windows-nt/Source/XPSP1/NT/inetsrv/iis/setup/osrc/oldcode.cpp
2020-09-26 16:20:57 +08:00

847 lines
28 KiB
C++

//
// checker.h <start>
//
#include <lmaccess.h>
#include <lmserver.h>
#include <lmapibuf.h>
#include <lmerr.h>
#define SECURITY_WIN32
#define ISSP_LEVEL 32
#define ISSP_MODE 1
#include <sspi.h>
#ifndef _CHICAGO_
int CheckConfig_DoIt(HWND hDlg, CStringList &strListOfWhatWeDid);
BOOL ValidatePassword(IN LPCWSTR UserName,IN LPCWSTR Domain,IN LPCWSTR Password);
#endif
DWORD WINAPI ChkConfig_MessageDialogThread(void *p);
BOOL CALLBACK ChkConfig_MessageDialogProc(HWND hDlg, UINT uMsg, WPARAM wParam, LPARAM lParam );
void CheckConfig(void);
int g_BigCancel = FALSE;
//
// checker.h <end>
//
#ifndef _CHICAGO_
BOOL ValidatePassword(IN LPCWSTR UserName,IN LPCWSTR Domain,IN LPCWSTR Password)
/*++
Routine Description:
Uses SSPI to validate the specified password
Arguments:
UserName - Supplies the user name
Domain - Supplies the user's domain
Password - Supplies the password
Return Value:
TRUE if the password is valid.
FALSE otherwise.
--*/
{
SECURITY_STATUS SecStatus;
SECURITY_STATUS AcceptStatus;
SECURITY_STATUS InitStatus;
CredHandle ClientCredHandle;
CredHandle ServerCredHandle;
BOOL ClientCredAllocated = FALSE;
BOOL ServerCredAllocated = FALSE;
CtxtHandle ClientContextHandle;
CtxtHandle ServerContextHandle;
TimeStamp Lifetime;
ULONG ContextAttributes;
PSecPkgInfo PackageInfo = NULL;
ULONG ClientFlags;
ULONG ServerFlags;
TCHAR TargetName[100];
SEC_WINNT_AUTH_IDENTITY_W AuthIdentity;
BOOL Validated = FALSE;
SecBufferDesc NegotiateDesc;
SecBuffer NegotiateBuffer;
SecBufferDesc ChallengeDesc;
SecBuffer ChallengeBuffer;
SecBufferDesc AuthenticateDesc;
SecBuffer AuthenticateBuffer;
AuthIdentity.User = (LPWSTR)UserName;
AuthIdentity.UserLength = lstrlenW(UserName);
AuthIdentity.Domain = (LPWSTR)Domain;
AuthIdentity.DomainLength = lstrlenW(Domain);
AuthIdentity.Password = (LPWSTR)Password;
AuthIdentity.PasswordLength = lstrlenW(Password);
AuthIdentity.Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE;
NegotiateBuffer.pvBuffer = NULL;
ChallengeBuffer.pvBuffer = NULL;
AuthenticateBuffer.pvBuffer = NULL;
//
// Get info about the security packages.
