mirror of
https://github.com/Ylianst/MeshCentral.git
synced 2024-11-10 14:01:27 +03:00
1439 lines
80 KiB
JavaScript
1439 lines
80 KiB
JavaScript
/**
|
|
* @description MeshCentral remote desktop multiplexor
|
|
* @author Ylian Saint-Hilaire
|
|
* @copyright Intel Corporation 2018-2022
|
|
* @license Apache-2.0
|
|
* @version v0.0.1
|
|
*/
|
|
|
|
/*jslint node: true */
|
|
/*jshint node: true */
|
|
/*jshint strict:false */
|
|
/*jshint -W097 */
|
|
/*jshint esversion: 6 */
|
|
"use strict";
|
|
|
|
|
|
/*
|
|
--- KVM Commands ---
|
|
MNG_KVM_NOP = 0,
|
|
MNG_KVM_KEY = 1,
|
|
MNG_KVM_MOUSE = 2,
|
|
MNG_KVM_MOUSE_CURSOR = 88,
|
|
MNG_KVM_MOUSE_MOVE = 89,
|
|
MNG_KVM_PICTURE = 3,
|
|
MNG_KVM_COPY = 4,
|
|
MNG_KVM_COMPRESSION = 5,
|
|
MNG_KVM_REFRESH = 6,
|
|
MNG_KVM_SCREEN = 7,
|
|
MNG_KVM_PAUSE = 8,
|
|
MNG_TERMTEXT = 9,
|
|
MNG_CTRLALTDEL = 10,
|
|
MNG_KVM_GET_DISPLAYS = 11,
|
|
MNG_KVM_SET_DISPLAY = 12,
|
|
MNG_KVM_FRAME_RATE_TIMER = 13,
|
|
MNG_KVM_INIT_TOUCH = 14,
|
|
MNG_KVM_TOUCH = 15,
|
|
MNG_KVM_CONNECTCOUNT = 16,
|
|
MNG_KVM_MESSAGE = 17,
|
|
MNG_KVM_KEYSTATE = 18,
|
|
MNG_ECHO = 21,
|
|
MNG_JUMBO = 27,
|
|
MNG_GETDIR = 50,
|
|
MNG_FILEMOVE = 51,
|
|
MNG_FILEDELETE = 52,
|
|
MNG_FILECOPY = 53,
|
|
MNG_FILECREATEDIR = 54,
|
|
MNG_FILETRANSFER = 55,
|
|
MNG_FILEUPLOAD = 56,
|
|
MNG_FILESEARCH = 57,
|
|
MNG_FILETRANSFER2 = 58,
|
|
MNG_KVM_DISCONNECT = 59,
|
|
MNG_GETDIR2 = 60, // Same as MNG_GETDIR but with date/time.
|
|
MNG_FILEUPLOAD2 = 61, // Used for slot based fast upload.
|
|
MNG_FILEDELETEREC = 62, // Same as MNG_FILEDELETE but recursive
|
|
MNG_USERCONSENT = 63, // Used to notify management console of user consent state
|
|
MNG_DEBUG = 64, // Debug/Logging Message for ILibRemoteLogging
|
|
MNG_ERROR = 65,
|
|
MNG_ENCAPSULATE_AGENT_COMMAND = 70,
|
|
MNG_KVM_DISPLAY_INFO = 82
|
|
*/
|
|
|
|
function CreateDesktopMultiplexor(parent, domain, nodeid, id, func) {
|
|
var obj = {};
|
|
obj.id = id; // Unique identifier for this session
|
|
obj.nodeid = nodeid; // Remote device nodeid for this session
|
|
obj.parent = parent; // Parent web server instance
|
|
obj.agent = null; // Reference to the connection object that is the agent.
|
|
obj.viewers = []; // Array of references to all viewers.
|
|
obj.viewersOverflowCount = 0; // Number of viewers currently in overflow state.
|
|
obj.width = 0; // Current width of the display in pixels.
|
|
obj.height = 0; // Current height of the display in pixels.
|
|
obj.swidth = 0; // Current width of the display in tiles.
|
|
obj.sheight = 0; // Current height of the display in tiles.
|
|
obj.screen = null; // The main screen, (x * y) --> tile index. Indicates this image is covering each tile on the screen.
|
|
obj.counter = 1; // The main counter, used as index for the obj.images table when now images come in.
|
|
obj.imagesCount = 0; // Total number of images in the obj.images table.
|
|
obj.imagesCounters = {}; // Main table of indexes --> tile count, the number of tiles still using this image.
|
|
obj.images = {}; // Main table of indexes --> image data object.
|
|
obj.lastScreenSizeCmd = null; // Pointer to the last screen size command from the agent.
|
|
obj.lastScreenSizeCounter = 0; // Index into the image table of the screen size command, this is generally also the first command.
|
|
obj.lastConsoleMessage = null; // Last agent console message.
|
|
obj.firstData = null; // Index in the image table of the first image in the table, generally this points to the display resolution command.
|
|
obj.lastData = null; // Index in the images table of the last image in the table.
|
|
obj.lastDisplayInfoData = null; // Pointer to the last display information command from the agent (Number of displays).
|
|
obj.lastDisplayLocationData = null; // Pointer to the last display location and size command from the agent.
|
|
obj.lastKeyState = null; // Pointer to the last key state command from the agent.
|
|
obj.desktopPaused = true; // Current desktop pause state, it's true if all viewers are paused.
|
|
obj.imageType = 1; // Current image type, 1 = JPEG, 2 = PNG, 3 = TIFF, 4 = WebP
|
|
obj.imageCompression = 50; // Current image compression, this is the highest value of all viewers.
|
|
obj.imageScaling = 1024; // Current image scaling, this is the highest value of all viewers.
|
|
obj.imageFrameRate = 50; // Current framerate setting, this is the lowest values of all viewers.
|
|
obj.protocolOptions = null; // Set to the protocol options of the first viewer that connected.
|
|
obj.viewerConnected = false; // Set to true if one viewer attempted to connect to the agent.
|
|
obj.recordingFile = null; // Present if we are recording to file.
|
|
obj.recordingFileSize = 0; // Current size of the recording file.
|
|
obj.recordingFileWriting = false; // Set to true is we are in the process if writing to the recording file.
|
|
obj.startTime = null; // Starting time of the multiplex session.
|
|
obj.userIds = []; // List of userid's that have intertracted with this session.
|
|
//obj.autoLock = false; // Automatically lock the remote device once disconnected
|
|
|
|
// Accounting
|
|
parent.trafficStats.desktopMultiplex.sessions++;
|
|
|
|
// Add an agent or viewer
|
|
obj.addPeer = function (peer) {
|
|
if (obj.viewers == null) { parent.parent.debug('relay', 'DesktopRelay: Error, addingPeer on disposed session'); return; }
|
|
if (peer.req == null) return; // This peer is already disposed, don't add it.
|
|
if (peer.req.query.browser) {
|
|
//console.log('addPeer-viewer', obj.nodeid);
|
|
|
|
// Setup the viewer
|
|
if (obj.viewers.indexOf(peer) >= 0) return true;
|
|
obj.viewers.push(peer);
|
|
peer.desktopPaused = true;
|
|
peer.imageType = 1;
|
|
peer.imageCompression = 30;
|
|
peer.imageScaling = 1024;
|
|
peer.imageFrameRate = 100;
|
|
peer.lastImageNumberSent = null;
|
|
peer.dataPtr = obj.firstData;
|
|
peer.sending = false;
|
|
peer.overflow = false;
|
|
peer.sendQueue = [];
|
|
peer.paused = false;
|
|
peer.startTime = Date.now();
|
|
|
|
// Add the user to the userids list if needed
|
|
if ((peer.user != null) && (obj.userIds.indexOf(peer.user._id) == -1)) { obj.userIds.push(peer.user._id); }
|
|
|
|
// Setup slow relay is requested. This will show down sending any data to this viewer.
|
|
if ((peer.req.query.slowrelay != null)) {
|
|
var sr = null;
|
|
try { sr = parseInt(peer.req.query.slowrelay); } catch (ex) { }
|
|
if ((typeof sr == 'number') && (sr > 0) && (sr < 1000)) { peer.slowRelay = sr; }
|
|
}
|
|
|
|
// Update user last access time
|
|
if ((peer.user != null) && (peer.guestName == null)) {
|
|
const user = parent.users[peer.user._id];
|
|
if (user != null) {
|
|
const timeNow = Math.floor(Date.now() / 1000);
|
|
if (user.access < (timeNow - 300)) { // Only update user access time if longer than 5 minutes
|
|
user.access = timeNow;
|
|
parent.db.SetUser(user);
|
|
|
|
// Event the change
|
|
var message = { etype: 'user', userid: user._id, username: user.name, account: parent.CloneSafeUser(user), action: 'accountchange', domain: domain.id, nolog: 1 };
|
|
if (parent.db.changeStream) { message.noact = 1; } // If DB change stream is active, don't use this event to change the user. Another event will come.
|
|
var targets = ['*', 'server-users', user._id];
|
|
if (user.groups) { for (var i in user.groups) { targets.push('server-users:' + i); } }
|
|
parent.parent.DispatchEvent(targets, obj, message);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Check session recording
|
|
var startRecord = false;
|
|
if (typeof domain.sessionrecording == 'object') {
|
|
// Check if this user is set to record all sessions
|
|
if ((domain.sessionrecording.onlyselectedusers === true) && (peer.user != null) && (peer.user.flags != null) && ((peer.user.flags & 2) != 0)) { startRecord = true; }
|
|
else if (domain.sessionrecording.onlyselectedusergroups === true) {
|
|
// Check if there is a usergroup that requires recording of the session
|
|
var user = null;
|
|
if (peer.user != null) { user = parent.users[peer.user._id]; }
|
|
if ((user != null) && (user.links != null) && (user.links[obj.meshid] == null) && (user.links[obj.nodeid] == null)) {
|
|
// This user does not have a direct link to the device group or device. Find all user groups the would cause the link.
