diff options
Diffstat (limited to 'src/ext/Util/ca')
39 files changed, 11827 insertions, 0 deletions
diff --git a/src/ext/Util/ca/BroadcastSettingChange.cpp b/src/ext/Util/ca/BroadcastSettingChange.cpp new file mode 100644 index 00000000..2e153ad3 --- /dev/null +++ b/src/ext/Util/ca/BroadcastSettingChange.cpp | |||
@@ -0,0 +1,45 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | |||
6 | /******************************************************************** | ||
7 | WixBroadcastSettingChange | ||
8 | |||
9 | Send WM_SETTINGCHANGE message to all top-level windows indicating | ||
10 | that unspecified settings have changed. | ||
11 | ********************************************************************/ | ||
12 | extern "C" UINT __stdcall WixBroadcastSettingChange( | ||
13 | __in MSIHANDLE hInstall | ||
14 | ) | ||
15 | { | ||
16 | HRESULT hr = WcaInitialize(hInstall, "WixBroadcastSettingChange"); | ||
17 | ExitOnFailure(hr, "failed to initialize WixBroadcastSettingChange"); | ||
18 | |||
19 | // best effort; ignore failures | ||
20 | ::SendMessageTimeoutW(HWND_BROADCAST, WM_SETTINGCHANGE, NULL, NULL, SMTO_ABORTIFHUNG, 1000, NULL); | ||
21 | |||
22 | LExit: | ||
23 | return WcaFinalize(ERROR_SUCCESS); | ||
24 | } | ||
25 | |||
26 | |||
27 | /******************************************************************** | ||
28 | WixBroadcastEnvironmentChange | ||
29 | |||
30 | Send WM_SETTINGCHANGE message to all top-level windows indicating | ||
31 | that environment variables have changed. | ||
32 | ********************************************************************/ | ||
33 | extern "C" UINT __stdcall WixBroadcastEnvironmentChange( | ||
34 | __in MSIHANDLE hInstall | ||
35 | ) | ||
36 | { | ||
37 | HRESULT hr = WcaInitialize(hInstall, "WixBroadcastEnvironmentChange"); | ||
38 | ExitOnFailure(hr, "failed to initialize WixBroadcastEnvironmentChange"); | ||
39 | |||
40 | // best effort; ignore failures | ||
41 | ::SendMessageTimeoutW(HWND_BROADCAST, WM_SETTINGCHANGE, NULL, reinterpret_cast<LPARAM>(L"Environment"), SMTO_ABORTIFHUNG, 1000, NULL); | ||
42 | |||
43 | LExit: | ||
44 | return WcaFinalize(ERROR_SUCCESS); | ||
45 | } | ||
diff --git a/src/ext/Util/ca/CheckReboot.cpp b/src/ext/Util/ca/CheckReboot.cpp new file mode 100644 index 00000000..ce056411 --- /dev/null +++ b/src/ext/Util/ca/CheckReboot.cpp | |||
@@ -0,0 +1,36 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | |||
6 | /******************************************************************** | ||
7 | WixCheckRebootRequired - entry point for WixCheckRebootRequired Custom Action | ||
8 | |||
9 | called as Type 1 CustomAction (binary DLL) from Windows Installer | ||
10 | in InstallExecuteSequence after InstallFinalize | ||
11 | ********************************************************************/ | ||
12 | extern "C" UINT __stdcall WixCheckRebootRequired( | ||
13 | __in MSIHANDLE hInstall | ||
14 | ) | ||
15 | { | ||
16 | HRESULT hr = S_OK; | ||
17 | DWORD er = ERROR_SUCCESS; | ||
18 | |||
19 | hr = WcaInitialize(hInstall, "WixCheckRebootRequired"); | ||
20 | ExitOnFailure(hr, "failed to initialize"); | ||
21 | |||
22 | if (WcaDidDeferredActionRequireReboot()) | ||
23 | { | ||
24 | WcaLog(LOGMSG_STANDARD, "Reboot required by deferred CustomAction."); | ||
25 | |||
26 | er = ::MsiSetMode(hInstall, MSIRUNMODE_REBOOTATEND, TRUE); | ||
27 | hr = HRESULT_FROM_WIN32(er); | ||
28 | ExitOnFailure(hr, "Failed to schedule reboot."); | ||
29 | } | ||
30 | |||
31 | LExit: | ||
32 | |||
33 | if (FAILED(hr)) | ||
34 | er = ERROR_INSTALL_FAILURE; | ||
35 | return WcaFinalize(er); | ||
36 | } | ||
diff --git a/src/ext/Util/ca/CloseApps.cpp b/src/ext/Util/ca/CloseApps.cpp new file mode 100644 index 00000000..d4256c43 --- /dev/null +++ b/src/ext/Util/ca/CloseApps.cpp | |||
@@ -0,0 +1,568 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | #define DEFAULT_PROCESS_EXIT_WAIT_TIME 5000 | ||
6 | |||
7 | // structs | ||
8 | LPCWSTR wzQUERY_CLOSEAPPS = L"SELECT `Wix4CloseApplication`, `Target`, `Description`, `Condition`, `Attributes`, `Property`, `TerminateExitCode`, `Timeout` FROM `Wix4CloseApplication` ORDER BY `Sequence`"; | ||
9 | enum eQUERY_CLOSEAPPS { QCA_ID = 1, QCA_TARGET, QCA_DESCRIPTION, QCA_CONDITION, QCA_ATTRIBUTES, QCA_PROPERTY, QCA_TERMINATEEXITCODE, QCA_TIMEOUT }; | ||
10 | |||
11 | // CloseApplication.Attributes | ||
12 | enum CLOSEAPP_ATTRIBUTES | ||
13 | { | ||
14 | CLOSEAPP_ATTRIBUTE_NONE = 0x0, | ||
15 | CLOSEAPP_ATTRIBUTE_CLOSEMESSAGE = 0x1, | ||
16 | CLOSEAPP_ATTRIBUTE_REBOOTPROMPT = 0x2, | ||
17 | CLOSEAPP_ATTRIBUTE_ELEVATEDCLOSEMESSAGE = 0x4, | ||
18 | CLOSEAPP_ATTRIBUTE_ENDSESSIONMESSAGE = 0x8, | ||
19 | CLOSEAPP_ATTRIBUTE_ELEVATEDENDSESSIONMESSAGE = 0x10, | ||
20 | CLOSEAPP_ATTRIBUTE_TERMINATEPROCESS = 0x20, | ||
21 | CLOSEAPP_ATTRIBUTE_PROMPTTOCONTINUE = 0x40, | ||
22 | }; | ||
23 | |||
24 | struct PROCESS_AND_MESSAGE | ||
25 | { | ||
26 | DWORD dwProcessId; | ||
27 | DWORD dwMessageId; | ||
28 | DWORD dwTimeout; | ||
29 | }; | ||
30 | |||
31 | |||
32 | /****************************************************************** | ||
33 | EnumWindowsProc - callback function which sends message if the | ||
34 | current window matches the passed in process ID | ||
35 | |||
36 | ******************************************************************/ | ||
37 | BOOL CALLBACK EnumWindowsProc(HWND hwnd, LPARAM lParam) | ||
38 | { | ||
39 | PROCESS_AND_MESSAGE* pPM = reinterpret_cast<PROCESS_AND_MESSAGE*>(lParam); | ||
40 | DWORD dwProcessId = 0; | ||
41 | DWORD_PTR dwResult = 0; | ||
42 | BOOL fQueryEndSession = WM_QUERYENDSESSION == pPM->dwMessageId; | ||
43 | BOOL fContinueWindowsInProcess = TRUE; // assume we will send message to all top-level windows in a process. | ||
44 | |||
45 | ::GetWindowThreadProcessId(hwnd, &dwProcessId); | ||
46 | |||
47 | // check if the process Id is the one we're looking for | ||
48 | if (dwProcessId != pPM->dwProcessId) | ||
49 | { | ||
50 | return TRUE; | ||
51 | } | ||
52 | |||
53 | WcaLog(LOGMSG_VERBOSE, "Sending message to process id 0x%x", dwProcessId); | ||
54 | |||
55 | if (::SendMessageTimeoutW(hwnd, pPM->dwMessageId, 0, fQueryEndSession ? ENDSESSION_CLOSEAPP : 0, SMTO_BLOCK, pPM->dwTimeout, &dwResult)) | ||
56 | { | ||
57 | WcaLog(LOGMSG_VERBOSE, "Result 0x%x", dwResult); | ||
58 | |||
59 | if (fQueryEndSession) | ||
60 | { | ||
61 | // If application said it was okay to close, do that. | ||
62 | if (dwResult) | ||
63 | { | ||
64 | ::SendMessageTimeoutW(hwnd, WM_ENDSESSION, TRUE, ENDSESSION_CLOSEAPP, SMTO_BLOCK, pPM->dwTimeout, &dwResult); | ||
65 | } | ||
66 | else // application said don't try to close it, so don't bother sending messages to any other top-level windows. | ||
67 | { | ||
68 | fContinueWindowsInProcess = FALSE; | ||
69 | } | ||
70 | } | ||
71 | } | ||
72 | else // log result message. | ||
73 | { | ||
74 | WcaLog(LOGMSG_VERBOSE, "Failed to send message id: %u, error: 0x%x", pPM->dwMessageId, ::GetLastError()); | ||
75 | } | ||
76 | |||
77 | // so we know we succeeded | ||
78 | ::SetLastError(ERROR_SUCCESS); | ||
79 | |||
80 | return fContinueWindowsInProcess; | ||
81 | } | ||
82 | |||
83 | /****************************************************************** | ||
84 | PromptToContinue - displays the prompt if the application is still | ||
85 | running. | ||
86 | |||
87 | ******************************************************************/ | ||
88 | static HRESULT PromptToContinue( | ||
89 | __in_z LPCWSTR wzApplication, | ||
90 | __in_z LPCWSTR wzPrompt | ||
91 | ) | ||
92 | { | ||
93 | HRESULT hr = S_OK; | ||
94 | UINT er = ERROR_SUCCESS; | ||
95 | PMSIHANDLE hRecMessage = NULL; | ||
96 | DWORD *prgProcessIds = NULL; | ||
97 | DWORD cProcessIds = 0; | ||
98 | |||
99 | hRecMessage = ::MsiCreateRecord(1); | ||
100 | ExitOnNull(hRecMessage, hr, E_OUTOFMEMORY, "Failed to create record for prompt."); | ||
101 | |||
102 | er = ::MsiRecordSetStringW(hRecMessage, 0, wzPrompt); | ||
103 | ExitOnWin32Error(er, hr, "Failed to set prompt record field string"); | ||
104 | |||
105 | do | ||
106 | { | ||
107 | hr = ProcFindAllIdsFromExeName(wzApplication, &prgProcessIds, &cProcessIds); | ||
108 | if (SUCCEEDED(hr) && 0 < cProcessIds) | ||
109 | { | ||
110 | er = WcaProcessMessage(static_cast<INSTALLMESSAGE>(INSTALLMESSAGE_WARNING | MB_ABORTRETRYIGNORE | MB_DEFBUTTON3 | MB_ICONWARNING), hRecMessage); | ||
111 | if (IDABORT == er) | ||
112 | { | ||
113 | hr = HRESULT_FROM_WIN32(ERROR_INSTALL_USEREXIT); | ||
114 | } | ||
115 | else if (IDRETRY == er) | ||
116 | { | ||
117 | hr = S_FALSE; | ||
118 | } | ||
119 | else if (IDIGNORE == er) | ||
120 | { | ||
121 | hr = S_OK; | ||
122 | } | ||
123 | else | ||
124 | { | ||
125 | ExitOnWin32Error(er, hr, "Unexpected return value from prompt to continue."); | ||
126 | } | ||
127 | } | ||
128 | |||
129 | ReleaseNullMem(prgProcessIds); | ||
130 | cProcessIds = 0; | ||
131 | } while (S_FALSE == hr); | ||
132 | |||
133 | LExit: | ||
134 | ReleaseMem(prgProcessIds); | ||
135 | return hr; | ||
136 | } | ||
137 | |||
138 | /****************************************************************** | ||
139 | SendProcessMessage - helper function to enumerate the top-level | ||
140 | windows and send to all matching a process ID. | ||
141 | |||
142 | ******************************************************************/ | ||
143 | void SendProcessMessage( | ||
144 | __in DWORD dwProcessId, | ||
145 | __in DWORD dwMessageId, | ||
146 | __in DWORD dwTimeout | ||
147 | ) | ||
148 | { | ||
149 | WcaLog(LOGMSG_VERBOSE, "Attempting to send process id 0x%x message id: %u", dwProcessId, dwMessageId); | ||
150 | |||
151 | PROCESS_AND_MESSAGE pm = { }; | ||
152 | pm.dwProcessId = dwProcessId; | ||
153 | pm.dwMessageId = dwMessageId; | ||
154 | pm.dwTimeout = dwTimeout; | ||
155 | |||
156 | if (!::EnumWindows(EnumWindowsProc, reinterpret_cast<LPARAM>(&pm))) | ||
157 | { | ||
158 | DWORD dwLastError = ::GetLastError(); | ||
159 | if (ERROR_SUCCESS != dwLastError) | ||
160 | { | ||
161 | WcaLog(LOGMSG_VERBOSE, "CloseApp enumeration error: 0x%x", dwLastError); | ||
162 | } | ||
163 | } | ||
164 | } | ||
165 | |||
166 | /****************************************************************** | ||
167 | SendApplicationMessage - helper function to iterate through the | ||
168 | processes for the specified application and send all | ||
169 | applicable process Ids a message and give them time to process | ||
170 | the message. | ||
171 | |||
172 | ******************************************************************/ | ||
173 | void SendApplicationMessage( | ||
174 | __in LPCWSTR wzApplication, | ||
175 | __in DWORD dwMessageId, | ||
176 | __in DWORD dwTimeout | ||
177 | ) | ||
178 | { | ||
179 | DWORD *prgProcessIds = NULL; | ||
180 | DWORD cProcessIds = 0, iProcessId; | ||
181 | HRESULT hr = S_OK; | ||
182 | |||
183 | WcaLog(LOGMSG_VERBOSE, "Checking App: %ls ", wzApplication); | ||
184 | |||
185 | hr = ProcFindAllIdsFromExeName(wzApplication, &prgProcessIds, &cProcessIds); | ||
186 | |||
187 | if (SUCCEEDED(hr) && 0 < cProcessIds) | ||
188 | { | ||
189 | WcaLog(LOGMSG_VERBOSE, "App: %ls found running, %d processes, attempting to send message.", wzApplication, cProcessIds); | ||
190 | |||
191 | for (iProcessId = 0; iProcessId < cProcessIds; ++iProcessId) | ||
192 | { | ||
193 | SendProcessMessage(prgProcessIds[iProcessId], dwMessageId, dwTimeout); | ||
194 | } | ||
195 | |||
196 | ProcWaitForIds(prgProcessIds, cProcessIds, dwTimeout); | ||
197 | } | ||
198 | |||
199 | ReleaseMem(prgProcessIds); | ||
200 | } | ||
201 | |||
202 | /****************************************************************** | ||
203 | SetRunningProcessProperty - helper function that sets the specified | ||
204 | property if there are any instances of the specified executable | ||
205 | running. Useful to show custom UI to ask for shutdown. | ||
206 | ******************************************************************/ | ||
207 | void SetRunningProcessProperty( | ||
208 | __in LPCWSTR wzApplication, | ||
209 | __in LPCWSTR wzProperty | ||
210 | ) | ||
211 | { | ||
212 | DWORD *prgProcessIds = NULL; | ||
213 | DWORD cProcessIds = 0; | ||
214 | HRESULT hr = S_OK; | ||
215 | |||
216 | WcaLog(LOGMSG_VERBOSE, "Checking App: %ls ", wzApplication); | ||
217 | |||
218 | hr = ProcFindAllIdsFromExeName(wzApplication, &prgProcessIds, &cProcessIds); | ||
219 | |||
220 | if (SUCCEEDED(hr) && 0 < cProcessIds) | ||
221 | { | ||
222 | WcaLog(LOGMSG_VERBOSE, "App: %ls found running, %d processes, setting '%ls' property.", wzApplication, cProcessIds, wzProperty); | ||
223 | WcaSetIntProperty(wzProperty, cProcessIds); | ||
224 | } | ||
225 | |||
226 | ReleaseMem(prgProcessIds); | ||
227 | } | ||
228 | |||
229 | /****************************************************************** | ||
230 | TerminateProcesses - helper function that kills the provided set of | ||
231 | process ids such that they return a particular exit code. | ||
232 | ******************************************************************/ | ||
233 | void TerminateProcesses( | ||
234 | __in_ecount(cProcessIds) DWORD rgdwProcessIds[], | ||
235 | __in DWORD cProcessIds, | ||
236 | __in DWORD dwExitCode | ||
237 | ) | ||
238 | { | ||
239 | for (DWORD i = 0; i < cProcessIds; ++i) | ||
240 | { | ||
241 | HANDLE hProcess = ::OpenProcess(PROCESS_TERMINATE, FALSE, rgdwProcessIds[i]); | ||
242 | if (hProcess) | ||
243 | { | ||
244 | ::TerminateProcess(hProcess, dwExitCode); | ||
245 | ::CloseHandle(hProcess); | ||
246 | } | ||
247 | } | ||
248 | } | ||
249 | |||
250 | /****************************************************************** | ||
251 | WixCloseApplications - entry point for WixCloseApplications Custom Action | ||
252 | |||
253 | called as Type 1 CustomAction (binary DLL) from Windows Installer | ||
254 | in InstallExecuteSequence before InstallFiles | ||
255 | ******************************************************************/ | ||
256 | extern "C" UINT __stdcall WixCloseApplications( | ||
257 | __in MSIHANDLE hInstall | ||
258 | ) | ||
259 | { | ||
260 | //AssertSz(FALSE, "debug WixCloseApplications"); | ||
261 | HRESULT hr = S_OK; | ||
262 | UINT er = ERROR_SUCCESS; | ||
263 | |||
264 | LPWSTR pwzData = NULL; | ||
265 | LPWSTR pwzId = NULL; | ||
266 | LPWSTR pwzTarget = NULL; | ||
267 | LPWSTR pwzDescription = NULL; | ||
268 | LPWSTR pwzCondition = NULL; | ||
269 | LPWSTR pwzProperty = NULL; | ||
270 | DWORD dwAttributes = 0; | ||
271 | DWORD dwTimeout = 0; | ||
272 | DWORD dwTerminateExitCode = 0; | ||
273 | MSICONDITION condition = MSICONDITION_NONE; | ||
274 | |||
275 | DWORD cCloseApps = 0; | ||
276 | |||
277 | PMSIHANDLE hView = NULL; | ||
278 | PMSIHANDLE hRec = NULL; | ||
279 | MSIHANDLE hListboxTable = NULL; | ||
280 | MSIHANDLE hListboxColumns = NULL; | ||
281 | |||
282 | LPWSTR pwzCustomActionData = NULL; | ||
283 | //DWORD cchCustomActionData = 0; | ||
284 | |||
285 | // | ||
286 | // initialize | ||
287 | // | ||
288 | hr = WcaInitialize(hInstall, "WixCloseApplications"); | ||
289 | ExitOnFailure(hr, "failed to initialize"); | ||
290 | |||
291 | // | ||
292 | // loop through all the objects to be secured | ||
293 | // | ||
294 | hr = WcaOpenExecuteView(wzQUERY_CLOSEAPPS, &hView); | ||
295 | ExitOnFailure(hr, "failed to open view on Wix4CloseApplication table"); | ||
296 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
297 | { | ||
298 | hr = WcaGetRecordString(hRec, QCA_ID, &pwzId); | ||
299 | ExitOnFailure(hr, "failed to get id from Wix4CloseApplication table"); | ||
300 | |||
301 | hr = WcaGetRecordString(hRec, QCA_CONDITION, &pwzCondition); | ||
302 | ExitOnFailure(hr, "failed to get condition from Wix4CloseApplication table"); | ||
303 | |||
304 | if (pwzCondition && *pwzCondition) | ||
305 | { | ||
306 | condition = ::MsiEvaluateConditionW(hInstall, pwzCondition); | ||
307 | if (MSICONDITION_ERROR == condition) | ||
308 | { | ||
309 | hr = E_INVALIDARG; | ||
310 | ExitOnFailure(hr, "failed to process condition for Wix4CloseApplication '%ls'", pwzId); | ||
311 | } | ||
312 | else if (MSICONDITION_FALSE == condition) | ||
313 | { | ||
314 | continue; // skip processing this target | ||
315 | } | ||
316 | } | ||
317 | |||
318 | hr = WcaGetRecordFormattedString(hRec, QCA_TARGET, &pwzTarget); | ||
319 | ExitOnFailure(hr, "failed to get target from Wix4CloseApplication table"); | ||
320 | |||
321 | hr = WcaGetRecordFormattedString(hRec, QCA_DESCRIPTION, &pwzDescription); | ||
322 | ExitOnFailure(hr, "failed to get description from Wix4CloseApplication table"); | ||
323 | |||
324 | hr = WcaGetRecordInteger(hRec, QCA_ATTRIBUTES, reinterpret_cast<int*>(&dwAttributes)); | ||
325 | ExitOnFailure(hr, "failed to get attributes from Wix4CloseApplication table"); | ||
326 | |||
327 | hr = WcaGetRecordFormattedString(hRec, QCA_PROPERTY, &pwzProperty); | ||
328 | ExitOnFailure(hr, "failed to get property from Wix4CloseApplication table"); | ||
329 | |||
330 | hr = WcaGetRecordInteger(hRec, QCA_TERMINATEEXITCODE, reinterpret_cast<int*>(&dwTerminateExitCode)); | ||
331 | if (S_FALSE == hr) | ||
332 | { | ||
333 | dwTerminateExitCode = 0; | ||
334 | hr = S_OK; | ||
335 | } | ||
336 | ExitOnFailure(hr, "failed to get terminate exit-code from Wix4CloseApplication table"); | ||
337 | |||
338 | hr = WcaGetRecordInteger(hRec, QCA_TIMEOUT, reinterpret_cast<int*>(&dwTimeout)); | ||
339 | if (S_FALSE == hr) | ||
340 | { | ||
341 | dwTimeout = DEFAULT_PROCESS_EXIT_WAIT_TIME; | ||
342 | hr = S_OK; | ||
343 | } | ||
344 | ExitOnFailure(hr, "failed to get timeout from Wix4CloseApplication table"); | ||
345 | |||
346 | // Before trying any changes to the machine, prompt if requested. | ||
347 | if (dwAttributes & CLOSEAPP_ATTRIBUTE_PROMPTTOCONTINUE) | ||
348 | { | ||
349 | hr = PromptToContinue(pwzTarget, pwzDescription ? pwzDescription : L""); | ||
350 | if (HRESULT_FROM_WIN32(ERROR_INSTALL_USEREXIT) == hr) | ||
351 | { | ||
352 | // Skip error message if user canceled. | ||
353 | ExitFunction(); | ||
354 | } | ||
355 | ExitOnFailure(hr, "Failure while prompting user to continue to close application."); | ||
356 | } | ||
357 | |||
358 | // | ||
359 | // send WM_CLOSE or WM_QUERYENDSESSION to currently running applications | ||
360 | // | ||
361 | if (dwAttributes & CLOSEAPP_ATTRIBUTE_CLOSEMESSAGE) | ||
362 | { | ||
363 | SendApplicationMessage(pwzTarget, WM_CLOSE, dwTimeout); | ||
364 | } | ||
365 | |||
366 | if (dwAttributes & CLOSEAPP_ATTRIBUTE_ENDSESSIONMESSAGE) | ||
367 | { | ||
368 | SendApplicationMessage(pwzTarget, WM_QUERYENDSESSION, dwTimeout); | ||
369 | } | ||
370 | |||
371 | // | ||
372 | // Pass the targets to the deferred action in case the app comes back | ||
373 | // even if we close it now. | ||
374 | // | ||
375 | if (dwAttributes & (CLOSEAPP_ATTRIBUTE_ELEVATEDCLOSEMESSAGE | CLOSEAPP_ATTRIBUTE_ELEVATEDENDSESSIONMESSAGE | CLOSEAPP_ATTRIBUTE_REBOOTPROMPT | CLOSEAPP_ATTRIBUTE_TERMINATEPROCESS)) | ||
376 | { | ||
377 | hr = WcaWriteStringToCaData(pwzTarget, &pwzCustomActionData); | ||
378 | ExitOnFailure(hr, "failed to add target data to CustomActionData"); | ||
379 | |||
380 | hr = WcaWriteIntegerToCaData(dwAttributes, &pwzCustomActionData); | ||
381 | ExitOnFailure(hr, "failed to add attribute data to CustomActionData"); | ||
382 | |||
383 | hr = WcaWriteIntegerToCaData(dwTimeout, &pwzCustomActionData); | ||
384 | ExitOnFailure(hr, "failed to add timeout data to CustomActionData"); | ||
385 | |||
386 | hr = WcaWriteIntegerToCaData(dwTerminateExitCode, &pwzCustomActionData); | ||
387 | ExitOnFailure(hr, "failed to add timeout data to CustomActionData"); | ||
388 | } | ||
389 | |||
390 | if (pwzProperty && *pwzProperty) | ||
391 | { | ||
392 | SetRunningProcessProperty(pwzTarget, pwzProperty); | ||
393 | } | ||
394 | |||
395 | ++cCloseApps; | ||
396 | } | ||
397 | |||
398 | // if we looped through all records all is well | ||
399 | if (E_NOMOREITEMS == hr) | ||
400 | { | ||
401 | hr = S_OK; | ||
402 | } | ||
403 | ExitOnFailure(hr, "failed while looping through all apps to close"); | ||
404 | |||
405 | // | ||
406 | // Do the UI dance now. | ||
407 | // | ||
408 | /* | ||
409 | |||
410 | TODO: Do this eventually | ||
411 | |||
412 | if (cCloseApps) | ||
413 | { | ||
414 | while (TRUE) | ||
415 | { | ||
416 | for (DWORD i = 0; i < cCloseApps; ++i) | ||
417 | { | ||
418 | hr = WcaAddTempRecord(&hListboxTable, &hListboxColumns, L"ListBox", NULL, 0, 4, L"FileInUseProcess", i, target, description); | ||
419 | if (FAILED(hr)) | ||
420 | { | ||
421 | } | ||
422 | } | ||
423 | } | ||
424 | } | ||
425 | */ | ||
426 | |||
427 | // | ||
428 | // schedule the custom action and add to progress bar | ||
429 | // | ||
430 | if (pwzCustomActionData && *pwzCustomActionData) | ||
431 | { | ||
432 | Assert(0 < cCloseApps); | ||
433 | |||
434 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"CloseApplicationsDeferred"), pwzCustomActionData, cCloseApps * COST_CLOSEAPP); | ||
435 | ExitOnFailure(hr, "failed to schedule CloseApplicationsDeferred action"); | ||
436 | } | ||
437 | |||
438 | LExit: | ||
439 | if (hListboxColumns) | ||
440 | { | ||
441 | ::MsiCloseHandle(hListboxColumns); | ||
442 | } | ||
443 | if (hListboxTable) | ||
444 | { | ||
445 | ::MsiCloseHandle(hListboxTable); | ||
446 | } | ||
447 | |||
448 | ReleaseStr(pwzCustomActionData); | ||
449 | ReleaseStr(pwzData); | ||
450 | ReleaseStr(pwzProperty); | ||
451 | ReleaseStr(pwzCondition); | ||
452 | ReleaseStr(pwzDescription); | ||
453 | ReleaseStr(pwzTarget); | ||
454 | ReleaseStr(pwzId); | ||
455 | |||
456 | if (FAILED(hr)) | ||
457 | { | ||
458 | er = HRESULT_FROM_WIN32(ERROR_INSTALL_USEREXIT) == hr ? ERROR_INSTALL_USEREXIT : ERROR_INSTALL_FAILURE; | ||
459 | } | ||
460 | return WcaFinalize(er); | ||
461 | } | ||
462 | |||
463 | |||
464 | /****************************************************************** | ||
465 | WixCloseApplicationsDeferred - entry point for | ||
466 | WixCloseApplicationsDeferred Custom Action | ||
467 | called as Type 1025 CustomAction | ||
468 | (deferred binary DLL) | ||
469 | |||
470 | NOTE: deferred CustomAction since it modifies the machine | ||
471 | NOTE: CustomActionData == wzTarget\tdwAttributes\tdwTimeout\tdwTerminateExitCode\t... | ||
472 | ******************************************************************/ | ||
473 | extern "C" UINT __stdcall WixCloseApplicationsDeferred( | ||
474 | __in MSIHANDLE hInstall | ||
475 | ) | ||
476 | { | ||
477 | //AssertSz(FALSE, "debug WixCloseApplicationsDeferred"); | ||
478 | HRESULT hr = S_OK; | ||
479 | DWORD er = ERROR_SUCCESS; | ||
480 | |||
481 | LPWSTR pwz = NULL; | ||
482 | LPWSTR pwzData = NULL; | ||
483 | LPWSTR pwzTarget = NULL; | ||
484 | DWORD dwAttributes = 0; | ||
485 | DWORD dwTimeout = 0; | ||
486 | DWORD dwTerminateExitCode = 0; | ||
487 | |||
488 | DWORD *prgProcessIds = NULL; | ||
489 | DWORD cProcessIds = 0; | ||
490 | |||
491 | // | ||
492 | // initialize | ||
493 | // | ||
494 | hr = WcaInitialize(hInstall, "WixCloseApplicationsDeferred"); | ||
495 | ExitOnFailure(hr, "failed to initialize"); | ||
496 | |||
497 | hr = WcaGetProperty(L"CustomActionData", &pwzData); | ||
498 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
499 | |||
500 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzData); | ||
501 | |||
502 | pwz = pwzData; | ||
503 | |||
504 | // | ||
505 | // loop through all the passed in data | ||
506 | // | ||
507 | while (pwz && *pwz) | ||
508 | { | ||
509 | hr = WcaReadStringFromCaData(&pwz, &pwzTarget); | ||
510 | ExitOnFailure(hr, "failed to process target from CustomActionData"); | ||
511 | |||
512 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&dwAttributes)); | ||
513 | ExitOnFailure(hr, "failed to process attributes from CustomActionData"); | ||
514 | |||
515 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&dwTimeout)); | ||
516 | ExitOnFailure(hr, "failed to process timeout from CustomActionData"); | ||
517 | |||
518 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&dwTerminateExitCode)); | ||
519 | ExitOnFailure(hr, "failed to process terminate exit code from CustomActionData"); | ||
520 | |||
521 | WcaLog(LOGMSG_VERBOSE, "Checking for App: %ls Attributes: %d", pwzTarget, dwAttributes); | ||
522 | |||
523 | // | ||
524 | // send WM_CLOSE or WM_QUERYENDSESSION to currently running applications | ||
525 | // | ||
526 | if (dwAttributes & CLOSEAPP_ATTRIBUTE_ELEVATEDCLOSEMESSAGE) | ||
527 | { | ||
528 | SendApplicationMessage(pwzTarget, WM_CLOSE, dwTimeout); | ||
529 | } | ||
530 | |||
531 | if (dwAttributes & CLOSEAPP_ATTRIBUTE_ELEVATEDENDSESSIONMESSAGE) | ||
532 | { | ||
533 | SendApplicationMessage(pwzTarget, WM_QUERYENDSESSION, dwTimeout); | ||
534 | } | ||
535 | |||
536 | // If we find that an app that we need closed is still runing, require a | ||
537 | // restart or kill the process as directed. | ||
538 | ProcFindAllIdsFromExeName(pwzTarget, &prgProcessIds, &cProcessIds); | ||
539 | if (0 < cProcessIds) | ||
540 | { | ||
541 | if (dwAttributes & CLOSEAPP_ATTRIBUTE_REBOOTPROMPT) | ||
542 | { | ||
543 | WcaLog(LOGMSG_VERBOSE, "App: %ls found running, requiring a reboot.", pwzTarget); | ||
544 | |||
545 | WcaDeferredActionRequiresReboot(); | ||
546 | } | ||
547 | else if (dwAttributes & CLOSEAPP_ATTRIBUTE_TERMINATEPROCESS) | ||
548 | { | ||
549 | TerminateProcesses(prgProcessIds, cProcessIds, dwTerminateExitCode); | ||
550 | } | ||
551 | } | ||
552 | |||
553 | hr = WcaProgressMessage(COST_CLOSEAPP, FALSE); | ||
554 | ExitOnFailure(hr, "failed to send progress message"); | ||
555 | } | ||
556 | |||
557 | LExit: | ||
558 | ReleaseMem(prgProcessIds); | ||
559 | |||
560 | ReleaseStr(pwzTarget); | ||
561 | ReleaseStr(pwzData); | ||
562 | |||
563 | if (FAILED(hr)) | ||
564 | { | ||
565 | er = ERROR_INSTALL_FAILURE; | ||
566 | } | ||
567 | return WcaFinalize(er); | ||
568 | } | ||
diff --git a/src/ext/Util/ca/CustomMsiErrors.h b/src/ext/Util/ca/CustomMsiErrors.h new file mode 100644 index 00000000..3218b61b --- /dev/null +++ b/src/ext/Util/ca/CustomMsiErrors.h | |||
@@ -0,0 +1,32 @@ | |||
1 | #pragma once | ||
2 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
3 | |||
4 | |||
5 | #define msierrSecureObjectsFailedCreateSD 25520 | ||
6 | #define msierrSecureObjectsFailedSet 25521 | ||
7 | #define msierrSecureObjectsUnknownType 25522 | ||
8 | |||
9 | #define msierrXmlFileFailedRead 25530 | ||
10 | #define msierrXmlFileFailedOpen 25531 | ||
11 | #define msierrXmlFileFailedSelect 25532 | ||
12 | #define msierrXmlFileFailedSave 25533 | ||
13 | |||
14 | #define msierrXmlConfigFailedRead 25540 | ||
15 | #define msierrXmlConfigFailedOpen 25541 | ||
16 | #define msierrXmlConfigFailedSelect 25542 | ||
17 | #define msierrXmlConfigFailedSave 25543 | ||
18 | |||
19 | #define msierrPERFMONFailedRegisterDLL 26251 | ||
20 | #define msierrPERFMONFailedUnregisterDLL 26252 | ||
21 | #define msierrInstallPerfCounterData 26253 | ||
22 | #define msierrUninstallPerfCounterData 26254 | ||
23 | |||
24 | #define msierrSMBFailedCreate 26301 | ||
25 | #define msierrSMBFailedDrop 26302 | ||
26 | #define msierrUSRFailedUserCreate 26401 | ||
27 | #define msierrUSRFailedUserCreatePswd 26402 | ||
28 | #define msierrUSRFailedUserGroupAdd 26403 | ||
29 | #define msierrUSRFailedUserCreateExists 26404 | ||
30 | #define msierrUSRFailedGrantLogonAsService 26405 | ||
31 | |||
32 | //Last available is 26450 \ No newline at end of file | ||
diff --git a/src/ext/Util/ca/FormatFiles.cpp b/src/ext/Util/ca/FormatFiles.cpp new file mode 100644 index 00000000..d1533999 --- /dev/null +++ b/src/ext/Util/ca/FormatFiles.cpp | |||
@@ -0,0 +1,221 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | const UINT COST_FILEFORMATTING = 2000; | ||
6 | |||
7 | |||
8 | // | ||
9 | // WixSchedFormatFiles - immediate CA to schedule format files CAs | ||
10 | // | ||
11 | extern "C" UINT __stdcall WixSchedFormatFiles( | ||
12 | __in MSIHANDLE hInstall | ||
13 | ) | ||
14 | { | ||
15 | HRESULT hr = S_OK; | ||
16 | UINT er = ERROR_SUCCESS; | ||
17 | PSCZ sczBinaryKey; | ||
18 | PSCZ sczFileKey; | ||
19 | PSCZ sczComponentKey; | ||
20 | PSCZ sczFormattedFile; | ||
21 | PSCZ sczFilePath; | ||
22 | PMSIHANDLE hView; | ||
23 | PMSIHANDLE hRec; | ||
24 | PSCZ sczFileContent; | ||
25 | PSCZ sczFormattedContent; | ||
26 | PSCZ sczExecCustomActionData; | ||
27 | PSCZ sczRollbackCustomActionData; | ||
28 | |||
29 | LPCWSTR wzQuery = | ||
30 | L"SELECT `Wix4FormatFile`.`Binary_`, `Wix4FormatFile`.`File_`, `File`.`Component_` " | ||
31 | L"FROM `Wix4FormatFile`, `File` " | ||
32 | L"WHERE `Wix4FormatFile`.`File_` = `File`.`File`"; | ||
33 | enum eQuery { eqBinaryKey = 1, eqFileKey, eqComponentKey }; | ||
34 | |||
35 | // initialize | ||
36 | hr = WcaInitialize(hInstall, "WixSchedFormatFiles"); | ||
37 | ExitOnFailure(hr, "Failed to initialize for WixSchedFormatFiles."); | ||
38 | |||
39 | // query and loop through all the files | ||
40 | hr = WcaOpenExecuteView(wzQuery, &hView); | ||
41 | ExitOnFailure(hr, "Failed to open view on Wix4FormatFile table"); | ||
42 | |||
43 | DWORD cFiles = 0; | ||
44 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
45 | { | ||
46 | ++cFiles; | ||
47 | |||
48 | hr = WcaGetRecordString(hRec, eqBinaryKey, &sczBinaryKey); | ||
49 | ExitOnFailure(hr, "Failed to get Binary table key."); | ||
50 | |||
51 | hr = WcaGetRecordString(hRec, eqFileKey, &sczFileKey); | ||
52 | ExitOnFailure(hr, "Failed to get File table key."); | ||
53 | |||
54 | hr = WcaGetRecordString(hRec, eqComponentKey, &sczComponentKey); | ||
55 | ExitOnFailure(hr, "Failed to get Component table key."); | ||
56 | |||
57 | // we need to know if the component's being installed, uninstalled, or reinstalled | ||
58 | WCA_TODO todo = WcaGetComponentToDo(sczComponentKey); | ||
59 | if (WCA_TODO_INSTALL == todo || WCA_TODO_REINSTALL == todo) | ||
60 | { | ||
61 | // turn the file key into the path to the target file | ||
62 | hr = StrAllocFormatted(&sczFormattedFile, L"[#%ls]", sczFileKey); | ||
63 | ExitOnFailure(hr, "Failed to format file string for file: %ls", sczFileKey); | ||
64 | hr = WcaGetFormattedString(sczFormattedFile, &sczFilePath); | ||
65 | ExitOnFailure(hr, "Failed to get path for file: %ls", sczFileKey); | ||
66 | |||
67 | // extract binary to string | ||
68 | WCA_ENCODING encoding = WCA_ENCODING_UNKNOWN; | ||
69 | hr = WcaExtractBinaryToString(sczBinaryKey, &sczFileContent, &encoding); | ||
70 | ExitOnFailure(hr, "Failed to extract binary: %ls", sczBinaryKey); | ||
71 | |||
72 | // format string | ||
73 | hr = WcaGetFormattedString(sczFileContent, &sczFormattedContent); | ||
74 | ExitOnFailure(hr, "Failed to format file content: %ls", sczFileContent); | ||
75 | |||
76 | // write to deferred custom action data | ||
77 | hr = WcaWriteStringToCaData(sczFilePath, &sczExecCustomActionData); | ||
78 | ExitOnFailure(hr, "Failed to write deferred custom action data for file: %ls", sczFilePath); | ||
79 | |||
80 | hr = WcaWriteIntegerToCaData(encoding, &sczExecCustomActionData); | ||
81 | ExitOnFailure(hr, "Failed to write deferred custom action data for encoding: %d", encoding); | ||
82 | |||
83 | hr = WcaWriteStringToCaData(sczFormattedContent, &sczExecCustomActionData); | ||
84 | ExitOnFailure(hr, "Failed to write deferred custom action data for file content: %ls", sczFilePath); | ||
85 | |||
86 | // write to rollback custom action data | ||
87 | hr = WcaWriteStringToCaData(sczFilePath, &sczRollbackCustomActionData); | ||
88 | ExitOnFailure(hr, "Failed to write rollback custom action data for file: %ls", sczFilePath); | ||
89 | |||
90 | hr = WcaWriteIntegerToCaData(encoding, &sczRollbackCustomActionData); | ||
91 | ExitOnFailure(hr, "Failed to write deferred custom action data for encoding: %d", encoding); | ||
92 | |||
93 | hr = WcaWriteStringToCaData(sczFileContent, &sczRollbackCustomActionData); | ||
94 | ExitOnFailure(hr, "Failed to write rollback custom action data for file content: %ls", sczFilePath); | ||
95 | } | ||
96 | } | ||
97 | |||
98 | // reaching the end of the list is actually a good thing, not an error | ||
99 | if (E_NOMOREITEMS == hr) | ||
100 | { | ||
101 | hr = S_OK; | ||
102 | } | ||
103 | ExitOnFailure(hr, "Failure occurred while processing Wix4FormatFile table"); | ||
104 | |||
105 | // schedule deferred CAs if there's anything to do | ||
106 | if (sczRollbackCustomActionData && *sczRollbackCustomActionData) | ||
107 | { | ||
108 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RollbackFormatFiles"), sczRollbackCustomActionData, cFiles * COST_FILEFORMATTING); | ||
109 | ExitOnFailure(hr, "Failed to schedule RollbackFormatFiles"); | ||
110 | } | ||
111 | |||
112 | if (sczExecCustomActionData && *sczExecCustomActionData) | ||
113 | { | ||
114 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"ExecFormatFiles"), sczExecCustomActionData, cFiles * COST_FILEFORMATTING); | ||
115 | ExitOnFailure(hr, "Failed to schedule ExecFormatFiles"); | ||
116 | } | ||
117 | |||
118 | LExit: | ||
119 | return WcaFinalize(er = FAILED(hr) ? ERROR_INSTALL_FAILURE : er); | ||
120 | } | ||
121 | |||
122 | |||
123 | // | ||
124 | // WixExecFormatFiles - deferred and rollback CAs to write formatted files | ||
125 | // | ||
126 | extern "C" UINT __stdcall WixExecFormatFiles( | ||
127 | __in MSIHANDLE hInstall | ||
128 | ) | ||
129 | { | ||
130 | HRESULT hr = S_OK; | ||
131 | UINT er = ERROR_SUCCESS; | ||
132 | PSCZ sczCustomActionData; | ||
133 | LPWSTR pwz = NULL; | ||
134 | PSCZ sczFilePath; | ||
135 | PSCZ sczFileContent; | ||
136 | LPSTR psz = NULL; | ||
137 | |||
138 | // initialize | ||
139 | hr = WcaInitialize(hInstall, "WixExecFormatFiles"); | ||
140 | ExitOnFailure(hr, "Failed to initialize for WixExecFormatFiles."); | ||
141 | |||
142 | hr = WcaGetProperty(L"CustomActionData", &sczCustomActionData); | ||
143 | ExitOnFailure(hr, "Failed to get CustomActionData."); | ||
144 | #ifdef _DEBUG | ||
145 | WcaLog(LOGMSG_STANDARD, "CustomActionData: %ls", sczCustomActionData); | ||
146 | #endif | ||
147 | |||
148 | // loop through all the passed in data | ||
149 | pwz = sczCustomActionData; | ||
150 | while (pwz && *pwz) | ||
151 | { | ||
152 | // extract the custom action data | ||
153 | hr = WcaReadStringFromCaData(&pwz, &sczFilePath); | ||
154 | ExitOnFailure(hr, "Failed to read file path from custom action data"); | ||
155 | |||
156 | WCA_ENCODING encoding = WCA_ENCODING_UNKNOWN; | ||
157 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&encoding)); | ||
158 | ExitOnFailure(hr, "Failed to read encoding from custom action data"); | ||
159 | |||
160 | hr = WcaReadStringFromCaData(&pwz, &sczFileContent); | ||
161 | ExitOnFailure(hr, "Failed to read file content from custom action data"); | ||
162 | |||
163 | // re-encode content | ||
164 | LPCBYTE pbData = NULL; | ||
165 | size_t cbData = 0; | ||
166 | switch (encoding) | ||
167 | { | ||
168 | case WCA_ENCODING_UTF_16: | ||
169 | pbData = reinterpret_cast<LPCBYTE>(LPCWSTR(sczFileContent)); | ||
170 | cbData = lstrlenW(sczFileContent) * sizeof(WCHAR); | ||
171 | break; | ||
172 | |||
173 | case WCA_ENCODING_UTF_8: | ||
174 | hr = StrAnsiAllocString(&psz, sczFileContent, 0, CP_UTF8); | ||
175 | ExitOnFailure(hr, "Failed to convert Unicode to UTF-8."); | ||
176 | pbData = reinterpret_cast<LPCBYTE>(psz); | ||
177 | |||
178 | hr = ::StringCbLengthA(psz, STRSAFE_MAX_CCH, &cbData); | ||
179 | ExitOnFailure(hr, "Failed to count UTF-8 bytes."); | ||
180 | break; | ||
181 | |||
182 | case WCA_ENCODING_ANSI: | ||
183 | hr = StrAnsiAllocString(&psz, sczFileContent, 0, CP_ACP); | ||
184 | ExitOnFailure(hr, "Failed to convert Unicode to ANSI."); | ||
185 | pbData = reinterpret_cast<LPCBYTE>(psz); | ||
186 | |||
187 | hr = ::StringCbLengthA(psz, STRSAFE_MAX_CCH, &cbData); | ||
188 | ExitOnFailure(hr, "Failed to count UTF-8 bytes."); | ||
189 | break; | ||
190 | |||
191 | default: | ||
192 | break; | ||
193 | } | ||
194 | |||
195 | #ifdef _DEBUG | ||
196 | WcaLog(LOGMSG_STANDARD, "File: %ls", sczCustomActionData); | ||
197 | WcaLog(LOGMSG_STANDARD, "Content: %ls", sczFileContent); | ||
198 | #endif | ||
199 | |||
200 | // write file and preserve modified time | ||
201 | FILETIME filetime; | ||
202 | |||
203 | hr = FileGetTime(sczFilePath, NULL, NULL, &filetime); | ||
204 | ExitOnFailure(hr, "Failed to get modified time of file : %ls", sczFilePath); | ||
205 | |||
206 | hr = FileWrite(sczFilePath, FILE_ATTRIBUTE_NORMAL, pbData, cbData, NULL); | ||
207 | ExitOnFailure(hr, "Failed to write file content: %ls", sczFilePath); | ||
208 | |||
209 | hr = FileSetTime(sczFilePath, NULL, NULL, &filetime); | ||
210 | ExitOnFailure(hr, "Failed to set modified time of file : %ls", sczFilePath); | ||
211 | |||
212 | // Tick the progress bar | ||
213 | hr = WcaProgressMessage(COST_FILEFORMATTING, FALSE); | ||
214 | ExitOnFailure(hr, "Failed to tick progress bar for file: %ls", sczFilePath); | ||
215 | } | ||
216 | |||
217 | LExit: | ||
218 | ReleaseStr(psz); | ||
219 | |||
220 | return WcaFinalize(er = FAILED(hr) ? ERROR_INSTALL_FAILURE : er); | ||
221 | } | ||
diff --git a/src/ext/Util/ca/OsInfo.cpp b/src/ext/Util/ca/OsInfo.cpp new file mode 100644 index 00000000..4783673e --- /dev/null +++ b/src/ext/Util/ca/OsInfo.cpp | |||
@@ -0,0 +1,487 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | // constants we'll pick up from later SDKs | ||
6 | #define SM_TABLETPC 86 | ||
7 | #define SM_MEDIACENTER 87 | ||
8 | #define SM_STARTER 88 | ||
9 | #define SM_SERVERR2 89 | ||
10 | #define VER_SUITE_WH_SERVER 0x00008000 | ||
11 | |||
12 | /******************************************************************** | ||
13 | WixQueryOsInfo - entry point for WixQueryOsInfo custom action | ||
14 | |||
15 | Called as Type 1 custom action (DLL from the Binary table) from | ||
16 | Windows Installer to set properties that identify OS information | ||
17 | and predefined directories | ||
18 | ********************************************************************/ | ||
19 | extern "C" UINT __stdcall WixQueryOsInfo( | ||
20 | __in MSIHANDLE hInstall | ||
21 | ) | ||
22 | { | ||
23 | HRESULT hr = S_OK; | ||
24 | DWORD er = ERROR_SUCCESS; | ||
25 | OSVERSIONINFOEXW ovix = {0}; | ||
26 | |||
27 | hr = WcaInitialize(hInstall, "WixQueryOsInfo"); | ||
28 | ExitOnFailure(hr, "WixQueryOsInfo failed to initialize"); | ||
29 | |||
30 | // identify product suites | ||
31 | ovix.dwOSVersionInfoSize = sizeof(OSVERSIONINFOEXW); | ||
32 | #pragma warning(suppress: 4996) //TODO: use osutil | ||
33 | ::GetVersionExW(reinterpret_cast<LPOSVERSIONINFOW>(&ovix)); | ||
34 | |||
35 | if (VER_SUITE_SMALLBUSINESS == (ovix.wSuiteMask & VER_SUITE_SMALLBUSINESS)) | ||
36 | { | ||
37 | WcaSetIntProperty(L"WIX_SUITE_SMALLBUSINESS", 1); | ||
38 | } | ||
39 | |||
40 | if (VER_SUITE_ENTERPRISE == (ovix.wSuiteMask & VER_SUITE_ENTERPRISE)) | ||
41 | { | ||
42 | WcaSetIntProperty(L"WIX_SUITE_ENTERPRISE", 1); | ||
43 | } | ||
44 | |||
45 | if (VER_SUITE_BACKOFFICE == (ovix.wSuiteMask & VER_SUITE_BACKOFFICE)) | ||
46 | { | ||
47 | WcaSetIntProperty(L"WIX_SUITE_BACKOFFICE", 1); | ||
48 | } | ||
49 | |||
50 | if (VER_SUITE_COMMUNICATIONS == (ovix.wSuiteMask & VER_SUITE_COMMUNICATIONS)) | ||
51 | { | ||
52 | WcaSetIntProperty(L"WIX_SUITE_COMMUNICATIONS", 1); | ||
53 | } | ||
54 | |||
55 | if (VER_SUITE_TERMINAL == (ovix.wSuiteMask & VER_SUITE_TERMINAL)) | ||
56 | { | ||
57 | WcaSetIntProperty(L"WIX_SUITE_TERMINAL", 1); | ||
58 | } | ||
59 | |||
60 | if (VER_SUITE_SMALLBUSINESS_RESTRICTED == (ovix.wSuiteMask & VER_SUITE_SMALLBUSINESS_RESTRICTED)) | ||
61 | { | ||
62 | WcaSetIntProperty(L"WIX_SUITE_SMALLBUSINESS_RESTRICTED", 1); | ||
63 | } | ||
64 | |||
65 | if (VER_SUITE_EMBEDDEDNT == (ovix.wSuiteMask & VER_SUITE_EMBEDDEDNT)) | ||
66 | { | ||
67 | WcaSetIntProperty(L"WIX_SUITE_EMBEDDEDNT", 1); | ||
68 | } | ||
69 | |||
70 | if (VER_SUITE_DATACENTER == (ovix.wSuiteMask & VER_SUITE_DATACENTER)) | ||
71 | { | ||
72 | WcaSetIntProperty(L"WIX_SUITE_DATACENTER", 1); | ||
73 | } | ||
74 | |||
75 | if (VER_SUITE_SINGLEUSERTS == (ovix.wSuiteMask & VER_SUITE_SINGLEUSERTS)) | ||
76 | { | ||
77 | WcaSetIntProperty(L"WIX_SUITE_SINGLEUSERTS", 1); | ||
78 | } | ||
79 | |||
80 | if (VER_SUITE_PERSONAL == (ovix.wSuiteMask & VER_SUITE_PERSONAL)) | ||
81 | { | ||
82 | WcaSetIntProperty(L"WIX_SUITE_PERSONAL", 1); | ||
83 | } | ||
84 | |||
85 | if (VER_SUITE_BLADE == (ovix.wSuiteMask & VER_SUITE_BLADE)) | ||
86 | { | ||
87 | WcaSetIntProperty(L"WIX_SUITE_BLADE", 1); | ||
88 | } | ||
89 | |||
90 | if (VER_SUITE_EMBEDDED_RESTRICTED == (ovix.wSuiteMask & VER_SUITE_EMBEDDED_RESTRICTED)) | ||
91 | { | ||
92 | WcaSetIntProperty(L"WIX_SUITE_EMBEDDED_RESTRICTED", 1); | ||
93 | } | ||
94 | |||
95 | if (VER_SUITE_SECURITY_APPLIANCE == (ovix.wSuiteMask & VER_SUITE_SECURITY_APPLIANCE)) | ||
96 | { | ||
97 | WcaSetIntProperty(L"WIX_SUITE_SECURITY_APPLIANCE", 1); | ||
98 | } | ||
99 | |||
100 | if (VER_SUITE_STORAGE_SERVER == (ovix.wSuiteMask & VER_SUITE_STORAGE_SERVER)) | ||
101 | { | ||
102 | WcaSetIntProperty(L"WIX_SUITE_STORAGE_SERVER", 1); | ||
103 | } | ||
104 | |||
105 | if (VER_SUITE_COMPUTE_SERVER == (ovix.wSuiteMask & VER_SUITE_COMPUTE_SERVER)) | ||
106 | { | ||
107 | WcaSetIntProperty(L"WIX_SUITE_COMPUTE_SERVER", 1); | ||
108 | } | ||
109 | |||
110 | if (VER_SUITE_WH_SERVER == (ovix.wSuiteMask & VER_SUITE_WH_SERVER)) | ||
111 | { | ||
112 | WcaSetIntProperty(L"WIX_SUITE_WH_SERVER", 1); | ||
113 | } | ||
114 | |||
115 | // only for XP and later | ||
116 | if (5 < ovix.dwMajorVersion || (5 == ovix.dwMajorVersion && 0 < ovix.dwMinorVersion)) | ||
117 | { | ||
118 | if (::GetSystemMetrics(SM_SERVERR2)) | ||
119 | { | ||
120 | WcaSetIntProperty(L"WIX_SUITE_SERVERR2", 1); | ||
121 | } | ||
122 | |||
123 | if (::GetSystemMetrics(SM_MEDIACENTER)) | ||
124 | { | ||
125 | WcaSetIntProperty(L"WIX_SUITE_MEDIACENTER", 1); | ||
126 | } | ||
127 | |||
128 | if (::GetSystemMetrics(SM_STARTER)) | ||
129 | { | ||
130 | WcaSetIntProperty(L"WIX_SUITE_STARTER", 1); | ||
131 | } | ||
132 | |||
133 | if (::GetSystemMetrics(SM_TABLETPC)) | ||
134 | { | ||
135 | WcaSetIntProperty(L"WIX_SUITE_TABLETPC", 1); | ||
136 | } | ||
137 | } | ||
138 | |||
139 | LExit: | ||
140 | if (FAILED(hr)) | ||
141 | er = ERROR_INSTALL_FAILURE; | ||
142 | return WcaFinalize(er); | ||
143 | } | ||
144 | |||
145 | /******************************************************************** | ||
146 | WixQueryOsDirs - entry point for WixQueryOsDirs custom action | ||
147 | |||
148 | Called as Type 1 custom action (DLL from the Binary table) from | ||
149 | Windows Installer to set properties that identify predefined directories | ||
150 | ********************************************************************/ | ||
151 | extern "C" UINT __stdcall WixQueryOsDirs( | ||
152 | __in MSIHANDLE hInstall | ||
153 | ) | ||
154 | { | ||
155 | HRESULT hr = S_OK; | ||
156 | DWORD er = ERROR_SUCCESS; | ||
157 | |||
158 | hr = WcaInitialize(hInstall, "WixQueryOsDirs"); | ||
159 | ExitOnFailure(hr, "WixQueryOsDirs failed to initialize"); | ||
160 | |||
161 | // get the paths of the CSIDLs that represent real paths and for which MSI | ||
162 | // doesn't yet have standard folder properties | ||
163 | WCHAR path[MAX_PATH]; | ||
164 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_ADMINTOOLS, NULL, SHGFP_TYPE_CURRENT, path)) | ||
165 | { | ||
166 | WcaSetProperty(L"WIX_DIR_ADMINTOOLS", path); | ||
167 | } | ||
168 | |||
169 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_ALTSTARTUP, NULL, SHGFP_TYPE_CURRENT, path)) | ||
170 | { | ||
171 | WcaSetProperty(L"WIX_DIR_ALTSTARTUP", path); | ||
172 | } | ||
173 | |||
174 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_CDBURN_AREA, NULL, SHGFP_TYPE_CURRENT, path)) | ||
175 | { | ||
176 | WcaSetProperty(L"WIX_DIR_CDBURN_AREA", path); | ||
177 | } | ||
178 | |||
179 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_COMMON_ADMINTOOLS, NULL, SHGFP_TYPE_CURRENT, path)) | ||
180 | { | ||
181 | WcaSetProperty(L"WIX_DIR_COMMON_ADMINTOOLS", path); | ||
182 | } | ||
183 | |||
184 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_COMMON_ALTSTARTUP, NULL, SHGFP_TYPE_CURRENT, path)) | ||
185 | { | ||
186 | WcaSetProperty(L"WIX_DIR_COMMON_ALTSTARTUP", path); | ||
187 | } | ||
188 | |||
189 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_COMMON_DOCUMENTS, NULL, SHGFP_TYPE_CURRENT, path)) | ||
190 | { | ||
191 | WcaSetProperty(L"WIX_DIR_COMMON_DOCUMENTS", path); | ||
192 | } | ||
193 | |||
194 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_COMMON_FAVORITES, NULL, SHGFP_TYPE_CURRENT, path)) | ||
195 | { | ||
196 | WcaSetProperty(L"WIX_DIR_COMMON_FAVORITES", path); | ||
197 | } | ||
198 | |||
199 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_COMMON_MUSIC, NULL, SHGFP_TYPE_CURRENT, path)) | ||
200 | { | ||
201 | WcaSetProperty(L"WIX_DIR_COMMON_MUSIC", path); | ||
202 | } | ||
203 | |||
204 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_COMMON_PICTURES, NULL, SHGFP_TYPE_CURRENT, path)) | ||
205 | { | ||
206 | WcaSetProperty(L"WIX_DIR_COMMON_PICTURES", path); | ||
207 | } | ||
208 | |||
209 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_COMMON_VIDEO, NULL, SHGFP_TYPE_CURRENT, path)) | ||
210 | { | ||
211 | WcaSetProperty(L"WIX_DIR_COMMON_VIDEO", path); | ||
212 | } | ||
213 | |||
214 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_COOKIES, NULL, SHGFP_TYPE_CURRENT, path)) | ||
215 | { | ||
216 | WcaSetProperty(L"WIX_DIR_COOKIES", path); | ||
217 | } | ||
218 | |||
219 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_DESKTOP, NULL, SHGFP_TYPE_CURRENT, path)) | ||
220 | { | ||
221 | WcaSetProperty(L"WIX_DIR_DESKTOP", path); | ||
222 | } | ||
223 | |||
224 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_HISTORY, NULL, SHGFP_TYPE_CURRENT, path)) | ||
225 | { | ||
226 | WcaSetProperty(L"WIX_DIR_HISTORY", path); | ||
227 | } | ||
228 | |||
229 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_INTERNET_CACHE, NULL, SHGFP_TYPE_CURRENT, path)) | ||
230 | { | ||
231 | WcaSetProperty(L"WIX_DIR_INTERNET_CACHE", path); | ||
232 | } | ||
233 | |||
234 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_MYMUSIC, NULL, SHGFP_TYPE_CURRENT, path)) | ||
235 | { | ||
236 | WcaSetProperty(L"WIX_DIR_MYMUSIC", path); | ||
237 | } | ||
238 | |||
239 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_MYPICTURES, NULL, SHGFP_TYPE_CURRENT, path)) | ||
240 | { | ||
241 | WcaSetProperty(L"WIX_DIR_MYPICTURES", path); | ||
242 | } | ||
243 | |||
244 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_MYVIDEO, NULL, SHGFP_TYPE_CURRENT, path)) | ||
245 | { | ||
246 | WcaSetProperty(L"WIX_DIR_MYVIDEO", path); | ||
247 | } | ||
248 | |||
249 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_NETHOOD, NULL, SHGFP_TYPE_CURRENT, path)) | ||
250 | { | ||
251 | WcaSetProperty(L"WIX_DIR_NETHOOD", path); | ||
252 | } | ||
253 | |||
254 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_PERSONAL, NULL, SHGFP_TYPE_CURRENT, path)) | ||
255 | { | ||
256 | WcaSetProperty(L"WIX_DIR_PERSONAL", path); | ||
257 | } | ||
258 | |||
259 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_PRINTHOOD, NULL, SHGFP_TYPE_CURRENT, path)) | ||
260 | { | ||
261 | WcaSetProperty(L"WIX_DIR_PRINTHOOD", path); | ||
262 | } | ||
263 | |||
264 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_PROFILE, NULL, SHGFP_TYPE_CURRENT, path)) | ||
265 | { | ||
266 | WcaSetProperty(L"WIX_DIR_PROFILE", path); | ||
267 | } | ||
268 | |||
269 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_RECENT, NULL, SHGFP_TYPE_CURRENT, path)) | ||
270 | { | ||
271 | WcaSetProperty(L"WIX_DIR_RECENT", path); | ||
272 | } | ||
273 | |||
274 | if (ERROR_SUCCESS == ::SHGetFolderPathW(NULL, CSIDL_RESOURCES, NULL, SHGFP_TYPE_CURRENT, path)) | ||
275 | { | ||
276 | WcaSetProperty(L"WIX_DIR_RESOURCES", path); | ||
277 | } | ||
278 | |||
279 | LExit: | ||
280 | if (FAILED(hr)) | ||
281 | er = ERROR_INSTALL_FAILURE; | ||
282 | return WcaFinalize(er); | ||
283 | } | ||
284 | |||
285 | |||
286 | /******************************************************************** | ||
287 | SetPropertyWellKnownSID | ||
288 | |||
289 | Set a property with the localized name of a well known windows SID | ||
290 | ********************************************************************/ | ||
291 | static HRESULT SetPropertyWellKnownSID( | ||
292 | __in WELL_KNOWN_SID_TYPE sidType, | ||
293 | __in LPCWSTR wzPropertyName, | ||
294 | __in BOOL fIncludeDomainName | ||
295 | ) | ||
296 | { | ||
297 | HRESULT hr = S_OK; | ||
298 | PSID psid = NULL; | ||
299 | WCHAR wzRefDomain[MAX_PATH] = {0}; | ||
300 | SID_NAME_USE nameUse; | ||
301 | DWORD refSize = MAX_PATH; | ||
302 | WCHAR wzName[MAX_PATH] = {0}; | ||
303 | LPWSTR pwzPropertyValue = NULL; | ||
304 | DWORD size = MAX_PATH; | ||
305 | |||
306 | hr = AclGetWellKnownSid(sidType, &psid); | ||
307 | ExitOnFailure(hr, "Failed to get SID; skipping account %ls", wzPropertyName); | ||
308 | |||
309 | if (!::LookupAccountSidW(NULL, psid, wzName, &size, wzRefDomain, &refSize, &nameUse)) | ||
310 | { | ||
311 | ExitWithLastError(hr, "Failed to look up account for SID; skipping account %ls.", wzPropertyName); | ||
312 | } | ||
313 | |||
314 | if (fIncludeDomainName) | ||
315 | { | ||
316 | hr = StrAllocFormatted(&pwzPropertyValue, L"%s\\%s", wzRefDomain, wzName); | ||
317 | ExitOnFailure(hr, "Failed to format property value"); | ||
318 | |||
319 | hr = WcaSetProperty(wzPropertyName, pwzPropertyValue); | ||
320 | ExitOnFailure(hr, "Failed write domain\\name property"); | ||
321 | } | ||
322 | else | ||
323 | { | ||
324 | hr = WcaSetProperty(wzPropertyName, wzName); | ||
325 | ExitOnFailure(hr, "Failed write to name-only property"); | ||
326 | } | ||
327 | |||
328 | LExit: | ||
329 | if (NULL != psid) | ||
330 | { | ||
331 | ::LocalFree(psid); | ||
332 | } | ||
333 | ReleaseStr(pwzPropertyValue); | ||
334 | return hr; | ||
335 | } | ||
336 | |||
337 | /******************************************************************** | ||
338 | WixQueryOsWellKnownSID - entry point for WixQueryOsWellKnownSID custom action | ||
339 | |||
340 | Called as Type 1 custom action (DLL from the Binary table) from | ||
341 | Windows Installer to set properties with the localized names of built-in | ||
342 | Windows Security IDs | ||
343 | ********************************************************************/ | ||
344 | extern "C" UINT __stdcall WixQueryOsWellKnownSID( | ||
345 | __in MSIHANDLE hInstall | ||
346 | ) | ||
347 | { | ||
348 | HRESULT hr = S_OK; | ||
349 | DWORD er = ERROR_SUCCESS; | ||
350 | |||
351 | hr = WcaInitialize(hInstall, "WixQueryOsWellKnownSID"); | ||
352 | ExitOnFailure(hr, "WixQueryOsWellKnownSID failed to initialize"); | ||
353 | |||
354 | SetPropertyWellKnownSID(WinLocalSystemSid, L"WIX_ACCOUNT_LOCALSYSTEM", TRUE); | ||
355 | SetPropertyWellKnownSID(WinLocalServiceSid, L"WIX_ACCOUNT_LOCALSERVICE", TRUE); | ||
356 | SetPropertyWellKnownSID(WinNetworkServiceSid, L"WIX_ACCOUNT_NETWORKSERVICE", TRUE); | ||
357 | SetPropertyWellKnownSID(WinBuiltinAdministratorsSid, L"WIX_ACCOUNT_ADMINISTRATORS", TRUE); | ||
358 | SetPropertyWellKnownSID(WinBuiltinUsersSid, L"WIX_ACCOUNT_USERS", TRUE); | ||
359 | SetPropertyWellKnownSID(WinBuiltinGuestsSid, L"WIX_ACCOUNT_GUESTS", TRUE); | ||
360 | SetPropertyWellKnownSID(WinBuiltinPerfLoggingUsersSid, L"WIX_ACCOUNT_PERFLOGUSERS", TRUE); | ||
361 | SetPropertyWellKnownSID(WinBuiltinPerfLoggingUsersSid, L"WIX_ACCOUNT_PERFLOGUSERS_NODOMAIN", FALSE); | ||
362 | |||
363 | LExit: | ||
364 | if (FAILED(hr)) | ||
365 | { | ||
366 | er = ERROR_INSTALL_FAILURE; | ||
367 | } | ||
368 | return WcaFinalize(er); | ||
369 | } | ||
370 | |||
371 | |||
372 | /******************************************************************** | ||
373 | DetectWDDMDriver | ||
374 | |||
375 | Set a property if the driver on the machine is a WDDM driver. One | ||
376 | reliable way to detect the presence of a WDDM driver is to try and | ||
377 | use the Direct3DCreate9Ex() function. This method attempts that | ||
378 | then sets the property appropriately. | ||
379 | ********************************************************************/ | ||
380 | static HRESULT DetectWDDMDriver() | ||
381 | { | ||
382 | HRESULT hr = S_OK; | ||
383 | HMODULE hModule = NULL; | ||
384 | |||
385 | // Manually load the d3d9.dll library. If the library couldn't be loaded then we obviously won't be able | ||
386 | // to try calling the function so just return. | ||
387 | hr = LoadSystemLibrary(L"d3d9.dll", &hModule); | ||
388 | if (E_MODNOTFOUND == hr) | ||
389 | { | ||
390 | TraceError(hr, "Unable to load DirectX APIs, skipping WDDM driver check."); | ||
391 | ExitFunction1(hr = S_OK); | ||
392 | } | ||
393 | ExitOnFailure(hr, "Failed to the load the existing DirectX APIs."); | ||
394 | |||
395 | // Obtain the address of the Direct3DCreate9Ex function. If this fails we know it isn't a WDDM | ||
396 | // driver so just exit. | ||
397 | const void* Direct3DCreate9ExPtr = ::GetProcAddress(hModule, "Direct3DCreate9Ex"); | ||
398 | ExitOnNull(Direct3DCreate9ExPtr, hr, S_OK, "Unable to load Direct3DCreateEx function, so the driver is not a WDDM driver."); | ||
399 | |||
400 | // At this point we know it's a WDDM driver so set the property. | ||
401 | hr = WcaSetIntProperty(L"WIX_WDDM_DRIVER_PRESENT", 1); | ||
402 | ExitOnFailure(hr, "Failed write property"); | ||
403 | |||
404 | LExit: | ||
405 | if (NULL != hModule) | ||
406 | { | ||
407 | FreeLibrary(hModule); | ||
408 | } | ||
409 | |||
410 | return hr; | ||
411 | } | ||
412 | |||
413 | /******************************************************************** | ||
414 | DetectIsCompositionEnabled | ||
415 | |||
416 | Set a property based on the return value of DwmIsCompositionEnabled(). | ||
417 | ********************************************************************/ | ||
418 | static HRESULT DetectIsCompositionEnabled() | ||
419 | { | ||
420 | HRESULT hr = S_OK; | ||
421 | HMODULE hModule = NULL; | ||
422 | BOOL compositionState = false; | ||
423 | |||
424 | // Manually load the d3d9.dll library. If the library can't load it's likely because we are not on a Vista | ||
425 | // OS. Just return ok, and the property won't get set. | ||
426 | hr = LoadSystemLibrary(L"dwmapi.dll", &hModule); | ||
427 | if (E_MODNOTFOUND == hr) | ||
428 | { | ||
429 | TraceError(hr, "Unable to load Vista desktop window manager APIs, skipping Composition Enabled check."); | ||
430 | ExitFunction1(hr = S_OK); | ||
431 | } | ||
432 | ExitOnFailure(hr, "Failed to load the existing window manager APIs."); | ||
433 | |||
434 | // If for some reason we can't get the function pointer that's ok, just return. | ||
435 | typedef HRESULT (WINAPI *DWMISCOMPOSITIONENABLEDPTR)(BOOL*); | ||
436 | DWMISCOMPOSITIONENABLEDPTR DwmIsCompositionEnabledPtr = (DWMISCOMPOSITIONENABLEDPTR)::GetProcAddress(hModule, "DwmIsCompositionEnabled"); | ||
437 | ExitOnNull(hModule, hr, S_OK, "Unable to obtain function information, skipping Composition Enabled check."); | ||
438 | |||
439 | hr = DwmIsCompositionEnabledPtr(&compositionState); | ||
440 | ExitOnFailure(hr, "Failed to retrieve Composition state"); | ||
441 | |||
442 | if (compositionState) | ||
443 | { | ||
444 | hr = WcaSetIntProperty(L"WIX_DWM_COMPOSITION_ENABLED", 1); | ||
445 | ExitOnFailure(hr, "Failed write property"); | ||
446 | } | ||
447 | |||
448 | LExit: | ||
449 | if (NULL != hModule) | ||
450 | { | ||
451 | FreeLibrary(hModule); | ||
452 | } | ||
453 | return hr; | ||
454 | } | ||
455 | |||
456 | /******************************************************************** | ||
457 | WixQueryOsDriverInfo - entry point for WixQueryOsDriverInfo custom action | ||
458 | |||
459 | Called as Type 1 custom action (DLL from the Binary table) from | ||
460 | Windows Installer to set properties about drivers installed on | ||
461 | the target machine | ||
462 | ********************************************************************/ | ||
463 | extern "C" UINT __stdcall WixQueryOsDriverInfo( | ||
464 | __in MSIHANDLE hInstall | ||
465 | ) | ||
466 | { | ||
467 | HRESULT hr = S_OK; | ||
468 | DWORD er = ERROR_SUCCESS; | ||
469 | |||
470 | hr = WcaInitialize(hInstall, "WixQueryOsDriverInfo"); | ||
471 | ExitOnFailure(hr, "WixQueryOsDriverInfo failed to initialize"); | ||
472 | |||
473 | // Detect the WDDM driver status | ||
474 | hr = DetectWDDMDriver(); | ||
475 | ExitOnFailure(hr, "Failed to detect WIX_WDDM_DRIVER_PRESENT"); | ||
476 | |||
477 | // Detect whether composition is enabled | ||
478 | hr = DetectIsCompositionEnabled(); | ||
479 | ExitOnFailure(hr, "Failed to detect WIX_DWM_COMPOSITION_ENABLED"); | ||
480 | |||
481 | LExit: | ||
482 | if (FAILED(hr)) | ||
483 | { | ||
484 | er = ERROR_INSTALL_FAILURE; | ||
485 | } | ||
486 | return WcaFinalize(er); | ||
487 | } | ||
diff --git a/src/ext/Util/ca/RemoveFoldersEx.cpp b/src/ext/Util/ca/RemoveFoldersEx.cpp new file mode 100644 index 00000000..cbc7f4bb --- /dev/null +++ b/src/ext/Util/ca/RemoveFoldersEx.cpp | |||
@@ -0,0 +1,243 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | LPCWSTR vcsRemoveFolderExQuery = | ||
6 | L"SELECT `Wix4RemoveFolderEx`, `Component_`, `Property`, `InstallMode`, `WixRemoveFolderEx`.`Condition`, `Component`.`Attributes`" | ||
7 | L"FROM `Wix4RemoveFolderEx``,`Component` " | ||
8 | L"WHERE `Wix4RemoveFolderEx`.`Component_`=`Component`.`Component`"; | ||
9 | enum eRemoveFolderExQuery { rfqId = 1, rfqComponent, rfqProperty, rfqMode, rfqCondition, rfqComponentAttributes }; | ||
10 | |||
11 | static HRESULT RecursePath( | ||
12 | __in_z LPCWSTR wzPath, | ||
13 | __in_z LPCWSTR wzId, | ||
14 | __in_z LPCWSTR wzComponent, | ||
15 | __in_z LPCWSTR wzProperty, | ||
16 | __in int iMode, | ||
17 | __in BOOL fDisableWow64Redirection, | ||
18 | __inout DWORD* pdwCounter, | ||
19 | __inout MSIHANDLE* phTable, | ||
20 | __inout MSIHANDLE* phColumns | ||
21 | ) | ||
22 | { | ||
23 | HRESULT hr = S_OK; | ||
24 | DWORD er; | ||
25 | LPWSTR sczSearch = NULL; | ||
26 | LPWSTR sczProperty = NULL; | ||
27 | HANDLE hFind = INVALID_HANDLE_VALUE; | ||
28 | WIN32_FIND_DATAW wfd; | ||
29 | LPWSTR sczNext = NULL; | ||
30 | |||
31 | if (fDisableWow64Redirection) | ||
32 | { | ||
33 | hr = WcaDisableWow64FSRedirection(); | ||
34 | ExitOnFailure(hr, "Custom action was told to act on a 64-bit component, but was unable to disable filesystem redirection through the Wow64 API."); | ||
35 | } | ||
36 | |||
37 | // First recurse down to all the child directories. | ||
38 | hr = StrAllocFormatted(&sczSearch, L"%s*", wzPath); | ||
39 | ExitOnFailure(hr, "Failed to allocate file search string in path: %S", wzPath); | ||
40 | |||
41 | hFind = ::FindFirstFileW(sczSearch, &wfd); | ||
42 | if (INVALID_HANDLE_VALUE == hFind) | ||
43 | { | ||
44 | er = ::GetLastError(); | ||
45 | if (ERROR_PATH_NOT_FOUND == er) | ||
46 | { | ||
47 | WcaLog(LOGMSG_STANDARD, "Search path not found: %ls; skipping", sczSearch); | ||
48 | ExitFunction1(hr = S_FALSE); | ||
49 | } | ||
50 | else | ||
51 | { | ||
