+/* Open a service by name or display name. */\r
+SC_HANDLE open_service(SC_HANDLE services, TCHAR *service_name, TCHAR *canonical_name, unsigned long canonical_namelen) {\r
+ SC_HANDLE service_handle = OpenService(services, service_name, SERVICE_ALL_ACCESS);\r
+ if (service_handle) {\r
+ if (canonical_name && canonical_name != service_name) {\r
+ if (_sntprintf_s(canonical_name, canonical_namelen, _TRUNCATE, _T("%s"), service_name) < 0) {\r
+ print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("canonical_name"), _T("open_service()"));\r
+ return 0;\r
+ }\r
+ }\r
+ return service_handle;\r
+ }\r
+\r
+ unsigned long error = GetLastError();\r
+ if (error != ERROR_SERVICE_DOES_NOT_EXIST) {\r
+ print_message(stderr, NSSM_MESSAGE_OPENSERVICE_FAILED, error_string(GetLastError()));\r
+ return 0;\r
+ }\r
+\r
+ /* We can't look for a display name because there's no buffer to store it. */\r
+ if (! canonical_name) {\r
+ print_message(stderr, NSSM_MESSAGE_OPENSERVICE_FAILED, error_string(GetLastError()));\r
+ return 0;\r
+ }\r
+\r
+ unsigned long bufsize, required, count, i;\r
+ unsigned long resume = 0;\r
+ EnumServicesStatus(services, SERVICE_DRIVER | SERVICE_FILE_SYSTEM_DRIVER | SERVICE_KERNEL_DRIVER | SERVICE_WIN32, SERVICE_STATE_ALL, 0, 0, &required, &count, &resume);\r
+ error = GetLastError();\r
+ if (error != ERROR_MORE_DATA) {\r
+ print_message(stderr, NSSM_MESSAGE_ENUMSERVICESSTATUS_FAILED, error_string(GetLastError()));\r
+ return 0;\r
+ }\r
+\r
+ ENUM_SERVICE_STATUS *status = (ENUM_SERVICE_STATUS *) HeapAlloc(GetProcessHeap(), 0, required);\r
+ if (! status) {\r
+ print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("ENUM_SERVICE_STATUS"), _T("open_service()"));\r
+ return 0;\r
+ }\r
+\r
+ bufsize = required;\r
+ while (true) {\r
+ /*\r
+ EnumServicesStatus() returns:\r
+ 1 when it retrieved data and there's no more data to come.\r
+ 0 and sets last error to ERROR_MORE_DATA when it retrieved data and\r
+ there's more data to come.\r
+ 0 and sets last error to something else on error.\r
+ */\r
+ int ret = EnumServicesStatus(services, SERVICE_DRIVER | SERVICE_FILE_SYSTEM_DRIVER | SERVICE_KERNEL_DRIVER | SERVICE_WIN32, SERVICE_STATE_ALL, status, bufsize, &required, &count, &resume);\r
+ if (! ret) {\r
+ error = GetLastError();\r
+ if (error != ERROR_MORE_DATA) {\r
+ HeapFree(GetProcessHeap(), 0, status);\r
+ print_message(stderr, NSSM_MESSAGE_ENUMSERVICESSTATUS_FAILED, error_string(GetLastError()));\r
+ return 0;\r
+ }\r
+ }\r
+\r
+ for (i = 0; i < count; i++) {\r
+ if (str_equiv(status[i].lpDisplayName, service_name)) {\r
+ if (_sntprintf_s(canonical_name, canonical_namelen, _TRUNCATE, _T("%s"), status[i].lpServiceName) < 0) {\r
+ HeapFree(GetProcessHeap(), 0, status);\r
+ print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("canonical_name"), _T("open_service()"));\r
+ return 0;\r
+ }\r
+\r
+ HeapFree(GetProcessHeap(), 0, status);\r
+ return open_service(services, canonical_name, 0, 0);\r
+ }\r
+ }\r
+\r
+ if (ret) break;\r
+ }\r
+\r
+ /* Recurse so we can get an error message. */\r
+ return open_service(services, service_name, 0, 0);\r
+}\r
+\r
+QUERY_SERVICE_CONFIG *query_service_config(const TCHAR *service_name, SC_HANDLE service_handle) {\r
+ QUERY_SERVICE_CONFIG *qsc;\r
+ unsigned long bufsize;\r