|
|
for (var i in user.links) {
|
|
var ugrp = parent.userGroups[i];
|
|
if ((ugrp != null) && (typeof ugrp.flags == 'number') && ((ugrp.flags & 2) != 0) && (ugrp.links != null) && ((ugrp.links[obj.meshid] != null) || (ugrp.links[obj.nodeid] != null))) { startRecord = true; }
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
startRecording(domain, startRecord, function () {
|
|
// Indicated we are connected
|
|
obj.sendToViewer(peer, obj.recordingFile ? 'cr' : 'c');
|
|
|
|
// If the agent sent display information or console message, send it to the viewer
|
|
if (obj.lastDisplayInfoData != null) { obj.sendToViewer(peer, obj.lastDisplayInfoData); }
|
|
if (obj.lastDisplayLocationData != null) { obj.sendToViewer(peer, obj.lastDisplayLocationData); }
|
|
if (obj.lastConsoleMessage != null) { obj.sendToViewer(peer, obj.lastConsoleMessage); }
|
|
if (obj.lastKeyState != null) { obj.sendToViewer(peer, obj.lastKeyState); }
|
|
|
|
// Log joining the multiplex session
|
|
if (obj.startTime != null) {
|
|
var event = { etype: 'relay', action: 'relaylog', domain: domain.id, nodeid: obj.nodeid, userid: peer.user ? peer.user._id : null, username: peer.user.name, msgid: 143, msgArgs: [obj.id], msg: "Joined desktop multiplex session \"" + obj.id + "\"", protocol: 2 };
|
|
parent.parent.DispatchEvent(['*', obj.nodeid, peer.user._id, obj.meshid], obj, event);
|
|
}
|
|
|
|
// Send an updated list of all peers to all viewers
|
|
obj.sendSessionMetadata();
|
|
});
|
|
} else {
|
|
//console.log('addPeer-agent', obj.nodeid);
|
|
if (obj.agent != null) { parent.parent.debug('relay', 'DesktopRelay: Error, duplicate agent connection'); return false; }
|
|
|
|
// Setup the agent
|
|
obj.agent = peer;
|
|
peer.sending = false;
|
|
peer.overflow = false;
|
|
peer.sendQueue = [];
|
|
peer.paused = false;
|
|
|
|
// Indicated we are connected and send connection options and protocol if needed
|
|
obj.sendToAgent(obj.recordingFile?'cr':'c');
|
|
if (obj.viewerConnected == true) {
|
|
if (obj.protocolOptions != null) { obj.sendToAgent(JSON.stringify(obj.protocolOptions)); } // Send connection options
|
|
obj.sendToAgent('2'); // Send remote desktop connect
|
|
}
|
|
}
|
|
|
|
// Log multiplex session start
|
|
if ((obj.agent != null) && (obj.viewers.length > 0) && (obj.startTime == null)) {
|
|
var event = { etype: 'relay', action: 'relaylog', domain: domain.id, nodeid: obj.nodeid, msgid: 145, msgArgs: [obj.id], msg: "Started desktop multiplex session \"" + obj.id + "\"", protocol: 2 };
|
|
if (obj.viewers[0].user != null) { event.userid = obj.viewers[0].user._id; event.username = obj.viewers[0].user.name; }
|
|
const targets = ['*', obj.nodeid, obj.meshid];
|
|
if (obj.viewers[0].user != null) { targets.push(obj.viewers[0].user._id); }
|
|
parent.parent.DispatchEvent(targets, obj, event);
|
|
obj.startTime = Date.now();
|
|
}
|
|
return true;
|
|
}
|
|
|
|
// Remove an agent or viewer
|
|
// Return true if this multiplexor is no longer needed.
|
|
obj.removePeer = function (peer) {
|
|
if (obj.viewers == null) return;
|
|
if (peer == obj.agent) {
|
|
//console.log('removePeer-agent', obj.nodeid);
|
|
// Agent has disconnected, disconnect everyone.
|
|
if (obj.viewers != null) { for (var i in obj.viewers) { obj.viewers[i].close(); } }
|
|
|
|
// Clean up the agent
|
|
obj.agent = null;
|
|
|
|
dispose();
|
|
return true;
|
|
} else {
|
|
//console.log('removePeer-viewer', obj.nodeid);
|
|
// Remove a viewer
|
|
if (obj.viewers != null) {
|
|
var i = obj.viewers.indexOf(peer);
|
|
if (i == -1) return false;
|
|
obj.viewers.splice(i, 1);
|
|
}
|
|
|
|
// Resume flow control if this was the peer that was limiting traffic (because it was the fastest one).
|
|
if (peer.overflow == true) {
|
|
obj.viewersOverflowCount--;
|
|
peer.overflow = false;
|
|
if ((obj.viewersOverflowCount < obj.viewers.length) && (obj.recordingFileWriting == false) && obj.agent && (obj.agent.paused == true)) { obj.agent.paused = false; obj.agent.ws._socket.resume(); }
|
|
}
|
|
|
|
// Log leaving the multiplex session
|
|
if (obj.startTime != null) { // Used to check if the agent has connected. If not, don't log this event since the session never really started.
|
|
// In this code, we want to compute the share of in/out traffic that belongs to this viewer. It includes all of the viewers in/out traffic + all or a portion of the agents in/out traffic.
|
|
// The agent traffic needs to get divided out between the viewers fairly. For the time that multiple viewers are present, the agent traffic is divided between the viewers.
|
|
|
|
// Compute traffic to and from the browser
|
|
var inTraffc, outTraffc;
|
|
try { inTraffc = peer.ws._socket.bytesRead; } catch (ex) { }
|
|
try { outTraffc = peer.ws._socket.bytesWritten; } catch (ex) { }
|
|
|
|
// Add any previous agent traffic accounting
|
|
if (peer.agentInTraffic) { inTraffc += peer.agentInTraffic; }
|
|
if (peer.outTraffc) { inTraffc += peer.agentOutTraffic; }
|
|
|
|
// Compute traffic to and from the agent
|
|
if (obj.agent != null) {
|
|
// Get unaccounted bytes from/to the agent
|
|
var agentInTraffc, agentOutTraffc, agentInTraffc2, agentOutTraffc2;
|
|
try { agentInTraffc = agentInTraffc2 = obj.agent.ws._socket.bytesRead; } catch (ex) { }
|
|
try { agentOutTraffc = agentOutTraffc2 = obj.agent.ws._socket.bytesWritten; } catch (ex) { }
|
|
if (obj.agent.accountedBytesRead) { agentInTraffc -= obj.agent.accountedBytesRead; }
|
|
if (obj.agent.accountedBytesWritten) { agentOutTraffc -= obj.agent.accountedBytesWritten; }
|
|
obj.agent.accountedBytesRead = agentInTraffc2;
|
|
obj.agent.accountedBytesWritten = agentOutTraffc2;
|
|
|
|
// Devide up the agent traffic amoung the viewers
|
|
var viewerPartIn = Math.floor(agentInTraffc / (obj.viewers.length + 1));
|
|
var viewerPartOut = Math.floor(agentOutTraffc / (obj.viewers.length + 1));
|
|
|
|
// Add the portion to this viewer and all other viewer
|
|
inTraffc += viewerPartIn;
|
|
outTraffc += viewerPartOut;
|
|
for (var i in obj.viewers) {
|
|
if (obj.viewers[i].agentInTraffic) { obj.viewers[i].agentInTraffic += viewerPartIn; } else { obj.viewers[i].agentInTraffic = viewerPartIn; }
|
|
if (obj.viewers[i].agentOutTraffic) { obj.viewers[i].agentOutTraffic += viewerPartOut; } else { obj.viewers[i].agentOutTraffic = viewerPartOut; }
|
|
}
|
|
}
|
|
|
|
//var event = { etype: 'relay', action: 'relaylog', domain: domain.id, nodeid: obj.nodeid, userid: peer.user._id, username: peer.user.name, msgid: 5, msg: "Left the desktop multiplex session", protocol: 2 };
|
|
const sessionSeconds = Math.floor((Date.now() - peer.startTime) / 1000);
|
|
var event = { etype: 'relay', action: 'relaylog', domain: domain.id, nodeid: obj.nodeid, msgid: 144, msgArgs: [obj.id, sessionSeconds], msg: "Left the desktop multiplex session \"" + obj.id + "\" after " + sessionSeconds + " second(s).", protocol: 2, bytesin: inTraffc, bytesout: outTraffc };
|
|
if (peer.user != null) { event.userid = peer.user._id; event.username = peer.user.name; }
|
|
if (peer.guestName) { event.guestname = peer.guestName; }
|
|
const targets = ['*', obj.nodeid, obj.meshid];
|
|
if (peer.user != null) { targets.push(peer.user._id); }
|
|
parent.parent.DispatchEvent(targets, obj, event);
|
|
}
|
|
|
|
// Aggressive clean up of the viewer
|
|
delete peer.desktopPaused;
|
|
delete peer.imageType;
|
|
delete peer.imageCompression;
|
|
delete peer.imageScaling;
|
|
delete peer.imageFrameRate;
|
|
delete peer.lastImageNumberSent;
|
|
delete peer.dataPtr;
|
|
delete peer.sending;
|
|
delete peer.overflow;
|
|
delete peer.sendQueue;
|
|
delete peer.startTime;
|
|
|
|
// If this is the last viewer, disconnect the agent
|
|
if ((obj.viewers != null) && (obj.viewers.length == 0) && (obj.agent != null)) { obj.agent.close(); dispose(); return true; }
|
|
|
|
// Send an updated list of all peers to all viewers
|
|
obj.sendSessionMetadata();
|
|
}
|
|
return false;
|
|
}
|
|
|
|
// Clean up ourselves
|
|
function dispose() {
|
|
if (obj.viewers == null) return;
|
|
//console.log('dispose', obj.nodeid);
|
|
delete obj.viewers;
|
|
delete obj.imagesCounters;
|
|
delete obj.images;
|
|
|
|
// Close the recording file if needed
|
|
if (obj.recordingFile != null) {
|
|
// Compute session length
|
|
if (obj.startTime != null) { obj.sessionStart = obj.startTime; obj.sessionLength = Math.round((Date.now() - obj.startTime) / 1000); }
|
|
|
|
// Write the last record of the recording file
|
|
var rf = obj.recordingFile;
|
|
delete obj.recordingFile;
|
|
recordingEntry(rf.fd, 3, 0, 'MeshCentralMCREC', function (fd, filename) {
|
|
parent.parent.fs.close(fd);
|
|
|
|
// Now that the recording file is closed, check if we need to index this file.
