Compare commits
56 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
6015f8669b | ||
|
|
703ebdd557 | ||
|
|
d462381cce | ||
|
|
10dc3f9cbe | ||
|
|
cf1c10495b | ||
|
|
0b923051c6 | ||
|
|
04c140f608 | ||
|
|
6d3e973848 | ||
|
|
f7b806ffc0 | ||
|
|
a36793563c | ||
|
|
c4335e0b4f | ||
|
|
2838af4ee7 | ||
|
|
09c2f1a1ff | ||
|
|
1c70eb3248 | ||
|
|
48f9af0824 | ||
|
|
38cb1f7430 | ||
|
|
aa2ef88ed7 | ||
|
|
6acd674905 | ||
|
|
d657b3742f | ||
|
|
a2770d3edf | ||
|
|
c2afb6a50f | ||
|
|
d4bfb3d5fd | ||
|
|
b86e2d68d8 | ||
|
|
28619bba3f | ||
|
|
ebd3cee49e | ||
|
|
3842d48390 | ||
|
|
687ccfb982 | ||
|
|
8a66103d3d | ||
|
|
15c95841be | ||
|
|
625a4500bc | ||
|
|
3843f18b31 | ||
|
|
17973fc3dc | ||
|
|
da2dd5bbfc | ||
|
|
fca6ed023e | ||
|
|
24e8b1e359 | ||
|
|
a907213d57 | ||
|
|
ff9fc798c3 | ||
|
|
1b7b1a0051 | ||
|
|
f578c434df | ||
|
|
5aaedbe4a5 | ||
|
|
3c2dc435ff | ||
|
|
2307fbe65f | ||
|
|
661490e925 | ||
|
|
d78cafba93 | ||
|
|
037c76384b | ||
|
|
5d472a6e53 | ||
|
|
be76a61119 | ||
|
|
9f6085d251 | ||
|
|
58df4ac5c8 | ||
|
|
9c3afa39bd | ||
|
|
f22f85ac00 | ||
|
|
beac33614a | ||
|
|
d39c0d38ed | ||
|
|
3638745436 | ||
|
|
ddce484eb9 | ||
|
|
543bf6b56d |
@ -115,54 +115,60 @@ jobs:
|
|||||||
}
|
}
|
||||||
Remove-Item "$env:TEMP\aztoken.txt" -ErrorAction SilentlyContinue
|
Remove-Item "$env:TEMP\aztoken.txt" -ErrorAction SilentlyContinue
|
||||||
|
|
||||||
- name: Upload to Gitea
|
- name: Upload all artifacts to SeaweedFS
|
||||||
shell: powershell
|
shell: powershell
|
||||||
run: |
|
run: |
|
||||||
$ver = ("${{ github.ref_name }}" -replace '^v','')
|
$ver = ("${{ github.ref_name }}" -replace '^v','')
|
||||||
$giteaUrl = "https://git.command.vigilcyber.com"
|
$s3 = "https://files.command.vigilcyber.com/wraith"
|
||||||
$headers = @{ Authorization = "token ${{ secrets.GIT_TOKEN }}" }
|
|
||||||
|
# Upload installer
|
||||||
|
$installers = Get-ChildItem -Recurse src-tauri\target\release\bundle\nsis\*.exe
|
||||||
|
foreach ($file in $installers) {
|
||||||
|
Write-Host "Uploading: $($file.Name)"
|
||||||
|
Invoke-RestMethod -Uri "$s3/$ver/$($file.Name)" -Method PUT -ContentType "application/octet-stream" -InFile $file.FullName
|
||||||
|
# Also upload as 'latest' for direct download links
|
||||||
|
Invoke-RestMethod -Uri "$s3/latest/$($file.Name)" -Method PUT -ContentType "application/octet-stream" -InFile $file.FullName
|
||||||
|
}
|
||||||
|
|
||||||
# Upload MCP bridge binary
|
# Upload MCP bridge binary
|
||||||
$bridge = "src-tauri\target\release\wraith-mcp-bridge.exe"
|
$bridge = "src-tauri\target\release\wraith-mcp-bridge.exe"
|
||||||
if (Test-Path $bridge) {
|
if (Test-Path $bridge) {
|
||||||
Write-Host "Uploading: wraith-mcp-bridge.exe"
|
Write-Host "Uploading: wraith-mcp-bridge.exe"
|
||||||
Invoke-RestMethod -Uri "$giteaUrl/api/packages/vstockwell/generic/wraith/$ver/wraith-mcp-bridge.exe" -Method PUT -Headers $headers -ContentType "application/octet-stream" -InFile $bridge
|
Invoke-RestMethod -Uri "$s3/$ver/wraith-mcp-bridge.exe" -Method PUT -ContentType "application/octet-stream" -InFile $bridge
|
||||||
|
Invoke-RestMethod -Uri "$s3/latest/wraith-mcp-bridge.exe" -Method PUT -ContentType "application/octet-stream" -InFile $bridge
|
||||||
}
|
}
|
||||||
|
|
||||||
$installers = Get-ChildItem -Recurse src-tauri\target\release\bundle\nsis\*.exe
|
# Upload .nsis.zip for Tauri auto-updater
|
||||||
foreach ($file in $installers) {
|
$zipFile = Get-ChildItem -Recurse src-tauri\target\release\bundle\nsis\*.nsis.zip | Select-Object -First 1
|
||||||
$hash = (Get-FileHash $file.FullName -Algorithm SHA256).Hash.ToLower()
|
if ($zipFile) {
|
||||||
@{ version = $ver; filename = $file.Name; sha256 = $hash; platform = "windows"; architecture = "amd64"; released = (Get-Date -Format "yyyy-MM-ddTHH:mm:ssZ"); signed = $true } | ConvertTo-Json | Out-File version.json -Encoding utf8
|
Write-Host "Uploading: $($zipFile.Name)"
|
||||||
|
Invoke-RestMethod -Uri "$s3/$ver/$($zipFile.Name)" -Method PUT -ContentType "application/octet-stream" -InFile $zipFile.FullName
|
||||||
Write-Host "Uploading: $($file.Name)"
|
|
||||||
Invoke-RestMethod -Uri "$giteaUrl/api/packages/vstockwell/generic/wraith/$ver/$($file.Name)" -Method PUT -Headers $headers -ContentType "application/octet-stream" -InFile $file.FullName
|
|
||||||
|
|
||||||
Write-Host "Uploading: version.json"
|
|
||||||
Invoke-RestMethod -Uri "$giteaUrl/api/packages/vstockwell/generic/wraith/$ver/version.json" -Method PUT -Headers $headers -ContentType "application/octet-stream" -InFile version.json
|
|
||||||
}
|
}
|
||||||
|
|
||||||
Write-Host "=== Upload complete ==="
|
# Upload version.json metadata
|
||||||
|
$installer = $installers | Select-Object -First 1
|
||||||
|
if ($installer) {
|
||||||
|
$hash = (Get-FileHash $installer.FullName -Algorithm SHA256).Hash.ToLower()
|
||||||
|
@{ version = $ver; filename = $installer.Name; sha256 = $hash; platform = "windows"; architecture = "amd64"; released = (Get-Date -Format "yyyy-MM-ddTHH:mm:ssZ"); signed = $true } | ConvertTo-Json | Out-File version.json -Encoding utf8
|
||||||
|
Invoke-RestMethod -Uri "$s3/$ver/version.json" -Method PUT -ContentType "application/json" -InFile version.json
|
||||||
|
Invoke-RestMethod -Uri "$s3/latest/version.json" -Method PUT -ContentType "application/json" -InFile version.json
|
||||||
|
}
|
||||||
|
|
||||||
|
Write-Host "=== SeaweedFS upload complete ==="
|
||||||
|
|
||||||
- name: Generate and upload update.json for Tauri updater
|
- name: Generate and upload update.json for Tauri updater
|
||||||
shell: powershell
|
shell: powershell
|
||||||
run: |
|
run: |
|
||||||
$ver = ("${{ github.ref_name }}" -replace '^v','')
|
$ver = ("${{ github.ref_name }}" -replace '^v','')
|
||||||
$giteaUrl = "https://git.command.vigilcyber.com"
|
$s3 = "https://files.command.vigilcyber.com/wraith"
|
||||||
$headers = @{ Authorization = "token ${{ secrets.GIT_TOKEN }}" }
|
|
||||||
|
|
||||||
# Find the .sig file produced by Tauri signing
|
|
||||||
$sigFile = Get-ChildItem -Recurse src-tauri\target\release\bundle\nsis\*.nsis.zip.sig | Select-Object -First 1
|
$sigFile = Get-ChildItem -Recurse src-tauri\target\release\bundle\nsis\*.nsis.zip.sig | Select-Object -First 1
|
||||||
$zipFile = Get-ChildItem -Recurse src-tauri\target\release\bundle\nsis\*.nsis.zip | Select-Object -First 1
|
$zipFile = Get-ChildItem -Recurse src-tauri\target\release\bundle\nsis\*.nsis.zip | Select-Object -First 1
|
||||||
|
|
||||||
if ($sigFile -and $zipFile) {
|
if ($sigFile -and $zipFile) {
|
||||||
$signature = Get-Content $sigFile.FullName -Raw
|
$signature = Get-Content $sigFile.FullName -Raw
|
||||||
$downloadUrl = "$giteaUrl/api/packages/vstockwell/generic/wraith/$ver/$($zipFile.Name)"
|
$downloadUrl = "$s3/$ver/$($zipFile.Name)"
|
||||||
|
|
||||||
# Upload the .nsis.zip to packages
|
|
||||||
Write-Host "Uploading: $($zipFile.Name)"
|
|
||||||
Invoke-RestMethod -Uri "$giteaUrl/api/packages/vstockwell/generic/wraith/$ver/$($zipFile.Name)" -Method PUT -Headers $headers -ContentType "application/octet-stream" -InFile $zipFile.FullName
|
|
||||||
|
|
||||||
# Build update.json
|
|
||||||
$updateJson = @{
|
$updateJson = @{
|
||||||
version = "v$ver"
|
version = "v$ver"
|
||||||
notes = "Wraith Desktop v$ver"
|
notes = "Wraith Desktop v$ver"
|
||||||
@ -179,44 +185,13 @@ jobs:
|
|||||||
Write-Host "update.json content:"
|
Write-Host "update.json content:"
|
||||||
Get-Content update.json
|
Get-Content update.json
|
||||||
|
|
||||||
# Upload to latest/ so the updater endpoint always points to the newest
|
# Upload to root (Tauri updater endpoint)
|
||||||
Invoke-RestMethod -Uri "$giteaUrl/api/packages/vstockwell/generic/wraith/latest/update.json" -Method PUT -Headers $headers -ContentType "application/octet-stream" -InFile update.json
|
Invoke-RestMethod -Uri "$s3/update.json" -Method PUT -ContentType "application/json" -InFile update.json
|
||||||
|
# Also versioned copy
|
||||||
# Also upload to versioned path
|
Invoke-RestMethod -Uri "$s3/$ver/update.json" -Method PUT -ContentType "application/json" -InFile update.json
|
||||||
Invoke-RestMethod -Uri "$giteaUrl/api/packages/vstockwell/generic/wraith/$ver/update.json" -Method PUT -Headers $headers -ContentType "application/octet-stream" -InFile update.json
|
|
||||||
|
|
||||||
Write-Host "=== Update manifest uploaded ==="
|
Write-Host "=== Update manifest uploaded ==="
|
||||||
} else {
|
} else {
|
||||||
Write-Host "WARNING: No .sig file found — update signing may have failed"
|
Write-Host 'WARNING - No .sig file found, update signing may have failed'
|
||||||
Write-Host "Sig files found:"
|
|
||||||
Get-ChildItem -Recurse src-tauri\target\release\bundle\nsis\*.sig
|
|
||||||
}
|
}
|
||||||
|
|
||||||
- name: Create Release and attach installers
|
|
||||||
shell: powershell
|
|
||||||
run: |
|
|
||||||
$ver = ("${{ github.ref_name }}" -replace '^v','')
|
|
||||||
$giteaUrl = "https://git.command.vigilcyber.com"
|
|
||||||
$headers = @{ Authorization = "token ${{ secrets.GIT_TOKEN }}"; "Content-Type" = "application/json" }
|
|
||||||
$body = @{ tag_name = "v$ver"; name = "Wraith v$ver"; body = "Wraith Desktop v$ver - Tauri v2 / Rust build." } | ConvertTo-Json
|
|
||||||
$release = Invoke-RestMethod -Uri "$giteaUrl/api/v1/repos/vstockwell/wraith/releases" -Method POST -Headers $headers -Body $body
|
|
||||||
$releaseId = $release.id
|
|
||||||
Write-Host "Release v$ver created (id: $releaseId)"
|
|
||||||
|
|
||||||
$uploadHeaders = @{ Authorization = "token ${{ secrets.GIT_TOKEN }}" }
|
|
||||||
|
|
||||||
# Attach installer(s)
|
|
||||||
$installers = Get-ChildItem -Recurse src-tauri\target\release\bundle\nsis\*.exe
|
|
||||||
foreach ($file in $installers) {
|
|
||||||
Write-Host "Attaching $($file.Name) to release..."
|
|
||||||
Invoke-RestMethod -Uri "$giteaUrl/api/v1/repos/vstockwell/wraith/releases/$releaseId/assets?name=$($file.Name)" -Method POST -Headers $uploadHeaders -ContentType "application/octet-stream" -InFile $file.FullName
|
|
||||||
Write-Host "Attached: $($file.Name)"
|
|
||||||
}
|
|
||||||
|
|
||||||
# Attach MCP bridge binary
|
|
||||||
$bridge = "src-tauri\target\release\wraith-mcp-bridge.exe"
|
|
||||||
if (Test-Path $bridge) {
|
|
||||||
Write-Host "Attaching wraith-mcp-bridge.exe to release..."
|
|
||||||
Invoke-RestMethod -Uri "$giteaUrl/api/v1/repos/vstockwell/wraith/releases/$releaseId/assets?name=wraith-mcp-bridge.exe" -Method POST -Headers $uploadHeaders -ContentType "application/octet-stream" -InFile $bridge
|
|
||||||
Write-Host "Attached: wraith-mcp-bridge.exe"
|
|
||||||
}
|
|
||||||
|
|||||||
1
.gitignore
vendored
1
.gitignore
vendored
@ -4,3 +4,4 @@ src-tauri/target/
|
|||||||
src-tauri/binaries/
|
src-tauri/binaries/
|
||||||
*.log
|
*.log
|
||||||
.DS_Store
|
.DS_Store
|
||||||
|
.claude/worktrees/
|
||||||
|
|||||||
BIN
docs/screenshots/stats-and-status-bars.png
Normal file
BIN
docs/screenshots/stats-and-status-bars.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 12 KiB |
3
src-tauri/Cargo.lock
generated
3
src-tauri/Cargo.lock
generated
@ -2991,6 +2991,7 @@ checksum = "47c225751e8fbfaaaac5572a80e25d0a0921e9cf408c55509526161b5609157c"
|
|||||||
dependencies = [
|
dependencies = [
|
||||||
"ironrdp-connector",
|
"ironrdp-connector",
|
||||||
"ironrdp-core",
|
"ironrdp-core",
|
||||||
|
"ironrdp-displaycontrol",
|
||||||
"ironrdp-graphics",
|
"ironrdp-graphics",
|
||||||
"ironrdp-input",
|
"ironrdp-input",
|
||||||
"ironrdp-pdu",
|
"ironrdp-pdu",
|
||||||
@ -8913,9 +8914,11 @@ dependencies = [
|
|||||||
"thiserror 2.0.18",
|
"thiserror 2.0.18",
|
||||||
"tokio",
|
"tokio",
|
||||||
"tokio-rustls",
|
"tokio-rustls",
|
||||||
|
"tokio-util",
|
||||||
"ureq",
|
"ureq",
|
||||||
"uuid",
|
"uuid",
|
||||||
"x509-cert",
|
"x509-cert",
|
||||||
|
"zeroize",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
|
|||||||
@ -12,11 +12,15 @@ crate-type = ["lib", "cdylib", "staticlib"]
|
|||||||
name = "wraith-mcp-bridge"
|
name = "wraith-mcp-bridge"
|
||||||
path = "src/bin/wraith_mcp_bridge.rs"
|
path = "src/bin/wraith_mcp_bridge.rs"
|
||||||
|
|
||||||
|
[features]
|
||||||
|
default = []
|
||||||
|
devtools = ["tauri/devtools"]
|
||||||
|
|
||||||
[build-dependencies]
|
[build-dependencies]
|
||||||
tauri-build = { version = "2", features = [] }
|
tauri-build = { version = "2", features = [] }
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
tauri = { version = "2", features = ["devtools"] }
|
tauri = { version = "2", features = [] }
|
||||||
tauri-plugin-shell = "2"
|
tauri-plugin-shell = "2"
|
||||||
tauri-plugin-updater = "2"
|
tauri-plugin-updater = "2"
|
||||||
anyhow = "1"
|
anyhow = "1"
|
||||||
@ -33,6 +37,8 @@ uuid = { version = "1", features = ["v4"] }
|
|||||||
base64 = "0.22"
|
base64 = "0.22"
|
||||||
dashmap = "6"
|
dashmap = "6"
|
||||||
tokio = { version = "1", features = ["full"] }
|
tokio = { version = "1", features = ["full"] }
|
||||||
|
tokio-util = "0.7"
|
||||||
|
zeroize = { version = "1", features = ["derive"] }
|
||||||
async-trait = "0.1"
|
async-trait = "0.1"
|
||||||
log = "0.4"
|
log = "0.4"
|
||||||
env_logger = "0.11"
|
env_logger = "0.11"
|
||||||
@ -59,7 +65,7 @@ ureq = "3"
|
|||||||
png = "0.17"
|
png = "0.17"
|
||||||
|
|
||||||
# RDP (IronRDP)
|
# RDP (IronRDP)
|
||||||
ironrdp = { version = "0.14", features = ["connector", "session", "graphics", "input"] }
|
ironrdp = { version = "0.14", features = ["connector", "session", "graphics", "input", "displaycontrol"] }
|
||||||
ironrdp-tokio = { version = "0.8", features = ["reqwest-rustls-ring"] }
|
ironrdp-tokio = { version = "0.8", features = ["reqwest-rustls-ring"] }
|
||||||
ironrdp-tls = { version = "0.2", features = ["rustls"] }
|
ironrdp-tls = { version = "0.2", features = ["rustls"] }
|
||||||
tokio-rustls = "0.26"
|
tokio-rustls = "0.26"
|
||||||
|
|||||||
@ -1,7 +1,7 @@
|
|||||||
{
|
{
|
||||||
"identifier": "default",
|
"identifier": "default",
|
||||||
"description": "Default capabilities for the main Wraith window",
|
"description": "Default capabilities for the main Wraith window",
|
||||||
"windows": ["main", "tool-*"],
|
"windows": ["main", "tool-*", "detached-*", "editor-*", "help-*"],
|
||||||
"permissions": [
|
"permissions": [
|
||||||
"core:default",
|
"core:default",
|
||||||
"core:event:default",
|
"core:event:default",
|
||||||
|
|||||||
@ -1 +1 @@
|
|||||||
{"default":{"identifier":"default","description":"Default capabilities for the main Wraith window","local":true,"windows":["main","tool-*"],"permissions":["core:default","core:event:default","core:window:default","core:window:allow-create","core:webview:default","core:webview:allow-create-webview-window","shell:allow-open","updater:default"]}}
|
{"default":{"identifier":"default","description":"Default capabilities for the main Wraith window","local":true,"windows":["main","tool-*","detached-*","editor-*","help-*"],"permissions":["core:default","core:event:default","core:window:default","core:window:allow-create","core:webview:default","core:webview:allow-create-webview-window","shell:allow-open","updater:default"]}}
|
||||||
@ -38,19 +38,22 @@ struct JsonRpcError {
|
|||||||
message: String,
|
message: String,
|
||||||
}
|
}
|
||||||
|
|
||||||
fn get_mcp_port() -> Result<u16, String> {
|
fn get_data_dir() -> Result<std::path::PathBuf, String> {
|
||||||
// Check standard locations for the port file
|
if let Ok(appdata) = std::env::var("APPDATA") {
|
||||||
let port_file = if let Ok(appdata) = std::env::var("APPDATA") {
|
Ok(std::path::PathBuf::from(appdata).join("Wraith"))
|
||||||
std::path::PathBuf::from(appdata).join("Wraith").join("mcp-port")
|
|
||||||
} else if let Ok(home) = std::env::var("HOME") {
|
} else if let Ok(home) = std::env::var("HOME") {
|
||||||
if cfg!(target_os = "macos") {
|
if cfg!(target_os = "macos") {
|
||||||
std::path::PathBuf::from(home).join("Library").join("Application Support").join("Wraith").join("mcp-port")
|
Ok(std::path::PathBuf::from(home).join("Library").join("Application Support").join("Wraith"))
|
||||||
} else {
|
} else {
|
||||||
std::path::PathBuf::from(home).join(".local").join("share").join("wraith").join("mcp-port")
|
Ok(std::path::PathBuf::from(home).join(".local").join("share").join("wraith"))
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
return Err("Cannot determine data directory".to_string());
|
Err("Cannot determine data directory".to_string())
|
||||||
};
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn get_mcp_port() -> Result<u16, String> {
|
||||||
|
let port_file = get_data_dir()?.join("mcp-port");
|
||||||
|
|
||||||
let port_str = std::fs::read_to_string(&port_file)
|
let port_str = std::fs::read_to_string(&port_file)
|
||||||
.map_err(|e| format!("Cannot read MCP port file at {}: {} — is Wraith running?", port_file.display(), e))?;
|
.map_err(|e| format!("Cannot read MCP port file at {}: {} — is Wraith running?", port_file.display(), e))?;
|
||||||
@ -59,6 +62,15 @@ fn get_mcp_port() -> Result<u16, String> {
|
|||||||
.map_err(|e| format!("Invalid port in MCP port file: {}", e))
|
.map_err(|e| format!("Invalid port in MCP port file: {}", e))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn get_mcp_token() -> Result<String, String> {
|
||||||
|
let token_file = get_data_dir()?.join("mcp-token");
|
||||||
|
|
||||||
|
let token = std::fs::read_to_string(&token_file)
|
||||||
|
.map_err(|e| format!("Cannot read MCP token file at {}: {} — is Wraith running?", token_file.display(), e))?;
|
||||||
|
|
||||||
|
Ok(token.trim().to_string())
|
||||||
|
}
|
||||||
|
|
||||||
fn handle_initialize(id: Value) -> JsonRpcResponse {
|
fn handle_initialize(id: Value) -> JsonRpcResponse {
|
||||||
JsonRpcResponse {
|
JsonRpcResponse {
|
||||||
jsonrpc: "2.0".to_string(),
|
jsonrpc: "2.0".to_string(),
|
||||||
@ -83,6 +95,19 @@ fn handle_tools_list(id: Value) -> JsonRpcResponse {
|
|||||||
id,
|
id,
|
||||||
result: Some(serde_json::json!({
|
result: Some(serde_json::json!({
|
||||||
"tools": [
|
"tools": [
|
||||||
|
{
|
||||||
|
"name": "terminal_type",
|
||||||
|
"description": "Type text into a terminal session (like a human typing). Optionally presses Enter after. Use this to send messages or commands without output capture.",
|
||||||
|
"inputSchema": {
|
||||||
|
"type": "object",
|
||||||
|
"properties": {
|
||||||
|
"session_id": { "type": "string", "description": "The session ID to type into" },
|
||||||
|
"text": { "type": "string", "description": "The text to type" },
|
||||||
|
"press_enter": { "type": "boolean", "description": "Whether to press Enter after typing (default: true)" }
|
||||||
|
},
|
||||||
|
"required": ["session_id", "text"]
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "terminal_read",
|
"name": "terminal_read",
|
||||||
"description": "Read recent terminal output from an active SSH or PTY session (ANSI codes stripped)",
|
"description": "Read recent terminal output from an active SSH or PTY session (ANSI codes stripped)",
|
||||||
@ -211,6 +236,72 @@ fn handle_tools_list(id: Value) -> JsonRpcResponse {
|
|||||||
"description": "Generate a cryptographically secure random password",
|
"description": "Generate a cryptographically secure random password",
|
||||||
"inputSchema": { "type": "object", "properties": { "length": { "type": "number" }, "uppercase": { "type": "boolean" }, "lowercase": { "type": "boolean" }, "digits": { "type": "boolean" }, "symbols": { "type": "boolean" } } }
|
"inputSchema": { "type": "object", "properties": { "length": { "type": "number" }, "uppercase": { "type": "boolean" }, "lowercase": { "type": "boolean" }, "digits": { "type": "boolean" }, "symbols": { "type": "boolean" } } }
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "docker_ps",
|
||||||
|
"description": "List all Docker containers with status, image, and ports",
|
||||||
|
"inputSchema": { "type": "object", "properties": { "session_id": { "type": "string" } }, "required": ["session_id"] }
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "docker_action",
|
||||||
|
"description": "Perform a Docker action: start, stop, restart, remove, logs, builder-prune, system-prune",
|
||||||
|
"inputSchema": { "type": "object", "properties": { "session_id": { "type": "string" }, "action": { "type": "string", "description": "start|stop|restart|remove|logs|builder-prune|system-prune" }, "target": { "type": "string", "description": "Container name (not needed for prune actions)" } }, "required": ["session_id", "action", "target"] }
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "docker_exec",
|
||||||
|
"description": "Execute a command inside a running Docker container",
|
||||||
|
"inputSchema": { "type": "object", "properties": { "session_id": { "type": "string" }, "container": { "type": "string" }, "command": { "type": "string" } }, "required": ["session_id", "container", "command"] }
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "service_status",
|
||||||
|
"description": "Check systemd service status on a remote host",
|
||||||
|
"inputSchema": { "type": "object", "properties": { "session_id": { "type": "string" }, "target": { "type": "string", "description": "Service name" } }, "required": ["session_id", "target"] }
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "process_list",
|
||||||
|
"description": "List processes on a remote host (top CPU by default, or filter by name)",
|
||||||
|
"inputSchema": { "type": "object", "properties": { "session_id": { "type": "string" }, "target": { "type": "string", "description": "Process name filter (empty for top 30 by CPU)" } }, "required": ["session_id", "target"] }
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "git_status",
|
||||||
|
"description": "Get git status of a remote repository",
|
||||||
|
"inputSchema": { "type": "object", "properties": { "session_id": { "type": "string" }, "path": { "type": "string", "description": "Path to the git repo on the remote host" } }, "required": ["session_id", "path"] }
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "git_pull",
|
||||||
|
"description": "Pull latest changes on a remote repository",
|
||||||
|
"inputSchema": { "type": "object", "properties": { "session_id": { "type": "string" }, "path": { "type": "string" } }, "required": ["session_id", "path"] }
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "git_log",
|
||||||
|
"description": "Show recent commits on a remote repository",
|
||||||
|
"inputSchema": { "type": "object", "properties": { "session_id": { "type": "string" }, "path": { "type": "string" } }, "required": ["session_id", "path"] }
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "rdp_click",
|
||||||
|
"description": "Click at a position in an RDP session (use terminal_screenshot first to see coordinates)",
|
||||||
|
"inputSchema": { "type": "object", "properties": { "session_id": { "type": "string" }, "x": { "type": "number" }, "y": { "type": "number" }, "button": { "type": "string", "description": "left (default), right, or middle" } }, "required": ["session_id", "x", "y"] }
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "rdp_type",
|
||||||
|
"description": "Type text into an RDP session via clipboard paste",
|
||||||
|
"inputSchema": { "type": "object", "properties": { "session_id": { "type": "string" }, "text": { "type": "string" } }, "required": ["session_id", "text"] }
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "rdp_clipboard",
|
||||||
|
"description": "Set the clipboard content on a remote RDP session",
|
||||||
|
"inputSchema": { "type": "object", "properties": { "session_id": { "type": "string" }, "text": { "type": "string" } }, "required": ["session_id", "text"] }
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ssh_connect",
|
||||||
|
"description": "Open a new SSH connection through Wraith. Returns the session ID for use with other tools.",
|
||||||
|
"inputSchema": { "type": "object", "properties": {
|
||||||
|
"hostname": { "type": "string" },
|
||||||
|
"port": { "type": "number", "description": "Default: 22" },
|
||||||
|
"username": { "type": "string" },
|
||||||
|
"password": { "type": "string", "description": "Password (for password auth)" },
|
||||||
|
"private_key_path": { "type": "string", "description": "Path to SSH private key file on the local machine" }
|
||||||
|
}, "required": ["hostname", "username"] }
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "list_sessions",
|
"name": "list_sessions",
|
||||||
"description": "List all active Wraith sessions (SSH, RDP, PTY) with connection details",
|
"description": "List all active Wraith sessions (SSH, RDP, PTY) with connection details",
|
||||||
@ -225,12 +316,13 @@ fn handle_tools_list(id: Value) -> JsonRpcResponse {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
fn call_wraith(port: u16, endpoint: &str, body: Value) -> Result<Value, String> {
|
fn call_wraith(port: u16, token: &str, endpoint: &str, body: Value) -> Result<Value, String> {
|
||||||
let url = format!("http://127.0.0.1:{}{}", port, endpoint);
|
let url = format!("http://127.0.0.1:{}{}", port, endpoint);
|
||||||
let body_str = serde_json::to_string(&body).unwrap_or_default();
|
let body_str = serde_json::to_string(&body).unwrap_or_default();
|
||||||
|
|
||||||
let mut resp = ureq::post(url)
|
let mut resp = ureq::post(url)
|
||||||
.header("Content-Type", "application/json")
|
.header("Content-Type", "application/json")
|
||||||
|
.header("Authorization", &format!("Bearer {}", token))
|
||||||
.send(body_str.as_bytes())
|
.send(body_str.as_bytes())
|
||||||
.map_err(|e| format!("HTTP request to Wraith failed: {}", e))?;
|
.map_err(|e| format!("HTTP request to Wraith failed: {}", e))?;
|
||||||
|
|
||||||
@ -248,27 +340,40 @@ fn call_wraith(port: u16, endpoint: &str, body: Value) -> Result<Value, String>
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
fn handle_tool_call(id: Value, port: u16, tool_name: &str, args: &Value) -> JsonRpcResponse {
|
fn handle_tool_call(id: Value, port: u16, token: &str, tool_name: &str, args: &Value) -> JsonRpcResponse {
|
||||||
let result = match tool_name {
|
let result = match tool_name {
|
||||||
"list_sessions" => call_wraith(port, "/mcp/sessions", serde_json::json!({})),
|
"list_sessions" => call_wraith(port, token, "/mcp/sessions", serde_json::json!({})),
|
||||||
"terminal_read" => call_wraith(port, "/mcp/terminal/read", args.clone()),
|
"terminal_type" => call_wraith(port, token, "/mcp/terminal/type", args.clone()),
|
||||||
"terminal_execute" => call_wraith(port, "/mcp/terminal/execute", args.clone()),
|
"terminal_read" => call_wraith(port, token, "/mcp/terminal/read", args.clone()),
|
||||||
"sftp_list" => call_wraith(port, "/mcp/sftp/list", args.clone()),
|
"terminal_execute" => call_wraith(port, token, "/mcp/terminal/execute", args.clone()),
|
||||||
"sftp_read" => call_wraith(port, "/mcp/sftp/read", args.clone()),
|
"sftp_list" => call_wraith(port, token, "/mcp/sftp/list", args.clone()),
|
||||||
"sftp_write" => call_wraith(port, "/mcp/sftp/write", args.clone()),
|
"sftp_read" => call_wraith(port, token, "/mcp/sftp/read", args.clone()),
|
||||||
"network_scan" => call_wraith(port, "/mcp/tool/scan-network", args.clone()),
|
"sftp_write" => call_wraith(port, token, "/mcp/sftp/write", args.clone()),
|
||||||
"port_scan" => call_wraith(port, "/mcp/tool/scan-ports", args.clone()),
|
"network_scan" => call_wraith(port, token, "/mcp/tool/scan-network", args.clone()),
|
||||||
"ping" => call_wraith(port, "/mcp/tool/ping", args.clone()),
|
"port_scan" => call_wraith(port, token, "/mcp/tool/scan-ports", args.clone()),
|
||||||
"traceroute" => call_wraith(port, "/mcp/tool/traceroute", args.clone()),
|
"ping" => call_wraith(port, token, "/mcp/tool/ping", args.clone()),
|
||||||
"dns_lookup" => call_wraith(port, "/mcp/tool/dns", args.clone()),
|
"traceroute" => call_wraith(port, token, "/mcp/tool/traceroute", args.clone()),
|
||||||
"whois" => call_wraith(port, "/mcp/tool/whois", args.clone()),
|
"dns_lookup" => call_wraith(port, token, "/mcp/tool/dns", args.clone()),
|
||||||
"wake_on_lan" => call_wraith(port, "/mcp/tool/wol", args.clone()),
|
"whois" => call_wraith(port, token, "/mcp/tool/whois", args.clone()),
|
||||||
"bandwidth_test" => call_wraith(port, "/mcp/tool/bandwidth", args.clone()),
|
"wake_on_lan" => call_wraith(port, token, "/mcp/tool/wol", args.clone()),
|
||||||
"subnet_calc" => call_wraith(port, "/mcp/tool/subnet", args.clone()),
|
"bandwidth_test" => call_wraith(port, token, "/mcp/tool/bandwidth", args.clone()),
|
||||||
"generate_ssh_key" => call_wraith(port, "/mcp/tool/keygen", args.clone()),
|
"subnet_calc" => call_wraith(port, token, "/mcp/tool/subnet", args.clone()),
|
||||||
"generate_password" => call_wraith(port, "/mcp/tool/passgen", args.clone()),
|
"generate_ssh_key" => call_wraith(port, token, "/mcp/tool/keygen", args.clone()),
|
||||||
|
"generate_password" => call_wraith(port, token, "/mcp/tool/passgen", args.clone()),
|
||||||
|
"docker_ps" => call_wraith(port, token, "/mcp/docker/ps", args.clone()),
|
||||||
|
"docker_action" => call_wraith(port, token, "/mcp/docker/action", args.clone()),
|
||||||
|
"docker_exec" => call_wraith(port, token, "/mcp/docker/exec", args.clone()),
|
||||||
|
"service_status" => call_wraith(port, token, "/mcp/service/status", args.clone()),
|
||||||
|
"process_list" => call_wraith(port, token, "/mcp/process/list", args.clone()),
|
||||||
|
"git_status" => call_wraith(port, token, "/mcp/git/status", args.clone()),
|
||||||
|
"git_pull" => call_wraith(port, token, "/mcp/git/pull", args.clone()),
|
||||||
|
"git_log" => call_wraith(port, token, "/mcp/git/log", args.clone()),
|
||||||
|
"rdp_click" => call_wraith(port, token, "/mcp/rdp/click", args.clone()),
|
||||||
|
"rdp_type" => call_wraith(port, token, "/mcp/rdp/type", args.clone()),
|
||||||
|
"rdp_clipboard" => call_wraith(port, token, "/mcp/rdp/clipboard", args.clone()),
|
||||||
|
"ssh_connect" => call_wraith(port, token, "/mcp/ssh/connect", args.clone()),
|
||||||
"terminal_screenshot" => {
|
"terminal_screenshot" => {
|
||||||
let result = call_wraith(port, "/mcp/screenshot", args.clone());
|
let result = call_wraith(port, token, "/mcp/screenshot", args.clone());
|
||||||
// Screenshot returns base64 PNG — wrap as image content for multimodal AI
|
// Screenshot returns base64 PNG — wrap as image content for multimodal AI
|
||||||
return match result {
|
return match result {
|
||||||
Ok(b64) => JsonRpcResponse {
|
Ok(b64) => JsonRpcResponse {
|
||||||
@ -328,6 +433,14 @@ fn main() {
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
let token = match get_mcp_token() {
|
||||||
|
Ok(t) => t,
|
||||||
|
Err(e) => {
|
||||||
|
eprintln!("wraith-mcp-bridge: {}", e);
|
||||||
|
std::process::exit(1);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
let stdin = io::stdin();
|
let stdin = io::stdin();
|
||||||
let mut stdout = io::stdout();
|
let mut stdout = io::stdout();
|
||||||
|
|
||||||
@ -366,7 +479,7 @@ fn main() {
|
|||||||
let args = request.params.get("arguments")
|
let args = request.params.get("arguments")
|
||||||
.cloned()
|
.cloned()
|
||||||
.unwrap_or(Value::Object(serde_json::Map::new()));
|
.unwrap_or(Value::Object(serde_json::Map::new()));
|
||||||
handle_tool_call(request.id, port, tool_name, &args)
|
handle_tool_call(request.id, port, &token, tool_name, &args)
|
||||||
}
|
}
|
||||||
"notifications/initialized" | "notifications/cancelled" => {
|
"notifications/initialized" | "notifications/cancelled" => {
|
||||||
// Notifications don't get responses
|
// Notifications don't get responses
|
||||||
|
|||||||
@ -3,34 +3,16 @@ use tauri::State;
|
|||||||
use crate::credentials::Credential;
|
use crate::credentials::Credential;
|
||||||
use crate::AppState;
|
use crate::AppState;
|
||||||
|
|
||||||
/// Guard helper: lock the credentials mutex and return a ref to the inner
|
|
||||||
/// `CredentialService`, or a "Vault is locked" error if the vault has not
|
|
||||||
/// been unlocked for this session.
|
|
||||||
///
|
|
||||||
/// This is a macro rather than a function because returning a `MutexGuard`
|
|
||||||
/// from a helper function would require lifetime annotations that complicate
|
|
||||||
/// the tauri command signatures unnecessarily.
|
|
||||||
macro_rules! require_unlocked {
|
|
||||||
($state:expr) => {{
|
|
||||||
let guard = $state
|
|
||||||
.credentials
|
|
||||||
.lock()
|
|
||||||
.map_err(|_| "Credentials mutex was poisoned".to_string())?;
|
|
||||||
if guard.is_none() {
|
|
||||||
return Err("Vault is locked — call unlock before accessing credentials".into());
|
|
||||||
}
|
|
||||||
// SAFETY: we just checked `is_none` above, so `unwrap` cannot panic.
|
|
||||||
guard
|
|
||||||
}};
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Return all credentials ordered by name.
|
/// Return all credentials ordered by name.
|
||||||
///
|
///
|
||||||
/// Secret values (passwords, private keys) are never included — only metadata.
|
/// Secret values (passwords, private keys) are never included — only metadata.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub fn list_credentials(state: State<'_, AppState>) -> Result<Vec<Credential>, String> {
|
pub async fn list_credentials(state: State<'_, AppState>) -> Result<Vec<Credential>, String> {
|
||||||
let guard = require_unlocked!(state);
|
let guard = state.credentials.lock().await;
|
||||||
guard.as_ref().unwrap().list()
|
let svc = guard
|
||||||
|
.as_ref()
|
||||||
|
.ok_or_else(|| "Vault is locked — call unlock before accessing credentials".to_string())?;
|
||||||
|
svc.list()
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Store a new username/password credential.
|
/// Store a new username/password credential.
|
||||||
@ -39,18 +21,18 @@ pub fn list_credentials(state: State<'_, AppState>) -> Result<Vec<Credential>, S
|
|||||||
/// Returns the created credential record (without the plaintext password).
|
/// Returns the created credential record (without the plaintext password).
|
||||||
/// `domain` is `None` for non-domain credentials; `Some("")` is treated as NULL.
|
/// `domain` is `None` for non-domain credentials; `Some("")` is treated as NULL.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub fn create_password(
|
pub async fn create_password(
|
||||||
name: String,
|
name: String,
|
||||||
username: String,
|
username: String,
|
||||||
password: String,
|
password: String,
|
||||||
domain: Option<String>,
|
domain: Option<String>,
|
||||||
state: State<'_, AppState>,
|
state: State<'_, AppState>,
|
||||||
) -> Result<Credential, String> {
|
) -> Result<Credential, String> {
|
||||||
let guard = require_unlocked!(state);
|
let guard = state.credentials.lock().await;
|
||||||
guard
|
let svc = guard
|
||||||
.as_ref()
|
.as_ref()
|
||||||
.unwrap()
|
.ok_or_else(|| "Vault is locked — call unlock before accessing credentials".to_string())?;
|
||||||
.create_password(name, username, password, domain)
|
svc.create_password(name, username, password, domain)
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Store a new SSH private key credential.
|
/// Store a new SSH private key credential.
|
||||||
@ -59,18 +41,18 @@ pub fn create_password(
|
|||||||
/// Pass `None` for `passphrase` when the key has no passphrase.
|
/// Pass `None` for `passphrase` when the key has no passphrase.
|
||||||
/// Returns the created credential record without any secret material.
|
/// Returns the created credential record without any secret material.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub fn create_ssh_key(
|
pub async fn create_ssh_key(
|
||||||
name: String,
|
name: String,
|
||||||
username: String,
|
username: String,
|
||||||
private_key_pem: String,
|
private_key_pem: String,
|
||||||
passphrase: Option<String>,
|
passphrase: Option<String>,
|
||||||
state: State<'_, AppState>,
|
state: State<'_, AppState>,
|
||||||
) -> Result<Credential, String> {
|
) -> Result<Credential, String> {
|
||||||
let guard = require_unlocked!(state);
|
let guard = state.credentials.lock().await;
|
||||||
guard
|
let svc = guard
|
||||||
.as_ref()
|
.as_ref()
|
||||||
.unwrap()
|
.ok_or_else(|| "Vault is locked — call unlock before accessing credentials".to_string())?;
|
||||||
.create_ssh_key(name, username, private_key_pem, passphrase)
|
svc.create_ssh_key(name, username, private_key_pem, passphrase)
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Delete a credential by id.
|
/// Delete a credential by id.
|
||||||
@ -78,21 +60,30 @@ pub fn create_ssh_key(
|
|||||||
/// For SSH key credentials, the associated `ssh_keys` row is also deleted.
|
/// For SSH key credentials, the associated `ssh_keys` row is also deleted.
|
||||||
/// Returns `Err` if the vault is locked or the id does not exist.
|
/// Returns `Err` if the vault is locked or the id does not exist.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub fn delete_credential(id: i64, state: State<'_, AppState>) -> Result<(), String> {
|
pub async fn delete_credential(id: i64, state: State<'_, AppState>) -> Result<(), String> {
|
||||||
let guard = require_unlocked!(state);
|
let guard = state.credentials.lock().await;
|
||||||
guard.as_ref().unwrap().delete(id)
|
let svc = guard
|
||||||
|
.as_ref()
|
||||||
|
.ok_or_else(|| "Vault is locked — call unlock before accessing credentials".to_string())?;
|
||||||
|
svc.delete(id)
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Decrypt and return the password for a credential.
|
/// Decrypt and return the password for a credential.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub fn decrypt_password(credential_id: i64, state: State<'_, AppState>) -> Result<String, String> {
|
pub async fn decrypt_password(credential_id: i64, state: State<'_, AppState>) -> Result<String, String> {
|
||||||
let guard = require_unlocked!(state);
|
let guard = state.credentials.lock().await;
|
||||||
guard.as_ref().unwrap().decrypt_password(credential_id)
|
let svc = guard
|
||||||
|
.as_ref()
|
||||||
|
.ok_or_else(|| "Vault is locked — call unlock before accessing credentials".to_string())?;
|
||||||
|
svc.decrypt_password(credential_id)
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Decrypt and return the SSH private key and passphrase.
