- Replace custom search/replace implementation with native CodeMirror extensions - Add proper keyboard shortcut support: Ctrl+F, Ctrl+H, Ctrl+/, Ctrl+Space, etc. - Fix browser shortcut conflicts by preventing defaults only when editor is focused - Integrate autocompletion and comment toggle functionality - Fix file name truncation in file manager grid to use text wrapping - Add comprehensive keyboard shortcuts help panel for users - Update i18n translations for editor buttons (Download, Replace, Replace All) - Unify text and code file editing under single CodeMirror instance - Add proper SSH HMAC algorithms for better compatibility 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
746 lines
22 KiB
TypeScript
746 lines
22 KiB
TypeScript
import { WebSocketServer, WebSocket, type RawData } from "ws";
|
|
import { Client, type ClientChannel, type PseudoTtyOptions } from "ssh2";
|
|
import { parse as parseUrl } from "url";
|
|
import { getDb } from "../database/db/index.js";
|
|
import { sshCredentials } from "../database/db/schema.js";
|
|
import { eq, and } from "drizzle-orm";
|
|
import { sshLogger } from "../utils/logger.js";
|
|
import { SimpleDBOps } from "../utils/simple-db-ops.js";
|
|
import { AuthManager } from "../utils/auth-manager.js";
|
|
import { UserCrypto } from "../utils/user-crypto.js";
|
|
|
|
// Get auth instances
|
|
const authManager = AuthManager.getInstance();
|
|
const userCrypto = UserCrypto.getInstance();
|
|
|
|
// Track user connections for rate limiting
|
|
const userConnections = new Map<string, Set<WebSocket>>();
|
|
|
|
const wss = new WebSocketServer({
|
|
port: 8082,
|
|
// WebSocket authentication during handshake
|
|
verifyClient: async (info) => {
|
|
try {
|
|
const url = parseUrl(info.req.url!, true);
|
|
const token = url.query.token as string;
|
|
|
|
if (!token) {
|
|
sshLogger.warn("WebSocket connection rejected: missing token", {
|
|
operation: "websocket_auth_reject",
|
|
reason: "missing_token",
|
|
ip: info.req.socket.remoteAddress
|
|
});
|
|
return false;
|
|
}
|
|
|
|
const payload = await authManager.verifyJWTToken(token);
|
|
|
|
if (!payload) {
|
|
sshLogger.warn("WebSocket connection rejected: invalid token", {
|
|
operation: "websocket_auth_reject",
|
|
reason: "invalid_token",
|
|
ip: info.req.socket.remoteAddress
|
|
});
|
|
return false;
|
|
}
|
|
|
|
// Check for TOTP pending (should not allow terminal access during TOTP)
|
|
if (payload.pendingTOTP) {
|
|
sshLogger.warn("WebSocket connection rejected: TOTP verification pending", {
|
|
operation: "websocket_auth_reject",
|
|
reason: "totp_pending",
|
|
userId: payload.userId,
|
|
ip: info.req.socket.remoteAddress
|
|
});
|
|
return false;
|
|
}
|
|
|
|
// Check connection limits per user (max 3 concurrent connections)
|
|
const existingConnections = userConnections.get(payload.userId);
|
|
if (existingConnections && existingConnections.size >= 3) {
|
|
sshLogger.warn("WebSocket connection rejected: too many connections", {
