2017-08-28 19:27:45 +03:00
/ *
2021-01-10 01:31:09 +03:00
Copyright 2018 - 2021 Intel Corporation
2017-08-28 19:27:45 +03:00
Licensed under the Apache License , Version 2.0 ( the "License" ) ;
you may not use this file except in compliance with the License .
You may obtain a copy of the License at
2018-01-17 04:30:34 +03:00
http : //www.apache.org/licenses/LICENSE-2.0
2017-08-28 19:27:45 +03:00
Unless required by applicable law or agreed to in writing , software
distributed under the License is distributed on an "AS IS" BASIS ,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND , either express or implied .
See the License for the specific language governing permissions and
limitations under the License .
* /
2021-01-25 08:51:22 +03:00
process . on ( 'uncaughtException' , function ( ex ) {
2020-01-08 00:04:36 +03:00
require ( 'MeshAgent' ) . SendCommand ( { action : 'msg' , type : 'console' , value : "uncaughtException1: " + ex } ) ;
2018-09-20 21:45:12 +03:00
} ) ;
2021-04-24 20:53:13 +03:00
if ( process . platform == 'win32' && require ( 'user-sessions' ) . getDomain == null ) {
require ( 'user-sessions' ) . getDomain = function getDomain ( uid ) {
2021-04-19 20:55:09 +03:00
return ( this . getSessionAttribute ( uid , this . InfoClass . WTSDomainName ) ) ;
} ;
}
2018-09-20 21:45:12 +03:00
2018-11-28 21:50:25 +03:00
// NOTE: This seems to cause big problems, don't enable the debugger in the server's meshcore.
2018-11-27 04:12:27 +03:00
//attachDebugger({ webport: 9999, wait: 1 }).then(function (prt) { console.log('Point Browser for Debug to port: ' + prt); });
2018-09-20 21:45:12 +03:00
2018-11-28 04:13:01 +03:00
// Mesh Rights
2019-06-15 02:33:53 +03:00
var MNG _ERROR = 65 ;
2018-12-30 02:24:33 +03:00
var MESHRIGHT _EDITMESH = 1 ;
var MESHRIGHT _MANAGEUSERS = 2 ;
var MESHRIGHT _MANAGECOMPUTERS = 4 ;
var MESHRIGHT _REMOTECONTROL = 8 ;
var MESHRIGHT _AGENTCONSOLE = 16 ;
var MESHRIGHT _SERVERFILES = 32 ;
var MESHRIGHT _WAKEDEVICE = 64 ;
var MESHRIGHT _SETNOTES = 128 ;
var MESHRIGHT _REMOTEVIEW = 256 ;
2019-03-01 22:47:58 +03:00
var MESHRIGHT _NOTERMINAL = 512 ;
var MESHRIGHT _NOFILES = 1024 ;
var MESHRIGHT _NOAMT = 2048 ;
2019-03-10 01:28:08 +03:00
var MESHRIGHT _LIMITEDINPUT = 4096 ;
2020-03-07 01:06:33 +03:00
var MESHRIGHT _LIMITEVENTS = 8192 ;
var MESHRIGHT _CHATNOTIFY = 16384 ;
var MESHRIGHT _UNINSTALL = 32768 ;
var MESHRIGHT _NODESKTOP = 65536 ;
2021-01-15 10:57:52 +03:00
2021-06-08 10:11:17 +03:00
if ( require ( 'MeshAgent' ) . ARCHID == null )
{
2021-01-14 12:18:28 +03:00
var id = null ;
2021-06-08 10:11:17 +03:00
switch ( process . platform )
{
2021-01-14 12:18:28 +03:00
case 'win32' :
id = require ( '_GenericMarshal' ) . PointerSize == 4 ? 3 : 4 ;
break ;
case 'freebsd' :
id = require ( '_GenericMarshal' ) . PointerSize == 4 ? 31 : 30 ;
break ;
case 'darwin' :
2021-06-08 10:11:17 +03:00
try
{
2021-01-17 01:33:06 +03:00
id = require ( 'os' ) . arch ( ) == 'x64' ? 16 : 29 ;
}
2021-06-08 10:11:17 +03:00
catch ( xx )
{
2021-01-17 01:33:06 +03:00
id = 16 ;
}
2021-05-16 00:53:35 +03:00
break ;
2021-01-14 12:18:28 +03:00
}
if ( id != null ) { Object . defineProperty ( require ( 'MeshAgent' ) , 'ARCHID' , { value : id } ) ; }
}
2021-01-25 02:19:29 +03:00
var obj = { } ;
var agentFileHttpRequests = { } ; // Currently active agent HTTPS GET requests from the server.
var agentFileHttpPendingRequests = [ ] ; // Pending HTTPS GET requests from the server.
2021-06-08 10:11:17 +03:00
var debugConsole = ( global . _MSH && ( _MSH ( ) . debugConsole == 1 ) ) ;
2021-01-05 20:47:47 +03:00
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' && require ( 'user-sessions' ) . isRoot ( ) ) {
2021-01-25 02:19:29 +03:00
// Check the Agent Uninstall MetaData for correctness, as the installer may have written an incorrect value
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
var writtenSize = 0 , actualSize = Math . floor ( require ( 'fs' ) . statSync ( process . execPath ) . size / 1024 ) ;
try { writtenSize = require ( 'win-registry' ) . QueryKey ( require ( 'win-registry' ) . HKEY . LocalMachine , 'Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\MeshCentralAgent' , 'EstimatedSize' ) ; } catch ( e ) { }
if ( writtenSize != actualSize ) { try { require ( 'win-registry' ) . WriteKey ( require ( 'win-registry' ) . HKEY . LocalMachine , 'Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\MeshCentralAgent' , 'EstimatedSize' , actualSize ) ; } catch ( e ) { } }
} catch ( x ) { }
// Check to see if we are the Installed Mesh Agent Service, if we are, make sure we can run in Safe Mode
var svcname = process . platform == 'win32' ? 'Mesh Agent' : 'meshagent' ;
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
svcname = require ( 'MeshAgent' ) . serviceName ;
2020-01-06 22:00:37 +03:00
}
2021-01-25 08:51:22 +03:00
catch ( x ) {
2021-01-25 02:19:29 +03:00
}
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
var meshCheck = false ;
try { meshCheck = require ( 'service-manager' ) . manager . getService ( svcname ) . isMe ( ) ; } catch ( e ) { }
if ( meshCheck && require ( 'win-bcd' ) . isSafeModeService && ! require ( 'win-bcd' ) . isSafeModeService ( svcname ) ) { require ( 'win-bcd' ) . enableSafeModeService ( svcname ) ; }
} catch ( e ) { }
}
2018-09-15 03:42:39 +03:00
2021-01-25 08:51:22 +03:00
if ( process . platform == 'darwin' && ! process . versions ) {
2021-01-25 02:19:29 +03:00
// This is an older MacOS Agent, so we'll need to check the service definition so that Auto-Update will function correctly
var child = require ( 'child_process' ) . execFile ( '/bin/sh' , [ 'sh' ] ) ;
child . stdout . str = '' ;
child . stdout . on ( 'data' , function ( chunk ) { this . str += chunk . toString ( ) ; } ) ;
child . stdin . write ( "cat /Library/LaunchDaemons/meshagent_osx64_LaunchDaemon.plist | tr '\n' '\.' | awk '{split($0, a, \"<key>KeepAlive</key>\"); split(a[2], b, \"<\"); split(b[2], c, \">\"); " ) ;
child . stdin . write ( " if(c[1]==\"dict\"){ split(a[2], d, \"</dict>\"); if(split(d[1], truval, \"<true/>\")>1) { split(truval[1], kn1, \"<key>\"); split(kn1[2], kn2, \"</key>\"); print kn2[1]; } }" ) ;
child . stdin . write ( " else { split(c[1], ka, \"/\"); if(ka[1]==\"true\") {print \"ALWAYS\";} } }'\nexit\n" ) ;
child . waitExit ( ) ;
2021-01-25 08:51:22 +03:00
if ( child . stdout . str . trim ( ) == 'Crashed' ) {
2021-01-25 02:19:29 +03:00
child = require ( 'child_process' ) . execFile ( '/bin/sh' , [ 'sh' ] ) ;
2019-05-14 00:27:40 +03:00
child . stdout . str = '' ;
child . stdout . on ( 'data' , function ( chunk ) { this . str += chunk . toString ( ) ; } ) ;
2021-01-25 02:19:29 +03:00
child . stdin . write ( "launchctl list | grep 'meshagent' | awk '{ if($3==\"meshagent\"){print $1;}}'\nexit\n" ) ;
2019-05-14 00:27:40 +03:00
child . waitExit ( ) ;
2021-01-25 02:19:29 +03:00
2021-01-25 08:51:22 +03:00
if ( parseInt ( child . stdout . str . trim ( ) ) == process . pid ) {
2021-01-25 02:19:29 +03:00
// The currently running MeshAgent is us, so we can continue with the update
var plist = require ( 'fs' ) . readFileSync ( '/Library/LaunchDaemons/meshagent_osx64_LaunchDaemon.plist' ) . toString ( ) ;
var tokens = plist . split ( '<key>KeepAlive</key>' ) ;
2021-01-25 08:51:22 +03:00
if ( tokens [ 1 ] . split ( '>' ) [ 0 ] . split ( '<' ) [ 1 ] == 'dict' ) {
2021-01-25 02:19:29 +03:00
var tmp = tokens [ 1 ] . split ( '</dict>' ) ;
tmp . shift ( ) ;
tokens [ 1 ] = '\n <true/>' + tmp . join ( '</dict>' ) ;
tokens = tokens . join ( '<key>KeepAlive</key>' ) ;
require ( 'fs' ) . writeFileSync ( '/Library/LaunchDaemons/meshagent_osx64_LaunchDaemon.plist' , tokens ) ;
var fix = '' ;
fix += ( "function macosRepair()\n" ) ;
fix += ( "{\n" ) ;
fix += ( " var child = require('child_process').execFile('/bin/sh', ['sh']);\n" ) ;
fix += ( " child.stdout.str = '';\n" ) ;
fix += ( " child.stdout.on('data', function (chunk) { this.str += chunk.toString(); });\n" ) ;
fix += ( " child.stderr.on('data', function (chunk) { });\n" ) ;
fix += ( " child.stdin.write('launchctl unload /Library/LaunchDaemons/meshagent_osx64_LaunchDaemon.plist\\n');\n" ) ;
fix += ( " child.stdin.write('launchctl load /Library/LaunchDaemons/meshagent_osx64_LaunchDaemon.plist\\n');\n" ) ;
fix += ( " child.stdin.write('rm /Library/LaunchDaemons/meshagentRepair.plist\\n');\n" ) ;
fix += ( " child.stdin.write('rm " + process . cwd ( ) + "/macosRepair.js\\n');\n" ) ;
fix += ( " child.stdin.write('launchctl stop meshagentRepair\\nexit\\n');\n" ) ;
fix += ( " child.waitExit();\n" ) ;
fix += ( "}\n" ) ;
fix += ( "macosRepair();\n" ) ;
fix += ( "process.exit();\n" ) ;
require ( 'fs' ) . writeFileSync ( process . cwd ( ) + '/macosRepair.js' , fix ) ;
var plist = '<?xml version="1.0" encoding="UTF-8"?>\n' ;
plist += '<!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">\n' ;
plist += '<plist version="1.0">\n' ;
plist += ' <dict>\n' ;
plist += ' <key>Label</key>\n' ;
plist += ( ' <string>meshagentRepair</string>\n' ) ;
plist += ' <key>ProgramArguments</key>\n' ;
plist += ' <array>\n' ;
plist += ( ' <string>' + process . execPath + '</string>\n' ) ;
plist += ' <string>macosRepair.js</string>\n' ;
plist += ' </array>\n' ;
plist += ' <key>WorkingDirectory</key>\n' ;
plist += ( ' <string>' + process . cwd ( ) + '</string>\n' ) ;
plist += ' <key>RunAtLoad</key>\n' ;
plist += ' <true/>\n' ;
plist += ' </dict>\n' ;
plist += '</plist>' ;
require ( 'fs' ) . writeFileSync ( '/Library/LaunchDaemons/meshagentRepair.plist' , plist ) ;
child = require ( 'child_process' ) . execFile ( '/bin/sh' , [ 'sh' ] ) ;
child . stdout . str = '' ;
child . stdout . on ( 'data' , function ( chunk ) { this . str += chunk . toString ( ) ; } ) ;
child . stdin . write ( "launchctl load /Library/LaunchDaemons/meshagentRepair.plist\nexit\n" ) ;
child . waitExit ( ) ;
2019-05-14 00:27:40 +03:00
}
}
}
2021-01-25 02:19:29 +03:00
}
2019-05-14 00:27:40 +03:00
2021-01-25 02:19:29 +03:00
// Add an Intel AMT event to the log
2021-01-25 08:51:22 +03:00
function addAmtEvent ( msg ) {
2021-01-25 02:19:29 +03:00
if ( obj . amtevents == null ) { obj . amtevents = [ ] ; }
var d = new Date ( ) ;
obj . amtevents . push ( zeroPad ( d . getHours ( ) , 2 ) + ':' + zeroPad ( d . getMinutes ( ) , 2 ) + ':' + zeroPad ( d . getSeconds ( ) , 2 ) + ', ' + msg ) ;
if ( obj . amtevents . length > 100 ) { obj . amtevents . splice ( 0 , obj . amtevents . length - 100 ) ; }
}
function zeroPad ( num , size ) { var s = '000000000' + num ; return s . substr ( s . length - size ) ; }
// Create Secure IPC for Diagnostic Agent Communications
obj . DAIPC = require ( 'net' ) . createServer ( ) ;
if ( process . platform != 'win32' ) { try { require ( 'fs' ) . unlinkSync ( process . cwd ( ) + '/DAIPC' ) ; } catch ( e ) { } }
obj . DAIPC . IPCPATH = process . platform == 'win32' ? ( '\\\\.\\pipe\\' + require ( '_agentNodeId' ) ( ) + '-DAIPC' ) : ( process . cwd ( ) + '/DAIPC' ) ;
try { obj . DAIPC . listen ( { path : obj . DAIPC . IPCPATH , writableAll : true , maxConnections : 5 } ) ; } catch ( e ) { }
obj . DAIPC . _daipc = [ ] ;
2021-01-25 08:51:22 +03:00
obj . DAIPC . on ( 'connection' , function ( c ) {
c . _send = function ( j ) {
2021-01-25 02:19:29 +03:00
var data = JSON . stringify ( j ) ;
var packet = Buffer . alloc ( data . length + 4 ) ;
packet . writeUInt32LE ( data . length + 4 , 0 ) ;
Buffer . from ( data ) . copy ( packet , 4 ) ;
this . write ( packet ) ;
} ;
this . _daipc . push ( c ) ;
c . parent = this ;
c . on ( 'end' , function ( ) { removeRegisteredApp ( this ) ; } ) ;
2021-01-25 08:51:22 +03:00
c . on ( 'data' , function ( chunk ) {
2021-01-25 02:19:29 +03:00
if ( chunk . length < 4 ) { this . unshift ( chunk ) ; return ; }
var len = chunk . readUInt32LE ( 0 ) ;
if ( len > 8192 ) { removeRegisteredApp ( this ) ; this . end ( ) ; return ; }
if ( chunk . length < len ) { this . unshift ( chunk ) ; return ; }
var data = chunk . slice ( 4 , len ) ;
try { data = JSON . parse ( data . toString ( ) ) ; } catch ( e ) { }
if ( ( data == null ) || ( typeof data . cmd != 'string' ) ) return ;
2021-01-25 08:51:22 +03:00
try {
switch ( data . cmd ) {
2021-01-25 02:19:29 +03:00
case 'requesthelp' :
if ( this . _registered == null ) return ;
sendConsoleText ( 'Request Help (' + this . _registered + '): ' + data . value ) ;
var help = { } ;
help [ this . _registered ] = data . value ;
try { mesh . SendCommand ( { action : 'sessions' , type : 'help' , value : help } ) ; } catch ( e ) { }
MeshServerLogEx ( 98 , [ this . _registered , data . value ] , "Help Requested, user: " + this . _registered + ", details: " + data . value , null ) ;
break ;
case 'cancelhelp' :
if ( this . _registered == null ) return ;
sendConsoleText ( 'Cancel Help (' + this . _registered + ')' ) ;
try { mesh . SendCommand ( { action : 'sessions' , type : 'help' , value : { } } ) ; } catch ( e ) { }
break ;
case 'register' :
2021-01-25 08:51:22 +03:00
if ( typeof data . value == 'string' ) {
2021-01-25 02:19:29 +03:00
this . _registered = data . value ;
var apps = { } ;
apps [ data . value ] = 1 ;
try { mesh . SendCommand ( { action : 'sessions' , type : 'app' , value : apps } ) ; } catch ( e ) { }
this . _send ( { cmd : 'serverstate' , value : meshServerConnectionState , url : require ( 'MeshAgent' ) . ConnectedServer , amt : ( amt != null ) } ) ;
}
break ;
case 'query' :
2021-01-25 08:51:22 +03:00
switch ( data . value ) {
2021-01-25 02:19:29 +03:00
case 'connection' :
data . result = require ( 'MeshAgent' ) . ConnectedServer ;
this . _send ( data ) ;
break ;
case 'descriptors' :
2021-01-25 08:51:22 +03:00
require ( 'ChainViewer' ) . getSnapshot ( ) . then ( function ( f ) {
2021-01-25 02:19:29 +03:00
this . tag . payload . result = f ;
this . tag . ipc . _send ( this . tag . payload ) ;
} ) . parentPromise . tag = { ipc : this , payload : data } ;
break ;
case 'timerinfo' :
data . result = require ( 'ChainViewer' ) . getTimerInfo ( ) ;
this . _send ( data ) ;
break ;
}
break ;
case 'amtstate' :
if ( amt == null ) return ;
var func = function amtStateFunc ( state ) { if ( state != null ) { amtStateFunc . pipe . _send ( { cmd : 'amtstate' , value : state } ) ; } }
func . pipe = this ;
amt . getMeiState ( 11 , func ) ;
break ;
case 'sessions' :
this . _send ( { cmd : 'sessions' , sessions : tunnelUserCount } ) ;
break ;
case 'meshToolInfo' :
try { mesh . SendCommand ( { action : 'meshToolInfo' , name : data . name , hash : data . hash , cookie : data . cookie ? true : false , pipe : true } ) ; } catch ( e ) { }
break ;
2021-05-16 11:25:58 +03:00
case 'getUserImage' :
try { mesh . SendCommand ( { action : 'getUserImage' , userid : data . userid , pipe : true } ) ; } catch ( e ) { }
break ;
2021-01-25 02:19:29 +03:00
case 'console' :
2021-01-25 08:51:22 +03:00
if ( debugConsole ) {
2021-01-25 02:19:29 +03:00
var args = splitArgs ( data . value ) ;
processConsoleCommand ( args [ 0 ] . toLowerCase ( ) , parseArgs ( args ) , 0 , 'pipe' ) ;
}
break ;
2019-06-15 02:33:53 +03:00
}
2021-01-25 02:19:29 +03:00
}
catch ( e ) { removeRegisteredApp ( this ) ; this . end ( ) ; return ; }
2019-06-15 02:33:53 +03:00
} ) ;
2021-01-25 02:19:29 +03:00
} ) ;
2020-10-12 08:24:30 +03:00
2021-01-25 02:19:29 +03:00
// Send current sessions to registered apps
2021-06-08 10:11:17 +03:00
function broadcastSessionsToRegisteredApps ( x )
{
var p = { } , i ;
2021-06-09 22:13:23 +03:00
for ( i = 0 ; sendAgentMessage . messages != null && i < sendAgentMessage . messages . length ; ++ i )
2021-06-08 10:11:17 +03:00
{
p [ i ] = sendAgentMessage . messages [ i ] ;
}
tunnelUserCount . msg = p ;
2021-01-25 02:19:29 +03:00
broadcastToRegisteredApps ( { cmd : 'sessions' , sessions : tunnelUserCount } ) ;
2021-06-08 10:11:17 +03:00
tunnelUserCount . msg = { } ;
2021-01-25 02:19:29 +03:00
}
2020-10-12 08:24:30 +03:00
2021-01-25 02:19:29 +03:00
// Send this object to all registered local applications
2021-01-25 08:51:22 +03:00
function broadcastToRegisteredApps ( x ) {
2021-01-25 02:19:29 +03:00
if ( ( obj . DAIPC == null ) || ( obj . DAIPC . _daipc == null ) ) return ;
2021-05-16 11:25:58 +03:00
for ( var i in obj . DAIPC . _daipc ) {
if ( obj . DAIPC . _daipc [ i ] . _registered != null ) { obj . DAIPC . _daipc [ i ] . _send ( x ) ; }
}
2021-01-25 02:19:29 +03:00
}
2020-10-12 08:24:30 +03:00
2021-01-25 02:19:29 +03:00
// Send this object to a specific registered local applications
2021-01-25 08:51:22 +03:00
function sendToRegisteredApp ( appid , x ) {
2021-01-25 02:19:29 +03:00
if ( ( obj . DAIPC == null ) || ( obj . DAIPC . _daipc == null ) ) return ;
for ( var i in obj . DAIPC . _daipc ) { if ( obj . DAIPC . _daipc [ i ] . _registered == appid ) { obj . DAIPC . _daipc [ i ] . _send ( x ) ; } }
}
2020-11-28 08:40:30 +03:00
2021-01-25 02:19:29 +03:00
// Send list of registered apps to the server
2021-01-25 08:51:22 +03:00
function updateRegisteredAppsToServer ( ) {
2021-01-25 02:19:29 +03:00
if ( ( obj . DAIPC == null ) || ( obj . DAIPC . _daipc == null ) ) return ;
var apps = { } ;
for ( var i in obj . DAIPC . _daipc ) { if ( apps [ obj . DAIPC . _daipc [ i ] . _registered ] == null ) { apps [ obj . DAIPC . _daipc [ i ] . _registered ] = 1 ; } else { apps [ obj . DAIPC . _daipc [ i ] . _registered ] ++ ; } }
try { mesh . SendCommand ( { action : 'sessions' , type : 'app' , value : apps } ) ; } catch ( e ) { }
}
// Remove a registered app
2021-01-25 08:51:22 +03:00
function removeRegisteredApp ( pipe ) {
2021-01-25 02:19:29 +03:00
for ( var i = obj . DAIPC . _daipc . length - 1 ; i >= 0 ; i -- ) { if ( obj . DAIPC . _daipc [ i ] === pipe ) { obj . DAIPC . _daipc . splice ( i , 1 ) ; } }
if ( pipe . _registered != null ) updateRegisteredAppsToServer ( ) ;
}
2020-10-12 08:24:30 +03:00
2021-01-25 08:51:22 +03:00
function diagnosticAgent _uninstall ( ) {
2021-01-25 02:19:29 +03:00
require ( 'service-manager' ) . manager . uninstallService ( 'meshagentDiagnostic' ) ;
require ( 'task-scheduler' ) . delete ( 'meshagentDiagnostic/periodicStart' ) ;
}
2021-01-25 08:51:22 +03:00
function diagnosticAgent _installCheck ( install ) {
try {
2021-01-25 02:19:29 +03:00
var diag = require ( 'service-manager' ) . manager . getService ( 'meshagentDiagnostic' ) ;
return ( diag ) ;
}
2021-01-25 08:51:22 +03:00
catch ( e ) {
2020-10-12 08:24:30 +03:00
}
2021-01-25 02:19:29 +03:00
if ( ! install ) { return ( null ) ; }
2020-10-12 08:24:30 +03:00
2021-01-25 02:19:29 +03:00
var svc = null ;
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
require ( 'service-manager' ) . manager . installService (
{
name : 'meshagentDiagnostic' ,
displayName : "Mesh Agent Diagnostic Service" ,
description : "Mesh Agent Diagnostic Service" ,
servicePath : process . execPath ,
parameters : [ '-recovery' ]
//files: [{ newName: 'diagnostic.js', _buffer: Buffer.from('LyoNCkNvcHlyaWdodCAyMDE5IEludGVsIENvcnBvcmF0aW9uDQoNCkxpY2Vuc2VkIHVuZGVyIHRoZSBBcGFjaGUgTGljZW5zZSwgVmVyc2lvbiAyLjAgKHRoZSAiTGljZW5zZSIpOw0KeW91IG1heSBub3QgdXNlIHRoaXMgZmlsZSBleGNlcHQgaW4gY29tcGxpYW5jZSB3aXRoIHRoZSBMaWNlbnNlLg0KWW91IG1heSBvYnRhaW4gYSBjb3B5IG9mIHRoZSBMaWNlbnNlIGF0DQoNCiAgICBodHRwOi8vd3d3LmFwYWNoZS5vcmcvbGljZW5zZXMvTElDRU5TRS0yLjANCg0KVW5sZXNzIHJlcXVpcmVkIGJ5IGFwcGxpY2FibGUgbGF3IG9yIGFncmVlZCB0byBpbiB3cml0aW5nLCBzb2Z0d2FyZQ0KZGlzdHJpYnV0ZWQgdW5kZXIgdGhlIExpY2Vuc2UgaXMgZGlzdHJpYnV0ZWQgb24gYW4gIkFTIElTIiBCQVNJUywNCldJVEhPVVQgV0FSUkFOVElFUyBPUiBDT05ESVRJT05TIE9GIEFOWSBLSU5ELCBlaXRoZXIgZXhwcmVzcyBvciBpbXBsaWVkLg0KU2VlIHRoZSBMaWNlbnNlIGZvciB0aGUgc3BlY2lmaWMgbGFuZ3VhZ2UgZ292ZXJuaW5nIHBlcm1pc3Npb25zIGFuZA0KbGltaXRhdGlvbnMgdW5kZXIgdGhlIExpY2Vuc2UuDQoqLw0KDQp2YXIgaG9zdCA9IHJlcXVpcmUoJ3NlcnZpY2UtaG9zdCcpLmNyZWF0ZSgnbWVzaGFnZW50RGlhZ25vc3RpYycpOw0KdmFyIFJlY292ZXJ5QWdlbnQgPSByZXF1aXJlKCdNZXNoQWdlbnQnKTsNCg0KaG9zdC5vbignc2VydmljZVN0YXJ0JywgZnVuY3Rpb24gKCkNCnsNCiAgICBjb25zb2xlLnNldERlc3RpbmF0aW9uKGNvbnNvbGUuRGVzdGluYXRpb25zLkxPR0ZJTEUpOw0KICAgIGhvc3Quc3RvcCA9IGZ1bmN0aW9uKCkNCiAgICB7DQogICAgICAgIHJlcXVpcmUoJ3NlcnZpY2UtbWFuYWdlcicpLm1hbmFnZXIuZ2V0U2VydmljZSgnbWVzaGFnZW50RGlhZ25vc3RpYycpLnN0b3AoKTsNCiAgICB9DQogICAgUmVjb3ZlcnlBZ2VudC5vbignQ29ubmVjdGVkJywgZnVuY3Rpb24gKHN0YXR1cykNCiAgICB7DQogICAgICAgIGlmIChzdGF0dXMgPT0gMCkNCiAgICAgICAgew0KICAgICAgICAgICAgY29uc29sZS5sb2coJ0RpYWdub3N0aWMgQWdlbnQ6IFNlcnZlciBjb25uZWN0aW9uIGxvc3QuLi4nKTsNCiAgICAgICAgICAgIHJldHVybjsNCiAgICAgICAgfQ0KICAgICAgICBjb25zb2xlLmxvZygnRGlhZ25vc3RpYyBBZ2VudDogQ29ubmVjdGlvbiBFc3RhYmxpc2hlZCB3aXRoIFNlcnZlcicpOw0KICAgICAgICBzdGFydCgpOw0KICAgIH0pOw0KfSk7DQpob3N0Lm9uKCdub3JtYWxTdGFydCcsIGZ1bmN0aW9uICgpDQp7DQogICAgaG9zdC5zdG9wID0gZnVuY3Rpb24gKCkNCiAgICB7DQogICAgICAgIHByb2Nlc3MuZXhpdCgpOw0KICAgIH0NCiAgICBjb25zb2xlLmxvZygnTm9uIFNlcnZpY2UgTW9kZScpOw0KICAgIFJlY292ZXJ5QWdlbnQub24oJ0Nvbm5lY3RlZCcsIGZ1bmN0aW9uIChzdGF0dXMpDQogICAgew0KICAgICAgICBpZiAoc3RhdHVzID09IDApDQogICAgICAgIHsNCiAgICAgICAgICAgIGNvbnNvbGUubG9nKCdEaWFnbm9zdGljIEFnZW50OiBTZXJ2ZXIgY29ubmVjdGlvbiBsb3N0Li4uJyk7DQogICAgICAgICAgICByZXR1cm47DQogICAgICAgIH0NCiAgICAgICAgY29uc29sZS5sb2coJ0RpYWdub3N0aWMgQWdlbnQ6IENvbm5lY3Rpb24gRXN0YWJsaXNoZWQgd2l0aCBTZXJ2ZXInKTsNCiAgICAgICAgc3RhcnQoKTsNCiAgICB9KTsNCn0pOw0KaG9zdC5vbignc2VydmljZVN0b3AnLCBmdW5jdGlvbiAoKSB7IHByb2Nlc3MuZXhpdCgpOyB9KTsNCmhvc3QucnVuKCk7DQoNCg0KZnVuY3Rpb24gc3RhcnQoKQ0Kew0KDQp9Ow0K', 'base64') }]
} ) ;
svc = require ( 'service-manager' ) . manager . getService ( 'meshagentDiagnostic' ) ;
}
2021-01-25 08:51:22 +03:00
catch ( e ) {
2021-01-25 02:19:29 +03:00
return ( null ) ;
}
var proxyConfig = require ( 'global-tunnel' ) . proxyConfig ;
var cert = require ( 'MeshAgent' ) . GenerateAgentCertificate ( 'CN=MeshNodeDiagnosticCertificate' ) ;
var nodeid = require ( 'tls' ) . loadCertificate ( cert . root ) . getKeyHash ( ) . toString ( 'base64' ) ;
ddb = require ( 'SimpleDataStore' ) . Create ( svc . appWorkingDirectory ( ) . replace ( '\\' , '/' ) + '/meshagentDiagnostic.db' ) ;
ddb . Put ( 'disableUpdate' , '1' ) ;
ddb . Put ( 'MeshID' , Buffer . from ( require ( 'MeshAgent' ) . ServerInfo . MeshID , 'hex' ) ) ;
ddb . Put ( 'ServerID' , require ( 'MeshAgent' ) . ServerInfo . ServerID ) ;
ddb . Put ( 'MeshServer' , require ( 'MeshAgent' ) . ServerInfo . ServerUri ) ;
if ( cert . root . pfx ) { ddb . Put ( 'SelfNodeCert' , cert . root . pfx ) ; }
if ( cert . tls ) { ddb . Put ( 'SelfNodeTlsCert' , cert . tls . pfx ) ; }
2021-01-25 08:51:22 +03:00
if ( proxyConfig ) {
2021-01-25 02:19:29 +03:00
ddb . Put ( 'WebProxy' , proxyConfig . host + ':' + proxyConfig . port ) ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
ddb . Put ( 'ignoreProxyFile' , '1' ) ;
}
2019-06-15 02:33:53 +03:00
2021-01-25 02:19:29 +03:00
require ( 'MeshAgent' ) . SendCommand ( { action : 'diagnostic' , value : { command : 'register' , value : nodeid } } ) ;
require ( 'MeshAgent' ) . SendCommand ( { action : 'msg' , type : 'console' , value : "Diagnostic Agent Registered [" + nodeid . length + "/" + nodeid + "]" } ) ;
2019-06-15 02:33:53 +03:00
2021-01-25 02:19:29 +03:00
delete ddb ;
2019-06-15 02:33:53 +03:00
2021-01-25 02:19:29 +03:00
// Set a recurrent task, to run the Diagnostic Agent every 2 days
require ( 'task-scheduler' ) . create ( { name : 'meshagentDiagnostic/periodicStart' , daily : 2 , time : require ( 'tls' ) . generateRandomInteger ( '0' , '23' ) + ':' + require ( 'tls' ) . generateRandomInteger ( '0' , '59' ) . padStart ( 2 , '0' ) , service : 'meshagentDiagnostic' } ) ;
//require('task-scheduler').create({ name: 'meshagentDiagnostic/periodicStart', daily: '1', time: '17:16', service: 'meshagentDiagnostic' });
2019-06-15 02:33:53 +03:00
2021-01-25 02:19:29 +03:00
return ( svc ) ;
}
2019-06-15 02:33:53 +03:00
2021-01-25 02:19:29 +03:00
// Monitor the file 'batterystate.txt' in the agent's folder and sends battery update when this file is changed.
2021-01-25 08:51:22 +03:00
if ( ( require ( 'fs' ) . existsSync ( process . cwd ( ) + 'batterystate.txt' ) ) && ( require ( 'fs' ) . watch != null ) ) {
2021-01-25 02:19:29 +03:00
// Setup manual battery monitoring
2021-01-25 08:51:22 +03:00
require ( 'MeshAgent' ) . _batteryFileWatcher = require ( 'fs' ) . watch ( process . cwd ( ) , function ( ) {
2021-01-25 02:19:29 +03:00
if ( require ( 'MeshAgent' ) . _batteryFileTimer != null ) return ;
2021-01-25 08:51:22 +03:00
require ( 'MeshAgent' ) . _batteryFileTimer = setTimeout ( function ( ) {
try {
2021-01-25 02:19:29 +03:00
require ( 'MeshAgent' ) . _batteryFileTimer = null ;
var data = null ;
try { data = require ( 'fs' ) . readFileSync ( process . cwd ( ) + 'batterystate.txt' ) . toString ( ) ; } catch ( e ) { }
2021-01-25 08:51:22 +03:00
if ( ( data != null ) && ( data . length < 10 ) ) {
2021-01-25 02:19:29 +03:00
data = data . split ( ',' ) ;
2021-01-25 08:51:22 +03:00
if ( ( data . length == 2 ) && ( ( data [ 0 ] == 'ac' ) || ( data [ 0 ] == 'dc' ) ) ) {
2021-01-25 02:19:29 +03:00
var level = parseInt ( data [ 1 ] ) ;
if ( ( level >= 0 ) && ( level <= 100 ) ) { require ( 'MeshAgent' ) . SendCommand ( { action : 'battery' , state : data [ 0 ] , level : level } ) ; }
2020-08-29 06:01:06 +03:00
}
}
2021-01-25 02:19:29 +03:00
} catch ( e ) { }
} , 1000 ) ;
} ) ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
// Setup normal battery monitoring
2021-01-25 08:51:22 +03:00
if ( require ( 'identifiers' ) . isBatteryPowered && require ( 'identifiers' ) . isBatteryPowered ( ) ) {
require ( 'MeshAgent' ) . _battLevelChanged = function _battLevelChanged ( val ) {
2021-01-25 02:19:29 +03:00
_battLevelChanged . self . _currentBatteryLevel = val ;
_battLevelChanged . self . SendCommand ( { action : 'battery' , state : _battLevelChanged . self . _currentPowerState , level : val } ) ;
} ;
require ( 'MeshAgent' ) . _battLevelChanged . self = require ( 'MeshAgent' ) ;
2021-01-25 08:51:22 +03:00
require ( 'MeshAgent' ) . _powerChanged = function _powerChanged ( val ) {
2021-01-25 02:19:29 +03:00
_powerChanged . self . _currentPowerState = ( val == 'AC' ? 'ac' : 'dc' ) ;
_powerChanged . self . SendCommand ( { action : 'battery' , state : ( val == 'AC' ? 'ac' : 'dc' ) , level : _powerChanged . self . _currentBatteryLevel } ) ;
} ;
require ( 'MeshAgent' ) . _powerChanged . self = require ( 'MeshAgent' ) ;
2021-01-25 08:51:22 +03:00
require ( 'MeshAgent' ) . on ( 'Connected' , function ( status ) {
if ( status == 0 ) {
2021-01-25 02:19:29 +03:00
require ( 'power-monitor' ) . removeListener ( 'acdc' , this . _powerChanged ) ;
require ( 'power-monitor' ) . removeListener ( 'batteryLevel' , this . _battLevelChanged ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
require ( 'power-monitor' ) . on ( 'acdc' , this . _powerChanged ) ;
require ( 'power-monitor' ) . on ( 'batteryLevel' , this . _battLevelChanged ) ;
}
} ) ;
2020-09-01 02:45:45 +03:00
}
2021-01-25 02:19:29 +03:00
}
2020-05-31 21:24:34 +03:00
2021-01-25 02:19:29 +03:00
// MeshAgent JavaScript Core Module. This code is sent to and running on the mesh agent.
var meshCoreObj = { action : 'coreinfo' , value : ( require ( 'MeshAgent' ) . coreHash ? ( 'MeshCore CRC-' + crc32c ( require ( 'MeshAgent' ) . coreHash ) ) : ( 'MeshCore v6' ) ) , caps : 14 , root : require ( 'user-sessions' ) . isRoot ( ) } ; // Capability bitmask: 1 = Desktop, 2 = Terminal, 4 = Files, 8 = Console, 16 = JavaScript, 32 = Temporary Agent, 64 = Recovery Agent
// Get the operating system description string
try { require ( 'os' ) . name ( ) . then ( function ( v ) { meshCoreObj . osdesc = v ; meshCoreObjChanged ( ) ; } ) ; } catch ( e ) { }
// Setup logged in user monitoring (THIS IS BROKEN IN WIN7)
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
var userSession = require ( 'user-sessions' ) ;
2021-01-25 08:51:22 +03:00
userSession . on ( 'changed' , function onUserSessionChanged ( ) {
userSession . enumerateUsers ( ) . then ( function ( users ) {
if ( process . platform == 'linux' ) {
if ( userSession . _startTime == null ) {
2021-01-25 02:19:29 +03:00
userSession . _startTime = Date . now ( ) ;
userSession . _count = users . length ;
}
2021-01-25 08:51:22 +03:00
else if ( Date . now ( ) - userSession . _startTime < 10000 && users . length == userSession . _count ) {
2021-01-25 02:19:29 +03:00
userSession . removeAllListeners ( 'changed' ) ;
return ;
2018-09-01 01:23:42 +03:00
}
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
var u = [ ] , a = users . Active ;
2021-01-25 08:51:22 +03:00
for ( var i = 0 ; i < a . length ; i ++ ) {
2021-01-25 02:19:29 +03:00
var un = a [ i ] . Domain ? ( a [ i ] . Domain + '\\' + a [ i ] . Username ) : ( a [ i ] . Username ) ;
if ( u . indexOf ( un ) == - 1 ) { u . push ( un ) ; } // Only push users in the list once.