|
/// Decrypt and return the SSH private key and passphrase.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub fn decrypt_ssh_key(ssh_key_id: i64, state: State<'_, AppState>) -> Result<(String, String), String> {
|
pub async fn decrypt_ssh_key(ssh_key_id: i64, state: State<'_, AppState>) -> Result<(String, String), String> {
|
||||||
let guard = require_unlocked!(state);
|
let guard = state.credentials.lock().await;
|
||||||
guard.as_ref().unwrap().decrypt_ssh_key(ssh_key_id)
|
let svc = guard
|
||||||
|
.as_ref()
|
||||||
|
.ok_or_else(|| "Vault is locked — call unlock before accessing credentials".to_string())?;
|
||||||
|
svc.decrypt_ssh_key(ssh_key_id)
|
||||||
}
|
}
|
||||||
|
|||||||
@ -3,6 +3,8 @@
|
|||||||
use tauri::State;
|
use tauri::State;
|
||||||
use serde::Serialize;
|
use serde::Serialize;
|
||||||
use crate::AppState;
|
use crate::AppState;
|
||||||
|
use crate::ssh::exec::exec_on_session;
|
||||||
|
use crate::utils::shell_escape;
|
||||||
|
|
||||||
#[derive(Debug, Serialize)]
|
#[derive(Debug, Serialize)]
|
||||||
#[serde(rename_all = "camelCase")]
|
#[serde(rename_all = "camelCase")]
|
||||||
@ -37,7 +39,7 @@ pub struct DockerVolume {
|
|||||||
pub async fn docker_list_containers(session_id: String, all: Option<bool>, state: State<'_, AppState>) -> Result<Vec<DockerContainer>, String> {
|
pub async fn docker_list_containers(session_id: String, all: Option<bool>, state: State<'_, AppState>) -> Result<Vec<DockerContainer>, String> {
|
||||||
let session = state.ssh.get_session(&session_id).ok_or("Session not found")?;
|
let session = state.ssh.get_session(&session_id).ok_or("Session not found")?;
|
||||||
let flag = if all.unwrap_or(true) { "-a" } else { "" };
|
let flag = if all.unwrap_or(true) { "-a" } else { "" };
|
||||||
let output = exec(&session.handle, &format!("docker ps {} --format '{{{{.ID}}}}|{{{{.Names}}}}|{{{{.Image}}}}|{{{{.Status}}}}|{{{{.Ports}}}}|{{{{.CreatedAt}}}}' 2>&1", flag)).await?;
|
let output = exec_on_session(&session.handle, &format!("docker ps {} --format '{{{{.ID}}}}|{{{{.Names}}}}|{{{{.Image}}}}|{{{{.Status}}}}|{{{{.Ports}}}}|{{{{.CreatedAt}}}}' 2>&1", flag)).await?;
|
||||||
Ok(output.lines().filter(|l| !l.is_empty() && !l.starts_with("CONTAINER")).map(|line| {
|
Ok(output.lines().filter(|l| !l.is_empty() && !l.starts_with("CONTAINER")).map(|line| {
|
||||||
let p: Vec<&str> = line.splitn(6, '|').collect();
|
let p: Vec<&str> = line.splitn(6, '|').collect();
|
||||||
DockerContainer {
|
DockerContainer {
|
||||||
@ -54,7 +56,7 @@ pub async fn docker_list_containers(session_id: String, all: Option<bool>, state
|
|||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub async fn docker_list_images(session_id: String, state: State<'_, AppState>) -> Result<Vec<DockerImage>, String> {
|
pub async fn docker_list_images(session_id: String, state: State<'_, AppState>) -> Result<Vec<DockerImage>, String> {
|
||||||
let session = state.ssh.get_session(&session_id).ok_or("Session not found")?;
|
let session = state.ssh.get_session(&session_id).ok_or("Session not found")?;
|
||||||
let output = exec(&session.handle, "docker images --format '{{.ID}}|{{.Repository}}|{{.Tag}}|{{.Size}}|{{.CreatedAt}}' 2>&1").await?;
|
let output = exec_on_session(&session.handle, "docker images --format '{{.ID}}|{{.Repository}}|{{.Tag}}|{{.Size}}|{{.CreatedAt}}' 2>&1").await?;
|
||||||
Ok(output.lines().filter(|l| !l.is_empty()).map(|line| {
|
Ok(output.lines().filter(|l| !l.is_empty()).map(|line| {
|
||||||
let p: Vec<&str> = line.splitn(5, '|').collect();
|
let p: Vec<&str> = line.splitn(5, '|').collect();
|
||||||
DockerImage {
|
DockerImage {
|
||||||
@ -70,7 +72,7 @@ pub async fn docker_list_images(session_id: String, state: State<'_, AppState>)
|
|||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub async fn docker_list_volumes(session_id: String, state: State<'_, AppState>) -> Result<Vec<DockerVolume>, String> {
|
pub async fn docker_list_volumes(session_id: String, state: State<'_, AppState>) -> Result<Vec<DockerVolume>, String> {
|
||||||
let session = state.ssh.get_session(&session_id).ok_or("Session not found")?;
|
let session = state.ssh.get_session(&session_id).ok_or("Session not found")?;
|
||||||
let output = exec(&session.handle, "docker volume ls --format '{{.Name}}|{{.Driver}}|{{.Mountpoint}}' 2>&1").await?;
|
let output = exec_on_session(&session.handle, "docker volume ls --format '{{.Name}}|{{.Driver}}|{{.Mountpoint}}' 2>&1").await?;
|
||||||
Ok(output.lines().filter(|l| !l.is_empty()).map(|line| {
|
Ok(output.lines().filter(|l| !l.is_empty()).map(|line| {
|
||||||
let p: Vec<&str> = line.splitn(3, '|').collect();
|
let p: Vec<&str> = line.splitn(3, '|').collect();
|
||||||
DockerVolume {
|
DockerVolume {
|
||||||
@ -84,32 +86,20 @@ pub async fn docker_list_volumes(session_id: String, state: State<'_, AppState>)
|
|||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub async fn docker_action(session_id: String, action: String, target: String, state: State<'_, AppState>) -> Result<String, String> {
|
pub async fn docker_action(session_id: String, action: String, target: String, state: State<'_, AppState>) -> Result<String, String> {
|
||||||
let session = state.ssh.get_session(&session_id).ok_or("Session not found")?;
|
let session = state.ssh.get_session(&session_id).ok_or("Session not found")?;
|
||||||
|
let t = shell_escape(&target);
|
||||||
let cmd = match action.as_str() {
|
let cmd = match action.as_str() {
|
||||||
"start" => format!("docker start {} 2>&1", target),
|
"start" => format!("docker start {} 2>&1", t),
|
||||||
"stop" => format!("docker stop {} 2>&1", target),
|
"stop" => format!("docker stop {} 2>&1", t),
|
||||||
"restart" => format!("docker restart {} 2>&1", target),
|
"restart" => format!("docker restart {} 2>&1", t),
|
||||||
"remove" => format!("docker rm -f {} 2>&1", target),
|
"remove" => format!("docker rm -f {} 2>&1", t),
|
||||||
"logs" => format!("docker logs --tail 100 {} 2>&1", target),
|
"logs" => format!("docker logs --tail 100 {} 2>&1", t),
|
||||||
"remove-image" => format!("docker rmi {} 2>&1", target),
|
"remove-image" => format!("docker rmi {} 2>&1", t),
|
||||||
"remove-volume" => format!("docker volume rm {} 2>&1", target),
|
"remove-volume" => format!("docker volume rm {} 2>&1", t),
|
||||||
"builder-prune" => "docker builder prune -f 2>&1".to_string(),
|
"builder-prune" => "docker builder prune -f 2>&1".to_string(),
|
||||||
"system-prune" => "docker system prune -f 2>&1".to_string(),
|
"system-prune" => "docker system prune -f 2>&1".to_string(),
|
||||||
"system-prune-all" => "docker system prune -a -f 2>&1".to_string(),
|
"system-prune-all" => "docker system prune -a -f 2>&1".to_string(),
|
||||||
_ => return Err(format!("Unknown docker action: {}", action)),
|
_ => return Err(format!("Unknown docker action: {}", action)),
|
||||||
};
|
};
|
||||||
exec(&session.handle, &cmd).await
|
exec_on_session(&session.handle, &cmd).await
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn exec(handle: &std::sync::Arc<tokio::sync::Mutex<russh::client::Handle<crate::ssh::session::SshClient>>>, cmd: &str) -> Result<String, String> {
|
|
||||||
let mut channel = { let h = handle.lock().await; h.channel_open_session().await.map_err(|e| format!("Exec failed: {}", e))? };
|
|
||||||
channel.exec(true, cmd).await.map_err(|e| format!("Exec failed: {}", e))?;
|
|
||||||
let mut output = String::new();
|
|
||||||
loop {
|
|
||||||
match channel.wait().await {
|
|
||||||
Some(russh::ChannelMsg::Data { ref data }) => { if let Ok(t) = std::str::from_utf8(data.as_ref()) { output.push_str(t); } }
|
|
||||||
Some(russh::ChannelMsg::Eof) | Some(russh::ChannelMsg::Close) | None => break,
|
|
||||||
_ => {}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
Ok(output)
|
|
||||||
}
|
|
||||||
|
|||||||
@ -70,7 +70,7 @@ pub async fn mcp_terminal_execute(
|
|||||||
let before = buf.total_written();
|
let before = buf.total_written();
|
||||||
|
|
||||||
// Send command + marker echo
|
// Send command + marker echo
|
||||||
let full_cmd = format!("{}\necho {}\n", command, marker);
|
let full_cmd = format!("{}\recho {}\r", command, marker);
|
||||||
state.ssh.write(&session_id, full_cmd.as_bytes()).await?;
|
state.ssh.write(&session_id, full_cmd.as_bytes()).await?;
|
||||||
|
|
||||||
// Poll scrollback until marker appears or timeout
|
// Poll scrollback until marker appears or timeout
|
||||||
@ -116,10 +116,19 @@ pub async fn mcp_terminal_execute(
|
|||||||
return Ok(clean.trim().to_string());
|
return Ok(clean.trim().to_string());
|
||||||
}
|
}
|
||||||
|
|
||||||
tokio::time::sleep(std::time::Duration::from_millis(50)).await;
|
// Yield the executor before sleeping so other tasks aren't starved,
|
||||||
|
// then wait 200 ms — much cheaper than the original 50 ms busy-poll.
|
||||||
|
tokio::task::yield_now().await;
|
||||||
|
tokio::time::sleep(std::time::Duration::from_millis(200)).await;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Get the path where the MCP bridge binary is installed.
|
||||||
|
#[tauri::command]
|
||||||
|
pub fn mcp_bridge_path() -> String {
|
||||||
|
crate::mcp::bridge_manager::bridge_path().to_string_lossy().to_string()
|
||||||
|
}
|
||||||
|
|
||||||
/// Get the active session context — last 20 lines of scrollback for a session.
|
/// Get the active session context — last 20 lines of scrollback for a session.
|
||||||
/// Called by the frontend when the user switches tabs, emitted to the copilot.
|
/// Called by the frontend when the user switches tabs, emitted to the copilot.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
|
|||||||
@ -14,3 +14,4 @@ pub mod updater;
|
|||||||
pub mod tools_commands_r2;
|
pub mod tools_commands_r2;
|
||||||
pub mod workspace_commands;
|
pub mod workspace_commands;
|
||||||
pub mod docker_commands;
|
pub mod docker_commands;
|
||||||
|
pub mod window_commands;
|
||||||
|
|||||||
@ -3,35 +3,53 @@
|
|||||||
//! Mirrors the pattern used by `ssh_commands.rs` — thin command wrappers that
|
//! Mirrors the pattern used by `ssh_commands.rs` — thin command wrappers that
|
||||||
//! delegate to the `RdpService` via `State<AppState>`.
|
//! delegate to the `RdpService` via `State<AppState>`.
|
||||||
|
|
||||||
use tauri::State;
|
use tauri::{AppHandle, State};
|
||||||
|
use tauri::ipc::Response;
|
||||||
|
|
||||||
use crate::rdp::{RdpConfig, RdpSessionInfo};
|
use crate::rdp::{RdpConfig, RdpSessionInfo};
|
||||||
use crate::AppState;
|
use crate::AppState;
|
||||||
|
|
||||||
/// Connect to an RDP server.
|
/// Connect to an RDP server.
|
||||||
///
|
|
||||||
/// Performs the full connection handshake (TCP -> TLS -> CredSSP -> RDP) and
|
|
||||||
/// starts streaming frame updates in the background.
|
|
||||||
///
|
|
||||||
/// Returns the session UUID.
|
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub fn connect_rdp(
|
pub fn connect_rdp(
|
||||||
config: RdpConfig,
|
config: RdpConfig,
|
||||||
|
app_handle: AppHandle,
|
||||||
state: State<'_, AppState>,
|
state: State<'_, AppState>,
|
||||||
) -> Result<String, String> {
|
) -> Result<String, String> {
|
||||||
state.rdp.connect(config)
|
state.rdp.connect(config, app_handle)
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Get the current frame buffer as a base64-encoded RGBA string.
|
/// Get the dirty region since last call as raw RGBA bytes via binary IPC.
|
||||||
///
|
///
|
||||||
/// The frontend decodes this and draws it onto a `<canvas>` element.
|
/// Binary format: 8-byte header + pixel data
|
||||||
/// Pixel format: RGBA, 4 bytes per pixel, row-major, top-left origin.
|
/// Header: [x: u16, y: u16, width: u16, height: u16] (little-endian)
|
||||||
|
/// If header is all zeros, the payload is a full frame (width*height*4 bytes).
|
||||||
|
/// If header is non-zero, payload contains only the dirty rectangle pixels.
|
||||||
|
/// Returns empty payload if nothing changed.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub async fn rdp_get_frame(
|
pub fn rdp_get_frame(
|
||||||
session_id: String,
|
session_id: String,
|
||||||
state: State<'_, AppState>,
|
state: State<'_, AppState>,
|
||||||
) -> Result<String, String> {
|
) -> Result<Response, String> {
|
||||||
state.rdp.get_frame(&session_id).await
|
let (region, pixels) = state.rdp.get_frame(&session_id)?;
|
||||||
|
if pixels.is_empty() {
|
||||||
|
return Ok(Response::new(Vec::new()));
|
||||||
|
}
|
||||||
|
// Prepend 8-byte dirty rect header
|
||||||
|
let mut out = Vec::with_capacity(8 + pixels.len());
|
||||||
|
match region {
|
||||||
|
Some(rect) => {
|
||||||
|
out.extend_from_slice(&rect.x.to_le_bytes());
|
||||||
|
out.extend_from_slice(&rect.y.to_le_bytes());
|
||||||
|
out.extend_from_slice(&rect.width.to_le_bytes());
|
||||||
|
out.extend_from_slice(&rect.height.to_le_bytes());
|
||||||
|
}
|
||||||
|
None => {
|
||||||
|
out.extend_from_slice(&[0u8; 8]); // full frame marker
|
||||||
|
}
|
||||||
|
}
|
||||||
|
out.extend_from_slice(&pixels);
|
||||||
|
Ok(Response::new(out))
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Send a mouse event to an RDP session.
|
/// Send a mouse event to an RDP session.
|
||||||
@ -46,7 +64,7 @@ pub async fn rdp_get_frame(
|
|||||||
/// - 0x0100 = negative wheel direction
|
/// - 0x0100 = negative wheel direction
|
||||||
/// - 0x0400 = horizontal wheel
|
/// - 0x0400 = horizontal wheel
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub async fn rdp_send_mouse(
|
pub fn rdp_send_mouse(
|
||||||
session_id: String,
|
session_id: String,
|
||||||
x: u16,
|
x: u16,
|
||||||
y: u16,
|
y: u16,
|
||||||
@ -64,7 +82,7 @@ pub async fn rdp_send_mouse(
|
|||||||
///
|
///
|
||||||
/// `pressed` is `true` for key-down, `false` for key-up.
|
/// `pressed` is `true` for key-down, `false` for key-up.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub async fn rdp_send_key(
|
pub fn rdp_send_key(
|
||||||
session_id: String,
|
session_id: String,
|
||||||
scancode: u16,
|
scancode: u16,
|
||||||
pressed: bool,
|
pressed: bool,
|
||||||
@ -75,7 +93,7 @@ pub async fn rdp_send_key(
|
|||||||
|
|
||||||
/// Send clipboard text to an RDP session by simulating keystrokes.
|
/// Send clipboard text to an RDP session by simulating keystrokes.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub async fn rdp_send_clipboard(
|
pub fn rdp_send_clipboard(
|
||||||
session_id: String,
|
session_id: String,
|
||||||
text: String,
|
text: String,
|
||||||
state: State<'_, AppState>,
|
state: State<'_, AppState>,
|
||||||
@ -83,11 +101,34 @@ pub async fn rdp_send_clipboard(
|
|||||||
state.rdp.send_clipboard(&session_id, &text)
|
state.rdp.send_clipboard(&session_id, &text)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Force the next get_frame to return a full frame regardless of dirty state.
|
||||||
|
/// Used when switching tabs or after resize to ensure the canvas is fully repainted.
|
||||||
|
#[tauri::command]
|
||||||
|
pub fn rdp_force_refresh(
|
||||||
|
session_id: String,
|
||||||
|
state: State<'_, AppState>,
|
||||||
|
) -> Result<(), String> {
|
||||||
|
state.rdp.force_refresh(&session_id)
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Resize the RDP session's desktop resolution.
|
||||||
|
/// Sends a Display Control Virtual Channel request to the server.
|
||||||
|
/// The server will re-render at the new resolution and send updated frames.
|
||||||
|
#[tauri::command]
|
||||||
|
pub fn rdp_resize(
|
||||||
|
session_id: String,
|
||||||
|
width: u16,
|
||||||
|
height: u16,
|
||||||
|
state: State<'_, AppState>,
|
||||||
|
) -> Result<(), String> {
|
||||||
|
state.rdp.resize(&session_id, width, height)
|
||||||
|
}
|
||||||
|
|
||||||
/// Disconnect an RDP session.
|
/// Disconnect an RDP session.
|
||||||
///
|
///
|
||||||
/// Sends a graceful shutdown to the RDP server and removes the session.
|
/// Sends a graceful shutdown to the RDP server and removes the session.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub async fn disconnect_rdp(
|
pub fn disconnect_rdp(
|
||||||
session_id: String,
|
session_id: String,
|
||||||
state: State<'_, AppState>,
|
state: State<'_, AppState>,
|
||||||
) -> Result<(), String> {
|
) -> Result<(), String> {
|
||||||
@ -96,7 +137,7 @@ pub async fn disconnect_rdp(
|
|||||||
|
|
||||||
/// List all active RDP sessions (metadata only).
|
/// List all active RDP sessions (metadata only).
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub async fn list_rdp_sessions(
|
pub fn list_rdp_sessions(
|
||||||
state: State<'_, AppState>,
|
state: State<'_, AppState>,
|
||||||
) -> Result<Vec<RdpSessionInfo>, String> {
|
) -> Result<Vec<RdpSessionInfo>, String> {
|
||||||
Ok(state.rdp.list_sessions())
|
Ok(state.rdp.list_sessions())
|
||||||
|
|||||||
@ -4,6 +4,8 @@ use tauri::State;
|
|||||||
use serde::Serialize;
|
use serde::Serialize;
|
||||||
|
|
||||||
use crate::AppState;
|
use crate::AppState;
|
||||||
|
use crate::ssh::exec::exec_on_session;
|
||||||
|
use crate::utils::shell_escape;
|
||||||
|
|
||||||
// ── Ping ─────────────────────────────────────────────────────────────────────
|
// ── Ping ─────────────────────────────────────────────────────────────────────
|
||||||
|
|
||||||
@ -25,7 +27,7 @@ pub async fn tool_ping(
|
|||||||
let session = state.ssh.get_session(&session_id)
|
let session = state.ssh.get_session(&session_id)
|
||||||
.ok_or_else(|| format!("SSH session {} not found", session_id))?;
|
.ok_or_else(|| format!("SSH session {} not found", session_id))?;
|
||||||
let n = count.unwrap_or(4);
|
let n = count.unwrap_or(4);
|
||||||
let cmd = format!("ping -c {} {} 2>&1", n, target);
|
let cmd = format!("ping -c {} {} 2>&1", n, shell_escape(&target));
|
||||||
let output = exec_on_session(&session.handle, &cmd).await?;
|
let output = exec_on_session(&session.handle, &cmd).await?;
|
||||||
Ok(PingResult { target, output })
|
Ok(PingResult { target, output })
|
||||||
}
|
}
|
||||||
@ -39,7 +41,8 @@ pub async fn tool_traceroute(
|
|||||||
) -> Result<String, String> {
|
) -> Result<String, String> {
|
||||||
let session = state.ssh.get_session(&session_id)
|
let session = state.ssh.get_session(&session_id)
|
||||||
.ok_or_else(|| format!("SSH session {} not found", session_id))?;
|
.ok_or_else(|| format!("SSH session {} not found", session_id))?;
|
||||||
let cmd = format!("traceroute {} 2>&1 || tracert {} 2>&1", target, target);
|
let t = shell_escape(&target);
|
||||||
|
let cmd = format!("traceroute {} 2>&1 || tracert {} 2>&1", t, t);
|
||||||
exec_on_session(&session.handle, &cmd).await
|
exec_on_session(&session.handle, &cmd).await
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -65,14 +68,16 @@ pub async fn tool_wake_on_lan(
|
|||||||
let cmd = format!(
|
let cmd = format!(
|
||||||
r#"python3 -c "
|
r#"python3 -c "
|
||||||
import socket, struct
|
import socket, struct
|
||||||
mac = bytes.fromhex('{mac_clean}')
|
mac = bytes.fromhex({mac_clean_escaped})
|
||||||
pkt = b'\xff'*6 + mac*16
|
pkt = b'\xff'*6 + mac*16
|
||||||
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
||||||
s.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
|
s.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1)
|
||||||
s.sendto(pkt, ('255.255.255.255', 9))
|
s.sendto(pkt, ('255.255.255.255', 9))
|
||||||
s.close()
|
s.close()
|
||||||
print('WoL packet sent to {mac_address}')
|
print('WoL packet sent to {mac_display_escaped}')
|
||||||
" 2>&1 || echo "python3 not available — install python3 on remote host for WoL""#
|
" 2>&1 || echo "python3 not available — install python3 on remote host for WoL""#,
|
||||||
|
mac_clean_escaped = shell_escape(&mac_clean),
|
||||||
|
mac_display_escaped = shell_escape(&mac_address),
|
||||||
);
|
);
|
||||||
|
|
||||||
exec_on_session(&session.handle, &cmd).await
|
exec_on_session(&session.handle, &cmd).await
|
||||||
@ -181,32 +186,3 @@ pub fn tool_generate_password_inner(
|
|||||||
Ok(password)
|
Ok(password)
|
||||||
}
|
}
|
||||||
|
|
||||||
// ── Helper ───────────────────────────────────────────────────────────────────
|
|
||||||
|
|
||||||
async fn exec_on_session(
|
|
||||||
handle: &std::sync::Arc<tokio::sync::Mutex<russh::client::Handle<crate::ssh::session::SshClient>>>,
|
|
||||||
cmd: &str,
|
|
||||||
) -> Result<String, String> {
|
|
||||||
let mut channel = {
|
|
||||||
let h = handle.lock().await;
|
|
||||||
h.channel_open_session().await.map_err(|e| format!("Exec channel failed: {}", e))?
|
|
||||||
};
|
|
||||||
|
|
||||||
channel.exec(true, cmd).await.map_err(|e| format!("Exec failed: {}", e))?;
|
|
||||||
|
|
||||||
let mut output = String::new();
|
|
||||||
loop {
|
|
||||||
match channel.wait().await {
|
|
||||||
Some(russh::ChannelMsg::Data { ref data }) => {
|
|
||||||
if let Ok(text) = std::str::from_utf8(data.as_ref()) {
|
|
||||||
output.push_str(text);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
Some(russh::ChannelMsg::Eof) | Some(russh::ChannelMsg::Close) | None => break,
|
|
||||||
Some(russh::ChannelMsg::ExitStatus { .. }) => {}
|
|
||||||
_ => {}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
Ok(output)
|
|
||||||
}
|
|
||||||
|
|||||||
@ -4,6 +4,8 @@ use tauri::State;
|
|||||||
use serde::Serialize;
|
use serde::Serialize;
|
||||||
|
|
||||||
use crate::AppState;
|
use crate::AppState;
|
||||||
|
use crate::ssh::exec::exec_on_session;
|
||||||
|
use crate::utils::shell_escape;
|
||||||
|
|
||||||
// ── DNS Lookup ───────────────────────────────────────────────────────────────
|
// ── DNS Lookup ───────────────────────────────────────────────────────────────
|
||||||
|
|
||||||
@ -16,10 +18,11 @@ pub async fn tool_dns_lookup(
|
|||||||
) -> Result<String, String> {
|
) -> Result<String, String> {
|
||||||
let session = state.ssh.get_session(&session_id)
|
let session = state.ssh.get_session(&session_id)
|
||||||
.ok_or_else(|| format!("SSH session {} not found", session_id))?;
|
.ok_or_else(|| format!("SSH session {} not found", session_id))?;
|
||||||
let rtype = record_type.unwrap_or_else(|| "A".to_string());
|
let d = shell_escape(&domain);
|
||||||
|
let rt = shell_escape(&record_type.unwrap_or_else(|| "A".to_string()));
|
||||||
let cmd = format!(
|
let cmd = format!(
|
||||||
r#"dig {} {} +short 2>/dev/null || nslookup -type={} {} 2>/dev/null || host -t {} {} 2>/dev/null"#,
|
r#"dig {} {} +short 2>/dev/null || nslookup -type={} {} 2>/dev/null || host -t {} {} 2>/dev/null"#,
|
||||||
domain, rtype, rtype, domain, rtype, domain
|
d, rt, rt, d, rt, d
|
||||||
);
|
);
|
||||||
exec_on_session(&session.handle, &cmd).await
|
exec_on_session(&session.handle, &cmd).await
|
||||||
}
|
}
|
||||||
@ -34,7 +37,7 @@ pub async fn tool_whois(
|
|||||||
) -> Result<String, String> {
|
) -> Result<String, String> {
|
||||||
let session = state.ssh.get_session(&session_id)
|
let session = state.ssh.get_session(&session_id)
|
||||||
.ok_or_else(|| format!("SSH session {} not found", session_id))?;
|
.ok_or_else(|| format!("SSH session {} not found", session_id))?;
|
||||||
let cmd = format!("whois {} 2>&1 | head -80", target);
|
let cmd = format!("whois {} 2>&1 | head -80", shell_escape(&target));
|
||||||
exec_on_session(&session.handle, &cmd).await
|
exec_on_session(&session.handle, &cmd).await
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -50,9 +53,10 @@ pub async fn tool_bandwidth_iperf(
|
|||||||
let session = state.ssh.get_session(&session_id)
|
let session = state.ssh.get_session(&session_id)
|
||||||
.ok_or_else(|| format!("SSH session {} not found", session_id))?;
|
.ok_or_else(|| format!("SSH session {} not found", session_id))?;
|
||||||
let dur = duration.unwrap_or(5);
|
let dur = duration.unwrap_or(5);
|
||||||
|
let s = shell_escape(&server);
|
||||||
let cmd = format!(
|
let cmd = format!(
|
||||||
"iperf3 -c {} -t {} --json 2>/dev/null || iperf3 -c {} -t {} 2>&1 || echo 'iperf3 not installed — run: apt install iperf3 / brew install iperf3'",
|
"iperf3 -c {} -t {} --json 2>/dev/null || iperf3 -c {} -t {} 2>&1 || echo 'iperf3 not installed — run: apt install iperf3 / brew install iperf3'",
|
||||||
server, dur, server, dur
|
s, dur, s, dur
|
||||||
);
|
);
|
||||||
exec_on_session(&session.handle, &cmd).await
|
exec_on_session(&session.handle, &cmd).await
|
||||||
}
|
}
|
||||||
@ -178,27 +182,3 @@ fn to_ip(val: u32) -> String {
|
|||||||
format!("{}.{}.{}.{}", val >> 24, (val >> 16) & 0xFF, (val >> 8) & 0xFF, val & 0xFF)
|
format!("{}.{}.{}.{}", val >> 24, (val >> 16) & 0xFF, (val >> 8) & 0xFF, val & 0xFF)
|
||||||
}
|
}
|
||||||
|
|
||||||
// ── Helper ───────────────────────────────────────────────────────────────────
|
|
||||||
|
|
||||||
async fn exec_on_session(
|
|
||||||
handle: &std::sync::Arc<tokio::sync::Mutex<russh::client::Handle<crate::ssh::session::SshClient>>>,
|
|
||||||
cmd: &str,
|
|
||||||
) -> Result<String, String> {
|
|
||||||
let mut channel = {
|
|
||||||
let h = handle.lock().await;
|
|
||||||
h.channel_open_session().await.map_err(|e| format!("Exec channel failed: {}", e))?
|
|
||||||
};
|
|
||||||
channel.exec(true, cmd).await.map_err(|e| format!("Exec failed: {}", e))?;
|
|
||||||
let mut output = String::new();
|
|
||||||
loop {
|
|
||||||
match channel.wait().await {
|
|
||||||
Some(russh::ChannelMsg::Data { ref data }) => {
|
|
||||||
if let Ok(text) = std::str::from_utf8(data.as_ref()) { output.push_str(text); }
|
|
||||||
}
|
|
||||||
Some(russh::ChannelMsg::Eof) | Some(russh::ChannelMsg::Close) | None => break,
|
|
||||||
Some(russh::ChannelMsg::ExitStatus { .. }) => {}
|
|
||||||
_ => {}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
Ok(output)
|
|
||||||
}
|
|
||||||
|
|||||||
@ -48,10 +48,8 @@ pub async fn check_for_updates(app_handle: tauri::AppHandle) -> Result<UpdateInf
|
|||||||
.unwrap_or("")
|
.unwrap_or("")
|
||||||
.to_string();
|
.to_string();
|
||||||
|
|
||||||
let html_url = latest.get("html_url")
|
// Direct download from SeaweedFS
|
||||||
.and_then(|v| v.as_str())
|
let html_url = format!("https://files.command.vigilcyber.com/wraith/{}/", tag);
|
||||||
.unwrap_or("https://git.command.vigilcyber.com/vstockwell/wraith/releases")
|
|
||||||
.to_string();
|
|
||||||
|
|
||||||
let update_available = version_is_newer(&tag, ¤t);
|
let update_available = version_is_newer(&tag, ¤t);
|
||||||
|
|
||||||
|
|||||||
@ -1,4 +1,5 @@
|
|||||||
use tauri::State;
|
use tauri::State;
|
||||||
|
use zeroize::Zeroize;
|
||||||
|
|
||||||
use crate::vault::{self, VaultService};
|
use crate::vault::{self, VaultService};
|
||||||
use crate::credentials::CredentialService;
|
use crate::credentials::CredentialService;
|
||||||
@ -21,28 +22,33 @@ pub fn is_first_run(state: State<'_, AppState>) -> bool {
|
|||||||
/// Returns `Err` if the vault has already been set up or if any storage
|
/// Returns `Err` if the vault has already been set up or if any storage
|
||||||
/// operation fails.
|
/// operation fails.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub fn create_vault(password: String, state: State<'_, AppState>) -> Result<(), String> {
|
pub async fn create_vault(mut password: String, state: State<'_, AppState>) -> Result<(), String> {
|
||||||
if !state.is_first_run() {
|
let result = async {
|
||||||
return Err("Vault already exists — use unlock instead of create".into());
|
if !state.is_first_run() {
|
||||||
}
|
return Err("Vault already exists — use unlock instead of create".into());
|
||||||
|
}
|
||||||
|
|
||||||
let salt = vault::generate_salt();
|
let salt = vault::generate_salt();
|
||||||
let key = vault::derive_key(&password, &salt);
|
let key = vault::derive_key(&password, &salt);
|
||||||
let vs = VaultService::new(key);
|
let vs = VaultService::new(key.clone());
|
||||||
|
|
||||||
// Persist the salt so we can re-derive the key on future unlocks.
|
// Persist the salt so we can re-derive the key on future unlocks.
|
||||||
state.settings.set("vault_salt", &hex::encode(salt))?;
|
state.settings.set("vault_salt", &hex::encode(salt))?;
|
||||||
|
|
||||||
// Persist a known-plaintext check so unlock can verify the password.
|
// Persist a known-plaintext check so unlock can verify the password.
|
||||||
let check = vs.encrypt("wraith-vault-check")?;
|
let check = vs.encrypt("wraith-vault-check")?;
|
||||||
state.settings.set("vault_check", &check)?;
|
state.settings.set("vault_check", &check)?;
|
||||||
|
|
||||||
// Activate the vault and credentials service for this session.
|
// Activate the vault and credentials service for this session.
|
||||||
let cred_svc = CredentialService::new(state.db.clone(), VaultService::new(key));
|
let cred_svc = CredentialService::new(state.db.clone(), VaultService::new(key));
|
||||||
*state.credentials.lock().unwrap() = Some(cred_svc);
|
*state.credentials.lock().await = Some(cred_svc);
|
||||||
*state.vault.lock().unwrap() = Some(vs);
|
*state.vault.lock().await = Some(vs);
|
||||||
|
|
||||||
Ok(())
|
Ok(())
|
||||||
|
}.await;
|
||||||
|
|
||||||
|
password.zeroize();
|
||||||
|
result
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Unlock an existing vault using the master password.
|
/// Unlock an existing vault using the master password.
|
||||||
@ -52,42 +58,47 @@ pub fn create_vault(password: String, state: State<'_, AppState>) -> Result<(),
|
|||||||
///
|
///
|
||||||
/// Returns `Err("Incorrect master password")` if the password is wrong.
|
/// Returns `Err("Incorrect master password")` if the password is wrong.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub fn unlock(password: String, state: State<'_, AppState>) -> Result<(), String> {
|
pub async fn unlock(mut password: String, state: State<'_, AppState>) -> Result<(), String> {
|
||||||
let salt_hex = state
|
let result = async {
|
||||||
.settings
|
let salt_hex = state
|
||||||
.get("vault_salt")
|
.settings
|
||||||
.ok_or_else(|| "Vault has not been set up — call create_vault first".to_string())?;
|
.get("vault_salt")
|
||||||
|
.ok_or_else(|| "Vault has not been set up — call create_vault first".to_string())?;
|
||||||
|
|
||||||
let salt = hex::decode(&salt_hex)
|
let salt = hex::decode(&salt_hex)
|
||||||
.map_err(|e| format!("Stored vault salt is corrupt: {e}"))?;
|
.map_err(|e| format!("Stored vault salt is corrupt: {e}"))?;
|
||||||
|
|
||||||
let key = vault::derive_key(&password, &salt);
|
let key = vault::derive_key(&password, &salt);
|
||||||
let vs = VaultService::new(key);
|
let vs = VaultService::new(key.clone());
|
||||||
|
|
||||||
// Verify the password by decrypting the check value.
|
// Verify the password by decrypting the check value.
|
||||||
let check_blob = state
|
let check_blob = state
|
||||||
.settings
|
.settings
|
||||||
.get("vault_check")
|
.get("vault_check")
|
||||||
.ok_or_else(|| "Vault check value is missing — vault may be corrupt".to_string())?;
|
.ok_or_else(|| "Vault check value is missing — vault may be corrupt".to_string())?;
|
||||||
|
|
||||||
let check_plain = vs
|
let check_plain = vs
|
||||||
.decrypt(&check_blob)
|
.decrypt(&check_blob)
|
||||||
.map_err(|_| "Incorrect master password".to_string())?;
|
.map_err(|_| "Incorrect master password".to_string())?;
|
||||||
|
|
||||||
if check_plain != "wraith-vault-check" {
|
if check_plain != "wraith-vault-check" {
|
||||||
return Err("Incorrect master password".into());
|
return Err("Incorrect master password".into());
|
||||||
}
|
}
|
||||||
|
|
||||||
// Activate the vault and credentials service for this session.
|
// Activate the vault and credentials service for this session.
|
||||||
let cred_svc = CredentialService::new(state.db.clone(), VaultService::new(key));
|
let cred_svc = CredentialService::new(state.db.clone(), VaultService::new(key));
|
||||||
*state.credentials.lock().unwrap() = Some(cred_svc);
|
*state.credentials.lock().await = Some(cred_svc);
|
||||||
*state.vault.lock().unwrap() = Some(vs);
|
*state.vault.lock().await = Some(vs);
|
||||||
|
|
||||||
Ok(())
|
Ok(())
|
||||||
|
}.await;
|
||||||
|
|
||||||
|
password.zeroize();
|
||||||
|
result
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Returns `true` if the vault is currently unlocked for this session.
|
/// Returns `true` if the vault is currently unlocked for this session.
|
||||||
#[tauri::command]
|
#[tauri::command]
|
||||||
pub fn is_unlocked(state: State<'_, AppState>) -> bool {
|
pub async fn is_unlocked(state: State<'_, AppState>) -> Result<bool, String> {
|
||||||
state.is_unlocked()
|
Ok(state.is_unlocked().await)
|
||||||
}
|
}
|
||||||
|
|||||||
40
src-tauri/src/commands/window_commands.rs
Normal file
40
src-tauri/src/commands/window_commands.rs
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
use tauri::AppHandle;
|
||||||
|
use tauri::WebviewWindowBuilder;
|
||||||
|
|
||||||
|
/// Open a child window from the Rust side using WebviewWindowBuilder.
|
||||||
|
///
|
||||||
|
/// The `url` parameter supports hash fragments (e.g. "index.html#/tool/ping?sessionId=abc").
|
||||||
|
/// WebviewUrl::App takes a PathBuf and cannot handle hash/query — so we load plain
|
||||||
|
/// index.html and set the hash via JS after the window is created.
|
||||||
|
#[tauri::command]
|
||||||
|
pub fn open_child_window(
|
||||||
|
app_handle: AppHandle,
|
||||||
|
label: String,
|
||||||
|
title: String,
|
||||||
|
url: String,
|
||||||
|
width: f64,
|
||||||
|
height: f64,
|
||||||
|
) -> Result<(), String> {
|
||||||
|
// Split "index.html#/tool/ping?sessionId=abc" into path and fragment
|
||||||
|
let (path, hash) = match url.split_once('#') {
|
||||||
|
Some((p, h)) => (p.to_string(), Some(format!("#{}", h))),
|
||||||
|
None => (url.clone(), None),
|
||||||
|
};
|
||||||
|
|
||||||
|
let webview_url = tauri::WebviewUrl::App(path.into());
|
||||||
|
let window = WebviewWindowBuilder::new(&app_handle, &label, webview_url)
|
||||||
|
.title(&title)
|
||||||
|
.inner_size(width, height)
|
||||||
|
.resizable(true)
|
||||||
|
.center()
|
||||||
|
.build()
|
||||||
|
.map_err(|e| format!("Failed to create window '{}': {}", label, e))?;
|
||||||
|
|
||||||
|
// Set the hash fragment after the window loads — this triggers App.vue's
|
||||||
|
// onMounted hash detection to render the correct tool/detached component.
|
||||||
|
if let Some(hash) = hash {
|
||||||
|
let _ = window.eval(&format!("window.location.hash = '{}';", hash));
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
@ -19,6 +19,7 @@ use crate::db::Database;
|
|||||||
// ── domain types ──────────────────────────────────────────────────────────────
|
// ── domain types ──────────────────────────────────────────────────────────────
|
||||||
|
|
||||||
#[derive(Debug, Serialize, Deserialize, Clone)]
|
#[derive(Debug, Serialize, Deserialize, Clone)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
pub struct ConnectionGroup {
|
pub struct ConnectionGroup {
|
||||||
pub id: i64,
|
pub id: i64,
|
||||||
pub name: String,
|
pub name: String,
|
||||||
@ -433,27 +434,49 @@ impl ConnectionService {
|
|||||||
/// Batch-update sort_order for a list of connection IDs.
|
/// Batch-update sort_order for a list of connection IDs.
|
||||||
pub fn reorder_connections(&self, ids: &[i64]) -> Result<(), String> {
|
pub fn reorder_connections(&self, ids: &[i64]) -> Result<(), String> {
|
||||||
let conn = self.db.conn();
|
let conn = self.db.conn();
|
||||||
for (i, id) in ids.iter().enumerate() {
|
conn.execute_batch("BEGIN")
|
||||||
conn.execute(
|
.map_err(|e| format!("Failed to begin reorder transaction: {e}"))?;
|
||||||
"UPDATE connections SET sort_order = ?1 WHERE id = ?2",
|
let result = (|| {
|
||||||
params![i as i64, id],
|
for (i, id) in ids.iter().enumerate() {
|
||||||
)
|
conn.execute(
|
||||||
.map_err(|e| format!("Failed to reorder connection {id}: {e}"))?;
|
"UPDATE connections SET sort_order = ?1 WHERE id = ?2",
|
||||||
|
params![i as i64, id],
|
||||||
|
)
|
||||||
|
.map_err(|e| format!("Failed to reorder connection {id}: {e}"))?;
|
||||||
|
}
|
||||||
|
Ok(())
|
||||||
|
})();
|
||||||
|
if result.is_err() {
|
||||||
|
let _ = conn.execute_batch("ROLLBACK");
|
||||||
|
} else {
|
||||||
|
conn.execute_batch("COMMIT")
|
||||||
|
.map_err(|e| format!("Failed to commit reorder transaction: {e}"))?;
|
||||||
}
|
}
|
||||||
Ok(())
|
result
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Batch-update sort_order for a list of group IDs.
|
/// Batch-update sort_order for a list of group IDs.
|
||||||
pub fn reorder_groups(&self, ids: &[i64]) -> Result<(), String> {
|
pub fn reorder_groups(&self, ids: &[i64]) -> Result<(), String> {
|
||||||
let conn = self.db.conn();
|
let conn = self.db.conn();
|
||||||
for (i, id) in ids.iter().enumerate() {
|
conn.execute_batch("BEGIN")
|
||||||
conn.execute(
|
.map_err(|e| format!("Failed to begin reorder transaction: {e}"))?;
|
||||||
"UPDATE groups SET sort_order = ?1 WHERE id = ?2",
|
let result = (|| {
|
||||||
params![i as i64, id],
|
for (i, id) in ids.iter().enumerate() {
|
||||||
)
|
conn.execute(
|
||||||
.map_err(|e| format!("Failed to reorder group {id}: {e}"))?;
|
"UPDATE groups SET sort_order = ?1 WHERE id = ?2",
|
||||||
|
params![i as i64, id],
|
||||||
|
)
|
||||||
|
.map_err(|e| format!("Failed to reorder group {id}: {e}"))?;
|
||||||
|
}
|
||||||
|
Ok(())
|
||||||
|
})();
|
||||||
|
if result.is_err() {
|
||||||
|
let _ = conn.execute_batch("ROLLBACK");
|
||||||
|
} else {
|
||||||
|
conn.execute_batch("COMMIT")
|
||||||
|
.map_err(|e| format!("Failed to commit reorder transaction: {e}"))?;
|
||||||
}
|
}
|
||||||
Ok(())
|
result
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -31,10 +31,11 @@ impl Database {
|
|||||||
|
|
||||||
/// Acquire a lock on the underlying connection.
|
/// Acquire a lock on the underlying connection.
|
||||||
///
|
///
|
||||||
/// Panics if the mutex was poisoned (which only happens if a thread
|
/// Recovers gracefully from a poisoned mutex by taking the inner value.
|
||||||
/// panicked while holding the lock — a non-recoverable situation anyway).
|
/// A poisoned mutex means a thread panicked while holding the lock; the
|
||||||
|
/// connection itself is still valid, so we can continue operating.
|
||||||
pub fn conn(&self) -> std::sync::MutexGuard<'_, Connection> {
|
pub fn conn(&self) -> std::sync::MutexGuard<'_, Connection> {
|
||||||
self.conn.lock().unwrap()
|
self.conn.lock().unwrap_or_else(|e| e.into_inner())
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Run all embedded SQL migrations.
|
/// Run all embedded SQL migrations.
|
||||||
|
|||||||
@ -21,9 +21,9 @@ pub mod pty;
|
|||||||
pub mod mcp;
|
pub mod mcp;
|
||||||
pub mod scanner;
|
pub mod scanner;
|
||||||
pub mod commands;
|
pub mod commands;
|
||||||
|
pub mod utils;
|
||||||
|
|
||||||
use std::path::PathBuf;
|
use std::path::PathBuf;
|
||||||
use std::sync::Mutex;
|
|
||||||
|
|
||||||
use db::Database;
|
use db::Database;
|
||||||
use vault::VaultService;
|
use vault::VaultService;
|
||||||
@ -41,10 +41,10 @@ use mcp::error_watcher::ErrorWatcher;
|
|||||||
|
|
||||||
pub struct AppState {
|
pub struct AppState {
|
||||||
pub db: Database,
|
pub db: Database,
|
||||||
pub vault: Mutex<Option<VaultService>>,
|
pub vault: tokio::sync::Mutex<Option<VaultService>>,
|
||||||
pub settings: SettingsService,
|
pub settings: SettingsService,
|
||||||
pub connections: ConnectionService,
|
pub connections: ConnectionService,
|
||||||
pub credentials: Mutex<Option<CredentialService>>,
|
pub credentials: tokio::sync::Mutex<Option<CredentialService>>,
|
||||||
pub ssh: SshService,
|
pub ssh: SshService,
|
||||||
pub sftp: SftpService,
|
pub sftp: SftpService,
|
||||||
pub rdp: RdpService,
|
pub rdp: RdpService,
|
||||||
@ -60,17 +60,18 @@ impl AppState {
|
|||||||
std::fs::create_dir_all(&data_dir)?;
|
std::fs::create_dir_all(&data_dir)?;
|
||||||
let database = Database::open(&data_dir.join("wraith.db"))?;
|
let database = Database::open(&data_dir.join("wraith.db"))?;
|
||||||
database.migrate()?;
|
database.migrate()?;
|
||||||
|
let settings = SettingsService::new(database.clone());
|
||||||
Ok(Self {
|
Ok(Self {
|
||||||
db: database.clone(),
|
db: database.clone(),
|
||||||
vault: Mutex::new(None),
|
vault: tokio::sync::Mutex::new(None),
|
||||||
settings: SettingsService::new(database.clone()),
|
|
||||||
connections: ConnectionService::new(database.clone()),
|
connections: ConnectionService::new(database.clone()),
|
||||||
credentials: Mutex::new(None),
|
credentials: tokio::sync::Mutex::new(None),
|
||||||
ssh: SshService::new(database.clone()),
|
ssh: SshService::new(database.clone()),
|
||||||
sftp: SftpService::new(),
|
sftp: SftpService::new(),
|
||||||
rdp: RdpService::new(),
|
rdp: RdpService::new(),
|
||||||
theme: ThemeService::new(database.clone()),
|
theme: ThemeService::new(database),
|
||||||
workspace: WorkspaceService::new(SettingsService::new(database.clone())),
|
workspace: WorkspaceService::new(settings.clone()),
|
||||||
|
settings,
|
||||||
pty: PtyService::new(),
|
pty: PtyService::new(),
|
||||||
scrollback: ScrollbackRegistry::new(),
|
scrollback: ScrollbackRegistry::new(),
|
||||||
error_watcher: std::sync::Arc::new(ErrorWatcher::new()),
|
error_watcher: std::sync::Arc::new(ErrorWatcher::new()),
|
||||||
@ -85,8 +86,8 @@ impl AppState {
|
|||||||
self.settings.get("vault_salt").unwrap_or_default().is_empty()
|
self.settings.get("vault_salt").unwrap_or_default().is_empty()
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn is_unlocked(&self) -> bool {
|
pub async fn is_unlocked(&self) -> bool {
|
||||||
self.vault.lock().unwrap().is_some()
|
self.vault.lock().await.is_some()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -100,9 +101,24 @@ pub fn data_directory() -> PathBuf {
|
|||||||
PathBuf::from(".")
|
PathBuf::from(".")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Cached log file handle — opened once on first use, reused for all subsequent
|
||||||
|
/// writes. Avoids the open/close syscall pair that the original implementation
|
||||||
|
/// paid on every `wraith_log!` invocation.
