1
0
mirror of https://github.com/louislam/uptime-kuma.git synced 2024-12-10 10:10:14 +02:00
uptime-kuma/server/server.js

1697 lines
55 KiB
JavaScript
Raw Normal View History

2021-08-08 15:03:10 +02:00
console.log("Welcome to Uptime Kuma");
// Check Node.js Version
const nodeVersion = parseInt(process.versions.node.split(".")[0]);
const requiredVersion = 14;
console.log(`Your Node.js version: ${nodeVersion}`);
if (nodeVersion < requiredVersion) {
console.error(`Error: Your Node.js version is not supported, please upgrade to Node.js >= ${requiredVersion}.`);
process.exit(-1);
}
2021-10-09 20:36:20 +02:00
const args = require("args-parser")(process.argv);
2021-11-15 18:52:28 +02:00
const { sleep, log_info, log_debug, log_error, log_warn, getRandomInt, genSecret } = require("../src/util");
2021-10-15 18:57:26 +02:00
const config = require("./config");
2021-10-09 20:36:20 +02:00
2021-11-15 18:52:28 +02:00
log_info("server", "Welcome to Uptime Kuma");
log_debug("server", "Arguments");
log_debug("server", args);
if (! process.env.NODE_ENV) {
process.env.NODE_ENV = "production";
}
2021-11-15 18:52:28 +02:00
log_info("server", "Node Env: " + process.env.NODE_ENV);
2021-07-31 15:57:58 +02:00
2021-11-15 18:52:28 +02:00
log_info("server", "Importing Node libraries");
2021-07-31 15:57:58 +02:00
const fs = require("fs");
2021-07-27 19:47:13 +02:00
const http = require("http");
2021-09-02 14:18:27 +02:00
const https = require("https");
2021-07-31 15:57:58 +02:00
2021-11-15 18:52:28 +02:00
log_info("server", "Importing 3rd-party libraries");
log_debug("server", "Importing express");
2021-07-31 15:57:58 +02:00
const express = require("express");
2021-11-15 18:52:28 +02:00
log_debug("server", "Importing socket.io");
2021-06-25 15:55:49 +02:00
const { Server } = require("socket.io");
2021-11-15 18:52:28 +02:00
log_debug("server", "Importing redbean-node");
2021-07-27 19:47:13 +02:00
const { R } = require("redbean-node");
2021-11-15 18:52:28 +02:00
log_debug("server", "Importing jsonwebtoken");
2021-07-27 19:47:13 +02:00
const jwt = require("jsonwebtoken");
2021-11-15 18:52:28 +02:00
log_debug("server", "Importing http-graceful-shutdown");
2021-07-27 19:47:13 +02:00
const gracefulShutdown = require("http-graceful-shutdown");
2021-11-15 18:52:28 +02:00
log_debug("server", "Importing prometheus-api-metrics");
2021-07-27 19:47:13 +02:00
const prometheusAPIMetrics = require("prometheus-api-metrics");
2021-11-15 18:52:28 +02:00
log_debug("server", "Importing compare-versions");
2021-09-23 17:31:01 +02:00
const compareVersions = require("compare-versions");
2021-10-21 16:54:04 +02:00
const { passwordStrength } = require("check-password-strength");
2021-07-31 15:57:58 +02:00
2021-11-15 18:52:28 +02:00
log_debug("server", "Importing 2FA Modules");
const notp = require("notp");
const base32 = require("thirty-two");
2022-04-07 16:53:32 +02:00
/**
2022-04-07 17:02:57 +02:00
* `module.exports` (alias: `server`) should be inside this class, in order to avoid circular dependency issue.
* @type {UptimeKumaServer}
2022-04-07 16:53:32 +02:00
*/
2022-04-07 17:02:57 +02:00
class UptimeKumaServer {
/**
* Main monitor list
* @type {{}}
*/
monitorList = {};
entryPage = "dashboard";
async sendMonitorList(socket) {
let list = await getMonitorJSONList(socket.userID);
io.to(socket.userID).emit("monitorList", list);
return list;
}
}
2022-04-07 16:53:32 +02:00
2022-04-07 17:02:57 +02:00
const server = module.exports = new UptimeKumaServer();
2022-04-07 16:53:32 +02:00
2021-11-15 18:52:28 +02:00
log_info("server", "Importing this project modules");
log_debug("server", "Importing Monitor");
2021-07-31 15:57:58 +02:00
const Monitor = require("./model/monitor");
2021-11-15 18:52:28 +02:00
log_debug("server", "Importing Settings");
2022-03-29 11:38:48 +02:00
const { getSettings, setSettings, setting, initJWTSecret, checkLogin, startUnitTest, FBSD, errorLog, doubleCheckPassword } = require("./util-server");
2021-09-07 16:42:46 +02:00
2021-11-15 18:52:28 +02:00
log_debug("server", "Importing Notification");
2021-07-31 15:57:58 +02:00
const { Notification } = require("./notification");
2021-09-07 16:42:46 +02:00
Notification.init();
log_debug("server", "Importing Proxy");
const { Proxy } = require("./proxy");
2021-07-31 15:57:58 +02:00
debug("Importing Database");
const Database = require("./database");
2021-11-15 18:52:28 +02:00
log_debug("server", "Importing Background Jobs");
const { initBackgroundJobs, stopBackgroundJobs } = require("./jobs");
2022-03-29 11:38:48 +02:00
const { loginRateLimiter, twoFaRateLimiter } = require("./rate-limiter");
2021-07-27 18:52:31 +02:00
const { basicAuth } = require("./auth");
2021-07-27 19:47:13 +02:00
const { login } = require("./auth");
2021-07-28 14:35:55 +02:00
const passwordHash = require("./password-hash");
2021-07-31 15:57:58 +02:00
2021-08-21 13:50:22 +02:00
const checkVersion = require("./check-version");
2021-11-15 18:52:28 +02:00
log_info("server", "Version: " + checkVersion.version);
2021-08-10 10:36:21 +02:00
2021-08-10 10:45:37 +02:00
// If host is omitted, the server will accept connections on the unspecified IPv6 address (::) when IPv6 is available and the unspecified IPv4 address (0.0.0.0) otherwise.
