diff options
Diffstat (limited to 'src/ext/Iis/ca/scawebprop.cpp')
| -rw-r--r-- | src/ext/Iis/ca/scawebprop.cpp | 301 |
1 files changed, 301 insertions, 0 deletions
diff --git a/src/ext/Iis/ca/scawebprop.cpp b/src/ext/Iis/ca/scawebprop.cpp new file mode 100644 index 00000000..b5e38467 --- /dev/null +++ b/src/ext/Iis/ca/scawebprop.cpp | |||
| @@ -0,0 +1,301 @@ | |||
| 1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
| 2 | |||
| 3 | #include "precomp.h" | ||
| 4 | |||
| 5 | // sql queries | ||
| 6 | enum eWebDirPropertiesQuery { wpqProperties = 1, wpqAccess, wpqAuthorization, wpqUser, wpqControlledPassword, wpqLogVisits, wpqIndex, wpqDefaultDoc, wpqAspDetailedError, wpqHttpExp, wpqCCMaxAge, wpqCCCustom, wpqNoCustomError, wpqAccessSSLFlags, wpqAuthenticationProviders }; | ||
| 7 | |||
| 8 | HRESULT ScaGetWebDirProperties( | ||
| 9 | __in LPCWSTR wzProperties, | ||
| 10 | __in WCA_WRAPQUERY_HANDLE hUserQuery, | ||
| 11 | __in WCA_WRAPQUERY_HANDLE hWebDirPropQuery, | ||
| 12 | __inout SCA_WEB_PROPERTIES* pswp | ||
| 13 | ) | ||
| 14 | { | ||
| 15 | Assert(*wzProperties && pswp); | ||
| 16 | |||
| 17 | HRESULT hr = S_OK; | ||
| 18 | MSIHANDLE hRec; | ||
| 19 | LPWSTR pwzData = NULL; | ||
| 20 | |||
| 21 | ExitOnNull(wzProperties, hr, E_INVALIDARG, "Failed to get web directory properties because no properties were provided to get"); | ||
| 22 | |||
| 23 | WcaFetchWrappedReset(hWebDirPropQuery); | ||
| 24 | |||
| 25 | hr = WcaFetchWrappedRecordWhereString(hWebDirPropQuery, 1, wzProperties, &hRec); | ||
| 26 | if (S_OK == hr) | ||
| 27 | { | ||
| 28 | hr = WcaGetRecordString(hRec, wpqProperties, &pwzData); | ||
| 29 | ExitOnFailure(hr, "Failed to get IIsWebDirProperties.DirProperties"); | ||
| 30 | hr = ::StringCchCopyW(pswp->wzKey, countof(pswp->wzKey), pwzData); | ||
| 31 | ExitOnFailure(hr, "Failed to copy key string to webdirproperties object"); | ||
| 32 | |||
| 33 | Assert(0 == lstrcmpW(pswp->wzKey, wzProperties)); | ||
| 34 | |||
| 35 | hr = WcaGetRecordInteger(hRec, wpqAccess, &pswp->iAccess); | ||
| 36 | ExitOnFailure(hr, "Failed to get access value"); | ||
| 37 | |||
| 38 | hr = WcaGetRecordInteger(hRec, wpqAuthorization, &pswp->iAuthorization); | ||
| 39 | ExitOnFailure(hr, "Failed to get authorization value"); | ||
| 40 | |||
| 41 | // if allow anonymous users | ||
| 42 | if (S_OK == hr && pswp->iAuthorization & 1) | ||
| 43 | { | ||
| 44 | // if there is an anonymous user specified | ||
| 45 | hr = WcaGetRecordString(hRec, wpqUser, &pwzData); | ||
| 46 | ExitOnFailure(hr, "Failed to get AnonymousUser_"); | ||
| 47 | if (pwzData && *pwzData) | ||
| 48 | { | ||
| 49 | hr = WcaGetRecordInteger(hRec, wpqControlledPassword, &pswp->fIIsControlledPassword); | ||
| 50 | ExitOnFailure(hr, "Failed to get IIsControlledPassword"); | ||
| 51 | if (S_FALSE == hr) | ||
| 52 | { | ||
| 53 | pswp->fIIsControlledPassword = FALSE; | ||
| 54 | hr = S_OK; | ||
| 55 | } | ||
| 56 | |||
