package m7s import ( "bytes" "context" "crypto/md5" "encoding/hex" "encoding/json" "fmt" "net" "net/http" "net/url" "os" "path/filepath" "reflect" "runtime" "strconv" "strings" "time" "m7s.live/v5/pkg/task" "github.com/quic-go/quic-go" gatewayRuntime "github.com/grpc-ecosystem/grpc-gateway/v2/runtime" myip "github.com/husanpao/ip" "google.golang.org/grpc" "gopkg.in/yaml.v3" "gorm.io/gorm" . "m7s.live/v5/pkg" "m7s.live/v5/pkg/config" "m7s.live/v5/pkg/db" "m7s.live/v5/pkg/util" ) type ( DefaultYaml string OnExitHandler func() AuthPublisher = func(*Publisher) *util.Promise AuthSubscriber = func(*Subscriber) *util.Promise PluginMeta struct { Name string Version string //插件版本 Type reflect.Type defaultYaml DefaultYaml //默认配置 ServiceDesc *grpc.ServiceDesc RegisterGRPCHandler func(context.Context, *gatewayRuntime.ServeMux, *grpc.ClientConn) error Puller Puller Pusher Pusher Recorder Recorder Transformer Transformer OnExit OnExitHandler OnAuthPub AuthPublisher OnAuthSub AuthSubscriber } iPlugin interface { nothing() } IPlugin interface { task.IJob OnInit() error OnStop() Pull(string, config.Pull, *config.Publish) Push(string, config.Push, *config.Subscribe) Transform(*Publisher, config.Transform) OnPublish(*Publisher) } IRegisterHandler interface { RegisterHandler() map[string]http.HandlerFunc } IPullerPlugin interface { GetPullableList() []string } ITCPPlugin interface { OnTCPConnect(conn *net.TCPConn) task.ITask } IUDPPlugin interface { OnUDPConnect(conn *net.UDPConn) task.ITask } IQUICPlugin interface { OnQUICConnect(quic.Connection) task.ITask } IPullProxyPlugin interface { OnPullProxyAdd(pullProxy *PullProxy) any } IPushProxyPlugin interface { OnPushProxyAdd(pushProxy *PushProxy) any } ) var plugins []PluginMeta func (plugin *PluginMeta) Init(s *Server, userConfig map[string]any) (p *Plugin) { instance, ok := reflect.New(plugin.Type).Interface().(IPlugin) if !ok { panic("plugin must implement IPlugin") } p = reflect.ValueOf(instance).Elem().FieldByName("Plugin").Addr().Interface().(*Plugin) p.handler = instance p.Meta = plugin p.Server = s p.Logger = s.Logger.With("plugin", plugin.Name) upperName := strings.ToUpper(plugin.Name) if os.Getenv(upperName+"_ENABLE") == "false" { p.disable("env") p.Warn("disabled by env") return } p.Config.Parse(p.GetCommonConf(), upperName) p.Config.Parse(instance, upperName) for _, fname := range MergeConfigs { if name := strings.ToLower(fname); p.Config.Has(name) { p.Config.Get(name).ParseGlobal(s.Config.Get(name)) } } if plugin.defaultYaml != "" { var defaultConf map[string]any if err := yaml.Unmarshal([]byte(plugin.defaultYaml), &defaultConf); err != nil { p.Error("parsing default config", "error", err) } else { p.Config.ParseDefaultYaml(defaultConf) } } p.Config.ParseUserFile(userConfig) p.SetDescription("version", plugin.Version) if userConfig != nil { p.SetDescription("userConfig", userConfig) } finalConfig, _ := yaml.Marshal(p.Config.GetMap()) p.Logger.Handler().(*MultiLogHandler).SetLevel(ParseLevel(p.config.LogLevel)) p.Debug("config", "detail", string(finalConfig)) if s.DisableAll { p.Disabled = true } if userConfig["enable"] == false { p.Disabled = true } else if userConfig["enable"] == true { p.Disabled = false } if p.Disabled { p.disable("config") p.Warn("plugin disabled") return } else { p.assign() } p.Info("init", "version", plugin.Version) var err error if p.config.DSN == s.GetCommonConf().DSN { p.DB = s.DB } else if p.config.DSN != "" { if factory, ok := db.Factory[p.config.DBType]; ok { s.DB, err = gorm.Open(factory(p.config.DSN), &gorm.Config{}) if err != nil { s.Error("failed