|
||||||
|
static LOG_FILE: std::sync::OnceLock<std::sync::Mutex<std::fs::File>> = std::sync::OnceLock::new();
|
||||||
|
|
||||||
fn write_log(path: &std::path::Path, msg: &str) -> std::io::Result<()> {
|
fn write_log(path: &std::path::Path, msg: &str) -> std::io::Result<()> {
|
||||||
use std::io::Write;
|
use std::io::Write;
|
||||||
let mut f = std::fs::OpenOptions::new().create(true).append(true).open(path)?;
|
|
||||||
|
let handle = LOG_FILE.get_or_init(|| {
|
||||||
|
let file = std::fs::OpenOptions::new()
|
||||||
|
.create(true)
|
||||||
|
.append(true)
|
||||||
|
.open(path)
|
||||||
|
.expect("failed to open wraith.log");
|
||||||
|
std::sync::Mutex::new(file)
|
||||||
|
});
|
||||||
|
|
||||||
|
let mut f = handle.lock().unwrap_or_else(|e| e.into_inner());
|
||||||
let elapsed = std::time::SystemTime::now()
|
let elapsed = std::time::SystemTime::now()
|
||||||
.duration_since(std::time::UNIX_EPOCH)
|
.duration_since(std::time::UNIX_EPOCH)
|
||||||
.unwrap_or_default()
|
.unwrap_or_default()
|
||||||
@ -155,7 +171,9 @@ pub fn run() {
|
|||||||
let _ = write_log(&log_file, "Setup: cloned services OK");
|
let _ = write_log(&log_file, "Setup: cloned services OK");
|
||||||
|
|
||||||
// Error watcher — std::thread, no tokio needed
|
// Error watcher — std::thread, no tokio needed
|
||||||
|
let watcher_for_mcp = watcher.clone();
|
||||||
let app_handle = app.handle().clone();
|
let app_handle = app.handle().clone();
|
||||||
|
let app_handle_for_mcp = app.handle().clone();
|
||||||
let _ = std::panic::catch_unwind(std::panic::AssertUnwindSafe(|| {
|
let _ = std::panic::catch_unwind(std::panic::AssertUnwindSafe(|| {
|
||||||
mcp::error_watcher::start_error_watcher(watcher, scrollback.clone(), app_handle);
|
mcp::error_watcher::start_error_watcher(watcher, scrollback.clone(), app_handle);
|
||||||
}));
|
}));
|
||||||
@ -165,13 +183,23 @@ pub fn run() {
|
|||||||
let log_file2 = log_file.clone();
|
let log_file2 = log_file.clone();
|
||||||
let _ = std::panic::catch_unwind(std::panic::AssertUnwindSafe(|| {
|
let _ = std::panic::catch_unwind(std::panic::AssertUnwindSafe(|| {
|
||||||
tauri::async_runtime::spawn(async move {
|
tauri::async_runtime::spawn(async move {
|
||||||
match mcp::server::start_mcp_server(ssh, rdp, sftp, scrollback).await {
|
match mcp::server::start_mcp_server(ssh, rdp, sftp, scrollback, app_handle_for_mcp, watcher_for_mcp).await {
|
||||||
Ok(port) => { let _ = write_log(&log_file2, &format!("MCP server started on localhost:{}", port)); }
|
Ok(port) => { let _ = write_log(&log_file2, &format!("MCP server started on localhost:{}", port)); }
|
||||||
Err(e) => { let _ = write_log(&log_file2, &format!("MCP server FAILED: {}", e)); }
|
Err(e) => { let _ = write_log(&log_file2, &format!("MCP server FAILED: {}", e)); }
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
}));
|
}));
|
||||||
let _ = write_log(&log_file, "Setup: MCP spawn dispatched");
|
let _ = write_log(&log_file, "Setup: MCP spawn dispatched");
|
||||||
|
|
||||||
|
// Download/update MCP bridge binary if needed
|
||||||
|
let app_ver = app.config().version.clone().unwrap_or_else(|| "0.0.0".to_string());
|
||||||
|
let log_file3 = log_file.clone();
|
||||||
|
tauri::async_runtime::spawn(async move {
|
||||||
|
match mcp::bridge_manager::ensure_bridge(&app_ver).await {
|
||||||
|
Ok(()) => { let _ = write_log(&log_file3, "Setup: MCP bridge binary OK"); }
|
||||||
|
Err(e) => { let _ = write_log(&log_file3, &format!("Setup: MCP bridge download failed: {}", e)); }
|
||||||
|
}
|
||||||
|
});
|
||||||
}
|
}
|
||||||
Err(panic) => {
|
Err(panic) => {
|
||||||
let msg = if let Some(s) = panic.downcast_ref::<String>() {
|
let msg = if let Some(s) = panic.downcast_ref::<String>() {
|
||||||
@ -196,16 +224,17 @@ pub fn run() {
|
|||||||
commands::credentials::list_credentials, commands::credentials::create_password, commands::credentials::create_ssh_key, commands::credentials::delete_credential, commands::credentials::decrypt_password, commands::credentials::decrypt_ssh_key,
|
commands::credentials::list_credentials, commands::credentials::create_password, commands::credentials::create_ssh_key, commands::credentials::delete_credential, commands::credentials::decrypt_password, commands::credentials::decrypt_ssh_key,
|
||||||
commands::ssh_commands::connect_ssh, commands::ssh_commands::connect_ssh_with_key, commands::ssh_commands::ssh_write, commands::ssh_commands::ssh_resize, commands::ssh_commands::disconnect_ssh, commands::ssh_commands::disconnect_session, commands::ssh_commands::list_ssh_sessions,
|
commands::ssh_commands::connect_ssh, commands::ssh_commands::connect_ssh_with_key, commands::ssh_commands::ssh_write, commands::ssh_commands::ssh_resize, commands::ssh_commands::disconnect_ssh, commands::ssh_commands::disconnect_session, commands::ssh_commands::list_ssh_sessions,
|
||||||
commands::sftp_commands::sftp_list, commands::sftp_commands::sftp_read_file, commands::sftp_commands::sftp_write_file, commands::sftp_commands::sftp_mkdir, commands::sftp_commands::sftp_delete, commands::sftp_commands::sftp_rename,
|
commands::sftp_commands::sftp_list, commands::sftp_commands::sftp_read_file, commands::sftp_commands::sftp_write_file, commands::sftp_commands::sftp_mkdir, commands::sftp_commands::sftp_delete, commands::sftp_commands::sftp_rename,
|
||||||
commands::rdp_commands::connect_rdp, commands::rdp_commands::rdp_get_frame, commands::rdp_commands::rdp_send_mouse, commands::rdp_commands::rdp_send_key, commands::rdp_commands::rdp_send_clipboard, commands::rdp_commands::disconnect_rdp, commands::rdp_commands::list_rdp_sessions,
|
commands::rdp_commands::connect_rdp, commands::rdp_commands::rdp_get_frame, commands::rdp_commands::rdp_force_refresh, commands::rdp_commands::rdp_send_mouse, commands::rdp_commands::rdp_send_key, commands::rdp_commands::rdp_send_clipboard, commands::rdp_commands::rdp_resize, commands::rdp_commands::disconnect_rdp, commands::rdp_commands::list_rdp_sessions,
|
||||||
commands::theme_commands::list_themes, commands::theme_commands::get_theme,
|
commands::theme_commands::list_themes, commands::theme_commands::get_theme,
|
||||||
commands::pty_commands::list_available_shells, commands::pty_commands::spawn_local_shell, commands::pty_commands::pty_write, commands::pty_commands::pty_resize, commands::pty_commands::disconnect_pty,
|
commands::pty_commands::list_available_shells, commands::pty_commands::spawn_local_shell, commands::pty_commands::pty_write, commands::pty_commands::pty_resize, commands::pty_commands::disconnect_pty,
|
||||||
commands::mcp_commands::mcp_list_sessions, commands::mcp_commands::mcp_terminal_read, commands::mcp_commands::mcp_terminal_execute, commands::mcp_commands::mcp_get_session_context,
|
commands::mcp_commands::mcp_list_sessions, commands::mcp_commands::mcp_terminal_read, commands::mcp_commands::mcp_terminal_execute, commands::mcp_commands::mcp_get_session_context, commands::mcp_commands::mcp_bridge_path,
|
||||||
commands::scanner_commands::scan_network, commands::scanner_commands::scan_ports, commands::scanner_commands::quick_scan,
|
commands::scanner_commands::scan_network, commands::scanner_commands::scan_ports, commands::scanner_commands::quick_scan,
|
||||||
commands::tools_commands::tool_ping, commands::tools_commands::tool_traceroute, commands::tools_commands::tool_wake_on_lan, commands::tools_commands::tool_generate_ssh_key, commands::tools_commands::tool_generate_password,
|
commands::tools_commands::tool_ping, commands::tools_commands::tool_traceroute, commands::tools_commands::tool_wake_on_lan, commands::tools_commands::tool_generate_ssh_key, commands::tools_commands::tool_generate_password,
|
||||||
commands::tools_commands_r2::tool_dns_lookup, commands::tools_commands_r2::tool_whois, commands::tools_commands_r2::tool_bandwidth_iperf, commands::tools_commands_r2::tool_bandwidth_speedtest, commands::tools_commands_r2::tool_subnet_calc,
|
commands::tools_commands_r2::tool_dns_lookup, commands::tools_commands_r2::tool_whois, commands::tools_commands_r2::tool_bandwidth_iperf, commands::tools_commands_r2::tool_bandwidth_speedtest, commands::tools_commands_r2::tool_subnet_calc,
|
||||||
commands::updater::check_for_updates,
|
commands::updater::check_for_updates,
|
||||||
commands::workspace_commands::save_workspace, commands::workspace_commands::load_workspace,
|
commands::workspace_commands::save_workspace, commands::workspace_commands::load_workspace,
|
||||||
commands::docker_commands::docker_list_containers, commands::docker_commands::docker_list_images, commands::docker_commands::docker_list_volumes, commands::docker_commands::docker_action,
|
commands::docker_commands::docker_list_containers, commands::docker_commands::docker_list_images, commands::docker_commands::docker_list_volumes, commands::docker_commands::docker_action,
|
||||||
|
commands::window_commands::open_child_window,
|
||||||
])
|
])
|
||||||
.run(tauri::generate_context!())
|
.run(tauri::generate_context!())
|
||||||
.expect("error while running tauri application");
|
.expect("error while running tauri application");
|
||||||
|
|||||||
85
src-tauri/src/mcp/bridge_manager.rs
Normal file
85
src-tauri/src/mcp/bridge_manager.rs
Normal file
@ -0,0 +1,85 @@
|
|||||||
|
//! MCP bridge binary self-management.
|
||||||
|
//!
|
||||||
|
//! On startup, checks if wraith-mcp-bridge exists in the data directory.
|
||||||
|
//! If missing or outdated, downloads the correct version from Gitea packages.
|
||||||
|
|
||||||
|
use std::path::PathBuf;
|
||||||
|
|
||||||
|
/// Get the expected path for the bridge binary.
|
||||||
|
pub fn bridge_path() -> PathBuf {
|
||||||
|
let dir = crate::data_directory();
|
||||||
|
if cfg!(windows) {
|
||||||
|
dir.join("wraith-mcp-bridge.exe")
|
||||||
|
} else {
|
||||||
|
dir.join("wraith-mcp-bridge")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Check if the bridge binary exists and is the correct version.
|
||||||
|
/// If not, download it from Gitea packages.
|
||||||
|
pub async fn ensure_bridge(app_version: &str) -> Result<(), String> {
|
||||||
|
let path = bridge_path();
|
||||||
|
let version_file = crate::data_directory().join("mcp-bridge-version");
|
||||||
|
|
||||||
|
// Check if bridge exists and version matches
|
||||||
|
if path.exists() {
|
||||||
|
if let Ok(installed_ver) = std::fs::read_to_string(&version_file) {
|
||||||
|
if installed_ver.trim() == app_version {
|
||||||
|
wraith_log!("[MCP Bridge] v{} already installed at {}", app_version, path.display());
|
||||||
|
return Ok(());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
wraith_log!("[MCP Bridge] Downloading v{} to {}", app_version, path.display());
|
||||||
|
|
||||||
|
let binary_name = if cfg!(windows) {
|
||||||
|
"wraith-mcp-bridge.exe"
|
||||||
|
} else {
|
||||||
|
"wraith-mcp-bridge"
|
||||||
|
};
|
||||||
|
|
||||||
|
let url = format!(
|
||||||
|
"https://files.command.vigilcyber.com/wraith/{}/{}",
|
||||||
|
app_version, binary_name
|
||||||
|
);
|
||||||
|
|
||||||
|
let client = reqwest::Client::builder()
|
||||||
|
.timeout(std::time::Duration::from_secs(30))
|
||||||
|
.build()
|
||||||
|
.map_err(|e| format!("HTTP client error: {}", e))?;
|
||||||
|
|
||||||
|
let resp = client.get(&url).send().await
|
||||||
|
.map_err(|e| format!("Failed to download MCP bridge: {}", e))?;
|
||||||
|
|
||||||
|
if !resp.status().is_success() {
|
||||||
|
return Err(format!("MCP bridge download failed: HTTP {}", resp.status()));
|
||||||
|
}
|
||||||
|
|
||||||
|
let bytes = resp.bytes().await
|
||||||
|
.map_err(|e| format!("Failed to read MCP bridge response: {}", e))?;
|
||||||
|
|
||||||
|
// Write the binary
|
||||||
|
std::fs::write(&path, &bytes)
|
||||||
|
.map_err(|e| format!("Failed to write MCP bridge to {}: {}", path.display(), e))?;
|
||||||
|
|
||||||
|
// Make executable on Unix
|
||||||
|
#[cfg(unix)]
|
||||||
|
{
|
||||||
|
use std::os::unix::fs::PermissionsExt;
|
||||||
|
let mut perms = std::fs::metadata(&path)
|
||||||
|
.map_err(|e| format!("Failed to read permissions: {}", e))?
|
||||||
|
.permissions();
|
||||||
|
perms.set_mode(0o755);
|
||||||
|
std::fs::set_permissions(&path, perms)
|
||||||
|
.map_err(|e| format!("Failed to set execute permission: {}", e))?;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Write version marker
|
||||||
|
std::fs::write(&version_file, app_version)
|
||||||
|
.map_err(|e| format!("Failed to write version file: {}", e))?;
|
||||||
|
|
||||||
|
wraith_log!("[MCP Bridge] v{} installed successfully ({} bytes)", app_version, bytes.len());
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
@ -62,9 +62,9 @@ impl ErrorWatcher {
|
|||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
let raw = buf.read_raw();
|
// Only scan bytes written since the last check — avoids
|
||||||
let new_start = raw.len().saturating_sub(total - last_pos);
|
// reading the entire 64 KB ring buffer on every 2-second tick.
|
||||||
let new_content = &raw[new_start..];
|
let new_content = buf.read_since(last_pos);
|
||||||
|
|
||||||
for line in new_content.lines() {
|
for line in new_content.lines() {
|
||||||
for pattern in ERROR_PATTERNS {
|
for pattern in ERROR_PATTERNS {
|
||||||
|
|||||||
@ -7,6 +7,7 @@
|
|||||||
pub mod scrollback;
|
pub mod scrollback;
|
||||||
pub mod server;
|
pub mod server;
|
||||||
pub mod error_watcher;
|
pub mod error_watcher;
|
||||||
|
pub mod bridge_manager;
|
||||||
|
|
||||||
use std::sync::Arc;
|
use std::sync::Arc;
|
||||||
|
|
||||||
@ -18,12 +19,12 @@ use crate::mcp::scrollback::ScrollbackBuffer;
|
|||||||
/// Shared between SSH/PTY output loops (writers) and MCP tools (readers).
|
/// Shared between SSH/PTY output loops (writers) and MCP tools (readers).
|
||||||
#[derive(Clone)]
|
#[derive(Clone)]
|
||||||
pub struct ScrollbackRegistry {
|
pub struct ScrollbackRegistry {
|
||||||
buffers: DashMap<String, Arc<ScrollbackBuffer>>,
|
buffers: Arc<DashMap<String, Arc<ScrollbackBuffer>>>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl ScrollbackRegistry {
|
impl ScrollbackRegistry {
|
||||||
pub fn new() -> Self {
|
pub fn new() -> Self {
|
||||||
Self { buffers: DashMap::new() }
|
Self { buffers: Arc::new(DashMap::new()) }
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Create and register a new scrollback buffer for a session.
|
/// Create and register a new scrollback buffer for a session.
|
||||||
@ -35,7 +36,7 @@ impl ScrollbackRegistry {
|
|||||||
|
|
||||||
/// Get the scrollback buffer for a session.
|
/// Get the scrollback buffer for a session.
|
||||||
pub fn get(&self, session_id: &str) -> Option<Arc<ScrollbackBuffer>> {
|
pub fn get(&self, session_id: &str) -> Option<Arc<ScrollbackBuffer>> {
|
||||||
self.buffers.get(session_id).map(|entry| entry.clone())
|
self.buffers.get(session_id).map(|r| r.value().clone())
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Remove a session's scrollback buffer.
|
/// Remove a session's scrollback buffer.
|
||||||
|
|||||||
@ -40,13 +40,25 @@ impl ScrollbackBuffer {
|
|||||||
|
|
||||||
/// Append bytes to the buffer. Old data is overwritten when full.
|
/// Append bytes to the buffer. Old data is overwritten when full.
|
||||||
pub fn push(&self, bytes: &[u8]) {
|
pub fn push(&self, bytes: &[u8]) {
|
||||||
let mut buf = self.inner.lock().unwrap();
|
if bytes.is_empty() {
|
||||||
for &b in bytes {
|
return;
|
||||||
let pos = buf.write_pos;
|
|
||||||
buf.data[pos] = b;
|
|
||||||
buf.write_pos = (pos + 1) % buf.capacity;
|
|
||||||
buf.total_written += 1;
|
|
||||||
}
|
}
|
||||||
|
let mut buf = self.inner.lock().unwrap_or_else(|e| e.into_inner());
|
||||||
|
let cap = buf.capacity;
|
||||||
|
// If input exceeds capacity, only keep the last `cap` bytes
|
||||||
|
let data = if bytes.len() > cap {
|
||||||
|
&bytes[bytes.len() - cap..]
|
||||||
|
} else {
|
||||||
|
bytes
|
||||||
|
};
|
||||||
|
let write_pos = buf.write_pos;
|
||||||
|
let first_len = (cap - write_pos).min(data.len());
|
||||||
|
buf.data[write_pos..write_pos + first_len].copy_from_slice(&data[..first_len]);
|
||||||
|
if first_len < data.len() {
|
||||||
|
buf.data[..data.len() - first_len].copy_from_slice(&data[first_len..]);
|
||||||
|
}
|
||||||
|
buf.write_pos = (write_pos + data.len()) % cap;
|
||||||
|
buf.total_written += bytes.len();
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Read the last `n` lines from the buffer, with ANSI escape codes stripped.
|
/// Read the last `n` lines from the buffer, with ANSI escape codes stripped.
|
||||||
@ -60,7 +72,7 @@ impl ScrollbackBuffer {
|
|||||||
|
|
||||||
/// Read all buffered content as raw bytes (ordered oldest→newest).
|
/// Read all buffered content as raw bytes (ordered oldest→newest).
|
||||||
pub fn read_raw(&self) -> String {
|
pub fn read_raw(&self) -> String {
|
||||||
let buf = self.inner.lock().unwrap();
|
let buf = self.inner.lock().unwrap_or_else(|e| e.into_inner());
|
||||||
let bytes = if buf.total_written >= buf.capacity {
|
let bytes = if buf.total_written >= buf.capacity {
|
||||||
// Buffer has wrapped — read from write_pos to end, then start to write_pos
|
// Buffer has wrapped — read from write_pos to end, then start to write_pos
|
||||||
let mut out = Vec::with_capacity(buf.capacity);
|
let mut out = Vec::with_capacity(buf.capacity);
|
||||||
@ -76,7 +88,47 @@ impl ScrollbackBuffer {
|
|||||||
|
|
||||||
/// Total bytes written since creation.
|
/// Total bytes written since creation.
|
||||||
pub fn total_written(&self) -> usize {
|
pub fn total_written(&self) -> usize {
|
||||||
self.inner.lock().unwrap().total_written
|
self.inner.lock().unwrap_or_else(|e| e.into_inner()).total_written
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Read only the bytes written after `position` (total_written offset),
|
||||||
|
/// ordered oldest→newest, with ANSI codes stripped.
|
||||||
|
///
|
||||||
|
/// Returns an empty string when there is nothing new since `position`.
|
||||||
|
/// This is more efficient than `read_raw()` for incremental scanning because
|
||||||
|
/// it avoids copying the full 64 KB ring buffer when only a small delta exists.
|
||||||
|
pub fn read_since(&self, position: usize) -> String {
|
||||||
|
let buf = self.inner.lock().unwrap_or_else(|e| e.into_inner());
|
||||||
|
let total = buf.total_written;
|
||||||
|
if total <= position {
|
||||||
|
return String::new();
|
||||||
|
}
|
||||||
|
let new_bytes = total - position;
|
||||||
|
let cap = buf.capacity;
|
||||||
|
|
||||||
|
// How many bytes are actually stored in the ring (max = capacity)
|
||||||
|
let stored = total.min(cap);
|
||||||
|
// Clamp new_bytes to what's actually in the buffer
|
||||||
|
let readable = new_bytes.min(stored);
|
||||||
|
|
||||||
|
// Write position is where the *next* byte would go; reading backwards
|
||||||
|
// from write_pos gives us the most recent `readable` bytes.
|
||||||
|
let write_pos = buf.write_pos;
|
||||||
|
let bytes = if readable <= write_pos {
|
||||||
|
// Contiguous slice ending at write_pos
|
||||||
|
buf.data[write_pos - readable..write_pos].to_vec()
|
||||||
|
} else {
|
||||||
|
// Wraps around: tail of buffer + head up to write_pos
|
||||||
|
let tail_len = readable - write_pos;
|
||||||
|
let tail_start = cap - tail_len;
|
||||||
|
let mut out = Vec::with_capacity(readable);
|
||||||
|
out.extend_from_slice(&buf.data[tail_start..]);
|
||||||
|
out.extend_from_slice(&buf.data[..write_pos]);
|
||||||
|
out
|
||||||
|
};
|
||||||
|
|
||||||
|
let raw = String::from_utf8_lossy(&bytes).to_string();
|
||||||
|
strip_ansi(&raw)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -192,4 +244,42 @@ mod tests {
|
|||||||
buf.push(b"ABCD"); // 4 more, wraps
|
buf.push(b"ABCD"); // 4 more, wraps
|
||||||
assert_eq!(buf.total_written(), 12);
|
assert_eq!(buf.total_written(), 12);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn push_empty_is_noop() {
|
||||||
|
let buf = ScrollbackBuffer::with_capacity(8);
|
||||||
|
buf.push(b"hello");
|
||||||
|
buf.push(b"");
|
||||||
|
assert_eq!(buf.total_written(), 5);
|
||||||
|
assert!(buf.read_raw().contains("hello"));
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn push_larger_than_capacity() {
|
||||||
|
let buf = ScrollbackBuffer::with_capacity(4);
|
||||||
|
buf.push(b"ABCDEFGH"); // 8 bytes into 4-byte buffer
|
||||||
|
let raw = buf.read_raw();
|
||||||
|
assert_eq!(raw, "EFGH"); // only last 4 bytes kept
|
||||||
|
assert_eq!(buf.total_written(), 8);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn push_exact_capacity() {
|
||||||
|
let buf = ScrollbackBuffer::with_capacity(8);
|
||||||
|
buf.push(b"12345678");
|
||||||
|
let raw = buf.read_raw();
|
||||||
|
assert_eq!(raw, "12345678");
|
||||||
|
assert_eq!(buf.total_written(), 8);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn push_wrap_around_boundary() {
|
||||||
|
let buf = ScrollbackBuffer::with_capacity(8);
|
||||||
|
buf.push(b"123456"); // write_pos = 6
|
||||||
|
buf.push(b"ABCD"); // wraps: 2 at end, 2 at start
|
||||||
|
let raw = buf.read_raw();
|
||||||
|
// Buffer: [C, D, 3, 4, 5, 6, A, B], write_pos=2
|
||||||
|
// Read from pos 2: "3456AB" + wrap: no, read from write_pos to end then start
|
||||||
|
assert_eq!(raw, "3456ABCD");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -5,14 +5,23 @@
|
|||||||
|
|
||||||
use std::sync::Arc;
|
use std::sync::Arc;
|
||||||
|
|
||||||
use axum::{extract::State as AxumState, routing::post, Json, Router};
|
use axum::{
|
||||||
|
extract::State as AxumState,
|
||||||
|
http::{Request, StatusCode},
|
||||||
|
middleware::{self, Next},
|
||||||
|
response::Response,
|
||||||
|
routing::post,
|
||||||
|
Json, Router,
|
||||||
|
};
|
||||||
use serde::{Deserialize, Serialize};
|
use serde::{Deserialize, Serialize};
|
||||||
use tokio::net::TcpListener;
|
use tokio::net::TcpListener;
|
||||||
|
|
||||||
use crate::mcp::ScrollbackRegistry;
|
use crate::mcp::ScrollbackRegistry;
|
||||||
use crate::rdp::RdpService;
|
use crate::rdp::RdpService;
|
||||||
use crate::sftp::SftpService;
|
use crate::sftp::SftpService;
|
||||||
|
use crate::ssh::exec::exec_on_session;
|
||||||
use crate::ssh::session::SshService;
|
use crate::ssh::session::SshService;
|
||||||
|
use crate::utils::shell_escape;
|
||||||
|
|
||||||
/// Shared state passed to axum handlers.
|
/// Shared state passed to axum handlers.
|
||||||
pub struct McpServerState {
|
pub struct McpServerState {
|
||||||
@ -20,6 +29,29 @@ pub struct McpServerState {
|
|||||||
pub rdp: RdpService,
|
pub rdp: RdpService,
|
||||||
pub sftp: SftpService,
|
pub sftp: SftpService,
|
||||||
pub scrollback: ScrollbackRegistry,
|
pub scrollback: ScrollbackRegistry,
|
||||||
|
pub app_handle: tauri::AppHandle,
|
||||||
|
pub error_watcher: std::sync::Arc<crate::mcp::error_watcher::ErrorWatcher>,
|
||||||
|
pub bearer_token: String,
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Middleware that validates the `Authorization: Bearer <token>` header.
|
||||||
|
async fn auth_middleware(
|
||||||
|
AxumState(state): AxumState<Arc<McpServerState>>,
|
||||||
|
req: Request<axum::body::Body>,
|
||||||
|
next: Next,
|
||||||
|
) -> Result<Response, StatusCode> {
|
||||||
|
let auth_header = req
|
||||||
|
.headers()
|
||||||
|
.get("authorization")
|
||||||
|
.and_then(|v| v.to_str().ok())
|
||||||
|
.unwrap_or("");
|
||||||
|
|
||||||
|
let expected = format!("Bearer {}", state.bearer_token);
|
||||||
|
if auth_header != expected {
|
||||||
|
return Err(StatusCode::UNAUTHORIZED);
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(next.run(req).await)
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Deserialize)]
|
#[derive(Deserialize)]
|
||||||
@ -52,6 +84,13 @@ struct SftpWriteRequest {
|
|||||||
content: String,
|
content: String,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[derive(Deserialize)]
|
||||||
|
struct TerminalTypeRequest {
|
||||||
|
session_id: String,
|
||||||
|
text: String,
|
||||||
|
press_enter: Option<bool>,
|
||||||
|
}
|
||||||
|
|
||||||
#[derive(Deserialize)]
|
#[derive(Deserialize)]
|
||||||
struct TerminalExecuteRequest {
|
struct TerminalExecuteRequest {
|
||||||
session_id: String,
|
session_id: String,
|
||||||
@ -148,12 +187,28 @@ async fn handle_screenshot(
|
|||||||
AxumState(state): AxumState<Arc<McpServerState>>,
|
AxumState(state): AxumState<Arc<McpServerState>>,
|
||||||
Json(req): Json<ScreenshotRequest>,
|
Json(req): Json<ScreenshotRequest>,
|
||||||
) -> Json<McpResponse<String>> {
|
) -> Json<McpResponse<String>> {
|
||||||
match state.rdp.screenshot_png_base64(&req.session_id).await {
|
match state.rdp.screenshot_png_base64(&req.session_id) {
|
||||||
Ok(b64) => ok_response(b64),
|
Ok(b64) => ok_response(b64),
|
||||||
Err(e) => err_response(e),
|
Err(e) => err_response(e),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async fn handle_terminal_type(
|
||||||
|
AxumState(state): AxumState<Arc<McpServerState>>,
|
||||||
|
Json(req): Json<TerminalTypeRequest>,
|
||||||
|
) -> Json<McpResponse<String>> {
|
||||||
|
let text = if req.press_enter.unwrap_or(true) {
|
||||||
|
format!("{}\r", req.text)
|
||||||
|
} else {
|
||||||
|
req.text.clone()
|
||||||
|
};
|
||||||
|
|
||||||
|
match state.ssh.write(&req.session_id, text.as_bytes()).await {
|
||||||
|
Ok(()) => ok_response("sent".to_string()),
|
||||||
|
Err(e) => err_response(e),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
async fn handle_terminal_read(
|
async fn handle_terminal_read(
|
||||||
AxumState(state): AxumState<Arc<McpServerState>>,
|
AxumState(state): AxumState<Arc<McpServerState>>,
|
||||||
Json(req): Json<TerminalReadRequest>,
|
Json(req): Json<TerminalReadRequest>,
|
||||||
@ -178,7 +233,7 @@ async fn handle_terminal_execute(
|
|||||||
};
|
};
|
||||||
|
|
||||||
let before = buf.total_written();
|
let before = buf.total_written();
|
||||||
let full_cmd = format!("{}\necho {}\n", req.command, marker);
|
let full_cmd = format!("{}\recho {}\r", req.command, marker);
|
||||||
|
|
||||||
if let Err(e) = state.ssh.write(&req.session_id, full_cmd.as_bytes()).await {
|
if let Err(e) = state.ssh.write(&req.session_id, full_cmd.as_bytes()).await {
|
||||||
return err_response(e);
|
return err_response(e);
|
||||||
@ -254,30 +309,32 @@ struct ToolPassgenRequest { length: Option<usize>, uppercase: Option<bool>, lowe
|
|||||||
|
|
||||||
async fn handle_tool_ping(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolSessionTarget>) -> Json<McpResponse<String>> {
|
async fn handle_tool_ping(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolSessionTarget>) -> Json<McpResponse<String>> {
|
||||||
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
match tool_exec(&session.handle, &format!("ping -c 4 {} 2>&1", req.target)).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
match exec_on_session(&session.handle, &format!("ping -c 4 {} 2>&1", shell_escape(&req.target))).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn handle_tool_traceroute(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolSessionTarget>) -> Json<McpResponse<String>> {
|
async fn handle_tool_traceroute(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolSessionTarget>) -> Json<McpResponse<String>> {
|
||||||
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
match tool_exec(&session.handle, &format!("traceroute {} 2>&1 || tracert {} 2>&1", req.target, req.target)).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
let t = shell_escape(&req.target);
|
||||||
|
match exec_on_session(&session.handle, &format!("traceroute {} 2>&1 || tracert {} 2>&1", t, t)).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn handle_tool_dns(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolDnsRequest>) -> Json<McpResponse<String>> {
|
async fn handle_tool_dns(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolDnsRequest>) -> Json<McpResponse<String>> {
|
||||||
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
let rt = req.record_type.unwrap_or_else(|| "A".to_string());
|
let rt = shell_escape(&req.record_type.unwrap_or_else(|| "A".to_string()));
|
||||||
match tool_exec(&session.handle, &format!("dig {} {} +short 2>/dev/null || nslookup -type={} {} 2>/dev/null || host -t {} {} 2>/dev/null", req.domain, rt, rt, req.domain, rt, req.domain)).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
let d = shell_escape(&req.domain);
|
||||||
|
match exec_on_session(&session.handle, &format!("dig {} {} +short 2>/dev/null || nslookup -type={} {} 2>/dev/null || host -t {} {} 2>/dev/null", d, rt, rt, d, rt, d)).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn handle_tool_whois(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolSessionTarget>) -> Json<McpResponse<String>> {
|
async fn handle_tool_whois(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolSessionTarget>) -> Json<McpResponse<String>> {
|
||||||
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
match tool_exec(&session.handle, &format!("whois {} 2>&1 | head -80", req.target)).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
match exec_on_session(&session.handle, &format!("whois {} 2>&1 | head -80", shell_escape(&req.target))).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn handle_tool_wol(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolWolRequest>) -> Json<McpResponse<String>> {
|
async fn handle_tool_wol(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolWolRequest>) -> Json<McpResponse<String>> {
|
||||||
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
let mac_clean = req.mac_address.replace([':', '-'], "");
|
let mac_clean = req.mac_address.replace([':', '-'], "");
|
||||||
let cmd = format!(r#"python3 -c "import socket;mac=bytes.fromhex('{}');pkt=b'\xff'*6+mac*16;s=socket.socket(socket.AF_INET,socket.SOCK_DGRAM);s.setsockopt(socket.SOL_SOCKET,socket.SO_BROADCAST,1);s.sendto(pkt,('255.255.255.255',9));s.close();print('WoL sent to {}')" 2>&1"#, mac_clean, req.mac_address);
|
let cmd = format!(r#"python3 -c "import socket;mac=bytes.fromhex({});pkt=b'\xff'*6+mac*16;s=socket.socket(socket.AF_INET,socket.SOCK_DGRAM);s.setsockopt(socket.SOL_SOCKET,socket.SO_BROADCAST,1);s.sendto(pkt,('255.255.255.255',9));s.close();print('WoL sent to {}')" 2>&1"#, shell_escape(&mac_clean), shell_escape(&req.mac_address));
|
||||||
match tool_exec(&session.handle, &cmd).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
match exec_on_session(&session.handle, &cmd).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn handle_tool_scan_network(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolScanNetworkRequest>) -> Json<McpResponse<serde_json::Value>> {
|
async fn handle_tool_scan_network(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolScanNetworkRequest>) -> Json<McpResponse<serde_json::Value>> {
|
||||||
@ -308,7 +365,7 @@ async fn handle_tool_subnet(_state: AxumState<Arc<McpServerState>>, Json(req): J
|
|||||||
async fn handle_tool_bandwidth(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolSessionOnly>) -> Json<McpResponse<String>> {
|
async fn handle_tool_bandwidth(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolSessionOnly>) -> Json<McpResponse<String>> {
|
||||||
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
let cmd = r#"if command -v speedtest-cli >/dev/null 2>&1; then speedtest-cli --simple 2>&1; elif command -v curl >/dev/null 2>&1; then curl -o /dev/null -w "Download: %{speed_download} bytes/sec\n" https://speed.cloudflare.com/__down?bytes=25000000 2>/dev/null; else echo "No speedtest tool found"; fi"#;
|
let cmd = r#"if command -v speedtest-cli >/dev/null 2>&1; then speedtest-cli --simple 2>&1; elif command -v curl >/dev/null 2>&1; then curl -o /dev/null -w "Download: %{speed_download} bytes/sec\n" https://speed.cloudflare.com/__down?bytes=25000000 2>/dev/null; else echo "No speedtest tool found"; fi"#;
|
||||||
match tool_exec(&session.handle, cmd).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
match exec_on_session(&session.handle, cmd).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn handle_tool_keygen(_state: AxumState<Arc<McpServerState>>, Json(req): Json<ToolKeygenRequest>) -> Json<McpResponse<serde_json::Value>> {
|
async fn handle_tool_keygen(_state: AxumState<Arc<McpServerState>>, Json(req): Json<ToolKeygenRequest>) -> Json<McpResponse<serde_json::Value>> {
|
||||||
@ -325,18 +382,166 @@ async fn handle_tool_passgen(_state: AxumState<Arc<McpServerState>>, Json(req):
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn tool_exec(handle: &std::sync::Arc<tokio::sync::Mutex<russh::client::Handle<crate::ssh::session::SshClient>>>, cmd: &str) -> Result<String, String> {
|
// ── Docker handlers ──────────────────────────────────────────────────────────
|
||||||
let mut channel = { let h = handle.lock().await; h.channel_open_session().await.map_err(|e| format!("Exec failed: {}", e))? };
|
|
||||||
channel.exec(true, cmd).await.map_err(|e| format!("Exec failed: {}", e))?;
|
#[derive(Deserialize)]
|
||||||
let mut output = String::new();
|
struct DockerActionRequest { session_id: String, action: String, target: String }
|
||||||
loop {
|
|
||||||
match channel.wait().await {
|
#[derive(Deserialize)]
|
||||||
Some(russh::ChannelMsg::Data { ref data }) => { if let Ok(t) = std::str::from_utf8(data.as_ref()) { output.push_str(t); } }
|
struct DockerListRequest { session_id: String }
|
||||||
Some(russh::ChannelMsg::Eof) | Some(russh::ChannelMsg::Close) | None => break,
|
|
||||||
_ => {}
|
#[derive(Deserialize)]
|
||||||
}
|
struct DockerExecRequest { session_id: String, container: String, command: String }
|
||||||
|
|
||||||
|
async fn handle_docker_ps(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<DockerListRequest>) -> Json<McpResponse<String>> {
|
||||||
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
|
match exec_on_session(&session.handle, "docker ps -a --format '{{.Names}}|{{.Image}}|{{.Status}}|{{.Ports}}' 2>&1").await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn handle_docker_action(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<DockerActionRequest>) -> Json<McpResponse<String>> {
|
||||||
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
|
let t = shell_escape(&req.target);
|
||||||
|
let cmd = match req.action.as_str() {
|
||||||
|
"start" => format!("docker start {} 2>&1", t),
|
||||||
|
"stop" => format!("docker stop {} 2>&1", t),
|
||||||
|
"restart" => format!("docker restart {} 2>&1", t),
|
||||||
|
"remove" => format!("docker rm -f {} 2>&1", t),
|
||||||
|
"logs" => format!("docker logs --tail 100 {} 2>&1", t),
|
||||||
|
"builder-prune" => "docker builder prune -f 2>&1".to_string(),
|
||||||
|
"system-prune" => "docker system prune -f 2>&1".to_string(),
|
||||||
|
_ => return err_response(format!("Unknown action: {}", req.action)),
|
||||||
|
};
|
||||||
|
match exec_on_session(&session.handle, &cmd).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn handle_docker_exec(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<DockerExecRequest>) -> Json<McpResponse<String>> {
|
||||||
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
|
let cmd = format!("docker exec {} {} 2>&1", shell_escape(&req.container), shell_escape(&req.command));
|
||||||
|
match exec_on_session(&session.handle, &cmd).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
|
}
|
||||||
|
|
||||||
|
// ── Service/process handlers ─────────────────────────────────────────────────
|
||||||
|
|
||||||
|
async fn handle_service_status(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolSessionTarget>) -> Json<McpResponse<String>> {
|
||||||
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
|
let t = shell_escape(&req.target);
|
||||||
|
match exec_on_session(&session.handle, &format!("systemctl status {} --no-pager 2>&1 || service {} status 2>&1", t, t)).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn handle_process_list(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<ToolSessionTarget>) -> Json<McpResponse<String>> {
|
||||||
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
|
let filter = if req.target.is_empty() { "aux --sort=-%cpu | head -30".to_string() } else { format!("aux | grep -i {} | grep -v grep", shell_escape(&req.target)) };
|
||||||
|
match exec_on_session(&session.handle, &format!("ps {}", filter)).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
|
}
|
||||||
|
|
||||||
|
// ── Git handlers ─────────────────────────────────────────────────────────────
|
||||||
|
|
||||||
|
#[derive(Deserialize)]
|
||||||
|
struct GitRequest { session_id: String, path: String }
|
||||||
|
|
||||||
|
async fn handle_git_status(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<GitRequest>) -> Json<McpResponse<String>> {
|
||||||
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
|
match exec_on_session(&session.handle, &format!("cd {} && git status --short --branch 2>&1", shell_escape(&req.path))).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn handle_git_pull(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<GitRequest>) -> Json<McpResponse<String>> {
|
||||||
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
|
match exec_on_session(&session.handle, &format!("cd {} && git pull 2>&1", shell_escape(&req.path))).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn handle_git_log(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<GitRequest>) -> Json<McpResponse<String>> {
|
||||||
|
let session = match state.ssh.get_session(&req.session_id) { Some(s) => s, None => return err_response(format!("Session {} not found", req.session_id)) };
|
||||||
|
match exec_on_session(&session.handle, &format!("cd {} && git log --oneline -20 2>&1", shell_escape(&req.path))).await { Ok(o) => ok_response(o), Err(e) => err_response(e) }
|
||||||
|
}
|
||||||
|
|
||||||
|
// ── Session creation handlers ────────────────────────────────────────────────
|
||||||
|
|
||||||
|
#[derive(Deserialize)]
|
||||||
|
struct SshConnectRequest {
|
||||||
|
hostname: String,
|
||||||
|
port: Option<u16>,
|
||||||
|
username: String,
|
||||||
|
password: Option<String>,
|
||||||
|
private_key_path: Option<String>,
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn handle_ssh_connect(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<SshConnectRequest>) -> Json<McpResponse<String>> {
|
||||||
|
use crate::ssh::session::AuthMethod;
|
||||||
|
|
||||||
|
let port = req.port.unwrap_or(22);
|
||||||
|
let auth = if let Some(key_path) = req.private_key_path {
|
||||||
|
// Read key file
|
||||||
|
let pem = match std::fs::read_to_string(&key_path) {
|
||||||
|
Ok(p) => p,
|
||||||
|
Err(e) => return err_response(format!("Failed to read key file {}: {}", key_path, e)),
|
||||||
|
};
|
||||||
|
AuthMethod::Key { private_key_pem: pem, passphrase: req.password }
|
||||||
|
} else {
|
||||||
|
AuthMethod::Password(req.password.unwrap_or_default())
|
||||||
|
};
|
||||||
|
|
||||||
|
match state.ssh.connect(
|
||||||
|
state.app_handle.clone(),
|
||||||
|
&req.hostname,
|
||||||
|
port,
|
||||||
|
&req.username,
|
||||||
|
auth,
|
||||||
|
120, 40,
|
||||||
|
&state.sftp,
|
||||||
|
&state.scrollback,
|
||||||
|
&state.error_watcher,
|
||||||
|
).await {
|
||||||
|
Ok(session_id) => ok_response(session_id),
|
||||||
|
Err(e) => err_response(e),
|
||||||
}
|
}
|
||||||
Ok(output)
|
}
|
||||||
|
|
||||||
|
// ── RDP interaction handlers ─────────────────────────────────────────────────
|
||||||
|
|
||||||
|
#[derive(Deserialize)]
|
||||||
|
struct RdpClickRequest { session_id: String, x: u16, y: u16, button: Option<String> }
|
||||||
|
|
||||||
|
#[derive(Deserialize)]
|
||||||
|
struct RdpTypeRequest { session_id: String, text: String }
|
||||||
|
|
||||||
|
#[derive(Deserialize)]
|
||||||
|
struct RdpClipboardRequest { session_id: String, text: String }
|
||||||
|
|
||||||
|
async fn handle_rdp_click(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<RdpClickRequest>) -> Json<McpResponse<String>> {
|
||||||
|
use crate::rdp::input::mouse_flags;
|
||||||
|
let button_flag = match req.button.as_deref().unwrap_or("left") {
|
||||||
|
"right" => mouse_flags::BUTTON2,
|
||||||
|
"middle" => mouse_flags::BUTTON3,
|
||||||
|
_ => mouse_flags::BUTTON1,
|
||||||
|
};
|
||||||
|
// Move to position
|
||||||
|
if let Err(e) = state.rdp.send_mouse(&req.session_id, req.x, req.y, mouse_flags::MOVE) { return err_response(e); }
|
||||||
|
// Click down
|
||||||
|
if let Err(e) = state.rdp.send_mouse(&req.session_id, req.x, req.y, button_flag | mouse_flags::DOWN) { return err_response(e); }
|
||||||
|
// Click up
|
||||||
|
if let Err(e) = state.rdp.send_mouse(&req.session_id, req.x, req.y, button_flag) { return err_response(e); }
|
||||||
|
ok_response(format!("clicked ({}, {})", req.x, req.y))
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn handle_rdp_type(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<RdpTypeRequest>) -> Json<McpResponse<String>> {
|
||||||
|
// Set clipboard then simulate Ctrl+V to paste (most reliable for arbitrary text)
|
||||||
|
if let Err(e) = state.rdp.send_clipboard(&req.session_id, &req.text) { return err_response(e); }
|
||||||
|
// Small delay for clipboard to propagate, then Ctrl+V
|
||||||
|
tokio::time::sleep(std::time::Duration::from_millis(50)).await;
|
||||||
|
// Ctrl down
|
||||||
|
let _ = state.rdp.send_key(&req.session_id, 0x001D, true);
|
||||||
|
// V down
|
||||||
|
let _ = state.rdp.send_key(&req.session_id, 0x002F, true);
|
||||||
|
// V up
|
||||||
|
let _ = state.rdp.send_key(&req.session_id, 0x002F, false);
|
||||||
|
// Ctrl up
|
||||||
|
let _ = state.rdp.send_key(&req.session_id, 0x001D, false);
|
||||||
|
ok_response(format!("typed {} chars via clipboard paste", req.text.len()))
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn handle_rdp_clipboard(AxumState(state): AxumState<Arc<McpServerState>>, Json(req): Json<RdpClipboardRequest>) -> Json<McpResponse<String>> {
|
||||||
|
if let Err(e) = state.rdp.send_clipboard(&req.session_id, &req.text) { return err_response(e); }
|
||||||
|
ok_response("clipboard set".to_string())
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Start the MCP HTTP server and write the port to disk.