//
SecStatus = QuerySecurityPackageInfo( _T("NTLM"), &PackageInfo );
if ( SecStatus != STATUS_SUCCESS ) {
goto error_exit;
}
//
// Acquire a credential handle for the server side
//
SecStatus = AcquireCredentialsHandle(
NULL,
_T("NTLM"),
SECPKG_CRED_INBOUND,
NULL,
&AuthIdentity,
NULL,
NULL,
&ServerCredHandle,
&Lifetime );
if ( SecStatus != STATUS_SUCCESS ) {
goto error_exit;
}
ServerCredAllocated = TRUE;
//
// Acquire a credential handle for the client side
//
SecStatus = AcquireCredentialsHandle(
NULL, // New principal
_T("NTLM"),
SECPKG_CRED_OUTBOUND,
NULL,
&AuthIdentity,
NULL,
NULL,
&ClientCredHandle,
&Lifetime );
if ( SecStatus != STATUS_SUCCESS ) {
goto error_exit;
}
ClientCredAllocated = TRUE;
//
// Get the NegotiateMessage (ClientSide)
//
NegotiateDesc.ulVersion = 0;
NegotiateDesc.cBuffers = 1;
NegotiateDesc.pBuffers = &NegotiateBuffer;
NegotiateBuffer.cbBuffer = PackageInfo->cbMaxToken;
NegotiateBuffer.BufferType = SECBUFFER_TOKEN;
NegotiateBuffer.pvBuffer = LocalAlloc( 0, NegotiateBuffer.cbBuffer );
if ( NegotiateBuffer.pvBuffer == NULL ) {
goto error_exit;
}
ClientFlags = ISC_REQ_MUTUAL_AUTH | ISC_REQ_REPLAY_DETECT;
InitStatus = InitializeSecurityContext(
&ClientCredHandle,
NULL, // No Client context yet
NULL,
ClientFlags,
0, // Reserved 1
SECURITY_NATIVE_DREP,
NULL, // No initial input token
0, // Reserved 2
&ClientContextHandle,
&NegotiateDesc,
&ContextAttributes,
&Lifetime );
if ( !NT_SUCCESS(InitStatus) ) {
goto error_exit;
}
//
// Get the ChallengeMessage (ServerSide)
//
NegotiateBuffer.BufferType |= SECBUFFER_READONLY;
ChallengeDesc.ulVersion = 0;
ChallengeDesc.cBuffers = 1;
ChallengeDesc.pBuffers = &ChallengeBuffer;
ChallengeBuffer.cbBuffer = PackageInfo->cbMaxToken;
ChallengeBuffer.BufferType = SECBUFFER_TOKEN;
ChallengeBuffer.pvBuffer = LocalAlloc( 0, ChallengeBuffer.cbBuffer );
if ( ChallengeBuffer.pvBuffer == NULL ) {
goto error_exit;
}
ServerFlags = ASC_REQ_EXTENDED_ERROR;
AcceptStatus = AcceptSecurityContext(
&ServerCredHandle,
NULL, // No Server context yet
&NegotiateDesc,
ServerFlags,
SECURITY_NATIVE_DREP,
&ServerContextHandle,
&ChallengeDesc,
&ContextAttributes,
&Lifetime );
if ( !NT_SUCCESS(AcceptStatus) ) {
goto error_exit;
}
if (InitStatus != STATUS_SUCCESS)
{
//
// Get the AuthenticateMessage (ClientSide)
//
ChallengeBuffer.BufferType |= SECBUFFER_READONLY;
AuthenticateDesc.ulVersion = 0;
AuthenticateDesc.cBuffers = 1;
AuthenticateDesc.pBuffers = &AuthenticateBuffer;
AuthenticateBuffer.cbBuffer = PackageInfo->cbMaxToken;
AuthenticateBuffer.BufferType = SECBUFFER_TOKEN;
AuthenticateBuffer.pvBuffer = LocalAlloc( 0, AuthenticateBuffer.cbBuffer );
if ( AuthenticateBuffer.pvBuffer == NULL ) {
goto error_exit;
}
SecStatus = InitializeSecurityContext(
NULL,
&ClientContextHandle,
TargetName,
0,
0, // Reserved 1
SECURITY_NATIVE_DREP,
&ChallengeDesc,
0, // Reserved 2
&ClientContextHandle,
&AuthenticateDesc,
&ContextAttributes,
&Lifetime );
if ( !NT_SUCCESS(SecStatus) ) {
goto error_exit;
}
if (AcceptStatus != STATUS_SUCCESS) {
//
// Finally authenticate the user (ServerSide)
//
AuthenticateBuffer.BufferType |= SECBUFFER_READONLY;
SecStatus = AcceptSecurityContext(
NULL,
&ServerContextHandle,
&AuthenticateDesc,
ServerFlags,
SECURITY_NATIVE_DREP,
