mirror of
https://github.com/louislam/uptime-kuma.git
synced 2024-11-23 23:04:04 +00:00
482049c72b
* WIP, still need to handle npm run reset-password * Implement it for "npm run reset-password" Bug fixes and change along with this commit - Move `ssl`, `hostname`, `port` to ./server/config.js, so `reset-password` is able to read it - Fix: FBSD is missing, no idea who dropped it. - Fix: Frontend code should not require any backend code (./server/config.js), moved "badgeConstants" to the common util (./src/util.ts) and drop vite-common.js * Minor
448 lines
13 KiB
JavaScript
448 lines
13 KiB
JavaScript
const express = require("express");
|
|
const https = require("https");
|
|
const fs = require("fs");
|
|
const http = require("http");
|
|
const { Server } = require("socket.io");
|
|
const { R } = require("redbean-node");
|
|
const { log, isDev } = require("../src/util");
|
|
const Database = require("./database");
|
|
const util = require("util");
|
|
const { CacheableDnsHttpAgent } = require("./cacheable-dns-http-agent");
|
|
const { Settings } = require("./settings");
|
|
const dayjs = require("dayjs");
|
|
const childProcessAsync = require("promisify-child-process");
|
|
const path = require("path");
|
|
const { isSSL, sslKey, sslCert, sslKeyPassphrase } = require("./config");
|
|
// DO NOT IMPORT HERE IF THE MODULES USED `UptimeKumaServer.getInstance()`, put at the bottom of this file instead.
|
|
|
|
/**
|
|
* `module.exports` (alias: `server`) should be inside this class, in order to avoid circular dependency issue.
|
|
* @type {UptimeKumaServer}
|
|
*/
|
|
class UptimeKumaServer {
|
|
/**
|
|
*
|
|
* @type {UptimeKumaServer}
|
|
*/
|
|
static instance = null;
|
|
|
|
/**
|
|
* Main monitor list
|
|
* @type {{}}
|
|
*/
|
|
monitorList = {};
|
|
|
|
/**
|
|
* Main maintenance list
|
|
* @type {{}}
|
|
*/
|
|
maintenanceList = {};
|
|
|
|
entryPage = "dashboard";
|
|
app = undefined;
|
|
httpServer = undefined;
|
|
io = undefined;
|
|
|
|
/**
|
|
* Cache Index HTML
|
|
* @type {string}
|
|
*/
|
|
indexHTML = "";
|
|
|
|
/**
|
|
*
|
|
* @type {{}}
|
|
*/
|
|
static monitorTypeList = {
|
|
|
|
};
|
|
|
|
/**
|
|
* Use for decode the auth object
|
|
* @type {null}
|
|
*/
|
|
jwtSecret = null;
|
|
|
|
static getInstance() {
|
|
if (UptimeKumaServer.instance == null) {
|
|
UptimeKumaServer.instance = new UptimeKumaServer();
|
|
}
|
|
return UptimeKumaServer.instance;
|
|
}
|
|
|
|
constructor() {
|
|
log.info("server", "Creating express and socket.io instance");
|
|
this.app = express();
|
|
if (isSSL) {
|
|
log.info("server", "Server Type: HTTPS");
|
|
this.httpServer = https.createServer({
|
|
key: fs.readFileSync(sslKey),
|
|
cert: fs.readFileSync(sslCert),
|
|
passphrase: sslKeyPassphrase,
|
|
}, this.app);
|
|
} else {
|
|
log.info("server", "Server Type: HTTP");
|
|
this.httpServer = http.createServer(this.app);
|
|
}
|
|
|
|
try {
|
|
this.indexHTML = fs.readFileSync("./dist/index.html").toString();
|
|
} catch (e) {
|
|
// "dist/index.html" is not necessary for development
|
|
if (process.env.NODE_ENV !== "development") {
|
|
log.error("server", "Error: Cannot find 'dist/index.html', did you install correctly?");
|
|
process.exit(1);
|
|
}
|
|
}
|
|
|
|
// Set Monitor Types
|
|
