2017-10-24 00:09:58 +03:00
/ * *
2018-01-04 23:15:21 +03:00
* @ description MeshCentral MeshAgent
2017-10-24 00:09:58 +03:00
* @ author Ylian Saint - Hilaire & Bryan Roe
2020-01-04 00:21:23 +03:00
* @ copyright Intel Corporation 2018 - 2020
2018-01-04 23:15:21 +03:00
* @ license Apache - 2.0
2017-10-24 00:09:58 +03:00
* @ version v0 . 0.1
* /
2018-08-30 22:05:23 +03:00
/*jslint node: true */
/*jshint node: true */
/*jshint strict:false */
/*jshint -W097 */
/*jshint esversion: 6 */
"use strict" ;
2018-08-27 22:24:15 +03:00
2017-10-24 00:09:58 +03:00
// Construct a MeshAgent object, called upon connection
2018-10-16 20:52:05 +03:00
module . exports . CreateMeshUser = function ( parent , db , ws , req , args , domain , user ) {
2019-03-10 01:28:08 +03:00
const fs = require ( 'fs' ) ;
const path = require ( 'path' ) ;
const common = parent . common ;
2020-06-27 01:38:48 +03:00
// Cross domain messages, for cross-domain administrators only.
const allowedCrossDomainMessages = [ 'accountcreate' , 'accountremove' , 'accountchange' , 'createusergroup' , 'deleteusergroup' , 'usergroupchange' ] ;
2020-01-22 22:34:17 +03:00
// User Consent Flags
const USERCONSENT _DesktopNotifyUser = 1 ;
const USERCONSENT _TerminalNotifyUser = 2 ;
const USERCONSENT _FilesNotifyUser = 4 ;
const USERCONSENT _DesktopPromptUser = 8 ;
const USERCONSENT _TerminalPromptUser = 16 ;
const USERCONSENT _FilesPromptUser = 32 ;
const USERCONSENT _ShowConnectionToolbar = 64 ;
2019-04-09 21:18:09 +03:00
// Mesh Rights
2020-08-06 06:15:34 +03:00
const MESHRIGHT _EDITMESH = 0x00000001 ;
const MESHRIGHT _MANAGEUSERS = 0x00000002 ;
const MESHRIGHT _MANAGECOMPUTERS = 0x00000004 ;
const MESHRIGHT _REMOTECONTROL = 0x00000008 ;
const MESHRIGHT _AGENTCONSOLE = 0x00000010 ;
const MESHRIGHT _SERVERFILES = 0x00000020 ;
const MESHRIGHT _WAKEDEVICE = 0x00000040 ;
const MESHRIGHT _SETNOTES = 0x00000080 ;
const MESHRIGHT _REMOTEVIEWONLY = 0x00000100 ;
const MESHRIGHT _NOTERMINAL = 0x00000200 ;
const MESHRIGHT _NOFILES = 0x00000400 ;
const MESHRIGHT _NOAMT = 0x00000800 ;
const MESHRIGHT _DESKLIMITEDINPUT = 0x00001000 ;
const MESHRIGHT _LIMITEVENTS = 0x00002000 ;
const MESHRIGHT _CHATNOTIFY = 0x00004000 ;
const MESHRIGHT _UNINSTALL = 0x00008000 ;
const MESHRIGHT _NODESKTOP = 0x00010000 ;
const MESHRIGHT _ADMIN = 0xFFFFFFFF ;
2019-04-09 21:18:09 +03:00
// Site rights
2020-08-06 06:15:34 +03:00
const SITERIGHT _SERVERBACKUP = 0x00000001 ;
const SITERIGHT _MANAGEUSERS = 0x00000002 ;
const SITERIGHT _SERVERRESTORE = 0x00000004 ;
const SITERIGHT _FILEACCESS = 0x00000008 ;
const SITERIGHT _SERVERUPDATE = 0x00000010 ;
const SITERIGHT _LOCKED = 0x00000020 ;
const SITERIGHT _NONEWGROUPS = 0x00000040 ;
const SITERIGHT _NOMESHCMD = 0x00000080 ;
const SITERIGHT _USERGROUPS = 0x00000100 ;
const SITERIGHT _RECORDINGS = 0x00000200 ;
const SITERIGHT _LOCKSETTINGS = 0x00000400 ;
2020-08-18 22:46:20 +03:00
const SITERIGHT _ALLEVENTS = 0x00000800 ;
2020-08-06 06:15:34 +03:00
const SITERIGHT _ADMIN = 0xFFFFFFFF ;
2019-04-09 21:18:09 +03:00
2020-09-09 04:59:58 +03:00
// Events
/ *
var eventsMessageId = {
1 : "Account login" ,
2 : "Account logout" ,
3 : "Changed language from {1} to {2}" ,
4 : "Joined desktop multiplex session" ,
5 : "Left the desktop multiplex session" ,
6 : "Started desktop multiplex session" ,
7 : "Finished recording session, {0} second(s)" ,
8 : "Closed desktop multiplex session, {0} second(s)"
} ;
* /
2017-10-24 00:09:58 +03:00
var obj = { } ;
2018-10-16 20:52:05 +03:00
obj . user = user ;
2017-10-24 00:09:58 +03:00
obj . domain = domain ;
2019-10-24 23:41:35 +03:00
obj . ws = ws ;
2017-10-24 00:09:58 +03:00
2020-05-27 13:35:43 +03:00
// Check if we are a cross-domain administrator
if ( parent . parent . config . settings . managecrossdomain && ( parent . parent . config . settings . managecrossdomain . indexOf ( user . _id ) >= 0 ) ) { obj . crossDomain = true ; }
2019-09-23 21:45:10 +03:00
// Server side Intel AMT stack
const WsmanComm = require ( './amt/amt-wsman-comm.js' ) ;
const Wsman = require ( './amt/amt-wsman.js' ) ;
const Amt = require ( './amt/amt.js' ) ;
2019-09-21 03:21:58 +03:00
2017-10-24 00:09:58 +03:00
// Send a message to the user
2019-03-10 01:28:08 +03:00
//obj.send = function (data) { try { if (typeof data == 'string') { ws.send(Buffer.from(data, 'binary')); } else { ws.send(data); } } catch (e) { } }
2017-10-24 00:09:58 +03:00
2019-09-01 05:40:50 +03:00
// Clean a IPv6 address that encodes a IPv4 address
function cleanRemoteAddr ( addr ) { if ( addr . startsWith ( '::ffff:' ) ) { return addr . substring ( 7 ) ; } else { return addr ; } }
2020-05-07 05:23:11 +03:00
// Send a PING/PONG message
function sendPing ( ) { obj . ws . send ( '{"action":"ping"}' ) ; }
function sendPong ( ) { obj . ws . send ( '{"action":"pong"}' ) ; }
// Setup the agent PING/PONG timers
if ( ( typeof args . browserping == 'number' ) && ( obj . pingtimer == null ) ) { obj . pingtimer = setInterval ( sendPing , args . browserping * 1000 ) ; }
else if ( ( typeof args . browserpong == 'number' ) && ( obj . pongtimer == null ) ) { obj . pongtimer = setInterval ( sendPong , args . browserpong * 1000 ) ; }
2017-10-24 00:09:58 +03:00
// Disconnect this user
obj . close = function ( arg ) {
2019-08-23 01:31:39 +03:00
if ( ( arg == 1 ) || ( arg == null ) ) { try { ws . close ( ) ; parent . parent . debug ( 'user' , 'Soft disconnect' ) ; } catch ( e ) { console . log ( e ) ; } } // Soft close, close the websocket
if ( arg == 2 ) { try { ws . _socket . _parent . end ( ) ; parent . parent . debug ( 'user' , 'Hard disconnect' ) ; } catch ( e ) { console . log ( e ) ; } } // Hard close, close the TCP socket
2019-03-10 01:28:08 +03:00
2020-05-07 05:23:11 +03:00
// Perform timer cleanup
if ( obj . pingtimer ) { clearInterval ( obj . pingtimer ) ; delete obj . pingtimer ; }
if ( obj . pongtimer ) { clearInterval ( obj . pongtimer ) ; delete obj . pongtimer ; }
2019-03-10 01:28:08 +03:00
// Perform cleanup
parent . parent . RemoveAllEventDispatch ( ws ) ;
if ( obj . serverStatsTimer != null ) { clearInterval ( obj . serverStatsTimer ) ; delete obj . serverStatsTimer ; }
if ( req . session && req . session . ws && req . session . ws == ws ) { delete req . session . ws ; }
if ( parent . wssessions2 [ ws . sessionId ] ) { delete parent . wssessions2 [ ws . sessionId ] ; }
2019-06-07 21:10:04 +03:00
if ( ( obj . user != null ) && ( parent . wssessions [ obj . user . _id ] ) ) {
2019-03-12 03:33:24 +03:00
var i = parent . wssessions [ obj . user . _id ] . indexOf ( ws ) ;
2019-03-10 01:28:08 +03:00
if ( i >= 0 ) {
2019-03-12 03:33:24 +03:00
parent . wssessions [ obj . user . _id ] . splice ( i , 1 ) ;
var user = parent . users [ obj . user . _id ] ;
2019-03-10 01:28:08 +03:00
if ( user ) {
if ( parent . parent . multiServer == null ) {
2019-05-04 22:55:46 +03:00
var targets = [ '*' , 'server-users' ] ;
if ( obj . user . groups ) { for ( var i in obj . user . groups ) { targets . push ( 'server-users:' + i ) ; } }
2019-07-30 02:35:48 +03:00
parent . parent . DispatchEvent ( targets , obj , { action : 'wssessioncount' , userid : user . _id , username : user . name , count : parent . wssessions [ obj . user . _id ] . length , nolog : 1 , domain : domain . id } ) ;
2019-03-10 01:28:08 +03:00
} else {
parent . recountSessions ( ws . sessionId ) ; // Recount sessions
}
}
2019-03-12 03:33:24 +03:00
if ( parent . wssessions [ obj . user . _id ] . length == 0 ) { delete parent . wssessions [ obj . user . _id ] ; }
2019-03-10 01:28:08 +03:00
}
}
// If we have peer servers, inform them of the disconnected session
if ( parent . parent . multiServer != null ) { parent . parent . multiServer . DispatchMessage ( { action : 'sessionEnd' , sessionid : ws . sessionId } ) ; }
// Aggressive cleanup
if ( obj . user ) { delete obj . user ; }
if ( obj . domain ) { delete obj . domain ; }
if ( ws . userid ) { delete ws . userid ; }
if ( ws . domainid ) { delete ws . domainid ; }
if ( ws . sessionId ) { delete ws . sessionId ; }
if ( ws . HandleEvent ) { delete ws . HandleEvent ; }
2020-09-09 04:59:58 +03:00
ws . removeAllListeners ( [ 'message' , 'close' , 'error' ] ) ;
2018-08-30 22:05:23 +03:00
} ;
2017-10-24 00:09:58 +03:00
2018-04-04 03:07:48 +03:00
// Convert a mesh path array into a real path on the server side
2018-04-06 02:45:56 +03:00
function meshPathToRealPath ( meshpath , user ) {
2019-03-10 01:28:08 +03:00
if ( common . validateArray ( meshpath , 1 ) == false ) return null ;
2018-04-06 02:45:56 +03:00
var splitid = meshpath [ 0 ] . split ( '/' ) ;
if ( splitid [ 0 ] == 'user' ) {
// Check user access
if ( meshpath [ 0 ] != user . _id ) return null ; // Only allow own user folder
} else if ( splitid [ 0 ] == 'mesh' ) {
// Check mesh access
2019-12-27 09:53:01 +03:00
if ( ( parent . GetMeshRights ( user , meshpath [ 0 ] ) & MESHRIGHT _SERVERFILES ) == 0 ) return null ; // This user must have mesh rights to "server files"
2018-04-06 02:45:56 +03:00
} else return null ;
2018-04-04 03:07:48 +03:00
var rootfolder = meshpath [ 0 ] , rootfoldersplit = rootfolder . split ( '/' ) , domainx = 'domain' ;
if ( rootfoldersplit [ 1 ] . length > 0 ) domainx = 'domain-' + rootfoldersplit [ 1 ] ;
2019-10-31 00:30:34 +03:00
var path = parent . path . join ( parent . filespath , domainx , rootfoldersplit [ 0 ] + '-' + rootfoldersplit [ 2 ] ) ;
2019-03-10 01:28:08 +03:00
for ( var i = 1 ; i < meshpath . length ; i ++ ) { if ( common . IsFilenameValid ( meshpath [ i ] ) == false ) { path = null ; break ; } path += ( "/" + meshpath [ i ] ) ; }
2018-04-04 03:07:48 +03:00
return path ;
}
2019-10-31 00:30:34 +03:00
// Copy a file using the best technique available
2018-04-04 03:07:48 +03:00
function copyFile ( src , dest , func , tag ) {
2019-10-31 00:30:34 +03:00
if ( fs . copyFile ) {
// NodeJS v8.5 and higher
fs . copyFile ( src , dest , function ( err ) { func ( tag ) ; } )
} else {
// Older NodeJS
try {
var ss = fs . createReadStream ( src ) , ds = fs . createWriteStream ( dest ) ;
ss . on ( 'error' , function ( ) { func ( tag ) ; } ) ;
ds . on ( 'error' , function ( ) { func ( tag ) ; } ) ;
ss . pipe ( ds ) ;
ds . ss = ss ;
if ( arguments . length == 3 && typeof arguments [ 2 ] === 'function' ) { ds . on ( 'close' , arguments [ 2 ] ) ; }
else if ( arguments . length == 4 && typeof arguments [ 3 ] === 'function' ) { ds . on ( 'close' , arguments [ 3 ] ) ; }
ds . on ( 'close' , function ( ) { func ( tag ) ; } ) ;
} catch ( ex ) { }
}
2018-08-30 22:05:23 +03:00
}
2018-04-04 03:07:48 +03:00
2018-12-08 03:36:27 +03:00
// Route a command to a target node
2020-07-14 21:53:22 +03:00
function routeCommandToNode ( command , requiredRights , requiredNonRights , func ) {
2020-07-14 01:06:45 +03:00
if ( common . validateString ( command . nodeid , 8 , 128 ) == false ) { if ( func ) { func ( false ) ; } return false ; }
2018-12-08 03:36:27 +03:00
var splitnodeid = command . nodeid . split ( '/' ) ;
// Check that we are in the same domain and the user has rights over this node.
if ( ( splitnodeid [ 0 ] == 'node' ) && ( splitnodeid [ 1 ] == domain . id ) ) {
// See if the node is connected
2019-03-10 01:28:08 +03:00
var agent = parent . wsagents [ command . nodeid ] ;
2018-12-08 03:36:27 +03:00
if ( agent != null ) {
// Check if we have permission to send a message to that node
2020-04-13 00:05:34 +03:00
parent . GetNodeWithRights ( domain , user , agent . dbNodeKey , function ( node , rights , visible ) {
var mesh = parent . meshes [ agent . dbMeshKey ] ;
if ( ( node != null ) && ( mesh != null ) && ( ( rights & MESHRIGHT _REMOTECONTROL ) || ( rights & MESHRIGHT _REMOTEVIEWONLY ) ) ) { // 8 is remote control permission, 256 is desktop read only
2020-07-14 21:53:22 +03:00
if ( ( requiredRights != null ) && ( ( rights & requiredRights ) == 0 ) ) { if ( func ) { func ( false ) ; return ; } } // Check Required Rights
if ( ( requiredNonRights != null ) && ( rights != MESHRIGHT _ADMIN ) && ( ( rights & requiredNonRights ) != 0 ) ) { if ( func ) { func ( false ) ; return ; } } // Check Required None Rights
2020-04-13 00:05:34 +03:00
command . sessionid = ws . sessionId ; // Set the session id, required for responses
command . rights = rights ; // Add user rights flags to the message
command . consent = 0 ;
if ( typeof domain . userconsentflags == 'number' ) { command . consent |= domain . userconsentflags ; } // Add server required consent flags
if ( typeof mesh . consent == 'number' ) { command . consent |= mesh . consent ; } // Add device group user consent
if ( typeof node . consent == 'number' ) { command . consent |= node . consent ; } // Add node user consent
if ( typeof user . consent == 'number' ) { command . consent |= user . consent ; } // Add user consent
command . username = user . name ; // Add user name
2020-07-10 20:33:41 +03:00
command . realname = user . realname ; // Add real name
2020-04-13 00:05:34 +03:00
command . userid = user . _id ; // Add user id
2020-07-10 20:33:41 +03:00
command . remoteaddr = req . clientIp ; // User's IP address
2020-04-13 00:05:34 +03:00
if ( typeof domain . desktopprivacybartext == 'string' ) { command . privacybartext = domain . desktopprivacybartext ; } // Privacy bar text
delete command . nodeid ; // Remove the nodeid since it's implied
try { agent . send ( JSON . stringify ( command ) ) ; } catch ( ex ) { }
2020-07-14 01:06:45 +03:00
} else { if ( func ) { func ( false ) ; } }
2020-04-13 00:05:34 +03:00
} ) ;
2018-12-08 03:36:27 +03:00
} else {
// Check if a peer server is connected to this agent
2019-03-10 01:28:08 +03:00
var routing = parent . parent . GetRoutingServerId ( command . nodeid , 1 ) ; // 1 = MeshAgent routing type
2018-12-08 03:36:27 +03:00
if ( routing != null ) {
// Check if we have permission to send a message to that node
2020-04-13 00:05:34 +03:00
parent . GetNodeWithRights ( domain , user , agent . dbNodeKey , function ( node , rights , visible ) {
2020-07-14 21:53:22 +03:00
if ( ( requiredRights != null ) && ( ( rights & requiredRights ) == 0 ) ) { if ( func ) { func ( false ) ; return ; } } // Check Required Rights
if ( ( requiredNonRights != null ) && ( rights != MESHRIGHT _ADMIN ) && ( ( rights & requiredNonRights ) != 0 ) ) { if ( func ) { func ( false ) ; return ; } } // Check Required None Rights
2020-04-13 00:05:34 +03:00
var mesh = parent . meshes [ routing . meshid ] ;
if ( ( node != null ) && ( mesh != null ) && ( ( rights & MESHRIGHT _REMOTECONTROL ) || ( rights & MESHRIGHT _REMOTEVIEWONLY ) ) ) { // 8 is remote control permission
command . fromSessionid = ws . sessionId ; // Set the session id, required for responses
command . rights = rights ; // Add user rights flags to the message
command . consent = 0 ;
if ( typeof domain . userconsentflags == 'number' ) { command . consent |= domain . userconsentflags ; } // Add server required consent flags
if ( typeof mesh . consent == 'number' ) { command . consent |= mesh . consent ; } // Add device group user consent
if ( typeof node . consent == 'number' ) { command . consent |= node . consent ; } // Add node user consent
if ( typeof user . consent == 'number' ) { command . consent |= user . consent ; } // Add user consent
command . username = user . name ; // Add user name
2020-07-10 20:33:41 +03:00
command . realname = user . realname ; // Add real name
2020-04-13 00:05:34 +03:00
command . userid = user . _id ; // Add user id
2020-07-10 20:33:41 +03:00
command . remoteaddr = req . clientIp ; // User's IP address
2020-04-13 00:05:34 +03:00
if ( typeof domain . desktopprivacybartext == 'string' ) { command . privacybartext = domain . desktopprivacybartext ; } // Privacy bar text
parent . parent . multiServer . DispatchMessageSingleServer ( command , routing . serverid ) ;
2020-07-14 01:06:45 +03:00
} else { if ( func ) { func ( false ) ; } }
2020-04-13 00:05:34 +03:00
} ) ;
2020-07-14 01:06:45 +03:00
} else { if ( func ) { func ( false ) ; } return false ; }
2018-12-08 03:36:27 +03:00
}
2020-07-14 01:06:45 +03:00
} else { if ( func ) { func ( false ) ; } return false ; }
2020-08-18 01:01:25 +03:00
if ( func ) { func ( true ) ; }
2018-12-08 03:36:27 +03:00
return true ;
}
2019-02-08 02:00:10 +03:00
// Route a command to all targets in a mesh
function routeCommandToMesh ( meshid , command ) {
// Send the request to all peer servers
// TODO !!!!
// See if the node is connected
2019-03-10 01:28:08 +03:00
for ( var nodeid in parent . wsagents ) {
var agent = parent . wsagents [ nodeid ] ;
2019-02-08 02:00:10 +03:00
if ( agent . dbMeshKey == meshid ) { try { agent . send ( JSON . stringify ( command ) ) ; } catch ( ex ) { } }
}
return true ;
}
2017-10-24 00:09:58 +03:00
try {
// Check if the user is logged in
2019-03-10 01:28:08 +03:00
if ( user == null ) { try { ws . close ( ) ; } catch ( e ) { } return ; }
2017-10-24 00:09:58 +03:00
2019-02-12 01:41:15 +03:00
// Check if we have exceeded the user session limit
2019-02-13 06:23:40 +03:00
if ( ( typeof domain . limits . maxusersessions == 'number' ) || ( typeof domain . limits . maxsingleusersessions == 'number' ) ) {
2019-02-12 01:41:15 +03:00
// Count the number of user sessions for this domain
2019-02-13 06:23:40 +03:00
var domainUserSessionCount = 0 , selfUserSessionCount = 0 ;
2019-03-10 01:28:08 +03:00
for ( var i in parent . wssessions2 ) {
if ( parent . wssessions2 [ i ] . domainid == domain . id ) {
domainUserSessionCount ++ ; if ( parent . wssessions2 [ i ] . userid == user . _id ) { selfUserSessionCount ++ ; }
}
}
2019-02-12 01:41:15 +03:00
// Check if we have too many user sessions
2019-02-13 06:23:40 +03:00
if ( ( ( typeof domain . limits . maxusersessions == 'number' ) && ( domainUserSessionCount >= domain . limits . maxusersessions ) ) || ( ( typeof domain . limits . maxsingleusersessions == 'number' ) && ( selfUserSessionCount >= domain . limits . maxsingleusersessions ) ) ) {
2019-02-12 01:41:15 +03:00
ws . send ( JSON . stringify ( { action : 'stopped' , msg : 'Session count exceed' } ) ) ;
2019-03-10 01:28:08 +03:00
try { ws . close ( ) ; } catch ( e ) { }
2019-02-12 01:41:15 +03:00
return ;
}
}
2018-10-16 20:52:05 +03:00
// Associate this websocket session with the web session
2019-03-12 03:33:24 +03:00
ws . userid = user . _id ;
2019-03-10 01:28:08 +03:00
ws . domainid = domain . id ;
2018-10-16 20:52:05 +03:00
2019-01-05 04:59:13 +03:00
// Create a new session id for this user.
2019-03-10 01:28:08 +03:00
parent . crypto . randomBytes ( 20 , function ( err , randombuf ) {
ws . sessionId = user . _id + '/' + randombuf . toString ( 'hex' ) ;
2019-01-05 04:59:13 +03:00
// Add this web socket session to session list
2019-03-10 01:28:08 +03:00
parent . wssessions2 [ ws . sessionId ] = ws ;
if ( ! parent . wssessions [ user . _id ] ) { parent . wssessions [ user . _id ] = [ ws ] ; } else { parent . wssessions [ user . _id ] . push ( ws ) ; }
if ( parent . parent . multiServer == null ) {
2019-05-04 22:55:46 +03:00
var targets = [ '*' , 'server-users' ] ;
if ( obj . user . groups ) { for ( var i in obj . user . groups ) { targets . push ( 'server-users:' + i ) ; } }
2019-07-30 02:35:48 +03:00
parent . parent . DispatchEvent ( targets , obj , { action : 'wssessioncount' , userid : user . _id , username : user . name , count : parent . wssessions [ user . _id ] . length , nolog : 1 , domain : domain . id } ) ;
2019-01-05 04:59:13 +03:00
} else {
2019-03-10 01:28:08 +03:00
parent . recountSessions ( ws . sessionId ) ; // Recount sessions
2019-01-05 04:59:13 +03:00
}
2017-10-24 00:09:58 +03:00
2019-01-05 04:59:13 +03:00
// If we have peer servers, inform them of the new session
2019-03-10 01:28:08 +03:00
if ( parent . parent . multiServer != null ) { parent . parent . multiServer . DispatchMessage ( { action : 'sessionStart' , sessionid : ws . sessionId } ) ; }
2019-01-05 04:59:13 +03:00
// Handle events
2019-09-19 21:21:35 +03:00
ws . HandleEvent = function ( source , event , ids , id ) {
2020-06-27 01:38:48 +03:00
// Normally, only allow this user to receive messages from it's own domain.
// If the user is a cross domain administrator, allow some select messages from different domains.
if ( ( event . domain == null ) || ( event . domain == domain . id ) || ( ( obj . crossDomain === true ) && ( allowedCrossDomainMessages . indexOf ( event . action ) >= 0 ) ) ) {
2019-01-05 04:59:13 +03:00
try {
if ( event == 'close' ) { try { delete req . session ; } catch ( ex ) { } obj . close ( ) ; }
2019-03-10 01:28:08 +03:00
else if ( event == 'resubscribe' ) { user . subscriptions = parent . subscribe ( user . _id , ws ) ; }
2019-01-05 04:59:13 +03:00
else if ( event == 'updatefiles' ) { updateUserFiles ( user , ws , domain ) ; }
2019-09-19 21:21:35 +03:00
else {
// Because of the device group "Show Self Events Only", we need to do more checks here.
if ( id . startsWith ( 'mesh/' ) ) {
// Check if we have rights to get this message. If we have limited events on this mesh, don't send the event to the user.
2019-12-27 09:53:01 +03:00
var meshrights = parent . GetMeshRights ( user , id ) ;
2020-07-06 22:46:38 +03:00
if ( ( meshrights === MESHRIGHT _ADMIN ) || ( ( meshrights & MESHRIGHT _LIMITEVENTS ) == 0 ) || ( ids . indexOf ( user . _id ) >= 0 ) ) {
2019-09-19 21:21:35 +03:00
// We have the device group rights to see this event or we are directly targetted by the event
ws . send ( JSON . stringify ( { action : 'event' , event : event } ) ) ;
} else {
// Check if no other users are targeted by the event, if not, we can get this event.
var userTarget = false ;
for ( var i in ids ) { if ( ids [ i ] . startsWith ( 'user/' ) ) { userTarget = true ; } }
if ( userTarget == false ) { ws . send ( JSON . stringify ( { action : 'event' , event : event } ) ) ; }
}
2020-01-06 22:22:54 +03:00
} else if ( event . ugrpid != null ) {
if ( ( user . siteadmin & SITERIGHT _USERGROUPS ) != 0 ) {
// If we have the rights to see users in a group, send the group as is.
ws . send ( JSON . stringify ( { action : 'event' , event : event } ) ) ;
} else {
2020-04-18 01:02:53 +03:00
// We don't have the rights to see otehr users in the user group, remove the links that are not for ourselves.
var links = { } ;
if ( event . links ) { for ( var i in event . links ) { if ( ( i == user . _id ) || i . startsWith ( 'mesh/' ) || i . startsWith ( 'node/' ) ) { links [ i ] = event . links [ i ] ; } } }
ws . send ( JSON . stringify ( { action : 'event' , event : { ugrpid : event . ugrpid , domain : event . domain , time : event . time , name : event . name , action : event . action , username : event . username , links : links , h : event . h } } ) ) ;
2020-01-06 22:22:54 +03:00
}
2019-09-19 21:21:35 +03:00
} else {
// This is not a device group event, we can get this event.
ws . send ( JSON . stringify ( { action : 'event' , event : event } ) ) ;
}
}
2019-01-05 04:59:13 +03:00
} catch ( e ) { }
}
} ;
2019-03-10 01:28:08 +03:00
user . subscriptions = parent . subscribe ( user . _id , ws ) ; // Subscribe to events
try { ws . _socket . setKeepAlive ( true , 240000 ) ; } catch ( ex ) { } // Set TCP keep alive
2019-01-05 04:59:13 +03:00
// Send current server statistics
obj . SendServerStats = function ( ) {
2019-05-21 02:00:33 +03:00
// Take a look at server stats
2019-02-16 23:56:33 +03:00
var os = require ( 'os' ) ;
var stats = { action : 'serverstats' , totalmem : os . totalmem ( ) , freemem : os . freemem ( ) } ;
2020-08-16 22:18:47 +03:00
if ( parent . parent . platform != 'win32' ) {
stats . cpuavg = os . loadavg ( ) ;
try { stats . availablemem = 1024 * Number ( /MemAvailable:[ ]+(\d+)/ . exec ( fs . readFileSync ( '/proc/meminfo' , 'utf8' ) ) [ 1 ] ) ; } catch ( ex ) { }
}
2020-05-16 01:39:16 +03:00
// Count the number of device groups that are not deleted
var activeDeviceGroups = 0 ;
for ( var i in parent . meshes ) { if ( parent . meshes [ i ] . deleted == null ) { activeDeviceGroups ++ ; } } // This is not ideal for performance, we want to dome something better.
2019-02-19 04:14:00 +03:00
var serverStats = {
2019-12-24 01:25:27 +03:00
UserAccounts : Object . keys ( parent . users ) . length ,
2020-05-16 01:39:16 +03:00
DeviceGroups : activeDeviceGroups ,
2019-12-24 01:25:27 +03:00
AgentSessions : Object . keys ( parent . wsagents ) . length ,
ConnectedUsers : Object . keys ( parent . wssessions ) . length ,
UsersSessions : Object . keys ( parent . wssessions2 ) . length ,
RelaySessions : parent . relaySessionCount ,
RelayCount : Object . keys ( parent . wsrelays ) . length
2019-02-19 04:14:00 +03:00
} ;
2019-12-24 01:25:27 +03:00
if ( parent . relaySessionErrorCount != 0 ) { serverStats . RelayErrors = parent . relaySessionErrorCount ; }
if ( parent . parent . mpsserver != null ) { serverStats . ConnectedIntelAMT = Object . keys ( parent . parent . mpsserver . ciraConnections ) . length ; }
2019-05-21 02:00:33 +03:00
// Take a look at agent errors
var agentstats = parent . getAgentStats ( ) ;
var errorCounters = { } , errorCountersCount = 0 ;
2019-12-24 01:25:27 +03:00
if ( agentstats . meshDoesNotExistCount > 0 ) { errorCountersCount ++ ; errorCounters . UnknownGroup = agentstats . meshDoesNotExistCount ; }
if ( agentstats . invalidPkcsSignatureCount > 0 ) { errorCountersCount ++ ; errorCounters . InvalidPKCSsignature = agentstats . invalidPkcsSignatureCount ; }
if ( agentstats . invalidRsaSignatureCount > 0 ) { errorCountersCount ++ ; errorCounters . InvalidRSAsiguature = agentstats . invalidRsaSignatureCount ; }
if ( agentstats . invalidJsonCount > 0 ) { errorCountersCount ++ ; errorCounters . InvalidJSON = agentstats . invalidJsonCount ; }
if ( agentstats . unknownAgentActionCount > 0 ) { errorCountersCount ++ ; errorCounters . UnknownAction = agentstats . unknownAgentActionCount ; }
if ( agentstats . agentBadWebCertHashCount > 0 ) { errorCountersCount ++ ; errorCounters . BadWebCertificate = agentstats . agentBadWebCertHashCount ; }
if ( ( agentstats . agentBadSignature1Count + agentstats . agentBadSignature2Count ) > 0 ) { errorCountersCount ++ ; errorCounters . BadSignature = ( agentstats . agentBadSignature1Count + agentstats . agentBadSignature2Count ) ; }
if ( agentstats . agentMaxSessionHoldCount > 0 ) { errorCountersCount ++ ; errorCounters . MaxSessionsReached = agentstats . agentMaxSessionHoldCount ; }
if ( ( agentstats . invalidDomainMeshCount + agentstats . invalidDomainMesh2Count ) > 0 ) { errorCountersCount ++ ; errorCounters . UnknownDeviceGroup = ( agentstats . invalidDomainMeshCount + agentstats . invalidDomainMesh2Count ) ; }
if ( ( agentstats . invalidMeshTypeCount + agentstats . invalidMeshType2Count ) > 0 ) { errorCountersCount ++ ; errorCounters . InvalidDeviceGroupType = ( agentstats . invalidMeshTypeCount + agentstats . invalidMeshType2Count ) ; }
//if (agentstats.duplicateAgentCount > 0) { errorCountersCount++; errorCounters.DuplicateAgent = agentstats.duplicateAgentCount; }
2019-05-21 02:00:33 +03:00
// Send out the stats
2019-12-24 01:25:27 +03:00
stats . values = { ServerState : serverStats }
if ( errorCountersCount > 0 ) { stats . values . AgentErrorCounters = errorCounters ; }
2019-02-16 23:56:33 +03:00
try { ws . send ( JSON . stringify ( stats ) ) ; } catch ( ex ) { }
2017-10-24 00:09:58 +03:00
}
2018-09-27 00:58:55 +03:00
2019-01-05 04:59:13 +03:00
// When data is received from the web socket
ws . on ( 'message' , processWebSocketData ) ;
// If error, do nothing
2019-03-10 01:28:08 +03:00
ws . on ( 'error' , function ( err ) { console . log ( err ) ; obj . close ( 0 ) ; } ) ;
2019-01-05 04:59:13 +03:00
// If the web socket is closed
2019-03-10 01:28:08 +03:00
ws . on ( 'close' , function ( req ) { obj . close ( 0 ) ; } ) ;
2019-01-05 04:59:13 +03:00
// Figure out the MPS port, use the alias if set
2019-03-10 01:28:08 +03:00
var mpsport = ( ( args . mpsaliasport != null ) ? args . mpsaliasport : args . mpsport ) ;
var httpport = ( ( args . aliasport != null ) ? args . aliasport : args . port ) ;
2019-01-05 04:59:13 +03:00
// Build server information object
2020-08-21 00:24:50 +03:00
var serverinfo = { domain : domain . id , name : domain . dns ? domain . dns : parent . certificates . CommonName , mpsname : parent . certificates . AmtMpsName , mpsport : mpsport , mpspass : args . mpspass , port : httpport , emailcheck : ( ( parent . parent . mailserver != null ) && ( domain . auth != 'sspi' ) && ( domain . auth != 'ldap' ) && ( args . lanonly != true ) && ( parent . certificates . CommonName != null ) && ( parent . certificates . CommonName . indexOf ( '.' ) != - 1 ) && ( user . _id . split ( '/' ) [ 2 ] . startsWith ( '~' ) == false ) ) , domainauth : ( domain . auth == 'sspi' ) , serverTime : Date . now ( ) } ;
2020-09-12 02:35:47 +03:00
serverinfo . maxGuestSessionSharingTime = ( typeof domain . maxguestsessionsharingtime == 'number' ) ? domain . maxguestsessionsharingtime : 60 ;
2019-10-22 21:59:19 +03:00
serverinfo . languages = parent . renderLanguages ;
2019-06-23 08:06:50 +03:00
serverinfo . tlshash = Buffer . from ( parent . webCertificateHashs [ domain . id ] , 'binary' ) . toString ( 'hex' ) . toUpperCase ( ) ; // SHA384 of server HTTPS certificate
if ( ( parent . parent . config . domains [ domain . id ] . amtacmactivation != null ) && ( parent . parent . config . domains [ domain . id ] . amtacmactivation . acmmatch != null ) ) {
var matchingDomains = [ ] ;
for ( var i in parent . parent . config . domains [ domain . id ] . amtacmactivation . acmmatch ) {
var cn = parent . parent . config . domains [ domain . id ] . amtacmactivation . acmmatch [ i ] . cn ;
if ( ( cn != '*' ) && ( matchingDomains . indexOf ( cn ) == - 1 ) ) { matchingDomains . push ( cn ) ; }
}
if ( matchingDomains . length > 0 ) { serverinfo . amtAcmFqdn = matchingDomains ; }
}
2019-03-10 01:28:08 +03:00
if ( args . notls == true ) { serverinfo . https = false ; } else { serverinfo . https = true ; serverinfo . redirport = args . redirport ; }
2019-04-13 00:19:03 +03:00
if ( typeof domain . userconsentflags == 'number' ) { serverinfo . consent = domain . userconsentflags ; }
2019-05-31 19:58:23 +03:00
if ( ( typeof domain . usersessionidletimeout == 'number' ) && ( domain . usersessionidletimeout > 0 ) ) { serverinfo . timeout = ( domain . usersessionidletimeout * 60 * 1000 ) ; }
2020-07-06 22:46:38 +03:00
if ( user . siteadmin === SITERIGHT _ADMIN ) {
2020-05-28 01:31:10 +03:00
if ( parent . parent . config . settings . managealldevicegroups . indexOf ( user . _id ) >= 0 ) { serverinfo . manageAllDeviceGroups = true ; }
if ( obj . crossDomain === true ) { serverinfo . crossDomain = [ ] ; for ( var i in parent . parent . config . domains ) { serverinfo . crossDomain . push ( i ) ; } }
}
2019-01-05 04:59:13 +03:00
// Send server information
try { ws . send ( JSON . stringify ( { action : 'serverinfo' , serverinfo : serverinfo } ) ) ; } catch ( ex ) { }
// Send user information to web socket, this is the first thing we send
2020-05-28 01:31:10 +03:00
try { ws . send ( JSON . stringify ( { action : 'userinfo' , userinfo : parent . CloneSafeUser ( parent . users [ user . _id ] ) } ) ) ; } catch ( ex ) { }
2019-01-05 04:59:13 +03:00
2020-07-06 22:46:38 +03:00
if ( user . siteadmin === SITERIGHT _ADMIN ) {
2019-11-27 01:11:09 +03:00
// Send server tracing information
2019-08-23 01:31:39 +03:00
try { ws . send ( JSON . stringify ( { action : 'traceinfo' , traceSources : parent . parent . debugRemoteSources } ) ) ; } catch ( ex ) { }
2019-11-27 01:11:09 +03:00
// Send any server warnings if any
var serverWarnings = parent . parent . getServerWarnings ( ) ;
if ( serverWarnings . length > 0 ) { try { ws . send ( JSON . stringify ( { action : 'serverwarnings' , warnings : serverWarnings } ) ) ; } catch ( ex ) { } }
2019-08-23 01:31:39 +03:00
}
2019-11-18 03:20:53 +03:00
// See how many times bad login attempts where made since the last login
const lastLoginTime = parent . users [ user . _id ] . pastlogin ;
if ( lastLoginTime != null ) {
db . GetFailedLoginCount ( user . name , user . domain , new Date ( lastLoginTime * 1000 ) , function ( count ) {
2020-01-07 22:08:32 +03:00
if ( count > 0 ) { try { ws . send ( JSON . stringify ( { action : 'msg' , type : 'notify' , title : "Security Warning" , tag : 'ServerNotify' , id : Math . random ( ) , value : "There has been " + count + " failed login attempts on this account since the last login." } ) ) ; } catch ( ex ) { } delete user . pastlogin ; }
2019-11-18 03:20:53 +03:00
} ) ;
}
2020-08-21 11:57:03 +03:00
// If we are site administrator and Google Drive backup is setup, send out the status.
2020-08-21 21:47:34 +03:00
if ( ( user . siteadmin === SITERIGHT _ADMIN ) && ( domain . id == '' ) && ( typeof parent . parent . config . settings . autobackup == 'object' ) && ( typeof parent . parent . config . settings . autobackup . googledrive == 'object' ) ) {
2020-08-21 11:57:03 +03:00
db . Get ( 'GoogleDriveBackup' , function ( err , docs ) {
if ( err != null ) return ;
if ( docs . length == 0 ) { try { ws . send ( JSON . stringify ( { action : 'serverBackup' , service : 'googleDrive' , state : 1 } ) ) ; } catch ( ex ) { } }
else { try { ws . send ( JSON . stringify ( { action : 'serverBackup' , service : 'googleDrive' , state : docs [ 0 ] . state } ) ) ; } catch ( ex ) { } }
} ) ;
}
2019-01-05 04:59:13 +03:00
// We are all set, start receiving data
ws . _socket . resume ( ) ;
2019-12-26 18:55:03 +03:00
if ( parent . parent . pluginHandler != null ) parent . parent . pluginHandler . callHook ( 'hook_userLoggedIn' , user ) ;
2019-01-05 04:59:13 +03:00
} ) ;
} catch ( e ) { console . log ( e ) ; }
// Process incoming web socket data from the browser
function processWebSocketData ( msg ) {
var command , i = 0 , mesh = null , meshid = null , nodeid = null , meshlinks = null , change = 0 ;
try { command = JSON . parse ( msg . toString ( 'utf8' ) ) ; } catch ( e ) { return ; }
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . action , 3 , 32 ) == false ) return ; // Action must be a string between 3 and 32 chars
2019-01-05 04:59:13 +03:00
switch ( command . action ) {
2020-05-07 05:23:11 +03:00
case 'pong' : { break ; } // NOP
2020-05-07 09:23:27 +03:00
case 'ping' : { try { ws . send ( '{action:"pong"}' ) ; } catch ( ex ) { } break ; }
2020-01-07 22:08:32 +03:00
case 'intersession' :
{
// Sends data between sessions of the same user
var sessions = parent . wssessions [ obj . user . _id ] ;
if ( sessions == null ) break ;
// Create the notification message and send on all sessions except our own (no echo back).
var notification = JSON . stringify ( command ) ;
for ( var i in sessions ) { if ( sessions [ i ] != obj . ws ) { try { sessions [ i ] . send ( notification ) ; } catch ( ex ) { } } }
// TODO: Send the message of user sessions connected to other servers.
break ;
}
2019-01-30 01:08:29 +03:00
case 'authcookie' :
{
// Renew the authentication cookie
2019-10-16 01:50:11 +03:00
try {
ws . send ( JSON . stringify ( {
action : 'authcookie' ,
2020-05-22 07:25:11 +03:00
cookie : parent . parent . encodeCookie ( { userid : user . _id , domainid : domain . id , ip : req . clientIp } , parent . parent . loginCookieEncryptionKey ) ,
2019-10-16 01:50:11 +03:00
rcookie : parent . parent . encodeCookie ( { ruserid : user . _id } , parent . parent . loginCookieEncryptionKey )
} ) ) ;
} catch ( ex ) { }
2019-01-30 01:08:29 +03:00
break ;
}
2019-04-23 23:42:54 +03:00
case 'logincookie' :
{
2019-04-27 21:53:06 +03:00
// If allowed, return a login cookie
if ( parent . parent . config . settings . allowlogintoken === true ) {
try { ws . send ( JSON . stringify ( { action : 'logincookie' , cookie : parent . parent . encodeCookie ( { u : user . _id , a : 3 } , parent . parent . loginCookieEncryptionKey ) } ) ) ; } catch ( ex ) { }
}
2019-04-23 23:42:54 +03:00
break ;
}
2019-03-26 05:59:04 +03:00
case 'servertimelinestats' :
{
if ( ( user . siteadmin & 21 ) == 0 ) return ; // Only site administrators with "site backup" or "site restore" or "site update" permissions can use this.
if ( common . validateInt ( command . hours , 0 , 24 * 30 ) == false ) return ;
db . GetServerStats ( command . hours , function ( err , docs ) {
2019-12-19 23:10:50 +03:00
if ( err == null ) {
try { ws . send ( JSON . stringify ( { action : 'servertimelinestats' , events : docs } ) ) ; } catch ( ex ) { }
}
2019-03-26 05:59:04 +03:00
} ) ;
break ;
}
2019-01-05 04:59:13 +03:00
case 'serverstats' :
{
2019-03-26 05:59:04 +03:00
if ( ( user . siteadmin & 21 ) == 0 ) return ; // Only site administrators with "site backup" or "site restore" or "site update" permissions can use this.
if ( common . validateInt ( command . interval , 1000 , 1000000 ) == false ) {
// Clear the timer
if ( obj . serverStatsTimer != null ) { clearInterval ( obj . serverStatsTimer ) ; delete obj . serverStatsTimer ; }
} else {
// Set the timer
obj . SendServerStats ( ) ;
obj . serverStatsTimer = setInterval ( obj . SendServerStats , command . interval ) ;
2019-01-05 04:59:13 +03:00
}
break ;
}
case 'meshes' :
{
// Request a list of all meshes this user as rights to
2019-12-27 09:53:01 +03:00
try { ws . send ( JSON . stringify ( { action : 'meshes' , meshes : parent . GetAllMeshWithRights ( user ) . map ( parent . CloneSafeMesh ) , tag : command . tag } ) ) ; } catch ( ex ) { }
2019-01-05 04:59:13 +03:00
break ;
}
case 'nodes' :
{
2020-03-30 08:40:13 +03:00
var links = [ ] , extraids = null , err = null ;
2020-04-16 23:18:45 +03:00
// Resolve the device group name if needed
if ( ( typeof command . meshname == 'string' ) && ( command . meshid == null ) ) {
for ( var i in parent . meshes ) {
var m = parent . meshes [ i ] ;
if ( ( m . mtype == 2 ) && ( m . name == command . meshname ) && parent . IsMeshViewable ( user , m ) ) {
if ( command . meshid == null ) { command . meshid = m . _id ; } else { err = 'Duplicate device groups found' ; }
}
}
if ( command . meshid == null ) { err = 'Invalid group id' ; }
}
if ( err == null ) {
try {
if ( command . meshid == null ) {
// Request a list of all meshes this user as rights to
links = parent . GetAllMeshIdWithRights ( user ) ;
// Add any nodes with direct rights or any nodes with user group direct rights
if ( obj . user . links != null ) {
for ( var i in obj . user . links ) {
if ( i . startsWith ( 'node/' ) ) { if ( extraids == null ) { extraids = [ ] ; } extraids . push ( i ) ; }
else if ( i . startsWith ( 'ugrp/' ) ) {
const g = parent . userGroups [ i ] ;
if ( ( g != null ) && ( g . links != null ) ) {
for ( var j in g . links ) { if ( j . startsWith ( 'node/' ) ) { if ( extraids == null ) { extraids = [ ] ; } extraids . push ( j ) ; } }
}
2020-04-13 20:50:57 +03:00
}
}
}
2020-04-16 23:18:45 +03:00
} else {
// Request list of all nodes for one specific meshid
meshid = command . meshid ;
if ( common . validateString ( meshid , 0 , 128 ) == false ) { err = 'Invalid group id' ; } else {
if ( meshid . split ( '/' ) . length == 1 ) { meshid = 'mesh/' + domain . id + '/' + command . meshid ; }
if ( parent . IsMeshViewable ( user , meshid ) ) { links . push ( meshid ) ; } else { err = 'Invalid group id' ; }
}
2020-04-13 20:50:57 +03:00
}
2020-04-16 23:18:45 +03:00
} catch ( ex ) { err = 'Validation exception: ' + ex ; }
}
2019-07-05 23:28:41 +03:00
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'nodes' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
2019-01-05 04:59:13 +03:00
}
2017-10-24 00:09:58 +03:00
2019-01-05 04:59:13 +03:00
// Request a list of all nodes
2020-03-30 08:40:13 +03:00
db . GetAllTypeNoTypeFieldMeshFiltered ( links , extraids , domain . id , 'node' , command . id , function ( err , docs ) {
2019-05-21 04:03:14 +03:00
if ( docs == null ) { docs = [ ] ; }
2019-01-05 04:59:13 +03:00
var r = { } ;
for ( i in docs ) {
2020-03-31 03:47:04 +03:00
// Check device links, if a link points to an unknown user, remove it.
parent . cleanDevice ( docs [ i ] ) ;
2019-04-10 20:41:10 +03:00
// Remove any connectivity and power state information, that should not be in the database anyway.
