import express from "express"; import net from "net"; import cors from "cors"; import cookieParser from "cookie-parser"; import { Client, type ConnectConfig } from "ssh2"; import { getDb } from "../database/db/index.js"; import { sshData, sshCredentials } from "../database/db/schema.js"; import { eq, and } from "drizzle-orm"; import { statsLogger } from "../utils/logger.js"; import { SimpleDBOps } from "../utils/simple-db-ops.js"; import { AuthManager } from "../utils/auth-manager.js"; import type { AuthenticatedRequest } from "../../types/index.js"; interface PooledConnection { client: Client; lastUsed: number; inUse: boolean; hostKey: string; } class SSHConnectionPool { private connections = new Map(); private maxConnectionsPerHost = 3; private connectionTimeout = 30000; private cleanupInterval: NodeJS.Timeout; constructor() { this.cleanupInterval = setInterval( () => { this.cleanup(); }, 5 * 60 * 1000, ); } private getHostKey(host: SSHHostWithCredentials): string { return `${host.ip}:${host.port}:${host.username}`; } async getConnection(host: SSHHostWithCredentials): Promise { const hostKey = this.getHostKey(host); const connections = this.connections.get(hostKey) || []; const available = connections.find((conn) => !conn.inUse); if (available) { available.inUse = true; available.lastUsed = Date.now(); return available.client; } if (connections.length < this.maxConnectionsPerHost) { const client = await this.createConnection(host); const pooled: PooledConnection = { client, lastUsed: Date.now(), inUse: true, hostKey, }; connections.push(pooled); this.connections.set(hostKey, connections); return client; } return new Promise((resolve) => { const checkAvailable = () => { const available = connections.find((conn) => !conn.inUse); if (available) { available.inUse = true; available.lastUsed = Date.now(); resolve(available.client); } else { setTimeout(checkAvailable, 100); } }; checkAvailable(); }); } private async createConnection( host: SSHHostWithCredentials, ): Promise { return new Promise((resolve, reject) => { const client = new Client(); const timeout = setTimeout(() => { client.end(); reject(new Error("SSH connection timeout")); }, this.connectionTimeout); client.on("ready", () => { clearTimeout(timeout); resolve(client); }); client.on("error", (err) => { clearTimeout(timeout); reject(err); }); client.on( "keyboard-interactive", ( name: string, instructions: string, instructionsLang: string, prompts: Array<{ prompt: string; echo: boolean }>, finish: (responses: string[]) => void, ) => { const totpPrompt = prompts.find((p) => /verification code|verification_code|token|otp|2fa|authenticator|google.*auth/i.test( p.prompt, ), ); if (totpPrompt) { // Record TOTP failure as permanent - never retry // The recordFailure method will log this once authFailureTracker.recordFailure(host.id, "TOTP", true); client.end(); reject( new Error( "TOTP authentication required but not supported in Server Stats", ), ); } else if (host.password) { const responses = prompts.map(() => host.password || ""); finish(responses); } else { finish(prompts.map(() => "")); } }, ); try { client.connect(buildSshConfig(host)); } catch (err) { clearTimeout(timeout); reject(err); } }); } releaseConnection(host: SSHHostWithCredentials, client: Client): void { const hostKey = this.getHostKey(host); const connections = this.connections.get(hostKey) || []; const pooled = connections.find((conn) => conn.client === client); if (pooled) { pooled.inUse = false; pooled.lastUsed = Date.now(); } } private cleanup(): void { const now = Date.now(); const maxAge = 10 * 60 * 1000; for (const [hostKey, connections] of this.connections.entries()) { const activeConnections = connections.filter((conn) => { if (!conn.inUse && now - conn.lastUsed > maxAge) { try { conn.client.end(); } catch { // Ignore errors when closing stale connections } return false; } return true; }); if (activeConnections.length === 0) { this.connections.delete(hostKey); } else { this.connections.set(hostKey, activeConnections); } } } destroy(): void { clearInterval(this.cleanupInterval); for (const connections of this.connections.values()) { for (const conn of connections) { try { conn.client.end(); } catch { // Ignore errors when closing connections during cleanup } } } this.connections.clear(); } } class