| 57 | hr = ScaGetUserDeferred(pwzData, hUserQuery, &pswp->scau); | ||
| 58 | ExitOnFailure(hr, "Failed to get User information for Web"); | ||
| 59 | |||
| 60 | pswp->fHasUser = TRUE; | ||
| 61 | } | ||
| 62 | else | ||
| 63 | pswp->fHasUser = FALSE; | ||
| 64 | } | ||
| 65 | |||
| 66 | hr = WcaGetRecordInteger(hRec, wpqLogVisits, &pswp->fLogVisits); | ||
| 67 | ExitOnFailure(hr, "Failed to get IIsWebDirProperties.LogVisits"); | ||
| 68 | |||
| 69 | hr = WcaGetRecordInteger(hRec, wpqIndex, &pswp->fIndex); | ||
| 70 | ExitOnFailure(hr, "Failed to get IIsWebDirProperties.Index"); | ||
| 71 | |||
| 72 | hr = WcaGetRecordString(hRec, wpqDefaultDoc, &pwzData); | ||
| 73 | ExitOnFailure(hr, "Failed to get IIsWebDirProperties.DefaultDoc"); | ||
| 74 | if (pwzData && *pwzData) | ||
| 75 | { | ||
| 76 | pswp->fHasDefaultDoc = TRUE; | ||
| 77 | if (0 == lstrcmpW(L"-", pwzData)) // remove any existing default documents by setting them blank | ||
| 78 | { | ||
| 79 | pswp->wzDefaultDoc[0] = L'\0'; | ||
| 80 | } | ||
| 81 | else // set the default documents | ||
| 82 | { | ||
| 83 | hr = ::StringCchCopyW(pswp->wzDefaultDoc, countof(pswp->wzDefaultDoc), pwzData); | ||
| 84 | ExitOnFailure(hr, "Failed to copy default document string to webdirproperties object"); | ||
| 85 | } | ||
| 86 | } | ||
| 87 | else | ||
| 88 | { | ||
| 89 | pswp->fHasDefaultDoc = FALSE; | ||
| 90 | } | ||
| 91 | |||
| 92 | hr = WcaGetRecordInteger(hRec, wpqAspDetailedError, &pswp->fAspDetailedError); | ||
| 93 | ExitOnFailure(hr, "Failed to get IIsWebDirProperties.AspDetailedError"); | ||
| 94 | |||
| 95 | hr = WcaGetRecordString(hRec, wpqHttpExp, &pwzData); | ||
| 96 | ExitOnFailure(hr, "Failed to get IIsWebDirProperties.HttpExp"); | ||
| 97 | if (pwzData && *pwzData) | ||
| 98 | { | ||
| 99 | pswp->fHasHttpExp = TRUE; | ||
| 100 | if (0 == lstrcmpW(L"-", pwzData)) // remove any existing default expiration settings by setting them blank | ||
| 101 | { | ||
| 102 | pswp->wzHttpExp[0] = L'\0'; | ||
| 103 | } | ||
| 104 | else // set the expiration setting | ||
| 105 | { | ||
| 106 | hr = ::StringCchCopyW(pswp->wzHttpExp, countof(pswp->wzHttpExp), pwzData); | ||
| 107 | ExitOnFailure(hr, "Failed to copy http expiration string to webdirproperties object"); | ||
| 108 | } | ||
| 109 | } | ||
| 110 | else | ||
| 111 | { | ||
| 112 | pswp->fHasHttpExp = FALSE; | ||
| 113 | } | ||
| 114 | |||
| 115 | hr = WcaGetRecordInteger(hRec, wpqCCMaxAge, &pswp->iCacheControlMaxAge); | ||
| 116 | ExitOnFailure(hr, "failed to get IIsWebDirProperties.CacheControlMaxAge"); | ||
| 117 | |||
| 118 | hr = WcaGetRecordString(hRec, wpqCCCustom, &pwzData); | ||
| 119 | ExitOnFailure(hr, "Failed to get IIsWebDirProperties.CacheControlCustom"); | ||
| 120 | if (pwzData && *pwzData) | ||
| 121 | { | ||
| 122 | pswp->fHasCacheControlCustom = TRUE; | ||
| 123 | if (0 == lstrcmpW(L"-", pwzData)) // remove any existing default cache control custom settings by setting them blank | ||
| 124 | { | ||