|
|
operation: "websocket_auth_reject",
|
|
reason: "connection_limit",
|
|
userId: payload.userId,
|
|
currentConnections: existingConnections.size,
|
|
ip: info.req.socket.remoteAddress
|
|
});
|
|
return false;
|
|
}
|
|
|
|
// Note: We don't need to attach user info to request anymore
|
|
// Connection handler will re-verify JWT directly from URL
|
|
|
|
sshLogger.info("WebSocket connection authenticated", {
|
|
operation: "websocket_auth_success",
|
|
userId: payload.userId,
|
|
ip: info.req.socket.remoteAddress
|
|
});
|
|
|
|
return true;
|
|
} catch (error) {
|
|
sshLogger.error("WebSocket authentication error", error, {
|
|
operation: "websocket_auth_error",
|
|
ip: info.req.socket.remoteAddress
|
|
});
|
|
return false;
|
|
}
|
|
}
|
|
});
|
|
|
|
sshLogger.success("SSH Terminal WebSocket server started with authentication", {
|
|
operation: "server_start",
|
|
port: 8082,
|
|
features: ["JWT_auth", "connection_limits", "data_access_control"]
|
|
});
|
|
|
|
wss.on("connection", async (ws: WebSocket, req) => {
|
|
// Linus principle: eliminate complexity - always parse JWT from URL directly
|
|
let userId: string | undefined;
|
|
let userPayload: any;
|
|
|
|
try {
|
|
const url = parseUrl(req.url!, true);
|
|
const token = url.query.token as string;
|
|
|
|
if (!token) {
|
|
sshLogger.warn("WebSocket connection rejected: missing token in connection", {
|
|
operation: "websocket_connection_reject",
|
|
reason: "missing_token",
|
|
ip: req.socket.remoteAddress
|
|
});
|
|
ws.close(1008, "Authentication required");
|
|
return;
|
|
}
|
|
|
|
const payload = await authManager.verifyJWTToken(token);
|
|
if (!payload) {
|
|
sshLogger.warn("WebSocket connection rejected: invalid token in connection", {
|
|
operation: "websocket_connection_reject",
|
|
reason: "invalid_token",
|
|
ip: req.socket.remoteAddress
|
|
});
|
|
ws.close(1008, "Authentication required");
|
|
return;
|
|
}
|
|
|
|
userId = payload.userId;
|
|
userPayload = payload;
|
|
|
|
} catch (error) {
|
|
sshLogger.error("WebSocket JWT verification failed during connection", error, {
|
|
operation: "websocket_connection_auth_error",
|
|
ip: req.socket.remoteAddress
|
|
});
|
|
ws.close(1008, "Authentication required");
|
|
return;
|
|
}
|
|
|
|
// Check data access permissions
|
|
const dataKey = userCrypto.getUserDataKey(userId);
|
|
if (!dataKey) {
|
|
sshLogger.warn("WebSocket connection rejected: data locked", {
|
|
operation: "websocket_data_locked",
|
|
userId,
|
|
ip: req.socket.remoteAddress
|
|
});
|
|
ws.send(JSON.stringify({
|
|
type: "error",
|
|
message: "Data locked - re-authenticate with password",
|
|
code: "DATA_LOCKED"
|
|
}));
|
|
ws.close(1008, "Data access required");
|
|
return;
|
|
}
|
|
|
|
// Track user connections for limits
|
|
if (!userConnections.has(userId)) {
|
|
userConnections.set(userId, new Set());
|
|
}
|
|
const userWs = userConnections.get(userId)!;
|
|
userWs.add(ws);
|
|
|
|
