| OLD | NEW |
| (Empty) |
| 1 // Copyright 2007-2009 Google Inc. | |
| 2 // | |
| 3 // Licensed under the Apache License, Version 2.0 (the "License"); | |
| 4 // you may not use this file except in compliance with the License. | |
| 5 // You may obtain a copy of the License at | |
| 6 // | |
| 7 // http://www.apache.org/licenses/LICENSE-2.0 | |
| 8 // | |
| 9 // Unless required by applicable law or agreed to in writing, software | |
| 10 // distributed under the License is distributed on an "AS IS" BASIS, | |
| 11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
| 12 // See the License for the specific language governing permissions and | |
| 13 // limitations under the License. | |
| 14 // ======================================================================== | |
| 15 | |
| 16 // This is a small shell that loads a DLL calls its well known entry point. | |
| 17 // The intention is to only depend on OS mechanisms and avoid the LIBC | |
| 18 // dependency completely. | |
| 19 // This indirection is done primarily to: | |
| 20 // Play nicely with software firewalls. Most firewalls watch the executable | |
| 21 // module making network requests and we do not want them to notify the user | |
| 22 // after we've updated the program. The DLL can change independently of the | |
| 23 // shell and we expect the shell to remain unchanged most of the time. | |
| 24 // | |
| 25 // Changes to this executable will not appear in offical builds until they are | |
| 26 // included in an offical build and the resulting file is checked in to the | |
| 27 // saved shell location. | |
| 28 | |
| 29 // Disable the RTC checks because this shell doesn't build with a CRT. | |
| 30 #pragma runtime_checks("", off) | |
| 31 | |
| 32 #ifndef WIN32_LEAN_AND_MEAN | |
| 33 #define WIN32_LEAN_AND_MEAN | |
| 34 #endif | |
| 35 | |
| 36 #include <windows.h> | |
| 37 #include <shlobj.h> | |
| 38 #include <shlwapi.h> | |
| 39 #include <tchar.h> | |
| 40 | |
| 41 #include <atlbase.h> | |
| 42 #include <atlpath.h> | |
| 43 #include <atlstr.h> | |
| 44 | |
| 45 #include "omaha/base/constants.h" | |
| 46 #include "omaha/base/error.h" | |
| 47 #include "omaha/base/signaturevalidator.h" | |
| 48 #include "omaha/common/const_goopdate.h" | |
| 49 | |
| 50 // TODO(omaha3): move to common. | |
| 51 #include "omaha/goopdate/main.h" | |
| 52 | |
| 53 namespace omaha { | |
| 54 | |
| 55 // Disable the stack checks to keep the code size down. | |
| 56 // The check_stack pragma did not really work. The stack checks had to be | |
| 57 // disabled in the mk_file. | |
| 58 #pragma check_stack() | |
| 59 | |
| 60 // Have to define this here since this is used in signaturevalidator.cc. | |
| 61 // This is defined in error.cc, but that pulls in debug.cc, which has a lot | |
| 62 // of additional dependencies we do not want. Not worth it for just this | |
| 63 // function. | |
| 64 HRESULT HRESULTFromLastError() { | |
| 65 DWORD error_code = ::GetLastError(); | |
| 66 return (error_code != NO_ERROR) ? HRESULT_FROM_WIN32(error_code) : E_FAIL; | |
| 67 } | |
| 68 | |
| 69 // Adapted from File::Exists in file.cc. | |
| 70 bool FileExists(const TCHAR* file_name) { | |
| 71 if (!file_name || !*file_name) { | |
| 72 return false; | |
| 73 } | |
| 74 | |
| 75 WIN32_FILE_ATTRIBUTE_DATA attrs = {0}; | |
| 76 return 0 != ::GetFileAttributesEx(file_name, ::GetFileExInfoStandard, &attrs); | |
| 77 } | |
| 78 | |
| 79 // Adapted from vistautil.cc. | |
| 80 bool IsVistaOrLater() { | |
| 81 static bool known = false; | |
| 82 static bool is_vista = false; | |
| 83 if (!known) { | |
| 84 OSVERSIONINFOEX osvi = {0}; | |
| 85 osvi.dwOSVersionInfoSize = sizeof(OSVERSIONINFOEX); | |
| 86 osvi.dwMajorVersion = 6; | |
| 87 DWORDLONG conditional = 0; | |
| 88 VER_SET_CONDITION(conditional, VER_MAJORVERSION, VER_GREATER_EQUAL); | |
| 89 is_vista = !!::VerifyVersionInfo(&osvi, VER_MAJORVERSION, conditional); | |
| 90 known = true; | |
| 91 } | |
| 92 return is_vista; | |
| 93 } | |
| 94 | |
| 95 // Checking the full path vs. just being somewhere in Program Files is important | |
| 96 // because other programs may have lowered the ACLs of some subdirectories. | |
