2022-03-19 18:55:43 +00:00
|
|
|
/*
|
|
|
|
Copyright 2022 AmidaWare LLC.
|
|
|
|
|
|
|
|
Licensed under the Tactical RMM License Version 1.0 (the “License”).
|
|
|
|
You may only use the Licensed Software in accordance with the License.
|
|
|
|
A copy of the License is available at:
|
|
|
|
|
|
|
|
https://license.tacticalrmm.com
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
package agent
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net/url"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"regexp"
|
|
|
|
"runtime"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/go-resty/resty/v2"
|
|
|
|
trmm "github.com/wh1te909/trmm-shared"
|
|
|
|
)
|
|
|
|
|
|
|
|
type Installer struct {
|
|
|
|
Headers map[string]string
|
|
|
|
RMM string
|
|
|
|
ClientID int
|
|
|
|
SiteID int
|
|
|
|
Description string
|
|
|
|
AgentType string
|
|
|
|
Power bool
|
|
|
|
RDP bool
|
|
|
|
Ping bool
|
|
|
|
Token string
|
|
|
|
LocalMesh string
|
|
|
|
Cert string
|
|
|
|
Proxy string
|
|
|
|
Timeout time.Duration
|
|
|
|
SaltMaster string
|
|
|
|
Silent bool
|
|
|
|
NoMesh bool
|
|
|
|
MeshDir string
|
|
|
|
MeshNodeID string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *Agent) Install(i *Installer) {
|
|
|
|
a.checkExistingAndRemove(i.Silent)
|
|
|
|
|
|
|
|
i.Headers = map[string]string{
|
|
|
|
"content-type": "application/json",
|
|
|
|
"Authorization": fmt.Sprintf("Token %s", i.Token),
|
|
|
|
}
|
|
|
|
a.AgentID = GenerateAgentID()
|
|
|
|
a.Logger.Debugln("Agent ID:", a.AgentID)
|
|
|
|
|
|
|
|
u, err := url.Parse(i.RMM)
|
|
|
|
if err != nil {
|
|
|
|
a.installerMsg(err.Error(), "error", i.Silent)
|
|
|
|
}
|
|
|
|
|
|
|
|
if u.Scheme != "https" && u.Scheme != "http" {
|
|
|
|
a.installerMsg("Invalid URL (must contain https or http)", "error", i.Silent)
|
|
|
|
}
|
|
|
|
|
|
|
|
// will match either ipv4 , or ipv4:port
|
|
|
|
var ipPort = regexp.MustCompile(`[0-9]+(?:\.[0-9]+){3}(:[0-9]+)?`)
|
|
|
|
|
|
|
|
// if ipv4:port, strip the port to get ip for salt master
|
|
|
|
if ipPort.MatchString(u.Host) && strings.Contains(u.Host, ":") {
|
|
|
|
i.SaltMaster = strings.Split(u.Host, ":")[0]
|
|
|
|
} else if strings.Contains(u.Host, ":") {
|
|
|
|
i.SaltMaster = strings.Split(u.Host, ":")[0]
|
|
|
|
} else {
|
|
|
|
i.SaltMaster = u.Host
|
|
|
|
}
|
|
|
|
|
|
|
|
a.Logger.Debugln("API:", i.SaltMaster)
|
|
|
|
|
|
|
|
baseURL := u.Scheme + "://" + u.Host
|
|
|
|
a.Logger.Debugln("Base URL:", baseURL)
|
|
|
|
|
|
|
|
iClient := resty.New()
|
|
|
|
iClient.SetCloseConnection(true)
|
|
|
|
iClient.SetTimeout(15 * time.Second)
|
|
|
|
iClient.SetDebug(a.Debug)
|
|
|
|
iClient.SetHeaders(i.Headers)
|
|
|
|
|
|
|
|
// set proxy if applicable
|
|
|
|
if len(i.Proxy) > 0 {
|
|
|
|