sshLogger.info("WebSocket connection established", {
|
|
operation: "websocket_connection_established",
|
|
userId,
|
|
userConnections: userWs.size,
|
|
ip: req.socket.remoteAddress
|
|
});
|
|
|
|
let sshConn: Client | null = null;
|
|
let sshStream: ClientChannel | null = null;
|
|
let pingInterval: NodeJS.Timeout | null = null;
|
|
|
|
ws.on("close", () => {
|
|
// Clean up user connection tracking
|
|
const userWs = userConnections.get(userId);
|
|
if (userWs) {
|
|
userWs.delete(ws);
|
|
if (userWs.size === 0) {
|
|
userConnections.delete(userId);
|
|
}
|
|
}
|
|
|
|
sshLogger.info("WebSocket connection closed", {
|
|
operation: "websocket_connection_closed",
|
|
userId,
|
|
remainingConnections: userWs?.size || 0
|
|
});
|
|
|
|
cleanupSSH();
|
|
});
|
|
|
|
ws.on("message", (msg: RawData) => {
|
|
// Verify user still has data access before processing any messages
|
|
const currentDataKey = userCrypto.getUserDataKey(userId);
|
|
if (!currentDataKey) {
|
|
sshLogger.warn("WebSocket message rejected: data access expired", {
|
|
operation: "websocket_message_rejected",
|
|
userId,
|
|
reason: "data_access_expired"
|
|
});
|
|
ws.send(JSON.stringify({
|
|
type: "error",
|
|
message: "Data access expired - please re-authenticate",
|
|
code: "DATA_EXPIRED"
|
|
}));
|
|
ws.close(1008, "Data access expired");
|
|
return;
|
|
}
|
|
|
|
let parsed: any;
|
|
try {
|
|
parsed = JSON.parse(msg.toString());
|
|
} catch (e) {
|
|
sshLogger.error("Invalid JSON received", e, {
|
|
operation: "websocket_message_invalid_json",
|
|
userId,
|
|
messageLength: msg.toString().length,
|
|
});
|
|
ws.send(JSON.stringify({ type: "error", message: "Invalid JSON" }));
|
|
return;
|
|
}
|
|
|
|
const { type, data } = parsed;
|
|
|
|
switch (type) {
|
|
case "connectToHost":
|
|
// Ensure userId is attached to hostConfig for secure credential resolution
|
|
if (data.hostConfig) {
|
|
data.hostConfig.userId = userId;
|
|
}
|
|
handleConnectToHost(data).catch((error) => {
|
|
sshLogger.error("Failed to connect to host", error, {
|
|
operation: "ssh_connect",
|
|
userId,
|
|
hostId: data.hostConfig?.id,
|
|
ip: data.hostConfig?.ip,
|
|
});
|
|
ws.send(
|
|
JSON.stringify({
|
|
type: "error",
|
|
message:
|
|
"Failed to connect to host: " +
|
|
(error instanceof Error ? error.message : "Unknown error"),
|
|
}),
|
|
);
|
|
});
|
|
break;
|
|
|
|
case "resize":
|
|
handleResize(data);
|
|
break;
|
|
|
|
case "disconnect":
|
|
cleanupSSH();
|
|
break;
|
|
|
|
case "input":
|
|
if (sshStream) {
|
|
if (data === "\t") {
|
|
sshStream.write(data);
|
|
} else if (data.startsWith("\x1b")) {
|
|
sshStream.write(data);
|
|
} else {
|
|
sshStream.write(Buffer.from(data, "utf8"));
|
|
}
|
|
}
|
|
break;
|
|
|
|
case "ping":
|
|
ws.send(JSON.stringify({ type: "pong" }));
|
|
break;
|
|
|
|
default:
|
|
sshLogger.warn("Unknown message type received", {
|
|
operation: "websocket_message_unknown_type",
|
|
userId,
|
|
messageType: type,
|
|
});
|
|
}
|
|
});
|
|
|
|
