mirror of
https://github.com/Ylianst/MeshCentral.git
synced 2025-04-04 03:40:25 -04:00
Added MeshCentral Assistant download from agent.
This commit is contained in:
parent
7e1b1a68d4
commit
b4a42b03d5
@ -1273,6 +1273,17 @@ function handleServerCommand(data) {
|
|||||||
break;
|
break;
|
||||||
case 'meshToolInfo':
|
case 'meshToolInfo':
|
||||||
if (data.pipe == true) { delete data.pipe; delete data.action; data.cmd = 'meshToolInfo'; broadcastToRegisteredApps(data); }
|
if (data.pipe == true) { delete data.pipe; delete data.action; data.cmd = 'meshToolInfo'; broadcastToRegisteredApps(data); }
|
||||||
|
if (data.tag == 'info') { sendConsoleText(JSON.stringify(data, null, 2)); }
|
||||||
|
if (data.tag == 'install') {
|
||||||
|
data.func = function (options, success) {
|
||||||
|
sendConsoleText('Download of MeshCentral Assistant ' + (success?'succeed':'failed'));
|
||||||
|
if (success) {
|
||||||
|
// TODO: Install & Run
|
||||||
|
}
|
||||||
|
}
|
||||||
|
data.filename = 'MeshAssistant.exe';
|
||||||
|
downloadFile(data);
|
||||||
|
}
|
||||||
break;
|
break;
|
||||||
case 'wget': // Server uses this command to tell the agent to download a file using HTTPS/GET and place it in a given path. This is used for one-to-many file uploads.
|
case 'wget': // Server uses this command to tell the agent to download a file using HTTPS/GET and place it in a given path. This is used for one-to-many file uploads.
|
||||||
agentFileHttpPendingRequests.push(data);
|
agentFileHttpPendingRequests.push(data);
|
||||||
@ -1288,6 +1299,34 @@ function handleServerCommand(data) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Download a file from the server and check the hash.
|
||||||
|
// This download is similar to the one used for meshcore self-update.
|
||||||
|
var trustedDownloads = {};
|
||||||
|
function downloadFile(downloadoptions) {
|
||||||
|
var options = require('http').parseUri(downloadoptions.url);
|
||||||
|
options.rejectUnauthorized = false;
|
||||||
|
options.checkServerIdentity = function checkServerIdentity(certs) {
|
||||||
|
// If the tunnel certificate matches the control channel certificate, accept the connection
|
||||||
|
try { if (require('MeshAgent').ServerInfo.ControlChannelCertificate.digest == certs[0].digest) return; } catch (ex) { }
|
||||||
|
try { if (require('MeshAgent').ServerInfo.ControlChannelCertificate.fingerprint == certs[0].fingerprint) return; } catch (ex) { }
|
||||||
|
// Check that the certificate is the one expected by the server, fail if not.
|
||||||
|
if (checkServerIdentity.servertlshash == null) { if (require('MeshAgent').ServerInfo == null || require('MeshAgent').ServerInfo.ControlChannelCertificate == null) return; throw new Error('BadCert'); }
|
||||||
|
if (certs[0].digest == null) return;
|
||||||
|
if ((checkServerIdentity.servertlshash != null) && (checkServerIdentity.servertlshash.toLowerCase() != certs[0].digest.split(':').join('').toLowerCase())) { throw new Error('BadCert') }
|
||||||
|
}
|
||||||
|
//options.checkServerIdentity.servertlshash = downloadoptions.serverhash;
|
||||||
|
trustedDownloads[downloadoptions.name] = downloadoptions;
|
||||||
|
trustedDownloads[downloadoptions.name].dl = require('https').get(options);
|
||||||
|
trustedDownloads[downloadoptions.name].dl.on('error', function (e) { downloadoptions.func(downloadoptions, false); delete trustedDownloads[downloadoptions.name]; });
|
||||||
|
trustedDownloads[downloadoptions.name].dl.on('response', function (img) {
|
||||||
|
this._file = require('fs').createWriteStream(trustedDownloads[downloadoptions.name].filename, { flags: 'wb' });
|
||||||
|
this._filehash = require('SHA384Stream').create();
|
||||||
|
