#include "nssm.h"\r
\r
extern unsigned long tls_index;\r
+extern bool is_admin;\r
+extern imports_t imports;\r
\r
-/* String function */\r
-int str_equiv(const char *a, const char *b) {\r
- int i;\r
- for (i = 0; ; i++) {\r
- if (tolower(b[i]) != tolower(a[i])) return 0;\r
- if (! a[i]) return 1;\r
- }\r
+/* Are two strings case-insensitively equivalent? */\r
+int str_equiv(const TCHAR *a, const TCHAR *b) {\r
+ size_t len = _tcslen(a);\r
+ if (_tcslen(b) != len) return 0;\r
+ if (_tcsnicmp(a, b, len)) return 0;\r
+ return 1;\r
+}\r
+\r
+/* Convert a string to a number. */\r
+int str_number(const TCHAR *string, unsigned long *number, TCHAR **bogus) {\r
+ if (! string) return 1;\r
+\r
+ *number = _tcstoul(string, bogus, 0);\r
+ if (**bogus) return 2;\r
+\r
+ return 0;\r
+}\r
+\r
+int str_number(const TCHAR *string, unsigned long *number) {\r
+ TCHAR *bogus;\r
+ return str_number(string, number, &bogus);\r
+}\r
+\r
+/* Remove basename of a path. */\r
+void strip_basename(TCHAR *buffer) {\r
+ size_t len = _tcslen(buffer);\r
+ size_t i;\r
+ for (i = len; i && buffer[i] != _T('\\') && buffer[i] != _T('/'); i--);\r
+ /* X:\ is OK. */\r
+ if (i && buffer[i - 1] == _T(':')) i++;\r
+ buffer[i] = _T('\0');\r
}\r
\r
/* How to use me correctly */\r
int usage(int ret) {\r
- fprintf(stderr, "NSSM: The non-sucking service manager\n");\r
- fprintf(stderr, "Version %s, %s\n", NSSM_VERSION, NSSM_DATE);\r
- fprintf(stderr, "Usage: nssm <option> [args]\n\n");\r
- fprintf(stderr, "To show service installation GUI:\n\n");\r
- fprintf(stderr, " nssm install [<servicename>]\n\n");\r
- fprintf(stderr, "To install a service without confirmation:\n\n");\r
- fprintf(stderr, " nssm install <servicename> <app> [<args>]\n\n");\r
- fprintf(stderr, "To show service removal GUI:\n\n");\r
- fprintf(stderr, " nssm remove [<servicename>]\n\n");\r
- fprintf(stderr, "To remove a service without confirmation:\n\n");\r
- fprintf(stderr, " nssm remove <servicename> confirm\n");\r
+ if (GetConsoleWindow()) print_message(stderr, NSSM_MESSAGE_USAGE, NSSM_VERSION, NSSM_CONFIGURATION, NSSM_DATE);\r
+ else popup_message(0, MB_OK, NSSM_MESSAGE_USAGE, NSSM_VERSION, NSSM_CONFIGURATION, NSSM_DATE);\r
return(ret);\r
}\r
\r
-int check_admin(char *action) {\r
+void check_admin() {\r
+ is_admin = false;\r
+\r
/* Lifted from MSDN examples */\r
PSID AdministratorsGroup;\r
SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY;\r
- BOOL ok = AllocateAndInitializeSid(&NtAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &AdministratorsGroup);\r
- if (ok) {\r
- if (! CheckTokenMembership(0, AdministratorsGroup, &ok)) ok = 0;\r
- FreeSid(AdministratorsGroup);\r
+ if (! AllocateAndInitializeSid(&NtAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &AdministratorsGroup)) return;\r
+ CheckTokenMembership(0, AdministratorsGroup, /*XXX*/(PBOOL) &is_admin);\r
+ FreeSid(AdministratorsGroup);\r
+}\r
\r
- if (ok) return 0;\r
+int num_cpus() {\r
+ DWORD_PTR i, affinity, system_affinity;\r
+ if (! GetProcessAffinityMask(GetCurrentProcess(), &affinity, &system_affinity)) return 64;\r
+ for (i = 0; system_affinity & (1LL << i); i++);\r
+ return (int) i;\r
+}\r
\r
- fprintf(stderr, "Administator access is needed to %s a service.\n", action);\r
- return 1;\r
- }\r
+int _tmain(int argc, TCHAR **argv) {\r
+ check_console();\r
\r
- /* Can't tell if we are admin or not; later operations may fail */\r
- return 0;\r
-}\r
+#ifdef UNICODE\r
+ /*\r
+ Ensure we write in UTF-16 mode, so that non-ASCII characters don't get\r
+ mangled. If we were compiled in ANSI mode it won't work.\r
+ */\r
+ _setmode(_fileno(stdout), _O_U16TEXT);\r
+ _setmode(_fileno(stderr), _O_U16TEXT);\r
+#endif\r
+\r
+ /* Remember if we are admin */\r
+ check_admin();\r
+\r
+ /* Set up function pointers. */\r
+ if (get_imports()) exit(111);\r
\r
-int main(int argc, char **argv) {\r
/* Elevate */\r
if (argc > 1) {\r