to connect database", "error", err, "dsn", s.config.DSN, "type", s.config.DBType) p.disable(fmt.Sprintf("database %v", err)) return } } } if p.DB != nil && p.Meta.Recorder != nil { if err = p.DB.AutoMigrate(&RecordStream{}); err != nil { p.disable(fmt.Sprintf("auto migrate record stream failed %v", err)) return } } s.AddTask(instance) return } // InstallPlugin 安装插件 func InstallPlugin[C iPlugin](options ...any) error { var c *C t := reflect.TypeOf(c).Elem() meta := PluginMeta{ Name: strings.TrimSuffix(t.Name(), "Plugin"), Type: t, } _, pluginFilePath, _, _ := runtime.Caller(1) configDir := filepath.Dir(pluginFilePath) if _, after, found := strings.Cut(configDir, "@"); found { meta.Version = after } else { meta.Version = "dev" } for _, option := range options { switch v := option.(type) { case OnExitHandler: meta.OnExit = v case DefaultYaml: meta.defaultYaml = v case Puller: meta.Puller = v case Pusher: meta.Pusher = v case Recorder: meta.Recorder = v case Transformer: meta.Transformer = v case AuthPublisher: meta.OnAuthPub = v case AuthSubscriber: meta.OnAuthSub = v case *grpc.ServiceDesc: meta.ServiceDesc = v case func(context.Context, *gatewayRuntime.ServeMux, *grpc.ClientConn) error: meta.RegisterGRPCHandler = v } } plugins = append(plugins, meta) return nil } var _ IPlugin = (*Plugin)(nil) type Plugin struct { task.Work config.Config Disabled bool Meta *PluginMeta PushAddr, PlayAddr []string config config.Common handler IPlugin Server *Server DB *gorm.DB } func (Plugin) nothing() { } func (p *Plugin) GetKey() string { return p.Meta.Name } func (p *Plugin) GetGlobalCommonConf() *config.Common { return p.Server.GetCommonConf() } func (p *Plugin) GetCommonConf() *config.Common { return &p.config } func (p *Plugin) GetHandler() IPlugin { return p.handler } func (p *Plugin) GetPublicIP(netcardIP string) string { if p.config.PublicIP != "" { return p.config.PublicIP } if publicIP := util.GetPublicIP(netcardIP); publicIP != netcardIP { return publicIP } localIp := myip.InternalIPv4() if publicIP := util.GetPublicIP(localIp); publicIP != localIp { return publicIP } return localIp } func (p *Plugin) settingPath() string { return filepath.Join(p.Server.SettingDir, strings.ToLower(p.Meta.Name)+".yaml") } func (p *Plugin) disable(reason string) { p.Disabled = true p.SetDescription("disableReason", reason) p.Server.disabledPlugins = append(p.Server.disabledPlugins, p) } func (p *Plugin) assign() { f, err := os.Open(p.settingPath()) defer f.Close() if err == nil { var modifyConfig map[string]any err = yaml.NewDecoder(f).Decode(&modifyConfig) if err != nil { panic(err) } p.Config.ParseModifyFile(modifyConfig) } var handlerMap map[string]http.HandlerFunc if v, ok := p.handler.(IRegisterHandler); ok { handlerMap = v.RegisterHandler() } p.registerHandler(handlerMap) } func (p *Plugin) Start() (err error) { s := p.Server if p.Meta.ServiceDesc != nil && s.grpcServer != nil { s.grpcServer.RegisterService(p.Meta.ServiceDesc, p.handler) if p.Meta.RegisterGRPCHandler != nil { if err = p.Meta.RegisterGRPCHandler(p.Context, s.config.HTTP.GetGRPCMux(), s.grpcClientConn); err != nil { p.disable(fmt.Sprintf("grpc %v", err)) return } else { p.Info("grpc handler registered") } } } s.Plugins.Add(p) if err = p.listen(); err != nil { p.disable(fmt.Sprintf("listen %v", err)) return } if err = p.handler.OnInit(); err != nil { p.disable(fmt.Sprintf("init %v", err)) return } if p.config.Hook != nil { if hook, ok := p.config.Hook[config.HookOnServerKeepAlive]; ok && hook.Interval > 0 { p.AddTask(&ServerKeepAliveTask{plugin: p}) } } return } func (p *Plugin) Dispose() { p.handler.OnStop() p.Server.Plugins.Remove(p) } func (p *Plugin) listen() (err error) { httpConf := &p.config.HTTP if httpConf.ListenAddrTLS != "" && (httpConf.ListenAddrTLS != p.Server.config.HTTP.ListenAddrTLS) { p.SetDescription("httpTLS", strings.TrimPrefix(httpConf.ListenAddrTLS, ":")) p.AddDependTask(httpConf.CreateHTTPSWork(p.Logger)) } if httpConf.ListenAddr != "" && (httpConf.ListenAddr != p.Server.config.HTTP.ListenAddr) { p.SetDescription("http", strings.TrimPrefix(httpConf.ListenAddr, ":")) p.AddDependTask(httpConf.CreateHTTPWork(p.Logger)) } if tcphandler, ok := p.handler.(ITCPPlugin); ok { tcpConf := &p.config.TCP if tcpConf.ListenAddr != "" { if tcpConf.AutoListen { if err = p.AddTask(tcpConf.CreateTCPWork(p.Logger, tcphandler.OnTCPConnect)).WaitStarted(); err != nil { return } } p.SetDescription("tcp", strings.TrimPrefix(tcpConf.ListenAddr, ":")) } if tcpConf.ListenAddrTLS != "" { if tcpConf.AutoListen { if err = p.AddTask(tcpConf.CreateTCPTLSWork(p.Logger, tcphandler.OnTCPConnect)).WaitStarted(); err != nil { return } } p.SetDescription("tcpTLS", strings.TrimPrefix(tcpConf.ListenAddrTLS, ":")) } } if udpHandler, ok := p.handler.(IUDPPlugin); ok { udpConf := &p.config.UDP if udpConf.ListenAddr != "" { if udpConf.AutoListen { if err = p.AddTask(udpConf.CreateUDPWork(p.Logger, udpHandler.OnUDPConnect)).WaitStarted(); err != nil { return } } p.SetDescription("udp", strings.TrimPrefix(udpConf.ListenAddr, ":")) } } if quicHandler, ok := p.handler.(IQUICPlugin); ok { quicConf := &p.config.Quic if quicConf.ListenAddr != "" { if quicConf.AutoListen { if err = p.AddTask(quicConf.CreateQUICWork(p.Logger, quicHandler.OnQUICConnect)).WaitStarted(); err != nil { return } } p.SetDescription("quic", strings.TrimPrefix(quicConf.ListenAddr, ":")) } } return } func (p *Plugin) OnInit() error { return nil } func (p *Plugin) OnStop() { } type WebHookTask struct { task.Task plugin *Plugin hookType config.HookType conf *config.Webhook data any jsonData []byte } func (t *WebHookTask) Start() error { if t.conf == nil || t.conf.URL == "" { return task.ErrTaskComplete } var err error t.jsonData, err = json.Marshal(t.data) if err != nil { return fmt.Errorf("marshal webhook data: %w", err) } t.SetRetry(t.conf.RetryTimes, t.conf.RetryInterval) return nil } func (t *WebHookTask) Run() error { req, err := http.NewRequest(t.conf.Method, t.conf.URL, bytes.NewBuffer(t.jsonData)) if err != nil { return err } req.Header.Set("Content-Type", "application/json") for k, v := range t.conf.Headers { req.Header.Set(k, v) } client := &http.Client{ Timeout: time.Duration(t.conf.TimeoutSeconds) * time.Second, } resp, err := client.Do(req) if err != nil { t.plugin.Error("webhook request failed", "error", err) return err } defer resp.Body.Close() if resp.StatusCode >= 200 && resp.StatusCode < 300 { return task.ErrTaskComplete } err = fmt.Errorf("webhook request failed with status: %d", resp.StatusCode) t.plugin.Error("webhook response error", "status", resp.StatusCode) return err } func (p *Plugin) SendWebhook(hookType config.HookType, conf config.Webhook, data any) *task.Task { webhookTask := &WebHookTask{ plugin: p, hookType: hookType, conf: &conf, data: data, } return p.AddTask(webhookTask) } // TODO: use alias stream func (p *Plugin) OnPublish(pub *Publisher) { onPublish := p.config.OnPub if p.Meta.Pusher != nil { for r, pushConf := range onPublish.Push { if pushConf.URL = r.Replace(pub.StreamPath, pushConf.URL); pushConf.URL != "" { p.Push(pub.StreamPath, pushConf, nil) } } } if p.Meta.Recorder != nil { for r, recConf := range onPublish.Record { if recConf.FilePath = r.Replace(pub.StreamPath, recConf.FilePath); recConf.FilePath != "" { p.Record(pub, recConf, nil) } } } var owner = pub.Value(Owner) var isTransformer bool if owner != nil { _, isTransformer = owner.