You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
874 lines
26 KiB
874 lines
26 KiB
//Copyright (c) 1998 - 1999 Microsoft Corporation
|
|
|
|
//
|
|
// SubToggle.cpp
|
|
// subcomponent enable terminal server implementation.
|
|
//
|
|
|
|
#include "stdafx.h"
|
|
#include "SubToggle.h"
|
|
#include "hydraoc.h"
|
|
#include "pages.h"
|
|
#include "secupgrd.h"
|
|
|
|
#include "gpedit.h"
|
|
#pragma warning(push, 4)
|
|
|
|
// {0F6B957D-509E-11d1-A7CC-0000F87571E3}
|
|
DEFINE_GUID(CLSID_PolicySnapInMachine,0xf6b957d, 0x509e, 0x11d1, 0xa7, 0xcc, 0x0, 0x0, 0xf8, 0x75, 0x71, 0xe3);
|
|
|
|
|
|
|
|
// #define REGISTRY_EXTENSION_GUID { 0x35378EAC, 0x683F, 0x11D2, 0xA8, 0x9A, 0x00, 0xC0, 0x4F, 0xBB, 0xCF, 0xA2 }
|
|
DEFINE_GUID(CLSID_RegistryEntensionGuid, 0x35378EAC, 0x683F, 0x11D2, 0xA8, 0x9A, 0x00, 0xC0, 0x4F, 0xBB, 0xCF, 0xA2);
|
|
|
|
|
|
GUID guidRegistryEntension = REGISTRY_EXTENSION_GUID;
|
|
GUID guidPolicyMachineSnapin = CLSID_PolicySnapInMachine;
|
|
|
|
|
|
|
|
|
|
//
|
|
// Globals
|
|
//
|
|
extern DefSecPageData *gpSecPageData;
|
|
|
|
|
|
|
|
DWORD SubCompToggle::GetStepCount () const
|
|
{
|
|
return 4;
|
|
}
|
|
|
|
DWORD SubCompToggle::OnQueryState ( UINT uiWhichState ) const
|
|
{
|
|
DWORD dwReturn = SubcompUseOcManagerDefault;
|
|
|
|
switch(uiWhichState)
|
|
{
|
|
case OCSELSTATETYPE_FINAL:
|
|
dwReturn = StateObject.IsItAppServer() ? SubcompOn : SubcompOff;
|
|
break;
|
|
|
|
case OCSELSTATETYPE_ORIGINAL:
|
|
//
|
|
// thought originally the comp was on, we want to unselect it for server sku.
|
|
//
|
|
if (StateObject.CanInstallAppServer())
|
|
{
|
|
dwReturn = StateObject.WasItAppServer() ? SubcompOn : SubcompOff;
|
|
}
|
|
else
|
|
{
|
|
if (StateObject.WasItAppServer())
|
|
{
|
|
LogErrorToSetupLog(OcErrLevWarning, IDS_STRING_TERMINAL_SERVER_UNINSTALLED);
|
|
}
|
|
dwReturn = SubcompOff;
|
|
}
|
|
break;
|
|
|
|
case OCSELSTATETYPE_CURRENT:
|
|
//
|
|
// our state object knows best about the current state for unattended and fresh install cases.
|
|
//
|
|
if (StateObject.IsTSFreshInstall() || StateObject.IsUnattended())
|
|
{
|
|
if (StateObject.CurrentTSMode() == eAppServer)
|
|
{
|
|
dwReturn = SubcompOn;
|
|
}
|
|
else
|
|
{
|
|
dwReturn = SubcompOff;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
dwReturn = SubcompUseOcManagerDefault;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
AssertFalse();
|
|
break;
|
|
}
|
|
|
|
return dwReturn;
|
|
|
|
}
|
|
|
|
BOOL IsIeHardforUserSelected()
|
|
{
|
|
const TCHAR STRING_IEUSER_HARD[] = _T("IEHardenUser");
|
|
return GetHelperRoutines().QuerySelectionState(GetHelperRoutines().OcManagerContext,
|
|
STRING_IEUSER_HARD, OCSELSTATETYPE_CURRENT);
|
|
|
|
}
|
|
|
|
DWORD SubCompToggle::OnQuerySelStateChange (BOOL bNewState, BOOL bDirectSelection) const
|
|
{
|
|
//
|
|
// We dont have problems with somebody disabling TS.