RequestQueue { private queues = new Map Promise>>(); private processing = new Set(); async queueRequest(hostId: number, request: () => Promise): Promise { return new Promise((resolve, reject) => { const queue = this.queues.get(hostId) || []; queue.push(async () => { try { const result = await request(); resolve(result); } catch (error) { reject(error); } }); this.queues.set(hostId, queue); this.processQueue(hostId); }); } private async processQueue(hostId: number): Promise { if (this.processing.has(hostId)) return; this.processing.add(hostId); const queue = this.queues.get(hostId) || []; while (queue.length > 0) { const request = queue.shift(); if (request) { try { await request(); } catch { // Ignore errors from queued requests } } } this.processing.delete(hostId); if (queue.length > 0) { this.processQueue(hostId); } } } interface CachedMetrics { data: unknown; timestamp: number; hostId: number; } class MetricsCache { private cache = new Map(); private ttl = 30000; get(hostId: number): unknown | null { const cached = this.cache.get(hostId); if (cached && Date.now() - cached.timestamp < this.ttl) { return cached.data; } return null; } set(hostId: number, data: unknown): void { this.cache.set(hostId, { data, timestamp: Date.now(), hostId, }); } clear(hostId?: number): void { if (hostId) { this.cache.delete(hostId); } else { this.cache.clear(); } } } interface AuthFailureRecord { count: number; lastFailure: number; reason: "TOTP" | "AUTH" | "TIMEOUT"; permanent: boolean; // If true, don't retry at all } class AuthFailureTracker { private failures = new Map(); private maxRetries = 3; private backoffBase = 60000; // 1 minute base backoff recordFailure( hostId: number, reason: "TOTP" | "AUTH" | "TIMEOUT", permanent = false, ): void { const existing = this.failures.get(hostId); if (existing) { existing.count++; existing.lastFailure = Date.now(); existing.reason = reason; if (permanent) existing.permanent = true; } else { this.failures.set(hostId, { count: 1, lastFailure: Date.now(), reason, permanent, }); } } shouldSkip(hostId: number): boolean { const record = this.failures.get(hostId); if (!record) return false; // Always skip TOTP hosts if (record.reason === "TOTP" || record.permanent) { return true; } // Skip if we've exceeded max retries if (record.count >= this.maxRetries) { return true; } // Calculate exponential backoff const backoffTime = this.backoffBase * Math.pow(2, record.count - 1); const timeSinceFailure = Date.now() - record.lastFailure; return timeSinceFailure < backoffTime; } getSkipReason(hostId: number): string | null { const record = this.failures.get(hostId); if (!record) return null; if (record.reason === "TOTP") { return "TOTP authentication required (metrics unavailable)"; } if (record.permanent) { return "Authentication permanently failed"; } if (record.count >= this.maxRetries) { return `Too many authentication failures (${record.count} attempts)`; } const backoffTime = this.backoffBase * Math.pow(2, record.count - 1); const timeSinceFailure = Date.now() - record.lastFailure; const remainingTime = Math.ceil((backoffTime - timeSinceFailure) / 1000); if (timeSinceFailure < backoffTime) { return `Retry in ${remainingTime}s (attempt ${record.count}/${this.maxRetries})`; } return null; } reset(hostId: number): void { this.failures.delete(hostId); // Don't log reset - it's not important } cleanup(): void { // Clean up old failures (older than 1 hour) const maxAge = 60 * 60 * 1000; const now = Date.now(); for (const [hostId, record] of this.failures.entries()) { if (!record.permanent && now - record.lastFailure > maxAge) { this.failures.delete(hostId); } } } } const connectionPool = new SSHConnectionPool(); const requestQueue = new RequestQueue(); const metricsCache = new MetricsCache(); const authFailureTracker = new AuthFailureTracker(); const authManager = AuthManager.getInstance(); type HostStatus = "online" | "offline"; interface SSHHostWithCredentials { id: number; name: string; ip: string; port: number; username: string; folder: string; tags: string[]; pin: boolean; authType: string; password?: string; key?: string; keyPassword?: string; keyType?: string; credentialId?: number; enableTerminal: boolean; enableTunnel: boolean; enableFileManager: boolean; defaultPath: string; tunnelConnections: