registry.cpp 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612
  1. #include "nssm.h"
  2. extern const TCHAR *exit_action_strings[];
  3. int create_messages() {
  4. HKEY key;
  5. TCHAR registry[KEY_LENGTH];
  6. if (_sntprintf_s(registry, _countof(registry), _TRUNCATE, _T("SYSTEM\\CurrentControlSet\\Services\\EventLog\\Application\\%s"), NSSM) < 0) {
  7. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("eventlog registry"), _T("create_messages()"), 0);
  8. return 1;
  9. }
  10. if (RegCreateKeyEx(HKEY_LOCAL_MACHINE, registry, 0, 0, REG_OPTION_NON_VOLATILE, KEY_WRITE, 0, &key, 0) != ERROR_SUCCESS) {
  11. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0);
  12. return 2;
  13. }
  14. /* Get path of this program */
  15. TCHAR path[MAX_PATH];
  16. GetModuleFileName(0, path, _countof(path));
  17. /* Try to register the module but don't worry so much on failure */
  18. RegSetValueEx(key, _T("EventMessageFile"), 0, REG_SZ, (const unsigned char *) path, (unsigned long) (_tcslen(path) + 1) * sizeof(TCHAR));
  19. unsigned long types = EVENTLOG_INFORMATION_TYPE | EVENTLOG_WARNING_TYPE | EVENTLOG_ERROR_TYPE;
  20. RegSetValueEx(key, _T("TypesSupported"), 0, REG_DWORD, (const unsigned char *) &types, sizeof(types));
  21. return 0;
  22. }
  23. int create_parameters(nssm_service_t *service, bool editing) {
  24. /* Try to open the registry */
  25. HKEY key = open_registry(service->name, KEY_WRITE);
  26. if (! key) return 1;
  27. /* Try to create the parameters */
  28. if (set_expand_string(key, NSSM_REG_EXE, service->exe)) {
  29. RegDeleteKey(HKEY_LOCAL_MACHINE, NSSM_REGISTRY);
  30. RegCloseKey(key);
  31. return 2;
  32. }
  33. if (set_expand_string(key, NSSM_REG_FLAGS, service->flags)) {
  34. RegDeleteKey(HKEY_LOCAL_MACHINE, NSSM_REGISTRY);
  35. RegCloseKey(key);
  36. return 3;
  37. }
  38. if (set_expand_string(key, NSSM_REG_DIR, service->dir)) {
  39. RegDeleteKey(HKEY_LOCAL_MACHINE, NSSM_REGISTRY);
  40. RegCloseKey(key);
  41. return 4;
  42. }
  43. /* Other non-default parameters. May fail. */
  44. unsigned long stop_method_skip = ~service->stop_method;
  45. if (stop_method_skip) set_number(key, NSSM_REG_STOP_METHOD_SKIP, stop_method_skip);
  46. else if (editing) RegDeleteValue(key, NSSM_REG_STOP_METHOD_SKIP);
  47. if (service->default_exit_action < NSSM_NUM_EXIT_ACTIONS) create_exit_action(service->name, exit_action_strings[service->default_exit_action], editing);
  48. if (service->throttle_delay != NSSM_RESET_THROTTLE_RESTART) set_number(key, NSSM_REG_THROTTLE, service->throttle_delay);
  49. else if (editing) RegDeleteValue(key, NSSM_REG_THROTTLE);
  50. if (service->kill_console_delay != NSSM_KILL_CONSOLE_GRACE_PERIOD) set_number(key, NSSM_REG_KILL_CONSOLE_GRACE_PERIOD, service->kill_console_delay);
  51. else if (editing) RegDeleteValue(key, NSSM_REG_KILL_CONSOLE_GRACE_PERIOD);
  52. if (service->kill_window_delay != NSSM_KILL_WINDOW_GRACE_PERIOD) set_number(key, NSSM_REG_KILL_WINDOW_GRACE_PERIOD, service->kill_window_delay);
  53. else if (editing) RegDeleteValue(key, NSSM_REG_KILL_WINDOW_GRACE_PERIOD);
  54. if (service->kill_threads_delay != NSSM_KILL_THREADS_GRACE_PERIOD) set_number(key, NSSM_REG_KILL_THREADS_GRACE_PERIOD, service->kill_threads_delay);
  55. else if (editing) RegDeleteValue(key, NSSM_REG_KILL_THREADS_GRACE_PERIOD);
  56. if (service->stdin_path[0] || editing) {
  57. if (service->stdin_path[0]) set_expand_string(key, NSSM_REG_STDIN, service->stdin_path);
  58. else if (editing) RegDeleteValue(key, NSSM_REG_STDIN);
  59. if (service->stdin_sharing != NSSM_STDIN_SHARING) set_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_SHARING, service->stdin_sharing);
  60. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_SHARING);