this._filehash.on('hash', function (h) { if ((downloadoptions.hash != null) && (downloadoptions.hash.toLowerCase() != h.toString('hex').toLowerCase())) { downloadoptions.func(downloadoptions, false); delete trustedDownloads[downloadoptions.name]; return; } downloadoptions.func(downloadoptions, true); });
|
||||||
|
img.pipe(this._file);
|
||||||
|
img.pipe(this._filehash);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
// Handle APF JSON control commands
|
// Handle APF JSON control commands
|
||||||
function handleApfJsonControl(data) {
|
function handleApfJsonControl(data) {
|
||||||
if (data.action == 'console') { addAmtEvent(data.msg); } // Add console message to AMT event log
|
if (data.action == 'console') { addAmtEvent(data.msg); } // Add console message to AMT event log
|
||||||
@ -2818,6 +2857,18 @@ function processConsoleCommand(cmd, args, rights, sessionid) {
|
|||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
|
case 'assistant':
|
||||||
|
if (process.platform == 'win32') {
|
||||||
|
// Install MeshCentral Assistant on this device
|
||||||
|
response = "Usage: Assistant [info|install|uninstall]";
|
||||||
|
if (args['_'].length == 1) {
|
||||||
|
if ((args['_'][0] == 'install') || (args['_'][0] == 'info')) { response = ''; require('MeshAgent').SendCommand({ action: 'meshToolInfo', sessionid: sessionid, name: 'MeshCentralAssistant', cookie: true, tag: args['_'][0] }); }
|
||||||
|
// TODO: Uninstall
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
response = "MeshCentral Assistant is not supported on this platform.";
|
||||||
|
}
|
||||||
|
break;
|
||||||
case 'agentupdate':
|
case 'agentupdate':
|
||||||
require('MeshAgent').SendCommand({ action: 'agentupdate', sessionid: sessionid });
|
require('MeshAgent').SendCommand({ action: 'agentupdate', sessionid: sessionid });
|
||||||
break;
|
break;
|
||||||
|
@ -1479,13 +1479,15 @@ module.exports.CreateMeshAgent = function (parent, db, ws, req, args, domain) {
|
|||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case 'meshToolInfo': {
|
case 'meshToolInfo': {
|
||||||
|
// Return information about a MeshCentral tool. Current tools are 'MeshCentralRouter' and 'MeshCentralAssistant'
|
||||||
|
// Information includes file hash and download location URL
|
||||||
if (typeof command.name != 'string') break;
|
if (typeof command.name != 'string') break;
|
||||||
var info = parent.parent.meshToolsBinaries[command.name];
|
var info = parent.parent.meshToolsBinaries[command.name];
|
||||||
if ((command.hash != null) && (info.hash == command.hash)) return;
|
if ((command.hash != null) && (info.hash == command.hash)) return;
|
||||||
const responseCmd = { action: 'meshToolInfo', name: command.name, hash: info.hash, size: info.size, url: info.url };
|
const responseCmd = { action: 'meshToolInfo', name: command.name, tag: command.tag, sessionid: command.sessionid, hash: info.hash, size: info.size, url: info.url };
|
||||||
if (command.cookie === true) { responseCmd.url += ('&auth=' + parent.parent.encodeCookie({ download: info.dlname }, parent.parent.loginCookieEncryptionKey)); }
|
if (command.cookie === true) { responseCmd.url += ('&auth=' + parent.parent.encodeCookie({ download: info.dlname }, parent.parent.loginCookieEncryptionKey)); }
|
||||||
if (command.pipe === true) { responseCmd.pipe = true; }
|
if (command.pipe === true) { responseCmd.pipe = true; }
|
||||||
if (parent.webCertificateHashs[domain.id] != null) { responseCmd.serverhash = Buffer.from(parent.webCertificateHashs[domain.id], 'binary').toString('hex'); }
|
if (parent.webCertificateHashs[domain.id] != null) { responseCmd.serverhash = Buffer.from(parent.webCertificateHashs[domain.id],'binary').toString('hex'); }
|
||||||
try { ws.send(JSON.stringify(responseCmd)); } catch (ex) { }
|
try { ws.send(JSON.stringify(responseCmd)); } catch (ex) { }
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user