|
|
if (domain.sessionrecording.index !== false) { parent.parent.certificateOperations.acceleratorPerformOperation('indexMcRec', filename); }
|
|
|
|
// Add a event entry about this recording
|
|
var basefile = parent.parent.path.basename(filename);
|
|
var event = { etype: 'relay', action: 'recording', domain: domain.id, nodeid: obj.nodeid, msgid: 146, msgArgs: [obj.id, obj.sessionLength], msg: "Finished recording session \"" + obj.id + "\", " + obj.sessionLength + " second(s)", filename: basefile, size: obj.recordingFileSize, protocol: 2, icon: obj.icon, name: obj.name, meshid: obj.meshid, userids: obj.userIds, multiplex: true };
|
|
var mesh = parent.meshes[obj.meshid];
|
|
if (mesh != null) { event.meshname = mesh.name; }
|
|
if (obj.sessionStart) { event.startTime = obj.sessionStart; event.lengthTime = obj.sessionLength; }
|
|
parent.parent.DispatchEvent(['*', 'recording', obj.nodeid, obj.meshid], obj, event);
|
|
|
|
cleanUpRecordings();
|
|
}, rf.filename);
|
|
}
|
|
|
|
// Log end of multiplex session
|
|
if (obj.startTime != null) {
|
|
var event = { etype: 'relay', action: 'relaylog', domain: domain.id, nodeid: obj.nodeid, msgid: 147, msgArgs: [obj.id, Math.floor((Date.now() - obj.startTime) / 1000)], msg: "Closed desktop multiplex session \"" + obj.id + "\", " + Math.floor((Date.now() - obj.startTime) / 1000) + ' second(s)', protocol: 2 };
|
|
parent.parent.DispatchEvent(['*', obj.nodeid, obj.meshid], obj, event);
|
|
obj.startTime = null;
|
|
}
|
|
|
|
// Send an updated list of all peers to all viewers
|
|
obj.sendSessionMetadata();
|
|
|
|
parent.parent.debug('relay', 'DesktopRelay: Disposing desktop multiplexor');
|
|
}
|
|
|
|
// Send data to the agent or queue it up for sending
|
|
obj.sendToAgent = function (data) {
|
|
if ((obj.viewers == null) || (obj.agent == null)) return;
|
|
//console.log('SendToAgent', data.length);
|
|
if (obj.agent.sending) {
|
|
obj.agent.sendQueue.push(data);
|
|
|
|
// Flow control, pause all viewers is the queue is backing up
|
|
if (obj.agent.sendQueue > 10) {
|
|
obj.agent.overflow = true;
|
|
for (var i in obj.viewers) {
|
|
var v = obj.viewers[i];
|
|
if (v.paused == false) { v.paused = true; v.ws._socket.pause(); }
|
|
}
|
|
}
|
|
} else {
|
|
obj.agent.ws.send(data, sendAgentNext);
|
|
}
|
|
}
|
|
|
|
// Send more data to the agent
|
|
function sendAgentNext() {
|
|
if ((obj.viewers == null) || (obj.agent == null)) return;
|
|
if (obj.agent.sendQueue.length > 0) {
|
|
// Send from the pending send queue
|
|
obj.agent.ws.send(obj.agent.sendQueue.shift(), sendAgentNext);
|
|
} else {
|
|
// Nothing to send
|
|
obj.agent.sending = false;
|
|
|
|
// Flow control, resume all viewers
|
|
if (obj.agent.overflow == true) {
|
|
obj.agent.overflow = false;
|
|
for (var i in obj.viewers) {
|
|
var v = obj.viewers[i];
|
|
if (v.paused == true) { v.paused = false; v.ws._socket.resume(); }
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Send the list of all users currently vieweing this session to all viewers and servers
|
|
obj.sendSessionMetadata = function () {
|
|
var allUsers = {};
|
|
if (obj.viewers != null) {
|
|
for (var i in obj.viewers) {
|
|
var v = obj.viewers[i];
|
|
if ((v.user != null) && (v.user._id != null)) {
|
|
var id = v.user._id;
|
|
if (v.guestName) { id += '/guest:' + Buffer.from(v.guestName).toString('base64'); } // If this is a guest connect, add the Base64 guest name.
|
|
if (allUsers[id] == null) { allUsers[id] = 1; } else { allUsers[id]++; }
|
|
}
|
|
}
|
|
obj.sendToAllViewers(JSON.stringify({ type: 'metadata', 'ctrlChannel': '102938', users: allUsers, startTime: obj.startTime }));
|
|
}
|
|
|
|
// Update the sessions attached the to agent
|
|
if (obj.nodeid != null) {
|
|
const xagent = parent.wsagents[obj.nodeid];
|
|
if (xagent != null) {
|
|
if (xagent.sessions == null) { xagent.sessions = {}; }
|
|
xagent.sessions.multidesk = allUsers;
|
|
xagent.updateSessions();
|
|
}
|
|
}
|
|
}
|
|
|
|
// Send this command to all viewers
|
|
obj.sendToAllViewers = function (data) {
|
|
if (obj.viewers == null) return;
|
|
for (var i in obj.viewers) { obj.sendToViewer(obj.viewers[i], data); }
|
|
}
|
|
|
|
// Send this command to all viewers
|
|
obj.sendToAllInputViewers = function (data) {
|
|
if (obj.viewers == null) return;
|
|
for (var i in obj.viewers) { if (obj.viewers[i].viewOnly != true) { obj.sendToViewer(obj.viewers[i], data); } }
|
|
}
|
|
|
|
// Send data to the viewer or queue it up for sending
|
|
obj.sendToViewer = function (viewer, data) {
|
|
if ((viewer == null) || (obj.viewers == null)) return;
|
|
//console.log('SendToViewer', data.length);
|
|
if (viewer.sending) {
|
|
viewer.sendQueue.push(data);
|
|
} else {
|
|
viewer.sending = true;
|
|
if (viewer.slowRelay) {
|
|
setTimeout(function () { try { viewer.ws.send(data, function () { sendViewerNext(viewer); }); } catch (ex) { } }, viewer.slowRelay);
|
|
} else {
|
|
try { viewer.ws.send(data, function () { sendViewerNext(viewer); }); } catch (ex) { }
|
|
}
|
|
|
|
// Flow control, pause the agent if needed
|
|
checkViewerOverflow(viewer);
|
|
}
|
|
}
|
|
|
|
// Check if a viewer is in overflow situation
|
|
function checkViewerOverflow(viewer) {
|
|
if ((viewer.overflow == true) || (obj.viewers == null)) return;
|
|
if ((viewer.sendQueue.length > 5) || ((viewer.dataPtr != null) && (viewer.dataPtr != obj.lastData))) {
|
|
viewer.overflow = true;
|
|
obj.viewersOverflowCount++;
|
|
if ((obj.viewersOverflowCount >= obj.viewers.length) && obj.agent && (obj.agent.paused == false)) { obj.agent.paused = true; obj.agent.ws._socket.pause(); }
|
|
}
|
|
}
|
|
|
|
// Check if a viewer is in underflow situation
|
|
function checkViewerUnderflow(viewer) {
|
|
if ((viewer.overflow == false) || (obj.viewers == null)) return;
|
|
if ((viewer.sendQueue.length <= 5) && ((viewer.dataPtr == null) || (viewer.dataPtr == obj.lastData))) {
|
|
viewer.overflow = false;
|
|
obj.viewersOverflowCount--;
|
|
if ((obj.viewersOverflowCount < obj.viewers.length) && (obj.recordingFileWriting == false) && obj.agent && (obj.agent.paused == true)) { obj.agent.paused = false; obj.agent.ws._socket.resume(); }
|
|
}
|
|
}
|
|
|
|
// Send more data to the viewer
|
|
function sendViewerNext(viewer) {
|
|
if ((viewer.sendQueue == null) || (obj.viewers == null)) return;
|
|
if (viewer.sendQueue.length > 0) {
|
|
// Send from the pending send queue
|
|
if (viewer.sending == false) { viewer.sending = true; }
|
|
if (viewer.slowRelay) {
|
|
setTimeout(function () { try { viewer.ws.send(viewer.sendQueue.shift(), function () { sendViewerNext(viewer); }); } catch (ex) { } }, viewer.slowRelay);
|
|
} else {
|
|
try { viewer.ws.send(viewer.sendQueue.shift(), function () { sendViewerNext(viewer); }); } catch (ex) { }
|
|
}
|
|
checkViewerOverflow(viewer);
|
|
} else {
|
|
if (viewer.dataPtr != null) {
|
|
// Send the next image
|
|
//if ((viewer.lastImageNumberSent != null) && ((viewer.lastImageNumberSent + 1) != (viewer.dataPtr))) { console.log('SVIEW-S1', viewer.lastImageNumberSent, viewer.dataPtr); } // DEBUG
|
|
var image = obj.images[viewer.dataPtr];
|
|
viewer.lastImageNumberSent = viewer.dataPtr;
|
|
//if ((image.next != null) && ((viewer.dataPtr + 1) != image.next)) { console.log('SVIEW-S2', viewer.dataPtr, image.next); } // DEBUG
|
|
viewer.dataPtr = image.next;
|
|
if (viewer.slowRelay) {
|
|
setTimeout(function () { try { viewer.ws.send(image.data, function () { sendViewerNext(viewer); }); } catch (ex) { } }, viewer.slowRelay);
|
|
} else {
|
|
try { viewer.ws.send(image.data, function () { sendViewerNext(viewer); }); } catch (ex) { }
|
|
}
|
|
|
|
// Flow control, pause the agent if needed
|
|
if (viewer.sending == false) { viewer.sending = true; }
|
|
checkViewerOverflow(viewer);
|
|
} else {
|
|
// Nothing to send
|
|
viewer.sending = false;
|
|
|
|
// Flow control, resume agent if needed
|
|
checkViewerUnderflow(viewer);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Process data coming from the agent or any viewers
|
|
obj.processData = function (peer, data) {
|
|
if (obj.viewers == null) return;
|
|
if (peer == obj.agent) {
|
|
obj.recordingFileWriting = true;
|
|
recordData(true, data, function () {
|
|
if (obj.viewers == null) return;
|
|
obj.recordingFileWriting = false;
|
|
if ((obj.viewersOverflowCount < obj.viewers.length) && obj.agent && (obj.agent.paused == true)) { obj.agent.paused = false; obj.agent.ws._socket.resume(); }
|
|
obj.processAgentData(data);
|
|
});
|
|
} else {
|
|
obj.processViewerData(peer, data);
|
|
}
|
|
}
|
|
|
|
// Process incoming viewer data
|
|
obj.processViewerData = function (viewer, data) {
|
|
if (typeof data == 'string') {
|
|
if (data == '2') {
|
|
if (obj.viewerConnected == false) {
|
|
if (obj.agent != null) {
|
|
if (obj.protocolOptions != null) { obj.sendToAgent(JSON.stringify(obj.protocolOptions)); } // Send connection options
|
|
obj.sendToAgent('2'); // Send remote desktop connect
|
|
}
|
|
obj.viewerConnected = true;
