Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1379 lines
34 KiB

/*++
Copyright (c) 1996 Microsoft Corporation
Module Name:
filtinit.cxx
Abstract:
This module contains the Microsoft HTTP server filter module for stuff that
has to do with filter initialization, loading and unloading.
Author:
John Ludeman (johnl) 06-Aug-1996
Revision History:
--*/
#include "w3p.hxx"
//
// If the request doesn't specify an entry point, default to using
// this
//
#define SF_DEFAULT_ENTRY "HttpFilterProc"
#define SF_VERSION_ENTRY "GetFilterVersion"
#define SF_TERM_ENTRY "TerminateFilter"
//
// Name of the value under the parameters key containing the list of
// filter dlls. This was the value for IIS 1.0 and 2.0. Global filters
// can still be specified under this key.
//
#define HTTP_FILTER_DLLS "Filter DLLs"
//
// Globals
//
static BOOL g_fInitialized = FALSE;
LIST_ENTRY g_FilterHead; // List of filter DLLs
CRITICAL_SECTION g_csFilterDlls;
//
// Prototypes
//
BOOL
UpdateInstanceFilters(
IN const CHAR * pszNewDll,
IN const CHAR * pszOldDll,
IN W3_SERVER_INSTANCE * pInst
);
BOOL
AdjustInstanceFilterListFlags( IN PVOID pvContext1,
IN PVOID pvContext2,
IN IIS_SERVER_INSTANCE *pInstance );
FILTER_LIST *
InitializeFilters(
BOOL * pfAnySecureFilters,
W3_IIS_SERVICE * pSvc
)
/*++
Routine Description:
Loads the global filter DLLs and their corresponding entry point. Note the
global filter list does not allow unloads.
g_fInitialized should only be set after all of the global filters are
loaded.
Arguments:
pfAnySecureFilters - Set to TRUE if there are any secure filters
pSvc - Pointer to service global. The global service pointer isn't
initialized yet so we pass it in for global filter initialization.
Only used for logging events.
Return Value:
Global filter list or NULL if an error occurred
--*/
{
CHAR szFilterKey[MAX_PATH+1];
FILTER_LIST * pfl;
DWORD cb;
CHAR szLoadOrder[1024];
CHAR szDllName[MAX_PATH+1];
CHAR * pchFilter;
CHAR * pchComma;
MB mb( (IMDCOM*) pSvc->QueryMDObject() );
DWORD fEnabled;
DWORD cFilters;
HKEY hkeyParam = NULL;
DWORD err = NO_ERROR;
BOOL fOpened;
INITIALIZE_CRITICAL_SECTION( &g_csFilterDlls );
InitializeListHead( &g_FilterHead );
strcpy( szFilterKey, IIS_MD_LOCAL_MACHINE_PATH "/" W3_SERVICE_NAME_A );
strcat( szFilterKey, IIS_MD_ISAPI_FILTERS );
DBG_ASSERT( strlen( szFilterKey ) + 1 < sizeof( szFilterKey ));
pfl = new FILTER_LIST();
if ( !pfl ) {
return NULL;
}
//
// Loop through filter keys, if we can't access the metabase, we assume
// success and continue
//
if ( !mb.Open( szFilterKey,
METADATA_PERMISSION_READ ))
{
DBGPRINTF(( DBG_CONTEXT,
"[InitializeFilterList] Cannot open path %s, error %lu\n",
szFilterKey, GetLastError() ));
return pfl;
}
fOpened = TRUE;
//
// Get the filter load order
//
cb = sizeof( szLoadOrder );
*szLoadOrder = '\0';
if ( !mb.GetString( "",
MD_FILTER_LOAD_ORDER,
IIS_MD_UT_SERVER,
szLoadOrder,
