@scrypted/server 0.79.0 → 0.81.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/http-fetch-helpers.d.ts +39 -13
- package/dist/http-fetch-helpers.js +138 -41
- package/dist/http-fetch-helpers.js.map +1 -1
- package/dist/media-helpers.js +1 -0
- package/dist/media-helpers.js.map +1 -1
- package/dist/plugin/plugin-remote-worker.js +10 -1
- package/dist/plugin/plugin-remote-worker.js.map +1 -1
- package/dist/runtime.js +4 -3
- package/dist/runtime.js.map +1 -1
- package/dist/scrypted-server-main.js +44 -44
- package/dist/scrypted-server-main.js.map +1 -1
- package/dist/services/service-control.js +2 -1
- package/dist/services/service-control.js.map +1 -1
- package/dist/services/users.d.ts +2 -0
- package/dist/services/users.js +10 -6
- package/dist/services/users.js.map +1 -1
- package/package.json +1 -1
- package/src/http-fetch-helpers.ts +190 -38
- package/src/media-helpers.ts +1 -0
- package/src/plugin/plugin-remote-worker.ts +11 -3
- package/src/runtime.ts +6 -5
- package/src/scrypted-server-main.ts +49 -50
- package/src/services/service-control.ts +3 -2
- package/src/services/users.ts +12 -6
package/src/runtime.ts
CHANGED
@@ -1,4 +1,3 @@
|
|
1
|
-
import net from 'net';
|
2
1
|
import { Device, DeviceInformation, DeviceProvider, EngineIOHandler, HttpRequest, HttpRequestHandler, ScryptedDevice, ScryptedInterface, ScryptedInterfaceMethod, ScryptedInterfaceProperty, ScryptedNativeId, ScryptedUser as SU } from '@scrypted/types';
|
3
2
|
import AdmZip from 'adm-zip';
|
4
3
|
import crypto from 'crypto';
|
@@ -9,6 +8,7 @@ import { ParamsDictionary } from 'express-serve-static-core';
|
|
9
8
|
import fs from 'fs';
|
10
9
|
import http, { ServerResponse } from 'http';
|
11
10
|
import https from 'https';
|
11
|
+
import net from 'net';
|
12
12
|
import type { spawn as ptySpawn } from 'node-pty-prebuilt-multiarch';
|
13
13
|
import path from 'path';
|
14
14
|
import { ParsedQs } from 'qs';
|
@@ -17,8 +17,10 @@ import { PassThrough } from 'stream';
|
|
17
17
|
import tar from 'tar';
|
18
18
|
import { URL } from "url";
|
19
19
|
import WebSocket, { Server as WebSocketServer } from "ws";
|
20
|
+
import { computeClusterObjectHash } from './cluster/cluster-hash';
|
21
|
+
import { ClusterObject } from './cluster/connect-rpc-object';
|
20
22
|
import { Plugin, PluginDevice, ScryptedAlert, ScryptedUser } from './db-types';
|
21
|
-
import {
|
23
|
+
import { getNpmPackageInfo, httpFetch } from './http-fetch-helpers';
|
22
24
|
import { createResponseInterface } from './http-interfaces';
|
23
25
|
import { getDisplayName, getDisplayRoom, getDisplayType, getProvidedNameOrDefault, getProvidedRoomOrDefault, getProvidedTypeOrDefault } from './infer-defaults';
|
24
26
|
import { IOServer } from './io';
|
@@ -35,7 +37,6 @@ import { getPluginVolume } from './plugin/plugin-volume';
|
|
35
37
|
import { NodeForkWorker } from './plugin/runtime/node-fork-worker';
|
36
38
|
import { PythonRuntimeWorker } from './plugin/runtime/python-worker';
|
37
39
|
import { RuntimeWorker, RuntimeWorkerOptions } from './plugin/runtime/runtime-worker';
|
38
|
-
import { ClusterObject } from './cluster/connect-rpc-object';
|
39
40
|
import { getIpAddress, SCRYPTED_INSECURE_PORT, SCRYPTED_SECURE_PORT } from './server-settings';
|
40
41
|
import { AddressSettings } from './services/addresses';
|
41
42
|
import { Alerts } from './services/alerts';
|
@@ -45,7 +46,6 @@ import { PluginComponent } from './services/plugin';
|
|
45
46
|
import { ServiceControl } from './services/service-control';
|
46
47
|
import { UsersService } from './services/users';
|
47
48
|
import { getState, ScryptedStateManager, setState } from './state';
|
48
|
-
import { computeClusterObjectHash } from './cluster/cluster-hash';
|
49
49
|
|
50
50
|
interface DeviceProxyPair {
|
51
51
|
handler: PluginDeviceProxyHandler;
|
@@ -619,7 +619,8 @@ export class ScryptedRuntime extends PluginHttp<HttpPluginData> {
|
|
619
619
|
}
|
620
620
|
console.log('installing package', pkg, version);
|
621
621
|
|
622
|
-
const { body: tarball } = await
|
622
|
+
const { body: tarball } = await httpFetch( {
|
623
|
+
url: `${registry.versions[version].dist.tarball}`,
|
623
624
|
// force ipv4 in case of busted ipv6.