|
/// Start the MCP HTTP server and write the port to disk.
|
||||||
@ -345,11 +550,22 @@ pub async fn start_mcp_server(
|
|||||||
rdp: RdpService,
|
rdp: RdpService,
|
||||||
sftp: SftpService,
|
sftp: SftpService,
|
||||||
scrollback: ScrollbackRegistry,
|
scrollback: ScrollbackRegistry,
|
||||||
|
app_handle: tauri::AppHandle,
|
||||||
|
error_watcher: std::sync::Arc<crate::mcp::error_watcher::ErrorWatcher>,
|
||||||
) -> Result<u16, String> {
|
) -> Result<u16, String> {
|
||||||
let state = Arc::new(McpServerState { ssh, rdp, sftp, scrollback });
|
// Generate a cryptographically random bearer token for authentication
|
||||||
|
use rand::Rng;
|
||||||
|
let bearer_token: String = rand::rng()
|
||||||
|
.sample_iter(&rand::distr::Alphanumeric)
|
||||||
|
.take(64)
|
||||||
|
.map(char::from)
|
||||||
|
.collect();
|
||||||
|
|
||||||
|
let state = Arc::new(McpServerState { ssh, rdp, sftp, scrollback, app_handle, error_watcher, bearer_token: bearer_token.clone() });
|
||||||
|
|
||||||
let app = Router::new()
|
let app = Router::new()
|
||||||
.route("/mcp/sessions", post(handle_list_sessions))
|
.route("/mcp/sessions", post(handle_list_sessions))
|
||||||
|
.route("/mcp/terminal/type", post(handle_terminal_type))
|
||||||
.route("/mcp/terminal/read", post(handle_terminal_read))
|
.route("/mcp/terminal/read", post(handle_terminal_read))
|
||||||
.route("/mcp/terminal/execute", post(handle_terminal_execute))
|
.route("/mcp/terminal/execute", post(handle_terminal_execute))
|
||||||
.route("/mcp/screenshot", post(handle_screenshot))
|
.route("/mcp/screenshot", post(handle_screenshot))
|
||||||
@ -367,6 +583,19 @@ pub async fn start_mcp_server(
|
|||||||
.route("/mcp/tool/bandwidth", post(handle_tool_bandwidth))
|
.route("/mcp/tool/bandwidth", post(handle_tool_bandwidth))
|
||||||
.route("/mcp/tool/keygen", post(handle_tool_keygen))
|
.route("/mcp/tool/keygen", post(handle_tool_keygen))
|
||||||
.route("/mcp/tool/passgen", post(handle_tool_passgen))
|
.route("/mcp/tool/passgen", post(handle_tool_passgen))
|
||||||
|
.route("/mcp/docker/ps", post(handle_docker_ps))
|
||||||
|
.route("/mcp/docker/action", post(handle_docker_action))
|
||||||
|
.route("/mcp/docker/exec", post(handle_docker_exec))
|
||||||
|
.route("/mcp/service/status", post(handle_service_status))
|
||||||
|
.route("/mcp/process/list", post(handle_process_list))
|
||||||
|
.route("/mcp/git/status", post(handle_git_status))
|
||||||
|
.route("/mcp/git/pull", post(handle_git_pull))
|
||||||
|
.route("/mcp/git/log", post(handle_git_log))
|
||||||
|
.route("/mcp/rdp/click", post(handle_rdp_click))
|
||||||
|
.route("/mcp/rdp/type", post(handle_rdp_type))
|
||||||
|
.route("/mcp/rdp/clipboard", post(handle_rdp_clipboard))
|
||||||
|
.route("/mcp/ssh/connect", post(handle_ssh_connect))
|
||||||
|
.layer(middleware::from_fn_with_state(state.clone(), auth_middleware))
|
||||||
.with_state(state);
|
.with_state(state);
|
||||||
|
|
||||||
let listener = TcpListener::bind("127.0.0.1:0").await
|
let listener = TcpListener::bind("127.0.0.1:0").await
|
||||||
@ -377,10 +606,23 @@ pub async fn start_mcp_server(
|
|||||||
.port();
|
.port();
|
||||||
|
|
||||||
// Write port to well-known location
|
// Write port to well-known location
|
||||||
let port_file = crate::data_directory().join("mcp-port");
|
let data_dir = crate::data_directory();
|
||||||
|
let port_file = data_dir.join("mcp-port");
|
||||||
std::fs::write(&port_file, port.to_string())
|
std::fs::write(&port_file, port.to_string())
|
||||||
.map_err(|e| format!("Failed to write MCP port file: {}", e))?;
|
.map_err(|e| format!("Failed to write MCP port file: {}", e))?;
|
||||||
|
|
||||||
|
// Write bearer token to a separate file with restrictive permissions
|
||||||
|
let token_file = data_dir.join("mcp-token");
|
||||||
|
std::fs::write(&token_file, &bearer_token)
|
||||||
|
.map_err(|e| format!("Failed to write MCP token file: {}", e))?;
|
||||||
|
|
||||||
|
// Set owner-only read/write permissions (Unix)
|
||||||
|
#[cfg(unix)]
|
||||||
|
{
|
||||||
|
use std::os::unix::fs::PermissionsExt;
|
||||||
|
let _ = std::fs::set_permissions(&token_file, std::fs::Permissions::from_mode(0o600));
|
||||||
|
}
|
||||||
|
|
||||||
tokio::spawn(async move {
|
tokio::spawn(async move {
|
||||||
axum::serve(listener, app).await.ok();
|
axum::serve(listener, app).await.ok();
|
||||||
});
|
});
|
||||||
|
|||||||
@ -8,11 +8,12 @@ use std::sync::atomic::{AtomicBool, Ordering};
|
|||||||
use base64::Engine;
|
use base64::Engine;
|
||||||
use dashmap::DashMap;
|
use dashmap::DashMap;
|
||||||
use log::{error, info, warn};
|
use log::{error, info, warn};
|
||||||
|
use tauri::Emitter;
|
||||||
use serde::{Deserialize, Serialize};
|
use serde::{Deserialize, Serialize};
|
||||||
use tokio::io::{AsyncRead, AsyncWrite};
|
use tokio::io::{AsyncRead, AsyncWrite};
|
||||||
use tokio::net::TcpStream;
|
use tokio::net::TcpStream;
|
||||||
use tokio::sync::mpsc;
|
use tokio::sync::mpsc;
|
||||||
use tokio::sync::Mutex as TokioMutex;
|
|
||||||
|
|
||||||
use ironrdp::connector::{self, ClientConnector, ConnectionResult, Credentials, DesktopSize};
|
use ironrdp::connector::{self, ClientConnector, ConnectionResult, Credentials, DesktopSize};
|
||||||
use ironrdp::graphics::image_processing::PixelFormat;
|
use ironrdp::graphics::image_processing::PixelFormat;
|
||||||
@ -62,31 +63,45 @@ enum InputEvent {
|
|||||||
pressed: bool,
|
pressed: bool,
|
||||||
},
|
},
|
||||||
Clipboard(String),
|
Clipboard(String),
|
||||||
|
Resize { width: u16, height: u16 },
|
||||||
Disconnect,
|
Disconnect,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Dirty rectangle from the last GraphicsUpdate — used for partial frame transfer.
|
||||||
|
#[derive(Debug, Clone, Serialize)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct DirtyRect {
|
||||||
|
pub x: u16,
|
||||||
|
pub y: u16,
|
||||||
|
pub width: u16,
|
||||||
|
pub height: u16,
|
||||||
|
}
|
||||||
|
|
||||||
struct RdpSessionHandle {
|
struct RdpSessionHandle {
|
||||||
id: String,
|
id: String,
|
||||||
hostname: String,
|
hostname: String,
|
||||||
width: u16,
|
width: u16,
|
||||||
height: u16,
|
height: u16,
|
||||||
frame_buffer: Arc<TokioMutex<Vec<u8>>>,
|
/// Frame buffer: RDP thread writes via RwLock write, IPC reads via RwLock read.
|
||||||
|
front_buffer: Arc<std::sync::RwLock<Vec<u8>>>,
|
||||||
|
/// Accumulated dirty region since last get_frame — union of all GraphicsUpdate rects.
|
||||||
|
dirty_region: Arc<std::sync::Mutex<Option<DirtyRect>>>,
|
||||||
frame_dirty: Arc<AtomicBool>,
|
frame_dirty: Arc<AtomicBool>,
|
||||||
input_tx: mpsc::UnboundedSender<InputEvent>,
|
input_tx: mpsc::UnboundedSender<InputEvent>,
|
||||||
}
|
}
|
||||||
|
|
||||||
pub struct RdpService {
|
pub struct RdpService {
|
||||||
sessions: DashMap<String, Arc<RdpSessionHandle>>,
|
sessions: Arc<DashMap<String, Arc<RdpSessionHandle>>>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl RdpService {
|
impl RdpService {
|
||||||
pub fn new() -> Self {
|
pub fn new() -> Self {
|
||||||
Self {
|
Self {
|
||||||
sessions: DashMap::new(),
|
sessions: Arc::new(DashMap::new()),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn connect(&self, config: RdpConfig) -> Result<String, String> {
|
pub fn connect(&self, config: RdpConfig, app_handle: tauri::AppHandle) -> Result<String, String> {
|
||||||
let session_id = uuid::Uuid::new_v4().to_string();
|
let session_id = uuid::Uuid::new_v4().to_string();
|
||||||
wraith_log!("[RDP] Connecting to {}:{} as {} (session {})", config.hostname, config.port, config.username, session_id);
|
wraith_log!("[RDP] Connecting to {}:{} as {} (session {})", config.hostname, config.port, config.username, session_id);
|
||||||
let width = config.width;
|
let width = config.width;
|
||||||
@ -98,7 +113,8 @@ impl RdpService {
|
|||||||
for pixel in initial_buf.chunks_exact_mut(4) {
|
for pixel in initial_buf.chunks_exact_mut(4) {
|
||||||
pixel[3] = 255;
|
pixel[3] = 255;
|
||||||
}
|
}
|
||||||
let frame_buffer = Arc::new(TokioMutex::new(initial_buf));
|
let front_buffer = Arc::new(std::sync::RwLock::new(initial_buf));
|
||||||
|
let dirty_region = Arc::new(std::sync::Mutex::new(None));
|
||||||
let frame_dirty = Arc::new(AtomicBool::new(false));
|
let frame_dirty = Arc::new(AtomicBool::new(false));
|
||||||
|
|
||||||
let (input_tx, input_rx) = mpsc::unbounded_channel();
|
let (input_tx, input_rx) = mpsc::unbounded_channel();
|
||||||
@ -108,7 +124,8 @@ impl RdpService {
|
|||||||
hostname: hostname.clone(),
|
hostname: hostname.clone(),
|
||||||
width,
|
width,
|
||||||
height,
|
height,
|
||||||
frame_buffer: frame_buffer.clone(),
|
front_buffer: front_buffer.clone(),
|
||||||
|
dirty_region: dirty_region.clone(),
|
||||||
frame_dirty: frame_dirty.clone(),
|
frame_dirty: frame_dirty.clone(),
|
||||||
input_tx,
|
input_tx,
|
||||||
});
|
});
|
||||||
@ -155,11 +172,14 @@ impl RdpService {
|
|||||||
if let Err(e) = run_active_session(
|
if let Err(e) = run_active_session(
|
||||||
connection_result,
|
connection_result,
|
||||||
framed,
|
framed,
|
||||||
frame_buffer,
|
front_buffer,
|
||||||
|
dirty_region,
|
||||||
frame_dirty,
|
frame_dirty,
|
||||||
input_rx,
|
input_rx,
|
||||||
width as u16,
|
width as u16,
|
||||||
height as u16,
|
height as u16,
|
||||||
|
app_handle,
|
||||||
|
sid.clone(),
|
||||||
)
|
)
|
||||||
.await
|
.await
|
||||||
{
|
{
|
||||||
@ -197,35 +217,65 @@ impl RdpService {
|
|||||||
Ok(session_id)
|
Ok(session_id)
|
||||||
}
|
}
|
||||||
|
|
||||||
pub async fn get_frame(&self, session_id: &str) -> Result<String, String> {
|
/// Get the dirty region since the last call. Returns (region_metadata, pixel_bytes).
|
||||||
|
/// The pixel bytes contain only the dirty rectangle in row-major RGBA order.
|
||||||
|
/// If nothing changed, returns empty bytes. If the dirty region covers >50% of the
|
||||||
|
/// frame, falls back to full frame for efficiency (avoids row-by-row extraction).
|
||||||
|
pub fn get_frame(&self, session_id: &str) -> Result<(Option<DirtyRect>, Vec<u8>), String> {
|
||||||
let handle = self.sessions.get(session_id).ok_or_else(|| format!("RDP session {} not found", session_id))?;
|
let handle = self.sessions.get(session_id).ok_or_else(|| format!("RDP session {} not found", session_id))?;
|
||||||
if !handle.frame_dirty.swap(false, Ordering::Relaxed) {
|
if !handle.frame_dirty.swap(false, Ordering::Acquire) {
|
||||||
return Ok(String::new());
|
return Ok((None, Vec::new()));
|
||||||
|
}
|
||||||
|
|
||||||
|
let region = handle.dirty_region.lock().unwrap_or_else(|e| e.into_inner()).take();
|
||||||
|
let buf = handle.front_buffer.read().unwrap_or_else(|e| e.into_inner());
|
||||||
|
let stride = handle.width as usize * 4;
|
||||||
|
let total_pixels = handle.width as usize * handle.height as usize;
|
||||||
|
|
||||||
|
match region {
|
||||||
|
Some(rect) if (rect.width as usize * rect.height as usize) < total_pixels / 2 => {
|
||||||
|
// Partial: extract only the dirty rectangle
|
||||||
|
let rw = rect.width as usize;
|
||||||
|
let rh = rect.height as usize;
|
||||||
|
let rx = rect.x as usize;
|
||||||
|
let ry = rect.y as usize;
|
||||||
|
let mut out = Vec::with_capacity(rw * rh * 4);
|
||||||
|
for row in ry..ry + rh {
|
||||||
|
let start = row * stride + rx * 4;
|
||||||
|
let end = start + rw * 4;
|
||||||
|
if end <= buf.len() {
|
||||||
|
out.extend_from_slice(&buf[start..end]);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Ok((Some(rect), out))
|
||||||
|
}
|
||||||
|
_ => {
|
||||||
|
// Full frame: dirty region covers most of the screen or is missing
|
||||||
|
Ok((None, buf.clone()))
|
||||||
|
}
|
||||||
}
|
}
|
||||||
let buf = handle.frame_buffer.lock().await;
|
|
||||||
let encoded = base64::engine::general_purpose::STANDARD.encode(&*buf);
|
|
||||||
Ok(encoded)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
pub async fn get_frame_raw(&self, session_id: &str) -> Result<Vec<u8>, String> {
|
pub fn get_frame_raw(&self, session_id: &str) -> Result<Vec<u8>, String> {
|
||||||
let handle = self.sessions.get(session_id).ok_or_else(|| format!("RDP session {} not found", session_id))?;
|
let handle = self.sessions.get(session_id).ok_or_else(|| format!("RDP session {} not found", session_id))?;
|
||||||
let buf = handle.frame_buffer.lock().await;
|
let buf = handle.front_buffer.read().unwrap_or_else(|e| e.into_inner());
|
||||||
Ok(buf.clone())
|
Ok(buf.clone())
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Capture the current RDP frame as a base64-encoded PNG.
|
/// Capture the current RDP frame as a base64-encoded PNG.
|
||||||
pub async fn screenshot_png_base64(&self, session_id: &str) -> Result<String, String> {
|
pub fn screenshot_png_base64(&self, session_id: &str) -> Result<String, String> {
|
||||||
let handle = self.sessions.get(session_id).ok_or_else(|| format!("RDP session {} not found", session_id))?;
|
let handle = self.sessions.get(session_id).ok_or_else(|| format!("RDP session {} not found", session_id))?;
|
||||||
let width = handle.width as u32;
|
let width = handle.width as u32;
|
||||||
let height = handle.height as u32;
|
let height = handle.height as u32;
|
||||||
let buf = handle.frame_buffer.lock().await;
|
let buf = handle.front_buffer.read().unwrap_or_else(|e| e.into_inner());
|
||||||
|
|
||||||
// Encode RGBA raw bytes to PNG
|
// Encode RGBA raw bytes to PNG (fast compression for speed)
|
||||||
let mut png_data = Vec::new();
|
let mut png_data = Vec::new();
|
||||||
{
|
{
|
||||||
let mut encoder = png::Encoder::new(&mut png_data, width, height);
|
let mut encoder = png::Encoder::new(&mut png_data, width, height);
|
||||||
encoder.set_color(png::ColorType::Rgba);
|
encoder.set_color(png::ColorType::Rgba);
|
||||||
encoder.set_depth(png::BitDepth::Eight);
|
encoder.set_depth(png::BitDepth::Eight);
|
||||||
|
encoder.set_compression(png::Compression::Fast);
|
||||||
let mut writer = encoder.write_header()
|
let mut writer = encoder.write_header()
|
||||||
.map_err(|e| format!("PNG header error: {}", e))?;
|
.map_err(|e| format!("PNG header error: {}", e))?;
|
||||||
writer.write_image_data(&buf)
|
writer.write_image_data(&buf)
|
||||||
@ -250,6 +300,19 @@ impl RdpService {
|
|||||||
handle.input_tx.send(InputEvent::Key { scancode, pressed }).map_err(|_| format!("RDP session {} input channel closed", session_id))
|
handle.input_tx.send(InputEvent::Key { scancode, pressed }).map_err(|_| format!("RDP session {} input channel closed", session_id))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn force_refresh(&self, session_id: &str) -> Result<(), String> {
|
||||||
|
let handle = self.sessions.get(session_id).ok_or_else(|| format!("RDP session {} not found", session_id))?;
|
||||||
|
// Clear any accumulated dirty region so get_frame returns the full buffer
|
||||||
|
*handle.dirty_region.lock().unwrap_or_else(|e| e.into_inner()) = None;
|
||||||
|
handle.frame_dirty.store(true, Ordering::Release);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn resize(&self, session_id: &str, width: u16, height: u16) -> Result<(), String> {
|
||||||
|
let handle = self.sessions.get(session_id).ok_or_else(|| format!("RDP session {} not found", session_id))?;
|
||||||
|
handle.input_tx.send(InputEvent::Resize { width, height }).map_err(|_| format!("RDP session {} input channel closed", session_id))
|
||||||
|
}
|
||||||
|
|
||||||
pub fn disconnect(&self, session_id: &str) -> Result<(), String> {
|
pub fn disconnect(&self, session_id: &str) -> Result<(), String> {
|
||||||
let handle = self.sessions.get(session_id).ok_or_else(|| format!("RDP session {} not found", session_id))?;
|
let handle = self.sessions.get(session_id).ok_or_else(|| format!("RDP session {} not found", session_id))?;
|
||||||
let _ = handle.input_tx.send(InputEvent::Disconnect);
|
let _ = handle.input_tx.send(InputEvent::Disconnect);
|
||||||
@ -303,7 +366,11 @@ fn build_connector_config(config: &RdpConfig) -> Result<connector::Config, Strin
|
|||||||
request_data: None,
|
request_data: None,
|
||||||
autologon: false,
|
autologon: false,
|
||||||
enable_audio_playback: false,
|
enable_audio_playback: false,
|
||||||
performance_flags: PerformanceFlags::default(),
|
performance_flags: PerformanceFlags::DISABLE_WALLPAPER
|
||||||
|
| PerformanceFlags::DISABLE_MENUANIMATIONS
|
||||||
|
| PerformanceFlags::DISABLE_CURSOR_SHADOW
|
||||||
|
| PerformanceFlags::ENABLE_FONT_SMOOTHING
|
||||||
|
| PerformanceFlags::ENABLE_DESKTOP_COMPOSITION,
|
||||||
desktop_scale_factor: 0,
|
desktop_scale_factor: 0,
|
||||||
hardware_id: None,
|
hardware_id: None,
|
||||||
license_cache: None,
|
license_cache: None,
|
||||||
@ -333,7 +400,7 @@ async fn establish_connection(config: connector::Config, hostname: &str, port: u
|
|||||||
Ok((connection_result, upgraded_framed))
|
Ok((connection_result, upgraded_framed))
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn run_active_session(connection_result: ConnectionResult, framed: UpgradedFramed, frame_buffer: Arc<TokioMutex<Vec<u8>>>, frame_dirty: Arc<AtomicBool>, mut input_rx: mpsc::UnboundedReceiver<InputEvent>, width: u16, height: u16) -> Result<(), String> {
|
async fn run_active_session(connection_result: ConnectionResult, framed: UpgradedFramed, front_buffer: Arc<std::sync::RwLock<Vec<u8>>>, dirty_region: Arc<std::sync::Mutex<Option<DirtyRect>>>, frame_dirty: Arc<AtomicBool>, mut input_rx: mpsc::UnboundedReceiver<InputEvent>, mut width: u16, mut height: u16, app_handle: tauri::AppHandle, session_id: String) -> Result<(), String> {
|
||||||
let (mut reader, mut writer) = split_tokio_framed(framed);
|
let (mut reader, mut writer) = split_tokio_framed(framed);
|
||||||
let mut image = DecodedImage::new(PixelFormat::RgbA32, width, height);
|
let mut image = DecodedImage::new(PixelFormat::RgbA32, width, height);
|
||||||
let mut active_stage = ActiveStage::new(connection_result);
|
let mut active_stage = ActiveStage::new(connection_result);
|
||||||
@ -385,17 +452,68 @@ async fn run_active_session(connection_result: ConnectionResult, framed: Upgrade
|
|||||||
}
|
}
|
||||||
all_outputs
|
all_outputs
|
||||||
}
|
}
|
||||||
|
Some(InputEvent::Resize { width: new_w, height: new_h }) => {
|
||||||
|
// Ensure dimensions are within RDP spec (200-8192, even width)
|
||||||
|
let w = (new_w.max(200).min(8192) & !1) as u32;
|
||||||
|
let h = new_h.max(200).min(8192) as u32;
|
||||||
|
if let Some(Ok(resize_frame)) = active_stage.encode_resize(w, h, None, None) {
|
||||||
|
writer.write_all(&resize_frame).await.map_err(|e| format!("Failed to send resize: {}", e))?;
|
||||||
|
// Reallocate image and front buffer for new dimensions
|
||||||
|
image = DecodedImage::new(PixelFormat::RgbA32, w as u16, h as u16);
|
||||||
|
let buf_size = w as usize * h as usize * 4;
|
||||||
|
let mut new_buf = vec![0u8; buf_size];
|
||||||
|
for pixel in new_buf.chunks_exact_mut(4) { pixel[3] = 255; }
|
||||||
|
*front_buffer.write().unwrap_or_else(|e| e.into_inner()) = new_buf;
|
||||||
|
width = w as u16;
|
||||||
|
height = h as u16;
|
||||||
|
info!("RDP session {} resized to {}x{}", session_id, width, height);
|
||||||
|
}
|
||||||
|
Vec::new()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
for out in outputs {
|
for out in outputs {
|
||||||
match out {
|
match out {
|
||||||
ActiveStageOutput::ResponseFrame(frame) => { writer.write_all(&frame).await.map_err(|e| format!("Failed to write RDP response frame: {}", e))?; }
|
ActiveStageOutput::ResponseFrame(frame) => { writer.write_all(&frame).await.map_err(|e| format!("Failed to write RDP response frame: {}", e))?; }
|
||||||
ActiveStageOutput::GraphicsUpdate(_region) => {
|
ActiveStageOutput::GraphicsUpdate(region) => {
|
||||||
let mut buf = frame_buffer.lock().await;
|
let rx = region.left as usize;
|
||||||
let src = image.data();
|
let ry = region.top as usize;
|
||||||
if src.len() == buf.len() { buf.copy_from_slice(src); } else { *buf = src.to_vec(); }
|
let rr = (region.right as usize).saturating_add(1).min(width as usize);
|
||||||
frame_dirty.store(true, Ordering::Relaxed);
|
let rb = (region.bottom as usize).saturating_add(1).min(height as usize);
|
||||||
|
let stride = width as usize * 4;
|
||||||
|
|
||||||
|
// Copy only the dirty rectangle rows from decoded image → front buffer
|
||||||
|
{
|
||||||
|
let src = image.data();
|
||||||
|
let mut front = front_buffer.write().unwrap_or_else(|e| e.into_inner());
|
||||||
|
for row in ry..rb {
|
||||||
|
let src_start = row * stride + rx * 4;
|
||||||
|
let src_end = row * stride + rr * 4;
|
||||||
|
if src_end <= src.len() && src_end <= front.len() {
|
||||||
|
front[src_start..src_end].copy_from_slice(&src[src_start..src_end]);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Accumulate dirty region (union of all rects since last get_frame)
|
||||||
|
{
|
||||||
|
let new_rect = DirtyRect { x: rx as u16, y: ry as u16, width: (rr - rx) as u16, height: (rb - ry) as u16 };
|
||||||
|
let mut dr = dirty_region.lock().unwrap_or_else(|e| e.into_inner());
|
||||||
|
*dr = Some(match dr.take() {
|
||||||
|
None => new_rect,
|
||||||
|
Some(prev) => {
|
||||||
|
let x = prev.x.min(new_rect.x);
|
||||||
|
let y = prev.y.min(new_rect.y);
|
||||||
|
let r = (prev.x + prev.width).max(new_rect.x + new_rect.width);
|
||||||
|
let b = (prev.y + prev.height).max(new_rect.y + new_rect.height);
|
||||||
|
DirtyRect { x, y, width: r - x, height: b - y }
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
frame_dirty.store(true, Ordering::Release);
|
||||||
|
let _ = app_handle.emit(&format!("rdp:frame:{}", session_id), ());
|
||||||
}
|
}
|
||||||
ActiveStageOutput::Terminate(reason) => { info!("RDP session terminated: {:?}", reason); return Ok(()); }
|
ActiveStageOutput::Terminate(reason) => { info!("RDP session terminated: {:?}", reason); return Ok(()); }
|
||||||
ActiveStageOutput::DeactivateAll(_) => { warn!("RDP server sent DeactivateAll — reconnection not yet implemented"); return Ok(()); }
|
ActiveStageOutput::DeactivateAll(_) => { warn!("RDP server sent DeactivateAll — reconnection not yet implemented"); return Ok(()); }
|
||||||
|
|||||||
@ -12,6 +12,7 @@ use serde::Serialize;
|
|||||||
use tokio::sync::Mutex as TokioMutex;
|
use tokio::sync::Mutex as TokioMutex;
|
||||||
|
|
||||||
use crate::ssh::session::SshClient;
|
use crate::ssh::session::SshClient;
|
||||||
|
use crate::utils::shell_escape;
|
||||||
|
|
||||||
#[derive(Debug, Serialize, Clone)]
|
#[derive(Debug, Serialize, Clone)]
|
||||||
#[serde(rename_all = "camelCase")]
|
#[serde(rename_all = "camelCase")]
|
||||||
@ -63,18 +64,44 @@ fn service_name(port: u16) -> &'static str {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Validate that `subnet` contains exactly three dot-separated octet groups,
|
||||||
|
/// each consisting only of 1–3 ASCII digits (e.g. "192.168.1").
|
||||||
|
/// Returns an error string if the format is invalid.
|
||||||
|
fn validate_subnet(subnet: &str) -> Result<(), String> {
|
||||||
|
let parts: Vec<&str> = subnet.split('.').collect();
|
||||||
|
if parts.len() != 3 {
|
||||||
|
return Err(format!(
|
||||||
|
"Invalid subnet '{}': expected three octets (e.g. 192.168.1)",
|
||||||
|
subnet
|
||||||
|
));
|
||||||
|
}
|
||||||
|
for part in &parts {
|
||||||
|
if part.is_empty() || part.len() > 3 || !part.chars().all(|c| c.is_ascii_digit()) {
|
||||||
|
return Err(format!(
|
||||||
|
"Invalid subnet '{}': each octet must be 1–3 decimal digits",
|
||||||
|
subnet
|
||||||
|
));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
/// Discover hosts on the remote network using ARP table and ping sweep.
|
/// Discover hosts on the remote network using ARP table and ping sweep.
|
||||||
pub async fn scan_network(
|
pub async fn scan_network(
|
||||||
handle: &Arc<TokioMutex<Handle<SshClient>>>,
|
handle: &Arc<TokioMutex<Handle<SshClient>>>,
|
||||||
subnet: &str,
|
subnet: &str,
|
||||||
) -> Result<Vec<DiscoveredHost>, String> {
|
) -> Result<Vec<DiscoveredHost>, String> {
|
||||||
|
// Validate subnet format before using it in remote shell commands.
|
||||||
|
validate_subnet(subnet)?;
|
||||||
|
|
||||||
// Script that works on Linux and macOS:
|
// Script that works on Linux and macOS:
|
||||||
// 1. Ping sweep the subnet to populate ARP cache
|
// 1. Ping sweep the subnet to populate ARP cache
|
||||||
// 2. Read ARP table for IP/MAC pairs
|
// 2. Read ARP table for IP/MAC pairs
|
||||||
// 3. Try reverse DNS for hostnames
|
// 3. Try reverse DNS for hostnames
|
||||||
|
let escaped_subnet = shell_escape(subnet);
|
||||||
let script = format!(r#"
|
let script = format!(r#"
|
||||||
OS=$(uname -s 2>/dev/null)
|
OS=$(uname -s 2>/dev/null)
|
||||||
SUBNET="{subnet}"
|
SUBNET={escaped_subnet}
|
||||||
|
|
||||||
# Ping sweep (background, fast)
|
# Ping sweep (background, fast)
|
||||||
if [ "$OS" = "Linux" ]; then
|
if [ "$OS" = "Linux" ]; then
|
||||||
@ -151,6 +178,12 @@ pub async fn scan_ports(
|
|||||||
target: &str,
|
target: &str,
|
||||||
ports: &[u16],
|
ports: &[u16],
|
||||||
) -> Result<Vec<PortResult>, String> {
|
) -> Result<Vec<PortResult>, String> {
|
||||||
|
// Validate target — /dev/tcp requires a bare hostname/IP, not a shell-quoted value.
|
||||||
|
// Only allow alphanumeric, dots, hyphens, and colons (for IPv6).
|
||||||
|
if !target.chars().all(|c| c.is_ascii_alphanumeric() || c == '.' || c == '-' || c == ':') {
|
||||||
|
return Err(format!("Invalid target for port scan: {}", target));
|
||||||
|
}
|
||||||
|
|
||||||
// Use bash /dev/tcp for port scanning — no nmap required
|
// Use bash /dev/tcp for port scanning — no nmap required
|
||||||
let port_checks: Vec<String> = ports.iter()
|
let port_checks: Vec<String> = ports.iter()
|
||||||
.map(|p| format!(
|
.map(|p| format!(
|
||||||
|
|||||||
@ -8,6 +8,7 @@ use crate::db::Database;
|
|||||||
///
|
///
|
||||||
/// All operations acquire the shared DB mutex for their duration and
|
/// All operations acquire the shared DB mutex for their duration and
|
||||||
/// return immediately — no async needed for a local SQLite store.
|
/// return immediately — no async needed for a local SQLite store.
|
||||||
|
#[derive(Clone)]
|
||||||
pub struct SettingsService {
|
pub struct SettingsService {
|
||||||
db: Database,
|
db: Database,
|
||||||
}
|
}
|
||||||
|
|||||||
@ -5,7 +5,6 @@
|
|||||||
//! provides all file operations needed by the frontend.
|
//! provides all file operations needed by the frontend.
|
||||||
|
|
||||||
use std::sync::Arc;
|
use std::sync::Arc;
|
||||||
use std::time::{Duration, UNIX_EPOCH};
|
|
||||||
|
|
||||||
use dashmap::DashMap;
|
use dashmap::DashMap;
|
||||||
use log::{debug, info};
|
use log::{debug, info};
|
||||||
@ -35,9 +34,6 @@ pub struct FileEntry {
|
|||||||
|
|
||||||
/// Format a Unix timestamp (seconds since epoch) as "Mon DD HH:MM".
|
/// Format a Unix timestamp (seconds since epoch) as "Mon DD HH:MM".
|
||||||
fn format_mtime(unix_secs: u32) -> String {
|
fn format_mtime(unix_secs: u32) -> String {
|
||||||
// Build a SystemTime from the raw epoch value.
|
|
||||||
let st = UNIX_EPOCH + Duration::from_secs(unix_secs as u64);
|
|
||||||
|
|
||||||
// Convert to seconds-since-epoch for manual formatting. We avoid pulling
|
// Convert to seconds-since-epoch for manual formatting. We avoid pulling
|
||||||
// in chrono just for this; a simple manual decomposition is sufficient for
|
// in chrono just for this; a simple manual decomposition is sufficient for
|
||||||
// the "Mar 17 14:30" display format expected by the frontend.
|
// the "Mar 17 14:30" display format expected by the frontend.
|
||||||
@ -54,12 +50,10 @@ fn format_mtime(unix_secs: u32) -> String {
|
|||||||
let era = if z >= 0 { z } else { z - 146_096 } / 146_097;
|
let era = if z >= 0 { z } else { z - 146_096 } / 146_097;
|
||||||
let doe = z - era * 146_097;
|
let doe = z - era * 146_097;
|
||||||
let yoe = (doe - doe / 1_460 + doe / 36_524 - doe / 146_096) / 365;
|
let yoe = (doe - doe / 1_460 + doe / 36_524 - doe / 146_096) / 365;
|
||||||
let y = yoe + era * 400;
|
|
||||||
let doy = doe - (365 * yoe + yoe / 4 - yoe / 100);
|
let doy = doe - (365 * yoe + yoe / 4 - yoe / 100);
|
||||||
let mp = (5 * doy + 2) / 153;
|
let mp = (5 * doy + 2) / 153;
|
||||||
let d = doy - (153 * mp + 2) / 5 + 1;
|
let d = doy - (153 * mp + 2) / 5 + 1;
|
||||||
let m = if mp < 10 { mp + 3 } else { mp - 9 };
|
let m = if mp < 10 { mp + 3 } else { mp - 9 };
|
||||||
let _y = if m <= 2 { y + 1 } else { y };
|
|
||||||
|
|
||||||
let month = match m {
|
let month = match m {
|
||||||
1 => "Jan",
|
1 => "Jan",
|
||||||
@ -77,9 +71,6 @@ fn format_mtime(unix_secs: u32) -> String {
|
|||||||
_ => "???",
|
_ => "???",
|
||||||
};
|
};
|
||||||
|
|
||||||
// Suppress unused variable warning — st is only used as a sanity anchor.
|
|
||||||
let _ = st;
|
|
||||||
|
|
||||||
format!("{} {:2} {:02}:{:02}", month, d, hours, minutes)
|
format!("{} {:2} {:02}:{:02}", month, d, hours, minutes)
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -99,13 +90,13 @@ pub struct SftpService {
|
|||||||
/// One `SftpSession` per SSH session, behind a mutex so async commands can
|
/// One `SftpSession` per SSH session, behind a mutex so async commands can
|
||||||
/// take a shared reference to the `SftpService` and still mutably borrow
|
/// take a shared reference to the `SftpService` and still mutably borrow
|
||||||
/// individual sessions.
|
/// individual sessions.
|
||||||
clients: DashMap<String, Arc<TokioMutex<SftpSession>>>,
|
clients: Arc<DashMap<String, Arc<TokioMutex<SftpSession>>>>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl SftpService {
|
impl SftpService {
|
||||||
pub fn new() -> Self {
|
pub fn new() -> Self {
|
||||||
Self {
|
Self {
|
||||||
clients: DashMap::new(),
|
clients: Arc::new(DashMap::new()),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -319,7 +310,7 @@ impl SftpService {
|
|||||||
) -> Result<Arc<TokioMutex<SftpSession>>, String> {
|
) -> Result<Arc<TokioMutex<SftpSession>>, String> {
|
||||||
self.clients
|
self.clients
|
||||||
.get(session_id)
|
.get(session_id)
|
||||||
.map(|r| r.clone())
|
.map(|r| r.value().clone())
|
||||||
.ok_or_else(|| format!("No SFTP client for session {}", session_id))
|
.ok_or_else(|| format!("No SFTP client for session {}", session_id))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -16,6 +16,7 @@ use russh::ChannelMsg;
|
|||||||
use tauri::{AppHandle, Emitter};
|
use tauri::{AppHandle, Emitter};
|
||||||
use tokio::sync::watch;
|
use tokio::sync::watch;
|
||||||
use tokio::sync::Mutex as TokioMutex;
|
use tokio::sync::Mutex as TokioMutex;
|
||||||
|
use tokio_util::sync::CancellationToken;
|
||||||
|
|
||||||
use crate::ssh::session::SshClient;
|
use crate::ssh::session::SshClient;
|
||||||
|
|
||||||
@ -39,13 +40,15 @@ impl CwdTracker {
|
|||||||
/// Spawn a background tokio task that polls `pwd` every 2 seconds on a
|
/// Spawn a background tokio task that polls `pwd` every 2 seconds on a
|
||||||
/// separate exec channel.
|
/// separate exec channel.
|
||||||
///
|
///
|
||||||
/// The task runs until the SSH connection is closed or the channel cannot
|
/// The task runs until cancelled via the `CancellationToken`, or until the
|
||||||
/// be opened. CWD changes are emitted as `ssh:cwd:{session_id}` events.
|
/// SSH connection is closed or the channel cannot be opened.
|
||||||
|
/// CWD changes are emitted as `ssh:cwd:{session_id}` events.
|
||||||
pub fn start(
|
pub fn start(
|
||||||
&self,
|
&self,
|
||||||
handle: Arc<TokioMutex<Handle<SshClient>>>,
|
handle: Arc<TokioMutex<Handle<SshClient>>>,
|
||||||
app_handle: AppHandle,
|
app_handle: AppHandle,
|
||||||
session_id: String,
|
session_id: String,
|
||||||
|
cancel: CancellationToken,
|
||||||
) {
|
) {
|
||||||
let sender = self._sender.clone();
|
let sender = self._sender.clone();
|
||||||
|
|
||||||
@ -56,6 +59,10 @@ impl CwdTracker {
|
|||||||
let mut previous_cwd = String::new();
|
let mut previous_cwd = String::new();
|
||||||
|
|
||||||
loop {
|
loop {
|
||||||
|
if cancel.is_cancelled() {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
// Open a fresh exec channel for each `pwd` invocation.
|
// Open a fresh exec channel for each `pwd` invocation.
|
||||||
// Some SSH servers do not allow multiple exec requests on a
|
// Some SSH servers do not allow multiple exec requests on a
|
||||||
// single channel, so we open a new one each time.
|
// single channel, so we open a new one each time.
|
||||||
@ -119,8 +126,11 @@ impl CwdTracker {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Wait 2 seconds before the next poll.
|
// Wait 2 seconds before the next poll, or cancel.
|
||||||
tokio::time::sleep(tokio::time::Duration::from_secs(2)).await;
|
tokio::select! {
|
||||||
|
_ = tokio::time::sleep(tokio::time::Duration::from_secs(2)) => {}
|
||||||
|
_ = cancel.cancelled() => { break; }
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
debug!("CWD tracker for session {} stopped", session_id);
|
debug!("CWD tracker for session {} stopped", session_id);
|
||||||
|
|||||||
51
src-tauri/src/ssh/exec.rs
Normal file
51
src-tauri/src/ssh/exec.rs
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
//! Shared SSH exec-channel helper used by commands, MCP handlers, and tools.
|
||||||
|
//!
|
||||||
|
//! Opens a one-shot exec channel on an existing SSH handle, runs `cmd`, collects
|
||||||
|
//! all stdout/stderr, and returns it as a `String`. The caller is responsible
|
||||||
|
//! for ensuring the session is still alive.
|
||||||
|
|
||||||
|
use std::sync::Arc;
|
||||||
|
|
||||||
|
use tokio::sync::Mutex as TokioMutex;
|
||||||
|
|
||||||
|
use crate::ssh::session::SshClient;
|
||||||
|
|
||||||
|
/// Execute `cmd` on a separate exec channel and return all output as a `String`.
|
||||||
|
///
|
||||||
|
/// Locks the handle for only as long as it takes to open the channel, then
|
||||||
|
/// releases it before reading — this avoids holding the lock while waiting on
|
||||||
|
/// remote I/O.
|
||||||
|
pub async fn exec_on_session(
|
||||||
|
handle: &Arc<TokioMutex<russh::client::Handle<SshClient>>>,
|
||||||
|
cmd: &str,
|
||||||
|
) -> Result<String, String> {
|
||||||
|
let mut channel = {
|
||||||
|
let h = handle.lock().await;
|
||||||
|
h.channel_open_session()
|
||||||
|
.await
|
||||||
|
.map_err(|e| format!("Exec channel failed: {}", e))?
|
||||||
|
};
|
||||||
|
|
||||||
|
channel
|
||||||
|
.exec(true, cmd)
|
||||||
|
.await
|
||||||
|
.map_err(|e| format!("Exec failed: {}", e))?;
|
||||||
|
|
||||||
|
let mut output = String::new();
|
||||||
|
loop {
|
||||||
|
match channel.wait().await {
|
||||||
|
Some(russh::ChannelMsg::Data { ref data }) => {
|
||||||
|
if let Ok(text) = std::str::from_utf8(data.as_ref()) {
|
||||||
|
output.push_str(text);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Some(russh::ChannelMsg::Eof)
|
||||||
|
| Some(russh::ChannelMsg::Close)
|
||||||
|
| None => break,
|
||||||
|
Some(russh::ChannelMsg::ExitStatus { .. }) => {}
|
||||||
|
_ => {}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(output)
|
||||||
|
}
|
||||||
@ -2,3 +2,4 @@ pub mod session;
|
|||||||
pub mod host_key;
|
pub mod host_key;
|
||||||
pub mod cwd;
|
pub mod cwd;
|
||||||
pub mod monitor;
|
pub mod monitor;
|
||||||
|
pub mod exec;
|
||||||
|
|||||||
@ -6,11 +6,13 @@
|
|||||||
|
|
||||||
use std::sync::Arc;
|
use std::sync::Arc;
|
||||||
|
|
||||||
|
use log::warn;
|
||||||
use russh::client::Handle;
|
use russh::client::Handle;
|
||||||
use russh::ChannelMsg;
|
use russh::ChannelMsg;
|
||||||
use serde::Serialize;
|
use serde::Serialize;
|
||||||
use tauri::{AppHandle, Emitter};
|
use tauri::{AppHandle, Emitter};
|
||||||
use tokio::sync::Mutex as TokioMutex;
|
use tokio::sync::Mutex as TokioMutex;
|
||||||
|
use tokio_util::sync::CancellationToken;
|
||||||
|
|
||||||
use crate::ssh::session::SshClient;
|
use crate::ssh::session::SshClient;
|
||||||
|
|
||||||
@ -30,26 +32,53 @@ pub struct SystemStats {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/// Spawn a background task that polls system stats every 5 seconds.
|
/// Spawn a background task that polls system stats every 5 seconds.
|
||||||
|
///
|
||||||
|
/// The task runs until cancelled via the `CancellationToken`, or until the
|
||||||
|
/// SSH connection is closed.
|
||||||
pub fn start_monitor(
|
pub fn start_monitor(
|
||||||
handle: Arc<TokioMutex<Handle<SshClient>>>,
|
handle: Arc<TokioMutex<Handle<SshClient>>>,
|
||||||
app_handle: AppHandle,
|
app_handle: AppHandle,
|
||||||
session_id: String,
|
session_id: String,
|
||||||
|
cancel: CancellationToken,
|
||||||
) {
|
) {
|
||||||
tokio::spawn(async move {
|
tokio::spawn(async move {
|
||||||
// Brief delay to let the shell start up
|
// Brief delay to let the shell start up
|
||||||
tokio::time::sleep(tokio::time::Duration::from_secs(2)).await;
|
tokio::time::sleep(tokio::time::Duration::from_secs(2)).await;
|
||||||
|
|
||||||
loop {
|
let mut consecutive_timeouts: u32 = 0;
|
||||||
let stats = collect_stats(&handle).await;
|
|
||||||
|
|
||||||
if let Some(stats) = stats {
|
loop {
|
||||||
let _ = app_handle.emit(
|
if cancel.is_cancelled() {
|
||||||
&format!("ssh:monitor:{}", session_id),
|
break;
|
||||||
&stats,
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
tokio::time::sleep(tokio::time::Duration::from_secs(5)).await;
|
let stats = collect_stats(&handle).await;
|
||||||
|
|
||||||
|
match stats {
|
||||||
|
Some(stats) => {
|
||||||
|
consecutive_timeouts = 0;
|
||||||
|
let _ = app_handle.emit(
|
||||||
|
&format!("ssh:monitor:{}", session_id),
|
||||||
|
&stats,
|
||||||
|
);
|
||||||
|
}
|
||||||
|
None => {
|
||||||
|
consecutive_timeouts += 1;
|
||||||
|
if consecutive_timeouts >= 3 {
|
||||||
|
warn!(
|
||||||
|
"SSH monitor for session {}: 3 consecutive failures, stopping",
|
||||||
|
session_id
|
||||||
|
);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Wait 5 seconds before the next poll, or cancel.
|
||||||
|
tokio::select! {
|
||||||
|
_ = tokio::time::sleep(tokio::time::Duration::from_secs(5)) => {}
|
||||||
|
_ = cancel.cancelled() => { break; }
|
||||||
|
}
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
@ -125,7 +154,24 @@ fn parse_stats(raw: &str) -> Option<SystemStats> {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Execute a command on a separate exec channel with a 10-second timeout.