|
|
}
|
|
return;
|
|
}
|
|
var json = null;
|
|
try { json = JSON.parse(data); } catch (ex) { }
|
|
if (json == null) return;
|
|
if ((json.type == 'options') && (obj.protocolOptions == null)) { obj.protocolOptions = json; }
|
|
if (json.ctrlChannel == '102938') {
|
|
if ((json.type == 'lock') && (viewer.viewOnly == false)) { obj.sendToAgent('{"ctrlChannel":"102938","type":"lock"}'); } // Account lock support
|
|
if ((json.type == 'autolock') && (viewer.viewOnly == false) && (typeof json.value == 'boolean')) { obj.sendToAgent('{"ctrlChannel":"102938","type":"autolock","value":' + json.value + '}'); } // Lock on disconnect
|
|
}
|
|
return;
|
|
}
|
|
|
|
//console.log('ViewerData', data.length, typeof data, data);
|
|
if ((typeof data != 'object') || (data.length < 4)) return; // Ignore all control traffic for now (WebRTC)
|
|
var command = data.readUInt16BE(0);
|
|
var cmdsize = data.readUInt16BE(2);
|
|
if (data.length != cmdsize) return; // Invalid command length
|
|
|
|
//console.log('ViewerData', data.length, command, cmdsize);
|
|
switch (command) {
|
|
case 1: // Key Events, forward to agent
|
|
if (viewer.viewOnly == false) { obj.sendToAgent(data); }
|
|
break;
|
|
case 2: // Mouse events, forward to agent
|
|
if (viewer.viewOnly == false) { obj.sendToAgent(data); }
|
|
break;
|
|
case 5: // Compression
|
|
if (data.length < 10) return;
|
|
viewer.imageType = data[4]; // Image type: 1 = JPEG, 2 = PNG, 3 = TIFF, 4 = WebP
|
|
viewer.imageCompression = data[5];
|
|
viewer.imageScaling = data.readUInt16BE(6);
|
|
viewer.imageFrameRate = data.readUInt16BE(8);
|
|
//console.log('Viewer-Compression', viewer.imageType, viewer.imageCompression, viewer.imageScaling, viewer.imageFrameRate);
|
|
|
|
// See if this changes anything
|
|
var viewersimageType = null;
|
|
var viewersimageCompression = null;
|
|
var viewersimageScaling = null;
|
|
var viewersimageFrameRate = null;
|
|
for (var i in obj.viewers) {
|
|
if (viewersimageType == null) { viewersimageType = obj.viewers[i].imageType; } else if (obj.viewers[i].imageType != viewersimageType) { viewersimageType = 1; }; // Default to JPEG if viewers has different image formats
|
|
if ((viewersimageCompression == null) || (obj.viewers[i].imageCompression > viewersimageCompression)) { viewersimageCompression = obj.viewers[i].imageCompression; };
|
|
if ((viewersimageScaling == null) || (obj.viewers[i].imageScaling > viewersimageScaling)) { viewersimageScaling = obj.viewers[i].imageScaling; };
|
|
if ((viewersimageFrameRate == null) || (obj.viewers[i].imageFrameRate < viewersimageFrameRate)) { viewersimageFrameRate = obj.viewers[i].imageFrameRate; };
|
|
}
|
|
if ((obj.imageCompression != viewersimageCompression) || (obj.imageScaling != viewersimageScaling) || (obj.imageFrameRate != viewersimageFrameRate)) {
|
|
// Update and send to agent new compression settings
|
|
obj.imageType = viewersimageType;
|
|
obj.imageCompression = viewersimageCompression;
|
|
obj.imageScaling = viewersimageScaling;
|
|
obj.imageFrameRate = viewersimageFrameRate
|
|
//console.log('Send-Agent-Compression', obj.imageType, obj.imageCompression, obj.imageScaling, obj.imageFrameRate);
|
|
var cmd = Buffer.alloc(10);
|
|
cmd.writeUInt16BE(5, 0); // Command 5, compression
|
|
cmd.writeUInt16BE(10, 2); // Command size, 10 bytes long
|
|
cmd[4] = obj.imageType; // Image type: 1 = JPEG, 2 = PNG, 3 = TIFF, 4 = WebP
|
|
cmd[5] = obj.imageCompression; // Image compression level
|
|
cmd.writeUInt16BE(obj.imageScaling, 6); // Scaling level
|
|
cmd.writeUInt16BE(obj.imageFrameRate, 8); // Frame rate timer
|
|
obj.sendToAgent(cmd);
|
|
}
|
|
break;
|
|
case 6: // Refresh, handle this on the server
|
|
//console.log('Viewer-Refresh');
|
|
viewer.dataPtr = obj.firstData; // Start over
|
|
if (viewer.sending == false) { sendViewerNext(viewer); }
|
|
break;
|
|
case 8: // Pause and unpause
|
|
if (data.length != 5) break;
|
|
var pause = data[4]; // 0 = Unpause, 1 = Pause
|
|
if (viewer.desktopPaused == (pause == 1)) break;
|
|
viewer.desktopPaused = (pause == 1);
|
|
//console.log('Viewer-' + ((pause == 1)?'Pause':'UnPause'));
|
|
var viewersPaused = true;
|
|
for (var i in obj.viewers) { if (obj.viewers[i].desktopPaused == false) { viewersPaused = false; }; }
|
|
if (viewersPaused != obj.desktopPaused) {
|
|
obj.desktopPaused = viewersPaused;
|
|
//console.log('Send-Agent-' + ((viewersPaused == true) ? 'Pause' : 'UnPause'));
|
|
data[4] = (viewersPaused == true) ? 1 : 0;
|
|
obj.sendToAgent(data);
|
|
}
|
|
break;
|
|
case 10: // CTRL-ALT-DEL, forward to agent
|
|
if (viewer.viewOnly == false) { obj.sendToAgent(data); }
|
|
break;
|
|
case 12: // SET DISPLAY, forward to agent
|
|
if (viewer.viewOnly == false) { obj.sendToAgent(data); }
|
|
break;
|
|
case 14: // Touch setup
|
|
break;
|
|
case 82: // Request display information
|
|
if (obj.lastDisplayLocationData != null) { obj.sendToAgent(obj.lastDisplayLocationData); }
|
|
break;
|
|
case 85: // Unicode Key Events, forward to agent
|
|
if (viewer.viewOnly == false) { obj.sendToAgent(data); }
|
|
break;
|
|
case 87: // Remote input lock, forward to agent
|
|
if (viewer.viewOnly == false) { obj.sendToAgent(data); }
|
|
break;
|
|
default:
|
|
console.log('Un-handled viewer command: ' + command);
|
|
break;
|
|
}
|
|
}
|
|
|
|
// Process incoming agent data
|
|
obj.processAgentData = function (data) {
|
|
if ((typeof data != 'object') || (data.length < 4)) {
|
|
if (typeof data == 'string') {
|
|
var json = null;
|
|
try { json = JSON.parse(data); } catch (ex) { }
|
|
if (json == null) return;
|
|
if (json.type == 'console') {
|
|
// This is a console message, store it and forward this to all viewers
|
|
if (json.msg != null) { obj.lastConsoleMessage = data; } else { obj.lastConsoleMessage = null; }
|
|
obj.sendToAllViewers(data);
|
|
}
|
|
// All other control messages (notably WebRTC), are ignored for now.
|
|
}
|
|
return; // Ignore all other traffic
|
|
}
|
|
const jumboData = data;
|
|
var command = data.readUInt16BE(0);
|
|
var cmdsize = data.readUInt16BE(2);
|
|
//console.log('AgentData', data.length, command, cmdsize);
|
|
if ((command == 27) && (cmdsize == 8)) {
|
|
// Jumbo packet
|
|
if (data.length >= 12) {
|
|
command = data.readUInt16BE(8);
|
|
cmdsize = data.readUInt32BE(4);
|
|
if (data.length == (cmdsize + 8)) {
|
|
data = data.slice(8, data.length);
|
|
} else {
|
|
console.log('TODO-PARTIAL-JUMBO', command, cmdsize, data.length);
|
|
return; // TODO
|
|
}
|
|
}
|
|
}
|
|
|
|
switch (command) {
|
|
case 3: // Tile, check dimentions and store
|
|
if ((data.length < 10) || (obj.lastData == null)) break;
|
|
var x = data.readUInt16BE(4), y = data.readUInt16BE(6);
|
|
var dimensions = require('image-size')(data.slice(8));
|
|
var sx = (x / 16), sy = (y / 16), sw = (dimensions.width / 16), sh = (dimensions.height / 16);
|
|
obj.counter++;
|
|
|
|
// Keep a reference to this image & how many tiles it covers
|
|
obj.images[obj.counter] = { next: null, prev: obj.lastData, data: jumboData };
|
|
obj.images[obj.lastData].next = obj.counter;
|
|
obj.lastData = obj.counter;
|
|
obj.imagesCounters[obj.counter] = (sw * sh);
|
|
obj.imagesCount++;
|
|
if (obj.imagesCount == 2000000000) { obj.imagesCount = 1; } // Loop the counter if needed
|
|
|
|
//console.log('Adding Image ' + obj.counter, x, y, dimensions.width, dimensions.height);
|
|
|
|
// Update the screen with the correct pointers.
|
|
for (var i = 0; i < sw; i++) {
|
|
for (var j = 0; j < sh; j++) {
|
|
var k = ((obj.swidth * (j + sy)) + (i + sx));
|
|
const oi = obj.screen[k];
|
|
obj.screen[k] = obj.counter;
|
|
if ((oi != null) && (--obj.imagesCounters[oi] == 0)) {
|
|
// Remove data from the link list
|
|
obj.imagesCount--;
|
|
var d = obj.images[oi];
|
|
//console.log('Removing Image', oi, obj.images[oi].prev, obj.images[oi].next);
|
|
obj.images[d.prev].next = d.next;
|
|
obj.images[d.next].prev = d.prev;
|
|
delete obj.images[oi];
|
|
delete obj.imagesCounters[oi];
|
|
|
|
// If any viewers are currently on image "oi" must be moved to "d.next"
|
|
for (var l in obj.viewers) { const v = obj.viewers[l]; if (v.dataPtr == oi) { v.dataPtr = d.next; } }
|
|
}
|
|
}
|
|
}
|
|
|
|
// Any viewer on dataPtr null, change to this image
|
|
for (var i in obj.viewers) {
|
|
const v = obj.viewers[i];
|
|
if (v.dataPtr == null) { v.dataPtr = obj.counter; if (v.sending == false) { sendViewerNext(v); } }
|
|
}
|
|
|
|
// Debug, display the link list
|
|
//var xx = '', xptr = obj.firstData;
|
|
//while (xptr != null) { xx += '>' + xptr; xptr = obj.images[xptr].next; }
|
|
//console.log('list', xx);
|
|
//console.log('images', obj.imagesCount);
|
|
|
|
break;
|
|
case 4: // Tile Copy, do nothing.
|
|
break;
|
|
case 7: // Screen Size, clear the screen state and compute the tile count
|
|
if (data.length < 8) break;
|
|
if ((obj.width === data.readUInt16BE(4)) && (obj.height === data.readUInt16BE(6))) break; // Same screen size as before, skip this.