- if (str_equiv(argv[1], "install") || str_equiv(argv[1], "remove")) {\r
- if (check_admin(argv[1])) exit(100);\r
+ /*\r
+ Valid commands are:\r
+ start, stop, pause, continue, install, edit, get, set, reset, unset, remove\r
+ */\r
+ if (str_equiv(argv[1], _T("start"))) exit(control_service(NSSM_SERVICE_CONTROL_START, argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("stop"))) exit(control_service(SERVICE_CONTROL_STOP, argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("restart"))) {\r
+ int ret = control_service(SERVICE_CONTROL_STOP, argc - 2, argv + 2);\r
+ if (ret) exit(ret);\r
+ exit(control_service(NSSM_SERVICE_CONTROL_START, argc - 2, argv + 2));\r
}\r
-\r
- /* Valid commands are install or remove */\r
- if (str_equiv(argv[1], "install")) {\r
+ if (str_equiv(argv[1], _T("pause"))) exit(control_service(SERVICE_CONTROL_PAUSE, argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("continue"))) exit(control_service(SERVICE_CONTROL_CONTINUE, argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("status"))) exit(control_service(SERVICE_CONTROL_INTERROGATE, argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("rotate"))) exit(control_service(NSSM_SERVICE_CONTROL_ROTATE, argc - 2, argv + 2));\r
+ if (str_equiv(argv[1], _T("install"))) {\r
+ if (! is_admin) {\r
+ print_message(stderr, NSSM_MESSAGE_NOT_ADMINISTRATOR_CANNOT_INSTALL);\r
+ exit(100);\r
+ }\r
exit(pre_install_service(argc - 2, argv + 2));\r
}\r
- if (str_equiv(argv[1], "remove")) {\r
+ if (str_equiv(argv[1], _T("edit")) || str_equiv(argv[1], _T("get")) || str_equiv(argv[1], _T("set")) || str_equiv(argv[1], _T("reset")) || str_equiv(argv[1], _T("unset"))) {\r
+ if (! is_admin) {\r
+ print_message(stderr, NSSM_MESSAGE_NOT_ADMINISTRATOR_CANNOT_EDIT);\r
+ exit(100);\r
+ }\r
+ int ret = pre_edit_service(argc - 1, argv + 1);\r
+ /* There might be a password here. */\r
+ for (int i = 0; i < argc; i++) SecureZeroMemory(argv[i], _tcslen(argv[i]) * sizeof(TCHAR));\r
+ exit(ret);\r
+ }\r
+ if (str_equiv(argv[1], _T("remove"))) {\r
+ if (! is_admin) {\r
+ print_message(stderr, NSSM_MESSAGE_NOT_ADMINISTRATOR_CANNOT_REMOVE);\r
+ exit(100);\r
+ }\r
exit(pre_remove_service(argc - 2, argv + 2));\r
}\r
}\r
tls_index = TlsAlloc();\r
\r
/* Register messages */\r
- create_messages();\r
-\r
- /* Start service magic */\r
- SERVICE_TABLE_ENTRY table[] = { { NSSM, service_main }, { 0, 0 } };\r
- if (! StartServiceCtrlDispatcher(table)) {\r
- unsigned long error = GetLastError();\r
- /* User probably ran nssm with no argument */\r
- if (error == ERROR_FAILED_SERVICE_CONTROLLER_CONNECT) exit(usage(1));\r
- log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_DISPATCHER_FAILED, error_string(error), 0);\r
- exit(100);\r
+ if (is_admin) create_messages();\r
+\r
+ /*\r
+ Optimisation for Windows 2000:\r
+ When we're run from the command line the StartServiceCtrlDispatcher() call\r
+ will time out after a few seconds on Windows 2000. On newer versions the\r
+ call returns instantly. Check for stdin first and only try to call the\r
+ function if there's no input stream found. Although it's possible that\r
+ we're running with input redirected it's much more likely that we're\r
+ actually running as a service.\r
+ This will save time when running with no arguments from a command prompt.\r
+ */\r
+ if (! GetStdHandle(STD_INPUT_HANDLE)) {\r
+ /* Start service magic */\r
+ SERVICE_TABLE_ENTRY table[] = { { NSSM, service_main }, { 0, 0 } };\r
+ if (! StartServiceCtrlDispatcher(table)) {\r
+ unsigned long error = GetLastError();\r
+ /* User probably ran nssm with no argument */\r
+ if (error == ERROR_FAILED_SERVICE_CONTROLLER_CONNECT) exit(usage(1));\r
+ log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_DISPATCHER_FAILED, error_string(error), 0);\r
+ free_imports();\r
+ exit(100);\r
+ }\r
}\r
+ else exit(usage(1));\r
\r
/* And nothing more to do */\r
exit(0);\r