2012-12-12 23:12:40 +00:00
|
|
|
// Berkeley Open Infrastructure for Network Computing
|
|
|
|
// http://boinc.berkeley.edu
|
|
|
|
// Copyright (C) 2005 University of California
|
|
|
|
//
|
|
|
|
// This is free software; you can redistribute it and/or
|
|
|
|
// modify it under the terms of the GNU Lesser General Public
|
|
|
|
// License as published by the Free Software Foundation;
|
|
|
|
// either version 2.1 of the License, or (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This software is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
|
|
|
// See the GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// To view the GNU Lesser General Public License visit
|
|
|
|
// http://www.gnu.org/copyleft/lesser.html
|
|
|
|
// or write to the Free Software Foundation, Inc.,
|
|
|
|
// 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
//
|
|
|
|
|
|
|
|
#include "stdafx.h"
|
|
|
|
#include "boinccas.h"
|
|
|
|
#include "CASetPermissionBOINC.h"
|
|
|
|
#include "dirops.h"
|
|
|
|
|
|
|
|
#define CUSTOMACTION_NAME _T("CASetPermissionBOINC")
|
|
|
|
#define CUSTOMACTION_PROGRESSTITLE _T("Setting permissions on the BOINC Executable directory.")
|
|
|
|
|
|
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
2023-05-05 18:05:20 +00:00
|
|
|
// Function:
|
|
|
|
//
|
|
|
|
// Description:
|
2012-12-12 23:12:40 +00:00
|
|
|
//
|
|
|
|
/////////////////////////////////////////////////////////////////////
|
|
|
|
CASetPermissionBOINC::CASetPermissionBOINC(MSIHANDLE hMSIHandle) :
|
|
|
|
BOINCCABase(hMSIHandle, CUSTOMACTION_NAME, CUSTOMACTION_PROGRESSTITLE)
|
|
|
|
{}
|
|
|
|
|
|
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
2023-05-05 18:05:20 +00:00
|
|
|
// Function:
|
|
|
|
//
|
|
|
|
// Description:
|
2012-12-12 23:12:40 +00:00
|
|
|
//
|
|
|
|
/////////////////////////////////////////////////////////////////////
|
|
|
|
CASetPermissionBOINC::~CASetPermissionBOINC()
|
|
|
|
{
|
|
|
|
BOINCCABase::~BOINCCABase();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
2023-05-05 18:05:20 +00:00
|
|
|
// Function:
|
|
|
|
//
|
|
|
|
// Description:
|
2012-12-12 23:12:40 +00:00
|
|
|
//
|
|
|
|
/////////////////////////////////////////////////////////////////////
|
|
|
|
UINT CASetPermissionBOINC::OnExecution()
|
|
|
|
{
|
|
|
|
DWORD dwRes = 0;
|
|
|
|
PACL pACL = NULL;
|
|
|
|
PACL pOldACL = NULL;
|
2014-02-26 00:34:41 +00:00
|
|
|
ULONGLONG rgSidBU[(SECURITY_MAX_SID_SIZE+sizeof(ULONGLONG)-1)/sizeof(ULONGLONG)]={0};
|
|
|
|
DWORD dwSidSize;
|
2012-12-12 23:12:40 +00:00
|
|
|
PSECURITY_DESCRIPTOR pSD = NULL;
|
|
|
|
EXPLICIT_ACCESS ea[3];
|
2014-02-26 00:34:41 +00:00
|
|
|
ULONG ulEntries = 0;
|
2012-12-12 23:12:40 +00:00
|
|
|
tstring strBOINCAdminsGroupAlias;
|
|
|
|
tstring strBOINCUsersGroupAlias;
|
|
|
|
tstring strBOINCInstallDirectory;
|
2014-02-26 00:34:41 +00:00
|
|
|
tstring strEnableProtectedApplicationExecution;
|
2012-12-12 23:12:40 +00:00
|
|
|
tstring strEnableUseByAllUsers;
|
2018-08-02 19:18:15 +00:00
|
|
|
UINT uiReturnValue;
|
2012-12-12 23:12:40 +00:00
|
|
|
|
|
|
|
uiReturnValue = GetProperty( _T("BOINC_ADMINS_GROUPNAME"), strBOINCAdminsGroupAlias );
|
|
|
|
if ( uiReturnValue ) return uiReturnValue;
|
|
|
|
|
|
|
|
uiReturnValue = GetProperty( _T("BOINC_USERS_GROUPNAME"), strBOINCUsersGroupAlias );
|
|
|
|
if ( uiReturnValue ) return uiReturnValue;
|
|
|
|
|
|
|
|
uiReturnValue = GetProperty( _T("INSTALLDIR"), strBOINCInstallDirectory );
|
|
|
|
if ( uiReturnValue ) return uiReturnValue;
|
|
|
|
|
2014-02-26 00:34:41 +00:00
|
|
|
uiReturnValue = GetProperty( _T("ENABLEPROTECTEDAPPLICATIONEXECUTION3"), strEnableProtectedApplicationExecution );
|
|
|
|
if ( uiReturnValue ) return uiReturnValue;
|
|
|
|
|
2012-12-12 23:12:40 +00:00
|
|
|
uiReturnValue = GetProperty( _T("ENABLEUSEBYALLUSERS"), strEnableUseByAllUsers );
|
|
|
|
if ( uiReturnValue ) return uiReturnValue;
|
|
|
|
|
2021-10-01 07:35:09 +00:00
|
|
|
// We should only tweak the permissions on the executable directory if we are installing
|
2014-02-26 00:34:41 +00:00
|
|
|
// as a service.
