registry.cpp 36 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860
  1. #include "nssm.h"
  2. extern const TCHAR *exit_action_strings[];
  3. static int service_registry_path(const TCHAR *service_name, bool parameters, const TCHAR *sub, TCHAR *buffer, unsigned long buflen) {
  4. int ret;
  5. if (parameters) {
  6. if (sub) ret = _sntprintf_s(buffer, buflen, _TRUNCATE, NSSM_REGISTRY _T("\\") NSSM_REG_PARAMETERS _T("\\%s"), service_name, sub);
  7. else ret = _sntprintf_s(buffer, buflen, _TRUNCATE, NSSM_REGISTRY _T("\\") NSSM_REG_PARAMETERS, service_name);
  8. }
  9. else ret = _sntprintf_s(buffer, buflen, _TRUNCATE, NSSM_REGISTRY, service_name);
  10. return ret;
  11. }
  12. static long open_registry_key(const TCHAR *registry, REGSAM sam, HKEY *key, bool must_exist) {
  13. long error;
  14. if (sam & KEY_SET_VALUE) {
  15. error = RegCreateKeyEx(HKEY_LOCAL_MACHINE, registry, 0, 0, REG_OPTION_NON_VOLATILE, sam, 0, key, 0);
  16. if (error != ERROR_SUCCESS) {
  17. *key = 0;
  18. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0);
  19. return error;
  20. }
  21. }
  22. else {
  23. error = RegOpenKeyEx(HKEY_LOCAL_MACHINE, registry, 0, sam, key);
  24. if (error != ERROR_SUCCESS) {
  25. *key = 0;
  26. if (error != ERROR_FILE_NOT_FOUND || must_exist) log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0);
  27. }
  28. }
  29. return error;
  30. }
  31. static HKEY open_registry_key(const TCHAR *registry, REGSAM sam, bool must_exist) {
  32. HKEY key;
  33. long error = open_registry_key(registry, sam, &key, must_exist);
  34. return key;
  35. }
  36. int create_messages() {
  37. HKEY key;
  38. TCHAR registry[KEY_LENGTH];
  39. if (_sntprintf_s(registry, _countof(registry), _TRUNCATE, _T("SYSTEM\\CurrentControlSet\\Services\\EventLog\\Application\\%s"), NSSM) < 0) {
  40. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("eventlog registry"), _T("create_messages()"), 0);
  41. return 1;
  42. }
  43. if (RegCreateKeyEx(HKEY_LOCAL_MACHINE, registry, 0, 0, REG_OPTION_NON_VOLATILE, KEY_WRITE, 0, &key, 0) != ERROR_SUCCESS) {
  44. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0);
  45. return 2;
  46. }
  47. /* Get path of this program */
  48. const TCHAR *path = nssm_unquoted_imagepath();
  49. /* Try to register the module but don't worry so much on failure */
  50. RegSetValueEx(key, _T("EventMessageFile"), 0, REG_SZ, (const unsigned char *) path, (unsigned long) (_tcslen(path) + 1) * sizeof(TCHAR));
  51. unsigned long types = EVENTLOG_INFORMATION_TYPE | EVENTLOG_WARNING_TYPE | EVENTLOG_ERROR_TYPE;
  52. RegSetValueEx(key, _T("TypesSupported"), 0, REG_DWORD, (const unsigned char *) &types, sizeof(types));
  53. return 0;
  54. }
  55. long enumerate_registry_values(HKEY key, unsigned long *index, TCHAR *name, unsigned long namelen) {
  56. unsigned long type;
  57. unsigned long datalen = namelen;
  58. long error = RegEnumValue(key, *index, name, &datalen, 0, &type, 0, 0);
  59. if (error == ERROR_SUCCESS) ++*index;
  60. return error;
  61. }
  62. int create_parameters(nssm_service_t *service, bool editing) {
  63. /* Try to open the registry */
  64. HKEY key = open_registry(service->name, KEY_WRITE);
  65. if (! key) return 1;
  66. /* Remember parameters in case we need to delete them. */
  67. TCHAR registry[KEY_LENGTH];
  68. int ret = service_registry_path(service->name, true, 0, registry, _countof(registry));
  69. /* Try to create the parameters */
  70. if (set_expand_string(key, NSSM_REG_EXE, service->exe)) {
  71. if (ret > 0) RegDeleteKey(HKEY_LOCAL_MACHINE, registry);
  72. RegCloseKey(key);
  73. return 2;
  74. }
  75. if (set_expand_string(key, NSSM_REG_FLAGS, service->flags)) {
  76. if (ret > 0) RegDeleteKey(HKEY_LOCAL_MACHINE, registry);
  77. RegCloseKey(key);
  78. return 3;
  79. }
  80. if (set_expand_string(key, NSSM_REG_DIR, service->dir)) {
  81. if (ret > 0) RegDeleteKey(HKEY_LOCAL_MACHINE, registry);
  82. RegCloseKey(key);
  83. return 4;
  84. }
  85. /* Other non-default parameters. May fail. */
  86. if (service->priority != NORMAL_PRIORITY_CLASS) set_number(key, NSSM_REG_PRIORITY, service->priority);
  87. else if (editing) RegDeleteValue(key, NSSM_REG_PRIORITY);
  88. if (service->affinity) {
  89. TCHAR *string;
  90. if (! affinity_mask_to_string(service->affinity, &string)) {
  91. if (RegSetValueEx(key, NSSM_REG_AFFINITY, 0, REG_SZ, (const unsigned char *) string, (unsigned long) (_tcslen(string) + 1) * sizeof(TCHAR)) != ERROR_SUCCESS) {
  92. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_AFFINITY, error_string(GetLastError()), 0);