a.Logger.Infoln("Using proxy:", i.Proxy)
|
|
|
|
iClient.SetProxy(i.Proxy)
|
|
|
|
}
|
|
|
|
|
|
|
|
creds, cerr := iClient.R().Get(fmt.Sprintf("%s/api/v3/installer/", baseURL))
|
|
|
|
if cerr != nil {
|
|
|
|
a.installerMsg(cerr.Error(), "error", i.Silent)
|
|
|
|
}
|
|
|
|
if creds.StatusCode() == 401 {
|
|
|
|
a.installerMsg("Installer token has expired. Please generate a new one.", "error", i.Silent)
|
|
|
|
}
|
|
|
|
|
|
|
|
verPayload := map[string]string{"version": a.Version}
|
|
|
|
iVersion, ierr := iClient.R().SetBody(verPayload).Post(fmt.Sprintf("%s/api/v3/installer/", baseURL))
|
|
|
|
if ierr != nil {
|
|
|
|
a.installerMsg(ierr.Error(), "error", i.Silent)
|
|
|
|
}
|
|
|
|
if iVersion.StatusCode() != 200 {
|
|
|
|
a.installerMsg(DjangoStringResp(iVersion.String()), "error", i.Silent)
|
|
|
|
}
|
|
|
|
|
|
|
|
rClient := resty.New()
|
|
|
|
rClient.SetCloseConnection(true)
|
|
|
|
rClient.SetTimeout(i.Timeout * time.Second)
|
|
|
|
rClient.SetDebug(a.Debug)
|
|
|
|
// set rest knox headers
|
|
|
|
rClient.SetHeaders(i.Headers)
|
|
|
|
|
|
|
|
// set local cert if applicable
|
|
|
|
if len(i.Cert) > 0 {
|
|
|
|
if !trmm.FileExists(i.Cert) {
|
|
|
|
a.installerMsg(fmt.Sprintf("%s does not exist", i.Cert), "error", i.Silent)
|
|
|
|
}
|
|
|
|
rClient.SetRootCertificate(i.Cert)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(i.Proxy) > 0 {
|
|
|
|
rClient.SetProxy(i.Proxy)
|
|
|
|
}
|
|
|
|
|
2022-06-17 05:14:44 +00:00
|
|
|
var installerMeshSystemEXE string
|
2022-03-19 18:55:43 +00:00
|
|
|
if len(i.MeshDir) > 0 {
|
2022-06-17 05:14:44 +00:00
|
|
|
installerMeshSystemEXE = filepath.Join(i.MeshDir, "MeshAgent.exe")
|
2022-03-19 18:55:43 +00:00
|
|
|
} else {
|
2022-06-17 05:14:44 +00:00
|
|
|
installerMeshSystemEXE = a.MeshSystemEXE
|
2022-03-19 18:55:43 +00:00
|
|
|
}
|
|
|
|
|
2022-09-23 23:05:17 +00:00
|
|
|
var meshNodeID, meshOutput string
|
|
|
|
|
|
|
|
if !i.NoMesh && runtime.GOOS != "linux" {
|
|
|
|
switch runtime.GOOS {
|
|
|
|
case "windows":
|
|
|
|
meshOutput = filepath.Join(a.ProgramDir, a.MeshInstaller)
|
|
|
|
case "darwin":
|
|
|
|
tmp, err := createTmpFile()
|
|
|
|
if err != nil {
|
|
|
|
a.Logger.Fatalln("Failed to create mesh temp file", err)
|
|
|
|
}
|
|
|
|
meshOutput = tmp.Name()
|
|
|
|
os.Chmod(meshOutput, 0755)
|
|
|
|
defer os.Remove(meshOutput)
|
|
|
|
defer os.Remove(meshOutput + ".msh")
|
|
|
|
}
|
2022-03-19 18:55:43 +00:00
|
|
|
|
2022-09-23 23:05:17 +00:00
|
|
|
if runtime.GOOS == "windows" && i.LocalMesh != "" {
|
|
|
|
err := copyFile(i.LocalMesh, meshOutput)
|
|
|
|
if err != nil {
|
|
|
|
a.installerMsg(err.Error(), "error", i.Silent)
|
|
|
|
}
|
|
|
|
} else {
|
2022-03-19 18:55:43 +00:00
|
|
|
a.Logger.Infoln("Downloading mesh agent...")
