2017-08-28 19:27:45 +03:00
/ * *
2018-01-04 23:15:21 +03:00
* @ description MeshCentral main module
2017-08-28 19:27:45 +03:00
* @ author Ylian Saint - Hilaire
2020-01-03 05:30:12 +03:00
* @ copyright Intel Corporation 2018 - 2020
2018-01-04 23:15:21 +03:00
* @ license Apache - 2.0
2017-08-28 19:27:45 +03:00
* @ version v0 . 0.1
* /
2018-08-30 22:05:23 +03:00
/*xjslint node: true */
/*xjslint plusplus: true */
/*xjslint maxlen: 256 */
/*jshint node: true */
/*jshint strict: false */
/*jshint esversion: 6 */
"use strict" ;
2018-08-27 22:24:15 +03:00
2018-11-30 04:59:29 +03:00
// If running NodeJS less than version 8, try to polyfill promisify
try { if ( Number ( process . version . match ( /^v(\d+\.\d+)/ ) [ 1 ] ) < 8 ) { require ( 'util.promisify' ) . shim ( ) ; } } catch ( ex ) { }
2018-01-10 07:13:41 +03:00
// If app metrics is available
if ( process . argv [ 2 ] == '--launch' ) { try { require ( 'appmetrics-dash' ) . monitor ( { url : '/' , title : 'MeshCentral' , port : 88 , host : '127.0.0.1' } ) ; } catch ( e ) { } }
2018-03-15 01:16:55 +03:00
function CreateMeshCentralServer ( config , args ) {
2017-08-28 19:27:45 +03:00
var obj = { } ;
2018-08-30 22:05:23 +03:00
obj . db = null ;
obj . webserver = null ;
obj . redirserver = null ;
obj . mpsserver = null ;
2019-08-30 00:38:13 +03:00
obj . apfserver = null ;
2019-10-03 03:57:18 +03:00
obj . mqttbroker = null ;
2018-08-30 22:05:23 +03:00
obj . swarmserver = null ;
obj . mailserver = null ;
obj . amtEventHandler = null ;
2019-10-10 21:13:25 +03:00
obj . pluginHandler = null ;
2018-08-30 22:05:23 +03:00
obj . amtScanner = null ;
obj . meshScanner = null ;
obj . letsencrypt = null ;
2017-08-28 19:27:45 +03:00
obj . eventsDispatch = { } ;
obj . fs = require ( 'fs' ) ;
obj . path = require ( 'path' ) ;
obj . crypto = require ( 'crypto' ) ;
2018-01-20 05:04:54 +03:00
obj . exeHandler = require ( './exeHandler.js' ) ;
2017-08-28 19:27:45 +03:00
obj . platform = require ( 'os' ) . platform ( ) ;
2018-03-15 01:16:55 +03:00
obj . args = args ;
2017-08-28 19:27:45 +03:00
obj . common = require ( './common.js' ) ;
2019-02-03 01:54:36 +03:00
obj . configurationFiles = null ;
2017-08-28 19:27:45 +03:00
obj . certificates = null ;
obj . connectivityByNode = { } ; // This object keeps a list of all connected CIRA and agents, by nodeid->value (value: 1 = Agent, 2 = CIRA, 4 = AmtDirect)
2017-09-13 21:25:57 +03:00
obj . peerConnectivityByNode = { } ; // This object keeps a list of all connected CIRA and agents of peers, by serverid->nodeid->value (value: 1 = Agent, 2 = CIRA, 4 = AmtDirect)
2019-08-23 01:31:39 +03:00
obj . debugSources = [ ] ;
2019-08-23 21:51:48 +03:00
obj . debugRemoteSources = null ;
2018-02-01 03:10:15 +03:00
obj . config = config ; // Configuration file
2017-08-28 19:27:45 +03:00
obj . dbconfig = { } ; // Persistance values, loaded from database
2018-01-10 07:13:41 +03:00
obj . certificateOperations = null ;
2017-12-13 03:04:54 +03:00
obj . defaultMeshCmd = null ;
2018-12-30 02:24:33 +03:00
obj . defaultMeshCores = { } ;
obj . defaultMeshCoresHash = { } ;
2017-10-15 09:22:19 +03:00
obj . meshAgentBinaries = { } ; // Mesh Agent Binaries, Architecture type --> { hash:(sha384 hash), size:(binary size), path:(binary path) }
obj . meshAgentInstallScripts = { } ; // Mesh Install Scripts, Script ID -- { hash:(sha384 hash), size:(binary size), path:(binary path) }
2017-08-28 19:27:45 +03:00
obj . multiServer = null ;
2017-09-07 04:10:24 +03:00
obj . maintenanceTimer = null ;
2017-09-13 21:25:57 +03:00
obj . serverId = null ;
2019-01-03 05:03:34 +03:00
obj . serverKey = Buffer . from ( obj . crypto . randomBytes ( 48 ) , 'binary' ) ;
2017-12-14 01:52:57 +03:00
obj . loginCookieEncryptionKey = null ;
2019-06-08 03:11:56 +03:00
obj . invitationLinkEncryptionKey = null ;
2018-09-27 00:58:55 +03:00
obj . serverSelfWriteAllowed = true ;
2019-03-27 00:11:51 +03:00
obj . serverStatsCounter = Math . floor ( Math . random ( ) * 1000 ) ;
2019-03-10 01:28:08 +03:00
obj . taskLimiter = obj . common . createTaskLimiterQueue ( 50 , 20 , 60 ) ; // (maxTasks, maxTaskTime, cleaningInterval) This is a task limiter queue to smooth out server work.
2019-10-29 02:52:12 +03:00
obj . agentUpdateBlockSize = 65531 ; // MeshAgent update block size
2019-11-27 01:11:09 +03:00
obj . serverWarnings = [ ] ; // List of warnings that should be shown to administrators
2019-12-12 02:44:10 +03:00
obj . cookieUseOnceTable = { } ; // List of cookies that are already expired
obj . cookieUseOnceTableCleanCounter = 0 ; // Clean the cookieUseOnceTable each 20 additions
2019-12-21 01:02:49 +03:00
// Server version
obj . currentVer = null ;
function getCurrentVerion ( ) { try { obj . currentVer = JSON . parse ( obj . fs . readFileSync ( obj . path . join ( _ _dirname , 'package.json' ) , 'utf8' ) ) . version ; } catch ( e ) { } return obj . currentVer ; } // Fetch server version
getCurrentVerion ( ) ;
2017-09-15 21:45:06 +03:00
2017-09-27 22:43:20 +03:00
// Setup the default configuration and files paths
if ( ( _ _dirname . endsWith ( '/node_modules/meshcentral' ) ) || ( _ _dirname . endsWith ( '\\node_modules\\meshcentral' ) ) || ( _ _dirname . endsWith ( '/node_modules/meshcentral/' ) ) || ( _ _dirname . endsWith ( '\\node_modules\\meshcentral\\' ) ) ) {
2019-04-05 19:21:21 +03:00
obj . parentpath = obj . path . join ( _ _dirname , '../..' ) ;
2017-10-15 09:22:19 +03:00
obj . datapath = obj . path . join ( _ _dirname , '../../meshcentral-data' ) ;
obj . filespath = obj . path . join ( _ _dirname , '../../meshcentral-files' ) ;
2019-05-17 22:40:15 +03:00
obj . backuppath = obj . path . join ( _ _dirname , '../../meshcentral-backup' ) ;
2019-08-05 21:30:07 +03:00
obj . recordpath = obj . path . join ( _ _dirname , '../../meshcentral-recordings' ) ;
2019-08-25 21:08:32 +03:00
obj . webPublicPath = obj . path . join ( _ _dirname , 'public' ) ;
obj . webViewsPath = obj . path . join ( _ _dirname , 'views' ) ;
if ( obj . fs . existsSync ( obj . path . join ( _ _dirname , '../../meshcentral-web/views' ) ) ) { obj . webViewsOverridePath = obj . path . join ( _ _dirname , '../../meshcentral-web/views' ) ; }
if ( obj . fs . existsSync ( obj . path . join ( _ _dirname , '../../meshcentral-web/public' ) ) ) { obj . webPublicOverridePath = obj . path . join ( _ _dirname , '../../meshcentral-web/public' ) ; }
2017-09-27 22:43:20 +03:00
} else {
2019-04-05 19:21:21 +03:00
obj . parentpath = _ _dirname ;
2017-10-15 09:22:19 +03:00
obj . datapath = obj . path . join ( _ _dirname , '../meshcentral-data' ) ;
obj . filespath = obj . path . join ( _ _dirname , '../meshcentral-files' ) ;
2019-05-17 22:40:15 +03:00
obj . backuppath = obj . path . join ( _ _dirname , '../meshcentral-backups' ) ;
2019-08-05 21:30:07 +03:00
obj . recordpath = obj . path . join ( _ _dirname , '../meshcentral-recordings' ) ;
2019-08-25 21:08:32 +03:00
obj . webPublicPath = obj . path . join ( _ _dirname , 'public' ) ;
obj . webViewsPath = obj . path . join ( _ _dirname , 'views' ) ;
if ( obj . fs . existsSync ( obj . path . join ( _ _dirname , '../meshcentral-web/views' ) ) ) { obj . webViewsOverridePath = obj . path . join ( _ _dirname , '../meshcentral-web/views' ) ; }
if ( obj . fs . existsSync ( obj . path . join ( _ _dirname , '../meshcentral-web/public' ) ) ) { obj . webPublicOverridePath = obj . path . join ( _ _dirname , '../meshcentral-web/public' ) ; }
2017-09-27 22:43:20 +03:00
}
2019-08-13 00:58:06 +03:00
// Look to see if data and/or file path is specified
2019-10-29 03:18:39 +03:00
if ( obj . config . settings && ( typeof obj . config . settings . datapath == 'string' ) ) { obj . datapath = obj . config . settings . datapath ; }
if ( obj . config . settings && ( typeof obj . config . settings . filespath == 'string' ) ) { obj . filespath = obj . config . settings . filespath ; }
2019-08-13 00:58:06 +03:00
2017-08-28 19:27:45 +03:00
// Create data and files folders if needed
try { obj . fs . mkdirSync ( obj . datapath ) ; } catch ( e ) { }
try { obj . fs . mkdirSync ( obj . filespath ) ; } catch ( e ) { }
// Windows Specific Code, setup service and event log
obj . service = null ;
obj . servicelog = null ;
if ( obj . platform == 'win32' ) {
var nodewindows = require ( 'node-windows' ) ;
obj . service = nodewindows . Service ;
var eventlogger = nodewindows . EventLogger ;
obj . servicelog = new eventlogger ( 'MeshCentral' ) ;
}
// Start the Meshcentral server
obj . Start = function ( ) {
2018-08-30 22:05:23 +03:00
var i ;
2019-05-15 00:39:26 +03:00
try { require ( './pass' ) . hash ( 'test' , function ( ) { } , 0 ) ; } catch ( e ) { console . log ( 'Old version of node, must upgrade.' ) ; return ; } // TODO: Not sure if this test works or not.
2018-07-24 03:34:24 +03:00
2017-08-28 19:27:45 +03:00
// Check for invalid arguments
2020-01-26 22:59:38 +03:00
var validArguments = [ '_' , 'notls' , 'user' , 'port' , 'aliasport' , 'mpsport' , 'mpsaliasport' , 'redirport' , 'rediraliasport' , 'cert' , 'mpscert' , 'deletedomain' , 'deletedefaultdomain' , 'showall' , 'showusers' , 'showusergroups' , 'shownodes' , 'showmeshes' , 'showevents' , 'showsmbios' , 'showpower' , 'clearpower' , 'showiplocations' , 'help' , 'exactports' , 'xinstall' , 'xuninstall' , 'install' , 'uninstall' , 'start' , 'stop' , 'restart' , 'debug' , 'filespath' , 'datapath' , 'noagentupdate' , 'launch' , 'noserverbackup' , 'mongodb' , 'mongodbcol' , 'wanonly' , 'lanonly' , 'nousers' , 'mpspass' , 'ciralocalfqdn' , 'dbexport' , 'dbexportmin' , 'dbimport' , 'dbmerge' , 'dbencryptkey' , 'selfupdate' , 'tlsoffload' , 'userallowedip' , 'userblockedip' , 'swarmallowedip' , 'agentallowedip' , 'agentblockedip' , 'fastcert' , 'swarmport' , 'logintoken' , 'logintokenkey' , 'logintokengen' , 'logintokengen' , 'mailtokengen' , 'admin' , 'unadmin' , 'sessionkey' , 'sessiontime' , 'minify' , 'minifycore' , 'dblistconfigfiles' , 'dbshowconfigfile' , 'dbpushconfigfiles' , 'dbpullconfigfiles' , 'dbdeleteconfigfiles' , 'vaultpushconfigfiles' , 'vaultpullconfigfiles' , 'vaultdeleteconfigfiles' , 'configkey' , 'loadconfigfromdb' , 'npmpath' , 'memorytracking' , 'serverid' , 'recordencryptionrecode' , 'vault' , 'token' , 'unsealkey' , 'name' , 'log' , 'dbstats' , 'translate' ] ;
2017-09-27 22:43:20 +03:00
for ( var arg in obj . args ) { obj . args [ arg . toLocaleLowerCase ( ) ] = obj . args [ arg ] ; if ( validArguments . indexOf ( arg . toLocaleLowerCase ( ) ) == - 1 ) { console . log ( 'Invalid argument "' + arg + '", use --help.' ) ; return ; } }
2017-08-28 19:27:45 +03:00
if ( obj . args . mongodb == true ) { console . log ( 'Must specify: --mongodb [connectionstring] \r\nSee https://docs.mongodb.com/manual/reference/connection-string/ for MongoDB connection string.' ) ; return ; }
2018-08-30 22:05:23 +03:00
for ( i in obj . config . settings ) { obj . args [ i ] = obj . config . settings [ i ] ; } // Place all settings into arguments, arguments have already been placed into settings so arguments take precedence.
2017-08-28 19:27:45 +03:00
if ( ( obj . args . help == true ) || ( obj . args [ '?' ] == true ) ) {
2020-01-10 03:35:48 +03:00
console . log ( 'MeshCentral v' + getCurrentVerion ( ) + ', remote computer management web portal.' ) ;
console . log ( 'This software is open source under Apache 2.0 licence.' ) ;
2019-01-25 04:01:50 +03:00
console . log ( 'Details at: https://www.meshcommander.com/meshcentral2\r\n' ) ;
2020-01-10 03:35:48 +03:00
if ( ( obj . platform == 'win32' ) || ( obj . platform == 'linux' ) ) {
console . log ( 'Run as a background service' ) ;
console . log ( ' --install/uninstall Install MeshCentral as a background service.' ) ;
console . log ( ' --start/stop/restart Control MeshCentral background service.' ) ;
console . log ( '' ) ;
2017-08-28 19:27:45 +03:00
console . log ( 'Run standalone, console application' ) ;
}
console . log ( ' --notls Use HTTP instead of HTTPS for the main web server.' ) ;
console . log ( ' --user [username] Always login as [username] if account exists.' ) ;
console . log ( ' --port [number] Web server port number.' ) ;
console . log ( ' --mpsport [number] Intel AMT server port number.' ) ;
console . log ( ' --redirport [number] Creates an additional HTTP server to redirect users to the HTTPS server.' ) ;
console . log ( ' --exactports Server must run with correct ports or exit.' ) ;
console . log ( ' --noagentupdate Server will not update mesh agent native binaries.' ) ;
2018-07-14 05:18:43 +03:00
console . log ( ' --fastcert Generate weaker RSA2048 certificates.' ) ;
2018-05-30 02:57:08 +03:00
console . log ( ' --cert [name], (country), (org) Create a web server certificate with [name] server name.' ) ;
2017-08-28 19:27:45 +03:00
console . log ( ' country and organization can optionaly be set.' ) ;
return ;
}
2018-08-30 22:05:23 +03:00
2020-01-26 22:59:38 +03:00
// Perform web site translations into different languages
if ( obj . args . translate ) {
2020-01-28 04:52:20 +03:00
// Check NodeJS version
const NodeJSVer = Number ( process . version . match ( /^v(\d+\.\d+)/ ) [ 1 ] ) ;
if ( NodeJSVer < 8 ) { console . log ( "Translation feature requires Node v8 or above, current version is " + process . version + "." ) ; process . exit ( ) ; return ; }
2020-01-26 22:59:38 +03:00
// Check if translate.json is in the "meshcentral-data" folder, if so use that and translate default pages.
2020-01-28 04:52:20 +03:00
var translationFile = null , customTranslation = false ;
if ( require ( 'fs' ) . existsSync ( obj . path . join ( obj . datapath , 'translate.json' ) ) ) { translationFile = obj . path . join ( obj . datapath , 'translate.json' ) ; console . log ( "Using translate.json in meshentral-data." ) ; customTranslation = true ; }
if ( translationFile == null ) { if ( require ( 'fs' ) . existsSync ( obj . path . join ( _ _dirname , 'translate' , 'translate.json' ) ) ) { translationFile = obj . path . join ( _ _dirname , 'translate' , 'translate.json' ) ; console . log ( "Using default translate.json." ) ; } }
if ( translationFile == null ) { console . log ( "Unable to find translate.json." ) ; process . exit ( ) ; return ; }
2020-01-26 22:59:38 +03:00
2020-01-28 04:52:20 +03:00
// Perform translation operations
var didSomething = false ;
2020-02-05 03:48:54 +03:00
process . chdir ( obj . path . join ( _ _dirname , 'translate' ) ) ;
2020-01-26 22:59:38 +03:00
var translateEngine = require ( './translate/translate.js' )
2020-01-28 04:52:20 +03:00
if ( customTranslation == true ) {
// Translate all of the default files using custom translation file
translateEngine . startEx ( [ '' , '' , 'minifyall' ] ) ;
translateEngine . startEx ( [ '' , '' , 'translateall' , translationFile ] ) ;
translateEngine . startEx ( [ '' , '' , 'extractall' , translationFile ] ) ;
didSomething = true ;
}
2020-01-26 22:59:38 +03:00
// Check is "meshcentral-web" exists, if so, translate all pages in that folder.
2020-01-28 04:52:20 +03:00
if ( obj . webViewsOverridePath != null ) {
didSomething = true ;
var files = obj . fs . readdirSync ( obj . webViewsOverridePath ) ;
for ( var i in files ) {
var file = obj . path . join ( obj . webViewsOverridePath , files [ i ] ) ;
if ( file . endsWith ( '.handlebars' ) && ! file . endsWith ( '-min.handlebars' ) ) {
2020-02-06 22:33:21 +03:00
translateEngine . startEx ( [ '' , '' , 'minify' , file ] ) ;
}
}
files = obj . fs . readdirSync ( obj . webViewsOverridePath ) ;
for ( var i in files ) {
var file = obj . path . join ( obj . webViewsOverridePath , files [ i ] ) ;
if ( file . endsWith ( '.handlebars' ) || file . endsWith ( '-min.handlebars' ) ) {
2020-01-28 04:52:20 +03:00
translateEngine . startEx ( [ '' , '' , 'translate' , '*' , translationFile , file , '--subdir:translations' ] ) ;
}
}
}
2020-02-06 22:33:21 +03:00
/ *
2020-01-28 04:52:20 +03:00
if ( obj . webPublicOverridePath != null ) {
didSomething = true ;
var files = obj . fs . readdirSync ( obj . webPublicOverridePath ) ;
for ( var i in files ) {
var file = obj . path . join ( obj . webPublicOverridePath , files [ i ] ) ;
if ( file . endsWith ( '.htm' ) && ! file . endsWith ( '-min.htm' ) ) {
translateEngine . startEx ( [ '' , '' , 'translate' , '*' , translationFile , file , '--subdir:translations' ] ) ;
}
}
}
2020-02-06 22:33:21 +03:00
* /
2020-01-26 22:59:38 +03:00
2020-01-28 04:52:20 +03:00
if ( didSomething == false ) { console . log ( "Nothing to do." ) ; }
process . exit ( ) ;
2020-01-26 22:59:38 +03:00
return ;
}
2020-02-11 00:17:24 +03:00
// Setup the Node+NPM path if possible, this makes it possible to update the server even if NodeJS and NPM are not in default paths.
if ( obj . args . npmpath == null ) {
try {
var nodepath = process . argv [ 0 ] ;
var npmpath = obj . path . join ( obj . path . dirname ( process . argv [ 0 ] ) , 'npm' ) ;
if ( obj . fs . existsSync ( nodepath ) && obj . fs . existsSync ( npmpath ) ) {
if ( nodepath . indexOf ( ' ' ) >= 0 ) { nodepath = '"' + nodepath + '"' ; }
if ( npmpath . indexOf ( ' ' ) >= 0 ) { npmpath = '"' + npmpath + '"' ; }
if ( obj . platform == 'win32' ) { obj . args . npmpath = npmpath ; } else { obj . args . npmpath = ( nodepath + ' ' + npmpath ) ; }
}
} catch ( ex ) { }
}
2020-01-10 03:35:48 +03:00
// Linux background service systemd handling
if ( obj . platform == 'linux' ) {
if ( obj . args . install == true ) {
// Install MeshCentral in Systemd
console . log ( 'Installing MeshCentral as background Service...' ) ;
var userinfo = require ( 'os' ) . userInfo ( ) , systemdConf = null ;
if ( require ( 'fs' ) . existsSync ( '/etc/systemd/system' ) ) { systemdConf = '/etc/systemd/system/meshcentral.service' ; }
else if ( require ( 'fs' ) . existsSync ( '/lib/systemd/system' ) ) { systemdConf = '/lib/systemd/system/meshcentral.service' ; }
else if ( require ( 'fs' ) . existsSync ( '/usr/lib/systemd/system' ) ) { systemdConf = '/usr/lib/systemd/system/meshcentral.service' ; }
else { console . log ( 'Unable to find systemd configuration folder.' ) ; process . exit ( ) ; return ; }
console . log ( 'Writing config file...' ) ;
2020-01-13 21:34:10 +03:00
require ( 'child_process' ) . exec ( 'which node' , { } , function ( error , stdout , stderr ) {
if ( ( error != null ) || ( stdout . indexOf ( '\n' ) == - 1 ) ) { console . log ( 'ERROR: Unable to get node location: ' + error ) ; process . exit ( ) ; return ; }
var nodePath = stdout . substring ( 0 , stdout . indexOf ( '\n' ) ) ;
var config = '[Unit]\nDescription=MeshCentral Server\n\n[Service]\nType=simple\nLimitNOFILE=1000000\nExecStart=' + nodePath + ' ' + _ _dirname + '/meshcentral\nWorkingDirectory=' + userinfo . homedir + '\nEnvironment=NODE_ENV=production\nUser=' + userinfo . username + '\nGroup=' + userinfo . username + '\nRestart=always\n# Restart service after 10 seconds if node service crashes\nRestartSec=10\n# Set port permissions capability\nAmbientCapabilities=cap_net_bind_service\n\n[Install]\nWantedBy=multi-user.target\n' ;
2020-01-14 16:17:12 +03:00
require ( 'child_process' ) . exec ( 'echo \"' + config + '\" | sudo tee ' + systemdConf , { } , function ( error , stdout , stderr ) {
2020-01-10 03:35:48 +03:00
if ( ( error != null ) && ( error != '' ) ) { console . log ( 'ERROR: Unable to write config file: ' + error ) ; process . exit ( ) ; return ; }
console . log ( 'Enabling service...' ) ;
require ( 'child_process' ) . exec ( 'sudo systemctl enable meshcentral.service' , { } , function ( error , stdout , stderr ) {
if ( ( error != null ) && ( error != '' ) ) { console . log ( 'ERROR: Unable to enable MeshCentral as a service: ' + error ) ; process . exit ( ) ; return ; }
if ( stdout . length > 0 ) { console . log ( stdout ) ; }
console . log ( 'Starting service...' ) ;
require ( 'child_process' ) . exec ( 'sudo systemctl start meshcentral.service' , { } , function ( error , stdout , stderr ) {
if ( ( error != null ) && ( error != '' ) ) { console . log ( 'ERROR: Unable to start MeshCentral as a service: ' + error ) ; process . exit ( ) ; return ; }
if ( stdout . length > 0 ) { console . log ( stdout ) ; }
console . log ( 'Done.' ) ;
} ) ;
} ) ;
} ) ;
} ) ;
return ;
} else if ( obj . args . uninstall == true ) {
// Uninstall MeshCentral in Systemd
console . log ( 'Uninstalling MeshCentral background service...' ) ;
var systemdConf = null ;
if ( require ( 'fs' ) . existsSync ( '/etc/systemd/system' ) ) { systemdConf = '/etc/systemd/system/meshcentral.service' ; }
else if ( require ( 'fs' ) . existsSync ( '/lib/systemd/system' ) ) { systemdConf = '/lib/systemd/system/meshcentral.service' ; }
else if ( require ( 'fs' ) . existsSync ( '/usr/lib/systemd/system' ) ) { systemdConf = '/usr/lib/systemd/system/meshcentral.service' ; }
else { console . log ( 'Unable to find systemd configuration folder.' ) ; process . exit ( ) ; return ; }
console . log ( 'Stopping service...' ) ;
require ( 'child_process' ) . exec ( 'sudo systemctl stop meshcentral.service' , { } , function ( err , stdout , stderr ) {
if ( ( err != null ) && ( err != '' ) ) { console . log ( 'ERROR: Unable to stop MeshCentral as a service: ' + err ) ; }
if ( stdout . length > 0 ) { console . log ( stdout ) ; }
console . log ( 'Disabling service...' ) ;
require ( 'child_process' ) . exec ( 'sudo systemctl disable meshcentral.service' , { } , function ( err , stdout , stderr ) {
if ( ( err != null ) && ( err != '' ) ) { console . log ( 'ERROR: Unable to disable MeshCentral as a service: ' + err ) ; }
if ( stdout . length > 0 ) { console . log ( stdout ) ; }
console . log ( 'Removing config file...' ) ;
require ( 'child_process' ) . exec ( 'sudo rm ' + systemdConf , { } , function ( err , stdout , stderr ) {
if ( ( err != null ) && ( err != '' ) ) { console . log ( 'ERROR: Unable to delete MeshCentral config file: ' + err ) ; }
console . log ( 'Done.' ) ;
} ) ;
} ) ;
} ) ;
return ;
} else if ( obj . args . start == true ) {
// Start MeshCentral in Systemd
require ( 'child_process' ) . exec ( 'sudo systemctl start meshcentral.service' , { } , function ( err , stdout , stderr ) {
if ( ( err != null ) && ( err != '' ) ) { console . log ( 'ERROR: Unable to start MeshCentral: ' + err ) ; process . exit ( ) ; return ; }
console . log ( 'Done.' ) ;
} ) ;
2020-01-10 03:41:14 +03:00
return ;
2020-01-10 03:35:48 +03:00
} else if ( obj . args . stop == true ) {
// Stop MeshCentral in Systemd
require ( 'child_process' ) . exec ( 'sudo systemctl stop meshcentral.service' , { } , function ( err , stdout , stderr ) {
if ( ( err != null ) && ( err != '' ) ) { console . log ( 'ERROR: Unable to stop MeshCentral: ' + err ) ; process . exit ( ) ; return ; }
console . log ( 'Done.' ) ;
} ) ;
2020-01-10 03:41:14 +03:00
return ;
2020-01-10 03:35:48 +03:00
} else if ( obj . args . restart == true ) {
// Restart MeshCentral in Systemd
require ( 'child_process' ) . exec ( 'sudo systemctl restart meshcentral.service' , { } , function ( err , stdout , stderr ) {
if ( ( err != null ) && ( err != '' ) ) { console . log ( 'ERROR: Unable to restart MeshCentral: ' + err ) ; process . exit ( ) ; return ; }
console . log ( 'Done.' ) ;
} ) ;
2020-01-10 03:41:14 +03:00
return ;
2020-01-10 03:35:48 +03:00
}
}
// Windows background service handling
if ( ( obj . platform == 'win32' ) && ( obj . service != null ) ) {
2019-11-22 05:03:02 +03:00
// Check if we need to install, start, stop, remove ourself as a background service
if ( ( ( obj . args . xinstall == true ) || ( obj . args . xuninstall == true ) || ( obj . args . start == true ) || ( obj . args . stop == true ) || ( obj . args . restart == true ) ) ) {
var env = [ ] , xenv = [ 'user' , 'port' , 'aliasport' , 'mpsport' , 'mpsaliasport' , 'redirport' , 'exactport' , 'rediraliasport' , 'debug' ] ;
for ( i in xenv ) { if ( obj . args [ xenv [ i ] ] != null ) { env . push ( { name : 'mesh' + xenv [ i ] , value : obj . args [ xenv [ i ] ] } ) ; } } // Set some args as service environement variables.
