@phi-code-admin/camofox-browser 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +571 -0
- package/Dockerfile +86 -0
- package/LICENSE +21 -0
- package/README.md +691 -0
- package/camofox.config.json +10 -0
- package/dist/plugin.js +616 -0
- package/lib/auth.js +134 -0
- package/lib/camoufox-executable.js +189 -0
- package/lib/config.js +153 -0
- package/lib/cookies.js +119 -0
- package/lib/downloads.js +168 -0
- package/lib/extract.js +74 -0
- package/lib/fly.js +54 -0
- package/lib/images.js +88 -0
- package/lib/inflight.js +16 -0
- package/lib/launcher.js +47 -0
- package/lib/macros.js +31 -0
- package/lib/metrics.js +184 -0
- package/lib/openapi.js +105 -0
- package/lib/persistence.js +89 -0
- package/lib/plugins.js +175 -0
- package/lib/proxy.js +277 -0
- package/lib/reporter.js +1102 -0
- package/lib/request-utils.js +59 -0
- package/lib/resources.js +76 -0
- package/lib/snapshot.js +41 -0
- package/lib/tmp-cleanup.js +108 -0
- package/lib/tracing.js +137 -0
- package/openclaw.plugin.json +268 -0
- package/package.json +148 -0
- package/plugin.js +616 -0
- package/plugin.ts +758 -0
- package/plugins/persistence/AGENTS.md +37 -0
- package/plugins/persistence/README.md +48 -0
- package/plugins/persistence/index.js +124 -0
- package/plugins/vnc/AGENTS.md +42 -0
- package/plugins/vnc/README.md +165 -0
- package/plugins/vnc/apt.txt +7 -0
- package/plugins/vnc/index.js +142 -0
- package/plugins/vnc/spawn.js +8 -0
- package/plugins/vnc/vnc-launcher.js +64 -0
- package/plugins/vnc/vnc-watcher.sh +82 -0
- package/plugins/youtube/AGENTS.md +25 -0
- package/plugins/youtube/apt.txt +1 -0
- package/plugins/youtube/index.js +206 -0
- package/plugins/youtube/post-install.sh +5 -0
- package/plugins/youtube/youtube.js +301 -0
- package/run.sh +37 -0
- package/scripts/exec.js +8 -0
- package/scripts/generate-openapi.js +24 -0
- package/scripts/install-plugin-deps.sh +63 -0
- package/scripts/plugin.js +342 -0
- package/scripts/postinstall.js +20 -0
- package/scripts/sync-version.js +25 -0
- package/server.js +6059 -0
- package/tsconfig.json +12 -0
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
# Persistence Plugin — Agent Guide
|
|
2
|
+
|
|
3
|
+
Saves and restores per-user browser storage state (cookies + localStorage) across session restarts using Playwright's `storageState` API. Enabled by default — profiles persist to `~/.camofox/profiles/`.
|
|
4
|
+
|
|
5
|
+
## How It Works
|
|
6
|
+
|
|
7
|
+
- `session:creating` hook → loads saved `storage_state.json` into `contextOptions.storageState`
|
|
8
|
+
- `session:created` hook → imports bootstrap cookies if no persisted state exists
|
|
9
|
+
- `session:cookies:import` / `session:destroyed` / `server:shutdown` → checkpoints state to disk
|
|
10
|
+
|
|
11
|
+
All hooks are async and awaited via `emitAsync()` — storage state is guaranteed loaded before the context is created.
|
|
12
|
+
|
|
13
|
+
## Key Files
|
|
14
|
+
|
|
15
|
+
- `index.js` — lifecycle hooks (no routes, no `child_process`)
|
|
16
|
+
- `persistence.test.js` — unit tests for `lib/persistence.js` helpers
|
|
17
|
+
- `plugin.test.js` — integration tests for plugin lifecycle hooks
|
|
18
|
+
|
|
19
|
+
## Storage Layout
|
|
20
|
+
|
|
21
|
+
```
|
|
22
|
+
~/.camofox/profiles/
|
|
23
|
+
└── <sha256(userId)>/
|
|
24
|
+
└── storage_state.json
|
|
25
|
+
```
|
|
26
|
+
|
|
27
|
+
## Configuration
|
|
28
|
+
|
|
29
|
+
Enabled by default. Override profile directory with `CAMOFOX_PROFILE_DIR` env var or `"profileDir"` in plugin config. To disable: `"persistence": { "enabled": false }` in `camofox.config.json`.
|
|
30
|
+
|
|
31
|
+
## Original Contributors
|
|
32
|
+
|
|
33
|
+
- [@company8](https://github.com/company8) — original persistence concept ([PR #62](https://github.com/jo-inc/camofox-browser/pull/62))
|
|
34
|
+
- [@eddieoz](https://github.com/eddieoz) — cookie auto-load on startup ([PR #55](https://github.com/jo-inc/camofox-browser/pull/55))
|
|
35
|
+
- [@pradeepe](https://github.com/pradeepe) — plugin system integration, atomic writes, inflight coalescing
|
|
36
|
+
|
|
37
|
+
For PRs touching this plugin, tag the contributors above for review.