+ unsigned long error;\r
+\r
+ QueryServiceConfig(service_handle, 0, 0, &bufsize);\r
+ error = GetLastError();\r
+ if (error == ERROR_INSUFFICIENT_BUFFER) {\r
+ qsc = (QUERY_SERVICE_CONFIG *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, bufsize);\r
+ if (! qsc) {\r
+ print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("QUERY_SERVICE_CONFIG"), _T("query_service_config()"), 0);\r
+ return 0;\r
+ }\r
+ }\r
+ else {\r
+ print_message(stderr, NSSM_MESSAGE_QUERYSERVICECONFIG_FAILED, service_name, error_string(error), 0);\r
+ return 0;\r
+ }\r
+\r
+ if (! QueryServiceConfig(service_handle, qsc, bufsize, &bufsize)) {\r
+ HeapFree(GetProcessHeap(), 0, qsc);\r
+ print_message(stderr, NSSM_MESSAGE_QUERYSERVICECONFIG_FAILED, service_name, error_string(GetLastError()), 0);\r
+ return 0;\r
+ }\r
+\r
+ return qsc;\r
+}\r
+\r
+int set_service_description(const TCHAR *service_name, SC_HANDLE service_handle, TCHAR *buffer) {\r
+ SERVICE_DESCRIPTION description;\r
+ ZeroMemory(&description, sizeof(description));\r
+ /*\r
+ lpDescription must be NULL if we aren't changing, the new description\r
+ or "".\r
+ */\r
+ if (buffer && buffer[0]) description.lpDescription = buffer;\r
+ else description.lpDescription = _T("");\r
+\r
+ if (ChangeServiceConfig2(service_handle, SERVICE_CONFIG_DESCRIPTION, &description)) return 0;\r
+\r
+ log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SERVICE_CONFIG_DESCRIPTION_FAILED, service_name, error_string(GetLastError()), 0);\r
+ return 1;\r
+}\r
+\r
+int get_service_description(const TCHAR *service_name, SC_HANDLE service_handle, unsigned long len, TCHAR *buffer) {\r
+ if (! buffer) return 1;\r
+\r
+ unsigned long bufsize;\r
+ QueryServiceConfig2(service_handle, SERVICE_CONFIG_DESCRIPTION, 0, 0, &bufsize);\r
+ unsigned long error = GetLastError();\r
+ if (error == ERROR_INSUFFICIENT_BUFFER) {\r
+ SERVICE_DESCRIPTION *description = (SERVICE_DESCRIPTION *) HeapAlloc(GetProcessHeap(), 0, bufsize);\r
+ if (! description) {\r
+ print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("SERVICE_CONFIG_DESCRIPTION"), _T("get_service_description()"));\r
+ return 2;\r
+ }\r
+\r
+ if (QueryServiceConfig2(service_handle, SERVICE_CONFIG_DESCRIPTION, (unsigned char *) description, bufsize, &bufsize)) {\r
+ if (description->lpDescription) _sntprintf_s(buffer, len, _TRUNCATE, _T("%s"), description->lpDescription);\r
+ else ZeroMemory(buffer, len * sizeof(TCHAR));\r
+ HeapFree(GetProcessHeap(), 0, description);\r
+ return 0;\r
+ }\r
+ else {\r
+ HeapFree(GetProcessHeap(), 0, description);\r
+ print_message(stderr, NSSM_MESSAGE_QUERYSERVICECONFIG2_FAILED, service_name, _T("SERVICE_CONFIG_DESCRIPTION"), error_string(error));\r
+ return 3;\r
+ }\r
+ }\r
+ else {\r
+ print_message(stderr, NSSM_MESSAGE_QUERYSERVICECONFIG2_FAILED, service_name, _T("SERVICE_CONFIG_DESCRIPTION"), error_string(error));\r
+ return 4;\r
+ }\r
+\r
+ return 0;\r
+}\r
+\r
+int get_service_startup(const TCHAR *service_name, SC_HANDLE service_handle, const QUERY_SERVICE_CONFIG *qsc, unsigned long *startup) {\r
+ if (! qsc) return 1;\r
+\r
+ switch (qsc->dwStartType) {\r
+ case SERVICE_DEMAND_START: *startup = NSSM_STARTUP_MANUAL; break;\r
+ case SERVICE_DISABLED: *startup = NSSM_STARTUP_DISABLED; break;\r
