2020-05-22 13:59:02 -04:00
/ *
2021-01-09 17:31:09 -05:00
Copyright 2018 - 2021 Intel Corporation
2020-05-22 13:59:02 -04:00
Licensed under the Apache License , Version 2.0 ( the "License" ) ;
you may not use this file except in compliance with the License .
You may obtain a copy of the License at
http : //www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing , software
distributed under the License is distributed on an "AS IS" BASIS ,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND , either express or implied .
See the License for the specific language governing permissions and
limitations under the License .
* /
/ * *
* @ description MeshCmd , command line tool for Intel AMT and MeshCentral .
* @ author Ylian Saint - Hilaire
* @ version v0 . 2.0
* /
// Debug Stuff
//console.displayFinalizerMessages = 1; // Display objects that have event listeners that are disposed.
//console.displayStreamPipeMessages = 1; // Display stream pipe and un-pipes
//var __gc = setInterval(function () { console.log('GC'); _debugGC() }, 2000); //
var fs = require ( 'fs' ) ;
var os = require ( 'os' ) ;
var net = require ( 'net' ) ;
var http = require ( 'http' ) ;
var dgram = require ( 'dgram' ) ;
var httpHeaders = require ( 'http-headers' ) ;
var tcpserver = null ;
var broadcastSockets = { } ;
var multicastSockets = { } ;
var discoveryInterval = null ;
var membershipIPv4 = '239.255.255.235' ;
var membershipIPv6 = 'FF02:0:0:0:0:0:0:FE' ;
var settings = null ;
var meshCmdVersion = '***Mesh*Cmd*Version***' ; // Dynamically replaced with MeshCentral version
var amtLms = null , amtMei = null , amtMeiState = null ;
var wsstack = null , amtstack = null ;
var oswsstack = null , osamtstack = null ;
var amtMeiTmpState = null ;
var SMBiosTables = null ;
var globalDebugFlags = 0 ; // 1 = IDER Debug
var pendingAmtConfigActions = 0 ;
var RCSMessageProtocolVersion = 1 ; // RCS Message Protocol Version. Needs to be less than or equal to RCS server Message Protocol Version
2021-01-23 17:32:43 -05:00
// MeshCommander LMS (GZIP'ed, Base64) v0.9.0
var _IntelAmtWebApp _etag = "A2rEfbOagx5Xc9AV3Gmm" ;
var _IntelAmtWebApp = " H4sIAAAAAAAEANQ6iVbbura / ohve6YJzCNjOTEjWM0nKUMIUWs6dr2wriYttubZMSFn9sTd + 0 vuFp23LiYVtIJfzhtsCiSXtQXvekv / rX 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
2020-05-22 13:59:02 -04:00
2020-05-28 19:24:48 -04:00
// MeshCommander Local (GZIP'ed, Base64) v0.8.3
2021-01-23 17:32:43 -05:00
var FullSite _IntelAmtLocalWebApp _etag = "xVzv3zwu7TbauOUKmy3r" ;
var FullSite _IntelAmtLocalWebApp = " H4sIAAAAAAAEAMQ5h3ajvNKvwu / 9 SnI2JICNa7zn4JLuTd9svlMFCFAiEAHhEp + 82 H / bI91XuJIRNgRv8edbXMVI00cjjfTPv / zj8P8Gl / 27 x6uh5FEffzrkvxIGgdutwKAixXSGYdeDyPVoW1WUX9kICOxPhz6kgKHQUIYvCRp3v8r3htwnfggoMjGULBJQGNBu5XTYhbYLKwJlCadwSg84t47lgSiGtJtQR25W8kT76WD5bhZCgR8AH3YdEvmAyjak0KKIBHmqGIYeCWA3IIwlRsGzFEHcrSCLMHUoI9RFPnDhQRi4khdBp1uxAQXtJbBjghjWa3voS + / y Z q K c H 7 u k y y g t D P H J J P Z s n r N G x w d T O f 9 M x j B y M J m 0 P W T b M O g 4 h I n v A B / h W R t E C O A 9 y Y N 4 D C m y w J 4 U g y C W Y x g h J x 0 Y o 1 f Y b o W 0 Y x F M o r a J g f X c M d m P G 5 E k s N s T D 1 H I e E Y u C m R K w r a S P W D o 0 N V T x A V i j / I E m s + I s q G J 5 c k W w J g k t B 0 w 8 y y 7 E s a e i Y C h l X U 8 c 6 e s g f v k d R 0 0 L g N L g D e M 5 q l o T K g Q 2 D Y K X N Z 6 k 0 B 7 j G K m k z 3 n 4 c A c a p E I c I 8 u 8 I Q Z P i g 1 p / M G 2 t y Z P z P O 4 0 6 Y C 5 i u 6 5 0 3 T 5 2 v 7 K u q I U 3 N P U k d Z x J s F y y e t 6 k e T v M G V 5 X V s 0 k o J X 6 7 z i B v n p b j 0 N q E Q b 3 I o F 6 i z + w U z r + D U S t j F O N A 4 w J S u y g g g 3 h l S G a 7 J I q Z s C F B A Y V R P g I / A A A 6 b / s 8 B 7 B x I Y n R w g s O m k K 7 k 0 a k C M U s B s X s q D f C a Y G Q U q 1 3 p L f 9 M C J u B O P Y B G v J L d D W U 9 T K B J l k K C j Y q s b 8 x a C Y u P P 8 W N M 0 g a m n H e o 3 e y T K 5 7 t E o 3 Z A 2 f T x E L Z 3 i G 3 v F h B g E 0 I H M g Q n w d i C G K 9 V o 8 X E y O T P v C T 0 Y j 3 v s g Y j 5 g M U / A l i q l 4 v k 8 t m X G o R b j b W z x M Q l g F G b t B m R B n L A I y / 5 Y S W c E K e 3 w T Z 1 B M M T R L Z M F q F m x Q T j G z p Q 0 / p 1 4 / 6 a 9 i V H J d 7 x i i A I J L d C N g I B n S H E i l l u i d 9 M B 1 b d S x J + X V P 2 F 3 i W X c 3 l V 6 d Z 6 l F Z S I o 7 M v / m 8 v p w U 3 9 / X m 5 y K 9 y H A I L s s Q y i U D Y K U 6 F l J F W C L G q V p y P S p 5 k G T 9 6 n 4 o Y S J m X k j y D q n N h V 2 F z d W l Y Z p t Z h 2 d C Y V E u B 8 f Q 5 m u A 1 Y 3 J V E U a W A k l i 2 z a r D a 1 h l l W K g 4 j C O z C y i j i g z d L d D I V K f J h J M T L y f U B m B a A a h k v 6 2 C Y f s 6 M j Y U V m e 3 z a V 5 T v p 2 F P / S b / F 3 K u z m v 8 k S f E t X m a 5 H y o y Y g C u b f 4 m U p / M V G 8 S 2 I O h d 2 4 V k 7 M 5 d e y G R y B E M I + M o p W v m + x T a l n U R 4 J 7 9 t c Z G T b V t u F H x 8 O c D e 0 D C u j Y v R l X H R 1 2 b T 1 i B S 8 E x 7 S G 6 a R 3 a S e N c z T C 4 f X l 9 t d + b X j 2 d / J C / q w b j x 8 a X v h d b T m X I G v / o N q I / H B w c H s x O 9 Z z B q R t O 4 M P i L 0 e 3 x v 5 t Z c 4 T P X l T t c m T C 2 B w a s 6 f h q P + 5 9 4 U 8 n Z J Z f + S d G Y + P 7 u B S n U x G f e X s A r i 1 o d E 8 H p C r 3 u z 8 E f S G / f v T s 8 H E c y + H k 8 k R c Y 3 P o / O n w f W k H 4 1 O + l 5 1 d t O / G u k J a V 2 d T K i B h 8 3 G S R 8 a u h 2 c n l 3 d j N y 7 1 6 N G 7 / r 6 7 L x 3 / e I Y 1 8 c j r / Z 4 7 E 0 g v n m 8 M Q Z x t 7 I r L K 7 9 V y 1 + N h w Y V 4 M v I + C P B h N m p K u 8 B U f v L H g 6 C 0 4 / h r 3 I A A 8 B I p 8 f X l B g X p 9 Z d 1 V w 9 q o 8 H N 8 + A t c 4 s y h Q L k 9 x b D q n F 9 q 9 C f H g e n p u x L c o v n s a n B r E u J x 0 V 9 p W / 6 v a n p + e G B d D 6 w R + p Q 2 w J n Y O 8 t p b 7 7 T / D O B F Z F 3 4 D 6 P T c I L C P 3 q f T 4 / x Y 6 / 2 a o R P R + C x Z z w 9 X t 8 9 1 r y v x 7 c v X v / h p g p u L z 7 2 g m F z e m o M h y 7 o T a 8 H 1 8 i o P W D i Q v f 2 + u K o d n 9 i x K R 2 7 P l n w f D 2 y / N N w 3 i 5 1 q 6 f r f u T e z V + 7 j 9 / M W I 4 t P q r + K D Q 7 4 F o u W 4 0 e B J A Q b a j 1 5 T y T q u w s 2 o y Q G p v k F C y X A a B j Z J 4 0 b k m g 1 p N s 6 m W M 6 h F / D B h T S 6 S h a L M j V r O j b x d Z F E r b o F 4 P i 8 K y A c U a c + L n P P i S 5 n a u S W T E 8 i s o 5 W I / W C d Y K O T e L 6 + C E E B o g j g t X U I l 2 Z d H c K X K l G H l K F x G V g C v E k 8 o f f 5 v m p t z P + + a M Z M C 9 8 H A T P 0 A Y s t w o f u h 4 H 7 + + 5 3 Z x E L p 8 J W k h M s 0 e N z N N Y V T m 5 3 s U V R V g 7 W l S y c 0 m b R U 8 L 1 o q D a R 9 p m v G R 9 K 2 7 V D b m p y l b s a p u y 2 0 4 7 f U N 2 2 n b a 1 T d l t 5 V 2 T z 8 Z l V p 9 b V R q 9 Y w X a / 6 Q l 7 Y Z L 1 m r b 8 O t u i E 3 X d u G W 2 1 D b o 3 m N t z 0 D b m p S m 0 b d v V N 2 V W 3 i R O + U s 0 l y U G Y 9 a X r l p S t B D l g b A E M d x Y l n k R C Y C E 6 2 6 m z B 3 5 w U K j b 5 W X V q v w q 8 e K j v A l S G N j B B N C 0 z J E k q b Q E r K k 8 I 4 7 M C k 9 n 8 W K k W d t q 8 b e o P E t r n + h e s 1 S U d 1 u A U m B 5 P u P V j q 2 I Y M x N o / 1 Z v b i s m y o m p G W 0 V 0 r + p x R T 4 / + V x 4 D C 3 9 9 S T H R v 4 b H 4 v + k y I e 6 P X b a 9 Z t g 0 E 0 p J I H a j t Z U S r F 3 a j e o c s r 7 U L x z J l T f V S 5 N F E A O K x v B 9 9 h C T v 6 3 s 6 z m x x P Y z 6 1 R z X T H E 8 x V S q 9 i T l Y R N b Z 0 O k i K + X J 8 i 7 R + v p F x D k / m t q o k 8 + S 5 L V r U s S 7 L m j 7 I k N r W N G b L G V h y r m 3 O s 1 7 b i W N u c Y 6 u + B c f I n H + n P z 8 v c w d 1 V e X X d Z W V D 4 O k X F U V K W b l k 5 7 D + E 7 p V D d b t t V Y F F o B L 1 p G D K F w 4 H z U 4 m / G Y i r H H r D J p K 1 I i q R y t 0 e u C X Y k Z U 9 8 9 q v S b q d 8 u m Z Z V k d a T j l g M n B C Y f H 0 H q O Y y o s 7 r 1 S J 0 u 2 N L k r l 5 T E f f w b T 7 F n n z 6 8 y Y v 6 b t n V F 4 f r 4 X J 3 s M K 1 W q 3 V s F I c Y z N o o 4 N l O N j G x n o u H 1 c 1 V + S n s n o d w i f X c s z j g 5 K C 1 1 0 R i 1 u u / Z g F i Q w c k m J Y P z E v 5 K B O / e L n k t P i 7 c J j d a r F k c 3 i Q X h c e U k T Z 3 w j G X j + L 5 s O D F H i 4 u F s g Q R J g A u x u x c I Q B E m 4 s 1 t h Q O F 7 H i x d j 6 F h 2 F 9 F w w 4 c w 4 D u f j q 0 0 V h C d l e R L A z i u J t e y j C m w M R Q w E S 5 K + 5 x c 2 e y W S X B j M U w O J Y t j R f H w N 0 K Q 6 p I 6 f l 3 t 5 L + s x v Q c E V S L a q U 7 9 K 4 R O p 7 c g w d + a 6 0 4 N 9 V 6 3 U p Z d + t 1 y Q x a O H d 7 L 5 Z x K w i x Z H 1 E / e z i 9 O k f x F Z F Q n T A m 3 u Q C x w W + L u z g 6 H x l 1 O P + 8 3 9 q e F 8 k p I y e M F r R A 0 f y k t + f t j R Y 7 5 9 + S Z S I V z 5 g + s V L J + I D C M L l m 1 f b j 9 / V f I s T 9 P V M 2 / h M z / 5 X 8 M x T A 2 7 P 2 r c P 6 q 6 7 h n G G v U / 5 I U / l c g F c 9 n K y H 6 b x Y r G n g H Z p 1 M o q E c N e c c Z R o v M H l F Z t 8 c S Z d c C h h G + M l T m q K h 6 M f i X N t X X B J z A d 3 M o E n o d v 2 x V s k e x s U k b d K E a 3 j + Z 0 C 7 J 3 V M K 4 q u O n e e y A u N K T q q m A q 7 y w S h z s g q 0 8 y G 2 4 o h 9 1 z u k e n b + l I 0 q L 8 A Y O 0 5 g H w 0 O Z G k j t p R W z D 9 W l w D X k j e L T l v a 9 / N 9 x a E K 7 l B 7 O + M w r D y y D G a w x p h n x E x y Z I c y 6 s v h Y h T J 7 7 M Q A l M z R K R f n O F a T s G x l o s C N S L O C 2 1 I s 8 j w 7 g j a e B / g 7 s i 1 m B q c D r 6 l t v d 0 m T D + 4 w S F 4 5 X 1 7 J C c a p W J L m 8 / 0 d L 1 3 6 j O S 6 2 n i m P P 0 4 7 b K f J i Y V U n h p K U A u d B i j c Z + E T d 7 v o o z 3 u P N + D d 3 U m o C c h g 3 3 M z Q R e d M e F 2 K n K L 3 G N p K + F 0 + m w M 2 A w o V F j V C 7 C 9 2 t S 5 h I G V F U 9 C m y L x / D Y 2 C m H j i x h c 8 2 c u u 5 T L b x Z R u c Z L t n G Y p g g G P W C w 0 o v 9 m b E E 6 Q i X + + Q Q x X d P I G O P I N M 3 v m M C 1 k D m 4 Y p h N Z Q 8 x C r d s L O q H C 2 G t D J D K S g d m Y S 4 1 W z z f 6 6 F z m 5 m b d 0 h 1 f Q + u i g r 2 E a z Z v z B 4 0 v c r Z 9 / 7 4 6 R 2 X P G X m K M I 2 G V o r v T / F E 0 L H B A J A v Q r q u s e j t k 7 C p g y 2 t W j S S Z G X 0 F c u 1 F x r 8 o p t S w v k i 9 y W w F J A B l p L B K a j Y X i o q h q j v x x R b Z R x / x q E L e p Q / Q K K d U k 9 Z S 4 1 O + I b x l A 0 s R o S L 8 + Q B r O g k 2 M v A c r A 6 M n m w b 6 M J H u 8 C V F i C h H l d V 3 M r M o 5 j 3 u p 3 q A 2 S X 0 2 n l D R g X c S P I I N
2020-05-22 13:59:02 -04:00
// Check the server certificate fingerprint
function onVerifyServer ( clientName , certs ) {
if ( certs == null ) { certs = clientName ; } // Temporary thing until we fix duktape
2021-04-02 20:20:36 -04:00
// If we have the serverid, used delayed server authentication
2021-05-25 19:35:55 -04:00
if ( settings . serverid != null ) { settings . meshServerTlsHash = certs [ 0 ] . fingerprint . replace ( /:/g , '' ) ; return ; }
2021-04-02 20:20:36 -04:00
// Otherwise, use server HTTPS certificate hash
2020-05-22 13:59:02 -04:00
try { for ( var i in certs ) { if ( certs [ i ] . fingerprint . replace ( /:/g , '' ) == settings . serverhttpshash ) { return ; } } } catch ( e ) { }
if ( settings . serverhttpshash != null ) {
console . log ( 'Error: Failed to verify server certificate.' ) ;
console . log ( 'Server TLS hash: ' + certs [ i ] . fingerprint . replace ( /:/g , '' ) ) ;
exit ( 255 ) ;
throw 'Invalid server certificate' ;
}
}
// Various utility functions
function debug ( level , message ) { if ( ( settings . debuglevel != null ) && ( settings . debuglevel >= level ) ) { console . log ( message ) ; } }
function exit ( status ) { if ( status == null ) { status = 0 ; } try { process . exit ( status ) ; } catch ( e ) { } }
function getInstance ( x , y ) { for ( var i in x ) { if ( x [ i ] [ "InstanceID" ] == y ) return x [ i ] ; } return null ; }
function md5hex ( str ) { return require ( 'MD5Stream' ) . create ( ) . syncHash ( str ) . toString ( 'hex' ) ; }
function guidToStr ( g ) { return g . substring ( 6 , 8 ) + g . substring ( 4 , 6 ) + g . substring ( 2 , 4 ) + g . substring ( 0 , 2 ) + "-" + g . substring ( 10 , 12 ) + g . substring ( 8 , 10 ) + "-" + g . substring ( 14 , 16 ) + g . substring ( 12 , 14 ) + "-" + g . substring ( 16 , 20 ) + "-" + g . substring ( 20 ) ; }
function parceArguments ( argv ) { var r = { } ; for ( var i in argv ) { i = parseInt ( i ) ; if ( argv [ i ] . startsWith ( '--' ) == true ) { var key = argv [ i ] . substring ( 2 ) . toLowerCase ( ) , val = true ; if ( ( ( i + 1 ) < argv . length ) && ( argv [ i + 1 ] . startsWith ( '--' ) == false ) ) { val = argv [ i + 1 ] ; } r [ key ] = val ; } } return r ; }
// Convert an object to string with all functions
function objToString ( x , p , ret ) {
if ( ret == undefined ) ret = '' ;
if ( p == undefined ) p = 0 ;
if ( x == null ) { return '[null]' ; }
if ( p > 8 ) { return '[...]' ; }
if ( x == undefined ) { return '[undefined]' ; }
if ( typeof x == 'string' ) { if ( p == 0 ) return x ; return '"' + ( x . split ( '\0' ) [ 0 ] ) + '"' ; }
if ( typeof x == 'buffer' ) { return '[buffer]' ; }
if ( typeof x != 'object' ) { return x ; }
var r = '{' + ( ret ? '\r\n' : ' ' ) ;
for ( var i in x ) {
if ( i != '_ObjectID' ) { r += ( addPad ( p + 2 , ret ) + i + ': ' + objToString ( x [ i ] , p + 2 , ret ) + ( ret ? '\r\n' : ' ' ) ) ; }
}
return r + addPad ( p , ret ) + '}' ;
}
2021-07-01 16:21:24 -04:00
// Return p number of spaces
2020-05-22 13:59:02 -04:00
function addPad ( p , ret ) { var r = '' ; for ( var i = 0 ; i < p ; i ++ ) { r += ' ' ; } return r ; }
// Parse the incoming arguments
function run ( argv ) {
if ( meshCmdVersion [ 0 ] == '*' ) { meshCmdVersion = '' ; } else { meshCmdVersion = ' v' + meshCmdVersion ; }
var args = parceArguments ( argv ) ;
//console.log(JSON.stringify(argv));
//console.log('addedModules = ' + JSON.stringify(addedModules));
var actionpath = 'meshaction.txt' ;
if ( args . actionfile != null ) { actionpath = args . actionfile ; }
2021-07-14 17:57:26 -04:00
var actions = [ 'HELP' , 'ROUTE' , 'MICROLMS' , 'AMTCONFIG' , 'AMTSCAN' , 'AMTPOWER' , 'AMTFEATURES' , 'AMTNETWORK' , 'AMTINFO' , 'AMTINFOJSON' , 'AMTVERSIONS' , 'AMTHASHES' , 'AMTSAVESTATE' , 'AMTUUID' , 'AMTCCM' , 'AMTDEACTIVATE' , 'AMTACMDEACTIVATE' , 'SMBIOS' , 'RAWSMBIOS' , 'MESHCOMMANDER' , 'AMTAUDITLOG' , 'AMTEVENTLOG' , 'AMTPRESENCE' , 'AMTWIFI' , 'AMTWAKE' , 'AMTSTARTCONFIG' , 'AMTSTOPCONFIG' ] ;
2020-05-22 13:59:02 -04:00
// Load the action file
var actionfile = null ;
try { actionfile = fs . readFileSync ( actionpath ) ; } catch ( e ) { }
if ( ( actionpath != 'meshaction.txt' ) && ( actionfile == null ) ) { console . log ( 'Unable to load \"' + actionpath + '\". Create this file or specify the location using --actionfile [filename].' ) ; exit ( 1 ) ; return ; }
if ( actionfile != null ) { try { settings = JSON . parse ( actionfile ) ; } catch ( e ) { console . log ( actionpath , e ) ; exit ( 1 ) ; return ; } } else { if ( argv . length >= 2 ) { settings = { action : argv [ 1 ] } } }
if ( settings == null ) { settings = { } ; }
var settings2 = { } ; for ( var i in settings ) { settings2 [ i . toLowerCase ( ) ] = settings [ i ] ; } settings = settings2 ;
// Set the arguments
if ( ( typeof args . action ) == 'string' ) { settings . action = args . action ; }
if ( ( typeof args . authcookie ) == 'string' ) { settings . authcookie = args . authcookie ; }
if ( ( typeof args . localport ) == 'string' ) { settings . localport = parseInt ( args . localport ) ; }
if ( ( typeof args . remotenodeid ) == 'string' ) { settings . remotenodeid = args . remotenodeid ; }
if ( ( typeof args . name ) == 'string' ) { settings . name = args . name ; }
2020-10-17 22:23:24 -04:00
if ( ( typeof args . id ) == 'string' ) { settings . id = args . id ; }
2020-05-22 13:59:02 -04:00
if ( ( typeof args . username ) == 'string' ) { settings . username = args . username ; }
if ( ( typeof args . password ) == 'string' ) { settings . password = args . password ; }
if ( ( typeof args . url ) == 'string' ) { settings . url = args . url ; }
if ( ( typeof args . type ) == 'string' ) { settings . type = args . type ; }
if ( ( typeof args . user ) == 'string' ) { settings . username = args . user ; }
if ( ( typeof args . pass ) == 'string' ) { settings . password = args . pass ; }
if ( ( typeof args . host ) == 'string' ) { settings . hostname = args . host ; }
if ( ( typeof args . hostname ) == 'string' ) { settings . hostname = args . hostname ; }
if ( ( typeof args . serverid ) == 'string' ) { settings . serverid = args . serverid ; }
if ( ( typeof args . serverhttpshash ) == 'string' ) { settings . serverhttpshash = args . serverhttpshash ; }
2020-05-22 13:17:53 -04:00
if ( ( typeof args . serverurl ) == 'string' ) { settings . serverurl = args . serverurl ; }
2020-05-22 13:59:02 -04:00
if ( ( typeof args . remoteport ) == 'string' ) { settings . remoteport = parseInt ( args . remoteport ) ; }
if ( ( typeof args . remotetarget ) == 'string' ) { settings . remotetarget = args . remotetarget ; }
if ( ( typeof args . out ) == 'string' ) { settings . output = args . out ; }
if ( ( typeof args . output ) == 'string' ) { settings . output = args . output ; }
if ( ( typeof args . debug ) == 'string' ) { settings . debuglevel = parseInt ( args . debug ) ; }
if ( ( typeof args . debugflags ) == 'string' ) { globalDebugFlags = parseInt ( args . debugflags ) ; }
if ( ( typeof args . script ) == 'string' ) { settings . script = args . script ; }
if ( ( typeof args . agent ) == 'string' ) { settings . agent = args . agent ; }
if ( ( typeof args . proxy ) == 'string' ) { settings . proxy = args . proxy ; }
if ( ( typeof args . floppy ) == 'string' ) { settings . floppy = args . floppy ; }
if ( ( typeof args . cdrom ) == 'string' ) { settings . cdrom = args . cdrom ; }
if ( ( typeof args . tag ) == 'string' ) { settings . tag = args . tag ; }
if ( ( typeof args . scan ) == 'string' ) { settings . scan = args . scan ; }
if ( ( typeof args . token ) == 'string' ) { settings . token = args . token ; }
if ( ( typeof args . timeout ) == 'string' ) { settings . timeout = parseInt ( args . timeout ) ; }
if ( ( typeof args . uuidoutput ) == 'string' || args . uuidoutput ) { settings . uuidoutput = args . uuidoutput ; }
2020-12-10 03:03:00 -05:00
if ( ( typeof args . desc ) == 'string' ) { settings . desc = args . desc ; }
2021-07-14 15:47:28 -04:00
if ( ( typeof args . dnssuffix ) == 'string' ) { settings . dnssuffix = args . dnssuffix ; }
2020-05-22 13:59:02 -04:00
if ( args . emailtoken ) { settings . emailtoken = true ; }
2021-03-24 16:36:23 -04:00
if ( args . smstoken ) { settings . smstoken = true ; }
2020-05-22 13:59:02 -04:00
if ( args . debug === true ) { settings . debuglevel = 1 ; }
if ( args . debug ) { try { waitForDebugger ( ) ; } catch ( e ) { } }
if ( args . noconsole ) { settings . noconsole = true ; }
if ( args . nocommander ) { settings . noconsole = true ; }
if ( args . lmsdebug ) { settings . lmsdebug = true ; }
if ( args . json ) { settings . json = true ; }
if ( args . tls ) { settings . tls = true ; }
if ( ( argv . length > 1 ) && ( actions . indexOf ( argv [ 1 ] . toUpperCase ( ) ) >= 0 ) ) { settings . action = argv [ 1 ] ; }
2021-10-06 16:11:40 -04:00
if ( globalDebugFlags != 0 ) { console . setInfoLevel ( 1 ) ; }
2020-05-22 13:59:02 -04:00
// Validate meshaction.txt
if ( settings . action == null ) {
console . log ( 'MeshCentral Command (MeshCmd) ' + meshCmdVersion ) ;
console . log ( 'No action specified, use MeshCmd like this:\r\n' ) ;
console . log ( ' meshcmd [action] [arguments...]\r\n' ) ;
console . log ( 'Valid MeshCentral actions:' ) ;
console . log ( ' Route - Map a local TCP port to a remote computer.' ) ;
2020-10-17 22:23:24 -04:00
console . log ( ' AmtConfig - Setup Intel AMT on this computer.' ) ;
2020-05-22 13:59:02 -04:00
console . log ( '\r\nValid local actions:' ) ;
console . log ( ' SMBios - Display System Management BIOS tables for this computer.' ) ;
console . log ( ' RawSMBios - Display RAW System Management BIOS tables for this computer.' ) ;
console . log ( ' MicroLMS - Run MicroLMS, allowing local access to Intel AMT.' ) ;
console . log ( ' AmtInfo - Show Intel AMT version and activation state.' ) ;
console . log ( ' AmtVersions - Show all Intel ME version information.' ) ;
console . log ( ' AmtHashes - Show all Intel AMT trusted activation hashes.' ) ;
console . log ( ' AmtCCM - Activate Intel AMT into Client Control Mode.' ) ;
console . log ( ' AmtDeactivate - Deactivate Intel AMT if activated in Client Control mode.' ) ;
console . log ( ' AmtAcmDeactivate - Deactivate Intel AMT if activated in Admin Control mode.' ) ;
console . log ( '\r\nValid local or remote actions:' ) ;
console . log ( ' MeshCommander - Launch a local MeshCommander web server.' ) ;
console . log ( ' AmtUUID - Show Intel AMT unique identifier.' ) ;
console . log ( ' AmtEventLog - Show the Intel AMT event log.' ) ;
console . log ( ' AmtAuditLog - Show the Intel AMT audit log.' ) ;
console . log ( ' AmtSaveState - Save all Intel AMT WSMAN object to file.' ) ;
console . log ( ' AmtPresence - Heartbeat a local Intel AMT watchdog agent.' ) ;
console . log ( ' AmtPower - Perform remote Intel AMT power operation.' ) ;
console . log ( ' AmtIDER - Mount local disk image to remote computer.' ) ;
console . log ( ' AmtFeatures - Intel AMT features & user consent.' ) ;
console . log ( ' AmtNetwork - Intel AMT network interface settings.' ) ;
console . log ( ' AmtScan - Search local network for Intel AMT devices.' ) ;
console . log ( ' AmtWifi - Intel AMT Wifi interface settings.' ) ;
console . log ( ' AmtWake - Intel AMT Wake Alarms.' ) ;
2021-07-07 18:49:18 -04:00
console . log ( ' AmtRPE - Intel AMT Remote Platform Erase.' ) ;
2020-05-22 13:59:02 -04:00
console . log ( '\r\nHelp on a specific action using:\r\n' ) ;
console . log ( ' meshcmd help [action]' ) ;
2021-07-16 21:43:30 -04:00
exit ( 0 ) ; return ;
2020-05-22 13:59:02 -04:00
}
if ( settings . action == 'help' ) {
if ( argv . length <= 2 ) {
actions . shift ( ) ;
console . log ( 'Help usage:\r\n\r\n MeshCmd help [action]\r\n\r\nValid actions are: ' + actions . join ( ', ' ) + '.' ) ;
2021-07-16 21:43:30 -04:00
exit ( 0 ) ; return ;
2020-05-22 13:59:02 -04:00
}
var action = argv [ 2 ] . toLowerCase ( ) ;
if ( action == 'route' ) {
console . log ( "The route action is used along with a MeshCentral account to map a local TCP port to a remote port on any computer on your MeshCentral account. This action requires many arguments, to avoid specifying them all it's best to download the meshaction.txt file from the web site and place it in the current folder. Example usage:\r\n\r\n (Place meshaction.txt file in current folder)\r\n meshcmd route --pass myAccountPassword" ) ;
} else if ( action == 'smbios' ) {
console . log ( "SMBios action will display this computer's system management BIOS information. Example usage:\r\n\r\n meshcmd smbios --out smbios.txt\r\n" ) ;
console . log ( '\r\Optional arguments:\r\n' ) ;
console . log ( ' --output [filename] Optional filename to write the results to.' ) ;
} else if ( action == 'rawsmbios' ) {
console . log ( "RawSMBios action will display this computer's system management BIOS information in raw hexdecimal form. Example usage:\r\n\r\n meshcmd rawsmbios --out smbios.txt\r\n" ) ;
console . log ( '\r\Optional arguments:\r\n' ) ;
console . log ( ' --output [filename] Optional filename to write the results to.' ) ;
} else if ( action == 'amtinfo' ) {
console . log ( 'AmtInfo action will get the version and activation state of Intel AMT on this computer. The command must be run on a computer with Intel AMT, must run as administrator and the Intel management driver must be installed. Example usage:\r\n\r\n meshcmd amtinfo' ) ;
2021-07-14 17:57:26 -04:00
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --json Display all Intel AMT state in JSON format.' ) ;
2021-07-19 18:42:29 -04:00
} else if ( action == 'amtinfojson' ) {
console . log ( 'AmtInfoJson action get Intel AMT information about the computer and display it or send it to a server using HTTP. Example usage:\r\n\r\n meshcmd amtinfojson --post https://example.com/capture' ) ;
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --post [url] Perform an HTTP POST of the data to the given URL.' ) ;
2020-05-22 13:59:02 -04:00
} else if ( ( action == 'amtversion' ) || ( action == 'amtversions' ) ) {
console . log ( 'AmtVersions will display all version information about Intel AMT on this computer. The command must be run on a computer with Intel AMT, must run as administrator and the Intel management driver must be installed. Example usage:\r\n\r\n meshcmd amtversions' ) ;
2021-07-14 17:57:26 -04:00
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --json Display all Intel AMT state in JSON format.' ) ;
2020-05-22 13:59:02 -04:00
} else if ( action == 'amthashes' ) {
console . log ( 'Amthashes will display all trusted activations hashes for Intel AMT on this computer. The command must be run on a computer with Intel AMT, must run as administrator and the Intel management driver must be installed. These certificates hashes are used by Intel AMT when performing activation into ACM mode. Example usage:\r\n\r\n meshcmd amthashes' ) ;
2021-07-16 21:43:30 -04:00
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --json Display all Intel AMT hashes in JSON format.' ) ;
2020-05-22 13:59:02 -04:00
} else if ( ( action == 'microlms' ) || ( action == 'lms' ) || ( action == 'amtlms' ) ) {
console . log ( 'Starts MicroLMS on this computer, allowing local access to Intel AMT on TCP ports 16992 and 16993 when applicable. The command must be run on a computer with Intel AMT, must run as administrator and the Intel management driver must be installed. These certificates hashes are used by Intel AMT when performing activation into ACM mode. Example usage:\r\n\r\n meshcmd microlms' ) ;
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --noconsole MeshCommander for LMS will no be available on port 16994.' ) ;
console . log ( '\r\nRun as a background service:\r\n' ) ;
console . log ( ' microlms install/uninstall/start/stop.' ) ;
} else if ( action == 'amtccm' ) {
console . log ( 'AmtCCM will attempt to activate Intel AMT on this computer into client control mode (CCM). The command must be run on a computer with Intel AMT, must run as administrator and the Intel management driver must be installed. Intel AMT must be in "pre-provisioning" state for this command to work and a administrator password must be provided.' ) ;
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --password [password] Admin password used to activate Intel AMT.' ) ;
2020-10-17 22:23:24 -04:00
} else if ( action == 'amtconfig' ) {