&ServerContextHandle,
NULL,
&ContextAttributes,
&Lifetime );
if ( !NT_SUCCESS(SecStatus) ) {
goto error_exit;
}
Validated = TRUE;
}
}
error_exit:
if (ServerCredAllocated) {
FreeCredentialsHandle( &ServerCredHandle );
}
if (ClientCredAllocated) {
FreeCredentialsHandle( &ClientCredHandle );
}
//
// Final Cleanup
//
if ( NegotiateBuffer.pvBuffer != NULL ) {
(VOID) LocalFree( NegotiateBuffer.pvBuffer );
}
if ( ChallengeBuffer.pvBuffer != NULL ) {
(VOID) LocalFree( ChallengeBuffer.pvBuffer );
}
if ( AuthenticateBuffer.pvBuffer != NULL ) {
(VOID) LocalFree( AuthenticateBuffer.pvBuffer );
}
return(Validated);
}
#endif
DWORD WINAPI ChkConfig_MessageDialogThread(void *p)
{
HWND hDlg = (HWND)p;
int iReturn = TRUE;
CStringList strWhatWeDidList;
CString csBigString;
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Scanning..."));
// call our function
#ifndef _CHICAGO_
CheckConfig_DoIt(hDlg, strWhatWeDidList);
#endif
// check for cancellation
if (g_BigCancel == TRUE) goto ChkConfig_MessageDialogThread_Cancelled;
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Completed."));
// Hide the Search window
ShowWindow(hDlg, SW_HIDE);
// Loop thru the what we did list and display the messages:
//strWhatWeDidList
if (strWhatWeDidList.IsEmpty() == FALSE)
{
POSITION pos = NULL;
CString csEntry;
pos = strWhatWeDidList.GetHeadPosition();
while (pos)
{
csEntry = strWhatWeDidList.GetAt(pos);
//iisDebugOutSafeParams((LOG_TYPE_WARN, _T("%1!s!\n"), csEntry));
csBigString = csBigString + csEntry;
csBigString = csBigString + _T("\n");
strWhatWeDidList.GetNext(pos);
}
}
else
{
csBigString = _T("No changes.");
}
TCHAR szBiggerString[_MAX_PATH];
_stprintf(szBiggerString, _T("Changes:\n%s"), csBigString);
MyMessageBox((HWND) GetDesktopWindow(), szBiggerString, _T("Check Config Done"), MB_OK);
ChkConfig_MessageDialogThread_Cancelled:
PostMessage(hDlg, WM_COMMAND, IDCANCEL, 0);
return iReturn;
}
//***************************************************************************
//*
//* purpose: display the wait dailog and spawn thread to do stuff
//*
//***************************************************************************
BOOL CALLBACK ChkConfig_MessageDialogProc(HWND hDlg, UINT uMsg, WPARAM wParam, LPARAM lParam )
{
static HANDLE hProc = NULL;
DWORD id;
switch (uMsg)
{
case WM_INITDIALOG:
uiCenterDialog(hDlg);
hProc = CreateThread(NULL, 0, ChkConfig_MessageDialogThread, (LPVOID)hDlg, 0, &id);
if (hProc == NULL)
{
MyMessageBox((HWND) GetDesktopWindow(), _T("Failed to CreateThread MessageDialogThread.\n"), MB_ICONSTOP);
EndDialog(hDlg, -1);
}
UpdateWindow(hDlg);
break;
case WM_COMMAND:
switch (wParam)
{
case IDOK:
case IDCANCEL:
g_BigCancel = TRUE;
EndDialog(hDlg, (int)wParam);
return TRUE;
}
break;
default:
return(FALSE);
}
return(TRUE);
}
void CheckConfig(void)
{
_tcscpy(g_MyLogFile.m_szLogPreLineInfo2, _T("CheckConfig:"));
DWORD err = FALSE;
// Search for the ie setup program
g_BigCancel = FALSE;
if (-1 == DialogBox((HINSTANCE) g_MyModuleHandle, MAKEINTRESOURCE(IDD_DIALOG_MSG), NULL, (DLGPROC) ChkConfig_MessageDialogProc))
{
GetErrorMsg(GetLastError(), _T(": on CheckConfig"));
}
_tcscpy(g_MyLogFile.m_szLogPreLineInfo2, _T(""));
return;
}
//
// Function will open the metabase and check the iusr_ and iwam_ usernames.