&cb,
0 ))
{
DBGPRINTF(( DBG_CONTEXT,
"[InitializeFilterList] Cannot load filter load order, error %lu\n",
szFilterKey, GetLastError() ));
delete pfl;
return NULL;
}
pchFilter = szLoadOrder;
while ( *pchFilter )
{
if ( !fOpened &&
!mb.Open( szFilterKey,
METADATA_PERMISSION_READ ))
{
DBGPRINTF(( DBG_CONTEXT,
"[InitializeFilterList] Cannot open path %s, error %lu\n",
szFilterKey, GetLastError() ));
break;
}
fOpened = TRUE;
pchComma = strchr( pchFilter, ',' );
if ( pchComma )
{
*pchComma = '\0';
}
while ( ISWHITEA( *pchFilter ))
{
pchFilter++;
}
fEnabled = TRUE;
mb.GetDword( pchFilter,
MD_FILTER_ENABLED,
IIS_MD_UT_SERVER,
&fEnabled );
if ( fEnabled )
{
cb = sizeof(szDllName);
if ( mb.GetString( pchFilter,
MD_FILTER_IMAGE_PATH,
IIS_MD_UT_SERVER,
szDllName,
&cb,
0 ))
{
mb.Close();
fOpened = FALSE;
if ( pfl->LoadFilter( &mb, szFilterKey, &fOpened, pchFilter, szDllName, TRUE, pSvc ))
{
DBGPRINTF(( DBG_CONTEXT,
"[InitializeFilterList] Loaded %s\n",
szDllName ));
}
}
}
if ( pchComma )
{
pchFilter = pchComma + 1;
}
else
{
break;
}
}
//
// Now load any filters that have been added in the registry for
// downlevel compatibility
//
err = RegOpenKeyEx( HKEY_LOCAL_MACHINE,
W3_PARAMETERS_KEY,
0,
KEY_READ,
&hkeyParam );
if( err == NO_ERROR )
{
TCHAR * psz;
TCHAR * pszFilterList = NULL;
if ( ReadRegString( hkeyParam,
&pszFilterList,
HTTP_FILTER_DLLS,
"" ))
{
RegCloseKey( hkeyParam );
psz = pszFilterList;
//
// Parse the comma separated list of dlls
//
INET_PARSER Parser( pszFilterList );
Parser.SetListMode( TRUE );
while ( *(psz = Parser.QueryToken()) )
{
if ( pfl->LoadFilter( NULL, NULL, &fOpened, psz, psz, TRUE, pSvc ))
{
const CHAR * apszSubString[1];
DBGPRINTF(( DBG_CONTEXT,
"[InitializeFilterList] Loaded %s\n",
psz ));
apszSubString[0] = psz;
//
// Log a warning here if we picked up a filter from the
// registry
//
pSvc->LogEvent( W3_MSG_LOADED_FILTER_FROM_REG,
1,
apszSubString,
NO_ERROR );
}
Parser.NextItem();
}
Parser.RestoreBuffer();
TCP_FREE( pszFilterList );
}
else
{
RegCloseKey( hkeyParam );
}
}
*pfAnySecureFilters = CheckForSecurityFilter( pfl );
g_fInitialized = TRUE;
return pfl;
}
VOID
TerminateFilters(
VOID
)
/*++
Routine Description:
Unloads any filter DLLs and their corresponding entry point
--*/
{
LIST_ENTRY * pEntry;
HTTP_FILTER_DLL * pFilterDll;
if ( g_fInitialized )
{
EnterCriticalSection( &g_csFilterDlls );
for ( pEntry = g_FilterHead.Flink;
pEntry != &g_FilterHead;
pEntry = g_FilterHead.Flink)
{
pFilterDll = CONTAINING_RECORD( pEntry, HTTP_FILTER_DLL, ListEntry );
RemoveEntryList( pEntry );
//
// This should delete the filter dll
//
DBGPRINTF(( DBG_CONTEXT,
"[TerminateFilters] Filter %s, ref count %d\n",
pFilterDll->QueryName(),
pFilterDll->QueryRef() ));
// DBG_ASSERT( pFilterDll->QueryRef() == 1 );
HTTP_FILTER_DLL::Dereference( pFilterDll );
}
LeaveCriticalSection( &g_csFilterDlls );
DeleteCriticalSection( &g_csFilterDlls );