async function handleConnectToHost(data: {
|
|
cols: number;
|
|
rows: number;
|
|
hostConfig: {
|
|
id: number;
|
|
ip: string;
|
|
port: number;
|
|
username: string;
|
|
password?: string;
|
|
key?: string;
|
|
keyPassword?: string;
|
|
keyType?: string;
|
|
authType?: string;
|
|
credentialId?: number;
|
|
userId?: string;
|
|
};
|
|
initialPath?: string;
|
|
executeCommand?: string;
|
|
}) {
|
|
const { cols, rows, hostConfig, initialPath, executeCommand } = data;
|
|
const {
|
|
id,
|
|
ip,
|
|
port,
|
|
username,
|
|
password,
|
|
key,
|
|
keyPassword,
|
|
keyType,
|
|
authType,
|
|
credentialId,
|
|
} = hostConfig;
|
|
|
|
if (!username || typeof username !== "string" || username.trim() === "") {
|
|
sshLogger.error("Invalid username provided", undefined, {
|
|
operation: "ssh_connect",
|
|
hostId: id,
|
|
ip,
|
|
});
|
|
ws.send(
|
|
JSON.stringify({ type: "error", message: "Invalid username provided" }),
|
|
);
|
|
return;
|
|
}
|
|
|
|
if (!ip || typeof ip !== "string" || ip.trim() === "") {
|
|
sshLogger.error("Invalid IP provided", undefined, {
|
|
operation: "ssh_connect",
|
|
hostId: id,
|
|
username,
|
|
});
|
|
ws.send(
|
|
JSON.stringify({ type: "error", message: "Invalid IP provided" }),
|
|
);
|
|
return;
|
|
}
|
|
|
|
if (!port || typeof port !== "number" || port <= 0) {
|
|
sshLogger.error("Invalid port provided", undefined, {
|
|
operation: "ssh_connect",
|
|
hostId: id,
|
|
ip,
|
|
username,
|
|
port,
|
|
});
|
|
ws.send(
|
|
JSON.stringify({ type: "error", message: "Invalid port provided" }),
|
|
);
|
|
return;
|
|
}
|
|
|
|
sshConn = new Client();
|
|
|
|
const connectionTimeout = setTimeout(() => {
|
|
if (sshConn) {
|
|
sshLogger.error("SSH connection timeout", undefined, {
|
|
operation: "ssh_connect",
|
|
hostId: id,
|
|
ip,
|
|
port,
|
|
username,
|
|
});
|
|
ws.send(
|
|
JSON.stringify({ type: "error", message: "SSH connection timeout" }),
|
|
);
|
|
cleanupSSH(connectionTimeout);
|
|
}
|
|
}, 60000);
|
|
|
|
sshLogger.debug(`Terminal SSH setup`, {
|
|
operation: "terminal_ssh",
|
|
hostId: id,
|
|
ip,
|
|
authType,
|
|
hasPassword: !!password,
|
|
passwordLength: password?.length || 0,
|
|
hasCredentialId: !!credentialId,
|
|
});
|
|
|
|
// SECURITY: Never log password information - removed password preview logging
|
|
sshLogger.debug(`SSH authentication setup`, {
|
|
operation: "terminal_ssh_auth_setup",
|
|
userId,
|
|
hostId: id,
|
|
authType,
|
|
hasPassword: !!password,
|
|
hasCredentialId: !!credentialId,
|
|
});
|
|
|
|
let resolvedCredentials = { password, key, keyPassword, keyType, authType };
|
|
if (credentialId && id && hostConfig.userId) {
|
|
try {
|
|
const credentials = await SimpleDBOps.select(
|
|
getDb()
|
|
.select()
|
|
.from(sshCredentials)
|
|
.where(
|
|
and(
|
|
eq(sshCredentials.id, credentialId),
|
|
eq(sshCredentials.userId, hostConfig.userId),
|
|
),
|
|
),
|
|
"ssh_credentials",
|
|
hostConfig.userId,
|
|
);
|
|
|
|
if (credentials.length > 0) {
|
|
const credential = credentials[0];
