![]() |
![]()
| ![]() |
![]()
NAMEttyd - Share your terminal over the web SYNOPSISttyd [options] <command> [<arguments...>] DESCRIPTIONttyd is a command-line tool for sharing terminal over the web that runs in *nix and windows systems, with the following features:
OPTIONS-p, --port
-i, --interface
-U, --socket-owner
-c, --credential USER[:PASSWORD]
-H, --auth-header
-u, --uid
-g, --gid
-s, --signal
-w, --cwd
-a, --url-arg
-W, --writable
-t, --client-option
-T, --terminal-type
-O, --check-origin
-m, --max-clients
-o, --once
-q, --exit-no-conn
-B, --browser
-I, --index
-b, --base-path
-P, --ping-interval
-6, --ipv6
-S, --ssl
-C, --ssl-cert
-K, --ssl-key
-A, --ssl-ca
-d, --debug
-v, --version
-h, --help
CLIENT OPTIONSttyd has a mechanism to pass server side command-line arguments to the browser page which is called client options: -t, --client-option Send option to client (format: key=value), repeat to add more options Basic usage
Advanced usageYou can use the client option to change all the settings of xterm defined in ITerminalOptions ⟨https://xtermjs.org/docs/api/terminal/interfaces/iterminaloptions/⟩, examples:
to try the example options above, run: ttyd -t cursorStyle=bar -t lineHeight=1.5 -t 'theme={"background": "green"}' bash EXAMPLESttyd starts web server at port 7681 by default, you can use the -p option to change it, the command will be started with arguments as options. For example, run: ttyd -p 8080 bash -x Then open http://localhost:8080 with a browser, you will get a bash shell with debug mode enabled. More examples:
SSL how-toGenerate SSL CA and self signed server/client certificates: # CA certificate (FQDN must be different from server/client) openssl genrsa -out ca.key 2048 openssl req -new -x509 -days 365 -key ca.key -subj "/C=CN/ST=GD/L=SZ/O=Acme, Inc./CN=Acme Root CA" -out ca.crt # server certificate (for multiple domains, change subjectAltName to: DNS:example.com,DNS:www.example.com) openssl req -newkey rsa:2048 -nodes -keyout server.key -subj "/C=CN/ST=GD/L=SZ/O=Acme, Inc./CN=localhost" -out server.csr openssl x509 -sha256 -req -extfile <(printf "subjectAltName=DNS:localhost") -days 365 -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out server.crt # client certificate (the p12/pem format may be useful for some clients) openssl req -newkey rsa:2048 -nodes -keyout client.key -subj "/C=CN/ST=GD/L=SZ/O=Acme, Inc./CN=client" -out client.csr openssl x509 -req -days 365 -in client.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out client.crt openssl pkcs12 -export -clcerts -in client.crt -inkey client.key -out client.p12 openssl pkcs12 -in client.p12 -out client.pem -clcerts Then start ttyd: ttyd --ssl --ssl-cert server.crt --ssl-key server.key --ssl-ca ca.crt bash You may want to test the client certificate verification with curl(1): curl --insecure --cert client.p12[:password] -v https://localhost:7681 If you don't want to enable client certificate verification, remove the --ssl-ca option. Docker and ttydDocker containers are jailed environments which are more secure, this is useful for protecting the host system, you may use ttyd with docker like this:
Nginx reverse proxySample config to proxy ttyd under the /ttyd path: location ~ ^/ttyd(.*)$ { AUTHORShuanglei Tao <tsl0922@gmail.com> Visit https://github.com/tsl0922/ttyd to get more information and report bugs.
|