@lamalibre/portlama-panel-server
v0.1.26
Published
Portlama management panel backend
Readme
@lamalibre/portlama-panel-server
Fastify 5 REST API backend for the Portlama management panel. This is a private package internal to the Portlama monorepo and is not published to npm.
What It Does
The panel server runs at 127.0.0.1:9292, proxied by nginx with mTLS client
certificate authentication. It operates in two modes:
- Onboarding (first visit) — domain setup, DNS verification, and full stack provisioning (Chisel, Authelia, nginx vhosts, certbot).
- Management (after onboarding) — tunnel CRUD, Authelia user management, certificate lifecycle, service control, and live system stats.
All inputs are validated with Zod at the route level. Shell commands are executed
via execa. Business logic lives in src/lib/; route handlers deal only with HTTP.
Dependencies
fastify, @fastify/cors, @fastify/static, @fastify/websocket, @fastify/multipart, fastify-plugin, bcryptjs, execa, js-yaml, zod, systeminformation.
Development
# From the monorepo root
npm run dev -w packages/panel-serverThe dev script starts the server with --watch and pipes output through
pino-pretty. Configuration is read from the path set in the CONFIG_FILE
environment variable (defaults to /etc/portlama/panel.json).
Set NODE_ENV=development to skip the mTLS client certificate check during
local development.
Further Reading
See the main repository for architecture details, route maps, and the full development plan: https://github.com/lamalibre/portlama
Disclaimer
This software is provided "as is", without warranty of any kind, express or implied. The authors and contributors accept no liability for any damages, data loss, security incidents, or legal consequences arising from the use of this software.
Portlama is designed for self-hosted use cases — personal projects, development environments, demos, and internal tools. It is not a substitute for production infrastructure. Production workloads require dedicated hosting, load balancing, redundancy, monitoring, and operational expertise that are beyond the scope of this project.
You are solely responsible for what you expose through Portlama. By tunneling an application to the public internet, you grant anyone with access the ability to interact with that application as if they were on your local network. This carries inherent risks:
- Arbitrary code execution: If the tunneled application contains vulnerabilities or backdoors, remote attackers may exploit them to execute code on your machine, access your file system, or compromise your operating system.
- Data exposure: Misconfigured or insecure applications may leak sensitive data, credentials, or private files to the internet.
- Lateral movement: A compromised tunneled application may be used as an entry point to attack other devices and services on your local network.
- Resource abuse: Publicly accessible applications may be used for cryptocurrency mining, spam relaying, botnet hosting, or other abuse that could result in legal action against you.
Portlama provides authentication and access control mechanisms, but no security measure is absolute. It is your responsibility to understand the software you expose, keep it updated, and assess the risks of making it publicly accessible. The authors of Portlama bear no responsibility for the consequences of tunneling untrusted, vulnerable, or malicious software.
License
Polyform Noncommercial 1.0.0 — see LICENSE.md for details.