52 | hr = HRESULT_FROM_WIN32(er); | ||
53 | } | ||
54 | ExitOnFailure(hr, "Failed to find all files in path: %S", wzPath); | ||
55 | } | ||
56 | |||
57 | do | ||
58 | { | ||
59 | // Skip files and the dot directories. | ||
60 | if (FILE_ATTRIBUTE_DIRECTORY != (wfd.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY) || L'.' == wfd.cFileName[0] && (L'\0' == wfd.cFileName[1] || (L'.' == wfd.cFileName[1] && L'\0' == wfd.cFileName[2]))) | ||
61 | { | ||
62 | continue; | ||
63 | } | ||
64 | |||
65 | hr = StrAllocFormatted(&sczNext, L"%s%s\\", wzPath, wfd.cFileName); | ||
66 | ExitOnFailure(hr, "Failed to concat filename '%S' to string: %S", wfd.cFileName, wzPath); | ||
67 | |||
68 | // Don't re-disable redirection; if it was necessary, we've already done it. | ||
69 | hr = RecursePath(sczNext, wzId, wzComponent, wzProperty, iMode, FALSE, pdwCounter, phTable, phColumns); | ||
70 | ExitOnFailure(hr, "Failed to recurse path: %S", sczNext); | ||
71 | } while (::FindNextFileW(hFind, &wfd)); | ||
72 | |||
73 | er = ::GetLastError(); | ||
74 | if (ERROR_NO_MORE_FILES == er) | ||
75 | { | ||
76 | hr = S_OK; | ||
77 | } | ||
78 | else | ||
79 | { | ||
80 | hr = HRESULT_FROM_WIN32(er); | ||
81 | ExitOnFailure(hr, "Failed while looping through files in directory: %S", wzPath); | ||
82 | } | ||
83 | |||
84 | // Finally, set a property that points at our path. | ||
85 | hr = StrAllocFormatted(&sczProperty, L"_%s_%u", wzProperty, *pdwCounter); | ||
86 | ExitOnFailure(hr, "Failed to allocate Property for RemoveFile table with property: %S.", wzProperty); | ||
87 | |||
88 | ++(*pdwCounter); | ||
89 | |||
90 | hr = WcaSetProperty(sczProperty, wzPath); | ||
91 | ExitOnFailure(hr, "Failed to set Property: %S with path: %S", sczProperty, wzPath); | ||
92 | |||
93 | // Add the row to remove any files and another row to remove the folder. | ||
94 | hr = WcaAddTempRecord(phTable, phColumns, L"RemoveFile", NULL, 1, 5, L"RfxFiles", wzComponent, L"*.*", sczProperty, iMode); | ||
95 | ExitOnFailure(hr, "Failed to add row to remove all files for Wix4RemoveFolderEx row: %ls under path: %ls", wzId, wzPath); | ||
96 | |||
97 | hr = WcaAddTempRecord(phTable, phColumns, L"RemoveFile", NULL, 1, 5, L"RfxFolder", wzComponent, NULL, sczProperty, iMode); | ||
98 | ExitOnFailure(hr, "Failed to add row to remove folder for Wix4RemoveFolderEx row: %ls under path: %ls", wzId, wzPath); | ||
99 | |||
100 | LExit: | ||
101 | if (INVALID_HANDLE_VALUE != hFind) | ||
102 | { | ||
103 | ::FindClose(hFind); | ||
104 | } | ||
105 | |||
106 | if (fDisableWow64Redirection) | ||
107 | { | ||
108 | WcaRevertWow64FSRedirection(); | ||
109 | } | ||
110 | |||
111 | ReleaseStr(sczNext); | ||
112 | ReleaseStr(sczProperty); | ||
113 | ReleaseStr(sczSearch); | ||
114 | return hr; | ||
115 | } | ||
116 | |||
117 | extern "C" UINT WINAPI WixRemoveFoldersEx( | ||
118 | __in MSIHANDLE hInstall | ||
119 | ) | ||
120 | { | ||
121 | //AssertSz(FALSE, "debug WixRemoveFoldersEx"); | ||
122 | |||
123 | HRESULT hr = S_OK; | ||
124 | PMSIHANDLE hView; | ||
125 | PMSIHANDLE hRec; | ||
126 | LPWSTR sczId = NULL; | ||
127 | LPWSTR sczComponent = NULL; | ||
128 | LPWSTR sczProperty = NULL; | ||
129 | LPWSTR sczCondition = NULL; | ||
130 | LPWSTR sczPath = NULL; | ||
131 | LPWSTR sczExpandedPath = NULL; | ||
132 | int iMode = 0; | ||
133 | int iComponentAttributes; | ||
134 | BOOL f64BitComponent = FALSE; | ||
135 | DWORD dwCounter = 0; | ||
136 | DWORD_PTR cchLen = 0; | ||
137 | MSIHANDLE hTable = NULL; | ||
138 | MSIHANDLE hColumns = NULL; | ||
139 | |||
140 | hr = WcaInitialize(hInstall, "WixRemoveFoldersEx"); | ||
141 | ExitOnFailure(hr, "Failed to initialize WixRemoveFoldersEx."); | ||
142 | |||
143 | WcaInitializeWow64(); | ||
144 | |||
145 | // anything to do? | ||
146 | if (S_OK != WcaTableExists(L"Wix4RemoveFolderEx")) | ||
147 | { | ||
148 | WcaLog(LOGMSG_STANDARD, "Wix4RemoveFolderEx table doesn't exist, so there are no folders to remove."); | ||
149 | ExitFunction(); | ||
150 | } | ||
151 | |||
152 | // query and loop through all the remove folders exceptions | ||
153 | hr = WcaOpenExecuteView(vcsRemoveFolderExQuery, &hView); | ||
154 | ExitOnFailure(hr, "Failed to open view on Wix4RemoveFolderEx table"); | ||
155 | |||
156 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
157 | { | ||
158 | hr = WcaGetRecordString(hRec, rfqId, &sczId); | ||
159 | ExitOnFailure(hr, "Failed to get remove folder identity."); | ||
160 | |||
161 | hr = WcaGetRecordString(hRec, rfqCondition, &sczCondition); | ||
162 | ExitOnFailure(hr, "Failed to get remove folder condition."); | ||
163 | |||
164 | if (sczCondition && *sczCondition) | ||
165 | { | ||
166 | MSICONDITION condition = ::MsiEvaluateConditionW(hInstall, sczCondition); | ||
167 | if (MSICONDITION_TRUE == condition) | ||
168 | { | ||
169 | WcaLog(LOGMSG_STANDARD, "True condition for row %S: %S; processing.", sczId, sczCondition); | ||
170 | } | ||
171 | else | ||
172 | { | ||
173 | WcaLog(LOGMSG_STANDARD, "False or invalid condition for row %S: %S; skipping.", sczId, sczCondition); | ||
174 | continue; | ||
175 | } | ||
176 | } | ||
177 | |||
178 | hr = WcaGetRecordString(hRec, rfqComponent, &sczComponent); | ||
179 | ExitOnFailure(hr, "Failed to get remove folder component."); | ||
180 | |||
181 | hr = WcaGetRecordString(hRec, rfqProperty, &sczProperty); | ||
182 | ExitOnFailure(hr, "Failed to get remove folder property."); | ||
183 | |||
184 | hr = WcaGetRecordInteger(hRec, rfqMode, &iMode); | ||
185 | ExitOnFailure(hr, "Failed to get remove folder mode"); | ||
186 | |||
187 | hr = WcaGetProperty(sczProperty, &sczPath); | ||
188 | ExitOnFailure(hr, "Failed to resolve remove folder property: %S for row: %S", sczProperty, sczId); | ||
189 | |||
190 | hr = WcaGetRecordInteger(hRec, rfqComponentAttributes, &iComponentAttributes); | ||
191 | ExitOnFailure(hr, "failed to get component attributes for row: %ls", sczId); | ||
192 | |||
193 | f64BitComponent = iComponentAttributes & msidbComponentAttributes64bit; | ||
194 | |||
195 | // fail early if the property isn't set as you probably don't want your installers trying to delete SystemFolder | ||
196 | // StringCchLengthW succeeds only if the string is zero characters plus 1 for the terminating null | ||
197 | hr = ::StringCchLengthW(sczPath, 1, reinterpret_cast<UINT_PTR*>(&cchLen)); | ||
198 | if (SUCCEEDED(hr)) | ||
199 | { | ||
200 | ExitOnFailure(hr = E_INVALIDARG, "Missing folder property: %S for row: %S", sczProperty, sczId); | ||
201 | } | ||
202 | |||
203 | hr = PathExpand(&sczExpandedPath, sczPath, PATH_EXPAND_ENVIRONMENT); | ||
204 | ExitOnFailure(hr, "Failed to expand path: %S for row: %S", sczPath, sczId); | ||
205 | |||
206 | hr = PathBackslashTerminate(&sczExpandedPath); | ||
207 | ExitOnFailure(hr, "Failed to backslash-terminate path: %S", sczExpandedPath); | ||
208 | |||
209 | WcaLog(LOGMSG_STANDARD, "Recursing path: %S for row: %S.", sczExpandedPath, sczId); | ||
210 | hr = RecursePath(sczExpandedPath, sczId, sczComponent, sczProperty, iMode, f64BitComponent, &dwCounter, &hTable, &hColumns); | ||
211 | ExitOnFailure(hr, "Failed while navigating path: %S for row: %S", sczPath, sczId); | ||
212 | } | ||
213 | |||
214 | // reaching the end of the list is actually a good thing, not an error | ||
215 | if (E_NOMOREITEMS == hr) | ||
216 | { | ||
217 | hr = S_OK; | ||
218 | } | ||
219 | ExitOnFailure(hr, "Failure occured while processing Wix4RemoveFolderEx table"); | ||
220 | |||
221 | LExit: | ||
222 | WcaFinalizeWow64(); | ||
223 | |||
224 | if (hColumns) | ||
225 | { | ||
226 | ::MsiCloseHandle(hColumns); | ||
227 | } | ||
228 | |||
229 | if (hTable) | ||
230 | { | ||
231 | ::MsiCloseHandle(hTable); | ||
232 | } | ||
233 | |||
234 | ReleaseStr(sczExpandedPath); | ||
235 | ReleaseStr(sczPath); | ||
236 | ReleaseStr(sczProperty); | ||
237 | ReleaseStr(sczComponent); | ||
238 | ReleaseStr(sczCondition); | ||
239 | ReleaseStr(sczId); | ||
240 | |||
241 | DWORD er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
242 | return WcaFinalize(er); | ||
243 | } | ||
diff --git a/src/ext/Util/ca/RemoveRegistryKeysEx.cpp b/src/ext/Util/ca/RemoveRegistryKeysEx.cpp new file mode 100644 index 00000000..478c0779 --- /dev/null +++ b/src/ext/Util/ca/RemoveRegistryKeysEx.cpp | |||
@@ -0,0 +1,114 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | LPCWSTR vcsRemoveRegistryKeyExQuery = | ||
6 | L"SELECT `Wix4RemoveRegistryKeyEx`, `Component_`, `Root`, `Key`, `InstallMode`, `Condition` FROM `Wix4RemoveRegistryKeyEx`"; | ||
7 | enum eRemoveRegistryKeyExQuery { rrxqId = 1, rrxqComponent, rrxqRoot, rrxqKey, rrxqMode, rrxqCondition }; | ||
8 | |||
9 | extern "C" UINT WINAPI WixRemoveRegistryKeysEx( | ||
10 | __in MSIHANDLE hInstall | ||
11 | ) | ||
12 | { | ||
13 | //AssertSz(FALSE, "debug WixRemoveRegistryKeyEx"); | ||
14 | |||
15 | HRESULT hr = S_OK; | ||
16 | PMSIHANDLE hView; | ||
17 | PMSIHANDLE hRec; | ||
18 | LPWSTR sczId = NULL; | ||
19 | LPWSTR sczComponent = NULL; | ||
20 | LPWSTR sczCondition = NULL; | ||
21 | LPWSTR sczKey = NULL; | ||
22 | int iRoot = 0; | ||
23 | int iMode = 0; | ||
24 | MSIHANDLE hTable = NULL; | ||
25 | MSIHANDLE hColumns = NULL; | ||
26 | |||
27 | hr = WcaInitialize(hInstall, __FUNCTION__); | ||
28 | ExitOnFailure(hr, "Failed to initialize " __FUNCTION__); | ||
29 | |||
30 | // anything to do? | ||
31 | if (S_OK != WcaTableExists(L"Wix4RemoveRegistryKeyEx")) | ||
32 | { | ||
33 | WcaLog(LOGMSG_STANDARD, "Wix4RemoveRegistryKeyEx table doesn't exist, so there are no registry keys to remove."); | ||
34 | ExitFunction(); | ||
35 | } | ||
36 | |||
37 | hr = WcaOpenExecuteView(vcsRemoveRegistryKeyExQuery, &hView); | ||
38 | ExitOnFailure(hr, "Failed to open view on Wix4RemoveRegistryKeyEx table"); | ||
39 | |||
40 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
41 | { | ||
42 | hr = WcaGetRecordString(hRec, rrxqId, &sczId); | ||
43 | ExitOnFailure(hr, "Failed to get Wix4RemoveRegistryKeyEx identity."); | ||
44 | |||
45 | hr = WcaGetRecordString(hRec, rrxqCondition, &sczCondition); | ||
46 | ExitOnFailure(hr, "Failed to get Wix4RemoveRegistryKeyEx condition."); | ||
47 | |||
48 | if (sczCondition && *sczCondition) | ||
49 | { | ||
50 | MSICONDITION condition = ::MsiEvaluateConditionW(hInstall, sczCondition); | ||
51 | if (MSICONDITION_TRUE == condition) | ||
52 | { | ||
53 | WcaLog(LOGMSG_STANDARD, "True condition for row %S: %S; processing.", sczId, sczCondition); | ||
54 | } | ||
55 | else | ||
56 | { | ||
57 | WcaLog(LOGMSG_STANDARD, "False or invalid condition for row %S: %S; skipping.", sczId, sczCondition); | ||
58 | continue; | ||
59 | } | ||
60 | } | ||
61 | |||
62 | hr = WcaGetRecordString(hRec, rrxqComponent, &sczComponent); | ||
63 | ExitOnFailure(hr, "Failed to get Wix4RemoveRegistryKeyEx component."); | ||
64 | |||
65 | hr = WcaGetRecordInteger(hRec, rrxqRoot, &iRoot); | ||
66 | ExitOnFailure(hr, "Failed to get Wix4RemoveRegistryKeyEx root."); | ||
67 | |||
68 | hr = WcaGetRecordString(hRec, rrxqKey, &sczKey); | ||
69 | ExitOnFailure(hr, "Failed to get Wix4RemoveRegistryKeyEx key."); | ||
70 | |||
71 | hr = WcaGetRecordInteger(hRec, rrxqMode, &iMode); | ||
72 | ExitOnFailure(hr, "Failed to get Wix4RemoveRegistryKeyEx mode."); | ||
73 | |||
74 | switch (iMode) | ||
75 | { | ||
76 | case 1: // remove on install | ||
77 | WcaLog(LOGMSG_STANDARD, "Adding RemoveRegistry row: %ls/%d/%ls/-/%ls", sczId, iRoot, sczKey, sczComponent); | ||
78 | hr = WcaAddTempRecord(&hTable, &hColumns, L"RemoveRegistry", NULL, 0, 5, sczId, iRoot, sczKey, L"-", sczComponent); | ||
79 | ExitOnFailure(hr, "Failed to add RemoveRegistry row for remove-on-install Wix4RemoveRegistryKeyEx row: %ls:", sczId); | ||
80 | break; | ||
81 | case 2: // remove on uninstall | ||
82 | WcaLog(LOGMSG_STANDARD, "Adding Registry row: %ls/%d/%ls/-/null/%ls", sczId, iRoot, sczKey, sczComponent); | ||
83 | hr = WcaAddTempRecord(&hTable, &hColumns, L"Registry", NULL, 0, 6, sczId, iRoot, sczKey, L"-", NULL, sczComponent); | ||
84 | ExitOnFailure(hr, "Failed to add Registry row for remove-on-uninstall Wix4RemoveRegistryKeyEx row: %ls:", sczId); | ||
85 | break; | ||
86 | } | ||
87 | } | ||
88 | |||
89 | // reaching the end of the list is actually a good thing, not an error | ||
90 | if (E_NOMOREITEMS == hr) | ||
91 | { | ||
92 | hr = S_OK; | ||
93 | } | ||
94 | ExitOnFailure(hr, "Failure occured while processing Wix4RemoveRegistryKeyEx table."); | ||
95 | |||
96 | LExit: | ||
97 | if (hColumns) | ||
98 | { | ||
99 | ::MsiCloseHandle(hColumns); | ||
100 | } | ||
101 | |||
102 | if (hTable) | ||
103 | { | ||
104 | ::MsiCloseHandle(hTable); | ||
105 | } | ||
106 | |||
107 | ReleaseStr(sczKey); | ||
108 | ReleaseStr(sczComponent); | ||
109 | ReleaseStr(sczCondition); | ||
110 | ReleaseStr(sczId); | ||
111 | |||
112 | DWORD er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
113 | return WcaFinalize(er); | ||
114 | } | ||
diff --git a/src/ext/Util/ca/RestartManager.cpp b/src/ext/Util/ca/RestartManager.cpp new file mode 100644 index 00000000..c31819c1 --- /dev/null +++ b/src/ext/Util/ca/RestartManager.cpp | |||
@@ -0,0 +1,185 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | #include <restartmanager.h> | ||
5 | |||
6 | // Include space for the terminating null. | ||
7 | #define CCH_SESSION_KEY CCH_RM_SESSION_KEY + 1 | ||
8 | |||
9 | enum eRmuResourceType | ||
10 | { | ||
11 | etInvalid, | ||
12 | etFilename, | ||
13 | etApplication, | ||
14 | etServiceName, | ||
15 | |||
16 | // Mask types from Attributes. | ||
17 | etTypeMask = 0xf, | ||
18 | }; | ||
19 | |||
20 | LPCWSTR vcsRestartResourceQuery = | ||
21 | L"SELECT `Wix4RestartResource`.`Wix4RestartResource`, `Wix4RestartResource`.`Component_`, `Wix4RestartResource`.`Resource`, `Wix4RestartResource`.`Attributes` " | ||
22 | L"FROM `Wix4RestartResource`"; | ||
23 | enum eRestartResourceQuery { rrqRestartResource = 1, rrqComponent, rrqResource, rrqAttributes }; | ||
24 | |||
25 | /******************************************************************** | ||
26 | WixRegisterRestartResources - Immediate CA to register resources with RM. | ||
27 | |||
28 | Enumerates components before InstallValidate and registers resources | ||
29 | to be restarted by Restart Manager if the component action | ||
30 | is anything other than None. | ||
31 | |||
32 | Do not disable file system redirection. | ||
33 | |||
34 | ********************************************************************/ | ||
35 | extern "C" UINT __stdcall WixRegisterRestartResources( | ||
36 | __in MSIHANDLE hInstall | ||
37 | ) | ||
38 | { | ||
39 | HRESULT hr = S_OK; | ||
40 | UINT er = ERROR_SUCCESS; | ||
41 | |||
42 | PMSIHANDLE hView = NULL; | ||
43 | PMSIHANDLE hRec = NULL; | ||
44 | |||
45 | LPWSTR wzSessionKey = NULL; | ||
46 | size_t cchSessionKey = 0; | ||
47 | PRMU_SESSION pSession = NULL; | ||
48 | |||
49 | LPWSTR wzRestartResource = NULL; | ||
50 | LPWSTR wzComponent = NULL; | ||
51 | LPWSTR wzResource = NULL; | ||
52 | int iAttributes = NULL; | ||
53 | BOOL fIsComponentNull = FALSE; | ||
54 | WCA_TODO todo = WCA_TODO_UNKNOWN; | ||
55 | int iType = etInvalid; | ||
56 | |||
57 | hr = WcaInitialize(hInstall, "WixRegisterRestartResources"); | ||
58 | ExitOnFailure(hr, "Failed to initialize."); | ||
59 | |||
60 | // Skip if the table doesn't exist. | ||
61 | if (S_OK != WcaTableExists(L"Wix4RestartResource")) | ||
62 | { | ||
63 | WcaLog(LOGMSG_STANDARD, "The Wix4RestartResource table does not exist; there are no resources to register with Restart Manager."); | ||
64 | ExitFunction(); | ||
65 | } | ||
66 | |||
67 | // Get the existing Restart Manager session if available. | ||
68 | hr = WcaGetProperty(L"MsiRestartManagerSessionKey", &wzSessionKey); | ||
69 | ExitOnFailure(hr, "Failed to get the MsiRestartManagerSessionKey property."); | ||
70 | |||
71 | hr = ::StringCchLengthW(wzSessionKey, CCH_SESSION_KEY, &cchSessionKey); | ||
72 | ExitOnFailure(hr, "Failed to get the MsiRestartManagerSessionKey string length."); | ||
73 | |||
74 | // Skip if the property doesn't exist. | ||
75 | if (0 == cchSessionKey) | ||
76 | { | ||
77 | WcaLog(LOGMSG_STANDARD, "The MsiRestartManagerSessionKey property is not available to join."); | ||
78 | ExitFunction(); | ||
79 | } | ||
80 | |||
81 | // Join the existing Restart Manager session if supported. | ||
82 | hr = RmuJoinSession(&pSession, wzSessionKey); | ||
83 | if (E_MODNOTFOUND == hr) | ||
84 | { | ||
85 | WcaLog(LOGMSG_STANDARD, "The Restart Manager is not supported on this platform. Skipping."); | ||
86 | ExitFunction1(hr = S_OK); | ||
87 | } | ||
88 | else if (FAILED(hr)) | ||
89 | { | ||
90 | WcaLog(LOGMSG_STANDARD, "Failed to join the existing Restart Manager session %ls.", wzSessionKey); | ||
91 | ExitFunction1(hr = S_OK); | ||
92 | } | ||
93 | |||
94 | // Loop through each record in the table. | ||
95 | hr = WcaOpenExecuteView(vcsRestartResourceQuery, &hView); | ||
96 | ExitOnFailure(hr, "Failed to open a view on the RestartResource table."); | ||
97 | |||
98 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
99 | { | ||
100 | hr = WcaGetRecordString(hRec, rrqRestartResource, &wzRestartResource); | ||
101 | ExitOnFailure(hr, "Failed to get the RestartResource field value."); | ||
102 | |||
103 | hr = WcaGetRecordString(hRec, rrqComponent, &wzComponent); | ||
104 | ExitOnFailure(hr, "Failed to get the Component_ field value."); | ||
105 | |||
106 | hr = WcaGetRecordFormattedString(hRec, rrqResource, &wzResource); | ||
107 | ExitOnFailure(hr, "Failed to get the Resource formatted field value."); | ||
108 | |||
109 | hr = WcaGetRecordInteger(hRec, rrqAttributes, &iAttributes); | ||
110 | ExitOnFailure(hr, "Failed to get the Attributes field value."); | ||
111 | |||
112 | fIsComponentNull = ::MsiRecordIsNull(hRec, rrqComponent); | ||
113 | todo = WcaGetComponentToDo(wzComponent); | ||
114 | |||
115 | // Only register resources for components that are null, or being installed, reinstalled, or uninstalled. | ||
116 | if (!fIsComponentNull && WCA_TODO_UNKNOWN == todo) | ||
117 | { | ||
118 | WcaLog(LOGMSG_VERBOSE, "Skipping resource %ls.", wzRestartResource); | ||
119 | continue; | ||
120 | } | ||
121 | |||
122 | // Get the type from Attributes and add to the Restart Manager. | ||
123 | iType = iAttributes & etTypeMask; | ||
124 | switch (iType) | ||
125 | { | ||
126 | case etFilename: | ||
127 | WcaLog(LOGMSG_VERBOSE, "Registering file name %ls with the Restart Manager.", wzResource); | ||
128 | hr = RmuAddFile(pSession, wzResource); | ||
129 | ExitOnFailure(hr, "Failed to register the file name with the Restart Manager session."); | ||
130 | break; | ||
131 | |||
132 | case etApplication: | ||
133 | WcaLog(LOGMSG_VERBOSE, "Registering process name %ls with the Restart Manager.", wzResource); | ||
134 | hr = RmuAddProcessesByName(pSession, wzResource); | ||
135 | if (E_NOTFOUND == hr) | ||
136 | { | ||
137 | // ERROR_ACCESS_DENIED was returned when trying to register this process. | ||
138 | // Since other instances may have been registered, log a message and continue the setup rather than failing. | ||
139 | WcaLog(LOGMSG_STANDARD, "The process, %ls, could not be registered with the Restart Manager (probably because the setup is not elevated and the process is in another user context). A reboot may be requested later.", wzResource); | ||
140 | hr = S_OK; | ||
141 | } | ||
142 | else | ||
143 | { | ||
144 | ExitOnFailure(hr, "Failed to register the process name with the Restart Manager session."); | ||
145 | } | ||
146 | break; | ||
147 | |||
148 | case etServiceName: | ||
149 | WcaLog(LOGMSG_VERBOSE, "Registering service name %ls with the Restart Manager.", wzResource); | ||
150 | hr = RmuAddService(pSession, wzResource); | ||
151 | ExitOnFailure(hr, "Failed to register the service name with the Restart Manager session."); | ||
152 | break; | ||
153 | |||
154 | default: | ||
155 | WcaLog(LOGMSG_VERBOSE, "The resource type %d for %ls is not supported and will not be registered.", iType, wzRestartResource); | ||
156 | break; | ||
157 | } | ||
158 | } | ||
159 | |||
160 | if (E_NOMOREITEMS == hr) | ||
161 | { | ||
162 | hr = S_OK; | ||
163 | } | ||
164 | ExitOnFailure(hr, "Failed while looping through all rows to register resources."); | ||
165 | |||
166 | // Register the resources and unjoin the session. | ||
167 | hr = RmuEndSession(pSession); | ||
168 | if (FAILED(hr)) | ||
169 | { | ||
170 | WcaLog(LOGMSG_VERBOSE, "Failed to register the resources with the Restart Manager."); | ||
171 | ExitFunction1(hr = S_OK); | ||
172 | } | ||
173 | |||
174 | LExit: | ||
175 | ReleaseStr(wzRestartResource); | ||
176 | ReleaseStr(wzComponent); | ||
177 | ReleaseStr(wzResource); | ||
178 | |||
179 | if (FAILED(hr)) | ||
180 | { | ||
181 | er = ERROR_INSTALL_FAILURE; | ||
182 | } | ||
183 | |||
184 | return WcaFinalize(er); | ||
185 | } | ||
diff --git a/src/ext/Util/ca/TouchFile.cpp b/src/ext/Util/ca/TouchFile.cpp new file mode 100644 index 00000000..e704f922 --- /dev/null +++ b/src/ext/Util/ca/TouchFile.cpp | |||
@@ -0,0 +1,308 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | LPCWSTR vcsTouchFileQuery = L"SELECT `Wix4TouchFile`, `Component_`, `Path`, `Attributes` FROM `Wix4TouchFile`"; | ||
6 | enum TOUCH_FILE_QUERY { tfqId = 1, tfqComponent, tfqPath, tfqTouchFileAttributes }; | ||
7 | |||
8 | enum TOUCH_FILE_ATTRIBUTE | ||
9 | { | ||
10 | TOUCH_FILE_ATTRIBUTE_ON_INSTALL = 0x01, | ||
11 | TOUCH_FILE_ATTRIBUTE_ON_REINSTALL = 0x02, | ||
12 | TOUCH_FILE_ATTRIBUTE_ON_UNINSTALL = 0x04, | ||
13 | TOUCH_FILE_ATTRIBUTE_64BIT = 0x10, | ||
14 | TOUCH_FILE_ATTRIBUTE_VITAL = 0x20 | ||
15 | }; | ||
16 | |||
17 | |||
18 | static BOOL SetExistingFileModifiedTime( | ||
19 | __in_z LPCWSTR wzId, | ||
20 | __in_z LPCWSTR wzPath, | ||
21 | __in BOOL f64Bit, | ||
22 | __in FILETIME* pftModified | ||
23 | ) | ||
24 | { | ||
25 | HRESULT hr = S_OK; | ||
26 | BOOL fReenableFileSystemRedirection = FALSE; | ||
27 | |||
28 | if (f64Bit) | ||
29 | { | ||
30 | hr = WcaDisableWow64FSRedirection(); | ||
31 | ExitOnFailure(hr, "Failed to disable 64-bit file system redirection to path: '%ls' for: %ls", wzPath, wzId); | ||
32 | |||
33 | fReenableFileSystemRedirection = TRUE; | ||
34 | } | ||
35 | |||
36 | hr = FileSetTime(wzPath, NULL, NULL, pftModified); | ||
37 | |||
38 | LExit: | ||
39 | if (fReenableFileSystemRedirection) | ||
40 | { | ||
41 | WcaRevertWow64FSRedirection(); | ||
42 | } | ||
43 | |||
44 | return SUCCEEDED(hr); | ||
45 | } | ||
46 | |||
47 | |||
48 | static HRESULT AddDataToCustomActionData( | ||
49 | __deref_inout_z LPWSTR* psczCustomActionData, | ||
50 | __in_z LPCWSTR wzId, | ||
51 | __in_z LPCWSTR wzPath, | ||
52 | __in int iTouchFileAttributes, | ||
53 | __in FILETIME ftModified | ||
54 | ) | ||
55 | { | ||
56 | HRESULT hr = S_OK; | ||
57 | |||
58 | hr = WcaWriteStringToCaData(wzId, psczCustomActionData); | ||
59 | ExitOnFailure(hr, "Failed to add touch file identity to custom action data."); | ||
60 | |||
61 | hr = WcaWriteStringToCaData(wzPath, psczCustomActionData); | ||
62 | ExitOnFailure(hr, "Failed to add touch file path to custom action data."); | ||
63 | |||
64 | hr = WcaWriteIntegerToCaData(iTouchFileAttributes, psczCustomActionData); | ||
65 | ExitOnFailure(hr, "Failed to add touch file attributes to custom action data."); | ||
66 | |||
67 | hr = WcaWriteIntegerToCaData(ftModified.dwHighDateTime, psczCustomActionData); | ||
68 | ExitOnFailure(hr, "Failed to add touch file high date/time to custom action data."); | ||
69 | |||
70 | hr = WcaWriteIntegerToCaData(ftModified.dwLowDateTime, psczCustomActionData); | ||
71 | ExitOnFailure(hr, "Failed to add touch file low date/time to custom action data."); | ||
72 | |||
73 | LExit: | ||
74 | return hr; | ||
75 | } | ||
76 | |||
77 | |||
78 | static BOOL TryGetExistingFileModifiedTime( | ||
79 | __in_z LPCWSTR wzId, | ||
80 | __in_z LPCWSTR wzPath, | ||
81 | __in BOOL f64Bit, | ||
82 | __inout FILETIME* pftModified | ||
83 | ) | ||
84 | { | ||
85 | HRESULT hr = S_OK; | ||
86 | BOOL fReenableFileSystemRedirection = FALSE; | ||
87 | |||
88 | if (f64Bit) | ||
89 | { | ||
90 | hr = WcaDisableWow64FSRedirection(); | ||
91 | ExitOnFailure(hr, "Failed to disable 64-bit file system redirection to path: '%ls' for: %ls", wzPath, wzId); | ||
92 | |||
93 | fReenableFileSystemRedirection = TRUE; | ||
94 | } | ||
95 | |||
96 | hr = FileGetTime(wzPath, NULL, NULL, pftModified); | ||
97 | if (E_PATHNOTFOUND == hr || E_FILENOTFOUND == hr) | ||
98 | { | ||
99 | // If the file doesn't exist yet there is nothing to rollback (i.e. file will probably be removed during rollback), so | ||
100 | // keep the error code but don't log anything. | ||
101 | } | ||
102 | else if (FAILED(hr)) | ||
103 | { | ||
104 | WcaLog(LOGMSG_STANDARD, "Cannot access modified timestamp for file: '%ls' due to error: 0x%x. Continuing with out rollback for: %ls", wzPath, hr, wzId); | ||
105 | } | ||
106 | |||
107 | LExit: | ||
108 | if (fReenableFileSystemRedirection) | ||
109 | { | ||
110 | WcaRevertWow64FSRedirection(); | ||
111 | } | ||
112 | |||
113 | return SUCCEEDED(hr); | ||
114 | } | ||
115 | |||
116 | |||
117 | static HRESULT ProcessTouchFileTable( | ||
118 | __in BOOL fInstalling | ||
119 | ) | ||
120 | { | ||
121 | HRESULT hr = S_OK; | ||
122 | |||
123 | FILETIME ftModified = {}; | ||
124 | |||
125 | PMSIHANDLE hView; | ||
126 | PMSIHANDLE hRec; | ||
127 | |||
128 | LPWSTR sczId = NULL; | ||
129 | LPWSTR sczComponent = NULL; | ||
130 | int iTouchFileAttributes = 0; | ||
131 | LPWSTR sczPath = NULL; | ||
132 | |||
133 | FILETIME ftRollbackModified = {}; | ||
134 | LPWSTR sczRollbackData = NULL; | ||
135 | LPWSTR sczExecuteData = NULL; | ||
136 | |||
137 | if (S_OK != WcaTableExists(L"Wix4TouchFile")) | ||
138 | { | ||
139 | ExitFunction(); | ||
140 | } | ||
141 | |||
142 | ::GetSystemTimeAsFileTime(&ftModified); | ||
143 | |||
144 | hr = WcaOpenExecuteView(vcsTouchFileQuery, &hView); | ||
145 | ExitOnFailure(hr, "Failed to open view on Wix4TouchFile table"); | ||
146 | |||
147 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
148 | { | ||
149 | hr = WcaGetRecordString(hRec, tfqId, &sczId); | ||
150 | ExitOnFailure(hr, "Failed to get touch file identity."); | ||
151 | |||
152 | hr = WcaGetRecordString(hRec, tfqComponent, &sczComponent); | ||
153 | ExitOnFailure(hr, "Failed to get touch file component for: %ls", sczId); | ||
154 | |||
155 | hr = WcaGetRecordInteger(hRec, tfqTouchFileAttributes, &iTouchFileAttributes); | ||
156 | ExitOnFailure(hr, "Failed to get touch file attributes for: %ls", sczId); | ||
157 | |||
158 | WCA_TODO todo = WcaGetComponentToDo(sczComponent); | ||
159 | |||
160 | BOOL fOnInstall = fInstalling && WCA_TODO_INSTALL == todo && (iTouchFileAttributes & TOUCH_FILE_ATTRIBUTE_ON_INSTALL); | ||
161 | BOOL fOnReinstall = fInstalling && WCA_TODO_REINSTALL == todo && (iTouchFileAttributes & TOUCH_FILE_ATTRIBUTE_ON_REINSTALL); | ||
162 | BOOL fOnUninstall = !fInstalling && WCA_TODO_UNINSTALL == todo && (iTouchFileAttributes & TOUCH_FILE_ATTRIBUTE_ON_UNINSTALL); | ||
163 | |||
164 | if (fOnInstall || fOnReinstall || fOnUninstall) | ||
165 | { | ||
166 | hr = WcaGetRecordFormattedString(hRec, tfqPath, &sczPath); | ||
167 | ExitOnFailure(hr, "Failed to get touch file path for: %ls", sczId); | ||
168 | |||
169 | if (TryGetExistingFileModifiedTime(sczId, sczPath, (iTouchFileAttributes & TOUCH_FILE_ATTRIBUTE_64BIT), &ftRollbackModified)) | ||
170 | { | ||
171 | hr = AddDataToCustomActionData(&sczRollbackData, sczId, sczPath, iTouchFileAttributes, ftRollbackModified); | ||
172 | ExitOnFailure(hr, "Failed to add to rollback custom action data for: %ls", sczId); | ||
173 | } | ||
174 | |||
175 | hr = AddDataToCustomActionData(&sczExecuteData, sczId, sczPath, iTouchFileAttributes, ftModified); | ||
176 | ExitOnFailure(hr, "Failed to add to execute custom action data for: %ls", sczId); | ||
177 | } | ||
178 | } | ||
179 | |||
180 | if (E_NOMOREITEMS == hr) | ||
181 | { | ||
182 | hr = S_OK; | ||
183 | } | ||
184 | ExitOnFailure(hr, "Failure occured while processing Wix4TouchFile table"); | ||
185 | |||
186 | if (sczRollbackData) | ||
187 | { | ||
188 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RollbackTouchFile"), sczRollbackData, 0); | ||
189 | ExitOnFailure(hr, "Failed to schedule RollbackTouchFile"); | ||
190 | } | ||
191 | |||
192 | if (sczExecuteData) | ||
193 | { | ||
194 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"ExecuteTouchFile"), sczExecuteData, 0); | ||
195 | ExitOnFailure(hr, "Failed to schedule ExecuteTouchFile"); | ||
196 | } | ||
197 | |||
198 | LExit: | ||
199 | ReleaseStr(sczExecuteData); | ||
200 | ReleaseStr(sczRollbackData); | ||
201 | ReleaseStr(sczPath); | ||
202 | ReleaseStr(sczComponent); | ||
203 | ReleaseStr(sczId); | ||
204 | |||
205 | return hr; | ||
206 | } | ||
207 | |||
208 | |||
209 | extern "C" UINT WINAPI WixTouchFileDuringInstall( | ||
210 | __in MSIHANDLE hInstall | ||
211 | ) | ||
212 | { | ||
213 | //AssertSz(FALSE, "debug WixTouchFileDuringInstall"); | ||
214 | |||
215 | HRESULT hr = S_OK; | ||
216 | |||
217 | hr = WcaInitialize(hInstall, "WixTouchFileDuringInstall"); | ||
218 | ExitOnFailure(hr, "Failed to initialize WixTouchFileDuringInstall."); | ||
219 | |||
220 | hr = ProcessTouchFileTable(TRUE); | ||
221 | |||
222 | LExit: | ||
223 | DWORD er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
224 | return WcaFinalize(er); | ||
225 | } | ||
226 | |||
227 | |||
228 | extern "C" UINT WINAPI WixTouchFileDuringUninstall( | ||
229 | __in MSIHANDLE hInstall | ||
230 | ) | ||
231 | { | ||
232 | //AssertSz(FALSE, "debug WixTouchFileDuringUninstall"); | ||
233 | |||
234 | HRESULT hr = S_OK; | ||
235 | |||
236 | hr = WcaInitialize(hInstall, "WixTouchFileDuringUninstall"); | ||
237 | ExitOnFailure(hr, "Failed to initialize WixTouchFileDuringUninstall."); | ||
238 | |||
239 | hr = ProcessTouchFileTable(FALSE); | ||
240 | |||
241 | LExit: | ||
242 | DWORD er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
243 | return WcaFinalize(er); | ||
244 | } | ||
245 | |||
246 | |||
247 | extern "C" UINT WINAPI WixExecuteTouchFile( | ||
248 | __in MSIHANDLE hInstall | ||
249 | ) | ||
250 | { | ||
251 | HRESULT hr = S_OK; | ||
252 | |||
253 | LPWSTR sczData = NULL; | ||
254 | LPWSTR pwz = NULL; | ||
255 | |||
256 | LPWSTR sczId = NULL; | ||
257 | LPWSTR sczPath = NULL; | ||
258 | int iTouchFileAttributes = 0; | ||
259 | FILETIME ftModified = {}; | ||
260 | |||
261 | hr = WcaInitialize(hInstall, "WixExecuteTouchFile"); | ||
262 | ExitOnFailure(hr, "Failed to initialize WixExecuteTouchFile."); | ||
263 | |||
264 | hr = WcaGetProperty(L"CustomActionData", &sczData); | ||
265 | ExitOnFailure(hr, "Failed to get custom action data for WixExecuteTouchFile."); | ||
266 | |||
267 | pwz = sczData; | ||
268 | |||
269 | while (pwz && *pwz) | ||
270 | { | ||
271 | hr = WcaReadStringFromCaData(&pwz, &sczId); | ||
272 | ExitOnFailure(hr, "Failed to get touch file identity from custom action data."); | ||
273 | |||
274 | hr = WcaReadStringFromCaData(&pwz, &sczPath); | ||
275 | ExitOnFailure(hr, "Failed to get touch file path from custom action data for: %ls", sczId); | ||
276 | |||
277 | hr = WcaReadIntegerFromCaData(&pwz, &iTouchFileAttributes); | ||
278 | ExitOnFailure(hr, "Failed to get touch file attributes from custom action data for: %ls", sczId); | ||
279 | |||
280 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&ftModified.dwHighDateTime)); | ||
281 | ExitOnFailure(hr, "Failed to get touch file high date/time from custom action data for: %ls", sczId); | ||
282 | |||
283 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&ftModified.dwLowDateTime)); | ||
284 | ExitOnFailure(hr, "Failed to get touch file low date/time from custom action data for: %ls", sczId); | ||
285 | |||
286 | hr = SetExistingFileModifiedTime(sczId, sczPath, (iTouchFileAttributes & TOUCH_FILE_ATTRIBUTE_64BIT), &ftModified); | ||
287 | if (FAILED(hr)) | ||
288 | { | ||
289 | if (iTouchFileAttributes & TOUCH_FILE_ATTRIBUTE_VITAL) | ||
290 | { | ||
291 | ExitOnFailure(hr, "Failed to touch file: '%ls' for: %ls", &sczPath, sczId); | ||
292 | } | ||
293 | else | ||
294 | { | ||
295 | WcaLog(LOGMSG_STANDARD, "Could not touch non-vital file: '%ls' for: %ls with error: 0x%x. Continuing...", sczPath, sczId, hr); | ||
296 | hr = S_OK; | ||
297 | } | ||
298 | } | ||
299 | } | ||
300 | |||
301 | LExit: | ||
302 | ReleaseStr(sczPath); | ||
303 | ReleaseStr(sczId); | ||
304 | ReleaseStr(sczData); | ||
305 | |||
306 | DWORD er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
307 | return WcaFinalize(er); | ||
308 | } | ||
diff --git a/src/ext/Util/ca/XmlConfig.cpp b/src/ext/Util/ca/XmlConfig.cpp new file mode 100644 index 00000000..a1ec9d6f --- /dev/null +++ b/src/ext/Util/ca/XmlConfig.cpp | |||
@@ -0,0 +1,1130 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | #define XMLCONFIG_ELEMENT 0x00000001 | ||
6 | #define XMLCONFIG_VALUE 0x00000002 | ||
7 | #define XMLCONFIG_DOCUMENT 0x00000004 | ||
8 | #define XMLCONFIG_CREATE 0x00000010 | ||
9 | #define XMLCONFIG_DELETE 0x00000020 | ||
10 | #define XMLCONFIG_INSTALL 0x00000100 | ||
11 | #define XMLCONFIG_UNINSTALL 0x00000200 | ||
12 | #define XMLCONFIG_PRESERVE_MODIFIED 0x00001000 | ||
13 | |||
14 | enum eXmlAction | ||
15 | { | ||
16 | xaUnknown = 0, | ||
17 | xaOpenFile, | ||
18 | xaOpenFilex64, | ||
19 | xaWriteValue, | ||
20 | xaWriteDocument, | ||
21 | xaDeleteValue, | ||
22 | xaCreateElement, | ||
23 | xaDeleteElement, | ||
24 | }; | ||
25 | |||
26 | enum eXmlPreserveDate | ||
27 | { | ||
28 | xdDontPreserve = 0, | ||
29 | xdPreserve | ||
30 | }; | ||
31 | |||
32 | LPCWSTR vcsXmlConfigQuery = | ||
33 | L"SELECT `Wix4XmlConfig`.`Wix4XmlConfig`, `Wix4XmlConfig`.`File`, `Wix4XmlConfig`.`ElementId`, `Wix4XmlConfig`.`ElementPath`, `Wix4XmlConfig`.`VerifyPath`, `Wix4XmlConfig`.`Name`, " | ||
34 | L"`Wix4XmlConfig`.`Value`, `Wix4XmlConfig`.`Flags`, `Wix4XmlConfig`.`Component_`, `Component`.`Attributes` " | ||
35 | L"FROM `Wix4XmlConfig`,`Component` WHERE `Wix4XmlConfig`.`Component_`=`Component`.`Component` ORDER BY `File`, `Sequence`"; | ||
36 | enum eXmlConfigQuery { xfqXmlConfig = 1, xfqFile, xfqElementId, xfqElementPath, xfqVerifyPath, xfqName, xfqValue, xfqXmlFlags, xfqComponent, xfqCompAttributes }; | ||
37 | |||
38 | struct XML_CONFIG_CHANGE | ||
39 | { | ||
40 | WCHAR wzId[MAX_DARWIN_KEY + 1]; | ||
41 | |||
42 | WCHAR wzComponent[MAX_DARWIN_KEY + 1]; | ||
43 | INSTALLSTATE isInstalled; | ||
44 | INSTALLSTATE isAction; | ||
45 | |||
46 | WCHAR wzFile[MAX_PATH]; | ||
47 | LPWSTR pwzElementId; | ||
48 | LPWSTR pwzElementPath; | ||
49 | LPWSTR pwzVerifyPath; | ||
50 | WCHAR wzName[MAX_DARWIN_COLUMN]; | ||
51 | LPWSTR pwzValue; | ||
52 | BOOL fInstalledFile; | ||
53 | |||
54 | int iXmlFlags; | ||
55 | int iCompAttributes; | ||
56 | |||
57 | XML_CONFIG_CHANGE* pxfcAdditionalChanges; | ||
58 | int cAdditionalChanges; | ||
59 | |||
60 | XML_CONFIG_CHANGE* pxfcPrev; | ||
61 | XML_CONFIG_CHANGE* pxfcNext; | ||
62 | }; | ||
63 | |||
64 | static HRESULT FreeXmlConfigChangeList( | ||
65 | __in_opt XML_CONFIG_CHANGE* pxfcList | ||
66 | ) | ||
67 | { | ||
68 | HRESULT hr = S_OK; | ||
69 | |||
70 | XML_CONFIG_CHANGE* pxfcDelete; | ||
71 | while(pxfcList) | ||
72 | { | ||
73 | pxfcDelete = pxfcList; | ||
74 | pxfcList = pxfcList->pxfcNext; | ||
75 | |||
76 | if (pxfcDelete->pwzElementId) | ||
77 | { | ||
78 | hr = MemFree(pxfcDelete->pwzElementId); | ||
79 | ExitOnFailure(hr, "failed to free xml config element id in change list item"); | ||
80 | } | ||
81 | |||
82 | if (pxfcDelete->pwzElementPath) | ||
83 | { | ||
84 | hr = MemFree(pxfcDelete->pwzElementPath); | ||
85 | ExitOnFailure(hr, "failed to free xml config element path in change list item"); | ||
86 | } | ||
87 | |||
88 | if (pxfcDelete->pwzVerifyPath) | ||
89 | { | ||
90 | hr = MemFree(pxfcDelete->pwzVerifyPath); | ||
91 | ExitOnFailure(hr, "failed to free xml config verify path in change list item"); | ||
92 | } | ||
93 | |||
94 | if (pxfcDelete->pwzValue) | ||
95 | { | ||
96 | hr = MemFree(pxfcDelete->pwzValue); | ||
97 | ExitOnFailure(hr, "failed to free xml config value in change list item"); | ||
98 | } | ||
99 | |||
100 | hr = MemFree(pxfcDelete); | ||
101 | ExitOnFailure(hr, "failed to free xml config change list item"); | ||
102 | } | ||
103 | |||
104 | LExit: | ||
105 | return hr; | ||
106 | } | ||
107 | |||
108 | static HRESULT AddXmlConfigChangeToList( | ||
109 | __inout XML_CONFIG_CHANGE** ppxfcHead, | ||
110 | __inout XML_CONFIG_CHANGE** ppxfcTail | ||
111 | ) | ||
112 | { | ||
113 | Assert(ppxfcHead && ppxfcTail); | ||
114 | |||
115 | HRESULT hr = S_OK; | ||
116 | |||
117 | XML_CONFIG_CHANGE* pxfc = static_cast<XML_CONFIG_CHANGE*>(MemAlloc(sizeof(XML_CONFIG_CHANGE), TRUE)); | ||
118 | ExitOnNull(pxfc, hr, E_OUTOFMEMORY, "failed to allocate memory for new xml file change list element"); | ||
119 | |||
120 | // Add it to the end of the list | ||
121 | if (NULL == *ppxfcHead) | ||
122 | { | ||
123 | *ppxfcHead = pxfc; | ||
124 | *ppxfcTail = pxfc; | ||
125 | } | ||
126 | else | ||
127 | { | ||
128 | Assert(*ppxfcTail && (*ppxfcTail)->pxfcNext == NULL); | ||
129 | (*ppxfcTail)->pxfcNext = pxfc; | ||
130 | pxfc->pxfcPrev = *ppxfcTail; | ||
131 | *ppxfcTail = pxfc; | ||
132 | } | ||
133 | |||
134 | LExit: | ||
135 | return hr; | ||
136 | } | ||
137 | |||
138 | |||
139 | static HRESULT ReadXmlConfigTable( | ||
140 | __inout XML_CONFIG_CHANGE** ppxfcHead, | ||
141 | __inout XML_CONFIG_CHANGE** ppxfcTail | ||
142 | ) | ||
143 | { | ||
144 | Assert(ppxfcHead && ppxfcTail); | ||
145 | |||
146 | HRESULT hr = S_OK; | ||
147 | UINT er = ERROR_SUCCESS; | ||
148 | |||
149 | PMSIHANDLE hView = NULL; | ||
150 | PMSIHANDLE hRec = NULL; | ||
151 | |||
152 | LPWSTR pwzData = NULL; | ||
153 | |||
154 | // loop through all the xml configurations | ||
155 | hr = WcaOpenExecuteView(vcsXmlConfigQuery, &hView); | ||
156 | ExitOnFailure(hr, "failed to open view on Wix4XmlConfig table"); | ||
157 | |||
158 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
159 | { | ||
160 | hr = AddXmlConfigChangeToList(ppxfcHead, ppxfcTail); | ||
161 | ExitOnFailure(hr, "failed to add xml file change to list"); | ||
162 | |||
163 | // Get record Id | ||
164 | hr = WcaGetRecordString(hRec, xfqXmlConfig, &pwzData); | ||
165 | ExitOnFailure(hr, "failed to get Wix4XmlConfig record Id"); | ||
166 | hr = StringCchCopyW((*ppxfcTail)->wzId, countof((*ppxfcTail)->wzId), pwzData); | ||
167 | ExitOnFailure(hr, "failed to copy Wix4XmlConfig record Id"); | ||
168 | |||
169 | // Get component name | ||
170 | hr = WcaGetRecordString(hRec, xfqComponent, &pwzData); | ||
171 | ExitOnFailure(hr, "failed to get component name for Wix4XmlConfig: %ls", (*ppxfcTail)->wzId); | ||
172 | |||
173 | // Get the component's state | ||
174 | if (pwzData && *pwzData) | ||
175 | { | ||
176 | hr = StringCchCopyW((*ppxfcTail)->wzComponent, countof((*ppxfcTail)->wzComponent), pwzData); | ||
177 | ExitOnFailure(hr, "failed to copy component id"); | ||
178 | |||
179 | er = ::MsiGetComponentStateW(WcaGetInstallHandle(), (*ppxfcTail)->wzComponent, &(*ppxfcTail)->isInstalled, &(*ppxfcTail)->isAction); | ||
180 | ExitOnFailure(hr = HRESULT_FROM_WIN32(er), "failed to get install state for component id"); | ||
181 | } | ||
182 | |||
183 | // Get the xml file | ||
184 | hr = WcaGetRecordFormattedString(hRec, xfqFile, &pwzData); | ||
185 | ExitOnFailure(hr, "failed to get xml file for Wix4XmlConfig: %ls", (*ppxfcTail)->wzId); | ||
186 | hr = StringCchCopyW((*ppxfcTail)->wzFile, countof((*ppxfcTail)->wzFile), pwzData); | ||
187 | ExitOnFailure(hr, "failed to copy xml file path"); | ||
188 | |||
189 | // Figure out if the file is already on the machine or if it's being installed | ||
190 | hr = WcaGetRecordString(hRec, xfqFile, &pwzData); | ||
191 | ExitOnFailure(hr, "failed to get xml file for Wix4XmlConfig: %ls", (*ppxfcTail)->wzId); | ||
192 | if (NULL != wcsstr(pwzData, L"[!") || NULL != wcsstr(pwzData, L"[#")) | ||
193 | { | ||
194 | (*ppxfcTail)->fInstalledFile = TRUE; | ||
195 | } | ||
196 | |||
197 | // Get the Wix4XmlConfig table flags | ||
198 | hr = WcaGetRecordInteger(hRec, xfqXmlFlags, &(*ppxfcTail)->iXmlFlags); | ||
199 | ExitOnFailure(hr, "failed to get Wix4XmlConfig flags for Wix4XmlConfig: %ls", (*ppxfcTail)->wzId); | ||
200 | |||
201 | // Get the Element Id | ||
202 | hr = WcaGetRecordFormattedString(hRec, xfqElementId, &(*ppxfcTail)->pwzElementId); | ||
203 | ExitOnFailure(hr, "failed to get Element Id for Wix4XmlConfig: %ls", (*ppxfcTail)->wzId); | ||
204 | |||
205 | // Get the Element Path | ||
206 | hr = WcaGetRecordFormattedString(hRec, xfqElementPath, &(*ppxfcTail)->pwzElementPath); | ||
207 | ExitOnFailure(hr, "failed to get Element Path for Wix4XmlConfig: %ls", (*ppxfcTail)->wzId); | ||
208 | |||
209 | // Get the Verify Path | ||
210 | hr = WcaGetRecordFormattedString(hRec, xfqVerifyPath, &(*ppxfcTail)->pwzVerifyPath); | ||
211 | ExitOnFailure(hr, "failed to get Verify Path for Wix4XmlConfig: %ls", (*ppxfcTail)->wzId); | ||
212 | |||
213 | // Get the name | ||
214 | hr = WcaGetRecordFormattedString(hRec, xfqName, &pwzData); | ||
215 | ExitOnFailure(hr, "failed to get Name for Wix4XmlConfig: %ls", (*ppxfcTail)->wzId); | ||
216 | hr = StringCchCopyW((*ppxfcTail)->wzName, countof((*ppxfcTail)->wzName), pwzData); | ||
217 | ExitOnFailure(hr, "failed to copy name of element"); | ||
218 | |||
219 | // Get the value | ||
220 | hr = WcaGetRecordFormattedString(hRec, xfqValue, &pwzData); | ||
221 | ExitOnFailure(hr, "failed to get Value for Wix4XmlConfig: %ls", (*ppxfcTail)->wzId); | ||
222 | hr = StrAllocString(&(*ppxfcTail)->pwzValue, pwzData, 0); | ||
223 | ExitOnFailure(hr, "failed to allocate buffer for value"); | ||
224 | |||
225 | // Get the component attributes | ||
226 | hr = WcaGetRecordInteger(hRec, xfqCompAttributes, &(*ppxfcTail)->iCompAttributes); | ||
227 | ExitOnFailure(hr, "failed to get component attributes for Wix4XmlConfig: %ls", (*ppxfcTail)->wzId); | ||
228 | } | ||
229 | |||
230 | // if we looped through all records all is well | ||
231 | if (E_NOMOREITEMS == hr) | ||
232 | { | ||
233 | hr = S_OK; | ||
234 | } | ||
235 | ExitOnFailure(hr, "failed while looping through all objects to secure"); | ||
236 | |||
237 | LExit: | ||
238 | ReleaseStr(pwzData); | ||
239 | |||
240 | return hr; | ||
241 | } | ||
242 | |||
243 | static HRESULT ProcessChanges( | ||
244 | __inout XML_CONFIG_CHANGE** ppxfcHead | ||
245 | ) | ||
246 | { | ||
247 | Assert(ppxfcHead && *ppxfcHead); | ||
248 | HRESULT hr = S_OK; | ||
249 | |||
250 | XML_CONFIG_CHANGE* pxfc = NULL; | ||
251 | XML_CONFIG_CHANGE* pxfcNext = NULL; | ||
252 | XML_CONFIG_CHANGE* pxfcCheck = NULL; | ||
253 | int cAdditionalChanges = 0; | ||
254 | XML_CONFIG_CHANGE* pxfcLast = NULL; | ||
255 | |||
256 | // If there's only one item in the list, none of this matters | ||
257 | if (pxfc && !pxfc->pxfcNext) | ||
258 | { | ||
259 | ExitFunction(); | ||
260 | } | ||
261 | |||
262 | // Loop through the list | ||
263 | pxfc = *ppxfcHead; | ||
264 | while (pxfc) | ||
265 | { | ||
266 | // Keep track of where our next spot will be since our current node may be moved | ||
267 | pxfcNext = pxfc->pxfcNext; | ||
268 | |||
269 | // With each node, check to see if it's element path matches the Id of some other node in the list | ||
270 | pxfcCheck = *ppxfcHead; | ||
271 | while (pxfcCheck) | ||
272 | { | ||
273 | if (pxfc->pwzElementId) | ||
274 | { | ||
275 | if (0 == lstrcmpW(pxfc->pwzElementId, pxfcCheck->wzId) | ||
276 | && 0 == pxfc->iXmlFlags | ||
277 | && XMLCONFIG_CREATE & pxfcCheck->iXmlFlags | ||
278 | && XMLCONFIG_ELEMENT & pxfcCheck->iXmlFlags) | ||
279 | { | ||
280 | // We found a match. First, take it out of the current list | ||
281 | if (pxfc->pxfcPrev) | ||
282 | { | ||
283 | pxfc->pxfcPrev->pxfcNext = pxfc->pxfcNext; | ||
284 | } | ||
285 | else // it was the head. Update the head | ||
286 | { | ||
287 | *ppxfcHead = pxfc->pxfcNext; | ||
288 | } | ||
289 | |||
290 | if (pxfc->pxfcNext) | ||
291 | { | ||
292 | pxfc->pxfcNext->pxfcPrev = pxfc->pxfcPrev; | ||
293 | } | ||
294 | |||
295 | pxfc->pxfcNext = NULL; | ||
296 | pxfc->pxfcPrev = NULL; | ||
297 | |||
298 | // Now, add this node to the end of the matched node's additional changes list | ||
299 | if (!pxfcCheck->pxfcAdditionalChanges) | ||
300 | { | ||
301 | pxfcCheck->pxfcAdditionalChanges = pxfc; | ||
302 | pxfcCheck->cAdditionalChanges = 1; | ||
303 | } | ||
304 | else | ||
305 | { | ||
306 | pxfcLast = pxfcCheck->pxfcAdditionalChanges; | ||
307 | cAdditionalChanges = 1; | ||
308 | while (pxfcLast->pxfcNext) | ||
309 | { | ||
310 | pxfcLast = pxfcLast->pxfcNext; | ||
311 | ++cAdditionalChanges; | ||
312 | } | ||
313 | pxfcLast->pxfcNext = pxfc; | ||
314 | pxfc->pxfcPrev = pxfcLast; | ||
315 | pxfcCheck->cAdditionalChanges = ++cAdditionalChanges; | ||
316 | } | ||
317 | } | ||
318 | else | ||
319 | { | ||
320 | hr = E_NOTFOUND; | ||
321 | ExitOnRootFailure(hr, "failed to find matching ElementId: %ls", pxfc->pwzElementId); | ||
322 | } | ||
323 | } | ||
324 | |||
325 | pxfcCheck = pxfcCheck->pxfcNext; | ||
326 | } | ||
327 | |||
328 | pxfc = pxfcNext; | ||
329 | } | ||
330 | |||
331 | LExit: | ||
332 | |||
333 | return hr; | ||
334 | } | ||
335 | |||
336 | |||
337 | static HRESULT BeginChangeFile( | ||
338 | __in LPCWSTR pwzFile, | ||
339 | __in int iCompAttributes, | ||
340 | __inout LPWSTR* ppwzCustomActionData | ||
341 | ) | ||
342 | { | ||
343 | Assert(pwzFile && *pwzFile && ppwzCustomActionData); | ||
344 | |||
345 | HRESULT hr = S_OK; | ||
346 | BOOL fIs64Bit = iCompAttributes & msidbComponentAttributes64bit; | ||
347 | |||
348 | LPBYTE pbData = NULL; | ||
349 | SIZE_T cbData = 0; | ||
350 | |||
351 | LPWSTR pwzRollbackCustomActionData = NULL; | ||
352 | |||
353 | if (fIs64Bit) | ||
354 | { | ||
355 | hr = WcaWriteIntegerToCaData((int)xaOpenFilex64, ppwzCustomActionData); | ||
356 | ExitOnFailure(hr, "failed to write 64-bit file indicator to custom action data"); | ||
357 | } | ||
358 | else | ||
359 | { | ||
360 | hr = WcaWriteIntegerToCaData((int)xaOpenFile, ppwzCustomActionData); | ||
361 | ExitOnFailure(hr, "failed to write file indicator to custom action data"); | ||
362 | } | ||
363 | |||
364 | hr = WcaWriteStringToCaData(pwzFile, ppwzCustomActionData); | ||
365 | ExitOnFailure(hr, "failed to write file to custom action data: %ls", pwzFile); | ||
366 | |||
367 | // If the file already exits, then we have to put it back the way it was on failure | ||
368 | if (FileExistsEx(pwzFile, NULL)) | ||
369 | { | ||
370 | hr = FileRead(&pbData, &cbData, pwzFile); | ||
371 | ExitOnFailure(hr, "failed to read file: %ls", pwzFile); | ||
372 | |||
373 | // Set up the rollback for this file | ||
374 | hr = WcaWriteIntegerToCaData((int)fIs64Bit, &pwzRollbackCustomActionData); | ||
375 | ExitOnFailure(hr, "failed to write component bitness to rollback custom action data"); | ||
376 | |||
377 | hr = WcaWriteStringToCaData(pwzFile, &pwzRollbackCustomActionData); | ||
378 | ExitOnFailure(hr, "failed to write file name to rollback custom action data: %ls", pwzFile); | ||
379 | |||
380 | hr = WcaWriteStreamToCaData(pbData, cbData, &pwzRollbackCustomActionData); | ||
381 | ExitOnFailure(hr, "failed to write file contents to rollback custom action data."); | ||
382 | |||
383 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"ExecXmlConfigRollback"), pwzRollbackCustomActionData, COST_XMLFILE); | ||
384 | ExitOnFailure(hr, "failed to schedule ExecXmlConfigRollback for file: %ls", pwzFile); | ||
385 | |||
386 | ReleaseStr(pwzRollbackCustomActionData); | ||
387 | } | ||
388 | LExit: | ||
389 | ReleaseMem(pbData); | ||
390 | |||
391 | return hr; | ||
392 | } | ||
393 | |||
394 | |||
395 | static HRESULT WriteChangeData( | ||
396 | __in XML_CONFIG_CHANGE* pxfc, | ||
397 | __in eXmlAction action, | ||
398 | __inout LPWSTR* ppwzCustomActionData | ||
399 | ) | ||
400 | { | ||
401 | Assert(pxfc && ppwzCustomActionData); | ||
402 | |||
403 | HRESULT hr = S_OK; | ||
404 | XML_CONFIG_CHANGE* pxfcAdditionalChanges = NULL; | ||
405 | LPCWSTR wzElementPath = pxfc->pwzElementId ? pxfc->pwzElementId : pxfc->pwzElementPath; | ||
406 | |||
407 | hr = WcaWriteStringToCaData(wzElementPath, ppwzCustomActionData); | ||
408 | ExitOnFailure(hr, "failed to write ElementPath to custom action data: %ls", wzElementPath); | ||
409 | |||
410 | hr = WcaWriteStringToCaData(pxfc->pwzVerifyPath, ppwzCustomActionData); | ||
411 | ExitOnFailure(hr, "failed to write VerifyPath to custom action data: %ls", pxfc->pwzVerifyPath); | ||
412 | |||
413 | hr = WcaWriteStringToCaData(pxfc->wzName, ppwzCustomActionData); | ||
414 | ExitOnFailure(hr, "failed to write Name to custom action data: %ls", pxfc->wzName); | ||
415 | |||
416 | hr = WcaWriteStringToCaData(pxfc->pwzValue, ppwzCustomActionData); | ||
417 | ExitOnFailure(hr, "failed to write Value to custom action data: %ls", pxfc->pwzValue); | ||
418 | |||
419 | if (pxfc->iXmlFlags & XMLCONFIG_CREATE && pxfc->iXmlFlags & XMLCONFIG_ELEMENT && xaCreateElement == action && pxfc->pxfcAdditionalChanges) | ||
420 | { | ||
421 | hr = WcaWriteIntegerToCaData(pxfc->cAdditionalChanges, ppwzCustomActionData); | ||
422 | ExitOnFailure(hr, "failed to write additional changes value to custom action data"); | ||
423 | |||
424 | pxfcAdditionalChanges = pxfc->pxfcAdditionalChanges; | ||
425 | while (pxfcAdditionalChanges) | ||
426 | { | ||
427 | Assert((0 == lstrcmpW(pxfcAdditionalChanges->wzComponent, pxfc->wzComponent)) && 0 == pxfcAdditionalChanges->iXmlFlags && (0 == lstrcmpW(pxfcAdditionalChanges->wzFile, pxfc->wzFile))); | ||
428 | |||
429 | hr = WcaWriteStringToCaData(pxfcAdditionalChanges->wzName, ppwzCustomActionData); | ||
430 | ExitOnFailure(hr, "failed to write Name to custom action data: %ls", pxfc->wzName); | ||
431 | |||
432 | hr = WcaWriteStringToCaData(pxfcAdditionalChanges->pwzValue, ppwzCustomActionData); | ||
433 | ExitOnFailure(hr, "failed to write Value to custom action data: %ls", pxfc->pwzValue); | ||
434 | |||
435 | pxfcAdditionalChanges = pxfcAdditionalChanges->pxfcNext; | ||
436 | } | ||
437 | } | ||
438 | else | ||
439 | { | ||
440 | hr = WcaWriteIntegerToCaData(0, ppwzCustomActionData); | ||
441 | ExitOnFailure(hr, "failed to write additional changes value to custom action data"); | ||
442 | } | ||
443 | |||
444 | LExit: | ||
445 | return hr; | ||
446 | } | ||
447 | |||
448 | |||
449 | /****************************************************************** | ||
450 | SchedXmlConfig - entry point for XmlConfig Custom Action | ||
451 | |||
452 | ********************************************************************/ | ||
453 | extern "C" UINT __stdcall SchedXmlConfig( | ||
454 | __in MSIHANDLE hInstall | ||
455 | ) | ||
456 | { | ||
457 | // AssertSz(FALSE, "debug SchedXmlConfig"); | ||
458 | |||
459 | HRESULT hr = S_OK; | ||
460 | UINT er = ERROR_SUCCESS; | ||
461 | |||
462 | LPWSTR pwzCurrentFile = NULL; | ||
463 | BOOL fCurrentFileChanged = FALSE; | ||
464 | |||
465 | PMSIHANDLE hView = NULL; | ||
466 | PMSIHANDLE hRec = NULL; | ||
467 | |||
468 | XML_CONFIG_CHANGE* pxfcHead = NULL; | ||
469 | XML_CONFIG_CHANGE* pxfcTail = NULL; // TODO: do we need this any more? | ||
470 | XML_CONFIG_CHANGE* pxfc = NULL; | ||
471 | |||
472 | eXmlAction xa = xaUnknown; | ||
473 | eXmlPreserveDate xd; | ||
474 | |||
475 | LPWSTR pwzCustomActionData = NULL; | ||
476 | |||
477 | DWORD cFiles = 0; | ||
478 | |||
479 | // initialize | ||
480 | hr = WcaInitialize(hInstall, "SchedXmlConfig"); | ||
481 | ExitOnFailure(hr, "failed to initialize"); | ||
482 | |||
483 | hr = ReadXmlConfigTable(&pxfcHead, &pxfcTail); | ||
484 | MessageExitOnFailure(hr, msierrXmlConfigFailedRead, "failed to read Wix4XmlConfig table"); | ||
485 | |||
486 | hr = ProcessChanges(&pxfcHead); | ||
487 | ExitOnFailure(hr, "failed to process Wix4XmlConfig changes"); | ||
488 | |||
489 | // loop through all the xml configurations | ||
490 | for (pxfc = pxfcHead; pxfc; pxfc = pxfc->pxfcNext) | ||
491 | { | ||
492 | // If this is a different file, or the first file... | ||
493 | if (NULL == pwzCurrentFile || 0 != lstrcmpW(pwzCurrentFile, pxfc->wzFile)) | ||
494 | { | ||
495 | // Remember the file we're currently working on | ||
496 | hr = StrAllocString(&pwzCurrentFile, pxfc->wzFile, 0); | ||
497 | ExitOnFailure(hr, "failed to copy file name"); | ||
498 | |||
499 | fCurrentFileChanged = TRUE; | ||
500 | } | ||
501 | |||
502 | // | ||
503 | // Figure out what action to take | ||
504 | // | ||
505 | xa = xaUnknown; | ||
506 | |||
507 | // If it's being installed or reinstalled or uninstalled and that matches | ||
508 | // what we are doing then calculate the right action. | ||
509 | if ((XMLCONFIG_INSTALL & pxfc->iXmlFlags && (WcaIsInstalling(pxfc->isInstalled, pxfc->isAction) || WcaIsReInstalling(pxfc->isInstalled, pxfc->isAction))) || | ||
510 | (XMLCONFIG_UNINSTALL & pxfc->iXmlFlags && WcaIsUninstalling(pxfc->isInstalled, pxfc->isAction))) | ||
511 | { | ||
512 | if (XMLCONFIG_CREATE & pxfc->iXmlFlags && XMLCONFIG_ELEMENT & pxfc->iXmlFlags) | ||
513 | { | ||
514 | xa = xaCreateElement; | ||
515 | } | ||
516 | else if (XMLCONFIG_DELETE & pxfc->iXmlFlags && XMLCONFIG_ELEMENT & pxfc->iXmlFlags) | ||
517 | { | ||
518 | xa = xaDeleteElement; | ||
519 | } | ||
520 | else if (XMLCONFIG_DELETE & pxfc->iXmlFlags && XMLCONFIG_VALUE & pxfc->iXmlFlags) | ||
521 | { | ||
522 | xa = xaDeleteValue; | ||
523 | } | ||
524 | else if (XMLCONFIG_CREATE & pxfc->iXmlFlags && XMLCONFIG_VALUE & pxfc->iXmlFlags) | ||
525 | { | ||
526 | xa = xaWriteValue; | ||
527 | } | ||
528 | else if (XMLCONFIG_CREATE & pxfc->iXmlFlags && XMLCONFIG_DOCUMENT & pxfc->iXmlFlags) | ||
529 | { | ||
530 | xa = xaWriteDocument; | ||
531 | } | ||
532 | else if (XMLCONFIG_DELETE & pxfc->iXmlFlags && XMLCONFIG_DOCUMENT & pxfc->iXmlFlags) | ||
533 | { | ||
534 | hr = E_INVALIDARG; | ||
535 | ExitOnFailure(hr, "Invalid flag configuration. Cannot delete a fragment node."); | ||
536 | } | ||
537 | } | ||
538 | |||
539 | if (XMLCONFIG_PRESERVE_MODIFIED & pxfc->iXmlFlags) | ||
540 | { | ||
541 | xd = xdPreserve; | ||
542 | } | ||
543 | else | ||
544 | { | ||
545 | xd= xdDontPreserve; | ||
546 | } | ||
547 | |||
548 | if (xaUnknown != xa) | ||
549 | { | ||
550 | if (fCurrentFileChanged) | ||
551 | { | ||
552 | hr = BeginChangeFile(pwzCurrentFile, pxfc->iCompAttributes, &pwzCustomActionData); | ||
553 | ExitOnFailure(hr, "failed to begin file change for file: %ls", pwzCurrentFile); | ||
554 | |||
555 | fCurrentFileChanged = FALSE; | ||
556 | ++cFiles; | ||
557 | } | ||
558 | |||
559 | hr = WcaWriteIntegerToCaData((int)xa, &pwzCustomActionData); | ||
560 | ExitOnFailure(hr, "failed to write action indicator custom action data"); | ||
561 | |||
562 | hr = WcaWriteIntegerToCaData((int)xd, &pwzCustomActionData); | ||
563 | ExitOnFailure(hr, "failed to write Preserve Date indicator to custom action data"); | ||
564 | |||
565 | hr = WriteChangeData(pxfc, xa, &pwzCustomActionData); | ||
566 | ExitOnFailure(hr, "failed to write change data"); | ||
567 | } | ||
568 | } | ||
569 | |||
570 | // If we looped through all records all is well | ||
571 | if (E_NOMOREITEMS == hr) | ||
572 | { | ||
573 | hr = S_OK; | ||
574 | } | ||
575 | ExitOnFailure(hr, "failed while looping through all objects to secure"); | ||
576 | |||
577 | // Schedule the custom action and add to progress bar | ||
578 | if (pwzCustomActionData && *pwzCustomActionData) | ||
579 | { | ||
580 | Assert(0 < cFiles); | ||
581 | |||
582 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"ExecXmlConfig"), pwzCustomActionData, cFiles * COST_XMLFILE); | ||
583 | ExitOnFailure(hr, "failed to schedule ExecXmlConfig action"); | ||
584 | } | ||
585 | |||
586 | LExit: | ||
587 | ReleaseStr(pwzCurrentFile); | ||
588 | ReleaseStr(pwzCustomActionData); | ||
589 | |||
590 | FreeXmlConfigChangeList(pxfcHead); | ||
591 | |||
592 | if (FAILED(hr)) | ||
593 | { | ||
594 | er = ERROR_INSTALL_FAILURE; | ||
595 | } | ||
596 | return WcaFinalize(er); | ||
597 | } | ||
598 | |||
599 | |||
600 | /****************************************************************** | ||
601 | ExecXmlConfig - entry point for XmlConfig Custom Action | ||
602 | |||
603 | *******************************************************************/ | ||
604 | extern "C" UINT __stdcall ExecXmlConfig( | ||
605 | __in MSIHANDLE hInstall | ||
606 | ) | ||
607 | { | ||
608 | //AssertSz(FALSE, "debug ExecXmlConfig"); | ||
609 | HRESULT hr = S_OK; | ||
610 | HRESULT hrOpenFailure = S_OK; | ||
611 | UINT er = ERROR_SUCCESS; | ||
612 | |||
613 | #ifndef _WIN64 | ||
614 | BOOL fIsFSRedirectDisabled = FALSE; | ||
615 | #endif | ||
616 | BOOL fPreserveDate = FALSE; | ||
617 | |||
618 | LPWSTR pwzCustomActionData = NULL; | ||
619 | LPWSTR pwzData = NULL; | ||
620 | LPWSTR pwzFile = NULL; | ||
621 | LPWSTR pwzElementPath = NULL; | ||
622 | LPWSTR pwzVerifyPath = NULL; | ||
623 | LPWSTR pwzName = NULL; | ||
624 | LPWSTR pwzValue = NULL; | ||
625 | LPWSTR pwz = NULL; | ||
626 | int cAdditionalChanges = 0; | ||
627 | |||
628 | IXMLDOMDocument* pixd = NULL; | ||
629 | IXMLDOMNode* pixn = NULL; | ||
630 | IXMLDOMNode* pixnVerify = NULL; | ||
631 | IXMLDOMNode* pixnNewNode = NULL; | ||
632 | IXMLDOMNode* pixnRemovedChild = NULL; | ||
633 | |||
634 | IXMLDOMDocument* pixdNew = NULL; | ||
635 | IXMLDOMElement* pixeNew = NULL; | ||
636 | |||
637 | FILETIME ft; | ||
638 | |||
639 | int id = IDRETRY; | ||
640 | |||
641 | eXmlAction xa; | ||
642 | eXmlPreserveDate xd; | ||
643 | |||
644 | // initialize | ||
645 | hr = WcaInitialize(hInstall, "ExecXmlConfig"); | ||
646 | ExitOnFailure(hr, "failed to initialize"); | ||
647 | |||
648 | hr = XmlInitialize(); | ||
649 | ExitOnFailure(hr, "failed to initialize xml utilities"); | ||
650 | |||
651 | hr = WcaGetProperty( L"CustomActionData", &pwzCustomActionData); | ||
652 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
653 | |||
654 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzCustomActionData); | ||
655 | |||
656 | pwz = pwzCustomActionData; | ||
657 | |||
658 | hr = WcaReadIntegerFromCaData(&pwz, (int*) &xa); | ||
659 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
660 | |||
661 | #ifndef _WIN64 | ||
662 | // Initialize the Wow64 API - store the result in fWow64APIPresent | ||
663 | // If it fails, this doesn't warrant an error yet, because we only need the Wow64 API in some cases | ||
664 | WcaInitializeWow64(); | ||
665 | BOOL fIsWow64Process = WcaIsWow64Process(); | ||
666 | #endif | ||
667 | |||
668 | if (xaOpenFile != xa && xaOpenFilex64 != xa) | ||
669 | { | ||
670 | ExitOnFailure(hr = E_INVALIDARG, "invalid custom action data"); | ||
671 | } | ||
672 | |||
673 | // loop through all the passed in data | ||
674 | while (pwz && *pwz) | ||
675 | { | ||
676 | hr = WcaReadStringFromCaData(&pwz, &pwzFile); | ||
677 | ExitOnFailure(hr, "failed to read file name from custom action data"); | ||