var svc = new obj . service ( { name : 'MeshCentral' , description : 'MeshCentral Remote Management Server' , script : obj . path . join ( _ _dirname , 'winservice.js' ) , env : env , wait : 2 , grow : 0.5 } ) ;
svc . on ( 'install' , function ( ) { console . log ( 'MeshCentral service installed.' ) ; svc . start ( ) ; } ) ;
svc . on ( 'uninstall' , function ( ) { console . log ( 'MeshCentral service uninstalled.' ) ; process . exit ( ) ; } ) ;
svc . on ( 'start' , function ( ) { console . log ( 'MeshCentral service started.' ) ; process . exit ( ) ; } ) ;
svc . on ( 'stop' , function ( ) { console . log ( 'MeshCentral service stopped.' ) ; if ( obj . args . stop ) { process . exit ( ) ; } if ( obj . args . restart ) { console . log ( 'Holding 5 seconds...' ) ; setTimeout ( function ( ) { svc . start ( ) ; } , 5000 ) ; } } ) ;
svc . on ( 'alreadyinstalled' , function ( ) { console . log ( 'MeshCentral service already installed.' ) ; process . exit ( ) ; } ) ;
svc . on ( 'invalidinstallation' , function ( ) { console . log ( 'Invalid MeshCentral service installation.' ) ; process . exit ( ) ; } ) ;
2018-08-30 22:05:23 +03:00
2019-11-22 05:03:02 +03:00
if ( obj . args . xinstall == true ) { try { svc . install ( ) ; } catch ( e ) { logException ( e ) ; } }
if ( obj . args . stop == true || obj . args . restart == true ) { try { svc . stop ( ) ; } catch ( e ) { logException ( e ) ; } }
if ( obj . args . start == true || obj . args . restart == true ) { try { svc . start ( ) ; } catch ( e ) { logException ( e ) ; } }
if ( obj . args . xuninstall == true ) { try { svc . uninstall ( ) ; } catch ( e ) { logException ( e ) ; } }
return ;
}
// Windows service install using the external winservice.js
if ( obj . args . install == true ) {
console . log ( 'Installing MeshCentral as Windows Service...' ) ;
if ( obj . fs . existsSync ( obj . path . join ( _ _dirname , '../WinService' ) ) == false ) { try { obj . fs . mkdirSync ( obj . path . join ( _ _dirname , '../WinService' ) ) ; } catch ( ex ) { console . log ( 'ERROR: Unable to create WinService folder: ' + ex ) ; process . exit ( ) ; return ; } }
try { obj . fs . createReadStream ( obj . path . join ( _ _dirname , 'winservice.js' ) ) . pipe ( obj . fs . createWriteStream ( obj . path . join ( _ _dirname , '../WinService/winservice.js' ) ) ) ; } catch ( ex ) { console . log ( 'ERROR: Unable to copy winservice.js: ' + ex ) ; process . exit ( ) ; return ; }
require ( 'child_process' ) . exec ( 'node winservice.js --install' , { maxBuffer : 512000 , timeout : 120000 , cwd : obj . path . join ( _ _dirname , '../WinService' ) } , function ( error , stdout , stderr ) {
if ( ( error != null ) && ( error != '' ) ) { console . log ( 'ERROR: Unable to install MeshCentral as a service: ' + error ) ; process . exit ( ) ; return ; }
console . log ( stdout ) ;
} ) ;
return ;
} else if ( obj . args . uninstall == true ) {
console . log ( 'Uninstalling MeshCentral Windows Service...' ) ;
if ( obj . fs . existsSync ( obj . path . join ( _ _dirname , '../WinService' ) ) == true ) {
require ( 'child_process' ) . exec ( 'node winservice.js --uninstall' , { maxBuffer : 512000 , timeout : 120000 , cwd : obj . path . join ( _ _dirname , '../WinService' ) } , function ( error , stdout , stderr ) {
if ( ( error != null ) && ( error != '' ) ) { console . log ( 'ERROR: Unable to uninstall MeshCentral service: ' + error ) ; process . exit ( ) ; return ; }
console . log ( stdout ) ;
try { obj . fs . unlinkSync ( obj . path . join ( _ _dirname , '../WinService/winservice.js' ) ) ; } catch ( ex ) { }
try { obj . fs . rmdirSync ( obj . path . join ( _ _dirname , '../WinService' ) ) ; } catch ( ex ) { }
} ) ;
} else {
require ( 'child_process' ) . exec ( 'node winservice.js --uninstall' , { maxBuffer : 512000 , timeout : 120000 , cwd : _ _dirname } , function ( error , stdout , stderr ) {
if ( ( error != null ) && ( error != '' ) ) { console . log ( 'ERROR: Unable to uninstall MeshCentral service: ' + error ) ; process . exit ( ) ; return ; }
console . log ( stdout ) ;
} ) ;
}
return ;
}
2017-08-28 19:27:45 +03:00
}
// If "--launch" is in the arguments, launch now
2019-07-18 01:57:42 +03:00
if ( obj . args . launch ) {
2019-10-14 23:35:27 +03:00
if ( obj . args . vault ) { obj . StartVault ( ) ; } else { obj . StartEx ( ) ; }
2017-08-28 19:27:45 +03:00
} else {
// if "--launch" is not specified, launch the server as a child process.
2019-07-18 03:34:34 +03:00
var startArgs = [ ] ;
2018-08-30 22:05:23 +03:00
for ( i in process . argv ) {
2019-07-18 03:34:34 +03:00
if ( i > 0 ) {
var arg = process . argv [ i ] ;
2019-07-24 00:09:44 +03:00
if ( ( arg . length > 0 ) && ( ( arg . indexOf ( ' ' ) >= 0 ) || ( arg . indexOf ( '&' ) >= 0 ) ) ) { startArgs . push ( arg ) ; } else { startArgs . push ( arg ) ; }
2017-08-28 19:27:45 +03:00
}
}
2019-07-18 03:34:34 +03:00
startArgs . push ( '--launch' , process . pid ) ;
obj . launchChildServer ( startArgs ) ;
2017-08-28 19:27:45 +03:00
}
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
// Launch MeshCentral as a child server and monitor it.
2019-07-18 03:34:34 +03:00
obj . launchChildServer = function ( startArgs ) {
2017-08-28 19:27:45 +03:00
var child _process = require ( 'child_process' ) ;
2019-07-18 03:34:34 +03:00
childProcess = child _process . execFile ( process . argv [ 0 ] , startArgs , { maxBuffer : Infinity , cwd : obj . parentpath } , function ( error , stdout , stderr ) {
2019-07-18 01:57:42 +03:00
if ( childProcess . xrestart == 1 ) {
2019-07-18 20:42:22 +03:00
setTimeout ( function ( ) { obj . launchChildServer ( startArgs ) ; } , 500 ) ; // This is an expected restart.
2019-07-18 01:57:42 +03:00
} else if ( childProcess . xrestart == 2 ) {
2017-09-04 22:20:18 +03:00
console . log ( 'Expected exit...' ) ;
process . exit ( ) ; // User CTRL-C exit.
2019-07-18 01:57:42 +03:00
} else if ( childProcess . xrestart == 3 ) {
2017-09-07 04:10:24 +03:00
// Server self-update exit
2019-07-18 23:30:49 +03:00
var version = '' ;
if ( typeof obj . args . selfupdate == 'string' ) { version = '@' + obj . args . selfupdate ; }
2019-07-18 23:11:08 +03:00
var child _process = require ( 'child_process' ) ;
2019-07-18 23:30:49 +03:00
var npmpath = ( ( typeof obj . args . npmpath == 'string' ) ? obj . args . npmpath : 'npm' ) ;
var npmproxy = ( ( typeof obj . args . npmproxy == 'string' ) ? ( ' --proxy ' + obj . args . npmproxy ) : '' ) ;
2019-12-22 23:44:16 +03:00
var env = Object . assign ( { } , process . env ) ; // Shallow clone
2019-12-21 03:45:41 +03:00
if ( typeof obj . args . npmproxy == 'string' ) { env [ 'HTTP_PROXY' ] = env [ 'HTTPS_PROXY' ] = env [ 'http_proxy' ] = env [ 'https_proxy' ] = obj . args . npmproxy ; }
var xxprocess = child _process . exec ( npmpath + ' install meshcentral' + version + npmproxy , { maxBuffer : Infinity , cwd : obj . parentpath , env : env } , function ( error , stdout , stderr ) { } ) ;
2019-01-31 21:41:07 +03:00
xxprocess . data = '' ;
xxprocess . stdout . on ( 'data' , function ( data ) { xxprocess . data += data ; } ) ;
xxprocess . stderr . on ( 'data' , function ( data ) { xxprocess . data += data ; } ) ;
2019-07-18 23:30:49 +03:00
xxprocess . on ( 'close' , function ( code ) { console . log ( 'Update completed...' ) ; setTimeout ( function ( ) { obj . launchChildServer ( startArgs ) ; } , 1000 ) ; } ) ;
2017-08-28 19:27:45 +03:00
} else {
2017-09-02 03:34:02 +03:00
if ( error != null ) {
2017-09-04 22:20:18 +03:00
// This is an un-expected restart
2017-09-13 21:25:57 +03:00
console . log ( error ) ;
2017-10-04 04:31:20 +03:00
console . log ( 'ERROR: MeshCentral failed with critical error, check MeshErrors.txt. Restarting in 5 seconds...' ) ;
2019-07-18 20:42:22 +03:00
setTimeout ( function ( ) { obj . launchChildServer ( startArgs ) ; } , 5000 ) ;
2018-08-30 22:05:23 +03:00
}
2017-08-28 19:27:45 +03:00
}
} ) ;
2019-12-04 04:44:08 +03:00
childProcess . stdout . on ( 'data' , function ( data ) {
if ( data [ data . length - 1 ] == '\n' ) { data = data . substring ( 0 , data . length - 1 ) ; }
if ( data . indexOf ( 'Updating settings folder...' ) >= 0 ) { childProcess . xrestart = 1 ; }
else if ( data . indexOf ( 'Updating server certificates...' ) >= 0 ) { childProcess . xrestart = 1 ; }
else if ( data . indexOf ( 'Server Ctrl-C exit...' ) >= 0 ) { childProcess . xrestart = 2 ; }
else if ( data . indexOf ( 'Starting self upgrade...' ) >= 0 ) { childProcess . xrestart = 3 ; }
else if ( data . indexOf ( 'Server restart...' ) >= 0 ) { childProcess . xrestart = 1 ; }
var datastr = data ;
while ( datastr . endsWith ( '\r' ) || datastr . endsWith ( '\n' ) ) { datastr = datastr . substring ( 0 , datastr . length - 1 ) ; }
console . log ( datastr ) ;
} ) ;
2019-07-18 01:57:42 +03:00
childProcess . stderr . on ( 'data' , function ( data ) {
2019-12-04 04:44:08 +03:00
var datastr = data ;
while ( datastr . endsWith ( '\r' ) || datastr . endsWith ( '\n' ) ) { datastr = datastr . substring ( 0 , datastr . length - 1 ) ; }
console . log ( 'ERR: ' + datastr ) ;
2018-01-15 08:01:06 +03:00
if ( data . startsWith ( 'le.challenges[tls-sni-01].loopback' ) ) { return ; } // Ignore this error output from GreenLock
2018-12-02 10:41:57 +03:00
if ( data [ data . length - 1 ] == '\n' ) { data = data . substring ( 0 , data . length - 1 ) ; }
2019-07-09 01:59:44 +03:00
try {
var errlogpath = null ;
if ( typeof obj . args . mesherrorlogpath == 'string' ) { errlogpath = obj . path . join ( obj . args . mesherrorlogpath , 'mesherrors.txt' ) ; } else { errlogpath = obj . getConfigFilePath ( 'mesherrors.txt' ) ; }
2019-12-21 01:02:49 +03:00
obj . fs . appendFileSync ( obj . getConfigFilePath ( 'mesherrors.txt' ) , '-------- ' + new Date ( ) . toLocaleString ( ) + ' ---- ' + getCurrentVerion ( ) + ' --------\r\n\r\n' + data + '\r\n\r\n\r\n' ) ;
2019-07-09 01:59:44 +03:00
} catch ( ex ) { console . log ( 'ERROR: Unable to write to mesherrors.txt.' ) ; }
2018-01-15 08:01:06 +03:00
} ) ;
2019-07-18 01:57:42 +03:00
childProcess . on ( 'close' , function ( code ) { if ( ( code != 0 ) && ( code != 123 ) ) { /* console.log("Exited with code " + code); */ } } ) ;
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
// Get current and latest MeshCentral server versions using NPM
obj . getLatestServerVersion = function ( callback ) {
2017-09-15 21:45:06 +03:00
if ( callback == null ) return ;
2019-03-08 06:56:24 +03:00
try {
2019-12-21 01:02:49 +03:00
if ( typeof obj . args . selfupdate == 'string' ) { callback ( getCurrentVerion ( ) , obj . args . selfupdate ) ; return ; } // If we are targetting a specific version, return that one as current.
2019-03-08 06:56:24 +03:00
var child _process = require ( 'child_process' ) ;
var npmpath = ( ( typeof obj . args . npmpath == 'string' ) ? obj . args . npmpath : 'npm' ) ;
2019-07-18 01:57:42 +03:00
var npmproxy = ( ( typeof obj . args . npmproxy == 'string' ) ? ( ' --proxy ' + obj . args . npmproxy ) : '' ) ;
2019-12-22 23:44:16 +03:00
var env = Object . assign ( { } , process . env ) ; // Shallow clone
2019-12-21 03:45:41 +03:00
if ( typeof obj . args . npmproxy == 'string' ) { env [ 'HTTP_PROXY' ] = env [ 'HTTPS_PROXY' ] = env [ 'http_proxy' ] = env [ 'https_proxy' ] = obj . args . npmproxy ; }
var xxprocess = child _process . exec ( npmpath + npmproxy + ' view meshcentral dist-tags.latest' , { maxBuffer : 512000 , cwd : obj . parentpath , env : env } , function ( error , stdout , stderr ) { } ) ;
2019-07-18 01:57:42 +03:00
xxprocess . data = '' ;
xxprocess . stdout . on ( 'data' , function ( data ) { xxprocess . data += data ; } ) ;
xxprocess . stderr . on ( 'data' , function ( data ) { } ) ;
xxprocess . on ( 'close' , function ( code ) {
2019-03-08 06:56:24 +03:00
var latestVer = null ;
2019-07-18 01:57:42 +03:00
if ( code == 0 ) { try { latestVer = xxprocess . data . split ( ' ' ) . join ( '' ) . split ( '\r' ) . join ( '' ) . split ( '\n' ) . join ( '' ) ; } catch ( e ) { } }
2019-12-21 01:02:49 +03:00
callback ( getCurrentVerion ( ) , latestVer ) ;
2019-03-08 06:56:24 +03:00
} ) ;
2019-12-21 01:02:49 +03:00
} catch ( ex ) { callback ( getCurrentVerion ( ) , null , ex ) ; } // If the system is running out of memory, an exception here can easily happen.
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
2017-09-07 04:10:24 +03:00
// Initiate server self-update
2019-07-18 23:11:08 +03:00
obj . performServerUpdate = function ( ) {
if ( obj . serverSelfWriteAllowed == true ) { console . log ( 'Starting self upgrade...' ) ; process . exit ( 200 ) ; return true ; }
return false ;
} ;
2017-09-07 04:10:24 +03:00
2018-01-15 08:01:06 +03:00
// Initiate server self-update
2018-08-30 22:05:23 +03:00
obj . performServerCertUpdate = function ( ) { console . log ( 'Updating server certificates...' ) ; process . exit ( 200 ) ; } ;
2018-01-15 08:01:06 +03:00
2019-10-14 23:35:27 +03:00
// Start by loading configuration from Vault
obj . StartVault = function ( ) {
// Check that the configuration can only be loaded from one place
if ( ( obj . args . vault != null ) && ( obj . args . loadconfigfromdb != null ) ) { console . log ( "Can't load configuration from both database and Vault." ) ; process . exit ( ) ; return ; }
// Fix arguments if needed
if ( typeof obj . args . vault == 'string' ) {
obj . args . vault = { endpoint : obj . args . vault } ;
if ( typeof obj . args . token == 'string' ) { obj . args . vault . token = obj . args . token ; }
if ( typeof obj . args . unsealkey == 'string' ) { obj . args . vault . unsealkey = obj . args . unsealkey ; }
if ( typeof obj . args . name == 'string' ) { obj . args . vault . name = obj . args . name ; }
}
// Load configuration for HashiCorp's Vault if needed
if ( obj . args . vault ) {
if ( obj . args . vault . endpoint == null ) { console . log ( 'Missing Vault endpoint.' ) ; process . exit ( ) ; return ; }
if ( obj . args . vault . token == null ) { console . log ( 'Missing Vault token.' ) ; process . exit ( ) ; return ; }
if ( obj . args . vault . unsealkey == null ) { console . log ( 'Missing Vault unsealkey.' ) ; process . exit ( ) ; return ; }
if ( obj . args . vault . name == null ) { obj . args . vault . name = 'meshcentral' ; }
// Get new instance of the client
var vault = require ( "node-vault" ) ( { endpoint : obj . args . vault . endpoint , token : obj . args . vault . token } ) ;
vault . unseal ( { key : obj . args . vault . unsealkey } )
. then ( ( ) => {
if ( obj . args . vaultdeleteconfigfiles ) {
vault . delete ( 'secret/data/' + obj . args . vault . name )
. then ( function ( r ) { console . log ( 'Done.' ) ; process . exit ( ) ; } )
. catch ( function ( x ) { console . log ( x ) ; process . exit ( ) ; } ) ;
} else if ( obj . args . vaultpushconfigfiles ) {
// Push configuration files into Vault
if ( ( obj . args . vaultpushconfigfiles == '*' ) || ( obj . args . vaultpushconfigfiles === true ) ) { obj . args . vaultpushconfigfiles = obj . datapath ; }
obj . fs . readdir ( obj . args . vaultpushconfigfiles , function ( err , files ) {
if ( err != null ) { console . log ( 'ERROR: Unable to read from folder ' + obj . args . vaultpushconfigfiles ) ; process . exit ( ) ; return ; }
var configFound = false ;
for ( var i in files ) { if ( files [ i ] == 'config.json' ) { configFound = true ; } }
if ( configFound == false ) { console . log ( 'ERROR: No config.json in folder ' + obj . args . vaultpushconfigfiles ) ; process . exit ( ) ; return ; }
var configFiles = { } ;
for ( var i in files ) {
const file = files [ i ] ;
if ( ( file == 'config.json' ) || file . endsWith ( '.key' ) || file . endsWith ( '.crt' ) || ( file == 'terms.txt' ) || file . endsWith ( '.jpg' ) || file . endsWith ( '.png' ) ) {
const path = obj . path . join ( obj . args . vaultpushconfigfiles , files [ i ] ) , binary = Buffer . from ( obj . fs . readFileSync ( path , { encoding : 'binary' } ) , 'binary' ) ;
console . log ( 'Pushing ' + file + ', ' + binary . length + ' bytes.' ) ;
if ( file . endsWith ( '.json' ) || file . endsWith ( '.key' ) || file . endsWith ( '.crt' ) ) { configFiles [ file ] = binary . toString ( ) ; } else { configFiles [ file ] = binary . toString ( 'base64' ) ; }
}
}
vault . write ( 'secret/data/' + obj . args . vault . name , { "data" : configFiles } )
. then ( function ( r ) { console . log ( 'Done.' ) ; process . exit ( ) ; } )
. catch ( function ( x ) { console . log ( x ) ; process . exit ( ) ; } ) ;
} ) ;
} else {
// Read configuration files from Vault
vault . read ( 'secret/data/' + obj . args . vault . name )
. then ( function ( r ) {
if ( ( r == null ) || ( r . data == null ) || ( r . data . data == null ) ) { console . log ( 'Unable to read configuration from Vault.' ) ; process . exit ( ) ; return ; }
var configFiles = obj . configurationFiles = r . data . data ;
// Decode Base64 when needed
for ( var file in configFiles ) { if ( ! file . endsWith ( '.json' ) && ! file . endsWith ( '.key' ) && ! file . endsWith ( '.crt' ) ) { configFiles [ file ] = Buffer . from ( configFiles [ file ] , 'base64' ) ; } }
// Save all of the files
if ( obj . args . vaultpullconfigfiles ) {
for ( var i in configFiles ) {
var fullFileName = obj . path . join ( obj . args . vaultpullconfigfiles , i ) ;
try { obj . fs . writeFileSync ( fullFileName , configFiles [ i ] ) ; } catch ( ex ) { console . log ( 'Unable to write to ' + fullFileName ) ; process . exit ( ) ; return ; }
console . log ( 'Pulling ' + i + ', ' + configFiles [ i ] . length + ' bytes.' ) ;
}
console . log ( 'Done.' ) ;
process . exit ( ) ;
}
// Parse the new configuration file
var config2 = null ;
try { config2 = JSON . parse ( configFiles [ 'config.json' ] ) ; } catch ( ex ) { console . log ( 'Error, unable to parse config.json from Vault.' ) ; process . exit ( ) ; return ; }
// Set the command line arguments to the config file if they are not present
if ( ! config2 . settings ) { config2 . settings = { } ; }
for ( var i in args ) { config2 . settings [ i ] = args [ i ] ; }
obj . args = args = config2 . settings ;
// Lower case all keys in the config file
try {
2020-02-28 05:05:18 +03:00
require ( './common.js' ) . objKeysToLower ( config2 , [ 'ldapoptions' , 'defaultuserwebstate' , 'forceduserwebstate' ] ) ;
2019-10-14 23:35:27 +03:00
} catch ( ex ) {
console . log ( 'CRITICAL ERROR: Unable to access the file \"./common.js\".\r\nCheck folder & file permissions.' ) ;
process . exit ( ) ;
return ;
}
// Grad some of the values from the original config.json file if present.
if ( ( config . settings . vault != null ) && ( config2 . settings != null ) ) { config2 . settings . vault = config . settings . vault ; }
// We got a new config.json from the database, let's use it.
config = obj . config = config2 ;
obj . StartEx ( ) ;
} )
. catch ( function ( x ) { console . log ( x ) ; process . exit ( ) ; } ) ;
}
} ) . catch ( function ( x ) { console . log ( x ) ; process . exit ( ) ; } ) ;
return ;
}
}
2019-02-03 01:54:36 +03:00
// Look for easy command line instructions and do them here.