}
meshCoreObj . users = u ;
meshCoreObjChanged ( ) ;
2020-11-02 11:44:07 +03:00
} ) ;
2021-01-25 02:19:29 +03:00
} ) ;
userSession . emit ( 'changed' ) ;
//userSession.on('locked', function (user) { sendConsoleText('[' + (user.Domain ? user.Domain + '\\' : '') + user.Username + '] has LOCKED the desktop'); });
//userSession.on('unlocked', function (user) { sendConsoleText('[' + (user.Domain ? user.Domain + '\\' : '') + user.Username + '] has UNLOCKED the desktop'); });
} catch ( e ) { }
var meshServerConnectionState = 0 ;
var tunnels = { } ;
var lastNetworkInfo = null ;
var lastPublicLocationInfo = null ;
var selfInfoUpdateTimer = null ;
var http = require ( 'http' ) ;
var net = require ( 'net' ) ;
var fs = require ( 'fs' ) ;
var rtc = require ( 'ILibWebRTC' ) ;
var amt = null ;
var processManager = require ( 'process-manager' ) ;
var wifiScannerLib = null ;
var wifiScanner = null ;
var networkMonitor = null ;
var nextTunnelIndex = 1 ;
var apftunnel = null ;
var tunnelUserCount = { terminal : { } , files : { } , tcp : { } , udp : { } , msg : { } } ; // List of userid->count sessions for terminal, files and TCP/UDP routing
// Add to the server event log
2021-01-25 08:51:22 +03:00
function MeshServerLog ( msg , state ) {
2021-01-25 02:19:29 +03:00
if ( typeof msg == 'string' ) { msg = { action : 'log' , msg : msg } ; } else { msg . action = 'log' ; }
2021-01-25 08:51:22 +03:00
if ( state ) {
2021-01-25 02:19:29 +03:00
if ( state . userid ) { msg . userid = state . userid ; }
if ( state . username ) { msg . username = state . username ; }
if ( state . sessionid ) { msg . sessionid = state . sessionid ; }
if ( state . remoteaddr ) { msg . remoteaddr = state . remoteaddr ; }
}
mesh . SendCommand ( msg ) ;
}
2018-08-30 04:47:22 +03:00
2021-01-25 02:19:29 +03:00
// Add to the server event log, use internationalized events
2021-01-25 08:51:22 +03:00
function MeshServerLogEx ( id , args , msg , state ) {
2021-01-25 02:19:29 +03:00
var msg = { action : 'log' , msgid : id , msgArgs : args , msg : msg } ;
2021-01-25 08:51:22 +03:00
if ( state ) {
2021-01-25 02:19:29 +03:00
if ( state . userid ) { msg . userid = state . userid ; }
if ( state . username ) { msg . username = state . username ; }
if ( state . sessionid ) { msg . sessionid = state . sessionid ; }
if ( state . remoteaddr ) { msg . remoteaddr = state . remoteaddr ; }
2020-09-09 04:59:58 +03:00
}
2021-01-25 02:19:29 +03:00
mesh . SendCommand ( msg ) ;
}
2020-09-09 04:59:58 +03:00
2021-01-25 02:19:29 +03:00
// Import libraries
db = require ( 'SimpleDataStore' ) . Shared ( ) ;
sha = require ( 'SHA256Stream' ) ;
mesh = require ( 'MeshAgent' ) ;
childProcess = require ( 'child_process' ) ;
2021-01-25 08:51:22 +03:00
if ( mesh . hasKVM == 1 ) { // if the agent is compiled with KVM support
2021-01-25 02:19:29 +03:00
// Check if this computer supports a desktop
2021-01-25 08:51:22 +03:00
try {
if ( ( process . platform == 'win32' ) || ( process . platform == 'darwin' ) || ( require ( 'monitor-info' ) . kvm _x11 _support ) ) {
2021-01-25 02:19:29 +03:00
meshCoreObj . caps |= 1 ; meshCoreObjChanged ( ) ;
2021-01-25 08:51:22 +03:00
} else if ( process . platform == 'linux' || process . platform == 'freebsd' ) {
2021-01-25 02:19:29 +03:00
require ( 'monitor-info' ) . on ( 'kvmSupportDetected' , function ( value ) { meshCoreObj . caps |= 1 ; meshCoreObjChanged ( ) ; } ) ;
2019-07-30 02:35:48 +03:00
}
2021-01-25 02:19:29 +03:00
} catch ( e ) { }
}
mesh . DAIPC = obj . DAIPC ;
2019-07-30 02:35:48 +03:00
2021-01-25 02:19:29 +03:00
/ *
// Try to load up the network monitor
try {
networkMonitor = require ( 'NetworkMonitor' ) ;
networkMonitor . on ( 'change' , function ( ) { sendNetworkUpdateNagle ( ) ; } ) ;
networkMonitor . on ( 'add' , function ( addr ) { sendNetworkUpdateNagle ( ) ; } ) ;
networkMonitor . on ( 'remove' , function ( addr ) { sendNetworkUpdateNagle ( ) ; } ) ;
} catch ( e ) { networkMonitor = null ; }
* /
2019-06-15 02:33:53 +03:00
2021-01-25 02:19:29 +03:00
// Fetch the SMBios Tables
var SMBiosTables = null ;
var SMBiosTablesRaw = null ;
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
var SMBiosModule = null ;
try { SMBiosModule = require ( 'smbios' ) ; } catch ( e ) { }
2021-01-25 08:51:22 +03:00
if ( SMBiosModule != null ) {
SMBiosModule . get ( function ( data ) {
if ( data != null ) {
2021-01-25 02:19:29 +03:00
SMBiosTablesRaw = data ;
SMBiosTables = require ( 'smbios' ) . parse ( data )
if ( mesh . isControlChannelConnected ) { mesh . SendCommand ( { action : 'smbios' , value : SMBiosTablesRaw } ) ; }
2018-01-10 07:13:41 +03:00
2021-01-25 02:19:29 +03:00
// If SMBios tables say that Intel AMT is present, try to connect MEI
2021-01-25 08:51:22 +03:00
if ( SMBiosTables . amtInfo && ( SMBiosTables . amtInfo . AMT == true ) ) {
2021-01-25 02:19:29 +03:00
var amtmodule = require ( 'amt-manage' ) ;
amt = new amtmodule ( mesh , db , false ) ;
amt . on ( 'portBinding_LMS' , function ( map ) { mesh . SendCommand ( { action : 'lmsinfo' , value : { ports : map . keys ( ) } } ) ; } ) ;
amt . on ( 'stateChange_LMS' , function ( v ) { if ( ! meshCoreObj . intelamt ) { meshCoreObj . intelamt = { } ; } meshCoreObj . intelamt . microlms = v ; meshCoreObjChanged ( ) ; } ) ; // 0 = Disabled, 1 = Connecting, 2 = Connected
amt . onStateChange = function ( state ) { if ( state == 2 ) { sendPeriodicServerUpdate ( 1 ) ; } } // MEI State
amt . reset ( ) ;
2018-12-31 00:32:40 +03:00
}
2021-01-25 02:19:29 +03:00
}
} ) ;
2017-08-28 22:48:53 +03:00
}
2021-01-25 02:19:29 +03:00
} catch ( e ) { sendConsoleText ( "ex1: " + e ) ; }
// Try to load up the WIFI scanner
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
var wifiScannerLib = require ( 'wifi-scanner' ) ;
wifiScanner = new wifiScannerLib ( ) ;
wifiScanner . on ( 'accessPoint' , function ( data ) { sendConsoleText ( "wifiScanner: " + data ) ; } ) ;
} catch ( e ) { wifiScannerLib = null ; wifiScanner = null ; }
// Get our location (lat/long) using our public IP address
var getIpLocationDataExInProgress = false ;
var getIpLocationDataExCounts = [ 0 , 0 ] ;
2021-01-25 08:51:22 +03:00
function getIpLocationDataEx ( func ) {
2021-01-25 02:19:29 +03:00
if ( getIpLocationDataExInProgress == true ) { return false ; }
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
getIpLocationDataExInProgress = true ;
getIpLocationDataExCounts [ 0 ] ++ ;
var options = http . parseUri ( "http://ipinfo.io/json" ) ;
options . method = 'GET' ;
2021-01-25 08:51:22 +03:00
http . request ( options , function ( resp ) {
if ( resp . statusCode == 200 ) {
2021-01-25 02:19:29 +03:00
var geoData = '' ;
resp . data = function ( geoipdata ) { geoData += geoipdata ; } ;
2021-01-25 08:51:22 +03:00
resp . end = function ( ) {
2021-01-25 02:19:29 +03:00
var location = null ;
2021-01-25 08:51:22 +03:00
try {
if ( typeof geoData == 'string' ) {
2021-01-25 02:19:29 +03:00
var result = JSON . parse ( geoData ) ;
if ( result . ip && result . loc ) { location = result ; }
}
} catch ( e ) { }
if ( func ) { getIpLocationDataExCounts [ 1 ] ++ ; func ( location ) ; }
}
} else
{ func ( null ) ; }
getIpLocationDataExInProgress = false ;
} ) . end ( ) ;
return true ;
2017-08-28 22:48:53 +03:00
}
2021-01-25 02:19:29 +03:00
catch ( e ) { return false ; }
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Remove all Gateway MAC addresses for interface list. This is useful because the gateway MAC is not always populated reliably.
2021-01-25 08:51:22 +03:00
function clearGatewayMac ( str ) {
2021-02-03 01:08:30 +03:00
if ( typeof str != 'string' ) return null ;
2021-01-25 02:19:29 +03:00
var x = JSON . parse ( str ) ;
2021-02-03 01:08:30 +03:00
for ( var i in x . netif ) { try { if ( x . netif [ i ] . gatewaymac ) { delete x . netif [ i ] . gatewaymac } } catch ( ex ) { } }
2021-01-25 02:19:29 +03:00
return JSON . stringify ( x ) ;
}
2021-01-25 08:51:22 +03:00
function getIpLocationData ( func ) {
2021-01-25 02:19:29 +03:00
// Get the location information for the cache if possible
var publicLocationInfo = db . Get ( 'publicLocationInfo' ) ;
if ( publicLocationInfo != null ) { publicLocationInfo = JSON . parse ( publicLocationInfo ) ; }
2021-01-25 08:51:22 +03:00
if ( publicLocationInfo == null ) {
2021-01-25 02:19:29 +03:00
// Nothing in the cache, fetch the data
2021-01-25 08:51:22 +03:00
getIpLocationDataEx ( function ( locationData ) {
if ( locationData != null ) {
2021-01-25 02:19:29 +03:00
publicLocationInfo = { } ;
publicLocationInfo . netInfoStr = lastNetworkInfo ;
publicLocationInfo . locationData = locationData ;
var x = db . Put ( 'publicLocationInfo' , JSON . stringify ( publicLocationInfo ) ) ; // Save to database
if ( func ) func ( locationData ) ; // Report the new location
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
if ( func ) func ( null ) ; // Report no location
}
} ) ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
// Check the cache
2021-01-25 08:51:22 +03:00
if ( clearGatewayMac ( publicLocationInfo . netInfoStr ) == clearGatewayMac ( lastNetworkInfo ) ) {
2021-01-25 02:19:29 +03:00
// Cache match
if ( func ) func ( publicLocationInfo . locationData ) ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
// Cache mismatch
2021-01-25 08:51:22 +03:00
getIpLocationDataEx ( function ( locationData ) {
if ( locationData != null ) {
2017-09-02 03:34:02 +03:00
publicLocationInfo = { } ;
publicLocationInfo . netInfoStr = lastNetworkInfo ;
publicLocationInfo . locationData = locationData ;
var x = db . Put ( 'publicLocationInfo' , JSON . stringify ( publicLocationInfo ) ) ; // Save to database
if ( func ) func ( locationData ) ; // Report the new location
2021-01-25 02:19:29 +03:00
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
if ( func ) func ( publicLocationInfo . locationData ) ; // Can't get new location, report the old location
2017-09-02 03:34:02 +03:00
}
2017-08-28 22:48:53 +03:00
} ) ;
}
}
2021-01-25 02:19:29 +03:00
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Polyfill String.endsWith
2021-01-25 08:51:22 +03:00
if ( ! String . prototype . endsWith ) {
String . prototype . endsWith = function ( searchString , position ) {
2021-01-25 02:19:29 +03:00
var subjectString = this . toString ( ) ;
if ( typeof position !== 'number' || ! isFinite ( position ) || Math . floor ( position ) !== position || position > subjectString . length ) { position = subjectString . length ; }
position -= searchString . length ;
var lastIndex = subjectString . lastIndexOf ( searchString , position ) ;
return lastIndex !== - 1 && lastIndex === position ;
} ;
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Polyfill path.join
obj . path =
{
2021-01-25 08:51:22 +03:00
join : function ( ) {
2017-08-28 19:27:45 +03:00
var x = [ ] ;
2021-01-25 08:51:22 +03:00
for ( var i in arguments ) {
2017-08-28 19:27:45 +03:00
var w = arguments [ i ] ;
2021-01-25 08:51:22 +03:00
if ( w != null ) {
2017-08-28 19:27:45 +03:00
while ( w . endsWith ( '/' ) || w . endsWith ( '\\' ) ) { w = w . substring ( 0 , w . length - 1 ) ; }
2021-01-25 08:51:22 +03:00
if ( i != 0 ) {
2017-10-24 00:09:58 +03:00
while ( w . startsWith ( '/' ) || w . startsWith ( '\\' ) ) { w = w . substring ( 1 ) ; }
}
2017-08-28 19:27:45 +03:00
x . push ( w ) ;
}
}
if ( x . length == 0 ) return '/' ;
return x . join ( '/' ) ;
}
} ;
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Replace a string with a number if the string is an exact number
function toNumberIfNumber ( x ) { if ( ( typeof x == 'string' ) && ( + parseInt ( x ) === x ) ) { x = parseInt ( x ) ; } return x ; }
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Convert decimal to hex
function char2hex ( i ) { return ( i + 0x100 ) . toString ( 16 ) . substr ( - 2 ) . toUpperCase ( ) ; }
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Convert a raw string to a hex string
function rstr2hex ( input ) { var r = '' , i ; for ( i = 0 ; i < input . length ; i ++ ) { r += char2hex ( input . charCodeAt ( i ) ) ; } return r ; }
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Convert a buffer into a string
function buf2rstr ( buf ) { var r = '' ; for ( var i = 0 ; i < buf . length ; i ++ ) { r += String . fromCharCode ( buf [ i ] ) ; } return r ; }
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Convert a hex string to a raw string // TODO: Do this using Buffer(), will be MUCH faster
2021-01-25 08:51:22 +03:00
function hex2rstr ( d ) {
2021-01-25 02:19:29 +03:00
if ( typeof d != "string" || d . length == 0 ) return '' ;
var r = '' , m = ( '' + d ) . match ( /../g ) , t ;
while ( t = m . shift ( ) ) r += String . fromCharCode ( '0x' + t ) ;
return r
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Convert an object to string with all functions
2021-01-25 08:51:22 +03:00
function objToString ( x , p , pad , ret ) {
2021-01-25 02:19:29 +03:00
if ( ret == undefined ) ret = '' ;
if ( p == undefined ) p = 0 ;
if ( x == null ) { return '[null]' ; }
if ( p > 8 ) { return '[...]' ; }
if ( x == undefined ) { return '[undefined]' ; }
if ( typeof x == 'string' ) { if ( p == 0 ) return x ; return '"' + x + '"' ; }
if ( typeof x == 'buffer' ) { return '[buffer]' ; }
if ( typeof x != 'object' ) { return x ; }
var r = '{' + ( ret ? '\r\n' : ' ' ) ;
for ( var i in x ) { if ( i != '_ObjectID' ) { r += ( addPad ( p + 2 , pad ) + i + ': ' + objToString ( x [ i ] , p + 2 , pad , ret ) + ( ret ? '\r\n' : ' ' ) ) ; } }
return r + addPad ( p , pad ) + '}' ;
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Return p number of spaces
function addPad ( p , ret ) { var r = '' ; for ( var i = 0 ; i < p ; i ++ ) { r += ret ; } return r ; }
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Split a string taking into account the quoats. Used for command line parsing
2021-01-25 08:51:22 +03:00
function splitArgs ( str ) {
2021-01-25 02:19:29 +03:00
var myArray = [ ] , myRegexp = /[^\s"]+|"([^"]*)"/gi ;
do { var match = myRegexp . exec ( str ) ; if ( match != null ) { myArray . push ( match [ 1 ] ? match [ 1 ] : match [ 0 ] ) ; } } while ( match != null ) ;
return myArray ;
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Parse arguments string array into an object
2021-01-25 08:51:22 +03:00
function parseArgs ( argv ) {
2021-01-25 02:19:29 +03:00
var results = { '_' : [ ] } , current = null ;
2021-01-25 08:51:22 +03:00
for ( var i = 1 , len = argv . length ; i < len ; i ++ ) {
2021-01-25 02:19:29 +03:00
var x = argv [ i ] ;
2021-01-25 08:51:22 +03:00
if ( x . length > 2 && x [ 0 ] == '-' && x [ 1 ] == '-' ) {
2021-01-25 02:19:29 +03:00
if ( current != null ) { results [ current ] = true ; }
current = x . substring ( 2 ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
if ( current != null ) { results [ current ] = toNumberIfNumber ( x ) ; current = null ; } else { results [ '_' ] . push ( toNumberIfNumber ( x ) ) ; }
2017-08-28 19:27:45 +03:00
}
}
2021-01-25 02:19:29 +03:00
if ( current != null ) { results [ current ] = true ; }
return results ;
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Get server target url with a custom path
2021-01-25 08:51:22 +03:00
function getServerTargetUrl ( path ) {
2021-01-25 02:19:29 +03:00
var x = mesh . ServerUrl ;
//sendConsoleText("mesh.ServerUrl: " + mesh.ServerUrl);
if ( x == null ) { return null ; }
if ( path == null ) { path = '' ; }
x = http . parseUri ( x ) ;
if ( x == null ) return null ;
return x . protocol + '//' + x . host + ':' + x . port + '/' + path ;
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Get server url. If the url starts with "*/..." change it, it not use the url as is.
2021-01-25 08:51:22 +03:00
function getServerTargetUrlEx ( url ) {
2021-01-25 02:19:29 +03:00
if ( url . substring ( 0 , 2 ) == '*/' ) { return getServerTargetUrl ( url . substring ( 2 ) ) ; }
return url ;
}
2019-10-10 21:13:25 +03:00
2021-04-24 20:53:13 +03:00
function sendWakeOnLanEx _interval ( ) {
2021-04-24 20:20:35 +03:00
var t = require ( 'MeshAgent' ) . wakesockets ;
2021-04-24 20:53:13 +03:00
if ( t . list . length == 0 ) {
2021-04-24 20:20:35 +03:00
clearInterval ( t ) ;
2021-04-24 20:53:13 +03:00
delete require ( 'MeshAgent' ) . wakesockets ;
2021-04-24 20:20:35 +03:00
return ;
}
var mac = t . list . shift ( ) . split ( ':' ) . join ( '' )
var magic = 'FFFFFFFFFFFF' ;
for ( var x = 1 ; x <= 16 ; ++ x ) { magic += mac ; }
var magicbin = Buffer . from ( magic , 'hex' ) ;
2021-01-25 02:19:29 +03:00
2021-04-24 20:53:13 +03:00
for ( var i in t . sockets ) {
2021-04-24 20:20:35 +03:00
t . sockets [ i ] . send ( magicbin , 7 , '255.255.255.255' ) ;
//sendConsoleText('Sending wake packet on ' + JSON.stringify(t.sockets[i].address()));
}
}
2021-04-24 20:53:13 +03:00
function sendWakeOnLanEx ( hexMacList ) {
2021-04-24 20:20:35 +03:00
var ret = 0 ;
2021-04-24 20:53:13 +03:00
if ( require ( 'MeshAgent' ) . wakesockets == null ) {
2021-04-24 20:20:35 +03:00
// Create a new interval timer
require ( 'MeshAgent' ) . wakesockets = setInterval ( sendWakeOnLanEx _interval , 10 ) ;
require ( 'MeshAgent' ) . wakesockets . sockets = [ ] ;
require ( 'MeshAgent' ) . wakesockets . list = hexMacList ;
var interfaces = require ( 'os' ) . networkInterfaces ( ) ;
2021-04-24 20:53:13 +03:00
for ( var adapter in interfaces ) {
if ( interfaces . hasOwnProperty ( adapter ) ) {
for ( var i = 0 ; i < interfaces [ adapter ] . length ; ++ i ) {
2021-01-25 02:19:29 +03:00
var addr = interfaces [ adapter ] [ i ] ;
2021-04-24 20:53:13 +03:00
if ( ( addr . family == 'IPv4' ) && ( addr . mac != '00:00:00:00:00:00' ) ) {
try {
2021-01-25 02:19:29 +03:00
var socket = require ( 'dgram' ) . createSocket ( { type : 'udp4' } ) ;
socket . bind ( { address : addr . address } ) ;
socket . setBroadcast ( true ) ;
socket . setMulticastInterface ( addr . address ) ;
socket . setMulticastTTL ( 1 ) ;
2021-04-24 20:20:35 +03:00
socket . descriptorMetadata = 'WoL (' + addr . address + ')' ;
require ( 'MeshAgent' ) . wakesockets . sockets . push ( socket ) ;
++ ret ;
2017-09-21 00:44:22 +03:00
}
2021-01-25 02:19:29 +03:00
catch ( e ) { }
2017-09-21 00:44:22 +03:00
}
}
}
2021-01-25 02:19:29 +03:00
}
2021-04-24 20:20:35 +03:00
}
2021-04-24 20:53:13 +03:00
else {
2021-04-24 20:20:35 +03:00
// Append to an existing interval timer
2021-04-24 20:53:13 +03:00
for ( var i in hexMacList ) {
2021-04-24 20:20:35 +03:00
require ( 'MeshAgent' ) . wakesockets . list . push ( hexMacList [ i ] ) ;
}
ret = require ( 'MeshAgent' ) . wakesockets . sockets . length ;
}
return ( ret ) ;
2021-01-25 02:19:29 +03:00
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Handle a mesh agent command
2021-01-25 08:51:22 +03:00
function handleServerCommand ( data ) {
if ( typeof data == 'object' ) {
2021-01-25 02:19:29 +03:00
// If this is a console command, parse it and call the console handler
2021-01-25 08:51:22 +03:00
switch ( data . action ) {
2021-01-25 02:19:29 +03:00
case 'agentupdate' :
agentUpdate _Start ( data . url , { hash : data . hash , tlshash : data . servertlshash , sessionid : data . sessionid } ) ;
break ;
case 'msg' : {
2021-01-25 08:51:22 +03:00
switch ( data . type ) {
2021-01-25 02:19:29 +03:00
case 'console' : { // Process a console command
2021-01-25 08:51:22 +03:00
if ( data . value && data . sessionid ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 17 , [ data . value ] , "Processing console command: " + data . value , data ) ;
var args = splitArgs ( data . value ) ;
processConsoleCommand ( args [ 0 ] . toLowerCase ( ) , parseArgs ( args ) , data . rights , data . sessionid ) ;
2017-08-28 22:48:53 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'tunnel' : {
2021-01-25 08:51:22 +03:00
if ( data . value != null ) { // Process a new tunnel connection request
2021-01-25 02:19:29 +03:00
// Create a new tunnel object
var xurl = getServerTargetUrlEx ( data . value ) ;
2021-01-25 08:51:22 +03:00
if ( xurl != null ) {
2021-01-25 02:19:29 +03:00
xurl = xurl . split ( '$' ) . join ( '%24' ) . split ( '@' ) . join ( '%40' ) ; // Escape the $ and @ characters
var woptions = http . parseUri ( xurl ) ;
woptions . perMessageDeflate = false ;
if ( typeof data . perMessageDeflate == 'boolean' ) { woptions . perMessageDeflate = data . perMessageDeflate ; }
// Perform manual server TLS certificate checking based on the certificate hash given by the server.
woptions . rejectUnauthorized = 0 ;
2021-06-08 10:11:17 +03:00
woptions . checkServerIdentity = function checkServerIdentity ( certs )
{
2021-02-04 08:48:54 +03:00
/ *
try { sendConsoleText ( "certs[0].digest: " + certs [ 0 ] . digest ) ; } catch ( ex ) { sendConsoleText ( ex ) ; }
try { sendConsoleText ( "certs[0].fingerprint: " + certs [ 0 ] . fingerprint ) ; } catch ( ex ) { sendConsoleText ( ex ) ; }
try { sendConsoleText ( "control-digest: " + require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate . digest ) ; } catch ( ex ) { sendConsoleText ( ex ) ; }
try { sendConsoleText ( "control-fingerprint: " + require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate . fingerprint ) ; } catch ( ex ) { sendConsoleText ( ex ) ; }
* /
2021-06-09 23:43:11 +03:00
// Check if this is an old agent, no certificate checks are possible in this situation. Display a warning.
if ( ( require ( 'MeshAgent' ) . ServerInfo == null ) || ( require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate == null ) || ( certs [ 0 ] . digest == null ) ) { sendAgentMessage ( "This agent is using insecure tunnels, consider updating." , 3 , 119 , true ) ; return ; }
2021-01-25 02:19:29 +03:00
// If the tunnel certificate matches the control channel certificate, accept the connection
2021-06-09 23:43:11 +03:00
if ( require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate . digest == certs [ 0 ] . digest ) return ; // Control channel certificate matches using full cert hash
if ( ( certs [ 0 ] . fingerprint != null ) && ( require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate . fingerprint == certs [ 0 ] . fingerprint ) ) return ; // Control channel certificate matches using public key hash
2021-06-08 10:11:17 +03:00
2021-01-25 02:19:29 +03:00
// Check that the certificate is the one expected by the server, fail if not.
if ( ( checkServerIdentity . servertlshash != null ) && ( checkServerIdentity . servertlshash . toLowerCase ( ) != certs [ 0 ] . digest . split ( ':' ) . join ( '' ) . toLowerCase ( ) ) ) { throw new Error ( 'BadCert' ) }
2018-04-11 23:49:05 +03:00
}
2021-01-25 02:19:29 +03:00
woptions . checkServerIdentity . servertlshash = data . servertlshash ;
//sendConsoleText(JSON.stringify(woptions));
//sendConsoleText('TUNNEL: ' + JSON.stringify(data));
var tunnel = http . request ( woptions ) ;
tunnel . upgrade = onTunnelUpgrade ;
tunnel . on ( 'error' , function ( e ) { sendConsoleText ( "ERROR: Unable to connect relay tunnel to: " + this . url + ", " + JSON . stringify ( e ) ) ; } ) ;
tunnel . sessionid = data . sessionid ;
tunnel . rights = data . rights ;
tunnel . consent = data . consent ;
2021-06-11 08:54:53 +03:00
if ( global . _MSH && _MSH ( ) . LocalConsent != null ) { tunnel . consent |= parseInt ( _MSH ( ) . LocalConsent ) ; }
2021-01-25 02:19:29 +03:00
tunnel . privacybartext = data . privacybartext ? data . privacybartext : "Sharing desktop with: {0}" ;
tunnel . username = data . username + ( data . guestname ? ( ' - ' + data . guestname ) : '' ) ;
tunnel . realname = ( data . realname ? data . realname : data . username ) + ( data . guestname ? ( ' - ' + data . guestname ) : '' ) ;
tunnel . userid = data . userid ;
tunnel . remoteaddr = data . remoteaddr ;
tunnel . state = 0 ;
tunnel . url = xurl ;
tunnel . protocol = 0 ;
tunnel . soptions = data . soptions ;
tunnel . tcpaddr = data . tcpaddr ;
tunnel . tcpport = data . tcpport ;
tunnel . udpaddr = data . udpaddr ;
tunnel . udpport = data . udpport ;
tunnel . end ( ) ;
// Put the tunnel in the tunnels list
var index = nextTunnelIndex ++ ;
tunnel . index = index ;
tunnels [ index ] = tunnel ;
//sendConsoleText('New tunnel connection #' + index + ': ' + tunnel.url + ', rights: ' + tunnel.rights, data.sessionid);
2018-04-11 23:49:05 +03:00
}
2018-12-08 03:36:27 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'messagebox' : {
// Display a message box
2021-01-25 08:51:22 +03:00
if ( data . title && data . msg ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 18 , [ data . title , data . msg ] , "Displaying message box, title=" + data . title + ", message=" + data . msg , data ) ;
2021-03-19 14:12:45 +03:00
try { require ( 'message-box' ) . create ( data . title , data . msg , 120 ) . then ( function ( ) { } ) . catch ( function ( ) { } ) ; } catch ( e ) { }
2019-08-01 02:49:23 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'ps' : {
// Return the list of running processes
2021-01-25 08:51:22 +03:00
if ( data . sessionid ) {
processManager . getProcesses ( function ( plist ) {
2021-01-25 02:19:29 +03:00
mesh . SendCommand ( { action : 'msg' , type : 'ps' , value : JSON . stringify ( plist ) , sessionid : data . sessionid } ) ;
} ) ;
2019-08-01 02:49:23 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
2021-06-14 00:52:59 +03:00
case 'psinfo' : {
// Requestion details information about a process
if ( data . pid ) {
var info = { } ; // TODO: Replace with real data. Feel free not to give all values if not available.
2021-06-14 22:37:26 +03:00
/ *
info . processUser = "User" ; // String
info . processDomain = "Domain" ; // String
info . cmd = "abc" ; // String
2021-06-14 00:52:59 +03:00
info . processName = "dummydata" ;
2021-06-14 22:37:26 +03:00
info . privateMemorySize = 123 ; // Bytes
info . virtualMemorySize = 123 ; // Bytes
info . workingSet = 123 ; // Bytes
2021-06-14 00:52:59 +03:00
info . totalProcessorTime = 123 ; // Seconds
info . userProcessorTime = 123 ; // Seconds
info . startTime = "2012-12-30T23:59:59.000Z" ; // Time in UTC ISO format
2021-06-14 22:37:26 +03:00
info . sessionId = 123 ; // Number
2021-06-14 00:52:59 +03:00
info . privilegedProcessorTime = 123 ; // Seconds
2021-06-14 22:37:26 +03:00
info . PriorityBoostEnabled = true ; // Boolean
info . peakWorkingSet = 123 ; // Bytes
info . peakVirtualMemorySize = 123 ; // Bytes
info . peakPagedMemorySize = 123 ; // Bytes
info . pagedSystemMemorySize = 123 ; // Bytes
info . pagedMemorySize = 123 ; // Bytes
info . nonpagedSystemMemorySize = 123 ; // Bytes
info . mainWindowTitle = "dummydata" ; // String
2021-06-14 00:52:59 +03:00
info . machineName = "dummydata" ; // Only set this if machine name is not "."
2021-06-14 22:37:26 +03:00
info . handleCount = 123 ; // Number
* /
2021-06-14 00:52:59 +03:00
mesh . SendCommand ( { action : 'msg' , type : 'psinfo' , pid : data . pid , sessionid : data . sessionid , value : info } ) ;
}
break ;
}
2021-01-25 02:19:29 +03:00
case 'pskill' : {
// Kill a process
2021-01-25 08:51:22 +03:00
if ( data . value ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 19 , [ data . value ] , "Killing process " + data . value , data ) ;
try { process . kill ( data . value ) ; } catch ( e ) { sendConsoleText ( "pskill: " + JSON . stringify ( e ) ) ; }
2019-08-01 02:49:23 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'services' : {
// Return the list of installed services
var services = null ;
try { services = require ( 'service-manager' ) . manager . enumerateService ( ) ; } catch ( e ) { }
if ( services != null ) { mesh . SendCommand ( { action : 'msg' , type : 'services' , value : JSON . stringify ( services ) , sessionid : data . sessionid } ) ; }
break ;
}
case 'serviceStop' : {
// Stop a service
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
var service = require ( 'service-manager' ) . manager . getService ( data . serviceName ) ;
if ( service != null ) { service . stop ( ) ; }
} catch ( e ) { }
break ;
}
case 'serviceStart' : {
// Start a service
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
var service = require ( 'service-manager' ) . manager . getService ( data . serviceName ) ;
if ( service != null ) { service . start ( ) ; }
} catch ( e ) { }
break ;
}
case 'serviceRestart' : {
// Restart a service
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
var service = require ( 'service-manager' ) . manager . getService ( data . serviceName ) ;
if ( service != null ) { service . restart ( ) ; }
} catch ( e ) { }
break ;
}
case 'deskBackground' :
{
// Toggle desktop background
2021-01-25 08:51:22 +03:00
try {
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
var stype = require ( 'user-sessions' ) . getProcessOwnerName ( process . pid ) . tsid == 0 ? 1 : 0 ;
var sid = undefined ;
2021-01-25 08:51:22 +03:00
if ( stype == 1 ) {
if ( require ( 'MeshAgent' ) . _tsid != null ) {
2021-01-25 02:19:29 +03:00
stype = 5 ;
sid = require ( 'MeshAgent' ) . _tsid ;
2019-12-10 21:24:10 +03:00
}
}
2021-01-25 02:19:29 +03:00
var id = require ( 'user-sessions' ) . getProcessOwnerName ( process . pid ) . tsid == 0 ? 1 : 0 ;
var child = require ( 'child_process' ) . execFile ( process . execPath , [ process . execPath . split ( '\\' ) . pop ( ) , '-b64exec' , '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' ] , { type : stype , uid : sid } ) ;
child . stdout . str = '' ; child . stdout . on ( 'data' , function ( c ) { this . str += c . toString ( ) ; } ) ;
child . stderr . on ( 'data' , function ( ) { } ) ;
child . waitExit ( ) ;
var current = child . stdout . str . trim ( ) ;
if ( current != '' ) { require ( 'MeshAgent' ) . _wallpaper = current ; }
child = require ( 'child_process' ) . execFile ( process . execPath , [ process . execPath . split ( '\\' ) . pop ( ) , '-b64exec' , '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' , current != '' ? '""' : require ( 'MeshAgent' ) . _wallpaper ] , { type : stype , uid : sid } ) ;
child . stdout . str = '' ; child . stdout . on ( 'data' , function ( c ) { this . str += c . toString ( ) ; } ) ;
child . stderr . on ( 'data' , function ( ) { } ) ;
child . waitExit ( ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
var id = require ( 'user-sessions' ) . consoleUid ( ) ;
var current = require ( 'linux-gnome-helpers' ) . getDesktopWallpaper ( id ) ;
if ( current != '/dev/null' ) { require ( 'MeshAgent' ) . _wallpaper = current ; }
require ( 'linux-gnome-helpers' ) . setDesktopWallpaper ( id , current != '/dev/null' ? undefined : require ( 'MeshAgent' ) . _wallpaper ) ;
2019-11-28 23:27:44 +03:00
}
2021-01-25 08:51:22 +03:00
} catch ( e ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( e ) ;
2019-03-15 23:55:53 +03:00
}
2019-02-17 08:16:39 +03:00
break ;
}
2021-01-25 02:19:29 +03:00
case 'openUrl' : {
// Open a local web browser and return success/fail
MeshServerLogEx ( 20 , [ data . url ] , "Opening: " + data . url , data ) ;
sendConsoleText ( "OpenURL: " + data . url ) ;
if ( data . url ) { mesh . SendCommand ( { action : 'msg' , type : 'openUrl' , url : data . url , sessionid : data . sessionid , success : ( openUserDesktopUrl ( data . url ) != null ) } ) ; }
break ;
}
case 'getclip' : {
// Send the load clipboard back to the user
//sendConsoleText('getClip: ' + JSON.stringify(data));
2021-01-25 08:51:22 +03:00
if ( require ( 'MeshAgent' ) . isService ) {
require ( 'clipboard' ) . dispatchRead ( ) . then ( function ( str ) {
if ( str ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 21 , [ str . length ] , "Getting clipboard content, " + str . length + " byte(s)" , data ) ;
mesh . SendCommand ( { action : 'msg' , type : 'getclip' , sessionid : data . sessionid , data : str , tag : data . tag } ) ;
}
} ) ;
2021-01-25 08:51:22 +03:00
} else {
require ( "clipboard" ) . read ( ) . then ( function ( str ) {
if ( str ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 21 , [ str . length ] , "Getting clipboard content, " + str . length + " byte(s)" , data ) ;
mesh . SendCommand ( { action : 'msg' , type : 'getclip' , sessionid : data . sessionid , data : str , tag : data . tag } ) ;
}
} ) ;
2019-02-17 08:16:39 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'setclip' : {
// Set the load clipboard to a user value
2021-05-11 09:43:48 +03:00
if ( typeof data . data == 'string' )
{
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 22 , [ data . data . length ] , "Setting clipboard content, " + data . data . length + " byte(s)" , data ) ;
2021-05-11 09:43:48 +03:00
if ( require ( 'MeshAgent' ) . isService )
{
if ( process . platform != 'win32' )
{
2021-02-28 03:19:13 +03:00
require ( 'clipboard' ) . dispatchWrite ( data . data ) ;
}
2021-05-11 09:43:48 +03:00
else
{
var clipargs = data . data ;
2021-04-19 20:55:09 +03:00
var uid = require ( 'user-sessions' ) . consoleUid ( ) ;
2021-05-11 09:43:48 +03:00
var user = require ( 'user-sessions' ) . getUsername ( uid ) ;
2021-04-19 20:55:09 +03:00
var domain = require ( 'user-sessions' ) . getDomain ( uid ) ;
2021-05-11 09:43:48 +03:00
user = ( domain + '\\' + user ) ;
this . _dispatcher = require ( 'win-dispatcher' ) . dispatch ( { user : user , modules : [ { name : 'clip-dispatch' , script : "module.exports = { dispatch: function dispatch(val) { require('clipboard')(val); process.exit(); } };" } ] , launch : { module : 'clip-dispatch' , method : 'dispatch' , args : [ clipargs ] } } ) ;
this . _dispatcher . parent = this ;
//require('events').setFinalizerMetadata.call(this._dispatcher, 'clip-dispatch');
this . _dispatcher . on ( 'connection' , function ( c )
{
this . _c = c ;
this . _c . root = this . parent ;
this . _c . on ( 'end' , function ( )
{
this . root . _dispatcher = null ;
this . root = null ;
} ) ;
} ) ;
2021-02-28 03:19:13 +03:00
}
}
2021-05-11 09:43:48 +03:00
else
{
2021-02-28 03:19:13 +03:00
require ( "clipboard" ) ( data . data ) ;
} // Set the clipboard
2021-01-25 02:19:29 +03:00
mesh . SendCommand ( { action : 'msg' , type : 'setclip' , sessionid : data . sessionid , success : true } ) ;
2019-12-13 04:45:42 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
case 'userSessions' : {
// Send back current user sessions list, this is Windows only.
//sendConsoleText('userSessions: ' + JSON.stringify(data));
if ( process . platform != 'win32' ) break ;
var p = require ( 'user-sessions' ) . enumerateUsers ( ) ;
p . sessionid = data . sessionid ;
p . then ( function ( u ) { mesh . SendCommand ( { action : 'msg' , type : 'userSessions' , sessionid : data . sessionid , data : u , tag : data . tag } ) ; } ) ;
break ;
2019-07-30 02:35:48 +03:00
}
2021-01-25 02:19:29 +03:00
case 'cpuinfo' :
// CPU & memory utilization
var cpuuse = require ( 'sysinfo' ) . cpuUtilization ( ) ;
cpuuse . sessionid = data . sessionid ;
cpuuse . tag = data . tag ;
2021-01-25 08:51:22 +03:00
cpuuse . then ( function ( data ) {
2021-01-25 02:19:29 +03:00
mesh . SendCommand ( JSON . stringify (
{
action : 'msg' ,
type : 'cpuinfo' ,
cpu : data ,
memory : require ( 'sysinfo' ) . memUtilization ( ) ,
thermals : require ( 'sysinfo' ) . thermals == null ? [ ] : require ( 'sysinfo' ) . thermals ( ) ,
sessionid : this . sessionid ,
tag : this . tag
} ) ) ;
} , function ( ex ) { } ) ;
break ;
case 'localapp' :
// Send a message to a local application
sendConsoleText ( 'localappMsg: ' + data . appid + ', ' + JSON . stringify ( data . value ) ) ;
if ( data . appid != null ) { sendToRegisteredApp ( data . appid , data . value ) ; } else { broadcastToRegisteredApps ( data . value ) ; }
break ;
default :
// Unknown action, ignore it.
break ;
2019-06-20 03:16:50 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'acmactivate' : {
2021-01-25 08:51:22 +03:00
if ( amt != null ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 23 , null , "Attempting Intel AMT ACM mode activation" , data ) ;
amt . setAcmResponse ( data ) ;
2017-08-28 22:48:53 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'wakeonlan' : {
// Send wake-on-lan on all interfaces for all MAC addresses in data.macs array. The array is a list of HEX MAC addresses.
