); | ||
| 777 | |||
| 778 | HRESULT hr = S_OK; | ||
| 779 | |||
| 780 | WCHAR wzKey[METADATA_MAX_NAME_LEN]; | ||
| 781 | WCHAR wzSubkey[METADATA_MAX_NAME_LEN]; | ||
| 782 | DWORD* prgdwSubKeys = NULL; | ||
| 783 | DWORD cSubKeys = 128; | ||
| 784 | DWORD cSubKeysFilled = 0; | ||
| 785 | |||
| 786 | DWORD dwKey; | ||
| 787 | |||
| 788 | METADATA_RECORD mr; | ||
| 789 | ::ZeroMemory(&mr, sizeof(METADATA_RECORD)); | ||
| 790 | mr.dwMDIdentifier = MD_KEY_TYPE; | ||
| 791 | mr.dwMDAttributes = 0; | ||
| 792 | mr.dwMDUserType = IIS_MD_UT_SERVER; | ||
| 793 | mr.dwMDDataType = STRING_METADATA; | ||
| 794 | mr.dwMDDataLen = 0; | ||
| 795 | mr.pbMDData = NULL; | ||
| 796 | |||
| 797 | if (MSI_NULL_INTEGER == iSiteId || -1 == iSiteId) | ||
| 798 | { | ||
| 799 | prgdwSubKeys = static_cast<DWORD*>(MemAlloc(cSubKeys * sizeof(DWORD), TRUE)); | ||
| 800 | ExitOnNull(prgdwSubKeys, hr, E_OUTOFMEMORY, "failed to allocate space for web site keys"); | ||
| 801 | |||
| 802 | // loop through the "web keys" looking for the "IIsWebServer" key that matches wzWeb | ||
| 803 | for (DWORD dwIndex = 0; SUCCEEDED(hr); ++dwIndex) | ||
| 804 | { | ||
| 805 | hr = piMetabase->EnumKeys(METADATA_MASTER_ROOT_HANDLE, L"/LM/W3SVC", wzSubkey, dwIndex); | ||
| 806 | if (SUCCEEDED(hr)) | ||
| 807 | { | ||
| 808 | hr = ::StringCchPrintfW(wzKey, countof(wzKey), L"/LM/W3SVC/%s", wzSubkey); | ||
| 809 | ExitOnFailure(hr, "Failed remember key."); | ||
| 810 | |||
| 811 | hr = MetaGetValue(piMetabase, METADATA_MASTER_ROOT_HANDLE, wzKey, &mr); | ||
| 812 | if (MD_ERROR_DATA_NOT_FOUND == hr || HRESULT_FROM_WIN32(ERROR_PATH_NOT_FOUND) == hr) | ||
| 813 | { | ||
| 814 | hr = S_FALSE; // didn't find anything, try next one | ||
| 815 | continue; | ||
| 816 | } | ||
| 817 | ExitOnFailure(hr, "Failed to get key from metabase while searching for free web root"); | ||
| 818 | |||
| 819 | // if we have a IIsWebServer get the address information | ||
| 820 | if (0 == lstrcmpW(L"IIsWebServer", (LPCWSTR)mr.pbMDData)) | ||
| 821 | { | ||
| 822 | if (cSubKeysFilled >= cSubKeys) | ||
| 823 | { | ||
| 824 | cSubKeys = cSubKeys * 2; | ||
| 825 | prgdwSubKeys = static_cast<DWORD*>(MemReAlloc(prgdwSubKeys, cSubKeys * sizeof(DWORD), FALSE)); | ||
| 826 | ExitOnNull(prgdwSubKeys, hr, E_OUTOFMEMORY, "failed to allocate space for web site keys"); | ||
| 827 | } | ||
| 828 | |||
| 829 | prgdwSubKeys[cSubKeysFilled] = wcstol(wzSubkey, NULL, 10); | ||
| 830 | ++cSubKeysFilled; | ||
| 831 | Sort(prgdwSubKeys, cSubKeysFilled); | ||
| 832 | } | ||
| 833 | } | ||
| 834 | } | ||
| 835 | |||
| 836 | if (E_NOMOREITEMS == hr) | ||
| 837 | { | ||
| 838 | hr = S_OK; | ||
| 839 | } | ||
| 840 | ExitOnFailure(hr, "Failed to find free web root"); | ||
| 841 | |||
| 842 | // Add all the webs created in memory. | ||
| 843 | CONST WCHAR *pcchSlash; | ||
| 844 | for (SCA_WEB* psw = pswList; psw; psw = psw->pswNext) | ||
| 845 | { | ||
