- fprintf(stderr, "NSSM: The non-sucking service manager\n");\r
- fprintf(stderr, "Version %s, %s\n", NSSM_VERSION, NSSM_DATE);\r
- fprintf(stderr, "Usage: nssm option [args]\n");\r
- fprintf(stderr, "To install a service: nssm install [servicename]\n");\r
- fprintf(stderr, "To remove a service: nssm remove [servicename]\n");\r
- exit(ret);\r
-}\r
-\r
-int main(int argc, char **argv) {\r
- /* Require an argument since users may try to run nssm directly */\r
- if (argc == 1) exit(usage(1));\r
-\r
- /* Valid commands are install or remove */\r
- if (str_equiv(argv[1], "install")) exit(install_service(argv[2]));\r
- if (str_equiv(argv[1], "remove")) exit(remove_service(argv[2]));\r
- /* Undocumented: "run" is used to actually do service stuff */\r
- if (! str_equiv(argv[1], NSSM_RUN)) exit(usage(2));\r
-\r
- /* Start service magic */\r
- SERVICE_TABLE_ENTRY table[] = { { NSSM, service_main }, { 0, 0 } };\r
- if (! StartServiceCtrlDispatcher(table)) {\r
- char *message = error_string(GetLastError());\r
- eventprintf(EVENTLOG_ERROR_TYPE, "StartServiceCtrlDispatcher() failed: %s", message);\r
- if (message) LocalFree(message);\r
- return 100;\r
+ if (GetConsoleWindow()) print_message(stderr, NSSM_MESSAGE_USAGE, NSSM_VERSION, NSSM_CONFIGURATION, NSSM_DATE);\r
+ else popup_message(0, MB_OK, NSSM_MESSAGE_USAGE, NSSM_VERSION, NSSM_CONFIGURATION, NSSM_DATE);\r
+ return(ret);\r
+}\r
+\r
+void check_admin() {\r
+ is_admin = false;\r
+\r
+ /* Lifted from MSDN examples */\r
+ PSID AdministratorsGroup;\r
+ SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY;\r
+ if (! AllocateAndInitializeSid(&NtAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &AdministratorsGroup)) return;\r
+ CheckTokenMembership(0, AdministratorsGroup, /*XXX*/(PBOOL) &is_admin);\r
+ FreeSid(AdministratorsGroup);\r
+}\r
+\r
+static int elevate(int argc, TCHAR **argv, unsigned long message) {\r
+ print_message(stderr, message);\r
+\r
+ SHELLEXECUTEINFO sei;\r
+ ZeroMemory(&sei, sizeof(sei));\r
+ sei.cbSize = sizeof(sei);\r
+ sei.lpVerb = _T("runas");\r
+ sei.lpFile = (TCHAR *) nssm_imagepath();\r
+\r
+ TCHAR *args = (TCHAR *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, EXE_LENGTH * sizeof(TCHAR));\r
+ if (! args) {\r
+ print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("GetCommandLine()"), _T("elevate()"));\r
+ return 111;\r
+ }\r
+\r
+ /* Get command line, which includes the path to NSSM, and skip that part. */\r
+ _sntprintf_s(args, EXE_LENGTH, _TRUNCATE, _T("%s"), GetCommandLine());\r
+ size_t s = _tcslen(argv[0]) + 1;\r
+ if (args[0] == _T('"')) s += 2;\r
+ while (isspace(args[s])) s++;\r
+\r
+ sei.lpParameters = args + s;\r
+ sei.nShow = SW_SHOW;\r
+\r
+ unsigned long exitcode = 0;\r
+ if (! ShellExecuteEx(&sei)) exitcode = 100;\r
+\r
+ HeapFree(GetProcessHeap(), 0, (void *) args);\r
+ return exitcode;\r
+}\r
+\r
+int num_cpus() {\r
+ DWORD_PTR i, affinity, system_affinity;\r
+ if (! GetProcessAffinityMask(GetCurrentProcess(), &affinity, &system_affinity)) return 64;\r
+ for (i = 0; system_affinity & (1LL << i); i++);\r
+ return (int) i;\r
+}\r
+\r
+const TCHAR *nssm_unquoted_imagepath() {\r
+ return unquoted_imagepath;\r
+}\r
+\r
+const TCHAR *nssm_imagepath() {\r
+ return imagepath;\r
+}\r
+\r
+const TCHAR *nssm_exe() {\r
+ return imageargv0;\r
+}\r
+\r
+int _tmain(int argc, TCHAR **argv) {\r
+ if (check_console()) setup_utf8();\r
+\r
+ /* Remember if we are admin */\r
+ check_admin();\r
+\r
+ /* Set up function pointers. */\r
+ if (get_imports()) nssm_exit(111);\r
+\r
+ /* Remember our path for later. */\r
+ _sntprintf_s(imageargv0, _countof(imageargv0), _TRUNCATE, _T("%s"), argv[0]);\r
+ PathQuoteSpaces(imageargv0);\r
