Commands for accessing COM servers
This module provides commands for supporting COM clients. TWAPI's COM support is limited to client side calls only and does not provide facilities for writing COM components. Like other scripting languages like VBScript and Javascript, TWAPI's COM support is focused on Automation objects through their IDispatch and IDispatchEx interfaces. This provides the ability to script Windows applications such as Microsoft Office and Internet Explorer as well as admistrative interfaces such as Active Directory and Windows Management Instrumentation.
This documentation assumes some familiarity with COM programming concepts such as COM interfaces, COM automation, PROGID and CLSID identifier types etc.
TWAPI's COM support is implemented in layers:
A COM automation proxy object is created through the command comobj using the PROGID or CLSID of the corresponding COM class. This returns a Tcl object command that may be used to access the object's methods and properties. The example below creates a proxy object using the PROGID for Internet Explorer.
set ie [comobj InternetExplorer.Application -enableaaa]
Alternatively, the comobj_object command can be used to bind to a COM object identified by its display name. For example, the following creates a COM object for an Excel file.
set xlso [comobj_object c:\\data\\myspreadsheet.xls]
When an object is no longer required, it must be explicitly destroyed by calling the command with the -destroy subcommand.
The properties and methods of a COM object can be accessed through the proxy object returned by the comobj command. The following sequence of commands shows a sample session that drives Internet Explorer through its properties and methods.
Start up Internet Explorer (note it will not be visible yet)
set ie [comobj InternetExplorer.Application -enableaaa]
Automation objects can be associated with a default property that is retrieved if no property or method are specified. This is the property marked as the default value in the COM object's IDL definition. In TWAPI this default property can be accessed using the -default method on the object.
$ie -default
Properties can be directly retrieved and modified. For example, the following commands makes its window visible by changing its Visible property.
$ie Visible true
In theory, the names of properties and methods of an automation object can overlap. Althouth TWAPI can usually figure out whether a property is being retrieved/set or a method is being called, you can explicitly control this by using the -get, -set or -call subcommands followed by the actual name. So the above call could also have been written as
$ie -set Visible true
to explicitly indicate we want to set the property called Visible as opposed to making a call to the COM object's method of the same name (if there was one).
To go to the TWAPI home page, invoke the Navigate method
$ie Navigate http://twapi.sf.net
Again, we could specify this is a method call, not a property, by explicitly indicating that as follows:
$ie -call Navigate http://twapi.sf.net
Explicitly specifying -call may also be required to disambiguate between methods that are implemented within the TWAPI comobj command object and the actual COM automation object itself. For example, the method destroy destroys the command object. If the underlying automatio object also had a destroy method, you would need to invoke it as
$ie -call destroy
To continue with the example, we can read the LocationURL property to find the URL after redirection
$ie LocationURL
Ask the application to exit by calling its Quit method.
$ie Quit
Finally, destroy the proxy object and release the underlying COM object,
$ie destroy
Some COM objects are collection of items which may even be other COM objects. The items within these collections can be accessed by their index (which is not necessarily an integer) using the Item method as shown below.
set fso [comobj Scripting.FileSystemObject] set drives [$fso Drives] set cdrive [$drives Item c:] puts "Drive C: is [lindex {{not ready} ready} [$cdrive IsReady]]" $cdrive -destroy $drives -destroy $fso -destroy
In the above example, the Drives method of the Scripting.FileSystemObject object (implemented as an automation object by the Windows Shell) returns a collection drives. The drive letter c: is used to index into the collection object drives. As an alternative to explicit indexing in this fashion, TWAPI provides the -iterate method for iterating over all items in the collection. This is similar to the VBScript For each statement. The following example illustrates this.
set fso [comobj Scripting.FileSystemObject] set drives [$fso Drives] $drives -iterate drive { set drive_letter [$drive DriveLetter] if {[$drive IsReady]} { puts "Drive $drive_letter free space: [$drive FreeSpace]" } else { puts "Drive $drive_letter is not ready." } $drive -destroy } $drives -destroy $fso -destroy
The -iterate operator on the collection then loops through each item in the collection, assigning the item to drive. In this case, each item is itself a COM automation object on which commands can be invoked. Note that the drive object generated in each iteration has to be explicitly destroyed.
In many cases, the resource represented by a COM object has to be accessed by navigating through multiple intermediary objects. For example, the following example sets all cells within a range in a spreadsheet to 12345.
set xl [comobj Excel.Application] $xl Visible true set workbooks [$xl Workbooks] set workbook [$workbooks Add] set sheets [$workbook Sheets] set sheet [$sheets Item 1] set cells [$sheet range a1 c3] $cells Value 12345 $cells -destroy $sheet -destroy $sheets -destroy $workbook -destroy $workbooks -destroy $xl Quit $xl -destroy
In the above example, in order to get to the range we have to navigate through a hierarchy of objects, starting with the application, the workbook collection, a workbook within the collection, the worksheets collection, a worksheet within that collection and finally the cell range. After setting the value, all the created objects have to be deleted.
