X-Git-Url: http://git.iain.cx/?a=blobdiff_plain;f=nssm.cpp;h=d543c46de27b96e4bc655a060fd79319a58cb1c3;hb=7b85809e2f4f36f1cb587e255c72409b06d549a9;hp=08b94320089fed2f3111081abd6dfc48e6a820e0;hpb=4440946eccf1cb14e16f8d29c54fb4acecbd44ff;p=nssm.git diff --git a/nssm.cpp b/nssm.cpp index 08b9432..d543c46 100644 --- a/nssm.cpp +++ b/nssm.cpp @@ -1,5 +1,7 @@ #include "nssm.h" +extern unsigned long tls_index; + /* String function */ int str_equiv(const char *a, const char *b) { int i; @@ -25,19 +27,43 @@ int usage(int ret) { return(ret); } -int main(int argc, char **argv) { - /* Require an argument since users may try to run nssm directly */ - if (argc == 1) exit(usage(1)); +int check_admin(char *action) { + /* Lifted from MSDN examples */ + PSID AdministratorsGroup; + SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY; + BOOL ok = AllocateAndInitializeSid(&NtAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &AdministratorsGroup); + if (ok) { + if (! CheckTokenMembership(0, AdministratorsGroup, &ok)) ok = 0; + FreeSid(AdministratorsGroup); + + if (ok) return 0; - /* Valid commands are install or remove */ - if (str_equiv(argv[1], "install")) { - exit(pre_install_service(argc - 2, argv + 2)); + fprintf(stderr, "Administator access is needed to %s a service.\n", action); + return 1; } - if (str_equiv(argv[1], "remove")) { - exit(pre_remove_service(argc - 2, argv + 2)); + + /* Can't tell if we are admin or not; later operations may fail */ + return 0; +} + +int main(int argc, char **argv) { + /* Elevate */ + if (argc > 1) { + if (str_equiv(argv[1], "install") || str_equiv(argv[1], "remove")) { + if (check_admin(argv[1])) exit(100); + } + + /* Valid commands are install or remove */ + if (str_equiv(argv[1], "install")) { + exit(pre_install_service(argc - 2, argv + 2)); + } + if (str_equiv(argv[1], "remove")) { + exit(pre_remove_service(argc - 2, argv + 2)); + } } - /* Undocumented: "run" is used to actually do service stuff */ - if (! str_equiv(argv[1], NSSM_RUN)) exit(usage(2)); + + /* Thread local storage for error message buffer */ + tls_index = TlsAlloc(); /* Register messages */ create_messages(); @@ -45,10 +71,13 @@ int main(int argc, char **argv) { /* Start service magic */ SERVICE_TABLE_ENTRY table[] = { { NSSM, service_main }, { 0, 0 } }; if (! StartServiceCtrlDispatcher(table)) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_DISPATCHER_FAILED, GetLastError(), 0); - return 100; + unsigned long error = GetLastError(); + /* User probably ran nssm with no argument */ + if (error == ERROR_FAILED_SERVICE_CONTROLLER_CONNECT) exit(usage(1)); + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_DISPATCHER_FAILED, error_string(error), 0); + exit(100); } /* And nothing more to do */ - return 0; + exit(0); }