//sendConsoleText("Server requesting wake-on-lan for: " + data.macs.join(', '));
2021-04-24 20:20:35 +03:00
sendWakeOnLanEx ( data . macs ) ;
2021-04-24 20:34:29 +03:00
sendWakeOnLanEx ( data . macs ) ;
sendWakeOnLanEx ( data . macs ) ;
2021-01-25 02:19:29 +03:00
break ;
}
case 'runcommands' : {
if ( mesh . cmdchild != null ) { sendConsoleText ( "Run commands can't execute, already busy." ) ; break ; }
sendConsoleText ( "Run commands (" + data . runAsUser + "): " + data . cmds ) ;
2020-09-29 23:20:08 +03:00
2021-01-25 02:19:29 +03:00
// data.runAsUser: 0=Agent,1=UserOrAgent,2=UserOnly
var options = { } ;
2021-01-25 08:51:22 +03:00
if ( data . runAsUser > 0 ) {
2021-01-25 02:19:29 +03:00
try { options . uid = require ( 'user-sessions' ) . consoleUid ( ) ; } catch ( e ) { }
options . type = require ( 'child_process' ) . SpawnTypes . TERM ;
}
2021-01-25 08:51:22 +03:00
if ( data . runAsUser == 2 ) {
2021-01-25 02:19:29 +03:00
if ( options . uid == null ) break ;
if ( ( ( require ( 'user-sessions' ) . minUid != null ) && ( options . uid < require ( 'user-sessions' ) . minUid ( ) ) ) ) break ; // This command can only run as user.
}
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
if ( data . type == 1 ) {
2021-01-25 02:19:29 +03:00
// Windows command shell
mesh . cmdchild = require ( 'child_process' ) . execFile ( process . env [ 'windir' ] + '\\system32\\cmd.exe' , [ 'cmd' ] , options ) ;
2020-07-11 09:12:43 +03:00
mesh . cmdchild . descriptorMetadata = 'UserCommandsShell' ;
mesh . cmdchild . stdout . on ( 'data' , function ( c ) { sendConsoleText ( c . toString ( ) ) ; } ) ;
mesh . cmdchild . stderr . on ( 'data' , function ( c ) { sendConsoleText ( c . toString ( ) ) ; } ) ;
2021-01-25 02:19:29 +03:00
mesh . cmdchild . stdin . write ( data . cmds + '\r\nexit\r\n' ) ;
mesh . cmdchild . on ( 'exit' , function ( ) { sendConsoleText ( "Run commands completed." ) ; delete mesh . cmdchild ; } ) ;
2021-01-25 08:51:22 +03:00
} else if ( data . type == 2 ) {
2021-01-25 02:19:29 +03:00
// Windows Powershell
mesh . cmdchild = require ( 'child_process' ) . execFile ( process . env [ 'windir' ] + '\\System32\\WindowsPowerShell\\v1.0\\powershell.exe' , [ 'powershell' , '-noprofile' , '-nologo' , '-command' , '-' ] , options ) ;
mesh . cmdchild . descriptorMetadata = 'UserCommandsPowerShell' ;
mesh . cmdchild . stdout . on ( 'data' , function ( c ) { sendConsoleText ( c . toString ( ) ) ; } ) ;
mesh . cmdchild . stderr . on ( 'data' , function ( c ) { sendConsoleText ( c . toString ( ) ) ; } ) ;
mesh . cmdchild . stdin . write ( data . cmds + '\r\nexit\r\n' ) ;
2020-07-11 09:12:43 +03:00
mesh . cmdchild . on ( 'exit' , function ( ) { sendConsoleText ( "Run commands completed." ) ; delete mesh . cmdchild ; } ) ;
}
2021-01-25 08:51:22 +03:00
} else if ( data . type == 3 ) {
2021-01-25 02:19:29 +03:00
// Linux shell
mesh . cmdchild = require ( 'child_process' ) . execFile ( '/bin/sh' , [ 'sh' ] , options ) ;
mesh . cmdchild . descriptorMetadata = 'UserCommandsShell' ;
mesh . cmdchild . stdout . on ( 'data' , function ( c ) { sendConsoleText ( c . toString ( ) ) ; } ) ;
mesh . cmdchild . stderr . on ( 'data' , function ( c ) { sendConsoleText ( c . toString ( ) ) ; } ) ;
mesh . cmdchild . stdin . write ( data . cmds . split ( '\r' ) . join ( '' ) + '\nexit\n' ) ;
mesh . cmdchild . on ( 'exit' , function ( ) { sendConsoleText ( "Run commands completed." ) ; delete mesh . cmdchild ; } ) ;
2018-04-20 04:19:15 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'uninstallagent' :
// Uninstall this agent
var agentName = process . platform == 'win32' ? 'Mesh Agent' : 'meshagent' ;
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
agentName = require ( 'MeshAgent' ) . serviceName ;
2018-12-08 03:36:27 +03:00
}
2021-01-25 08:51:22 +03:00
catch ( x ) {
2019-02-08 02:00:10 +03:00
}
2021-01-25 02:19:29 +03:00
2021-01-25 08:51:22 +03:00
if ( require ( 'service-manager' ) . manager . getService ( agentName ) . isMe ( ) ) {
2021-01-25 02:19:29 +03:00
try { diagnosticAgent _uninstall ( ) ; } catch ( e ) { }
var js = "require('service-manager').manager.getService('" + agentName + "').stop(); require('service-manager').manager.uninstallService('" + agentName + "'); process.exit();" ;
this . child = require ( 'child_process' ) . execFile ( process . execPath , [ process . platform == 'win32' ? ( process . execPath . split ( '\\' ) . pop ( ) ) : ( process . execPath . split ( '/' ) . pop ( ) ) , '-b64exec' , Buffer . from ( js ) . toString ( 'base64' ) ] , { type : 4 , detached : true } ) ;
2019-02-08 07:06:01 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
case 'poweraction' : {
// Server telling us to execute a power action
2021-01-25 08:51:22 +03:00
if ( ( mesh . ExecPowerState != undefined ) && ( data . actiontype ) ) {
2021-01-25 02:19:29 +03:00
var forced = 0 ;
if ( data . forced == 1 ) { forced = 1 ; }
data . actiontype = parseInt ( data . actiontype ) ;
MeshServerLogEx ( 25 , [ data . actiontype , forced ] , "Performing power action=" + data . actiontype + ", forced=" + forced , data ) ;
sendConsoleText ( "Performing power action=" + data . actiontype + ", forced=" + forced + '.' ) ;
var r = mesh . ExecPowerState ( data . actiontype , forced ) ;
sendConsoleText ( "ExecPowerState returned code: " + r ) ;
2019-08-07 03:58:29 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'iplocation' : {
// Update the IP location information of this node. Only do this when requested by the server since we have a limited amount of time we can call this per day
getIpLocationData ( function ( location ) { mesh . SendCommand ( { action : 'iplocation' , type : 'publicip' , value : location } ) ; } ) ;
break ;
}
case 'toast' : {
// Display a toast message
2021-01-25 08:51:22 +03:00
if ( data . title && data . msg ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 26 , [ data . title , data . msg ] , "Displaying toast message, title=" + data . title + ", message=" + data . msg , data ) ;
data . msg = data . msg . split ( '\r' ) . join ( '\\r' ) . split ( '\n' ) . join ( '\\n' ) ;
try { require ( 'toaster' ) . Toast ( data . title , data . msg ) ; } catch ( e ) { }
2019-10-10 21:13:25 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'openUrl' : {
// Open a local web browser and return success/fail
//sendConsoleText('OpenURL: ' + data.url);
MeshServerLogEx ( 20 , [ data . url ] , "Opening: " + data . url , data ) ;
if ( data . url ) { mesh . SendCommand ( { action : 'openUrl' , url : data . url , sessionid : data . sessionid , success : ( openUserDesktopUrl ( data . url ) != null ) } ) ; }
break ;
}
case 'amtconfig' : {
// Perform Intel AMT activation and/or configuration
if ( ( apftunnel != null ) || ( amt == null ) || ( typeof data . user != 'string' ) || ( typeof data . pass != 'string' ) ) break ;
2021-01-25 08:51:22 +03:00
amt . getMeiState ( 15 , function ( state ) {
2021-01-25 02:19:29 +03:00
if ( ( apftunnel != null ) || ( amt == null ) ) return ;
if ( ( state == null ) || ( state . ProvisioningState == null ) ) return ;
if ( ( state . UUID == null ) || ( state . UUID . length != 36 ) ) return ; // Bad UUID
var apfarg = {
mpsurl : mesh . ServerUrl . replace ( '/agent.ashx' , '/apf.ashx' ) ,
mpsuser : data . user , // Agent user name
mpspass : data . pass , // Encrypted login cookie
mpskeepalive : 60000 ,
clientname : state . OsHostname ,
clientaddress : '127.0.0.1' ,
clientuuid : state . UUID ,
conntype : 2 , // 0 = CIRA, 1 = Relay, 2 = LMS. The correct value is 2 since we are performing an LMS relay, other values for testing.
meiState : state // MEI state will be passed to MPS server
} ;
addAmtEvent ( 'LMS tunnel start.' ) ;
apftunnel = require ( 'amt-apfclient' ) ( { debug : false } , apfarg ) ;
2021-03-06 04:45:17 +03:00
apftunnel . onJsonControl = handleApfJsonControl ;
2021-01-25 02:19:29 +03:00
apftunnel . onChannelClosed = function ( ) { addAmtEvent ( 'LMS tunnel closed.' ) ; apftunnel = null ; }
try { apftunnel . connect ( ) ; } catch ( ex ) { }
} ) ;
break ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
case 'getScript' : {
// Received a configuration script from the server
sendConsoleText ( 'getScript: ' + JSON . stringify ( data ) ) ;
break ;
2020-11-10 03:51:48 +03:00
}
2021-01-25 02:19:29 +03:00
case 'sysinfo' : {
// Fetch system information
2021-01-25 08:51:22 +03:00
getSystemInformation ( function ( results ) {
2021-01-25 02:19:29 +03:00
if ( ( results != null ) && ( data . hash != results . hash ) ) { mesh . SendCommand ( { action : 'sysinfo' , sessionid : this . sessionid , data : results } ) ; }
} ) ;
break ;
2019-09-24 02:46:26 +03:00
}
2021-01-25 02:19:29 +03:00
case 'ping' : { mesh . SendCommand ( '{"action":"pong"}' ) ; break ; }
case 'pong' : { break ; }
case 'plugin' : {
try { require ( data . plugin ) . consoleaction ( data , data . rights , data . sessionid , this ) ; } catch ( e ) { throw e ; }
break ;
}
case 'coredump' :
2021-03-06 01:58:00 +03:00
// Set the current agent coredump situation.s
2021-01-25 08:51:22 +03:00
if ( data . value === true ) {
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
// TODO: This replace() below is not ideal, would be better to remove the .exe at the end instead of replace.
process . coreDumpLocation = process . execPath . replace ( '.exe' , '.dmp' ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
process . coreDumpLocation = ( process . cwd ( ) != '//' ) ? ( process . cwd ( ) + 'core' ) : null ;
2021-01-20 23:49:15 +03:00
}
2021-01-25 08:51:22 +03:00
} else if ( data . value === false ) {
2021-01-25 02:19:29 +03:00
process . coreDumpLocation = null ;
2021-01-20 23:49:15 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
case 'getcoredump' :
// Ask the agent if a core dump is currently available, if yes, also return the hash of the agent.
var r = { action : 'getcoredump' , value : ( process . coreDumpLocation != null ) } ;
var coreDumpPath = null ;
if ( process . platform == 'win32' ) { coreDumpPath = process . coreDumpLocation ; } else { coreDumpPath = ( process . cwd ( ) != '//' ) ? fs . existsSync ( process . cwd ( ) + 'core' ) : null ; }
2021-01-25 08:51:22 +03:00
if ( ( coreDumpPath != null ) && ( fs . existsSync ( coreDumpPath ) ) ) {
try {
2021-01-25 02:19:29 +03:00
var coredate = fs . statSync ( coreDumpPath ) . mtime ;
var coretime = new Date ( coredate ) . getTime ( ) ;
var agenttime = new Date ( fs . statSync ( process . execPath ) . mtime ) . getTime ( ) ;
if ( coretime > agenttime ) { r . exists = ( db . Get ( 'CoreDumpTime' ) != coredate ) ; }
} catch ( ex ) { }
2017-08-28 19:27:45 +03:00
}
2021-01-25 08:51:22 +03:00
if ( r . exists == true ) {
2021-01-25 02:19:29 +03:00
r . agenthashhex = getSHA384FileHash ( process . execPath ) . toString ( 'hex' ) ; // Hash of current agent
r . corehashhex = getSHA384FileHash ( coreDumpPath ) . toString ( 'hex' ) ; // Hash of core dump file
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
mesh . SendCommand ( JSON . stringify ( r ) ) ;
break ;
case 'meshToolInfo' :
if ( data . pipe == true ) { delete data . pipe ; delete data . action ; data . cmd = 'meshToolInfo' ; broadcastToRegisteredApps ( data ) ; }
2021-04-27 10:53:04 +03:00
if ( data . tag == 'info' ) { sendConsoleText ( JSON . stringify ( data , null , 2 ) ) ; }
if ( data . tag == 'install' ) {
data . func = function ( options , success ) {
sendConsoleText ( 'Download of MeshCentral Assistant ' + ( success ? 'succeed' : 'failed' ) ) ;
if ( success ) {
// TODO: Install & Run
}
}
data . filename = 'MeshAssistant.exe' ;
downloadFile ( data ) ;
}
2021-01-25 02:19:29 +03:00
break ;
2021-05-16 11:25:58 +03:00
case 'getUserImage' :
if ( data . pipe == true ) { delete data . pipe ; delete data . action ; data . cmd = 'getUserImage' ; broadcastToRegisteredApps ( data ) ; }
if ( data . tag == 'info' ) { sendConsoleText ( JSON . stringify ( data , null , 2 ) ) ; }
break ;
2021-01-25 02:19:29 +03:00
case 'wget' : // Server uses this command to tell the agent to download a file using HTTPS/GET and place it in a given path. This is used for one-to-many file uploads.
agentFileHttpPendingRequests . push ( data ) ;
serverFetchFile ( ) ;
break ;
2021-04-18 00:44:19 +03:00
case 'errorlog' : // Return agent error log
try { mesh . SendCommand ( JSON . stringify ( { action : 'errorlog' , log : require ( 'util-agentlog' ) . read ( data . startTime ) } ) ) ; } catch ( ex ) { }
break ;
2021-01-25 02:19:29 +03:00
default :
// Unknown action, ignore it.
break ;
2017-08-28 19:27:45 +03:00
}
}
2021-01-25 02:19:29 +03:00
}
2021-04-27 10:53:04 +03:00
// Download a file from the server and check the hash.
// This download is similar to the one used for meshcore self-update.
var trustedDownloads = { } ;
function downloadFile ( downloadoptions ) {
var options = require ( 'http' ) . parseUri ( downloadoptions . url ) ;
options . rejectUnauthorized = false ;
options . checkServerIdentity = function checkServerIdentity ( certs ) {
// If the tunnel certificate matches the control channel certificate, accept the connection
try { if ( require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate . digest == certs [ 0 ] . digest ) return ; } catch ( ex ) { }
try { if ( require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate . fingerprint == certs [ 0 ] . fingerprint ) return ; } catch ( ex ) { }
// Check that the certificate is the one expected by the server, fail if not.
if ( checkServerIdentity . servertlshash == null ) { if ( require ( 'MeshAgent' ) . ServerInfo == null || require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate == null ) return ; throw new Error ( 'BadCert' ) ; }
if ( certs [ 0 ] . digest == null ) return ;
if ( ( checkServerIdentity . servertlshash != null ) && ( checkServerIdentity . servertlshash . toLowerCase ( ) != certs [ 0 ] . digest . split ( ':' ) . join ( '' ) . toLowerCase ( ) ) ) { throw new Error ( 'BadCert' ) }
}
//options.checkServerIdentity.servertlshash = downloadoptions.serverhash;
trustedDownloads [ downloadoptions . name ] = downloadoptions ;
trustedDownloads [ downloadoptions . name ] . dl = require ( 'https' ) . get ( options ) ;
trustedDownloads [ downloadoptions . name ] . dl . on ( 'error' , function ( e ) { downloadoptions . func ( downloadoptions , false ) ; delete trustedDownloads [ downloadoptions . name ] ; } ) ;
trustedDownloads [ downloadoptions . name ] . dl . on ( 'response' , function ( img ) {
this . _file = require ( 'fs' ) . createWriteStream ( trustedDownloads [ downloadoptions . name ] . filename , { flags : 'wb' } ) ;
this . _filehash = require ( 'SHA384Stream' ) . create ( ) ;
this . _filehash . on ( 'hash' , function ( h ) { if ( ( downloadoptions . hash != null ) && ( downloadoptions . hash . toLowerCase ( ) != h . toString ( 'hex' ) . toLowerCase ( ) ) ) { downloadoptions . func ( downloadoptions , false ) ; delete trustedDownloads [ downloadoptions . name ] ; return ; } downloadoptions . func ( downloadoptions , true ) ; } ) ;
img . pipe ( this . _file ) ;
img . pipe ( this . _filehash ) ;
} ) ;
}
2021-03-06 04:45:17 +03:00
// Handle APF JSON control commands
function handleApfJsonControl ( data ) {
if ( data . action == 'console' ) { addAmtEvent ( data . msg ) ; } // Add console message to AMT event log
if ( data . action == 'mestate' ) { amt . getMeiState ( 15 , function ( state ) { apftunnel . updateMeiState ( state ) ; } ) ; } // Update the MEI state
if ( data . action == 'close' ) { try { apftunnel . disconnect ( ) ; } catch ( e ) { } apftunnel = null ; } // Close the CIRA-LMS connection
if ( amt . amtMei != null ) {
if ( data . action == 'deactivate' ) { // Request CCM deactivation
amt . amtMei . unprovision ( 1 , function ( status ) { if ( apftunnel ) apftunnel . sendMeiDeactivationState ( status ) ; } ) ; // 0 = Success
}
if ( data . action == 'startTlsHostConfig' ) { // Request start of host based TLS ACM activation
amt . amtMei . startConfigurationHBased ( Buffer . from ( data . hash , 'hex' ) , data . hostVpn , data . dnsSuffixList , function ( response ) { apftunnel . sendStartTlsHostConfigResponse ( response ) ; } ) ;
}
if ( data . action == 'stopConfiguration' ) { // Request Intel AMT stop configuration.
amt . amtMei . stopConfiguration ( function ( status ) { apftunnel . sendStopConfigurationResponse ( status ) ; } ) ;
}
}
}
2021-01-25 02:19:29 +03:00
// Agent just get a file from the server and save it locally.
2021-01-25 08:51:22 +03:00
function serverFetchFile ( ) {
2021-01-25 02:19:29 +03:00
if ( ( Object . keys ( agentFileHttpRequests ) . length > 4 ) || ( agentFileHttpPendingRequests . length == 0 ) ) return ; // No more than 4 active HTTPS requests to the server.
var data = agentFileHttpPendingRequests . shift ( ) ;
if ( ( data . overwrite !== true ) && fs . existsSync ( data . path ) ) return ; // Don't overwrite an existing file.
if ( data . createFolder ) { try { fs . mkdirSync ( data . folder ) ; } catch ( ex ) { } } // If requested, create the local folder.
data . url = 'http' + getServerTargetUrlEx ( '*/' ) . substring ( 2 ) ;
var agentFileHttpOptions = http . parseUri ( data . url ) ;
agentFileHttpOptions . path = data . urlpath ;
// Perform manual server TLS certificate checking based on the certificate hash given by the server.
agentFileHttpOptions . rejectUnauthorized = 0 ;
2021-01-25 08:51:22 +03:00
agentFileHttpOptions . checkServerIdentity = function checkServerIdentity ( certs ) {
2021-01-25 02:19:29 +03:00
// If the tunnel certificate matches the control channel certificate, accept the connection
try { if ( require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate . digest == certs [ 0 ] . digest ) return ; } catch ( ex ) { }
try { if ( require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate . fingerprint == certs [ 0 ] . fingerprint ) return ; } catch ( ex ) { }
// Check that the certificate is the one expected by the server, fail if not.
if ( ( checkServerIdentity . servertlshash != null ) && ( checkServerIdentity . servertlshash . toLowerCase ( ) != certs [ 0 ] . digest . split ( ':' ) . join ( '' ) . toLowerCase ( ) ) ) { throw new Error ( 'BadCert' ) }
}
agentFileHttpOptions . checkServerIdentity . servertlshash = data . servertlshash ;
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
if ( agentFileHttpOptions == null ) return ;
var agentFileHttpRequest = http . request ( agentFileHttpOptions ,
2021-01-25 08:51:22 +03:00
function ( response ) {
2021-01-25 02:19:29 +03:00
response . xparent = this ;
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
response . xfile = fs . createWriteStream ( this . xpath , { flags : 'wbN' } )
response . pipe ( response . xfile ) ;
response . end = function ( ) { delete agentFileHttpRequests [ this . xparent . xurlpath ] ; delete this . xparent ; serverFetchFile ( ) ; }
} catch ( ex ) { delete agentFileHttpRequests [ this . xurlpath ] ; delete response . xparent ; serverFetchFile ( ) ; return ; }
2020-02-01 08:35:47 +03:00
}
2021-01-25 02:19:29 +03:00
) ;
2021-06-15 05:12:19 +03:00
agentFileHttpRequest . on ( 'error' , function ( ex ) { sendConsoleText ( ex ) ; delete agentFileHttpRequests [ this . xurlpath ] ; serverFetchFile ( ) ; } ) ;
2021-01-25 02:19:29 +03:00
agentFileHttpRequest . end ( ) ;
agentFileHttpRequest . xurlpath = data . urlpath ;
agentFileHttpRequest . xpath = data . path ;
agentFileHttpRequests [ data . urlpath ] = agentFileHttpRequest ;
}
2020-02-01 08:35:47 +03:00
2021-01-25 02:19:29 +03:00
// Called when a file changed in the file system
/ *
function onFileWatcher ( a , b ) {
console . log ( 'onFileWatcher' , a , b , this . path ) ;
var response = getDirectoryInfo ( this . path ) ;
if ( ( response != undefined ) && ( response != null ) ) { this . tunnel . s . write ( JSON . stringify ( response ) ) ; }
}
* /
2021-01-25 08:51:22 +03:00
function getSystemInformation ( func ) {
2021-04-24 20:53:13 +03:00
try {
2021-01-25 02:19:29 +03:00
var results = { hardware : require ( 'identifiers' ) . get ( ) } ; // Hardware info
2021-02-05 10:24:58 +03:00
2021-01-25 08:51:22 +03:00
if ( results . hardware && results . hardware . windows ) {
2021-01-25 02:19:29 +03:00
// Remove extra entries and things that change quickly
var x = results . hardware . windows . osinfo ;
try { delete x . FreePhysicalMemory ; } catch ( e ) { }
try { delete x . FreeSpaceInPagingFiles ; } catch ( e ) { }
try { delete x . FreeVirtualMemory ; } catch ( e ) { }
try { delete x . LocalDateTime ; } catch ( e ) { }
try { delete x . MaxProcessMemorySize ; } catch ( e ) { }
try { delete x . TotalVirtualMemorySize ; } catch ( e ) { }
try { delete x . TotalVisibleMemorySize ; } catch ( e ) { }
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
if ( results . hardware . windows . memory ) { for ( var i in results . hardware . windows . memory ) { delete results . hardware . windows . memory [ i ] . Node ; } }
if ( results . hardware . windows . osinfo ) { delete results . hardware . windows . osinfo . Node ; }
if ( results . hardware . windows . partitions ) { for ( var i in results . hardware . windows . partitions ) { delete results . hardware . windows . partitions [ i ] . Node ; } }
} catch ( e ) { }
}
2021-01-26 23:08:17 +03:00
results . hardware . agentvers = process . versions ;
2021-04-02 07:51:25 +03:00
var hasher = require ( 'SHA384Stream' ) . create ( ) ;
results . hash = hasher . syncHash ( JSON . stringify ( results ) ) . toString ( 'hex' ) ;
2021-02-09 00:52:22 +03:00
func ( results ) ;
2021-01-25 02:19:29 +03:00
2021-02-09 00:52:22 +03:00
/ *
// On Windows platforms, get volume information - Needs more testing.
2021-02-05 10:24:58 +03:00
if ( process . platform == 'win32' )
{
results . pendingReboot = require ( 'win-info' ) . pendingReboot ( ) ; // Pending reboot
if ( require ( 'identifiers' ) . volumes _promise != null )
{
var p = require ( 'identifiers' ) . volumes _promise ( ) ;
p . then ( function ( res )
{
results . volumes = res ;
2021-04-02 07:51:25 +03:00
results . hash = hasher . syncHash ( JSON . stringify ( results ) ) . toString ( 'hex' ) ;
2021-01-25 02:19:29 +03:00
func ( results ) ;
2021-02-05 10:24:58 +03:00
} ) ;
2020-07-25 00:00:49 +03:00
}
2021-02-05 10:24:58 +03:00
else if ( require ( 'identifiers' ) . volumes != null )
{
results . volumes = require ( 'identifiers' ) . volumes ( ) ;
2021-04-02 07:51:25 +03:00
results . hash = hasher . syncHash ( JSON . stringify ( results ) ) . toString ( 'hex' ) ;
2021-02-05 10:24:58 +03:00
func ( results ) ;
}
else
{
2021-04-02 07:51:25 +03:00
results . hash = hasher . syncHash ( JSON . stringify ( results ) ) . toString ( 'hex' ) ;
2021-02-05 10:24:58 +03:00
func ( results ) ;
}
}
else
{
2021-04-02 07:51:25 +03:00
results . hash = hasher . syncHash ( JSON . stringify ( results ) ) . toString ( 'hex' ) ;
2021-02-05 10:24:58 +03:00
func ( results ) ;
}
2021-02-09 00:52:22 +03:00
* /
2021-01-25 02:19:29 +03:00
} catch ( e ) { func ( null , e ) ; }
}
// Get a formated response for a given directory path
2021-01-25 08:51:22 +03:00
function getDirectoryInfo ( reqpath ) {
2021-01-25 02:19:29 +03:00
var response = { path : reqpath , dir : [ ] } ;
2021-01-25 08:51:22 +03:00
if ( ( ( reqpath == undefined ) || ( reqpath == '' ) ) && ( process . platform == 'win32' ) ) {
2021-01-25 02:19:29 +03:00
// List all the drives in the root, or the root itself
var results = null ;
try { results = fs . readDrivesSync ( ) ; } catch ( e ) { } // TODO: Anyway to get drive total size and free space? Could draw a progress bar.
2021-01-25 08:51:22 +03:00
if ( results != null ) {
for ( var i = 0 ; i < results . length ; ++ i ) {
2021-01-25 02:19:29 +03:00
var drive = { n : results [ i ] . name , t : 1 } ;
if ( results [ i ] . type == 'REMOVABLE' ) { drive . dt = 'removable' ; } // TODO: See if this is USB/CDROM or something else, we can draw icons.
response . dir . push ( drive ) ;
}
}
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
// List all the files and folders in this path
if ( reqpath == '' ) { reqpath = '/' ; }
var results = null , xpath = obj . path . join ( reqpath , '*' ) ;
//if (process.platform == "win32") { xpath = xpath.split('/').join('\\'); }
try { results = fs . readdirSync ( xpath ) ; } catch ( e ) { }
2021-01-25 08:51:22 +03:00
if ( results != null ) {
for ( var i = 0 ; i < results . length ; ++ i ) {
if ( ( results [ i ] != '.' ) && ( results [ i ] != '..' ) ) {
2021-01-25 02:19:29 +03:00
var stat = null , p = obj . path . join ( reqpath , results [ i ] ) ;
//if (process.platform == "win32") { p = p.split('/').join('\\'); }
try { stat = fs . statSync ( p ) ; } catch ( e ) { } // TODO: Get file size/date
2021-01-25 08:51:22 +03:00
if ( ( stat != null ) && ( stat != undefined ) ) {
if ( stat . isDirectory ( ) == true ) {
2021-01-25 02:19:29 +03:00
response . dir . push ( { n : results [ i ] , t : 2 , d : stat . mtime } ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response . dir . push ( { n : results [ i ] , t : 3 , s : stat . size , d : stat . mtime } ) ;
}
}
}
}
2017-10-24 00:09:58 +03:00
}
}
2021-01-25 02:19:29 +03:00
return response ;
}
// Tunnel callback operations
2021-01-25 08:51:22 +03:00
function onTunnelUpgrade ( response , s , head ) {
2021-01-25 02:19:29 +03:00
this . s = s ;
s . httprequest = this ;
s . end = onTunnelClosed ;
s . tunnel = this ;
s . descriptorMetadata = "MeshAgent_relayTunnel" ;
2019-05-05 08:53:57 +03:00
2021-01-25 08:51:22 +03:00
if ( require ( 'MeshAgent' ) . idleTimeout != null ) {
2021-01-25 02:19:29 +03:00
s . setTimeout ( require ( 'MeshAgent' ) . idleTimeout * 1000 ) ;
2021-01-25 08:51:22 +03:00
s . on ( 'timeout' , function ( ) {
2021-01-25 02:19:29 +03:00
this . ping ( ) ;
this . setTimeout ( require ( 'MeshAgent' ) . idleTimeout * 1000 ) ;
} ) ;
2019-05-05 08:53:57 +03:00
}
2021-01-25 02:19:29 +03:00
//sendConsoleText('onTunnelUpgrade - ' + this.tcpport + ' - ' + this.udpport);
2021-01-25 08:51:22 +03:00
if ( this . tcpport != null ) {
2021-01-25 02:19:29 +03:00
// This is a TCP relay connection, pause now and try to connect to the target.
s . pause ( ) ;
s . data = onTcpRelayServerTunnelData ;
var connectionOptions = { port : parseInt ( this . tcpport ) } ;
if ( this . tcpaddr != null ) { connectionOptions . host = this . tcpaddr ; } else { connectionOptions . host = '127.0.0.1' ; }
s . tcprelay = net . createConnection ( connectionOptions , onTcpRelayTargetTunnelConnect ) ;
s . tcprelay . peerindex = this . index ;
// Add the TCP session to the count and update the server
2021-01-25 08:51:22 +03:00
if ( s . httprequest . userid != null ) {
2021-01-25 02:19:29 +03:00
if ( tunnelUserCount . tcp [ s . httprequest . userid ] == null ) { tunnelUserCount . tcp [ s . httprequest . userid ] = 1 ; } else { tunnelUserCount . tcp [ s . httprequest . userid ] ++ ; }
try { mesh . SendCommand ( { action : 'sessions' , type : 'tcp' , value : tunnelUserCount . tcp } ) ; } catch ( e ) { }
broadcastSessionsToRegisteredApps ( ) ;
}
2021-01-25 08:51:22 +03:00
} if ( this . udpport != null ) {
2021-01-25 02:19:29 +03:00
// This is a UDP relay connection, get the UDP socket setup. // TODO: ***************
s . data = onUdpRelayServerTunnelData ;
s . udprelay = require ( 'dgram' ) . createSocket ( { type : 'udp4' } ) ;
s . udprelay . bind ( { port : 0 } ) ;
s . udprelay . peerindex = this . index ;
s . udprelay . on ( 'message' , onUdpRelayTargetTunnelConnect ) ;
s . udprelay . udpport = this . udpport ;
s . udprelay . udpaddr = this . udpaddr ;
s . udprelay . first = true ;
// Add the UDP session to the count and update the server
2021-01-25 08:51:22 +03:00
if ( s . httprequest . userid != null ) {
2021-01-25 02:19:29 +03:00
if ( tunnelUserCount . udp [ s . httprequest . userid ] == null ) { tunnelUserCount . udp [ s . httprequest . userid ] = 1 ; } else { tunnelUserCount . udp [ s . httprequest . userid ] ++ ; }
try { mesh . SendCommand ( { action : 'sessions' , type : 'udp' , value : tunnelUserCount . tcp } ) ; } catch ( e ) { }
broadcastSessionsToRegisteredApps ( ) ;
2019-05-07 04:44:23 +03:00
}
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
// This is a normal connect for KVM/Terminal/Files
s . data = onTunnelData ;
2019-05-05 08:53:57 +03:00
}
2021-01-25 02:19:29 +03:00
}
// Called when UDP relay data is received // TODO****
2021-01-25 08:51:22 +03:00
function onUdpRelayTargetTunnelConnect ( data ) {
2021-01-25 02:19:29 +03:00
var peerTunnel = tunnels [ this . peerindex ] ;
peerTunnel . s . write ( data ) ;
}
2019-05-05 08:53:57 +03:00
2021-01-25 02:19:29 +03:00
// Called when we get data from the server for a TCP relay (We have to skip the first received 'c' and pipe the rest)
2021-01-25 08:51:22 +03:00
function onUdpRelayServerTunnelData ( data ) {
if ( this . udprelay . first === true ) {
2021-01-25 02:19:29 +03:00
delete this . udprelay . first ; // Skip the first 'c' that is received.
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
this . udprelay . send ( data , parseInt ( this . udprelay . udpport ) , this . udprelay . udpaddr ? this . udprelay . udpaddr : '127.0.0.1' ) ;
2017-10-24 00:09:58 +03:00
}
2021-01-25 02:19:29 +03:00
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Called when the TCP relay target is connected
2021-01-25 08:51:22 +03:00
function onTcpRelayTargetTunnelConnect ( ) {
2021-01-25 02:19:29 +03:00
var peerTunnel = tunnels [ this . peerindex ] ;
this . pipe ( peerTunnel . s ) ; // Pipe Target --> Server
peerTunnel . s . first = true ;
peerTunnel . s . resume ( ) ;
}
// Called when we get data from the server for a TCP relay (We have to skip the first received 'c' and pipe the rest)
2021-01-25 08:51:22 +03:00
function onTcpRelayServerTunnelData ( data ) {
if ( this . first == true ) {
2021-01-25 02:19:29 +03:00
this . first = false ;
this . pipe ( this . tcprelay , { dataTypeSkip : 1 } ) ; // Pipe Server --> Target (don't pipe text type websocket frames)
2017-10-24 00:09:58 +03:00
}
2021-01-25 02:19:29 +03:00
}
2019-05-05 08:53:57 +03:00
2021-01-25 08:51:22 +03:00
function onTunnelClosed ( ) {
2021-01-25 02:19:29 +03:00
var tunnel = tunnels [ this . httprequest . index ] ;
if ( tunnel == null ) return ; // Stop duplicate calls.
2020-07-18 05:55:49 +03:00
2021-01-25 02:19:29 +03:00
// If this is a routing session, clean up and send the new session counts.
2021-01-25 08:51:22 +03:00
if ( this . httprequest . userid != null ) {
if ( this . httprequest . tcpport != null ) {
2021-01-25 02:19:29 +03:00
if ( tunnelUserCount . tcp [ this . httprequest . userid ] != null ) { tunnelUserCount . tcp [ this . httprequest . userid ] -- ; if ( tunnelUserCount . tcp [ this . httprequest . userid ] <= 0 ) { delete tunnelUserCount . tcp [ this . httprequest . userid ] ; } }
try { mesh . SendCommand ( { action : 'sessions' , type : 'tcp' , value : tunnelUserCount . tcp } ) ; } catch ( e ) { }
broadcastSessionsToRegisteredApps ( ) ;
2021-01-25 08:51:22 +03:00
} else if ( this . httprequest . udpport != null ) {
2021-01-25 02:19:29 +03:00
if ( tunnelUserCount . udp [ this . httprequest . userid ] != null ) { tunnelUserCount . udp [ this . httprequest . userid ] -- ; if ( tunnelUserCount . udp [ this . httprequest . userid ] <= 0 ) { delete tunnelUserCount . udp [ this . httprequest . userid ] ; } }
try { mesh . SendCommand ( { action : 'sessions' , type : 'udp' , value : tunnelUserCount . udp } ) ; } catch ( e ) { }
broadcastSessionsToRegisteredApps ( ) ;
2020-07-25 00:00:49 +03:00
}
2021-01-25 02:19:29 +03:00
}
2020-07-25 00:00:49 +03:00
2021-01-25 02:19:29 +03:00
// Sent tunnel statistics to the server, only send this if compression was used.
2021-01-25 08:51:22 +03:00
if ( ( this . bytesSent _uncompressed ) && ( this . bytesSent _uncompressed . toString ( ) != this . bytesSent _actual . toString ( ) ) ) {
2021-01-25 02:19:29 +03:00
mesh . SendCommand ( {
action : 'tunnelCloseStats' ,
url : tunnel . url ,
userid : tunnel . userid ,
protocol : tunnel . protocol ,
sessionid : tunnel . sessionid ,
sent : this . bytesSent _uncompressed . toString ( ) ,
sentActual : this . bytesSent _actual . toString ( ) ,
sentRatio : this . bytesSent _ratio ,
received : this . bytesReceived _uncompressed . toString ( ) ,
receivedActual : this . bytesReceived _actual . toString ( ) ,
receivedRatio : this . bytesReceived _ratio
} ) ;
}
2020-07-17 09:08:59 +03:00
2021-01-25 02:19:29 +03:00
//sendConsoleText("Tunnel #" + this.httprequest.index + " closed. Sent -> " + this.bytesSent_uncompressed + ' bytes (uncompressed), ' + this.bytesSent_actual + ' bytes (actual), ' + this.bytesSent_ratio + '% compression', this.httprequest.sessionid);
if ( this . httprequest . index ) { delete tunnels [ this . httprequest . index ] ; }
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
/ *
// Close the watcher if required
if ( this . httprequest . watcher != undefined ) {
//console.log('Closing watcher: ' + this.httprequest.watcher.path);
//this.httprequest.watcher.close(); // TODO: This line causes the agent to crash!!!!
delete this . httprequest . watcher ;
}
* /
// If there is a upload or download active on this connection, close the file
2021-01-25 09:46:54 +03:00
if ( this . httprequest . uploadFile ) { fs . closeSync ( this . httprequest . uploadFile ) ; delete this . httprequest . uploadFile ; delete this . httprequest . uploadFileid ; delete this . httprequest . uploadFilePath ; delete this . httprequest . uploadFileSize ; }
2021-01-25 02:19:29 +03:00
if ( this . httprequest . downloadFile ) { delete this . httprequest . downloadFile ; }
// Clean up WebRTC
2021-01-25 08:51:22 +03:00
if ( this . webrtc != null ) {
2021-01-25 02:19:29 +03:00
if ( this . webrtc . rtcchannel ) { try { this . webrtc . rtcchannel . close ( ) ; } catch ( e ) { } this . webrtc . rtcchannel . removeAllListeners ( 'data' ) ; this . webrtc . rtcchannel . removeAllListeners ( 'end' ) ; delete this . webrtc . rtcchannel ; }
if ( this . webrtc . websocket ) { delete this . webrtc . websocket ; }
try { this . webrtc . close ( ) ; } catch ( e ) { }
this . webrtc . removeAllListeners ( 'connected' ) ;
this . webrtc . removeAllListeners ( 'disconnected' ) ;
this . webrtc . removeAllListeners ( 'dataChannel' ) ;
delete this . webrtc ;
}
2017-08-28 19:27:45 +03:00
2021-01-25 02:19:29 +03:00
// Clean up WebSocket
this . removeAllListeners ( 'data' ) ;
}
function onTunnelSendOk ( ) { /*sendConsoleText("Tunnel #" + this.index + " SendOK.", this.sessionid);*/ }
2021-01-25 08:51:22 +03:00
function onTunnelData ( data ) {
2021-01-25 02:19:29 +03:00
//console.log("OnTunnelData");
2021-04-27 05:01:40 +03:00
//sendConsoleText('OnTunnelData, ' + data.length + ', ' + typeof data + ', ' + data);
2021-01-25 02:19:29 +03:00
// If this is upload data, save it to file
2021-01-25 08:51:22 +03:00
if ( ( this . httprequest . uploadFile ) && ( typeof data == 'object' ) && ( data [ 0 ] != 123 ) ) {
2021-01-25 02:19:29 +03:00
// Save the data to file being uploaded.