  93. HeapFree(GetProcessHeap(), 0, string);
  94. return 5;
  95. }
  96. }
  97. if (string) HeapFree(GetProcessHeap(), 0, string);
  98. }
  99. else if (editing) RegDeleteValue(key, NSSM_REG_AFFINITY);
  100. unsigned long stop_method_skip = ~service->stop_method;
  101. if (stop_method_skip) set_number(key, NSSM_REG_STOP_METHOD_SKIP, stop_method_skip);
  102. else if (editing) RegDeleteValue(key, NSSM_REG_STOP_METHOD_SKIP);
  103. if (service->default_exit_action < NSSM_NUM_EXIT_ACTIONS) create_exit_action(service->name, exit_action_strings[service->default_exit_action], editing);
  104. if (service->restart_delay) set_number(key, NSSM_REG_RESTART_DELAY, service->restart_delay);
  105. else if (editing) RegDeleteValue(key, NSSM_REG_RESTART_DELAY);
  106. if (service->throttle_delay != NSSM_RESET_THROTTLE_RESTART) set_number(key, NSSM_REG_THROTTLE, service->throttle_delay);
  107. else if (editing) RegDeleteValue(key, NSSM_REG_THROTTLE);
  108. if (service->kill_console_delay != NSSM_KILL_CONSOLE_GRACE_PERIOD) set_number(key, NSSM_REG_KILL_CONSOLE_GRACE_PERIOD, service->kill_console_delay);
  109. else if (editing) RegDeleteValue(key, NSSM_REG_KILL_CONSOLE_GRACE_PERIOD);
  110. if (service->kill_window_delay != NSSM_KILL_WINDOW_GRACE_PERIOD) set_number(key, NSSM_REG_KILL_WINDOW_GRACE_PERIOD, service->kill_window_delay);
  111. else if (editing) RegDeleteValue(key, NSSM_REG_KILL_WINDOW_GRACE_PERIOD);
  112. if (service->kill_threads_delay != NSSM_KILL_THREADS_GRACE_PERIOD) set_number(key, NSSM_REG_KILL_THREADS_GRACE_PERIOD, service->kill_threads_delay);
  113. else if (editing) RegDeleteValue(key, NSSM_REG_KILL_THREADS_GRACE_PERIOD);
  114. if (! service->kill_process_tree) set_number(key, NSSM_REG_KILL_PROCESS_TREE, 0);
  115. else if (editing) RegDeleteValue(key, NSSM_REG_KILL_PROCESS_TREE);
  116. if (service->stdin_path[0] || editing) {
  117. if (service->stdin_path[0]) set_expand_string(key, NSSM_REG_STDIN, service->stdin_path);
  118. else if (editing) RegDeleteValue(key, NSSM_REG_STDIN);
  119. if (service->stdin_sharing != NSSM_STDIN_SHARING) set_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_SHARING, service->stdin_sharing);
  120. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_SHARING);
  121. if (service->stdin_disposition != NSSM_STDIN_DISPOSITION) set_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_DISPOSITION, service->stdin_disposition);
  122. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_DISPOSITION);
  123. if (service->stdin_flags != NSSM_STDIN_FLAGS) set_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_FLAGS, service->stdin_flags);
  124. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_FLAGS);
  125. }
  126. if (service->stdout_path[0] || editing) {
  127. if (service->stdout_path[0]) set_expand_string(key, NSSM_REG_STDOUT, service->stdout_path);
  128. else if (editing) RegDeleteValue(key, NSSM_REG_STDOUT);
  129. if (service->stdout_sharing != NSSM_STDOUT_SHARING) set_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_SHARING, service->stdout_sharing);
  130. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_SHARING);
  131. if (service->stdout_disposition != NSSM_STDOUT_DISPOSITION) set_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_DISPOSITION, service->stdout_disposition);
  132. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_DISPOSITION);
  133. if (service->stdout_flags != NSSM_STDOUT_FLAGS) set_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_FLAGS, service->stdout_flags);
  134. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_FLAGS);
  135. if (service->stdout_copy_and_truncate) set_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_COPY_AND_TRUNCATE, 1);
  136. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_COPY_AND_TRUNCATE);
  137. }
  138. if (service->stderr_path[0] || editing) {
  139. if (service->stderr_path[0]) set_expand_string(key, NSSM_REG_STDERR, service->stderr_path);
  140. else if (editing) RegDeleteValue(key, NSSM_REG_STDERR);
  141. if (service->stderr_sharing != NSSM_STDERR_SHARING) set_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_SHARING, service->stderr_sharing);
  142. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_SHARING);
  143. if (service->stderr_disposition != NSSM_STDERR_DISPOSITION) set_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_DISPOSITION, service->stderr_disposition);
  144. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_DISPOSITION);
  145. if (service->stderr_flags != NSSM_STDERR_FLAGS) set_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_FLAGS, service->stderr_flags);
