aboutsummaryrefslogtreecommitdiffstatshomepage
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--main.go165
-rw-r--r--mksyscall.go8
-rw-r--r--zsyscall_windows.go62
3 files changed, 235 insertions, 0 deletions
diff --git a/main.go b/main.go
new file mode 100644
index 00000000..d377bb58
--- /dev/null
+++ b/main.go
@@ -0,0 +1,165 @@
+/* SPDX-License-Identifier: MIT
+ *
+ * Copyright (C) 2019 WireGuard LLC. All Rights Reserved.
+ */
+
+package main
+
+import (
+ "fmt"
+ "golang.org/x/sys/windows"
+ "golang.zx2c4.com/wireguard/windows/service"
+ "golang.zx2c4.com/wireguard/windows/ui"
+ "os"
+ "strconv"
+ "strings"
+ "time"
+)
+
+var flags = [...]string{
+ "(no argument): elevate and install manager service for current user",
+ "/installmanagerservice",
+ "/installtunnelservice CONFIG_PATH",
+ "/uninstallmanagerservice",
+ "/uninstalltunnelservice CONFIG_PATH",
+ "/managerservice",
+ "/tunnelservice CONFIG_PATH",
+ "/tunneldebug CONFIG_PATH",
+ "/ui CMD_READ_HANDLE CMD_WRITE_HANDLE",
+}
+
+//sys messageBoxEx(hwnd windows.Handle, text *uint16, title *uint16, typ uint, languageId uint16) = user32.MessageBoxExW
+
+func fatal(v ...interface{}) {
+ messageBoxEx(0, windows.StringToUTF16Ptr(fmt.Sprint(v...)), windows.StringToUTF16Ptr("Error"), 0x00000010, 0)
+}
+
+
+func usage() {
+ builder := strings.Builder{}
+ for _, flag := range flags {
+ builder.WriteString(fmt.Sprintf(" %s\n", flag))
+ }
+ msg := fmt.Sprintf("Usage: %s [\n%s]", os.Args[0], builder.String())
+ messageBoxEx(0, windows.StringToUTF16Ptr(msg), windows.StringToUTF16Ptr("Command Line Options"), 0x00000040, 0)
+ os.Exit(1)
+}
+
+//sys shellExecute(hwnd windows.Handle, verb *uint16, file *uint16, args *uint16, cwd *uint16, showCmd int) (err error) = shell32.ShellExecuteW
+func execElevatedManagerServiceInstaller() error {
+ path, err := os.Executable()
+ if err != nil {
+ return err
+ }
+ err = shellExecute(0, windows.StringToUTF16Ptr("runas"), windows.StringToUTF16Ptr(path), windows.StringToUTF16Ptr("/installmanagerservice"), nil, windows.SW_SHOW)
+ if err != nil {
+ return err
+ }
+ os.Exit(0)
+ return windows.ERROR_ACCESS_DENIED // Not reached
+}
+
+func pipeFromHandleArgument(handleStr string) (*os.File, error) {
+ handleInt, err := strconv.ParseUint(handleStr, 10, 64)
+ if err != nil {
+ return nil, err
+ }
+ return os.NewFile(uintptr(handleInt), "pipe"), nil
+}
+
+func main() {
+ if len(os.Args) <= 1 {
+ if ui.RaiseUI() {
+ return
+ }
+ err := execElevatedManagerServiceInstaller()
+ if err != nil {
+ fatal(err)
+ }
+ return
+ }
+ switch os.Args[1] {
+ case "/installmanagerservice":
+ if len(os.Args) != 2 {
+ usage()
+ }
+ go ui.WaitForRaiseUIThenQuit()
+ err := service.InstallManager()
+ if err != nil {
+ fatal(err)
+ }
+ time.Sleep(30 * time.Second)
+ fatal("WireGuard system tray icon did not appear after 30 seconds.")