console . log ( 'AmtConfig will attempt to activate and configure Intel AMT on this computer. The command must be run on a computer with Intel AMT, must run as administrator and the Intel management driver must be installed. Example usage:\r\n\r\n meshcmd amtconfig --url [url]' ) ;
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --url [wss://server] The address of the MeshCentral server.' ) ;
console . log ( ' --id [groupid] The device group identifier.' ) ;
console . log ( ' --serverhttpshash [hash] Optional TLS server certificate hash.' ) ;
2020-12-10 03:03:00 -05:00
console . log ( ' --user [username] The Intel AMT admin username, admin is default.' ) ;
console . log ( ' --pass [password] The Intel AMT admin password.' ) ;
console . log ( ' --desc [description] Description of the device, used when first added to server.' ) ;
2021-07-14 15:47:28 -04:00
console . log ( ' --dnssuffix [dns] Override the trusted DNS suffix sent to the server.' ) ;
2020-05-22 13:59:02 -04:00
} else if ( action == 'amtdeactivate' ) {
console . log ( 'AmtDeactivate will attempt to deactivate Intel AMT on this computer when in client control mode (CCM). The command must be run on a computer with Intel AMT, must run as administrator and the Intel management driver must be installed. Intel AMT must be activated in client control mode for this command to work. Example usage:\r\n\r\n meshcmd amtdeactivate' ) ;
} else if ( action == 'amtacmdeactivate' ) {
console . log ( 'AmtACMDeactivate will attempt to deactivate Intel AMT on this computer when in admin control mode (ACM). The command must be run on a computer with Intel AMT, must run as administrator and the Intel management driver must be installed. Intel AMT must be activated in admin control mode for this command to work. Example usage:\r\n\r\n meshcmd amtacmdeactivate' ) ;
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( ' --type [partial/full] Specifies to perform partial or full unprovision.' ) ;
} else if ( action == 'amtuuid' ) {
console . log ( 'AmtUUID action will get the unique identifier of the local or remote Intel AMT computer. By default, the local UUID is obtained unless a host is specified. Intel AMT must be activated for this command to work. Example usage:\r\n\r\n meshcmd amtuuid --host 1.2.3.4 --user admin --pass mypassword --tls' ) ;
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --host [hostname] The IP address or DNS name of Intel AMT, 127.0.0.1 is default.' ) ;
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( ' --tls Specifies that TLS must be used.' ) ;
} else if ( action == 'amtsavestate' ) {
console . log ( 'AmtSaveState action will fetch all the entire state of Intel AMT and save it as a JSON file. This action will take multiple minutes to perform. The command will fetch the local computer state unless host is specified. Intel AMT must be ativated for this command to work. Example usage:\r\n\r\n meshcmd amtsavestate --host 1.2.3.4 --user admin --pass mypassword --tls --output state.json' ) ;
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --output [filename] The output file for the Intel AMT state in JSON format.' ) ;
console . log ( ' --host [hostname] The IP address or DNS name of Intel AMT, 127.0.0.1 is default.' ) ;
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( ' --tls Specifies that TLS must be used.' ) ;
} else if ( action == 'amtpresence' ) {
console . log ( 'AmtPresence will heartbeat a local Intel AMT watchdog agent. Example usage:\r\n\r\n meshcmd amtpresence --agent B4B6A24C-255E-A75C-F5E8-B00B4D946AA7' ) ;
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( ' --agent [uuid] The unique identifier of the watchdog agent.' ) ;
} else if ( action == 'amtpower' ) {
console . log ( 'AmtPower will get current pwoer state or send a reboot command to a remote Intel AMT device. Example usage:\r\n\r\n meshcmd amtpower --reset --host 1.2.3.4 --user admin --pass mypassword --tls' ) ;
console . log ( '\r\nRequired arguments:\r\n' ) ;
console . log ( ' --host [hostname] The IP address or DNS name of Intel AMT.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( '\r\nOptional arguments:\r\n' ) ;
console . log ( ' --reset, --poweron, --poweroff, --powercycle, --sleep, --hibernate' ) ;
2021-03-24 20:19:51 -04:00
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --tls Specifies that TLS must be used.' ) ;
console . log ( ' --bootdevice [pxe|hdd|cd] Specifies the boot device to use after reset, poweron or powercycle.' ) ;
console . log ( ' --bootindex [number] Specifies the index of boot device to use.' ) ;
2020-05-22 13:59:02 -04:00
} else if ( action == 'amtnetwork' ) {
console . log ( 'AmtNetwork is used to get/set Intel AMT network interface configuration. Example usage:\r\n\r\n meshcmd amtnetwork --host 1.2.3.4 --user admin --pass mypassword --dhcp' ) ;
console . log ( '\r\nRequired arguments:\r\n' ) ;
console . log ( ' --host [hostname] The IP address or DNS name of Intel AMT, 127.0.0.1 is default.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( '\r\nOptional arguments:\r\n' ) ;
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --tls Specifies that TLS must be used.' ) ;
console . log ( ' --ipsync [0 or 1] Change the wired IPSync setting on Intel AMT 7+' ) ;
console . log ( ' --dhcp Change IPv4 wired interface to DHCP mode' ) ;
console . log ( ' --static Change IPv4 wired interface to static IP mode' ) ;
console . log ( ' --ip [1.2.3.4] Static IPv4 address (required)' ) ;
console . log ( ' --subnet [1.2.3.4] Static IPv4 subnet mask' ) ;
console . log ( ' --gateway [1.2.3.4] Static IPv4 default gateway' ) ;
console . log ( ' --dns [1.2.3.4] Primary DNS IPv4 address' ) ;
console . log ( ' --dns2 [1.2.3.4] Secondary DNS IPv4 address' ) ;
} else if ( action == 'amtfeatures' ) {
console . log ( 'AmtFeatures is used to get/set Intel AMT feature configuration. Example usage:\r\n\r\n meshcmd amtfeatures --host 1.2.3.4 --user admin --pass mypassword --tls --redir 1' ) ;
console . log ( '\r\nRequired arguments:\r\n' ) ;
console . log ( ' --host [hostname] The IP address or DNS name of Intel AMT, 127.0.0.1 is default.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( '\r\nOptional arguments:\r\n' ) ;
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --tls Specifies that TLS must be used.' ) ;
console . log ( ' --consent [none/kvm/all] Set Intel AMT user consent feature.' ) ;
console . log ( ' --redir [0/1] Set Intel AMT redirection port feature.' ) ;
console . log ( ' --kvm [0/1] Set Intel AMT KVM feature.' ) ;
console . log ( ' --sol [0/1] Set Intel AMT Serial-over-LAN feature.' ) ;
console . log ( ' --ider [0/1] Set Intel AMT IDE redirection feature.' ) ;
} else if ( action == 'meshcommander' ) {
console . log ( 'This action launched a local web server that hosts MeshCommander, a Intel AMT management console.' ) ;
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --localport [port] Local port used for the web server, 3000 is default.' ) ;
console . log ( '\r\nRun as a background service:\r\n' ) ;
console . log ( ' meshcommander install/uninstall/start/stop.' ) ;
} else if ( action == 'amteventlog' ) {
console . log ( 'AmtEventLog action will fetch the local or remote event log. Example usage:\r\n\r\n meshcmd amteventlog --host 1.2.3.4 --user admin --pass mypassword --tls --output events.txt' ) ;
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --output [filename] The output file for the Intel AMT event log.' ) ;
console . log ( ' --host [hostname] The IP address or DNS name of Intel AMT, 127.0.0.1 is default.' ) ;
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( ' --tls Specifies that TLS must be used.' ) ;
console . log ( ' --uuidoutput Output with unique identifier as the filename.' ) ;
console . log ( ' --json Output as a JSON format.' ) ;
} else if ( action == 'amtauditlog' ) {
console . log ( 'AmtAuditLog action will fetch the local or remote audit log. If used localy, no username/password is required. Example usage:\r\n\r\n meshcmd amtauditlog --host 1.2.3.4 --user admin --pass mypassword --tls --output audit.json' ) ;
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --output [filename] The output file for the Intel AMT audit log.' ) ;
console . log ( ' --host [hostname] The IP address or DNS name of Intel AMT, 127.0.0.1 is default.' ) ;
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( ' --tls Specifies that TLS must be used.' ) ;
console . log ( ' --uuidoutput Output with unique identifier as the filename.' ) ;
console . log ( ' --json Output as a JSON format.' ) ;
} else if ( action == 'amtider' ) {
console . log ( 'AmtIDER will mount a local disk images to a remote Intel AMT computer. Example usage:\r\n\r\n meshcmd amtider --host 1.2.3.4 --user admin --pass mypassword --tls --floppy disk.img --cdrom disk.iso' ) ;
console . log ( '\r\nPossible arguments:\r\n' ) ;
console . log ( ' --host [hostname] The IP address or DNS name of Intel AMT.' ) ;
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( ' --tls Specifies that TLS must be used.' ) ;
console . log ( ' --floppy [file] Specifies .img file to be mounted as a flppy disk.' ) ;
console . log ( ' --cdrom [file] Specifies .img file to be mounted as a CDROM disk.' ) ;
console . log ( ' --timeout [seconds] Optional, disconnect after number of seconds without disk read.' ) ;
} else if ( action == 'amtscan' ) {
console . log ( 'AmtSCAN will look for Intel AMT device on the network. Example usage:\r\n\r\n meshcmd amtscan --scan 192.168.1.0/24' ) ;
console . log ( '\r\Required arguments:\r\n' ) ;
console . log ( ' --scan [ip range] The IP address range to perform the scan on.' ) ;
} else if ( action == 'amtwifi' ) {
console . log ( 'AmtWifi is used to get/set Intel AMT Wifi configuration. Example usage:\r\n\r\n meshcmd amtwifi --host 1.2.3.4 --user admin --pass mypassword --list' ) ;
console . log ( '\r\nRequired arguments:\r\n' ) ;
console . log ( ' --host [hostname] The IP address or DNS name of Intel AMT, 127.0.0.1 is default.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( ' --[action] Action options are list, add, del.' ) ;
console . log ( '\r\nOptional arguments:\r\n' ) ;
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --tls Specifies that TLS must be used.' ) ;
console . log ( ' --list List Wifi profiles' ) ;
console . log ( ' --add Add new Wifi profile' ) ;
console . log ( ' --name New Wifi profile name' ) ;
console . log ( ' --priority Priority of this profile - default 0' ) ;
console . log ( ' --ssid Wifi SSID' ) ;
console . log ( ' --auth Wifi Authentication method (4 - WPA, 6 - WPA2/RSN) - default 6' ) ;
console . log ( ' --enc Wifi Encryption type (3 - TKIP, 4 - CCMP) - default 3' ) ;
console . log ( ' --psk Wifi password/pre-shared key' ) ;
2020-10-29 15:59:55 -04:00
console . log ( ' --del [profile-name] Delete new Wifi profile' ) ;
2020-05-22 13:59:02 -04:00
} else if ( action == 'amtwake' ) {
console . log ( 'AmtWake is used to view/set/remote Intel AMT Wake Alarms. Example usage:\r\n\r\n meshcmd amtwake --host 1.2.3.4 --user admin --pass mypassword --list' ) ;
console . log ( '\r\nRequired arguments:\r\n' ) ;
console . log ( ' --host [hostname] The IP address or DNS name of Intel AMT, 127.0.0.1 is default.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( ' --[action] Action options are list, add, del.' ) ;
console . log ( '\r\nOptional arguments:\r\n' ) ;
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --tls Specifies that TLS must be used.' ) ;
console . log ( ' --list List wake alarms profile' ) ;
console . log ( ' --add [alarm-name] Add new wake alarm' ) ;
console . log ( ' --date [yyyy-mm-dd] Alarm date in year-month-day format' ) ;
console . log ( ' --time (hh:mm:ss) Optional alarm time in hours:minutes:seconds format, default is 00:00:00.' ) ;
console . log ( ' --interval (dd-hh-mm) Optional alarm interval in days-hours-minutes format, default is alarm once.' ) ;
console . log ( ' --deletewhendone Indicates alarm is removed once triggered, default is to no remove.' ) ;
console . log ( ' --del [alarm-name] Remove a wake alarm' ) ;
2021-07-07 18:49:18 -04:00
} else if ( action == 'amtrpe' ) {
console . log ( 'AmtRPE is used to erase some elements of a remote Intel AMT platform. Example usage:\r\n\r\n meshcmd amtrpe --host 1.2.3.4 --user admin --pass mypassword' ) ;
console . log ( '\r\nRequired arguments:\r\n' ) ;
console . log ( ' --host [hostname] The IP address or DNS name of Intel AMT, 127.0.0.1 is default.' ) ;
console . log ( ' --pass [password] The Intel AMT login password.' ) ;
console . log ( '\r\nOptional arguments:\r\n' ) ;
console . log ( ' --user [username] The Intel AMT login username, admin is default.' ) ;
console . log ( ' --tls Specifies that TLS must be used.' ) ;
console . log ( ' --reset / --poweron Power action to perform on Intel AMT device.' ) ;
console . log ( ' --pyrite [PSID] Perform pyrite revert.' ) ;
console . log ( ' --ssd [Password] Perform secure erase all SSDs.' ) ;
console . log ( ' --tpm Perform TPM Clear.' ) ;
console . log ( ' --nvm Perform clear BIOS NVM variables.' ) ;
console . log ( ' --bios Perform BIOS reload of golden configuration.' ) ;
console . log ( ' --csme Perform CSME unconfigure.' ) ;
2020-05-22 13:59:02 -04:00
} else {
actions . shift ( ) ;
console . log ( 'Invalid action, usage:\r\n\r\n meshcmd help [action]\r\n\r\nValid actions are: ' + actions . join ( ', ' ) + '.' ) ;
}
2021-07-16 21:43:30 -04:00
exit ( 0 ) ; return ;
2020-05-22 13:59:02 -04:00
}
settings . action = settings . action . toLowerCase ( ) ;
debug ( 1 , "Settings: " + JSON . stringify ( settings ) ) ;
// Setup the proxy if needed
if ( ( typeof settings . proxy ) == 'string' ) {
var proxy = settings . proxy . split ( ':' ) , proxyport = ( proxy . length == 2 ) ? parseInt ( proxy [ 1 ] ) : 0 ;
if ( ( proxy . length != 2 ) || ( proxy [ 0 ] . length < 1 ) || ( proxyport < 1 ) || ( proxyport > 65535 ) ) { console . log ( 'Invalid \"proxy\" specified, use --proxy [hostname]:[port].' ) ; exit ( 1 ) ; return ; }
try { require ( 'global-tunnel' ) . initialize ( { host : proxy [ 0 ] , port : proxyport } ) ; } catch ( ex ) { console . log ( ex ) ; exit ( 1 ) ; return ; }
console . log ( 'Proxy set to ' + proxy [ 0 ] + ':' + proxyport ) ;
}
2021-03-16 16:56:14 -04:00
if ( settings . action == 'amtstartconfig' ) {
// Start Intel AMT configuration
var amtMeiModule , amtMei ;
try { amtMeiModule = require ( 'amt-mei' ) ; amtMei = new amtMeiModule ( ) ; } catch ( ex ) { console . log ( ex ) ; exit ( 1 ) ; return ; }
amtMei . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + e ) ; exit ( 1 ) ; return ; } ) ;
amtMei . startConfiguration ( function ( state ) {
if ( state == 3 ) { console . log ( "Intel AMT is not in correct mode." ) ; }
else if ( state == 1 ) { console . log ( "Intel AMT internal error." ) ; }
else if ( state == 48 ) { console . log ( "Random generator not ready." ) ; }
else if ( state == 49 ) { console . log ( "Certificate not ready." ) ; }
else if ( state == 0 ) { console . log ( "Success." ) ; }
else { console . log ( "Unknown status: " + state ) ; }
2021-07-16 21:43:30 -04:00
exit ( state ) ;
2021-03-16 16:56:14 -04:00
} ) ;
} else if ( settings . action == 'amtstopconfig' ) {
2021-03-04 19:27:43 -05:00
// Stop Intel AMT configuration
var amtMeiModule , amtMei ;
try { amtMeiModule = require ( 'amt-mei' ) ; amtMei = new amtMeiModule ( ) ; } catch ( ex ) { console . log ( ex ) ; exit ( 1 ) ; return ; }
amtMei . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + e ) ; exit ( 1 ) ; return ; } ) ;
amtMei . stopConfiguration ( function ( state ) {
if ( state == 3 ) { console . log ( "Intel AMT is not in in-provisionning mode." ) ; }
else if ( state == 1 ) { console . log ( "Intel AMT internal error." ) ; }
else if ( state == 0 ) { console . log ( "Success." ) ; }
2021-03-16 16:56:14 -04:00
else { console . log ( "Unknown status: " + state ) ; }
2021-07-16 21:43:30 -04:00
exit ( state ) ;
2021-03-04 19:27:43 -05:00
} ) ;
} else if ( settings . action == 'smbios' ) {
2020-05-22 13:59:02 -04:00
// Display SM BIOS tables in raw form
SMBiosTables = require ( 'smbios' ) ;
SMBiosTables . get ( function ( data ) {
var r = SMBiosTables . parse ( data ) ;
2021-07-16 21:43:30 -04:00
var out = JSON . stringify ( r , null , 2 ) ;
2020-05-22 13:59:02 -04:00
if ( settings . output == null ) { console . log ( out ) ; } else { var file = fs . openSync ( settings . output , 'w' ) ; fs . writeSync ( file , Buffer . from ( out , 'utf8' ) ) ; fs . closeSync ( file ) ; }
2021-07-16 21:43:30 -04:00
exit ( 0 ) ;
2020-05-22 13:59:02 -04:00
} ) ;
} else if ( settings . action == 'rawsmbios' ) {
// Display SM BIOS tables in raw form
SMBiosTables = require ( 'smbios' ) ;
SMBiosTables . get ( function ( data ) {
var out = '' ;
for ( var i in data ) { var header = false ; for ( var j in data [ i ] ) { if ( data [ i ] [ j ] . length > 0 ) { if ( header == false ) { out += ( 'Table type #' + i + ( ( SMBiosTables . smTableTypes [ i ] == null ) ? '' : ( ', ' + SMBiosTables . smTableTypes [ i ] ) ) ) + '\r\n' ; header = true ; } out += ( ' ' + data [ i ] [ j ] . toString ( 'hex' ) ) + '\r\n' ; } } }
if ( settings . output == null ) { console . log ( out ) ; } else { var file = fs . openSync ( settings . output , 'w' ) ; fs . writeSync ( file , Buffer . from ( out , 'utf8' ) ) ; fs . closeSync ( file ) ; }
2021-07-16 21:43:30 -04:00
exit ( 0 ) ;
2020-05-22 13:59:02 -04:00
} ) ;
} else if ( settings . action == 'route' ) {
// MeshCentral Router, port map local TCP port to a remote computer
if ( ( settings . localport == null ) || ( typeof settings . localport != 'number' ) || ( settings . localport < 0 ) || ( settings . localport > 65535 ) ) { console . log ( 'No or invalid \"localPort\" specified, use --localport [localport].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . remotenodeid == null ) || ( typeof settings . remotenodeid != 'string' ) ) { console . log ( 'No or invalid \"remoteNodeId\" specified.' ) ; exit ( 1 ) ; return ; }
if ( ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) && ( settings . authcookie == null || typeof settings . authcookie != 'string' || settings . authcookie == '' ) ) { console . log ( 'No or invalid \"username\" specified, use --username [username].' ) ; exit ( 1 ) ; return ; }
if ( ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) && ( settings . authcookie == null || typeof settings . authcookie != 'string' || settings . authcookie == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
2021-04-02 20:37:36 -04:00
if ( settings . serverid != null ) {
if ( ( typeof settings . serverid != 'string' ) || ( settings . serverid . length != 96 ) ) { console . log ( 'No or invalid \"serverId\" specified.' ) ; exit ( 1 ) ; return ; }
} else {
if ( ( settings . serverhttpshash == null ) || ( typeof settings . serverhttpshash != 'string' ) || ( settings . serverhttpshash . length != 96 ) ) { console . log ( 'No or invalid \"serverHttpsHash\" or \"serverId\" specified.' ) ; exit ( 1 ) ; return ; }
}
2020-05-22 13:59:02 -04:00
if ( ( settings . remoteport == null ) || ( typeof settings . remoteport != 'number' ) || ( settings . remoteport < 0 ) || ( settings . remoteport > 65535 ) ) { console . log ( 'No or invalid \"remotePort\" specified, use --remoteport [remoteport].' ) ; exit ( 1 ) ; return ; }
if ( settings . serverurl != null ) { startRouter ( ) ; } else { discoverMeshServer ( ) ; } // Start MeshCentral Router
} else if ( ( settings . action == 'amtversion' ) || ( settings . action == 'amtversions' ) || ( settings . action == 'amtver' ) ) {
// Display Intel ME versions
var amtMeiModule , amtMei ;
try { amtMeiModule = require ( 'amt-mei' ) ; amtMei = new amtMeiModule ( ) ; } catch ( ex ) { console . log ( ex ) ; exit ( 1 ) ; return ; }
amtMei . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + e ) ; exit ( 1 ) ; return ; } ) ;
amtMei . getVersion ( function ( val ) {
2021-07-14 17:57:26 -04:00
if ( args . json ) {
console . log ( JSON . stringify ( val , null , 2 ) ) ;
} else {
console . log ( "BIOS Version = " + val . BiosVersion . toString ( ) ) ;
for ( var version in val . Versions ) {
var extras = '' , skuBits = [ '' , 'iQST' , 'ASF' , 'AMT' , 'ISM' , 'TPM' , '' , '' , 'HomeIT' , '' , 'WOX' , '' , '' , 'AT-p' , 'Corporate' , 'L3 Mgt Upgrade' ] ;
if ( val . Versions [ version ] . Description == 'Sku' ) {
var n = parseInt ( val . Versions [ version ] . Version ) , x = [ ] , xx = 1 ;
for ( var i = 0 ; i < skuBits . length ; i ++ ) { if ( ( n & xx ) != 0 ) { x . push ( skuBits [ i ] ) ; } xx = xx << 1 ; }
if ( x . length > 0 ) { extras = ' (' + x . join ( ', ' ) + ')' }
}
console . log ( val . Versions [ version ] . Description + " = " + val . Versions [ version ] . Version + extras ) ;
2020-05-22 13:59:02 -04:00
}
}
2021-07-16 21:43:30 -04:00
exit ( 0 ) ;
return ;
2020-05-22 13:59:02 -04:00
} ) ;
} else if ( settings . action == 'amthashes' ) {
// Display Intel AMT list of trusted hashes
2021-07-16 21:43:30 -04:00
var amtMeiModule , amtMei , amtHashes = [ ] ;
2020-05-22 13:59:02 -04:00
try { amtMeiModule = require ( 'amt-mei' ) ; amtMei = new amtMeiModule ( ) ; } catch ( ex ) { console . log ( ex ) ; exit ( 1 ) ; return ; }
amtMei . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + e ) ; exit ( 1 ) ; return ; } ) ;
amtMei . getHashHandles ( function ( handles ) {
exitOnCount = handles . length ;
for ( var i = 0 ; i < handles . length ; ++ i ) {
this . getCertHashEntry ( handles [ i ] , function ( result ) {
2020-11-24 22:56:59 -05:00
var certState = [ ] ;
if ( result . isDefault ) { certState . push ( 'Default' ) ; }
if ( result . isActive ) { certState . push ( 'Active' ) ; } else { certState . push ( 'Disabled' ) ; }
2021-07-16 21:43:30 -04:00
amtHashes . push ( result ) ;
if ( ! args . json ) { console . log ( result . name + ', (' + certState . join ( ', ' ) + ')\r\n ' + result . hashAlgorithmStr + ': ' + result . certificateHash ) ; }
if ( -- exitOnCount == 0 ) { if ( args . json ) { console . log ( JSON . stringify ( amtHashes , null , 2 ) ) ; } exit ( 0 ) ; }
2020-05-22 13:59:02 -04:00
} ) ;
}
} ) ;
} else if ( settings . action == 'netinfo' ) {
// Display network information
var interfaces = require ( 'os' ) . networkInterfaces ( ) ;
console . log ( JSON . stringify ( interfaces , 2 , ' ' ) ) ;
exit ( 0 ) ; return ;
} else if ( settings . action == 'amtinfo' ) {
// Display Intel AMT version and activation state
mestate = { } ;
var amtMeiModule , amtMei ;
try { amtMeiModule = require ( 'amt-mei' ) ; amtMei = new amtMeiModule ( ) ; } catch ( ex ) { console . log ( ex ) ; exit ( 1 ) ; return ; }
amtMei . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + e ) ; exit ( 1 ) ; return ; } ) ;
2020-10-20 21:14:00 -04:00
try {
amtMei . getVersion ( function ( result ) {
if ( result ) {
for ( var version in result . Versions ) {
if ( result . Versions [ version ] . Description == 'AMT' ) { mestate . ver = result . Versions [ version ] . Version ; }
if ( result . Versions [ version ] . Description == 'Sku' ) { mestate . sku = parseInt ( result . Versions [ version ] . Version ) ; }
}
2021-07-01 16:21:24 -04:00
amtMei . getProvisioningState ( function ( result ) { if ( result ) { mestate . ProvisioningState = result ; } } ) ;
amtMei . getProvisioningMode ( function ( result ) { if ( result ) { mestate . ProvisioningMode = result ; } } ) ;
2021-07-14 17:57:26 -04:00
amtMei . getEHBCState ( function ( result ) { mestate . ehbc = ( ( result === true ) || ( typeof result == 'object' ) && ( result . EHBC === true ) ) ; } ) ;
2021-07-01 16:21:24 -04:00
amtMei . getControlMode ( function ( result ) { if ( result ) { mestate . controlmode = result ; } } ) ;
amtMei . getMACAddresses ( function ( result ) { if ( result ) { mestate . mac = result ; } } ) ;
amtMei . getLanInterfaceSettings ( 0 , function ( result ) { if ( result ) { mestate . net0 = result ; } } ) ;
amtMei . getLanInterfaceSettings ( 1 , function ( result ) { if ( result ) { mestate . net1 = result ; } } ) ;
amtMei . getUuid ( function ( result ) { if ( ( result != null ) && ( result . uuid != null ) ) { mestate . uuid = result . uuid ; } } ) ;
amtMei . getRemoteAccessConnectionStatus ( function ( result ) { if ( ( result != null ) && ( result . status == 0 ) ) { mestate . networkStatus = result . networkStatus ; mestate . remoteAccessStatus = result . remoteAccessStatus ; mestate . remoteAccessTrigger = result . remoteAccessTrigger ; mestate . mpsHostname = result . mpsHostname ; } } ) ;
amtMei . getDnsSuffix ( function ( result ) {
2021-07-14 15:47:28 -04:00
if ( result ) { mestate . DnsSuffix = result ; }
2021-07-24 13:12:21 -04:00
getAmtOsDnsSuffix ( mestate , function ( ) {
if ( args . json ) {
console . log ( JSON . stringify ( mestate , null , 2 ) ) ;
} else if ( mestate . ver && mestate . ProvisioningState && mestate . ProvisioningMode ) {
var str = 'Intel ME v' + mestate . ver ;
if ( mestate . sku & 8 ) { str = 'Intel AMT v' + mestate . ver }
else if ( mestate . sku & 16 ) { str = 'Intel SM v' + mestate . ver }
if ( mestate . ProvisioningState . stateStr == 'PRE' ) { str += ', pre-provisioning state' ; }
else if ( mestate . ProvisioningState . stateStr == 'IN' ) { str += ', in-provisioning state' ; }
else if ( mestate . ProvisioningState . stateStr == 'POST' ) {
if ( mestate . ProvisioningMode ) {
if ( mestate . controlmode ) {
if ( mestate . ProvisioningMode . modeStr == 'ENTERPRISE' ) { str += ', activated in ' + [ "none" , "Client Control Mode (CCM)" , "Admin Control Mode (ACM)" , "remote assistance mode" ] [ mestate . controlmode . controlMode ] ; } else { str += ', activated in ' + mestate . ProvisioningMode . modeStr ; }
} else {
str += ', activated in ' + mestate . ProvisioningMode . modeStr ;
}
2021-07-01 16:21:24 -04:00
}
}
2021-07-24 13:12:21 -04:00
if ( mestate . ehbc ) { str += ', EHBC enabled' ; }
str += '.' ;
if ( mestate . net0 != null ) { str += '\r\nWired ' + ( ( mestate . net0 . enabled == 1 ) ? 'Enabled' : 'Disabled' ) + ( ( mestate . net0 . dhcpEnabled == 1 ) ? ', DHCP' : ', Static' ) + ', ' + mestate . net0 . mac + ( mestate . net0 . address == '0.0.0.0' ? '' : ( ', ' + mestate . net0 . address ) ) ; }
if ( mestate . net1 != null ) { str += '\r\nWireless ' + ( ( mestate . net1 . enabled == 1 ) ? 'Enabled' : 'Disabled' ) + ( ( mestate . net1 . dhcpEnabled == 1 ) ? ', DHCP' : ', Static' ) + ', ' + mestate . net1 . mac + ( mestate . net1 . address == '0.0.0.0' ? '' : ( ', ' + mestate . net1 . address ) ) ; }
if ( ( mestate . net0 != null ) && ( mestate . net0 . enabled == 1 ) ) {
if ( mestate . DnsSuffix != null ) {
// Intel AMT has a trusted DNS suffix set, use that one.