  146. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_FLAGS);
  147. if (service->stderr_copy_and_truncate) set_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_COPY_AND_TRUNCATE, 1);
  148. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_COPY_AND_TRUNCATE);
  149. }
  150. if (service->hook_share_output_handles) set_number(key, NSSM_REG_HOOK_SHARE_OUTPUT_HANDLES, 1);
  151. else if (editing) RegDeleteValue(key, NSSM_REG_HOOK_SHARE_OUTPUT_HANDLES);
  152. if (service->rotate_files) set_number(key, NSSM_REG_ROTATE, 1);
  153. else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE);
  154. if (service->rotate_stdout_online) set_number(key, NSSM_REG_ROTATE_ONLINE, 1);
  155. else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_ONLINE);
  156. if (service->rotate_seconds) set_number(key, NSSM_REG_ROTATE_SECONDS, service->rotate_seconds);
  157. else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_SECONDS);
  158. if (service->rotate_bytes_low) set_number(key, NSSM_REG_ROTATE_BYTES_LOW, service->rotate_bytes_low);
  159. else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_BYTES_LOW);
  160. if (service->rotate_bytes_high) set_number(key, NSSM_REG_ROTATE_BYTES_HIGH, service->rotate_bytes_high);
  161. else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_BYTES_HIGH);
  162. if (service->rotate_delay != NSSM_ROTATE_DELAY) set_number(key, NSSM_REG_ROTATE_DELAY, service->rotate_delay);
  163. else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_DELAY);
  164. if (service->no_console) set_number(key, NSSM_REG_NO_CONSOLE, 1);
  165. else if (editing) RegDeleteValue(key, NSSM_REG_NO_CONSOLE);
  166. /* Environment */
  167. if (service->env) {
  168. if (RegSetValueEx(key, NSSM_REG_ENV, 0, REG_MULTI_SZ, (const unsigned char *) service->env, (unsigned long) service->envlen * sizeof(TCHAR)) != ERROR_SUCCESS) {
  169. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_ENV, error_string(GetLastError()), 0);
  170. }
  171. }
  172. else if (editing) RegDeleteValue(key, NSSM_REG_ENV);
  173. if (service->env_extra) {
  174. if (RegSetValueEx(key, NSSM_REG_ENV_EXTRA, 0, REG_MULTI_SZ, (const unsigned char *) service->env_extra, (unsigned long) service->env_extralen * sizeof(TCHAR)) != ERROR_SUCCESS) {
  175. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_ENV_EXTRA, error_string(GetLastError()), 0);
  176. }
  177. }
  178. else if (editing) RegDeleteValue(key, NSSM_REG_ENV_EXTRA);
  179. /* Close registry. */
  180. RegCloseKey(key);
  181. return 0;
  182. }
  183. int create_exit_action(TCHAR *service_name, const TCHAR *action_string, bool editing) {
  184. /* Get registry */
  185. TCHAR registry[KEY_LENGTH];
  186. if (service_registry_path(service_name, true, NSSM_REG_EXIT, registry, _countof(registry)) < 0) {
  187. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("NSSM_REG_EXIT"), _T("create_exit_action()"), 0);
  188. return 1;
  189. }
  190. /* Try to open the registry */
  191. HKEY key;
  192. unsigned long disposition;
  193. if (RegCreateKeyEx(HKEY_LOCAL_MACHINE, registry, 0, 0, REG_OPTION_NON_VOLATILE, KEY_WRITE, 0, &key, &disposition) != ERROR_SUCCESS) {
  194. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0);
  195. return 2;
  196. }
  197. /* Do nothing if the key already existed */
  198. if (disposition == REG_OPENED_EXISTING_KEY && ! editing) {
  199. RegCloseKey(key);
  200. return 0;
  201. }
  202. /* Create the default value */
  203. if (RegSetValueEx(key, 0, 0, REG_SZ, (const unsigned char *) action_string, (unsigned long) (_tcslen(action_string) + 1) * sizeof(TCHAR)) != ERROR_SUCCESS) {
  204. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_EXIT, error_string(GetLastError()), 0);
  205. RegCloseKey(key);
  206. return 3;
  207. }
  208. /* Close registry */
  209. RegCloseKey(key);
  210. return 0;
  211. }
  212. int get_environment(TCHAR *service_name, HKEY key, TCHAR *value, TCHAR **env, unsigned long *envlen) {
  213. unsigned long type = REG_MULTI_SZ;
  214. unsigned long envsize;
  215. *envlen = 0;
  216. /* Dummy test to find buffer size */
  217. unsigned long ret = RegQueryValueEx(key, value, 0, &type, NULL, &envsize);
  218. if (ret != ERROR_SUCCESS) {
  219. *env = 0;
  220. /* The service probably doesn't have any environment configured */
  221. if (ret == ERROR_FILE_NOT_FOUND) return 0;
  222. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(ret), 0);
  223. return 1;
  224. }
  225. if (type != REG_MULTI_SZ) {
  226. log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_INVALID_ENVIRONMENT_STRING_TYPE, value, service_name, 0);