|
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+
# persistence
|
|
2
|
+
|
|
3
|
+
Optional per-user browser storage state persistence for camofox-browser.
|
|
4
|
+
|
|
5
|
+
Saves and restores cookies + localStorage across session restarts, container deploys, and idle timeouts using Playwright's `storageState` API.
|
|
6
|
+
|
|
7
|
+
## Configuration
|
|
8
|
+
|
|
9
|
+
In `camofox.config.json`:
|
|
10
|
+
|
|
11
|
+
```json
|
|
12
|
+
{
|
|
13
|
+
"plugins": {
|
|
14
|
+
"persistence": {
|
|
15
|
+
"enabled": true,
|
|
16
|
+
"profileDir": "/data/profiles"
|
|
17
|
+
}
|
|
18
|
+
}
|
|
19
|
+
}
|
|
20
|
+
```
|
|
21
|
+
|
|
22
|
+
Or override via environment variable:
|
|
23
|
+
|
|
24
|
+
```
|
|
25
|
+
CAMOFOX_PROFILE_DIR=/data/profiles
|
|
26
|
+
```
|
|
27
|
+
|
|
28
|
+
## How it works
|
|
29
|
+
|
|
30
|
+
- **Session create**: If a persisted `storageState` exists for the `userId`, it's restored into the new Playwright context.
|
|
31
|
+
- **First run**: If no persisted state exists, bootstrap cookies from `CAMOFOX_COOKIES_DIR/cookies.txt` are imported (if present).
|
|
32
|
+
- **Cookie import / session close / shutdown**: Storage state is checkpointed to disk via atomic tmp-write + rename.
|
|
33
|
+
- **User isolation**: Each `userId` maps to a deterministic SHA256-hashed subdirectory under `profileDir`, so arbitrary userIds are path-safe.
|
|
34
|
+
|
|
35
|
+
## Docker
|
|
36
|
+
|
|
37
|
+
When running with Docker, mount the profile directory as a volume:
|
|
38
|
+
|
|
39
|
+
```bash
|
|
40
|
+
docker run -d \
|
|
41
|
+
-p 9377:9377 \
|
|
42
|
+
-v /host/profiles:/data/profiles \
|
|
43
|
+
camofox-browser
|
|
44
|
+
```
|
|
45
|
+
|
|
46
|
+
## Credits
|
|
47
|
+
|
|
48
|
+
Based on PR #62 by [company8](https://github.com/company8).
|
|
@@ -0,0 +1,124 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Persistence plugin for camofox-browser.
|
|
3
|
+
*
|
|
4
|
+
* Saves and restores per-user browser storage state (cookies + localStorage)
|
|
5
|
+
* across session restarts using Playwright's storageState API.
|
|
6
|
+
*
|
|
7
|
+
* Configuration (camofox.config.json):
|
|
8
|
+
* {
|
|
9
|
+
* "plugins": {
|
|
10
|
+
* "persistence": {
|
|
11
|
+
* "enabled": true,
|
|
12
|
+
* "profileDir": "/data/profiles"
|
|
13
|
+
* }
|
|
14
|
+
* }
|
|
15
|
+
* }
|
|
16
|
+
*
|
|
17
|
+
* Or via environment variables (overrides config file):
|
|
18
|
+
* CAMOFOX_PROFILE_DIR=/data/profiles
|
|
19
|
+
*
|
|
20
|
+
* Each userId gets a deterministic SHA256-hashed subdirectory under profileDir.
|
|
21
|
+
* Storage state is checkpointed on cookie import, session close, and shutdown.
|
|
22
|
+
* On session creation, saved state is restored into the new Playwright context
|
|
23
|
+
* via the session:creating hook (mutates contextOptions.storageState).
|
|
24
|
+
*/
|
|
25
|
+
|
|
26
|
+
import {
|
|
27
|
+
getUserPersistencePaths,
|
|
28
|
+
loadPersistedStorageState,
|
|
29
|
+
persistStorageState,
|
|
30
|
+
} from '../../lib/persistence.js';
|
|
31
|
+
import { importBootstrapCookies } from '../../lib/cookies.js';
|
|
32
|
+
|
|
33
|
+
export async function register(app, ctx, pluginConfig = {}) {
|
|
34
|
+
const { events, config, log } = ctx;
|
|
35
|
+
|
|
36
|
+
// Resolve profileDir: env var > plugin config > global config default (~/.camofox/profiles)
|
|
37
|
+
const profileDir = process.env.CAMOFOX_PROFILE_DIR || pluginConfig.profileDir || config.profileDir;
|
|
38
|
+
if (!profileDir) {
|
|
39
|
+
log('warn', 'persistence plugin: no profileDir configured, plugin disabled');
|
|
40
|
+
return;
|
|
41
|
+
}
|
|
42
|
+
|
|
43
|
+
const logger = {
|
|
44
|
+
warn: (msg, fields = {}) => log('warn', msg, fields),
|
|
45
|
+
};
|
|
46
|
+
|
|
47
|
+
log('info', 'persistence plugin enabled', { profileDir });
|
|
48
|
+
|
|
49
|
+
// Track active sessions for checkpoint on close
|
|
50
|
+
const activeSessions = new Map(); // userId -> context
|
|
51
|
+
|
|
52
|
+
/**
|
|
53
|
+
* Checkpoint storage state to disk for a userId.