|
|
obj.counter++;
|
|
obj.lastScreenSizeCmd = data;
|
|
obj.lastScreenSizeCounter = obj.counter;
|
|
obj.width = data.readUInt16BE(4);
|
|
obj.height = data.readUInt16BE(6);
|
|
obj.swidth = obj.width / 16;
|
|
obj.sheight = obj.height / 16;
|
|
if (Math.floor(obj.swidth) != obj.swidth) { obj.swidth = Math.floor(obj.swidth) + 1; }
|
|
if (Math.floor(obj.sheight) != obj.sheight) { obj.sheight = Math.floor(obj.sheight) + 1; }
|
|
|
|
// Reset the display
|
|
obj.screen = new Array(obj.swidth * obj.sheight);
|
|
obj.imagesCount = 0;
|
|
obj.imagesCounters = {};
|
|
obj.images = {};
|
|
obj.images[obj.counter] = { next: null, prev: null, data: data };
|
|
obj.firstData = obj.counter;
|
|
obj.lastData = obj.counter;
|
|
|
|
// Add viewers must be set to start at "obj.counter"
|
|
for (var i in obj.viewers) {
|
|
const v = obj.viewers[i];
|
|
v.dataPtr = obj.counter;
|
|
if (v.sending == false) { sendViewerNext(v); }
|
|
}
|
|
|
|
//console.log("ScreenSize", obj.width, obj.height, obj.swidth, obj.sheight, obj.swidth * obj.sheight);
|
|
break;
|
|
case 11: // GetDisplays
|
|
// Store and send this to all viewers right away
|
|
obj.lastDisplayInfoData = data;
|
|
obj.sendToAllInputViewers(data);
|
|
break;
|
|
case 12: // SetDisplay
|
|
obj.sendToAllInputViewers(data);
|
|
break;
|
|
case 14: // KVM_INIT_TOUCH
|
|
break;
|
|
case 15: // KVM_TOUCH
|
|
break;
|
|
case 17: // MNG_KVM_MESSAGE
|
|
// Send this to all viewers right away
|
|
obj.sendToAllViewers(data);
|
|
break;
|
|
case 18: // MNG_KVM_KEYSTATE
|
|
// Store and send this to all viewers right away
|
|
obj.lastKeyState = data;
|
|
obj.sendToAllInputViewers(data);
|
|
break;
|
|
case 65: // Alert
|
|
// Send this to all viewers right away
|
|
obj.sendToAllViewers(data);
|
|
break;
|
|
case 82:
|
|
// Display information
|
|
if ((data.length < 14) || (((data.length - 4) % 10) != 0)) break; // Command must be 14 bytes and have header + 10 byte for each display.
|
|
obj.lastDisplayLocationData = data;
|
|
obj.sendToAllInputViewers(data);
|
|
break;
|
|
case 87: // MNG_KVM_INPUT_LOCK
|
|
// Send this to all viewers right away
|
|
// This will update all views on the current state of the input lock
|
|
obj.sendToAllInputViewers(data);
|
|
break;
|
|
case 88: // MNG_KVM_MOUSE_CURSOR
|
|
// Send this to all viewers right away
|
|
obj.sendToAllInputViewers(data);
|
|
break;
|
|
default:
|
|
console.log('Un-handled agent command: ' + command + ', length: ' + cmdsize);
|
|
break;
|
|
}
|
|
}
|
|
|
|
function startRecording(domain, start, func) {
|
|
if ((obj.pendingRecording == 1) || (obj.recordingFile != null)) { func(true); return; } // Check if already recording
|
|
if (start == false) { func(false); return; } // Just skip this
|
|
obj.pendingRecording = 1;
|
|
var now = new Date(Date.now());
|
|
var recFilename = 'desktopSession' + ((domain.id == '') ? '' : '-') + domain.id + '-' + now.getUTCFullYear() + '-' + parent.common.zeroPad(now.getUTCMonth() + 1, 2) + '-' + parent.common.zeroPad(now.getUTCDate(), 2) + '-' + parent.common.zeroPad(now.getUTCHours(), 2) + '-' + parent.common.zeroPad(now.getUTCMinutes(), 2) + '-' + parent.common.zeroPad(now.getUTCSeconds(), 2) + '-' + obj.nodeid.split('/')[2] + '.mcrec'
|
|
var recFullFilename = null;
|
|
if (domain.sessionrecording.filepath) {
|
|
try { parent.parent.fs.mkdirSync(domain.sessionrecording.filepath); } catch (e) { }
|
|
recFullFilename = parent.parent.path.join(domain.sessionrecording.filepath, recFilename);
|
|
} else {
|
|
try { parent.parent.fs.mkdirSync(parent.parent.recordpath); } catch (e) { }
|
|
recFullFilename = parent.parent.path.join(parent.parent.recordpath, recFilename);
|
|
}
|
|
parent.parent.fs.open(recFullFilename, 'w', function (err, fd) {
|
|
delete obj.pendingRecording;
|
|
if (err != null) {
|
|
parent.parent.debug('relay', 'Relay: Unable to record to file: ' + recFullFilename);
|
|
func(false);
|
|
return;
|
|
}
|
|
// Write the recording file header
|
|
parent.parent.debug('relay', 'Relay: Started recoding to file: ' + recFullFilename);
|
|
var metadata = { magic: 'MeshCentralRelaySession', ver: 1, nodeid: obj.nodeid, meshid: obj.meshid, time: new Date().toLocaleString(), protocol: 2, devicename: obj.name, devicegroup: obj.meshname };
|
|
var firstBlock = JSON.stringify(metadata);
|
|
recordingEntry(fd, 1, 0, firstBlock, function () {
|
|
obj.recordingFile = { fd: fd, filename: recFullFilename };
|
|
obj.recordingFileWriting = false;
|
|
func(true);
|
|
});
|
|
});
|
|
}
|
|
|
|
// Here, we check if we have to record the device, regardless of what user is looking at it.
|
|
function recordingSetup(domain, func) {
|
|
var record = false;
|
|
|
|
// Setup session recording
|
|
if (((domain.sessionrecording == true) || ((typeof domain.sessionrecording == 'object') && ((domain.sessionrecording.protocols == null) || (domain.sessionrecording.protocols.indexOf(2) >= 0))))) {
|
|
record = true;
|
|
|
|
// Check again to make sure we need to start recording
|
|
if ((typeof domain.sessionrecording == 'object') && ((domain.sessionrecording.onlyselecteddevicegroups === true) || (domain.sessionrecording.onlyselectedusergroups === true) || (domain.sessionrecording.onlyselectedusers === true))) {
|
|
record = false;
|
|
|
|
// Check device group recording
|
|
if (domain.sessionrecording.onlyselecteddevicegroups === true) {
|
|
var mesh = parent.meshes[obj.meshid];
|
|
if ((mesh.flags != null) && ((mesh.flags & 4) != 0)) { record = true; }
|
|
}
|
|
}
|
|
}
|
|
startRecording(domain, record, func);
|
|
}
|
|
|
|
// Record data to the recording file
|
|
function recordData(isAgent, data, func) {
|
|
try {
|
|
if (obj.recordingFile != null) {
|
|
// Write data to recording file
|
|
recordingEntry(obj.recordingFile.fd, 2, (isAgent ? 0 : 2), data, function () { func(data); });
|
|
} else {
|
|
func(data);
|
|
}
|
|
} catch (ex) { console.log(ex); }
|
|
}
|
|
|
|
// Record a new entry in a recording log
|
|
function recordingEntry(fd, type, flags, data, func, tag) {
|
|
try {
|
|
if (typeof data == 'string') {
|
|
// String write
|
|
var blockData = Buffer.from(data), header = Buffer.alloc(16); // Header: Type (2) + Flags (2) + Size(4) + Time(8)
|
|
header.writeInt16BE(type, 0); // Type (1 = Header, 2 = Network Data)
|
|
header.writeInt16BE(flags, 2); // Flags (1 = Binary, 2 = User)
|
|
header.writeInt32BE(blockData.length, 4); // Size
|
|
header.writeIntBE(new Date(), 10, 6); // Time
|
|
var block = Buffer.concat([header, blockData]);
|
|
parent.parent.fs.write(fd, block, 0, block.length, function () { func(fd, tag); });
|
|
obj.recordingFileSize += block.length;
|
|
} else {
|
|
// Binary write
|
|
var header = Buffer.alloc(16); // Header: Type (2) + Flags (2) + Size(4) + Time(8)
|
|
header.writeInt16BE(type, 0); // Type (1 = Header, 2 = Network Data)
|
|
header.writeInt16BE(flags | 1, 2); // Flags (1 = Binary, 2 = User)
|
|
header.writeInt32BE(data.length, 4); // Size
|
|
header.writeIntBE(new Date(), 10, 6); // Time
|
|
var block = Buffer.concat([header, data]);
|
|
parent.parent.fs.write(fd, block, 0, block.length, function () { func(fd, tag); });
|
|
obj.recordingFileSize += block.length;
|
|
}
|
|
} catch (ex) { console.log(ex); func(fd, tag); }
|
|
}
|
|
|
|
// If there is a recording quota, remove any old recordings if needed
|
|
function cleanUpRecordings() {
|
|
if ((parent.cleanUpRecordingsActive !== true) && domain.sessionrecording && ((typeof domain.sessionrecording.maxrecordings == 'number') || (typeof domain.sessionrecording.maxrecordingsizemegabytes == 'number') || (typeof domain.sessionrecording.maxrecordingdays == 'number'))) {
|
|
parent.cleanUpRecordingsActive = true;
|
|
setTimeout(function () {
|
|
var recPath = null, fs = require('fs'), now = Date.now();
|
|
if (domain.sessionrecording.filepath) { recPath = domain.sessionrecording.filepath; } else { recPath = parent.parent.recordpath; }
|
|
fs.readdir(recPath, function (err, files) {
|
|
if ((err != null) || (files == null)) { delete parent.cleanUpRecordingsActive; return; }
|
|
var recfiles = [];
|
|
for (var i in files) {
|
|
if (files[i].endsWith('.mcrec')) {
|
|
var j = files[i].indexOf('-');
|
|
if (j > 0) {
|
|
var stats = null;
|
|
try { stats = fs.statSync(parent.parent.path.join(recPath, files[i])); } catch (ex) { }
|
|
if (stats != null) { recfiles.push({ n: files[i], r: files[i].substring(j + 1), s: stats.size, t: stats.mtimeMs }); }
|
|
}
|
|
}
|
|
}
|
|
recfiles.sort(function (a, b) { if (a.r < b.r) return 1; if (a.r > b.r) return -1; return 0; });
|
|
var totalFiles = 0, totalSize = 0;
|
|
for (var i in recfiles) {
|
|
var overQuota = false;
|
|
if ((typeof domain.sessionrecording.maxrecordings == 'number') && (domain.sessionrecording.maxrecordings > 0) && (totalFiles >= domain.sessionrecording.maxrecordings)) { overQuota = true; }
|
|
else if ((typeof domain.sessionrecording.maxrecordingsizemegabytes == 'number') && (domain.sessionrecording.maxrecordingsizemegabytes > 0) && (totalSize >= (domain.sessionrecording.maxrecordingsizemegabytes * 1048576))) { overQuota = true; }
|
|
else if ((typeof domain.sessionrecording.maxrecordingdays == 'number') && (domain.sessionrecording.maxrecordingdays > 0) && (((now - recfiles[i].t) / 1000 / 60 / 60 / 24) >= domain.sessionrecording.maxrecordingdays)) { overQuota = true; }
|
|
if (overQuota) { fs.unlinkSync(parent.parent.path.join(recPath, recfiles[i].n)); }
|
|
totalFiles++;
|
|
totalSize += recfiles[i].s;
|
|
}
|
|
delete parent.cleanUpRecordingsActive;
|
|
});
|
|
}, 500);
|
|
}
|
|
}
|
|
|
|
// Get node information
|
|
parent.db.Get(nodeid, function (err, nodes) {
|
|
if ((err != null) || (nodes.length != 1)) { func(null); return; }
|
|
obj.meshid = nodes[0].meshid;
|
|
obj.icon = nodes[0].icon;
|
|
obj.name = nodes[0].name;
|
|
recordingSetup(domain, function () { func(obj); });
|
|
});
|
|
return obj;
|
|
}
|
|
|
|
function checkDeviceSharePublicIdentifier(parent, domain, nodeid, pid, extraKey, func) {
|
|
// Check the public id
|
|
parent.db.GetAllTypeNodeFiltered([nodeid], domain.id, 'deviceshare', null, function (err, docs) {
|
|
if ((err != null) || (docs.length == 0)) { func(false); return; }
|
|
|
|
// Search for the device share public identifier
|
|
var found = false;
|
|
for (var i = 0; i < docs.length; i++) { if ((docs[i].publicid == pid) && ((docs[i].extrakey == null) || (docs[i].extrakey === extraKey))) { found = true; } }
|
|
func(found);
|
|
});
|
|
}
|
|
|
|
module.exports.CreateMeshRelay = function (parent, ws, req, domain, user, cookie) {
|
|
if ((cookie != null) && (typeof cookie.nid == 'string') && (typeof cookie.pid == 'string')) {
|
|
checkDeviceSharePublicIdentifier(parent, domain, cookie.nid, cookie.pid, cookie.k, function (result) {
|
|
// If the identifier if not found, close the connection
|
|
if (result == false) { try { ws.close(); } catch (e) { } return; }
|
|
// Public device sharing identifier found, continue as normal.