2017-08-28 19:27:45 +03:00
obj . StartEx = function ( ) {
2018-08-30 22:05:23 +03:00
var i ;
2018-03-15 01:16:55 +03:00
//var wincmd = require('node-windows');
//wincmd.list(function (svc) { console.log(svc); }, true);
2018-08-30 22:05:23 +03:00
2019-06-12 20:23:26 +03:00
// Check top level configuration for any unreconized values
2019-12-05 00:45:29 +03:00
if ( config ) { for ( var i in config ) { if ( ( typeof i == 'string' ) && ( i . length > 0 ) && ( i [ 0 ] != '_' ) && ( [ 'settings' , 'domains' , 'configfiles' , 'smtp' , 'letsencrypt' , 'peers' ] . indexOf ( i ) == - 1 ) ) { addServerWarning ( 'Unrecognized configuration option \"' + i + '\".' ) ; } } }
2019-06-12 20:23:26 +03:00
2020-01-16 17:06:35 +03:00
if ( typeof obj . args . userallowedip == 'string' ) { if ( obj . args . userallowedip == '' ) { config . settings . userallowedip = obj . args . userallowedip = null ; } else { config . settings . userallowedip = obj . args . userallowedip = obj . args . userallowedip . split ( ',' ) ; } }
if ( typeof obj . args . userblockedip == 'string' ) { if ( obj . args . userblockedip == '' ) { config . settings . userblockedip = obj . args . userblockedip = null ; } else { config . settings . userblockedip = obj . args . userblockedip = obj . args . userblockedip . split ( ',' ) ; } }
if ( typeof obj . args . agentallowedip == 'string' ) { if ( obj . args . agentallowedip == '' ) { config . settings . agentallowedip = obj . args . agentallowedip = null ; } else { config . settings . agentallowedip = obj . args . agentallowedip = obj . args . agentallowedip . split ( ',' ) ; } }
if ( typeof obj . args . agentblockedip == 'string' ) { if ( obj . args . agentblockedip == '' ) { config . settings . agentblockedip = obj . args . agentblockedip = null ; } else { config . settings . agentblockedip = obj . args . agentblockedip = obj . args . agentblockedip . split ( ',' ) ; } }
2019-01-11 21:02:54 +03:00
if ( typeof obj . args . swarmallowedip == 'string' ) { if ( obj . args . swarmallowedip == '' ) { obj . args . swarmallowedip = null ; } else { obj . args . swarmallowedip = obj . args . swarmallowedip . split ( ',' ) ; } }
2019-10-29 02:52:12 +03:00
if ( ( typeof obj . args . agentupdateblocksize == 'number' ) && ( obj . args . agentupdateblocksize >= 1024 ) && ( obj . args . agentupdateblocksize <= 65531 ) ) { obj . agentUpdateBlockSize = obj . args . agentupdateblocksize ; }
2019-08-23 01:31:39 +03:00
// Local console tracing
if ( typeof obj . args . debug == 'string' ) { obj . debugSources = obj . args . debug . toLowerCase ( ) . split ( ',' ) ; }
else if ( typeof obj . args . debug == 'object' ) { obj . debugSources = obj . args . debug ; }
else if ( obj . args . debug === true ) { obj . debugSources = '*' ; }
2019-05-09 04:14:30 +03:00
require ( './db.js' ) . CreateDB ( obj ,
function ( db ) {
obj . db = db ;
obj . db . SetupDatabase ( function ( dbversion ) {
// See if any database operations needs to be completed
if ( obj . args . deletedomain ) { obj . db . DeleteDomain ( obj . args . deletedomain , function ( ) { console . log ( 'Deleted domain ' + obj . args . deletedomain + '.' ) ; process . exit ( ) ; } ) ; return ; }
if ( obj . args . deletedefaultdomain ) { obj . db . DeleteDomain ( '' , function ( ) { console . log ( 'Deleted default domain.' ) ; process . exit ( ) ; } ) ; return ; }
if ( obj . args . showall ) { obj . db . GetAll ( function ( err , docs ) { console . log ( docs ) ; process . exit ( ) ; } ) ; return ; }
if ( obj . args . showusers ) { obj . db . GetAllType ( 'user' , function ( err , docs ) { console . log ( docs ) ; process . exit ( ) ; } ) ; return ; }
2019-12-30 05:10:58 +03:00
if ( obj . args . showusergroups ) { obj . db . GetAllType ( 'ugrp' , function ( err , docs ) { console . log ( docs ) ; process . exit ( ) ; } ) ; return ; }
2019-05-09 04:14:30 +03:00
if ( obj . args . shownodes ) { obj . db . GetAllType ( 'node' , function ( err , docs ) { console . log ( docs ) ; process . exit ( ) ; } ) ; return ; }
if ( obj . args . showmeshes ) { obj . db . GetAllType ( 'mesh' , function ( err , docs ) { console . log ( docs ) ; process . exit ( ) ; } ) ; return ; }
if ( obj . args . showevents ) { obj . db . GetAllEvents ( function ( err , docs ) { console . log ( docs ) ; process . exit ( ) ; } ) ; return ; }
2019-12-09 07:46:25 +03:00
if ( obj . args . showsmbios ) { obj . db . GetAllSMBIOS ( function ( err , docs ) { console . log ( docs ) ; process . exit ( ) ; } ) ; return ; }
2019-05-09 04:14:30 +03:00
if ( obj . args . showpower ) { obj . db . getAllPower ( function ( err , docs ) { console . log ( docs ) ; process . exit ( ) ; } ) ; return ; }
if ( obj . args . clearpower ) { obj . db . removeAllPowerEvents ( function ( ) { process . exit ( ) ; } ) ; return ; }
if ( obj . args . showiplocations ) { obj . db . GetAllType ( 'iploc' , function ( err , docs ) { console . log ( docs ) ; process . exit ( ) ; } ) ; return ; }
if ( obj . args . logintoken ) { obj . getLoginToken ( obj . args . logintoken , function ( r ) { console . log ( r ) ; process . exit ( ) ; } ) ; return ; }
if ( obj . args . logintokenkey ) { obj . showLoginTokenKey ( function ( r ) { console . log ( r ) ; process . exit ( ) ; } ) ; return ; }
2019-10-03 23:32:54 +03:00
if ( obj . args . recordencryptionrecode ) { obj . db . performRecordEncryptionRecode ( function ( count ) { console . log ( 'Re-encoded ' + count + ' record(s).' ) ; process . exit ( ) ; } ) ; return ; }
2019-12-09 07:46:25 +03:00
if ( obj . args . dbstats ) { obj . db . getDbStats ( function ( stats ) { console . log ( stats ) ; process . exit ( ) ; } ) ; return ; }
2019-05-09 04:14:30 +03:00
// Show a list of all configuration files in the database
if ( obj . args . dblistconfigfiles ) {
2019-10-30 02:17:29 +03:00
obj . db . GetAllType ( 'cfile' , function ( err , docs ) { if ( err == null ) { if ( docs . length == 0 ) { console . log ( "No files found." ) ; } else { for ( var i in docs ) { console . log ( docs [ i ] . _id . split ( '/' ) [ 1 ] + ', ' + Buffer . from ( docs [ i ] . data , 'base64' ) . length + ' bytes.' ) ; } } } else { console . log ( 'Unable to read from database.' ) ; } process . exit ( ) ; } ) ; return ;
2019-05-09 04:14:30 +03:00
}
2019-02-03 01:54:36 +03:00
2019-05-09 04:14:30 +03:00
// Display the content of a configuration file in the database
if ( obj . args . dbshowconfigfile ) {
2019-10-30 02:17:29 +03:00
if ( typeof obj . args . configkey != 'string' ) { console . log ( "Error, --configkey is required." ) ; process . exit ( ) ; return ; }
2019-05-09 04:14:30 +03:00
obj . db . getConfigFile ( obj . args . dbshowconfigfile , function ( err , docs ) {
if ( err == null ) {
2019-10-30 02:17:29 +03:00
if ( docs . length == 0 ) { console . log ( "File not found." ) ; } else {
2019-05-09 04:14:30 +03:00
var data = obj . db . decryptData ( obj . args . configkey , docs [ 0 ] . data ) ;
2019-10-30 02:17:29 +03:00
if ( data == null ) { console . log ( "Invalid config key." ) ; } else { console . log ( data ) ; }
2019-05-09 04:14:30 +03:00
}
2019-10-30 02:17:29 +03:00
} else { console . log ( "Unable to read from database." ) ; }
2019-05-09 04:14:30 +03:00
process . exit ( ) ;
} ) ; return ;
}
2019-02-03 01:54:36 +03:00
2019-05-09 04:14:30 +03:00
// Delete all configuration files from database
if ( obj . args . dbdeleteconfigfiles ) {
2019-10-30 02:17:29 +03:00
console . log ( "Deleting all configuration files from the database..." ) ; obj . db . RemoveAllOfType ( 'cfile' , function ( ) { console . log ( 'Done.' ) ; process . exit ( ) ; } ) ;
2019-05-09 04:14:30 +03:00
}
2019-02-02 02:16:46 +03:00
2019-05-09 04:14:30 +03:00
// Push all relevent files from meshcentral-data into the database
if ( obj . args . dbpushconfigfiles ) {
2019-10-30 02:17:29 +03:00
if ( typeof obj . args . configkey != 'string' ) { console . log ( "Error, --configkey is required." ) ; process . exit ( ) ; return ; }
2019-05-09 04:14:30 +03:00
if ( ( obj . args . dbpushconfigfiles !== true ) && ( typeof obj . args . dbpushconfigfiles != 'string' ) ) {
2019-10-30 02:17:29 +03:00
console . log ( "Usage: --dbpulldatafiles (path) This will import files from folder into the database" ) ;
console . log ( " --dbpulldatafiles This will import files from meshcentral-data into the db." ) ;
2019-05-09 04:14:30 +03:00
process . exit ( ) ;
} else {
if ( ( obj . args . dbpushconfigfiles == '*' ) || ( obj . args . dbpushconfigfiles === true ) ) { obj . args . dbpushconfigfiles = obj . datapath ; }
2019-02-27 01:39:45 +03:00
obj . fs . readdir ( obj . args . dbpushconfigfiles , function ( err , files ) {
2019-05-09 04:14:30 +03:00
if ( err != null ) { console . log ( 'ERROR: Unable to read from folder ' + obj . args . dbpushconfigfiles ) ; process . exit ( ) ; return ; }
var configFound = false ;
for ( var i in files ) { if ( files [ i ] == 'config.json' ) { configFound = true ; } }
if ( configFound == false ) { console . log ( 'ERROR: No config.json in folder ' + obj . args . dbpushconfigfiles ) ; process . exit ( ) ; return ; }
obj . db . RemoveAllOfType ( 'cfile' , function ( ) {
obj . fs . readdir ( obj . args . dbpushconfigfiles , function ( err , files ) {
var lockCount = 1
for ( var i in files ) {
const file = files [ i ] ;
if ( ( file == 'config.json' ) || file . endsWith ( '.key' ) || file . endsWith ( '.crt' ) || ( file == 'terms.txt' ) || file . endsWith ( '.jpg' ) || file . endsWith ( '.png' ) ) {
const path = obj . path . join ( obj . args . dbpushconfigfiles , files [ i ] ) , binary = Buffer . from ( obj . fs . readFileSync ( path , { encoding : 'binary' } ) , 'binary' ) ;
console . log ( 'Pushing ' + file + ', ' + binary . length + ' bytes.' ) ;
lockCount ++ ;
obj . db . setConfigFile ( file , obj . db . encryptData ( obj . args . configkey , binary ) , function ( ) { if ( ( -- lockCount ) == 0 ) { console . log ( 'Done.' ) ; process . exit ( ) ; } } ) ;
}
}
if ( -- lockCount == 0 ) { process . exit ( ) ; }
} ) ;
} ) ;
2019-02-27 01:39:45 +03:00
} ) ;
2019-05-09 04:14:30 +03:00
}
return ;
}
2019-02-02 02:16:46 +03:00
2019-05-09 04:14:30 +03:00
// Pull all database files into meshcentral-data
if ( obj . args . dbpullconfigfiles ) {
2019-10-30 02:17:29 +03:00
if ( typeof obj . args . configkey != 'string' ) { console . log ( "Error, --configkey is required." ) ; process . exit ( ) ; return ; }
2019-05-09 04:14:30 +03:00
if ( typeof obj . args . dbpullconfigfiles != 'string' ) {
2019-10-30 02:17:29 +03:00
console . log ( "Usage: --dbpulldatafiles (path)" ) ;
2019-05-09 04:14:30 +03:00
process . exit ( ) ;
} else {
obj . db . GetAllType ( 'cfile' , function ( err , docs ) {
if ( err == null ) {
if ( docs . length == 0 ) {
2019-10-30 02:17:29 +03:00
console . log ( "File not found." ) ;
2019-02-03 01:54:36 +03:00
} else {
2019-05-09 04:14:30 +03:00
for ( var i in docs ) {
const file = docs [ i ] . _id . split ( '/' ) [ 1 ] , binary = obj . db . decryptData ( obj . args . configkey , docs [ i ] . data ) ;
if ( binary == null ) {
2019-10-30 02:17:29 +03:00
console . log ( "Invalid config key." ) ;
2019-05-09 04:14:30 +03:00
} else {
var fullFileName = obj . path . join ( obj . args . dbpullconfigfiles , file ) ;
try { obj . fs . writeFileSync ( fullFileName , binary ) ; } catch ( ex ) { console . log ( 'Unable to write to ' + fullFileName ) ; process . exit ( ) ; return ; }
console . log ( 'Pulling ' + file + ', ' + binary . length + ' bytes.' ) ;
}
}
2019-02-03 01:54:36 +03:00
}
2019-05-09 04:14:30 +03:00
} else {
2019-10-30 02:17:29 +03:00
console . log ( "Unable to read from database." ) ;
2019-02-02 02:16:46 +03:00
}
2019-05-09 04:14:30 +03:00
process . exit ( ) ;
} ) ;
2019-02-02 02:16:46 +03:00
}
2019-05-09 04:14:30 +03:00
return ;
}
2019-02-02 02:16:46 +03:00
2019-05-09 04:14:30 +03:00
if ( obj . args . dbexport ) {
// Export the entire database to a JSON file
if ( obj . args . dbexport == true ) { obj . args . dbexport = obj . getConfigFilePath ( 'meshcentral.db.json' ) ; }
obj . db . GetAll ( function ( err , docs ) {
obj . fs . writeFileSync ( obj . args . dbexport , JSON . stringify ( docs ) ) ;
console . log ( 'Exported ' + docs . length + ' objects(s) to ' + obj . args . dbexport + '.' ) ; process . exit ( ) ;
2019-02-25 22:13:13 +03:00
} ) ;
2019-05-09 04:14:30 +03:00
return ;
}
if ( obj . args . dbexportmin ) {
// Export a minimal database to a JSON file. Export only users, meshes and nodes.
// This is a useful command to look at the database.
if ( obj . args . dbexportmin == true ) { obj . args . dbexportmin = obj . getConfigFilePath ( 'meshcentral.db.json' ) ; }
obj . db . GetAllType ( { $in : [ 'user' , 'node' , 'mesh' ] } , function ( err , docs ) {
obj . fs . writeFileSync ( obj . args . dbexportmin , JSON . stringify ( docs ) ) ;
console . log ( 'Exported ' + docs . length + ' objects(s) to ' + obj . args . dbexportmin + '.' ) ; process . exit ( ) ;
} ) ;
return ;
}
if ( obj . args . dbimport ) {
// Import the entire database from a JSON file
if ( obj . args . dbimport == true ) { obj . args . dbimport = obj . getConfigFilePath ( 'meshcentral.db.json' ) ; }
var json = null , json2 = "" , badCharCount = 0 ;
try { json = obj . fs . readFileSync ( obj . args . dbimport , { encoding : 'utf8' } ) ; } catch ( e ) { console . log ( 'Invalid JSON file: ' + obj . args . dbimport + ': ' + e ) ; process . exit ( ) ; }
for ( i = 0 ; i < json . length ; i ++ ) { if ( json . charCodeAt ( i ) >= 32 ) { json2 += json [ i ] ; } else { var tt = json . charCodeAt ( i ) ; if ( tt != 10 && tt != 13 ) { badCharCount ++ ; } } } // Remove all bad chars
if ( badCharCount > 0 ) { console . log ( badCharCount + ' invalid character(s) where removed.' ) ; }
try { json = JSON . parse ( json2 ) ; } catch ( e ) { console . log ( 'Invalid JSON format: ' + obj . args . dbimport + ': ' + e ) ; process . exit ( ) ; }
if ( ( json == null ) || ( typeof json . length != 'number' ) || ( json . length < 1 ) ) { console . log ( 'Invalid JSON format: ' + obj . args . dbimport + '.' ) ; }
for ( i in json ) { if ( ( json [ i ] . type == "mesh" ) && ( json [ i ] . links != null ) ) { for ( var j in json [ i ] . links ) { var esc = obj . common . escapeFieldName ( j ) ; if ( esc !== j ) { json [ i ] . links [ esc ] = json [ i ] . links [ j ] ; delete json [ i ] . links [ j ] ; } } } } // Escape MongoDB invalid field chars
//for (i in json) { if ((json[i].type == "node") && (json[i].host != null)) { json[i].rname = json[i].host; delete json[i].host; } } // DEBUG: Change host to rname
setTimeout ( function ( ) { // If the Mongo database is being created for the first time, there is a race condition here. This will get around it.
obj . db . RemoveAll ( function ( ) {
obj . db . InsertMany ( json , function ( err ) {
if ( err != null ) { console . log ( err ) ; } else { console . log ( 'Imported ' + json . length + ' objects(s) from ' + obj . args . dbimport + '.' ) ; } process . exit ( ) ;
} ) ;
} ) ;
} , 100 ) ;
return ;
}
/ *
if ( obj . args . dbimport ) {
// Import the entire database from a very large JSON file
obj . db . RemoveAll ( function ( ) {
if ( obj . args . dbimport == true ) { obj . args . dbimport = obj . getConfigFilePath ( 'meshcentral.db.json' ) ; }
var json = null , json2 = "" , badCharCount = 0 ;
const StreamArray = require ( 'stream-json/streamers/StreamArray' ) ;
const jsonStream = StreamArray . withParser ( ) ;
jsonStream . on ( 'data' , function ( data ) { obj . db . Set ( data . value ) ; } ) ;
jsonStream . on ( 'end' , ( ) => { console . log ( 'Done.' ) ; process . exit ( ) ; } ) ;
obj . fs . createReadStream ( obj . args . dbimport ) . pipe ( jsonStream . input ) ;
} ) ;
return ;
}
* /
if ( obj . args . dbmerge ) {
// Import the entire database from a JSON file
if ( obj . args . dbmerge == true ) { obj . args . dbmerge = obj . getConfigFilePath ( 'meshcentral.db.json' ) ; }
var json = null , json2 = "" , badCharCount = 0 ;
try { json = obj . fs . readFileSync ( obj . args . dbmerge , { encoding : 'utf8' } ) ; } catch ( e ) { console . log ( 'Invalid JSON file: ' + obj . args . dbmerge + ': ' + e ) ; process . exit ( ) ; }
for ( i = 0 ; i < json . length ; i ++ ) { if ( json . charCodeAt ( i ) >= 32 ) { json2 += json [ i ] ; } else { var tt = json . charCodeAt ( i ) ; if ( tt != 10 && tt != 13 ) { badCharCount ++ ; } } } // Remove all bad chars
if ( badCharCount > 0 ) { console . log ( badCharCount + ' invalid character(s) where removed.' ) ; }
try { json = JSON . parse ( json2 ) ; } catch ( e ) { console . log ( 'Invalid JSON format: ' + obj . args . dbmerge + ': ' + e ) ; process . exit ( ) ; }
if ( ( json == null ) || ( typeof json . length != 'number' ) || ( json . length < 1 ) ) { console . log ( 'Invalid JSON format: ' + obj . args . dbimport + '.' ) ; }
// Get all users from current database
obj . db . GetAllType ( 'user' , function ( err , docs ) {
var users = { } , usersCount = 0 ;
for ( var i in docs ) { users [ docs [ i ] . _id ] = docs [ i ] ; usersCount ++ ; }
// Fetch all meshes from the database
obj . db . GetAllType ( 'mesh' , function ( err , docs ) {
obj . common . unEscapeAllLinksFieldName ( docs ) ;
var meshes = { } , meshesCount = 0 ;
for ( var i in docs ) { meshes [ docs [ i ] . _id ] = docs [ i ] ; meshesCount ++ ; }
console . log ( 'Loaded ' + usersCount + ' users and ' + meshesCount + ' meshes.' ) ;
// Look at each object in the import file
var objectToAdd = [ ] ;
for ( var i in json ) {
var newobj = json [ i ] ;
if ( newobj . type == 'user' ) {
// Check if the user already exists
var existingUser = users [ newobj . _id ] ;
if ( existingUser ) {
// Merge the links
if ( typeof newobj . links == 'object' ) {
for ( var j in newobj . links ) {
if ( ( existingUser . links == null ) || ( existingUser . links [ j ] == null ) ) {
if ( existingUser . links == null ) { existingUser . links = { } ; }
existingUser . links [ j ] = newobj . links [ j ] ;
}
}
2019-02-16 02:11:52 +03:00
}
2019-05-09 04:14:30 +03:00
if ( existingUser . name == 'admin' ) { existingUser . links = { } ; }
objectToAdd . push ( existingUser ) ; // Add this user
} else {
objectToAdd . push ( newobj ) ; // Add this user
2019-02-16 01:50:23 +03:00
}
2019-05-09 04:14:30 +03:00
} else if ( newobj . type == 'mesh' ) {
// Add this object after escaping
objectToAdd . push ( obj . common . escapeLinksFieldName ( newobj ) ) ;
} // Don't add nodes.
2019-02-16 01:50:23 +03:00
}
2019-05-09 04:14:30 +03:00
console . log ( 'Importing ' + objectToAdd . length + ' object(s)...' ) ;
var pendingCalls = 1 ;
for ( var i in objectToAdd ) {
pendingCalls ++ ;
obj . db . Set ( objectToAdd [ i ] , function ( err ) { if ( err != null ) { console . log ( err ) ; } else { if ( -- pendingCalls == 0 ) { process . exit ( ) ; } } } ) ;
}
if ( -- pendingCalls == 0 ) { process . exit ( ) ; }
} ) ;
} ) ;
2018-07-17 03:49:55 +03:00
return ;
2019-02-03 01:54:36 +03:00
}
2018-07-17 03:49:55 +03:00
2019-05-09 04:14:30 +03:00
// Load configuration for database if needed
if ( obj . args . loadconfigfromdb ) {
var key = null ;
if ( typeof obj . args . configkey == 'string' ) { key = obj . args . configkey ; }
else if ( typeof obj . args . loadconfigfromdb == 'string' ) { key = obj . args . loadconfigfromdb ; }
2019-10-30 02:17:29 +03:00
if ( key == null ) { console . log ( "Error, --configkey is required." ) ; process . exit ( ) ; return ; }
2019-05-09 04:14:30 +03:00
obj . db . getAllConfigFiles ( key , function ( configFiles ) {
2019-10-30 02:17:29 +03:00
if ( configFiles == null ) { console . log ( "Error, no configuration files found or invalid configkey." ) ; process . exit ( ) ; return ; }
if ( ! configFiles [ 'config.json' ] ) { console . log ( "Error, could not file config.json from database." ) ; process . exit ( ) ; return ; }
2019-05-09 04:14:30 +03:00
obj . configurationFiles = configFiles ;
// Parse the new configuration file
var config2 = null ;
try { config2 = JSON . parse ( configFiles [ 'config.json' ] ) ; } catch ( ex ) { console . log ( 'Error, unable to parse config.json from database.' ) ; process . exit ( ) ; return ; }
// Set the command line arguments to the config file if they are not present
if ( ! config2 . settings ) { config2 . settings = { } ; }
for ( i in args ) { config2 . settings [ i ] = args [ i ] ; }
// Lower case all keys in the config file
try {
2020-02-28 05:05:18 +03:00
require ( './common.js' ) . objKeysToLower ( config2 , [ 'ldapoptions' , 'defaultuserwebstate' , 'forceduserwebstate' ] ) ;
2019-05-09 04:14:30 +03:00
} catch ( ex ) {
2019-12-01 23:52:32 +03:00
console . log ( "CRITICAL ERROR: Unable to access the file \"./common.js\".\r\nCheck folder & file permissions." ) ;
2019-05-09 04:14:30 +03:00
process . exit ( ) ;
return ;
}
// Grad some of the values from the original config.json file if present.
2020-02-04 05:58:58 +03:00
config2 [ 'mysql' ] = config [ 'mysql' ] ;
2020-02-02 23:37:27 +03:00
config2 [ 'mariadb' ] = config [ 'mariadb' ] ;
2019-05-09 04:14:30 +03:00
config2 [ 'mongodb' ] = config [ 'mongodb' ] ;
config2 [ 'mongodbcol' ] = config [ 'mongodbcol' ] ;
config2 [ 'dbencryptkey' ] = config [ 'dbencryptkey' ] ;
2019-02-03 01:54:36 +03:00
2019-05-09 04:14:30 +03:00
// We got a new config.json from the database, let's use it.
config = obj . config = config2 ;
obj . StartEx1b ( ) ;
} ) ;
} else {
2019-10-14 23:35:27 +03:00
config = obj . config = getConfig ( obj . args . vault == null ) ;
2019-05-09 04:14:30 +03:00
obj . StartEx1b ( ) ;
}
2018-07-17 03:49:55 +03:00
} ) ;
}
2019-05-09 04:14:30 +03:00
) ;
2019-02-03 01:54:36 +03:00
} ;
2018-07-17 03:49:55 +03:00
2019-07-18 01:57:42 +03:00
// Time to start the server of real.
2019-02-03 01:54:36 +03:00
obj . StartEx1b = function ( ) {
var i ;
2017-08-28 19:27:45 +03:00
2020-02-17 21:24:32 +03:00
// Linux format /var/log/auth.log
if ( obj . config . settings . authlog != null ) {
obj . fs . open ( obj . config . settings . authlog , 'a' , function ( err , fd ) {
if ( err == null ) { obj . authlog = fd ; } else { console . log ( 'ERROR: Unable to open: ' + obj . config . settings . authlog ) ; }
} )
}
2019-07-18 23:11:08 +03:00
// Check if self update is allowed. If running as a Windows service, self-update is not possible.
if ( obj . fs . existsSync ( obj . path . join ( _ _dirname , 'daemon' ) ) ) { obj . serverSelfWriteAllowed = false ; }
2019-02-03 01:54:36 +03:00
// If we are targetting a specific version, update now.
2019-07-18 23:11:08 +03:00
if ( ( obj . serverSelfWriteAllowed == true ) && ( typeof obj . args . selfupdate == 'string' ) ) {
2019-02-03 01:54:36 +03:00
obj . args . selfupdate = obj . args . selfupdate . toLowerCase ( ) ;
2019-12-21 01:02:49 +03:00
if ( getCurrentVerion ( ) !== obj . args . selfupdate ) { obj . performServerUpdate ( ) ; return ; } // We are targetting a specific version, run self update now.
2019-02-03 01:54:36 +03:00
}
2017-08-28 19:27:45 +03:00
2019-02-03 01:54:36 +03:00
// Write the server state
obj . updateServerState ( 'state' , 'starting' ) ;
2019-07-18 01:57:42 +03:00
if ( process . pid ) { obj . updateServerState ( 'server-pid' , process . pid ) ; }
2019-07-18 03:34:34 +03:00
if ( process . ppid ) { obj . updateServerState ( 'server-parent-pid' , process . ppid ) ; }
2019-02-03 01:54:36 +03:00
2019-03-08 06:56:24 +03:00
// Start memory tracking if requested
if ( typeof obj . args . memorytracking == 'number' ) {
var info = process . memoryUsage ( ) , txt = [ ] ;
info . time = Date . now ( ) ;
for ( var i in info ) { txt . push ( i ) ; }
2019-03-14 22:28:58 +03:00
obj . fs . appendFile ( obj . getConfigFilePath ( 'memorytracking.csv' ) , txt . join ( ',' ) + '\r\n' , function ( err ) { } ) ;
2019-03-08 06:56:24 +03:00
setInterval ( function ( ) {
var info = process . memoryUsage ( ) , txt = [ ] ;
info . time = Date . now ( ) ;
for ( var i in info ) { txt . push ( info [ i ] ) ; }
2019-03-14 22:28:58 +03:00
obj . fs . appendFile ( obj . getConfigFilePath ( 'memorytracking.csv' ) , txt . join ( ',' ) + '\r\n' , function ( err ) { } ) ;
2019-03-08 06:56:24 +03:00
} , ( obj . args . memorytracking * 1000 ) ) ;
}
2019-02-03 01:54:36 +03:00
// Read environment variables. For a subset of arguments, we allow them to be read from environment variables.