2020-03-31 05:29:46 +03:00
// TODO: Find why these are sometimes saved in the db.
2019-04-10 20:41:10 +03:00
if ( docs [ i ] . conn != null ) { delete docs [ i ] . conn ; }
if ( docs [ i ] . pwr != null ) { delete docs [ i ] . pwr ; }
if ( docs [ i ] . agct != null ) { delete docs [ i ] . agct ; }
if ( docs [ i ] . cict != null ) { delete docs [ i ] . cict ; }
2019-01-05 04:59:13 +03:00
// Add the connection state
2019-03-10 01:28:08 +03:00
var state = parent . parent . GetConnectivityState ( docs [ i ] . _id ) ;
2019-01-05 04:59:13 +03:00
if ( state ) {
docs [ i ] . conn = state . connectivity ;
docs [ i ] . pwr = state . powerState ;
2019-03-10 01:28:08 +03:00
if ( ( state . connectivity & 1 ) != 0 ) { var agent = parent . wsagents [ docs [ i ] . _id ] ; if ( agent != null ) { docs [ i ] . agct = agent . connectTime ; } }
if ( ( state . connectivity & 2 ) != 0 ) { var cira = parent . parent . mpsserver . ciraConnections [ docs [ i ] . _id ] ; if ( cira != null ) { docs [ i ] . cict = cira . tag . connectTime ; } }
2019-01-05 04:59:13 +03:00
}
2017-12-13 03:04:54 +03:00
2019-01-05 04:59:13 +03:00
// Compress the meshid's
meshid = docs [ i ] . meshid ;
if ( ! r [ meshid ] ) { r [ meshid ] = [ ] ; }
delete docs [ i ] . meshid ;
2017-12-13 03:04:54 +03:00
2019-01-05 04:59:13 +03:00
// Remove Intel AMT credential if present
if ( docs [ i ] . intelamt != null && docs [ i ] . intelamt . pass != null ) { delete docs [ i ] . intelamt . pass ; }
2017-12-13 03:04:54 +03:00
2019-02-27 03:26:33 +03:00
// If GeoLocation not enabled, remove any node location information
if ( domain . geolocation != true ) {
if ( docs [ i ] . iploc != null ) { delete docs [ i ] . iploc ; }
if ( docs [ i ] . wifiloc != null ) { delete docs [ i ] . wifiloc ; }
if ( docs [ i ] . gpsloc != null ) { delete docs [ i ] . gpsloc ; }
if ( docs [ i ] . userloc != null ) { delete docs [ i ] . userloc ; }
}
2020-05-12 04:44:46 +03:00
// Add device sessions
const xagent = parent . wsagents [ docs [ i ] . _id ] ;
if ( ( xagent != null ) && ( xagent . sessions != null ) ) { docs [ i ] . sessions = xagent . sessions ; }
2019-01-05 04:59:13 +03:00
r [ meshid ] . push ( docs [ i ] ) ;
}
2019-07-05 23:28:41 +03:00
try { ws . send ( JSON . stringify ( { action : 'nodes' , responseid : command . responseid , nodes : r , tag : command . tag } ) ) ; } catch ( ex ) { }
2019-01-05 04:59:13 +03:00
} ) ;
break ;
}
case 'powertimeline' :
{
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
if ( visible == false ) return ;
// Query the database for the power timeline for a given node
// The result is a compacted array: [ startPowerState, startTimeUTC, powerState ] + many[ deltaTime, powerState ]
db . getPowerTimeline ( node . _id , function ( err , docs ) {
if ( ( err == null ) && ( docs != null ) && ( docs . length > 0 ) ) {
var timeline = [ ] , time = null , previousPower ;
for ( i in docs ) {
var doc = docs [ i ] , j = parseInt ( i ) ;
doc . time = Date . parse ( doc . time ) ;
if ( time == null ) { // First element
// Skip all starting power 0 events.
if ( ( doc . power == 0 ) && ( ( doc . oldPower == null ) || ( doc . oldPower == 0 ) ) ) continue ;
time = doc . time ;
if ( doc . oldPower ) { timeline . push ( doc . oldPower , time / 1000 , doc . power ) ; } else { timeline . push ( 0 , time / 1000 , doc . power ) ; }
} else if ( previousPower != doc . power ) { // Delta element
// If this event is of a short duration (2 minutes or less), skip it.
if ( ( docs . length > ( j + 1 ) ) && ( ( Date . parse ( docs [ j + 1 ] . time ) - doc . time ) < 120000 ) ) continue ;
timeline . push ( ( doc . time - time ) / 1000 , doc . power ) ;
time = doc . time ;
2019-09-25 22:10:41 +03:00
}
2019-12-28 02:18:43 +03:00
previousPower = doc . power ;
2017-10-24 00:09:58 +03:00
}
2019-12-28 02:18:43 +03:00
try { ws . send ( JSON . stringify ( { action : 'powertimeline' , nodeid : node . _id , timeline : timeline , tag : command . tag } ) ) ; } catch ( ex ) { }
} else {
// No records found, send current state if we have it
var state = parent . parent . GetConnectivityState ( command . nodeid ) ;
if ( state != null ) { try { ws . send ( JSON . stringify ( { action : 'powertimeline' , nodeid : node . _id , timeline : [ state . powerState , Date . now ( ) , state . powerState ] , tag : command . tag } ) ) ; } catch ( ex ) { } }
}
} ) ;
2019-01-05 04:59:13 +03:00
} ) ;
break ;
}
2019-09-24 02:46:26 +03:00
case 'getsysinfo' :
{
2020-05-02 23:49:56 +03:00
if ( common . validateString ( command . nodeid , 1 , 1024 ) == false ) break ; // Check the nodeid
if ( command . nodeid . indexOf ( '/' ) == - 1 ) { command . nodeid = 'node/' + domain . id + '/' + command . nodeid ; }
if ( ( command . nodeid . split ( '/' ) . length != 3 ) || ( command . nodeid . split ( '/' ) [ 1 ] != domain . id ) ) return ; // Invalid domain, operation only valid for current domain
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
2020-05-02 23:49:56 +03:00
if ( visible == false ) { try { ws . send ( JSON . stringify ( { action : 'getsysinfo' , nodeid : command . nodeid , tag : command . tag , noinfo : true , result : 'Invalid device id' } ) ) ; } catch ( ex ) { } return ; }
2019-12-28 02:18:43 +03:00
// Query the database system information
db . Get ( 'si' + command . nodeid , function ( err , docs ) {
if ( ( docs != null ) && ( docs . length > 0 ) ) {
var doc = docs [ 0 ] ;
doc . action = 'getsysinfo' ;
doc . nodeid = node . _id ;
doc . tag = command . tag ;
delete doc . type ;
delete doc . domain ;
delete doc . _id ;
2020-05-02 23:49:56 +03:00
if ( command . nodeinfo === true ) { doc . node = node ; doc . rights = rights ; }
2019-12-28 02:18:43 +03:00
try { ws . send ( JSON . stringify ( doc ) ) ; } catch ( ex ) { }
} else {
2020-05-02 23:49:56 +03:00
try { ws . send ( JSON . stringify ( { action : 'getsysinfo' , nodeid : node . _id , tag : command . tag , noinfo : true , result : 'Invalid device id' } ) ) ; } catch ( ex ) { }
2019-12-28 02:18:43 +03:00
}
} ) ;
2019-09-24 02:46:26 +03:00
} ) ;
break ;
}
2019-01-05 04:59:13 +03:00
case 'lastconnect' :
{
2020-05-02 23:49:56 +03:00
if ( common . validateString ( command . nodeid , 1 , 1024 ) == false ) break ; // Check the nodeid
if ( command . nodeid . indexOf ( '/' ) == - 1 ) { command . nodeid = 'node/' + domain . id + '/' + command . nodeid ; }
if ( ( command . nodeid . split ( '/' ) . length != 3 ) || ( command . nodeid . split ( '/' ) [ 1 ] != domain . id ) ) return ; // Invalid domain, operation only valid for current domain
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
2020-05-02 23:49:56 +03:00
if ( visible == false ) { try { ws . send ( JSON . stringify ( { action : 'lastconnect' , nodeid : command . nodeid , tag : command . tag , noinfo : true , result : 'Invalid device id' } ) ) ; } catch ( ex ) { } return ; }
2019-12-28 02:18:43 +03:00
// Query the database for the last time this node connected
db . Get ( 'lc' + command . nodeid , function ( err , docs ) {
if ( ( docs != null ) && ( docs . length > 0 ) ) {
try { ws . send ( JSON . stringify ( { action : 'lastconnect' , nodeid : command . nodeid , time : docs [ 0 ] . time , addr : docs [ 0 ] . addr } ) ) ; } catch ( ex ) { }
2020-05-02 23:49:56 +03:00
} else {
try { ws . send ( JSON . stringify ( { action : 'lastconnect' , nodeid : command . nodeid , tag : command . tag , noinfo : true , result : 'No data' } ) ) ; } catch ( ex ) { }
2019-12-28 02:18:43 +03:00
}
} ) ;
2019-01-05 04:59:13 +03:00
} ) ;
break ;
}
case 'files' :
{
// Send the full list of server files to the browser app
2019-02-19 09:20:25 +03:00
updateUserFiles ( user , ws , domain ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'fileoperation' :
{
// Check permissions
if ( ( user . siteadmin & 8 ) != 0 ) {
// Perform a file operation (Create Folder, Delete Folder, Delete File...)
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . fileop , 4 , 16 ) == false ) return ;
2019-01-05 04:59:13 +03:00
var sendUpdate = true , path = meshPathToRealPath ( command . path , user ) ; // This will also check access rights
if ( path == null ) break ;
2019-03-10 01:28:08 +03:00
if ( ( command . fileop == 'createfolder' ) && ( common . IsFilenameValid ( command . newfolder ) == true ) ) {
2019-02-20 02:38:27 +03:00
// Create a new folder
2019-10-31 00:30:34 +03:00
try { fs . mkdirSync ( path + '/' + command . newfolder ) ; } catch ( ex ) {
try { fs . mkdirSync ( path ) ; } catch ( ex ) { }
try { fs . mkdirSync ( path + '/' + command . newfolder ) ; } catch ( ex ) { }
2019-02-20 02:38:27 +03:00
}
2019-10-25 11:16:00 +03:00
}
2019-02-20 02:38:27 +03:00
else if ( command . fileop == 'delete' ) {
// Delete a file
2019-03-10 01:28:08 +03:00
if ( common . validateArray ( command . delfiles , 1 ) == false ) return ;
2019-01-05 04:59:13 +03:00
for ( i in command . delfiles ) {
2019-03-10 01:28:08 +03:00
if ( common . IsFilenameValid ( command . delfiles [ i ] ) == true ) {
2019-03-20 19:53:44 +03:00
var fullpath = parent . path . join ( path , command . delfiles [ i ] ) ;
2019-01-05 04:59:13 +03:00
if ( command . rec == true ) {
2019-10-31 00:30:34 +03:00
try { deleteFolderRecursive ( fullpath ) ; } catch ( ex ) { } // TODO, make this an async function
2019-01-05 04:59:13 +03:00
} else {
2019-10-31 00:30:34 +03:00
try { fs . rmdirSync ( fullpath ) ; } catch ( ex ) { try { fs . unlinkSync ( fullpath ) ; } catch ( xe ) { } }
2018-09-25 21:51:40 +03:00
}
}
2017-10-24 00:09:58 +03:00
}
2019-02-19 09:20:25 +03:00
2019-02-20 02:38:27 +03:00
// If we deleted something in the mesh root folder and the entire mesh folder is empty, remove it.
if ( command . path . length == 1 ) {
try {
if ( command . path [ 0 ] . startsWith ( 'mesh//' ) ) {
path = meshPathToRealPath ( [ command . path [ 0 ] ] , user ) ;
2019-03-10 01:28:08 +03:00
fs . readdir ( path , function ( err , dir ) { if ( ( err == null ) && ( dir . length == 0 ) ) { fs . rmdir ( path , function ( err ) { } ) ; } } ) ;
2019-02-20 02:38:27 +03:00
}
} catch ( ex ) { }
}
}
2020-06-21 23:59:49 +03:00
else if ( ( command . fileop == 'rename' ) && ( common . IsFilenameValid ( command . oldname ) === true ) && ( common . IsFilenameValid ( command . newname ) === true ) ) {
2019-02-20 02:38:27 +03:00
// Rename
2020-01-08 00:56:26 +03:00
try { fs . renameSync ( path + '/' + command . oldname , path + '/' + command . newname ) ; } catch ( e ) { }
2017-10-24 00:09:58 +03:00
}
2019-01-05 04:59:13 +03:00
else if ( ( command . fileop == 'copy' ) || ( command . fileop == 'move' ) ) {
2020-06-21 23:59:49 +03:00
// Copy or move of one or many files
2019-03-10 01:28:08 +03:00
if ( common . validateArray ( command . names , 1 ) == false ) return ;
2019-01-05 04:59:13 +03:00
var scpath = meshPathToRealPath ( command . scpath , user ) ; // This will also check access rights
if ( scpath == null ) break ;
// TODO: Check quota if this is a copy!!!!!!!!!!!!!!!!
for ( i in command . names ) {
2020-06-21 23:59:49 +03:00
if ( common . IsFilenameValid ( command . names [ i ] ) === true ) {
var s = parent . path . join ( scpath , command . names [ i ] ) , d = parent . path . join ( path , command . names [ i ] ) ;
sendUpdate = false ;
copyFile ( s , d , function ( op ) { if ( op != null ) { fs . unlink ( op , function ( err ) { parent . parent . DispatchEvent ( [ user . _id ] , obj , 'updatefiles' ) ; } ) ; } else { parent . parent . DispatchEvent ( [ user . _id ] , obj , 'updatefiles' ) ; } } , ( ( command . fileop == 'move' ) ? s : null ) ) ;
}
2018-04-17 01:37:41 +03:00
}
2019-01-05 04:59:13 +03:00
}
2018-04-17 01:37:41 +03:00
2019-03-10 01:28:08 +03:00
if ( sendUpdate == true ) { parent . parent . DispatchEvent ( [ user . _id ] , obj , 'updatefiles' ) ; } // Fire an event causing this user to update this files
2019-01-05 04:59:13 +03:00
}
break ;
}
2019-02-05 05:06:01 +03:00
case 'serverconsole' :
{
// This is a server console message, only process this if full administrator
2020-07-06 22:46:38 +03:00
if ( user . siteadmin != SITERIGHT _ADMIN ) break ;
2019-02-05 05:06:01 +03:00
var r = '' ;
2019-03-10 01:53:46 +03:00
var cmdargs = splitArgs ( command . value ) ;
if ( cmdargs . length == 0 ) break ;
const cmd = cmdargs [ 0 ] . toLowerCase ( ) ;
cmdargs = parseArgs ( cmdargs ) ;
2019-02-05 05:06:01 +03:00
switch ( cmd ) {
case 'help' : {
2020-07-31 21:35:50 +03:00
var fin = '' , f = '' , availcommands = 'help,info,versions,resetserver,usersessions,closeusersessions,tasklimiter,setmaxtasks,cores,migrationagents,agentstats,webstats,mpsstats,swarmstats,acceleratorsstats,updatecheck,serverupdate,nodeconfig,heapdump,relays,autobackup,backupconfig,dupagents,dispatchtable,badlogins,showpaths,le,lecheck,leevents,dbstats,sms,amtacm,certhashes,watchdog' ;
2020-03-29 03:28:44 +03:00
if ( parent . parent . config . settings . heapdump === true ) { availcommands += ',heapdump' ; }
2019-12-10 01:57:40 +03:00
availcommands = availcommands . split ( ',' ) . sort ( ) ;
2020-05-07 03:45:57 +03:00
while ( availcommands . length > 0 ) { if ( f . length > 80 ) { fin += ( f + ',\r\n' ) ; f = '' ; } f += ( ( ( f != '' ) ? ', ' : ' ' ) + availcommands . shift ( ) ) ; }
2019-12-10 01:57:40 +03:00
if ( f != '' ) { fin += f ; }
2020-07-31 21:35:50 +03:00
if ( cmdargs [ '_' ] . length == 0 ) {
r = 'Available commands: \r\n' + fin + '\r\nType help <command> for details.' ;
} else {
var cmd2 = cmdargs [ '_' ] [ 0 ] . toLowerCase ( ) ;
switch ( cmd2 ) {
case 'info' : { r = "info: Returns the most immidiatly useful information about this server, including MeshCentral and NodeJS versions. This is often information required to file a bug." ; break ; }
case 'versions' : { r = "versions: Returns all internal versions for NodeJS running this server." ; break ; }
case 'resetserver' : { r = "resetserver: Causes the server to reset, this is sometimes useful is the config.json file was changed." ; break ; }
case 'usersessions' : { r = "usersessions: Returns a list of active sessions grouped by user." ; break ; }
case 'closeusersessions' : { r = "closeusersessions: Disconnects all sessions for a specified user." ; break ; }
case 'tasklimiter' : { r = "tasklimiter: Returns the internal status of the tasklimiter. This is a system used to smooth out work done by the server. It's used by, for example, agent updates so that not all agents are updated at the same time." ; break ; }
default : { r = 'No help information about this command.' ; break ; }
}
}
2019-11-19 04:31:42 +03:00
break ;
}
2020-06-30 21:34:19 +03:00
case 'certhashes' : {
r += 'AgentCertHash: ' + parent . agentCertificateHashHex ;
for ( var i in parent . webCertificateHashs ) { r += '\r\nwebCertificateHash (' + i + '): ' + common . rstr2hex ( parent . webCertificateHashs [ i ] ) ; }
for ( var i in parent . webCertificateFullHashs ) { r += '\r\nwebCertificateFullHash (' + i + '): ' + common . rstr2hex ( parent . webCertificateFullHashs [ i ] ) ; }
break ;
}
2020-05-07 03:45:57 +03:00
case 'amtacm' : {
if ( ( domain . amtacmactivation == null ) || ( domain . amtacmactivation . acmmatch == null ) || ( domain . amtacmactivation . acmmatch . length == 0 ) ) {
r = 'No Intel AMT activation certificates.' ;
} else {
if ( domain . amtacmactivation . log != null ) { r += '--- Activation Log ---\r\nFile : ' + domain . amtacmactivation . log + '\r\n' ; }
for ( var i in domain . amtacmactivation . acmmatch ) {
var acmcert = domain . amtacmactivation . acmmatch [ i ] ;
r += '--- Activation Certificate ' + ( parseInt ( i ) + 1 ) + ' ---\r\nName : ' + acmcert . cn + '\r\nSHA1 : ' + acmcert . sha1 + '\r\nSHA256: ' + acmcert . sha256 + '\r\n' ;
}
}
break ;
}
2020-03-29 03:28:44 +03:00
case 'heapdump' : {
// Heapdump support, see example at:
// https://www.arbazsiddiqui.me/a-practical-guide-to-memory-leaks-in-nodejs/
if ( parent . parent . config . settings . heapdump === true ) {
var dumpFileName = parent . path . join ( parent . parent . datapath , ` heapDump- ${ Date . now ( ) } .heapsnapshot ` ) ;
try { ws . send ( JSON . stringify ( { action : 'serverconsole' , value : "Generating dump file at: " + dumpFileName , tag : command . tag } ) ) ; } catch ( ex ) { }
require ( 'heapdump' ) . writeSnapshot ( dumpFileName , ( err , filename ) => {
try { ws . send ( JSON . stringify ( { action : 'serverconsole' , value : "Done." , tag : command . tag } ) ) ; } catch ( ex ) { }
} ) ;
} else {
r = "Heapdump not supported, add \"heapdump\":true to settings section of config.json." ;
}
break ;
}
2020-04-22 11:33:27 +03:00
case 'sms' : {
if ( parent . parent . smsserver == null ) {
r = "No SMS gateway in use." ;
} else {
if ( cmdargs [ '_' ] . length != 2 ) {
r = "Usage: SMS \"PhoneNumber\" \"Message\"." ;
} else {
2020-04-23 01:29:26 +03:00
parent . parent . smsserver . sendSMS ( cmdargs [ '_' ] [ 0 ] , cmdargs [ '_' ] [ 1 ] , function ( status , msg ) {
if ( typeof msg == 'string' ) {
try { ws . send ( JSON . stringify ( { action : 'serverconsole' , value : status ? ( 'Success: ' + msg ) : ( 'Failed: ' + msg ) , tag : command . tag } ) ) ; } catch ( ex ) { }
} else {
try { ws . send ( JSON . stringify ( { action : 'serverconsole' , value : status ? 'Success' : 'Failed' , tag : command . tag } ) ) ; } catch ( ex ) { }
}
2020-04-22 11:33:27 +03:00
} ) ;
}
}
break ;
}
2020-05-13 10:27:31 +03:00
case 'email' : {
if ( parent . parent . mailserver == null ) {
r = "No email service enabled." ;
} else {
if ( cmdargs [ '_' ] . length != 3 ) {
r = "Usage: email \"user@sample.com\" \"Subject\" \"Message\"." ;
} else {
parent . parent . mailserver . sendMail ( cmdargs [ '_' ] [ 0 ] , cmdargs [ '_' ] [ 1 ] , cmdargs [ '_' ] [ 2 ] ) ;
r = "Done." ;
}
}
break ;
}
2020-03-05 22:18:50 +03:00
case 'le' : {
2020-03-05 01:57:03 +03:00
if ( parent . parent . letsencrypt == null ) {
r = "Let's Encrypt not in use." ;
} else {
2020-03-12 02:53:09 +03:00
r = JSON . stringify ( parent . parent . letsencrypt . getStats ( ) , null , 4 ) ;
2020-03-05 01:57:03 +03:00
}
break ;
}
case 'lecheck' : {
if ( parent . parent . letsencrypt == null ) {
r = "Let's Encrypt not in use." ;
} else {
2020-03-12 02:53:09 +03:00
r = [ "CertOK" , "Request:NoCert" , "Request:Expire" , "Request:MissingNames" ] [ parent . parent . letsencrypt . checkRenewCertificate ( ) ] ;
2020-03-05 01:57:03 +03:00
}
break ;
}
2020-03-05 22:18:50 +03:00
case 'leevents' : {
if ( parent . parent . letsencrypt == null ) {
r = "Let's Encrypt not in use." ;
} else {
2020-03-12 02:53:09 +03:00
r = parent . parent . letsencrypt . events . join ( '\r\n' ) ;
2020-03-05 22:18:50 +03:00
}
break ;
}
2019-11-19 04:31:42 +03:00
case 'badlogins' : {
2020-02-18 21:57:39 +03:00
if ( parent . parent . config . settings . maxinvalidlogin == false ) {
r = 'Bad login filter is disabled.' ;
2019-11-20 00:33:52 +03:00
} else {
2020-03-31 03:47:04 +03:00
if ( cmdargs [ '_' ] == 'reset' ) {
// Reset bad login table
parent . badLoginTable = { } ;
parent . badLoginTableLastClean = 0 ;
r = 'Done.'
} else if ( cmdargs [ '_' ] == '' ) {
// Show current bad login table
if ( typeof parent . parent . config . settings . maxinvalidlogin . coolofftime == 'number' ) {
r = "Max is " + parent . parent . config . settings . maxinvalidlogin . count + " bad login(s) in " + parent . parent . config . settings . maxinvalidlogin . time + " minute(s), " + parent . parent . config . settings . maxinvalidlogin . coolofftime + " minute(s) cooloff.\r\n" ;
2020-01-11 03:25:02 +03:00
} else {
2020-03-31 03:47:04 +03:00
r = "Max is " + parent . parent . config . settings . maxinvalidlogin . count + " bad login(s) in " + parent . parent . config . settings . maxinvalidlogin . time + " minute(s).\r\n" ;
}
var badLoginCount = 0 ;
parent . cleanBadLoginTable ( ) ;
for ( var i in parent . badLoginTable ) {
badLoginCount ++ ;
if ( typeof parent . badLoginTable [ i ] == 'number' ) {
r += "Cooloff for " + Math . floor ( ( parent . badLoginTable [ i ] - Date . now ( ) ) / 60000 ) + " minute(s)\r\n" ;
2020-02-18 21:57:39 +03:00
} else {
2020-03-31 03:47:04 +03:00
if ( parent . badLoginTable [ i ] . length > 1 ) {
r += ( i + ' - ' + parent . badLoginTable [ i ] . length + " records\r\n" ) ;
} else {
r += ( i + ' - ' + parent . badLoginTable [ i ] . length + " record\r\n" ) ;
}
2020-02-18 21:57:39 +03:00
}
2020-01-11 03:25:02 +03:00
}
2020-03-31 03:47:04 +03:00
if ( badLoginCount == 0 ) { r += 'No bad logins.' ; }
} else {
r = 'Usage: badlogin [reset]' ;
2019-11-20 00:33:52 +03:00
}
}
2019-07-11 00:27:38 +03:00
break ;
}
case 'dispatchtable' : {
r = '' ;
2019-11-19 04:31:42 +03:00
for ( var i in parent . parent . eventsDispatch ) { r += ( i + ', ' + parent . parent . eventsDispatch [ i ] . length + '\r\n' ) ; }
2019-05-22 00:19:32 +03:00
break ;
}
case 'dupagents' : {
for ( var i in parent . duplicateAgentsLog ) { r += JSON . stringify ( parent . duplicateAgentsLog [ i ] ) + '\r\n' ; }
if ( r == '' ) { r = 'No duplicate agents in log.' ; }
2019-05-02 01:02:03 +03:00
break ;
}
case 'agentstats' : {
var stats = parent . getAgentStats ( ) ;
for ( var i in stats ) {
if ( typeof stats [ i ] == 'object' ) { r += ( i + ': ' + JSON . stringify ( stats [ i ] ) + '\r\n' ) ; } else { r += ( i + ': ' + stats [ i ] + '\r\n' ) ; }
}
break ;
}
case 'webstats' : {
var stats = parent . getStats ( ) ;
for ( var i in stats ) {
if ( typeof stats [ i ] == 'object' ) { r += ( i + ': ' + JSON . stringify ( stats [ i ] ) + '\r\n' ) ; } else { r += ( i + ': ' + stats [ i ] + '\r\n' ) ; }
}
break ;
}
2020-07-03 21:03:15 +03:00
case 'watchdog' : {
if ( parent . parent . watchdog == null ) {
r = 'Server watchdog not active.' ;
} else {
r = 'Server watchdog active.\r\n' ;
if ( parent . parent . watchdogmaxtime != null ) { r += 'Largest timeout was ' + parent . parent . watchdogmax + 'ms on ' + parent . parent . watchdogmaxtime + '\r\n' ; }
for ( var i in parent . parent . watchdogtable ) { r += parent . parent . watchdogtable [ i ] + '\r\n' ; }
}
break ;
}
2019-05-02 01:02:03 +03:00
case 'acceleratorsstats' : {
var stats = parent . parent . certificateOperations . getAcceleratorStats ( ) ;
for ( var i in stats ) {
if ( typeof stats [ i ] == 'object' ) { r += ( i + ': ' + JSON . stringify ( stats [ i ] ) + '\r\n' ) ; } else { r += ( i + ': ' + stats [ i ] + '\r\n' ) ; }
}
break ;
}
case 'mpsstats' : {
2019-12-21 01:02:49 +03:00
if ( parent . parent . mpsserver == null ) {
r = 'MPS not enabled.' ;
} else {
var stats = parent . parent . mpsserver . getStats ( ) ;
for ( var i in stats ) {
if ( typeof stats [ i ] == 'object' ) { r += ( i + ': ' + JSON . stringify ( stats [ i ] ) + '\r\n' ) ; } else { r += ( i + ': ' + stats [ i ] + '\r\n' ) ; }
}
2019-05-02 01:02:03 +03:00
}
break ;
}
2020-03-16 23:40:13 +03:00
case 'dbstats' : {
parent . parent . db . getStats ( function ( stats ) {
var r2 = '' ;
for ( var i in stats ) { r2 += ( i + ': ' + stats [ i ] + '\r\n' ) ; }
try { ws . send ( JSON . stringify ( { action : 'serverconsole' , value : r2 , tag : command . tag } ) ) ; } catch ( ex ) { }
} )
break ;
}
2019-05-02 01:02:03 +03:00
case 'serverupdate' : {
r = 'Performing server update...' ;
2019-07-18 23:11:08 +03:00
if ( parent . parent . performServerUpdate ( ) == false ) { r = 'Server self-update not possible.' ; }
2019-05-02 01:02:03 +03:00
break ;
}
2019-07-18 01:57:42 +03:00
case 'print' : {
2020-07-31 21:35:50 +03:00
console . log ( cmdargs [ '_' ] [ 0 ] ) ;
2019-07-18 01:57:42 +03:00
break ;
}
2019-05-02 01:02:03 +03:00
case 'updatecheck' : {
2020-04-18 09:17:45 +03:00
parent . parent . getServerTags ( function ( tags , error ) {
var r2 = '' ;
2019-05-03 04:26:43 +03:00
if ( error != null ) { r2 += 'Exception: ' + error + '\r\n' ; }
2020-04-18 09:17:45 +03:00
else { for ( var i in tags ) { r2 += i + ': ' + tags [ i ] + '\r\n' ; } }
2019-05-02 01:02:03 +03:00
try { ws . send ( JSON . stringify ( { action : 'serverconsole' , value : r2 , tag : command . tag } ) ) ; } catch ( ex ) { }
} ) ;
2020-03-05 01:57:03 +03:00
r = "Checking server update..." ;
2019-03-06 20:15:32 +03:00
break ;
}
case 'info' : {
var info = process . memoryUsage ( ) ;
2019-10-25 11:16:00 +03:00
info . dbType = [ 'None' , 'NeDB' , 'MongoJS' , 'MongoDB' ] [ parent . db . databaseType ] ;
2019-05-29 03:25:23 +03:00
if ( parent . db . databaseType == 3 ) { info . dbChangeStream = parent . db . changeStream ; }
2020-03-12 02:53:09 +03:00
if ( parent . parent . pluginHandler != null ) { info . plugins = [ ] ; for ( var i in parent . parent . pluginHandler . plugins ) { info . plugins . push ( i ) ; } }
2020-03-31 20:37:52 +03:00
try { info . nodeVersion = process . version ; } catch ( ex ) { }
try { info . meshVersion = parent . parent . currentVer ; } catch ( ex ) { }
2019-03-06 20:15:32 +03:00
try { info . platform = process . platform ; } catch ( ex ) { }
try { info . arch = process . arch ; } catch ( ex ) { }
try { info . pid = process . pid ; } catch ( ex ) { }
try { info . uptime = process . uptime ( ) ; } catch ( ex ) { }
try { info . cpuUsage = process . cpuUsage ( ) ; } catch ( ex ) { }
2019-12-10 01:57:40 +03:00
try { info . warnings = parent . parent . getServerWarnings ( ) ; } catch ( ex ) { }
2020-03-05 01:57:03 +03:00
try { info . database = [ "Unknown" , "NeDB" , "MongoJS" , "MongoDB" , "MariaDB" , "MySQL" ] [ parent . parent . db . databaseType ] ; } catch ( ex ) { }
2020-05-02 06:16:57 +03:00
try { info . productionMode = ( ( process . env . NODE _ENV != null ) && ( process . env . NODE _ENV == 'production' ) ) ; } catch ( ex ) { }
2020-08-19 00:44:42 +03:00
try { info . allDevGroupManagers = parent . parent . config . settings . managealldevicegroups ; } catch ( ex ) { }
2019-03-06 20:15:32 +03:00
r = JSON . stringify ( info , null , 4 ) ;
break ;
}
case 'nodeconfig' : {
r = JSON . stringify ( process . config , null , 4 ) ;
break ;
}
case 'versions' : {
r = JSON . stringify ( process . versions , null , 4 ) ;
2019-02-05 05:06:01 +03:00
break ;
}
case 'args' : {
2019-03-10 01:53:46 +03:00
r = cmd + ': ' + JSON . stringify ( cmdargs ) ;
2019-02-05 05:06:01 +03:00
break ;
}
case 'usersessions' : {
2020-01-28 02:26:13 +03:00
var userSessionCount = 0 ;
var filter = null ;
var arg = cmdargs [ '_' ] [ 0 ] ;
if ( typeof arg == 'string' ) { if ( arg . indexOf ( '/' ) >= 0 ) { filter = arg ; } else { filter = ( 'user/' + domain . id + '/' + arg ) ; } }
2019-03-10 01:28:08 +03:00
for ( var i in parent . wssessions ) {
2020-01-28 02:26:13 +03:00
if ( ( filter == null ) || ( filter == i ) ) {
userSessionCount ++ ;
r += ( i + ', ' + parent . wssessions [ i ] . length + ' session' + ( ( parent . wssessions [ i ] . length > 1 ) ? 's' : '' ) + '.\r\n' ) ;
for ( var j in parent . wssessions [ i ] ) {
var addr = parent . wssessions [ i ] [ j ] . _socket . remoteAddress ;
if ( addr . startsWith ( '::ffff:' ) ) { addr = addr . substring ( 7 ) ; }
r += ' ' + addr + ' --> ' + parent . wssessions [ i ] [ j ] . sessionId + '\r\n' ;
}
}
}
if ( userSessionCount == 0 ) { r = 'None.' ; }
break ;
}
case 'closeusersessions' : {
var userSessionCount = 0 ;
var filter = null ;
var arg = cmdargs [ '_' ] [ 0 ] ;
if ( typeof arg == 'string' ) { if ( arg . indexOf ( '/' ) >= 0 ) { filter = arg ; } else { filter = ( 'user/' + domain . id + '/' + arg ) ; } }
if ( filter == null ) {
r += "Usage: closeusersessions <username>" ;
} else {
r += "Closing user sessions for: " + filter + '\r\n' ;
for ( var i in parent . wssessions ) {
if ( filter == i ) {
userSessionCount ++ ;
for ( var j in parent . wssessions [ i ] ) {
parent . wssessions [ i ] [ j ] . send ( JSON . stringify ( { action : 'stopped' , msg : "Administrator forced disconnection" } ) ) ;
parent . wssessions [ i ] [ j ] . close ( ) ;
}
}
2019-02-05 05:06:01 +03:00
}
2020-01-28 02:26:13 +03:00
if ( userSessionCount < 2 ) { r += 'Disconnected ' + userSessionCount + ' session.' ; } else { r += 'Disconnected ' + userSessionCount + ' sessions.' ; } ;
2019-02-05 05:06:01 +03:00
}
break ;
}
case 'resetserver' : {
2020-01-28 02:26:13 +03:00
console . log ( "Server restart..." ) ;
2019-02-05 05:06:01 +03:00
process . exit ( 0 ) ;
break ;
}
2019-02-26 01:35:08 +03:00
case 'tasklimiter' : {
2019-03-10 01:28:08 +03:00
if ( parent . parent . taskLimiter != null ) {
2019-02-26 01:35:08 +03:00
//var obj = { maxTasks: maxTasks, maxTaskTime: (maxTaskTime * 1000), nextTaskId: 0, currentCount: 0, current: {}, pending: [[], [], []], timer: null };
2019-03-10 01:28:08 +03:00
const tl = parent . parent . taskLimiter ;
2020-01-28 02:26:13 +03:00
r += 'MaxTasks: ' + tl . maxTasks + ', NextTaskId: ' + tl . nextTaskId + '\r\n' ;
r += 'MaxTaskTime: ' + ( tl . maxTaskTime / 1000 ) + ' seconds, Timer: ' + ( tl . timer != null ) + '\r\n' ;
2019-02-26 01:35:08 +03:00
var c = [ ] ;
for ( var i in tl . current ) { c . push ( i ) ; }
2020-01-28 02:26:13 +03:00
r += 'Current (' + tl . currentCount + '): [' + c . join ( ', ' ) + ']\r\n' ;
r += 'Pending (High/Med/Low): ' + tl . pending [ 0 ] . length + ', ' + tl . pending [ 1 ] . length + ', ' + tl . pending [ 2 ] . length + '\r\n' ;
2019-02-26 03:07:27 +03:00
}
break ;
}
case 'setmaxtasks' : {
2019-03-10 01:53:46 +03:00
if ( ( cmdargs [ "_" ] . length != 1 ) || ( parseInt ( cmdargs [ "_" ] [ 0 ] ) < 1 ) || ( parseInt ( cmdargs [ "_" ] [ 0 ] ) > 1000 ) ) {
2019-02-26 03:07:27 +03:00
r = 'Usage: setmaxtasks [1 to 1000]' ;
} else {
2019-03-10 01:53:46 +03:00
parent . parent . taskLimiter . maxTasks = parseInt ( cmdargs [ "_" ] [ 0 ] ) ;
2019-03-10 01:28:08 +03:00
r = 'MaxTasks set to ' + parent . parent . taskLimiter . maxTasks + '.' ;
2019-02-26 01:35:08 +03:00
}
break ;
}
case 'cores' : {
2020-01-28 02:26:13 +03:00
if ( parent . parent . defaultMeshCores != null ) { for ( var i in parent . parent . defaultMeshCores ) { r += i + ': ' + parent . parent . defaultMeshCores [ i ] . length + ' bytes\r\n' ; } }
2019-02-26 01:35:08 +03:00
break ;
}
2019-12-10 01:57:40 +03:00
case 'showpaths' : {
r = 'Parent: ' + parent . parent . parentpath + '\r\n' ;
r += 'Data: ' + parent . parent . datapath + '\r\n' ;
r += 'Files: ' + parent . parent . filespath + '\r\n' ;
r += 'Backup: ' + parent . parent . backuppath + '\r\n' ;
r += 'Record: ' + parent . parent . recordpath + '\r\n' ;
r += 'WebPublic: ' + parent . parent . webPublicPath + '\r\n' ;
r += 'WebViews: ' + parent . parent . webViewsPath + '\r\n' ;
if ( parent . parent . webViewsOverridePath ) { r += 'XWebPublic: ' + parent . parent . webViewsOverridePath + '\r\n' ; }
if ( parent . parent . webViewsOverridePath ) { r += 'XWebViews: ' + parent . parent . webPublicOverridePath + '\r\n' ; }
break ;
}
2019-02-28 05:48:50 +03:00
case 'migrationagents' : {
2019-03-10 01:28:08 +03:00
if ( parent . parent . swarmserver == null ) {
2019-02-28 05:48:50 +03:00
r = 'Swarm server not running.' ;
} else {
2019-03-10 01:28:08 +03:00
for ( var i in parent . parent . swarmserver . migrationAgents ) {
var arch = parent . parent . swarmserver . migrationAgents [ i ] ;
2019-03-08 09:47:27 +03:00
for ( var j in arch ) { var agent = arch [ j ] ; r += 'Arch ' + agent . arch + ', Ver ' + agent . ver + ', Size ' + ( ( agent . binary == null ) ? 0 : agent . binary . length ) + '<br />' ; }
2019-02-28 05:48:50 +03:00
}
}
break ;
}
case 'swarmstats' : {
2019-03-10 01:28:08 +03:00
if ( parent . parent . swarmserver == null ) {
2019-02-28 05:48:50 +03:00
r = 'Swarm server not running.' ;
} else {
2019-03-10 01:28:08 +03:00
for ( var i in parent . parent . swarmserver . stats ) {
if ( typeof parent . parent . swarmserver . stats [ i ] == 'object' ) {
2019-05-02 01:02:03 +03:00
r += i + ': ' + JSON . stringify ( parent . parent . swarmserver . stats [ i ] ) + '\r\n' ;
2019-02-28 05:48:50 +03:00
} else {
2019-05-02 01:02:03 +03:00
r += i + ': ' + parent . parent . swarmserver . stats [ i ] + '\r\n' ;
2019-02-28 05:48:50 +03:00
}
}
}
break ;
}
2019-03-08 06:56:24 +03:00
case 'heapdump' : {
var heapdump = null ;
try { heapdump = require ( 'heapdump' ) ; } catch ( ex ) { }
if ( heapdump == null ) {
r = 'Heapdump module not installed, run "npm install heapdump".' ;
} else {
heapdump . writeSnapshot ( function ( err , filename ) {
if ( err != null ) {
try { ws . send ( JSON . stringify ( { action : 'serverconsole' , value : 'Unable to write heapdump: ' + err } ) ) ; } catch ( ex ) { }
} else {
try { ws . send ( JSON . stringify ( { action : 'serverconsole' , value : 'Wrote heapdump at ' + filename } ) ) ; } catch ( ex ) { }
}
} ) ;
}
break ;
}
2019-04-29 06:31:08 +03:00
case 'relays' : {
for ( var i in parent . wsrelays ) {
2020-04-14 12:53:40 +03:00
r += 'id: ' + i + ', ' + ( ( parent . wsrelays [ i ] . state == 2 ) ? 'connected' : 'pending' ) ;
if ( parent . wsrelays [ i ] . peer1 != null ) {
2020-05-22 07:25:11 +03:00
r += ', ' + cleanRemoteAddr ( parent . wsrelays [ i ] . peer1 . req . clientIp ) ;
2020-04-14 12:53:40 +03:00
if ( parent . wsrelays [ i ] . peer1 . user ) { r += ' (User:' + parent . wsrelays [ i ] . peer1 . user . name + ')' }
}
if ( parent . wsrelays [ i ] . peer2 != null ) {
2020-05-22 07:25:11 +03:00
r += ' to ' + cleanRemoteAddr ( parent . wsrelays [ i ] . peer2 . req . clientIp ) ;
2020-04-14 12:53:40 +03:00
if ( parent . wsrelays [ i ] . peer2 . user ) { r += ' (User:' + parent . wsrelays [ i ] . peer2 . user . name + ')' }
}
2020-01-28 02:26:13 +03:00
r += '\r\n' ;
2019-04-29 06:31:08 +03:00
}
if ( r == '' ) { r = 'No relays.' ; }
break ;
}
2019-05-18 01:44:01 +03:00
case 'autobackup' : {
2020-09-08 23:02:05 +03:00
var backupResult = parent . db . performBackup ( function ( msg ) {
try { ws . send ( JSON . stringify ( { action : 'serverconsole' , value : msg , tag : command . tag } ) ) ; } catch ( ex ) { }
} ) ;
2019-05-18 01:44:01 +03:00
if ( backupResult == 0 ) { r = 'Starting auto-backup...' ; } else { r = 'Backup alreay in progress.' ; }
break ;
2019-06-08 02:44:00 +03:00
}
case 'backupconfig' : {
r = parent . db . getBackupConfig ( ) ;
break ;
2019-05-18 01:44:01 +03:00
}
2019-02-05 05:06:01 +03:00
default : { // This is an unknown command, return an error message
r = 'Unknown command \"' + cmd + '\", type \"help\" for list of avaialble commands.' ;
break ;
}
}
if ( r != '' ) { try { ws . send ( JSON . stringify ( { action : 'serverconsole' , value : r , tag : command . tag } ) ) ; } catch ( ex ) { } }
break ;
}
2019-01-05 04:59:13 +03:00
case 'msg' :
{
2020-08-18 01:01:25 +03:00
// Check the nodeid
if ( common . validateString ( command . nodeid , 1 , 1024 ) == false ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'msg' , result : 'Unable to route' , tag : command . tag , responseid : command . responseid } ) ) ; } catch ( ex ) { } }
return ;
2020-08-22 02:36:53 +03:00
}
2020-08-18 01:01:25 +03:00
2020-07-14 21:53:22 +03:00
// Rights check
var requiredRights = null , requiredNonRights = null ;
2020-08-18 01:01:25 +03:00
// Complete the nodeid if needed
if ( command . nodeid . indexOf ( '/' ) == - 1 ) { command . nodeid = 'node/' + domain . id + '/' + command . nodeid ; }
2020-04-28 22:42:58 +03:00
// Before routing this command, let's do some security checking.