|
||||||
async fn exec_command(handle: &Arc<TokioMutex<Handle<SshClient>>>, cmd: &str) -> Option<String> {
|
async fn exec_command(handle: &Arc<TokioMutex<Handle<SshClient>>>, cmd: &str) -> Option<String> {
|
||||||
|
let result = tokio::time::timeout(
|
||||||
|
std::time::Duration::from_secs(10),
|
||||||
|
exec_command_inner(handle, cmd),
|
||||||
|
)
|
||||||
|
.await;
|
||||||
|
|
||||||
|
match result {
|
||||||
|
Ok(output) => output,
|
||||||
|
Err(_) => {
|
||||||
|
warn!("SSH monitor exec_command timed out after 10s");
|
||||||
|
None
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn exec_command_inner(handle: &Arc<TokioMutex<Handle<SshClient>>>, cmd: &str) -> Option<String> {
|
||||||
let mut channel = {
|
let mut channel = {
|
||||||
let h = handle.lock().await;
|
let h = handle.lock().await;
|
||||||
h.channel_open_session().await.ok()?
|
h.channel_open_session().await.ok()?
|
||||||
|
|||||||
@ -17,6 +17,7 @@ use crate::mcp::error_watcher::ErrorWatcher;
|
|||||||
use crate::sftp::SftpService;
|
use crate::sftp::SftpService;
|
||||||
use crate::ssh::cwd::CwdTracker;
|
use crate::ssh::cwd::CwdTracker;
|
||||||
use crate::ssh::host_key::{HostKeyResult, HostKeyStore};
|
use crate::ssh::host_key::{HostKeyResult, HostKeyStore};
|
||||||
|
use tokio_util::sync::CancellationToken;
|
||||||
|
|
||||||
pub enum AuthMethod {
|
pub enum AuthMethod {
|
||||||
Password(String),
|
Password(String),
|
||||||
@ -47,6 +48,7 @@ pub struct SshSession {
|
|||||||
pub handle: Arc<TokioMutex<Handle<SshClient>>>,
|
pub handle: Arc<TokioMutex<Handle<SshClient>>>,
|
||||||
pub command_tx: mpsc::UnboundedSender<ChannelCommand>,
|
pub command_tx: mpsc::UnboundedSender<ChannelCommand>,
|
||||||
pub cwd_tracker: Option<CwdTracker>,
|
pub cwd_tracker: Option<CwdTracker>,
|
||||||
|
pub cancel_token: CancellationToken,
|
||||||
}
|
}
|
||||||
|
|
||||||
pub struct SshClient {
|
pub struct SshClient {
|
||||||
@ -76,13 +78,13 @@ impl client::Handler for SshClient {
|
|||||||
|
|
||||||
#[derive(Clone)]
|
#[derive(Clone)]
|
||||||
pub struct SshService {
|
pub struct SshService {
|
||||||
sessions: DashMap<String, Arc<SshSession>>,
|
sessions: Arc<DashMap<String, Arc<SshSession>>>,
|
||||||
db: Database,
|
db: Database,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl SshService {
|
impl SshService {
|
||||||
pub fn new(db: Database) -> Self {
|
pub fn new(db: Database) -> Self {
|
||||||
Self { sessions: DashMap::new(), db }
|
Self { sessions: Arc::new(DashMap::new()), db }
|
||||||
}
|
}
|
||||||
|
|
||||||
pub async fn connect(&self, app_handle: AppHandle, hostname: &str, port: u16, username: &str, auth: AuthMethod, cols: u32, rows: u32, sftp_service: &SftpService, scrollback: &ScrollbackRegistry, error_watcher: &ErrorWatcher) -> Result<String, String> {
|
pub async fn connect(&self, app_handle: AppHandle, hostname: &str, port: u16, username: &str, auth: AuthMethod, cols: u32, rows: u32, sftp_service: &SftpService, scrollback: &ScrollbackRegistry, error_watcher: &ErrorWatcher) -> Result<String, String> {
|
||||||
@ -135,10 +137,11 @@ impl SshService {
|
|||||||
let channel_id = channel.id();
|
let channel_id = channel.id();
|
||||||
let handle = Arc::new(TokioMutex::new(handle));
|
let handle = Arc::new(TokioMutex::new(handle));
|
||||||
let (command_tx, mut command_rx) = mpsc::unbounded_channel::<ChannelCommand>();
|
let (command_tx, mut command_rx) = mpsc::unbounded_channel::<ChannelCommand>();
|
||||||
|
let cancel_token = CancellationToken::new();
|
||||||
let cwd_tracker = CwdTracker::new();
|
let cwd_tracker = CwdTracker::new();
|
||||||
cwd_tracker.start(handle.clone(), app_handle.clone(), session_id.clone());
|
cwd_tracker.start(handle.clone(), app_handle.clone(), session_id.clone(), cancel_token.clone());
|
||||||
|
|
||||||
let session = Arc::new(SshSession { id: session_id.clone(), hostname: hostname.to_string(), port, username: username.to_string(), channel_id, handle: handle.clone(), command_tx: command_tx.clone(), cwd_tracker: Some(cwd_tracker) });
|
let session = Arc::new(SshSession { id: session_id.clone(), hostname: hostname.to_string(), port, username: username.to_string(), channel_id, handle: handle.clone(), command_tx: command_tx.clone(), cwd_tracker: Some(cwd_tracker), cancel_token: cancel_token.clone() });
|
||||||
self.sessions.insert(session_id.clone(), session);
|
self.sessions.insert(session_id.clone(), session);
|
||||||
|
|
||||||
{ let h = handle.lock().await;
|
{ let h = handle.lock().await;
|
||||||
@ -158,7 +161,7 @@ impl SshService {
|
|||||||
error_watcher.watch(&session_id);
|
error_watcher.watch(&session_id);
|
||||||
|
|
||||||
// Start remote monitoring if enabled (runs on a separate exec channel)
|
// Start remote monitoring if enabled (runs on a separate exec channel)
|
||||||
crate::ssh::monitor::start_monitor(handle.clone(), app_handle.clone(), session_id.clone());
|
crate::ssh::monitor::start_monitor(handle.clone(), app_handle.clone(), session_id.clone(), cancel_token.clone());
|
||||||
|
|
||||||
// Inject OSC 7 CWD reporting hook into the user's shell.
|
// Inject OSC 7 CWD reporting hook into the user's shell.
|
||||||
// This enables SFTP CWD following on all platforms (Linux, macOS, FreeBSD).
|
// This enables SFTP CWD following on all platforms (Linux, macOS, FreeBSD).
|
||||||
@ -246,6 +249,8 @@ impl SshService {
|
|||||||
|
|
||||||
pub async fn disconnect(&self, session_id: &str, sftp_service: &SftpService) -> Result<(), String> {
|
pub async fn disconnect(&self, session_id: &str, sftp_service: &SftpService) -> Result<(), String> {
|
||||||
let (_, session) = self.sessions.remove(session_id).ok_or_else(|| format!("Session {} not found", session_id))?;
|
let (_, session) = self.sessions.remove(session_id).ok_or_else(|| format!("Session {} not found", session_id))?;
|
||||||
|
// Cancel background tasks (CWD tracker, monitor) before tearing down the connection.
|
||||||
|
session.cancel_token.cancel();
|
||||||
let _ = session.command_tx.send(ChannelCommand::Shutdown);
|
let _ = session.command_tx.send(ChannelCommand::Shutdown);
|
||||||
{ let handle = session.handle.lock().await; let _ = handle.disconnect(Disconnect::ByApplication, "", "en").await; }
|
{ let handle = session.handle.lock().await; let _ = handle.disconnect(Disconnect::ByApplication, "", "en").await; }
|
||||||
sftp_service.remove_client(session_id);
|
sftp_service.remove_client(session_id);
|
||||||
@ -253,7 +258,7 @@ impl SshService {
|
|||||||
}
|
}
|
||||||
|
|
||||||
pub fn get_session(&self, session_id: &str) -> Option<Arc<SshSession>> {
|
pub fn get_session(&self, session_id: &str) -> Option<Arc<SshSession>> {
|
||||||
self.sessions.get(session_id).map(|entry| entry.clone())
|
self.sessions.get(session_id).map(|r| r.value().clone())
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn list_sessions(&self) -> Vec<SessionInfo> {
|
pub fn list_sessions(&self) -> Vec<SessionInfo> {
|
||||||
@ -400,22 +405,23 @@ fn extract_osc7_cwd(data: &[u8]) -> Option<String> {
|
|||||||
}
|
}
|
||||||
|
|
||||||
fn percent_decode(input: &str) -> String {
|
fn percent_decode(input: &str) -> String {
|
||||||
let mut output = String::with_capacity(input.len());
|
let mut bytes: Vec<u8> = Vec::with_capacity(input.len());
|
||||||
let mut chars = input.chars();
|
let mut chars = input.chars();
|
||||||
while let Some(ch) = chars.next() {
|
while let Some(ch) = chars.next() {
|
||||||
if ch == '%' {
|
if ch == '%' {
|
||||||
let hex: String = chars.by_ref().take(2).collect();
|
let hex: String = chars.by_ref().take(2).collect();
|
||||||
if let Ok(byte) = u8::from_str_radix(&hex, 16) {
|
if let Ok(byte) = u8::from_str_radix(&hex, 16) {
|
||||||
output.push(byte as char);
|
bytes.push(byte);
|
||||||
} else {
|
} else {
|
||||||
output.push('%');
|
bytes.extend_from_slice(b"%");
|
||||||
output.push_str(&hex);
|
bytes.extend_from_slice(hex.as_bytes());
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
output.push(ch);
|
let mut buf = [0u8; 4];
|
||||||
|
bytes.extend_from_slice(ch.encode_utf8(&mut buf).as_bytes());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
output
|
String::from_utf8_lossy(&bytes).into_owned()
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Resolve a private key string — if it looks like PEM content, return as-is.
|
/// Resolve a private key string — if it looks like PEM content, return as-is.
|
||||||
|
|||||||
@ -59,6 +59,7 @@ struct BuiltinTheme {
|
|||||||
|
|
||||||
// ── service ───────────────────────────────────────────────────────────────────
|
// ── service ───────────────────────────────────────────────────────────────────
|
||||||
|
|
||||||
|
#[derive(Clone)]
|
||||||
pub struct ThemeService {
|
pub struct ThemeService {
|
||||||
db: Database,
|
db: Database,
|
||||||
}
|
}
|
||||||
@ -253,7 +254,7 @@ impl ThemeService {
|
|||||||
t.bright_blue, t.bright_magenta, t.bright_cyan, t.bright_white,
|
t.bright_blue, t.bright_magenta, t.bright_cyan, t.bright_white,
|
||||||
],
|
],
|
||||||
) {
|
) {
|
||||||
eprintln!("theme::seed_builtins: failed to seed '{}': {}", t.name, e);
|
wraith_log!("theme::seed_builtins: failed to seed '{}': {}", t.name, e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -272,7 +273,7 @@ impl ThemeService {
|
|||||||
) {
|
) {
|
||||||
Ok(s) => s,
|
Ok(s) => s,
|
||||||
Err(e) => {
|
Err(e) => {
|
||||||
eprintln!("theme::list: failed to prepare query: {}", e);
|
wraith_log!("theme::list: failed to prepare query: {}", e);
|
||||||
return vec![];
|
return vec![];
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
@ -280,12 +281,12 @@ impl ThemeService {
|
|||||||
match stmt.query_map([], map_theme_row) {
|
match stmt.query_map([], map_theme_row) {
|
||||||
Ok(rows) => rows
|
Ok(rows) => rows
|
||||||
.filter_map(|r| {
|
.filter_map(|r| {
|
||||||
r.map_err(|e| eprintln!("theme::list: row error: {}", e))
|
r.map_err(|e| wraith_log!("theme::list: row error: {}", e))
|
||||||
.ok()
|
.ok()
|
||||||
})
|
})
|
||||||
.collect(),
|
.collect(),
|
||||||
Err(e) => {
|
Err(e) => {
|
||||||
eprintln!("theme::list: query failed: {}", e);
|
wraith_log!("theme::list: query failed: {}", e);
|
||||||
vec![]
|
vec![]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
19
src-tauri/src/utils.rs
Normal file
19
src-tauri/src/utils.rs
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
//! Shared utility functions.
|
||||||
|
|
||||||
|
/// Escape a string for safe interpolation into a POSIX shell command.
|
||||||
|
///
|
||||||
|
/// Wraps the input in single quotes and escapes any embedded single quotes
|
||||||
|
/// using the `'\''` technique. This prevents command injection when building
|
||||||
|
/// shell commands from user-supplied values.
|
||||||
|
///
|
||||||
|
/// # Examples
|
||||||
|
///
|
||||||
|
/// ```
|
||||||
|
/// # use wraith_lib::utils::shell_escape;
|
||||||
|
/// assert_eq!(shell_escape("hello"), "'hello'");
|
||||||
|
/// assert_eq!(shell_escape("it's"), "'it'\\''s'");
|
||||||
|
/// assert_eq!(shell_escape(";rm -rf /"), "';rm -rf /'");
|
||||||
|
/// ```
|
||||||
|
pub fn shell_escape(input: &str) -> String {
|
||||||
|
format!("'{}'", input.replace('\'', "'\\''"))
|
||||||
|
}
|
||||||
@ -4,6 +4,7 @@ use aes_gcm::{
|
|||||||
Aes256Gcm, Key, Nonce,
|
Aes256Gcm, Key, Nonce,
|
||||||
};
|
};
|
||||||
use argon2::{Algorithm, Argon2, Params, Version};
|
use argon2::{Algorithm, Argon2, Params, Version};
|
||||||
|
use zeroize::Zeroizing;
|
||||||
|
|
||||||
// ---------------------------------------------------------------------------
|
// ---------------------------------------------------------------------------
|
||||||
// VaultService
|
// VaultService
|
||||||
@ -21,18 +22,18 @@ use argon2::{Algorithm, Argon2, Params, Version};
|
|||||||
/// The version prefix allows a future migration to a different algorithm
|
/// The version prefix allows a future migration to a different algorithm
|
||||||
/// without breaking existing stored blobs.
|
/// without breaking existing stored blobs.
|
||||||
pub struct VaultService {
|
pub struct VaultService {
|
||||||
key: [u8; 32],
|
key: Zeroizing<[u8; 32]>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl VaultService {
|
impl VaultService {
|
||||||
pub fn new(key: [u8; 32]) -> Self {
|
pub fn new(key: Zeroizing<[u8; 32]>) -> Self {
|
||||||
Self { key }
|
Self { key }
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Encrypt `plaintext` and return a `v1:{iv_hex}:{sealed_hex}` blob.
|
/// Encrypt `plaintext` and return a `v1:{iv_hex}:{sealed_hex}` blob.
|
||||||
pub fn encrypt(&self, plaintext: &str) -> Result<String, String> {
|
pub fn encrypt(&self, plaintext: &str) -> Result<String, String> {
|
||||||
// Build the AES-256-GCM cipher from our key.
|
// Build the AES-256-GCM cipher from our key.
|
||||||
let key = Key::<Aes256Gcm>::from_slice(&self.key);
|
let key = Key::<Aes256Gcm>::from_slice(&*self.key);
|
||||||
let cipher = Aes256Gcm::new(key);
|
let cipher = Aes256Gcm::new(key);
|
||||||
|
|
||||||
// Generate a random 12-byte nonce (96-bit is the GCM standard).
|
// Generate a random 12-byte nonce (96-bit is the GCM standard).
|
||||||
@ -71,7 +72,7 @@ impl VaultService {
|
|||||||
));
|
));
|
||||||
}
|
}
|
||||||
|
|
||||||
let key = Key::<Aes256Gcm>::from_slice(&self.key);
|
let key = Key::<Aes256Gcm>::from_slice(&*self.key);
|
||||||
let cipher = Aes256Gcm::new(key);
|
let cipher = Aes256Gcm::new(key);
|
||||||
let nonce = Nonce::from_slice(&iv_bytes);
|
let nonce = Nonce::from_slice(&iv_bytes);
|
||||||
|
|
||||||
@ -95,7 +96,7 @@ impl VaultService {
|
|||||||
/// t = 3 iterations
|
/// t = 3 iterations
|
||||||
/// m = 65536 KiB (64 MiB) memory
|
/// m = 65536 KiB (64 MiB) memory
|
||||||
/// p = 4 parallelism lanes
|
/// p = 4 parallelism lanes
|
||||||
pub fn derive_key(password: &str, salt: &[u8]) -> [u8; 32] {
|
pub fn derive_key(password: &str, salt: &[u8]) -> Zeroizing<[u8; 32]> {
|
||||||
let params = Params::new(
|
let params = Params::new(
|
||||||
65536, // m_cost: 64 MiB
|
65536, // m_cost: 64 MiB
|
||||||
3, // t_cost: iterations
|
3, // t_cost: iterations
|
||||||
@ -106,9 +107,9 @@ pub fn derive_key(password: &str, salt: &[u8]) -> [u8; 32] {
|
|||||||
|
|
||||||
let argon2 = Argon2::new(Algorithm::Argon2id, Version::V0x13, params);
|
let argon2 = Argon2::new(Algorithm::Argon2id, Version::V0x13, params);
|
||||||
|
|
||||||
let mut output_key = [0u8; 32];
|
let mut output_key = Zeroizing::new([0u8; 32]);
|
||||||
argon2
|
argon2
|
||||||
.hash_password_into(password.as_bytes(), salt, &mut output_key)
|
.hash_password_into(password.as_bytes(), salt, &mut *output_key)
|
||||||
.expect("Argon2id key derivation failed");
|
.expect("Argon2id key derivation failed");
|
||||||
|
|
||||||
output_key
|
output_key
|
||||||
|
|||||||
@ -24,6 +24,7 @@ pub struct WorkspaceSnapshot {
|
|||||||
const SNAPSHOT_KEY: &str = "workspace_snapshot";
|
const SNAPSHOT_KEY: &str = "workspace_snapshot";
|
||||||
const CLEAN_SHUTDOWN_KEY: &str = "clean_shutdown";
|
const CLEAN_SHUTDOWN_KEY: &str = "clean_shutdown";
|
||||||
|
|
||||||
|
#[derive(Clone)]
|
||||||
pub struct WorkspaceService {
|
pub struct WorkspaceService {
|
||||||
settings: SettingsService,
|
settings: SettingsService,
|
||||||
}
|
}
|
||||||
@ -47,7 +48,7 @@ impl WorkspaceService {
|
|||||||
pub fn load(&self) -> Option<WorkspaceSnapshot> {
|
pub fn load(&self) -> Option<WorkspaceSnapshot> {
|
||||||
let json = self.settings.get(SNAPSHOT_KEY)?;
|
let json = self.settings.get(SNAPSHOT_KEY)?;
|
||||||
serde_json::from_str(&json)
|
serde_json::from_str(&json)
|
||||||
.map_err(|e| eprintln!("workspace::load: failed to deserialize snapshot: {e}"))
|
.map_err(|e| wraith_log!("workspace::load: failed to deserialize snapshot: {e}"))
|
||||||
.ok()
|
.ok()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -18,13 +18,14 @@
|
|||||||
"minHeight": 600,
|
"minHeight": 600,
|
||||||
"decorations": true,
|
"decorations": true,
|
||||||
"resizable": true,
|
"resizable": true,
|
||||||
"dragDropEnabled": false
|
"dragDropEnabled": false,
|
||||||
|
"additionalBrowserArgs": "--enable-gpu-rasterization --enable-zero-copy --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"security": {
|
"security": {
|
||||||
"csp": null
|
"csp": null
|
||||||
},
|
},
|
||||||
"withGlobalTauri": true
|
"withGlobalTauri": false
|
||||||
},
|
},
|
||||||
"bundle": {
|
"bundle": {
|
||||||
"active": true,
|
"active": true,
|
||||||
@ -52,7 +53,7 @@
|
|||||||
"updater": {
|
"updater": {
|
||||||
"pubkey": "dW50cnVzdGVkIGNvbW1lbnQ6IG1pbmlzaWduIHB1YmxpYyBrZXk6IDNCRkQ2OUY2OEY0Q0ZFQkYKUldTLy9reVA5bW45T3dUQ1R5OFNCenVhL2srTXlLcHR4cFNaeCtJSmJUSTZKSUNHVTRIbWZwanEK",
|
"pubkey": "dW50cnVzdGVkIGNvbW1lbnQ6IG1pbmlzaWduIHB1YmxpYyBrZXk6IDNCRkQ2OUY2OEY0Q0ZFQkYKUldTLy9reVA5bW45T3dUQ1R5OFNCenVhL2srTXlLcHR4cFNaeCtJSmJUSTZKSUNHVTRIbWZwanEK",
|
||||||
"endpoints": [
|
"endpoints": [
|
||||||
"https://git.command.vigilcyber.com/api/packages/vstockwell/generic/wraith/latest/update.json"
|
"https://files.command.vigilcyber.com/wraith/update.json"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
55
src/App.vue
55
src/App.vue
@ -1,40 +1,65 @@
|
|||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref, onMounted, defineAsyncComponent } from "vue";
|
import { ref, onMounted, onErrorCaptured, defineAsyncComponent } from "vue";
|
||||||
import { useAppStore } from "@/stores/app.store";
|
import { useAppStore } from "@/stores/app.store";
|
||||||
import UnlockLayout from "@/layouts/UnlockLayout.vue";
|
import UnlockLayout from "@/layouts/UnlockLayout.vue";
|
||||||
|
import ToolWindow from "@/components/tools/ToolWindow.vue";
|
||||||
|
|
||||||
const MainLayout = defineAsyncComponent(
|
const MainLayout = defineAsyncComponent({
|
||||||
() => import("@/layouts/MainLayout.vue")
|
loader: () => import("@/layouts/MainLayout.vue"),
|
||||||
);
|
onError(error) { console.error("[App] MainLayout load failed:", error); },
|
||||||
const ToolWindow = defineAsyncComponent(
|
});
|
||||||
() => import("@/components/tools/ToolWindow.vue")
|
const DetachedSession = defineAsyncComponent({
|
||||||
);
|
loader: () => import("@/components/session/DetachedSession.vue"),
|
||||||
|
onError(error) { console.error("[App] DetachedSession load failed:", error); },
|
||||||
|
});
|
||||||
|
|
||||||
const app = useAppStore();
|
const app = useAppStore();
|
||||||
|
const appError = ref<string | null>(null);
|
||||||
|
|
||||||
// Tool window mode — detected from URL hash: #/tool/network-scanner?sessionId=abc
|
|
||||||
const isToolMode = ref(false);
|
const isToolMode = ref(false);
|
||||||
|
const isDetachedMode = ref(false);
|
||||||
const toolName = ref("");
|
const toolName = ref("");
|
||||||
const toolSessionId = ref("");
|
const toolSessionId = ref("");
|
||||||
|
|
||||||
onMounted(async () => {
|
onErrorCaptured((err) => {
|
||||||
const hash = window.location.hash;
|
appError.value = err instanceof Error ? err.message : String(err);
|
||||||
|
console.error("[App] Uncaught error:", err);
|
||||||
|
return false;
|
||||||
|
});
|
||||||
|
|
||||||
|
/** Parse hash and set mode flags. Called on mount and on hashchange. */
|
||||||
|
function applyHash(hash: string): void {
|
||||||
if (hash.startsWith("#/tool/")) {
|
if (hash.startsWith("#/tool/")) {
|
||||||
isToolMode.value = true;
|
isToolMode.value = true;
|
||||||
const rest = hash.substring(7); // after "#/tool/"
|
const rest = hash.substring(7);
|
||||||
const [name, query] = rest.split("?");
|
const [name, query] = rest.split("?");
|
||||||
toolName.value = name;
|
toolName.value = name;
|
||||||
toolSessionId.value = new URLSearchParams(query || "").get("sessionId") || "";
|
toolSessionId.value = new URLSearchParams(query || "").get("sessionId") || "";
|
||||||
} else {
|
} else if (hash.startsWith("#/detached-session")) {
|
||||||
|
isDetachedMode.value = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
onMounted(async () => {
|
||||||
|
// Check hash at load time (present if JS-side WebviewWindow set it in the URL)
|
||||||
|
applyHash(window.location.hash);
|
||||||
|
|
||||||
|
// Also listen for hash changes (Rust-side window sets hash via eval after load)
|
||||||
|
window.addEventListener("hashchange", () => applyHash(window.location.hash));
|
||||||
|
|
||||||
|
// Only init vault for the main app window (no hash)
|
||||||
|
if (!isToolMode.value && !isDetachedMode.value) {
|
||||||
await app.checkVaultState();
|
await app.checkVaultState();
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
</script>
|
</script>
|
||||||
|
|
||||||
<template>
|
<template>
|
||||||
<!-- Tool popup window mode -->
|
<div v-if="appError" class="fixed inset-0 z-50 flex items-center justify-center bg-[#0d1117] text-red-400 p-8 text-sm font-mono whitespace-pre-wrap">
|
||||||
<ToolWindow v-if="isToolMode" :tool="toolName" :session-id="toolSessionId" />
|
{{ appError }}
|
||||||
<!-- Normal app mode -->
|
</div>
|
||||||
|
<DetachedSession v-else-if="isDetachedMode" />
|
||||||
|
<ToolWindow v-else-if="isToolMode" :tool="toolName" :session-id="toolSessionId" />
|
||||||
<div v-else class="app-root">
|
<div v-else class="app-root">
|
||||||
<UnlockLayout v-if="!app.isUnlocked" />
|
<UnlockLayout v-if="!app.isUnlocked" />
|
||||||
<MainLayout v-else />
|
<MainLayout v-else />
|
||||||
|
|||||||
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
.terminal-container {
|
.terminal-container {
|
||||||
width: 100%;
|
width: 100%;
|
||||||
height: 100%;
|
min-height: 0;
|
||||||
position: relative;
|
position: relative;
|
||||||
overflow: hidden;
|
overflow: hidden;
|
||||||
background: var(--wraith-bg-primary);
|
background: var(--wraith-bg-primary);
|
||||||
@ -20,14 +20,16 @@
|
|||||||
height: 100%;
|
height: 100%;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Selection styling */
|
/* WKWebView focus fix: xterm.js hides its helper textarea with opacity: 0,
|
||||||
.terminal-container .xterm-selection div {
|
width/height: 0, left: -9999em. macOS WKWebView doesn't reliably focus
|
||||||
background-color: rgba(88, 166, 255, 0.3) !important;
|
elements with zero dimensions positioned off-screen. Override to keep it
|
||||||
}
|
within the viewport with non-zero dimensions so focus events fire. */
|
||||||
|
.terminal-container .xterm .xterm-helper-textarea {
|
||||||
/* Cursor styling */
|
left: 0 !important;
|
||||||
.terminal-container .xterm-cursor-layer {
|
top: 0 !important;
|
||||||
z-index: 4;
|
width: 1px !important;
|
||||||
|
height: 1px !important;
|
||||||
|
opacity: 0.01 !important;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Scrollbar inside terminal */
|
/* Scrollbar inside terminal */
|
||||||
|
|||||||
@ -203,25 +203,28 @@ async function launch(): Promise<void> {
|
|||||||
});
|
});
|
||||||
connected.value = true;
|
connected.value = true;
|
||||||
|
|
||||||
await nextTick();
|
// Instantiate terminal synchronously (before any further awaits) now that
|
||||||
|
// sessionId is known. Cleanup is owned by this component's onBeforeUnmount.
|
||||||
|
terminalInstance = useTerminal(sessionId, "pty");
|
||||||
|
|
||||||
if (containerRef.value) {
|
nextTick(() => {
|
||||||
terminalInstance = useTerminal(sessionId, "pty");
|
if (containerRef.value && terminalInstance) {
|
||||||
terminalInstance.mount(containerRef.value);
|
terminalInstance.mount(containerRef.value);
|
||||||
|
|
||||||
// Fit after mount to get real dimensions, then resize the PTY
|
// Fit after mount to get real dimensions, then resize the PTY
|
||||||
setTimeout(() => {
|
setTimeout(() => {
|
||||||
if (terminalInstance) {
|
if (terminalInstance) {
|
||||||
terminalInstance.fit();
|
terminalInstance.fit();
|
||||||
const term = terminalInstance.terminal;
|
const term = terminalInstance.terminal;
|
||||||
invoke("pty_resize", {
|
invoke("pty_resize", {
|
||||||
sessionId,
|
sessionId,
|
||||||
cols: term.cols,
|
cols: term.cols,
|
||||||
rows: term.rows,
|
rows: term.rows,
|
||||||
}).catch(() => {});
|
}).catch(() => {});
|
||||||
}
|
}
|
||||||
}, 50);
|
}, 50);
|
||||||
}
|
}
|
||||||
|
});
|
||||||
|
|
||||||
// Listen for shell exit
|
// Listen for shell exit
|
||||||
closeUnlisten = await listen(`pty:close:${sessionId}`, () => {
|
closeUnlisten = await listen(`pty:close:${sessionId}`, () => {
|
||||||
|
|||||||
@ -116,9 +116,9 @@ const connectionStore = useConnectionStore();
|
|||||||
const sessionStore = useSessionStore();
|
const sessionStore = useSessionStore();
|
||||||
|
|
||||||
const emit = defineEmits<{
|
const emit = defineEmits<{
|
||||||
(e: "open-import"): void;
|
"open-import": [];
|
||||||
(e: "open-settings"): void;
|
"open-settings": [];
|
||||||
(e: "open-new-connection", protocol?: "ssh" | "rdp"): void;
|
"open-new-connection": [protocol?: "ssh" | "rdp"];
|
||||||
}>();
|
}>();
|
||||||
|
|
||||||
const actions: PaletteAction[] = [
|
const actions: PaletteAction[] = [
|
||||||
|
|||||||
@ -320,25 +320,7 @@ async function checkUpdates(): Promise<void> {
|
|||||||
updateChecking.value = true;
|
updateChecking.value = true;
|
||||||
updateInfo.value = null;
|
updateInfo.value = null;
|
||||||
try {
|
try {
|
||||||
const { check } = await import("@tauri-apps/plugin-updater");
|
updateInfo.value = await invoke<UpdateCheckInfo>("check_for_updates");
|
||||||
const update = await check();
|
|
||||||
if (update?.available) {
|
|
||||||
updateInfo.value = {
|
|
||||||
currentVersion: await getVersion(),
|
|
||||||
latestVersion: update.version || "unknown",
|
|
||||||
updateAvailable: true,
|
|
||||||
downloadUrl: "",
|
|
||||||
releaseNotes: update.body || "",
|
|
||||||
};
|
|
||||||
} else {
|
|
||||||
updateInfo.value = {
|
|
||||||
currentVersion: await getVersion(),
|
|
||||||
latestVersion: await getVersion(),
|
|
||||||
updateAvailable: false,
|
|
||||||
downloadUrl: "",
|
|
||||||
releaseNotes: "",
|
|
||||||
};
|
|
||||||
}
|
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
alert(`Update check failed: ${err}`);
|
alert(`Update check failed: ${err}`);
|
||||||
}
|
}
|
||||||
@ -346,16 +328,11 @@ async function checkUpdates(): Promise<void> {
|
|||||||
}
|
}
|
||||||
|
|
||||||
async function downloadUpdate(): Promise<void> {
|
async function downloadUpdate(): Promise<void> {
|
||||||
|
if (!updateInfo.value?.downloadUrl) return;
|
||||||
try {
|
try {
|
||||||
const { check } = await import("@tauri-apps/plugin-updater");
|
await shellOpen(updateInfo.value.downloadUrl);
|
||||||
const update = await check();
|
} catch {
|
||||||
if (update?.available) {
|
window.open(updateInfo.value.downloadUrl, "_blank");
|
||||||
await update.downloadAndInstall();
|
|
||||||
const { relaunch } = await import("@tauri-apps/plugin-process");
|
|
||||||
await relaunch();
|
|
||||||
}
|
|
||||||
} catch (err) {
|
|
||||||
alert(`Update failed: ${err}`);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
const currentVersion = ref("loading...");
|
const currentVersion = ref("loading...");
|
||||||
@ -445,9 +422,16 @@ watch(
|
|||||||
() => settings.value.defaultProtocol,
|
() => settings.value.defaultProtocol,
|
||||||
(val) => invoke("set_setting", { key: "default_protocol", value: val }).catch(console.error),
|
(val) => invoke("set_setting", { key: "default_protocol", value: val }).catch(console.error),
|
||||||
);
|
);
|
||||||
|
let sidebarWidthDebounce: ReturnType<typeof setTimeout>;
|
||||||
watch(
|
watch(
|
||||||
() => settings.value.sidebarWidth,
|
() => settings.value.sidebarWidth,
|
||||||
(val) => invoke("set_setting", { key: "sidebar_width", value: String(val) }).catch(console.error),
|
(val) => {
|
||||||
|
clearTimeout(sidebarWidthDebounce);
|
||||||
|
sidebarWidthDebounce = setTimeout(
|
||||||
|
() => invoke("set_setting", { key: "sidebar_width", value: String(val) }).catch(console.error),
|
||||||
|
300,
|
||||||
|
);
|
||||||
|
},
|
||||||
);
|
);
|
||||||
watch(
|
watch(
|
||||||
() => settings.value.terminalTheme,
|
() => settings.value.terminalTheme,
|
||||||
|
|||||||
@ -1,5 +1,5 @@
|
|||||||
<template>
|
<template>
|
||||||
<div class="h-6 flex items-center justify-between px-4 bg-[var(--wraith-bg-secondary)] border-t border-[var(--wraith-border)] text-[10px] text-[var(--wraith-text-muted)] shrink-0">
|
<div class="h-[48px] flex items-center justify-between px-6 bg-[var(--wraith-bg-secondary)] border-t border-[var(--wraith-border)] text-base text-[var(--wraith-text-muted)] shrink-0">
|
||||||
<!-- Left: connection info -->
|
<!-- Left: connection info -->
|
||||||
<div class="flex items-center gap-3">
|
<div class="flex items-center gap-3">
|
||||||
<template v-if="sessionStore.activeSession">
|
<template v-if="sessionStore.activeSession">
|
||||||
@ -47,7 +47,7 @@ const connectionStore = useConnectionStore();
|
|||||||
const activeThemeName = ref("Default");
|
const activeThemeName = ref("Default");
|
||||||
|
|
||||||
const emit = defineEmits<{
|
const emit = defineEmits<{
|
||||||
(e: "open-theme-picker"): void;
|
"open-theme-picker": [];
|
||||||
}>();
|
}>();
|
||||||
|
|
||||||
const connectionInfo = computed(() => {
|
const connectionInfo = computed(() => {
|
||||||
|
|||||||
@ -112,6 +112,8 @@ export interface ThemeDefinition {
|
|||||||
brightMagenta: string;
|
brightMagenta: string;
|
||||||
brightCyan: string;
|
brightCyan: string;
|
||||||
brightWhite: string;
|
brightWhite: string;
|
||||||
|
selectionBackground?: string;
|
||||||
|
selectionForeground?: string;
|
||||||
isBuiltin?: boolean;
|
isBuiltin?: boolean;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -28,7 +28,8 @@
|
|||||||
</template>
|
</template>
|
||||||
|
|
||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref, onMounted, onBeforeUnmount, watch } from "vue";
|
import { ref, computed, onMounted, onBeforeUnmount, watch } from "vue";
|
||||||
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
import { useRdp, MouseFlag } from "@/composables/useRdp";
|
import { useRdp, MouseFlag } from "@/composables/useRdp";
|
||||||
|
|
||||||
const props = defineProps<{
|
const props = defineProps<{
|
||||||
@ -42,8 +43,8 @@ const containerRef = ref<HTMLElement | null>(null);
|
|||||||
const canvasWrapper = ref<HTMLElement | null>(null);
|
const canvasWrapper = ref<HTMLElement | null>(null);
|
||||||
const canvasRef = ref<HTMLCanvasElement | null>(null);
|
const canvasRef = ref<HTMLCanvasElement | null>(null);
|
||||||
|
|
||||||
const rdpWidth = props.width ?? 1920;
|
const rdpWidth = computed(() => props.width ?? 1920);
|
||||||
const rdpHeight = props.height ?? 1080;
|
const rdpHeight = computed(() => props.height ?? 1080);
|
||||||
|
|
||||||
const {
|
const {
|
||||||
connected,
|
connected,
|
||||||
@ -76,8 +77,8 @@ function toRdpCoords(e: MouseEvent): { x: number; y: number } | null {
|
|||||||
if (!canvas) return null;
|
if (!canvas) return null;
|
||||||
|
|
||||||
const rect = canvas.getBoundingClientRect();
|
const rect = canvas.getBoundingClientRect();
|
||||||
const scaleX = rdpWidth / rect.width;
|
const scaleX = canvas.width / rect.width;
|
||||||
const scaleY = rdpHeight / rect.height;
|
const scaleY = canvas.height / rect.height;
|
||||||
|
|
||||||
return {
|
return {
|
||||||
x: Math.floor((e.clientX - rect.left) * scaleX),
|
x: Math.floor((e.clientX - rect.left) * scaleX),
|
||||||
@ -153,25 +154,95 @@ function handleKeyUp(e: KeyboardEvent): void {
|
|||||||
sendKey(props.sessionId, e.code, false);
|
sendKey(props.sessionId, e.code, false);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
let resizeObserver: ResizeObserver | null = null;
|
||||||
|
let resizeTimeout: ReturnType<typeof setTimeout> | null = null;
|
||||||
|
|
||||||
onMounted(() => {
|
onMounted(() => {
|
||||||
if (canvasRef.value) {
|
if (canvasRef.value) {
|
||||||
startFrameLoop(props.sessionId, canvasRef.value, rdpWidth, rdpHeight);
|
startFrameLoop(props.sessionId, canvasRef.value, rdpWidth.value, rdpHeight.value);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch container size and request server-side RDP resize (debounced 500ms)
|
||||||
|
if (canvasWrapper.value) {
|
||||||
|
resizeObserver = new ResizeObserver((entries) => {
|
||||||
|
const entry = entries[0];
|
||||||
|
if (!entry || !connected.value) return;
|
||||||
|
const { width: cw, height: ch } = entry.contentRect;
|
||||||
|
if (cw < 200 || ch < 200) return;
|
||||||
|
|
||||||
|
// Round to even width (RDP spec requirement)
|
||||||
|
const newW = Math.round(cw) & ~1;
|
||||||
|
const newH = Math.round(ch);
|
||||||
|
|
||||||
|
if (resizeTimeout) clearTimeout(resizeTimeout);
|
||||||
|
resizeTimeout = setTimeout(() => {
|
||||||
|
invoke("rdp_resize", {
|
||||||
|
sessionId: props.sessionId,
|
||||||
|
width: newW,
|
||||||
|
height: newH,
|
||||||
|
}).then(() => {
|
||||||
|
if (canvasRef.value) {
|
||||||
|
canvasRef.value.width = newW;
|
||||||
|
canvasRef.value.height = newH;
|
||||||
|
}
|
||||||
|
// Force full frame after resize so canvas gets a clean repaint
|
||||||
|
setTimeout(() => {
|
||||||
|
invoke("rdp_force_refresh", { sessionId: props.sessionId }).catch(() => {});
|
||||||
|
}, 200);
|
||||||
|
}).catch((err: unknown) => {
|
||||||
|
console.warn("[RdpView] resize failed:", err);
|
||||||
|
});
|
||||||
|
}, 500);
|
||||||
|
});
|
||||||
|
resizeObserver.observe(canvasWrapper.value);
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
onBeforeUnmount(() => {
|
onBeforeUnmount(() => {
|
||||||
stopFrameLoop();
|
stopFrameLoop();
|
||||||
|
if (resizeObserver) { resizeObserver.disconnect(); resizeObserver = null; }
|
||||||
|
if (resizeTimeout) { clearTimeout(resizeTimeout); resizeTimeout = null; }
|
||||||
});
|
});
|
||||||
|
|
||||||
// Focus canvas when this tab becomes active and keyboard is grabbed
|
// Focus canvas, re-check dimensions, and force full frame on tab switch.
|
||||||
|
// Uses 300ms delay to let the flex layout fully settle (copilot panel toggle, etc.)