str += '\r\nTrusted DNS suffix: ' + mestate . DnsSuffix ;
} else if ( mestate . OsDnsSuffix != null ) {
// Already found the DNS suffix for the wired interface
str += '\r\nDNS suffix: ' + mestate . OsDnsSuffix ;
} else {
// Look for the DNS suffix for the Intel AMT Ethernet interface
var fqdn = null , interfaces = require ( 'os' ) . networkInterfaces ( ) ;
for ( var i in interfaces ) {
for ( var j in interfaces [ i ] ) {
if ( ( interfaces [ i ] [ j ] . mac == mestate . net0 . mac ) && ( interfaces [ i ] [ j ] . fqdn != null ) && ( interfaces [ i ] [ j ] . fqdn != '' ) ) { fqdn = interfaces [ i ] [ j ] . fqdn ; }
}
2021-07-01 16:21:24 -04:00
}
2021-07-24 13:12:21 -04:00
if ( fqdn != null ) { str += '\r\nDNS suffix: ' + fqdn ; }
2021-07-01 16:21:24 -04:00
}
2020-10-20 21:14:00 -04:00
}
2021-07-24 13:12:21 -04:00
if ( typeof mestate . networkStatus == 'number' ) {
str += '\r\nConnection Status: ' + [ 'Direct' , 'VPN' , 'Outside' , 'Unknown' ] [ mestate . networkStatus ] ;
str += ', CIRA: ' + [ 'Disconnected' , 'Connecting' , 'Connected' ] [ mestate . remoteAccessStatus ] ;
if ( ( mestate . remoteAccessStatus > 0 ) && ( mestate . mpsHostname != null ) && ( mestate . mpsHostname . length > 0 ) ) {
str += ' to ' + mestate . mpsHostname + ', ' + [ 'User initiated' , 'Alert' , 'Periodic' , 'Provisioning' ] [ mestate . remoteAccessTrigger ] ;
}
2021-07-01 16:21:24 -04:00
}
2021-07-24 13:12:21 -04:00
console . log ( str + '.' ) ;
exit ( 0 ) ;
} else {
console . log ( 'Intel(R) AMT not supported.' ) ;
exit ( 1 ) ;
2021-07-01 16:21:24 -04:00
}
2021-07-24 13:12:21 -04:00
} ) ;
2021-07-01 16:21:24 -04:00
} ) ;
2020-10-20 21:14:00 -04:00
} else {
2021-07-01 16:21:24 -04:00
console . log ( "Unable to perform MEI operations, try running as " + ( ( process . platform == 'win32' ) ? "administrator." : "root." ) ) ;
exit ( 1 ) ; return ;
2020-05-22 13:59:02 -04:00
}
2020-10-20 21:14:00 -04:00
} ) ;
2021-07-01 16:21:24 -04:00
} catch ( ex ) { console . log ( "Unable to perform MEI operations, try running as " + ( ( process . platform == 'win32' ) ? "administrator." : "root." ) ) ; exit ( 1 ) ; return ; }
2021-07-14 17:57:26 -04:00
} else if ( settings . action == 'amtinfojson' ) {
2020-05-22 13:59:02 -04:00
// Display Intel AMT version and activation state
2021-07-19 18:42:29 -04:00
getMeiState ( 15 , function ( state ) { // Flags: 1 = Versions, 2 = OsAdmin, 4 = Hashes, 8 = Network
if ( typeof args . post == 'string' ) {
console . log ( "Attempting to send to " + args . post ) ;
var http = require ( 'http' ) ;
var options = http . parseUri ( args . post ) ;
options . method = 'POST' ;
options . rejectUnauthorized = false ;
options . checkServerIdentity = function ( cert ) { }
//console.log("options: " + JSON.stringify(options, null, 2));
var req = http . request ( options ) ;
req . on ( 'error' , function ( e ) { console . log ( "Error: " + e ) ; exit ( 1 ) ; } ) ;
req . on ( 'response' , function ( response ) { console . log ( "Status code: " + response . statusCode ) ; exit ( 1 ) ; } ) ;
req . end ( JSON . stringify ( state ) ) ;
} else {
console . log ( JSON . stringify ( state , null , 2 ) ) ; exit ( 0 ) ;
}
} ) ;
2020-05-22 13:59:02 -04:00
} else if ( settings . action == 'amtsavestate' ) {
// Save the entire state of Intel AMT info a JSON file
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . hostname == null ) || ( typeof settings . hostname != 'string' ) || ( settings . hostname == '' ) ) { settings . hostname = '127.0.0.1' ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
if ( ( settings . output == null ) || ( typeof settings . output != 'string' ) || ( settings . output == '' ) ) { console . log ( 'No or invalid \"output\" file specified, use --output [filename].' ) ; exit ( 1 ) ; return ; }
settings . protocol = 'http:' ;
settings . localport = 16992 ;
debug ( 1 , "Settings: " + JSON . stringify ( settings ) ) ;
saveEntireAmtState ( ) ;
} else if ( ( settings . action == 'microlms' ) || ( settings . action == 'amtlms' ) || ( settings . action == 'lms' ) ) {
// Start Intel AMT MicroLMS
2021-07-01 16:21:24 -04:00
// Because of a bug in MEI on Linux, LMS will jam if not root. To work around this, start by checking AMT state first.
getMeiState ( 0 , function ( xstate ) { // Flags: 1 = Versions, 2 = OsAdmin, 4 = Hashes, 8 = Network
if ( xstate == null ) { console . log ( "Unable to get Intel AMT state, try running as " + ( ( process . platform == 'win32' ) ? "administrator." : "root." ) ) ; exit ( 1 ) ; return ; }
startLms ( function ( state ) {
console . log ( [ 'MicroLMS did not start. Must run as administrator or LMS already active.' , 'MicroLMS started.' , 'MicroLMS started, MeshCommander on HTTP/16994.' , 'MEI error' ] [ state ] ) ;
if ( ( ( state == 0 ) || ( state == 3 ) ) && ( settings . noconsole === true ) ) { exit ( 0 ) ; } else { console . log ( 'Press ctrl-c to exit.' ) ; }
} , false , xstate ) ;
} ) ;
2020-05-22 13:59:02 -04:00
} else if ( settings . action == 'amtpresence' ) {
// Heartbeat a Intel AMT watchdog
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
if ( ( settings . agent == null ) || ( typeof settings . agent != 'string' ) || ( settings . agent == '' ) ) { console . log ( 'No or invalid \"agent\" specified, use --agent [agent].' ) ; exit ( 1 ) ; return ; }
performAmtAgentPresence ( ) ;
} else if ( settings . action == 'amtuuid' ) {
// Start running
if ( settings . hostname != null ) {
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
}
settings . protocol = 'http:' ;
settings . localport = 16992 ;
debug ( 1 , "Settings: " + JSON . stringify ( settings ) ) ;
getAmtUuid ( ) ;
2020-10-17 22:23:24 -04:00
} else if ( settings . action == 'amtconfig' ) {
// Start Intel AMT configuration
if ( ( settings . url == null ) || ( typeof settings . url != 'string' ) || ( settings . url == '' ) ) { console . log ( 'No MeshCentral server URL specified, use --url [url].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . id == null ) || ( typeof settings . id != 'string' ) || ( settings . id == '' ) ) { console . log ( 'No device group identifier specified, use --id [identifier].' ) ; exit ( 1 ) ; return ; }
2021-07-14 17:57:26 -04:00
settings . id = settings . id . replace ( '\'' , '' ) ; // Remove single quote.
2020-10-17 22:23:24 -04:00
debug ( 1 , "Settings: " + JSON . stringify ( settings ) ) ;
configureAmt ( ) ;
2020-05-22 13:59:02 -04:00
} else if ( settings . action == 'amtccm' ) {
// Start activation to CCM
2020-10-29 15:59:55 -04:00
if ( ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) ) { console . log ( 'No or invalid parameters specified, use --password [password] or --url [url].' ) ; exit ( 1 ) ; return ; }
2020-05-22 13:59:02 -04:00
settings . protocol = 'http:' ;
settings . localport = 16992 ;
debug ( 1 , "Settings: " + JSON . stringify ( settings ) ) ;
2020-10-29 15:59:55 -04:00
activeToCCM ( ) ;
2020-05-22 13:59:02 -04:00
} else if ( settings . action == 'amtdeactivate' ) {
// Deactivate CCM
debug ( 1 , "Settings: " + JSON . stringify ( settings ) ) ;
deactivateCCM ( ) ;
} else if ( settings . action == 'amtacmdeactivate' ) {
// Deactivate ACM
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . type == null ) || ( typeof settings . type != 'string' ) || ( settings . type == '' ) ) { console . log ( 'Unprovisioning \"type\" must be specified, use --type [partial/full].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
if ( settings . hostname == null ) { settings . hostname = '127.0.0.1' ; }
if ( settings . tls == null ) { settings . tls = false ; }
debug ( 1 , "Settings: " + JSON . stringify ( settings ) ) ;
deactivateACM ( ) ;
} else if ( settings . action == 'meshcommander' ) { // Start MeshCommander
startMeshCommander ( ) ;
//} else if (settings.action == 'amtdisable') { // Disable AMT Network Interface
// amtDisable();
} else if ( settings . action == 'amtscan' ) {
// Scan the network for Intel AMT devices
if ( ( settings . scan == null ) || ( typeof settings . scan != 'string' ) || ( settings . scan == '' ) ) { console . log ( 'No or invalid \"scan\" specified, use --scan [ip range].' ) ; exit ( 1 ) ; return ; }
console . log ( 'Scanning: ' + settings . scan + '...' ) ;
var AMTScannerModule = require ( 'amt-scanner' ) ;
var amtscanner = new AMTScannerModule ( ) , r = '' ;
amtscanner . scan ( settings . scan , 2000 , function ( data ) {
if ( data . length > 0 ) {
r = '' , pstates = [ 'NotActivated' , 'InActivation' , 'Activated' ] ;
for ( var i in data ) {
var x = data [ i ] ;
if ( r != '' ) { r += '\r\n' ; }
r += x . address + ' - Intel AMT v' + x . majorVersion + '.' + x . minorVersion ;
if ( x . provisioningState < 3 ) { r += ( ', ' + pstates [ x . provisioningState ] ) ; }
if ( x . provisioningState == 2 ) { r += ( ', ' + x . openPorts . join ( ', ' ) ) ; }
r += '.' ;
}
} else {
r = 'No Intel AMT found.' ;
}
console . log ( r ) ;
2021-07-16 21:43:30 -04:00
exit ( 0 ) ;
2020-05-22 13:59:02 -04:00
} ) ;
} else if ( settings . action == 'amtauditlog' ) { // Read the Intel AMT audit log
if ( settings . hostname != null ) {
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
} else { settings . hostname = '127.0.0.1' ; }
readAmtAuditLog ( ) ;
} else if ( settings . action == 'amteventlog' ) { // Read the Intel AMT audit log
2020-10-29 15:59:55 -04:00
if ( settings . hostname != null ) {
2020-05-22 13:59:02 -04:00
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
} else { settings . hostname = '127.0.0.1' ; }
readAmtEventLog ( ) ;
} else if ( settings . action == 'amtider' ) { // Remote mount IDER image
if ( ( settings . hostname == null ) || ( typeof settings . hostname != 'string' ) || ( settings . hostname == '' ) ) { console . log ( 'No or invalid \"hostname\" specified, use --hostname [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
if ( ( settings . floppy == null ) || ( typeof settings . floppy != 'string' ) || ( settings . floppy == '' ) ) { settings . floppy = null ; }
if ( ( settings . cdrom == null ) || ( typeof settings . cdrom != 'string' ) || ( settings . cdrom == '' ) ) { settings . cdrom = null ; }
if ( ( settings . floppy == null ) && ( settings . cdrom == null ) ) { console . log ( 'No or invalid \"floppy\" or \"cdrom\" specified, use --floppy [file] or --cdrom [file].' ) ; exit ( 1 ) ; return ; }
performIder ( ) ;
} else if ( settings . action == 'amtnetwork' ) { // Perform remote Intel AMT wired IPv4 configuration operation
if ( settings . hostname == null ) { settings . hostname = '127.0.0.1' ; }
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
performAmtNetConfig ( args ) ;
} else if ( settings . action == 'amtwifi' ) { // Perform remote Intel AMT Wifi configuration operation
if ( settings . hostname == null ) { settings . hostname = '127.0.0.1' ; }
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
if ( args . add != null ) {
if ( ( args . name == null ) || ( typeof args . name != 'string' ) || args . name == '' ) { console . log ( "Wifi profile name is required." ) ; exit ( 1 ) ; return ; }
if ( ( args . ssid == null ) || ( typeof args . ssid != 'string' ) || args . ssid == '' ) { console . log ( "Wifi SSID is required." ) ; exit ( 1 ) ; return ; }
if ( ( args . psk == null ) || ( typeof args . psk != 'string' ) || args . psk == '' ) { console . log ( "Wifi password is required." ) ; exit ( 1 ) ; return ; }
}
2020-10-29 15:59:55 -04:00
if ( args . del != null ) {
2020-05-22 13:59:02 -04:00
if ( ( settings . name == null ) || ( typeof settings . name != 'string' ) || settings . name == '' ) { console . log ( "Wifi profile name is required." ) ; exit ( 1 ) ; return ; }
}
performAmtWifiConfig ( args ) ;
} else if ( settings . action == 'amtwake' ) { // Perform remote Intel AMT wake alarm operations
if ( settings . hostname == null ) { settings . hostname = '127.0.0.1' ; }
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
if ( ( args . del != null ) && ( ( typeof args . del != 'string' ) || args . del == '' ) ) { console . log ( "Alarm name is required (--del [name])." ) ; exit ( 1 ) ; return ; }
if ( args . add != null ) {
if ( ( ( typeof args . add != 'string' ) || args . add == '' ) ) { console . log ( "Wake alarm name is required (--add [name])." ) ; exit ( 1 ) ; return ; }
if ( ( ( typeof args . date != 'string' ) || args . data == '' ) ) { console . log ( "Wake alarm date is required (--date [yyyy-mm-dd])." ) ; exit ( 1 ) ; return ; }
}
performAmtWakeConfig ( args ) ;
2021-07-07 18:49:18 -04:00
} else if ( settings . action == 'amtrpe' ) { // Perform Intel AMT remote platform erase operations
if ( settings . hostname == null ) { settings . hostname = '127.0.0.1' ; }
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
performAmtPlatformErase ( args ) ;
2020-05-22 13:59:02 -04:00
} else if ( settings . action == 'amtfeatures' ) { // Perform remote Intel AMT feature configuration operation
if ( settings . hostname == null ) { settings . hostname = '127.0.0.1' ; }
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
performAmtFeatureConfig ( args ) ;
} else if ( settings . action == 'amtpower' ) { // Perform remote Intel AMT power operation
if ( ( settings . hostname == null ) || ( typeof settings . hostname != 'string' ) || ( settings . hostname == '' ) ) { console . log ( 'No or invalid \"hostname\" specified, use --hostname [host].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
/ *
2 = Power On
3 = Sleep - Light
4 = Sleep - Deep
5 = Power Cycle ( Off Soft )
6 = Power Off - Hard
7 = Hibernate
8 = Power Off - Soft
9 = Power Cycle ( Off Hard )
2020-06-15 19:37:02 -04:00
10 = Main Bus Reset
2020-05-22 13:59:02 -04:00
11 = Diagnostic Interrupt ( NMI )
12 = Power Off - Soft Graceful
13 = Power Off - Hard Graceful
2020-06-15 19:37:02 -04:00
14 = Main Bus Reset Graceful
2020-05-22 13:59:02 -04:00
15 = Power Cycle ( Off - Soft Graceful )
16 = Power Cycle ( Off - Hard Graceful )
* /
settings . poweraction = 0 ;
if ( args . poweron ) { settings . poweraction = 2 ; }
if ( args . sleep ) { settings . poweraction = 3 ; }
if ( args . powercycle ) { settings . poweraction = 5 ; }
2021-03-25 21:54:26 -04:00
if ( args . poweroff ) { settings . poweraction = 8 ; }
2020-05-22 13:59:02 -04:00
if ( args . hibernate ) { settings . poweraction = 7 ; }
if ( args . reset ) { settings . poweraction = 10 ; }
//if (settings.poweraction == 0) { console.log('No power action, specify --poweron, --sleep, --powercycle, --poweroff, --hibernate, --reset.'); exit(1); return; }
2021-03-24 20:19:51 -04:00
// Accepted option for boot device are: pxe, hdd, cd
var bootdevices = [ 'pxe' , 'hdd' , 'cd' ] ;
if ( args . bootdevice ) {
if ( bootdevices . indexOf ( args . bootdevice . toLowerCase ( ) ) >= 0 ) {
settings . bootdevice = args . bootdevice
2021-03-25 16:58:24 -04:00
// Set bootindex to 0 by default, unless overriden
2021-03-24 20:19:51 -04:00
settings . bootindex = 0
} else {
console . log ( 'Supported boot devices are pxe, hdd, cd' ) ; exit ( 1 ) ; return ;
}
}
// boot index for cd and hdd
if ( args . bootindex && args . bootindex >= 0 ) {
settings . bootindex = args . bootindex ;
}
2020-05-22 13:59:02 -04:00
performAmtPowerAction ( ) ;
} else {
2021-03-25 16:58:24 -04:00
console . log ( 'Invalid "action" specified.' ) ; exit ( 1 ) ; return ;
2020-05-22 13:59:02 -04:00
}
}
//
// Intel AMT Agent Presence
//
function performAmtAgentPresence ( ) { startLms ( function ( ) { tempWatchdogTimer = setTimeout ( performAmtAgentPresenceRegister , 3000 ) ; } ) ; }
function performAmtAgentPresenceRegister ( ) {
// Setup the Intel AMT WSMAN stack
tempWatchdogTimer = null ;
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , '127.0.0.1' , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
// Register the watchdog
watchdog = { DeviceID : Buffer . from ( guidToStr ( settings . agent . split ( '-' ) . join ( '' ) ) . split ( '-' ) . join ( '' ) , 'hex' ) . toString ( 'base64' ) , Retry : 0 } ;
amtstack . AMT _AgentPresenceWatchdog _RegisterAgent ( performAmtAgentPresenceRegisterRetry , watchdog , watchdog . Seq , { 'DeviceID' : watchdog . DeviceID } ) ;
}
// Called after the agent is registered
function performAmtAgentPresenceRegisterRetry ( stack , name , response , status , watchdog ) {
if ( ( status == 200 ) && ( response . Body . SessionSequenceNumber ) && ( response . Body . TimeoutInterval ) ) {
console . log ( 'Asserting presence of the watchdog...' ) ;
watchdog . Seq = response . Body . SessionSequenceNumber ;
watchdog . Interval = response . Body . TimeoutInterval * 800 ;
watchdog . Retry = 0 ;
tempWatchdogTimer = setTimeout ( performAmtAgentPresenceAssert , watchdog . Interval ) ;
} else {
debug ( 1 , 'Failed to register, status = ' + status ) ;
watchdog . Retry ++ ;
if ( watchdog . Retry < 5 ) {
tempWatchdogTimer = setTimeout ( function ( ) { amtstack . AMT _AgentPresenceWatchdog _RegisterAgent ( performAmtAgentPresenceRegisterRetry , watchdog , watchdog . Seq , { 'DeviceID' : watchdog . DeviceID } ) ; } , 1000 ) ;
} else {
console . log ( 'Failed to register this watchdog.' ) ;
process . exit ( 0 ) ;
}
}
}
// Start a new agent assert
function performAmtAgentPresenceAssert ( ) {
watchdog . Seq ++ ;
amtstack . AMT _AgentPresenceWatchdog _AssertPresence ( watchdog . Seq , performAmtAgentPresenceAssertRetry , watchdog , 0 , { 'DeviceID' : watchdog . DeviceID } ) ;
}
// Called after the agent is asserted
function performAmtAgentPresenceAssertRetry ( stack , name , response , status , watchdog ) {
if ( status == 200 ) {
debug ( 1 , 'Successful assert, sequence = ' + watchdog . Seq ) ;
watchdog . Retry = 0 ;
tempWatchdogTimer = setTimeout ( performAmtAgentPresenceAssert , watchdog . Interval ) ;
} else {
debug ( 1 , 'Failed to assert, status = ' + status ) ;
watchdog . Retry ++ ;
if ( watchdog . Retry < 5 ) {
amtstack . AMT _AgentPresenceWatchdog _AssertPresence ( watchdog . Seq , performAmtAgentPresenceAssertRetry , watchdog , 0 , { 'DeviceID' : watchdog . DeviceID } ) ;
} else {
console . log ( 'Failed to assert presence on this watchdog.' ) ;
process . exit ( 0 ) ;
}
}
}
function performAmtAgentPresenceEx5 ( stack , name , response , status , watchdog ) {
console . log ( 'b' , status , watchdog ) ;
if ( status == 200 ) {
watchdog . Retry = 0 ;
} else {
watchdog . Retry ++ ;
if ( watchdog . Retry < 5 ) {
amtstack . AMT _AgentPresenceWatchdog _AssertPresence ( watchdog . Seq , performAmtAgentPresenceEx4 , watchdog , 0 , { 'DeviceID' : watchdog . DeviceID } ) ;
} else {
console . log ( 'Failed to assert presence on this watchdog.' ) ;
process . exit ( 0 ) ;
}
}
}
//
// Intel AMT Event Log
//
function readAmtEventLog ( ) {
// See if MicroLMS needs to be started
if ( ( settings . hostname == '127.0.0.1' ) || ( settings . hostname . toLowerCase ( ) == 'localhost' ) ) {
settings . noconsole = true ; startLms ( readAmtEventLogEx ) ;
} else {
readAmtEventLogEx ( 9999 ) ;
}
}
function readAmtEventLogEx ( x ) {
if ( x == 9999 ) {
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
amtstack . GetMessageLog ( readAmtEventLogEx2 ) ;
} else {
osamtstack . GetMessageLog ( readAmtEventLogEx2 ) ;
}
}
function readAmtEventLogEx2 ( stack , messages ) {
if ( messages == null ) {
console . log ( 'Unable to get event log.' ) ;
} else {
var out = '' ;
if ( settings . json ) {
out = JSON . stringify ( messages , 4 , ' ' ) ;
} else {
for ( var i in messages ) { out += messages [ i ] . Time + ', ' + messages [ i ] . EntityStr + ', ' + messages [ i ] . Desc + ', ' + messages [ i ] . EventSeverity + '\r\n' ; }
}