2019-11-18 00:35:50 +03:00
var xenv = [ 'user' , 'port' , 'mpsport' , 'mpsaliasport' , 'redirport' , 'rediraliasport' , 'exactport' , 'debug' ] ;
2019-02-03 01:54:36 +03:00
for ( i in xenv ) { if ( ( obj . args [ xenv [ i ] ] == null ) && ( process . env [ 'mesh' + xenv [ i ] ] ) ) { obj . args [ xenv [ i ] ] = obj . common . toNumber ( process . env [ 'mesh' + xenv [ i ] ] ) ; } }
// Validate the domains, this is used for multi-hosting
if ( obj . config . domains == null ) { obj . config . domains = { } ; }
if ( obj . config . domains [ '' ] == null ) { obj . config . domains [ '' ] = { } ; }
if ( obj . config . domains [ '' ] . dns != null ) { console . log ( "ERROR: Default domain can't have a DNS name." ) ; return ; }
2019-12-18 23:00:08 +03:00
var xdomains = { } ; for ( i in obj . config . domains ) { xdomains [ i . toLowerCase ( ) ] = obj . config . domains [ i ] ; } obj . config . domains = xdomains ;
2019-02-03 01:54:36 +03:00
var bannedDomains = [ 'public' , 'private' , 'images' , 'scripts' , 'styles' , 'views' ] ; // List of banned domains
2019-04-11 23:41:51 +03:00
for ( i in obj . config . domains ) { for ( var j in bannedDomains ) { if ( i == bannedDomains [ j ] ) { console . log ( "ERROR: Domain '" + i + "' is not allowed domain name in config.json." ) ; return ; } } }
2019-02-03 01:54:36 +03:00
for ( i in obj . config . domains ) {
2019-12-01 23:52:32 +03:00
if ( ( i . length > 0 ) && ( i [ 0 ] == '_' ) ) { delete obj . config . domains [ i ] ; continue ; } // Remove any domains with names that start with _
2019-04-11 23:41:51 +03:00
if ( typeof config . domains [ i ] . auth == 'string' ) { config . domains [ i ] . auth = config . domains [ i ] . auth . toLowerCase ( ) ; }
2019-02-12 01:41:15 +03:00
if ( obj . config . domains [ i ] . limits == null ) { obj . config . domains [ i ] . limits = { } ; }
2019-02-03 01:54:36 +03:00
if ( obj . config . domains [ i ] . dns == null ) { obj . config . domains [ i ] . url = ( i == '' ) ? '/' : ( '/' + i + '/' ) ; } else { obj . config . domains [ i ] . url = '/' ; }
obj . config . domains [ i ] . id = i ;
2019-11-26 01:30:23 +03:00
if ( typeof obj . config . domains [ i ] . loginkey == 'string' ) { obj . config . domains [ i ] . loginkey = [ obj . config . domains [ i ] . loginkey ] ; }
2019-02-03 01:54:36 +03:00
if ( typeof obj . config . domains [ i ] . userallowedip == 'string' ) { if ( obj . config . domains [ i ] . userallowedip == '' ) { obj . config . domains [ i ] . userallowedip = null ; } else { obj . config . domains [ i ] . userallowedip = obj . config . domains [ i ] . userallowedip . split ( ',' ) ; } }
2020-01-16 17:02:56 +03:00
if ( typeof obj . config . domains [ i ] . userblockedip == 'string' ) { if ( obj . config . domains [ i ] . userblockedip == '' ) { obj . config . domains [ i ] . userblockedip = null ; } else { obj . config . domains [ i ] . userblockedip = obj . config . domains [ i ] . userblockedip . split ( ',' ) ; } }
2019-02-03 01:54:36 +03:00
if ( typeof obj . config . domains [ i ] . agentallowedip == 'string' ) { if ( obj . config . domains [ i ] . agentallowedip == '' ) { obj . config . domains [ i ] . agentallowedip = null ; } else { obj . config . domains [ i ] . agentallowedip = obj . config . domains [ i ] . agentallowedip . split ( ',' ) ; } }
if ( typeof obj . config . domains [ i ] . agentblockedip == 'string' ) { if ( obj . config . domains [ i ] . agentblockedip == '' ) { obj . config . domains [ i ] . agentblockedip = null ; } else { obj . config . domains [ i ] . agentblockedip = obj . config . domains [ i ] . agentblockedip . split ( ',' ) ; } }
2019-11-29 07:57:34 +03:00
if ( ( obj . config . domains [ i ] . passwordrequirements != null ) && ( typeof obj . config . domains [ i ] . passwordrequirements == 'object' ) ) {
if ( typeof obj . config . domains [ i ] . passwordrequirements . skip2factor == 'string' ) {
obj . config . domains [ i ] . passwordrequirements . skip2factor = obj . config . domains [ i ] . passwordrequirements . skip2factor . split ( ',' ) ;
} else {
delete obj . config . domains [ i ] . passwordrequirements . skip2factor ;
}
}
2019-04-11 23:41:51 +03:00
if ( ( obj . config . domains [ i ] . auth == 'ldap' ) && ( typeof obj . config . domains [ i ] . ldapoptions != 'object' ) ) {
if ( i == '' ) { console . log ( "ERROR: Default domain is LDAP, but is missing LDAPOptions." ) ; } else { console . log ( "ERROR: Domain '" + i + "' is LDAP, but is missing LDAPOptions." ) ; }
process . exit ( ) ;
return ;
}
2019-04-12 00:52:23 +03:00
if ( ( obj . config . domains [ i ] . auth == 'ldap' ) || ( obj . config . domains [ i ] . auth == 'sspi' ) ) { obj . config . domains [ i ] . newaccounts = 0 ; } // No new accounts allowed in SSPI/LDAP authentication modes.
2019-05-13 05:14:24 +03:00
// Convert newAccountsRights from a array of strings to flags number.
if ( obj . config . domains [ i ] . newaccountsrights && Array . isArray ( obj . config . domains [ i ] . newaccountsrights ) ) {
var newAccRights = 0 ;
for ( var j in obj . config . domains [ i ] . newaccountsrights ) {
var r = obj . config . domains [ i ] . newaccountsrights [ j ] . toLowerCase ( ) ;
2019-06-27 08:13:56 +03:00
if ( r == 'fulladmin' ) { newAccRights = 4294967295 ; } // 0xFFFFFFFF
2019-05-13 05:14:24 +03:00
if ( r == 'serverbackup' ) { newAccRights |= 1 ; }
if ( r == 'manageusers' ) { newAccRights |= 2 ; }
if ( r == 'serverrestore' ) { newAccRights |= 4 ; }
if ( r == 'fileaccess' ) { newAccRights |= 8 ; }
if ( r == 'serverupdate' ) { newAccRights |= 16 ; }
if ( r == 'locked' ) { newAccRights |= 32 ; }
if ( r == 'nonewgroups' ) { newAccRights |= 64 ; }
if ( r == 'notools' ) { newAccRights |= 128 ; }
}
obj . config . domains [ i ] . newaccountsrights = newAccRights ;
}
if ( obj . config . domains [ i ] . newaccountsrights && ( typeof ( obj . config . domains [ i ] . newaccountsrights ) != 'number' ) ) { delete obj . config . domains [ i ] . newaccountsrights ; }
2019-02-03 01:54:36 +03:00
}
// Log passed arguments into Windows Service Log
//if (obj.servicelog != null) { var s = ''; for (i in obj.args) { if (i != '_') { if (s.length > 0) { s += ', '; } s += i + "=" + obj.args[i]; } } logInfoEvent('MeshServer started with arguments: ' + s); }
// Look at passed in arguments
if ( ( obj . args . user != null ) && ( typeof obj . args . user != 'string' ) ) { delete obj . args . user ; }
2019-11-27 01:11:09 +03:00
if ( ( obj . args . ciralocalfqdn != null ) && ( ( obj . args . lanonly == true ) || ( obj . args . wanonly == true ) ) ) { addServerWarning ( "CIRA local FQDN's ignored when server in LAN-only or WAN-only mode." ) ; }
if ( ( obj . args . ciralocalfqdn != null ) && ( obj . args . ciralocalfqdn . split ( ',' ) . length > 4 ) ) { addServerWarning ( "Can't have more than 4 CIRA local FQDN's. Ignoring value." ) ; obj . args . ciralocalfqdn = null ; }
if ( obj . args . ignoreagenthashcheck === true ) { addServerWarning ( "Agent hash checking is being skipped, this is unsafe." ) ; }
2019-02-03 01:54:36 +03:00
if ( obj . args . port == null || typeof obj . args . port != 'number' ) { if ( obj . args . notls == null ) { obj . args . port = 443 ; } else { obj . args . port = 80 ; } }
if ( obj . args . aliasport != null && ( typeof obj . args . aliasport != 'number' ) ) obj . args . aliasport = null ;
if ( obj . args . mpsport == null || typeof obj . args . mpsport != 'number' ) obj . args . mpsport = 4433 ;
if ( obj . args . mpsaliasport != null && ( typeof obj . args . mpsaliasport != 'number' ) ) obj . args . mpsaliasport = null ;
2019-11-18 00:35:50 +03:00
if ( obj . args . rediraliasport != null && ( typeof obj . args . rediraliasport != 'number' ) ) obj . args . rediraliasport = null ;
2019-02-03 01:54:36 +03:00
if ( obj . args . notls == null && obj . args . redirport == null ) obj . args . redirport = 80 ;
if ( obj . args . minifycore === 0 ) obj . args . minifycore = false ;
2019-06-18 01:20:47 +03:00
if ( typeof args . agentidletimeout != 'number' ) { args . agentidletimeout = 150000 ; } else { args . agentidletimeout *= 1000 } // Default agent idle timeout is 2m, 30sec.
2019-02-03 01:54:36 +03:00
// Setup a site administrator
if ( ( obj . args . admin ) && ( typeof obj . args . admin == 'string' ) ) {
var adminname = obj . args . admin . split ( '/' ) ;
if ( adminname . length == 1 ) { adminname = 'user//' + adminname [ 0 ] ; }
else if ( adminname . length == 2 ) { adminname = 'user/' + adminname [ 0 ] + '/' + adminname [ 1 ] ; }
2019-10-30 02:17:29 +03:00
else { console . log ( "Invalid administrator name." ) ; process . exit ( ) ; return ; }
2019-02-03 01:54:36 +03:00
obj . db . Get ( adminname , function ( err , user ) {
2019-10-30 02:17:29 +03:00
if ( user . length != 1 ) { console . log ( "Invalid user name." ) ; process . exit ( ) ; return ; }
2019-06-27 08:13:56 +03:00
user [ 0 ] . siteadmin = 4294967295 ; // 0xFFFFFFFF
2019-02-03 01:54:36 +03:00
obj . db . Set ( user [ 0 ] , function ( ) {
2019-12-01 23:52:32 +03:00
if ( user [ 0 ] . domain == '' ) { console . log ( 'User ' + user [ 0 ] . name + ' set to site administrator.' ) ; } else { console . log ( "User " + user [ 0 ] . name + " of domain " + user [ 0 ] . domain + " set to site administrator." ) ; }
2019-02-03 01:54:36 +03:00
process . exit ( ) ;
2017-08-28 19:27:45 +03:00
return ;
2019-02-03 01:54:36 +03:00
} ) ;
} ) ;
return ;
}
// Remove a site administrator
if ( ( obj . args . unadmin ) && ( typeof obj . args . unadmin == 'string' ) ) {
var adminname = obj . args . unadmin . split ( '/' ) ;
if ( adminname . length == 1 ) { adminname = 'user//' + adminname [ 0 ] ; }
else if ( adminname . length == 2 ) { adminname = 'user/' + adminname [ 0 ] + '/' + adminname [ 1 ] ; }
2019-10-30 02:17:29 +03:00
else { console . log ( "Invalid administrator name." ) ; process . exit ( ) ; return ; }
2019-02-03 01:54:36 +03:00
obj . db . Get ( adminname , function ( err , user ) {
2019-10-30 02:17:29 +03:00
if ( user . length != 1 ) { console . log ( "Invalid user name." ) ; process . exit ( ) ; return ; }
2019-02-03 01:54:36 +03:00
if ( user [ 0 ] . siteadmin ) { delete user [ 0 ] . siteadmin ; }
obj . db . Set ( user [ 0 ] , function ( ) {
2019-12-01 23:52:32 +03:00
if ( user [ 0 ] . domain == '' ) { console . log ( "User " + user [ 0 ] . name + " is not a site administrator." ) ; } else { console . log ( "User " + user [ 0 ] . name + " of domain " + user [ 0 ] . domain + " is not a site administrator." ) ; }
2019-02-03 01:54:36 +03:00
process . exit ( ) ;
return ;
} ) ;
} ) ;
return ;
}
2017-08-28 19:27:45 +03:00
2019-02-03 01:54:36 +03:00
// Perform other database cleanup
obj . db . cleanup ( ) ;
// Set all nodes to power state of unknown (0)
2019-02-19 01:32:55 +03:00
obj . db . storePowerEvent ( { time : new Date ( ) , nodeid : '*' , power : 0 , s : 1 } , obj . multiServer ) ; // s:1 indicates that the server is starting up.
2017-08-28 19:27:45 +03:00
2019-02-03 01:54:36 +03:00
// Read or setup database configuration values
obj . db . Get ( 'dbconfig' , function ( err , dbconfig ) {
if ( dbconfig . length == 1 ) { obj . dbconfig = dbconfig [ 0 ] ; } else { obj . dbconfig = { _id : 'dbconfig' , version : 1 } ; }
if ( obj . dbconfig . amtWsEventSecret == null ) { obj . crypto . randomBytes ( 32 , function ( err , buf ) { obj . dbconfig . amtWsEventSecret = buf . toString ( 'hex' ) ; obj . db . Set ( obj . dbconfig ) ; } ) ; }
// This is used by the user to create a username/password for a Intel AMT WSMAN event subscription
if ( obj . args . getwspass ) {
if ( obj . args . getwspass . length == 64 ) {
obj . crypto . randomBytes ( 6 , function ( err , buf ) {
while ( obj . dbconfig . amtWsEventSecret == null ) { process . nextTick ( ) ; }
var username = buf . toString ( 'hex' ) ;
var nodeid = obj . args . getwspass ;
2019-10-30 02:17:29 +03:00
var pass = obj . crypto . createHash ( 'sha384' ) . update ( username . toLowerCase ( ) + ':' + nodeid + ':' + obj . dbconfig . amtWsEventSecret ) . digest ( 'base64' ) . substring ( 0 , 12 ) . split ( '/' ) . join ( 'x' ) . split ( '\\' ) . join ( 'x' ) ;
console . log ( "--- Intel(r) AMT WSMAN eventing credentials ---" ) ;
console . log ( "Username: " + username ) ;
console . log ( "Password: " + pass ) ;
console . log ( "Argument: " + nodeid ) ;
2019-02-03 01:54:36 +03:00
process . exit ( ) ;
} ) ;
2018-01-15 08:01:06 +03:00
} else {
2019-10-30 02:17:29 +03:00
console . log ( "Invalid NodeID." ) ;
2019-02-03 01:54:36 +03:00
process . exit ( ) ;
2018-01-15 08:01:06 +03:00
}
2019-02-03 01:54:36 +03:00
return ;
}
2019-10-10 21:13:25 +03:00
// Start plugin manager if configuration allows this.
if ( ( obj . config ) && ( obj . config . settings ) && ( obj . config . settings . plugins != null ) ) {
2019-11-26 01:12:43 +03:00
const nodeVersion = Number ( process . version . match ( /^v(\d+\.\d+)/ ) [ 1 ] ) ;
if ( nodeVersion < 7 ) {
2019-11-27 01:11:09 +03:00
addServerWarning ( "Plugin support requires Node v7.0 or higher." ) ;
2019-11-26 01:12:43 +03:00
delete obj . config . settings . plugins ;
} else {
obj . pluginHandler = require ( './pluginHandler.js' ) . pluginHandler ( obj ) ;
}
2019-10-10 21:13:25 +03:00
}
2019-02-03 01:54:36 +03:00
// Load the default meshcore and meshcmd
obj . updateMeshCore ( ) ;
obj . updateMeshCmd ( ) ;
// Setup and start the redirection server if needed. We must start the redirection server before Let's Encrypt.
if ( ( obj . args . redirport != null ) && ( typeof obj . args . redirport == 'number' ) && ( obj . args . redirport != 0 ) ) {
obj . redirserver = require ( './redirserver.js' ) . CreateRedirServer ( obj , obj . db , obj . args , obj . StartEx2 ) ;
} else {
obj . StartEx2 ( ) ; // If not needed, move on.
}
2018-01-15 08:01:06 +03:00
} ) ;
2019-02-03 01:54:36 +03:00
}
2018-01-15 08:01:06 +03:00
// Done starting the redirection server, go on to load the server certificates
obj . StartEx2 = function ( ) {
// Load server certificates
2019-02-03 01:54:36 +03:00
obj . certificateOperations = require ( './certoperations.js' ) . CertificateOperations ( obj ) ;
obj . certificateOperations . GetMeshServerCertificate ( obj . args , obj . config , function ( certs ) {
2019-11-16 04:55:05 +03:00
// Get the current node version
const nodeVersion = Number ( process . version . match ( /^v(\d+\.\d+)/ ) [ 1 ] ) ;
2020-03-07 01:06:33 +03:00
if ( ( obj . config . letsencrypt == null ) || ( obj . redirserver == null ) || ( nodeVersion < 8 ) || ( ( obj . config . letsencrypt . lib == 'greenlock' ) && ( require ( 'crypto' ) . generateKeyPair == null ) ) ) {
2018-01-15 08:01:06 +03:00
obj . StartEx3 ( certs ) ; // Just use the configured certificates
2020-02-07 05:04:55 +03:00
} else if ( ( obj . config . letsencrypt != null ) && ( obj . config . letsencrypt . nochecks == true ) ) {
// Use Let's Encrypt with no checking
2020-03-07 01:06:33 +03:00
if ( obj . config . letsencrypt . lib == 'greenlock' ) {
2020-03-05 12:39:40 +03:00
obj . letsencrypt = require ( './letsencrypt.js' ) . CreateLetsEncrypt ( obj ) ;
2020-03-07 01:06:33 +03:00
} else {
obj . letsencrypt = require ( './letsencrypt.js' ) . CreateLetsEncrypt2 ( obj ) ;
2020-03-05 12:39:40 +03:00
}
2020-02-07 05:04:55 +03:00
obj . letsencrypt . getCertificate ( certs , obj . StartEx3 ) ; // Use Let's Encrypt with no checking, use at your own risk.
2018-01-15 08:01:06 +03:00
} else {
2019-12-05 00:45:29 +03:00
// Check Let's Encrypt settings
var leok = true ;
if ( typeof obj . config . letsencrypt . email != 'string' ) { leok = false ; addServerWarning ( "Missing Let's Encrypt email address." ) ; }
else if ( typeof obj . config . letsencrypt . names != 'string' ) { leok = false ; addServerWarning ( "Invalid Let's Encrypt host names." ) ; }
2020-03-02 23:36:52 +03:00
else if ( obj . config . letsencrypt . names . indexOf ( '*' ) >= 0 ) { leok = false ; addServerWarning ( "Invalid Let's Encrypt names, can't contain a *." ) ; }
2019-12-05 00:45:29 +03:00
else if ( obj . config . letsencrypt . email . split ( '@' ) . length != 2 ) { leok = false ; addServerWarning ( "Invalid Let's Encrypt email address." ) ; }
else if ( obj . config . letsencrypt . email . trim ( ) !== obj . config . letsencrypt . email ) { leok = false ; addServerWarning ( "Invalid Let's Encrypt email address." ) ; }
else {
var le = require ( './letsencrypt.js' ) ;
2020-03-05 12:39:40 +03:00
try {
2020-03-07 01:06:33 +03:00
if ( obj . config . letsencrypt . lib == 'greenlock' ) {
2020-03-05 12:39:40 +03:00
obj . letsencrypt = le . CreateLetsEncrypt ( obj ) ;
2020-03-07 01:06:33 +03:00
} else {
obj . letsencrypt = le . CreateLetsEncrypt2 ( obj ) ;
2020-03-05 12:39:40 +03:00
}
} catch ( ex ) { console . log ( ex ) ; }
2019-12-05 00:45:29 +03:00
if ( obj . letsencrypt == null ) { addServerWarning ( "Unable to setup GreenLock module." ) ; leok = false ; }
}
if ( leok == true ) {
2019-12-09 07:46:25 +03:00
// Check that the email address domain MX resolves.
require ( 'dns' ) . resolveMx ( obj . config . letsencrypt . email . split ( '@' ) [ 1 ] , function ( err , addresses ) {
if ( err == null ) {
// Check that all names resolve
checkResolveAll ( obj . config . letsencrypt . names . split ( ',' ) , function ( err ) {
if ( err == null ) {
obj . letsencrypt . getCertificate ( certs , obj . StartEx3 ) ; // Use Let's Encrypt
} else {
for ( var i in err ) { addServerWarning ( "Invalid Let's Encrypt names, unable to resolve: " + err [ i ] ) ; }
obj . StartEx3 ( certs ) ; // Let's Encrypt did not load, just use the configured certificates
}
} ) ;
} else {
addServerWarning ( "Invalid Let's Encrypt email address, unable to resolve: " + obj . config . letsencrypt . email . split ( '@' ) [ 1 ] ) ;
obj . StartEx3 ( certs ) ; // Let's Encrypt did not load, just use the configured certificates
}
} ) ;
2018-01-15 08:01:06 +03:00
} else {
obj . StartEx3 ( certs ) ; // Let's Encrypt did not load, just use the configured certificates
}
}
} ) ;
2018-08-30 22:05:23 +03:00
} ;
2018-01-15 08:01:06 +03:00
2018-11-01 02:03:09 +03:00
// Start the server with the given certificates, but check if we have web certificates to load
2018-01-15 08:01:06 +03:00
obj . StartEx3 = function ( certs ) {
obj . certificates = certs ;
obj . certificateOperations . acceleratorStart ( certs ) ; // Set the state of the accelerators
2017-08-28 19:27:45 +03:00
2018-11-01 02:03:09 +03:00
// Load any domain web certificates
2019-10-30 02:17:29 +03:00
for ( var i in obj . config . domains ) {
2019-06-13 05:40:27 +03:00
// Load any Intel AMT ACM activation certificates
2019-06-20 03:16:50 +03:00
obj . certificateOperations . loadIntelAmtAcmCerts ( obj . config . domains [ i ] . amtacmactivation ) ;
2019-06-13 05:40:27 +03:00
2019-10-30 02:17:29 +03:00
if ( typeof obj . config . domains [ i ] . certurl == 'string' ) {
obj . supportsProxyCertificatesRequest = true ; // If a certurl is set, enable proxy cert requests
// Then, fix the URL and add 'https://' if needed
2018-11-03 04:13:32 +03:00
if ( obj . config . domains [ i ] . certurl . indexOf ( '://' ) < 0 ) { obj . config . domains [ i ] . certurl = 'https://' + obj . config . domains [ i ] . certurl ; }
2018-11-01 02:03:09 +03:00
}
}
2019-10-30 02:31:03 +03:00
if ( obj . supportsProxyCertificatesRequest == true ) { obj . updateProxyCertificates ( true ) ; }
2019-10-30 02:17:29 +03:00
obj . StartEx4 ( ) ; // Keep going
2018-11-01 02:03:09 +03:00
}
// Start the server with the given certificates
obj . StartEx4 = function ( ) {
var i ;
2018-01-15 08:01:06 +03:00
// If the certificate is un-configured, force LAN-only mode
2019-03-05 10:48:45 +03:00
if ( obj . certificates . CommonName . indexOf ( '.' ) == - 1 ) { /*console.log('Server name not configured, running in LAN-only mode.');*/ obj . args . lanonly = true ; }
2018-11-13 05:36:20 +03:00
// Write server version and run mode
var productionMode = ( process . env . NODE _ENV && ( process . env . NODE _ENV == 'production' ) ) ;
var runmode = ( obj . args . lanonly ? 2 : ( obj . args . wanonly ? 1 : 0 ) ) ;
2019-12-21 01:02:49 +03:00
console . log ( "MeshCentral v" + getCurrentVerion ( ) + ', ' + ( [ "Hybrid (LAN + WAN) mode" , "WAN mode" , "LAN mode" ] [ runmode ] ) + ( productionMode ? ", Production mode." : '.' ) ) ;
2017-08-28 19:27:45 +03:00
2018-01-15 08:01:06 +03:00
// Check that no sub-domains have the same DNS as the parent
2018-08-30 22:05:23 +03:00
for ( i in obj . config . domains ) {
2018-01-15 08:01:06 +03:00
if ( ( obj . config . domains [ i ] . dns != null ) && ( obj . certificates . CommonName . toLowerCase ( ) === obj . config . domains [ i ] . dns . toLowerCase ( ) ) ) {
console . log ( "ERROR: Server sub-domain can't have same DNS name as the parent." ) ; process . exit ( 0 ) ; return ;
}
}
2018-01-03 03:52:49 +03:00
2018-01-15 08:01:06 +03:00
// Load the list of mesh agents and install scripts
2018-08-30 22:05:23 +03:00
if ( obj . args . noagentupdate == 1 ) { for ( i in obj . meshAgentsArchitectureNumbers ) { obj . meshAgentsArchitectureNumbers [ i ] . update = false ; } }
2018-01-15 08:01:06 +03:00
obj . updateMeshAgentsTable ( function ( ) {
obj . updateMeshAgentInstallScripts ( ) ;
// Setup and start the web server
2019-01-25 04:01:50 +03:00
obj . crypto . randomBytes ( 48 , function ( err , buf ) {
2018-01-15 08:01:06 +03:00
// Setup Mesh Multi-Server if needed
obj . multiServer = require ( './multiserver.js' ) . CreateMultiServer ( obj , obj . args ) ;
if ( obj . multiServer != null ) {
2019-08-13 00:58:06 +03:00
if ( ( obj . db . databaseType != 3 ) || ( obj . db . changeStream != true ) ) { console . log ( "ERROR: Multi-server support requires use of MongoDB with ReplicaSet and ChangeStream enabled." ) ; process . exit ( 0 ) ; return ; }
2018-01-15 08:01:06 +03:00
obj . serverId = obj . multiServer . serverid ;
for ( var serverid in obj . config . peers . servers ) { obj . peerConnectivityByNode [ serverid ] = { } ; }
}
// If the server is set to "nousers", allow only loopback unless IP filter is set
if ( ( obj . args . nousers == true ) && ( obj . args . userallowedip == null ) ) { obj . args . userallowedip = "::1,127.0.0.1" ; }
2018-08-23 02:18:01 +03:00
// Set the session length to 60 minutes if not set and set a random key if needed
2018-08-27 22:24:15 +03:00
if ( ( obj . args . sessiontime != null ) && ( ( typeof obj . args . sessiontime != 'number' ) || ( obj . args . sessiontime < 1 ) ) ) { delete obj . args . sessiontime ; }
2018-08-23 02:18:01 +03:00
if ( ! obj . args . sessionkey ) { obj . args . sessionkey = buf . toString ( 'hex' ) . toUpperCase ( ) ; }
2019-08-30 00:38:13 +03:00
// Create APF server to hook into webserver
obj . apfserver = require ( './apfserver.js' ) . CreateApfServer ( obj , obj . db , obj . args ) ;
2019-10-04 22:18:56 +03:00
2019-10-03 03:57:18 +03:00
// Create MQTT Broker to hook into webserver and mpsserver
2019-10-06 00:24:40 +03:00
if ( ( typeof obj . config . settings . mqtt == 'object' ) && ( typeof obj . config . settings . mqtt . auth == 'object' ) && ( typeof obj . config . settings . mqtt . auth . keyid == 'string' ) && ( typeof obj . config . settings . mqtt . auth . key == 'string' ) ) { obj . mqttbroker = require ( "./mqttbroker.js" ) . CreateMQTTBroker ( obj , obj . db , obj . args ) ; }
2019-10-03 03:57:18 +03:00
2018-11-01 02:03:09 +03:00
// Start the web server and if needed, the redirection web server.
2018-08-23 02:18:01 +03:00
obj . webserver = require ( './webserver.js' ) . CreateWebServer ( obj , obj . db , obj . args , obj . certificates ) ;
2018-01-15 08:01:06 +03:00
if ( obj . redirserver != null ) { obj . redirserver . hookMainWebServer ( obj . certificates ) ; }
// Setup the Intel AMT event handler
obj . amtEventHandler = require ( './amtevents.js' ) . CreateAmtEventsHandler ( obj ) ;
// Setup the Intel AMT local network scanner
if ( obj . args . wanonly != true ) {
obj . amtScanner = require ( './amtscanner.js' ) . CreateAmtScanner ( obj ) . start ( ) ;
obj . meshScanner = require ( './meshscanner.js' ) . CreateMeshScanner ( obj ) . start ( ) ;
}
// Setup and start the MPS server
2018-01-26 03:12:53 +03:00
if ( ( obj . args . lanonly != true ) && ( obj . args . mpsport !== 0 ) ) {
2018-01-15 08:01:06 +03:00
obj . mpsserver = require ( './mpsserver.js' ) . CreateMpsServer ( obj , obj . db , obj . args , obj . certificates ) ;
}
// Setup and start the legacy swarm server
2018-01-26 03:12:53 +03:00
if ( ( obj . certificates . swarmserver != null ) && ( obj . args . swarmport !== 0 ) ) {
2018-01-15 08:01:06 +03:00
if ( obj . args . swarmport == null ) { obj . args . swarmport = 8080 ; }
obj . swarmserver = require ( './swarmserver.js' ) . CreateSwarmServer ( obj , obj . db , obj . args , obj . certificates ) ;
}
// Setup email server
if ( ( obj . config . smtp != null ) && ( obj . config . smtp . host != null ) && ( obj . config . smtp . from != null ) ) {
2018-09-06 03:40:00 +03:00
obj . mailserver = require ( './meshmail.js' ) . CreateMeshMail ( obj ) ;
2018-01-15 08:01:06 +03:00
obj . mailserver . verify ( ) ;
2019-11-27 01:11:09 +03:00
if ( obj . args . lanonly == true ) { addServerWarning ( "SMTP server has limited use in LAN mode." ) ; }
2018-01-15 08:01:06 +03:00
}
// Start periodic maintenance
obj . maintenanceTimer = setInterval ( obj . maintenanceActions , 1000 * 60 * 60 ) ; // Run this every hour
// Dispatch an event that the server is now running
2018-08-30 22:05:23 +03:00
obj . DispatchEvent ( [ '*' ] , obj , { etype : 'server' , action : 'started' , msg : 'Server started' } ) ;
2018-01-15 08:01:06 +03:00
2019-10-08 11:18:40 +03:00
// Plugin hook. Need to run something at server startup? This is the place.