|
624
625
|
family: 4,
|
625
626
|
});
|
@@ -23,7 +23,7 @@ import { getScryptedVolume } from './plugin/plugin-volume';
|
|
23
23
|
import { RPCResultError } from './rpc';
|
24
24
|
import { ScryptedRuntime } from './runtime';
|
25
25
|
import { getHostAddresses, SCRYPTED_DEBUG_PORT, SCRYPTED_INSECURE_PORT, SCRYPTED_SECURE_PORT } from './server-settings';
|
26
|
-
import { setScryptedUserPassword } from './services/users';
|
26
|
+
import { setScryptedUserPassword, UsersService } from './services/users';
|
27
27
|
import { sleep } from './sleep';
|
28
28
|
import { ONE_DAY_MILLISECONDS, UserToken } from './usertoken';
|
29
29
|
|
@@ -135,6 +135,15 @@ async function start(mainFilename: string, options?: {
|
|
135
135
|
certSetting.value = keyPair;
|
136
136
|
certSetting = await db.upsert(certSetting);
|
137
137
|
|
138
|
+
let hasLogin = await db.getCount(ScryptedUser) > 0;
|
139
|
+
if (process.env.SCRYPTED_ADMIN_USERNAME) {
|
140
|
+
let user = await db.tryGet(ScryptedUser, process.env.SCRYPTED_ADMIN_USERNAME);
|
141
|
+
if (!user) {
|
142
|
+
user = await UsersService.addUserToDatabase(db, process.env.SCRYPTED_ADMIN_USERNAME, crypto.randomBytes(8).toString('hex'), undefined);
|
143
|
+
hasLogin = true;
|
144
|
+
}
|
145
|
+
}
|
146
|
+
|
138
147
|
const basicAuth = httpAuth.basic({
|
139
148
|
realm: 'Scrypted',
|
140
149
|
}, async (username, password, callback) => {
|
@@ -187,6 +196,24 @@ async function start(mainFilename: string, options?: {
|
|
187
196
|
};
|
188
197
|
}
|
189
198
|
|
199
|
+
const getDefaultAuthentication = (req: Request) => {
|
200
|
+
const defaultAuthentication = !req.query.disableDefaultAuthentication && process.env.SCRYPTED_DEFAULT_AUTHENTICATION;
|
201
|
+
if (defaultAuthentication) {
|
202
|
+
const referer = req.headers.referer;
|
203
|
+
if (referer) {
|
204
|
+
try {
|
205
|
+
const u = new URL(referer);
|
206
|
+
if (u.searchParams.has('disableDefaultAuthentication'))
|
207
|
+
return;
|
208
|
+
}
|
209
|
+
catch (e) {
|
210
|
+
// no/invalid referer, allow the default auth
|
211
|
+
}
|
212
|
+
}
|
213
|
+
return scrypted.usersService.users.get(defaultAuthentication);
|
214
|
+
}
|
215
|
+
}
|
216
|
+
|
190
217
|
app.use(async (req, res, next) => {
|
191
218
|
const defaultAuthentication = getDefaultAuthentication(req);
|
192
219
|
if (defaultAuthentication) {
|
@@ -308,27 +335,6 @@ async function start(mainFilename: string, options?: {
|
|
308
335
|
await options?.onRuntimeCreated?.(scrypted);
|
309
336
|
await scrypted.start();
|
310
337
|
|
311
|
-
await listenServerPort('SCRYPTED_SECURE_PORT', SCRYPTED_SECURE_PORT, secure);
|
312
|
-
await listenServerPort('SCRYPTED_INSECURE_PORT', SCRYPTED_INSECURE_PORT, insecure);
|
313
|
-
|
314
|
-
console.log('#######################################################');
|
315
|
-
console.log(`Scrypted Volume : ${volumeDir}`);
|
316
|
-
console.log(`Scrypted Server (Local) : https://localhost:${SCRYPTED_SECURE_PORT}/`);
|
317
|
-
for (const address of getHostAddresses(true, true)) {
|
318
|
-
console.log(`Scrypted Server (Remote) : https://${address}:${SCRYPTED_SECURE_PORT}/`);
|
319
|
-
}
|
320
|
-
console.log(`Version: : ${await scrypted.info.getVersion()}`);
|
321
|
-
console.log('#######################################################');
|
322
|
-
console.log('Scrypted insecure http service port:', SCRYPTED_INSECURE_PORT);
|
323
|
-
console.log('Ports can be changed with environment variables.')