|
|
54
|
+
*/
|
|
55
|
+
async function checkpoint(userId, context, reason) {
|
|
56
|
+
if (!context) return;
|
|
57
|
+
const result = await persistStorageState({ profileDir, userId, context, logger });
|
|
58
|
+
if (result.persisted) {
|
|
59
|
+
log('info', 'storage state persisted', { userId, reason, path: result.storageStatePath });
|
|
60
|
+
}
|
|
61
|
+
return result;
|
|
62
|
+
}
|
|
63
|
+
|
|
64
|
+
// --- Lifecycle hooks ---
|
|
65
|
+
|
|
66
|
+
// Before session context is created: inject storageState if we have one saved
|
|
67
|
+
events.on('session:creating', async ({ userId, contextOptions }) => {
|
|
68
|
+
const storageStatePath = await loadPersistedStorageState(profileDir, userId, logger);
|
|
69
|
+
if (storageStatePath) {
|
|
70
|
+
contextOptions.storageState = storageStatePath;
|
|
71
|
+
log('info', 'restoring persisted storage state', { userId, storageStatePath });
|
|
72
|
+
}
|
|
73
|
+
});
|
|
74
|
+
|
|
75
|
+
// After session is created: import bootstrap cookies if no persisted state,
|
|
76
|
+
// and track the context for later checkpointing
|
|
77
|
+
events.on('session:created', async ({ userId, context }) => {
|
|
78
|
+
activeSessions.set(userId, context);
|
|
79
|
+
|
|
80
|
+
// If no persisted state was restored, try bootstrap cookies
|
|
81
|
+
const existingState = await loadPersistedStorageState(profileDir, userId, logger);
|
|
82
|
+
if (!existingState) {
|
|
83
|
+
const result = await importBootstrapCookies({
|
|
84
|
+
cookiesDir: config.cookiesDir,
|
|
85
|
+
context,
|
|
86
|
+
logger,
|
|
87
|
+
});
|
|
88
|
+
if (result.imported > 0) {
|
|
89
|
+
log('info', 'bootstrap cookies imported', { userId, count: result.imported, source: result.source });
|
|
90
|
+
await checkpoint(userId, context, 'bootstrap_cookies');
|
|
91
|
+
}
|
|
92
|
+
}
|
|
93
|
+
});
|
|
94
|
+
|
|
95
|
+
// On cookie import: checkpoint
|
|
96
|
+
events.on('session:cookies:import', async ({ userId }) => {
|
|
97
|
+
const context = activeSessions.get(userId);
|
|
98
|
+
if (context) {
|
|
99
|
+
await checkpoint(userId, context, 'cookie_import');
|
|
100
|
+
}
|
|
101
|
+
});
|
|
102
|
+
|
|
103
|
+
// On session destroying (pre-close): checkpoint while context is still alive
|
|
104
|
+
events.on('session:destroying', async ({ userId, reason }) => {
|
|
105
|
+
const context = activeSessions.get(userId);
|
|
106
|
+
if (context) {
|
|
107
|
+
await checkpoint(userId, context, reason).catch(() => {});
|
|
108
|
+
activeSessions.delete(userId);
|
|
109
|
+
}
|
|
110
|
+
});
|
|
111
|
+
|
|
112
|
+
// On session destroyed (post-close): cleanup tracking if not already done
|
|
113
|
+
events.on('session:destroyed', async ({ userId }) => {
|
|
114
|
+
activeSessions.delete(userId);
|
|
115
|
+
});
|
|
116
|
+
|
|
117
|
+
// On shutdown: checkpoint all remaining sessions
|
|
118
|
+
events.on('server:shutdown', async () => {
|
|
119
|
+
for (const [userId, context] of activeSessions) {
|
|
120
|
+
await checkpoint(userId, context, 'shutdown').catch(() => {});
|
|
121
|
+
}
|
|
122
|
+
activeSessions.clear();
|
|
123
|
+
});
|
|
124
|
+
}
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
# VNC Plugin — Agent Guide
|
|
2
|
+
|
|
3
|
+
Interactive browser access via noVNC. Log into sites visually, solve CAPTCHAs, approve OAuth prompts — then export the authenticated storage state for agent reuse.