UptimeKumaServer.monitorTypeList["real-browser"] = new RealBrowserMonitorType();
|
|
UptimeKumaServer.monitorTypeList["tailscale-ping"] = new TailscalePing();
|
|
|
|
this.io = new Server(this.httpServer, {
|
|
allowRequest: (req, callback) => {
|
|
let isOriginValid = true;
|
|
const bypass = isDev || process.env.UPTIME_KUMA_WS_ORIGIN_CHECK === "bypass";
|
|
|
|
if (!bypass) {
|
|
let host = req.headers.host;
|
|
|
|
// If this is set, it means the request is from the browser
|
|
let origin = req.headers.origin;
|
|
|
|
// If this is from the browser, check if the origin is allowed
|
|
if (origin) {
|
|
try {
|
|
let originURL = new URL(origin);
|
|
|
|
if (host !== originURL.host) {
|
|
isOriginValid = false;
|
|
log.error("auth", `Origin (${origin}) does not match host (${host}), IP: ${req.socket.remoteAddress}`);
|
|
}
|
|
} catch (e) {
|
|
// Invalid origin url, probably not from browser
|
|
isOriginValid = false;
|
|
log.error("auth", `Invalid origin url (${origin}), IP: ${req.socket.remoteAddress}`);
|
|
}
|
|
} else {
|
|
log.info("auth", `Origin is not set, IP: ${req.socket.remoteAddress}`);
|
|
}
|
|
} else {
|
|
log.debug("auth", "Origin check is bypassed");
|
|
}
|
|
|
|
callback(null, isOriginValid);
|
|
}
|
|
});
|
|
}
|
|
|
|
/** Initialise app after the database has been set up */
|
|
async initAfterDatabaseReady() {
|
|
// Static
|
|
this.app.use("/screenshots", express.static(Database.screenshotDir));
|
|
|
|
await CacheableDnsHttpAgent.update();
|
|
|
|
process.env.TZ = await this.getTimezone();
|
|
dayjs.tz.setDefault(process.env.TZ);
|
|
log.debug("DEBUG", "Timezone: " + process.env.TZ);
|
|
log.debug("DEBUG", "Current Time: " + dayjs.tz().format());
|
|
|
|
await this.loadMaintenanceList();
|
|
}
|
|
|
|
/**
|
|
* Send list of monitors to client
|
|
* @param {Socket} socket
|
|
* @returns {Object} List of monitors
|
|
*/
|
|
async sendMonitorList(socket) {
|
|
let list = await this.getMonitorJSONList(socket.userID);
|
|
this.io.to(socket.userID).emit("monitorList", list);
|
|
return list;
|
|
}
|
|
|
|
/**
|
|
* Get a list of monitors for the given user.
|
|
* @param {string} userID - The ID of the user to get monitors for.
|
|
* @returns {Promise<Object>} A promise that resolves to an object with monitor IDs as keys and monitor objects as values.
|
|
*
|
|
* Generated by Trelent
|
|
*/
|
|
async getMonitorJSONList(userID) {
|
|
let result = {};
|
|
|
|
let monitorList = await R.find("monitor", " user_id = ? ORDER BY weight DESC, name", [
|
|
userID,
|
|
]);
|
|
|
|
for (let monitor of monitorList) {
|
|
result[monitor.id] = await monitor.toJSON();
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* Send maintenance list to client
|
|
* @param {Socket} socket Socket.io instance to send to
|
|
* @returns {Object}
|
|
*/
|
|
async sendMaintenanceList(socket) {
|
|
return await this.sendMaintenanceListByUserID(socket.userID);
|
|
}
|
|
|
|
/**
|
|
* Send list of maintenances to user
|
|
* @param {number} userID
|
|
* @returns {Object}
|
|
*/
|
|
async sendMaintenanceListByUserID(userID) {
|
|
let list = await this.getMaintenanceJSONList(userID);
|
|
this.io.to(userID).emit("maintenanceList", list);
|
|
return list;
|
|
}
|
|
|
|
/**
|
|
* Get a list of maintenances for the given user.