|
324
|
-
console.log('https: $SCRYPTED_SECURE_PORT')
|
325
|
-
console.log('http : $SCRYPTED_INSECURE_PORT')
|
326
|
-
console.log('Certificate can be modified via tls.createSecureContext options in')
|
327
|
-
console.log('JSON file located at SCRYPTED_HTTPS_OPTIONS_FILE environment variable:');
|
328
|
-
console.log('export SCRYPTED_HTTPS_OPTIONS_FILE=/path/to/options.json');
|
329
|
-
console.log('https://nodejs.org/api/tls.html#tlscreatesecurecontextoptions')
|
330
|
-
console.log('#######################################################');
|
331
|
-
|
332
338
|
app.get(['/web/component/script/npm/:pkg', '/web/component/script/npm/@:owner/:pkg'], async (req, res) => {
|
333
339
|
const { owner, pkg } = req.params;
|
334
340
|
let endpoint = pkg;
|
@@ -460,16 +466,6 @@ async function start(mainFilename: string, options?: {
|
|
460
466
|
}
|
461
467
|
});
|
462
468
|
|
463
|
-
let hasLogin = await db.getCount(ScryptedUser) > 0;
|
464
|
-
|
465
|
-
if (process.env.SCRYPTED_ADMIN_USERNAME) {
|
466
|
-
let user = await db.tryGet(ScryptedUser, process.env.SCRYPTED_ADMIN_USERNAME);
|
467
|
-
if (!user) {
|
468
|
-
user = await scrypted.usersService.addUserInternal(process.env.SCRYPTED_ADMIN_USERNAME, crypto.randomBytes(8).toString('hex'), undefined);
|
469
|
-
hasLogin = true;
|
470
|
-
}
|
471
|
-
}
|
472
|
-
|
473
469
|
app.options('/login', (req, res) => {
|
474
470
|
res.setHeader('Access-Control-Allow-Methods', 'GET, POST, OPTIONS');
|
475
471
|
res.setHeader('Access-Control-Allow-Headers', 'Content-Type, Authorization, Content-Length, X-Requested-With');
|
@@ -583,24 +579,6 @@ async function start(mainFilename: string, options?: {
|
|
583
579
|
}
|
584
580
|
}
|
585
581
|
|
586
|
-
const getDefaultAuthentication = (req: Request) => {
|
587
|
-
const defaultAuthentication = !req.query.disableDefaultAuthentication && process.env.SCRYPTED_DEFAULT_AUTHENTICATION;
|
588
|
-
if (defaultAuthentication) {
|
589
|
-
const referer = req.headers.referer;
|
590
|
-
if (referer) {
|
591
|
-
try {
|
592
|
-
const u = new URL(referer);
|
593
|
-
if (u.searchParams.has('disableDefaultAuthentication'))
|
594
|
-
return;
|
595
|
-
}
|
596
|
-
catch (e) {
|
597
|
-
// no/invalid referer, allow the default auth
|
598
|
-
}
|
599
|
-
}
|
600
|
-
return scrypted.usersService.users.get(defaultAuthentication);
|
601
|
-
}
|
602
|
-
}
|
603
|
-
|
604
582
|
app.get('/login', async (req, res) => {
|
605
583
|
await checkResetLogin();
|
606
584
|
|
@@ -695,6 +673,27 @@ async function start(mainFilename: string, options?: {
|
|
695
673
|
|
696
674
|
app.get('/', (_req, res) => res.redirect('./endpoint/@scrypted/core/public/'));
|
697
675
|
|
676
|
+
await listenServerPort('SCRYPTED_SECURE_PORT', SCRYPTED_SECURE_PORT, secure);
|
677
|
+
await listenServerPort('SCRYPTED_INSECURE_PORT', SCRYPTED_INSECURE_PORT, insecure);
|
678
|
+
|
679
|
+
console.log('#######################################################');
|
680
|
+
console.log(`Scrypted Volume : ${volumeDir}`);
|
681
|
+
console.log(`Scrypted Server (Local) : https://localhost:${SCRYPTED_SECURE_PORT}/`);
|
682
|
+
for (const address of getHostAddresses(true, true)) {
|
683
|
+
console.log(`Scrypted Server (Remote) : https://${address}:${SCRYPTED_SECURE_PORT}/`);
|
684
|
+
}
|
685
|
+
console.log(`Version: : ${await scrypted.info.getVersion()}`);
|
686
|
+
console.log('#######################################################');
|
687
|
+
console.log('Scrypted insecure http service port:', SCRYPTED_INSECURE_PORT);
|
688
|
+
console.log('Ports can be changed with environment variables.')