|
|
resolvedCredentials = {
|
|
password: credential.password,
|
|
key: credential.privateKey || credential.key, // prefer new privateKey field
|
|
keyPassword: credential.keyPassword,
|
|
keyType: credential.keyType,
|
|
authType: credential.authType,
|
|
};
|
|
} else {
|
|
sshLogger.warn(`No credentials found for host ${id}`, {
|
|
operation: "ssh_credentials",
|
|
hostId: id,
|
|
credentialId,
|
|
userId: hostConfig.userId,
|
|
});
|
|
}
|
|
} catch (error) {
|
|
sshLogger.warn(`Failed to resolve credentials for host ${id}`, {
|
|
operation: "ssh_credentials",
|
|
hostId: id,
|
|
credentialId,
|
|
error: error instanceof Error ? error.message : "Unknown error",
|
|
});
|
|
}
|
|
} else if (credentialId && id) {
|
|
sshLogger.warn("Missing userId for credential resolution in terminal", {
|
|
operation: "ssh_credentials",
|
|
hostId: id,
|
|
credentialId,
|
|
hasUserId: !!hostConfig.userId,
|
|
});
|
|
}
|
|
|
|
sshConn.on("ready", () => {
|
|
clearTimeout(connectionTimeout);
|
|
|
|
sshConn!.shell(
|
|
{
|
|
rows: data.rows,
|
|
cols: data.cols,
|
|
term: "xterm-256color",
|
|
} as PseudoTtyOptions,
|
|
(err, stream) => {
|
|
if (err) {
|
|
sshLogger.error("Shell error", err, {
|
|
operation: "ssh_shell",
|
|
hostId: id,
|
|
ip,
|
|
port,
|
|
username,
|
|
});
|
|
ws.send(
|
|
JSON.stringify({
|
|
type: "error",
|
|
message: "Shell error: " + err.message,
|
|
}),
|
|
);
|
|
return;
|
|
}
|
|
|
|
sshStream = stream;
|
|
|
|
stream.on("data", (data: Buffer) => {
|
|
ws.send(JSON.stringify({ type: "data", data: data.toString() }));
|
|
});
|
|
|
|
stream.on("close", () => {
|
|
ws.send(
|
|
JSON.stringify({
|
|
type: "disconnected",
|
|
message: "Connection lost",
|
|
}),
|
|
);
|
|
});
|
|
|
|
stream.on("error", (err: Error) => {
|
|
sshLogger.error("SSH stream error", err, {
|
|
operation: "ssh_stream",
|
|
hostId: id,
|
|
ip,
|
|
port,
|
|
username,
|
|
});
|
|
ws.send(
|
|
JSON.stringify({
|
|
type: "error",
|
|
message: "SSH stream error: " + err.message,
|
|
}),
|
|
);
|
|
});
|
|
|
|
setupPingInterval();
|
|
|
|
// Change to initial path if specified
|
|
if (initialPath && initialPath.trim() !== "") {
|
|
sshLogger.debug(`Changing to initial path: ${initialPath}`, {
|
|
operation: "ssh_initial_path",
|
|
hostId: id,
|
|
path: initialPath,
|
|
});
|
|
|
|
// Send cd command to change directory
|
|
const cdCommand = `cd "${initialPath.replace(/"/g, '\\"')}" && pwd\n`;
|
|
stream.write(cdCommand);
|
|
}
|
|
|
|
// Execute command if specified
|
|
if (executeCommand && executeCommand.trim() !== "") {
|
|
sshLogger.debug(`Executing command: ${executeCommand}`, {
|
|
operation: "ssh_execute_command",
|
|
hostId: id,
|
|
command: executeCommand,
|
|
});
|
|
|
|
// Wait a moment for the cd command to complete, then execute the command
|
|
setTimeout(() => {
|
|
const command = `${executeCommand}\n`;
|
|
stream.write(command);
|
|
}, 500);
|
|
}
|
|
|
|
ws.send(
|
|
JSON.stringify({ type: "connected", message: "SSH connected" }),
