mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2025-02-24 22:58:50 +01:00
Revert "Restore feature where nt-services detect non-"run_tor" modes."
This reverts commit 5c240db0bf
.
This commit is contained in:
parent
7f03ba06d8
commit
d7a22160f5
3 changed files with 35 additions and 29 deletions
|
@ -1274,13 +1274,6 @@ tor_run_main(const tor_main_configuration_t *tor_cfg)
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
if (tor_cfg->run_tor_only && get_options()->command != CMD_RUN_TOR) {
|
|
||||||
log_err(LD_CONFIG, "Unsupported command when running as an NT service.");
|
|
||||||
result = -1;
|
|
||||||
tor_cleanup();
|
|
||||||
goto done;
|
|
||||||
}
|
|
||||||
|
|
||||||
switch (get_options()->command) {
|
switch (get_options()->command) {
|
||||||
case CMD_RUN_TOR:
|
case CMD_RUN_TOR:
|
||||||
nt_service_set_state(SERVICE_RUNNING);
|
nt_service_set_state(SERVICE_RUNNING);
|
||||||
|
|
|
@ -29,8 +29,6 @@
|
||||||
#include "lib/evloop/compat_libevent.h"
|
#include "lib/evloop/compat_libevent.h"
|
||||||
#include "lib/fs/winlib.h"
|
#include "lib/fs/winlib.h"
|
||||||
#include "lib/log/win32err.h"
|
#include "lib/log/win32err.h"
|
||||||
#include "feature/api/tor_api.h"
|
|
||||||
#include "feature/api/tor_api_internal.h"
|
|
||||||
|
|
||||||
#include <windows.h>
|
#include <windows.h>
|
||||||
#define GENSRV_SERVICENAME "tor"
|
#define GENSRV_SERVICENAME "tor"
|
||||||
|
@ -265,6 +263,7 @@ nt_service_control(DWORD request)
|
||||||
static void
|
static void
|
||||||
nt_service_body(int argc, char **argv)
|
nt_service_body(int argc, char **argv)
|
||||||
{
|
{
|
||||||
|
int r;
|
||||||
(void) argc; /* unused */
|
(void) argc; /* unused */
|
||||||
(void) argv; /* unused */
|
(void) argv; /* unused */
|
||||||
nt_service_loadlibrary();
|
nt_service_loadlibrary();
|
||||||
|
@ -284,20 +283,24 @@ nt_service_body(int argc, char **argv)
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
tor_main_configuration_t *cfg = tor_main_configuration_new();
|
r = tor_init(backup_argc, backup_argv);
|
||||||
cfg->run_tor_only = 1;
|
if (r) {
|
||||||
if (tor_main_configuration_set_command_line(cfg, backup_argc,
|
/* Failed to start the Tor service */
|
||||||
backup_argv) < 0)
|
r = NT_SERVICE_ERROR_TORINIT_FAILED;
|
||||||
|
service_status.dwCurrentState = SERVICE_STOPPED;
|
||||||
|
service_status.dwWin32ExitCode = r;
|
||||||
|
service_status.dwServiceSpecificExitCode = r;
|
||||||
|
service_fns.SetServiceStatus_fn(hStatus, &service_status);
|
||||||
return;
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
/* Set the service's status to SERVICE_RUNNING and start the main
|
/* Set the service's status to SERVICE_RUNNING and start the main
|
||||||
* event loop */
|
* event loop */
|
||||||
service_status.dwCurrentState = SERVICE_RUNNING;
|
service_status.dwCurrentState = SERVICE_RUNNING;
|
||||||
service_fns.SetServiceStatus_fn(hStatus, &service_status);
|
service_fns.SetServiceStatus_fn(hStatus, &service_status);
|
||||||
|
set_main_thread();
|
||||||
tor_run_main(cfg);
|
run_tor_main_loop();
|
||||||
|
tor_cleanup();
|
||||||
tor_main_configuration_free(cfg);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Main service entry point. Starts the service control dispatcher and waits
|
/** Main service entry point. Starts the service control dispatcher and waits
|
||||||
|
@ -320,14 +323,29 @@ nt_service_main(void)
|
||||||
printf("Service error %d : %s\n", (int) result, errmsg);
|
printf("Service error %d : %s\n", (int) result, errmsg);
|
||||||
tor_free(errmsg);
|
tor_free(errmsg);
|
||||||
if (result == ERROR_FAILED_SERVICE_CONTROLLER_CONNECT) {
|
if (result == ERROR_FAILED_SERVICE_CONTROLLER_CONNECT) {
|
||||||
tor_main_configuration_t *cfg = tor_main_configuration_new();
|
if (tor_init(backup_argc, backup_argv))
|
||||||
cfg->run_tor_only = 1;
|
|
||||||
if (tor_main_configuration_set_command_line(cfg, backup_argc,
|
|
||||||
backup_argv) < 0)
|
|
||||||
return;
|
return;
|
||||||
|
switch (get_options()->command) {
|
||||||
tor_run_main(cfg);
|
case CMD_RUN_TOR:
|
||||||
tor_main_configuration_free(cfg);
|
run_tor_main_loop();
|
||||||
|
break;
|
||||||
|
case CMD_LIST_FINGERPRINT:
|
||||||
|
case CMD_HASH_PASSWORD:
|
||||||
|
case CMD_VERIFY_CONFIG:
|
||||||
|
case CMD_DUMP_CONFIG:
|
||||||
|
case CMD_KEYGEN:
|
||||||
|
case CMD_KEY_EXPIRATION:
|
||||||
|
log_err(LD_CONFIG, "Unsupported command (--list-fingerprint, "
|
||||||
|
"--hash-password, --keygen, --dump-config, --verify-config, "
|
||||||
|
"or --key-expiration) in NT service.");
|
||||||
|
break;
|
||||||
|
case CMD_RUN_UNITTESTS:
|
||||||
|
case CMD_IMMEDIATE:
|
||||||
|
default:
|
||||||
|
log_err(LD_CONFIG, "Illegal command number %d: internal error.",
|
||||||
|
get_options()->command);
|
||||||
|
}
|
||||||
|
tor_cleanup();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -29,11 +29,6 @@ struct tor_main_configuration_t {
|
||||||
|
|
||||||
/** Socket that Tor will use as an owning control socket. Owned. */
|
/** Socket that Tor will use as an owning control socket. Owned. */
|
||||||
tor_socket_t owning_controller_socket;
|
tor_socket_t owning_controller_socket;
|
||||||
|
|
||||||
/** Disable commands other than "run tor". Not for use from outside Tor
|
|
||||||
* itself; if you need to use this for embedding, please contact the tor
|
|
||||||
* developers. */
|
|
||||||
int run_tor_only;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
#endif /* !defined(TOR_API_INTERNAL_H) */
|
#endif /* !defined(TOR_API_INTERNAL_H) */
|
||||||
|
|
Loading…
Add table
Reference in a new issue