  61. if (service->stdin_disposition != NSSM_STDIN_DISPOSITION) set_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_DISPOSITION, service->stdin_disposition);
  62. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_DISPOSITION);
  63. if (service->stdin_flags != NSSM_STDIN_FLAGS) set_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_FLAGS, service->stdin_flags);
  64. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDIN, NSSM_REG_STDIO_FLAGS);
  65. }
  66. if (service->stdout_path[0] || editing) {
  67. if (service->stdout_path[0]) set_expand_string(key, NSSM_REG_STDOUT, service->stdout_path);
  68. else if (editing) RegDeleteValue(key, NSSM_REG_STDOUT);
  69. if (service->stdout_sharing != NSSM_STDOUT_SHARING) set_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_SHARING, service->stdout_sharing);
  70. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_SHARING);
  71. if (service->stdout_disposition != NSSM_STDOUT_DISPOSITION) set_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_DISPOSITION, service->stdout_disposition);
  72. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_DISPOSITION);
  73. if (service->stdout_flags != NSSM_STDOUT_FLAGS) set_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_FLAGS, service->stdout_flags);
  74. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDOUT, NSSM_REG_STDIO_FLAGS);
  75. }
  76. if (service->stderr_path[0] || editing) {
  77. if (service->stderr_path[0]) set_expand_string(key, NSSM_REG_STDERR, service->stderr_path);
  78. else if (editing) RegDeleteValue(key, NSSM_REG_STDERR);
  79. if (service->stderr_sharing != NSSM_STDERR_SHARING) set_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_SHARING, service->stderr_sharing);
  80. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_SHARING);
  81. if (service->stderr_disposition != NSSM_STDERR_DISPOSITION) set_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_DISPOSITION, service->stderr_disposition);
  82. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_DISPOSITION);
  83. if (service->stderr_flags != NSSM_STDERR_FLAGS) set_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_FLAGS, service->stderr_flags);
  84. else if (editing) delete_createfile_parameter(key, NSSM_REG_STDERR, NSSM_REG_STDIO_FLAGS);
  85. }
  86. if (service->rotate_files) set_number(key, NSSM_REG_ROTATE, 1);
  87. else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE);
  88. if (service->rotate_seconds) set_number(key, NSSM_REG_ROTATE_SECONDS, service->rotate_seconds);
  89. else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_SECONDS);
  90. if (service->rotate_bytes_low) set_number(key, NSSM_REG_ROTATE_BYTES_LOW, service->rotate_bytes_low);
  91. else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_BYTES_LOW);
  92. if (service->rotate_bytes_high) set_number(key, NSSM_REG_ROTATE_BYTES_HIGH, service->rotate_bytes_high);
  93. else if (editing) RegDeleteValue(key, NSSM_REG_ROTATE_BYTES_HIGH);
  94. /* Environment */
  95. if (service->env) {
  96. if (RegSetValueEx(key, NSSM_REG_ENV, 0, REG_MULTI_SZ, (const unsigned char *) service->env, (unsigned long) service->envlen * sizeof(TCHAR)) != ERROR_SUCCESS) {
  97. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_ENV, error_string(GetLastError()), 0);
  98. }
  99. }
  100. else if (editing) RegDeleteValue(key, NSSM_REG_ENV);
  101. if (service->env_extra) {
  102. if (RegSetValueEx(key, NSSM_REG_ENV_EXTRA, 0, REG_MULTI_SZ, (const unsigned char *) service->env_extra, (unsigned long) service->env_extralen * sizeof(TCHAR)) != ERROR_SUCCESS) {
  103. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_ENV_EXTRA, error_string(GetLastError()), 0);
  104. }
  105. }
  106. else if (editing) RegDeleteValue(key, NSSM_REG_ENV_EXTRA);
  107. /* Close registry. */