unknown[]; statsConfig?: string; createdAt: string; updatedAt: string; userId: string; } type StatusEntry = { status: HostStatus; lastChecked: string; }; function validateHostId( req: express.Request, res: express.Response, next: express.NextFunction, ) { const id = Number(req.params.id); if (!id || !Number.isInteger(id) || id <= 0) { return res.status(400).json({ error: "Invalid host ID" }); } next(); } const app = express(); app.use( cors({ origin: (origin, callback) => { if (!origin) return callback(null, true); const allowedOrigins = [ "http://localhost:5173", "http://localhost:3000", "http://127.0.0.1:5173", "http://127.0.0.1:3000", ]; if (origin.startsWith("https://")) { return callback(null, true); } if (origin.startsWith("http://")) { return callback(null, true); } if (allowedOrigins.includes(origin)) { return callback(null, true); } callback(new Error("Not allowed by CORS")); }, credentials: true, methods: ["GET", "POST", "PUT", "PATCH", "DELETE", "OPTIONS"], allowedHeaders: [ "Content-Type", "Authorization", "User-Agent", "X-Electron-App", ], }), ); app.use(cookieParser()); app.use(express.json({ limit: "1mb" })); app.use(authManager.createAuthMiddleware()); const hostStatuses: Map = new Map(); async function fetchAllHosts( userId: string, ): Promise { try { const hosts = await SimpleDBOps.select( getDb().select().from(sshData).where(eq(sshData.userId, userId)), "ssh_data", userId, ); const hostsWithCredentials: SSHHostWithCredentials[] = []; for (const host of hosts) { try { const hostWithCreds = await resolveHostCredentials(host, userId); if (hostWithCreds) { hostsWithCredentials.push(hostWithCreds); } } catch (err) { statsLogger.warn( `Failed to resolve credentials for host ${host.id}: ${err instanceof Error ? err.message : "Unknown error"}`, ); } } return hostsWithCredentials.filter((h) => !!h.id && !!h.ip && !!h.port); } catch (err) { statsLogger.error("Failed to fetch hosts from database", err); return []; } } async function fetchHostById( id: number, userId: string, ): Promise { try { if (!SimpleDBOps.isUserDataUnlocked(userId)) { statsLogger.debug("User data locked - cannot fetch host", { operation: "fetchHostById_data_locked", userId, hostId: id, }); return undefined; } const hosts = await SimpleDBOps.select( getDb() .select() .from(sshData) .where(and(eq(sshData.id, id), eq(sshData.userId, userId))), "ssh_data", userId, ); if (hosts.length === 0) { return undefined; } const host = hosts[0]; return await resolveHostCredentials(host, userId); } catch (err) { statsLogger.error(`Failed to fetch host ${id}`, err); return undefined; } } async function resolveHostCredentials( host: Record, userId: string, ): Promise { try { const baseHost: Record = { id: host.id, name: host.name, ip: host.ip, port: host.port, username: host.username, folder: host.folder || "", tags: typeof host.tags === "string" ? host.tags ? host.tags.split(",").filter(Boolean) : [] : [], pin: !!host.pin, authType: host.authType, enableTerminal: !!host.enableTerminal, enableTunnel: !!host.enableTunnel, enableFileManager: !!host.enableFileManager, defaultPath: host.defaultPath || "/", tunnelConnections: host.tunnelConnections ? JSON.parse(host.tunnelConnections as string) : [], statsConfig: host.statsConfig || undefined, createdAt: host.createdAt, updatedAt: host.updatedAt, userId: host.userId, }; if (host.credentialId) { try { const credentials = await SimpleDBOps.select( getDb() .select() .from(sshCredentials) .where( and( eq(sshCredentials.id, host.credentialId as number), eq(sshCredentials.userId, userId), ), ), "ssh_credentials", userId, ); if (credentials.length > 0) { const credential = credentials[0]; baseHost.credentialId = credential.id; baseHost.username = credential.username; baseHost.authType = credential.auth_type || credential.authType; if (credential.password) { baseHost.password = credential.password; } if (credential.key) { baseHost.key = credential.key; } if (credential.key_password || credential.keyPassword) { baseHost.keyPassword = credential.key_password || credential.keyPassword; } if (credential.key_type || credential.keyType) { baseHost.keyType = credential.key_type || credential.keyType; } } else { addLegacyCredentials(baseHost, host); } } catch (error) { statsLogger.warn( `Failed to resolve credential ${host.credentialId} for host ${host.id}: ${error instanceof Error ? error.message : "Unknown error"}`, ); addLegacyCredentials(baseHost, host); } } else { addLegacyCredentials(baseHost, host); } return baseHost as unknown as SSHHostWithCredentials; } catch (error) { statsLogger.error( `Failed to resolve host credentials for host ${host.id}: ${error instanceof Error ? error.message : "Unknown error"}`, ); return undefined; } } function addLegacyCredentials( baseHost: Record, host: Record, ): void { baseHost.password = host.password || null; baseHost.key = host.key || null; baseHost.keyPassword = host.key_password || host.keyPassword || null; baseHost.keyType = host.keyType; } function buildSshConfig(host: SSHHostWithCredentials): ConnectConfig { const base: ConnectConfig = { host: host.ip, port: host.port || 22, username: host.username || "root", tryKeyboard: true, readyTimeout: 10_000, algorithms: { kex: [ "diffie-hellman-group14-sha256", "diffie-hellman-group14-sha1", "diffie-hellman-group1-sha1", "diffie-hellman-group-exchange-sha256", "diffie-hellman-group-exchange-sha1", "ecdh-sha2-nistp256", "ecdh-sha2-nistp384", "ecdh-sha2-nistp521", ], cipher: [ "aes128-ctr", "aes192-ctr", "aes256-ctr", "aes128-gcm@openssh.com", "aes256-gcm@openssh.com", "aes128-cbc", "aes192-cbc", "aes256-cbc", "3des-cbc", ], hmac: [ "hmac-sha2-256-etm@openssh.com", "hmac-sha2-512-etm@openssh.com", "hmac-sha2-256", "hmac-sha2-512", "hmac-sha1", "hmac-md5", ], compress: ["none", "zlib@openssh.com", "zlib"], }, } as ConnectConfig; if (host.authType === "password") { if (!host.password) { throw new Error(`No password available for host ${host.ip}`); } base.password = host.password; } else if (host.authType === "key") { if (!host.key) { throw new Error(`No SSH key available for host ${host.ip}`); } try { if (!host.key.includes("-----BEGIN") || !host.key.includes("-----END")) { throw new Error("Invalid private key format"); } const cleanKey = host.key .trim() .replace(/\r\n/g, "\n") .replace(/\r/g, "\n"); (base as Record).privateKey = Buffer.from( cleanKey, "utf8", ); if (host.keyPassword) { (base as Record).passphrase = host.keyPassword; } } catch (keyError) { statsLogger.error( `SSH key format error for host ${host.ip}: ${keyError instanceof Error ? keyError.message : "Unknown error"}`, ); throw new Error(`Invalid SSH key format for host ${host.ip}`); } } else { throw new Error( `Unsupported authentication type '${host.authType}' for host ${host.ip}`, ); } return base; } async function withSshConnection( host: SSHHostWithCredentials, fn: (client: Client) => Promise, ): Promise { const client = await connectionPool.getConnection(host); try { const result = await fn(client); return result; } finally { connectionPool.releaseConnection(host, client); } } function execCommand( client: Client, command: string, ): Promise<{ stdout: string; stderr: string; code: number | null; }> { return new Promise((resolve, reject) => { client.exec(command, { pty: false }, (err, stream) => { if (err) return reject(err); let stdout = ""; let stderr = ""; let exitCode: number | null = null; stream .on("close", (code: number | undefined) => { exitCode = typeof code === "number" ? code : null; resolve({ stdout, stderr, code: exitCode }); }) .on("data", (data: Buffer) => { stdout += data.toString("utf8"); }) .stderr.on("data", (data: Buffer) => { stderr += data.toString("utf8"); }); }); }); } function parseCpuLine( cpuLine: string, ): { total: number; idle: number } | undefined { const parts = cpuLine.trim().split(/\s+/); if (parts[0] !== "cpu") return undefined; const nums = parts .slice(1) .map((n) => Number(n)) .filter((n) => Number.isFinite(n)); if (nums.length < 4) return undefined; const idle = (nums[3] ?? 0) + (nums[4] ?? 0); const total = nums.reduce((a, b) => a + b, 0); return { total, idle }; } function toFixedNum(n: number | null | undefined, digits = 2): number | null { if (typeof n !