|
|
);
|
|
},
|
|
);
|
|
});
|
|
|
|
sshConn.on("error", (err: Error) => {
|
|
clearTimeout(connectionTimeout);
|
|
sshLogger.error("SSH connection error", err, {
|
|
operation: "ssh_connect",
|
|
hostId: id,
|
|
ip,
|
|
port,
|
|
username,
|
|
authType: resolvedCredentials.authType,
|
|
});
|
|
|
|
let errorMessage = "SSH error: " + err.message;
|
|
if (err.message.includes("No matching key exchange algorithm")) {
|
|
errorMessage =
|
|
"SSH error: No compatible key exchange algorithm found. This may be due to an older SSH server or network device.";
|
|
} else if (err.message.includes("No matching cipher")) {
|
|
errorMessage =
|
|
"SSH error: No compatible cipher found. This may be due to an older SSH server or network device.";
|
|
} else if (err.message.includes("No matching MAC")) {
|
|
errorMessage =
|
|
"SSH error: No compatible MAC algorithm found. This may be due to an older SSH server or network device.";
|
|
} else if (
|
|
err.message.includes("ENOTFOUND") ||
|
|
err.message.includes("ENOENT")
|
|
) {
|
|
errorMessage =
|
|
"SSH error: Could not resolve hostname or connect to server.";
|
|
} else if (err.message.includes("ECONNREFUSED")) {
|
|
errorMessage =
|
|
"SSH error: Connection refused. The server may not be running or the port may be incorrect.";
|
|
} else if (err.message.includes("ETIMEDOUT")) {
|
|
errorMessage =
|
|
"SSH error: Connection timed out. Check your network connection and server availability.";
|
|
} else if (
|
|
err.message.includes("ECONNRESET") ||
|
|
err.message.includes("EPIPE")
|
|
) {
|
|
errorMessage =
|
|
"SSH error: Connection was reset. This may be due to network issues or server timeout.";
|
|
} else if (
|
|
err.message.includes("authentication failed") ||
|
|
err.message.includes("Permission denied")
|
|
) {
|
|
errorMessage =
|
|
"SSH error: Authentication failed. Please check your username and password/key.";
|
|
}
|
|
|
|
ws.send(JSON.stringify({ type: "error", message: errorMessage }));
|
|
cleanupSSH(connectionTimeout);
|
|
});
|
|
|
|
sshConn.on("close", () => {
|
|
clearTimeout(connectionTimeout);
|
|
cleanupSSH(connectionTimeout);
|
|
});
|
|
|
|
const connectConfig: any = {
|
|
host: ip,
|
|
port,
|
|
username,
|
|
keepaliveInterval: 30000,
|
|
keepaliveCountMax: 3,
|
|
readyTimeout: 60000,
|
|
tcpKeepAlive: true,
|
|
tcpKeepAliveInitialDelay: 30000,
|
|
|
|
env: {
|
|
TERM: "xterm-256color",
|
|
LANG: "en_US.UTF-8",
|
|
LC_ALL: "en_US.UTF-8",
|
|
LC_CTYPE: "en_US.UTF-8",
|
|
LC_MESSAGES: "en_US.UTF-8",
|
|
LC_MONETARY: "en_US.UTF-8",
|
|
LC_NUMERIC: "en_US.UTF-8",
|
|
LC_TIME: "en_US.UTF-8",
|
|
LC_COLLATE: "en_US.UTF-8",
|
|
COLORTERM: "truecolor",
|
|
},
|
|
|
|
algorithms: {
|
|
kex: [
|
|
"diffie-hellman-group14-sha256",
|
|
"diffie-hellman-group14-sha1",
|
|
"diffie-hellman-group1-sha1",
|
|
"diffie-hellman-group-exchange-sha256",
|
|
"diffie-hellman-group-exchange-sha1",
|
|
"ecdh-sha2-nistp256",
|
|
"ecdh-sha2-nistp384",
|
|