| 125 | pswp->wzCacheControlCustom[0] = L'\0'; | ||
| 126 | } | ||
| 127 | else // set the custom cache control setting | ||
| 128 | { | ||
| 129 | hr = ::StringCchCopyW(pswp->wzCacheControlCustom, countof(pswp->wzCacheControlCustom), pwzData); | ||
| 130 | ExitOnFailure(hr, "Failed to copy cache control custom settings to webdirproperites object"); | ||
| 131 | } | ||
| 132 | } | ||
| 133 | else | ||
| 134 | { | ||
| 135 | pswp->fHasCacheControlCustom = FALSE; | ||
| 136 | } | ||
| 137 | |||
| 138 | hr = WcaGetRecordInteger(hRec, wpqNoCustomError, &pswp->fNoCustomError); | ||
| 139 | ExitOnFailure(hr, "failed to get IIsWebDirProperties.NoCustomError"); | ||
| 140 | if (MSI_NULL_INTEGER == pswp->fNoCustomError) | ||
| 141 | pswp->fNoCustomError = FALSE; | ||
| 142 | |||
| 143 | hr = WcaGetRecordInteger(hRec, wpqAccessSSLFlags, &pswp->iAccessSSLFlags); | ||
| 144 | ExitOnFailure(hr, "failed to get IIsWebDirProperties.AccessSSLFlags"); | ||
| 145 | |||
| 146 | hr = WcaGetRecordString(hRec, wpqAuthenticationProviders, &pwzData); | ||
| 147 | ExitOnFailure(hr, "Failed to get IIsWebDirProperties.AuthenticationProviders"); | ||
| 148 | if (pwzData && *pwzData) | ||
| 149 | { | ||
| 150 | hr = ::StringCchCopyW(pswp->wzAuthenticationProviders, countof(pswp->wzAuthenticationProviders), pwzData); | ||
| 151 | ExitOnFailure(hr, "Failed to copy authentication providers string to webdirproperties object"); | ||
| 152 | } | ||
| 153 | else | ||
| 154 | { | ||
| 155 | pswp->wzAuthenticationProviders[0] = L'\0'; | ||
| 156 | } | ||
| 157 | } | ||
| 158 | else if (E_NOMOREITEMS == hr) | ||
| 159 | { | ||
| 160 | WcaLog(LOGMSG_STANDARD, "Error: Cannot locate IIsWebDirProperties.DirProperties='%ls'", wzProperties); | ||
| 161 | hr = E_FAIL; | ||
| 162 | } | ||
| 163 | else | ||
| 164 | { | ||
| 165 | ExitOnFailure(hr, "Error getting appropriate webdirproperty"); | ||
| 166 | } | ||
| 167 | |||
| 168 | // Let's check that there isn't more than one record found - if there is, throw an assert like WcaFetchSingleRecord() would | ||
| 169 | HRESULT hrTemp = WcaFetchWrappedRecordWhereString(hWebDirPropQuery, 1, wzProperties, &hRec); | ||
| 170 | if (SUCCEEDED(hrTemp)) | ||
| 171 | { | ||
| 172 | AssertSz(E_NOMOREITEMS == hrTemp, "ScaGetWebDirProperties found more than one record"); | ||
| 173 | } | ||
| 174 | |||
| 175 | LExit: | ||
| 176 | ReleaseStr(pwzData); | ||
| 177 | |||
| 178 | return hr; | ||
| 179 | } | ||
| 180 | |||
| 181 | |||
| 182 | HRESULT ScaWriteWebDirProperties( | ||
| 183 | __in IMSAdminBase* piMetabase, | ||
| 184 | __in LPCWSTR wzRootOfWeb, | ||
| 185 | __inout SCA_WEB_PROPERTIES* pswp | ||
| 186 | ) | ||
| 187 | { | ||
| 188 | HRESULT hr = S_OK; | ||
| 189 | DWORD dw = 0; | ||
| 190 | WCHAR wz[METADATA_MAX_NAME_LEN + 1]; | ||
| 191 | |||
| 192 | // write the access permissions to the metabase | ||
| 193 | if (MSI_NULL_INTEGER != pswp->iAccess) | ||
| 194 | { | ||