// If this is a tunnel request, we need to make sure the NodeID in the URL matches the NodeID in the command.
if ( command . type == 'tunnel' ) {
if ( ( typeof command . value != 'string' ) || ( typeof command . nodeid != 'string' ) ) break ;
var url = null ;
try { url = require ( 'url' ) . parse ( command . value , true ) ; } catch ( ex ) { }
if ( url == null ) break ; // Bad URL
if ( url . query && url . query . nodeid && ( url . query . nodeid != command . nodeid ) ) break ; // Bad NodeID in URL query string
2020-06-13 15:41:53 +03:00
2020-07-14 21:53:22 +03:00
// Check rights
if ( url . query . p == '1' ) { requiredNonRights = MESHRIGHT _NOTERMINAL ; }
else if ( ( url . query . p == '4' ) || ( url . query . p == '5' ) ) { requiredNonRights = MESHRIGHT _NOFILES ; }
2020-06-13 15:41:53 +03:00
// Add user consent messages
command . soptions = { } ;
if ( typeof domain . consentmessages == 'object' ) {
2020-06-13 21:36:50 +03:00
if ( typeof domain . consentmessages . title == 'string' ) { command . soptions . consentTitle = domain . consentmessages . title ; }
2020-06-13 15:41:53 +03:00
if ( typeof domain . consentmessages . desktop == 'string' ) { command . soptions . consentMsgDesktop = domain . consentmessages . desktop ; }
if ( typeof domain . consentmessages . terminal == 'string' ) { command . soptions . consentMsgTerminal = domain . consentmessages . terminal ; }
if ( typeof domain . consentmessages . files == 'string' ) { command . soptions . consentMsgFiles = domain . consentmessages . files ; }
}
2020-06-13 21:36:50 +03:00
if ( typeof domain . notificationmessages == 'object' ) {
if ( typeof domain . notificationmessages . title == 'string' ) { command . soptions . notifyTitle = domain . notificationmessages . title ; }
if ( typeof domain . notificationmessages . desktop == 'string' ) { command . soptions . notifyMsgDesktop = domain . notificationmessages . desktop ; }
if ( typeof domain . notificationmessages . terminal == 'string' ) { command . soptions . notifyMsgTerminal = domain . notificationmessages . terminal ; }
if ( typeof domain . notificationmessages . files == 'string' ) { command . soptions . notifyMsgFiles = domain . notificationmessages . files ; }
}
2020-07-18 05:55:49 +03:00
2020-07-25 00:00:49 +03:00
// Add userid
command . userid = user . _id ;
2020-07-18 05:55:49 +03:00
// Add tunnel pre-message deflate
if ( typeof parent . parent . config . settings . agentwscompression == 'boolean' ) { command . perMessageDeflate = parent . parent . config . settings . agentwscompression ; }
2020-04-28 22:42:58 +03:00
}
2020-07-14 01:06:45 +03:00
// If a response is needed, set a callback function
var func = null ;
if ( command . responseid != null ) { func = function ( r ) { try { ws . send ( JSON . stringify ( { action : 'msg' , result : r ? 'OK' : 'Unable to route' , tag : command . tag , responseid : command . responseid } ) ) ; } catch ( ex ) { } } }
2019-01-05 04:59:13 +03:00
// Route this command to a target node
2020-07-14 21:53:22 +03:00
routeCommandToNode ( command , requiredRights , requiredNonRights , func ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'events' :
{
// User filtered events
if ( ( command . user != null ) && ( ( user . siteadmin & 2 ) != 0 ) ) { // SITERIGHT_MANAGEUSERS
// TODO: Add the meshes command.user has access to (???)
var filter = [ 'user/' + domain . id + '/' + command . user . toLowerCase ( ) ] ;
if ( ( command . limit == null ) || ( typeof command . limit != 'number' ) ) {
// Send the list of all events for this session
2019-03-10 01:28:08 +03:00
db . GetUserEvents ( filter , domain . id , command . user , function ( err , docs ) {
2019-02-19 01:32:55 +03:00
if ( err != null ) return ;
try { ws . send ( JSON . stringify ( { action : 'events' , events : docs , user : command . user , tag : command . tag } ) ) ; } catch ( ex ) { }
} ) ;
2019-01-05 04:59:13 +03:00
} else {
2018-01-05 02:59:57 +03:00
// Send the list of most recent events for this session, up to 'limit' count
2019-03-10 01:28:08 +03:00
db . GetUserEventsWithLimit ( filter , domain . id , command . user , command . limit , function ( err , docs ) {
2019-02-19 01:32:55 +03:00
if ( err != null ) return ;
try { ws . send ( JSON . stringify ( { action : 'events' , events : docs , user : command . user , tag : command . tag } ) ) ; } catch ( ex ) { }
} ) ;
2019-01-05 04:59:13 +03:00
}
2019-12-28 02:18:43 +03:00
} else if ( command . nodeid != null ) { // Device filtered events
2019-09-18 22:05:33 +03:00
// Check that the user has access to this nodeid
2019-12-28 02:18:43 +03:00
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
if ( node == null ) return ;
// Put a limit on the number of returned entries if present
var limit = 10000 ;
if ( common . validateInt ( command . limit , 1 , 60000 ) == true ) { limit = command . limit ; }
2020-07-06 22:46:38 +03:00
if ( ( ( rights & MESHRIGHT _LIMITEVENTS ) != 0 ) && ( rights != MESHRIGHT _ADMIN ) ) {
2019-12-28 02:18:43 +03:00
// Send the list of most recent events for this nodeid that only apply to us, up to 'limit' count
db . GetNodeEventsSelfWithLimit ( node . _id , domain . id , user . _id , limit , function ( err , docs ) {
if ( err != null ) return ;
try { ws . send ( JSON . stringify ( { action : 'events' , events : docs , nodeid : node . _id , tag : command . tag } ) ) ; } catch ( ex ) { }
} ) ;
} else {
// Send the list of most recent events for this nodeid, up to 'limit' count
db . GetNodeEventsWithLimit ( node . _id , domain . id , limit , function ( err , docs ) {
if ( err != null ) return ;
try { ws . send ( JSON . stringify ( { action : 'events' , events : docs , nodeid : node . _id , tag : command . tag } ) ) ; } catch ( ex ) { }
} ) ;
2019-09-18 22:05:33 +03:00
}
2019-02-19 01:32:55 +03:00
} ) ;
2019-01-05 04:59:13 +03:00
} else {
2019-09-18 22:05:33 +03:00
// Create a filter for device groups
2019-12-30 22:31:57 +03:00
if ( ( obj . user == null ) || ( obj . user . links == null ) ) return ;
2019-09-18 22:05:33 +03:00
2019-01-05 04:59:13 +03:00
// All events
2019-09-18 22:05:33 +03:00
var exGroupFilter2 = [ ] , filter = [ ] , filter2 = user . subscriptions ;
2019-12-28 02:18:43 +03:00
// Add all meshes for groups this user is part of
// TODO (UserGroups)
// Remove MeshID's that we do not have rights to see events for
2020-07-06 22:46:38 +03:00
for ( var link in obj . user . links ) { if ( ( ( obj . user . links [ link ] . rights & MESHRIGHT _LIMITEVENTS ) != 0 ) && ( ( obj . user . links [ link ] . rights != MESHRIGHT _ADMIN ) ) ) { exGroupFilter2 . push ( link ) ; } }
2019-09-18 22:05:33 +03:00
for ( var i in filter2 ) { if ( exGroupFilter2 . indexOf ( filter2 [ i ] ) == - 1 ) { filter . push ( filter2 [ i ] ) ; } }
2019-01-05 04:59:13 +03:00
if ( ( command . limit == null ) || ( typeof command . limit != 'number' ) ) {
// Send the list of all events for this session
2019-03-10 01:28:08 +03:00
db . GetEvents ( filter , domain . id , function ( err , docs ) {
2019-02-19 01:32:55 +03:00
if ( err != null ) return ;
try { ws . send ( JSON . stringify ( { action : 'events' , events : docs , user : command . user , tag : command . tag } ) ) ; } catch ( ex ) { }
} ) ;
2018-04-17 01:37:41 +03:00
} else {
2019-01-05 04:59:13 +03:00
// Send the list of most recent events for this session, up to 'limit' count
2019-03-10 01:28:08 +03:00
db . GetEventsWithLimit ( filter , domain . id , command . limit , function ( err , docs ) {
2019-02-19 01:32:55 +03:00
if ( err != null ) return ;
try { ws . send ( JSON . stringify ( { action : 'events' , events : docs , user : command . user , tag : command . tag } ) ) ; } catch ( ex ) { }
} ) ;
2018-01-05 02:59:57 +03:00
}
2017-10-24 00:09:58 +03:00
}
2019-01-05 04:59:13 +03:00
break ;
}
2020-05-05 23:00:51 +03:00
case 'recordings' : {
if ( ( ( user . siteadmin & SITERIGHT _RECORDINGS ) == 0 ) || ( domain . sessionrecording == null ) ) return ; // Check if recordings is enabled and we have rights to do this.
var recordingsPath = null ;
if ( domain . sessionrecording . filepath ) { recordingsPath = domain . sessionrecording . filepath ; } else { recordingsPath = parent . parent . recordpath ; }
if ( recordingsPath == null ) return ;
fs . readdir ( recordingsPath , function ( err , files ) {
if ( err != null ) return ;
if ( ( command . limit == null ) || ( typeof command . limit != 'number' ) ) {
// Send the list of all recordings
db . GetEvents ( [ 'recording' ] , domain . id , function ( err , docs ) {
if ( err != null ) return ;
for ( var i in docs ) {
delete docs [ i ] . action ; delete docs [ i ] . etype ; delete docs [ i ] . msg ; // TODO: We could make a more specific query in the DB and never have these.
if ( files . indexOf ( docs [ i ] . filename ) >= 0 ) { docs [ i ] . present = 1 ; }
}
try { ws . send ( JSON . stringify ( { action : 'recordings' , events : docs , tag : command . tag } ) ) ; } catch ( ex ) { }
} ) ;
} else {
// Send the list of most recent recordings, up to 'limit' count
db . GetEventsWithLimit ( [ 'recording' ] , domain . id , command . limit , function ( err , docs ) {
if ( err != null ) return ;
for ( var i in docs ) {
delete docs [ i ] . action ; delete docs [ i ] . etype ; delete docs [ i ] . msg ; // TODO: We could make a more specific query in the DB and never have these.
if ( files . indexOf ( docs [ i ] . filename ) >= 0 ) { docs [ i ] . present = 1 ; }
}
try { ws . send ( JSON . stringify ( { action : 'recordings' , events : docs , tag : command . tag } ) ) ; } catch ( ex ) { }
} ) ;
}
} ) ;
break ;
}
2019-01-05 04:59:13 +03:00
case 'users' :
{
// Request a list of all users
2020-06-12 23:04:23 +03:00
if ( ( user . siteadmin & 2 ) == 0 ) { if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'users' , responseid : command . responseid , result : 'Access denied' } ) ) ; } catch ( ex ) { } } break ; }
2019-01-05 04:59:13 +03:00
var docs = [ ] ;
2019-03-10 01:28:08 +03:00
for ( i in parent . users ) {
2020-05-27 13:35:43 +03:00
if ( ( ( obj . crossDomain === true ) || ( parent . users [ i ] . domain == domain . id ) ) && ( parent . users [ i ] . name != '~' ) ) {
2019-04-17 03:32:18 +03:00
// If we are part of a user group, we can only see other members of our own group
2020-05-27 13:35:43 +03:00
if ( ( obj . crossDomain === true ) || ( user . groups == null ) || ( user . groups . length == 0 ) || ( ( parent . users [ i ] . groups != null ) && ( findOne ( parent . users [ i ] . groups , user . groups ) ) ) ) {
2019-04-17 03:32:18 +03:00
docs . push ( parent . CloneSafeUser ( parent . users [ i ] ) ) ;
}
2019-01-05 04:59:13 +03:00
}
2017-10-24 00:09:58 +03:00
}
2019-01-05 04:59:13 +03:00
try { ws . send ( JSON . stringify ( { action : 'users' , users : docs , tag : command . tag } ) ) ; } catch ( ex ) { }
break ;
}
2019-10-22 21:59:19 +03:00
case 'changelang' :
{
2020-08-06 06:15:34 +03:00
// If this account is settings locked, return here.
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ;
2019-10-22 21:59:19 +03:00
if ( common . validateString ( command . lang , 1 , 6 ) == false ) return ;
// Always lowercase the email address
command . lang = command . lang . toLowerCase ( ) ;
// Update the user's email
var oldlang = user . lang ;
if ( command . lang == '*' ) { delete user . lang ; } else { user . lang = command . lang ; }
parent . db . SetUser ( user ) ;
// Event the change
2020-09-09 04:59:58 +03:00
var message = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , domain : domain . id , msgid : 2 , msgArgs : [ ( oldlang ? oldlang : 'default' ) , ( user . lang ? user . lang : 'default' ) ] } ;
2019-10-22 21:59:19 +03:00
if ( db . changeStream ) { message . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
2020-09-09 04:59:58 +03:00
message . msg = 'Changed language from ' + ( oldlang ? oldlang : 'default' ) + ' to ' + ( user . lang ? user . lang : 'default' ) ;
2019-10-22 21:59:19 +03:00
var targets = [ '*' , 'server-users' , user . _id ] ;
if ( user . groups ) { for ( var i in user . groups ) { targets . push ( 'server-users:' + i ) ; } }
parent . parent . DispatchEvent ( targets , obj , message ) ;
break ;
}
2019-01-05 04:59:13 +03:00
case 'changeemail' :
{
2019-07-09 01:59:44 +03:00
// If the email is the username, this command is not allowed.
if ( domain . usernameisemail ) return ;
2020-08-06 06:15:34 +03:00
// If this account is settings locked, return here.
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ;
2019-04-17 03:32:18 +03:00
// Change our own email address
2019-04-11 23:41:51 +03:00
if ( ( domain . auth == 'sspi' ) || ( domain . auth == 'ldap' ) ) return ;
2019-07-15 20:24:31 +03:00
if ( common . validateEmail ( command . email , 1 , 1024 ) == false ) return ;
// Always lowercase the email address
command . email = command . email . toLowerCase ( ) ;
2019-08-26 22:20:24 +03:00
if ( obj . user . email != command . email ) {
2019-01-05 04:59:13 +03:00
// Check if this email is already validated on a different account
2019-03-10 01:28:08 +03:00
db . GetUserWithVerifiedEmail ( domain . id , command . email , function ( err , docs ) {
2019-05-21 04:03:14 +03:00
if ( ( docs != null ) && ( docs . length > 0 ) ) {
2019-01-05 04:59:13 +03:00
// Notify the duplicate email error
2020-07-15 23:25:18 +03:00
try { ws . send ( JSON . stringify ( { action : 'msg' , type : 'notify' , title : 'Account Settings' , id : Math . random ( ) , tag : 'ServerNotify' , value : 'Failed to change email address, another account already using: ' + command . email + '.' } ) ) ; } catch ( ex ) { }
2019-01-05 04:59:13 +03:00
} else {
// Update the user's email
var oldemail = user . email ;
user . email = command . email ;
user . emailVerified = false ;
2019-03-10 01:28:08 +03:00
parent . db . SetUser ( user ) ;
2019-01-05 04:59:13 +03:00
// Event the change
2019-07-30 02:35:48 +03:00
var message = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , domain : domain . id } ;
2019-05-29 03:25:23 +03:00
if ( db . changeStream ) { message . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
2019-01-05 04:59:13 +03:00
if ( oldemail != null ) {
2019-02-06 06:07:12 +03:00
message . msg = 'Changed email of user ' + user . name + ' from ' + oldemail + ' to ' + user . email ;
2018-05-17 01:49:12 +03:00
} else {
2019-02-06 06:07:12 +03:00
message . msg = 'Set email of user ' + user . name + ' to ' + user . email ;
2018-05-17 01:49:12 +03:00
}
2019-04-17 03:32:18 +03:00
var targets = [ '*' , 'server-users' , user . _id ] ;
if ( user . groups ) { for ( var i in user . groups ) { targets . push ( 'server-users:' + i ) ; } }
parent . parent . DispatchEvent ( targets , obj , message ) ;
2019-01-16 23:04:48 +03:00
2020-04-20 12:44:14 +03:00
// Log in the auth log
if ( parent . parent . authlog ) { parent . parent . authLog ( 'https' , 'User ' + user . name + ' changed email from ' + oldemail + ' to ' + user . email ) ; }
2019-01-16 23:04:48 +03:00
// Send the verification email
2020-04-05 05:29:20 +03:00
if ( parent . parent . mailserver != null ) { parent . parent . mailserver . sendAccountCheckMail ( domain , user . name , user . email , parent . getLanguageCodes ( req ) ) ; }
2019-01-05 04:59:13 +03:00
}
} ) ;
2017-12-13 03:04:54 +03:00
}
2019-01-05 04:59:13 +03:00
break ;
}
case 'verifyemail' :
{
2020-08-06 06:15:34 +03:00
// If this account is settings locked, return here.
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ;
2019-01-05 04:59:13 +03:00
// Send a account email verification email
2019-04-11 23:41:51 +03:00
if ( ( domain . auth == 'sspi' ) || ( domain . auth == 'ldap' ) ) return ;
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . email , 3 , 1024 ) == false ) return ;
2019-07-15 20:24:31 +03:00
// Always lowercase the email address
command . email = command . email . toLowerCase ( ) ;
2019-08-26 22:20:24 +03:00
if ( ( parent . parent . mailserver != null ) && ( obj . user . email . toLowerCase ( ) == command . email ) ) {
2019-01-16 23:04:48 +03:00
// Send the verification email
2020-04-05 05:29:20 +03:00
parent . parent . mailserver . sendAccountCheckMail ( domain , user . name , user . email , parent . getLanguageCodes ( req ) ) ;
2017-12-13 03:04:54 +03:00
}
2019-01-05 04:59:13 +03:00
break ;
}
case 'wssessioncount' :
{
// Request a list of all web socket user session count
var wssessions = { } ;
2020-05-14 23:20:45 +03:00
if ( ( user . siteadmin & 2 ) == 0 ) { try { ws . send ( JSON . stringify ( { action : 'wssessioncount' , wssessions : { } , tag : command . tag } ) ) ; } catch ( ex ) { } break ; }
2019-03-10 01:28:08 +03:00
if ( parent . parent . multiServer == null ) {
2019-01-05 04:59:13 +03:00
// No peering, use simple session counting
2019-04-17 03:32:18 +03:00
for ( i in parent . wssessions ) {
2020-05-28 03:23:38 +03:00
if ( ( obj . crossDomain === true ) || ( parent . wssessions [ i ] [ 0 ] . domainid == domain . id ) ) {
2019-04-17 03:32:18 +03:00
if ( ( user . groups == null ) || ( user . groups . length == 0 ) ) {
// No user groups, count everything
wssessions [ i ] = parent . wssessions [ i ] . length ;
} else {
// Only count if session is for a user in our user groups
var sessionUser = parent . users [ parent . wssessions [ i ] [ 0 ] . userid ] ;
if ( ( sessionUser != null ) && findOne ( sessionUser . groups , user . groups ) ) {
wssessions [ i ] = parent . wssessions [ i ] . length ;
}
}
}
}
2019-01-05 04:59:13 +03:00
} else {
// We have peer servers, use more complex session counting
2019-04-17 03:32:18 +03:00
for ( i in parent . sessionsCount ) {
2020-05-28 03:23:38 +03:00
if ( ( obj . crossDomain === true ) || ( i . split ( '/' ) [ 1 ] == domain . id ) ) {
2019-04-17 03:32:18 +03:00
if ( ( user . groups == null ) || ( user . groups . length == 0 ) ) {
// No user groups, count everything
wssessions [ i ] = parent . sessionsCount [ i ] ;
} else {
// Only count if session is for a user in our user groups
var sessionUser = parent . users [ i ] ;
if ( ( sessionUser != null ) && findOne ( sessionUser . groups , user . groups ) ) {
wssessions [ i ] = parent . sessionsCount [ i ] ;
}
}
}
}
2017-10-24 00:09:58 +03:00
}
2019-01-05 04:59:13 +03:00
try { ws . send ( JSON . stringify ( { action : 'wssessioncount' , wssessions : wssessions , tag : command . tag } ) ) ; } catch ( ex ) { } // wssessions is: userid --> count
break ;
}
case 'deleteuser' :
{
// Delete a user account
2020-05-27 13:35:43 +03:00
var err = null , delusersplit , deluserid , deluser , deluserdomain ;
2019-06-30 21:34:27 +03:00
try {
if ( ( user . siteadmin & 2 ) == 0 ) { err = 'Permission denied' ; }
else if ( common . validateString ( command . userid , 1 , 2048 ) == false ) { err = 'Invalid userid' ; }
else {
2020-05-28 03:23:38 +03:00
if ( command . userid . indexOf ( '/' ) < 0 ) { command . userid = 'user/' + domain . id + '/' + command . userid ; }
2019-06-30 21:34:27 +03:00
delusersplit = command . userid . split ( '/' ) ;
deluserid = command . userid ;
deluser = parent . users [ deluserid ] ;
if ( deluser == null ) { err = 'User does not exists' ; }
2020-05-27 13:35:43 +03:00
else if ( ( obj . crossDomain !== true ) && ( ( delusersplit . length != 3 ) || ( delusersplit [ 1 ] != domain . id ) ) ) { err = 'Invalid domain' ; } // Invalid domain, operation only valid for current domain
2020-07-06 22:46:38 +03:00
else if ( ( deluser . siteadmin === SITERIGHT _ADMIN ) && ( user . siteadmin != SITERIGHT _ADMIN ) ) { err = 'Permission denied' ; } // Need full admin to remote another administrator
2020-05-27 13:35:43 +03:00
else if ( ( obj . crossDomain !== true ) && ( user . groups != null ) && ( user . groups . length > 0 ) && ( ( deluser . groups == null ) || ( findOne ( deluser . groups , user . groups ) == false ) ) ) { err = 'Invalid user group' ; } // Can only perform this operation on other users of our group.
2019-06-30 21:34:27 +03:00
}
} catch ( ex ) { err = 'Validation exception: ' + ex ; }
2020-05-27 13:35:43 +03:00
// Get domain
deluserdomain = domain ;
if ( obj . crossDomain === true ) { deluserdomain = parent . parent . config . domains [ delusersplit [ 1 ] ] ; }
if ( deluserdomain == null ) { err = 'Invalid domain' ; }
2019-06-30 21:34:27 +03:00
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'deleteuser' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2019-01-05 04:59:13 +03:00
2020-03-27 10:21:44 +03:00
// Remove all links to this user
2019-01-05 04:59:13 +03:00
if ( deluser . links != null ) {
2020-03-27 10:21:44 +03:00
for ( var i in deluser . links ) {
if ( i . startsWith ( 'mesh/' ) ) {
// Get the device group
mesh = parent . meshes [ i ] ;
if ( mesh ) {
// Remove user from the mesh
if ( mesh . links [ deluser . _id ] != null ) { delete mesh . links [ deluser . _id ] ; parent . db . Set ( mesh ) ; }
// Notify mesh change
2020-09-09 11:32:00 +03:00
change = 'Removed user ' + deluser . name + ' from device group ' + mesh . name ;
var event = { etype : 'mesh' , userid : user . _id , username : user . name , meshid : mesh . _id , name : mesh . name , mtype : mesh . mtype , desc : mesh . desc , action : 'meshchange' , links : mesh . links , msgid : 72 , msgArgs : [ deluser . name , mesh . name ] , msg : change , domain : deluserdomain . id , invite : mesh . invite } ;
2020-03-27 10:21:44 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the mesh. Another event will come.
2020-04-17 03:06:01 +03:00
parent . parent . DispatchEvent ( parent . CreateMeshDispatchTargets ( mesh , [ deluser . _id , user . _id ] ) , obj , event ) ;
2020-03-27 10:21:44 +03:00
}
} else if ( i . startsWith ( 'node/' ) ) {
// Get the node and the rights for this node
2020-05-27 13:35:43 +03:00
parent . GetNodeWithRights ( deluserdomain , deluser , i , function ( node , rights , visible ) {
2020-03-27 10:21:44 +03:00
if ( ( node == null ) || ( node . links == null ) || ( node . links [ deluser . _id ] == null ) ) return ;
// Remove the link and save the node to the database
delete node . links [ deluser . _id ] ;
if ( Object . keys ( node . links ) . length == 0 ) { delete node . links ; }
2020-03-31 03:47:04 +03:00
db . Set ( parent . cleanDevice ( node ) ) ;
2020-03-27 10:21:44 +03:00
// Event the node change
2020-09-09 04:59:58 +03:00
var event ;
if ( command . rights == 0 ) {
event = { etype : 'node' , userid : user . _id , username : user . name , action : 'changenode' , nodeid : node . _id , domain : deluserdomain . id , msgid : 60 , msgArgs : [ node . name ] , msg : 'Removed user device rights for ' + node . name , node : parent . CloneSafeNode ( node ) }
} else {
event = { etype : 'node' , userid : user . _id , username : user . name , action : 'changenode' , nodeid : node . _id , domain : deluserdomain . id , msgid : 61 , msgArgs : [ node . name ] , msg : 'Changed user device rights for ' + node . name , node : parent . CloneSafeNode ( node ) }
}
2020-03-27 10:21:44 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the mesh. Another event will come.
2020-04-13 21:24:56 +03:00
parent . parent . DispatchEvent ( parent . CreateNodeDispatchTargets ( node . meshid , node . _id ) , obj , event ) ;
2020-03-27 10:21:44 +03:00
} ) ;
2020-05-28 04:26:54 +03:00
} else if ( i . startsWith ( 'ugrp/' ) ) {
// Get the device group
var ugroup = parent . userGroups [ i ] ;
if ( ugroup ) {
// Remove user from the user group
if ( ugroup . links [ deluser . _id ] != null ) { delete ugroup . links [ deluser . _id ] ; parent . db . Set ( ugroup ) ; }
// Notify user group change
change = 'Removed user ' + deluser . name + ' from user group ' + ugroup . name ;
2020-09-09 04:59:58 +03:00
var event = { etype : 'ugrp' , userid : user . _id , username : user . name , ugrpid : ugroup . _id , name : ugroup . name , desc : ugroup . desc , action : 'usergroupchange' , links : ugroup . links , msgid : 62 , msgArgs : [ deluser . name , ugroup . name ] , msg : 'Removed user ' + deluser . name + ' from user group ' + ugroup . name , addUserDomain : deluserdomain . id } ;
2020-05-28 04:26:54 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user group. Another event will come.
parent . parent . DispatchEvent ( [ '*' , ugroup . _id , user . _id , deluser . _id ] , obj , event ) ;
}
2018-05-17 23:37:50 +03:00
}
}
2019-01-05 04:59:13 +03:00
}
2018-05-17 23:37:50 +03:00
2019-04-30 01:31:11 +03:00
db . Remove ( 'ws' + deluser . _id ) ; // Remove user web state
db . Remove ( 'nt' + deluser . _id ) ; // Remove notes for this user
2018-05-17 23:37:50 +03:00
2019-01-05 04:59:13 +03:00
// Delete all files on the server for this account
try {
2019-03-10 01:28:08 +03:00
var deluserpath = parent . getServerRootFilePath ( deluser ) ;
if ( deluserpath != null ) { parent . deleteFolderRec ( deluserpath ) ; }
2019-01-05 04:59:13 +03:00
} catch ( e ) { }
2017-10-24 00:09:58 +03:00
2019-03-10 01:28:08 +03:00
db . Remove ( deluserid ) ;
delete parent . users [ deluserid ] ;
2019-04-17 03:32:18 +03:00
var targets = [ '*' , 'server-users' ] ;
if ( deluser . groups ) { for ( var i in deluser . groups ) { targets . push ( 'server-users:' + i ) ; } }
2020-09-09 04:59:58 +03:00
parent . parent . DispatchEvent ( targets , obj , { etype : 'user' , userid : deluserid , username : deluser . name , action : 'accountremove' , msgid : 63 , msg : 'Account removed' , domain : deluserdomain . id } ) ;
2019-03-10 01:28:08 +03:00
parent . parent . DispatchEvent ( [ deluserid ] , obj , 'close' ) ;
2017-10-24 00:09:58 +03:00
2019-06-30 21:34:27 +03:00
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'deleteuser' , responseid : command . responseid , result : 'ok' } ) ) ; } catch ( ex ) { } }
2020-04-20 12:44:14 +03:00
// Log in the auth log
if ( parent . parent . authlog ) { parent . parent . authLog ( 'https' , 'User ' + user . name + ' deleted user account ' + deluser . name ) ; }
2019-02-15 01:44:38 +03:00
break ;
}
case 'userbroadcast' :
{
2019-06-30 21:34:27 +03:00
var err = null ;
try {
// Broadcast a message to all currently connected users.
2019-12-30 09:38:53 +03:00
if ( ( user . siteadmin & 2 ) == 0 ) { err = "Permission denied" ; }
else if ( common . validateString ( command . msg , 1 , 512 ) == false ) { err = "Message is too long" ; } // Notification message is between 1 and 256 characters
} catch ( ex ) { err = "Validation exception: " + ex ; }
2019-06-30 21:34:27 +03:00
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'userbroadcast' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2019-02-15 01:44:38 +03:00
// Create the notification message
2020-01-07 22:08:32 +03:00
var notification = { action : 'msg' , type : 'notify' , domain : domain . id , value : command . msg , title : user . name , icon : 0 , tag : 'broadcast' , id : Math . random ( ) } ;
2020-08-01 01:08:03 +03:00
if ( ( typeof command . maxtime == 'number' ) && ( command . maxtime > 0 ) ) { notification . maxtime = command . maxtime ; }
2019-02-15 01:44:38 +03:00
// Send the notification on all user sessions for this server
2019-03-18 05:34:52 +03:00
for ( var i in parent . wssessions2 ) {
try {
2019-04-17 03:32:18 +03:00
if ( parent . wssessions2 [ i ] . domainid == domain . id ) {
2019-12-30 09:38:53 +03:00
var sessionUser = parent . users [ parent . wssessions2 [ i ] . userid ] ;
if ( ( command . target == null ) || ( ( sessionUser . links ) != null && ( sessionUser . links [ command . target ] != null ) ) ) {
if ( ( user . groups == null ) || ( user . groups . length == 0 ) ) {
// We are part of no user groups, send to everyone.
2019-04-17 03:32:18 +03:00
parent . wssessions2 [ i ] . send ( JSON . stringify ( notification ) ) ;
2019-12-30 09:38:53 +03:00
} else {
// We are part of user groups, only send to sessions of users in our groups.
if ( ( sessionUser != null ) && findOne ( sessionUser . groups , user . groups ) ) {
parent . wssessions2 [ i ] . send ( JSON . stringify ( notification ) ) ;
}
2019-04-17 03:32:18 +03:00
}
}
}
2019-03-18 05:34:52 +03:00
} catch ( ex ) { }
}
2019-02-15 01:44:38 +03:00
// TODO: Notify all sessions on other peers.
2019-06-30 21:34:27 +03:00
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'userbroadcast' , responseid : command . responseid , result : 'ok' } ) ) ; } catch ( ex ) { } }
2019-05-15 00:39:26 +03:00
break ;
}
case 'adduserbatch' :
{
2020-06-22 08:33:59 +03:00
var err = null ;
2019-05-15 00:39:26 +03:00
// Add many new user accounts
2020-06-22 08:33:59 +03:00
if ( ( user . siteadmin & 2 ) == 0 ) { err = 'Access denied' ; }
else if ( ( domain . auth == 'sspi' ) || ( domain . auth == 'ldap' ) ) { err = 'Unable to create users when in SSPI or LDAP mode' ; }
else if ( ! Array . isArray ( command . users ) ) { err = 'Invalid users' ; }
else {
var userCount = 0 ;
for ( var i in command . users ) {
if ( domain . usernameisemail ) { if ( command . users [ i ] . email ) { command . users [ i ] . user = command . users [ i ] . email ; } else { command . users [ i ] . email = command . users [ i ] . user ; } } // If the email is the username, set this here.
if ( common . validateUsername ( command . users [ i ] . user , 1 , 256 ) == false ) { err = 'Invalid username' ; break ; } // Username is between 1 and 64 characters, no spaces
if ( ( command . users [ i ] . user [ 0 ] == '~' ) || ( command . users [ i ] . user . indexOf ( '/' ) >= 0 ) ) { err = 'Invalid username' ; break ; } // This is a reserved user name or invalid name
if ( common . validateString ( command . users [ i ] . pass , 1 , 256 ) == false ) { err = 'Invalid password' ; break ; } // Password is between 1 and 256 characters
if ( common . checkPasswordRequirements ( command . users [ i ] . pass , domain . passwordrequirements ) == false ) { err = 'Invalid password' ; break ; } // Password does not meet requirements
if ( ( command . users [ i ] . email != null ) && ( common . validateEmail ( command . users [ i ] . email , 1 , 1024 ) == false ) ) { err = 'Invalid email' ; break ; } // Check if this is a valid email address
userCount ++ ;
}
2019-05-15 00:39:26 +03:00
}
2020-06-22 08:33:59 +03:00
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'adduserbatch' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2019-05-15 00:39:26 +03:00
// Check if we exceed the maximum number of user accounts
db . isMaxType ( domain . limits . maxuseraccounts + userCount , 'user' , domain . id , function ( maxExceed ) {
if ( maxExceed ) {
// Account count exceed, do notification
// Create the notification message
2020-01-07 22:08:32 +03:00
var notification = { action : 'msg' , type : 'notify' , id : Math . random ( ) , value : "Account limit reached." , title : "Server Limit" , userid : user . _id , username : user . name , domain : domain . id } ;
2019-05-15 00:39:26 +03:00
// Get the list of sessions for this user
var sessions = parent . wssessions [ user . _id ] ;
if ( sessions != null ) { for ( i in sessions ) { try { if ( sessions [ i ] . domainid == domain . id ) { sessions [ i ] . send ( JSON . stringify ( notification ) ) ; } } catch ( ex ) { } } }
// TODO: Notify all sessions on other peers.
} else {
for ( var i in command . users ) {
// Check if this is an existing user
var newuserid = 'user/' + domain . id + '/' + command . users [ i ] . user . toLowerCase ( ) ;
var newuser = { type : 'user' , _id : newuserid , name : command . users [ i ] . user , creation : Math . floor ( Date . now ( ) / 1000 ) , domain : domain . id } ;
if ( domain . newaccountsrights ) { newuser . siteadmin = domain . newaccountsrights ; }
2019-07-15 20:24:31 +03:00
if ( command . users [ i ] . email != null ) { newuser . email = command . users [ i ] . email . toLowerCase ( ) ; if ( command . users [ i ] . emailVerified === true ) { newuser . emailVerified = true ; } } // Email, always lowercase
2019-05-15 00:39:26 +03:00
if ( command . users [ i ] . resetNextLogin === true ) { newuser . passchange = - 1 ; } else { newuser . passchange = Math . floor ( Date . now ( ) / 1000 ) ; }
2019-07-28 22:16:30 +03:00
if ( user . groups ) { newuser . groups = user . groups ; } // New accounts are automatically part of our groups (Realms).
2019-05-15 00:39:26 +03:00
if ( parent . users [ newuserid ] == null ) {
parent . users [ newuserid ] = newuser ;
// Create a user, generate a salt and hash the password
require ( './pass' ) . hash ( command . users [ i ] . pass , function ( err , salt , hash , newuser ) {
if ( err ) throw err ;
newuser . salt = salt ;
newuser . hash = hash ;
db . SetUser ( newuser ) ;
2019-05-30 00:36:14 +03:00
var event , targets = [ '*' , 'server-users' ] ;
2019-05-15 00:39:26 +03:00
if ( newuser . groups ) { for ( var i in newuser . groups ) { targets . push ( 'server-users:' + i ) ; } }
if ( newuser . email == null ) {
2020-09-09 11:32:00 +03:00
event = { etype : 'user' , userid : newuser . _id , username : newuser . name , account : parent . CloneSafeUser ( newuser ) , action : 'accountcreate' , msgid : 64 , msgArgs : [ newuser . name ] , msg : 'Account created, username is ' + newuser . name , domain : domain . id } ;
2019-05-15 00:39:26 +03:00
} else {
2020-09-09 11:32:00 +03:00
event = { etype : 'user' , userid : newuser . _id , username : newuser . name , account : parent . CloneSafeUser ( newuser ) , action : 'accountcreate' , msgid : 65 , msgArgs : [ newuser . email ] , msg : 'Account created, email is ' + newuser . email , domain : domain . id } ;
2019-05-15 00:39:26 +03:00
}
2019-05-30 00:36:14 +03:00
if ( parent . db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to create the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2020-04-20 12:44:14 +03:00
// Log in the auth log
if ( parent . parent . authlog ) { parent . parent . authLog ( 'https' , 'User ' + user . name + ' created user account ' + newuser . name ) ; }
2019-05-15 00:39:26 +03:00
} , newuser ) ;
}
}
}
} ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'adduser' :
{
2019-07-09 01:59:44 +03:00
// If the email is the username, set this here.
if ( domain . usernameisemail ) { if ( command . email ) { command . username = command . email ; } else { command . email = command . username ; } }
2019-07-23 02:00:43 +03:00
// Randomize the password if needed
if ( command . randomPassword === true ) { command . pass = getRandomPassword ( ) ; }
2019-01-05 04:59:13 +03:00
// Add a new user account
2020-05-27 13:35:43 +03:00
var err = null , newusername , newuserid , newuserdomain ;
2019-06-30 21:34:27 +03:00
try {
if ( ( user . siteadmin & 2 ) == 0 ) { err = 'Permission denied' ; }
2019-07-09 01:59:44 +03:00
else if ( common . validateUsername ( command . username , 1 , 256 ) == false ) { err = 'Invalid username' ; } // Username is between 1 and 64 characters, no spaces
2020-05-14 08:30:59 +03:00
else if ( ( command . username [ 0 ] == '~' ) || ( command . username . indexOf ( '/' ) >= 0 ) ) { err = 'Invalid username' ; } // Usernames cant' start with ~ and can't have '/'
2019-06-30 21:34:27 +03:00
else if ( common . validateString ( command . pass , 1 , 256 ) == false ) { err = 'Invalid password' ; } // Password is between 1 and 256 characters
2019-07-23 02:00:43 +03:00
else if ( ( command . randomPassword !== true ) && ( common . checkPasswordRequirements ( command . pass , domain . passwordrequirements ) == false ) ) { err = 'Invalid password' ; } // Password does not meet requirements
2019-07-15 20:24:31 +03:00
else if ( ( command . email != null ) && ( common . validateEmail ( command . email , 1 , 1024 ) == false ) ) { err = 'Invalid email' ; } // Check if this is a valid email address
2020-05-27 13:35:43 +03:00
else if ( ( obj . crossDomain === true ) && ( command . domain != null ) && ( ( typeof command . domain != 'string' ) || ( parent . parent . config . domains [ command . domain ] == null ) ) ) { err = 'Invalid domain' ; } // Check if this is a valid domain
2019-06-30 21:34:27 +03:00
else {
2020-05-27 13:35:43 +03:00
newuserdomain = domain ;
if ( ( obj . crossDomain === true ) && ( command . domain != null ) ) { newuserdomain = parent . parent . config . domains [ command . domain ] ; }
2019-06-30 21:34:27 +03:00
newusername = command . username ;
2020-05-27 13:35:43 +03:00
newuserid = 'user/' + newuserdomain . id + '/' + command . username . toLowerCase ( ) ;
2020-05-14 08:30:59 +03:00
if ( command . siteadmin != null ) {
2019-06-30 21:34:27 +03:00
if ( ( typeof command . siteadmin != 'number' ) || ( Number . isInteger ( command . siteadmin ) == false ) ) { err = 'Invalid site permissions' ; } // Check permissions
2020-07-06 22:46:38 +03:00
else if ( ( user . siteadmin != SITERIGHT _ADMIN ) && ( ( command . siteadmin & ( SITERIGHT _ADMIN - 224 ) ) != 0 ) ) { err = 'Invalid site permissions' ; }
2019-06-30 21:34:27 +03:00
}
if ( parent . users [ newuserid ] ) { err = 'User already exists' ; } // Account already exists
2020-05-27 13:35:43 +03:00
else if ( ( newuserdomain . auth == 'sspi' ) || ( newuserdomain . auth == 'ldap' ) ) { err = 'Unable to add user in this mode' ; }
2019-06-30 21:34:27 +03:00
}
} catch ( ex ) { err = 'Validation exception' ; }
// Handle any errors
if ( err != null ) {
2020-04-06 04:13:47 +03:00
if ( command . responseid != null ) {
try { ws . send ( JSON . stringify ( { action : 'adduser' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { }
} else {
// Send error back, user not found.
displayNotificationMessage ( err , 'New Account' , 'ServerNotify' ) ;
}
2019-06-30 21:34:27 +03:00
break ;
}
2019-02-11 07:13:03 +03:00
// Check if we exceed the maximum number of user accounts
2020-05-27 13:35:43 +03:00
db . isMaxType ( newuserdomain . limits . maxuseraccounts , 'user' , newuserdomain . id , function ( maxExceed ) {
2019-02-11 07:13:03 +03:00
if ( maxExceed ) {
// Account count exceed, do notification
2019-06-30 21:34:27 +03:00
if ( command . responseid != null ) {
// Respond privately if requested
try { ws . send ( JSON . stringify ( { action : 'adduser' , responseid : command . responseid , result : 'maxUsersExceed' } ) ) ; } catch ( ex ) { }
} else {
// Create the notification message
2020-05-27 13:35:43 +03:00
var notification = { action : 'msg' , type : 'notify' , id : Math . random ( ) , value : "Account limit reached." , title : "Server Limit" , userid : user . _id , username : user . name , domain : newuserdomain . id } ;
2019-02-11 07:13:03 +03:00
2019-06-30 21:34:27 +03:00
// Get the list of sessions for this user
var sessions = parent . wssessions [ user . _id ] ;
2020-05-27 13:35:43 +03:00
if ( sessions != null ) { for ( i in sessions ) { try { if ( sessions [ i ] . domainid == newuserdomain . id ) { sessions [ i ] . send ( JSON . stringify ( notification ) ) ; } } catch ( ex ) { } } }
2019-06-30 21:34:27 +03:00
// TODO: Notify all sessions on other peers.