|
|
//
|
|
if (!bNewState)
|
|
return TRUE;
|
|
|
|
//
|
|
// this component is available only for adv server or highter. so dont let it be selected for
|
|
// any other sku.
|
|
//
|
|
if (!StateObject.CanInstallAppServer())
|
|
return FALSE;
|
|
|
|
//
|
|
// if its not a user selection let it go through.
|
|
//
|
|
if (!bDirectSelection)
|
|
return TRUE;
|
|
|
|
if (!IsIeHardforUserSelected())
|
|
{
|
|
return TRUE;
|
|
}
|
|
|
|
// IDS_IEHARD_EXCLUDES_TS "Internet Explorer Enhanced Security for Users on a Terminal Server will substantially limit the users ability to browse the internet from their Terminal Server sessions\n\nContinue the install with this combination?"
|
|
// IDS_DIALOG_CAPTION_CONFIG_WARN "Configuration Warning"
|
|
if ( IDYES == DoMessageBox(IDS_IEHARD_EXCLUDES_TS, IDS_DIALOG_CAPTION_CONFIG_WARN, MB_YESNO | MB_ICONEXCLAMATION))
|
|
{
|
|
return TRUE;
|
|
}
|
|
else
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
ASSERT(FALSE);
|
|
return TRUE;
|
|
}
|
|
|
|
LPCTSTR SubCompToggle::GetSectionToBeProcessed (ESections eSection) const
|
|
{
|
|
//
|
|
// If the state hasn't changed in stand alone setup, don't do anything.
|
|
// Note that an permission settings will be handled later.
|
|
//
|
|
|
|
if ((StateObject.CurrentTSMode() == StateObject.OriginalTSMode()) &&
|
|
StateObject.IsStandAlone())
|
|
{
|
|
return(NULL);
|
|
}
|
|
|
|
//
|
|
// There are no files to install.
|
|
//
|
|
if ((eSection == kFileSection) || (eSection == kDiskSpaceAddSection))
|
|
{
|
|
return(NULL);
|
|
}
|
|
|
|
|
|
ETSMode eMode = StateObject.CurrentTSMode();
|
|
if (StateObject.IsX86())
|
|
{
|
|
switch (eMode)
|
|
{
|
|
case eRemoteAdmin:
|
|
return StateObject.IsWorkstation() ? REMOTE_ADMIN_PRO_X86 : REMOTE_ADMIN_SERVER_X86;
|
|
break;
|
|
case eAppServer:
|
|
return StateObject.IsWorkstation() ? APPSERVER_PRO_X86 : APPSERVER_SERVER_X86;
|
|
break;
|
|
case ePersonalTS:
|
|
return StateObject.IsWorkstation() ? PERSONALTS_PRO_X86 : PERSONALTS_SERVER_X86;
|
|
break;
|
|
case eTSDisabled:
|
|
default:
|
|
ASSERT(FALSE);
|
|
return NULL;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
switch (eMode)
|
|
{
|
|
case eRemoteAdmin:
|
|
if (StateObject.IsAMD64())
|
|
{
|
|
return StateObject.IsWorkstation() ? REMOTE_ADMIN_PRO_AMD64 : REMOTE_ADMIN_SERVER_AMD64;
|
|
}
|
|
else
|
|
{
|
|
return StateObject.IsWorkstation() ? REMOTE_ADMIN_PRO_IA64 : REMOTE_ADMIN_SERVER_IA64;
|
|
}
|
|
break;
|
|
case eAppServer:
|
|
if (StateObject.IsAMD64())
|
|
{
|
|
return StateObject.IsWorkstation() ? APPSERVER_PRO_AMD64 : APPSERVER_SERVER_AMD64;