| 195 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_ACCESS_PERM, METADATA_INHERIT, IIS_MD_UT_FILE, DWORD_METADATA, (LPVOID)((DWORD_PTR)pswp->iAccess)); | ||
| 196 | ExitOnFailure(hr, "Failed to write access permissions for Web"); | ||
| 197 | } | ||
| 198 | |||
| 199 | if (MSI_NULL_INTEGER != pswp->iAuthorization) | ||
| 200 | { | ||
| 201 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_AUTHORIZATION, METADATA_INHERIT, IIS_MD_UT_FILE, DWORD_METADATA, (LPVOID)((DWORD_PTR)pswp->iAuthorization)); | ||
| 202 | ExitOnFailure(hr, "Failed to write authorization for Web"); | ||
| 203 | } | ||
| 204 | |||
| 205 | if (pswp->fHasUser) | ||
| 206 | { | ||
| 207 | Assert(pswp->scau.wzName); | ||
| 208 | // write the user name | ||
| 209 | if (*pswp->scau.wzDomain) | ||
| 210 | { | ||
| 211 | hr = ::StringCchPrintfW(wz, countof(wz), L"%s\\%s", pswp->scau.wzDomain, pswp->scau.wzName); | ||
| 212 | ExitOnFailure(hr, "Failed to format domain\\username string"); | ||
| 213 | } | ||
| 214 | else | ||
| 215 | { | ||
| 216 | hr = ::StringCchCopyW(wz, countof(wz), pswp->scau.wzName); | ||
| 217 | ExitOnFailure(hr, "Failed to copy user name"); | ||
| 218 | } | ||
| 219 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_ANONYMOUS_USER_NAME, METADATA_INHERIT, IIS_MD_UT_FILE, STRING_METADATA, (LPVOID)wz); | ||
| 220 | ExitOnFailure(hr, "Failed to write anonymous user name for Web"); | ||
| 221 | |||
| 222 | // write the password | ||
| 223 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_ANONYMOUS_PWD, METADATA_INHERIT | METADATA_SECURE, IIS_MD_UT_FILE, STRING_METADATA, (LPVOID)pswp->scau.wzPassword); | ||
| 224 | ExitOnFailure(hr, "Failed to write anonymous user password for Web"); | ||
| 225 | |||
| 226 | // store whether IIs controls password | ||
| 227 | dw = (pswp->fIIsControlledPassword) ? TRUE : FALSE; | ||
| 228 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_ANONYMOUS_USE_SUBAUTH, METADATA_INHERIT, IIS_MD_UT_FILE, DWORD_METADATA, (LPVOID)((DWORD_PTR)dw)); | ||
| 229 | ExitOnFailure(hr, "Failed to write if IIs controls user password for Web"); | ||
| 230 | } | ||
| 231 | |||
| 232 | if (MSI_NULL_INTEGER != pswp->fLogVisits) | ||
| 233 | { | ||
| 234 | // The sense of this boolean value is reversed - it is "don't log", not "log visits." | ||
| 235 | dw = (pswp->fLogVisits) ? FALSE : TRUE; | ||
| 236 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_DONT_LOG, METADATA_INHERIT, IIS_MD_UT_FILE, DWORD_METADATA, (LPVOID)((DWORD_PTR)dw)); | ||
| 237 | ExitOnFailure(hr, "Failed to write authorization for Web"); | ||
| 238 | } | ||
| 239 | |||
| 240 | if (MSI_NULL_INTEGER != pswp->fIndex) | ||
| 241 | { | ||
| 242 | dw = (pswp->fIndex) ? TRUE : FALSE; | ||
| 243 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_IS_CONTENT_INDEXED, METADATA_INHERIT, IIS_MD_UT_FILE, DWORD_METADATA, (LPVOID)((DWORD_PTR)dw)); | ||
| 244 | ExitOnFailure(hr, "Failed to write authorization for Web"); | ||
| 245 | } | ||
| 246 | |||
| 247 | if (pswp->fHasDefaultDoc) | ||
