Сидел на wb-2108 в связи с тем, что стоял модуль 433. Решил перелезть на current stable, так как нашёл потенциальную замену в модулях zigbee. Модуль zigbee v1.1C в /dev/ttyMOD1. Был принят следующий план -
Обновление до текущего stable для этой ревизии через fit образ.
Пункты 1 и 2 прошли как по маслу. А с пунктом 3 сразу не заладилось. Во первых развалился bridge, потому что в прошивку не положили bridge-utils. Это я решил.
Но победить незапуск zigbee2mqtt не получается. Ку 2 раза делал, приседал - не помогает.
Вот лог:
root@wirenboard-AD4ALVSH:~/zigbee2mqtt# npm start
zigbee2mqtt@1.32.2 start
node index.js
Zigbee2MQTT:info 2023-11-17 09:55:23: Logging to console and directory: ‘/mnt/data/root/zigbee2mqtt/data/log/2023-11-17.09-55-20’ filename: log.txt
Zigbee2MQTT:info 2023-11-17 09:55:23: Starting Zigbee2MQTT version 1.32.2 (commit #1ec1e572)
Zigbee2MQTT:info 2023-11-17 09:55:23: Starting zigbee-herdsman (0.17.2)
Zigbee2MQTT:error 2023-11-17 09:55:25: Error while starting zigbee-herdsman
Zigbee2MQTT:error 2023-11-17 09:55:25: Failed to start zigbee
Zigbee2MQTT:error 2023-11-17 09:55:25: Check Zigbee2MQTT fails to start | Zigbee2MQTT for possible solutions
Zigbee2MQTT:error 2023-11-17 09:55:25: Exiting…
Zigbee2MQTT:error 2023-11-17 09:55:25: TypeError: Class extends value undefined is not a constructor or null
at Object. (/mnt/data/root/zigbee2mqtt/node_modules/zigbee-herdsman/src/adapter/serialPort.ts:12:78)
at Module._compile (node:internal/modules/cjs/loader:1155:14)
at Object.Module._extensions…js (node:internal/modules/cjs/loader:1209:10)
at Module.load (node:internal/modules/cjs/loader:1033:32)
at Function.Module._load (node:internal/modules/cjs/loader:868:12)
at Module.require (node:internal/modules/cjs/loader:1057:19)
at require (node:internal/modules/cjs/helpers:103:18)
at Object. (/mnt/data/root/zigbee2mqtt/node_modules/zigbee-herdsman/src/adapter/z-stack/znp/znp.ts:9:1)
at Module._compile (node:internal/modules/cjs/loader:1155:14)
at Object.Module._extensions…js (node:internal/modules/cjs/loader:1209:10)
Прошу помощи.
browserslist 4.0.0 - 4.16.4
Severity: moderate
Regular Expression Denial of Service in browserslist - Regular Expression Denial of Service in browserslist · CVE-2021-23364 · GitHub Advisory Database · GitHub
fix available via npm audit fix
node_modules/browserslist
node_modules/zigbee-herdsman-converters/node_modules/browserslist
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/browserslist
node_modules/zigbee-herdsman/node_modules/browserslist
decode-uri-component <0.2.1
Severity: high
decode-uri-component vulnerable to Denial of Service (DoS) - decode-uri-component vulnerable to Denial of Service (DoS) · CVE-2022-38900 · GitHub Advisory Database · GitHub
fix available via npm audit fix
node_modules/decode-uri-component
node_modules/zigbee-herdsman-converters/node_modules/decode-uri-component
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/decode-uri-component
node_modules/zigbee-herdsman/node_modules/decode-uri-component
glob-parent <5.1.2
Severity: high
glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex - glob-parent vulnerable to Regular Expression Denial of Service in enclosure regex · CVE-2020-28469 · GitHub Advisory Database · GitHub
fix available via npm audit fix
node_modules/eslint/node_modules/glob-parent
node_modules/fast-glob/node_modules/glob-parent
node_modules/glob-parent
node_modules/zigbee-herdsman-converters/node_modules/glob-parent
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/chokidar/node_modules/glob-parent
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/eslint/node_modules/glob-parent
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/fast-glob/node_modules/glob-parent
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/glob-parent
node_modules/zigbee-herdsman/node_modules/chokidar/node_modules/glob-parent
node_modules/zigbee-herdsman/node_modules/eslint/node_modules/glob-parent
node_modules/zigbee-herdsman/node_modules/fast-glob/node_modules/glob-parent
node_modules/zigbee-herdsman/node_modules/glob-parent @nicolo-ribaudo/chokidar-2 <=2.1.8-no-fsevents.3
Depends on vulnerable versions of glob-parent
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/@nicolo-ribaudo/chokidar-2
node_modules/zigbee-herdsman/node_modules/@nicolo-ribaudo/chokidar-2 @babel/cli 7.12.7 - 7.23.0
Depends on vulnerable versions of @nicolo-ribaudo/chokidar-2
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/@babel/cli