As an alternative, TWAPI automation proxy objects provide the -with internal method to simplify this process:
set xl [comobj Excel.Application] $xl Visible true $xl -with { Workbooks Add Sheets {Item 1} {range a1 c3} } Value 12345 $xl -destroy
The -with method takes a list of intermediate methods and associated parameters each of which should return a new object. Each method in the method list is invoked on the object returned by the previous method and should itself return a new object. The final object created from this list is passed the remaining arguments in the command. All intermediate objects are automatically destroyed.
Some COM objects may generate notifications when certain events occur. A callback script may be registered using the -bind subcommand on a COMOBJ object. This script is invoked for every notification event generated by the COM object. The event name and parameters provided by the COM event source are appended to the script.
The following example receives events from Internet Explorer and prints them.
proc print_event args {puts "Received: [join $args ,]"} set ie [comobj InternetExplorer.Application -enableaaa] $ie Visible true set bind_id [$ie -bind print_event] $ie Navigate http://www.tcl.tk after 2000 $ie -unbind $bind_id $ie Quit $ie -destroy
Note that the script is unregistered using the -unbind subcommand when no longer needed.
In addition to the high level comobj based access to COM automation objects, TWAPI also provides object based wrappers for certain standard COM interfaces. These are provided for finer control of COM operation when the high level comobj does not provide enough flexibility. These wrapped include IUnknown, IDispatch, IDispatchEx, ITypeInfo, ITypeLib and ITypeComp. The corresponding wrapper classes are named with a Proxy suffix. For example, IUnknown is wrapped by the class IUnknownProxy.
Use of the classes requires a detailed understanding of COM programming techniques including lifetime management of objects through reference counting. Individual methods of these objects are not documented here. See the Windows SDK for details on these.
In addition to the standard methods defined by these interfaces, the proxy wrappers also implement additional helper methods that simplify working with the interfaces.
The following illustrates how these wrappers might be used:
set tlib [get_itypelib c:/windows/system32/stdole2.tlb] set count [$tlib GetTypeInfoCount] for {set i 0} {$i < $count} {incr i} { if {[$tlib GetTypeInfoType $i] == 4} { puts [lindex [$tlib GetDocumentation $i] 0] } } $tlib Release
The example starts off by getting a ITypeLibProxy object which wraps the ITypeLib interface for the stdole2.tlb type library. It then iterates through to print the names of dispatch interfaces in the type library using the ITypeLib methods GetTypeInfoCount, GetTypeInfoType and GetDocumentation as documented in the Windows SDK.
Note the object is released by calling Release and not its destroy method. This follows standard COM methodology. Calling the destroy method will delete the object while there might still be other references to it.
The same may be written with the @Foreach helper method as follows:
set tlib [get_itypelib c:/windows/system32/stdole2.tlb] $tlib @Foreach -type dispatch ti { puts [$ti @GetName] $ti Release } $tlib Release
The @Foreach method passes ITypeInfoProxy objects into the loop for every dispatch interface type entry in the library.
(tclsh) 53 % clsid_to_progid "{0002DF01-0000-0000-C000-000000000046}" InternetExplorer.Application.1
-disablelog BOOLEAN | If specified as true, disables logging of failures. Corresponds to the flag CLSCTX_NO_FAILURE_LOG in the SDK. |
-download BOOLEAN | If specified as true, allows downloading of code
from the Internet or Directory Service. This corresponds to setting
the flag
CLSCTX_ENABLE_CODE_DOWNLOAD. If
specified as false, disallows downloading of code from the Internet
or Directory Service. This corresponds to setting the flag
CLSCTX_DISABLE_CODE_DOWNLOAD. If this option is not specified, neither of the flags is set in the underlying call to CoCreateInstance. |
-enableaaa BOOLEAN | If specified as true, enables activate-as-activator
activations where a server process is launched under the caller's
identity. This corresponds to setting the flag
CLSCTX_ENABLE_AAA. If specified as
false, disables activate-as-activator activations. This corresponds
to setting the flag
CLSCTX_DISABLE_AAA. If this option is not specified, neither of the flags is set in the underlying call to CoCreateInstance. |
-interface IDISPATCHINTERFACE | By default, the command will bind to the object's IDispatch interface. If the object is known to support the IDispatchEx interface as well, this option may be used to specify that should be used instead. IDISPATCHINTERFACE must be IDispatch or IDispatchEx. |
-model MODELLIST | Specifies which of the COM hosting models are acceptable. MODELLIST must be a list containing one or more of the symbols localserver, remoteserver, inprocserver, inprochandler, or any signifying any model is acceptable. |
-nocustommarshal BOOLEAN | If true, the object creation will fail if it uses custom marshalling. Corresponds to the flag CLSCTX_NO_CUSTOM_MARSHAL. |
(wish) 51 % progid_to_clsid InternetExplorer.Application {0002DF01-0000-0000-C000-000000000046}
Copyright © 2006-2010 Ashok P. Nadkarni