+ GetModuleFileName(0, unquoted_imagepath, _countof(unquoted_imagepath));\r
+ GetModuleFileName(0, imagepath, _countof(imagepath));\r
+ PathQuoteSpaces(imagepath);\r
+\r
+ /* Elevate */\r
+ if (argc > 1) {\r
+ /*\r
+ Valid commands are:\r
+ start, stop, pause, continue, install, edit, get, set, reset, unset, remove\r
+ */\r
+ if (str_equiv(argv[1], _T("start"))) nssm_exit(control_service(NSSM_SERVICE_CONTROL_START, argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("stop"))) nssm_exit(control_service(SERVICE_CONTROL_STOP, argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("restart"))) {\r
+ int ret = control_service(SERVICE_CONTROL_STOP, argc - 2, argv + 2);\r
+ if (ret) nssm_exit(ret);\r
+ nssm_exit(control_service(NSSM_SERVICE_CONTROL_START, argc - 2, argv + 2));\r
+ }\r
+ if (str_equiv(argv[1], _T("pause"))) nssm_exit(control_service(SERVICE_CONTROL_PAUSE, argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("continue"))) nssm_exit(control_service(SERVICE_CONTROL_CONTINUE, argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("status"))) nssm_exit(control_service(SERVICE_CONTROL_INTERROGATE, argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("rotate"))) nssm_exit(control_service(NSSM_SERVICE_CONTROL_ROTATE, argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("install"))) {\r
+ if (! is_admin) nssm_exit(elevate(argc, argv, NSSM_MESSAGE_NOT_ADMINISTRATOR_CANNOT_INSTALL));\r
+ create_messages();\r
+ nssm_exit(pre_install_service(argc - 2, argv + 2));\r
+ }\r
+ if (str_equiv(argv[1], _T("edit")) || str_equiv(argv[1], _T("get")) || str_equiv(argv[1], _T("set")) || str_equiv(argv[1], _T("reset")) || str_equiv(argv[1], _T("unset")) || str_equiv(argv[1], _T("dump"))) {\r
+ int ret = pre_edit_service(argc - 1, argv + 1);\r
+ if (ret == 3 && ! is_admin && argc == 3) nssm_exit(elevate(argc, argv, NSSM_MESSAGE_NOT_ADMINISTRATOR_CANNOT_EDIT));\r
+ /* There might be a password here. */\r
+ for (int i = 0; i < argc; i++) SecureZeroMemory(argv[i], _tcslen(argv[i]) * sizeof(TCHAR));\r
+ nssm_exit(ret);\r
+ }\r
+ if (str_equiv(argv[1], _T("list"))) nssm_exit(list_nssm_services(argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("processes"))) nssm_exit(service_process_tree(argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("remove"))) {\r
+ if (! is_admin) nssm_exit(elevate(argc, argv, NSSM_MESSAGE_NOT_ADMINISTRATOR_CANNOT_REMOVE));\r
+ nssm_exit(pre_remove_service(argc - 2, argv + 2));\r
+ }\r
+ }\r
+\r
+ /* Thread local storage for error message buffer */\r
+ tls_index = TlsAlloc();\r
+\r
+ /* Register messages */\r
+ if (is_admin) create_messages();\r
+\r
+ /*\r
+ Optimisation for Windows 2000:\r
+ When we're run from the command line the StartServiceCtrlDispatcher() call\r
+ will time out after a few seconds on Windows 2000. On newer versions the\r
+ call returns instantly. Check for stdin first and only try to call the\r
+ function if there's no input stream found. Although it's possible that\r
+ we're running with input redirected it's much more likely that we're\r
+ actually running as a service.\r
+ This will save time when running with no arguments from a command prompt.\r
+ */\r
+ if (! GetStdHandle(STD_INPUT_HANDLE)) {\r
+ /* Start service magic */\r
+ SERVICE_TABLE_ENTRY table[] = { { NSSM, service_main }, { 0, 0 } };\r
+ if (! StartServiceCtrlDispatcher(table)) {\r
+ unsigned long error = GetLastError();\r
+ /* User probably ran nssm with no argument */\r
+ if (error == ERROR_FAILED_SERVICE_CONTROLLER_CONNECT) nssm_exit(usage(1));\r
+ log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_DISPATCHER_FAILED, error_string(error), 0);\r
+ nssm_exit(100);\r
+ }\r