|
||||||
watch(
|
watch(
|
||||||
() => props.isActive,
|
() => props.isActive,
|
||||||
(active) => {
|
(active) => {
|
||||||
if (active && keyboardGrabbed.value && canvasRef.value) {
|
if (!active || !canvasRef.value) return;
|
||||||
setTimeout(() => {
|
|
||||||
canvasRef.value?.focus();
|
// Immediate focus so keyboard works right away
|
||||||
}, 0);
|
if (keyboardGrabbed.value) canvasRef.value.focus();
|
||||||
}
|
|
||||||
|
// Immediate force refresh to show SOMETHING while we check dimensions
|
||||||
|
invoke("rdp_force_refresh", { sessionId: props.sessionId }).catch(() => {});
|
||||||
|
|
||||||
|
// Delayed dimension check — layout needs time to settle
|
||||||
|
setTimeout(() => {
|
||||||
|
const wrapper = canvasWrapper.value;
|
||||||
|
const canvas = canvasRef.value;
|
||||||
|
if (!wrapper || !canvas) return;
|
||||||
|
|
||||||
|
const { width: cw, height: ch } = wrapper.getBoundingClientRect();
|
||||||
|
const newW = Math.round(cw) & ~1;
|
||||||
|
const newH = Math.round(ch);
|
||||||
|
|
||||||
|
if (newW >= 200 && newH >= 200 && (newW !== canvas.width || newH !== canvas.height)) {
|
||||||
|
invoke("rdp_resize", {
|
||||||
|
sessionId: props.sessionId,
|
||||||
|
width: newW,
|
||||||
|
height: newH,
|
||||||
|
}).then(() => {
|
||||||
|
if (canvas) {
|
||||||
|
canvas.width = newW;
|
||||||
|
canvas.height = newH;
|
||||||
|
}
|
||||||
|
setTimeout(() => {
|
||||||
|
invoke("rdp_force_refresh", { sessionId: props.sessionId }).catch(() => {});
|
||||||
|
}, 500);
|
||||||
|
}).catch(() => {});
|
||||||
|
}
|
||||||
|
}, 300);
|
||||||
},
|
},
|
||||||
);
|
);
|
||||||
</script>
|
</script>
|
||||||
@ -196,9 +267,8 @@ watch(
|
|||||||
}
|
}
|
||||||
|
|
||||||
.rdp-canvas {
|
.rdp-canvas {
|
||||||
max-width: 100%;
|
width: 100%;
|
||||||
max-height: 100%;
|
height: 100%;
|
||||||
object-fit: contain;
|
|
||||||
cursor: default;
|
cursor: default;
|
||||||
outline: none;
|
outline: none;
|
||||||
image-rendering: auto;
|
image-rendering: auto;
|
||||||
|
|||||||
75
src/components/session/DetachedSession.vue
Normal file
75
src/components/session/DetachedSession.vue
Normal file
@ -0,0 +1,75 @@
|
|||||||
|
<template>
|
||||||
|
<div class="h-screen w-screen flex flex-col bg-[#0d1117]">
|
||||||
|
<!-- Minimal title bar -->
|
||||||
|
<div class="h-8 flex items-center justify-between px-3 bg-[#161b22] border-b border-[#30363d] shrink-0" data-tauri-drag-region>
|
||||||
|
<span class="text-xs text-[#8b949e]">{{ sessionName }}</span>
|
||||||
|
<span class="text-[10px] text-[#484f58]">Detached — close to reattach</span>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<!-- Terminal -->
|
||||||
|
<div ref="containerRef" class="flex-1 min-h-0" />
|
||||||
|
|
||||||
|
<!-- Monitor bar for SSH sessions -->
|
||||||
|
<MonitorBar v-if="protocol === 'ssh'" :session-id="sessionId" />
|
||||||
|
</div>
|
||||||
|
</template>
|
||||||
|
|
||||||
|
<script setup lang="ts">
|
||||||
|
import { ref, onMounted, onBeforeUnmount } from "vue";
|
||||||
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
|
import { getCurrentWindow } from "@tauri-apps/api/window";
|
||||||
|
import { useTerminal } from "@/composables/useTerminal";
|
||||||
|
import MonitorBar from "@/components/terminal/MonitorBar.vue";
|
||||||
|
|
||||||
|
const sessionId = ref("");
|
||||||
|
const sessionName = ref("Detached Session");
|
||||||
|
const protocol = ref("ssh");
|
||||||
|
const containerRef = ref<HTMLElement | null>(null);
|
||||||
|
|
||||||
|
// Parse session info from URL hash synchronously so backend type is known at setup time
|
||||||
|
const hash = window.location.hash;
|
||||||
|
const params = new URLSearchParams(hash.split("?")[1] || "");
|
||||||
|
const _initialSessionId = params.get("sessionId") || "";
|
||||||
|
const _initialProtocol = params.get("protocol") || "ssh";
|
||||||
|
const _backend = (_initialProtocol === "local" ? "pty" : "ssh") as 'ssh' | 'pty';
|
||||||
|
|
||||||
|
const terminalInstance = useTerminal(_initialSessionId, _backend);
|
||||||
|
|
||||||
|
onMounted(async () => {
|
||||||
|
sessionId.value = _initialSessionId;
|
||||||
|
sessionName.value = decodeURIComponent(params.get("name") || "Detached Session");
|
||||||
|
protocol.value = _initialProtocol;
|
||||||
|
|
||||||
|
if (!sessionId.value || !containerRef.value) return;
|
||||||
|
|
||||||
|
terminalInstance.mount(containerRef.value);
|
||||||
|
|
||||||
|
setTimeout(() => {
|
||||||
|
terminalInstance.fit();
|
||||||
|
terminalInstance.terminal.focus();
|
||||||
|
|
||||||
|
const resizeCmd = _backend === "ssh" ? "ssh_resize" : "pty_resize";
|
||||||
|
invoke(resizeCmd, {
|
||||||
|
sessionId: sessionId.value,
|
||||||
|
cols: terminalInstance.terminal.cols,
|
||||||
|
rows: terminalInstance.terminal.rows,
|
||||||
|
}).catch(() => {});
|
||||||
|
}, 50);
|
||||||
|
|
||||||
|
// On window close, emit event so main window reattaches the tab
|
||||||
|
const appWindow = getCurrentWindow();
|
||||||
|
appWindow.onCloseRequested(async () => {
|
||||||
|
// Emit a custom event that the main window listens for
|
||||||
|
const { emit } = await import("@tauri-apps/api/event");
|
||||||
|
await emit("session:reattach", {
|
||||||
|
sessionId: sessionId.value,
|
||||||
|
name: sessionName.value,
|
||||||
|
protocol: protocol.value,
|
||||||
|
});
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
onBeforeUnmount(() => {
|
||||||
|
terminalInstance.destroy();
|
||||||
|
});
|
||||||
|
</script>
|
||||||
@ -91,16 +91,17 @@ function setTerminalRef(sessionId: string, el: unknown): void {
|
|||||||
|
|
||||||
const sessionStore = useSessionStore();
|
const sessionStore = useSessionStore();
|
||||||
|
|
||||||
|
// Only render sessions that are active (not detached to separate windows)
|
||||||
const sshSessions = computed(() =>
|
const sshSessions = computed(() =>
|
||||||
sessionStore.sessions.filter((s) => s.protocol === "ssh"),
|
sessionStore.sessions.filter((s) => s.protocol === "ssh" && s.active),
|
||||||
);
|
);
|
||||||
|
|
||||||
const localSessions = computed(() =>
|
const localSessions = computed(() =>
|
||||||
sessionStore.sessions.filter((s) => s.protocol === "local"),
|
sessionStore.sessions.filter((s) => s.protocol === "local" && s.active),
|
||||||
);
|
);
|
||||||
|
|
||||||
const rdpSessions = computed(() =>
|
const rdpSessions = computed(() =>
|
||||||
sessionStore.sessions.filter((s) => s.protocol === "rdp"),
|
sessionStore.sessions.filter((s) => s.protocol === "rdp" && s.active),
|
||||||
);
|
);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|||||||
@ -15,6 +15,7 @@
|
|||||||
isRootUser(session) ? 'border-t-2 border-t-[#f8514966]' : '',
|
isRootUser(session) ? 'border-t-2 border-t-[#f8514966]' : '',
|
||||||
dragOverIndex === index ? 'border-l-2 border-l-[var(--wraith-accent-blue)]' : '',
|
dragOverIndex === index ? 'border-l-2 border-l-[var(--wraith-accent-blue)]' : '',
|
||||||
session.hasActivity && session.id !== sessionStore.activeSessionId ? 'animate-pulse text-[var(--wraith-accent-blue)]' : '',
|
session.hasActivity && session.id !== sessionStore.activeSessionId ? 'animate-pulse text-[var(--wraith-accent-blue)]' : '',
|
||||||
|
!session.active ? 'opacity-40 italic' : '',
|
||||||
]"
|
]"
|
||||||
@click="sessionStore.activateSession(session.id)"
|
@click="sessionStore.activateSession(session.id)"
|
||||||
@dragstart="onDragStart(index, $event)"
|
@dragstart="onDragStart(index, $event)"
|
||||||
@ -22,6 +23,7 @@
|
|||||||
@dragleave="dragOverIndex = -1"
|
@dragleave="dragOverIndex = -1"
|
||||||
@drop.prevent="onDrop(index)"
|
@drop.prevent="onDrop(index)"
|
||||||
@dragend="draggedIndex = -1; dragOverIndex = -1"
|
@dragend="draggedIndex = -1; dragOverIndex = -1"
|
||||||
|
@contextmenu.prevent="showTabMenu($event, session)"
|
||||||
>
|
>
|
||||||
<!-- Badge: protocol dot + root dot + env pills -->
|
<!-- Badge: protocol dot + root dot + env pills -->
|
||||||
<TabBadge
|
<TabBadge
|
||||||
@ -70,11 +72,23 @@
|
|||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
<!-- Tab context menu -->
|
||||||
|
<Teleport to="body">
|
||||||
|
<div v-if="tabMenu.visible" class="fixed z-[100] w-44 bg-[#161b22] border border-[#30363d] rounded-lg shadow-2xl overflow-hidden py-1"
|
||||||
|
:style="{ top: tabMenu.y + 'px', left: tabMenu.x + 'px' }">
|
||||||
|
<button class="w-full px-4 py-2 text-xs text-left text-[var(--wraith-text-secondary)] hover:bg-[#30363d] hover:text-[var(--wraith-text-primary)] cursor-pointer"
|
||||||
|
@click="detachTab">Detach to Window</button>
|
||||||
|
<div class="border-t border-[#30363d] my-1" />
|
||||||
|
<button class="w-full px-4 py-2 text-xs text-left text-[var(--wraith-accent-red)] hover:bg-[#30363d] cursor-pointer"
|
||||||
|
@click="closeMenuTab">Close</button>
|
||||||
|
</div>
|
||||||
|
<div v-if="tabMenu.visible" class="fixed inset-0 z-[99]" @click="tabMenu.visible = false" @contextmenu.prevent="tabMenu.visible = false" />
|
||||||
|
</Teleport>
|
||||||
</div>
|
</div>
|
||||||
</template>
|
</template>
|
||||||
|
|
||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref, onMounted } from "vue";
|
import { ref, onMounted, onBeforeUnmount } from "vue";
|
||||||
import { invoke } from "@tauri-apps/api/core";
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
import { useSessionStore, type Session } from "@/stores/session.store";
|
import { useSessionStore, type Session } from "@/stores/session.store";
|
||||||
import { useConnectionStore } from "@/stores/connection.store";
|
import { useConnectionStore } from "@/stores/connection.store";
|
||||||
@ -101,12 +115,64 @@ async function spawnShell(shell: ShellInfo): Promise<void> {
|
|||||||
await sessionStore.spawnLocalTab(shell.name, shell.path);
|
await sessionStore.spawnLocalTab(shell.name, shell.path);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Tab right-click context menu
|
||||||
|
const tabMenu = ref<{ visible: boolean; x: number; y: number; session: Session | null }>({
|
||||||
|
visible: false, x: 0, y: 0, session: null,
|
||||||
|
});
|
||||||
|
|
||||||
|
function showTabMenu(event: MouseEvent, session: Session): void {
|
||||||
|
tabMenu.value = { visible: true, x: event.clientX, y: event.clientY, session };
|
||||||
|
}
|
||||||
|
|
||||||
|
async function detachTab(): Promise<void> {
|
||||||
|
const session = tabMenu.value.session;
|
||||||
|
tabMenu.value.visible = false;
|
||||||
|
if (!session) return;
|
||||||
|
|
||||||
|
// Mark as detached in the store
|
||||||
|
session.active = false;
|
||||||
|
|
||||||
|
// Open a new Tauri window for this session
|
||||||
|
try {
|
||||||
|
await invoke("open_child_window", {
|
||||||
|
label: `detached-${session.id.substring(0, 8)}-${Date.now()}`,
|
||||||
|
title: `${session.name} — Wraith`,
|
||||||
|
url: `index.html#/detached-session?sessionId=${session.id}&name=${encodeURIComponent(session.name)}&protocol=${session.protocol}`,
|
||||||
|
width: 900, height: 600,
|
||||||
|
});
|
||||||
|
} catch (err) { console.error("Detach window error:", err); }
|
||||||
|
}
|
||||||
|
|
||||||
|
function closeMenuTab(): void {
|
||||||
|
const session = tabMenu.value.session;
|
||||||
|
tabMenu.value.visible = false;
|
||||||
|
if (session) sessionStore.closeSession(session.id);
|
||||||
|
}
|
||||||
|
|
||||||
|
import { listen } from "@tauri-apps/api/event";
|
||||||
|
import type { UnlistenFn } from "@tauri-apps/api/event";
|
||||||
|
|
||||||
|
let unlistenReattach: UnlistenFn | null = null;
|
||||||
|
|
||||||
onMounted(async () => {
|
onMounted(async () => {
|
||||||
try {
|
try {
|
||||||
availableShells.value = await invoke<ShellInfo[]>("list_available_shells");
|
availableShells.value = await invoke<ShellInfo[]>("list_available_shells");
|
||||||
} catch {
|
} catch {
|
||||||
availableShells.value = [];
|
availableShells.value = [];
|
||||||
}
|
}
|
||||||
|
|
||||||
|
unlistenReattach = await listen<{ sessionId: string; name: string; protocol: string }>("session:reattach", (event) => {
|
||||||
|
const { sessionId } = event.payload;
|
||||||
|
const session = sessionStore.sessions.find(s => s.id === sessionId);
|
||||||
|
if (session) {
|
||||||
|
session.active = true;
|
||||||
|
sessionStore.activateSession(sessionId);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
onBeforeUnmount(() => {
|
||||||
|
unlistenReattach?.();
|
||||||
});
|
});
|
||||||
|
|
||||||
// Drag-and-drop tab reordering
|
// Drag-and-drop tab reordering
|
||||||
|
|||||||
@ -371,6 +371,31 @@ function handleFileSelected(event: Event): void {
|
|||||||
failTransfer(transferId);
|
failTransfer(transferId);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Guard: the backend sftp_write_file command accepts a UTF-8 string only.
|
||||||
|
// Binary files (images, archives, executables, etc.) will be corrupted if
|
||||||
|
// sent as text. Warn and abort for known binary extensions or large files.
|
||||||
|
const BINARY_EXTENSIONS = new Set([
|
||||||
|
"png", "jpg", "jpeg", "gif", "webp", "bmp", "ico", "tiff", "svg",
|
||||||
|
"zip", "tar", "gz", "bz2", "xz", "7z", "rar", "zst",
|
||||||
|
"exe", "dll", "so", "dylib", "bin", "elf",
|
||||||
|
"pdf", "doc", "docx", "xls", "xlsx", "ppt", "pptx",
|
||||||
|
"mp3", "mp4", "avi", "mkv", "mov", "flac", "wav", "ogg",
|
||||||
|
"ttf", "otf", "woff", "woff2",
|
||||||
|
"db", "sqlite", "sqlite3",
|
||||||
|
]);
|
||||||
|
const ext = file.name.split(".").pop()?.toLowerCase() ?? "";
|
||||||
|
const isBinary = BINARY_EXTENSIONS.has(ext);
|
||||||
|
const isLarge = file.size > 1 * 1024 * 1024; // 1 MB
|
||||||
|
|
||||||
|
if (isBinary || isLarge) {
|
||||||
|
const reason = isBinary
|
||||||
|
? `"${ext}" files are binary and cannot be safely uploaded as text`
|
||||||
|
: `file is ${(file.size / (1024 * 1024)).toFixed(1)} MB — only text files under 1 MB are supported`;
|
||||||
|
alert(`Upload blocked: ${reason}.\n\nBinary file upload support will be added in a future release.`);
|
||||||
|
failTransfer(transferId);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
reader.readAsText(file);
|
reader.readAsText(file);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -52,11 +52,15 @@
|
|||||||
</template>
|
</template>
|
||||||
|
|
||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref } from "vue";
|
import { ref, watch } from "vue";
|
||||||
import { useTransfers } from "@/composables/useTransfers";
|
import { useTransfers } from "@/composables/useTransfers";
|
||||||
|
|
||||||
const expanded = ref(false);
|
const expanded = ref(false);
|
||||||
|
const { transfers } = useTransfers();
|
||||||
|
|
||||||
// Auto-expand when transfers become active, collapse when all are gone
|
// Auto-expand when transfers become active, collapse when all are gone
|
||||||
const { transfers } = useTransfers();
|
watch(() => transfers.value.length, (newLen, oldLen) => {
|
||||||
|
if (newLen > 0 && oldLen === 0) expanded.value = true;
|
||||||
|
if (newLen === 0) expanded.value = false;
|
||||||
|
});
|
||||||
</script>
|
</script>
|
||||||
|
|||||||
@ -110,7 +110,7 @@
|
|||||||
</template>
|
</template>
|
||||||
|
|
||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref } from "vue";
|
import { ref, watch } from "vue";
|
||||||
import { invoke } from "@tauri-apps/api/core";
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
import { useConnectionStore, type Connection, type Group } from "@/stores/connection.store";
|
import { useConnectionStore, type Connection, type Group } from "@/stores/connection.store";
|
||||||
import { useSessionStore } from "@/stores/session.store";
|
import { useSessionStore } from "@/stores/session.store";
|
||||||
@ -224,6 +224,15 @@ const expandedGroups = ref<Set<number>>(
|
|||||||
new Set(connectionStore.groups.map((g) => g.id)),
|
new Set(connectionStore.groups.map((g) => g.id)),
|
||||||
);
|
);
|
||||||
|
|
||||||
|
// Auto-expand groups added after initial load
|
||||||
|
watch(() => connectionStore.groups, (newGroups) => {
|
||||||
|
for (const group of newGroups) {
|
||||||
|
if (!expandedGroups.value.has(group.id)) {
|
||||||
|
expandedGroups.value.add(group.id);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}, { deep: true });
|
||||||
|
|
||||||
function toggleGroup(groupId: number): void {
|
function toggleGroup(groupId: number): void {
|
||||||
if (expandedGroups.value.has(groupId)) {
|
if (expandedGroups.value.has(groupId)) {
|
||||||
expandedGroups.value.delete(groupId);
|
expandedGroups.value.delete(groupId);
|
||||||
|
|||||||
@ -5,11 +5,11 @@
|
|||||||
:key="tab.id"
|
:key="tab.id"
|
||||||
class="flex-1 py-2 text-xs font-medium text-center transition-colors cursor-pointer"
|
class="flex-1 py-2 text-xs font-medium text-center transition-colors cursor-pointer"
|
||||||
:class="
|
:class="
|
||||||
modelValue === tab.id
|
model === tab.id
|
||||||
? 'text-[var(--wraith-accent-blue)] border-b-2 border-[var(--wraith-accent-blue)]'
|
? 'text-[var(--wraith-accent-blue)] border-b-2 border-[var(--wraith-accent-blue)]'
|
||||||
: 'text-[var(--wraith-text-muted)] hover:text-[var(--wraith-text-secondary)]'
|
: 'text-[var(--wraith-text-muted)] hover:text-[var(--wraith-text-secondary)]'
|
||||||
"
|
"
|
||||||
@click="emit('update:modelValue', tab.id)"
|
@click="model = tab.id"
|
||||||
>
|
>
|
||||||
{{ tab.label }}
|
{{ tab.label }}
|
||||||
</button>
|
</button>
|
||||||
@ -24,11 +24,5 @@ const tabs = [
|
|||||||
{ id: "sftp" as const, label: "SFTP" },
|
{ id: "sftp" as const, label: "SFTP" },
|
||||||
];
|
];
|
||||||
|
|
||||||
defineProps<{
|
const model = defineModel<SidebarTab>();
|
||||||
modelValue: SidebarTab;
|
|
||||||
}>();
|
|
||||||
|
|
||||||
const emit = defineEmits<{
|
|
||||||
"update:modelValue": [tab: SidebarTab];
|
|
||||||
}>();
|
|
||||||
</script>
|
</script>
|
||||||
|
|||||||
@ -9,9 +9,10 @@
|
|||||||
</template>
|
</template>
|
||||||
|
|
||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref, onMounted, watch } from "vue";
|
import { ref, onMounted, onBeforeUnmount, watch } from "vue";
|
||||||
import { invoke } from "@tauri-apps/api/core";
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
import { useTerminal } from "@/composables/useTerminal";
|
import { useTerminal } from "@/composables/useTerminal";
|
||||||
|
import { useSessionStore } from "@/stores/session.store";
|
||||||
import "@/assets/css/terminal.css";
|
import "@/assets/css/terminal.css";
|
||||||
|
|
||||||
const props = defineProps<{
|
const props = defineProps<{
|
||||||
@ -19,13 +20,57 @@ const props = defineProps<{
|
|||||||
isActive: boolean;
|
isActive: boolean;
|
||||||
}>();
|
}>();
|
||||||
|
|
||||||
|
const sessionStore = useSessionStore();
|
||||||
const containerRef = ref<HTMLElement | null>(null);
|
const containerRef = ref<HTMLElement | null>(null);
|
||||||
const { terminal, mount, fit } = useTerminal(props.sessionId, "pty");
|
const { terminal, mount, fit, destroy } = useTerminal(props.sessionId, "pty");
|
||||||
|
|
||||||
|
/** Apply the session store's active theme to this local terminal instance. */
|
||||||
|
function applyTheme(): void {
|
||||||
|
const theme = sessionStore.activeTheme;
|
||||||
|
if (!theme) return;
|
||||||
|
terminal.options.theme = {
|
||||||
|
background: theme.background,
|
||||||
|
foreground: theme.foreground,
|
||||||
|
cursor: theme.cursor,
|
||||||
|
cursorAccent: theme.background,
|
||||||
|
selectionBackground: theme.selectionBackground ?? "#264f78",
|
||||||
|
selectionForeground: theme.selectionForeground ?? "#ffffff",
|
||||||
|
selectionInactiveBackground: theme.selectionBackground ?? "#264f78",
|
||||||
|
black: theme.black,
|
||||||
|
red: theme.red,
|
||||||
|
green: theme.green,
|
||||||
|
yellow: theme.yellow,
|
||||||
|
blue: theme.blue,
|
||||||
|
magenta: theme.magenta,
|
||||||
|
cyan: theme.cyan,
|
||||||
|
white: theme.white,
|
||||||
|
brightBlack: theme.brightBlack,
|
||||||
|
brightRed: theme.brightRed,
|
||||||
|
brightGreen: theme.brightGreen,
|
||||||
|
brightYellow: theme.brightYellow,
|
||||||
|
brightBlue: theme.brightBlue,
|
||||||
|
brightMagenta: theme.brightMagenta,
|
||||||
|
brightCyan: theme.brightCyan,
|
||||||
|
brightWhite: theme.brightWhite,
|
||||||
|
};
|
||||||
|
|
||||||
|
if (containerRef.value) {
|
||||||
|
containerRef.value.style.backgroundColor = theme.background;
|
||||||
|
}
|
||||||
|
|
||||||
|
terminal.refresh(0, terminal.rows - 1);
|
||||||
|
}
|
||||||
|
|
||||||
onMounted(() => {
|
onMounted(() => {
|
||||||
if (containerRef.value) {
|
if (containerRef.value) {
|
||||||
mount(containerRef.value);
|
mount(containerRef.value);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Apply current theme immediately if one is already active
|
||||||
|
if (sessionStore.activeTheme) {
|
||||||
|
applyTheme();
|
||||||
|
}
|
||||||
|
|
||||||
setTimeout(() => {
|
setTimeout(() => {
|
||||||
fit();
|
fit();
|
||||||
terminal.focus();
|
terminal.focus();
|
||||||
@ -41,11 +86,27 @@ watch(
|
|||||||
() => props.isActive,
|
() => props.isActive,
|
||||||
(active) => {
|
(active) => {
|
||||||
if (active) {
|
if (active) {
|
||||||
setTimeout(() => {
|
requestAnimationFrame(() => {
|
||||||
fit();
|
requestAnimationFrame(() => {
|
||||||
terminal.focus();
|
fit();
|
||||||
}, 0);
|
terminal.focus();
|
||||||
|
invoke("pty_resize", {
|
||||||
|
sessionId: props.sessionId,
|
||||||
|
cols: terminal.cols,
|
||||||
|
rows: terminal.rows,
|
||||||
|
}).catch(() => {});
|
||||||
|
});
|
||||||
|
});
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
);
|
);
|
||||||
|
|
||||||
|
// Watch for theme changes and apply to this local terminal
|
||||||
|
watch(() => sessionStore.activeTheme, (newTheme) => {
|
||||||
|
if (newTheme) applyTheme();
|
||||||
|
}, { deep: true });
|
||||||
|
|
||||||
|
onBeforeUnmount(() => {
|
||||||
|
destroy();
|
||||||
|
});
|
||||||
</script>
|
</script>
|
||||||
|
|||||||
@ -1,7 +1,7 @@
|
|||||||
<template>
|
<template>
|
||||||
<div
|
<div
|
||||||
v-if="stats"
|
v-if="stats"
|
||||||
class="flex items-center gap-4 px-3 h-6 bg-[var(--wraith-bg-tertiary)] border-t border-[var(--wraith-border)] text-[10px] font-mono shrink-0 select-none"
|
class="flex items-center gap-4 px-6 h-[48px] bg-[var(--wraith-bg-tertiary)] border-t border-[var(--wraith-border)] text-base font-mono shrink-0 select-none"
|
||||||
>
|
>
|
||||||
<!-- CPU -->
|
<!-- CPU -->
|
||||||
<span class="flex items-center gap-1">
|
<span class="flex items-center gap-1">
|
||||||
@ -55,6 +55,7 @@ interface SystemStats {
|
|||||||
|
|
||||||
const stats = ref<SystemStats | null>(null);
|
const stats = ref<SystemStats | null>(null);
|
||||||
let unlistenFn: UnlistenFn | null = null;
|
let unlistenFn: UnlistenFn | null = null;
|
||||||
|
let subscribeGeneration = 0;
|
||||||
|
|
||||||
function colorClass(value: number, warnThreshold: number, critThreshold: number): string {
|
function colorClass(value: number, warnThreshold: number, critThreshold: number): string {
|
||||||
if (value >= critThreshold) return "text-[#f85149]"; // red
|
if (value >= critThreshold) return "text-[#f85149]"; // red
|
||||||
@ -70,10 +71,17 @@ function formatBytes(bytes: number): string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
async function subscribe(): Promise<void> {
|
async function subscribe(): Promise<void> {
|
||||||
|
const gen = ++subscribeGeneration;
|
||||||
if (unlistenFn) unlistenFn();
|
if (unlistenFn) unlistenFn();
|
||||||
unlistenFn = await listen<SystemStats>(`ssh:monitor:${props.sessionId}`, (event) => {
|
const fn = await listen<SystemStats>(`ssh:monitor:${props.sessionId}`, (event) => {
|
||||||
stats.value = event.payload;
|
stats.value = event.payload;
|
||||||
});
|
});
|
||||||
|
if (gen !== subscribeGeneration) {
|
||||||
|
// A newer subscribe() call has already taken over — discard this listener
|
||||||
|
fn();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
unlistenFn = fn;
|
||||||
}
|
}
|
||||||
|
|
||||||
onMounted(subscribe);
|
onMounted(subscribe);
|
||||||
|
|||||||
@ -59,10 +59,12 @@
|
|||||||
</template>
|
</template>
|
||||||
|
|
||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref, nextTick, onMounted, watch } from "vue";
|
import { ref, nextTick, onMounted, onBeforeUnmount, watch } from "vue";
|
||||||
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
import { useTerminal } from "@/composables/useTerminal";
|
import { useTerminal } from "@/composables/useTerminal";
|
||||||
import { useSessionStore } from "@/stores/session.store";
|
import { useSessionStore } from "@/stores/session.store";
|
||||||
import MonitorBar from "@/components/terminal/MonitorBar.vue";
|
import MonitorBar from "@/components/terminal/MonitorBar.vue";
|
||||||
|
import type { IDisposable } from "@xterm/xterm";
|
||||||
import "@/assets/css/terminal.css";
|
import "@/assets/css/terminal.css";
|
||||||
|
|
||||||
const props = defineProps<{
|
const props = defineProps<{
|
||||||
@ -73,6 +75,11 @@ const props = defineProps<{
|
|||||||
const sessionStore = useSessionStore();
|
const sessionStore = useSessionStore();
|
||||||
const containerRef = ref<HTMLElement | null>(null);
|
const containerRef = ref<HTMLElement | null>(null);
|
||||||
const { terminal, searchAddon, mount, fit } = useTerminal(props.sessionId);
|
const { terminal, searchAddon, mount, fit } = useTerminal(props.sessionId);
|
||||||
|
let resizeDisposable: IDisposable | null = null;
|
||||||
|
|
||||||
|
function handleFocus(): void {
|
||||||
|
terminal.focus();
|
||||||
|
}
|
||||||
|
|
||||||
// --- Search state ---
|
// --- Search state ---
|
||||||
const searchVisible = ref(false);
|
const searchVisible = ref(false);
|
||||||
@ -138,7 +145,7 @@ onMounted(() => {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Track terminal dimensions in the session store
|
// Track terminal dimensions in the session store
|
||||||
terminal.onResize(({ cols, rows }) => {
|
resizeDisposable = terminal.onResize(({ cols, rows }) => {
|
||||||
sessionStore.setTerminalDimensions(props.sessionId, cols, rows);
|
sessionStore.setTerminalDimensions(props.sessionId, cols, rows);
|
||||||
});
|
});
|
||||||
|
|
||||||
@ -149,15 +156,27 @@ onMounted(() => {
|
|||||||
}, 50);
|
}, 50);
|
||||||
});
|
});
|
||||||
|
|
||||||
// Re-fit and focus terminal when switching back to this tab
|
// Re-fit and focus terminal when switching back to this tab.
|
||||||
|
// Must wait for the container to have real dimensions after becoming visible.
|
||||||
watch(
|
watch(
|
||||||
() => props.isActive,
|
() => props.isActive,
|
||||||
(active) => {
|
(active) => {
|
||||||
if (active) {
|
if (active) {
|
||||||
setTimeout(() => {
|
// Double rAF ensures the container has been laid out by the browser
|
||||||
fit();
|
requestAnimationFrame(() => {
|
||||||
terminal.focus();
|
requestAnimationFrame(() => {
|
||||||
}, 0);
|
fit();
|
||||||
|
terminal.focus();
|
||||||
|
// Also notify the backend of the correct size
|
||||||
|
const session = sessionStore.sessions.find(s => s.id === props.sessionId);
|
||||||
|
const resizeCmd = session?.protocol === "local" ? "pty_resize" : "ssh_resize";
|
||||||
|
invoke(resizeCmd, {
|
||||||
|
sessionId: props.sessionId,
|
||||||
|
cols: terminal.cols,
|
||||||
|
rows: terminal.rows,
|
||||||
|
}).catch(() => {});
|
||||||
|
});
|
||||||
|
});
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
);
|
);
|
||||||
@ -170,6 +189,10 @@ function applyTheme(): void {
|
|||||||
background: theme.background,
|
background: theme.background,
|
||||||
foreground: theme.foreground,
|
foreground: theme.foreground,
|
||||||
cursor: theme.cursor,
|
cursor: theme.cursor,
|
||||||
|
cursorAccent: theme.background,
|
||||||
|
selectionBackground: theme.selectionBackground ?? "#264f78",
|
||||||
|
selectionForeground: theme.selectionForeground ?? "#ffffff",
|
||||||
|
selectionInactiveBackground: theme.selectionBackground ?? "#264f78",
|
||||||
black: theme.black,
|
black: theme.black,
|
||||||
red: theme.red,
|
red: theme.red,
|
||||||
green: theme.green,
|
green: theme.green,
|
||||||
@ -187,14 +210,27 @@ function applyTheme(): void {
|
|||||||
brightCyan: theme.brightCyan,
|
brightCyan: theme.brightCyan,
|
||||||
brightWhite: theme.brightWhite,
|
brightWhite: theme.brightWhite,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Sync the container background so areas outside the canvas match the theme
|
||||||
|
if (containerRef.value) {
|
||||||
|
containerRef.value.style.backgroundColor = theme.background;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Force xterm.js to repaint all visible rows with the new theme colors
|
||||||
|
terminal.refresh(0, terminal.rows - 1);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Watch for theme changes in the session store and apply to this terminal
|
// Watch for theme changes in the session store and apply to this terminal.
|
||||||
|
// Uses deep comparison because the theme is an object — a shallow watch may miss
|
||||||
|
// updates if Pinia returns the same reactive proxy wrapper after reassignment.
|
||||||
watch(() => sessionStore.activeTheme, (newTheme) => {
|
watch(() => sessionStore.activeTheme, (newTheme) => {
|
||||||
if (newTheme) applyTheme();
|
if (newTheme) applyTheme();
|
||||||
});
|
}, { deep: true });
|
||||||
|
|
||||||
function handleFocus(): void {
|
onBeforeUnmount(() => {
|
||||||
terminal.focus();
|
if (resizeDisposable) {
|
||||||
}
|
resizeDisposable.dispose();
|
||||||
|
resizeDisposable = null;
|
||||||
|
}
|
||||||
|
});
|
||||||
</script>
|
</script>
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
<template>
|
<template>
|
||||||
<div class="flex flex-col h-full p-4 gap-3">
|
<ToolShell ref="shell" placeholder="Select a mode and click Run Test">
|
||||||
<div class="flex items-center gap-2">
|
<template #default="{ running }">
|
||||||
<select v-model="mode" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none cursor-pointer">
|
<select v-model="mode" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none cursor-pointer">
|
||||||
<option value="speedtest">Internet Speed Test</option>
|
<option value="speedtest">Internet Speed Test</option>
|
||||||
<option value="iperf">iperf3 (LAN)</option>
|
<option value="iperf">iperf3 (LAN)</option>
|
||||||
@ -13,32 +13,31 @@
|
|||||||
<button class="px-4 py-1.5 text-sm font-bold rounded bg-[#58a6ff] text-black cursor-pointer disabled:opacity-40" :disabled="running" @click="run">
|
<button class="px-4 py-1.5 text-sm font-bold rounded bg-[#58a6ff] text-black cursor-pointer disabled:opacity-40" :disabled="running" @click="run">
|
||||||
{{ running ? "Testing..." : "Run Test" }}
|
{{ running ? "Testing..." : "Run Test" }}
|
||||||
</button>
|
</button>
|
||||||
</div>
|
</template>
|
||||||
<pre class="flex-1 overflow-auto bg-[#161b22] border border-[#30363d] rounded p-3 text-xs font-mono whitespace-pre-wrap text-[#e0e0e0]">{{ output || "Select a mode and click Run Test" }}</pre>
|
</ToolShell>
|
||||||
</div>
|
|
||||||
</template>
|
</template>
|
||||||
|
|
||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref } from "vue";
|
import { ref } from "vue";
|
||||||
import { invoke } from "@tauri-apps/api/core";
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
|
import ToolShell from "./ToolShell.vue";
|
||||||
|
|
||||||
const props = defineProps<{ sessionId: string }>();
|
const props = defineProps<{ sessionId: string }>();
|
||||||
const mode = ref("speedtest");
|
const mode = ref("speedtest");
|
||||||
const server = ref("");
|
const server = ref("");
|
||||||
const duration = ref(5);
|
const duration = ref(5);
|
||||||
const output = ref("");
|
const shell = ref<InstanceType<typeof ToolShell> | null>(null);
|
||||||
const running = ref(false);
|
|
||||||
|
|
||||||
async function run(): Promise<void> {
|
async function run(): Promise<void> {
|
||||||
running.value = true;
|
if (mode.value === "iperf" && !server.value) {
|
||||||
output.value = mode.value === "iperf" ? `Running iperf3 to ${server.value}...\n` : "Running speed test...\n";
|
shell.value?.setOutput("Enter an iperf3 server IP");
|
||||||
try {
|
return;
|
||||||
|
}
|
||||||
|
shell.value?.execute(() => {
|
||||||
if (mode.value === "iperf") {
|
if (mode.value === "iperf") {
|
||||||
if (!server.value) { output.value = "Enter an iperf3 server IP"; running.value = false; return; }
|
return invoke<string>("tool_bandwidth_iperf", { sessionId: props.sessionId, server: server.value, duration: duration.value });
|
||||||
output.value = await invoke<string>("tool_bandwidth_iperf", { sessionId: props.sessionId, server: server.value, duration: duration.value });
|
|
||||||
} else {
|
|
||||||
output.value = await invoke<string>("tool_bandwidth_speedtest", { sessionId: props.sessionId });
|
|
||||||
}
|
}
|
||||||
} catch (err) { output.value = String(err); }
|
return invoke<string>("tool_bandwidth_speedtest", { sessionId: props.sessionId });
|
||||||
running.value = false;
|
});
|
||||||
}
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|||||||
@ -1,31 +1,29 @@
|
|||||||
<template>
|
<template>
|
||||||
<div class="flex flex-col h-full p-4 gap-3">
|
<ToolShell ref="shell" placeholder="Enter a domain and click Lookup">
|
||||||
<div class="flex items-center gap-2">
|
<template #default="{ running }">
|
||||||
<input v-model="domain" type="text" placeholder="Domain name" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none focus:border-[#58a6ff] flex-1" @keydown.enter="lookup" />
|
<input v-model="domain" type="text" placeholder="Domain name" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none focus:border-[#58a6ff] flex-1" @keydown.enter="lookup" />
|
||||||
<select v-model="recordType" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none cursor-pointer">
|
<select v-model="recordType" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none cursor-pointer">
|
||||||
<option v-for="t in ['A','AAAA','MX','NS','TXT','CNAME','SOA','SRV','PTR']" :key="t" :value="t">{{ t }}</option>
|
<option v-for="t in ['A','AAAA','MX','NS','TXT','CNAME','SOA','SRV','PTR']" :key="t" :value="t">{{ t }}</option>
|
||||||
</select>
|
</select>
|
||||||
<button class="px-4 py-1.5 text-sm font-bold rounded bg-[#58a6ff] text-black cursor-pointer disabled:opacity-40" :disabled="running" @click="lookup">Lookup</button>
|
<button class="px-4 py-1.5 text-sm font-bold rounded bg-[#58a6ff] text-black cursor-pointer disabled:opacity-40" :disabled="running" @click="lookup">Lookup</button>
|
||||||
</div>
|
</template>
|
||||||
<pre class="flex-1 overflow-auto bg-[#161b22] border border-[#30363d] rounded p-3 text-xs font-mono whitespace-pre-wrap text-[#e0e0e0]">{{ output || "Enter a domain and click Lookup" }}</pre>
|
</ToolShell>
|
||||||
</div>
|
|
||||||
</template>
|
</template>
|
||||||
|
|
||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref } from "vue";
|
import { ref } from "vue";
|
||||||
import { invoke } from "@tauri-apps/api/core";
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
|
import ToolShell from "./ToolShell.vue";
|
||||||
|
|
||||||
const props = defineProps<{ sessionId: string }>();
|
const props = defineProps<{ sessionId: string }>();
|
||||||
const domain = ref("");
|
const domain = ref("");
|
||||||
const recordType = ref("A");
|
const recordType = ref("A");
|
||||||
const output = ref("");
|
const shell = ref<InstanceType<typeof ToolShell> | null>(null);
|
||||||
const running = ref(false);
|
|
||||||
|
|
||||||
async function lookup(): Promise<void> {
|
async function lookup(): Promise<void> {
|
||||||
if (!domain.value) return;
|
if (!domain.value) return;
|
||||||
running.value = true;
|
shell.value?.execute(() =>
|
||||||
try {
|
invoke<string>("tool_dns_lookup", { sessionId: props.sessionId, domain: domain.value, recordType: recordType.value })
|
||||||
output.value = await invoke<string>("tool_dns_lookup", { sessionId: props.sessionId, domain: domain.value, recordType: recordType.value });
|
);
|
||||||
} catch (err) { output.value = String(err); }
|
|
||||||
running.value = false;
|
|
||||||
}
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|||||||
@ -81,12 +81,16 @@
|
|||||||
import { ref, onMounted } from "vue";
|
import { ref, onMounted } from "vue";
|
||||||
import { invoke } from "@tauri-apps/api/core";
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
|
|
||||||
|
interface DockerContainer { id: string; name: string; image: string; status: string; ports: string; }
|
||||||
|
interface DockerImage { repository: string; tag: string; id: string; size: string; }
|
||||||
|
interface DockerVolume { name: string; driver: string; mountpoint: string; }
|
||||||
|
|
||||||
const props = defineProps<{ sessionId: string }>();
|
const props = defineProps<{ sessionId: string }>();
|
||||||
|
|
||||||
const tab = ref("containers");
|
const tab = ref("containers");
|
||||||
const containers = ref<any[]>([]);
|
const containers = ref<DockerContainer[]>([]);
|
||||||
const images = ref<any[]>([]);
|
const images = ref<DockerImage[]>([]);
|
||||||
const volumes = ref<any[]>([]);
|
const volumes = ref<DockerVolume[]>([]);
|
||||||
const output = ref("");
|
const output = ref("");
|
||||||
|
|
||||||
async function refresh(): Promise<void> {
|
async function refresh(): Promise<void> {
|
||||||
|
|||||||
219
src/components/tools/HelpWindow.vue
Normal file
219
src/components/tools/HelpWindow.vue
Normal file
@ -0,0 +1,219 @@
|
|||||||
|
<template>
|
||||||
|
<div class="flex flex-col h-full">
|
||||||
|
<!-- Tabs -->
|
||||||
|
<div class="flex items-center gap-1 px-4 py-2 bg-[#161b22] border-b border-[#30363d] shrink-0">
|
||||||
|
<button v-for="t in tabs" :key="t.id"
|
||||||
|
class="px-3 py-1 text-xs rounded cursor-pointer transition-colors"
|
||||||
|
:class="activeTab === t.id ? 'bg-[#58a6ff] text-black font-bold' : 'text-[#8b949e] hover:text-white'"
|
||||||
|
@click="activeTab = t.id"
|
||||||
|
>{{ t.label }}</button>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div class="flex-1 overflow-auto p-6">