  108. RegCloseKey(key);
  109. return 0;
  110. }
  111. int create_exit_action(TCHAR *service_name, const TCHAR *action_string, bool editing) {
  112. /* Get registry */
  113. TCHAR registry[KEY_LENGTH];
  114. if (_sntprintf_s(registry, _countof(registry), _TRUNCATE, NSSM_REGISTRY _T("\\%s"), service_name, NSSM_REG_EXIT) < 0) {
  115. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("NSSM_REG_EXIT"), _T("create_exit_action()"), 0);
  116. return 1;
  117. }
  118. /* Try to open the registry */
  119. HKEY key;
  120. unsigned long disposition;
  121. if (RegCreateKeyEx(HKEY_LOCAL_MACHINE, registry, 0, 0, REG_OPTION_NON_VOLATILE, KEY_WRITE, 0, &key, &disposition) != ERROR_SUCCESS) {
  122. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0);
  123. return 2;
  124. }
  125. /* Do nothing if the key already existed */
  126. if (disposition == REG_OPENED_EXISTING_KEY && ! editing) {
  127. RegCloseKey(key);
  128. return 0;
  129. }
  130. /* Create the default value */
  131. if (RegSetValueEx(key, 0, 0, REG_SZ, (const unsigned char *) action_string, (unsigned long) (_tcslen(action_string) + 1) * sizeof(TCHAR)) != ERROR_SUCCESS) {
  132. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, NSSM_REG_EXIT, error_string(GetLastError()), 0);
  133. RegCloseKey(key);
  134. return 3;
  135. }
  136. /* Close registry */
  137. RegCloseKey(key);
  138. return 0;
  139. }
  140. int set_environment(TCHAR *service_name, HKEY key, TCHAR *value, TCHAR **env, unsigned long *envlen) {
  141. unsigned long type = REG_MULTI_SZ;
  142. /* Dummy test to find buffer size */
  143. unsigned long ret = RegQueryValueEx(key, value, 0, &type, NULL, envlen);
  144. if (ret != ERROR_SUCCESS) {
  145. *env = 0;
  146. *envlen = 0;
  147. /* The service probably doesn't have any environment configured */
  148. if (ret == ERROR_FILE_NOT_FOUND) return 0;
  149. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(GetLastError()), 0);
  150. return 1;
  151. }
  152. if (type != REG_MULTI_SZ) {
  153. *env = 0;
  154. *envlen = 0;
  155. log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_INVALID_ENVIRONMENT_STRING_TYPE, value, service_name, 0);
  156. return 2;
  157. }
  158. /* Probably not possible */
  159. if (! *envlen) return 0;
  160. /* Previously initialised? */
  161. if (*env) HeapFree(GetProcessHeap(), 0, *env);
  162. *env = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, *envlen);
  163. if (! *env) {
  164. *envlen = 0;
  165. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, value, _T("set_environment()"), 0);
  166. return 3;
  167. }
  168. /* Actually get the strings */
  169. ret = RegQueryValueEx(key, value, 0, &type, (unsigned char *) *env, envlen);
  170. if (ret != ERROR_SUCCESS) {
  171. HeapFree(GetProcessHeap(), 0, *env);
  172. *env = 0;
  173. *envlen = 0;
  174. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(GetLastError()), 0);
  175. return 4;
  176. }
  177. return 0;
  178. }
  179. /* Replace NULL with CRLF. Leave NULL NULL as the end marker. */
  180. int format_environment(TCHAR *env, unsigned long envlen, TCHAR **formatted, unsigned long *newlen) {
  181. unsigned long i, j;
  182. *newlen = envlen;
  183. if (! *newlen) {
  184. *formatted = 0;
  185. return 0;
  186. }
  187. for (i = 0; i < envlen; i++) if (! env[i] && env[i + 1]) ++*newlen;
  188. *formatted = (TCHAR *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, *newlen * sizeof(TCHAR));
  189. if (! *formatted) {
  190. *newlen = 0;
  191. return 1;
  192. }
  193. for (i = 0, j = 0; i < envlen; i++) {
  194. (*formatted)[j] = env[i];
  195. if (! env[i]) {
  196. if (env[i + 1]) {
  197. (*formatted)[j] = _T('\r');
  198. (*formatted)[++j] = _T('\n');
  199. }
  200. }
  201. j++;
  202. }