(ITransformer) } if p.Meta.Transformer != nil && !isTransformer { for r, tranConf := range onPublish.Transform { if group := r.FindStringSubmatch(pub.StreamPath); group != nil { for j, to := range tranConf.Output { for i, g := range group { to.Target = strings.ReplaceAll(to.Target, fmt.Sprintf("$%d", i), g) } targetUrl, err := url.Parse(to.Target) if err == nil { to.StreamPath = strings.TrimPrefix(targetUrl.Path, "/") } tranConf.Output[j] = to } p.Transform(pub, tranConf) } } } } func (p *Plugin) auth(streamPath string, key string, secret string, expire string) (err error) { if unixTime, err := strconv.ParseInt(expire, 16, 64); err != nil || time.Now().Unix() > unixTime { return fmt.Errorf("auth failed expired") } if len(secret) != 32 { return fmt.Errorf("auth failed secret length must be 32") } trueSecret := md5.Sum([]byte(key + streamPath + expire)) if secret == hex.EncodeToString(trueSecret[:]) { return nil } return fmt.Errorf("auth failed invalid secret") } func (p *Plugin) OnSubscribe(streamPath string, args url.Values) { // var avoidTrans bool //AVOID: // for trans := range server.Transforms.Range { // for _, output := range trans.Config.Output { // if output.StreamPath == s.StreamPath { // avoidTrans = true // break AVOID // } // } // } for reg, conf := range p.config.OnSub.Pull { if p.Meta.Puller != nil { conf.Args = config.HTTPValus(args) conf.URL = reg.Replace(streamPath, conf.URL) p.handler.Pull(streamPath, conf, nil) } } //if !avoidTrans { // for reg, conf := range plugin.GetCommonConf().OnSub.Transform { // if plugin.Meta.Transformer != nil { // if reg.MatchString(s.StreamPath) { // if group := reg.FindStringSubmatch(s.StreamPath); group != nil { // for j, c := range conf.Output { // for i, value := range group { // c.Target = strings.Replace(c.Target, fmt.Sprintf("$%d", i), value, -1) // } // conf.Output[j] = c // } // } // plugin.handler.Transform(s.StreamPath, conf) // } // } // } //} } func (p *Plugin) PublishWithConfig(ctx context.Context, streamPath string, conf config.Publish) (publisher *Publisher, err error) { publisher = createPublisher(p, streamPath, conf) if p.config.EnableAuth && publisher.Type == PublishTypeServer { onAuthPub := p.Meta.OnAuthPub if onAuthPub == nil { onAuthPub = p.Server.Meta.OnAuthPub } if onAuthPub != nil { if err = onAuthPub(publisher).Await(); err != nil { p.Warn("auth failed", "error", err) return } } else if conf.Key != "" { if err = p.auth(publisher.StreamPath, conf.Key, publisher.Args.Get("secret"), publisher.Args.Get("expire")); err != nil { p.Warn("auth failed", "error", err) return } } } err = p.Server.Streams.AddTask(publisher, ctx).WaitStarted() if err == nil { publisher.OnDispose(func() { p.sendPublishEndWebhook(publisher) }) p.sendPublishWebhook(publisher) } return } func (p *Plugin) Publish(ctx context.Context, streamPath string) (publisher *Publisher, err error) { return p.PublishWithConfig(ctx, streamPath, p.config.Publish) } func (p *Plugin) SubscribeWithConfig(ctx context.Context, streamPath string, conf config.Subscribe) (subscriber *Subscriber, err error) { subscriber = createSubscriber(p, streamPath, conf) if p.config.EnableAuth && subscriber.Type == SubscribeTypeServer { onAuthSub := p.Meta.OnAuthSub if onAuthSub == nil { onAuthSub = p.Server.Meta.OnAuthSub } if onAuthSub != nil { if err = onAuthSub(subscriber).Await(); err != nil { p.Warn("auth failed", "error", err) return } } else if conf.Key != "" { if err = p.auth(subscriber.StreamPath, conf.Key, subscriber.Args.Get("secret"), subscriber.Args.Get("expire")); err != nil { p.Warn("auth failed", "error", err) return } } } err = p.Server.Streams.AddTask(subscriber, ctx).WaitStarted() if err == nil { select { case <-subscriber.waitPublishDone: err = subscriber.Publisher.WaitTrack() case <-subscriber.Done(): err = subscriber.StopReason() } } if err == nil { subscriber.OnDispose(func() { p.sendSubscribeEndWebhook(subscriber) }) p.sendSubscribeWebhook(subscriber) } return } func (p *Plugin) Subscribe(ctx context.Context, streamPath string) (subscriber *Subscriber, err error) { return p.SubscribeWithConfig(ctx, streamPath, p.config.Subscribe) } func (p *Plugin) Pull(streamPath string, conf config.Pull, pubConf *config.Publish) { puller := p.Meta.Puller(conf) if puller == nil { return } puller.GetPullJob().Init(puller, p, streamPath, conf, pubConf) } func (p *Plugin) Push(streamPath string, conf config.Push, subConf *config.Subscribe) { pusher := p.Meta.Pusher() pusher.GetPushJob().Init(pusher, p, streamPath, conf, subConf) } func (p *Plugin) Record(pub *Publisher, conf config.Record, subConf *config.Subscribe) *RecordJob { recorder := p.Meta.Recorder() job := recorder.GetRecordJob().Init(recorder, p, pub.StreamPath, conf, subConf) job.Depend(pub) return job } func (p *Plugin) Transform(pub *Publisher, conf config.Transform) { transformer := p.Meta.Transformer() job := transformer.GetTransformJob().Init(transformer, p, pub.StreamPath, conf) job.Depend(pub) } func (p *Plugin) registerHandler(handlers map[string]http.HandlerFunc) { t := reflect.TypeOf(p.handler) v := reflect.ValueOf(p.handler) // 注册http响应 for i, j := 0, t.NumMethod(); i < j; i++ { name := t.Method(i).Name if name == "ServeHTTP" { continue } switch handler := v.Method(i).Interface().(type) { case func(http.ResponseWriter, *http.Request): patten := strings.ToLower(strings.ReplaceAll(name, "_", "/")) p.handle(patten, http.HandlerFunc(handler)) } } for patten, handler := range handlers { p.handle(patten, handler) } if p.config.EnableAuth && p.Server.ServerConfig.EnableLogin { p.handle("/api/secret/{type}/{streamPath...}", http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) { authHeader := r.Header.Get("Authorization") if authHeader == "" { http.Error(rw, "missing authorization header", http.StatusUnauthorized) return } tokenString := strings.TrimPrefix(authHeader, "Bearer ") _, err := p.Server.ValidateToken(tokenString) if err != nil { http.Error(rw, "invalid token", http.StatusUnauthorized) return } streamPath := r.PathValue("streamPath") t := r.PathValue("type") expire := r.URL.Query().Get("expire") if t == "publish" { secret := md5.Sum([]byte(p.config.Publish.Key + streamPath + expire)) rw.Write([]byte(hex.EncodeToString(secret[:]))) } else if t == "subscribe" { secret := md5.Sum([]byte(p.config.Subscribe.Key + streamPath + expire)) rw.Write([]byte(hex.EncodeToString(secret[:]))) } })) } if rootHandler, ok := p.handler.