2017-08-28 12:27:45 -04:00
/ * *
2018-01-04 15:15:21 -05:00
* @ description MeshCentral connection relay module
2017-08-28 12:27:45 -04:00
* @ author Ylian Saint - Hilaire
2018-01-04 15:15:21 -05:00
* @ copyright Intel Corporation 2018
* @ license Apache - 2.0
2017-08-28 12:27:45 -04:00
* @ version v0 . 0.1
* /
2018-08-30 15:05:23 -04:00
/*jslint node: true */
/*jshint node: true */
/*jshint strict:false */
/*jshint -W097 */
/*jshint esversion: 6 */
"use strict" ;
2018-08-27 15:24:15 -04:00
2017-10-31 19:19:58 -04:00
module . exports . CreateMeshRelay = function ( parent , ws , req , domain ) {
2017-08-28 12:27:45 -04:00
var obj = { } ;
obj . ws = ws ;
2017-09-17 20:22:18 -04:00
obj . req = req ;
2017-08-28 12:27:45 -04:00
obj . peer = null ;
2017-09-01 14:23:22 -04:00
obj . parent = parent ;
2017-10-23 17:09:58 -04:00
obj . id = req . query . id ;
2017-09-01 14:23:22 -04:00
obj . remoteaddr = obj . ws . _socket . remoteAddress ;
2017-10-31 19:19:58 -04:00
obj . domain = domain ;
2017-09-01 14:23:22 -04:00
if ( obj . remoteaddr . startsWith ( '::ffff:' ) ) { obj . remoteaddr = obj . remoteaddr . substring ( 7 ) ; }
2017-08-28 12:27:45 -04:00
2017-10-23 17:09:58 -04:00
// Disconnect this agent
obj . close = function ( arg ) {
if ( ( arg == 1 ) || ( arg == null ) ) { try { obj . ws . close ( ) ; obj . parent . parent . debug ( 1 , 'Relay: Soft disconnect (' + obj . remoteaddr + ')' ) ; } catch ( e ) { console . log ( e ) ; } } // Soft close, close the websocket
if ( arg == 2 ) { try { obj . ws . _socket . _parent . end ( ) ; obj . parent . parent . debug ( 1 , 'Relay: Hard disconnect (' + obj . remoteaddr + ')' ) ; } catch ( e ) { console . log ( e ) ; } } // Hard close, close the TCP socket
2018-08-30 15:05:23 -04:00
} ;
2017-10-23 17:09:58 -04:00
obj . sendAgentMessage = function ( command , userid , domainid ) {
2018-08-30 15:05:23 -04:00
var rights ;
2017-10-23 17:09:58 -04:00
if ( command . nodeid == null ) return false ;
var user = obj . parent . users [ userid ] ;
if ( user == null ) return false ;
var splitnodeid = command . nodeid . split ( '/' ) ;
// Check that we are in the same domain and the user has rights over this node.
if ( ( splitnodeid [ 0 ] == 'node' ) && ( splitnodeid [ 1 ] == domainid ) ) {
// Get the user object
// See if the node is connected
var agent = obj . parent . wsagents [ command . nodeid ] ;
if ( agent != null ) {
// Check if we have permission to send a message to that node
2018-08-30 15:05:23 -04:00
rights = user . links [ agent . dbMeshKey ] ;
2017-10-23 17:09:58 -04:00
if ( rights != null || ( ( rights & 16 ) != 0 ) ) { // TODO: 16 is console permission, may need more gradular permission checking
command . sessionid = ws . sessionId ; // Set the session id, required for responses.
command . rights = rights . rights ; // Add user rights flags to the message
delete command . nodeid ; // Remove the nodeid since it's implyed.
agent . send ( JSON . stringify ( command ) ) ;
return true ;
}
} else {
// Check if a peer server is connected to this agent
var routing = obj . parent . parent . GetRoutingServerId ( command . nodeid , 1 ) ; // 1 = MeshAgent routing type
if ( routing != null ) {
// Check if we have permission to send a message to that node
2018-08-30 15:05:23 -04:00
rights = user . links [ routing . meshid ] ;
2017-10-23 17:09:58 -04:00
if ( rights != null || ( ( rights & 16 ) != 0 ) ) { // TODO: 16 is console permission, may need more gradular permission checking
command . fromSessionid = ws . sessionId ; // Set the session id, required for responses.
command . rights = rights . rights ; // Add user rights flags to the message
obj . parent . parent . multiServer . DispatchMessageSingleServer ( command , routing . serverid ) ;
return true ;
}
}
}
}
return false ;
2018-08-30 15:05:23 -04:00
} ;
2017-08-28 12:27:45 -04:00
2017-09-17 20:22:18 -04:00
if ( req . query . auth == null ) {
// Use ExpressJS session, check if this session is a logged in user, at least one of the two connections will need to be authenticated.