// it will check if the names are still valid and if the passwords are still valid.
//
#ifndef _CHICAGO_
#define CheckConfig_DoIt_log _T("CheckConfig_DoIt")
int CheckConfig_DoIt(HWND hDlg, CStringList &strListOfWhatWeDid)
{
int iReturn = FALSE;
iisDebugOut_Start(CheckConfig_DoIt_log,LOG_TYPE_PROGRAM_FLOW);
TCHAR szAnonyName_WAM[_MAX_PATH];
TCHAR szAnonyPass_WAM[LM20_PWLEN+1];
TCHAR szAnonyName_WWW[_MAX_PATH];
TCHAR szAnonyPass_WWW[LM20_PWLEN+1];
TCHAR szAnonyName_FTP[_MAX_PATH];
TCHAR szAnonyPass_FTP[LM20_PWLEN+1];
int iGotName_WWW = FALSE;
int iGotPass_WWW = FALSE;
int iGotName_WAM = FALSE;
int iGotPass_WAM = FALSE;
int iGotName_FTP = FALSE;
int iGotPass_FTP = FALSE;
INT iUserWasNewlyCreated = 0;
TCHAR szEntry[_MAX_PATH];
// Call CreatePassword to fill
LPTSR pszPassword = NULL;
pszPassword = CreatePassword(LM20_PWLEN+1);
if (!pszPassword)
{
goto CheckConfig_DoIt_Exit;
}
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Checking for IISADMIN Service..."));
if (CheckifServiceExist(_T("IISADMIN")) != 0 )
{
// the iisadmin service does not exist
// so there is no way we can do anything with the metabase.
goto CheckConfig_DoIt_Exit;
}
//
// Get the WAM username and password
//
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Lookup iWam username..."));
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
if (TRUE == GetDataFromMetabase(_T("LM/W3SVC"), MD_WAM_USER_NAME, (PBYTE)szAnonyName_WAM, _MAX_PATH))
{iGotName_WAM = TRUE;}
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
if (TRUE == GetDataFromMetabase(_T("LM/W3SVC"), MD_WAM_PWD, (PBYTE)szAnonyPass_WAM, _MAX_PATH))
{iGotPass_WAM = TRUE;}
//
// Get the WWW username and password
//
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Lookup iUsr username..."));
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
if (TRUE == GetDataFromMetabase(_T("LM/W3SVC"), MD_ANONYMOUS_USER_NAME, (PBYTE)szAnonyName_WWW, _MAX_PATH))
{iGotName_WWW = TRUE;}
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
if (TRUE == GetDataFromMetabase(_T("LM/W3SVC"), MD_ANONYMOUS_PWD, (PBYTE)szAnonyPass_WWW, _MAX_PATH))
{iGotPass_WWW = TRUE;}
//
// Get the FTP username and password
//
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Lookup iUsr (ftp) username..."));
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
if (TRUE == GetDataFromMetabase(_T("LM/MSFTPSVC"), MD_ANONYMOUS_USER_NAME, (PBYTE)szAnonyName_FTP, _MAX_PATH))
{iGotName_FTP = TRUE;}
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
if (TRUE == GetDataFromMetabase(_T("LM/MSFTPSVC"), MD_ANONYMOUS_PWD, (PBYTE)szAnonyPass_FTP, _MAX_PATH))
{iGotPass_FTP = TRUE;}
// Now check if the actual user accounts actually exist....
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
if (iGotName_WAM)
{
// check if username is blank
if (szAnonyName_WAM)
{
// Check if this user actually exists...
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Checking if Wam user exists..."));
if (IsUserExist(szAnonyName_WAM))
{
// Fine, the user exists.... let's validate the password too
// Let's validate that the user has at least the appropriate rights...
if (iGotPass_WAM)
{
ChangeUserPassword((LPTSTR) szAnonyName_WAM, (LPTSTR) szAnonyPass_WAM);
}
}
else
{
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
// the user does not exist, so let's create it
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Creating Wam Account..."));
// Add it if it is not already there.