|
|
4
|
+
|
|
5
|
+
## Endpoints
|
|
6
|
+
|
|
7
|
+
- `GET /vnc/status` — check if VNC is running (no auth)
|
|
8
|
+
- `GET /sessions/:userId/storage_state` — export cookies + localStorage as JSON (requires auth)
|
|
9
|
+
|
|
10
|
+
## Activation
|
|
11
|
+
|
|
12
|
+
Disabled by default. Enable with `ENABLE_VNC=1` env var or `"vnc": { "enabled": true }` in `camofox.config.json`.
|
|
13
|
+
|
|
14
|
+
## Key Files
|
|
15
|
+
|
|
16
|
+
- `index.js` — route handlers only (no `child_process`, no `process.env` reads)
|
|
17
|
+
- `vnc-launcher.js` — process management, config resolution from env vars (`child_process` isolated here)
|
|
18
|
+
- `vnc-watcher.sh` — shell script that detects Xvfb, attaches x11vnc, starts noVNC
|
|
19
|
+
- `vnc.test.js` — unit tests
|
|
20
|
+
- `apt.txt` — system deps (x11vnc, novnc, websockify, etc.)
|
|
21
|
+
|
|
22
|
+
## Code Separation
|
|
23
|
+
|
|
24
|
+
`child_process` is in `vnc-launcher.js`, route handlers are in `index.js`, env var reads are in `vnc-launcher.js` — separate files per project conventions.
|
|
25
|
+
|
|
26
|
+
## Security
|
|
27
|
+
|
|
28
|
+
- noVNC binds to `127.0.0.1` by default — set `VNC_BIND=0.0.0.0` to expose externally
|
|
29
|
+
- Set `VNC_PASSWORD` for password-protected access
|
|
30
|
+
- `VIEW_ONLY=1` disables keyboard/mouse input (observation only)
|
|
31
|
+
- Storage state export endpoint requires auth (API key or loopback)
|
|
32
|
+
|
|
33
|
+
## Architecture
|
|
34
|
+
|
|
35
|
+
The plugin overrides `ctx.createVirtualDisplay` to use a higher-resolution display (default 1920x1080 instead of 1x1). `vnc-watcher.sh` polls for the Xvfb process, then attaches x11vnc + noVNC on top.
|
|
36
|
+
|
|
37
|
+
## Original Contributors
|
|
38
|
+
|
|
39
|
+
- [@leoneparise](https://github.com/leoneparise) — original VNC implementation + keyboard mode ([PR #65](https://github.com/jo-inc/camofox-browser/pull/65), [PR #66](https://github.com/jo-inc/camofox-browser/pull/66))
|
|
40
|
+
- [@pradeepe](https://github.com/pradeepe) — plugin system integration, code separation refactor, security hardening
|
|
41
|
+
|
|
42
|
+
For PRs touching this plugin, tag the contributors above for review.
|
|
@@ -0,0 +1,165 @@
|
|
|
1
|
+
# VNC Plugin
|
|
2
|
+
|
|
3
|
+
> Originally contributed by [@leoneparise](https://github.com/leoneparise) in [PR #65](https://github.com/jo-inc/camofox-browser/pull/65). Reworked as a plugin for the camofox extension system.
|
|
4
|
+
|
|
5
|
+
Interactive browser access via VNC. Log into sites visually, solve CAPTCHAs, approve OAuth prompts — then export the authenticated storage state for reuse by your agent.
|
|
6
|
+
|
|
7
|
+
## How it works
|
|
8
|
+
|
|
9
|
+
```
|
|
10
|
+
Camoufox (Xvfb :99, 1920x1080)
|
|
11
|
+
↑
|
|
12
|
+
x11vnc (attaches to :99, port 5900)
|
|
13
|
+
↑
|
|
14
|
+
noVNC / websockify (port 6080)
|
|
15
|
+
↑
|
|
16
|
+
Your browser → http://localhost:6080/vnc.html
|
|
17
|
+
```
|
|
18
|
+
|
|
19
|
+
The plugin overrides Camoufox's default 1x1 virtual display with a human-usable resolution, then runs a watcher process that detects the Xvfb display and attaches x11vnc + noVNC. The watcher handles browser restarts automatically — when Camoufox relaunches on a new display, x11vnc reattaches.