2017-10-31 19:19:58 -04:00
try { if ( ( req . session ) && ( req . session . userid ) || ( req . session . domainid == obj . domain . id ) ) { obj . authenticated = true ; } } catch ( e ) { }
if ( ( obj . authenticated != true ) && ( req . query . user != null ) && ( req . query . pass != null ) ) {
// Check user authentication
obj . parent . authenticate ( req . query . user , req . query . pass , obj . domain , function ( err , userid , passhint ) {
if ( userid != null ) {
obj . authenticated = true ;
2018-03-26 20:13:32 -04:00
// Check if we have agent routing instructions, process this here.
2017-10-31 19:19:58 -04:00
if ( ( req . query . nodeid != null ) && ( req . query . tcpport != null ) ) {
if ( obj . id == undefined ) { obj . id = ( '' + Math . random ( ) ) . substring ( 2 ) ; } // If there is no connection id, generate one.
var command = { nodeid : req . query . nodeid , action : 'msg' , type : 'tunnel' , value : '*/meshrelay.ashx?id=' + obj . id , tcpport : req . query . tcpport , tcpaddr : ( ( req . query . tcpaddr == null ) ? '127.0.0.1' : req . query . tcpaddr ) } ;
if ( obj . sendAgentMessage ( command , userid , obj . domain . id ) == false ) { obj . id = null ; obj . parent . parent . debug ( 1 , 'Relay: Unable to contact this agent (' + obj . remoteaddr + ')' ) ; }
}
} else {
obj . parent . parent . debug ( 1 , 'Relay: User authentication failed (' + obj . remoteaddr + ')' ) ;
obj . ws . send ( 'error:Authentication failed' ) ;
}
performRelay ( ) ;
} ) ;
} else {
performRelay ( ) ;
}
2017-09-17 20:22:18 -04:00
} else {
// Get the session from the cookie
2017-12-13 17:52:57 -05:00
var cookie = obj . parent . parent . decodeCookie ( req . query . auth ) ;
2017-10-23 17:09:58 -04:00
if ( cookie != null ) {
obj . authenticated = true ;
if ( cookie . tcpport != null ) {
// This cookie has agent routing instructions, process this here.
if ( obj . id == undefined ) { obj . id = ( '' + Math . random ( ) ) . substring ( 2 ) ; } // If there is no connection id, generate one.
// Send connection request to agent
var command = { nodeid : cookie . nodeid , action : 'msg' , type : 'tunnel' , value : '*/meshrelay.ashx?id=' + obj . id , tcpport : cookie . tcpport , tcpaddr : cookie . tcpaddr } ;
if ( obj . sendAgentMessage ( command , cookie . userid , cookie . domainid ) == false ) { obj . id = null ; obj . parent . parent . debug ( 1 , 'Relay: Unable to contact this agent (' + obj . remoteaddr + ')' ) ; }
}
} else {
obj . id = null ;
obj . parent . parent . debug ( 1 , 'Relay: invalid cookie (' + obj . remoteaddr + ')' ) ;
2017-10-31 19:19:58 -04:00
obj . ws . send ( 'error:Invalid cookie' ) ;
2017-10-23 17:09:58 -04:00
}
2017-10-31 19:19:58 -04:00
performRelay ( ) ;
2017-09-17 20:22:18 -04:00
}
2017-09-06 13:45:09 -04:00
2017-10-31 19:19:58 -04:00
function performRelay ( ) {
if ( obj . id == null ) { try { obj . close ( ) ; } catch ( e ) { } return null ; } // Attempt to connect without id, drop this.
ws . _socket . setKeepAlive ( true , 240000 ) ; // Set TCP keep alive
2017-10-23 17:09:58 -04:00
2017-10-31 19:19:58 -04:00
// Validate that the id is valid, we only need to do this on non-authenticated sessions.
// TODO: Figure out when this needs to be done.
/ *
if ( ! parent . args . notls ) {
// Check the identifier, if running without TLS, skip this.
var ids = obj . id . split ( ':' ) ;
if ( ids . length != 3 ) { obj . ws . close ( ) ; obj . id = null ; return null ; } // Invalid ID, drop this.
if ( parent . crypto . createHmac ( 'SHA384' , parent . relayRandom ) . update ( ids [ 0 ] + ':' + ids [ 1 ] ) . digest ( 'hex' ) != ids [ 2 ] ) { obj . ws . close ( ) ; obj . id = null ; return null ; } // Invalid HMAC, drop this.
if ( ( Date . now ( ) - parseInt ( ids [ 1 ] ) ) > 120000 ) { obj . ws . close ( ) ; obj . id = null ; return null ; } // Expired time, drop this.