2020-02-18 21:57:39 +03:00
if ( obj . pluginHandler ) { obj . pluginHandler . callHook ( 'server_startup' ) ; }
2019-10-08 11:18:40 +03:00
2020-02-18 21:57:39 +03:00
// Setup the login cookie encryption key
if ( ( obj . config ) && ( obj . config . settings ) && ( typeof obj . config . settings . logincookieencryptionkey == 'string' ) ) {
// We have a string, hash it and use that as a key
try { obj . loginCookieEncryptionKey = Buffer . from ( obj . config . settings . logincookieencryptionkey , 'hex' ) ; } catch ( ex ) { }
if ( ( obj . loginCookieEncryptionKey == null ) || ( obj . loginCookieEncryptionKey . length != 80 ) ) { addServerWarning ( "Invalid \"LoginCookieEncryptionKey\" in config.json." ) ; obj . loginCookieEncryptionKey = null ; }
}
// Login cookie encryption key not set, use one from the database
if ( obj . loginCookieEncryptionKey == null ) {
2018-01-15 08:01:06 +03:00
obj . db . Get ( 'LoginCookieEncryptionKey' , function ( err , docs ) {
2018-12-29 22:38:05 +03:00
if ( ( docs . length > 0 ) && ( docs [ 0 ] . key != null ) && ( obj . args . logintokengen == null ) && ( docs [ 0 ] . key . length >= 160 ) ) {
2018-01-15 08:01:06 +03:00
obj . loginCookieEncryptionKey = Buffer . from ( docs [ 0 ] . key , 'hex' ) ;
} else {
obj . loginCookieEncryptionKey = obj . generateCookieKey ( ) ; obj . db . Set ( { _id : 'LoginCookieEncryptionKey' , key : obj . loginCookieEncryptionKey . toString ( 'hex' ) , time : Date . now ( ) } ) ;
}
2017-08-28 19:27:45 +03:00
} ) ;
2018-01-15 08:01:06 +03:00
}
2019-06-08 03:11:56 +03:00
// Load the invitation link encryption key from the database
obj . db . Get ( 'InvitationLinkEncryptionKey' , function ( err , docs ) {
if ( ( docs . length > 0 ) && ( docs [ 0 ] . key != null ) && ( docs [ 0 ] . key . length >= 160 ) ) {
obj . invitationLinkEncryptionKey = Buffer . from ( docs [ 0 ] . key , 'hex' ) ;
} else {
obj . invitationLinkEncryptionKey = obj . generateCookieKey ( ) ; obj . db . Set ( { _id : 'InvitationLinkEncryptionKey' , key : obj . invitationLinkEncryptionKey . toString ( 'hex' ) , time : Date . now ( ) } ) ;
}
} ) ;
2019-03-26 05:59:04 +03:00
// Start collecting server stats every 5 minutes
setInterval ( function ( ) {
2019-03-27 00:11:51 +03:00
obj . serverStatsCounter ++ ;
var hours = 720 ; // Start with all events lasting 30 days.
if ( ( ( obj . serverStatsCounter ) % 2 ) == 1 ) { hours = 3 ; } // Half of the event get removed after 3 hours.
2019-03-27 00:30:40 +03:00
else if ( ( Math . floor ( obj . serverStatsCounter / 2 ) % 2 ) == 1 ) { hours = 8 ; } // Another half of the event get removed after 8 hours.
else if ( ( Math . floor ( obj . serverStatsCounter / 4 ) % 2 ) == 1 ) { hours = 24 ; } // Another half of the event get removed after 24 hours.
else if ( ( Math . floor ( obj . serverStatsCounter / 8 ) % 2 ) == 1 ) { hours = 48 ; } // Another half of the event get removed after 48 hours.
else if ( ( Math . floor ( obj . serverStatsCounter / 16 ) % 2 ) == 1 ) { hours = 72 ; } // Another half of the event get removed after 72 hours.
2019-03-27 00:11:51 +03:00
var expire = new Date ( ) ;
2019-03-27 00:30:40 +03:00
expire . setTime ( expire . getTime ( ) + ( 60 * 60 * 1000 * hours ) ) ;
2019-03-27 00:11:51 +03:00
2019-03-26 11:16:11 +03:00
var data = {
time : new Date ( ) ,
2019-03-27 00:11:51 +03:00
expire : expire ,
2019-03-26 11:16:11 +03:00
mem : process . memoryUsage ( ) ,
//cpu: process.cpuUsage(),
conn : {
ca : Object . keys ( obj . webserver . wsagents ) . length ,
cu : Object . keys ( obj . webserver . wssessions ) . length ,
us : Object . keys ( obj . webserver . wssessions2 ) . length ,
rs : obj . webserver . relaySessionCount
}
} ;
if ( obj . mpsserver != null ) { data . conn . am = Object . keys ( obj . mpsserver . ciraConnections ) . length ; }
obj . db . SetServerStats ( data ) ; // Save the stats to the database
obj . DispatchEvent ( [ '*' ] , obj , { action : 'servertimelinestats' , data : data } ) ; // Event the server stats
2019-03-26 05:59:04 +03:00
} , 300000 ) ;
2019-10-30 02:17:29 +03:00
obj . debug ( 'main' , "Server started" ) ;
2018-03-15 01:16:55 +03:00
if ( obj . args . nousers == true ) { obj . updateServerState ( 'nousers' , '1' ) ; }
2019-10-30 02:17:29 +03:00
obj . updateServerState ( 'state' , "running" ) ;
2019-05-17 22:40:15 +03:00
2019-05-21 02:00:33 +03:00
// Setup auto-backup defaults
2019-05-29 03:42:11 +03:00
if ( obj . config . settings . autobackup == null ) { obj . config . settings . autobackup = { backupintervalhours : 24 , keeplastdaysbackup : 10 } ; }
2019-05-21 02:00:33 +03:00
else if ( obj . config . settings . autobackup === false ) { delete obj . config . settings . autobackup ; }
// Setup auto-backup timer
2019-05-29 03:42:11 +03:00
if ( obj . config . settings . autobackup && ( typeof obj . config . settings . autobackup . backupintervalhours == 'number' ) ) {
setInterval ( obj . db . performBackup , obj . config . settings . autobackup . backupintervalhours * 60 * 60 * 1000 ) ;
2019-05-17 22:40:15 +03:00
}
2020-02-18 00:01:13 +03:00
// Setup users that can see all device groups
obj . config . settings . managealldevicegroups = [ ] ;
for ( i in obj . config . domains ) { if ( Array . isArray ( obj . config . domains [ i ] . managealldevicegroups ) ) { for ( var j in obj . config . domains [ i ] . managealldevicegroups ) { if ( typeof obj . config . domains [ i ] . managealldevicegroups [ j ] == 'string' ) { obj . config . settings . managealldevicegroups . push ( 'user/' + i + '/' + obj . config . domains [ i ] . managealldevicegroups [ j ] ) ; } } } }
2017-08-28 19:27:45 +03:00
} ) ;
} ) ;
2018-08-30 22:05:23 +03:00
} ;
2017-09-07 04:10:24 +03:00
2019-10-30 02:17:29 +03:00
// Refresh any certificate hashs from the reverse proxy
obj . pendingProxyCertificatesRequests = 0 ;
obj . lastProxyCertificatesRequest = null ;
obj . supportsProxyCertificatesRequest = false ;
2019-10-30 02:31:03 +03:00
obj . updateProxyCertificates = function ( force ) {
if ( force !== true ) {
if ( ( obj . pendingProxyCertificatesRequests > 0 ) || ( obj . supportsProxyCertificatesRequest == false ) ) return ;
if ( ( obj . lastProxyCertificatesRequest != null ) && ( ( Date . now ( ) - obj . lastProxyCertificatesRequest ) < 120000 ) ) return ; // Don't allow this call more than every 2 minutes.
obj . lastProxyCertificatesRequest = Date . now ( ) ;
}
2019-10-30 02:17:29 +03:00
// Load any domain web certificates
2019-10-30 02:31:03 +03:00
for ( var i in obj . config . domains ) {
2019-10-30 02:17:29 +03:00
if ( obj . config . domains [ i ] . certurl != null ) {
// Load web certs
obj . pendingProxyCertificatesRequests ++ ;
var dnsname = obj . config . domains [ i ] . dns ;
if ( ( dnsname == null ) && ( obj . config . settings . cert != null ) ) { dnsname = obj . config . settings . cert ; }
obj . certificateOperations . loadCertificate ( obj . config . domains [ i ] . certurl , dnsname , obj . config . domains [ i ] , function ( url , cert , xhostname , xdomain ) {
obj . pendingProxyCertificatesRequests -- ;
if ( cert != null ) {
// Hash the entire cert
var hash = obj . crypto . createHash ( 'sha384' ) . update ( Buffer . from ( cert , 'binary' ) ) . digest ( 'hex' ) ;
if ( xdomain . certhash != hash ) { // The certificate has changed.
xdomain . certkeyhash = hash ;
xdomain . certhash = hash ;
try {
// Decode a RSA certificate and hash the public key, if this is not RSA, skip this.
var forgeCert = obj . certificateOperations . forge . pki . certificateFromAsn1 ( obj . certificateOperations . forge . asn1 . fromDer ( cert ) ) ;
xdomain . certkeyhash = obj . certificateOperations . forge . pki . getPublicKeyFingerprint ( forgeCert . publicKey , { md : obj . certificateOperations . forge . md . sha384 . create ( ) , encoding : 'hex' } ) ;
//console.log('V1: ' + xdomain.certkeyhash);
} catch ( ex ) {
delete xdomain . certkeyhash ;
}
if ( obj . webserver ) {
obj . webserver . webCertificateHashs [ xdomain . id ] = obj . webserver . webCertificateFullHashs [ xdomain . id ] = Buffer . from ( hash , 'hex' ) . toString ( 'binary' ) ;
if ( xdomain . certkeyhash != null ) { obj . webserver . webCertificateHashs [ xdomain . id ] = Buffer . from ( xdomain . certkeyhash , 'hex' ) . toString ( 'binary' ) ; }
// Disconnect all agents with bad web certificates
for ( var i in obj . webserver . wsagentsWithBadWebCerts ) { obj . webserver . wsagentsWithBadWebCerts [ i ] . close ( 1 ) ; }
}
console . log ( obj . common . format ( "Loaded web certificate from \"{0}\", host: \"{1}\"" , url , xhostname ) ) ;
console . log ( obj . common . format ( " SHA384 cert hash: {0}" , xdomain . certhash ) ) ;
if ( ( xdomain . certkeyhash != null ) && ( xdomain . certhash != xdomain . certkeyhash ) ) { console . log ( obj . common . format ( " SHA384 key hash: {0}" , xdomain . certkeyhash ) ) ; }
}
} else {
console . log ( obj . common . format ( "Failed to load web certificate at: \"{0}\", host: \"{1}\"" , url , xhostname ) ) ;
}
} ) ;
}
}
}
2017-09-07 04:10:24 +03:00
// Perform maintenance operations (called every hour)
obj . maintenanceActions = function ( ) {
2019-01-27 23:23:38 +03:00
// Check for self-update that targets a specific version
2019-12-21 01:02:49 +03:00
if ( ( typeof obj . args . selfupdate == 'string' ) && ( getCurrentVerion ( ) === obj . args . selfupdate ) ) { obj . args . selfupdate = false ; }
2019-01-27 23:23:38 +03:00
2017-09-07 04:10:24 +03:00
// Check if we need to perform server self-update
2019-01-27 23:23:38 +03:00
if ( ( obj . args . selfupdate ) && ( obj . serverSelfWriteAllowed == true ) ) {
2017-09-07 04:10:24 +03:00
obj . db . getValueOfTheDay ( 'performSelfUpdate' , 1 , function ( performSelfUpdate ) {
if ( performSelfUpdate . value > 0 ) {
performSelfUpdate . value -- ;
obj . db . Set ( performSelfUpdate ) ;
obj . getLatestServerVersion ( function ( currentVer , latestVer ) { if ( currentVer != latestVer ) { obj . performServerUpdate ( ) ; return ; } } ) ;
}
} ) ;
}
2018-08-30 22:05:23 +03:00
} ;
2017-09-07 04:10:24 +03:00
2017-08-28 19:27:45 +03:00
// Stop the Meshcentral server
obj . Stop = function ( restoreFile ) {
// If the database is not setup, exit now.
if ( ! obj . db ) return ;
// Dispatch an event saying the server is now stopping
2019-10-30 02:17:29 +03:00
obj . DispatchEvent ( [ '*' ] , obj , { etype : 'server' , action : 'stopped' , msg : "Server stopped" } ) ;
2017-08-28 19:27:45 +03:00
// Set all nodes to power state of unknown (0)
2019-02-19 01:32:55 +03:00
obj . db . storePowerEvent ( { time : new Date ( ) , nodeid : '*' , power : 0 , s : 2 } , obj . multiServer , function ( ) { // s:2 indicates that the server is shutting down.
2017-08-28 19:27:45 +03:00
if ( restoreFile ) {
2019-10-30 02:17:29 +03:00
obj . debug ( 'main' , obj . common . format ( "Server stopped, updating settings: {0}" , restoreFile ) ) ;
console . log ( "Updating settings folder..." ) ;
2018-05-03 02:19:45 +03:00
2019-10-30 02:17:29 +03:00
var yauzl = require ( 'yauzl' ) ;
2018-05-03 02:19:45 +03:00
yauzl . open ( restoreFile , { lazyEntries : true } , function ( err , zipfile ) {
if ( err ) throw err ;
zipfile . readEntry ( ) ;
2019-10-30 02:17:29 +03:00
zipfile . on ( 'entry' , function ( entry ) {
2018-05-03 02:19:45 +03:00
if ( /\/$/ . test ( entry . fileName ) ) {
// Directory file names end with '/'.
// Note that entires for directories themselves are optional.
// An entry's fileName implicitly requires its parent directories to exist.
zipfile . readEntry ( ) ;
} else {
// file entry
zipfile . openReadStream ( entry , function ( err , readStream ) {
if ( err ) throw err ;
2019-10-30 02:17:29 +03:00
readStream . on ( 'end' , function ( ) { zipfile . readEntry ( ) ; } ) ;
2018-07-14 05:18:43 +03:00
// console.log('Extracting:', obj.getConfigFilePath(entry.fileName));
readStream . pipe ( obj . fs . createWriteStream ( obj . getConfigFilePath ( entry . fileName ) ) ) ;
2018-05-03 02:19:45 +03:00
} ) ;
}
} ) ;
2019-10-30 02:17:29 +03:00
zipfile . on ( 'end' , function ( ) { setTimeout ( function ( ) { obj . fs . unlinkSync ( restoreFile ) ; process . exit ( 123 ) ; } ) ; } ) ;
2018-05-03 02:19:45 +03:00
} ) ;
2017-08-28 19:27:45 +03:00
} else {
2019-10-30 02:17:29 +03:00
obj . debug ( 'main' , "Server stopped" ) ;
2017-08-28 19:27:45 +03:00
process . exit ( 0 ) ;
}
} ) ;
2018-03-14 22:10:13 +03:00
// Update the server state
2019-10-30 02:17:29 +03:00
obj . updateServerState ( 'state' , "stopped" ) ;
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
// Event Dispatch
obj . AddEventDispatch = function ( ids , target ) {
2019-08-23 01:31:39 +03:00
obj . debug ( 'dispatch' , 'AddEventDispatch' , ids ) ;
2017-08-28 19:27:45 +03:00
for ( var i in ids ) { var id = ids [ i ] ; if ( ! obj . eventsDispatch [ id ] ) { obj . eventsDispatch [ id ] = [ target ] ; } else { obj . eventsDispatch [ id ] . push ( target ) ; } }
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
obj . RemoveEventDispatch = function ( ids , target ) {
2019-08-23 01:31:39 +03:00
obj . debug ( 'dispatch' , 'RemoveEventDispatch' , id ) ;
2019-03-10 01:28:08 +03:00
for ( var i in ids ) { var id = ids [ i ] ; if ( obj . eventsDispatch [ id ] ) { var j = obj . eventsDispatch [ id ] . indexOf ( target ) ; if ( j >= 0 ) { if ( obj . eventsDispatch [ id ] . length == 1 ) { delete obj . eventsDispatch [ id ] ; } else { obj . eventsDispatch [ id ] . splice ( j , 1 ) ; } } } }
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
obj . RemoveEventDispatchId = function ( id ) {
2019-08-23 01:31:39 +03:00
obj . debug ( 'dispatch' , 'RemoveEventDispatchId' , id ) ;
2017-09-15 21:45:06 +03:00
if ( obj . eventsDispatch [ id ] != null ) { delete obj . eventsDispatch [ id ] ; }
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
obj . RemoveAllEventDispatch = function ( target ) {
2019-08-23 01:31:39 +03:00
obj . debug ( 'dispatch' , 'RemoveAllEventDispatch' ) ;
2019-03-10 01:28:08 +03:00
for ( var i in obj . eventsDispatch ) { var j = obj . eventsDispatch [ i ] . indexOf ( target ) ; if ( j >= 0 ) { if ( obj . eventsDispatch [ i ] . length == 1 ) { delete obj . eventsDispatch [ i ] ; } else { obj . eventsDispatch [ i ] . splice ( j , 1 ) ; } } }
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
obj . DispatchEvent = function ( ids , source , event , fromPeerServer ) {
// If the database is not setup, exit now.
if ( ! obj . db ) return ;
2019-08-23 01:31:39 +03:00
obj . debug ( 'dispatch' , 'DispatchEvent' , ids ) ;
2019-02-19 01:32:55 +03:00
if ( ( typeof event == 'object' ) && ( ! event . nolog ) ) {
event . time = new Date ( ) ;
// The event we store is going to skip some of the fields so we don't store too much stuff in the database.
2019-10-12 01:14:38 +03:00
var storeEvent = Object . assign ( { } , event ) ;
if ( storeEvent . node ) { delete storeEvent . node ; } // Skip the "node" field. May skip more in the future.
if ( storeEvent . links ) {
// Escape "links" names that may have "." and/or "$"
storeEvent . links = Object . assign ( { } , storeEvent . links ) ;
for ( var i in storeEvent . links ) { var ue = obj . common . escapeFieldName ( i ) ; if ( ue !== i ) { storeEvent . links [ ue ] = storeEvent . links [ i ] ; delete storeEvent . links [ i ] ; } }
}
2019-02-19 01:32:55 +03:00
storeEvent . ids = ids ;
obj . db . StoreEvent ( storeEvent ) ;
2017-12-15 01:57:52 +03:00
}
2017-08-28 19:27:45 +03:00
var targets = [ ] ; // List of targets we dispatched the event to, we don't want to dispatch to the same target twice.
for ( var j in ids ) {
var id = ids [ j ] ;
if ( obj . eventsDispatch [ id ] ) {
for ( var i in obj . eventsDispatch [ id ] ) {
if ( targets . indexOf ( obj . eventsDispatch [ id ] [ i ] ) == - 1 ) { // Check if we already displatched to this target
targets . push ( obj . eventsDispatch [ id ] [ i ] ) ;
2019-09-19 21:21:35 +03:00
try { obj . eventsDispatch [ id ] [ i ] . HandleEvent ( source , event , ids , id ) ; } catch ( ex ) {
2019-06-14 02:39:21 +03:00
console . log ( ex , obj . eventsDispatch [ id ] [ i ] ) ;
}
2017-08-28 19:27:45 +03:00
}
}
}
}
2017-12-15 01:57:52 +03:00
if ( ( fromPeerServer == null ) && ( obj . multiServer != null ) && ( ( typeof event != 'object' ) || ( event . nopeers != 1 ) ) ) { obj . multiServer . DispatchEvent ( ids , source , event ) ; }
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
2017-09-13 21:25:57 +03:00
// Get the connection state of a node
2018-08-30 22:05:23 +03:00
obj . GetConnectivityState = function ( nodeid ) { return obj . connectivityByNode [ nodeid ] ; } ;
2017-09-13 21:25:57 +03:00
2017-09-15 21:45:06 +03:00
// Get the routing server id for a given node and connection type, can never be self.
obj . GetRoutingServerId = function ( nodeid , connectType ) {
if ( obj . multiServer == null ) return null ;
2018-08-30 22:05:23 +03:00
for ( var serverid in obj . peerConnectivityByNode ) {
2017-09-15 21:45:06 +03:00
if ( serverid == obj . serverId ) continue ;
var state = obj . peerConnectivityByNode [ serverid ] [ nodeid ] ;
if ( ( state != null ) && ( ( state . connectivity & connectType ) != 0 ) ) { return { serverid : serverid , meshid : state . meshid } ; }
}
return null ;
2018-08-30 22:05:23 +03:00
} ;
2017-09-15 21:45:06 +03:00
2017-09-13 21:25:57 +03:00
// Update the connection state of a node when in multi-server mode
// Update obj.connectivityByNode using obj.peerConnectivityByNode for the list of nodes in argument
obj . UpdateConnectivityState = function ( nodeids ) {
for ( var nodeid in nodeids ) {
var meshid = null , state = null , oldConnectivity = 0 , oldPowerState = 0 , newConnectivity = 0 , newPowerState = 0 ;
var oldState = obj . connectivityByNode [ nodeid ] ;
2018-08-30 22:05:23 +03:00
if ( oldState != null ) { meshid = oldState . meshid ; oldConnectivity = oldState . connectivity ; oldPowerState = oldState . powerState ; }
for ( var serverid in obj . peerConnectivityByNode ) {
2017-09-13 21:25:57 +03:00
var peerState = obj . peerConnectivityByNode [ serverid ] [ nodeid ] ;
if ( peerState != null ) {
if ( state == null ) {
// Copy the state
state = { } ;
newConnectivity = state . connectivity = peerState . connectivity ;
newPowerState = state . powerState = peerState . powerState ;
meshid = state . meshid = peerState . meshid ;
//if (peerState.agentPower) { state.agentPower = peerState.agentPower; }
//if (peerState.ciraPower) { state.ciraPower = peerState.ciraPower; }
//if (peerState.amtPower) { state.amtPower = peerState.amtPower; }
} else {
// Merge the state
state . connectivity |= peerState . connectivity ;
newConnectivity = state . connectivity ;
if ( ( peerState . powerState != 0 ) && ( ( state . powerState == 0 ) || ( peerState . powerState < state . powerState ) ) ) { newPowerState = state . powerState = peerState . powerState ; }
meshid = state . meshid = peerState . meshid ;
//if (peerState.agentPower) { state.agentPower = peerState.agentPower; }
//if (peerState.ciraPower) { state.ciraPower = peerState.ciraPower; }
//if (peerState.amtPower) { state.amtPower = peerState.amtPower; }
}
}
}
obj . connectivityByNode [ nodeid ] = state ;
//console.log('xx', nodeid, meshid, newConnectivity, oldPowerState, newPowerState, oldPowerState);
// Event any changes on this server only
if ( ( newConnectivity != oldPowerState ) || ( newPowerState != oldPowerState ) ) {
2020-01-05 00:46:55 +03:00
obj . DispatchEvent ( obj . webserver . CreateMeshDispatchTargets ( meshid ) , obj , { action : 'nodeconnect' , meshid : meshid , nodeid : nodeid , conn : newConnectivity , pwr : newPowerState , nolog : 1 , nopeers : 1 } ) ;
2017-09-13 21:25:57 +03:00
}
}
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
// Set the connectivity state of a node and setup the server so that messages can be routed correctly.
// meshId: mesh identifier of format mesh/domain/meshidhex
// nodeId: node identifier of format node/domain/nodeidhex
// connectTime: time of connection, milliseconds elapsed since the UNIX epoch.