|
|
* @param {string} userID - The ID of the user to get maintenances for.
|
|
* @returns {Promise<Object>} A promise that resolves to an object with maintenance IDs as keys and maintenances objects as values.
|
|
*/
|
|
async getMaintenanceJSONList(userID) {
|
|
let result = {};
|
|
for (let maintenanceID in this.maintenanceList) {
|
|
result[maintenanceID] = await this.maintenanceList[maintenanceID].toJSON();
|
|
}
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* Load maintenance list and run
|
|
* @param userID
|
|
* @returns {Promise<void>}
|
|
*/
|
|
async loadMaintenanceList(userID) {
|
|
let maintenanceList = await R.findAll("maintenance", " ORDER BY end_date DESC, title", [
|
|
|
|
]);
|
|
|
|
for (let maintenance of maintenanceList) {
|
|
this.maintenanceList[maintenance.id] = maintenance;
|
|
maintenance.run(this);
|
|
}
|
|
}
|
|
|
|
getMaintenance(maintenanceID) {
|
|
if (this.maintenanceList[maintenanceID]) {
|
|
return this.maintenanceList[maintenanceID];
|
|
}
|
|
return null;
|
|
}
|
|
|
|
/**
|
|
* Write error to log file
|
|
* @param {any} error The error to write
|
|
* @param {boolean} outputToConsole Should the error also be output to console?
|
|
*/
|
|
static errorLog(error, outputToConsole = true) {
|
|
const errorLogStream = fs.createWriteStream(path.join(Database.dataDir, "/error.log"), {
|
|
flags: "a"
|
|
});
|
|
|
|
errorLogStream.on("error", () => {
|
|
log.info("", "Cannot write to error.log");
|
|
});
|
|
|
|
if (errorLogStream) {
|
|
const dateTime = R.isoDateTime();
|
|
errorLogStream.write(`[${dateTime}] ` + util.format(error) + "\n");
|
|
|
|
if (outputToConsole) {
|
|
console.error(error);
|
|
}
|
|
}
|
|
|
|
errorLogStream.end();
|
|
}
|
|
|
|
/**
|
|
* Get the IP of the client connected to the socket
|
|
* @param {Socket} socket
|
|
* @returns {string}
|
|
*/
|
|
async getClientIP(socket) {
|
|
let clientIP = socket.client.conn.remoteAddress;
|
|
|
|
if (clientIP === undefined) {
|
|
clientIP = "";
|
|
}
|
|
|
|
if (await Settings.get("trustProxy")) {
|
|
const forwardedFor = socket.client.conn.request.headers["x-forwarded-for"];
|
|
|
|
return (typeof forwardedFor === "string" ? forwardedFor.split(",")[0].trim() : null)
|
|
|| socket.client.conn.request.headers["x-real-ip"]
|
|
|| clientIP.replace(/^::ffff:/, "");
|
|
} else {
|
|
return clientIP.replace(/^::ffff:/, "");
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Attempt to get the current server timezone
|
|
* If this fails, fall back to environment variables and then make a
|
|
* guess.