obj . id = ids [ 0 ] ;
}
* /
// Check the peer connection status
{
var relayinfo = parent . wsrelays [ obj . id ] ;
if ( relayinfo ) {
if ( relayinfo . state == 1 ) {
// Check that at least one connection is authenticated
if ( ( obj . authenticated != true ) && ( relayinfo . peer1 . authenticated != true ) ) {
obj . id = null ;
obj . ws . close ( ) ;
obj . parent . parent . debug ( 1 , 'Relay without-auth: ' + obj . id + ' (' + obj . remoteaddr + ')' ) ;
return null ;
}
// Connect to peer
obj . peer = relayinfo . peer1 ;
obj . peer . peer = obj ;
relayinfo . peer2 = obj ;
relayinfo . state = 2 ;
obj . ws . send ( 'c' ) ; // Send connect to both peers
relayinfo . peer1 . ws . send ( 'c' ) ;
relayinfo . peer1 . ws . resume ( ) ; // Release the traffic
2017-08-28 12:27:45 -04:00
2017-10-31 19:19:58 -04:00
relayinfo . peer1 . ws . peer = relayinfo . peer2 . ws ;
relayinfo . peer2 . ws . peer = relayinfo . peer1 . ws ;
obj . parent . parent . debug ( 1 , 'Relay connected: ' + obj . id + ' (' + obj . remoteaddr + ' --> ' + obj . peer . remoteaddr + ')' ) ;
} else {
// Connected already, drop (TODO: maybe we should re-connect?)
2017-09-06 13:45:09 -04:00
obj . id = null ;
obj . ws . close ( ) ;
2017-10-31 19:19:58 -04:00
obj . parent . parent . debug ( 1 , 'Relay duplicate: ' + obj . id + ' (' + obj . remoteaddr + ')' ) ;
2017-09-06 13:45:09 -04:00
return null ;
}
2017-08-28 12:27:45 -04:00
} else {
2017-10-31 19:19:58 -04:00
// Wait for other relay connection
ws . pause ( ) ; // Hold traffic until the other connection
parent . wsrelays [ obj . id ] = { peer1 : obj , state : 1 } ;
2018-08-30 15:05:23 -04:00
obj . parent . parent . debug ( 1 , 'Relay holding: ' + obj . id + ' (' + obj . remoteaddr + ') ' + ( obj . authenticated ? 'Authenticated' : '' ) ) ;
2017-09-17 20:22:18 -04:00
2017-10-31 19:19:58 -04:00
// Check if a peer server has this connection
if ( parent . parent . multiServer != null ) {
var rsession = obj . parent . wsPeerRelays [ obj . id ] ;
if ( ( rsession != null ) && ( rsession . serverId > obj . parent . parent . serverId ) ) {
// We must initiate the connection to the peer
parent . parent . multiServer . createPeerRelay ( ws , req , rsession . serverId , req . session . userid ) ;
delete parent . wsrelays [ obj . id ] ;
} else {
// Send message to other peers that we have this connection
parent . parent . multiServer . DispatchMessage ( JSON . stringify ( { action : 'relay' , id : obj . id } ) ) ;
}
2017-09-17 20:22:18 -04:00
}
}
2017-08-28 12:27:45 -04:00
}
}
2018-01-16 20:30:34 -05:00
ws . flushSink = function ( ) { try { ws . resume ( ) ; } catch ( e ) { } } ;
2017-08-28 12:27:45 -04:00
// When data is received from the mesh relay web socket
2017-09-01 14:23:22 -04:00
ws . on ( 'message' , function ( data ) {
2017-12-19 11:50:19 -05:00
//console.log(typeof data, data.length);
2018-01-16 20:30:34 -05:00
if ( this . peer != null ) {
2018-07-06 13:13:19 -04:00
//if (typeof data == 'string') { console.log('Relay: ' + data); } else { console.log('Relay:' + data.length + ' byte(s)'); }
2018-01-16 20:30:34 -05:00
try { this . pause ( ) ; this . peer . send ( data , ws . flushSink ) ; } catch ( e ) { }
}
2017-09-01 14:23:22 -04:00
} ) ;
2017-08-28 12:27:45 -04:00
// If error, do nothing
2018-02-13 15:28:11 -05:00
ws . on ( 'error' , function ( err ) { /*console.log('Relay Error: ' + err);*/ } ) ;
2017-08-28 12:27:45 -04:00
// If the mesh relay web socket is closed
ws . on ( 'close' , function ( req ) {
if ( obj . id != null ) {
var relayinfo = parent . wsrelays [ obj . id ] ;
2017-09-17 20:22:18 -04:00
if ( relayinfo != null ) {
if ( relayinfo . state == 2 ) {
// Disconnect the peer
var peer = ( relayinfo . peer1 == obj ) ? relayinfo . peer2 : relayinfo . peer1 ;
obj . parent . parent . debug ( 1 , 'Relay disconnect: ' + obj . id + ' (' + obj . remoteaddr + ' --> ' + peer . remoteaddr + ')' ) ;
peer . id = null ;
try { peer . ws . close ( ) ; } catch ( e ) { } // Soft disconnect
try { peer . ws . _socket . _parent . end ( ) ; } catch ( e ) { } // Hard disconnect
} else {
obj . parent . parent . debug ( 1 , 'Relay disconnect: ' + obj . id + ' (' + obj . remoteaddr + ')' ) ;
}
delete parent . wsrelays [ obj . id ] ;
2017-08-28 12:27:45 -04:00
}
obj . peer = null ;
obj . id = null ;
}
} ) ;
2018-08-30 15:05:23 -04:00
2017-08-28 12:27:45 -04:00
return obj ;
2018-08-30 15:05:23 -04:00
} ;