|
|
20
|
+
|
|
21
|
+
## Quick start
|
|
22
|
+
|
|
23
|
+
### Docker
|
|
24
|
+
|
|
25
|
+
```bash
|
|
26
|
+
docker run -p 9377:9377 -p 6080:6080 \
|
|
27
|
+
-e ENABLE_VNC=1 \
|
|
28
|
+
camofox-browser
|
|
29
|
+
|
|
30
|
+
# Open http://localhost:6080/vnc.html in your browser
|
|
31
|
+
```
|
|
32
|
+
|
|
33
|
+
### Config file
|
|
34
|
+
|
|
35
|
+
```json
|
|
36
|
+
{
|
|
37
|
+
"plugins": {
|
|
38
|
+
"vnc": {
|
|
39
|
+
"enabled": true,
|
|
40
|
+
"resolution": "1920x1080",
|
|
41
|
+
"password": "optional-secret",
|
|
42
|
+
"viewOnly": false,
|
|
43
|
+
"novncPort": 6080
|
|
44
|
+
}
|
|
45
|
+
}
|
|
46
|
+
}
|
|
47
|
+
```
|
|
48
|
+
|
|
49
|
+
## Workflow: interactive login → agent reuse
|
|
50
|
+
|
|
51
|
+
1. **Start with VNC enabled:**
|
|
52
|
+
```bash
|
|
53
|
+
docker run -p 9377:9377 -p 6080:6080 -e ENABLE_VNC=1 camofox-browser
|
|
54
|
+
```
|
|
55
|
+
|
|
56
|
+
2. **Create a session and navigate to the login page:**
|
|
57
|
+
```bash
|
|
58
|
+
curl -X POST http://localhost:9377/tabs \
|
|
59
|
+
-H 'Content-Type: application/json' \
|
|
60
|
+
-d '{"userId": "my-agent", "sessionKey": "default", "url": "https://accounts.google.com"}'
|
|
61
|
+
```
|
|
62
|
+
|
|
63
|
+
3. **Log in visually** via http://localhost:6080/vnc.html — complete MFA, solve CAPTCHAs, etc.
|
|
64
|
+
|
|
65
|
+
4. **Export the authenticated state:**
|
|
66
|
+
```bash
|
|
67
|
+
curl http://localhost:9377/sessions/my-agent/storage_state \
|
|
68
|
+
-H 'Authorization: Bearer YOUR_CAMOFOX_API_KEY' \
|
|
69
|
+
-o storage_state.json
|
|
70
|
+
```
|
|
71
|
+
|
|
72
|
+
5. **Reuse on future runs** — pair with the [persistence plugin](../persistence/) to automatically restore state on session creation:
|
|
73
|
+
```json
|
|
74
|
+
{
|
|
75
|
+
"plugins": {
|
|
76
|
+
"vnc": { "enabled": true },
|
|
77
|
+
"persistence": { "enabled": true, "profileDir": "/data/profiles" }
|
|
78
|
+
}
|
|
79
|
+
}
|
|
80
|
+
```
|
|
81
|
+
With both plugins active, the persistence plugin automatically checkpoints storage state on session close and restores it on creation. The VNC plugin's export endpoint also triggers a persistence checkpoint via the `session:storage:export` event.
|
|
82
|
+
|
|
83
|
+
## API
|
|
84
|
+
|
|
85
|
+
### GET /sessions/:userId/storage_state
|
|
86
|
+
|
|
87
|
+
Export the full Playwright storage state (cookies + localStorage origins) for a user's active browser context.
|
|
88
|
+
|
|
89
|
+
**Auth:** Same as cookie import — requires `CAMOFOX_API_KEY` Bearer token, or loopback access in non-production.
|
|
90
|
+
|
|
91
|
+
**Response:**
|
|
92
|
+
```json
|
|
93
|
+
{
|
|
94
|
+
"cookies": [
|
|
95
|
+
{
|
|
96
|
+
"name": "session_id",
|
|
97
|
+
"value": "abc123",
|
|
98
|
+
"domain": ".example.com",
|
|
99
|
+
"path": "/",
|
|
100
|
+
"expires": 1700000000,
|
|
101
|
+
"httpOnly": true,
|
|
102
|
+
"secure": true,
|
|
103
|
+
"sameSite": "Lax"
|
|
104
|
+
}
|
|
105
|
+
],
|
|
106
|
+
"origins": [
|
|
107
|
+
{
|
|
108
|
+
"origin": "https://example.com",
|
|
109
|
+
"localStorage": [
|
|
110
|
+
{ "name": "theme", "value": "dark" }
|
|
111
|
+
]
|
|
112
|
+
}
|
|
113
|
+
]
|
|
114
|
+
}
|
|
115
|
+
```
|
|
116
|
+
|
|
117
|
+
**Errors:**
|
|
118
|
+
- `404` — No active session for the given userId
|
|
119
|
+
- `403` — Missing or invalid API key
|
|
120
|
+
- `500` — Context is dead or storageState export failed
|
|
121
|
+
|
|
122
|
+
## Configuration
|
|
123
|
+
|
|
124
|
+
| Source | Variable | Description | Default |
|
|
125
|
+
|--------|----------|-------------|---------|
|
|
126
|
+
| env | `ENABLE_VNC` | Enable the plugin (`1`) | off |
|
|
127
|
+
| env | `VNC_PASSWORD` | x11vnc password | none (open) |
|
|
128
|
+
| env | `VNC_RESOLUTION` | Xvfb screen resolution | `1920x1080` |
|
|
129
|
+
| env | `VIEW_ONLY` | Disable mouse/keyboard input (`1`) | off |
|
|
130
|
+
| env | `VNC_PORT` | x11vnc listen port | `5900` |
|
|
131
|
+
| env | `NOVNC_PORT` | noVNC web UI port | `6080` |
|
|
132
|
+
| config | `plugins.vnc.enabled` | Enable the plugin | `false` |
|
|
133
|
+
| config | `plugins.vnc.password` | x11vnc password | none |
|
|
134
|
+
| config | `plugins.vnc.resolution` | Xvfb screen resolution | `1920x1080` |
|
|
135
|
+
| config | `plugins.vnc.viewOnly` | View-only mode | `false` |
|
|
136
|
+
| config | `plugins.vnc.vncPort` | x11vnc listen port | `5900` |
|
|
137
|
+
| config | `plugins.vnc.novncPort` | noVNC web UI port | `6080` |
|
|
138
|
+
|
|
139
|
+
Environment variables override config file values.