// Dual-stack support for (::)
let hostname = process.env.UPTIME_KUMA_HOST || args.host;
// Also read HOST if not FreeBSD, as HOST is a system environment variable in FreeBSD
if (!hostname && !FBSD) {
hostname = process.env.HOST;
}
if (hostname) {
2021-11-15 18:52:28 +02:00
log_info("server", "Custom hostname: " + hostname);
}
const port = parseInt(process.env.UPTIME_KUMA_PORT || process.env.PORT || args.port || 3001);
2021-06-25 15:55:49 +02:00
2021-09-02 14:18:27 +02:00
// SSL
const sslKey = process.env.UPTIME_KUMA_SSL_KEY || process.env.SSL_KEY || args["ssl-key"] || undefined;
const sslCert = process.env.UPTIME_KUMA_SSL_CERT || process.env.SSL_CERT || args["ssl-cert"] || undefined;
2021-10-19 10:29:09 +02:00
const disableFrameSameOrigin = !!process.env.UPTIME_KUMA_DISABLE_FRAME_SAMEORIGIN || args["disable-frame-sameorigin"] || false;
const cloudflaredToken = args["cloudflared-token"] || process.env.UPTIME_KUMA_CLOUDFLARED_TOKEN || undefined;
2021-09-02 14:18:27 +02:00
2021-10-11 20:18:40 +02:00
// 2FA / notp verification defaults
const twofa_verification_opts = {
"window": 1,
"time": 30
2021-10-18 11:15:28 +02:00
};
2021-09-02 14:18:27 +02:00
/**
* Run unit test after the server is ready
* @type {boolean}
*/
const testMode = !!args["test"] || false;
2021-09-02 16:37:51 +02:00
2021-10-15 18:57:26 +02:00
if (config.demoMode) {
2021-11-15 18:52:28 +02:00
log_info("server", "==== Demo Mode ====");
2021-09-02 15:10:18 +02:00
}
2021-09-02 14:27:18 +02:00
2021-11-15 18:52:28 +02:00
log_info("server", "Creating express and socket.io instance");
2021-07-15 19:44:51 +02:00
const app = express();
2021-09-02 14:18:27 +02:00
2022-04-07 16:53:32 +02:00
let httpServer;
2021-09-02 14:18:27 +02:00
if (sslKey && sslCert) {
2021-11-15 18:52:28 +02:00
log_info("server", "Server Type: HTTPS");
2022-04-07 16:53:32 +02:00
httpServer = https.createServer({
2021-09-02 15:16:04 +02:00
key: fs.readFileSync(sslKey),
cert: fs.readFileSync(sslCert)
2021-09-02 15:13:59 +02:00
}, app);
2021-09-02 14:18:27 +02:00
} else {
2021-11-15 18:52:28 +02:00
log_info("server", "Server Type: HTTP");
2022-04-07 16:53:32 +02:00
httpServer = http.createServer(app);
2021-09-02 14:18:27 +02:00
}
2022-04-07 16:53:32 +02:00
const io = new Server(httpServer);
module.exports.io = io;
// Must be after io instantiation
const { sendNotificationList, sendHeartbeatList, sendImportantHeartbeatList, sendInfo, sendProxyList } = require("./client");
2021-09-16 16:48:28 +02:00
const { statusPageSocketHandler } = require("./socket-handlers/status-page-socket-handler");
const databaseSocketHandler = require("./socket-handlers/database-socket-handler");
2021-11-18 12:22:03 +02:00
const TwoFA = require("./2fa");
2022-03-10 15:34:30 +02:00
const StatusPage = require("./model/status_page");
const { cloudflaredSocketHandler, autoStart: cloudflaredAutoStart, stop: cloudflaredStop } = require("./socket-handlers/cloudflared-socket-handler");
const { proxySocketHandler } = require("./socket-handlers/proxy-socket-handler");
app.use(express.json());
2021-07-09 13:33:22 +02:00
2021-10-19 08:26:10 +02:00
// Global Middleware
app.use(function (req, res, next) {
2021-10-19 10:29:09 +02:00
if (!disableFrameSameOrigin) {
res.setHeader("X-Frame-Options", "SAMEORIGIN");
}
2021-10-19 08:26:10 +02:00
res.removeHeader("X-Powered-By");
next();
});
2021-07-21 20:02:35 +02:00
/**
* Total WebSocket client connected to server currently, no actual use
* @type {number}
*/
2021-06-25 15:55:49 +02:00
let totalClient = 0;
2021-07-21 20:02:35 +02:00
/**
* Use for decode the auth object
* @type {null}
*/
2021-06-25 15:55:49 +02:00
let jwtSecret = null;
2021-07-21 20:02:35 +02:00
/**
* Show Setup Page
* @type {boolean}
*/
2021-07-11 07:47:57 +02:00
let needSetup = false;
2021-06-25 15:55:49 +02:00
/**
* Cache Index HTML
* @type {string}
*/
let indexHTML = "";
try {
indexHTML = fs.readFileSync("./dist/index.html").toString();
} catch (e) {
// "dist/index.html" is not necessary for development
if (process.env.NODE_ENV !== "development") {
2021-11-15 18:52:28 +02:00
log_error("server", "Error: Cannot find 'dist/index.html', did you install correctly?");
process.exit(1);
}
}
2021-06-25 15:55:49 +02:00
(async () => {
2021-09-20 10:29:18 +02:00
Database.init(args);
await initDatabase(testMode);
2021-06-25 15:55:49 +02:00
2021-09-15 14:40:26 +02:00
exports.entryPage = await setting("entryPage");
2022-04-06 16:43:22 +02:00
await StatusPage.loadDomainMappingList();
2021-07-27 18:52:31 +02:00
2021-11-15 18:52:28 +02:00
log_info("server", "Adding route");
2021-07-27 18:52:31 +02:00
2021-09-11 13:40:03 +02:00
// ***************************
2021-07-27 18:52:31 +02:00
// Normal Router here
2021-09-11 13:40:03 +02:00
// ***************************
2021-07-27 18:52:31 +02:00
// Entry Page
2022-04-06 16:43:22 +02:00
app.get("/", async (request, response) => {
debug(`Request Domain: ${request.hostname}`);
if (request.hostname in StatusPage.domainMappingList) {
debug("This is a status page domain");
response.send(indexHTML);
} else if (exports.entryPage && exports.entryPage.startsWith("statusPage-")) {
2022-03-17 16:44:47 +02:00
response.redirect("/status/" + exports.entryPage.replace("statusPage-", ""));
} else {
response.redirect("/dashboard");
}
});
2021-08-09 12:16:27 +02:00
// Robots.txt
app.get("/robots.txt", async (_request, response) => {
let txt = "User-agent: *\nDisallow:";
if (! await setting("searchEngineIndex")) {
txt += " /";
}
response.setHeader("Content-Type", "text/plain");
response.send(txt);
});
2021-06-25 15:55:49 +02:00
2021-07-27 18:52:31 +02:00
// Basic Auth Router here
// Prometheus API metrics /metrics
// With Basic Auth using the first user's username/password
2021-08-09 12:16:27 +02:00
app.get("/metrics", basicAuth, prometheusAPIMetrics());
app.use("/", express.static("dist"));
2021-07-22 09:22:15 +02:00
// ./data/upload
app.use("/upload", express.static(Database.uploadDir));
2021-09-14 06:10:25 +02:00
app.get("/.well-known/change-password", async (_, response) => {
response.redirect("https://github.com/louislam/uptime-kuma/wiki/Reset-Password-via-CLI");
});
2021-09-14 08:55:45 +02:00
// API Router
const apiRouter = require("./routers/api-router");
app.use(apiRouter);
2021-09-11 13:40:03 +02:00
2021-10-19 08:26:10 +02:00
// Universal Route Handler, must be at the end of all express routes.