}
}
HTTP_FILTER_DLL *
CheckoutFilterDll(
IN const CHAR * pszFilterDll
)
/*++
Routine Description:
Checks to see if an existing filter dll is already loaded and ups the ref
count if it is
NOTE: THE FILTER LIST LOCK MUST BE TAKEN PRIOR TO CALLING THIS FUNCTION
Arguments:
pszFilterDLL - Fully qualified path to filter dll to load
Return Value:
Pointer to the filter if it's already loaded, NULL if the filter isn't
loaded
--*/
{
LIST_ENTRY * pEntry;
HTTP_FILTER_DLL * pFilterDll;
for ( pEntry = g_FilterHead.Flink;
pEntry != &g_FilterHead;
pEntry = pEntry->Flink )
{
pFilterDll = CONTAINING_RECORD( pEntry, HTTP_FILTER_DLL, ListEntry );
DBG_ASSERT( pFilterDll->CheckSignature() );
if ( !lstrcmpi( pFilterDll->QueryName(), pszFilterDll ))
{
pFilterDll->Reference();
return pFilterDll;
}
}
return NULL;
}
BOOL
HTTP_FILTER_DLL::LoadDll(
MB * pmb OPTIONAL,
const CHAR * pszKeyName,
LPBOOL pfOpened,
const CHAR * pszRelFilterPath,
const CHAR * pszFilterDll
)
/*++
Routine Description:
Loads the specified dll
Arguments:
pmb - Open metabase to /filters key
pszKeyName - metabase filters key name
pfOpened - updated with TRUE if pmb opened on return
pszFilterDll - Fully qualified name of filter to load
THE GLOBAL FILTER LIST LOCK MUST BE TAKEN PRIOR TO CALLING THIS METHOD
Return Value:
TRUE on success, FALSE on failure (call GetLastError)
--*/
{
HTTP_FILTER_VERSION ver;
if ( !m_strName.Copy( pszFilterDll ))
{
return FALSE;
}
//
// Load it and put it in the list, note the filter list lock
// is still taken
//
m_hmod = LoadLibraryEx( pszFilterDll,
NULL,
LOAD_WITH_ALTERED_SEARCH_PATH );
if ( g_fIsWindows95 &&
(m_hmod == NULL) &&
(GetLastError() == ERROR_FILE_NOT_FOUND) ) {
//
// According to vlads: the behaviour of flags used in loadlibraryex
// is different between chicago and NT. This caused a problem
// loading frontpage filters.
//
m_hmod = LoadLibrary( pszFilterDll);
}
if ( !m_hmod )
{
DBGPRINTF(( DBG_CONTEXT,
"[LoadDll] LoadLibrary failed with error %d\n",
GetLastError()));
goto ErrorExit;
}
//
// Retrieve the entry point
//
m_pfnSFVer = (PFN_SF_VER_PROC) GetProcAddress( m_hmod,
SF_VERSION_ENTRY );
m_pfnSFProc = (PFN_SF_DLL_PROC) GetProcAddress( m_hmod,
SF_DEFAULT_ENTRY );
m_pfnSFTerm = (PFN_SF_TERM_PROC) GetProcAddress( m_hmod,
SF_TERM_ENTRY );
if ( !m_pfnSFProc || !m_pfnSFVer )
{
//
// Don't call the terminator if we didn't call the initializer
//
m_pfnSFTerm = NULL;
goto ErrorExit;
}
ver.dwServerFilterVersion = HTTP_FILTER_REVISION;
//
// Call the version entry point and get the filter capabilities
//
if ( !m_pfnSFVer( &ver ) )
{
goto ErrorExit;
}
if ( pmb &&
(*pfOpened ||
pmb->Open( pszKeyName, METADATA_PERMISSION_READ|METADATA_PERMISSION_WRITE )) )
{
*pfOpened = TRUE;
if ( !pmb->SetString( pszRelFilterPath,
MD_FILTER_DESCRIPTION,
IIS_MD_UT_SERVER,
ver.lpszFilterDesc,
0 ) ||
!pmb->SetDword( pszRelFilterPath,
MD_FILTER_FLAGS,
IIS_MD_UT_SERVER,