|
|
* @returns {Promise<string>}
|
|
*/
|
|
async getTimezone() {
|
|
// From process.env.TZ
|
|
try {
|
|
if (process.env.TZ) {
|
|
this.checkTimezone(process.env.TZ);
|
|
return process.env.TZ;
|
|
}
|
|
} catch (e) {
|
|
log.warn("timezone", e.message + " in process.env.TZ");
|
|
}
|
|
|
|
let timezone = await Settings.get("serverTimezone");
|
|
|
|
// From Settings
|
|
try {
|
|
log.debug("timezone", "Using timezone from settings: " + timezone);
|
|
if (timezone) {
|
|
this.checkTimezone(timezone);
|
|
return timezone;
|
|
}
|
|
} catch (e) {
|
|
log.warn("timezone", e.message + " in settings");
|
|
}
|
|
|
|
// Guess
|
|
try {
|
|
let guess = dayjs.tz.guess();
|
|
log.debug("timezone", "Guessing timezone: " + guess);
|
|
if (guess) {
|
|
this.checkTimezone(guess);
|
|
return guess;
|
|
} else {
|
|
return "UTC";
|
|
}
|
|
} catch (e) {
|
|
// Guess failed, fall back to UTC
|
|
log.debug("timezone", "Guessed an invalid timezone. Use UTC as fallback");
|
|
return "UTC";
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Get the current offset
|
|
* @returns {string}
|
|
*/
|
|
getTimezoneOffset() {
|
|
return dayjs().format("Z");
|
|
}
|
|
|
|
/**
|
|
* Throw an error if the timezone is invalid
|
|
* @param timezone
|
|
*/
|
|
checkTimezone(timezone) {
|
|
try {
|
|
dayjs.utc("2013-11-18 11:55").tz(timezone).format();
|
|
} catch (e) {
|
|
throw new Error("Invalid timezone:" + timezone);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Set the current server timezone and environment variables
|
|
* @param {string} timezone
|
|
*/
|
|
async setTimezone(timezone) {
|
|
this.checkTimezone(timezone);
|
|
await Settings.set("serverTimezone", timezone, "general");
|
|
process.env.TZ = timezone;
|
|
dayjs.tz.setDefault(timezone);
|
|
}
|
|
|
|
/**
|
|
* TODO: Listen logic should be moved to here
|
|
* @returns {Promise<void>}
|
|
*/
|
|
async start() {
|
|
let enable = await Settings.get("nscd");
|
|
|
|
if (enable || enable === null) {
|
|
await this.startNSCDServices();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Stop the server
|
|
* @returns {Promise<void>}
|
|
*/
|
|
async stop() {
|
|
let enable = await Settings.get("nscd");
|
|
|
|
if (enable || enable === null) {
|
|
await this.stopNSCDServices();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Start all system services (e.g. nscd)
|
|
* For now, only used in Docker
|
|
*/
|
|
async startNSCDServices() {
|
|
if (process.env.UPTIME_KUMA_IS_CONTAINER) {
|
|
try {
|
|
log.info("services", "Starting nscd");
|
|
await childProcessAsync.exec("sudo service nscd start");
|
|
} catch (e) {
|
|
log.info("services", "Failed to start nscd");
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Stop all system services
|
|
*/
|
|
async stopNSCDServices() {
|
|
if (process.env.UPTIME_KUMA_IS_CONTAINER) {
|
|
try {
|
|
log.info("services", "Stopping nscd");
|
|
await childProcessAsync.exec("sudo service nscd stop");
|
|
} catch (e) {
|
|
log.info("services", "Failed to stop nscd");
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Force connected sockets of a user to refresh and disconnect.
|
|
* Used for resetting password.
|
|
* @param {string} userID
|
|
* @param {string?} currentSocketID
|
|
*/
|
|
disconnectAllSocketClients(userID, currentSocketID = undefined) {
|
|
for (const socket of this.io.sockets.sockets.values()) {
|
|
if (socket.userID === userID && socket.id !== currentSocketID) {
|
|
try {
|
|
socket.emit("refresh");
|
|
socket.disconnect();
|
|
} catch (e) {
|
|
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
module.exports = {
|
|
UptimeKumaServer
|
|
};
|
|
|
|
// Must be at the end to avoid circular dependencies
|
|
const { RealBrowserMonitorType } = require("./monitor-types/real-browser-monitor-type");
|
|
const { TailscalePing } = require("./monitor-types/tailscale-ping");
|