|
|
}
|
|
else
|
|
{
|
|
return StateObject.IsWorkstation() ? APPSERVER_PRO_IA64 : APPSERVER_SERVER_IA64;
|
|
}
|
|
break;
|
|
case ePersonalTS:
|
|
if (StateObject.IsAMD64())
|
|
{
|
|
return StateObject.IsWorkstation() ? PERSONALTS_PRO_AMD64 : PERSONALTS_SERVER_AMD64;
|
|
}
|
|
else
|
|
{
|
|
return StateObject.IsWorkstation() ? PERSONALTS_PRO_IA64 : PERSONALTS_SERVER_IA64;
|
|
}
|
|
break;
|
|
case eTSDisabled:
|
|
default:
|
|
ASSERT(FALSE);
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
BOOL SubCompToggle::BeforeCompleteInstall ()
|
|
{
|
|
if (StateObject.IsItAppServer() != StateObject.WasItAppServer())
|
|
{
|
|
SetProgressText(StateObject.IsItAppServer() ? IDS_STRING_PROGRESS_ENABLING : IDS_STRING_PROGRESS_DISABLING);
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
LPCTSTR SubCompToggle::GetSubCompID () const
|
|
{
|
|
return (APPSRV_COMPONENT_NAME);
|
|
}
|
|
|
|
BOOL SubCompToggle::AfterCompleteInstall ()
|
|
{
|
|
|
|
LOGMESSAGE0(_T("Entering AfterCompleteInstall"));
|
|
ASSERT(StateObject.Assert());
|
|
StateObject.LogState();
|
|
|
|
WriteLicensingMode();
|
|
Tick();
|
|
|
|
SetPermissionsMode ();
|
|
Tick();
|
|
|
|
//
|
|
// this need to be done even if there is no state change, as we want to do this on upgrades as well.
|
|
//
|
|
if (StateObject.IsStandAlone() && !StateObject.IsStandAloneModeSwitch ())
|
|
{
|
|
//
|
|
// nothing has changed. dont bother to do any of the next steps.
|
|
//
|
|
return TRUE;
|
|
}
|
|
|
|
WriteModeSpecificRegistry();
|
|
Tick();
|
|
|
|
UpdateMMDefaults();
|
|
Tick();
|
|
|
|
ResetWinstationSecurity ();
|
|
Tick();
|
|
|
|
ModifyWallPaperPolicy();
|
|
Tick();
|
|
|
|
ModifyAppPriority();
|
|
|
|
AddStartupPopup();
|
|
Tick();
|
|
|
|
|
|
|
|
// this really belongs in subcore, but since we want to it after ResetWinstationSecurity is called we are calling it here.
|
|
//
|
|
// we have modified winstation security mechanism for whistler.
|
|
// Call this routine, which takes care of upgrades as well as clean installs.
|
|
//
|
|
LOGMESSAGE0(_T("Will Call SetupWorker now."));
|
|
DWORD dwError = SetupWorker(StateObject);
|
|
LOGMESSAGE0(_T("Done with SetupWorker."));
|
|
|
|
if (dwError != ERROR_SUCCESS)
|
|
{
|
|
LOGMESSAGE1(_T("ERROR :SetupWorker failed. ErrorCode = %d"), dwError);
|
|
}
|
|
|
|
if( StateObject.IsGuiModeSetup() )
|
|
{
|
|
// WARNING : this must be done after SetupWorker()
|
|
SetupRunOnce( GetComponentInfHandle(), RUNONCE_SECTION_KEYWORD );
|
|
}
|
|
|
|
//
|
|
// We need a reboot if we toggled TS through AR/P.
