- /*\r
- If the process associated with the console window handle is the same as\r
- this process, we were not launched from an existing console. The user\r
- probably double-clicked our executable.\r
- */\r
- if (GetCurrentProcessId() != pid) return;\r
+ TCHAR *args = (TCHAR *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, EXE_LENGTH * sizeof(TCHAR));\r
+ if (! args) {\r
+ print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("GetCommandLine()"), _T("elevate()"));\r
+ return 111;\r
+ }\r
+\r
+ /* Get command line, which includes the path to NSSM, and skip that part. */\r
+ _sntprintf_s(args, EXE_LENGTH, _TRUNCATE, _T("%s"), GetCommandLine());\r
+ size_t s = _tcslen(argv[0]) + 1;\r
+ if (args[0] == _T('"')) s += 2;\r
+ while (isspace(args[s])) s++;\r
+\r
+ sei.lpParameters = args + s;\r
+ sei.nShow = SW_SHOW;\r
+\r
+ unsigned long exitcode = 0;\r
+ if (! ShellExecuteEx(&sei)) exitcode = 100;\r