ver.dwFlags,
0 ))
{
goto ErrorExit;
}
}
//
// If the client didn't specify any of the secure port notifications,
// supply them with the default of both
//
if ( !(ver.dwFlags & (SF_NOTIFY_SECURE_PORT | SF_NOTIFY_NONSECURE_PORT)))
{
ver.dwFlags |= (SF_NOTIFY_SECURE_PORT | SF_NOTIFY_NONSECURE_PORT);
}
m_dwVersion = ver.dwFilterVersion;
m_dwFlags = (ver.dwFlags & SF_NOTIFY_NONSECURE_PORT) ? ver.dwFlags : 0;
m_dwSecureFlags = (ver.dwFlags & SF_NOTIFY_SECURE_PORT) ? ver.dwFlags : 0;
//
// Put the new dll on the filter dll list
//
InsertHeadList( &g_FilterHead, &ListEntry );
return TRUE;
ErrorExit:
return FALSE;
}
BOOL
HTTP_FILTER_DLL::Unload(
const CHAR * pszDll
)
/*++
Routine Description:
Finds the existing DLL and sets it up to be unloaded
Arguments:
pszDLL - Fully qualified path to filter dll to load
Return Value:
TRUE if the filter DLL was found, FALSE if it wasn't found or it's already
marked for deletion
--*/
{
LIST_ENTRY * pEntry;
HTTP_FILTER_DLL * pFilterDll;
EnterCriticalSection( &g_csFilterDlls );
for ( pEntry = g_FilterHead.Flink;
pEntry != &g_FilterHead;
pEntry = pEntry->Flink )
{
pFilterDll = CONTAINING_RECORD( pEntry, HTTP_FILTER_DLL, ListEntry );
DBG_ASSERT( pFilterDll->CheckSignature() );
if ( !lstrcmpi( pFilterDll->QueryName(), pszDll ))
{
RemoveEntryList( pEntry );
LeaveCriticalSection( &g_csFilterDlls );
return TRUE;
}
}
LeaveCriticalSection( &g_csFilterDlls );
return FALSE;
}
BOOL
FILTER_LIST::LoadFilter(
MB * pmb,
LPSTR pszKeyName,
LPBOOL pfOpened,
const CHAR * pszRelativeMBPath,
const CHAR * pszFilterDll,
BOOL fAllowRawRead,
W3_IIS_SERVICE * pSvc
)
/*++
Routine Description:
Loads the specified filter into this filter list. Note the filter dll's
ref count starts at one for being on the g_FilterHead list. Thus if the
refcount drops to one, no filter list is using the filter dll and it can
be deleted.
Arguments:
pmb - metabase open at the filter root, opened for Read/Write
pszKeyName - Metabase open path for filters key
pfOpened - TRUE if pmb currently opened, otherwise FALSE
must be set before calling this function, which will
update it.
pszRelativeMBPath - Metabase path to this filter dll
pszFilterDll - Fully qualified name of filter to load
fAllowRawRead - Set to TRUE if raw read filters are allowed
pSvc - Optional service pointer for logging
Return Value:
TRUE on success, FALSE on failure (call GetLastError)
--*/
{
HTTP_FILTER_VERSION ver;
HTTP_FILTER_DLL * pFilterDll;
DWORD i;
//
// pSvc will only be passed during InitializeFilters
//
if ( !pSvc )
{
pSvc = (W3_IIS_SERVICE *) g_pInetSvc;
}
//
// Make sure there's a free entry in the filter list array, and
// the secure/non-secure notification arrays (the latter two are used
// in conjunction with filters disabling themselves per request
//
if ( (m_cFilters+1) > (m_buffFilterArray.QuerySize() / sizeof(PVOID)))
{
if ( !m_buffFilterArray.Resize( (m_cFilters + 5) * sizeof(PVOID)) )