|
|
//
|
|
|
|
if ( StateObject.IsStandAlone() && StateObject.IsStandAloneModeSwitch())
|
|
{
|
|
SetReboot();
|
|
|
|
//
|
|
// If we're changing into or out of app-compatibility mode, inform
|
|
// the licensing system, because we're about to reboot
|
|
//
|
|
InformLicensingOfModeChange();
|
|
Tick();
|
|
}
|
|
|
|
ASSERT(StateObject.Assert());
|
|
StateObject.LogState();
|
|
|
|
return(TRUE);
|
|
}
|
|
|
|
|
|
|
|
BOOL SubCompToggle::WriteLicensingMode ()
|
|
{
|
|
LOGMESSAGE0(_T("Entering WriteLicensingMode"));
|
|
|
|
//
|
|
// we need to write this value only if it's set in answer file
|
|
//
|
|
if (StateObject.IsItAppServer() && (StateObject.NewLicMode() != eLicUnset))
|
|
{
|
|
DWORD dwError;
|
|
CRegistry oRegTermsrv;
|
|
|
|
dwError = oRegTermsrv.CreateKey(HKEY_LOCAL_MACHINE, REG_CONTROL_TS_LICENSING_KEY);
|
|
if (ERROR_SUCCESS == dwError)
|
|
{
|
|
DWORD dwMode = StateObject.NewLicMode();
|
|
|
|
TCHAR *tszValueName = StateObject.IsItAppServer() ? REG_LICENSING_MODE_AC_ON : REG_LICENSING_MODE_AC_OFF;
|
|
|
|
LOGMESSAGE2(_T("Writing %s = %d"), tszValueName, dwMode);
|
|
|
|
dwError = oRegTermsrv.WriteRegDWord(tszValueName, dwMode);
|
|
|
|
if (ERROR_SUCCESS == dwError)
|
|
{
|
|
return TRUE;
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE2(_T("Error (%d), Writing, %s Value"), dwError, tszValueName);
|
|
return FALSE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE2(_T("Error (%d), Opening , %s key"), dwError, REG_CONTROL_TS_LICENSING_KEY);
|
|
return FALSE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
|
|
BOOL SubCompToggle::ApplySection (LPCTSTR szSection)
|
|
{
|
|
|
|
DWORD dwError;
|
|
|
|
LOGMESSAGE1(_T("Setting up Registry from section = %s"), szSection);
|
|
dwError = SetupInstallFromInfSection(
|
|
NULL, // hwndOwner
|
|
GetComponentInfHandle(), // inf handle
|
|
szSection, //
|
|
SPINST_REGISTRY, // operation flags
|
|
NULL, // relative key root
|
|
NULL, // source root path
|
|
0, // copy flags
|
|
NULL, // callback routine
|
|
NULL, // callback routine context
|
|
NULL, // device info set
|
|
NULL // device info struct
|
|
);
|
|
|
|
if (dwError == 0)
|
|
{
|
|
LOGMESSAGE1(_T("ERROR:while installating section <%lu>"), GetLastError());
|
|
}
|
|
|
|
return (dwError != 0);
|
|
}
|
|
|
|
|
|
BOOL SubCompToggle::ResetWinstationSecurity ()
|
|
{
|
|
//
|
|
// If the TS mode is changing, reset winstation securities.
|
|
//
|
|
|
|
DWORD dwError;
|
|
if (StateObject.IsAppSrvModeSwitch() && gpSecPageData->GetWinStationCount() > 0)
|
|
{
|
|
CRegistry pReg;
|
|
CRegistry pSubKey;
|
|
LPTSTR* pWinStationArray = gpSecPageData->GetWinStationArray();
|
|
UINT cArray = gpSecPageData->GetWinStationCount();
|
|
|
|
LOGMESSAGE1(_T("%d WinStations to reset."), cArray);
|
|
|
|
//
|
|
// Open the WinStations key. At this point, this key must exist.