2021-01-25 08:51:22 +03:00
if ( data [ 0 ] == 0 ) {
2021-01-25 02:19:29 +03:00
// If data starts with zero, skip the first byte. This is used to escape binary file data from JSON.
2021-01-25 09:46:54 +03:00
this . httprequest . uploadFileSize += ( data . length - 1 ) ;
2021-01-25 02:19:29 +03:00
try { fs . writeSync ( this . httprequest . uploadFile , data , 1 , data . length - 1 ) ; } catch ( e ) { sendConsoleText ( 'FileUpload Error' ) ; this . write ( Buffer . from ( JSON . stringify ( { action : 'uploaderror' } ) ) ) ; return ; } // Write to the file, if there is a problem, error out.
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
// If data does not start with zero, save as-is.
2021-01-25 09:46:54 +03:00
this . httprequest . uploadFileSize += data . length ;
2021-01-25 02:19:29 +03:00
try { fs . writeSync ( this . httprequest . uploadFile , data ) ; } catch ( e ) { sendConsoleText ( 'FileUpload Error' ) ; this . write ( Buffer . from ( JSON . stringify ( { action : 'uploaderror' } ) ) ) ; return ; } // Write to the file, if there is a problem, error out.
2018-01-19 02:43:43 +03:00
}
2021-01-25 02:19:29 +03:00
this . write ( Buffer . from ( JSON . stringify ( { action : 'uploadack' , reqid : this . httprequest . uploadFileid } ) ) ) ; // Ask for more data.
return ;
}
2018-01-19 02:43:43 +03:00
2021-01-25 08:51:22 +03:00
if ( this . httprequest . state == 0 ) {
2021-01-25 02:19:29 +03:00
// Check if this is a relay connection
if ( ( data == 'c' ) || ( data == 'cr' ) ) { this . httprequest . state = 1 ; /*sendConsoleText("Tunnel #" + this.httprequest.index + " now active", this.httprequest.sessionid);*/ }
2017-08-28 19:27:45 +03:00
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
// Handle tunnel data
2021-01-25 08:51:22 +03:00
if ( this . httprequest . protocol == 0 ) { // 1 = Terminal (admin), 2 = Desktop, 5 = Files, 6 = PowerShell (admin), 7 = Plugin Data Exchange, 8 = Terminal (user), 9 = PowerShell (user), 10 = FileTransfer
2021-01-25 02:19:29 +03:00
// Take a look at the protocol
if ( ( data . length > 3 ) && ( data [ 0 ] == '{' ) ) { onTunnelControlData ( data , this ) ; return ; }
this . httprequest . protocol = parseInt ( data ) ;
if ( typeof this . httprequest . protocol != 'number' ) { this . httprequest . protocol = 0 ; }
2021-04-09 23:27:21 +03:00
// See if this protocol request is allowed.
if ( ( this . httprequest . soptions != null ) && ( this . httprequest . soptions . usages != null ) && ( this . httprequest . soptions . usages . indexOf ( this . httprequest . protocol ) == - 1 ) ) { this . httprequest . protocol = 0 ; }
2021-01-25 08:51:22 +03:00
if ( this . httprequest . protocol == 10 ) {
2021-01-25 02:19:29 +03:00
//
// Basic file transfer
//
var stats = null ;
if ( ( process . platform != 'win32' ) && ( this . httprequest . xoptions . file . startsWith ( '/' ) == false ) ) { this . httprequest . xoptions . file = '/' + this . httprequest . xoptions . file ; }
try { stats = require ( 'fs' ) . statSync ( this . httprequest . xoptions . file ) } catch ( e ) { }
try { if ( stats ) { this . httprequest . downloadFile = fs . createReadStream ( this . httprequest . xoptions . file , { flags : 'rbN' } ) ; } } catch ( e ) { }
2021-01-25 08:51:22 +03:00
if ( this . httprequest . downloadFile ) {
2021-01-25 09:46:54 +03:00
MeshServerLogEx ( 106 , [ this . httprequest . xoptions . file , stats . size ] , 'Download: \"' + this . httprequest . xoptions . file + '\", Size: ' + stats . size , this . httprequest ) ;
2021-01-25 02:19:29 +03:00
//sendConsoleText('BasicFileTransfer, ok, ' + this.httprequest.xoptions.file + ', ' + JSON.stringify(stats));
this . write ( JSON . stringify ( { op : 'ok' , size : stats . size } ) ) ;
this . httprequest . downloadFile . pipe ( this ) ;
this . httprequest . downloadFile . end = function ( ) { }
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
//sendConsoleText('BasicFileTransfer, cancel, ' + this.httprequest.xoptions.file);
this . write ( JSON . stringify ( { op : 'cancel' } ) ) ;
}
2020-04-21 06:12:35 +03:00
}
2021-01-25 08:51:22 +03:00
else if ( ( this . httprequest . protocol == 1 ) || ( this . httprequest . protocol == 6 ) || ( this . httprequest . protocol == 8 ) || ( this . httprequest . protocol == 9 ) ) {
2021-01-25 02:19:29 +03:00
//
// Remote Terminal
//
2018-02-12 04:13:26 +03:00
2021-01-25 02:19:29 +03:00
// Check user access rights for terminal
2021-01-25 08:51:22 +03:00
if ( ( ( this . httprequest . rights & MESHRIGHT _REMOTECONTROL ) == 0 ) || ( ( this . httprequest . rights != 0xFFFFFFFF ) && ( ( this . httprequest . rights & MESHRIGHT _NOTERMINAL ) != 0 ) ) ) {
2021-01-25 02:19:29 +03:00
// Disengage this tunnel, user does not have the rights to do this!!
this . httprequest . protocol = 999999 ;
this . httprequest . s . end ( ) ;
sendConsoleText ( "Error: No Terminal Control Rights." ) ;
return ;
2020-08-27 04:42:41 +03:00
}
2018-11-28 04:13:01 +03:00
2021-01-25 02:19:29 +03:00
this . descriptorMetadata = "Remote Terminal" ;
2020-05-21 23:22:58 +03:00
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
if ( ! require ( 'win-terminal' ) . PowerShellCapable ( ) && ( this . httprequest . protocol == 6 || this . httprequest . protocol == 9 ) ) {
2021-01-25 02:19:29 +03:00
this . httprequest . write ( JSON . stringify ( { ctrlChannel : '102938' , type : 'console' , msg : 'PowerShell is not supported on this version of windows' , msgid : 1 } ) ) ;
this . httprequest . s . end ( ) ;
return ;
2020-05-17 07:10:11 +03:00
}
2021-01-25 02:19:29 +03:00
}
2020-05-17 07:10:11 +03:00
2021-01-25 02:19:29 +03:00
var prom = require ( 'promise' ) ;
this . httprequest . tpromise = new prom ( function ( res , rej ) { this . _res = res ; this . _rej = rej ; } ) ;
this . httprequest . tpromise . that = this ;
this . httprequest . tpromise . httprequest = this . httprequest ;
2020-05-19 11:21:07 +03:00
2021-01-25 08:51:22 +03:00
this . end = function ( ) {
2021-01-25 02:19:29 +03:00
if ( this . httprequest . tpromise . _consent ) { this . httprequest . tpromise . _consent . close ( ) ; }
if ( this . httprequest . connectionPromise ) { this . httprequest . connectionPromise . _rej ( 'Closed' ) ; }
2020-05-12 10:01:42 +03:00
2021-01-25 02:19:29 +03:00
// Remove the terminal session to the count to update the server
2021-01-25 08:51:22 +03:00
if ( this . httprequest . userid != null ) {
2021-01-25 02:19:29 +03:00
if ( tunnelUserCount . terminal [ this . httprequest . userid ] != null ) { tunnelUserCount . terminal [ this . httprequest . userid ] -- ; if ( tunnelUserCount . terminal [ this . httprequest . userid ] <= 0 ) { delete tunnelUserCount . terminal [ this . httprequest . userid ] ; } }
try { mesh . SendCommand ( { action : 'sessions' , type : 'terminal' , value : tunnelUserCount . terminal } ) ; } catch ( e ) { }
broadcastSessionsToRegisteredApps ( ) ;
}
2019-06-15 02:33:53 +03:00
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
// Unpipe the web socket
this . unpipe ( this . httprequest . _term ) ;
if ( this . httprequest . _term ) { this . httprequest . _term . unpipe ( this ) ; }
2019-05-21 02:00:33 +03:00
2021-01-25 02:19:29 +03:00
// Unpipe the WebRTC channel if needed (This will also be done when the WebRTC channel ends).
2021-01-25 08:51:22 +03:00
if ( this . rtcchannel ) {
2021-01-25 02:19:29 +03:00
this . rtcchannel . unpipe ( this . httprequest . _term ) ;
if ( this . httprequest . _term ) { this . httprequest . _term . unpipe ( this . rtcchannel ) ; }
2019-06-15 02:33:53 +03:00
}
2019-04-13 00:19:03 +03:00
2021-01-25 02:19:29 +03:00
// Clean up
if ( this . httprequest . _term ) { this . httprequest . _term . end ( ) ; }
this . httprequest . _term = null ;
2020-05-17 07:10:11 +03:00
}
2021-01-25 02:19:29 +03:00
} ;
// Perform User-Consent if needed.
2021-01-25 08:51:22 +03:00
if ( this . httprequest . consent && ( this . httprequest . consent & 16 ) ) {
2021-01-25 02:19:29 +03:00
this . write ( JSON . stringify ( { ctrlChannel : '102938' , type : 'console' , msg : "Waiting for user to grant access..." , msgid : 1 } ) ) ;
var consentMessage = this . httprequest . username + " requesting remote terminal access. Grant access?" , consentTitle = 'MeshCentral' ;
2021-01-25 08:51:22 +03:00
if ( this . httprequest . soptions != null ) {
2021-01-25 02:19:29 +03:00
if ( this . httprequest . soptions . consentTitle != null ) { consentTitle = this . httprequest . soptions . consentTitle ; }
if ( this . httprequest . soptions . consentMsgTerminal != null ) { consentMessage = this . httprequest . soptions . consentMsgTerminal . replace ( '{0}' , this . httprequest . realname ) . replace ( '{1}' , this . httprequest . username ) ; }
2020-05-17 07:10:11 +03:00
}
2021-01-25 02:19:29 +03:00
this . httprequest . tpromise . _consent = require ( 'message-box' ) . create ( consentTitle , consentMessage , 30 ) ;
this . httprequest . tpromise . _consent . retPromise = this . httprequest . tpromise ;
this . httprequest . tpromise . _consent . then (
2021-01-25 08:51:22 +03:00
function ( ) {
2021-01-25 02:19:29 +03:00
// Success
MeshServerLogEx ( 27 , null , "Local user accepted remote terminal request (" + this . retPromise . httprequest . remoteaddr + ")" , this . retPromise . that . httprequest ) ;
this . retPromise . that . write ( JSON . stringify ( { ctrlChannel : '102938' , type : 'console' , msg : null , msgid : 0 } ) ) ;
this . retPromise . _consent = null ;
this . retPromise . _res ( ) ;
} ,
2021-01-25 08:51:22 +03:00
function ( e ) {
2021-01-25 02:19:29 +03:00
// Denied
MeshServerLogEx ( 28 , null , "Local user rejected remote terminal request (" + this . retPromise . that . httprequest . remoteaddr + ")" , this . retPromise . that . httprequest ) ;
this . retPromise . that . write ( JSON . stringify ( { ctrlChannel : '102938' , type : 'console' , msg : e . toString ( ) , msgid : 2 } ) ) ;
this . retPromise . _rej ( e . toString ( ) ) ;
} ) ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
// User-Consent is not required, so just resolve this promise
this . httprequest . tpromise . _res ( ) ;
}
2020-01-29 02:08:51 +03:00
2021-01-25 02:19:29 +03:00
this . httprequest . tpromise . then (
2021-01-25 08:51:22 +03:00
function ( ) {
2021-01-25 02:19:29 +03:00
this . httprequest . connectionPromise = new prom ( function ( res , rej ) { this . _res = res ; this . _rej = rej ; } ) ;
this . httprequest . connectionPromise . ws = this . that ;
2020-05-17 07:10:11 +03:00
2021-01-25 02:19:29 +03:00
// Start Terminal
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
try {
2021-01-25 02:19:29 +03:00
var cols = 80 , rows = 25 ;
2021-01-25 08:51:22 +03:00
if ( this . httprequest . xoptions ) {
2021-01-25 02:19:29 +03:00
if ( this . httprequest . xoptions . rows ) { rows = this . httprequest . xoptions . rows ; }
if ( this . httprequest . xoptions . cols ) { cols = this . httprequest . xoptions . cols ; }
}
2020-05-17 07:10:11 +03:00
2021-01-25 08:51:22 +03:00
if ( ( this . httprequest . protocol == 1 ) || ( this . httprequest . protocol == 6 ) ) {
2021-01-25 02:19:29 +03:00
// Admin Terminal
2021-01-25 08:51:22 +03:00
if ( require ( 'win-virtual-terminal' ) . supported ) {
2021-01-25 02:19:29 +03:00
// ConPTY PseudoTerminal
// this.httprequest._term = require('win-virtual-terminal')[this.httprequest.protocol == 6 ? 'StartPowerShell' : 'Start'](80, 25);
// The above line is commented out, because there is a bug with ClosePseudoConsole() API, so this is the workaround
this . httprequest . _dispatcher = require ( 'win-dispatcher' ) . dispatch ( { modules : [ { name : 'win-virtual-terminal' , script : getJSModule ( 'win-virtual-terminal' ) } ] , launch : { module : 'win-virtual-terminal' , method : ( this . httprequest . protocol == 6 ? 'StartPowerShell' : 'Start' ) , args : [ cols , rows ] } } ) ;
this . httprequest . _dispatcher . httprequest = this . httprequest ;
2021-01-25 08:51:22 +03:00
this . httprequest . _dispatcher . on ( 'connection' , function ( c ) {
if ( this . httprequest . connectionPromise . completed ) {
2021-01-25 02:19:29 +03:00
c . end ( ) ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
this . httprequest . connectionPromise . _res ( c ) ;
}
} ) ;
2020-05-17 07:10:11 +03:00
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
// Legacy Terminal
this . httprequest . connectionPromise . _res ( require ( 'win-terminal' ) [ this . httprequest . protocol == 6 ? 'StartPowerShell' : 'Start' ] ( cols , rows ) ) ;
}
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
// Logged in user
var userPromise = require ( 'user-sessions' ) . enumerateUsers ( ) ;
userPromise . that = this ;
2021-01-25 08:51:22 +03:00
userPromise . then ( function ( u ) {
2021-01-25 02:19:29 +03:00
var that = this . that ;
2021-01-25 08:51:22 +03:00
if ( u . Active . length > 0 ) {
2021-04-19 20:55:09 +03:00
var username = '"' + u . Active [ 0 ] . Domain + '\\' + u . Active [ 0 ] . Username + '"' ;
sendConsoleText ( 'Terminal: ' + username ) ;
2021-01-25 08:51:22 +03:00
if ( require ( 'win-virtual-terminal' ) . supported ) {
2021-01-25 02:19:29 +03:00
// ConPTY PseudoTerminal
that . httprequest . _dispatcher = require ( 'win-dispatcher' ) . dispatch ( { user : username , modules : [ { name : 'win-virtual-terminal' , script : getJSModule ( 'win-virtual-terminal' ) } ] , launch : { module : 'win-virtual-terminal' , method : ( that . httprequest . protocol == 9 ? 'StartPowerShell' : 'Start' ) , args : [ cols , rows ] } } ) ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
// Legacy Terminal
that . httprequest . _dispatcher = require ( 'win-dispatcher' ) . dispatch ( { user : username , modules : [ { name : 'win-terminal' , script : getJSModule ( 'win-terminal' ) } ] , launch : { module : 'win-terminal' , method : ( that . httprequest . protocol == 9 ? 'StartPowerShell' : 'Start' ) , args : [ cols , rows ] } } ) ;
}
that . httprequest . _dispatcher . ws = that ;
2021-01-25 08:51:22 +03:00
that . httprequest . _dispatcher . on ( 'connection' , function ( c ) {
if ( this . ws . httprequest . connectionPromise . completed ) {
2020-05-19 11:21:07 +03:00
c . end ( ) ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
this . ws . httprequest . connectionPromise . _res ( c ) ;
2020-05-19 11:21:07 +03:00
}
2020-05-17 07:10:11 +03:00
} ) ;
2020-01-29 02:08:51 +03:00
}
2021-01-25 02:19:29 +03:00
} ) ;
2020-05-17 07:10:11 +03:00
}
2020-01-29 02:08:51 +03:00
}
2021-01-25 08:51:22 +03:00
catch ( e ) {
2021-01-25 02:19:29 +03:00
this . httprequest . connectionPromise . _rej ( 'Failed to start remote terminal session, ' + e . toString ( ) ) ;
}
}
2021-01-25 08:51:22 +03:00
else {
try {
2021-01-25 02:19:29 +03:00
var bash = fs . existsSync ( '/bin/bash' ) ? '/bin/bash' : false ;
var sh = fs . existsSync ( '/bin/sh' ) ? '/bin/sh' : false ;
var login = process . platform == 'linux' ? '/bin/login' : '/usr/bin/login' ;
var env = { HISTCONTROL : 'ignoreboth' } ;
2021-01-25 08:51:22 +03:00
if ( this . httprequest . xoptions ) {
2021-01-25 02:19:29 +03:00
if ( this . httprequest . xoptions . rows ) { env . LINES = ( '' + this . httprequest . xoptions . rows ) ; }
if ( this . httprequest . xoptions . cols ) { env . COLUMNS = ( '' + this . httprequest . xoptions . cols ) ; }
}
var options = { type : childProcess . SpawnTypes . TERM , uid : ( this . httprequest . protocol == 8 ) ? require ( 'user-sessions' ) . consoleUid ( ) : null , env : env } ;
2021-01-25 08:51:22 +03:00
if ( this . httprequest . xoptions && this . httprequest . xoptions . requireLogin ) {
2021-01-25 02:19:29 +03:00
if ( ! require ( 'fs' ) . existsSync ( login ) ) { throw ( 'Unable to spawn login process' ) ; }
this . httprequest . connectionPromise . _res ( childProcess . execFile ( login , [ 'login' ] , options ) ) ; // Start login shell
}
2021-01-25 08:51:22 +03:00
else if ( bash ) {
2021-01-25 02:19:29 +03:00
var p = childProcess . execFile ( bash , [ 'bash' ] , options ) ; // Start bash
// Spaces at the beginning of lines are needed to hide commands from the command history
if ( process . platform == 'linux' ) { p . stdin . write ( ' alias ls=\'ls --color=auto\';clear\n' ) ; }
this . httprequest . connectionPromise . _res ( p ) ;
}
2021-01-25 08:51:22 +03:00
else if ( sh ) {
2021-01-25 02:19:29 +03:00
var p = childProcess . execFile ( sh , [ 'sh' ] , options ) ; // Start sh
// Spaces at the beginning of lines are needed to hide commands from the command history
if ( process . platform == 'linux' ) { p . stdin . write ( ' alias ls=\'ls --color=auto\';clear\n' ) ; }
this . httprequest . connectionPromise . _res ( p ) ;
2020-05-17 07:10:11 +03:00
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
this . httprequest . connectionPromise . _rej ( 'Failed to start remote terminal session, no shell found' ) ;
2020-05-17 07:10:11 +03:00
}
2019-11-26 03:11:53 +03:00
}
2021-01-25 08:51:22 +03:00
catch ( e ) {
2021-01-25 02:19:29 +03:00
this . httprequest . connectionPromise . _rej ( 'Failed to start remote terminal session, ' + e . toString ( ) ) ;
}
}
2020-01-29 02:08:51 +03:00
2021-01-25 02:19:29 +03:00
this . httprequest . connectionPromise . then (
2021-01-25 08:51:22 +03:00
function ( term ) {
2021-01-25 02:19:29 +03:00
// SUCCESS
var stdoutstream ;
var stdinstream ;
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
this . ws . httprequest . _term = term ;
this . ws . httprequest . _term . tunnel = this . ws ;
stdoutstream = stdinstream = term ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
term . descriptorMetadata = 'Remote Terminal' ;
this . ws . httprequest . process = term ;
this . ws . httprequest . process . tunnel = this . ws ;
term . stderr . stdout = term . stdout ;
term . stderr . on ( 'data' , function ( c ) { this . stdout . write ( c ) ; } ) ;
stdoutstream = term . stdout ;
stdinstream = term . stdin ;
this . ws . prependListener ( 'end' , function ( ) { this . httprequest . process . kill ( ) ; } ) ;
term . prependListener ( 'exit' , function ( ) { this . tunnel . end ( ) ; } ) ;
}
2018-11-28 04:13:01 +03:00
2021-01-25 02:19:29 +03:00
this . ws . removeAllListeners ( 'data' ) ;
this . ws . on ( 'data' , onTunnelControlData ) ;
2020-05-12 10:01:42 +03:00
2021-01-25 02:19:29 +03:00
stdoutstream . pipe ( this . ws , { dataTypeSkip : 1 } ) ; // 0 = Binary, 1 = Text.
this . ws . pipe ( stdinstream , { dataTypeSkip : 1 , end : false } ) ; // 0 = Binary, 1 = Text.
2019-06-15 02:33:53 +03:00
2021-01-25 02:19:29 +03:00
// Add the terminal session to the count to update the server
2021-01-25 08:51:22 +03:00
if ( this . ws . httprequest . userid != null ) {
2021-01-25 02:19:29 +03:00
if ( tunnelUserCount . terminal [ this . ws . httprequest . userid ] == null ) { tunnelUserCount . terminal [ this . ws . httprequest . userid ] = 1 ; } else { tunnelUserCount . terminal [ this . ws . httprequest . userid ] ++ ; }
try { mesh . SendCommand ( { action : 'sessions' , type : 'terminal' , value : tunnelUserCount . terminal } ) ; } catch ( e ) { }
broadcastSessionsToRegisteredApps ( ) ;
}
2020-05-17 07:10:11 +03:00
2021-01-25 02:19:29 +03:00
// Toast Notification, if required
2021-01-25 08:51:22 +03:00
if ( this . ws . httprequest . consent && ( this . ws . httprequest . consent & 2 ) ) {
2021-01-25 02:19:29 +03:00
// User Notifications is required
var notifyMessage = this . ws . httprequest . username + " started a remote terminal session." , notifyTitle = "MeshCentral" ;
2021-01-25 08:51:22 +03:00
if ( this . ws . httprequest . soptions != null ) {
2021-01-25 02:19:29 +03:00
if ( this . ws . httprequest . soptions . notifyTitle != null ) { notifyTitle = this . ws . httprequest . soptions . notifyTitle ; }
if ( this . ws . httprequest . soptions . notifyMsgTerminal != null ) { notifyMessage = this . ws . httprequest . soptions . notifyMsgTerminal . replace ( '{0}' , this . ws . httprequest . realname ) . replace ( '{1}' , this . ws . httprequest . username ) ; }
2020-04-16 05:05:46 +03:00
}
2021-01-25 02:19:29 +03:00
try { require ( 'toaster' ) . Toast ( notifyTitle , notifyMessage ) ; } catch ( e ) { }
}
} ,
2021-01-25 08:51:22 +03:00
function ( e ) {
2021-01-25 02:19:29 +03:00
// FAILED to connect terminal
this . ws . write ( JSON . stringify ( { ctrlChannel : '102938' , type : 'console' , msg : e . toString ( ) , msgid : 2 } ) ) ;
this . ws . end ( ) ;
} ) ;
} ,
2021-01-25 08:51:22 +03:00
function ( e ) {
2021-01-25 02:19:29 +03:00
// DO NOT start terminal
this . that . write ( JSON . stringify ( { ctrlChannel : '102938' , type : 'console' , msg : e . toString ( ) , msgid : 2 } ) ) ;
this . that . end ( ) ;
} ) ;
}
2021-01-25 08:51:22 +03:00
else if ( this . httprequest . protocol == 2 ) {
2021-01-25 02:19:29 +03:00
//
2021-04-09 23:27:21 +03:00
// Remote Desktop
2021-01-25 02:19:29 +03:00
//
// Check user access rights for desktop
2021-01-25 08:51:22 +03:00
if ( ( ( ( this . httprequest . rights & MESHRIGHT _REMOTECONTROL ) == 0 ) && ( ( this . httprequest . rights & MESHRIGHT _REMOTEVIEW ) == 0 ) ) || ( ( this . httprequest . rights != 0xFFFFFFFF ) && ( ( this . httprequest . rights & MESHRIGHT _NODESKTOP ) != 0 ) ) ) {
2021-01-25 02:19:29 +03:00
// Disengage this tunnel, user does not have the rights to do this!!
this . httprequest . protocol = 999999 ;
this . httprequest . s . end ( ) ;
sendConsoleText ( "Error: No Desktop Control Rights." ) ;
return ;
2020-05-17 07:10:11 +03:00
}
2018-11-28 04:13:01 +03:00
2021-01-25 02:19:29 +03:00
this . descriptorMetadata = "Remote KVM" ;
// Look for a TSID
var tsid = null ;
if ( ( this . httprequest . xoptions != null ) && ( typeof this . httprequest . xoptions . tsid == 'number' ) ) { tsid = this . httprequest . xoptions . tsid ; }
require ( 'MeshAgent' ) . _tsid = tsid ;
2020-05-21 23:22:58 +03:00
2021-01-25 02:19:29 +03:00
// Remote desktop using native pipes
this . httprequest . desktop = { state : 0 , kvm : mesh . getRemoteDesktopStream ( tsid ) , tunnel : this } ;
this . httprequest . desktop . kvm . parent = this . httprequest . desktop ;
this . desktop = this . httprequest . desktop ;
2019-12-13 04:45:42 +03:00
2021-01-25 02:19:29 +03:00
// Add ourself to the list of remote desktop sessions
if ( this . httprequest . desktop . kvm . tunnels == null ) { this . httprequest . desktop . kvm . tunnels = [ ] ; }
this . httprequest . desktop . kvm . tunnels . push ( this ) ;
2018-04-20 04:19:15 +03:00
2021-01-25 02:19:29 +03:00
// Send a metadata update to all desktop sessions
var users = { } ;
2021-01-25 08:51:22 +03:00
if ( this . httprequest . desktop . kvm . tunnels != null ) {
2021-01-25 02:19:29 +03:00
for ( var i in this . httprequest . desktop . kvm . tunnels ) { try { var userid = this . httprequest . desktop . kvm . tunnels [ i ] . httprequest . userid ; if ( users [ userid ] == null ) { users [ userid ] = 1 ; } else { users [ userid ] ++ ; } } catch ( e ) { } }
for ( var i in this . httprequest . desktop . kvm . tunnels ) { try { this . httprequest . desktop . kvm . tunnels [ i ] . write ( JSON . stringify ( { ctrlChannel : '102938' , type : 'metadata' , users : users } ) ) ; } catch ( e ) { } }
tunnelUserCount . desktop = users ;
try { mesh . SendCommand ( { action : 'sessions' , type : 'kvm' , value : users } ) ; } catch ( e ) { }
broadcastSessionsToRegisteredApps ( ) ;
}
2021-01-25 08:51:22 +03:00
this . end = function ( ) {
2021-01-25 02:19:29 +03:00
-- this . desktop . kvm . connectionCount ;
// Remove ourself from the list of remote desktop session
var i = this . desktop . kvm . tunnels . indexOf ( this ) ;
if ( i >= 0 ) { this . desktop . kvm . tunnels . splice ( i , 1 ) ; }
2020-05-07 09:23:27 +03:00
// Send a metadata update to all desktop sessions
var users = { } ;
2021-01-25 08:51:22 +03:00
if ( this . httprequest . desktop . kvm . tunnels != null ) {
2020-10-01 02:59:34 +03:00
for ( var i in this . httprequest . desktop . kvm . tunnels ) { try { var userid = this . httprequest . desktop . kvm . tunnels [ i ] . httprequest . userid ; if ( users [ userid ] == null ) { users [ userid ] = 1 ; } else { users [ userid ] ++ ; } } catch ( e ) { } }
for ( var i in this . httprequest . desktop . kvm . tunnels ) { try { this . httprequest . desktop . kvm . tunnels [ i ] . write ( JSON . stringify ( { ctrlChannel : '102938' , type : 'metadata' , users : users } ) ) ; } catch ( e ) { } }
2020-10-12 08:24:30 +03:00
tunnelUserCount . desktop = users ;
2020-10-01 02:59:34 +03:00
try { mesh . SendCommand ( { action : 'sessions' , type : 'kvm' , value : users } ) ; } catch ( e ) { }
2020-10-12 08:24:30 +03:00
broadcastSessionsToRegisteredApps ( ) ;
2020-05-11 11:17:18 +03:00
}
2020-05-07 09:23:27 +03:00
2021-01-25 02:19:29 +03:00
// Unpipe the web socket
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
this . unpipe ( this . httprequest . desktop . kvm ) ;
this . httprequest . desktop . kvm . unpipe ( this ) ;
}
catch ( e ) { }
2020-05-07 09:23:27 +03:00
2021-01-25 02:19:29 +03:00
// Unpipe the WebRTC channel if needed (This will also be done when the WebRTC channel ends).
2021-01-25 08:51:22 +03:00
if ( this . rtcchannel ) {
try {
2021-01-25 02:19:29 +03:00
this . rtcchannel . unpipe ( this . httprequest . desktop . kvm ) ;
this . httprequest . desktop . kvm . unpipe ( this . rtcchannel ) ;
2020-04-28 21:36:04 +03:00
}
2021-01-15 10:57:52 +03:00
catch ( e ) { }
2021-01-25 02:19:29 +03:00
}
2019-01-04 01:46:52 +03:00
2021-01-25 02:19:29 +03:00
// Place wallpaper back if needed
// TODO
2019-11-29 09:45:21 +03:00
2021-01-25 08:51:22 +03:00
if ( this . desktop . kvm . connectionCount == 0 ) {
2021-01-25 02:19:29 +03:00
// Display a toast message. This may not be supported on all platforms.
// try { require('toaster').Toast('MeshCentral', 'Remote Desktop Control Ended.'); } catch (e) { }
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . end ( ) ;
2021-01-25 08:51:22 +03:00
if ( this . httprequest . desktop . kvm . connectionBar ) {
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . connectionBar . removeAllListeners ( 'close' ) ;
this . httprequest . desktop . kvm . connectionBar . close ( ) ;
this . httprequest . desktop . kvm . connectionBar = null ;
}
2021-01-25 08:51:22 +03:00
} else {
for ( var i in this . httprequest . desktop . kvm . users ) {
if ( ( this . httprequest . desktop . kvm . users [ i ] == this . httprequest . username ) && this . httprequest . desktop . kvm . connectionBar ) {
2021-01-25 02:19:29 +03:00
for ( var j in this . httprequest . desktop . kvm . rusers ) { if ( this . httprequest . desktop . kvm . rusers [ j ] == this . httprequest . realname ) { this . httprequest . desktop . kvm . rusers . splice ( j , 1 ) ; break ; } }
this . httprequest . desktop . kvm . users . splice ( i , 1 ) ;
this . httprequest . desktop . kvm . connectionBar . removeAllListeners ( 'close' ) ;
this . httprequest . desktop . kvm . connectionBar . close ( ) ;
2021-02-22 10:23:15 +03:00
this . httprequest . desktop . kvm . connectionBar = require ( 'notifybar-desktop' ) ( this . httprequest . privacybartext . replace ( '{0}' , this . httprequest . desktop . kvm . rusers . join ( ', ' ) ) . replace ( '{1}' , this . httprequest . desktop . kvm . users . join ( ', ' ) ) , require ( 'MeshAgent' ) . _tsid ) ;
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . connectionBar . httprequest = this . httprequest ;
2021-01-25 08:51:22 +03:00
this . httprequest . desktop . kvm . connectionBar . on ( 'close' , function ( ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 29 , null , "Remote Desktop Connection forcefully closed by local user (" + this . httprequest . remoteaddr + ")" , this . httprequest ) ;
2021-01-25 08:51:22 +03:00
for ( var i in this . httprequest . desktop . kvm . _pipedStreams ) {
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . _pipedStreams [ i ] . end ( ) ;
}
this . httprequest . desktop . kvm . end ( ) ;
} ) ;
break ;
2019-10-11 20:53:42 +03:00
}
2018-04-20 04:19:15 +03:00
}
2019-10-11 20:53:42 +03:00
}
2021-01-25 02:19:29 +03:00
} ;
2021-01-25 08:51:22 +03:00
if ( this . httprequest . desktop . kvm . hasOwnProperty ( 'connectionCount' ) ) {
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . connectionCount ++ ;
this . httprequest . desktop . kvm . rusers . push ( this . httprequest . realname ) ;
this . httprequest . desktop . kvm . users . push ( this . httprequest . username ) ;
this . httprequest . desktop . kvm . rusers . sort ( ) ;
this . httprequest . desktop . kvm . users . sort ( ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . connectionCount = 1 ;
this . httprequest . desktop . kvm . rusers = [ this . httprequest . realname ] ;
this . httprequest . desktop . kvm . users = [ this . httprequest . username ] ;
}
2018-11-28 04:13:01 +03:00
2021-01-25 08:51:22 +03:00
if ( ( this . httprequest . rights == 0xFFFFFFFF ) || ( ( ( this . httprequest . rights & MESHRIGHT _REMOTECONTROL ) != 0 ) && ( ( this . httprequest . rights & MESHRIGHT _REMOTEVIEW ) == 0 ) ) ) {
2021-01-25 02:19:29 +03:00
// If we have remote control rights, pipe the KVM input
this . pipe ( this . httprequest . desktop . kvm , { dataTypeSkip : 1 , end : false } ) ; // 0 = Binary, 1 = Text. Pipe the Browser --> KVM input.
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
// We need to only pipe non-mouse & non-keyboard inputs.
//sendConsoleText('Warning: No Remote Desktop Input Rights.');
// TODO!!!
}
2018-11-28 04:13:01 +03:00
2021-01-25 02:19:29 +03:00
// Perform notification if needed. Toast messages may not be supported on all platforms.