}
2019-02-11 07:13:03 +03:00
} else {
2019-12-27 00:52:09 +03:00
// Remove any events for this userid
2020-05-27 13:35:43 +03:00
if ( command . removeEvents === true ) { db . RemoveAllUserEvents ( newuserdomain . id , newuserid ) ; }
2019-12-27 00:52:09 +03:00
2019-06-30 21:34:27 +03:00
// Create a new user
2020-05-27 13:35:43 +03:00
var newuser = { type : 'user' , _id : newuserid , name : newusername , creation : Math . floor ( Date . now ( ) / 1000 ) , domain : newuserdomain . id } ;
2019-06-30 21:34:27 +03:00
if ( command . siteadmin != null ) { newuser . siteadmin = command . siteadmin ; }
2020-05-27 13:35:43 +03:00
else if ( newuserdomain . newaccountsrights ) { newuser . siteadmin = newuserdomain . newaccountsrights ; }
2019-07-15 20:24:31 +03:00
if ( command . email != null ) { newuser . email = command . email . toLowerCase ( ) ; if ( command . emailVerified === true ) { newuser . emailVerified = true ; } } // Email
2019-03-01 03:17:22 +03:00
if ( command . resetNextLogin === true ) { newuser . passchange = - 1 ; } else { newuser . passchange = Math . floor ( Date . now ( ) / 1000 ) ; }
2019-07-28 22:16:30 +03:00
if ( user . groups ) { newuser . groups = user . groups ; } // New accounts are automatically part of our groups (Realms).
2019-10-25 11:16:00 +03:00
2020-05-28 04:26:54 +03:00
// Auto-join any user groups
if ( typeof newuserdomain . newaccountsusergroups == 'object' ) {
for ( var i in newuserdomain . newaccountsusergroups ) {
var ugrpid = newuserdomain . newaccountsusergroups [ i ] ;
if ( ugrpid . indexOf ( '/' ) < 0 ) { ugrpid = 'ugrp/' + newuserdomain . id + '/' + ugrpid ; }
var ugroup = parent . userGroups [ ugrpid ] ;
if ( ugroup != null ) {
// Add group to the user
if ( newuser . links == null ) { newuser . links = { } ; }
newuser . links [ ugroup . _id ] = { rights : 1 } ;
// Add user to the group
ugroup . links [ newuser . _id ] = { userid : newuser . _id , name : newuser . name , rights : 1 } ;
db . Set ( ugroup ) ;
// Notify user group change
2020-09-09 11:32:00 +03:00
var event = { etype : 'ugrp' , userid : user . _id , username : user . name , ugrpid : ugroup . _id , name : ugroup . name , desc : ugroup . desc , action : 'usergroupchange' , links : ugroup . links , msgid : 80 , msgArgs : [ newuser . name , ugroup . name ] , msg : 'Added user ' + newuser . name + ' to user group ' + ugroup . name , addUserDomain : newuserdomain . id } ;
2020-05-28 04:26:54 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user group. Another event will come.
parent . parent . DispatchEvent ( [ '*' , ugroup . _id , user . _id , newuser . _id ] , obj , event ) ;
}
}
}
2019-03-10 01:28:08 +03:00
parent . users [ newuserid ] = newuser ;
2019-03-01 03:17:22 +03:00
2019-02-11 07:13:03 +03:00
// Create a user, generate a salt and hash the password
2019-05-15 00:39:26 +03:00
require ( './pass' ) . hash ( command . pass , function ( err , salt , hash , tag ) {
2019-06-30 21:34:27 +03:00
if ( err == null ) {
newuser . salt = salt ;
newuser . hash = hash ;
db . SetUser ( newuser ) ;
var event , targets = [ '*' , 'server-users' ] ;
if ( newuser . groups ) { for ( var i in newuser . groups ) { targets . push ( 'server-users:' + i ) ; } }
if ( command . email == null ) {
2020-09-09 11:32:00 +03:00
event = { etype : 'user' , userid : newuser . _id , username : newusername , account : parent . CloneSafeUser ( newuser ) , action : 'accountcreate' , msgid : 64 , msgArgs : [ command . username ] , msg : 'Account created, username is ' + command . username , domain : newuserdomain . id } ;
2019-06-30 21:34:27 +03:00
} else {
2020-09-09 11:32:00 +03:00
event = { etype : 'user' , userid : newuser . _id , username : newusername , account : parent . CloneSafeUser ( newuser ) , action : 'accountcreate' , msgid : 65 , msgArgs : [ command . email . toLowerCase ( ) ] , msg : 'Account created, email is ' + command . email . toLowerCase ( ) , domain : newuserdomain . id } ;
2019-06-30 21:34:27 +03:00
}
if ( parent . db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to create the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2019-07-23 02:00:43 +03:00
// Perform email invitation
if ( ( command . emailInvitation == true ) && ( command . emailVerified == true ) && command . email && parent . parent . mailserver ) {
2020-07-10 21:59:28 +03:00
parent . parent . mailserver . sendAccountInviteMail ( newuserdomain , ( user . realname ? user . realname : user . name ) , newusername , command . email . toLowerCase ( ) , command . pass , parent . getLanguageCodes ( req ) ) ;
2019-07-23 02:00:43 +03:00
}
2020-04-20 12:44:14 +03:00
// Log in the auth log
2020-07-10 21:59:28 +03:00
if ( parent . parent . authlog ) { parent . parent . authLog ( 'https' , 'User ' + user . name + ' created a user account ' + newuser . name ) ; }
2020-04-20 12:44:14 +03:00
2019-06-30 21:34:27 +03:00
// OK Response
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'adduser' , responseid : command . responseid , result : 'ok' } ) ) ; } catch ( ex ) { } }
2019-05-15 00:39:26 +03:00
} else {
2019-06-30 21:34:27 +03:00
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'adduser' , responseid : command . responseid , result : 'passwordHashError' } ) ) ; } catch ( ex ) { } }
2019-05-15 00:39:26 +03:00
}
} , 0 ) ;
2019-02-11 07:13:03 +03:00
}
} ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'edituser' :
{
2020-05-27 13:35:43 +03:00
// Must be user administrator or edit self.
if ( ( ( user . siteadmin & 2 ) == 0 ) && ( user . _id != command . id ) ) break ;
2019-01-05 04:59:13 +03:00
// Edit a user account, may involve changing email or administrator permissions
2020-05-27 13:35:43 +03:00
var chguser = parent . users [ command . id ] ;
change = 0 ;
if ( chguser ) {
// If the target user is admin and we are not admin, no changes can be made.
2020-07-06 22:46:38 +03:00
if ( ( chguser . siteadmin === SITERIGHT _ADMIN ) && ( user . siteadmin != SITERIGHT _ADMIN ) ) return ;
2020-05-27 13:35:43 +03:00
// Can only perform this operation on other users of our group.
2020-07-06 22:46:38 +03:00
if ( user . siteadmin != SITERIGHT _ADMIN ) {
2020-05-27 13:35:43 +03:00
if ( ( user . groups != null ) && ( user . groups . length > 0 ) && ( ( chguser . groups == null ) || ( findOne ( chguser . groups , user . groups ) == false ) ) ) return ;
}
2019-05-04 22:55:46 +03:00
2020-05-27 13:35:43 +03:00
// Fetch and validate the user domain
var edituserdomainid = command . id . split ( '/' ) [ 1 ] ;
if ( ( obj . crossDomain !== true ) && ( edituserdomainid != domain . id ) ) break ;
var edituserdomain = parent . parent . config . domains [ edituserdomainid ] ;
if ( edituserdomain == null ) break ;
2019-05-04 22:55:46 +03:00
2020-05-27 13:35:43 +03:00
// Validate and change email
if ( edituserdomain . usernameisemail !== true ) {
2020-07-10 20:33:41 +03:00
if ( common . validateString ( command . email , 1 , 1024 ) && ( chguser . email != command . email ) ) {
if ( command . email == '' ) { delete chguser . email ; } else { chguser . email = command . email . toLowerCase ( ) ; }
change = 1 ;
}
}
// Validate and change realm name
2020-07-10 20:45:41 +03:00
if ( common . validateString ( command . realname , 0 , 256 ) && ( chguser . realname != command . realname ) ) {
2020-07-10 20:33:41 +03:00
if ( command . realname == '' ) { delete chguser . realname ; } else { chguser . realname = command . realname ; }
change = 1 ;
2020-05-27 13:35:43 +03:00
}
2019-05-04 22:55:46 +03:00
2020-05-27 13:35:43 +03:00
// Make changes
if ( ( command . emailVerified === true || command . emailVerified === false ) && ( chguser . emailVerified != command . emailVerified ) ) { chguser . emailVerified = command . emailVerified ; change = 1 ; }
if ( ( common . validateInt ( command . quota , 0 ) || command . quota == null ) && ( command . quota != chguser . quota ) ) { chguser . quota = command . quota ; if ( chguser . quota == null ) { delete chguser . quota ; } change = 1 ; }
if ( ( command . consent != null ) && ( typeof command . consent == 'number' ) ) { if ( command . consent == 0 ) { delete chguser . consent ; } else { chguser . consent = command . consent ; } change = 1 ; }
if ( ( command . phone != null ) && ( typeof command . phone == 'string' ) && ( ( command . phone == '' ) || isPhoneNumber ( command . phone ) ) ) { if ( command . phone == '' ) { delete chguser . phone ; } else { chguser . phone = command . phone ; } change = 1 ; }
2019-04-13 03:56:49 +03:00
2020-05-27 13:35:43 +03:00
// Site admins can change any server rights, user managers can only change AccountLock, NoMeshCmd and NoNewGroups
2020-06-19 06:51:41 +03:00
if ( common . validateInt ( command . siteadmin ) && ( chguser . _id !== user . _id ) && ( chguser . siteadmin != command . siteadmin ) ) { // We can't change our own siteadmin permissions.
2020-05-27 13:35:43 +03:00
var chgusersiteadmin = chguser . siteadmin ? chguser . siteadmin : 0 ;
2020-07-06 22:46:38 +03:00
if ( user . siteadmin === SITERIGHT _ADMIN ) { chguser . siteadmin = command . siteadmin ; change = 1 ; }
2020-06-19 06:51:41 +03:00
else if ( user . siteadmin & 2 ) {
var mask = 0xFFFFFF1D ; // Mask: 2 (User Mangement) + 32 (Account locked) + 64 (No New Groups) + 128 (No Tools)
if ( ( user . siteadmin & 256 ) != 0 ) { mask -= 256 ; } // Mask: Manage User Groups
if ( ( user . siteadmin & 512 ) != 0 ) { mask -= 512 ; } // Mask: Manage Recordings
if ( ( ( chgusersiteadmin ^ command . siteadmin ) & mask ) == 0 ) { chguser . siteadmin = command . siteadmin ; change = 1 ; }
}
2020-05-27 13:35:43 +03:00
}
// When sending a notification about a group change, we need to send to all the previous and new groups.
var allTargetGroups = chguser . groups ;
2020-07-06 22:46:38 +03:00
if ( ( Array . isArray ( command . groups ) ) && ( ( user . _id != command . id ) || ( user . siteadmin === SITERIGHT _ADMIN ) ) ) {
2020-05-27 13:35:43 +03:00
if ( command . groups . length == 0 ) {
// Remove the user groups
if ( chguser . groups != null ) { delete chguser . groups ; change = 1 ; }
} else {
// Arrange the user groups
var groups2 = [ ] ;
for ( var i in command . groups ) {
if ( typeof command . groups [ i ] == 'string' ) {
var gname = command . groups [ i ] . trim ( ) . toLowerCase ( ) ;
if ( ( gname . length > 0 ) && ( gname . length <= 64 ) && ( groups2 . indexOf ( gname ) == - 1 ) ) { groups2 . push ( gname ) ; }
2019-04-16 01:05:09 +03:00
}
2020-05-27 13:35:43 +03:00
}
groups2 . sort ( ) ;
2019-04-16 01:05:09 +03:00
2020-05-27 13:35:43 +03:00
// Set the user groups (Realms)
if ( chguser . groups != groups2 ) { chguser . groups = groups2 ; change = 1 ; }
2019-04-17 03:32:18 +03:00
2020-05-27 13:35:43 +03:00
// Add any missing groups in the target list
if ( allTargetGroups == null ) { allTargetGroups = [ ] ; }
for ( var i in groups2 ) { if ( allTargetGroups . indexOf ( i ) == - 1 ) { allTargetGroups . push ( i ) ; } }
2019-04-13 03:56:49 +03:00
}
2020-05-27 13:35:43 +03:00
}
2019-04-13 03:56:49 +03:00
2020-05-27 13:35:43 +03:00
if ( change == 1 ) {
// Update the user
db . SetUser ( chguser ) ;
parent . parent . DispatchEvent ( [ chguser . _id ] , obj , 'resubscribe' ) ;
2019-04-17 03:32:18 +03:00
2020-05-27 13:35:43 +03:00
var targets = [ '*' , 'server-users' , user . _id , chguser . _id ] ;
if ( allTargetGroups ) { for ( var i in allTargetGroups ) { targets . push ( 'server-users:' + i ) ; } }
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( chguser ) , action : 'accountchange' , msgid : 66 , msgArgs : [ chguser . name ] , msg : 'Account changed: ' + chguser . name , domain : edituserdomain . id } ;
2020-05-27 13:35:43 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
}
2020-07-06 22:46:38 +03:00
if ( ( chguser . siteadmin ) && ( chguser . siteadmin !== SITERIGHT _ADMIN ) && ( chguser . siteadmin & 32 ) ) {
2020-05-27 13:35:43 +03:00
// If the user is locked out of this account, disconnect now
parent . parent . DispatchEvent ( [ chguser . _id ] , obj , 'close' ) ; // Disconnect all this user's sessions
2017-10-24 00:09:58 +03:00
}
}
2019-07-22 21:25:18 +03:00
break ;
}
2019-12-30 05:10:58 +03:00
case 'usergroups' :
{
2020-05-28 01:31:10 +03:00
// Return only groups in the same administrative domain
2020-01-03 04:45:17 +03:00
if ( ( user . siteadmin & SITERIGHT _USERGROUPS ) == 0 ) {
2020-01-07 22:08:32 +03:00
// We are not user group administrator, return a list with limited data for our domain.
2020-01-03 04:45:17 +03:00
var groups = { } , groupCount = 0 ;
2020-01-07 22:08:32 +03:00
for ( var i in parent . userGroups ) { if ( parent . userGroups [ i ] . domain == domain . id ) { groupCount ++ ; groups [ i ] = { name : parent . userGroups [ i ] . name } ; } }
2020-01-03 04:45:17 +03:00
try { ws . send ( JSON . stringify ( { action : 'usergroups' , ugroups : groupCount ? groups : null , tag : command . tag } ) ) ; } catch ( ex ) { }
} else {
2020-01-07 22:08:32 +03:00
// We are user group administrator, return a full user group list for our domain.
var groups = { } , groupCount = 0 ;
2020-05-28 01:31:10 +03:00
for ( var i in parent . userGroups ) { if ( ( obj . crossDomain == true ) || ( parent . userGroups [ i ] . domain == domain . id ) ) { groupCount ++ ; groups [ i ] = parent . userGroups [ i ] ; } }
2020-01-07 22:08:32 +03:00
try { ws . send ( JSON . stringify ( { action : 'usergroups' , ugroups : groupCount ? groups : null , tag : command . tag } ) ) ; } catch ( ex ) { }
2020-01-03 04:45:17 +03:00
}
2019-12-30 05:10:58 +03:00
break ;
}
2019-12-28 09:41:06 +03:00
case 'createusergroup' :
{
2020-05-28 01:31:10 +03:00
var ugrpdomain , err = null ;
2019-12-30 05:10:58 +03:00
try {
// Check if we have new group restriction
2020-05-28 01:31:10 +03:00
if ( ( user . siteadmin & SITERIGHT _USERGROUPS ) == 0 ) { err = "Permission denied" ; }
2019-12-30 05:10:58 +03:00
2020-05-28 01:31:10 +03:00
// Create user group validation
else if ( common . validateString ( command . name , 1 , 64 ) == false ) { err = "Invalid group name" ; } // User group name is between 1 and 64 characters
else if ( ( command . desc != null ) && ( common . validateString ( command . desc , 0 , 1024 ) == false ) ) { err = "Invalid group description" ; } // User group description is between 0 and 1024 characters
2020-01-03 00:29:55 +03:00
// If we are cloning from an existing user group, check that.
if ( command . clone ) {
2020-05-28 01:31:10 +03:00
if ( common . validateString ( command . clone , 1 , 256 ) == false ) { err = "Invalid clone groupid" ; }
2020-01-03 00:29:55 +03:00
else {
var clonesplit = command . clone . split ( '/' ) ;
2020-05-28 01:31:10 +03:00
if ( ( clonesplit . length != 3 ) || ( clonesplit [ 0 ] != 'ugrp' ) || ( ( command . domain == null ) && ( clonesplit [ 1 ] != domain . id ) ) ) { err = "Invalid clone groupid" ; }
else if ( parent . userGroups [ command . clone ] == null ) { err = "Invalid clone groupid" ; }
2020-01-03 00:29:55 +03:00
}
2020-05-28 01:31:10 +03:00
2020-07-06 22:46:38 +03:00
if ( err == null ) {
// Get new user group domain
ugrpdomain = parent . parent . config . domains [ clonesplit [ 1 ] ] ;
if ( ugrpdomain == null ) { err = "Invalid domain" ; }
}
2020-05-28 01:31:10 +03:00
} else {
// Get new user group domain
ugrpdomain = domain ;
if ( ( obj . crossDomain === true ) && ( command . domain != null ) ) { ugrpdomain = parent . parent . config . domains [ command . domain ] ; }
if ( ugrpdomain == null ) { err = "Invalid domain" ; }
2020-01-03 00:29:55 +03:00
}
2020-05-28 01:31:10 +03:00
// In some situations, we need a verified email address to create a device group.
2020-07-06 22:46:38 +03:00
if ( ( err == null ) && ( parent . parent . mailserver != null ) && ( ugrpdomain . auth != 'sspi' ) && ( ugrpdomain . auth != 'ldap' ) && ( user . emailVerified !== true ) && ( user . siteadmin != SITERIGHT _ADMIN ) ) { err = "Email verification required" ; } // User must verify it's email first.
2020-05-28 01:31:10 +03:00
} catch ( ex ) { err = "Validation exception: " + ex ; }
2019-12-30 05:10:58 +03:00
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'createusergroup' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
// We only create Agent-less Intel AMT mesh (Type1), or Agent mesh (Type2)
parent . crypto . randomBytes ( 48 , function ( err , buf ) {
// Create new device group identifier
2020-05-28 01:31:10 +03:00
var ugrpid = 'ugrp/' + ugrpdomain . id + '/' + buf . toString ( 'base64' ) . replace ( /\+/g , '@' ) . replace ( /\//g , '$' ) ;
2019-12-30 05:10:58 +03:00
// Create the new device group
2020-05-28 01:31:10 +03:00
var ugrp = { type : 'ugrp' , _id : ugrpid , name : command . name , desc : command . desc , domain : ugrpdomain . id , links : { } } ;
2020-01-03 00:29:55 +03:00
// Clone the existing group if required
var pendingDispatchEvents = [ ] ;
if ( command . clone != null ) {
var cgroup = parent . userGroups [ command . clone ] ;
if ( cgroup . links ) {
for ( var i in cgroup . links ) {
if ( i . startsWith ( 'user/' ) ) {
var xuser = parent . users [ i ] ;
if ( ( xuser != null ) && ( xuser . links != null ) ) {
ugrp . links [ i ] = { rights : cgroup . links [ i ] . rights } ;
xuser . links [ ugrpid ] = { rights : cgroup . links [ i ] . rights } ;
db . SetUser ( xuser ) ;
parent . parent . DispatchEvent ( [ xuser . _id ] , obj , 'resubscribe' ) ;
// Notify user change
var targets = [ '*' , 'server-users' , user . _id , xuser . _id ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( xuser ) , action : 'accountchange' , msgid : 67 , msgArgs : [ xuser . name ] , msg : 'User group membership changed: ' + xuser . name , domain : ugrpdomain . id } ;
2020-01-03 00:29:55 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
//parent.parent.DispatchEvent(targets, obj, event);
pendingDispatchEvents . push ( [ targets , obj , event ] ) ;
}
} else if ( i . startsWith ( 'mesh/' ) ) {
var xmesh = parent . meshes [ i ] ;
if ( xmesh && xmesh . links ) {
ugrp . links [ i ] = { rights : cgroup . links [ i ] . rights } ;
xmesh . links [ ugrpid ] = { rights : cgroup . links [ i ] . rights } ;
2020-03-27 05:33:13 +03:00
db . Set ( xmesh ) ;
2020-01-03 00:29:55 +03:00
// Notify mesh change
2020-09-09 11:32:00 +03:00
var event = { etype : 'mesh' , userid : user . _id , username : user . name , meshid : xmesh . _id , name : xmesh . name , mtype : xmesh . mtype , desc : xmesh . desc , action : 'meshchange' , links : xmesh . links , msgid : 68 , msgArgs : [ ugrp . name , xmesh . name ] , msg : 'Added user group ' + ugrp . name + ' to device group ' + xmesh . name , domain : ugrpdomain . id , invite : mesh . invite } ;
2020-01-03 00:29:55 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the mesh. Another event will come.
//parent.parent.DispatchEvent(['*', xmesh._id, user._id], obj, event);
2020-04-13 21:24:56 +03:00
pendingDispatchEvents . push ( [ parent . CreateMeshDispatchTargets ( xmesh , [ user . _id ] ) , obj , event ] ) ;
2020-01-03 00:29:55 +03:00
}
}
}
}
}
// Save the new group
2020-03-27 05:33:13 +03:00
db . Set ( ugrp ) ;
2020-01-02 11:30:14 +03:00
if ( db . changeStream == false ) { parent . userGroups [ ugrpid ] = ugrp ; }
2019-12-30 05:10:58 +03:00
// Event the device group creation
2020-09-09 11:32:00 +03:00
var event = { etype : 'ugrp' , userid : user . _id , username : user . name , ugrpid : ugrpid , name : ugrp . name , desc : ugrp . desc , action : 'createusergroup' , links : ugrp . links , msgid : 69 , msgArgv : [ ugrp . name ] , msg : 'User group created: ' + ugrp . name , ugrpdomain : domain . id } ;
2019-12-30 05:10:58 +03:00
parent . parent . DispatchEvent ( [ '*' , ugrpid , user . _id ] , obj , event ) ; // Even if DB change stream is active, this event must be acted upon.
2020-01-03 00:29:55 +03:00
// Event any pending events, these must be sent out after the group creation event is displatched.
for ( var i in pendingDispatchEvents ) { var ev = pendingDispatchEvents [ i ] ; parent . parent . DispatchEvent ( ev [ 0 ] , ev [ 1 ] , ev [ 2 ] ) ; }
2020-04-20 12:44:14 +03:00
// Log in the auth log
if ( parent . parent . authlog ) { parent . parent . authLog ( 'https' , 'User ' + user . name + ' created user group ' + ugrp . name ) ; }
2020-01-03 00:29:55 +03:00
try { ws . send ( JSON . stringify ( { action : 'createusergroup' , responseid : command . responseid , result : 'ok' , ugrpid : ugrpid , links : ugrp . links } ) ) ; } catch ( ex ) { }
2019-12-30 05:10:58 +03:00
} ) ;
2019-12-28 09:41:06 +03:00
break ;
}
case 'deleteusergroup' :
{
2020-05-28 03:23:38 +03:00
var err = null ;
if ( ( user . siteadmin & SITERIGHT _USERGROUPS ) == 0 ) { err = "Permission denied" ; }
2019-12-30 05:10:58 +03:00
// Change the name or description of a user group
2020-05-28 03:23:38 +03:00
else if ( common . validateString ( command . ugrpid , 1 , 1024 ) == false ) { err = "Invalid group id" ; } // Check the user group id
else {
var ugroupidsplit = command . ugrpid . split ( '/' ) ;
if ( ( ugroupidsplit . length != 3 ) || ( ugroupidsplit [ 0 ] != 'ugrp' ) || ( ( obj . crossDomain !== true ) && ( ugroupidsplit [ 1 ] != domain . id ) ) ) { err = "Invalid domain id" ; }
}
2020-05-28 01:31:10 +03:00
// Get the domain
var delGroupDomain = parent . parent . config . domains [ ugroupidsplit [ 1 ] ] ;
2020-05-28 03:23:38 +03:00
if ( delGroupDomain == null ) { err = "Invalid domain id" ; }
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'deleteusergroup' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2019-12-30 05:10:58 +03:00
db . Get ( command . ugrpid , function ( err , groups ) {
2020-05-28 03:23:38 +03:00
if ( ( err != null ) || ( groups . length != 1 ) ) {
try { ws . send ( JSON . stringify ( { action : 'deleteusergroup' , responseid : command . responseid , result : 'Unknown device group' } ) ) ; } catch ( ex ) { }
return ;
}
2020-03-27 05:33:13 +03:00
var group = groups [ 0 ] ;
2019-12-30 09:38:53 +03:00
2020-01-03 00:29:55 +03:00
// Unlink any user and meshes that have a link to this group
2019-12-30 09:38:53 +03:00
if ( group . links ) {
for ( var i in group . links ) {
2020-01-03 00:29:55 +03:00
if ( i . startsWith ( 'user/' ) ) {
var xuser = parent . users [ i ] ;
if ( ( xuser != null ) && ( xuser . links != null ) ) {
delete xuser . links [ group . _id ] ;
db . SetUser ( xuser ) ;
parent . parent . DispatchEvent ( [ xuser . _id ] , obj , 'resubscribe' ) ;
// Notify user change
var targets = [ '*' , 'server-users' , user . _id , xuser . _id ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( xuser ) , action : 'accountchange' , msgid : 67 , msgArgs : [ xuser . name ] , msg : 'User group membership changed: ' + xuser . name , delGroupDomain : domain . id } ;
2020-01-03 00:29:55 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
}
} else if ( i . startsWith ( 'mesh/' ) ) {
var xmesh = parent . meshes [ i ] ;
if ( xmesh && xmesh . links ) {
delete xmesh . links [ group . _id ] ;
2020-03-27 05:33:13 +03:00
db . Set ( xmesh ) ;
2020-01-03 00:29:55 +03:00
// Notify mesh change
2020-09-09 11:32:00 +03:00
var event = { etype : 'mesh' , userid : user . _id , username : user . name , meshid : xmesh . _id , name : xmesh . name , mtype : xmesh . mtype , desc : xmesh . desc , action : 'meshchange' , links : xmesh . links , msgid : 70 , msgArgs : [ group . name , xmesh . name ] , msg : 'Removed user group ' + group . name + ' from device group ' + xmesh . name , domain : delGroupDomain . id } ;
2020-01-03 00:29:55 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the mesh. Another event will come.
2020-04-13 21:24:56 +03:00
parent . parent . DispatchEvent ( parent . CreateMeshDispatchTargets ( xmesh , [ user . _id ] ) , obj , event ) ;
2020-01-03 00:29:55 +03:00
}
2019-12-30 09:38:53 +03:00
}
}
}
// Remove the user group from the database
2019-12-30 05:10:58 +03:00
db . Remove ( group . _id ) ;
2020-01-02 11:30:14 +03:00
if ( db . changeStream == false ) { delete parent . userGroups [ group . _id ] ; }
2019-12-30 09:38:53 +03:00
// Event the user group being removed
2020-05-28 01:31:10 +03:00
var event = { etype : 'ugrp' , userid : user . _id , username : user . name , ugrpid : group . _id , action : 'deleteusergroup' , msg : change , domain : delGroupDomain . id } ;
2019-12-30 05:10:58 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the mesh. Another event will come.
parent . parent . DispatchEvent ( [ '*' , group . _id , user . _id ] , obj , event ) ;
2020-04-20 12:44:14 +03:00
// Log in the auth log
if ( parent . parent . authlog ) { parent . parent . authLog ( 'https' , 'User ' + user . name + ' deleted user group ' + group . name ) ; }
2020-05-28 03:23:38 +03:00
try { ws . send ( JSON . stringify ( { action : 'deleteusergroup' , responseid : command . responseid , result : 'ok' , ugrpid : group . _id } ) ) ; } catch ( ex ) { }
2019-12-30 05:10:58 +03:00
} ) ;
break ;
}
case 'editusergroup' :
{
if ( ( user . siteadmin & SITERIGHT _USERGROUPS ) == 0 ) { return ; }
// Change the name or description of a user group
if ( common . validateString ( command . ugrpid , 1 , 1024 ) == false ) break ; // Check the user group id
var ugroupidsplit = command . ugrpid . split ( '/' ) ;
if ( ( ugroupidsplit . length != 3 ) || ( ugroupidsplit [ 0 ] != 'ugrp' ) || ( ugroupidsplit [ 1 ] != domain . id ) ) break ;
2020-01-02 12:26:12 +03:00
// Get the user group
var group = parent . userGroups [ command . ugrpid ] ;
if ( group != null ) {
2020-04-18 02:08:20 +03:00
if ( ( common . validateString ( command . name , 1 , 64 ) == true ) && ( command . name != group . name ) ) { change = 'User group name changed from "' + group . name + '" to "' + command . name + '"' ; group . name = command . name ; }
2019-12-30 05:10:58 +03:00
if ( ( common . validateString ( command . desc , 0 , 1024 ) == true ) && ( command . desc != group . desc ) ) { if ( change != '' ) change += ' and description changed' ; else change += 'User group "' + group . name + '" description changed' ; group . desc = command . desc ; }
if ( change != '' ) {
2020-03-27 05:33:13 +03:00
db . Set ( group ) ;
2019-12-30 05:10:58 +03:00
var event = { etype : 'ugrp' , userid : user . _id , username : user . name , ugrpid : group . _id , name : group . name , desc : group . desc , action : 'usergroupchange' , links : group . links , msg : change , domain : domain . id } ;
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the mesh. Another event will come.
parent . parent . DispatchEvent ( [ '*' , group . _id , user . _id ] , obj , event ) ;
}
2020-01-02 12:26:12 +03:00
}
2019-12-30 05:10:58 +03:00
break ;
}
case 'addusertousergroup' :
{
2019-12-30 09:38:53 +03:00
var err = null ;
try {
if ( ( user . siteadmin & SITERIGHT _USERGROUPS ) == 0 ) { err = 'Permission denied' ; }
else if ( common . validateString ( command . ugrpid , 1 , 1024 ) == false ) { err = 'Invalid groupid' ; } // Check the meshid
else if ( common . validateStrArray ( command . usernames , 1 , 64 ) == false ) { err = 'Invalid usernames' ; } // Username is between 1 and 64 characters
else {
var ugroupidsplit = command . ugrpid . split ( '/' ) ;
2020-05-28 01:31:10 +03:00
if ( ( ugroupidsplit . length != 3 ) || ( ugroupidsplit [ 0 ] != 'ugrp' ) || ( ( obj . crossDomain !== true ) && ( ugroupidsplit [ 1 ] != domain . id ) ) ) { err = 'Invalid groupid' ; }
2019-12-30 09:38:53 +03:00
}
} catch ( ex ) { err = 'Validation exception: ' + ex ; }
2019-12-30 05:10:58 +03:00
2020-05-28 01:31:10 +03:00
// Fetch the domain
var addUserDomain = domain ;
if ( obj . crossDomain === true ) { addUserDomain = parent . parent . config . domains [ ugroupidsplit [ 1 ] ] ; }
if ( addUserDomain == null ) { err = 'Invalid domain' ; }
2019-12-30 09:38:53 +03:00
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'addusertousergroup' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2019-12-30 05:10:58 +03:00
2020-01-02 12:26:12 +03:00
// Get the user group
var group = parent . userGroups [ command . ugrpid ] ;
if ( group != null ) {
2019-12-30 09:38:53 +03:00
if ( group . links == null ) { group . links = { } ; }
var unknownUsers = [ ] , addedCount = 0 , failCount = 0 ;
for ( var i in command . usernames ) {
// Check if the user exists
2020-05-28 01:31:10 +03:00
var chguserid = 'user/' + addUserDomain . id + '/' + command . usernames [ i ] . toLowerCase ( ) , chguser = parent . users [ chguserid ] ;
2019-12-31 02:38:18 +03:00
if ( chguser != null ) {
2019-12-30 09:38:53 +03:00
// Add mesh to user
2019-12-31 02:38:18 +03:00
if ( chguser . links == null ) { chguser . links = { } ; }
chguser . links [ group . _id ] = { rights : 1 } ;
db . SetUser ( chguser ) ;
parent . parent . DispatchEvent ( [ chguser . _id ] , obj , 'resubscribe' ) ;
// Notify user change
var targets = [ '*' , 'server-users' , user . _id , chguser . _id ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( chguser ) , action : 'accountchange' , msgid : 67 , msgArgs : [ chguser . name ] , msg : 'User group membership changed: ' + chguser . name , domain : addUserDomain . id } ;
2019-12-31 02:38:18 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2019-12-30 09:38:53 +03:00
2020-01-02 12:26:12 +03:00
// Add a user to the user group
2019-12-31 02:38:18 +03:00
group . links [ chguserid ] = { userid : chguser . id , name : chguser . name , rights : 1 } ;
2019-12-30 09:38:53 +03:00
addedCount ++ ;
} else {
unknownUsers . push ( command . usernames [ i ] ) ;
failCount ++ ;
}
}
2020-01-02 12:26:12 +03:00
if ( addedCount > 0 ) {
// Save the new group to the database
2020-03-27 05:33:13 +03:00
db . Set ( group ) ;
2020-01-02 12:26:12 +03:00
// Notify user group change
2020-09-09 11:32:00 +03:00
var event = { etype : 'ugrp' , userid : user . _id , username : user . name , ugrpid : group . _id , name : group . name , desc : group . desc , action : 'usergroupchange' , links : group . links , msgid : 71 , msgArgs : [ chguser . name , group . name ] , msg : 'Added user ' + chguser . name + ' to user group ' + group . name , addUserDomain : domain . id } ;
2020-01-02 12:26:12 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user group. Another event will come.
parent . parent . DispatchEvent ( [ '*' , group . _id , user . _id , chguserid ] , obj , event ) ;
}
2019-12-30 09:38:53 +03:00
if ( unknownUsers . length > 0 ) {
// Send error back, user not found.
displayNotificationMessage ( 'User' + ( ( unknownUsers . length > 1 ) ? 's' : '' ) + ' ' + EscapeHtml ( unknownUsers . join ( ', ' ) ) + ' not found.' , 'Device Group' , 'ServerNotify' ) ;
}
2020-01-02 12:26:12 +03:00
}
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'addusertousergroup' , responseid : command . responseid , result : 'ok' , added : addedCount , failed : failCount } ) ) ; } catch ( ex ) { } }
2019-12-30 09:38:53 +03:00
break ;
}
case 'removeuserfromusergroup' :
{
var err = null ;
try {
if ( ( user . siteadmin & SITERIGHT _USERGROUPS ) == 0 ) { err = 'Permission denied' ; }
else if ( common . validateString ( command . ugrpid , 1 , 1024 ) == false ) { err = 'Invalid groupid' ; }
else if ( common . validateString ( command . userid , 1 , 256 ) == false ) { err = 'Invalid userid' ; }
else {
var ugroupidsplit = command . ugrpid . split ( '/' ) ;
2020-05-28 01:31:10 +03:00
if ( ( ugroupidsplit . length != 3 ) || ( ugroupidsplit [ 0 ] != 'ugrp' ) || ( ( obj . crossDomain !== true ) && ( ugroupidsplit [ 1 ] != domain . id ) ) ) { err = 'Invalid groupid' ; }
2019-12-30 09:38:53 +03:00
}
} catch ( ex ) { err = 'Validation exception: ' + ex ; }
2020-05-28 01:31:10 +03:00
// Fetch the domain
var removeUserDomain = domain ;
if ( obj . crossDomain !== true ) { removeUserDomain = parent . parent . config . domains [ ugroupidsplit [ 1 ] ] ; }
if ( removeUserDomain == null ) { err = 'Invalid domain' ; }
2019-12-30 09:38:53 +03:00
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'removeuserfromusergroup' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2020-01-02 12:26:12 +03:00
// Check if the user exists
var chguser = parent . users [ command . userid ] ;
if ( chguser != null ) {
var change = false ;
if ( ( chguser . links != null ) && ( chguser . links [ command . ugrpid ] != null ) ) {
change = true ;
delete chguser . links [ command . ugrpid ] ;
2019-12-30 09:38:53 +03:00
2020-01-02 12:26:12 +03:00
// Notify user change
var targets = [ '*' , 'server-users' , user . _id , chguser . _id ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( chguser ) , action : 'accountchange' , msgid : 67 , msgArgs : [ chguser . name ] , msg : 'User group membership changed: ' + chguser . name , domain : removeUserDomain . id } ;
2020-01-02 12:26:12 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2019-12-30 09:38:53 +03:00
2020-01-02 12:26:12 +03:00
db . SetUser ( chguser ) ;
parent . parent . DispatchEvent ( [ chguser . _id ] , obj , 'resubscribe' ) ;
}
2019-12-30 09:38:53 +03:00
2020-01-02 12:26:12 +03:00
// Get the user group
var group = parent . userGroups [ command . ugrpid ] ;
if ( group != null ) {
// Remove the user from the group
if ( ( group . links != null ) && ( group . links [ command . userid ] != null ) ) {
change = true ;
delete group . links [ command . userid ] ;
2020-03-27 05:33:13 +03:00
db . Set ( group ) ;
2019-12-31 02:38:18 +03:00
2020-01-02 12:26:12 +03:00
// Notify user group change
if ( change ) {
2020-09-09 11:32:00 +03:00
var event = { etype : 'ugrp' , userid : user . _id , username : user . name , ugrpid : group . _id , name : group . name , desc : group . desc , action : 'usergroupchange' , links : group . links , msgid : 72 , msgArgs : [ chguser . name , group . name ] , msg : 'Removed user ' + chguser . name + ' from user group ' + group . name , domain : removeUserDomain . id } ;
2020-01-02 12:26:12 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user group. Another event will come.
parent . parent . DispatchEvent ( [ '*' , group . _id , user . _id , chguser . _id ] , obj , event ) ;
2019-12-31 02:38:18 +03:00
}
2019-12-30 09:38:53 +03:00
}
}
2020-01-02 12:26:12 +03:00
}
2019-12-30 09:38:53 +03:00
2019-12-28 09:41:06 +03:00
break ;
}
2019-07-22 21:25:18 +03:00
case 'changemeshnotify' :
{
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2019-07-22 21:25:18 +03:00
var err = null ;
try {
// Change the current user's notification flags for a meshid
if ( common . validateString ( command . meshid , 1 , 1024 ) == false ) { err = 'Invalid group identifier' ; } // Check the meshid
else if ( command . meshid . indexOf ( '/' ) == - 1 ) { command . meshid = 'mesh/' + domain . id + '/' + command . meshid ; }
if ( common . validateInt ( command . notify ) == false ) { err = 'Invalid notification flags' ; }
2019-12-28 02:18:43 +03:00
if ( parent . IsMeshViewable ( user , command . meshid ) == false ) err = 'Access denied' ;
2019-07-22 21:25:18 +03:00
} catch ( ex ) { err = 'Validation exception: ' + ex ; }
// Handle any errors
if ( err != null ) { if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'changemeshnotify' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } } break ; }
2019-12-27 09:53:01 +03:00
// Change the notification (TODO: Add user group support, not sure how to do this here)
2019-12-28 02:18:43 +03:00
// TODO (UserGroups)
if ( user . links [ command . meshid ] ) {
if ( command . notify == 0 ) {
delete user . links [ command . meshid ] . notify ;
} else {
user . links [ command . meshid ] . notify = command . notify ;
}
2019-07-22 21:25:18 +03:00
}
// Save the user
parent . db . SetUser ( user ) ;
// Notify change
var targets = [ '*' , 'server-users' , user . _id ] ;
if ( user . groups ) { for ( var i in user . groups ) { targets . push ( 'server-users:' + i ) ; } }
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , msgid : 73 , msg : 'Device group notification changed' , domain : domain . id } ;
2019-07-22 21:25:18 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2019-01-05 04:59:13 +03:00
break ;
}
2019-02-13 06:23:40 +03:00
case 'changepassword' :
{
2020-08-06 06:15:34 +03:00
// If this account is settings locked, return here.
