Beginning a real-time web project, like building your own home dashboard, can be a tedious and time-consuming process. Coding lots of boilerplate for authentication, authorization and data communication isn’t fun at all. By the time you get to building the thing you wanted you got bored and moved on to the next. Mission Control aims to provide all those features out-of-the-box so you can get to creating what matters right away.
- Real-time state sync between server and client (service-based API)
- Plugin API for creating your own services
- Role-based permission API
- Built-in User Management
- HTTP & WebSocket Transports
- Usecases:
- Home Automation UIs / dashboards
- Analytics dashboard combining different data sources
- Available plugins for:
- HomeKit light control
- Spotify player
- YouTube downloader (youtube-dl integration)
- Filebrowser
- etc.
- Kinda pretty UI (at least I like it... you decide or build your own!)
Note: 2.0.0 is currently in pre-release but more stable than 0.x.x versions.
$ npm install -g @capevace/mission-control@next
You can now start the server like you would any binary.
$ mission-control --version
v2.0.0-rc8
Usage: mission-control [options]
Options:
-V, --version output the version number
-u, --url <url> the url mission control is reachable at
-p, --port <port> the port to use for mission control
-h, --help display help for command
A config file for mission-control will be created at $HOME_DIR/.mission-control/config
. This can also be used to configure mission-control. However, options passed as command line arguments override settings in this file.
- Completely redesigned dashboard UI
- Introduction of a flexible plugin system
- Authentication is now handled by Mission Control itself, single-sign-on is no longer required
- Users now have profiles, which will be integrated with a solid permission system
- Tons of bug fixes
- Rewrote logging system
- Added COVID widget to dashboard
- Fixed bahn algorithm skipping not displaying trains with SEV present
- Fixed dashboard layout now being loaded from database correctly
- New Dashboard is now customizeable
- Fixes error preventing the auth proxy from returning properly
- Fixes some minor security issues with dependencies
- The SSO server is now being proxied by default. This can be disabled with the
--no-proxy
option or by disabling it in the config file. - Instead of localhost, the default url is now the local ip
On Linux, running an http server on port 80 requires root priviliges. Generally this isn't a problem as you can simply sudo mission-control -p 80
which works, but this approach falls apart when using systemd.
I found this workaround which seems to be the safest option to use instead:
sudo apt-get install libcap2-bin
sudo setcap 'cap_net_bind_service=+ep' /usr/bin/node # Replace path to node binary
public-ip
kept at 4.0.4 until we move to ESMinternal-ip
kept at 6.1.0 until we move to ESMauto-bind
kept at 4.0.0 until we move to ESMon-change
kept at 3.0.2 until we move to ESMpassport
kept at 0.4 until we're sure, JWT-based caddy login still works
Packages by internal plugins
db-hafas
: bahninternal-ip
andpublic-ip
: system-info@oznu/hap-client
: homebridge
Lukas Mateffy – @Capevace – mateffy.me
Distributed under the MIT license. See LICENSE
for more information.
- Fork it (https://github.com/capevace/mission-control/fork)
- Create your feature branch (
git checkout -b feature/fooBar
) - Commit your changes (
git commit -am 'Add some fooBar'
) - Push to the branch (
git push origin feature/fooBar
) - Create a new Pull Request