678 | |||
679 | // Default to not preserve date, preserve it if any modifications require us to | ||
680 | fPreserveDate = FALSE; | ||
681 | |||
682 | // Open the file | ||
683 | ReleaseNullObject(pixd); | ||
684 | |||
685 | #ifndef _WIN64 | ||
686 | if (xaOpenFilex64 == xa) | ||
687 | { | ||
688 | if (!fIsWow64Process) | ||
689 | { | ||
690 | hr = E_NOTIMPL; | ||
691 | ExitOnFailure(hr, "Custom action was told to act on a 64-bit component, but the custom action process is not running in WOW."); | ||
692 | } | ||
693 | |||
694 | hr = WcaDisableWow64FSRedirection(); | ||
695 | ExitOnFailure(hr, "Custom action was told to act on a 64-bit component, but was unable to disable filesystem redirection through the Wow64 API."); | ||
696 | |||
697 | fIsFSRedirectDisabled = TRUE; | ||
698 | } | ||
699 | #endif | ||
700 | |||
701 | hr = XmlLoadDocumentFromFileEx(pwzFile, XML_LOAD_PRESERVE_WHITESPACE, &pixd); | ||
702 | if (FAILED(hr)) | ||
703 | { | ||
704 | // Ignore the return code for now. If they try to add something, we'll fail the install. If all they do is remove stuff then it doesn't matter. | ||
705 | hrOpenFailure = hr; | ||
706 | hr = S_OK; | ||
707 | } | ||
708 | else | ||
709 | { | ||
710 | hrOpenFailure = S_OK; | ||
711 | } | ||
712 | |||
713 | WcaLog(LOGMSG_VERBOSE, "Configuring Xml File: %ls", pwzFile); | ||
714 | |||
715 | while (pwz && *pwz) | ||
716 | { | ||
717 | // If we skip past an element that has additional changes we need to strip them off the stream before | ||
718 | // moving on to the next element. Do that now and then restart the outer loop. | ||
719 | if (cAdditionalChanges > 0) | ||
720 | { | ||
721 | while (cAdditionalChanges > 0) | ||
722 | { | ||
723 | hr = WcaReadStringFromCaData(&pwz, &pwzName); | ||
724 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
725 | hr = WcaReadStringFromCaData(&pwz, &pwzValue); | ||
726 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
727 | |||
728 | cAdditionalChanges--; | ||
729 | } | ||
730 | continue; | ||
731 | } | ||
732 | |||
733 | hr = WcaReadIntegerFromCaData(&pwz, (int*) &xa); | ||
734 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
735 | |||
736 | // Break if we need to move on to a different file | ||
737 | if (xaOpenFile == xa || xaOpenFilex64 == xa) | ||
738 | { | ||
739 | break; | ||
740 | } | ||
741 | |||
742 | hr = WcaReadIntegerFromCaData(&pwz, (int*) &xd); | ||
743 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
744 | |||
745 | if (xdPreserve == xd) | ||
746 | { | ||
747 | fPreserveDate = TRUE; | ||
748 | } | ||
749 | |||
750 | // Get path, name, and value to be written | ||
751 | hr = WcaReadStringFromCaData(&pwz, &pwzElementPath); | ||
752 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
753 | hr = WcaReadStringFromCaData(&pwz, &pwzVerifyPath); | ||
754 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
755 | hr = WcaReadStringFromCaData(&pwz, &pwzName); | ||
756 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
757 | hr = WcaReadStringFromCaData(&pwz, &pwzValue); | ||
758 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
759 | hr = WcaReadIntegerFromCaData(&pwz, &cAdditionalChanges); | ||
760 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
761 | |||
762 | // If we failed to open the file and we're adding something to the file, we've got a problem. Otherwise, just continue on since the file's already gone. | ||
763 | if (FAILED(hrOpenFailure)) | ||
764 | { | ||
765 | if (xaCreateElement == xa || xaWriteValue == xa || xaWriteDocument == xa) | ||
766 | { | ||
767 | MessageExitOnFailure(hr = hrOpenFailure, msierrXmlConfigFailedOpen, "failed to load XML file: %ls", pwzFile); | ||
768 | } | ||
769 | else | ||
770 | { | ||
771 | continue; | ||
772 | } | ||
773 | } | ||
774 | |||
775 | // Select the node we're about to modify | ||
776 | ReleaseNullObject(pixn); | ||
777 | |||
778 | hr = XmlSelectSingleNode(pixd, pwzElementPath, &pixn); | ||
779 | |||
780 | // If we failed to find the node that we are going to add to, we've got a problem. Otherwise, just continue since the node's already gone. | ||
781 | if (S_FALSE == hr) | ||
782 | { | ||
783 | if (xaCreateElement == xa || xaWriteValue == xa || xaWriteDocument == xa) | ||
784 | { | ||
785 | hr = HRESULT_FROM_WIN32(ERROR_OBJECT_NOT_FOUND); | ||
786 | } | ||
787 | else | ||
788 | { | ||
789 | hr = S_OK; | ||
790 | continue; | ||
791 | } | ||
792 | } | ||
793 | |||
794 | MessageExitOnFailure(hr, msierrXmlConfigFailedSelect, "failed to find node: %ls in XML file: %ls", pwzElementPath, pwzFile); | ||
795 | |||
796 | // Make the modification | ||
797 | switch (xa) | ||
798 | { | ||
799 | case xaWriteValue: | ||
800 | if (pwzName && *pwzName) | ||
801 | { | ||
802 | // We're setting an attribute | ||
803 | hr = XmlSetAttribute(pixn, pwzName, pwzValue); | ||
804 | ExitOnFailure(hr, "failed to set attribute: %ls to value %ls", pwzName, pwzValue); | ||
805 | } | ||
806 | else | ||
807 | { | ||
808 | // We're setting the text of the node | ||
809 | hr = XmlSetText(pixn, pwzValue); | ||
810 | ExitOnFailure(hr, "failed to set text to: %ls for element %ls. Make sure that XPath points to an element.", pwzValue, pwzElementPath); | ||
811 | } | ||
812 | break; | ||
813 | case xaWriteDocument: | ||
814 | if (NULL != pwzVerifyPath && 0 != pwzVerifyPath[0]) | ||
815 | { | ||
816 | hr = XmlSelectSingleNode(pixn, pwzVerifyPath, &pixnVerify); | ||
817 | if (S_OK == hr) | ||
818 | { | ||
819 | // We found the verify path which means we have no further work to do | ||
820 | continue; | ||
821 | } | ||
822 | ExitOnFailure(hr, "failed to query verify path: %ls", pwzVerifyPath); | ||
823 | } | ||
824 | |||
825 | hr = XmlLoadDocumentEx(pwzValue, XML_LOAD_PRESERVE_WHITESPACE, &pixdNew); | ||
826 | ExitOnFailure(hr, "Failed to load value as document."); | ||
827 | |||
828 | hr = pixdNew->get_documentElement(&pixeNew); | ||
829 | ExitOnFailure(hr, "Failed to get document element."); | ||
830 | |||
831 | hr = pixn->appendChild(pixeNew, NULL); | ||
832 | ExitOnFailure(hr, "Failed to append document element on to parent element."); | ||
833 | |||
834 | ReleaseNullObject(pixeNew); | ||
835 | ReleaseNullObject(pixdNew); | ||
836 | break; | ||
837 | |||
838 | case xaCreateElement: | ||
839 | if (NULL != pwzVerifyPath && 0 != pwzVerifyPath[0]) | ||
840 | { | ||
841 | hr = XmlSelectSingleNode(pixn, pwzVerifyPath, &pixnVerify); | ||
842 | if (S_OK == hr) | ||
843 | { | ||
844 | // We found the verify path which means we have no further work to do | ||
845 | continue; | ||
846 | } | ||
847 | ExitOnFailure(hr, "failed to query verify path: %ls", pwzVerifyPath); | ||
848 | } | ||
849 | |||
850 | hr = XmlCreateChild(pixn, pwzName, &pixnNewNode); | ||
851 | ExitOnFailure(hr, "failed to create child element: %ls", pwzName); | ||
852 | |||
853 | if (pwzValue && *pwzValue) | ||
854 | { | ||
855 | hr = XmlSetText(pixnNewNode, pwzValue); | ||
856 | ExitOnFailure(hr, "failed to set text to: %ls for node: %ls", pwzValue, pwzName); | ||
857 | } | ||
858 | |||
859 | while (cAdditionalChanges > 0) | ||
860 | { | ||
861 | hr = WcaReadStringFromCaData(&pwz, &pwzName); | ||
862 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
863 | hr = WcaReadStringFromCaData(&pwz, &pwzValue); | ||
864 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
865 | |||
866 | // Set the additional attribute | ||
867 | hr = XmlSetAttribute(pixnNewNode, pwzName, pwzValue); | ||
868 | ExitOnFailure(hr, "failed to set attribute: %ls to value %ls", pwzName, pwzValue); | ||
869 | |||
870 | cAdditionalChanges--; | ||
871 | } | ||
872 | |||
873 | ReleaseNullObject(pixnNewNode); | ||
874 | break; | ||
875 | case xaDeleteValue: | ||
876 | if (pwzName && *pwzName) | ||
877 | { | ||
878 | // Delete the attribute | ||
879 | hr = XmlRemoveAttribute(pixn, pwzName); | ||
880 | ExitOnFailure(hr, "failed to remove attribute: %ls", pwzName); | ||
881 | } | ||
882 | else | ||
883 | { | ||
884 | // Clear the text value for the node | ||
885 | hr = XmlSetText(pixn, L""); | ||
886 | ExitOnFailure(hr, "failed to clear text value"); | ||
887 | } | ||
888 | break; | ||
889 | case xaDeleteElement: | ||
890 | if (NULL != pwzVerifyPath && 0 != pwzVerifyPath[0]) | ||
891 | { | ||
892 | hr = XmlSelectSingleNode(pixn, pwzVerifyPath, &pixnVerify); | ||
893 | if (S_OK == hr) | ||
894 | { | ||
895 | hr = pixn->removeChild(pixnVerify, &pixnRemovedChild); | ||
896 | ExitOnFailure(hr, "failed to remove created child element"); | ||
897 | |||
898 | ReleaseNullObject(pixnRemovedChild); | ||
899 | } | ||
900 | else | ||
901 | { | ||
902 | WcaLog(LOGMSG_VERBOSE, "Failed to select path %ls for deleting. Skipping...", pwzVerifyPath); | ||
903 | hr = S_OK; | ||
904 | } | ||
905 | } | ||
906 | else | ||
907 | { | ||
908 | // TODO: This requires a VerifyPath to delete an element. Should we support not having one? | ||
909 | WcaLog(LOGMSG_VERBOSE, "No VerifyPath specified for delete element of ID: %ls", pwzElementPath); | ||
910 | } | ||
911 | break; | ||
912 | default: | ||
913 | ExitOnFailure(hr = E_UNEXPECTED, "Invalid modification specified in custom action data"); | ||
914 | break; | ||
915 | } | ||
916 | } | ||
917 | |||
918 | |||
919 | // Now that we've made all of the changes to this file, save it and move on to the next | ||
920 | if (S_OK == hrOpenFailure) | ||
921 | { | ||
922 | if (fPreserveDate) | ||
923 | { | ||
924 | hr = FileGetTime(pwzFile, NULL, NULL, &ft); | ||
925 | ExitOnFailure(hr, "failed to get modified time of file : %ls", pwzFile); | ||
926 | } | ||
927 | |||
928 | int iSaveAttempt = 0; | ||
929 | |||
930 | do | ||
931 | { | ||
932 | hr = XmlSaveDocument(pixd, pwzFile); | ||
933 | if (FAILED(hr)) | ||
934 | { | ||
935 | id = WcaErrorMessage(msierrXmlConfigFailedSave, hr, INSTALLMESSAGE_ERROR | MB_ABORTRETRYIGNORE, 1, pwzFile); | ||
936 | switch (id) | ||
937 | { | ||
938 | case IDABORT: | ||
939 | ExitOnFailure(hr, "Failed to save changes to XML file: %ls", pwzFile); | ||
940 | case IDRETRY: | ||
941 | hr = S_FALSE; // hit me, baby, one more time | ||
942 | break; | ||
943 | case IDIGNORE: | ||
944 | hr = S_OK; // pretend everything is okay and bail | ||
945 | break; | ||
946 | case 0: // No UI case, MsiProcessMessage returns 0 | ||
947 | if (STIERR_SHARING_VIOLATION == hr) | ||
948 | { | ||
949 | // Only in case of sharing violation do we retry 30 times, once a second. | ||
950 | if (iSaveAttempt < 30) | ||
951 | { | ||
952 | hr = S_FALSE; | ||
953 | ++iSaveAttempt; | ||
954 | WcaLog(LOGMSG_VERBOSE, "Unable to save changes to XML file: %ls, retry attempt: %x", pwzFile, iSaveAttempt); | ||
955 | Sleep(1000); | ||
956 | } | ||
957 | else | ||
958 | { | ||
959 | ExitOnFailure(hr, "Failed to save changes to XML file: %ls", pwzFile); | ||
960 | } | ||
961 | } | ||
962 | break; | ||
963 | default: // Unknown error | ||
964 | ExitOnFailure(hr, "Failed to save changes to XML file: %ls", pwzFile); | ||
965 | } | ||
966 | } | ||
967 | } while (S_FALSE == hr); | ||
968 | |||
969 | if (fPreserveDate) | ||
970 | { | ||
971 | hr = FileSetTime(pwzFile, NULL, NULL, &ft); | ||
972 | ExitOnFailure(hr, "failed to set modified time of file : %ls", pwzFile); | ||
973 | } | ||
974 | |||
975 | #ifndef _WIN64 | ||
976 | if (fIsFSRedirectDisabled) | ||
977 | { | ||
978 | fIsFSRedirectDisabled = FALSE; | ||
979 | WcaRevertWow64FSRedirection(); | ||
980 | } | ||
981 | #endif | ||
982 | } | ||
983 | } | ||
984 | |||
985 | LExit: | ||
986 | #ifndef _WIN64 | ||
987 | // Make sure we revert FS Redirection if necessary before exiting | ||
988 | if (fIsFSRedirectDisabled) | ||
989 | { | ||
990 | fIsFSRedirectDisabled = FALSE; | ||
991 | WcaRevertWow64FSRedirection(); | ||
992 | } | ||
993 | WcaFinalizeWow64(); | ||
994 | #endif | ||
995 | |||
996 | ReleaseStr(pwzCustomActionData); | ||
997 | ReleaseStr(pwzData); | ||
998 | ReleaseStr(pwzFile); | ||
999 | ReleaseStr(pwzElementPath); | ||
1000 | ReleaseStr(pwzVerifyPath); | ||
1001 | ReleaseStr(pwzName); | ||
1002 | ReleaseStr(pwzValue); | ||
1003 | |||
1004 | ReleaseObject(pixeNew); | ||
1005 | ReleaseObject(pixdNew); | ||
1006 | |||
1007 | ReleaseObject(pixn); | ||
1008 | ReleaseObject(pixd); | ||
1009 | ReleaseObject(pixnNewNode); | ||
1010 | ReleaseObject(pixnRemovedChild); | ||
1011 | |||
1012 | XmlUninitialize(); | ||
1013 | |||
1014 | if (FAILED(hr)) | ||
1015 | { | ||
1016 | er = ERROR_INSTALL_FAILURE; | ||
1017 | } | ||
1018 | return WcaFinalize(er); | ||
1019 | } | ||
1020 | |||
1021 | |||
1022 | /****************************************************************** | ||
1023 | ExecXmlConfigRollback - entry point for XmlConfig rollback Custom Action | ||
1024 | |||
1025 | *******************************************************************/ | ||
1026 | extern "C" UINT __stdcall ExecXmlConfigRollback( | ||
1027 | __in MSIHANDLE hInstall | ||
1028 | ) | ||
1029 | { | ||
1030 | // AssertSz(FALSE, "debug ExecXmlConfigRollback"); | ||
1031 | HRESULT hr = S_OK; | ||
1032 | UINT er = ERROR_SUCCESS; | ||
1033 | |||
1034 | int iIs64Bit; | ||
1035 | #ifndef _WIN64 | ||
1036 | BOOL fIs64Bit = FALSE; | ||
1037 | #endif | ||
1038 | |||
1039 | LPWSTR pwzCustomActionData = NULL; | ||
1040 | LPWSTR pwz = NULL; | ||
1041 | LPWSTR pwzFileName = NULL; | ||
1042 | LPBYTE pbData = NULL; | ||
1043 | DWORD_PTR cbData = 0; | ||
1044 | |||
1045 | FILETIME ft; | ||
1046 | |||
1047 | HANDLE hFile = INVALID_HANDLE_VALUE; | ||
1048 | |||
1049 | // initialize | ||
1050 | hr = WcaInitialize(hInstall, "ExecXmlConfigRollback"); | ||
1051 | ExitOnFailure(hr, "failed to initialize"); | ||
1052 | |||
1053 | |||
1054 | hr = WcaGetProperty( L"CustomActionData", &pwzCustomActionData); | ||
1055 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
1056 | |||
1057 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzCustomActionData); | ||
1058 | |||
1059 | pwz = pwzCustomActionData; | ||
1060 | |||
1061 | hr = WcaReadIntegerFromCaData(&pwz, &iIs64Bit); | ||
1062 | ExitOnFailure(hr, "failed to read component bitness from custom action data"); | ||
1063 | |||
1064 | hr = WcaReadStringFromCaData(&pwz, &pwzFileName); | ||
1065 | ExitOnFailure(hr, "failed to read file name from custom action data"); | ||
1066 | |||
1067 | hr = WcaReadStreamFromCaData(&pwz, &pbData, &cbData); | ||
1068 | ExitOnFailure(hr, "failed to read file contents from custom action data"); | ||
1069 | |||
1070 | #ifndef _WIN64 | ||
1071 | fIs64Bit = (BOOL)iIs64Bit; | ||
1072 | |||
1073 | if (fIs64Bit) | ||
1074 | { | ||
1075 | hr = WcaInitializeWow64(); | ||
1076 | if (S_FALSE == hr) | ||
1077 | { | ||
1078 | hr = TYPE_E_DLLFUNCTIONNOTFOUND; | ||
1079 | } | ||
1080 | ExitOnFailure(hr, "failed to initialize Wow64 API"); | ||
1081 | |||
1082 | if (!WcaIsWow64Process()) | ||
1083 | { | ||
1084 | hr = E_NOTIMPL; | ||
1085 | ExitOnFailure(hr, "Custom action was told to rollback a 64-bit component, but the Wow64 API is unavailable."); | ||
1086 | } | ||
1087 | |||
1088 | hr = WcaDisableWow64FSRedirection(); | ||
1089 | ExitOnFailure(hr, "Custom action was told to rollback a 64-bit component, but was unable to Disable Filesystem Redirection through the Wow64 API."); | ||
1090 | } | ||
1091 | #endif | ||
1092 | |||
1093 | hr = FileGetTime(pwzFileName, NULL, NULL, &ft); | ||
1094 | ExitOnFailure(hr, "Failed to get modified date of file %ls.", pwzFileName); | ||
1095 | |||
1096 | // Open the file | ||
1097 | hFile = ::CreateFileW(pwzFileName, GENERIC_WRITE, NULL, NULL, TRUNCATE_EXISTING, NULL, NULL); | ||
1098 | ExitOnInvalidHandleWithLastError(hFile, hr, "failed to open file: %ls", pwzFileName); | ||
1099 | |||
1100 | // Write out the old data | ||
1101 | hr = FileWriteHandle(hFile, pbData, cbData); | ||
1102 | ExitOnFailure(hr, "failed to write to file: %ls", pwzFileName); | ||
1103 | |||
1104 | ReleaseFile(hFile); | ||
1105 | |||
1106 | hr = FileSetTime(pwzFileName, NULL, NULL, &ft); | ||
1107 | ExitOnFailure(hr, "Failed to set modified date of file %ls.", pwzFileName); | ||
1108 | |||
1109 | LExit: | ||
1110 | ReleaseStr(pwzCustomActionData); | ||
1111 | ReleaseStr(pwzFileName); | ||
1112 | |||
1113 | ReleaseFile(hFile); | ||
1114 | |||
1115 | #ifndef _WIN64 | ||
1116 | if (fIs64Bit) | ||
1117 | { | ||
1118 | WcaRevertWow64FSRedirection(); | ||
1119 | WcaFinalizeWow64(); | ||
1120 | } | ||
1121 | #endif | ||
1122 | |||
1123 | ReleaseMem(pbData); | ||
1124 | |||
1125 | if (FAILED(hr)) | ||
1126 | { | ||
1127 | er = ERROR_INSTALL_FAILURE; | ||
1128 | } | ||
1129 | return WcaFinalize(er); | ||
1130 | } | ||
diff --git a/src/ext/Util/ca/XmlFile.cpp b/src/ext/Util/ca/XmlFile.cpp new file mode 100644 index 00000000..04a4ae98 --- /dev/null +++ b/src/ext/Util/ca/XmlFile.cpp | |||
@@ -0,0 +1,940 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | #define XMLFILE_CREATE_ELEMENT 0x00000001 | ||
6 | #define XMLFILE_DELETE_VALUE 0x00000002 | ||
7 | #define XMLFILE_BULKWRITE_VALUE 0x00000004 | ||
8 | |||
9 | #define XMLFILE_DONT_UNINSTALL 0x00010000 | ||
10 | #define XMLFILE_PRESERVE_MODIFIED 0x00001000 | ||
11 | #define XMLFILE_USE_XPATH 0x00000100 | ||
12 | |||
13 | extern BOOL vfMsxml30; | ||
14 | |||
15 | enum eXmlAction | ||
16 | { | ||
17 | xaOpenFile = 1, | ||
18 | xaOpenFilex64, | ||
19 | xaWriteValue, | ||
20 | xaDeleteValue, | ||
21 | xaCreateElement, | ||
22 | xaDeleteElement, | ||
23 | xaBulkWriteValue, | ||
24 | }; | ||
25 | |||
26 | enum eXmlPreserveDate | ||
27 | { | ||
28 | xdDontPreserve = 0, | ||
29 | xdPreserve | ||
30 | }; | ||
31 | |||
32 | enum eXmlSelectionLanguage | ||
33 | { | ||
34 | xsXSLPattern = 0, | ||
35 | xsXPath = 1, | ||
36 | }; | ||
37 | |||
38 | LPCWSTR vcsXmlFileQuery = | ||
39 | L"SELECT `Wix4XmlFile`.`Wix4XmlFile`, `Wix4XmlFile`.`File`, `Wix4XmlFile`.`ElementPath`, `Wix4XmlFile`.`Name`, `Wix4XmlFile`.`Value`, " | ||
40 | L"`Wix4XmlFile`.`Flags`, `Wix4XmlFile`.`Component_`, `Component`.`Attributes` " | ||
41 | L"FROM `Wix4XmlFile`,`Component` WHERE `Wix4XmlFile`.`Component_`=`Component`.`Component` ORDER BY `File`, `Sequence`"; | ||
42 | enum eXmlFileQuery { xfqXmlFile = 1, xfqFile, xfqXPath, xfqName, xfqValue, xfqXmlFlags, xfqComponent, xfqCompAttributes }; | ||
43 | |||
44 | struct XML_FILE_CHANGE | ||
45 | { | ||
46 | WCHAR wzId[MAX_DARWIN_KEY]; | ||
47 | |||
48 | INSTALLSTATE isInstalled; | ||
49 | INSTALLSTATE isAction; | ||
50 | |||
51 | WCHAR wzFile[MAX_PATH]; | ||
52 | LPWSTR pwzElementPath; | ||
53 | WCHAR wzName[MAX_DARWIN_COLUMN]; | ||
54 | LPWSTR pwzValue; | ||
55 | |||
56 | int iXmlFlags; | ||
57 | int iCompAttributes; | ||
58 | |||
59 | XML_FILE_CHANGE* pxfcPrev; | ||
60 | XML_FILE_CHANGE* pxfcNext; | ||
61 | }; | ||
62 | |||
63 | //static HRESULT FreeXmlFileChangeList( | ||
64 | // __in XML_FILE_CHANGE* pxfcList | ||
65 | // ) | ||
66 | //{ | ||
67 | // HRESULT hr = S_OK; | ||
68 | // | ||
69 | // XML_FILE_CHANGE* pxfcDelete; | ||
70 | // while(pxfcList) | ||
71 | // { | ||
72 | // pxfcDelete = pxfcList; | ||
73 | // pxfcList = pxfcList->pxfcNext; | ||
74 | // | ||
75 | // ReleaseStr(pxfcDelete->pwzElementPath); | ||
76 | // ReleaseStr(pxfcDelete->pwzValue); | ||
77 | // | ||
78 | // hr = MemFree(pxfcDelete); | ||
79 | // ExitOnFailure(hr, "failed to free xml file change list item"); | ||
80 | // } | ||
81 | // | ||
82 | //LExit: | ||
83 | // return hr; | ||
84 | //} | ||
85 | |||
86 | static HRESULT AddXmlFileChangeToList( | ||
87 | __inout XML_FILE_CHANGE** ppxfcHead, | ||
88 | __inout XML_FILE_CHANGE** ppxfcTail | ||
89 | ) | ||
90 | { | ||
91 | Assert(ppxfcHead && ppxfcTail); | ||
92 | |||
93 | HRESULT hr = S_OK; | ||
94 | |||
95 | XML_FILE_CHANGE* pxfc = static_cast<XML_FILE_CHANGE*>(MemAlloc(sizeof(XML_FILE_CHANGE), TRUE)); | ||
96 | ExitOnNull(pxfc, hr, E_OUTOFMEMORY, "failed to allocate memory for new xml file change list element"); | ||
97 | |||
98 | // Add it to the end of the list | ||
99 | if (NULL == *ppxfcHead) | ||
100 | { | ||
101 | *ppxfcHead = pxfc; | ||
102 | *ppxfcTail = pxfc; | ||
103 | } | ||
104 | else | ||
105 | { | ||
106 | Assert(*ppxfcTail && (*ppxfcTail)->pxfcNext == NULL); | ||
107 | (*ppxfcTail)->pxfcNext = pxfc; | ||
108 | pxfc->pxfcPrev = *ppxfcTail; | ||
109 | *ppxfcTail = pxfc; | ||
110 | } | ||
111 | |||
112 | LExit: | ||
113 | return hr; | ||
114 | } | ||
115 | |||
116 | |||
117 | static HRESULT ReadXmlFileTable( | ||
118 | __inout XML_FILE_CHANGE** ppxfcHead, | ||
119 | __inout XML_FILE_CHANGE** ppxfcTail | ||
120 | ) | ||
121 | { | ||
122 | Assert(ppxfcHead && ppxfcTail); | ||
123 | |||
124 | HRESULT hr = S_OK; | ||
125 | UINT er = ERROR_SUCCESS; | ||
126 | |||
127 | PMSIHANDLE hView = NULL; | ||
128 | PMSIHANDLE hRec = NULL; | ||
129 | |||
130 | LPWSTR pwzData = NULL; | ||
131 | |||
132 | // check to see if necessary tables are specified | ||
133 | if (S_FALSE == WcaTableExists(L"Wix4XmlFile")) | ||
134 | { | ||
135 | ExitFunction1(hr = S_FALSE); | ||
136 | } | ||
137 | |||
138 | // loop through all the xml configurations | ||
139 | hr = WcaOpenExecuteView(vcsXmlFileQuery, &hView); | ||
140 | ExitOnFailure(hr, "failed to open view on Wix4XmlFile table"); | ||
141 | |||
142 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
143 | { | ||
144 | hr = AddXmlFileChangeToList(ppxfcHead, ppxfcTail); | ||
145 | ExitOnFailure(hr, "failed to add xml file change to list"); | ||
146 | |||
147 | // Get record Id | ||
148 | hr = WcaGetRecordString(hRec, xfqXmlFile, &pwzData); | ||
149 | ExitOnFailure(hr, "failed to get Wix4XmlFile record Id"); | ||
150 | hr = StringCchCopyW((*ppxfcTail)->wzId, countof((*ppxfcTail)->wzId), pwzData); | ||
151 | ExitOnFailure(hr, "failed to copy Wix4XmlFile record Id"); | ||
152 | |||
153 | // Get component name | ||
154 | hr = WcaGetRecordString(hRec, xfqComponent, &pwzData); | ||
155 | ExitOnFailure(hr, "failed to get component name for Wix4XmlFile: %ls", (*ppxfcTail)->wzId); | ||
156 | |||
157 | // Get the component's state | ||
158 | er = ::MsiGetComponentStateW(WcaGetInstallHandle(), pwzData, &(*ppxfcTail)->isInstalled, &(*ppxfcTail)->isAction); | ||
159 | ExitOnFailure(hr = HRESULT_FROM_WIN32(er), "failed to get install state for Component: %ls", pwzData); | ||
160 | |||
161 | // Get the xml file | ||
162 | hr = WcaGetRecordFormattedString(hRec, xfqFile, &pwzData); | ||
163 | ExitOnFailure(hr, "failed to get xml file for Wix4XmlFile: %ls", (*ppxfcTail)->wzId); | ||
164 | hr = StringCchCopyW((*ppxfcTail)->wzFile, countof((*ppxfcTail)->wzFile), pwzData); | ||
165 | ExitOnFailure(hr, "failed to copy xml file path"); | ||
166 | |||
167 | // Get the Wix4XmlFile table flags | ||
168 | hr = WcaGetRecordInteger(hRec, xfqXmlFlags, &(*ppxfcTail)->iXmlFlags); | ||
169 | ExitOnFailure(hr, "failed to get Wix4XmlFile flags for Wix4XmlFile: %ls", (*ppxfcTail)->wzId); | ||
170 | |||
171 | // Get the XPath | ||
172 | hr = WcaGetRecordFormattedString(hRec, xfqXPath, &(*ppxfcTail)->pwzElementPath); | ||
173 | ExitOnFailure(hr, "failed to get XPath for Wix4XmlFile: %ls", (*ppxfcTail)->wzId); | ||
174 | |||
175 | // Get the name | ||
176 | hr = WcaGetRecordFormattedString(hRec, xfqName, &pwzData); | ||
177 | ExitOnFailure(hr, "failed to get Name for Wix4XmlFile: %ls", (*ppxfcTail)->wzId); | ||
178 | hr = StringCchCopyW((*ppxfcTail)->wzName, countof((*ppxfcTail)->wzName), pwzData); | ||
179 | ExitOnFailure(hr, "failed to copy name of element"); | ||
180 | |||
181 | // Get the value | ||
182 | hr = WcaGetRecordFormattedString(hRec, xfqValue, &pwzData); | ||
183 | ExitOnFailure(hr, "failed to get Value for Wix4XmlFile: %ls", (*ppxfcTail)->wzId); | ||
184 | hr = StrAllocString(&(*ppxfcTail)->pwzValue, pwzData, 0); | ||
185 | ExitOnFailure(hr, "failed to allocate buffer for value"); | ||
186 | |||
187 | // Get the component attributes | ||
188 | hr = WcaGetRecordInteger(hRec, xfqCompAttributes, &(*ppxfcTail)->iCompAttributes); | ||
189 | ExitOnFailure(hr, "failed to get component attributes for Wix4XmlFile: %ls", (*ppxfcTail)->wzId); | ||
190 | } | ||
191 | |||
192 | // if we looped through all records all is well | ||
193 | if (E_NOMOREITEMS == hr) | ||
194 | hr = S_OK; | ||
195 | ExitOnFailure(hr, "failed while looping through all objects to secure"); | ||
196 | |||
197 | LExit: | ||
198 | ReleaseStr(pwzData); | ||
199 | |||
200 | return hr; | ||
201 | } | ||
202 | |||
203 | |||
204 | static HRESULT BeginChangeFile( | ||
205 | __in LPCWSTR pwzFile, | ||
206 | __in XML_FILE_CHANGE* pxfc, | ||
207 | __inout LPWSTR* ppwzCustomActionData | ||
208 | ) | ||
209 | { | ||
210 | Assert(pwzFile && *pwzFile && ppwzCustomActionData); | ||
211 | |||
212 | HRESULT hr = S_OK; | ||
213 | BOOL fIs64Bit = pxfc->iCompAttributes & msidbComponentAttributes64bit; | ||
214 | BOOL fUseXPath = pxfc->iXmlFlags & XMLFILE_USE_XPATH; | ||
215 | LPBYTE pbData = NULL; | ||
216 | SIZE_T cbData = 0; | ||
217 | |||
218 | LPWSTR pwzRollbackCustomActionData = NULL; | ||
219 | |||
220 | if (fIs64Bit) | ||
221 | { | ||
222 | hr = WcaWriteIntegerToCaData((int)xaOpenFilex64, ppwzCustomActionData); | ||
223 | ExitOnFailure(hr, "failed to write 64-bit file indicator to custom action data"); | ||
224 | } | ||
225 | else | ||
226 | { | ||
227 | hr = WcaWriteIntegerToCaData((int)xaOpenFile, ppwzCustomActionData); | ||
228 | ExitOnFailure(hr, "failed to write file indicator to custom action data"); | ||
229 | } | ||
230 | if (fUseXPath) | ||
231 | { | ||
232 | hr = WcaWriteIntegerToCaData((int)xsXPath, ppwzCustomActionData); | ||
233 | ExitOnFailure(hr, "failed to write XPath selectionlanguage indicator to custom action data"); | ||
234 | } | ||
235 | else | ||
236 | { | ||
237 | hr = WcaWriteIntegerToCaData((int)xsXSLPattern, ppwzCustomActionData); | ||
238 | ExitOnFailure(hr, "failed to write XSLPattern selectionlanguage indicator to custom action data"); | ||
239 | } | ||
240 | hr = WcaWriteStringToCaData(pwzFile, ppwzCustomActionData); | ||
241 | ExitOnFailure(hr, "failed to write file to custom action data: %ls", pwzFile); | ||
242 | |||
243 | // If the file already exits, then we have to put it back the way it was on failure | ||
244 | if (FileExistsEx(pwzFile, NULL)) | ||
245 | { | ||
246 | hr = FileRead(&pbData, &cbData, pwzFile); | ||
247 | ExitOnFailure(hr, "failed to read file: %ls", pwzFile); | ||
248 | |||
249 | // Set up the rollback for this file | ||
250 | hr = WcaWriteIntegerToCaData((int)fIs64Bit, &pwzRollbackCustomActionData); | ||
251 | ExitOnFailure(hr, "failed to write component bitness to rollback custom action data"); | ||
252 | |||
253 | hr = WcaWriteStringToCaData(pwzFile, &pwzRollbackCustomActionData); | ||
254 | ExitOnFailure(hr, "failed to write file name to rollback custom action data: %ls", pwzFile); | ||
255 | |||
256 | hr = WcaWriteStreamToCaData(pbData, cbData, &pwzRollbackCustomActionData); | ||
257 | ExitOnFailure(hr, "failed to write file contents to rollback custom action data."); | ||
258 | |||
259 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"ExecXmlFileRollback"), pwzRollbackCustomActionData, COST_XMLFILE); | ||
260 | ExitOnFailure(hr, "failed to schedule ExecXmlFileRollback for file: %ls", pwzFile); | ||
261 | |||
262 | ReleaseStr(pwzRollbackCustomActionData); | ||
263 | } | ||
264 | LExit: | ||
265 | ReleaseMem(pbData); | ||
266 | |||
267 | return hr; | ||
268 | } | ||
269 | |||
270 | |||
271 | static HRESULT WriteChangeData( | ||
272 | __in XML_FILE_CHANGE* pxfc, | ||
273 | __inout LPWSTR* ppwzCustomActionData | ||
274 | ) | ||
275 | { | ||
276 | Assert(pxfc && ppwzCustomActionData); | ||
277 | |||
278 | HRESULT hr = S_OK; | ||
279 | |||
280 | hr = WcaWriteStringToCaData(pxfc->pwzElementPath, ppwzCustomActionData); | ||
281 | ExitOnFailure(hr, "failed to write ElementPath to custom action data: %ls", pxfc->pwzElementPath); | ||
282 | |||
283 | hr = WcaWriteStringToCaData(pxfc->wzName, ppwzCustomActionData); | ||
284 | ExitOnFailure(hr, "failed to write Name to custom action data: %ls", pxfc->wzName); | ||
285 | |||
286 | hr = WcaWriteStringToCaData(pxfc->pwzValue, ppwzCustomActionData); | ||
287 | ExitOnFailure(hr, "failed to write Value to custom action data: %ls", pxfc->pwzValue); | ||
288 | |||
289 | LExit: | ||
290 | return hr; | ||
291 | } | ||
292 | |||
293 | |||
294 | /****************************************************************** | ||
295 | SchedXmlFile - entry point for XmlFile Custom Action | ||
296 | |||
297 | ********************************************************************/ | ||
298 | extern "C" UINT __stdcall SchedXmlFile( | ||
299 | __in MSIHANDLE hInstall | ||
300 | ) | ||
301 | { | ||
302 | // AssertSz(FALSE, "debug SchedXmlFile"); | ||
303 | |||
304 | HRESULT hr = S_OK; | ||
305 | UINT er = ERROR_SUCCESS; | ||
306 | |||
307 | LPWSTR pwzCurrentFile = NULL; | ||
308 | BOOL fCurrentFileChanged = FALSE; | ||
309 | BOOL fCurrentUseXPath = FALSE; | ||
310 | |||
311 | PMSIHANDLE hView = NULL; | ||
312 | PMSIHANDLE hRec = NULL; | ||
313 | |||
314 | XML_FILE_CHANGE* pxfcHead = NULL; | ||
315 | XML_FILE_CHANGE* pxfcTail = NULL; | ||
316 | XML_FILE_CHANGE* pxfc = NULL; | ||
317 | XML_FILE_CHANGE* pxfcUninstall = NULL; | ||
318 | |||
319 | LPWSTR pwzCustomActionData = NULL; | ||
320 | |||
321 | DWORD cFiles = 0; | ||
322 | |||
323 | // initialize | ||
324 | hr = WcaInitialize(hInstall, "SchedXmlFile"); | ||
325 | ExitOnFailure(hr, "failed to initialize"); | ||
326 | |||
327 | hr = ReadXmlFileTable(&pxfcHead, &pxfcTail); | ||
328 | if (S_FALSE == hr) | ||
329 | { | ||
330 | WcaLog(LOGMSG_VERBOSE, "Skipping SchedXmlFile because Wix4XmlFile table not present"); | ||
331 | ExitFunction1(hr = S_OK); | ||
332 | } | ||
333 | |||
334 | MessageExitOnFailure(hr, msierrXmlFileFailedRead, "failed to read Wix4XmlFile table"); | ||
335 | |||
336 | // loop through all the xml configurations | ||
337 | for (pxfc = pxfcHead; pxfc; pxfc = pxfc->pxfcNext) | ||
338 | { | ||
339 | // If this is the first file, a different file, the last file, or the SelectionLanguage property changes... | ||
340 | if (NULL == pwzCurrentFile || 0 != lstrcmpW(pwzCurrentFile, pxfc->wzFile) || NULL == pxfc->pxfcNext || fCurrentUseXPath != ((XMLFILE_USE_XPATH & pxfc->iXmlFlags))) | ||
341 | { | ||
342 | // If this isn't the first file | ||
343 | if (NULL != pwzCurrentFile) | ||
344 | { | ||
345 | // Do the uninstall work for the current file by walking backwards through the list (so the sequence is reversed) | ||
346 | for (pxfcUninstall = ((NULL != pxfc->pxfcNext) ? pxfc->pxfcPrev : pxfc); pxfcUninstall && 0 == lstrcmpW(pwzCurrentFile, pxfcUninstall->wzFile) && fCurrentUseXPath == ((XMLFILE_USE_XPATH & pxfcUninstall->iXmlFlags)); pxfcUninstall = pxfcUninstall->pxfcPrev) | ||
347 | { | ||
348 | // If it's being uninstalled | ||
349 | if (WcaIsUninstalling(pxfcUninstall->isInstalled, pxfcUninstall->isAction)) | ||
350 | { | ||
351 | // Uninstall the change | ||
352 | if (!(XMLFILE_DONT_UNINSTALL & pxfcUninstall->iXmlFlags)) | ||
353 | { | ||
354 | if (!fCurrentFileChanged) | ||
355 | { | ||
356 | hr = BeginChangeFile(pwzCurrentFile, pxfcUninstall, &pwzCustomActionData); | ||
357 | ExitOnFailure(hr, "failed to begin file change for file: %ls", pwzCurrentFile); | ||
358 | |||
359 | fCurrentFileChanged = TRUE; | ||
360 | ++cFiles; | ||
361 | } | ||
362 | if (XMLFILE_CREATE_ELEMENT & pxfcUninstall->iXmlFlags) | ||
363 | { | ||
364 | hr = WcaWriteIntegerToCaData((int)xaDeleteElement, &pwzCustomActionData); | ||
365 | ExitOnFailure(hr, "failed to write delete element action indicator to custom action data"); | ||
366 | } | ||
367 | else | ||
368 | { | ||
369 | hr = WcaWriteIntegerToCaData((int)xaDeleteValue, &pwzCustomActionData); | ||
370 | ExitOnFailure(hr, "failed to write delete value action indicator to custom action data"); | ||
371 | } | ||
372 | |||
373 | if (XMLFILE_PRESERVE_MODIFIED & pxfc->iXmlFlags) | ||
374 | { | ||
375 | hr = WcaWriteIntegerToCaData((int)xdPreserve, &pwzCustomActionData); | ||
376 | ExitOnFailure(hr, "failed to write Preserve Date indicator to custom action data"); | ||
377 | } | ||
378 | else | ||
379 | { | ||
380 | hr = WcaWriteIntegerToCaData((int)xdDontPreserve, &pwzCustomActionData); | ||
381 | ExitOnFailure(hr, "failed to write Don't Preserve Date indicator to custom action data"); | ||
382 | } | ||
383 | |||
384 | hr = WriteChangeData(pxfcUninstall, &pwzCustomActionData); | ||
385 | ExitOnFailure(hr, "failed to write uninstall change data"); | ||
386 | } | ||
387 | } | ||
388 | } | ||
389 | } | ||
390 | |||
391 | // Remember the file we're currently working on | ||
392 | hr = StrAllocString(&pwzCurrentFile, pxfc->wzFile, 0); | ||
393 | ExitOnFailure(hr, "failed to copy file name"); | ||
394 | fCurrentUseXPath = (XMLFILE_USE_XPATH & pxfc->iXmlFlags); | ||
395 | |||
396 | // We haven't changed the current file yet | ||
397 | fCurrentFileChanged = FALSE; | ||
398 | } | ||
399 | |||
400 | // If it's being installed | ||
401 | if (WcaIsInstalling(pxfc->isInstalled, pxfc->isAction)) | ||
402 | { | ||
403 | if (!fCurrentFileChanged) | ||
404 | { | ||
405 | hr = BeginChangeFile(pwzCurrentFile, pxfc, &pwzCustomActionData); | ||
406 | ExitOnFailure(hr, "failed to begin file change for file: %ls", pwzCurrentFile); | ||
407 | fCurrentFileChanged = TRUE; | ||
408 | ++cFiles; | ||
409 | } | ||
410 | |||
411 | // Install the change | ||
412 | if (XMLFILE_CREATE_ELEMENT & pxfc->iXmlFlags) | ||
413 | { | ||
414 | hr = WcaWriteIntegerToCaData((int)xaCreateElement, &pwzCustomActionData); | ||
415 | ExitOnFailure(hr, "failed to write create element action indicator to custom action data"); | ||
416 | } | ||
417 | else if (XMLFILE_DELETE_VALUE & pxfc->iXmlFlags) | ||
418 | { | ||
419 | hr = WcaWriteIntegerToCaData((int)xaDeleteValue, &pwzCustomActionData); | ||
420 | ExitOnFailure(hr, "failed to write delete value action indicator to custom action data"); | ||
421 | } | ||
422 | else if (XMLFILE_BULKWRITE_VALUE & pxfc->iXmlFlags) | ||
423 | { | ||
424 | hr = WcaWriteIntegerToCaData((int)xaBulkWriteValue, &pwzCustomActionData); | ||
425 | ExitOnFailure(hr, "failed to write builkwrite value action indicator to custom action data"); | ||
426 | } | ||
427 | else | ||
428 | { | ||
429 | hr = WcaWriteIntegerToCaData((int)xaWriteValue, &pwzCustomActionData); | ||
430 | ExitOnFailure(hr, "failed to write file indicator to custom action data"); | ||
431 | } | ||
432 | |||
433 | if (XMLFILE_PRESERVE_MODIFIED & pxfc->iXmlFlags) | ||
434 | { | ||
435 | hr = WcaWriteIntegerToCaData((int)xdPreserve, &pwzCustomActionData); | ||
436 | ExitOnFailure(hr, "failed to write Preserve Date indicator to custom action data"); | ||
437 | } | ||
438 | else | ||
439 | { | ||
440 | hr = WcaWriteIntegerToCaData((int)xdDontPreserve, &pwzCustomActionData); | ||
441 | ExitOnFailure(hr, "failed to write Don't Preserve Date indicator to custom action data"); | ||
442 | } | ||
443 | |||
444 | hr = WriteChangeData(pxfc, &pwzCustomActionData); | ||
445 | ExitOnFailure(hr, "failed to write change data"); | ||
446 | } | ||
447 | } | ||
448 | |||
449 | // If we looped through all records all is well | ||
450 | if (E_NOMOREITEMS == hr) | ||
451 | hr = S_OK; | ||
452 | ExitOnFailure(hr, "failed while looping through all objects to secure"); | ||
453 | |||
454 | // Schedule the custom action and add to progress bar | ||
455 | if (pwzCustomActionData && *pwzCustomActionData) | ||
456 | { | ||
457 | Assert(0 < cFiles); | ||
458 | |||
459 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"ExecXmlFile"), pwzCustomActionData, cFiles * COST_XMLFILE); | ||
460 | ExitOnFailure(hr, "failed to schedule ExecXmlFile action"); | ||
461 | } | ||
462 | |||
463 | LExit: | ||
464 | ReleaseStr(pwzCurrentFile); | ||
465 | ReleaseStr(pwzCustomActionData); | ||
466 | |||
467 | return WcaFinalize(FAILED(hr) ? ERROR_INSTALL_FAILURE : er); | ||
468 | } | ||
469 | |||
470 | |||
471 | /****************************************************************** | ||
472 | ExecXmlFile - entry point for XmlFile Custom Action | ||
473 | |||
474 | *******************************************************************/ | ||
475 | extern "C" UINT __stdcall ExecXmlFile( | ||
476 | __in MSIHANDLE hInstall | ||
477 | ) | ||
478 | { | ||
479 | // AssertSz(FALSE, "debug ExecXmlFile"); | ||
480 | HRESULT hr = S_OK; | ||
481 | HRESULT hrOpenFailure = S_OK; | ||
482 | UINT er = ERROR_SUCCESS; | ||
483 | |||
484 | BOOL fIsFSRedirectDisabled = FALSE; | ||
485 | BOOL fPreserveDate = FALSE; | ||
486 | |||
487 | int id = IDRETRY; | ||
488 | |||
489 | LPWSTR pwzCustomActionData = NULL; | ||
490 | LPWSTR pwzData = NULL; | ||
491 | LPWSTR pwzFile = NULL; | ||
492 | LPWSTR pwzXPath = NULL; | ||
493 | LPWSTR pwzName = NULL; | ||
494 | LPWSTR pwzValue = NULL; | ||
495 | LPWSTR pwz = NULL; | ||
496 | |||
497 | IXMLDOMDocument* pixd = NULL; | ||
498 | IXMLDOMNode* pixn = NULL; | ||
499 | IXMLDOMNode* pixnNewNode = NULL; | ||
500 | IXMLDOMNodeList* pixNodes = NULL; | ||
501 | IXMLDOMDocument2 *pixdDocument2 = NULL; | ||
502 | |||
503 | FILETIME ft; | ||
504 | |||
505 | BSTR bstrProperty = ::SysAllocString(L"SelectionLanguage"); | ||
506 | ExitOnNull(bstrProperty, hr, E_OUTOFMEMORY, "failed SysAllocString"); | ||
507 | VARIANT varValue; | ||
508 | ::VariantInit(&varValue); | ||
509 | varValue.vt = VT_BSTR; | ||
510 | varValue.bstrVal = ::SysAllocString(L"XPath"); | ||
511 | ExitOnNull(varValue.bstrVal, hr, E_OUTOFMEMORY, "failed SysAllocString"); | ||
512 | eXmlAction xa; | ||
513 | eXmlPreserveDate xd; | ||
514 | eXmlSelectionLanguage xl; | ||
515 | |||
516 | // initialize | ||
517 | hr = WcaInitialize(hInstall, "ExecXmlFile"); | ||
518 | ExitOnFailure(hr, "failed to initialize"); | ||
519 | |||
520 | hr = XmlInitialize(); | ||
521 | ExitOnFailure(hr, "failed to initialize xml utilities"); | ||
522 | |||
523 | hr = WcaGetProperty( L"CustomActionData", &pwzCustomActionData); | ||
524 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
525 | |||
526 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzCustomActionData); | ||
527 | |||
528 | pwz = pwzCustomActionData; | ||
529 | |||
530 | hr = WcaReadIntegerFromCaData(&pwz, (int*) &xa); | ||
531 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
532 | |||
533 | #ifndef _WIN64 | ||
534 | // Initialize the Wow64 API - store the result in fWow64APIPresent | ||
535 | // If it fails, this doesn't warrant an error yet, because we only need the Wow64 API in some cases | ||
536 | WcaInitializeWow64(); | ||
537 | BOOL fIsWow64Process = WcaIsWow64Process(); | ||
538 | #endif | ||
539 | |||
540 | if (xaOpenFile != xa && xaOpenFilex64 != xa) | ||
541 | ExitOnFailure(hr = E_INVALIDARG, "invalid custom action data"); | ||
542 | |||
543 | // loop through all the passed in data | ||
544 | while (pwz && *pwz) | ||
545 | { | ||
546 | hr = WcaReadIntegerFromCaData(&pwz, (int*) &xl); | ||
547 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
548 | |||
549 | hr = WcaReadStringFromCaData(&pwz, &pwzFile); | ||
550 | ExitOnFailure(hr, "failed to read file name from custom action data"); | ||
551 | |||
552 | // Default to not preserve the modified date | ||
553 | fPreserveDate = FALSE; | ||
554 | |||
555 | // Open the file | ||
556 | ReleaseNullObject(pixd); | ||
557 | |||
558 | if (xaOpenFilex64 == xa) | ||
559 | { | ||
560 | #ifndef _WIN64 | ||
561 | if (!fIsWow64Process) | ||
562 | { | ||
563 | hr = E_NOTIMPL; | ||
564 | ExitOnFailure(hr, "Custom action was told to act on a 64-bit component, but the custom action process is not running in WOW."); | ||
565 | } | ||
566 | |||
567 | hr = WcaDisableWow64FSRedirection(); | ||
568 | ExitOnFailure(hr, "Custom action was told to act on a 64-bit component, but was unable to disable filesystem redirection through the Wow64 API."); | ||
569 | |||
570 | fIsFSRedirectDisabled = TRUE; | ||
571 | #endif | ||
572 | } | ||
573 | |||
574 | hr = XmlLoadDocumentFromFileEx(pwzFile, XML_LOAD_PRESERVE_WHITESPACE, &pixd); | ||
575 | if (FAILED(hr)) | ||
576 | { | ||
577 | // Ignore the return code for now. If they try to add something, we'll fail the install. If all they do is remove stuff then it doesn't matter. | ||
578 | hrOpenFailure = hr; | ||
579 | hr = S_OK; | ||
580 | } | ||
581 | else | ||
582 | { | ||
583 | hrOpenFailure = S_OK; | ||
584 | } | ||
585 | WcaLog(LOGMSG_VERBOSE, "Configuring Xml File: %ls", pwzFile); | ||
586 | |||
587 | if (xsXPath == xl) | ||
588 | { | ||
589 | if (vfMsxml30) | ||
590 | { | ||
591 | // If we failed to open the file, don't fail immediately; just skip setting the selection language, and we'll fail later if appropriate | ||
592 | if (SUCCEEDED(hrOpenFailure)) | ||
593 | { | ||
594 | hr = pixd->QueryInterface(XmlUtil_IID_IXMLDOMDocument2, (void**)&pixdDocument2); | ||
595 | ExitOnFailure(hr, "failed in querying IXMLDOMDocument2 interface"); | ||
596 | hr = pixdDocument2->setProperty(bstrProperty, varValue); | ||
597 | ExitOnFailure(hr, "failed in setting SelectionLanguage"); | ||
598 | } | ||
599 | } | ||
600 | else | ||
601 | { | ||
602 | ExitOnFailure(hr = E_NOTIMPL, "Error: current MSXML version does not support xpath query."); | ||
603 | } | ||
604 | } | ||
605 | |||
606 | while (pwz && *pwz) | ||
607 | { | ||
608 | hr = WcaReadIntegerFromCaData(&pwz, (int*) &xa); | ||
609 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
610 | |||
611 | // Break if we need to move on to a different file | ||
612 | if (xaOpenFile == xa || xaOpenFilex64 == xa) | ||
613 | break; | ||
614 | |||
615 | hr = WcaReadIntegerFromCaData(&pwz, (int*) &xd); | ||
616 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
617 | |||
618 | if (xdPreserve == xd) | ||
619 | { | ||
620 | fPreserveDate = TRUE; | ||
621 | } | ||
622 | |||
623 | // Get path, name, and value to be written | ||
624 | hr = WcaReadStringFromCaData(&pwz, &pwzXPath); | ||
625 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
626 | hr = WcaReadStringFromCaData(&pwz, &pwzName); | ||
627 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
628 | hr = WcaReadStringFromCaData(&pwz, &pwzValue); | ||
629 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
630 | |||
631 | // If we failed to open the file and we're adding something to the file, we've got a problem. Otherwise, just continue on since the file's already gone. | ||
632 | if (FAILED(hrOpenFailure)) | ||
633 | { | ||
634 | if (xaCreateElement == xa || xaWriteValue == xa || xaBulkWriteValue == xa) | ||
635 | { | ||
636 | MessageExitOnFailure(hr = hrOpenFailure, msierrXmlFileFailedOpen, "failed to load XML file: %ls", pwzFile); | ||
637 | } | ||
638 | else | ||
639 | { | ||
640 | continue; | ||
641 | } | ||
642 | } | ||
643 | |||
644 | // Select the node we're about to modify | ||
645 | ReleaseNullObject(pixn); | ||
646 | |||
647 | if (xaBulkWriteValue == xa) | ||
648 | { | ||
649 | hr = XmlSelectNodes(pixd, pwzXPath, &pixNodes); | ||
650 | if (S_FALSE == hr) | ||
651 | { | ||
652 | hr = HRESULT_FROM_WIN32(ERROR_OBJECT_NOT_FOUND); | ||
653 | } | ||
654 | |||
655 | MessageExitOnFailure(hr, msierrXmlFileFailedSelect, "failed to find any nodes: %ls in XML file: %ls", pwzXPath, pwzFile); | ||
656 | for (;;) | ||
657 | { | ||
658 | pixNodes->nextNode(&pixn); | ||
659 | if (NULL == pixn) | ||
660 | break; | ||
661 | |||
662 | if (pwzName && *pwzName) | ||
663 | { | ||
664 | // We're setting an attribute | ||
665 | hr = XmlSetAttribute(pixn, pwzName, pwzValue); | ||
666 | ExitOnFailure(hr, "failed to set attribute: %ls to value %ls", pwzName, pwzValue); | ||
667 | } | ||
668 | else | ||
669 | { | ||
670 | // We're setting the text of the node | ||
671 | hr = XmlSetText(pixn, pwzValue); | ||
672 | ExitOnFailure(hr, "failed to set text to: %ls for element %ls. Make sure that XPath points to an element.", pwzValue, pwzXPath); | ||
673 | } | ||
674 | ReleaseNullObject(pixn); | ||
675 | } | ||
676 | } | ||
677 | else | ||
678 | { | ||
679 | hr = XmlSelectSingleNode(pixd, pwzXPath, &pixn); | ||
680 | if (S_FALSE == hr) | ||
681 | hr = HRESULT_FROM_WIN32(ERROR_OBJECT_NOT_FOUND); | ||
682 | MessageExitOnFailure(hr, msierrXmlFileFailedSelect, "failed to find node: %ls in XML file: %ls", pwzXPath, pwzFile); | ||
683 | |||
684 | // Make the modification | ||
685 | if (xaWriteValue == xa) | ||
686 | { | ||
687 | if (pwzName && *pwzName) | ||
688 | { | ||
689 | // We're setting an attribute | ||
690 | hr = XmlSetAttribute(pixn, pwzName, pwzValue); | ||
691 | ExitOnFailure(hr, "failed to set attribute: %ls to value %ls", pwzName, pwzValue); | ||
692 | } | ||
693 | else | ||
694 | { | ||
695 | // We're setting the text of the node | ||
696 | hr = XmlSetText(pixn, pwzValue); | ||
697 | ExitOnFailure(hr, "failed to set text to: %ls for element %ls. Make sure that XPath points to an element.", pwzValue, pwzXPath); | ||
698 | } | ||
699 | } | ||
700 | else if (xaCreateElement == xa) | ||
701 | { | ||
702 | hr = XmlCreateChild(pixn, pwzName, &pixnNewNode); | ||
703 | ExitOnFailure(hr, "failed to create child element: %ls", pwzName); | ||
704 | |||
705 | if (pwzValue && *pwzValue) | ||
706 | { | ||
707 | hr = XmlSetText(pixnNewNode, pwzValue); | ||
708 | ExitOnFailure(hr, "failed to set text to: %ls for node: %ls", pwzValue, pwzName); | ||
709 | } | ||
710 | |||
711 | ReleaseNullObject(pixnNewNode); | ||
712 | } | ||
713 | else if (xaDeleteValue == xa) | ||
714 | { | ||
715 | if (pwzName && *pwzName) | ||
716 | { | ||
717 | // Delete the attribute | ||
718 | hr = XmlRemoveAttribute(pixn, pwzName); | ||
719 | ExitOnFailure(hr, "failed to remove attribute: %ls", pwzName); | ||
720 | } | ||
721 | else | ||
722 | { | ||
723 | // Clear the text value for the node | ||
724 | hr = XmlSetText(pixn, L""); | ||
725 | ExitOnFailure(hr, "failed to clear text value"); | ||
726 | } | ||
727 | } | ||
728 | else if (xaDeleteElement == xa) | ||
729 | { | ||
730 | // TODO: This may be a little heavy handed | ||
731 | hr = XmlRemoveChildren(pixn, pwzName); | ||
732 | ExitOnFailure(hr, "failed to delete child node: %ls", pwzName); | ||
733 | } | ||
734 | else | ||
735 | { | ||
736 | ExitOnFailure(hr = E_UNEXPECTED, "Invalid modification specified in custom action data"); | ||
737 | } | ||
738 | } | ||
739 | } | ||
740 | |||
741 | // Now that we've made all of the changes to this file, save it and move on to the next | ||
742 | if (S_OK == hrOpenFailure) | ||
743 | { | ||
744 | if (fPreserveDate) | ||
745 | { | ||
746 | hr = FileGetTime(pwzFile, NULL, NULL, &ft); | ||
747 | ExitOnFailure(hr, "failed to get modified time of file : %ls", pwzFile); | ||
748 | } | ||
749 | |||
750 | int iSaveAttempt = 0; | ||
751 | |||
752 | do | ||
753 | { | ||
754 | hr = XmlSaveDocument(pixd, pwzFile); | ||
755 | if (FAILED(hr)) | ||
756 | { | ||
757 | id = WcaErrorMessage(msierrXmlConfigFailedSave, hr, INSTALLMESSAGE_ERROR | MB_ABORTRETRYIGNORE, 1, pwzFile); | ||
758 | switch (id) | ||
759 | { | ||
760 | case IDABORT: | ||
761 | ExitOnFailure(hr, "Failed to save changes to XML file: %ls", pwzFile); | ||
762 | case IDRETRY: | ||
763 | hr = S_FALSE; // hit me, baby, one more time | ||
764 | break; | ||
765 | case IDIGNORE: | ||
766 | hr = S_OK; // pretend everything is okay and bail | ||
767 | break; | ||
768 | case 0: // No UI case, MsiProcessMessage returns 0 | ||
769 | if (STIERR_SHARING_VIOLATION == hr) | ||
770 | { | ||
771 | // Only in case of sharing violation do we retry 30 times, once a second. | ||
772 | if (iSaveAttempt < 30) | ||
773 | { | ||
774 | hr = S_FALSE; | ||
775 | ++iSaveAttempt; | ||
776 | WcaLog(LOGMSG_VERBOSE, "Unable to save changes to XML file: %ls, retry attempt: %x", pwzFile, iSaveAttempt); | ||
777 | Sleep(1000); | ||
778 | } | ||
779 | else | ||
780 | { | ||
781 | ExitOnFailure(hr, "Failed to save changes to XML file: %ls", pwzFile); | ||
782 | } | ||
783 | } | ||
784 | break; | ||
785 | default: // Unknown error | ||
786 | ExitOnFailure(hr, "Failed to save changes to XML file: %ls", pwzFile); | ||
787 | } | ||
788 | } | ||
789 | } while (S_FALSE == hr); | ||
790 | |||
791 | if (fPreserveDate) | ||
792 | { | ||
793 | hr = FileSetTime(pwzFile, NULL, NULL, &ft); | ||
794 | ExitOnFailure(hr, "failed to set modified time of file : %ls", pwzFile); | ||
795 | } | ||
796 | |||
797 | if (fIsFSRedirectDisabled) | ||
798 | { | ||
799 | fIsFSRedirectDisabled = FALSE; | ||
800 | WcaRevertWow64FSRedirection(); | ||
801 | } | ||
802 | } | ||
803 | } | ||
804 | |||
805 | LExit: | ||
806 | // Make sure we revert FS Redirection if necessary before exiting | ||
807 | if (fIsFSRedirectDisabled) | ||
808 | { | ||
809 | fIsFSRedirectDisabled = FALSE; | ||
810 | WcaRevertWow64FSRedirection(); | ||
811 | } | ||
812 | #ifndef _WIN64 | ||
813 | WcaFinalizeWow64(); | ||
814 | #endif | ||
815 | |||
816 | ReleaseStr(pwzCustomActionData); | ||
817 | ReleaseStr(pwzData); | ||
818 | ReleaseStr(pwzFile); | ||
819 | ReleaseStr(pwzXPath); | ||
820 | ReleaseStr(pwzName); | ||
821 | ReleaseStr(pwzValue); | ||
822 | ReleaseBSTR(bstrProperty); | ||
823 | ReleaseVariant(varValue); | ||
824 | |||
825 | ReleaseObject(pixdDocument2); | ||
826 | ReleaseObject(pixn); | ||
827 | ReleaseObject(pixd); | ||
828 | ReleaseObject(pixnNewNode); | ||
829 | ReleaseObject(pixNodes); | ||
830 | |||
831 | XmlUninitialize(); | ||
832 | |||
833 | return WcaFinalize(FAILED(hr) ? ERROR_INSTALL_FAILURE : er); | ||
834 | } | ||
835 | |||
836 | |||
837 | /****************************************************************** | ||
838 | ExecXmlFileRollback - entry point for XmlFile rollback Custom Action | ||
839 | |||
840 | *******************************************************************/ | ||
841 | extern "C" UINT __stdcall ExecXmlFileRollback( | ||
842 | __in MSIHANDLE hInstall | ||
843 | ) | ||
844 | { | ||
845 | // AssertSz(FALSE, "debug ExecXmlFileRollback"); | ||
846 | HRESULT hr = S_OK; | ||
847 | UINT er = ERROR_SUCCESS; | ||
848 | |||
849 | int iIs64Bit; | ||
850 | BOOL fIs64Bit = FALSE; | ||
851 | |||
852 | LPWSTR pwzCustomActionData = NULL; | ||
853 | LPWSTR pwz = NULL; | ||
854 | LPWSTR pwzFileName = NULL; | ||
855 | LPBYTE pbData = NULL; | ||
856 | DWORD_PTR cbData = 0; | ||
857 | |||
858 | FILETIME ft; | ||
859 | |||
860 | HANDLE hFile = INVALID_HANDLE_VALUE; | ||
861 | |||
862 | // initialize | ||
863 | hr = WcaInitialize(hInstall, "ExecXmlFileRollback"); | ||
864 | ExitOnFailure(hr, "failed to initialize"); | ||
865 | |||
866 | |||
867 | hr = WcaGetProperty( L"CustomActionData", &pwzCustomActionData); | ||
868 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
869 | |||
870 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzCustomActionData); | ||
871 | |||
872 | pwz = pwzCustomActionData; | ||
873 | |||
874 | hr = WcaReadIntegerFromCaData(&pwz, &iIs64Bit); | ||
875 | ExitOnFailure(hr, "failed to read component bitness from custom action data"); | ||
876 | |||
877 | hr = WcaReadStringFromCaData(&pwz, &pwzFileName); | ||
878 | ExitOnFailure(hr, "failed to read file name from custom action data"); | ||
879 | |||
880 | hr = WcaReadStreamFromCaData(&pwz, &pbData, &cbData); | ||
881 | ExitOnFailure(hr, "failed to read file contents from custom action data"); | ||
882 | |||
883 | #ifndef _WIN64 | ||
884 | fIs64Bit = (BOOL)iIs64Bit; | ||
885 | |||
886 | if (fIs64Bit) | ||
887 | { | ||
888 | hr = WcaInitializeWow64(); | ||
889 | if (S_FALSE == hr) | ||
890 | { | ||
891 | hr = TYPE_E_DLLFUNCTIONNOTFOUND; | ||
892 | } | ||
893 | ExitOnFailure(hr, "failed to initialize Wow64 API"); | ||
894 | |||
895 | if (!WcaIsWow64Process()) | ||
896 | { | ||
897 | hr = E_NOTIMPL; | ||
898 | ExitOnFailure(hr, "Custom action was told to rollback a 64-bit component, but the custom action process is not running in WOW."); | ||
899 | } | ||
900 | |||
901 | hr = WcaDisableWow64FSRedirection(); | ||
902 | ExitOnFailure(hr, "Custom action was told to rollback a 64-bit component, but was unable to Disable Filesystem Redirection through the Wow64 API."); | ||
903 | } | ||
904 | #endif | ||
905 | |||
906 | // Always preserve the modified date on rollback | ||
907 | hr = FileGetTime(pwzFileName, NULL, NULL, &ft); | ||
908 | ExitOnFailure(hr, "Failed to get modified date of file %ls.", pwzFileName); | ||
909 | |||
910 | // Open the file | ||
911 | hFile = ::CreateFileW(pwzFileName, GENERIC_WRITE, NULL, NULL, TRUNCATE_EXISTING, NULL, NULL); | ||
912 | ExitOnInvalidHandleWithLastError(hFile, hr, "failed to open file: %ls", pwzFileName); | ||
913 | |||
914 | // Write out the old data | ||
915 | hr = FileWriteHandle(hFile, pbData, cbData); | ||
916 | ExitOnFailure(hr, "failed to write to file: %ls", pwzFileName); | ||
917 | |||
918 | ReleaseFile(hFile); | ||
919 | |||
920 | // Always preserve the modified date on rollback | ||
921 | hr = FileSetTime(pwzFileName, NULL, NULL, &ft); | ||
922 | ExitOnFailure(hr, "Failed to set modified date of file %ls.", pwzFileName); | ||
923 | |||
924 | LExit: | ||
925 | ReleaseStr(pwzCustomActionData); | ||
926 | ReleaseStr(pwzFileName); | ||
927 | |||
928 | ReleaseFile(hFile); | ||
929 | |||
930 | if (fIs64Bit) | ||
931 | { | ||
932 | WcaRevertWow64FSRedirection(); | ||
933 | WcaFinalizeWow64(); | ||
934 | } | ||
935 | |||
936 | ReleaseMem(pbData); | ||
937 | |||
938 | return WcaFinalize(FAILED(hr) ? ERROR_INSTALL_FAILURE : er); | ||
939 | } | ||
940 | |||
diff --git a/src/ext/Util/ca/caDecor.h b/src/ext/Util/ca/caDecor.h new file mode 100644 index 00000000..da274650 --- /dev/null +++ b/src/ext/Util/ca/caDecor.h | |||
@@ -0,0 +1,13 @@ | |||
1 | #pragma once | ||
2 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
3 | |||
4 | |||
5 | #if defined(_M_ARM64) | ||
6 | #define CUSTOM_ACTION_DECORATION(f) L"Wix4" f L"_A64" | ||
7 | #elif defined(_M_AMD64) | ||
8 | #define CUSTOM_ACTION_DECORATION(f) L"Wix4" f L"_X64" | ||
9 | #elif defined(_M_ARM) | ||
10 | #define CUSTOM_ACTION_DECORATION(f) L"Wix4" f L"_ARM" | ||
11 | #else | ||
12 | #define CUSTOM_ACTION_DECORATION(f) L"Wix4" f L"_X86" | ||
13 | #endif | ||
diff --git a/src/ext/Util/ca/cost.h b/src/ext/Util/ca/cost.h new file mode 100644 index 00000000..6507e85d --- /dev/null +++ b/src/ext/Util/ca/cost.h | |||
@@ -0,0 +1,9 @@ | |||
1 | #pragma once | ||
2 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
3 | |||
4 | |||
5 | const UINT COST_SECUREOBJECT = 1000; | ||
6 | const UINT COST_SERVICECONFIG = 1000; | ||
7 | const UINT COST_XMLFILE = 1000; | ||
8 | const UINT COST_CLOSEAPP = 500; | ||
9 | const UINT COST_INTERNETSHORTCUT = 2000; | ||
diff --git a/src/ext/Util/ca/dllmain.cpp b/src/ext/Util/ca/dllmain.cpp new file mode 100644 index 00000000..35ae6d1c --- /dev/null +++ b/src/ext/Util/ca/dllmain.cpp | |||
@@ -0,0 +1,26 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | /******************************************************************** | ||
6 | DllMain - standard entry point for all WiX custom actions | ||
7 | |||
8 | ********************************************************************/ | ||
9 | extern "C" BOOL WINAPI DllMain( | ||
10 | IN HINSTANCE hInst, | ||
11 | IN ULONG ulReason, | ||
12 | IN LPVOID) | ||
13 | { | ||
14 | switch(ulReason) | ||
15 | { | ||
16 | case DLL_PROCESS_ATTACH: | ||
17 | WcaGlobalInitialize(hInst); | ||
18 | break; | ||
19 | |||
20 | case DLL_PROCESS_DETACH: | ||
21 | WcaGlobalFinalize(); | ||
22 | break; | ||
23 | } | ||
24 | |||
25 | return TRUE; | ||
26 | } | ||
diff --git a/src/ext/Util/ca/exitearlywithsuccess.cpp b/src/ext/Util/ca/exitearlywithsuccess.cpp new file mode 100644 index 00000000..00828329 --- /dev/null +++ b/src/ext/Util/ca/exitearlywithsuccess.cpp | |||
@@ -0,0 +1,27 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | |||
6 | /****************************************************************** | ||
7 | WixExitEarlyWithSuccess - entry point for WixExitEarlyWithSuccess | ||
8 | custom action which does nothing except return exit code | ||
9 | ERROR_NO_MORE_ITEMS. The Windows Installer documentation at | ||
10 | http://msdn.microsoft.com/library/aa368072.aspx indicates that | ||
11 | this exit code is not treated as an error. This will cause a | ||
12 | calling application to receive a successful return code if | ||
13 | this custom action executes. This can be useful for backwards | ||
14 | compatibility when an application redistributes an MSI and | ||
15 | a future major upgrade is released for that MSI. It should be | ||
16 | conditioned on a property set by an entry in the Upgrade table | ||
17 | of the MSI that detects newer major upgrades of the same MSI | ||
18 | already installed on the system. It should be scheduled after | ||
19 | the FindRelatedProducts action so that the property will be | ||
20 | set if appropriate. | ||
21 | ********************************************************************/ | ||
22 | extern "C" UINT __stdcall WixExitEarlyWithSuccess( | ||
23 | __in MSIHANDLE /*hInstall*/ | ||
24 | ) | ||
25 | { | ||
26 | return ERROR_NO_MORE_ITEMS; | ||
27 | } | ||
diff --git a/src/ext/Util/ca/netshortcuts.cpp b/src/ext/Util/ca/netshortcuts.cpp new file mode 100644 index 00000000..06826264 --- /dev/null +++ b/src/ext/Util/ca/netshortcuts.cpp | |||
@@ -0,0 +1,437 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | LPCWSTR vcsShortcutsQuery = | ||
6 | L"SELECT `Component_`, `Directory_`, `Name`, `Target`, `Attributes`, `IconFile`, `IconIndex` " | ||
7 | L"FROM `Wix4InternetShortcut`"; | ||
8 | enum eShortcutsQuery { esqComponent = 1, esqDirectory, esqFilename, esqTarget, esqAttributes, esqIconFile, esqIconIndex }; | ||
9 | enum eShortcutsAttributes { esaLink = 0, esaURL = 1 }; | ||
10 | |||
11 | /****************************************************************** | ||
12 | WixSchedInternetShortcuts - entry point | ||
13 | |||
14 | ********************************************************************/ | ||
15 | extern "C" UINT __stdcall WixSchedInternetShortcuts( | ||
16 | __in MSIHANDLE hInstall | ||
17 | ) | ||
18 | { | ||
19 | HRESULT hr = S_OK; | ||
20 | UINT er = ERROR_SUCCESS; | ||
21 | |||
22 | UINT uiCost = 0; | ||
23 | |||
24 | PMSIHANDLE hView = NULL; | ||
25 | PMSIHANDLE hRec = NULL; | ||
26 | |||
27 | MSIHANDLE hCreateFolderTable = NULL; | ||
28 | MSIHANDLE hCreateFolderColumns = NULL; | ||
29 | |||
30 | LPWSTR pwzCustomActionData = NULL; | ||
31 | LPWSTR pwzComponent = NULL; | ||
32 | LPWSTR pwzDirectory = NULL; | ||
33 | LPWSTR pwzFilename = NULL; | ||
34 | LPWSTR pwzTarget = NULL; | ||
35 | LPWSTR pwzShortcutPath = NULL; | ||
36 | int iAttr = 0; | ||
37 | LPWSTR pwzIconFile = NULL; | ||
38 | int iIconIndex = 0; | ||
39 | IUniformResourceLocatorW* piURL = NULL; | ||
40 | IShellLinkW* piShellLink = NULL; | ||
41 | BOOL fInitializedCom = FALSE; | ||
42 | |||
43 | hr = WcaInitialize(hInstall, "WixSchedInternetShortcuts"); | ||
44 | ExitOnFailure(hr, "failed to initialize WixSchedInternetShortcuts."); | ||
45 | |||
46 | // anything to do? | ||
47 | if (S_OK != WcaTableExists(L"Wix4InternetShortcut")) | ||
48 | { | ||
49 | WcaLog(LOGMSG_STANDARD, "Wix4InternetShortcut table doesn't exist, so there are no Internet shortcuts to process"); | ||
50 | goto LExit; | ||
51 | } | ||
52 | |||
53 | // check to see if we can create a shortcut - Server Core and others may not have a shell registered. | ||
