@scrypted/server 0.79.0 → 0.81.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/src/runtime.ts CHANGED
@@ -1,4 +1,3 @@
1
- import net from 'net';
2
1
  import { Device, DeviceInformation, DeviceProvider, EngineIOHandler, HttpRequest, HttpRequestHandler, ScryptedDevice, ScryptedInterface, ScryptedInterfaceMethod, ScryptedInterfaceProperty, ScryptedNativeId, ScryptedUser as SU } from '@scrypted/types';
3
2
  import AdmZip from 'adm-zip';
4
3
  import crypto from 'crypto';
@@ -9,6 +8,7 @@ import { ParamsDictionary } from 'express-serve-static-core';
9
8
  import fs from 'fs';
10
9
  import http, { ServerResponse } from 'http';
11
10
  import https from 'https';
11
+ import net from 'net';
12
12
  import type { spawn as ptySpawn } from 'node-pty-prebuilt-multiarch';
13
13
  import path from 'path';
14
14
  import { ParsedQs } from 'qs';
@@ -17,8 +17,10 @@ import { PassThrough } from 'stream';
17
17
  import tar from 'tar';
18
18
  import { URL } from "url";
19
19
  import WebSocket, { Server as WebSocketServer } from "ws";
20
+ import { computeClusterObjectHash } from './cluster/cluster-hash';
21
+ import { ClusterObject } from './cluster/connect-rpc-object';
20
22
  import { Plugin, PluginDevice, ScryptedAlert, ScryptedUser } from './db-types';
21
- import { fetchBuffer, getNpmPackageInfo } from './http-fetch-helpers';
23
+ import { getNpmPackageInfo, httpFetch } from './http-fetch-helpers';
22
24
  import { createResponseInterface } from './http-interfaces';
23
25
  import { getDisplayName, getDisplayRoom, getDisplayType, getProvidedNameOrDefault, getProvidedRoomOrDefault, getProvidedTypeOrDefault } from './infer-defaults';
24
26
  import { IOServer } from './io';
@@ -35,7 +37,6 @@ import { getPluginVolume } from './plugin/plugin-volume';
35
37
  import { NodeForkWorker } from './plugin/runtime/node-fork-worker';
36
38
  import { PythonRuntimeWorker } from './plugin/runtime/python-worker';
37
39
  import { RuntimeWorker, RuntimeWorkerOptions } from './plugin/runtime/runtime-worker';
38
- import { ClusterObject } from './cluster/connect-rpc-object';
39
40
  import { getIpAddress, SCRYPTED_INSECURE_PORT, SCRYPTED_SECURE_PORT } from './server-settings';
40
41
  import { AddressSettings } from './services/addresses';
41
42
  import { Alerts } from './services/alerts';
@@ -45,7 +46,6 @@ import { PluginComponent } from './services/plugin';
45
46
  import { ServiceControl } from './services/service-control';
46
47
  import { UsersService } from './services/users';
47
48
  import { getState, ScryptedStateManager, setState } from './state';
48
- import { computeClusterObjectHash } from './cluster/cluster-hash';
49
49
 
50
50
  interface DeviceProxyPair {
51
51
  handler: PluginDeviceProxyHandler;
@@ -619,7 +619,8 @@ export class ScryptedRuntime extends PluginHttp<HttpPluginData> {
619
619
  }
620
620
  console.log('installing package', pkg, version);
621
621
 
622
- const { body: tarball } = await fetchBuffer(`${registry.versions[version].dist.tarball}`, {
622
+ const { body: tarball } = await httpFetch( {
623
+ url: `${registry.versions[version].dist.tarball}`,
623
624
  // force ipv4 in case of busted ipv6.
624
625
  family: 4,
625
626
  });
@@ -23,7 +23,7 @@ import { getScryptedVolume } from './plugin/plugin-volume';
23
23
  import { RPCResultError } from './rpc';
24
24
  import { ScryptedRuntime } from './runtime';
25
25
  import { getHostAddresses, SCRYPTED_DEBUG_PORT, SCRYPTED_INSECURE_PORT, SCRYPTED_SECURE_PORT } from './server-settings';
26
- import { setScryptedUserPassword } from './services/users';
26
+ import { setScryptedUserPassword, UsersService } from './services/users';
27
27
  import { sleep } from './sleep';
28
28
  import { ONE_DAY_MILLISECONDS, UserToken } from './usertoken';
29
29
 
@@ -135,6 +135,15 @@ async function start(mainFilename: string, options?: {
135
135
  certSetting.value = keyPair;
136
136
  certSetting = await db.upsert(certSetting);
137
137
 