  227. *env = 0;
  228. return 2;
  229. }
  230. /* Probably not possible */
  231. if (! envsize) return 0;
  232. /* Previously initialised? */
  233. if (*env) HeapFree(GetProcessHeap(), 0, *env);
  234. *env = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, envsize);
  235. if (! *env) {
  236. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, value, _T("get_environment()"), 0);
  237. return 3;
  238. }
  239. /* Actually get the strings. */
  240. ret = RegQueryValueEx(key, value, 0, &type, (unsigned char *) *env, &envsize);
  241. if (ret != ERROR_SUCCESS) {
  242. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(ret), 0);
  243. HeapFree(GetProcessHeap(), 0, *env);
  244. *env = 0;
  245. return 4;
  246. }
  247. /* Value retrieved by RegQueryValueEx() is SIZE not COUNT. */
  248. *envlen = (unsigned long) environment_length(env);
  249. return 0;
  250. }
  251. int get_string(HKEY key, TCHAR *value, TCHAR *data, unsigned long datalen, bool expand, bool sanitise, bool must_exist) {
  252. TCHAR *buffer = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, datalen);
  253. if (! buffer) {
  254. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, value, _T("get_string()"), 0);
  255. return 1;
  256. }
  257. ZeroMemory(data, datalen);
  258. unsigned long type = REG_EXPAND_SZ;
  259. unsigned long buflen = datalen;
  260. unsigned long ret = RegQueryValueEx(key, value, 0, &type, (unsigned char *) buffer, &buflen);
  261. if (ret != ERROR_SUCCESS) {
  262. HeapFree(GetProcessHeap(), 0, buffer);
  263. if (ret == ERROR_FILE_NOT_FOUND) {
  264. if (! must_exist) return 0;
  265. }
  266. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(ret), 0);
  267. return 2;
  268. }
  269. /* Paths aren't allowed to contain quotes. */
  270. if (sanitise) PathUnquoteSpaces(buffer);
  271. /* Do we want to expand the string? */
  272. if (! expand) {
  273. if (type == REG_EXPAND_SZ) type = REG_SZ;
  274. }
  275. /* Technically we shouldn't expand environment strings from REG_SZ values */
  276. if (type != REG_EXPAND_SZ) {
  277. memmove(data, buffer, buflen);
  278. HeapFree(GetProcessHeap(), 0, buffer);
  279. return 0;
  280. }
  281. ret = ExpandEnvironmentStrings((TCHAR *) buffer, data, datalen);
  282. if (! ret || ret > datalen) {
  283. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_EXPANDENVIRONMENTSTRINGS_FAILED, buffer, error_string(GetLastError()), 0);
  284. HeapFree(GetProcessHeap(), 0, buffer);
  285. return 3;
  286. }
  287. HeapFree(GetProcessHeap(), 0, buffer);
  288. return 0;
  289. }
  290. int get_string(HKEY key, TCHAR *value, TCHAR *data, unsigned long datalen, bool sanitise) {
  291. return get_string(key, value, data, datalen, false, sanitise, true);
  292. }
  293. int expand_parameter(HKEY key, TCHAR *value, TCHAR *data, unsigned long datalen, bool sanitise, bool must_exist) {
  294. return get_string(key, value, data, datalen, true, sanitise, must_exist);
  295. }
  296. int expand_parameter(HKEY key, TCHAR *value, TCHAR *data, unsigned long datalen, bool sanitise) {
  297. return expand_parameter(key, value, data, datalen, sanitise, true);
  298. }
  299. /*
  300. Sets a string in the registry.
  301. Returns: 0 if it was set.
  302. 1 on error.
  303. */
  304. int set_string(HKEY key, TCHAR *value, TCHAR *string, bool expand) {
  305. unsigned long type = expand ? REG_EXPAND_SZ : REG_SZ;
  306. if (RegSetValueEx(key, value, 0, type, (const unsigned char *) string, (unsigned long) (_tcslen(string) + 1) * sizeof(TCHAR)) == ERROR_SUCCESS) return 0;
  307. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, value, error_string(GetLastError()), 0);
  308. return 1;
  309. }
  310. int set_string(HKEY key, TCHAR *value, TCHAR *string) {
  311. return set_string(key, value, string, false);
  312. }
  313. int set_expand_string(HKEY key, TCHAR *value, TCHAR *string) {
  314. return set_string(key, value, string, true);
  315. }
  316. /*
  317. Set an unsigned long in the registry.
  318. Returns: 0 if it was set.
  319. 1 on error.
  320. */
  321. int set_number(HKEY key, TCHAR *value, unsigned long number) {
  322. if (RegSetValueEx(key, value, 0, REG_DWORD, (const unsigned char *) &number, sizeof(number)) == ERROR_SUCCESS) return 0;
  323. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, value, error_string(GetLastError()), 0);
  324. return 1;
  325. }
  326. /*
  327. Query an unsigned long from the registry.
  328. Returns: 1 if a number was retrieved.
  329. 0 if none was found and must_exist is false.
  330. -1 if none was found and must_exist is true.
  331. -2 otherwise.