== "number" || !Number.isFinite(n)) return null; return Number(n.toFixed(digits)); } function kibToGiB(kib: number): number { return kib / (1024 * 1024); } async function collectMetrics(host: SSHHostWithCredentials): Promise<{ cpu: { percent: number | null; cores: number | null; load: [number, number, number] | null; }; memory: { percent: number | null; usedGiB: number | null; totalGiB: number | null; }; disk: { percent: number | null; usedHuman: string | null; totalHuman: string | null; availableHuman: string | null; }; network: { interfaces: Array<{ name: string; ip: string; state: string; rxBytes: string | null; txBytes: string | null; }>; }; uptime: { seconds: number | null; formatted: string | null; }; processes: { total: number | null; running: number | null; top: Array<{ pid: string; user: string; cpu: string; mem: string; command: string; }>; }; system: { hostname: string | null; kernel: string | null; os: string | null; }; }> { // Check if we should skip this host due to auth failures if (authFailureTracker.shouldSkip(host.id)) { const reason = authFailureTracker.getSkipReason(host.id); // Don't log - just skip silently to avoid spam throw new Error(reason || "Authentication failed"); } const cached = metricsCache.get(host.id); if (cached) { return cached as ReturnType extends Promise ? T : never; } return requestQueue.queueRequest(host.id, async () => { try { return await withSshConnection(host, async (client) => { let cpuPercent: number | null = null; let cores: number | null = null; let loadTriplet: [number, number, number] | null = null; try { const [stat1, loadAvgOut, coresOut] = await Promise.all([ execCommand(client, "cat /proc/stat"), execCommand(client, "cat /proc/loadavg"), execCommand( client, "nproc 2>/dev/null || grep -c ^processor /proc/cpuinfo", ), ]); await new Promise((r) => setTimeout(r, 500)); const stat2 = await execCommand(client, "cat /proc/stat"); const cpuLine1 = ( stat1.stdout.split("\n").find((l) => l.startsWith("cpu ")) || "" ).trim(); const cpuLine2 = ( stat2.stdout.split("\n").find((l) => l.startsWith("cpu ")) || "" ).trim(); const a = parseCpuLine(cpuLine1); const b = parseCpuLine(cpuLine2); if (a && b) { const totalDiff = b.total - a.total; const idleDiff = b.idle - a.idle; const used = totalDiff - idleDiff; if (totalDiff > 0) cpuPercent = Math.max(0, Math.min(100, (used / totalDiff) * 100)); } const laParts = loadAvgOut.stdout.trim().split(/\s+/); if (laParts.length >= 3) { loadTriplet = [ Number(laParts[0]), Number(laParts[1]), Number(laParts[2]), ].map((v) => (Number.isFinite(v) ? Number(v) : 0)) as [ number, number, number, ]; } const coresNum = Number((coresOut.stdout || "").trim()); cores = Number.isFinite(coresNum) && coresNum > 0 ? coresNum : null; } catch (e) { statsLogger.warn( `Failed to collect CPU metrics for host ${host.id}`, e, ); cpuPercent = null; cores = null; loadTriplet = null; } let memPercent: number | null = null; let usedGiB: number | null = null; let totalGiB: number | null = null; try { const memInfo = await execCommand(client, "cat /proc/meminfo"); const lines = memInfo.stdout.split("\n"); const getVal = (key: string) => { const line = lines.find((l) => l.startsWith(key)); if (!line) return null; const m = line.match(/\d+/); return m ? Number(m[0]) : null; }; const totalKb = getVal("MemTotal:"); const availKb = getVal("MemAvailable:"); if (totalKb && availKb && totalKb > 0) { const usedKb = totalKb - availKb; memPercent = Math.max(0, Math.min(100, (usedKb / totalKb) * 100)); usedGiB = kibToGiB(usedKb); totalGiB = kibToGiB(totalKb); } } catch (e) { statsLogger.warn( `Failed to collect memory metrics for host ${host.id}`, e, ); memPercent = null; usedGiB = null; totalGiB = null; } let diskPercent: number | null = null; let usedHuman: string | null = null; let totalHuman: string | null = null; let availableHuman: string | null = null; try { const [diskOutHuman, diskOutBytes] = await Promise.all([ execCommand(client, "df -h -P / | tail -n +2"), execCommand(client, "df -B1 -P / | tail -n +2"), ]); const humanLine = diskOutHuman.stdout .split("\n") .map((l) => l.trim()) .filter(Boolean)[0] || ""; const bytesLine = diskOutBytes.stdout .split("\n") .map((l) => l.trim()) .filter(Boolean)[0] || ""; const humanParts = humanLine.split(/\s+/); const bytesParts = bytesLine.split(/\s+/); if (humanParts.length >= 6 && bytesParts.length >= 6) { totalHuman = humanParts[1] || null; usedHuman = humanParts[2] || null; availableHuman = humanParts[3] || null; const totalBytes = Number(bytesParts[1]); const usedBytes = Number(bytesParts[2]); if ( Number.isFinite(totalBytes) && Number.isFinite(usedBytes) && totalBytes > 0 ) { diskPercent = Math.max( 