X-Git-Url: http://git.iain.cx/?a=blobdiff_plain;f=registry.cpp;h=1b85af588f55d160f29e40b31d145a9254836031;hb=62f28c55d444d846579159133dbe091809a2c08b;hp=15ee152a5483564a0678c052b406637409cdedc3;hpb=e9d9b2fa71473e96650fe3fc4ee0d5535c6725d8;p=nssm.git diff --git a/registry.cpp b/registry.cpp index 15ee152..1b85af5 100644 --- a/registry.cpp +++ b/registry.cpp @@ -1,11 +1,53 @@ #include "nssm.h" +extern const TCHAR *exit_action_strings[]; + +static int service_registry_path(const TCHAR *service_name, bool parameters, const TCHAR *sub, TCHAR *buffer, unsigned long buflen) { + int ret; + + if (parameters) { + if (sub) ret = _sntprintf_s(buffer, buflen, _TRUNCATE, NSSM_REGISTRY _T("\\") NSSM_REG_PARAMETERS _T("\\%s"), service_name, sub); + else ret = _sntprintf_s(buffer, buflen, _TRUNCATE, NSSM_REGISTRY _T("\\") NSSM_REG_PARAMETERS, service_name); + } + else ret = _sntprintf_s(buffer, buflen, _TRUNCATE, NSSM_REGISTRY, service_name); + + return ret; +} + +static long open_registry_key(const TCHAR *registry, REGSAM sam, HKEY *key, bool must_exist) { + long error; + + if (sam & KEY_SET_VALUE) { + error = RegCreateKeyEx(HKEY_LOCAL_MACHINE, registry, 0, 0, REG_OPTION_NON_VOLATILE, sam, 0, key, 0); + if (error != ERROR_SUCCESS) { + *key = 0; + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0); + return error; + } + } + else { + error = RegOpenKeyEx(HKEY_LOCAL_MACHINE, registry, 0, sam, key); + if (error != ERROR_SUCCESS) { + *key = 0; + if (error != ERROR_FILE_NOT_FOUND || must_exist) log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0); + } + } + + return error; +} + +static HKEY open_registry_key(const TCHAR *registry, REGSAM sam, bool must_exist) { + HKEY key; + long error = open_registry_key(registry, sam, &key, must_exist); + return key; +} + int create_messages() { HKEY key; - char registry[KEY_LENGTH]; - if (_snprintf(registry, sizeof(registry), "SYSTEM\\CurrentControlSet\\Services\\EventLog\\Application\\%s", NSSM) < 0) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, "eventlog registry", "create_messages()", 0); + TCHAR registry[KEY_LENGTH]; + if (_sntprintf_s(registry, _countof(registry), _TRUNCATE, _T("SYSTEM\\CurrentControlSet\\Services\\EventLog\\Application\\%s"), NSSM) < 0) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("eventlog registry"), _T("create_messages()"), 0); return 1; } @@ -15,63 +57,159 @@ int create_messages() { } /* Get path of this program */ - char path[MAX_PATH]; - GetModuleFileName(0, path, MAX_PATH); + const TCHAR *path = nssm_unquoted_imagepath(); /* Try to register the module but don't worry so much on failure */ - RegSetValueEx(key, "EventMessageFile", 0, REG_SZ, (const unsigned char *) path, strlen(path) + 1); + RegSetValueEx(key, _T("EventMessageFile"), 0, REG_SZ, (const unsigned char *) path, (unsigned long) (_tcslen(path) + 1) * sizeof(TCHAR)); unsigned long types = EVENTLOG_INFORMATION_TYPE | EVENTLOG_WARNING_TYPE | EVENTLOG_ERROR_TYPE; - RegSetValueEx(key, "TypesSupported", 0, REG_DWORD, /*XXX*/(PBYTE) &types, sizeof(types)); + RegSetValueEx(key, _T("TypesSupported"), 0, REG_DWORD, (const unsigned char *) &types, sizeof(types)); return 0; } -int create_parameters(char *service_name, char *exe, char *flags, char *dir) { - /* Get registry */ - char registry[KEY_LENGTH]; - if (_snprintf(registry, sizeof(registry), NSSM_REGISTRY, service_name) < 0) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, "NSSM_REGISTRY", "create_parameters()", 0); - return 1; - } +long enumerate_registry_values(HKEY key, unsigned long *index, TCHAR *name, unsigned long namelen) { + unsigned long type; + unsigned long datalen = namelen; + long error = RegEnumValue(key, *index, name, &datalen, 0, &type, 0, 0); + if (error == ERROR_SUCCESS) ++*index; + return error; +} +int create_parameters(nssm_service_t *service, bool editing) { /* Try to open the registry */ - HKEY key; - if (RegCreateKeyEx(HKEY_LOCAL_MACHINE, registry, 0, 0, REG_OPTION_NON_VOLATILE, KEY_WRITE, 0, &key, 0) != ERROR_SUCCESS) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0); - return 2; - } + HKEY key = open_registry(service->name, KEY_WRITE); + if (! key) return 1; + + /* Remember parameters in case we need to delete them. */ + TCHAR registry[KEY_LENGTH]; + int ret = service_registry_path(service->name, true, 0, registry, _countof(registry)); /* Try to create the parameters */ - if (RegSetValueEx(key, NSSM_REG_EXE, 0, REG_EXPAND_SZ, (const unsigned char *) exe, strlen(exe) + 1) != ERROR_SUCCESS) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_EXE, error_string(GetLastError()), 0); - RegDeleteKey(HKEY_LOCAL_MACHINE, NSSM_REGISTRY); + if (set_expand_string(key, NSSM_REG_EXE, service->exe)) { + if (ret > 0) RegDeleteKey(HKEY_LOCAL_MACHINE, registry); + RegCloseKey(key); + return 2; + } + if (set_expand_string(key, NSSM_REG_FLAGS, service->flags)) { + if (ret > 0) RegDeleteKey(HKEY_LOCAL_MACHINE, registry); RegCloseKey(key); return 3; } - if (RegSetValueEx(key, NSSM_REG_FLAGS, 0, REG_EXPAND_SZ, (const unsigned char *) flags, strlen(flags) + 1) != ERROR_SUCCESS) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_FLAGS, error_string(GetLastError()), 0); - RegDeleteKey(HKEY_LOCAL_MACHINE, NSSM_REGISTRY); + if (set_expand_string(key, NSSM_REG_DIR, service->dir)) { + if (ret > 0) RegDeleteKey(HKEY_LOCAL_MACHINE, registry); RegCloseKey(key); return 4; } - if (RegSetValueEx(key, NSSM_REG_DIR, 0, REG_EXPAND_SZ, (const unsigned char *) dir, strlen(dir) + 1) != ERROR_SUCCESS) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_DIR, error_string(GetLastError()), 0); - RegDeleteKey(HKEY_LOCAL_MACHINE, NSSM_REGISTRY); - RegCloseKey(key); - return 5; + + /* Other non-default parameters. May fail. */ + if (service->priority != NORMAL_PRIORITY_CLASS) set_number(key, NSSM_REG_PRIORITY, service->priority); + else if (editing) RegDeleteValue(key, NSSM_REG_PRIORITY); + if (service->affinity) { + TCHAR *string; + if (! affinity_mask_to_string(service->affinity, &string)) { + if (RegSetValueEx(key, NSSM_REG_AFFINITY, 0, REG_SZ, (const unsigned char *) string, (unsigned long) (_tcslen(string) + 1) * sizeof(TCHAR)) != ERROR_SUCCESS) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_AFFINITY, error_string(GetLastError()), 0); + HeapFree(GetProcessHeap(), 0, string); + return 5; + } + } + if (string) HeapFree(GetProcessHeap(), 0, string); + } + else if (editing) RegDeleteValue(key, NSSM_REG_AFFINITY); + unsigned long stop_method_skip = ~service->stop_method; + if (stop_method_skip) set_number(key, NSSM_REG_STOP_METHOD_SKIP, stop_method_skip); + else if (editing) RegDeleteValue(key, NSSM_REG_STOP_METHOD_SKIP); + if (service->default_exit_action < NSSM_NUM_EXIT_ACTIONS) create_exit_action(service->name, exit_action_strings[service->default_exit_action], editing); + if (service->restart_delay) set_number(key, NSSM_REG_RESTART_DELAY, service->restart_delay); + else if (editing) RegDeleteValue(key, NSSM_REG_RESTART_DELAY); + if (service->throttle_delay != NSSM_RESET_THROTTLE_RESTART) set_number(key, NSSM_REG_THROTTLE, service->throttle_delay); + else if (editing) RegDeleteValue(key, NSSM_REG_THROTTLE); + if (service->kill_console_delay != NSSM_KILL_CONSOLE_GRACE_PERIOD) set_number(key, NSSM_REG_KILL_CONSOLE_GRACE_PERIOD, service->kill_console_delay); + else if (editing) RegDeleteValue(key, NSSM_REG_KILL_CONSOLE_GRACE_PERIOD); + if (service->kill_window_delay != NSSM_KILL_WINDOW_GRACE_PERIOD) set_number(key, NSSM_REG_KILL_WINDOW_GRACE_PERIOD, service->kill_window_delay); + else if (editing) RegDeleteValue(key, NSSM_REG_KILL_WINDOW_GRACE_PERIOD); + if (service->kill_threads_delay != NSSM_KILL_THREADS_GRACE_PERIOD) set_number(key, NSSM_REG_KILL_THREADS_GRACE_PERIOD, service->kill_threads_delay); + else if (editing) RegDeleteValue(key, NSSM_REG_KILL_THREADS_GRACE_PERIOD); + if (! service->kill_process_tree) set_number(key, NSSM_REG_KILL_PROCESS_TREE, 0); + else if (editing) RegDeleteValue(key, NSSM_REG_KILL_PROCESS_TREE); + if (service->stdin_path[0] || editing) { + if (service->stdin_path[0]) set_expand_string(key, NSSM_REG_STDIN, service->stdin_path); + else if (editing) RegDeleteValue(key, NSSM_REG_STDIN); + if (service->stdin_sharing != NSSM_STDIN_SHARING) set_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_SHARING, service->stdin_sharing); + else if (editing) delete_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_SHARING); + if (service->stdin_disposition != NSSM_STDIN_DISPOSITION) set_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_DISPOSITION, service->stdin_disposition); + else if (editing) delete_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_DISPOSITION); + if (service->stdin_flags != NSSM_STDIN_FLAGS) set_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_FLAGS, service->stdin_flags); + else if (editing) delete_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_FLAGS); + } + if (service->stdout_path[0] || editing) { + if (service->stdout_path[0]) set_expand_string(key, NSSM_REG_STDOUT, service->stdout_path); + else if (editing) RegDeleteValue(key, NSSM_REG_STDOUT); + if (service->stdout_sharing != NSSM_STDOUT_SHARING) set_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_SHARING, service->stdout_sharing); + else if (editing) delete_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_SHARING); + if (service->stdout_disposition != NSSM_STDOUT_DISPOSITION) set_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_DISPOSITION, service->stdout_disposition); + else if (editing) delete_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_DISPOSITION); + if (service->stdout_flags != NSSM_STDOUT_FLAGS) set_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_FLAGS, service->stdout_flags); + else if (editing) delete_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_FLAGS); + if (service->stdout_copy_and_truncate) set_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_COPY_AND_TRUNCATE, 1); + else if (editing) delete_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_COPY_AND_TRUNCATE); + } + if (service->stderr_path[0] || editing) { + if (service->stderr_path[0]) set_expand_string(key, NSSM_REG_STDERR, service->stderr_path); + else if (editing) RegDeleteValue(key, NSSM_REG_STDERR); + if (service->stderr_sharing != NSSM_STDERR_SHARING) set_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_SHARING, service->stderr_sharing); + else if (editing) delete_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_SHARING); + if (service->stderr_disposition != NSSM_STDERR_DISPOSITION) set_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_DISPOSITION, service->stderr_disposition); + else if (editing) delete_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_DISPOSITION); + if (service->stderr_flags != NSSM_STDERR_FLAGS) set_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_FLAGS, service->stderr_flags); + else if (editing) delete_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_FLAGS); + if (service->stderr_copy_and_truncate) set_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_COPY_AND_TRUNCATE, 1); + else if (editing) delete_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_COPY_AND_TRUNCATE); } + if (service->timestamp_log) set_number(key, NSSM_REG_TIMESTAMP_LOG, 1); + else if (editing) RegDeleteValue(key, NSSM_REG_TIMESTAMP_LOG); + if (service->hook_share_output_handles) set_number(key, NSSM_REG_HOOK_SHARE_OUTPUT_HANDLES, 1); + else if (editing) RegDeleteValue(key, NSSM_REG_HOOK_SHARE_OUTPUT_HANDLES); + if (service->rotate_files) set_number(key, NSSM_REG_ROTATE, 1); + else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE); + if (service->rotate_stdout_online) set_number(key, NSSM_REG_ROTATE_ONLINE, 1); + else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_ONLINE); + if (service->rotate_seconds) set_number(key, NSSM_REG_ROTATE_SECONDS, service->rotate_seconds); + else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_SECONDS); + if (service->rotate_bytes_low) set_number(key, NSSM_REG_ROTATE_BYTES_LOW, service->rotate_bytes_low); + else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_BYTES_LOW); + if (service->rotate_bytes_high) set_number(key, NSSM_REG_ROTATE_BYTES_HIGH, service->rotate_bytes_high); + else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_BYTES_HIGH); + if (service->rotate_delay != NSSM_ROTATE_DELAY) set_number(key, NSSM_REG_ROTATE_DELAY, service->rotate_delay); + else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_DELAY); + if (service->no_console) set_number(key, NSSM_REG_NO_CONSOLE, 1); + else if (editing) RegDeleteValue(key, NSSM_REG_NO_CONSOLE); - /* Close registry */ + /* Environment */ + if (service->env) { + if (RegSetValueEx(key, NSSM_REG_ENV, 0, REG_MULTI_SZ, (const unsigned char *) service->env, (unsigned long) service->envlen * sizeof(TCHAR)) != ERROR_SUCCESS) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_ENV, error_string(GetLastError()), 0); + } + } + else if (editing) RegDeleteValue(key, NSSM_REG_ENV); + if (service->env_extra) { + if (RegSetValueEx(key, NSSM_REG_ENV_EXTRA, 0, REG_MULTI_SZ, (const unsigned char *) service->env_extra, (unsigned long) service->env_extralen * sizeof(TCHAR)) != ERROR_SUCCESS) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_ENV_EXTRA, error_string(GetLastError()), 0); + } + } + else if (editing) RegDeleteValue(key, NSSM_REG_ENV_EXTRA); + + /* Close registry. */ RegCloseKey(key); return 0; } -int create_exit_action(char *service_name, const char *action_string) { +int create_exit_action(TCHAR *service_name, const TCHAR *action_string, bool editing) { /* Get registry */ - char registry[KEY_LENGTH]; - if (_snprintf(registry, sizeof(registry), NSSM_REGISTRY "\\%s", service_name, NSSM_REG_EXIT) < 0) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, "NSSM_REG_EXIT", "create_exit_action()", 0); + TCHAR registry[KEY_LENGTH]; + if (service_registry_path(service_name, true, NSSM_REG_EXIT, registry, _countof(registry)) < 0) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("NSSM_REG_EXIT"), _T("create_exit_action()"), 0); return 1; } @@ -84,13 +222,13 @@ int create_exit_action(char *service_name, const char *action_string) { } /* Do nothing if the key already existed */ - if (disposition == REG_OPENED_EXISTING_KEY) { + if (disposition == REG_OPENED_EXISTING_KEY && ! editing) { RegCloseKey(key); return 0; } /* Create the default value */ - if (RegSetValueEx(key, 0, 0, REG_SZ, (const unsigned char *) action_string, strlen(action_string) + 1) != ERROR_SUCCESS) { + if (RegSetValueEx(key, 0, 0, REG_SZ, (const unsigned char *) action_string, (unsigned long) (_tcslen(action_string) + 1) * sizeof(TCHAR)) != ERROR_SUCCESS) { log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_EXIT, error_string(GetLastError()), 0); RegCloseKey(key); return 3; @@ -102,27 +240,90 @@ int create_exit_action(char *service_name, const char *action_string) { return 0; } -int expand_parameter(HKEY key, char *value, char *data, unsigned long datalen, bool sanitise) { - unsigned char *buffer = (unsigned char *) HeapAlloc(GetProcessHeap(), 0, datalen); +int get_environment(TCHAR *service_name, HKEY key, TCHAR *value, TCHAR **env, unsigned long *envlen) { + unsigned long type = REG_MULTI_SZ; + unsigned long envsize; + + *envlen = 0; + + /* Dummy test to find buffer size */ + unsigned long ret = RegQueryValueEx(key, value, 0, &type, NULL, &envsize); + if (ret != ERROR_SUCCESS) { + *env = 0; + /* The service probably doesn't have any environment configured */ + if (ret == ERROR_FILE_NOT_FOUND) return 0; + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(ret), 0); + return 1; + } + + if (type != REG_MULTI_SZ) { + log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_INVALID_ENVIRONMENT_STRING_TYPE, value, service_name, 0); + *env = 0; + return 2; + } + + /* Minimum usable environment would be A= NULL NULL. */ + if (envsize < 4 * sizeof(TCHAR)) { + *env = 0; + return 3; + } + + /* Previously initialised? */ + if (*env) HeapFree(GetProcessHeap(), 0, *env); + + *env = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, envsize); + if (! *env) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, value, _T("get_environment()"), 0); + return 4; + } + + /* Actually get the strings. */ + ret = RegQueryValueEx(key, value, 0, &type, (unsigned char *) *env, &envsize); + if (ret != ERROR_SUCCESS) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(ret), 0); + HeapFree(GetProcessHeap(), 0, *env); + *env = 0; + return 5; + } + + /* Value retrieved by RegQueryValueEx() is SIZE not COUNT. */ + *envlen = (unsigned long) environment_length(*env); + + return 0; +} + + +int get_string(HKEY key, TCHAR *value, TCHAR *data, unsigned long datalen, bool expand, bool sanitise, bool must_exist) { + TCHAR *buffer = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, datalen); if (! buffer) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, value, "expand_parameter()", 0); + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, value, _T("get_string()"), 0); return 1; } + ZeroMemory(data, datalen); + unsigned long type = REG_EXPAND_SZ; unsigned long buflen = datalen; - unsigned long ret = RegQueryValueEx(key, value, 0, &type, buffer, &buflen); + unsigned long