  332. */
  333. int get_number(HKEY key, TCHAR *value, unsigned long *number, bool must_exist) {
  334. unsigned long type = REG_DWORD;
  335. unsigned long number_len = sizeof(unsigned long);
  336. int ret = RegQueryValueEx(key, value, 0, &type, (unsigned char *) number, &number_len);
  337. if (ret == ERROR_SUCCESS) return 1;
  338. if (ret == ERROR_FILE_NOT_FOUND) {
  339. if (! must_exist) return 0;
  340. }
  341. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(ret), 0);
  342. if (ret == ERROR_FILE_NOT_FOUND) return -1;
  343. return -2;
  344. }
  345. int get_number(HKEY key, TCHAR *value, unsigned long *number) {
  346. return get_number(key, value, number, true);
  347. }
  348. /* Replace NULL with CRLF. Leave NULL NULL as the end marker. */
  349. int format_double_null(TCHAR *dn, unsigned long dnlen, TCHAR **formatted, unsigned long *newlen) {
  350. unsigned long i, j;
  351. *newlen = dnlen;
  352. if (! *newlen) {
  353. *formatted = 0;
  354. return 0;
  355. }
  356. for (i = 0; i < dnlen; i++) if (! dn[i] && dn[i + 1]) ++*newlen;
  357. *formatted = (TCHAR *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, *newlen * sizeof(TCHAR));
  358. if (! *formatted) {
  359. *newlen = 0;
  360. return 1;
  361. }
  362. for (i = 0, j = 0; i < dnlen; i++) {
  363. (*formatted)[j] = dn[i];
  364. if (! dn[i]) {
  365. if (dn[i + 1]) {
  366. (*formatted)[j] = _T('\r');
  367. (*formatted)[++j] = _T('\n');
  368. }
  369. }
  370. j++;
  371. }
  372. return 0;
  373. }
  374. /* Strip CR and replace LF with NULL. */
  375. int unformat_double_null(TCHAR *dn, unsigned long dnlen, TCHAR **unformatted, unsigned long *newlen) {
  376. unsigned long i, j;
  377. *newlen = 0;
  378. if (! dnlen) {
  379. *unformatted = 0;
  380. return 0;
  381. }
  382. for (i = 0; i < dnlen; i++) if (dn[i] != _T('\r')) ++*newlen;
  383. /* Skip blank lines. */
  384. for (i = 0; i < dnlen; i++) {
  385. if (dn[i] == _T('\r') && dn[i + 1] == _T('\n')) {
  386. /* This is the last CRLF. */
  387. if (i >= dnlen - 2) break;
  388. /*
  389. Strip at the start of the block or if the next characters are
  390. CRLF too.
  391. */
  392. if (! i || (dn[i + 2] == _T('\r') && dn[i + 3] == _T('\n'))) {
  393. for (j = i + 2; j < dnlen; j++) dn[j - 2] = dn[j];
  394. dn[dnlen--] = _T('\0');
  395. dn[dnlen--] = _T('\0');
  396. i--;
  397. --*newlen;
  398. }
  399. }
  400. }
  401. /* Must end with two NULLs. */
  402. *newlen += 2;
  403. *unformatted = (TCHAR *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, *newlen * sizeof(TCHAR));
  404. if (! *unformatted) return 1;
  405. for (i = 0, j = 0; i < dnlen; i++) {
  406. if (dn[i] == _T('\r')) continue;
  407. if (dn[i] == _T('\n')) (*unformatted)[j] = _T('\0');
  408. else (*unformatted)[j] = dn[i];
  409. j++;
  410. }
  411. return 0;
  412. }
  413. void override_milliseconds(TCHAR *service_name, HKEY key, TCHAR *value, unsigned long *buffer, unsigned long default_value, unsigned long event) {
  414. unsigned long type = REG_DWORD;
  415. unsigned long buflen = sizeof(unsigned long);
  416. bool ok = false;
  417. unsigned long ret = RegQueryValueEx(key, value, 0, &type, (unsigned char *) buffer, &buflen);
  418. if (ret != ERROR_SUCCESS) {
  419. if (ret != ERROR_FILE_NOT_FOUND) {
  420. if (type != REG_DWORD) {
  421. TCHAR milliseconds[16];
  422. _sntprintf_s(milliseconds, _countof(milliseconds), _TRUNCATE, _T("%lu"), default_value);
  423. log_event(EVENTLOG_WARNING_TYPE, event, service_name, value, milliseconds, 0);
  424. }
  425. else log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(ret), 0);
  426. }
  427. }
  428. else ok = true;
  429. if (! ok) *buffer = default_value;
  430. }
  431. HKEY open_service_registry(const TCHAR *service_name, REGSAM sam, bool must_exist) {
  432. /* Get registry */
  433. TCHAR registry[KEY_LENGTH];
  434. if (service_registry_path(service_name, false, 0, registry, _countof(registry)) < 0) {
  435. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, NSSM_REGISTRY, _T("open_service_registry()"), 0);
  436. return 0;
  437. }
  438. return open_registry_key(registry, sam, must_exist);
  439. }
  440. long open_registry(const TCHAR *service_name, const TCHAR *sub, REGSAM sam, HKEY *key, bool must_exist) {
  441. /* Get registry */
  442. TCHAR registry[KEY_LENGTH];
  443. if (service_registry_path(service_name, true, sub, registry, _countof(registry)) < 0) {
  444. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, NSSM_REGISTRY, _T("open_registry()"), 0);
  445. return 0;
  446. }
  447. return open_registry_key(registry, sam, key, must_exist);
  448. }
  449. HKEY open_registry(const TCHAR *service_name, const TCHAR *sub, REGSAM sam, bool must_exist) {
  450. HKEY key;
  451. long error = open_registry(service_name, sub, sam, &key, must_exist);
  452. return key;
  453. }
  454. HKEY open_registry(const TCHAR *service_name, const TCHAR *sub, REGSAM sam) {
  455. return open_registry(service_name, sub, sam, true);
  456. }
  457. HKEY open_registry(const TCHAR *service_name, REGSAM sam) {
  458. return open_registry(service_name, 0, sam, true);
  459. }
  460. int get_io_parameters(nssm_service_t *service, HKEY key) {
  461. /* stdin */
