Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

2366 lines
82 KiB

/******************************************************************************
Copyright(c) Microsoft Corporation
Module Name:
change.cpp
Abstract:
This module changes the parameters of task(s) present in the system
Author:
Venu Gopal Choudary 01-Mar-2001
Revision History:
Venu Gopal Choudary 01-Mar-2001 : Created it
******************************************************************************/
//common header files needed for this file
#include "pch.h"
#include "CommonHeaderFiles.h"
// Function declaration for the Usage function.
DWORD DisplayChangeUsage();
BOOL GetTheUserName( LPWSTR pszUserName, DWORD dwMaxUserNameSize );
/*****************************************************************************
Routine Description:
This routine Changes the paraemters of a specified scheduled task(s)
Arguments:
[ in ] argc : Number of command line arguments
[ in ] argv : Array containing command line arguments
Return Value :
A DWORD value indicating EXIT_SUCCESS on success else
EXIT_FAILURE on failure
*****************************************************************************/
DWORD
ChangeScheduledTaskParams(
IN DWORD argc,
IN LPCTSTR argv[]
)
{
// Variables used to find whether Change option, Usage option
// are specified or not
//BOOL bChange = FALSE;
//BOOL bUsage = FALSE;
// Set the TaskSchduler object as NULL
ITaskScheduler *pITaskScheduler = NULL;
// Return value
HRESULT hr = S_OK;
// Declarations related to Task name
LPWSTR wszUserName = NULL;
LPWSTR wszPassword = NULL;
WCHAR wszApplName[_MAX_FNAME] ;
// Dynamic Array contaning array of jobs
TARRAY arrJobs = NULL;
//buffer for displaying error message
WCHAR szMessage[ 2 * MAX_JOB_LEN ] = L"\0";
BOOL bUserName = TRUE;
BOOL bPassWord = TRUE;
BOOL bSystemStatus = FALSE;
//BOOL bNeedPassword = FALSE;
BOOL bResult = FALSE;
BOOL bCloseConnection = TRUE;
DWORD dwPolicy = 0;
TCMDPARSER2 cmdChangeOptions[MAX_CHANGE_OPTIONS];
//BOOL bReturn = FALSE;
SecureZeroMemory ( wszApplName, SIZE_OF_ARRAY(wszApplName));
// declarations of structures
TCHANGESUBOPTS tchgsubops;
TCHANGEOPVALS tchgoptvals;
//Initialize structures to neutral values.
//SecureZeroMemory( &cmdChangeOptions, sizeof( TCMDPARSER2 ) * MAX_CHANGE_OPTIONS);
SecureZeroMemory( &tchgsubops, sizeof( TCHANGESUBOPTS ) );
SecureZeroMemory( &tchgoptvals, sizeof( TCHANGEOPVALS ) );
BOOL bReturn = FALSE;
// /change sub-options
const WCHAR szChangeOpt[] = L"change";
const WCHAR szChangeHelpOpt[] = L"?";
const WCHAR szChangeServerOpt[] = L"s";
const WCHAR szChangeUserOpt[] = L"u";
const WCHAR szChangePwdOpt[] = L"p";
const WCHAR szChangeRunAsUserOpt[] = L"ru";
const WCHAR szChangeRunAsPwdOpt[] = L"rp";
const WCHAR szChangeTaskNameOpt[] = L"tn";
const WCHAR szChangeTaskRunOpt[] = L"tr";
const WCHAR szChangeStartTimeOpt[] = L"st";
const WCHAR szChangeEndTimeOpt[] = L"et";
const WCHAR szChangeStartDateOpt[] = L"sd";
const WCHAR szChangeEndDateOpt[] = L"ed";
const WCHAR szChangeKillAtDurOpt[] = L"k";
const WCHAR szChangeDurationOpt[] = L"du";
const WCHAR szChangeInteractiveOpt[] = L"it";
const WCHAR szChangeStatusOn[] = L"enable";
const WCHAR szChangeStatusOff[] = L"disable";
const WCHAR szChangeDelIfNotSchedOpt[] = L"z";
const WCHAR szChangeRepeatIntervalOpt[] = L"ri";
//
// fill the commandline parser
//
// set all the fields to 0
SecureZeroMemory( cmdChangeOptions, sizeof( TCMDPARSER2 ) * MAX_CHANGE_OPTIONS );
// /change option
StringCopyA( cmdChangeOptions[ OI_CHANGE_OPTION ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_OPTION ].dwType = CP_TYPE_BOOLEAN;
cmdChangeOptions[ OI_CHANGE_OPTION ].pwszOptions = szChangeOpt;
cmdChangeOptions[ OI_CHANGE_OPTION ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_OPTION ].dwFlags = 0;
cmdChangeOptions[ OI_CHANGE_OPTION ].pValue = &tchgsubops.bChange;
// /? option
StringCopyA( cmdChangeOptions[ OI_CHANGE_USAGE ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_USAGE ].dwType = CP_TYPE_BOOLEAN;
cmdChangeOptions[ OI_CHANGE_USAGE ].pwszOptions = szChangeHelpOpt;
cmdChangeOptions[ OI_CHANGE_USAGE ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_USAGE ].dwFlags = CP2_USAGE;
cmdChangeOptions[ OI_CHANGE_USAGE ].pValue = &tchgsubops.bUsage;
// /s option
StringCopyA( cmdChangeOptions[ OI_CHANGE_SERVER ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_SERVER ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_SERVER ].pwszOptions = szChangeServerOpt;
cmdChangeOptions[ OI_CHANGE_SERVER ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_SERVER ].dwFlags = CP2_ALLOCMEMORY| CP2_VALUE_TRIMINPUT|CP2_VALUE_NONULL ;
// /u option
StringCopyA( cmdChangeOptions[ OI_CHANGE_USERNAME ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_USERNAME ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_USERNAME ].pwszOptions = szChangeUserOpt;
cmdChangeOptions[ OI_CHANGE_USERNAME ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_USERNAME ].dwFlags = CP2_ALLOCMEMORY | CP2_VALUE_TRIMINPUT|CP2_VALUE_NONULL ;
// /p option
StringCopyA( cmdChangeOptions[ OI_CHANGE_PASSWORD ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_PASSWORD ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_PASSWORD ].pwszOptions = szChangePwdOpt;
cmdChangeOptions[ OI_CHANGE_PASSWORD ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_PASSWORD ].dwActuals = 0;
cmdChangeOptions[ OI_CHANGE_PASSWORD ].dwFlags = CP2_ALLOCMEMORY | CP2_VALUE_OPTIONAL ;
// /ru option
StringCopyA( cmdChangeOptions[ OI_CHANGE_RUNASUSER ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_RUNASUSER ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_RUNASUSER ].pwszOptions = szChangeRunAsUserOpt;
cmdChangeOptions[ OI_CHANGE_RUNASUSER ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_RUNASUSER ].dwFlags = CP2_ALLOCMEMORY| CP2_VALUE_TRIMINPUT;
// /rp option
StringCopyA( cmdChangeOptions[ OI_CHANGE_RUNASPASSWORD ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_RUNASPASSWORD ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_RUNASPASSWORD ].pwszOptions = szChangeRunAsPwdOpt;
cmdChangeOptions[ OI_CHANGE_RUNASPASSWORD ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_RUNASPASSWORD ].dwFlags = CP2_ALLOCMEMORY | CP2_VALUE_OPTIONAL;
// /st option
StringCopyA( cmdChangeOptions[ OI_CHANGE_STARTTIME ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_STARTTIME ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_STARTTIME ].pwszOptions = szChangeStartTimeOpt;
cmdChangeOptions[ OI_CHANGE_STARTTIME ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_STARTTIME ].dwFlags = CP2_VALUE_TRIMINPUT | CP2_VALUE_NONULL;
cmdChangeOptions[ OI_CHANGE_STARTTIME ].pValue = tchgsubops.szStartTime;
cmdChangeOptions[ OI_CHANGE_STARTTIME ].dwLength = MAX_STRING_LENGTH;
// /sd option
StringCopyA( cmdChangeOptions[ OI_CHANGE_STARTDATE ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_STARTDATE ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_STARTDATE ].pwszOptions = szChangeStartDateOpt;
cmdChangeOptions[ OI_CHANGE_STARTDATE ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_STARTDATE ].dwFlags = CP2_VALUE_TRIMINPUT | CP2_VALUE_NONULL;
cmdChangeOptions[ OI_CHANGE_STARTDATE ].pValue = tchgsubops.szStartDate;
cmdChangeOptions[ OI_CHANGE_STARTDATE ].dwLength = MAX_STRING_LENGTH;
// /ed option