2021-01-25 08:51:22 +03:00
if ( this . httprequest . consent && ( this . httprequest . consent & 8 ) ) {
2021-01-25 02:19:29 +03:00
// User Consent Prompt is required
// Send a console message back using the console channel, "\n" is supported.
this . write ( JSON . stringify ( { ctrlChannel : '102938' , type : 'console' , msg : "Waiting for user to grant access..." , msgid : 1 } ) ) ;
var consentMessage = this . httprequest . realname + " requesting remote desktop access. Grant access?" , consentTitle = 'MeshCentral' ;
2021-01-25 08:51:22 +03:00
if ( this . httprequest . soptions != null ) {
2021-01-25 02:19:29 +03:00
if ( this . httprequest . soptions . consentTitle != null ) { consentTitle = this . httprequest . soptions . consentTitle ; }
if ( this . httprequest . soptions . consentMsgDesktop != null ) { consentMessage = this . httprequest . soptions . consentMsgDesktop . replace ( '{0}' , this . httprequest . realname ) . replace ( '{1}' , this . httprequest . username ) ; }
}
var pr = require ( 'message-box' ) . create ( consentTitle , consentMessage , 30 , null , tsid ) ;
pr . ws = this ;
this . pause ( ) ;
this . _consentpromise = pr ;
this . prependOnceListener ( 'end' , function ( ) { if ( this . _consentpromise && this . _consentpromise . close ) { this . _consentpromise . close ( ) ; } } ) ;
pr . then (
2021-01-25 08:51:22 +03:00
function ( ) {
2021-01-25 02:19:29 +03:00
// Success
this . ws . _consentpromise = null ;
MeshServerLogEx ( 30 , null , "Starting remote desktop after local user accepted (" + this . ws . httprequest . remoteaddr + ")" , this . ws . httprequest ) ;
this . ws . write ( JSON . stringify ( { ctrlChannel : '102938' , type : 'console' , msg : null , msgid : 0 } ) ) ;
2021-01-25 08:51:22 +03:00
if ( this . ws . httprequest . consent && ( this . ws . httprequest . consent & 1 ) ) {
2021-01-25 02:19:29 +03:00
// User Notifications is required
var notifyMessage = this . ws . httprequest . realname + " started a remote desktop session." , notifyTitle = "MeshCentral" ;
2021-01-25 08:51:22 +03:00
if ( this . ws . httprequest . soptions != null ) {
2021-01-25 02:19:29 +03:00
if ( this . ws . httprequest . soptions . notifyTitle != null ) { notifyTitle = this . ws . httprequest . soptions . notifyTitle ; }
if ( this . ws . httprequest . soptions . notifyMsgDesktop != null ) { notifyMessage = this . ws . httprequest . soptions . notifyMsgDesktop . replace ( '{0}' , this . ws . httprequest . realname ) . replace ( '{1}' , this . ws . httprequest . username ) ; }
2019-06-15 02:33:53 +03:00
}
2021-01-25 02:19:29 +03:00
try { require ( 'toaster' ) . Toast ( notifyTitle , notifyMessage , tsid ) ; } catch ( e ) { }
}
2021-01-25 08:51:22 +03:00
if ( this . ws . httprequest . consent && ( this . ws . httprequest . consent & 0x40 ) ) {
2021-01-25 02:19:29 +03:00
// Connection Bar is required
2021-01-25 08:51:22 +03:00
if ( this . ws . httprequest . desktop . kvm . connectionBar ) {
2021-01-25 02:19:29 +03:00
this . ws . httprequest . desktop . kvm . connectionBar . removeAllListeners ( 'close' ) ;
this . ws . httprequest . desktop . kvm . connectionBar . close ( ) ;
}
2021-01-25 08:51:22 +03:00
try {
2021-02-22 10:23:15 +03:00
this . ws . httprequest . desktop . kvm . connectionBar = require ( 'notifybar-desktop' ) ( this . ws . httprequest . privacybartext . replace ( '{0}' , this . ws . httprequest . desktop . kvm . rusers . join ( ', ' ) ) . replace ( '{1}' , this . ws . httprequest . desktop . kvm . users . join ( ', ' ) ) , require ( 'MeshAgent' ) . _tsid ) ;
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 31 , null , "Remote Desktop Connection Bar Activated/Updated (" + this . ws . httprequest . remoteaddr + ")" , this . ws . httprequest ) ;
}
2021-01-25 08:51:22 +03:00
catch ( e ) {
if ( process . platform != 'darwin' ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 32 , null , "Remote Desktop Connection Bar Failed or Not Supported (" + this . ws . httprequest . remoteaddr + ")" , this . ws . httprequest ) ;
2019-10-25 20:33:10 +03:00
}
2021-01-25 02:19:29 +03:00
}
2021-01-25 08:51:22 +03:00
if ( this . ws . httprequest . desktop . kvm . connectionBar ) {
2021-01-25 02:19:29 +03:00
this . ws . httprequest . desktop . kvm . connectionBar . httprequest = this . ws . httprequest ;
2021-01-25 08:51:22 +03:00
this . ws . httprequest . desktop . kvm . connectionBar . on ( 'close' , function ( ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 33 , null , "Remote Desktop Connection forcefully closed by local user (" + this . httprequest . remoteaddr + ")" , this . httprequest ) ;
2021-01-25 08:51:22 +03:00
for ( var i in this . httprequest . desktop . kvm . _pipedStreams ) {
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . _pipedStreams [ i ] . end ( ) ;
2019-10-11 20:53:42 +03:00
}
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . end ( ) ;
} ) ;
2019-10-11 20:53:42 +03:00
}
2020-06-13 21:36:50 +03:00
}
2021-01-25 02:19:29 +03:00
this . ws . httprequest . desktop . kvm . pipe ( this . ws , { dataTypeSkip : 1 } ) ;
this . ws . resume ( ) ;
} ,
2021-01-25 08:51:22 +03:00
function ( e ) {
2021-01-25 02:19:29 +03:00
// User Consent Denied/Failed
this . ws . _consentpromise = null ;
MeshServerLogEx ( 34 , null , "Failed to start remote desktop after local user rejected (" + this . ws . httprequest . remoteaddr + ")" , this . ws . httprequest ) ;
this . ws . end ( JSON . stringify ( { ctrlChannel : '102938' , type : 'console' , msg : e . toString ( ) , msgid : 2 } ) ) ;
} ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
// User Consent Prompt is not required
2021-01-25 08:51:22 +03:00
if ( this . httprequest . consent && ( this . httprequest . consent & 1 ) ) {
2021-01-25 02:19:29 +03:00
// User Notifications is required
MeshServerLogEx ( 35 , null , "Started remote desktop with toast notification (" + this . httprequest . remoteaddr + ")" , this . httprequest ) ;
var notifyMessage = this . httprequest . realname + " started a remote desktop session." , notifyTitle = "MeshCentral" ;
2021-01-25 08:51:22 +03:00
if ( this . httprequest . soptions != null ) {
2021-01-25 02:19:29 +03:00
if ( this . httprequest . soptions . notifyTitle != null ) { notifyTitle = this . httprequest . soptions . notifyTitle ; }
if ( this . httprequest . soptions . notifyMsgDesktop != null ) { notifyMessage = this . httprequest . soptions . notifyMsgDesktop . replace ( '{0}' , this . httprequest . realname ) . replace ( '{1}' , this . httprequest . username ) ; }
2019-06-15 02:33:53 +03:00
}
2021-01-25 02:19:29 +03:00
try { require ( 'toaster' ) . Toast ( notifyTitle , notifyMessage , tsid ) ; } catch ( e ) { }
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 36 , null , "Started remote desktop without notification (" + this . httprequest . remoteaddr + ")" , this . httprequest ) ;
}
2021-01-25 08:51:22 +03:00
if ( this . httprequest . consent && ( this . httprequest . consent & 0x40 ) ) {
2021-01-25 02:19:29 +03:00
// Connection Bar is required
2021-01-25 08:51:22 +03:00
if ( this . httprequest . desktop . kvm . connectionBar ) {
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . connectionBar . removeAllListeners ( 'close' ) ;
this . httprequest . desktop . kvm . connectionBar . close ( ) ;
}
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . connectionBar = require ( 'notifybar-desktop' ) ( this . httprequest . privacybartext . replace ( '{0}' , this . httprequest . desktop . kvm . rusers . join ( ', ' ) ) . replace ( '{1}' , this . httprequest . desktop . kvm . users . join ( ', ' ) ) , require ( 'MeshAgent' ) . _tsid ) ;
MeshServerLogEx ( 37 , null , "Remote Desktop Connection Bar Activated/Updated (" + this . httprequest . remoteaddr + ")" , this . httprequest ) ;
}
2021-01-25 08:51:22 +03:00
catch ( e ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 38 , null , "Remote Desktop Connection Bar Failed or not Supported (" + this . httprequest . remoteaddr + ")" , this . httprequest ) ;
}
2021-01-25 08:51:22 +03:00
if ( this . httprequest . desktop . kvm . connectionBar ) {
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . connectionBar . httprequest = this . httprequest ;
2021-01-25 08:51:22 +03:00
this . httprequest . desktop . kvm . connectionBar . on ( 'close' , function ( ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 39 , null , "Remote Desktop Connection forcefully closed by local user (" + this . httprequest . remoteaddr + ")" , this . httprequest ) ;
2021-01-25 08:51:22 +03:00
for ( var i in this . httprequest . desktop . kvm . _pipedStreams ) {
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . _pipedStreams [ i ] . end ( ) ;
}
this . httprequest . desktop . kvm . end ( ) ;
} ) ;
2019-10-11 20:53:42 +03:00
}
2019-06-15 02:33:53 +03:00
}
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . kvm . pipe ( this , { dataTypeSkip : 1 } ) ;
}
2019-06-15 02:33:53 +03:00
2021-01-25 02:19:29 +03:00
this . removeAllListeners ( 'data' ) ;
this . on ( 'data' , onTunnelControlData ) ;
//this.write('MeshCore KVM Hello!1');
2019-05-21 02:00:33 +03:00
2021-01-25 08:51:22 +03:00
} else if ( this . httprequest . protocol == 5 ) {
2021-01-25 02:19:29 +03:00
//
// Remote Files
//
2020-05-21 23:22:58 +03:00
2021-01-25 02:19:29 +03:00
// Check user access rights for files
2021-01-25 08:51:22 +03:00
if ( ( ( this . httprequest . rights & MESHRIGHT _REMOTECONTROL ) == 0 ) || ( ( this . httprequest . rights != 0xFFFFFFFF ) && ( ( this . httprequest . rights & MESHRIGHT _NOFILES ) != 0 ) ) ) {
2021-01-25 02:19:29 +03:00
// Disengage this tunnel, user does not have the rights to do this!!
this . httprequest . protocol = 999999 ;
this . httprequest . s . end ( ) ;
sendConsoleText ( "Error: No files control rights." ) ;
return ;
}
2018-11-28 04:13:01 +03:00
2021-01-25 02:19:29 +03:00
this . descriptorMetadata = "Remote Files" ;
2020-05-21 23:22:58 +03:00
2021-01-25 02:19:29 +03:00
// Add the files session to the count to update the server
2021-01-25 08:51:22 +03:00
if ( this . httprequest . userid != null ) {
2021-01-25 02:19:29 +03:00
if ( tunnelUserCount . files [ this . httprequest . userid ] == null ) { tunnelUserCount . files [ this . httprequest . userid ] = 1 ; } else { tunnelUserCount . files [ this . httprequest . userid ] ++ ; }
try { mesh . SendCommand ( { action : 'sessions' , type : 'files' , value : tunnelUserCount . files } ) ; } catch ( e ) { }
broadcastSessionsToRegisteredApps ( ) ;
}
2021-01-25 08:51:22 +03:00
this . end = function ( ) {
2021-01-25 02:19:29 +03:00
// Remove the files session from the count to update the server
2021-01-25 08:51:22 +03:00
if ( this . httprequest . userid != null ) {
2021-01-25 02:19:29 +03:00
if ( tunnelUserCount . files [ this . httprequest . userid ] != null ) { tunnelUserCount . files [ this . httprequest . userid ] -- ; if ( tunnelUserCount . files [ this . httprequest . userid ] <= 0 ) { delete tunnelUserCount . files [ this . httprequest . userid ] ; } }
2020-10-01 02:59:34 +03:00
try { mesh . SendCommand ( { action : 'sessions' , type : 'files' , value : tunnelUserCount . files } ) ; } catch ( e ) { }
2020-10-12 08:24:30 +03:00
broadcastSessionsToRegisteredApps ( ) ;
2020-05-16 01:23:37 +03:00
}
2021-01-25 02:19:29 +03:00
} ;
2020-05-16 01:23:37 +03:00
2021-01-25 02:19:29 +03:00
// Perform notification if needed. Toast messages may not be supported on all platforms.
2021-01-25 08:51:22 +03:00
if ( this . httprequest . consent && ( this . httprequest . consent & 32 ) ) {
2021-01-25 02:19:29 +03:00
// User Consent Prompt is required
// Send a console message back using the console channel, "\n" is supported.
this . write ( JSON . stringify ( { ctrlChannel : '102938' , type : 'console' , msg : "Waiting for user to grant access..." , msgid : 1 } ) ) ;
var consentMessage = this . httprequest . realname + " requesting remote file Access. Grant access?" , consentTitle = 'MeshCentral' ;
2021-01-25 08:51:22 +03:00
if ( this . httprequest . soptions != null ) {
2021-01-25 02:19:29 +03:00
if ( this . httprequest . soptions . consentTitle != null ) { consentTitle = this . httprequest . soptions . consentTitle ; }
if ( this . httprequest . soptions . consentMsgFiles != null ) { consentMessage = this . httprequest . soptions . consentMsgFiles . replace ( '{0}' , this . httprequest . realname ) . replace ( '{1}' , this . httprequest . username ) ; }
}
var pr = require ( 'message-box' ) . create ( consentTitle , consentMessage , 30 ) ;
pr . ws = this ;
this . pause ( ) ;
this . _consentpromise = pr ;
this . prependOnceListener ( 'end' , function ( ) { if ( this . _consentpromise && this . _consentpromise . close ) { this . _consentpromise . close ( ) ; } } ) ;
pr . then (
2021-01-25 08:51:22 +03:00
function ( ) {
2021-01-25 02:19:29 +03:00
// Success
this . ws . _consentpromise = null ;
MeshServerLogEx ( 40 , null , "Starting remote files after local user accepted (" + this . ws . httprequest . remoteaddr + ")" , this . ws . httprequest ) ;
this . ws . write ( JSON . stringify ( { ctrlChannel : '102938' , type : 'console' , msg : null } ) ) ;
2021-01-25 08:51:22 +03:00
if ( this . ws . httprequest . consent && ( this . ws . httprequest . consent & 4 ) ) {
2021-01-25 02:19:29 +03:00
// User Notifications is required
var notifyMessage = this . ws . httprequest . realname + " started a remote file session." , notifyTitle = "MeshCentral" ;
2021-01-25 08:51:22 +03:00
if ( this . ws . httprequest . soptions != null ) {
2021-01-25 02:19:29 +03:00
if ( this . ws . httprequest . soptions . notifyTitle != null ) { notifyTitle = this . ws . httprequest . soptions . notifyTitle ; }
if ( this . ws . httprequest . soptions . notifyMsgFiles != null ) { notifyMessage = this . ws . httprequest . soptions . notifyMsgFiles . replace ( '{0}' , this . ws . httprequest . realname ) . replace ( '{1}' , this . ws . httprequest . username ) ; }
2019-06-15 02:33:53 +03:00
}
2021-01-25 02:19:29 +03:00
try { require ( 'toaster' ) . Toast ( notifyTitle , notifyMessage ) ; } catch ( e ) { }
2020-06-13 21:36:50 +03:00
}
2021-01-25 02:19:29 +03:00
this . ws . resume ( ) ;
} ,
2021-01-25 08:51:22 +03:00
function ( e ) {
2021-01-25 02:19:29 +03:00
// User Consent Denied/Failed
this . ws . _consentpromise = null ;
MeshServerLogEx ( 41 , null , "Failed to start remote files after local user rejected (" + this . ws . httprequest . remoteaddr + ")" , this . ws . httprequest ) ;
this . ws . end ( JSON . stringify ( { ctrlChannel : '102938' , type : 'console' , msg : e . toString ( ) , msgid : 2 } ) ) ;
} ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
// User Consent Prompt is not required
2021-01-25 08:51:22 +03:00
if ( this . httprequest . consent && ( this . httprequest . consent & 4 ) ) {
2021-01-25 02:19:29 +03:00
// User Notifications is required
MeshServerLogEx ( 42 , null , "Started remote files with toast notification (" + this . httprequest . remoteaddr + ")" , this . httprequest ) ;
var notifyMessage = this . httprequest . realname + " started a remote file session." , notifyTitle = "MeshCentral" ;
2021-01-25 08:51:22 +03:00
if ( this . httprequest . soptions != null ) {
2021-01-25 02:19:29 +03:00
if ( this . httprequest . soptions . notifyTitle != null ) { notifyTitle = this . httprequest . soptions . notifyTitle ; }
if ( this . httprequest . soptions . notifyMsgFiles != null ) { notifyMessage = this . httprequest . soptions . notifyMsgFiles . replace ( '{0}' , this . httprequest . realname ) . replace ( '{1}' , this . httprequest . username ) ; }
2019-06-15 02:33:53 +03:00
}
2021-01-25 02:19:29 +03:00
try { require ( 'toaster' ) . Toast ( notifyTitle , notifyMessage ) ; } catch ( e ) { }
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 43 , null , "Started remote files without notification (" + this . httprequest . remoteaddr + ")" , this . httprequest ) ;
2019-04-13 00:19:03 +03:00
}
2021-01-25 02:19:29 +03:00
this . resume ( ) ;
}
2019-04-13 00:19:03 +03:00
2021-01-25 02:19:29 +03:00
// Setup files
// NOP
}
2021-01-25 08:51:22 +03:00
} else if ( this . httprequest . protocol == 1 ) {
2021-01-25 02:19:29 +03:00
// Send data into terminal stdin
//this.write(data); // Echo back the keys (Does not seem to be a good idea)
2021-01-25 08:51:22 +03:00
} else if ( this . httprequest . protocol == 2 ) {
2021-01-25 02:19:29 +03:00
// Send data into remote desktop
2021-01-25 08:51:22 +03:00
if ( this . httprequest . desktop . state == 0 ) {
2021-01-25 02:19:29 +03:00
this . write ( Buffer . from ( String . fromCharCode ( 0x11 , 0xFE , 0x00 , 0x00 , 0x4D , 0x45 , 0x53 , 0x48 , 0x00 , 0x00 , 0x00 , 0x00 , 0x02 ) ) ) ;
this . httprequest . desktop . state = 1 ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
this . httprequest . desktop . write ( data ) ;
}
2021-01-25 08:51:22 +03:00
} else if ( this . httprequest . protocol == 5 ) {
2021-01-25 02:19:29 +03:00
// Process files commands
var cmd = null ;
try { cmd = JSON . parse ( data ) ; } catch ( e ) { } ;
if ( cmd == null ) { return ; }
if ( ( cmd . ctrlChannel == '102938' ) || ( ( cmd . type == 'offer' ) && ( cmd . sdp != null ) ) ) { onTunnelControlData ( cmd , this ) ; return ; } // If this is control data, handle it now.
if ( cmd . action == undefined ) { return ; }
//sendConsoleText('CMD: ' + JSON.stringify(cmd));
if ( ( cmd . path != null ) && ( process . platform != 'win32' ) && ( cmd . path [ 0 ] != '/' ) ) { cmd . path = '/' + cmd . path ; } // Add '/' to paths on non-windows
//console.log(objToString(cmd, 0, ' '));
2021-01-25 08:51:22 +03:00
switch ( cmd . action ) {
2021-01-25 02:19:29 +03:00
case 'ls' : {
/ *
// Close the watcher if required
var samepath = ( ( this . httprequest . watcher != undefined ) && ( cmd . path == this . httprequest . watcher . path ) ) ;
if ( ( this . httprequest . watcher != undefined ) && ( samepath == false ) ) {
//console.log('Closing watcher: ' + this.httprequest.watcher.path);
//this.httprequest.watcher.close(); // TODO: This line causes the agent to crash!!!!
delete this . httprequest . watcher ;
}
* /
// Send the folder content to the browser
var response = getDirectoryInfo ( cmd . path ) ;
if ( cmd . reqid != undefined ) { response . reqid = cmd . reqid ; }
this . write ( Buffer . from ( JSON . stringify ( response ) ) ) ;
/ *
// Start the directory watcher
if ( ( cmd . path != '' ) && ( samepath == false ) ) {
var watcher = fs . watch ( cmd . path , onFileWatcher ) ;
watcher . tunnel = this . httprequest ;
watcher . path = cmd . path ;
this . httprequest . watcher = watcher ;
//console.log('Starting watcher: ' + this.httprequest.watcher.path);
}
* /
break ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
case 'mkdir' : {
// Create a new empty folder
fs . mkdirSync ( cmd . path ) ;
MeshServerLogEx ( 44 , [ cmd . path ] , "Create folder: \"" + cmd . path + "\"" , this . httprequest ) ;
break ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
case 'rm' : {
// Delete, possibly recursive delete
2021-01-25 08:51:22 +03:00
for ( var i in cmd . delfiles ) {
2021-01-25 02:19:29 +03:00
var p = obj . path . join ( cmd . path , cmd . delfiles [ i ] ) , delcount = 0 ;
try { delcount = deleteFolderRecursive ( p , cmd . rec ) ; } catch ( e ) { }
2021-01-25 08:51:22 +03:00
if ( ( delcount == 1 ) && ! cmd . rec ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 45 , [ p ] , "Delete: \"" + p + "\"" , this . httprequest ) ;
2021-01-25 08:51:22 +03:00
} else {
if ( cmd . rec ) {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 46 , [ p , delcount ] , "Delete recursive: \"" + p + "\", " + delcount + " element(s) removed" , this . httprequest ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( 47 , [ p , delcount ] , "Delete: \"" + p + "\", " + delcount + " element(s) removed" , this . httprequest ) ;
}
2017-08-28 19:27:45 +03:00
}
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'markcoredump' : {
// If we are asking for the coredump file, set the right path.
var coreDumpPath = null ;
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
if ( fs . existsSync ( process . coreDumpLocation ) ) { coreDumpPath = process . coreDumpLocation ; }
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
if ( ( process . cwd ( ) != '//' ) && fs . existsSync ( process . cwd ( ) + 'core' ) ) { coreDumpPath = process . cwd ( ) + 'core' ; }
}
if ( coreDumpPath != null ) { db . Put ( 'CoreDumpTime' , require ( 'fs' ) . statSync ( coreDumpPath ) . mtime ) ; }
break ;
}
case 'rename' :
{
// Rename a file or folder
var oldfullpath = obj . path . join ( cmd . path , cmd . oldname ) ;
var newfullpath = obj . path . join ( cmd . path , cmd . newname ) ;
MeshServerLogEx ( 48 , [ oldfullpath , cmd . newname ] , 'Rename: \"' + oldfullpath + '\" to \"' + cmd . newname + '\"' , this . httprequest ) ;
try { fs . renameSync ( oldfullpath , newfullpath ) ; } catch ( e ) { console . log ( e ) ; }
2017-08-28 19:27:45 +03:00
break ;
}
2021-01-25 02:19:29 +03:00
case 'findfile' :
{
// Search for files
var r = require ( 'file-search' ) . find ( '"' + cmd . path + '"' , cmd . filter ) ;
if ( ! r . cancel ) { r . cancel = function cancel ( ) { this . child . kill ( ) ; } ; }
this . _search = r ;
r . socket = this ;
r . socket . reqid = cmd . reqid ; // Search request id. This is used to send responses and cancel the request.
r . socket . path = cmd . path ; // Search path
r . on ( 'result' , function ( str ) { try { this . socket . write ( Buffer . from ( JSON . stringify ( { action : 'findfile' , r : str . substring ( this . socket . path . length ) , reqid : this . socket . reqid } ) ) ) ; } catch ( ex ) { } } ) ;
r . then ( function ( ) { try { this . socket . write ( Buffer . from ( JSON . stringify ( { action : 'findfile' , r : null , reqid : this . socket . reqid } ) ) ) ; } catch ( ex ) { } } ) ;
2017-08-28 19:27:45 +03:00
break ;
}
2021-01-25 02:19:29 +03:00
case 'cancelfindfile' :
{
if ( this . _search ) { this . _search . cancel ( ) ; this . _search = null ; }
2020-07-08 09:56:08 +03:00
break ;
}
2021-01-25 02:19:29 +03:00
case 'download' :
{
// Download a file
var sendNextBlock = 0 ;
2021-01-25 08:51:22 +03:00
if ( cmd . sub == 'start' ) { // Setup the download
if ( ( cmd . path == null ) && ( cmd . ask == 'coredump' ) ) { // If we are asking for the coredump file, set the right path.
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
if ( fs . existsSync ( process . coreDumpLocation ) ) { cmd . path = process . coreDumpLocation ; }
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
if ( ( process . cwd ( ) != '//' ) && fs . existsSync ( process . cwd ( ) + 'core' ) ) { cmd . path = process . cwd ( ) + 'core' ; }
2021-01-18 05:36:53 +03:00
}
}
2021-01-25 02:19:29 +03:00
MeshServerLogEx ( ( cmd . ask == 'coredump' ) ? 104 : 49 , [ cmd . path ] , 'Download: \"' + cmd . path + '\"' , this . httprequest ) ;
if ( ( cmd . path == null ) || ( this . filedownload != null ) ) { this . write ( { action : 'download' , sub : 'cancel' , id : this . filedownload . id } ) ; delete this . filedownload ; }
this . filedownload = { id : cmd . id , path : cmd . path , ptr : 0 }
try { this . filedownload . f = fs . openSync ( this . filedownload . path , 'rbN' ) ; } catch ( e ) { this . write ( { action : 'download' , sub : 'cancel' , id : this . filedownload . id } ) ; delete this . filedownload ; }
if ( this . filedownload ) { this . write ( { action : 'download' , sub : 'start' , id : cmd . id } ) ; }
2021-01-25 08:51:22 +03:00
} else if ( ( this . filedownload != null ) && ( cmd . id == this . filedownload . id ) ) { // Download commands
2021-01-25 02:19:29 +03:00
if ( cmd . sub == 'startack' ) { sendNextBlock = ( ( typeof cmd . ack == 'number' ) ? cmd . ack : 8 ) ; } else if ( cmd . sub == 'stop' ) { delete this . filedownload ; } else if ( cmd . sub == 'ack' ) { sendNextBlock = 1 ; }
2021-01-18 05:36:53 +03:00
}
2021-01-25 02:19:29 +03:00
// Send the next download block(s)
2021-01-25 08:51:22 +03:00
while ( sendNextBlock > 0 ) {
2021-01-25 02:19:29 +03:00
sendNextBlock -- ;
var buf = Buffer . alloc ( 16384 ) ;
var len = fs . readSync ( this . filedownload . f , buf , 4 , 16380 , null ) ;
this . filedownload . ptr += len ;
if ( len < 16380 ) { buf . writeInt32BE ( 0x01000001 , 0 ) ; fs . closeSync ( this . filedownload . f ) ; delete this . filedownload ; sendNextBlock = 0 ; } else { buf . writeInt32BE ( 0x01000000 , 0 ) ; }
this . write ( buf . slice ( 0 , len + 4 ) ) ; // Write as binary
2021-01-15 10:57:52 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'upload' :
{
// Upload a file, browser to agent
if ( this . httprequest . uploadFile != null ) { fs . closeSync ( this . httprequest . uploadFile ) ; delete this . httprequest . uploadFile ; }
if ( cmd . path == undefined ) break ;
var filepath = cmd . name ? obj . path . join ( cmd . path , cmd . name ) : cmd . path ;
this . httprequest . uploadFilePath = filepath ;
2021-01-25 09:46:54 +03:00
this . httprequest . uploadFileSize = 0 ;
2021-01-25 02:19:29 +03:00
try { this . httprequest . uploadFile = fs . openSync ( filepath , 'wbN' ) ; } catch ( e ) { this . write ( Buffer . from ( JSON . stringify ( { action : 'uploaderror' , reqid : cmd . reqid } ) ) ) ; break ; }
this . httprequest . uploadFileid = cmd . reqid ;
if ( this . httprequest . uploadFile ) { this . write ( Buffer . from ( JSON . stringify ( { action : 'uploadstart' , reqid : this . httprequest . uploadFileid } ) ) ) ; }
break ;
}
case 'uploaddone' :
{
// Indicates that an upload is done
2021-01-25 08:51:22 +03:00
if ( this . httprequest . uploadFile ) {
2021-01-25 09:46:54 +03:00
MeshServerLogEx ( 105 , [ this . httprequest . uploadFilePath , this . httprequest . uploadFileSize ] , 'Upload: \"' + this . httprequest . uploadFilePath + '\", Size: ' + this . httprequest . uploadFileSize , this . httprequest ) ;
2021-01-25 02:19:29 +03:00
fs . closeSync ( this . httprequest . uploadFile ) ;
this . write ( Buffer . from ( JSON . stringify ( { action : 'uploaddone' , reqid : this . httprequest . uploadFileid } ) ) ) ; // Indicate that we closed the file.
delete this . httprequest . uploadFile ;
delete this . httprequest . uploadFileid ;
delete this . httprequest . uploadFilePath ;
2021-01-25 09:46:54 +03:00
delete this . httprequest . uploadFileSize ;
2020-08-13 22:29:18 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'uploadcancel' :
{
// Indicates that an upload is canceled
2021-01-25 08:51:22 +03:00
if ( this . httprequest . uploadFile ) {
2021-01-25 02:19:29 +03:00
fs . closeSync ( this . httprequest . uploadFile ) ;
fs . unlinkSync ( this . httprequest . uploadFilePath ) ;
this . write ( Buffer . from ( JSON . stringify ( { action : 'uploadcancel' , reqid : this . httprequest . uploadFileid } ) ) ) ; // Indicate that we closed the file.
delete this . httprequest . uploadFile ;
delete this . httprequest . uploadFileid ;
delete this . httprequest . uploadFilePath ;
2021-01-25 09:46:54 +03:00
delete this . httprequest . uploadFileSize ;
2020-08-13 22:29:18 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'copy' :
{
// Copy a bunch of files from scpath to dspath
2021-01-25 08:51:22 +03:00
for ( var i in cmd . names ) {
2021-01-25 02:19:29 +03:00
var sc = obj . path . join ( cmd . scpath , cmd . names [ i ] ) , ds = obj . path . join ( cmd . dspath , cmd . names [ i ] ) ;
MeshServerLogEx ( 51 , [ sc , ds ] , 'Copy: \"' + sc + '\" to \"' + ds + '\"' , this . httprequest ) ;
if ( sc != ds ) { try { fs . copyFileSync ( sc , ds ) ; } catch ( e ) { } }
2018-04-03 01:34:32 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'move' :
{
// Move a bunch of files from scpath to dspath
2021-01-25 08:51:22 +03:00
for ( var i in cmd . names ) {
2021-01-25 02:19:29 +03:00
var sc = obj . path . join ( cmd . scpath , cmd . names [ i ] ) , ds = obj . path . join ( cmd . dspath , cmd . names [ i ] ) ;
MeshServerLogEx ( 52 , [ sc , ds ] , 'Move: \"' + sc + '\" to \"' + ds + '\"' , this . httprequest ) ;
if ( sc != ds ) { try { fs . copyFileSync ( sc , ds ) ; fs . unlinkSync ( sc ) ; } catch ( e ) { } }
2018-04-03 01:34:32 +03:00
}
2019-10-10 21:13:25 +03:00
break ;
}
2021-01-25 02:19:29 +03:00
case 'zip' :
// Zip a bunch of files
if ( this . zip != null ) return ; // Zip operating is currently running, exit now.
// Check that the specified files exist & build full paths
var fp , stat , p = [ ] ;
for ( var i in cmd . files ) { fp = cmd . path + '/' + cmd . files [ i ] ; stat = null ; try { stat = fs . statSync ( fp ) ; } catch ( e ) { } if ( stat != null ) { p . push ( fp ) ; } }
if ( p . length == 0 ) return ; // No files, quit now.
// Setup file compression
var ofile = cmd . path + '/' + cmd . output ;
this . write ( Buffer . from ( JSON . stringify ( { action : 'dialogmessage' , msg : 'zipping' } ) ) ) ;
this . zipfile = ofile ;
delete this . zipcancel ;
var out = require ( 'fs' ) . createWriteStream ( ofile , { flags : 'wb' } ) ;
out . xws = this ;
2021-01-25 08:51:22 +03:00
out . on ( 'close' , function ( ) {
2021-01-25 02:19:29 +03:00
this . xws . write ( Buffer . from ( JSON . stringify ( { action : 'dialogmessage' , msg : null } ) ) ) ;
this . xws . write ( Buffer . from ( JSON . stringify ( { action : 'refresh' } ) ) ) ;
if ( this . xws . zipcancel === true ) { fs . unlinkSync ( this . xws . zipfile ) ; } // Delete the complete file.
delete this . xws . zipcancel ;
delete this . xws . zipfile ;
delete this . xws . zip ;
} ) ;
this . zip = require ( 'zip-writer' ) . write ( { files : p , basePath : cmd . path } ) ;
this . zip . xws = this ;
this . zip . on ( 'progress' , require ( 'events' ) . moderated ( function ( name , p ) { this . xws . write ( Buffer . from ( JSON . stringify ( { action : 'dialogmessage' , msg : 'zippingFile' , file : ( ( process . platform == 'win32' ) ? ( name . split ( '/' ) . join ( '\\' ) ) : name ) , progress : p } ) ) ) ; } , 1000 ) ) ;
this . zip . pipe ( out ) ;
break ;
case 'cancel' :
// Cancel zip operation if present
try { this . zipcancel = true ; this . zip . cancel ( function ( ) { } ) ; } catch ( e ) { }
this . zip = null ;
break ;
default :
// Unknown action, ignore it.
break ;
}
2021-01-25 08:51:22 +03:00
} else if ( this . httprequest . protocol == 7 ) { // Plugin data exchange
2021-01-25 02:19:29 +03:00
var cmd = null ;
try { cmd = JSON . parse ( data ) ; } catch ( e ) { } ;
if ( cmd == null ) { return ; }
if ( ( cmd . ctrlChannel == '102938' ) || ( ( cmd . type == 'offer' ) && ( cmd . sdp != null ) ) ) { onTunnelControlData ( cmd , this ) ; return ; } // If this is control data, handle it now.
if ( cmd . action == undefined ) return ;
2021-01-25 08:51:22 +03:00
switch ( cmd . action ) {
2021-01-25 02:19:29 +03:00
case 'plugin' : {
try { require ( cmd . plugin ) . consoleaction ( cmd , null , null , this ) ; } catch ( e ) { throw e ; }
break ;
}
default : {
// probably shouldn't happen, but just in case this feature is expanded
2019-10-10 21:13:25 +03:00
}
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
//sendConsoleText("Got tunnel #" + this.httprequest.index + " data: " + data, this.httprequest.sessionid);
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
}
2018-01-17 04:30:34 +03:00
2021-01-25 02:19:29 +03:00
// Delete a directory with a files and directories within it
2021-01-25 08:51:22 +03:00
function deleteFolderRecursive ( path , rec ) {
2021-01-25 02:19:29 +03:00
var count = 0 ;
2021-01-25 08:51:22 +03:00
if ( fs . existsSync ( path ) ) {
if ( rec == true ) {
fs . readdirSync ( obj . path . join ( path , '*' ) ) . forEach ( function ( file , index ) {
2021-01-25 02:19:29 +03:00
var curPath = obj . path . join ( path , file ) ;
2021-01-25 08:51:22 +03:00
if ( fs . statSync ( curPath ) . isDirectory ( ) ) { // recurse
2021-01-25 02:19:29 +03:00
count += deleteFolderRecursive ( curPath , true ) ;
2021-01-25 08:51:22 +03:00
} else { // delete file
2021-01-25 02:19:29 +03:00
fs . unlinkSync ( curPath ) ;
count ++ ;
}
} ) ;
2019-03-14 22:28:58 +03:00
}
2021-01-25 02:19:29 +03:00
fs . unlinkSync ( path ) ;
count ++ ;
}
return count ;
}
2019-03-14 22:28:58 +03:00
2021-01-25 02:19:29 +03:00
// Called when receiving control data on WebRTC
2021-01-25 08:51:22 +03:00
function onTunnelWebRTCControlData ( data ) {
2021-01-25 02:19:29 +03:00
if ( typeof data != 'string' ) return ;
var obj ;
try { obj = JSON . parse ( data ) ; } catch ( e ) { sendConsoleText ( 'Invalid control JSON on WebRTC: ' + data ) ; return ; }
2021-01-25 08:51:22 +03:00
if ( obj . type == 'close' ) {
2021-01-25 02:19:29 +03:00
//sendConsoleText('Tunnel #' + this.xrtc.websocket.tunnel.index + ' WebRTC control close');
try { this . close ( ) ; } catch ( e ) { }
try { this . xrtc . close ( ) ; } catch ( e ) { }
2018-01-19 02:43:43 +03:00
}
2021-01-25 02:19:29 +03:00
}
2018-01-19 02:43:43 +03:00
2021-01-25 02:19:29 +03:00
// Called when receiving control data on websocket
2021-01-25 08:51:22 +03:00
function onTunnelControlData ( data , ws ) {
2021-01-25 02:19:29 +03:00
var obj ;
if ( ws == null ) { ws = this ; }
if ( typeof data == 'string' ) { try { obj = JSON . parse ( data ) ; } catch ( e ) { sendConsoleText ( 'Invalid control JSON: ' + data ) ; return ; } }
else if ( typeof data == 'object' ) { obj = data ; } else { return ; }
2021-04-27 05:01:40 +03:00
//sendConsoleText('onTunnelControlData(' + ws.httprequest.protocol + '): ' + JSON.stringify(data));
2021-01-25 02:19:29 +03:00
//console.log('onTunnelControlData: ' + JSON.stringify(data));
2021-01-25 08:51:22 +03:00
switch ( obj . type ) {
2021-04-27 04:27:51 +03:00
case 'lock' : {
// Look for a TSID
var tsid = null ;
if ( ( ws . httprequest . xoptions != null ) && ( typeof ws . httprequest . xoptions . tsid == 'number' ) ) { tsid = ws . httprequest . xoptions . tsid ; }
// Lock the current user out of the desktop
try {
if ( process . platform == 'win32' ) {
MeshServerLogEx ( 53 , null , "Locking remote user out of desktop" , ws . httprequest ) ;
var child = require ( 'child_process' ) ;
child . execFile ( process . env [ 'windir' ] + '\\system32\\cmd.exe' , [ '/c' , 'RunDll32.exe user32.dll,LockWorkStation' ] , { type : 1 , uid : tsid } ) ;
}
} catch ( e ) { }
break ;
}
2021-01-25 02:19:29 +03:00
case 'options' : {
// These are additional connection options passed in the control channel.
//sendConsoleText('options: ' + JSON.stringify(obj));
delete obj . type ;
ws . httprequest . xoptions = obj ;
2020-04-15 05:12:14 +03:00
2021-01-25 02:19:29 +03:00
// Set additional user consent options if present
if ( ( obj != null ) && ( typeof obj . consent == 'number' ) ) { ws . httprequest . consent |= obj . consent ; }
2020-04-15 05:12:14 +03:00
2021-01-25 02:19:29 +03:00
break ;
}
case 'close' : {
// We received the close on the websocket
//sendConsoleText('Tunnel #' + ws.tunnel.index + ' WebSocket control close');
try { ws . close ( ) ; } catch ( e ) { }
break ;
}
case 'termsize' : {
// Indicates a change in terminal size
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
if ( ws . httprequest . _dispatcher == null ) return ;
//sendConsoleText('Win32-TermSize: ' + obj.cols + 'x' + obj.rows);
if ( ws . httprequest . _dispatcher . invoke ) { ws . httprequest . _dispatcher . invoke ( 'resizeTerminal' , [ obj . cols , obj . rows ] ) ; }
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
if ( ws . httprequest . process == null || ws . httprequest . process . pty == 0 ) return ;
//sendConsoleText('Linux Resize: ' + obj.cols + 'x' + obj.rows);
if ( ws . httprequest . process . tcsetsize ) { ws . httprequest . process . tcsetsize ( obj . rows , obj . cols ) ; }
2018-02-05 22:56:29 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'webrtc0' : { // Browser indicates we can start WebRTC switch-over.
2021-01-25 08:51:22 +03:00
if ( ws . httprequest . protocol == 1 ) { // Terminal
2021-01-25 02:19:29 +03:00
// This is a terminal data stream, unpipe the terminal now and indicate to the other side that terminal data will no longer be received over WebSocket
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
ws . httprequest . _term . unpipe ( ws ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
ws . httprequest . process . stdout . unpipe ( ws ) ;
ws . httprequest . process . stderr . unpipe ( ws ) ;
}
2021-01-25 08:51:22 +03:00
} else if ( ws . httprequest . protocol == 2 ) { // Desktop
2021-01-25 02:19:29 +03:00
// This is a KVM data stream, unpipe the KVM now and indicate to the other side that KVM data will no longer be received over WebSocket
ws . httprequest . desktop . kvm . unpipe ( ws ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
// Switch things around so all WebRTC data goes to onTunnelData().
ws . rtcchannel . httprequest = ws . httprequest ;
ws . rtcchannel . removeAllListeners ( 'data' ) ;
ws . rtcchannel . on ( 'data' , onTunnelData ) ;
2020-01-24 23:49:41 +03:00
}
2021-01-25 02:19:29 +03:00
ws . write ( "{\"ctrlChannel\":\"102938\",\"type\":\"webrtc1\"}" ) ; // End of data marker
break ;
}
case 'webrtc1' : {
2021-01-25 08:51:22 +03:00
if ( ( ws . httprequest . protocol == 1 ) || ( ws . httprequest . protocol == 6 ) ) { // Terminal
2021-01-25 02:19:29 +03:00
// Switch the user input from websocket to webrtc at this point.
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
ws . unpipe ( ws . httprequest . _term ) ;
ws . rtcchannel . pipe ( ws . httprequest . _term , { dataTypeSkip : 1 } ) ; // 0 = Binary, 1 = Text.
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
ws . unpipe ( ws . httprequest . process . stdin ) ;
ws . rtcchannel . pipe ( ws . httprequest . process . stdin , { dataTypeSkip : 1 } ) ; // 0 = Binary, 1 = Text.
2018-12-13 02:34:42 +03:00
}
2021-01-25 02:19:29 +03:00
ws . resume ( ) ; // Resume the websocket to keep receiving control data
2021-01-25 08:51:22 +03:00
} else if ( ws . httprequest . protocol == 2 ) { // Desktop
2021-01-25 02:19:29 +03:00
// Switch the user input from websocket to webrtc at this point.
ws . unpipe ( ws . httprequest . desktop . kvm ) ;
try { ws . webrtc . rtcchannel . pipe ( ws . httprequest . desktop . kvm , { dataTypeSkip : 1 , end : false } ) ; } catch ( e ) { sendConsoleText ( 'EX2' ) ; } // 0 = Binary, 1 = Text.
ws . resume ( ) ; // Resume the websocket to keep receiving control data
2018-01-19 02:43:43 +03:00
}
2021-01-25 02:19:29 +03:00
ws . write ( '{\"ctrlChannel\":\"102938\",\"type\":\"webrtc2\"}' ) ; // Indicates we will no longer get any data on websocket, switching to WebRTC at this point.
break ;
}
case 'webrtc2' : {
// Other side received websocket end of data marker, start sending data on WebRTC channel
2021-01-25 08:51:22 +03:00
if ( ( ws . httprequest . protocol == 1 ) || ( ws . httprequest . protocol == 6 ) ) { // Terminal
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
ws . httprequest . _term . pipe ( ws . webrtc . rtcchannel , { dataTypeSkip : 1 , end : false } ) ; // 0 = Binary, 1 = Text.
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
ws . httprequest . process . stdout . pipe ( ws . webrtc . rtcchannel , { dataTypeSkip : 1 , end : false } ) ; // 0 = Binary, 1 = Text.
ws . httprequest . process . stderr . pipe ( ws . webrtc . rtcchannel , { dataTypeSkip : 1 , end : false } ) ; // 0 = Binary, 1 = Text.
2018-12-13 02:34:42 +03:00
}
2021-01-25 08:51:22 +03:00
} else if ( ws . httprequest . protocol == 2 ) { // Desktop
2021-01-25 02:19:29 +03:00
ws . httprequest . desktop . kvm . pipe ( ws . webrtc . rtcchannel , { dataTypeSkip : 1 } ) ; // 0 = Binary, 1 = Text.