+ default: *startup = NSSM_STARTUP_AUTOMATIC;\r
+ }\r
+\r
+ if (*startup != NSSM_STARTUP_AUTOMATIC) return 0;\r
+\r
+ /* Check for delayed start. */\r
+ unsigned long bufsize;\r
+ unsigned long error;\r
+ QueryServiceConfig2(service_handle, SERVICE_CONFIG_DELAYED_AUTO_START_INFO, 0, 0, &bufsize);\r
+ error = GetLastError();\r
+ if (error == ERROR_INSUFFICIENT_BUFFER) {\r
+ SERVICE_DELAYED_AUTO_START_INFO *info = (SERVICE_DELAYED_AUTO_START_INFO *) HeapAlloc(GetProcessHeap(), 0, bufsize);\r
+ if (! info) {\r
+ print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("SERVICE_DELAYED_AUTO_START_INFO"), _T("get_service_startup()"));\r
+ return 2;\r
+ }\r
+\r
+ if (QueryServiceConfig2(service_handle, SERVICE_CONFIG_DELAYED_AUTO_START_INFO, (unsigned char *) info, bufsize, &bufsize)) {\r
+ if (info->fDelayedAutostart) *startup = NSSM_STARTUP_DELAYED;\r
+ HeapFree(GetProcessHeap(), 0, info);\r
+ return 0;\r
+ }\r
+ else {\r
+ error = GetLastError();\r
+ if (error != ERROR_INVALID_LEVEL) {\r
+ print_message(stderr, NSSM_MESSAGE_QUERYSERVICECONFIG2_FAILED, service_name, _T("SERVICE_CONFIG_DELAYED_AUTO_START_INFO"), error_string(error));\r
+ return 3;\r
+ }\r
+ }\r
+ }\r
+ else if (error != ERROR_INVALID_LEVEL) {\r
+ print_message(stderr, NSSM_MESSAGE_QUERYSERVICECONFIG2_FAILED, service_name, _T("SERVICE_DELAYED_AUTO_START_INFO"), error_string(error));\r
+ return 3;\r
+ }\r
+\r
+ return 0;\r
+}\r
+\r
+int get_service_username(const TCHAR *service_name, const QUERY_SERVICE_CONFIG *qsc, TCHAR **username, size_t *usernamelen) {\r
+ if (! username) return 1;\r
+ if (! usernamelen) return 1;\r
+\r
+ *username = 0;\r
+ *usernamelen = 0;\r
+\r
+ if (! qsc) return 1;\r
+\r
+ if (str_equiv(qsc->lpServiceStartName, NSSM_LOCALSYSTEM_ACCOUNT)) return 0;\r
+\r
+ size_t len = _tcslen(qsc->lpServiceStartName);\r
+ *username = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, (len + 1) * sizeof(TCHAR));\r
+ if (! *username) {\r
+ print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("username"), _T("get_service_username()"));\r
+ return 2;\r
+ }\r
+\r
+ memmove(*username, qsc->lpServiceStartName, (len + 1) * sizeof(TCHAR));\r
+ *usernamelen = len;\r
+\r
+ return 0;\r
+}\r
+\r
+int grant_logon_as_service(const TCHAR *username) {\r
+ if (! username) return 0;\r
+ if (str_equiv(username, NSSM_LOCALSYSTEM_ACCOUNT)) return 0;\r
+\r
+ /* Open Policy object. */\r
+ LSA_OBJECT_ATTRIBUTES attributes;\r
+ ZeroMemory(&attributes, sizeof(attributes));\r
+\r
+ LSA_HANDLE policy;\r
+\r
+ NTSTATUS status = LsaOpenPolicy(0, &attributes, POLICY_ALL_ACCESS, &policy);\r
+ if (status) {\r
+ print_message(stderr, NSSM_MESSAGE_LSAOPENPOLICY_FAILED, error_string(LsaNtStatusToWinError(status)));\r
+ return 1;\r
+ }\r
+\r
+ /* Look up SID for the account. */\r
+ LSA_UNICODE_STRING lsa_username;\r
+#ifdef UNICODE\r
+ lsa_username.Buffer = (wchar_t *) username;\r
+ lsa_username.Length = (unsigned short) _tcslen(username) * sizeof(TCHAR);\r
+ lsa_username.MaximumLength = lsa_username.Length + sizeof(TCHAR);\r
+#else\r
+ size_t buflen;\r
+ mbstowcs_s(&buflen, NULL, 0, username, _TRUNCATE);\r
+ lsa_username.MaximumLength = (unsigned short) buflen * sizeof(wchar_t);\r
+ lsa_username.Length = lsa_username.MaximumLength - sizeof(wchar_t);\r