ret = RegQueryValueEx(key, value, 0, &type, (unsigned char *) buffer, &buflen); if (ret != ERROR_SUCCESS) { - if (ret != ERROR_FILE_NOT_FOUND) log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(GetLastError()), 0); HeapFree(GetProcessHeap(), 0, buffer); + + if (ret == ERROR_FILE_NOT_FOUND) { + if (! must_exist) return 0; + } + + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(ret), 0); return 2; } /* Paths aren't allowed to contain quotes. */ - if (sanitise) PathUnquoteSpaces((LPSTR) buffer); + if (sanitise) PathUnquoteSpaces(buffer); - ZeroMemory(data, datalen); + /* Do we want to expand the string? */ + if (! expand) { + if (type == REG_EXPAND_SZ) type = REG_SZ; + } /* Technically we shouldn't expand environment strings from REG_SZ values */ if (type != REG_EXPAND_SZ) { @@ -131,9 +332,9 @@ int expand_parameter(HKEY key, char *value, char *data, unsigned long datalen, b return 0; } - ret = ExpandEnvironmentStrings((char *) buffer, data, datalen); + ret = ExpandEnvironmentStrings((TCHAR *) buffer, data, datalen); if (! ret || ret > datalen) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_EXPANDENVIRONMENTSTRINGS_FAILED, value, buffer, error_string(GetLastError()), 0); + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_EXPANDENVIRONMENTSTRINGS_FAILED, buffer, error_string(GetLastError()), 0); HeapFree(GetProcessHeap(), 0, buffer); return 3; } @@ -142,52 +343,578 @@ int expand_parameter(HKEY key, char *value, char *data, unsigned long datalen, b return 0; } -int get_parameters(char *service_name, char *exe, int exelen, char *flags, int flagslen, char *dir, int dirlen) { - /* Get registry */ - char registry[KEY_LENGTH]; - if (_snprintf(registry, sizeof(registry), NSSM_REGISTRY, service_name) < 0) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, "NSSM_REGISTRY", "get_parameters()", 0); +int get_string(HKEY key, TCHAR *value, TCHAR *data, unsigned long datalen, bool sanitise) { + return get_string(key, value, data, datalen, false, sanitise, true); +} + +int expand_parameter(HKEY key, TCHAR *value, TCHAR *data, unsigned long datalen, bool sanitise, bool must_exist) { + return get_string(key, value, data, datalen, true, sanitise, must_exist); +} + +int expand_parameter(HKEY key, TCHAR *value, TCHAR *data, unsigned long datalen, bool sanitise) { + return expand_parameter(key, value, data, datalen, sanitise, true); +} + +/* + Sets a string in the registry. + Returns: 0 if it was set. + 1 on error. +*/ +int set_string(HKEY key, TCHAR *value, TCHAR *string, bool expand) { + unsigned long type = expand ? REG_EXPAND_SZ : REG_SZ; + if (RegSetValueEx(key, value, 0, type, (const unsigned char *) string, (unsigned long) (_tcslen(string) + 1) * sizeof(TCHAR)) == ERROR_SUCCESS) return 0; + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, value, error_string(GetLastError()), 0); + return 1; +} + +int set_string(HKEY key, TCHAR *value, TCHAR *string) { + return set_string(key, value, string, false); +} + +int set_expand_string(HKEY key, TCHAR *value, TCHAR *string) { + return set_string(key, value, string, true); +} + +/* + Set an unsigned long in the registry. + Returns: 0 if it was set. + 1 on error. +*/ +int set_number(HKEY key, TCHAR *value, unsigned long number) { + if (RegSetValueEx(key, value, 0, REG_DWORD, (const unsigned char *) &number, sizeof(number)) == ERROR_SUCCESS) return 0; + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, value, error_string(GetLastError()), 0); + return 1; +} + +/* + Query an unsigned long from the registry. + Returns: 1 if a number was retrieved. + 0 if none was found and must_exist is false. + -1 if none was found and must_exist is true. + -2 otherwise. +*/ +int get_number(HKEY key, TCHAR *value, unsigned long *number, bool must_exist) { + unsigned long type = REG_DWORD; + unsigned long number_len = sizeof(unsigned long); + + int ret = RegQueryValueEx(key, value, 0, &type, (unsigned char *) number, &number_len); + if (ret == ERROR_SUCCESS) return 1; + + if (ret == ERROR_FILE_NOT_FOUND) { + if (! must_exist) return 0; + } + + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(ret), 0); + if (ret == ERROR_FILE_NOT_FOUND) return -1; + + return -2; +} + +int get_number(HKEY key, TCHAR *value, unsigned long *number) { + return get_number(key, value, number, true); +} + +/* Replace NULL with CRLF. Leave NULL NULL as the end marker. */ +int format_double_null(TCHAR *dn, unsigned long dnlen, TCHAR **formatted, unsigned long *newlen) { + unsigned long i, j; + *newlen = dnlen; + + if (! *newlen) { + *formatted = 0; + return 0; + } + + for (i = 0; i < dnlen; i++) if (! dn[i] && dn[i + 1]) ++*newlen; + + *formatted = (TCHAR *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, *newlen * sizeof(TCHAR)); + if (! *formatted) { + *newlen = 0; return 1; } - /* Try to open the registry */ + for (i = 0, j = 0; i < dnlen; i++) { + (*formatted)[j] = dn[i]; + if (! dn[i]) { + if (dn[i + 1]) { + (*formatted)[j] = _T('\r'); + (*formatted)[++j] = _T('\n'); + } + } + j++; + } + + return 0; +} + +/* Strip CR and replace LF with NULL. */ +int unformat_double_null(TCHAR *formatted, unsigned long formattedlen, TCHAR **dn, unsigned long *newlen) { + unsigned long i, j; + *newlen = 0; + + /* Don't count trailing NULLs. */ + for (i = 0; i < formattedlen; i++) { + if (! formatted[i]) { + formattedlen = i; + break; + } + } + + if (! formattedlen) { + *dn = 0; + return 0; + } + + for (i = 0; i < formattedlen; i++) if (formatted[i] != _T('\r')) ++*newlen; + + /* Skip blank lines. */ + for (i = 0; i < formattedlen; i++) { + if (formatted[i] == _T('\r') && formatted[i + 1] == _T('\n')) { + /* This is the last CRLF. */ + if (i >= formattedlen - 2) break; + + /* + Strip at the start of the block or if the