StringCopyA( cmdChangeOptions[ OI_CHANGE_ENDDATE ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_ENDDATE ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_ENDDATE ].pwszOptions = szChangeEndDateOpt;
cmdChangeOptions[ OI_CHANGE_ENDDATE ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_ENDDATE ].dwFlags = CP2_VALUE_TRIMINPUT | CP2_VALUE_NONULL;
cmdChangeOptions[ OI_CHANGE_ENDDATE ].pValue = tchgsubops.szEndDate;
cmdChangeOptions[ OI_CHANGE_ENDDATE ].dwLength = MAX_STRING_LENGTH;
// /et option
StringCopyA( cmdChangeOptions[ OI_CHANGE_ENDTIME ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_ENDTIME ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_ENDTIME ].pwszOptions = szChangeEndTimeOpt;
cmdChangeOptions[ OI_CHANGE_ENDTIME ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_ENDTIME ].dwFlags = CP2_VALUE_TRIMINPUT | CP2_VALUE_NONULL;
cmdChangeOptions[ OI_CHANGE_ENDTIME ].pValue = &tchgsubops.szEndTime;
cmdChangeOptions[ OI_CHANGE_ENDTIME ].dwLength = MAX_STRING_LENGTH;
// /k option
StringCopyA( cmdChangeOptions[ OI_CHANGE_DUR_END ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_DUR_END ].dwType = CP_TYPE_BOOLEAN ;
cmdChangeOptions[ OI_CHANGE_DUR_END ].pwszOptions = szChangeKillAtDurOpt ;
cmdChangeOptions[ OI_CHANGE_DUR_END ].dwCount = 1 ;
cmdChangeOptions[ OI_CHANGE_DUR_END ].pValue = &tchgsubops.bIsDurEnd;
// /du option
StringCopyA( cmdChangeOptions[ OI_CHANGE_DURATION ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_DURATION ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_DURATION ].pwszOptions = szChangeDurationOpt;
cmdChangeOptions[ OI_CHANGE_DURATION ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_DURATION ].dwFlags = CP2_VALUE_TRIMINPUT | CP2_VALUE_NONULL;
cmdChangeOptions[ OI_CHANGE_DURATION ].pValue = tchgsubops.szDuration;
cmdChangeOptions[ OI_CHANGE_DURATION ].dwLength = MAX_STRING_LENGTH;
// /tn option
StringCopyA( cmdChangeOptions[ OI_CHANGE_TASKNAME ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_TASKNAME ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_TASKNAME ].pwszOptions = szChangeTaskNameOpt;
cmdChangeOptions[ OI_CHANGE_TASKNAME ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_TASKNAME ].dwFlags = CP2_MANDATORY;
cmdChangeOptions[ OI_CHANGE_TASKNAME ].pValue = tchgsubops.szTaskName;
cmdChangeOptions[ OI_CHANGE_TASKNAME ].dwLength = MAX_JOB_LEN;
// /tr option
StringCopyA( cmdChangeOptions[ OI_CHANGE_TASKRUN ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_TASKRUN ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_TASKRUN ].pwszOptions = szChangeTaskRunOpt;
cmdChangeOptions[ OI_CHANGE_TASKRUN ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_TASKRUN ].dwFlags = CP2_VALUE_TRIMINPUT|CP2_VALUE_NONULL ;
cmdChangeOptions[ OI_CHANGE_TASKRUN ].pValue = tchgsubops.szTaskRun;
cmdChangeOptions[ OI_CHANGE_TASKRUN ].dwLength = MAX_TASK_LEN;
// /it option
StringCopyA( cmdChangeOptions[ OI_CHANGE_IT ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_IT ].dwType = CP_TYPE_BOOLEAN;
cmdChangeOptions[ OI_CHANGE_IT ].pwszOptions = szChangeInteractiveOpt;
cmdChangeOptions[ OI_CHANGE_IT ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_IT ].dwFlags = 0;
cmdChangeOptions[ OI_CHANGE_IT ].pValue = &tchgsubops.bInteractive;
// /enable option
StringCopyA( cmdChangeOptions[ OI_CHANGE_ENABLE ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_ENABLE ].dwType = CP_TYPE_BOOLEAN;
cmdChangeOptions[ OI_CHANGE_ENABLE ].pwszOptions = szChangeStatusOn;
cmdChangeOptions[ OI_CHANGE_ENABLE ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_ENABLE ].pValue = &tchgsubops.bEnable;
// /disable option
StringCopyA( cmdChangeOptions[ OI_CHANGE_DISABLE ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_DISABLE ].dwType = CP_TYPE_BOOLEAN;
cmdChangeOptions[ OI_CHANGE_DISABLE ].pwszOptions = szChangeStatusOff;
cmdChangeOptions[ OI_CHANGE_DISABLE ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_DISABLE ].pValue = &tchgsubops.bDisable;
// /z option
StringCopyA( cmdChangeOptions[ OI_CHANGE_DELNOSCHED ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_DELNOSCHED ].dwType = CP_TYPE_BOOLEAN;
cmdChangeOptions[ OI_CHANGE_DELNOSCHED ].pwszOptions = szChangeDelIfNotSchedOpt;
cmdChangeOptions[ OI_CHANGE_DELNOSCHED ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_DELNOSCHED ].pValue = &tchgsubops.bDelIfNotSched;
// /ri option
StringCopyA( cmdChangeOptions[ OI_CHANGE_REPEAT_INTERVAL ].szSignature, "PARSER2\0", 8 );
cmdChangeOptions[ OI_CHANGE_REPEAT_INTERVAL ].dwType = CP_TYPE_TEXT;
cmdChangeOptions[ OI_CHANGE_REPEAT_INTERVAL ].pwszOptions = szChangeRepeatIntervalOpt;
cmdChangeOptions[ OI_CHANGE_REPEAT_INTERVAL ].dwCount = 1;
cmdChangeOptions[ OI_CHANGE_REPEAT_INTERVAL ].dwFlags = CP2_VALUE_TRIMINPUT | CP2_VALUE_NONULL;
cmdChangeOptions[ OI_CHANGE_REPEAT_INTERVAL ].pValue = tchgsubops.szRepeat;
cmdChangeOptions[ OI_CHANGE_REPEAT_INTERVAL ].dwLength = MAX_STRING_LENGTH;
//parse command line arguments
bReturn = DoParseParam2( argc, argv, 0, SIZE_OF_ARRAY(cmdChangeOptions), cmdChangeOptions, 0);
if( FALSE == bReturn) // Invalid commandline
{
//display an error message
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_INTERNAL );
ReleaseGlobals();
return EXIT_FAILURE;
}
// get the buffer pointers allocated by command line parser
tchgsubops.szServer = (LPWSTR)cmdChangeOptions[ OI_CHANGE_SERVER ].pValue;
tchgsubops.szUserName = (LPWSTR)cmdChangeOptions[ OI_CHANGE_USERNAME ].pValue;
tchgsubops.szPassword = (LPWSTR)cmdChangeOptions[ OI_CHANGE_PASSWORD ].pValue;
tchgsubops.szRunAsUserName = (LPWSTR)cmdChangeOptions[ OI_CHANGE_RUNASUSER ].pValue;
tchgsubops.szRunAsPassword = (LPWSTR)cmdChangeOptions[ OI_CHANGE_RUNASPASSWORD ].pValue;
// process the options for -change option
if( EXIT_FAILURE == ValidateChangeOptions ( argc, cmdChangeOptions, tchgsubops, tchgoptvals ) )
{
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
// Displaying change usage if user specified -? with -change option
if( tchgsubops.bUsage == TRUE )
{
DisplayChangeUsage();
//release memory
ReleaseChangeMemory(&tchgsubops);
return EXIT_SUCCESS;
}
// check whether server (-s) and username (-u) only specified along with the command or not
if( ( IsLocalSystem( tchgsubops.szServer ) == FALSE ) || ( cmdChangeOptions[OI_CHANGE_USERNAME].dwActuals == 1 ) )
{
// Establish the connection on a remote machine
bResult = EstablishConnection(tchgsubops.szServer,tchgsubops.szUserName,GetBufferSize(tchgsubops.szUserName)/sizeof(WCHAR),tchgsubops.szPassword,GetBufferSize(tchgsubops.szPassword)/sizeof(WCHAR), tchgoptvals.bNeedPassword );
if (bResult == FALSE)
{
// displays the appropriate error message
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR| SLE_INTERNAL );
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE ;
}
else
{
// though the connection is successfull, some conflict might have occured
switch( GetLastError() )
{
case I_NO_CLOSE_CONNECTION:
bCloseConnection = FALSE;
break;
// check for mismatched credentials
case E_LOCAL_CREDENTIALS:
case ERROR_SESSION_CREDENTIAL_CONFLICT:
{
bCloseConnection = FALSE;
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR| SLE_INTERNAL );
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
default :
bCloseConnection = TRUE;
}
}
//release memory for password
FreeMemory((LPVOID*) &tchgsubops.szPassword);
}
// Get the task Scheduler object for the system.