2020-01-24 23:49:41 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'offer' : {
// This is a WebRTC offer.
if ( ( ws . httprequest . protocol == 1 ) || ( ws . httprequest . protocol == 6 ) ) return ; // TODO: Terminal is currently broken with WebRTC. Reject WebRTC upgrade for now.
ws . webrtc = rtc . createConnection ( ) ;
ws . webrtc . websocket = ws ;
ws . webrtc . on ( 'connected' , function ( ) { /*sendConsoleText('Tunnel #' + this.websocket.tunnel.index + ' WebRTC connected');*/ } ) ;
ws . webrtc . on ( 'disconnected' , function ( ) { /*sendConsoleText('Tunnel #' + this.websocket.tunnel.index + ' WebRTC disconnected');*/ } ) ;
2021-01-25 08:51:22 +03:00
ws . webrtc . on ( 'dataChannel' , function ( rtcchannel ) {
2021-01-25 02:19:29 +03:00
//sendConsoleText('WebRTC Datachannel open, protocol: ' + this.websocket.httprequest.protocol);
rtcchannel . maxFragmentSize = 32768 ;
rtcchannel . xrtc = this ;
rtcchannel . websocket = this . websocket ;
this . rtcchannel = rtcchannel ;
this . websocket . rtcchannel = rtcchannel ;
this . websocket . rtcchannel . on ( 'data' , onTunnelWebRTCControlData ) ;
2021-01-25 08:51:22 +03:00
this . websocket . rtcchannel . on ( 'end' , function ( ) {
2021-01-25 02:19:29 +03:00
// The WebRTC channel closed, unpipe the KVM now. This is also done when the web socket closes.
//sendConsoleText('Tunnel #' + this.websocket.tunnel.index + ' WebRTC data channel closed');
2021-01-25 08:51:22 +03:00
if ( this . websocket . desktop && this . websocket . desktop . kvm ) {
try {
2021-01-25 02:19:29 +03:00
this . unpipe ( this . websocket . desktop . kvm ) ;
this . websocket . httprequest . desktop . kvm . unpipe ( this ) ;
}
catch ( e ) { }
2020-01-24 23:49:41 +03:00
}
2021-01-25 02:19:29 +03:00
} ) ;
this . websocket . write ( '{\"ctrlChannel\":\"102938\",\"type\":\"webrtc0\"}' ) ; // Indicate we are ready for WebRTC switch-over.
} ) ;
var sdp = null ;
try { sdp = ws . webrtc . setOffer ( obj . sdp ) ; } catch ( e ) { }
if ( sdp != null ) { ws . write ( { type : 'answer' , ctrlChannel : '102938' , sdp : sdp } ) ; }
break ;
}
case 'ping' : {
ws . write ( "{\"ctrlChannel\":\"102938\",\"type\":\"pong\"}" ) ; // Send pong response
break ;
}
case 'pong' : { // NOP
break ;
}
case 'rtt' : {
ws . write ( { type : 'rtt' , ctrlChannel : '102938' , time : obj . time } ) ;
break ;
}
}
}
// Console state
var consoleWebSockets = { } ;
var consoleHttpRequest = null ;
// Console HTTP response
2021-01-25 08:51:22 +03:00
function consoleHttpResponse ( response ) {
2021-01-25 02:19:29 +03:00
response . data = function ( data ) { sendConsoleText ( rstr2hex ( buf2rstr ( data ) ) , this . sessionid ) ; consoleHttpRequest = null ; }
response . close = function ( ) { sendConsoleText ( 'httprequest.response.close' , this . sessionid ) ; consoleHttpRequest = null ; }
}
// Open a web browser to a specified URL on current user's desktop
2021-01-25 08:51:22 +03:00
function openUserDesktopUrl ( url ) {
2021-01-25 02:19:29 +03:00
if ( ( url . toLowerCase ( ) . startsWith ( 'http://' ) == false ) && ( url . toLowerCase ( ) . startsWith ( 'https://' ) == false ) ) { return null ; }
var child = null ;
2021-01-25 08:51:22 +03:00
try {
switch ( process . platform ) {
2021-01-25 02:19:29 +03:00
case 'win32' :
2021-04-19 20:55:09 +03:00
var uid = require ( 'user-sessions' ) . consoleUid ( ) ;
var user = require ( 'user-sessions' ) . getUsername ( uid ) ;
var domain = require ( 'user-sessions' ) . getDomain ( uid ) ;
var taskoptions = { env : { _target : process . env [ 'windir' ] + '\\system32\\cmd.exe' , _args : '/C START ' + url . split ( '&' ) . join ( '^&' ) , _user : '"' + domain + '\\' + user + '"' } } ;
2021-04-24 20:53:13 +03:00
for ( var c1e in process . env ) {
2021-02-03 22:21:08 +03:00
taskoptions . env [ c1e ] = process . env [ c1e ] ;
}
var child = require ( 'child_process' ) . execFile ( process . env [ 'windir' ] + '\\System32\\WindowsPowerShell\\v1.0\\powershell.exe' , [ 'powershell' , '-noprofile' , '-nologo' , '-command' , '-' ] , taskoptions ) ;
child . stderr . on ( 'data' , function ( c ) { } ) ;
child . stdout . on ( 'data' , function ( c ) { } ) ;
child . stdin . write ( 'SCHTASKS /CREATE /F /TN MeshChatTask /SC ONCE /ST 00:00 ' ) ;
if ( user ) { child . stdin . write ( '/RU $env:_user ' ) ; }
child . stdin . write ( '/TR "$env:_target $env:_args"\r\n' ) ;
child . stdin . write ( '$ts = New-Object -ComObject Schedule.service\r\n' ) ;
child . stdin . write ( '$ts.connect()\r\n' ) ;
child . stdin . write ( '$tsfolder = $ts.getfolder("\\")\r\n' ) ;
child . stdin . write ( '$task = $tsfolder.GetTask("MeshChatTask")\r\n' ) ;
child . stdin . write ( '$taskdef = $task.Definition\r\n' ) ;
child . stdin . write ( '$taskdef.Settings.StopIfGoingOnBatteries = $false\r\n' ) ;
child . stdin . write ( '$taskdef.Settings.DisallowStartIfOnBatteries = $false\r\n' ) ;
child . stdin . write ( '$taskdef.Actions.Item(1).Path = $env:_target\r\n' ) ;
child . stdin . write ( '$taskdef.Actions.Item(1).Arguments = $env:_args\r\n' ) ;
child . stdin . write ( '$tsfolder.RegisterTaskDefinition($task.Name, $taskdef, 4, $null, $null, $null)\r\n' ) ;
2021-01-25 02:19:29 +03:00
child . stdin . write ( 'SCHTASKS /RUN /TN MeshChatTask\r\n' ) ;
2021-02-03 22:21:08 +03:00
child . stdin . write ( 'SCHTASKS /DELETE /F /TN MeshChatTask\r\nexit\r\n' ) ;
2021-01-25 02:19:29 +03:00
child . waitExit ( ) ;
break ;
case 'linux' :
child = require ( 'child_process' ) . execFile ( '/usr/bin/xdg-open' , [ 'xdg-open' , url ] , { uid : require ( 'user-sessions' ) . consoleUid ( ) } ) ;
break ;
case 'darwin' :
child = require ( 'child_process' ) . execFile ( '/usr/bin/open' , [ 'open' , url ] , { uid : require ( 'user-sessions' ) . consoleUid ( ) } ) ;
break ;
default :
// Unknown platform, ignore this command.
break ;
}
} catch ( e ) { }
return child ;
}
// Process a mesh agent console command
2021-01-25 08:51:22 +03:00
function processConsoleCommand ( cmd , args , rights , sessionid ) {
try {
2021-01-25 02:19:29 +03:00
var response = null ;
2021-01-25 08:51:22 +03:00
switch ( cmd ) {
2021-01-25 02:19:29 +03:00
case 'help' : { // Displays available commands
2021-04-14 04:14:13 +03:00
var fin = '' , f = '' , availcommands = 'agentupdate,errorlog,msh,timerinfo,coreinfo,coredump,service,fdsnapshot,fdcount,startupoptions,alert,agentsize,versions,help,info,osinfo,args,print,type,dbkeys,dbget,dbset,dbcompact,eval,parseuri,httpget,wslist,plugin,wsconnect,wssend,wsclose,notify,ls,ps,kill,netinfo,location,power,wakeonlan,setdebug,smbios,rawsmbios,toast,lock,users,openurl,getscript,getclip,setclip,log,av,cpuinfo,sysinfo,apf,scanwifi,wallpaper,agentmsg' ;
2021-01-27 01:39:39 +03:00
if ( require ( 'os' ) . dns != null ) { availcommands += ',dnsinfo' ; }
2021-04-24 04:23:18 +03:00
if ( process . platform == 'win32' ) { availcommands += ',cs,safemode,wpfhwacceleration,uac' ; }
2021-01-25 02:19:29 +03:00
if ( amt != null ) { availcommands += ',amt,amtconfig,amtevents' ; }
if ( process . platform != 'freebsd' ) { availcommands += ',vm' ; }
if ( require ( 'MeshAgent' ) . maxKvmTileSize != null ) { availcommands += ',kvmmode' ; }
try { require ( 'zip-reader' ) ; availcommands += ',zip,unzip' ; } catch ( e ) { }
availcommands = availcommands . split ( ',' ) . sort ( ) ;
2021-01-25 08:51:22 +03:00
while ( availcommands . length > 0 ) {
2021-01-25 02:19:29 +03:00
if ( f . length > 90 ) { fin += ( f + ',\r\n' ) ; f = '' ; }
f += ( ( ( f != '' ) ? ', ' : ' ' ) + availcommands . shift ( ) ) ;
2018-12-13 02:34:42 +03:00
}
2021-01-25 02:19:29 +03:00
if ( f != '' ) { fin += f ; }
response = "Available commands: \r\n" + fin + "." ;
2020-01-24 23:49:41 +03:00
break ;
2018-01-19 02:43:43 +03:00
}
2021-04-24 04:23:18 +03:00
case 'cs' :
2021-04-24 20:53:13 +03:00
if ( process . platform != 'win32' ) {
2021-04-24 04:23:18 +03:00
response = 'Unknown command "cs", type "help" for list of avaialble commands.' ;
break ;
}
2021-04-24 20:53:13 +03:00
switch ( args [ '_' ] . length ) {
2021-04-24 04:23:18 +03:00
case 0 :
2021-04-24 20:53:13 +03:00
try {
2021-04-24 04:23:18 +03:00
var cs = require ( 'win-registry' ) . QueryKey ( require ( 'win-registry' ) . HKEY . LocalMachine , 'System\\CurrentControlSet\\Control\\Power' , 'CsEnabled' ) ;
response = "Connected Standby: " + ( cs == 1 ? "ENABLED" : "DISABLED" ) ;
}
2021-04-24 20:53:13 +03:00
catch ( e ) {
2021-04-24 04:23:18 +03:00
response = "This machine does not support Connected Standby" ;
}
break ;
case 1 :
2021-04-24 20:53:13 +03:00
if ( ( args [ '_' ] [ 0 ] . toUpperCase ( ) != 'ENABLE' && args [ '_' ] [ 0 ] . toUpperCase ( ) != 'DISABLE' ) ) {
2021-04-24 04:23:18 +03:00
response = "Proper usage:\r\n cs [ENABLE|DISABLE]" ;
}
2021-04-24 20:53:13 +03:00
else {
try {
2021-04-24 04:23:18 +03:00
var cs = require ( 'win-registry' ) . QueryKey ( require ( 'win-registry' ) . HKEY . LocalMachine , 'System\\CurrentControlSet\\Control\\Power' , 'CsEnabled' ) ;
require ( 'win-registry' ) . WriteKey ( require ( 'win-registry' ) . HKEY . LocalMachine , 'System\\CurrentControlSet\\Control\\Power' , 'CsEnabled' , args [ '_' ] [ 0 ] . toUpperCase ( ) == 'ENABLE' ? 1 : 0 ) ;
cs = require ( 'win-registry' ) . QueryKey ( require ( 'win-registry' ) . HKEY . LocalMachine , 'System\\CurrentControlSet\\Control\\Power' , 'CsEnabled' ) ;
response = "Connected Standby: " + ( cs == 1 ? "ENABLED" : "DISABLED" ) ;
}
2021-04-24 20:53:13 +03:00
catch ( e ) {
2021-04-24 04:23:18 +03:00
response = "This machine does not support Connected Standby" ;
}
}
break ;
default :
response = "Proper usage:\r\n cs [ENABLE|DISABLE]" ;
break ;
}
break ;
2021-04-27 10:53:04 +03:00
case 'assistant' :
if ( process . platform == 'win32' ) {
// Install MeshCentral Assistant on this device
response = "Usage: Assistant [info|install|uninstall]" ;
if ( args [ '_' ] . length == 1 ) {
if ( ( args [ '_' ] [ 0 ] == 'install' ) || ( args [ '_' ] [ 0 ] == 'info' ) ) { response = '' ; require ( 'MeshAgent' ) . SendCommand ( { action : 'meshToolInfo' , sessionid : sessionid , name : 'MeshCentralAssistant' , cookie : true , tag : args [ '_' ] [ 0 ] } ) ; }
// TODO: Uninstall
}
} else {
response = "MeshCentral Assistant is not supported on this platform." ;
}
break ;
2021-05-16 11:25:58 +03:00
case 'userimage' :
require ( 'MeshAgent' ) . SendCommand ( { action : 'getUserImage' , sessionid : sessionid , userid : args [ '_' ] [ 0 ] , tag : 'info' } ) ;
response = 'ok' ;
break ;
2021-01-25 02:19:29 +03:00
case 'agentupdate' :
require ( 'MeshAgent' ) . SendCommand ( { action : 'agentupdate' , sessionid : sessionid } ) ;
break ;
case 'agentupdateex' :
// Perform an direct agent update without requesting any information from the server, this should not typically be used.
2021-03-05 03:27:43 +03:00
if ( args [ '_' ] . length == 1 ) {
if ( args [ '_' ] [ 0 ] . startsWith ( 'https://' ) ) { agentUpdate _Start ( args [ '_' ] [ 0 ] , { sessionid : sessionid } ) ; } else { response = "Usage: agentupdateex https://server/path" ; }
} else {
agentUpdate _Start ( null , { sessionid : sessionid } ) ;
}
2021-01-25 02:19:29 +03:00
break ;
2021-04-14 04:14:13 +03:00
case 'errorlog' :
2021-04-24 20:53:13 +03:00
switch ( args [ '_' ] . length ) {
2021-04-14 04:14:13 +03:00
case 0 :
// All Error Logs
response = JSON . stringify ( require ( 'util-agentlog' ) . read ( ) , null , 1 ) ;
break ;
case 1 :
// Error Logs, by either count or timestamp
response = JSON . stringify ( require ( 'util-agentlog' ) . read ( parseInt ( args [ '_' ] [ 0 ] ) ) , null , 1 ) ;
break ;
default :
response = "Proper usage:\r\n errorlog [lastCount|linuxEpoch]" ;
break ;
}
break ;
2021-01-25 02:19:29 +03:00
case 'msh' :
response = JSON . stringify ( _MSH ( ) , null , 2 ) ;
break ;
2021-01-27 01:39:39 +03:00
case 'dnsinfo' :
2021-04-24 20:53:13 +03:00
if ( require ( 'os' ) . dns == null ) {
2021-01-27 01:39:39 +03:00
response = "Unknown command \"" + cmd + "\", type \"help\" for list of avaialble commands." ;
}
2021-04-24 20:53:13 +03:00
else {
2021-01-27 01:39:39 +03:00
response = 'DNS Servers: ' ;
var dns = require ( 'os' ) . dns ( ) ;
2021-04-24 20:53:13 +03:00
for ( var i = 0 ; i < dns . length ; ++ i ) {
if ( i > 0 ) { response += ', ' ; }
2021-01-27 01:39:39 +03:00
response += dns [ i ] ;
}
}
break ;
2021-01-25 02:19:29 +03:00
case 'timerinfo' :
response = require ( 'ChainViewer' ) . getTimerInfo ( ) ;
break ;
case 'find' :
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length <= 1 ) {
2021-01-25 02:19:29 +03:00
response = "Proper usage:\r\n find root criteria [criteria2] [criteria n...]" ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
var root = args [ '_' ] [ 0 ] ;
var p = args [ '_' ] . slice ( 1 ) ;
var r = require ( 'file-search' ) . find ( root , p ) ;
r . sid = sessionid ;
r . on ( 'result' , function ( str ) { sendConsoleText ( str , this . sid ) ; } ) ;
r . then ( function ( ) { sendConsoleText ( '*** End Results ***' , this . sid ) ; } ) ;
response = "Find: [" + root + "] " + JSON . stringify ( p ) ;
2020-01-24 23:49:41 +03:00
}
break ;
2021-01-25 02:19:29 +03:00
case 'coreinfo' : {
response = JSON . stringify ( meshCoreObj , null , 2 ) ;
2020-01-24 23:49:41 +03:00
break ;
}
2021-01-25 02:19:29 +03:00
case 'coreinfoupdate' : {
sendPeriodicServerUpdate ( ) ;
2020-07-20 00:45:29 +03:00
break ;
}
2021-01-25 02:19:29 +03:00
case 'agentmsg' : {
2021-06-08 10:11:17 +03:00
if ( args [ '_' ] . length == 0 )
{
2021-01-25 02:19:29 +03:00
response = "Proper usage:\r\n agentmsg add \"[message]\" [iconIndex]\r\n agentmsg remove [index]\r\n agentmsg list" ; // Display usage
2021-06-08 10:11:17 +03:00
} else
{
if ( ( args [ '_' ] [ 0 ] == 'add' ) && ( args [ '_' ] . length > 1 ) )
{
var msgID , iconIndex = 0 ;
2021-01-25 02:19:29 +03:00
if ( args [ '_' ] . length >= 3 ) { try { iconIndex = parseInt ( args [ '_' ] [ 2 ] ) ; } catch ( e ) { } }
if ( typeof iconIndex != 'number' ) { iconIndex = 0 ; }
2021-06-08 10:11:17 +03:00
msgID = sendAgentMessage ( args [ '_' ] [ 1 ] , iconIndex ) ;
response = 'Agent message: ' + msgID + ' added.' ;
} else if ( ( args [ '_' ] [ 0 ] == 'remove' ) && ( args [ '_' ] . length > 1 ) )
{
var r = removeAgentMessage ( args [ '_' ] [ 1 ] ) ;
response = 'Message ' + ( r ? 'removed' : 'NOT FOUND' ) ;
} else if ( args [ '_' ] [ 0 ] == 'list' )
{
response = JSON . stringify ( sendAgentMessage ( ) , null , 2 ) ;
2021-01-25 02:19:29 +03:00
}
broadcastSessionsToRegisteredApps ( ) ;
}
2020-07-20 00:45:29 +03:00
break ;
}
2021-01-25 02:19:29 +03:00
case 'clearagentmsg' : {
2021-06-08 10:11:17 +03:00
removeAgentMessage ( ) ;
2021-01-25 02:19:29 +03:00
broadcastSessionsToRegisteredApps ( ) ;
2020-04-14 08:48:20 +03:00
break ;
}
2021-01-25 02:19:29 +03:00
case 'coredump' :
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length != 1 ) {
2021-01-25 02:19:29 +03:00
response = "Proper usage: coredump on|off|status|clear" ; // Display usage
2021-01-25 08:51:22 +03:00
} else {
switch ( args [ '_' ] [ 0 ] . toLowerCase ( ) ) {
2021-01-25 02:19:29 +03:00
case 'on' :
process . coreDumpLocation = ( process . platform == 'win32' ) ? ( process . execPath . replace ( '.exe' , '.dmp' ) ) : ( process . execPath + '.dmp' ) ;
response = 'coredump is now on' ;
break ;
case 'off' :
process . coreDumpLocation = null ;
response = 'coredump is now off' ;
break ;
case 'status' :
response = 'coredump is: ' + ( ( process . coreDumpLocation == null ) ? 'off' : 'on' ) ;
2021-01-25 08:51:22 +03:00
if ( process . coreDumpLocation != null ) {
if ( process . platform == 'win32' ) {
if ( fs . existsSync ( process . coreDumpLocation ) ) {
2021-01-25 02:19:29 +03:00
response += '\r\n CoreDump present at: ' + process . coreDumpLocation ;
response += '\r\n CoreDump Time: ' + new Date ( fs . statSync ( process . coreDumpLocation ) . mtime ) . getTime ( ) ;
response += '\r\n Agent Time : ' + new Date ( fs . statSync ( process . execPath ) . mtime ) . getTime ( ) ;
}
2021-01-25 08:51:22 +03:00
} else {
if ( ( process . cwd ( ) != '//' ) && fs . existsSync ( process . cwd ( ) + 'core' ) ) {
2021-01-25 02:19:29 +03:00
response += '\r\n CoreDump present at: ' + process . cwd ( ) + 'core' ;
response += '\r\n CoreDump Time: ' + new Date ( fs . statSync ( process . cwd ( ) + 'core' ) . mtime ) . getTime ( ) ;
response += '\r\n Agent Time : ' + new Date ( fs . statSync ( process . execPath ) . mtime ) . getTime ( ) ;
}
}
}
break ;
case 'clear' :
db . Put ( 'CoreDumpTime' , null ) ;
response = 'coredump db cleared' ;
break ;
default :
response = "Proper usage: coredump on|off|status" ; // Display usage
break ;
2019-09-27 20:30:00 +03:00
}
2018-04-20 04:19:15 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
case 'service' :
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length != 1 ) {
2021-01-25 02:19:29 +03:00
response = "Proper usage: service status|restart" ; // Display usage
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
var svcname = process . platform == 'win32' ? 'Mesh Agent' : 'meshagent' ;
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
svcname = require ( 'MeshAgent' ) . serviceName ;
2020-11-10 01:17:11 +03:00
}
2021-01-25 08:51:22 +03:00
catch ( x ) {
2020-11-10 01:17:11 +03:00
}
2021-01-25 02:19:29 +03:00
var s = require ( 'service-manager' ) . manager . getService ( svcname ) ;
2021-01-25 08:51:22 +03:00
switch ( args [ '_' ] [ 0 ] . toLowerCase ( ) ) {
2021-01-25 02:19:29 +03:00
case 'status' :
response = 'Service ' + ( s . isRunning ( ) ? ( s . isMe ( ) ? '[SELF]' : '[RUNNING]' ) : ( '[NOT RUNNING]' ) ) ;
break ;
case 'restart' :
2021-01-25 08:51:22 +03:00
if ( s . isMe ( ) ) {
2021-01-25 02:19:29 +03:00
s . restart ( ) ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
response = 'Restarting another agent instance is not allowed' ;
}
break ;
default :
response = "Proper usage: service status|restart" ; // Display usage
break ;
}
if ( process . platform == 'win32' ) { s . close ( ) ; }
2020-10-31 03:08:07 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
case 'zip' :
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length == 0 ) {
2021-01-25 02:19:29 +03:00
response = "Proper usage: zip (output file name), input1 [, input n]" ; // Display usage
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
var p = args [ '_' ] . join ( ' ' ) . split ( ',' ) ;
var ofile = p . shift ( ) ;
sendConsoleText ( 'Writing ' + ofile + '...' ) ;
var out = require ( 'fs' ) . createWriteStream ( ofile , { flags : 'wb' } ) ;
out . fname = ofile ;
out . sessionid = sessionid ;
out . on ( 'close' , function ( ) { sendConsoleText ( 'DONE writing ' + this . fname , this . sessionid ) ; } ) ;
var zip = require ( 'zip-writer' ) . write ( { files : p } ) ;
zip . pipe ( out ) ;
2020-11-02 11:44:07 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
case 'unzip' :
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length == 0 ) {
2021-01-25 02:19:29 +03:00
response = "Proper usage: unzip input, destination" ; // Display usage
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
var p = args [ '_' ] . join ( ' ' ) . split ( ',' ) ;
if ( p . length != 2 ) { response = "Proper usage: unzip input, destination" ; break ; } // Display usage
var prom = require ( 'zip-reader' ) . read ( p [ 0 ] ) ;
prom . _dest = p [ 1 ] ;
prom . self = this ;
prom . sessionid = sessionid ;
2021-01-25 08:51:22 +03:00
prom . then ( function ( zipped ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( 'Extracting to ' + this . _dest + '...' , this . sessionid ) ;
zipped . extractAll ( this . _dest ) . then ( function ( ) { sendConsoleText ( 'finished unzipping' , this . sessionid ) ; } , function ( e ) { sendConsoleText ( 'Error unzipping: ' + e , this . sessionid ) ; } ) . parentPromise . sessionid = this . sessionid ;
} , function ( e ) { sendConsoleText ( 'Error unzipping: ' + e , this . sessionid ) ; } ) ;
2020-07-29 04:45:17 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
case 'setbattery' :
// require('MeshAgent').SendCommand({ action: 'battery', state: 'dc', level: 55 });
2021-01-25 08:51:22 +03:00
if ( ( args [ '_' ] . length > 0 ) && ( ( args [ '_' ] [ 0 ] == 'ac' ) || ( args [ '_' ] [ 0 ] == 'dc' ) ) ) {
2021-01-25 02:19:29 +03:00
var b = { action : 'battery' , state : args [ '_' ] [ 0 ] } ;
if ( args [ '_' ] . length == 2 ) { b . level = parseInt ( args [ '_' ] [ 1 ] ) ; }
require ( 'MeshAgent' ) . SendCommand ( b ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
require ( 'MeshAgent' ) . SendCommand ( { action : 'battery' } ) ;
}
break ;
case 'fdsnapshot' :
require ( 'ChainViewer' ) . getSnapshot ( ) . then ( function ( c ) { sendConsoleText ( c , this . sessionid ) ; } ) . parentPromise . sessionid = sessionid ;
break ;
case 'fdcount' :
require ( 'DescriptorEvents' ) . getDescriptorCount ( ) . then (
2021-01-25 08:51:22 +03:00
function ( c ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( 'Descriptor Count: ' + c , this . sessionid ) ;
2021-01-25 08:51:22 +03:00
} , function ( e ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( 'Error fetching descriptor count: ' + e , this . sessionid ) ;
} ) . parentPromise . sessionid = sessionid ;
break ;
case 'uac' :
2021-01-25 08:51:22 +03:00
if ( process . platform != 'win32' ) {
2021-01-25 02:19:29 +03:00
response = 'Unknown command "uac", type "help" for list of avaialble commands.' ;
2020-07-29 04:45:17 +03:00
break ;
}
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length != 1 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: uac [get|interactive|secure]' ;
}
2021-01-25 08:51:22 +03:00
else {
switch ( args [ '_' ] [ 0 ] . toUpperCase ( ) ) {
2021-01-25 02:19:29 +03:00
case 'GET' :
var secd = require ( 'win-registry' ) . QueryKey ( require ( 'win-registry' ) . HKEY . LocalMachine , 'Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System' , 'PromptOnSecureDesktop' ) ;
response = "UAC mode: " + ( secd == 0 ? "Interactive Desktop" : "Secure Desktop" ) ;
break ;
case 'INTERACTIVE' :
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
require ( 'win-registry' ) . WriteKey ( require ( 'win-registry' ) . HKEY . LocalMachine , 'Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System' , 'PromptOnSecureDesktop' , 0 ) ;
response = 'UAC mode changed to: Interactive Desktop' ;
}
2021-01-25 08:51:22 +03:00
catch ( e ) {
2021-01-25 02:19:29 +03:00
response = "Unable to change UAC Mode" ;
}
break ;
case 'SECURE' :
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
require ( 'win-registry' ) . WriteKey ( require ( 'win-registry' ) . HKEY . LocalMachine , 'Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System' , 'PromptOnSecureDesktop' , 1 ) ;
response = 'UAC mode changed to: Secure Desktop' ;
}
2021-01-25 08:51:22 +03:00
catch ( e ) {
2021-01-25 02:19:29 +03:00
response = "Unable to change UAC Mode" ;
}
break ;
default :
response = 'Proper usage: uac [get|interactive|secure]' ;
break ;
2020-07-07 00:19:16 +03:00
}
2021-01-25 02:19:29 +03:00
}
break ;
case 'vm' :
response = 'Virtual Machine = ' + require ( 'identifiers' ) . isVM ( ) ;
break ;
case 'startupoptions' :
response = JSON . stringify ( require ( 'MeshAgent' ) . getStartupOptions ( ) ) ;
break ;
case 'kvmmode' :
2021-01-25 08:51:22 +03:00
if ( require ( 'MeshAgent' ) . maxKvmTileSize == null ) {
2021-01-25 02:19:29 +03:00
response = "Unknown command \"kvmmode\", type \"help\" for list of avaialble commands." ;
}
2021-01-25 08:51:22 +03:00
else {
if ( require ( 'MeshAgent' ) . maxKvmTileSize == 0 ) {
2021-01-25 02:19:29 +03:00
response = 'KVM Mode: Full JUMBO' ;
2020-07-01 23:15:07 +03:00
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
response = 'KVM Mode: ' + ( require ( 'MeshAgent' ) . maxKvmTileSize <= 65500 ? 'NO JUMBO' : 'Partial JUMBO' ) ;
response += ( ', TileLimit: ' + ( require ( 'MeshAgent' ) . maxKvmTileSize < 1024 ? ( require ( 'MeshAgent' ) . maxKvmTileSize + ' bytes' ) : ( Math . round ( require ( 'MeshAgent' ) . maxKvmTileSize / 1024 ) + ' Kbytes' ) ) ) ;
2020-07-01 23:15:07 +03:00
}
2021-01-25 02:19:29 +03:00
}
break ;
case 'alert' :
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length == 0 ) {
2021-01-25 02:19:29 +03:00
response = "Proper usage: alert TITLE, CAPTION [, TIMEOUT]" ; // Display usage
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
var p = args [ '_' ] . join ( ' ' ) . split ( ',' ) ;
2021-01-25 08:51:22 +03:00
if ( p . length < 2 ) {
2021-01-25 02:19:29 +03:00
response = "Proper usage: alert TITLE, CAPTION [, TIMEOUT]" ; // Display usage
2020-06-25 02:04:52 +03:00
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
this . _alert = require ( 'message-box' ) . create ( p [ 0 ] , p [ 1 ] , p . length == 3 ? parseInt ( p [ 2 ] ) : 9999 , 1 ) ;
2020-06-25 02:04:52 +03:00
}
2021-01-25 02:19:29 +03:00
}
break ;
case 'agentsize' :
var actualSize = Math . floor ( require ( 'fs' ) . statSync ( process . execPath ) . size / 1024 ) ;
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
// Check the Agent Uninstall MetaData for correctness, as the installer may have written an incorrect value
var writtenSize = 0 ;
try { writtenSize = require ( 'win-registry' ) . QueryKey ( require ( 'win-registry' ) . HKEY . LocalMachine , 'Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\MeshCentralAgent' , 'EstimatedSize' ) ; } catch ( e ) { response = e ; }
2021-01-25 08:51:22 +03:00
if ( writtenSize != actualSize ) {
2021-01-25 02:19:29 +03:00
response = "Size updated from: " + writtenSize + " to: " + actualSize ;
try { require ( 'win-registry' ) . WriteKey ( require ( 'win-registry' ) . HKEY . LocalMachine , 'Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\MeshCentralAgent' , 'EstimatedSize' , actualSize ) ; } catch ( e ) { response = e ; }
} else
{ response = "Agent Size: " + actualSize + " kb" ; }
} else
{ response = "Agent Size: " + actualSize + " kb" ; }
break ;
case 'versions' :
response = JSON . stringify ( process . versions , null , ' ' ) ;
break ;
case 'wpfhwacceleration' :
if ( process . platform != 'win32' ) { throw ( "wpfhwacceleration setting is only supported on Windows" ) ; }
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length != 1 ) {
2021-01-25 02:19:29 +03:00
response = "Proper usage: wpfhwacceleration (ON|OFF|STATUS)" ; // Display usage
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
var reg = require ( 'win-registry' ) ;
var uname = require ( 'user-sessions' ) . getUsername ( require ( 'user-sessions' ) . consoleUid ( ) ) ;
var key = reg . usernameToUserKey ( uname ) ;
2021-01-25 08:51:22 +03:00
switch ( args [ '_' ] [ 0 ] . toUpperCase ( ) ) {
2021-01-25 02:19:29 +03:00
default :
response = "Proper usage: wpfhwacceleration (ON|OFF|STATUS|DEFAULT)" ; // Display usage
break ;
case 'ON' :
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
reg . WriteKey ( reg . HKEY . Users , key + '\\SOFTWARE\\Microsoft\\Avalon.Graphics' , 'DisableHWAcceleration' , 0 ) ;
response = "OK" ;
} catch ( e ) { response = "FAILED" ; }
break ;
case 'OFF' :
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
reg . WriteKey ( reg . HKEY . Users , key + '\\SOFTWARE\\Microsoft\\Avalon.Graphics' , 'DisableHWAcceleration' , 1 ) ;
response = 'OK' ;
} catch ( e ) { response = 'FAILED' ; }
break ;
case 'STATUS' :
var s ;
try { s = reg . QueryKey ( reg . HKEY . Users , key + '\\SOFTWARE\\Microsoft\\Avalon.Graphics' , 'DisableHWAcceleration' ) == 1 ? 'DISABLED' : 'ENABLED' ; } catch ( e ) { s = 'DEFAULT' ; }
response = "WPF Hardware Acceleration: " + s ;
break ;
case 'DEFAULT' :
try { reg . DeleteKey ( reg . HKEY . Users , key + '\\SOFTWARE\\Microsoft\\Avalon.Graphics' , 'DisableHWAcceleration' ) ; } catch ( e ) { }
response = 'OK' ;
break ;
2020-05-31 03:21:45 +03:00
}
2021-01-25 02:19:29 +03:00
}
break ;
case 'tsid' :
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
if ( args [ '_' ] . length != 1 ) {
2021-01-25 02:19:29 +03:00
response = "TSID: " + ( require ( 'MeshAgent' ) . _tsid == null ? "console" : require ( 'MeshAgent' ) . _tsid ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
var i = parseInt ( args [ '_' ] [ 0 ] ) ;
require ( 'MeshAgent' ) . _tsid = ( isNaN ( i ) ? null : i ) ;
response = "TSID set to: " + ( require ( 'MeshAgent' ) . _tsid == null ? "console" : require ( 'MeshAgent' ) . _tsid ) ;
2020-05-17 10:22:26 +03:00
}
2021-01-25 02:19:29 +03:00
} else
{ response = "TSID command only supported on Windows" ; }
break ;
case 'activeusers' :
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
var p = require ( 'user-sessions' ) . enumerateUsers ( ) ;
p . sessionid = sessionid ;
2021-01-25 08:51:22 +03:00
p . then ( function ( u ) {
2021-01-25 02:19:29 +03:00
var v = [ ] ;
2021-01-25 08:51:22 +03:00
for ( var i in u ) {
2021-01-25 02:19:29 +03:00
if ( u [ i ] . State == 'Active' ) { v . push ( { tsid : i , type : u [ i ] . StationName , user : u [ i ] . Username , domain : u [ i ] . Domain } ) ; }
}
sendConsoleText ( JSON . stringify ( v , null , 1 ) , this . sessionid ) ;
} ) ;
} else
{ response = "activeusers command only supported on Windows" ; }
break ;
case 'wallpaper' :
2021-01-25 08:51:22 +03:00
if ( process . platform != 'win32' && ! ( process . platform == 'linux' && require ( 'linux-gnome-helpers' ) . available ) ) {
2021-01-25 02:19:29 +03:00
response = "wallpaper command not supported on this platform" ;
}
2021-01-25 08:51:22 +03:00
else {
if ( args [ '_' ] . length != 1 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: wallpaper (GET|TOGGLE)' ; // Display usage
2020-05-17 10:22:26 +03:00
}
2021-01-25 08:51:22 +03:00
else {
switch ( args [ '_' ] [ 0 ] . toUpperCase ( ) ) {
2021-01-25 02:19:29 +03:00
default :
response = 'Proper usage: wallpaper (GET|TOGGLE)' ; // Display usage
2020-05-17 10:22:26 +03:00
break ;
2021-01-25 02:19:29 +03:00
case 'GET' :
case 'TOGGLE' :
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
var id = require ( 'user-sessions' ) . getProcessOwnerName ( process . pid ) . tsid == 0 ? 1 : 0 ;
var child = require ( 'child_process' ) . execFile ( process . execPath , [ process . execPath . split ( '\\' ) . pop ( ) , '-b64exec' , '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' ] , { type : id } ) ;
child . stdout . str = '' ; child . stdout . on ( 'data' , function ( c ) { this . str += c . toString ( ) ; } ) ;
child . stderr . on ( 'data' , function ( ) { } ) ;
child . waitExit ( ) ;
var current = child . stdout . str . trim ( ) ;
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] [ 0 ] . toUpperCase ( ) == 'GET' ) {
2021-01-25 02:19:29 +03:00
response = current ;
break ;
}
2021-01-25 08:51:22 +03:00
if ( current != '' ) {
2021-01-25 02:19:29 +03:00
require ( 'MeshAgent' ) . _wallpaper = current ;
response = 'Wallpaper cleared' ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response = 'Wallpaper restored' ;
}
child = require ( 'child_process' ) . execFile ( process . execPath , [ process . execPath . split ( '\\' ) . pop ( ) , '-b64exec' , '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' , current != '' ? '""' : require ( 'MeshAgent' ) . _wallpaper ] , { type : id } ) ;
child . stdout . str = '' ; child . stdout . on ( 'data' , function ( c ) { this . str += c . toString ( ) ; } ) ;
child . stderr . on ( 'data' , function ( ) { } ) ;
child . waitExit ( ) ;
2020-05-17 10:22:26 +03:00
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
var id = require ( 'user-sessions' ) . consoleUid ( ) ;
var current = require ( 'linux-gnome-helpers' ) . getDesktopWallpaper ( id ) ;
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] [ 0 ] . toUpperCase ( ) == 'GET' ) {
2021-01-25 02:19:29 +03:00
response = current ;
break ;
}
2021-01-25 08:51:22 +03:00
if ( current != '/dev/null' ) {
2021-01-25 02:19:29 +03:00
require ( 'MeshAgent' ) . _wallpaper = current ;
response = 'Wallpaper cleared' ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response = 'Wallpaper restored' ;
}
require ( 'linux-gnome-helpers' ) . setDesktopWallpaper ( id , current != '/dev/null' ? undefined : require ( 'MeshAgent' ) . _wallpaper ) ;
2020-05-17 10:22:26 +03:00
}
break ;
2020-04-13 08:53:49 +03:00
}
}
2021-01-25 02:19:29 +03:00
}
break ;
case 'safemode' :
2021-01-25 08:51:22 +03:00
if ( process . platform != 'win32' ) {
2021-01-25 02:19:29 +03:00
response = 'safemode only supported on Windows Platforms'
}
2021-01-25 08:51:22 +03:00
else {
if ( args [ '_' ] . length != 1 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: safemode (ON|OFF|STATUS)' ; // Display usage
2020-03-12 07:25:03 +03:00
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
var svcname = process . platform == 'win32' ? 'Mesh Agent' : 'meshagent' ;
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
svcname = require ( 'MeshAgent' ) . serviceName ;
2020-03-12 07:25:03 +03:00
}
2021-01-25 08:51:22 +03:00
catch ( x ) {
2020-03-12 07:25:03 +03:00
}
2019-12-11 01:15:14 +03:00
2021-01-25 08:51:22 +03:00
switch ( args [ '_' ] [ 0 ] . toUpperCase ( ) ) {
2019-12-11 01:15:14 +03:00
default :
2021-01-25 02:19:29 +03:00
response = 'Proper usage: safemode (ON|OFF|STATUS)' ; // Display usage
2019-12-11 01:15:14 +03:00
break ;
case 'ON' :
2021-01-25 02:19:29 +03:00
require ( 'win-bcd' ) . setKey ( 'safeboot' , 'Network' ) ;
require ( 'win-bcd' ) . enableSafeModeService ( svcname ) ;
2019-12-11 01:15:14 +03:00
break ;
case 'OFF' :
2021-01-25 02:19:29 +03:00
require ( 'win-bcd' ) . deleteKey ( 'safeboot' ) ;
2019-12-11 01:15:14 +03:00
break ;
case 'STATUS' :
2021-01-25 02:19:29 +03:00
var nextboot = require ( 'win-bcd' ) . getKey ( 'safeboot' ) ;
2021-01-25 08:51:22 +03:00
if ( nextboot ) {
switch ( nextboot ) {
2021-01-25 02:19:29 +03:00
case 'Network' :
case 'network' :
nextboot = 'SAFE_MODE_NETWORK' ;
2019-11-15 02:22:00 +03:00
break ;
2021-01-25 02:19:29 +03:00
default :
nextboot = 'SAFE_MODE' ;
2019-11-15 02:22:00 +03:00
break ;
2019-10-29 21:05:33 +03:00
}
2021-01-25 02:19:29 +03:00
}
response = 'Current: ' + require ( 'win-bcd' ) . bootMode + ', NextBoot: ' + ( nextboot ? nextboot : 'NORMAL' ) ;
break ;
2019-10-25 20:33:10 +03:00
}
}
2021-01-25 02:19:29 +03:00
}
break ;
2021-01-25 08:51:22 +03:00
/ *
case 'border' :
{
if ( ( args [ '_' ] . length == 1 ) && ( args [ '_' ] [ 0 ] == 'on' ) ) {
if ( meshCoreObj . users . length > 0 ) {
obj . borderManager . Start ( meshCoreObj . users [ 0 ] ) ;
response = 'Border blinking is on.' ;
2021-01-19 03:11:15 +03:00
} else {
2021-01-25 08:51:22 +03:00
response = 'Cannot turn on border blinking, no logged in users.' ;
2018-08-30 04:47:22 +03:00
}
2021-01-25 08:51:22 +03:00
} else if ( ( args [ '_' ] . length == 1 ) && ( args [ '_' ] [ 0 ] == 'off' ) ) {
obj . borderManager . Stop ( ) ;
response = 'Border blinking is off.' ;
} else {
response = 'Proper usage: border "on|off"' ; // Display correct command usage
2021-01-19 03:11:15 +03:00
}
2021-01-25 08:51:22 +03:00
}
break ;
* /
2021-01-25 02:19:29 +03:00
case 'av' :
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
// Windows Command: "wmic /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct get /FORMAT:CSV"
response = JSON . stringify ( require ( 'win-info' ) . av ( ) , null , 1 ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response = 'Not supported on the platform' ;
2018-12-08 03:36:27 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
case 'log' :
if ( args [ '_' ] . length != 1 ) { response = 'Proper usage: log "sample text"' ; } else { MeshServerLog ( args [ '_' ] [ 0 ] ) ; response = 'ok' ; }
break ;
case 'getclip' :
2021-01-25 08:51:22 +03:00
if ( require ( 'MeshAgent' ) . isService ) {
2021-01-25 02:19:29 +03:00
require ( 'clipboard' ) . dispatchRead ( ) . then ( function ( str ) { sendConsoleText ( str , sessionid ) ; } ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
require ( "clipboard" ) . read ( ) . then ( function ( str ) { sendConsoleText ( str , sessionid ) ; } ) ;
2018-11-25 23:59:42 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
case 'setclip' : {
2021-04-24 20:53:13 +03:00
if ( args [ '_' ] . length != 1 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: setclip "sample text"' ;
2021-04-24 20:53:13 +03:00
} else {
if ( require ( 'MeshAgent' ) . isService ) {
if ( process . platform != 'win32' ) {
2021-02-28 03:19:13 +03:00
require ( 'clipboard' ) . dispatchWrite ( args [ '_' ] [ 0 ] ) ;
}
2021-05-11 09:43:48 +03:00
else
{
var clipargs = args [ '_' ] [ 0 ] ;
2021-04-19 20:55:09 +03:00
var uid = require ( 'user-sessions' ) . consoleUid ( ) ;
var user = require ( 'user-sessions' ) . getUsername ( uid ) ;
var domain = require ( 'user-sessions' ) . getDomain ( uid ) ;
2021-05-11 09:43:48 +03:00
user = ( domain + '\\' + user ) ;
this . _dispatcher = require ( 'win-dispatcher' ) . dispatch ( { user : user , modules : [ { name : 'clip-dispatch' , script : "module.exports = { dispatch: function dispatch(val) { require('clipboard')(val); process.exit(); } };" } ] , launch : { module : 'clip-dispatch' , method : 'dispatch' , args : [ clipargs ] } } ) ;
this . _dispatcher . parent = this ;
//require('events').setFinalizerMetadata.call(this._dispatcher, 'clip-dispatch');
this . _dispatcher . on ( 'connection' , function ( c )
{
this . _c = c ;
this . _c . root = this . parent ;
this . _c . on ( 'end' , function ( )
{
this . root . _dispatcher = null ;
this . root = null ;
} ) ;
} ) ;
2021-02-28 03:19:13 +03:00
}
2021-01-25 02:19:29 +03:00
response = 'Setting clipboard to: "' + args [ '_' ] [ 0 ] + '"' ;
}
2021-05-11 09:43:48 +03:00
else
{
2021-01-25 02:19:29 +03:00
require ( "clipboard" ) ( args [ '_' ] [ 0 ] ) ; response = 'Setting clipboard to: "' + args [ '_' ] [ 0 ] + '"' ;
2018-04-21 02:05:06 +03:00
}
2018-04-11 23:49:05 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'openurl' : {
if ( args [ '_' ] . length != 1 ) { response = 'Proper usage: openurl (url)' ; } // Display usage
else { if ( openUserDesktopUrl ( args [ '_' ] [ 0 ] ) == null ) { response = 'Failed.' ; } else { response = 'Success.' ; } }
break ;
}
case 'users' : {
if ( meshCoreObj . users == null ) { response = 'Active users are unknown.' ; } else { response = 'Active Users: ' + meshCoreObj . users . join ( ', ' ) + '.' ; }
require ( 'user-sessions' ) . enumerateUsers ( ) . then ( function ( u ) { for ( var i in u ) { sendConsoleText ( u [ i ] ) ; } } ) ;
break ;
}
case 'toast' : {
if ( args [ '_' ] . length < 1 ) { response = 'Proper usage: toast "message"' ; } else {
2021-01-25 08:51:22 +03:00
if ( require ( 'MeshAgent' ) . _tsid == null ) {
2021-01-25 02:19:29 +03:00
require ( 'toaster' ) . Toast ( 'MeshCentral' , args [ '_' ] [ 0 ] ) . then ( sendConsoleText , sendConsoleText ) ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
require ( 'toaster' ) . Toast ( 'MeshCentral' , args [ '_' ] [ 0 ] , require ( 'MeshAgent' ) . _tsid ) . then ( sendConsoleText , sendConsoleText ) ;
2018-04-11 23:49:05 +03:00
}
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'setdebug' : {
if ( args [ '_' ] . length < 1 ) { response = 'Proper usage: setdebug (target), 0 = Disabled, 1 = StdOut, 2 = This Console, * = All Consoles, 4 = WebLog, 8 = Logfile' ; } // Display usage
else { if ( args [ '_' ] [ 0 ] == '*' ) { console . setDestination ( 2 ) ; } else { console . setDestination ( parseInt ( args [ '_' ] [ 0 ] ) , sessionid ) ; } }
break ;
}
case 'ps' : {
2021-01-25 08:51:22 +03:00
processManager . getProcesses ( function ( plist ) {
2021-01-25 02:19:29 +03:00
var x = '' ;
for ( var i in plist ) { x += i + ( ( plist [ i ] . user ) ? ( ', ' + plist [ i ] . user ) : '' ) + ', ' + plist [ i ] . cmd + '\r\n' ; }
sendConsoleText ( x , sessionid ) ;
} ) ;
break ;
}
case 'kill' : {
2021-01-25 08:51:22 +03:00
if ( ( args [ '_' ] . length < 1 ) ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: kill [pid]' ; // Display correct command usage
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
process . kill ( parseInt ( args [ '_' ] [ 0 ] ) ) ;
response = 'Killed process ' + args [ '_' ] [ 0 ] + '.' ;
2018-03-13 04:16:06 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'smbios' : {
if ( SMBiosTables == null ) { response = 'SMBios tables not available.' ; } else { response = objToString ( SMBiosTables , 0 , ' ' , true ) ; }
break ;
}
case 'rawsmbios' : {
if ( SMBiosTablesRaw == null ) { response = 'SMBios tables not available.' ; } else {
response = '' ;
2021-01-25 08:51:22 +03:00
for ( var i in SMBiosTablesRaw ) {
2021-01-25 02:19:29 +03:00
var header = false ;
2021-01-25 08:51:22 +03:00
for ( var j in SMBiosTablesRaw [ i ] ) {
if ( SMBiosTablesRaw [ i ] [ j ] . length > 0 ) {
2021-01-25 02:19:29 +03:00
if ( header == false ) { response += ( 'Table type #' + i + ( ( require ( 'smbios' ) . smTableTypes [ i ] == null ) ? '' : ( ', ' + require ( 'smbios' ) . smTableTypes [ i ] ) ) ) + '\r\n' ; header = true ; }
response += ( ' ' + SMBiosTablesRaw [ i ] [ j ] . toString ( 'hex' ) ) + '\r\n' ;
2018-03-13 04:16:06 +03:00
}
2018-09-28 02:17:05 +03:00
}
}
2018-03-13 04:16:06 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'eval' : { // Eval JavaScript
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length < 1 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: eval "JavaScript code"' ; // Display correct command usage
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response = JSON . stringify ( mesh . eval ( args [ '_' ] [ 0 ] ) ) ; // This can only be run by trusted administrator.