|
|
//
|
|
|
|
VERIFY(pReg.OpenKey(HKEY_LOCAL_MACHINE, REG_WINSTATION_KEY) == ERROR_SUCCESS);
|
|
|
|
if (cArray != 0)
|
|
{
|
|
ASSERT(pWinStationArray != NULL);
|
|
|
|
for (UINT i = 0; i < cArray; i++)
|
|
{
|
|
LOGMESSAGE1(_T("Resetting %s."), pWinStationArray[i]);
|
|
|
|
dwError = pSubKey.OpenKey(pReg, pWinStationArray[i]);
|
|
if (dwError == ERROR_SUCCESS)
|
|
{
|
|
LOGMESSAGE2(_T("Delete registry value %s\\%s"), pWinStationArray[i], REG_SECURITY_VALUE);
|
|
|
|
dwError = pSubKey.DeleteValue(REG_SECURITY_VALUE);
|
|
if (dwError == ERROR_SUCCESS)
|
|
{
|
|
LOGMESSAGE0(_T("Registry value deleted."));
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE1(_T("Error deleting value: %ld"), dwError);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE2(_T("Couldn't open key %s: %ld"), pWinStationArray[i], dwError);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
BOOL SubCompToggle::InformLicensingOfModeChange ()
|
|
{
|
|
BOOL fRet;
|
|
|
|
ASSERT(StateObject.IsTSModeChanging());
|
|
|
|
//
|
|
// RPC into licensing to tell it we're going to reboot
|
|
//
|
|
|
|
HANDLE hServer = ServerLicensingOpen(NULL);
|
|
|
|
if (NULL == hServer)
|
|
{
|
|
LOGMESSAGE1(_T("ERROR: InformLicensingOfModeChange calling ServerLicensingOpen <%lu>"), GetLastError());
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
fRet = ServerLicensingDeactivateCurrentPolicy(
|
|
hServer
|
|
);
|
|
if (!fRet)
|
|
{
|
|
LOGMESSAGE1(_T("ERROR: InformLicensingOfModeChange calling ServerLicensingDeactivateCurrentPolicy <%lu>"), GetLastError());
|
|
}
|
|
|
|
ServerLicensingClose(hServer);
|
|
|
|
|
|
return fRet;
|
|
}
|
|
|
|
BOOL SubCompToggle::SetPermissionsMode ()
|
|
{
|
|
//
|
|
// If TS is toggling on, set the security key based on the choices
|
|
// made through the wizard page. This must be done even if TS was
|
|
// already enabled, as the permissions mode can be changed by the
|
|
// unattended file.
|
|
//
|
|
|
|
CRegistry reg;
|
|
EPermMode ePermMode = StateObject.CurrentPermMode();
|
|
|
|
VERIFY(reg.OpenKey(HKEY_LOCAL_MACHINE, REG_CONTROL_TS_KEY) == ERROR_SUCCESS);
|
|
// BUGBUG should be
|
|
// return (ERROR_SUCCESS == reg.WriteRegDWord( _T("TSUserEnabled"), StateObject.IsItAppServer() ? (DWORD)ePermMode : (DWORD)PERM_WIN2K));
|
|
return (ERROR_SUCCESS == reg.WriteRegDWord( _T("TSUserEnabled"), StateObject.IsTSEnableSelected() ? (DWORD)ePermMode : (DWORD)PERM_TS4));
|
|
|
|
}
|
|
|
|
|
|
BOOL RegisterDll(LPCTSTR szDll)
|
|
{
|
|
HMODULE hMod = LoadLibrary(szDll);
|
|
HRESULT hResult = E_FAIL;
|
|
|
|
if (hMod)
|
|
{
|
|
FARPROC pfRegSrv = GetProcAddress(hMod, "DllRegisterServer");
|
|
if (pfRegSrv)
|
|
{
|
|
__try
|
|
{
|
|
hResult = (HRESULT)pfRegSrv();
|
|
if (hResult != S_OK)
|
|
{
|
|
LOGMESSAGE2(_T("ERROR, DllRegister Server in %s failed, hResult = %x"), szDll, hResult);
|
|
}
|
|
}
|
|
__except( 1 )
|
|
{
|
|
hResult = E_FAIL;
|
|
LOGMESSAGE2(_T("ERROR, Exception hit Registrering of %s failed, Exception = %x"), szDll, GetExceptionCode());
|
|
}
|
|
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE1(_T("ERROR, Failed to Get proc for DllregisterServer for %s"), szDll);
|
|
}
|
|
|
|
FreeLibrary(hMod);
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE2(_T("ERROR, Failed to Load library %s, lastError = %d"), szDll, GetLastError());
|
|
}
|
|
|
|
return hResult == S_OK;
|
|
}
|
|
|
|
|
|
BOOL SubCompToggle::ModifyWallPaperPolicy ()
|
|
{
|
|
BOOL bRet = FALSE;
|
|
|
|
//
|
|
// policy must be applied when we change modes.