|
||||||
|
<!-- Getting Started -->
|
||||||
|
<div v-if="activeTab === 'guide'" class="prose-wraith">
|
||||||
|
<h2>Getting Started with Wraith</h2>
|
||||||
|
<p>Wraith is a native desktop SSH/SFTP/RDP client with an integrated AI copilot.</p>
|
||||||
|
|
||||||
|
<h3>Creating a Connection</h3>
|
||||||
|
<ol>
|
||||||
|
<li>Click <strong>File → New Connection</strong> or the <strong>+ Host</strong> button in the sidebar</li>
|
||||||
|
<li>Enter hostname, port, and protocol (SSH or RDP)</li>
|
||||||
|
<li>Optionally link a credential from the vault</li>
|
||||||
|
<li>Double-click the connection to connect</li>
|
||||||
|
</ol>
|
||||||
|
|
||||||
|
<h3>Quick Connect</h3>
|
||||||
|
<p>Type <code>user@host:port</code> in the Quick Connect bar and press Enter.</p>
|
||||||
|
|
||||||
|
<h3>AI Copilot</h3>
|
||||||
|
<p>Press <strong>Ctrl+Shift+G</strong> to open the AI copilot panel. Select a shell, click Launch, and run your AI CLI (Claude Code, Gemini, Codex).</p>
|
||||||
|
<p>Configure one-click launch presets in <strong>Settings → AI Copilot</strong>.</p>
|
||||||
|
|
||||||
|
<h3>Local Terminals</h3>
|
||||||
|
<p>Click the <strong>+</strong> button in the tab bar to open a local shell (PowerShell, CMD, Git Bash, WSL, bash, zsh).</p>
|
||||||
|
|
||||||
|
<h3>SFTP Browser</h3>
|
||||||
|
<p>Switch to the <strong>SFTP</strong> tab in the sidebar. It follows the active SSH session and tracks the current working directory.</p>
|
||||||
|
<p>Right-click files for Edit, Download, Rename, Delete.</p>
|
||||||
|
|
||||||
|
<h3>Tab Management</h3>
|
||||||
|
<ul>
|
||||||
|
<li><strong>Drag tabs</strong> to reorder</li>
|
||||||
|
<li><strong>Right-click tab</strong> → Detach to Window (pop out to separate window)</li>
|
||||||
|
<li>Close the detached window to reattach</li>
|
||||||
|
<li>Tabs pulse blue when there's new activity in the background</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<h3>Remote Monitoring</h3>
|
||||||
|
<p>Every SSH session shows a monitoring bar at the bottom with CPU, RAM, disk, and network stats — polled every 5 seconds. No agent needed.</p>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<!-- Keyboard Shortcuts -->
|
||||||
|
<div v-if="activeTab === 'shortcuts'" class="prose-wraith">
|
||||||
|
<h2>Keyboard Shortcuts</h2>
|
||||||
|
<table>
|
||||||
|
<thead><tr><th>Shortcut</th><th>Action</th></tr></thead>
|
||||||
|
<tbody>
|
||||||
|
<tr><td><kbd>Ctrl+K</kbd></td><td>Command Palette</td></tr>
|
||||||
|
<tr><td><kbd>Ctrl+Shift+G</kbd></td><td>Toggle AI Copilot</td></tr>
|
||||||
|
<tr><td><kbd>Ctrl+B</kbd></td><td>Toggle Sidebar</td></tr>
|
||||||
|
<tr><td><kbd>Ctrl+W</kbd></td><td>Close Active Tab</td></tr>
|
||||||
|
<tr><td><kbd>Ctrl+Tab</kbd></td><td>Next Tab</td></tr>
|
||||||
|
<tr><td><kbd>Ctrl+Shift+Tab</kbd></td><td>Previous Tab</td></tr>
|
||||||
|
<tr><td><kbd>Ctrl+1-9</kbd></td><td>Switch to Tab N</td></tr>
|
||||||
|
<tr><td><kbd>Ctrl+F</kbd></td><td>Find in Terminal</td></tr>
|
||||||
|
<tr><td><kbd>Ctrl+S</kbd></td><td>Save (in editor windows)</td></tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<h3>Terminal</h3>
|
||||||
|
<table>
|
||||||
|
<thead><tr><th>Action</th><th>How</th></tr></thead>
|
||||||
|
<tbody>
|
||||||
|
<tr><td>Copy</td><td>Select text (auto-copies)</td></tr>
|
||||||
|
<tr><td>Paste</td><td>Right-click</td></tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<!-- MCP Integration -->
|
||||||
|
<div v-if="activeTab === 'mcp'" class="prose-wraith">
|
||||||
|
<h2>MCP Integration (AI Tool Access)</h2>
|
||||||
|
<p>Wraith includes an MCP (Model Context Protocol) server that gives AI CLI tools programmatic access to your active sessions.</p>
|
||||||
|
|
||||||
|
<h3>Setup</h3>
|
||||||
|
<p>The MCP bridge binary is automatically downloaded to:</p>
|
||||||
|
<pre>{{ bridgePath }}</pre>
|
||||||
|
<p>Register with Claude Code:</p>
|
||||||
|
<pre>claude mcp add wraith -- "{{ bridgePath }}"</pre>
|
||||||
|
|
||||||
|
<h3>Available MCP Tools (18)</h3>
|
||||||
|
|
||||||
|
<h4>Session Management</h4>
|
||||||
|
<table>
|
||||||
|
<thead><tr><th>Tool</th><th>Description</th></tr></thead>
|
||||||
|
<tbody>
|
||||||
|
<tr><td><code>list_sessions</code></td><td>List all active SSH/RDP/PTY sessions</td></tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<h4>Terminal</h4>
|
||||||
|
<table>
|
||||||
|
<thead><tr><th>Tool</th><th>Description</th></tr></thead>
|
||||||
|
<tbody>
|
||||||
|
<tr><td><code>terminal_read</code></td><td>Read recent terminal output (ANSI stripped)</td></tr>
|
||||||
|
<tr><td><code>terminal_execute</code></td><td>Run a command and capture output</td></tr>
|
||||||
|
<tr><td><code>terminal_screenshot</code></td><td>Capture RDP frame as PNG</td></tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<h4>SFTP</h4>
|
||||||
|
<table>
|
||||||
|
<thead><tr><th>Tool</th><th>Description</th></tr></thead>
|
||||||
|
<tbody>
|
||||||
|
<tr><td><code>sftp_list</code></td><td>List remote directory</td></tr>
|
||||||
|
<tr><td><code>sftp_read</code></td><td>Read remote file</td></tr>
|
||||||
|
<tr><td><code>sftp_write</code></td><td>Write remote file</td></tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<h4>Network</h4>
|
||||||
|
<table>
|
||||||
|
<thead><tr><th>Tool</th><th>Description</th></tr></thead>
|
||||||
|
<tbody>
|
||||||
|
<tr><td><code>network_scan</code></td><td>ARP + ping sweep subnet discovery</td></tr>
|
||||||
|
<tr><td><code>port_scan</code></td><td>TCP port scan</td></tr>
|
||||||
|
<tr><td><code>ping</code></td><td>Ping a host</td></tr>
|
||||||
|
<tr><td><code>traceroute</code></td><td>Traceroute to host</td></tr>
|
||||||
|
<tr><td><code>dns_lookup</code></td><td>DNS query (A, MX, TXT, etc.)</td></tr>
|
||||||
|
<tr><td><code>whois</code></td><td>Whois lookup</td></tr>
|
||||||
|
<tr><td><code>wake_on_lan</code></td><td>Send WoL magic packet</td></tr>
|
||||||
|
<tr><td><code>bandwidth_test</code></td><td>Internet speed test</td></tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<h4>Utilities (no session needed)</h4>
|
||||||
|
<table>
|
||||||
|
<thead><tr><th>Tool</th><th>Description</th></tr></thead>
|
||||||
|
<tbody>
|
||||||
|
<tr><td><code>subnet_calc</code></td><td>Subnet calculator</td></tr>
|
||||||
|
<tr><td><code>generate_ssh_key</code></td><td>Generate SSH key pair</td></tr>
|
||||||
|
<tr><td><code>generate_password</code></td><td>Generate secure password</td></tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<h3>How It Works</h3>
|
||||||
|
<ol>
|
||||||
|
<li>Wraith starts an HTTP server on <code>localhost</code> (random port)</li>
|
||||||
|
<li>Port written to <code>mcp-port</code> in data directory</li>
|
||||||
|
<li>Bridge binary reads the port and proxies JSON-RPC over stdio</li>
|
||||||
|
<li>AI CLI spawns the bridge as an MCP server</li>
|
||||||
|
</ol>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<!-- About -->
|
||||||
|
<div v-if="activeTab === 'about'" class="prose-wraith">
|
||||||
|
<h2>About Wraith</h2>
|
||||||
|
<p class="text-2xl font-bold tracking-widest text-[#58a6ff]">WRAITH</p>
|
||||||
|
<p>Exists everywhere, all at once.</p>
|
||||||
|
|
||||||
|
<table>
|
||||||
|
<tbody>
|
||||||
|
<tr><td>Version</td><td>{{ version }}</td></tr>
|
||||||
|
<tr><td>Runtime</td><td>Tauri v2 + Rust</td></tr>
|
||||||
|
<tr><td>Frontend</td><td>Vue 3 + TypeScript</td></tr>
|
||||||
|
<tr><td>Terminal</td><td>xterm.js 6</td></tr>
|
||||||
|
<tr><td>SSH</td><td>russh 0.48</td></tr>
|
||||||
|
<tr><td>RDP</td><td>ironrdp 0.14</td></tr>
|
||||||
|
<tr><td>License</td><td>Proprietary</td></tr>
|
||||||
|
<tr><td>Publisher</td><td>Vigilance Cyber / Vigilsynth</td></tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</template>
|
||||||
|
|
||||||
|
<script setup lang="ts">
|
||||||
|
import { ref, onMounted } from "vue";
|
||||||
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
|
import { getVersion } from "@tauri-apps/api/app";
|
||||||
|
|
||||||
|
const tabs = [
|
||||||
|
{ id: "guide", label: "Getting Started" },
|
||||||
|
{ id: "shortcuts", label: "Shortcuts" },
|
||||||
|
{ id: "mcp", label: "MCP Integration" },
|
||||||
|
{ id: "about", label: "About" },
|
||||||
|
];
|
||||||
|
|
||||||
|
const activeTab = ref("guide");
|
||||||
|
const bridgePath = ref("loading...");
|
||||||
|
const version = ref("loading...");
|
||||||
|
|
||||||
|
onMounted(async () => {
|
||||||
|
// Read initial tab from URL
|
||||||
|
const params = new URLSearchParams(window.location.hash.split("?")[1] || "");
|
||||||
|
const page = params.get("page");
|
||||||
|
if (page && tabs.some(t => t.id === page)) activeTab.value = page;
|
||||||
|
|
||||||
|
try { version.value = await getVersion(); } catch { version.value = "unknown"; }
|
||||||
|
try { bridgePath.value = await invoke<string>("mcp_bridge_path"); } catch { bridgePath.value = "unknown"; }
|
||||||
|
});
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<style scoped>
|
||||||
|
.prose-wraith h2 { font-size: 16px; font-weight: 700; color: #e0e0e0; margin-bottom: 12px; }
|
||||||
|
.prose-wraith h3 { font-size: 13px; font-weight: 600; color: #8b949e; margin-top: 20px; margin-bottom: 8px; text-transform: uppercase; letter-spacing: 0.05em; }
|
||||||
|
.prose-wraith h4 { font-size: 12px; font-weight: 600; color: #58a6ff; margin-top: 16px; margin-bottom: 6px; }
|
||||||
|
.prose-wraith p { font-size: 12px; color: #8b949e; margin-bottom: 8px; line-height: 1.6; }
|
||||||
|
.prose-wraith ol, .prose-wraith ul { font-size: 12px; color: #8b949e; margin-bottom: 8px; padding-left: 20px; }
|
||||||
|
.prose-wraith li { margin-bottom: 4px; line-height: 1.5; }
|
||||||
|
.prose-wraith code { background: #161b22; border: 1px solid #30363d; border-radius: 4px; padding: 1px 5px; font-size: 11px; color: #e0e0e0; }
|
||||||
|
.prose-wraith pre { background: #161b22; border: 1px solid #30363d; border-radius: 6px; padding: 10px 14px; font-size: 11px; color: #e0e0e0; overflow-x: auto; margin-bottom: 8px; font-family: 'Cascadia Mono', monospace; }
|
||||||
|
.prose-wraith kbd { background: #21262d; border: 1px solid #484f58; border-radius: 3px; padding: 1px 5px; font-size: 10px; color: #e0e0e0; }
|
||||||
|
.prose-wraith table { width: 100%; font-size: 12px; border-collapse: collapse; margin-bottom: 12px; }
|
||||||
|
.prose-wraith th { text-align: left; padding: 6px 10px; background: #161b22; color: #8b949e; font-weight: 500; border-bottom: 1px solid #30363d; }
|
||||||
|
.prose-wraith td { padding: 5px 10px; color: #e0e0e0; border-bottom: 1px solid #21262d; }
|
||||||
|
.prose-wraith strong { color: #e0e0e0; }
|
||||||
|
</style>
|
||||||
@ -85,5 +85,6 @@ function exportCsv(): void {
|
|||||||
a.href = URL.createObjectURL(blob);
|
a.href = URL.createObjectURL(blob);
|
||||||
a.download = `wraith-scan-${subnet.value}-${Date.now()}.csv`;
|
a.download = `wraith-scan-${subnet.value}-${Date.now()}.csv`;
|
||||||
a.click();
|
a.click();
|
||||||
|
setTimeout(() => URL.revokeObjectURL(a.href), 1000);
|
||||||
}
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|||||||
@ -1,32 +1,28 @@
|
|||||||
<template>
|
<template>
|
||||||
<div class="flex flex-col h-full p-4 gap-3">
|
<ToolShell ref="shell" placeholder="Enter a host and click Ping">
|
||||||
<div class="flex items-center gap-2">
|
<template #default="{ running }">
|
||||||
<input v-model="target" type="text" placeholder="Host to ping" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none focus:border-[#58a6ff] flex-1" @keydown.enter="ping" />
|
<input v-model="target" type="text" placeholder="Host to ping" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none focus:border-[#58a6ff] flex-1" @keydown.enter="ping" />
|
||||||
<input v-model.number="count" type="number" min="1" max="100" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none focus:border-[#58a6ff] w-16" />
|
<input v-model.number="count" type="number" min="1" max="100" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none focus:border-[#58a6ff] w-16" />
|
||||||
<button class="px-4 py-1.5 text-sm font-bold rounded bg-[#58a6ff] text-black cursor-pointer disabled:opacity-40" :disabled="running" @click="ping">Ping</button>
|
<button class="px-4 py-1.5 text-sm font-bold rounded bg-[#58a6ff] text-black cursor-pointer disabled:opacity-40" :disabled="running" @click="ping">Ping</button>
|
||||||
</div>
|
</template>
|
||||||
<pre class="flex-1 overflow-auto bg-[#161b22] border border-[#30363d] rounded p-3 text-xs font-mono whitespace-pre-wrap text-[#e0e0e0]">{{ output || "Enter a host and click Ping" }}</pre>
|
</ToolShell>
|
||||||
</div>
|
|
||||||
</template>
|
</template>
|
||||||
|
|
||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref } from "vue";
|
import { ref } from "vue";
|
||||||
import { invoke } from "@tauri-apps/api/core";
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
|
import ToolShell from "./ToolShell.vue";
|
||||||
|
|
||||||
const props = defineProps<{ sessionId: string }>();
|
const props = defineProps<{ sessionId: string }>();
|
||||||
const target = ref("");
|
const target = ref("");
|
||||||
const count = ref(4);
|
const count = ref(4);
|
||||||
const output = ref("");
|
const shell = ref<InstanceType<typeof ToolShell> | null>(null);
|
||||||
const running = ref(false);
|
|
||||||
|
|
||||||
async function ping(): Promise<void> {
|
async function ping(): Promise<void> {
|
||||||
if (!target.value) return;
|
if (!target.value) return;
|
||||||
running.value = true;
|
shell.value?.execute(async () => {
|
||||||
output.value = `Pinging ${target.value}...\n`;
|
|
||||||
try {
|
|
||||||
const result = await invoke<{ target: string; output: string }>("tool_ping", { sessionId: props.sessionId, target: target.value, count: count.value });
|
const result = await invoke<{ target: string; output: string }>("tool_ping", { sessionId: props.sessionId, target: target.value, count: count.value });
|
||||||
output.value = result.output;
|
return result.output;
|
||||||
} catch (err) { output.value = String(err); }
|
});
|
||||||
running.value = false;
|
|
||||||
}
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|||||||
37
src/components/tools/ToolShell.vue
Normal file
37
src/components/tools/ToolShell.vue
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
<script setup lang="ts">
|
||||||
|
import { ref } from "vue";
|
||||||
|
|
||||||
|
defineProps<{
|
||||||
|
placeholder?: string;
|
||||||
|
}>();
|
||||||
|
|
||||||
|
const output = ref("");
|
||||||
|
const running = ref(false);
|
||||||
|
|
||||||
|
async function execute(fn: () => Promise<string>): Promise<void> {
|
||||||
|
running.value = true;
|
||||||
|
output.value = "";
|
||||||
|
try {
|
||||||
|
output.value = await fn();
|
||||||
|
} catch (err: unknown) {
|
||||||
|
output.value = `Error: ${err instanceof Error ? err.message : String(err)}`;
|
||||||
|
} finally {
|
||||||
|
running.value = false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function setOutput(value: string): void {
|
||||||
|
output.value = value;
|
||||||
|
}
|
||||||
|
|
||||||
|
defineExpose({ execute, setOutput, output, running });
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<template>
|
||||||
|
<div class="flex flex-col h-full p-4 gap-3">
|
||||||
|
<div class="flex items-center gap-2">
|
||||||
|
<slot :running="running" />
|
||||||
|
</div>
|
||||||
|
<pre class="flex-1 overflow-auto bg-[#161b22] border border-[#30363d] rounded p-3 text-xs font-mono whitespace-pre-wrap text-[#e0e0e0]">{{ output || placeholder || "Ready." }}</pre>
|
||||||
|
</div>
|
||||||
|
</template>
|
||||||
@ -13,6 +13,7 @@
|
|||||||
<FileEditor v-else-if="tool === 'editor'" :session-id="sessionId" />
|
<FileEditor v-else-if="tool === 'editor'" :session-id="sessionId" />
|
||||||
<SshKeyGen v-else-if="tool === 'ssh-keygen'" />
|
<SshKeyGen v-else-if="tool === 'ssh-keygen'" />
|
||||||
<PasswordGen v-else-if="tool === 'password-gen'" />
|
<PasswordGen v-else-if="tool === 'password-gen'" />
|
||||||
|
<HelpWindow v-else-if="tool === 'help'" />
|
||||||
<div v-else class="flex-1 flex items-center justify-center text-sm text-[#484f58]">
|
<div v-else class="flex-1 flex items-center justify-center text-sm text-[#484f58]">
|
||||||
Unknown tool: {{ tool }}
|
Unknown tool: {{ tool }}
|
||||||
</div>
|
</div>
|
||||||
@ -33,6 +34,7 @@ import DockerPanel from "./DockerPanel.vue";
|
|||||||
import FileEditor from "./FileEditor.vue";
|
import FileEditor from "./FileEditor.vue";
|
||||||
import SshKeyGen from "./SshKeyGen.vue";
|
import SshKeyGen from "./SshKeyGen.vue";
|
||||||
import PasswordGen from "./PasswordGen.vue";
|
import PasswordGen from "./PasswordGen.vue";
|
||||||
|
import HelpWindow from "./HelpWindow.vue";
|
||||||
|
|
||||||
defineProps<{
|
defineProps<{
|
||||||
tool: string;
|
tool: string;
|
||||||
|
|||||||
@ -1,29 +1,25 @@
|
|||||||
<template>
|
<template>
|
||||||
<div class="flex flex-col h-full p-4 gap-3">
|
<ToolShell ref="shell" placeholder="Enter a host and click Trace">
|
||||||
<div class="flex items-center gap-2">
|
<template #default="{ running }">
|
||||||
<input v-model="target" type="text" placeholder="Host to trace" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none focus:border-[#58a6ff] flex-1" @keydown.enter="trace" />
|
<input v-model="target" type="text" placeholder="Host to trace" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none focus:border-[#58a6ff] flex-1" @keydown.enter="trace" />
|
||||||
<button class="px-4 py-1.5 text-sm font-bold rounded bg-[#58a6ff] text-black cursor-pointer disabled:opacity-40" :disabled="running" @click="trace">Trace</button>
|
<button class="px-4 py-1.5 text-sm font-bold rounded bg-[#58a6ff] text-black cursor-pointer disabled:opacity-40" :disabled="running" @click="trace">Trace</button>
|
||||||
</div>
|
</template>
|
||||||
<pre class="flex-1 overflow-auto bg-[#161b22] border border-[#30363d] rounded p-3 text-xs font-mono whitespace-pre-wrap text-[#e0e0e0]">{{ output || "Enter a host and click Trace" }}</pre>
|
</ToolShell>
|
||||||
</div>
|
|
||||||
</template>
|
</template>
|
||||||
|
|
||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref } from "vue";
|
import { ref } from "vue";
|
||||||
import { invoke } from "@tauri-apps/api/core";
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
|
import ToolShell from "./ToolShell.vue";
|
||||||
|
|
||||||
const props = defineProps<{ sessionId: string }>();
|
const props = defineProps<{ sessionId: string }>();
|
||||||
const target = ref("");
|
const target = ref("");
|
||||||
const output = ref("");
|
const shell = ref<InstanceType<typeof ToolShell> | null>(null);
|
||||||
const running = ref(false);
|
|
||||||
|
|
||||||
async function trace(): Promise<void> {
|
async function trace(): Promise<void> {
|
||||||
if (!target.value) return;
|
if (!target.value) return;
|
||||||
running.value = true;
|
shell.value?.execute(() =>
|
||||||
output.value = `Tracing route to ${target.value}...\n`;
|
invoke<string>("tool_traceroute", { sessionId: props.sessionId, target: target.value })
|
||||||
try {
|
);
|
||||||
output.value = await invoke<string>("tool_traceroute", { sessionId: props.sessionId, target: target.value });
|
|
||||||
} catch (err) { output.value = String(err); }
|
|
||||||
running.value = false;
|
|
||||||
}
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|||||||
@ -1,26 +1,25 @@
|
|||||||
<template>
|
<template>
|
||||||
<div class="flex flex-col h-full p-4 gap-3">
|
<ToolShell ref="shell" placeholder="Enter a domain or IP and click Whois">
|
||||||
<div class="flex items-center gap-2">
|
<template #default="{ running }">
|
||||||
<input v-model="target" type="text" placeholder="Domain or IP" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none focus:border-[#58a6ff] flex-1" @keydown.enter="lookup" />
|
<input v-model="target" type="text" placeholder="Domain or IP" class="px-3 py-1.5 text-sm rounded bg-[#161b22] border border-[#30363d] text-[#e0e0e0] outline-none focus:border-[#58a6ff] flex-1" @keydown.enter="lookup" />
|
||||||
<button class="px-4 py-1.5 text-sm font-bold rounded bg-[#58a6ff] text-black cursor-pointer disabled:opacity-40" :disabled="running" @click="lookup">Whois</button>
|
<button class="px-4 py-1.5 text-sm font-bold rounded bg-[#58a6ff] text-black cursor-pointer disabled:opacity-40" :disabled="running" @click="lookup">Whois</button>
|
||||||
</div>
|
</template>
|
||||||
<pre class="flex-1 overflow-auto bg-[#161b22] border border-[#30363d] rounded p-3 text-xs font-mono whitespace-pre-wrap text-[#e0e0e0]">{{ output || "Enter a domain or IP and click Whois" }}</pre>
|
</ToolShell>
|
||||||
</div>
|
|
||||||
</template>
|
</template>
|
||||||
|
|
||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref } from "vue";
|
import { ref } from "vue";
|
||||||
import { invoke } from "@tauri-apps/api/core";
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
|
import ToolShell from "./ToolShell.vue";
|
||||||
|
|
||||||
const props = defineProps<{ sessionId: string }>();
|
const props = defineProps<{ sessionId: string }>();
|
||||||
const target = ref("");
|
const target = ref("");
|
||||||
const output = ref("");
|
const shell = ref<InstanceType<typeof ToolShell> | null>(null);
|
||||||
const running = ref(false);
|
|
||||||
|
|
||||||
async function lookup(): Promise<void> {
|
async function lookup(): Promise<void> {
|
||||||
if (!target.value) return;
|
if (!target.value) return;
|
||||||
running.value = true;
|
shell.value?.execute(() =>
|
||||||
try { output.value = await invoke<string>("tool_whois", { sessionId: props.sessionId, target: target.value }); }
|
invoke<string>("tool_whois", { sessionId: props.sessionId, target: target.value })
|
||||||
catch (err) { output.value = String(err); }
|
);
|
||||||
running.value = false;
|
|
||||||
}
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|||||||
106
src/composables/useKeyboardShortcuts.ts
Normal file
106
src/composables/useKeyboardShortcuts.ts
Normal file
@ -0,0 +1,106 @@
|
|||||||
|
import { onMounted, onBeforeUnmount } from "vue";
|
||||||
|
import type { Ref } from "vue";
|
||||||
|
import type { useSessionStore } from "@/stores/session.store";
|
||||||
|
|
||||||
|
interface KeyboardShortcutActions {
|
||||||
|
sessionStore: ReturnType<typeof useSessionStore>;
|
||||||
|
sidebarVisible: Ref<boolean>;
|
||||||
|
copilotVisible: Ref<boolean>;
|
||||||
|
openCommandPalette: () => void;
|
||||||
|
openActiveSearch: () => void;
|
||||||
|
}
|
||||||
|
|
||||||
|
export function useKeyboardShortcuts(actions: KeyboardShortcutActions): void {
|
||||||
|
const { sessionStore, sidebarVisible, copilotVisible, openCommandPalette, openActiveSearch } = actions;
|
||||||
|
|
||||||
|
function handleKeydown(event: KeyboardEvent): void {
|
||||||
|
const target = event.target as HTMLElement;
|
||||||
|
const isInputFocused =
|
||||||
|
target.tagName === "INPUT" ||
|
||||||
|
target.tagName === "TEXTAREA" ||
|
||||||
|
target.tagName === "SELECT";
|
||||||
|
const ctrl = event.ctrlKey || event.metaKey;
|
||||||
|
|
||||||
|
// Ctrl+K — command palette (fires even when input is focused)
|
||||||
|
if (ctrl && event.key === "k") {
|
||||||
|
event.preventDefault();
|
||||||
|
openCommandPalette();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isInputFocused) return;
|
||||||
|
|
||||||
|
// Ctrl+W — close active tab
|
||||||
|
if (ctrl && event.key === "w") {
|
||||||
|
event.preventDefault();
|
||||||
|
const active = sessionStore.activeSession;
|
||||||
|
if (active) sessionStore.closeSession(active.id);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Ctrl+Tab — next tab
|
||||||
|
if (ctrl && event.key === "Tab" && !event.shiftKey) {
|
||||||
|
event.preventDefault();
|
||||||
|
const sessions = sessionStore.sessions;
|
||||||
|
if (sessions.length < 2) return;
|
||||||
|
const idx = sessions.findIndex((s) => s.id === sessionStore.activeSessionId);
|
||||||
|
const next = sessions[(idx + 1) % sessions.length];
|
||||||
|
sessionStore.activateSession(next.id);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Ctrl+Shift+Tab — previous tab
|
||||||
|
if (ctrl && event.key === "Tab" && event.shiftKey) {
|
||||||
|
event.preventDefault();
|
||||||
|
const sessions = sessionStore.sessions;
|
||||||
|
if (sessions.length < 2) return;
|
||||||
|
const idx = sessions.findIndex((s) => s.id === sessionStore.activeSessionId);
|
||||||
|
const prev = sessions[(idx - 1 + sessions.length) % sessions.length];
|
||||||
|
sessionStore.activateSession(prev.id);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Ctrl+1-9 — jump to tab by index
|
||||||
|
if (ctrl && event.key >= "1" && event.key <= "9") {
|
||||||
|
const tabIndex = parseInt(event.key, 10) - 1;
|
||||||
|
const sessions = sessionStore.sessions;
|
||||||
|
if (tabIndex < sessions.length) {
|
||||||
|
event.preventDefault();
|
||||||
|
sessionStore.activateSession(sessions[tabIndex].id);
|
||||||
|
}
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Ctrl+B — toggle sidebar
|
||||||
|
if (ctrl && event.key === "b") {
|
||||||
|
event.preventDefault();
|
||||||
|
sidebarVisible.value = !sidebarVisible.value;
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Ctrl+Shift+G — toggle AI copilot
|
||||||
|
if (ctrl && event.shiftKey && event.key.toLowerCase() === "g") {
|
||||||
|
event.preventDefault();
|
||||||
|
copilotVisible.value = !copilotVisible.value;
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Ctrl+F — terminal search (SSH sessions only)
|
||||||
|
if (ctrl && event.key === "f") {
|
||||||
|
const active = sessionStore.activeSession;
|
||||||
|
if (active?.protocol === "ssh") {
|
||||||
|
event.preventDefault();
|
||||||
|
openActiveSearch();
|
||||||
|
}
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
onMounted(() => {
|
||||||
|
document.addEventListener("keydown", handleKeydown);
|
||||||
|
});
|
||||||
|
|
||||||
|
onBeforeUnmount(() => {
|
||||||
|
document.removeEventListener("keydown", handleKeydown);
|
||||||
|
});
|
||||||
|
}
|
||||||
@ -1,4 +1,5 @@
|
|||||||
import { ref, onBeforeUnmount } from "vue";
|
import { ref, onBeforeUnmount } from "vue";
|
||||||
|
import type { Ref } from "vue";
|
||||||
import { invoke } from "@tauri-apps/api/core";
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -152,13 +153,13 @@ export function jsKeyToScancode(code: string): number | null {
|
|||||||
|
|
||||||
export interface UseRdpReturn {
|
export interface UseRdpReturn {
|
||||||
/** Whether the RDP session is connected (first frame received) */
|
/** Whether the RDP session is connected (first frame received) */
|
||||||
connected: ReturnType<typeof ref<boolean>>;
|
connected: Ref<boolean>;
|
||||||
/** Whether keyboard capture is enabled */
|
/** Whether keyboard capture is enabled */
|
||||||
keyboardGrabbed: ReturnType<typeof ref<boolean>>;
|
keyboardGrabbed: Ref<boolean>;
|
||||||
/** Whether clipboard sync is enabled */
|
/** Whether clipboard sync is enabled */
|
||||||
clipboardSync: ReturnType<typeof ref<boolean>>;
|
clipboardSync: Ref<boolean>;
|
||||||
/** Fetch the current frame as RGBA ImageData */
|
/** Fetch and render the dirty region directly to a canvas context */
|
||||||
fetchFrame: (sessionId: string, width: number, height: number) => Promise<ImageData | null>;
|
fetchAndRender: (sessionId: string, width: number, height: number, ctx: CanvasRenderingContext2D) => Promise<boolean>;
|
||||||
/** Send a mouse event to the backend */
|
/** Send a mouse event to the backend */
|
||||||
sendMouse: (sessionId: string, x: number, y: number, flags: number) => void;
|
sendMouse: (sessionId: string, x: number, y: number, flags: number) => void;
|
||||||
/** Send a key event to the backend */
|
/** Send a key event to the backend */
|
||||||
@ -184,7 +185,7 @@ export interface UseRdpReturn {
|
|||||||
* Composable that manages an RDP session's rendering and input.
|
* Composable that manages an RDP session's rendering and input.
|
||||||
*
|
*
|
||||||
* Uses Tauri's invoke() to call Rust commands:
|
* Uses Tauri's invoke() to call Rust commands:
|
||||||
* rdp_get_frame → base64 RGBA string
|
* rdp_get_frame → raw RGBA ArrayBuffer (binary IPC)
|
||||||
* rdp_send_mouse → fire-and-forget
|
* rdp_send_mouse → fire-and-forget
|
||||||
* rdp_send_key → fire-and-forget
|
* rdp_send_key → fire-and-forget
|
||||||
* rdp_send_clipboard → fire-and-forget
|
* rdp_send_clipboard → fire-and-forget
|
||||||
@ -195,47 +196,53 @@ export function useRdp(): UseRdpReturn {
|
|||||||
const clipboardSync = ref(false);
|
const clipboardSync = ref(false);
|
||||||
|
|
||||||
let animFrameId: number | null = null;
|
let animFrameId: number | null = null;
|
||||||
let frameCount = 0;
|
let unlistenFrame: (() => void) | null = null;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Fetch the current frame from the Rust RDP backend.
|
* Fetch the dirty region from the Rust RDP backend and apply it to the canvas.
|
||||||
*
|
*
|
||||||
* rdp_get_frame returns raw RGBA bytes (width*height*4) serialised as a
|
* Binary format from backend: 8-byte header + pixel data
|
||||||
* base64 string over Tauri's IPC bridge. We decode it to Uint8ClampedArray
|
* Header: [x: u16, y: u16, w: u16, h: u16] (little-endian)
|
||||||
* and wrap in an ImageData for putImageData().
|
* If header is all zeros → full frame (width*height*4 bytes)
|
||||||
|
* If header is non-zero → dirty rectangle (w*h*4 bytes)
|
||||||
|
*
|
||||||
|
* Returns true if a frame was rendered, false if nothing changed.
|
||||||
*/
|
*/
|
||||||
async function fetchFrame(
|
async function fetchAndRender(
|
||||||
sessionId: string,
|
sessionId: string,
|
||||||
width: number,
|
width: number,
|
||||||
height: number,
|
height: number,
|
||||||
): Promise<ImageData | null> {
|
ctx: CanvasRenderingContext2D,
|
||||||
let raw: string;
|
): Promise<boolean> {
|
||||||
|
let raw: ArrayBuffer;
|
||||||
try {
|
try {
|
||||||
raw = await invoke<string>("rdp_get_frame", { sessionId });
|
raw = await invoke<ArrayBuffer>("rdp_get_frame", { sessionId });
|
||||||
} catch {
|
} catch {
|
||||||
// Session may not be connected yet or backend returned an error — skip frame
|
return false;
|
||||||
return null;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!raw || raw.length === 0) return null;
|
if (!raw || raw.byteLength <= 8) return false;
|
||||||
|
|
||||||
// Decode base64 → binary string → Uint8ClampedArray
|
const view = new DataView(raw);
|
||||||
const binaryStr = atob(raw);
|
const rx = view.getUint16(0, true);
|
||||||
const bytes = new Uint8ClampedArray(binaryStr.length);
|
const ry = view.getUint16(2, true);
|
||||||
for (let i = 0; i < binaryStr.length; i++) {
|
const rw = view.getUint16(4, true);
|
||||||
bytes[i] = binaryStr.charCodeAt(i);
|
const rh = view.getUint16(6, true);
|
||||||
|
const pixelData = new Uint8ClampedArray(raw, 8);
|
||||||
|
|
||||||
|
if (rx === 0 && ry === 0 && rw === 0 && rh === 0) {
|
||||||
|
// Full frame
|
||||||
|
const expected = width * height * 4;
|
||||||
|
if (pixelData.length !== expected) return false;
|
||||||
|
ctx.putImageData(new ImageData(pixelData, width, height), 0, 0);
|
||||||
|
} else {
|
||||||
|
// Dirty rectangle — apply at offset
|
||||||
|
const expected = rw * rh * 4;
|
||||||
|
if (pixelData.length !== expected) return false;
|
||||||
|
ctx.putImageData(new ImageData(pixelData, rw, rh), rx, ry);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Validate: RGBA requires exactly width * height * 4 bytes
|
return true;
|
||||||
const expected = width * height * 4;
|
|
||||||
if (bytes.length !== expected) {
|
|
||||||
console.warn(
|
|
||||||
`[useRdp] Frame size mismatch: got ${bytes.length}, expected ${expected}`,
|
|
||||||
);
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
return new ImageData(bytes, width, height);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -303,26 +310,36 @@ export function useRdp(): UseRdpReturn {
|
|||||||
canvas.width = width;
|
canvas.width = width;
|
||||||
canvas.height = height;
|
canvas.height = height;
|
||||||
|
|
||||||
function renderLoop(): void {
|
let fetchPending = false;
|
||||||
frameCount++;
|
let rafScheduled = false;
|
||||||
|
|
||||||
// Throttle to ~30fps by skipping odd-numbered rAF ticks
|
// Fetch and render dirty region when backend signals new frame data.
|
||||||
if (frameCount % 2 === 0) {
|
// Uses rAF to coalesce rapid events into one fetch per display frame.
|
||||||
fetchFrame(sessionId, width, height).then((imageData) => {
|
function scheduleFrameFetch(): void {
|
||||||
if (imageData && ctx) {
|
if (rafScheduled) return;
|
||||||
ctx.putImageData(imageData, 0, 0);
|
rafScheduled = true;
|
||||||
// Mark connected on first successful frame
|
animFrameId = requestAnimationFrame(async () => {
|
||||||
if (!connected.value) {
|
rafScheduled = false;
|
||||||
connected.value = true;
|
if (fetchPending) return;
|
||||||
}
|
fetchPending = true;
|
||||||
}
|
if (!ctx) return;
|
||||||
});
|
const rendered = await fetchAndRender(sessionId, width, height, ctx);
|
||||||
}
|
fetchPending = false;
|
||||||
|
if (rendered && !connected.value) connected.value = true;
|
||||||
animFrameId = requestAnimationFrame(renderLoop);
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
animFrameId = requestAnimationFrame(renderLoop);
|
// Listen for frame events from the backend (push model)
|
||||||
|
import("@tauri-apps/api/event").then(({ listen }) => {
|
||||||
|
listen(`rdp:frame:${sessionId}`, () => {
|
||||||
|
scheduleFrameFetch();
|
||||||
|
}).then((unlisten) => {
|
||||||
|
unlistenFrame = unlisten;
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
// Initial poll in case frames arrived before listener was set up
|
||||||
|
scheduleFrameFetch();
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -333,8 +350,11 @@ export function useRdp(): UseRdpReturn {
|
|||||||
cancelAnimationFrame(animFrameId);
|
cancelAnimationFrame(animFrameId);
|
||||||
animFrameId = null;
|
animFrameId = null;
|
||||||
}
|
}
|
||||||
|
if (unlistenFrame !== null) {
|
||||||
|
unlistenFrame();
|
||||||
|
unlistenFrame = null;
|
||||||
|
}
|
||||||
connected.value = false;
|
connected.value = false;
|
||||||
frameCount = 0;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
function toggleKeyboardGrab(): void {
|
function toggleKeyboardGrab(): void {
|
||||||
@ -353,7 +373,7 @@ export function useRdp(): UseRdpReturn {
|
|||||||
connected,
|
connected,
|
||||||
keyboardGrabbed,
|
keyboardGrabbed,
|
||||||
clipboardSync,
|
clipboardSync,
|
||||||
fetchFrame,
|
fetchAndRender,
|
||||||
sendMouse,
|
sendMouse,
|
||||||
sendKey,
|
sendKey,
|
||||||
sendClipboard,
|
sendClipboard,
|
||||||
|
|||||||
@ -24,6 +24,11 @@ export interface UseSftpReturn {
|
|||||||
// Persist the last browsed path per session so switching tabs restores position
|
// Persist the last browsed path per session so switching tabs restores position
|
||||||
const sessionPaths: Record<string, string> = {};
|
const sessionPaths: Record<string, string> = {};
|
||||||
|
|
||||||
|
/** Remove a session's saved path from the module-level cache. Call on session close. */
|
||||||
|
export function cleanupSession(sessionId: string): void {
|
||||||
|
delete sessionPaths[sessionId];
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Composable that manages SFTP file browsing state.
|
* Composable that manages SFTP file browsing state.
|
||||||
* Accepts a reactive session ID ref so it reinitializes on tab switch
|
* Accepts a reactive session ID ref so it reinitializes on tab switch
|
||||||
|
|||||||
@ -14,8 +14,9 @@ const defaultTheme = {
|
|||||||
foreground: "#e0e0e0",
|
foreground: "#e0e0e0",
|
||||||
cursor: "#58a6ff",
|
cursor: "#58a6ff",
|
||||||
cursorAccent: "#0d1117",
|
cursorAccent: "#0d1117",
|
||||||
selectionBackground: "rgba(88, 166, 255, 0.3)",
|
selectionBackground: "#264f78",
|
||||||
selectionForeground: "#ffffff",
|
selectionForeground: "#ffffff",
|
||||||
|
selectionInactiveBackground: "#264f78",
|
||||||
black: "#0d1117",
|
black: "#0d1117",
|
||||||
red: "#f85149",
|
red: "#f85149",
|
||||||
green: "#3fb950",
|
green: "#3fb950",
|
||||||
@ -70,7 +71,9 @@ export function useTerminal(sessionId: string, backend: 'ssh' | 'pty' = 'ssh'):
|
|||||||
cursorStyle: "block",
|
cursorStyle: "block",
|
||||||
scrollback: 10000,
|
scrollback: 10000,
|
||||||
allowProposedApi: true,
|
allowProposedApi: true,
|
||||||
convertEol: backend === 'ssh',
|
// SSH always needs EOL conversion. PTY needs it on Windows (ConPTY sends bare \n)
|
||||||
|
// but not on Unix (PTY driver handles LF→CRLF). navigator.platform is the simplest check.
|
||||||
|
convertEol: backend === 'ssh' || navigator.platform.startsWith('Win'),
|
||||||
rightClickSelectsWord: false,
|
rightClickSelectsWord: false,
|
||||||
});
|
});
|
||||||
|
|
||||||
@ -153,6 +156,7 @@ export function useTerminal(sessionId: string, backend: 'ssh' | 'pty' = 'ssh'):
|
|||||||
// cell widths — producing tiny dashes and 200+ column terminals.
|
// cell widths — producing tiny dashes and 200+ column terminals.
|
||||||
document.fonts.ready.then(() => {
|
document.fonts.ready.then(() => {
|
||||||
fitAddon.fit();
|
fitAddon.fit();
|
||||||
|
terminal.focus();
|
||||||
});
|
});
|
||||||
|
|
||||||
// Right-click paste on the terminal's DOM element
|
// Right-click paste on the terminal's DOM element
|
||||||
@ -161,9 +165,16 @@ export function useTerminal(sessionId: string, backend: 'ssh' | 'pty' = 'ssh'):
|
|||||||
// Subscribe to SSH output events for this session.
|
// Subscribe to SSH output events for this session.
|
||||||
// Tauri v2 listen() callback receives { payload: T } — the base64 string
|
// Tauri v2 listen() callback receives { payload: T } — the base64 string
|
||||||
// is in event.payload (not event.data as in Wails).
|
// is in event.payload (not event.data as in Wails).