2021-08-09 12:16:27 +02:00
app.get("*", async (_request, response) => {
if (_request.originalUrl.startsWith("/upload/")) {
response.status(404).send("File not found.");
} else {
response.send(indexHTML);
}
2021-07-09 08:14:03 +02:00
});
2021-11-15 18:52:28 +02:00
log_info("server", "Adding socket handler");
2021-07-27 19:47:13 +02:00
io.on("connection", async (socket) => {
2021-07-13 12:08:12 +02:00
sendInfo(socket);
2021-07-13 12:08:12 +02:00
2021-06-25 15:55:49 +02:00
totalClient++;
2021-07-11 07:47:57 +02:00
if (needSetup) {
2021-11-15 18:52:28 +02:00
log_info("server", "Redirect to setup page");
socket.emit("setup");
2021-07-11 07:47:57 +02:00
}
2021-07-27 19:47:13 +02:00
socket.on("disconnect", () => {
2021-06-25 15:55:49 +02:00
totalClient--;
});
2021-07-30 05:33:44 +02:00
// ***************************
2021-09-11 13:40:03 +02:00
// Public Socket API
2021-07-30 05:33:44 +02:00
// ***************************
2021-06-25 15:55:49 +02:00
socket.on("loginByToken", async (token, callback) => {
2021-11-15 18:52:28 +02:00
log_info("auth", `Login by token. IP=${getClientIp(socket)}`);
2021-06-25 15:55:49 +02:00
try {
let decoded = jwt.verify(token, jwtSecret);
2021-11-15 18:52:28 +02:00
log_info("auth", "Username from JWT: " + decoded.username);
2021-06-25 15:55:49 +02:00
let user = await R.findOne("user", " username = ? AND active = 1 ", [
2021-07-27 19:47:13 +02:00
decoded.username,
]);
2021-06-25 15:55:49 +02:00
if (user) {
2021-11-15 18:52:28 +02:00
log_debug("auth", "afterLogin");
afterLogin(socket, user);
2021-11-15 18:52:28 +02:00
log_debug("auth", "afterLogin ok");
2021-06-25 15:55:49 +02:00
2021-11-15 18:52:28 +02:00
log_info("auth", `Successfully logged in user ${decoded.username}. IP=${getClientIp(socket)}`);
2021-08-03 19:03:40 +02:00
2021-06-25 15:55:49 +02:00
callback({
ok: true,
});
2021-06-25 15:55:49 +02:00
} else {
2021-11-11 13:31:28 +02:00
2021-11-15 18:52:28 +02:00
log_info("auth", `Inactive or deleted user ${decoded.username}. IP=${getClientIp(socket)}`);
2021-11-11 13:31:28 +02:00
2021-06-25 15:55:49 +02:00
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: "The user is inactive or deleted.",
});
2021-06-25 15:55:49 +02:00
}
} catch (error) {
2021-11-11 13:31:28 +02:00
2021-11-15 18:52:28 +02:00
log_error("auth", `Invalid token for user ${decoded.username}. IP=${getClientIp(socket)}`);
2021-11-11 13:31:28 +02:00
2021-06-25 15:55:49 +02:00
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: "Invalid token.",
});
2021-06-25 15:55:49 +02:00
}
});
socket.on("login", async (data, callback) => {
2021-11-15 18:52:28 +02:00
log_info("auth", `Login by username + password. IP=${getClientIp(socket)}`);
2021-06-25 15:55:49 +02:00
2022-03-29 11:38:48 +02:00
// Checking
if (typeof callback !== "function") {
return;
}
if (!data) {
return;
}
2021-10-23 10:35:13 +02:00
// Login Rate Limit
if (! await loginRateLimiter.pass(callback)) {
2021-11-15 18:52:28 +02:00
log_info("auth", `Too many failed requests for user ${data.username}. IP=${getClientIp(socket)}`);
2021-10-23 10:35:13 +02:00
return;
}
let user = await login(data.username, data.password);
2021-07-13 16:22:46 +02:00
2021-07-27 18:52:31 +02:00
if (user) {
2021-10-19 00:42:33 +02:00
if (user.twofa_status == 0) {
2021-10-29 20:35:05 +02:00
afterLogin(socket, user);
2021-11-11 13:31:28 +02:00
2021-11-15 18:52:28 +02:00
log_info("auth", `Successfully logged in user ${data.username}. IP=${getClientIp(socket)}`);
2021-11-11 13:31:28 +02:00
callback({
ok: true,
token: jwt.sign({
username: data.username,
}, jwtSecret),
});
}
2021-10-19 00:42:33 +02:00
if (user.twofa_status == 1 && !data.token) {
2021-11-11 13:31:28 +02:00
2021-11-15 18:52:28 +02:00
log_info("auth", `2FA token required for user ${data.username}. IP=${getClientIp(socket)}`);
2021-11-11 13:31:28 +02:00
callback({
tokenRequired: true,
});
}
if (data.token) {
2021-10-11 20:18:40 +02:00
let verify = notp.totp.verify(data.token, user.twofa_secret, twofa_verification_opts);
2021-10-19 00:42:33 +02:00
if (user.twofa_last_token !== data.token && verify) {
2021-10-29 20:35:05 +02:00
afterLogin(socket, user);
2021-10-19 00:42:33 +02:00
await R.exec("UPDATE `user` SET twofa_last_token = ? WHERE id = ? ", [
data.token,
socket.userID,
]);
2021-11-15 18:52:28 +02:00
log_info("auth", `Successfully logged in user ${data.username}. IP=${getClientIp(socket)}`);
2021-11-11 13:31:28 +02:00
callback({
ok: true,
token: jwt.sign({
username: data.username,
}, jwtSecret),
});
} else {
2021-11-11 13:31:28 +02:00
2021-11-15 18:52:28 +02:00
log_warn("auth", `Invalid token provided for user ${data.username}. IP=${getClientIp(socket)}`);
2021-11-11 13:31:28 +02:00
callback({
ok: false,
msg: "Invalid Token!",
});
}
}
2021-06-25 15:55:49 +02:00
} else {
2021-11-11 13:31:28 +02:00
2021-11-15 18:52:28 +02:00
log_warn("auth", `Incorrect username or password for user ${data.username}. IP=${getClientIp(socket)}`);
2021-11-11 13:31:28 +02:00
2021-06-25 15:55:49 +02:00
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: "Incorrect username or password.",
});
2021-06-25 15:55:49 +02:00
}
});
socket.on("logout", async (callback) => {
2022-03-29 11:38:48 +02:00
// Rate Limit
if (! await loginRateLimiter.pass(callback)) {
return;
}
socket.leave(socket.userID);
2021-06-25 15:55:49 +02:00
socket.userID = null;
2022-03-29 11:38:48 +02:00
if (typeof callback === "function") {
callback();
}
2021-07-11 07:47:57 +02:00
});
2022-03-29 11:38:48 +02:00
socket.on("prepare2FA", async (currentPassword, callback) => {
try {
2022-03-29 11:38:48 +02:00
if (! await twoFaRateLimiter.pass(callback)) {
return;
}
checkLogin(socket);
2022-03-29 11:38:48 +02:00
await doubleCheckPassword(socket, currentPassword);
let user = await R.findOne("user", " id = ? AND active = 1 ", [
socket.userID,
]);
if (user.twofa_status == 0) {
2021-10-18 11:37:11 +02:00
let newSecret = genSecret();
let encodedSecret = base32.encode(newSecret);
// Google authenticator doesn't like equal signs
// The fix is found at https://github.com/guyht/notp
// Related issue: https://github.com/louislam/uptime-kuma/issues/486
encodedSecret = encodedSecret.toString().replace(/=/g, "");
2021-09-11 20:25:51 +02:00
let uri = `otpauth://totp/Uptime%20Kuma:${user.username}?secret=${encodedSecret}`;
await R.exec("UPDATE `user` SET twofa_secret = ? WHERE id = ? ", [
newSecret,
socket.userID,
]);
callback({
ok: true,
uri: uri,
});
} else {
callback({
ok: false,
msg: "2FA is already enabled.",
});
}
} catch (error) {
callback({
ok: false,
2022-03-29 11:38:48 +02:00
msg: error.message,
});
}
});
2022-03-29 11:38:48 +02:00
socket.on("save2FA", async (currentPassword, callback) => {
try {
2022-03-29 11:38:48 +02:00
if (! await twoFaRateLimiter.pass(callback)) {
return;
}
checkLogin(socket);
2022-03-29 11:38:48 +02:00
await doubleCheckPassword(socket, currentPassword);