2019-10-05 03:24:30 +03:00
// connectType: Bitmask, 1 = MeshAgent, 2 = Intel AMT CIRA, 4 = Intel AMT local, 8 = Intel AMT Relay, 16 = MQTT
2017-08-28 19:27:45 +03:00
// powerState: Value, 0 = Unknown, 1 = S0 power on, 2 = S1 Sleep, 3 = S2 Sleep, 4 = S3 Sleep, 5 = S4 Hibernate, 6 = S5 Soft-Off, 7 = Present
2019-10-05 03:24:30 +03:00
//var connectTypeStrings = ['', 'MeshAgent', 'Intel AMT CIRA', '', 'Intel AMT local', '', '', '', 'Intel AMT Relay', '', '', '', '', '', '', '', 'MQTT'];
2018-08-30 22:05:23 +03:00
//var powerStateStrings = ['Unknown', 'Powered', 'Sleep', 'Sleep', 'Deep Sleep', 'Hibernating', 'Soft-Off', 'Present'];
2017-09-13 21:25:57 +03:00
obj . SetConnectivityState = function ( meshid , nodeid , connectTime , connectType , powerState , serverid ) {
//console.log('SetConnectivity for ' + nodeid.substring(0, 16) + ', Type: ' + connectTypeStrings[connectType] + ', Power: ' + powerStateStrings[powerState] + (serverid == null ? ('') : (', ServerId: ' + serverid)));
if ( ( serverid == null ) && ( obj . multiServer != null ) ) { obj . multiServer . DispatchMessage ( { action : 'SetConnectivityState' , meshid : meshid , nodeid : nodeid , connectTime : connectTime , connectType : connectType , powerState : powerState } ) ; }
if ( obj . multiServer == null ) {
// Single server mode
// Change the node connection state
var eventConnectChange = 0 ;
var state = obj . connectivityByNode [ nodeid ] ;
if ( state ) {
// Change the connection in the node and mesh state lists
if ( ( state . connectivity & connectType ) == 0 ) { state . connectivity |= connectType ; eventConnectChange = 1 ; }
state . meshid = meshid ;
} else {
// Add the connection to the node and mesh state list
obj . connectivityByNode [ nodeid ] = state = { connectivity : connectType , meshid : meshid } ;
eventConnectChange = 1 ;
}
// Set node power state
if ( connectType == 1 ) { state . agentPower = powerState ; } else if ( connectType == 2 ) { state . ciraPower = powerState ; } else if ( connectType == 4 ) { state . amtPower = powerState ; }
var powerState = 0 , oldPowerState = state . powerState ;
if ( ( state . connectivity & 1 ) != 0 ) { powerState = state . agentPower ; } else if ( ( state . connectivity & 2 ) != 0 ) { powerState = state . ciraPower ; } else if ( ( state . connectivity & 4 ) != 0 ) { powerState = state . amtPower ; }
2017-09-15 21:45:06 +03:00
if ( ( state . powerState == null ) || ( state . powerState != powerState ) ) {
2017-09-13 21:25:57 +03:00
state . powerState = powerState ;
2017-08-28 19:27:45 +03:00
eventConnectChange = 1 ;
2017-09-13 21:25:57 +03:00
// Set new power state in database
2019-02-19 01:32:55 +03:00
var record = { time : new Date ( connectTime ) , nodeid : nodeid , power : powerState } ;
if ( oldPowerState != null ) { record . oldPower = oldPowerState ; }
obj . db . storePowerEvent ( record , obj . multiServer ) ;
2017-08-28 19:27:45 +03:00
}
2017-09-13 21:25:57 +03:00
// Event the node connection change
2020-01-05 00:46:55 +03:00
if ( eventConnectChange == 1 ) { obj . DispatchEvent ( obj . webserver . CreateMeshDispatchTargets ( meshid ) , obj , { action : 'nodeconnect' , meshid : meshid , nodeid : nodeid , conn : state . connectivity , pwr : state . powerState , ct : connectTime , nolog : 1 , nopeers : 1 } ) ; }
2017-08-28 19:27:45 +03:00
} else {
2017-09-13 21:25:57 +03:00
// Multi server mode
// Change the node connection state
if ( serverid == null ) { serverid = obj . serverId ; }
if ( obj . peerConnectivityByNode [ serverid ] == null ) return ; // Guard against unknown serverid's
var state = obj . peerConnectivityByNode [ serverid ] [ nodeid ] ;
if ( state ) {
// Change the connection in the node and mesh state lists
if ( ( state . connectivity & connectType ) == 0 ) { state . connectivity |= connectType ; }
state . meshid = meshid ;
} else {
// Add the connection to the node and mesh state list
obj . peerConnectivityByNode [ serverid ] [ nodeid ] = state = { connectivity : connectType , meshid : meshid } ;
}
2017-08-28 19:27:45 +03:00
2017-09-13 21:25:57 +03:00
// Set node power state
if ( connectType == 1 ) { state . agentPower = powerState ; } else if ( connectType == 2 ) { state . ciraPower = powerState ; } else if ( connectType == 4 ) { state . amtPower = powerState ; }
2018-08-30 22:05:23 +03:00
var powerState = 0 , oldPowerState = state . powerState ;
2017-09-13 21:25:57 +03:00
if ( ( state . connectivity & 1 ) != 0 ) { powerState = state . agentPower ; } else if ( ( state . connectivity & 2 ) != 0 ) { powerState = state . ciraPower ; } else if ( ( state . connectivity & 4 ) != 0 ) { powerState = state . amtPower ; }
2018-01-03 03:52:49 +03:00
if ( ( state . powerState == null ) || ( state . powerState != powerState ) ) {
state . powerState = powerState ;
// Set new power state in database
2019-02-19 01:32:55 +03:00
var record = { time : new Date ( connectTime ) , nodeid : nodeid , power : powerState , server : obj . multiServer . serverid } ;
if ( oldPowerState != null ) { record . oldPower = oldPowerState ; }
obj . db . storePowerEvent ( record , obj . multiServer ) ;
2018-01-03 03:52:49 +03:00
}
2017-08-28 19:27:45 +03:00
2017-09-13 21:25:57 +03:00
// Update the combined node state
var x = { } ; x [ nodeid ] = 1 ;
obj . UpdateConnectivityState ( x ) ;
2017-08-28 19:27:45 +03:00
}
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
// Clear the connectivity state of a node and setup the server so that messages can be routed correctly.
// meshId: mesh identifier of format mesh/domain/meshidhex
// nodeId: node identifier of format node/domain/nodeidhex
// connectType: Bitmask, 1 = MeshAgent, 2 = Intel AMT CIRA, 3 = Intel AMT local.
2017-09-13 21:25:57 +03:00
obj . ClearConnectivityState = function ( meshid , nodeid , connectType , serverid ) {
//console.log('ClearConnectivity for ' + nodeid.substring(0, 16) + ', Type: ' + connectTypeStrings[connectType] + (serverid == null?(''):(', ServerId: ' + serverid)));
if ( ( serverid == null ) && ( obj . multiServer != null ) ) { obj . multiServer . DispatchMessage ( { action : 'ClearConnectivityState' , meshid : meshid , nodeid : nodeid , connectType : connectType } ) ; }
2017-08-28 19:27:45 +03:00
2017-09-13 21:25:57 +03:00
if ( obj . multiServer == null ) {
// Single server mode
2018-08-27 22:24:15 +03:00
var eventConnectChange = 0 ;
2017-08-28 19:27:45 +03:00
2017-09-13 21:25:57 +03:00
// Remove the agent connection from the nodes connection list
var state = obj . connectivityByNode [ nodeid ] ;
2017-09-15 21:45:06 +03:00
if ( state == null ) return ;
2017-08-28 19:27:45 +03:00
2017-09-13 21:25:57 +03:00
if ( ( state . connectivity & connectType ) != 0 ) {
state . connectivity -= connectType ;
// If the node is completely disconnected, clean it up completely
if ( state . connectivity == 0 ) { delete obj . connectivityByNode [ nodeid ] ; state . powerState = 0 ; }
eventConnectChange = 1 ;
2017-08-28 19:27:45 +03:00
}
2017-09-13 21:25:57 +03:00
// Clear node power state
if ( connectType == 1 ) { state . agentPower = 0 ; } else if ( connectType == 2 ) { state . ciraPower = 0 ; } else if ( connectType == 4 ) { state . amtPower = 0 ; }
var powerState = 0 , oldPowerState = state . powerState ;
if ( ( state . connectivity & 1 ) != 0 ) { powerState = state . agentPower ; } else if ( ( state . connectivity & 2 ) != 0 ) { powerState = state . ciraPower ; } else if ( ( state . connectivity & 4 ) != 0 ) { powerState = state . amtPower ; }
2017-09-15 21:45:06 +03:00
if ( ( state . powerState == null ) || ( state . powerState != powerState ) ) {
2017-09-13 21:25:57 +03:00
state . powerState = powerState ;
eventConnectChange = 1 ;
2017-08-28 19:27:45 +03:00
2017-09-13 21:25:57 +03:00
// Set new power state in database
2019-02-19 01:32:55 +03:00
obj . db . storePowerEvent ( { time : new Date ( ) , nodeid : nodeid , power : powerState , oldPower : oldPowerState } , obj . multiServer ) ;
2017-09-13 21:25:57 +03:00
}
2017-08-28 19:27:45 +03:00
2017-09-13 21:25:57 +03:00
// Event the node connection change
2020-01-05 00:46:55 +03:00
if ( eventConnectChange == 1 ) { obj . DispatchEvent ( obj . webserver . CreateMeshDispatchTargets ( meshid ) , obj , { action : 'nodeconnect' , meshid : meshid , nodeid : nodeid , conn : state . connectivity , pwr : state . powerState , nolog : 1 , nopeers : 1 } ) ; }
2017-09-13 21:25:57 +03:00
} else {
// Multi server mode
// Remove the agent connection from the nodes connection list
if ( serverid == null ) { serverid = obj . serverId ; }
if ( obj . peerConnectivityByNode [ serverid ] == null ) return ; // Guard against unknown serverid's
var state = obj . peerConnectivityByNode [ serverid ] [ nodeid ] ;
2017-09-15 21:45:06 +03:00
if ( state == null ) return ;
2017-09-13 21:25:57 +03:00
// If existing state exist, remove this connection
if ( ( state . connectivity & connectType ) != 0 ) {
state . connectivity -= connectType ; // Remove one connectivity mode
// If the node is completely disconnected, clean it up completely
if ( state . connectivity == 0 ) { delete obj . peerConnectivityByNode [ serverid ] [ nodeid ] ; state . powerState = 0 ; }
}
// Clear node power state
if ( connectType == 1 ) { state . agentPower = 0 ; } else if ( connectType == 2 ) { state . ciraPower = 0 ; } else if ( connectType == 4 ) { state . amtPower = 0 ; }
var powerState = 0 ;
if ( ( state . connectivity & 1 ) != 0 ) { powerState = state . agentPower ; } else if ( ( state . connectivity & 2 ) != 0 ) { powerState = state . ciraPower ; } else if ( ( state . connectivity & 4 ) != 0 ) { powerState = state . amtPower ; }
2017-09-15 21:45:06 +03:00
if ( ( state . powerState == null ) || ( state . powerState != powerState ) ) { state . powerState = powerState ; }
2017-09-13 21:25:57 +03:00
// Update the combined node state
var x = { } ; x [ nodeid ] = 1 ;
obj . UpdateConnectivityState ( x ) ;
}
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
2018-12-30 02:24:33 +03:00
// Escape a code string
obj . escapeCodeString = function ( str ) {
const escapeCodeStringTable = { '\'' : '\\\'' , '\"' : '\\"' , '\\' : '\\\\' , '\b' : '\\b' , '\f' : '\\f' , '\n' : '\\n' , '\r' : '\\r' , '\t' : '\\t' } ;
var r = '' , c , cr , table ;
for ( var i = 0 ; i < str . length ; i ++ ) {
c = str [ i ] ;
table = escapeCodeStringTable [ c ] ;
if ( table != null ) {
r += table ;
} else {
cr = c . charCodeAt ( 0 ) ;
if ( ( cr >= 32 ) && ( cr <= 127 ) ) { r += c ; }
}
}
return r ;
}
2017-08-28 19:27:45 +03:00
// Update the default mesh core
obj . updateMeshCore = function ( func ) {
2017-10-04 04:31:20 +03:00
// Figure out where meshcore.js is
var meshcorePath = obj . datapath ;
if ( obj . fs . existsSync ( obj . path . join ( meshcorePath , 'meshcore.js' ) ) == false ) {
meshcorePath = obj . path . join ( _ _dirname , 'agents' ) ;
if ( obj . fs . existsSync ( obj . path . join ( meshcorePath , 'meshcore.js' ) ) == false ) {
2018-12-30 02:24:33 +03:00
obj . defaultMeshCores = obj . defaultMeshCoresHash = { } ; if ( func != null ) { func ( false ) ; } // meshcore.js not found
2017-10-04 04:31:20 +03:00
}
}
// Read meshcore.js and all .js files in the modules folder.
2018-12-30 02:24:33 +03:00
var meshCore = null , modulesDir = null ;
const modulesAdd = {
2019-03-10 01:28:08 +03:00
'windows-amt' : [ 'var addedModules = [];\r\n' ] ,
'linux-amt' : [ 'var addedModules = [];\r\n' ] ,
'linux-noamt' : [ 'var addedModules = [];\r\n' ]
2018-12-30 02:24:33 +03:00
} ;
2019-01-22 01:05:50 +03:00
// Read the recovery core if present
var meshRecoveryCore = null ;
if ( obj . fs . existsSync ( obj . path . join ( _ _dirname , 'agents' , 'recoverycore.js' ) ) == true ) {
try { meshRecoveryCore = obj . fs . readFileSync ( obj . path . join ( _ _dirname , 'agents' , 'recoverycore.js' ) ) . toString ( ) ; } catch ( ex ) { }
if ( meshRecoveryCore != null ) {
2019-03-10 01:28:08 +03:00
modulesAdd [ 'windows-recovery' ] = [ 'var addedModules = [];\r\n' ] ;
modulesAdd [ 'linux-recovery' ] = [ 'var addedModules = [];\r\n' ] ;
2019-01-22 01:05:50 +03:00
}
}
2019-02-26 01:35:08 +03:00
// Read the agent recovery core if present
var meshAgentRecoveryCore = null ;
2019-04-13 03:43:20 +03:00
if ( obj . fs . existsSync ( obj . path . join ( _ _dirname , 'agents' , 'meshcore_diagnostic.js' ) ) == true ) {
try { meshAgentRecoveryCore = obj . fs . readFileSync ( obj . path . join ( _ _dirname , 'agents' , 'meshcore_diagnostic.js' ) ) . toString ( ) ; } catch ( ex ) { }
2019-02-26 01:35:08 +03:00
if ( meshAgentRecoveryCore != null ) {
2019-03-10 01:28:08 +03:00
modulesAdd [ 'windows-agentrecovery' ] = [ 'var addedModules = [];\r\n' ] ;
modulesAdd [ 'linux-agentrecovery' ] = [ 'var addedModules = [];\r\n' ] ;
2019-02-26 01:35:08 +03:00
}
}
2019-01-04 01:46:52 +03:00
if ( obj . args . minifycore !== false ) { try { meshCore = obj . fs . readFileSync ( obj . path . join ( meshcorePath , 'meshcore.min.js' ) ) . toString ( ) ; } catch ( e ) { } } // Favor minified meshcore if present.
2018-12-30 02:24:33 +03:00
if ( meshCore == null ) { try { meshCore = obj . fs . readFileSync ( obj . path . join ( meshcorePath , 'meshcore.js' ) ) . toString ( ) ; } catch ( e ) { } } // Use non-minified meshcore.
2018-04-12 21:15:01 +03:00
if ( meshCore != null ) {
2018-12-30 02:24:33 +03:00
var moduleDirPath = null ;
2019-01-04 01:46:52 +03:00
if ( obj . args . minifycore !== false ) { try { moduleDirPath = obj . path . join ( meshcorePath , 'modules_meshcore_min' ) ; modulesDir = obj . fs . readdirSync ( moduleDirPath ) ; } catch ( e ) { } } // Favor minified modules if present.
2018-12-30 02:24:33 +03:00
if ( modulesDir == null ) { try { moduleDirPath = obj . path . join ( meshcorePath , 'modules_meshcore' ) ; modulesDir = obj . fs . readdirSync ( moduleDirPath ) ; } catch ( e ) { } } // Use non-minified mofules.
2018-04-12 21:15:01 +03:00
if ( modulesDir != null ) {
for ( var i in modulesDir ) {
if ( modulesDir [ i ] . toLowerCase ( ) . endsWith ( '.js' ) ) {
var moduleName = modulesDir [ i ] . substring ( 0 , modulesDir [ i ] . length - 3 ) ;
2018-12-30 02:24:33 +03:00
if ( moduleName . endsWith ( '.min' ) ) { moduleName = moduleName . substring ( 0 , moduleName . length - 4 ) ; } // Remove the ".min" for ".min.js" files.
2019-03-10 01:28:08 +03:00
var moduleData = [ 'try { addModule("' , moduleName , '", "' , obj . escapeCodeString ( obj . fs . readFileSync ( obj . path . join ( moduleDirPath , modulesDir [ i ] ) ) . toString ( 'binary' ) ) , '"); addedModules.push("' , moduleName , '"); } catch (e) { }\r\n' ] ;
2018-12-30 02:24:33 +03:00
// Merge this module
2018-12-31 00:32:40 +03:00
// NOTE: "smbios" module makes some non-AI Linux segfault, only include for IA platforms.
if ( moduleName . startsWith ( 'amt-' ) || ( moduleName == 'smbios' ) ) {
// Add to IA / Intel AMT cores only
2019-03-10 01:28:08 +03:00
modulesAdd [ 'windows-amt' ] . push ( ... moduleData ) ;
modulesAdd [ 'linux-amt' ] . push ( ... moduleData ) ;
2018-12-30 02:24:33 +03:00
} else if ( moduleName . startsWith ( 'win-' ) ) {
// Add to Windows cores only
2019-03-10 01:28:08 +03:00
modulesAdd [ 'windows-amt' ] . push ( ... moduleData ) ;
2018-12-30 02:24:33 +03:00
} else if ( moduleName . startsWith ( 'linux-' ) ) {
// Add to Linux cores only
2019-03-10 01:28:08 +03:00
modulesAdd [ 'linux-amt' ] . push ( ... moduleData ) ;
modulesAdd [ 'linux-noamt' ] . push ( ... moduleData ) ;
2018-12-30 02:24:33 +03:00
} else {
// Add to all cores
2019-03-10 01:28:08 +03:00
modulesAdd [ 'windows-amt' ] . push ( ... moduleData ) ;
modulesAdd [ 'linux-amt' ] . push ( ... moduleData ) ;
modulesAdd [ 'linux-noamt' ] . push ( ... moduleData ) ;
2018-04-12 21:15:01 +03:00
}
2019-01-22 01:05:50 +03:00
// Merge this module to recovery modules if needed
if ( modulesAdd [ 'windows-recovery' ] != null ) {
if ( ( moduleName == 'win-console' ) || ( moduleName == 'win-message-pump' ) || ( moduleName == 'win-terminal' ) ) {
2019-03-10 01:28:08 +03:00
modulesAdd [ 'windows-recovery' ] . push ( ... moduleData ) ;
2019-01-22 01:05:50 +03:00
}
}
2019-02-26 01:35:08 +03:00
// Merge this module to agent recovery modules if needed
if ( modulesAdd [ 'windows-agentrecovery' ] != null ) {
if ( ( moduleName == 'win-console' ) || ( moduleName == 'win-message-pump' ) || ( moduleName == 'win-terminal' ) ) {
2019-03-10 01:28:08 +03:00
modulesAdd [ 'windows-agentrecovery' ] . push ( ... moduleData ) ;
2019-02-26 01:35:08 +03:00
}
}
2017-12-13 03:04:54 +03:00
}
}
}
2019-10-10 21:13:25 +03:00
// Add plugins to cores
if ( obj . pluginHandler ) { obj . pluginHandler . addMeshCoreModules ( modulesAdd ) ; }
2018-12-30 02:24:33 +03:00
// Merge the cores and compute the hashes
for ( var i in modulesAdd ) {
2019-01-22 01:05:50 +03:00
if ( ( i == 'windows-recovery' ) || ( i == 'linux-recovery' ) ) {
2019-03-10 01:28:08 +03:00
obj . defaultMeshCores [ i ] = [ obj . common . IntToStr ( 0 ) , ... modulesAdd [ i ] , meshRecoveryCore ] . join ( '' ) ;
2019-02-26 01:35:08 +03:00
} else if ( ( i == 'windows-agentrecovery' ) || ( i == 'linux-agentrecovery' ) ) {
2019-03-10 01:28:08 +03:00
obj . defaultMeshCores [ i ] = [ obj . common . IntToStr ( 0 ) , ... modulesAdd [ i ] , meshAgentRecoveryCore ] . join ( '' ) ;
2019-01-22 01:05:50 +03:00
} else {
2019-03-10 01:28:08 +03:00
obj . defaultMeshCores [ i ] = [ obj . common . IntToStr ( 0 ) , ... modulesAdd [ i ] , meshCore ] . join ( '' ) ;
2019-01-22 01:05:50 +03:00
}
2018-12-30 02:24:33 +03:00
obj . defaultMeshCoresHash [ i ] = obj . crypto . createHash ( 'sha384' ) . update ( obj . defaultMeshCores [ i ] ) . digest ( "binary" ) ;
2019-08-23 01:31:39 +03:00
obj . debug ( 'main' , 'Core module ' + i + ' is ' + obj . defaultMeshCores [ i ] . length + ' bytes.' ) ;
2018-12-30 02:24:33 +03:00
//console.log('Core module ' + i + ' is ' + obj.defaultMeshCores[i].length + ' bytes.'); // DEBUG, Print the core size
//obj.fs.writeFile("C:\\temp\\" + i + ".js", obj.defaultMeshCores[i].substring(4)); // DEBUG, Write the core to file
}
}
// We are done creating all the mesh cores.
2017-12-13 03:04:54 +03:00
if ( func != null ) { func ( true ) ; }
2018-08-30 22:05:23 +03:00
} ;
2017-12-13 03:04:54 +03:00
// Update the default meshcmd
2018-01-05 02:59:57 +03:00
obj . updateMeshCmdTimer = 'notset' ;
2017-12-13 03:04:54 +03:00
obj . updateMeshCmd = function ( func ) {
2019-01-01 05:09:19 +03:00
// Figure out where meshcmd.js is and read it.
2019-03-10 01:28:08 +03:00
var meshCmd = null , meshcmdPath , moduleAdditions = [ 'var addedModules = [];\r\n' ] , moduleDirPath , modulesDir = null ;
2019-01-04 01:46:52 +03:00
if ( ( obj . args . minifycore !== false ) && ( obj . fs . existsSync ( obj . path . join ( obj . datapath , 'meshcmd.min.js' ) ) ) ) { meshcmdPath = obj . path . join ( obj . datapath , 'meshcmd.min.js' ) ; meshCmd = obj . fs . readFileSync ( meshcmdPath ) . toString ( ) ; }
2019-01-01 05:09:19 +03:00
else if ( obj . fs . existsSync ( obj . path . join ( obj . datapath , 'meshcmd.js' ) ) ) { meshcmdPath = obj . path . join ( obj . datapath , 'meshcmd.js' ) ; meshCmd = obj . fs . readFileSync ( meshcmdPath ) . toString ( ) ; }
2019-01-04 01:46:52 +03:00
else if ( ( obj . args . minifycore !== false ) && ( obj . fs . existsSync ( obj . path . join ( _ _dirname , 'agents' , 'meshcmd.min.js' ) ) ) ) { meshcmdPath = obj . path . join ( _ _dirname , 'agents' , 'meshcmd.min.js' ) ; meshCmd = obj . fs . readFileSync ( meshcmdPath ) . toString ( ) ; }
2019-01-01 05:09:19 +03:00
else if ( obj . fs . existsSync ( obj . path . join ( _ _dirname , 'agents' , 'meshcmd.js' ) ) ) { meshcmdPath = obj . path . join ( _ _dirname , 'agents' , 'meshcmd.js' ) ; meshCmd = obj . fs . readFileSync ( meshcmdPath ) . toString ( ) ; }
else { obj . defaultMeshCmd = null ; if ( func != null ) { func ( false ) ; } } // meshcmd.js not found
2019-12-21 01:02:49 +03:00
meshCmd = meshCmd . replace ( "'***Mesh*Cmd*Version***'" , '\'' + getCurrentVerion ( ) + '\'' ) ;
2019-01-01 05:09:19 +03:00
// Figure out where the modules_meshcmd folder is.
2019-01-04 01:46:52 +03:00
if ( obj . args . minifycore !== false ) { try { moduleDirPath = obj . path . join ( meshcmdPath , 'modules_meshcmd_min' ) ; modulesDir = obj . fs . readdirSync ( moduleDirPath ) ; } catch ( e ) { } } // Favor minified modules if present.
2019-01-01 05:09:19 +03:00
if ( modulesDir == null ) { try { moduleDirPath = obj . path . join ( meshcmdPath , 'modules_meshcmd' ) ; modulesDir = obj . fs . readdirSync ( moduleDirPath ) ; } catch ( e ) { } } // Use non-minified mofules.
2019-01-04 01:46:52 +03:00
if ( obj . args . minifycore !== false ) { if ( modulesDir == null ) { try { moduleDirPath = obj . path . join ( _ _dirname , 'agents' , 'modules_meshcmd_min' ) ; modulesDir = obj . fs . readdirSync ( moduleDirPath ) ; } catch ( e ) { } } } // Favor minified modules if present.
2019-01-01 05:09:19 +03:00
if ( modulesDir == null ) { try { moduleDirPath = obj . path . join ( _ _dirname , 'agents' , 'modules_meshcmd' ) ; modulesDir = obj . fs . readdirSync ( moduleDirPath ) ; } catch ( e ) { } } // Use non-minified mofules.
// Read all .js files in the meshcmd modules folder.
2017-10-17 06:11:03 +03:00
if ( modulesDir != null ) {
for ( var i in modulesDir ) {
if ( modulesDir [ i ] . toLowerCase ( ) . endsWith ( '.js' ) ) {
// Merge this module
var moduleName = modulesDir [ i ] . substring ( 0 , modulesDir [ i ] . length - 3 ) ;
2019-01-01 05:09:19 +03:00
if ( moduleName . endsWith ( '.min' ) ) { moduleName = moduleName . substring ( 0 , moduleName . length - 4 ) ; } // Remove the ".min" for ".min.js" files.