  462. if (get_createfile_parameters(key, NSSM_REG_STDIN, service->stdin_path, &service->stdin_sharing, NSSM_STDIN_SHARING, &service->stdin_disposition, NSSM_STDIN_DISPOSITION, &service->stdin_flags, NSSM_STDIN_FLAGS, 0)) {
  463. service->stdin_sharing = service->stdin_disposition = service->stdin_flags = 0;
  464. ZeroMemory(service->stdin_path, _countof(service->stdin_path) * sizeof(TCHAR));
  465. return 1;
  466. }
  467. /* stdout */
  468. if (get_createfile_parameters(key, NSSM_REG_STDOUT, service->stdout_path, &service->stdout_sharing, NSSM_STDOUT_SHARING, &service->stdout_disposition, NSSM_STDOUT_DISPOSITION, &service->stdout_flags, NSSM_STDOUT_FLAGS, &service->stdout_copy_and_truncate)) {
  469. service->stdout_sharing = service->stdout_disposition = service->stdout_flags = 0;
  470. ZeroMemory(service->stdout_path, _countof(service->stdout_path) * sizeof(TCHAR));
  471. return 2;
  472. }
  473. /* stderr */
  474. if (get_createfile_parameters(key, NSSM_REG_STDERR, service->stderr_path, &service->stderr_sharing, NSSM_STDERR_SHARING, &service->stderr_disposition, NSSM_STDERR_DISPOSITION, &service->stderr_flags, NSSM_STDERR_FLAGS, &service->stderr_copy_and_truncate)) {
  475. service->stderr_sharing = service->stderr_disposition = service->stderr_flags = 0;
  476. ZeroMemory(service->stderr_path, _countof(service->stderr_path) * sizeof(TCHAR));
  477. return 3;
  478. }
  479. return 0;
  480. }
  481. int get_parameters(nssm_service_t *service, STARTUPINFO *si) {
  482. unsigned long ret;
  483. /* Try to open the registry */
  484. HKEY key = open_registry(service->name, KEY_READ);
  485. if (! key) return 1;
  486. /* Don't expand parameters when retrieving for the GUI. */
  487. bool expand = si ? true : false;
  488. /* Try to get environment variables - may fail */
  489. get_environment(service->name, key, NSSM_REG_ENV, &service->env, &service->envlen);
  490. /* Environment variables to add to existing rather than replace - may fail. */
  491. get_environment(service->name, key, NSSM_REG_ENV_EXTRA, &service->env_extra, &service->env_extralen);
  492. /* Set environment if we are starting the service. */
  493. if (si) set_service_environment(service);
  494. /* Try to get executable file - MUST succeed */
  495. if (get_string(key, NSSM_REG_EXE, service->exe, sizeof(service->exe), expand, false, true)) {
  496. RegCloseKey(key);
  497. return 3;
  498. }
  499. /* Try to get flags - may fail and we don't care */
  500. if (get_string(key, NSSM_REG_FLAGS, service->flags, sizeof(service->flags), expand, false, true)) {
  501. log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_NO_FLAGS, NSSM_REG_FLAGS, service->name, service->exe, 0);
  502. ZeroMemory(service->flags, sizeof(service->flags));
  503. }
  504. /* Try to get startup directory - may fail and we fall back to a default */
  505. if (get_string(key, NSSM_REG_DIR, service->dir, sizeof(service->dir), expand, true, true) || ! service->dir[0]) {
  506. _sntprintf_s(service->dir, _countof(service->dir), _TRUNCATE, _T("%s"), service->exe);
  507. strip_basename(service->dir);
  508. if (service->dir[0] == _T('\0')) {
  509. /* Help! */
  510. ret = GetWindowsDirectory(service->dir, sizeof(service->dir));
  511. if (! ret || ret > sizeof(service->dir)) {
  512. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_NO_DIR_AND_NO_FALLBACK, NSSM_REG_DIR, service->name, 0);
  513. RegCloseKey(key);
  514. return 4;
  515. }
  516. }
  517. log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_NO_DIR, NSSM_REG_DIR, service->name, service->dir, 0);
  518. }
  519. /* Try to get processor affinity - may fail. */
  520. TCHAR buffer[512];
  521. if (get_string(key, NSSM_REG_AFFINITY, buffer, sizeof(buffer), false, false, false) || ! buffer[0]) service->affinity = 0LL;
  522. else if (affinity_string_to_mask(buffer, &service->affinity)) {
  523. log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_BOGUS_AFFINITY_MASK, service->name, buffer);
  524. service->affinity = 0LL;
  525. }
  526. else {
  527. DWORD_PTR affinity, system_affinity;
  528. if (GetProcessAffinityMask(GetCurrentProcess(), &affinity, &system_affinity)) {
  529. _int64 effective_affinity = service->affinity & system_affinity;
  530. if (effective_affinity != service->affinity) {
  531. TCHAR *system = 0;
  532. if (! affinity_mask_to_string(system_affinity, &system)) {
  533. TCHAR *effective = 0;
  534. if (! affinity_mask_to_string(effective_affinity, &effective)) {
  535. log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_EFFECTIVE_AFFINITY_MASK, service->name, buffer, system, effective, 0);
  536. }
  537. HeapFree(GetProcessHeap(), 0, effective);
  538. }
  539. HeapFree(GetProcessHeap(), 0, system);
  540. }
  541. }
  542. }
  543. /* Try to get priority - may fail. */
  544. unsigned long priority;
  545. if (get_number(key, NSSM_REG_PRIORITY, &priority, false) == 1) {
  546. if (priority == (priority & priority_mask())) service->priority = priority;
  547. else log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_BOGUS_PRIORITY, service->name, NSSM_REG_PRIORITY, 0);
  548. }
  549. /* Try to get hook I/O sharing - may fail. */
  550. unsigned long hook_share_output_handles;
  551. if (get_number(key, NSSM_REG_HOOK_SHARE_OUTPUT_HANDLES, &hook_share_output_handles, false) == 1) {