0, Math.min(100, (usedBytes / totalBytes) * 100), ); } } } catch (e) { statsLogger.warn( `Failed to collect disk metrics for host ${host.id}`, e, ); diskPercent = null; usedHuman = null; totalHuman = null; availableHuman = null; } // Collect network interfaces const interfaces: Array<{ name: string; ip: string; state: string; rxBytes: string | null; txBytes: string | null; }> = []; try { const ifconfigOut = await execCommand( client, "ip -o addr show | awk '{print $2,$4}' | grep -v '^lo'", ); const netStatOut = await execCommand( client, "ip -o link show | awk '{print $2,$9}' | sed 's/:$//'", ); const addrs = ifconfigOut.stdout .split("\n") .map((l) => l.trim()) .filter(Boolean); const states = netStatOut.stdout .split("\n") .map((l) => l.trim()) .filter(Boolean); const ifMap = new Map(); for (const line of addrs) { const parts = line.split(/\s+/); if (parts.length >= 2) { const name = parts[0]; const ip = parts[1].split("/")[0]; if (!ifMap.has(name)) ifMap.set(name, { ip, state: "UNKNOWN" }); } } for (const line of states) { const parts = line.split(/\s+/); if (parts.length >= 2) { const name = parts[0]; const state = parts[1]; const existing = ifMap.get(name); if (existing) { existing.state = state; } } } for (const [name, data] of ifMap.entries()) { interfaces.push({ name, ip: data.ip, state: data.state, rxBytes: null, txBytes: null, }); } } catch (e) { statsLogger.warn( `Failed to collect network metrics for host ${host.id}`, e, ); } // Collect uptime let uptimeSeconds: number | null = null; let uptimeFormatted: string | null = null; try { const uptimeOut = await execCommand(client, "cat /proc/uptime"); const uptimeParts = uptimeOut.stdout.trim().split(/\s+/); if (uptimeParts.length >= 1) { uptimeSeconds = Number(uptimeParts[0]); if (Number.isFinite(uptimeSeconds)) { const days = Math.floor(uptimeSeconds / 86400); const hours = Math.floor((uptimeSeconds % 86400) / 3600); const minutes = Math.floor((uptimeSeconds % 3600) / 60); uptimeFormatted = `${days}d ${hours}h ${minutes}m`; } } } catch (e) { statsLogger.warn(`Failed to collect uptime for host ${host.id}`, e); } // Collect process information let totalProcesses: number | null = null; let runningProcesses: number | null = null; const topProcesses: Array<{ pid: string; user: string; cpu: string; mem: string; command: string; }> = []; try { const psOut = await execCommand( client, "ps aux --sort=-%cpu | head -n 11", ); const psLines = psOut.stdout .split("\n") .map((l) => l.trim()) .filter(Boolean); if (psLines.length > 1) { for (let i = 1; i < Math.min(psLines.length, 11); i++) { const parts = psLines[i].split(/\s+/); if (parts.length >= 11) { topProcesses.push({ pid: parts[1], user: parts[0], cpu: parts[2], mem: parts[3], command: parts.slice(10).join(" ").substring(0, 50), }); } } } const procCount = await execCommand(client, "ps aux | wc -l"); const runningCount = await execCommand( client, "ps aux | grep -c ' R '", ); totalProcesses = Number(procCount.stdout.trim()) - 1; runningProcesses = Number(runningCount.stdout.trim()); } catch (e) { statsLogger.warn( `Failed to collect process info for host ${host.id}`, e, ); } // Collect system information let hostname: string | null = null; let kernel: string | null = null; let os: string | null = null; try { const hostnameOut = await execCommand(client, "hostname"); const kernelOut = await execCommand(client, "uname -r"); const osOut = await execCommand( client, "cat /etc/os-release | grep '^PRETTY_NAME=' | cut -d'\"' -f2", ); hostname = hostnameOut.stdout.trim() || null; kernel = kernelOut.stdout.trim() || null; os = osOut.stdout.trim() || null; } catch (e) { statsLogger.warn( `Failed to collect system info for host ${host.id}`, e, ); } const result = { cpu: { percent: toFixedNum(cpuPercent, 0), cores, load: loadTriplet }, memory: { percent: toFixedNum(memPercent, 0), usedGiB: usedGiB ? toFixedNum(usedGiB, 2) : null, totalGiB: totalGiB ? toFixedNum(totalGiB, 2) : null, }, disk: { percent: toFixedNum(diskPercent, 0), usedHuman, totalHuman, availableHuman, }, network: { interfaces, }, uptime: { seconds: uptimeSeconds, formatted: uptimeFormatted, }, processes: { total: totalProcesses, running: runningProcesses, top: topProcesses, }, system: { hostname, kernel, os, }, }; metricsCache.set(host.id, result); return result; }); } catch (error) { // Record authentication failures for backoff if (error instanceof Error) { if (error.message.includes("TOTP authentication required")) { // TOTP failures are already recorded in keyboard-interactive handler throw error; } else if ( error.message.includes("No password available") || error.message.includes("Unsupported authentication type") || error.message.includes("No SSH key available") ) { // Configuration errors - permanent failures, don't retry // recordFailure will log once when first detected authFailureTracker.recordFailure(host.id, "AUTH", true); } else if ( error.message.includes("authentication") || error.message.includes("Permission denied") || error.message.includes("All configured authentication methods failed") ) { // recordFailure will log once when first detected authFailureTracker.recordFailure(host.id, "AUTH"); } else if ( error.message.includes("timeout") || error.message.includes("ETIMEDOUT") ) { authFailureTracker.recordFailure(host.id, "TIMEOUT"); } } throw error; } }); } function tcpPing( host: string, port: number, timeoutMs = 5000, ): Promise { return new Promise((resolve) => { const socket = new net.Socket(); let settled = false; const onDone = (result: boolean) => { if (settled) return; settled = true; try { socket.destroy(); } catch { // Ignore errors when destroying socket } resolve(result); }; socket.setTimeout(timeoutMs); socket.once("connect", () => onDone(true)); socket.once("timeout", () => onDone(false)); socket.once("error", () => onDone(false)); socket.connect(port, host); }); } async function pollStatusesOnce(userId?: string): Promise { if (!userId) { statsLogger.warn("Skipping status poll - no authenticated user", { operation: "status_poll", }); return; } const hosts = await fetchAllHosts(userId); if (hosts.length === 0) { statsLogger.warn("No hosts retrieved for status polling", { operation: "status_poll", userId, }); return; } const checks = hosts.map(async (h) => { const isOnline = await tcpPing(h.ip, h.port, 5000); const now = new Date().toISOString(); const statusEntry: StatusEntry = { status: isOnline ? "online" : "offline", lastChecked: now, }; hostStatuses.set(h.id, statusEntry); return isOnline; }); const results = await Promise.allSettled(checks); const onlineCount = results.filter( (r) => r.status === "fulfilled" && r.value === true, ).length; const offlineCount = hosts.length - onlineCount; statsLogger.success("Status polling completed", { operation: "status_poll", totalHosts: hosts.length, onlineCount, offlineCount, }); } app.get("/status", async (req, res) => { const userId = (req as AuthenticatedRequest).userId; if (!SimpleDBOps.isUserDataUnlocked(userId)) { return res.status(401).json({ error: "Session expired - please log in again", code: "SESSION_EXPIRED", }); } if (hostStatuses.size === 0) { await pollStatusesOnce(userId); } const result: Record = {}; for (const [id, entry] of hostStatuses.entries()) { result[id] = entry; } res.json(result); }); app.get("/status/:id", validateHostId, async (req, res) => { const id = Number(req.params.id); const userId = (req as AuthenticatedRequest).userId; if (!SimpleDBOps.isUserDataUnlocked(userId)) { return res.status(401).json({ error: "Session expired - please log in again", code: "SESSION_EXPIRED", }); } try { const host = await fetchHostById(id, userId); if (!host) { return res.status(404).json({ error: "Host not found" }); } const isOnline = await tcpPing(host.ip, host.port, 5000); const now = new Date().toISOString(); const statusEntry: StatusEntry = { status: isOnline ? "online" : "offline", lastChecked: now, }; hostStatuses.set(id, statusEntry); res.json(statusEntry); } catch (err) { statsLogger.error("Failed to check host status", err); res.status(500).json({ error: "Failed to check host status" }); } }); app.post("/refresh", async (req, res) => { const userId = (req as AuthenticatedRequest).userId; if (!SimpleDBOps.isUserDataUnlocked(userId)) { return res.status(401).json({ error: "Session expired - please log in again", code: "SESSION_EXPIRED", }); } await pollStatusesOnce(userId); res.json({ message: "Refreshed" }); }); app.get("/metrics/:id", validateHostId, async (req, res) => { const id = Number(req.params.id); const userId = (req as AuthenticatedRequest).userId; if (!SimpleDBOps.isUserDataUnlocked(userId)) { return