}
break ;
}
case 'uninstallagent' : // Uninstall this agent
var agentName = process . platform == 'win32' ? 'Mesh Agent' : 'meshagent' ;
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
agentName = require ( 'MeshAgent' ) . serviceName ;
}
2021-01-25 08:51:22 +03:00
catch ( x ) {
2017-08-28 19:27:45 +03:00
}
2021-01-05 20:47:47 +03:00
2021-01-25 08:51:22 +03:00
if ( ! require ( 'service-manager' ) . manager . getService ( agentName ) . isMe ( ) ) {
2021-01-25 02:19:29 +03:00
response = 'Uininstall failed, this instance is not the service instance' ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
try { diagnosticAgent _uninstall ( ) ; } catch ( e ) { }
var js = "require('service-manager').manager.getService('" + agentName + "').stop(); require('service-manager').manager.uninstallService('" + agentName + "'); process.exit();" ;
this . child = require ( 'child_process' ) . execFile ( process . execPath , [ process . platform == 'win32' ? ( process . execPath . split ( '\\' ) . pop ( ) ) : ( process . execPath . split ( '/' ) . pop ( ) ) , '-b64exec' , Buffer . from ( js ) . toString ( 'base64' ) ] , { type : 4 , detached : true } ) ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
case 'notify' : { // Send a notification message to the mesh
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length != 1 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: notify "message" [--session]' ; // Display correct command usage
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
var notification = { action : 'msg' , type : 'notify' , value : args [ '_' ] [ 0 ] , tag : 'console' } ;
if ( args . session ) { notification . sessionid = sessionid ; } // If "--session" is specified, notify only this session, if not, the server will notify the mesh
mesh . SendCommand ( notification ) ; // no sessionid or userid specified, notification will go to the entire mesh
response = "ok" ;
}
break ;
}
case 'cpuinfo' : { // Return system information
// CPU & memory utilization
pr = require ( 'sysinfo' ) . cpuUtilization ( ) ;
pr . sessionid = sessionid ;
2021-01-25 08:51:22 +03:00
pr . then ( function ( data ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( JSON . stringify (
{
cpu : data ,
memory : require ( 'sysinfo' ) . memUtilization ( ) ,
thermals : require ( 'sysinfo' ) . thermals == null ? [ ] : require ( 'sysinfo' ) . thermals ( )
} , null , 1 ) , this . sessionid ) ;
2021-01-25 08:51:22 +03:00
} , function ( e ) {
2021-04-24 20:53:13 +03:00
sendConsoleText ( e ) ;
} ) ;
2021-01-25 02:19:29 +03:00
break ;
}
case 'sysinfo' : { // Return system information
2021-01-25 08:51:22 +03:00
getSystemInformation ( function ( results , err ) {
2021-01-25 02:19:29 +03:00
if ( results == null ) { sendConsoleText ( err , this . sessionid ) ; } else {
sendConsoleText ( JSON . stringify ( results , null , 1 ) , this . sessionid ) ;
}
} ) ;
break ;
}
case 'info' : { // Return information about the agent and agent core module
response = 'Current Core: ' + meshCoreObj . value + '\r\nAgent Time: ' + Date ( ) + '.\r\nUser Rights: 0x' + rights . toString ( 16 ) + '.\r\nPlatform: ' + process . platform + '.\r\nCapabilities: ' + meshCoreObj . caps + '.\r\nServer URL: ' + mesh . ServerUrl + '.' ;
if ( amt != null ) { response += '\r\nBuilt-in LMS: ' + [ 'Disabled' , 'Connecting..' , 'Connected' ] [ amt . lmsstate ] + '.' ; }
if ( meshCoreObj . osdesc ) { response += '\r\nOS: ' + meshCoreObj . osdesc + '.' ; }
response += '\r\nModules: ' + addedModules . join ( ', ' ) + '.' ;
response += '\r\nServer Connection: ' + mesh . isControlChannelConnected + ', State: ' + meshServerConnectionState + '.' ;
var oldNodeId = db . Get ( 'OldNodeId' ) ;
if ( oldNodeId != null ) { response += '\r\nOldNodeID: ' + oldNodeId + '.' ; }
if ( process . platform == 'linux' || process . platform == 'freebsd' ) { response += '\r\nX11 support: ' + require ( 'monitor-info' ) . kvm _x11 _support + '.' ; }
//response += '\r\Debug Console: ' + debugConsole + '.';
break ;
}
case 'osinfo' : { // Return the operating system information
var i = 1 ;
if ( args [ '_' ] . length > 0 ) { i = parseInt ( args [ '_' ] [ 0 ] ) ; if ( i > 8 ) { i = 8 ; } response = 'Calling ' + i + ' times.' ; }
2021-01-25 08:51:22 +03:00
for ( var j = 0 ; j < i ; j ++ ) {
2021-01-25 02:19:29 +03:00
var pr = require ( 'os' ) . name ( ) ;
2019-08-07 03:58:29 +03:00
pr . sessionid = sessionid ;
2021-01-25 08:51:22 +03:00
pr . then ( function ( v ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( "OS: " + v + ( process . platform == 'win32' ? ( require ( 'win-virtual-terminal' ) . supported ? ' [ConPTY: YES]' : ' [ConPTY: NO]' ) : '' ) , this . sessionid ) ;
2019-09-24 02:46:26 +03:00
} ) ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'args' : { // Displays parsed command arguments
response = 'args ' + objToString ( args , 0 , ' ' , true ) ;
break ;
}
case 'print' : { // Print a message on the mesh agent console, does nothing when running in the background
var r = [ ] ;
for ( var i in args [ '_' ] ) { r . push ( args [ '_' ] [ i ] ) ; }
console . log ( r . join ( ' ' ) ) ;
response = 'Message printed on agent console.' ;
break ;
}
case 'type' : { // Returns the content of a file
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length == 0 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: type (filepath) [maxlength]' ; // Display correct command usage
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
var max = 4096 ;
if ( ( args [ '_' ] . length > 1 ) && ( typeof args [ '_' ] [ 1 ] == 'number' ) ) { max = args [ '_' ] [ 1 ] ; }
if ( max > 4096 ) max = 4096 ;
var buf = Buffer . alloc ( max ) , fd = fs . openSync ( args [ '_' ] [ 0 ] , "r" ) , r = fs . readSync ( fd , buf , 0 , max ) ; // Read the file content
response = buf . toString ( ) ;
var i = response . indexOf ( '\n' ) ;
if ( ( i > 0 ) && ( response [ i - 1 ] != '\r' ) ) { response = response . split ( '\n' ) . join ( '\r\n' ) ; }
if ( r == max ) response += '...' ;
fs . closeSync ( fd ) ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'dbkeys' : { // Return all data store keys
response = JSON . stringify ( db . Keys ) ;
break ;
}
case 'dbget' : { // Return the data store value for a given key
if ( db == null ) { response = 'Database not accessible.' ; break ; }
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length != 1 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: dbget (key)' ; // Display the value for a given database key
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response = db . Get ( args [ '_' ] [ 0 ] ) ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'dbset' : { // Set a data store key and value pair
if ( db == null ) { response = 'Database not accessible.' ; break ; }
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length != 2 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: dbset (key) (value)' ; // Set a database key
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
var r = db . Put ( args [ '_' ] [ 0 ] , args [ '_' ] [ 1 ] ) ;
response = 'Key set: ' + r ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'dbcompact' : { // Compact the data store
if ( db == null ) { response = 'Database not accessible.' ; break ; }
var r = db . Compact ( ) ;
response = 'Database compacted: ' + r ;
break ;
}
case 'httpget' : {
2021-01-25 08:51:22 +03:00
if ( consoleHttpRequest != null ) {
2021-01-25 02:19:29 +03:00
response = 'HTTP operation already in progress.' ;
2021-01-25 08:51:22 +03:00
} else {
if ( args [ '_' ] . length != 1 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: httpget (url)' ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
var options = http . parseUri ( args [ '_' ] [ 0 ] ) ;
options . method = 'GET' ;
2021-01-25 08:51:22 +03:00
if ( options == null ) {
2021-01-25 02:19:29 +03:00
response = 'Invalid url.' ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
try { consoleHttpRequest = http . request ( options , consoleHttpResponse ) ; } catch ( e ) { response = 'Invalid HTTP GET request' ; }
consoleHttpRequest . sessionid = sessionid ;
2021-01-25 08:51:22 +03:00
if ( consoleHttpRequest != null ) {
2021-01-25 02:19:29 +03:00
consoleHttpRequest . end ( ) ;
response = 'HTTPGET ' + options . protocol + '//' + options . host + ':' + options . port + options . path ;
2017-08-28 19:27:45 +03:00
}
}
}
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'wslist' : { // List all web sockets
response = '' ;
2021-01-25 08:51:22 +03:00
for ( var i in consoleWebSockets ) {
2021-01-25 02:19:29 +03:00
var httprequest = consoleWebSockets [ i ] ;
response += 'Websocket #' + i + ', ' + httprequest . url + '\r\n' ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
if ( response == '' ) { response = 'no websocket sessions.' ; }
break ;
}
case 'wsconnect' : { // Setup a web socket
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length == 0 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: wsconnect (url)\r\nFor example: wsconnect wss://localhost:443/meshrelay.ashx?id=abc' ; // Display correct command usage
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
var httprequest = null ;
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
var options = http . parseUri ( args [ '_' ] [ 0 ] . split ( '$' ) . join ( '%24' ) . split ( '@' ) . join ( '%40' ) ) ; // Escape the $ and @ characters in the URL
options . rejectUnauthorized = 0 ;
httprequest = http . request ( options ) ;
} catch ( e ) { response = 'Invalid HTTP websocket request' ; }
2021-01-25 08:51:22 +03:00
if ( httprequest != null ) {
2021-01-25 02:19:29 +03:00
httprequest . upgrade = onWebSocketUpgrade ;
httprequest . on ( 'error' , function ( e ) { sendConsoleText ( "ERROR: Unable to connect to: " + this . url + ", " + JSON . stringify ( e ) ) ; } ) ;
var index = 1 ;
while ( consoleWebSockets [ index ] ) { index ++ ; }
httprequest . sessionid = sessionid ;
httprequest . index = index ;
httprequest . url = args [ '_' ] [ 0 ] ;
consoleWebSockets [ index ] = httprequest ;
response = 'New websocket session #' + index ;
2017-08-28 19:27:45 +03:00
}
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'wssend' : { // Send data on a web socket
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length == 0 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: wssend (socketnumber)\r\n' ; // Display correct command usage
2021-01-25 08:51:22 +03:00
for ( var i in consoleWebSockets ) {
2017-08-28 19:27:45 +03:00
var httprequest = consoleWebSockets [ i ] ;
2021-01-25 02:19:29 +03:00
response += 'Websocket #' + i + ', ' + httprequest . url + '\r\n' ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
var i = parseInt ( args [ '_' ] [ 0 ] ) ;
var httprequest = consoleWebSockets [ i ] ;
2021-01-25 08:51:22 +03:00
if ( httprequest != undefined ) {
2021-01-25 02:19:29 +03:00
httprequest . s . write ( args [ '_' ] [ 1 ] ) ;
response = 'ok' ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response = 'Invalid web socket number' ;
2019-03-05 10:48:45 +03:00
}
2018-03-21 03:48:03 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'wsclose' : { // Close a websocket
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length == 0 ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: wsclose (socketnumber)' ; // Display correct command usage
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
var i = parseInt ( args [ '_' ] [ 0 ] ) ;
var httprequest = consoleWebSockets [ i ] ;
2021-01-25 08:51:22 +03:00
if ( httprequest != undefined ) {
2021-01-25 02:19:29 +03:00
if ( httprequest . s != null ) { httprequest . s . end ( ) ; } else { httprequest . end ( ) ; }
response = 'ok' ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response = 'Invalid web socket number' ;
2017-09-21 00:44:22 +03:00
}
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'tunnels' : { // Show the list of current tunnels
response = '' ;
for ( var i in tunnels ) { response += 'Tunnel #' + i + ', ' + tunnels [ i ] . url + '\r\n' ; }
if ( response == '' ) { response = 'No websocket sessions.' ; }
break ;
}
case 'ls' : { // Show list of files and folders
response = '' ;
var xpath = '*' ;
if ( args [ '_' ] . length > 0 ) { xpath = obj . path . join ( args [ '_' ] [ 0 ] , '*' ) ; }
response = 'List of ' + xpath + '\r\n' ;
var results = fs . readdirSync ( xpath ) ;
2021-01-25 08:51:22 +03:00
for ( var i = 0 ; i < results . length ; ++ i ) {
2021-01-25 02:19:29 +03:00
var stat = null , p = obj . path . join ( args [ '_' ] [ 0 ] , results [ i ] ) ;
try { stat = fs . statSync ( p ) ; } catch ( e ) { }
2021-01-25 08:51:22 +03:00
if ( ( stat == null ) || ( stat == undefined ) ) {
2021-01-25 02:19:29 +03:00
response += ( results [ i ] + "\r\n" ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response += ( results [ i ] + " " + ( ( stat . isDirectory ( ) ) ? "(Folder)" : "(File)" ) + "\r\n" ) ;
2017-09-01 21:23:22 +03:00
}
2017-08-28 22:48:53 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'lsx' : { // Show list of files and folders
response = objToString ( getDirectoryInfo ( args [ '_' ] [ 0 ] ) , 0 , ' ' , true ) ;
break ;
}
case 'lock' : { // Lock the current user out of the desktop
if ( process . platform == 'win32' ) { var child = require ( 'child_process' ) ; child . execFile ( process . env [ 'windir' ] + '\\system32\\cmd.exe' , [ '/c' , 'RunDll32.exe user32.dll,LockWorkStation' ] , { type : 1 } ) ; response = 'Ok' ; }
else { response = 'Not supported on the platform' ; }
break ;
}
case 'amt' : { // Show Intel AMT status
2021-01-25 08:51:22 +03:00
if ( amt != null ) {
amt . getMeiState ( 9 , function ( state ) {
2021-01-25 02:19:29 +03:00
var resp = "Intel AMT not detected." ;
if ( state != null ) { resp = objToString ( state , 0 , ' ' , true ) ; }
sendConsoleText ( resp , sessionid ) ;
2017-09-13 21:25:57 +03:00
} ) ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response = "Intel AMT not detected." ;
2017-09-13 21:25:57 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'netinfo' : { // Show network interface information
var interfaces = require ( 'os' ) . networkInterfaces ( ) ;
response = objToString ( interfaces , 0 , ' ' , true ) ;
break ;
}
case 'wakeonlan' : { // Send wake-on-lan
2021-04-24 20:53:13 +03:00
if ( ( args [ '_' ] . length != 1 ) || ( args [ '_' ] [ 0 ] . length != 12 ) ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: wakeonlan [mac], for example "wakeonlan 010203040506".' ;
2021-04-24 20:53:13 +03:00
} else {
2021-04-24 20:20:35 +03:00
var count = sendWakeOnLanEx ( [ args [ '_' ] [ 0 ] ] ) ;
2021-04-24 20:34:29 +03:00
sendWakeOnLanEx ( [ args [ '_' ] [ 0 ] ] ) ;
sendWakeOnLanEx ( [ args [ '_' ] [ 0 ] ] ) ;
2021-04-24 20:20:35 +03:00
response = 'Sending wake-on-lan on ' + count + ' interface(s).' ;
2017-09-21 00:44:22 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'sendall' : { // Send a message to all consoles on this mesh
sendConsoleText ( args [ '_' ] . join ( ' ' ) ) ;
break ;
}
case 'power' : { // Execute a power action on this computer
2021-01-25 08:51:22 +03:00
if ( mesh . ExecPowerState == undefined ) {
2021-01-25 02:19:29 +03:00
response = 'Power command not supported on this agent.' ;
2021-01-25 08:51:22 +03:00
} else {
if ( ( args [ '_' ] . length == 0 ) || isNaN ( Number ( args [ '_' ] [ 0 ] ) ) ) {
2021-01-25 02:19:29 +03:00
response = 'Proper usage: power (actionNumber), where actionNumber is:\r\n LOGOFF = 1\r\n SHUTDOWN = 2\r\n REBOOT = 3\r\n SLEEP = 4\r\n HIBERNATE = 5\r\n DISPLAYON = 6\r\n KEEPAWAKE = 7\r\n BEEP = 8\r\n CTRLALTDEL = 9\r\n VIBRATE = 13\r\n FLASH = 14' ; // Display correct command usage
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
var r = mesh . ExecPowerState ( Number ( args [ '_' ] [ 0 ] ) , Number ( args [ '_' ] [ 1 ] ) ) ;
response = 'Power action executed with return code: ' + r + '.' ;
}
2019-02-08 07:06:01 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'location' : {
2021-01-25 08:51:22 +03:00
getIpLocationData ( function ( location ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( objToString ( { action : 'iplocation' , type : 'publicip' , value : location } , 0 , ' ' ) ) ;
} ) ;
break ;
}
case 'parseuri' : {
response = JSON . stringify ( http . parseUri ( args [ '_' ] [ 0 ] ) ) ;
break ;
}
case 'scanwifi' : {
2021-01-25 08:51:22 +03:00
if ( wifiScanner != null ) {
2021-01-25 02:19:29 +03:00
var wifiPresent = wifiScanner . hasWireless ;
if ( wifiPresent ) { response = "Perfoming Wifi scan..." ; wifiScanner . Scan ( ) ; } else { response = "Wifi absent." ; }
} else
{ response = "Wifi module not present." ; }
break ;
}
case 'modules' : {
response = JSON . stringify ( addedModules ) ;
break ;
}
case 'listservices' : {
var services = require ( 'service-manager' ) . manager . enumerateService ( ) ;
response = JSON . stringify ( services , null , 1 ) ;
break ;
}
case 'getscript' : {
2021-01-25 08:51:22 +03:00
if ( args [ '_' ] . length != 1 ) {
2021-01-25 02:19:29 +03:00
response = "Proper usage: getscript [scriptNumber]." ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
mesh . SendCommand ( { action : 'getScript' , type : args [ '_' ] [ 0 ] } ) ;
2019-08-01 02:49:23 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'diagnostic' :
{
2021-01-25 08:51:22 +03:00
if ( ! mesh . DAIPC . listening ) {
2021-01-25 02:19:29 +03:00
response = 'Unable to bind to Diagnostic IPC, most likely because the path (' + process . cwd ( ) + ') is not on a local file system' ;
break ;
2019-02-08 07:06:01 +03:00
}
2021-01-25 02:19:29 +03:00
var diag = diagnosticAgent _installCheck ( ) ;
2021-01-25 08:51:22 +03:00
if ( diag ) {
if ( args [ '_' ] . length == 1 && args [ '_' ] [ 0 ] == 'uninstall' ) {
2021-01-25 02:19:29 +03:00
diagnosticAgent _uninstall ( ) ;
response = 'Diagnostic Agent uninstalled' ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
response = 'Diagnostic Agent installed at: ' + diag . appLocation ( ) ;
2019-06-15 02:33:53 +03:00
}
2021-01-25 02:19:29 +03:00
}
2021-01-25 08:51:22 +03:00
else {
if ( args [ '_' ] . length == 1 && args [ '_' ] [ 0 ] == 'install' ) {
2021-01-25 02:19:29 +03:00
diag = diagnosticAgent _installCheck ( true ) ;
2021-01-25 08:51:22 +03:00
if ( diag ) {
2021-01-25 02:19:29 +03:00
response = 'Diagnostic agent was installed at: ' + diag . appLocation ( ) ;
2019-06-15 02:33:53 +03:00
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
response = 'Diagnostic agent installation failed' ;
2019-06-15 02:33:53 +03:00
}
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
response = 'Diagnostic Agent Not installed. To install: diagnostic install' ;
}
}
if ( diag ) { diag . close ( ) ; diag = null ; }
break ;
}
case 'amtevents' : {
if ( obj . amtevents == null ) { response = 'No events.' ; } else { response = obj . amtevents . join ( '\r\n' ) ; }
break ;
}
case 'amtconfig' : {
if ( amt == null ) { response = "Intel AMT not detected." ; break ; }
if ( apftunnel != null ) { response = "Intel AMT server tunnel already active" ; break ; }
2021-01-25 08:51:22 +03:00
amt . getMeiState ( 15 , function ( state ) {
2021-01-25 02:19:29 +03:00
var rx = '' ;
if ( ( state == null ) || ( state . ProvisioningState == null ) ) { rx = "Intel AMT not ready for configuration." ; } else {
var apfarg = {
mpsurl : mesh . ServerUrl . replace ( 'agent.ashx' , 'apf.ashx' ) ,
mpsuser : Buffer . from ( mesh . ServerInfo . MeshID , 'hex' ) . toString ( 'base64' ) . substring ( 0 , 16 ) ,
mpspass : Buffer . from ( mesh . ServerInfo . MeshID , 'hex' ) . toString ( 'base64' ) . substring ( 0 , 16 ) ,
mpskeepalive : 60000 ,
clientname : state . OsHostname ,
clientaddress : '127.0.0.1' ,
clientuuid : state . UUID ,
conntype : 2 , // 0 = CIRA, 1 = Relay, 2 = LMS. The correct value is 2 since we are performing an LMS relay, other values for testing.
meiState : state // MEI state will be passed to MPS server
} ;
2021-01-25 08:51:22 +03:00
if ( ( state . UUID == null ) || ( state . UUID . length != 36 ) ) {
2021-01-25 02:19:29 +03:00
rx = "Unable to get Intel AMT UUID" ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
addAmtEvent ( 'User LMS tunnel start.' ) ;
apftunnel = require ( 'amt-apfclient' ) ( { debug : false } , apfarg ) ;
2021-03-06 04:45:17 +03:00
apftunnel . onJsonControl = handleApfJsonControl ;
2021-01-25 02:19:29 +03:00
apftunnel . onChannelClosed = function ( ) { addAmtEvent ( 'User LMS tunnel closed.' ) ; apftunnel = null ; }
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
apftunnel . connect ( ) ;
rx = "Started Intel AMT configuration" ;
2021-01-25 08:51:22 +03:00
} catch ( ex ) {
2021-01-25 02:19:29 +03:00
rx = JSON . stringify ( ex ) ;
2019-06-15 02:33:53 +03:00
}
}
}
2021-01-25 02:19:29 +03:00
if ( rx != '' ) { require ( 'MeshAgent' ) . SendCommand ( { action : 'msg' , type : 'console' , value : rx } ) ; }
} ) ;
break ;
}
case 'apf' : {
2021-01-25 08:51:22 +03:00
if ( meshCoreObj . intelamt !== null ) {
if ( args [ '_' ] . length == 1 ) {
2021-01-25 02:19:29 +03:00
var connType = - 1 , connTypeStr = args [ '_' ] [ 0 ] . toLowerCase ( ) ;
if ( connTypeStr == 'lms' ) { connType = 2 ; }
if ( connTypeStr == 'relay' ) { connType = 1 ; }
if ( connTypeStr == 'cira' ) { connType = 0 ; }
if ( connTypeStr == 'off' ) { connType = - 2 ; }
2021-01-25 08:51:22 +03:00
if ( connType >= 0 ) { // Connect
2020-10-21 04:14:00 +03:00
var apfarg = {
mpsurl : mesh . ServerUrl . replace ( 'agent.ashx' , 'apf.ashx' ) ,
mpsuser : Buffer . from ( mesh . ServerInfo . MeshID , 'hex' ) . toString ( 'base64' ) . substring ( 0 , 16 ) ,
mpspass : Buffer . from ( mesh . ServerInfo . MeshID , 'hex' ) . toString ( 'base64' ) . substring ( 0 , 16 ) ,
mpskeepalive : 60000 ,
2021-01-25 02:19:29 +03:00
clientname : require ( 'os' ) . hostname ( ) ,
2020-10-21 04:14:00 +03:00
clientaddress : '127.0.0.1' ,
2021-01-25 02:19:29 +03:00
clientuuid : meshCoreObj . intelamt . uuid ,
conntype : connType // 0 = CIRA, 1 = Relay, 2 = LMS. The correct value is 2 since we are performing an LMS relay, other values for testing.