|
|
CreateMeshRelayEx(parent, ws, req, domain, user, cookie);
|
|
});
|
|
} else {
|
|
CreateMeshRelayEx(parent, ws, req, domain, user, cookie);
|
|
}
|
|
}
|
|
|
|
// If we are in multi-server mode, the desktop multiplexor needs to be created on the server with the agent connected to it.
|
|
// So, if the agent is connected to a different server, just relay the connection to that server
|
|
function CreateMeshRelayEx(parent, ws, req, domain, user, cookie) {
|
|
// Do validation work
|
|
if (cookie) {
|
|
if ((typeof cookie.expire == 'number') && (cookie.expire <= Date.now())) { delete req.query.nodeid; }
|
|
else if (typeof cookie.nid == 'string') { req.query.nodeid = cookie.nid; }
|
|
}
|
|
if ((req.query.nodeid == null) || (req.query.p != '2') || (req.query.id == null) || (domain == null)) { try { ws.close(); } catch (e) { } return; } // Not is not a valid remote desktop connection.
|
|
|
|
// Check routing if in multi-server mode
|
|
var nodeid = req.query.nodeid;
|
|
if (parent.parent.multiServer != null) {
|
|
const routing = parent.parent.GetRoutingServerIdNotSelf(nodeid, 1); // 1 = MeshAgent routing type
|
|
if (routing == null) {
|
|
// No need to relay the connection to a different server
|
|
return CreateMeshRelayEx2(parent, ws, req, domain, user, cookie);
|
|
} else {
|
|
// We must relay the connection to a different server
|
|
return parent.parent.multiServer.createPeerRelay(ws, req, routing.serverid, req.session.userid);
|
|
}
|
|
} else {
|
|
// No need to relay the connection to a different server
|
|
return CreateMeshRelayEx2(parent, ws, req, domain, user, cookie);
|
|
}
|
|
}
|
|
|
|
function CreateMeshRelayEx2(parent, ws, req, domain, user, cookie) {
|
|
const currentTime = Date.now();
|
|
var obj = {};
|
|
obj.ws = ws;
|
|
obj.ws.me = obj;
|
|
obj.id = req.query.id;
|
|
obj.nodeid = req.query.nodeid;
|
|
obj.user = user;
|
|
obj.ruserid = null;
|
|
obj.req = req; // Used in multi-server.js
|
|
obj.viewOnly = ((cookie != null) && (cookie.vo == 1)); // set view only mode
|
|
if ((cookie != null) && (cookie.nouser == 1)) { obj.nouser = true; } // This is a relay without user authentication
|
|
|
|
// If the domain has remote desktop viewonly set, force everyone to be in viewonly mode.
|
|
if ((typeof domain.desktop == 'object') && (domain.desktop.viewonly == true)) { obj.viewOnly = true; }
|
|
|
|
// Setup traffic accounting
|
|
if (parent.trafficStats.desktopMultiplex == null) { parent.trafficStats.desktopMultiplex = { connections: 1, sessions: 0, in: 0, out: 0 }; } else { parent.trafficStats.desktopMultiplex.connections++; }
|
|
ws._socket.bytesReadEx = 0;
|
|
ws._socket.bytesWrittenEx = 0;
|
|
|
|
// Setup subscription for desktop sharing public identifier
|
|
// If the identifier is removed, drop the connection
|
|
if ((cookie != null) && (typeof cookie.pid == 'string')) {
|
|
obj.pid = cookie.pid;
|
|
obj.guestName = cookie.gn;
|
|
parent.parent.AddEventDispatch([obj.nodeid], obj);
|
|
obj.HandleEvent = function (source, event, ids, id) { if ((event.action == 'removedDeviceShare') && (obj.pid == event.publicid)) { obj.close(); } }
|
|
}
|
|
|
|
// Check relay authentication
|
|
if ((user == null) && (obj.req.query != null) && (obj.req.query.rauth != null)) {
|
|
const rcookie = parent.parent.decodeCookie(obj.req.query.rauth, parent.parent.loginCookieEncryptionKey, 240); // Cookie with 4 hour timeout
|
|
if (rcookie.ruserid != null) { obj.ruserid = rcookie.ruserid; } else if (rcookie.nouser === 1) { obj.rnouser = true; }
|
|
if (rcookie.nodeid != null) { obj.nodeid = rcookie.nodeid; }
|
|
}
|
|
|
|
// If there is no authentication, drop this connection
|
|
if ((obj.id != null) && (obj.user == null) && (obj.ruserid == null) && (obj.nouser !== true) && (obj.rnouser !== true)) { try { ws.close(); parent.parent.debug('relay', 'DesktopRelay: Connection with no authentication (' + obj.req.clientIp + ')'); } catch (e) { console.log(e); } return; }
|
|
|
|
// Relay session count (we may remove this in the future)
|
|
obj.relaySessionCounted = true;
|
|
parent.relaySessionCount++;
|
|
|
|
// Mesh Rights
|
|
const MESHRIGHT_EDITMESH = 1;
|
|
const MESHRIGHT_MANAGEUSERS = 2;
|
|
const MESHRIGHT_MANAGECOMPUTERS = 4;
|
|
const MESHRIGHT_REMOTECONTROL = 8;
|
|
const MESHRIGHT_AGENTCONSOLE = 16;
|
|
const MESHRIGHT_SERVERFILES = 32;
|
|
const MESHRIGHT_WAKEDEVICE = 64;
|
|
const MESHRIGHT_SETNOTES = 128;
|
|
const MESHRIGHT_REMOTEVIEW = 256;
|
|
|
|
// Site rights
|
|
const SITERIGHT_SERVERBACKUP = 1;
|
|
const SITERIGHT_MANAGEUSERS = 2;
|
|
const SITERIGHT_SERVERRESTORE = 4;
|
|
const SITERIGHT_FILEACCESS = 8;
|
|
const SITERIGHT_SERVERUPDATE = 16;
|
|
const SITERIGHT_LOCKED = 32;
|
|
|
|
// Clean a IPv6 address that encodes a IPv4 address
|
|
function cleanRemoteAddr(addr) { if (addr.startsWith('::ffff:')) { return addr.substring(7); } else { return addr; } }
|
|
|
|
// Disconnect this agent
|
|
obj.close = function (arg) {
|
|
if (obj.ws == null) return; // Already closed.
|
|
|
|
// Close the connection
|
|
if ((arg == 1) || (arg == null)) { try { ws.close(); parent.parent.debug('relay', 'DesktopRelay: Soft disconnect (' + obj.req.clientIp + ')'); } catch (e) { console.log(e); } } // Soft close, close the websocket
|
|
if (arg == 2) { try { ws._socket._parent.end(); parent.parent.debug('relay', 'DesktopRelay: Hard disconnect (' + obj.req.clientIp + ')'); } catch (e) { console.log(e); } } // Hard close, close the TCP socket
|
|
if (obj.relaySessionCounted) { parent.relaySessionCount--; delete obj.relaySessionCounted; }
|
|
if ((obj.deskMultiplexor != null) && (typeof obj.deskMultiplexor == 'object') && (obj.deskMultiplexor.removePeer(obj) == true)) { delete parent.desktoprelays[obj.nodeid]; }
|
|
|
|
// Aggressive cleanup
|
|
delete obj.id;
|
|
delete obj.ws;
|
|
delete obj.req;
|
|
delete obj.user;
|
|
delete obj.nodeid;
|
|
delete obj.ruserid;
|
|
delete obj.expireTimer;
|
|
delete obj.deskMultiplexor;
|
|
|
|
// Clear timers if present
|
|
if (obj.pingtimer != null) { clearInterval(obj.pingtimer); delete obj.pingtimer; }
|
|
if (obj.pongtimer != null) { clearInterval(obj.pongtimer); delete obj.pongtimer; }
|
|
|
|
// Unsubscribe
|
|
if (obj.pid != null) { parent.parent.RemoveAllEventDispatch(obj); }
|
|
};
|
|
|
|
obj.sendAgentMessage = function (command, userid, domainid) {
|
|
var rights, mesh;
|
|
if (command.nodeid == null) return false;
|
|
var user = null;
|
|
if (userid != null) { user = parent.users[userid]; if (user == null) return false; }
|
|
var splitnodeid = command.nodeid.split('/');
|
|
// Check that we are in the same domain and the user has rights over this node.
|
|
if ((splitnodeid[0] == 'node') && (splitnodeid[1] == domainid)) {
|
|
// Get the user object
|
|
// See if the node is connected
|
|
var agent = parent.wsagents[command.nodeid];
|
|
if (agent != null) {
|
|
// Check if we have permission to send a message to that node
|
|
if (userid == null) { rights = MESHRIGHT_REMOTECONTROL; } else { rights = parent.GetNodeRights(user, agent.dbMeshKey, agent.dbNodeKey); }
|
|
mesh = parent.meshes[agent.dbMeshKey];
|
|
if ((rights != null) && (mesh != null) || ((rights & 16) != 0)) { // TODO: 16 is console permission, may need more gradular permission checking
|
|
if (ws.sessionId) { command.sessionid = ws.sessionId; } // Set the session id, required for responses.