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ;
2019-02-13 06:23:40 +03:00
// Change our own password
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . oldpass , 1 , 256 ) == false ) break ;
if ( common . validateString ( command . newpass , 1 , 256 ) == false ) break ;
if ( ( command . hint != null ) && ( common . validateString ( command . hint , 0 , 256 ) == false ) ) break ;
if ( common . checkPasswordRequirements ( command . newpass , domain . passwordrequirements ) == false ) break ; // Password does not meet requirements
2019-02-13 06:23:40 +03:00
// Start by checking the old password
2019-03-10 01:28:08 +03:00
parent . checkUserPassword ( domain , user , command . oldpass , function ( result ) {
2019-02-13 06:23:40 +03:00
if ( result == true ) {
2020-08-16 21:10:02 +03:00
parent . checkOldUserPasswords ( domain , user , command . newpass , function ( result ) {
2020-08-16 23:44:54 +03:00
if ( result == 1 ) {
2019-02-13 06:23:40 +03:00
// Send user notification of error
2020-08-16 21:10:02 +03:00
displayNotificationMessage ( 'Error, unable to change to previously used password.' , 'Account Settings' , 'ServerNotify' ) ;
2020-08-16 23:44:54 +03:00
} else if ( result == 2 ) {
// Send user notification of error
displayNotificationMessage ( 'Error, unable to change to commonly used password.' , 'Account Settings' , 'ServerNotify' ) ;
2019-02-13 06:23:40 +03:00
} else {
2020-08-16 21:10:02 +03:00
// Update the password
require ( './pass' ) . hash ( command . newpass , function ( err , salt , hash , tag ) {
if ( err ) {
// Send user notification of error
displayNotificationMessage ( 'Error, password not changed.' , 'Account Settings' , 'ServerNotify' ) ;
} else {
const nowSeconds = Math . floor ( Date . now ( ) / 1000 ) ;
// Change the password
if ( domain . passwordrequirements != null ) {
// Save password hint if this feature is enabled
if ( ( domain . passwordrequirements . hint === true ) && ( command . hint != null ) ) { var hint = command . hint ; if ( hint . length > 250 ) { hint = hint . substring ( 0 , 250 ) ; } user . passhint = hint ; } else { delete user . passhint ; }
// Save previous password if this feature is enabled
if ( ( typeof domain . passwordrequirements . oldpasswordban == 'number' ) && ( domain . passwordrequirements . oldpasswordban > 0 ) ) {
if ( user . oldpasswords == null ) { user . oldpasswords = [ ] ; }
user . oldpasswords . push ( { salt : user . salt , hash : user . hash , start : user . passchange , end : nowSeconds } ) ;
const extraOldPasswords = user . oldpasswords . length - domain . passwordrequirements . oldpasswordban ;
if ( extraOldPasswords > 0 ) { user . oldpasswords . splice ( 0 , extraOldPasswords ) ; }
}
}
user . salt = salt ;
user . hash = hash ;
user . passchange = nowSeconds ;
delete user . passtype ;
db . SetUser ( user ) ;
var targets = [ '*' , 'server-users' ] ;
if ( user . groups ) { for ( var i in user . groups ) { targets . push ( 'server-users:' + i ) ; } }
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , msgid : 74 , msgArgs : [ user . name ] , msg : 'Account password changed: ' + user . name , domain : domain . id } ;
2020-08-16 21:10:02 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2019-02-13 06:23:40 +03:00
2020-08-16 21:10:02 +03:00
// Send user notification of password change
displayNotificationMessage ( 'Password changed.' , 'Account Settings' , 'ServerNotify' ) ;
2020-04-20 12:44:14 +03:00
2020-08-16 21:10:02 +03:00
// Log in the auth log
if ( parent . parent . authlog ) { parent . parent . authLog ( 'https' , 'User ' + user . name + ' changed this password' ) ; }
}
} , 0 ) ;
2019-02-13 06:23:40 +03:00
}
2020-08-16 21:10:02 +03:00
} ) ;
2019-02-13 06:23:40 +03:00
} else {
// Send user notification of error
2019-04-30 01:31:11 +03:00
displayNotificationMessage ( 'Current password not correct.' , 'Account Settings' , 'ServerNotify' ) ;
2019-02-13 06:23:40 +03:00
}
} ) ;
break ;
}
2019-01-05 04:59:13 +03:00
case 'changeuserpass' :
{
// Change a user's password
2020-03-17 23:39:28 +03:00
if ( ( user . siteadmin & 2 ) == 0 ) break ;
2019-04-17 03:32:18 +03:00
if ( common . validateString ( command . userid , 1 , 256 ) == false ) break ;
2019-05-22 00:19:32 +03:00
if ( common . validateString ( command . pass , 0 , 256 ) == false ) break ;
2019-03-10 01:28:08 +03:00
if ( ( command . hint != null ) && ( common . validateString ( command . hint , 0 , 256 ) == false ) ) break ;
2019-02-11 07:13:03 +03:00
if ( typeof command . removeMultiFactor != 'boolean' ) break ;
2019-05-22 00:19:32 +03:00
if ( ( command . pass != '' ) && ( common . checkPasswordRequirements ( command . pass , domain . passwordrequirements ) == false ) ) break ; // Password does not meet requirements
2019-02-11 07:13:03 +03:00
2019-04-17 03:32:18 +03:00
var chguser = parent . users [ command . userid ] ;
2019-02-13 06:23:40 +03:00
if ( chguser ) {
2020-03-17 23:39:28 +03:00
// If we are not full administrator, we can't change anything on a different full administrator
2020-07-06 22:46:38 +03:00
if ( ( user . siteadmin != SITERIGHT _ADMIN ) & ( chguser . siteadmin === SITERIGHT _ADMIN ) ) break ;
2020-03-17 23:39:28 +03:00
2019-04-17 03:32:18 +03:00
// Can only perform this operation on other users of our group.
if ( ( user . groups != null ) && ( user . groups . length > 0 ) && ( ( chguser . groups == null ) || ( findOne ( chguser . groups , user . groups ) == false ) ) ) break ;
2019-01-05 04:59:13 +03:00
// Compute the password hash & save it
2019-05-15 00:39:26 +03:00
require ( './pass' ) . hash ( command . pass , function ( err , salt , hash , tag ) {
2019-02-11 07:13:03 +03:00
if ( ! err ) {
2019-05-22 00:19:32 +03:00
if ( command . pass != '' ) { chguser . salt = salt ; chguser . hash = hash ; }
2019-03-01 03:17:22 +03:00
if ( ( domain . passwordrequirements != null ) && ( domain . passwordrequirements . hint === true ) && ( command . hint != null ) ) {
var hint = command . hint ;
if ( hint . length > 250 ) { hint = hint . substring ( 0 , 250 ) ; }
chguser . passhint = hint ;
}
if ( command . resetNextLogin === true ) { chguser . passchange = - 1 ; } else { chguser . passchange = Math . floor ( Date . now ( ) / 1000 ) ; }
2019-02-13 06:23:40 +03:00
delete chguser . passtype ; // Remove the password type if one was present.
2019-02-11 07:13:03 +03:00
if ( command . removeMultiFactor == true ) {
2020-03-15 01:03:50 +03:00
if ( chguser . otpekey ) { delete chguser . otpekey ; }
2019-02-28 05:48:50 +03:00
if ( chguser . otpsecret ) { delete chguser . otpsecret ; }
if ( chguser . otphkeys ) { delete chguser . otphkeys ; }
if ( chguser . otpkeys ) { delete chguser . otpkeys ; }
2019-02-11 07:13:03 +03:00
}
2019-03-10 01:28:08 +03:00
db . SetUser ( chguser ) ;
2019-04-17 03:32:18 +03:00
var targets = [ '*' , 'server-users' , user . _id , chguser . _id ] ;
if ( chguser . groups ) { for ( var i in chguser . groups ) { targets . push ( 'server-users:' + i ) ; } }
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( chguser ) , action : 'accountchange' , msgid : 75 , msg : 'Changed account credentials' , domain : domain . id } ;
2019-05-29 03:25:23 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2020-04-20 12:44:14 +03:00
// Log in the auth log
if ( parent . parent . authlog ) { parent . parent . authLog ( 'https' , 'User ' + user . name + ' changed account password of user ' + chguser . name ) ; }
2019-02-13 06:23:40 +03:00
} else {
// Report that the password change failed
// TODO
2019-02-11 07:13:03 +03:00
}
2019-05-15 00:39:26 +03:00
} , 0 ) ;
2018-04-16 08:22:44 +03:00
}
2019-01-05 04:59:13 +03:00
break ;
}
case 'notifyuser' :
{
// Send a notification message to a user
if ( ( user . siteadmin & 2 ) == 0 ) break ;
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . userid , 1 , 2048 ) == false ) break ;
if ( common . validateString ( command . msg , 1 , 4096 ) == false ) break ;
2019-01-05 04:59:13 +03:00
2019-04-17 03:32:18 +03:00
// Can only perform this operation on other users of our group.
var chguser = parent . users [ command . userid ] ;
if ( chguser == null ) break ; // This user does not exists
if ( ( user . groups != null ) && ( user . groups . length > 0 ) && ( ( chguser . groups == null ) || ( findOne ( chguser . groups , user . groups ) == false ) ) ) break ;
2019-01-05 04:59:13 +03:00
// Create the notification message
2020-01-07 22:08:32 +03:00
var notification = { action : 'msg' , type : 'notify' , id : Math . random ( ) , value : command . msg , title : user . name , icon : 8 , userid : user . _id , username : user . name } ;
2020-08-01 01:08:03 +03:00
if ( ( typeof command . maxtime == 'number' ) && ( command . maxtime > 0 ) ) { notification . maxtime = command . maxtime ; }
2019-01-05 04:59:13 +03:00
// Get the list of sessions for this user
2019-03-10 01:28:08 +03:00
var sessions = parent . wssessions [ command . userid ] ;
2019-01-05 04:59:13 +03:00
if ( sessions != null ) { for ( i in sessions ) { try { sessions [ i ] . send ( JSON . stringify ( notification ) ) ; } catch ( ex ) { } } }
2019-03-10 01:28:08 +03:00
if ( parent . parent . multiServer != null ) {
2019-01-05 04:59:13 +03:00
// TODO: Add multi-server support
}
break ;
}
case 'meshmessenger' :
{
// Setup a user-to-user session
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . userid , 1 , 2048 ) ) {
2019-10-16 02:26:24 +03:00
// Send a notification message to a user
if ( ( user . siteadmin & 2 ) == 0 ) break ;
2018-04-06 02:45:56 +03:00
2019-04-17 03:32:18 +03:00
// Can only perform this operation on other users of our group.
var chguser = parent . users [ command . userid ] ;
if ( chguser == null ) break ; // This user does not exists
if ( ( user . groups != null ) && ( user . groups . length > 0 ) && ( ( chguser . groups == null ) || ( findOne ( chguser . groups , user . groups ) == false ) ) ) break ;
2018-04-06 02:45:56 +03:00
// Create the notification message
2019-01-05 04:59:13 +03:00
var notification = {
2020-01-07 22:08:32 +03:00
'action' : 'msg' , 'type' : 'notify' , id : Math . random ( ) , 'value' : "Chat Request, Click here to accept." , 'title' : user . name , 'userid' : user . _id , 'username' : user . name , 'tag' : 'meshmessenger/' + encodeURIComponent ( command . userid ) + '/' + encodeURIComponent ( user . _id )
2019-01-05 04:59:13 +03:00
} ;
2018-04-06 02:45:56 +03:00
// Get the list of sessions for this user
2019-03-10 01:28:08 +03:00
var sessions = parent . wssessions [ command . userid ] ;
2018-10-11 23:29:50 +03:00
if ( sessions != null ) { for ( i in sessions ) { try { sessions [ i ] . send ( JSON . stringify ( notification ) ) ; } catch ( ex ) { } } }
2018-04-06 02:45:56 +03:00
2019-03-10 01:28:08 +03:00
if ( parent . parent . multiServer != null ) {
2018-12-02 10:41:57 +03:00
// TODO: Add multi-server support
}
}
2019-12-28 02:18:43 +03:00
// User-to-device chat is not support in LAN-only mode yet. We need the agent to replace the IP address of the server??
if ( args . lanonly == true ) { return ; }
2019-10-16 02:26:24 +03:00
2019-12-28 02:18:43 +03:00
// Setup a user-to-node session
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
// Check if this user has rights to do this
if ( ( rights & MESHRIGHT _CHATNOTIFY ) == 0 ) return ;
2019-10-16 02:26:24 +03:00
2019-12-28 02:18:43 +03:00
// Create the server url
var httpsPort = ( ( args . aliasport == null ) ? args . port : args . aliasport ) ; // Use HTTPS alias port is specified
var xdomain = ( domain . dns == null ) ? domain . id : '' ;
if ( xdomain != '' ) xdomain += "/" ;
var url = "http" + ( args . notls ? '' : 's' ) + "://" + parent . getWebServerName ( domain ) + ":" + httpsPort + "/" + xdomain + "messenger?id=meshmessenger/" + encodeURIComponent ( command . nodeid ) + "/" + encodeURIComponent ( user . _id ) + "&title=" + encodeURIComponent ( user . name ) ;
2019-01-05 04:59:13 +03:00
2019-12-28 02:18:43 +03:00
// Create the notification message
routeCommandToNode ( { "action" : "openUrl" , "nodeid" : command . nodeid , "userid" : user . _id , "username" : user . name , "url" : url } ) ;
} ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'serverversion' :
{
// Check the server version
if ( ( user . siteadmin & 16 ) == 0 ) break ;
2020-04-18 09:17:45 +03:00
//parent.parent.getLatestServerVersion(function (currentVersion, latestVersion) { try { ws.send(JSON.stringify({ action: 'serverversion', current: currentVersion, latest: latestVersion })); } catch (ex) { } });
parent . parent . getServerTags ( function ( tags , err ) { try { ws . send ( JSON . stringify ( { action : 'serverversion' , tags : tags } ) ) ; } catch ( ex ) { } } ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'serverupdate' :
{
// Perform server update
if ( ( user . siteadmin & 16 ) == 0 ) break ;
2020-04-18 09:17:45 +03:00
if ( ( command . version != null ) && ( typeof command . version != 'string' ) ) break ;
parent . parent . performServerUpdate ( command . version ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'servererrors' :
{
// Load the server error log
if ( ( user . siteadmin & 16 ) == 0 ) break ;
2019-03-10 01:28:08 +03:00
fs . readFile ( parent . parent . getConfigFilePath ( 'mesherrors.txt' ) , 'utf8' , function ( err , data ) { try { ws . send ( JSON . stringify ( { action : 'servererrors' , data : data } ) ) ; } catch ( ex ) { } } ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'serverclearerrorlog' :
{
// Clear the server error log
if ( ( user . siteadmin & 16 ) == 0 ) break ;
2019-03-10 01:28:08 +03:00
fs . unlink ( parent . parent . getConfigFilePath ( 'mesherrors.txt' ) , function ( err ) { } ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'createmesh' :
{
2019-06-30 21:34:27 +03:00
var err = null ;
try {
// Check if we have new group restriction
2020-07-06 22:46:38 +03:00
if ( ( user . siteadmin != SITERIGHT _ADMIN ) && ( ( user . siteadmin & 64 ) != 0 ) ) { err = 'Permission denied' ; }
2019-06-30 21:34:27 +03:00
// In some situations, we need a verified email address to create a device group.
2020-07-06 22:46:38 +03:00
else if ( ( parent . parent . mailserver != null ) && ( domain . auth != 'sspi' ) && ( domain . auth != 'ldap' ) && ( user . emailVerified !== true ) && ( user . siteadmin != SITERIGHT _ADMIN ) ) { err = 'Email verification required' ; } // User must verify it's email first.
2019-06-30 21:34:27 +03:00
// Create mesh
else if ( common . validateString ( command . meshname , 1 , 64 ) == false ) { err = 'Invalid group name' ; } // Meshname is between 1 and 64 characters
else if ( ( command . desc != null ) && ( common . validateString ( command . desc , 0 , 1024 ) == false ) ) { err = 'Invalid group description' ; } // Mesh description is between 0 and 1024 characters
else if ( ( command . meshtype != 1 ) && ( command . meshtype != 2 ) ) { err = 'Invalid group type' ; }
} catch ( ex ) { err = 'Validation exception: ' + ex ; }
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'createmesh' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2019-01-05 04:59:13 +03:00
// We only create Agent-less Intel AMT mesh (Type1), or Agent mesh (Type2)
2019-06-30 21:34:27 +03:00
parent . crypto . randomBytes ( 48 , function ( err , buf ) {
// Create new device group identifier
meshid = 'mesh/' + domain . id + '/' + buf . toString ( 'base64' ) . replace ( /\+/g , '@' ) . replace ( /\//g , '$' ) ;
// Create the new device group
var links = { } ;
links [ user . _id ] = { name : user . name , rights : 4294967295 } ;
2020-08-17 22:30:38 +03:00
mesh = { type : 'mesh' , _id : meshid , name : command . meshname , mtype : command . meshtype , desc : command . desc , domain : domain . id , links : links , creation : Date . now ( ) , creatorid : user . _id , creatorname : user . name } ;
2020-03-27 05:33:13 +03:00
db . Set ( mesh ) ;
2019-06-30 21:34:27 +03:00
parent . meshes [ meshid ] = mesh ;
parent . parent . AddEventDispatch ( [ meshid ] , ws ) ;
// Change the user to make him administration of the new device group
if ( user . links == null ) user . links = { } ;
user . links [ meshid ] = { rights : 4294967295 } ;
user . subscriptions = parent . subscribe ( user . _id , ws ) ;
db . SetUser ( user ) ;
// Event the user change
var targets = [ '*' , 'server-users' , user . _id ] ;
if ( user . groups ) { for ( var i in user . groups ) { targets . push ( 'server-users:' + i ) ; } }
2019-07-30 02:35:48 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , domain : domain . id , nolog : 1 } ;
2019-06-30 21:34:27 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
// Event the device group creation
2020-09-09 11:32:00 +03:00
var event = { etype : 'mesh' , userid : user . _id , username : user . name , meshid : meshid , name : command . meshname , mtype : command . meshtype , desc : command . desc , action : 'createmesh' , links : links , msgid : 76 , msgArgs : [ command . meshname ] , msg : 'Device group created: ' + command . meshname , domain : domain . id , creation : mesh . creation , creatorid : mesh . creatorid , creatorname : mesh . creatorname } ;
2019-06-30 21:34:27 +03:00
parent . parent . DispatchEvent ( [ '*' , meshid , user . _id ] , obj , event ) ; // Even if DB change stream is active, this event must be acted upon.
2020-04-20 12:44:14 +03:00
// Log in the auth log
if ( parent . parent . authlog ) { parent . parent . authLog ( 'https' , 'User ' + user . name + ' created device group ' + mesh . name ) ; }
2019-10-12 01:39:15 +03:00
try { ws . send ( JSON . stringify ( { action : 'createmesh' , responseid : command . responseid , result : 'ok' , meshid : meshid , links : links } ) ) ; } catch ( ex ) { }
2019-06-30 21:34:27 +03:00
} ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'deletemesh' :
{
2020-07-24 22:32:43 +03:00
// Delete a mesh and all computers within it
2019-06-30 21:34:27 +03:00
var err = null ;
2020-04-08 21:26:35 +03:00
// Resolve the device group name if needed
if ( ( typeof command . meshname == 'string' ) && ( command . meshid == null ) ) {
for ( var i in parent . meshes ) {
var m = parent . meshes [ i ] ;
if ( ( m . mtype == 2 ) && ( m . name == command . meshname ) && parent . IsMeshViewable ( user , m ) ) {
if ( command . meshid == null ) { command . meshid = m . _id ; } else { err = 'Duplicate device groups found' ; }
}
}
}
2020-07-24 22:32:43 +03:00
// Validate input
2019-06-30 21:34:27 +03:00
try {
if ( common . validateString ( command . meshid , 1 , 1024 ) == false ) { err = 'Invalid group identifier' ; } // Check the meshid
2019-07-05 23:46:14 +03:00
else if ( command . meshid . indexOf ( '/' ) == - 1 ) { command . meshid = 'mesh/' + domain . id + '/' + command . meshid ; }
2019-06-30 21:34:27 +03:00
} catch ( ex ) { err = 'Validation exception: ' + ex ; }
// Handle any errors
2019-07-11 00:27:38 +03:00
if ( err != null ) { if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'deletemesh' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } } break ; }
2019-06-30 21:34:27 +03:00
2019-07-11 00:27:38 +03:00
// Get the device group reference we are going to delete
var mesh = parent . meshes [ command . meshid ] ;
if ( mesh == null ) { if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'deletemesh' , responseid : command . responseid , result : 'Unknown device group' } ) ) ; } catch ( ex ) { } } return ; }
2019-01-05 04:59:13 +03:00
2019-07-11 00:27:38 +03:00
// Check if this user has rights to do this
var err = null ;
2020-07-06 22:46:38 +03:00
if ( parent . GetMeshRights ( user , mesh ) != MESHRIGHT _ADMIN ) { err = 'Access denied' ; }
2019-07-11 00:27:38 +03:00
if ( ( command . meshid . split ( '/' ) . length != 3 ) || ( command . meshid . split ( '/' ) [ 1 ] != domain . id ) ) { err = 'Invalid group' ; } // Invalid domain, operation only valid for current domain
2018-12-08 03:36:27 +03:00
2019-07-11 00:27:38 +03:00
// Handle any errors
if ( err != null ) { if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'deletemesh' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } } return ; }
// Fire the removal event first, because after this, the event will not route
2020-09-09 11:32:00 +03:00
var event = { etype : 'mesh' , userid : user . _id , username : user . name , meshid : command . meshid , name : command . meshname , action : 'deletemesh' , msgid : 77 , msgArgs : [ command . meshname ] , msg : 'Device group deleted: ' + command . meshname , domain : domain . id } ;
2020-04-13 21:24:56 +03:00
parent . parent . DispatchEvent ( parent . CreateMeshDispatchTargets ( command . meshid ) , obj , event ) ; // Even if DB change stream is active, this event need to be acted on.
2019-07-11 00:27:38 +03:00
// Remove all user links to this mesh
for ( var j in mesh . links ) {
2020-01-02 12:26:12 +03:00
if ( j . startsWith ( 'user/' ) ) {
var xuser = parent . users [ j ] ;
if ( xuser && xuser . links ) {
delete xuser . links [ mesh . _id ] ;
db . SetUser ( xuser ) ;
parent . parent . DispatchEvent ( [ xuser . _id ] , obj , 'resubscribe' ) ;
2019-12-31 02:38:18 +03:00
2020-01-02 12:26:12 +03:00
// Notify user change
var targets = [ '*' , 'server-users' , user . _id , xuser . _id ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( xuser ) , action : 'accountchange' , msgid : 78 , msgArgs : [ xuser . name ] , msg : 'Device group membership changed: ' + xuser . name , domain : domain . id } ;
2020-01-02 12:26:12 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
}
} else if ( j . startsWith ( 'ugrp/' ) ) {
var xgroup = parent . userGroups [ j ] ;
if ( xgroup && xgroup . links ) {
delete xgroup . links [ mesh . _id ] ;
2020-03-27 05:33:13 +03:00
db . Set ( xgroup ) ;
2020-01-02 12:26:12 +03:00
// Notify user group change
var targets = [ '*' , 'server-ugroups' , user . _id , xgroup . _id ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'ugrp' , userid : user . _id , username : user . name , ugrpid : xgroup . _id , name : xgroup . name , desc : xgroup . desc , action : 'usergroupchange' , links : xgroup . links , msgid : 79 , msgArgs : [ xgroup . name ] , msg : 'User group changed: ' + xgroup . name , domain : domain . id } ;
2020-01-02 12:26:12 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
}
2018-12-08 03:36:27 +03:00
}
2019-07-11 00:27:38 +03:00
}
2018-12-08 03:36:27 +03:00
2019-07-11 00:27:38 +03:00
// Delete all files on the server for this mesh
try {
var meshpath = parent . getServerRootFilePath ( mesh ) ;
if ( meshpath != null ) { parent . deleteFolderRec ( meshpath ) ; }
} catch ( e ) { }
2018-12-08 03:36:27 +03:00
2019-07-11 00:27:38 +03:00
parent . parent . RemoveEventDispatchId ( command . meshid ) ; // Remove all subscriptions to this mesh
2019-02-19 01:32:55 +03:00
2019-07-11 00:27:38 +03:00
// Mark the mesh as deleted
mesh . deleted = new Date ( ) ; // Mark the time this mesh was deleted, we can expire it at some point.
2020-03-27 05:33:13 +03:00
db . Set ( mesh ) ; // We don't really delete meshes because if a device connects to is again, we will un-delete it.
2019-02-19 01:32:55 +03:00
2019-07-11 00:27:38 +03:00
// Delete all devices attached to this mesh in the database
db . RemoveMeshDocuments ( command . meshid ) ;
2020-03-27 10:21:44 +03:00
// TODO: We are possibly deleting devices that users will have links to. We need to clean up the broken links from on occasion.
2019-06-30 21:34:27 +03:00
2020-04-20 12:44:14 +03:00
// Log in the auth log
if ( parent . parent . authlog ) { parent . parent . authLog ( 'https' , 'User ' + user . name + ' deleted device group ' + mesh . name ) ; }
2019-07-11 00:27:38 +03:00
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'deletemesh' , responseid : command . responseid , result : 'ok' } ) ) ; } catch ( ex ) { } }
2019-01-05 04:59:13 +03:00
break ;
}
case 'editmesh' :
{
2020-01-02 11:30:14 +03:00
// Change the name or description of a device group (mesh)
2020-07-24 22:32:43 +03:00
var err = null ;
// Resolve the device group name if needed
if ( ( typeof command . meshidname == 'string' ) && ( command . meshid == null ) ) {
for ( var i in parent . meshes ) {
var m = parent . meshes [ i ] ;
if ( ( m . mtype == 2 ) && ( m . name == command . meshidname ) && parent . IsMeshViewable ( user , m ) ) {
if ( command . meshid == null ) { command . meshid = m . _id ; } else { err = 'Duplicate device groups found' ; }
}
}
}
// Validate input
try {
if ( common . validateString ( command . meshid , 1 , 1024 ) == false ) { err = 'Invalid group identifier' ; } // Check the meshid
else if ( command . meshid . indexOf ( '/' ) == - 1 ) { command . meshid = 'mesh/' + domain . id + '/' + command . meshid ; }
if ( err == null ) {
mesh = parent . meshes [ command . meshid ] ;
if ( mesh == null ) { err = 'Invalid group identifier ' ; }
}
} catch ( ex ) { err = 'Validation exception: ' + ex ; }
// Handle any errors
if ( err != null ) { if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'editmesh' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } } break ; }
2019-01-05 04:59:13 +03:00
change = '' ;
2019-04-13 00:19:03 +03:00
2020-07-24 22:32:43 +03:00
// Check if this user has rights to do this
if ( ( parent . GetMeshRights ( user , mesh ) & MESHRIGHT _EDITMESH ) == 0 ) return ;
if ( ( command . meshid . split ( '/' ) . length != 3 ) || ( command . meshid . split ( '/' ) [ 1 ] != domain . id ) ) return ; // Invalid domain, operation only valid for current domain
if ( ( common . validateString ( command . meshname , 1 , 64 ) == true ) && ( command . meshname != mesh . name ) ) { change = 'Group name changed from "' + mesh . name + '" to "' + command . meshname + '"' ; mesh . name = command . meshname ; }
if ( ( common . validateString ( command . desc , 0 , 1024 ) == true ) && ( command . desc != mesh . desc ) ) { if ( change != '' ) change += ' and description changed' ; else change += 'Group "' + mesh . name + '" description changed' ; mesh . desc = command . desc ; }
if ( ( common . validateInt ( command . flags ) == true ) && ( command . flags != mesh . flags ) ) { if ( change != '' ) change += ' and flags changed' ; else change += 'Group "' + mesh . name + '" flags changed' ; mesh . flags = command . flags ; }
if ( ( common . validateInt ( command . consent ) == true ) && ( command . consent != mesh . consent ) ) { if ( change != '' ) change += ' and consent changed' ; else change += 'Group "' + mesh . name + '" consent changed' ; mesh . consent = command . consent ; }
// See if we need to change device group invitation codes
if ( mesh . mtype == 2 ) {
if ( command . invite === '*' ) {
// Clear invite codes
if ( mesh . invite != null ) { delete mesh . invite ; }
if ( change != '' ) { change += ' and invite code changed' ; } else { change += 'Group "' + mesh . name + '" invite code changed' ; }
} else if ( ( typeof command . invite == 'object' ) && ( Array . isArray ( command . invite . codes ) ) && ( typeof command . invite . flags == 'number' ) ) {
// Set invite codes
if ( ( mesh . invite == null ) || ( mesh . invite . codes != command . invite . codes ) || ( mesh . invite . flags != command . invite . flags ) ) {
// Check if an invite code is not already in use.
var dup = null ;
for ( var i in command . invite . codes ) {
for ( var j in parent . meshes ) {
if ( ( j != command . meshid ) && ( parent . meshes [ j ] . domain == domain . id ) && ( parent . meshes [ j ] . invite != null ) && ( parent . meshes [ j ] . invite . codes . indexOf ( command . invite . codes [ i ] ) >= 0 ) ) { dup = command . invite . codes [ i ] ; break ; }
2020-03-17 19:40:16 +03:00
}
}
2020-07-24 22:32:43 +03:00
if ( dup != null ) {
// A duplicate was found, don't allow this change.
displayNotificationMessage ( 'Error, invite code \"' + dup + '\" already in use.' , 'Invite Codes' ) ;
return ;
}
mesh . invite = { codes : command . invite . codes , flags : command . invite . flags } ;
if ( change != '' ) { change += ' and invite code changed' ; } else { change += 'Group "' + mesh . name + '" invite code changed' ; }
2020-03-17 04:03:14 +03:00
}
}
2020-07-24 22:32:43 +03:00
}
2020-03-17 04:03:14 +03:00
2020-07-24 22:32:43 +03:00
if ( change != '' ) {
db . Set ( mesh ) ;
var event = { etype : 'mesh' , userid : user . _id , username : user . name , meshid : mesh . _id , name : mesh . name , mtype : mesh . mtype , desc : mesh . desc , flags : mesh . flags , consent : mesh . consent , action : 'meshchange' , links : mesh . links , msg : change , domain : domain . id , invite : mesh . invite } ;
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the mesh. Another event will come.
parent . parent . DispatchEvent ( parent . CreateMeshDispatchTargets ( mesh , [ user . _id ] ) , obj , event ) ;
2018-09-19 05:41:59 +03:00
}
2020-07-24 22:32:43 +03:00
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'editmesh' , responseid : command . responseid , result : 'ok' } ) ) ; } catch ( ex ) { } }
2019-01-05 04:59:13 +03:00
break ;
}
case 'addmeshuser' :
{
2020-05-28 01:31:10 +03:00
var err = null , mesh , meshIdSplit ;
2020-04-08 21:26:35 +03:00
if ( typeof command . userid == 'string' ) { command . userids = [ command . userid ] ; }
// Resolve the device group name if needed
if ( ( typeof command . meshname == 'string' ) && ( command . meshid == null ) ) {
for ( var i in parent . meshes ) {
var m = parent . meshes [ i ] ;
if ( ( m . mtype == 2 ) && ( m . name == command . meshname ) && parent . IsMeshViewable ( user , m ) ) {
if ( command . meshid == null ) { command . meshid = m . _id ; } else { err = 'Duplicate device groups found' ; }
}
}
}
2020-04-19 05:17:44 +03:00
var selfMeshRights = 0 ;
2019-07-02 00:44:26 +03:00
try {
if ( common . validateString ( command . meshid , 1 , 1024 ) == false ) { err = 'Invalid groupid' ; } // Check the meshid
else if ( common . validateInt ( command . meshadmin ) == false ) { err = 'Invalid group rights' ; } // Mesh rights must be an integer
2020-01-02 11:30:14 +03:00
else if ( ( common . validateStrArray ( command . usernames , 1 , 64 ) == false ) && ( common . validateStrArray ( command . userids , 1 , 128 ) == false ) ) { err = 'Invalid usernames' ; } // Username is between 1 and 64 characters
2019-07-02 00:44:26 +03:00
else {
if ( command . meshid . indexOf ( '/' ) == - 1 ) { command . meshid = 'mesh/' + domain . id + '/' + command . meshid ; }
mesh = parent . meshes [ command . meshid ] ;
2020-05-28 01:31:10 +03:00
meshIdSplit = command . meshid . split ( '/' ) ;
2019-07-02 00:44:26 +03:00
if ( mesh == null ) { err = 'Unknown group' ; }
2020-04-19 05:17:44 +03:00
else if ( ( ( selfMeshRights = parent . GetMeshRights ( user , mesh ) ) & MESHRIGHT _MANAGEUSERS ) == 0 ) { err = 'Permission denied' ; }
2020-05-28 01:31:10 +03:00
else if ( ( meshIdSplit . length != 3 ) || ( meshIdSplit [ 1 ] != domain . id ) ) { err = 'Invalid domain' ; } // Invalid domain, operation only valid for current domain
2019-07-02 00:44:26 +03:00
}
} catch ( ex ) { err = 'Validation exception: ' + ex ; }
2017-10-24 00:09:58 +03:00
2019-07-02 00:44:26 +03:00
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'addmeshuser' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2017-10-24 00:09:58 +03:00
2020-01-02 11:30:14 +03:00
// Convert user names to userid's
if ( command . userids == null ) {
command . userids = [ ] ;
for ( var i in command . usernames ) { command . userids . push ( 'user/' + domain . id + '/' + command . usernames [ i ] . toLowerCase ( ) ) ; }
}
2020-04-01 23:15:14 +03:00
var unknownUsers = [ ] , successCount = 0 , failCount = 0 , msgs = [ ] ;
2020-01-02 11:30:14 +03:00
for ( var i in command . userids ) {
2019-07-02 00:44:26 +03:00
// Check if the user exists
2020-01-02 11:30:14 +03:00
var newuserid = command . userids [ i ] , newuser = null ;
if ( newuserid . startsWith ( 'user/' ) ) { newuser = parent . users [ newuserid ] ; }
else if ( newuserid . startsWith ( 'ugrp/' ) ) { newuser = parent . userGroups [ newuserid ] ; }
2020-04-01 23:15:14 +03:00
// Search for a user name in that windows domain is the username starts with *\
if ( ( newuser == null ) && ( newuserid . startsWith ( 'user/' + domain . id + '/*\\' ) ) == true ) {
var search = newuserid . split ( '/' ) [ 2 ] . substring ( 1 ) ;
for ( var i in parent . users ) { if ( i . endsWith ( search ) && ( parent . users [ i ] . domain == domain . id ) ) { newuser = parent . users [ i ] ; command . userids [ i ] = newuserid = parent . users [ i ] . _id ; break ; } }
}
2020-05-28 01:31:10 +03:00
// Make sure this user is in the same domain as the device group
if ( meshIdSplit [ 1 ] != newuserid . split ( '/' ) [ 1 ] ) { msgs . push ( "Mismatch domains" ) ; continue ; }
2019-07-02 00:44:26 +03:00
if ( newuser != null ) {
2020-01-02 11:30:14 +03:00
// Can't add or modify self
2020-04-19 05:17:44 +03:00
if ( newuserid == obj . user . _id ) { msgs . push ( "Can't change self" ) ; continue ; }
var targetMeshRights = 0 ;
2020-04-20 12:44:14 +03:00
if ( ( newuser . links != null ) && ( newuser . links [ command . meshid ] != null ) && ( newuser . links [ command . meshid ] . rights != null ) ) { targetMeshRights = newuser . links [ command . meshid ] . rights ; }
2020-07-06 22:46:38 +03:00
if ( ( targetMeshRights === MESHRIGHT _ADMIN ) && ( selfMeshRights != MESHRIGHT _ADMIN ) ) { msgs . push ( "Can't change rights of device group administrator" ) ; continue ; } // A non-admin can't kick out an admin
2020-04-18 01:02:53 +03:00
if ( command . remove === true ) {
// Remove mesh from user or user group
delete newuser . links [ command . meshid ] ;
} else {
2020-04-19 05:17:44 +03:00
// Adjust rights since we can't add more rights that we have outself for MESHRIGHT_MANAGEUSERS
2020-07-06 22:46:38 +03:00
if ( ( selfMeshRights != MESHRIGHT _ADMIN ) && ( command . meshadmin == MESHRIGHT _ADMIN ) ) { msgs . push ( "Can't set device group administrator, if not administrator" ) ; continue ; }
2020-04-19 05:17:44 +03:00
if ( ( ( selfMeshRights & 2 ) == 0 ) && ( ( command . meshadmin & 2 ) != 0 ) && ( ( targetMeshRights & 2 ) == 0 ) ) { command . meshadmin -= 2 ; }
2020-04-18 01:02:53 +03:00
// Add mesh to user or user group
if ( newuser . links == null ) { newuser . links = { } ; }
if ( newuser . links [ command . meshid ] ) { newuser . links [ command . meshid ] . rights = command . meshadmin ; } else { newuser . links [ command . meshid ] = { rights : command . meshadmin } ; }
}
2020-01-02 11:30:14 +03:00
if ( newuserid . startsWith ( 'user/' ) ) { db . SetUser ( newuser ) ; }
2020-03-27 05:33:13 +03:00
else if ( newuserid . startsWith ( 'ugrp/' ) ) { db . Set ( newuser ) ; }
2019-07-02 00:44:26 +03:00
parent . parent . DispatchEvent ( [ newuser . _id ] , obj , 'resubscribe' ) ;
2020-01-02 11:30:14 +03:00
if ( newuserid . startsWith ( 'user/' ) ) {
// Notify user change
var targets = [ '*' , 'server-users' , user . _id , newuser . _id ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( newuser ) , action : 'accountchange' , msgid : 78 , msgArgs : [ newuser . name ] , msg : 'Device group membership changed: ' + newuser . name , domain : domain . id } ;
2020-01-02 11:30:14 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
} else if ( newuserid . startsWith ( 'ugrp/' ) ) {
// Notify user group change
var targets = [ '*' , 'server-ugroups' , user . _id , newuser . _id ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'ugrp' , username : user . name , ugrpid : newuser . _id , name : newuser . name , desc : newuser . desc , action : 'usergroupchange' , links : newuser . links , msgid : 79 , msgArgs : [ newuser . name ] , msg : 'User group changed: ' + newuser . name , domain : domain . id } ;
2020-01-02 11:30:14 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
}
2019-12-31 02:38:18 +03:00
2020-04-18 01:02:53 +03:00
var event ;
if ( command . remove === true ) {
// Remove userid from the mesh
delete mesh . links [ newuserid ] ;
db . Set ( mesh ) ;
2020-09-09 11:32:00 +03:00
event = { etype : 'mesh' , username : newuser . name , userid : user . _id , meshid : mesh . _id , name : mesh . name , mtype : mesh . mtype , desc : mesh . desc , action : 'meshchange' , links : mesh . links , msg : 'Removed user ' + newuser . name + ' from device group ' + mesh . name , domain : domain . id , invite : mesh . invite } ;
2020-04-18 01:02:53 +03:00
} else {
// Add userid to the mesh
mesh . links [ newuserid ] = { name : newuser . name , rights : command . meshadmin } ;
db . Set ( mesh ) ;
2020-09-09 11:32:00 +03:00
event = { etype : 'mesh' , username : newuser . name , userid : user . _id , meshid : mesh . _id , name : mesh . name , mtype : mesh . mtype , desc : mesh . desc , action : 'meshchange' , links : mesh . links , msg : 'Added user ' + newuser . name + ' to device group ' + mesh . name , domain : domain . id , invite : mesh . invite } ;
2020-04-18 01:02:53 +03:00
}
2019-05-30 22:40:10 +03:00
2019-07-02 00:44:26 +03:00
// Notify mesh change
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the mesh. Another event will come.
2020-04-13 21:24:56 +03:00
parent . parent . DispatchEvent ( parent . CreateMeshDispatchTargets ( mesh , [ user . _id , newuserid ] ) , obj , event ) ;
2020-04-18 01:02:53 +03:00
if ( command . remove === true ) { msgs . push ( "Removed user " + newuserid . split ( '/' ) [ 2 ] ) ; } else { msgs . push ( "Added user " + newuserid . split ( '/' ) [ 2 ] ) ; }
2020-04-01 23:15:14 +03:00
successCount ++ ;
2019-07-02 00:44:26 +03:00
} else {
2020-04-06 03:44:54 +03:00
msgs . push ( "Unknown user " + newuserid . split ( '/' ) [ 2 ] ) ;
unknownUsers . push ( newuserid . split ( '/' ) [ 2 ] ) ;
2019-07-02 00:44:26 +03:00
failCount ++ ;
2019-05-30 22:40:10 +03:00
}
2019-07-02 00:44:26 +03:00
}
2017-10-24 00:09:58 +03:00
2020-04-01 23:15:14 +03:00
if ( ( successCount == 0 ) && ( failCount == 0 ) ) { msgs . push ( "Nothing done" ) ; }
2019-07-02 00:44:26 +03:00
if ( unknownUsers . length > 0 ) {
// Send error back, user not found.