"ecdh-sha2-nistp521",
|
|
],
|
|
cipher: [
|
|
"aes128-ctr",
|
|
"aes192-ctr",
|
|
"aes256-ctr",
|
|
"aes128-gcm@openssh.com",
|
|
"aes256-gcm@openssh.com",
|
|
"aes128-cbc",
|
|
"aes192-cbc",
|
|
"aes256-cbc",
|
|
"3des-cbc",
|
|
],
|
|
hmac: ["hmac-sha2-256-etm@openssh.com", "hmac-sha2-512-etm@openssh.com", "umac-128-etm@openssh.com", "hmac-sha2-256", "hmac-sha2-512", "hmac-sha1", "hmac-md5"],
|
|
compress: ["none", "zlib@openssh.com", "zlib"],
|
|
},
|
|
};
|
|
if (resolvedCredentials.authType === "key" && resolvedCredentials.key) {
|
|
try {
|
|
if (
|
|
!resolvedCredentials.key.includes("-----BEGIN") ||
|
|
!resolvedCredentials.key.includes("-----END")
|
|
) {
|
|
throw new Error("Invalid private key format");
|
|
}
|
|
|
|
const cleanKey = resolvedCredentials.key
|
|
.trim()
|
|
.replace(/\r\n/g, "\n")
|
|
.replace(/\r/g, "\n");
|
|
|
|
connectConfig.privateKey = Buffer.from(cleanKey, "utf8");
|
|
|
|
if (resolvedCredentials.keyPassword) {
|
|
connectConfig.passphrase = resolvedCredentials.keyPassword;
|
|
}
|
|
|
|
if (
|
|
resolvedCredentials.keyType &&
|
|
resolvedCredentials.keyType !== "auto"
|
|
) {
|
|
connectConfig.privateKeyType = resolvedCredentials.keyType;
|
|
}
|
|
} catch (keyError) {
|
|
sshLogger.error("SSH key format error: " + keyError.message);
|
|
ws.send(
|
|
JSON.stringify({
|
|
type: "error",
|
|
message: "SSH key format error: Invalid private key format",
|
|
}),
|
|
);
|
|
return;
|
|
}
|
|
} else if (resolvedCredentials.authType === "key") {
|
|
sshLogger.error("SSH key authentication requested but no key provided");
|
|
ws.send(
|
|
JSON.stringify({
|
|
type: "error",
|
|
message: "SSH key authentication requested but no key provided",
|
|
}),
|
|
);
|
|
return;
|
|
} else {
|
|
connectConfig.password = resolvedCredentials.password;
|
|
}
|
|
|
|
sshConn.connect(connectConfig);
|
|
}
|
|
|
|
function handleResize(data: { cols: number; rows: number }) {
|
|
if (sshStream && sshStream.setWindow) {
|
|
sshStream.setWindow(data.rows, data.cols, data.rows, data.cols);
|
|
ws.send(
|
|
JSON.stringify({ type: "resized", cols: data.cols, rows: data.rows }),
|
|
);
|
|
}
|
|
}
|
|
|
|
function cleanupSSH(timeoutId?: NodeJS.Timeout) {
|
|
if (timeoutId) {
|
|
clearTimeout(timeoutId);
|
|
}
|
|
|
|
if (pingInterval) {
|
|
clearInterval(pingInterval);
|
|
pingInterval = null;
|
|
}
|
|
|
|
if (sshStream) {
|
|
try {
|
|
sshStream.end();
|
|
} catch (e: any) {
|
|
sshLogger.error("Error closing stream: " + e.message);
|
|
}
|
|
sshStream = null;
|
|
}
|
|
|
|
if (sshConn) {
|
|
try {
|
|
sshConn.end();
|
|
} catch (e: any) {
|
|
sshLogger.error("Error closing connection: " + e.message);
|
|
}
|
|
sshConn = null;
|
|
}
|
|
}
|
|
|
|
function setupPingInterval() {
|
|
pingInterval = setInterval(() => {
|
|
if (sshConn && sshStream) {
|
|
try {
|
|
sshStream.write("\x00");
|
|
} catch (e: any) {
|
|
sshLogger.error("SSH keepalive failed: " + e.message);
|
|
cleanupSSH();
|
|
}
|
|
}
|
|
}, 60000);
|
|
}
|
|
});
|