#include "nssm.h"\r
\r
+extern unsigned long tls_index;\r
+\r
/* String function */\r
int str_equiv(const char *a, const char *b) {\r
int i;\r
int usage(int ret) {\r
fprintf(stderr, "NSSM: The non-sucking service manager\n");\r
fprintf(stderr, "Version %s, %s\n", NSSM_VERSION, NSSM_DATE);\r
- fprintf(stderr, "Usage: nssm option [args]\n");\r
- fprintf(stderr, "To install a service: nssm install [servicename]\n");\r
- fprintf(stderr, "To remove a service: nssm remove [servicename]\n");\r
- exit(ret);\r
+ fprintf(stderr, "Usage: nssm <option> [args]\n\n");\r
+ fprintf(stderr, "To show service installation GUI:\n\n");\r
+ fprintf(stderr, " nssm install [<servicename>]\n\n");\r
+ fprintf(stderr, "To install a service without confirmation:\n\n");\r
+ fprintf(stderr, " nssm install <servicename> <app> [<args>]\n\n");\r
+ fprintf(stderr, "To show service removal GUI:\n\n");\r
+ fprintf(stderr, " nssm remove [<servicename>]\n\n");\r
+ fprintf(stderr, "To remove a service without confirmation:\n\n");\r
+ fprintf(stderr, " nssm remove <servicename> confirm\n");\r
+ return(ret);\r
+}\r
+\r
+int check_admin(char *action) {\r
+ /* Lifted from MSDN examples */\r
+ PSID AdministratorsGroup;\r
+ SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY;\r
+ BOOL ok = AllocateAndInitializeSid(&NtAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &AdministratorsGroup);\r
+ if (ok) {\r
+ if (! CheckTokenMembership(0, AdministratorsGroup, &ok)) ok = 0;\r
+ FreeSid(AdministratorsGroup);\r
+\r
+ if (ok) return 0;\r
+\r
+ fprintf(stderr, "Administator access is needed to %s a service.\n", action);\r
+ return 1;\r
+ }\r
+\r
+ /* Can't tell if we are admin or not; later operations may fail */\r
+ return 0;\r
}\r
\r
int main(int argc, char **argv) {\r
- /* Require an argument since users may try to run nssm directly */\r
- if (argc == 1) exit(usage(1));\r
+ /* Elevate */\r
+ if (argc > 1) {\r
+ if (str_equiv(argv[1], "install") || str_equiv(argv[1], "remove")) {\r
+ if (check_admin(argv[1])) exit(100);\r
+ }\r
+\r
+ /* Valid commands are install or remove */\r
+ if (str_equiv(argv[1], "install")) {\r
+ exit(pre_install_service(argc - 2, argv + 2));\r
+ }\r
+ if (str_equiv(argv[1], "remove")) {\r
+ exit(pre_remove_service(argc - 2, argv + 2));\r
+ }\r
+ }\r
+\r
+ /* Thread local storage for error message buffer */\r
+ tls_index = TlsAlloc();\r
\r
- /* Valid commands are install or remove */\r
- if (str_equiv(argv[1], "install")) exit(install_service(argv[2]));\r
- if (str_equiv(argv[1], "remove")) exit(remove_service(argv[2]));\r
- /* Undocumented: "run" is used to actually do service stuff */\r
- if (! str_equiv(argv[1], NSSM_RUN)) exit(usage(2));\r
+ /* Register messages */\r
+ create_messages();\r
\r
/* Start service magic */\r
SERVICE_TABLE_ENTRY table[] = { { NSSM, service_main }, { 0, 0 } };\r
if (! StartServiceCtrlDispatcher(table)) {\r
- char *message = error_string(GetLastError());\r
- eventprintf(EVENTLOG_ERROR_TYPE, "StartServiceCtrlDispatcher() failed: %s", message);\r
- if (message) LocalFree(message);\r
- return 100;\r
+ unsigned long error = GetLastError();\r
+ /* User probably ran nssm with no argument */\r
+ if (error == ERROR_FAILED_SERVICE_CONTROLLER_CONNECT) exit(usage(1));\r
+ log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_DISPATCHER_FAILED, error_string(error), 0);\r
+ exit(100);\r
}\r
\r
/* And nothing more to do */\r
- return 0;\r
+ exit(0);\r
}\r