+ return
+ case "/uninstallmanagerservice":
+ if len(os.Args) != 2 {
+ usage()
+ }
+ err := service.UninstallManager()
+ if err != nil {
+ fatal(err)
+ }
+ return
+ case "/managerservice":
+ if len(os.Args) != 2 {
+ usage()
+ }
+ err := service.RunManager()
+ if err != nil {
+ fatal(err)
+ }
+ return
+ case "/installtunnelservice":
+ if len(os.Args) != 3 {
+ usage()
+ }
+ err := service.InstallTunnel(os.Args[2])
+ if err != nil {
+ fatal(err)
+ }
+ return
+ case "/uninstalltunnelservice":
+ if len(os.Args) != 3 {
+ usage()
+ }
+ err := service.UninstallTunnel(os.Args[2])
+ if err != nil {
+ fatal(err)
+ }
+ return
+ case "/tunnelservice":
+ if len(os.Args) != 3 {
+ usage()
+ }
+ err := service.RunTunnel(os.Args[2], false)
+ if err != nil {
+ fatal(err)
+ }
+ return
+ case "/tunneldebug":
+ if len(os.Args) != 3 {
+ usage()
+ }
+ err := service.RunTunnel(os.Args[2], true)
+ if err != nil {
+ fatal(err)
+ }
+ return
+ case "/ui":
+ if len(os.Args) != 4 {
+ usage()
+ }
+ readPipe, err := pipeFromHandleArgument(os.Args[2])
+ if err != nil {
+ fatal(err)
+ }
+ writePipe, err := pipeFromHandleArgument(os.Args[3])
+ if err != nil {
+ fatal(err)
+ }
+ service.InitializeIPCClient(readPipe, writePipe)
+ ui.RunUI()
+ return
+ }
+ usage()
+}
diff --git a/mksyscall.go b/mksyscall.go
new file mode 100644
index 00000000..d72dc999
--- /dev/null
+++ b/mksyscall.go
@@ -0,0 +1,8 @@
+/* SPDX-License-Identifier: MIT
+ *
+ * Copyright (C) 2019 WireGuard LLC. All Rights Reserved.
+ */
+
+package main
+
+//go:generate go run $GOROOT/src/syscall/mksyscall_windows.go -output zsyscall_windows.go main.go
diff --git a/zsyscall_windows.go b/zsyscall_windows.go
new file mode 100644
index 00000000..d78d0ea3
--- /dev/null
+++ b/zsyscall_windows.go
@@ -0,0 +1,62 @@
+// Code generated by 'go generate'; DO NOT EDIT.
+
+package main
+
+import (
+ "syscall"
+ "unsafe"
+
+ "golang.org/x/sys/windows"
+)
+
+var _ unsafe.Pointer
+
+// Do the interface allocations only once for common
+// Errno values.
+const (
+ errnoERROR_IO_PENDING = 997
+)
+
+var (
+ errERROR_IO_PENDING error = syscall.Errno(errnoERROR_IO_PENDING)
+)
+
+// errnoErr returns common boxed Errno values, to prevent
+// allocations at runtime.
+func errnoErr(e syscall.Errno) error {
+ switch e {
+ case 0:
+ return nil
+ case errnoERROR_IO_PENDING:
+ return errERROR_IO_PENDING
+ }
+ // TODO: add more here, after collecting data on the common
+ // error values see on Windows. (perhaps when running
+ // all.bat?)
+ return e
+}
+
+var (
+ moduser32 = windows.NewLazySystemDLL("user32.dll")
+ modshell32 = windows.NewLazySystemDLL("shell32.dll")
+
+ procMessageBoxExW = moduser32.NewProc("MessageBoxExW")
+ procShellExecuteW = modshell32.NewProc("ShellExecuteW")
+)
+
+func messageBoxEx(hwnd windows.Handle, text *uint16, title *uint16, typ uint, languageId uint16) {
+ syscall.Syscall6(procMessageBoxExW.Addr(), 5, uintptr(hwnd), uintptr(unsafe.Pointer(text)), uintptr(unsafe.Pointer(title)), uintptr(typ), uintptr(languageId), 0)
+ return
+}
+
+func shellExecute(hwnd windows.Handle, verb *uint16, file *uint16, args *uint16, cwd *uint16, showCmd int) (err error) {
+ r1, _, e1 := syscall.Syscall6(procShellExecuteW.Addr(), 6, uintptr(hwnd), uintptr(unsafe.Pointer(verb)), uintptr(unsafe.Pointer(file)), uintptr(unsafe.Pointer(args)), uintptr(unsafe.Pointer(cwd)), uintptr(showCmd))
+ if r1 == 0 {
+ if e1 != 0 {
+ err = errnoErr(e1)
+ } else {
+ err = syscall.EINVAL
+ }
+ }
+ return
+}