_stprintf(szEntry,_T("Created the iwam_ account = %s."),szAnonyName_WAM);
if (TRUE != IsThisStringInThisCStringList(strListOfWhatWeDid, szEntry))
{strListOfWhatWeDid.AddTail(szEntry);}
if (iGotPass_WAM)
{
// We were able to get the password from the metabase
// so lets create the user with that password
CreateIWAMAccount(szAnonyName_WAM,szAnonyPass_WAM,&iUserWasNewlyCreated);
if (1 == iUserWasNewlyCreated)
{
// Add to the list
g_pTheApp->UnInstallList_Add(_T("IUSR_WAM"),szAnonyName_WAM);
}
}
else
{
// we were not able to get the password from the metabase
// so let's just create one and write it back to the metabase
CreateIWAMAccount(szAnonyName_WAM,pszPassword,&iUserWasNewlyCreated);
if (1 == iUserWasNewlyCreated)
{
// Add to the list
g_pTheApp->UnInstallList_Add(_T("IUSR_WAM"),szAnonyName_WAM);
}
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
// write it to the metabase.
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Writing Wam Account to Metabase..."));
g_pTheApp->m_csWAMAccountName = szAnonyName_WAM;
g_pTheApp->m_csWAMAccountPassword = pszPassword;
WriteToMD_IWamUserName_WWW();
}
// Do Dcomcnfg?????
}
}
}
// Now check if the actual user accounts actually exist....
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
if (iGotName_WWW)
{
// check if username is blank
if (szAnonyName_WWW)
{
// Check if this user actually exists...
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Checking if iUsr user exists..."));
if (IsUserExist(szAnonyName_WWW))
{
// Fine, the user exists.... let's validate the password too
// Let's validate that the user has at least the appropriate rights...
if (iGotPass_WWW)
{
ChangeUserPassword((LPTSTR) szAnonyName_WWW, (LPTSTR) szAnonyPass_WWW);
}
}
else
{
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
// the user does not exist, so let's create it
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Creating iUsr Account..."));
// Add it if it is not already there.
_stprintf(szEntry,_T("Created the iusr_ account = %s."),szAnonyName_WWW);
if (TRUE != IsThisStringInThisCStringList(strListOfWhatWeDid, szEntry))
{strListOfWhatWeDid.AddTail(szEntry);}
if (iGotPass_WWW)
{
// We were able to get the password from the metabase
// so lets create the user with that password
CreateIUSRAccount(szAnonyName_WWW,szAnonyPass_WWW,&iUserWasNewlyCreated);
if (1 == iUserWasNewlyCreated)
{
// Add to the list
g_pTheApp->UnInstallList_Add(_T("IUSR_WWW"),szAnonyName_WWW);
}
}
else
{
// see if we can enumerate thru the lower nodes to find the password??????
// check if maybe the ftp stuff has the password there????
// we were not able to get the password from the metabase
// so let's just create one and write it back to the metabase
CreateIUSRAccount(szAnonyName_WWW,pszPassword,&iUserWasNewlyCreated);
if (1 == iUserWasNewlyCreated)
{
// Add to the list
g_pTheApp->UnInstallList_Add(_T("IUSR_WWW"),szAnonyName_WWW);
}
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
// write it to the metabase.
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Writing iUsr Account to Metabase..."));
g_pTheApp->m_csWWWAnonyName = szAnonyName_WAM;
g_pTheApp->m_csWWWAnonyPassword = pszPassword;
WriteToMD_AnonymousUserName_WWW(FALSE);
}
// Do Dcomcnfg?????
}
}
}
// Now check if the actual user accounts actually exist....
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
if (iGotName_FTP)
{
// check if username is blank
if (szAnonyName_FTP)
{
// Check if this user actually exists...
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Checking if iUsr (ftp) user exists..."));
if (IsUserExist(szAnonyName_FTP))
{
// Fine, the user exists.... let's validate the password too
// Let's validate that the user has at least the appropriate rights...
if (iGotPass_FTP)
{
ChangeUserPassword((LPTSTR) szAnonyName_FTP, (LPTSTR) szAnonyPass_FTP);
}
}
else
{
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Creating iUsr (ftp) Account..."));
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
// Add it if it is not already there.