|
2022-06-20 19:23:51 +00:00
|
|
|
payload := map[string]string{"goarch": a.GoArch, "plat": a.Platform}
|
2022-09-23 23:05:17 +00:00
|
|
|
r, err := rClient.R().SetBody(payload).SetOutput(meshOutput).Post(fmt.Sprintf("%s/api/v3/meshexe/", baseURL))
|
2022-03-19 18:55:43 +00:00
|
|
|
if err != nil {
|
|
|
|
a.installerMsg(fmt.Sprintf("Failed to download mesh agent: %s", err.Error()), "error", i.Silent)
|
|
|
|
}
|
|
|
|
if r.StatusCode() != 200 {
|
|
|
|
a.installerMsg(fmt.Sprintf("Unable to download the mesh agent from the RMM. %s", r.String()), "error", i.Silent)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
a.Logger.Infoln("Installing mesh agent...")
|
2022-09-23 23:05:17 +00:00
|
|
|
a.Logger.Debugln("Mesh agent:", meshOutput)
|
2022-03-19 18:55:43 +00:00
|
|
|
time.Sleep(1 * time.Second)
|
|
|
|
|
2022-09-23 23:05:17 +00:00
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
meshNodeID, err = a.installMesh(meshOutput, installerMeshSystemEXE, i.Proxy)
|
|
|
|
if err != nil {
|
|
|
|
a.installerMsg(fmt.Sprintf("Failed to install mesh agent: %s", err.Error()), "error", i.Silent)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
opts := a.NewCMDOpts()
|
2022-10-25 18:34:44 +00:00
|
|
|
opts.Command = fmt.Sprintf("%s -install --installPath=%s", meshOutput, nixMeshDir)
|
2022-09-23 23:05:17 +00:00
|
|
|
out := a.CmdV2(opts)
|
|
|
|
if out.Status.Exit != 0 {
|
|
|
|
a.Logger.Fatalln("Error installing mesh agent:", out.Stderr)
|
|
|
|
}
|
|
|
|
fmt.Println(out.Stdout)
|
2022-03-19 18:55:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(i.MeshNodeID) > 0 {
|
|
|
|
meshNodeID = i.MeshNodeID
|
|
|
|
}
|
|
|
|
|
|
|
|
a.Logger.Infoln("Adding agent to dashboard")
|
|
|
|
// add agent
|
|
|
|
type NewAgentResp struct {
|
|
|
|
AgentPK int `json:"pk"`
|
|
|
|
Token string `json:"token"`
|
|
|
|
}
|
|
|
|
agentPayload := map[string]interface{}{
|
|
|
|
"agent_id": a.AgentID,
|
|
|
|
"hostname": a.Hostname,
|
|
|
|
"site": i.SiteID,
|
|
|
|
"monitoring_type": i.AgentType,
|
|
|
|
"mesh_node_id": meshNodeID,
|
|
|
|
"description": i.Description,
|
|
|
|
"goarch": a.GoArch,
|
|
|
|
"plat": a.Platform,
|
|
|
|
}
|
|
|
|
|
|
|
|
r, err := rClient.R().SetBody(agentPayload).SetResult(&NewAgentResp{}).Post(fmt.Sprintf("%s/api/v3/newagent/", baseURL))
|
|
|
|
if err != nil {
|
|
|
|
a.installerMsg(err.Error(), "error", i.Silent)
|
|
|
|
}
|
|
|
|
if r.StatusCode() != 200 {
|
|
|
|
a.installerMsg(r.String(), "error", i.Silent)
|
|
|
|
}
|
|
|
|
|
|
|
|
agentPK := r.Result().(*NewAgentResp).AgentPK
|
|
|
|
agentToken := r.Result().(*NewAgentResp).Token
|
|
|
|
|
|
|
|
a.Logger.Debugln("Agent token:", agentToken)
|
|
|
|
a.Logger.Debugln("Agent PK:", agentPK)
|
|
|
|
|
|
|
|
createAgentConfig(baseURL, a.AgentID, i.SaltMaster, agentToken, strconv.Itoa(agentPK), i.Cert, i.Proxy, i.MeshDir)
|
|
|
|
time.Sleep(1 * time.Second)
|
|
|
|
// refresh our agent with new values
|
|
|
|
a = New(a.Logger, a.Version)
|
|
|
|
a.Logger.Debugf("%+v\n", a)
|
|
|
|
|
|
|
|
// set new headers, no longer knox auth...use agent auth
|
|
|
|
rClient.SetHeaders(a.Headers)