54 | hr = ::CoInitialize(NULL); | ||
55 | ExitOnFailure(hr, "failed to initialize COM"); | ||
56 | fInitializedCom = TRUE; | ||
57 | |||
58 | hr = ::CoCreateInstance(CLSID_InternetShortcut, NULL, CLSCTX_ALL, IID_IUniformResourceLocatorW, (void**)&piURL); | ||
59 | if (S_OK != hr) | ||
60 | { | ||
61 | WcaLog(LOGMSG_STANDARD, "failed to create an instance of IUniformResourceLocatorW, skipping shortcut creation"); | ||
62 | ExitFunction1(hr = S_OK); | ||
63 | } | ||
64 | |||
65 | hr = ::CoCreateInstance(CLSID_ShellLink, NULL, CLSCTX_ALL, IID_IShellLinkW, (void**)&piShellLink); | ||
66 | if (S_OK != hr) | ||
67 | { | ||
68 | WcaLog(LOGMSG_STANDARD, "failed to create an instance of IShellLinkW, skipping shortcut creation"); | ||
69 | ExitFunction1(hr = S_OK); | ||
70 | } | ||
71 | |||
72 | // query and loop through all the shortcuts | ||
73 | hr = WcaOpenExecuteView(vcsShortcutsQuery, &hView); | ||
74 | ExitOnFailure(hr, "failed to open view on Wix4InternetShortcut table"); | ||
75 | |||
76 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
77 | { | ||
78 | // read column values | ||
79 | hr = WcaGetRecordString(hRec, esqComponent, &pwzComponent); | ||
80 | ExitOnFailure(hr, "failed to get shortcut component"); | ||
81 | hr = WcaGetRecordString(hRec, esqDirectory, &pwzDirectory); | ||
82 | ExitOnFailure(hr, "failed to get shortcut directory"); | ||
83 | hr = WcaGetRecordString(hRec, esqFilename, &pwzFilename); | ||
84 | ExitOnFailure(hr, "failed to get shortcut filename"); | ||
85 | hr = WcaGetRecordFormattedString(hRec, esqTarget, &pwzTarget); | ||
86 | ExitOnFailure(hr, "failed to get shortcut target"); | ||
87 | hr = WcaGetRecordInteger(hRec, esqAttributes, &iAttr); | ||
88 | ExitOnFailure(hr, "failed to get shortcut attributes"); | ||
89 | hr = WcaGetRecordFormattedString(hRec, esqIconFile, &pwzIconFile); | ||
90 | ExitOnFailure(hr, "failed to get shortcut icon file"); | ||
91 | hr = WcaGetRecordInteger(hRec, esqIconIndex, &iIconIndex); | ||
92 | ExitOnFailure(hr, "failed to get shortcut icon index"); | ||
93 | |||
94 | // skip processing this Wix4InternetShortcut row if the component isn't being configured | ||
95 | WCA_TODO todo = WcaGetComponentToDo(pwzComponent); | ||
96 | if (WCA_TODO_UNKNOWN == todo) | ||
97 | { | ||
98 | WcaLog(LOGMSG_VERBOSE, "Skipping shortcut for null-action component '%ls'", pwzComponent); | ||
99 | continue; | ||
100 | } | ||
101 | |||
102 | // we need to create the directory where the shortcut is supposed to live; rather | ||
103 | // than doing so in our deferred custom action, use the CreateFolder table to have MSI | ||
104 | // make (and remove) them on our behalf (including the correct cleanup of parent directories). | ||
105 | MSIDBERROR dbError = MSIDBERROR_NOERROR; | ||
106 | WcaLog(LOGMSG_STANDARD, "Adding folder '%ls', component '%ls' to the CreateFolder table", pwzDirectory, pwzComponent); | ||
107 | hr = WcaAddTempRecord(&hCreateFolderTable, &hCreateFolderColumns, L"CreateFolder", &dbError, 0, 2, pwzDirectory, pwzComponent); | ||
108 | if (MSIDBERROR_DUPLICATEKEY == dbError) | ||
109 | { | ||
110 | WcaLog(LOGMSG_STANDARD, "Folder '%ls' already exists in the CreateFolder table; the above error is harmless", pwzDirectory); | ||
111 | hr = S_OK; | ||
112 | } | ||
113 | ExitOnFailure(hr, "Couldn't add temporary CreateFolder row"); | ||
114 | |||
115 | // only if we're installing/reinstalling do we need to schedule the deferred CA | ||
116 | // (uninstallation is handled via permanent RemoveFile rows and temporary CreateFolder rows) | ||
117 | if (WCA_TODO_INSTALL == todo || WCA_TODO_REINSTALL == todo) | ||
118 | { | ||
119 | // turn the Directory_ id into a path | ||
120 | hr = WcaGetTargetPath(pwzDirectory, &pwzShortcutPath); | ||
121 | ExitOnFailure(hr, "failed to allocate string for shortcut directory"); | ||
122 | |||
123 | // append the shortcut filename | ||
124 | hr = StrAllocConcat(&pwzShortcutPath, pwzFilename, 0); | ||
125 | ExitOnFailure(hr, "failed to allocate string for shortcut filename"); | ||
126 | |||
127 | // write the shortcut path and target to custom action data for deferred CAs | ||
128 | hr = WcaWriteStringToCaData(pwzShortcutPath, &pwzCustomActionData); | ||
129 | ExitOnFailure(hr, "failed to write shortcut path to custom action data"); | ||
130 | hr = WcaWriteStringToCaData(pwzTarget, &pwzCustomActionData); | ||
131 | ExitOnFailure(hr, "failed to write shortcut target to custom action data"); | ||
132 | hr = WcaWriteIntegerToCaData(iAttr, &pwzCustomActionData); | ||
133 | ExitOnFailure(hr, "failed to write shortcut attributes to custom action data"); | ||
134 | hr = WcaWriteStringToCaData(pwzIconFile, &pwzCustomActionData); | ||
135 | ExitOnFailure(hr, "failed to write icon file to custom action data"); | ||
136 | hr = WcaWriteIntegerToCaData(iIconIndex, &pwzCustomActionData); | ||
137 | ExitOnFailure(hr, "failed to write icon index to custom action data"); | ||
138 | |||
139 | uiCost += COST_INTERNETSHORTCUT; | ||
140 | } | ||
141 | } | ||
142 | |||
143 | if (E_NOMOREITEMS == hr) | ||
144 | { | ||
145 | hr = S_OK; | ||
146 | } | ||
147 | ExitOnFailure(hr, "Failure occured while processing Wix4InternetShortcut table"); | ||
148 | |||
149 | // if we have any shortcuts to install | ||
150 | if (pwzCustomActionData && *pwzCustomActionData) | ||
151 | { | ||
152 | // add cost to progress bar | ||
153 | hr = WcaProgressMessage(uiCost, TRUE); | ||
154 | ExitOnFailure(hr, "failed to extend progress bar for InternetShortcuts"); | ||
155 | |||
156 | // provide custom action data to deferred and rollback CAs | ||
157 | hr = WcaSetProperty(CUSTOM_ACTION_DECORATION(L"RollbackInternetShortcuts"), pwzCustomActionData); | ||
158 | ExitOnFailure(hr, "failed to set WixRollbackInternetShortcuts rollback custom action data"); | ||
159 | hr = WcaSetProperty(CUSTOM_ACTION_DECORATION(L"CreateInternetShortcuts"), pwzCustomActionData); | ||
160 | ExitOnFailure(hr, "failed to set WixCreateInternetShortcuts custom action data"); | ||
161 | } | ||
162 | |||
163 | LExit: | ||
164 | if (hCreateFolderTable) | ||
165 | { | ||
166 | ::MsiCloseHandle(hCreateFolderTable); | ||
167 | } | ||
168 | |||
169 | if (hCreateFolderColumns) | ||
170 | { | ||
171 | ::MsiCloseHandle(hCreateFolderColumns); | ||
172 | } | ||
173 | |||
174 | ReleaseStr(pwzCustomActionData); | ||
175 | ReleaseStr(pwzComponent); | ||
176 | ReleaseStr(pwzDirectory); | ||
177 | ReleaseStr(pwzFilename); | ||
178 | ReleaseStr(pwzTarget); | ||
179 | ReleaseStr(pwzShortcutPath); | ||
180 | ReleaseObject(piShellLink); | ||
181 | ReleaseObject(piURL); | ||
182 | |||
183 | if (fInitializedCom) | ||
184 | { | ||
185 | ::CoUninitialize(); | ||
186 | } | ||
187 | |||
188 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
189 | return WcaFinalize(er); | ||
190 | } | ||
191 | |||
192 | |||
193 | |||
194 | /****************************************************************** | ||
195 | CreateUrl - Creates a shortcut via IUniformResourceLocatorW | ||
196 | |||
197 | *******************************************************************/ | ||
198 | static HRESULT CreateUrl( | ||
199 | __in_z LPCWSTR wzTarget, | ||
200 | __in_z LPCWSTR wzShortcutPath, | ||
201 | __in_z_opt LPCWSTR wzIconPath, | ||
202 | __in int iconIndex | ||
203 | ) | ||
204 | { | ||
205 | HRESULT hr = S_OK; | ||
206 | IUniformResourceLocatorW* piURL = NULL; | ||
207 | IPersistFile* piPersistFile = NULL; | ||
208 | IPropertySetStorage* piProperties = NULL; | ||
209 | IPropertyStorage* piStorage = NULL; | ||
210 | |||
211 | // create an internet shortcut object | ||
212 | WcaLog(LOGMSG_STANDARD, "Creating IUniformResourceLocatorW shortcut '%ls' target '%ls'", wzShortcutPath, wzTarget); | ||
213 | hr = ::CoCreateInstance(CLSID_InternetShortcut, NULL, CLSCTX_ALL, IID_IUniformResourceLocatorW, (void**)&piURL); | ||
214 | ExitOnFailure(hr, "failed to create an instance of IUniformResourceLocatorW"); | ||
215 | |||
216 | // set shortcut target | ||
217 | hr = piURL->SetURL(wzTarget, 0); | ||
218 | ExitOnFailure(hr, "failed to set shortcut '%ls' target '%ls'", wzShortcutPath, wzTarget); | ||
219 | |||
220 | if (wzIconPath) | ||
221 | { | ||
222 | WcaLog(LOGMSG_STANDARD, "Adding icon '%ls' index '%d'", wzIconPath, iconIndex); | ||
223 | |||
224 | hr = piURL->QueryInterface(IID_IPropertySetStorage, (void **)&piProperties); | ||
225 | ExitOnFailure(hr, "failed to get IPropertySetStorage for shortcut '%ls'", wzShortcutPath); | ||
226 | |||
227 | hr = piProperties->Open(FMTID_Intshcut, STGM_WRITE, &piStorage); | ||
228 | ExitOnFailure(hr, "failed to open storage for shortcut '%ls'", wzShortcutPath); | ||
229 | |||
230 | PROPSPEC ppids[2] = { {PRSPEC_PROPID, PID_IS_ICONINDEX}, {PRSPEC_PROPID, PID_IS_ICONFILE} }; | ||
231 | PROPVARIANT ppvar[2]; | ||
232 | |||
233 | PropVariantInit(ppvar); | ||
234 | PropVariantInit(ppvar + 1); | ||
235 | |||
236 | ppvar[0].vt = VT_I4; | ||
237 | ppvar[0].lVal = iconIndex; | ||
238 | ppvar[1].vt = VT_LPWSTR; | ||
239 | ppvar[1].pwszVal = const_cast<LPWSTR>(wzIconPath); | ||
240 | |||
241 | hr = piStorage->WriteMultiple(2, ppids, ppvar, 0); | ||
242 | ExitOnFailure(hr, "failed to write icon storage for shortcut '%ls'", wzShortcutPath); | ||
243 | |||
244 | hr = piStorage->Commit(STGC_DEFAULT); | ||
245 | ExitOnFailure(hr, "failed to commit icon storage for shortcut '%ls'", wzShortcutPath); | ||
246 | } | ||
247 | |||
248 | // get an IPersistFile and save the shortcut | ||
249 | hr = piURL->QueryInterface(IID_IPersistFile, (void**)&piPersistFile); | ||
250 | ExitOnFailure(hr, "failed to get IPersistFile for shortcut '%ls'", wzShortcutPath); | ||
251 | |||
252 | hr = piPersistFile->Save(wzShortcutPath, TRUE); | ||
253 | ExitOnFailure(hr, "failed to save shortcut '%ls'", wzShortcutPath); | ||
254 | |||
255 | LExit: | ||
256 | ReleaseObject(piPersistFile); | ||
257 | ReleaseObject(piURL); | ||
258 | ReleaseObject(piStorage); | ||
259 | ReleaseObject(piProperties); | ||
260 | |||
261 | return hr; | ||
262 | } | ||
263 | |||
264 | /****************************************************************** | ||
265 | CreateLink - Creates a shortcut via IShellLinkW | ||
266 | |||
267 | *******************************************************************/ | ||
268 | static HRESULT CreateLink( | ||
269 | __in_z LPCWSTR wzTarget, | ||
270 | __in_z LPCWSTR wzShortcutPath, | ||
271 | __in_z_opt LPCWSTR wzIconPath, | ||
272 | __in int iconIndex | ||
273 | ) | ||
274 | { | ||
275 | HRESULT hr = S_OK; | ||
276 | IShellLinkW* piShellLink = NULL; | ||
277 | IPersistFile* piPersistFile = NULL; | ||
278 | |||
279 | // create an internet shortcut object | ||
280 | WcaLog(LOGMSG_STANDARD, "Creating IShellLinkW shortcut '%ls' target '%ls'", wzShortcutPath, wzTarget); | ||
281 | hr = ::CoCreateInstance(CLSID_ShellLink, NULL, CLSCTX_ALL, IID_IShellLinkW, (void**)&piShellLink); | ||
282 | ExitOnFailure(hr, "failed to create an instance of IShellLinkW"); | ||
283 | |||
284 | // set shortcut target | ||
285 | hr = piShellLink->SetPath(wzTarget); | ||
286 | ExitOnFailure(hr, "failed to set shortcut '%ls' target '%ls'", wzShortcutPath, wzTarget); | ||
287 | |||
288 | if (wzIconPath) | ||
289 | { | ||
290 | WcaLog(LOGMSG_STANDARD, "Adding icon '%ls' index '%d'", wzIconPath, iconIndex); | ||
291 | hr = piShellLink->SetIconLocation(wzIconPath, iconIndex); | ||
292 | ExitOnFailure(hr, "failed to set icon for shortcut '%ls'", wzShortcutPath); | ||
293 | } | ||
294 | |||
295 | // get an IPersistFile and save the shortcut | ||
296 | hr = piShellLink->QueryInterface(IID_IPersistFile, (void**)&piPersistFile); | ||
297 | ExitOnFailure(hr, "failed to get IPersistFile for shortcut '%ls'", wzShortcutPath); | ||
298 | |||
299 | hr = piPersistFile->Save(wzShortcutPath, TRUE); | ||
300 | ExitOnFailure(hr, "failed to save shortcut '%ls'", wzShortcutPath); | ||
301 | |||
302 | LExit: | ||
303 | ReleaseObject(piPersistFile); | ||
304 | ReleaseObject(piShellLink); | ||
305 | |||
306 | return hr; | ||
307 | } | ||
308 | |||
309 | |||
310 | |||
311 | /****************************************************************** | ||
312 | WixCreateInternetShortcuts - entry point for Internet shortcuts | ||
313 | custom action | ||
314 | *******************************************************************/ | ||
315 | extern "C" UINT __stdcall WixCreateInternetShortcuts( | ||
316 | __in MSIHANDLE hInstall | ||
317 | ) | ||
318 | { | ||
319 | HRESULT hr = S_OK; | ||
320 | UINT er = ERROR_SUCCESS; | ||
321 | |||
322 | LPWSTR pwz = NULL; | ||
323 | LPWSTR pwzCustomActionData = NULL; | ||
324 | LPWSTR pwzTarget = NULL; | ||
325 | LPWSTR pwzShortcutPath = NULL; | ||
326 | LPWSTR pwzIconPath = NULL; | ||
327 | BOOL fInitializedCom = FALSE; | ||
328 | int iAttr = 0; | ||
329 | int iIconIndex = 0; | ||
330 | |||
331 | // initialize | ||
332 | hr = WcaInitialize(hInstall, "WixCreateInternetShortcuts"); | ||
333 | ExitOnFailure(hr, "failed to initialize WixCreateInternetShortcuts"); | ||
334 | |||
335 | hr = ::CoInitialize(NULL); | ||
336 | ExitOnFailure(hr, "failed to initialize COM"); | ||
337 | fInitializedCom = TRUE; | ||
338 | |||
339 | // extract the custom action data | ||
340 | hr = WcaGetProperty(L"CustomActionData", &pwzCustomActionData); | ||
341 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
342 | |||
343 | // loop through all the custom action data | ||
344 | pwz = pwzCustomActionData; | ||
345 | while (pwz && *pwz) | ||
346 | { | ||
347 | hr = WcaReadStringFromCaData(&pwz, &pwzShortcutPath); | ||
348 | ExitOnFailure(hr, "failed to read shortcut path from custom action data"); | ||
349 | hr = WcaReadStringFromCaData(&pwz, &pwzTarget); | ||
350 | ExitOnFailure(hr, "failed to read shortcut target from custom action data"); | ||
351 | hr = WcaReadIntegerFromCaData(&pwz, &iAttr); | ||
352 | ExitOnFailure(hr, "failed to read shortcut attributes from custom action data"); | ||
353 | hr = WcaReadStringFromCaData(&pwz, &pwzIconPath); | ||
354 | ExitOnFailure(hr, "failed to read shortcut icon path from custom action data"); | ||
355 | hr = WcaReadIntegerFromCaData(&pwz, &iIconIndex); | ||
356 | ExitOnFailure(hr, "failed to read shortcut icon index from custom action data"); | ||
357 | |||
358 | if ((iAttr & esaURL) == esaURL) | ||
359 | { | ||
360 | hr = CreateUrl(pwzTarget, pwzShortcutPath, pwzIconPath, iIconIndex); | ||
361 | } | ||
362 | else | ||
363 | { | ||
364 | hr = CreateLink(pwzTarget, pwzShortcutPath, pwzIconPath, iIconIndex); | ||
365 | } | ||
366 | ExitOnFailure(hr, "failed to create Internet shortcut"); | ||
367 | |||
368 | // tick the progress bar | ||
369 | hr = WcaProgressMessage(COST_INTERNETSHORTCUT, FALSE); | ||
370 | ExitOnFailure(hr, "failed to tick progress bar for shortcut: %ls", pwzShortcutPath); | ||
371 | } | ||
372 | |||
373 | LExit: | ||
374 | ReleaseStr(pwzCustomActionData); | ||
375 | ReleaseStr(pwzTarget); | ||
376 | ReleaseStr(pwzShortcutPath); | ||
377 | |||
378 | if (fInitializedCom) | ||
379 | { | ||
380 | ::CoUninitialize(); | ||
381 | } | ||
382 | |||
383 | er = FAILED(hr) ? ERROR_INSTALL_FAILURE : er; | ||
384 | return WcaFinalize(er); | ||
385 | } | ||
386 | |||
387 | |||
388 | |||
389 | /****************************************************************** | ||
390 | WixRollbackInternetShortcuts - entry point for Internet shortcuts | ||
391 | custom action (rollback) | ||
392 | *******************************************************************/ | ||
393 | extern "C" UINT __stdcall WixRollbackInternetShortcuts( | ||
394 | __in MSIHANDLE hInstall | ||
395 | ) | ||
396 | { | ||
397 | HRESULT hr = S_OK; | ||
398 | UINT er = ERROR_SUCCESS; | ||
399 | |||
400 | LPWSTR pwz = NULL; | ||
401 | LPWSTR pwzCustomActionData = NULL; | ||
402 | LPWSTR pwzShortcutPath = NULL; | ||
403 | int iAttr = 0; | ||
404 | |||
405 | // initialize | ||
406 | hr = WcaInitialize(hInstall, "WixRemoveInternetShortcuts"); | ||
407 | ExitOnFailure(hr, "failed to initialize WixRemoveInternetShortcuts"); | ||
408 | |||
409 | hr = WcaGetProperty(L"CustomActionData", &pwzCustomActionData); | ||
410 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
411 | |||
412 | // loop through all the custom action data | ||
413 | pwz = pwzCustomActionData; | ||
414 | while (pwz && *pwz) | ||
415 | { | ||
416 | // extract the custom action data we're interested in | ||
417 | hr = WcaReadStringFromCaData(&pwz, &pwzShortcutPath); | ||
418 | ExitOnFailure(hr, "failed to read shortcut path from custom action data for rollback"); | ||
419 | |||
420 | // delete file | ||
421 | hr = FileEnsureDelete(pwzShortcutPath); | ||
422 | ExitOnFailure(hr, "failed to delete file '%ls'", pwzShortcutPath); | ||
423 | |||
424 | // skip over the shortcut target and attributes | ||
425 | hr = WcaReadStringFromCaData(&pwz, &pwzShortcutPath); | ||
426 | ExitOnFailure(hr, "failed to skip shortcut target from custom action data for rollback"); | ||
427 | hr = WcaReadIntegerFromCaData(&pwz, &iAttr); | ||
428 | ExitOnFailure(hr, "failed to read shortcut attributes from custom action data"); | ||
429 | } | ||
430 | |||
431 | LExit: | ||
432 | ReleaseStr(pwzCustomActionData); | ||
433 | ReleaseStr(pwzShortcutPath); | ||
434 | |||
435 | er = FAILED(hr) ? ERROR_INSTALL_FAILURE : er; | ||
436 | return WcaFinalize(er); | ||
437 | } | ||
diff --git a/src/ext/Util/ca/precomp.h b/src/ext/Util/ca/precomp.h new file mode 100644 index 00000000..c5d6afe5 --- /dev/null +++ b/src/ext/Util/ca/precomp.h | |||
@@ -0,0 +1,54 @@ | |||
1 | #pragma once | ||
2 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
3 | |||
4 | |||
5 | #if _WIN32_MSI < 150 | ||
6 | #define _WIN32_MSI 150 | ||
7 | #endif | ||
8 | |||
9 | #include <windows.h> | ||
10 | #include <msiquery.h> | ||
11 | #include <msidefs.h> | ||
12 | #include <stierr.h> | ||
13 | |||
14 | #include <strsafe.h> | ||
15 | |||
16 | #include <msxml2.h> | ||
17 | #include <Iads.h> | ||
18 | #include <activeds.h> | ||
19 | #include <lm.h> // NetApi32.lib | ||
20 | #include <Ntsecapi.h> | ||
21 | #include <Dsgetdc.h> | ||
22 | #include <shlobj.h> | ||
23 | #include <intshcut.h> | ||
24 | |||
25 | #define MAXUINT USHRT_MAX | ||
26 | |||
27 | #include "wcautil.h" | ||
28 | #include "wcawow64.h" | ||
29 | #include "wcawrapquery.h" | ||
30 | #include "aclutil.h" | ||
31 | #include "dirutil.h" | ||
32 | #include "fileutil.h" | ||
33 | #include "memutil.h" | ||
34 | #include "osutil.h" | ||
35 | #include "pathutil.h" | ||
36 | #include "procutil.h" | ||
37 | #include "shelutil.h" | ||
38 | #include "strutil.h" | ||
39 | #include "sczutil.h" | ||
40 | #include "rmutil.h" | ||
41 | #include "userutil.h" | ||
42 | #include "xmlutil.h" | ||
43 | #include "wiutil.h" | ||
44 | |||
45 | #include "CustomMsiErrors.h" | ||
46 | |||
47 | #include "sca.h" | ||
48 | #include "scacost.h" | ||
49 | #include "cost.h" | ||
50 | #include "scauser.h" | ||
51 | #include "scasmb.h" | ||
52 | #include "scasmbexec.h" | ||
53 | |||
54 | #include "caDecor.h" | ||
diff --git a/src/ext/Util/ca/qtexecca.cpp b/src/ext/Util/ca/qtexecca.cpp new file mode 100644 index 00000000..ddcc812f --- /dev/null +++ b/src/ext/Util/ca/qtexecca.cpp | |||
@@ -0,0 +1,316 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | #define OUTPUT_BUFFER 1024 | ||
6 | |||
7 | // These old "CA" prefix names are deprecated, and intended to go away in wix 4.0, only staying now for compatibility reasons | ||
8 | const LPCWSTR CAQUIET_TIMEOUT_PROPERTY = L"QtExecCmdTimeout"; | ||
9 | const LPCWSTR CAQUIET_ARGUMENTS_PROPERTY = L"QtExecCmdLine"; | ||
10 | const LPCWSTR CAQUIET64_ARGUMENTS_PROPERTY = L"QtExec64CmdLine"; | ||
11 | // end deprecated section | ||
12 | |||
13 | // WixCA name quiet commandline argument properties | ||
14 | const LPCWSTR WIX_QUIET_ARGUMENTS_PROPERTY = L"WixQuietExecCmdLine"; | ||
15 | const LPCWSTR WIX_QUIET64_ARGUMENTS_PROPERTY = L"WixQuietExec64CmdLine"; | ||
16 | |||
17 | // WixCA quiet timeout properties | ||
18 | const LPCWSTR WIX_QUIET_TIMEOUT_PROPERTY = L"WixQuietExecCmdTimeout"; | ||
19 | const LPCWSTR WIX_QUIET64_TIMEOUT_PROPERTY = L"WixQuietExec64CmdTimeout"; | ||
20 | |||
21 | // WixCA silent commandline argument properties | ||
22 | const LPCWSTR WIX_SILENT_ARGUMENTS_PROPERTY = L"WixSilentExecCmdLine"; | ||
23 | const LPCWSTR WIX_SILENT64_ARGUMENTS_PROPERTY = L"WixSilentExec64CmdLine"; | ||
24 | |||
25 | // WixCA silent timeout properties | ||
26 | const LPCWSTR WIX_SILENT_TIMEOUT_PROPERTY = L"WixSilentExecCmdTimeout"; | ||
27 | const LPCWSTR WIX_SILENT64_TIMEOUT_PROPERTY = L"WixSilentExec64CmdTimeout"; | ||
28 | |||
29 | HRESULT BuildCommandLine( | ||
30 | __in LPCWSTR wzProperty, | ||
31 | __out LPWSTR *ppwzCommand | ||
32 | ) | ||
33 | { | ||
34 | Assert(ppwzCommand); | ||
35 | |||
36 | HRESULT hr = S_OK; | ||
37 | BOOL fScheduled = ::MsiGetMode(WcaGetInstallHandle(), MSIRUNMODE_SCHEDULED); | ||
38 | BOOL fRollback = ::MsiGetMode(WcaGetInstallHandle(), MSIRUNMODE_ROLLBACK); | ||
39 | BOOL fCommit = ::MsiGetMode(WcaGetInstallHandle(), MSIRUNMODE_COMMIT); | ||
40 | |||
41 | if (fScheduled || fRollback || fCommit) | ||
42 | { | ||
43 | if (WcaIsPropertySet("CustomActionData")) | ||
44 | { | ||
45 | hr = WcaGetProperty( L"CustomActionData", ppwzCommand); | ||
46 | ExitOnFailure(hr, "Failed to get CustomActionData"); | ||
47 | } | ||
48 | } | ||
49 | else if (WcaIsUnicodePropertySet(wzProperty)) | ||
50 | { | ||
51 | hr = WcaGetFormattedProperty(wzProperty, ppwzCommand); | ||
52 | ExitOnFailure(hr, "Failed to get %ls", wzProperty); | ||
53 | hr = WcaSetProperty(wzProperty, L""); // clear out the property now that we've read it | ||
54 | ExitOnFailure(hr, "Failed to set %ls", wzProperty); | ||
55 | } | ||
56 | |||
57 | if (!*ppwzCommand) | ||
58 | { | ||
59 | ExitOnFailure(hr = E_INVALIDARG, "Failed to get command line data"); | ||
60 | } | ||
61 | |||
62 | if (L'"' != **ppwzCommand) | ||
63 | { | ||
64 | WcaLog(LOGMSG_STANDARD, "Command string must begin with quoted application name."); | ||
65 | ExitOnFailure(hr = E_INVALIDARG, "invalid command line property value"); | ||
66 | } | ||
67 | |||
68 | LExit: | ||
69 | return hr; | ||
70 | } | ||
71 | |||
72 | #define ONEMINUTE 60000 | ||
73 | |||
74 | DWORD GetTimeout(LPCWSTR wzPropertyName) | ||
75 | { | ||
76 | DWORD dwTimeout = ONEMINUTE; | ||
77 | HRESULT hr = S_OK; | ||
78 | |||
79 | LPWSTR pwzData = NULL; | ||
80 | |||
81 | if (WcaIsUnicodePropertySet(wzPropertyName)) | ||
82 | { | ||
83 | hr = WcaGetProperty(wzPropertyName, &pwzData); | ||
84 | ExitOnFailure(hr, "Failed to get %ls", wzPropertyName); | ||
85 | |||
86 | if ((dwTimeout = (DWORD)_wtoi(pwzData)) == 0) | ||
87 | { | ||
88 | dwTimeout = ONEMINUTE; | ||
89 | } | ||
90 | } | ||
91 | |||
92 | LExit: | ||
93 | ReleaseStr(pwzData); | ||
94 | |||
95 | return dwTimeout; | ||
96 | |||
97 | } | ||
98 | |||
99 | HRESULT ExecCommon( | ||
100 | __in LPCWSTR wzArgumentsProperty, | ||
101 | __in LPCWSTR wzTimeoutProperty, | ||
102 | __in BOOL fLogCommand, | ||
103 | __in BOOL fLogOutput | ||
104 | ) | ||
105 | { | ||
106 | HRESULT hr = S_OK; | ||
107 | LPWSTR pwzCommand = NULL; | ||
108 | DWORD dwTimeout = 0; | ||
109 | |||
110 | hr = BuildCommandLine(wzArgumentsProperty, &pwzCommand); | ||
111 | ExitOnFailure(hr, "Failed to get Command Line"); | ||
112 | |||
113 | dwTimeout = GetTimeout(wzTimeoutProperty); | ||
114 | |||
115 | hr = QuietExec(pwzCommand, dwTimeout, fLogCommand, fLogOutput); | ||
116 | ExitOnFailure(hr, "QuietExec Failed"); | ||
117 | |||
118 | LExit: | ||
119 | ReleaseStr(pwzCommand); | ||
120 | |||
121 | return hr; | ||
122 | } | ||
123 | |||
124 | HRESULT ExecCommon64( | ||
125 | __in LPCWSTR wzArgumentsProperty, | ||
126 | __in LPCWSTR wzTimeoutProperty, | ||
127 | __in BOOL fLogCommand, | ||
128 | __in BOOL fLogOutput | ||
129 | ) | ||
130 | { | ||
131 | HRESULT hr = S_OK; | ||
132 | LPWSTR pwzCommand = NULL; | ||
133 | DWORD dwTimeout = 0; | ||
134 | #ifndef _WIN64 | ||
135 | BOOL fIsWow64Initialized = FALSE; | ||
136 | BOOL fRedirected = FALSE; | ||
137 | |||
138 | hr = WcaInitializeWow64(); | ||
139 | if (S_FALSE == hr) | ||
140 | { | ||
141 | hr = TYPE_E_DLLFUNCTIONNOTFOUND; | ||
142 | } | ||
143 | ExitOnFailure(hr, "Failed to intialize WOW64."); | ||
144 | fIsWow64Initialized = TRUE; | ||
145 | |||
146 | hr = WcaDisableWow64FSRedirection(); | ||
147 | ExitOnFailure(hr, "Failed to enable filesystem redirection."); | ||
148 | fRedirected = TRUE; | ||
149 | #endif | ||
150 | |||
151 | hr = BuildCommandLine(wzArgumentsProperty, &pwzCommand); | ||
152 | ExitOnFailure(hr, "Failed to get Command Line"); | ||
153 | |||
154 | dwTimeout = GetTimeout(wzTimeoutProperty); | ||
155 | |||
156 | hr = QuietExec(pwzCommand, dwTimeout, fLogCommand, fLogOutput); | ||
157 | ExitOnFailure(hr, "QuietExec64 Failed"); | ||
158 | |||
159 | LExit: | ||
160 | ReleaseStr(pwzCommand); | ||
161 | |||
162 | #ifndef _WIN64 | ||
163 | if (fRedirected) | ||
164 | { | ||
165 | WcaRevertWow64FSRedirection(); | ||
166 | } | ||
167 | |||
168 | if (fIsWow64Initialized) | ||
169 | { | ||
170 | WcaFinalizeWow64(); | ||
171 | } | ||
172 | #endif | ||
173 | |||
174 | return hr; | ||
175 | } | ||
176 | |||
177 | // These two custom actions are deprecated, and should go away in wix v4.0. WixQuietExec replaces this one, | ||
178 | // and is not intended to have any difference in behavior apart from CA name and property names. | ||
179 | extern "C" UINT __stdcall CAQuietExec( | ||
180 | __in MSIHANDLE hInstall | ||
181 | ) | ||
182 | { | ||
183 | Assert(hInstall); | ||
184 | HRESULT hr = S_OK; | ||
185 | UINT er = ERROR_SUCCESS; | ||
186 | |||
187 | hr = WcaInitialize(hInstall, "CAQuietExec"); | ||
188 | ExitOnFailure(hr, "Failed to initialize"); | ||
189 | |||
190 | hr = ExecCommon(CAQUIET_ARGUMENTS_PROPERTY, CAQUIET_TIMEOUT_PROPERTY, TRUE, TRUE); | ||
191 | ExitOnFailure(hr, "Failed in ExecCommon method"); | ||
192 | |||
193 | LExit: | ||
194 | if (FAILED(hr)) | ||
195 | { | ||
196 | er = ERROR_INSTALL_FAILURE; | ||
197 | } | ||
198 | |||
199 | return WcaFinalize(er); | ||
200 | } | ||
201 | |||
202 | // 2nd deprecated custom action name, superseded by WixQuietExec64 | ||
203 | extern "C" UINT __stdcall CAQuietExec64( | ||
204 | __in MSIHANDLE hInstall | ||
205 | ) | ||
206 | { | ||
207 | Assert(hInstall); | ||
208 | HRESULT hr = S_OK; | ||
209 | UINT er = ERROR_SUCCESS; | ||
210 | |||
211 | hr = WcaInitialize(hInstall, "CAQuietExec64"); | ||
212 | ExitOnFailure(hr, "Failed to initialize"); | ||
213 | |||
214 | hr = ExecCommon64(CAQUIET64_ARGUMENTS_PROPERTY, CAQUIET_TIMEOUT_PROPERTY, TRUE, TRUE); | ||
215 | ExitOnFailure(hr, "Failed in ExecCommon64 method"); | ||
216 | |||
217 | LExit: | ||
218 | if (FAILED(hr)) | ||
219 | { | ||
220 | er = ERROR_INSTALL_FAILURE; | ||
221 | } | ||
222 | |||
223 | return WcaFinalize(er); | ||
224 | } | ||
225 | |||
226 | extern "C" UINT __stdcall WixQuietExec( | ||
227 | __in MSIHANDLE hInstall | ||
228 | ) | ||
229 | { | ||
230 | Assert(hInstall); | ||
231 | HRESULT hr = S_OK; | ||
232 | UINT er = ERROR_SUCCESS; | ||
233 | |||
234 | hr = WcaInitialize(hInstall, "WixQuietExec"); | ||
235 | ExitOnFailure(hr, "Failed to initialize"); | ||
236 | |||
237 | hr = ExecCommon(WIX_QUIET_ARGUMENTS_PROPERTY, WIX_QUIET_TIMEOUT_PROPERTY, TRUE, TRUE); | ||
238 | ExitOnFailure(hr, "Failed in ExecCommon method"); | ||
239 | |||
240 | LExit: | ||
241 | if (FAILED(hr)) | ||
242 | { | ||
243 | er = ERROR_INSTALL_FAILURE; | ||
244 | } | ||
245 | |||
246 | return WcaFinalize(er); | ||
247 | } | ||
248 | |||
249 | extern "C" UINT __stdcall WixQuietExec64( | ||
250 | __in MSIHANDLE hInstall | ||
251 | ) | ||
252 | { | ||
253 | Assert(hInstall); | ||
254 | HRESULT hr = S_OK; | ||
255 | UINT er = ERROR_SUCCESS; | ||
256 | |||
257 | hr = WcaInitialize(hInstall, "WixQuietExec64"); | ||
258 | ExitOnFailure(hr, "Failed to initialize"); | ||
259 | |||
260 | hr = ExecCommon64(WIX_QUIET64_ARGUMENTS_PROPERTY, WIX_QUIET64_TIMEOUT_PROPERTY, TRUE, TRUE); | ||
261 | ExitOnFailure(hr, "Failed in ExecCommon method"); | ||
262 | |||
263 | LExit: | ||
264 | if (FAILED(hr)) | ||
265 | { | ||
266 | er = ERROR_INSTALL_FAILURE; | ||
267 | } | ||
268 | |||
269 | return WcaFinalize(er); | ||
270 | } | ||
271 | |||
272 | extern "C" UINT __stdcall WixSilentExec( | ||
273 | __in MSIHANDLE hInstall | ||
274 | ) | ||
275 | { | ||
276 | Assert(hInstall); | ||
277 | HRESULT hr = S_OK; | ||
278 | UINT er = ERROR_SUCCESS; | ||
279 | |||
280 | hr = WcaInitialize(hInstall, "WixSilentExec"); | ||
281 | ExitOnFailure(hr, "Failed to initialize"); | ||
282 | |||
283 | hr = ExecCommon(WIX_SILENT_ARGUMENTS_PROPERTY, WIX_SILENT_TIMEOUT_PROPERTY, FALSE, FALSE); | ||
284 | ExitOnFailure(hr, "Failed in ExecCommon method"); | ||
285 | |||
286 | LExit: | ||
287 | if (FAILED(hr)) | ||
288 | { | ||
289 | er = ERROR_INSTALL_FAILURE; | ||
290 | } | ||
291 | |||
292 | return WcaFinalize(er); | ||
293 | } | ||
294 | |||
295 | extern "C" UINT __stdcall WixSilentExec64( | ||
296 | __in MSIHANDLE hInstall | ||
297 | ) | ||
298 | { | ||
299 | Assert(hInstall); | ||
300 | HRESULT hr = S_OK; | ||
301 | UINT er = ERROR_SUCCESS; | ||
302 | |||
303 | hr = WcaInitialize(hInstall, "WixSilentExec64"); | ||
304 | ExitOnFailure(hr, "Failed to initialize"); | ||
305 | |||
306 | hr = ExecCommon64(WIX_SILENT64_ARGUMENTS_PROPERTY, WIX_SILENT64_TIMEOUT_PROPERTY, FALSE, FALSE); | ||
307 | ExitOnFailure(hr, "Failed in ExecCommon method"); | ||
308 | |||
309 | LExit: | ||
310 | if (FAILED(hr)) | ||
311 | { | ||
312 | er = ERROR_INSTALL_FAILURE; | ||
313 | } | ||
314 | |||
315 | return WcaFinalize(er); | ||
316 | } | ||
diff --git a/src/ext/Util/ca/sca.h b/src/ext/Util/ca/sca.h new file mode 100644 index 00000000..599122ff --- /dev/null +++ b/src/ext/Util/ca/sca.h | |||
@@ -0,0 +1,19 @@ | |||
1 | #pragma once | ||
2 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
3 | |||
4 | // user creation attributes definitions | ||
5 | enum SCAU_ATTRIBUTES | ||
6 | { | ||
7 | SCAU_DONT_EXPIRE_PASSWRD = 0x00000001, | ||
8 | SCAU_PASSWD_CANT_CHANGE = 0x00000002, | ||
9 | SCAU_PASSWD_CHANGE_REQD_ON_LOGIN = 0x00000004, | ||
10 | SCAU_DISABLE_ACCOUNT = 0x00000008, | ||
11 | SCAU_FAIL_IF_EXISTS = 0x00000010, | ||
12 | SCAU_UPDATE_IF_EXISTS = 0x00000020, | ||
13 | SCAU_ALLOW_LOGON_AS_SERVICE = 0x00000040, | ||
14 | SCAU_ALLOW_LOGON_AS_BATCH = 0x00000080, | ||
15 | |||
16 | SCAU_DONT_REMOVE_ON_UNINSTALL = 0x00000100, | ||
17 | SCAU_DONT_CREATE_USER = 0x00000200, | ||
18 | SCAU_NON_VITAL = 0x00000400, | ||
19 | }; \ No newline at end of file | ||
diff --git a/src/ext/Util/ca/scacost.h b/src/ext/Util/ca/scacost.h new file mode 100644 index 00000000..5b215035 --- /dev/null +++ b/src/ext/Util/ca/scacost.h | |||
@@ -0,0 +1,18 @@ | |||
1 | #pragma once | ||
2 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
3 | |||
4 | |||
5 | const UINT COST_PERFMON_REGISTER = 1000; | ||
6 | const UINT COST_PERFMON_UNREGISTER = 1000; | ||
7 | |||
8 | const UINT COST_SMB_CREATESMB = 10000; | ||
9 | const UINT COST_SMB_DROPSMB = 5000; | ||
10 | const UINT COST_USER_ADD = 10000; | ||
11 | const UINT COST_USER_DELETE = 10000; | ||
12 | |||
13 | const UINT COST_PERFMONMANIFEST_REGISTER = 1000; | ||
14 | const UINT COST_PERFMONMANIFEST_UNREGISTER = 1000; | ||
15 | |||
16 | const UINT COST_EVENTMANIFEST_REGISTER = 1000; | ||
17 | const UINT COST_EVENTMANIFEST_UNREGISTER = 1000; | ||
18 | |||
diff --git a/src/ext/Util/ca/scaexec.cpp b/src/ext/Util/ca/scaexec.cpp new file mode 100644 index 00000000..5845c1b4 --- /dev/null +++ b/src/ext/Util/ca/scaexec.cpp | |||
@@ -0,0 +1,1082 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | |||
6 | /******************************************************************** | ||
7 | * CreateSmb - CUSTOM ACTION ENTRY POINT for creating fileshares | ||
8 | * | ||
9 | * Input: deferred CustomActionData - | ||
10 | * wzFsKey\twzShareDesc\twzFullPath\tfIntegratedAuth\twzUserName\tnPermissions\twzUserName\tnPermissions... | ||
11 | * | ||
12 | * ****************************************************************/ | ||
13 | extern "C" UINT __stdcall CreateSmb(MSIHANDLE hInstall) | ||
14 | { | ||
15 | //AssertSz(0, "debug CreateSmb"); | ||
16 | UINT er = ERROR_SUCCESS; | ||
17 | HRESULT hr = S_OK; | ||
18 | |||
19 | LPWSTR pwzData = NULL; | ||
20 | LPWSTR pwz = NULL; | ||
21 | LPWSTR pwzFsKey = NULL; | ||
22 | LPWSTR pwzShareDesc = NULL; | ||
23 | LPWSTR pwzDirectory = NULL; | ||
24 | int iAccessMode = 0; | ||
25 | DWORD nExPermissions = 0; | ||
26 | BOOL fIntegratedAuth; | ||
27 | LPWSTR pwzExUser = NULL; | ||
28 | SCA_SMBP ssp = {0}; | ||
29 | DWORD dwExUserPerms = 0; | ||
30 | DWORD dwCounter = 0; | ||
31 | SCA_SMBP_USER_PERMS* pUserPermsList = NULL; | ||
32 | |||
33 | hr = WcaInitialize(hInstall, "CreateSmb"); | ||
34 | ExitOnFailure(hr, "failed to initialize"); | ||
35 | |||
36 | hr = WcaGetProperty( L"CustomActionData", &pwzData); | ||
37 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
38 | |||
39 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzData); | ||
40 | |||
41 | pwz = pwzData; | ||
42 | hr = WcaReadStringFromCaData(&pwz, &pwzFsKey); // share name | ||
43 | ExitOnFailure(hr, "failed to read share name"); | ||
44 | hr = WcaReadStringFromCaData(&pwz, &pwzShareDesc); // share description | ||
45 | ExitOnFailure(hr, "failed to read share name"); | ||
46 | hr = WcaReadStringFromCaData(&pwz, &pwzDirectory); // full path to share | ||
47 | ExitOnFailure(hr, "failed to read share name"); | ||
48 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int *>(&fIntegratedAuth)); | ||
49 | ExitOnFailure(hr, "failed to read integrated authentication"); | ||
50 | |||
51 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int *>(&dwExUserPerms)); | ||
52 | ExitOnFailure(hr, "failed to read count of permissions to set"); | ||
53 | if(dwExUserPerms > 0) | ||
54 | { | ||
55 | pUserPermsList = static_cast<SCA_SMBP_USER_PERMS*>(MemAlloc(sizeof(SCA_SMBP_USER_PERMS)*dwExUserPerms, TRUE)); | ||
56 | ExitOnNull(pUserPermsList, hr, E_OUTOFMEMORY, "failed to allocate memory for permissions structure"); | ||
57 | |||
58 | //Pull out all of the ExUserPerm strings | ||
59 | for (dwCounter = 0; dwCounter < dwExUserPerms; ++dwCounter) | ||
60 | { | ||
61 | hr = WcaReadStringFromCaData(&pwz, &pwzExUser); // user account | ||
62 | ExitOnFailure(hr, "failed to read user account"); | ||
63 | pUserPermsList[dwCounter].wzUser = pwzExUser; | ||
64 | pwzExUser = NULL; | ||
65 | |||
66 | hr = WcaReadIntegerFromCaData(&pwz, &iAccessMode); | ||
67 | ExitOnFailure(hr, "failed to read access mode"); | ||
68 | pUserPermsList[dwCounter].accessMode = (ACCESS_MODE)iAccessMode; | ||
69 | iAccessMode = 0; | ||
70 | |||
71 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int *>(&nExPermissions)); | ||
72 | ExitOnFailure(hr, "failed to read count of permissions"); | ||
73 | pUserPermsList[dwCounter].nPermissions = nExPermissions; | ||
74 | nExPermissions = 0; | ||
75 | } | ||
76 | } | ||
77 | |||
78 | ssp.wzKey = pwzFsKey; | ||
79 | ssp.wzDescription = pwzShareDesc; | ||
80 | ssp.wzDirectory = pwzDirectory; | ||
81 | ssp.fUseIntegratedAuth = fIntegratedAuth; | ||
82 | ssp.dwUserPermissionCount = dwExUserPerms; | ||
83 | ssp.pUserPerms = pUserPermsList; | ||
84 | |||
85 | hr = ScaEnsureSmbExists(&ssp); | ||
86 | MessageExitOnFailure(hr, msierrSMBFailedCreate, "failed to create share: '%ls'", pwzFsKey); | ||
87 | |||
88 | hr = WcaProgressMessage(COST_SMB_CREATESMB, FALSE); | ||
89 | |||
90 | LExit: | ||
91 | ReleaseStr(pwzFsKey); | ||
92 | ReleaseStr(pwzShareDesc); | ||
93 | ReleaseStr(pwzDirectory); | ||
94 | ReleaseStr(pwzData); | ||
95 | |||
96 | if (pUserPermsList) | ||
97 | { | ||
98 | MemFree(pUserPermsList); | ||
99 | } | ||
100 | |||
101 | if (FAILED(hr)) | ||
102 | { | ||
103 | er = ERROR_INSTALL_FAILURE; | ||
104 | } | ||
105 | return WcaFinalize(er); | ||
106 | } | ||
107 | |||
108 | |||
109 | |||
110 | /******************************************************************** | ||
111 | DropSmb - CUSTOM ACTION ENTRY POINT for creating fileshares | ||
112 | |||
113 | Input: deferred CustomActionData - wzFsKey\twzShareDesc\twzFullPath\tnPermissions\tfIntegratedAuth\twzUserName\twzPassword | ||
114 | |||
115 | * ****************************************************************/ | ||
116 | extern "C" UINT __stdcall DropSmb(MSIHANDLE hInstall) | ||
117 | { | ||
118 | //AssertSz(0, "debug DropSmb"); | ||
119 | UINT er = ERROR_SUCCESS; | ||
120 | HRESULT hr = S_OK; | ||
121 | |||
122 | LPWSTR pwzData = NULL; | ||
123 | LPWSTR pwz = NULL; | ||
124 | LPWSTR pwzFsKey = NULL; | ||
125 | SCA_SMBP ssp = {0}; | ||
126 | |||
127 | hr = WcaInitialize(hInstall, "DropSmb"); | ||
128 | ExitOnFailure(hr, "failed to initialize"); | ||
129 | |||
130 | hr = WcaGetProperty( L"CustomActionData", &pwzData); | ||
131 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
132 | |||
133 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzData); | ||
134 | |||
135 | pwz = pwzData; | ||
136 | hr = WcaReadStringFromCaData(&pwz, &pwzFsKey); // share name | ||
137 | ExitOnFailure(hr, "failed to read share name"); | ||
138 | |||
139 | ssp.wzKey = pwzFsKey; | ||
140 | |||
141 | hr = ScaDropSmb(&ssp); | ||
142 | MessageExitOnFailure(hr, msierrSMBFailedDrop, "failed to delete share: '%ls'", pwzFsKey); | ||
143 | |||
144 | hr = WcaProgressMessage(COST_SMB_DROPSMB, FALSE); | ||
145 | |||
146 | LExit: | ||
147 | ReleaseStr(pwzFsKey); | ||
148 | ReleaseStr(pwzData); | ||
149 | |||
150 | if (FAILED(hr)) | ||
151 | { | ||
152 | er = ERROR_INSTALL_FAILURE; | ||
153 | } | ||
154 | return WcaFinalize(er); | ||
155 | } | ||
156 | |||
157 | |||
158 | static HRESULT AddUserToGroup( | ||
159 | __in LPWSTR wzUser, | ||
160 | __in LPCWSTR wzUserDomain, | ||
161 | __in LPCWSTR wzGroup, | ||
162 | __in LPCWSTR wzGroupDomain | ||
163 | ) | ||
164 | { | ||
165 | Assert(wzUser && *wzUser && wzUserDomain && wzGroup && *wzGroup && wzGroupDomain); | ||
166 | |||
167 | HRESULT hr = S_OK; | ||
168 | IADsGroup *pGroup = NULL; | ||
169 | BSTR bstrUser = NULL; | ||
170 | BSTR bstrGroup = NULL; | ||
171 | LPCWSTR wz = NULL; | ||
172 | LPWSTR pwzUser = NULL; | ||
173 | LOCALGROUP_MEMBERS_INFO_3 lgmi; | ||
174 | |||
175 | if (*wzGroupDomain) | ||
176 | { | ||
177 | wz = wzGroupDomain; | ||
178 | } | ||
179 | |||
180 | // Try adding it to the global group first | ||
181 | UINT ui = ::NetGroupAddUser(wz, wzGroup, wzUser); | ||
182 | if (NERR_GroupNotFound == ui) | ||
183 | { | ||
184 | // Try adding it to the local group | ||
185 | if (wzUserDomain) | ||
186 | { | ||
187 | hr = StrAllocFormatted(&pwzUser, L"%s\\%s", wzUserDomain, wzUser); | ||
188 | ExitOnFailure(hr, "failed to allocate user domain string"); | ||
189 | } | ||
190 | |||
191 | lgmi.lgrmi3_domainandname = (NULL == pwzUser ? wzUser : pwzUser); | ||
192 | ui = ::NetLocalGroupAddMembers(wz, wzGroup, 3 , reinterpret_cast<LPBYTE>(&lgmi), 1); | ||
193 | } | ||
194 | hr = HRESULT_FROM_WIN32(ui); | ||
195 | if (HRESULT_FROM_WIN32(ERROR_MEMBER_IN_ALIAS) == hr) // if they're already a member of the group don't report an error | ||
196 | hr = S_OK; | ||
197 | |||
198 | // | ||
199 | // If we failed, try active directory | ||
200 | // | ||
201 | if (FAILED(hr)) | ||
202 | { | ||
203 | WcaLog(LOGMSG_VERBOSE, "Failed to add user: %ls, domain %ls to group: %ls, domain: %ls with error 0x%x. Attempting to use Active Directory", wzUser, wzUserDomain, wzGroup, wzGroupDomain, hr); | ||
204 | |||
205 | hr = UserCreateADsPath(wzUserDomain, wzUser, &bstrUser); | ||
206 | ExitOnFailure(hr, "failed to create user ADsPath for user: %ls domain: %ls", wzUser, wzUserDomain); | ||
207 | |||
208 | hr = UserCreateADsPath(wzGroupDomain, wzGroup, &bstrGroup); | ||
209 | ExitOnFailure(hr, "failed to create group ADsPath for group: %ls domain: %ls", wzGroup, wzGroupDomain); | ||
210 | |||
211 | hr = ::ADsGetObject(bstrGroup,IID_IADsGroup, reinterpret_cast<void**>(&pGroup)); | ||
212 | ExitOnFailure(hr, "Failed to get group '%ls'.", reinterpret_cast<WCHAR*>(bstrGroup) ); | ||
213 | |||
214 | hr = pGroup->Add(bstrUser); | ||
215 | if ((HRESULT_FROM_WIN32(ERROR_OBJECT_ALREADY_EXISTS) == hr) || (HRESULT_FROM_WIN32(ERROR_MEMBER_IN_ALIAS) == hr)) | ||
216 | hr = S_OK; | ||
217 | |||
218 | ExitOnFailure(hr, "Failed to add user %ls to group '%ls'.", reinterpret_cast<WCHAR*>(bstrUser), reinterpret_cast<WCHAR*>(bstrGroup) ); | ||
219 | } | ||
220 | |||
221 | LExit: | ||
222 | ReleaseObject(pGroup); | ||
223 | ReleaseBSTR(bstrUser); | ||
224 | ReleaseBSTR(bstrGroup); | ||
225 | |||
226 | return hr; | ||
227 | } | ||
228 | |||
229 | static HRESULT RemoveUserFromGroup( | ||
230 | __in LPWSTR wzUser, | ||
231 | __in LPCWSTR wzUserDomain, | ||
232 | __in LPCWSTR wzGroup, | ||
233 | __in LPCWSTR wzGroupDomain | ||
234 | ) | ||
235 | { | ||
236 | Assert(wzUser && *wzUser && wzUserDomain && wzGroup && *wzGroup && wzGroupDomain); | ||
237 | |||
238 | HRESULT hr = S_OK; | ||
239 | IADsGroup *pGroup = NULL; | ||
240 | BSTR bstrUser = NULL; | ||
241 | BSTR bstrGroup = NULL; | ||
242 | LPCWSTR wz = NULL; | ||
243 | LPWSTR pwzUser = NULL; | ||
244 | LOCALGROUP_MEMBERS_INFO_3 lgmi; | ||
245 | |||
246 | if (*wzGroupDomain) | ||
247 | { | ||
248 | wz = wzGroupDomain; | ||
249 | } | ||
250 | |||
251 | // Try removing it from the global group first | ||
252 | UINT ui = ::NetGroupDelUser(wz, wzGroup, wzUser); | ||
253 | if (NERR_GroupNotFound == ui) | ||
254 | { | ||
255 | // Try removing it from the local group | ||
256 | if (wzUserDomain) | ||
257 | { | ||
258 | hr = StrAllocFormatted(&pwzUser, L"%s\\%s", wzUserDomain, wzUser); | ||
259 | ExitOnFailure(hr, "failed to allocate user domain string"); | ||
260 | } | ||
261 | |||
262 | lgmi.lgrmi3_domainandname = (NULL == pwzUser ? wzUser : pwzUser); | ||
263 | ui = ::NetLocalGroupDelMembers(wz, wzGroup, 3 , reinterpret_cast<LPBYTE>(&lgmi), 1); | ||
264 | } | ||
265 | hr = HRESULT_FROM_WIN32(ui); | ||
266 | |||
267 | // | ||
268 | // If we failed, try active directory | ||
269 | // | ||
270 | if (FAILED(hr)) | ||
271 | { | ||
272 | WcaLog(LOGMSG_VERBOSE, "Failed to remove user: %ls, domain %ls from group: %ls, domain: %ls with error 0x%x. Attempting to use Active Directory", wzUser, wzUserDomain, wzGroup, wzGroupDomain, hr); | ||
273 | |||
274 | hr = UserCreateADsPath(wzUserDomain, wzUser, &bstrUser); | ||
275 | ExitOnFailure(hr, "failed to create user ADsPath in order to remove user: %ls domain: %ls from a group", wzUser, wzUserDomain); | ||
276 | |||
277 | hr = UserCreateADsPath(wzGroupDomain, wzGroup, &bstrGroup); | ||
278 | ExitOnFailure(hr, "failed to create group ADsPath in order to remove user from group: %ls domain: %ls", wzGroup, wzGroupDomain); | ||
279 | |||
280 | hr = ::ADsGetObject(bstrGroup,IID_IADsGroup, reinterpret_cast<void**>(&pGroup)); | ||
281 | ExitOnFailure(hr, "Failed to get group '%ls'.", reinterpret_cast<WCHAR*>(bstrGroup) ); | ||
282 | |||
283 | hr = pGroup->Remove(bstrUser); | ||
284 | ExitOnFailure(hr, "Failed to remove user %ls from group '%ls'.", reinterpret_cast<WCHAR*>(bstrUser), reinterpret_cast<WCHAR*>(bstrGroup) ); | ||
285 | } | ||
286 | |||
287 | LExit: | ||
288 | ReleaseObject(pGroup); | ||
289 | ReleaseBSTR(bstrUser); | ||
290 | ReleaseBSTR(bstrGroup); | ||
291 | |||
292 | return hr; | ||
293 | } | ||
294 | |||
295 | |||
296 | static HRESULT GetUserHasRight( | ||
297 | __in LSA_HANDLE hPolicy, | ||
298 | __in PSID pUserSid, | ||
299 | __in LPWSTR wzRight, | ||
300 | __out BOOL* fHasRight | ||
301 | ) | ||
302 | { | ||
303 | HRESULT hr = S_OK; | ||
304 | NTSTATUS nt = 0; | ||
305 | LSA_UNICODE_STRING lucPrivilege = { 0 }; | ||
306 | PLSA_ENUMERATION_INFORMATION rgSids = NULL; | ||
307 | ULONG cSids = 0; | ||
308 | *fHasRight = FALSE; | ||
309 | |||
310 | lucPrivilege.Buffer = wzRight; | ||
311 | lucPrivilege.Length = static_cast<USHORT>(lstrlenW(lucPrivilege.Buffer) * sizeof(WCHAR)); | ||
312 | lucPrivilege.MaximumLength = (lucPrivilege.Length + 1) * sizeof(WCHAR); | ||
313 | |||
314 | nt = ::LsaEnumerateAccountsWithUserRight(hPolicy, &lucPrivilege, reinterpret_cast<PVOID*>(&rgSids), &cSids); | ||
315 | hr = HRESULT_FROM_WIN32(::LsaNtStatusToWinError(nt)); | ||
316 | ExitOnFailure(hr, "Failed to enumerate users for right: %ls", lucPrivilege.Buffer); | ||
317 | |||
318 | for (DWORD i = 0; i < cSids; ++i) | ||
319 | { | ||
320 | PLSA_ENUMERATION_INFORMATION pInfo = rgSids + i; | ||
321 | if (::EqualSid(pUserSid, pInfo->Sid)) | ||
322 | { | ||
323 | *fHasRight = TRUE; | ||
324 | break; | ||
325 | } | ||
326 | } | ||
327 | |||
328 | LExit: | ||
329 | if (rgSids) | ||
330 | { | ||
331 | ::LsaFreeMemory(rgSids); | ||
332 | } | ||
333 | |||
334 | return hr; | ||
335 | } | ||
336 | |||
337 | |||
338 | static HRESULT GetExistingUserRightsAssignments( | ||
339 | __in_opt LPCWSTR wzDomain, | ||
340 | __in LPCWSTR wzName, | ||
341 | __inout int* iAttributes | ||
342 | ) | ||
343 | { | ||
344 | HRESULT hr = S_OK; | ||
345 | NTSTATUS nt = 0; | ||
346 | BOOL fHasRight = FALSE; | ||
347 | |||
348 | LSA_HANDLE hPolicy = NULL; | ||
349 | LSA_OBJECT_ATTRIBUTES objectAttributes = { 0 }; | ||
350 | |||
351 | LPWSTR pwzUser = NULL; | ||
352 | PSID psid = NULL; | ||
353 | |||
354 | if (wzDomain && *wzDomain) | ||
355 | { | ||
356 | hr = StrAllocFormatted(&pwzUser, L"%s\\%s", wzDomain, wzName); | ||
357 | ExitOnFailure(hr, "Failed to allocate user with domain string"); | ||
358 | } | ||
359 | else | ||
360 | { | ||
361 | hr = StrAllocString(&pwzUser, wzName, 0); | ||
362 | ExitOnFailure(hr, "Failed to allocate string from user name."); | ||
363 | } | ||
364 | |||
365 | hr = AclGetAccountSid(NULL, pwzUser, &psid); | ||
366 | ExitOnFailure(hr, "Failed to get SID for user: %ls", pwzUser); | ||
367 | |||
368 | nt = ::LsaOpenPolicy(NULL, &objectAttributes, POLICY_LOOKUP_NAMES | POLICY_VIEW_LOCAL_INFORMATION, &hPolicy); | ||
369 | hr = HRESULT_FROM_WIN32(::LsaNtStatusToWinError(nt)); | ||
370 | ExitOnFailure(hr, "Failed to open LSA policy store"); | ||
371 | |||
372 | hr = GetUserHasRight(hPolicy, psid, L"SeServiceLogonRight", &fHasRight); | ||
373 | ExitOnFailure(hr, "Failed to check LogonAsService right"); | ||
374 | |||
375 | if (fHasRight) | ||
376 | { | ||
377 | *iAttributes |= SCAU_ALLOW_LOGON_AS_SERVICE; | ||
378 | } | ||
379 | |||
380 | hr = GetUserHasRight(hPolicy, psid, L"SeBatchLogonRight", &fHasRight); | ||
381 | ExitOnFailure(hr, "Failed to check LogonAsBatchJob right"); | ||
382 | |||
383 | if (fHasRight) | ||
384 | { | ||
385 | *iAttributes |= SCAU_ALLOW_LOGON_AS_BATCH; | ||
386 | } | ||
387 | |||
388 | LExit: | ||
389 | if (hPolicy) | ||
390 | { | ||
391 | ::LsaClose(hPolicy); | ||
392 | } | ||
393 | |||
394 | ReleaseSid(psid); | ||
395 | ReleaseStr(pwzUser); | ||
396 | return hr; | ||
397 | } | ||
398 | |||
399 | |||
400 | static HRESULT ModifyUserLocalServiceRight( | ||
401 | __in_opt LPCWSTR wzDomain, | ||
402 | __in LPCWSTR wzName, | ||
403 | __in BOOL fAdd | ||
404 | ) | ||
405 | { | ||
406 | HRESULT hr = S_OK; | ||
407 | NTSTATUS nt = 0; | ||
408 | |||
409 | LPWSTR pwzUser = NULL; | ||
410 | PSID psid = NULL; | ||
411 | LSA_HANDLE hPolicy = NULL; | ||
412 | LSA_OBJECT_ATTRIBUTES ObjectAttributes = { 0 }; | ||
413 | LSA_UNICODE_STRING lucPrivilege = { 0 }; | ||
414 | |||
415 | if (wzDomain && *wzDomain) | ||
416 | { | ||
417 | hr = StrAllocFormatted(&pwzUser, L"%s\\%s", wzDomain, wzName); | ||
418 | ExitOnFailure(hr, "Failed to allocate user with domain string"); | ||
419 | } | ||
420 | else | ||
421 | { | ||
422 | hr = StrAllocString(&pwzUser, wzName, 0); | ||
423 | ExitOnFailure(hr, "Failed to allocate string from user name."); | ||
424 | } | ||
425 | |||
426 | hr = AclGetAccountSid(NULL, pwzUser, &psid); | ||
427 | ExitOnFailure(hr, "Failed to get SID for user: %ls", pwzUser); | ||
428 | |||
429 | nt = ::LsaOpenPolicy(NULL, &ObjectAttributes, POLICY_ALL_ACCESS, &hPolicy); | ||
430 | hr = HRESULT_FROM_WIN32(::LsaNtStatusToWinError(nt)); | ||
431 | ExitOnFailure(hr, "Failed to open LSA policy store."); | ||
432 | |||
433 | lucPrivilege.Buffer = L"SeServiceLogonRight"; | ||
434 | lucPrivilege.Length = static_cast<USHORT>(lstrlenW(lucPrivilege.Buffer) * sizeof(WCHAR)); | ||
435 | lucPrivilege.MaximumLength = (lucPrivilege.Length + 1) * sizeof(WCHAR); | ||
436 | |||
437 | if (fAdd) | ||
438 | { | ||
439 | nt = ::LsaAddAccountRights(hPolicy, psid, &lucPrivilege, 1); | ||
440 | hr = HRESULT_FROM_WIN32(::LsaNtStatusToWinError(nt)); | ||
441 | ExitOnFailure(hr, "Failed to add 'logon as service' bit to user: %ls", pwzUser); | ||
442 | } | ||
443 | else | ||
444 | { | ||
445 | nt = ::LsaRemoveAccountRights(hPolicy, psid, FALSE, &lucPrivilege, 1); | ||
446 | hr = HRESULT_FROM_WIN32(::LsaNtStatusToWinError(nt)); | ||
447 | ExitOnFailure(hr, "Failed to remove 'logon as service' bit from user: %ls", pwzUser); | ||
448 | } | ||
449 | |||
450 | LExit: | ||
451 | if (hPolicy) | ||
452 | { | ||
453 | ::LsaClose(hPolicy); | ||
454 | } | ||
455 | |||
456 | ReleaseSid(psid); | ||
457 | ReleaseStr(pwzUser); | ||
458 | return hr; | ||
459 | } | ||
460 | |||
461 | |||
462 | static HRESULT ModifyUserLocalBatchRight( | ||
463 | __in_opt LPCWSTR wzDomain, | ||
464 | __in LPCWSTR wzName, | ||
465 | __in BOOL fAdd | ||
466 | ) | ||
467 | { | ||
468 | HRESULT hr = S_OK; | ||
469 | NTSTATUS nt = 0; | ||
470 | |||
471 | LPWSTR pwzUser = NULL; | ||
472 | PSID psid = NULL; | ||
473 | LSA_HANDLE hPolicy = NULL; | ||
474 | LSA_OBJECT_ATTRIBUTES ObjectAttributes = { 0 }; | ||
475 | LSA_UNICODE_STRING lucPrivilege = { 0 }; | ||
476 | |||
477 | if (wzDomain && *wzDomain) | ||
478 | { | ||
479 | hr = StrAllocFormatted(&pwzUser, L"%s\\%s", wzDomain, wzName); | ||
480 | ExitOnFailure(hr, "Failed to allocate user with domain string"); | ||
481 | } | ||
482 | else | ||
483 | { | ||
484 | hr = StrAllocString(&pwzUser, wzName, 0); | ||
485 | ExitOnFailure(hr, "Failed to allocate string from user name."); | ||
486 | } | ||
487 | |||
488 | hr = AclGetAccountSid(NULL, pwzUser, &psid); | ||
489 | ExitOnFailure(hr, "Failed to get SID for user: %ls", pwzUser); | ||
490 | |||
491 | nt = ::LsaOpenPolicy(NULL, &ObjectAttributes, POLICY_ALL_ACCESS, &hPolicy); | ||
492 | hr = HRESULT_FROM_WIN32(::LsaNtStatusToWinError(nt)); | ||
493 | ExitOnFailure(hr, "Failed to open LSA policy store."); | ||
494 | |||
495 | lucPrivilege.Buffer = L"SeBatchLogonRight"; | ||
496 | lucPrivilege.Length = static_cast<USHORT>(lstrlenW(lucPrivilege.Buffer) * sizeof(WCHAR)); | ||
497 | lucPrivilege.MaximumLength = (lucPrivilege.Length + 1) * sizeof(WCHAR); | ||
498 | |||
499 | if (fAdd) | ||
500 | { | ||
501 | nt = ::LsaAddAccountRights(hPolicy, psid, &lucPrivilege, 1); | ||
502 | hr = HRESULT_FROM_WIN32(::LsaNtStatusToWinError(nt)); | ||
503 | ExitOnFailure(hr, "Failed to add 'logon as batch job' bit to user: %ls", pwzUser); | ||
504 | } | ||
505 | else | ||
506 | { | ||
507 | nt = ::LsaRemoveAccountRights(hPolicy, psid, FALSE, &lucPrivilege, 1); | ||
508 | hr = HRESULT_FROM_WIN32(::LsaNtStatusToWinError(nt)); | ||
509 | ExitOnFailure(hr, "Failed to remove 'logon as batch job' bit from user: %ls", pwzUser); | ||
510 | } | ||
511 | |||
512 | LExit: | ||
513 | if (hPolicy) | ||
514 | { | ||
515 | ::LsaClose(hPolicy); | ||
516 | } | ||
517 | |||
518 | ReleaseSid(psid); | ||
519 | ReleaseStr(pwzUser); | ||
520 | return hr; | ||
521 | } | ||
522 | |||
523 | static void SetUserPasswordAndAttributes( | ||
524 | __in USER_INFO_1* puserInfo, | ||
525 | __in LPWSTR wzPassword, | ||
526 | __in int iAttributes | ||
527 | ) | ||
528 | { | ||
529 | Assert(puserInfo); | ||
530 | |||
531 | // Set the User's password | ||
532 | puserInfo->usri1_password = wzPassword; | ||
533 | |||
534 | // Apply the Attributes | ||
535 | if (SCAU_DONT_EXPIRE_PASSWRD & iAttributes) | ||
536 | { | ||
537 | puserInfo->usri1_flags |= UF_DONT_EXPIRE_PASSWD; | ||
538 | } | ||
539 | else | ||
540 | { | ||
541 | puserInfo->usri1_flags &= ~UF_DONT_EXPIRE_PASSWD; | ||
542 | } | ||
543 | |||
544 | if (SCAU_PASSWD_CANT_CHANGE & iAttributes) | ||
545 | { | ||
546 | puserInfo->usri1_flags |= UF_PASSWD_CANT_CHANGE; | ||
547 | } | ||
548 | else | ||
549 | { | ||
550 | puserInfo->usri1_flags &= ~UF_PASSWD_CANT_CHANGE; | ||
551 | } | ||
552 | |||
553 | if (SCAU_DISABLE_ACCOUNT & iAttributes) | ||
554 | { | ||
555 | puserInfo->usri1_flags |= UF_ACCOUNTDISABLE; | ||
556 | } | ||
557 | else | ||
558 | { | ||
559 | puserInfo->usri1_flags &= ~UF_ACCOUNTDISABLE; | ||
560 | } | ||
561 | |||
562 | if (SCAU_PASSWD_CHANGE_REQD_ON_LOGIN & iAttributes) // TODO: for some reason this doesn't work | ||
563 | { | ||
564 | puserInfo->usri1_flags |= UF_PASSWORD_EXPIRED; | ||
565 | } | ||
566 | else | ||
567 | { | ||
568 | puserInfo->usri1_flags &= ~UF_PASSWORD_EXPIRED; | ||
569 | } | ||
570 | } | ||
571 | |||
572 | |||
573 | static HRESULT RemoveUserInternal( | ||
574 | LPWSTR wzGroupCaData, | ||
575 | LPWSTR wzDomain, | ||
576 | LPWSTR wzName, | ||
577 | int iAttributes | ||
578 | ) | ||
579 | { | ||
580 | HRESULT hr = S_OK; | ||
581 | UINT er = ERROR_SUCCESS; | ||
582 | |||
583 | LPWSTR pwz = NULL; | ||
584 | LPWSTR pwzGroup = NULL; | ||
585 | LPWSTR pwzGroupDomain = NULL; | ||
586 | LPCWSTR wz = NULL; | ||
587 | PDOMAIN_CONTROLLER_INFOW pDomainControllerInfo = NULL; | ||
588 | |||
589 | // | ||
590 | // Remove the logon as service privilege. | ||
591 | // | ||
592 | if (SCAU_ALLOW_LOGON_AS_SERVICE & iAttributes) | ||
593 | { | ||
594 | hr = ModifyUserLocalServiceRight(wzDomain, wzName, FALSE); | ||
595 | if (FAILED(hr)) | ||
596 | { | ||
597 | WcaLogError(hr, "Failed to remove logon as service right from user, continuing..."); | ||
598 | hr = S_OK; | ||
599 | } | ||
600 | } | ||
601 | |||
602 | if (SCAU_ALLOW_LOGON_AS_BATCH & iAttributes) | ||
603 | { | ||
604 | hr = ModifyUserLocalBatchRight(wzDomain, wzName, FALSE); | ||
605 | if (FAILED(hr)) | ||
606 | { | ||
607 | WcaLogError(hr, "Failed to remove logon as batch job right from user, continuing..."); | ||
608 | hr = S_OK; | ||
609 | } | ||
610 | } | ||
611 | |||
612 | // | ||
613 | // Remove the User Account if the user was created by us. | ||
614 | // | ||
615 | if (!(SCAU_DONT_CREATE_USER & iAttributes)) | ||
616 | { | ||
617 | if (wzDomain && *wzDomain) | ||
618 | { | ||
619 | er = ::DsGetDcNameW(NULL, (LPCWSTR)wzDomain, NULL, NULL, NULL, &pDomainControllerInfo); | ||
620 | if (RPC_S_SERVER_UNAVAILABLE == er) | ||
621 | { | ||
622 | // MSDN says, if we get the above error code, try again with the "DS_FORCE_REDISCOVERY" flag | ||
623 | er = ::DsGetDcNameW(NULL, (LPCWSTR)wzDomain, NULL, NULL, DS_FORCE_REDISCOVERY, &pDomainControllerInfo); | ||
624 | } | ||
625 | if (ERROR_SUCCESS == er) | ||
626 | { | ||
627 | wz = pDomainControllerInfo->DomainControllerName + 2; //Add 2 so that we don't get the \\ prefix | ||
628 | } | ||
629 | else | ||
630 | { | ||
631 | wz = wzDomain; | ||
632 | } | ||
633 | } | ||
634 | |||
635 | er = ::NetUserDel(wz, wzName); | ||
636 | if (NERR_UserNotFound == er) | ||
637 | { | ||
638 | er = NERR_Success; | ||
639 | } | ||
640 | ExitOnFailure(hr = HRESULT_FROM_WIN32(er), "failed to delete user account: %ls", wzName); | ||
641 | } | ||
642 | else | ||
643 | { | ||
644 | // | ||
645 | // Remove the user from the groups | ||
646 | // | ||
647 | pwz = wzGroupCaData; | ||
648 | while (S_OK == (hr = WcaReadStringFromCaData(&pwz, &pwzGroup))) | ||
649 | { | ||
650 | hr = WcaReadStringFromCaData(&pwz, &pwzGroupDomain); | ||
651 | |||
652 | if (FAILED(hr)) | ||
653 | { | ||
654 | WcaLogError(hr, "failed to get domain for group: %ls, continuing anyway.", pwzGroup); | ||
655 | } | ||
656 | else | ||
657 | { | ||
658 | hr = RemoveUserFromGroup(wzName, wzDomain, pwzGroup, pwzGroupDomain); | ||
659 | if (FAILED(hr)) | ||
660 | { | ||
661 | WcaLogError(hr, "failed to remove user: %ls from group %ls, continuing anyway.", wzName, pwzGroup); | ||
662 | } | ||
663 | } | ||
664 | } | ||
665 | |||
666 | if (E_NOMOREITEMS == hr) // if there are no more items, all is well | ||
667 | { | ||
668 | hr = S_OK; | ||
669 | } | ||
670 | |||
671 | ExitOnFailure(hr, "failed to get next group from which to remove user:%ls", wzName); | ||
672 | } | ||
673 | |||
674 | LExit: | ||
675 | if (pDomainControllerInfo) | ||
676 | { | ||
677 | ::NetApiBufferFree(static_cast<LPVOID>(pDomainControllerInfo)); | ||
678 | } | ||
679 | |||
680 | return hr; | ||
681 | } | ||
682 | |||
683 | |||
684 | /******************************************************************** | ||
685 | CreateUser - CUSTOM ACTION ENTRY POINT for creating users | ||
686 | |||
687 | Input: deferred CustomActionData - UserName\tDomain\tPassword\tAttributes\tGroupName\tDomain\tGroupName\tDomain... | ||
688 | * *****************************************************************/ | ||
689 | extern "C" UINT __stdcall CreateUser( | ||
690 | __in MSIHANDLE hInstall | ||
691 | ) | ||
692 | { | ||
693 | //AssertSz(0, "Debug CreateUser"); | ||
694 | |||
695 | HRESULT hr = S_OK; | ||
696 | UINT er = ERROR_SUCCESS; | ||
697 | |||
698 | LPWSTR pwzData = NULL; | ||
699 | LPWSTR pwz = NULL; | ||
700 | LPWSTR pwzName = NULL; | ||
701 | LPWSTR pwzDomain = NULL; | ||
702 | LPWSTR pwzScriptKey = NULL; | ||
703 | LPWSTR pwzPassword = NULL; | ||
704 | LPWSTR pwzGroup = NULL; | ||
705 | LPWSTR pwzGroupDomain = NULL; | ||
706 | PDOMAIN_CONTROLLER_INFOW pDomainControllerInfo = NULL; | ||
707 | int iAttributes = 0; | ||
708 | BOOL fInitializedCom = FALSE; | ||
709 | |||
710 | WCA_CASCRIPT_HANDLE hRollbackScript = NULL; | ||
711 | int iOriginalAttributes = 0; | ||
712 | int iRollbackAttributes = 0; | ||
713 | |||
714 | USER_INFO_1 userInfo; | ||
715 | USER_INFO_1* puserInfo = NULL; | ||
716 | DWORD dw; | ||
717 | LPCWSTR wz = NULL; | ||
718 | |||
719 | hr = WcaInitialize(hInstall, "CreateUser"); | ||
720 | ExitOnFailure(hr, "failed to initialize"); | ||
721 | |||
722 | hr = ::CoInitialize(NULL); | ||
723 | ExitOnFailure(hr, "failed to initialize COM"); | ||
724 | fInitializedCom = TRUE; | ||
725 | |||
726 | hr = WcaGetProperty( L"CustomActionData", &pwzData); | ||
727 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
728 | |||
729 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzData); | ||
730 | |||
731 | // | ||
732 | // Read in the CustomActionData | ||
733 | // | ||
734 | pwz = pwzData; | ||
735 | hr = WcaReadStringFromCaData(&pwz, &pwzName); | ||
736 | ExitOnFailure(hr, "failed to read user name from custom action data"); | ||
737 | |||
738 | hr = WcaReadStringFromCaData(&pwz, &pwzDomain); | ||
739 | ExitOnFailure(hr, "failed to read domain from custom action data"); | ||
740 | |||
741 | hr = WcaReadIntegerFromCaData(&pwz, &iAttributes); | ||
742 | ExitOnFailure(hr, "failed to read attributes from custom action data"); | ||
743 | |||
744 | hr = WcaReadStringFromCaData(&pwz, &pwzScriptKey); | ||
745 | ExitOnFailure(hr, "failed to read encoding key from custom action data"); | ||
746 | |||
747 | hr = WcaReadStringFromCaData(&pwz, &pwzPassword); | ||
748 | ExitOnFailure(hr, "failed to read password from custom action data"); | ||