2019-10-25 11:16:00 +03:00
displayNotificationMessage ( 'User' + ( ( unknownUsers . length > 1 ) ? 's' : '' ) + ' ' + EscapeHtml ( unknownUsers . join ( ', ' ) ) + ' not found.' , 'Device Group' , 'ServerNotify' ) ;
2017-10-24 00:09:58 +03:00
}
2019-07-02 00:44:26 +03:00
2020-04-01 23:15:14 +03:00
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'addmeshuser' , responseid : command . responseid , result : msgs . join ( ', ' ) , success : successCount , failed : failCount } ) ) ; } catch ( ex ) { } }
2019-01-05 04:59:13 +03:00
break ;
}
2020-03-24 02:56:59 +03:00
case 'adddeviceuser' : {
if ( typeof command . userid == 'string' ) { command . userids = [ command . userid ] ; }
2020-05-28 01:31:10 +03:00
var err = null , nodeIdSplit ;
2020-03-24 02:56:59 +03:00
try {
if ( common . validateString ( command . nodeid , 1 , 1024 ) == false ) { err = 'Invalid nodeid' ; } // Check the nodeid
else if ( common . validateInt ( command . rights ) == false ) { err = 'Invalid rights' ; } // Device rights must be an integer
2020-03-27 05:33:13 +03:00
else if ( ( command . rights & 7 ) != 0 ) { err = 'Invalid rights' ; } // EDITMESH, MANAGEUSERS or MANAGECOMPUTERS rights can't be assigned to a user to device link
2020-03-24 02:56:59 +03:00
else if ( ( common . validateStrArray ( command . usernames , 1 , 64 ) == false ) && ( common . validateStrArray ( command . userids , 1 , 128 ) == false ) ) { err = 'Invalid usernames' ; } // Username is between 1 and 64 characters
else {
2020-04-01 23:15:14 +03:00
if ( command . nodeid . indexOf ( '/' ) == - 1 ) { command . nodeid = 'node/' + domain . id + '/' + command . nodeid ; }
2020-03-24 02:56:59 +03:00
else if ( ( command . nodeid . split ( '/' ) . length != 3 ) || ( command . nodeid . split ( '/' ) [ 1 ] != domain . id ) ) { err = 'Invalid domain' ; } // Invalid domain, operation only valid for current domain
}
} catch ( ex ) { err = 'Validation exception: ' + ex ; }
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'adddeviceuser' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2020-03-25 23:21:14 +03:00
// Convert user names to userid's
if ( command . userids == null ) {
command . userids = [ ] ;
2020-04-13 08:51:57 +03:00
for ( var i in command . usernames ) {
if ( command . usernames [ i ] != null ) { command . userids . push ( 'user/' + domain . id + '/' + command . usernames [ i ] . toLowerCase ( ) ) ; }
}
2020-03-25 23:21:14 +03:00
}
2020-03-27 05:33:13 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
// Check if already in the right mesh
if ( ( node == null ) || ( node . meshid == command . meshid ) ) return ;
var dispatchTargets = [ '*' , node . meshid , node . _id ] ;
// Check that we have rights to manage users on this device
if ( ( rights & MESHRIGHT _MANAGEUSERS ) == 0 ) return ;
// Add the new link to the users
var nodeChanged = false ;
for ( var i in command . userids ) {
var newuserid = command . userids [ i ] ;
2020-04-01 23:15:14 +03:00
2020-04-13 08:51:57 +03:00
// Add a user
var newuser = null ;
if ( newuserid . startsWith ( 'ugrp/' ) ) { newuser = parent . userGroups [ newuserid ] ; }
if ( newuserid . startsWith ( 'user/' ) ) {
newuser = parent . users [ newuserid ] ;
// Search for a user name in that windows domain is the username starts with *\
if ( ( newuser == null ) && ( newuserid . startsWith ( 'user/' + domain . id + '/*\\' ) ) == true ) {
var search = newuserid . split ( '/' ) [ 2 ] . substring ( 1 ) ;
for ( var i in parent . users ) { if ( i . endsWith ( search ) && ( parent . users [ i ] . domain == domain . id ) ) { newuser = parent . users [ i ] ; command . userids [ i ] = newuserid = newuser . _id ; break ; } }
}
2020-04-01 23:15:14 +03:00
}
2020-05-28 01:31:10 +03:00
// Check the the user and device are in the same domain
if ( command . nodeid . split ( '/' ) [ 1 ] != newuserid . split ( '/' ) [ 1 ] ) return ; // Domain mismatch
2020-03-27 05:33:13 +03:00
if ( newuser != null ) {
// Add this user to the dispatch target list
dispatchTargets . push ( newuser . _id ) ;
2020-04-18 01:02:53 +03:00
if ( command . remove === true ) {
2020-03-27 05:33:13 +03:00
// Remove link to this user
if ( newuser . links != null ) {
delete newuser . links [ command . nodeid ] ;
if ( Object . keys ( newuser . links ) . length == 0 ) { delete newuser . links ; }
}
// Remove link to this device
if ( node . links != null ) {
delete node . links [ newuserid ] ;
nodeChanged = true ;
if ( Object . keys ( node . links ) . length == 0 ) { delete node . links ; }
}
} else {
// Add the new link to this user
if ( newuser . links == null ) { newuser . links = { } ; }
newuser . links [ command . nodeid ] = { rights : command . rights } ;
// Add the new link to the device
if ( node . links == null ) { node . links = { } ; }
node . links [ newuserid ] = { rights : command . rights }
nodeChanged = true ;
}
2020-04-13 08:51:57 +03:00
2020-03-27 05:33:13 +03:00
// Save the user to the database
2020-04-13 08:51:57 +03:00
if ( newuserid . startsWith ( 'user/' ) ) {
db . SetUser ( newuser ) ;
parent . parent . DispatchEvent ( [ newuser ] , obj , 'resubscribe' ) ;
2020-03-27 05:33:13 +03:00
2020-04-13 08:51:57 +03:00
// Notify user change
var targets = [ '*' , 'server-users' , newuserid ] ;
2020-09-09 11:32:00 +03:00
var event ;
if ( command . rights == 0 ) {
event = { etype : 'user' , userid : user . _id , username : user . name , action : 'accountchange' , msgid : 81 , msgArgs : [ newuser . name ] , msg : 'Removed user device rights for ' + newuser . name , domain : domain . id , account : parent . CloneSafeUser ( newuser ) , nodeListChange : newuserid } ;
} else {
event = { etype : 'user' , userid : user . _id , username : user . name , action : 'accountchange' , msgid : 82 , msgArgs : [ newuser . name ] , msg : 'Changed user device rights for ' + newuser . name , domain : domain . id , account : parent . CloneSafeUser ( newuser ) , nodeListChange : newuserid } ;
}
2020-04-13 08:51:57 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
} else if ( newuserid . startsWith ( 'ugrp/' ) ) {
db . Set ( newuser ) ;
// Notify user group change
var targets = [ '*' , 'server-ugroups' , newuser . _id ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'ugrp' , username : user . name , ugrpid : newuser . _id , name : newuser . name , action : 'usergroupchange' , links : newuser . links , msgid : 79 , msgArgs : [ newuser . name ] , msg : 'User group changed: ' + newuser . name , domain : domain . id } ;
2020-04-13 08:51:57 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
}
2020-03-27 05:33:13 +03:00
}
}
// Save the device
if ( nodeChanged == true ) {
// Save the node to the database
2020-03-31 03:47:04 +03:00
db . Set ( parent . cleanDevice ( node ) ) ;
2020-03-27 05:33:13 +03:00
// Event the node change
2020-09-09 11:32:00 +03:00
var event ;
if ( command . rights == 0 ) {
event = { etype : 'node' , userid : user . _id , username : user . name , action : 'changenode' , nodeid : node . _id , domain : domain . id , msgid : 81 , msgArgs : [ node . name ] , msg : 'Removed user device rights for ' + node . name , node : parent . CloneSafeNode ( node ) }
} else {
event = { etype : 'node' , userid : user . _id , username : user . name , action : 'changenode' , nodeid : node . _id , domain : domain . id , msgid : 82 , msgArgs : [ node . name ] , msg : 'Changed user device rights for ' + node . name , node : parent . CloneSafeNode ( node ) }
}
2020-03-27 05:33:13 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the mesh. Another event will come.
parent . parent . DispatchEvent ( dispatchTargets , obj , event ) ;
}
2020-04-01 23:15:14 +03:00
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'adddeviceuser' , responseid : command . responseid , result : 'ok' } ) ) ; } catch ( ex ) { } }
2020-03-27 05:33:13 +03:00
} ) ;
2020-03-24 02:56:59 +03:00
break ;
}
2019-01-05 04:59:13 +03:00
case 'removemeshuser' :
{
2020-05-28 01:31:10 +03:00
var xdomain , err = null ;
2020-04-08 21:26:35 +03:00
// Resolve the device group name if needed
if ( ( typeof command . meshname == 'string' ) && ( command . meshid == null ) ) {
for ( var i in parent . meshes ) {
var m = parent . meshes [ i ] ;
if ( ( m . mtype == 2 ) && ( m . name == command . meshname ) && parent . IsMeshViewable ( user , m ) ) {
if ( command . meshid == null ) { command . meshid = m . _id ; } else { err = 'Duplicate device groups found' ; }
}
}
}
2019-07-02 00:44:26 +03:00
try {
2019-10-26 20:57:40 +03:00
if ( common . validateString ( command . userid , 1 , 1024 ) == false ) { err = "Invalid userid" ; } // Check userid
if ( common . validateString ( command . meshid , 1 , 1024 ) == false ) { err = "Invalid groupid" ; } // Check meshid
2019-07-02 00:44:26 +03:00
if ( command . userid . indexOf ( '/' ) == - 1 ) { command . userid = 'user/' + domain . id + '/' + command . userid ; }
2019-10-26 20:57:40 +03:00
if ( command . userid == obj . user . _id ) { err = "Can't remove self" ; } // Can't add of modify self
2020-05-28 01:31:10 +03:00
if ( ( command . userid . split ( '/' ) . length != 3 ) || ( ( obj . crossDomain !== true ) && ( command . userid . split ( '/' ) [ 1 ] != domain . id ) ) ) { err = "Invalid userid" ; } // Invalid domain, operation only valid for current domain
2019-07-02 00:44:26 +03:00
else {
if ( command . meshid . indexOf ( '/' ) == - 1 ) { command . meshid = 'mesh/' + domain . id + '/' + command . meshid ; }
mesh = parent . meshes [ command . meshid ] ;
2020-05-28 01:31:10 +03:00
var meshIdSplit = command . meshid . split ( '/' ) ;
2019-10-26 20:57:40 +03:00
if ( mesh == null ) { err = "Unknown device group" ; }
2019-12-27 09:53:01 +03:00
else if ( ( parent . GetMeshRights ( user , mesh ) & MESHRIGHT _MANAGEUSERS ) == 0 ) { err = "Permission denied" ; }
2020-05-28 01:31:10 +03:00
else if ( meshIdSplit . length != 3 ) { err = "Invalid domain" ; } // Invalid domain, operation only valid for current domain
else {
xdomain = domain ;
if ( obj . crossDomain !== true ) { xdomain = parent . parent . config . domains [ meshIdSplit [ 1 ] ] ; }
if ( xdomain == null ) { err = "Invalid domain" ; }
}
2019-07-02 00:44:26 +03:00
}
2019-10-26 20:57:40 +03:00
} catch ( ex ) { err = "Validation exception: " + ex ; }
2019-01-05 04:59:13 +03:00
2019-07-02 00:44:26 +03:00
// Handle any errors
if ( err != null ) {
2020-05-28 01:31:10 +03:00
console . log ( err ) ;
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'removemeshuser' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
2019-07-02 00:44:26 +03:00
break ;
}
2019-01-05 04:59:13 +03:00
2019-07-02 00:44:26 +03:00
// Check if the user exists - Just in case we need to delete a mesh right for a non-existant user, we do it this way. Technically, it's not possible, but just in case.
2020-01-02 11:30:14 +03:00
var deluserid = command . userid , deluser = null ;
if ( deluserid . startsWith ( 'user/' ) ) { deluser = parent . users [ deluserid ] ; }
else if ( deluserid . startsWith ( 'ugrp/' ) ) { deluser = parent . userGroups [ deluserid ] ; }
2020-04-01 23:15:14 +03:00
// Search for a user name in that windows domain is the username starts with *\
2020-05-28 01:31:10 +03:00
if ( ( deluser == null ) && ( deluserid . startsWith ( 'user/' + xdomain . id + '/*\\' ) ) == true ) {
2020-04-01 23:15:14 +03:00
var search = deluserid . split ( '/' ) [ 2 ] . substring ( 1 ) ;
2020-05-28 01:31:10 +03:00
for ( var i in parent . users ) { if ( i . endsWith ( search ) && ( parent . users [ i ] . domain == xdomain . id ) ) { deluser = parent . users [ i ] ; command . userid = deluserid = deluser . _id ; break ; } }
2020-04-01 23:15:14 +03:00
}
2019-07-02 00:44:26 +03:00
if ( deluser != null ) {
// Remove mesh from user
if ( deluser . links != null && deluser . links [ command . meshid ] != null ) {
var delmeshrights = deluser . links [ command . meshid ] . rights ;
2020-07-06 22:46:38 +03:00
if ( ( delmeshrights == MESHRIGHT _ADMIN ) && ( parent . GetMeshRights ( user , mesh ) != MESHRIGHT _ADMIN ) ) return ; // A non-admin can't kick out an admin
2019-07-02 00:44:26 +03:00
delete deluser . links [ command . meshid ] ;
2020-01-02 11:30:14 +03:00
if ( deluserid . startsWith ( 'user/' ) ) { db . SetUser ( deluser ) ; }
2020-03-27 05:33:13 +03:00
else if ( deluserid . startsWith ( 'ugrp/' ) ) { db . Set ( deluser ) ; }
2019-07-02 00:44:26 +03:00
parent . parent . DispatchEvent ( [ deluser . _id ] , obj , 'resubscribe' ) ;
2019-12-31 02:38:18 +03:00
2020-01-02 11:30:14 +03:00
if ( deluserid . startsWith ( 'user/' ) ) {
// Notify user change
var targets = [ '*' , 'server-users' , user . _id , deluser . _id ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( deluser ) , action : 'accountchange' , msgid : 78 , msgArgs : [ deluser . name ] , msg : 'Device group membership changed: ' + deluser . name , domain : xdomain . id } ;
2020-01-02 11:30:14 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
} else if ( deluserid . startsWith ( 'ugrp/' ) ) {
// Notify user group change
var targets = [ '*' , 'server-ugroups' , user . _id , deluser . _id ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'ugrp' , username : user . name , ugrpid : deluser . _id , name : deluser . name , desc : deluser . desc , action : 'usergroupchange' , links : deluser . links , msgid : 79 , msgArgs : [ deluser . name ] , msg : 'User group changed: ' + deluser . name , domain : xdomain . id } ;
2020-01-02 11:30:14 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
}
2017-10-24 00:09:58 +03:00
}
2019-07-02 00:44:26 +03:00
}
2017-10-24 00:09:58 +03:00
2019-07-02 00:44:26 +03:00
// Remove user from the mesh
if ( mesh . links [ command . userid ] != null ) {
delete mesh . links [ command . userid ] ;
2020-03-27 05:33:13 +03:00
db . Set ( mesh ) ;
2017-10-24 00:09:58 +03:00
2019-07-02 00:44:26 +03:00
// Notify mesh change
var event ;
if ( deluser != null ) {
2020-09-09 11:32:00 +03:00
event = { etype : 'mesh' , username : user . name , userid : deluser . name , meshid : mesh . _id , name : mesh . name , mtype : mesh . mtype , desc : mesh . desc , action : 'meshchange' , links : mesh . links , msgid : 83 , msgArgs : [ deluser . name , mesh . name ] , msg : 'Removed user ' + deluser . name + ' from device group ' + mesh . name , domain : xdomain . id , invite : mesh . invite } ;
2019-07-02 00:44:26 +03:00
} else {
2020-09-09 11:32:00 +03:00
event = { etype : 'mesh' , username : user . name , userid : ( deluserid . split ( '/' ) [ 2 ] ) , meshid : mesh . _id , name : mesh . name , mtype : mesh . mtype , desc : mesh . desc , action : 'meshchange' , links : mesh . links , msgid : 83 , msgArgs : [ ( deluserid . split ( '/' ) [ 2 ] ) , mesh . name ] , msg : 'Removed user ' + ( deluserid . split ( '/' ) [ 2 ] ) + ' from device group ' + mesh . name , domain : xdomain . id , invite : mesh . invite } ;
2017-10-24 00:09:58 +03:00
}
2020-04-13 23:38:28 +03:00
parent . parent . DispatchEvent ( parent . CreateMeshDispatchTargets ( mesh , [ user . _id , command . userid ] ) , obj , event ) ;
2019-07-02 00:44:26 +03:00
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'removemeshuser' , responseid : command . responseid , result : 'ok' } ) ) ; } catch ( ex ) { } }
} else {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'removemeshuser' , responseid : command . responseid , result : 'User not in group' } ) ) ; } catch ( ex ) { } }
2017-10-24 00:09:58 +03:00
}
2019-01-05 04:59:13 +03:00
break ;
}
2019-02-08 02:00:10 +03:00
case 'meshamtpolicy' :
{
// Change a mesh Intel AMT policy
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . meshid , 1 , 1024 ) == false ) break ; // Check the meshid
if ( common . validateObject ( command . amtpolicy ) == false ) break ; // Check the amtpolicy
2019-06-13 05:40:27 +03:00
if ( common . validateInt ( command . amtpolicy . type , 0 , 3 ) == false ) break ; // Check the amtpolicy.type
2019-02-08 02:00:10 +03:00
if ( command . amtpolicy . type === 2 ) {
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . amtpolicy . password , 0 , 32 ) == false ) break ; // Check the amtpolicy.password
2019-06-25 04:56:14 +03:00
if ( ( command . amtpolicy . badpass != null ) && common . validateInt ( command . amtpolicy . badpass , 0 , 1 ) == false ) break ; // Check the amtpolicy.badpass
2019-03-10 01:28:08 +03:00
if ( common . validateInt ( command . amtpolicy . cirasetup , 0 , 2 ) == false ) break ; // Check the amtpolicy.cirasetup
2019-06-13 05:40:27 +03:00
} else if ( command . amtpolicy . type === 3 ) {
if ( common . validateString ( command . amtpolicy . password , 0 , 32 ) == false ) break ; // Check the amtpolicy.password
if ( common . validateInt ( command . amtpolicy . cirasetup , 0 , 2 ) == false ) break ; // Check the amtpolicy.cirasetup
2019-02-08 02:00:10 +03:00
}
2019-03-10 01:28:08 +03:00
mesh = parent . meshes [ command . meshid ] ;
2019-02-08 02:00:10 +03:00
change = '' ;
if ( mesh ) {
// Check if this user has rights to do this
2019-12-27 09:53:01 +03:00
if ( ( parent . GetMeshRights ( user , mesh ) & MESHRIGHT _EDITMESH ) == 0 ) return ;
2019-02-08 02:00:10 +03:00
if ( ( command . meshid . split ( '/' ) . length != 3 ) || ( command . meshid . split ( '/' ) [ 1 ] != domain . id ) ) return ; // Invalid domain, operation only valid for current domain
// TODO: Check if this is a change from the existing policy
// Perform the Intel AMT policy change
change = 'Intel AMT policy change' ;
var amtpolicy = { type : command . amtpolicy . type } ;
if ( command . amtpolicy . type === 2 ) { amtpolicy = { type : command . amtpolicy . type , password : command . amtpolicy . password , badpass : command . amtpolicy . badpass , cirasetup : command . amtpolicy . cirasetup } ; }
2019-06-13 05:40:27 +03:00
else if ( command . amtpolicy . type === 3 ) { amtpolicy = { type : command . amtpolicy . type , password : command . amtpolicy . password , cirasetup : command . amtpolicy . cirasetup } ; }
2019-02-08 02:00:10 +03:00
mesh . amt = amtpolicy ;
2020-03-27 05:33:13 +03:00
db . Set ( mesh ) ;
2019-10-11 21:16:36 +03:00
var amtpolicy2 = Object . assign ( { } , amtpolicy ) ; // Shallow clone
2019-06-25 04:56:14 +03:00
delete amtpolicy2 . password ;
2020-03-21 10:25:17 +03:00
var event = { etype : 'mesh' , userid : user . _id , username : user . name , meshid : mesh . _id , amt : amtpolicy2 , action : 'meshchange' , links : mesh . links , msg : change , domain : domain . id , invite : mesh . invite } ;
2019-05-29 03:25:23 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the mesh. Another event will come.
2020-04-13 21:24:56 +03:00
parent . parent . DispatchEvent ( parent . CreateMeshDispatchTargets ( mesh , [ user . _id ] ) , obj , event ) ;
2019-02-08 02:00:10 +03:00
// Send new policy to all computers on this mesh
2019-03-11 07:40:25 +03:00
//routeCommandToMesh(command.meshid, { action: 'amtPolicy', amtPolicy: amtpolicy });
// See if the node is connected
for ( var nodeid in parent . wsagents ) {
const agent = parent . wsagents [ nodeid ] ;
if ( agent . dbMeshKey == command . meshid ) { agent . sendUpdatedIntelAmtPolicy ( amtpolicy ) ; }
}
2019-02-08 02:00:10 +03:00
}
break ;
}
2019-01-05 04:59:13 +03:00
case 'addamtdevice' :
{
2019-03-10 01:28:08 +03:00
if ( args . wanonly == true ) return ; // This is a WAN-only server, local Intel AMT computers can't be added
if ( common . validateString ( command . meshid , 1 , 1024 ) == false ) break ; // Check meshid
2019-01-05 04:59:13 +03:00
if ( ( command . meshid . split ( '/' ) . length != 3 ) || ( command . meshid . split ( '/' ) [ 1 ] != domain . id ) ) return ; // Invalid domain, operation only valid for current domain
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . devicename , 1 , 256 ) == false ) break ; // Check device name
if ( common . validateString ( command . hostname , 1 , 256 ) == false ) break ; // Check hostname
if ( common . validateString ( command . amtusername , 0 , 16 ) == false ) break ; // Check username
if ( common . validateString ( command . amtpassword , 0 , 16 ) == false ) break ; // Check password
2019-01-05 04:59:13 +03:00
if ( command . amttls == '0' ) { command . amttls = 0 ; } else if ( command . amttls == '1' ) { command . amttls = 1 ; } // Check TLS flag
if ( ( command . amttls != 1 ) && ( command . amttls != 0 ) ) break ;
// If we are in WAN-only mode, hostname is not used
2019-03-10 01:53:46 +03:00
if ( ( args . wanonly == true ) && ( command . hostname ) ) { delete command . hostname ; }
2019-01-05 04:59:13 +03:00
// Get the mesh
2019-03-10 01:28:08 +03:00
mesh = parent . meshes [ command . meshid ] ;
2019-01-05 04:59:13 +03:00
if ( mesh ) {
if ( mesh . mtype != 1 ) return ; // This operation is only allowed for mesh type 1, Intel AMT agentless mesh.
// Check if this user has rights to do this
2019-12-27 09:53:01 +03:00
if ( ( parent . GetMeshRights ( user , mesh ) & MESHRIGHT _MANAGECOMPUTERS ) == 0 ) return ;
2019-01-05 04:59:13 +03:00
// Create a new nodeid
2019-03-10 01:28:08 +03:00
parent . crypto . randomBytes ( 48 , function ( err , buf ) {
2019-01-05 04:59:13 +03:00
// create the new node
nodeid = 'node/' + domain . id + '/' + buf . toString ( 'base64' ) . replace ( /\+/g , '@' ) . replace ( /\//g , '$' ) ;
2019-06-25 04:56:14 +03:00
var device = { type : 'node' , _id : nodeid , meshid : command . meshid , name : command . devicename , host : command . hostname , domain : domain . id , intelamt : { user : command . amtusername , pass : command . amtpassword , tls : command . amttls } } ;
2019-03-10 01:28:08 +03:00
db . Set ( device ) ;
2019-01-05 04:59:13 +03:00
// Event the new node
2020-09-09 11:32:00 +03:00
parent . parent . DispatchEvent ( parent . CreateMeshDispatchTargets ( command . meshid , [ nodeid ] ) , obj , { etype : 'node' , userid : user . _id , username : user . name , action : 'addnode' , node : parent . CloneSafeNode ( device ) , msgid : 84 , msgArgs : [ command . devicename , mesh . name ] , msg : 'Added device ' + command . devicename + ' to device group ' + mesh . name , domain : domain . id } ) ;
2019-01-05 04:59:13 +03:00
} ) ;
}
break ;
}
case 'scanamtdevice' :
{
2019-03-10 01:28:08 +03:00
if ( args . wanonly == true ) return ; // This is a WAN-only server, this type of scanning is not allowed.
if ( common . validateString ( command . range , 1 , 256 ) == false ) break ; // Check range string
2019-01-05 04:59:13 +03:00
// Ask the RMCP scanning to scan a range of IP addresses
2019-03-10 01:28:08 +03:00
if ( parent . parent . amtScanner ) {
2019-03-12 03:33:24 +03:00
if ( parent . parent . amtScanner . performRangeScan ( user . _id , command . range ) == false ) {
parent . parent . DispatchEvent ( [ '*' , user . _id ] , obj , { action : 'scanamtdevice' , range : command . range , results : null , nolog : 1 } ) ;
2017-10-24 00:09:58 +03:00
}
}
2019-01-05 04:59:13 +03:00
break ;
}
2019-02-12 05:02:07 +03:00
case 'changeDeviceMesh' :
{
2020-04-16 18:46:53 +03:00
var err = null ;
// Resolve the device group name if needed
if ( ( typeof command . meshname == 'string' ) && ( command . meshid == null ) ) {
for ( var i in parent . meshes ) {
var m = parent . meshes [ i ] ;
if ( ( m . mtype == 2 ) && ( m . name == command . meshname ) && parent . IsMeshViewable ( user , m ) ) {
if ( command . meshid == null ) { command . meshid = m . _id ; } else { err = 'Duplicate device groups found' ; }
}
}
}
// Perform input validation
try {
if ( common . validateStrArray ( command . nodeids , 1 , 256 ) == false ) { err = "Invalid nodeids" ; } // Check nodeids
if ( common . validateString ( command . meshid , 1 , 1024 ) == false ) { err = "Invalid groupid" ; } // Check meshid
else {
if ( command . meshid . indexOf ( '/' ) == - 1 ) { command . meshid = 'mesh/' + domain . id + '/' + command . meshid ; }
mesh = parent . meshes [ command . meshid ] ;
if ( mesh == null ) { err = "Unknown device group" ; }
else if ( ( parent . GetMeshRights ( user , mesh ) & MESHRIGHT _MANAGECOMPUTERS ) == 0 ) { err = "Permission denied" ; }
else if ( ( command . meshid . split ( '/' ) . length != 3 ) || ( command . meshid . split ( '/' ) [ 1 ] != domain . id ) ) { err = "Invalid domain" ; } // Invalid domain, operation only valid for current domain
}
} catch ( ex ) { console . log ( ex ) ; err = "Validation exception: " + ex ; }
// Handle any errors
if ( err != null ) {
2020-05-28 01:31:10 +03:00
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'changeDeviceMesh' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
2020-04-16 18:46:53 +03:00
break ;
}
2019-02-12 05:02:07 +03:00
2019-02-19 04:50:10 +03:00
// For each nodeid, change the group
for ( var i = 0 ; i < command . nodeids . length ; i ++ ) {
2020-04-16 18:46:53 +03:00
var xnodeid = command . nodeids [ i ] ;
if ( xnodeid . indexOf ( '/' ) == - 1 ) { xnodeid = 'node/' + domain . id + '/' + xnodeid ; }
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
2020-04-16 18:46:53 +03:00
parent . GetNodeWithRights ( domain , user , xnodeid , function ( node , rights , visible ) {
// Check if we found this device
if ( node == null ) { if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'changeDeviceMesh' , responseid : command . responseid , result : 'Device not found' } ) ) ; } catch ( ex ) { } } return ; }
2019-02-19 04:50:10 +03:00
// Check if already in the right mesh
2020-04-16 18:46:53 +03:00
if ( node . meshid == command . meshid ) { if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'changeDeviceMesh' , responseid : command . responseid , result : 'Device already in correct group' } ) ) ; } catch ( ex ) { } } return ; }
2019-02-19 04:50:10 +03:00
// Make sure both source and target mesh are the same type
2020-04-16 18:46:53 +03:00
try { if ( parent . meshes [ node . meshid ] . mtype != parent . meshes [ command . meshid ] . mtype ) return ; } catch ( e ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'changeDeviceMesh' , responseid : command . responseid , result : 'Device groups are of different types' } ) ) ; } catch ( ex ) { } }
return ;
} ;
2019-02-19 04:50:10 +03:00
// Make sure that we have rights on both source and destination mesh
2019-12-27 09:53:01 +03:00
const targetMeshRights = parent . GetMeshRights ( user , command . meshid ) ;
2020-08-29 21:43:09 +03:00
if ( ( ( rights & MESHRIGHT _EDITMESH ) == 0 ) || ( ( targetMeshRights & MESHRIGHT _EDITMESH ) == 0 ) ) {
2020-04-16 18:46:53 +03:00
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'changeDeviceMesh' , responseid : command . responseid , result : 'Permission denied' } ) ) ; } catch ( ex ) { } }
return ;
}
2019-02-19 04:50:10 +03:00
// Perform the switch, start by saving the node with the new meshid.
2019-03-08 06:56:24 +03:00
const oldMeshId = node . meshid ;
2019-02-19 04:50:10 +03:00
node . meshid = command . meshid ;
2020-03-31 03:47:04 +03:00
db . Set ( parent . cleanDevice ( node ) ) ;
2019-02-19 04:50:10 +03:00
// If the device is connected on this server, switch it now.
2019-03-10 01:28:08 +03:00
var agentSession = parent . wsagents [ node . _id ] ;
2019-03-08 06:56:24 +03:00
if ( agentSession != null ) {
agentSession . dbMeshKey = command . meshid ; // Switch the agent mesh
agentSession . meshid = command . meshid . split ( '/' ) [ 2 ] ; // Switch the agent mesh
agentSession . sendUpdatedIntelAmtPolicy ( ) ; // Send the new Intel AMT policy
}
2019-02-19 04:50:10 +03:00
2019-10-10 01:56:27 +03:00
// If any MQTT sessions are connected on this server, switch it now.
if ( parent . parent . mqttbroker != null ) { parent . parent . mqttbroker . changeDeviceMesh ( node . _id , command . meshid ) ; }
2019-10-11 02:07:32 +03:00
// If any CIRA sessions are connected on this server, switch it now.
if ( parent . parent . mpsserver != null ) { parent . parent . mpsserver . changeDeviceMesh ( node . _id , command . meshid ) ; }
2019-02-19 04:50:10 +03:00
// Add the connection state
2019-03-10 01:28:08 +03:00
const state = parent . parent . GetConnectivityState ( node . _id ) ;
2019-02-19 04:50:10 +03:00
if ( state ) {
node . conn = state . connectivity ;
node . pwr = state . powerState ;
2019-03-10 01:28:08 +03:00
if ( ( state . connectivity & 1 ) != 0 ) { var agent = parent . wsagents [ node . _id ] ; if ( agent != null ) { node . agct = agent . connectTime ; } }
if ( ( state . connectivity & 2 ) != 0 ) { var cira = parent . parent . mpsserver . ciraConnections [ node . _id ] ; if ( cira != null ) { node . cict = cira . tag . connectTime ; } }
2019-02-19 04:50:10 +03:00
}
// Event the node change
2019-03-10 01:28:08 +03:00
var newMesh = parent . meshes [ command . meshid ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'node' , userid : user . _id , username : user . name , action : 'nodemeshchange' , nodeid : node . _id , node : node , oldMeshId : oldMeshId , newMeshId : command . meshid , msgid : 85 , msgArgs : [ node . name , newMesh . name ] , msg : 'Moved device ' + node . name + ' to group ' + newMesh . name , domain : domain . id } ;
2019-05-29 03:25:23 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the mesh. Another event will come.
2020-04-13 21:24:56 +03:00
parent . parent . DispatchEvent ( parent . CreateMeshDispatchTargets ( command . meshid , [ oldMeshId , node . _id ] ) , obj , event ) ;
2020-04-16 18:46:53 +03:00
// Send response if required
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'changeDeviceMesh' , responseid : command . responseid , result : 'ok' } ) ) ; } catch ( ex ) { } }
2019-02-19 04:50:10 +03:00
} ) ;
}
2019-02-12 05:02:07 +03:00
break ;
}
2019-01-05 04:59:13 +03:00
case 'removedevices' :
{
2019-03-10 01:28:08 +03:00
if ( common . validateArray ( command . nodeids , 1 ) == false ) break ; // Check nodeid's
2019-01-05 04:59:13 +03:00
for ( i in command . nodeids ) {
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeids [ i ] , function ( node , rights , visible ) {
// Check we have the rights to delete this device
2020-08-29 21:43:09 +03:00
if ( ( rights & MESHRIGHT _UNINSTALL ) == 0 ) return ;
2019-12-28 02:18:43 +03:00
// Delete this node including network interface information, events and timeline
2020-09-10 00:26:03 +03:00
db . Remove ( node . _id ) ; // Remove node with that id
db . Remove ( 'if' + node . _id ) ; // Remove interface information
db . Remove ( 'nt' + node . _id ) ; // Remove notes
db . Remove ( 'lc' + node . _id ) ; // Remove last connect time
db . Remove ( 'si' + node . _id ) ; // Remove system information
if ( db . RemoveSMBIOS ) { db . RemoveSMBIOS ( node . _id ) ; } // Remove SMBios data
db . RemoveAllNodeEvents ( node . _id ) ; // Remove all events for this node
db . removeAllPowerEventsForNode ( node . _id ) ; // Remove all power events for this node
2019-12-28 02:18:43 +03:00
db . Get ( 'ra' + obj . dbNodeKey , function ( err , nodes ) {
if ( ( nodes != null ) && ( nodes . length == 1 ) ) { db . Remove ( 'da' + nodes [ 0 ] . daid ) ; } // Remove diagnostic agent to real agent link
db . Remove ( 'ra' + node . _id ) ; // Remove real agent to diagnostic agent link
} ) ;
2019-01-05 04:59:13 +03:00
2020-03-27 09:01:49 +03:00
// Remove any user node links
if ( node . links != null ) {
for ( var i in node . links ) {
if ( i . startsWith ( 'user/' ) ) {
var cuser = parent . users [ i ] ;
if ( ( cuser != null ) && ( cuser . links != null ) && ( cuser . links [ node . _id ] != null ) ) {
// Remove the user link & save the user
delete cuser . links [ node . _id ] ;
if ( Object . keys ( cuser . links ) . length == 0 ) { delete cuser . links ; }
db . SetUser ( cuser ) ;
// Notify user change
var targets = [ '*' , 'server-users' , cuser . _id ] ;
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : cuser . _id , username : cuser . name , action : 'accountchange' , msgid : 86 , msgArgs : [ cuser . name ] , msg : 'Removed user device rights for ' + cuser . name , domain : domain . id , account : parent . CloneSafeUser ( cuser ) } ;
2020-03-27 09:01:49 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
}
}
}
}
2019-12-28 02:18:43 +03:00
// Event node deletion
2020-09-09 11:32:00 +03:00
var event = { etype : 'node' , userid : user . _id , username : user . name , action : 'removenode' , nodeid : node . _id , msgid : 87 , msgArgs : [ node . name , parent . meshes [ node . meshid ] . name ] , msg : 'Removed device ' + node . name + ' from device group ' + parent . meshes [ node . meshid ] . name , domain : domain . id } ;
2019-12-28 02:18:43 +03:00
// TODO: We can't use the changeStream for node delete because we will not know the meshid the device was in.
//if (db.changeStream) { event.noact = 1; } // If DB change stream is active, don't use this event to remove the node. Another event will come.
2020-04-13 21:24:56 +03:00
parent . parent . DispatchEvent ( parent . CreateNodeDispatchTargets ( node . meshid , node . _id ) , obj , event ) ;
2019-12-28 02:18:43 +03:00
// Disconnect all connections if needed
var state = parent . parent . GetConnectivityState ( nodeid ) ;
if ( ( state != null ) && ( state . connectivity != null ) ) {
if ( ( state . connectivity & 1 ) != 0 ) { parent . wsagents [ nodeid ] . close ( ) ; } // Disconnect mesh agent
if ( ( state . connectivity & 2 ) != 0 ) { parent . parent . mpsserver . close ( parent . parent . mpsserver . ciraConnections [ nodeid ] ) ; } // Disconnect CIRA connection
2017-10-24 00:09:58 +03:00
}
2019-01-05 04:59:13 +03:00
} ) ;
2017-10-24 00:09:58 +03:00
}
2019-01-05 04:59:13 +03:00
break ;
}
case 'wakedevices' :
{
// TODO: We can optimize this a lot.
// - We should get a full list of all MAC's to wake first.
// - We should try to only have one agent per subnet (using Gateway MAC) send a wake-on-lan.
2019-12-28 02:18:43 +03:00
if ( common . validateArray ( command . nodeids , 1 ) == false ) break ; // Check nodeid's
2019-01-05 04:59:13 +03:00
for ( i in command . nodeids ) {
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeids [ i ] , function ( node , rights , visible ) {
// Check we have the rights to delete this device
if ( ( rights & MESHRIGHT _WAKEDEVICE ) == 0 ) return ;
// If this device is connected on MQTT, send a wake action.
if ( parent . parent . mqttbroker != null ) { parent . parent . mqttbroker . publish ( node . _id , 'powerAction' , 'wake' ) ; }
// Get the device interface information
db . Get ( 'if' + node . _id , function ( err , nodeifs ) {
if ( ( nodeifs != null ) && ( nodeifs . length == 1 ) ) {
var macs = [ ] , nodeif = nodeifs [ 0 ] ;
2020-07-15 23:04:37 +03:00
if ( nodeif . netif ) {
for ( var j in nodeif . netif ) { if ( nodeif . netif [ j ] . mac && ( nodeif . netif [ j ] . mac != '00:00:00:00:00:00' ) && ( macs . indexOf ( nodeif . netif [ j ] . mac ) == - 1 ) ) { macs . push ( nodeif . netif [ j ] . mac ) ; } }
} else if ( nodeif . netif2 ) {
for ( var j in nodeif . netif2 ) { for ( var k in nodeif . netif2 [ j ] ) { if ( nodeif . netif2 [ j ] [ k ] . mac && ( nodeif . netif2 [ j ] [ k ] . mac != '00:00:00:00:00:00' ) && ( macs . indexOf ( nodeif . netif2 [ j ] [ k ] . mac ) == - 1 ) ) { macs . push ( nodeif . netif2 [ j ] [ k ] . mac ) ; } } }
}
if ( macs . length == 0 ) return ;
2019-12-28 02:18:43 +03:00
// Have the server send a wake-on-lan packet (Will not work in WAN-only)
if ( parent . parent . meshScanner != null ) { parent . parent . meshScanner . wakeOnLan ( macs ) ; }
2020-07-15 23:04:37 +03:00
// Get the list of device groups this user as wake permissions on
var targets = [ ] , targetDeviceGroups = parent . GetAllMeshWithRights ( user , MESHRIGHT _WAKEDEVICE ) ;
for ( j in targetDeviceGroups ) { targets . push ( targetDeviceGroups [ j ] . _id ) ; }
for ( j in user . links ) { if ( ( j . startsWith ( 'node/' ) ) && ( typeof user . links [ j ] . rights == 'number' ) && ( ( user . links [ j ] . rights & MESHRIGHT _WAKEDEVICE ) != 0 ) ) { targets . push ( j ) ; } }
2019-12-28 02:18:43 +03:00
// Go thru all the connected agents and send wake-on-lan on all the ones in the target mesh list
2020-07-11 09:12:43 +03:00
for ( j in parent . wsagents ) {
var agent = parent . wsagents [ j ] ;
2020-07-15 23:04:37 +03:00
if ( ( agent . authenticated == 2 ) && ( ( targets . indexOf ( agent . dbMeshKey ) >= 0 ) || ( targets . indexOf ( agent . dbNodeKey ) >= 0 ) ) ) {
2019-12-28 02:18:43 +03:00
//console.log('Asking agent ' + agent.dbNodeKey + ' to wake ' + macs.join(','));
try { agent . send ( JSON . stringify ( { action : 'wakeonlan' , macs : macs } ) ) ; } catch ( ex ) { }
}
2017-10-24 00:09:58 +03:00
}
}
} ) ;
2019-12-28 02:18:43 +03:00
} ) ;
2019-01-05 04:59:13 +03:00
// Confirm we may be doing something (TODO)
try { ws . send ( JSON . stringify ( { action : 'wakedevices' } ) ) ; } catch ( ex ) { }
2017-10-24 00:09:58 +03:00
}
2019-10-24 23:13:18 +03:00
break ;
}
2020-07-11 09:12:43 +03:00
case 'runcommands' :
{
if ( common . validateArray ( command . nodeids , 1 ) == false ) break ; // Check nodeid's
if ( typeof command . type != 'number' ) break ; // Check command type
if ( typeof command . cmds != 'string' ) break ; // Check commands
for ( i in command . nodeids ) {
2020-07-13 22:25:14 +03:00
var nodeid = command . nodeids [ i ] , err = null ;
// Argument validation
if ( common . validateString ( nodeid , 1 , 1024 ) == false ) { err = 'Invalid nodeid' ; } // Check nodeid
else {
if ( nodeid . indexOf ( '/' ) == - 1 ) { nodeid = 'node/' + domain . id + '/' + nodeid ; }
if ( ( nodeid . split ( '/' ) . length != 3 ) || ( nodeid . split ( '/' ) [ 1 ] != domain . id ) ) { err = 'Invalid domain' ; } // Invalid domain, operation only valid for current domain
}
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'runcommands' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
continue ;
}
2020-07-11 09:12:43 +03:00
// Get the node and the rights for this node
2020-07-13 22:25:14 +03:00
parent . GetNodeWithRights ( domain , user , nodeid , function ( node , rights , visible ) {
// Check if this node was found
if ( node == null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'runcommands' , responseid : command . responseid , result : 'Invalid nodeid' } ) ) ; } catch ( ex ) { } }
return ;
}
2020-07-11 09:12:43 +03:00
// Check we have the rights to run commands on this device
2020-07-13 22:25:14 +03:00
if ( ( rights & MESHRIGHT _REMOTECONTROL ) == 0 ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'runcommands' , responseid : command . responseid , result : 'Access denied' } ) ) ; } catch ( ex ) { } }
return ;
}
2020-07-11 09:12:43 +03:00
// Get the agent and run the commands
var agent = parent . wsagents [ node . _id ] ;
if ( ( agent != null ) && ( agent . authenticated == 2 ) && ( agent . agentInfo != null ) ) {
// Check if this agent is correct for this command type
// command.type 1 = Windows Command, 2 = Windows PowerShell, 3 = Linux/BSD/macOS
var commandsOk = false ;
if ( ( agent . agentInfo . agentId > 0 ) && ( agent . agentInfo . agentId < 5 ) ) {
// Windows Agent
if ( ( command . type == 1 ) || ( command . type == 2 ) ) { commandsOk = true ; }
2020-07-13 22:25:14 +03:00
else if ( command . type === 0 ) { command . type = 1 ; commandsOk = true ; } // Set the default type of this agent
2020-07-11 09:12:43 +03:00
} else {
// Non-Windows Agent
if ( command . type == 3 ) { commandsOk = true ; }
2020-07-13 22:25:14 +03:00
else if ( command . type === 0 ) { command . type = 3 ; commandsOk = true ; } // Set the default type of this agent
2020-07-11 09:12:43 +03:00
}
if ( commandsOk == true ) {
2020-07-13 22:25:14 +03:00
// Send the commands to the agent
2020-07-11 09:12:43 +03:00
try { agent . send ( JSON . stringify ( { action : 'runcommands' , type : command . type , cmds : command . cmds } ) ) ; } catch ( ex ) { }
2020-07-13 22:25:14 +03:00
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'runcommands' , responseid : command . responseid , result : 'OK' } ) ) ; } catch ( ex ) { } }
} else {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'runcommands' , responseid : command . responseid , result : 'Invalid command type' } ) ) ; } catch ( ex ) { } }
2020-07-11 09:12:43 +03:00
}
2020-07-13 22:25:14 +03:00
} else {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'runcommands' , responseid : command . responseid , result : 'Agent not connected' } ) ) ; } catch ( ex ) { } }
2020-07-11 09:12:43 +03:00
}
} ) ;
}
break ;
}
2019-10-24 23:13:18 +03:00
case 'uninstallagent' :
{
if ( common . validateArray ( command . nodeids , 1 ) == false ) break ; // Check nodeid's
for ( i in command . nodeids ) {
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeids [ i ] , function ( node , rights , visible ) {
// Check we have the rights to delete this device
if ( ( rights & MESHRIGHT _UNINSTALL ) == 0 ) return ;
// Send uninstall command to connected agent
const agent = parent . wsagents [ node . _id ] ;
if ( agent != null ) {
//console.log('Asking agent ' + agent.dbNodeKey + ' to uninstall.');
try { agent . send ( JSON . stringify ( { action : 'uninstallagent' } ) ) ; } catch ( ex ) { }
}
} ) ;
2019-10-24 23:13:18 +03:00
}
2019-01-05 04:59:13 +03:00
break ;
}
case 'poweraction' :
{
2019-03-10 01:28:08 +03:00
if ( common . validateArray ( command . nodeids , 1 ) == false ) break ; // Check nodeid's
2019-10-08 04:11:15 +03:00
if ( common . validateInt ( command . actiontype , 2 , 4 ) == false ) break ; // Check actiontype
2019-01-05 04:59:13 +03:00
for ( i in command . nodeids ) {
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeids [ i ] , function ( node , rights , visible ) {
// Check we have the rights to delete this device
if ( ( rights & MESHRIGHT _REMOTECONTROL ) == 0 ) return ;
// If this device is connected on MQTT, send a power action.