if ( ( settings . output == null || settings . output == "" ) && ! settings . uuidoutput ) { console . log ( out ) ; exit ( 1 ) ; }
else {
try {
if ( settings . output ) {
var file = fs . openSync ( settings . output , 'w' ) ;
fs . writeSync ( file , Buffer . from ( out ) ) ;
fs . closeSync ( file ) ;
2021-07-16 21:43:30 -04:00
exit ( 0 ) ;
2020-05-22 13:59:02 -04:00
}
else if ( settings . uuidoutput ) {
var destpath = null ; //Dest path where messagelog file will be saved
if ( ( typeof settings . uuidoutput ) == 'string' ) {
fs . statSync ( settings . uuidoutput ) . isDirectory ( ) ; //Validate directory path
destpath = settings . uuidoutput ;
}
//Generate uuid and append it to dest path
stack . Get ( 'CIM_ComputerSystemPackage' , function ( obj , name , response , xstatus , tag ) {
if ( xstatus == 200 ) {
var eventlogsfile = path . join ( destpath , guidToStr ( response . Body . PlatformGUID . toLowerCase ( ) + '_Event' + ( settings . json ? '.json' : '.csv' ) ) ) ;
var file = fs . openSync ( eventlogsfile , 'w' ) ;
fs . writeSync ( file , Buffer . from ( out ) ) ;
fs . closeSync ( file ) ;
2021-07-16 21:43:30 -04:00
exit ( 0 ) ;
2020-05-22 13:59:02 -04:00
} else {
console . log ( 'Intel AMT is not available or not activated, status = ' + status + '.' ) ;
2021-07-16 21:43:30 -04:00
exit ( 1 ) ;
}
2020-05-22 13:59:02 -04:00
} ) ;
}
2020-10-29 15:59:55 -04:00
else {
2020-05-22 13:59:02 -04:00
console . log ( 'Invalid action, usage:\r\n\r\n meshcmd help amtauditlog' ) ;
exit ( 1 ) ;
}
}
catch ( e ) {
console . log ( e ) ;
exit ( 1 ) ;
}
}
}
}
//
// Intel AMT Audit Log
//
function readAmtAuditLog ( ) {
// See if MicroLMS needs to be started
if ( ( settings . hostname == '127.0.0.1' ) || ( settings . hostname . toLowerCase ( ) == 'localhost' ) ) {
settings . noconsole = true ; startLms ( readAmtAuditLogEx ) ;
} else {
readAmtAuditLogEx ( 9999 ) ;
}
}
function readAmtAuditLogEx ( x ) {
if ( x == 9999 ) {
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
amtstack . GetAuditLog ( readAmtAuditLogEx2 ) ;
} else {
osamtstack . GetAuditLog ( readAmtAuditLogEx2 ) ;
}
}
function readAmtAuditLogEx2 ( stack , response , status ) {
if ( status != 200 ) {
console . log ( 'Unable to get audit log, status = ' + status + '.' ) ;
} else {
var out = '' ;
if ( settings . json ) {
out = JSON . stringify ( response , 4 , ' ' ) ;
} else {
for ( var i in response ) {
var name = ( ( response [ i ] . Initiator != '' ) ? ( response [ i ] . Initiator + ': ' ) : '' )
out += ( response [ i ] . Time + ' - ' + name + response [ i ] . Event + '\r\n' ) ;
}
}
if ( ( settings . output == null || settings . output == "" ) && ! settings . uuidoutput ) { console . log ( out ) ; exit ( 1 ) ; }
else {
try {
if ( settings . output ) {
var file = fs . openSync ( settings . output , 'w' ) ;
fs . writeSync ( file , Buffer . from ( out ) ) ;
fs . closeSync ( file ) ;
2021-07-16 21:43:30 -04:00
exit ( 0 ) ;
2020-05-22 13:59:02 -04:00
}
else if ( settings . uuidoutput ) {
var destpath = null ; //Dest path where auditlog file will be saved
if ( ( typeof settings . uuidoutput ) == 'string' ) {
fs . statSync ( settings . uuidoutput ) . isDirectory ( ) ; //Validate directory path
destpath = settings . uuidoutput ;
}
//Generate uuid and append it to dest path
stack . Get ( 'CIM_ComputerSystemPackage' , function ( obj , name , response , xstatus , tag ) {
if ( xstatus == 200 ) {
var auditlogsfile = path . join ( destpath , guidToStr ( response . Body . PlatformGUID . toLowerCase ( ) + '_Audit' + ( settings . json ? '.json' : '.csv' ) ) ) ;
var file = fs . openSync ( auditlogsfile , 'w' ) ;
fs . writeSync ( file , Buffer . from ( out ) ) ;
fs . closeSync ( file ) ;
2021-07-16 21:43:30 -04:00
exit ( 0 ) ;
2020-05-22 13:59:02 -04:00
} else {
console . log ( 'Intel AMT is not available or not activated, status = ' + status + '.' ) ;
2021-07-16 21:43:30 -04:00
exit ( 1 ) ;
}
2020-05-22 13:59:02 -04:00
} ) ;
}
2020-10-29 15:59:55 -04:00
else {
2020-05-22 13:59:02 -04:00
console . log ( 'Invalid action, usage:\r\n\r\n meshcmd help amtauditlog' ) ;
exit ( 1 ) ;
}
}
catch ( e ) {
console . log ( e ) ;
exit ( 1 ) ;
}
}
}
}
//
// Disable AMT Network
//
//function amtDisable() {
// settings.noconsole = true;
// startLms(amtDisableEx);
//}
//function amtDisableEx(stack, response, status) {
// //console.log(osamtstack);
// osamtstack.Get('AMT_EthernetPortSettings', function (stack, name, response, status) {
// console.log(response.Body);
// });
//}
//
// MeshCommander local web server
//
function startMeshCommander ( ) {
if ( settings . localport == null ) { settings . localport = 3000 ; }
// Start the web server
var http = require ( 'http' ) ;
webServer = http . createServer ( ) ;
webServer . listen ( settings . localport ) ;
webServer . wsList = { } ;
webServer . wsListIndex = 0 ;
webServer . on ( 'upgrade' , function ( req , socket , head ) {
//console.log("WebSocket for " + req.url.split('?')[0]);
switch ( req . url . split ( '?' ) [ 0 ] ) {
case '/webrelay.ashx' : // MeshCommander relay channel
var ws = socket . upgradeWebSocket ( ) ;
socket . ws = ws ;
ws . wsIndex = ++ webServer . wsListIndex ;
webServer . wsList [ ws . wsIndex ] = ws ; // Keep a reference so the websocket and forwarder don't get disposed.
ws . pause ( ) ;
// We got a new web socket connection, initiate a TCP connection to the target Intel AMT host/port.
var webargs = parseUrlArguments ( req . url ) ;
if ( webargs . p ) { webargs . p = parseInt ( webargs . p ) ; }
if ( webargs . tls ) { webargs . tls = parseInt ( webargs . tls ) ; }
if ( webargs . tls1only ) { webargs . tls1only = parseInt ( webargs . tls1only ) ; }
if ( webargs . port ) { webargs . port = parseInt ( webargs . port ) ; }
debug ( 1 , 'Opening web socket connection to ' + webargs . host + ':' + webargs . port + '.' ) ;
//console.log('Opening web socket connection to ' + webargs.host + ':' + webargs.port + '.');
if ( webargs . tls == 0 ) {
// If this is TCP (without TLS) set a normal TCP socket
var net = require ( 'net' ) ;
ws . forwardclient = net . connect ( { host : webargs . host , port : webargs . port } )
ws . forwardclient . on ( 'connect' , function ( ) { debug ( 1 , 'Connected TCP to ' + webargs . host + ':' + webargs . port + '.' ) ; this . pipe ( this . ws , { end : false } ) ; this . ws . pipe ( this , { end : false } ) ; } ) ;
ws . forwardclient . on ( 'error' , function ( ) { debug ( 1 , 'TCP connection error to ' + webargs . host + ':' + webargs . port + '.' ) ; try { this . ws . end ( ) ; } catch ( e ) { } } ) ;
ws . forwardclient . ws = ws ;
} else {
// If TLS is going to be used, setup a TLS socket
var tls = require ( 'tls' ) ;
var tlsoptions = { host : webargs . host , port : webargs . port , rejectUnauthorized : false } ;
if ( webargs . tls1only == 1 ) { tlsoptions . secureProtocol = 'TLSv1_method' ; }
ws . forwardclient = tls . connect ( tlsoptions , function ( ) { debug ( 1 , 'Connected TLS to ' + webargs . host + ':' + webargs . port + '.' ) ; this . pipe ( this . ws , { end : false } ) ; this . ws . pipe ( this , { end : false } ) ; } ) ;
ws . forwardclient . on ( 'error' , function ( ) { debug ( 1 , 'TLS connection error to ' + webargs . host + ':' + webargs . port + '.' ) ; try { this . ws . end ( ) ; } catch ( e ) { } } ) ;
ws . forwardclient . ws = ws ;
}
// Handle pipe closure
ws . on ( 'end' , function ( ) { debug ( 1 , 'Disconnected from ' + webargs . host + ':' + webargs . port + '.' ) ; try { this . forwardclient . end ( ) ; } catch ( e ) { } delete webServer . wsList [ this . wsIndex ] ; } ) ;
ws . forwardclient . on ( 'end' , function ( ) { try { this . ws . end ( ) ; } catch ( e ) { } } ) ;
break ;
default :
socket . end ( ) ;
break ;
}
} ) ;
webServer . on ( 'request' , function ( req , rsp ) {
//console.log("WebRequest for " + req.url.split('?')[0]);
switch ( req . url . split ( '?' ) [ 0 ] ) {
case '/' : // Serve MeshCommander Web Application
var meshcommander = null ;
try { meshcommander = fs . readFileSync ( 'meshcommander.htm' ) ; } catch ( e ) { }
if ( meshcommander != null ) {
rsp . writeHead ( 200 , 'OK' , { Server : 'JSLMS' , 'Cache-Control' : 'max-age=0, no-cache' , 'X-Frame-Options' : 'DENY' , 'Content-Type' : 'text/html' , 'Transfer-Encoding' : 'chunked' } ) ;
rsp . end ( meshcommander ) ;
} else {
rsp . writeHead ( 200 , 'OK' , { Server : 'JSLMS' , 'Cache-Control' : 'max-age=0, no-cache' , 'X-Frame-Options' : 'DENY' , 'Content-Type' : 'text/html' , 'Content-Encoding' : 'gzip' , 'Transfer-Encoding' : 'chunked' , ETag : FullSite _IntelAmtLocalWebApp _etag } ) ;
rsp . end ( Buffer . from ( FullSite _IntelAmtLocalWebApp , 'base64' ) ) ;
}
break ;
default : // Unknown request
rsp . statusCode = 404 ;
rsp . statusMessage = "Not Found" ;
rsp . end ( ) ;
break ;
}
} ) ;
console . log ( 'MeshCommander running on HTTP port ' + settings . localport + '.' ) ;
console . log ( 'Press ctrl-c to exit.' ) ;
}
2020-10-17 22:23:24 -04:00
//
// Configure Intel AMT
//
function configureAmt ( ) {
settings . noconsole = true ;
2021-07-01 16:21:24 -04:00
// Due to a bug in MEI handling, we have to pull MEI state first before starting LMS.
2020-10-20 01:23:46 -04:00
getMeiState ( 15 , function ( state ) { // Flags: 1 = Versions, 2 = OsAdmin, 4 = Hashes, 8 = Network
2021-07-01 16:21:24 -04:00
if ( state == null ) { console . log ( "Unable to get Intel AMT state, try running as " + ( ( process . platform == 'win32' ) ? "administrator." : "root." ) ) ; exit ( 1 ) ; return ; }
2020-10-20 21:14:00 -04:00
if ( state . ProvisioningState == null ) { console . log ( 'Intel AMT not ready for configuration.' ) ; exit ( 1 ) ; return ; }
2021-07-24 13:12:21 -04:00
getAmtOsDnsSuffix ( state , function ( ) { startLms ( configureAmt2 , false , state ) ; } ) ;
2021-07-01 16:21:24 -04:00
} ) ;
}
2020-10-20 21:14:00 -04:00
2021-07-01 16:21:24 -04:00
function configureAmt2 ( err , state ) {
console . log ( 'Starting Intel AMT configuration...' ) ;
2020-12-10 03:03:00 -05:00
2021-07-01 16:21:24 -04:00
// Add indication if the device is battery powered, this is used to show a mobile icon when adding the device
state . isBatteryPowered = ( require ( 'identifiers' ) . isBatteryPowered && require ( 'identifiers' ) . isBatteryPowered ( ) ) ;
// Add Intel AMT credentials if provided
if ( ( typeof settings . password == 'string' ) && ( settings . password != '' ) ) {
state . amtpass = settings . password ;
state . amtuser = 'admin' ;
if ( ( typeof settings . username == 'string' ) && ( settings . username != '' ) ) { state . amtuser = settings . username ; }
}
2020-12-10 03:03:00 -05:00
2021-07-14 15:47:28 -04:00
// If a DNS suffix override is provided, use that
if ( settings . dnssuffix != null ) { state . DnsSuffix = settings . dnssuffix ; }
2021-07-01 16:21:24 -04:00
// If a description is provided, send it to the server
if ( ( typeof settings . desc == 'string' ) && ( settings . desc != '' ) ) { state . desc = settings . desc ; }
// Connect to MPS and start APF relay
var apfarg = {
mpsurl : settings . url ,
mpsuser : settings . id . substring ( 0 , 16 ) ,
mpspass : settings . id . substring ( 0 , 16 ) ,
mpskeepalive : 60000 ,
clientname : state . OsHostname ,
clientaddress : '127.0.0.1' ,
clientuuid : state . UUID ,
conntype : 2 , // 0 = CIRA, 1 = Relay, 2 = LMS. The correct value is 2 since we are performing an LMS relay.
meiState : state
} ;
if ( ( apfarg . clientuuid == null ) || ( apfarg . clientuuid . length != 36 ) ) {
console . log ( "Unable to get Intel AMT UUID: " + apfarg . clientuuid ) ;
exit ( 1 ) ; return ;
} else {
settings . apftunnel = require ( 'amt-apfclient' ) ( { debug : ( settings . debuglevel > 0 ) } , apfarg ) ;
settings . apftunnel . onJsonControl = configureJsonControl ;
settings . apftunnel . onChannelClosed = function ( ) { exit ( 0 ) ; }
try {
settings . apftunnel . connect ( ) ;
console . log ( "Started APF tunnel..." ) ;
} catch ( e ) {
console . log ( JSON . stringify ( e ) ) ;
2020-10-17 22:23:24 -04:00
exit ( 1 ) ; return ;
}
2021-07-01 16:21:24 -04:00
}
2020-10-17 22:23:24 -04:00
}
function configureJsonControl ( data ) {
switch ( data . action ) {
2020-10-20 01:23:46 -04:00
case 'console' : // Display a console message
2020-10-17 22:23:24 -04:00
console . log ( data . msg ) ;
break ;
2020-10-20 01:23:46 -04:00
case 'mestate' : // Request an updated MEI state
getMeiState ( 15 , function ( state ) { settings . apftunnel . updateMeiState ( state ) ; } ) ;
break ;
2020-10-21 15:19:00 -04:00
case 'deactivate' : // Request CCM deactivation
var amtMeiModule , amtMei ;
try { amtMeiModule = require ( 'amt-mei' ) ; amtMei = new amtMeiModule ( ) ; } catch ( ex ) { settings . apftunnel . sendMeiDeactivationState ( 1 ) ; break ; }
amtMei . on ( 'error' , function ( e ) { settings . apftunnel . sendMeiDeactivationState ( 1 ) ; } ) ;
amtMei . unprovision ( 1 , function ( status ) { settings . apftunnel . sendMeiDeactivationState ( status ) ; } ) ; // 0 = Success
break ;
2021-03-04 02:49:53 -05:00
case 'startTlsHostConfig' : // Request start of host based TLS ACM activation
var amtMeiModule , amtMei ;
try { amtMeiModule = require ( 'amt-mei' ) ; amtMei = new amtMeiModule ( ) ; } catch ( ex ) { settings . apftunnel . sendStartTlsHostConfigResponse ( { state : - 103 } ) ; break ; }
amtMei . on ( 'error' , function ( e ) { settings . apftunnel . sendStartTlsHostConfigResponse ( { state : - 104 } ) ; } ) ;
amtMei . startConfigurationHBased ( Buffer . from ( data . hash , 'hex' ) , data . hostVpn , data . dnsSuffixList , function ( response ) {
settings . apftunnel . sendStartTlsHostConfigResponse ( response ) ;
} ) ;
break ;
2021-03-05 02:52:48 -05:00
case 'stopConfiguration' : // Request Intel AMT stop configuration.
var amtMeiModule , amtMei ;
try { amtMeiModule = require ( 'amt-mei' ) ; amtMei = new amtMeiModule ( ) ; } catch ( ex ) { settings . apftunnel . sendStartTlsHostConfigResponse ( { state : - 103 } ) ; break ; }
amtMei . on ( 'error' , function ( e ) { settings . apftunnel . sendStartTlsHostConfigResponse ( { state : - 104 } ) ; } ) ;
amtMei . stopConfiguration ( function ( status ) {
settings . apftunnel . sendStopConfigurationResponse ( status ) ;
} ) ;
break ;
2020-10-20 01:23:46 -04:00
case 'close' : // Close the CIRA-LMS connection
2020-10-17 22:23:24 -04:00
exit ( 0 ) ;
break ;
2021-03-05 02:52:48 -05:00
default :
console . log ( "MeshCmd update may be needed, unknown JSON control action: " + data . action ) ;
break ;
2020-10-17 22:23:24 -04:00
}
}
2020-05-22 13:59:02 -04:00
//
// Deactivate Intel AMT CCM
//
// When called, this will use MEI to deactivate Intel AMT when it's in CCM mode. Simply calls "unprovision" on MEI and checks the return code.
function deactivateCCM ( ) {
var amtMeiModule , amtMei ;
try { amtMeiModule = require ( 'amt-mei' ) ; amtMei = new amtMeiModule ( ) ; } catch ( ex ) { console . log ( ex ) ; exit ( 1 ) ; return ; }
amtMei . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + e ) ; exit ( 1 ) ; return ; } ) ;
amtMei . unprovision ( 1 , function ( status ) { if ( status == 0 ) { console . log ( 'Success' ) ; } else { console . log ( 'Error ' + status ) ; } exit ( 1 ) ; } ) ;
}
//
// Activate Intel AMT to CCM
//
function activeToCCM ( ) {
// See if MicroLMS needs to be started and setup the $$OsAdmin wsman stack
settings . noconsole = true ;
startLms ( activeToCCMEx ) ; // TODO: Fix this so that it works even if LMS already running.
}
function activeToCCMEx ( state ) {
osamtstack . BatchEnum ( null , [ '*AMT_GeneralSettings' , '*IPS_HostBasedSetupService' ] , activeToCCMEx2 ) ;
}
function activeToCCMEx2 ( stack , name , responses , status ) {
if ( status != 200 ) { console . log ( 'Failed to fetch activation status, status ' + status ) ; exit ( 1 ) ; }
else if ( responses [ 'IPS_HostBasedSetupService' ] . response [ 'AllowedControlModes' ] . length != 2 ) { console . log ( 'Client control mode activation not allowed' ) ; exit ( 1 ) ; }
else { osamtstack . IPS _HostBasedSetupService _Setup ( 2 , md5hex ( 'admin:' + responses [ 'AMT_GeneralSettings' ] . response [ 'DigestRealm' ] + ':' + settings . password ) . substring ( 0 , 32 ) , null , null , null , null , activeToCCMEx3 ) ; }
}
function activeToCCMEx3 ( stack , name , responses , status ) {
if ( status != 200 ) { console . log ( 'Failed to activate, status ' + status ) ; }
else if ( responses . Body . ReturnValue != 0 ) { console . log ( 'Client control mode activation failed: ' + responses . Body . ReturnValueStr ) ; }
else { console . log ( 'Success' ) ; exit ( 0 ) ; }
exit ( 1 ) ;
}
//
// Deactivate Intel AMT ACM
//
// When called, this will use MEI to deactivate Intel AMT when it's in ACM mode. Calls "unprovision" on MEI and checks the return code.
function deactivateACM ( ) {
settings . noconsole = true ;
startLms ( deactivateACMEx ) ;
}
function deactivateACMEx ( ) {
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
amtstack . Get ( "AMT_SetupAndConfigurationService" , function ( stack , name , responses , status ) {
if ( status !== 200 ) {
console . log ( 'Command not allowed. Status: ' + status ) ;
exit ( 1 ) ;
} else {
var sacs = responses . Body ;
if ( sacs . ZeroTouchConfigurationEnabled == true ) { sacs . ZeroTouchConfigurationEnabled = true ; }
amtstack . Put ( "AMT_SetupAndConfigurationService" , sacs , function ( stack , name , responses , status ) {
if ( settings . type == 'full' ) {
amtstack . AMT _SetupAndConfigurationService _Unprovision ( 2 , function ( stack , name , responses , status ) {
if ( status != 200 ) { console . log ( 'Failed to fully unconfigure AMT, status ' + status ) ; exit ( 1 ) ; }
else if ( responses . Body . ReturnValue != 0 ) { console . log ( 'Unprovision failed: ' + responses . Body . ReturnValueStr ) ; exit ( 1 ) ; }
else { console . log ( 'AMT fully unprovisioned.' ) ; exit ( 0 ) ; }
} ) ;
} else {
console . log ( 'Only full unprovision is currently supported.' ) ;
exit ( 0 ) ;
}
//} else if (settings.type == 'partial') {
// amtstack.AMT_SetupAndConfigurationService_PartialUnprovision(null, function (stack, name, responses, status) {
// if (status != 200) { console.log('Failed to partially unconfigure AMT, status ' + status); exit(1); }
// else if (responses.Body.ReturnValue != 0) { console.log('Unprovision failed: ' + responses.Body.ReturnValueStr); exit(1); }
// else { console.log('AMT partially unprovisioned.'); exit(0); }
// });
//}
} ) ;
}
} ) ;
}
//
// Get Intel AMT activation hashes
//
var trustedHashes = null ;
function getTrustedHashes ( amtMei , func , tag ) {
if ( trustedHashes != null ) { func ( tag ) ; }
trustedHashes = [ ] ;
amtMei . getHashHandles ( function ( handles ) {
var exitOnCount = handles . length ;
for ( var i = 0 ; i < handles . length ; ++ i ) {
this . getCertHashEntry ( handles [ i ] , function ( result ) {
if ( result . isActive == 1 ) { trustedHashes . push ( result . certificateHash . toLowerCase ( ) ) ; }
if ( -- exitOnCount == 0 ) { func ( tag ) ; }
} ) ;
}
} ) ;
}
//
// Get AMT UUID
//
// Called to get the UUID of Intel AMT, start by setting up MicroLMS if we are doing the operation on the local computer
2021-10-06 16:11:40 -04:00
function getAmtUuid ( )
{
if ( settings . hostname != null )
{
getAmtUuidEx ( ) ;
} else
{
2020-05-22 13:59:02 -04:00
if ( ( settings . hostname == '127.0.0.1' ) || ( settings . hostname . toLowerCase ( ) == 'localhost' ) ) { settings . noconsole = true ; startLms ( getAmtUuidEx ) ; return ; } else { getAmtUuidEx ( ) ; }
}
}
// Fetch the computer's UUID by fetching the CIM_ComputerSystemPackage WSMAN object.