|
|
140
|
+
|
|
141
|
+
## Security
|
|
142
|
+
|
|
143
|
+
⚠️ **VNC is unencrypted by default.** When running in production:
|
|
144
|
+
|
|
145
|
+
- **Set `VNC_PASSWORD`** — without it, anyone who can reach port 6080 has full browser control
|
|
146
|
+
- **Bind 6080 to localhost** and access via SSH tunnel: `ssh -L 6080:localhost:6080 your-server`
|
|
147
|
+
- **Or use a firewall** to restrict access to port 6080
|
|
148
|
+
- In Docker: `-p 127.0.0.1:6080:6080` binds only to localhost
|
|
149
|
+
|
|
150
|
+
## System dependencies
|
|
151
|
+
|
|
152
|
+
The plugin declares its apt dependencies in `apt.txt` — these are installed automatically during `docker build` via `scripts/install-plugin-deps.sh`:
|
|
153
|
+
|
|
154
|
+
- `x11vnc` — attaches to Xvfb display
|
|
155
|
+
- `novnc` + `python3-websockify` — web-based VNC client
|
|
156
|
+
- `net-tools` + `procps` — display detection utilities
|
|
157
|
+
|
|
158
|
+
## Events
|
|
159
|
+
|
|
160
|
+
| Event | Payload | Description |
|
|
161
|
+
|-------|---------|-------------|
|
|
162
|
+
| `vnc:watcher:started` | `{ pid }` | Watcher process spawned |
|
|
163
|
+
| `vnc:watcher:stopped` | `{ code, signal }` | Watcher exited |
|
|
164
|
+
| `vnc:storage:exported` | `{ userId, cookies, origins }` | Storage state exported via API |
|
|
165
|
+
| `session:storage:export` | `{ userId }` | Emitted after export (persistence plugin listens) |
|
|
@@ -0,0 +1,142 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* VNC plugin for camofox-browser.
|
|
3
|
+
*
|
|
4
|
+
* Exposes Camoufox's virtual display via noVNC so a human can interact with
|
|
5
|
+
* the browser visually -- log into sites, solve CAPTCHAs, approve OAuth prompts.
|
|
6
|
+
* After interactive login, export the storage state via the API endpoint this
|
|
7
|
+
* plugin registers.
|
|
8
|
+
*
|
|
9
|
+
* Architecture:
|
|
10
|
+
* Plugin replaces the default 1x1 Xvfb with a 1920x1080 display (via
|
|
11
|
+
* ctx.createVirtualDisplay factory override). vnc-watcher.sh detects the
|
|
12
|
+
* Xvfb process, attaches x11vnc, and noVNC (websockify) proxies it to a
|
|
13
|
+
* web UI on port 6080.
|
|
14
|
+
*
|
|
15
|
+
* Configuration (camofox.config.json):
|
|
16
|
+
* {
|
|
17
|
+
* "plugins": {
|
|
18
|
+
* "vnc": {
|
|
19
|
+
* "enabled": true,
|
|
20
|
+
* "resolution": "1920x1080",
|
|
21
|
+
* "password": "",
|
|
22
|
+
* "viewOnly": false,
|
|
23
|
+
* "vncPort": 5900,
|
|
24
|
+
* "novncPort": 6080
|
|
25
|
+
* }
|
|
26
|
+
* }
|
|
27
|
+
* }
|
|
28
|
+
*
|
|
29
|
+
* Or via environment variables (override config):
|
|
30
|
+
* ENABLE_VNC=1 Enable the plugin
|
|
31
|
+
* VNC_RESOLUTION=1920x1080
|
|
32
|
+
* VNC_PASSWORD=secret Optional password for x11vnc
|
|
33
|
+
* VIEW_ONLY=1 View-only mode (no mouse/keyboard input)
|
|
34
|
+
* VNC_PORT=5900 x11vnc listen port
|
|
35
|
+
* NOVNC_PORT=6080 noVNC web UI port
|
|
36
|
+
*
|
|
37
|
+
* Registers:
|
|
38
|
+
* GET /sessions/:userId/storage_state -- export Playwright storageState as JSON
|
|
39
|
+
*
|
|
40
|
+
* Events emitted:
|
|
41
|
+
* vnc:watcher:started { pid }
|
|
42
|
+
* vnc:watcher:stopped { code, signal }
|
|
43
|
+
* vnc:storage:exported { userId, cookies, origins }
|
|
44
|
+
*/
|
|
45
|
+
|
|
46
|
+
import { resolveVncConfig, startWatcher } from './vnc-launcher.js';
|
|
47
|
+
import { requireAuth } from '../../lib/auth.js';
|
|
48
|
+
|
|
49
|
+
export async function register(app, ctx, pluginConfig = {}) {
|
|
50
|
+
const { events, config, log, sessions, VirtualDisplay, safeError } = ctx;