138
+ let hasLogin = await db.getCount(ScryptedUser) > 0;
139
+ if (process.env.SCRYPTED_ADMIN_USERNAME) {
140
+ let user = await db.tryGet(ScryptedUser, process.env.SCRYPTED_ADMIN_USERNAME);
141
+ if (!user) {
142
+ user = await UsersService.addUserToDatabase(db, process.env.SCRYPTED_ADMIN_USERNAME, crypto.randomBytes(8).toString('hex'), undefined);
143
+ hasLogin = true;
144
+ }
145
+ }
146
+
138
147
  const basicAuth = httpAuth.basic({
139
148
  realm: 'Scrypted',
140
149
  }, async (username, password, callback) => {
@@ -187,6 +196,24 @@ async function start(mainFilename: string, options?: {
187
196
  };
188
197
  }
189
198
 
199
+ const getDefaultAuthentication = (req: Request) => {
200
+ const defaultAuthentication = !req.query.disableDefaultAuthentication && process.env.SCRYPTED_DEFAULT_AUTHENTICATION;
201
+ if (defaultAuthentication) {
202
+ const referer = req.headers.referer;
203
+ if (referer) {
204
+ try {
205
+ const u = new URL(referer);
206
+ if (u.searchParams.has('disableDefaultAuthentication'))
207
+ return;
208
+ }
209
+ catch (e) {
210
+ // no/invalid referer, allow the default auth
211
+ }
212
+ }
213
+ return scrypted.usersService.users.get(defaultAuthentication);
214
+ }
215
+ }
216
+
190
217
  app.use(async (req, res, next) => {
191
218
  const defaultAuthentication = getDefaultAuthentication(req);
192
219
  if (defaultAuthentication) {
@@ -308,27 +335,6 @@ async function start(mainFilename: string, options?: {
308
335
  await options?.onRuntimeCreated?.(scrypted);
309
336
  await scrypted.start();
310
337
 
311
- await listenServerPort('SCRYPTED_SECURE_PORT', SCRYPTED_SECURE_PORT, secure);
312
- await listenServerPort('SCRYPTED_INSECURE_PORT', SCRYPTED_INSECURE_PORT, insecure);
313
-
314
- console.log('#######################################################');
315
- console.log(`Scrypted Volume : ${volumeDir}`);
316
- console.log(`Scrypted Server (Local) : https://localhost:${SCRYPTED_SECURE_PORT}/`);
317
- for (const address of getHostAddresses(true, true)) {
318
- console.log(`Scrypted Server (Remote) : https://${address}:${SCRYPTED_SECURE_PORT}/`);
319
- }
320
- console.log(`Version: : ${await scrypted.info.getVersion()}`);
321
- console.log('#######################################################');
322
- console.log('Scrypted insecure http service port:', SCRYPTED_INSECURE_PORT);
323
- console.log('Ports can be changed with environment variables.')
324
- console.log('https: $SCRYPTED_SECURE_PORT')
325
- console.log('http : $SCRYPTED_INSECURE_PORT')
326
- console.log('Certificate can be modified via tls.createSecureContext options in')
327
- console.log('JSON file located at SCRYPTED_HTTPS_OPTIONS_FILE environment variable:');
328
- console.log('export SCRYPTED_HTTPS_OPTIONS_FILE=/path/to/options.json');
329
- console.log('https://nodejs.org/api/tls.html#tlscreatesecurecontextoptions')
330
- console.log('#######################################################');
331
-
332
338
  app.get(['/web/component/script/npm/:pkg', '/web/component/script/npm/@:owner/:pkg'], async (req, res) => {
333
339
  const { owner, pkg } = req.params;
334
340
  let endpoint = pkg;
@@ -460,16 +466,6 @@ async function start(mainFilename: string, options?: {
460
466
  }
461
467
  });
462
468
 
463
- let hasLogin = await db.getCount(ScryptedUser) > 0;
464
-
465
- if (process.env.SCRYPTED_ADMIN_USERNAME) {
466
- let user = await db.tryGet(ScryptedUser, process.env.SCRYPTED_ADMIN_USERNAME);
467
- if (!user) {
468
- user = await scrypted.usersService.addUserInternal(process.env.SCRYPTED_ADMIN_USERNAME, crypto.randomBytes(8).toString('hex'), undefined);
469
- hasLogin = true;
470
- }
471
- }
472
-
473
469
  app.options('/login', (req, res) => {
474
470
  res.setHeader('Access-Control-Allow-Methods', 'GET, POST, OPTIONS');
475
471
  res.setHeader('Access-Control-Allow-Headers', 'Content-Type, Authorization, Content-Length, X-Requested-With');
@@ -583,24 +579,6 @@ async function start(mainFilename: string, options?: {
583
579
  }
584
580
  }
585
581
 