function getAmtUuidEx ( ) {
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
amtstack . Get ( "CIM_ComputerSystemPackage" , function ( obj , name , response , xstatus , tag ) {
if ( xstatus == 200 ) { console . log ( "GUID: " + guidToStr ( response . Body . PlatformGUID . toLowerCase ( ) ) ) ; } else { console . log ( "Intel AMT is not available or not activated." ) ; } exit ( 1 ) ;
} ) ;
}
//
// FETCH ALL INTEL AMT STATE
//
function saveEntireAmtState2 ( ) {
console . log ( 'Fetching all Intel AMT state, this may take a few minutes...' ) ;
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
amtstack . onProcessChanged = onWsmanProcessChanged ;
//var AllWsman = "AMT_GeneralSystemDefenseCapabilities".split(',');
var AllWsman = " AMT _8021xCredentialContext , AMT _8021XProfile , AMT _ActiveFilterStatistics , AMT _AgentPresenceCapabilities , AMT _AgentPresenceInterfacePolicy , AMT _AgentPresenceService , AMT _AgentPresenceWatchdog , AMT _AgentPresenceWatchdogAction , AMT _AlarmClockService , IPS _AlarmClockOccurrence , AMT _AssetTable , AMT _AssetTableService , AMT _AuditLog , AMT _AuditPolicyRule , AMT _AuthorizationService , AMT _BootCapabilities , AMT _BootSettingData , AMT _ComplexFilterEntryBase , AMT _CRL , AMT _CryptographicCapabilities , AMT _EACCredentialContext , AMT _EndpointAccessControlService , AMT _EnvironmentDetectionInterfacePolicy , AMT _EnvironmentDetectionSettingData , AMT _EthernetPortSettings , AMT _EventLogEntry , AMT _EventManagerService , AMT _EventSubscriber , AMT _FilterEntryBase , AMT _FilterInSystemDefensePolicy , AMT _GeneralSettings , AMT _GeneralSystemDefenseCapabilities , AMT _Hdr8021Filter , AMT _HeuristicPacketFilterInterfacePolicy , AMT _HeuristicPacketFilterSettings , AMT _HeuristicPacketFilterStatistics , AMT _InterfacePolicy , AMT _IPHeadersFilter , AMT _KerberosSettingData , AMT _ManagementPresenceRemoteSAP , AMT _MessageLog , AMT _MPSUsernamePassword , AMT _NetworkFilter , AMT _NetworkPortDefaultSystemDefensePolicy , AMT _NetworkPortSystemDefenseCapabilities , AMT _NetworkPortSystemDefensePolicy , AMT _PCIDevice , AMT _PETCapabilities , AMT _PETFilterForTarget , AMT _PETFilterSetting , AMT _ProvisioningCertificateHash , AMT _PublicKeyCertificate , AMT _PublicKeyManagementCapabilities , AMT _PublicKeyManagementService , AMT _PublicPrivateKeyPair , AMT _RedirectionService , AMT _RemoteAccessCapabilities , AMT _RemoteAccessCredentialContext , AMT _RemoteAccessPolicyAppliesToMPS , AMT _RemoteAccessPolicyRule , AMT _RemoteAccessService , AMT _SetupAndConfigurationService , AMT _SNMPEventSubscriber , AMT _StateTransitionCondition , AMT _SystemDefensePolicy , AMT _SystemDefensePolicyInService , AMT _SystemDefenseService , AMT _SystemPowerScheme , AMT _ThirdPartyDataStorageAdministrationService , AMT _ThirdPartyDataStorageService , AMT _TimeSynchronizationService , AMT _TLSCredentialContext , AMT _TLSProtocolEndpoint , AMT _TLSProtocolEndpointCollection , AMT _TLSSettingData , AMT _TrapTargetForService , AMT _UserInitiatedConnectionService , AMT _WebUIService , AMT _WiFiPortConfigurationService , CIM _AbstractIndicationSubscription , CIM _Account , CIM _AccountManagementCapabilities , CIM _AccountManagementService , CIM _AccountOnSystem , CIM _AdminDomain , CIM _AlertIndication , CIM _AssignedIdentity , CIM _AssociatedPowerManagementService , CIM _AuthenticationService , CIM _AuthorizationService , CIM _BIOSElement , CIM _BIOSFeature , CIM _BIOSFeatureBIOSElements , CIM _BootConfigSetting , CIM _BootService , CIM _BootSettingData , CIM _BootSourceSetting , CIM _Capabilities , CIM _Card , CIM _Chassis , CIM _Chip , CIM _Collection , CIM _Component , CIM _ComputerSystem , CIM _ComputerSystemPackage , CIM _ConcreteComponent , CIM _ConcreteDependency , CIM _Controller , CIM _CoolingDevice , CIM _Credential , CIM _CredentialContext , CIM _CredentialManagementService , CIM _Dependency , CIM _DeviceSAPImplementation , CIM _ElementCapabilities , CIM _ElementConformsToProfile , CIM _ElementLocation , CIM _ElementSettingData , CIM _ElementSoftwareIdentity , CIM _ElementStatisticalData , CIM _EnabledLogicalElement , CIM _EnabledLogicalElementCapabilities , CIM _EthernetPort , CIM _Fan , CIM _FilterCollection , CIM _FilterCollectionSubscription , CIM _HostedAccessPoint , CIM _HostedDependency , CIM _HostedService , CIM _Identity , CIM _IEEE8021xCapabilities , CIM _IEEE8021xSettings , CIM _Indication , CIM _IndicationService , CIM _InstalledSoftwareIdentity , CIM _KVMRedirectionSAP , CIM _LANEndpoint , CIM _ListenerDestination , CIM _ListenerDestinationWSManagement , CIM _Location , CIM _Log , CIM _LogEntry , CIM _LogicalDevice , CIM _LogicalElement , CIM _LogicalPort , CIM _LogicalPortCapabilities , CIM _LogManagesRecord , CIM _ManagedCredential , CIM _ManagedElement , CIM _ManagedSystemElement , CIM _MediaAccessDevice , CIM _MemberOfCollection , CIM _Memory , CIM _MessageLog , CIM _NetworkPort , CIM _NetworkPortCapabilities , CIM _NetworkPortConfigurationService , CIM _OrderedComponent , CIM _OwningCollectionElement , CIM _OwningJobElement , CIM _PCIController , CIM _PhysicalComponent , CIM _PhysicalElement , CIM _PhysicalElementLocation , CIM _PhysicalFrame , CIM _PhysicalMemory , CIM _PhysicalPackage , CIM _Policy , CIM _PolicyAction , CIM _PolicyCondition , CIM _PolicyInSystem , CIM _PolicyRule , CIM _PolicyR
IntelAmtEntireStateProgress = 101 ;
IntelAmtEntireStateCalls = 3 ;
IntelAmtEntireState = { 'localtime' : Date ( ) , 'utctime' : new Date ( ) . toUTCString ( ) , 'isotime' : new Date ( ) . toISOString ( ) } ;
amtstack . BatchEnum ( null , AllWsman , saveEntireAmtStateOk2 , null , true ) ;
amtstack . GetAuditLog ( saveEntireAmtStateOk3 ) ;
amtstack . GetMessageLog ( saveEntireAmtStateOk4 ) ;
}
// Save the entire Intel AMT state
function saveEntireAmtState ( ) {
// See if MicroLMS needs to be started
if ( ( settings . hostname == '127.0.0.1' ) || ( settings . hostname . toLowerCase ( ) == 'localhost' ) ) {
settings . noconsole = true ;
startLms ( ) . then ( saveEntireAmtState2 ) ;
2020-10-29 15:59:55 -04:00
} else {
2020-05-22 13:59:02 -04:00
saveEntireAmtState2 ( ) ;
}
}
function onWsmanProcessChanged ( a , b ) { var x = Math . floor ( ( a * 100 ) / b ) ; if ( x < IntelAmtEntireStateProgress ) { IntelAmtEntireStateProgress = x ; console . log ( ( 100 - x ) + '%' ) ; } }
function saveEntireAmtStateOk2 ( stack , name , responses , status ) { if ( status == 600 ) { console . log ( 'ERROR: Unable to connect to Intel(R) AMT.' ) ; exit ( 2 ) ; } IntelAmtEntireState [ 'wsmanenums' ] = responses ; saveEntireAmtStateDone ( ) ; }
function saveEntireAmtStateOk3 ( stack , messages , status ) { if ( status == 600 ) { console . log ( 'ERROR: Unable to connect to Intel(R) AMT.' ) ; exit ( 2 ) ; } IntelAmtEntireState [ 'auditlog' ] = messages ; saveEntireAmtStateDone ( ) ; }
function saveEntireAmtStateOk4 ( stack , messages , tag , status ) { if ( status == 600 ) { console . log ( 'ERROR: Unable to connect to Intel(R) AMT.' ) ; exit ( 2 ) ; } IntelAmtEntireState [ 'eventlog' ] = messages ; saveEntireAmtStateDone ( ) ; }
// Called when the entire state of Intel AMT is fetched.
function saveEntireAmtStateDone ( ) {
if ( -- IntelAmtEntireStateCalls != 0 ) return ;
var out = fs . openSync ( settings . output , 'w' ) ;
fs . writeSync ( out , Buffer . from ( JSON . stringify ( IntelAmtEntireState ) ) ) ;
fs . closeSync ( out ) ;
console . log ( 'Done, results written to ' + settings . output + '.' ) ;
exit ( 1 ) ;
}
//
// FETCH ALL INTEL AMT MEI STATE
//
// Get Intel AMT information using MEI
2021-07-14 15:47:28 -04:00
// TODO: If this call is called many time at once, it's going to cause issues - Should be fixed since amtMei is now a singleton.
2020-05-22 13:59:02 -04:00
var getAmtInfoFetching = null ;
var getAmtInfoFetchingTimer = null ;
function getAmtInfo ( func , tag ) {
if ( amtMei == null ) { if ( func != null ) { func ( null , tag ) ; } return ; }
if ( getAmtInfoFetching != null ) { getAmtInfoFetching . push ( { f : func , t : tag } ) ; return ; }
getAmtInfoFetching = [ { f : func , t : tag } ] ;
amtMeiTmpState = { Flags : 0 , TrustedHashes : [ ] } ; // Flags: 1=EHBC, 2=CCM, 4=ACM
getAmtInfoFetchingTimer = setTimeout ( function ( ) {
// MEI failed to respond, break out and reset everthing.
for ( var i in getAmtInfoFetching ) { if ( getAmtInfoFetching [ i ] . f != null ) { getAmtInfoFetching [ i ] . f ( amtMeiTmpState , getAmtInfoFetching [ i ] . t ) ; } }
getAmtInfoFetching = null ;
getAmtInfoFetchingTimer = null ;
var amtMeiModule , amtMei ;
try { amtMeiModule = require ( 'amt-mei' ) ; amtMei = new amtMeiModule ( ) ; } catch ( ex ) { console . log ( ex ) ; exit ( 1 ) ; return ; }
amtMei . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + e ) ; exit ( 1 ) ; return ; } ) ;
} , 3000 ) ;
amtMei . getProtocolVersion ( function ( result ) { if ( result != null ) { amtMeiTmpState . MeiVersion = result ; } } ) ;
amtMei . getVersion ( function ( val ) {
amtMeiTmpState . Versions = { } ;
if ( val != null ) {
for ( var version in val . Versions ) { amtMeiTmpState . Versions [ val . Versions [ version ] . Description ] = val . Versions [ version ] . Version ; }
amtMei . getProvisioningMode ( function ( result ) { if ( result != null ) { amtMeiTmpState . ProvisioningMode = result . mode ; } } ) ;
amtMei . getProvisioningState ( function ( result ) { if ( result != null ) { amtMeiTmpState . ProvisioningState = result . state ; } } ) ;
amtMei . getEHBCState ( function ( result ) { if ( ( result != null ) && ( result . EHBC == true ) ) { amtMeiTmpState . Flags += 1 ; } } ) ;
amtMei . getControlMode ( function ( result ) { if ( result != null ) { if ( result . controlMode == 1 ) { amtMeiTmpState . Flags += 2 ; } if ( result . controlMode == 2 ) { amtMeiTmpState . Flags += 4 ; } } } ) ;
//amtMei.getMACAddresses(function (result) { if (result != null) { amtMeiTmpState.mac = result; } });
2021-07-14 15:47:28 -04:00
amtMei . getDnsSuffix ( function ( result ) { if ( result != null ) { amtMeiTmpState . DnsSuffix = result ; } } ) ;
2020-05-22 13:59:02 -04:00
amtMei . getHashHandles ( function ( handles ) {
exitOnCount = handles . length ;
for ( var i = 0 ; i < handles . length ; ++ i ) {
amtMei . getCertHashEntry ( handles [ i ] , function ( result ) {
amtMeiTmpState . TrustedHashes . push ( { Active : result . isActive , Default : result . isDefault , HashAlgorithm : result . hashAlgorithm , Name : result . name , Hash : result . certificateHash } ) ;
if ( -- exitOnCount == 0 ) {
amtMeiTmpState . Notifications = lmsNotifications ; amtMeiState = amtMeiTmpState ;
for ( var i in getAmtInfoFetching ) { if ( getAmtInfoFetching [ i ] . f != null ) { getAmtInfoFetching [ i ] . f ( amtMeiTmpState , getAmtInfoFetching [ i ] . t ) ; } }
getAmtInfoFetching = null ;
clearTimeout ( getAmtInfoFetchingTimer ) ;
getAmtInfoFetchingTimer = null ;
}
} ) ;
}
} ) ;
} else {
amtMeiState = amtMeiTmpState ;
amtMeiState . ProvisioningMode = - 858993460 ;
amtMeiState . TrustedHashes = { } ;
amtMeiState . Notifications = lmsNotifications ;
//console.log('getAmtInfo3', JSON.stringify(amtMeiState));
if ( func != null ) { func ( amtMeiState , tag ) ; }
}
} ) ;
}
//
// MicroLMS
//
var lmsControlSockets = { } ;
var lmsControlSocketsNextId = 1 ;
var lmsNotifications = [ ] ;
var amtLms = null ;
var promise = require ( 'promise' ) ;
function startLms ( func , lmscommander , tag ) {
var ret = new promise ( function ( res , rej ) { this . _res = res ; this . _rej = rej ; } ) ;
var lme _heci = null
try { lme _heci = require ( 'amt-lme' ) ; } catch ( ex ) { }
if ( lme _heci == null ) { if ( func != null ) { func ( 0 , tag ) ; } this . promise . _res ( ) ; return ; }
//var amtLms = null;
var http = require ( 'http' ) ;
console . log ( 'Setting up MEI...' ) ;
try { amtMeiModule = require ( 'amt-mei' ) ; amtMei = new amtMeiModule ( ) ; } catch ( ex ) { console . log ( ex ) ; exit ( 1 ) ; return ; }
amtMei . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + e ) ; exit ( 1 ) ; return ; } ) ;
//console.log("PTHI Connected.");
2020-10-20 21:14:00 -04:00
try { amtLms = new lme _heci ( { debug : settings . lmsdebug } ) ; } catch ( ex ) { if ( func != null ) { func ( 0 , tag ) ; } return ; }
2020-05-22 13:59:02 -04:00
amtLms . promise = ret ;
amtLms . on ( 'error' , function ( e ) {
2021-07-14 15:17:43 -04:00
//console.log('LME connection failed', e);
2020-05-22 13:59:02 -04:00
if ( lmscommander === true ) { //settings.noconsole !== true) {
startMeshCommanderLms ( ) ;
//console.log("LMS started, MeshCommander on HTTP/16994.");
tempTimer = setTimeout ( function ( ) { delete tempTimer ; setupMeiOsAdmin ( func , 2 , tag ) ; } , 100 ) ;
} else {
//console.log('LME connection failed: ' + JSON.stringify(e));
tempTimer = setTimeout ( function ( ) { delete tempTimer ; setupMeiOsAdmin ( func , 0 , tag ) ; } , 100 ) ;
}
this . promise . _res ( ) ;
} ) ;
amtLms . on ( 'notify' , function ( data , options , str , code ) {
if ( code == 'iAMT0052-3' ) {
kvmGetData ( ) ;
} else if ( str != null ) {
var notify = { date : Date . now ( ) , str : str , code : code } ;
lmsNotifications . push ( notify ) ;
while ( lmsNotifications . length > 100 ) { lmsNotifications . shift ( ) ; }
var notifyBuf = Buffer . concat ( [ Buffer . from ( '0900' , 'hex' ) , Buffer . from ( JSON . stringify ( notify ) ) ] ) // Add a notification
for ( var i in lmsControlSockets ) { lmsControlSockets [ i ] . write ( notifyBuf ) ; }
}
} ) ;
//console.log('LME Connecting...');
amtLms . on ( 'bind' , function ( mapping ) {
if ( mapping [ 16992 ] ) { this . removeAllListeners ( 'bind' ) ; } else { return ; }
2021-07-14 15:17:43 -04:00
console . log ( 'Started LMS...' ) ;
2020-05-22 13:59:02 -04:00
amtLms . connected = true ;
this . promise . _res ( ) ;
//console.log("LME Connected.");
if ( settings . noconsole !== true ) {
startMeshCommanderLms ( ) ;
//console.log("LMS started, MeshCommander on HTTP/16994.");
tempTimer = setTimeout ( function ( ) { delete tempTimer ; setupMeiOsAdmin ( func , 2 , tag ) ; } , 100 ) ;
//console.logReferenceCount(tempTimer);
} else {
//console.log("LMS started.");
tempTimer = setTimeout ( function ( ) { delete tempTimer ; setupMeiOsAdmin ( func , 1 , tag ) ; } , 100 ) ;
//console.logReferenceCount(tempTimer);
}
} ) ;
return ( ret ) ;
}
function startMeshCommanderLms ( ) {
amtLms . meshCommander = http . createServer ( ) ;
amtLms . meshCommander . listen ( 16994 ) ;
amtLms . meshCommander . on ( 'upgrade' , function ( req , socket , head ) {
//console.log("WebSocket for " + req.url.split('?')[0]);
switch ( req . url . split ( '?' ) [ 0 ] ) {
case '/lms.ashx' : // MeshCommander control channel (PTHI)
socket . ws = socket . upgradeWebSocket ( ) ;
socket . ws . on ( 'data' , processLmsControlData ) ;
socket . ws . on ( 'end' , function ( ) { if ( lmsControlSockets [ this . id ] ) { delete lmsControlSockets [ this . id ] ; /*console.log('removeControl', JSON.stringify(lmsControlSockets));*/ } } ) ;
var id = lmsControlSocketsNextId ++ ;
lmsControlSockets [ id ] = socket . ws ;
socket . ws . id = id ;
//socket.ws.write(Buffer.concat([Buffer.from('0900', 'hex'), Buffer.from(JSON.stringify(lmsNotifications))])); // Send out full list of notifications
//console.log('addControl', JSON.stringify(lmsControlSockets));
break ;
case '/webrelay.ashx' : // MeshCommander data channel (LME)
socket . ws = socket . upgradeWebSocket ( ) ;
if ( amtLms . connected == true ) {
// Route traffic directly into MicroLMS
amtLms . bindDuplexStream ( socket . ws , 'IPv4' , 16992 ) ;
} else {
// Route traffic to real LMS service
var net = require ( 'net' ) ;
socket . relay = net . connect ( { host : '127.0.0.1' , port : 16992 } )
socket . relay . on ( 'connect' , function ( ) {
socket . ws . on ( 'data' , function ( data ) { socket . relay . write ( data ) ; } ) ;
socket . ws . on ( 'end' , function ( ) { socket . relay . end ( ) ; } ) ;
} ) ;
socket . relay . on ( 'data' , function ( data ) { socket . ws . write ( data ) ; } ) ;
socket . relay . on ( 'close' , function ( ) { socket . ws . end ( ) ; } ) ;
}
break ;
default :
socket . end ( ) ;
break ;
}
} ) ;
amtLms . meshCommander . on ( 'request' , function ( req , rsp ) {
//console.log("WebRequest for " + req.url.split('?')[0]);
switch ( req . url . split ( '?' ) [ 0 ] ) {
case '/' : // Serve MeshCommander Web Application for LMS
var lmscommander = null ;
try { lmscommander = fs . readFileSync ( 'lmscommander.htm' ) ; } catch ( e ) { }
if ( lmscommander != null ) {
rsp . writeHead ( 200 , 'OK' , { Server : 'JSLMS' , 'Cache-Control' : 'max-age=0, no-cache' , 'X-Frame-Options' : 'DENY' , 'Content-Type' : 'text/html' , 'Transfer-Encoding' : 'chunked' } ) ;
rsp . end ( lmscommander ) ;
} else {
rsp . writeHead ( 200 , 'OK' , { Server : 'JSLMS' , 'Cache-Control' : 'max-age=0, no-cache' , 'X-Frame-Options' : 'DENY' , 'Content-Type' : 'text/html' , 'Content-Encoding' : 'gzip' , 'Transfer-Encoding' : 'chunked' , ETag : _IntelAmtWebApp _etag } ) ;
rsp . end ( Buffer . from ( _IntelAmtWebApp , "base64" ) ) ;
}
break ;
default : // Unknown request
rsp . statusCode = 404 ;
rsp . statusMessage = "Not Found" ;
rsp . end ( ) ;
break ;
}
} ) ;
}
function setupMeiOsAdmin ( func , state , tag ) {
if ( amtMei == null ) {
if ( func ) { func ( state , tag ) ; }
} else {
amtMei . getLocalSystemAccount ( function ( x ) {
2020-10-20 21:14:00 -04:00
if ( ( x == null ) || ( x . user == null ) || ( x . pass == null ) ) { if ( func ) { func ( state , tag ) ; } return ; } // No OsAdmin, stop here.
2020-05-22 13:59:02 -04:00
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
oswsstack = new wsman ( transport , '127.0.0.1' , 16992 , x . user , x . pass , false ) ;
osamtstack = new amt ( oswsstack ) ;
if ( func ) { func ( state , tag ) ; }
//var AllWsman = "CIM_SoftwareIdentity,IPS_SecIOService,IPS_ScreenSettingData,IPS_ProvisioningRecordLog,IPS_HostBasedSetupService,IPS_HostIPSettings,IPS_IPv6PortSettings".split(',');
//osamtstack.BatchEnum(null, AllWsman, startLmsWsmanResponse, null, true);
//*************************************
// Setup KVM data channel if this is Intel AMT 12 or above
amtMei . getVersion ( function ( x ) {
var amtver = null ;
try { for ( var i in x . Versions ) { if ( x . Versions [ i ] . Description == 'AMT' ) amtver = parseInt ( x . Versions [ i ] . Version . split ( '.' ) [ 0 ] ) ; } } catch ( e ) { }
if ( ( amtver != null ) && ( amtver >= 12 ) ) {
kvmGetData ( 'skip' ) ; // Clear any previous data, this is a dummy read to about handling old data.
tempTimer = setInterval ( function ( ) { kvmGetData ( ) ; } , 2000 ) ; // Start polling for KVM data.
kvmSetData ( JSON . stringify ( { action : 'restart' , ver : 1 } ) ) ; // Send a restart command to advise the console if present that MicroLMS just started.
}
} ) ;
} ) ;
}
}
function kvmGetData ( tag ) {
osamtstack . IPS _KVMRedirectionSettingData _DataChannelRead ( kvmDataGetResponse , tag ) ;
}
function kvmDataGetResponse ( stack , name , response , status , tag ) {
if ( ( tag != 'skip' ) && ( status == 200 ) && ( response . Body . ReturnValue == 0 ) ) {
var val = null ;
try { val = Buffer . from ( response . Body . DataMessage , 'base64' ) . toString ( ) ; } catch ( e ) { return }
if ( val != null ) { kvmProcessData ( response . Body . RealmsBitmap , response . Body . MessageId , val ) ; }
}
}
var webRtcDesktop = null ;
function kvmProcessData ( realms , messageId , val ) {
var data = null ;
try { data = JSON . parse ( val ) } catch ( e ) { }
if ( ( data != null ) && ( data . action ) ) {
if ( data . action == 'present' ) { kvmSetData ( JSON . stringify ( { action : 'present' , ver : 1 , platform : process . platform } ) ) ; }
if ( data . action == 'offer' ) {
webRtcDesktop = { } ;
var rtc = require ( 'ILibWebRTC' ) ;
webRtcDesktop . webrtc = rtc . createConnection ( ) ;
webRtcDesktop . webrtc . on ( 'connected' , function ( ) { } ) ;
webRtcDesktop . webrtc . on ( 'disconnected' , function ( ) { webRtcCleanUp ( ) ; } ) ;
webRtcDesktop . webrtc . on ( 'dataChannel' , function ( rtcchannel ) {
webRtcDesktop . rtcchannel = rtcchannel ;
var kvmmodule = require ( 'meshDesktop' ) ;
webRtcDesktop . kvm = kvmmodule . getRemoteDesktopStream ( ) ;
webRtcDesktop . kvm . pipe ( webRtcDesktop . rtcchannel , { dataTypeSkip : 1 , end : false } ) ;
webRtcDesktop . rtcchannel . on ( 'end' , function ( ) { webRtcCleanUp ( ) ; } ) ;
webRtcDesktop . rtcchannel . on ( 'data' , function ( x ) { kvmCtrlData ( this , x ) ; } ) ;
webRtcDesktop . rtcchannel . pipe ( webRtcDesktop . kvm , { dataTypeSkip : 1 , end : false } ) ;
//webRtcDesktop.kvm.on('end', function () { console.log('WebRTC DataChannel closed2'); webRtcCleanUp(); });
//webRtcDesktop.rtcchannel.on('data', function (data) { console.log('WebRTC data: ' + data); });
} ) ;
kvmSetData ( JSON . stringify ( { action : 'answer' , ver : 1 , sdp : webRtcDesktop . webrtc . setOffer ( data . sdp ) } ) ) ;
}
}
}
// Polyfill path.join
var path = {
join : function ( ) {
var x = [ ] ;
for ( var i in arguments ) {
var w = arguments [ i ] ;
if ( w != null ) {
while ( w . endsWith ( '/' ) || w . endsWith ( '\\' ) ) { w = w . substring ( 0 , w . length - 1 ) ; }
if ( i != 0 ) {
while ( w . startsWith ( '/' ) || w . startsWith ( '\\' ) ) { w = w . substring ( 1 ) ; }
}
x . push ( w ) ;
}
}
if ( x . length == 0 ) return '/' ;
return x . join ( '/' ) ;
}
} ;
// Get a formated response for a given directory path
function getDirectoryInfo ( reqpath ) {
var response = { path : reqpath , dir : [ ] } ;
if ( ( ( reqpath == undefined ) || ( reqpath == '' ) ) && ( process . platform == 'win32' ) ) {
// List all the drives in the root, or the root itself
var results = null ;
try { results = fs . readDrivesSync ( ) ; } catch ( e ) { } // TODO: Anyway to get drive total size and free space? Could draw a progress bar.