  203. return 0;
  204. }
  205. /* Strip CR and replace LF with NULL. */
  206. int unformat_environment(TCHAR *env, unsigned long envlen, TCHAR **unformatted, unsigned long *newlen) {
  207. unsigned long i, j;
  208. *newlen = 0;
  209. if (! envlen) {
  210. *unformatted = 0;
  211. return 0;
  212. }
  213. for (i = 0; i < envlen; i++) if (env[i] != _T('\r')) ++*newlen;
  214. /* Must end with two NULLs. */
  215. *newlen += 2;
  216. *unformatted = (TCHAR *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, *newlen * sizeof(TCHAR));
  217. if (! *unformatted) return 1;
  218. for (i = 0, j = 0; i < envlen; i++) {
  219. if (env[i] == _T('\r')) continue;
  220. if (env[i] == _T('\n')) (*unformatted)[j] = _T('\0');
  221. else (*unformatted)[j] = env[i];
  222. j++;
  223. }
  224. return 0;
  225. }
  226. int expand_parameter(HKEY key, TCHAR *value, TCHAR *data, unsigned long datalen, bool sanitise, bool must_exist) {
  227. TCHAR *buffer = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, datalen);
  228. if (! buffer) {
  229. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, value, _T("expand_parameter()"), 0);
  230. return 1;
  231. }
  232. ZeroMemory(data, datalen);
  233. unsigned long type = REG_EXPAND_SZ;
  234. unsigned long buflen = datalen;
  235. unsigned long ret = RegQueryValueEx(key, value, 0, &type, (unsigned char *) buffer, &buflen);
  236. if (ret != ERROR_SUCCESS) {
  237. unsigned long error = GetLastError();
  238. HeapFree(GetProcessHeap(), 0, buffer);
  239. if (ret == ERROR_FILE_NOT_FOUND) {
  240. if (! must_exist) return 0;
  241. }
  242. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(error), 0);
  243. return 2;
  244. }
  245. /* Paths aren't allowed to contain quotes. */
  246. if (sanitise) PathUnquoteSpaces(buffer);
  247. /* Technically we shouldn't expand environment strings from REG_SZ values */
  248. if (type != REG_EXPAND_SZ) {
  249. memmove(data, buffer, buflen);
  250. HeapFree(GetProcessHeap(), 0, buffer);
  251. return 0;
  252. }
  253. ret = ExpandEnvironmentStrings((TCHAR *) buffer, data, datalen);
  254. if (! ret || ret > datalen) {
  255. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_EXPANDENVIRONMENTSTRINGS_FAILED, buffer, error_string(GetLastError()), 0);
  256. HeapFree(GetProcessHeap(), 0, buffer);
  257. return 3;
  258. }
  259. HeapFree(GetProcessHeap(), 0, buffer);
  260. return 0;
  261. }
  262. int expand_parameter(HKEY key, TCHAR *value, TCHAR *data, unsigned long datalen, bool sanitise) {
  263. return expand_parameter(key, value, data, datalen, sanitise, true);
  264. }
  265. /*
  266. Sets a string in the registry.
  267. Returns: 0 if it was set.
  268. 1 on error.
  269. */
  270. int set_expand_string(HKEY key, TCHAR *value, TCHAR *string) {
  271. if (RegSetValueEx(key, value, 0, REG_EXPAND_SZ, (const unsigned char *) string, (unsigned long) (_tcslen(string) + 1) * sizeof(TCHAR)) == ERROR_SUCCESS) return 0;
  272. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, value, error_string(GetLastError()), 0);
  273. return 1;
  274. }
  275. /*
  276. Set an unsigned long in the registry.
  277. Returns: 0 if it was set.
  278. 1 on error.
  279. */
  280. int set_number(HKEY key, TCHAR *value, unsigned long number) {
  281. if (RegSetValueEx(key, value, 0, REG_DWORD, (const unsigned char *) &number, sizeof(number)) == ERROR_SUCCESS) return 0;
  282. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_SETVALUE_FAILED, value, error_string(GetLastError()), 0);
  283. return 1;
  284. }
  285. /*
  286. Query an unsigned long from the registry.
  287. Returns: 1 if a number was retrieved.
  288. 0 if none was found and must_exist is false.
  289. -1 if none was found and must_exist is true.
  290. -2 otherwise.