if ( parent . parent . mqttbroker != null ) { parent . parent . mqttbroker . publish ( node . _id , 'powerAction' , [ '' , '' , 'poweroff' , 'reset' , 'sleep' ] [ command . actiontype ] ) ; }
// Get this device and send the power command
const agent = parent . wsagents [ node . _id ] ;
if ( agent != null ) {
try { agent . send ( JSON . stringify ( { action : 'poweraction' , actiontype : command . actiontype } ) ) ; } catch ( ex ) { }
}
} ) ;
2019-01-05 04:59:13 +03:00
// Confirm we may be doing something (TODO)
try { ws . send ( JSON . stringify ( { action : 'poweraction' } ) ) ; } catch ( ex ) { }
2018-04-20 04:19:15 +03:00
}
2019-01-05 04:59:13 +03:00
break ;
}
case 'toast' :
{
2020-08-18 01:01:25 +03:00
var err = null ;
// Perform input validation
try {
if ( common . validateStrArray ( command . nodeids , 1 , 256 ) == false ) { err = "Invalid nodeids" ; } // Check nodeids
else if ( common . validateString ( command . title , 1 , 512 ) == false ) { err = "Invalid title" ; } // Check title
else if ( common . validateString ( command . msg , 1 , 4096 ) == false ) { err = "Invalid message" ; } // Check message
else {
var nodeids = [ ] ;
for ( i in command . nodeids ) { if ( command . nodeids [ i ] . indexOf ( '/' ) == - 1 ) { nodeids . push ( 'node/' + domain . id + '/' + command . nodeids [ i ] ) ; } else { nodeids . push ( command . nodeids [ i ] ) ; } }
command . nodeids = nodeids ;
}
} catch ( ex ) { console . log ( ex ) ; err = "Validation exception: " + ex ; }
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'toast' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2019-01-05 04:59:13 +03:00
for ( i in command . nodeids ) {
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeids [ i ] , function ( node , rights , visible ) {
2020-08-18 01:01:25 +03:00
// Check we have the rights to notify this device
2019-12-28 02:18:43 +03:00
if ( ( rights & MESHRIGHT _CHATNOTIFY ) == 0 ) return ;
// Get this device and send toast command
const agent = parent . wsagents [ node . _id ] ;
if ( agent != null ) {
try { agent . send ( JSON . stringify ( { action : 'toast' , title : command . title , msg : command . msg , sessionid : ws . sessionId , username : user . name , userid : user . _id } ) ) ; } catch ( ex ) { }
}
} ) ;
2017-10-24 00:09:58 +03:00
}
2020-08-18 01:01:25 +03:00
// Send response if required
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'toast' , responseid : command . responseid , result : 'ok' } ) ) ; } catch ( ex ) { } }
2019-01-05 04:59:13 +03:00
break ;
}
case 'getnetworkinfo' :
{
// Argument validation
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . nodeid , 1 , 1024 ) == false ) break ; // Check nodeid
2020-05-02 23:49:56 +03:00
if ( command . nodeid . indexOf ( '/' ) == - 1 ) { command . nodeid = 'node/' + domain . id + '/' + command . nodeid ; }
2019-01-05 04:59:13 +03:00
if ( ( command . nodeid . split ( '/' ) . length != 3 ) || ( command . nodeid . split ( '/' ) [ 1 ] != domain . id ) ) return ; // Invalid domain, operation only valid for current domain
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
2020-05-02 23:49:56 +03:00
if ( visible == false ) { try { ws . send ( JSON . stringify ( { action : 'getnetworkinfo' , nodeid : command . nodeid , tag : command . tag , noinfo : true , result : 'Invalid device id' } ) ) ; } catch ( ex ) { } return ; }
2017-10-24 00:09:58 +03:00
2019-12-28 02:18:43 +03:00
// Get network information about this node
db . Get ( 'if' + node . _id , function ( err , netinfos ) {
2020-06-27 00:43:58 +03:00
if ( ( netinfos == null ) || ( netinfos . length != 1 ) ) { try { ws . send ( JSON . stringify ( { action : 'getnetworkinfo' , nodeid : node . _id , netif : null , netif2 : null } ) ) ; } catch ( ex ) { } return ; }
2019-12-28 02:18:43 +03:00
var netinfo = netinfos [ 0 ] ;
2020-06-27 00:43:58 +03:00
try { ws . send ( JSON . stringify ( { action : 'getnetworkinfo' , nodeid : node . _id , updateTime : netinfo . updateTime , netif : netinfo . netif , netif2 : netinfo . netif2 } ) ) ; } catch ( ex ) { }
2019-12-28 02:18:43 +03:00
} ) ;
2019-01-05 04:59:13 +03:00
} ) ;
break ;
}
case 'changedevice' :
{
// Argument validation
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . nodeid , 1 , 1024 ) == false ) break ; // Check nodeid
2019-01-05 04:59:13 +03:00
if ( ( command . userloc ) && ( command . userloc . length != 2 ) && ( command . userloc . length != 0 ) ) return ;
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
if ( ( rights & MESHRIGHT _MANAGECOMPUTERS ) == 0 ) return ;
var mesh = parent . meshes [ node . meshid ] ;
2019-01-05 04:59:13 +03:00
2019-12-28 02:18:43 +03:00
// Ready the node change event
var changes = [ ] , event = { etype : 'node' , userid : user . _id , username : user . name , action : 'changenode' , nodeid : node . _id , domain : domain . id } ;
change = 0 ;
event . msg = ': ' ;
// If we are in WAN-only mode, host is not used
if ( ( args . wanonly == true ) && ( command . host ) ) { delete command . host ; }
// Look for a change
2020-04-13 00:05:34 +03:00
if ( ( typeof command . icon == 'number' ) && ( command . icon != node . icon ) ) { change = 1 ; node . icon = command . icon ; changes . push ( 'icon' ) ; }
if ( ( typeof command . name == 'string' ) && ( command . name != node . name ) ) { change = 1 ; node . name = command . name ; changes . push ( 'name' ) ; }
if ( ( typeof command . host == 'string' ) && ( command . host != node . host ) ) { change = 1 ; node . host = command . host ; changes . push ( 'host' ) ; }
2020-04-16 05:42:43 +03:00
if ( typeof command . consent == 'number' ) {
var oldConsent = node . consent ;
if ( command . consent != node . consent ) { node . consent = command . consent ; }
if ( command . consent == 0 ) { delete node . consent ; }
if ( oldConsent != node . consent ) { change = 1 ; changes . push ( 'consent' ) ; }
}
2020-04-13 00:05:34 +03:00
2020-02-18 01:19:35 +03:00
if ( ( typeof command . rdpport == 'number' ) && ( command . rdpport > 0 ) && ( command . rdpport < 65536 ) ) {
if ( ( command . rdpport == 3389 ) && ( node . rdpport != null ) ) {
delete node . rdpport ; change = 1 ; changes . push ( 'rdpport' ) ; // Delete the RDP port
} else {
node . rdpport = command . rdpport ; change = 1 ; changes . push ( 'rdpport' ) ; // Set the RDP port
}
}
2020-06-07 04:55:47 +03:00
if ( ( typeof command . rfbport == 'number' ) && ( command . rfbport > 0 ) && ( command . rfbport < 65536 ) ) {
if ( ( command . rfbport == 5900 ) && ( node . rfbport != null ) ) {
delete node . rfbport ; change = 1 ; changes . push ( 'rfbport' ) ; // Delete the RFB port
} else {
node . rfbport = command . rfbport ; change = 1 ; changes . push ( 'rfbport' ) ; // Set the RFB port
}
}
2019-12-28 02:18:43 +03:00
if ( domain . geolocation && command . userloc && ( ( node . userloc == null ) || ( command . userloc [ 0 ] != node . userloc [ 0 ] ) || ( command . userloc [ 1 ] != node . userloc [ 1 ] ) ) ) {
change = 1 ;
if ( ( command . userloc . length == 0 ) && ( node . userloc ) ) {
delete node . userloc ;
changes . push ( 'location removed' ) ;
} else {
command . userloc . push ( ( Math . floor ( ( new Date ( ) ) / 1000 ) ) ) ;
node . userloc = command . userloc . join ( ',' ) ;
changes . push ( 'location' ) ;
2017-10-24 00:09:58 +03:00
}
2019-12-28 02:18:43 +03:00
}
if ( command . desc != null && ( command . desc != node . desc ) ) { change = 1 ; node . desc = command . desc ; changes . push ( 'description' ) ; }
if ( command . intelamt != null ) {
if ( ( command . intelamt . user != null ) && ( command . intelamt . pass != undefined ) && ( ( command . intelamt . user != node . intelamt . user ) || ( command . intelamt . pass != node . intelamt . pass ) ) ) { change = 1 ; node . intelamt . user = command . intelamt . user ; node . intelamt . pass = command . intelamt . pass ; changes . push ( 'Intel AMT credentials' ) ; }
2020-03-31 05:29:46 +03:00
if ( ( command . intelamt . tls != null ) && ( command . intelamt . tls != node . intelamt . tls ) ) { change = 1 ; node . intelamt . tls = command . intelamt . tls ; changes . push ( 'Intel AMT TLS' ) ; }
2019-12-28 02:18:43 +03:00
}
if ( command . tags ) { // Node grouping tag, this is a array of strings that can't be empty and can't contain a comma
var ok = true , group2 = [ ] ;
if ( common . validateString ( command . tags , 0 , 4096 ) == true ) { command . tags = command . tags . split ( ',' ) ; }
for ( var i in command . tags ) { var tname = command . tags [ i ] . trim ( ) ; if ( ( tname . length > 0 ) && ( tname . length < 64 ) && ( group2 . indexOf ( tname ) == - 1 ) ) { group2 . push ( tname ) ; } }
group2 . sort ( ) ;
if ( node . tags != group2 ) { node . tags = group2 ; change = 1 ; }
} else if ( ( command . tags === '' ) && node . tags ) { delete node . tags ; change = 1 ; }
if ( change == 1 ) {
// Save the node
2020-03-31 03:47:04 +03:00
db . Set ( parent . cleanDevice ( node ) ) ;
2019-01-05 04:59:13 +03:00
2019-12-28 02:18:43 +03:00
// Event the node change. Only do this if the database will not do it.
event . msg = 'Changed device ' + node . name + ' from group ' + mesh . name + ': ' + changes . join ( ', ' ) ;
event . node = parent . CloneSafeNode ( node ) ;
2020-03-22 08:52:23 +03:00
if ( command . rdpport == 3389 ) { event . node . rdpport = 3389 ; }
2020-06-07 04:55:47 +03:00
if ( command . rfbport == 5900 ) { event . node . rfbport = 5900 ; }
2019-12-28 02:18:43 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the node. Another event will come.
2020-04-13 21:24:56 +03:00
parent . parent . DispatchEvent ( parent . CreateNodeDispatchTargets ( node . meshid , node . _id , [ user . _id ] ) , obj , event ) ;
2019-01-05 04:59:13 +03:00
}
} ) ;
break ;
}
case 'uploadagentcore' :
{
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . type , 1 , 40 ) == false ) break ; // Check path
2019-02-16 23:56:33 +03:00
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
2020-07-06 22:46:38 +03:00
if ( ( node == null ) || ( ( ( rights & MESHRIGHT _AGENTCONSOLE ) == 0 ) && ( user . siteadmin != SITERIGHT _ADMIN ) ) ) return ;
2019-12-28 02:18:43 +03:00
if ( command . type == 'default' ) {
// Send the default core to the agent
parent . parent . updateMeshCore ( function ( ) { parent . sendMeshAgentCore ( user , domain , node . _id , 'default' ) ; } ) ;
} else if ( command . type == 'clear' ) {
// Clear the mesh agent core on the mesh agent
parent . sendMeshAgentCore ( user , domain , node . _id , 'clear' ) ;
} else if ( command . type == 'recovery' ) {
// Send the recovery core to the agent
parent . sendMeshAgentCore ( user , domain , node . _id , 'recovery' ) ;
} else if ( ( command . type == 'custom' ) && ( common . validateString ( command . path , 1 , 2048 ) == true ) ) {
// Send a mesh agent core to the mesh agent
var file = parent . getServerFilePath ( user , domain , command . path ) ;
if ( file != null ) {
fs . readFile ( file . fullpath , 'utf8' , function ( err , data ) {
if ( err != null ) {
data = common . IntToStr ( 0 ) + data ; // Add the 4 bytes encoding type & flags (Set to 0 for raw)
parent . sendMeshAgentCore ( user , domain , node . _id , 'custom' , data ) ;
}
} ) ;
2019-02-16 23:56:33 +03:00
}
2019-01-22 01:05:50 +03:00
}
2019-02-16 23:56:33 +03:00
} ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'agentdisconnect' :
{
2019-03-10 01:28:08 +03:00
if ( common . validateInt ( command . disconnectMode ) == false ) return ; // Check disconnect mode
2019-02-16 23:56:33 +03:00
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
2020-07-06 22:46:38 +03:00
if ( ( node == null ) || ( ( ( rights & MESHRIGHT _AGENTCONSOLE ) == 0 ) && ( user . siteadmin != SITERIGHT _ADMIN ) ) ) return ;
2019-02-16 23:56:33 +03:00
2019-12-28 02:18:43 +03:00
// Force mesh agent disconnection
parent . forceMeshAgentDisconnect ( user , domain , node . _id , command . disconnectMode ) ;
2019-02-16 23:56:33 +03:00
} ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'close' :
{
// Close the web socket session
2019-01-05 23:04:18 +03:00
if ( obj . req . session && obj . req . session . ws && obj . req . session . ws == ws ) { delete obj . req . session . ws ; }
2019-01-05 04:59:13 +03:00
try { ws . close ( ) ; } catch ( e ) { }
break ;
}
case 'getcookie' :
{
// Check if this user has rights on this nodeid
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . nodeid , 1 , 1024 ) == false ) break ; // Check nodeid
db . Get ( command . nodeid , function ( err , nodes ) { // TODO: Make a NodeRights(user) method that also does not do a db call if agent is connected (???)
2019-05-21 04:03:14 +03:00
if ( ( nodes == null ) || ( nodes . length == 1 ) ) {
2019-12-27 09:53:01 +03:00
if ( ( parent . GetMeshRights ( user , nodes [ 0 ] . meshid ) & MESHRIGHT _REMOTECONTROL ) != 0 ) {
2019-01-05 04:59:13 +03:00
// Add a user authentication cookie to a url
var cookieContent = { userid : user . _id , domainid : user . domain } ;
if ( command . nodeid ) { cookieContent . nodeid = command . nodeid ; }
if ( command . tcpaddr ) { cookieContent . tcpaddr = command . tcpaddr ; } // Indicates the browser want to agent to TCP connect to a remote address
if ( command . tcpport ) { cookieContent . tcpport = command . tcpport ; } // Indicates the browser want to agent to TCP connect to a remote port
2019-04-17 20:03:23 +03:00
command . cookie = parent . parent . encodeCookie ( cookieContent , parent . parent . loginCookieEncryptionKey ) ;
2020-02-11 03:36:03 +03:00
command . trustedCert = parent . isTrustedCert ( domain ) ;
2019-01-05 04:59:13 +03:00
try { ws . send ( JSON . stringify ( command ) ) ; } catch ( ex ) { }
}
}
} ) ;
break ;
}
case 'inviteAgent' :
{
2020-04-08 02:37:58 +03:00
var err = null , mesh = null ;
2020-04-08 02:13:02 +03:00
// Resolve the device group name if needed
if ( ( typeof command . meshname == 'string' ) && ( command . meshid == null ) ) {
for ( var i in parent . meshes ) {
var m = parent . meshes [ i ] ;
2020-04-08 02:37:58 +03:00
if ( ( m . mtype == 2 ) && ( m . name == command . meshname ) && parent . IsMeshViewable ( user , m ) ) {
if ( command . meshid == null ) { command . meshid = m . _id ; } else { err = 'Duplicate device groups found' ; }
}
2020-04-08 02:13:02 +03:00
}
}
2019-10-25 11:16:00 +03:00
try {
2019-07-05 23:28:41 +03:00
if ( ( parent . parent . mailserver == null ) || ( args . lanonly == true ) ) { err = 'Unsupported feature' ; } // This operation requires the email server
else if ( ( parent . parent . certificates . CommonName == null ) || ( parent . parent . certificates . CommonName . indexOf ( '.' ) == - 1 ) ) { err = 'Unsupported feature' ; } // Server name must be configured
else if ( common . validateString ( command . meshid , 1 , 1024 ) == false ) { err = 'Invalid group identifier' ; } // Check meshid
else {
if ( command . meshid . split ( '/' ) . length == 1 ) { command . meshid = 'mesh/' + domain . id + '/' + command . meshid ; }
if ( ( command . meshid . split ( '/' ) . length != 3 ) || ( command . meshid . split ( '/' ) [ 1 ] != domain . id ) ) { err = 'Invalid group identifier' ; } // Invalid domain, operation only valid for current domain
else if ( common . validateString ( command . email , 4 , 1024 ) == false ) { err = 'Invalid email' ; } // Check email
else if ( command . email . split ( '@' ) . length != 2 ) { err = 'Invalid email' ; } // Check email
else {
mesh = parent . meshes [ command . meshid ] ;
if ( mesh == null ) { err = 'Unknown device group' ; } // Check if the group exists
else if ( mesh . mtype != 2 ) { err = 'Invalid group type' ; } // Check if this is the correct group type
2019-12-28 02:18:43 +03:00
else if ( parent . IsMeshViewable ( user , mesh ) == false ) { err = 'Not allowed' ; } // Check if this user has rights to do this
2019-07-05 23:28:41 +03:00
}
}
} catch ( ex ) { err = 'Validation exception: ' + ex ; }
2019-01-05 04:59:13 +03:00
2019-07-05 23:28:41 +03:00
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'inviteAgent' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2019-01-05 04:59:13 +03:00
2019-07-05 23:28:41 +03:00
// Perform email invitation
2020-07-10 21:59:28 +03:00
parent . parent . mailserver . sendAgentInviteMail ( domain , ( user . realname ? user . realname : user . name ) , command . email . toLowerCase ( ) , command . meshid , command . name , command . os , command . msg , command . flags , command . expire , parent . getLanguageCodes ( req ) ) ;
2019-01-05 04:59:13 +03:00
2019-07-05 23:28:41 +03:00
// Send a response if needed
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'inviteAgent' , responseid : command . responseid , result : 'ok' } ) ) ; } catch ( ex ) { } }
2019-10-17 00:46:41 +03:00
break ;
}
case 'setDeviceEvent' :
{
// Argument validation
if ( common . validateString ( command . msg , 1 , 4096 ) == false ) break ; // Check event
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
if ( rights == 0 ) return ;
2019-10-17 00:46:41 +03:00
2019-12-28 02:18:43 +03:00
// Add an event for this device
2020-04-13 21:24:56 +03:00
var targets = parent . CreateNodeDispatchTargets ( node . meshid , node . _id , [ 'server-users' , user . _id ] ) ;
2020-01-24 02:51:32 +03:00
var event = { etype : 'node' , userid : user . _id , username : user . name , nodeid : node . _id , action : 'manual' , msg : decodeURIComponent ( command . msg ) , domain : domain . id } ;
2019-12-28 02:18:43 +03:00
parent . parent . DispatchEvent ( targets , obj , event ) ;
} ) ;
2019-01-05 04:59:13 +03:00
break ;
}
case 'setNotes' :
{
// Argument validation
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . id , 1 , 1024 ) == false ) break ; // Check id
2019-01-05 04:59:13 +03:00
var splitid = command . id . split ( '/' ) ;
if ( ( splitid . length != 3 ) || ( splitid [ 1 ] != domain . id ) ) return ; // Invalid domain, operation only valid for current domain
var idtype = splitid [ 0 ] ;
if ( ( idtype != 'user' ) && ( idtype != 'mesh' ) && ( idtype != 'node' ) ) return ;
if ( idtype == 'node' ) {
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . id , function ( node , rights , visible ) {
if ( ( rights & MESHRIGHT _SETNOTES ) != 0 ) {
// Set the id's notes
if ( common . validateString ( command . notes , 1 ) == false ) {
db . Remove ( 'nt' + node . _id ) ; // Delete the note for this node
} else {
db . Set ( { _id : 'nt' + node . _id , type : 'note' , value : command . notes } ) ; // Set the note for this node
2017-10-24 00:09:58 +03:00
}
}
} ) ;
2019-01-05 04:59:13 +03:00
} else if ( idtype == 'mesh' ) {
// Get the mesh for this device
2019-03-10 01:28:08 +03:00
mesh = parent . meshes [ command . id ] ;
2018-01-24 01:15:59 +03:00
if ( mesh ) {
// Check if this user has rights to do this
2019-12-27 09:53:01 +03:00
if ( ( parent . GetMeshRights ( user , mesh ) & MESHRIGHT _EDITMESH ) == 0 ) return ; // Must have rights to edit the mesh
2018-01-24 01:15:59 +03:00
2018-04-16 21:57:42 +03:00
// Set the id's notes
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . notes , 1 ) == false ) {
db . Remove ( 'nt' + command . id ) ; // Delete the note for this node
2018-04-16 21:57:42 +03:00
} else {
2019-03-10 01:28:08 +03:00
db . Set ( { _id : 'nt' + command . id , type : 'note' , value : command . notes } ) ; // Set the note for this mesh
2018-04-16 21:57:42 +03:00
}
}
2019-01-05 04:59:13 +03:00
} else if ( ( idtype == 'user' ) && ( ( user . siteadmin & 2 ) != 0 ) ) {
// Set the id's notes
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . notes , 1 ) == false ) {
db . Remove ( 'nt' + command . id ) ; // Delete the note for this node
2019-01-05 04:59:13 +03:00
} else {
2019-04-17 03:32:18 +03:00
// Can only perform this operation on other users of our group.
var chguser = parent . users [ command . id ] ;
if ( chguser == null ) break ; // This user does not exists
if ( ( user . groups != null ) && ( user . groups . length > 0 ) && ( ( chguser . groups == null ) || ( findOne ( chguser . groups , user . groups ) == false ) ) ) break ;
2019-03-10 01:28:08 +03:00
db . Set ( { _id : 'nt' + command . id , type : 'note' , value : command . notes } ) ; // Set the note for this user
2019-01-05 04:59:13 +03:00
}
2018-04-13 04:14:03 +03:00
}
2020-03-15 01:03:50 +03:00
break ;
}
case 'otpemail' :
{
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2020-03-15 01:03:50 +03:00
// Check input
if ( typeof command . enabled != 'boolean' ) return ;
// See if we really need to change the state
if ( ( command . enabled === true ) && ( user . otpekey != null ) ) return ;
if ( ( command . enabled === false ) && ( user . otpekey == null ) ) return ;
// Change the email 2FA of this user
if ( command . enabled === true ) { user . otpekey = { } ; } else { delete user . otpekey ; }
parent . db . SetUser ( user ) ;
ws . send ( JSON . stringify ( { action : 'otpemail' , success : true , enabled : command . enabled } ) ) ; // Report success
// Notify change
var targets = [ '*' , 'server-users' , user . _id ] ;
if ( user . groups ) { for ( var i in user . groups ) { targets . push ( 'server-users:' + i ) ; } }
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , msgid : command . enabled ? 88 : 89 , msg : command . enabled ? "Enabled email two-factor authentication." : "Disabled email two-factor authentication." , domain : domain . id } ;
2020-03-15 01:03:50 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2019-01-16 00:51:07 +03:00
break ;
}
case 'otpauth-request' :
{
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2020-03-15 01:03:50 +03:00
// Check if 2-step login is supported
2019-08-23 03:05:21 +03:00
const twoStepLoginSupported = ( ( parent . parent . config . settings . no2factorauth !== true ) && ( domain . auth != 'sspi' ) && ( parent . parent . certificates . CommonName . indexOf ( '.' ) != - 1 ) && ( args . nousers !== true ) ) ;
2019-01-16 05:21:03 +03:00
if ( twoStepLoginSupported ) {
// Request a one time password to be setup
2019-03-25 21:32:16 +03:00
var otplib = null ;
try { otplib = require ( 'otplib' ) ; } catch ( ex ) { }
if ( otplib == null ) { break ; }
2019-01-16 05:21:03 +03:00
const secret = otplib . authenticator . generateSecret ( ) ; // TODO: Check the random source of this value.
2019-03-10 01:28:08 +03:00
ws . send ( JSON . stringify ( { action : 'otpauth-request' , secret : secret , url : otplib . authenticator . keyuri ( user . name , parent . certificates . CommonName , secret ) } ) ) ;
2019-01-16 05:21:03 +03:00
}
2019-01-16 00:51:07 +03:00
break ;
}
case 'otpauth-setup' :
{
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2020-03-15 01:03:50 +03:00
// Check if 2-step login is supported
2019-08-23 03:05:21 +03:00
const twoStepLoginSupported = ( ( parent . parent . config . settings . no2factorauth !== true ) && ( domain . auth != 'sspi' ) && ( parent . parent . certificates . CommonName . indexOf ( '.' ) != - 1 ) && ( args . nousers !== true ) ) ;
2019-01-16 05:21:03 +03:00
if ( twoStepLoginSupported ) {
// Perform the one time password setup
2019-03-25 21:32:16 +03:00
var otplib = null ;
try { otplib = require ( 'otplib' ) ; } catch ( ex ) { }
if ( otplib == null ) { break ; }
2019-02-11 03:04:36 +03:00
otplib . authenticator . options = { window : 2 } ; // Set +/- 1 minute window
2019-01-16 05:21:03 +03:00
if ( otplib . authenticator . check ( command . token , command . secret ) === true ) {
// Token is valid, activate 2-step login on this account.
user . otpsecret = command . secret ;
2019-03-10 01:28:08 +03:00
parent . db . SetUser ( user ) ;
2019-01-16 05:21:03 +03:00
ws . send ( JSON . stringify ( { action : 'otpauth-setup' , success : true } ) ) ; // Report success
2019-02-11 07:13:03 +03:00
// Notify change
2019-04-17 03:32:18 +03:00
var targets = [ '*' , 'server-users' , user . _id ] ;
if ( user . groups ) { for ( var i in user . groups ) { targets . push ( 'server-users:' + i ) ; } }
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , msgid : 90 , msg : 'Added authentication application' , domain : domain . id } ;
2019-05-29 03:25:23 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2019-01-16 05:21:03 +03:00
} else {
ws . send ( JSON . stringify ( { action : 'otpauth-setup' , success : false } ) ) ; // Report fail
}
2019-01-16 00:51:07 +03:00
}
break ;
}
case 'otpauth-clear' :
{
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2020-03-15 01:03:50 +03:00
// Check if 2-step login is supported
2019-08-23 03:05:21 +03:00
const twoStepLoginSupported = ( ( parent . parent . config . settings . no2factorauth !== true ) && ( domain . auth != 'sspi' ) && ( parent . parent . certificates . CommonName . indexOf ( '.' ) != - 1 ) && ( args . nousers !== true ) ) ;
2019-01-16 05:21:03 +03:00
if ( twoStepLoginSupported ) {
// Clear the one time password secret
if ( user . otpsecret ) {
delete user . otpsecret ;
2019-03-10 01:28:08 +03:00
parent . db . SetUser ( user ) ;
2019-02-11 07:13:03 +03:00
ws . send ( JSON . stringify ( { action : 'otpauth-clear' , success : true } ) ) ; // Report success
2019-01-16 05:21:03 +03:00
// Notify change
2019-04-17 03:32:18 +03:00
var targets = [ '*' , 'server-users' , user . _id ] ;
if ( user . groups ) { for ( var i in user . groups ) { targets . push ( 'server-users:' + i ) ; } }
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , msgid : 91 , msg : 'Removed authentication application' , domain : domain . id } ;
2019-05-29 03:25:23 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2019-01-16 05:21:03 +03:00
} else {
ws . send ( JSON . stringify ( { action : 'otpauth-clear' , success : false } ) ) ; // Report fail
}
2019-01-16 00:51:07 +03:00
}
2019-01-05 04:59:13 +03:00
break ;
}
2019-02-06 06:07:12 +03:00
case 'otpauth-getpasswords' :
{
2020-03-15 01:03:50 +03:00
// Check if 2-step login is supported
2019-08-23 03:05:21 +03:00
const twoStepLoginSupported = ( ( parent . parent . config . settings . no2factorauth !== true ) && ( domain . auth != 'sspi' ) && ( parent . parent . certificates . CommonName . indexOf ( '.' ) != - 1 ) && ( args . nousers !== true ) ) ;
2019-02-08 07:06:01 +03:00
if ( twoStepLoginSupported == false ) break ;
2019-02-06 06:07:12 +03:00
2020-09-09 11:32:00 +03:00
var actionTaken = false , actionText = null , actionId = 0 ;
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin == 0xFFFFFFFF ) || ( ( user . siteadmin & 1024 ) == 0 ) ) { // Don't allow generation of tokens if the account is settings locked
// Perform a sub-action
if ( command . subaction == 1 ) { // Generate a new set of tokens
var randomNumbers = [ ] , v ;
for ( var i = 0 ; i < 10 ; i ++ ) { do { v = getRandomEightDigitInteger ( ) ; } while ( randomNumbers . indexOf ( v ) >= 0 ) ; randomNumbers . push ( v ) ; }
user . otpkeys = { keys : [ ] } ;
for ( var i = 0 ; i < 10 ; i ++ ) { user . otpkeys . keys [ i ] = { p : randomNumbers [ i ] , u : true } }
actionTaken = true ;
2020-09-09 11:32:00 +03:00
actionId = 92 ;
actionText = "New 2FA backup codes generated" ;
2020-08-06 06:15:34 +03:00
} else if ( command . subaction == 2 ) { // Clear all tokens
actionTaken = ( user . otpkeys != null ) ;
delete user . otpkeys ;
2020-09-09 11:32:00 +03:00
if ( actionTaken ) {
actionId = 93 ;
actionText = "2FA backup codes cleared" ;
}
2020-08-06 06:15:34 +03:00
}
2019-02-06 06:07:12 +03:00
2020-08-06 06:15:34 +03:00
// Save the changed user
if ( actionTaken ) { parent . db . SetUser ( user ) ; }
}
2019-02-06 06:07:12 +03:00
// Return one time passwords for this user
2020-04-30 12:02:23 +03:00
if ( count2factoraAuths ( ) > 0 ) {
2019-02-08 09:30:33 +03:00
ws . send ( JSON . stringify ( { action : 'otpauth-getpasswords' , passwords : user . otpkeys ? user . otpkeys . keys : null } ) ) ;
}
2019-02-11 03:04:36 +03:00
2019-02-11 07:13:03 +03:00
// Notify change
2019-09-24 20:34:33 +03:00
if ( actionText != null ) {
var targets = [ '*' , 'server-users' , user . _id ] ;
if ( user . groups ) { for ( var i in user . groups ) { targets . push ( 'server-users:' + i ) ; } }
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , msgid : actionId , msg : actionText , domain : domain . id } ;
2019-09-24 20:34:33 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
}
2019-02-08 07:06:01 +03:00
break ;
}
case 'otp-hkey-get' :
{
2020-03-12 02:53:09 +03:00
// Check if 2-step login is supported
2019-08-23 03:05:21 +03:00
const twoStepLoginSupported = ( ( parent . parent . config . settings . no2factorauth !== true ) && ( domain . auth != 'sspi' ) && ( parent . parent . certificates . CommonName . indexOf ( '.' ) != - 1 ) && ( args . nousers !== true ) ) ;
2019-02-08 07:06:01 +03:00
if ( twoStepLoginSupported == false ) break ;
// Send back the list of keys we have, just send the list of names and index
var hkeys = [ ] ;
2019-02-08 20:24:00 +03:00
if ( user . otphkeys != null ) { for ( var i = 0 ; i < user . otphkeys . length ; i ++ ) { hkeys . push ( { i : user . otphkeys [ i ] . keyIndex , name : user . otphkeys [ i ] . name , type : user . otphkeys [ i ] . type } ) ; } }
2019-02-08 07:06:01 +03:00
ws . send ( JSON . stringify ( { action : 'otp-hkey-get' , keys : hkeys } ) ) ;
break ;
}
case 'otp-hkey-remove' :
{
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2020-03-25 23:21:14 +03:00
// Check if 2-step login is supported
2019-08-23 03:05:21 +03:00
const twoStepLoginSupported = ( ( parent . parent . config . settings . no2factorauth !== true ) && ( domain . auth != 'sspi' ) && ( parent . parent . certificates . CommonName . indexOf ( '.' ) != - 1 ) && ( args . nousers !== true ) ) ;
2019-02-08 07:06:01 +03:00
if ( twoStepLoginSupported == false || command . index == null ) break ;
// Remove a key
var foundAtIndex = - 1 ;
if ( user . otphkeys != null ) { for ( var i = 0 ; i < user . otphkeys . length ; i ++ ) { if ( user . otphkeys [ i ] . keyIndex == command . index ) { foundAtIndex = i ; } } }
if ( foundAtIndex != - 1 ) {
user . otphkeys . splice ( foundAtIndex , 1 ) ;
2019-03-10 01:28:08 +03:00
parent . db . SetUser ( user ) ;
2019-02-08 07:06:01 +03:00
}
2019-02-08 09:30:33 +03:00
2019-02-11 07:13:03 +03:00
// Notify change
2019-04-17 03:32:18 +03:00
var targets = [ '*' , 'server-users' , user . _id ] ;
if ( user . groups ) { for ( var i in user . groups ) { targets . push ( 'server-users:' + i ) ; } }
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , msgid : 94 , msg : 'Removed security key' , domain : domain . id } ;
2019-05-29 03:25:23 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2019-02-08 07:06:01 +03:00
break ;
}
case 'otp-hkey-yubikey-add' :
{
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2019-02-08 07:06:01 +03:00
// Yubico API id and signature key can be requested from https://upgrade.yubico.com/getapikey/
2019-03-25 21:32:16 +03:00
var yubikeyotp = null ;
try { yubikeyotp = require ( 'yubikeyotp' ) ; } catch ( ex ) { }
2019-02-08 07:06:01 +03:00
2020-03-25 23:21:14 +03:00
// Check if 2-step login is supported
2019-08-23 03:05:21 +03:00
const twoStepLoginSupported = ( ( parent . parent . config . settings . no2factorauth !== true ) && ( domain . auth != 'sspi' ) && ( parent . parent . certificates . CommonName . indexOf ( '.' ) != - 1 ) && ( args . nousers !== true ) ) ;
2019-03-25 21:32:16 +03:00
if ( ( yubikeyotp == null ) || ( twoStepLoginSupported == false ) || ( typeof command . otp != 'string' ) ) {
2019-02-15 01:44:38 +03:00
ws . send ( JSON . stringify ( { action : 'otp-hkey-yubikey-add' , result : false , name : command . name } ) ) ;
break ;
}
// Check if Yubikey support is present or OTP no exactly 44 in length
if ( ( typeof domain . yubikey != 'object' ) || ( typeof domain . yubikey . id != 'string' ) || ( typeof domain . yubikey . secret != 'string' ) || ( command . otp . length != 44 ) ) {
ws . send ( JSON . stringify ( { action : 'otp-hkey-yubikey-add' , result : false , name : command . name } ) ) ;
break ;
}
2019-02-08 07:06:01 +03:00
2019-02-15 01:44:38 +03:00
// TODO: Check if command.otp is modhex encoded, reject if not.
2019-02-08 07:06:01 +03:00
2019-02-08 20:24:00 +03:00
// Query the YubiKey server to validate the OTP
2019-02-08 07:06:01 +03:00
var request = { otp : command . otp , id : domain . yubikey . id , key : domain . yubikey . secret , timestamp : true }
if ( domain . yubikey . proxy ) { request . requestParams = { proxy : domain . yubikey . proxy } ; }
yubikeyotp . verifyOTP ( request , function ( err , results ) {
2019-02-15 01:44:38 +03:00
if ( ( results != null ) && ( results . status == 'OK' ) ) {
2019-03-10 01:28:08 +03:00
var keyIndex = parent . crypto . randomBytes ( 4 ) . readUInt32BE ( 0 ) ;
2019-02-08 20:24:00 +03:00
var keyId = command . otp . substring ( 0 , 12 ) ;
if ( user . otphkeys == null ) { user . otphkeys = [ ] ; }
// Check if this key was already registered, if so, remove it.
var foundAtIndex = - 1 ;
for ( var i = 0 ; i < user . otphkeys . length ; i ++ ) { if ( user . otphkeys [ i ] . keyid == keyId ) { foundAtIndex = i ; } }
if ( foundAtIndex != - 1 ) { user . otphkeys . splice ( foundAtIndex , 1 ) ; }
// Add the new key and notify
user . otphkeys . push ( { name : command . name , type : 2 , keyid : keyId , keyIndex : keyIndex } ) ;
2019-03-10 01:28:08 +03:00
parent . db . SetUser ( user ) ;
2019-02-08 20:24:00 +03:00
ws . send ( JSON . stringify ( { action : 'otp-hkey-yubikey-add' , result : true , name : command . name , index : keyIndex } ) ) ;
// Notify change TODO: Should be done on all sessions/servers for this user.
2019-04-17 03:32:18 +03:00
var targets = [ '*' , 'server-users' , user . _id ] ;
if ( user . groups ) { for ( var i in user . groups ) { targets . push ( 'server-users:' + i ) ; } }
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , msgid : 95 , msg : 'Added security key' , domain : domain . id } ;
2019-05-29 03:25:23 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2019-02-08 20:24:00 +03:00
} else {
ws . send ( JSON . stringify ( { action : 'otp-hkey-yubikey-add' , result : false , name : command . name } ) ) ;
}
2019-02-08 07:06:01 +03:00
} ) ;
2019-02-06 06:07:12 +03:00
break ;
}
2019-03-23 08:33:53 +03:00
case 'webauthn-startregister' :
{
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2020-03-25 23:21:14 +03:00
// Check if 2-step login is supported
2019-08-23 03:05:21 +03:00
const twoStepLoginSupported = ( ( parent . parent . config . settings . no2factorauth !== true ) && ( domain . auth != 'sspi' ) && ( parent . parent . certificates . CommonName . indexOf ( '.' ) != - 1 ) && ( args . nousers !== true ) ) ;
2019-05-17 00:55:07 +03:00
if ( ( twoStepLoginSupported == false ) || ( command . name == null ) ) break ;
// Send the registration request
var registrationOptions = parent . webauthn . generateRegistrationChallenge ( "Anonymous Service" , { id : Buffer ( user . _id , 'binary' ) . toString ( 'base64' ) , name : user . _id , displayName : user . _id . split ( '/' ) [ 2 ] } ) ;
obj . webAuthnReqistrationRequest = { action : 'webauthn-startregister' , keyname : command . name , request : registrationOptions } ;
ws . send ( JSON . stringify ( obj . webAuthnReqistrationRequest ) ) ;
2019-03-23 08:33:53 +03:00
break ;
}
case 'webauthn-endregister' :
{
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2019-08-23 03:05:21 +03:00
const twoStepLoginSupported = ( ( parent . parent . config . settings . no2factorauth !== true ) && ( domain . auth != 'sspi' ) && ( parent . parent . certificates . CommonName . indexOf ( '.' ) != - 1 ) && ( args . nousers !== true ) ) ;
if ( ( twoStepLoginSupported == false ) || ( obj . webAuthnReqistrationRequest == null ) ) return ;
2019-03-23 08:33:53 +03:00
2019-03-23 23:28:17 +03:00
// Figure out the origin
var httpport = ( ( args . aliasport != null ) ? args . aliasport : args . port ) ;
var origin = "https://" + ( domain . dns ? domain . dns : parent . certificates . CommonName ) ;
if ( httpport != 443 ) { origin += ':' + httpport ; }
2019-05-17 00:55:07 +03:00
// Use internal WebAuthn module to check the response
var regResult = null ;
try { regResult = parent . webauthn . verifyAuthenticatorAttestationResponse ( command . response . response ) ; } catch ( ex ) { regResult = { verified : false , error : ex } ; }
if ( regResult . verified === true ) {
2019-03-25 08:48:06 +03:00
// Since we are registering a WebAuthn/FIDO2 key, remove all U2F keys (Type 1).
var otphkeys2 = [ ] ;
2019-04-23 02:37:56 +03:00
if ( user . otphkeys && Array . isArray ( user . otphkeys ) ) { for ( var i = 0 ; i < user . otphkeys . length ; i ++ ) { if ( user . otphkeys [ i ] . type != 1 ) { otphkeys2 . push ( user . otphkeys [ i ] ) ; } } }
2019-03-25 08:48:06 +03:00
user . otphkeys = otphkeys2 ;
2019-03-23 23:28:17 +03:00
// Add the new WebAuthn/FIDO2 keys
2019-03-23 08:33:53 +03:00
var keyIndex = parent . crypto . randomBytes ( 4 ) . readUInt32BE ( 0 ) ;
if ( user . otphkeys == null ) { user . otphkeys = [ ] ; }
2019-05-17 00:55:07 +03:00
user . otphkeys . push ( { name : obj . webAuthnReqistrationRequest . keyname , type : 3 , publicKey : regResult . authrInfo . publicKey , counter : regResult . authrInfo . counter , keyIndex : keyIndex , keyId : regResult . authrInfo . keyId } ) ;
2019-03-23 08:33:53 +03:00
parent . db . SetUser ( user ) ;
ws . send ( JSON . stringify ( { action : 'otp-hkey-setup-response' , result : true , name : command . name , index : keyIndex } ) ) ;
// Notify change
2019-04-17 03:32:18 +03:00
var targets = [ '*' , 'server-users' , user . _id ] ;
if ( user . groups ) { for ( var i in user . groups ) { targets . push ( 'server-users:' + i ) ; } }
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , msgid : 95 , msg : 'Added security key' , domain : domain . id } ;
2019-05-29 03:25:23 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( targets , obj , event ) ;
2019-05-17 00:55:07 +03:00
} else {
//console.log('webauthn-endregister-error', regResult.error);
ws . send ( JSON . stringify ( { action : 'otp-hkey-setup-response' , result : false , error : regResult . error , name : command . name , index : keyIndex } ) ) ;
}
2019-03-23 08:33:53 +03:00
delete obj . hardwareKeyRegistrationRequest ;
break ;
}
2020-04-22 11:33:27 +03:00
case 'verifyPhone' : {
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2020-04-22 11:33:27 +03:00
if ( parent . parent . smsserver == null ) return ;
if ( common . validateString ( command . phone , 1 , 18 ) == false ) break ; // Check phone length
if ( command . phone . match ( /^\(?([0-9]{3})\)?[-. ]?([0-9]{3})[-. ]?([0-9]{4})$/ ) == false ) break ; // Check phone
2020-04-23 01:29:26 +03:00
const code = common . zeroPad ( getRandomSixDigitInteger ( ) , 6 )
2020-04-22 12:23:02 +03:00
const phoneCookie = parent . parent . encodeCookie ( { a : 'verifyPhone' , c : code , p : command . phone , s : ws . sessionId } ) ;
2020-04-22 11:33:27 +03:00
parent . parent . smsserver . sendPhoneCheck ( domain , command . phone , code , parent . getLanguageCodes ( req ) , function ( success ) {
ws . send ( JSON . stringify ( { action : 'verifyPhone' , cookie : phoneCookie , success : success } ) ) ;
} ) ;
break ;
}
case 'confirmPhone' : {
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2020-04-23 01:29:26 +03:00
if ( ( parent . parent . smsserver == null ) || ( typeof command . cookie != 'string' ) || ( typeof command . code != 'string' ) || ( obj . failedSmsCookieCheck == 1 ) ) break ; // Input checks
2020-04-22 11:33:27 +03:00
var cookie = parent . parent . decodeCookie ( command . cookie ) ;
if ( cookie == null ) break ; // Invalid cookie
2020-04-22 12:23:02 +03:00
if ( cookie . s != ws . sessionId ) break ; // Invalid session
2020-04-23 01:29:26 +03:00
if ( cookie . c != command . code ) {
obj . failedSmsCookieCheck = 1 ;
// Code does not match, delay the response to limit how many guesses we can make and don't allow more than 1 guess at any given time.
setTimeout ( function ( ) {
ws . send ( JSON . stringify ( { action : 'verifyPhone' , cookie : command . cookie , success : true } ) ) ;
delete obj . failedSmsCookieCheck ;
} , 2000 + ( parent . crypto . randomBytes ( 2 ) . readUInt16BE ( 0 ) % 4095 ) ) ;
break ;
}
2020-04-22 11:33:27 +03:00
// Set the user's phone
user . phone = cookie . p ;
db . SetUser ( user ) ;
// Event the change
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , msgid : 96 , msgArgs : [ user . name ] , msg : 'Verified phone number of user ' + EscapeHtml ( user . name ) , domain : domain . id } ;
2020-04-22 11:33:27 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( [ '*' , 'server-users' , user . _id ] , obj , event ) ;
break ;
}
case 'removePhone' : {
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2020-04-22 11:33:27 +03:00
if ( user . phone == null ) break ;
// Clear the user's phone
delete user . phone ;
db . SetUser ( user ) ;
// Event the change
2020-09-09 11:32:00 +03:00
var event = { etype : 'user' , userid : user . _id , username : user . name , account : parent . CloneSafeUser ( user ) , action : 'accountchange' , msgid : 97 , msgArgs : [ user . name ] , msg : 'Removed phone number of user ' + EscapeHtml ( user . name ) , domain : domain . id } ;
2020-04-22 11:33:27 +03:00
if ( db . changeStream ) { event . noact = 1 ; } // If DB change stream is active, don't use this event to change the user. Another event will come.
parent . parent . DispatchEvent ( [ '*' , 'server-users' , user . _id ] , obj , event ) ;
break ;
}
2020-04-22 12:23:02 +03:00
case 'smsuser' : { // Send a SMS message to a user
2020-04-23 01:29:26 +03:00
var errMsg = null , smsuser = null ;
if ( parent . parent . smsserver == null ) { errMsg = 'SMS gateway not enabled' ; }
else if ( ( user . siteadmin & 2 ) == 0 ) { errMsg = 'No user management rights' ; }
else if ( common . validateString ( command . userid , 1 , 2048 ) == false ) { errMsg = 'Invalid userid' ; }
else if ( common . validateString ( command . msg , 1 , 160 ) == false ) { errMsg = 'Invalid SMS message' ; }
else {
smsuser = parent . users [ command . userid ] ;
if ( smsuser == null ) { errMsg = 'Invalid userid' ; }
else if ( smsuser . phone == null ) { errMsg = 'No phone number for this user' ; }
}
if ( errMsg != null ) { displayNotificationMessage ( errMsg ) ; break ; }
parent . parent . smsserver . sendSMS ( smsuser . phone , command . msg , function ( success , msg ) {
if ( success ) {
displayNotificationMessage ( 'SMS succesfuly sent.' ) ;
} else {
if ( typeof msg == 'string' ) { displayNotificationMessage ( 'SMS error: ' + msg ) ; } else { displayNotificationMessage ( 'SMS error' ) ; }
}
2020-04-22 12:23:02 +03:00
} ) ;
break ;
}
2020-05-13 10:27:31 +03:00
case 'emailuser' : { // Send a email message to a user
var errMsg = null , emailuser = null ;
if ( parent . parent . mailserver == null ) { errMsg = 'Email server not enabled' ; }
else if ( ( user . siteadmin & 2 ) == 0 ) { errMsg = 'No user management rights' ; }
else if ( common . validateString ( command . userid , 1 , 2048 ) == false ) { errMsg = 'Invalid userid' ; }
else if ( common . validateString ( command . subject , 1 , 1000 ) == false ) { errMsg = 'Invalid subject message' ; }
else if ( common . validateString ( command . msg , 1 , 10000 ) == false ) { errMsg = 'Invalid message' ; }
else {
emailuser = parent . users [ command . userid ] ;
if ( emailuser == null ) { errMsg = 'Invalid userid' ; }
else if ( emailuser . email == null ) { errMsg = 'No validated email address for this user' ; }
else if ( emailuser . emailVerified !== true ) { errMsg = 'No validated email address for this user' ; }
}
if ( errMsg != null ) { displayNotificationMessage ( errMsg ) ; break ; }
parent . parent . mailserver . sendMail ( emailuser . email , command . subject , command . msg ) ;
displayNotificationMessage ( "Email sent." ) ;
break ;
}
2019-02-17 08:16:39 +03:00
case 'getClip' : {
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . nodeid , 1 , 1024 ) == false ) break ; // Check nodeid
2019-02-17 08:16:39 +03:00
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
if ( ( rights & MESHRIGHT _AGENTCONSOLE ) == 0 ) return ;
2019-02-17 08:16:39 +03:00
2019-12-28 02:18:43 +03:00
// Ask for clipboard data from agent
var agent = parent . wsagents [ node . _id ] ;
if ( agent != null ) { try { agent . send ( JSON . stringify ( { action : 'getClip' } ) ) ; } catch ( ex ) { } }
2019-02-17 08:16:39 +03:00
} ) ;
break ;
}
case 'setClip' : {
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . data , 1 , 65535 ) == false ) break ; // Check
2019-02-17 08:16:39 +03:00
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
if ( ( rights & MESHRIGHT _AGENTCONSOLE ) == 0 ) return ;
2019-02-17 08:16:39 +03:00
2019-12-28 02:18:43 +03:00
// Send clipboard data to the agent
var agent = parent . wsagents [ node . _id ] ;
if ( agent != null ) { try { agent . send ( JSON . stringify ( { action : 'setClip' , data : command . data } ) ) ; } catch ( ex ) { } }
2019-02-17 08:16:39 +03:00
} ) ;
break ;
}
2019-04-30 01:31:11 +03:00
case 'userWebState' : {
2020-08-06 06:15:34 +03:00
if ( ( user . siteadmin != 0xFFFFFFFF ) && ( ( user . siteadmin & 1024 ) != 0 ) ) return ; // If this account is settings locked, return here.
