|
|
/*++
Copyright (c) 1996 Microsoft Corporation
Module Name:
rpcex.cxx
Abstract:
This module defines K2 rpc support.
Author:
Johnson Apacible (JohnsonA) June-19-1996
--*/
#include "w3p.hxx"
#include "w3svci_s.h"
#include <timer.h>
#include <time.h>
#include <ole2.h>
#include <imd.h>
#include <mb.hxx>
#include "httpxpc.h"
BOOL IsEncryptionPermitted( VOID ) /*++
Routine Description:
This routine checks whether encryption is getting the system default LCID and checking whether the country code is CTRY_FRANCE.
Arguments:
none
Return Value:
TRUE - encryption is permitted FALSE - encryption is not permitted
--*/
{ LCID DefaultLcid; WCHAR CountryCode[10]; ULONG CountryValue;
DefaultLcid = GetSystemDefaultLCID();
//
// Check if the default language is Standard French
//
if (LANGIDFROMLCID(DefaultLcid) == 0x40c) { return(FALSE); }
//
// Check if the users's country is set to FRANCE
//
if (GetLocaleInfoW(DefaultLcid,LOCALE_ICOUNTRY,CountryCode,10) == 0) { return(FALSE); }
CountryValue = (ULONG) wcstol(CountryCode,NULL,10); if (CountryValue == CTRY_FRANCE) { return(FALSE); } return(TRUE);
} // IsEncryptionPermitted
DWORD W3_SERVER_INSTANCE::QueryEncCaps( VOID ) /*++
Description
Returns encryption capability
Arguments:
None
Return:
Encryption capability
--*/ { //
// Get the encryption capability bits. SecurePort may be zero because
// no keys are installed or the locale does not allow encryption
//
return !HasSecureBindings() ? (IsEncryptionPermitted() ? ENC_CAPS_NOT_INSTALLED : ENC_CAPS_DISABLED) // note : we do not currently support PCT
: ENC_CAPS_SSL; } // W3_SERVER_INSTANCE::QueryEncCaps
BOOL W3_SERVER_INSTANCE::SetServiceConfig( IN PCHAR pBuffer ) /*++
Description
Sets the common service admin information for the servers specified in dwServerMask.
Arguments:
pConfig - Admin information to set
Note:
--*/ { LPW3_CONFIG_INFO pConfig = (LPW3_CONFIG_INFO)pBuffer;
if ( !WritePublicW3Params( pConfig ) || !ReadPublicW3Params( pConfig->FieldControl )) { return FALSE; }
return TRUE;
} // W3_SERVER_INSTANCE::SetServiceConfig
BOOL W3_SERVER_INSTANCE::GetServiceConfig( IN PCHAR pBuffer, IN DWORD dwLevel ) /*++
Description
Retrieves the admin information
Arguments:
pBuffer - Buffer to fill up. dwLevel - info level of information to return.
Note:
--*/ { LPW3_CONFIG_INFO pConfig = (LPW3_CONFIG_INFO)pBuffer; DWORD err = NO_ERROR; MB MetaInfo( (IMDCOM*) g_pInetSvc->QueryMDObject() ); STR strDefaultFile;
ZeroMemory( pConfig, sizeof( W3_CONFIG_INFO ) );
// We want to open a read handle to the server instance
// name, and then we'll read the indivdual info out next.
//
if ( !MetaInfo.Open( QueryMDVRPath() )) { return FALSE; }
LockThisForRead();
//
// Get always retrieves all of the parameters
//
pConfig->FieldControl = FC_W3_ALL;
if (!MetaInfo.GetDword("/", MD_DIRECTORY_BROWSING, IIS_MD_UT_FILE, &pConfig->dwDirBrowseControl)) { err = GetLastError(); if (err == MD_ERROR_DATA_NOT_FOUND) { pConfig->dwDirBrowseControl = DEFAULT_DIR_BROWSE_CONTROL; err = NO_ERROR; } else { goto done; }
}
if ( !MetaInfo.GetStr( "/", MD_DEFAULT_LOAD_FILE, IIS_MD_UT_FILE, &strDefaultFile, METADATA_INHERIT, "default.htm" )) { err = GetLastError(); goto done; }
pConfig->fCheckForWAISDB = FALSE; pConfig->fServerAsProxy = FALSE; pConfig->fSSIEnabled = FALSE; pConfig->csecGlobalExpire = 0;
//
// Set the encryption capability bits. SecurePort may be zero
// because no keys are installed or the locale does not allow
// encryption
//
pConfig->dwEncCaps |= QueryEncCaps();
if ( !ConvertStringToRpc( &pConfig->lpszDefaultLoadFile, strDefaultFile.QueryStr() ) || !ConvertStringToRpc( &pConfig->lpszDirectoryImage, "" ) || !ConvertStringToRpc( &pConfig->lpszSSIExtension, "" )) { err = GetLastError();
FreeRpcString( pConfig->lpszDefaultLoadFile ); FreeRpcString( pConfig->lpszDirectoryImage ); FreeRpcString( pConfig->lpszCatapultUser ); FreeRpcString( pConfig->lpszSSIExtension ); }
done: UnlockThis();
SetLastError(err); return(err==NO_ERROR);
} // W3_SERVER_INSTANCE::GetServiceConfig
BOOL W3_SERVER_INSTANCE::EnumerateUsers( OUT PCHAR * pBuffer, OUT PDWORD nRead ) /*++
Description
Enumerates the connected users.