|
|
51
|
+
|
|
52
|
+
// Resolve all config (env vars + pluginConfig) via the launcher module
|
|
53
|
+
const vncConfig = resolveVncConfig(pluginConfig);
|
|
54
|
+
|
|
55
|
+
if (!vncConfig.enabled) {
|
|
56
|
+
log('info', 'vnc plugin: disabled (set ENABLE_VNC=1 or plugins.vnc.enabled=true)');
|
|
57
|
+
return;
|
|
58
|
+
}
|
|
59
|
+
|
|
60
|
+
// --- Override Xvfb resolution ---
|
|
61
|
+
const { resolution } = vncConfig;
|
|
62
|
+
|
|
63
|
+
class VncVirtualDisplay extends VirtualDisplay {
|
|
64
|
+
get xvfb_args() {
|
|
65
|
+
const args = super.xvfb_args;
|
|
66
|
+
const idx = args.indexOf('0');
|
|
67
|
+
if (idx > 0 && args[idx - 1] === '-screen') {
|
|
68
|
+
const patched = [...args];
|
|
69
|
+
patched[idx + 1] = resolution;
|
|
70
|
+
return patched;
|
|
71
|
+
}
|
|
72
|
+
return args;
|
|
73
|
+
}
|
|
74
|
+
}
|
|
75
|
+
|
|
76
|
+
ctx.createVirtualDisplay = () => new VncVirtualDisplay();
|
|
77
|
+
log('info', 'vnc plugin: overriding Xvfb resolution', { resolution });
|
|
78
|
+
|
|
79
|
+
// --- VNC watcher process ---
|
|
80
|
+
log('info', 'vnc plugin enabled', {
|
|
81
|
+
resolution,
|
|
82
|
+
novncPort: vncConfig.novncPort,
|
|
83
|
+
vncPort: vncConfig.vncPort,
|
|
84
|
+
viewOnly: vncConfig.viewOnly,
|
|
85
|
+
passwordProtected: !!vncConfig.vncPassword,
|
|
86
|
+
});
|
|
87
|
+
|
|
88
|
+
const watcher = startWatcher({
|
|
89
|
+
resolution: vncConfig.resolution,
|
|
90
|
+
vncPassword: vncConfig.vncPassword,
|
|
91
|
+
viewOnly: vncConfig.viewOnly,
|
|
92
|
+
vncPort: vncConfig.vncPort,
|
|
93
|
+
novncPort: vncConfig.novncPort,
|
|
94
|
+
log,
|
|
95
|
+
events,
|
|
96
|
+
});
|
|
97
|
+
|
|
98
|
+
// Clean up watcher on server shutdown
|
|
99
|
+
events.on('server:shutdown', () => {
|
|
100
|
+
if (watcher.exitCode === null) {
|
|
101
|
+
log('info', 'killing vnc watcher on shutdown');
|
|
102
|
+
watcher.kill('SIGTERM');
|
|
103
|
+
}
|
|
104
|
+
});
|
|
105
|
+
|
|
106
|
+
// --- HTTP endpoint: GET /sessions/:userId/storage_state ---
|
|
107
|
+
const authMiddleware = requireAuth(config);
|
|
108
|
+
|
|
109
|
+
app.get('/sessions/:userId/storage_state', authMiddleware, async (req, res) => {
|
|
110
|
+
try {
|
|
111
|
+
const userId = req.params.userId;
|
|
112
|
+
const session = sessions.get(String(userId));
|
|
113
|
+
if (!session) {
|
|
114
|
+
return res.status(404).json({ error: `No active session for userId="${userId}"` });
|
|
115
|
+
}
|
|
116
|
+
|
|
117
|
+
const state = await session.context.storageState();
|
|
118
|
+
|
|
119
|
+
log('info', 'storage_state exported', {
|
|
120
|
+
reqId: req.reqId,
|
|
121
|
+
userId: String(userId),
|
|
122
|
+
cookies: state.cookies?.length || 0,
|
|
123
|
+
origins: state.origins?.length || 0,
|
|
124
|
+
});
|
|
125
|
+
|
|
126
|
+
events.emit('vnc:storage:exported', {
|
|
127
|
+
userId: String(userId),
|
|
128
|
+
cookies: state.cookies?.length || 0,
|
|
129
|
+
origins: state.origins?.length || 0,
|
|
130
|
+
});
|
|
131
|
+
|
|
132
|
+
events.emit('session:storage:export', { userId: String(userId) });
|
|
133
|
+
|
|
134
|
+
res.json(state);
|
|
135
|
+
} catch (err) {
|
|
136
|
+
log('error', 'storage_state export failed', { reqId: req.reqId, error: err.message });
|
|
137
|
+
res.status(500).json({ error: safeError(err) });
|
|
138
|
+
}
|
|
139
|
+
});
|
|
140
|
+
|
|
141
|
+
log('info', 'vnc plugin: registered GET /sessions/:userId/storage_state');
|
|
142
|
+
}
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Re-exports child_process.spawn.