pITaskScheduler = GetTaskScheduler( tchgsubops.szServer );
// If the Task Scheduler is not defined then give the error message.
if ( pITaskScheduler == NULL )
{
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
// Validate the Given Task and get as TARRAY in case of taskname
arrJobs = ValidateAndGetTasks( pITaskScheduler, tchgsubops.szTaskName);
if( arrJobs == NULL )
{
StringCchPrintf( szMessage , SIZE_OF_ARRAY(szMessage), GetResString(IDS_TASKNAME_NOTEXIST), _X( tchgsubops.szTaskName ));
ShowMessage(stderr, szMessage );
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
// check whether the group policy prevented user from changing the
// properties of a task or not.
if ( FALSE == GetGroupPolicy( tchgsubops.szServer, tchgsubops.szUserName, TS_KEYPOLICY_DENY_PROPERTIES, &dwPolicy ) )
{
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
if ( dwPolicy > 0 )
{
ShowMessage ( stdout, GetResString (IDS_PREVENT_CHANGE));
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_SUCCESS;
}
IPersistFile *pIPF = NULL;
ITask *pITask = NULL;
ITaskTrigger *pITaskTrig = NULL;
WORD wTrigNumber = 0;
TASK_TRIGGER TaskTrig;
SecureZeroMemory(&TaskTrig, sizeof (TASK_TRIGGER));
TaskTrig.cbTriggerSize = sizeof (TASK_TRIGGER);
TaskTrig.Reserved1 = 0; // reserved field and must be set to 0.
TaskTrig.Reserved2 = 0; // reserved field and must be set to 0.
//sub-variabes
WORD wStartDay = 0;
WORD wStartMonth = 0;
WORD wStartYear = 0;
WORD wStartHour = 0;
WORD wStartMin = 0;
WORD wEndHour = 0;
WORD wEndMin = 0;
WORD wEndDay = 0;
WORD wEndYear = 0;
WORD wEndMonth = 0;
StringConcat ( tchgsubops.szTaskName, JOB, SIZE_OF_ARRAY(tchgsubops.szTaskName) );
// returns an pITask inteface for szTaskName
hr = pITaskScheduler->Activate(tchgsubops.szTaskName,IID_ITask,
(IUnknown**) &pITask);
if (FAILED(hr))
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
//if the user name is not specifed set the current logged on user settings
DWORD dwTaskFlags = 0;
BOOL bFlag = FALSE;
//WCHAR szBuffer[2 * MAX_STRING_LENGTH] = L"\0";
WCHAR szRunAsUser[MAX_STRING_LENGTH];
WCHAR* szValues[2] = {NULL};//To pass to FormatMessage() API
StringCopy ( szRunAsUser, L"", SIZE_OF_ARRAY(szRunAsUser));
if ( cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals == 1 )
{
wszUserName = tchgsubops.szRunAsUserName;
bUserName = TRUE;
}
else
{
// get the run as user name for a specified scheduled task
hr = GetRunAsUser(pITask, szRunAsUser);
if (FAILED(hr))
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
}
// System account is not applicable with /IT option
if ( (StringLength (szRunAsUser, 0) == 0) && (tchgsubops.bInteractive == TRUE ) &&
( cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals == 0 ))
{
ShowMessage ( stderr, GetResString (IDS_IT_NO_SYSTEM) );
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
//check whether /TR option is specified or not
if( cmdChangeOptions[OI_CHANGE_TASKRUN].dwActuals == 1 )
{
// check for .exe substring string in the given task to run string
wchar_t wcszParam[MAX_RES_STRING] = L"\0";
DWORD dwProcessCode = 0 ;
dwProcessCode = ProcessFilePath(tchgsubops.szTaskRun,wszApplName,wcszParam);
if(dwProcessCode == EXIT_FAILURE)
{
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
// Set command name with ITask::SetApplicationName
hr = pITask->SetApplicationName(wszApplName);
if (FAILED(hr))
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
//[Working directory = exe pathname - exe name]
wchar_t* wcszStartIn = wcsrchr(wszApplName,_T('\\'));
if(wcszStartIn != NULL)
*( wcszStartIn ) = _T('\0');
// set the working directory of command
hr = pITask->SetWorkingDirectory(wszApplName);
if (FAILED(hr))
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
// set the command line parameters for the task
hr = pITask->SetParameters(wcszParam);
if (FAILED(hr))
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if( pIPF )
{
pIPF->Release();
}
if( pITask )
{
pITask->Release();
}
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
}
// get the flags
hr = pITask->GetFlags(&dwTaskFlags);
if (FAILED(hr))
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
// set flag to run the task interactively
if ( TRUE == tchgsubops.bInteractive )
{
dwTaskFlags |= TASK_FLAG_RUN_ONLY_IF_LOGGED_ON;
}
// remove the .job extension from the taskname
if ( ParseTaskName( tchgsubops.szTaskName ) )
{
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
// if /enable is specified
if ( TRUE == tchgsubops.bEnable )
{
// check if task has already been enabled or not
if ( !((dwTaskFlags & TASK_FLAG_DISABLED) == TASK_FLAG_DISABLED ) )
{
StringCchPrintf ( szMessage, SIZE_OF_ARRAY(szMessage), GetResString(IDS_ALREADY_ENABLED), _X(tchgsubops.szTaskName));
// display message as .. task has already been enabled
ShowMessage ( stdout, _X(szMessage));
// if /Enable optional parameter is only specified to change..if the specified
// task has already been enabled.. then return with success
if( TRUE == tchgoptvals.bFlag )
{
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_SUCCESS;
}
}
else
{
dwTaskFlags &= ~(TASK_FLAG_DISABLED);
}
}
else if (TRUE == tchgsubops.bDisable ) // if /disable is specified
{
// check if task is already been disabled or not
if ( (dwTaskFlags & TASK_FLAG_DISABLED) == TASK_FLAG_DISABLED )
{
StringCchPrintf ( szMessage, SIZE_OF_ARRAY(szMessage), GetResString(IDS_ALREADY_DISABLED), _X(tchgsubops.szTaskName));
// display message as .. task has already been disabled
ShowMessage ( stdout, _X(szMessage));
// if /Disable optional parameter is only specified to change..if the specified
// task has already been disabled.. then return with success
if( TRUE == tchgoptvals.bFlag )
{
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_SUCCESS;
}
}
else
{
dwTaskFlags |= TASK_FLAG_DISABLED;
}
}
// if /n is specified .. enables the falg to delete the task if not scheduled to
// run again...
if ( TRUE == tchgsubops.bDelIfNotSched)
{
dwTaskFlags |= TASK_FLAG_DELETE_WHEN_DONE;
}
// set the flags
hr = pITask->SetFlags(dwTaskFlags);
if (FAILED(hr))
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
if ( bSystemStatus == TRUE )
{
//szValues[0] = (WCHAR*) (tchgsubops.szTaskName);
StringCchPrintf ( szMessage, SIZE_OF_ARRAY(szMessage), GetResString(IDS_NTAUTH_SYSTEM_CHANGE_INFO), _X(tchgsubops.szTaskName));
ShowMessage ( stdout, _X(szMessage));
}
if( (cmdChangeOptions[OI_CHANGE_RUNASPASSWORD].dwActuals == 1) && ( bSystemStatus == TRUE ) &&
(StringLength( tchgsubops.szRunAsPassword, 0 ) != 0) )
{
ShowMessage( stdout, GetResString( IDS_PASSWORD_NOEFFECT ) );
}
//get the trigger for the corresponding task
hr = pITask->GetTrigger(wTrigNumber, &pITaskTrig);
if (FAILED(hr))
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
//Get the current task trigger
hr = pITaskTrig->GetTrigger(&TaskTrig);
if (hr != S_OK)
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
//sub-variables
DWORD dwRepeat = 0;
DWORD dwEndTimeInMin = 0;
DWORD dwStartTimeInMin = 0;
DWORD dwDuration = 0;
DWORD dwModifierVal = 0;
LPWSTR pszStopString = NULL;
// check whether /SD o /ED is specified for the scheduled type ONETIME
if( ( TaskTrig.TriggerType == TASK_TIME_TRIGGER_ONCE) && (( cmdChangeOptions[OI_CHANGE_STARTDATE].dwActuals == 1 ) ||
( cmdChangeOptions[OI_CHANGE_ENDDATE].dwActuals == 1 ) ) )
{
// display an error message as.. /SD or /ED is not allowed for ONCE
ShowMessage(stderr, GetResString(IDS_CHANGE_ONCE_NA));
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
//check whether either /Rt or /Et or /Ri or /Du is specified for the existing scheduled types
// onstart, onlogon and onstart..