2019-03-10 01:28:08 +03:00
moduleAdditions . push ( 'try { addModule("' , moduleName , '", "' , obj . escapeCodeString ( obj . fs . readFileSync ( obj . path . join ( moduleDirPath , modulesDir [ i ] ) ) . toString ( 'binary' ) ) , '"); addedModules.push("' , moduleName , '"); } catch (e) { }\r\n' ) ;
2017-10-17 06:11:03 +03:00
}
2017-10-04 04:31:20 +03:00
}
}
2017-12-13 03:04:54 +03:00
// Set the new default meshcmd.js
2019-03-10 01:28:08 +03:00
moduleAdditions . push ( meshCmd ) ;
obj . defaultMeshCmd = moduleAdditions . join ( '' ) ;
2019-01-01 05:09:19 +03:00
//console.log('MeshCmd is ' + obj.defaultMeshCmd.length + ' bytes.'); // DEBUG, Print the merged meshcmd.js size
//obj.fs.writeFile("C:\\temp\\meshcmd.js", obj.defaultMeshCmd.substring(4)); // DEBUG, Write merged meshcmd.js to file
2017-10-04 04:31:20 +03:00
if ( func != null ) { func ( true ) ; }
2018-01-05 02:59:57 +03:00
2019-01-01 05:09:19 +03:00
// Monitor for changes in meshcmd.js
if ( obj . updateMeshCmdTimer === 'notset' ) {
2018-01-05 02:59:57 +03:00
obj . updateMeshCmdTimer = null ;
2019-01-01 05:09:19 +03:00
obj . fs . watch ( meshcmdPath , function ( eventType , filename ) {
2018-01-05 02:59:57 +03:00
if ( obj . updateMeshCmdTimer != null ) { clearTimeout ( obj . updateMeshCmdTimer ) ; obj . updateMeshCmdTimer = null ; }
2019-03-10 01:28:08 +03:00
obj . updateMeshCmdTimer = setTimeout ( function ( ) { obj . updateMeshCmd ( ) ; } , 5000 ) ;
2018-08-30 22:05:23 +03:00
} ) ;
2018-01-05 02:59:57 +03:00
}
2018-08-30 22:05:23 +03:00
} ;
2017-10-04 04:31:20 +03:00
2017-08-28 19:27:45 +03:00
// List of possible mesh agent install scripts
var meshAgentsInstallScriptList = {
2019-03-02 05:07:38 +03:00
1 : { id : 1 , localname : 'meshinstall-linux.sh' , rname : 'meshinstall.sh' , linux : true } ,
2019-07-23 03:26:26 +03:00
2 : { id : 2 , localname : 'meshinstall-initd.sh' , rname : 'meshagent' , linux : true } ,
5 : { id : 5 , localname : 'meshinstall-bsd-rcd.sh' , rname : 'meshagent' , linux : true }
2017-08-28 19:27:45 +03:00
} ;
// Update the list of available mesh agents
obj . updateMeshAgentInstallScripts = function ( ) {
for ( var scriptid in meshAgentsInstallScriptList ) {
var scriptpath = obj . path . join ( _ _dirname , 'agents' , meshAgentsInstallScriptList [ scriptid ] . localname ) ;
var stream = null ;
try {
stream = obj . fs . createReadStream ( scriptpath ) ;
2019-01-31 00:43:42 +03:00
stream . xdata = '' ;
stream . on ( 'data' , function ( data ) { this . hash . update ( data , 'binary' ) ; this . xdata += data ; } ) ;
2017-08-28 19:27:45 +03:00
stream . on ( 'error' , function ( data ) {
// If there is an error reading this file, make sure this agent is not in the agent table
2017-09-15 21:45:06 +03:00
if ( obj . meshAgentInstallScripts [ this . info . id ] != null ) { delete obj . meshAgentInstallScripts [ this . info . id ] ; }
2017-08-28 19:27:45 +03:00
} ) ;
stream . on ( 'end' , function ( ) {
// Add the agent to the agent table with all information and the hash
2019-10-11 21:16:36 +03:00
obj . meshAgentInstallScripts [ this . info . id ] = Object . assign ( { } , this . info ) ;
2017-08-28 19:27:45 +03:00
obj . meshAgentInstallScripts [ this . info . id ] . hash = this . hash . digest ( 'hex' ) ;
obj . meshAgentInstallScripts [ this . info . id ] . path = this . agentpath ;
2019-01-31 00:43:42 +03:00
obj . meshAgentInstallScripts [ this . info . id ] . data = this . xdata ;
2019-03-11 07:40:25 +03:00
obj . meshAgentInstallScripts [ this . info . id ] . url = ( ( obj . args . notls == true ) ? 'http://' : 'https://' ) + obj . certificates . CommonName + ':' + ( ( typeof obj . args . aliasport == 'number' ) ? obj . args . aliasport : obj . args . port ) + '/meshagents?script=' + this . info . id ;
2017-08-28 19:27:45 +03:00
var stats = null ;
2018-08-30 22:05:23 +03:00
try { stats = obj . fs . statSync ( this . agentpath ) ; } catch ( e ) { }
2017-08-28 19:27:45 +03:00
if ( stats != null ) { obj . meshAgentInstallScripts [ this . info . id ] . size = stats . size ; }
2019-03-02 05:07:38 +03:00
// Place Unit line breaks on Linux scripts if not already present.
if ( obj . meshAgentInstallScripts [ this . info . id ] . linux === true ) { obj . meshAgentInstallScripts [ this . info . id ] . data = obj . meshAgentInstallScripts [ this . info . id ] . data . split ( '\r\n' ) . join ( '\n' ) }
2017-08-28 19:27:45 +03:00
} ) ;
stream . info = meshAgentsInstallScriptList [ scriptid ] ;
stream . agentpath = scriptpath ;
2017-10-15 09:22:19 +03:00
stream . hash = obj . crypto . createHash ( 'sha384' , stream ) ;
2017-08-28 19:27:45 +03:00
} catch ( e ) { }
}
2018-08-30 22:05:23 +03:00
} ;
2018-12-30 02:24:33 +03:00
2017-08-28 19:27:45 +03:00
// List of possible mesh agents
2018-01-03 03:52:49 +03:00
obj . meshAgentsArchitectureNumbers = {
2019-02-26 01:35:08 +03:00
0 : { id : 0 , localname : 'Unknown' , rname : 'meshconsole.exe' , desc : 'Unknown agent' , update : false , amt : true , platform : 'unknown' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
2019-08-01 02:49:23 +03:00
1 : { id : 1 , localname : 'MeshConsole.exe' , rname : 'meshconsole32.exe' , desc : 'Windows x86-32 console' , update : true , amt : true , platform : 'win32' , core : 'windows-amt' , rcore : 'windows-recovery' , arcore : 'windows-agentrecovery' } ,
2 : { id : 2 , localname : 'MeshConsole64.exe' , rname : 'meshconsole64.exe' , desc : 'Windows x86-64 console' , update : true , amt : true , platform : 'win32' , core : 'windows-amt' , rcore : 'windows-recovery' , arcore : 'windows-agentrecovery' } ,
3 : { id : 3 , localname : 'MeshService-signed.exe' , rname : 'meshagent32.exe' , desc : 'Windows x86-32 service' , update : true , amt : true , platform : 'win32' , core : 'windows-amt' , rcore : 'windows-recovery' , arcore : 'windows-agentrecovery' } ,
4 : { id : 4 , localname : 'MeshService64-signed.exe' , rname : 'meshagent64.exe' , desc : 'Windows x86-64 service' , update : true , amt : true , platform : 'win32' , core : 'windows-amt' , rcore : 'windows-recovery' , arcore : 'windows-agentrecovery' } ,
2019-02-26 01:35:08 +03:00
5 : { id : 5 , localname : 'meshagent_x86' , rname : 'meshagent' , desc : 'Linux x86-32' , update : true , amt : true , platform : 'linux' , core : 'linux-amt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
6 : { id : 6 , localname : 'meshagent_x86-64' , rname : 'meshagent' , desc : 'Linux x86-64' , update : true , amt : true , platform : 'linux' , core : 'linux-amt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
7 : { id : 7 , localname : 'meshagent_mips' , rname : 'meshagent' , desc : 'Linux MIPS' , update : true , amt : false , platform : 'linux' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
8 : { id : 8 , localname : 'MeshAgent-Linux-XEN-x86-32' , rname : 'meshagent' , desc : 'XEN x86-64' , update : true , amt : false , platform : 'linux' , core : 'linux-amt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
9 : { id : 9 , localname : 'meshagent_arm' , rname : 'meshagent' , desc : 'Linux ARM5' , update : true , amt : false , platform : 'linux' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
10 : { id : 10 , localname : 'MeshAgent-Linux-ARM-PlugPC' , rname : 'meshagent' , desc : 'Linux ARM PlugPC' , update : true , amt : false , platform : 'linux' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
11 : { id : 11 , localname : 'meshagent_osx-x86-32' , rname : 'meshosx' , desc : 'Apple OSX x86-32' , update : true , amt : false , platform : 'linux' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
12 : { id : 12 , localname : 'MeshAgent-Android-x86' , rname : 'meshandroid' , desc : 'Android x86-32' , update : true , amt : false , platform : 'linux' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
13 : { id : 13 , localname : 'meshagent_pogo' , rname : 'meshagent' , desc : 'Linux ARM PogoPlug' , update : true , amt : false , platform : 'linux' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
14 : { id : 14 , localname : 'MeshAgent-Android-APK' , rname : 'meshandroid' , desc : 'Android Market' , update : false , amt : false , platform : 'android' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } , // Get this one from Google Play
15 : { id : 15 , localname : 'meshagent_poky' , rname : 'meshagent' , desc : 'Linux Poky x86-32' , update : true , amt : false , platform : 'linux' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
16 : { id : 16 , localname : 'meshagent_osx-x86-64' , rname : 'meshagent' , desc : 'Apple OSX x86-64' , update : true , amt : false , platform : 'osx' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
17 : { id : 17 , localname : 'MeshAgent-ChromeOS' , rname : 'meshagent' , desc : 'Google ChromeOS' , update : false , amt : false , platform : 'chromeos' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } , // Get this one from Chrome store
18 : { id : 18 , localname : 'meshagent_poky64' , rname : 'meshagent' , desc : 'Linux Poky x86-64' , update : true , amt : false , platform : 'linux' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
19 : { id : 19 , localname : 'meshagent_x86_nokvm' , rname : 'meshagent' , desc : 'Linux x86-32 NoKVM' , update : true , amt : true , platform : 'linux' , core : 'linux-amt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
20 : { id : 20 , localname : 'meshagent_x86-64_nokvm' , rname : 'meshagent' , desc : 'Linux x86-64 NoKVM' , update : true , amt : true , platform : 'linux' , core : 'linux-amt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
21 : { id : 21 , localname : 'MeshAgent-WinMinCore-Console-x86-32.exe' , rname : 'meshagent.exe' , desc : 'Windows MinCore Console x86-32' , update : true , amt : false , platform : 'win32' , core : 'windows-amt' , rcore : 'windows-recovery' , arcore : 'windows-agentrecovery' } ,
22 : { id : 22 , localname : 'MeshAgent-WinMinCore-Service-x86-64.exe' , rname : 'meshagent.exe' , desc : 'Windows MinCore Service x86-32' , update : true , amt : false , platform : 'win32' , core : 'windows-amt' , rcore : 'windows-recovery' , arcore : 'windows-agentrecovery' } ,
23 : { id : 23 , localname : 'MeshAgent-NodeJS' , rname : 'meshagent' , desc : 'NodeJS' , update : false , amt : false , platform : 'node' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } , // Get this one from NPM
24 : { id : 24 , localname : 'meshagent_arm-linaro' , rname : 'meshagent' , desc : 'Linux ARM Linaro' , update : true , amt : false , platform : 'linux' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } ,
25 : { id : 25 , localname : 'meshagent_armhf' , rname : 'meshagent' , desc : 'Linux ARM - HardFloat' , update : true , amt : false , platform : 'linux' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } , // "armv6l" and "armv7l"
2019-04-28 20:25:53 +03:00
26 : { id : 26 , localname : 'meshagent_arm64' , rname : 'meshagent' , desc : 'Linux ARMv8-64' , update : true , amt : false , platform : 'linux' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } , // "aarch64"
2019-06-21 20:14:56 +03:00
27 : { id : 27 , localname : 'meshagent_armhf2' , rname : 'meshagent' , desc : 'Linux ARM - HardFloat' , update : true , amt : false , platform : 'linux' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } , // Raspbian 7 2015-02-02 for old Raspberry Pi.
2019-09-21 01:20:59 +03:00
30 : { id : 30 , localname : 'meshagent_freebsd_x86-64' , rname : 'meshagent' , desc : 'FreeBSD x86-64' , update : true , amt : false , platform : 'freebsd' , core : 'linux-noamt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } , // FreeBSD x64
2019-02-26 01:35:08 +03:00
10003 : { id : 3 , localname : 'MeshService.exe' , rname : 'meshagent.exe' , desc : 'Windows x86-32 service' , update : true , amt : true , platform : 'win32' , core : 'windows-amt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } , // Unsigned version of the Windows MeshAgent x86
10004 : { id : 4 , localname : 'MeshService64.exe' , rname : 'meshagent.exe' , desc : 'Windows x86-64 service' , update : true , amt : true , platform : 'win32' , core : 'windows-amt' , rcore : 'linux-recovery' , arcore : 'linux-agentrecovery' } // Unsigned version of the Windows MeshAgent x64
2017-08-28 19:27:45 +03:00
} ;
// Update the list of available mesh agents
2017-10-25 19:58:14 +03:00
obj . updateMeshAgentsTable = function ( func ) {
var archcount = 0 ;
2018-01-03 03:52:49 +03:00
for ( var archid in obj . meshAgentsArchitectureNumbers ) {
var agentpath = obj . path . join ( _ _dirname , 'agents' , obj . meshAgentsArchitectureNumbers [ archid ] . localname ) ;
2018-08-30 22:05:23 +03:00
2018-01-20 05:04:54 +03:00
// Fetch all the agent binary information
var stats = null ;
2018-08-30 22:05:23 +03:00
try { stats = obj . fs . statSync ( agentpath ) ; } catch ( e ) { }
2018-01-20 05:04:54 +03:00
if ( ( stats != null ) ) {
// If file exists
archcount ++ ;
2019-10-11 21:16:36 +03:00
obj . meshAgentBinaries [ archid ] = Object . assign ( { } , obj . meshAgentsArchitectureNumbers [ archid ] ) ;
2018-03-10 03:39:14 +03:00
obj . meshAgentBinaries [ archid ] . path = agentpath ;
2019-03-11 07:40:25 +03:00
obj . meshAgentBinaries [ archid ] . url = ( ( obj . args . notls == true ) ? 'http://' : 'https://' ) + obj . certificates . CommonName + ':' + ( ( typeof obj . args . aliasport == 'number' ) ? obj . args . aliasport : obj . args . port ) + '/meshagents?id=' + archid ;
2018-01-20 05:04:54 +03:00
obj . meshAgentBinaries [ archid ] . size = stats . size ;
2019-10-23 23:12:30 +03:00
2018-01-20 05:04:54 +03:00
// If this is a windows binary, pull binary information
if ( obj . meshAgentsArchitectureNumbers [ archid ] . platform == 'win32' ) {
try { obj . meshAgentBinaries [ archid ] . pe = obj . exeHandler . parseWindowsExecutable ( agentpath ) ; } catch ( e ) { }
}
2019-02-15 09:16:15 +03:00
2019-10-23 23:12:30 +03:00
// If agents must be stored in RAM or if this is a Windows 32/64 agent, load the agent in RAM.
2019-10-27 22:17:12 +03:00
if ( ( obj . args . agentsinram === true ) || ( ( ( archid == 3 ) || ( archid == 4 ) ) && ( obj . args . agentsinram !== false ) ) ) {
2019-10-23 23:12:30 +03:00
if ( ( archid == 3 ) || ( archid == 4 ) ) {
// Load the agent with a random msh added to it.
var outStream = new require ( 'stream' ) . Duplex ( ) ;
outStream . meshAgentBinary = obj . meshAgentBinaries [ archid ] ;
outStream . meshAgentBinary . randomMsh = Buffer . from ( obj . crypto . randomBytes ( 64 ) , 'binary' ) . toString ( 'base64' ) ;
outStream . bufferList = [ ] ;
outStream . _write = function ( chunk , encoding , callback ) { this . bufferList . push ( chunk ) ; if ( callback ) callback ( ) ; } ; // Append the chuck.
outStream . _read = function ( size ) { } ; // Do nothing, this is not going to be called.
outStream . on ( 'finish' , function ( ) { this . meshAgentBinary . data = Buffer . concat ( this . bufferList ) ; this . meshAgentBinary . size = this . meshAgentBinary . data . length ; delete this . bufferList ; } ) // Merge all chunks
obj . exeHandler . streamExeWithMeshPolicy (
{
platform : 'win32' ,
sourceFileName : agentpath ,
destinationStream : outStream ,
randomPolicy : true , // Indicates that the msh policy is random data.
msh : outStream . meshAgentBinary . randomMsh ,
peinfo : obj . meshAgentBinaries [ archid ] . pe
} ) ;
} else {
// Load the agent as-is
obj . meshAgentBinaries [ archid ] . data = obj . fs . readFileSync ( agentpath ) ;
}
}
2018-01-20 05:04:54 +03:00
// Hash the binary
var hashStream = obj . crypto . createHash ( 'sha384' ) ;
hashStream . archid = archid ;
hashStream . on ( 'data' , function ( data ) {
2019-03-08 09:47:27 +03:00
obj . meshAgentBinaries [ this . archid ] . hash = data . toString ( 'binary' ) ;
2020-01-28 01:03:36 +03:00
obj . meshAgentBinaries [ this . archid ] . hashhex = data . toString ( 'hex' ) ;
2017-10-25 19:58:14 +03:00
if ( ( -- archcount == 0 ) && ( func != null ) ) { func ( ) ; }
2017-08-28 19:27:45 +03:00
} ) ;
2018-01-20 05:04:54 +03:00
var options = { sourcePath : agentpath , targetStream : hashStream , platform : obj . meshAgentsArchitectureNumbers [ archid ] . platform } ;
if ( obj . meshAgentBinaries [ archid ] . pe != null ) { options . peinfo = obj . meshAgentBinaries [ archid ] . pe ; }
obj . exeHandler . hashExecutableFile ( options ) ;
}
2017-08-28 19:27:45 +03:00
}
2018-03-10 03:39:14 +03:00
if ( ( obj . meshAgentBinaries [ 3 ] == null ) && ( obj . meshAgentBinaries [ 10003 ] != null ) ) { obj . meshAgentBinaries [ 3 ] = obj . meshAgentBinaries [ 10003 ] ; } // If only the unsigned windows binaries are present, use them.
if ( ( obj . meshAgentBinaries [ 4 ] == null ) && ( obj . meshAgentBinaries [ 10004 ] != null ) ) { obj . meshAgentBinaries [ 4 ] = obj . meshAgentBinaries [ 10004 ] ; } // If only the unsigned windows binaries are present, use them.
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
2017-12-14 01:52:57 +03:00
// Generate a time limited user login token
obj . getLoginToken = function ( userid , func ) {
2018-01-03 03:52:49 +03:00
if ( ( userid == null ) || ( typeof userid != 'string' ) ) { func ( 'Invalid userid.' ) ; return ; }
2017-12-14 01:52:57 +03:00
var x = userid . split ( '/' ) ;
if ( x == null || x . length != 3 || x [ 0 ] != 'user' ) { func ( 'Invalid userid.' ) ; return ; }
obj . db . Get ( userid , function ( err , docs ) {
if ( err != null || docs == null || docs . length == 0 ) {
func ( 'User ' + userid + ' not found.' ) ; return ;
} else {
// Load the login cookie encryption key from the database
obj . db . Get ( 'LoginCookieEncryptionKey' , function ( err , docs ) {
2018-12-29 22:38:05 +03:00
if ( ( docs . length > 0 ) && ( docs [ 0 ] . key != null ) && ( obj . args . logintokengen == null ) && ( docs [ 0 ] . key . length >= 160 ) ) {
2017-12-14 01:52:57 +03:00
// Key is present, use it.
obj . loginCookieEncryptionKey = Buffer . from ( docs [ 0 ] . key , 'hex' ) ;
func ( obj . encodeCookie ( { u : userid , a : 3 } , obj . loginCookieEncryptionKey ) ) ;
} else {
// Key is not present, generate one.
obj . loginCookieEncryptionKey = obj . generateCookieKey ( ) ;
obj . db . Set ( { _id : 'LoginCookieEncryptionKey' , key : obj . loginCookieEncryptionKey . toString ( 'hex' ) , time : Date . now ( ) } , function ( ) { func ( obj . encodeCookie ( { u : userid , a : 3 } , obj . loginCookieEncryptionKey ) ) ; } ) ;
}
} ) ;
}
} ) ;
2018-08-30 22:05:23 +03:00
} ;
2017-12-14 01:52:57 +03:00
2018-12-29 08:55:23 +03:00
// Show the user login token generation key
2017-12-14 01:52:57 +03:00
obj . showLoginTokenKey = function ( func ) {
// Load the login cookie encryption key from the database
obj . db . Get ( 'LoginCookieEncryptionKey' , function ( err , docs ) {
2018-12-29 22:38:05 +03:00
if ( ( docs . length > 0 ) && ( docs [ 0 ] . key != null ) && ( obj . args . logintokengen == null ) && ( docs [ 0 ] . key . length >= 160 ) ) {
2017-12-14 01:52:57 +03:00
// Key is present, use it.
func ( docs [ 0 ] . key ) ;
} else {
// Key is not present, generate one.
obj . loginCookieEncryptionKey = obj . generateCookieKey ( ) ;
obj . db . Set ( { _id : 'LoginCookieEncryptionKey' , key : obj . loginCookieEncryptionKey . toString ( 'hex' ) , time : Date . now ( ) } , function ( ) { func ( obj . loginCookieEncryptionKey . toString ( 'hex' ) ) ; } ) ;
}
} ) ;
2018-08-30 22:05:23 +03:00
} ;
2017-12-14 01:52:57 +03:00
// Generate a cryptographic key used to encode and decode cookies
obj . generateCookieKey = function ( ) {
2019-01-03 05:03:34 +03:00
return Buffer . from ( obj . crypto . randomBytes ( 80 ) , 'binary' ) ;
2018-12-29 22:38:05 +03:00
//return Buffer.alloc(80, 0); // Sets the key to zeros, debug only.
2018-08-30 22:05:23 +03:00
} ;
2017-12-14 01:52:57 +03:00
2018-12-29 08:55:23 +03:00
// Encode an object as a cookie using a key using AES-GCM. (key must be 32 bytes or more)
2017-12-14 01:52:57 +03:00
obj . encodeCookie = function ( o , key ) {
try {
if ( key == null ) { key = obj . serverKey ; }
o . time = Math . floor ( Date . now ( ) / 1000 ) ; // Add the cookie creation time
2019-01-03 05:03:34 +03:00
const iv = Buffer . from ( obj . crypto . randomBytes ( 12 ) , 'binary' ) , cipher = obj . crypto . createCipheriv ( 'aes-256-gcm' , key . slice ( 0 , 32 ) , iv ) ;
2018-12-29 08:55:23 +03:00
const crypted = Buffer . concat ( [ cipher . update ( JSON . stringify ( o ) , 'utf8' ) , cipher . final ( ) ] ) ;
2020-02-03 21:45:09 +03:00
var r = Buffer . concat ( [ iv , cipher . getAuthTag ( ) , crypted ] ) . toString ( obj . args . cookieencoding ? obj . args . cookieencoding : 'base64' ) . replace ( /\+/g , '@' ) . replace ( /\//g , '$' ) ;
2019-08-23 21:51:48 +03:00
obj . debug ( 'cookie' , 'Encoded AESGCM cookie: ' + JSON . stringify ( o ) ) ;
return r ;
} catch ( ex ) { obj . debug ( 'cookie' , 'ERR: Failed to encode AESGCM cookie due to exception: ' + ex ) ; return null ; }
2018-08-30 22:05:23 +03:00
} ;
2017-12-14 01:52:57 +03:00
2018-12-29 22:38:05 +03:00
// Decode a cookie back into an object using a key using AES256-GCM or AES128-CBC/HMAC-SHA386. Return null if it's not a valid cookie. (key must be 32 bytes or more)
2017-12-14 01:52:57 +03:00
obj . decodeCookie = function ( cookie , key , timeout ) {
2019-12-12 22:03:33 +03:00
var r = obj . decodeCookieAESGCM ( cookie , key , timeout ) ;
2019-12-12 02:44:10 +03:00
if ( r == null ) { r = obj . decodeCookieAESSHA ( cookie , key , timeout ) ; }
2020-02-03 21:45:09 +03:00
if ( ( r == null ) && ( obj . args . cookieencoding == null ) && ( ( cookie == cookie . toLowerCase ( ) ) || ( cookie == cookie . toUpperCase ( ) ) ) ) {
obj . debug ( 'cookie' , 'Upper/Lowercase cookie, try "CookieEncoding":"hex" in settings section of config.json.' ) ;
console . log ( 'Upper/Lowercase cookie, try "CookieEncoding":"hex" in settings section of config.json.' ) ;
}
2019-12-12 02:44:10 +03:00
if ( ( r != null ) && ( typeof r . once == 'string' ) && ( r . once . length > 0 ) ) {
// This cookie must only be used once.
if ( timeout == null ) { timeout = 2 ; }
if ( obj . cookieUseOnceTable [ r . once ] == null ) {
const ctimeout = ( ( ( r . expire ) == null || ( typeof r . expire != 'number' ) ) ? ( r . time + ( ( timeout + 3 ) * 60000 ) ) : ( r . time + ( ( r . expire + 3 ) * 60000 ) ) ) ;
// Store the used cookie in RAM
obj . cookieUseOnceTable [ r . once ] = ctimeout ;
// Store the used cookie in the database
// TODO
// Send the used cookie to peer servers
// TODO
// Clean up the used table
if ( ++ obj . cookieUseOnceTableCleanCounter > 20 ) {
const now = Date . now ( ) ;
for ( var i in obj . cookieUseOnceTable ) { if ( obj . cookieUseOnceTable [ i ] < now ) { delete obj . cookieUseOnceTable [ i ] ; } }
obj . cookieUseOnceTableCleanCounter = 0 ;
}
} else { return null ; }
}
2018-12-29 08:55:23 +03:00
return r ;
}
2018-12-29 22:38:05 +03:00
// Decode a cookie back into an object using a key using AES256-GCM. Return null if it's not a valid cookie. (key must be 32 bytes or more)
2018-12-29 08:55:23 +03:00
obj . decodeCookieAESGCM = function ( cookie , key , timeout ) {
2017-12-14 01:52:57 +03:00
try {
if ( key == null ) { key = obj . serverKey ; }
2020-02-03 21:45:09 +03:00
cookie = Buffer . from ( cookie . replace ( /\@/g , '+' ) . replace ( /\$/g , '/' ) , obj . args . cookieencoding ? obj . args . cookieencoding : 'base64' ) ;
2018-12-29 08:55:23 +03:00
const decipher = obj . crypto . createDecipheriv ( 'aes-256-gcm' , key . slice ( 0 , 32 ) , cookie . slice ( 0 , 12 ) ) ;
2017-12-14 01:52:57 +03:00
decipher . setAuthTag ( cookie . slice ( 12 , 16 ) ) ;
2018-12-29 08:55:23 +03:00
const o = JSON . parse ( decipher . update ( cookie . slice ( 28 ) , 'binary' , 'utf8' ) + decipher . final ( 'utf8' ) ) ;
2019-08-23 01:31:39 +03:00
if ( ( o . time == null ) || ( o . time == null ) || ( typeof o . time != 'number' ) ) { obj . debug ( 'cookie' , 'ERR: Bad cookie due to invalid time' ) ; return null ; }
2017-12-14 01:52:57 +03:00
o . time = o . time * 1000 ; // Decode the cookie creation time
o . dtime = Date . now ( ) - o . time ; // Decode how long ago the cookie was created (in milliseconds)
2019-06-03 23:15:38 +03:00
if ( ( o . expire ) == null || ( typeof o . expire != 'number' ) ) {
// Use a fixed cookie expire time
if ( timeout == null ) { timeout = 2 ; }
2019-08-23 01:31:39 +03:00
if ( ( o . dtime > ( timeout * 60000 ) ) || ( o . dtime < - 30000 ) ) { obj . debug ( 'cookie' , 'ERR: Bad cookie due to timeout' ) ; return null ; } // The cookie is only valid 120 seconds, or 30 seconds back in time (in case other server's clock is not quite right)
2019-06-03 23:15:38 +03:00
} else {
// An expire time is included in the cookie (in minutes), use this.
2019-08-23 01:31:39 +03:00
if ( ( o . expire !== 0 ) && ( ( o . dtime > ( o . expire * 60000 ) ) || ( o . dtime < - 30000 ) ) ) { obj . debug ( 'cookie' , 'ERR: Bad cookie due to timeout' ) ; return null ; } // The cookie is only valid 120 seconds, or 30 seconds back in time (in case other server's clock is not quite right)
2019-06-03 23:15:38 +03:00
}
2019-08-23 21:51:48 +03:00
obj . debug ( 'cookie' , 'Decoded AESGCM cookie: ' + JSON . stringify ( o ) ) ;
2017-12-14 01:52:57 +03:00
return o ;
2019-08-23 01:31:39 +03:00
} catch ( ex ) { obj . debug ( 'cookie' , 'ERR: Bad AESGCM cookie due to exception: ' + ex ) ; return null ; }
2018-08-30 22:05:23 +03:00
} ;
2017-12-14 01:52:57 +03:00
2018-12-29 22:38:05 +03:00
// Decode a cookie back into an object using a key using AES256 / HMAC-SHA386. Return null if it's not a valid cookie. (key must be 80 bytes or more)
// We do this because poor .NET does not support AES256-GCM.
2018-12-29 08:55:23 +03:00
obj . decodeCookieAESSHA = function ( cookie , key , timeout ) {
try {
if ( key == null ) { key = obj . serverKey ; }
2018-12-29 22:38:05 +03:00
if ( key . length < 80 ) { return null ; }
2020-02-03 21:45:09 +03:00
cookie = Buffer . from ( cookie . replace ( /\@/g , '+' ) . replace ( /\$/g , '/' ) , obj . args . cookieencoding ? obj . args . cookieencoding : 'base64' ) ;
2018-12-29 22:38:05 +03:00
const decipher = obj . crypto . createDecipheriv ( 'aes-256-cbc' , key . slice ( 48 , 80 ) , cookie . slice ( 0 , 16 ) ) ;
2018-12-29 08:55:23 +03:00
const rawmsg = decipher . update ( cookie . slice ( 16 ) , 'binary' , 'binary' ) + decipher . final ( 'binary' ) ;
2018-12-29 22:38:05 +03:00
const hmac = obj . crypto . createHmac ( 'sha384' , key . slice ( 0 , 48 ) ) ;
hmac . update ( rawmsg . slice ( 48 ) ) ;
if ( Buffer . compare ( hmac . digest ( ) , Buffer . from ( rawmsg . slice ( 0 , 48 ) ) ) == false ) { return null ; }
const o = JSON . parse ( rawmsg . slice ( 48 ) . toString ( 'utf8' ) ) ;
2019-08-23 01:31:39 +03:00
if ( ( o . time == null ) || ( o . time == null ) || ( typeof o . time != 'number' ) ) { obj . debug ( 'cookie' , 'ERR: Bad cookie due to invalid time' ) ; return null ; }
2018-12-29 08:55:23 +03:00
o . time = o . time * 1000 ; // Decode the cookie creation time
o . dtime = Date . now ( ) - o . time ; // Decode how long ago the cookie was created (in milliseconds)
2019-06-03 23:15:38 +03:00
if ( ( o . expire ) == null || ( typeof o . expire != 'number' ) ) {
// Use a fixed cookie expire time
if ( timeout == null ) { timeout = 2 ; }
2019-08-23 01:31:39 +03:00
if ( ( o . dtime > ( timeout * 60000 ) ) || ( o . dtime < - 30000 ) ) { obj . debug ( 'cookie' , 'ERR: Bad cookie due to timeout' ) ; return null ; } // The cookie is only valid 120 seconds, or 30 seconds back in time (in case other server's clock is not quite right)
2019-06-03 23:15:38 +03:00
} else {
// An expire time is included in the cookie (in minutes), use this.