|
|
// also for fresh installs/upgrades of app server.
|
|
//
|
|
if (StateObject.IsAppSrvModeSwitch() || (StateObject.IsGuiModeSetup() && StateObject.IsItAppServer()))
|
|
{
|
|
LOGMESSAGE0(_T("Will apply/change policies now..."));
|
|
if (StateObject.IsGuiModeSetup())
|
|
{
|
|
//
|
|
// in case of Gui mode setup
|
|
// the group policy object may not be registered yet.
|
|
// so lets register it ourselves.
|
|
//
|
|
|
|
TCHAR szGPEditFile[MAX_PATH];
|
|
if (GetSystemDirectory(szGPEditFile, MAX_PATH))
|
|
{
|
|
_tcscat(szGPEditFile, _T("\\gpedit.dll"));
|
|
if (!RegisterDll(szGPEditFile))
|
|
{
|
|
LOGMESSAGE1(_T("Error, failed to register dll - %s."), szGPEditFile);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE0(_T("Error, failed to GetSystemDirectory."));
|
|
}
|
|
}
|
|
|
|
OleInitialize(NULL);
|
|
IGroupPolicyObject *pIGroupPolicyObject = NULL;
|
|
HRESULT hResult = CoCreateInstance(
|
|
CLSID_GroupPolicyObject, //Class identifier (CLSID) of the object
|
|
NULL, //Pointer to controlling IUnknown
|
|
CLSCTX_ALL, //Context for running executable code
|
|
IID_IGroupPolicyObject, //Reference to the identifier of the interface
|
|
(void **)&pIGroupPolicyObject //Address of output variable that receives the interface pointer requested in riid
|
|
);
|
|
if (SUCCEEDED(hResult))
|
|
{
|
|
ASSERT(pIGroupPolicyObject);
|
|
|
|
hResult = pIGroupPolicyObject->OpenLocalMachineGPO(GPO_OPEN_LOAD_REGISTRY);
|
|
if (SUCCEEDED(hResult))
|
|
{
|
|
HKEY hMachinePolicyKey = NULL;
|
|
hResult = pIGroupPolicyObject->GetRegistryKey(GPO_SECTION_MACHINE, &hMachinePolicyKey);
|
|
if (SUCCEEDED(hResult))
|
|
{
|
|
ASSERT(hMachinePolicyKey);
|
|
|
|
const LPCTSTR szNoActiveDesktop_key = _T("SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer");
|
|
const LPCTSTR szNoActiveDesktop_val = _T("NoActiveDesktop");
|
|
const DWORD szNoActiveDesktop_dat = 1;
|
|
|
|
CRegistry regMachinePolicy;
|
|
|
|
if (ERROR_SUCCESS == regMachinePolicy.CreateKey(hMachinePolicyKey, szNoActiveDesktop_key))
|
|
{
|
|
if (StateObject.IsItAppServer())
|
|
{
|
|
if (ERROR_SUCCESS != regMachinePolicy.WriteRegDWord(szNoActiveDesktop_val, szNoActiveDesktop_dat))
|
|
{
|
|
LOGMESSAGE1(_T("ERROR, Failed to Write %s policy"), szNoActiveDesktop_val);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (ERROR_SUCCESS != regMachinePolicy.DeleteValue(szNoActiveDesktop_val))
|
|
{
|
|
LOGMESSAGE1(_T("Failed to delete %s policy"), szNoActiveDesktop_val);
|
|
}
|
|
}
|
|
}
|
|
|
|
pIGroupPolicyObject->Save(TRUE, TRUE, &guidRegistryEntension, &guidPolicyMachineSnapin);
|
|
RegCloseKey(hMachinePolicyKey);
|
|
bRet = TRUE;
|
|