if ( ( ( cmdChangeOptions[OI_CHANGE_REPEAT_INTERVAL].dwActuals == 1) ||
( cmdChangeOptions[OI_CHANGE_DURATION].dwActuals == 1) || ( cmdChangeOptions[OI_CHANGE_ENDTIME].dwActuals == 1) ||
( cmdChangeOptions[OI_CHANGE_ENDDATE].dwActuals == 1) || ( cmdChangeOptions[OI_CHANGE_STARTTIME].dwActuals == 1) ||
( cmdChangeOptions[OI_CHANGE_STARTDATE].dwActuals == 1) || ( cmdChangeOptions[OI_CHANGE_DUR_END].dwActuals == 1) ) &&
( (TaskTrig.TriggerType == TASK_EVENT_TRIGGER_ON_IDLE) ||
(TaskTrig.TriggerType == TASK_EVENT_TRIGGER_AT_SYSTEMSTART ) || ( TaskTrig.TriggerType == TASK_EVENT_TRIGGER_AT_LOGON ) ) )
{
ShowMessage (stderr, GetResString (IDS_SCTYPE_NA) );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
//If either /DU or /ET is specified and /RI is not specified..
// then set dwRepeat-> actual repetition value
if( (cmdChangeOptions[OI_CHANGE_REPEAT_INTERVAL].dwActuals == 0) &&
( (cmdChangeOptions[OI_CHANGE_DURATION].dwActuals == 1) ||
(cmdChangeOptions[OI_CHANGE_ENDTIME].dwActuals == 1) ) )
{
if ( 0 != TaskTrig.MinutesInterval )
{
dwRepeat = TaskTrig.MinutesInterval;
}
else
{
//repetition interval defaults to 10 minutes
dwRepeat = 10;
}
}
//If either /DU or /ET is not specified and /RI is specified..
// then set dwDuration-> actual duration value
if( ( cmdChangeOptions[OI_CHANGE_DURATION].dwActuals == 0 ) && ( cmdChangeOptions[OI_CHANGE_ENDTIME].dwActuals == 0 ) &&
(cmdChangeOptions[OI_CHANGE_REPEAT_INTERVAL].dwActuals == 1) )
{
if ( 0 != TaskTrig.MinutesDuration )
{
dwDuration = TaskTrig.MinutesDuration;
}
else
{
//duration defaults to 10 minutes
dwDuration = 60;
}
}
if( cmdChangeOptions[OI_CHANGE_REPEAT_INTERVAL].dwActuals == 1)
{
// get the repetition value
dwRepeat = wcstol(tchgsubops.szRepeat, &pszStopString, BASE_TEN);
if ((errno == ERANGE) ||
((pszStopString != NULL) && (StringLength (pszStopString, 0) != 0) ) ||
( (dwRepeat < MIN_REPETITION_INTERVAL ) || ( dwRepeat > MAX_REPETITION_INTERVAL) ) )
{
// display an error message as .. invalid value specified for /RT
ShowMessage ( stderr, GetResString (IDS_INVALID_RT_VALUE) );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
//check whether the specified repetition interval is greater than 9999..
// if so, set the maximum repetition interval as 9999.
if ( (dwRepeat > 9999) && ( (dwRepeat % 60) != 0) )
{
//display some warning message as.. max value (less than the specified interval)
// divisible by 60.
ShowMessage ( stderr, GetResString (IDS_WARN_VALUE) );
dwRepeat -= (dwRepeat % 60);
}
}
// if the start time is specified..set the specified values to the current trigger
if (cmdChangeOptions[ OI_CHANGE_STARTTIME ].dwActuals == 1)
{
// get the Start time in terms of hours, minutes and seconds
GetTimeFieldEntities(tchgsubops.szStartTime, &wStartHour, &wStartMin );
// set the start time
TaskTrig.wStartHour = wStartHour;
TaskTrig.wStartMinute = wStartMin;
}
else
{
// get the values for start time
wStartHour = TaskTrig.wStartHour;
wStartMin = TaskTrig.wStartMinute;
}
//check whether /ET is specified or not
if (cmdChangeOptions[OI_CHANGE_ENDTIME].dwActuals == 1)
{
// get the Start time in terms of hours, minutes and seconds
GetTimeFieldEntities(tchgsubops.szEndTime, &wEndHour, &wEndMin );
// calculate start time in minutes
dwStartTimeInMin = (DWORD) ( wStartHour * MINUTES_PER_HOUR * SECS_PER_MINUTE + wStartMin * SECS_PER_MINUTE )/ SECS_PER_MINUTE ;
// calculate end time in minutes
dwEndTimeInMin = (DWORD) ( wEndHour * MINUTES_PER_HOUR * SECS_PER_MINUTE + wEndMin * SECS_PER_MINUTE ) / SECS_PER_MINUTE ;
// check whether end time is later than start time
if ( dwEndTimeInMin >= dwStartTimeInMin )
{
// if the end and start time in the same day..
// get the duration between end and start time (in minutes)
dwDuration = dwEndTimeInMin - dwStartTimeInMin ;
}
else
{
// if the start and end time not in the same day..
// get the duration between start and end time (in minutes)
// and subtract that duration by 1440(max value in minutes)..
dwDuration = 1440 - (dwStartTimeInMin - dwEndTimeInMin ) ;
}
dwModifierVal = TaskTrig.MinutesInterval ;
//check whether The duration is greater than the repetition interval or not.
if ( dwDuration <= dwModifierVal || dwDuration <= dwRepeat)
{
ShowMessage ( stderr, GetResString (IDS_INVALID_DURATION1) );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
}
else if(cmdChangeOptions[OI_CHANGE_DURATION].dwActuals == 1)
{
//sub-variables
WCHAR tHours[MAX_RES_STRING];
WCHAR tMins[MAX_RES_STRING];
DWORD dwDurationHours = 0;
DWORD dwDurationMin = 0;
//initialize the variables
SecureZeroMemory (tHours, SIZE_OF_ARRAY(tHours));
SecureZeroMemory (tMins, SIZE_OF_ARRAY(tMins));
if ( ( StringLength (tchgsubops.szDuration, 0) != 7 ) || (tchgsubops.szDuration[4] != TIME_SEPARATOR_CHAR) )
{
ShowMessage ( stderr, GetResString (IDS_INVALIDDURATION_FORMAT) );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
StringCopy(tHours, wcstok(tchgsubops.szDuration,TIME_SEPARATOR_STR), SIZE_OF_ARRAY(tHours)); // Get the Hours field.
if(StringLength(tHours, 0) > 0)
{
StringCopy(tMins, wcstok(NULL,TIME_SEPARATOR_STR), SIZE_OF_ARRAY(tMins)); // Get the Minutes field.
}
dwDurationHours = wcstol(tHours, &pszStopString, BASE_TEN);
if ((errno == ERANGE) ||
((pszStopString != NULL) && (StringLength (pszStopString, 0) != 0) ) )
{
ShowMessage ( stderr, GetResString (IDS_INVALID_DU_VALUE) );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
dwDurationHours = dwDurationHours * MINUTES_PER_HOUR;
dwDurationMin = wcstol(tMins, &pszStopString, BASE_TEN);
if ((errno == ERANGE) ||
((pszStopString != NULL) && (StringLength (pszStopString, 0) != 0) ) )
{
ShowMessage ( stderr, GetResString (IDS_INVALID_DU_VALUE) );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
// sum the hours and minutes into minutes
dwDuration = dwDurationHours + dwDurationMin ;
dwModifierVal = TaskTrig.MinutesInterval ;
//check whether The duration is greater than the repetition interval or not.
if ( dwDuration <= dwModifierVal || dwDuration <= dwRepeat)
{
ShowMessage ( stderr, GetResString (IDS_INVALID_DURATION2) );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
}
// set the repetition interval and duration values
{
// if repetition interval is not 0.. then set actual value of /RI
if ( 0 != dwRepeat )
{
// set the MinutesInterval
TaskTrig.MinutesInterval = dwRepeat;
}
// if duration is not 0.. set the actual value of /DU
if ( 0 != dwDuration )
{
// set the duration value
TaskTrig.MinutesDuration = dwDuration ;
}
}
//check whether The duration is greater than the repetition interval or not.
if ( (0 != dwRepeat) && ( dwDuration <= dwRepeat ) )
{
ShowMessage ( stderr, GetResString (IDS_INVALID_DURATION2) );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
// if the start date is specified..set the specified values to the current trigger
if (cmdChangeOptions[OI_CHANGE_STARTDATE].dwActuals == 1)
{
// get the Start date in terms of day, month and year
GetDateFieldEntities(tchgsubops.szStartDate, &wStartDay, &wStartMonth, &wStartYear);
// set the start time
TaskTrig.wBeginDay = wStartDay;
TaskTrig.wBeginMonth = wStartMonth;
TaskTrig.wBeginYear = wStartYear;
}
else
{
// get the esisting start time
wStartDay = TaskTrig.wBeginDay ;
wStartMonth = TaskTrig.wBeginMonth ;
wStartYear = TaskTrig.wBeginYear ;
}
//check whether /K is specified or not
if ( TRUE == tchgsubops.bIsDurEnd )
{
// set the flag to terminate the task at the end of lifetime.