|
689
|
+
console.log('https: $SCRYPTED_SECURE_PORT')
|
690
|
+
console.log('http : $SCRYPTED_INSECURE_PORT')
|
691
|
+
console.log('Certificate can be modified via tls.createSecureContext options in')
|
692
|
+
console.log('JSON file located at SCRYPTED_HTTPS_OPTIONS_FILE environment variable:');
|
693
|
+
console.log('export SCRYPTED_HTTPS_OPTIONS_FILE=/path/to/options.json');
|
694
|
+
console.log('https://nodejs.org/api/tls.html#tlscreatesecurecontextoptions')
|
695
|
+
console.log('#######################################################');
|
696
|
+
|
698
697
|
return scrypted;
|
699
698
|
}
|
700
699
|
|
@@ -1,5 +1,5 @@
|
|
1
1
|
import fs from 'fs';
|
2
|
-
import {
|
2
|
+
import { httpFetch } from "../http-fetch-helpers";
|
3
3
|
import { ScryptedRuntime } from "../runtime";
|
4
4
|
|
5
5
|
export class ServiceControl {
|
@@ -23,7 +23,8 @@ export class ServiceControl {
|
|
23
23
|
const webhookUpdate = process.env.SCRYPTED_WEBHOOK_UPDATE;
|
24
24
|
if (webhookUpdate) {
|
25
25
|
const webhookUpdateAuthorization = process.env.SCRYPTED_WEBHOOK_UPDATE_AUTHORIZATION;
|
26
|
-
await
|
26
|
+
await httpFetch({
|
27
|
+
url: webhookUpdate,
|
27
28
|
headers: {
|
28
29
|
Authorization: webhookUpdateAuthorization,
|
29
30
|
}
|
package/src/services/users.ts
CHANGED
@@ -1,4 +1,5 @@
|
|
1
1
|
import { ScryptedUser } from "../db-types";
|
2
|
+
import WrappedLevel from "../level";
|
2
3
|
import { ScryptedRuntime } from "../runtime";
|
3
4
|
import crypto from 'crypto';
|
4
5
|
|
@@ -6,6 +7,16 @@ export class UsersService {
|
|
6
7
|
users = new Map<string, ScryptedUser>();
|
7
8
|
usersPromise: Promise<ScryptedUser[]>;
|
8
9
|
|
10
|
+
static async addUserToDatabase(db: WrappedLevel, username: string, password: string, aclId: string) {
|
11
|
+
const user = new ScryptedUser();
|
12
|
+
user._id = username;
|
13
|
+
user.aclId = aclId;
|
14
|
+
user.token = crypto.randomBytes(16).toString('hex');
|
15
|
+
setScryptedUserPassword(user, password, Date.now());
|
16
|
+
await db.upsert(user);
|
17
|
+
return user;
|
18
|
+
}
|
19
|
+
|
9
20
|
constructor(public scrypted: ScryptedRuntime) {
|
10
21
|
}
|
11
22
|
|
@@ -55,12 +66,7 @@ export class UsersService {
|
|
55
66
|
async addUserInternal(username: string, password: string, aclId: string) {
|
56
67
|
await this.ensureUsersPromise();
|
57
68
|
|
58
|
-
const user =
|
59
|
-
user._id = username;
|
60
|
-
user.aclId = aclId;
|
61
|
-
user.token = crypto.randomBytes(16).toString('hex');
|
62
|
-
setScryptedUserPassword(user, password, Date.now());
|
63
|
-
await this.scrypted.datastore.upsert(user);
|
69
|
+
const user = await UsersService.addUserToDatabase(this.scrypted.datastore, username, password, aclId);
|
64
70
|
this.users.set(username, user);
|
65
71
|
this.updateUsersPromise();
|
66
72
|
|