_stprintf(szEntry,_T("Created the iusr_ account = %s."),szAnonyName_FTP);
if (TRUE != IsThisStringInThisCStringList(strListOfWhatWeDid, szEntry))
{strListOfWhatWeDid.AddTail(szEntry);}
// the user does not exist, so let's create it
if (iGotPass_FTP)
{
// We were able to get the password from the metabase
// so lets create the user with that password
CreateIUSRAccount(szAnonyName_FTP,szAnonyPass_FTP,&iUserWasNewlyCreated);
if (1 == iUserWasNewlyCreated)
{
// Add to the list
g_pTheApp->UnInstallList_Add(_T("IUSR_FTP"),szAnonyName_FTP);
}
}
else
{
// see if we can enumerate thru the lower nodes to find the password??????
// check if maybe the www stuff has the password there????
// we were not able to get the password from the metabase
// so let's just create one and write it back to the metabase
CreateIUSRAccount(szAnonyName_FTP,pszPassword,&iUserWasNewlyCreated);
if (1 == iUserWasNewlyCreated)
{
// Add to the list
g_pTheApp->UnInstallList_Add(_T("IUSR_FTP"),szAnonyName_FTP);
}
if (g_BigCancel == TRUE) goto CheckConfig_DoIt_Exit;
// write it to the metabase.
SetWindowText(GetDlgItem(hDlg, IDC_STATIC_TOPLINE), _T("Writing iUsr (ftp) Account to Metabase..."));
g_pTheApp->m_csFTPAnonyName = szAnonyName_WAM;
g_pTheApp->m_csFTPAnonyPassword = pszPassword;
WriteToMD_AnonymousUserName_FTP(FALSE);
}
// Do Dcomcnfg?????
}
}
}
// If we did anything, then popup a messagebox to the user
// about the warnings: changes....
CheckConfig_DoIt_Exit:
if (pszPassword) {GlobalFree(pszPassword);pszPassword = NULL;}
iisDebugOut_End(CheckConfig_DoIt_log,LOG_TYPE_PROGRAM_FLOW);
return iReturn;
}
#endif
const TCHAR REG_MTS_INSTALLED_KEY1[] = _T("SOFTWARE\\Microsoft\\Transaction Server\\Setup(OCM)");
const TCHAR REG_MTS_INSTALLED_KEY2[] = _T("SOFTWARE\\Microsoft\\Transaction Server\\Setup");
int ReturnTrueIfMTSInstalled(void)
{
int iReturn = TRUE;
if (!g_pTheApp->m_fInvokedByNT)
{
int bMTSInstalledFlag = FALSE;
CRegKey regMTSInstalledKey1( HKEY_LOCAL_MACHINE, REG_MTS_INSTALLED_KEY1, KEY_READ);
CRegKey regMTSInstalledKey2( HKEY_LOCAL_MACHINE, REG_MTS_INSTALLED_KEY2, KEY_READ);
if ( (HKEY)regMTSInstalledKey1 ) {bMTSInstalledFlag = TRUE;}
if ( (HKEY)regMTSInstalledKey2 ) {bMTSInstalledFlag = TRUE;}
if (bMTSInstalledFlag == TRUE)
{
// check if we can get to the MTS catalog object
if (NOERROR != DoesMTSCatalogObjectExist())
{
bMTSInstalledFlag = FALSE;
iReturn = FALSE;
MyMessageBox(NULL, IDS_MTS_INCORRECTLY_INSTALLED, MB_OK | MB_SETFOREGROUND);
goto ReturnTrueIfMTSInstalled_Exit;
}
}
if (bMTSInstalledFlag != TRUE)
{
iReturn = FALSE;
MyMessageBox(NULL, IDS_MTS_NOT_INSTALLED, MB_OK | MB_SETFOREGROUND);
goto ReturnTrueIfMTSInstalled_Exit;
}
}
ReturnTrueIfMTSInstalled_Exit:
return iReturn;
}
#ifndef _CHICAGO_
/*===================================================================
DoGoryCoInitialize
Description:
CoInitialize() of COM is extremely funny function. It can fail
and respond with S_FALSE which is to be ignored by the callers!