node_modules/zigbee-herdsman/node_modules/@babel/cli
glob-stream 5.3.0 - 6.1.0
Depends on vulnerable versions of glob-parent
node_modules/glob-stream
help-me 1.0.0 - 1.1.0
Depends on vulnerable versions of glob-stream
node_modules/help-me
mqtt 1.14.1 - 4.2.6
Depends on vulnerable versions of help-me
node_modules/mqtt
hosted-git-info <2.8.9
Severity: moderate
Regular Expression Denial of Service in hosted-git-info - Regular Expression Denial of Service in hosted-git-info · CVE-2021-23362 · GitHub Advisory Database · GitHub
fix available via npm audit fix
node_modules/hosted-git-info
node_modules/zigbee-herdsman-converters/node_modules/hosted-git-info
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/hosted-git-info
node_modules/zigbee-herdsman/node_modules/hosted-git-info
jsdom <=16.5.3
Severity: moderate
Insufficient Granularity of Access Control in JSDom - Insufficient Granularity of Access Control in JSDom · CVE-2021-20066 · GitHub Advisory Database · GitHub
Depends on vulnerable versions of request
Depends on vulnerable versions of request-promise-native
Depends on vulnerable versions of tough-cookie
fix available via npm audit fix
node_modules/jsdom
node_modules/zigbee-herdsman-converters/node_modules/jsdom
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/jsdom
node_modules/zigbee-herdsman/node_modules/jsdom
json-schema <0.4.0
Severity: critical
json-schema is vulnerable to Prototype Pollution - json-schema is vulnerable to Prototype Pollution · CVE-2021-3918 · GitHub Advisory Database · GitHub
fix available via npm audit fix
node_modules/json-schema
node_modules/zigbee-herdsman-converters/node_modules/json-schema
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/json-schema
node_modules/zigbee-herdsman/node_modules/json-schema
jsprim 0.3.0 - 1.4.1 || 2.0.0 - 2.0.1
Depends on vulnerable versions of json-schema
node_modules/jsprim
node_modules/zigbee-herdsman-converters/node_modules/jsprim
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/jsprim
node_modules/zigbee-herdsman/node_modules/jsprim
json5 2.0.0 - 2.2.1
Severity: high
Prototype Pollution in JSON5 via Parse Method - Prototype Pollution in JSON5 via Parse Method · CVE-2022-46175 · GitHub Advisory Database · GitHub
fix available via npm audit fix
node_modules/json5
node_modules/zigbee-herdsman-converters/node_modules/json5
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/json5
node_modules/zigbee-herdsman/node_modules/json5
path-parse <1.0.7
Severity: moderate
Regular Expression Denial of Service in path-parse - Regular Expression Denial of Service in path-parse · CVE-2021-23343 · GitHub Advisory Database · GitHub
fix available via npm audit fix
node_modules/path-parse
node_modules/zigbee-herdsman-converters/node_modules/path-parse
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/path-parse
node_modules/zigbee-herdsman/node_modules/path-parse
qs 6.5.0 - 6.5.2
Severity: high
qs vulnerable to Prototype Pollution - qs vulnerable to Prototype Pollution · CVE-2022-24999 · GitHub Advisory Database · GitHub
fix available via npm audit fix
node_modules/qs
node_modules/zigbee-herdsman-converters/node_modules/qs
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/qs
node_modules/zigbee-herdsman/node_modules/qs
request *
Severity: moderate
Server-Side Request Forgery in Request - Server-Side Request Forgery in Request · CVE-2023-28155 · GitHub Advisory Database · GitHub
Depends on vulnerable versions of tough-cookie
fix available via npm audit fix
node_modules/request
node_modules/zigbee-herdsman-converters/node_modules/request
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/request
node_modules/zigbee-herdsman/node_modules/request
semver <=5.7.1 || 6.0.0 - 6.3.0 || 7.0.0 - 7.5.1
Severity: moderate
semver vulnerable to Regular Expression Denial of Service - semver vulnerable to Regular Expression Denial of Service · CVE-2022-25883 · GitHub Advisory Database · GitHub
semver vulnerable to Regular Expression Denial of Service - semver vulnerable to Regular Expression Denial of Service · CVE-2022-25883 · GitHub Advisory Database · GitHub
semver vulnerable to Regular Expression Denial of Service - semver vulnerable to Regular Expression Denial of Service · CVE-2022-25883 · GitHub Advisory Database · GitHub
fix available via npm audit fix
node_modules/@babel/core/node_modules/semver
node_modules/@babel/helper-compilation-targets/node_modules/semver
node_modules/execa/node_modules/semver
node_modules/istanbul-lib-instrument/node_modules/semver