  552. if (hook_share_output_handles) service->hook_share_output_handles = true;
  553. else service->hook_share_output_handles = false;
  554. }
  555. else hook_share_output_handles = false;
  556. /* Try to get file rotation settings - may fail. */
  557. unsigned long rotate_files;
  558. if (get_number(key, NSSM_REG_ROTATE, &rotate_files, false) == 1) {
  559. if (rotate_files) service->rotate_files = true;
  560. else service->rotate_files = false;
  561. }
  562. else service->rotate_files = false;
  563. if (get_number(key, NSSM_REG_ROTATE_ONLINE, &rotate_files, false) == 1) {
  564. if (rotate_files) service->rotate_stdout_online = service->rotate_stderr_online = true;
  565. else service->rotate_stdout_online = service->rotate_stderr_online = false;
  566. }
  567. else service->rotate_stdout_online = service->rotate_stderr_online = false;
  568. /* Hook I/O sharing and online rotation need a pipe. */
  569. service->use_stdout_pipe = service->rotate_stdout_online || hook_share_output_handles;
  570. service->use_stderr_pipe = service->rotate_stderr_online || hook_share_output_handles;
  571. if (get_number(key, NSSM_REG_ROTATE_SECONDS, &service->rotate_seconds, false) != 1) service->rotate_seconds = 0;
  572. if (get_number(key, NSSM_REG_ROTATE_BYTES_LOW, &service->rotate_bytes_low, false) != 1) service->rotate_bytes_low = 0;
  573. if (get_number(key, NSSM_REG_ROTATE_BYTES_HIGH, &service->rotate_bytes_high, false) != 1) service->rotate_bytes_high = 0;
  574. override_milliseconds(service->name, key, NSSM_REG_ROTATE_DELAY, &service->rotate_delay, NSSM_ROTATE_DELAY, NSSM_EVENT_BOGUS_THROTTLE);
  575. /* Try to get force new console setting - may fail. */
  576. if (get_number(key, NSSM_REG_NO_CONSOLE, &service->no_console, false) != 1) service->no_console = 0;
  577. /* Change to startup directory in case stdout/stderr are relative paths. */
  578. TCHAR cwd[PATH_LENGTH];
  579. GetCurrentDirectory(_countof(cwd), cwd);
  580. SetCurrentDirectory(service->dir);
  581. /* Try to get stdout and stderr */
  582. if (get_io_parameters(service, key)) {
  583. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_GET_OUTPUT_HANDLES_FAILED, service->name, 0);
  584. RegCloseKey(key);
  585. SetCurrentDirectory(cwd);
  586. return 5;
  587. }
  588. /* Change back in case the startup directory needs to be deleted. */
  589. SetCurrentDirectory(cwd);
  590. /* Try to get mandatory restart delay */
  591. override_milliseconds(service->name, key, NSSM_REG_RESTART_DELAY, &service->restart_delay, 0, NSSM_EVENT_BOGUS_RESTART_DELAY);
  592. /* Try to get throttle restart delay */
  593. override_milliseconds(service->name, key, NSSM_REG_THROTTLE, &service->throttle_delay, NSSM_RESET_THROTTLE_RESTART, NSSM_EVENT_BOGUS_THROTTLE);
  594. /* Try to get service stop flags. */
  595. unsigned long type = REG_DWORD;
  596. unsigned long stop_method_skip;
  597. unsigned long buflen = sizeof(stop_method_skip);
  598. bool stop_ok = false;
  599. ret = RegQueryValueEx(key, NSSM_REG_STOP_METHOD_SKIP, 0, &type, (unsigned char *) &stop_method_skip, &buflen);
  600. if (ret != ERROR_SUCCESS) {
  601. if (ret != ERROR_FILE_NOT_FOUND) {
  602. if (type != REG_DWORD) {
  603. log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_BOGUS_STOP_METHOD_SKIP, service->name, NSSM_REG_STOP_METHOD_SKIP, NSSM, 0);
  604. }
  605. else log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, NSSM_REG_STOP_METHOD_SKIP, error_string(ret), 0);
  606. }
  607. }
  608. else stop_ok = true;
  609. /* Try all methods except those requested to be skipped. */
  610. service->stop_method = ~0;
  611. if (stop_ok) service->stop_method &= ~stop_method_skip;
  612. /* Try to get kill delays - may fail. */
  613. override_milliseconds(service->name, key, NSSM_REG_KILL_CONSOLE_GRACE_PERIOD, &service->kill_console_delay, NSSM_KILL_CONSOLE_GRACE_PERIOD, NSSM_EVENT_BOGUS_KILL_CONSOLE_GRACE_PERIOD);
  614. override_milliseconds(service->name, key, NSSM_REG_KILL_WINDOW_GRACE_PERIOD, &service->kill_window_delay, NSSM_KILL_WINDOW_GRACE_PERIOD, NSSM_EVENT_BOGUS_KILL_WINDOW_GRACE_PERIOD);
  615. override_milliseconds(service->name, key, NSSM_REG_KILL_THREADS_GRACE_PERIOD, &service->kill_threads_delay, NSSM_KILL_THREADS_GRACE_PERIOD, NSSM_EVENT_BOGUS_KILL_THREADS_GRACE_PERIOD);
  616. /* Try to get process tree settings - may fail. */
  617. unsigned long kill_process_tree;
  618. if (get_number(key, NSSM_REG_KILL_PROCESS_TREE, &kill_process_tree, false) == 1) {
  619. if (kill_process_tree) service->kill_process_tree = true;
  620. else service->kill_process_tree = false;
  621. }
  622. else service->kill_process_tree = true;
  623. /* Try to get default exit action. */
  624. bool default_action;
  625. service->default_exit_action = NSSM_EXIT_RESTART;
  626. TCHAR action_string[ACTION_LEN];
  627. if (! get_exit_action(service->name, 0, action_string, &default_action)) {
  628. for (int i = 0; exit_action_strings[i]; i++) {
  629. if (! _tcsnicmp((const TCHAR *) action_string, exit_action_strings[i], ACTION_LEN)) {
  630. service->default_exit_action = i;
  631. break;
  632. }
  633. }
  634. }
  635. /* Close registry */
  636. RegCloseKey(key);
  637. return 0;