749 | |||
750 | // There is no rollback scheduled if the key is empty. | ||
751 | // Best effort to get original configuration and save it in the script so rollback can restore it. | ||
752 | if (*pwzScriptKey) | ||
753 | { | ||
754 | hr = WcaCaScriptCreate(WCA_ACTION_INSTALL, WCA_CASCRIPT_ROLLBACK, FALSE, pwzScriptKey, FALSE, &hRollbackScript); | ||
755 | ExitOnFailure(hr, "Failed to open rollback CustomAction script."); | ||
756 | |||
757 | iRollbackAttributes = 0; | ||
758 | hr = GetExistingUserRightsAssignments(pwzDomain, pwzName, &iOriginalAttributes); | ||
759 | if (FAILED(hr)) | ||
760 | { | ||
761 | WcaLogError(hr, "failed to get existing user rights: %ls, continuing anyway.", pwzName); | ||
762 | } | ||
763 | else | ||
764 | { | ||
765 | if (!(SCAU_ALLOW_LOGON_AS_SERVICE & iOriginalAttributes) && (SCAU_ALLOW_LOGON_AS_SERVICE & iAttributes)) | ||
766 | { | ||
767 | iRollbackAttributes |= SCAU_ALLOW_LOGON_AS_SERVICE; | ||
768 | } | ||
769 | if (!(SCAU_ALLOW_LOGON_AS_BATCH & iOriginalAttributes) && (SCAU_ALLOW_LOGON_AS_BATCH & iAttributes)) | ||
770 | { | ||
771 | iRollbackAttributes |= SCAU_ALLOW_LOGON_AS_BATCH; | ||
772 | } | ||
773 | } | ||
774 | |||
775 | hr = WcaCaScriptWriteNumber(hRollbackScript, iRollbackAttributes); | ||
776 | ExitOnFailure(hr, "Failed to add data to rollback script."); | ||
777 | |||
778 | // Nudge the system to get all our rollback data written to disk. | ||
779 | WcaCaScriptFlush(hRollbackScript); | ||
780 | } | ||
781 | |||
782 | if (!(SCAU_DONT_CREATE_USER & iAttributes)) | ||
783 | { | ||
784 | ::ZeroMemory(&userInfo, sizeof(USER_INFO_1)); | ||
785 | userInfo.usri1_name = pwzName; | ||
786 | userInfo.usri1_priv = USER_PRIV_USER; | ||
787 | userInfo.usri1_flags = UF_SCRIPT; | ||
788 | userInfo.usri1_home_dir = NULL; | ||
789 | userInfo.usri1_comment = NULL; | ||
790 | userInfo.usri1_script_path = NULL; | ||
791 | |||
792 | SetUserPasswordAndAttributes(&userInfo, pwzPassword, iAttributes); | ||
793 | |||
794 | // | ||
795 | // Create the User | ||
796 | // | ||
797 | if (pwzDomain && *pwzDomain) | ||
798 | { | ||
799 | er = ::DsGetDcNameW( NULL, (LPCWSTR)pwzDomain, NULL, NULL, NULL, &pDomainControllerInfo ); | ||
800 | if (RPC_S_SERVER_UNAVAILABLE == er) | ||
801 | { | ||
802 | // MSDN says, if we get the above error code, try again with the "DS_FORCE_REDISCOVERY" flag | ||
803 | er = ::DsGetDcNameW( NULL, (LPCWSTR)pwzDomain, NULL, NULL, DS_FORCE_REDISCOVERY, &pDomainControllerInfo ); | ||
804 | } | ||
805 | if (ERROR_SUCCESS == er) | ||
806 | { | ||
807 | wz = pDomainControllerInfo->DomainControllerName + 2; //Add 2 so that we don't get the \\ prefix | ||
808 | } | ||
809 | else | ||
810 | { | ||
811 | wz = pwzDomain; | ||
812 | } | ||
813 | } | ||
814 | |||
815 | er = ::NetUserAdd(wz, 1, reinterpret_cast<LPBYTE>(&userInfo), &dw); | ||
816 | if (NERR_UserExists == er) | ||
817 | { | ||
818 | if (SCAU_UPDATE_IF_EXISTS & iAttributes) | ||
819 | { | ||
820 | er = ::NetUserGetInfo(wz, pwzName, 1, reinterpret_cast<LPBYTE*>(&puserInfo)); | ||
821 | if (NERR_Success == er) | ||
822 | { | ||
823 | // Change the existing user's password and attributes again then try | ||
824 | // to update user with this new data | ||
825 | SetUserPasswordAndAttributes(puserInfo, pwzPassword, iAttributes); | ||
826 | |||
827 | er = ::NetUserSetInfo(wz, pwzName, 1, reinterpret_cast<LPBYTE>(puserInfo), &dw); | ||
828 | } | ||
829 | } | ||
830 | else if (!(SCAU_FAIL_IF_EXISTS & iAttributes)) | ||
831 | { | ||
832 | er = NERR_Success; | ||
833 | } | ||
834 | } | ||
835 | else if (NERR_PasswordTooShort == er || NERR_PasswordTooLong == er) | ||
836 | { | ||
837 | MessageExitOnFailure(hr = HRESULT_FROM_WIN32(er), msierrUSRFailedUserCreatePswd, "failed to create user: %ls due to invalid password.", pwzName); | ||
838 | } | ||
839 | MessageExitOnFailure(hr = HRESULT_FROM_WIN32(er), msierrUSRFailedUserCreate, "failed to create user: %ls", pwzName); | ||
840 | } | ||
841 | |||
842 | if (SCAU_ALLOW_LOGON_AS_SERVICE & iAttributes) | ||
843 | { | ||
844 | hr = ModifyUserLocalServiceRight(pwzDomain, pwzName, TRUE); | ||
845 | MessageExitOnFailure(hr, msierrUSRFailedGrantLogonAsService, "Failed to grant logon as service rights to user: %ls", pwzName); | ||
846 | } | ||
847 | |||
848 | if (SCAU_ALLOW_LOGON_AS_BATCH & iAttributes) | ||
849 | { | ||
850 | hr = ModifyUserLocalBatchRight(pwzDomain, pwzName, TRUE); | ||
851 | MessageExitOnFailure(hr, msierrUSRFailedGrantLogonAsService, "Failed to grant logon as batch job rights to user: %ls", pwzName); | ||
852 | } | ||
853 | |||
854 | // | ||
855 | // Add the users to groups | ||
856 | // | ||
857 | while (S_OK == (hr = WcaReadStringFromCaData(&pwz, &pwzGroup))) | ||
858 | { | ||
859 | hr = WcaReadStringFromCaData(&pwz, &pwzGroupDomain); | ||
860 | ExitOnFailure(hr, "failed to get domain for group: %ls", pwzGroup); | ||
861 | |||
862 | hr = AddUserToGroup(pwzName, pwzDomain, pwzGroup, pwzGroupDomain); | ||
863 | MessageExitOnFailure(hr, msierrUSRFailedUserGroupAdd, "failed to add user: %ls to group %ls", pwzName, pwzGroup); | ||
864 | } | ||
865 | if (E_NOMOREITEMS == hr) // if there are no more items, all is well | ||
866 | { | ||
867 | hr = S_OK; | ||
868 | } | ||
869 | ExitOnFailure(hr, "failed to get next group in which to include user:%ls", pwzName); | ||
870 | |||
871 | LExit: | ||
872 | WcaCaScriptClose(hRollbackScript, WCA_CASCRIPT_CLOSE_PRESERVE); | ||
873 | |||
874 | if (puserInfo) | ||
875 | { | ||
876 | ::NetApiBufferFree((LPVOID)puserInfo); | ||
877 | } | ||
878 | |||
879 | if (pDomainControllerInfo) | ||
880 | { | ||
881 | ::NetApiBufferFree((LPVOID)pDomainControllerInfo); | ||
882 | } | ||
883 | |||
884 | ReleaseStr(pwzData); | ||
885 | ReleaseStr(pwzName); | ||
886 | ReleaseStr(pwzDomain); | ||
887 | ReleaseStr(pwzScriptKey); | ||
888 | ReleaseStr(pwzPassword); | ||
889 | ReleaseStr(pwzGroup); | ||
890 | ReleaseStr(pwzGroupDomain); | ||
891 | |||
892 | if (fInitializedCom) | ||
893 | { | ||
894 | ::CoUninitialize(); | ||
895 | } | ||
896 | |||
897 | if (SCAU_NON_VITAL & iAttributes) | ||
898 | { | ||
899 | er = ERROR_SUCCESS; | ||
900 | } | ||
901 | else if (FAILED(hr)) | ||
902 | { | ||
903 | er = ERROR_INSTALL_FAILURE; | ||
904 | } | ||
905 | |||
906 | return WcaFinalize(er); | ||
907 | } | ||
908 | |||
909 | |||
910 | /******************************************************************** | ||
911 | CreateUserRollback - CUSTOM ACTION ENTRY POINT for CreateUser rollback | ||
912 | |||
913 | * *****************************************************************/ | ||
914 | extern "C" UINT __stdcall CreateUserRollback( | ||
915 | MSIHANDLE hInstall | ||
916 | ) | ||
917 | { | ||
918 | //AssertSz(0, "Debug CreateUserRollback"); | ||
919 | |||
920 | HRESULT hr = S_OK; | ||
921 | UINT er = ERROR_SUCCESS; | ||
922 | |||
923 | LPWSTR pwzData = NULL; | ||
924 | LPWSTR pwz = NULL; | ||
925 | LPWSTR pwzName = NULL; | ||
926 | LPWSTR pwzDomain = NULL; | ||
927 | LPWSTR pwzScriptKey = NULL; | ||
928 | int iAttributes = 0; | ||
929 | BOOL fInitializedCom = FALSE; | ||
930 | |||
931 | WCA_CASCRIPT_HANDLE hRollbackScript = NULL; | ||
932 | LPWSTR pwzRollbackData = NULL; | ||
933 | int iOriginalAttributes = 0; | ||
934 | |||
935 | hr = WcaInitialize(hInstall, "CreateUserRollback"); | ||
936 | ExitOnFailure(hr, "failed to initialize"); | ||
937 | |||
938 | hr = ::CoInitialize(NULL); | ||
939 | ExitOnFailure(hr, "failed to initialize COM"); | ||
940 | fInitializedCom = TRUE; | ||
941 | |||
942 | hr = WcaGetProperty(L"CustomActionData", &pwzData); | ||
943 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
944 | |||
945 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzData); | ||
946 | |||
947 | // | ||
948 | // Read in the CustomActionData | ||
949 | // | ||
950 | pwz = pwzData; | ||
951 | hr = WcaReadStringFromCaData(&pwz, &pwzScriptKey); | ||
952 | ExitOnFailure(hr, "failed to read encoding key from custom action data"); | ||
953 | |||
954 | hr = WcaReadStringFromCaData(&pwz, &pwzName); | ||
955 | ExitOnFailure(hr, "failed to read name from custom action data"); | ||
956 | |||
957 | hr = WcaReadStringFromCaData(&pwz, &pwzDomain); | ||
958 | ExitOnFailure(hr, "failed to read domain from custom action data"); | ||
959 | |||
960 | hr = WcaReadIntegerFromCaData(&pwz, &iAttributes); | ||
961 | ExitOnFailure(hr, "failed to read attributes from custom action data"); | ||
962 | |||
963 | // Best effort to read original configuration from CreateUser. | ||
964 | hr = WcaCaScriptOpen(WCA_ACTION_INSTALL, WCA_CASCRIPT_ROLLBACK, FALSE, pwzScriptKey, &hRollbackScript); | ||
965 | if (FAILED(hr)) | ||
966 | { | ||
967 | WcaLogError(hr, "Failed to open rollback CustomAction script, continuing anyway."); | ||
968 | } | ||
969 | else | ||
970 | { | ||
971 | hr = WcaCaScriptReadAsCustomActionData(hRollbackScript, &pwzRollbackData); | ||
972 | if (FAILED(hr)) | ||
973 | { | ||
974 | WcaLogError(hr, "Failed to read rollback script into CustomAction data, continuing anyway."); | ||
975 | } | ||
976 | else | ||
977 | { | ||
978 | WcaLog(LOGMSG_TRACEONLY, "Rollback Data: %ls", pwzRollbackData); | ||
979 | |||
980 | pwz = pwzRollbackData; | ||
981 | hr = WcaReadIntegerFromCaData(&pwz, &iOriginalAttributes); | ||
982 | if (FAILED(hr)) | ||
983 | { | ||
984 | WcaLogError(hr, "failed to read attributes from rollback data, continuing anyway"); | ||
985 | } | ||
986 | else | ||
987 | { | ||
988 | iAttributes |= iOriginalAttributes; | ||
989 | } | ||
990 | } | ||
991 | } | ||
992 | |||
993 | hr = RemoveUserInternal(pwz, pwzDomain, pwzName, iAttributes); | ||
994 | |||
995 | LExit: | ||
996 | WcaCaScriptClose(hRollbackScript, WCA_CASCRIPT_CLOSE_DELETE); | ||
997 | |||
998 | ReleaseStr(pwzData); | ||
999 | ReleaseStr(pwzName); | ||
1000 | ReleaseStr(pwzDomain); | ||
1001 | ReleaseStr(pwzScriptKey); | ||
1002 | ReleaseStr(pwzRollbackData); | ||
1003 | |||
1004 | if (fInitializedCom) | ||
1005 | { | ||
1006 | ::CoUninitialize(); | ||
1007 | } | ||
1008 | |||
1009 | if (FAILED(hr)) | ||
1010 | { | ||
1011 | er = ERROR_INSTALL_FAILURE; | ||
1012 | } | ||
1013 | |||
1014 | return WcaFinalize(er); | ||
1015 | } | ||
1016 | |||
1017 | |||
1018 | /******************************************************************** | ||
1019 | RemoveUser - CUSTOM ACTION ENTRY POINT for removing users | ||
1020 | |||
1021 | Input: deferred CustomActionData - Name\tDomain | ||
1022 | * *****************************************************************/ | ||
1023 | extern "C" UINT __stdcall RemoveUser( | ||
1024 | MSIHANDLE hInstall | ||
1025 | ) | ||
1026 | { | ||
1027 | //AssertSz(0, "Debug RemoveUser"); | ||
1028 | |||
1029 | HRESULT hr = S_OK; | ||
1030 | UINT er = ERROR_SUCCESS; | ||
1031 | |||
1032 | LPWSTR pwzData = NULL; | ||
1033 | LPWSTR pwz = NULL; | ||
1034 | LPWSTR pwzName = NULL; | ||
1035 | LPWSTR pwzDomain = NULL; | ||
1036 | int iAttributes = 0; | ||
1037 | BOOL fInitializedCom = FALSE; | ||
1038 | |||
1039 | hr = WcaInitialize(hInstall, "RemoveUser"); | ||
1040 | ExitOnFailure(hr, "failed to initialize"); | ||
1041 | |||
1042 | hr = ::CoInitialize(NULL); | ||
1043 | ExitOnFailure(hr, "failed to initialize COM"); | ||
1044 | fInitializedCom = TRUE; | ||
1045 | |||
1046 | hr = WcaGetProperty(L"CustomActionData", &pwzData); | ||
1047 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
1048 | |||
1049 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzData); | ||
1050 | |||
1051 | // | ||
1052 | // Read in the CustomActionData | ||
1053 | // | ||
1054 | pwz = pwzData; | ||
1055 | hr = WcaReadStringFromCaData(&pwz, &pwzName); | ||
1056 | ExitOnFailure(hr, "failed to read name from custom action data"); | ||
1057 | |||
1058 | hr = WcaReadStringFromCaData(&pwz, &pwzDomain); | ||
1059 | ExitOnFailure(hr, "failed to read domain from custom action data"); | ||
1060 | |||
1061 | hr = WcaReadIntegerFromCaData(&pwz, &iAttributes); | ||
1062 | ExitOnFailure(hr, "failed to read attributes from custom action data"); | ||
1063 | |||
1064 | hr = RemoveUserInternal(pwz, pwzDomain, pwzName, iAttributes); | ||
1065 | |||
1066 | LExit: | ||
1067 | ReleaseStr(pwzData); | ||
1068 | ReleaseStr(pwzName); | ||
1069 | ReleaseStr(pwzDomain); | ||
1070 | |||
1071 | if (fInitializedCom) | ||
1072 | { | ||
1073 | ::CoUninitialize(); | ||
1074 | } | ||
1075 | |||
1076 | if (FAILED(hr)) | ||
1077 | { | ||
1078 | er = ERROR_INSTALL_FAILURE; | ||
1079 | } | ||
1080 | |||
1081 | return WcaFinalize(er); | ||
1082 | } | ||
diff --git a/src/ext/Util/ca/scamanifest.cpp b/src/ext/Util/ca/scamanifest.cpp new file mode 100644 index 00000000..adb8d3d3 --- /dev/null +++ b/src/ext/Util/ca/scamanifest.cpp | |||
@@ -0,0 +1,377 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | LPCWSTR vcsPerfmonManifestQuery = L"SELECT `Component_`, `File`, `ResourceFileDirectory` FROM `Wix4PerfmonManifest`"; | ||
6 | LPCWSTR vcsEventManifestQuery = L"SELECT `Component_`, `File` FROM `Wix4EventManifest`"; | ||
7 | enum ePerfMonManifestQuery { pfmComponent = 1, pfmFile, pfmResourceFileDir }; | ||
8 | enum eEventManifestQuery { emComponent = 1, emFile}; | ||
9 | |||
10 | BOOL IsVistaOrAbove() | ||
11 | { | ||
12 | OSVERSIONINFO osvi; | ||
13 | ZeroMemory(&osvi, sizeof(OSVERSIONINFO)); | ||
14 | osvi.dwOSVersionInfoSize = sizeof(OSVERSIONINFO); | ||
15 | #pragma warning(suppress: 4996) //TODO: use non-deprecated function to check OS version | ||
16 | if (!::GetVersionEx(&osvi)) | ||
17 | { | ||
18 | return false; | ||
19 | } | ||
20 | return osvi.dwMajorVersion >= 6; | ||
21 | } | ||
22 | |||
23 | |||
24 | /******************************************************************** | ||
25 | ConfigurePerfmonManifestRegister - CUSTOM ACTION ENTRY POINT for scheduling | ||
26 | Perfmon counter manifest registering | ||
27 | |||
28 | ********************************************************************/ | ||
29 | extern "C" UINT __stdcall ConfigurePerfmonManifestRegister( | ||
30 | __in MSIHANDLE hInstall | ||
31 | ) | ||
32 | { | ||
33 | HRESULT hr; | ||
34 | UINT er = ERROR_SUCCESS; | ||
35 | |||
36 | PMSIHANDLE hView, hRec; | ||
37 | LPWSTR pwzData = NULL, pwzResourceFilePath = NULL, pwzFile = NULL, pwzCommand = NULL; | ||
38 | INSTALLSTATE isInstalled, isAction; | ||
39 | |||
40 | hr = WcaInitialize(hInstall, "ConfigurePerfmonManifestReg"); | ||
41 | ExitOnFailure(hr, "Failed to initialize"); | ||
42 | |||
43 | if (!IsVistaOrAbove()) | ||
44 | { | ||
45 | WcaLog(LOGMSG_VERBOSE, "Skipping ConfigurePerfmonManifestRegister() because the target system does not support perfmon manifest"); | ||
46 | ExitFunction1(hr = S_FALSE); | ||
47 | } | ||
48 | // check to see if necessary tables are specified | ||
49 | if (S_OK != WcaTableExists(L"Wix4PerfmonManifest")) | ||
50 | { | ||
51 | WcaLog(LOGMSG_VERBOSE, "Skipping ConfigurePerfmonManifestRegister() because Wix4PerfmonManifest table not present"); | ||
52 | ExitFunction1(hr = S_FALSE); | ||
53 | } | ||
54 | |||
55 | hr = WcaOpenExecuteView(vcsPerfmonManifestQuery, &hView); | ||
56 | ExitOnFailure(hr, "failed to open view on PerfMonManifest table"); | ||
57 | while ((hr = WcaFetchRecord(hView, &hRec)) == S_OK) | ||
58 | { | ||
59 | // get component install state | ||
60 | hr = WcaGetRecordString(hRec, pfmComponent, &pwzData); | ||
61 | ExitOnFailure(hr, "failed to get Component for PerfMonManifest"); | ||
62 | er = ::MsiGetComponentStateW(hInstall, pwzData, &isInstalled, &isAction); | ||
63 | hr = HRESULT_FROM_WIN32(er); | ||
64 | ExitOnFailure(hr, "failed to get Component state for PerfMonManifest"); | ||
65 | if (!WcaIsInstalling(isInstalled, isAction)) | ||
66 | { | ||
67 | continue; | ||
68 | } | ||
69 | |||
70 | hr = WcaGetRecordFormattedString(hRec, pfmFile, &pwzFile); | ||
71 | ExitOnFailure(hr, "failed to get File for PerfMonManifest"); | ||
72 | |||
73 | hr = WcaGetRecordFormattedString(hRec, pfmResourceFileDir, &pwzResourceFilePath); | ||
74 | ExitOnFailure(hr, "failed to get ApplicationIdentity for PerfMonManifest"); | ||
75 | size_t iResourcePath = lstrlenW(pwzResourceFilePath); | ||
76 | if ( iResourcePath > 0 && *(pwzResourceFilePath + iResourcePath -1) == L'\\') | ||
77 | *(pwzResourceFilePath + iResourcePath -1) = 0; //remove the trailing '\' | ||
78 | |||
79 | hr = StrAllocFormatted(&pwzCommand, L"\"unlodctr.exe\" /m:\"%s\"", pwzFile); | ||
80 | ExitOnFailure(hr, "failed to copy string in PerfMonManifest"); | ||
81 | |||
82 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RollbackRegisterPerfmonManifest"), pwzCommand, COST_PERFMONMANIFEST_UNREGISTER); | ||
83 | ExitOnFailure(hr, "failed to schedule RollbackRegisterPerfmonManifest action"); | ||
84 | |||
85 | if ( *pwzResourceFilePath ) | ||
86 | { | ||
87 | hr = StrAllocFormatted(&pwzCommand, L"\"lodctr.exe\" /m:\"%s\" \"%s\"", pwzFile, pwzResourceFilePath); | ||
88 | ExitOnFailure(hr, "failed to copy string in PerfMonManifest"); | ||
89 | } | ||
90 | else | ||
91 | { | ||
92 | hr = StrAllocFormatted(&pwzCommand, L"\"lodctr.exe\" /m:\"%s\"", pwzFile); | ||
93 | ExitOnFailure(hr, "failed to copy string in PerfMonManifest"); | ||
94 | } | ||
95 | |||
96 | WcaLog(LOGMSG_VERBOSE, "RegisterPerfmonManifest's CustomActionData: '%ls'", pwzCommand); | ||
97 | |||
98 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RegisterPerfmonManifest"), pwzCommand, COST_PERFMONMANIFEST_REGISTER); | ||
99 | ExitOnFailure(hr, "failed to schedule RegisterPerfmonManifest action"); | ||
100 | } | ||
101 | |||
102 | if (hr == E_NOMOREITEMS) | ||
103 | { | ||
104 | hr = S_OK; | ||
105 | } | ||
106 | ExitOnFailure(hr, "Failure while processing PerfMonManifest"); | ||
107 | |||
108 | hr = S_OK; | ||
109 | |||
110 | LExit: | ||
111 | ReleaseStr(pwzData); | ||
112 | ReleaseStr(pwzResourceFilePath); | ||
113 | ReleaseStr(pwzFile); | ||
114 | ReleaseStr(pwzCommand); | ||
115 | |||
116 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
117 | return WcaFinalize(er); | ||
118 | } | ||
119 | |||
120 | |||
121 | /******************************************************************** | ||
122 | ConfigurePerfmonUninstall - CUSTOM ACTION ENTRY POINT for uninstalling | ||
123 | Perfmon counters | ||
124 | |||
125 | ********************************************************************/ | ||
126 | extern "C" UINT __stdcall ConfigurePerfmonManifestUnregister( | ||
127 | __in MSIHANDLE hInstall | ||
128 | ) | ||
129 | { | ||
130 | HRESULT hr; | ||
131 | UINT er = ERROR_SUCCESS; | ||
132 | |||
133 | PMSIHANDLE hView, hRec; | ||
134 | LPWSTR pwzData = NULL, pwzResourceFilePath = NULL, pwzFile = NULL, pwzCommand = NULL; | ||
135 | INSTALLSTATE isInstalled, isAction; | ||
136 | |||
137 | hr = WcaInitialize(hInstall, "ConfigurePerfmonManifestUnreg"); | ||
138 | ExitOnFailure(hr, "Failed to initialize"); | ||
139 | |||
140 | if (!IsVistaOrAbove()) | ||
141 | { | ||
142 | WcaLog(LOGMSG_VERBOSE, "Skipping ConfigurePerfmonManifestUnregister() because the target system does not support perfmon manifest"); | ||
143 | ExitFunction1(hr = S_FALSE); | ||
144 | } | ||
145 | // check to see if necessary tables are specified | ||
146 | if (WcaTableExists(L"Wix4PerfmonManifest") != S_OK) | ||
147 | { | ||
148 | WcaLog(LOGMSG_VERBOSE, "Skipping ConfigurePerfmonManifestUnregister() because Wix4PerfmonManifest table not present"); | ||
149 | ExitFunction1(hr = S_FALSE); | ||
150 | } | ||
151 | |||
152 | hr = WcaOpenExecuteView(vcsPerfmonManifestQuery, &hView); | ||
153 | ExitOnFailure(hr, "failed to open view on Wix4PerfmonManifest table"); | ||
154 | while ((hr = WcaFetchRecord(hView, &hRec)) == S_OK) | ||
155 | { | ||
156 | // get component install state | ||
157 | hr = WcaGetRecordString(hRec, pfmComponent, &pwzData); | ||
158 | ExitOnFailure(hr, "failed to get Component for Wix4PerfmonManifest"); | ||
159 | er = ::MsiGetComponentStateW(hInstall, pwzData, &isInstalled, &isAction); | ||
160 | hr = HRESULT_FROM_WIN32(er); | ||
161 | ExitOnFailure(hr, "failed to get Component state for Wix4PerfmonManifest"); | ||
162 | if (!WcaIsUninstalling(isInstalled, isAction)) | ||
163 | { | ||
164 | continue; | ||
165 | } | ||
166 | |||
167 | hr = WcaGetRecordFormattedString(hRec, pfmFile, &pwzFile); | ||
168 | ExitOnFailure(hr, "failed to get File for Wix4PerfmonManifest"); | ||
169 | |||
170 | hr = WcaGetRecordFormattedString(hRec, pfmResourceFileDir, &pwzResourceFilePath); | ||
171 | ExitOnFailure(hr, "failed to get ApplicationIdentity for Wix4PerfmonManifest"); | ||
172 | size_t iResourcePath = lstrlenW(pwzResourceFilePath); | ||
173 | if ( iResourcePath > 0 && *(pwzResourceFilePath + iResourcePath -1) == L'\\') | ||
174 | *(pwzResourceFilePath + iResourcePath -1) = 0; //remove the trailing '\' | ||
175 | |||
176 | hr = StrAllocFormatted(&pwzCommand, L"\"lodctr.exe\" /m:\"%s\" \"%s\"", pwzFile, pwzResourceFilePath); | ||
177 | ExitOnFailure(hr, "failed to copy string in Wix4PerfmonManifest"); | ||
178 | |||
179 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RollbackUnregisterPerfmonManifest"), pwzCommand, COST_PERFMONMANIFEST_REGISTER); | ||
180 | ExitOnFailure(hr, "failed to schedule RollbackUnregisterPerfmonManifest action"); | ||
181 | |||
182 | hr = StrAllocFormatted(&pwzCommand, L"\"unlodctr.exe\" /m:\"%s\"", pwzFile); | ||
183 | ExitOnFailure(hr, "failed to copy string in PerfMonManifest"); | ||
184 | |||
185 | WcaLog(LOGMSG_VERBOSE, "UnRegisterPerfmonManifest's CustomActionData: '%ls'", pwzCommand); | ||
186 | |||
187 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"UnregisterPerfmonManifest"), pwzCommand, COST_PERFMONMANIFEST_UNREGISTER); | ||
188 | ExitOnFailure(hr, "failed to schedule UnregisterPerfmonManifest action"); | ||
189 | } | ||
190 | |||
191 | if (hr == E_NOMOREITEMS) | ||
192 | { | ||
193 | hr = S_OK; | ||
194 | } | ||
195 | ExitOnFailure(hr, "Failure while processing PerfMonManifest"); | ||
196 | |||
197 | hr = S_OK; | ||
198 | |||
199 | LExit: | ||
200 | ReleaseStr(pwzData); | ||
201 | ReleaseStr(pwzResourceFilePath); | ||
202 | ReleaseStr(pwzFile); | ||
203 | ReleaseStr(pwzCommand); | ||
204 | |||
205 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
206 | return WcaFinalize(er); | ||
207 | } | ||
208 | |||
209 | /******************************************************************** | ||
210 | ConfigureEventManifestRegister - CUSTOM ACTION ENTRY POINT for scheduling | ||
211 | Event manifest registering | ||
212 | |||
213 | ********************************************************************/ | ||
214 | extern "C" UINT __stdcall ConfigureEventManifestRegister( | ||
215 | __in MSIHANDLE hInstall | ||
216 | ) | ||
217 | { | ||
218 | HRESULT hr; | ||
219 | UINT er = ERROR_SUCCESS; | ||
220 | |||
221 | PMSIHANDLE hView, hRec; | ||
222 | LPWSTR pwzData = NULL, pwzFile = NULL, pwzCommand = NULL; | ||
223 | INSTALLSTATE isInstalled, isAction; | ||
224 | |||
225 | hr = WcaInitialize(hInstall, "ConfigureEventManifestReg"); | ||
226 | ExitOnFailure(hr, "Failed to initialize"); | ||
227 | |||
228 | if (!IsVistaOrAbove()) | ||
229 | { | ||
230 | WcaLog(LOGMSG_VERBOSE, "Skipping ConfigureEventManifestRegister() because the target system does not support event manifest"); | ||
231 | ExitFunction1(hr = S_FALSE); | ||
232 | } | ||
233 | // check to see if necessary tables are specified | ||
234 | if (S_OK != WcaTableExists(L"Wix4EventManifest")) | ||
235 | { | ||
236 | WcaLog(LOGMSG_VERBOSE, "Skipping ConfigureEventManifestRegister() because Wix4EventManifest table not present"); | ||
237 | ExitFunction1(hr = S_FALSE); | ||
238 | } | ||
239 | |||
240 | hr = WcaOpenExecuteView(vcsEventManifestQuery, &hView); | ||
241 | ExitOnFailure(hr, "failed to open view on Wix4EventManifest table"); | ||
242 | while ((hr = WcaFetchRecord(hView, &hRec)) == S_OK) | ||
243 | { | ||
244 | // get component install state | ||
245 | hr = WcaGetRecordString(hRec, emComponent, &pwzData); | ||
246 | ExitOnFailure(hr, "failed to get Component for Wix4EventManifest"); | ||
247 | er = ::MsiGetComponentStateW(hInstall, pwzData, &isInstalled, &isAction); | ||
248 | hr = HRESULT_FROM_WIN32(er); | ||
249 | ExitOnFailure(hr, "failed to get Component state for Wix4EventManifest"); | ||
250 | if (!WcaIsInstalling(isInstalled, isAction)) | ||
251 | { | ||
252 | continue; | ||
253 | } | ||
254 | |||
255 | hr = WcaGetRecordFormattedString(hRec, emFile, &pwzFile); | ||
256 | ExitOnFailure(hr, "failed to get File for Wix4EventManifest"); | ||
257 | |||
258 | hr = StrAllocFormatted(&pwzCommand, L"\"wevtutil.exe\" um \"%s\"", pwzFile); | ||
259 | ExitOnFailure(hr, "failed to copy string in Wix4EventManifest"); | ||
260 | |||
261 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RollbackRegisterEventManifest"), pwzCommand, COST_PERFMONMANIFEST_UNREGISTER); | ||
262 | ExitOnFailure(hr, "failed to schedule RollbackRegisterEventManifest action"); | ||
263 | |||
264 | hr = StrAllocFormatted(&pwzCommand, L"\"wevtutil.exe\" im \"%s\"", pwzFile); | ||
265 | ExitOnFailure(hr, "failed to copy string in Wix4EventManifest"); | ||
266 | WcaLog(LOGMSG_VERBOSE, "RegisterEventManifest's CustomActionData: '%ls'", pwzCommand); | ||
267 | |||
268 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RegisterEventManifest"), pwzCommand, COST_EVENTMANIFEST_REGISTER); | ||
269 | ExitOnFailure(hr, "failed to schedule RegisterEventManifest action"); | ||
270 | } | ||
271 | |||
272 | if (hr == E_NOMOREITEMS) | ||
273 | { | ||
274 | hr = S_OK; | ||
275 | } | ||
276 | ExitOnFailure(hr, "Failure while processing Wix4EventManifest"); | ||
277 | |||
278 | hr = S_OK; | ||
279 | |||
280 | LExit: | ||
281 | ReleaseStr(pwzData); | ||
282 | ReleaseStr(pwzFile); | ||
283 | ReleaseStr(pwzCommand); | ||
284 | |||
285 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
286 | return WcaFinalize(er); | ||
287 | } | ||
288 | |||
289 | |||
290 | |||
291 | /******************************************************************** | ||
292 | ConfigureEventManifestRegister - CUSTOM ACTION ENTRY POINT for scheduling | ||
293 | Event manifest registering | ||
294 | |||
295 | ********************************************************************/ | ||
296 | extern "C" UINT __stdcall ConfigureEventManifestUnregister( | ||
297 | __in MSIHANDLE hInstall | ||
298 | ) | ||
299 | { | ||
300 | HRESULT hr; | ||
301 | UINT er = ERROR_SUCCESS; | ||
302 | |||
303 | PMSIHANDLE hView, hRec; | ||
304 | LPWSTR pwzData = NULL, pwzFile = NULL, pwzCommand = NULL; | ||
305 | INSTALLSTATE isInstalled, isAction; | ||
306 | |||
307 | hr = WcaInitialize(hInstall, "ConfigureEventManifestUnreg"); | ||
308 | ExitOnFailure(hr, "Failed to initialize"); | ||
309 | |||
310 | if (!IsVistaOrAbove()) | ||
311 | { | ||
312 | WcaLog(LOGMSG_VERBOSE, "Skipping ConfigureEventManifestUnregister() because the target system does not support event manifest"); | ||
313 | ExitFunction1(hr = S_FALSE); | ||
314 | } | ||
315 | // check to see if necessary tables are specified | ||
316 | if (S_OK != WcaTableExists(L"Wix4EventManifest")) | ||
317 | { | ||
318 | WcaLog(LOGMSG_VERBOSE, "Skipping ConfigureEventManifestUnregister() because Wix4EventManifest table not present"); | ||
319 | ExitFunction1(hr = S_FALSE); | ||
320 | } | ||
321 | |||
322 | hr = WcaOpenExecuteView(vcsEventManifestQuery, &hView); | ||
323 | ExitOnFailure(hr, "failed to open view on Wix4EventManifest table"); | ||
324 | while ((hr = WcaFetchRecord(hView, &hRec)) == S_OK) | ||
325 | { | ||
326 | // get component install state | ||
327 | hr = WcaGetRecordString(hRec, emComponent, &pwzData); | ||
328 | ExitOnFailure(hr, "failed to get Component for Wix4EventManifest"); | ||
329 | er = ::MsiGetComponentStateW(hInstall, pwzData, &isInstalled, &isAction); | ||
330 | hr = HRESULT_FROM_WIN32(er); | ||
331 | ExitOnFailure(hr, "failed to get Component state for Wix4EventManifest"); | ||
332 | |||
333 | // nothing to do on an install | ||
334 | // schedule the rollback action when reinstalling to re-register pre-patch manifest | ||
335 | if (!WcaIsUninstalling(isInstalled, isAction) && !WcaIsReInstalling(isInstalled, isAction)) | ||
336 | { | ||
337 | continue; | ||
338 | } | ||
339 | |||
340 | hr = WcaGetRecordFormattedString(hRec, emFile, &pwzFile); | ||
341 | ExitOnFailure(hr, "failed to get File for Wix4EventManifest"); | ||
342 | |||
343 | hr = StrAllocFormatted(&pwzCommand, L"\"wevtutil.exe\" im \"%s\"", pwzFile); | ||
344 | ExitOnFailure(hr, "failed to copy string in Wix4EventManifest"); | ||
345 | |||
346 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RollbackUnregisterEventManifest"), pwzCommand, COST_PERFMONMANIFEST_REGISTER); | ||
347 | ExitOnFailure(hr, "failed to schedule RollbackUnregisterEventManifest action"); | ||
348 | |||
349 | // no need to uninstall on a repair/patch. Register action will re-register and update the manifest. | ||
350 | if (!WcaIsReInstalling(isInstalled, isAction)) | ||
351 | { | ||
352 | hr = StrAllocFormatted(&pwzCommand, L"\"wevtutil.exe\" um \"%s\"", pwzFile); | ||
353 | ExitOnFailure(hr, "failed to copy string in Wix4EventManifest"); | ||
354 | WcaLog(LOGMSG_VERBOSE, "UnregisterEventManifest's CustomActionData: '%ls'", pwzCommand); | ||
355 | |||
356 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"UnregisterEventManifest"), pwzCommand, COST_PERFMONMANIFEST_UNREGISTER); | ||
357 | ExitOnFailure(hr, "failed to schedule UnregisterEventManifest action"); | ||
358 | } | ||
359 | } | ||
360 | |||
361 | if (hr == E_NOMOREITEMS) | ||
362 | { | ||
363 | hr = S_OK; | ||
364 | } | ||
365 | ExitOnFailure(hr, "Failure while processing Wix4EventManifest"); | ||
366 | |||
367 | hr = S_OK; | ||
368 | |||
369 | LExit: | ||
370 | ReleaseStr(pwzData); | ||
371 | ReleaseStr(pwzFile); | ||
372 | ReleaseStr(pwzCommand); | ||
373 | |||
374 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
375 | return WcaFinalize(er); | ||
376 | } | ||
377 | |||
diff --git a/src/ext/Util/ca/scaperf.cpp b/src/ext/Util/ca/scaperf.cpp new file mode 100644 index 00000000..fd301278 --- /dev/null +++ b/src/ext/Util/ca/scaperf.cpp | |||
@@ -0,0 +1,310 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | LPCWSTR vcsPerfCounterDataQuery = L"SELECT `Wix4PerformanceCategory`, `Component_`, `Name`, `IniData`, `ConstantData` FROM `Wix4PerformanceCategory`"; | ||
6 | enum ePerfCounterDataQuery { pcdqId = 1, pcdqComponent, pcdqName, pcdqIniData, pcdqConstantData }; | ||
7 | |||
8 | LPCWSTR vcsPerfMonQuery = L"SELECT `Component_`, `File`, `Name` FROM `Wix4Perfmon`"; | ||
9 | enum ePerfMonQuery { pmqComponent = 1, pmqFile, pmqName }; | ||
10 | |||
11 | |||
12 | static HRESULT ProcessPerformanceCategory( | ||
13 | __in MSIHANDLE hInstall, | ||
14 | __in BOOL fInstall | ||
15 | ); | ||
16 | |||
17 | |||
18 | /******************************************************************** | ||
19 | InstallPerfCounterData - CUSTOM ACTION ENTRY POINT for installing | ||
20 | Performance Counters. | ||
21 | |||
22 | ********************************************************************/ | ||
23 | extern "C" UINT __stdcall InstallPerfCounterData( | ||
24 | __in MSIHANDLE hInstall | ||
25 | ) | ||
26 | { | ||
27 | // AssertSz(FALSE, "debug InstallPerfCounterData{}"); | ||
28 | HRESULT hr; | ||
29 | UINT er = ERROR_SUCCESS; | ||
30 | |||
31 | hr = WcaInitialize(hInstall, "InstallPerfCounterData"); | ||
32 | ExitOnFailure(hr, "Failed to initialize InstallPerfCounterData."); | ||
33 | |||
34 | hr = ProcessPerformanceCategory(hInstall, TRUE); | ||
35 | MessageExitOnFailure(hr, msierrInstallPerfCounterData, "Failed to process Wix4PerformanceCategory table."); | ||
36 | |||
37 | LExit: | ||
38 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
39 | return WcaFinalize(er); | ||
40 | } | ||
41 | |||
42 | |||
43 | /******************************************************************** | ||
44 | UninstallPerfCounterData - CUSTOM ACTION ENTRY POINT for installing | ||
45 | Performance Counters. | ||
46 | |||
47 | ********************************************************************/ | ||
48 | extern "C" UINT __stdcall UninstallPerfCounterData( | ||
49 | __in MSIHANDLE hInstall | ||
50 | ) | ||
51 | { | ||
52 | // AssertSz(FALSE, "debug UninstallPerfCounterData{}"); | ||
53 | HRESULT hr; | ||
54 | UINT er = ERROR_SUCCESS; | ||
55 | |||
56 | hr = WcaInitialize(hInstall, "UninstallPerfCounterData"); | ||
57 | ExitOnFailure(hr, "Failed to initialize UninstallPerfCounterData."); | ||
58 | |||
59 | hr = ProcessPerformanceCategory(hInstall, FALSE); | ||
60 | MessageExitOnFailure(hr, msierrUninstallPerfCounterData, "Failed to process Wix4PerformanceCategory table."); | ||
61 | |||
62 | LExit: | ||
63 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
64 | return WcaFinalize(er); | ||
65 | } | ||
66 | |||
67 | |||
68 | /******************************************************************** | ||
69 | RegisterPerfmon - CUSTOM ACTION ENTRY POINT for installing Perfmon counters | ||
70 | |||
71 | ********************************************************************/ | ||
72 | extern "C" UINT __stdcall ConfigurePerfmonInstall( | ||
73 | __in MSIHANDLE hInstall | ||
74 | ) | ||
75 | { | ||
76 | // Assert(FALSE); | ||
77 | HRESULT hr; | ||
78 | UINT er = ERROR_SUCCESS; | ||
79 | |||
80 | PMSIHANDLE hView, hRec; | ||
81 | LPWSTR pwzData = NULL, pwzName = NULL, pwzFile = NULL; | ||
82 | INSTALLSTATE isInstalled, isAction; | ||
83 | |||
84 | hr = WcaInitialize(hInstall, "ConfigurePerfmonInstall"); | ||
85 | ExitOnFailure(hr, "Failed to initialize"); | ||
86 | |||
87 | // check to see if necessary tables are specified | ||
88 | if (S_OK != WcaTableExists(L"Wix4Perfmon")) | ||
89 | { | ||
90 | WcaLog(LOGMSG_VERBOSE, "Skipping RegisterPerfmon() because Wix4Perfmon table not present"); | ||
91 | ExitFunction1(hr = S_FALSE); | ||
92 | } | ||
93 | |||
94 | hr = WcaOpenExecuteView(vcsPerfMonQuery, &hView); | ||
95 | ExitOnFailure(hr, "failed to open view on PerfMon table"); | ||
96 | while ((hr = WcaFetchRecord(hView, &hRec)) == S_OK) | ||
97 | { | ||
98 | // get component install state | ||
99 | hr = WcaGetRecordString(hRec, pmqComponent, &pwzData); | ||
100 | ExitOnFailure(hr, "failed to get Component for PerfMon"); | ||
101 | er = ::MsiGetComponentStateW(hInstall, pwzData, &isInstalled, &isAction); | ||
102 | hr = HRESULT_FROM_WIN32(er); | ||
103 | ExitOnFailure(hr, "failed to get Component state for PerfMon"); | ||
104 | if (!WcaIsInstalling(isInstalled, isAction)) | ||
105 | { | ||
106 | continue; | ||
107 | } | ||
108 | |||
109 | hr = WcaGetRecordString(hRec, pmqName, &pwzName); | ||
110 | ExitOnFailure(hr, "failed to get Name for PerfMon"); | ||
111 | |||
112 | hr = WcaGetRecordFormattedString(hRec, pmqFile, &pwzFile); | ||
113 | ExitOnFailure(hr, "failed to get File for PerfMon"); | ||
114 | |||
115 | WcaLog(LOGMSG_VERBOSE, "ConfigurePerfmonInstall's CustomActionData: '%ls', '%ls'", pwzName, pwzFile); | ||
116 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RegisterPerfmon"), pwzFile, COST_PERFMON_REGISTER); | ||
117 | ExitOnFailure(hr, "failed to schedule RegisterPerfmon action"); | ||
118 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RollbackRegisterPerfmon"), pwzName, COST_PERFMON_UNREGISTER); | ||
119 | ExitOnFailure(hr, "failed to schedule RollbackRegisterPerfmon action"); | ||
120 | } | ||
121 | |||
122 | if (hr == E_NOMOREITEMS) | ||
123 | { | ||
124 | hr = S_OK; | ||
125 | } | ||
126 | ExitOnFailure(hr, "Failure while processing PerfMon"); | ||
127 | |||
128 | hr = S_OK; | ||
129 | |||
130 | LExit: | ||
131 | ReleaseStr(pwzData); | ||
132 | ReleaseStr(pwzName); | ||
133 | ReleaseStr(pwzFile); | ||
134 | |||
135 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
136 | return WcaFinalize(er); | ||
137 | } | ||
138 | |||
139 | |||
140 | /******************************************************************** | ||
141 | ConfigurePerfmonUninstall - CUSTOM ACTION ENTRY POINT for uninstalling | ||
142 | Perfmon counters | ||
143 | |||
144 | ********************************************************************/ | ||
145 | extern "C" UINT __stdcall ConfigurePerfmonUninstall( | ||
146 | __in MSIHANDLE hInstall | ||
147 | ) | ||
148 | { | ||
149 | // Assert(FALSE); | ||
150 | HRESULT hr; | ||
151 | UINT er = ERROR_SUCCESS; | ||
152 | |||
153 | PMSIHANDLE hView, hRec; | ||
154 | LPWSTR pwzData = NULL, pwzName = NULL, pwzFile = NULL; | ||
155 | INSTALLSTATE isInstalled, isAction; | ||
156 | |||
157 | hr = WcaInitialize(hInstall, "ConfigurePerfmonUninstall"); | ||
158 | ExitOnFailure(hr, "Failed to initialize"); | ||
159 | |||
160 | // check to see if necessary tables are specified | ||
161 | if (WcaTableExists(L"Wix4Perfmon") != S_OK) | ||
162 | { | ||
163 | WcaLog(LOGMSG_VERBOSE, "Skipping UnregisterPerfmon() because Wix4Perfmon table not present"); | ||
164 | ExitFunction1(hr = S_FALSE); | ||
165 | } | ||
166 | |||
167 | hr = WcaOpenExecuteView(vcsPerfMonQuery, &hView); | ||
168 | ExitOnFailure(hr, "failed to open view on PerfMon table"); | ||
169 | while ((hr = WcaFetchRecord(hView, &hRec)) == S_OK) | ||
170 | { | ||
171 | // get component install state | ||
172 | hr = WcaGetRecordString(hRec, pmqComponent, &pwzData); | ||
173 | ExitOnFailure(hr, "failed to get Component for PerfMon"); | ||
174 | er = ::MsiGetComponentStateW(hInstall, pwzData, &isInstalled, &isAction); | ||
175 | hr = HRESULT_FROM_WIN32(er); | ||
176 | ExitOnFailure(hr, "failed to get Component state for PerfMon"); | ||
177 | if (!WcaIsUninstalling(isInstalled, isAction)) | ||
178 | { | ||
179 | continue; | ||
180 | } | ||
181 | |||
182 | hr = WcaGetRecordString(hRec, pmqName, &pwzName); | ||
183 | ExitOnFailure(hr, "failed to get Name for PerfMon"); | ||
184 | |||
185 | hr = WcaGetRecordFormattedString(hRec, pmqFile, &pwzFile); | ||
186 | ExitOnFailure(hr, "failed to get File for PerfMon"); | ||
187 | |||
188 | WcaLog(LOGMSG_VERBOSE, "ConfigurePerfmonUninstall's CustomActionData: '%ls', '%ls'", pwzName, pwzFile); | ||
189 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"UnregisterPerfmon"), pwzName, COST_PERFMON_UNREGISTER); | ||
190 | ExitOnFailure(hr, "failed to schedule UnregisterPerfmon action"); | ||
191 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RollbackUnregisterPerfmon"), pwzFile, COST_PERFMON_REGISTER); | ||
192 | ExitOnFailure(hr, "failed to schedule RollbackUnregisterPerfmon action"); | ||
193 | } | ||
194 | |||
195 | if (hr == E_NOMOREITEMS) | ||
196 | { | ||
197 | hr = S_OK; | ||
198 | } | ||
199 | ExitOnFailure(hr, "Failure while processing PerfMon"); | ||
200 | |||
201 | hr = S_OK; | ||
202 | |||
203 | LExit: | ||
204 | ReleaseStr(pwzData); | ||
205 | ReleaseStr(pwzName); | ||
206 | ReleaseStr(pwzFile); | ||
207 | |||
208 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
209 | return WcaFinalize(er); | ||
210 | } | ||
211 | |||
212 | |||
213 | |||
214 | static HRESULT ProcessPerformanceCategory( | ||
215 | __in MSIHANDLE hInstall, | ||
216 | __in BOOL fInstall | ||
217 | ) | ||
218 | { | ||
219 | HRESULT hr = S_OK; | ||
220 | DWORD er = ERROR_SUCCESS; | ||
221 | |||
222 | PMSIHANDLE hView, hRec; | ||
223 | LPWSTR pwzId = NULL; | ||
224 | LPWSTR pwzComponent = NULL; | ||
225 | LPWSTR pwzName = NULL; | ||
226 | LPWSTR pwzData = NULL; | ||
227 | INSTALLSTATE isInstalled, isAction; | ||
228 | |||
229 | LPWSTR pwzCustomActionData = NULL; | ||
230 | |||
231 | // check to see if necessary tables are specified | ||
232 | if (S_OK != WcaTableExists(L"Wix4PerformanceCategory")) | ||
233 | { | ||
234 | ExitFunction1(hr = S_FALSE); | ||
235 | } | ||
236 | |||
237 | hr = WcaOpenExecuteView(vcsPerfCounterDataQuery, &hView); | ||
238 | ExitOnFailure(hr, "failed to open view on Wix4PerformanceCategory table"); | ||
239 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
240 | { | ||
241 | hr = WcaGetRecordString(hRec, pcdqId, &pwzId); | ||
242 | ExitOnFailure(hr, "Failed to get id for Wix4PerformanceCategory."); | ||
243 | |||
244 | // Check to see if the Component is being installed or uninstalled | ||
245 | // when we are processing the same. | ||
246 | hr = WcaGetRecordString(hRec, pcdqComponent, &pwzComponent); | ||
247 | ExitOnFailure(hr, "Failed to get Component for Wix4PerformanceCategory: %ls", pwzId); | ||
248 | |||
249 | er = ::MsiGetComponentStateW(hInstall, pwzComponent, &isInstalled, &isAction); | ||
250 | hr = HRESULT_FROM_WIN32(er); | ||
251 | ExitOnFailure(hr, "Failed to get Component state for Wix4PerformanceCategory: %ls", pwzId); | ||
252 | |||
253 | if ((fInstall && !WcaIsInstalling(isInstalled, isAction)) || | ||
254 | (!fInstall && !WcaIsUninstalling(isInstalled, isAction))) | ||
255 | { | ||
256 | continue; | ||
257 | } | ||
258 | |||
259 | hr = WcaGetRecordString(hRec, pcdqName, &pwzName); | ||
260 | ExitOnFailure(hr, "Failed to get Name for Wix4PerformanceCategory: %ls", pwzId); | ||
261 | hr = WcaWriteStringToCaData(pwzName, &pwzCustomActionData); | ||
262 | ExitOnFailure(hr, "Failed to add Name to CustomActionData for Wix4PerformanceCategory: %ls", pwzId); | ||
263 | |||
264 | hr = WcaGetRecordString(hRec, pcdqIniData, &pwzData); | ||
265 | ExitOnFailure(hr, "Failed to get IniData for Wix4PerformanceCategory: %ls", pwzId); | ||
266 | hr = WcaWriteStringToCaData(pwzData, &pwzCustomActionData); | ||
267 | ExitOnFailure(hr, "Failed to add IniData to CustomActionData for Wix4PerformanceCategory: %ls", pwzId); | ||
268 | |||
269 | hr = WcaGetRecordString(hRec, pcdqConstantData, &pwzData); | ||
270 | ExitOnFailure(hr, "Failed to get ConstantData for Wix4PerformanceCategory: %ls", pwzId); | ||
271 | hr = WcaWriteStringToCaData(pwzData, &pwzCustomActionData); | ||
272 | ExitOnFailure(hr, "Failed to add ConstantData to CustomActionData for Wix4PerformanceCategory: %ls", pwzId); | ||
273 | } | ||
274 | |||
275 | if (hr == E_NOMOREITEMS) | ||
276 | { | ||
277 | hr = S_OK; | ||
278 | } | ||
279 | ExitOnFailure(hr, "Failure while processing Wix4PerformanceCategory table."); | ||
280 | |||
281 | // If there was any data built up, schedule it for execution. | ||
282 | if (pwzCustomActionData) | ||
283 | { | ||
284 | if (fInstall) | ||
285 | { | ||
286 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RollbackRegisterPerfCounterData"), pwzCustomActionData, COST_PERFMON_UNREGISTER); | ||
287 | ExitOnFailure(hr, "Failed to schedule RollbackRegisterPerfCounterData action for Wix4PerformanceCategory: %ls", pwzId); | ||
288 | |||
289 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RegisterPerfCounterData"), pwzCustomActionData, COST_PERFMON_REGISTER); | ||
290 | ExitOnFailure(hr, "Failed to schedule RegisterPerfCounterData action for Wix4PerformanceCategory: %ls", pwzId); | ||
291 | } | ||
292 | else | ||
293 | { | ||
294 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RollbackUnregisterPerfCounterData"), pwzCustomActionData, COST_PERFMON_REGISTER); | ||
295 | ExitOnFailure(hr, "Failed to schedule RollbackUnregisterPerfCounterData action for Wix4PerformanceCategory: %ls", pwzId); | ||
296 | |||
297 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"UnregisterPerfCounterData"), pwzCustomActionData, COST_PERFMON_UNREGISTER); | ||
298 | ExitOnFailure(hr, "Failed to schedule UnregisterPerfCounterData action for Wix4PerformanceCategory: %ls", pwzId); | ||
299 | } | ||
300 | } | ||
301 | |||
302 | LExit: | ||
303 | ReleaseStr(pwzCustomActionData); | ||
304 | ReleaseStr(pwzData); | ||
305 | ReleaseStr(pwzName); | ||
306 | ReleaseStr(pwzComponent); | ||
307 | ReleaseStr(pwzId); | ||
308 | |||
309 | return hr; | ||
310 | } | ||
diff --git a/src/ext/Util/ca/scaperfexec.cpp b/src/ext/Util/ca/scaperfexec.cpp new file mode 100644 index 00000000..c5425754 --- /dev/null +++ b/src/ext/Util/ca/scaperfexec.cpp | |||
@@ -0,0 +1,423 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | typedef DWORD (STDAPICALLTYPE *PFNPERFCOUNTERTEXTSTRINGS)(LPWSTR lpCommandLine, BOOL bQuietModeArg); | ||
6 | |||
7 | static HRESULT ExecutePerfCounterData( | ||
8 | __in MSIHANDLE hInstall, | ||
9 | __in BOOL fInstall | ||
10 | ); | ||
11 | static HRESULT CreateDataFile( | ||
12 | __in LPCWSTR wzTempFolder, | ||
13 | __in LPCWSTR wzData, | ||
14 | __in BOOL fIniData, | ||
15 | __out HANDLE *phFile, | ||
16 | __out_opt LPWSTR *ppwzFile | ||
17 | ); | ||
18 | |||
19 | |||
20 | /******************************************************************** | ||
21 | RegisterPerfCounterData - CUSTOM ACTION ENTRY POINT for registering | ||
22 | performance counters | ||
23 | |||
24 | Input: deferred CustomActionData: wzName\twzIniData\twzConstantData\twzName\twzIniData\twzConstantData\t... | ||
25 | *******************************************************************/ | ||
26 | extern "C" UINT __stdcall RegisterPerfCounterData( | ||
27 | __in MSIHANDLE hInstall | ||
28 | ) | ||
29 | { | ||
30 | // AssertSz(FALSE, "debug RegisterPerfCounterData()"); | ||
31 | HRESULT hr = S_OK; | ||
32 | DWORD er = ERROR_SUCCESS; | ||
33 | |||
34 | hr = WcaInitialize(hInstall, "RegisterPerfCounterData"); | ||
35 | ExitOnFailure(hr, "Failed to initialize RegisterPerfCounterData."); | ||
36 | |||
37 | hr = ExecutePerfCounterData(hInstall, TRUE); | ||
38 | MessageExitOnFailure(hr, msierrInstallPerfCounterData, "Failed to execute Wix4PerformanceCategory table."); | ||
39 | |||
40 | LExit: | ||
41 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
42 | return WcaFinalize(er); | ||
43 | } | ||
44 | |||
45 | |||
46 | /******************************************************************** | ||
47 | UnregisterPerfCounterData - CUSTOM ACTION ENTRY POINT for registering | ||
48 | performance counters | ||
49 | |||
50 | Input: deferred CustomActionData: wzName\twzIniData\twzConstantData\twzName\twzIniData\twzConstantData\t... | ||
51 | *******************************************************************/ | ||
52 | extern "C" UINT __stdcall UnregisterPerfCounterData( | ||
53 | __in MSIHANDLE hInstall | ||
54 | ) | ||
55 | { | ||
56 | // AssertSz(FALSE, "debug UnregisterPerfCounterData()"); | ||
57 | HRESULT hr = S_OK; | ||
58 | DWORD er = ERROR_SUCCESS; | ||
59 | |||
60 | hr = WcaInitialize(hInstall, "UnregisterPerfCounterData"); | ||
61 | ExitOnFailure(hr, "Failed to initialize UnregisterPerfCounterData."); | ||
62 | |||
63 | hr = ExecutePerfCounterData(hInstall, FALSE); | ||
64 | MessageExitOnFailure(hr, msierrUninstallPerfCounterData, "Failed to execute Wix4PerformanceCategory table."); | ||
65 | |||
66 | LExit: | ||
67 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
68 | return WcaFinalize(er); | ||
69 | } | ||
70 | |||
71 | |||
72 | /******************************************************************** | ||
73 | RegisterPerfmon - CUSTOM ACTION ENTRY POINT for registering | ||
74 | counters | ||
75 | |||
76 | Input: deferred CustomActionData - | ||
77 | wzFile or wzName | ||
78 | *******************************************************************/ | ||
79 | extern "C" UINT __stdcall RegisterPerfmon( | ||
80 | __in MSIHANDLE hInstall | ||
81 | ) | ||
82 | { | ||
83 | // Assert(FALSE); | ||
84 | UINT er = ERROR_SUCCESS; | ||
85 | HRESULT hr = S_OK; | ||
86 | LPWSTR pwzData = NULL; | ||
87 | |||
88 | HMODULE hMod = NULL; | ||
89 | PFNPERFCOUNTERTEXTSTRINGS pfnPerfCounterTextString; | ||
90 | DWORD dwRet; | ||
91 | LPWSTR pwzShortPath = NULL; | ||
92 | DWORD cchShortPath = MAX_PATH; | ||
93 | DWORD cchShortPathLength = 0; | ||
94 | |||
95 | LPWSTR pwzCommand = NULL; | ||
96 | |||
97 | hr = WcaInitialize(hInstall, "RegisterPerfmon"); | ||
98 | ExitOnFailure(hr, "failed to initialize"); | ||
99 | |||
100 | hr = WcaGetProperty(L"CustomActionData", &pwzData); | ||
101 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
102 | |||
103 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzData); | ||
104 | |||
105 | // do the perfmon registration | ||
106 | if (NULL == hMod) | ||
107 | { | ||
108 | hr = LoadSystemLibrary(L"loadperf.dll", &hMod); | ||
109 | } | ||
110 | ExitOnFailure(hr, "failed to load DLL for PerfMon"); | ||
111 | |||
112 | pfnPerfCounterTextString = (PFNPERFCOUNTERTEXTSTRINGS)::GetProcAddress(hMod, "LoadPerfCounterTextStringsW"); | ||
113 | ExitOnNullWithLastError(pfnPerfCounterTextString, hr, "failed to get DLL function for PerfMon"); | ||
114 | |||
115 | hr = StrAlloc(&pwzShortPath, cchShortPath); | ||
116 | ExitOnFailure(hr, "failed to allocate string"); | ||
117 | |||
118 | WcaLog(LOGMSG_VERBOSE, "Converting DLL path to short format: %ls", pwzData); | ||
119 | cchShortPathLength = ::GetShortPathNameW(pwzData, pwzShortPath, cchShortPath); | ||
120 | if (cchShortPathLength > cchShortPath) | ||
121 | { | ||
122 | cchShortPath = cchShortPathLength + 1; | ||
123 | hr = StrAlloc(&pwzShortPath, cchShortPath); | ||
124 | ExitOnFailure(hr, "failed to allocate string"); | ||
125 | |||
126 | cchShortPathLength = ::GetShortPathNameW(pwzData, pwzShortPath, cchShortPath); | ||
127 | } | ||
128 | |||
129 | if (0 == cchShortPathLength) | ||
130 | { | ||
131 | ExitOnLastError(hr, "failed to get short path format of path: %ls", pwzData); | ||
132 | } | ||
133 | |||
134 | hr = StrAllocFormatted(&pwzCommand, L"lodctr \"%s\"", pwzShortPath); | ||
135 | ExitOnFailure(hr, "failed to format lodctr string"); | ||
136 | |||
137 | WcaLog(LOGMSG_VERBOSE, "RegisterPerfmon running command: '%ls'", pwzCommand); | ||
138 | dwRet = (*pfnPerfCounterTextString)(pwzCommand, TRUE); | ||
139 | if (dwRet != ERROR_SUCCESS && dwRet != ERROR_ALREADY_EXISTS) | ||
140 | { | ||
141 | hr = HRESULT_FROM_WIN32(dwRet); | ||
142 | MessageExitOnFailure(hr, msierrPERFMONFailedRegisterDLL, "failed to register with PerfMon, DLL: %ls", pwzData); | ||
143 | } | ||
144 | |||
145 | hr = S_OK; | ||
146 | LExit: | ||
147 | ReleaseStr(pwzData); | ||
148 | |||
149 | if (FAILED(hr)) | ||
150 | er = ERROR_INSTALL_FAILURE; | ||
151 | return WcaFinalize(er); | ||
152 | } | ||
153 | |||
154 | |||
155 | extern "C" UINT __stdcall UnregisterPerfmon( | ||
156 | __in MSIHANDLE hInstall | ||
157 | ) | ||
158 | { | ||
159 | // Assert(FALSE); | ||
160 | UINT er = ERROR_SUCCESS; | ||
161 | HRESULT hr = S_OK; | ||
162 | LPWSTR pwzData = NULL; | ||
163 | |||
164 | HMODULE hMod = NULL; | ||
165 | PFNPERFCOUNTERTEXTSTRINGS pfnPerfCounterTextString; | ||
166 | DWORD dwRet; | ||
167 | WCHAR wz[255]; | ||
168 | |||
169 | hr = WcaInitialize(hInstall, "UnregisterPerfmon"); | ||
170 | ExitOnFailure(hr, "failed to initialize"); | ||
171 | |||
172 | hr = WcaGetProperty(L"CustomActionData", &pwzData); | ||
173 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
174 | |||
175 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzData); | ||
176 | |||
177 | // do the perfmon unregistration | ||
178 | hr = E_FAIL; | ||
179 | if (hMod == NULL) | ||
180 | { | ||
181 | hr = LoadSystemLibrary(L"loadperf.dll", &hMod); | ||
182 | } | ||
183 | ExitOnFailure(hr, "failed to load DLL for PerfMon"); | ||
184 | |||
185 | pfnPerfCounterTextString = (PFNPERFCOUNTERTEXTSTRINGS)::GetProcAddress(hMod, "UnloadPerfCounterTextStringsW"); | ||
186 | ExitOnNullWithLastError(pfnPerfCounterTextString, hr, "failed to get DLL function for PerfMon"); | ||
187 | |||
188 | hr = ::StringCchPrintfW(wz, countof(wz), L"unlodctr \"%s\"", pwzData); | ||
189 | ExitOnFailure(hr, "Failed to format unlodctr string with: %ls", pwzData); | ||
190 | WcaLog(LOGMSG_VERBOSE, "UnregisterPerfmon running command: '%ls'", wz); | ||
191 | dwRet = (*pfnPerfCounterTextString)(wz, TRUE); | ||
192 | // if the counters aren't registered, then OK to continue | ||
193 | if (dwRet != ERROR_SUCCESS && dwRet != ERROR_FILE_NOT_FOUND && dwRet != ERROR_BADKEY) | ||
194 | { | ||
195 | hr = HRESULT_FROM_WIN32(dwRet); | ||
196 | MessageExitOnFailure(hr, msierrPERFMONFailedUnregisterDLL, "failed to unregsister with PerfMon, DLL: %ls", pwzData); | ||
197 | } | ||
198 | |||
199 | hr = S_OK; | ||
200 | LExit: | ||
201 | ReleaseStr(pwzData); | ||
202 | |||
203 | if (FAILED(hr)) | ||
204 | er = ERROR_INSTALL_FAILURE; | ||
205 | return WcaFinalize(er); | ||
206 | } | ||
207 | |||
208 | |||
209 | static HRESULT ExecutePerfCounterData( | ||
210 | __in MSIHANDLE /*hInstall*/, | ||
211 | __in BOOL fInstall | ||
212 | ) | ||
213 | { | ||
214 | HRESULT hr = S_OK; | ||
215 | DWORD er = ERROR_SUCCESS; | ||
216 | |||
217 | HMODULE hModule = NULL; | ||
218 | PFNPERFCOUNTERTEXTSTRINGS pfnPerfCounterTextString = NULL; | ||
219 | LPCWSTR wzPrefix = NULL; | ||
220 | |||
221 | LPWSTR pwzCustomActionData = NULL; | ||
222 | LPWSTR pwz = NULL; | ||
223 | |||
224 | LPWSTR pwzName = NULL; | ||
225 | LPWSTR pwzIniData = NULL; | ||
226 | LPWSTR pwzConstantData = NULL; | ||
227 | LPWSTR pwzTempFolder = NULL; | ||
228 | LPWSTR pwzIniFile = NULL; | ||
229 | LPWSTR pwzExecute = NULL; | ||
230 | |||
231 | HANDLE hIniData = INVALID_HANDLE_VALUE; | ||
232 | HANDLE hConstantData = INVALID_HANDLE_VALUE; | ||
233 | |||
234 | // Load the system performance counter helper DLL then get the appropriate | ||
235 | // entrypoint out of it. Fortunately, they have the same signature so we | ||
236 | // can use one function pointer to point to both. | ||
237 | hr = LoadSystemLibrary(L"loadperf.dll", &hModule); | ||
238 | ExitOnFailure(hr, "failed to load DLL for PerfMon"); | ||
239 | |||
240 | if (fInstall) | ||
241 | { | ||
242 | wzPrefix = L"lodctr"; | ||
243 | pfnPerfCounterTextString = (PFNPERFCOUNTERTEXTSTRINGS)::GetProcAddress(hModule, "LoadPerfCounterTextStringsW"); | ||
244 | } | ||
245 | else | ||
246 | { | ||
247 | wzPrefix = L"unlodctr"; | ||
248 | pfnPerfCounterTextString = (PFNPERFCOUNTERTEXTSTRINGS)::GetProcAddress(hModule, "UnloadPerfCounterTextStringsW"); | ||
249 | } | ||
250 | ExitOnNullWithLastError(pfnPerfCounterTextString, hr, "Failed to get DLL function for PerfMon"); | ||
251 | |||
252 | // Now get the CustomActionData and execute it. | ||
253 | hr = WcaGetProperty(L"CustomActionData", &pwzCustomActionData); | ||
254 | ExitOnFailure(hr, "Failed to get CustomActionData."); | ||
255 | |||
256 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzCustomActionData); | ||
257 | |||
258 | pwz = pwzCustomActionData; | ||
259 | |||
260 | while (S_OK == (hr = WcaReadStringFromCaData(&pwz, &pwzName))) | ||
261 | { | ||
262 | hr = WcaReadStringFromCaData(&pwz, &pwzIniData); | ||
263 | ExitOnFailure(hr, "Failed to read IniData from custom action data."); | ||
264 | |||
265 | hr = WcaReadStringFromCaData(&pwz, &pwzConstantData); | ||
266 | ExitOnFailure(hr, "Failed to read ConstantData from custom action data."); | ||
267 | |||
268 | if (fInstall) | ||
269 | { | ||
270 | hr = PathCreateTempDirectory(NULL, L"WIXPF%03x", 999, &pwzTempFolder); | ||
271 | ExitOnFailure(hr, "Failed to create temp directory."); | ||
272 | |||
273 | hr = CreateDataFile(pwzTempFolder, pwzIniData, TRUE, &hIniData, &pwzIniFile); | ||
274 | ExitOnFailure(hr, "Failed to create .ini file for performance counter category: %ls", pwzName); | ||
275 | |||
276 | hr = CreateDataFile(pwzTempFolder, pwzConstantData, FALSE, &hConstantData, NULL); | ||
277 | ExitOnFailure(hr, "Failed to create .h file for performance counter category: %ls", pwzName); | ||
278 | |||
279 | hr = StrAllocFormatted(&pwzExecute, L"%s \"%s\"", wzPrefix, pwzIniFile); | ||
280 | ExitOnFailure(hr, "Failed to allocate string to execute."); | ||
281 | |||
282 | // Execute the install. | ||
283 | er = (*pfnPerfCounterTextString)(pwzExecute, TRUE); | ||
284 | hr = HRESULT_FROM_WIN32(er); | ||
285 | ExitOnFailure(hr, "Failed to execute install of performance counter category: %ls", pwzName); | ||
286 | |||
287 | if (INVALID_HANDLE_VALUE != hIniData) | ||
288 | { | ||
289 | ::CloseHandle(hIniData); | ||
290 | hIniData = INVALID_HANDLE_VALUE; | ||
291 | } | ||
292 | |||
293 | if (INVALID_HANDLE_VALUE != hConstantData) | ||
294 | { | ||
295 | ::CloseHandle(hConstantData); | ||
296 | hConstantData = INVALID_HANDLE_VALUE; | ||
297 | } | ||
298 | |||
299 | DirEnsureDelete(pwzTempFolder, TRUE, TRUE); | ||
300 | } | ||
301 | else | ||
302 | { | ||
303 | hr = StrAllocFormatted(&pwzExecute, L"%s \"%s\"", wzPrefix, pwzName); | ||
304 | ExitOnFailure(hr, "Failed to allocate string to execute."); | ||
305 | |||
306 | // Execute the uninstall and if the counter isn't registered then ignore | ||
307 | // the error since it won't hurt anything. | ||
308 | er = (*pfnPerfCounterTextString)(pwzExecute, TRUE); | ||
309 | if (ERROR_FILE_NOT_FOUND == er || ERROR_BADKEY == er) | ||
310 | { | ||
311 | er = ERROR_SUCCESS; | ||
312 | } | ||
313 | hr = HRESULT_FROM_WIN32(er); | ||
314 | ExitOnFailure(hr, "Failed to execute uninstall of performance counter category: %ls", pwzName); | ||
315 | } | ||
316 | } | ||
317 | |||
318 | if (E_NOMOREITEMS == hr) // If there are no more items, all is well | ||
319 | { | ||
320 | hr = S_OK; | ||
321 | } | ||
322 | ExitOnFailure(hr, "Failed to execute all perf counter data."); | ||
323 | |||
324 | hr = S_OK; | ||
325 | |||
326 | LExit: | ||
327 | if (INVALID_HANDLE_VALUE != hIniData) | ||
328 | { | ||
329 | ::CloseHandle(hIniData); | ||
330 | } | ||
331 | |||
332 | if (INVALID_HANDLE_VALUE != hConstantData) | ||
333 | { | ||
334 | ::CloseHandle(hConstantData); | ||
335 | } | ||
336 | |||
337 | ReleaseStr(pwzExecute); | ||
338 | ReleaseStr(pwzIniFile); | ||
339 | ReleaseStr(pwzTempFolder); | ||
340 | ReleaseStr(pwzConstantData); | ||
341 | ReleaseStr(pwzIniData); | ||
342 | ReleaseStr(pwzName); | ||
343 | ReleaseStr(pwzCustomActionData); | ||
344 | |||
345 | if (hModule) | ||
346 | { | ||
347 | ::FreeLibrary(hModule); | ||
348 | } | ||
349 | |||
350 | return hr; | ||
351 | } | ||
352 | |||
353 | |||
354 | static HRESULT CreateDataFile( | ||
355 | __in LPCWSTR wzTempFolder, | ||
356 | __in LPCWSTR wzData, | ||
357 | __in BOOL fIniData, | ||
358 | __out HANDLE *phFile, | ||
359 | __out_opt LPWSTR *ppwzFile | ||
360 | ) | ||
361 | { | ||
362 | HRESULT hr = S_OK; | ||
363 | HANDLE hFile = INVALID_HANDLE_VALUE; | ||
364 | LPWSTR pwzFile = NULL; | ||
365 | LPSTR pszData = NULL; | ||
366 | DWORD cbData = 0; | ||
367 | DWORD cbWritten = 0; | ||
368 | |||
369 | // Convert the data to UTF-8 because lodctr/unloctr | ||
370 | // doesn't like unicode. | ||
371 | hr = StrAnsiAllocString(&pszData, wzData, 0, CP_UTF8); | ||
372 | ExitOnFailure(hr, "Failed to covert data to ANSI."); | ||
373 | |||
374 | cbData = lstrlenA(pszData); | ||
375 | |||
376 | // Concatenate the paths together, open the file data file | ||
377 | // and dump the data in there. | ||
378 | hr = StrAllocString(&pwzFile, wzTempFolder, 0); | ||
379 | ExitOnFailure(hr, "Failed to copy temp directory name."); | ||
380 | |||
381 | hr = StrAllocConcat(&pwzFile, L"wixperf", 0); | ||
382 | ExitOnFailure(hr, "Failed to add name of file."); | ||
383 | |||
384 | hr = StrAllocConcat(&pwzFile, fIniData ? L".ini" : L".h", 0); | ||
385 | ExitOnFailure(hr, "Failed to add extension of file."); | ||
386 | |||
387 | hFile = ::CreateFileW(pwzFile, GENERIC_WRITE, FILE_SHARE_READ, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL); | ||
388 | if (INVALID_HANDLE_VALUE == hFile) | ||
389 | { | ||
390 | ExitWithLastError(hr, "Failed to open new temp file: %ls", pwzFile); | ||
391 | } | ||
392 | |||