|
|
|
|
if (_T("1") != strEnableProtectedApplicationExecution) {
|
|
|
|
return ERROR_SUCCESS;
|
|
|
|
}
|
2012-12-12 23:12:40 +00:00
|
|
|
|
|
|
|
// Initialize an EXPLICIT_ACCESS structure for all ACEs.
|
|
|
|
ZeroMemory(&ea, 3 * sizeof(EXPLICIT_ACCESS));
|
|
|
|
|
2014-02-26 00:34:41 +00:00
|
|
|
|
|
|
|
// Create a SID for the Users group.
|
|
|
|
dwSidSize = sizeof( rgSidBU );
|
|
|
|
if(!CreateWellKnownSid(WinBuiltinUsersSid, NULL, rgSidBU, &dwSidSize))
|
|
|
|
{
|
|
|
|
LogMessage(
|
|
|
|
INSTALLMESSAGE_ERROR,
|
2023-05-05 18:05:20 +00:00
|
|
|
NULL,
|
2014-02-26 00:34:41 +00:00
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
GetLastError(),
|
|
|
|
_T("CreateWellKnownSid Error for BUILTIN\\Users")
|
|
|
|
);
|
|
|
|
return ERROR_INSTALL_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
ulEntries = 2;
|
|
|
|
|
2012-12-12 23:12:40 +00:00
|
|
|
// boinc_admins
|
|
|
|
ea[0].grfAccessPermissions = GENERIC_ALL;
|
|
|
|
ea[0].grfAccessMode = SET_ACCESS;
|
|
|
|
ea[0].grfInheritance= SUB_CONTAINERS_AND_OBJECTS_INHERIT;
|
|
|
|
ea[0].Trustee.TrusteeForm = TRUSTEE_IS_NAME;
|
|
|
|
ea[0].Trustee.TrusteeType = TRUSTEE_IS_GROUP;
|
|
|
|
ea[0].Trustee.ptstrName = (LPTSTR)strBOINCAdminsGroupAlias.c_str();
|
|
|
|
|
|
|
|
// boinc_users
|
|
|
|
ea[1].grfAccessPermissions = GENERIC_READ|GENERIC_EXECUTE;
|
|
|
|
ea[1].grfAccessMode = SET_ACCESS;
|
|
|
|
ea[1].grfInheritance= SUB_CONTAINERS_AND_OBJECTS_INHERIT;
|
|
|
|
ea[1].Trustee.TrusteeForm = TRUSTEE_IS_NAME;
|
|
|
|
ea[1].Trustee.TrusteeType = TRUSTEE_IS_GROUP;
|
|
|
|
ea[1].Trustee.ptstrName = (LPTSTR)strBOINCUsersGroupAlias.c_str();
|
|
|
|
|
2014-02-26 00:34:41 +00:00
|
|
|
// Users
|
2012-12-12 23:12:40 +00:00
|
|
|
if (_T("1") == strEnableUseByAllUsers) {
|
|
|
|
ulEntries = 3;
|
|
|
|
|
|
|
|
ea[2].grfAccessPermissions = GENERIC_READ|GENERIC_EXECUTE;
|
|
|
|
ea[2].grfAccessMode = SET_ACCESS;
|
|
|
|
ea[2].grfInheritance= SUB_CONTAINERS_AND_OBJECTS_INHERIT;
|
|
|
|
ea[2].Trustee.TrusteeForm = TRUSTEE_IS_SID;
|
|
|
|
ea[2].Trustee.TrusteeType = TRUSTEE_IS_WELL_KNOWN_GROUP;
|
2014-02-26 00:34:41 +00:00
|
|
|
ea[2].Trustee.ptstrName = (LPTSTR)rgSidBU;
|
2012-12-12 23:12:40 +00:00
|
|
|
}
|
|
|
|
|
2014-02-26 00:34:41 +00:00
|
|
|
|
2012-12-12 23:12:40 +00:00
|
|
|
// Get the old ACL for the directory
|
|
|
|
dwRes = GetNamedSecurityInfo(
|
|
|
|
(LPWSTR)strBOINCInstallDirectory.c_str(),
|
|
|
|
SE_FILE_OBJECT,
|
|
|
|
DACL_SECURITY_INFORMATION,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
&pOldACL,
|
|
|
|
NULL,
|
|
|
|
&pSD
|
|
|
|
);
|
2023-05-05 18:05:20 +00:00
|
|
|
if (ERROR_SUCCESS != dwRes)
|
2012-12-12 23:12:40 +00:00
|
|
|
{
|
|
|
|
LogMessage(
|
|
|
|
INSTALLMESSAGE_INFO,
|
2023-05-05 18:05:20 +00:00
|
|
|
NULL,
|
2012-12-12 23:12:40 +00:00
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
GetLastError(),
|
|
|
|
_T("GetNamedSecurityInfo Error")
|
|
|
|
);
|
|
|
|
LogMessage(
|
|
|
|
INSTALLMESSAGE_ERROR,
|
2023-05-05 18:05:20 +00:00
|
|
|
NULL,
|
2012-12-12 23:12:40 +00:00
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
GetLastError(),
|
|
|
|
_T("GetNamedSecurityInfo Error")
|
|
|
|
);
|
|
|
|
return ERROR_INSTALL_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a new ACL that contains the new ACEs and merges the old.