await R.exec("UPDATE `user` SET twofa_status = 1 WHERE id = ? ", [
socket.userID,
]);
2021-11-15 18:52:28 +02:00
log_info("auth", `Saved 2FA token for user ${data.username}. IP=${getClientIp(socket)}`);
2021-11-11 13:31:28 +02:00
callback({
ok: true,
msg: "2FA Enabled.",
});
} catch (error) {
2021-11-11 13:31:28 +02:00
2021-11-15 18:52:28 +02:00
log_error("auth", `Error changing 2FA token for user ${data.username}. IP=${getClientIp(socket)}`);
2021-11-11 13:31:28 +02:00
callback({
ok: false,
2022-03-29 11:38:48 +02:00
msg: error.message,
});
}
});
2022-03-29 11:38:48 +02:00
socket.on("disable2FA", async (currentPassword, callback) => {
try {
2022-03-29 11:38:48 +02:00
if (! await twoFaRateLimiter.pass(callback)) {
return;
}
checkLogin(socket);
2022-03-29 11:38:48 +02:00
await doubleCheckPassword(socket, currentPassword);
2021-11-18 12:22:03 +02:00
await TwoFA.disable2FA(socket.userID);
2021-11-15 18:52:28 +02:00
log_info("auth", `Disabled 2FA token for user ${data.username}. IP=${getClientIp(socket)}`);
2021-11-11 13:31:28 +02:00
callback({
ok: true,
msg: "2FA Disabled.",
});
} catch (error) {
2021-11-11 13:31:28 +02:00
2021-11-15 18:52:28 +02:00
log_error("auth", `Error disabling 2FA token for user ${data.username}. IP=${getClientIp(socket)}`);
2021-11-11 13:31:28 +02:00
callback({
ok: false,
2022-03-29 11:38:48 +02:00
msg: error.message,
});
}
});
2022-03-29 11:38:48 +02:00
socket.on("verifyToken", async (token, currentPassword, callback) => {
try {
checkLogin(socket);
await doubleCheckPassword(socket, currentPassword);
2022-03-29 11:38:48 +02:00
let user = await R.findOne("user", " id = ? AND active = 1 ", [
socket.userID,
]);
2022-03-29 11:38:48 +02:00
let verify = notp.totp.verify(token, user.twofa_secret, twofa_verification_opts);
2022-03-29 11:38:48 +02:00
if (user.twofa_last_token !== token && verify) {
callback({
ok: true,
valid: true,
});
} else {
callback({
ok: false,
msg: "Invalid Token.",
valid: false,
});
}
} catch (error) {
callback({
ok: false,
2022-03-29 11:38:48 +02:00
msg: error.message,
});
}
});
socket.on("twoFAStatus", async (callback) => {
try {
2022-03-29 11:38:48 +02:00
checkLogin(socket);
let user = await R.findOne("user", " id = ? AND active = 1 ", [
socket.userID,
]);
if (user.twofa_status == 1) {
callback({
ok: true,
status: true,
});
} else {
callback({
ok: true,
status: false,
});
}
} catch (error) {
2022-03-29 11:38:48 +02:00
console.log(error);
callback({
ok: false,
2022-03-29 11:38:48 +02:00
msg: error.message,
});
}
});
2021-07-11 07:47:57 +02:00
socket.on("needSetup", async (callback) => {
callback(needSetup);
});
socket.on("setup", async (username, password, callback) => {
try {
2021-10-21 16:54:04 +02:00
if (passwordStrength(password).value === "Too weak") {
throw new Error("Password is too weak. It should contain alphabetic and numeric characters. It must be at least 6 characters in length.");
}
2021-07-11 07:47:57 +02:00
if ((await R.count("user")) !== 0) {
2021-10-18 22:35:47 +02:00
throw new Error("Uptime Kuma has been initialized. If you want to run setup again, please delete the database.");
2021-07-11 07:47:57 +02:00
}
let user = R.dispense("user");
2021-07-11 07:47:57 +02:00
user.username = username;
user.password = passwordHash.generate(password);
await R.store(user);
2021-07-11 07:47:57 +02:00
needSetup = false;
callback({
ok: true,
2021-07-27 19:47:13 +02:00
msg: "Added Successfully.",
2021-07-11 07:47:57 +02:00
});
} catch (e) {
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: e.message,
2021-07-11 07:47:57 +02:00
});
}
2021-06-25 15:55:49 +02:00
});
2021-07-30 05:33:44 +02:00
// ***************************
2021-06-25 15:55:49 +02:00
// Auth Only API
2021-07-30 05:33:44 +02:00
// ***************************
2021-06-25 15:55:49 +02:00
2021-07-30 13:18:26 +02:00
// Add a new monitor
2021-06-25 15:55:49 +02:00
socket.on("add", async (monitor, callback) => {
try {
checkLogin(socket);
let bean = R.dispense("monitor");
let notificationIDList = monitor.notificationIDList;
delete monitor.notificationIDList;
2021-08-06 20:10:38 +02:00
monitor.accepted_statuscodes_json = JSON.stringify(monitor.accepted_statuscodes);
delete monitor.accepted_statuscodes;
bean.import(monitor);
bean.user_id = socket.userID;
await R.store(bean);
2021-06-25 15:55:49 +02:00
await updateMonitorNotification(bean.id, notificationIDList);
2022-04-07 17:02:57 +02:00
await server.sendMonitorList(socket);
await startMonitor(socket.userID, bean.id);
2021-06-27 10:10:55 +02:00
2021-11-15 18:52:28 +02:00
log_info("monitor", `Added Monitor: ${monitorID} User ID: ${socket.userID}`);
2021-11-11 13:31:28 +02:00
2021-06-25 15:55:49 +02:00
callback({
ok: true,
msg: "Added Successfully.",
2021-07-27 19:47:13 +02:00
monitorID: bean.id,
2021-06-25 15:55:49 +02:00
});
2021-06-27 10:10:55 +02:00
} catch (e) {
2021-11-11 13:31:28 +02:00
2021-11-15 18:52:28 +02:00
log_error("monitor", `Error adding Monitor: ${monitorID} User ID: ${socket.userID}`);
2021-11-11 13:31:28 +02:00
2021-06-27 10:10:55 +02:00
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: e.message,
2021-06-27 10:10:55 +02:00
});
}
});
2021-07-30 13:18:26 +02:00
// Edit a monitor
2021-06-27 10:10:55 +02:00
socket.on("editMonitor", async (monitor, callback) => {
try {
checkLogin(socket);
2021-06-27 10:10:55 +02:00
let bean = await R.findOne("monitor", " id = ? ", [ monitor.id ]);
2021-06-27 10:10:55 +02:00
if (bean.user_id !== socket.userID) {
throw new Error("Permission denied.");
2021-06-27 10:10:55 +02:00
}
// Reset Prometheus labels
2022-04-07 16:53:32 +02:00
server.monitorList[monitor.id]?.prometheus()?.remove();
bean.name = monitor.name;
bean.type = monitor.type;
bean.url = monitor.url;
bean.method = monitor.method;
bean.body = monitor.body;
bean.headers = monitor.headers;
bean.basic_auth_user = monitor.basic_auth_user;
bean.basic_auth_pass = monitor.basic_auth_pass;
bean.interval = monitor.interval;
bean.retryInterval = monitor.retryInterval;
2021-07-01 08:03:06 +02:00
bean.hostname = monitor.hostname;
bean.maxretries = monitor.maxretries;
2021-07-01 08:03:06 +02:00
bean.port = monitor.port;
2021-07-01 11:19:28 +02:00
bean.keyword = monitor.keyword;
2021-07-30 13:18:26 +02:00
bean.ignoreTls = monitor.ignoreTls;
bean.expiryNotification = monitor.expiryNotification;
2021-07-30 13:18:26 +02:00
bean.upsideDown = monitor.upsideDown;
2021-08-08 18:23:51 +02:00
bean.maxredirects = monitor.maxredirects;
bean.accepted_statuscodes_json = JSON.stringify(monitor.accepted_statuscodes);
2021-08-23 00:05:48 +02:00
bean.dns_resolve_type = monitor.dns_resolve_type;
bean.dns_resolve_server = monitor.dns_resolve_server;
2021-09-30 18:09:43 +02:00
bean.pushToken = monitor.pushToken;
bean.proxyId = Number.isInteger(monitor.proxyId) ? monitor.proxyId : null;
2021-06-27 10:10:55 +02:00
await R.store(bean);
2021-06-27 10:10:55 +02:00
await updateMonitorNotification(bean.id, monitor.notificationIDList);