{
return FALSE;
}
if ( !m_buffSecureArray.Resize( (m_cFilters + 5) * sizeof(DWORD)) )
{
return FALSE;
}
if ( !m_buffNonSecureArray.Resize( (m_cFilters + 5) * sizeof(DWORD)) )
{
return FALSE;
}
}
//
// Load the filter DLL
//
EnterCriticalSection( &g_csFilterDlls );
if ( !(pFilterDll = CheckoutFilterDll( pszFilterDll )))
{
pFilterDll = new HTTP_FILTER_DLL;
if ( !pFilterDll ||
!pFilterDll->LoadDll( pmb,
pszKeyName,
pfOpened,
pszRelativeMBPath,
pszFilterDll ) )
{
const CHAR * apszSubString[1];
DWORD err = GetLastError();
LeaveCriticalSection( &g_csFilterDlls );
delete pFilterDll;
apszSubString[0] = pszFilterDll;
if ( err )
{
//
// Log a warning here if the filter supplied an error code
//
pSvc->LogEvent( W3_EVENT_FILTER_DLL_LOAD_FAILED,
1,
apszSubString,
err );
}
DBGPRINTF(( DBG_CONTEXT,
"Cannot load filter dll (err = %d)\n",
err));
if ( pmb &&
(*pfOpened ||
pmb->Open( pszKeyName, METADATA_PERMISSION_READ |
METADATA_PERMISSION_WRITE )) )
{
*pfOpened = TRUE;
pmb->SetDword( pszRelativeMBPath,
MD_WIN32_ERROR,
IIS_MD_UT_SERVER,
err,
0 );
pmb->SetDword( pszRelativeMBPath,
MD_FILTER_STATE,
IIS_MD_UT_SERVER,
MD_FILTER_STATE_UNLOADED,
0 );
}
return FALSE;
}
//
// This filter list now officially owns a reference to this filter dll
//
pFilterDll->Reference();
}
//
// Not a fatal error if the status doesn't get updated
//
DBG_ASSERT( pFilterDll != NULL );
if ( pmb &&
(*pfOpened ||
pmb->Open( pszKeyName, METADATA_PERMISSION_READ|METADATA_PERMISSION_WRITE )) )
{
*pfOpened = TRUE;
if ( !pmb->SetDword( pszRelativeMBPath,
MD_WIN32_ERROR,
IIS_MD_UT_SERVER,
NO_ERROR,
0 ) ||
!pmb->SetDword( pszRelativeMBPath,
MD_FILTER_STATE,
IIS_MD_UT_SERVER,
MD_FILTER_STATE_LOADED,
0 ))
{
DBGPRINTF(( DBG_CONTEXT,
"Error %d setting filter status\n",
GetLastError() ));
}
}
//
// Disallow any per-instance read raw filters
//
if ( !fAllowRawRead &&
(pFilterDll->QueryNotificationFlags() & SF_NOTIFY_READ_RAW_DATA) )
{
const CHAR * apszSubString[1];
apszSubString[0] = pszFilterDll;
pSvc->LogEvent( W3_MSG_READ_RAW_MUST_BE_GLOBAL,
1,
apszSubString,
0 );
DBGPRINTF(( DBG_CONTEXT,
"Refusing READ_RAW filter on server instance (%s)\n",
pszFilterDll));
if ( pmb &&
(*pfOpened ||
pmb->Open( pszKeyName, METADATA_PERMISSION_READ|METADATA_PERMISSION_WRITE )) )
{
*pfOpened = TRUE;
if ( !pmb->SetDword( pszRelativeMBPath,
MD_WIN32_ERROR,
IIS_MD_UT_SERVER,
ERROR_INVALID_PARAMETER,
0 ) ||
!pmb->SetDword( pszRelativeMBPath,
MD_FILTER_STATE,
IIS_MD_UT_SERVER,
MD_FILTER_STATE_UNLOADED,
0 ))
{
DBGPRINTF(( DBG_CONTEXT,
"Error %d setting filter status\n",
GetLastError() ));
}
}
//
// Undo the ref for being on this filter list
//
HTTP_FILTER_DLL::Dereference( pFilterDll );
//
// If nobody else is using this filter dll, then go ahead and force
// an unload. The filter dll can't be checked out with the filter
// critical section held so this is a safe operation.