  291. */
  292. int get_number(HKEY key, TCHAR *value, unsigned long *number, bool must_exist) {
  293. unsigned long type = REG_DWORD;
  294. unsigned long number_len = sizeof(unsigned long);
  295. int ret = RegQueryValueEx(key, value, 0, &type, (unsigned char *) number, &number_len);
  296. if (ret == ERROR_SUCCESS) return 1;
  297. if (ret == ERROR_FILE_NOT_FOUND) {
  298. if (! must_exist) return 0;
  299. }
  300. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(GetLastError()), 0);
  301. if (ret == ERROR_FILE_NOT_FOUND) return -1;
  302. return -2;
  303. }
  304. int get_number(HKEY key, TCHAR *value, unsigned long *number) {
  305. return get_number(key, value, number, true);
  306. }
  307. void override_milliseconds(TCHAR *service_name, HKEY key, TCHAR *value, unsigned long *buffer, unsigned long default_value, unsigned long event) {
  308. unsigned long type = REG_DWORD;
  309. unsigned long buflen = sizeof(unsigned long);
  310. bool ok = false;
  311. unsigned long ret = RegQueryValueEx(key, value, 0, &type, (unsigned char *) buffer, &buflen);
  312. if (ret != ERROR_SUCCESS) {
  313. if (ret != ERROR_FILE_NOT_FOUND) {
  314. if (type != REG_DWORD) {
  315. TCHAR milliseconds[16];
  316. _sntprintf_s(milliseconds, _countof(milliseconds), _TRUNCATE, _T("%lu"), default_value);
  317. log_event(EVENTLOG_WARNING_TYPE, event, service_name, value, milliseconds, 0);
  318. }
  319. else log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, value, error_string(GetLastError()), 0);
  320. }
  321. }
  322. else ok = true;
  323. if (! ok) *buffer = default_value;
  324. }
  325. HKEY open_registry(const TCHAR *service_name, const TCHAR *sub, REGSAM sam) {
  326. /* Get registry */
  327. TCHAR registry[KEY_LENGTH];
  328. HKEY key;
  329. int ret;
  330. if (sub) ret = _sntprintf_s(registry, _countof(registry), _TRUNCATE, NSSM_REGISTRY _T("\\%s"), service_name, sub);
  331. else ret = _sntprintf_s(registry, _countof(registry), _TRUNCATE, NSSM_REGISTRY, service_name);
  332. if (ret < 0) {
  333. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("NSSM_REGISTRY"), _T("open_registry()"), 0);
  334. return 0;
  335. }
  336. if (sam & KEY_WRITE) {
  337. if (RegCreateKeyEx(HKEY_LOCAL_MACHINE, registry, 0, 0, REG_OPTION_NON_VOLATILE, sam, 0, &key, 0) != ERROR_SUCCESS) {
  338. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0);
  339. return 0;
  340. }
  341. }
  342. else {
  343. if (RegOpenKeyEx(HKEY_LOCAL_MACHINE, registry, 0, sam, &key) != ERROR_SUCCESS) {
  344. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OPENKEY_FAILED, registry, error_string(GetLastError()), 0);
  345. return 0;
  346. }
  347. }
  348. return key;
  349. }
  350. HKEY open_registry(const TCHAR *service_name, REGSAM sam) {
  351. return open_registry(service_name, 0, sam);
  352. }
  353. int get_parameters(nssm_service_t *service, STARTUPINFO *si) {
  354. unsigned long ret;
  355. /* Try to open the registry */
  356. HKEY key = open_registry(service->name, KEY_READ);
  357. if (! key) return 1;
  358. /* Try to get executable file - MUST succeed */
  359. if (expand_parameter(key, NSSM_REG_EXE, service->exe, sizeof(service->exe), false)) {
  360. RegCloseKey(key);
  361. return 3;
  362. }
  363. /* Try to get flags - may fail and we don't care */
  364. if (expand_parameter(key, NSSM_REG_FLAGS, service->flags, sizeof(service->flags), false)) {
  365. log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_NO_FLAGS, NSSM_REG_FLAGS, service->name, service->exe, 0);
  366. ZeroMemory(service->flags, sizeof(service->flags));
  367. }
  368. /* Try to get startup directory - may fail and we fall back to a default */
  369. if (expand_parameter(key, NSSM_REG_DIR, service->dir, sizeof(service->dir), true) || ! service->dir[0]) {