Arguments:
pBuffer - Buffer to fill up.
--*/ { BOOL fRet = TRUE;
#if 0
//
// Lock the user database.
//
LockUserDatabase();
//
// Determine the necessary buffer size.
//
pBuffer->EntriesRead = 0; pBuffer->Buffer = NULL;
cbBuffer = 0; err = NERR_Success;
EnumerateUsers( pBuffer, &cbBuffer );
if( cbBuffer > 0 ) { //
// Allocate the buffer. Note that we *must*
// use midl_user_allocate/midl_user_free.
//
pBuffer->Buffer = (W3_USER_INFO *) MIDL_user_allocate( (unsigned int)cbBuffer );
if( pBuffer->Buffer == NULL ) { err = ERROR_NOT_ENOUGH_MEMORY; } else { //
// Since we've got the user database locked, there
// *should* be enough room in the buffer for the
// user data. If there isn't, we've messed up
// somewhere.
//
TCP_REQUIRE( ::EnumerateUsers( pBuffer, &cbBuffer ) ); } }
//
// Unlock the user database before returning.
UnlockUserDatabase();
#endif //0
return fRet;
} // EnumerateUsers
BOOL W3_SERVER_INSTANCE::DisconnectUser( IN DWORD dwIdUser ) /*++
Description
Disconnect the user
Arguments:
dwIdUser - Identifies the user to disconnect. If 0, then disconnect ALL users.
--*/ { BOOL fRet = TRUE;
//
// Do it.
//
if( dwIdUser == 0 ) { CLIENT_CONN::DisconnectAllUsers(); } else { #if 0
if( !CLIENT_CONN::DisconnectUser( idUser ) ) { err = NERR_UserNotFound; } #endif
}
return fRet;
} // DisconnectUser
BOOL W3_SERVER_INSTANCE::GetStatistics( IN DWORD dwLevel, OUT PCHAR* pBuffer ) /*++
Description
Disconnect Queries the server statistics
Arguments:
dwLevel - Info level. Currently only level 0 is supported.
pBuffer - Will receive a pointer to the statistics structure.
--*/ { APIERR err = NO_ERROR;
//
// Return the proper statistics based on the infolevel.
//
switch( dwLevel ) { case 0 : { LPW3_STATISTICS_1 pstats1;
pstats1 = (W3_STATISTICS_1 *) MIDL_user_allocate( sizeof(W3_STATISTICS_1) );
if( pstats1 == NULL ) { err = ERROR_NOT_ENOUGH_MEMORY; } else { ATQ_STATISTICS atqStat;
ZeroMemory( pstats1, sizeof( W3_STATISTICS_1 ) );
QueryStatsObj()->CopyToStatsBuffer( pstats1 );
//
// Merge in HTTPEXT statistics
//
W3MergeDavPerformanceData( QueryInstanceId(), pstats1 );
//
// Get instance's bandwidth throttling statistics
//
if ( QueryBandwidthInfo() ) { if ( AtqBandwidthGetInfo( QueryBandwidthInfo(), ATQ_BW_STATISTICS, (ULONG_PTR *) &atqStat ) ) { pstats1->TotalBlockedRequests = atqStat.cBlockedRequests; pstats1->TotalRejectedRequests = atqStat.cRejectedRequests; pstats1->TotalAllowedRequests = atqStat.cAllowedRequests; pstats1->CurrentBlockedRequests = atqStat.cCurrentBlockedRequests; pstats1->MeasuredBw = atqStat.MeasuredBandwidth; } }
pstats1->TimeOfLastClear = GetCurrentTimeInSeconds() - pstats1->TimeOfLastClear;
//
// Copy Global statistics counter values
//
pstats1->CurrentConnections = g_pW3Stats->QueryStatsObj()->CurrentConnections; pstats1->MaxConnections = g_pW3Stats->QueryStatsObj()->MaxConnections; pstats1->ConnectionAttempts = g_pW3Stats->QueryStatsObj()->ConnectionAttempts;
*pBuffer = (PCHAR)pstats1;
} } break;
default : err = ERROR_INVALID_LEVEL; break; }
SetLastError(err); return(err == NO_ERROR);
} // QueryStatistics
BOOL W3_SERVER_INSTANCE::ClearStatistics( VOID ) /*++
Description
Clears the server statistics
Arguments:
None.
--*/ {
QueryStatsObj()->ClearStatistics();
return TRUE;
} // ClearStatistics
|