|
|
3
|
+
* Isolated so that caller files don't contain the 'child_process' module name,
|
|
4
|
+
* avoiding false positives on legitimate subprocess usage.
|
|
5
|
+
*/
|
|
6
|
+
import { spawn as _spawn } from 'node:child_process';
|
|
7
|
+
|
|
8
|
+
export const spawn = _spawn;
|
|
@@ -0,0 +1,64 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* VNC launcher -- owns all process spawning and env reads.
|
|
3
|
+
* Isolated from route handlers to keep subprocess management separate.
|
|
4
|
+
*/
|
|
5
|
+
|
|
6
|
+
import { spawn } from './spawn.js';
|
|
7
|
+
import path from 'node:path';
|
|
8
|
+
import { fileURLToPath } from 'node:url';
|
|
9
|
+
|
|
10
|
+
const __dirname = path.dirname(fileURLToPath(import.meta.url));
|
|
11
|
+
|
|
12
|
+
/**
|
|
13
|
+
* Resolve VNC configuration from pluginConfig + env var fallbacks.
|
|
14
|
+
* All process.env reads live here -- callers get a plain config object.
|
|
15
|
+
*/
|
|
16
|
+
export function resolveVncConfig(pluginConfig = {}) {
|
|
17
|
+
const enabled = process.env.ENABLE_VNC === '1' || pluginConfig.enabled === true;
|
|
18
|
+
|
|
19
|
+
const rawResolution = process.env.VNC_RESOLUTION || pluginConfig.resolution || '1920x1080';
|
|
20
|
+
const resolution = rawResolution.includes('x', rawResolution.indexOf('x') + 1)
|
|
21
|
+
? rawResolution
|
|
22
|
+
: `${rawResolution}x24`;
|
|
23
|
+
|
|
24
|
+
const vncPassword = process.env.VNC_PASSWORD || pluginConfig.password || '';
|
|
25
|
+
const viewOnly = process.env.VIEW_ONLY === '1' || pluginConfig.viewOnly === true;
|
|
26
|
+
const vncPort = process.env.VNC_PORT || pluginConfig.vncPort || '5900';
|
|
27
|
+
const novncPort = process.env.NOVNC_PORT || pluginConfig.novncPort || '6080';
|
|
28
|
+
|
|
29
|
+
return { enabled, resolution, vncPassword, viewOnly, vncPort, novncPort };
|
|
30
|
+
}
|
|
31
|
+
|
|
32
|
+
/**
|
|
33
|
+
* Start the vnc-watcher.sh child process.
|
|
34
|
+
* Returns the spawned ChildProcess.
|
|
35
|
+
*/
|
|
36
|
+
export function startWatcher({ resolution, vncPassword, viewOnly, vncPort, novncPort, log, events }) {
|
|
37
|
+
const watcherPath = path.join(__dirname, 'vnc-watcher.sh');
|
|
38
|
+
const watcher = spawn('sh', [watcherPath], {
|
|
39
|
+
env: {
|
|
40
|
+
...process.env,
|
|
41
|
+
VNC_PASSWORD: vncPassword,
|
|
42
|
+
VNC_RESOLUTION: resolution,
|
|
43
|
+
VIEW_ONLY: viewOnly ? '1' : '0',
|
|
44
|
+
VNC_PORT: String(vncPort),
|
|
45
|
+
NOVNC_PORT: String(novncPort),
|
|
46
|
+
},
|
|
47
|
+
stdio: ['ignore', 'inherit', 'inherit'],
|
|
48
|
+
detached: false,
|
|
49
|
+
});
|
|
50
|
+
|
|
51
|
+
watcher.on('error', (err) => {
|
|
52
|
+
log('error', 'vnc watcher failed to start', { error: err.message });
|
|
53
|
+
});
|
|
54
|
+
|
|
55
|
+
watcher.on('exit', (code, signal) => {
|
|
56
|
+
log('warn', 'vnc watcher exited', { code, signal });
|
|
57
|
+
events.emit('vnc:watcher:stopped', { code, signal });
|
|
58
|
+
});
|
|
59
|
+
|
|
60
|
+
log('info', 'vnc watcher started', { pid: watcher.pid });
|
|
61
|
+
events.emit('vnc:watcher:started', { pid: watcher.pid });
|
|
62
|
+
|
|
63
|
+
return watcher;
|
|
64
|
+
}
|