586
- const getDefaultAuthentication = (req: Request) => {
587
- const defaultAuthentication = !req.query.disableDefaultAuthentication && process.env.SCRYPTED_DEFAULT_AUTHENTICATION;
588
- if (defaultAuthentication) {
589
- const referer = req.headers.referer;
590
- if (referer) {
591
- try {
592
- const u = new URL(referer);
593
- if (u.searchParams.has('disableDefaultAuthentication'))
594
- return;
595
- }
596
- catch (e) {
597
- // no/invalid referer, allow the default auth
598
- }
599
- }
600
- return scrypted.usersService.users.get(defaultAuthentication);
601
- }
602
- }
603
-
604
582
  app.get('/login', async (req, res) => {
605
583
  await checkResetLogin();
606
584
 
@@ -695,6 +673,27 @@ async function start(mainFilename: string, options?: {
695
673
 
696
674
  app.get('/', (_req, res) => res.redirect('./endpoint/@scrypted/core/public/'));
697
675
 
676
+ await listenServerPort('SCRYPTED_SECURE_PORT', SCRYPTED_SECURE_PORT, secure);
677
+ await listenServerPort('SCRYPTED_INSECURE_PORT', SCRYPTED_INSECURE_PORT, insecure);
678
+
679
+ console.log('#######################################################');
680
+ console.log(`Scrypted Volume : ${volumeDir}`);
681
+ console.log(`Scrypted Server (Local) : https://localhost:${SCRYPTED_SECURE_PORT}/`);
682
+ for (const address of getHostAddresses(true, true)) {
683
+ console.log(`Scrypted Server (Remote) : https://${address}:${SCRYPTED_SECURE_PORT}/`);
684
+ }
685
+ console.log(`Version: : ${await scrypted.info.getVersion()}`);
686
+ console.log('#######################################################');
687
+ console.log('Scrypted insecure http service port:', SCRYPTED_INSECURE_PORT);
688
+ console.log('Ports can be changed with environment variables.')
689
+ console.log('https: $SCRYPTED_SECURE_PORT')
690
+ console.log('http : $SCRYPTED_INSECURE_PORT')
691
+ console.log('Certificate can be modified via tls.createSecureContext options in')
692
+ console.log('JSON file located at SCRYPTED_HTTPS_OPTIONS_FILE environment variable:');
693
+ console.log('export SCRYPTED_HTTPS_OPTIONS_FILE=/path/to/options.json');
694
+ console.log('https://nodejs.org/api/tls.html#tlscreatesecurecontextoptions')
695
+ console.log('#######################################################');
696
+
698
697
  return scrypted;
699
698
  }
700
699
 
@@ -1,5 +1,5 @@
1
1
  import fs from 'fs';
2
- import { fetchJSON } from "../http-fetch-helpers";
2
+ import { httpFetch } from "../http-fetch-helpers";
3
3
  import { ScryptedRuntime } from "../runtime";
4
4
 
5
5
  export class ServiceControl {
@@ -23,7 +23,8 @@ export class ServiceControl {
23
23
  const webhookUpdate = process.env.SCRYPTED_WEBHOOK_UPDATE;
24
24
  if (webhookUpdate) {
25
25
  const webhookUpdateAuthorization = process.env.SCRYPTED_WEBHOOK_UPDATE_AUTHORIZATION;
26
- await fetchJSON(webhookUpdate, {
26
+ await httpFetch({
27
+ url: webhookUpdate,
27
28
  headers: {
28
29
  Authorization: webhookUpdateAuthorization,
29
30
  }
@@ -1,4 +1,5 @@
1
1
  import { ScryptedUser } from "../db-types";
2
+ import WrappedLevel from "../level";
2
3
  import { ScryptedRuntime } from "../runtime";
3
4
  import crypto from 'crypto';
4
5
 
@@ -6,6 +7,16 @@ export class UsersService {
6
7
  users = new Map<string, ScryptedUser>();
7
8
  usersPromise: Promise<ScryptedUser[]>;
8
9
 
10
+ static async addUserToDatabase(db: WrappedLevel, username: string, password: string, aclId: string) {
11
+ const user = new ScryptedUser();
12
+ user._id = username;
13
+ user.aclId = aclId;
14
+ user.token = crypto.randomBytes(16).toString('hex');
15
+ setScryptedUserPassword(user, password, Date.now());
16
+ await db.upsert(user);
17
+ return user;
18
+ }
19
+
9
20
  constructor(public scrypted: ScryptedRuntime) {
10
21
  }
11
22
 
@@ -55,12 +66,7 @@ export class UsersService {
55
66
  async addUserInternal(username: string, password: string, aclId: string) {
56
67
  await this.ensureUsersPromise();
57
68
 
58
- const user = new ScryptedUser();
59
- user._id = username;
60
- user.aclId = aclId;
61
- user.token = crypto.randomBytes(16).toString('hex');
62
- setScryptedUserPassword(user, password, Date.now());
63
- await this.scrypted.datastore.upsert(user);
69
+ const user = await UsersService.addUserToDatabase(this.scrypted.datastore, username, password, aclId);
64
70
  this.users.set(username, user);
65
71
  this.updateUsersPromise();
66
72