393 | if (!::WriteFile(hFile, pszData, cbData, &cbWritten, NULL)) | ||
394 | { | ||
395 | ExitWithLastError(hr, "Failed to write data to new temp file: %ls", pwzFile); | ||
396 | } | ||
397 | |||
398 | if (INVALID_HANDLE_VALUE != hFile) | ||
399 | { | ||
400 | ::CloseHandle(hFile); | ||
401 | hFile = INVALID_HANDLE_VALUE; | ||
402 | } | ||
403 | |||
404 | // Return the requested values. | ||
405 | *phFile = hFile; | ||
406 | hFile = INVALID_HANDLE_VALUE; | ||
407 | |||
408 | if (ppwzFile) | ||
409 | { | ||
410 | *ppwzFile = pwzFile; | ||
411 | pwzFile = NULL; | ||
412 | } | ||
413 | |||
414 | LExit: | ||
415 | if (INVALID_HANDLE_VALUE != hFile) | ||
416 | { | ||
417 | ::CloseHandle(hFile); | ||
418 | } | ||
419 | ReleaseStr(pszData); | ||
420 | ReleaseStr(pwzFile); | ||
421 | |||
422 | return hr; | ||
423 | } | ||
diff --git a/src/ext/Util/ca/scasched.cpp b/src/ext/Util/ca/scasched.cpp new file mode 100644 index 00000000..d81b1f14 --- /dev/null +++ b/src/ext/Util/ca/scasched.cpp | |||
@@ -0,0 +1,127 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | |||
6 | /******************************************************************** | ||
7 | ConfigureSmb - CUSTOM ACTION ENTRY POINT for installing fileshare settings | ||
8 | |||
9 | ********************************************************************/ | ||
10 | extern "C" UINT __stdcall ConfigureSmbInstall( | ||
11 | __in MSIHANDLE hInstall | ||
12 | ) | ||
13 | { | ||
14 | HRESULT hr = S_OK; | ||
15 | UINT er = ERROR_SUCCESS; | ||
16 | |||
17 | SCA_SMB* pssList = NULL; | ||
18 | |||
19 | // initialize | ||
20 | hr = WcaInitialize(hInstall, "ConfigureSmbInstall"); | ||
21 | ExitOnFailure(hr, "Failed to initialize"); | ||
22 | |||
23 | // check to see if necessary tables are specified | ||
24 | if (WcaTableExists(L"Wix4FileShare") != S_OK) | ||
25 | { | ||
26 | WcaLog(LOGMSG_VERBOSE, "Skipping SMB CustomAction, no Wix4FileShare table"); | ||
27 | ExitFunction1(hr = S_FALSE); | ||
28 | } | ||
29 | |||
30 | hr = ScaSmbRead(&pssList); | ||
31 | ExitOnFailure(hr, "failed to read Wix4FileShare table"); | ||
32 | |||
33 | hr = ScaSmbInstall(pssList); | ||
34 | ExitOnFailure(hr, "failed to install FileShares"); | ||
35 | |||
36 | LExit: | ||
37 | if (pssList) | ||
38 | ScaSmbFreeList(pssList); | ||
39 | |||
40 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
41 | return WcaFinalize(er); | ||
42 | } | ||
43 | |||
44 | |||
45 | /******************************************************************** | ||
46 | ConfigureSmb - CUSTOM ACTION ENTRY POINT for uninstalling fileshare settings | ||
47 | |||
48 | ********************************************************************/ | ||
49 | extern "C" UINT __stdcall ConfigureSmbUninstall( | ||
50 | __in MSIHANDLE hInstall | ||
51 | ) | ||
52 | { | ||
53 | HRESULT hr = S_OK; | ||
54 | UINT er = ERROR_SUCCESS; | ||
55 | |||
56 | SCA_SMB* pssList = NULL; | ||
57 | |||
58 | // initialize | ||
59 | hr = WcaInitialize(hInstall, "ConfigureSmbUninstall"); | ||
60 | ExitOnFailure(hr, "Failed to initialize"); | ||
61 | |||
62 | // check to see if necessary tables are specified | ||
63 | if (WcaTableExists(L"Wix4FileShare") != S_OK) | ||
64 | { | ||
65 | WcaLog(LOGMSG_VERBOSE, "Skipping SMB CustomAction, no Wix4FileShare table"); | ||
66 | ExitFunction1(hr = S_FALSE); | ||
67 | } | ||
68 | |||
69 | hr = ScaSmbRead(&pssList); | ||
70 | ExitOnFailure(hr, "failed to read Wix4FileShare table"); | ||
71 | |||
72 | hr = ScaSmbUninstall(pssList); | ||
73 | ExitOnFailure(hr, "failed to uninstall FileShares"); | ||
74 | |||
75 | LExit: | ||
76 | if (pssList) | ||
77 | ScaSmbFreeList(pssList); | ||
78 | |||
79 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
80 | return WcaFinalize(er); | ||
81 | } | ||
82 | |||
83 | |||
84 | /******************************************************************** | ||
85 | ConfigureUsers - CUSTOM ACTION ENTRY POINT for installing users | ||
86 | |||
87 | ********************************************************************/ | ||
88 | extern "C" UINT __stdcall ConfigureUsers( | ||
89 | __in MSIHANDLE hInstall | ||
90 | ) | ||
91 | { | ||
92 | //AssertSz(0, "Debug ConfigureUsers"); | ||
93 | |||
94 | HRESULT hr = S_OK; | ||
95 | UINT er = ERROR_SUCCESS; | ||
96 | |||
97 | BOOL fInitializedCom = FALSE; | ||
98 | SCA_USER* psuList = NULL; | ||
99 | |||
100 | // initialize | ||
101 | hr = WcaInitialize(hInstall, "ConfigureUsers"); | ||
102 | ExitOnFailure(hr, "Failed to initialize"); | ||
103 | |||
104 | hr = ::CoInitialize(NULL); | ||
105 | ExitOnFailure(hr, "failed to initialize COM"); | ||
106 | fInitializedCom = TRUE; | ||
107 | |||
108 | hr = ScaUserRead(&psuList); | ||
109 | ExitOnFailure(hr, "failed to read Wix4User table"); | ||
110 | |||
111 | hr = ScaUserExecute(psuList); | ||
112 | ExitOnFailure(hr, "failed to add/remove User actions"); | ||
113 | |||
114 | LExit: | ||
115 | if (psuList) | ||
116 | { | ||
117 | ScaUserFreeList(psuList); | ||
118 | } | ||
119 | |||
120 | if (fInitializedCom) | ||
121 | { | ||
122 | ::CoUninitialize(); | ||
123 | } | ||
124 | |||
125 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
126 | return WcaFinalize(er); | ||
127 | } \ No newline at end of file | ||
diff --git a/src/ext/Util/ca/scasmb.h b/src/ext/Util/ca/scasmb.h new file mode 100644 index 00000000..f2a4b53c --- /dev/null +++ b/src/ext/Util/ca/scasmb.h | |||
@@ -0,0 +1,46 @@ | |||
1 | #pragma once | ||
2 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
3 | |||
4 | |||
5 | #include "scauser.h" | ||
6 | |||
7 | // structs | ||
8 | // Structure used to hold and extra user/permission pairs from the Wix4FileSharePermissions Table | ||
9 | struct SCA_SMB_EX_USER_PERMS | ||
10 | { | ||
11 | int nPermissions; | ||
12 | ACCESS_MODE accessMode; | ||
13 | SCA_USER scau; | ||
14 | SCA_SMB_EX_USER_PERMS* pExUserPermsNext; | ||
15 | }; | ||
16 | |||
17 | struct SCA_SMB // hungarian ss | ||
18 | { | ||
19 | WCHAR wzId[MAX_DARWIN_KEY + 1]; | ||
20 | WCHAR wzShareName[MAX_DARWIN_KEY + 1]; | ||
21 | WCHAR wzDescription[MAX_DARWIN_COLUMN + 1]; | ||
22 | WCHAR wzComponent[MAX_DARWIN_KEY + 1]; | ||
23 | WCHAR wzDirectory[MAX_PATH + 1]; | ||
24 | |||
25 | int nUserPermissionCount; | ||
26 | int nPermissions; | ||
27 | SCA_SMB_EX_USER_PERMS* pExUserPerms; | ||
28 | |||
29 | INSTALLSTATE isInstalled, isAction; | ||
30 | |||
31 | BOOL fUseIntegratedAuth; | ||
32 | BOOL fLegacyUserProvided; | ||
33 | struct SCA_USER scau; | ||
34 | |||
35 | struct SCA_SMB* pssNext; | ||
36 | }; | ||
37 | |||
38 | |||
39 | #define RESERVED 0 | ||
40 | |||
41 | // schedule prototypes | ||
42 | HRESULT ScaSmbRead(SCA_SMB** ppssList); | ||
43 | HRESULT ScaSmbExPermsRead(SCA_SMB* pss); | ||
44 | HRESULT ScaSmbUninstall(SCA_SMB* pssList); | ||
45 | HRESULT ScaSmbInstall(SCA_SMB* pssList); | ||
46 | void ScaSmbFreeList(SCA_SMB* pssList); | ||
diff --git a/src/ext/Util/ca/scasmbexec.cpp b/src/ext/Util/ca/scasmbexec.cpp new file mode 100644 index 00000000..ced3aa78 --- /dev/null +++ b/src/ext/Util/ca/scasmbexec.cpp | |||
@@ -0,0 +1,316 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | |||
6 | /******************************************************************** | ||
7 | AllocateAcl - allocate an acl and populate it with this user and | ||
8 | permission information user could be user or domain\user | ||
9 | |||
10 | ********************************************************************/ | ||
11 | HRESULT AllocateAcl(SCA_SMBP* pssp, PACL* ppACL) | ||
12 | { | ||
13 | HRESULT hr = S_OK; | ||
14 | EXPLICIT_ACCESSW* pEA = NULL; | ||
15 | DWORD cEA = 0; | ||
16 | DWORD dwCounter = 0; | ||
17 | |||
18 | PSID psid = NULL; | ||
19 | LPCWSTR wzUser = NULL; | ||
20 | DWORD nPermissions = 0; | ||
21 | DWORD nErrorReturn = 0; | ||
22 | ACCESS_MODE accessMode = NOT_USED_ACCESS; | ||
23 | |||
24 | cEA = pssp->dwUserPermissionCount + 1; | ||
25 | if (cEA >= MAXSIZE_T / sizeof(EXPLICIT_ACCESSW)) | ||
26 | { | ||
27 | ExitOnFailure(hr = E_OUTOFMEMORY, "Too many user permissions to allocate: %u", cEA); | ||
28 | } | ||
29 | |||
30 | pEA = static_cast<EXPLICIT_ACCESSW*>(MemAlloc(cEA * sizeof(EXPLICIT_ACCESSW), TRUE)); | ||
31 | ExitOnNull(pEA, hr, E_OUTOFMEMORY, "failed to allocate memory for explicit access structure"); | ||
32 | |||
33 | // figure out how big the psid is | ||
34 | for (dwCounter = 0; dwCounter < pssp->dwUserPermissionCount; ++dwCounter) | ||
35 | { | ||
36 | wzUser = pssp->pUserPerms[dwCounter].wzUser; | ||
37 | nPermissions = pssp->pUserPerms[dwCounter].nPermissions; | ||
38 | accessMode = pssp->pUserPerms[dwCounter].accessMode; | ||
39 | // | ||
40 | // create the appropriate SID | ||
41 | // | ||
42 | |||
43 | // figure out the right user to put into the access block | ||
44 | if (0 == lstrcmpW(wzUser, L"Everyone")) | ||
45 | { | ||
46 | hr = AclGetWellKnownSid(WinWorldSid, &psid); | ||
47 | } | ||
48 | else if (0 == lstrcmpW(wzUser, L"Administrators")) | ||
49 | { | ||
50 | hr = AclGetWellKnownSid(WinBuiltinAdministratorsSid, &psid); | ||
51 | } | ||
52 | else if (0 == lstrcmpW(wzUser, L"LocalSystem")) | ||
53 | { | ||
54 | hr = AclGetWellKnownSid(WinLocalSystemSid, &psid); | ||
55 | } | ||
56 | else if (0 == lstrcmpW(wzUser, L"LocalService")) | ||
57 | { | ||
58 | hr = AclGetWellKnownSid(WinLocalServiceSid, &psid); | ||
59 | } | ||
60 | else if (0 == lstrcmpW(wzUser, L"NetworkService")) | ||
61 | { | ||
62 | hr = AclGetWellKnownSid(WinNetworkServiceSid, &psid); | ||
63 | } | ||
64 | else if (0 == lstrcmpW(wzUser, L"AuthenticatedUser")) | ||
65 | { | ||
66 | hr = AclGetWellKnownSid(WinAuthenticatedUserSid, &psid); | ||
67 | } | ||
68 | else if (0 == lstrcmpW(wzUser, L"Guests")) | ||
69 | { | ||
70 | hr = AclGetWellKnownSid(WinBuiltinGuestsSid, &psid); | ||
71 | } | ||
72 | else if(0 == lstrcmpW(wzUser, L"CREATOR OWNER")) | ||
73 | { | ||
74 | hr = AclGetWellKnownSid(WinCreatorOwnerSid, &psid); | ||
75 | } | ||
76 | else | ||
77 | { | ||
78 | hr = AclGetAccountSid(NULL, wzUser, &psid); | ||
79 | } | ||
80 | ExitOnFailure(hr, "failed to get sid for account: %ls", wzUser); | ||
81 | |||
82 | // we now have a valid pSid, fill in the EXPLICIT_ACCESS | ||
83 | |||
84 | /* Permissions options: (see sca.sdh for defined sdl options) | ||
85 | #define GENERIC_READ (0x80000000L) 2147483648 | ||
86 | #define GENERIC_WRITE (0x40000000L) 1073741824 | ||
87 | #define GENERIC_EXECUTE (0x20000000L) 536870912 | ||
88 | #define GENERIC_ALL (0x10000000L) 268435456 | ||
89 | */ | ||
90 | pEA[dwCounter].grfAccessPermissions = nPermissions; | ||
91 | pEA[dwCounter].grfAccessMode = accessMode; | ||
92 | pEA[dwCounter].grfInheritance = SUB_CONTAINERS_AND_OBJECTS_INHERIT; | ||
93 | #pragma prefast(push) | ||
94 | #pragma prefast(disable:25029) | ||
95 | ::BuildTrusteeWithSidW(&(pEA[dwCounter].Trustee), psid); | ||
96 | #pragma prefast(pop) | ||
97 | } | ||
98 | |||
99 | // create a new ACL that contains the ACE | ||
100 | *ppACL = NULL; | ||
101 | #pragma prefast(push) | ||
102 | #pragma prefast(disable:25029) | ||
103 | nErrorReturn = ::SetEntriesInAclW(dwCounter, pEA, NULL, ppACL); | ||
104 | #pragma prefast(pop) | ||
105 | ExitOnFailure(hr = HRESULT_FROM_WIN32(nErrorReturn), "failed to allocate ACL"); | ||
106 | |||
107 | LExit: | ||
108 | if (psid) | ||
109 | { | ||
110 | AclFreeSid(psid); | ||
111 | } | ||
112 | |||
113 | ReleaseMem(pEA); | ||
114 | |||
115 | return hr; | ||
116 | } | ||
117 | |||
118 | |||
119 | |||
120 | /******************************************************************** | ||
121 | FillShareInfo - fill the NetShareAdd data structure | ||
122 | |||
123 | ********************************************************************/ | ||
124 | void FillShareInfo(SHARE_INFO_502* psi, SCA_SMBP* pssp, PSECURITY_DESCRIPTOR pSD) | ||
125 | { | ||
126 | psi->shi502_netname = pssp->wzKey; | ||
127 | psi->shi502_type = STYPE_DISKTREE; | ||
128 | psi->shi502_remark = pssp->wzDescription; | ||
129 | psi->shi502_permissions = 0; // not used | ||
130 | psi->shi502_max_uses = 0xFFFFFFFF; | ||
131 | psi->shi502_current_uses = 0; | ||
132 | psi->shi502_path = pssp->wzDirectory; | ||
133 | psi->shi502_passwd = NULL; // not file share perms | ||
134 | psi->shi502_reserved = 0; | ||
135 | psi->shi502_security_descriptor = pSD; | ||
136 | } | ||
137 | |||
138 | |||
139 | |||
140 | /* NET_API_STATUS return codes | ||
141 | NERR_Success = 0 | ||
142 | NERR_DuplicateShare = 2118 | ||
143 | NERR_BufTooSmall = 2123 | ||
144 | NERR_NetNameNotFound = 2310 | ||
145 | NERR_RedirectedPath = 2117 | ||
146 | NERR_UnknownDevDir = 2116 | ||
147 | */ | ||
148 | |||
149 | /******************************************************************** | ||
150 | DoesShareExists - Does a share of this name exist on this computer? | ||
151 | |||
152 | ********************************************************************/ | ||
153 | HRESULT DoesShareExist(__in LPWSTR wzShareName) | ||
154 | { | ||
155 | HRESULT hr = S_OK; | ||
156 | NET_API_STATUS s; | ||
157 | SHARE_INFO_502* psi = NULL; | ||
158 | s = ::NetShareGetInfo(NULL, wzShareName, 502, (BYTE**) &psi); | ||
159 | |||
160 | switch (s) | ||
161 | { | ||
162 | case NERR_Success: | ||
163 | hr = S_OK; | ||
164 | break; | ||
165 | case NERR_NetNameNotFound: | ||
166 | hr = E_FILENOTFOUND; | ||
167 | break; | ||
168 | default: | ||
169 | WcaLogError(s, "NetShareGetInfo returned an unexpected value.", NULL); | ||
170 | hr = HRESULT_FROM_WIN32(s); | ||
171 | break; | ||
172 | } | ||
173 | |||
174 | ::NetApiBufferFree(psi); | ||
175 | |||
176 | return hr; | ||
177 | } | ||
178 | |||
179 | |||
180 | |||
181 | /******************************************************************** | ||
182 | CreateShare - create the file share on this computer | ||
183 | |||
184 | ********************************************************************/ | ||
185 | HRESULT CreateShare(SCA_SMBP* pssp) | ||
186 | { | ||
187 | if (!pssp || !(pssp->wzKey)) | ||
188 | return E_INVALIDARG; | ||
189 | |||
190 | HRESULT hr = S_OK; | ||
191 | PACL pACL = NULL; | ||
192 | SHARE_INFO_502 si; | ||
193 | NET_API_STATUS s; | ||
194 | DWORD dwParamErr = 0; | ||
195 | |||
196 | BOOL fShareExists = SUCCEEDED(DoesShareExist(pssp->wzKey)); | ||
197 | |||
198 | PSECURITY_DESCRIPTOR pSD = static_cast<PSECURITY_DESCRIPTOR>(MemAlloc(SECURITY_DESCRIPTOR_MIN_LENGTH, TRUE)); | ||
199 | ExitOnNull(pSD, hr, E_OUTOFMEMORY, "Failed to allocate memory for security descriptor"); | ||
200 | |||
201 | #pragma prefast(push) | ||
202 | #pragma prefast(disable:25029) | ||
203 | if (!::InitializeSecurityDescriptor(pSD, SECURITY_DESCRIPTOR_REVISION)) | ||
204 | #pragma prefast(pop) | ||
205 | { | ||
206 | ExitOnLastError(hr, "failed to initialize security descriptor"); | ||
207 | } | ||
208 | |||
209 | hr = AllocateAcl(pssp, &pACL); | ||
210 | ExitOnFailure(hr, "Failed to allocate ACL for fileshare"); | ||
211 | |||
212 | if (NULL == pACL) | ||
213 | { | ||
214 | WcaLog(LOGMSG_VERBOSE, "Ignoring NULL DACL."); | ||
215 | } | ||
216 | #pragma prefast(push) | ||
217 | #pragma prefast(disable:25028) // We only call this when pACL isn't NULL, so this call is safe according to the docs | ||
218 | // add the ACL to the security descriptor. | ||
219 | else if (!::SetSecurityDescriptorDacl(pSD, TRUE, pACL, FALSE)) | ||
220 | { | ||
221 | ExitOnLastError(hr, "Failed to set security descriptor"); | ||
222 | } | ||
223 | #pragma prefast(pop) | ||
224 | |||
225 | // all that is left is to create the share | ||
226 | FillShareInfo(&si, pssp, pSD); | ||
227 | |||
228 | // Fail if the directory doesn't exist | ||
229 | if (!DirExists(pssp->wzDirectory, NULL)) | ||
230 | ExitOnFailure(hr = HRESULT_FROM_WIN32(ERROR_OBJECT_NOT_FOUND), "Can't create a file share on directory that doesn't exist: %ls.", pssp->wzDirectory); | ||
231 | |||
232 | WcaLog(LOGMSG_VERBOSE, "Creating file share on directory \'%ls\' named \'%ls\'.", pssp->wzDirectory, pssp->wzKey); | ||
233 | |||
234 | if (!fShareExists) | ||
235 | { | ||
236 | s = ::NetShareAdd(NULL, 502, (BYTE*) &si, &dwParamErr); | ||
237 | WcaLog(LOGMSG_VERBOSE, "Adding a new file share."); | ||
238 | } | ||
239 | else | ||
240 | { | ||
241 | // The share exists. Write our new permissions over the top. | ||
242 | s = ::NetShareSetInfo(NULL, pssp->wzKey, 502, (BYTE*) &si, &dwParamErr); | ||
243 | WcaLog(LOGMSG_VERBOSE, "Setting permissions on existing share."); | ||
244 | } | ||
245 | |||
246 | if (NERR_Success != s) | ||
247 | { | ||
248 | hr = E_FAIL; | ||
249 | if (!fShareExists && NERR_DuplicateShare == s) | ||
250 | WcaLog(LOGMSG_VERBOSE, "Duplicate error when existence check failed."); | ||
251 | |||
252 | // error codes listed above. | ||
253 | ExitOnFailure(hr, "Failed to create/modify file share: Err: %d", s); | ||
254 | } | ||
255 | |||
256 | LExit: | ||
257 | if (pACL) | ||
258 | { | ||
259 | ::LocalFree(pACL); | ||
260 | } | ||
261 | |||
262 | ReleaseMem(pSD); | ||
263 | |||
264 | return hr; | ||
265 | } | ||
266 | |||
267 | |||
268 | /******************************************************************** | ||
269 | ScaEnsureSmbExists | ||
270 | |||
271 | ********************************************************************/ | ||
272 | HRESULT ScaEnsureSmbExists(SCA_SMBP* pssp) | ||
273 | { | ||
274 | HRESULT hr = S_OK; | ||
275 | |||
276 | // create the share | ||
277 | hr = CreateShare(pssp); | ||
278 | |||
279 | return hr; | ||
280 | } | ||
281 | |||
282 | |||
283 | // | ||
284 | // Delete File Shares - real work | ||
285 | // | ||
286 | |||
287 | /******************************************************************** | ||
288 | ScaDropSmb - delete this file share from this computer | ||
289 | |||
290 | ********************************************************************/ | ||
291 | HRESULT ScaDropSmb(SCA_SMBP* pssp) | ||
292 | { | ||
293 | HRESULT hr = S_OK; | ||
294 | NET_API_STATUS s; | ||
295 | |||
296 | hr = DoesShareExist(pssp->wzKey); | ||
297 | |||
298 | if (E_FILENOTFOUND == hr) | ||
299 | { | ||
300 | WcaLog(LOGMSG_VERBOSE, "Share doesn't exist, share removal skipped. (%ls)", pssp->wzKey); | ||
301 | ExitFunction1(hr = S_OK); | ||
302 | |||
303 | } | ||
304 | |||
305 | ExitOnFailure(hr, "Unable to detect share. (%ls)", pssp->wzKey); | ||
306 | |||
307 | s = ::NetShareDel(NULL, pssp->wzKey, 0); | ||
308 | if (NERR_Success != s) | ||
309 | { | ||
310 | hr = E_FAIL; | ||
311 | ExitOnFailure(hr, "Failed to remove file share: Err: %d", s); | ||
312 | } | ||
313 | |||
314 | LExit: | ||
315 | return hr; | ||
316 | } | ||
diff --git a/src/ext/Util/ca/scasmbexec.h b/src/ext/Util/ca/scasmbexec.h new file mode 100644 index 00000000..e3c8f8bb --- /dev/null +++ b/src/ext/Util/ca/scasmbexec.h | |||
@@ -0,0 +1,27 @@ | |||
1 | #pragma once | ||
2 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
3 | |||
4 | |||
5 | struct SCA_SMBP_USER_PERMS | ||
6 | { | ||
7 | DWORD nPermissions; | ||
8 | ACCESS_MODE accessMode; | ||
9 | WCHAR* wzUser; | ||
10 | //Not adding Password because I can't find anywhere that it is used | ||
11 | }; | ||
12 | |||
13 | struct SCA_SMBP // hungarian ssp | ||
14 | { | ||
15 | WCHAR* wzKey; | ||
16 | WCHAR* wzDescription; | ||
17 | WCHAR* wzComponent; | ||
18 | WCHAR* wzDirectory; // full path of the dir to share to | ||
19 | |||
20 | DWORD dwUserPermissionCount; //Count of SCA_SMBP_EX_USER_PERMS structures | ||
21 | SCA_SMBP_USER_PERMS* pUserPerms; | ||
22 | BOOL fUseIntegratedAuth; | ||
23 | }; | ||
24 | |||
25 | |||
26 | HRESULT ScaEnsureSmbExists(SCA_SMBP* pssp); | ||
27 | HRESULT ScaDropSmb(SCA_SMBP* pssp); | ||
diff --git a/src/ext/Util/ca/scasmbsched.cpp b/src/ext/Util/ca/scasmbsched.cpp new file mode 100644 index 00000000..e29f7f51 --- /dev/null +++ b/src/ext/Util/ca/scasmbsched.cpp | |||
@@ -0,0 +1,639 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | |||
6 | /******************************************************************** | ||
7 | Helper functions to maintain a list of file shares to create / remove | ||
8 | |||
9 | ********************************************************************/ | ||
10 | SCA_SMB* NewSmb() | ||
11 | { | ||
12 | SCA_SMB* pss = (SCA_SMB*)MemAlloc(sizeof(SCA_SMB), TRUE); | ||
13 | Assert(pss); | ||
14 | return pss; | ||
15 | } | ||
16 | |||
17 | |||
18 | SCA_SMB_EX_USER_PERMS* NewExUserPermsSmb() | ||
19 | { | ||
20 | SCA_SMB_EX_USER_PERMS* pExUserPerms = (SCA_SMB_EX_USER_PERMS*)MemAlloc(sizeof(SCA_SMB_EX_USER_PERMS), TRUE); | ||
21 | Assert(pExUserPerms); | ||
22 | return pExUserPerms; | ||
23 | } | ||
24 | |||
25 | |||
26 | SCA_SMB* AddSmbToList(SCA_SMB* pssList, SCA_SMB* pss) | ||
27 | { | ||
28 | if (pssList) | ||
29 | { | ||
30 | SCA_SMB* pssT = pssList; | ||
31 | while (pssT->pssNext) | ||
32 | { | ||
33 | pssT = pssT->pssNext; | ||
34 | } | ||
35 | |||
36 | pssT->pssNext = pss; | ||
37 | } | ||
38 | else | ||
39 | { | ||
40 | pssList = pss; | ||
41 | } | ||
42 | |||
43 | return pssList; | ||
44 | } | ||
45 | |||
46 | |||
47 | SCA_SMB_EX_USER_PERMS* AddExUserPermsSmbToList( | ||
48 | SCA_SMB_EX_USER_PERMS* pExUserPermsList, | ||
49 | SCA_SMB_EX_USER_PERMS* pExUserPerms | ||
50 | ) | ||
51 | { | ||
52 | SCA_SMB_EX_USER_PERMS* pExUserPermsTemp = pExUserPermsList; | ||
53 | if (pExUserPermsList) | ||
54 | { | ||
55 | while (pExUserPermsTemp->pExUserPermsNext) | ||
56 | { | ||
57 | pExUserPermsTemp = pExUserPermsTemp->pExUserPermsNext; | ||
58 | } | ||
59 | |||
60 | pExUserPermsTemp->pExUserPermsNext = pExUserPerms; | ||
61 | } | ||
62 | else | ||
63 | { | ||
64 | pExUserPermsList = pExUserPerms; | ||
65 | } | ||
66 | |||
67 | return pExUserPermsList; | ||
68 | } | ||
69 | |||
70 | void ScaSmbFreeList(SCA_SMB* pssList) | ||
71 | { | ||
72 | SCA_SMB* pssDelete = pssList; | ||
73 | while (pssList) | ||
74 | { | ||
75 | pssDelete = pssList; | ||
76 | pssList = pssList->pssNext; | ||
77 | |||
78 | MemFree(pssDelete); | ||
79 | } | ||
80 | } | ||
81 | |||
82 | void ScaExUserPermsSmbFreeList(SCA_SMB_EX_USER_PERMS* pExUserPermsList) | ||
83 | { | ||
84 | SCA_SMB_EX_USER_PERMS* pExUserPermsDelete = pExUserPermsList; | ||
85 | while (pExUserPermsList) | ||
86 | { | ||
87 | pExUserPermsDelete = pExUserPermsList; | ||
88 | pExUserPermsList = pExUserPermsList->pExUserPermsNext; | ||
89 | |||
90 | MemFree(pExUserPermsDelete); | ||
91 | } | ||
92 | } | ||
93 | |||
94 | // sql query constants | ||
95 | LPCWSTR vcsSmbQuery = L"SELECT `Wix4FileShare`, `ShareName`, `Description`, `Directory_`, " | ||
96 | L"`Component_`, `User_`, `Permissions` FROM `Wix4FileShare`"; | ||
97 | |||
98 | enum eSmbQuery { | ||
99 | ssqFileShare = 1, | ||
100 | ssqShareName, | ||
101 | ssqDescription, | ||
102 | ssqDirectory, | ||
103 | ssqComponent, | ||
104 | ssqUser, | ||
105 | ssqPermissions | ||
106 | }; | ||
107 | |||
108 | |||
109 | /******************************************************************** | ||
110 | ScaSmbRead - read all of the information from the msi tables and | ||
111 | return a list of file share jobs to be done. | ||
112 | |||
113 | ********************************************************************/ | ||
114 | HRESULT ScaSmbRead(SCA_SMB** ppssList) | ||
115 | { | ||
116 | HRESULT hr = S_OK; | ||
117 | UINT er = ERROR_SUCCESS; | ||
118 | PMSIHANDLE hView, hRec; | ||
119 | |||
120 | LPWSTR pwzData = NULL; | ||
121 | |||
122 | SCA_SMB* pss = NULL; | ||
123 | BOOL bUserPermissionsTableExists = FALSE; | ||
124 | |||
125 | if (S_OK != WcaTableExists(L"Wix4FileShare")) | ||
126 | { | ||
127 | WcaLog(LOGMSG_VERBOSE, "Skipping ScaSmbCreateShare() - Wix4FileShare table not present"); | ||
128 | ExitFunction1(hr = S_FALSE); | ||
129 | } | ||
130 | |||
131 | if (S_OK == WcaTableExists(L"Wix4FileSharePermissions")) | ||
132 | { | ||
133 | bUserPermissionsTableExists = TRUE; | ||
134 | } | ||
135 | else | ||
136 | { | ||
137 | WcaLog(LOGMSG_VERBOSE, "No Additional Permissions - Wix4FileSharePermissions table not present"); | ||
138 | } | ||
139 | |||
140 | WcaLog(LOGMSG_VERBOSE, "Reading File Share Tables"); | ||
141 | |||
142 | // loop through all the fileshares | ||
143 | hr = WcaOpenExecuteView(vcsSmbQuery, &hView); | ||
144 | ExitOnFailure(hr, "Failed to open view on Wix4FileShare table"); | ||
145 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
146 | { | ||
147 | pss = NewSmb(); | ||
148 | if (!pss) | ||
149 | { | ||
150 | hr = E_OUTOFMEMORY; | ||
151 | break; | ||
152 | } | ||
153 | Assert(pss); | ||
154 | ::ZeroMemory(pss, sizeof(*pss)); | ||
155 | |||
156 | hr = WcaGetRecordString(hRec, ssqFileShare, &pwzData); | ||
157 | ExitOnFailure(hr, "Failed to get Wix4FileShare.Wix4FileShare"); | ||
158 | hr = ::StringCchCopyW(pss->wzId, countof(pss->wzId), pwzData); | ||
159 | ExitOnFailure(hr, "Failed to copy ID string to smb object"); | ||
160 | |||
161 | hr = WcaGetRecordFormattedString(hRec, ssqShareName, &pwzData); | ||
162 | ExitOnFailure(hr, "Failed to get Wix4FileShare.ShareName"); | ||
163 | hr = ::StringCchCopyW(pss->wzShareName, countof(pss->wzShareName), pwzData); | ||
164 | ExitOnFailure(hr, "Failed to copy share name string to smb object"); | ||
165 | |||
166 | hr = WcaGetRecordString(hRec, ssqComponent, &pwzData); | ||
167 | ExitOnFailure(hr, "Failed to get Component for Wix4FileShare: '%ls'", pss->wzShareName); | ||
168 | hr = ::StringCchCopyW(pss->wzComponent, countof(pss->wzComponent), pwzData); | ||
169 | ExitOnFailure(hr, "Failed to copy component string to smb object"); | ||
170 | |||
171 | hr = WcaGetRecordFormattedString(hRec, ssqDescription, &pwzData); | ||
172 | ExitOnFailure(hr, "Failed to get Share Description for Wix4FileShare: '%ls'", pss->wzShareName); | ||
173 | hr = ::StringCchCopyW(pss->wzDescription, countof(pss->wzDescription), pwzData); | ||
174 | ExitOnFailure(hr, "Failed to copy description string to smb object"); | ||
175 | |||
176 | // get user info from the user table | ||
177 | hr = WcaGetRecordFormattedString(hRec, ssqUser, &pwzData); | ||
178 | ExitOnFailure(hr, "Failed to get Wix4User record for Wix4FileShare: '%ls'", pss->wzShareName); | ||
179 | |||
180 | // get component install state | ||
181 | er = ::MsiGetComponentStateW(WcaGetInstallHandle(), pss->wzComponent, &pss->isInstalled, &pss->isAction); | ||
182 | hr = HRESULT_FROM_WIN32(er); | ||
183 | ExitOnFailure(hr, "Failed to get Component state for Wix4FileShare"); | ||
184 | |||
185 | // if a user was specified | ||
186 | if (*pwzData) | ||
187 | { | ||
188 | pss->fUseIntegratedAuth = FALSE; | ||
189 | pss->fLegacyUserProvided = TRUE; | ||
190 | hr = ScaGetUser(pwzData, &pss->scau); | ||
191 | ExitOnFailure(hr, "Failed to get user information for fileshare: '%ls'", pss->wzShareName); | ||
192 | } | ||
193 | else | ||
194 | { | ||
195 | pss->fLegacyUserProvided = FALSE; | ||
196 | // TODO: figure out whether this is useful still | ||
197 | //pss->fUseIntegratedAuth = TRUE; | ||
198 | // integrated authorization doesn't have a User record | ||
199 | } | ||
200 | |||
201 | // get the share's directory | ||
202 | hr = WcaGetRecordString(hRec, ssqDirectory, &pwzData); | ||
203 | ExitOnFailure(hr, "Failed to get directory for Wix4FileShare: '%ls'", pss->wzShareName); | ||
204 | |||
205 | WCHAR wzPath[MAX_PATH]; | ||
206 | DWORD dwLen; | ||
207 | dwLen = countof(wzPath); | ||
208 | // review: relevant for file shares? | ||
209 | if (INSTALLSTATE_SOURCE == pss->isAction) | ||
210 | { | ||
211 | er = ::MsiGetSourcePathW(WcaGetInstallHandle(), pwzData, wzPath, &dwLen); | ||
212 | } | ||
213 | else | ||
214 | { | ||
215 | er = ::MsiGetTargetPathW(WcaGetInstallHandle(), pwzData, wzPath, &dwLen); | ||
216 | } | ||
217 | hr = HRESULT_FROM_WIN32(er); | ||
218 | ExitOnFailure(hr, "Failed to get Source/TargetPath for Directory"); | ||
219 | |||
220 | // If the path is to the root of a drive, then it needs a trailing backslash. | ||
221 | // Otherwise, it can't have a trailing backslash. | ||
222 | if (3 < dwLen) | ||
223 | { | ||
224 | if (wzPath[dwLen - 1] == L'\\') | ||
225 | { | ||
226 | wzPath[dwLen - 1] = 0; | ||
227 | } | ||
228 | } | ||
229 | else if (2 == dwLen && wzPath[1] == L':') | ||
230 | { | ||
231 | wzPath[2] = L'\\'; | ||
232 | wzPath[3] = 0; | ||
233 | } | ||
234 | |||
235 | hr = ::StringCchCopyW(pss->wzDirectory, countof(pss->wzDirectory), wzPath); | ||
236 | ExitOnFailure(hr, "Failed to copy directory string to smb object"); | ||
237 | |||
238 | hr = WcaGetRecordInteger(hRec, ssqPermissions, &pss->nPermissions); | ||
239 | ExitOnFailure(hr, "Failed to get Wix4FileShare.Permissions"); | ||
240 | |||
241 | // Check to see if additional user & permissions are specified for this share | ||
242 | if (bUserPermissionsTableExists) | ||
243 | { | ||
244 | hr = ScaSmbExPermsRead(pss); | ||
245 | ExitOnFailure(hr, "Failed to get Additional File Share Permissions"); | ||
246 | } | ||
247 | |||
248 | *ppssList = AddSmbToList(*ppssList, pss); | ||
249 | pss = NULL; // set the smb NULL so it doesn't accidentally get freed below | ||
250 | } | ||
251 | |||
252 | if (E_NOMOREITEMS == hr) | ||
253 | { | ||
254 | hr = S_OK; | ||
255 | } | ||
256 | ExitOnFailure(hr, "Failure occured while processing Wix4FileShare table"); | ||
257 | |||
258 | LExit: | ||
259 | // if anything was left over after an error clean it all up | ||
260 | if (pss) | ||
261 | { | ||
262 | ScaSmbFreeList(pss); | ||
263 | } | ||
264 | |||
265 | ReleaseStr(pwzData); | ||
266 | |||
267 | return hr; | ||
268 | } | ||
269 | |||
270 | |||
271 | /******************************************************************** | ||
272 | RetrieveSMBShareUserPermList - retrieve SMB Share's user permission list | ||
273 | |||
274 | ********************************************************************/ | ||
275 | HRESULT RetrieveFileShareUserPerm(SCA_SMB* pss, SCA_SMB_EX_USER_PERMS** ppExUserPermsList, DWORD *pUserPermsCount) | ||
276 | { | ||
277 | HRESULT hr = S_OK; | ||
278 | SHARE_INFO_502* psi = NULL; | ||
279 | NET_API_STATUS s; | ||
280 | BOOL bValid, bDaclDefaulted; | ||
281 | PACL acl = NULL; | ||
282 | PEXPLICIT_ACCESSW pEA = NULL; | ||
283 | ULONG nCount = 0; | ||
284 | DWORD er = ERROR_SUCCESS; | ||
285 | PSID pSID = NULL; | ||
286 | DWORD nUserNameSize = MAX_DARWIN_COLUMN; | ||
287 | DWORD nDomainNameSize = MAX_DARWIN_COLUMN; | ||
288 | SID_NAME_USE peUse; | ||
289 | DWORD dwCounter = 0; | ||
290 | SCA_SMB_EX_USER_PERMS* pExUserPermsList = NULL; | ||
291 | DWORD dwUserPermsCount = 0; | ||
292 | |||
293 | *pUserPermsCount = 0; | ||
294 | s = ::NetShareGetInfo(NULL, pss->wzShareName, 502, (LPBYTE*)&psi); | ||
295 | WcaLog(LOGMSG_VERBOSE, "retrieving permissions on existing file share."); | ||
296 | if (NERR_NetNameNotFound == s) | ||
297 | { | ||
298 | WcaLog(LOGMSG_VERBOSE, "File share has already been removed."); | ||
299 | ExitFunction1(hr = S_OK); | ||
300 | } | ||
301 | else if (NERR_Success != s || psi == NULL) | ||
302 | { | ||
303 | hr = E_FAIL; | ||
304 | ExitOnFailure(hr, "Failed to get share information with return code: %d", s); | ||
305 | } | ||
306 | if (!::GetSecurityDescriptorDacl(psi->shi502_security_descriptor, &bValid, &acl, &bDaclDefaulted) || !bValid) | ||
307 | { | ||
308 | ExitOnLastError(hr, "Failed to get acl from security descriptor"); | ||
309 | } | ||
310 | |||
311 | er = ::GetExplicitEntriesFromAclW(acl, &nCount, &pEA); | ||
312 | hr = HRESULT_FROM_WIN32(er); | ||
313 | ExitOnFailure(hr, "Failed to get access entries from acl for file share %ls", pss->wzShareName); | ||
314 | for (dwCounter = 0; dwCounter < nCount; ++dwCounter) | ||
315 | { | ||
316 | if (TRUSTEE_IS_SID == pEA[dwCounter].Trustee.TrusteeForm) | ||
317 | { | ||
318 | SCA_SMB_EX_USER_PERMS* pExUserPerms = NewExUserPermsSmb(); | ||
319 | ::ZeroMemory(pExUserPerms, sizeof(*pExUserPerms)); | ||
320 | pExUserPermsList = AddExUserPermsSmbToList(pExUserPermsList, pExUserPerms); | ||
321 | pSID = (PSID)(pEA[dwCounter].Trustee.ptstrName); | ||
322 | if (!::LookupAccountSidW(NULL, pSID, pExUserPerms->scau.wzName, &nUserNameSize, pExUserPerms->scau.wzDomain, &nDomainNameSize, &peUse)) | ||
323 | { | ||
324 | hr = E_FAIL; | ||
325 | ExitOnFailure(hr, "Failed to get account name from SID"); | ||
326 | } | ||
327 | pExUserPerms->nPermissions = pEA[dwCounter].grfAccessPermissions; | ||
328 | pExUserPerms->accessMode = pEA[dwCounter].grfAccessMode; | ||
329 | ++dwUserPermsCount; | ||
330 | nUserNameSize = MAX_DARWIN_COLUMN; | ||
331 | nDomainNameSize = MAX_DARWIN_COLUMN; | ||
332 | } | ||
333 | } | ||
334 | *ppExUserPermsList = pExUserPermsList; | ||
335 | *pUserPermsCount = dwUserPermsCount; | ||
336 | |||
337 | LExit: | ||
338 | if (psi) | ||
339 | { | ||
340 | ::NetApiBufferFree(psi); | ||
341 | } | ||
342 | |||
343 | if (pEA) | ||
344 | { | ||
345 | ::LocalFree(pEA); | ||
346 | } | ||
347 | |||
348 | return hr; | ||
349 | } | ||
350 | |||
351 | |||
352 | /******************************************************************** | ||
353 | SchedCreateSmb - schedule one instance of a file share creation | ||
354 | |||
355 | ********************************************************************/ | ||
356 | HRESULT SchedCreateSmb(SCA_SMB* pss) | ||
357 | { | ||
358 | HRESULT hr = S_OK; | ||
359 | |||
360 | WCHAR wzDomainUser[255]; // "domain\user" | ||
361 | SCA_SMB_EX_USER_PERMS* pExUserPermsList = NULL; | ||
362 | int nCounter = 0; | ||
363 | WCHAR* pwzRollbackCustomActionData = NULL; | ||
364 | WCHAR* pwzCustomActionData = NULL; | ||
365 | |||
366 | hr = WcaWriteStringToCaData(pss->wzShareName, &pwzRollbackCustomActionData); | ||
367 | ExitOnFailure(hr, "failed to add ShareName to CustomActionData"); | ||
368 | |||
369 | hr = WcaWriteStringToCaData(pss->wzShareName, &pwzCustomActionData); | ||
370 | ExitOnFailure(hr, "failed to add ShareName to CustomActionData"); | ||
371 | |||
372 | hr = WcaWriteStringToCaData(pss->wzDescription, &pwzCustomActionData); | ||
373 | ExitOnFailure(hr, "Failed to add server name to CustomActionData"); | ||
374 | |||
375 | hr = WcaWriteStringToCaData(pss->wzDirectory, &pwzCustomActionData); | ||
376 | ExitOnFailure(hr, "Failed to add full path instance to CustomActionData"); | ||
377 | |||
378 | hr = WcaWriteStringToCaData(pss->fUseIntegratedAuth ? L"1" : L"0", &pwzCustomActionData); | ||
379 | ExitOnFailure(hr, "Failed to add server name to CustomActionData"); | ||
380 | |||
381 | if (pss->fLegacyUserProvided) | ||
382 | { | ||
383 | hr = WcaWriteIntegerToCaData(pss->nUserPermissionCount + 1, &pwzCustomActionData); | ||
384 | ExitOnFailure(hr, "Failed to add additional user permission count to CustomActionData"); | ||
385 | |||
386 | hr = UserBuildDomainUserName(wzDomainUser, countof(wzDomainUser), pss->scau.wzName, pss->scau.wzDomain); | ||
387 | ExitOnFailure(hr, "Failed to build user and domain name for CustomActionData"); | ||
388 | hr = WcaWriteStringToCaData(wzDomainUser, &pwzCustomActionData); | ||
389 | ExitOnFailure(hr, "Failed to add server Domain\\UserName to CustomActionData"); | ||
390 | |||
391 | hr = WcaWriteIntegerToCaData(pss->nPermissions, &pwzCustomActionData); | ||
392 | ExitOnFailure(hr, "Failed to add permissions to CustomActionData"); | ||
393 | } | ||
394 | else | ||
395 | { | ||
396 | hr = WcaWriteIntegerToCaData(pss->nUserPermissionCount, &pwzCustomActionData); | ||
397 | ExitOnFailure(hr, "Failed to add additional user permission count to CustomActionData"); | ||
398 | } | ||
399 | |||
400 | if (pss->nUserPermissionCount > 0) | ||
401 | { | ||
402 | nCounter = 0; | ||
403 | for (pExUserPermsList = pss->pExUserPerms; pExUserPermsList; pExUserPermsList = pExUserPermsList->pExUserPermsNext) | ||
404 | { | ||
405 | Assert(nCounter < pss->nUserPermissionCount); | ||
406 | |||
407 | hr = UserBuildDomainUserName(wzDomainUser, countof(wzDomainUser), pExUserPermsList->scau.wzName, pExUserPermsList->scau.wzDomain); | ||
408 | ExitOnFailure(hr, "Failed to build user and domain name for CustomActionData"); | ||
409 | hr = WcaWriteStringToCaData(wzDomainUser, &pwzCustomActionData); | ||
410 | ExitOnFailure(hr, "Failed to add server Domain\\UserName to CustomActionData"); | ||
411 | |||
412 | hr = WcaWriteIntegerToCaData((int)pExUserPermsList->accessMode, &pwzCustomActionData); | ||
413 | ExitOnFailure(hr, "Failed to add access mode to CustomActionData"); | ||
414 | |||
415 | hr = WcaWriteIntegerToCaData(pExUserPermsList->nPermissions, &pwzCustomActionData); | ||
416 | ExitOnFailure(hr, "Failed to add permissions to CustomActionData"); | ||
417 | ++nCounter; | ||
418 | } | ||
419 | Assert(nCounter == pss->nUserPermissionCount); | ||
420 | } | ||
421 | |||
422 | // Schedule the rollback first | ||
423 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"CreateSmbRollback"), pwzRollbackCustomActionData, COST_SMB_DROPSMB); | ||
424 | ExitOnFailure(hr, "Failed to schedule DropSmb action"); | ||
425 | |||
426 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"CreateSmb"), pwzCustomActionData, COST_SMB_CREATESMB); | ||
427 | ExitOnFailure(hr, "Failed to schedule CreateSmb action"); | ||
428 | |||
429 | LExit: | ||
430 | ReleaseStr(pwzRollbackCustomActionData); | ||
431 | ReleaseStr(pwzCustomActionData); | ||
432 | |||
433 | if (pExUserPermsList) | ||
434 | { | ||
435 | ScaExUserPermsSmbFreeList(pExUserPermsList); | ||
436 | } | ||
437 | |||
438 | return hr; | ||
439 | } | ||
440 | |||
441 | |||
442 | /******************************************************************** | ||
443 | ScaSmbInstall - for every file share, schedule the create custom action | ||
444 | |||
445 | ********************************************************************/ | ||
446 | HRESULT ScaSmbInstall(SCA_SMB* pssList) | ||
447 | { | ||
448 | HRESULT hr = S_FALSE; // assume nothing will be done | ||
449 | SCA_SMB* pss = NULL; | ||
450 | |||
451 | for (pss = pssList; pss; pss = pss->pssNext) | ||
452 | { | ||
453 | // if installing this component | ||
454 | if (WcaIsInstalling(pss->isInstalled, pss->isAction) ) | ||
455 | { | ||
456 | hr = SchedCreateSmb(pss); | ||
457 | ExitOnFailure(hr, "Failed to schedule the creation of the fileshare: %ls", pss->wzShareName); | ||
458 | } | ||
459 | } | ||
460 | |||
461 | LExit: | ||
462 | return hr; | ||
463 | } | ||
464 | |||
465 | |||
466 | /******************************************************************** | ||
467 | SchedDropSmb - schedule one instance of a file share removal | ||
468 | |||
469 | ********************************************************************/ | ||
470 | HRESULT SchedDropSmb(SCA_SMB* pss) | ||
471 | { | ||
472 | HRESULT hr = S_OK; | ||
473 | |||
474 | WCHAR* pwzCustomActionData = NULL; | ||
475 | WCHAR* pwzRollbackCustomActionData = NULL; | ||
476 | SCA_SMB_EX_USER_PERMS *pExUserPermsList = NULL; | ||
477 | SCA_SMB_EX_USER_PERMS *pExUserPerm = NULL; | ||
478 | WCHAR wzDomainUser[255]; // "domain\user" | ||
479 | DWORD dwUserPermsCount = 0; | ||
480 | |||
481 | // roll back DropSmb | ||
482 | hr = WcaWriteStringToCaData(pss->wzShareName, &pwzRollbackCustomActionData); | ||
483 | ExitOnFailure(hr, "failed to add ShareName to CustomActionData"); | ||
484 | |||
485 | hr = WcaWriteStringToCaData(pss->wzDescription, &pwzRollbackCustomActionData); | ||
486 | ExitOnFailure(hr, "Failed to add server name to CustomActionData"); | ||
487 | |||
488 | hr = WcaWriteStringToCaData(pss->wzDirectory, &pwzRollbackCustomActionData); | ||
489 | ExitOnFailure(hr, "Failed to add full path instance to CustomActionData"); | ||
490 | |||
491 | hr = WcaWriteStringToCaData(L"1", &pwzRollbackCustomActionData); | ||
492 | ExitOnFailure(hr, "Failed to add useintegrated flag to CustomActionData"); | ||
493 | |||
494 | hr = RetrieveFileShareUserPerm(pss, &pExUserPermsList, &dwUserPermsCount); | ||
495 | ExitOnFailure(hr, "Failed to retrieve SMBShare's user permissions"); | ||
496 | |||
497 | hr = WcaWriteIntegerToCaData((int)dwUserPermsCount, &pwzRollbackCustomActionData); | ||
498 | ExitOnFailure(hr, "Failed to add additional user permission count to CustomActionData"); | ||
499 | |||
500 | for (pExUserPerm = pExUserPermsList; pExUserPerm; pExUserPerm = pExUserPerm->pExUserPermsNext) | ||
501 | { | ||
502 | hr = UserBuildDomainUserName(wzDomainUser, countof(wzDomainUser), pExUserPerm->scau.wzName, pExUserPerm->scau.wzDomain); | ||
503 | ExitOnFailure(hr, "Failed to build user and domain name for CustomActionData"); | ||
504 | hr = WcaWriteStringToCaData(wzDomainUser, &pwzRollbackCustomActionData); | ||
505 | ExitOnFailure(hr, "Failed to add server Domain\\UserName to CustomActionData"); | ||
506 | |||
507 | hr = WcaWriteIntegerToCaData((int)pExUserPerm->accessMode, &pwzRollbackCustomActionData); | ||
508 | ExitOnFailure(hr, "Failed to add access mode to CustomActionData"); | ||
509 | |||
510 | hr = WcaWriteIntegerToCaData(pExUserPerm->nPermissions, &pwzRollbackCustomActionData); | ||
511 | ExitOnFailure(hr, "Failed to add permissions to CustomActionData"); | ||
512 | } | ||
513 | |||
514 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"DropSmbRollback"), pwzRollbackCustomActionData, COST_SMB_CREATESMB); | ||
515 | ExitOnFailure(hr, "Failed to schedule DropSmbRollback action"); | ||
516 | |||
517 | // DropSMB | ||
518 | hr = WcaWriteStringToCaData(pss->wzShareName, &pwzCustomActionData); | ||
519 | ExitOnFailure(hr, "failed to add ShareName to CustomActionData"); | ||
520 | |||
521 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"DropSmb"), pwzCustomActionData, COST_SMB_DROPSMB); | ||
522 | ExitOnFailure(hr, "Failed to schedule DropSmb action"); | ||
523 | |||
524 | LExit: | ||
525 | ReleaseStr(pwzCustomActionData); | ||
526 | |||
527 | if (pExUserPermsList) | ||
528 | { | ||
529 | ScaExUserPermsSmbFreeList(pExUserPermsList); | ||
530 | } | ||
531 | |||
532 | return hr; | ||
533 | |||
534 | } | ||
535 | |||
536 | |||
537 | /******************************************************************** | ||
538 | ScaSmbUninstall - for every file share, schedule the drop custom action | ||
539 | |||
540 | ********************************************************************/ | ||
541 | HRESULT ScaSmbUninstall(SCA_SMB* pssList) | ||
542 | { | ||
543 | HRESULT hr = S_FALSE; // assume nothing will be done | ||
544 | SCA_SMB* pss = NULL; | ||
545 | |||
546 | for (pss = pssList; pss; pss = pss->pssNext) | ||
547 | { | ||
548 | // if uninstalling this component | ||
549 | if (WcaIsUninstalling(pss->isInstalled, pss->isAction) ) | ||
550 | { | ||
551 | hr = SchedDropSmb(pss); | ||
552 | ExitOnFailure(hr, "Failed to remove file share %ls", pss->wzShareName); | ||
553 | } | ||
554 | } | ||
555 | |||
556 | LExit: | ||
557 | return hr; | ||
558 | } | ||
559 | |||
560 | LPCWSTR vcsSmbExUserPermsQuery = L"SELECT `FileShare_`,`User_`,`Permissions` " | ||
561 | L"FROM `Wix4FileSharePermissions` WHERE `FileShare_`=?"; | ||
562 | |||
563 | enum eSmbUserPermsQuery { | ||
564 | ssupqFileShare = 1, | ||
565 | ssupqUser, | ||
566 | ssupqPermissions | ||
567 | |||
568 | }; | ||
569 | |||
570 | |||
571 | /******************************************************************** | ||
572 | ScaSmbExPermsRead - for Every entry in File Permissions table add a | ||
573 | User Name & Permissions structure to the List | ||
574 | |||
575 | ********************************************************************/ | ||
576 | HRESULT ScaSmbExPermsRead(SCA_SMB* pss) | ||
577 | { | ||
578 | HRESULT hr = S_OK; | ||
579 | PMSIHANDLE hView, hRec; | ||
580 | |||
581 | LPWSTR pwzData = NULL; | ||
582 | SCA_SMB_EX_USER_PERMS* pExUserPermsList = pss->pExUserPerms; | ||
583 | SCA_SMB_EX_USER_PERMS* pExUserPerms = NULL; | ||
584 | int nCounter = 0; | ||
585 | |||
586 | hRec = ::MsiCreateRecord(1); | ||
587 | hr = WcaSetRecordString(hRec, 1, pss->wzId); | ||
588 | ExitOnFailure(hr, "Failed to look up FileShare"); | ||
589 | |||
590 | hr = WcaOpenView(vcsSmbExUserPermsQuery, &hView); | ||
591 | ExitOnFailure(hr, "Failed to open view on Wix4FileSharePermissions table"); | ||
592 | hr = WcaExecuteView(hView, hRec); | ||
593 | ExitOnFailure(hr, "Failed to execute view on Wix4FileSharePermissions table"); | ||
594 | |||
595 | // loop through all User/Permissions paris returned | ||
596 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
597 | { | ||
598 | pExUserPerms = NewExUserPermsSmb(); | ||
599 | if (!pExUserPerms) | ||
600 | { | ||
601 | hr = E_OUTOFMEMORY; | ||
602 | break; | ||
603 | } | ||
604 | Assert(pExUserPerms); | ||
605 | ::ZeroMemory(pExUserPerms, sizeof(*pExUserPerms)); | ||
606 | |||
607 | hr = WcaGetRecordString(hRec, ssupqUser, &pwzData); | ||
608 | ExitOnFailure(hr, "Failed to get Wix4FileSharePermissions.User"); | ||
609 | hr = ScaGetUser(pwzData, &pExUserPerms->scau); | ||
610 | ExitOnFailure(hr, "Failed to get user information for fileshare: '%ls'", pss->wzShareName); | ||
611 | |||
612 | hr = WcaGetRecordInteger(hRec, ssupqPermissions, &pExUserPerms->nPermissions); | ||
613 | ExitOnFailure(hr, "Failed to get Wix4FileSharePermissions.Permissions"); | ||
614 | pExUserPerms->accessMode = SET_ACCESS; // we only support SET_ACCESS here | ||
615 | |||
616 | pExUserPermsList = AddExUserPermsSmbToList(pExUserPermsList, pExUserPerms); | ||
617 | ++nCounter; | ||
618 | pExUserPerms = NULL; // set the smb NULL so it doesn't accidentally get freed below | ||
619 | } | ||
620 | |||
621 | if (E_NOMOREITEMS == hr) | ||
622 | { | ||
623 | hr = S_OK; | ||
624 | pss->pExUserPerms = pExUserPermsList; | ||
625 | pss->nUserPermissionCount = nCounter; | ||
626 | } | ||
627 | ExitOnFailure(hr, "Failure occured while processing FileShare table"); | ||
628 | |||
629 | LExit: | ||
630 | // if anything was left over after an error clean it all up | ||
631 | if (pExUserPerms) | ||
632 | { | ||
633 | ScaExUserPermsSmbFreeList(pExUserPerms); | ||
634 | } | ||
635 | |||
636 | ReleaseStr(pwzData); | ||
637 | |||
638 | return hr; | ||
639 | } | ||
diff --git a/src/ext/Util/ca/scauser.cpp b/src/ext/Util/ca/scauser.cpp new file mode 100644 index 00000000..b25e9daf --- /dev/null +++ b/src/ext/Util/ca/scauser.cpp | |||
@@ -0,0 +1,709 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | LPCWSTR vcsUserQuery = L"SELECT `Wix4User`, `Component_`, `Name`, `Domain`, `Password` FROM `Wix4User` WHERE `Wix4User`=?"; | ||
6 | enum eUserQuery { vuqUser = 1, vuqComponent, vuqName, vuqDomain, vuqPassword }; | ||
7 | |||
8 | LPCWSTR vcsGroupQuery = L"SELECT `Wix4Group`, `Component_`, `Name`, `Domain` FROM `Wix4Group` WHERE `Wix4Group`=?"; | ||
9 | enum eGroupQuery { vgqGroup = 1, vgqComponent, vgqName, vgqDomain }; | ||
10 | |||
11 | LPCWSTR vcsUserGroupQuery = L"SELECT `Wix4User_`, `Wix4Group_` FROM `Wix4UserGroup` WHERE `Wix4User_`=?"; | ||
12 | enum eUserGroupQuery { vugqUser = 1, vugqGroup }; | ||
13 | |||
14 | LPCWSTR vActionableQuery = L"SELECT `Wix4User`,`Component_`,`Name`,`Domain`,`Password`,`Attributes` FROM `Wix4User` WHERE `Component_` IS NOT NULL"; | ||
15 | enum eActionableQuery { vaqUser = 1, vaqComponent, vaqName, vaqDomain, vaqPassword, vaqAttributes }; | ||
16 | |||
17 | |||
18 | static HRESULT AddUserToList( | ||
19 | __inout SCA_USER** ppsuList | ||
20 | ); | ||
21 | |||
22 | static HRESULT AddGroupToList( | ||
23 | __inout SCA_GROUP** ppsgList | ||
24 | ); | ||
25 | |||
26 | |||
27 | HRESULT __stdcall ScaGetUser( | ||
28 | __in LPCWSTR wzUser, | ||
29 | __out SCA_USER* pscau | ||
30 | ) | ||
31 | { | ||
32 | if (!wzUser || !pscau) | ||
33 | { | ||
34 | return E_INVALIDARG; | ||
35 | } | ||
36 | |||
37 | HRESULT hr = S_OK; | ||
38 | PMSIHANDLE hView, hRec; | ||
39 | |||
40 | LPWSTR pwzData = NULL; | ||
41 | |||
42 | // clear struct and bail right away if no user key was passed to search for | ||
43 | ::ZeroMemory(pscau, sizeof(*pscau)); | ||
44 | if (!*wzUser) | ||
45 | { | ||
46 | ExitFunction1(hr = S_OK); | ||
47 | } | ||
48 | |||
49 | hRec = ::MsiCreateRecord(1); | ||
50 | hr = WcaSetRecordString(hRec, 1, wzUser); | ||
51 | ExitOnFailure(hr, "Failed to look up User"); | ||
52 | |||
53 | hr = WcaOpenView(vcsUserQuery, &hView); | ||
54 | ExitOnFailure(hr, "Failed to open view on Wix4User table"); | ||
55 | hr = WcaExecuteView(hView, hRec); | ||
56 | ExitOnFailure(hr, "Failed to execute view on Wix4User table"); | ||
57 | |||
58 | hr = WcaFetchSingleRecord(hView, &hRec); | ||
59 | if (S_OK == hr) | ||
60 | { | ||
61 | hr = WcaGetRecordString(hRec, vuqUser, &pwzData); | ||
62 | ExitOnFailure(hr, "Failed to get Wix4User.User"); | ||
63 | hr = ::StringCchCopyW(pscau->wzKey, countof(pscau->wzKey), pwzData); | ||
64 | ExitOnFailure(hr, "Failed to copy key string to user object"); | ||
65 | |||
66 | hr = WcaGetRecordString(hRec, vuqComponent, &pwzData); | ||
67 | ExitOnFailure(hr, "Failed to get Wix4User.Component_"); | ||
68 | hr = ::StringCchCopyW(pscau->wzComponent, countof(pscau->wzComponent), pwzData); | ||
69 | ExitOnFailure(hr, "Failed to copy component string to user object"); | ||
70 | |||
71 | hr = WcaGetRecordFormattedString(hRec, vuqName, &pwzData); | ||
72 | ExitOnFailure(hr, "Failed to get Wix4User.Name"); | ||
73 | hr = ::StringCchCopyW(pscau->wzName, countof(pscau->wzName), pwzData); | ||
74 | ExitOnFailure(hr, "Failed to copy name string to user object"); | ||
75 | |||
76 | hr = WcaGetRecordFormattedString(hRec, vuqDomain, &pwzData); | ||
77 | ExitOnFailure(hr, "Failed to get Wix4User.Domain"); | ||
78 | hr = ::StringCchCopyW(pscau->wzDomain, countof(pscau->wzDomain), pwzData); | ||
79 | ExitOnFailure(hr, "Failed to copy domain string to user object"); | ||
80 | |||
81 | hr = WcaGetRecordFormattedString(hRec, vuqPassword, &pwzData); | ||
82 | ExitOnFailure(hr, "Failed to get Wix4User.Password"); | ||
83 | hr = ::StringCchCopyW(pscau->wzPassword, countof(pscau->wzPassword), pwzData); | ||
84 | ExitOnFailure(hr, "Failed to copy password string to user object"); | ||
85 | } | ||
86 | else if (E_NOMOREITEMS == hr) | ||
87 | { | ||
88 | WcaLog(LOGMSG_STANDARD, "Error: Cannot locate Wix4User.User='%ls'", wzUser); | ||
89 | hr = E_FAIL; | ||
90 | } | ||
91 | else | ||
92 | { | ||
93 | ExitOnFailure(hr, "Error or found multiple matching Wix4User rows"); | ||
94 | } | ||
95 | |||
96 | LExit: | ||
97 | ReleaseStr(pwzData); | ||
98 | |||
99 | return hr; | ||
100 | } | ||
101 | |||
102 | HRESULT __stdcall ScaGetUserDeferred( | ||
103 | __in LPCWSTR wzUser, | ||
104 | __in WCA_WRAPQUERY_HANDLE hUserQuery, | ||
105 | __out SCA_USER* pscau | ||
106 | ) | ||
107 | { | ||
108 | if (!wzUser || !pscau) | ||
109 | { | ||
110 | return E_INVALIDARG; | ||
111 | } | ||
112 | |||
113 | HRESULT hr = S_OK; | ||
114 | MSIHANDLE hRec, hRecTest; | ||
115 | |||
116 | LPWSTR pwzData = NULL; | ||
117 | |||
118 | // clear struct and bail right away if no user key was passed to search for | ||
119 | ::ZeroMemory(pscau, sizeof(*pscau)); | ||
120 | if (!*wzUser) | ||
121 | { | ||
122 | ExitFunction1(hr = S_OK); | ||
123 | } | ||
124 | |||
125 | // Reset back to the first record | ||
126 | WcaFetchWrappedReset(hUserQuery); | ||
127 | |||
128 | hr = WcaFetchWrappedRecordWhereString(hUserQuery, vuqUser, wzUser, &hRec); | ||
129 | if (S_OK == hr) | ||
130 | { | ||
131 | hr = WcaFetchWrappedRecordWhereString(hUserQuery, vuqUser, wzUser, &hRecTest); | ||
132 | if (S_OK == hr) | ||
133 | { | ||
134 | AssertSz(FALSE, "Found multiple matching Wix4User rows"); | ||
135 | } | ||
136 | |||
137 | hr = WcaGetRecordString(hRec, vuqUser, &pwzData); | ||
138 | ExitOnFailure(hr, "Failed to get Wix4User.User"); | ||
139 | hr = ::StringCchCopyW(pscau->wzKey, countof(pscau->wzKey), pwzData); | ||
140 | ExitOnFailure(hr, "Failed to copy key string to user object (in deferred CA)"); | ||
141 | |||
142 | hr = WcaGetRecordString(hRec, vuqComponent, &pwzData); | ||
143 | ExitOnFailure(hr, "Failed to get Wix4User.Component_"); | ||
144 | hr = ::StringCchCopyW(pscau->wzComponent, countof(pscau->wzComponent), pwzData); | ||
145 | ExitOnFailure(hr, "Failed to copy component string to user object (in deferred CA)"); | ||
146 | |||
147 | hr = WcaGetRecordString(hRec, vuqName, &pwzData); | ||
148 | ExitOnFailure(hr, "Failed to get Wix4User.Name"); | ||
149 | hr = ::StringCchCopyW(pscau->wzName, countof(pscau->wzName), pwzData); | ||
150 | ExitOnFailure(hr, "Failed to copy name string to user object (in deferred CA)"); | ||
151 | |||
152 | hr = WcaGetRecordString(hRec, vuqDomain, &pwzData); | ||
153 | ExitOnFailure(hr, "Failed to get Wix4User.Domain"); | ||
154 | hr = ::StringCchCopyW(pscau->wzDomain, countof(pscau->wzDomain), pwzData); | ||
155 | ExitOnFailure(hr, "Failed to copy domain string to user object (in deferred CA)"); | ||
156 | |||
157 | hr = WcaGetRecordString(hRec, vuqPassword, &pwzData); | ||
158 | ExitOnFailure(hr, "Failed to get Wix4User.Password"); | ||
159 | hr = ::StringCchCopyW(pscau->wzPassword, countof(pscau->wzPassword), pwzData); | ||
160 | ExitOnFailure(hr, "Failed to copy password string to user object (in deferred CA)"); | ||
161 | } | ||
162 | else if (E_NOMOREITEMS == hr) | ||
163 | { | ||
164 | WcaLog(LOGMSG_STANDARD, "Error: Cannot locate Wix4User.User='%ls'", wzUser); | ||
165 | hr = E_FAIL; | ||
166 | } | ||
167 | else | ||
168 | { | ||
169 | ExitOnFailure(hr, "Error fetching single Wix4User row"); | ||
170 | } | ||
171 | |||
172 | LExit: | ||
173 | ReleaseStr(pwzData); | ||
174 | |||
175 | return hr; | ||
176 | } | ||
177 | |||
178 | |||
179 | HRESULT __stdcall ScaGetGroup( | ||
180 | __in LPCWSTR wzGroup, | ||
181 | __out SCA_GROUP* pscag | ||
182 | ) | ||
183 | { | ||
184 | if (!wzGroup || !pscag) | ||
185 | { | ||
186 | return E_INVALIDARG; | ||
187 | } | ||
188 | |||
189 | HRESULT hr = S_OK; | ||
190 | PMSIHANDLE hView, hRec; | ||
191 | |||
192 | LPWSTR pwzData = NULL; | ||
193 | |||
194 | hRec = ::MsiCreateRecord(1); | ||
195 | hr = WcaSetRecordString(hRec, 1, wzGroup); | ||
196 | ExitOnFailure(hr, "Failed to look up Group"); | ||
197 | |||
198 | hr = WcaOpenView(vcsGroupQuery, &hView); | ||
199 | ExitOnFailure(hr, "Failed to open view on Wix4Group table"); | ||
200 | hr = WcaExecuteView(hView, hRec); | ||
201 | ExitOnFailure(hr, "Failed to execute view on Wix4Group table"); | ||
202 | |||
203 | hr = WcaFetchSingleRecord(hView, &hRec); | ||
204 | if (S_OK == hr) | ||
205 | { | ||
206 | hr = WcaGetRecordString(hRec, vgqGroup, &pwzData); | ||
207 | ExitOnFailure(hr, "Failed to get Wix4Group.Wix4Group."); | ||
208 | hr = ::StringCchCopyW(pscag->wzKey, countof(pscag->wzKey), pwzData); | ||
209 | ExitOnFailure(hr, "Failed to copy Wix4Group.Wix4Group."); | ||
210 | |||
211 | hr = WcaGetRecordString(hRec, vgqComponent, &pwzData); | ||
212 | ExitOnFailure(hr, "Failed to get Wix4Group.Component_"); | ||
213 | hr = ::StringCchCopyW(pscag->wzComponent, countof(pscag->wzComponent), pwzData); | ||
214 | ExitOnFailure(hr, "Failed to copy Wix4Group.Component_."); | ||
215 | |||
216 | hr = WcaGetRecordFormattedString(hRec, vgqName, &pwzData); | ||
217 | ExitOnFailure(hr, "Failed to get Wix4Group.Name"); | ||
218 | hr = ::StringCchCopyW(pscag->wzName, countof(pscag->wzName), pwzData); | ||
219 | ExitOnFailure(hr, "Failed to copy Wix4Group.Name."); | ||
220 | |||
221 | hr = WcaGetRecordFormattedString(hRec, vgqDomain, &pwzData); | ||
222 | ExitOnFailure(hr, "Failed to get Wix4Group.Domain"); | ||
223 | hr = ::StringCchCopyW(pscag->wzDomain, countof(pscag->wzDomain), pwzData); | ||
224 | ExitOnFailure(hr, "Failed to copy Wix4Group.Domain."); | ||
225 | } | ||
226 | else if (E_NOMOREITEMS == hr) | ||
227 | { | ||
228 | WcaLog(LOGMSG_STANDARD, "Error: Cannot locate Wix4Group.Wix4Group='%ls'", wzGroup); | ||
229 | hr = E_FAIL; | ||
230 | } | ||
231 | else | ||
232 | { | ||
233 | ExitOnFailure(hr, "Error or found multiple matching Wix4Group rows"); | ||
234 | } | ||
235 | |||
236 | LExit: | ||
237 | ReleaseStr(pwzData); | ||
238 | |||
239 | return hr; | ||
240 | } | ||
241 | |||
242 | |||
243 | void ScaUserFreeList( | ||
244 | __in SCA_USER* psuList | ||
245 | ) | ||
246 | { | ||
247 | SCA_USER* psuDelete = psuList; | ||
248 | while (psuList) | ||
249 | { | ||
250 | psuDelete = psuList; | ||
251 | psuList = psuList->psuNext; | ||
252 | |||
253 | ScaGroupFreeList(psuDelete->psgGroups); | ||
254 | MemFree(psuDelete); | ||
255 | } | ||
256 | } | ||
257 | |||
258 | |||
259 | void ScaGroupFreeList( | ||
260 | __in SCA_GROUP* psgList | ||
261 | ) | ||
262 | { | ||
263 | SCA_GROUP* psgDelete = psgList; | ||
264 | while (psgList) | ||
265 | { | ||
266 | psgDelete = psgList; | ||
267 | psgList = psgList->psgNext; | ||
268 | |||
269 | MemFree(psgDelete); | ||
270 | } | ||
271 | } | ||
272 | |||
273 | |||
274 | HRESULT ScaUserRead( | ||
275 | __out SCA_USER** ppsuList | ||
276 | ) | ||
277 | { | ||
278 | //Assert(FALSE); | ||
279 | Assert(ppsuList); | ||
280 | |||
281 | HRESULT hr = S_OK; | ||
282 | UINT er = ERROR_SUCCESS; | ||
283 | PMSIHANDLE hView, hRec, hUserRec, hUserGroupView; | ||
284 | |||
285 | LPWSTR pwzData = NULL; | ||
286 | |||
287 | BOOL fUserGroupExists = FALSE; | ||
288 | |||
289 | SCA_USER *psu = NULL; | ||
290 | |||
291 | INSTALLSTATE isInstalled, isAction; | ||
292 | |||
293 | if (S_OK != WcaTableExists(L"Wix4User")) | ||
294 | { | ||
295 | WcaLog(LOGMSG_VERBOSE, "Wix4User Table does not exist, exiting"); | ||
296 | ExitFunction1(hr = S_FALSE); | ||
297 | } | ||
298 | |||
299 | if (S_OK == WcaTableExists(L"Wix4UserGroup")) | ||
300 | { | ||
301 | fUserGroupExists = TRUE; | ||
302 | } | ||
303 | |||
304 | // | ||
305 | // loop through all the users | ||
306 | // | ||
307 | hr = WcaOpenExecuteView(vActionableQuery, &hView); | ||
308 | ExitOnFailure(hr, "failed to open view on Wix4User table"); | ||
309 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
310 | { | ||
311 | hr = WcaGetRecordString(hRec, vaqComponent, &pwzData); | ||
312 | ExitOnFailure(hr, "failed to get Wix4User.Component"); | ||
313 | |||
314 | er = ::MsiGetComponentStateW(WcaGetInstallHandle(), pwzData, &isInstalled, &isAction); | ||
315 | hr = HRESULT_FROM_WIN32(er); | ||
316 | ExitOnFailure(hr, "failed to get Component state for Wix4User"); | ||
317 | |||
318 | // don't bother if we aren't installing or uninstalling this component | ||
319 | if (WcaIsInstalling(isInstalled, isAction) || WcaIsUninstalling(isInstalled, isAction)) | ||
320 | { | ||
321 | // | ||
322 | // Add the user to the list and populate it's values | ||
323 | // | ||
324 | hr = AddUserToList(ppsuList); | ||
325 | ExitOnFailure(hr, "failed to add user to list"); | ||
326 | |||
327 | psu = *ppsuList; | ||
328 | |||
329 | psu->isInstalled = isInstalled; | ||
330 | psu->isAction = isAction; | ||
331 | hr = ::StringCchCopyW(psu->wzComponent, countof(psu->wzComponent), pwzData); | ||
332 | ExitOnFailure(hr, "failed to copy component name: %ls", pwzData); | ||
333 | |||
334 | hr = WcaGetRecordString(hRec, vaqUser, &pwzData); | ||
335 | ExitOnFailure(hr, "failed to get Wix4User.User"); | ||
336 | hr = ::StringCchCopyW(psu->wzKey, countof(psu->wzKey), pwzData); | ||
337 | ExitOnFailure(hr, "failed to copy user key: %ls", pwzData); | ||
338 | |||
339 | hr = WcaGetRecordFormattedString(hRec, vaqName, &pwzData); | ||
340 | ExitOnFailure(hr, "failed to get Wix4User.Name"); | ||
341 | hr = ::StringCchCopyW(psu->wzName, countof(psu->wzName), pwzData); | ||