//
if ( pFilterDll->QueryRef() == 1 )
{
RemoveEntryList( &pFilterDll->ListEntry );
HTTP_FILTER_DLL::Dereference( pFilterDll );
}
LeaveCriticalSection( &g_csFilterDlls );
return FALSE;
}
//
// Find where pFilterDll goes in the list
//
for ( i = 0; i < m_cFilters; i++ )
{
if ( (QueryDll(i)->QueryNotificationFlags() & SF_NOTIFY_ORDER_MASK)
< (pFilterDll->QueryNotificationFlags() & SF_NOTIFY_ORDER_MASK) )
{
break;
}
}
//
// And insert it into the array
//
memmove( (PVOID *) m_buffFilterArray.QueryPtr() + i + 1,
(PVOID *) m_buffFilterArray.QueryPtr() + i,
(m_cFilters - i) * sizeof(PVOID) );
(((HTTP_FILTER_DLL * *) (m_buffFilterArray.QueryPtr())))[i] = pFilterDll;
//
// Add notification DWORDS to secure/non-secure arrays
//
memmove( (DWORD *) m_buffSecureArray.QueryPtr() + i + 1,
(DWORD *) m_buffSecureArray.QueryPtr() + i,
(m_cFilters - i) * sizeof(DWORD) );
((DWORD*) m_buffSecureArray.QueryPtr())[i] = pFilterDll->QuerySecureFlags();
memmove( (DWORD *) m_buffNonSecureArray.QueryPtr() + i + 1,
(DWORD *) m_buffNonSecureArray.QueryPtr() + i,
(m_cFilters - i) * sizeof(DWORD) );
((DWORD*) m_buffNonSecureArray.QueryPtr())[i] = pFilterDll->QueryNonsecureFlags();
m_cFilters++;
//
// Segregate the secure and non-secure port notifications
//
m_SecureNotifications |= pFilterDll->QuerySecureFlags();
m_NonSecureNotifications |= pFilterDll->QueryNonsecureFlags();
LeaveCriticalSection( &g_csFilterDlls );
return TRUE;
}
#if 0
BOOL
FILTER_LIST::Copy(
IN FILTER_LIST * pClone
)
/*++
Routine Description:
Clones the passed filter list
Return Value:
TRUE on success, FALSE on failure (call GetLastError)
--*/
{
DWORD i;
DBG_ASSERT( pClone->CheckSignature() );
DBG_ASSERT( CheckSignature() );
//
// Walk the list to be cloned and load all of the dlls
//
EnterCriticalSection( &g_csFilterDlls );
for ( i = 0; i < pClone->QueryFilterCount(); i++ )
{
if ( !LoadFilter( pClone->QueryDll( i )->QueryName(),
FALSE ))
{
DBGPRINTF(( DBG_CONTEXT,
"[FILTER_LIST::Copy] Failed loading %s, error %d\n",
pClone->QueryDll( i )->QueryName(),
GetLastError() ));
}
}
LeaveCriticalSection( &g_csFilterDlls );
return TRUE;
}
BOOL
ReplaceFilterDll(
IN const CHAR * pszNewDll,
IN const CHAR * pszOldDll
)
/*++
Routine Description:
Given a new filter and an old filter, this function renames the old filter
dll to a temporary name, copies the new .dll into place then walks the
instance list and replaces all occurrences of the old .dll with the
new .dll.
Arguments:
pszNewDll - New filter dll
pszOldDll - Existing filter dll that should be replaced
Return Value:
TRUE on success, FALSE on failure (call GetLastError)
--*/
{
CHAR achTmp[MAX_PATH + 1];
CHAR * pszTmp;
DWORD cVer = 1;
CHAR achVer[32];
const CHAR * apsz[3];
apsz[0] = pszOldDll;
apsz[1] = pszNewDll;
g_pInetSvc->LogEvent( W3_MSG_REP_FILTER,
2,
apsz,
0 );
//
// Find a back up name - this just appends a number onto the dll
//
strcpy( achTmp, pszOldDll );
pszTmp = achTmp + strlen( pszOldDll );
while ( TRUE )
{
_itoa( cVer, achVer, 10 );
strcpy( pszTmp, achVer );
if ( GetFileAttributes( achTmp ) != 0xffffffff ||
GetLastError() != ERROR_FILE_NOT_FOUND )
{
cVer++;
//
// If we've tried a reasonable number of backups and we couldn't
// find a candidate then get out
//
if ( cVer > 8192 )
{
SetLastError( ERROR_FILE_NOT_FOUND );
return FALSE;
}
continue;
}
//
// Rename the old DLL to the new dll name
//
if ( !MoveFileEx( pszOldDll,
achTmp,
MOVEFILE_WRITE_THROUGH | MOVEFILE_COPY_ALLOWED ))
{
DBGPRINTF(( DBG_CONTEXT,
