hardware.power.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172
  1. package main
  2. import (
  3. "log"
  4. "net/http"
  5. "os/exec"
  6. "runtime"
  7. "imuslab.com/arozos/mod/common"
  8. )
  9. func HardwarePowerInit() {
  10. if *allow_hardware_management {
  11. //Only register these paths when hardware management is enabled
  12. http.HandleFunc("/system/power/shutdown", hardware_power_poweroff)
  13. http.HandleFunc("/system/power/restart", hardware_power_restart)
  14. //Register a power handler in system setting menu
  15. registerSetting(settingModule{
  16. Name: "Power",
  17. Desc: "Set the power state of the host device",
  18. IconPath: "SystemAO/boot/img/boot.png",
  19. Group: "Info",
  20. StartDir: "SystemAO/boot/poweroff.html",
  21. RequireAdmin: true,
  22. })
  23. }
  24. http.HandleFunc("/system/power/accessCheck", hardware_power_checkIfHardware)
  25. }
  26. func hardware_power_checkIfHardware(w http.ResponseWriter, r *http.Request) {
  27. if *allow_hardware_management {
  28. common.SendJSONResponse(w, "true")
  29. } else {
  30. common.SendJSONResponse(w, "false")
  31. }
  32. }
  33. func hardware_power_poweroff(w http.ResponseWriter, r *http.Request) {
  34. userinfo, err := userHandler.GetUserInfoFromRequest(w, r)
  35. if err != nil {
  36. w.WriteHeader(http.StatusUnauthorized)
  37. w.Write([]byte("401 Unauthorized"))
  38. return
  39. }
  40. if !userinfo.IsAdmin() {
  41. common.SendErrorResponse(w, "Permission Denied")
  42. return
  43. }
  44. if !sudo_mode {
  45. common.SendErrorResponse(w, "Sudo mode required")
  46. return
  47. }
  48. //Double check password for this user
  49. password, err := common.Mv(r, "password", true)
  50. if err != nil {
  51. common.SendErrorResponse(w, "Password Incorrect")
  52. return
  53. }
  54. passwordCorrect, rejectionReason := authAgent.ValidateUsernameAndPasswordWithReason(userinfo.Username, password)
  55. if !passwordCorrect {
  56. common.SendErrorResponse(w, rejectionReason)
  57. return
  58. }
  59. if runtime.GOOS == "windows" {
  60. //Only allow Linux to do power operation
  61. cmd := exec.Command("shutdown", "-s", "-t", "20")
  62. out, err := cmd.CombinedOutput()
  63. if err != nil {
  64. log.Println(string(out))
  65. common.SendErrorResponse(w, string(out))
  66. }
  67. log.Println(string(out))
  68. }
  69. if runtime.GOOS == "linux" {
  70. //Only allow Linux to do power operation
  71. cmd := exec.Command("/sbin/shutdown")
  72. out, err := cmd.CombinedOutput()
  73. if err != nil {
  74. log.Println(string(out))
  75. common.SendErrorResponse(w, string(out))
  76. }
  77. log.Println(string(out))
  78. }
  79. if runtime.GOOS == "darwin" {
  80. //Only allow Linux to do power operation
  81. cmd := exec.Command("sudo", "shutdown", "-h", "+1")
  82. out, err := cmd.CombinedOutput()
  83. if err != nil {
  84. log.Println(string(out))
  85. common.SendErrorResponse(w, string(out))
  86. }
  87. log.Println(string(out))
  88. }
  89. common.SendOK(w)
  90. }
  91. func hardware_power_restart(w http.ResponseWriter, r *http.Request) {
  92. userinfo, err := userHandler.GetUserInfoFromRequest(w, r)
  93. if err != nil {
  94. w.WriteHeader(http.StatusUnauthorized)
  95. w.Write([]byte("401 Unauthorized"))
  96. return
  97. }
  98. if !userinfo.IsAdmin() {
  99. common.SendErrorResponse(w, "Permission Denied")
  100. return
  101. }
  102. if !sudo_mode {
  103. common.SendErrorResponse(w, "Sudo mode required")
  104. return
  105. }
  106. //Double check password for this user
  107. password, err := common.Mv(r, "password", true)
  108. if err != nil {
  109. common.SendErrorResponse(w, "Password Incorrect")
  110. return
  111. }
  112. passwordCorrect, rejectionReason := authAgent.ValidateUsernameAndPasswordWithReason(userinfo.Username, password)
  113. if !passwordCorrect {
  114. common.SendErrorResponse(w, rejectionReason)
  115. return
  116. }
  117. if runtime.GOOS == "windows" {
  118. //Only allow Linux to do power operation
  119. cmd := exec.Command("shutdown", "-r", "-t", "20")
  120. out, err := cmd.CombinedOutput()
  121. if err != nil {
  122. log.Println(string(out))
  123. common.SendErrorResponse(w, string(out))
  124. }
  125. log.Println(string(out))
  126. }
  127. if runtime.GOOS == "linux" {
  128. //Only allow Linux to do power operation
  129. cmd := exec.Command("systemctl", "reboot")
  130. out, err := cmd.CombinedOutput()
  131. if err != nil {
  132. log.Println(string(out))
  133. common.SendErrorResponse(w, string(out))
  134. }
  135. log.Println(string(out))
  136. }
  137. if runtime.GOOS == "darwin" {
  138. //Only allow Linux to do power operation
  139. cmd := exec.Command("shutdown", "-r", "+1")
  140. out, err := cmd.CombinedOutput()
  141. if err != nil {
  142. log.Println(string(out))
  143. common.SendErrorResponse(w, string(out))
  144. }
  145. log.Println(string(out))
  146. }
  147. common.SendOK(w)
  148. }