342 | ExitOnFailure(hr, "failed to copy user name: %ls", pwzData); | ||
343 | |||
344 | hr = WcaGetRecordFormattedString(hRec, vaqDomain, &pwzData); | ||
345 | ExitOnFailure(hr, "failed to get Wix4User.Domain"); | ||
346 | hr = ::StringCchCopyW(psu->wzDomain, countof(psu->wzDomain), pwzData); | ||
347 | ExitOnFailure(hr, "failed to copy user domain: %ls", pwzData); | ||
348 | |||
349 | hr = WcaGetRecordFormattedString(hRec, vaqPassword, &pwzData); | ||
350 | ExitOnFailure(hr, "failed to get Wix4User.Password"); | ||
351 | hr = ::StringCchCopyW(psu->wzPassword, countof(psu->wzPassword), pwzData); | ||
352 | ExitOnFailure(hr, "failed to copy user password"); | ||
353 | |||
354 | hr = WcaGetRecordInteger(hRec, vaqAttributes, &psu->iAttributes); | ||
355 | ExitOnFailure(hr, "failed to get Wix4User.Attributes"); | ||
356 | |||
357 | // Check if this user is to be added to any groups | ||
358 | if (fUserGroupExists) | ||
359 | { | ||
360 | hUserRec = ::MsiCreateRecord(1); | ||
361 | hr = WcaSetRecordString(hUserRec, 1, psu->wzKey); | ||
362 | ExitOnFailure(hr, "Failed to create user record for querying Wix4UserGroup table"); | ||
363 | |||
364 | hr = WcaOpenView(vcsUserGroupQuery, &hUserGroupView); | ||
365 | ExitOnFailure(hr, "Failed to open view on Wix4UserGroup table for user %ls", psu->wzKey); | ||
366 | hr = WcaExecuteView(hUserGroupView, hUserRec); | ||
367 | ExitOnFailure(hr, "Failed to execute view on Wix4UserGroup table for user: %ls", psu->wzKey); | ||
368 | |||
369 | while (S_OK == (hr = WcaFetchRecord(hUserGroupView, &hRec))) | ||
370 | { | ||
371 | hr = WcaGetRecordString(hRec, vugqGroup, &pwzData); | ||
372 | ExitOnFailure(hr, "failed to get Wix4UserGroup.Group"); | ||
373 | |||
374 | hr = AddGroupToList(&(psu->psgGroups)); | ||
375 | ExitOnFailure(hr, "failed to add group to list"); | ||
376 | |||
377 | hr = ScaGetGroup(pwzData, psu->psgGroups); | ||
378 | ExitOnFailure(hr, "failed to get information for group: %ls", pwzData); | ||
379 | } | ||
380 | |||
381 | if (E_NOMOREITEMS == hr) | ||
382 | { | ||
383 | hr = S_OK; | ||
384 | } | ||
385 | ExitOnFailure(hr, "failed to enumerate selected rows from Wix4UserGroup table"); | ||
386 | } | ||
387 | } | ||
388 | } | ||
389 | |||
390 | if (E_NOMOREITEMS == hr) | ||
391 | { | ||
392 | hr = S_OK; | ||
393 | } | ||
394 | ExitOnFailure(hr, "failed to enumerate selected rows from Wix4User table"); | ||
395 | |||
396 | LExit: | ||
397 | ReleaseStr(pwzData); | ||
398 | |||
399 | return hr; | ||
400 | } | ||
401 | |||
402 | |||
403 | static HRESULT WriteGroupInfo( | ||
404 | __in SCA_GROUP* psgList, | ||
405 | __in LPWSTR *ppwzActionData | ||
406 | ) | ||
407 | { | ||
408 | HRESULT hr = S_OK; | ||
409 | |||
410 | for (SCA_GROUP* psg = psgList; psg; psg = psg->psgNext) | ||
411 | { | ||
412 | hr = WcaWriteStringToCaData(psg->wzName, ppwzActionData); | ||
413 | ExitOnFailure(hr, "failed to add group name to custom action data: %ls", psg->wzName); | ||
414 | |||
415 | hr = WcaWriteStringToCaData(psg->wzDomain, ppwzActionData); | ||
416 | ExitOnFailure(hr, "failed to add group domain to custom action data: %ls", psg->wzDomain); | ||
417 | } | ||
418 | |||
419 | LExit: | ||
420 | return hr; | ||
421 | } | ||
422 | |||
423 | |||
424 | // Behaves like WriteGroupInfo, but it filters out groups the user is currently a member of, | ||
425 | // because we don't want to rollback those | ||
426 | static HRESULT WriteGroupRollbackInfo( | ||
427 | __in LPCWSTR pwzName, | ||
428 | __in LPCWSTR pwzDomain, | ||
429 | __in SCA_GROUP* psgList, | ||
430 | __in LPWSTR *ppwzActionData | ||
431 | ) | ||
432 | { | ||
433 | HRESULT hr = S_OK; | ||
434 | BOOL fIsMember = FALSE; | ||
435 | |||
436 | for (SCA_GROUP* psg = psgList; psg; psg = psg->psgNext) | ||
437 | { | ||
438 | hr = UserCheckIsMember(pwzName, pwzDomain, psg->wzName, psg->wzDomain, &fIsMember); | ||
439 | if (FAILED(hr)) | ||
440 | { | ||
441 | WcaLog(LOGMSG_VERBOSE, "Failed to check if user: %ls (domain: %ls) is member of a group while collecting rollback information (error code 0x%x) - continuing", pwzName, pwzDomain, hr); | ||
442 | hr = S_OK; | ||
443 | continue; | ||
444 | } | ||
445 | |||
446 | // If the user is currently a member, we don't want to undo that on rollback, so skip adding | ||
447 | // this group record to the list of groups to rollback | ||
448 | if (fIsMember) | ||
449 | { | ||
450 | continue; | ||
451 | } | ||
452 | |||
453 | hr = WcaWriteStringToCaData(psg->wzName, ppwzActionData); | ||
454 | ExitOnFailure(hr, "failed to add group name to custom action data: %ls", psg->wzName); | ||
455 | |||
456 | hr = WcaWriteStringToCaData(psg->wzDomain, ppwzActionData); | ||
457 | ExitOnFailure(hr, "failed to add group domain to custom action data: %ls", psg->wzDomain); | ||
458 | } | ||
459 | |||
460 | LExit: | ||
461 | return hr; | ||
462 | } | ||
463 | |||
464 | |||
465 | /* **************************************************************** | ||
466 | ScaUserExecute - Schedules user account creation or removal based on | ||
467 | component state. | ||
468 | |||
469 | ******************************************************************/ | ||
470 | HRESULT ScaUserExecute( | ||
471 | __in SCA_USER *psuList | ||
472 | ) | ||
473 | { | ||
474 | HRESULT hr = S_OK; | ||
475 | DWORD er = 0; | ||
476 | PDOMAIN_CONTROLLER_INFOW pDomainControllerInfo = NULL; | ||
477 | |||
478 | LPWSTR pwzBaseScriptKey = NULL; | ||
479 | DWORD cScriptKey = 0; | ||
480 | |||
481 | USER_INFO_0 *pUserInfo = NULL; | ||
482 | LPWSTR pwzScriptKey = NULL; | ||
483 | LPWSTR pwzActionData = NULL; | ||
484 | LPWSTR pwzRollbackData = NULL; | ||
485 | |||
486 | // Get the base script key for this CustomAction. | ||
487 | hr = WcaCaScriptCreateKey(&pwzBaseScriptKey); | ||
488 | ExitOnFailure(hr, "Failed to get encoding key."); | ||
489 | |||
490 | // Loop through all the users to be configured. | ||
491 | for (SCA_USER *psu = psuList; psu; psu = psu->psuNext) | ||
492 | { | ||
493 | USER_EXISTS ueUserExists = USER_EXISTS_INDETERMINATE; | ||
494 | |||
495 | // Always put the User Name and Domain plus Attributes on the front of the CustomAction | ||
496 | // data. Sometimes we'll add more data. | ||
497 | Assert(psu->wzName); | ||
498 | hr = WcaWriteStringToCaData(psu->wzName, &pwzActionData); | ||
499 | ExitOnFailure(hr, "Failed to add user name to custom action data: %ls", psu->wzName); | ||
500 | hr = WcaWriteStringToCaData(psu->wzDomain, &pwzActionData); | ||
501 | ExitOnFailure(hr, "Failed to add user domain to custom action data: %ls", psu->wzDomain); | ||
502 | hr = WcaWriteIntegerToCaData(psu->iAttributes, &pwzActionData); | ||
503 | ExitOnFailure(hr, "failed to add user attributes to custom action data for user: %ls", psu->wzKey); | ||
504 | |||
505 | // Check to see if the user already exists since we have to be very careful when adding | ||
506 | // and removing users. Note: MSDN says that it is safe to call these APIs from any | ||
507 | // user, so we should be safe calling it during immediate mode. | ||
508 | er = ::NetApiBufferAllocate(sizeof(USER_INFO_0), reinterpret_cast<LPVOID*>(&pUserInfo)); | ||
509 | hr = HRESULT_FROM_WIN32(er); | ||
510 | ExitOnFailure(hr, "Failed to allocate memory to check existence of user: %ls", psu->wzName); | ||
511 | |||
512 | LPCWSTR wzDomain = psu->wzDomain; | ||
513 | if (wzDomain && *wzDomain) | ||
514 | { | ||
515 | er = ::DsGetDcNameW(NULL, wzDomain, NULL, NULL, NULL, &pDomainControllerInfo); | ||
516 | if (RPC_S_SERVER_UNAVAILABLE == er) | ||
517 | { | ||
518 | // MSDN says, if we get the above error code, try again with the "DS_FORCE_REDISCOVERY" flag | ||
519 | er = ::DsGetDcNameW(NULL, wzDomain, NULL, NULL, DS_FORCE_REDISCOVERY, &pDomainControllerInfo); | ||
520 | } | ||
521 | if (ERROR_SUCCESS == er) | ||
522 | { | ||
523 | wzDomain = pDomainControllerInfo->DomainControllerName + 2; //Add 2 so that we don't get the \\ prefix | ||
524 | } | ||
525 | } | ||
526 | |||
527 | er = ::NetUserGetInfo(wzDomain, psu->wzName, 0, reinterpret_cast<LPBYTE*>(pUserInfo)); | ||
528 | if (NERR_Success == er) | ||
529 | { | ||
530 | ueUserExists = USER_EXISTS_YES; | ||
531 | } | ||
532 | else if (NERR_UserNotFound == er) | ||
533 | { | ||
534 | ueUserExists = USER_EXISTS_NO; | ||
535 | } | ||
536 | else | ||
537 | { | ||
538 | ueUserExists = USER_EXISTS_INDETERMINATE; | ||
539 | hr = HRESULT_FROM_WIN32(er); | ||
540 | WcaLog(LOGMSG_VERBOSE, "Failed to check existence of domain: %ls, user: %ls (error code 0x%x) - continuing", wzDomain, psu->wzName, hr); | ||
541 | hr = S_OK; | ||
542 | er = ERROR_SUCCESS; | ||
543 | } | ||
544 | |||
545 | if (WcaIsInstalling(psu->isInstalled, psu->isAction)) | ||
546 | { | ||
547 | // If the user exists, check to see if we are supposed to fail if user the exists before | ||
548 | // the install. | ||
549 | if (USER_EXISTS_YES == ueUserExists) | ||
550 | { | ||
551 | // Reinstalls will always fail if we don't remove the check for "fail if exists". | ||
552 | if (WcaIsReInstalling(psu->isInstalled, psu->isAction)) | ||
553 | { | ||
554 | psu->iAttributes &= ~SCAU_FAIL_IF_EXISTS; | ||
555 | } | ||
556 | |||
557 | if ((SCAU_FAIL_IF_EXISTS & (psu->iAttributes)) && !(SCAU_UPDATE_IF_EXISTS & (psu->iAttributes))) | ||
558 | { | ||
559 | hr = HRESULT_FROM_WIN32(NERR_UserExists); | ||
560 | MessageExitOnFailure(hr, msierrUSRFailedUserCreateExists, "Failed to create user: %ls because user already exists.", psu->wzName); | ||
561 | } | ||
562 | } | ||
563 | |||
564 | // Rollback only if the user already exists, we couldn't determine if the user exists, or we are going to create the user | ||
565 | if ((USER_EXISTS_YES == ueUserExists) || (USER_EXISTS_INDETERMINATE == ueUserExists) || !(psu->iAttributes & SCAU_DONT_CREATE_USER)) | ||
566 | { | ||
567 | ++cScriptKey; | ||
568 | hr = StrAllocFormatted(&pwzScriptKey, L"%ls%u", pwzBaseScriptKey, cScriptKey); | ||
569 | ExitOnFailure(hr, "Failed to create encoding key."); | ||
570 | |||
571 | // Write the script key to CustomActionData for install and rollback so information can be passed to rollback. | ||
572 | hr = WcaWriteStringToCaData(pwzScriptKey, &pwzActionData); | ||
573 | ExitOnFailure(hr, "Failed to add encoding key to custom action data."); | ||
574 | |||
575 | hr = WcaWriteStringToCaData(pwzScriptKey, &pwzRollbackData); | ||
576 | ExitOnFailure(hr, "Failed to add encoding key to rollback custom action data."); | ||
577 | |||
578 | INT iRollbackUserAttributes = psu->iAttributes; | ||
579 | |||
580 | // If the user already exists, ensure this is accounted for in rollback | ||
581 | if (USER_EXISTS_YES == ueUserExists) | ||
582 | { | ||
583 | iRollbackUserAttributes |= SCAU_DONT_CREATE_USER; | ||
584 | } | ||
585 | else | ||
586 | { | ||
587 | iRollbackUserAttributes &= ~SCAU_DONT_CREATE_USER; | ||
588 | } | ||
589 | |||
590 | // The deferred CA determines when to rollback User Rights Assignments so these should never be set. | ||
591 | iRollbackUserAttributes &= ~SCAU_ALLOW_LOGON_AS_SERVICE; | ||
592 | iRollbackUserAttributes &= ~SCAU_ALLOW_LOGON_AS_BATCH; | ||
593 | |||
594 | hr = WcaWriteStringToCaData(psu->wzName, &pwzRollbackData); | ||
595 | ExitOnFailure(hr, "Failed to add user name to rollback custom action data: %ls", psu->wzName); | ||
596 | hr = WcaWriteStringToCaData(psu->wzDomain, &pwzRollbackData); | ||
597 | ExitOnFailure(hr, "Failed to add user domain to rollback custom action data: %ls", psu->wzDomain); | ||
598 | hr = WcaWriteIntegerToCaData(iRollbackUserAttributes, &pwzRollbackData); | ||
599 | ExitOnFailure(hr, "failed to add user attributes to rollback custom action data for user: %ls", psu->wzKey); | ||
600 | |||
601 | // If the user already exists, add relevant group information to rollback data | ||
602 | if (USER_EXISTS_YES == ueUserExists || USER_EXISTS_INDETERMINATE == ueUserExists) | ||
603 | { | ||
604 | hr = WriteGroupRollbackInfo(psu->wzName, psu->wzDomain, psu->psgGroups, &pwzRollbackData); | ||
605 | ExitOnFailure(hr, "failed to add group information to rollback custom action data"); | ||
606 | } | ||
607 | |||
608 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"CreateUserRollback"), pwzRollbackData, COST_USER_DELETE); | ||
609 | ExitOnFailure(hr, "failed to schedule CreateUserRollback"); | ||
610 | } | ||
611 | else | ||
612 | { | ||
613 | // Write empty script key to CustomActionData since there is no rollback. | ||
614 | hr = WcaWriteStringToCaData(L"", &pwzActionData); | ||
615 | ExitOnFailure(hr, "Failed to add empty encoding key to custom action data."); | ||
616 | } | ||
617 | |||
618 | // | ||
619 | // Schedule the creation now. | ||
620 | // | ||
621 | hr = WcaWriteStringToCaData(psu->wzPassword, &pwzActionData); | ||
622 | ExitOnFailure(hr, "failed to add user password to custom action data for user: %ls", psu->wzKey); | ||
623 | |||
624 | // Add user's group information to custom action data | ||
625 | hr = WriteGroupInfo(psu->psgGroups, &pwzActionData); | ||
626 | ExitOnFailure(hr, "failed to add group information to custom action data"); | ||
627 | |||
628 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"CreateUser"), pwzActionData, COST_USER_ADD); | ||
629 | ExitOnFailure(hr, "failed to schedule CreateUser"); | ||
630 | } | ||
631 | else if (((USER_EXISTS_YES == ueUserExists) || (USER_EXISTS_INDETERMINATE == ueUserExists)) && WcaIsUninstalling(psu->isInstalled, psu->isAction) && !(psu->iAttributes & SCAU_DONT_REMOVE_ON_UNINSTALL)) | ||
632 | { | ||
633 | // Add user's group information - this will ensure the user can be removed from any groups they were added to, if the user isn't be deleted | ||
634 | hr = WriteGroupInfo(psu->psgGroups, &pwzActionData); | ||
635 | ExitOnFailure(hr, "failed to add group information to custom action data"); | ||
636 | |||
637 | // | ||
638 | // Schedule the removal because the user exists and we don't have any flags set | ||
639 | // that say, don't remove the user on uninstall. | ||
640 | // | ||
641 | // Note: We can't rollback the removal of a user which is why RemoveUser is a commit | ||
642 | // CustomAction. | ||
643 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RemoveUser"), pwzActionData, COST_USER_DELETE); | ||
644 | ExitOnFailure(hr, "failed to schedule RemoveUser"); | ||
645 | } | ||
646 | |||
647 | ReleaseNullStr(pwzScriptKey); | ||
648 | ReleaseNullStr(pwzActionData); | ||
649 | ReleaseNullStr(pwzRollbackData); | ||
650 | if (pUserInfo) | ||
651 | { | ||
652 | ::NetApiBufferFree(static_cast<LPVOID>(pUserInfo)); | ||
653 | pUserInfo = NULL; | ||
654 | } | ||
655 | if (pDomainControllerInfo) | ||
656 | { | ||
657 | ::NetApiBufferFree(static_cast<LPVOID>(pDomainControllerInfo)); | ||
658 | pDomainControllerInfo = NULL; | ||
659 | } | ||
660 | } | ||
661 | |||
662 | LExit: | ||
663 | ReleaseStr(pwzBaseScriptKey); | ||
664 | ReleaseStr(pwzScriptKey); | ||
665 | ReleaseStr(pwzActionData); | ||
666 | ReleaseStr(pwzRollbackData); | ||
667 | if (pUserInfo) | ||
668 | { | ||
669 | ::NetApiBufferFree(static_cast<LPVOID>(pUserInfo)); | ||
670 | } | ||
671 | if (pDomainControllerInfo) | ||
672 | { | ||
673 | ::NetApiBufferFree(static_cast<LPVOID>(pDomainControllerInfo)); | ||
674 | } | ||
675 | |||
676 | return hr; | ||
677 | } | ||
678 | |||
679 | |||
680 | static HRESULT AddUserToList( | ||
681 | __inout SCA_USER** ppsuList | ||
682 | ) | ||
683 | { | ||
684 | HRESULT hr = S_OK; | ||
685 | SCA_USER* psu = static_cast<SCA_USER*>(MemAlloc(sizeof(SCA_USER), TRUE)); | ||
686 | ExitOnNull(psu, hr, E_OUTOFMEMORY, "failed to allocate memory for new user list element"); | ||
687 | |||
688 | psu->psuNext = *ppsuList; | ||
689 | *ppsuList = psu; | ||
690 | |||
691 | LExit: | ||
692 | return hr; | ||
693 | } | ||
694 | |||
695 | |||
696 | static HRESULT AddGroupToList( | ||
697 | __inout SCA_GROUP** ppsgList | ||
698 | ) | ||
699 | { | ||
700 | HRESULT hr = S_OK; | ||
701 | SCA_GROUP* psg = static_cast<SCA_GROUP*>(MemAlloc(sizeof(SCA_GROUP), TRUE)); | ||
702 | ExitOnNull(psg, hr, E_OUTOFMEMORY, "failed to allocate memory for new group list element"); | ||
703 | |||
704 | psg->psgNext = *ppsgList; | ||
705 | *ppsgList = psg; | ||
706 | |||
707 | LExit: | ||
708 | return hr; | ||
709 | } | ||
diff --git a/src/ext/Util/ca/scauser.h b/src/ext/Util/ca/scauser.h new file mode 100644 index 00000000..a5fd5ea8 --- /dev/null +++ b/src/ext/Util/ca/scauser.h | |||
@@ -0,0 +1,67 @@ | |||
1 | #pragma once | ||
2 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
3 | |||
4 | |||
5 | enum USER_EXISTS | ||
6 | { | ||
7 | USER_EXISTS_YES, | ||
8 | USER_EXISTS_NO, | ||
9 | USER_EXISTS_INDETERMINATE | ||
10 | }; | ||
11 | |||
12 | // structs | ||
13 | struct SCA_GROUP | ||
14 | { | ||
15 | WCHAR wzKey[MAX_DARWIN_KEY + 1]; | ||
16 | WCHAR wzComponent[MAX_DARWIN_KEY + 1]; | ||
17 | |||
18 | WCHAR wzDomain[MAX_DARWIN_COLUMN + 1]; | ||
19 | WCHAR wzName[MAX_DARWIN_COLUMN + 1]; | ||
20 | |||
21 | SCA_GROUP *psgNext; | ||
22 | }; | ||
23 | |||
24 | struct SCA_USER | ||
25 | { | ||
26 | WCHAR wzKey[MAX_DARWIN_KEY + 1]; | ||
27 | WCHAR wzComponent[MAX_DARWIN_KEY + 1]; | ||
28 | INSTALLSTATE isInstalled; | ||
29 | INSTALLSTATE isAction; | ||
30 | |||
31 | WCHAR wzDomain[MAX_DARWIN_COLUMN + 1]; | ||
32 | WCHAR wzName[MAX_DARWIN_COLUMN + 1]; | ||
33 | WCHAR wzPassword[MAX_DARWIN_COLUMN + 1]; | ||
34 | INT iAttributes; | ||
35 | |||
36 | SCA_GROUP *psgGroups; | ||
37 | |||
38 | SCA_USER *psuNext; | ||
39 | }; | ||
40 | |||
41 | |||
42 | // prototypes | ||
43 | HRESULT __stdcall ScaGetUser( | ||
44 | __in LPCWSTR wzUser, | ||
45 | __out SCA_USER* pscau | ||
46 | ); | ||
47 | HRESULT __stdcall ScaGetUserDeferred( | ||
48 | __in LPCWSTR wzUser, | ||
49 | __in WCA_WRAPQUERY_HANDLE hUserQuery, | ||
50 | __out SCA_USER* pscau | ||
51 | ); | ||
52 | HRESULT __stdcall ScaGetGroup( | ||
53 | __in LPCWSTR wzGroup, | ||
54 | __out SCA_GROUP* pscag | ||
55 | ); | ||
56 | void ScaUserFreeList( | ||
57 | __in SCA_USER* psuList | ||
58 | ); | ||
59 | void ScaGroupFreeList( | ||
60 | __in SCA_GROUP* psgList | ||
61 | ); | ||
62 | HRESULT ScaUserRead( | ||
63 | __inout SCA_USER** ppsuList | ||
64 | ); | ||
65 | HRESULT ScaUserExecute( | ||
66 | __in SCA_USER *psuList | ||
67 | ); | ||
diff --git a/src/ext/Util/ca/secureobj.cpp b/src/ext/Util/ca/secureobj.cpp new file mode 100644 index 00000000..72842eb5 --- /dev/null +++ b/src/ext/Util/ca/secureobj.cpp | |||
@@ -0,0 +1,915 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | // structs | ||
6 | LPCWSTR wzQUERY_SECUREOBJECTS = L"SELECT `Wix4SecureObject`.`Wix4SecureObject`, `Wix4SecureObject`.`Table`, `Wix4SecureObject`.`Domain`, `Wix4SecureObject`.`User`, `Wix4SecureObject`.`Attributes`, " | ||
7 | L"`Wix4SecureObject`.`Permission`, `Wix4SecureObject`.`Component_`, `Component`.`Attributes` FROM `Wix4SecureObject`,`Component` WHERE " | ||
8 | L"`Wix4SecureObject`.`Component_`=`Component`.`Component`"; | ||
9 | enum eQUERY_SECUREOBJECTS { QSO_SECUREOBJECT = 1, QSO_TABLE, QSO_DOMAIN, QSO_USER, QSO_ATTRIBUTES, QSO_PERMISSION, QSO_COMPONENT, QSO_COMPATTRIBUTES }; | ||
10 | |||
11 | LPCWSTR wzQUERY_REGISTRY = L"SELECT `Registry`.`Registry`, `Registry`.`Root`, `Registry`.`Key` FROM `Registry` WHERE `Registry`.`Registry`=?"; | ||
12 | enum eQUERY_OBJECTCOMPONENT { QSOC_REGISTRY = 1, QSOC_REGROOT, QSOC_REGKEY }; | ||
13 | |||
14 | LPCWSTR wzQUERY_SERVICEINSTALL = L"SELECT `ServiceInstall`.`Name` FROM `ServiceInstall` WHERE `ServiceInstall`.`ServiceInstall`=?"; | ||
15 | enum eQUERY_SECURESERVICEINSTALL { QSSI_NAME = 1 }; | ||
16 | |||
17 | enum eOBJECTTYPE { OT_UNKNOWN, OT_SERVICE, OT_FOLDER, OT_FILE, OT_REGISTRY }; | ||
18 | |||
19 | enum eSECURE_OBJECT_ATTRIBUTE | ||
20 | { | ||
21 | SECURE_OBJECT_ATTRIBUTE_INHERITABLE = 0x1, | ||
22 | }; | ||
23 | |||
24 | static eOBJECTTYPE EObjectTypeFromString( | ||
25 | __in LPCWSTR pwzTable | ||
26 | ) | ||
27 | { | ||
28 | if (NULL == pwzTable) | ||
29 | { | ||
30 | return OT_UNKNOWN; | ||
31 | } | ||
32 | |||
33 | eOBJECTTYPE eType = OT_UNKNOWN; | ||
34 | |||
35 | // ensure we're looking at a known table | ||
36 | if (0 == lstrcmpW(L"ServiceInstall", pwzTable)) | ||
37 | { | ||
38 | eType = OT_SERVICE; | ||
39 | } | ||
40 | else if (0 == lstrcmpW(L"CreateFolder", pwzTable)) | ||
41 | { | ||
42 | eType = OT_FOLDER; | ||
43 | } | ||
44 | else if (0 == lstrcmpW(L"File", pwzTable)) | ||
45 | { | ||
46 | eType = OT_FILE; | ||
47 | } | ||
48 | else if (0 == lstrcmpW(L"Registry", pwzTable)) | ||
49 | { | ||
50 | eType = OT_REGISTRY; | ||
51 | } | ||
52 | |||
53 | return eType; | ||
54 | } | ||
55 | |||
56 | static SE_OBJECT_TYPE SEObjectTypeFromString( | ||
57 | __in LPCWSTR pwzTable | ||
58 | ) | ||
59 | { | ||
60 | if (NULL == pwzTable) | ||
61 | { | ||
62 | return SE_UNKNOWN_OBJECT_TYPE; | ||
63 | } | ||
64 | |||
65 | SE_OBJECT_TYPE objectType = SE_UNKNOWN_OBJECT_TYPE; | ||
66 | |||
67 | if (0 == lstrcmpW(L"ServiceInstall", pwzTable)) | ||
68 | { | ||
69 | objectType = SE_SERVICE; | ||
70 | } | ||
71 | else if (0 == lstrcmpW(L"CreateFolder", pwzTable) || 0 == lstrcmpW(L"File", pwzTable)) | ||
72 | { | ||
73 | objectType = SE_FILE_OBJECT; | ||
74 | } | ||
75 | else if (0 == lstrcmpW(L"Registry", pwzTable)) | ||
76 | { | ||
77 | objectType = SE_REGISTRY_KEY; | ||
78 | } | ||
79 | else | ||
80 | { | ||
81 | // Do nothing; we'll return SE_UNKNOWN_OBJECT_TYPE, and the caller should handle the situation | ||
82 | } | ||
83 | |||
84 | return objectType; | ||
85 | } | ||
86 | |||
87 | static HRESULT StoreACLRollbackInfo( | ||
88 | __in LPWSTR pwzObject, | ||
89 | __in LPCWSTR pwzTable | ||
90 | ) | ||
91 | { | ||
92 | HRESULT hr = S_OK; | ||
93 | DWORD er = ERROR_SUCCESS; | ||
94 | PSECURITY_DESCRIPTOR psd = NULL; | ||
95 | SECURITY_DESCRIPTOR_CONTROL sdc = {0}; | ||
96 | DWORD dwRevision = 0; | ||
97 | LPWSTR pwzCustomActionData = NULL; | ||
98 | LPWSTR pwzSecurityInfo = NULL; | ||
99 | |||
100 | Assert(pwzObject && pwzTable); | ||
101 | |||
102 | SE_OBJECT_TYPE objectType = SEObjectTypeFromString(const_cast<LPCWSTR> (pwzTable)); | ||
103 | |||
104 | if (SE_UNKNOWN_OBJECT_TYPE != objectType) | ||
105 | { | ||
106 | er = ::GetNamedSecurityInfoW(pwzObject, objectType, DACL_SECURITY_INFORMATION, NULL, NULL, NULL, NULL, &psd); | ||
107 | if (ERROR_FILE_NOT_FOUND == er || ERROR_PATH_NOT_FOUND == er || ERROR_SERVICE_DOES_NOT_EXIST == HRESULT_CODE(er)) | ||
108 | { | ||
109 | // If the file, path or service doesn't exist yet, skip rollback without a message | ||
110 | hr = HRESULT_FROM_WIN32(er); | ||
111 | ExitFunction(); | ||
112 | } | ||
113 | |||
114 | ExitOnFailure(hr = HRESULT_FROM_WIN32(er), "Unable to schedule rollback for object: %ls", pwzObject); | ||
115 | |||
116 | //Need to see if DACL is protected so getting Descriptor information | ||
117 | if (!::GetSecurityDescriptorControl(psd, &sdc, &dwRevision)) | ||
118 | { | ||
119 | ExitOnLastError(hr, "Unable to schedule rollback for object (failed to get security descriptor control): %ls", pwzObject); | ||
120 | } | ||
121 | |||
122 | // Convert the security information to a string, and write this to the custom action data | ||
123 | if (!::ConvertSecurityDescriptorToStringSecurityDescriptorW(psd,SDDL_REVISION_1,DACL_SECURITY_INFORMATION,&pwzSecurityInfo,NULL)) | ||
124 | { | ||
125 | hr = E_UNEXPECTED; | ||
126 | ExitOnFailure(hr, "Unable to schedule rollback for object (failed to convert security descriptor to a valid security descriptor string): %ls", pwzObject); | ||
127 | } | ||
128 | |||
129 | hr = WcaWriteStringToCaData(pwzObject, &pwzCustomActionData); | ||
130 | ExitOnFailure(hr, "failed to add object data to rollback CustomActionData"); | ||
131 | |||
132 | hr = WcaWriteStringToCaData(pwzTable, &pwzCustomActionData); | ||
133 | ExitOnFailure(hr, "failed to add table name to rollback CustomActionData"); | ||
134 | |||
135 | hr = WcaWriteStringToCaData(pwzSecurityInfo, &pwzCustomActionData); | ||
136 | ExitOnFailure(hr, "failed to add security info data to rollback CustomActionData"); | ||
137 | |||
138 | // Write a 1 if DACL is protected, 0 otherwise | ||
139 | if (sdc & SE_DACL_PROTECTED) | ||
140 | { | ||
141 | hr = WcaWriteIntegerToCaData(1,&pwzCustomActionData); | ||
142 | ExitOnFailure(hr, "failed to add data to rollbackCustomActionData"); | ||
143 | } | ||
144 | else | ||
145 | { | ||
146 | hr = WcaWriteIntegerToCaData(0,&pwzCustomActionData); | ||
147 | ExitOnFailure(hr, "failed to add data to rollback CustomActionData"); | ||
148 | } | ||
149 | |||
150 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"ExecSecureObjectsRollback"), pwzCustomActionData, COST_SECUREOBJECT); | ||
151 | ExitOnFailure(hr, "failed to schedule ExecSecureObjectsRollback for item: %ls of type: %ls", pwzObject, pwzTable); | ||
152 | |||
153 | ReleaseStr(pwzCustomActionData); | ||
154 | pwzCustomActionData = NULL; | ||
155 | |||
156 | } | ||
157 | else | ||
158 | { | ||
159 | MessageExitOnFailure(hr = E_UNEXPECTED, msierrSecureObjectsUnknownType, "unknown object type: %ls", pwzTable); | ||
160 | } | ||
161 | LExit: | ||
162 | ReleaseStr(pwzCustomActionData); | ||
163 | |||
164 | if (psd) | ||
165 | { | ||
166 | ::LocalFree(psd); | ||
167 | } | ||
168 | |||
169 | return hr; | ||
170 | } | ||
171 | |||
172 | static HRESULT GetTargetPath( | ||
173 | __in eOBJECTTYPE eType, | ||
174 | __in LPCWSTR pwzSecureObject, | ||
175 | __out LPWSTR* ppwzTargetPath | ||
176 | ) | ||
177 | { | ||
178 | HRESULT hr = S_OK; | ||
179 | |||
180 | PMSIHANDLE hView = NULL; | ||
181 | PMSIHANDLE hRecObject = NULL; | ||
182 | PMSIHANDLE hRec = NULL; | ||
183 | |||
184 | int iRoot = 0; | ||
185 | int iAllUsers = 0; | ||
186 | LPWSTR pwzKey = NULL; | ||
187 | LPWSTR pwzFormattedString = NULL; | ||
188 | |||
189 | if (OT_SERVICE == eType) | ||
190 | { | ||
191 | hr = WcaTableExists(L"ServiceInstall"); | ||
192 | if (S_FALSE == hr) | ||
193 | { | ||
194 | hr = E_UNEXPECTED; | ||
195 | } | ||
196 | ExitOnFailure(hr, "failed to open ServiceInstall table to secure object"); | ||
197 | |||
198 | hr = WcaOpenView(wzQUERY_SERVICEINSTALL, &hView); | ||
199 | ExitOnFailure(hr, "failed to open view on ServiceInstall table"); | ||
200 | |||
201 | // create a record that stores the object to secure | ||
202 | hRec = MsiCreateRecord(1); | ||
203 | MsiRecordSetStringW(hRec, 1, pwzSecureObject); | ||
204 | |||
205 | // execute a view looking for the object's ServiceInstall.ServiceInstall row. | ||
206 | hr = WcaExecuteView(hView, hRec); | ||
207 | ExitOnFailure(hr, "failed to execute view on ServiceInstall table"); | ||
208 | hr = WcaFetchSingleRecord(hView, &hRecObject); | ||
209 | ExitOnFailure(hr, "failed to fetch ServiceInstall row for secure object"); | ||
210 | |||
211 | hr = WcaGetRecordFormattedString(hRecObject, QSSI_NAME, ppwzTargetPath); | ||
212 | ExitOnFailure(hr, "failed to get service name for secure object: %ls", pwzSecureObject); | ||
213 | } | ||
214 | else if (OT_FOLDER == eType) | ||
215 | { | ||
216 | hr = WcaGetTargetPath(pwzSecureObject, ppwzTargetPath); | ||
217 | ExitOnFailure(hr, "failed to get target path for directory id: %ls", pwzSecureObject); | ||
218 | } | ||
219 | else if (OT_FILE == eType) | ||
220 | { | ||
221 | hr = StrAllocFormatted(&pwzFormattedString, L"[#%s]", pwzSecureObject); | ||
222 | ExitOnFailure(hr, "failed to create formatted string for securing file object: %ls", pwzSecureObject); | ||
223 | |||
224 | hr = WcaGetFormattedString(pwzFormattedString, ppwzTargetPath); | ||
225 | ExitOnFailure(hr, "failed to get file path from formatted string: %ls for secure object: %ls", pwzFormattedString, pwzSecureObject); | ||
226 | } | ||
227 | else if (OT_REGISTRY == eType) | ||
228 | { | ||
229 | hr = WcaTableExists(L"Registry"); | ||
230 | if (S_FALSE == hr) | ||
231 | { | ||
232 | hr = E_UNEXPECTED; | ||
233 | } | ||
234 | ExitOnFailure(hr, "failed to open Registry table to secure object"); | ||
235 | |||
236 | hr = WcaOpenView(wzQUERY_REGISTRY, &hView); | ||
237 | ExitOnFailure(hr, "failed to open view on Registry table"); | ||
238 | |||
239 | // create a record that stores the object to secure | ||
240 | hRec = MsiCreateRecord(1); | ||
241 | MsiRecordSetStringW(hRec, 1, pwzSecureObject); | ||
242 | |||
243 | // execute a view looking for the object's Registry row | ||
244 | hr = WcaExecuteView(hView, hRec); | ||
245 | ExitOnFailure(hr, "failed to execute view on Registry table"); | ||
246 | hr = WcaFetchSingleRecord(hView, &hRecObject); | ||
247 | ExitOnFailure(hr, "failed to fetch Registry row for secure object"); | ||
248 | |||
249 | hr = WcaGetRecordInteger(hRecObject, QSOC_REGROOT, &iRoot); | ||
250 | ExitOnFailure(hr, "Failed to get reg key root for secure object: %ls", pwzSecureObject); | ||
251 | |||
252 | hr = WcaGetRecordFormattedString(hRecObject, QSOC_REGKEY, &pwzKey); | ||
253 | ExitOnFailure(hr, "Failed to get reg key for secure object: %ls", pwzSecureObject); | ||
254 | |||
255 | // Decode the root value | ||
256 | if (-1 == iRoot) | ||
257 | { | ||
258 | // They didn't specify a root so that means it's either HKCU or HKLM depending on ALLUSERS property | ||
259 | hr = WcaGetIntProperty(L"ALLUSERS", &iAllUsers); | ||
260 | ExitOnFailure(hr, "failed to get value of ALLUSERS property"); | ||
261 | |||
262 | if (1 == iAllUsers) | ||
263 | { | ||
264 | hr = StrAllocString(ppwzTargetPath, L"MACHINE\\", 0); | ||
265 | ExitOnFailure(hr, "failed to allocate target registry string with HKLM root"); | ||
266 | } | ||
267 | else | ||
268 | { | ||
269 | hr = StrAllocString(ppwzTargetPath, L"CURRENT_USER\\", 0); | ||
270 | ExitOnFailure(hr, "failed to allocate target registry string with HKCU root"); | ||
271 | } | ||
272 | } | ||
273 | else if (msidbRegistryRootClassesRoot == iRoot) | ||
274 | { | ||
275 | hr = StrAllocString(ppwzTargetPath, L"CLASSES_ROOT\\", 0); | ||
276 | ExitOnFailure(hr, "failed to allocate target registry string with HKCR root"); | ||
277 | } | ||
278 | else if (msidbRegistryRootCurrentUser == iRoot) | ||
279 | { | ||
280 | hr = StrAllocString(ppwzTargetPath, L"CURRENT_USER\\", 0); | ||
281 | ExitOnFailure(hr, "failed to allocate target registry string with HKCU root"); | ||
282 | } | ||
283 | else if (msidbRegistryRootLocalMachine == iRoot) | ||
284 | { | ||
285 | hr = StrAllocString(ppwzTargetPath, L"MACHINE\\", 0); | ||
286 | ExitOnFailure(hr, "failed to allocate target registry string with HKLM root"); | ||
287 | } | ||
288 | else if (msidbRegistryRootUsers == iRoot) | ||
289 | { | ||
290 | hr = StrAllocString(ppwzTargetPath, L"USERS\\", 0); | ||
291 | ExitOnFailure(hr, "failed to allocate target registry string with HKU root"); | ||
292 | } | ||
293 | else | ||
294 | { | ||
295 | ExitOnFailure(hr = E_UNEXPECTED, "Unknown registry key root specified for secure object: '%ls' root: %d", pwzSecureObject, iRoot); | ||
296 | } | ||
297 | |||
298 | hr = StrAllocConcat(ppwzTargetPath, pwzKey, 0); | ||
299 | ExitOnFailure(hr, "Failed to concat key: %ls for secure object: %ls", pwzKey, pwzSecureObject); | ||
300 | } | ||
301 | else | ||
302 | { | ||
303 | AssertSz(FALSE, "How did you get here?"); | ||
304 | ExitOnFailure(hr = E_UNEXPECTED, "Unknown secure object type: %d", eType); | ||
305 | } | ||
306 | |||
307 | LExit: | ||
308 | ReleaseStr(pwzFormattedString); | ||
309 | ReleaseStr(pwzKey); | ||
310 | |||
311 | return hr; | ||
312 | } | ||
313 | |||
314 | /****************************************************************** | ||
315 | SchedSecureObjects - entry point for SchedSecureObjects Custom Action | ||
316 | |||
317 | called as Type 1 CustomAction (binary DLL) from Windows Installer | ||
318 | in InstallExecuteSequence, to schedule ExecSecureObjects | ||
319 | ******************************************************************/ | ||
320 | extern "C" UINT __stdcall SchedSecureObjects( | ||
321 | __in MSIHANDLE hInstall | ||
322 | ) | ||
323 | { | ||
324 | // AssertSz(FALSE, "debug SchedSecureObjects"); | ||
325 | HRESULT hr = S_OK; | ||
326 | UINT er = ERROR_SUCCESS; | ||
327 | |||
328 | LPWSTR pwzSecureObject = NULL; | ||
329 | LPWSTR pwzData = NULL; | ||
330 | LPWSTR pwzTable = NULL; | ||
331 | LPWSTR pwzTargetPath = NULL; | ||
332 | |||
333 | PMSIHANDLE hView = NULL; | ||
334 | PMSIHANDLE hRec = NULL; | ||
335 | |||
336 | INSTALLSTATE isInstalled; | ||
337 | INSTALLSTATE isAction; | ||
338 | |||
339 | LPWSTR pwzCustomActionData = NULL; | ||
340 | |||
341 | DWORD cObjects = 0; | ||
342 | eOBJECTTYPE eType = OT_UNKNOWN; | ||
343 | DWORD dwAttributes = 0; | ||
344 | |||
345 | // | ||
346 | // initialize | ||
347 | // | ||
348 | hr = WcaInitialize(hInstall, "SchedSecureObjects"); | ||
349 | ExitOnFailure(hr, "failed to initialize"); | ||
350 | |||
351 | // anything to do? | ||
352 | if (S_OK != WcaTableExists(L"Wix4SecureObject")) | ||
353 | { | ||
354 | WcaLog(LOGMSG_STANDARD, "Wix4SecureObject table doesn't exist, so there are no objects to secure."); | ||
355 | ExitFunction(); | ||
356 | } | ||
357 | |||
358 | // | ||
359 | // loop through all the objects to be secured | ||
360 | // | ||
361 | hr = WcaOpenExecuteView(wzQUERY_SECUREOBJECTS, &hView); | ||
362 | ExitOnFailure(hr, "failed to open view on Wix4SecureObject table"); | ||
363 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
364 | { | ||
365 | hr = WcaGetRecordString(hRec, QSO_TABLE, &pwzTable); | ||
366 | ExitOnFailure(hr, "failed to get object table"); | ||
367 | |||
368 | eType = EObjectTypeFromString(pwzTable); | ||
369 | |||
370 | if (OT_UNKNOWN == eType) | ||
371 | { | ||
372 | ExitOnFailure(hr = E_INVALIDARG, "unknown SecureObject.Table: %ls", pwzTable); | ||
373 | } | ||
374 | |||
375 | int iCompAttributes = 0; | ||
376 | hr = WcaGetRecordInteger(hRec, QSO_COMPATTRIBUTES, &iCompAttributes); | ||
377 | ExitOnFailure(hr, "failed to get Component attributes for secure object"); | ||
378 | |||
379 | BOOL fIs64Bit = iCompAttributes & msidbComponentAttributes64bit; | ||
380 | |||
381 | // Only process entries in the Wix4SecureObject table whose components match the bitness of this CA | ||
382 | #ifdef _WIN64 | ||
383 | if (!fIs64Bit) | ||
384 | { | ||
385 | continue; | ||
386 | } | ||
387 | #else | ||
388 | if (fIs64Bit) | ||
389 | { | ||
390 | continue; | ||
391 | } | ||
392 | #endif | ||
393 | |||
394 | // Get the object to secure | ||
395 | hr = WcaGetRecordString(hRec, QSO_SECUREOBJECT, &pwzSecureObject); | ||
396 | ExitOnFailure(hr, "failed to get name of object"); | ||
397 | |||
398 | hr = GetTargetPath(eType, pwzSecureObject, &pwzTargetPath); | ||
399 | ExitOnFailure(hr, "failed to get target path of object '%ls'", pwzSecureObject); | ||
400 | |||
401 | hr = WcaGetRecordString(hRec, QSO_COMPONENT, &pwzData); | ||
402 | ExitOnFailure(hr, "failed to get Component name for secure object"); | ||
403 | |||
404 | // | ||
405 | // if we are installing this Component | ||
406 | // | ||
407 | er = ::MsiGetComponentStateW(hInstall, pwzData, &isInstalled, &isAction); | ||
408 | ExitOnFailure(hr = HRESULT_FROM_WIN32(er), "failed to get install state for Component: %ls", pwzData); | ||
409 | |||
410 | if (WcaIsInstalling(isInstalled, isAction)) | ||
411 | { | ||
412 | hr = WcaWriteStringToCaData(pwzTargetPath, &pwzCustomActionData); | ||
413 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
414 | |||
415 | // add the data to the CustomActionData | ||
416 | hr = WcaGetRecordString(hRec, QSO_SECUREOBJECT, &pwzData); | ||
417 | ExitOnFailure(hr, "failed to get name of object"); | ||
418 | hr = WcaWriteStringToCaData(pwzTable, &pwzCustomActionData); | ||
419 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
420 | |||
421 | hr = WcaGetRecordFormattedString(hRec, QSO_DOMAIN, &pwzData); | ||
422 | ExitOnFailure(hr, "failed to get domain for user to configure object"); | ||
423 | hr = WcaWriteStringToCaData(pwzData, &pwzCustomActionData); | ||
424 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
425 | |||
426 | hr = WcaGetRecordFormattedString(hRec, QSO_USER, &pwzData); | ||
427 | ExitOnFailure(hr, "failed to get user to configure object"); | ||
428 | hr = WcaWriteStringToCaData(pwzData, &pwzCustomActionData); | ||
429 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
430 | |||
431 | hr = WcaGetRecordInteger(hRec, QSO_ATTRIBUTES, reinterpret_cast<int*>(&dwAttributes)); | ||
432 | ExitOnFailure(hr, "failed to get attributes to configure object"); | ||
433 | hr = WcaWriteIntegerToCaData(dwAttributes, &pwzCustomActionData); | ||
434 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
435 | |||
436 | hr = WcaGetRecordString(hRec, QSO_PERMISSION, &pwzData); | ||
437 | ExitOnFailure(hr, "failed to get permission to configure object"); | ||
438 | hr = WcaWriteStringToCaData(pwzData, &pwzCustomActionData); | ||
439 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
440 | |||
441 | ++cObjects; | ||
442 | } | ||
443 | } | ||
444 | |||
445 | // if we looped through all records all is well | ||
446 | if (E_NOMOREITEMS == hr) | ||
447 | hr = S_OK; | ||
448 | ExitOnFailure(hr, "failed while looping through all objects to secure"); | ||
449 | |||
450 | // | ||
451 | // schedule the custom action and add to progress bar | ||
452 | // | ||
453 | if (pwzCustomActionData && *pwzCustomActionData) | ||
454 | { | ||
455 | Assert(0 < cObjects); | ||
456 | |||
457 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"ExecSecureObjects"), pwzCustomActionData, cObjects * COST_SECUREOBJECT); | ||
458 | ExitOnFailure(hr, "failed to schedule ExecSecureObjects action"); | ||
459 | } | ||
460 | |||
461 | LExit: | ||
462 | ReleaseStr(pwzSecureObject); | ||
463 | ReleaseStr(pwzCustomActionData); | ||
464 | ReleaseStr(pwzData); | ||
465 | ReleaseStr(pwzTable); | ||
466 | ReleaseStr(pwzTargetPath); | ||
467 | |||
468 | if (FAILED(hr)) | ||
469 | { | ||
470 | er = ERROR_INSTALL_FAILURE; | ||
471 | } | ||
472 | return WcaFinalize(er); | ||
473 | } | ||
474 | |||
475 | /****************************************************************** | ||
476 | SchedSecureObjectsRollback - entry point for SchedSecureObjectsRollback Custom Action | ||
477 | |||
478 | called as Type 1 CustomAction (binary DLL) from Windows Installer | ||
479 | in InstallExecuteSequence before SchedSecureObjects | ||
480 | ******************************************************************/ | ||
481 | extern "C" UINT __stdcall SchedSecureObjectsRollback( | ||
482 | __in MSIHANDLE hInstall | ||
483 | ) | ||
484 | { | ||
485 | // AssertSz(FALSE, "debug SchedSecureObjectsRollback"); | ||
486 | HRESULT hr = S_OK; | ||
487 | UINT er = ERROR_SUCCESS; | ||
488 | |||
489 | LPWSTR pwzSecureObject = NULL; | ||
490 | LPWSTR pwzTable = NULL; | ||
491 | LPWSTR pwzTargetPath = NULL; | ||
492 | |||
493 | PMSIHANDLE hView = NULL; | ||
494 | PMSIHANDLE hRec = NULL; | ||
495 | |||
496 | LPWSTR pwzCustomActionData = NULL; | ||
497 | |||
498 | eOBJECTTYPE eType = OT_UNKNOWN; | ||
499 | |||
500 | // | ||
501 | // initialize | ||
502 | // | ||
503 | hr = WcaInitialize(hInstall, "SchedSecureObjectsRollback"); | ||
504 | ExitOnFailure(hr, "failed to initialize"); | ||
505 | |||
506 | // | ||
507 | // loop through all the objects to be secured | ||
508 | // | ||
509 | hr = WcaOpenExecuteView(wzQUERY_SECUREOBJECTS, &hView); | ||
510 | ExitOnFailure(hr, "failed to open view on Wix4SecureObject table"); | ||
511 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
512 | { | ||
513 | hr = WcaGetRecordString(hRec, QSO_TABLE, &pwzTable); | ||
514 | ExitOnFailure(hr, "failed to get object table"); | ||
515 | |||
516 | eType = EObjectTypeFromString(pwzTable); | ||
517 | |||
518 | if (OT_UNKNOWN == eType) | ||
519 | { | ||
520 | ExitOnFailure(hr = E_INVALIDARG, "unknown SecureObject.Table: %ls", pwzTable); | ||
521 | } | ||
522 | |||
523 | int iCompAttributes = 0; | ||
524 | hr = WcaGetRecordInteger(hRec, QSO_COMPATTRIBUTES, &iCompAttributes); | ||
525 | ExitOnFailure(hr, "failed to get Component attributes for secure object"); | ||
526 | |||
527 | BOOL fIs64Bit = iCompAttributes & msidbComponentAttributes64bit; | ||
528 | |||
529 | // Only process entries in the Wix4SecureObject table whose components match the bitness of this CA | ||
530 | #ifdef _WIN64 | ||
531 | if (!fIs64Bit) | ||
532 | { | ||
533 | continue; | ||
534 | } | ||
535 | #else | ||
536 | if (fIs64Bit) | ||
537 | { | ||
538 | continue; | ||
539 | } | ||
540 | #endif | ||
541 | |||
542 | // get the object being secured that we are planning to schedule rollback for | ||
543 | hr = WcaGetRecordString(hRec, QSO_SECUREOBJECT, &pwzSecureObject); | ||
544 | ExitOnFailure(hr, "failed to get name of object"); | ||
545 | |||
546 | hr = GetTargetPath(eType, pwzSecureObject, &pwzTargetPath); | ||
547 | ExitOnFailure(hr, "failed to get target path of object '%ls' in order to schedule rollback", pwzSecureObject); | ||
548 | |||
549 | hr = StoreACLRollbackInfo(pwzTargetPath, pwzTable); | ||
550 | if (FAILED(hr)) | ||
551 | { | ||
552 | WcaLog(LOGMSG_STANDARD, "Failed to store ACL rollback information with error 0x%x - continuing", hr); | ||
553 | } | ||
554 | } | ||
555 | |||
556 | // if we looped through all records all is well | ||
557 | if (E_NOMOREITEMS == hr) | ||
558 | { | ||
559 | hr = S_OK; | ||
560 | } | ||
561 | ExitOnFailure(hr, "failed while looping through all objects to schedule rollback for"); | ||
562 | |||
563 | LExit: | ||
564 | ReleaseStr(pwzCustomActionData); | ||
565 | ReleaseStr(pwzSecureObject); | ||
566 | ReleaseStr(pwzTable); | ||
567 | ReleaseStr(pwzTargetPath); | ||
568 | |||
569 | if (FAILED(hr)) | ||
570 | { | ||
571 | er = ERROR_INSTALL_FAILURE; | ||
572 | } | ||
573 | return WcaFinalize(er); | ||
574 | } | ||
575 | |||
576 | /****************************************************************** | ||
577 | CaExecSecureObjects - entry point for SecureObjects Custom Action | ||
578 | called as Type 1025 CustomAction (deferred binary DLL) | ||
579 | |||
580 | NOTE: deferred CustomAction since it modifies the machine | ||
581 | NOTE: CustomActionData == wzObject\twzTable\twzDomain\twzUser\tdwAttributes\tdwPermissions\t... | ||
582 | ******************************************************************/ | ||
583 | extern "C" UINT __stdcall ExecSecureObjects( | ||
584 | __in MSIHANDLE hInstall | ||
585 | ) | ||
586 | { | ||
587 | // AssertSz(FALSE, "debug ExecSecureObjects"); | ||
588 | HRESULT hr = S_OK; | ||
589 | DWORD er = ERROR_SUCCESS; | ||
590 | |||
591 | LPWSTR pwz = NULL; | ||
592 | LPWSTR pwzData = NULL; | ||
593 | LPWSTR pwzObject = NULL; | ||
594 | LPWSTR pwzTable = NULL; | ||
595 | LPWSTR pwzDomain = NULL; | ||
596 | DWORD dwRevision = 0; | ||
597 | LPWSTR pwzUser = NULL; | ||
598 | DWORD dwPermissions = 0; | ||
599 | DWORD dwAttributes = 0; | ||
600 | LPWSTR pwzAccount = NULL; | ||
601 | PSID psid = NULL; | ||
602 | |||
603 | EXPLICIT_ACCESSW ea = {0}; | ||
604 | SE_OBJECT_TYPE objectType = SE_UNKNOWN_OBJECT_TYPE; | ||
605 | PSECURITY_DESCRIPTOR psd = NULL; | ||
606 | SECURITY_DESCRIPTOR_CONTROL sdc = {0}; | ||
607 | SECURITY_INFORMATION si = {0}; | ||
608 | PACL pAclExisting = NULL; // doesn't get freed | ||
609 | PACL pAclNew = NULL; | ||
610 | |||
611 | PMSIHANDLE hActionRec = ::MsiCreateRecord(1); | ||
612 | |||
613 | // | ||
614 | // initialize | ||
615 | // | ||
616 | hr = WcaInitialize(hInstall, "ExecSecureObjects"); | ||
617 | ExitOnFailure(hr, "failed to initialize"); | ||
618 | |||
619 | hr = WcaGetProperty(L"CustomActionData", &pwzData); | ||
620 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
621 | |||
622 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzData); | ||
623 | |||
624 | pwz = pwzData; | ||
625 | |||
626 | // | ||
627 | // loop through all the passed in data | ||
628 | // | ||
629 | while (pwz && *pwz) | ||
630 | { | ||
631 | hr = WcaReadStringFromCaData(&pwz, &pwzObject); | ||
632 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
633 | |||
634 | hr = WcaReadStringFromCaData(&pwz, &pwzTable); | ||
635 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
636 | hr = WcaReadStringFromCaData(&pwz, &pwzDomain); | ||
637 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
638 | hr = WcaReadStringFromCaData(&pwz, &pwzUser); | ||
639 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
640 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&dwAttributes)); | ||
641 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
642 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&dwPermissions)); | ||
643 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
644 | |||
645 | WcaLog(LOGMSG_VERBOSE, "Securing Object: %ls Type: %ls User: %ls", pwzObject, pwzTable, pwzUser); | ||
646 | |||
647 | // | ||
648 | // create the appropriate SID | ||
649 | // | ||
650 | |||
651 | // figure out the right user to put into the access block | ||
652 | if (!*pwzDomain && 0 == lstrcmpW(pwzUser, L"Everyone")) | ||
653 | { | ||
654 | hr = AclGetWellKnownSid(WinWorldSid, &psid); | ||
655 | } | ||
656 | else if (!*pwzDomain && 0 == lstrcmpW(pwzUser, L"Administrators")) | ||
657 | { | ||
658 | hr = AclGetWellKnownSid(WinBuiltinAdministratorsSid, &psid); | ||
659 | } | ||
660 | else if (!*pwzDomain && 0 == lstrcmpW(pwzUser, L"LocalSystem")) | ||
661 | { | ||
662 | hr = AclGetWellKnownSid(WinLocalSystemSid, &psid); | ||
663 | } | ||
664 | else if (!*pwzDomain && 0 == lstrcmpW(pwzUser, L"LocalService")) | ||
665 | { | ||
666 | hr = AclGetWellKnownSid(WinLocalServiceSid, &psid); | ||
667 | } | ||
668 | else if (!*pwzDomain && 0 == lstrcmpW(pwzUser, L"NetworkService")) | ||
669 | { | ||
670 | hr = AclGetWellKnownSid(WinNetworkServiceSid, &psid); | ||
671 | } | ||
672 | else if (!*pwzDomain && 0 == lstrcmpW(pwzUser, L"AuthenticatedUser")) | ||
673 | { | ||
674 | hr = AclGetWellKnownSid(WinAuthenticatedUserSid, &psid); | ||
675 | } | ||
676 | else if (!*pwzDomain && 0 == lstrcmpW(pwzUser, L"Guests")) | ||
677 | { | ||
678 | hr = AclGetWellKnownSid(WinBuiltinGuestsSid, &psid); | ||
679 | } | ||
680 | else if (!*pwzDomain && 0 == lstrcmpW(pwzUser, L"CREATOR OWNER")) | ||
681 | { | ||
682 | hr = AclGetWellKnownSid(WinCreatorOwnerSid, &psid); | ||
683 | } | ||
684 | else if (!*pwzDomain && 0 == lstrcmpW(pwzUser, L"INTERACTIVE")) | ||
685 | { | ||
686 | hr = AclGetWellKnownSid(WinInteractiveSid, &psid); | ||
687 | } | ||
688 | else if (!*pwzDomain && 0 == lstrcmpW(pwzUser, L"Users")) | ||
689 | { | ||
690 | hr = AclGetWellKnownSid(WinBuiltinUsersSid, &psid); | ||
691 | } | ||
692 | else | ||
693 | { | ||
694 | hr = StrAllocFormatted(&pwzAccount, L"%s%s%s", pwzDomain, *pwzDomain ? L"\\" : L"", pwzUser); | ||
695 | ExitOnFailure(hr, "failed to build domain user name"); | ||
696 | |||
697 | hr = AclGetAccountSid(NULL, pwzAccount, &psid); | ||
698 | } | ||
699 | ExitOnFailure(hr, "failed to get sid for account: %ls%ls%ls", pwzDomain, *pwzDomain ? L"\\" : L"", pwzUser); | ||
700 | |||
701 | // | ||
702 | // build up the explicit access | ||
703 | // | ||
704 | ea.grfAccessMode = SET_ACCESS; | ||
705 | |||
706 | if (dwAttributes & SECURE_OBJECT_ATTRIBUTE_INHERITABLE) | ||
707 | { | ||
708 | ea.grfInheritance = SUB_CONTAINERS_AND_OBJECTS_INHERIT; | ||
709 | } | ||
710 | else | ||
711 | { | ||
712 | ea.grfInheritance = NO_INHERITANCE; | ||
713 | } | ||
714 | |||
715 | #pragma prefast(push) | ||
716 | #pragma prefast(disable:25029) | ||
717 | ::BuildTrusteeWithSidW(&ea.Trustee, psid); | ||
718 | #pragma prefast(pop) | ||
719 | |||
720 | objectType = SEObjectTypeFromString(const_cast<LPCWSTR> (pwzTable)); | ||
721 | |||
722 | // always add these permissions for services | ||
723 | // these are basic permissions that are often forgotten | ||
724 | if (0 == lstrcmpW(L"ServiceInstall", pwzTable)) | ||
725 | { | ||
726 | dwPermissions |= SERVICE_QUERY_CONFIG | SERVICE_QUERY_STATUS | SERVICE_ENUMERATE_DEPENDENTS | SERVICE_INTERROGATE; | ||
727 | } | ||
728 | |||
729 | ea.grfAccessPermissions = dwPermissions; | ||
730 | |||
731 | if (SE_UNKNOWN_OBJECT_TYPE != objectType) | ||
732 | { | ||
733 | er = ::GetNamedSecurityInfoW(pwzObject, objectType, DACL_SECURITY_INFORMATION, NULL, NULL, &pAclExisting, NULL, &psd); | ||
734 | ExitOnFailure(hr = HRESULT_FROM_WIN32(er), "failed to get security info for object: %ls", pwzObject); | ||
735 | |||
736 | //Need to see if DACL is protected so getting Descriptor information | ||
737 | if (!::GetSecurityDescriptorControl(psd, &sdc, &dwRevision)) | ||
738 | { | ||
739 | ExitOnLastError(hr, "failed to get security descriptor control for object: %ls", pwzObject); | ||
740 | } | ||
741 | |||
742 | #pragma prefast(push) | ||
743 | #pragma prefast(disable:25029) | ||
744 | er = ::SetEntriesInAclW(1, &ea, pAclExisting, &pAclNew); | ||
745 | #pragma prefast(pop) | ||
746 | ExitOnFailure(hr = HRESULT_FROM_WIN32(er), "failed to add ACLs for object: %ls", pwzObject); | ||
747 | |||
748 | if (sdc & SE_DACL_PROTECTED) | ||
749 | { | ||
750 | si = DACL_SECURITY_INFORMATION | PROTECTED_DACL_SECURITY_INFORMATION; | ||
751 | } | ||
752 | else | ||
753 | { | ||
754 | si = DACL_SECURITY_INFORMATION; | ||
755 | } | ||
756 | er = ::SetNamedSecurityInfoW(pwzObject, objectType, si, NULL, NULL, pAclNew, NULL); | ||
757 | MessageExitOnFailure(hr = HRESULT_FROM_WIN32(er), msierrSecureObjectsFailedSet, "failed to set security info for object: %ls", pwzObject); | ||
758 | } | ||
759 | else | ||
760 | { | ||
761 | MessageExitOnFailure(hr = E_UNEXPECTED, msierrSecureObjectsUnknownType, "unknown object type: %ls", pwzTable); | ||
762 | } | ||
763 | |||
764 | hr = WcaProgressMessage(COST_SECUREOBJECT, FALSE); | ||
765 | ExitOnFailure(hr, "failed to send progress message"); | ||
766 | |||
767 | objectType = SE_UNKNOWN_OBJECT_TYPE; | ||
768 | } | ||
769 | |||
770 | LExit: | ||
771 | ReleaseStr(pwzUser); | ||
772 | ReleaseStr(pwzDomain); | ||
773 | ReleaseStr(pwzTable); | ||
774 | ReleaseStr(pwzObject); | ||
775 | ReleaseStr(pwzData); | ||
776 | ReleaseStr(pwzAccount); | ||
777 | |||
778 | if (pAclNew) | ||
779 | { | ||
780 | ::LocalFree(pAclNew); | ||
781 | } | ||
782 | if (psd) | ||
783 | { | ||
784 | ::LocalFree(psd); | ||
785 | } | ||
786 | if (psid) | ||
787 | { | ||
788 | AclFreeSid(psid); | ||
789 | } | ||
790 | |||
791 | if (FAILED(hr)) | ||
792 | { | ||
793 | er = ERROR_INSTALL_FAILURE; | ||
794 | } | ||
795 | return WcaFinalize(er); | ||
796 | } | ||
797 | |||
798 | extern "C" UINT __stdcall ExecSecureObjectsRollback( | ||
799 | __in MSIHANDLE hInstall | ||
800 | ) | ||
801 | { | ||
802 | // AssertSz(FALSE, "debug ExecSecureObjectsRollback"); | ||
803 | HRESULT hr = S_OK; | ||
804 | DWORD er = ERROR_SUCCESS; | ||
805 | |||
806 | LPWSTR pwz = NULL; | ||
807 | LPWSTR pwzData = NULL; | ||
808 | LPWSTR pwzObject = NULL; | ||
809 | LPWSTR pwzTable = NULL; | ||
810 | LPWSTR pwzSecurityInfo = NULL; | ||
811 | |||
812 | SE_OBJECT_TYPE objectType = SE_UNKNOWN_OBJECT_TYPE; | ||
813 | PSECURITY_DESCRIPTOR psd = NULL; | ||
814 | ULONG psdSize; | ||
815 | SECURITY_DESCRIPTOR_CONTROL sdc = {0}; | ||
816 | SECURITY_INFORMATION si = DACL_SECURITY_INFORMATION; | ||
817 | PACL pDacl = NULL; | ||
818 | BOOL bDaclPresent = false; | ||
819 | BOOL bDaclDefaulted = false; | ||
820 | DWORD dwRevision = 0; | ||
821 | int iProtected; | ||
822 | |||
823 | // initialize | ||
824 | hr = WcaInitialize(hInstall, "ExecSecureObjectsRollback"); | ||
825 | ExitOnFailure(hr, "failed to initialize"); | ||
826 | |||
827 | hr = WcaGetProperty(L"CustomActionData", &pwzData); | ||
828 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
829 | |||
830 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzData); | ||
831 | |||
832 | pwz = pwzData; | ||
833 | |||
834 | hr = WcaReadStringFromCaData(&pwz, &pwzObject); | ||
835 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
836 | |||
837 | hr = WcaReadStringFromCaData(&pwz, &pwzTable); | ||
838 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
839 | |||
840 | objectType = SEObjectTypeFromString(const_cast<LPCWSTR> (pwzTable)); | ||
841 | |||
842 | if (SE_UNKNOWN_OBJECT_TYPE != objectType) | ||
843 | { | ||
844 | hr = WcaReadStringFromCaData(&pwz, &pwzSecurityInfo); | ||
845 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
846 | |||
847 | hr = WcaReadIntegerFromCaData(&pwz, &iProtected); | ||
848 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
849 | |||
850 | if (!::ConvertStringSecurityDescriptorToSecurityDescriptorW(pwzSecurityInfo,SDDL_REVISION_1,&psd,&psdSize)) | ||
851 | { | ||
852 | ExitOnLastError(hr, "failed to convert security descriptor string to a valid security descriptor"); | ||
853 | } | ||
854 | |||
855 | if (!::GetSecurityDescriptorDacl(psd,&bDaclPresent,&pDacl,&bDaclDefaulted)) | ||
856 | { | ||
857 | hr = E_UNEXPECTED; | ||
858 | ExitOnFailure(hr, "failed to get security descriptor's DACL - error code: %d",pwzSecurityInfo,GetLastError()); | ||
859 | } | ||
860 | |||
861 | // The below situation may always be caught by the above if block - the documentation isn't very clear. To be safe, we're going to test for it. | ||
862 | if (!bDaclPresent) | ||
863 | { | ||
864 | hr = E_UNEXPECTED; | ||
865 | ExitOnFailure(hr, "security descriptor does not contain a DACL"); | ||
866 | } | ||
867 | |||
868 | //Need to see if DACL is protected so getting Descriptor information | ||
869 | if (!::GetSecurityDescriptorControl(psd, &sdc, &dwRevision)) | ||
870 | { | ||
871 | ExitOnLastError(hr, "failed to get security descriptor control for object: %ls", pwzObject); | ||
872 | } | ||
873 | |||
874 | // Write a 1 if DACL is protected, 0 otherwise | ||
875 | switch (iProtected) | ||
876 | { | ||
877 | case 0: | ||
878 | // Unnecessary to do anything - leave si to the default flags | ||
879 | break; | ||
880 | |||
881 | case 1: | ||
882 | si = si | PROTECTED_DACL_SECURITY_INFORMATION; | ||
883 | break; | ||
884 | |||
885 | default: | ||
886 | hr = E_UNEXPECTED; | ||
887 | ExitOnFailure(hr, "unrecognized value in CustomActionData"); | ||
888 | break; | ||
889 | } | ||
890 | |||
891 | er = ::SetNamedSecurityInfoW(pwzObject, objectType, si, NULL, NULL, pDacl, NULL); | ||
892 | ExitOnFailure(hr = HRESULT_FROM_WIN32(er), "failed to set security info for object: %ls error code: %d", pwzObject, GetLastError()); | ||
893 | } | ||
894 | else | ||
895 | { | ||
896 | MessageExitOnFailure(hr = E_UNEXPECTED, msierrSecureObjectsUnknownType, "unknown object type: %ls", pwzTable); | ||
897 | } | ||
898 | |||
899 | LExit: | ||
900 | ReleaseStr(pwzData); | ||
901 | ReleaseStr(pwzObject); | ||
902 | ReleaseStr(pwzTable); | ||
903 | ReleaseStr(pwzSecurityInfo); | ||
904 | |||
905 | if (psd) | ||
906 | { | ||
907 | ::LocalFree(psd); | ||
908 | } | ||
909 | |||
910 | if (FAILED(hr)) | ||
911 | { | ||
912 | er = ERROR_INSTALL_FAILURE; | ||
913 | } | ||
914 | return WcaFinalize(er); | ||
915 | } | ||
diff --git a/src/ext/Util/ca/serviceconfig.cpp b/src/ext/Util/ca/serviceconfig.cpp new file mode 100644 index 00000000..04b25ffa --- /dev/null +++ b/src/ext/Util/ca/serviceconfig.cpp | |||
@@ -0,0 +1,821 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | // structs | ||
6 | LPCWSTR wzQUERY_SERVICECONFIG = L"SELECT `ServiceName`, `Component_`, `NewService`, `FirstFailureActionType`, `SecondFailureActionType`, `ThirdFailureActionType`, `ResetPeriodInDays`, `RestartServiceDelayInSeconds`, `ProgramCommandLine`, `RebootMessage` FROM `Wix4ServiceConfig`"; | ||
7 | enum eQUERY_SERVICECONFIG { QSC_SERVICENAME = 1, QSC_COMPONENT, QSC_NEWSERVICE, QSC_FIRSTFAILUREACTIONTYPE, QSC_SECONDFAILUREACTIONTYPE, QSC_THIRDFAILUREACTIONTYPE, QSC_RESETPERIODINDAYS, QSC_RESTARTSERVICEDELAYINSECONDS, QSC_PROGRAMCOMMANDLINE, QSC_REBOOTMESSAGE }; | ||
8 | |||
9 | // consts | ||
10 | LPCWSTR c_wzActionTypeNone = L"none"; | ||
11 | LPCWSTR c_wzActionTypeReboot = L"reboot"; | ||
12 | LPCWSTR c_wzActionTypeRestart = L"restart"; | ||
13 | LPCWSTR c_wzActionTypeRunCommand = L"runCommand"; | ||
14 | |||
15 | // prototypes | ||
16 | static SC_ACTION_TYPE GetSCActionType( | ||
17 | __in LPCWSTR pwzActionTypeName | ||
18 | ); | ||
19 | |||
20 | static HRESULT GetSCActionTypeString( | ||
21 | __in SC_ACTION_TYPE type, | ||
22 | __out_ecount(cchActionTypeString) LPWSTR wzActionTypeString, | ||
23 | __in DWORD cchActionTypeString | ||
24 | ); | ||
25 | |||
26 | static HRESULT GetService( | ||
27 | __in SC_HANDLE hSCM, | ||
28 | __in LPCWSTR wzService, | ||
29 | __in DWORD dwOpenServiceAccess, | ||
30 | __out SC_HANDLE* phService | ||
31 | ); | ||
32 | |||
33 | static HRESULT ConfigureService( | ||
34 | __in SC_HANDLE hSCM, | ||
35 | __in SC_HANDLE hService, | ||
36 | __in LPCWSTR wzServiceName, | ||
37 | __in DWORD dwRestartServiceDelayInSeconds, | ||
38 | __in LPCWSTR wzFirstFailureActionType, | ||
39 | __in LPCWSTR wzSecondFailureActionType, | ||
40 | __in LPCWSTR wzThirdFailureActionType, | ||
41 | __in DWORD dwResetPeriodInDays, | ||
42 | __in LPWSTR wzRebootMessage, | ||
43 | __in LPWSTR wzProgramCommandLine | ||
44 | ); | ||
45 | |||
46 | |||
47 | /****************************************************************** | ||
48 | SchedServiceConfig - entry point for SchedServiceConfig Custom Action | ||
49 | |||
50 | called as Type 1 CustomAction (binary DLL) from Windows Installer | ||
51 | in InstallExecuteSequence before CaExecServiceConfig | ||
52 | ********************************************************************/ | ||
53 | extern "C" UINT __stdcall SchedServiceConfig( | ||
54 | __in MSIHANDLE hInstall | ||
55 | ) | ||
56 | { | ||
57 | //AssertSz(FALSE, "debug SchedServiceConfig"); | ||
58 | HRESULT hr = S_OK; | ||
59 | UINT er = ERROR_SUCCESS; | ||
60 | |||
61 | LPWSTR pwzScriptKey = NULL; | ||
62 | LPWSTR pwzCustomActionData = NULL; | ||
63 | |||
64 | PMSIHANDLE hView = NULL; | ||
65 | PMSIHANDLE hRec = NULL; | ||
66 | LPWSTR pwzData = NULL; | ||
67 | int iData = 0; | ||
68 | DWORD cServices = 0; | ||
69 | |||
70 | // initialize | ||
71 | hr = WcaInitialize(hInstall, "SchedServiceConfig"); | ||
72 | ExitOnFailure(hr, "Failed to initialize."); | ||
73 | |||
74 | // Get the script key for this CustomAction and put it on the front of the | ||
75 | // CustomActionData of the install action. | ||
76 | hr = WcaCaScriptCreateKey(&pwzScriptKey); | ||
77 | ExitOnFailure(hr, "Failed to get encoding key."); | ||
78 | |||
79 | hr = WcaWriteStringToCaData(pwzScriptKey, &pwzCustomActionData); | ||
80 | ExitOnFailure(hr, "Failed to add encoding key to CustomActionData."); | ||
81 | |||
82 | // Loop through all the services to be configured. | ||
83 | hr = WcaOpenExecuteView(wzQUERY_SERVICECONFIG, &hView); | ||
84 | ExitOnFailure(hr, "Failed to open view on Wix4ServiceConfig table."); | ||
85 | |||
86 | while (S_OK == (hr = WcaFetchRecord(hView, &hRec))) | ||
87 | { | ||
88 | INSTALLSTATE isInstalled = INSTALLSTATE_UNKNOWN; | ||
89 | INSTALLSTATE isAction = INSTALLSTATE_UNKNOWN; | ||
90 | |||
91 | // Get component name to check if we are installing it. If so | ||
92 | // then add the table data to the CustomActionData, otherwise | ||
93 | // skip it. | ||
94 | hr = WcaGetRecordString(hRec, QSC_COMPONENT, &pwzData); | ||
95 | ExitOnFailure(hr, "Failed to get component name"); | ||
96 | |||