"[ReplaceFilterDll] Move old file failed, %s -> %s, error %d\n",
pszOldDll,
achTmp,
GetLastError() ));
if ( GetLastError() == ERROR_FILE_EXISTS )
{
cVer++;
continue;
}
apsz[0] = pszOldDll;
apsz[1] = pszNewDll;
g_pInetSvc->LogEvent( W3_MSG_REP_FILTER,
2,
apsz,
GetLastError() );
return FALSE;
}
break;
}
//
// Rename the new DLL name to the old dll
//
if ( !MoveFileEx( pszNewDll,
pszOldDll,
MOVEFILE_WRITE_THROUGH | MOVEFILE_COPY_ALLOWED ))
{
DBGPRINTF(( DBG_CONTEXT,
"[ReplaceFilterDll] Move new file failed, %s -> %s, error %d\n",
pszNewDll,
pszOldDll,
GetLastError() ));
apsz[0] = pszNewDll;
apsz[1] = pszOldDll;
g_pInetSvc->LogEvent( W3_MSG_REP_FILTER_FAILED,
2,
apsz,
0 );
if ( !MoveFileEx( achTmp,
pszOldDll,
MOVEFILE_WRITE_THROUGH | MOVEFILE_COPY_ALLOWED ))
{
DBGPRINTF(( DBG_CONTEXT,
"[ReplaceFilterDll] Move tmp to old file failed, %s -> %s, error %d\n",
achTmp,
pszOldDll,
GetLastError() ));
apsz[0] = achTmp;
apsz[1] = pszOldDll;
g_pInetSvc->LogEvent( W3_MSG_REP_FILTER_FAILED,
2,
apsz,
0 );
}
return FALSE;
}
//
// Update all of the instance filters
//
if ( !g_pInetSvc->EnumServiceInstances(
(PVOID) pszNewDll,
(PVOID) pszOldDll,
(PFN_INSTANCE_ENUM) UpdateInstanceFilters ))
{
return FALSE;
}
return TRUE;
}
BOOL
UpdateInstanceFilters(
IN const CHAR * pszNewDll,
IN const CHAR * pszOldDll,
IN W3_SERVER_INSTANCE * pInst
)
/*++
Routine Description:
This is a simple utility function that handles the instance callbacks
Arguments:
pszNewDll - New filter dll
pszOldDll - Existing filter dll that should be replaced
pInst - The instance the change is being applied to
Return Value:
TRUE on success, FALSE on failure (call GetLastError)
--*/
{
#if 0
if ( !pInst->UpdateFilterList( pszNewDll,
pszOldDll ))
{
DBGPRINTF(( DBG_CONTEXT,
"[UpdateInstanceFilters] Failed with error %d\n",
GetLastError() ));
return FALSE;
}
#endif
return TRUE;
}
#endif
BOOL
FILTER_LIST::InsertGlobalFilters(
VOID
)
/*++
Routine Description:
Transfers all of the global filters to the per-instance filter list
Note: This method assumes the server filter list is not dynamic
Return Value:
TRUE on success, FALSE on failure (call GetLastError)
--*/
{
DWORD i;
HTTP_FILTER_DLL * pFilterDll;
BOOL fOpened;
for ( i = 0; i < GLOBAL_FILTER_LIST()->QueryFilterCount(); i++ )
{
//
// Ignore the return code, an event gets logged in LoadFilter()
// We allow raw read filters here as we're just duplicating the
// global filter list
//
LoadFilter( NULL, NULL, &fOpened, "", GLOBAL_FILTER_LIST()->QueryDll( i )->QueryName(), TRUE );
}
return TRUE;
}
BOOL
CheckForSecurityFilter(
FILTER_LIST * pFilterList
)
/*++
Routine Description:
Checks to see if there are any global filters that are encryption filters
Return Value:
TRUE if an encryption filter was found, FALSE otherwise
--*/
{
DWORD i;
HTTP_FILTER_DLL * pFilterDll;
BOOL fRet = FALSE;
for ( i = 0; i < pFilterList->QueryFilterCount(); i++ )
{
pFilterDll = pFilterList->QueryDll( i );
//
// port notification, assume he's an encryption filter
//
#define SECURE_FILTER (SF_NOTIFY_SECURE_PORT | \
SF_NOTIFY_READ_RAW_DATA | \
SF_NOTIFY_SEND_RAW_DATA | \
SF_NOTIFY_ORDER_HIGH)
if ( (pFilterDll->QueryNotificationFlags() & SECURE_FILTER) ==
SECURE_FILTER)
{
fRet = TRUE;
break;
}
}
return fRet;
}
BOOL
AdjustFilterFlags(
PVOID pfnSFProc,
DWORD dwNewFlags
)
/*++
Routine Description:
Private exported routine that allows a filter to dynamically adjust its
notification flags. This can only be done for global filters.