| 846 | // Don't process webs that don't have a base | ||
| 847 | if (!*psw->wzWebBase) | ||
| 848 | { | ||
| 849 | continue; | ||
| 850 | } | ||
| 851 | |||
| 852 | // find the last slash in the web root because the root # is after it | ||
| 853 | pcchSlash = NULL; | ||
| 854 | for (CONST WCHAR *pcch = psw->wzWebBase; pcch && *pcch; ++pcch) | ||
| 855 | { | ||
| 856 | if (L'/' == *pcch) | ||
| 857 | { | ||
| 858 | pcchSlash = pcch; | ||
| 859 | } | ||
| 860 | } | ||
| 861 | // In case we don't find a slash, error out | ||
| 862 | ExitOnNull(pcchSlash, hr, E_INVALIDARG, "Failed to find a slash in the web root: %ls", psw->wzWebBase); | ||
| 863 | |||
| 864 | prgdwSubKeys[cSubKeysFilled] = wcstol(pcchSlash + 1, NULL, 10); | ||
| 865 | ++cSubKeysFilled; | ||
| 866 | Sort(prgdwSubKeys, cSubKeysFilled); | ||
| 867 | |||
| 868 | if (cSubKeysFilled >= cSubKeys) | ||
| 869 | { | ||
| 870 | cSubKeys = cSubKeys * 2; | ||
| 871 | prgdwSubKeys = static_cast<DWORD*>(MemReAlloc(prgdwSubKeys, cSubKeys * sizeof(DWORD), FALSE)); | ||
| 872 | ExitOnNull(prgdwSubKeys, hr, E_OUTOFMEMORY, "failed to allocate space for web site keys"); | ||
| 873 | } | ||
| 874 | } | ||
| 875 | |||
| 876 | // Find the lowest free web root. | ||
| 877 | dwKey = (-1 == iSiteId) ? SiteIdFromDescription(wzDescription) : 1; | ||
| 878 | for (DWORD i = 0; i < cSubKeysFilled; ++i) | ||
| 879 | { | ||
| 880 | if (dwKey == prgdwSubKeys[i]) | ||
| 881 | { | ||
| 882 | ++dwKey; | ||
| 883 | } | ||
| 884 | else if (dwKey < prgdwSubKeys[i]) | ||
| 885 | { | ||
| 886 | break; | ||
| 887 | } | ||
| 888 | } | ||
| 889 | } | ||
| 890 | else | ||
| 891 | { | ||
| 892 | dwKey = iSiteId; | ||
| 893 | } | ||
| 894 | |||
| 895 | hr = ::StringCchPrintfW(wzWebBase, cchWebBase, L"/LM/W3SVC/%u", dwKey); | ||
| 896 | ExitOnFailure(hr, "failed to format web base with key: %u", dwKey); | ||
| 897 | |||
| 898 | LExit: | ||
| 899 | MetaFreeValue(&mr); | ||
| 900 | |||
| 901 | if (prgdwSubKeys) | ||
| 902 | { | ||
| 903 | MemFree(prgdwSubKeys); | ||
| 904 | } | ||
| 905 | |||
| 906 | return hr; | ||
| 907 | } | ||
| 908 | |||
| 909 | |||
| 910 | static HRESULT ScaWebWrite( | ||
| 911 | __in IMSAdminBase* piMetabase, | ||
| 912 | __in SCA_WEB* psw, | ||
| 913 | __in SCA_APPPOOL * psapList) | ||
| 914 | { | ||
| 915 | HRESULT hr = S_OK; | ||
| 916 | |||
| 917 | UINT ui = 0; | ||
| 918 | WCHAR wzIP[64]; | ||
| 919 | WCHAR wzBindings[1024]; | ||
| 920 | WCHAR wzSecureBindings[1024]; | ||
| 921 | WCHAR* pcchNext; // used to properly create the MULTI_SZ | ||
| 922 | DWORD cchPcchNext; | ||
| 923 | WCHAR* pcchSecureNext ; // used to properly create the MULTI_SZ | ||
| 924 | DWORD cchPcchSecureNext; | ||
| 925 | |||
| 926 | // if the web root doesn't exist create it | ||
| 927 | if (!psw->fBaseExists) | ||
| 928 | { | ||
| 929 | hr = ScaCreateWeb(piMetabase, psw->wzKey, psw->wzWebBase); | ||
| 930 | ExitOnFailure(hr, "Failed to create web"); | ||
