How to prevent Vista from requiring elevation on patch.exe?

后端 未结 3 791
自闭症患者
自闭症患者 2020-12-01 21:19

[I\'m sorry that this isn\'t directly a programming question. But I have recently switched to a new Vista machine where I am keeping UAC enabled (please don\'t tell me to di

相关标签:
3条回答
  • 2020-12-01 21:37

    From:
    http://social.msdn.microsoft.com/Forums/en-US/windowsgeneraldevelopmentissues/thread/bf4f7dfa-5553-41d3-9c8e-311ee4a88599/

    If you can add a manifest to the affected executable declaring a requestedExecutionLevel of 'asInvoker' it should stop prompting.

    Associated guide on UAC architecture and converting existing applications so they work correctly (near the bottom fifth of the page):

    http://technet.microsoft.com/en-us/library/cc709628.aspx

    Lastly, how to write such a manifest:

    http://www.google.com/search?q=writing+a+uac+manifest

    -Adam

    0 讨论(0)
  • 2020-12-01 21:49

    The problem is that your application does not contain an assembly manifest with a requestedExectutionLevel.

    Background

    All correctly written Windows applications are required to have an assembly manifest. And starting in 2006 one of the elements you're required to have is a requestedExecutionLevel that specifies if your application can only function if the user is an administrator.

    If your application does not have an assembly manifest, or if it does not have a requestedExecutionLevel Windows will assume it is a legacy application, and do things to hopefully keep it running.

    One compatibility thing for legacy applications is that some of them might be an installer, or an udpater, and can only function when run as administrator. Windows tries to guess these applications by their filenames:

    • setup
    • update
    • patch

    Are all examples of filenames caught by compatibility heuristics that are trying to automatically elevate for the user.

    If the application has no assembly manifest, then it is not a validly written Windows application.

    The correct solution

    The correct solution is to add the assembly manifest that all correct applications will have. This disabled the heuristics.

    A sample UAC "asInvoker" manifest:

    <?xml version="1.0" encoding="utf-8"?>
    <assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
       <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
          <security>
             <requestedPrivileges>
                <requestedExecutionLevel level="asInvoker" />
             </requestedPrivileges>
          </security>
       </trustInfo>
    </assembly> 
    
    0 讨论(0)
  • 2020-12-01 21:51

    In my case I had to write a wrapper program that makes the following:

    1-Copy "patch.exe" file into the system's temp folder (%TMP%) with another name: "apply.exe"

    2-Execute "%TMP%\apply.exe" with the desired arguments.

    3-Delete "%TMP%\apply.exe" file

    You won't need to write a manifest.

    If you need to calculate the "patch.exe" full path, assuming the .exe is on the %PATH% environment variable, you can use the following code in C#:

    public string GetPatchInstallPath()
    {
        StringDictionary env = 
        System.Diagnostics.Process.GetCurrentProcess().StartInfo.EnvironmentVariables;
        string pathEnvVble = env["PATH"];
        string[] paths = new string[]{};
        paths = pathEnvVble.Split(new char[] { ';' });
    
        foreach (string p in paths)
        {
           string fullPath = Path.Combine(p, "patch.exe");
           if (File.Exists(fullPath))
               return fullPath;
        }
        return string.Empty;
    }
    

    Otherwise, you can pass the patch.exe full path to your wrapper program if you don't want to add a new entry to the %PATH% variable for your patch.exe location.

    0 讨论(0)
提交回复
热议问题