2019-08-23 01:31:39 +03:00
if ( ( o . expire !== 0 ) && ( ( o . dtime > ( o . expire * 60000 ) ) || ( o . dtime < - 30000 ) ) ) { obj . debug ( 'cookie' , 'ERR: Bad cookie due to timeout' ) ; return null ; } // The cookie is only valid 120 seconds, or 30 seconds back in time (in case other server's clock is not quite right)
2019-06-03 23:15:38 +03:00
}
2019-08-23 21:51:48 +03:00
obj . debug ( 'cookie' , 'Decoded AESSHA cookie: ' + JSON . stringify ( o ) ) ;
2018-12-29 08:55:23 +03:00
return o ;
2019-08-23 01:31:39 +03:00
} catch ( ex ) { obj . debug ( 'cookie' , 'ERR: Bad AESSHA cookie due to exception: ' + ex ) ; return null ; }
2018-12-29 08:55:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
// Debug
2019-08-23 01:31:39 +03:00
obj . debug = function ( source , ... args ) {
// Send event to console
if ( ( obj . debugSources != null ) && ( ( obj . debugSources == '*' ) || ( obj . debugSources . indexOf ( source ) >= 0 ) ) ) { console . log ( source . toUpperCase ( ) + ':' , ... args ) ; }
2019-11-16 23:13:04 +03:00
// Send event to log file
if ( obj . config . settings && obj . config . settings . log ) {
2019-11-16 23:27:12 +03:00
if ( typeof obj . args . log == 'string' ) { obj . args . log = obj . args . log . split ( ',' ) ; }
if ( obj . args . log . indexOf ( source ) >= 0 ) {
2019-11-16 23:13:04 +03:00
const d = new Date ( ) ;
2019-11-16 23:27:12 +03:00
if ( obj . xxLogFile == null ) {
try {
obj . xxLogFile = obj . fs . openSync ( obj . getConfigFilePath ( 'log.txt' ) , 'a+' , 666 ) ;
obj . fs . writeSync ( obj . xxLogFile , '---- Log start at ' + new Date ( ) . toLocaleString ( ) + ' ----\r\n' ) ;
obj . xxLogDateStr = d . toLocaleDateString ( ) ;
} catch ( ex ) { }
}
2019-11-16 23:13:04 +03:00
if ( obj . xxLogFile != null ) {
try {
if ( obj . xxLogDateStr != d . toLocaleDateString ( ) ) { obj . xxLogDateStr = d . toLocaleDateString ( ) ; obj . fs . writeSync ( obj . xxLogFile , '---- ' + d . toLocaleDateString ( ) + ' ----\r\n' ) ; }
obj . fs . writeSync ( obj . xxLogFile , new Date ( ) . toLocaleTimeString ( ) + ' - ' + source + ': ' + Array . prototype . slice . call ( ... args ) . join ( '' ) + '\r\n' ) ;
} catch ( ex ) { }
}
}
}
2019-08-23 01:31:39 +03:00
// Send the event to logged in administrators
if ( ( obj . debugRemoteSources != null ) && ( ( obj . debugRemoteSources == '*' ) || ( obj . debugRemoteSources . indexOf ( source ) >= 0 ) ) ) {
2019-08-23 21:51:48 +03:00
var sendcount = 0 ;
2019-08-23 01:31:39 +03:00
for ( var sessionid in obj . webserver . wssessions2 ) {
var ws = obj . webserver . wssessions2 [ sessionid ] ;
if ( ( ws != null ) && ( ws . userid != null ) ) {
var user = obj . webserver . users [ ws . userid ] ;
if ( ( user != null ) && ( user . siteadmin == 4294967295 ) ) {
2019-08-23 21:51:48 +03:00
try { ws . send ( JSON . stringify ( { action : 'trace' , source : source , args : args , time : Date . now ( ) } ) ) ; sendcount ++ ; } catch ( ex ) { }
2019-08-23 01:31:39 +03:00
}
}
}
2019-08-23 21:51:48 +03:00
if ( sendcount == 0 ) { obj . debugRemoteSources = null ; } // If there are no listeners, remove debug sources.
2019-08-23 01:31:39 +03:00
}
2018-08-30 22:05:23 +03:00
} ;
2018-03-14 22:10:13 +03:00
// Update server state. Writes a server state file.
var meshServerState = { } ;
2018-08-30 22:05:23 +03:00
obj . updateServerState = function ( name , val ) {
2019-01-04 01:46:52 +03:00
//console.log('updateServerState', name, val);
2018-09-20 21:45:12 +03:00
try {
if ( ( name != null ) && ( val != null ) ) {
var changed = false ;
if ( ( name != null ) && ( meshServerState [ name ] != val ) ) { if ( ( val == null ) && ( meshServerState [ name ] != null ) ) { delete meshServerState [ name ] ; changed = true ; } else { if ( meshServerState [ name ] != val ) { meshServerState [ name ] = val ; changed = true ; } } }
if ( changed == false ) return ;
}
var r = 'time=' + Date . now ( ) + '\r\n' ;
for ( var i in meshServerState ) { r += ( i + '=' + meshServerState [ i ] + '\r\n' ) ; }
2018-09-27 00:58:55 +03:00
try {
obj . fs . writeFileSync ( obj . getConfigFilePath ( 'serverstate.txt' ) , r ) ; // Try to write the server state, this may fail if we don't have permission.
} catch ( ex ) { obj . serverSelfWriteAllowed = false ; }
} catch ( ex ) { } // Do nothing since this is not a critical feature.
2018-08-30 22:05:23 +03:00
} ;
2017-08-28 19:27:45 +03:00
// Logging funtions
function logException ( e ) { e += '' ; logErrorEvent ( e ) ; }
function logInfoEvent ( msg ) { if ( obj . servicelog != null ) { obj . servicelog . info ( msg ) ; } console . log ( msg ) ; }
function logWarnEvent ( msg ) { if ( obj . servicelog != null ) { obj . servicelog . warn ( msg ) ; } console . log ( msg ) ; }
function logErrorEvent ( msg ) { if ( obj . servicelog != null ) { obj . servicelog . error ( msg ) ; } console . error ( msg ) ; }
2019-12-11 05:17:25 +03:00
obj . getServerWarnings = function ( ) { return serverWarnings ; }
obj . addServerWarning = function ( msg , print ) { serverWarnings . push ( msg ) ; if ( print !== false ) { console . log ( "WARNING: " + msg ) ; } }
2017-08-28 19:27:45 +03:00
2020-02-17 21:24:32 +03:00
// auth.log functions
obj . authLog = function ( server , msg ) {
if ( obj . authlog == null ) return ;
var d = new Date ( ) ;
var month = [ 'Jan' , 'Feb' , 'Mar' , 'Apr' , 'May' , 'Jun' , 'Jul' , 'Aug' , 'Sep' , 'Oct' , 'Nov' , 'Dec' ] [ d . getMonth ( ) ] ;
var msg = month + ' ' + d . getDate ( ) + ' ' + obj . common . zeroPad ( d . getHours ( ) , 2 ) + ':' + obj . common . zeroPad ( d . getMinutes ( ) , 2 ) + ':' + d . getSeconds ( ) + ' meshcentral ' + server + '[' + process . pid + ']: ' + msg + ( ( obj . platform == 'win32' ) ? '\r\n' : '\n' ) ;
obj . fs . write ( obj . authlog , msg , function ( err , written , string ) { } ) ;
}
2018-07-14 05:18:43 +03:00
// Return the path of a file into the meshcentral-data path
obj . getConfigFilePath = function ( filename ) {
if ( ( obj . config != null ) && ( obj . config . configfiles != null ) && ( obj . config . configfiles [ filename ] != null ) && ( typeof obj . config . configfiles [ filename ] == 'string' ) ) {
//console.log('getConfigFilePath(\"' + filename + '\") = ' + obj.config.configfiles[filename]);
return obj . config . configfiles [ filename ] ;
}
//console.log('getConfigFilePath(\"' + filename + '\") = ' + obj.path.join(obj.datapath, filename));
return obj . path . join ( obj . datapath , filename ) ;
2018-08-30 22:05:23 +03:00
} ;
2018-07-14 05:18:43 +03:00
2017-08-28 19:27:45 +03:00
return obj ;
}
2019-12-09 07:46:25 +03:00
// Resolve a list of names, call back with list of failed resolves.
function checkResolveAll ( names , func ) {
var dns = require ( 'dns' ) , state = { func : func , count : names . length , err : null } ;
for ( var i in names ) {
dns . resolve ( names [ i ] , function ( err , records ) {
if ( err != null ) { if ( this . state . err == null ) { this . state . err = [ this . name ] ; } else { this . state . err . push ( this . name ) ; } }
if ( -- this . state . count == 0 ) { this . state . func ( this . state . err ) ; }
} . bind ( { name : names [ i ] , state : state } ) )
}
}
2018-02-01 03:10:15 +03:00
// Return the server configuration
2019-02-03 01:54:36 +03:00
function getConfig ( createSampleConfig ) {
2018-02-01 03:10:15 +03:00
// Figure out the datapath location
2019-05-17 22:40:15 +03:00
var i , fs = require ( 'fs' ) , path = require ( 'path' ) , datapath = null ;
2018-02-01 03:10:15 +03:00
var args = require ( 'minimist' ) ( process . argv . slice ( 2 ) ) ;
if ( ( _ _dirname . endsWith ( '/node_modules/meshcentral' ) ) || ( _ _dirname . endsWith ( '\\node_modules\\meshcentral' ) ) || ( _ _dirname . endsWith ( '/node_modules/meshcentral/' ) ) || ( _ _dirname . endsWith ( '\\node_modules\\meshcentral\\' ) ) ) {
datapath = path . join ( _ _dirname , '../../meshcentral-data' ) ;
} else {
datapath = path . join ( _ _dirname , '../meshcentral-data' ) ;
}
if ( args . datapath ) { datapath = args . datapath ; }
try { fs . mkdirSync ( datapath ) ; } catch ( e ) { }
// Read configuration file if present and change arguments.
var config = { } , configFilePath = path . join ( datapath , 'config.json' ) ;
if ( fs . existsSync ( configFilePath ) ) {
// Load and validate the configuration file
try { config = require ( configFilePath ) ; } catch ( e ) { console . log ( 'ERROR: Unable to parse ' + configFilePath + '.' ) ; return null ; }
if ( config . domains == null ) { config . domains = { } ; }
2018-08-30 22:05:23 +03:00
for ( i in config . domains ) { if ( ( i . split ( '/' ) . length > 1 ) || ( i . split ( ' ' ) . length > 1 ) ) { console . log ( "ERROR: Error in config.json, domain names can't have spaces or /." ) ; return null ; } }
2018-02-01 03:10:15 +03:00
} else {
2019-02-03 01:54:36 +03:00
if ( createSampleConfig === true ) {
// Copy the "sample-config.json" to give users a starting point
var sampleConfigPath = path . join ( _ _dirname , 'sample-config.json' ) ;
if ( fs . existsSync ( sampleConfigPath ) ) { fs . createReadStream ( sampleConfigPath ) . pipe ( fs . createWriteStream ( configFilePath ) ) ; }
}
2018-02-01 03:10:15 +03:00
}
// Set the command line arguments to the config file if they are not present
if ( ! config . settings ) { config . settings = { } ; }
2018-08-30 22:05:23 +03:00
for ( i in args ) { config . settings [ i ] = args [ i ] ; }
2018-02-01 03:10:15 +03:00
// Lower case all keys in the config file
2019-01-05 01:35:01 +03:00
try {
2020-02-28 05:05:18 +03:00
require ( './common.js' ) . objKeysToLower ( config , [ 'ldapoptions' , 'defaultuserwebstate' , 'forceduserwebstate' ] ) ;
2019-01-05 01:35:01 +03:00
} catch ( ex ) {
console . log ( 'CRITICAL ERROR: Unable to access the file \"./common.js\".\r\nCheck folder & file permissions.' ) ;
process . exit ( ) ;
}
2019-04-11 23:41:51 +03:00
2018-02-01 03:10:15 +03:00
return config ;
}
// Check if a list of modules are present and install any missing ones
2017-08-28 19:27:45 +03:00
function InstallModules ( modules , func ) {
2019-03-23 23:28:17 +03:00
var missingModules = [ ] ;
if ( modules . length > 0 ) {
2020-03-04 00:52:53 +03:00
var dependencies = require ( './package.json' ) . dependencies ;
2019-03-27 00:11:51 +03:00
for ( var i in modules ) {
2019-11-06 21:41:11 +03:00
// Modules may contain a version tag (foobar@1.0.0), remove it so the module can be found using require
2020-01-26 01:17:21 +03:00
var moduleNameAndVersion = modules [ i ] ;
2020-03-04 00:52:53 +03:00
var moduleInfo = moduleNameAndVersion . split ( '@' , 2 ) ;
2020-01-25 18:58:44 +03:00
var moduleName = moduleInfo [ 0 ] ;
var moduleVersion = moduleInfo [ 1 ] ;
2019-03-27 00:11:51 +03:00
try {
2020-01-25 18:58:44 +03:00
// Does the module need a specific version?
if ( moduleVersion ) {
2020-01-26 01:17:21 +03:00
if ( require ( ` ${ moduleName } /package.json ` ) . version != moduleVersion ) { throw new Error ( ) ; }
} else {
2019-11-14 09:47:17 +03:00
// For all other modules, do the check here.
2020-01-25 18:58:44 +03:00
// Is the module in package.json? Install exact version.
2020-01-26 01:17:21 +03:00
if ( typeof dependencies [ moduleName ] != undefined ) { moduleVersion = dependencies [ moduleName ] ; }
2019-11-14 09:47:17 +03:00
require ( moduleName ) ;
}
2019-03-27 00:11:51 +03:00
} catch ( e ) {
2020-01-26 01:17:21 +03:00
if ( previouslyInstalledModules [ modules [ i ] ] !== true ) { missingModules . push ( moduleNameAndVersion ) ; }
2019-03-27 00:11:51 +03:00
}
}
2019-03-26 05:59:04 +03:00
if ( missingModules . length > 0 ) { InstallModule ( missingModules . shift ( ) , InstallModules , modules , func ) ; } else { func ( ) ; }
2019-03-23 23:28:17 +03:00
}
2017-08-28 19:27:45 +03:00
}
2018-02-01 03:10:15 +03:00
// Check if a module is present and install it if missing
2017-08-28 19:27:45 +03:00
function InstallModule ( modulename , func , tag1 , tag2 ) {
2019-03-25 21:32:16 +03:00
console . log ( 'Installing ' + modulename + '...' ) ;
var child _process = require ( 'child_process' ) ;
2019-04-05 19:21:21 +03:00
var parentpath = _ _dirname ;
// Get the working directory
if ( ( _ _dirname . endsWith ( '/node_modules/meshcentral' ) ) || ( _ _dirname . endsWith ( '\\node_modules\\meshcentral' ) ) || ( _ _dirname . endsWith ( '/node_modules/meshcentral/' ) ) || ( _ _dirname . endsWith ( '\\node_modules\\meshcentral\\' ) ) ) { parentpath = require ( 'path' ) . join ( _ _dirname , '../..' ) ; }
2019-03-25 21:32:16 +03:00
2020-01-30 23:25:49 +03:00
child _process . exec ( ` npm install --no-optional ${ modulename } ` , { maxBuffer : 512000 , timeout : 120000 , cwd : parentpath } , function ( error , stdout , stderr ) {
2019-05-17 22:40:15 +03:00
if ( ( error != null ) && ( error != '' ) ) {
2019-03-29 01:56:48 +03:00
console . log ( 'ERROR: Unable to install required module "' + modulename + '". MeshCentral may not have access to npm, or npm may not have suffisent rights to load the new module. Try "npm install ' + modulename + '" to manualy install this module.\r\n' ) ;
2019-03-27 22:55:31 +03:00
process . exit ( ) ;
return ;
}
2019-05-03 23:57:52 +03:00
previouslyInstalledModules [ modulename ] = true ;
2019-03-25 21:32:16 +03:00
func ( tag1 , tag2 ) ;
2017-08-28 19:27:45 +03:00
return ;
2019-03-25 21:32:16 +03:00
} ) ;
2017-08-28 19:27:45 +03:00
}
// Detect CTRL-C on Linux and stop nicely
2017-09-04 22:20:18 +03:00
process . on ( 'SIGINT' , function ( ) { if ( meshserver != null ) { meshserver . Stop ( ) ; meshserver = null ; } console . log ( 'Server Ctrl-C exit...' ) ; process . exit ( ) ; } ) ;
2017-08-28 19:27:45 +03:00
2019-11-27 01:11:09 +03:00
// Add a server warning, warnings will be shown to the administrator on the web application
var serverWarnings = [ ] ;
function addServerWarning ( msg , print ) { serverWarnings . push ( msg ) ; if ( print !== false ) { console . log ( "WARNING: " + msg ) ; } }
2018-02-01 03:10:15 +03:00
// Load the really basic modules
2017-08-28 19:27:45 +03:00
var meshserver = null ;
2019-07-18 01:57:42 +03:00
var childProcess = null ;
2019-11-27 01:11:09 +03:00
var previouslyInstalledModules = { } ;
2019-05-18 01:44:01 +03:00
function mainStart ( ) {
2018-09-01 01:23:42 +03:00
// Check the NodeJS is version 6 or better.
2019-12-04 23:01:03 +03:00
if ( Number ( process . version . match ( /^v(\d+\.\d+)/ ) [ 1 ] ) < 6 ) { console . log ( "MeshCentral requires Node v6 or above, current version is " + process . version + "." ) ; return ; }
2018-09-01 01:23:42 +03:00
2020-01-30 02:29:15 +03:00
// If running within the node_modules folder, move working directory to the parent of the node_modules folder.
if ( _ _dirname . endsWith ( '\\node_modules\\meshcentral' ) || _ _dirname . endsWith ( '/node_modules/meshcentral' ) ) { process . chdir ( require ( 'path' ) . join ( _ _dirname , '..' , '..' ) ) ; }
2020-01-29 22:01:33 +03:00
2018-09-01 01:23:42 +03:00
// Check for any missing modules.
2018-03-15 01:16:55 +03:00
InstallModules ( [ 'minimist' ] , function ( ) {
2019-05-18 01:44:01 +03:00
// Parse inbound arguments
var args = require ( 'minimist' ) ( process . argv . slice ( 2 ) ) ;
2018-03-15 01:16:55 +03:00
// Get the server configuration
2019-02-03 01:54:36 +03:00
var config = getConfig ( false ) ;
2018-03-15 01:16:55 +03:00
if ( config == null ) { process . exit ( ) ; }
2019-05-27 21:58:31 +03:00
// Lowercase the auth value if present
2019-04-11 23:41:51 +03:00
for ( var i in config . domains ) { if ( typeof config . domains [ i ] . auth == 'string' ) { config . domains [ i ] . auth = config . domains [ i ] . auth . toLowerCase ( ) ; } }
2019-03-25 21:32:16 +03:00
// Check is Windows SSPI and YubiKey OTP will be used
2018-05-30 02:57:08 +03:00
var sspi = false ;
2019-04-11 23:41:51 +03:00
var ldap = false ;
2019-03-23 23:28:17 +03:00
var allsspi = true ;
2019-03-25 21:32:16 +03:00
var yubikey = false ;
2020-02-14 22:20:06 +03:00
var recordingIndex = false ;
2019-04-23 03:00:46 +03:00
var domainCount = 0 ;
if ( require ( 'os' ) . platform ( ) == 'win32' ) { for ( var i in config . domains ) { domainCount ++ ; if ( config . domains [ i ] . auth == 'sspi' ) { sspi = true ; } else { allsspi = false ; } } } else { allsspi = false ; }
if ( domainCount == 0 ) { allsspi = false ; }
2019-04-11 23:41:51 +03:00
for ( var i in config . domains ) {
if ( config . domains [ i ] . yubikey != null ) { yubikey = true ; }
if ( config . domains [ i ] . auth == 'ldap' ) { ldap = true ; }
2020-02-14 22:20:06 +03:00
if ( ( config . domains [ i ] . sessionrecording != null ) && ( config . domains [ i ] . sessionrecording . index == true ) ) { recordingIndex = true ; }
2019-04-11 23:41:51 +03:00
}
2018-05-30 02:57:08 +03:00
2019-11-14 09:47:17 +03:00
// Get the current node version
var nodeVersion = Number ( process . version . match ( /^v(\d+\.\d+)/ ) [ 1 ] ) ;
2018-03-15 01:16:55 +03:00
// Build the list of required modules
2019-05-17 05:32:04 +03:00
var modules = [ 'ws' , 'cbor' , 'nedb' , 'https' , 'yauzl' , 'xmldom' , 'ipcheck' , 'express' , 'archiver' , 'multiparty' , 'node-forge' , 'express-ws' , 'compression' , 'body-parser' , 'connect-redis' , 'cookie-session' , 'express-handlebars' ] ;
2018-05-30 02:57:08 +03:00
if ( require ( 'os' ) . platform ( ) == 'win32' ) { modules . push ( 'node-windows' ) ; if ( sspi == true ) { modules . push ( 'node-sspi' ) ; } } // Add Windows modules
2019-04-11 23:41:51 +03:00
if ( ldap == true ) { modules . push ( 'ldapauth-fork' ) ; }
2020-02-14 22:20:06 +03:00
if ( recordingIndex == true ) { modules . push ( 'image-size' ) ; } // Need to get the remote desktop JPEG sizes to index the recodring file.
2020-03-05 22:18:50 +03:00
if ( config . letsencrypt != null ) {
2020-03-07 01:06:33 +03:00
if ( config . letsencrypt . lib == 'greenlock' ) {
2020-03-05 22:18:50 +03:00
if ( ( nodeVersion < 10 ) || ( require ( 'crypto' ) . generateKeyPair == null ) ) { addServerWarning ( "Let's Encrypt support requires Node v10.12 or higher." , ! args . launch ) ; } else { modules . push ( 'greenlock@4.0.4' ) ; }
2020-03-07 01:06:33 +03:00
} else {
if ( nodeVersion < 8 ) { addServerWarning ( "Let's Encrypt support requires Node v8.x or higher." , ! args . launch ) ; } else { modules . push ( 'acme-client' ) ; }
2020-03-05 22:18:50 +03:00
}
} // Add Greenlock Module or acme-client module
2019-10-05 03:24:30 +03:00
if ( config . settings . mqtt != null ) { modules . push ( 'aedes' ) ; } // Add MQTT Modules
2020-02-04 05:58:58 +03:00
if ( config . settings . mysql != null ) { modules . push ( 'mysql' ) ; } // Add MySQL, official driver.
2019-05-21 04:03:14 +03:00
if ( config . settings . mongodb != null ) { modules . push ( 'mongodb' ) ; } // Add MongoDB, official driver.
2020-02-02 23:37:27 +03:00
if ( config . settings . mariadb != null ) { modules . push ( 'mariadb' ) ; } // Add MariaDB, official driver.
2019-10-14 23:35:27 +03:00
if ( config . settings . vault != null ) { modules . push ( 'node-vault' ) ; } // Add official HashiCorp's Vault module.
2020-01-04 21:49:08 +03:00
if ( config . settings . plugins != null ) { modules . push ( 'semver' ) ; } // Required for version compat testing and update checks
2019-11-26 01:12:43 +03:00
if ( ( config . settings . plugins != null ) && ( config . settings . plugins . proxy != null ) ) { modules . push ( 'https-proxy-agent' ) ; } // Required for HTTP/HTTPS proxy support
2019-05-21 04:03:14 +03:00
else if ( config . settings . xmongodb != null ) { modules . push ( 'mongojs' ) ; } // Add MongoJS, old driver.
2018-03-15 01:16:55 +03:00
if ( config . smtp != null ) { modules . push ( 'nodemailer' ) ; } // Add SMTP support
2020-02-05 03:48:54 +03:00
if ( args . translate ) { modules . push ( 'jsdom' ) ; modules . push ( 'esprima' ) ; modules . push ( 'minify-js' ) ; modules . push ( 'html-minifier' ) ; } // Translation support
2018-03-15 01:16:55 +03:00
2018-11-30 04:59:29 +03:00
// If running NodeJS < 8, install "util.promisify"
2019-03-23 23:28:17 +03:00
if ( nodeVersion < 8 ) { modules . push ( 'util.promisify' ) ; }
2019-05-17 22:40:15 +03:00
// Setup encrypted zip support if needed
if ( config . settings . autobackup && config . settings . autobackup . zippassword ) { modules . push ( 'archiver-zip-encrypted' ) ; }
2019-03-27 00:11:51 +03:00
// Setup 2nd factor authentication
if ( config . settings . no2factorauth !== true ) {
// Setup YubiKey OTP if configured
if ( yubikey == true ) { modules . push ( 'yubikeyotp' ) ; } // Add YubiKey OTP support
2019-05-17 00:55:07 +03:00
if ( allsspi == false ) { modules . push ( 'otplib' ) ; } // Google Authenticator support
2019-03-27 00:11:51 +03:00
}
2019-11-14 09:47:17 +03:00
2018-03-15 01:16:55 +03:00
// Install any missing modules and launch the server
InstallModules ( modules , function ( ) { meshserver = CreateMeshCentralServer ( config , args ) ; meshserver . Start ( ) ; } ) ;
2019-07-18 01:57:42 +03:00
// On exit, also terminate the child process if applicable
process . on ( "exit" , function ( ) { if ( childProcess ) { childProcess . kill ( ) ; childProcess = null ; } } ) ;
// If our parent exits, we also exit
2019-07-18 03:34:34 +03:00
if ( args . launch ) {
process . stderr . on ( 'end' , function ( ) { process . exit ( ) ; } ) ;
process . stdout . on ( 'end' , function ( ) { process . exit ( ) ; } ) ;
process . stdin . on ( 'end' , function ( ) { process . exit ( ) ; } ) ;
process . stdin . on ( 'data' , function ( data ) { } ) ;
}
2018-03-15 01:16:55 +03:00
} ) ;
}
if ( require . main === module ) {
2019-05-18 01:44:01 +03:00
mainStart ( ) ; // Called directly, launch normally.
2018-03-15 01:16:55 +03:00
} else {
module . exports . mainStart = mainStart ; // Required as a module, useful for winservice.js
2019-03-25 21:32:16 +03:00
}