node_modules/make-dir/node_modules/semver
node_modules/normalize-package-data/node_modules/semver
node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/@babel/core/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/@babel/helper-compilation-targets/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/execa/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/istanbul-lib-instrument/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/make-dir/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/normalize-package-data/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/@typescript-eslint/eslint-plugin/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/@typescript-eslint/typescript-estree/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/core-js-compat/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/eslint/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/istanbul-lib-instrument/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/istanbul-lib-report/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/jest-snapshot/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/node-notifier/node_modules/semver
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/semver
node_modules/zigbee-herdsman/node_modules/@typescript-eslint/eslint-plugin/node_modules/semver
node_modules/zigbee-herdsman/node_modules/@typescript-eslint/typescript-estree/node_modules/semver
node_modules/zigbee-herdsman/node_modules/core-js-compat/node_modules/semver
node_modules/zigbee-herdsman/node_modules/eslint/node_modules/semver
node_modules/zigbee-herdsman/node_modules/istanbul-lib-instrument/node_modules/semver
node_modules/zigbee-herdsman/node_modules/istanbul-lib-report/node_modules/semver
node_modules/zigbee-herdsman/node_modules/jest-snapshot/node_modules/semver
node_modules/zigbee-herdsman/node_modules/node-notifier/node_modules/semver
node_modules/zigbee-herdsman/node_modules/semver
core-js-compat 3.6.0 - 3.25.0
Depends on vulnerable versions of semver
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/core-js-compat
node_modules/zigbee-herdsman/node_modules/core-js-compat
word-wrap <1.2.4
Severity: moderate
word-wrap vulnerable to Regular Expression Denial of Service - word-wrap vulnerable to Regular Expression Denial of Service · CVE-2023-26115 · GitHub Advisory Database · GitHub
fix available via npm audit fix
node_modules/word-wrap
node_modules/zigbee-herdsman-converters/node_modules/word-wrap
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/word-wrap
node_modules/zigbee-herdsman/node_modules/word-wrap
ws 7.0.0 - 7.4.5
Severity: moderate
ReDoS in Sec-Websocket-Protocol header - ReDoS in Sec-Websocket-Protocol header · CVE-2021-32640 · GitHub Advisory Database · GitHub
fix available via npm audit fix
node_modules/ws
node_modules/zigbee-herdsman-converters/node_modules/ws
node_modules/zigbee-herdsman-converters/node_modules/zigbee-herdsman/node_modules/ws
node_modules/zigbee-herdsman/node_modules/ws
To address all issues, run:
npm audit fix
root@wirenboard-AD4ALVSH:~/zigbee2mqtt# npm audit fix
npm WARN old lockfile
npm WARN old lockfile The npm-shrinkwrap.json file was created with an old version of npm,
npm WARN old lockfile so supplemental metadata must be fetched from the registry.
npm WARN old lockfile
npm WARN old lockfile This is a one-time fix-up, please be patient…
npm WARN old lockfile
[##################] | idealTree:inflate:node_modules/zigbee-herdsman/node_modules/typescript: sill inflate node_modules/zigbee-herdsman/node_modules/typescript
<— Last few GCs —>
[25402:0x51d4978] 635261 ms: Mark-sweep 123.5 (131.3) → 122.9 (129.3) MB, 4145.6 / 0.1 ms (average mu = 0.799, current mu = 0.378) allocation failure scavenge might not succeed
[25402:0x51d4978] 639257 ms: Mark-sweep 123.4 (129.3) → 123.4 (130.3) MB, 3854.2 / 0.1 ms (average mu = 0.601, current mu = 0.035) allocation failure scavenge might not succeed
<— JS stacktrace —>
FATAL ERROR: Reached heap limit Allocation failed - JavaScript heap out of memory
Aborted
root@wirenboard-AD4ALVSH:~/zigbee2mqtt#
я так понял, что вывалился по нехватке памяти.
я npm отдельно не устанавливал.
по команде топ посмотрел, что жрёт памяти, остановил wb-rules и wb-mqtt-serial. не помогло.
как ограничить размер памяти при npm audit fix ? я погуглил - но релевантного ответа не нашёл (или не понял).
удалил каталог. установил заново.
хотя npm audit fix так и вываливается, несмотря на ограничение 200мб, сервис заработал. и это главное.
спасибо, проблема решена.