|
|
command.rights = rights; // Add user rights flags to the message
|
|
if ((command.rights != 0xFFFFFFFF) && ((command.rights & 0x100) != 0)) { command.rights -= 0x100; } // Since the multiplexor will enforce view-only, remove MESHRIGHT_REMOTEVIEWONLY
|
|
if (typeof command.consent == 'number') { command.consent = command.consent | mesh.consent; } else { command.consent = mesh.consent; } // Add user consent
|
|
if (typeof domain.userconsentflags == 'number') { command.consent |= domain.userconsentflags; } // Add server required consent flags
|
|
if (user != null) {
|
|
command.username = user.name; // Add user name
|
|
command.realname = user.realname; // Add real name
|
|
}
|
|
if (typeof domain.desktopprivacybartext == 'string') { command.privacybartext = domain.desktopprivacybartext; } // Privacy bar text
|
|
delete command.nodeid; // Remove the nodeid since it's implyed.
|
|
agent.send(JSON.stringify(command));
|
|
return true;
|
|
}
|
|
} else {
|
|
// Check if a peer server is connected to this agent
|
|
var routing = parent.parent.GetRoutingServerIdNotSelf(command.nodeid, 1); // 1 = MeshAgent routing type
|
|
if (routing != null) {
|
|
// Check if we have permission to send a message to that node
|
|
if (userid == null) { rights = MESHRIGHT_REMOTECONTROL; } else { rights = parent.GetNodeRights(user, routing.meshid, command.nodeid); }
|
|
mesh = parent.meshes[routing.meshid];
|
|
if (rights != null || ((rights & 16) != 0)) { // TODO: 16 is console permission, may need more gradular permission checking
|
|
if (ws.sessionId) { command.fromSessionid = ws.sessionId; } // Set the session id, required for responses.
|
|
command.rights = rights; // Add user rights flags to the message
|
|
if ((command.rights != 0xFFFFFFFF) && ((command.rights & 0x00000100) != 0)) { command.rights -= 0x00000100; } // Since the multiplexor will enforce view-only, remove MESHRIGHT_REMOTEVIEWONLY
|
|
if (typeof command.consent == 'number') { command.consent = command.consent | mesh.consent; } else { command.consent = mesh.consent; } // Add user consent
|
|
if (typeof domain.userconsentflags == 'number') { command.consent |= domain.userconsentflags; } // Add server required consent flags
|
|
if (user != null) {
|
|
command.username = user.name; // Add user name
|
|
command.realname = user.realname; // Add real name
|
|
}
|
|
if (typeof domain.desktopprivacybartext == 'string') { command.privacybartext = domain.desktopprivacybartext; } // Privacy bar text
|
|
parent.parent.multiServer.DispatchMessageSingleServer(command, routing.serverid);
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return false;
|
|
};
|
|
|
|
// Send a PING/PONG message
|
|
function sendPing() {
|
|
try { obj.ws.send('{"ctrlChannel":"102938","type":"ping"}'); } catch (ex) { }
|
|
try { if (obj.peer != null) { obj.peer.ws.send('{"ctrlChannel":"102938","type":"ping"}'); } } catch (ex) { }
|
|
}
|
|
function sendPong() {
|
|
try { obj.ws.send('{"ctrlChannel":"102938","type":"pong"}'); } catch (ex) { }
|
|
try { if (obj.peer != null) { obj.peer.ws.send('{"ctrlChannel":"102938","type":"pong"}'); } } catch (ex) { }
|
|
}
|
|
|
|
function performRelay(retryCount) {
|
|
if ((obj.id == null) || (retryCount > 20)) { try { obj.close(); } catch (e) { } return null; } // Attempt to connect without id, drop this.
|
|
if (retryCount == 0) { ws._socket.setKeepAlive(true, 240000); } // Set TCP keep alive
|
|
|
|
/*
|
|
// Validate that the id is valid, we only need to do this on non-authenticated sessions.
|
|
// TODO: Figure out when this needs to be done.
|
|
if (user == null) {
|
|
// Check the identifier, if running without TLS, skip this.
|
|
var ids = obj.id.split(':');
|
|
if (ids.length != 3) { ws.close(); delete obj.id; return null; } // Invalid ID, drop this.
|
|
if (parent.crypto.createHmac('SHA384', parent.relayRandom).update(ids[0] + ':' + ids[1]).digest('hex') != ids[2]) { ws.close(); delete obj.id; return null; } // Invalid HMAC, drop this.
|
|
if ((Date.now() - parseInt(ids[1])) > 120000) { ws.close(); delete obj.id; return null; } // Expired time, drop this.
|
|
obj.id = ids[0];
|
|
}
|
|
*/
|
|
|
|
if (retryCount == 0) {
|
|
// Setup the agent PING/PONG timers
|
|
if ((typeof parent.parent.args.agentping == 'number') && (obj.pingtimer == null)) { obj.pingtimer = setInterval(sendPing, parent.parent.args.agentping * 1000); }
|
|
else if ((typeof parent.parent.args.agentpong == 'number') && (obj.pongtimer == null)) { obj.pongtimer = setInterval(sendPong, parent.parent.args.agentpong * 1000); }
|
|
|
|
parent.parent.debug('relay', 'DesktopRelay: Connection (' + obj.req.clientIp + ')');
|
|
}
|
|
|
|
// Create if needed and add this peer to the desktop multiplexor
|
|
obj.deskMultiplexor = parent.desktoprelays[obj.nodeid];
|
|
if (obj.deskMultiplexor == null) {
|
|
parent.desktoprelays[obj.nodeid] = 1; // Indicate that the creating of the desktop multiplexor is pending.
|
|
parent.parent.debug('relay', 'DesktopRelay: Creating new desktop multiplexor');
|
|
CreateDesktopMultiplexor(parent, domain, obj.nodeid, obj.id, function (deskMultiplexor) {
|
|
if (deskMultiplexor != null) {
|
|
// Desktop multiplexor was created, use it.
|
|
obj.deskMultiplexor = deskMultiplexor;
|
|
parent.desktoprelays[obj.nodeid] = obj.deskMultiplexor;
|
|
obj.deskMultiplexor.addPeer(obj);
|
|
ws._socket.resume(); // Release the traffic
|
|
} else {
|
|
// An error has occured, close this connection
|
|
delete parent.desktoprelays[obj.nodeid];
|
|
ws.close();
|
|
}
|
|
});
|
|
} else {
|
|
if (obj.deskMultiplexor == 1) {
|
|
// The multiplexor is being created, hold a little and try again. This is to prevent a possible race condition.
|
|
setTimeout(function () { performRelay(++retryCount); }, 50);
|
|
} else {
|
|
// Hook up this peer to the multiplexor and release the traffic
|
|
obj.deskMultiplexor.addPeer(obj);
|
|
ws._socket.resume();
|
|
}
|
|
}
|
|
}
|
|
|
|
// When data is received from the mesh relay web socket
|
|
ws.on('message', function (data) {
|
|
// Data accounting
|
|
parent.trafficStats.desktopMultiplex.in += (this._socket.bytesRead - this._socket.bytesReadEx);
|
|
parent.trafficStats.desktopMultiplex.out += (this._socket.bytesWritten - this._socket.bytesWrittenEx);
|
|
this._socket.bytesReadEx = this._socket.bytesRead;
|
|
this._socket.bytesWrittenEx = this._socket.bytesWritten;
|
|
|
|
// If this data was received by the agent, decode it.
|
|
if (this.me.deskMultiplexor != null) { this.me.deskMultiplexor.processData(this.me, data); }
|
|
});
|
|
|
|
// If error, close both sides of the relay.
|
|
ws.on('error', function (err) {
|
|
//console.log('ws-error', err);
|
|
parent.relaySessionErrorCount++;
|
|
console.log('Relay error from ' + obj.req.clientIp + ', ' + err.toString().split('\r')[0] + '.');
|
|
obj.close();
|
|
});
|
|
|
|
// If the relay web socket is closed, close both sides.
|
|
ws.on('close', function (req) {
|
|
// Data accounting
|
|
parent.trafficStats.desktopMultiplex.in += (this._socket.bytesRead - this._socket.bytesReadEx);
|
|
parent.trafficStats.desktopMultiplex.out += (this._socket.bytesWritten - this._socket.bytesWrittenEx);
|
|
this._socket.bytesReadEx = this._socket.bytesRead;
|
|
this._socket.bytesWrittenEx = this._socket.bytesWritten;
|
|
|
|
//console.log('ws-close', req);
|
|
obj.close();
|
|
});
|
|
|
|
// If this session has a expire time, setup the expire timer now.
|
|
setExpireTimer();
|
|
|
|
// Mark this relay session as authenticated if this is the user end.
|
|
obj.authenticated = ((user != null) || (obj.nouser === true));
|
|
if (obj.authenticated) {
|
|
// Kick off the routing, if we have agent routing instructions, process them here.
|
|
// Routing instructions can only be given by a authenticated user
|
|
if ((cookie != null) && (cookie.nodeid != null) && (cookie.tcpport != null) && (cookie.domainid != null)) {
|
|
// We have routing instructions in the cookie, but first, check user access for this node.
|
|
parent.db.Get(cookie.nodeid, function (err, docs) {
|
|
if (obj.req == null) return; // This connection was closed.
|
|
if (docs.length == 0) { console.log('ERR: Node not found'); try { obj.close(); } catch (e) { } return; } // Disconnect websocket
|
|
const node = docs[0];
|
|
|
|
// Check if this user has permission to manage this computer
|
|
if ((obj.nouser !== true) && ((parent.GetNodeRights(user, node.meshid, node._id) & MESHRIGHT_REMOTECONTROL) == 0)) { console.log('ERR: Access denied (1)'); try { obj.close(); } catch (e) { } return; }
|
|
|
|
// Send connection request to agent
|
|
const rcookieData = { nodeid: node._id };
|
|
if (user != null) { rcookieData.ruserid = user._id; } else if (obj.nouser === true) { rcookieData.nouser = 1; }
|
|
const rcookie = parent.parent.encodeCookie(rcookieData, parent.parent.loginCookieEncryptionKey);
|
|
if (obj.id == undefined) { obj.id = ('' + Math.random()).substring(2); } // If there is no connection id, generate one.
|
|
const command = { nodeid: node._id, action: 'msg', type: 'tunnel', value: '*/meshrelay.ashx?id=' + obj.id + '&rauth=' + rcookie, tcpport: cookie.tcpport, tcpaddr: cookie.tcpaddr };
|
|
parent.parent.debug('relay', 'Relay: Sending agent tunnel command: ' + JSON.stringify(command));
|
|
if (obj.sendAgentMessage(command, user ? user._id : null, cookie.domainid) == false) { delete obj.id; parent.parent.debug('relay', 'Relay: Unable to contact this agent (' + obj.req.clientIp + ')'); }
|
|
performRelay(0);
|
|
});
|
|
return obj;
|
|
} else if ((obj.req.query.nodeid != null) && ((obj.req.query.tcpport != null) || (obj.req.query.udpport != null))) {
|
|
// We have routing instructions in the URL arguments, but first, check user access for this node.