2020-10-21 04:14:00 +03:00
} ;
2021-01-25 08:51:22 +03:00
if ( ( apfarg . clientuuid == null ) || ( apfarg . clientuuid . length != 36 ) ) {
2021-01-25 02:19:29 +03:00
response = "Unable to get Intel AMT UUID: " + apfarg . clientuuid ;
2021-01-25 08:51:22 +03:00
} else {
2020-10-28 09:55:00 +03:00
apftunnel = require ( 'amt-apfclient' ) ( { debug : false } , apfarg ) ;
2021-03-06 04:45:17 +03:00
apftunnel . onJsonControl = handleApfJsonControl ;
2021-01-25 02:19:29 +03:00
apftunnel . onChannelClosed = function ( ) { apftunnel = null ; }
2021-01-25 08:51:22 +03:00
try {
2020-10-21 04:14:00 +03:00
apftunnel . connect ( ) ;
2021-01-25 02:19:29 +03:00
response = "Started APF tunnel" ;
2021-01-25 08:51:22 +03:00
} catch ( e ) {
2020-10-12 19:29:34 +03:00
response = JSON . stringify ( e ) ;
2019-09-17 23:11:22 +03:00
}
}
2021-01-25 08:51:22 +03:00
} else if ( connType == - 2 ) { // Disconnect
try {
2021-01-25 02:19:29 +03:00
apftunnel . disconnect ( ) ;
response = "Stopped APF tunnel" ;
2021-01-25 08:51:22 +03:00
} catch ( e ) {
2021-01-25 02:19:29 +03:00
response = JSON . stringify ( e ) ;
}
apftunnel = null ;
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response = "Invalid command.\r\nUse: apf lms|relay|cira|off" ;
2019-09-17 23:11:22 +03:00
}
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response = "APF tunnel is " + ( apftunnel == null ? "off" : "on" ) + "\r\nUse: apf lms|relay|cira|off" ;
2019-09-17 23:11:22 +03:00
}
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response = "APF tunnel requires Intel AMT" ;
2019-09-17 23:11:22 +03:00
}
2021-01-25 02:19:29 +03:00
break ;
}
case 'plugin' : {
2021-01-25 08:51:22 +03:00
if ( typeof args [ '_' ] [ 0 ] == 'string' ) {
try {
2021-01-25 02:19:29 +03:00
// Pass off the action to the plugin
// for plugin creators, you'll want to have a plugindir/modules_meshcore/plugin.js
// to control the output / actions here.
response = require ( args [ '_' ] [ 0 ] ) . consoleaction ( args , rights , sessionid , mesh ) ;
2021-01-25 08:51:22 +03:00
} catch ( e ) {
2021-01-25 02:19:29 +03:00
response = "There was an error in the plugin (" + e + ")" ;
2019-10-10 21:13:25 +03:00
}
2021-01-25 08:51:22 +03:00
} else {
2021-01-25 02:19:29 +03:00
response = "Proper usage: plugin [pluginName] [args]." ;
2017-08-28 19:27:45 +03:00
}
2021-01-19 06:04:53 +03:00
break ;
}
2021-01-25 02:19:29 +03:00
default : { // This is an unknown command, return an error message
response = "Unknown command \"" + cmd + "\", type \"help\" for list of avaialble commands." ;
break ;
2021-01-19 06:04:53 +03:00
}
}
2021-01-25 02:19:29 +03:00
} catch ( e ) { response = "Command returned an exception error: " + e ; console . log ( e ) ; }
if ( response != null ) { sendConsoleText ( response , sessionid ) ; }
}
2021-01-19 06:04:53 +03:00
2021-01-25 02:19:29 +03:00
// Send a mesh agent console command
2021-01-25 08:51:22 +03:00
function sendConsoleText ( text , sessionid ) {
2021-01-25 02:19:29 +03:00
if ( typeof text == 'object' ) { text = JSON . stringify ( text ) ; }
if ( debugConsole && ( ( sessionid == null ) || ( sessionid == 'pipe' ) ) ) { broadcastToRegisteredApps ( { cmd : 'console' , value : text } ) ; }
if ( sessionid != 'pipe' ) { require ( 'MeshAgent' ) . SendCommand ( { action : 'msg' , type : 'console' , value : text , sessionid : sessionid } ) ; }
}
2021-01-19 06:04:53 +03:00
2021-06-08 10:11:17 +03:00
function removeAgentMessage ( msgid )
{
var ret = false ;
if ( msgid == null )
{
// Delete all messages
sendAgentMessage . messages = [ ] ;
ret = true ;
}
else
{
var i = sendAgentMessage . messages . findIndex ( function ( v ) { return ( v . id == msgid ) ; } ) ;
if ( i >= 0 )
{
sendAgentMessage . messages . splice ( i , 1 ) ;
ret = true ;
}
}
if ( ret ) { sendAgentMessage ( ) ; }
return ( ret ) ;
}
2021-01-25 02:19:29 +03:00
// Send a mesh agent message to server, placing a bubble/badge on the agent device
2021-06-08 10:11:17 +03:00
function sendAgentMessage ( msg , icon , serverid , first )
{
if ( sendAgentMessage . messages == null )
{
sendAgentMessage . messages = [ ] ;
}
if ( arguments . length > 0 )
{
if ( first == null || ( serverid && first && sendAgentMessage . messages . findIndex ( function ( v ) { return ( v . msgid == serverid ) ; } ) < 0 ) )
{
sendAgentMessage . messages . push ( { msg : msg , icon : icon , msgid : serverid } ) ;
sendAgentMessage . messages . peek ( ) . id = sendAgentMessage . messages . peek ( ) . _hashCode ( ) ;
}
}
var p = { } , i ;
for ( i = 0 ; i < sendAgentMessage . messages . length ; ++ i )
{
p [ i ] = sendAgentMessage . messages [ i ] ;
}
try
{
require ( 'MeshAgent' ) . SendCommand ( { action : 'sessions' , type : 'msg' , value : p } ) ;
}
catch ( ex )
{
2021-01-25 02:19:29 +03:00
}
2021-06-08 10:11:17 +03:00
return ( arguments . length > 0 ? sendAgentMessage . messages . peek ( ) . id : sendAgentMessage . messages ) ;
2021-01-25 02:19:29 +03:00
}
2021-04-24 20:53:13 +03:00
function getOpenDescriptors ( ) {
switch ( process . platform ) {
2021-01-27 11:43:58 +03:00
case "freebsd" :
var child = require ( 'child_process' ) . execFile ( '/bin/sh' , [ 'sh' ] ) ;
child . stdout . str = '' ; child . stdout . on ( 'data' , function ( c ) { this . str += c . toString ( ) ; } ) ;
child . stderr . on ( 'data' , function ( c ) { } ) ;
child . stdin . write ( "procstat -f " + process . pid + " | tr '\\n' '`' | awk -F'`' '" ) ;
child . stdin . write ( '{' ) ;
child . stdin . write ( ' DEL="";' ) ;
child . stdin . write ( ' printf "[";' ) ;
child . stdin . write ( ' for(i=1;i<NF;++i)' ) ;
child . stdin . write ( ' {' ) ;
child . stdin . write ( ' A=split($i,B," ");' ) ;
child . stdin . write ( ' if(B[3] ~ /^[0-9]/)' ) ;
child . stdin . write ( ' {' ) ;
child . stdin . write ( ' printf "%s%s", DEL, B[3];' ) ;
child . stdin . write ( ' DEL=",";' ) ;
child . stdin . write ( ' }' ) ;
child . stdin . write ( ' }' ) ;
child . stdin . write ( ' printf "]";' ) ;
child . stdin . write ( "}'" ) ;
child . stdin . write ( '\nexit\n' ) ;
child . waitExit ( ) ;
2021-04-24 20:53:13 +03:00
try {
2021-01-27 11:43:58 +03:00
return ( JSON . parse ( child . stdout . str . trim ( ) ) ) ;
}
2021-04-24 20:53:13 +03:00
catch ( e ) {
2021-01-27 11:43:58 +03:00
return ( [ ] ) ;
}
break ;
case "linux" :
var child = require ( 'child_process' ) . execFile ( '/bin/sh' , [ 'sh' ] ) ;
child . stdout . str = '' ; child . stdout . on ( 'data' , function ( c ) { this . str += c . toString ( ) ; } ) ;
child . stderr . on ( 'data' , function ( c ) { } ) ;
child . stdin . write ( "ls /proc/" + process . pid + "/fd | tr '\\n' '`' | awk -F'`' '" ) ;
child . stdin . write ( '{' ) ;
child . stdin . write ( ' printf "[";' ) ;
child . stdin . write ( ' DEL="";' ) ;
child . stdin . write ( ' for(i=1;i<NF;++i)' ) ;
child . stdin . write ( ' {' ) ;
child . stdin . write ( ' printf "%s%s",DEL,$i;' ) ;
child . stdin . write ( ' DEL=",";' ) ;
child . stdin . write ( ' }' ) ;
child . stdin . write ( ' printf "]";' ) ;
child . stdin . write ( "}'" ) ;
child . stdin . write ( '\nexit\n' ) ;
child . waitExit ( ) ;
2021-04-24 20:53:13 +03:00
try {
2021-01-27 11:43:58 +03:00
return ( JSON . parse ( child . stdout . str . trim ( ) ) ) ;
}
2021-04-24 20:53:13 +03:00
catch ( e ) {
2021-01-27 11:43:58 +03:00
return ( [ ] ) ;
}
break ;
default :
return ( [ ] ) ;
}
}
2021-04-24 20:53:13 +03:00
function closeDescriptors ( libc , descriptors ) {
2021-01-27 11:43:58 +03:00
var fd = null ;
2021-04-24 20:53:13 +03:00
while ( descriptors . length > 0 ) {
2021-01-27 11:43:58 +03:00
fd = descriptors . pop ( ) ;
2021-04-24 20:53:13 +03:00
if ( fd > 2 ) {
2021-01-27 11:43:58 +03:00
libc . close ( fd ) ;
}
}
}
2021-04-24 20:53:13 +03:00
function linux _execv ( name , agentfilename , sessionid ) {
2021-01-25 02:19:29 +03:00
var libs = require ( 'monitor-info' ) . getLibInfo ( 'libc' ) ;
var libc = null ;
2021-01-19 06:04:53 +03:00
2021-04-24 20:53:13 +03:00
if ( ( libs . length == 0 || libs . length == null ) && require ( 'MeshAgent' ) . ARCHID == 33 ) {
2021-01-29 08:32:59 +03:00
var child = require ( 'child_process' ) . execFile ( '/bin/sh' , [ 'sh' ] ) ;
child . stdout . str = '' ; child . stdout . on ( 'data' , function ( c ) { this . str += c . toString ( ) ; } ) ;
child . stderr . str = '' ; child . stderr . on ( 'data' , function ( c ) { this . str += c . toString ( ) ; } ) ;
child . stdin . write ( "ls /lib/libc.* | tr '\\n' '`' | awk -F'`' '{ " + ' printf "["; DEL=""; for(i=1;i<NF;++i) { printf "%s{\\"path\\":\\"%s\\"}",DEL,$i; DEL=""; } printf "]"; }\'\nexit\n' ) ;
child . waitExit ( ) ;
2021-04-24 20:53:13 +03:00
try {
2021-01-29 08:32:59 +03:00
libs = JSON . parse ( child . stdout . str . trim ( ) ) ;
}
2021-04-24 20:53:13 +03:00
catch ( e ) {
2021-01-29 08:32:59 +03:00
}
}
2021-04-24 20:53:13 +03:00
while ( libs . length > 0 ) {
try {
2021-01-25 02:19:29 +03:00
libc = require ( '_GenericMarshal' ) . CreateNativeProxy ( libs . pop ( ) . path ) ;
break ;
2021-01-19 06:04:53 +03:00
}
2021-04-24 20:53:13 +03:00
catch ( e ) {
2021-01-25 02:19:29 +03:00
libc = null ;
continue ;
2021-01-19 06:04:53 +03:00
}
}
2021-01-25 08:51:22 +03:00
if ( libc != null ) {
try {
2021-01-19 06:04:53 +03:00
libc . CreateMethod ( 'execv' ) ;
2021-01-27 11:43:58 +03:00
libc . CreateMethod ( 'close' ) ;
2021-01-19 06:04:53 +03:00
}
2021-01-25 08:51:22 +03:00
catch ( e ) {
2021-01-25 02:19:29 +03:00
libc = null ;
2021-01-19 06:04:53 +03:00
}
2021-01-25 02:19:29 +03:00
}
2021-01-19 06:04:53 +03:00
2021-01-25 08:51:22 +03:00
if ( libc == null ) {
2021-01-25 02:19:29 +03:00
// Couldn't find libc.so, fallback to using service manager to restart agent
if ( sessionid != null ) { sendConsoleText ( 'Restarting service via service-manager...' , sessionid ) }
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
// restart service
var s = require ( 'service-manager' ) . manager . getService ( name ) ;
s . restart ( ) ;
2021-01-19 06:04:53 +03:00
}
2021-01-25 08:51:22 +03:00
catch ( zz ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( 'Self Update encountered an error trying to restart service' , sessionid ) ;
sendAgentMessage ( 'Self Update encountered an error trying to restart service' , 3 ) ;
2021-01-19 06:04:53 +03:00
}
2021-01-25 02:19:29 +03:00
return ;
2021-01-19 06:04:53 +03:00
}
2021-01-25 02:19:29 +03:00
if ( sessionid != null ) { sendConsoleText ( 'Restarting service via execv()...' , sessionid ) }
var i ;
var args ;
2021-01-27 11:43:58 +03:00
var argarr = [ process . execPath ] ;
2021-02-03 09:32:09 +03:00
var argtmp = [ ] ;
2021-01-25 02:19:29 +03:00
var path = require ( '_GenericMarshal' ) . CreateVariable ( process . execPath ) ;
2021-01-25 08:51:22 +03:00
if ( require ( 'MeshAgent' ) . getStartupOptions != null ) {
2021-01-25 02:19:29 +03:00
var options = require ( 'MeshAgent' ) . getStartupOptions ( ) ;
2021-01-25 08:51:22 +03:00
for ( i in options ) {
2021-01-25 02:19:29 +03:00
argarr . push ( '--' + i + '="' + options [ i ] + '"' ) ;
2021-01-16 13:00:40 +03:00
}
2021-01-25 02:19:29 +03:00
}
args = require ( '_GenericMarshal' ) . CreateVariable ( ( 1 + argarr . length ) * require ( '_GenericMarshal' ) . PointerSize ) ;
2021-01-25 08:51:22 +03:00
for ( i = 0 ; i < argarr . length ; ++ i ) {
2021-01-25 02:19:29 +03:00
var arg = require ( '_GenericMarshal' ) . CreateVariable ( argarr [ i ] ) ;
2021-02-03 09:32:09 +03:00
argtmp . push ( arg ) ;
2021-01-25 02:19:29 +03:00
arg . pointerBuffer ( ) . copy ( args . toBuffer ( ) , i * require ( '_GenericMarshal' ) . PointerSize ) ;
}
2021-01-27 11:43:58 +03:00
var descriptors = getOpenDescriptors ( ) ;
closeDescriptors ( libc , descriptors ) ;
2021-01-25 02:19:29 +03:00
libc . execv ( path , args ) ;
if ( sessionid != null ) { sendConsoleText ( 'Self Update failed because execv() failed' , sessionid ) }
sendAgentMessage ( 'Self Update failed because execv() failed' , 3 ) ;
}
2021-01-16 13:00:40 +03:00
2021-01-25 08:51:22 +03:00
function bsd _execv ( name , agentfilename , sessionid ) {
2021-01-25 02:19:29 +03:00
var child = require ( 'child_process' ) . execFile ( '/bin/sh' , [ 'sh' ] ) ;
child . stdout . str = '' ; child . stdout . on ( 'data' , function ( c ) { this . str += c . toString ( ) ; } ) ;
child . stderr . str = '' ; child . stderr . on ( 'data' , function ( c ) { this . str += c . toString ( ) ; } ) ;
child . stdin . write ( "cat /usr/lib/libc.so | awk '" ) ;
child . stdin . write ( '{' ) ;
child . stdin . write ( ' a=split($0, tok, "(");' ) ;
child . stdin . write ( ' if(a>1)' ) ;
child . stdin . write ( ' {' ) ;
child . stdin . write ( ' split(tok[2], b, ")");' ) ;
child . stdin . write ( ' split(b[1], c, " ");' ) ;
child . stdin . write ( ' print c[1];' ) ;
child . stdin . write ( ' }' ) ;
child . stdin . write ( "}'\nexit\n" ) ;
child . waitExit ( ) ;
2021-01-25 08:51:22 +03:00
if ( child . stdout . str . trim ( ) == '' ) {
2021-01-25 02:19:29 +03:00
if ( sessionid != null ) { sendConsoleText ( 'Self Update failed because cannot find libc.so' , sessionid ) }
sendAgentMessage ( 'Self Update failed because cannot find libc.so' , 3 ) ;
return ;
}
2021-01-16 13:00:40 +03:00
2021-01-25 02:19:29 +03:00
var libc = null ;
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
libc = require ( '_GenericMarshal' ) . CreateNativeProxy ( child . stdout . str . trim ( ) ) ;
libc . CreateMethod ( 'execv' ) ;
2021-01-27 11:43:58 +03:00
libc . CreateMethod ( 'close' ) ;
2021-01-25 02:19:29 +03:00
}
2021-01-25 08:51:22 +03:00
catch ( e ) {
2021-01-25 02:19:29 +03:00
if ( sessionid != null ) { sendConsoleText ( 'Self Update failed: ' + e . toString ( ) , sessionid ) }
sendAgentMessage ( 'Self Update failed: ' + e . toString ( ) , 3 ) ;
return ;
}
2021-01-16 13:00:40 +03:00
2021-01-25 02:19:29 +03:00
var i ;
var path = require ( '_GenericMarshal' ) . CreateVariable ( process . execPath ) ;
2021-01-27 11:43:58 +03:00
var argarr = [ process . execPath ] ;
2021-02-03 09:32:09 +03:00
var argtmp = [ ] ;
2021-01-25 02:19:29 +03:00
var args ;
var options = require ( 'MeshAgent' ) . getStartupOptions ( ) ;
2021-01-25 08:51:22 +03:00
for ( i in options ) {
2021-01-25 02:19:29 +03:00
argarr . push ( '--' + i + '="' + options [ i ] + '"' ) ;
}
args = require ( '_GenericMarshal' ) . CreateVariable ( ( 1 + argarr . length ) * require ( '_GenericMarshal' ) . PointerSize ) ;
2021-01-25 08:51:22 +03:00
for ( i = 0 ; i < argarr . length ; ++ i ) {
2021-01-25 02:19:29 +03:00
var arg = require ( '_GenericMarshal' ) . CreateVariable ( argarr [ i ] ) ;
2021-02-03 09:32:09 +03:00
argtmp . push ( arg ) ;
2021-01-25 02:19:29 +03:00
arg . pointerBuffer ( ) . copy ( args . toBuffer ( ) , i * require ( '_GenericMarshal' ) . PointerSize ) ;
2021-01-16 13:00:40 +03:00
}
2021-01-27 08:53:20 +03:00
if ( sessionid != null ) { sendConsoleText ( 'Restarting service via execv()' , sessionid ) }
2021-01-27 11:43:58 +03:00
var descriptors = getOpenDescriptors ( ) ;
closeDescriptors ( libc , descriptors ) ;
2021-01-25 02:19:29 +03:00
libc . execv ( path , args ) ;
if ( sessionid != null ) { sendConsoleText ( 'Self Update failed because execv() failed' , sessionid ) }
sendAgentMessage ( 'Self Update failed because execv() failed' , 3 ) ;
}
2021-04-24 20:53:13 +03:00
function windows _execve ( name , agentfilename , sessionid ) {
2021-01-25 02:19:29 +03:00
var libc ;
2021-04-24 20:53:13 +03:00
try {
2021-01-25 02:19:29 +03:00
libc = require ( '_GenericMarshal' ) . CreateNativeProxy ( 'msvcrt.dll' ) ;
libc . CreateMethod ( '_wexecve' ) ;
}
2021-04-24 20:53:13 +03:00
catch ( xx ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( 'Self Update failed because msvcrt.dll is missing' , sessionid ) ;
sendAgentMessage ( 'Self Update failed because msvcrt.dll is missing' , 3 ) ;
return ;
}
var cmd = require ( '_GenericMarshal' ) . CreateVariable ( process . env [ 'windir' ] + '\\system32\\cmd.exe' , { wide : true } ) ;
var args = require ( '_GenericMarshal' ) . CreateVariable ( 3 * require ( '_GenericMarshal' ) . PointerSize ) ;
var arg1 = require ( '_GenericMarshal' ) . CreateVariable ( 'cmd.exe' , { wide : true } ) ;
2021-02-06 01:45:43 +03:00
var arg2 = require ( '_GenericMarshal' ) . CreateVariable ( '/C wmic service "' + name + '" call stopservice & "' + process . cwd ( ) + agentfilename + '.update.exe" -b64exec ' + 'dHJ5CnsKICAgIHZhciBzZXJ2aWNlTG9jYXRpb24gPSBwcm9jZXNzLmFyZ3YucG9wKCk7CiAgICByZXF1aXJlKCdwcm9jZXNzLW1hbmFnZXInKS5lbnVtZXJhdGVQcm9jZXNzZXMoKS50aGVuKGZ1bmN0aW9uIChwcm9jKQogICAgewogICAgICAgIGZvciAodmFyIHAgaW4gcHJvYykKICAgICAgICB7CiAgICAgICAgICAgIGlmIChwcm9jW3BdLnBhdGggPT0gc2VydmljZUxvY2F0aW9uKQogICAgICAgICAgICB7CiAgICAgICAgICAgICAgICBwcm9jZXNzLmtpbGwocHJvY1twXS5waWQpOwogICAgICAgICAgICB9CiAgICAgICAgfQogICAgICAgIHByb2Nlc3MuZXhpdCgpOwogICAgfSk7Cn0KY2F0Y2goZSkKewogICAgcHJvY2Vzcy5leGl0KCk7Cn0=' +
' "' + process . execPath + '" & copy "' + process . cwd ( ) + agentfilename + '.update.exe" "' + process . execPath + '" & wmic service "' + name + '" call startservice & erase "' + process . cwd ( ) + agentfilename + '.update.exe"' , { wide : true } ) ;
2021-01-25 02:19:29 +03:00
arg1 . pointerBuffer ( ) . copy ( args . toBuffer ( ) ) ;
arg2 . pointerBuffer ( ) . copy ( args . toBuffer ( ) , require ( '_GenericMarshal' ) . PointerSize ) ;
2021-01-15 10:57:52 +03:00
2021-01-25 02:19:29 +03:00
libc . _wexecve ( cmd , args , 0 ) ;
}
// Start a JavaScript based Agent Self-Update
2021-01-25 08:51:22 +03:00
function agentUpdate _Start ( updateurl , updateoptions ) {
2021-01-25 02:19:29 +03:00
// If this value is null
var sessionid = ( updateoptions != null ) ? updateoptions . sessionid : null ; // If this is null, messages will be broadcast. Otherwise they will be unicasted
2021-01-29 02:49:42 +03:00
// If the url starts with *, switch it to use the same protoco, host and port as the control channel.
2021-03-05 03:27:43 +03:00
if ( updateurl != null ) {
updateurl = getServerTargetUrlEx ( updateurl ) ;
if ( updateurl . startsWith ( "wss://" ) ) { updateurl = "https://" + updateurl . substring ( 6 ) ; }
}
2021-01-29 02:49:42 +03:00
2021-01-25 08:51:22 +03:00
if ( agentUpdate _Start . _selfupdate != null ) {
2021-01-25 02:19:29 +03:00
// We were already called, so we will ignore this duplicate request
if ( sessionid != null ) { sendConsoleText ( 'Self update already in progress...' , sessionid ) ; }
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
if ( agentUpdate _Start . _retryCount == null ) { agentUpdate _Start . _retryCount = 0 ; }
2021-01-25 08:51:22 +03:00
if ( require ( 'MeshAgent' ) . ARCHID == null && updateurl == null ) {
2021-01-25 02:19:29 +03:00
// This agent doesn't have the ability to tell us which ARCHID it is, so we don't know which agent to pull
sendConsoleText ( 'Unable to initiate update, agent ARCHID is not defined' , sessionid ) ;
2021-01-15 10:57:52 +03:00
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
var agentfilename = process . execPath . split ( process . platform == 'win32' ? '\\' : '/' ) . pop ( ) ; // Local File Name, ie: MeshAgent.exe
var name = require ( 'MeshAgent' ) . serviceName ;
2021-01-29 02:49:42 +03:00
if ( name == null ) { name = ( process . platform == 'win32' ? 'Mesh Agent' : 'meshagent' ) ; } // This is an older agent that doesn't expose the service name, so use the default
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
var s = require ( 'service-manager' ) . manager . getService ( name ) ;
2021-01-25 08:51:22 +03:00
if ( ! s . isMe ( ) ) {
2021-01-15 10:57:52 +03:00
if ( process . platform == 'win32' ) { s . close ( ) ; }
2021-01-25 02:19:29 +03:00
sendConsoleText ( 'Self Update cannot continue, this agent is not an instance of (' + name + ')' , sessionid ) ;
2021-01-15 10:57:52 +03:00
return ;
}
2021-01-25 02:19:29 +03:00
if ( process . platform == 'win32' ) { s . close ( ) ; }
}
2021-01-25 08:51:22 +03:00
catch ( zz ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( 'Self Update Failed because this agent is not an instance of (' + name + ')' , sessionid ) ;
sendAgentMessage ( 'Self Update Failed because this agent is not an instance of (' + name + ')' , 3 ) ;
return ;
}
2021-01-15 10:57:52 +03:00
2021-03-05 03:27:43 +03:00
if ( ( sessionid != null ) && ( updateurl != null ) ) { sendConsoleText ( 'Downloading update from: ' + updateurl , sessionid ) ; }
2021-01-25 02:19:29 +03:00
var options = require ( 'http' ) . parseUri ( updateurl != null ? updateurl : require ( 'MeshAgent' ) . ServerUrl ) ;
options . protocol = 'https:' ;
2021-03-05 03:27:43 +03:00
if ( updateurl == null ) { options . path = ( '/meshagents?id=' + require ( 'MeshAgent' ) . ARCHID ) ; sendConsoleText ( 'Downloading update from: ' + options . path , sessionid ) ; }
2021-01-25 02:19:29 +03:00
options . rejectUnauthorized = false ;
2021-01-25 08:51:22 +03:00
options . checkServerIdentity = function checkServerIdentity ( certs ) {
2021-01-25 02:19:29 +03:00
// If the tunnel certificate matches the control channel certificate, accept the connection
try { if ( require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate . digest == certs [ 0 ] . digest ) return ; } catch ( ex ) { }
try { if ( require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate . fingerprint == certs [ 0 ] . fingerprint ) return ; } catch ( ex ) { }
2021-01-15 10:57:52 +03:00
2021-01-25 02:19:29 +03:00
// Check that the certificate is the one expected by the server, fail if not.
2021-01-25 08:51:22 +03:00
if ( checkServerIdentity . servertlshash == null ) {
2021-01-25 02:19:29 +03:00
if ( require ( 'MeshAgent' ) . ServerInfo == null || require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate == null ) { return ; }
2021-01-29 02:49:42 +03:00
sendConsoleText ( 'Self Update failed, because the url cannot be verified: ' + updateurl , sessionid ) ;
sendAgentMessage ( 'Self Update failed, because the url cannot be verified: ' + updateurl , 3 ) ;
2021-01-25 02:19:29 +03:00
throw new Error ( 'BadCert' ) ;
2021-01-15 10:57:52 +03:00
}
2021-01-25 02:19:29 +03:00
if ( certs [ 0 ] . digest == null ) { return ; }
2021-01-25 08:51:22 +03:00
if ( ( checkServerIdentity . servertlshash != null ) && ( checkServerIdentity . servertlshash . toLowerCase ( ) != certs [ 0 ] . digest . split ( ':' ) . join ( '' ) . toLowerCase ( ) ) ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( 'Self Update failed, because the supplied certificate does not match' , sessionid ) ;
sendAgentMessage ( 'Self Update failed, because the supplied certificate does not match' , 3 ) ;
throw new Error ( 'BadCert' )
}
}
options . checkServerIdentity . servertlshash = ( updateoptions != null ? updateoptions . tlshash : null ) ;
agentUpdate _Start . _selfupdate = require ( 'https' ) . get ( options ) ;
2021-01-25 08:51:22 +03:00
agentUpdate _Start . _selfupdate . on ( 'error' , function ( e ) {
2021-01-29 02:49:42 +03:00
sendConsoleText ( 'Self Update failed, because there was a problem trying to download the update from ' + updateurl , sessionid ) ;
sendAgentMessage ( 'Self Update failed, because there was a problem trying to download the update from ' + updateurl , 3 ) ;
2021-01-29 00:41:19 +03:00
agentUpdate _Start . _selfupdate = null ;
2021-01-25 02:19:29 +03:00
} ) ;
2021-01-25 08:51:22 +03:00
agentUpdate _Start . _selfupdate . on ( 'response' , function ( img ) {
2021-02-09 10:28:49 +03:00
this . _file = require ( 'fs' ) . createWriteStream ( agentfilename + ( process . platform == 'win32' ? '.update.exe' : '.update' ) , { flags : 'wb' } ) ;
2021-01-25 02:19:29 +03:00
this . _filehash = require ( 'SHA384Stream' ) . create ( ) ;
2021-01-25 08:51:22 +03:00
this . _filehash . on ( 'hash' , function ( h ) {
if ( updateoptions != null && updateoptions . hash != null ) {
if ( updateoptions . hash . toLowerCase ( ) == h . toString ( 'hex' ) . toLowerCase ( ) ) {
2021-01-25 02:19:29 +03:00
if ( sessionid != null ) { sendConsoleText ( 'Download complete. HASH verified.' , sessionid ) ; }
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
agentUpdate _Start . _retryCount ++ ;
2021-01-29 02:49:42 +03:00
sendConsoleText ( 'Self Update FAILED because the downloaded agent FAILED hash check (' + agentUpdate _Start . _retryCount + '), URL: ' + updateurl , sessionid ) ;
sendAgentMessage ( 'Self Update FAILED because the downloaded agent FAILED hash check (' + agentUpdate _Start . _retryCount + '), URL: ' + updateurl , 3 ) ;
2021-01-25 02:19:29 +03:00
agentUpdate _Start . _selfupdate = null ;
2021-01-25 08:51:22 +03:00
if ( agentUpdate _Start . _retryCount < 4 ) {
2021-01-25 02:19:29 +03:00
// Retry the download again
sendConsoleText ( 'Self Update will try again in 60 seconds...' , sessionid ) ;
agentUpdate _Start . _timeout = setTimeout ( agentUpdate _Start , 60000 , updateurl , updateoptions ) ;
2021-01-15 10:57:52 +03:00
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
sendConsoleText ( 'Self Update giving up, too many failures...' , sessionid ) ;
sendAgentMessage ( 'Self Update giving up, too many failures...' , 3 ) ;
2021-01-15 10:57:52 +03:00
}
2021-01-25 02:19:29 +03:00
return ;
2021-01-15 10:57:52 +03:00
}
2021-01-25 02:19:29 +03:00
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
sendConsoleText ( 'Download complete. HASH=' + h . toString ( 'hex' ) , sessionid ) ;
}
2021-01-15 10:57:52 +03:00
2021-01-25 02:19:29 +03:00
// Send an indication to the server that we got the update download correctly.
try { require ( 'MeshAgent' ) . SendCommand ( { action : 'agentupdatedownloaded' } ) ; } catch ( e ) { }
2021-01-17 10:35:39 +03:00
2021-01-25 02:19:29 +03:00
if ( sessionid != null ) { sendConsoleText ( 'Updating and restarting agent...' , sessionid ) ; }
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
2021-01-25 02:19:29 +03:00
// Use _wexecve() equivalent to perform the update
windows _execve ( name , agentfilename , sessionid ) ;
}
2021-01-25 08:51:22 +03:00
else {
2021-01-25 02:19:29 +03:00
var m = require ( 'fs' ) . statSync ( process . execPath ) . mode ;
require ( 'fs' ) . chmodSync ( process . cwd ( ) + agentfilename + '.update' , m ) ;
2021-01-19 06:04:53 +03:00
2021-01-25 02:19:29 +03:00
// remove binary
require ( 'fs' ) . unlinkSync ( process . execPath ) ;
2021-01-15 10:57:52 +03:00
2021-01-25 02:19:29 +03:00
// copy update
require ( 'fs' ) . copyFileSync ( process . cwd ( ) + agentfilename + '.update' , process . execPath ) ;
require ( 'fs' ) . chmodSync ( process . execPath , m ) ;
2021-01-15 10:57:52 +03:00
2021-01-25 02:19:29 +03:00
// erase update
require ( 'fs' ) . unlinkSync ( process . cwd ( ) + agentfilename + '.update' ) ;
2021-01-15 10:57:52 +03:00
2021-01-25 08:51:22 +03:00
switch ( process . platform ) {
2021-01-25 02:19:29 +03:00
case 'freebsd' :
bsd _execv ( name , agentfilename , sessionid ) ;
break ;
case 'linux' :
linux _execv ( name , agentfilename , sessionid ) ;
break ;
default :
2021-01-25 08:51:22 +03:00
try {
2021-01-25 02:19:29 +03:00
// restart service
var s = require ( 'service-manager' ) . manager . getService ( name ) ;
s . restart ( ) ;
}
2021-01-25 08:51:22 +03:00
catch ( zz ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( 'Self Update encountered an error trying to restart service' , sessionid ) ;
sendAgentMessage ( 'Self Update encountered an error trying to restart service' , 3 ) ;
}
break ;
2021-01-15 10:57:52 +03:00
}
2021-01-25 02:19:29 +03:00
}
2021-01-15 10:57:52 +03:00
} ) ;
2021-01-25 02:19:29 +03:00
img . pipe ( this . _file ) ;
img . pipe ( this . _filehash ) ;
} ) ;
2021-01-15 10:57:52 +03:00
}
}
2021-01-25 02:19:29 +03:00
}
2021-01-15 10:57:52 +03:00
2021-01-25 02:19:29 +03:00
// Called before the process exits
//process.exit = function (code) { console.log("Exit with code: " + code.toString()); }
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Called when the server connection state changes
2021-06-08 10:11:17 +03:00
function handleServerConnection ( state )
{
2021-01-25 02:19:29 +03:00
meshServerConnectionState = state ;
2021-06-08 10:11:17 +03:00
if ( meshServerConnectionState == 0 )
{
2021-01-25 02:19:29 +03:00
// Server disconnected
if ( selfInfoUpdateTimer != null ) { clearInterval ( selfInfoUpdateTimer ) ; selfInfoUpdateTimer = null ; }
lastSelfInfo = null ;
2021-06-08 10:11:17 +03:00
} else
{
2021-01-25 02:19:29 +03:00
// Server connected, send mesh core information
2021-06-08 10:11:17 +03:00
if ( require ( 'MeshAgent' ) . ServerInfo == null || require ( 'MeshAgent' ) . ServerInfo . ControlChannelCertificate == null )
{
// Outdated Agent, will have insecure tunnels
sendAgentMessage ( "This agent has an outdated certificate validation mechanism, consider updating." , 3 , 118 ) ;
}
else if ( global . _MSH == null )
{
2021-06-09 23:43:11 +03:00
sendAgentMessage ( "This is an old agent version, consider updating." , 3 , 117 ) ;
2021-06-08 10:11:17 +03:00
}
2021-01-25 02:19:29 +03:00
var oldNodeId = db . Get ( 'OldNodeId' ) ;
if ( oldNodeId != null ) { mesh . SendCommand ( { action : 'mc1migration' , oldnodeid : oldNodeId } ) ; }
2020-07-31 22:56:39 +03:00
2021-01-25 02:19:29 +03:00
// Send SMBios tables if present
if ( SMBiosTablesRaw != null ) { mesh . SendCommand ( { action : 'smbios' , value : SMBiosTablesRaw } ) ; }
2020-10-01 20:30:26 +03:00
2021-01-25 02:19:29 +03:00
// Update the server on with basic info, logged in users and more advanced stuff, like Intel ME and Network Settings
meInfoStr = null ;
sendPeriodicServerUpdate ( null , true ) ;
2021-06-08 10:11:17 +03:00
if ( selfInfoUpdateTimer == null )
{
2021-01-25 02:19:29 +03:00
selfInfoUpdateTimer = setInterval ( sendPeriodicServerUpdate , 1200000 ) ; // 20 minutes
selfInfoUpdateTimer . metadata = 'meshcore (InfoUpdate Timer)' ;
2020-10-01 20:30:26 +03:00
}
2020-10-12 08:24:30 +03:00
2021-01-25 02:19:29 +03:00
// Send any state messages
2021-06-08 10:11:17 +03:00
if ( Object . keys ( tunnelUserCount . msg ) . length > 0 )
{
sendAgentMessage ( ) ;
2021-01-25 02:19:29 +03:00
broadcastSessionsToRegisteredApps ( ) ;
2019-05-09 02:18:44 +03:00
}
2021-01-25 02:19:29 +03:00
// Send update of registered applications to the server
updateRegisteredAppsToServer ( ) ;
2017-08-28 19:27:45 +03:00
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Send server state update to registered applications
broadcastToRegisteredApps ( { cmd : 'serverstate' , value : meshServerConnectionState , url : require ( 'MeshAgent' ) . ConnectedServer } ) ;
}
// Update the server with the latest network interface information
var sendNetworkUpdateNagleTimer = null ;
function sendNetworkUpdateNagle ( ) { if ( sendNetworkUpdateNagleTimer != null ) { clearTimeout ( sendNetworkUpdateNagleTimer ) ; sendNetworkUpdateNagleTimer = null ; } sendNetworkUpdateNagleTimer = setTimeout ( sendNetworkUpdate , 5000 ) ; }
2021-01-25 08:51:22 +03:00
function sendNetworkUpdate ( force ) {
2021-01-25 02:19:29 +03:00
sendNetworkUpdateNagleTimer = null ;
2021-02-03 01:08:30 +03:00
try {
// Update the network interfaces information data
var netInfo = { netif2 : require ( 'os' ) . networkInterfaces ( ) } ;
if ( netInfo . netif2 ) {
netInfo . action = 'netinfo' ;
var netInfoStr = JSON . stringify ( netInfo ) ;
if ( ( force == true ) || ( clearGatewayMac ( netInfoStr ) != clearGatewayMac ( lastNetworkInfo ) ) ) { mesh . SendCommand ( netInfo ) ; lastNetworkInfo = netInfoStr ; }
}
} catch ( ex ) { }
2021-01-25 02:19:29 +03:00
}
2018-09-22 02:34:35 +03:00
2021-01-25 02:19:29 +03:00
// Called periodically to check if we need to send updates to the server
2021-01-25 08:51:22 +03:00
function sendPeriodicServerUpdate ( flags , force ) {
2021-01-25 02:19:29 +03:00
if ( meshServerConnectionState == 0 ) return ; // Not connected to server, do nothing.
if ( ! flags ) { flags = 0xFFFFFFFF ; }
// If we have a connected MEI, get Intel ME information
2021-01-25 08:51:22 +03:00
if ( ( flags & 1 ) && ( amt != null ) && ( amt . state == 2 ) ) {
2021-01-25 02:19:29 +03:00
delete meshCoreObj . intelamt ;
2021-01-25 08:51:22 +03:00
amt . getMeiState ( 9 , function ( meinfo ) {
2021-01-25 02:19:29 +03:00
meshCoreObj . intelamt = meinfo ;
meshCoreObj . intelamt . microlms = amt . lmsstate ;
meshCoreObjChanged ( ) ;
} ) ;
}
2018-09-22 02:34:35 +03:00
2021-01-25 02:19:29 +03:00
// Update network information
if ( flags & 2 ) { sendNetworkUpdateNagle ( false ) ; }
2019-08-02 21:35:59 +03:00
2021-01-25 02:19:29 +03:00
// Update anti-virus information
2021-01-25 08:51:22 +03:00
if ( ( flags & 4 ) && ( process . platform == 'win32' ) ) {
2021-01-25 02:19:29 +03:00
// Windows Command: "wmic /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct get /FORMAT:CSV"
try { meshCoreObj . av = require ( 'win-info' ) . av ( ) ; meshCoreObjChanged ( ) ; } catch ( e ) { av = null ; } // Antivirus
//if (process.platform == 'win32') { try { meshCoreObj.pr = require('win-info').pendingReboot(); meshCoreObjChanged(); } catch (e) { meshCoreObj.pr = null; } } // Pending reboot
}
2021-01-25 08:51:22 +03:00
if ( process . platform == 'win32' ) {
if ( require ( 'MeshAgent' ) . _securitycenter == null ) {
try {
2021-01-25 02:19:29 +03:00
require ( 'MeshAgent' ) . _securitycenter = require ( 'win-securitycenter' ) . status ( ) ;
2021-01-25 08:51:22 +03:00
meshCoreObj [ 'wsc' ] = require ( 'MeshAgent' ) . _securitycenter ; // Windows Security Central (WSC)
require ( 'win-securitycenter' ) . on ( 'changed' , function ( ) {
2021-01-21 21:01:09 +03:00
require ( 'MeshAgent' ) . _securitycenter = require ( 'win-securitycenter' ) . status ( ) ;
2021-01-25 08:51:22 +03:00
meshCoreObj [ 'wsc' ] = require ( 'MeshAgent' ) . _securitycenter ; // Windows Security Central (WSC)
require ( 'MeshAgent' ) . SendCommand ( { action : 'coreinfo' , wsc : require ( 'MeshAgent' ) . _securitycenter } ) ;
2021-01-25 02:19:29 +03:00
} ) ;
2021-01-25 08:51:22 +03:00
} catch ( e ) { }
2019-08-02 21:35:59 +03:00
}
2017-12-13 03:04:54 +03:00
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
// Send available data right now
2021-01-25 08:51:22 +03:00
if ( force ) {
2020-11-02 11:44:07 +03:00
meshCoreObj = sortObjRec ( meshCoreObj ) ;
var x = JSON . stringify ( meshCoreObj ) ;
2021-01-25 08:51:22 +03:00
if ( x != LastPeriodicServerUpdate ) {
2021-01-25 02:19:29 +03:00
LastPeriodicServerUpdate = x ;
mesh . SendCommand ( meshCoreObj ) ;
2020-11-03 13:58:29 +03:00
}
2020-11-02 11:44:07 +03:00
}
2021-01-25 02:19:29 +03:00
}
2020-11-02 11:44:07 +03:00
2021-01-25 02:19:29 +03:00
// Once we are done collecting all the data, send to server if needed
var LastPeriodicServerUpdate = null ;
var PeriodicServerUpdateNagleTimer = null ;
2021-01-25 08:51:22 +03:00
function meshCoreObjChanged ( ) {
if ( PeriodicServerUpdateNagleTimer == null ) {
2021-01-25 02:19:29 +03:00
PeriodicServerUpdateNagleTimer = setTimeout ( meshCoreObjChangedEx , 500 ) ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
}
2021-01-25 08:51:22 +03:00
function meshCoreObjChangedEx ( ) {
2021-01-25 02:19:29 +03:00
PeriodicServerUpdateNagleTimer = null ;
meshCoreObj = sortObjRec ( meshCoreObj ) ;
var x = JSON . stringify ( meshCoreObj ) ;
2021-01-25 08:51:22 +03:00
if ( x != LastPeriodicServerUpdate ) {
2021-01-25 02:19:29 +03:00
try { LastPeriodicServerUpdate = x ; mesh . SendCommand ( meshCoreObj ) ; } catch ( ex ) { }
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
}
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
function sortObjRec ( o ) { if ( ( typeof o != 'object' ) || ( Array . isArray ( o ) ) ) return o ; for ( var i in o ) { if ( typeof o [ i ] == 'object' ) { o [ i ] = sortObjRec ( o [ i ] ) ; } } return sortObj ( o ) ; }
function sortObj ( o ) { return Object . keys ( o ) . sort ( ) . reduce ( function ( result , key ) { result [ key ] = o [ key ] ; return result ; } , { } ) ; }
2019-10-10 21:13:25 +03:00
2021-01-25 02:19:29 +03:00
function onWebSocketClosed ( ) { sendConsoleText ( "WebSocket #" + this . httprequest . index + " closed." , this . httprequest . sessionid ) ; delete consoleWebSockets [ this . httprequest . index ] ; }
function onWebSocketData ( data ) { sendConsoleText ( "Got WebSocket #" + this . httprequest . index + " data: " + data , this . httprequest . sessionid ) ; }
function onWebSocketSendOk ( ) { sendConsoleText ( "WebSocket #" + this . index + " SendOK." , this . sessionid ) ; }
2018-07-03 00:34:10 +03:00
2021-01-25 08:51:22 +03:00
function onWebSocketUpgrade ( response , s , head ) {
2021-01-25 02:19:29 +03:00
sendConsoleText ( "WebSocket #" + this . index + " connected." , this . sessionid ) ;
this . s = s ;
s . httprequest = this ;
s . end = onWebSocketClosed ;
s . data = onWebSocketData ;
2017-08-28 19:27:45 +03:00
}
2021-01-25 02:19:29 +03:00
mesh . AddCommandHandler ( handleServerCommand ) ;
mesh . AddConnectHandler ( handleServerConnection ) ;