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE1(_T("ERROR, Failed to GetRegistryKey...hResult = %x"), hResult);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE1(_T("ERROR, Failed to OpenLocalMachineGPO...hResult = %x"), hResult);
|
|
}
|
|
|
|
pIGroupPolicyObject->Release();
|
|
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE1(_T("ERROR, Failed to get the interface IID_IGroupPolicyObject...hResult = %x"), hResult);
|
|
|
|
}
|
|
|
|
LOGMESSAGE0(_T("Done with Policy changes!"));
|
|
}
|
|
|
|
return bRet;
|
|
}
|
|
|
|
|
|
BOOL SubCompToggle::ModifyAppPriority()
|
|
{
|
|
if (StateObject.IsAppSrvModeSwitch())
|
|
{
|
|
DWORD dwSrvPrioity = StateObject.IsItAppServer() ? 0x26 : 0x18;
|
|
|
|
LPCTSTR PRIORITY_KEY = _T("SYSTEM\\CurrentControlSet\\Control\\PriorityControl");
|
|
|
|
CRegistry oReg;
|
|
if (ERROR_SUCCESS == oReg.OpenKey(HKEY_LOCAL_MACHINE, PRIORITY_KEY))
|
|
{
|
|
if (ERROR_SUCCESS != oReg.WriteRegDWord(_T("Win32PrioritySeparation"), dwSrvPrioity))
|
|
{
|
|
LOGMESSAGE0(_T("Error, Failed to update Win32PrioritySeparation"));
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE1(_T("Errror, Failed to open %s key"), PRIORITY_KEY);
|
|
return FALSE;
|
|
}
|
|
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
BOOL SubCompToggle::UpdateMMDefaults ()
|
|
{
|
|
LPCTSTR MM_REG_KEY = _T("SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management");
|
|
LPCTSTR SESSION_VIEW_SIZE_VALUE = _T("SessionViewSize");
|
|
LPCTSTR SESSION_POOL_SIZE_VALUE = _T("SessionPoolSize");
|
|
|
|
//
|
|
// on app server machines, win32k uses the session pool, on all other platform
|
|
// it uses the global pool. MM defaults (when these registry are not set) are
|
|
// good only for TS AppServer.
|
|
//
|
|
// For all other platform we set new values for SessionPool (set to minumum allowed (4MB))
|
|
// and higher value for SessionView.
|
|
//
|
|
const DWORD dwViewSizeforNonTS = 48;
|
|
const DWORD dwPoolSizeforNonTS = 4;
|
|
|
|
//
|
|
// these default applies only for X86 machines
|
|
//
|
|
if (!StateObject.IsX86())
|
|
return TRUE;
|
|
|
|
|
|
CRegistry regMM;
|
|
DWORD dwError = regMM.OpenKey(HKEY_LOCAL_MACHINE, MM_REG_KEY);
|
|
|
|
if (ERROR_SUCCESS == dwError)
|
|
{
|
|
if (StateObject.IsItAppServer())
|
|
{
|
|
//
|
|
// if this is a mode change then then we have to delete mm settings.
|
|
//
|
|
if (!StateObject.WasItAppServer())
|
|
{
|
|
//
|
|
// for app server machines, MM defaults are good,
|
|
//
|
|
regMM.DeleteValue(SESSION_VIEW_SIZE_VALUE);
|
|
regMM.DeleteValue(SESSION_POOL_SIZE_VALUE);
|
|
|
|
}
|
|
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// for all other platform set SessionPool and SessionView.