  370. _sntprintf_s(service->dir, _countof(service->dir), _TRUNCATE, _T("%s"), service->exe);
  371. strip_basename(service->dir);
  372. if (service->dir[0] == _T('\0')) {
  373. /* Help! */
  374. ret = GetWindowsDirectory(service->dir, sizeof(service->dir));
  375. if (! ret || ret > sizeof(service->dir)) {
  376. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_NO_DIR_AND_NO_FALLBACK, NSSM_REG_DIR, service->name, 0);
  377. RegCloseKey(key);
  378. return 4;
  379. }
  380. }
  381. log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_NO_DIR, NSSM_REG_DIR, service->name, service->dir, 0);
  382. }
  383. /* Try to get environment variables - may fail */
  384. set_environment(service->name, key, NSSM_REG_ENV, &service->env, &service->envlen);
  385. /* Environment variables to add to existing rather than replace - may fail. */
  386. set_environment(service->name, key, NSSM_REG_ENV_EXTRA, &service->env_extra, &service->env_extralen);
  387. if (si) {
  388. if (service->env_extra) {
  389. /* Append these to any other environment variables set. */
  390. if (service->env) {
  391. /* Append extra variables to configured variables. */
  392. unsigned long envlen = service->envlen + service->env_extralen - 1;
  393. TCHAR *env = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, envlen);
  394. if (env) {
  395. memmove(env, service->env, service->envlen - sizeof(TCHAR));
  396. /* envlen is in bytes. */
  397. memmove(env + (service->envlen / sizeof(TCHAR)) - 1, service->env_extra, service->env_extralen);
  398. HeapFree(GetProcessHeap(), 0, service->env);
  399. service->env = env;
  400. service->envlen = envlen;
  401. }
  402. else log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_OUT_OF_MEMORY, _T("environment"), _T("get_parameters()"), 0);
  403. }
  404. else {
  405. /* Append extra variables to our environment. */
  406. TCHAR *env, *s;
  407. size_t envlen, len;
  408. env = service->env_extra;
  409. len = 0;
  410. while (*env) {
  411. envlen = _tcslen(env) + 1;
  412. for (s = env; *s && *s != _T('='); s++);
  413. if (*s == _T('=')) *s++ = _T('\0');
  414. if (! SetEnvironmentVariable(env, s)) log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_SETENVIRONMENTVARIABLE_FAILED, env, s, error_string(GetLastError()), 0);
  415. env += envlen;
  416. }
  417. }
  418. }
  419. }
  420. /* Try to get file rotation settings - may fail. */
  421. unsigned long rotate_files;
  422. if (get_number(key, NSSM_REG_ROTATE, &rotate_files, false) == 1) {
  423. if (rotate_files) service->rotate_files = true;
  424. else service->rotate_files = false;
  425. }
  426. else service->rotate_files = false;
  427. if (get_number(key, NSSM_REG_ROTATE_SECONDS, &service->rotate_seconds, false) != 1) service->rotate_seconds = 0;
  428. if (get_number(key, NSSM_REG_ROTATE_BYTES_LOW, &service->rotate_bytes_low, false) != 1) service->rotate_bytes_low = 0;
  429. if (get_number(key, NSSM_REG_ROTATE_BYTES_HIGH, &service->rotate_bytes_high, false) != 1) service->rotate_bytes_high = 0;
  430. /* Change to startup directory in case stdout/stderr are relative paths. */
  431. TCHAR cwd[MAX_PATH];
  432. GetCurrentDirectory(_countof(cwd), cwd);
  433. SetCurrentDirectory(service->dir);
  434. /* Try to get stdout and stderr */
  435. if (get_output_handles(service, key, si)) {
  436. log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_GET_OUTPUT_HANDLES_FAILED, service->name, 0);
  437. RegCloseKey(key);
  438. SetCurrentDirectory(cwd);
  439. return 5;
  440. }
  441. /* Change back in case the startup directory needs to be deleted. */
  442. SetCurrentDirectory(cwd);
  443. /* Try to get throttle restart delay */
  444. override_milliseconds(service->name, key, NSSM_REG_THROTTLE, &service->throttle_delay, NSSM_RESET_THROTTLE_RESTART, NSSM_EVENT_BOGUS_THROTTLE);