| 931 | } | ||
| 932 | else if (psw->iAttributes & SWATTRIB_NOCONFIGUREIFEXISTS) // if we're not supposed to configure existing webs, bail | ||
| 933 | { | ||
| 934 | Assert(psw->fBaseExists); | ||
| 935 | |||
| 936 | hr = S_FALSE; | ||
| 937 | WcaLog(LOGMSG_VERBOSE, "Skipping configuration of existing web: %ls", psw->wzKey); | ||
| 938 | ExitFunction(); | ||
| 939 | } | ||
| 940 | |||
| 941 | // put the secure and non-secure bindings together as MULTI_SZs | ||
| 942 | ::ZeroMemory(wzBindings, sizeof(wzBindings)); | ||
| 943 | pcchNext = wzBindings; | ||
| 944 | cchPcchNext = countof(wzBindings); | ||
| 945 | ::ZeroMemory(wzSecureBindings, sizeof(wzSecureBindings)); | ||
| 946 | pcchSecureNext = wzSecureBindings; | ||
| 947 | cchPcchSecureNext = countof(wzSecureBindings); | ||
| 948 | |||
| 949 | // set the IP address appropriately | ||
| 950 | if (0 == lstrcmpW(psw->swaKey.wzIP, L"*")) | ||
| 951 | { | ||
| 952 | ::ZeroMemory(wzIP, sizeof(wzIP)); | ||
| 953 | } | ||
| 954 | else | ||
| 955 | { | ||
| 956 | hr = ::StringCchCopyW(wzIP, countof(wzIP), psw->swaKey.wzIP); | ||
| 957 | ExitOnFailure(hr, "Failed to copy IP string"); | ||
| 958 | } | ||
| 959 | |||
| 960 | WCHAR wzBinding[256]; | ||
| 961 | hr = ::StringCchPrintfW(wzBinding, countof(wzBinding), L"%s:%d:%s", wzIP, psw->swaKey.iPort, psw->swaKey.wzHeader); | ||
| 962 | ExitOnFailure(hr, "Failed to format IP:Port:Header binding string"); | ||
| 963 | if (psw->swaKey.fSecure) | ||
| 964 | { | ||
| 965 | hr = ::StringCchCopyW(pcchSecureNext, cchPcchSecureNext, wzBinding); | ||
| 966 | ExitOnFailure(hr, "Failed to copy binding string to securenext string"); | ||
| 967 | pcchSecureNext += lstrlenW(wzBinding) + 1; | ||
| 968 | cchPcchSecureNext -= lstrlenW(wzBinding) + 1; | ||
| 969 | } | ||
| 970 | else | ||
| 971 | { | ||
| 972 | hr = ::StringCchCopyW(pcchNext, cchPcchNext, wzBinding); | ||
| 973 | ExitOnFailure(hr, "Failed to copy binding string to next string"); | ||
| 974 | pcchNext += lstrlenW(wzBinding) + 1; | ||
| 975 | cchPcchNext -= lstrlenW(wzBinding) + 1; | ||
| 976 | } | ||
| 977 | |||
| 978 | for (ui = 0; ui < psw->cExtraAddresses; ++ui) | ||
| 979 | { | ||
| 980 | // set the IP address appropriately | ||
| 981 | if (0 == lstrcmpW(psw->swaExtraAddresses[ui].wzIP, L"*")) | ||
| 982 | { | ||
| 983 | ::ZeroMemory(wzIP, sizeof(wzIP)); | ||
| 984 | } | ||
| 985 | else | ||
| 986 | { | ||
| 987 | hr = ::StringCchCopyW(wzIP, countof(wzIP), psw->swaExtraAddresses[ui].wzIP); | ||
| 988 | ExitOnFailure(hr, "Failed to copy extra addresses IP to IP string"); | ||
| 989 | } | ||
| 990 | |||
| 991 | hr = ::StringCchPrintfW(wzBinding, countof(wzBinding), L"%s:%d:%s", wzIP, psw->swaExtraAddresses[ui].iPort, psw->swaExtraAddresses[ui].wzHeader); | ||
| 992 | ExitOnFailure(hr, "Failed to format IP:Port:Header binding string for extra address"); | ||
| 993 | if (psw->swaExtraAddresses[ui].fSecure) | ||
| 994 | { | ||