| 97 bool IsRunningFromProgramFilesDirectory() { | |
| 98 // Get the HMODULE for the current process. | |
| 99 HMODULE module_handle = ::GetModuleHandle(NULL); | |
| 100 if (!module_handle) { | |
| 101 return false; | |
| 102 } | |
| 103 | |
| 104 // Get the full path to the module based on the HMODULE. | |
| 105 CString module_path; | |
| 106 DWORD result = ::GetModuleFileName(module_handle, | |
| 107 module_path.GetBufferSetLength(MAX_PATH), | |
| 108 MAX_PATH); | |
| 109 module_handle = NULL; | |
| 110 | |
| 111 if (result == 0) { | |
| 112 return false; | |
| 113 } | |
| 114 | |
| 115 // Get the directory of the current process without the filename. | |
| 116 CPath path_temp(module_path); | |
| 117 path_temp.RemoveFileSpec(); | |
| 118 module_path = static_cast<CString>(path_temp); | |
| 119 | |
| 120 // Get the directory to %ProgramFiles%. | |
| 121 TCHAR folder_path_buffer[MAX_PATH] = {0}; | |
| 122 HRESULT hr = ::SHGetFolderPath(NULL, | |
| 123 CSIDL_PROGRAM_FILES, | |
| 124 NULL, | |
| 125 SHGFP_TYPE_CURRENT, | |
| 126 folder_path_buffer); | |
| 127 if (FAILED(hr)) { | |
| 128 return false; | |
| 129 } | |
| 130 | |
| 131 // Append the google/update install path onto %ProgramFiles%. | |
| 132 CString folder_path = folder_path_buffer; | |
| 133 if (!::PathAppend(CStrBuf(folder_path, MAX_PATH), | |
| 134 OMAHA_REL_GOOPDATE_INSTALL_DIR)) { | |
| 135 return false; | |
| 136 } | |
| 137 | |
| 138 folder_path.MakeLower(); | |
| 139 module_path.MakeLower(); | |
| 140 | |
| 141 // Check if module_path starts with folder_path. | |
| 142 return (module_path.Find(folder_path) == 0); | |
| 143 } | |
| 144 | |
| 145 // In the following case, we need to validate the signature of goopdate.dll | |
| 146 // before loading it to maintain the chain of trust: | |
| 147 // * Not running from a secure location | |
| 148 // * Vista and later | |
| 149 // * Running elevated/with admin privileges | |
| 150 // * UAC is not disabled | |
| 151 // | |
| 152 // We explicitly do not perform the authenticode check when UAC is disabled | |
| 153 // because the other conditions are all satisfied by the per-user instance of | |
| 154 // Omaha installed for a member of the admin group. Without an explicit check, | |
| 155 // an authenticode check would be performed every time the the per-user instance | |
| 156 // runs in these configurations. | |
| 157 // Skipping the authenticode check when UAC is disabled is also okay because the | |
| 158 // user has opted to let all applications run with the same privilege, so there | |
| 159 // is no need elevation of privileges. | |
| 160 // TODO(omaha): Eliminate the supported cases where this shell runs elevated | |
| 161 // from an unsecure location and replace the authenticode check with an error. | |
| 162 HRESULT VerifySignatureIfNecessary(const TCHAR* file_path, | |
| 163 bool is_running_from_secure_location) { | |
| 164 if (is_running_from_secure_location || | |
| 165 !IsVistaOrLater() || | |
| 166 !::IsUserAnAdmin()) { | |
| 167 return S_OK; | |
| 168 } | |
| 169 | |
| 170 // Verify the Authenticode signature but use only the local cache for | |
| 171 // revocation checks. | |
| 172 HRESULT hr = VerifySignature(file_path, false); | |
| 173 #if TEST_CERTIFICATE | |
| 174 // The chain of trust will not validate on builds signed with the test | |
| 175 // certificate. | |
| 176 if (CERT_E_UNTRUSTEDROOT == hr) { | |
| 177 hr = S_OK; | |
| 178 } | |
| 179 #endif | |
| 180 if (FAILED(hr)) { | |
| 181 return hr; | |
| 182 } | |
| 183 | |
| 184 // Verify that there is a Google certificate and that it has not expired. | |
| 185 if (!VerifySigneeIsGoogle(file_path)) { | |
| 186 return GOOGLEUPDATE_E_VERIFY_SIGNEE_IS_GOOGLE_FAILED; | |
| 187 } | |
| 188 | |
| 189 return S_OK; | |
| 190 } | |
| 191 | |
| 192 HRESULT GetRegisteredVersion(bool is_machine, CString* version) { | |
| 193 HKEY key = NULL; | |
| 194 LONG res = ::RegOpenKeyEx(is_machine ? HKEY_LOCAL_MACHINE : HKEY_CURRENT_USER, | |
| 195 GOOPDATE_REG_RELATIVE_CLIENTS GOOPDATE_APP_ID, | |
| 196 0, | |
| 197 KEY_READ, | |
| 198 &key); | |
| 199 if (ERROR_SUCCESS != res) { | |