|
|
|
|
|
|
|
|
time.Sleep(3 * time.Second)
|
|
|
|
// check in once
|
|
|
|
a.DoNatsCheckIn()
|
|
|
|
|
2022-09-23 23:05:17 +00:00
|
|
|
if runtime.GOOS == "darwin" {
|
|
|
|
os.MkdirAll(nixAgentDir, 0755)
|
|
|
|
self, _ := os.Executable()
|
|
|
|
copyFile(self, nixAgentBin)
|
|
|
|
os.Chmod(nixAgentBin, 0755)
|
|
|
|
svc := fmt.Sprintf(`
|
|
|
|
<?xml version="1.0" encoding="UTF-8"?>
|
|
|
|
<!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
|
|
|
<plist version="1.0">
|
|
|
|
<dict>
|
|
|
|
<key>Label</key>
|
|
|
|
<string>%s</string>
|
|
|
|
|
|
|
|
<key>ServiceDescription</key>
|
|
|
|
<string>TacticalAgent Service</string>
|
|
|
|
|
|
|
|
<key>ProgramArguments</key>
|
|
|
|
<array>
|
|
|
|
<string>%s</string>
|
|
|
|
<string>-m</string>
|
|
|
|
<string>svc</string>
|
|
|
|
</array>
|
|
|
|
|
|
|
|
<key>WorkingDirectory</key>
|
|
|
|
<string>%s/</string>
|
|
|
|
|
|
|
|
<key>RunAtLoad</key>
|
|
|
|
<true/>
|
|
|
|
|
|
|
|
<key>KeepAlive</key>
|
|
|
|
<true/>
|
|
|
|
</dict>
|
|
|
|
</plist>
|
|
|
|
`, macPlistName, nixAgentBin, nixAgentDir)
|
|
|
|
|
|
|
|
os.WriteFile(macPlistPath, []byte(svc), 0644)
|
|
|
|
opts := a.NewCMDOpts()
|
|
|
|
opts.Command = fmt.Sprintf("launchctl bootstrap system %s", macPlistPath)
|
|
|
|
a.CmdV2(opts)
|
|
|
|
}
|
|
|
|
|
2022-03-19 18:55:43 +00:00
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
// send software api
|
|
|
|
a.SendSoftware()
|
|
|
|
|
|
|
|
a.Logger.Debugln("Creating temp dir")
|
2022-08-09 17:33:30 +00:00
|
|
|
err := createWinTempDir()
|
|
|
|
if err != nil {
|
|
|
|
a.Logger.Errorln("Install() createWinTempDir():", err)
|
|
|
|
}
|
2022-03-19 18:55:43 +00:00
|
|
|
|
|
|
|
a.Logger.Debugln("Disabling automatic windows updates")
|
|
|
|
a.PatchMgmnt(true)
|
|
|
|
|
|
|
|
a.Logger.Infoln("Installing service...")
|
2022-08-09 17:33:30 +00:00
|
|
|
err = a.InstallService()
|
2022-03-19 18:55:43 +00:00
|
|
|
if err != nil {
|
|
|
|
a.installerMsg(err.Error(), "error", i.Silent)
|
|
|
|
}
|
|
|
|
|
|
|
|
time.Sleep(1 * time.Second)
|
|
|
|
a.Logger.Infoln("Starting service...")
|
|
|
|
out := a.ControlService(winSvcName, "start")
|
|
|
|
if !out.Success {
|
|
|
|
a.installerMsg(out.ErrorMsg, "error", i.Silent)
|
|
|
|
}
|
|
|
|
|
|
|
|
if i.Power {
|
|
|
|
a.Logger.Infoln("Disabling sleep/hibernate...")
|
|
|
|
DisableSleepHibernate()
|
|
|
|
}
|
|
|
|
|
|
|
|
if i.Ping {
|
|
|
|
a.Logger.Infoln("Enabling ping...")
|
|
|
|
EnablePing()
|
|
|
|
}
|
|
|
|
|
|
|
|
if i.RDP {
|
|
|
|
a.Logger.Infoln("Enabling RDP...")
|
|
|
|
EnableRDP()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
a.installerMsg("Installation was successfull!\nAllow a few minutes for the agent to properly display in the RMM", "info", i.Silent)
|
|
|
|
}
|
|
|
|
|
|
|
|
func copyFile(src, dst string) error {
|
|
|
|
in, err := os.Open(src)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer in.Close()
|
|
|
|
|
|
|
|
out, err := os.Create(dst)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer out.Close()
|
|
|
|
|
|
|
|
_, err = io.Copy(out, in)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|