2021-06-27 10:10:55 +02:00
if (bean.active) {
await restartMonitor(socket.userID, bean.id);
2021-06-27 10:10:55 +02:00
}
2022-04-07 17:02:57 +02:00
await server.sendMonitorList(socket);
2021-06-25 15:55:49 +02:00
2021-06-27 10:10:55 +02:00
callback({
ok: true,
msg: "Saved.",
2021-07-27 19:47:13 +02:00
monitorID: bean.id,
2021-06-27 10:10:55 +02:00
});
2021-06-25 15:55:49 +02:00
} catch (e) {
2021-11-15 18:52:28 +02:00
log_error("monitor", e);
2021-06-25 15:55:49 +02:00
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: e.message,
2021-06-25 15:55:49 +02:00
});
}
});
socket.on("getMonitorList", async (callback) => {
try {
checkLogin(socket);
2022-04-07 17:02:57 +02:00
await server.sendMonitorList(socket);
callback({
ok: true,
});
} catch (e) {
2021-11-15 18:52:28 +02:00
log_error("monitor", e);
callback({
ok: false,
msg: e.message,
});
}
});
2021-06-25 15:55:49 +02:00
socket.on("getMonitor", async (monitorID, callback) => {
try {
checkLogin(socket);
2021-06-25 15:55:49 +02:00
2021-11-15 18:52:28 +02:00
log_info("monitor", `Get Monitor: ${monitorID} User ID: ${socket.userID}`);
2021-06-25 15:55:49 +02:00
let bean = await R.findOne("monitor", " id = ? AND user_id = ? ", [
monitorID,
socket.userID,
]);
2021-06-25 15:55:49 +02:00
callback({
ok: true,
monitor: await bean.toJSON(),
2021-06-25 15:55:49 +02:00
});
} catch (e) {
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: e.message,
2021-06-25 15:55:49 +02:00
});
}
});
socket.on("getMonitorBeats", async (monitorID, period, callback) => {
try {
checkLogin(socket);
2021-11-15 18:52:28 +02:00
log_info("monitor", `Get Monitor Beats: ${monitorID} User ID: ${socket.userID}`);
if (period == null) {
throw new Error("Invalid period.");
}
let list = await R.getAll(`
SELECT * FROM heartbeat
WHERE monitor_id = ? AND
time > DATETIME('now', '-' || ? || ' hours')
ORDER BY time ASC
`, [
monitorID,
period,
]);
callback({
ok: true,
data: list,
});
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
2021-06-25 15:55:49 +02:00
// Start or Resume the monitor
socket.on("resumeMonitor", async (monitorID, callback) => {
try {
checkLogin(socket);
2021-06-25 15:55:49 +02:00
await startMonitor(socket.userID, monitorID);
2022-04-07 17:02:57 +02:00
await server.sendMonitorList(socket);
2021-06-25 15:55:49 +02:00
callback({
ok: true,
2021-07-27 19:47:13 +02:00
msg: "Resumed Successfully.",
2021-06-25 15:55:49 +02:00
});
} catch (e) {
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: e.message,
2021-06-25 15:55:49 +02:00
});
}
});
socket.on("pauseMonitor", async (monitorID, callback) => {
try {
checkLogin(socket);
await pauseMonitor(socket.userID, monitorID);
2022-04-07 17:02:57 +02:00
await server.sendMonitorList(socket);
2021-06-25 15:55:49 +02:00
callback({
ok: true,
2021-07-27 19:47:13 +02:00
msg: "Paused Successfully.",
2021-06-25 15:55:49 +02:00
});
} catch (e) {
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: e.message,
2021-06-25 15:55:49 +02:00
});
}
});
socket.on("deleteMonitor", async (monitorID, callback) => {
try {
checkLogin(socket);
2021-06-25 15:55:49 +02:00
2021-11-15 18:52:28 +02:00
log_info("manage", `Delete Monitor: ${monitorID} User ID: ${socket.userID}`);
2021-06-25 15:55:49 +02:00
2022-04-07 16:53:32 +02:00
if (monitorID in server.monitorList) {
server.monitorList[monitorID].stop();
delete server.monitorList[monitorID];
2021-06-25 15:55:49 +02:00
}
await R.exec("DELETE FROM monitor WHERE id = ? AND user_id = ? ", [
monitorID,
2021-07-27 19:47:13 +02:00
socket.userID,
2021-06-25 15:55:49 +02:00
]);
callback({
ok: true,
2021-07-27 19:47:13 +02:00
msg: "Deleted Successfully.",
2021-06-25 15:55:49 +02:00
});
2022-04-07 17:02:57 +02:00
await server.sendMonitorList(socket);
// Clear heartbeat list on client
await sendImportantHeartbeatList(socket, monitorID, true, true);
2021-06-25 15:55:49 +02:00
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
socket.on("getTags", async (callback) => {
try {
checkLogin(socket);
const list = await R.findAll("tag");
callback({
ok: true,
tags: list.map(bean => bean.toJSON()),
});
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
socket.on("addTag", async (tag, callback) => {
try {
checkLogin(socket);
let bean = R.dispense("tag");
bean.name = tag.name;
bean.color = tag.color;
await R.store(bean);
callback({
ok: true,
tag: await bean.toJSON(),
});
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
socket.on("editTag", async (tag, callback) => {
try {
checkLogin(socket);
let bean = await R.findOne("monitor", " id = ? ", [ tag.id ]);
bean.name = tag.name;
bean.color = tag.color;
await R.store(bean);
callback({
ok: true,
tag: await bean.toJSON(),
});
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
socket.on("deleteTag", async (tagID, callback) => {
try {
checkLogin(socket);
await R.exec("DELETE FROM tag WHERE id = ? ", [ tagID ]);
callback({
ok: true,
msg: "Deleted Successfully.",
});
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
socket.on("addMonitorTag", async (tagID, monitorID, value, callback) => {
try {
checkLogin(socket);
await R.exec("INSERT INTO monitor_tag (tag_id, monitor_id, value) VALUES (?, ?, ?)", [
tagID,
monitorID,
value,
]);
callback({
ok: true,
msg: "Added Successfully.",
});
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
socket.on("editMonitorTag", async (tagID, monitorID, value, callback) => {
try {
checkLogin(socket);
await R.exec("UPDATE monitor_tag SET value = ? WHERE tag_id = ? AND monitor_id = ?", [
value,
tagID,
monitorID,
]);
callback({
ok: true,
msg: "Edited Successfully.",
});
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
socket.on("deleteMonitorTag", async (tagID, monitorID, value, callback) => {
try {
checkLogin(socket);
await R.exec("DELETE FROM monitor_tag WHERE tag_id = ? AND monitor_id = ? AND value = ?", [
tagID,
monitorID,
value,
]);
// Cleanup unused Tags
await R.exec("delete from tag where ( select count(*) from monitor_tag mt where tag.id = mt.tag_id ) = 0");
callback({
ok: true,
msg: "Deleted Successfully.",
});
} catch (e) {
2021-06-25 15:55:49 +02:00
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: e.message,
2021-06-25 15:55:49 +02:00
});
}
});
socket.on("changePassword", async (password, callback) => {
try {
checkLogin(socket);
2021-06-25 15:55:49 +02:00
2021-10-21 16:54:04 +02:00
if (! password.newPassword) {
throw new Error("Invalid new password");
2021-06-25 15:55:49 +02:00
}
2021-10-21 16:54:04 +02:00
if (passwordStrength(password.newPassword).value === "Too weak") {
throw new Error("Password is too weak. It should contain alphabetic and numeric characters. It must be at least 6 characters in length.");
}
2022-03-29 11:38:48 +02:00
let user = await doubleCheckPassword(socket, password.currentPassword);
await user.resetPassword(password.newPassword);
2021-06-25 15:55:49 +02:00
2022-03-29 11:38:48 +02:00