| 995 | hr = ::StringCchCopyW(pcchSecureNext, cchPcchSecureNext, wzBinding); | ||
| 996 | ExitOnFailure(hr, "Failed to copy binding string to securenext string for extra address"); | ||
| 997 | pcchSecureNext += lstrlenW(wzBinding) + 1; | ||
| 998 | cchPcchSecureNext -= lstrlenW(wzBinding) + 1; | ||
| 999 | } | ||
| 1000 | else | ||
| 1001 | { | ||
| 1002 | hr = ::StringCchCopyW(pcchNext, cchPcchNext, wzBinding); | ||
| 1003 | ExitOnFailure(hr, "Failed to copy binding string to next string for extra address"); | ||
| 1004 | pcchNext += lstrlenW(wzBinding) + 1; | ||
| 1005 | cchPcchNext -= lstrlenW(wzBinding) + 1; | ||
| 1006 | } | ||
| 1007 | } | ||
| 1008 | |||
| 1009 | // Delete the existing secure bindings metabase value, as having one while SSLCertHash and SSLStoreName aren't both set correctly can result in | ||
| 1010 | // 0x80070520 (ERROR_NO_SUCH_LOGON_SESSION) errors in some situations on IIS7. Clearing this value first and then setting it after the install has completed | ||
| 1011 | // allows the two aforementioned properties to exist in an intermediate state without errors | ||
| 1012 | hr = ScaDeleteMetabaseValue(piMetabase, psw->wzWebBase, L"", MD_SECURE_BINDINGS, MULTISZ_METADATA); | ||
| 1013 | ExitOnFailure(hr, "Failed to temporarily delete secure bindings for Web"); | ||
| 1014 | |||
| 1015 | // now write the bindings to the metabase | ||
| 1016 | hr = ScaWriteMetabaseValue(piMetabase, psw->wzWebBase, L"", MD_SERVER_BINDINGS, METADATA_NO_ATTRIBUTES, IIS_MD_UT_SERVER, MULTISZ_METADATA, wzBindings); | ||
| 1017 | ExitOnFailure(hr, "Failed to write server bindings for Web"); | ||
| 1018 | |||
| 1019 | // write the target path for the web's directory to the metabase | ||
| 1020 | hr = ScaWriteMetabaseValue(piMetabase, psw->wzWebBase, L"/Root", MD_VR_PATH, METADATA_INHERIT, IIS_MD_UT_FILE, STRING_METADATA, psw->wzDirectory); | ||
| 1021 | ExitOnFailure(hr, "Failed to write virtual root path for Web"); | ||
| 1022 | |||
| 1023 | // write the description for the web to the metabase | ||
| 1024 | hr = ScaWriteMetabaseValue(piMetabase, psw->wzWebBase, L"", MD_SERVER_COMMENT, METADATA_INHERIT, IIS_MD_UT_SERVER, STRING_METADATA, psw->wzDescription); | ||
| 1025 | ExitOnFailure(hr, "Failed to write description for Web"); | ||
| 1026 | |||
| 1027 | ui = psw->iConnectionTimeout; | ||
| 1028 | if (MSI_NULL_INTEGER != ui) | ||
| 1029 | { | ||
| 1030 | hr = ScaWriteMetabaseValue(piMetabase, psw->wzWebBase, L"", MD_CONNECTION_TIMEOUT, METADATA_NO_ATTRIBUTES, IIS_MD_UT_SERVER, DWORD_METADATA, (LPVOID)((DWORD_PTR)ui)); | ||
| 1031 | ExitOnFailure(hr, "Failed to write connection timeout for Web"); | ||
| 1032 | } | ||
| 1033 | |||
| 1034 | ui = psw->iState; | ||
| 1035 | if (MSI_NULL_INTEGER != ui) | ||
| 1036 | { | ||
| 1037 | if (2 == ui) | ||
| 1038 | { | ||
| 1039 | ui = 1; | ||