+ lsa_username.Buffer = (wchar_t *) HeapAlloc(GetProcessHeap(), 0, lsa_username.MaximumLength);\r
+ if (lsa_username.Buffer) mbstowcs_s(&buflen, lsa_username.Buffer, lsa_username.MaximumLength, username, _TRUNCATE);\r
+ else {\r
+ LsaClose(policy);\r
+ print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("LSA_UNICODE_STRING"), _T("grant_logon_as_service()"));\r
+ return 2;\r
+ }\r
+#endif\r
+\r
+ LSA_REFERENCED_DOMAIN_LIST *translated_domains;\r
+ LSA_TRANSLATED_SID *translated_sid;\r
+ status = LsaLookupNames(policy, 1, &lsa_username, &translated_domains, &translated_sid);\r
+#ifndef UNICODE\r
+ HeapFree(GetProcessHeap(), 0, lsa_username.Buffer);\r
+#endif\r
+ if (status) {\r
+ LsaFreeMemory(translated_domains);\r
+ LsaFreeMemory(translated_sid);\r
+ LsaClose(policy);\r
+ print_message(stderr, NSSM_MESSAGE_LSALOOKUPNAMES_FAILED, username, error_string(LsaNtStatusToWinError(status)));\r
+ return 3;\r
+ }\r
+\r
+ if (translated_sid->Use != SidTypeUser) {\r
+ LsaFreeMemory(translated_domains);\r
+ LsaFreeMemory(translated_sid);\r
+ LsaClose(policy);\r
+ print_message(stderr, NSSM_GUI_INVALID_USERNAME, username);\r
+ return 4;\r
+ }\r
+\r
+ LSA_TRUST_INFORMATION *trust = &translated_domains->Domains[translated_sid->DomainIndex];\r
+ if (! trust || ! IsValidSid(trust->Sid)) {\r
+ LsaFreeMemory(translated_domains);\r
+ LsaFreeMemory(translated_sid);\r
+ LsaClose(policy);\r
+ print_message(stderr, NSSM_GUI_INVALID_USERNAME, username);\r
+ return 4;\r
+ }\r
+\r
+ /* GetSidSubAuthority*() return pointers! */\r
+ unsigned char *n = GetSidSubAuthorityCount(trust->Sid);\r
+\r
+ /* Convert translated SID to SID. */\r
+ SID *sid = (SID *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, GetSidLengthRequired(*n + 1));\r
+ if (! sid) {\r
+ LsaFreeMemory(translated_domains);\r
+ LsaFreeMemory(translated_sid);\r
+ LsaClose(policy);\r
+ print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("SID"), _T("grant_logon_as_service"));\r
+ return 4;\r
+ }\r
+\r
+ unsigned long error;\r
+ if (! InitializeSid(sid, GetSidIdentifierAuthority(trust->Sid), *n + 1)) {\r
+ error = GetLastError();\r
+ HeapFree(GetProcessHeap(), 0, sid);\r
+ LsaFreeMemory(translated_domains);\r
+ LsaFreeMemory(translated_sid);\r
+ LsaClose(policy);\r
+ print_message(stderr, NSSM_MESSAGE_INITIALIZESID_FAILED, username, error_string(error));\r
+ return 5;\r
+ }\r
+\r
+ for (unsigned char i = 0; i <= *n; i++) {\r
+ unsigned long *sub = GetSidSubAuthority(sid, i);\r
+ if (i < *n) *sub = *GetSidSubAuthority(trust->Sid, i);\r
+ else *sub = translated_sid->RelativeId;\r
+ }\r
+\r
+ LsaFreeMemory(translated_domains);\r
+ LsaFreeMemory(translated_sid);\r
+\r
+ /* Check if the SID has the "Log on as a service" right. */\r
+ LSA_UNICODE_STRING lsa_right;\r
+ lsa_right.Buffer = NSSM_LOGON_AS_SERVICE_RIGHT;\r
+ lsa_right.Length = (unsigned short) wcslen(lsa_right.Buffer) * sizeof(wchar_t);\r
+ lsa_right.MaximumLength = lsa_right.Length + sizeof(wchar_t);\r
+\r
+ LSA_UNICODE_STRING *rights;\r
+ unsigned long count = ~0;\r
+ status = LsaEnumerateAccountRights(policy, sid, &rights, &count);\r
+ if (status) {\r
+ /*\r
+ If the account has no rights set LsaEnumerateAccountRights() will return\r
+ STATUS_OBJECT_NAME_NOT_FOUND and set count to 0.\r
+ */\r
+ error = LsaNtStatusToWinError(status);\r