TaskTrig.rgFlags |= TASK_TRIGGER_FLAG_KILL_AT_DURATION_END ;
}
// if the start time is specified..set the specified values to the current trigger
if (cmdChangeOptions[OI_CHANGE_ENDDATE].dwActuals == 1)
{
// Now set the end date entities.
GetDateFieldEntities(tchgsubops.szEndDate, &wEndDay, &wEndMonth, &wEndYear);
// Make end date valid; otherwise the enddate parameter is ignored.
TaskTrig.rgFlags |= TASK_TRIGGER_FLAG_HAS_END_DATE;
TaskTrig.wEndDay = wEndDay;
TaskTrig.wEndMonth = wEndMonth;
TaskTrig.wEndYear = wEndYear;
}
else
{
// get the esisting end date
wEndDay = TaskTrig.wEndDay ;
wEndMonth = TaskTrig.wEndMonth ;
wEndYear = TaskTrig.wEndYear ;
}
if ( (0 != wStartYear) && (0 != wEndYear) )
{
//check whether end date is earlier than start date or not
if( ( wEndYear == wStartYear ) )
{
// For same years if the end month is less than start month or for same years and same months
// if the endday is less than the startday.
if ( ( wEndMonth < wStartMonth ) || ( ( wEndMonth == wStartMonth ) && ( wEndDay < wStartDay ) ) )
{
ShowMessage(stderr, GetResString(IDS_ENDATE_INVALID));
return RETVAL_FAIL;
}
}
else if ( wEndYear < wStartYear )
{
ShowMessage(stderr, GetResString(IDS_ENDATE_INVALID));
return RETVAL_FAIL;
}
}
// set the task trigger
hr = pITaskTrig->SetTrigger(&TaskTrig);
if (hr != S_OK)
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
/////////////////////////////////////////
//check for user creentials
////////////////////////////////////////
// Check whether /ru "" or "System" or "Nt Authority\System" for system account
if ( ( ((tchgsubops.bInteractive == TRUE ) && (StringLength (szRunAsUser, 0) == 0)) || (cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals == 1 ) ) &&
( (StringLength( tchgsubops.szRunAsUserName, 0) == 0) || ( StringCompare(tchgsubops.szRunAsUserName, NTAUTHORITY_USER, TRUE, 0 ) == 0 ) ||
(StringCompare(tchgsubops.szRunAsUserName, SYSTEM_USER, TRUE, 0 ) == 0 ) ) )
{
bSystemStatus = TRUE;
bFlag = TRUE;
}
else if ( FAILED (hr) )
{
bFlag = TRUE;
}
// flag to check whether run as user name is "NT AUTHORITY\SYSTEM" or not
if ( bFlag == FALSE )
{
// check for "NT AUTHORITY\SYSTEM" username
if( ( ( cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals == 1 ) && ( StringLength( tchgsubops.szRunAsUserName, 0) == 0 ) ) ||
( ( cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals == 1 ) && ( StringLength( tchgsubops.szRunAsUserName, 0) == 0 ) && ( StringLength(tchgsubops.szRunAsPassword, 0 ) == 0 ) ) ||
( ( cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals == 1 ) && ( StringCompare(tchgsubops.szRunAsUserName, NTAUTHORITY_USER, TRUE, 0 ) == 0 ) && ( StringLength(tchgsubops.szRunAsPassword, 0 ) == 0 )) ||
( ( cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals == 1 ) && ( StringCompare(tchgsubops.szRunAsUserName, NTAUTHORITY_USER, TRUE, 0 ) == 0 ) ) ||
( ( cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals == 1 ) && ( StringCompare(tchgsubops.szRunAsUserName, SYSTEM_USER, TRUE, 0) == 0 ) && ( StringLength(tchgsubops.szRunAsPassword, 0 ) == 0 ) ) ||
( ( cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals == 1 ) && ( StringCompare(tchgsubops.szRunAsUserName, SYSTEM_USER, TRUE, 0 ) == 0 ) ) )
{
bSystemStatus = TRUE;
}
}
if ( bSystemStatus == FALSE )
{
//check the length of run as user name
if ( (StringLength( tchgsubops.szRunAsUserName, 0 ) != 0 ))
{
wszUserName = tchgsubops.szRunAsUserName;
}
else if (( cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals == 0 ))
{
wszUserName = szRunAsUser;
bUserName = TRUE;
}
else
{
bUserName = FALSE;
}
//check for the null password
if ( ( StringLength( tchgsubops.szRunAsPassword, 0 ) != 0 ) && ( StringCompare ( tchgsubops.szRunAsPassword, ASTERIX, TRUE, 0) != 0 ) )
{
wszPassword = tchgsubops.szRunAsPassword;
bPassWord = TRUE;
}
else
{
// check whether -rp is specified or not
if (cmdChangeOptions[OI_CHANGE_RUNASPASSWORD].dwActuals == 1)
{
if( ( StringCompare( tchgsubops.szRunAsPassword , L"\0", TRUE, 0 ) != 0 ) && ( StringCompare ( tchgsubops.szRunAsPassword, ASTERIX, TRUE, 0) != 0 ) )
{
bPassWord = TRUE;
}
else if ( ( bSystemStatus == FALSE ) && ( StringLength (tchgsubops.szRunAsPassword, 0) == 0 ) )
{
ShowMessage (stderr, GetResString(IDS_WARN_EMPTY_PASSWORD));
}
else if ( StringCompare ( tchgsubops.szRunAsPassword, ASTERIX, TRUE, 0) == 0 )
{
bPassWord = FALSE;
}
}
else if ( bSystemStatus == FALSE )
{
bPassWord = FALSE;
}
}
}
// check for the status of username and password
if( ( bUserName == TRUE ) && ( bPassWord == FALSE ) )
{
szValues[0] = (WCHAR*) (wszUserName);
ShowMessageEx ( stderr, 1, FALSE, GetResString(IDS_PROMPT_CHGPASSWD), _X(wszUserName));
// Get the password from the command line
if (GetPassword( tchgsubops.szRunAsPassword, GetBufferSize(tchgsubops.szRunAsPassword)/sizeof(WCHAR) ) == FALSE )
{
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
{
CloseConnection( tchgsubops.szServer );
}
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
//check for the null password
if( StringCompare( tchgsubops.szRunAsPassword , L"\0", TRUE, 0 ) == 0 )
{
ShowMessage (stderr, GetResString(IDS_WARN_EMPTY_PASSWORD));
}
// check for the password length > 0
wszPassword = tchgsubops.szRunAsPassword;
}
// check for the status of user name and password
else if( ( bUserName == FALSE ) && ( bPassWord == TRUE ) )
{
if ( (bFlag == TRUE ) && ( bSystemStatus == FALSE ) )
{
ShowMessage(stdout, GetResString(IDS_PROMPT_USERNAME));
if ( GetTheUserName( tchgsubops.szRunAsUserName, GetBufferSize(tchgsubops.szRunAsUserName)/sizeof(WCHAR)) == FALSE )
{
ShowMessage(stderr, GetResString( IDS_FAILED_TOGET_USER ) );
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
// check for the length of username
if( StringLength(tchgsubops.szRunAsUserName, 0) > MAX_RES_STRING )
{
ShowMessage(stderr,GetResString(IDS_INVALID_UNAME ));
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
if ( (StringLength( tchgsubops.szRunAsUserName, 0) == 0) || ( StringCompare(tchgsubops.szRunAsUserName, NTAUTHORITY_USER, TRUE, 0 ) == 0 ) ||
(StringCompare(tchgsubops.szRunAsUserName, SYSTEM_USER, TRUE, 0 ) == 0 ) )
{
bSystemStatus = TRUE;
bFlag = TRUE;
}
else
{
// check for the length of run as user name
if(StringLength(tchgsubops.szRunAsUserName, 0))
{
wszUserName = tchgsubops.szRunAsUserName;
}
}
}
else
{
wszUserName = szRunAsUser;
}
// check for the length of password > 0
wszPassword = tchgsubops.szRunAsPassword;
}
// check for the user name and password are not specified
else if( ( bUserName == FALSE ) && ( bPassWord == FALSE ) )
{
if ( (bFlag == TRUE ) && ( bSystemStatus == FALSE ) )
{
ShowMessage(stdout, GetResString(IDS_PROMPT_USERNAME));
if ( GetTheUserName( tchgsubops.szRunAsUserName, GetBufferSize(tchgsubops.szRunAsUserName)/sizeof(WCHAR) ) == FALSE )
{
ShowMessage(stderr, GetResString( IDS_FAILED_TOGET_USER ) );
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
// check for the length of username
if( StringLength(tchgsubops.szRunAsUserName, 0) > MAX_RES_STRING )
{
ShowMessage(stderr,GetResString(IDS_INVALID_UNAME ));
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
if ( (StringLength( tchgsubops.szRunAsUserName, 0) == 0) || ( StringCompare(tchgsubops.szRunAsUserName, NTAUTHORITY_USER, TRUE, 0 ) == 0 ) ||
(StringCompare(tchgsubops.szRunAsUserName, SYSTEM_USER, TRUE, 0 ) == 0 ) )
{