|
|
parent.db.Get(obj.req.query.nodeid, function (err, docs) {
|
|
if (obj.req == null) return; // This connection was closed.
|
|
if (docs.length == 0) { console.log('ERR: Node not found'); try { obj.close(); } catch (e) { } return; } // Disconnect websocket
|
|
const node = docs[0];
|
|
|
|
// Check if this user has permission to manage this computer
|
|
if ((obj.nouser !== true) && ((parent.GetNodeRights(user, node.meshid, node._id) & MESHRIGHT_REMOTECONTROL) == 0)) { console.log('ERR: Access denied (2)'); try { obj.close(); } catch (e) { } return; }
|
|
|
|
// Send connection request to agent
|
|
if (obj.id == null) { obj.id = ('' + Math.random()).substring(2); } // If there is no connection id, generate one.
|
|
const rcookieData = { nodeid: node._id };
|
|
if (user != null) { rcookieData.ruserid = user._id; } else if (obj.nouser === true) { rcookieData.nouser = 1; }
|
|
const rcookie = parent.parent.encodeCookie(rcookieData, parent.parent.loginCookieEncryptionKey);
|
|
|
|
if (obj.req.query.tcpport != null) {
|
|
const command = { nodeid: node._id, action: 'msg', type: 'tunnel', value: '*/meshrelay.ashx?id=' + obj.id + '&rauth=' + rcookie, tcpport: obj.req.query.tcpport, tcpaddr: ((obj.req.query.tcpaddr == null) ? '127.0.0.1' : obj.req.query.tcpaddr) };
|
|
parent.parent.debug('relay', 'Relay: Sending agent TCP tunnel command: ' + JSON.stringify(command));
|
|
if (obj.sendAgentMessage(command, user ? user._id : null, domain.id) == false) { delete obj.id; parent.parent.debug('relay', 'Relay: Unable to contact this agent (' + obj.req.clientIp + ')'); }
|
|
} else if (obj.req.query.udpport != null) {
|
|
const command = { nodeid: node._id, action: 'msg', type: 'tunnel', value: '*/meshrelay.ashx?id=' + obj.id + '&rauth=' + rcookie, udpport: obj.req.query.udpport, udpaddr: ((obj.req.query.udpaddr == null) ? '127.0.0.1' : obj.req.query.udpaddr) };
|
|
parent.parent.debug('relay', 'Relay: Sending agent UDP tunnel command: ' + JSON.stringify(command));
|
|
if (obj.sendAgentMessage(command, user ? user._id : null, domain.id) == false) { delete obj.id; parent.parent.debug('relay', 'Relay: Unable to contact this agent (' + obj.req.clientIp + ')'); }
|
|
}
|
|
performRelay(0);
|
|
});
|
|
return obj;
|
|
} else if ((cookie != null) && (cookie.nid != null) && (typeof cookie.r == 'number') && (typeof cookie.cf == 'number') && (typeof cookie.gn == 'string')) {
|
|
// We have routing instructions in the cookie, but first, check user access for this node.
|
|
parent.db.Get(cookie.nid, function (err, docs) {
|
|
if (obj.req == null) return; // This connection was closed.
|
|
if (docs.length == 0) { console.log('ERR: Node not found'); try { obj.close(); } catch (e) { } return; } // Disconnect websocket
|
|
const node = docs[0];
|
|
|
|
// Check if this user has permission to manage this computer
|
|
if ((obj.nouser !== true) && ((parent.GetNodeRights(user, node.meshid, node._id) & MESHRIGHT_REMOTECONTROL) == 0)) { console.log('ERR: Access denied (2)'); try { obj.close(); } catch (e) { } return; }
|
|
|
|
// Send connection request to agent
|
|
if (obj.id == null) { obj.id = ('' + Math.random()).substring(2); }
|
|
const rcookieData = { nodeid: node._id };
|
|
if (user != null) { rcookieData.ruserid = user._id; } else if (obj.nouser === true) { rcookieData.nouser = 1; }
|
|
const rcookie = parent.parent.encodeCookie(rcookieData, parent.parent.loginCookieEncryptionKey);
|
|
const command = { nodeid: node._id, action: 'msg', type: 'tunnel', value: '*/meshrelay.ashx?p=2&id=' + obj.id + '&rauth=' + rcookie + '&nodeid=' + node._id, soptions: {}, usage: 2, rights: cookie.r, guestuserid: user._id, guestname: cookie.gn, consent: cookie.cf, remoteaddr: cleanRemoteAddr(obj.req.clientIp) };
|
|
if (typeof domain.consentmessages == 'object') {
|
|
if (typeof domain.consentmessages.title == 'string') { command.soptions.consentTitle = domain.consentmessages.title; }
|
|
if (typeof domain.consentmessages.desktop == 'string') { command.soptions.consentMsgDesktop = domain.consentmessages.desktop; }
|
|
if (typeof domain.consentmessages.terminal == 'string') { command.soptions.consentMsgTerminal = domain.consentmessages.terminal; }
|
|
if (typeof domain.consentmessages.files == 'string') { command.soptions.consentMsgFiles = domain.consentmessages.files; }
|
|
if ((typeof domain.consentmessages.consenttimeout == 'number') && (domain.consentmessages.consenttimeout > 0)) { command.soptions.consentTimeout = domain.consentmessages.consenttimeout; }
|
|
if (domain.consentmessages.autoacceptontimeout === true) { command.soptions.consentAutoAccept = true; }
|
|
}
|
|
if (typeof domain.notificationmessages == 'object') {
|
|
if (typeof domain.notificationmessages.title == 'string') { command.soptions.notifyTitle = domain.notificationmessages.title; }
|
|
if (typeof domain.notificationmessages.desktop == 'string') { command.soptions.notifyMsgDesktop = domain.notificationmessages.desktop; }
|
|
if (typeof domain.notificationmessages.terminal == 'string') { command.soptions.notifyMsgTerminal = domain.notificationmessages.terminal; }
|
|
if (typeof domain.notificationmessages.files == 'string') { command.soptions.notifyMsgFiles = domain.notificationmessages.files; }
|
|
}
|
|
parent.parent.debug('relay', 'Relay: Sending agent tunnel command: ' + JSON.stringify(command));
|
|
if (obj.sendAgentMessage(command, user ? user._id : null, domain.id) == false) { delete obj.id; parent.parent.debug('relay', 'Relay: Unable to contact this agent (' + obj.req.clientIp + ')'); }
|
|
|
|
performRelay(0);
|
|
});
|
|
return obj;
|
|
}
|
|
}
|
|
|
|
// Set the session expire timer
|
|
function setExpireTimer() {
|
|
if (obj.expireTimer != null) { clearTimeout(obj.expireTimer); delete obj.expireTimer; }
|
|
if (cookie && (typeof cookie.expire == 'number')) {
|
|
const timeToExpire = (cookie.expire - Date.now());
|
|
if (timeToExpire < 1) {
|
|
obj.close();
|
|
} else if (timeToExpire >= 0x7FFFFFFF) {
|
|
obj.expireTimer = setTimeout(setExpireTimer, 0x7FFFFFFF); // Since expire timer can't be larger than 0x7FFFFFFF, reset timer after that time.
|
|
} else {
|
|
obj.expireTimer = setTimeout(obj.close, timeToExpire);
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
// Check if this user has input access on the device
|
|
if ((obj.user != null) && (obj.viewOnly == false)) {
|
|
obj.viewOnly = true; // Set a view only for now until we figure out otherwise
|
|
parent.db.Get(obj.nodeid, function (err, docs) {
|
|
if (obj.req == null) return; // This connection was closed.
|
|
if (docs.length == 0) { console.log('ERR: Node not found'); try { obj.close(); } catch (e) { } return; } // Disconnect websocket
|
|
const node = docs[0];
|
|
|
|
// Check if this user has permission to manage this computer
|
|
const rights = parent.GetNodeRights(obj.user, node.meshid, node._id);
|
|
if ((rights & 0x00000008) == 0) { try { obj.close(); } catch (e) { } return; } // Check MESHRIGHT_ADMIN or MESHRIGHT_REMOTECONTROL
|
|
if ((rights != 0xFFFFFFFF) && ((rights & 0x00010000) != 0)) { try { obj.close(); } catch (e) { } return; } // Check MESHRIGHT_NODESKTOP
|
|
if ((rights == 0xFFFFFFFF) || ((rights & 0x00000100) == 0)) { obj.viewOnly = false; } // Check MESHRIGHT_REMOTEVIEWONLY
|
|
performRelay(0);
|
|
});
|
|
} else {
|
|
// If this is not an authenticated session, or the session does not have routing instructions, just go ahead an connect to existing session.
|
|
performRelay(0);
|
|
}
|
|
return obj;
|
|
};
|
|
|
|
/*
|
|
Relay session recording required that "SessionRecording":true be set in the domain section of the config.json.
|
|
Once done, a folder "meshcentral-recordings" will be created next to "meshcentral-data" that will contain all
|
|
of the recording files with the .mcrec extension.
|
|
|
|
The recording files are binary and contain a set of:
|
|
|
|
<HEADER><DATABLOCK><HEADER><DATABLOCK><HEADER><DATABLOCK><HEADER><DATABLOCK>...
|
|
|
|
The header is always 16 bytes long and is encoded like this:
|
|
|
|
TYPE 2 bytes, 1 = Header, 2 = Network Data, 3 = EndBlock
|
|
FLAGS 2 bytes, 0x0001 = Binary, 0x0002 = User
|
|
SIZE 4 bytes, Size of the data following this header.
|
|
TIME 8 bytes, Time this record was written, number of milliseconds since 1 January, 1970 UTC.
|
|
|
|
All values are BigEndian encoded. The first data block is of TYPE 1 and contains a JSON string with information
|
|
about this recording. It looks something like this:
|
|
|
|
{
|
|
magic: 'MeshCentralRelaySession',
|
|
ver: 1,
|
|
userid: "user\domain\userid",
|
|
username: "username",
|
|
sessionid: "RandomValue",
|
|
ipaddr1: 1.2.3.4,
|
|
ipaddr2: 1.2.3.5,
|
|
time: new Date().toLocaleString()
|
|
}
|
|
|
|
The rest of the data blocks are all network traffic that was relayed thru the server. They are of TYPE 2 and have
|
|
a given size and timestamp. When looking at network traffic the flags are important:
|
|
|
|
- If traffic has the first (0x0001) flag set, the data is binary otherwise it's a string.
|
|
- If the traffic has the second (0x0002) flag set, traffic is coming from the user's browser, if not, it's coming from the MeshAgent.
|
|
*/ |