| 200 return HRESULT_FROM_WIN32(res); | |
| 201 } | |
| 202 | |
| 203 DWORD type = 0; | |
| 204 DWORD version_length = 50; | |
| 205 res = ::SHQueryValueEx(key, | |
| 206 omaha::kRegValueProductVersion, | |
| 207 NULL, | |
| 208 &type, | |
| 209 CStrBuf(*version, version_length), | |
| 210 &version_length); | |
| 211 if (ERROR_SUCCESS != res) { | |
| 212 return HRESULT_FROM_WIN32(res); | |
| 213 } | |
| 214 | |
| 215 if (REG_SZ != type) { | |
| 216 return E_UNEXPECTED; | |
| 217 } | |
| 218 | |
| 219 return S_OK; | |
| 220 } | |
| 221 | |
| 222 HRESULT GetDllPath(HINSTANCE instance, bool is_machine, CString* dll_path) { | |
| 223 TCHAR base_path[MAX_PATH] = {0}; | |
| 224 TCHAR path[MAX_PATH] = {0}; | |
| 225 | |
| 226 if (!::GetModuleFileName(instance, base_path, arraysize(base_path))) { | |
| 227 return HRESULTFromLastError(); | |
| 228 } | |
| 229 ::PathRemoveFileSpec(base_path); | |
| 230 | |
| 231 // Try the side-by-side DLL first. | |
| 232 _tcscpy_s(path, arraysize(path), base_path); | |
| 233 if (!::PathAppend(path, omaha::kOmahaDllName)) { | |
| 234 return HRESULTFromLastError(); | |
| 235 } | |
| 236 if (FileExists(path)) { | |
| 237 *dll_path = path; | |
| 238 return S_OK; | |
| 239 } | |
| 240 | |
| 241 // Try the version subdirectory. | |
| 242 _tcscpy_s(path, arraysize(path), base_path); | |
| 243 CString version; | |
| 244 HRESULT hr = GetRegisteredVersion(is_machine, &version); | |
| 245 if (FAILED(hr)) { | |
| 246 return hr; | |
| 247 } | |
| 248 if (!::PathAppend(path, version)) { | |
| 249 return HRESULTFromLastError(); | |
| 250 } | |
| 251 if (!::PathAppend(path, omaha::kOmahaDllName)) { | |
| 252 return HRESULTFromLastError(); | |
| 253 } | |
| 254 if (!FileExists(path)) { | |
| 255 return GOOGLEUPDATE_E_DLL_NOT_FOUND; | |
| 256 } | |
| 257 | |
| 258 *dll_path = path; | |
| 259 return S_OK; | |
| 260 } | |
| 261 | |
| 262 } // namespace omaha | |
| 263 | |
| 264 // Algorithm: | |
| 265 // * Looks for goopdate.dll in the current directory. | |
| 266 // * If it is not found, looks for goopdate.dll in a version subdirectory based | |
| 267 // on the version found in the registry. | |
| 268 // * Verifies the signature of the goopdate.dll file. | |
| 269 // * Loads the DLL and calls the entry point. | |
| 270 int WINAPI _tWinMain(HINSTANCE instance, | |
| 271 HINSTANCE, | |
| 272 LPTSTR, | |
| 273 int cmd_show) { | |
| 274 bool is_running_from_program_files = | |
| 275 omaha::IsRunningFromProgramFilesDirectory(); | |
| 276 | |
| 277 // We assume here that running from program files means we should check | |
| 278 // the machine install version and otherwise we should check the user | |
| 279 // version. This should be true in all end user cases except for initial | |
| 280 // installs from the temp directory, in which case the DLL should be in the | |
| 281 // same directory so this value does not get used. | |
| 282 // For developer use cases, the DLL should also be in the same directory. | |
| 283 bool is_machine = is_running_from_program_files; | |
| 284 | |
| 285 CString dll_path; | |
| 286 HRESULT hr = omaha::GetDllPath(instance, is_machine, &dll_path); | |
| 287 if (FAILED(hr)) { | |
| 288 return hr; | |
| 289 } | |
| 290 | |
| 291 hr = omaha::VerifySignatureIfNecessary(dll_path, | |
| 292 is_running_from_program_files); | |
| 293 if (FAILED(hr)) { | |
| 294 return hr; | |
| 295 } | |
| 296 | |
| 297 HMODULE module(::LoadLibraryEx(dll_path, NULL, 0)); | |
| 298 if (!module) { | |
| 299 return omaha::HRESULTFromLastError(); | |
| 300 } | |
| 301 | |
| 302 DllEntry dll_entry = reinterpret_cast<DllEntry>( | |
| 303 ::GetProcAddress(module, omaha::kGoopdateDllEntryAnsi)); | |
| 304 if (dll_entry) { | |
| 305 // We must send in GetCommandLine() and not cmd_line because the command | |
| 306 // line parsing code expects to have the program name as the first argument | |
| 307 // and cmd_line does not provide this. | |
| 308 hr = dll_entry(::GetCommandLine(), cmd_show); | |
| 309 } else { | |
| 310 hr = E_FAIL; | |
| 311 } | |
| 312 | |
| 313 ::FreeLibrary(module); | |
| 314 | |
| 315 return hr; | |
| 316 } | |
| OLD | NEW |