bSystemStatus = TRUE;
bFlag = TRUE;
}
else
{
if(StringLength(tchgsubops.szRunAsUserName, 0))
{
wszUserName = tchgsubops.szRunAsUserName;
}
}
}
else
{
wszUserName = szRunAsUser;
}
if ( StringLength ( wszUserName, 0 ) != 0 )
{
szValues[0] = (WCHAR*) (wszUserName);
ShowMessageEx ( stderr, 1, FALSE, GetResString(IDS_PROMPT_CHGPASSWD), _X(wszUserName));
// Get the run as user password from the command line
if ( GetPassword( tchgsubops.szRunAsPassword, GetBufferSize(tchgsubops.szRunAsPassword)/sizeof(WCHAR) ) == FALSE )
{
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
//check for the null password
if( StringCompare( tchgsubops.szRunAsPassword , L"\0", TRUE, 0 ) == 0 )
{
ShowMessage (stderr, GetResString(IDS_WARN_EMPTY_PASSWORD));
}
wszPassword = tchgsubops.szRunAsPassword;
}
}
//check for null password
if ( NULL == wszPassword )
{
wszPassword = L"\0";
}
// Return a pointer to a specified interface on an object
hr = pITask->QueryInterface(IID_IPersistFile, (void **) &pIPF);
if (FAILED(hr))
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
//set account information..
if( bSystemStatus == TRUE )
{
// Change the account information to "NT AUTHORITY\SYSTEM" user
hr = pITask->SetAccountInformation(L"",NULL);
if ( FAILED(hr) )
{
ShowMessage(stderr, GetResString(IDS_NTAUTH_SYSTEM_ERROR));
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
}
else
{
// set the account information with the user name and password
hr = pITask->SetAccountInformation(wszUserName,wszPassword);
}
if ((FAILED(hr)) && (hr != SCHED_E_NO_SECURITY_SERVICES))
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
////////////////////////////////////////
/// Save all the parameters
////////////////////////////////////////
// save the copy of an object
hr = pIPF->Save(NULL,TRUE);
if( E_FAIL == hr )
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
if (FAILED (hr))
{
SetLastError ((DWORD) hr);
ShowLastErrorEx ( stderr, SLE_TYPE_ERROR | SLE_SYSTEM );
if(pIPF)
pIPF->Release();
if(pITask)
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
else
{
// to display a success message
//szValues[0] = (WCHAR*) (tchgsubops.szTaskName);
StringCchPrintf ( szMessage, SIZE_OF_ARRAY(szMessage), GetResString(IDS_CHANGE_SUCCESSFUL), _X(tchgsubops.szTaskName));
ShowMessage ( stdout, _X(szMessage));
}
if( pIPF )
pIPF->Release();
if( pITask )
pITask->Release();
if( pITaskTrig )
pITaskTrig->Release();
// close the connection that was established by the utility
if ( bCloseConnection == TRUE )
CloseConnection( tchgsubops.szServer );
Cleanup(pITaskScheduler);
ReleaseChangeMemory(&tchgsubops);
return EXIT_SUCCESS;
}
/******************************************************************************
Routine Description:
This routine displays the create option usage
Arguments:
None
Return Value :
DWORD
******************************************************************************/
DWORD
DisplayChangeUsage()
{
WCHAR szTmpBuffer[ 2 * MAX_STRING_LENGTH];
WCHAR szBuffer[ 2 * MAX_STRING_LENGTH];
WCHAR szFormat[MAX_DATE_STR_LEN];
// initialize to zero
SecureZeroMemory ( szTmpBuffer, SIZE_OF_ARRAY(szTmpBuffer));
SecureZeroMemory ( szBuffer, SIZE_OF_ARRAY(szBuffer));
SecureZeroMemory ( szFormat, SIZE_OF_ARRAY(szFormat));
// get the date format
if ( GetDateFormatString( szFormat) )
{
return EXIT_FAILURE;
}
// Displaying Create usage
for( DWORD dw = IDS_CHANGE_HLP1; dw <= IDS_CHANGE_HLP38; dw++ )
{
switch (dw)
{
case IDS_CHANGE_HLP30:
StringCchPrintf ( szTmpBuffer, SIZE_OF_ARRAY(szTmpBuffer), GetResString(IDS_CHANGE_HLP30), _X(szFormat) );
ShowMessage ( stdout, _X(szTmpBuffer) );
dw = IDS_CHANGE_HLP30;
break;
case IDS_CHANGE_HLP31:
StringCchPrintf ( szTmpBuffer, SIZE_OF_ARRAY(szTmpBuffer), GetResString(IDS_CHANGE_HLP31), _X(szFormat) );
ShowMessage ( stdout, _X(szTmpBuffer) );
dw = IDS_CHANGE_HLP31;
break;
default :
ShowMessage(stdout, GetResString(dw));
break;
}
}
return EXIT_SUCCESS;
}
// ***************************************************************************
// Routine Description:
//
// Takes the user name from the keyboard.While entering the user name
// it displays the user name as it is.
//
// Arguments:
//
// [in] pszUserName -- String to store user name
// [in] dwMaxUserNameSize -- Maximun size of the user name.
//
// Return Value:
//
// BOOL --If this function succeds returns TRUE otherwise returns FALSE.
//
// ***************************************************************************
BOOL
GetTheUserName(
IN LPWSTR pszUserName,
IN DWORD dwMaxUserNameSize
)
{
// local variables
WCHAR ch;
DWORD dwIndex = 0;
DWORD dwCharsRead = 0;
DWORD dwCharsWritten = 0;
DWORD dwPrevConsoleMode = 0;
HANDLE hInputConsole = NULL;
WCHAR szBuffer[ 10 ] = L"\0";
BOOL bFlag = TRUE;
// check the input value
if ( pszUserName == NULL )
{
SetLastError( ERROR_INVALID_PARAMETER );
SaveLastError();
return FALSE;
}
// Get the handle for the standard input
hInputConsole = GetStdHandle( STD_INPUT_HANDLE );
if ( hInputConsole == NULL )
{
// could not get the handle so return failure
return FALSE;
}
// Get the current input mode of the input buffer
GetConsoleMode( hInputConsole, &dwPrevConsoleMode );
// Set the mode such that the control keys are processed by the system
if ( SetConsoleMode( hInputConsole, ENABLE_PROCESSED_INPUT ) == 0 )
{
// could not set the mode, return failure
return FALSE;
}
// Read the characters until a carriage return is hit
do
{
if ( ReadConsole( hInputConsole, &ch, 1, &dwCharsRead, NULL ) == 0 )
{
// Set the original console settings
SetConsoleMode( hInputConsole, dwPrevConsoleMode );
// return failure
return FALSE;
}
// Check for carraige return
if ( ch == CARRIAGE_RETURN )
{
ShowMessage(stdout, _T("\n"));
bFlag = FALSE;
// break from the loop
break;
}
// Check id back space is hit
if ( ch == BACK_SPACE )
{
if ( dwIndex != 0 )
{
// move the cursor one character back
StringCchPrintf( szBuffer, SIZE_OF_ARRAY(szBuffer), _T( "%c" ), BACK_SPACE );
WriteConsole( GetStdHandle( STD_OUTPUT_HANDLE ), szBuffer, 1,
&dwCharsWritten, NULL );
// replace the existing character with space
StringCchPrintf( szBuffer, SIZE_OF_ARRAY(szBuffer), _T( "%c" ), BLANK_CHAR );
WriteConsole( GetStdHandle( STD_OUTPUT_HANDLE ), szBuffer, 1,
&dwCharsWritten, NULL );
// now set the cursor at back position
StringCchPrintf( szBuffer, SIZE_OF_ARRAY(szBuffer), _T( "%c" ), BACK_SPACE );
WriteConsole( GetStdHandle( STD_OUTPUT_HANDLE ), szBuffer, 1,
&dwCharsWritten, NULL );
// decrement the index
dwIndex--;
}
// process the next character
continue;
}
// if the max user name length has been reached then sound a beep
if ( dwIndex == ( dwMaxUserNameSize - 1 ) )
{
WriteConsole( GetStdHandle( STD_OUTPUT_HANDLE ), BEEP_SOUND, 1,
&dwCharsRead, NULL );
}
else
{
// store the input character
*( pszUserName + dwIndex ) = ch;
// display asterix onto the console
WriteConsole( GetStdHandle( STD_OUTPUT_HANDLE ), ( pszUserName + dwIndex ) , 1,
&dwCharsWritten, NULL );
dwIndex++;
}
} while (TRUE == bFlag);
// Add the NULL terminator
*( pszUserName + dwIndex ) = L'\0';
// Return success
return TRUE;
}
/******************************************************************************
Routine Description:
This routine parses and validates the options specified by the user &
determines the type of a scheduled task
Arguments:
[ in ] argc : The count of arguments given by the user.