|
|
//
|
|
dwError = regMM.WriteRegDWordNoOverWrite(SESSION_VIEW_SIZE_VALUE, dwViewSizeforNonTS);
|
|
if (dwError != ERROR_SUCCESS)
|
|
{
|
|
LOGMESSAGE2(_T("ERROR, Failed to write %s for nonTS (%d)"), SESSION_VIEW_SIZE_VALUE, dwError);
|
|
}
|
|
|
|
|
|
dwError = regMM.WriteRegDWordNoOverWrite(SESSION_POOL_SIZE_VALUE, dwPoolSizeforNonTS);
|
|
if (dwError != ERROR_SUCCESS)
|
|
{
|
|
LOGMESSAGE2(_T("ERROR, Failed to write %s for nonTS(%d)"), SESSION_POOL_SIZE_VALUE, dwError);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE1(_T("ERROR, Failed to open mm Key (%d)"), dwError);
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
BOOL SubCompToggle::WriteModeSpecificRegistry ()
|
|
{
|
|
// here we do some registry changes that has weird requirements .
|
|
// if the registry has to be retained on upgrades,
|
|
// and it has different values for different modes then such registry
|
|
// changes go here.
|
|
|
|
|
|
if (!StateObject.IsServer())
|
|
return true;
|
|
|
|
|
|
CRegistry oRegTermsrv;
|
|
DWORD dwError = oRegTermsrv.OpenKey(HKEY_LOCAL_MACHINE, REG_CONTROL_TS_KEY);
|
|
if (ERROR_SUCCESS == dwError)
|
|
{
|
|
DWORD dwSingleSessionPerUser;
|
|
const TCHAR szSingleSession[] = _T("fSingleSessionPerUser");
|
|
|
|
|
|
if (StateObject.IsItAppServer())
|
|
{
|
|
dwSingleSessionPerUser = 1;
|
|
}
|
|
else
|
|
{
|
|
dwSingleSessionPerUser = 0;
|
|
}
|
|
|
|
if (StateObject.IsAppSrvModeSwitch())
|
|
{
|
|
//
|
|
// overwrite fSingleSessionPerUser with new value in case of mode switch.
|
|
//
|
|
dwError = oRegTermsrv.WriteRegDWord(szSingleSession, dwSingleSessionPerUser);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// retain the original value in case of just upgrade.
|
|
//
|
|
dwError = oRegTermsrv.WriteRegDWordNoOverWrite(szSingleSession, dwSingleSessionPerUser);
|
|
}
|
|
|
|
if (ERROR_SUCCESS != dwError)
|
|
{
|
|
LOGMESSAGE1(_T("ERROR, failed to write fSingleSessionPerUser value(%d)"), dwError );
|
|
}
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE1(_T("ERROR, failed to open Termsrv registry(%d)"), dwError );
|
|
}
|
|
|
|
return ERROR_SUCCESS == dwError;
|
|
}
|
|
|
|
BOOL SubCompToggle::AddStartupPopup()
|
|
{
|
|
//
|
|
// we need to popup a help checklist when a machine is turned into TS App Server.
|
|
//
|
|
if (!StateObject.CanShowStartupPopup())
|
|
{
|
|
LOGMESSAGE0(_T("CanShowStartupPopup returned false!"));
|
|
return TRUE;
|
|
}
|
|
|
|
if (StateObject.IsItAppServer() && !StateObject.WasItAppServer())
|
|
{
|
|
CRegistry oReg;
|
|
DWORD dwError = oReg.OpenKey(HKEY_LOCAL_MACHINE, RUN_KEY);
|
|
if (dwError == ERROR_SUCCESS)
|
|
{
|
|
dwError = oReg.WriteRegExpString(HELP_POPUPRUN_VALUE, HELP_PUPUP_COMMAND);
|
|
if (dwError != ERROR_SUCCESS)
|
|
{
|
|
LOGMESSAGE1(_T("Error Failed to write Runonce value"), dwError);
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE0(_T("added the startup Checklist Link!"));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
LOGMESSAGE1(_T("Error Failed to open Runonce key"), dwError);
|
|
}
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
#pragma warning(pop)
|