Return Value:
TRUE on success, FALSE on failure
--*/
{
W3_IIS_SERVICE * pSvc = (W3_IIS_SERVICE *) g_pInetSvc;
FILTER_LIST * pFilterList;
HTTP_FILTER_DLL * pFilterDll;
DWORD i;
BOOL fFoundSvcDLL = FALSE;
BOOL fFoundInstanceDLL = FALSE;
//
// Can't adjust priority, just notification flags
//
if ( dwNewFlags & SF_NOTIFY_ORDER_MASK )
{
SetLastError( ERROR_INVALID_PARAMETER );
return FALSE;
}
pFilterList = pSvc->QueryGlobalFilterList();
if ( !pFilterList )
{
//
// Shouldn't happen but you never know
//
return TRUE;
}
//
// Try to find the appropriate DLL in the single global per-service filter list
//
for ( i = 0; i < pFilterList->QueryFilterCount(); i++ )
{
DBG_ASSERT( pFilterList->QueryDll(i)->CheckSignature() );
if ( pFilterList->QueryDll(i)->QueryEntryPoint() == pfnSFProc )
{
pFilterDll = pFilterList->QueryDll(i);
//
// We've found the matching filter dll, adjust the flags in the
// filter dll object then adjust the flags in the filter list
//
pFilterDll->SetNotificationFlags( dwNewFlags );
pFilterList->SetNotificationFlags( i, pFilterDll );
fFoundSvcDLL = TRUE;
}
}
if ( fFoundSvcDLL )
{
//
// Try to update the flags in each of the per-instance filter lists
//
if ( pSvc )
{
if ( pSvc->EnumServiceInstances( (PVOID) &dwNewFlags,
(PVOID) pfnSFProc,
AdjustInstanceFilterListFlags ) )
{
fFoundInstanceDLL = TRUE;
}
}
}
if ( !( fFoundInstanceDLL && fFoundSvcDLL ) )
{
SetLastError( ERROR_FILE_NOT_FOUND );
return FALSE;
}
return TRUE;
}
BOOL AdjustInstanceFilterListFlags( IN PVOID pdwNewFlags,
IN PVOID pfnSFProc,
IN IIS_SERVER_INSTANCE *pInstance )
/*++
Routine Description:
This is the callback function called when we need to adjust the notification flags
of a particular filter dll for the filter list associated with a server instance.
Note that this filter list consists of the -global- [ie service-wide] filter dlls.
Arguments :
pdwNewFlags - pointer to DWORD containing new notification flags
pfnSFProc - pointer to filter entry point function
pInstance - pointer to W3_SERVER_INSTANCE whose filter list is to be updated
Return Value:
TRUE if the DLL was found and the flags adjusted, FALSE otherwise
--*/
{
HTTP_FILTER_DLL *pFilterDll = NULL;
W3_SERVER_INSTANCE *pW3Instance = (W3_SERVER_INSTANCE *) pInstance;
BOOL fFound = FALSE;
if ( !pInstance )
{
DBGPRINTF((DBG_CONTEXT,
"NULL instance passed to AdjustInstanceFilterFlags !\n"));
return FALSE;
}
pInstance->LockThisForRead();
FILTER_LIST *pFilterList = ((W3_SERVER_INSTANCE *) pInstance)->QueryFilterList();
pInstance->UnlockThis();
if ( !pFilterList )
{
DBGPRINTF((DBG_CONTEXT,
"Very odd - instance 0x%p has no filter list associated with it !\n",
pInstance));
return TRUE;
}
pInstance->LockThisForWrite();
//
// Try to find the appropriate DLL in the filter list for this instance
//
for ( DWORD i = 0; i < pFilterList->QueryFilterCount(); i++ )
{
DBG_ASSERT( pFilterList->QueryDll(i)->CheckSignature() );
if ( pFilterList->QueryDll(i)->QueryEntryPoint() == pfnSFProc )
{
pFilterDll = pFilterList->QueryDll(i);
//
// We've found the matching filter dll, adjust the flags in the
// filter dll object then adjust the flags in the filter list
//
pFilterDll->SetNotificationFlags( *((DWORD *) pdwNewFlags) );
pFilterList->SetNotificationFlags( i, pFilterDll );
fFound = TRUE;
break;
}
}
pInstance->UnlockThis();
return fFound;
}