[ out ] tchgsubops : Structure containing Scheduled task's properties.
[ out ] tchgoptvals : Structure containing optional properties to set for a
scheduledtask .
[ out ] pdwRetScheType : pointer to the type of a schedule task
[Daily,once,weekly etc].
[ out ] pbUserStatus : pointer to check whether the -ru is given in
the command line or not.
Return Value :
A DWORD value indicating RETVAL_SUCCESS on success else EXIT_FAILURE
on failure
******************************************************************************/
DWORD
ValidateChangeOptions(
IN DWORD argc,
OUT TCMDPARSER2 cmdChangeOptions[],
IN OUT TCHANGESUBOPTS &tchgsubops,
IN OUT TCHANGEOPVALS &tchgoptvals
)
{
DWORD dwScheduleType = 0;
// If -ru is not specified allocate the memory
if ( cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals == 0 )
{
// password
if ( tchgsubops.szRunAsUserName == NULL )
{
tchgsubops.szRunAsUserName = (LPWSTR)AllocateMemory( MAX_STRING_LENGTH * sizeof( WCHAR ) );
if ( tchgsubops.szRunAsUserName == NULL )
{
SaveLastError();
return EXIT_FAILURE;
}
}
}
// If -rp is not specified allocate the memory
if ( cmdChangeOptions[OI_CHANGE_RUNASPASSWORD].dwActuals == 0 )
{
// password
if ( tchgsubops.szRunAsPassword == NULL )
{
tchgsubops.szRunAsPassword = (LPWSTR)AllocateMemory( MAX_STRING_LENGTH * sizeof( WCHAR ) );
if ( tchgsubops.szRunAsPassword == NULL )
{
SaveLastError();
return EXIT_FAILURE;
}
}
}
else
{
if ( cmdChangeOptions[ OI_CHANGE_RUNASPASSWORD ].pValue == NULL )
{
tchgsubops.szRunAsPassword = (LPWSTR)AllocateMemory( MAX_STRING_LENGTH * sizeof( WCHAR ) );
if ( NULL == tchgsubops.szRunAsPassword)
{
SaveLastError();
return EXIT_FAILURE;
}
StringCopy( tchgsubops.szRunAsPassword, L"*", GetBufferSize(tchgsubops.szRunAsPassword)/sizeof(WCHAR));
}
}
//check for /? (usage)
if ( tchgsubops.bUsage == TRUE )
{
if (argc > 3)
{
ShowMessage ( stderr, GetResString (IDS_ERROR_CHANGEPARAM) );
return EXIT_FAILURE;
}
else if ( 3 == argc )
{
return EXIT_SUCCESS;
}
}
//check whether any optional parameters are specified or not.
if( ( 0 == cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals ) &&
( 0 == cmdChangeOptions[OI_CHANGE_RUNASPASSWORD].dwActuals ) &&
( 0 == cmdChangeOptions[OI_CHANGE_TASKRUN].dwActuals ) &&
( 0 == cmdChangeOptions[OI_CHANGE_STARTTIME].dwActuals ) &&
( 0 == cmdChangeOptions[OI_CHANGE_STARTDATE].dwActuals ) &&
( 0 == cmdChangeOptions[OI_CHANGE_ENDDATE].dwActuals ) &&
( 0 == cmdChangeOptions[OI_CHANGE_IT].dwActuals ) &&
( 0 == cmdChangeOptions[OI_CHANGE_ENDTIME].dwActuals ) &&
( 0 == cmdChangeOptions[OI_CHANGE_DUR_END].dwActuals ) &&
( 0 == cmdChangeOptions[OI_CHANGE_DURATION].dwActuals ) &&
( 0 == cmdChangeOptions[OI_CHANGE_DELNOSCHED].dwActuals ) &&
( 0 == cmdChangeOptions[OI_CHANGE_REPEAT_INTERVAL].dwActuals ) )
{
if ( ( 0 == cmdChangeOptions[OI_CHANGE_ENABLE].dwActuals ) &&
( 0 == cmdChangeOptions[OI_CHANGE_DISABLE].dwActuals ) )
{
ShowMessage(stderr,GetResString(IDS_NO_CHANGE_OPTIONS));
return EXIT_FAILURE;
}
else
{
tchgoptvals.bFlag = TRUE;
}
}
// check whether -u or -ru options specified respectively with -p or -rp options or not
if ( cmdChangeOptions[ OI_CHANGE_USERNAME ].dwActuals == 0 && cmdChangeOptions[ OI_CHANGE_PASSWORD ].dwActuals == 1 )
{
// invalid syntax
ShowMessage(stderr, GetResString(IDS_CHPASSWORD_BUT_NOUSERNAME));
return EXIT_FAILURE; // indicate failure
}
// check for invalid user name
if( ( cmdChangeOptions[OI_CHANGE_SERVER].dwActuals == 0 ) && ( cmdChangeOptions[OI_CHANGE_USERNAME].dwActuals == 1 ) )
{
ShowMessage(stderr, GetResString(IDS_CHANGE_USER_BUT_NOMACHINE));
return EXIT_FAILURE;
}
// check for /IT switch is not applicable with "NT AUTHORITY\SYSTEM" account
if ( ( cmdChangeOptions[OI_CHANGE_RUNASUSER].dwActuals == 1 ) && ( ( StringLength ( tchgsubops.szRunAsUserName, 0 ) == 0 ) ||
( StringCompare( tchgsubops.szRunAsUserName, NTAUTHORITY_USER, TRUE, 0 ) == 0 ) ||
( StringCompare( tchgsubops.szRunAsUserName, SYSTEM_USER, TRUE, 0 ) == 0 ) ) &&
( TRUE == tchgsubops.bInteractive ) )
{
ShowMessage ( stderr, GetResString (IDS_IT_SWITCH_NA) );
return EXIT_FAILURE;
}
// If -rp is not specified allocate the memory
if ( cmdChangeOptions[OI_CHANGE_RUNASPASSWORD].dwActuals == 0 )
{
// password
if ( tchgsubops.szRunAsPassword == NULL )
{
tchgsubops.szRunAsPassword = (LPWSTR)AllocateMemory( MAX_STRING_LENGTH * sizeof( WCHAR ) );
if ( tchgsubops.szRunAsPassword == NULL )
{
SaveLastError();
return EXIT_FAILURE;
}
}
}
//
//check for INVALID SYNTAX
//
// check for invalid user name
if( ( cmdChangeOptions[OI_CHANGE_SERVER].dwActuals == 0 ) && ( cmdChangeOptions[OI_CHANGE_USERNAME].dwActuals == 1 ) )
{
ShowMessage(stderr, GetResString(IDS_CHANGE_USER_BUT_NOMACHINE));
//release memory
ReleaseChangeMemory(&tchgsubops);
return EXIT_FAILURE;
}
// check whether /ET and /DU specified..