| 1040 | hr = ScaWriteMetabaseValue(piMetabase, psw->wzWebBase, L"", MD_SERVER_AUTOSTART, METADATA_INHERIT, IIS_MD_UT_SERVER, DWORD_METADATA, (LPVOID)((DWORD_PTR)ui)); | ||
| 1041 | ExitOnFailure(hr, "Failed to write auto start flag for Web"); | ||
| 1042 | ui = 2; | ||
| 1043 | } | ||
| 1044 | |||
| 1045 | if (1 == ui || 2 == ui) | ||
| 1046 | { | ||
| 1047 | ui = 1; // start command | ||
| 1048 | hr = ScaWriteMetabaseValue(piMetabase, psw->wzWebBase, L"", MD_SERVER_COMMAND, METADATA_NO_ATTRIBUTES, IIS_MD_UT_SERVER, DWORD_METADATA, (LPVOID)((DWORD_PTR)ui)); | ||
| 1049 | ExitOnFailure(hr, "Failed to start Web"); | ||
| 1050 | } | ||
| 1051 | else if (0 == ui) | ||
| 1052 | { | ||
| 1053 | ui = 2; // stop command | ||
| 1054 | hr = ScaWriteMetabaseValue(piMetabase, psw->wzWebBase, L"", MD_SERVER_COMMAND, METADATA_NO_ATTRIBUTES, IIS_MD_UT_SERVER, DWORD_METADATA, (LPVOID)((DWORD_PTR)ui)); | ||
| 1055 | ExitOnFailure(hr, "Failed to stop Web"); | ||
| 1056 | } | ||
| 1057 | else | ||
| 1058 | { | ||
| 1059 | hr = E_UNEXPECTED; | ||
| 1060 | ExitOnFailure(hr, "Unexpected value for Web State"); | ||
| 1061 | } | ||
| 1062 | } | ||
| 1063 | |||
| 1064 | WCHAR wzRootOfWeb[METADATA_MAX_NAME_LEN]; | ||
| 1065 | hr = ::StringCchPrintfW(wzRootOfWeb, countof(wzRootOfWeb), L"%s/Root", psw->wzWebBase); | ||
| 1066 | ExitOnFailure(hr, "Failed to allocate WebBase/Root string for root of web"); | ||
| 1067 | |||
| 1068 | // write the web dirproperties information | ||
| 1069 | if (psw->fHasProperties) | ||
| 1070 | { | ||
| 1071 | hr = ScaWriteWebDirProperties(piMetabase, wzRootOfWeb, &psw->swp); | ||
| 1072 | ExitOnFailure(hr, "Failed to write web security information to metabase"); | ||
| 1073 | } | ||
| 1074 | |||
| 1075 | // write the application information | ||
| 1076 | if (psw->fHasApplication) | ||
| 1077 | { | ||
| 1078 | // On reinstall, we have to uninstall the old application, otherwise a duplicate will be created | ||
| 1079 | if (WcaIsReInstalling(psw->isInstalled, psw->isAction)) | ||
| 1080 | { | ||
| 1081 | hr = ScaDeleteApp(piMetabase, wzRootOfWeb); | ||
| 1082 | ExitOnFailure(hr, "Failed to remove application for WebDir as part of a reinstall"); | ||
| 1083 | } | ||
| 1084 | |||
| 1085 | hr = ScaWriteWebApplication(piMetabase, wzRootOfWeb, &psw->swapp, psapList); | ||
| 1086 | ExitOnFailure(hr, "Failed to write web application information to metabase"); | ||
| 1087 | } | ||
| 1088 | |||
| 1089 | // write the SSL certificate information | ||
| 1090 | if (psw->pswscList) | ||
| 1091 | { | ||
| 1092 | hr = ScaSslCertificateWriteMetabase(piMetabase, psw->wzWebBase, psw->pswscList); | ||
| 1093 | ExitOnFailure(hr, "Failed to write SSL certificates for Web site: %ls", psw->wzKey); | ||
| 1094 | } | ||
| 1095 | |||
| 1096 | hr = ScaWriteMetabaseValue(piMetabase, psw->wzWebBase, L"", MD_SECURE_BINDINGS, METADATA_NO_ATTRIBUTES, IIS_MD_UT_SERVER, MULTISZ_METADATA, wzSecureBindings); | ||
| 1097 | ExitOnFailure(hr, "Failed to write secure bindings for Web"); | ||