On other error conditions it is possible that there is a threading
mismatch. Rather than replicate the code in multiple places, here
we try to consolidate the functionality in some rational manner.
Arguments:
None
Returns:
HRESULT = NOERROR on (S_OK & S_FALSE)
other errors if any failure
===================================================================*/
HRESULT DoGoryCoInitialize(void)
{
HRESULT hr;
// do the call to CoInitialize()
iisDebugOut((LOG_TYPE_TRACE_WIN32_API, _T("ole32:CoInitializeEx().Start.")));
hr = CoInitializeEx(NULL, COINIT_MULTITHREADED);
iisDebugOut((LOG_TYPE_TRACE_WIN32_API, _T("ole32:CoInitializeEx().End.")));
//
// S_FALSE and S_OK are success. Everything else is a failure and you don't need to call CoUninitialize.
//
if ( S_OK == hr || S_FALSE == hr)
{
//
// It is okay to have failure (S_FALSE) in CoInitialize()
// This error is to be ignored and balanced with CoUninitialize()
// We will reset the hr so that subsequent use is rational
//
iisDebugOut((LOG_TYPE_TRACE_WIN32_API, _T("DoGoryCoInitialize found duplicate CoInitialize\n")));
hr = NOERROR;
}
else if (FAILED (hr))
{
iisDebugOut((LOG_TYPE_ERROR, _T("DoGoryCoInitialize found Failed error 0x%x\n"), hr));
}
return ( hr);
}
#endif // _CHICAGO_
HRESULT DoesMTSCatalogObjectExist(void)
{
HRESULT hr = NOERROR;
#ifndef _CHICAGO_
ICatalog* m_pCatalog = NULL;
ICatalogCollection* m_pPkgCollection = NULL;
hr = DoGoryCoInitialize();
if ( FAILED(hr)) {return ( hr);}
// Create instance of the catalog object
iisDebugOut((LOG_TYPE_TRACE_WIN32_API, _T("ole32:CoCreateInstance().Start.")));
hr = CoCreateInstance(CLSID_Catalog, NULL, CLSCTX_SERVER, IID_ICatalog, (void**)&m_pCatalog);
iisDebugOut((LOG_TYPE_TRACE_WIN32_API, _T("ole32:CoCreateInstance().End.")));
if (FAILED(hr))
{
iisDebugOut((LOG_TYPE_ERROR, _T("Failed to CoCreateInstance of Catalog Object.,hr = %08x\n"), hr));
}
else
{
BSTR bstr;
//
// Get the Packages collection
//
bstr = SysAllocString(L"Packages");
if (bstr)
{
hr = m_pCatalog->GetCollection(bstr, (IDispatch**)&m_pPkgCollection);
FREEBSTR(bstr);
if (FAILED(hr))
{
iisDebugOut((LOG_TYPE_ERROR, _T("m_pCatalog(%08x)->GetCollection() failed, hr = %08x\n"), m_pCatalog, hr));
}
else
{
iisDebugOut((LOG_TYPE_TRACE_WIN32_API, _T("m_pCatalog(%08x)->GetCollection() Succeeded!, hr = %08x\n"), m_pCatalog, hr));
//DBG_ASSERT( m_pPkgCollection != NULL);
}
}
else
{
iisDebugOut((LOG_TYPE_ERROR, _T("m_pCatalog(%08x)->GetCollection() failed. out of memory!\n"), m_pCatalog));
}
}
if (m_pPkgCollection != NULL )
{
RELEASE(m_pPkgCollection);
m_pPkgCollection = NULL;
}
if (m_pCatalog != NULL )
{
RELEASE(m_pCatalog);
m_pCatalog = NULL;
}
//iisDebugOut((LOG_TYPE_TRACE_WIN32_API, _T("ole32:CoUninitialize().Start.")));
CoUninitialize();
//iisDebugOut((LOG_TYPE_TRACE_WIN32_API, _T("ole32:CoUninitialize().End.")));
#endif // _CHICAGO_
return hr;
}