|
||||||
|
// Throttle activity marking to avoid Vue reactivity storms
|
||||||
|
let lastActivityMark = 0;
|
||||||
|
|
||||||
unlistenPromise = listen<string>(dataEvent, (event) => {
|
unlistenPromise = listen<string>(dataEvent, (event) => {
|
||||||
// Mark tab activity for background sessions
|
// Mark tab activity at most once per second
|
||||||
try { useSessionStore().markActivity(sessionId); } catch {}
|
const now = Date.now();
|
||||||
|
if (now - lastActivityMark > 1000) {
|
||||||
|
lastActivityMark = now;
|
||||||
|
try { useSessionStore().markActivity(sessionId); } catch {}
|
||||||
|
}
|
||||||
|
|
||||||
const b64data = event.payload;
|
const b64data = event.payload;
|
||||||
|
|
||||||
@ -191,9 +202,12 @@ export function useTerminal(sessionId: string, backend: 'ssh' | 'pty' = 'ssh'):
|
|||||||
unlistenFn = fn;
|
unlistenFn = fn;
|
||||||
});
|
});
|
||||||
|
|
||||||
// Auto-fit when the container resizes
|
// Auto-fit when the container resizes — but only if visible
|
||||||
resizeObserver = new ResizeObserver(() => {
|
resizeObserver = new ResizeObserver((entries) => {
|
||||||
fitAddon.fit();
|
const entry = entries[0];
|
||||||
|
if (entry && entry.contentRect.width > 50 && entry.contentRect.height > 50) {
|
||||||
|
fitAddon.fit();
|
||||||
|
}
|
||||||
});
|
});
|
||||||
resizeObserver.observe(container);
|
resizeObserver.observe(container);
|
||||||
}
|
}
|
||||||
|
|||||||
@ -141,6 +141,47 @@
|
|||||||
</button>
|
</button>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
<!-- Help menu -->
|
||||||
|
<div class="relative">
|
||||||
|
<button
|
||||||
|
class="text-xs text-[var(--wraith-text-secondary)] hover:text-[var(--wraith-text-primary)] transition-colors cursor-pointer px-2 py-1 rounded hover:bg-[var(--wraith-bg-tertiary)]"
|
||||||
|
@click="showHelpMenu = !showHelpMenu"
|
||||||
|
@blur="closeHelpMenuDeferred"
|
||||||
|
>
|
||||||
|
Help
|
||||||
|
</button>
|
||||||
|
<div
|
||||||
|
v-if="showHelpMenu"
|
||||||
|
class="absolute top-full left-0 mt-0.5 w-56 bg-[#161b22] border border-[#30363d] rounded-lg shadow-2xl overflow-hidden z-50 py-1"
|
||||||
|
>
|
||||||
|
<button
|
||||||
|
class="w-full flex items-center gap-3 px-4 py-2 text-xs text-left text-[var(--wraith-text-secondary)] hover:bg-[#30363d] hover:text-[var(--wraith-text-primary)] transition-colors cursor-pointer"
|
||||||
|
@mousedown.prevent="handleHelpAction('guide')"
|
||||||
|
>
|
||||||
|
<span class="flex-1">Getting Started</span>
|
||||||
|
</button>
|
||||||
|
<button
|
||||||
|
class="w-full flex items-center gap-3 px-4 py-2 text-xs text-left text-[var(--wraith-text-secondary)] hover:bg-[#30363d] hover:text-[var(--wraith-text-primary)] transition-colors cursor-pointer"
|
||||||
|
@mousedown.prevent="handleHelpAction('shortcuts')"
|
||||||
|
>
|
||||||
|
<span class="flex-1">Keyboard Shortcuts</span>
|
||||||
|
</button>
|
||||||
|
<button
|
||||||
|
class="w-full flex items-center gap-3 px-4 py-2 text-xs text-left text-[var(--wraith-text-secondary)] hover:bg-[#30363d] hover:text-[var(--wraith-text-primary)] transition-colors cursor-pointer"
|
||||||
|
@mousedown.prevent="handleHelpAction('mcp')"
|
||||||
|
>
|
||||||
|
<span class="flex-1">MCP Integration</span>
|
||||||
|
</button>
|
||||||
|
<div class="border-t border-[#30363d] my-1" />
|
||||||
|
<button
|
||||||
|
class="w-full flex items-center gap-3 px-4 py-2 text-xs text-left text-[var(--wraith-text-secondary)] hover:bg-[#30363d] hover:text-[var(--wraith-text-primary)] transition-colors cursor-pointer"
|
||||||
|
@mousedown.prevent="handleHelpAction('about')"
|
||||||
|
>
|
||||||
|
<span class="flex-1">About Wraith</span>
|
||||||
|
</button>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<!-- Quick Connect -->
|
<!-- Quick Connect -->
|
||||||
@ -267,6 +308,7 @@
|
|||||||
|
|
||||||
<script setup lang="ts">
|
<script setup lang="ts">
|
||||||
import { ref, computed, onMounted, onUnmounted } from "vue";
|
import { ref, computed, onMounted, onUnmounted } from "vue";
|
||||||
|
import { useKeyboardShortcuts } from "@/composables/useKeyboardShortcuts";
|
||||||
import { invoke } from "@tauri-apps/api/core";
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
import { getCurrentWindow } from "@tauri-apps/api/window";
|
import { getCurrentWindow } from "@tauri-apps/api/window";
|
||||||
import { useAppStore } from "@/stores/app.store";
|
import { useAppStore } from "@/stores/app.store";
|
||||||
@ -309,6 +351,7 @@ const sessionContainer = ref<InstanceType<typeof SessionContainer> | null>(null)
|
|||||||
|
|
||||||
const showFileMenu = ref(false);
|
const showFileMenu = ref(false);
|
||||||
const showToolsMenu = ref(false);
|
const showToolsMenu = ref(false);
|
||||||
|
const showHelpMenu = ref(false);
|
||||||
|
|
||||||
function closeFileMenuDeferred(): void {
|
function closeFileMenuDeferred(): void {
|
||||||
setTimeout(() => { showFileMenu.value = false; }, 150);
|
setTimeout(() => { showFileMenu.value = false; }, 150);
|
||||||
@ -318,6 +361,22 @@ function closeToolsMenuDeferred(): void {
|
|||||||
setTimeout(() => { showToolsMenu.value = false; }, 150);
|
setTimeout(() => { showToolsMenu.value = false; }, 150);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function closeHelpMenuDeferred(): void {
|
||||||
|
setTimeout(() => { showHelpMenu.value = false; }, 150);
|
||||||
|
}
|
||||||
|
|
||||||
|
async function handleHelpAction(page: string): Promise<void> {
|
||||||
|
showHelpMenu.value = false;
|
||||||
|
try {
|
||||||
|
await invoke("open_child_window", {
|
||||||
|
label: `help-${page}-${Date.now()}`,
|
||||||
|
title: "Wraith — Help",
|
||||||
|
url: `index.html#/tool/help?page=${page}`,
|
||||||
|
width: 750, height: 600,
|
||||||
|
});
|
||||||
|
} catch (err) { console.error("Help window error:", err); alert("Window error: " + String(err)); }
|
||||||
|
}
|
||||||
|
|
||||||
async function handleToolAction(tool: string): Promise<void> {
|
async function handleToolAction(tool: string): Promise<void> {
|
||||||
showToolsMenu.value = false;
|
showToolsMenu.value = false;
|
||||||
|
|
||||||
@ -329,8 +388,6 @@ async function handleToolAction(tool: string): Promise<void> {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
const { WebviewWindow } = await import("@tauri-apps/api/webviewWindow");
|
|
||||||
|
|
||||||
const toolConfig: Record<string, { title: string; width: number; height: number }> = {
|
const toolConfig: Record<string, { title: string; width: number; height: number }> = {
|
||||||
"network-scanner": { title: "Network Scanner", width: 800, height: 600 },
|
"network-scanner": { title: "Network Scanner", width: 800, height: 600 },
|
||||||
"port-scanner": { title: "Port Scanner", width: 700, height: 500 },
|
"port-scanner": { title: "Port Scanner", width: 700, height: 500 },
|
||||||
@ -351,16 +408,14 @@ async function handleToolAction(tool: string): Promise<void> {
|
|||||||
|
|
||||||
const sessionId = activeSessionId.value || "";
|
const sessionId = activeSessionId.value || "";
|
||||||
|
|
||||||
// Open tool in a new Tauri window
|
try {
|
||||||
const label = `tool-${tool}-${Date.now()}`;
|
await invoke("open_child_window", {
|
||||||
new WebviewWindow(label, {
|
label: `tool-${tool}-${Date.now()}`,
|
||||||
title: `Wraith — ${config.title}`,
|
title: `Wraith — ${config.title}`,
|
||||||
width: config.width,
|
url: `index.html#/tool/${tool}?sessionId=${sessionId}`,
|
||||||
height: config.height,
|
width: config.width, height: config.height,
|
||||||
resizable: true,
|
});
|
||||||
center: true,
|
} catch (err) { console.error("Tool window error:", err); alert("Tool window error: " + String(err)); }
|
||||||
url: `index.html#/tool/${tool}?sessionId=${sessionId}`,
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
|
|
||||||
async function handleFileMenuAction(action: string): Promise<void> {
|
async function handleFileMenuAction(action: string): Promise<void> {
|
||||||
@ -380,18 +435,13 @@ function handleThemeSelect(theme: ThemeDefinition): void {
|
|||||||
async function handleOpenFile(entry: FileEntry): Promise<void> {
|
async function handleOpenFile(entry: FileEntry): Promise<void> {
|
||||||
if (!activeSessionId.value) return;
|
if (!activeSessionId.value) return;
|
||||||
try {
|
try {
|
||||||
const { WebviewWindow } = await import("@tauri-apps/api/webviewWindow");
|
|
||||||
const fileName = entry.path.split("/").pop() || entry.path;
|
const fileName = entry.path.split("/").pop() || entry.path;
|
||||||
const label = `editor-${Date.now()}`;
|
|
||||||
const sessionId = activeSessionId.value;
|
const sessionId = activeSessionId.value;
|
||||||
|
await invoke("open_child_window", {
|
||||||
new WebviewWindow(label, {
|
label: `editor-${Date.now()}`,
|
||||||
title: `${fileName} — Wraith Editor`,
|
title: `${fileName} — Wraith Editor`,
|
||||||
width: 800,
|
|
||||||
height: 600,
|
|
||||||
resizable: true,
|
|
||||||
center: true,
|
|
||||||
url: `index.html#/tool/editor?sessionId=${sessionId}&path=${encodeURIComponent(entry.path)}`,
|
url: `index.html#/tool/editor?sessionId=${sessionId}&path=${encodeURIComponent(entry.path)}`,
|
||||||
|
width: 800, height: 600,
|
||||||
});
|
});
|
||||||
} catch (err) { console.error("Failed to open editor:", err); }
|
} catch (err) { console.error("Failed to open editor:", err); }
|
||||||
}
|
}
|
||||||
@ -419,25 +469,41 @@ async function handleQuickConnect(): Promise<void> {
|
|||||||
} catch (err) { console.error("Quick connect failed:", err); }
|
} catch (err) { console.error("Quick connect failed:", err); }
|
||||||
}
|
}
|
||||||
|
|
||||||
function handleKeydown(event: KeyboardEvent): void {
|
useKeyboardShortcuts({
|
||||||
const target = event.target as HTMLElement;
|
sessionStore,
|
||||||
const isInputFocused = target.tagName === "INPUT" || target.tagName === "TEXTAREA" || target.tagName === "SELECT";
|
sidebarVisible,
|
||||||
const ctrl = event.ctrlKey || event.metaKey;
|
copilotVisible,
|
||||||
if (ctrl && event.key === "k") { event.preventDefault(); commandPalette.value?.toggle(); return; }
|
openCommandPalette: () => commandPalette.value?.toggle(),
|
||||||
if (isInputFocused) return;
|
openActiveSearch: () => sessionContainer.value?.openActiveSearch(),
|
||||||
if (ctrl && event.key === "w") { event.preventDefault(); const active = sessionStore.activeSession; if (active) sessionStore.closeSession(active.id); return; }
|
});
|
||||||
if (ctrl && event.key === "Tab" && !event.shiftKey) { event.preventDefault(); const sessions = sessionStore.sessions; if (sessions.length < 2) return; const idx = sessions.findIndex((s) => s.id === sessionStore.activeSessionId); const next = sessions[(idx + 1) % sessions.length]; sessionStore.activateSession(next.id); return; }
|
|
||||||
if (ctrl && event.key === "Tab" && event.shiftKey) { event.preventDefault(); const sessions = sessionStore.sessions; if (sessions.length < 2) return; const idx = sessions.findIndex((s) => s.id === sessionStore.activeSessionId); const prev = sessions[(idx - 1 + sessions.length) % sessions.length]; sessionStore.activateSession(prev.id); return; }
|
let workspaceSaveInterval: ReturnType<typeof setInterval> | null = null;
|
||||||
if (ctrl && event.key >= "1" && event.key <= "9") { const tabIndex = parseInt(event.key, 10) - 1; const sessions = sessionStore.sessions; if (tabIndex < sessions.length) { event.preventDefault(); sessionStore.activateSession(sessions[tabIndex].id); } return; }
|
|
||||||
if (ctrl && event.key === "b") { event.preventDefault(); sidebarVisible.value = !sidebarVisible.value; return; }
|
function handleBeforeUnload(e: BeforeUnloadEvent): void {
|
||||||
if (ctrl && event.shiftKey && event.key.toLowerCase() === "g") { event.preventDefault(); copilotVisible.value = !copilotVisible.value; return; }
|
if (sessionStore.sessions.length > 0) {
|
||||||
if (ctrl && event.key === "f") { const active = sessionStore.activeSession; if (active?.protocol === "ssh") { event.preventDefault(); sessionContainer.value?.openActiveSearch(); } return; }
|
e.preventDefault();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
onMounted(async () => {
|
onMounted(async () => {
|
||||||
document.addEventListener("keydown", handleKeydown);
|
// Confirm before closing if sessions are active (synchronous — won't hang)
|
||||||
|
window.addEventListener("beforeunload", handleBeforeUnload);
|
||||||
|
|
||||||
await connectionStore.loadAll();
|
await connectionStore.loadAll();
|
||||||
|
|
||||||
|
// Restore saved theme so every terminal opens with the user's preferred colors
|
||||||
|
try {
|
||||||
|
const savedThemeName = await invoke<string | null>("get_setting", { key: "active_theme" });
|
||||||
|
if (savedThemeName) {
|
||||||
|
const themes = await invoke<Array<{ name: string; foreground: string; background: string; cursor: string; black: string; red: string; green: string; yellow: string; blue: string; magenta: string; cyan: string; white: string; brightBlack: string; brightRed: string; brightGreen: string; brightYellow: string; brightBlue: string; brightMagenta: string; brightCyan: string; brightWhite: string }>>("list_themes");
|
||||||
|
const theme = themes?.find(t => t.name === savedThemeName);
|
||||||
|
if (theme) {
|
||||||
|
sessionStore.setTheme(theme);
|
||||||
|
statusBar.value?.setThemeName(theme.name);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} catch {}
|
||||||
|
|
||||||
// Restore workspace — reconnect saved tabs (non-blocking, non-fatal)
|
// Restore workspace — reconnect saved tabs (non-blocking, non-fatal)
|
||||||
setTimeout(async () => {
|
setTimeout(async () => {
|
||||||
try {
|
try {
|
||||||
@ -450,34 +516,34 @@ onMounted(async () => {
|
|||||||
} catch {}
|
} catch {}
|
||||||
}, 500);
|
}, 500);
|
||||||
|
|
||||||
// Save workspace on window close (non-fatal)
|
// Auto-save workspace every 30 seconds instead of on close
|
||||||
try {
|
// (onCloseRequested was hanging the window close on Windows)
|
||||||
const { getCurrentWindow } = await import("@tauri-apps/api/window");
|
workspaceSaveInterval = setInterval(() => {
|
||||||
const appWindow = getCurrentWindow();
|
const tabs = sessionStore.sessions
|
||||||
appWindow.onCloseRequested(async () => {
|
.filter(s => s.protocol === "ssh" || s.protocol === "rdp")
|
||||||
const tabs = sessionStore.sessions
|
.map((s, i) => ({ connectionId: s.connectionId, protocol: s.protocol, position: i }));
|
||||||
.filter(s => s.protocol === "ssh" || s.protocol === "rdp")
|
if (tabs.length > 0) {
|
||||||
.map((s, i) => ({ connectionId: s.connectionId, protocol: s.protocol, position: i }));
|
invoke("save_workspace", { tabs }).catch(() => {});
|
||||||
await invoke("save_workspace", { tabs }).catch(() => {});
|
}
|
||||||
});
|
}, 30000);
|
||||||
} catch {}
|
|
||||||
|
|
||||||
// Check for updates on startup via Tauri updater plugin (non-blocking)
|
// Check for updates on startup via Tauri updater plugin (non-blocking)
|
||||||
import("@tauri-apps/plugin-updater").then(async ({ check }) => {
|
invoke<{ currentVersion: string; latestVersion: string; updateAvailable: boolean; downloadUrl: string }>("check_for_updates")
|
||||||
try {
|
.then((info) => {
|
||||||
const update = await check();
|
if (info.updateAvailable) {
|
||||||
if (update?.available) {
|
if (confirm(`Wraith v${info.latestVersion} is available (you have v${info.currentVersion}). Open download page?`)) {
|
||||||
if (confirm(`Wraith v${update.version} is available. Download and install?`)) {
|
import("@tauri-apps/plugin-shell").then(({ open }) => open(info.downloadUrl)).catch(() => window.open(info.downloadUrl, "_blank"));
|
||||||
await update.downloadAndInstall();
|
|
||||||
const { relaunch } = await import("@tauri-apps/plugin-process");
|
|
||||||
await relaunch();
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} catch {}
|
})
|
||||||
}).catch(() => {});
|
.catch(() => {});
|
||||||
});
|
});
|
||||||
|
|
||||||
onUnmounted(() => {
|
onUnmounted(() => {
|
||||||
document.removeEventListener("keydown", handleKeydown);
|
window.removeEventListener("beforeunload", handleBeforeUnload);
|
||||||
|
if (workspaceSaveInterval !== null) {
|
||||||
|
clearInterval(workspaceSaveInterval);
|
||||||
|
workspaceSaveInterval = null;
|
||||||
|
}
|
||||||
});
|
});
|
||||||
</script>
|
</script>
|
||||||
|
|||||||
@ -50,68 +50,25 @@ const displayError = computed(() => localError.value ?? app.error);
|
|||||||
</script>
|
</script>
|
||||||
|
|
||||||
<template>
|
<template>
|
||||||
<div
|
<div class="h-full flex items-center justify-center bg-[var(--wraith-bg-primary)]">
|
||||||
class="unlock-root"
|
<div class="w-full max-w-[400px] p-10 bg-[var(--wraith-bg-secondary)] border border-[var(--wraith-border)] rounded-xl shadow-[0_8px_32px_rgba(0,0,0,0.5)]">
|
||||||
style="
|
|
||||||
height: 100%;
|
|
||||||
display: flex;
|
|
||||||
align-items: center;
|
|
||||||
justify-content: center;
|
|
||||||
background-color: var(--wraith-bg-primary);
|
|
||||||
"
|
|
||||||
>
|
|
||||||
<div
|
|
||||||
class="unlock-card"
|
|
||||||
style="
|
|
||||||
width: 100%;
|
|
||||||
max-width: 400px;
|
|
||||||
padding: 2.5rem;
|
|
||||||
background-color: var(--wraith-bg-secondary);
|
|
||||||
border: 1px solid var(--wraith-border);
|
|
||||||
border-radius: 12px;
|
|
||||||
box-shadow: 0 8px 32px rgba(0, 0, 0, 0.5);
|
|
||||||
"
|
|
||||||
>
|
|
||||||
<!-- Logo -->
|
<!-- Logo -->
|
||||||
<div style="text-align: center; margin-bottom: 2rem">
|
<div class="text-center mb-8">
|
||||||
<span
|
<span class="text-[2rem] font-extrabold tracking-[0.3em] text-[var(--wraith-accent-blue)] uppercase font-['Inter',monospace]">
|
||||||
style="
|
|
||||||
font-size: 2rem;
|
|
||||||
font-weight: 800;
|
|
||||||
letter-spacing: 0.3em;
|
|
||||||
color: var(--wraith-accent-blue);
|
|
||||||
text-transform: uppercase;
|
|
||||||
font-family: 'Inter', monospace;
|
|
||||||
"
|
|
||||||
>
|
|
||||||
WRAITH
|
WRAITH
|
||||||
</span>
|
</span>
|
||||||
<p
|
<p class="mt-2 text-[0.8rem] text-[var(--wraith-text-muted)] tracking-[0.15em] uppercase">
|
||||||
style="
|
|
||||||
margin: 0.5rem 0 0;
|
|
||||||
font-size: 0.8rem;
|
|
||||||
color: var(--wraith-text-muted);
|
|
||||||
letter-spacing: 0.15em;
|
|
||||||
text-transform: uppercase;
|
|
||||||
"
|
|
||||||
>
|
|
||||||
{{ isFirstRun ? "Initialize Secure Vault" : "Secure Desktop" }}
|
{{ isFirstRun ? "Initialize Secure Vault" : "Secure Desktop" }}
|
||||||
</p>
|
</p>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<!-- Form -->
|
<!-- Form -->
|
||||||
<form @submit.prevent="handleSubmit" style="display: flex; flex-direction: column; gap: 1rem">
|
<form @submit.prevent="handleSubmit" class="flex flex-col gap-4">
|
||||||
<!-- Master password -->
|
<!-- Master password -->
|
||||||
<div>
|
<div>
|
||||||
<label
|
<label
|
||||||
for="master-password"
|
for="master-password"
|
||||||
style="
|
class="block mb-[0.4rem] text-[0.8rem] text-[var(--wraith-text-secondary)] tracking-[0.05em]"
|
||||||
display: block;
|
|
||||||
margin-bottom: 0.4rem;
|
|
||||||
font-size: 0.8rem;
|
|
||||||
color: var(--wraith-text-secondary);
|
|
||||||
letter-spacing: 0.05em;
|
|
||||||
"
|
|
||||||
>
|
>
|
||||||
MASTER PASSWORD
|
MASTER PASSWORD
|
||||||
</label>
|
</label>
|
||||||
@ -122,20 +79,7 @@ const displayError = computed(() => localError.value ?? app.error);
|
|||||||
autocomplete="current-password"
|
autocomplete="current-password"
|
||||||
placeholder="Enter master password"
|
placeholder="Enter master password"
|
||||||
:disabled="loading"
|
:disabled="loading"
|
||||||
style="
|
class="w-full px-[0.9rem] py-[0.65rem] bg-[var(--wraith-bg-tertiary)] border border-[var(--wraith-border)] rounded-[6px] text-[var(--wraith-text-primary)] text-[0.95rem] outline-none transition-colors duration-150 box-border focus:border-[var(--wraith-accent-blue)]"
|
||||||
width: 100%;
|
|
||||||
padding: 0.65rem 0.9rem;
|
|
||||||
background-color: var(--wraith-bg-tertiary);
|
|
||||||
border: 1px solid var(--wraith-border);
|
|
||||||
border-radius: 6px;
|
|
||||||
color: var(--wraith-text-primary);
|
|
||||||
font-size: 0.95rem;
|
|
||||||
outline: none;
|
|
||||||
transition: border-color 0.15s ease;
|
|
||||||
box-sizing: border-box;
|
|
||||||
"
|
|
||||||
@focus="($event.target as HTMLInputElement).style.borderColor = 'var(--wraith-accent-blue)'"
|
|
||||||
@blur="($event.target as HTMLInputElement).style.borderColor = 'var(--wraith-border)'"
|
|
||||||
/>
|
/>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
@ -143,13 +87,7 @@ const displayError = computed(() => localError.value ?? app.error);
|
|||||||
<div v-if="isFirstRun">
|
<div v-if="isFirstRun">
|
||||||
<label
|
<label
|
||||||
for="confirm-password"
|
for="confirm-password"
|
||||||
style="
|
class="block mb-[0.4rem] text-[0.8rem] text-[var(--wraith-text-secondary)] tracking-[0.05em]"
|
||||||
display: block;
|
|
||||||
margin-bottom: 0.4rem;
|
|
||||||
font-size: 0.8rem;
|
|
||||||
color: var(--wraith-text-secondary);
|
|
||||||
letter-spacing: 0.05em;
|
|
||||||
"
|
|
||||||
>
|
>
|
||||||
CONFIRM PASSWORD
|
CONFIRM PASSWORD
|
||||||
</label>
|
</label>
|
||||||
@ -160,28 +98,9 @@ const displayError = computed(() => localError.value ?? app.error);
|
|||||||
autocomplete="new-password"
|
autocomplete="new-password"
|
||||||
placeholder="Confirm master password"
|
placeholder="Confirm master password"
|
||||||
:disabled="loading"
|
:disabled="loading"
|
||||||
style="
|
class="w-full px-[0.9rem] py-[0.65rem] bg-[var(--wraith-bg-tertiary)] border border-[var(--wraith-border)] rounded-[6px] text-[var(--wraith-text-primary)] text-[0.95rem] outline-none transition-colors duration-150 box-border focus:border-[var(--wraith-accent-blue)]"
|
||||||
width: 100%;
|
|
||||||
padding: 0.65rem 0.9rem;
|
|
||||||
background-color: var(--wraith-bg-tertiary);
|
|
||||||
border: 1px solid var(--wraith-border);
|
|
||||||
border-radius: 6px;
|
|
||||||
color: var(--wraith-text-primary);
|
|
||||||
font-size: 0.95rem;
|
|
||||||
outline: none;
|
|
||||||
transition: border-color 0.15s ease;
|
|
||||||
box-sizing: border-box;
|
|
||||||
"
|
|
||||||
@focus="($event.target as HTMLInputElement).style.borderColor = 'var(--wraith-accent-blue)'"
|
|
||||||
@blur="($event.target as HTMLInputElement).style.borderColor = 'var(--wraith-border)'"
|
|
||||||
/>
|
/>
|
||||||
<p
|
<p class="mt-[0.4rem] text-[0.75rem] text-[var(--wraith-text-muted)]">
|
||||||
style="
|
|
||||||
margin: 0.4rem 0 0;
|
|
||||||
font-size: 0.75rem;
|
|
||||||
color: var(--wraith-text-muted);
|
|
||||||
"
|
|
||||||
>
|
|
||||||
Minimum 12 characters. This password cannot be recovered.
|
Minimum 12 characters. This password cannot be recovered.
|
||||||
</p>
|
</p>
|
||||||
</div>
|
</div>
|
||||||
@ -189,14 +108,7 @@ const displayError = computed(() => localError.value ?? app.error);
|
|||||||
<!-- Error message -->
|
<!-- Error message -->
|
||||||
<div
|
<div
|
||||||
v-if="displayError"
|
v-if="displayError"
|
||||||
style="
|
class="px-[0.9rem] py-[0.6rem] bg-[rgba(248,81,73,0.1)] border border-[rgba(248,81,73,0.3)] rounded-[6px] text-[var(--wraith-accent-red)] text-[0.85rem]"
|
||||||
padding: 0.6rem 0.9rem;
|
|
||||||
background-color: rgba(248, 81, 73, 0.1);
|
|
||||||
border: 1px solid rgba(248, 81, 73, 0.3);
|
|
||||||
border-radius: 6px;
|
|
||||||
color: var(--wraith-accent-red);
|
|
||||||
font-size: 0.85rem;
|
|
||||||
"
|
|
||||||
>
|
>
|
||||||
{{ displayError }}
|
{{ displayError }}
|
||||||
</div>
|
</div>
|
||||||
@ -205,22 +117,8 @@ const displayError = computed(() => localError.value ?? app.error);
|
|||||||
<button
|
<button
|
||||||
type="submit"
|
type="submit"
|
||||||
:disabled="loading"
|
:disabled="loading"
|
||||||
style="
|
class="w-full py-[0.7rem] mt-2 bg-[var(--wraith-accent-blue)] text-[#0d1117] font-bold text-[0.9rem] tracking-[0.08em] uppercase border-none rounded-[6px] transition-[opacity,background-color] duration-150"
|
||||||
width: 100%;
|
:class="loading ? 'opacity-60 cursor-not-allowed' : 'cursor-pointer'"
|
||||||
padding: 0.7rem;
|
|
||||||
margin-top: 0.5rem;
|
|
||||||
background-color: var(--wraith-accent-blue);
|
|
||||||
color: #0d1117;
|
|
||||||
font-weight: 700;
|
|
||||||
font-size: 0.9rem;
|
|
||||||
letter-spacing: 0.08em;
|
|
||||||
text-transform: uppercase;
|
|
||||||
border: none;
|
|
||||||
border-radius: 6px;
|
|
||||||
cursor: pointer;
|
|
||||||
transition: opacity 0.15s ease, background-color 0.15s ease;
|
|
||||||
"
|
|
||||||
:style="{ opacity: loading ? '0.6' : '1', cursor: loading ? 'not-allowed' : 'pointer' }"
|
|
||||||
>
|
>
|
||||||
<span v-if="loading">
|
<span v-if="loading">
|
||||||
{{ isFirstRun ? "Creating vault..." : "Unlocking..." }}
|
{{ isFirstRun ? "Creating vault..." : "Unlocking..." }}
|
||||||
@ -232,14 +130,7 @@ const displayError = computed(() => localError.value ?? app.error);
|
|||||||
</form>
|
</form>
|
||||||
|
|
||||||
<!-- Footer hint -->
|
<!-- Footer hint -->
|
||||||
<p
|
<p class="mt-6 text-center text-[0.75rem] text-[var(--wraith-text-muted)]">
|
||||||
style="
|
|
||||||
margin: 1.5rem 0 0;
|
|
||||||
text-align: center;
|
|
||||||
font-size: 0.75rem;
|
|
||||||
color: var(--wraith-text-muted);
|
|
||||||
"
|
|
||||||
>
|
|
||||||
<template v-if="isFirstRun">
|
<template v-if="isFirstRun">
|
||||||
Your vault will be encrypted with AES-256-GCM.
|
Your vault will be encrypted with AES-256-GCM.
|
||||||
</template>
|
</template>
|
||||||
|
|||||||
@ -51,22 +51,33 @@ export const useConnectionStore = defineStore("connection", () => {
|
|||||||
);
|
);
|
||||||
});
|
});
|
||||||
|
|
||||||
|
/** Memoized map of groupId → filtered connections. Recomputes only when connections or searchQuery change. */
|
||||||
|
const connectionsByGroupMap = computed<Record<number, Connection[]>>(() => {
|
||||||
|
const q = searchQuery.value.toLowerCase().trim();
|
||||||
|
const map: Record<number, Connection[]> = {};
|
||||||
|
for (const c of connections.value) {
|
||||||
|
if (c.groupId === null) continue;
|
||||||
|
if (q) {
|
||||||
|
const match =
|
||||||
|
c.name.toLowerCase().includes(q) ||
|
||||||
|
c.hostname.toLowerCase().includes(q) ||
|
||||||
|
c.tags?.some((t) => t.toLowerCase().includes(q));
|
||||||
|
if (!match) continue;
|
||||||
|
}
|
||||||
|
if (!map[c.groupId]) map[c.groupId] = [];
|
||||||
|
map[c.groupId].push(c);
|
||||||
|
}
|
||||||
|
return map;
|
||||||
|
});
|
||||||
|
|
||||||
/** Get connections belonging to a specific group. */
|
/** Get connections belonging to a specific group. */
|
||||||
function connectionsByGroup(groupId: number): Connection[] {
|
function connectionsByGroup(groupId: number): Connection[] {
|
||||||
const q = searchQuery.value.toLowerCase().trim();
|
return connectionsByGroupMap.value[groupId] ?? [];
|
||||||
const groupConns = connections.value.filter((c) => c.groupId === groupId);
|
|
||||||
if (!q) return groupConns;
|
|
||||||
return groupConns.filter(
|
|
||||||
(c) =>
|
|
||||||
c.name.toLowerCase().includes(q) ||
|
|
||||||
c.hostname.toLowerCase().includes(q) ||
|
|
||||||
c.tags?.some((t) => t.toLowerCase().includes(q)),
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Check if a group has any matching connections (for search filtering). */
|
/** Check if a group has any matching connections (for search filtering). */
|
||||||
function groupHasResults(groupId: number): boolean {
|
function groupHasResults(groupId: number): boolean {
|
||||||
return connectionsByGroup(groupId).length > 0;
|
return (connectionsByGroupMap.value[groupId]?.length ?? 0) > 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Load connections from the Rust backend. */
|
/** Load connections from the Rust backend. */
|
||||||
@ -101,6 +112,7 @@ export const useConnectionStore = defineStore("connection", () => {
|
|||||||
groups,
|
groups,
|
||||||
searchQuery,
|
searchQuery,
|
||||||
filteredConnections,
|
filteredConnections,
|
||||||
|
connectionsByGroupMap,
|
||||||
connectionsByGroup,
|
connectionsByGroup,
|
||||||
groupHasResults,
|
groupHasResults,
|
||||||
loadConnections,
|
loadConnections,
|
||||||
|
|||||||
@ -2,6 +2,7 @@ import { defineStore } from "pinia";
|
|||||||
import { ref, computed } from "vue";
|
import { ref, computed } from "vue";
|
||||||
import { invoke } from "@tauri-apps/api/core";
|
import { invoke } from "@tauri-apps/api/core";
|
||||||
import { listen } from "@tauri-apps/api/event";
|
import { listen } from "@tauri-apps/api/event";
|
||||||
|
import type { UnlistenFn } from "@tauri-apps/api/event";
|
||||||
import { useConnectionStore } from "@/stores/connection.store";
|
import { useConnectionStore } from "@/stores/connection.store";
|
||||||
import type { ThemeDefinition } from "@/components/common/ThemePicker.vue";
|
import type { ThemeDefinition } from "@/components/common/ThemePicker.vue";
|
||||||
|
|
||||||
@ -39,10 +40,14 @@ export const useSessionStore = defineStore("session", () => {
|
|||||||
|
|
||||||
const sessionCount = computed(() => sessions.value.length);
|
const sessionCount = computed(() => sessions.value.length);
|
||||||
|
|
||||||
|
const sessionUnlisteners = new Map<string, Array<UnlistenFn>>();
|
||||||
|
|
||||||
// Listen for backend close/exit events to update session status
|
// Listen for backend close/exit events to update session status
|
||||||
function setupStatusListeners(sessionId: string): void {
|
async function setupStatusListeners(sessionId: string): Promise<void> {
|
||||||
listen(`ssh:close:${sessionId}`, () => markDisconnected(sessionId));
|
const unlisteners: UnlistenFn[] = [];
|
||||||
listen(`ssh:exit:${sessionId}`, () => markDisconnected(sessionId));
|
unlisteners.push(await listen(`ssh:close:${sessionId}`, () => markDisconnected(sessionId)));
|
||||||
|
unlisteners.push(await listen(`ssh:exit:${sessionId}`, () => markDisconnected(sessionId)));
|
||||||
|
sessionUnlisteners.set(sessionId, unlisteners);
|
||||||
}
|
}
|
||||||
|
|
||||||
function markDisconnected(sessionId: string): void {
|
function markDisconnected(sessionId: string): void {
|
||||||
@ -92,6 +97,12 @@ export const useSessionStore = defineStore("session", () => {
|
|||||||
console.error("Failed to disconnect session:", err);
|
console.error("Failed to disconnect session:", err);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const unlisteners = sessionUnlisteners.get(id);
|
||||||
|
if (unlisteners) {
|
||||||
|
unlisteners.forEach((fn) => fn());
|
||||||
|
sessionUnlisteners.delete(id);
|
||||||
|
}
|
||||||
|
|
||||||
sessions.value.splice(idx, 1);
|
sessions.value.splice(idx, 1);
|
||||||
|
|
||||||
if (activeSessionId.value === id) {
|
if (activeSessionId.value === id) {
|
||||||
@ -115,14 +126,173 @@ export const useSessionStore = defineStore("session", () => {
|
|||||||
return count === 0 ? baseName : `${baseName} (${count + 1})`;
|
return count === 0 ? baseName : `${baseName} (${count + 1})`;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type CredentialRow = { id: number; name: string; username: string | null; domain?: string | null; credentialType: string; sshKeyId: number | null };
|
||||||
|
|
||||||
|
async function resolveCredentials(credentialId: number): Promise<CredentialRow | null> {
|
||||||
|
try {
|
||||||
|
const allCreds = await invoke<CredentialRow[]>("list_credentials");
|
||||||
|
return allCreds.find((c) => c.id === credentialId) ?? null;
|
||||||
|
} catch (credErr) {
|
||||||
|
console.warn("Failed to resolve credential:", credErr);
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
async function connectSsh(
|
||||||
|
conn: { id: number; name: string; hostname: string; port: number; credentialId?: number | null },
|
||||||
|
connectionId: number,
|
||||||
|
): Promise<void> {
|
||||||
|
let sessionId: string;
|
||||||
|
let resolvedUsername = "";
|
||||||
|
let resolvedPassword = "";
|
||||||
|
|
||||||
|
if (conn.credentialId) {
|
||||||
|
const cred = await resolveCredentials(conn.credentialId);
|
||||||
|
if (cred) {
|
||||||
|
resolvedUsername = cred.username ?? "";
|
||||||
|
if (cred.credentialType === "ssh_key" && cred.sshKeyId) {
|
||||||
|
const [privateKey, passphrase] = await invoke<[string, string]>("decrypt_ssh_key", { sshKeyId: cred.sshKeyId });
|
||||||
|
sessionId = await invoke<string>("connect_ssh_with_key", {
|
||||||
|
hostname: conn.hostname,
|
||||||
|
port: conn.port,
|
||||||
|
username: resolvedUsername,
|
||||||
|
privateKeyPem: privateKey,
|
||||||
|
passphrase: passphrase || null,
|
||||||
|
cols: 120,
|
||||||
|
rows: 40,
|
||||||
|
});
|
||||||
|
sessions.value.push({
|
||||||
|
id: sessionId,
|
||||||
|
connectionId,
|
||||||
|
name: disambiguatedName(conn.name, connectionId),
|
||||||
|
protocol: "ssh",
|
||||||
|
active: true,
|
||||||
|
username: resolvedUsername,
|
||||||
|
status: "connected",
|
||||||
|
hasActivity: false,
|
||||||
|
});
|
||||||
|
setupStatusListeners(sessionId);
|
||||||
|
activeSessionId.value = sessionId;
|
||||||
|
return;
|
||||||
|
} else {
|
||||||
|
resolvedPassword = await invoke<string>("decrypt_password", { credentialId: cred.id });
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
if (!resolvedUsername) throw new Error("NO_CREDENTIALS");
|
||||||
|
sessionId = await invoke<string>("connect_ssh", {
|
||||||
|
hostname: conn.hostname,
|
||||||
|
port: conn.port,
|
||||||
|
username: resolvedUsername,
|
||||||
|
password: resolvedPassword,
|
||||||
|
cols: 120,
|
||||||
|
rows: 40,
|
||||||
|
});
|
||||||
|
} catch (sshErr: unknown) {
|
||||||
|
const errMsg = sshErr instanceof Error ? sshErr.message : typeof sshErr === "string" ? sshErr : String(sshErr);
|
||||||
|
const errLower = errMsg.toLowerCase();
|
||||||
|
if (errLower.includes("no_credentials") || errLower.includes("unable to authenticate") || errLower.includes("authentication") || errLower.includes("rejected")) {
|
||||||
|
const username = window.prompt(`Username for ${conn.hostname}:`, resolvedUsername || "root");
|
||||||
|
if (!username) throw new Error("Connection cancelled");
|
||||||
|
const password = window.prompt(`Password for ${username}@${conn.hostname}:`);
|
||||||
|
if (password === null) throw new Error("Connection cancelled");
|
||||||
|
resolvedUsername = username;
|
||||||
|
sessionId = await invoke<string>("connect_ssh", {
|
||||||
|
hostname: conn.hostname,
|
||||||
|
port: conn.port,
|
||||||
|
username,
|
||||||
|
password,
|
||||||
|
cols: 120,
|
||||||
|
rows: 40,
|
||||||
|
});
|
||||||
|
} else {
|
||||||
|
throw sshErr;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
sessions.value.push({
|
||||||
|
id: sessionId,
|
||||||
|
connectionId,
|
||||||
|
name: disambiguatedName(conn.name, connectionId),
|
||||||
|
protocol: "ssh",
|
||||||
|
active: true,
|
||||||
|
username: resolvedUsername,
|
||||||
|
status: "connected",
|
||||||
|
hasActivity: false,
|
||||||
|
});
|
||||||
|
setupStatusListeners(sessionId);
|
||||||
|
activeSessionId.value = sessionId;
|
||||||
|
}
|
||||||
|
|
||||||
|
async function connectRdp(
|
||||||
|
conn: { id: number; name: string; hostname: string; port: number; credentialId?: number | null; options?: string },
|
||||||
|
connectionId: number,
|
||||||
|
): Promise<void> {
|
||||||
|
let username = "";
|
||||||
|
let password = "";
|
||||||
|
let domain = "";
|
||||||
|
|
||||||
|
if (conn.credentialId) {
|
||||||
|
const cred = await resolveCredentials(conn.credentialId);
|
||||||
|
if (cred && cred.credentialType === "password") {
|
||||||
|
username = cred.username ?? "";
|
||||||
|
domain = cred.domain ?? "";
|
||||||
|
password = await invoke<string>("decrypt_password", { credentialId: cred.id });
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!username && conn.options) {
|
||||||
|
try {
|
||||||
|
const opts = JSON.parse(conn.options);
|
||||||
|
if (opts?.username) username = opts.username;
|
||||||
|
if (opts?.password) password = opts.password;
|
||||||
|
if (opts?.domain) domain = opts.domain;
|
||||||
|
} catch {
|
||||||
|
// ignore malformed options
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
let sessionId: string;
|
||||||
|
try {
|
||||||
|
sessionId = await invoke<string>("connect_rdp", {
|
||||||
|
config: { hostname: conn.hostname, port: conn.port, username, password, domain, width: 1920, height: 1080 },
|
||||||
|
});
|
||||||
|
} catch (rdpErr: unknown) {
|
||||||
|
const errMsg = rdpErr instanceof Error ? rdpErr.message : typeof rdpErr === "string" ? rdpErr : String(rdpErr);
|
||||||
|
if (errMsg.includes("NO_CREDENTIALS") || errMsg.includes("authentication") || errMsg.includes("logon failure")) {
|
||||||
|
const promptedUsername = prompt(`Username for ${conn.hostname}:`, "Administrator");
|
||||||
|
if (!promptedUsername) throw new Error("Connection cancelled");
|
||||||
|
const promptedPassword = prompt(`Password for ${promptedUsername}@${conn.hostname}:`);
|
||||||
|
if (promptedPassword === null) throw new Error("Connection cancelled");
|
||||||
|
const promptedDomain = prompt(`Domain (leave blank if none):`, "") ?? "";
|
||||||
|
username = promptedUsername;
|
||||||
|
sessionId = await invoke<string>("connect_rdp", {
|
||||||
|
config: { hostname: conn.hostname, port: conn.port, username: promptedUsername, password: promptedPassword, domain: promptedDomain, width: 1920, height: 1080 },
|
||||||
|
});
|
||||||
|
} else {
|
||||||
|
throw rdpErr;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
sessions.value.push({
|
||||||
|
id: sessionId,
|
||||||
|
connectionId,
|
||||||
|
name: disambiguatedName(conn.name, connectionId),
|
||||||
|
protocol: "rdp",
|
||||||
|
active: true,
|
||||||
|
username,
|
||||||
|
status: "connected",
|
||||||
|
hasActivity: false,
|
||||||
|
});
|
||||||
|
activeSessionId.value = sessionId;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Connect to a server by connection ID.
|
* Connect to a server by connection ID.
|
||||||
* Multiple sessions to the same host are allowed (MobaXTerm-style).
|
* Multiple sessions to the same host are allowed (MobaXTerm-style).
|
||||||
* Each gets its own tab with a disambiguated name like "Asgard (2)".
|
* Each gets its own tab with a disambiguated name like "Asgard (2)".
|
||||||
*
|
|
||||||
* For Tauri: we must resolve the connection details ourselves and pass
|
|
||||||
* hostname/port/username/password directly to connect_ssh, because the
|
|
||||||
* Rust side has no knowledge of connection IDs — the vault owns credentials.
|
|
||||||
*/
|
*/
|
||||||
async function connect(connectionId: number): Promise<void> {
|
async function connect(connectionId: number): Promise<void> {
|
||||||
const connectionStore = useConnectionStore();
|
const connectionStore = useConnectionStore();
|
||||||
@ -132,214 +302,14 @@ export const useSessionStore = defineStore("session", () => {
|
|||||||
connecting.value = true;
|
connecting.value = true;
|
||||||
try {
|
try {
|
||||||
if (conn.protocol === "ssh") {
|
if (conn.protocol === "ssh") {
|
||||||
let sessionId: string;
|
await connectSsh(conn, connectionId);
|
||||||
let resolvedUsername = "";
|
|
||||||
let resolvedPassword = "";
|
|
||||||
|
|
||||||
// If connection has a linked credential, decrypt it from the vault
|
|
||||||
if (conn.credentialId) {
|
|
||||||
try {
|
|
||||||
const allCreds = await invoke<{ id: number; name: string; username: string | null; credentialType: string; sshKeyId: number | null }[]>("list_credentials");
|
|
||||||
const cred = allCreds.find((c) => c.id === conn.credentialId);
|
|
||||||
|
|
||||||
if (cred) {
|
|
||||||
resolvedUsername = cred.username ?? "";
|
|
||||||
|
|
||||||
if (cred.credentialType === "ssh_key" && cred.sshKeyId) {
|
|
||||||
// SSH key auth — decrypt key from vault
|
|
||||||
const [privateKey, passphrase] = await invoke<[string, string]>("decrypt_ssh_key", { sshKeyId: cred.sshKeyId });
|
|
||||||
sessionId = await invoke<string>("connect_ssh_with_key", {
|
|
||||||
hostname: conn.hostname,
|
|
||||||
port: conn.port,
|
|
||||||
username: resolvedUsername,
|
|
||||||
privateKeyPem: privateKey,
|
|
||||||
passphrase: passphrase || null,
|
|
||||||
cols: 120,
|
|
||||||
rows: 40,
|
|
||||||
});
|
|
||||||
|
|
||||||
sessions.value.push({
|
|
||||||
id: sessionId,
|
|
||||||
connectionId,
|
|
||||||
name: disambiguatedName(conn.name, connectionId),
|
|
||||||
protocol: "ssh",
|
|
||||||
active: true,
|
|
||||||
username: resolvedUsername,
|
|
||||||
status: "connected",
|
|
||||||
hasActivity: false,
|
|
||||||
});
|
|
||||||
setupStatusListeners(sessionId);
|
|
||||||
activeSessionId.value = sessionId;
|
|
||||||
return; // early return — key auth handled
|
|
||||||
} else {
|
|
||||||
// Password auth — decrypt password from vault
|
|
||||||
resolvedPassword = await invoke<string>("decrypt_password", { credentialId: cred.id });
|
|
||||||
}
|
|
||||||
}
|
|
||||||
} catch (credErr) {
|
|
||||||
console.warn("Failed to resolve credential, will prompt:", credErr);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
if (!resolvedUsername) {
|
|
||||||
// No credential linked — prompt immediately
|
|
||||||
throw new Error("NO_CREDENTIALS");
|
|
||||||
}
|
|
||||||
sessionId = await invoke<string>("connect_ssh", {
|
|
||||||
hostname: conn.hostname,
|
|
||||||
port: conn.port,
|
|
||||||
username: resolvedUsername,
|
|
||||||
password: resolvedPassword,
|
|
||||||
cols: 120,
|
|
||||||
rows: 40,
|
|
||||||
});
|
|
||||||
} catch (sshErr: unknown) {
|
|
||||||
const errMsg = sshErr instanceof Error
|
|
||||||
? sshErr.message
|
|
||||||
: typeof sshErr === "string"
|
|
||||||
? sshErr
|
|
||||||
: String(sshErr);
|
|
||||||
|
|
||||||
// If no credentials or auth failed, prompt for username/password
|
|
||||||
const errLower = errMsg.toLowerCase();
|
|
||||||
if (errLower.includes("no_credentials") || errLower.includes("unable to authenticate") || errLower.includes("authentication") || errLower.includes("rejected")) {
|
|
||||||
const username = window.prompt(`Username for ${conn.hostname}:`, resolvedUsername || "root");
|
|
||||||
if (!username) throw new Error("Connection cancelled");
|
|
||||||
const password = window.prompt(`Password for ${username}@${conn.hostname}:`);
|
|
||||||
if (password === null) throw new Error("Connection cancelled");
|
|
||||||
|
|
||||||
resolvedUsername = username;
|
|
||||||
sessionId = await invoke<string>("connect_ssh", {
|
|
||||||
hostname: conn.hostname,
|
|
||||||
port: conn.port,
|
|
||||||
username,
|
|
||||||
password,
|
|
||||||
cols: 120,
|
|
||||||
rows: 40,
|
|
||||||
});
|
|
||||||
} else {
|
|
||||||
throw sshErr;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
sessions.value.push({
|
|
||||||
id: sessionId,
|
|
||||||
connectionId,
|
|
||||||
name: disambiguatedName(conn.name, connectionId),
|
|
||||||
protocol: "ssh",
|
|
||||||
active: true,
|
|
||||||
username: resolvedUsername,
|
|
||||||
status: "connected",
|
|
||||||
hasActivity: false,
|
|
||||||
});
|
|
||||||
setupStatusListeners(sessionId);
|
|
||||||
activeSessionId.value = sessionId;
|
|
||||||
} else if (conn.protocol === "rdp") {
|
} else if (conn.protocol === "rdp") {
|
||||||
let username = "";
|
await connectRdp(conn, connectionId);
|
||||||
let password = "";
|
|
||||||
let domain = "";
|
|
||||||
|
|
||||||
// Try vault credentials first (same as SSH path)
|
|
||||||
if (conn.credentialId) {
|
|
||||||
try {
|
|
||||||
const allCreds = await invoke<{ id: number; name: string; username: string | null; domain: string | null; credentialType: string; sshKeyId: number | null }[]>("list_credentials");
|
|
||||||
const cred = allCreds.find((c) => c.id === conn.credentialId);
|
|
||||||
if (cred && cred.credentialType === "password") {
|
|
||||||
username = cred.username ?? "";
|
|
||||||
domain = cred.domain ?? "";
|
|
||||||
password = await invoke<string>("decrypt_password", { credentialId: cred.id });
|
|
||||||
}
|
|
||||||
} catch (credErr) {
|
|
||||||
console.warn("Failed to resolve RDP credential from vault:", credErr);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Fall back to connection options JSON if vault didn't provide creds
|
|
||||||
if (!username && conn.options) {
|
|
||||||
try {
|
|
||||||
const opts = JSON.parse(conn.options);
|
|
||||||
if (opts?.username) username = opts.username;
|
|
||||||
if (opts?.password) password = opts.password;
|
|
||||||
if (opts?.domain) domain = opts.domain;
|
|
||||||
} catch {
|
|
||||||
// ignore malformed options
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
let sessionId: string;
|
|
||||||
try {
|
|
||||||
sessionId = await invoke<string>("connect_rdp", {
|
|
||||||
config: {
|
|
||||||
hostname: conn.hostname,
|
|
||||||
port: conn.port,
|
|
||||||
username,
|
|
||||||
password,
|
|
||||||
domain,
|
|
||||||
width: 1920,
|
|
||||||
height: 1080,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
} catch (rdpErr: unknown) {
|
|
||||||
const errMsg =
|
|
||||||
rdpErr instanceof Error
|
|
||||||
? rdpErr.message
|
|
||||||
: typeof rdpErr === "string"
|
|
||||||
? rdpErr
|
|
||||||
: String(rdpErr);
|
|
||||||
|
|
||||||
// If credentials are missing or rejected, prompt the operator
|
|
||||||
if (
|
|
||||||
errMsg.includes("NO_CREDENTIALS") ||
|
|
||||||
errMsg.includes("authentication") ||
|
|
||||||
errMsg.includes("logon failure")
|
|
||||||
) {
|
|
||||||
const promptedUsername = prompt(
|
|
||||||
`Username for ${conn.hostname}:`,
|
|
||||||
"Administrator",
|
|
||||||
);
|
|
||||||
if (!promptedUsername) throw new Error("Connection cancelled");
|
|
||||||
const promptedPassword = prompt(
|
|
||||||
`Password for ${promptedUsername}@${conn.hostname}:`,
|
|
||||||
);
|
|
||||||
if (promptedPassword === null) throw new Error("Connection cancelled");
|
|
||||||
const promptedDomain = prompt(`Domain (leave blank if none):`, "") ?? "";
|
|
||||||
|
|
||||||
username = promptedUsername;
|
|
||||||
|
|
||||||
sessionId = await invoke<string>("connect_rdp", {
|
|
||||||
config: {
|
|
||||||
hostname: conn.hostname,
|
|
||||||
port: conn.port,
|
|
||||||
username: promptedUsername,
|
|
||||||
password: promptedPassword,
|
|
||||||
domain: promptedDomain,
|
|
||||||
width: 1920,
|
|
||||||
height: 1080,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
} else {
|
|
||||||
throw rdpErr;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
sessions.value.push({
|
|
||||||
id: sessionId,
|
|
||||||
connectionId,
|
|
||||||
name: disambiguatedName(conn.name, connectionId),
|
|
||||||
protocol: "rdp",
|
|
||||||
active: true,
|
|
||||||
username,
|
|
||||||
status: "connected",
|
|
||||||
hasActivity: false,
|
|
||||||
});
|
|
||||||
activeSessionId.value = sessionId;
|
|
||||||
}
|
}
|
||||||
} catch (err: unknown) {
|
} catch (err: unknown) {
|
||||||
const msg = err instanceof Error ? err.message : typeof err === "string" ? err : String(err);
|
const msg = err instanceof Error ? err.message : typeof err === "string" ? err : String(err);
|
||||||
console.error("Connection failed:", msg);
|
console.error("Connection failed:", msg);
|
||||||
lastError.value = msg;
|
lastError.value = msg;
|
||||||
// Show error as native alert so it's visible without DevTools
|
|
||||||
alert(`Connection failed: ${msg}`);
|
alert(`Connection failed: ${msg}`);
|
||||||
} finally {
|
} finally {
|
||||||
connecting.value = false;
|
connecting.value = false;
|
||||||
@ -366,7 +336,8 @@ export const useSessionStore = defineStore("session", () => {
|
|||||||
});
|
});
|
||||||
|
|
||||||
// Listen for PTY close
|
// Listen for PTY close
|
||||||
listen(`pty:close:${sessionId}`, () => markDisconnected(sessionId));
|
const unlistenPty = await listen(`pty:close:${sessionId}`, () => markDisconnected(sessionId));
|
||||||
|
sessionUnlisteners.set(sessionId, [unlistenPty]);
|
||||||
|
|
||||||
activeSessionId.value = sessionId;
|
activeSessionId.value = sessionId;
|
||||||
} catch (err: unknown) {
|
} catch (err: unknown) {
|
||||||
|
|||||||
@ -1,10 +1,20 @@
|
|||||||
import { defineConfig } from "vite";
|
import { defineConfig, type Plugin } from "vite";
|
||||||
import vue from "@vitejs/plugin-vue";
|
import vue from "@vitejs/plugin-vue";
|
||||||
import tailwindcss from "@tailwindcss/vite";
|
import tailwindcss from "@tailwindcss/vite";
|
||||||
import { resolve } from "path";
|
import { resolve } from "path";
|
||||||
|
|
||||||
|
/** Strip crossorigin attribute from HTML — WKWebView + Tauri custom protocol compatibility. */
|
||||||
|
function stripCrossOrigin(): Plugin {
|
||||||
|
return {
|
||||||
|
name: "strip-crossorigin",
|
||||||
|
transformIndexHtml(html) {
|
||||||
|
return html.replace(/ crossorigin/g, "");
|
||||||
|
},
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
export default defineConfig({
|
export default defineConfig({
|
||||||
plugins: [vue(), tailwindcss()],
|
plugins: [vue(), tailwindcss(), stripCrossOrigin()],
|
||||||
resolve: {
|
resolve: {
|
||||||
alias: {
|
alias: {
|
||||||
"@": resolve(__dirname, "src"),
|
"@": resolve(__dirname, "src"),
|
||||||
@ -23,5 +33,9 @@ export default defineConfig({
|
|||||||
target: ["es2021", "chrome100", "safari13"],
|
target: ["es2021", "chrome100", "safari13"],
|
||||||
minify: !process.env.TAURI_DEBUG ? "esbuild" : false,
|
minify: !process.env.TAURI_DEBUG ? "esbuild" : false,
|
||||||
sourcemap: !!process.env.TAURI_DEBUG,
|
sourcemap: !!process.env.TAURI_DEBUG,
|
||||||
|
// Disable crossorigin attribute on script/link tags — WKWebView on
|
||||||
|
// macOS may reject CORS-mode requests for Tauri's custom tauri://
|
||||||
|
// protocol in dynamically created child WebviewWindows.
|
||||||
|
crossOriginLoading: false,
|
||||||
},
|
},
|
||||||
});
|
});
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user