callback({
ok: true,
msg: "Password has been updated successfully.",
});
2021-06-25 15:55:49 +02:00
} catch (e) {
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: e.message,
2021-06-25 15:55:49 +02:00
});
}
});
2021-07-06 08:30:10 +02:00
2021-07-31 15:57:58 +02:00
socket.on("getSettings", async (callback) => {
2021-07-06 08:30:10 +02:00
try {
checkLogin(socket);
2021-07-06 08:30:10 +02:00
callback({
ok: true,
2021-07-31 15:57:58 +02:00
data: await getSettings("general"),
});
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
2022-03-29 11:38:48 +02:00
socket.on("setSettings", async (data, currentPassword, callback) => {
2021-07-31 15:57:58 +02:00
try {
checkLogin(socket);
2021-07-31 15:57:58 +02:00
2022-03-29 11:38:48 +02:00
if (data.disableAuth) {
await doubleCheckPassword(socket, currentPassword);
}
2021-09-15 14:40:26 +02:00
await setSettings("general", data);
exports.entryPage = data.entryPage;
2021-07-31 15:57:58 +02:00
callback({
ok: true,
msg: "Saved"
2021-07-06 08:30:10 +02:00
});
sendInfo(socket);
2021-07-06 08:30:10 +02:00
} catch (e) {
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: e.message,
2021-07-06 08:30:10 +02:00
});
}
});
2021-07-09 08:14:03 +02:00
// Add or Edit
socket.on("addNotification", async (notification, notificationID, callback) => {
try {
checkLogin(socket);
2021-07-09 08:14:03 +02:00
let notificationBean = await Notification.save(notification, notificationID, socket.userID);
await sendNotificationList(socket);
2021-07-09 08:14:03 +02:00
callback({
ok: true,
msg: "Saved",
id: notificationBean.id,
2021-07-09 08:14:03 +02:00
});
} catch (e) {
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: e.message,
2021-07-09 08:14:03 +02:00
});
}
});
socket.on("deleteNotification", async (notificationID, callback) => {
try {
checkLogin(socket);
2021-07-09 08:14:03 +02:00
await Notification.delete(notificationID, socket.userID);
await sendNotificationList(socket);
2021-07-09 08:14:03 +02:00
callback({
ok: true,
msg: "Deleted",
});
} catch (e) {
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: e.message,
2021-07-09 08:14:03 +02:00
});
}
});
socket.on("testNotification", async (notification, callback) => {
try {
checkLogin(socket);
2021-07-09 08:14:03 +02:00
let msg = await Notification.send(notification, notification.name + " Testing");
2021-07-09 08:14:03 +02:00
callback({
ok: true,
2021-07-27 19:47:13 +02:00
msg,
2021-07-09 08:14:03 +02:00
});
} catch (e) {
console.error(e);
2021-07-18 14:49:46 +02:00
2021-07-09 08:14:03 +02:00
callback({
ok: false,
2021-07-27 19:47:13 +02:00
msg: e.message,
2021-07-09 08:14:03 +02:00
});
}
});
2021-07-18 12:51:58 +02:00
socket.on("checkApprise", async (callback) => {
try {
checkLogin(socket);
2021-07-18 12:51:58 +02:00
callback(Notification.checkApprise());
} catch (e) {
callback(false);
}
});
2021-08-03 19:03:40 +02:00
2021-09-11 21:53:17 +02:00
socket.on("uploadBackup", async (uploadedJSON, importHandle, callback) => {
2021-09-01 17:09:32 +02:00
try {
checkLogin(socket);
2021-09-01 17:09:32 +02:00
2021-09-02 16:13:31 +02:00
let backupData = JSON.parse(uploadedJSON);
2021-09-01 17:09:32 +02:00
2021-11-15 18:52:28 +02:00
log_info("manage", `Importing Backup, User ID: ${socket.userID}, Version: ${backupData.version}`);
2021-09-23 17:31:01 +02:00
2021-09-11 21:53:17 +02:00
let notificationListData = backupData.notificationList;
let proxyListData = backupData.proxyList;
2021-09-11 21:53:17 +02:00
let monitorListData = backupData.monitorList;
2021-09-01 17:09:32 +02:00
let version17x = compareVersions.compare(backupData.version, "1.7.0", ">=");
// If the import option is "overwrite" it'll clear most of the tables, except "settings" and "user"
2021-09-11 21:53:17 +02:00
if (importHandle == "overwrite") {
// Stops every monitor first, so it doesn't execute any heartbeat while importing
2022-04-07 16:53:32 +02:00
for (let id in server.monitorList) {
let monitor = server.monitorList[id];
await monitor.stop();
2021-09-01 17:09:32 +02:00
}
2021-09-11 21:53:17 +02:00
await R.exec("DELETE FROM heartbeat");
await R.exec("DELETE FROM monitor_notification");
await R.exec("DELETE FROM monitor_tls_info");
await R.exec("DELETE FROM notification");
await R.exec("DELETE FROM monitor_tag");
await R.exec("DELETE FROM tag");
2021-09-11 21:53:17 +02:00
await R.exec("DELETE FROM monitor");
await R.exec("DELETE FROM proxy");
2021-09-01 17:09:32 +02:00
}
// Only starts importing if the backup file contains at least one notification
2021-09-11 21:53:17 +02:00
if (notificationListData.length >= 1) {
// Get every existing notification name and puts them in one simple string
2021-09-11 21:53:17 +02:00
let notificationNameList = await R.getAll("SELECT name FROM notification");
let notificationNameListString = JSON.stringify(notificationNameList);
2021-09-01 17:09:32 +02:00
2021-09-11 21:53:17 +02:00
for (let i = 0; i < notificationListData.length; i++) {
// Only starts importing the notification if the import option is "overwrite", "keep" or "skip" but the notification doesn't exists
2021-09-11 21:53:17 +02:00
if ((importHandle == "skip" && notificationNameListString.includes(notificationListData[i].name) == false) || importHandle == "keep" || importHandle == "overwrite") {
2021-09-01 17:09:32 +02:00
2021-09-11 21:53:17 +02:00
let notification = JSON.parse(notificationListData[i].config);
await Notification.save(notification, null, socket.userID);
2021-09-01 17:09:32 +02:00
2021-09-11 21:53:17 +02:00
}
}
}
2021-09-01 17:09:32 +02:00
// Only starts importing if the backup file contains at least one proxy
if (proxyListData.length >= 1) {
const proxies = await R.findAll("proxy");
// Loop over proxy list and save proxies
for (const proxy of proxyListData) {
const exists = proxies.find(item => item.id === proxy.id);
// Do not process when proxy already exists in import handle is skip and keep
if (["skip", "keep"].includes(importHandle) && !exists) {
return;
}
// Save proxy as new entry if exists update exists one
await Proxy.save(proxy, exists ? proxy.id : undefined, proxy.userId);
}
}
// Only starts importing if the backup file contains at least one monitor
2021-09-11 21:53:17 +02:00
if (monitorListData.length >= 1) {
// Get every existing monitor name and puts them in one simple string
2021-09-11 21:53:17 +02:00
let monitorNameList = await R.getAll("SELECT name FROM monitor");
let monitorNameListString = JSON.stringify(monitorNameList);
for (let i = 0; i < monitorListData.length; i++) {
// Only starts importing the monitor if the import option is "overwrite", "keep" or "skip" but the notification doesn't exists
2021-09-11 21:53:17 +02:00
if ((importHandle == "skip" && monitorNameListString.includes(monitorListData[i].name) == false) || importHandle == "keep" || importHandle == "overwrite") {
// Define in here every new variable for monitors which where implemented after the first version of the Import/Export function (1.6.0)