res.status(401).json({ error: "Session expired - please log in again", code: "SESSION_EXPIRED", }); } try { const host = await fetchHostById(id, userId); if (!host) { return res.status(404).json({ error: "Host not found" }); } const isOnline = await tcpPing(host.ip, host.port, 5000); if (!isOnline) { return res.status(503).json({ error: "Host is offline", cpu: { percent: null, cores: null, load: null }, memory: { percent: null, usedGiB: null, totalGiB: null }, disk: { percent: null, usedHuman: null, totalHuman: null, availableHuman: null, }, network: { interfaces: [] }, uptime: { seconds: null, formatted: null }, processes: { total: null, running: null, top: [] }, system: { hostname: null, kernel: null, os: null }, lastChecked: new Date().toISOString(), }); } const metrics = await collectMetrics(host); res.json({ ...metrics, lastChecked: new Date().toISOString() }); } catch (err) { const errorMessage = err instanceof Error ? err.message : "Unknown error"; // Check if this is a skip due to auth failure tracking if ( errorMessage.includes("TOTP authentication required") || errorMessage.includes("metrics unavailable") ) { // Don't log as error - this is expected for TOTP hosts return res.status(403).json({ error: "TOTP_REQUIRED", message: errorMessage, cpu: { percent: null, cores: null, load: null }, memory: { percent: null, usedGiB: null, totalGiB: null }, disk: { percent: null, usedHuman: null, totalHuman: null, availableHuman: null, }, network: { interfaces: [] }, uptime: { seconds: null, formatted: null }, processes: { total: null, running: null, top: [] }, system: { hostname: null, kernel: null, os: null }, lastChecked: new Date().toISOString(), }); } // Check if this is a skip due to too many failures or config issues if ( errorMessage.includes("Too many authentication failures") || errorMessage.includes("Retry in") || errorMessage.includes("Invalid configuration") || errorMessage.includes("Authentication failed") ) { // Don't log - return error silently to avoid spam return res.status(429).json({ error: "UNAVAILABLE", message: errorMessage, cpu: { percent: null, cores: null, load: null }, memory: { percent: null, usedGiB: null, totalGiB: null }, disk: { percent: null, usedHuman: null, totalHuman: null, availableHuman: null, }, network: { interfaces: [] }, uptime: { seconds: null, formatted: null }, processes: { total: null, running: null, top: [] }, system: { hostname: null, kernel: null, os: null }, lastChecked: new Date().toISOString(), }); } // Only log unexpected errors if ( !errorMessage.includes("timeout") && !errorMessage.includes("offline") && !errorMessage.includes("permanently") && !errorMessage.includes("none") && !errorMessage.includes("No password") ) { statsLogger.error("Failed to collect metrics", err); } if (err instanceof Error && err.message.includes("timeout")) { return res.status(504).json({ error: "Metrics collection timeout", cpu: { percent: null, cores: null, load: null }, memory: { percent: null, usedGiB: null, totalGiB: null }, disk: { percent: null, usedHuman: null, totalHuman: null, availableHuman: null, }, network: { interfaces: [] }, uptime: { seconds: null, formatted: null }, processes: { total: null, running: null, top: [] }, system: { hostname: null, kernel: null, os: null }, lastChecked: new Date().toISOString(), }); } return res.status(500).json({ error: "Failed to collect metrics", cpu: { percent: null, cores: null, load: null }, memory: { percent: null, usedGiB: null, totalGiB: null }, disk: { percent: null, usedHuman: null, totalHuman: null, availableHuman: null, }, network: { interfaces: [] }, uptime: { seconds: null, formatted: null }, processes: { total: null, running: null, top: [] }, system: { hostname: null, kernel: null, os: null }, lastChecked: new Date().toISOString(), }); } }); process.on("SIGINT", () => { connectionPool.destroy(); process.exit(0); }); process.on("SIGTERM", () => { connectionPool.destroy(); process.exit(0); }); const PORT = 30005; app.listen(PORT, async () => { try { await authManager.initialize(); } catch (err) { statsLogger.error("Failed to initialize AuthManager", err, { operation: "auth_init_error", }); } // Cleanup old auth failures every 10 minutes setInterval( () => { authFailureTracker.cleanup(); }, 10 * 60 * 1000, ); });