if( ( cmdChangeOptions[OI_CHANGE_DURATION].dwActuals == 1 ) && ( cmdChangeOptions[OI_CHANGE_ENDTIME].dwActuals == 1 ) )
{
// display an error message as.. /ET and /DU are mutual exclusive
ShowMessage(stderr, GetResString(IDS_DURATION_NOT_ENDTIME));
return EXIT_FAILURE;
}
if ( ( cmdChangeOptions[OI_CHANGE_DUR_END].dwActuals == 1 ) &&
( cmdChangeOptions[OI_CHANGE_DURATION].dwActuals == 0 ) && ( cmdChangeOptions[OI_CHANGE_ENDTIME].dwActuals == 0 ) )
{
ShowMessage(stderr, GetResString(IDS_NO_CHANGE_K_OR_RT));
return EXIT_FAILURE;
}
// check whether /enable and /disable options are specified..
if ( ( TRUE == tchgsubops.bEnable )&& (TRUE == tchgsubops.bDisable ) )
{
// display an error message as.. /Enable and /Disable are mutual exclusive
ShowMessage(stderr, GetResString(IDS_ENABLE_AND_DISABLE));
return EXIT_FAILURE;
}
// Start validations for the sub-options
if( EXIT_FAILURE == ValidateChangeSuboptVal(tchgsubops, tchgoptvals, cmdChangeOptions, dwScheduleType) )
{
return(EXIT_FAILURE);
}
return EXIT_SUCCESS;
}
/******************************************************************************
Routine Description:
This routine validates the sub options specified by the user reg.create option
& determines the type of a scheduled task.
Arguments:
[ out ] tchgsubops : Structure containing the task's properties
[ out ] tchgoptvals : Structure containing optional values to set
[ in ] cmdOptions[] : Array of type TCMDPARSER
[ in ] dwScheduleType : Type of schedule[Daily,once,weekly etc]
Return Value :
A DWORD value indicating RETVAL_SUCCESS on success else EXIT_FAILURE
on failure
******************************************************************************/
DWORD
ValidateChangeSuboptVal(
OUT TCHANGESUBOPTS& tchgsubops,
OUT TCHANGEOPVALS &tchgoptvals,
IN TCMDPARSER2 cmdOptions[],
IN DWORD dwScheduleType
)
{
DWORD dwRetval = RETVAL_SUCCESS;
BOOL bIsStDtCurDt = FALSE;
// check whether the password (-p) specified in the command line or not
// and also check whether '*' or empty is given for -p or not
// check the remote connectivity information
if ( tchgsubops.szServer != NULL )
{
//
// if -u is not specified, we need to allocate memory
// in order to be able to retrive the current user name
//
// case 1: -p is not at all specified
// as the value for this switch is optional, we have to rely
// on the dwActuals to determine whether the switch is specified or not
// in this case utility needs to try to connect first and if it fails
// then prompt for the password -- in fact, we need not check for this
// condition explicitly except for noting that we need to prompt for the
// password
//
// case 2: -p is specified
// but we need to check whether the value is specified or not
// in this case user wants the utility to prompt for the password
// before trying to connect
//
// case 3: -p * is specified
// user name
if ( tchgsubops.szUserName == NULL )
{
tchgsubops.szUserName = (LPWSTR) AllocateMemory( MAX_STRING_LENGTH * sizeof( WCHAR ) );
if ( tchgsubops.szUserName == NULL )
{
SaveLastError();
return EXIT_FAILURE;
}
}
// password
if ( tchgsubops.szPassword == NULL )
{
tchgoptvals.bNeedPassword = TRUE;
tchgsubops.szPassword = (LPWSTR)AllocateMemory( MAX_STRING_LENGTH * sizeof( WCHAR ) );
if ( tchgsubops.szPassword == NULL )
{
SaveLastError();
return EXIT_FAILURE;
}
}
// case 1
if ( cmdOptions[ OI_CHANGE_PASSWORD ].dwActuals == 0 )
{
// we need not do anything special here
}
// case 2
else if ( cmdOptions[ OI_CHANGE_PASSWORD ].pValue == NULL )
{
StringCopy( tchgsubops.szPassword, L"*", GetBufferSize(tchgsubops.szPassword)/sizeof(WCHAR));
}
// case 3
else if ( StringCompareEx( tchgsubops.szPassword, L"*", TRUE, 0 ) == 0 )
{
if ( ReallocateMemory( (LPVOID*)&tchgsubops.szPassword,
MAX_STRING_LENGTH * sizeof( WCHAR ) ) == FALSE )
{
SaveLastError();
return EXIT_FAILURE;
}
// ...
tchgoptvals.bNeedPassword = TRUE;
}
}
// validate start date
if ( 1 == cmdOptions[OI_CHANGE_STARTDATE].dwActuals)
{
// Validate Start Date value.
dwRetval = ValidateStartDate( tchgsubops.szStartDate, dwScheduleType,
cmdOptions[OI_CHANGE_STARTDATE].dwActuals,
bIsStDtCurDt);
if(EXIT_FAILURE == dwRetval )
{
return dwRetval; // Error in Day/Month string.
}
}
// validate end date
if ( 1 == cmdOptions[OI_CHANGE_ENDDATE].dwActuals )
{
// Validate End Date value.
dwRetval = ValidateEndDate( tchgsubops.szEndDate, dwScheduleType,
cmdOptions[OI_CHANGE_ENDDATE].dwActuals);
if(EXIT_FAILURE == dwRetval )
{
return dwRetval; // Error in Day/Month string.
}
}
//Check Whether end date should be greater than startdate
WORD wEndDay = 0;
WORD wEndMonth = 0;
WORD wEndYear = 0;
WORD wStartDay = 0;
WORD wStartMonth = 0;
WORD wStartYear = 0;
if( cmdOptions[OI_CHANGE_ENDDATE].dwActuals != 0 )
{
if( EXIT_FAILURE == GetDateFieldEntities( tchgsubops.szEndDate,&wEndDay,
&wEndMonth,&wEndYear))
{
return EXIT_FAILURE;
}
}
// get the date fields
if( ( cmdOptions[OI_CHANGE_STARTDATE].dwActuals != 0 ) &&
(EXIT_FAILURE == GetDateFieldEntities(tchgsubops.szStartDate,
&wStartDay,&wStartMonth,
&wStartYear)))
{
ShowMessage(stderr, GetResString(IDS_INVALID_STARTDATE) );
return EXIT_FAILURE;
}
// validate date format
if( (cmdOptions[OI_CHANGE_ENDDATE].dwActuals != 0) )
{
if( ( wEndYear == wStartYear ) )
{
// For same years if the end month is less than start month or for same years and same months
// if the endday is less than the startday.
if ( ( wEndMonth < wStartMonth ) || ( ( wEndMonth == wStartMonth ) && ( wEndDay < wStartDay ) ) )
{
ShowMessage(stderr, GetResString(IDS_ENDATE_INVALID));
return EXIT_FAILURE;
}
}
else if ( wEndYear < wStartYear )
{
ShowMessage(stderr, GetResString(IDS_ENDATE_INVALID));
return EXIT_FAILURE;
}
}
// validate start time format
if (1 == cmdOptions[OI_CHANGE_STARTTIME].dwActuals)
{
// Validate Start Time value.
dwRetval = ValidateTimeString(tchgsubops.szStartTime);
if(EXIT_FAILURE == dwRetval)
{
// Error. Invalid date string.
ShowMessage(stderr,GetResString(IDS_INVALIDFORMAT_STARTTIME));
return dwRetval;
}
}
// validate end time format
if (1 == cmdOptions[OI_CHANGE_ENDTIME].dwActuals)
{
// Validate Start Time value.
dwRetval = ValidateTimeString(tchgsubops.szEndTime);
if(EXIT_FAILURE == dwRetval)
{
// Error. Invalid date string.
ShowMessage(stderr,GetResString(IDS_INVALIDFORMAT_ENDTIME));
return dwRetval;
}
}
return RETVAL_SUCCESS;
}
/******************************************************************************
Routine Description:
Release memory
Arguments:
[ in ] pParam : cmdOptions structure
Return Value :
TRUE on success
******************************************************************************/
BOOL
ReleaseChangeMemory(
IN PTCHANGESUBOPTS pParams
)
{
// release memory
FreeMemory((LPVOID *) &pParams->szServer);
FreeMemory((LPVOID *) &pParams->szUserName);
FreeMemory((LPVOID *) &pParams->szPassword);
FreeMemory((LPVOID *) &pParams->szRunAsUserName);
FreeMemory((LPVOID *) &pParams->szRunAsPassword);
//reset all fields to 0
SecureZeroMemory( &pParams, sizeof( PTCHANGESUBOPTS ) );
return TRUE;
}