  445. /* Try to get service stop flags. */
  446. unsigned long type = REG_DWORD;
  447. unsigned long stop_method_skip;
  448. unsigned long buflen = sizeof(stop_method_skip);
  449. bool stop_ok = false;
  450. ret = RegQueryValueEx(key, NSSM_REG_STOP_METHOD_SKIP, 0, &type, (unsigned char *) &stop_method_skip, &buflen);
  451. if (ret != ERROR_SUCCESS) {
  452. if (ret != ERROR_FILE_NOT_FOUND) {
  453. if (type != REG_DWORD) {
  454. log_event(EVENTLOG_WARNING_TYPE, NSSM_EVENT_BOGUS_STOP_METHOD_SKIP, service->name, NSSM_REG_STOP_METHOD_SKIP, NSSM, 0);
  455. }
  456. else log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_QUERYVALUE_FAILED, NSSM_REG_STOP_METHOD_SKIP, error_string(GetLastError()), 0);
  457. }
  458. }
  459. else stop_ok = true;
  460. /* Try all methods except those requested to be skipped. */
  461. service->stop_method = ~0;
  462. if (stop_ok) service->stop_method &= ~stop_method_skip;
  463. /* Try to get kill delays - may fail. */
  464. override_milliseconds(service->name, key, NSSM_REG_KILL_CONSOLE_GRACE_PERIOD, &service->kill_console_delay, NSSM_KILL_CONSOLE_GRACE_PERIOD, NSSM_EVENT_BOGUS_KILL_CONSOLE_GRACE_PERIOD);
  465. override_milliseconds(service->name, key, NSSM_REG_KILL_WINDOW_GRACE_PERIOD, &service->kill_window_delay, NSSM_KILL_WINDOW_GRACE_PERIOD, NSSM_EVENT_BOGUS_KILL_WINDOW_GRACE_PERIOD);
  466. override_milliseconds(service->name, key, NSSM_REG_KILL_THREADS_GRACE_PERIOD, &service->kill_threads_delay, NSSM_KILL_THREADS_GRACE_PERIOD, NSSM_EVENT_BOGUS_KILL_THREADS_GRACE_PERIOD);
  467. /* Try to get default exit action. */
  468. bool default_action;
  469. service->default_exit_action = NSSM_EXIT_RESTART;
  470. TCHAR action_string[ACTION_LEN];
  471. if (! get_exit_action(service->name, 0, action_string, &default_action)) {
  472. for (int i = 0; exit_action_strings[i]; i++) {
  473. if (! _tcsnicmp((const TCHAR *) action_string, exit_action_strings[i], ACTION_LEN)) {
  474. service->default_exit_action = i;
  475. break;
  476. }
  477. }
  478. }
  479. /* Close registry */
  480. RegCloseKey(key);
  481. return 0;
  482. }
  483. /*
  484. Sets the string for the exit action corresponding to the exit code.
  485. ret is a pointer to an unsigned long containing the exit code.
  486. If ret is NULL, we retrieve the default exit action unconditionally.
  487. action is a buffer which receives the string.
  488. default_action is a pointer to a bool which is set to false if there
  489. was an explicit string for the given exit code, or true if we are
  490. returning the default action.
  491. Returns: 0 on success.
  492. 1 on error.
  493. */
  494. int get_exit_action(const TCHAR *service_name, unsigned long *ret, TCHAR *action, bool *default_action) {
  495. /* Are we returning the default action or a status-specific one? */
  496. *default_action = ! ret;
  497. /* Try to open the registry */
  498. HKEY key = open_registry(service_name, NSSM_REG_EXIT, KEY_READ);
  499. if (! key) return 1;
  500. unsigned long type = REG_SZ;
  501. unsigned long action_len = ACTION_LEN;
  502. TCHAR code[16];
  503. if (! ret) code[0] = _T('\0');
  504. else if (_sntprintf_s(code, _countof(code), _TRUNCATE, _T("%lu"), *ret) < 0) {
  505. RegCloseKey(key);
  506. return get_exit_action(service_name, 0, action, default_action);
  507. }
  508. if (RegQueryValueEx(key, code, 0, &type, (unsigned char *) action, &action_len) != ERROR_SUCCESS) {
  509. RegCloseKey(key);
  510. /* Try again with * as the key if an exit code was defined */
  511. if (ret) return get_exit_action(service_name, 0, action, default_action);
  512. return 0;
  513. }
  514. /* Close registry */
  515. RegCloseKey(key);
  516. return 0;
  517. }