//console.log('a', objToString(results, 0, ' '));
if ( results != null ) {
for ( var i = 0 ; i < results . length ; ++ i ) {
var drive = { n : results [ i ] . name , t : 1 } ;
if ( results [ i ] . type == 'REMOVABLE' ) { drive . dt = 'removable' ; } // TODO: See if this is USB/CDROM or something else, we can draw icons.
response . dir . push ( drive ) ;
}
}
} else {
// List all the files and folders in this path
if ( reqpath == '' ) { reqpath = '/' ; }
var xpath = path . join ( reqpath , '*' ) ;
var results = null ;
try { results = fs . readdirSync ( xpath ) ; } catch ( e ) { }
if ( results != null ) {
for ( var i = 0 ; i < results . length ; ++ i ) {
if ( ( results [ i ] != '.' ) && ( results [ i ] != '..' ) ) {
var stat = null , p = path . join ( reqpath , results [ i ] ) ;
try { stat = fs . statSync ( p ) ; } catch ( e ) { } // TODO: Get file size/date
if ( ( stat != null ) && ( stat != undefined ) ) {
if ( stat . isDirectory ( ) == true ) {
response . dir . push ( { n : results [ i ] , t : 2 , d : stat . mtime } ) ;
} else {
response . dir . push ( { n : results [ i ] , t : 3 , s : stat . size , d : stat . mtime } ) ;
}
}
}
}
}
}
return response ;
}
// Process KVM control channel data
function kvmCtrlData ( channel , cmd ) {
if ( cmd . length > 0 && cmd . charCodeAt ( 0 ) != 123 ) {
// This is upload data
if ( this . fileupload != null ) {
cmd = Buffer . from ( cmd , 'base64' ) ;
var header = cmd . readUInt32BE ( 0 ) ;
if ( ( header == 0x01000000 ) || ( header == 0x01000001 ) ) {
fs . writeSync ( this . fileupload . fp , cmd . slice ( 4 ) ) ;
channel . write ( { action : 'upload' , sub : 'ack' , reqid : this . fileupload . reqid } ) ;
if ( header == 0x01000001 ) { fs . closeSync ( this . fileupload . fp ) ; this . fileupload = null ; } // Close the file
}
}
return ;
}
//console.log('KVM Ctrl Data', cmd);
try { cmd = JSON . parse ( cmd ) ; } catch ( ex ) { console . error ( 'Invalid JSON: ' + cmd ) ; return ; }
if ( ( cmd . path != null ) && ( process . platform != 'win32' ) && ( cmd . path [ 0 ] != '/' ) ) { cmd . path = '/' + cmd . path ; } // Add '/' to paths on non-windows
switch ( cmd . action ) {
case 'ping' : {
// This is a keep alive
channel . write ( { action : 'pong' } ) ;
break ;
}
case 'ls' : {
/ *
// Close the watcher if required
var samepath = ( ( this . httprequest . watcher != undefined ) && ( cmd . path == this . httprequest . watcher . path ) ) ;
if ( ( this . httprequest . watcher != undefined ) && ( samepath == false ) ) {
//console.log('Closing watcher: ' + this.httprequest.watcher.path);
//this.httprequest.watcher.close(); // TODO: This line causes the agent to crash!!!!
delete this . httprequest . watcher ;
}
* /
// Send the folder content to the browser
var response = getDirectoryInfo ( cmd . path ) ;
if ( cmd . reqid != undefined ) { response . reqid = cmd . reqid ; }
channel . write ( response ) ;
/ *
// Start the directory watcher
if ( ( cmd . path != '' ) && ( samepath == false ) ) {
var watcher = fs . watch ( cmd . path , onFileWatcher ) ;
watcher . tunnel = this . httprequest ;
watcher . path = cmd . path ;
this . httprequest . watcher = watcher ;
//console.log('Starting watcher: ' + this.httprequest.watcher.path);
}
* /
break ;
}
case 'mkdir' : {
// Create a new empty folder
fs . mkdirSync ( cmd . path ) ;
break ;
}
case 'rm' : {
// Remove many files or folders
for ( var i in cmd . delfiles ) {
var fullpath = path . join ( cmd . path , cmd . delfiles [ i ] ) ;
try { fs . unlinkSync ( fullpath ) ; } catch ( e ) { console . log ( e ) ; }
}
break ;
}
case 'rename' : {
// Rename a file or folder
var oldfullpath = path . join ( cmd . path , cmd . oldname ) ;
var newfullpath = path . join ( cmd . path , cmd . newname ) ;
try { fs . renameSync ( oldfullpath , newfullpath ) ; } catch ( e ) { console . log ( e ) ; }
break ;
}
case 'download' : {
// Download a file, to browser
var sendNextBlock = 0 ;
if ( cmd . sub == 'start' ) { // Setup the download
if ( this . filedownload != null ) { channel . write ( { action : 'download' , sub : 'cancel' , id : this . filedownload . id } ) ; delete this . filedownload ; }
this . filedownload = { id : cmd . id , path : cmd . path , ptr : 0 }
try { this . filedownload . f = fs . openSync ( this . filedownload . path , 'rbN' ) ; } catch ( e ) { channel . write ( { action : 'download' , sub : 'cancel' , id : this . filedownload . id } ) ; delete this . filedownload ; }
if ( this . filedownload ) { channel . write ( { action : 'download' , sub : 'start' , id : cmd . id } ) ; }
} else if ( ( this . filedownload != null ) && ( cmd . id == this . filedownload . id ) ) { // Download commands
if ( cmd . sub == 'startack' ) { sendNextBlock = 8 ; } else if ( cmd . sub == 'stop' ) { delete this . filedownload ; } else if ( cmd . sub == 'ack' ) { sendNextBlock = 1 ; }
}
// Send the next download block(s)
while ( sendNextBlock > 0 ) {
sendNextBlock -- ;
var buf = Buffer . alloc ( 4096 ) ;
var len = fs . readSync ( this . filedownload . f , buf , 4 , 4092 , null ) ;
this . filedownload . ptr += len ;
if ( len < 4092 ) { buf . writeInt32BE ( 0x01000001 , 0 ) ; fs . closeSync ( this . filedownload . f ) ; delete this . filedownload ; sendNextBlock = 0 ; } else { buf . writeInt32BE ( 0x01000000 , 0 ) ; }
channel . write ( buf . slice ( 0 , len + 4 ) . toString ( 'base64' ) ) ; // Write as Base64
}
break ;
}
case 'upload' : {
// Upload a file, from browser
if ( cmd . sub == 'start' ) { // Start the upload
if ( this . fileupload != null ) { fs . closeSync ( this . fileupload . fp ) ; }
if ( ! cmd . path || ! cmd . name ) break ;
this . fileupload = { reqid : cmd . reqid } ;
var filepath = path . join ( cmd . path , cmd . name ) ;
try { this . fileupload . fp = fs . openSync ( filepath , 'wbN' ) ; } catch ( e ) { }
if ( this . fileupload . fp ) { channel . write ( { action : 'upload' , sub : 'start' , reqid : this . fileupload . reqid } ) ; } else { this . fileupload = null ; channel . write ( { action : 'upload' , sub : 'error' , reqid : this . fileupload . reqid } ) ; }
}
else if ( cmd . sub == 'cancel' ) { // Stop the upload
if ( this . fileupload != null ) { fs . closeSync ( this . fileupload . fp ) ; this . fileupload = null ; }
}
break ;
}
case 'copy' : {
// Copy a bunch of files from scpath to dspath
for ( var i in cmd . names ) {
var sc = path . join ( cmd . scpath , cmd . names [ i ] ) , ds = path . join ( cmd . dspath , cmd . names [ i ] ) ;
if ( sc != ds ) { try { fs . copyFileSync ( sc , ds ) ; } catch ( e ) { } }
}
break ;
}
case 'move' : {
// Move a bunch of files from scpath to dspath
for ( var i in cmd . names ) {
var sc = path . join ( cmd . scpath , cmd . names [ i ] ) , ds = path . join ( cmd . dspath , cmd . names [ i ] ) ;
if ( sc != ds ) { try { fs . copyFileSync ( sc , ds ) ; fs . unlinkSync ( sc ) ; } catch ( e ) { } }
}
break ;
}
default :
// Unknown action, ignore it.
break ;
}
}
function webRtcCleanUp ( ) {
if ( webRtcDesktop == null ) return ;
if ( webRtcDesktop . rtcchannel ) {
try { webRtcDesktop . rtcchannel . close ( ) ; } catch ( e ) { }
try { webRtcDesktop . rtcchannel . removeAllListeners ( 'data' ) ; } catch ( e ) { }
try { webRtcDesktop . rtcchannel . removeAllListeners ( 'end' ) ; } catch ( e ) { }
delete webRtcDesktop . rtcchannel ;
}
if ( webRtcDesktop . webrtc ) {
try { webRtcDesktop . webrtc . close ( ) ; } catch ( e ) { }
try { webRtcDesktop . webrtc . removeAllListeners ( 'connected' ) ; } catch ( e ) { }
try { webRtcDesktop . webrtc . removeAllListeners ( 'disconnected' ) ; } catch ( e ) { }
try { webRtcDesktop . webrtc . removeAllListeners ( 'dataChannel' ) ; } catch ( e ) { }
delete webRtcDesktop . webrtc ;
}
if ( webRtcDesktop . kvm ) {
try { webRtcDesktop . kvm . end ( ) ; } catch ( e ) { }
delete webRtcDesktop . kvm ;
}
webRtcDesktop = null ;
}
function kvmSetData ( x ) {
osamtstack . IPS _KVMRedirectionSettingData _DataChannelWrite ( Buffer . from ( x ) . toString ( 'base64' ) , function ( ) { } ) ;
}
function startLmsWsmanResponse ( stack , name , responses , status ) {
if ( status == 600 ) { console . log ( "ERROR: Unable to connect to Intel(R) AMT." ) ; }
else if ( status != 200 ) { console . log ( "ERROR: Unable to get object from Intel(R) AMT, status = " + status + "." ) ; }
else {
//console.log(JSON.stringify(responses), status);
var amtlogicalelements = responses [ 'CIM_SoftwareIdentity' ] . responses ;
if ( amtlogicalelements . length > 0 ) {
var v = getInstance ( amtlogicalelements , 'AMT' ) [ 'VersionString' ] ;
amtversion = parseInt ( v . split ( '.' ) [ 0 ] ) ;
amtversionmin = parseInt ( v . split ( '.' ) [ 1 ] ) ;
//console.log(amtversion, amtversionmin);
}
}
}
// Process commands in the LMS control channel
// Command 9 is add a notification.
function processLmsControlData ( data ) {
if ( data . length < 2 ) return ;
var cmdid = data . readUInt16LE ( 0 ) ;
switch ( cmdid ) {
case 1 : // Request basic Intel AMT information (CMD = 1)
{ getAmtInfo ( function ( meinfo , socket ) { meinfo . LoginMode = 2 ; socket . write ( Buffer . concat ( [ Buffer . from ( '0100' , 'hex' ) , Buffer . from ( JSON . stringify ( meinfo ) ) ] ) ) ; } , this ) ; break ; }
case 2 : // Intel AMT MEI Unprovision (CMD = 2)
{ if ( data . length < 6 ) break ; amtMei . unprovision ( data . readUInt32LE ( 2 ) , function ( status , socket ) { var data = Buffer . alloc ( 6 ) ; data . writeUInt16LE ( 2 , 0 ) ; data . writeUInt32LE ( status , 2 ) ; socket . write ( data ) ; } , this ) ; break ; }
case 3 : // Intel AMT MEI GetLocalSystemAccount (CMD = 3)
{ amtMei . getLocalSystemAccount ( function ( account , socket ) { socket . write ( Buffer . concat ( [ Buffer . from ( '030000000000' , 'hex' ) , account . raw ] ) ) ; } , this ) ; break ; }
case 4 : // Instruct Intel AMT to start remote configuration (CMD = 4)
{ amtMei . startConfiguration ( function ( status , socket ) { var data = Buffer . alloc ( 6 ) ; data . writeUInt16LE ( 7 , 0 ) ; data . writeUInt32LE ( status , 2 ) ; socket . write ( data ) ; } , this ) ; break ; }
case 5 : // Instruct Intel AMT to stop remote configuration (CMD = 5)
{ amtMei . stopConfiguration ( function ( status , socket ) { var data = Buffer . alloc ( 6 ) ; data . writeUInt16LE ( 7 , 0 ) ; data . writeUInt32LE ( status , 2 ) ; socket . write ( data ) ; } , this ) ; break ; }
case 6 : // Instruct Intel AMT connect CIRA (CMD = 6)
{ amtMei . openUserInitiatedConnection ( function ( status , socket ) { var data = Buffer . alloc ( 6 ) ; data . writeUInt16LE ( 7 , 0 ) ; data . writeUInt32LE ( status , 2 ) ; socket . write ( data ) ; } , this ) ; break ; }
case 7 : // Instruct Intel AMT disconnect CIRA (CMD = 7)
{ amtMei . closeUserInitiatedConnection ( function ( status , socket ) { var data = Buffer . alloc ( 6 ) ; data . writeUInt16LE ( 7 , 0 ) ; data . writeUInt32LE ( status , 2 ) ; socket . write ( data ) ; } , this ) ; break ; }
case 8 : // Get Intel AMT CIRA State (CMD = 8)
{ amtMei . getRemoteAccessConnectionStatus ( function ( state , socket ) { var data = Buffer . alloc ( 6 ) ; data . writeUInt16LE ( 8 , 0 ) ; data . writeUInt32LE ( state . status , 2 ) ; socket . write ( Buffer . concat ( [ data , state . raw ] ) ) ; } , this ) ; break ; }
default :
// Unknown action, ignore it.
break ;
}
}
//
// MeshCentral TCP port router
//
function startRouter ( ) {
// Start by requesting a login token, this is needed because of 2FA and check that we have correct credentials from the start
var options ;
try {
2021-03-24 16:36:23 -04:00
// Parse the URL
options = http . parseUri ( settings . serverurl . split ( 'meshrelay.ashx' ) . join ( 'control.ashx' ) ) ;
// Figure out the 2FA token to use if any
var xtoken = null ;
if ( settings . emailtoken ) { xtoken = '**email**' ; }
else if ( settings . smstoken ) { xtoken = '**sms**' ; }
else if ( settings . token != null ) { xtoken = settings . token ; }
// Complete the URL and add a x-meshauth header if needed
var xurlargs = [ ] ;
2021-04-02 20:20:36 -04:00
if ( settings . serverid == null ) {
// Authenticate the server using HTTPS cert hash
if ( settings . authcookie != null ) {
xurlargs . push ( 'auth=' + settings . authcookie ) ;
if ( xtoken != null ) { xurlargs . push ( 'token=' + xtoken ) ; }
2021-03-24 16:36:23 -04:00
} else {
2021-04-02 20:20:36 -04:00
if ( xtoken != null ) {
options . headers = { 'x-meshauth' : Buffer . from ( settings . username , 'binary' ) . toString ( 'base64' ) + ',' + Buffer . from ( settings . password , 'binary' ) . toString ( 'base64' ) + ',' + Buffer . from ( xtoken , 'binary' ) . toString ( 'base64' ) } ;
} else {
options . headers = { 'x-meshauth' : Buffer . from ( settings . username , 'binary' ) . toString ( 'base64' ) + ',' + Buffer . from ( settings . password , 'binary' ) . toString ( 'base64' ) } ;
}
2021-03-24 16:36:23 -04:00
}
2021-04-02 20:37:36 -04:00
} else { options . headers = { 'x-meshauth' : '*' } ; } // Request inner authentication
2021-03-24 16:36:23 -04:00
if ( settings . loginkey ) { xurlargs . push ( 'key=' + settings . loginkey ) ; }
if ( xurlargs . length > 0 ) { options . path += '?' + xurlargs . join ( '&' ) ; }
2020-05-22 13:59:02 -04:00
} catch ( e ) { console . log ( "Unable to parse \"serverUrl\"." ) ; process . exit ( 1 ) ; return ; }
2021-03-24 16:36:23 -04:00
2021-05-25 20:10:30 -04:00
debug ( 1 , "Connecting to " + options . host + "." ) ;
2020-05-22 13:59:02 -04:00
options . checkServerIdentity = onVerifyServer ;
options . rejectUnauthorized = false ;
settings . websocket = http . request ( options ) ;
settings . websocket . upgrade = OnServerWebSocket ;
settings . websocket . on ( 'error' , function ( e ) { console . log ( "ERROR: " + JSON . stringify ( e ) ) ; } ) ;
settings . websocket . end ( ) ;
}
function OnServerWebSocket ( msg , s , head ) {
2021-05-25 20:10:30 -04:00
debug ( 1 , "Connected..." ) ;
2020-05-22 13:59:02 -04:00
settings . webchannel = s ;
s . on ( 'data' , function ( msg ) {
var command = JSON . parse ( msg ) ;
switch ( command . action ) {
case 'close' : {
if ( command . cause == 'noauth' ) {
if ( command . msg == 'tokenrequired' ) {
if ( command . email2fasent === true ) {
console . log ( "Login token email sent." ) ;
2021-04-03 01:35:11 -04:00
} else if ( ( command . email2fa === true ) && ( command . sms2fa === true ) ) {
2021-03-24 16:36:23 -04:00
console . log ( "Login token required, use --token [token], or --emailtoken, --smstoken get a token." ) ;
2021-04-03 01:35:11 -04:00
} else if ( command . sms2fa === true ) {
console . log ( "Login token required, use --token [token], or --smstoken get a token." ) ;
} else if ( command . email2fa === true ) {
console . log ( "Login token required, use --token [token], or --emailtoken get a token." ) ;
2020-05-22 13:59:02 -04:00
} else {
console . log ( "Login token required, use --token [token]." ) ;
}
2021-05-26 01:30:33 -04:00
} else if ( command . msg == 'badtlscert' ) {
console . log ( "Invalid TLS certificate detected." ) ;
} else if ( command . msg == 'badargs' ) {
console . log ( "Invalid protocol arguments." ) ;
} else {
console . log ( "Invalid username/password." ) ;
}
2020-05-22 13:59:02 -04:00
} else { console . log ( "Server disconnected: " + command . msg ) ; }
process . exit ( 1 ) ;
return ;
}
case 'serverinfo' : {
s . write ( "{\"action\":\"authcookie\"}" ) ; // Ask for our first authentication cookie
break ;
}
case 'authcookie' : {
if ( settings . acookie == null ) {
settings . acookie = command . cookie ;
settings . rcookie = command . rcookie ;
settings . renewCookieTimer = setInterval ( function ( ) { settings . webchannel . write ( "{\"action\":\"authcookie\"}" ) ; } , 600000 ) ; // Ask for new cookie every 10 minutes
startRouterEx ( ) ;
} else {
settings . acookie = command . cookie ;
settings . rcookie = command . rcookie ;
}
break ;
}
2021-04-02 00:51:25 -04:00
case 'serverAuth' : {
// Check that the server certificate matches the serverid we have
var hasher = require ( 'SHA384Stream' ) . create ( ) ;
var certDer = Buffer . from ( command . cert , 'base64' ) ;
var cert = require ( 'tls' ) . loadCertificate ( { der : certDer } ) ;
if ( cert . getKeyHash ( ) . toString ( 'hex' ) != settings . serverid ) { console . log ( "Unable to authenticate the server, invalid server identifier." ) ; process . exit ( 1 ) ; return ; }
// Hash the signed data and verify the server signature
var signDataHash = hasher . syncHash ( Buffer . concat ( [ Buffer . from ( settings . serverAuthClientNonce , 'base64' ) , Buffer . from ( settings . meshServerTlsHash , 'hex' ) , Buffer . from ( command . nonce , 'base64' ) ] ) ) ;
if ( require ( 'RSA' ) . verify ( require ( 'RSA' ) . TYPES . SHA384 , cert , signDataHash , Buffer . from ( command . signature , 'base64' ) ) == false ) { console . log ( "Unable to authenticate the server, invalid signature." ) ; process . exit ( 1 ) ; return ; }
2021-05-25 20:10:30 -04:00
debug ( 1 , "Authenticated the server." ) ;
2021-04-02 00:51:25 -04:00
2021-04-06 12:22:26 -04:00
// Switch to using HTTPS TLS certificate for authentication
delete settings . serverid ;
settings . serverhttpshash = settings . meshServerTlsHash ;
delete settings . meshServerTlsHash ;
2021-04-02 20:20:36 -04:00
// Figure out the 2FA token to use if any
var xtoken = null ;
if ( settings . emailtoken ) { xtoken = '**email**' ; }
else if ( settings . smstoken ) { xtoken = '**sms**' ; }
else if ( settings . token != null ) { xtoken = settings . token ; }
// Authenticate the server using HTTPS cert hash
if ( settings . authcookie != null ) {
if ( xtoken != null ) {
s . write ( "{\"action\":\"userAuth\",\"auth\":\"" + settings . authcookie + "\",\"token\":\"" + xtoken + "\"}" ) ;
} else {
s . write ( "{\"action\":\"userAuth\",\"auth\":\"" + settings . authcookie + "\"}" ) ;
}
} else {
if ( xtoken != null ) {
s . write ( "{\"action\":\"userAuth\",\"username\":\"" + Buffer . from ( settings . username , 'binary' ) . toString ( 'base64' ) + "\",\"password\":\"" + Buffer . from ( settings . password , 'binary' ) . toString ( 'base64' ) + "\",\"token\":\"" + xtoken + "\"}" ) ;
} else {
s . write ( "{\"action\":\"userAuth\",\"username\":\"" + Buffer . from ( settings . username , 'binary' ) . toString ( 'base64' ) + "\",\"password\":\"" + Buffer . from ( settings . password , 'binary' ) . toString ( 'base64' ) + "\"}" ) ;
}
}
2021-04-02 00:51:25 -04:00
break ;
}
2020-05-22 13:59:02 -04:00
}
} ) ;
s . on ( 'error' , function ( ) { console . log ( "Server connection error." ) ; process . exit ( 1 ) ; return ; } ) ;
s . on ( 'close' , function ( ) { console . log ( "Server closed the connection." ) ; process . exit ( 1 ) ; return ; } ) ;
2021-04-02 00:51:25 -04:00
// Perform inner server authentication
2021-04-02 20:20:36 -04:00
if ( settings . serverid != null ) {
2021-05-25 20:10:30 -04:00
debug ( 1 , "Authenticating the server..." ) ;
2021-04-02 20:20:36 -04:00
settings . serverAuthClientNonce = require ( 'EncryptionStream' ) . GenerateRandom ( 48 ) . toString ( 'base64' ) ;
s . write ( "{\"action\":\"serverAuth\",\"cnonce\":\"" + settings . serverAuthClientNonce + "\",\"tlshash\":\"" + settings . meshServerTlsHash + "\"}" ) ; // Ask for server authentication
}
2020-05-22 13:59:02 -04:00
}
function startRouterEx ( ) {
tcpserver = net . createServer ( OnTcpClientConnected ) ;
tcpserver . on ( 'error' , function ( e ) { console . log ( "ERROR: " + JSON . stringify ( e ) ) ; exit ( 0 ) ; return ; } ) ;
try {
tcpserver . listen ( settings . localport , function ( ) {
// We started listening.
if ( settings . remotetarget == null ) {
console . log ( 'Redirecting local port ' + settings . localport + ' to remote port ' + settings . remoteport + '.' ) ;
} else {
console . log ( 'Redirecting local port ' + settings . localport + ' to ' + settings . remotetarget + ':' + settings . remoteport + '.' ) ;
}
console . log ( "Press ctrl-c to exit." ) ;
// If settings has a "cmd", run it now.
//process.exec("notepad.exe");
} ) ;
} catch ( ex ) { console . log ( "Unable to bind to local TCP port " + settings . localport + "." ) ; exit ( 1 ) ; return ; }
}
// Called when a TCP connect is received on the local port. Launch a tunnel.
function OnTcpClientConnected ( c ) {
try {
// 'connection' listener
debug ( 1 , "Client connected" ) ;
c . on ( 'end' , function ( ) { disconnectTunnel ( this , this . websocket , "Client closed" ) ; } ) ;
c . pause ( ) ;
var options ;
try {
options = http . parseUri ( settings . serverurl + '?auth=' + settings . acookie + '&nodeid=' + settings . remotenodeid + '&tcpport=' + settings . remoteport + ( settings . remotetarget == null ? '' : '&tcpaddr=' + settings . remotetarget ) ) ;
} catch ( e ) { console . log ( "Unable to parse \"serverUrl\"." ) ; process . exit ( 1 ) ; return ; }
options . checkServerIdentity = onVerifyServer ;
options . rejectUnauthorized = false ;
c . websocket = http . request ( options ) ;
c . websocket . tcp = c ;
c . websocket . tunneling = false ;
c . websocket . upgrade = OnWebSocket ;
c . websocket . on ( 'error' , function ( e ) { console . log ( "ERROR: " + JSON . stringify ( e ) ) ; } ) ;
c . websocket . end ( ) ;
} catch ( e ) { debug ( 2 , e ) ; }
}
// Disconnect both TCP & WebSocket connections and display a message.
function disconnectTunnel ( tcp , ws , msg ) {
if ( ws != null ) { try { ws . end ( ) ; } catch ( e ) { debug ( 2 , e ) ; } }
if ( tcp != null ) { try { tcp . end ( ) ; } catch ( e ) { debug ( 2 , e ) ; } }
debug ( 1 , "Tunnel disconnected: " + msg ) ;
}
// Called when the web socket gets connected
function OnWebSocket ( msg , s , head ) {
debug ( 1 , "Websocket connected" ) ;
s . on ( 'data' , function ( msg ) {
if ( this . parent . tunneling == false ) {
msg = msg . toString ( ) ;
if ( ( msg == 'c' ) || ( msg == 'cr' ) ) {
2020-07-19 17:45:29 -04:00
// Pipe the connection, but don't pipe text websocket frames into the TCP socket.
this . parent . tunneling = true ; this . pipe ( this . parent . tcp , { dataTypeSkip : 1 } ) ; this . parent . tcp . pipe ( this ) ; debug ( 1 , "Tunnel active" ) ;
2020-05-22 13:59:02 -04:00
} else if ( ( msg . length > 6 ) && ( msg . substring ( 0 , 6 ) == 'error:' ) ) {
console . log ( msg . substring ( 6 ) ) ;
disconnectTunnel ( this . tcp , this , msg . substring ( 6 ) ) ;
}
}
} ) ;
s . on ( 'error' , function ( ) { disconnectTunnel ( this . tcp , this , 'Websocket error' ) ; } ) ;
s . on ( 'close' , function ( ) { disconnectTunnel ( this . tcp , this , 'Websocket closed' ) ; } ) ;
s . parent = this ;
}
// Try to discover the location of the mesh server
function discoverMeshServer ( ) { console . log ( "Looking for server..." ) ; discoveryInterval = setInterval ( discoverMeshServerOnce , 5000 ) ; discoverMeshServerOnce ( ) ; }
// Try to discover the location of the mesh server only once
function discoverMeshServerOnce ( ) {
var interfaces = os . networkInterfaces ( ) ;
for ( var adapter in interfaces ) {
if ( interfaces . hasOwnProperty ( adapter ) ) {
for ( var i = 0 ; i < interfaces [ adapter ] . length ; ++ i ) {
var addr = interfaces [ adapter ] [ i ] ;
multicastSockets [ i ] = dgram . createSocket ( { type : ( addr . family == 'IPv4' ? 'udp4' : 'udp6' ) } ) ;
multicastSockets [ i ] . bind ( { address : addr . address , exclusive : false } ) ;
if ( addr . family == 'IPv4' ) {
try {
multicastSockets [ i ] . addMembership ( membershipIPv4 ) ;
//multicastSockets[i].setMulticastLoopback(true);
multicastSockets [ i ] . once ( 'message' , OnMulticastMessage ) ;
multicastSockets [ i ] . send ( settings . serverid , 16989 , membershipIPv4 ) ;
} catch ( e ) { }
}
}
}
}
}
// Called when a multicast packet is received
function OnMulticastMessage ( msg , rinfo ) {
var m = msg . toString ( ) . split ( '|' ) ;
if ( ( m . length == 3 ) && ( m [ 0 ] == 'MeshCentral2' ) && ( m [ 1 ] == settings . serverid ) ) {
settings . serverurl = m [ 2 ] . replace ( '%s' , rinfo . address ) . replace ( '/agent.ashx' , '/meshrelay.ashx' ) ;
console . log ( "Found server at " + settings . serverurl + "." ) ;
if ( discoveryInterval != null ) { clearInterval ( discoveryInterval ) ; discoveryInterval = null ; }
startRouter ( ) ;
}
}
//
// IDER
//
ider = null ;
iderIdleTimer = null ;
// Perform IDER
function performIder ( ) {
if ( ( settings . floppy != null ) && fs . existsSync ( settings . floppy ) == false ) { console . log ( "Unable to floppy image file: " + settings . floppy ) ; process . exit ( ) ; return ; }
if ( ( settings . cdrom != null ) && fs . existsSync ( settings . cdrom ) == false ) { console . log ( "Unable to CDROM image file: " + settings . cdrom ) ; process . exit ( ) ; return ; }
try {
var sfloppy = null , scdrom = null ;
if ( settings . floppy ) { try { if ( sfloppy = fs . statSync ( settings . floppy ) ) { sfloppy . file = fs . openSync ( settings . floppy , 'rbN' ) ; } } catch ( ex ) { console . log ( ex ) ; process . exit ( 1 ) ; return ; } }
if ( settings . cdrom ) { try { scdrom = fs . statSync ( settings . cdrom ) ; if ( scdrom ) { scdrom . file = fs . openSync ( settings . cdrom , 'rbN' ) ; } } catch ( ex ) { console . log ( ex ) ; process . exit ( 1 ) ; return ; } }
ider = require ( 'amt-redir-duk' ) ( require ( 'amt-ider' ) ( ) ) ;
ider . onStateChanged = onIderStateChange ;
ider . m . floppy = sfloppy ;
ider . m . cdrom = scdrom ;
ider . m . iderStart = 1 ; // OnReboot = 0, Graceful = 1, Now = 2
ider . m . debug = ( settings . debuglevel > 0 ) ;
if ( settings . timeout > 0 ) { ider . m . sectorStats = iderSectorStats ; }
//ider.digestRealmMatch = wsstack.comm.digestRealm;
//ider.tlsv1only = amtstack.wsman.comm.tlsv1only;
ider . Start ( settings . hostname , ( settings . tls == true ) ? 16995 : 16994 , settings . username ? 'admin' : settings . username , settings . password , settings . tls ) ;
} catch ( ex ) { console . log ( ex ) ; }
}
function onIderStateChange ( stack , state ) { console . log ( [ "Disconnected" , "Connecting..." , "Connected..." , "Started IDER..." ] [ state ] ) ; }
function iderSectorStats ( mode , dev , mediaBlocks , lba , len ) {
if ( iderIdleTimer != null ) { clearTimeout ( iderIdleTimer ) ; }
iderIdleTimer = setTimeout ( function ( ) { console . log ( "Idle timeout" ) ; process . exit ( 1 ) ; } , 1000 * settings . timeout ) ;
}
//
// Intel AMT IPv4 wired configuration
//
function performAmtNetConfig ( args ) {
if ( ( settings . hostname == '127.0.0.1' ) || ( settings . hostname . toLowerCase ( ) == 'localhost' ) ) {
settings . noconsole = true ; startLms ( performAmtNetConfig0 , false , args ) ;
} else {
performAmtNetConfig0 ( 1 , args ) ;
}
}
function performAmtNetConfig0 ( state , args ) {
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
amtstack . BatchEnum ( null , [ 'AMT_EthernetPortSettings' ] , performAmtNetConfig1 , args ) ;
}
function performAmtNetConfig1 ( stack , name , response , status , args ) {
if ( status == 200 ) {
// Set wired and wireless interfaces
var amtwirelessif = - 1 ;
var amtwiredif = - 1 ;
for ( var y in response [ 'AMT_EthernetPortSettings' ] . responses ) {
var z = response [ 'AMT_EthernetPortSettings' ] . responses [ y ] ;
if ( z [ 'WLANLinkProtectionLevel' ] || ( y == 1 ) ) { amtwirelessif = y ; } // Set the wireless interface, this seems to cover new wireless only computers and older computers with dual interfaces.