97 | hr = ::MsiGetComponentStateW(hInstall, pwzData, &isInstalled, &isAction); | ||
98 | ExitOnFailure(hr = HRESULT_FROM_WIN32(hr), "Failed to get install state for Component: %ls", pwzData); | ||
99 | |||
100 | if (WcaIsInstalling(isInstalled, isAction)) | ||
101 | { | ||
102 | // Add the data to the CustomActionData (for install). | ||
103 | hr = WcaGetRecordFormattedString(hRec, QSC_SERVICENAME, &pwzData); | ||
104 | ExitOnFailure(hr, "Failed to get name of service."); | ||
105 | hr = WcaWriteStringToCaData(pwzData, &pwzCustomActionData); | ||
106 | ExitOnFailure(hr, "Failed to add name to CustomActionData."); | ||
107 | |||
108 | hr = WcaGetRecordInteger(hRec, QSC_NEWSERVICE, &iData); | ||
109 | ExitOnFailure(hr, "Failed to get Wix4ServiceConfig.NewService."); | ||
110 | hr = WcaWriteIntegerToCaData(0 != iData, &pwzCustomActionData); | ||
111 | ExitOnFailure(hr, "Failed to add NewService data to CustomActionData"); | ||
112 | |||
113 | hr = WcaGetRecordString(hRec, QSC_FIRSTFAILUREACTIONTYPE, &pwzData); | ||
114 | ExitOnFailure(hr, "failed to get first failure action type"); | ||
115 | hr = WcaWriteStringToCaData(pwzData, &pwzCustomActionData); | ||
116 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
117 | |||
118 | hr = WcaGetRecordString(hRec, QSC_SECONDFAILUREACTIONTYPE, &pwzData); | ||
119 | ExitOnFailure(hr, "failed to get second failure action type"); | ||
120 | hr = WcaWriteStringToCaData(pwzData, &pwzCustomActionData); | ||
121 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
122 | |||
123 | hr = WcaGetRecordString(hRec, QSC_THIRDFAILUREACTIONTYPE, &pwzData); | ||
124 | ExitOnFailure(hr, "failed to get third failure action type"); | ||
125 | hr = WcaWriteStringToCaData(pwzData, &pwzCustomActionData); | ||
126 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
127 | |||
128 | hr = WcaGetRecordInteger(hRec, QSC_RESETPERIODINDAYS, &iData); | ||
129 | if (S_FALSE == hr) // deal w/ possible null value | ||
130 | { | ||
131 | iData = 0; | ||
132 | } | ||
133 | ExitOnFailure(hr, "failed to get reset period in days between service restart attempts."); | ||
134 | hr = WcaWriteIntegerToCaData(iData, &pwzCustomActionData); | ||
135 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
136 | |||
137 | hr = WcaGetRecordInteger(hRec, QSC_RESTARTSERVICEDELAYINSECONDS, &iData); | ||
138 | if (S_FALSE == hr) // deal w/ possible null value | ||
139 | { | ||
140 | iData = 0; | ||
141 | } | ||
142 | ExitOnFailure(hr, "failed to get server restart delay value."); | ||
143 | hr = WcaWriteIntegerToCaData(iData, &pwzCustomActionData); | ||
144 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
145 | |||
146 | hr = WcaGetRecordFormattedString(hRec, QSC_PROGRAMCOMMANDLINE, &pwzData); // null value already dealt w/ properly | ||
147 | ExitOnFailure(hr, "failed to get command line to run on service failure."); | ||
148 | hr = WcaWriteStringToCaData(pwzData, &pwzCustomActionData); | ||
149 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
150 | |||
151 | hr = WcaGetRecordString(hRec, QSC_REBOOTMESSAGE, &pwzData); // null value already dealt w/ properly | ||
152 | ExitOnFailure(hr, "failed to get message to send to users when server reboots due to service failure."); | ||
153 | hr = WcaWriteStringToCaData(pwzData, &pwzCustomActionData); | ||
154 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
155 | |||
156 | ++cServices; | ||
157 | } | ||
158 | } | ||
159 | |||
160 | // if we looped through all records all is well | ||
161 | if (E_NOMOREITEMS == hr) | ||
162 | { | ||
163 | hr = S_OK; | ||
164 | } | ||
165 | ExitOnFailure(hr, "failed while looping through all objects to secure"); | ||
166 | |||
167 | // setup CustomActionData and add to progress bar for download | ||
168 | if (0 < cServices) | ||
169 | { | ||
170 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"RollbackServiceConfig"), pwzScriptKey, cServices * COST_SERVICECONFIG); | ||
171 | ExitOnFailure(hr, "failed to schedule RollbackServiceConfig action"); | ||
172 | |||
173 | hr = WcaDoDeferredAction(CUSTOM_ACTION_DECORATION(L"ExecServiceConfig"), pwzCustomActionData, cServices * COST_SERVICECONFIG); | ||
174 | ExitOnFailure(hr, "failed to schedule ExecServiceConfig action"); | ||
175 | } | ||
176 | |||
177 | LExit: | ||
178 | ReleaseStr(pwzData); | ||
179 | ReleaseStr(pwzCustomActionData); | ||
180 | ReleaseStr(pwzScriptKey); | ||
181 | |||
182 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
183 | return WcaFinalize(er); | ||
184 | } | ||
185 | |||
186 | |||
187 | /****************************************************************** | ||
188 | CaExecServiceConfig - entry point for ServiceConfig Custom Action. | ||
189 | |||
190 | NOTE: deferred CustomAction since it modifies the machine | ||
191 | NOTE: CustomActionData == wzServiceName\tfNewService\twzFirstFailureActionType\twzSecondFailureActionType\twzThirdFailureActionType\tdwResetPeriodInDays\tdwRestartServiceDelayInSeconds\twzProgramCommandLine\twzRebootMessage\twzServiceName\tfNewService\t... | ||
192 | *******************************************************************/ | ||
193 | extern "C" UINT __stdcall ExecServiceConfig( | ||
194 | __in MSIHANDLE hInstall | ||
195 | ) | ||
196 | { | ||
197 | //AssertSz(FALSE, "debug ExecServiceConfig"); | ||
198 | HRESULT hr = S_OK; | ||
199 | DWORD er = 0; | ||
200 | |||
201 | LPWSTR pwzCustomActionData = NULL; | ||
202 | LPWSTR pwz = NULL; | ||
203 | |||
204 | LPWSTR pwzScriptKey = NULL; | ||
205 | WCA_CASCRIPT_HANDLE hRollbackScript = NULL; | ||
206 | |||
207 | LPWSTR pwzServiceName = NULL; | ||
208 | BOOL fNewService = FALSE; | ||
209 | LPWSTR pwzFirstFailureActionType = NULL; | ||
210 | LPWSTR pwzSecondFailureActionType = NULL; | ||
211 | LPWSTR pwzThirdFailureActionType = NULL; | ||
212 | LPWSTR pwzProgramCommandLine = NULL; | ||
213 | LPWSTR pwzRebootMessage = NULL; | ||
214 | DWORD dwResetPeriodInDays = 0; | ||
215 | DWORD dwRestartServiceDelayInSeconds = 0; | ||
216 | |||
217 | LPVOID lpMsgBuf = NULL; | ||
218 | SC_HANDLE hSCM = NULL; | ||
219 | SC_HANDLE hService = NULL; | ||
220 | |||
221 | DWORD dwRestartDelay = 0; | ||
222 | WCHAR wzActionName[32] = { 0 }; | ||
223 | |||
224 | DWORD cbExistingServiceConfig = 0; | ||
225 | |||
226 | SERVICE_FAILURE_ACTIONSW* psfa = NULL; | ||
227 | |||
228 | // initialize | ||
229 | hr = WcaInitialize(hInstall, "ExecServiceConfig"); | ||
230 | ExitOnFailure(hr, "failed to initialize"); | ||
231 | |||
232 | // Open the Services Control Manager up front. | ||
233 | hSCM = ::OpenSCManagerW(NULL, NULL, SC_MANAGER_CONNECT); | ||
234 | if (NULL == hSCM) | ||
235 | { | ||
236 | er = ::GetLastError(); | ||
237 | hr = HRESULT_FROM_WIN32(er); | ||
238 | |||
239 | #pragma prefast(push) | ||
240 | #pragma prefast(disable:25028) | ||
241 | ::FormatMessageW(FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS, NULL, er, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), (LPWSTR)&lpMsgBuf, 0, NULL); | ||
242 | #pragma prefast(pop) | ||
243 | |||
244 | ExitOnFailure(hr, "Failed to get handle to SCM. Error: %ls", (LPWSTR)lpMsgBuf); | ||
245 | } | ||
246 | |||
247 | // First, get the script key out of the CustomActionData and | ||
248 | // use that to create the rollback script for this action. | ||
249 | hr = WcaGetProperty( L"CustomActionData", &pwzCustomActionData); | ||
250 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
251 | |||
252 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzCustomActionData); | ||
253 | |||
254 | pwz = pwzCustomActionData; | ||
255 | |||
256 | hr = WcaReadStringFromCaData(&pwz, &pwzScriptKey); | ||
257 | if (!pwzScriptKey) | ||
258 | { | ||
259 | hr = E_UNEXPECTED; | ||
260 | ExitOnFailure(hr, "Failed due to unexpected CustomActionData passed."); | ||
261 | } | ||
262 | ExitOnFailure(hr, "Failed to read encoding key from CustomActionData."); | ||
263 | |||
264 | hr = WcaCaScriptCreate(WCA_ACTION_INSTALL, WCA_CASCRIPT_ROLLBACK, FALSE, pwzScriptKey, FALSE, &hRollbackScript); | ||
265 | ExitOnFailure(hr, "Failed to open rollback CustomAction script."); | ||
266 | |||
267 | // Next, loop through the rest of the CustomActionData, processing | ||
268 | // each service config row in turn. | ||
269 | while (pwz && *pwz) | ||
270 | { | ||
271 | hr = WcaReadStringFromCaData(&pwz, &pwzServiceName); | ||
272 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
273 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&fNewService)); | ||
274 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
275 | hr = WcaReadStringFromCaData(&pwz, &pwzFirstFailureActionType); | ||
276 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
277 | hr = WcaReadStringFromCaData(&pwz, &pwzSecondFailureActionType); | ||
278 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
279 | hr = WcaReadStringFromCaData(&pwz, &pwzThirdFailureActionType); | ||
280 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
281 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&dwResetPeriodInDays)); | ||
282 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
283 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&dwRestartServiceDelayInSeconds)); | ||
284 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
285 | hr = WcaReadStringFromCaData(&pwz, &pwzProgramCommandLine); | ||
286 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
287 | hr = WcaReadStringFromCaData(&pwz, &pwzRebootMessage); | ||
288 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
289 | |||
290 | WcaLog(LOGMSG_VERBOSE, "Configuring Service: %ls", pwzServiceName); | ||
291 | |||
292 | // Open the handle with all the permissions we might need: | ||
293 | // SERVICE_QUERY_CONFIG is needed for QueryServiceConfig2(). | ||
294 | // SERVICE_CHANGE_CONFIG is needed for ChangeServiceConfig2(). | ||
295 | // SERVICE_START is required in order to handle SC_ACTION_RESTART action. | ||
296 | hr = GetService(hSCM, pwzServiceName, SERVICE_QUERY_CONFIG | SERVICE_CHANGE_CONFIG | SERVICE_START, &hService); | ||
297 | ExitOnFailure(hr, "Failed to get service: %ls", pwzServiceName); | ||
298 | |||
299 | // If we are configuring a service that existed on the machine, we need to | ||
300 | // read the existing service configuration and write it out to the rollback | ||
301 | // log so rollback can put it back if anything goes wrong. | ||
302 | if (!fNewService) | ||
303 | { | ||
304 | // First, read the existing service config. | ||
305 | if (!::QueryServiceConfig2W(hService, SERVICE_CONFIG_FAILURE_ACTIONS, NULL, 0, &cbExistingServiceConfig) && ERROR_INSUFFICIENT_BUFFER != ::GetLastError()) | ||
306 | { | ||
307 | ExitWithLastError(hr, "Failed to get current service config info."); | ||
308 | } | ||
309 | |||
310 | psfa = static_cast<LPSERVICE_FAILURE_ACTIONSW>(MemAlloc(cbExistingServiceConfig, TRUE)); | ||
311 | ExitOnNull(psfa, hr, E_OUTOFMEMORY, "failed to allocate memory for service failure actions."); | ||
312 | |||
313 | if (!::QueryServiceConfig2W(hService, SERVICE_CONFIG_FAILURE_ACTIONS, (LPBYTE)psfa, cbExistingServiceConfig, &cbExistingServiceConfig)) | ||
314 | { | ||
315 | ExitOnLastError(hr, "failed to Query Service."); | ||
316 | } | ||
317 | |||
318 | // Build up rollback log so we can restore service state if necessary | ||
319 | hr = WcaCaScriptWriteString(hRollbackScript, pwzServiceName); | ||
320 | ExitOnFailure(hr, "Failed to add service name to Rollback Log"); | ||
321 | |||
322 | // If this service struct is empty, fill in default values | ||
323 | if (3 > psfa->cActions) | ||
324 | { | ||
325 | hr = WcaCaScriptWriteString(hRollbackScript, c_wzActionTypeNone); | ||
326 | ExitOnFailure(hr, "failed to add data to Rollback CustomActionData"); | ||
327 | |||
328 | hr = WcaCaScriptWriteString(hRollbackScript, c_wzActionTypeNone); | ||
329 | ExitOnFailure(hr, "failed to add data to Rollback CustomActionData"); | ||
330 | |||
331 | hr = WcaCaScriptWriteString(hRollbackScript, c_wzActionTypeNone); | ||
332 | ExitOnFailure(hr, "failed to add data to Rollback CustomActionData"); | ||
333 | } | ||
334 | else | ||
335 | { | ||
336 | // psfa actually had actions defined, so use the first three. | ||
337 | for (int i = 0; i < 3; ++i) | ||
338 | { | ||
339 | hr = GetSCActionTypeString(psfa->lpsaActions[i].Type, wzActionName, countof(wzActionName)); | ||
340 | ExitOnFailure(hr, "failed to query SFA object"); | ||
341 | |||
342 | if (SC_ACTION_RESTART == psfa->lpsaActions[i].Type) | ||
343 | { | ||
344 | dwRestartDelay = psfa->lpsaActions[i].Delay / 1000; | ||
345 | } | ||
346 | |||
347 | hr = WcaCaScriptWriteString(hRollbackScript, wzActionName); | ||
348 | ExitOnFailure(hr, "failed to add data to Rollback CustomActionData"); | ||
349 | } | ||
350 | } | ||
351 | |||
352 | hr = WcaCaScriptWriteNumber(hRollbackScript, psfa->dwResetPeriod / (24 * 60 * 60)); | ||
353 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
354 | |||
355 | hr = WcaCaScriptWriteNumber(hRollbackScript, dwRestartDelay); | ||
356 | ExitOnFailure(hr, "failed to add data to CustomActionData"); | ||
357 | |||
358 | // Handle the null cases. | ||
359 | if (!psfa->lpCommand) | ||
360 | { | ||
361 | psfa->lpCommand = L""; | ||
362 | } | ||
363 | hr = WcaCaScriptWriteString(hRollbackScript, psfa->lpCommand); | ||
364 | ExitOnFailure(hr, "failed to add data to Rollback CustomActionData"); | ||
365 | |||
366 | // Handle the null cases. | ||
367 | if (!psfa->lpRebootMsg) | ||
368 | { | ||
369 | psfa->lpRebootMsg = L""; | ||
370 | } | ||
371 | hr = WcaCaScriptWriteString(hRollbackScript, psfa->lpRebootMsg); | ||
372 | ExitOnFailure(hr, "failed to add data to Rollback CustomActionData"); | ||
373 | |||
374 | // Nudge the system to get all our rollback data written to disk. | ||
375 | WcaCaScriptFlush(hRollbackScript); | ||
376 | |||
377 | ReleaseNullMem(psfa); | ||
378 | } | ||
379 | |||
380 | hr = ConfigureService(hSCM, hService, pwzServiceName, dwRestartServiceDelayInSeconds, pwzFirstFailureActionType, | ||
381 | pwzSecondFailureActionType, pwzThirdFailureActionType, dwResetPeriodInDays, pwzRebootMessage, pwzProgramCommandLine); | ||
382 | ExitOnFailure(hr, "Failed to configure service: %ls", pwzServiceName); | ||
383 | |||
384 | hr = WcaProgressMessage(COST_SERVICECONFIG, FALSE); | ||
385 | ExitOnFailure(hr, "failed to send progress message"); | ||
386 | |||
387 | // Per-service cleanup | ||
388 | ::CloseServiceHandle(hService); | ||
389 | hService = NULL; | ||
390 | dwResetPeriodInDays = 0; | ||
391 | dwRestartServiceDelayInSeconds = 0; | ||
392 | } | ||
393 | |||
394 | LExit: | ||
395 | WcaCaScriptClose(hRollbackScript, WCA_CASCRIPT_CLOSE_PRESERVE); | ||
396 | |||
397 | if (lpMsgBuf) | ||
398 | { | ||
399 | ::LocalFree(lpMsgBuf); | ||
400 | } | ||
401 | |||
402 | if (hService) | ||
403 | { | ||
404 | ::CloseServiceHandle(hService); | ||
405 | } | ||
406 | |||
407 | if (hSCM) | ||
408 | { | ||
409 | ::CloseServiceHandle(hSCM); | ||
410 | } | ||
411 | |||
412 | ReleaseMem(psfa); | ||
413 | |||
414 | ReleaseStr(pwzRebootMessage); | ||
415 | ReleaseStr(pwzProgramCommandLine); | ||
416 | ReleaseStr(pwzThirdFailureActionType); | ||
417 | ReleaseStr(pwzSecondFailureActionType); | ||
418 | ReleaseStr(pwzFirstFailureActionType); | ||
419 | ReleaseStr(pwzServiceName); | ||
420 | ReleaseStr(pwzScriptKey); | ||
421 | ReleaseStr(pwzCustomActionData); | ||
422 | |||
423 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
424 | return WcaFinalize(er); | ||
425 | } | ||
426 | |||
427 | |||
428 | /****************************************************************** | ||
429 | RollbackServiceConfig - entry point for ServiceConfig rollback | ||
430 | Custom Action. | ||
431 | |||
432 | NOTE: CustomActionScript Data == wzServiceName\twzFirstFailureActionType\twzSecondFailureActionType\twzThirdFailureActionType\tdwResetPeriodInDays\tdwRestartServiceDelayInSeconds\twzProgramCommandLine\twzRebootMessage\twzServiceName\t... | ||
433 | *******************************************************************/ | ||
434 | extern "C" UINT __stdcall RollbackServiceConfig( | ||
435 | __in MSIHANDLE hInstall | ||
436 | ) | ||
437 | { | ||
438 | //AssertSz(FALSE, "debug RollbackServiceConfig"); | ||
439 | HRESULT hr = S_OK; | ||
440 | DWORD er = 0; | ||
441 | |||
442 | LPWSTR pwzCustomActionData = NULL; | ||
443 | LPWSTR pwz = NULL; | ||
444 | |||
445 | LPWSTR pwzScriptKey = NULL; | ||
446 | WCA_CASCRIPT_HANDLE hRollbackScript = NULL; | ||
447 | |||
448 | LPWSTR pwzServiceName = NULL; | ||
449 | LPWSTR pwzFirstFailureActionType = NULL; | ||
450 | LPWSTR pwzSecondFailureActionType = NULL; | ||
451 | LPWSTR pwzThirdFailureActionType = NULL; | ||
452 | LPWSTR pwzProgramCommandLine = NULL; | ||
453 | LPWSTR pwzRebootMessage = NULL; | ||
454 | DWORD dwResetPeriodInDays = 0; | ||
455 | DWORD dwRestartServiceDelayInSeconds = 0; | ||
456 | |||
457 | LPVOID lpMsgBuf = NULL; | ||
458 | SC_HANDLE hSCM = NULL; | ||
459 | SC_HANDLE hService = NULL; | ||
460 | |||
461 | // initialize | ||
462 | hr = WcaInitialize(hInstall, "RollbackServiceConfig"); | ||
463 | ExitOnFailure(hr, "Failed to initialize 'RollbackServiceConfig'."); | ||
464 | |||
465 | // Open the Services Control Manager up front. | ||
466 | hSCM = ::OpenSCManagerW(NULL, NULL, SC_MANAGER_CONNECT); | ||
467 | if (NULL == hSCM) | ||
468 | { | ||
469 | er = ::GetLastError(); | ||
470 | hr = HRESULT_FROM_WIN32(er); | ||
471 | |||
472 | #pragma prefast(push) | ||
473 | #pragma prefast(disable:25028) | ||
474 | ::FormatMessageW(FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS, NULL, er, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), (LPWSTR)&lpMsgBuf, 0, NULL); | ||
475 | #pragma prefast(pop) | ||
476 | |||
477 | ExitOnFailure(hr, "Failed to get handle to SCM. Error: %ls", (LPWSTR)lpMsgBuf); | ||
478 | |||
479 | // Make sure we still abort, in case hSCM was NULL but no error was returned from GetLastError | ||
480 | ExitOnNull(hSCM, hr, E_POINTER, "Getting handle to SCM reported success, but no handle was returned."); | ||
481 | } | ||
482 | |||
483 | // Get the script key from the CustomAction data and use it to open | ||
484 | // the rollback log and read the data over the CustomActionData | ||
485 | // because all of the information is in the script data not the | ||
486 | // CustomActionData. | ||
487 | hr = WcaGetProperty( L"CustomActionData", &pwzCustomActionData); | ||
488 | ExitOnFailure(hr, "failed to get CustomActionData"); | ||
489 | |||
490 | WcaLog(LOGMSG_TRACEONLY, "CustomActionData: %ls", pwzCustomActionData); | ||
491 | |||
492 | pwz = pwzCustomActionData; | ||
493 | |||
494 | hr = WcaReadStringFromCaData(&pwz, &pwzScriptKey); | ||
495 | if (!pwzScriptKey) | ||
496 | { | ||
497 | hr = E_UNEXPECTED; | ||
498 | ExitOnFailure(hr, "Failed due to unexpected CustomActionData passed."); | ||
499 | } | ||
500 | ExitOnFailure(hr, "Failed to read encoding key from CustomActionData."); | ||
501 | |||
502 | hr = WcaCaScriptOpen(WCA_ACTION_INSTALL, WCA_CASCRIPT_ROLLBACK, FALSE, pwzScriptKey, &hRollbackScript); | ||
503 | ExitOnFailure(hr, "Failed to open rollback CustomAction script."); | ||
504 | |||
505 | hr = WcaCaScriptReadAsCustomActionData(hRollbackScript, &pwzCustomActionData); | ||
506 | ExitOnFailure(hr, "Failed to read rollback script into CustomAction data."); | ||
507 | |||
508 | // Loop through the script's CustomActionData, processing each | ||
509 | // service config in turn. | ||
510 | pwz = pwzCustomActionData; | ||
511 | while (pwz && *pwz) | ||
512 | { | ||
513 | hr = WcaReadStringFromCaData(&pwz, &pwzServiceName); | ||
514 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
515 | hr = WcaReadStringFromCaData(&pwz, &pwzFirstFailureActionType); | ||
516 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
517 | hr = WcaReadStringFromCaData(&pwz, &pwzSecondFailureActionType); | ||
518 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
519 | hr = WcaReadStringFromCaData(&pwz, &pwzThirdFailureActionType); | ||
520 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
521 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&dwResetPeriodInDays)); | ||
522 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
523 | hr = WcaReadIntegerFromCaData(&pwz, reinterpret_cast<int*>(&dwRestartServiceDelayInSeconds)); | ||
524 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
525 | hr = WcaReadStringFromCaData(&pwz, &pwzProgramCommandLine); | ||
526 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
527 | hr = WcaReadStringFromCaData(&pwz, &pwzRebootMessage); | ||
528 | ExitOnFailure(hr, "failed to process CustomActionData"); | ||
529 | |||
530 | WcaLog(LOGMSG_VERBOSE, "Reconfiguring Service: %ls", pwzServiceName); | ||
531 | |||
532 | // Open the handle with all the permissions we might need. | ||
533 | // SERVICE_CHANGE_CONFIG is needed for ChangeServiceConfig2(). | ||
534 | // SERVICE_START is required in order to handle SC_ACTION_RESTART action. | ||
535 | hr = GetService(hSCM, pwzServiceName, SERVICE_CHANGE_CONFIG | SERVICE_START, &hService); | ||
536 | ExitOnFailure(hr, "Failed to get service: %ls", pwzServiceName); | ||
537 | |||
538 | hr = ConfigureService(hSCM, hService, pwzServiceName, dwRestartServiceDelayInSeconds, pwzFirstFailureActionType, | ||
539 | pwzSecondFailureActionType, pwzThirdFailureActionType, dwResetPeriodInDays, pwzRebootMessage, pwzProgramCommandLine); | ||
540 | ExitOnFailure(hr, "Failed to configure service: %ls", pwzServiceName); | ||
541 | |||
542 | hr = WcaProgressMessage(COST_SERVICECONFIG, FALSE); | ||
543 | ExitOnFailure(hr, "failed to send progress message"); | ||
544 | |||
545 | // Per-service cleanup | ||
546 | ::CloseServiceHandle(hService); | ||
547 | hService = NULL; | ||
548 | dwResetPeriodInDays = 0; | ||
549 | dwRestartServiceDelayInSeconds = 0; | ||
550 | } | ||
551 | |||
552 | LExit: | ||
553 | if (lpMsgBuf) // Allocated with FormatString. | ||
554 | { | ||
555 | ::LocalFree(lpMsgBuf); | ||
556 | } | ||
557 | |||
558 | if (hService) | ||
559 | { | ||
560 | ::CloseServiceHandle(hService); | ||
561 | } | ||
562 | |||
563 | if (hSCM) | ||
564 | { | ||
565 | ::CloseServiceHandle(hSCM); | ||
566 | } | ||
567 | |||
568 | WcaCaScriptClose(hRollbackScript, WCA_CASCRIPT_CLOSE_DELETE); | ||
569 | |||
570 | ReleaseStr(pwzRebootMessage); | ||
571 | ReleaseStr(pwzProgramCommandLine); | ||
572 | ReleaseStr(pwzThirdFailureActionType); | ||
573 | ReleaseStr(pwzSecondFailureActionType); | ||
574 | ReleaseStr(pwzFirstFailureActionType); | ||
575 | ReleaseStr(pwzServiceName); | ||
576 | ReleaseStr(pwzScriptKey); | ||
577 | ReleaseStr(pwzCustomActionData); | ||
578 | |||
579 | er = SUCCEEDED(hr) ? ERROR_SUCCESS : ERROR_INSTALL_FAILURE; | ||
580 | return WcaFinalize(er); | ||
581 | } | ||
582 | |||
583 | |||
584 | /********************************************************** | ||
585 | GetSCActionType - helper function to return the SC_ACTION_TYPE | ||
586 | for a given string matching the allowed set. | ||
587 | REBOOT, RESTART, RUN_COMMAND and NONE | ||
588 | **********************************************************/ | ||
589 | static SC_ACTION_TYPE GetSCActionType( | ||
590 | __in LPCWSTR pwzActionTypeName | ||
591 | ) | ||
592 | { | ||
593 | SC_ACTION_TYPE actionType; | ||
594 | |||
595 | // verify that action types are valid. if not, just default to NONE | ||
596 | if (0 == lstrcmpiW(c_wzActionTypeReboot, pwzActionTypeName)) | ||
597 | { | ||
598 | actionType = SC_ACTION_REBOOT; | ||
599 | } | ||
600 | else if (0 == lstrcmpiW(c_wzActionTypeRestart, pwzActionTypeName)) | ||
601 | { | ||
602 | actionType = SC_ACTION_RESTART; | ||
603 | } | ||
604 | else if (0 == lstrcmpiW(c_wzActionTypeRunCommand, pwzActionTypeName)) | ||
605 | { | ||
606 | actionType = SC_ACTION_RUN_COMMAND; | ||
607 | } | ||
608 | else | ||
609 | { | ||
610 | // default to none | ||
611 | actionType = SC_ACTION_NONE; | ||
612 | } | ||
613 | |||
614 | return actionType; | ||
615 | } | ||
616 | |||
617 | |||
618 | static HRESULT GetSCActionTypeString( | ||
619 | __in SC_ACTION_TYPE type, | ||
620 | __out_ecount(cchActionTypeString) LPWSTR wzActionTypeString, | ||
621 | __in DWORD cchActionTypeString | ||
622 | ) | ||
623 | { | ||
624 | HRESULT hr = S_OK; | ||
625 | |||
626 | switch (type) | ||
627 | { | ||
628 | case SC_ACTION_REBOOT: | ||
629 | hr = StringCchCopyW(wzActionTypeString, cchActionTypeString, c_wzActionTypeReboot); | ||
630 | ExitOnFailure(hr, "Failed to copy 'reboot' into action type."); | ||
631 | break; | ||
632 | case SC_ACTION_RESTART: | ||
633 | hr = StringCchCopyW(wzActionTypeString, cchActionTypeString, c_wzActionTypeRestart); | ||
634 | ExitOnFailure(hr, "Failed to copy 'restart' into action type."); | ||
635 | break; | ||
636 | case SC_ACTION_RUN_COMMAND: | ||
637 | hr = StringCchCopyW(wzActionTypeString, cchActionTypeString, c_wzActionTypeRunCommand); | ||
638 | ExitOnFailure(hr, "Failed to copy 'runCommand' into action type."); | ||
639 | break; | ||
640 | case SC_ACTION_NONE: | ||
641 | hr = StringCchCopyW(wzActionTypeString, cchActionTypeString, c_wzActionTypeNone); | ||
642 | ExitOnFailure(hr, "Failed to copy 'none' into action type."); | ||
643 | break; | ||
644 | default: | ||
645 | break; | ||
646 | } | ||
647 | |||
648 | LExit: | ||
649 | return hr; | ||
650 | } | ||
651 | |||
652 | |||
653 | static HRESULT GetService( | ||
654 | __in SC_HANDLE hSCM, | ||
655 | __in LPCWSTR wzService, | ||
656 | __in DWORD dwOpenServiceAccess, | ||
657 | __out SC_HANDLE* phService | ||
658 | ) | ||
659 | { | ||
660 | HRESULT hr = S_OK; | ||
661 | DWORD er = ERROR_SUCCESS; | ||
662 | LPVOID lpMsgBuf = NULL; | ||
663 | |||
664 | *phService = ::OpenServiceW(hSCM, wzService, dwOpenServiceAccess); | ||
665 | if (NULL == *phService) | ||
666 | { | ||
667 | er = ::GetLastError(); | ||
668 | hr = HRESULT_FROM_WIN32(er); | ||
669 | if (ERROR_SERVICE_DOES_NOT_EXIST == er) | ||
670 | { | ||
671 | ExitOnFailure(hr, "Service '%ls' does not exist on this system.", wzService); | ||
672 | } | ||
673 | else | ||
674 | { | ||
675 | #pragma prefast(push) | ||
676 | #pragma prefast(disable:25028) | ||
677 | ::FormatMessageW(FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS, NULL, er, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), (LPWSTR)&lpMsgBuf, 0, NULL); | ||
678 | #pragma prefast(pop) | ||
679 | |||
680 | ExitOnFailure(hr, "Failed to get handle to the service '%ls'. Error: %ls", wzService, (LPWSTR)lpMsgBuf); | ||
681 | } | ||
682 | } | ||
683 | |||
684 | LExit: | ||
685 | if (lpMsgBuf) // Allocated with FormatString. | ||
686 | { | ||
687 | ::LocalFree(lpMsgBuf); | ||
688 | } | ||
689 | |||
690 | return hr; | ||
691 | } | ||
692 | |||
693 | |||
694 | static HRESULT ConfigureService( | ||
695 | __in SC_HANDLE /*hSCM*/, | ||
696 | __in SC_HANDLE hService, | ||
697 | __in LPCWSTR wzServiceName, | ||
698 | __in DWORD dwRestartServiceDelayInSeconds, | ||
699 | __in LPCWSTR wzFirstFailureActionType, | ||
700 | __in LPCWSTR wzSecondFailureActionType, | ||
701 | __in LPCWSTR wzThirdFailureActionType, | ||
702 | __in DWORD dwResetPeriodInDays, | ||
703 | __in LPWSTR wzRebootMessage, | ||
704 | __in LPWSTR wzProgramCommandLine | ||
705 | ) | ||
706 | { | ||
707 | HRESULT hr = S_OK; | ||
708 | DWORD er = ERROR_SUCCESS; | ||
709 | |||
710 | HANDLE hToken = NULL; | ||
711 | TOKEN_PRIVILEGES priv = { 0 }; | ||
712 | TOKEN_PRIVILEGES* pPrevPriv = NULL; | ||
713 | DWORD cbPrevPriv = 0; | ||
714 | BOOL fAdjustedPrivileges = FALSE; | ||
715 | |||
716 | SC_ACTION actions[3]; // the UI always shows 3 actions, so we'll always do 3 | ||
717 | SERVICE_FAILURE_ACTIONSW sfa; | ||
718 | LPVOID lpMsgBuf = NULL; | ||
719 | |||
720 | // Always get the shutdown privilege in case we need to configure service to reboot. | ||
721 | if (!::OpenProcessToken(::GetCurrentProcess(), TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES, &hToken)) | ||
722 | { | ||
723 | ExitWithLastError(hr, "Failed to get process token."); | ||
724 | } | ||
725 | |||
726 | priv.PrivilegeCount = 1; | ||
727 | priv.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED; | ||
728 | if (!::LookupPrivilegeValueW(NULL, L"SeShutdownPrivilege", &priv.Privileges[0].Luid)) | ||
729 | { | ||
730 | ExitWithLastError(hr, "Failed to get shutdown privilege LUID."); | ||
731 | } | ||
732 | |||
733 | cbPrevPriv = sizeof(TOKEN_PRIVILEGES); | ||
734 | pPrevPriv = static_cast<TOKEN_PRIVILEGES*>(MemAlloc(cbPrevPriv, TRUE)); | ||
735 | ExitOnNull(pPrevPriv, hr, E_OUTOFMEMORY, "Failed to allocate memory for empty previous privileges."); | ||
736 | |||
737 | if (!::AdjustTokenPrivileges(hToken, FALSE, &priv, cbPrevPriv, pPrevPriv, &cbPrevPriv)) | ||
738 | { | ||
739 | LPVOID pv = MemReAlloc(pPrevPriv, cbPrevPriv, TRUE); | ||
740 | ExitOnNull(pv, hr, E_OUTOFMEMORY, "Failed to allocate memory for previous privileges."); | ||
741 | pPrevPriv = static_cast<TOKEN_PRIVILEGES*>(pv); | ||
742 | |||
743 | if (!::AdjustTokenPrivileges(hToken, FALSE, &priv, cbPrevPriv, pPrevPriv, &cbPrevPriv)) | ||
744 | { | ||
745 | ExitWithLastError(hr, "Failed to get shutdown privilege LUID."); | ||
746 | } | ||
747 | } | ||
748 | |||
749 | fAdjustedPrivileges = TRUE; | ||
750 | |||
751 | // build up SC_ACTION array | ||
752 | // TODO: why is delay only respected when SC_ACTION_RESTART is requested? | ||
753 | actions[0].Type = GetSCActionType(wzFirstFailureActionType); | ||
754 | actions[0].Delay = 0; | ||
755 | if (SC_ACTION_RESTART == actions[0].Type) | ||
756 | { | ||
757 | actions[0].Delay = dwRestartServiceDelayInSeconds * 1000; // seconds to milliseconds | ||
758 | } | ||
759 | |||
760 | actions[1].Type = GetSCActionType(wzSecondFailureActionType); | ||
761 | actions[1].Delay = 0; | ||
762 | if (SC_ACTION_RESTART == actions[1].Type) | ||
763 | { | ||
764 | actions[1].Delay = dwRestartServiceDelayInSeconds * 1000; // seconds to milliseconds | ||
765 | } | ||
766 | |||
767 | actions[2].Type = GetSCActionType(wzThirdFailureActionType); | ||
768 | actions[2].Delay = 0; | ||
769 | if (SC_ACTION_RESTART == actions[2].Type) | ||
770 | { | ||
771 | actions[2].Delay = dwRestartServiceDelayInSeconds * 1000; // seconds to milliseconds | ||
772 | } | ||
773 | |||
774 | // build up the SERVICE_FAILURE_ACTIONSW struct | ||
775 | sfa.dwResetPeriod = dwResetPeriodInDays * (24 * 60 * 60); // days to seconds | ||
776 | sfa.lpRebootMsg = wzRebootMessage; | ||
777 | sfa.lpCommand = wzProgramCommandLine; | ||
778 | sfa.cActions = countof(actions); | ||
779 | sfa.lpsaActions = actions; | ||
780 | |||
781 | // Call ChangeServiceConfig2 to actually set up the failure actions | ||
782 | if (!::ChangeServiceConfig2W(hService, SERVICE_CONFIG_FAILURE_ACTIONS, (LPVOID)&sfa)) | ||
783 | { | ||
784 | er = ::GetLastError(); | ||
785 | hr = HRESULT_FROM_WIN32(er); | ||
786 | |||
787 | #pragma prefast(push) | ||
788 | #pragma prefast(disable:25028) | ||
789 | ::FormatMessageW(FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS, NULL, er, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), (LPWSTR)&lpMsgBuf, 0, NULL); | ||
790 | #pragma prefast(pop) | ||
791 | |||
792 | // Check if this is a service that can't be modified. | ||
793 | if (ERROR_CANNOT_DETECT_PROCESS_ABORT == er) | ||
794 | { | ||
795 | WcaLog(LOGMSG_STANDARD, "WARNING: Service \"%ls\" is not configurable on this server and will not be set.", wzServiceName); | ||
796 | } | ||
797 | ExitOnFailure(hr, "Cannot change service configuration. Error: %ls", (LPWSTR)lpMsgBuf); | ||
798 | |||
799 | if (lpMsgBuf) | ||
800 | { | ||
801 | ::LocalFree(lpMsgBuf); | ||
802 | lpMsgBuf = NULL; | ||
803 | } | ||
804 | } | ||
805 | |||
806 | LExit: | ||
807 | if (lpMsgBuf) | ||
808 | { | ||
809 | ::LocalFree(lpMsgBuf); | ||
810 | } | ||
811 | |||
812 | if (fAdjustedPrivileges) | ||
813 | { | ||
814 | ::AdjustTokenPrivileges(hToken, FALSE, pPrevPriv, 0, NULL, NULL); | ||
815 | } | ||
816 | |||
817 | ReleaseMem(pPrevPriv); | ||
818 | ReleaseHandle(hToken); | ||
819 | |||
820 | return hr; | ||
821 | } | ||
diff --git a/src/ext/Util/ca/shellexecca.cpp b/src/ext/Util/ca/shellexecca.cpp new file mode 100644 index 00000000..ea21d3bd --- /dev/null +++ b/src/ext/Util/ca/shellexecca.cpp | |||
@@ -0,0 +1,271 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | HRESULT ShellExec( | ||
6 | __in LPCWSTR wzTarget, | ||
7 | __in BOOL fUnelevated | ||
8 | ) | ||
9 | { | ||
10 | HRESULT hr = S_OK; | ||
11 | LPWSTR sczWorkingDirectory = NULL; | ||
12 | |||
13 | // a reasonable working directory (not the system32 default from MSI) is the directory where the target lives | ||
14 | hr = PathGetDirectory(wzTarget, &sczWorkingDirectory); | ||
15 | ExitOnFailure(hr, "failed to get directory for target: %ls", wzTarget); | ||
16 | |||
17 | if (!DirExists(sczWorkingDirectory, NULL)) | ||
18 | { | ||
19 | ReleaseNullStr(sczWorkingDirectory); | ||
20 | } | ||
21 | |||
22 | if (fUnelevated) | ||
23 | { | ||
24 | hr = ShelExecUnelevated(wzTarget, NULL, NULL, sczWorkingDirectory, SW_SHOWDEFAULT); | ||
25 | ExitOnFailure(hr, "ShelExecUnelevated failed with target %ls", wzTarget); | ||
26 | } | ||
27 | else | ||
28 | { | ||
29 | HINSTANCE hinst = ::ShellExecuteW(NULL, NULL, wzTarget, NULL, sczWorkingDirectory, SW_SHOWDEFAULT); | ||
30 | if (hinst <= HINSTANCE(32)) | ||
31 | { | ||
32 | LONG64 code = reinterpret_cast<LONG64>(hinst); | ||
33 | switch (code) | ||
34 | { | ||
35 | case ERROR_FILE_NOT_FOUND: | ||
36 | hr = HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND); | ||
37 | break; | ||
38 | case ERROR_PATH_NOT_FOUND: | ||
39 | hr = HRESULT_FROM_WIN32(ERROR_PATH_NOT_FOUND); | ||
40 | break; | ||
41 | case ERROR_BAD_FORMAT: | ||
42 | hr = HRESULT_FROM_WIN32(ERROR_BAD_FORMAT); | ||
43 | break; | ||
44 | case SE_ERR_ASSOCINCOMPLETE: | ||
45 | case SE_ERR_NOASSOC: | ||
46 | hr = HRESULT_FROM_WIN32(ERROR_NO_ASSOCIATION); | ||
47 | break; | ||
48 | case SE_ERR_DDEBUSY: | ||
49 | case SE_ERR_DDEFAIL: | ||
50 | case SE_ERR_DDETIMEOUT: | ||
51 | hr = HRESULT_FROM_WIN32(ERROR_DDE_FAIL); | ||
52 | break; | ||
53 | case SE_ERR_DLLNOTFOUND: | ||
54 | hr = HRESULT_FROM_WIN32(ERROR_DLL_NOT_FOUND); | ||
55 | break; | ||
56 | case SE_ERR_OOM: | ||
57 | hr = E_OUTOFMEMORY; | ||
58 | break; | ||
59 | case SE_ERR_ACCESSDENIED: | ||
60 | hr = E_ACCESSDENIED; | ||
61 | break; | ||
62 | default: | ||
63 | hr = E_FAIL; | ||
64 | } | ||
65 | |||
66 | ExitOnFailure(hr, "ShellExec failed with return code %llu.", code); | ||
67 | } | ||
68 | } | ||
69 | |||
70 | |||
71 | LExit: | ||
72 | ReleaseStr(sczWorkingDirectory); | ||
73 | return hr; | ||
74 | } | ||
75 | |||
76 | extern "C" UINT __stdcall WixShellExec( | ||
77 | __in MSIHANDLE hInstall | ||
78 | ) | ||
79 | { | ||
80 | Assert(hInstall); | ||
81 | HRESULT hr = S_OK; | ||
82 | UINT er = ERROR_SUCCESS; | ||
83 | LPWSTR pwzTarget = NULL; | ||
84 | |||
85 | hr = WcaInitialize(hInstall, "WixShellExec"); | ||
86 | ExitOnFailure(hr, "failed to initialize"); | ||
87 | |||
88 | hr = WcaGetFormattedProperty(L"WixShellExecTarget", &pwzTarget); | ||
89 | ExitOnFailure(hr, "failed to get WixShellExecTarget"); | ||
90 | |||
91 | WcaLog(LOGMSG_VERBOSE, "WixShellExecTarget is %ls", pwzTarget); | ||
92 | |||
93 | if (!pwzTarget || !*pwzTarget) | ||
94 | { | ||
95 | hr = E_INVALIDARG; | ||
96 | ExitOnFailure(hr, "failed to get WixShellExecTarget"); | ||
97 | } | ||
98 | |||
99 | hr = ShellExec(pwzTarget, FALSE); | ||
100 | ExitOnFailure(hr, "failed to launch target"); | ||
101 | |||
102 | LExit: | ||
103 | ReleaseStr(pwzTarget); | ||
104 | |||
105 | if (FAILED(hr)) | ||
106 | { | ||
107 | er = ERROR_INSTALL_FAILURE; | ||
108 | } | ||
109 | return WcaFinalize(er); | ||
110 | } | ||
111 | |||
112 | extern "C" UINT __stdcall WixUnelevatedShellExec( | ||
113 | __in MSIHANDLE hInstall | ||
114 | ) | ||
115 | { | ||
116 | Assert(hInstall); | ||
117 | HRESULT hr = S_OK; | ||
118 | UINT er = ERROR_SUCCESS; | ||
119 | LPWSTR pwzTarget = NULL; | ||
120 | |||
121 | hr = WcaInitialize(hInstall, "WixUnelevatedShellExec"); | ||
122 | ExitOnFailure(hr, "failed to initialize"); | ||
123 | |||
124 | hr = WcaGetFormattedProperty(L"WixUnelevatedShellExecTarget", &pwzTarget); | ||
125 | ExitOnFailure(hr, "failed to get WixUnelevatedShellExecTarget"); | ||
126 | |||
127 | WcaLog(LOGMSG_VERBOSE, "WixUnelevatedShellExecTarget is %ls", pwzTarget); | ||
128 | |||
129 | if (!pwzTarget || !*pwzTarget) | ||
130 | { | ||
131 | hr = E_INVALIDARG; | ||
132 | ExitOnFailure(hr, "failed to get WixShellExecTarget"); | ||
133 | } | ||
134 | |||
135 | hr = ShellExec(pwzTarget, TRUE); | ||
136 | ExitOnFailure(hr, "failed to launch target"); | ||
137 | |||
138 | LExit: | ||
139 | ReleaseStr(pwzTarget); | ||
140 | |||
141 | if (FAILED(hr)) | ||
142 | { | ||
143 | er = ERROR_INSTALL_FAILURE; | ||
144 | } | ||
145 | return WcaFinalize(er); | ||
146 | } | ||
147 | |||
148 | // | ||
149 | // ExtractBinary extracts the data from the Binary table row with the given ID into a file. | ||
150 | // | ||
151 | HRESULT ExtractBinary( | ||
152 | __in LPCWSTR wzBinaryId, | ||
153 | __out BYTE** pbData, | ||
154 | __out DWORD* pcbData | ||
155 | ) | ||
156 | { | ||
157 | HRESULT hr = S_OK; | ||
158 | LPWSTR pwzSql = NULL; | ||
159 | PMSIHANDLE hView; | ||
160 | PMSIHANDLE hRec; | ||
161 | |||
162 | // make sure we're not horked from the get-go | ||
163 | hr = WcaTableExists(L"Binary"); | ||
164 | if (S_OK != hr) | ||
165 | { | ||
166 | if (SUCCEEDED(hr)) | ||
167 | { | ||
168 | hr = E_UNEXPECTED; | ||
169 | } | ||
170 | ExitOnFailure(hr, "There is no Binary table."); | ||
171 | } | ||
172 | |||
173 | ExitOnNull(wzBinaryId, hr, E_INVALIDARG, "Binary ID cannot be null"); | ||
174 | ExitOnNull(*wzBinaryId, hr, E_INVALIDARG, "Binary ID cannot be empty string"); | ||
175 | |||
176 | hr = StrAllocFormatted(&pwzSql, L"SELECT `Data` FROM `Binary` WHERE `Name`=\'%s\'", wzBinaryId); | ||
177 | ExitOnFailure(hr, "Failed to allocate Binary table query."); | ||
178 | |||
179 | hr = WcaOpenExecuteView(pwzSql, &hView); | ||
180 | ExitOnFailure(hr, "Failed to open view on Binary table"); | ||
181 | |||
182 | hr = WcaFetchSingleRecord(hView, &hRec); | ||
183 | ExitOnFailure(hr, "Failed to retrieve request from Binary table"); | ||
184 | |||
185 | hr = WcaGetRecordStream(hRec, 1, pbData, pcbData); | ||
186 | ExitOnFailure(hr, "Failed to read Binary.Data."); | ||
187 | |||
188 | LExit: | ||
189 | ReleaseStr(pwzSql); | ||
190 | |||
191 | return hr; | ||
192 | } | ||
193 | |||
194 | extern "C" UINT __stdcall WixShellExecBinary( | ||
195 | __in MSIHANDLE hInstall | ||
196 | ) | ||
197 | { | ||
198 | Assert(hInstall); | ||
199 | HRESULT hr = S_OK; | ||
200 | UINT er = ERROR_SUCCESS; | ||
201 | LPWSTR pwzBinary = NULL; | ||
202 | LPWSTR pwzFilename = NULL; | ||
203 | BYTE* pbData = NULL; | ||
204 | DWORD cbData = 0; | ||
205 | HANDLE hFile = INVALID_HANDLE_VALUE; | ||
206 | |||
207 | #if 0 | ||
208 | ::MessageBoxA(0, "WixShellExecBinary", "-->> ATTACH HERE", MB_OK); | ||
209 | #endif | ||
210 | |||
211 | hr = WcaInitialize(hInstall, "WixShellExecBinary"); | ||
212 | ExitOnFailure(hr, "failed to initialize"); | ||
213 | |||
214 | hr = WcaGetFormattedProperty(L"WixShellExecBinaryId", &pwzBinary); | ||
215 | ExitOnFailure(hr, "failed to get WixShellExecBinaryId"); | ||
216 | |||
217 | WcaLog(LOGMSG_VERBOSE, "WixShellExecBinaryId is %ls", pwzBinary); | ||
218 | |||
219 | if (!pwzBinary || !*pwzBinary) | ||
220 | { | ||
221 | hr = E_INVALIDARG; | ||
222 | ExitOnFailure(hr, "failed to get WixShellExecBinaryId"); | ||
223 | } | ||
224 | |||
225 | // get temporary path for extracted file | ||
226 | StrAlloc(&pwzFilename, MAX_PATH); | ||
227 | ExitOnFailure(hr, "Failed to allocate temporary path"); | ||
228 | ::GetTempPathW(MAX_PATH, pwzFilename); | ||
229 | hr = ::StringCchCatW(pwzFilename, MAX_PATH, pwzBinary); | ||
230 | ExitOnFailure(hr, "Failed to append filename."); | ||
231 | |||
232 | // grab the bits | ||
233 | hr = ExtractBinary(pwzBinary, &pbData, &cbData); | ||
234 | ExitOnFailure(hr, "failed to extract binary data"); | ||
235 | |||
236 | // write 'em to the temp file | ||
237 | hFile = ::CreateFileW(pwzFilename, GENERIC_WRITE, FILE_SHARE_READ, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL); | ||
238 | if (INVALID_HANDLE_VALUE == hFile) | ||
239 | { | ||
240 | ExitWithLastError(hr, "Failed to open new temp file: %ls", pwzFilename); | ||
241 | } | ||
242 | |||
243 | DWORD cbWritten = 0; | ||
244 | if (!::WriteFile(hFile, pbData, cbData, &cbWritten, NULL)) | ||
245 | { | ||
246 | ExitWithLastError(hr, "Failed to write data to new temp file: %ls", pwzFilename); | ||
247 | } | ||
248 | |||
249 | // close it | ||
250 | ::CloseHandle(hFile); | ||
251 | hFile = INVALID_HANDLE_VALUE; | ||
252 | |||
253 | // and run it | ||
254 | hr = ShellExec(pwzFilename, FALSE); | ||
255 | ExitOnFailure(hr, "failed to launch target: %ls", pwzFilename); | ||
256 | |||
257 | LExit: | ||
258 | ReleaseStr(pwzBinary); | ||
259 | ReleaseStr(pwzFilename); | ||
260 | ReleaseMem(pbData); | ||
261 | if (INVALID_HANDLE_VALUE != hFile) | ||
262 | { | ||
263 | ::CloseHandle(hFile); | ||
264 | } | ||
265 | |||
266 | if (FAILED(hr)) | ||
267 | { | ||
268 | er = ERROR_INSTALL_FAILURE; | ||
269 | } | ||
270 | return WcaFinalize(er); | ||
271 | } | ||
diff --git a/src/ext/Util/ca/test.cpp b/src/ext/Util/ca/test.cpp new file mode 100644 index 00000000..c4d215f0 --- /dev/null +++ b/src/ext/Util/ca/test.cpp | |||
@@ -0,0 +1,269 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
4 | |||
5 | #define WIXCA_UITHREAD_CLASS_WINDOW L"WixCaMessageWindow" | ||
6 | |||
7 | extern HMODULE g_hInstCADLL; | ||
8 | |||
9 | |||
10 | // structs | ||
11 | |||
12 | struct UITHREAD_CONTEXT | ||
13 | { | ||
14 | HANDLE hInitializedEvent; | ||
15 | HINSTANCE hInstance; | ||
16 | HWND hWnd; | ||
17 | }; | ||
18 | |||
19 | |||
20 | // internal function declarations | ||
21 | |||
22 | static HRESULT CreateMessageWindow( | ||
23 | __out HWND* phWnd | ||
24 | ); | ||
25 | |||
26 | static void CloseMessageWindow( | ||
27 | __in HWND hWnd | ||
28 | ); | ||
29 | |||
30 | static DWORD WINAPI ThreadProc( | ||
31 | __in LPVOID pvContext | ||
32 | ); | ||
33 | |||
34 | static LRESULT CALLBACK WndProc( | ||
35 | __in HWND hWnd, | ||
36 | __in UINT uMsg, | ||
37 | __in WPARAM wParam, | ||
38 | __in LPARAM lParam | ||
39 | ); | ||
40 | |||
41 | |||
42 | /****************************************************************** | ||
43 | WixFailWhenDeferred - entry point for WixFailWhenDeferred | ||
44 | custom action which always fails when running as a deferred | ||
45 | custom action (otherwise it blindly succeeds). It's useful when | ||
46 | testing the rollback of deferred custom actions: Schedule it | ||
47 | immediately after the rollback/deferred CA pair you're testing | ||
48 | and it will fail, causing your rollback CA to get invoked. | ||
49 | ********************************************************************/ | ||
50 | extern "C" UINT __stdcall WixFailWhenDeferred( | ||
51 | __in MSIHANDLE hInstall | ||
52 | ) | ||
53 | { | ||
54 | return ::MsiGetMode(hInstall, MSIRUNMODE_SCHEDULED) ? ERROR_INSTALL_FAILURE : ERROR_SUCCESS; | ||
55 | } | ||
56 | |||
57 | /****************************************************************** | ||
58 | WixWaitForEvent - entry point for WixWaitForEvent custom action | ||
59 | which waits for either the WixWaitForEventFail or | ||
60 | WixWaitForEventSucceed named auto reset events. Signaling the | ||
61 | WixWaitForEventFail event will return ERROR_INSTALL_FAILURE or | ||
62 | signaling the WixWaitForEventSucceed event will return | ||
63 | ERROR_SUCCESS. Both events are declared in the Global\ namespace. | ||
64 | ********************************************************************/ | ||
65 | extern "C" UINT __stdcall WixWaitForEvent( | ||
66 | __in MSIHANDLE hInstall | ||
67 | ) | ||
68 | { | ||
69 | HRESULT hr = S_OK; | ||
70 | UINT er = ERROR_SUCCESS; | ||
71 | HWND hMessageWindow = NULL; | ||
72 | LPCWSTR wzSDDL = L"D:(A;;GA;;;WD)"; | ||
73 | OS_VERSION version = OS_VERSION_UNKNOWN; | ||
74 | DWORD dwServicePack = 0; | ||
75 | PSECURITY_DESCRIPTOR pSD = NULL; | ||
76 | SECURITY_ATTRIBUTES sa = { }; | ||
77 | HANDLE rghEvents[2]; | ||
78 | |||
79 | hr = WcaInitialize(hInstall, "WixWaitForEvent"); | ||
80 | ExitOnFailure(hr, "Failed to initialize."); | ||
81 | |||
82 | // Create a window to prevent shutdown requests. | ||
83 | hr = CreateMessageWindow(&hMessageWindow); | ||
84 | ExitOnFailure(hr, "Failed to create message window."); | ||
85 | |||
86 | // If running on Vista/2008 or newer use integrity enhancements. | ||
87 | OsGetVersion(&version, &dwServicePack); | ||
88 | if (OS_VERSION_VISTA <= version) | ||
89 | { | ||
90 | // Add SACL to allow Everyone to signal from a medium integrity level. | ||
91 | wzSDDL = L"D:(A;;GA;;;WD)S:(ML;;NW;;;ME)"; | ||
92 | } | ||
93 | |||
94 | // Create the security descriptor and attributes for the events. | ||
95 | if (!::ConvertStringSecurityDescriptorToSecurityDescriptorW(wzSDDL, SDDL_REVISION_1, &pSD, NULL)) | ||
96 | { | ||
97 | ExitWithLastError(hr, "Failed to create the security descriptor for the events."); | ||
98 | } | ||
99 | |||
100 | sa.nLength = sizeof(sa); | ||
101 | sa.lpSecurityDescriptor = pSD; | ||
102 | sa.bInheritHandle = FALSE; | ||
103 | |||
104 | rghEvents[0] = ::CreateEventW(&sa, FALSE, FALSE, L"Global\\WixWaitForEventFail"); | ||
105 | ExitOnNullWithLastError(rghEvents[0], hr, "Failed to create the Global\\WixWaitForEventFail event."); | ||
106 | |||
107 | rghEvents[1] = ::CreateEventW(&sa, FALSE, FALSE, L"Global\\WixWaitForEventSucceed"); | ||
108 | ExitOnNullWithLastError(rghEvents[1], hr, "Failed to create the Global\\WixWaitForEventSucceed event."); | ||
109 | |||
110 | // Wait for either of the events to be signaled and handle accordingly. | ||
111 | er = ::WaitForMultipleObjects(countof(rghEvents), rghEvents, FALSE, INFINITE); | ||
112 | switch (er) | ||
113 | { | ||
114 | case WAIT_OBJECT_0 + 0: | ||
115 | er = ERROR_INSTALL_FAILURE; | ||
116 | break; | ||
117 | case WAIT_OBJECT_0 + 1: | ||
118 | er = ERROR_SUCCESS; | ||
119 | break; | ||
120 | default: | ||
121 | ExitOnWin32Error(er, hr, "Unexpected failure."); | ||
122 | } | ||
123 | |||
124 | LExit: | ||
125 | ReleaseHandle(rghEvents[1]); | ||
126 | ReleaseHandle(rghEvents[0]); | ||
127 | |||
128 | if (pSD) | ||
129 | { | ||
130 | ::LocalFree(pSD); | ||
131 | } | ||
132 | |||
133 | if (hMessageWindow) | ||
134 | { | ||
135 | CloseMessageWindow(hMessageWindow); | ||
136 | } | ||
137 | |||
138 | if (FAILED(hr)) | ||
139 | { | ||
140 | er = ERROR_INSTALL_FAILURE; | ||
141 | } | ||
142 | |||
143 | return WcaFinalize(er); | ||
144 | } | ||
145 | |||
146 | |||
147 | // internal function definitions | ||
148 | |||
149 | static HRESULT CreateMessageWindow( | ||
150 | __out HWND* phWnd | ||
151 | ) | ||
152 | { | ||
153 | HRESULT hr = S_OK; | ||
154 | HANDLE rgWaitHandles[2] = { }; | ||
155 | UITHREAD_CONTEXT context = { }; | ||
156 | |||
157 | // Create event to signal after the UI thread / window is initialized. | ||
158 | rgWaitHandles[0] = ::CreateEventW(NULL, TRUE, FALSE, NULL); | ||
159 | ExitOnNullWithLastError(rgWaitHandles[0], hr, "Failed to create initialization event."); | ||
160 | |||
161 | // Pass necessary information to create the window. | ||
162 | context.hInitializedEvent = rgWaitHandles[0]; | ||
163 | context.hInstance = (HINSTANCE)g_hInstCADLL; | ||
164 | |||
165 | // Create our separate UI thread. | ||
166 | rgWaitHandles[1] = ::CreateThread(NULL, 0, ThreadProc, &context, 0, NULL); | ||
167 | ExitOnNullWithLastError(rgWaitHandles[1], hr, "Failed to create the UI thread."); | ||
168 | |||
169 | // Wait for either the thread to be initialized or the window to exit / fail prematurely. | ||
170 | ::WaitForMultipleObjects(countof(rgWaitHandles), rgWaitHandles, FALSE, INFINITE); | ||
171 | |||
172 | // Pass the window back to the caller. | ||
173 | *phWnd = context.hWnd; | ||
174 | |||
175 | LExit: | ||
176 | ReleaseHandle(rgWaitHandles[1]); | ||
177 | ReleaseHandle(rgWaitHandles[0]); | ||
178 | |||
179 | return hr; | ||
180 | } | ||
181 | |||
182 | static void CloseMessageWindow( | ||
183 | __in HWND hWnd | ||
184 | ) | ||
185 | { | ||
186 | if (::IsWindow(hWnd)) | ||
187 | { | ||
188 | ::PostMessageW(hWnd, WM_CLOSE, 0, 0); | ||
189 | } | ||
190 | } | ||
191 | |||
192 | static DWORD WINAPI ThreadProc( | ||
193 | __in LPVOID pvContext | ||
194 | ) | ||
195 | { | ||
196 | HRESULT hr = S_OK; | ||
197 | UITHREAD_CONTEXT* pContext = static_cast<UITHREAD_CONTEXT*>(pvContext); | ||
198 | |||
199 | WNDCLASSW wc = { }; | ||
200 | BOOL fRegistered = TRUE; | ||
201 | HWND hWnd = NULL; | ||
202 | |||
203 | BOOL fRet = FALSE; | ||
204 | MSG msg = { }; | ||
205 | |||
206 | wc.lpfnWndProc = WndProc; | ||
207 | wc.hInstance = pContext->hInstance; | ||
208 | wc.lpszClassName = WIXCA_UITHREAD_CLASS_WINDOW; | ||
209 | |||
210 | if (!::RegisterClassW(&wc)) | ||
211 | { | ||
212 | ExitWithLastError(hr, "Failed to register window."); | ||
213 | } | ||
214 | |||
215 | fRegistered = TRUE; | ||
216 | |||
217 | // Create the window to handle reboots without activating it. | ||
218 | hWnd = ::CreateWindowExW(WS_EX_TOOLWINDOW, wc.lpszClassName, NULL, WS_POPUP | WS_VISIBLE, CW_USEDEFAULT, SW_SHOWNA, 0, 0, HWND_DESKTOP, NULL, pContext->hInstance, NULL); | ||
219 | ExitOnNullWithLastError(hWnd, hr, "Failed to create window."); | ||
220 | |||
221 | // Persist the window handle and let the caller know we've initialized. | ||
222 | pContext->hWnd = hWnd; | ||
223 | ::SetEvent(pContext->hInitializedEvent); | ||
224 | |||
225 | // Pump messages until the window is closed. | ||
226 | while (0 != (fRet = ::GetMessageW(&msg, NULL, 0, 0))) | ||
227 | { | ||
228 | if (-1 == fRet) | ||
229 | { | ||
230 | hr = E_UNEXPECTED; | ||
231 | ExitOnFailure(hr, "Unexpected return value from message pump."); | ||
232 | } | ||
233 | else if (!::IsDialogMessageW(msg.hwnd, &msg)) | ||
234 | { | ||
235 | ::TranslateMessage(&msg); | ||
236 | ::DispatchMessageW(&msg); | ||
237 | } | ||
238 | } | ||
239 | |||
240 | LExit: | ||
241 | if (fRegistered) | ||
242 | { | ||
243 | ::UnregisterClassW(WIXCA_UITHREAD_CLASS_WINDOW, pContext->hInstance); | ||
244 | } | ||
245 | |||
246 | return hr; | ||
247 | } | ||
248 | |||
249 | static LRESULT CALLBACK WndProc( | ||
250 | __in HWND hWnd, | ||
251 | __in UINT uMsg, | ||
252 | __in WPARAM wParam, | ||
253 | __in LPARAM lParam | ||
254 | ) | ||
255 | { | ||
256 | switch (uMsg) | ||
257 | { | ||
258 | case WM_QUERYENDSESSION: | ||
259 | // Prevent the process from being shut down. | ||
260 | WcaLog(LOGMSG_VERBOSE, "Disallowed system request to shut down the custom action server."); | ||
261 | return FALSE; | ||
262 | |||
263 | case WM_DESTROY: | ||
264 | ::PostQuitMessage(0); | ||
265 | return 0; | ||
266 | } | ||
267 | |||
268 | return ::DefWindowProcW(hWnd, uMsg, wParam, lParam); | ||
269 | } | ||
diff --git a/src/ext/Util/ca/utilca.cpp b/src/ext/Util/ca/utilca.cpp new file mode 100644 index 00000000..37664a1c --- /dev/null +++ b/src/ext/Util/ca/utilca.cpp | |||
@@ -0,0 +1,3 @@ | |||
1 | // Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | #include "precomp.h" | ||
diff --git a/src/ext/Util/ca/utilca.def b/src/ext/Util/ca/utilca.def new file mode 100644 index 00000000..412d86a3 --- /dev/null +++ b/src/ext/Util/ca/utilca.def | |||
@@ -0,0 +1,91 @@ | |||
1 | ; Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. | ||
2 | |||
3 | |||
4 | LIBRARY "utilca" | ||
5 | |||
6 | EXPORTS | ||
7 | ; BroadcastSettingChange.cpp | ||
8 | WixBroadcastSettingChange | ||
9 | WixBroadcastEnvironmentChange | ||
10 | ; checkreboot.cpp | ||
11 | WixCheckRebootRequired | ||
12 | ; closeapps.cpp | ||
13 | WixCloseApplications | ||
14 | WixCloseApplicationsDeferred | ||
15 | ; exitearlywithsuccess.cpp | ||
16 | WixExitEarlyWithSuccess | ||
17 | ; FormatFiles.cpp | ||
18 | WixSchedFormatFiles | ||
19 | WixExecFormatFiles | ||
20 | ; osinfo.cpp | ||
21 | WixQueryOsInfo | ||
22 | WixQueryOsDirs | ||
23 | WixQueryOsWellKnownSID | ||
24 | WixQueryOsDriverInfo | ||
25 | ; netshortcuts.cpp | ||
26 | WixSchedInternetShortcuts | ||
27 | WixCreateInternetShortcuts | ||
28 | WixRollbackInternetShortcuts | ||
29 | ; qtexecca.cpp | ||
30 | CAQuietExec | ||
31 | CAQuietExec64 | ||
32 | WixQuietExec | ||
33 | WixQuietExec64 | ||
34 | WixSilentExec | ||
35 | WixSilentExec64 | ||
36 | ; RemoveFoldersEx.cpp | ||
37 | WixRemoveFoldersEx | ||
38 | ; RemoveRegistryKeysEx.cpp | ||
39 | WixRemoveRegistryKeysEx | ||
40 | ;scaexec.cpp | ||
41 | RegisterPerfCounterData | ||
42 | UnregisterPerfCounterData | ||
43 | RegisterPerfmon | ||
44 | UnregisterPerfmon | ||
45 | CreateSmb | ||
46 | DropSmb | ||
47 | CreateUser | ||
48 | CreateUserRollback | ||
49 | RemoveUser | ||
50 | ;scasched.cpp | ||
51 | ConfigurePerfmonInstall | ||
52 | ConfigurePerfmonUninstall | ||
53 | ConfigureSmbInstall | ||
54 | ConfigureSmbUninstall | ||
55 | ConfigureUsers | ||
56 | InstallPerfCounterData | ||
57 | UninstallPerfCounterData | ||
58 | ConfigurePerfmonManifestRegister | ||
59 | ConfigurePerfmonManifestUnregister | ||
60 | ConfigureEventManifestRegister | ||
61 | ConfigureEventManifestUnregister | ||
62 | ; RestartManager.cpp | ||
63 | WixRegisterRestartResources | ||
64 | ; secureobj.cpp | ||
65 | SchedSecureObjects | ||
66 | SchedSecureObjectsRollback | ||
67 | ExecSecureObjects | ||
68 | ExecSecureObjectsRollback | ||
69 | ; serviceconfig.cpp | ||
70 | SchedServiceConfig | ||
71 | ExecServiceConfig | ||
72 | RollbackServiceConfig | ||
73 | ; shellexecca.cpp | ||
74 | WixShellExec | ||
75 | WixShellExecBinary | ||
76 | WixUnelevatedShellExec | ||
77 | ; test.cpp | ||
78 | WixFailWhenDeferred | ||
79 | WixWaitForEvent | ||
80 | ; TouchFile.cpp | ||
81 | WixTouchFileDuringInstall | ||
82 | WixTouchFileDuringUninstall | ||
83 | WixExecuteTouchFile | ||
84 | ; xmlfile.cpp | ||
85 | SchedXmlFile | ||
86 | ExecXmlFile | ||
87 | ExecXmlFileRollback | ||
88 | ; xmlconfig.cpp | ||
89 | SchedXmlConfig | ||
90 | ExecXmlConfig | ||
91 | ExecXmlConfigRollback | ||
diff --git a/src/ext/Util/ca/utilca.vcxproj b/src/ext/Util/ca/utilca.vcxproj new file mode 100644 index 00000000..7b64db95 --- /dev/null +++ b/src/ext/Util/ca/utilca.vcxproj | |||
@@ -0,0 +1,106 @@ | |||
1 | <?xml version="1.0" encoding="utf-8"?> | ||
2 | <!-- Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. --> | ||
3 | |||
4 | <Project DefaultTargets="Build" ToolsVersion="16.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003"> | ||
5 | <ItemGroup Label="ProjectConfigurations"> | ||
6 | <ProjectConfiguration Include="Debug|ARM64"> | ||
7 | <Configuration>Debug</Configuration> | ||
8 | <Platform>ARM64</Platform> | ||
9 | </ProjectConfiguration> | ||
10 | <ProjectConfiguration Include="Release|ARM64"> | ||
11 | <Configuration>Release</Configuration> | ||
12 | <Platform>ARM64</Platform> | ||
13 | </ProjectConfiguration> | ||
14 | <ProjectConfiguration Include="Debug|X64"> | ||
15 | <Configuration>Debug</Configuration> | ||
16 | <Platform>X64</Platform> | ||
17 | </ProjectConfiguration> | ||
18 | <ProjectConfiguration Include="Release|X64"> | ||
19 | <Configuration>Release</Configuration> | ||
20 | <Platform>X64</Platform> | ||
21 | </ProjectConfiguration> | ||
22 | <ProjectConfiguration Include="Debug|Win32"> | ||
23 | <Configuration>Debug</Configuration> | ||
24 | <Platform>Win32</Platform> | ||
25 | </ProjectConfiguration> | ||
26 | <ProjectConfiguration Include="Release|Win32"> | ||
27 | <Configuration>Release</Configuration> | ||
28 | <Platform>Win32</Platform> | ||
29 | </ProjectConfiguration> | ||
30 | </ItemGroup> | ||
31 | |||
32 | <PropertyGroup Label="Globals"> | ||
33 | <ProjectGuid>{076018F7-19BD-423A-ABBF-229273DA08D8}</ProjectGuid> | ||
34 | <ConfigurationType>DynamicLibrary</ConfigurationType> | ||
35 | <TargetName>utilca</TargetName> | ||
36 | <PlatformToolset>v142</PlatformToolset> | ||
37 | <CharacterSet>Unicode</CharacterSet> | ||
38 | <ProjectModuleDefinitionFile>utilca.def</ProjectModuleDefinitionFile> | ||
39 | <Description>WiX Toolset Util CustomAction</Description> | ||
40 | </PropertyGroup> | ||
41 | |||
42 | <Import Project="$(VCTargetsPath)\Microsoft.Cpp.Default.props" /> | ||
43 | <Import Project="$(VCTargetsPath)\Microsoft.Cpp.props" /> | ||
44 | |||
45 | <PropertyGroup> | ||
46 | <ProjectAdditionalLinkLibraries>activeds.lib;adsiid.lib;msi.lib;netapi32.lib;shlwapi.lib</ProjectAdditionalLinkLibraries> | ||
47 | </PropertyGroup> | ||
48 | |||
49 | <ItemGroup> | ||
50 | <ClCompile Include="BroadcastSettingChange.cpp" /> | ||
51 | <ClCompile Include="CheckReboot.cpp" /> | ||
52 | <ClCompile Include="CloseApps.cpp" /> | ||
53 | <ClCompile Include="dllmain.cpp"> | ||
54 | <PrecompiledHeader>Create</PrecompiledHeader> | ||
55 | </ClCompile> | ||
56 | <ClCompile Include="exitearlywithsuccess.cpp" /> | ||
57 | <ClCompile Include="FormatFiles.cpp" /> | ||
58 | <ClCompile Include="netshortcuts.cpp" /> | ||
59 | <ClCompile Include="OsInfo.cpp" /> | ||
60 | <ClCompile Include="qtexecca.cpp" /> | ||
61 | <ClCompile Include="RemoveFoldersEx.cpp" /> | ||
62 | <ClCompile Include="RemoveRegistryKeysEx.cpp" /> | ||
63 | <ClCompile Include="RestartManager.cpp" /> | ||
64 | <ClCompile Include="scaexec.cpp" /> | ||
65 | <ClCompile Include="scamanifest.cpp" /> | ||
66 | <ClCompile Include="scaperf.cpp" /> | ||
67 | <ClCompile Include="scaperfexec.cpp" /> | ||
68 | <ClCompile Include="scasched.cpp" /> | ||
69 | <ClCompile Include="scasmbexec.cpp" /> | ||
70 | <ClCompile Include="scasmbsched.cpp" /> | ||
71 | <ClCompile Include="scauser.cpp" /> | ||
72 | <ClCompile Include="secureobj.cpp" /> | ||
73 | <ClCompile Include="serviceconfig.cpp" /> | ||
74 | <ClCompile Include="shellexecca.cpp" /> | ||
75 | <ClCompile Include="test.cpp" /> | ||
76 | <ClCompile Include="TouchFile.cpp" /> | ||
77 | <ClCompile Include="utilca.cpp" /> | ||
78 | <ClCompile Include="XmlConfig.cpp" /> | ||
79 | <ClCompile Include="XmlFile.cpp" /> | ||
80 | </ItemGroup> | ||
81 | |||
82 | <ItemGroup> | ||
83 | <ClInclude Include="caDecor.h" /> | ||
84 | <ClInclude Include="cost.h" /> | ||
85 | <ClInclude Include="CustomMsiErrors.h" /> | ||
86 | <ClInclude Include="precomp.h" /> | ||
87 | <ClInclude Include="sca.h" /> | ||
88 | <ClInclude Include="scacost.h" /> | ||
89 | <ClInclude Include="scasmb.h" /> | ||
90 | <ClInclude Include="scasmbexec.h" /> | ||
91 | <ClInclude Include="scauser.h" /> | ||
92 | </ItemGroup> | ||
93 | |||
94 | <ItemGroup> | ||
95 | <None Include="utilca.def" /> | ||
96 | </ItemGroup> | ||
97 | |||
98 | <ItemGroup> | ||
99 | <PackageReference Include="WixToolset.Dutil" Version="4.0.72" /> | ||
100 | <PackageReference Include="WixToolset.WcaUtil" Version="4.0.19" /> | ||
101 | <PackageReference Include="Microsoft.SourceLink.GitHub" Version="1.0.0" /> | ||
102 | <PackageReference Include="Nerdbank.GitVersioning" Version="3.3.37" /> | ||
103 | </ItemGroup> | ||
104 | |||
105 | <Import Project="$(VCTargetsPath)\Microsoft.Cpp.targets" /> | ||
106 | </Project> | ||