  638. }
  639. /*
  640. Sets the string for the exit action corresponding to the exit code.
  641. ret is a pointer to an unsigned long containing the exit code.
  642. If ret is NULL, we retrieve the default exit action unconditionally.
  643. action is a buffer which receives the string.
  644. default_action is a pointer to a bool which is set to false if there
  645. was an explicit string for the given exit code, or true if we are
  646. returning the default action.
  647. Returns: 0 on success.
  648. 1 on error.
  649. */
  650. int get_exit_action(const TCHAR *service_name, unsigned long *ret, TCHAR *action, bool *default_action) {
  651. /* Are we returning the default action or a status-specific one? */
  652. *default_action = ! ret;
  653. /* Try to open the registry */
  654. HKEY key = open_registry(service_name, NSSM_REG_EXIT, KEY_READ);
  655. if (! key) return 1;
  656. unsigned long type = REG_SZ;
  657. unsigned long action_len = ACTION_LEN;
  658. TCHAR code[16];
  659. if (! ret) code[0] = _T('\0');
  660. else if (_sntprintf_s(code, _countof(code), _TRUNCATE, _T("%lu"), *ret) < 0) {
  661. RegCloseKey(key);
  662. return get_exit_action(service_name, 0, action, default_action);
  663. }
  664. if (RegQueryValueEx(key, code, 0, &type, (unsigned char *) action, &action_len) != ERROR_SUCCESS) {
  665. RegCloseKey(key);
  666. /* Try again with * as the key if an exit code was defined */
  667. if (ret) return get_exit_action(service_name, 0, action, default_action);
  668. return 0;
  669. }
  670. /* Close registry */
  671. RegCloseKey(key);
  672. return 0;
  673. }
  674. int set_hook(const TCHAR *service_name, const TCHAR *hook_event, const TCHAR *hook_action, TCHAR *cmd) {
  675. /* Try to open the registry */
  676. TCHAR registry[KEY_LENGTH];
  677. if (_sntprintf_s(registry, _countof(registry), _TRUNCATE, _T("%s\\%s"), NSSM_REG_HOOK, hook_event) < 0) {
  678. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("hook registry"), _T("set_hook()"), 0);
  679. return 1;
  680. }
  681. HKEY key;
  682. long error;
  683. /* Don't create keys needlessly. */
  684. if (! _tcslen(cmd)) {
  685. key = open_registry(service_name, registry, KEY_READ, false);
  686. if (! key) return 0;
  687. error = RegQueryValueEx(key, hook_action, 0, 0, 0, 0);
  688. RegCloseKey(key);
  689. if (error == ERROR_FILE_NOT_FOUND) return 0;
  690. }
  691. key = open_registry(service_name, registry, KEY_WRITE);
  692. if (! key) return 1;
  693. int ret = 1;
  694. if (_tcslen(cmd)) ret = set_string(key, (TCHAR *) hook_action, cmd, true);
  695. else {
  696. error = RegDeleteValue(key, hook_action);
  697. if (error == ERROR_SUCCESS || error == ERROR_FILE_NOT_FOUND) ret = 0;
  698. }
  699. /* Close registry */
  700. RegCloseKey(key);
  701. return ret;
  702. }
  703. int get_hook(const TCHAR *service_name, const TCHAR *hook_event, const TCHAR *hook_action, TCHAR *buffer, unsigned long buflen) {
  704. /* Try to open the registry */
  705. TCHAR registry[KEY_LENGTH];
  706. if (_sntprintf_s(registry, _countof(registry), _TRUNCATE, _T("%s\\%s"), NSSM_REG_HOOK, hook_event) < 0) {
  707. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("hook registry"), _T("get_hook()"), 0);
  708. return 1;
  709. }
  710. HKEY key;
  711. long error = open_registry(service_name, registry, KEY_READ, &key, false);
  712. if (! key) {
  713. if (error == ERROR_FILE_NOT_FOUND) {
  714. ZeroMemory(buffer, buflen);
  715. return 0;
  716. }
  717. return 1;
  718. }
  719. int ret = expand_parameter(key, (TCHAR *) hook_action, buffer, buflen, true, false);
  720. /* Close registry */
  721. RegCloseKey(key);
  722. return ret;
  723. }