+ if (error != ERROR_FILE_NOT_FOUND) {\r
+ HeapFree(GetProcessHeap(), 0, sid);\r
+ LsaClose(policy);\r
+ print_message(stderr, NSSM_MESSAGE_LSAENUMERATEACCOUNTRIGHTS_FAILED, username, error_string(error));\r
+ return 4;\r
+ }\r
+ }\r
+\r
+ for (unsigned long i = 0; i < count; i++) {\r
+ if (rights[i].Length != lsa_right.Length) continue;\r
+ if (_wcsnicmp(rights[i].Buffer, lsa_right.Buffer, lsa_right.MaximumLength)) continue;\r
+ /* The SID has the right. */\r
+ HeapFree(GetProcessHeap(), 0, sid);\r
+ LsaFreeMemory(rights);\r
+ LsaClose(policy);\r
+ return 0;\r
+ }\r
+ LsaFreeMemory(rights);\r
+\r
+ /* Add the right. */\r
+ status = LsaAddAccountRights(policy, sid, &lsa_right, 1);\r
+ HeapFree(GetProcessHeap(), 0, sid);\r
+ LsaClose(policy);\r
+ if (status) {\r
+ print_message(stderr, NSSM_MESSAGE_LSAADDACCOUNTRIGHTS_FAILED, error_string(LsaNtStatusToWinError(status)));\r
+ return 5;\r
+ }\r
+\r
+ print_message(stdout, NSSM_MESSAGE_GRANTED_LOGON_AS_SERVICE, username);\r
+ return 0;\r
+}\r
+\r
+/* Set default values which aren't zero. */\r
+void set_nssm_service_defaults(nssm_service_t *service) {\r
+ if (! service) return;\r
+\r
+ service->type = SERVICE_WIN32_OWN_PROCESS;\r
+ service->priority = NORMAL_PRIORITY_CLASS;\r
+ service->stdin_sharing = NSSM_STDIN_SHARING;\r
+ service->stdin_disposition = NSSM_STDIN_DISPOSITION;\r
+ service->stdin_flags = NSSM_STDIN_FLAGS;\r
+ service->stdout_sharing = NSSM_STDOUT_SHARING;\r
+ service->stdout_disposition = NSSM_STDOUT_DISPOSITION;\r
+ service->stdout_flags = NSSM_STDOUT_FLAGS;\r
+ service->stderr_sharing = NSSM_STDERR_SHARING;\r
+ service->stderr_disposition = NSSM_STDERR_DISPOSITION;\r
+ service->stderr_flags = NSSM_STDERR_FLAGS;\r
+ service->throttle_delay = NSSM_RESET_THROTTLE_RESTART;\r
+ service->stop_method = ~0;\r
+ service->kill_console_delay = NSSM_KILL_CONSOLE_GRACE_PERIOD;\r
+ service->kill_window_delay = NSSM_KILL_WINDOW_GRACE_PERIOD;\r
+ service->kill_threads_delay = NSSM_KILL_THREADS_GRACE_PERIOD;\r
+}\r
+\r
+/* Allocate and zero memory for a service. */\r
+nssm_service_t *alloc_nssm_service() {\r
+ nssm_service_t *service = (nssm_service_t *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(nssm_service_t));\r
+ if (! service) log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("service"), _T("alloc_nssm_service()"), 0);\r
+ return service;\r
+}\r
+\r
+/* Free memory for a service. */\r
+void cleanup_nssm_service(nssm_service_t *service) {\r
+ if (! service) return;\r
+ if (service->username) HeapFree(GetProcessHeap(), 0, service->username);\r
+ if (service->password) {\r
+ SecureZeroMemory(service->password, service->passwordlen);\r
+ HeapFree(GetProcessHeap(), 0, service->password);\r
+ }\r
+ if (service->env) HeapFree(GetProcessHeap(), 0, service->env);\r
+ if (service->env_extra) HeapFree(GetProcessHeap(), 0, service->env_extra);\r
+ if (service->handle) CloseServiceHandle(service->handle);\r
+ if (service->process_handle) CloseHandle(service->process_handle);\r
+ if (service->wait_handle) UnregisterWait(service->process_handle);\r
+ if (service->throttle_section_initialised) DeleteCriticalSection(&service->throttle_section);\r
+ if (service->throttle_timer) CloseHandle(service->throttle_timer);\r
+ HeapFree(GetProcessHeap(), 0, service);\r
+}\r
+\r