(http.Handler); ok { p.handle("/", rootHandler) } } func (p *Plugin) logHandler(handler http.Handler) http.Handler { return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) { p.Debug("visit", "path", r.URL.String(), "remote", r.RemoteAddr) name := strings.ToLower(p.Meta.Name) r.URL.Path = strings.TrimPrefix(r.URL.Path, "/"+name) handler.ServeHTTP(rw, r) }) } func (p *Plugin) handle(pattern string, handler http.Handler) { if p == nil { return } last := pattern == "/" if !strings.HasPrefix(pattern, "/") { pattern = "/" + pattern } handler = p.logHandler(handler) p.config.HTTP.Handle(pattern, handler, last) if p.Server != p.handler { pattern = "/" + strings.ToLower(p.Meta.Name) + pattern p.Debug("http handle added to Server", "pattern", pattern) p.Server.config.HTTP.Handle(pattern, handler, last) } p.Server.apiList = append(p.Server.apiList, pattern) } func (p *Plugin) SaveConfig() (err error) { return Servers.AddTask(&SaveConfig{Plugin: p}).WaitStopped() } type SaveConfig struct { task.Task Plugin *Plugin file *os.File } func (s *SaveConfig) Start() (err error) { if s.Plugin.Modify == nil { err = os.Remove(s.Plugin.settingPath()) if err == nil { err = task.ErrTaskComplete } } s.file, err = os.OpenFile(s.Plugin.settingPath(), os.O_CREATE|os.O_WRONLY|os.O_TRUNC, 0666) return } func (s *SaveConfig) Run() (err error) { return yaml.NewEncoder(s.file).Encode(s.Plugin.Modify) } func (s *SaveConfig) Dispose() { s.file.Close() } func (p *Plugin) sendPublishWebhook(pub *Publisher) { if p.config.Hook == nil { return } webhookData := map[string]interface{}{ "event": "publish", "streamPath": pub.StreamPath, "args": pub.Args, "publishId": pub.ID, "remoteAddr": pub.RemoteAddr, "type": pub.Type, "pluginName": p.Meta.Name, "timestamp": time.Now().Unix(), } p.SendWebhook(config.HookOnPublish, p.config.Hook[config.HookOnPublish], webhookData) if p.Server.config.Hook == nil { return } p.Server.SendWebhook(config.HookOnPublish, p.Server.config.Hook[config.HookOnPublish], webhookData) } func (p *Plugin) sendPublishEndWebhook(pub *Publisher) { if p.config.Hook == nil { return } webhookData := map[string]interface{}{ "event": "publish_end", "streamPath": pub.StreamPath, "publishId": pub.ID, "reason": pub.StopReason().Error(), "timestamp": time.Now().Unix(), } p.SendWebhook(config.HookOnPublishEnd, p.config.Hook[config.HookOnPublishEnd], webhookData) } func (p *Plugin) sendSubscribeWebhook(sub *Subscriber) { if p.config.Hook == nil { return } webhookData := map[string]interface{}{ "event": "subscribe", "streamPath": sub.StreamPath, "publishId": sub.Publisher.ID, "subscriberId": sub.ID, "remoteAddr": sub.RemoteAddr, "type": sub.Type, "args": sub.Args, "timestamp": time.Now().Unix(), } p.SendWebhook(config.HookOnSubscribe, p.config.Hook[config.HookOnSubscribe], webhookData) } func (p *Plugin) sendSubscribeEndWebhook(sub *Subscriber) { if p.config.Hook == nil { return } webhookData := map[string]interface{}{ "event": "subscribe_end", "streamPath": sub.StreamPath, "subscriberId": sub.ID, "reason": sub.StopReason().Error(), "timestamp": time.Now().Unix(), } if sub.Publisher != nil { webhookData["publishId"] = sub.Publisher.ID } p.SendWebhook(config.HookOnSubscribeEnd, p.config.Hook[config.HookOnSubscribeEnd], webhookData) } func (p *Plugin) sendServerKeepAliveWebhook() { if p.config.Hook == nil { return } s := p.Server webhookData := map[string]interface{}{ "event": "server_keep_alive", "timestamp": time.Now().Unix(), "streams": s.Streams.Length, "subscribers": s.Subscribers.Length, "publisherCount": s.Streams.Length, "subscriberCount": s.Subscribers.Length, "uptime": time.Since(s.StartTime).Seconds(), } p.SendWebhook(config.HookOnServerKeepAlive, p.config.Hook[config.HookOnServerKeepAlive], webhookData) } type ServerKeepAliveTask struct { task.TickTask plugin *Plugin } func (t *ServerKeepAliveTask) GetTickInterval() time.Duration { return time.Duration(t.plugin.config.Hook[config.HookOnServerKeepAlive].Interval) * time.Second } func (t *ServerKeepAliveTask) Tick(now any) { t.plugin.sendServerKeepAliveWebhook() }