if ( y == 0 ) { if ( ( amtwirelessif != y ) && ( z [ 'MACAddress' ] != '00-00-00-00-00-00' ) ) { amtwiredif = y ; } } // On computers with only wireless, the wired interface will have a null MAC
}
// Check if configuration change is required
if ( args ) {
var docall = false ;
var x = JSON . parse ( JSON . stringify ( response [ 'AMT_EthernetPortSettings' ] . responses [ amtwiredif ] ) ) ;
var y = response [ 'AMT_EthernetPortSettings' ] . responses [ amtwiredif ] ;
delete x [ 'IpSyncEnabled' ] ;
delete x [ 'LinkIsUp' ] ;
delete x [ 'LinkPolicy' ] ;
delete x [ 'MACAddress' ] ;
delete x [ 'SharedDynamicIP' ] ;
delete x [ 'SharedMAC' ] ;
delete x [ 'SharedStaticIp' ] ;
if ( ( y [ 'IpSyncEnabled' ] == false ) && ( args . ipsync === '1' ) ) { x [ 'IpSyncEnabled' ] = true ; docall = true ; }
if ( ( y [ 'IpSyncEnabled' ] == true ) && ( args . ipsync === '0' ) ) { x [ 'IpSyncEnabled' ] = false ; docall = true ; }
if ( args . dhcp && ( amtwiredif != - 1 ) && ( response [ 'AMT_EthernetPortSettings' ] . responses [ amtwiredif ] . DHCPEnabled == false ) ) {
// Change to DHCP
x [ 'DHCPEnabled' ] = true ;
docall = true ;
}
else if ( args . static && ( amtwiredif != - 1 ) && ( response [ 'AMT_EthernetPortSettings' ] . responses [ amtwiredif ] . DHCPEnabled == true ) ) {
// Change to STATIC
x [ 'DHCPEnabled' ] = false ;
if ( args . ip ) { x [ 'IPAddress' ] = args . ip ; } else { console . log ( "Missing IPv4 address, use --ip 1.2.3.4" ) ; process . exit ( 1 ) ; }
if ( args . subnet ) { x [ 'SubnetMask' ] = args . subnet ; } else { console . log ( "Missing IPv4 subnet, use --subnet 255.255.255.0" ) ; process . exit ( 1 ) ; }
if ( args . gateway ) { x [ 'DefaultGateway' ] = args . gateway ; }
if ( args . dns ) { x [ 'PrimaryDNS' ] = args . dns ; }
if ( args . dns2 ) { x [ 'SecondaryDNS' ] = args . dns2 ; }
docall = true ;
}
if ( docall ) {
if ( x [ 'DHCPEnabled' ] == true ) {
delete x [ 'IPAddress' ] ;
delete x [ 'DefaultGateway' ] ;
delete x [ 'PrimaryDNS' ] ;
delete x [ 'SecondaryDNS' ] ;
delete x [ 'SubnetMask' ] ;
}
pendingAmtConfigActions ++ ;
//console.log(JSON.stringify(x, 4, ' '));
amtstack . Put ( 'AMT_EthernetPortSettings' , x , function ( stack , name , response , status ) { if ( status != 200 ) { console . log ( "Error, status " + status + "." ) ; } if ( -- pendingAmtConfigActions == 0 ) { performAmtNetConfig0 ( ) ; } } , null , 0 , x ) ;
}
}
if ( pendingAmtConfigActions == 0 ) {
var maxlen = 0 ;
if ( amtwiredif != - 1 ) { for ( var i in response [ 'AMT_EthernetPortSettings' ] . responses [ amtwiredif ] ) { if ( i . length > maxlen ) { maxlen = i . length ; } } }
if ( amtwirelessif != - 1 ) { for ( var i in response [ 'AMT_EthernetPortSettings' ] . responses [ amtwirelessif ] ) { if ( i . length > maxlen ) { maxlen = i . length ; } } }
if ( amtwiredif != - 1 ) { // Wired
var z = response [ 'AMT_EthernetPortSettings' ] . responses [ amtwiredif ] ;
console . log ( "--WIRED---" ) ;
for ( var i in z ) {
if ( [ 'ElementName' , 'InstanceID' ] . indexOf ( i ) == - 1 ) {
var name = i ;
while ( name . length < maxlen ) { name += ' ' ; }
console . log ( name + ' : ' + z [ i ] ) ;
}
}
}
if ( amtwirelessif != - 1 ) { // Wireless
var z = response [ 'AMT_EthernetPortSettings' ] . responses [ amtwirelessif ] ;
console . log ( "--WIRELESS---" ) ;
for ( var i in z ) {
if ( [ 'ElementName' , 'InstanceID' ] . indexOf ( i ) == - 1 ) {
var name = i ;
while ( name . length < maxlen ) { name += ' ' ; }
console . log ( name + ' : ' + z [ i ] ) ;
}
}
}
process . exit ( 0 ) ;
}
} else {
console . log ( "Error, status " + status + "." ) ;
process . exit ( 1 ) ;
}
}
//
// Intel AMT Wifi configuration
//
function performAmtWifiConfig ( args ) {
if ( ( settings . hostname == '127.0.0.1' ) || ( settings . hostname . toLowerCase ( ) == 'localhost' ) ) {
settings . noconsole = true ; startLms ( performAmtWifiConfig0 , false , args ) ;
} else {
performAmtWifiConfig0 ( 1 , args ) ;
}
}
function performAmtWifiConfig0 ( state , args ) {
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
amtstack . BatchEnum ( null , [ 'CIM_WiFiEndpointSettings' ] , performAmtWifiConfig1 , args ) ;
}
function performAmtWifiConfig1 ( stack , name , response , status , args ) {
2020-10-29 15:59:55 -04:00
if ( status == 200 ) {
var wifiAuthMethod = { 1 : "Other" , 2 : "Open" , 3 : "Shared Key" , 4 : "WPA PSK" , 5 : "WPA 802.1x" , 6 : "WPA2 PSK" , 7 : "WPA2 802.1x" , 32768 : "WPA3 802.1x" } ;
var wifiEncMethod = { 1 : "Other" , 2 : "WEP" , 3 : "TKIP" , 4 : "CCMP" , 5 : "None" }
2020-05-22 13:59:02 -04:00
var wifiProfiles = { } ;
for ( var y in response [ 'CIM_WiFiEndpointSettings' ] . responses ) {
var z = response [ 'CIM_WiFiEndpointSettings' ] . responses [ y ] ;
var n = z [ 'ElementName' ] ;
2020-10-29 15:59:55 -04:00
wifiProfiles [ n ] = { 'Priority' : z [ 'Priority' ] , 'SSID' : z [ 'SSID' ] , 'AuthenticationMethod' : z [ 'AuthenticationMethod' ] , 'EncryptionMethod' : z [ 'EncryptionMethod' ] } ;
2020-05-22 13:59:02 -04:00
}
if ( args ) {
if ( args . list ) {
console . log ( 'List of Intel AMT Wifi profiles:' ) ;
2020-10-29 15:59:55 -04:00
if ( wifiProfiles . length == 0 ) {
2020-05-22 13:59:02 -04:00
console . log ( 'No Wifi profiles is stored.' ) ;
}
for ( var t in wifiProfiles ) {
var w = wifiProfiles [ t ] ;
2020-10-29 15:59:55 -04:00
console . log ( 'Profile Name: ' + t + '; Priority: ' + w [ 'Priority' ] + '; SSID: ' + w [ 'SSID' ] + '; Security: ' + wifiAuthMethod [ w [ 'AuthenticationMethod' ] ] + '/' + wifiEncMethod [ w [ 'EncryptionMethod' ] ] ) ;
2020-05-22 13:59:02 -04:00
}
process . exit ( 0 ) ;
} else if ( args . add ) {
2020-10-29 15:59:55 -04:00
if ( args . auth == null ) { args . auth = 6 ; } // if not set, default to WPA2 PSK
if ( args . enc == null ) { args . enc = 3 ; } // if not set, default to TKIP
if ( args . priority == null ) { args . priority = 0 ; } // if not set, default to 0
2020-05-22 13:59:02 -04:00
var wifiep = {
_ _parameterType : 'reference' ,
_ _resourceUri : 'http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_WiFiEndpoint' ,
Name : 'WiFi Endpoint 0'
} ;
var wifiepsettinginput = {
_ _parameterType : 'instance' ,
_ _namespace : 'http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_WiFiEndpointSettings' ,
ElementName : args . name ,
InstanceID : 'Intel(r) AMT:WiFi Endpoint Settings ' + args . name ,
2020-10-29 15:59:55 -04:00
AuthenticationMethod : args . auth ,
2020-05-22 13:59:02 -04:00
EncryptionMethod : args . enc ,
SSID : args . ssid ,
Priority : args . priority ,
PSKPassPhrase : args . psk
2020-10-29 15:59:55 -04:00
}
stack . AMT _WiFiPortConfigurationService _AddWiFiSettings ( wifiep , wifiepsettinginput , null , null , null ,
function ( stck , nm , resp , sts ) {
if ( sts == 200 ) {
2020-05-22 13:59:02 -04:00
console . log ( "Wifi profile " + args . name + " successfully added." ) ;
} else {
console . log ( "Failed to add wifi profile " + args . name + "." ) ;
}
process . exit ( 0 ) ;
2020-10-29 15:59:55 -04:00
} ) ;
2020-05-22 13:59:02 -04:00
} else if ( args . del ) {
2020-10-29 15:59:55 -04:00
if ( wifiProfiles [ args . name ] == null ) {
console . log ( "Profile " + args . name + " could not be found." ) ;
2020-05-22 13:59:02 -04:00
process . exit ( 0 ) ;
}
2020-10-29 15:59:55 -04:00
stack . Delete ( 'CIM_WiFiEndpointSettings' , { InstanceID : 'Intel(r) AMT:WiFi Endpoint Settings ' + args . name } ,
function ( stck , nm , resp , sts ) {
if ( sts == 200 ) {
2020-05-22 13:59:02 -04:00
console . log ( "Wifi profile " + args . name + " successfully deleted." ) ;
} else {
console . log ( "Failed to delete wifi profile " + args . name + "." ) ;
}
process . exit ( 0 ) ;
2020-10-29 15:59:55 -04:00
} ,
0 , 1 ) ;
2020-05-22 13:59:02 -04:00
}
} else {
process . exit ( 0 ) ;
2020-10-29 15:59:55 -04:00
}
2020-05-22 13:59:02 -04:00
} else {
console . log ( "Error, status " + status + "." ) ;
process . exit ( 1 ) ;
}
}
//
// Intel AMT wake alarm configuration
//
function _fmtdatetime ( str ) {
return str . replace ( 'T' , ' ' ) . replace ( 'Z' , '' ) ;
}
function _fmtinterval ( str ) {
var cl = str . replace ( 'T' , '' ) . substring ( str . indexOf ( 'P' ) + 1 ) ;
cl = ' ' + cl . replace ( 'D' , " days " ) . replace ( 'H' , " hours " ) . replace ( 'M' , " minutes " ) ;
cl = cl . replace ( " 1 days " , " 1 day " ) . replace ( " 1 hours " , " 1 hour " ) . replace ( " 1 minutes " , " 1 minute " ) ;
return cl . substring ( 0 , cl . length - 1 ) ;
}
function _fmttimepad ( str ) {
str = '' + str ;
while ( str . length < 2 ) { str = '0' + str ; }
return str ;
}
function convertAmtDataStr ( str ) {
var timeArray = str . split ( 'Z' ) . join ( '' ) . split ( 'T' ) . join ( '-' ) . split ( ':' ) . join ( '-' ) . split ( '-' ) ;
return new Date ( timeArray [ 0 ] , timeArray [ 1 ] - 1 , timeArray [ 2 ] , timeArray [ 3 ] , timeArray [ 4 ] , timeArray [ 5 ] ) ;
}
function prepareAlarmOccurenceTemplate ( id , nm , start , interval , del ) {
return '<d:AlarmTemplate xmlns:d=\"http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AlarmClockService\" xmlns:s=\"http://intel.com/wbem/wscim/1/ips-schema/1/IPS_AlarmClockOccurrence\"><s:InstanceID>' + id + '</s:InstanceID><s:StartTime><p:Datetime xmlns:p=\"http://schemas.dmtf.org/wbem/wscim/1/common\">' + start + '</p:Datetime></s:StartTime><s:Interval><p:Interval xmlns:p=\"http://schemas.dmtf.org/wbem/wscim/1/common\">' + interval + '</p:Interval></s:Interval><s:DeleteOnCompletion>' + del + '</s:DeleteOnCompletion></d:AlarmTemplate>' ;
}
function performAmtWakeConfig ( args ) {
if ( ( settings . hostname == '127.0.0.1' ) || ( settings . hostname . toLowerCase ( ) == 'localhost' ) ) {
settings . noconsole = true ; startLms ( performAmtWakeConfig0 , false , args ) ;
} else {
performAmtWakeConfig0 ( 1 , args ) ;
}
}
function performAmtWakeConfig0 ( state , args ) {
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
amtstack . BatchEnum ( null , [ 'IPS_AlarmClockOccurrence' ] , performAmtWakeConfig1 , args ) ;
}
function performAmtWakeConfig1 ( stack , name , response , status , args ) {
if ( status == 200 ) {
var response = response [ 'IPS_AlarmClockOccurrence' ] . responses ;
if ( ! args ) { process . exit ( 0 ) ; return ; }
if ( args . list ) {
if ( response . length == 0 ) {
console . log ( 'No wake alarms.' ) ;
} else {
for ( var i = 0 ; i < response . length ; i ++ ) {
var waketime = convertAmtDataStr ( response [ i ] [ 'StartTime' ] [ 'Datetime' ] ) ;
var t = waketime . toLocaleString ( ) , tx = t . indexOf ( '.' ) ;
if ( tx >= 0 ) { t = t . substring ( 0 , tx ) ; }
var details = response [ i ] [ 'ElementName' ] + ', wake on ' + t . replace ( ' ' , ' at ' ) ;
if ( response [ i ] [ 'Interval' ] != null ) { details += ' and each' + _fmtinterval ( response [ i ] [ 'Interval' ] [ 'Interval' ] ) ; }
if ( response [ i ] [ 'DeleteOnCompletion' ] == true ) { details += ", delete when done" ; }
console . log ( details ) ;
}
}
process . exit ( 0 ) ;
} else if ( args . del ) {
// Remove a wake alarm, start by looking to see if it exists
var alarmFound = false ;
for ( var i = 0 ; i < response . length ; i ++ ) { if ( response [ i ] [ 'ElementName' ] == args . del ) { alarmFound = true ; } }
if ( alarmFound == false ) { console . log ( "Wake alarm " + args . del + " could not be found." ) ; process . exit ( 0 ) ; return ; }
// Remote the alarm
stack . Delete ( 'IPS_AlarmClockOccurrence' , { InstanceID : args . del } ,
function ( stck , nm , resp , sts ) {
if ( sts == 200 ) { console . log ( "Done." ) ; } else { console . log ( "Failed to delete wake alarm " + args . del + "." ) ; }
process . exit ( 0 ) ;
} ,
2020-10-29 15:59:55 -04:00
0 , 1 ) ;
2020-05-22 13:59:02 -04:00
} else if ( args . add ) {
// Add a wake alarm
var alarmFound = false ;
for ( var i = 0 ; i < response . length ; i ++ ) { if ( response [ i ] [ 'ElementName' ] == args . add ) { alarmFound = true ; } }
if ( alarmFound ) { console . log ( "Wake alarm " + args . add + " already exists." ) ; process . exit ( 0 ) ; return ; }
if ( typeof args . time != 'string' ) { args . time = '00:00:00' ; }
if ( typeof args . interval != 'string' ) { args . interval = '' ; }
var alarm _name = args . add ;
var x1 = args . date . split ( '-' ) ;
var x2 = args . time . split ( ':' ) ;
var t = new Date ( x1 [ 0 ] , x1 [ 1 ] - 1 , x1 [ 2 ] , x2 [ 0 ] , x2 [ 1 ] , 0 , 0 ) ; // Not sure why, but month is 0 = JAN, 11 = DEC, seconds must be 00.
var alarm _starttime = _fmttimepad ( t . getFullYear ( ) ) + '-' + _fmttimepad ( t . getMonth ( ) + 1 ) + '-' + _fmttimepad ( t . getDate ( ) ) + 'T' + _fmttimepad ( t . getHours ( ) ) + ':' + _fmttimepad ( t . getMinutes ( ) ) + ':' + _fmttimepad ( t . getSeconds ( ) ) + 'Z' ;
var x = args . interval . split ( '-' ) ;
if ( x . length != 3 ) { x = [ 0 , 0 , 0 ] ; }
var alarm _interval = 'P' + x [ 0 ] + 'DT' + x [ 1 ] + 'H' + x [ 2 ] + 'M' ;
var alarm _doc = ( args . deletewhendone != null ) ;
var tpl = prepareAlarmOccurenceTemplate ( alarm _name , alarm _name , alarm _starttime , alarm _interval , alarm _doc ) ;
stack . wsman . ExecMethodXml ( amtstack . CompleteName ( 'AMT_AlarmClockService' ) , 'AddAlarm' , tpl ,
function ( ws , resuri , response , status ) {
if ( status != 200 ) { console . log ( "Failed to add alarm. Status: " + status + ". Verify the alarm is for a future time." ) ; }
else if ( response . Body [ 'ReturnValue' ] != 0 ) { console . log ( "Failed to add alarm " + response . Body [ 'ReturnValueStr' ] + ". Verify the alarm is for a future time." ) ; }
else { console . log ( "Done." ) ; }
process . exit ( 0 ) ;
}
) ;
} else {
console . log ( "Unknown action, specify --list, --del or --add." ) ;
process . exit ( 0 ) ;
}
} else {
console . log ( "Error, status " + status + "." ) ;
process . exit ( 1 ) ;
}
}
2021-07-07 18:49:18 -04:00
//
// Intel AMT Remote Platform Erase
//
function performAmtPlatformErase ( args ) {
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
amtstack . BatchEnum ( null , [ '*CIM_BootService' , '*AMT_BootCapabilities' ] , performAmtPlatformErase1 , args ) ;
}
function performAmtPlatformErase1 ( stack , name , response , status , args ) {
debug ( 0 , "performAmtPlatformErase1(" + status + "): " + JSON . stringify ( response , null , 2 ) ) ;
if ( status == 200 ) {
// See that RPE featues are supported
var platfromEraseSupport = response [ 'AMT_BootCapabilities' ] . response [ 'PlatformErase' ] ;
if ( platfromEraseSupport == null ) { console . log ( "Remote Platfrom Erase (RPE) is not supported on this platform" ) ; process . exit ( 1 ) ; return ; }
var supportedRpeFeatures = [ ] ;
2021-07-18 21:53:17 -04:00
if ( platfromEraseSupport == 0 ) { supportedRpeFeatures . push ( "None" ) ; } else {
if ( platfromEraseSupport & ( 1 << 1 ) ) { supportedRpeFeatures . push ( "Pyrite Revert (--pyrite)" ) ; }
if ( platfromEraseSupport & ( 1 << 2 ) ) { supportedRpeFeatures . push ( "Secure Erase All SSDs (--ssd)" ) ; }
if ( platfromEraseSupport & ( 1 << 6 ) ) { supportedRpeFeatures . push ( "TPM Clear (--tpm)" ) ; }
if ( platfromEraseSupport & ( 1 << 25 ) ) { supportedRpeFeatures . push ( "Clear BIOS NVM Variables (--nvm)" ) ; }
if ( platfromEraseSupport & ( 1 << 26 ) ) { supportedRpeFeatures . push ( "BIOS Reload of Golden Configuration (--bios)" ) ; }
if ( platfromEraseSupport & ( 1 << 31 ) ) { supportedRpeFeatures . push ( "CSME Unconfigure (--csme)" ) ; }
}
2021-07-07 18:49:18 -04:00
console . log ( "RPE Supported Features: " + supportedRpeFeatures . join ( ", " ) ) ;
// Compute requested operations flags
var rpeflags = 0 ;
if ( args . pyrite ) { rpeflags += ( 1 << 1 ) ; }
if ( args . ssd ) { rpeflags += ( 1 << 2 ) ; }
if ( args . tpm ) { rpeflags += ( 1 << 6 ) ; }
if ( args . nvm ) { rpeflags += ( 1 << 25 ) ; }
if ( args . bios ) { rpeflags += ( 1 << 26 ) ; }
if ( args . csme ) { rpeflags += ( 1 << 31 ) ; }
if ( rpeflags == 0 ) { process . exit ( 1 ) ; return ; }
if ( ( rpeflags | platfromEraseSupport ) != platfromEraseSupport ) { console . log ( "Unable to perform unsupported RPE operation." ) ; process . exit ( 1 ) ; return ; }
settings . rpeflags = rpeflags ;
settings . powerAction = 0 ;
if ( args . reset ) { settings . powerAction = 10 ; } else if ( args . poweron ) { settings . powerAction = 2 ; }
if ( settings . powerAction == 0 ) { console . log ( "--reset or --poweron is required to perform RPE action." ) ; process . exit ( 1 ) ; return ; }
// See if OCR and RPE are enabled
var enabledState = response [ 'CIM_BootService' ] . response [ 'EnabledState' ] ;
var enabledBootStateStr = { 0 : "Unknown" , 1 : "Other" , 2 : "Enabled" , 3 : "Disabled" , 4 : "Shutting Down" , 5 : "Not Applicable" , 6 : "Enabled but Offline" , 7 : "In Test" , 8 : "Deferred" , 9 : "Quiesce" , 10 : "Starting" , 32768 : "RPE Disabled" , 32769 : "All Enabled" , 32770 : "RPE & OCR Disabled" } ;
var t = enabledBootStateStr [ enabledState ] ? enabledBootStateStr [ enabledState ] : ( "Unknown, #" + enabledState ) ;
console . log ( "BootService Enabled State: " + t ) ;
if ( enabledState != 32769 ) {
// Enabled OCR and RPE
console . log ( "Enabling OCR and RPE features..." ) ;
amtstack . CIM _BootService _RequestStateChange ( 32769 , null , performAmtPlatformErase2 ) ;
} else {
performAmtPlatformErase3 ( args ) ;
}
} else { console . log ( "Error, status " + status + "." ) ; process . exit ( 1 ) ; }
}
function performAmtPlatformErase2 ( stack , name , response , status , args ) {
debug ( 0 , "performAmtPlatformErase2(" + status + "): " + JSON . stringify ( response , null , 2 ) ) ;
if ( status == 200 ) {
if ( response . Body [ 'ReturnValueStr' ] != 'SUCCESS' ) { console . log ( "Error, " + response . Body [ 'ReturnValueStr' ] + "." ) ; process . exit ( 1 ) ; }
else { performAmtPlatformErase3 ( args ) ; }
process . exit ( 0 ) ;
} else { console . log ( "Error, status " + status + "." ) ; process . exit ( 1 ) ; }
}
function performAmtPlatformErase3 ( args ) {
var tlv = makeUefiBootParam ( 1 , settings . rpeflags , 4 ) , tlvlen = 1 ;
if ( ( settings . rpeflags & 2 ) && ( typeof args . pyrite == 'string' ) ) { tlv += makeUefiBootParam ( 10 , args . pyrite ) ; tlvlen ++ ; }
if ( ( settings . rpeflags & 4 ) && ( typeof args . ssd == 'string' ) ) { tlv += makeUefiBootParam ( 20 , args . ssd ) ; tlvlen ++ ; }
settings . platfromEraseTLV = { tlv : Buffer . from ( tlv , 'binary' ) . toString ( 'base64' ) , tlvlen : tlvlen } ;
debug ( 0 , "platfromEraseTLV: " + JSON . stringify ( r , null , 2 ) ) ;
console . log ( "Fetching boot information..." ) ;
amtstack . Get ( 'AMT_BootSettingData' , performAmtPlatformErase4 , 0 , 1 ) ;
}
function performAmtPlatformErase4 ( stack , name , response , status , args ) {
debug ( 0 , "performAmtPlatformErase4(" + status + "): " + JSON . stringify ( response , null , 2 ) ) ;
if ( status == 200 ) {
var r = response [ 'Body' ] ;
r [ 'PlatformErase' ] = true ;
r [ 'UefiBootParametersArray' ] = settings . platfromEraseTLV . tlv ;
r [ 'UefiBootNumberOfParams' ] = settings . platfromEraseTLV . tlvlen ;
debug ( 0 , "BootConfig: " + JSON . stringify ( r , null , 2 ) ) ;
console . log ( "Setting Boot Order..." ) ;
amtstack . CIM _BootConfigSetting _ChangeBootOrder ( null , function ( stack , name , response , status ) {
if ( status != 200 ) { console . log ( "PUT CIM_BootConfigSetting_ChangeBootOrder, Error #" + status + ( ( response . Header && response . Header . WsmanError ) ? ( ', ' + response . Header . WsmanError ) : '' ) ) ; process . exit ( 1 ) ; return ; }
if ( response . Body [ 'ReturnValue' ] != 0 ) { messagebox ( "Error, Change Boot Order returns " + response . Body . ReturnValueStr ) ; process . exit ( 1 ) ; return ; }
amtstack . Put ( 'AMT_BootSettingData' , r , performAmtPlatformErase5 , 0 , 1 ) ;
} , 0 , 1 ) ;
} else { console . log ( "Error, status " + status + "." ) ; process . exit ( 1 ) ; }
}
function performAmtPlatformErase5 ( stack , name , response , status , args ) {
debug ( 0 , "performAmtPlatformErase5(" + status + "): " + JSON . stringify ( response , null , 2 ) ) ;
if ( status == 200 ) {
console . log ( "Setting Boot Configuration Role..." ) ;
amtstack . SetBootConfigRole ( 1 , performAmtPlatformErase6 , 0 , 1 ) ;
} else { console . log ( "Error, status " + status + "." ) ; process . exit ( 1 ) ; }
}
function performAmtPlatformErase6 ( stack , name , response , status , args ) {
debug ( 0 , "performAmtPlatformErase6(" + status + "): " + JSON . stringify ( response , null , 2 ) ) ;
if ( status == 200 ) {
if ( response . Body [ 'ReturnValueStr' ] != 'SUCCESS' ) { console . log ( "Error, " + response . Body [ 'ReturnValueStr' ] + "." ) ; process . exit ( 1 ) ; }
else {
console . log ( 'Performing power state change...' ) ;
amtstack . RequestPowerStateChange ( settings . powerAction , performAmtPlatformErase7 ) ; // 2 = Power Up, 10 = Reset
}
} else { console . log ( "Error, status " + status + "." ) ; process . exit ( 1 ) ; }
}
function performAmtPlatformErase7 ( stack , name , response , status , args ) {
debug ( 0 , "performAmtPlatformErase7(" + status + "): " + JSON . stringify ( response , null , 2 ) ) ;
if ( status == 200 ) {
if ( response . Body [ 'ReturnValueStr' ] != 'SUCCESS' ) { console . log ( "Error, " + response . Body [ 'ReturnValueStr' ] + "." ) ; process . exit ( 1 ) ; } else { console . log ( 'Done.' ) ; }