| 1098 | |||
| 1099 | // write the headers | ||
| 1100 | if (psw->pshhList) | ||
| 1101 | { | ||
| 1102 | hr = ScaWriteHttpHeader(piMetabase, wzRootOfWeb, psw->pshhList); | ||
| 1103 | ExitOnFailure(hr, "Failed to write custom HTTP headers for Web site: %ls", psw->wzKey); | ||
| 1104 | } | ||
| 1105 | |||
| 1106 | // write the errors | ||
| 1107 | if (psw->psweList) | ||
| 1108 | { | ||
| 1109 | hr = ScaWriteWebError(piMetabase, weptWeb, psw->wzWebBase, psw->psweList); | ||
| 1110 | ExitOnFailure(hr, "Failed to write custom web errors for Web site: %ls", psw->wzKey); | ||
| 1111 | } | ||
| 1112 | |||
| 1113 | // write the mimetypes | ||
| 1114 | if (psw->psmm) | ||
| 1115 | { | ||
| 1116 | hr = ScaWriteMimeMap(piMetabase, wzRootOfWeb, psw->psmm); | ||
| 1117 | ExitOnFailure(hr, "Failed to write mimemap for Web site: %ls", psw->wzKey); | ||
| 1118 | } | ||
| 1119 | |||
| 1120 | // write the log information to the metabase | ||
| 1121 | if (psw->fHasLog) | ||
| 1122 | { | ||
| 1123 | hr = ScaWriteWebLog(piMetabase, psw->wzWebBase, &psw->swl); | ||
| 1124 | ExitOnFailure(hr, "Failed to write web log information to metabase"); | ||
| 1125 | } | ||
| 1126 | |||
| 1127 | LExit: | ||
| 1128 | return hr; | ||
| 1129 | } | ||
| 1130 | |||
| 1131 | |||
| 1132 | static HRESULT ScaWebRemove( | ||
| 1133 | __in IMSAdminBase* piMetabase, | ||
| 1134 | __in const SCA_WEB* psw | ||
| 1135 | ) | ||
| 1136 | { | ||
| 1137 | HRESULT hr = S_OK; | ||
| 1138 | |||
| 1139 | // simply remove the root key and everything else is pulled at the same time | ||
| 1140 | hr = ScaDeleteMetabaseKey(piMetabase, psw->wzWebBase, L""); | ||
| 1141 | ExitOnFailure(hr, "Failed to remove web '%ls' from metabase", psw->wzKey); | ||
| 1142 | |||
| 1143 | LExit: | ||
| 1144 | return hr; | ||
| 1145 | } | ||
| 1146 | |||
| 1147 | |||
| 1148 | static DWORD SiteIdFromDescription( | ||
| 1149 | __in_z LPCWSTR wzDescription | ||
| 1150 | ) | ||
| 1151 | { | ||
| 1152 | LPCWSTR pwz = wzDescription; | ||
| 1153 | DWORD dwSiteId = 0; | ||
| 1154 | while (pwz && *pwz) | ||
| 1155 | { | ||
| 1156 | WCHAR ch = *pwz & 0xdf; | ||
| 1157 | dwSiteId = (dwSiteId * 101) + ch; | ||
| 1158 | ++pwz; | ||
| 1159 | } | ||
| 1160 | |||
| 1161 | return (dwSiteId % INT_MAX) + 1; | ||
| 1162 | } | ||
| 1163 | |||
| 1164 | |||
| 1165 | // insertion sort | ||
| 1166 | static void Sort( | ||
| 1167 | __in_ecount(cArray) DWORD dwArray[], | ||
| 1168 | __in int cArray | ||
| 1169 | ) | ||
| 1170 | { | ||
| 1171 | int i, j; | ||
| 1172 | DWORD dwData; | ||
| 1173 | |||
| 1174 | for (i = 1; i < cArray; ++i) | ||
| 1175 | { | ||
| 1176 | dwData = dwArray[i]; | ||
| 1177 | |||
| 1178 | j = i - 1; | ||
| 1179 | while (0 <= j && dwArray[j] > dwData) | ||
| 1180 | { | ||
| 1181 | dwArray[j + 1] = dwArray[j]; | ||
| 1182 | j--; | ||
| 1183 | } | ||
| 1184 | |||
| 1185 | dwArray[j + 1] = dwData; | ||
| 1186 | } | ||
| 1187 | } | ||
