3 extern unsigned long tls_index;
\r
4 extern bool is_admin;
\r
6 /* String function */
\r
7 int str_equiv(const char *a, const char *b) {
\r
10 if (tolower(b[i]) != tolower(a[i])) return 0;
\r
11 if (! a[i]) return 1;
\r
15 /* How to use me correctly */
\r
16 int usage(int ret) {
\r
17 fprintf(stderr, "NSSM: The non-sucking service manager\n");
\r
18 fprintf(stderr, "Version %s, %s\n", NSSM_VERSION, NSSM_DATE);
\r
19 fprintf(stderr, "Usage: nssm <option> [args]\n\n");
\r
20 fprintf(stderr, "To show service installation GUI:\n\n");
\r
21 fprintf(stderr, " nssm install [<servicename>]\n\n");
\r
22 fprintf(stderr, "To install a service without confirmation:\n\n");
\r
23 fprintf(stderr, " nssm install <servicename> <app> [<args>]\n\n");
\r
24 fprintf(stderr, "To show service removal GUI:\n\n");
\r
25 fprintf(stderr, " nssm remove [<servicename>]\n\n");
\r
26 fprintf(stderr, "To remove a service without confirmation:\n\n");
\r
27 fprintf(stderr, " nssm remove <servicename> confirm\n");
\r
31 void check_admin() {
\r
34 /* Lifted from MSDN examples */
\r
35 PSID AdministratorsGroup;
\r
36 SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY;
\r
37 if (! AllocateAndInitializeSid(&NtAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &AdministratorsGroup)) return;
\r
38 CheckTokenMembership(0, AdministratorsGroup, /*XXX*/(PBOOL) &is_admin);
\r
39 FreeSid(AdministratorsGroup);
\r
42 int main(int argc, char **argv) {
\r
43 /* Remember if we are admin */
\r
48 if (str_equiv(argv[1], "install") || str_equiv(argv[1], "remove")) {
\r
50 fprintf(stderr, "Administrator access is needed to %s a service.\n", argv[1]);
\r
55 /* Valid commands are install or remove */
\r
56 if (str_equiv(argv[1], "install")) {
\r
57 exit(pre_install_service(argc - 2, argv + 2));
\r
59 if (str_equiv(argv[1], "remove")) {
\r
60 exit(pre_remove_service(argc - 2, argv + 2));
\r
64 /* Thread local storage for error message buffer */
\r
65 tls_index = TlsAlloc();
\r
67 /* Register messages */
\r
68 if (is_admin) create_messages();
\r
70 /* Start service magic */
\r
71 SERVICE_TABLE_ENTRY table[] = { { NSSM, service_main }, { 0, 0 } };
\r
72 if (! StartServiceCtrlDispatcher(table)) {
\r
73 unsigned long error = GetLastError();
\r
74 /* User probably ran nssm with no argument */
\r
75 if (error == ERROR_FAILED_SERVICE_CONTROLLER_CONNECT) exit(usage(1));
\r
76 log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_DISPATCHER_FAILED, error_string(error), 0);
\r
80 /* And nothing more to do */
\r