// --- Start ---
// Define default values
let retryInterval = 0;
/*
Only replace the default value with the backup file data for the specific version, where it appears the first time
More information about that where "let version" will be defined
*/
if (version17x) {
retryInterval = monitorListData[i].retryInterval;
}
// --- End ---
2021-09-11 21:53:17 +02:00
let monitor = {
// Define the new variable from earlier here
2021-09-11 21:53:17 +02:00
name: monitorListData[i].name,
type: monitorListData[i].type,
url: monitorListData[i].url,
method: monitorListData[i].method || "GET",
body: monitorListData[i].body,
headers: monitorListData[i].headers,
basic_auth_user: monitorListData[i].basic_auth_user,
basic_auth_pass: monitorListData[i].basic_auth_pass,
2021-09-11 21:53:17 +02:00
interval: monitorListData[i].interval,
retryInterval: retryInterval,
2021-09-11 21:53:17 +02:00
hostname: monitorListData[i].hostname,
maxretries: monitorListData[i].maxretries,
port: monitorListData[i].port,
keyword: monitorListData[i].keyword,
ignoreTls: monitorListData[i].ignoreTls,
upsideDown: monitorListData[i].upsideDown,
maxredirects: monitorListData[i].maxredirects,
accepted_statuscodes: monitorListData[i].accepted_statuscodes,
dns_resolve_type: monitorListData[i].dns_resolve_type,
dns_resolve_server: monitorListData[i].dns_resolve_server,
notificationIDList: {},
proxy_id: monitorListData[i].proxy_id || null,
};
2021-09-11 21:53:17 +02:00
2021-10-09 11:45:05 +02:00
if (monitorListData[i].pushToken) {
monitor.pushToken = monitorListData[i].pushToken;
}
let bean = R.dispense("monitor");
2021-09-11 21:53:17 +02:00
let notificationIDList = monitor.notificationIDList;
delete monitor.notificationIDList;
monitor.accepted_statuscodes_json = JSON.stringify(monitor.accepted_statuscodes);
delete monitor.accepted_statuscodes;
bean.import(monitor);
bean.user_id = socket.userID;
await R.store(bean);
2021-09-11 21:53:17 +02:00
// Only for backup files with the version 1.7.0 or higher, since there was the tag feature implemented
if (version17x) {
// Only import if the specific monitor has tags assigned
for (const oldTag of monitorListData[i].tags) {
// Check if tag already exists and get data ->
let tag = await R.findOne("tag", " name = ?", [
oldTag.name,
]);
let tagId;
if (! tag) {
// -> If it doesn't exist, create new tag from backup file
let beanTag = R.dispense("tag");
beanTag.name = oldTag.name;
beanTag.color = oldTag.color;
await R.store(beanTag);
tagId = beanTag.id;
} else {
// -> If it already exist, set tagId to value from database
tagId = tag.id;
}
// Assign the new created tag to the monitor
await R.exec("INSERT INTO monitor_tag (tag_id, monitor_id, value) VALUES (?, ?, ?)", [
tagId,
bean.id,
oldTag.value,
]);
}
}
await updateMonitorNotification(bean.id, notificationIDList);
2021-09-11 21:53:17 +02:00
// If monitor was active start it immediately, otherwise pause it
2021-09-11 21:53:17 +02:00
if (monitorListData[i].active == 1) {
await startMonitor(socket.userID, bean.id);
} else {
await pauseMonitor(socket.userID, bean.id);
}
2021-09-01 17:09:32 +02:00
}
2021-09-01 17:09:32 +02:00
}
await sendNotificationList(socket);
2022-04-07 17:02:57 +02:00
await server.sendMonitorList(socket);
2021-09-01 17:09:32 +02:00
}
callback({
ok: true,
msg: "Backup successfully restored.",
});
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
socket.on("clearEvents", async (monitorID, callback) => {
try {
checkLogin(socket);
2021-11-15 18:52:28 +02:00
log_info("manage", `Clear Events Monitor: ${monitorID} User ID: ${socket.userID}`);
await R.exec("UPDATE heartbeat SET msg = ?, important = ? WHERE monitor_id = ? ", [
"",
"0",
monitorID,
]);
await sendImportantHeartbeatList(socket, monitorID, true, true);
callback({
ok: true,
});
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
socket.on("clearHeartbeats", async (monitorID, callback) => {
try {
checkLogin(socket);
2021-11-15 18:52:28 +02:00
log_info("manage", `Clear Heartbeats Monitor: ${monitorID} User ID: ${socket.userID}`);
await R.exec("DELETE FROM heartbeat WHERE monitor_id = ?", [
monitorID
]);
await sendHeartbeatList(socket, monitorID, true, true);
callback({
ok: true,
2021-09-01 00:36:24 +02:00
});
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
socket.on("clearStatistics", async (callback) => {
try {
checkLogin(socket);
2021-09-01 00:36:24 +02:00
2021-11-15 18:52:28 +02:00
log_info("manage", `Clear Statistics User ID: ${socket.userID}`);
2021-09-01 00:36:24 +02:00
await R.exec("DELETE FROM heartbeat");
callback({
ok: true,
});
} catch (e) {
callback({
ok: false,
msg: e.message,
});
}
});
2021-09-16 16:48:28 +02:00
// Status Page Socket Handler for admin only
statusPageSocketHandler(socket);
2022-03-29 08:48:02 +02:00
cloudflaredSocketHandler(socket);
databaseSocketHandler(socket);
proxySocketHandler(socket);
2021-09-16 16:48:28 +02:00
2021-11-15 18:52:28 +02:00
log_debug("server", "added all socket handlers");
2021-08-03 19:03:40 +02:00
2021-08-04 07:31:17 +02:00
// ***************************
// Better do anything after added all socket handlers here
// ***************************
2021-11-15 18:52:28 +02:00
log_debug("auth", "check auto login");
2021-08-03 19:03:40 +02:00
if (await setting("disableAuth")) {
2021-11-15 18:52:28 +02:00
log_info("auth", "Disabled Auth: auto login to admin");
afterLogin(socket, await R.findOne("user"));
socket.emit("autoLogin");
2021-08-03 19:03:40 +02:00
} else {
2021-11-15 18:52:28 +02:00
log_debug("auth", "need auth");
2021-08-03 19:03:40 +02:00
}
2021-06-25 15:55:49 +02:00
});
2021-11-15 18:52:28 +02:00
log_info("server", "Init the server");
2021-08-10 15:28:54 +02:00
2022-04-07 16:53:32 +02:00
httpServer.once("error", async (err) => {
2021-08-10 15:28:54 +02:00
console.error("Cannot listen: " + err.message);
await shutdownFunction();
2021-08-10 15:28:54 +02:00
});
2021-08-10 10:36:21 +02:00
2022-04-07 16:53:32 +02:00
httpServer.listen(port, hostname, () => {
2021-08-10 10:36:21 +02:00
if (hostname) {
2021-11-15 18:52:28 +02:00
log_info("server", `Listening on ${hostname}:${port}`);
2021-08-10 10:36:21 +02:00
} else {
2021-11-15 18:52:28 +02:00
log_info("server", `Listening on ${port}`);
2021-08-10 10:36:21 +02:00
}
2021-06-25 15:55:49 +02:00
startMonitors();
2021-08-21 13:50:22 +02:00
checkVersion.startInterval();
if (testMode) {
startUnitTest();
}
2021-06-25 15:55:49 +02:00
});
initBackgroundJobs(args);
2022-03-30 05:59:49 +02:00
// Start cloudflared at the end if configured
await cloudflaredAutoStart(cloudflaredToken);
2022-03-30 05:59:49 +02:00
2021-06-25 15:55:49 +02:00
})();
async function updateMonitorNotification(monitorID, notificationIDList) {
2021-08-10 15:37:51 +02:00
await R.exec("DELETE FROM monitor_notification WHERE monitor_id = ? ", [
2021-07-27 19:47:13 +02:00