| 248 | { | ||
| 249 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_DEFAULT_LOAD_FILE, METADATA_INHERIT, IIS_MD_UT_FILE, STRING_METADATA, (LPVOID)pswp->wzDefaultDoc); | ||
| 250 | ExitOnFailure(hr, "Failed to write default documents for Web"); | ||
| 251 | } | ||
| 252 | |||
| 253 | if (MSI_NULL_INTEGER != pswp->fAspDetailedError) | ||
| 254 | { | ||
| 255 | dw = (pswp->fAspDetailedError) ? TRUE : FALSE; | ||
| 256 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_ASP_SCRIPTERRORSSENTTOBROWSER, METADATA_INHERIT, ASP_MD_UT_APP, DWORD_METADATA, (LPVOID)((DWORD_PTR)dw)); | ||
| 257 | ExitOnFailure(hr, "Failed to write ASP script error for Web"); | ||
| 258 | } | ||
| 259 | |||
| 260 | if (pswp->fHasHttpExp) | ||
| 261 | { | ||
| 262 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_HTTP_EXPIRES, METADATA_INHERIT, IIS_MD_UT_FILE, STRING_METADATA, (LPVOID)pswp->wzHttpExp); | ||
| 263 | ExitOnFailure(hr, "Failed to write HTTP Expiration for Web"); | ||
| 264 | } | ||
| 265 | |||
| 266 | if (MSI_NULL_INTEGER != pswp->iCacheControlMaxAge) | ||
| 267 | { | ||
| 268 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_CC_MAX_AGE, METADATA_INHERIT, IIS_MD_UT_FILE, DWORD_METADATA, (LPVOID)((DWORD_PTR)pswp->iCacheControlMaxAge)); | ||
| 269 | ExitOnFailure(hr, "Failed to write Cache Control Max Age for Web"); | ||
| 270 | } | ||
| 271 | |||
| 272 | if (pswp->fHasCacheControlCustom) | ||
| 273 | { | ||
| 274 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_CC_OTHER, METADATA_INHERIT, IIS_MD_UT_FILE, STRING_METADATA, (LPVOID)pswp->wzCacheControlCustom); | ||
| 275 | ExitOnFailure(hr, "Failed to write Cache Control Custom for Web"); | ||
| 276 | } | ||
| 277 | |||
| 278 | if (pswp->fNoCustomError) | ||
| 279 | { | ||
| 280 | memset(wz, 0, sizeof(wz)); | ||
| 281 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_CUSTOM_ERROR, METADATA_INHERIT, IIS_MD_UT_FILE, MULTISZ_METADATA, wz); | ||
| 282 | ExitOnFailure(hr, "Failed to write Custom Error for Web"); | ||
| 283 | } | ||
| 284 | |||
| 285 | if (MSI_NULL_INTEGER != pswp->iAccessSSLFlags) | ||
| 286 | { | ||
| 287 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_SSL_ACCESS_PERM, METADATA_INHERIT, IIS_MD_UT_FILE, DWORD_METADATA, (LPVOID)((DWORD_PTR)pswp->iAccessSSLFlags)); | ||
| 288 | ExitOnFailure(hr, "Failed to write AccessSSLFlags for Web"); | ||
| 289 | } | ||
| 290 | |||
| 291 | if (*pswp->wzAuthenticationProviders) | ||
| 292 | { | ||
| 293 | hr = ::StringCchCopyW(wz, countof(wz), pswp->wzAuthenticationProviders); | ||
| 294 | ExitOnFailure(hr, "Failed to copy authentication providers string"); | ||
| 295 | hr = ScaWriteMetabaseValue(piMetabase, wzRootOfWeb, NULL, MD_NTAUTHENTICATION_PROVIDERS, METADATA_INHERIT, IIS_MD_UT_FILE, STRING_METADATA, (LPVOID)wz); | ||
| 296 | ExitOnFailure(hr, "Failed to write AuthenticationProviders for Web"); | ||
| 297 | } | ||
| 298 | |||
| 299 | LExit: | ||
| 300 | return hr; | ||
| 301 | } | ||