next characters are + CRLF too. + */ + if (! i || (formatted[i + 2] == _T('\r') && formatted[i + 3] == _T('\n'))) { + for (j = i + 2; j < formattedlen; j++) formatted[j - 2] = formatted[j]; + formatted[formattedlen--] = _T('\0'); + formatted[formattedlen--] = _T('\0'); + i--; + --*newlen; + } + } + } + + /* Must end with two NULLs. */ + *newlen += 2; + + *dn = (TCHAR *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, *newlen * sizeof(TCHAR)); + if (! *dn) return 1; + + for (i = 0, j = 0; i < formattedlen; i++) { + if (formatted[i] == _T('\r')) continue; + if (formatted[i] == _T('\n')) (*dn)[j] = _T('\0'); + else (*dn)[j] = formatted[i]; + j++; + } + + return 0; +} + +/* Copy a block. */ +int copy_double_null(TCHAR *dn, unsigned long dnlen, TCHAR **newdn) { + if (! newdn) return 1; + + *newdn = 0; + if (! dn) return 0; + + *newdn = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, dnlen * sizeof(TCHAR)); + if (! *newdn) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("dn"), _T("copy_double_null()"), 0); + return 2; + } + + memmove(*newdn, dn, dnlen * sizeof(TCHAR)); + return 0; +} + +/* + Create a new block with all the strings of the first block plus a new string. + The new string may be specified as and the keylen + gives the offset into the string to compare against existing entries. + If the key is already present its value will be overwritten in place. + If the key is blank or empty the new block will still be allocated and have + non-zero length. +*/ +int append_to_double_null(TCHAR *dn, unsigned long dnlen, TCHAR **newdn, unsigned long *newlen, TCHAR *append, size_t keylen, bool case_sensitive) { + if (! append || ! append[0]) return copy_double_null(dn, dnlen, newdn); + size_t appendlen = _tcslen(append); + int (*fn)(const TCHAR *, const TCHAR *, size_t) = (case_sensitive) ? _tcsncmp : _tcsnicmp; + + /* Identify the key, if any, or treat the whole string as the key. */ + TCHAR *key = 0; + if (! keylen || keylen > appendlen) keylen = appendlen; + key = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, (keylen + 1) * sizeof(TCHAR)); + if (! key) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("key"), _T("append_to_double_null()"), 0); + return 1; + } + memmove(key, append, keylen * sizeof(TCHAR)); + key[keylen] = _T('\0'); + + /* Find the length of the block not including any existing key. */ + size_t len = 0; + TCHAR *s; + for (s = dn; *s; s++) { + if (fn(s, key, keylen)) len += _tcslen(s) + 1; + for ( ; *s; s++); + } + + /* Account for new entry. */ + len += _tcslen(append) + 1; + + /* Account for trailing NULL. */ + len++; + + /* Allocate a new block. */ + *newdn = (TCHAR *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, len * sizeof(TCHAR)); + if (! *newdn) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("newdn"), _T("append_to_double_null()"), 0); + HeapFree(GetProcessHeap(), 0, key); + return 2; + } + + /* Copy existing entries.*/ + *newlen = (unsigned long) len; + TCHAR *t = *newdn; + TCHAR *u; + bool replaced = false; + for (s = dn; *s; s++) { + if (fn(s, key, keylen)) u = s; + else { + u = append; + replaced = true; + } + len = _tcslen(u) + 1; + memmove(t, u, len * sizeof(TCHAR)); + t += len; + for ( ; *s; s++); + } + + /* Add the entry if it wasn't already replaced. The buffer was zeroed. */ + if (! replaced) memmove(t, append, _tcslen(append) * sizeof(TCHAR)); + + HeapFree(GetProcessHeap(), 0, key); + return 0; +} + +/* + Create a new block with all the string of the first block minus the given + string. + The keylen parameter gives the offset into the string to compare against + existing entries. If a substring of existing value matches the string to + the given length it will be removed. + If the last entry is removed the new block will still be allocated and + have non-zero length. +*/ +int remove_from_double_null(TCHAR *dn, unsigned long dnlen, TCHAR **newdn, unsigned long *newlen, TCHAR *remove, size_t keylen, bool case_sensitive) { + if (! remove || !remove[0]) return copy_double_null(dn, dnlen, newdn); + size_t removelen = _tcslen(remove); + int (*fn)(const TCHAR *, const TCHAR *, size_t) = (case_sensitive) ? _tcsncmp : _tcsnicmp; + + /* Identify the key, if any, or treat the whole string as the key. */ + TCHAR *key = 0; + if (! keylen || keylen > removelen) keylen = removelen; + key = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, (keylen + 1) * sizeof(TCHAR)); + if (! key) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("key"), _T("remove_from_double_null()"), 0); + return 1; + } + memmove(key, remove, keylen * sizeof(TCHAR)); + key[keylen] = _T('\0'); + + /* Find the length of the block not including any existing key. */ + size_t len = 0; + TCHAR *s; + for (s = dn; *s; s++) { + if (fn(s, key, keylen)) len += _tcslen(s) + 1; + for ( ; *s; s++); + } + + /* Account for trailing NULL. */ + if (++len < 2) len = 2; + + /* Allocate a new block. */ + *newdn = (TCHAR *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, len * sizeof(TCHAR)); + if (! *newdn) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("newdn"), _T("remove_from_double_null()"), 0); + HeapFree(GetProcessHeap(), 0, key); + return 2; + } + + /* Copy existing entries.