monitorID,
]);
for (let notificationID in notificationIDList) {
if (notificationIDList[notificationID]) {
let relation = R.dispense("monitor_notification");
relation.monitor_id = monitorID;
relation.notification_id = notificationID;
await R.store(relation);
}
}
}
2021-06-25 15:55:49 +02:00
async function checkOwner(userID, monitorID) {
let row = await R.getRow("SELECT id FROM monitor WHERE id = ? AND user_id = ? ", [
monitorID,
userID,
]);
2021-06-25 15:55:49 +02:00
if (! row) {
throw new Error("You do not own this monitor.");
}
}
async function afterLogin(socket, user) {
socket.userID = user.id;
socket.join(user.id);
2021-06-29 10:06:20 +02:00
2022-04-07 17:02:57 +02:00
let monitorList = await server.sendMonitorList(socket);
sendNotificationList(socket);
sendProxyList(socket);
2021-08-08 19:58:56 +02:00
2021-08-23 12:52:55 +02:00
await sleep(500);
2022-03-21 09:28:59 +02:00
await StatusPage.sendStatusPageList(io, socket);
2021-08-23 12:52:55 +02:00
for (let monitorID in monitorList) {
await sendHeartbeatList(socket, monitorID);
}
for (let monitorID in monitorList) {
await sendImportantHeartbeatList(socket, monitorID);
}
for (let monitorID in monitorList) {
await Monitor.sendStats(io, monitorID, user.id);
2021-08-23 12:52:55 +02:00
}
2021-06-25 15:55:49 +02:00
}
async function getMonitorJSONList(userID) {
2021-06-27 10:10:55 +02:00
let result = {};
2021-06-25 15:55:49 +02:00
2021-08-23 12:52:55 +02:00
let monitorList = await R.find("monitor", " user_id = ? ORDER BY weight DESC, name", [
2021-07-27 19:47:13 +02:00
userID,
]);
2021-06-25 15:55:49 +02:00
for (let monitor of monitorList) {
result[monitor.id] = await monitor.toJSON();
2021-06-25 15:55:49 +02:00
}
return result;
}
async function initDatabase(testMode = false) {
2021-07-21 20:02:35 +02:00
if (! fs.existsSync(Database.path)) {
2021-11-15 18:52:28 +02:00
log_info("server", "Copying Database");
2021-07-21 20:02:35 +02:00
fs.copyFileSync(Database.templatePath, Database.path);
2021-07-11 07:47:57 +02:00
}
2021-11-15 18:52:28 +02:00
log_info("server", "Connecting to the Database");
await Database.connect(testMode);
2021-11-15 18:52:28 +02:00
log_info("server", "Connected");
2021-07-18 12:51:58 +02:00
2021-07-21 20:02:35 +02:00
// Patch the database
await Database.patch();
2021-07-21 20:02:35 +02:00
2021-06-25 15:55:49 +02:00
let jwtSecretBean = await R.findOne("setting", " `key` = ? ", [
2021-07-27 19:47:13 +02:00
"jwtSecret",
2021-06-25 15:55:49 +02:00
]);
if (! jwtSecretBean) {
2021-11-15 18:52:28 +02:00
log_info("server", "JWT secret is not found, generate one.");
2021-08-09 14:09:01 +02:00
jwtSecretBean = await initJWTSecret();
2021-11-15 18:52:28 +02:00
log_info("server", "Stored JWT secret into database");
2021-06-25 15:55:49 +02:00
} else {
2021-11-15 18:52:28 +02:00
log_info("server", "Load JWT secret from database.");
2021-06-25 15:55:49 +02:00
}
2021-07-21 20:02:35 +02:00
// If there is no record in user table, it is a new Uptime Kuma instance, need to setup
2021-07-11 07:47:57 +02:00
if ((await R.count("user")) === 0) {
2021-11-15 18:52:28 +02:00
log_info("server", "No user, need setup");
2021-07-11 07:47:57 +02:00
needSetup = true;
}
2021-06-25 15:55:49 +02:00
jwtSecret = jwtSecretBean.value;
}
async function startMonitor(userID, monitorID) {
await checkOwner(userID, monitorID);
2021-06-25 15:55:49 +02:00
2021-11-15 18:52:28 +02:00
log_info("manage", `Resume Monitor: ${monitorID} User ID: ${userID}`);
2021-06-25 15:55:49 +02:00
await R.exec("UPDATE monitor SET active = 1 WHERE id = ? AND user_id = ? ", [
monitorID,
2021-07-27 19:47:13 +02:00
userID,
2021-06-25 15:55:49 +02:00
]);
let monitor = await R.findOne("monitor", " id = ? ", [
2021-07-27 19:47:13 +02:00
monitorID,
]);
2021-06-25 15:55:49 +02:00
2022-04-07 16:53:32 +02:00
if (monitor.id in server.monitorList) {
server.monitorList[monitor.id].stop();
2021-06-27 10:10:55 +02:00
}
2022-04-07 16:53:32 +02:00
server.monitorList[monitor.id] = monitor;
monitor.start(io);
2021-06-25 15:55:49 +02:00
}
2021-06-27 10:10:55 +02:00
async function restartMonitor(userID, monitorID) {
return await startMonitor(userID, monitorID);
2021-06-27 10:10:55 +02:00
}
2021-06-25 15:55:49 +02:00
async function pauseMonitor(userID, monitorID) {
await checkOwner(userID, monitorID);
2021-06-25 15:55:49 +02:00
2021-11-15 18:52:28 +02:00
log_info("manage", `Pause Monitor: ${monitorID} User ID: ${userID}`);
2021-06-25 15:55:49 +02:00
await R.exec("UPDATE monitor SET active = 0 WHERE id = ? AND user_id = ? ", [
monitorID,
2021-07-27 19:47:13 +02:00
userID,
2021-06-25 15:55:49 +02:00
]);
2022-04-07 16:53:32 +02:00
if (monitorID in server.monitorList) {
server.monitorList[monitorID].stop();
2021-06-25 15:55:49 +02:00
}
}
/**
* Resume active monitors
*/
async function startMonitors() {
let list = await R.find("monitor", " active = 1 ");
2021-06-25 15:55:49 +02:00
for (let monitor of list) {
2022-04-07 16:53:32 +02:00
server.monitorList[monitor.id] = monitor;
}
for (let monitor of list) {
monitor.start(io);
// Give some delays, so all monitors won't make request at the same moment when just start the server.
await sleep(getRandomInt(300, 1000));
2021-06-25 15:55:49 +02:00
}
}
2021-07-15 19:44:51 +02:00
async function shutdownFunction(signal) {
2021-11-15 18:52:28 +02:00
log_info("server", "Shutdown requested");
log_info("server", "Called signal: " + signal);
2021-07-15 19:44:51 +02:00
2021-11-15 18:52:28 +02:00
log_info("server", "Stopping all monitors");
2022-04-07 16:53:32 +02:00
for (let id in server.monitorList) {
let monitor = server.monitorList[id];
monitor.stop();
2021-07-15 19:44:51 +02:00
}
2021-07-21 20:02:35 +02:00
await sleep(2000);
await Database.close();
stopBackgroundJobs();
await cloudflaredStop();
2021-07-15 19:44:51 +02:00
}
2021-11-11 13:31:28 +02:00
function getClientIp(socket) {
return socket.client.conn.remoteAddress.replace(/^.*:/, "")
}
2021-07-15 19:44:51 +02:00
function finalFunction() {
2021-11-15 18:52:28 +02:00
log_info("server", "Graceful shutdown successful!");
2021-07-15 19:44:51 +02:00
}
2022-04-07 16:53:32 +02:00
gracefulShutdown(httpServer, {
2021-07-27 19:47:13 +02:00
signals: "SIGINT SIGTERM",
2021-07-15 19:44:51 +02:00
timeout: 30000, // timeout: 30 secs
development: false, // not in dev mode
forceExit: true, // triggers process.exit() at the end of shutdown process
onShutdown: shutdownFunction, // shutdown function (async) - e.g. for cleanup DB, ...
2021-07-27 19:47:13 +02:00
finally: finalFunction, // finally function (sync) - e.g. for logging
2021-07-15 19:44:51 +02:00
});
2021-08-17 09:32:34 +02:00
// Catch unexpected errors here
process.addListener("unhandledRejection", (error, promise) => {
console.trace(error);
errorLog(error, false);
2021-08-17 09:32:34 +02:00
console.error("If you keep encountering errors, please report to https://github.com/louislam/uptime-kuma/issues");
});