|
|
|
|
dwRes = SetEntriesInAcl(ulEntries, &ea[0], pOldACL, &pACL);
|
2023-05-05 18:05:20 +00:00
|
|
|
if (ERROR_SUCCESS != dwRes)
|
2012-12-12 23:12:40 +00:00
|
|
|
{
|
|
|
|
LogMessage(
|
|
|
|
INSTALLMESSAGE_INFO,
|
2023-05-05 18:05:20 +00:00
|
|
|
NULL,
|
2012-12-12 23:12:40 +00:00
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
GetLastError(),
|
|
|
|
_T("SetEntriesInAcl Error")
|
|
|
|
);
|
|
|
|
LogMessage(
|
|
|
|
INSTALLMESSAGE_ERROR,
|
2023-05-05 18:05:20 +00:00
|
|
|
NULL,
|
2012-12-12 23:12:40 +00:00
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
GetLastError(),
|
|
|
|
_T("SetEntriesInAcl Error")
|
|
|
|
);
|
|
|
|
return ERROR_INSTALL_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the ACL on the Data Directory itself.
|
2023-05-05 18:05:20 +00:00
|
|
|
dwRes = SetNamedSecurityInfo(
|
2012-12-12 23:12:40 +00:00
|
|
|
(LPWSTR)strBOINCInstallDirectory.c_str(),
|
|
|
|
SE_FILE_OBJECT,
|
|
|
|
DACL_SECURITY_INFORMATION,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
pACL,
|
|
|
|
NULL
|
|
|
|
);
|
2023-05-05 18:05:20 +00:00
|
|
|
if (ERROR_SUCCESS != dwRes)
|
2012-12-12 23:12:40 +00:00
|
|
|
{
|
|
|
|
LogMessage(
|
|
|
|
INSTALLMESSAGE_INFO,
|
2023-05-05 18:05:20 +00:00
|
|
|
NULL,
|
2012-12-12 23:12:40 +00:00
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
GetLastError(),
|
|
|
|
_T("SetNamedSecurityInfo Error")
|
|
|
|
);
|
|
|
|
LogMessage(
|
|
|
|
INSTALLMESSAGE_ERROR,
|
2023-05-05 18:05:20 +00:00
|
|
|
NULL,
|
2012-12-12 23:12:40 +00:00
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
GetLastError(),
|
|
|
|
_T("SetNamedSecurityInfo Error")
|
|
|
|
);
|
|
|
|
return ERROR_INSTALL_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set ACLs on all files and sub folders.
|
|
|
|
RecursiveSetPermissions(strBOINCInstallDirectory, pACL);
|
|
|
|
|
|
|
|
|
2023-05-05 18:05:20 +00:00
|
|
|
if (pACL)
|
2012-12-12 23:12:40 +00:00
|
|
|
LocalFree(pACL);
|
|
|
|
if (pSD)
|
|
|
|
LocalFree(pSD);
|
|
|
|
|
|
|
|
return ERROR_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////
|
2023-05-05 18:05:20 +00:00
|
|
|
//
|
2012-12-12 23:12:40 +00:00
|
|
|
// Function: SetPermissionBOINC
|
|
|
|
//
|
2023-05-05 18:05:20 +00:00
|
|
|
// Description:
|
2012-12-12 23:12:40 +00:00
|
|
|
//
|
|
|
|
/////////////////////////////////////////////////////////////////////
|
|
|
|
UINT __stdcall SetPermissionBOINC(MSIHANDLE hInstall)
|
|
|
|
{
|
|
|
|
UINT uiReturnValue = 0;
|
|
|
|
|
|
|
|
CASetPermissionBOINC* pCA = new CASetPermissionBOINC(hInstall);
|
|
|
|
uiReturnValue = pCA->Execute();
|
|
|
|
delete pCA;
|
|
|
|
|
|
|
|
return uiReturnValue;
|
|
|
|
}
|
|
|
|
|