2019-04-30 01:31:11 +03:00
if ( common . validateString ( command . state , 1 , 10000 ) == false ) break ; // Check state size, no more than 10k
2019-10-26 00:41:14 +03:00
command . state = parent . filterUserWebState ( command . state ) ; // Filter the state to remove anything bad
2020-07-29 01:27:28 +03:00
if ( ( command . state == null ) || ( typeof command . state !== 'string' ) ) { console . log ( 'tt' ) ; break ; } // If state did not validate correctly, quit here.
2019-04-30 01:31:11 +03:00
db . Set ( { _id : 'ws' + user . _id , state : command . state } ) ;
parent . parent . DispatchEvent ( [ user . _id ] , obj , { action : 'userWebState' , nolog : 1 , domain : domain . id , state : command . state } ) ;
break ;
}
2019-01-05 04:59:13 +03:00
case 'getNotes' :
{
// Argument validation
2019-03-10 01:28:08 +03:00
if ( common . validateString ( command . id , 1 , 1024 ) == false ) break ; // Check id
2019-01-05 04:59:13 +03:00
var splitid = command . id . split ( '/' ) ;
if ( ( splitid . length != 3 ) || ( splitid [ 1 ] != domain . id ) ) return ; // Invalid domain, operation only valid for current domain
var idtype = splitid [ 0 ] ;
if ( ( idtype != 'user' ) && ( idtype != 'mesh' ) && ( idtype != 'node' ) ) return ;
if ( idtype == 'node' ) {
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . id , function ( node , rights , visible ) {
if ( visible == false ) return ;
2019-01-05 04:59:13 +03:00
2019-12-28 02:18:43 +03:00
// Get the notes about this node
db . Get ( 'nt' + command . id , function ( err , notes ) {
try {
if ( ( notes == null ) || ( notes . length != 1 ) ) { ws . send ( JSON . stringify ( { action : 'getNotes' , id : command . id , notes : null } ) ) ; return ; }
ws . send ( JSON . stringify ( { action : 'getNotes' , id : command . id , notes : notes [ 0 ] . value } ) ) ;
} catch ( ex ) { }
} ) ;
2019-01-05 04:59:13 +03:00
} ) ;
} else if ( idtype == 'mesh' ) {
// Get the mesh for this device
2019-03-10 01:28:08 +03:00
mesh = parent . meshes [ command . id ] ;
2019-01-05 04:59:13 +03:00
if ( mesh ) {
// Check if this user has rights to do this
2019-12-27 09:53:01 +03:00
if ( ( parent . GetMeshRights ( user , mesh ) & MESHRIGHT _EDITMESH ) == 0 ) return ; // Must have rights to edit the mesh
2019-01-05 04:59:13 +03:00
2018-04-16 21:57:42 +03:00
// Get the notes about this node
2019-03-10 01:28:08 +03:00
db . Get ( 'nt' + command . id , function ( err , notes ) {
2018-09-25 21:51:40 +03:00
try {
2019-05-21 04:03:14 +03:00
if ( ( notes == null ) || ( notes . length != 1 ) ) { ws . send ( JSON . stringify ( { action : 'getNotes' , id : command . id , notes : null } ) ) ; return ; }
2018-09-25 21:51:40 +03:00
ws . send ( JSON . stringify ( { action : 'getNotes' , id : command . id , notes : notes [ 0 ] . value } ) ) ;
} catch ( ex ) { }
2018-04-16 21:57:42 +03:00
} ) ;
}
2019-01-05 04:59:13 +03:00
} else if ( ( idtype == 'user' ) && ( ( user . siteadmin & 2 ) != 0 ) ) {
// Get the notes about this node
2019-03-10 01:28:08 +03:00
db . Get ( 'nt' + command . id , function ( err , notes ) {
2019-01-05 04:59:13 +03:00
try {
2019-05-21 04:03:14 +03:00
if ( ( notes == null ) || ( notes . length != 1 ) ) { ws . send ( JSON . stringify ( { action : 'getNotes' , id : command . id , notes : null } ) ) ; return ; }
2019-01-05 04:59:13 +03:00
ws . send ( JSON . stringify ( { action : 'getNotes' , id : command . id , notes : notes [ 0 ] . value } ) ) ;
} catch ( ex ) { }
} ) ;
2018-04-13 04:14:03 +03:00
}
2017-10-24 00:09:58 +03:00
2019-01-05 04:59:13 +03:00
break ;
2017-10-24 00:09:58 +03:00
}
2019-06-03 23:15:38 +03:00
case 'createInviteLink' : {
2020-04-08 02:37:58 +03:00
var err = null ;
2020-04-08 02:13:02 +03:00
// Resolve the device group name if needed
if ( ( typeof command . meshname == 'string' ) && ( command . meshid == null ) ) {
for ( var i in parent . meshes ) {
var m = parent . meshes [ i ] ;
2020-04-08 02:37:58 +03:00
if ( ( m . mtype == 2 ) && ( m . name == command . meshname ) && parent . IsMeshViewable ( user , m ) ) {
if ( command . meshid == null ) { command . meshid = m . _id ; } else { err = 'Duplicate device groups found' ; }
}
2020-04-08 02:13:02 +03:00
}
}
2019-09-23 21:45:10 +03:00
if ( common . validateString ( command . meshid , 8 , 128 ) == false ) { err = 'Invalid group id' ; } // Check the meshid
else if ( common . validateInt ( command . expire , 0 , 99999 ) == false ) { err = 'Invalid expire time' ; } // Check the expire time in hours
2020-04-08 02:13:02 +03:00
else if ( common . validateInt ( command . flags , 0 , 256 ) == false ) { err = 'Invalid flags' ; } // Check the flags
else if ( common . validateString ( command . meshid , 1 , 1024 ) == false ) { err = 'Invalid group identifier' ; } // Check meshid
else {
if ( command . meshid . split ( '/' ) . length == 1 ) { command . meshid = 'mesh/' + domain . id + '/' + command . meshid ; }
var smesh = command . meshid . split ( '/' ) ;
if ( ( smesh . length != 3 ) || ( smesh [ 0 ] != 'mesh' ) || ( smesh [ 1 ] != domain . id ) ) { err = 'Invalid group id' ; }
mesh = parent . meshes [ command . meshid ] ;
if ( ( mesh == null ) || ( parent . IsMeshViewable ( user , mesh ) == false ) ) { err = 'Invalid group id' ; }
}
2019-09-25 21:37:58 +03:00
var serverName = parent . getWebServerName ( domain ) ;
2019-09-23 21:45:10 +03:00
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'createInviteLink' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2019-06-08 03:11:56 +03:00
const inviteCookie = parent . parent . encodeCookie ( { a : 4 , mid : command . meshid , f : command . flags , expire : command . expire * 60 } , parent . parent . invitationLinkEncryptionKey ) ;
2019-09-23 21:45:10 +03:00
if ( inviteCookie == null ) { if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'createInviteLink' , responseid : command . responseid , result : 'Unable to generate invitation cookie' } ) ) ; } catch ( ex ) { } } break ; }
// Create the server url
var httpsPort = ( ( args . aliasport == null ) ? args . port : args . aliasport ) ; // Use HTTPS alias port is specified
var xdomain = ( domain . dns == null ) ? domain . id : '' ;
2020-08-07 19:37:28 +03:00
if ( xdomain != '' ) xdomain += '/' ;
var url = 'http' + ( args . notls ? '' : 's' ) + '://' + serverName + ':' + httpsPort + '/' + xdomain + 'agentinvite?c=' + inviteCookie ;
if ( serverName . split ( '.' ) == 1 ) { url = '/' + xdomain + 'agentinvite?c=' + inviteCookie ; }
2019-09-23 21:45:10 +03:00
ws . send ( JSON . stringify ( { action : 'createInviteLink' , meshid : command . meshid , url : url , expire : command . expire , cookie : inviteCookie , responseid : command . responseid , tag : command . tag } ) ) ;
2019-06-03 23:15:38 +03:00
break ;
}
2020-08-07 19:37:28 +03:00
case 'createDeviceShareLink' : {
2020-09-14 23:32:16 +03:00
var err = null , maxExpireMinutes = ( typeof domain . maxguestsessionsharingtime == 'number' ) ? domain . maxguestsessionsharingtime : 60 ;
2020-08-07 19:37:28 +03:00
if ( common . validateString ( command . nodeid , 8 , 128 ) == false ) { err = 'Invalid node id' ; } // Check the meshid
else if ( common . validateString ( command . guestname , 1 , 128 ) == false ) { err = 'Invalid guest name' ; } // Check the guest name
2020-09-12 02:35:47 +03:00
else if ( common . validateInt ( command . expire , 1 , maxExpireMinutes ) == false ) { err = 'Invalid expire time' ; } // Check the expire time in hours
2020-08-07 19:37:28 +03:00
else if ( common . validateInt ( command . consent , 0 , 256 ) == false ) { err = 'Invalid flags' ; } // Check the flags
else {
if ( command . nodeid . split ( '/' ) . length == 1 ) { command . nodeid = 'node/' + domain . id + '/' + command . nodeid ; }
var snode = command . nodeid . split ( '/' ) ;
if ( ( snode . length != 3 ) || ( snode [ 0 ] != 'node' ) || ( snode [ 1 ] != domain . id ) ) { err = 'Invalid node id' ; }
}
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'createDeviceShareLink' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
// Get the device from the database
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
2020-08-08 01:51:28 +03:00
// If node not found or we don't have remote control, reject.
2020-08-07 19:37:28 +03:00
if ( ( node == null ) || ( ( rights & 8 ) == 0 ) ) return ;
2020-08-08 01:51:28 +03:00
// If there is MESHRIGHT_DESKLIMITEDINPUT or MESHRIGHT_REMOTEVIEWONLY on this account, reject this request.
if ( ( rights != 0xFFFFFFFF ) && ( ( rights & 4352 ) != 0 ) ) return ;
2020-08-07 19:37:28 +03:00
// Create cookie
var expireTime = Date . now ( ) + ( 60000 * command . expire ) ;
const inviteCookie = parent . parent . encodeCookie ( { a : 5 , uid : user . _id , gn : command . guestname , nid : node . _id , cf : command . consent , expire : expireTime } , parent . parent . invitationLinkEncryptionKey ) ;
if ( inviteCookie == null ) { if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'createDeviceShareLink' , responseid : command . responseid , result : 'Unable to generate shareing cookie' } ) ) ; } catch ( ex ) { } } return ; }
command . expire = expireTime ;
// Create the server url
var serverName = parent . getWebServerName ( domain ) ;
var httpsPort = ( ( args . aliasport == null ) ? args . port : args . aliasport ) ; // Use HTTPS alias port is specified
var xdomain = ( domain . dns == null ) ? domain . id : '' ;
if ( xdomain != '' ) xdomain += '/' ;
var url = 'http' + ( args . notls ? '' : 's' ) + '://' + serverName + ':' + httpsPort + '/' + xdomain + 'desktop?c=' + inviteCookie ;
if ( serverName . split ( '.' ) == 1 ) { url = '/' + xdomain + 'desktop?c=' + inviteCookie ; }
command . url = url ;
ws . send ( JSON . stringify ( command ) ) ;
} ) ;
break ;
}
2019-08-23 01:31:39 +03:00
case 'traceinfo' : {
2020-07-06 22:46:38 +03:00
if ( ( user . siteadmin === SITERIGHT _ADMIN ) && ( typeof command . traceSources == 'object' ) ) {
2019-08-23 01:31:39 +03:00
parent . parent . debugRemoteSources = command . traceSources ;
parent . parent . DispatchEvent ( [ '*' ] , obj , { action : 'traceinfo' , userid : user . _id , username : user . name , traceSources : command . traceSources , nolog : 1 , domain : domain . id } ) ;
}
break ;
}
2019-10-08 21:08:41 +03:00
case 'sendmqttmsg' : {
2019-12-28 02:18:43 +03:00
if ( parent . parent . mqttbroker == null ) { err = 'MQTT not supported on this server' ; } ; // MQTT not available
2019-10-08 21:08:41 +03:00
if ( common . validateArray ( command . nodeids , 1 ) == false ) { err = 'Invalid nodeids' ; } ; // Check nodeid's
if ( common . validateString ( command . topic , 1 , 64 ) == false ) { err = 'Invalid topic' ; } // Check the topic
if ( common . validateString ( command . msg , 1 , 4096 ) == false ) { err = 'Invalid msg' ; } // Check the message
// Handle any errors
if ( err != null ) {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'sendmqttmsg' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } }
break ;
}
2019-12-28 02:18:43 +03:00
// Send the MQTT message
2019-10-08 21:08:41 +03:00
for ( i in command . nodeids ) {
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeids [ i ] , function ( node , rights , visible ) {
// If this device is connected on MQTT, send a wake action.
if ( rights != 0 ) { parent . parent . mqttbroker . publish ( node . _id , command . topic , command . msg ) ; }
} ) ;
2019-10-08 21:08:41 +03:00
}
break ;
}
2019-10-06 00:24:40 +03:00
case 'getmqttlogin' : {
var err = null ;
if ( parent . parent . mqttbroker == null ) { err = 'MQTT not supported on this server' ; }
if ( common . validateString ( command . nodeid , 1 , 1024 ) == false ) { err = 'Invalid nodeid' ; } // Check the nodeid
// Handle any errors
if ( err != null ) { if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'getmqttlogin' , responseid : command . responseid , result : err } ) ) ; } catch ( ex ) { } } break ; }
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
// Check if this user has rights to do this
2020-07-06 22:46:38 +03:00
if ( rights == MESHRIGHT _ADMIN ) {
2019-12-28 02:18:43 +03:00
var token = parent . parent . mqttbroker . generateLogin ( node . meshid , node . _id ) ;
var r = { action : 'getmqttlogin' , responseid : command . responseid , nodeid : node . _id , user : token . user , pass : token . pass } ;
const serverName = parent . getWebServerName ( domain ) ;
// Add MPS URL
if ( parent . parent . mpsserver != null ) {
r . mpsCertHashSha384 = parent . parent . certificateOperations . getCertHash ( parent . parent . mpsserver . certificates . mps . cert ) ;
r . mpsCertHashSha1 = parent . parent . certificateOperations . getCertHashSha1 ( parent . parent . mpsserver . certificates . mps . cert ) ;
r . mpsUrl = 'mqtts://' + serverName + ':' + ( ( args . mpsaliasport != null ) ? args . mpsaliasport : args . mpsport ) + '/' ;
}
// Add WS URL
var xdomain = ( domain . dns == null ) ? domain . id : '' ;
if ( xdomain != '' ) xdomain += '/' ;
var httpsPort = ( ( args . aliasport == null ) ? args . port : args . aliasport ) ; // Use HTTPS alias port is specified
r . wsUrl = 'ws' + ( args . notls ? '' : 's' ) + '://' + serverName + ':' + httpsPort + '/' + xdomain + 'mqtt.ashx' ;
r . wsTrustedCert = parent . isTrustedCert ( domain ) ;
try { ws . send ( JSON . stringify ( r ) ) ; } catch ( ex ) { }
} else {
if ( command . responseid != null ) { try { ws . send ( JSON . stringify ( { action : 'getmqttlogin' , responseid : command . responseid , result : 'Unable to perform this operation' } ) ) ; } catch ( ex ) { } }
}
} ) ;
2019-10-06 00:24:40 +03:00
break ;
}
2019-09-21 03:21:58 +03:00
case 'amt' : {
if ( common . validateString ( command . nodeid , 1 , 1024 ) == false ) break ; // Check nodeid
if ( common . validateInt ( command . mode , 0 , 3 ) == false ) break ; // Check connection mode
2019-09-23 21:45:10 +03:00
// Validate if communication mode is possible
2019-10-25 11:16:00 +03:00
if ( command . mode == null || command . mode == 0 ) {
2019-09-23 21:45:10 +03:00
break ; //unsupported
2019-09-21 03:21:58 +03:00
} else if ( command . mode == 1 ) {
var state = parent . parent . GetConnectivityState ( command . nodeid ) ;
2019-10-25 11:16:00 +03:00
if ( ( state == null ) || ( state . connectivity & 4 ) == 0 ) break ;
2019-09-21 03:21:58 +03:00
} else if ( command . mode == 2 ) {
if ( parent . parent . mpsserver . ciraConnections [ command . nodeid ] == null ) break ;
} else if ( command . mode == 3 ) {
if ( parent . parent . apfserver . apfConnections [ command . nodeid ] == null ) break ;
}
2019-12-28 02:18:43 +03:00
// Get the node and the rights for this node
parent . GetNodeWithRights ( domain , user , command . nodeid , function ( node , rights , visible ) {
if ( ( rights & MESHRIGHT _REMOTECONTROL ) == 0 ) return ;
handleAmtCommand ( command , node ) ;
} ) ;
2019-09-21 03:21:58 +03:00
break ;
}
2019-11-23 05:17:07 +03:00
case 'distributeCore' : {
2019-11-26 01:12:43 +03:00
// This is only available when plugins are enabled since it could cause stress on the server
2020-07-06 22:46:38 +03:00
if ( ( user . siteadmin != SITERIGHT _ADMIN ) || ( parent . parent . pluginHandler == null ) ) break ; // Must be full admin with plugins enabled
2019-11-23 05:17:07 +03:00
for ( var i in command . nodes ) {
parent . sendMeshAgentCore ( user , domain , command . nodes [ i ] . _id , 'default' ) ;
}
break ;
}
2019-10-30 11:17:17 +03:00
case 'plugins' : {
2019-11-11 17:46:38 +03:00
// Since plugin actions generally require a server restart, use the Full admin permission
2020-07-06 22:46:38 +03:00
if ( ( user . siteadmin != SITERIGHT _ADMIN ) || ( parent . parent . pluginHandler == null ) ) break ; // Must be full admin with plugins enabled
2019-10-30 11:17:17 +03:00
parent . db . getPlugins ( function ( err , docs ) {
try { ws . send ( JSON . stringify ( { action : 'updatePluginList' , list : docs , result : err } ) ) ; } catch ( ex ) { }
} ) ;
break ;
}
2019-11-01 23:49:18 +03:00
case 'pluginLatestCheck' : {
2020-07-06 22:46:38 +03:00
if ( ( user . siteadmin != SITERIGHT _ADMIN ) || ( parent . parent . pluginHandler == null ) ) break ; // Must be full admin with plugins enabled
2019-11-05 08:11:14 +03:00
parent . parent . pluginHandler . getPluginLatest ( )
. then ( function ( latest ) {
2019-11-01 23:49:18 +03:00
try { ws . send ( JSON . stringify ( { action : 'pluginVersionsAvailable' , list : latest } ) ) ; } catch ( ex ) { }
} ) ;
break ;
}
2019-10-30 11:17:17 +03:00
case 'addplugin' : {
2020-07-06 22:46:38 +03:00
if ( ( user . siteadmin != SITERIGHT _ADMIN ) || ( parent . parent . pluginHandler == null ) ) break ; // Must be full admin with plugins enabled
2019-11-07 04:00:09 +03:00
try {
2019-11-05 08:11:14 +03:00
parent . parent . pluginHandler . getPluginConfig ( command . url )
. then ( parent . parent . pluginHandler . addPlugin )
2019-11-06 12:49:36 +03:00
. then ( function ( docs ) {
2019-11-05 08:11:14 +03:00
var targets = [ '*' , 'server-users' ] ;
parent . parent . DispatchEvent ( targets , obj , { action : 'updatePluginList' , list : docs } ) ;
} )
. catch ( function ( err ) {
if ( typeof err == 'object' ) err = err . message ;
2019-11-26 01:12:43 +03:00
try { ws . send ( JSON . stringify ( { action : 'pluginError' , msg : err } ) ) ; } catch ( er ) { }
2019-11-05 08:11:14 +03:00
} ) ;
} catch ( e ) { console . log ( 'Cannot add plugin: ' + e ) ; }
2019-10-30 11:17:17 +03:00
break ;
}
2019-11-01 23:49:18 +03:00
case 'installplugin' : {
2020-07-06 22:46:38 +03:00
if ( ( user . siteadmin != SITERIGHT _ADMIN ) || ( parent . parent . pluginHandler == null ) ) break ; // Must be full admin with plugins enabled
2019-11-23 05:17:07 +03:00
parent . parent . pluginHandler . installPlugin ( command . id , command . version _only , null , function ( ) {
2019-11-01 23:49:18 +03:00
parent . db . getPlugins ( function ( err , docs ) {
try { ws . send ( JSON . stringify ( { action : 'updatePluginList' , list : docs , result : err } ) ) ; } catch ( ex ) { }
} ) ;
2019-11-22 22:25:13 +03:00
var targets = [ '*' , 'server-users' ] ;
parent . parent . DispatchEvent ( targets , obj , { action : 'pluginStateChange' } ) ;
2019-11-01 23:49:18 +03:00
} ) ;
break ;
}
case 'disableplugin' : {
2020-07-06 22:46:38 +03:00
if ( ( user . siteadmin != SITERIGHT _ADMIN ) || ( parent . parent . pluginHandler == null ) ) break ; // Must be full admin with plugins enabled
2019-11-01 23:49:18 +03:00
parent . parent . pluginHandler . disablePlugin ( command . id , function ( ) {
parent . db . getPlugins ( function ( err , docs ) {
try { ws . send ( JSON . stringify ( { action : 'updatePluginList' , list : docs , result : err } ) ) ; } catch ( ex ) { }
2019-11-22 22:25:13 +03:00
var targets = [ '*' , 'server-users' ] ;
parent . parent . DispatchEvent ( targets , obj , { action : 'pluginStateChange' } ) ;
2019-11-01 23:49:18 +03:00
} ) ;
} ) ;
break ;
}
2019-10-30 11:17:17 +03:00
case 'removeplugin' : {
2020-07-06 22:46:38 +03:00
if ( ( user . siteadmin != SITERIGHT _ADMIN ) || ( parent . parent . pluginHandler == null ) ) break ; // Must be full admin with plugins enabled
2019-11-01 23:49:18 +03:00
parent . parent . pluginHandler . removePlugin ( command . id , function ( ) {
parent . db . getPlugins ( function ( err , docs ) {
try { ws . send ( JSON . stringify ( { action : 'updatePluginList' , list : docs , result : err } ) ) ; } catch ( ex ) { }
} ) ;
} ) ;
2019-10-30 11:17:17 +03:00
break ;
}
2019-11-22 22:25:13 +03:00
case 'getpluginversions' : {
2020-07-06 22:46:38 +03:00
if ( ( user . siteadmin != SITERIGHT _ADMIN ) || ( parent . parent . pluginHandler == null ) ) break ; // Must be full admin with plugins enabled
2019-11-22 22:25:13 +03:00
parent . parent . pluginHandler . getPluginVersions ( command . id )
. then ( function ( versionInfo ) {
try { ws . send ( JSON . stringify ( { action : 'downgradePluginVersions' , info : versionInfo , error : null } ) ) ; } catch ( ex ) { }
} )
. catch ( function ( e ) {
try { ws . send ( JSON . stringify ( { action : 'pluginError' , msg : e } ) ) ; } catch ( ex ) { }
} ) ;
break ;
}
2019-10-09 08:22:01 +03:00
case 'plugin' : {
2019-10-25 11:16:00 +03:00
if ( parent . parent . pluginHandler == null ) break ; // If the plugin's are not supported, reject this command.
2019-10-09 08:22:01 +03:00
command . userid = user . _id ;
if ( command . routeToNode === true ) {
2019-10-25 11:16:00 +03:00
routeCommandToNode ( command ) ;
2019-10-09 08:22:01 +03:00
} else {
2019-10-25 11:16:00 +03:00
try {
2019-11-01 23:49:18 +03:00
parent . parent . pluginHandler . plugins [ command . plugin ] . serveraction ( command , obj , parent ) ;
2019-10-25 11:16:00 +03:00
} catch ( e ) { console . log ( 'Error loading plugin handler (' + e + ')' ) ; }
2019-10-09 08:22:01 +03:00
}
2019-10-25 11:16:00 +03:00
break ;
2019-10-09 08:22:01 +03:00
}
2020-06-02 03:26:27 +03:00
case 'uicustomevent' : {
// Event the change
2020-06-13 22:50:13 +03:00
var message = { etype : 'user' , userid : user . _id , username : user . name , action : 'uicustomevent' , domain : domain . id , uisection : command . section , element : command . element } ;
2020-06-02 03:26:27 +03:00
if ( command . selectedDevices != null ) { message . selectedDevices = command . selectedDevices ; }
if ( command . src != null ) { message . src = command . src ; }
if ( command . values != null ) { message . values = command . values ; }
2020-06-13 22:50:13 +03:00
if ( typeof command . logmsg == 'string' ) { message . msg = command . logmsg ; } else { message . nolog = 1 ; }
2020-06-02 03:26:27 +03:00
parent . parent . DispatchEvent ( [ '*' , user . _id ] , obj , message ) ;
break ;
}
2020-08-21 11:57:03 +03:00
case 'serverBackup' : {
2020-08-21 21:47:34 +03:00
if ( ( user . siteadmin != SITERIGHT _ADMIN ) || ( typeof parent . parent . config . settings . autobackup . googledrive != 'object' ) ) return ;
2020-08-21 11:57:03 +03:00
if ( command . service == 'googleDrive' ) {
if ( command . state == 0 ) {
parent . db . Remove ( 'GoogleDriveBackup' , function ( ) { try { ws . send ( JSON . stringify ( { action : 'serverBackup' , service : 'googleDrive' , state : 1 } ) ) ; } catch ( ex ) { } } ) ;
} else if ( command . state == 1 ) {
const { google } = require ( 'googleapis' ) ;
obj . oAuth2Client = new google . auth . OAuth2 ( command . clientid , command . clientsecret , "urn:ietf:wg:oauth:2.0:oob" ) ;
obj . oAuth2Client . xxclientid = command . clientid ;
obj . oAuth2Client . xxclientsecret = command . clientsecret ;
2020-08-21 21:47:34 +03:00
const authUrl = obj . oAuth2Client . generateAuthUrl ( { access _type : 'offline' , scope : [ 'https://www.googleapis.com/auth/drive.file' ] } ) ;
2020-08-21 11:57:03 +03:00
try { ws . send ( JSON . stringify ( { action : 'serverBackup' , service : 'googleDrive' , state : 2 , url : authUrl } ) ) ; } catch ( ex ) { }
} else if ( ( command . state == 2 ) && ( obj . oAuth2Client != null ) ) {
obj . oAuth2Client . getToken ( command . code , function ( err , token ) {
2020-08-21 21:47:34 +03:00
if ( err != null ) { console . log ( 'GoogleDrive (getToken) error: ' , err ) ; return ; }
parent . db . Set ( { _id : 'GoogleDriveBackup' , state : 3 , clientid : obj . oAuth2Client . xxclientid , clientsecret : obj . oAuth2Client . xxclientsecret , token : token } ) ;
try { ws . send ( JSON . stringify ( { action : 'serverBackup' , service : 'googleDrive' , state : 3 } ) ) ; } catch ( ex ) { }
2020-08-21 11:57:03 +03:00
} ) ;
}
}
break ;
}
2019-01-05 04:59:13 +03:00
default : {
// Unknown user action
console . log ( 'Unknown action from user ' + user . name + ': ' + command . action + '.' ) ;
break ;
2017-10-24 00:09:58 +03:00
}
2019-01-05 04:59:13 +03:00
}
}
2017-10-24 00:09:58 +03:00
2019-02-13 06:23:40 +03:00
// Display a notification message for this session only.
2020-01-07 22:08:32 +03:00
function displayNotificationMessage ( msg , title , tag ) { ws . send ( JSON . stringify ( { 'action' : 'msg' , 'type' : 'notify' , id : Math . random ( ) , 'value' : msg , 'title' : title , 'userid' : user . _id , 'username' : user . name , 'tag' : tag } ) ) ; }
2019-02-13 06:23:40 +03:00
2017-10-24 00:09:58 +03:00
// Read the folder and all sub-folders and serialize that into json.
function readFilesRec ( path ) {
2019-03-10 01:28:08 +03:00
var r = { } , dir = fs . readdirSync ( path ) ;
2017-10-24 00:09:58 +03:00
for ( var i in dir ) {
var f = { t : 3 , d : 111 } ;
2019-03-10 01:28:08 +03:00
var stat = fs . statSync ( path + '/' + dir [ i ] ) ;
2017-10-24 00:09:58 +03:00
if ( ( stat . mode & 0x004000 ) == 0 ) { f . s = stat . size ; f . d = stat . mtime . getTime ( ) ; } else { f . t = 2 ; f . f = readFilesRec ( path + '/' + dir [ i ] ) ; }
r [ dir [ i ] ] = f ;
}
return r ;
}
2018-09-25 21:51:40 +03:00
// Delete a directory with a files and directories within it
// TODO, make this an async function
function deleteFolderRecursive ( path ) {
2019-03-10 01:28:08 +03:00
if ( fs . existsSync ( path ) ) {
fs . readdirSync ( path ) . forEach ( function ( file , index ) {
2019-03-20 19:53:44 +03:00
var curPath = parent . path . join ( path , file ) ; ;
2019-03-10 01:28:08 +03:00
if ( fs . lstatSync ( curPath ) . isDirectory ( ) ) { // recurse
2018-09-25 21:51:40 +03:00
deleteFolderRecursive ( curPath ) ;
} else { // delete file
2019-03-10 01:28:08 +03:00
fs . unlinkSync ( curPath ) ;
2018-09-25 21:51:40 +03:00
}
} ) ;
2019-03-10 01:28:08 +03:00
fs . rmdirSync ( path ) ;
2018-09-25 21:51:40 +03:00
}
} ;
2017-10-24 00:09:58 +03:00
function updateUserFiles ( user , ws , domain ) {
2019-02-19 09:20:25 +03:00
if ( ( user == null ) || ( user . siteadmin == null ) || ( ( user . siteadmin & 8 ) == 0 ) ) return ;
2017-10-24 00:09:58 +03:00
// Request the list of server files
var files = { action : 'files' , filetree : { n : 'Root' , f : { } } } ;
// Add user files
files . filetree . f [ user . _id ] = { t : 1 , n : 'My Files' , f : { } } ;
2019-03-10 01:28:08 +03:00
files . filetree . f [ user . _id ] . maxbytes = parent . getQuota ( user . _id , domain ) ;
2017-10-24 00:09:58 +03:00
var usersplit = user . _id . split ( '/' ) , domainx = 'domain' ;
if ( usersplit [ 1 ] . length > 0 ) domainx = 'domain-' + usersplit [ 1 ] ;
// Read all files recursively
try {
2019-12-28 02:18:43 +03:00
files . filetree . f [ user . _id ] . f = readFilesRec ( parent . path . join ( parent . filespath , domainx + '/user-' + usersplit [ 2 ] ) ) ;
2017-10-24 00:09:58 +03:00
} catch ( e ) {
2019-02-19 09:20:25 +03:00
// TODO: We may want to fake this file structure until it's needed.
2017-10-24 00:09:58 +03:00
// Got an error, try to create all the folders and try again...
2019-03-10 01:28:08 +03:00
try { fs . mkdirSync ( parent . filespath ) ; } catch ( e ) { }
2019-03-20 19:53:44 +03:00
try { fs . mkdirSync ( parent . path . join ( parent . filespath , domainx ) ) ; } catch ( e ) { }
2019-12-28 02:18:43 +03:00
try { fs . mkdirSync ( parent . path . join ( parent . filespath , domainx + '/user-' + usersplit [ 2 ] ) ) ; } catch ( e ) { }
try { fs . mkdirSync ( parent . path . join ( parent . filespath , domainx + '/user-' + usersplit [ 2 ] + '/Public' ) ) ; } catch ( e ) { }
try { files . filetree . f [ user . _id ] . f = readFilesRec ( parent . path . join ( parent . filespath , domainx + '/user-' + usersplit [ 2 ] ) ) ; } catch ( e ) { }
2017-10-24 00:09:58 +03:00
}
2019-12-27 09:53:01 +03:00
// Add files for each mesh // TODO: Get all meshes including groups!!
2017-10-24 00:09:58 +03:00
for ( var i in user . links ) {
if ( ( user . links [ i ] . rights & 32 ) != 0 ) { // Check that we have file permissions
2019-03-10 01:28:08 +03:00
var mesh = parent . meshes [ i ] ;
2017-10-24 00:09:58 +03:00
if ( mesh ) {
var meshsplit = mesh . _id . split ( '/' ) ;
2018-06-19 22:25:57 +03:00
files . filetree . f [ mesh . _id ] = { t : 4 , n : mesh . name , f : { } } ;
2019-03-10 01:28:08 +03:00
files . filetree . f [ mesh . _id ] . maxbytes = parent . getQuota ( mesh . _id , domain ) ;
2017-10-24 00:09:58 +03:00
// Read all files recursively
try {
2019-12-28 02:18:43 +03:00
files . filetree . f [ mesh . _id ] . f = readFilesRec ( parent . path . join ( parent . filespath , domainx + '/mesh-' + meshsplit [ 2 ] ) ) ;
2017-10-24 00:09:58 +03:00
} catch ( e ) {
2019-02-19 09:20:25 +03:00
files . filetree . f [ mesh . _id ] . f = { } ; // Got an error, return empty folder. We will create the folder only when needed.
2017-10-24 00:09:58 +03:00
}
}
}
}
// Respond
2018-09-25 21:51:40 +03:00
try { ws . send ( JSON . stringify ( files ) ) ; } catch ( ex ) { }
2017-10-24 00:09:58 +03:00
}
2019-12-28 02:18:43 +03:00
function EscapeHtml ( x ) { if ( typeof x == 'string' ) return x . replace ( /&/g , '&' ) . replace ( />/g , '>' ) . replace ( /</g , '<' ) . replace ( /"/g , '"' ) . replace ( /'/g , ''' ) ; if ( typeof x == "boolean" ) return x ; if ( typeof x == "number" ) return x ; }
2018-08-30 22:05:23 +03:00
//function EscapeHtmlBreaks(x) { if (typeof x == "string") return x.replace(/&/g, '&').replace(/>/g, '>').replace(/</g, '<').replace(/"/g, '"').replace(/'/g, ''').replace(/\r/g, '<br />').replace(/\n/g, '').replace(/\t/g, ' '); if (typeof x == "boolean") return x; if (typeof x == "number") return x; }
2017-12-13 05:23:26 +03:00
2019-02-05 05:06:01 +03:00
// Split a string taking into account the quoats. Used for command line parsing
function splitArgs ( str ) { var myArray = [ ] , myRegexp = /[^\s"]+|"([^"]*)"/gi ; do { var match = myRegexp . exec ( str ) ; if ( match != null ) { myArray . push ( match [ 1 ] ? match [ 1 ] : match [ 0 ] ) ; } } while ( match != null ) ; return myArray ; }
function toNumberIfNumber ( x ) { if ( ( typeof x == 'string' ) && ( + parseInt ( x ) === x ) ) { x = parseInt ( x ) ; } return x ; }
2020-05-01 04:26:53 +03:00
function isPhoneNumber ( x ) { return x . match ( /^\(?([0-9]{3,4})\)?[-. ]?([0-9]{3})[-. ]?([0-9]{4})$/ ) }
2019-02-05 05:06:01 +03:00
2019-02-06 06:07:12 +03:00
function removeAllUnderScore ( obj ) {
if ( typeof obj != 'object' ) return obj ;
for ( var i in obj ) { if ( i . startsWith ( '_' ) ) { delete obj [ i ] ; } else if ( typeof obj [ i ] == 'object' ) { removeAllUnderScore ( obj [ i ] ) ; } }
return obj ;
}
2019-02-06 07:01:01 +03:00
// Generate a 8 digit integer with even random probability for each value.
2020-04-23 01:29:26 +03:00
function getRandomEightDigitInteger ( ) { var bigInt ; do { bigInt = parent . crypto . randomBytes ( 4 ) . readUInt32BE ( 0 ) ; } while ( bigInt >= 4200000000 ) ; return bigInt % 100000000 ; }
function getRandomSixDigitInteger ( ) { var bigInt ; do { bigInt = parent . crypto . randomBytes ( 4 ) . readUInt32BE ( 0 ) ; } while ( bigInt >= 4200000000 ) ; return bigInt % 1000000 ; }
2019-02-06 07:01:01 +03:00
2019-02-05 05:06:01 +03:00
// Parse arguments string array into an object
function parseArgs ( argv ) {
var results = { '_' : [ ] } , current = null ;
for ( var i = 1 , len = argv . length ; i < len ; i ++ ) {
var x = argv [ i ] ;
if ( x . length > 2 && x [ 0 ] == '-' && x [ 1 ] == '-' ) {
if ( current != null ) { results [ current ] = true ; }
current = x . substring ( 2 ) ;
} else {
if ( current != null ) { results [ current ] = toNumberIfNumber ( x ) ; current = null ; } else { results [ '_' ] . push ( toNumberIfNumber ( x ) ) ; }
}
}
if ( current != null ) { results [ current ] = true ; }
return results ;
}
2019-04-17 03:32:18 +03:00
// Return true if at least one element of arr2 is in arr1
function findOne ( arr1 , arr2 ) { if ( ( arr1 == null ) || ( arr2 == null ) ) return false ; return arr2 . some ( function ( v ) { return arr1 . indexOf ( v ) >= 0 ; } ) ; } ;
2019-07-23 02:00:43 +03:00
function getRandomPassword ( ) { return Buffer . from ( parent . crypto . randomBytes ( 9 ) , 'binary' ) . toString ( 'base64' ) . split ( '/' ) . join ( '@' ) ; }
2019-04-29 06:31:08 +03:00
2019-09-21 03:21:58 +03:00
function handleAmtCommand ( cmd , node ) {
2019-09-23 21:45:10 +03:00
if ( cmd == null ) return ;
2019-09-21 03:21:58 +03:00
var host = cmd . nodeid ;
2019-09-23 21:45:10 +03:00
if ( cmd . mode == 1 ) { host = node . host ; }
2019-09-21 03:21:58 +03:00
var tlsoptions = null ;
2019-09-23 21:45:10 +03:00
var wsman = new Wsman ( WsmanComm , host , node . intelamt . tls ? 16993 : 16992 , node . intelamt . user , node . intelamt . pass ,
node . intelamt . tls , tlsoptions , parent . parent , cmd . mode ) ;
2019-09-21 03:21:58 +03:00
var amt = new Amt ( wsman ) ;
switch ( cmd . command ) {
2019-12-28 02:18:43 +03:00
case 'Get-GeneralSettings' : {
amt . Get ( 'AMT_GeneralSettings' , function ( obj , name , response , status ) {
2019-09-23 21:45:10 +03:00
if ( status == 200 ) {
var resp = { action : 'amt' , nodeid : cmd . nodeid , command : 'Get-GeneralSettings' , value : response . Body }
2019-09-21 03:21:58 +03:00
ws . send ( JSON . stringify ( resp ) ) ;
} else {
2019-12-28 02:18:43 +03:00
ws . send ( JSON . stringify ( { 'error' : error } ) ) ;
2019-09-21 03:21:58 +03:00
}
} ) ;
break ;
}
default : {
2019-09-23 21:45:10 +03:00
// Do nothing
2019-09-21 03:21:58 +03:00
}
}
}
2020-04-30 12:02:23 +03:00
// Return the number of 2nd factor for this account
function count2factoraAuths ( ) {
var email2fa = ( ( ( typeof domain . passwordrequirements != 'object' ) || ( domain . passwordrequirements . email2factor != false ) ) && ( parent . parent . mailserver != null ) ) ;
var sms2fa = ( ( parent . parent . smsserver != null ) && ( ( typeof domain . passwordrequirements != 'object' ) || ( domain . passwordrequirements . sms2factor != false ) ) ) ;
var authFactorCount = 0 ;
2020-05-08 00:48:51 +03:00
if ( typeof user . otpsecret == 'string' ) { authFactorCount ++ ; } // Authenticator time factor
2020-04-30 12:02:23 +03:00
if ( email2fa && ( user . otpekey != null ) ) { authFactorCount ++ ; } // EMail factor
if ( sms2fa && ( user . phone != null ) ) { authFactorCount ++ ; } // SMS factor
if ( user . otphkeys != null ) { authFactorCount += user . otphkeys . length ; } // FIDO hardware factor
if ( ( authFactorCount > 0 ) && ( user . otpkeys != null ) ) { authFactorCount ++ ; } // Backup keys
return authFactorCount ;
}
2017-10-24 00:09:58 +03:00
return obj ;
2018-08-30 22:05:23 +03:00
} ;