process . exit ( 0 ) ;
} else { console . log ( "Error, status " + status + "." ) ; process . exit ( 1 ) ; }
}
// Returns a UEFI boot parameter in binary
function makeUefiBootParam ( type , data , len ) {
if ( typeof data == 'number' ) { if ( len == 1 ) { data = String . fromCharCode ( data & 0xFF ) ; } if ( len == 2 ) { data = ShortToStrX ( data ) ; } if ( len == 4 ) { data = IntToStrX ( data ) ; } }
return ShortToStrX ( 0x8086 ) + ShortToStrX ( type ) + IntToStrX ( data . length ) + data ;
}
function IntToStrX ( v ) { return String . fromCharCode ( v & 0xFF , ( v >> 8 ) & 0xFF , ( v >> 16 ) & 0xFF , ( v >> 24 ) & 0xFF ) ; }
function ShortToStrX ( v ) { return String . fromCharCode ( v & 0xFF , ( v >> 8 ) & 0xFF ) ; }
2020-05-22 13:59:02 -04:00
//
// Intel AMT feature configuration action
//
function performAmtFeatureConfig ( args ) {
if ( ( settings . hostname == '127.0.0.1' ) || ( settings . hostname . toLowerCase ( ) == 'localhost' ) ) {
settings . noconsole = true ; startLms ( performAmtFeatureConfig0 , false , args ) ;
} else {
performAmtFeatureConfig0 ( 1 , args ) ;
}
}
function performAmtFeatureConfig0 ( state , args ) {
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
amtstack . BatchEnum ( null , [ '*IPS_OptInService' , '*AMT_RedirectionService' , '*CIM_KVMRedirectionSAP' ] , performAmtFeatureConfig1 , args ) ;
}
function performAmtFeatureConfig1 ( stack , name , response , status , args ) {
if ( status == 200 ) {
// User consent
var optinrequired = response [ 'IPS_OptInService' ] . response [ 'OptInRequired' ] ;
if ( args ) {
if ( ( args . userconsent == 'none' ) && ( optinrequired != 0 ) ) {
pendingAmtConfigActions ++ ;
response [ 'IPS_OptInService' ] . response [ 'OptInRequired' ] = 0 ;
amtstack . Put ( 'IPS_OptInService' , response [ 'IPS_OptInService' ] . response , function ( stack , name , response , status ) { if ( -- pendingAmtConfigActions == 0 ) { performAmtFeatureConfig0 ( ) ; } } ) ;
}
else if ( ( args . userconsent == 'kvm' ) && ( optinrequired != 1 ) ) {
pendingAmtConfigActions ++ ;
response [ 'IPS_OptInService' ] . response [ 'OptInRequired' ] = 1 ;
amtstack . Put ( 'IPS_OptInService' , response [ 'IPS_OptInService' ] . response , function ( stack , name , response , status ) { if ( -- pendingAmtConfigActions == 0 ) { performAmtFeatureConfig0 ( ) ; } } ) ;
}
else if ( ( args . userconsent == 'all' ) && ( optinrequired != 0xFFFFFFFF ) ) {
pendingAmtConfigActions ++ ;
response [ 'IPS_OptInService' ] . response [ 'OptInRequired' ] = 0xFFFFFFFF ;
amtstack . Put ( 'IPS_OptInService' , response [ 'IPS_OptInService' ] . response , function ( stack , name , response , status ) { if ( -- pendingAmtConfigActions == 0 ) { performAmtFeatureConfig0 ( ) ; } } ) ;
}
}
// Redirection ports
var redirportchange = false ;
var redirchange = false ;
var redir = ( response [ 'AMT_RedirectionService' ] . response [ 'ListenerEnabled' ] == true ) ;
var sol = ( ( response [ 'AMT_RedirectionService' ] . response [ 'EnabledState' ] & 2 ) != 0 ) ;
var ider = ( ( response [ 'AMT_RedirectionService' ] . response [ 'EnabledState' ] & 1 ) != 0 ) ;
if ( args ) {
if ( ( redir == false ) && ( ( args . redir == 'enabled' ) || ( args . redir == 1 ) ) ) { response [ 'AMT_RedirectionService' ] . response [ 'ListenerEnabled' ] = true ; redirportchange = true ; }
if ( ( redir == true ) && ( ( args . redir == 'disabled' ) || ( args . redir == 0 ) ) ) { response [ 'AMT_RedirectionService' ] . response [ 'ListenerEnabled' ] = false ; redirportchange = true ; }
if ( ( sol == false ) && ( ( args . sol == 'enabled' ) || ( args . sol == 1 ) ) ) { sol = true ; redirchange = true ; }
if ( ( sol == true ) && ( ( args . sol == 'disabled' ) || ( args . sol == 0 ) ) ) { sol = false ; redirchange = true ; }
if ( ( ider == false ) && ( ( args . ider == 'enabled' ) || ( args . ider == 1 ) ) ) { ider = true ; redirchange = true ; }
if ( ( ider == true ) && ( ( args . ider == 'disabled' ) || ( args . ider == 0 ) ) ) { ider = false ; redirchange = true ; }
if ( redirportchange ) { pendingAmtConfigActions ++ ; amtstack . Put ( "AMT_RedirectionService" , response [ 'AMT_RedirectionService' ] . response , function ( stack , name , response , status ) { if ( -- pendingAmtConfigActions == 0 ) { performAmtFeatureConfig0 ( ) ; } } ) ; }
if ( redirchange ) { pendingAmtConfigActions ++ ; amtstack . AMT _RedirectionService _RequestStateChange ( ( 32768 + ( ( ider ? 1 : 0 ) + ( sol ? 2 : 0 ) ) ) , function ( stack , name , response , status ) { if ( -- pendingAmtConfigActions == 0 ) { performAmtFeatureConfig0 ( ) ; } } ) ; }
}
// KVM
var kvm = false ;
var kvmchange = false ;
if ( response [ 'CIM_KVMRedirectionSAP' ] != null ) {
kvm = ( ( response [ 'CIM_KVMRedirectionSAP' ] . response [ "EnabledState" ] == 6 && response [ 'CIM_KVMRedirectionSAP' ] . response [ 'RequestedState' ] == 2 ) || response [ 'CIM_KVMRedirectionSAP' ] . response [ 'EnabledState' ] == 2 || response [ 'CIM_KVMRedirectionSAP' ] . response [ 'EnabledState' ] == 6 ) ;
if ( args ) {
if ( ( kvm == false ) && ( ( args . kvm == 'enabled' ) || ( args . kvm == 1 ) ) ) { kvm = true ; kvmchange = true ; }
if ( ( kvm == true ) && ( ( args . kvm == 'disabled' ) || ( args . kvm == 0 ) ) ) { kvm = false ; kvmchange = true ; }
if ( kvmchange ) { pendingAmtConfigActions ++ ; amtstack . CIM _KVMRedirectionSAP _RequestStateChange ( kvm ? 2 : 3 , 0 , function ( stack , name , response , status ) { if ( -- pendingAmtConfigActions == 0 ) { performAmtFeatureConfig0 ( ) ; } } ) ; }
}
}
if ( pendingAmtConfigActions == 0 ) {
if ( optinrequired == 0 ) { console . log ( "User Consent : None" ) ; }
else if ( optinrequired == 1 ) { console . log ( "User Consent : KVM" ) ; }
else if ( optinrequired == 0xFFFFFFFF ) { console . log ( "User Consent : All" ) ; }
else { console . log ( "User Consent : " + optinrequired ) ; }
console . log ( "Redirection Port : " + ( redir ? "Enabled" : "Disabled" ) ) ;
console . log ( "Serial-over-LAN : " + ( sol ? "Enabled" : "Disabled" ) ) ;
console . log ( "IDE Redirection : " + ( ider ? "Enabled" : 'Disabled' ) ) ;
if ( response [ 'CIM_KVMRedirectionSAP' ] != null ) { console . log ( "Remote desktop (KVM) : " + ( kvm ? "Enabled" : "Disabled" ) ) ; }
process . exit ( 0 ) ;
}
} else {
console . log ( "Error, status " + status + "." ) ;
process . exit ( 1 ) ;
}
}
//
// Intel AMT Remote Power Action
//
function performAmtPowerAction ( ) {
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
if ( settings . poweraction != 0 ) {
2021-03-25 16:58:24 -04:00
// Check if there is bootdevice and the command is either poweron, powercycle or reset
2021-03-24 20:19:51 -04:00
if ( settings . bootdevice && [ 2 , 5 , 10 ] . indexOf ( settings . poweraction ) >= 0 ) {
2021-03-25 16:58:24 -04:00
// Change boot order
2021-03-24 20:19:51 -04:00
amtstack . Get ( 'AMT_BootSettingData' , powerActionResponse1 , 0 , 1 ) ;
} else {
// Set the power state
amtstack . RequestPowerStateChange ( settings . poweraction , performAmtPowerActionEx ) ;
}
2020-05-22 13:59:02 -04:00
} else {
// Get the power state
amtstack . Get ( 'CIM_AssociatedPowerManagementService' , performAmtPowerActionEx2 , 0 , 1 ) ;
}
}
2021-03-24 20:19:51 -04:00
function powerActionResponse1 ( stack , name , response , status ) {
if ( status != 200 ) { console . log ( "Unable to get AMT_BootSettingData" ) ; exit ( 1 ) ; return ; }
var r = response . Body ;
r [ 'ConfigurationDataReset' ] = false ;
r [ 'BIOSPause' ] = false ;
r [ 'EnforceSecureBoot' ] = false ;
r [ 'BIOSSetup' ] = false ;
if ( settings . bootdevice && settings . bootdevice != 'pxe' ) {
r [ 'BootMediaIndex' ] = settings . bootindex ;
} else {
r [ 'BootMediaIndex' ] = 0 ;
}
r [ 'FirmwareVerbosity' ] = 0 ;
r [ 'ForcedProgressEvents' ] = false ;
r [ 'IDERBootDevice' ] = 0 ;
r [ 'LockKeyboard' ] = false ;
r [ 'LockPowerButton' ] = false ;
r [ 'LockResetButton' ] = false ;
r [ 'LockSleepButton' ] = false ;
r [ 'ReflashBIOS' ] = false ;
r [ 'UseIDER' ] = false ;
r [ 'UseSOL' ] = false ; //
r [ 'UseSafeMode' ] = false ;
r [ 'UserPasswordBypass' ] = false ;
if ( r [ 'SecureErase' ] != null ) {
r [ 'SecureErase' ] = false ; // no secure erase
}
if ( r [ 'PlatformErase' ] != null ) {
r [ 'PlatformErase' ] = false ; //disable platform erase
}
delete r [ 'WinREBootEnabled' ] ;
delete r [ 'UEFILocalPBABootEnabled' ] ;
delete r [ 'UEFIHTTPSBootEnabled' ] ;
delete r [ 'SecureBootControlEnabled' ] ;
delete r [ 'BootguardStatus' ] ;
delete r [ 'OptionsCleared' ] ;
delete r [ 'BIOSLastStatus' ] ;
delete r [ 'UefiBootParametersArray' ] ;
if ( r [ 'UefiBootNumberOfParams' ] != null ) r [ 'UefiBootNumberOfParams' ] = 0 ;
// Set the boot order to null, this is needed for some AMT versions that don't clear this automatically.
amtstack . CIM _BootConfigSetting _ChangeBootOrder ( null , function ( stack , name , response , status ) {
if ( status != 200 ) { console . log ( 'PUT CIM_BootConfigSetting_ChangeBootOrder failed' ) ; exit ( 1 ) ; return ; }
if ( response . Body [ 'ReturnValue' ] != 0 ) { console . log ( '(1) Change Boot Order returns ' + response . Body . ReturnValueStr ) ; exit ( 1 ) ; return ; }
amtstack . Put ( 'AMT_BootSettingData' , r , powerActionResponse2 , 0 , 1 ) ;
} , 0 , 1 ) ;
}
function powerActionResponse2 ( stack , name , response , status , tag ) {
if ( status != 200 ) { console . log ( 'PUT AMT_BootSettingData failed.' ) ; exit ( 1 ) ; return ; }
amtstack . SetBootConfigRole ( 1 , powerActionResponse3 , 0 , 1 ) ;
}
function powerActionResponse3 ( stack , name , response , status ) {
if ( status != 200 ) { console . log ( 'SetBootConfigRole failed.' ) ; exit ( 1 ) ; return ; }
var bootsources = { 'pxe' : 'Force PXE Boot' , 'hdd' : 'Force Hard-drive Boot' , 'cd' : 'Force CD/DVD Boot' } ;
var cbparam = '<Address xmlns="http://schemas.xmlsoap.org/ws/2004/08/addressing">http://schemas.xmlsoap.org/ws/2004/08/addressing</Address><ReferenceParameters xmlns="http://schemas.xmlsoap.org/ws/2004/08/addressing"><ResourceURI xmlns="http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd">http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_BootSourceSetting</ResourceURI><SelectorSet xmlns="http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd"><Selector Name="InstanceID">Intel(r) AMT: ' + bootsources [ settings . bootdevice ] + '</Selector></SelectorSet></ReferenceParameters>' ;
2021-03-25 21:54:26 -04:00
if ( ! settings . bootdevice ) { cbparam = null ; }
2021-03-24 20:19:51 -04:00
amtstack . CIM _BootConfigSetting _ChangeBootOrder ( cbparam , function ( st , nm , resp , sts ) {
if ( resp . Body [ 'ReturnValue' ] != 0 ) { console . log ( '(2) Change Boot Order returns ' + response . Body . ReturnValueStr ) ; exit ( 1 ) ; return ; }
amtstack . RequestPowerStateChange ( settings . poweraction , performAmtPowerActionEx ) ;
} ) ;
}
2020-05-22 13:59:02 -04:00
function performAmtPowerActionEx ( stack , name , response , status ) {
if ( status == 200 ) {
console . log ( response . Body . ReturnValueStr . split ( '_' ) . join ( ' ' ) ) ;
process . exit ( 0 ) ;
} else {
console . log ( "Error, status " + status + "." ) ;
process . exit ( 1 ) ;
}
}
2020-06-15 19:37:02 -04:00
var DMTFPowerStates = [ '' , '' , "Power on" , "Light sleep" , "Deep sleep" , "Power cycle (Soft off)" , "Off - Hard" , "Hibernate (Off soft)" , "Soft off" , "Power cycle (Off-hard)" , "Main bus reset" , "Diagnostic interrupt (NMI)" , "Not applicable" , "Off - Soft graceful" , "Off - Hard graceful" , "Main bus reset graceful" , "Power cycle (Off - Soft graceful)" , "Power cycle (Off - Hard graceful)" , "Diagnostic interrupt (INIT)" ] ;
2020-05-22 13:59:02 -04:00
function performAmtPowerActionEx2 ( stack , name , response , status ) {
if ( status == 200 ) {
var powerNumber = parseInt ( response . Body . PowerState ) ;
if ( ( powerNumber >= DMTFPowerStates . length ) && ( powerNumber > 1 ) ) {
console . log ( "Unknown power state: " + response . Body . PowerState ) ;
} else {
console . log ( "Current power state: " + DMTFPowerStates [ powerNumber ] ) ;
}
process . exit ( 0 ) ;
} else {
console . log ( "Error, status " + status + "." ) ;
process . exit ( 1 ) ;
}
}
2020-10-20 14:28:18 -04:00
2020-10-20 01:23:46 -04:00
//
// Get MEI state
//
// Get Intel MEI State in a flexible way
// Flags: 1 = Versions, 2 = OsAdmin, 4 = Hashes, 8 = Network
function getMeiState ( flags , func ) {
var amtMeiModule , amtMei ;
try { amtMeiModule = require ( 'amt-mei' ) ; amtMei = new amtMeiModule ( ) ; } catch ( ex ) { func ( null ) ; return ; }
amtMei . on ( 'error' , function ( e ) { func ( null ) ; return ; } ) ;
try {
2021-03-05 17:58:00 -05:00
var amtMeiTmpState = { 'core-ver' : 1 , OsHostname : require ( 'os' ) . hostname ( ) , Flags : 0 } ; // Flags: 1=EHBC, 2=CCM, 4=ACM
2021-07-01 16:21:24 -04:00
amtMei . getVersion ( function ( result ) {
if ( result == null ) { func ( null ) ; return ; }
amtMeiTmpState . Versions = { } ; for ( var version in result . Versions ) { amtMeiTmpState . Versions [ result . Versions [ version ] . Description ] = result . Versions [ version ] . Version ; }
amtMei . getProtocolVersion ( function ( result ) { if ( result != null ) { amtMeiTmpState . MeiVersion = result ; } } ) ;
//if ((flags & 1) != 0) { amtMei.getVersion(function (result) { if (result) { } }); }
amtMei . getProvisioningMode ( function ( result ) { if ( result ) { amtMeiTmpState . ProvisioningMode = result . mode ; } } ) ;
amtMei . getProvisioningState ( function ( result ) { if ( result ) { amtMeiTmpState . ProvisioningState = result . state ; } } ) ; // 0: "Not Activated (Pre)", 1: "Not Activated (In)", 2: "Activated"
amtMei . getEHBCState ( function ( result ) { if ( ( result != null ) && ( result . EHBC == true ) ) { amtMeiTmpState . Flags += 1 ; } } ) ;
amtMei . getControlMode ( function ( result ) { if ( result != null ) { if ( result . controlMode == 1 ) { amtMeiTmpState . Flags += 2 ; } if ( result . controlMode == 2 ) { amtMeiTmpState . Flags += 4 ; } } } ) ; // Flag 2 = CCM, 4 = ACM
//amtMei.getMACAddresses(function (result) { if (result) { amtMeiTmpState.mac = result; } });
if ( ( flags & 8 ) != 0 ) {
amtMei . getLanInterfaceSettings ( 0 , function ( result ) {
if ( result ) {
amtMeiTmpState . net0 = result ;
var fqdn = null , interfaces = require ( 'os' ) . networkInterfaces ( ) ; // Look for the DNS suffix for the Intel AMT Ethernet interface
for ( var i in interfaces ) { for ( var j in interfaces [ i ] ) { if ( ( interfaces [ i ] [ j ] . mac == amtMeiTmpState . net0 . mac ) && ( interfaces [ i ] [ j ] . fqdn != null ) && ( interfaces [ i ] [ j ] . fqdn != '' ) ) { amtMeiTmpState . OsDnsSuffix = interfaces [ i ] [ j ] . fqdn ; } } }
}
} ) ;
amtMei . getLanInterfaceSettings ( 1 , function ( result ) { if ( result ) { amtMeiTmpState . net1 = result ; } } ) ;
}
amtMei . getUuid ( function ( result ) { if ( ( result != null ) && ( result . uuid != null ) ) { amtMeiTmpState . UUID = result . uuid ; } } ) ;
if ( ( flags & 2 ) != 0 ) { amtMei . getLocalSystemAccount ( function ( x ) { if ( ( x != null ) && x . user && x . pass ) { amtMeiTmpState . OsAdmin = { user : x . user , pass : x . pass } ; } } ) ; }
amtMei . getDnsSuffix ( function ( result ) { if ( result != null ) { amtMeiTmpState . DnsSuffix = result ; } if ( ( flags & 4 ) == 0 ) { if ( func != null ) { func ( amtMeiTmpState ) ; } } } ) ;
if ( ( flags & 4 ) != 0 ) {
amtMei . getHashHandles ( function ( handles ) {
if ( ( handles != null ) && ( handles . length > 0 ) ) { amtMeiTmpState . Hashes = [ ] ; } else { func ( amtMeiTmpState ) ; }
var exitOnCount = handles . length ;
for ( var i = 0 ; i < handles . length ; ++ i ) { this . getCertHashEntry ( handles [ i ] , function ( hashresult ) { amtMeiTmpState . Hashes . push ( hashresult ) ; if ( -- exitOnCount == 0 ) { if ( func != null ) { func ( amtMeiTmpState ) ; } } } ) ; }
} ) ;
}
} ) ;
2020-10-20 01:23:46 -04:00
} catch ( e ) { if ( func != null ) { func ( null ) ; } return ; }
}
2021-07-24 13:12:21 -04:00
// On non-Windows platforms, we need to query the DHCP server for the DNS suffix
function getAmtOsDnsSuffix ( mestate , func ) {
if ( ( process . platform == 'win32' ) || ( mestate . net0 == null ) || ( mestate . net0 . mac == null ) ) { func ( mestate ) ; return ; }
try { require ( 'linux-dhcp' ) } catch ( ex ) { func ( mestate ) ; return ; }
require ( 'linux-dhcp' ) . client . info ( mestate . net0 . mac ) . then ( function ( d ) {
if ( ( typeof d . options == 'object' ) && ( typeof d . options . domainname == 'string' ) ) { mestate . OsDnsSuffix = d . options . domainname ; }
func ( mestate ) ;
} , function ( e ) {
console . log ( 'DHCP error' , e ) ;
func ( mestate ) ;
} ) ;
}
2020-05-22 13:59:02 -04:00
//
// Startup
//
// Parse URL arguments
function parseUrlArguments ( url ) {
var r = { } , x = url . split ( '?' ) ;
if ( x . length < 2 ) return r ;
x = x [ 1 ] . split ( '&' ) ;
for ( var i in x ) { var j = x [ i ] . indexOf ( '=' ) ; if ( j > 0 ) { r [ x [ i ] . substring ( 0 , j ) . toLowerCase ( ) ] = x [ i ] . substring ( j + 1 ) ; } }
return r ;
}
// Remove a element from a array
function removeItemFromArray ( array , element ) {
var index = array . indexOf ( element ) ;
if ( index !== - 1 ) { array . splice ( index , 1 ) ; }
}
// Run MeshCmd, but before we do, we need to see if what type of service we are going to be
var serviceName = null , serviceDisplayName = null , serviceDesc = null ;
for ( var i in process . argv ) {
if ( process . argv [ i ] . toLowerCase ( ) == 'install' ) { process . argv [ i ] = '-install' ; }
if ( process . argv [ i ] . toLowerCase ( ) == 'uninstall' ) { process . argv [ i ] = '-uninstall' ; }
if ( ( process . argv [ i ] . toLowerCase ( ) == 'microlms' ) || ( process . argv [ i ] . toLowerCase ( ) == 'amtlms' ) || ( process . argv [ i ] . toLowerCase ( ) == 'lms' ) ) {
serviceName = 'MicroLMS' ;
serviceDisplayName = "MicroLMS Service for Intel(R) AMT" ;
serviceDesc = "Intel AMT Micro Local Manageability Service (MicroLMS)" ;
} else if ( ( process . argv [ i ] . toLowerCase ( ) == 'intellms' ) ) {
serviceName = 'LMS' ;
serviceDisplayName = "Intel(R) Management and Security Application Local Management Service" ;
serviceDesc = "Intel(R) Management and Security Application Local Management Service - Provides OS-related Intel(R) ME functionality." ;
} else if ( ( process . argv [ i ] . toLowerCase ( ) == 'meshcommander' ) || ( process . argv [ i ] . toLowerCase ( ) == 'commander' ) ) {
serviceName = 'MeshCommander' ;
serviceDisplayName = "MeshCommander, Intel AMT Management console" ;
serviceDesc = "MeshCommander is a Intel AMT management console." ;
}
}
if ( serviceName == null ) {
if ( process . execPath . includes ( 'MicroLMS' ) ) { serviceName = 'MicroLMS' ; }
else if ( process . execPath . includes ( 'LMS' ) ) { serviceName = 'LMS' ; }
else if ( process . execPath . includes ( 'MeshCommander' ) ) { serviceName = 'MeshCommander' ; }
if ( serviceName == null ) { for ( var i in process . argv ) { if ( ( process . argv [ i ] . toLowerCase ( ) == '-install' ) || ( process . argv [ i ] . toLowerCase ( ) == '-uninstall' ) ) { console . log ( 'In order to install/uninstall, a service type must be specified.' ) ; process . exit ( ) ; } } }
if ( serviceName == null ) { try { run ( process . argv ) ; } catch ( e ) { console . log ( "ERROR: " + e ) ; } }
} else {
var serviceHost = require ( 'service-host' ) ;
var meshcmdService = new serviceHost ( { name : serviceName , displayName : serviceDisplayName , startType : 'AUTO_START' , description : serviceDesc } ) ;
// Called when the background service is started.
meshcmdService . on ( 'serviceStart' , function onStart ( ) {
//process.coreDumpLocation = 'C:\\tmp\\meshcommander.dmp';
//process.on('exit', function () { console.log('exit3'); _debugCrash(); });
console . setDestination ( console . Destinations . DISABLED ) ; // Disable console.log().
//console.setDestination(console.Destinations.LOGFILE);
//attachDebuger({ webport: 0, wait: 1 }).then(console.log, console.log);
if ( process . execPath . includes ( 'MicroLMS' ) ) { run ( [ process . execPath , 'microlms' ] ) ; } // Start MicroLMS
else if ( process . execPath . includes ( 'LMS' ) ) { run ( [ process . execPath , 'microlms' ] ) ; } // Start MicroLMS
else if ( process . execPath . includes ( 'MeshCommander' ) ) { run ( [ process . execPath , 'meshcommander' ] ) ; } // Start MeshCommander
else { console . log ( "Aborting Service Start, because unknown binary: " + process . execPath ) ; process . exit ( 1 ) ; }
} ) ;
// Called when the background service is stopping
meshcmdService . on ( 'serviceStop' , function onStop ( ) { console . log ( "Stopping service" ) ; process . exit ( ) ; } ) ; // The console.log() is for debugging, will be ignored unless "console.setDestination()" is set.
// Called when the executable is not running as a service, run normally.
meshcmdService . on ( 'normalStart' , function onNormalStart ( ) { try { run ( process . argv ) ; } catch ( e ) { console . log ( "ERROR: " + e ) ; } } ) ;
meshcmdService . run ( ) ;
}