*/ + *newlen = (unsigned long) len; + TCHAR *t = *newdn; + for (s = dn; *s; s++) { + if (fn(s, key, keylen)) { + len = _tcslen(s) + 1; + memmove(t, s, len * sizeof(TCHAR)); + t += len; + } + for ( ; *s; s++); + } + + HeapFree(GetProcessHeap(), 0, key); + return 0; +} + +void override_milliseconds(TCHAR *service_name, HKEY key, TCHAR *value, unsigned long *buffer, unsigned long default_value, unsigned long event) { + unsigned long type = REG_DWORD; + unsigned long buflen = sizeof(unsigned long); + bool ok = false; + unsigned long ret = RegQueryValueEx(key, value, 0, &type, (unsigned char *) buffer, &buflen); + if (ret != ERROR_SUCCESS) { + if (ret != ERROR_FILE_NOT_FOUND) { + if (type != REG_DWORD) { + TCHAR milliseconds[16]; + _sntprintf_s(milliseconds, _countof(milliseconds), _TRUNCATE, _T("%lu"), default_value); + log_event(EVENTLOG_WARNING_TYPE, event, service_name, value, milliseconds, 0); + } + else log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(ret), 0); + } + } + else ok = true; + + if (! ok) *buffer = default_value; +} + +/* Open the key of the service itself Services\. */ +HKEY open_service_registry(const TCHAR *service_name, REGSAM sam, bool must_exist) { + /* Get registry */ + TCHAR registry[KEY_LENGTH]; + if (service_registry_path(service_name, false, 0, registry, _countof(registry)) < 0) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, NSSM_REGISTRY, _T("open_service_registry()"), 0); + return 0; + } + + return open_registry_key(registry, sam, must_exist); +} + +/* Open a subkey of the service Services\\. */ +long open_registry(const TCHAR *service_name, const TCHAR *sub, REGSAM sam, HKEY *key, bool must_exist) { + /* Get registry */ + TCHAR registry[KEY_LENGTH]; + if (service_registry_path(service_name, true, sub, registry, _countof(registry)) < 0) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, NSSM_REGISTRY, _T("open_registry()"), 0); + return 0; + } + + return open_registry_key(registry, sam, key, must_exist); +} + +HKEY open_registry(const TCHAR *service_name, const TCHAR *sub, REGSAM sam, bool must_exist) { HKEY key; - if (RegOpenKeyEx(HKEY_LOCAL_MACHINE, registry, 0, KEY_READ, &key) != ERROR_SUCCESS) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0); + long error = open_registry(service_name, sub, sam, &key, must_exist); + return key; +} + +HKEY open_registry(const TCHAR *service_name, const TCHAR *sub, REGSAM sam) { + return open_registry(service_name, sub, sam, true); +} + +HKEY open_registry(const TCHAR *service_name, REGSAM sam) { + return open_registry(service_name, 0, sam, true); +} + +int get_io_parameters(nssm_service_t *service, HKEY key) { + /* stdin */ + if (get_createfile_parameters(key, NSSM_REG_STDIN, service->stdin_path, &service->stdin_sharing, NSSM_STDIN_SHARING, &service->stdin_disposition, NSSM_STDIN_DISPOSITION, &service->stdin_flags, NSSM_STDIN_FLAGS, 0)) { + service->stdin_sharing = service->stdin_disposition = service->stdin_flags = 0; + ZeroMemory(service->stdin_path, _countof(service->stdin_path) * sizeof(TCHAR)); + return 1; + } + + /* stdout */ + if (get_createfile_parameters(key, NSSM_REG_STDOUT, service->stdout_path, &service->stdout_sharing, NSSM_STDOUT_SHARING, &service->stdout_disposition, NSSM_STDOUT_DISPOSITION, &service->stdout_flags, NSSM_STDOUT_FLAGS, &service->stdout_copy_and_truncate)) { + service->stdout_sharing = service->stdout_disposition = service->stdout_flags = 0; + ZeroMemory(service->stdout_path, _countof(service->stdout_path) * sizeof(TCHAR)); return 2; } + /* stderr */ + if (get_createfile_parameters(key, NSSM_REG_STDERR, service->stderr_path, &service->stderr_sharing, NSSM_STDERR_SHARING, &service->stderr_disposition, NSSM_STDERR_DISPOSITION, &service->stderr_flags, NSSM_STDERR_FLAGS, &service->stderr_copy_and_truncate)) { + service->stderr_sharing = service->stderr_disposition = service->stderr_flags = 0; + ZeroMemory(service->stderr_path, _countof(service->stderr_path) * sizeof(TCHAR)); + return 3; + } + + return 0; +} + +int get_parameters(nssm_service_t *service, STARTUPINFO *si) { + unsigned long ret; + + /* Try to open the registry */ + HKEY key = open_registry(service->name, KEY_READ); + if (! key) return 1; + + /* Don't expand parameters when retrieving for the GUI. */ + bool expand = si ? true : false; + + /* Try to get environment variables - may fail */ + get_environment(service->name, key, NSSM_REG_ENV, &service->env, &service->envlen); + /* Environment variables to add to existing rather than replace - may fail. */ + get_environment(service->name, key, NSSM_REG_ENV_EXTRA, &service->env_extra, &service->env_extralen); + + /* Set environment if we are starting the service. */ + if (si) set_service_environment(service); + /* Try to get executable file - MUST succeed */ - if (expand_parameter(key, NSSM_REG_EXE, exe, exelen, false)) { + if (get_string(key, NSSM_REG_EXE, service->exe, sizeof(service->exe), expand, false, true)) { RegCloseKey(key); return 3; } /* Try to get flags - may fail and we don't care */ - if (expand_parameter(key, NSSM_REG_FLAGS, flags, flagslen, false)) { - log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_NO_FLAGS, NSSM_REG_FLAGS, service_name, exe, 0); - ZeroMemory(flags, flagslen); + if (get_string(key, NSSM_REG_FLAGS, service->flags, sizeof(service->flags), expand, false, true)) { + log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_NO_FLAGS, NSSM_REG_FLAGS, service->name, service->exe, 0); + ZeroMemory(service->flags, sizeof(service->flags)); } /* Try to get startup directory - may fail and we fall back to a default */ - if (expand_parameter(key, NSSM_REG_DIR, dir, dirlen, true) || ! dir[0]) { - /* Our buffers are defined to be long enough for this to be safe */ - size_t i; - for (i = strlen(exe); i && exe[i] != '\\' && exe[i] != '/'; i--); - if (i) { - memmove(dir, exe, i); - dir[i] = '\0'; - } - else { + if (get_string(key, NSSM_REG_DIR, service->dir, sizeof(service->dir), expand, true, true) || ! service->dir[0]) { + _sntprintf_s(service->dir, _countof(service->dir), _TRUNCATE, _T("%s"), service->exe); + strip_basename(service->dir); + if (service->dir[0] == _T('\0')) { /* Help! */ - unsigned long ret = GetWindowsDirectory(dir, dirlen); - if (! ret || ret > dirlen) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_NO_DIR_AND_NO_FALLBACK, NSSM_REG_DIR, service_name, 0); + ret = GetWindowsDirectory(service->dir, sizeof(service->dir)); + if (! ret || ret > sizeof(service->dir)) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_NO_DIR_AND_NO_FALLBACK, NSSM_REG_DIR, service->name, 0); RegCloseKey(key); return 4; } } - log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_NO_DIR, NSSM_REG_DIR, service_name, dir, 0); + log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_NO_DIR, NSSM_REG_DIR, service->name, service->dir, 0); + } + + /* Try to get processor affinity - may fail. */ + TCHAR buffer[512]; + if (get_string(key, NSSM_REG_AFFINITY, buffer, sizeof(buffer), false, false, false) || ! buffer[0]) service->affinity = 0LL; + else if (affinity_string_to_mask(buffer, &service->affinity)) { + log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_BOGUS_AFFINITY_MASK, service->name, buffer); + service->affinity = 0LL; + } + else { + DWORD_PTR affinity, system_affinity; + + if (GetProcessAffinityMask(GetCurrentProcess(), &affinity, &system_affinity)) { + _int64 effective_affinity = service->affinity & system_affinity; + if (effective_affinity != service->affinity) { + TCHAR *system = 0; + if (! affinity_mask_to_string(system_affinity, &system)) { + TCHAR *effective = 0; + if (! affinity_mask_to_string(effective_affinity, &effective)) { + log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_EFFECTIVE_AFFINITY_MASK, service->name, buffer, system, effective, 0); + } + HeapFree(GetProcessHeap(), 0, effective); + } + HeapFree(GetProcessHeap(), 0, system); + } + } + } + + /* Try to get priority - may fail. */ + unsigned long priority; + if (get_number(key, NSSM_REG_PRIORITY, &priority, false) == 1) { + if (priority == (priority & priority_mask())) service->priority = priority; + else log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_BOGUS_PRIORITY, service->name, NSSM_REG_PRIORITY, 0); + } + + /* Try to get hook I/O sharing - may fail. */ + unsigned long hook_share_output_handles; + if (get_number(key, NSSM_REG_HOOK_SHARE_OUTPUT_HANDLES, &hook_share_output_handles, false) == 1) { + if (hook_share_output_handles) service->hook_share_output_handles = true; + else service->hook_share_output_handles = false; + } + else hook_share_output_handles = false; + /* Try to get file rotation settings - may fail. */ + unsigned long rotate_files; + if (get_number(key, NSSM_REG_ROTATE, &rotate_files, false) == 1) { + if (rotate_files) service->rotate_files = true; + else service->rotate_files = false; + } + else service->rotate_files = false; + if (get_number(key, NSSM_REG_ROTATE_ONLINE, &rotate_files, false) == 1) { + if (rotate_files) service->rotate_stdout_online = service->rotate_stderr_online = true; + else service->rotate_stdout_online = service->rotate_stderr_online = false; + } + else service->rotate_stdout_online = service->rotate_stderr_online = false; + /* Log timestamping requires a logging thread.*/ + unsigned long timestamp_log; + if (get_number(key, NSSM_REG_TIMESTAMP_LOG, ×tamp_log, false) == 1) { + if (timestamp_log) service->timestamp_log = true; + else service->timestamp_log = false; + } + else service->timestamp_log = false; + + /* Hook I/O sharing and online rotation need a pipe. */ + service->use_stdout_pipe = service->rotate_stdout_online || service->timestamp_log || hook_share_output_handles; + service->use_stderr_pipe = service->rotate_stderr_online || service->timestamp_log || hook_share_output_handles; + if (get_number(key, NSSM_REG_ROTATE_SECONDS, &service->rotate_seconds, false) != 1) service->rotate_seconds = 0; + if (get_number(key, NSSM_REG_ROTATE_BYTES_LOW, &service->rotate_bytes_low, false) != 1) service->rotate_bytes_low = 0; + if (get_number(key, NSSM_REG_ROTATE_BYTES_HIGH, &service->rotate_bytes_high, false) != 1) service->rotate_bytes_high = 0; + override_milliseconds(service->name, key, NSSM_REG_ROTATE_DELAY, &service->rotate_delay, NSSM_ROTATE_DELAY, NSSM_EVENT_BOGUS_THROTTLE); + + /* Try to get force new console setting - may fail. */ + if (get_number(key, NSSM_REG_NO_CONSOLE, &service->no_console, false) != 1) service->no_console = 0; + + /* Change to startup directory in case stdout/stderr are relative paths. */ + TCHAR cwd[PATH_LENGTH]; + GetCurrentDirectory(_countof(cwd), cwd); + SetCurrentDirectory(service->dir); + + /* Try to get stdout and stderr */ + if (get_io_parameters(service, key)) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_GET_OUTPUT_HANDLES_FAILED, service->name, 0); + RegCloseKey(key); + SetCurrentDirectory(cwd); + return 5; + } + + /* Change back in case the startup directory needs to be deleted. */ + SetCurrentDirectory(cwd); + + /* Try to get mandatory restart delay */ + override_milliseconds(service->name, key, NSSM_REG_RESTART_DELAY, &service->restart_delay, 0, NSSM_EVENT_BOGUS_RESTART_DELAY); + + /* Try to get throttle restart delay */ + override_milliseconds(service->name, key, NSSM_REG_THROTTLE, &service->throttle_delay, NSSM_RESET_THROTTLE_RESTART, NSSM_EVENT_BOGUS_THROTTLE); + + /* Try to get service stop flags. */ + unsigned long type = REG_DWORD; + unsigned long stop_method_skip; + unsigned long buflen = sizeof(stop_method_skip); + bool stop_ok = false; + ret = RegQueryValueEx(key, NSSM_REG_STOP_METHOD_SKIP, 0, &type, (unsigned char *) &stop_method_skip, &buflen); + if (ret != ERROR_SUCCESS) { + if (ret != ERROR_FILE_NOT_FOUND) { + if (type != REG_DWORD) { + log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_BOGUS_STOP_METHOD_SKIP, service->name, NSSM_REG_STOP_METHOD_SKIP, NSSM, 0); + } + else log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, NSSM_REG_STOP_METHOD_SKIP, error_string(ret), 0); + } + } + else stop_ok = true; + + /* Try all methods except those requested to be skipped. */ + service->stop_method = ~0; + if (stop_ok) service->stop_method &= ~stop_method_skip; + + /* Try to get kill delays - may fail. */ + override_milliseconds(service->name, key, NSSM_REG_KILL_CONSOLE_GRACE_PERIOD, &service->kill_console_delay, NSSM_KILL_CONSOLE_GRACE_PERIOD, NSSM_EVENT_BOGUS_KILL_CONSOLE_GRACE_PERIOD); + override_milliseconds(service->name, key, NSSM_REG_KILL_WINDOW_GRACE_PERIOD, &service->kill_window_delay, NSSM_KILL_WINDOW_GRACE_PERIOD, NSSM_EVENT_BOGUS_KILL_WINDOW_GRACE_PERIOD); + override_milliseconds(service->name, key, NSSM_REG_KILL_THREADS_GRACE_PERIOD, &service->kill_threads_delay, NSSM_KILL_THREADS_GRACE_PERIOD, NSSM_EVENT_BOGUS_KILL_THREADS_GRACE_PERIOD); + + /* Try to get process tree settings - may fail. */ + unsigned long kill_process_tree; + if (get_number(key, NSSM_REG_KILL_PROCESS_TREE, &kill_process_tree, false) == 1) { + if (kill_process_tree) service->kill_process_tree = true; + else service->kill_process_tree = false; + } + else service->kill_process_tree = true; + + /* Try to get default exit action. */ + bool default_action; + service->default_exit_action = NSSM_EXIT_RESTART; + TCHAR action_string[ACTION_LEN]; + if (! get_exit_action(service->name, 0, action_string, &default_action)) { + for (int i = 0; exit_action_strings[i]; i++) { + if (! _tcsnicmp((const TCHAR *) action_string, exit_action_strings[i], ACTION_LEN)) { + service->default_exit_action = i; + break; + } + } } /* Close registry */ @@ -196,35 +923,39 @@ int get_parameters(char *service_name, char *exe, int exelen, char *flags, int f return 0; } -int get_exit_action(char *service_name, unsigned long *ret, unsigned char *action, bool *default_action) { +/* + Sets the string for the exit action corresponding to the exit code. + + ret is a pointer to an unsigned long containing the exit code. + If ret is NULL, we retrieve the default exit action unconditionally. + + action is a buffer which receives the string. + + default_action is a pointer to a bool which is set to false if there + was an explicit string for the given exit code, or true if we are + returning the default action. + + Returns: 0 on success. + 1 on error. +*/ +int get_exit_action(const TCHAR *service_name, unsigned long *ret, TCHAR *action, bool *default_action) { /* Are we returning the default action or a status-specific one? */ *default_action = ! ret; - /* Get registry */ - char registry[KEY_LENGTH]; - if (_snprintf(registry, sizeof(registry), NSSM_REGISTRY "\\%s", service_name, NSSM_REG_EXIT) < 0) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, "NSSM_REG_EXIT", "get_exit_action()", 0); - return 1; - } - /* Try to open the registry */ - HKEY key; - long error = RegOpenKeyEx(HKEY_LOCAL_MACHINE, registry, 0, KEY_READ, &key); - if (error != ERROR_SUCCESS && error != ERROR_FILE_NOT_FOUND) { - log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0); - return 2; - } + HKEY key = open_registry(service_name, NSSM_REG_EXIT, KEY_READ); + if (! key) return 1; unsigned long type = REG_SZ; unsigned long action_len = ACTION_LEN; - char code[64]; - if (! ret) code[0] = '\0'; - else if (_snprintf(code, sizeof(code), "%lu", *ret) < 0) { + TCHAR code[16]; + if (! ret) code[0] = _T('\0'); + else if (_sntprintf_s(code, _countof(code), _TRUNCATE, _T("%lu"), *ret) < 0) { RegCloseKey(key); return get_exit_action(service_name, 0, action, default_action); } - if (RegQueryValueEx(key, code, 0, &type, action, &action_len) != ERROR_SUCCESS) { + if (RegQueryValueEx(key, code, 0, &type, (unsigned char *) action, &action_len) != ERROR_SUCCESS) { RegCloseKey(key); /* Try again with * as the key if an exit code was defined */ if (ret) return get_exit_action(service_name, 0, action, default_action); @@ -236,3 +967,64 @@ int get_exit_action(char *service_name, unsigned long *ret, unsigned char *actio return 0; } + +int set_hook(const TCHAR *service_name, const TCHAR *hook_event, const TCHAR *hook_action, TCHAR *cmd) { + /* Try to open the registry */ + TCHAR registry[KEY_LENGTH]; + if (_sntprintf_s(registry, _countof(registry), _TRUNCATE, _T("%s\\%s"), NSSM_REG_HOOK, hook_event) < 0) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("hook registry"), _T("set_hook()"), 0); + return 1; + } + + HKEY key; + long error; + + /* Don't create keys needlessly. */ + if (! _tcslen(cmd)) { + key = open_registry(service_name, registry, KEY_READ, false); + if (! key) return 0; + error = RegQueryValueEx(key, hook_action, 0, 0, 0, 0); + RegCloseKey(key); + if (error == ERROR_FILE_NOT_FOUND) return 0; + } + + key = open_registry(service_name, registry, KEY_WRITE); + if (! key) return 1; + + int ret = 1; + if (_tcslen(cmd)) ret = set_string(key, (TCHAR *) hook_action, cmd, true); + else { + error = RegDeleteValue(key, hook_action); + if (error == ERROR_SUCCESS || error == ERROR_FILE_NOT_FOUND) ret = 0; + } + + /* Close registry */ + RegCloseKey(key); + + return ret; +} + +int get_hook(const TCHAR *service_name, const TCHAR *hook_event, const TCHAR *hook_action, TCHAR *buffer, unsigned long buflen) { + /* Try to open the registry */ + TCHAR registry[KEY_LENGTH]; + if (_sntprintf_s(registry, _countof(registry), _TRUNCATE, _T("%s\\%s"), NSSM_REG_HOOK, hook_event) < 0) { + log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("hook registry"), _T("get_hook()"), 0); + return 1; + } + HKEY key; + long error = open_registry(service_name, registry, KEY_READ, &key, false); + if (! key) { + if (error == ERROR_FILE_NOT_FOUND) { + ZeroMemory(buffer, buflen); + return 0; + } + return 1; + } + + int ret = expand_parameter(key, (TCHAR *) hook_action, buffer, buflen, true, false); + + /* Close registry */ + RegCloseKey(key); + + return ret; +}