mirror of
https://github.com/PhyreApps/PhyrePanel.git
synced 2024-11-25 00:50:32 +00:00
121 lines
3.8 KiB
JavaScript
121 lines
3.8 KiB
JavaScript
#!/usr/bin/env node
|
|
|
|
import { execSync } from 'node:child_process';
|
|
import { readFileSync } from 'node:fs';
|
|
import { spawn } from 'node-pty';
|
|
import { WebSocketServer } from 'ws';
|
|
|
|
const sessionName = 'PHYRESID';
|
|
const hostname = execSync('hostname', { silent: true }).toString().trim();
|
|
// const systemIPs = JSON.parse(
|
|
// execSync(`${process.env.PHYRE}/bin/v-list-sys-ips json`, { silent: true }).toString(),
|
|
// );
|
|
const systemIPs = [];
|
|
// const { config } = JSON.parse(
|
|
// execSync(`${process.env.PHYRE}/bin/v-list-sys-config json`, { silent: true }).toString(),
|
|
// );
|
|
const config = {
|
|
WEB_TERMINAL_PORT: 3000,
|
|
BACKEND_PORT: 8083,
|
|
};
|
|
|
|
const wss = new WebSocketServer({
|
|
port: parseInt(config.WEB_TERMINAL_PORT, 10),
|
|
verifyClient: async (info, cb) => {
|
|
if (!info.req.headers.cookie.includes(sessionName)) {
|
|
cb(false, 401, 'Unauthorized');
|
|
return;
|
|
}
|
|
|
|
const origin = info.origin || info.req.headers.origin;
|
|
let matches = origin === `https://${hostname}:${config.BACKEND_PORT}`;
|
|
|
|
if (!matches) {
|
|
for (const ip of Object.keys(systemIPs)) {
|
|
if (origin === `https://${ip}:${config.BACKEND_PORT}`) {
|
|
matches = true;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (matches) {
|
|
cb(true);
|
|
return;
|
|
}
|
|
cb(false, 403, 'Forbidden');
|
|
},
|
|
});
|
|
|
|
wss.on('connection', (ws, req) => {
|
|
wss.clients.add(ws);
|
|
|
|
const remoteIP = req.headers['x-real-ip'] || req.socket.remoteAddress;
|
|
|
|
// Check if session is valid
|
|
const sessionID = req.headers.cookie.split(`${sessionName}=`)[1].split(';')[0];
|
|
console.log(`New connection from ${remoteIP} (${sessionID})`);
|
|
|
|
const file = readFileSync(`${process.env.HESTIA}/data/sessions/sess_${sessionID}`);
|
|
if (!file) {
|
|
console.error(`Invalid session ID ${sessionID}, refusing connection`);
|
|
ws.close(1000, 'Your session has expired.');
|
|
return;
|
|
}
|
|
const session = file.toString();
|
|
|
|
// Get username
|
|
const login = session.split('user|s:')[1].split('"')[1];
|
|
const impersonating = session.split('look|s:')[1].split('"')[1];
|
|
const username = impersonating.length > 0 ? impersonating : login;
|
|
|
|
// Get user info
|
|
const passwd = readFileSync('/etc/passwd').toString();
|
|
const userline = passwd.split('\n').find((line) => line.startsWith(`${username}:`));
|
|
if (!userline) {
|
|
console.error(`User ${username} not found, refusing connection`);
|
|
ws.close(1000, 'You are not allowed to access this server.');
|
|
return;
|
|
}
|
|
const [, , uid, gid, , homedir, shell] = userline.split(':');
|
|
|
|
if (shell.endsWith('nologin')) {
|
|
console.error(`User ${username} has no shell, refusing connection`);
|
|
ws.close(1000, 'You have no shell access.');
|
|
return;
|
|
}
|
|
|
|
// Spawn shell as logged in user
|
|
const pty = spawn(shell, [], {
|
|
name: 'xterm-color',
|
|
uid: parseInt(uid, 10),
|
|
gid: parseInt(gid, 10),
|
|
cwd: homedir,
|
|
env: {
|
|
SHELL: shell,
|
|
TERM: 'xterm-color',
|
|
USER: username,
|
|
HOME: homedir,
|
|
PWD: homedir,
|
|
PHYRE: process.env.PHYRE,
|
|
},
|
|
});
|
|
console.log(`New pty (${pty.pid}): ${shell} as ${username} (${uid}:${gid}) in ${homedir}`);
|
|
|
|
// Send/receive data from websocket/pty
|
|
pty.on('data', (data) => ws.send(data));
|
|
ws.on('message', (data) => pty.write(data));
|
|
|
|
// Ensure pty is killed when websocket is closed and vice versa
|
|
pty.on('exit', () => {
|
|
console.log(`Ended pty (${pty.pid})`);
|
|
if (ws.OPEN) {
|
|
ws.close();
|
|
}
|
|
});
|
|
ws.on('close', () => {
|
|
console.log(`Ended connection from ${remoteIP} (${sessionID})`);
|
|
pty.kill();
|
|
wss.clients.delete(ws);
|
|
});
|
|
});
|