Mission Control

Open-Source JavaScript framework for building real-time dashboards
Alternatives To Mission Control
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Cocreate Dashboard21
8 days ago84May 19, 20222mitHTML
A simple dashboard component in vanilla javascript. Easily configured using HTML5 attributes and/or JavaScript API.
Refinebio Frontend8
8 months ago37otherJavaScript
Frontend app for refine.bio
9 months agomitJavaScript
An open-source website design platform with focus on an easy user experience.
Mission Control3
2 years ago19mit
Open-Source JavaScript framework for building real-time dashboards
Crypto Ed Reactapp3
7 months agomitJavaScript
Crypto Tracker using ReactJS, Chakra UI, Chart.js and APIs.
Alternatives To Mission Control
Select To Compare

Alternative Project Comparisons

Mission Control

Opinionated JavaScript framework for building real-time dashboards

Project Homepage  |  Docs

Beginning a real-time web project, like building your own home dashboard, can be a tedious and time-consuming process. Coding lots of boilerplate for authentication, authorization and data communication isnt fun at all. By the time you get to building the thing you wanted you got bored and moved on to the next. Mission Control aims to provide all those features out-of-the-box so you can get to creating what matters right away.


  • Real-time state sync between server and client (service-based API)
  • Plugin API for creating your own services
  • Role-based permission API
  • Built-in User Management
  • HTTP & WebSocket Transports
  • Usecases:
    • Home Automation UIs / dashboards
    • Analytics dashboard combining different data sources
  • Available plugins for:
    • HomeKit light control
    • Spotify player
    • YouTube downloader (youtube-dl integration)
    • Filebrowser
    • etc.
  • Kinda pretty UI (at least I like it... you decide or build your own!)


Note: 2.0.0 is currently in pre-release but more stable than 0.x.x versions.

$ npm install -g @capevace/mission-control@next


You can now start the server like you would any binary.

$ mission-control --version


Usage: mission-control [options]

  -V, --version       output the version number
  -u, --url <url>     the url mission control is reachable at
  -p, --port <port>   the port to use for mission control
  -h, --help          display help for command


A config file for mission-control will be created at $HOME_DIR/.mission-control/config. This can also be used to configure mission-control. However, options passed as command line arguments override settings in this file.


Mission Control Screenshot


Version 2.0.0 (pre-release)

  • Completely redesigned dashboard UI
  • Introduction of a flexible plugin system
  • Authentication is now handled by Mission Control itself, single-sign-on is no longer required
  • Users now have profiles, which will be integrated with a solid permission system
  • Tons of bug fixes

Version 0.5.4

  • Rewrote logging system

Version 0.5.3

  • Added COVID widget to dashboard

Version 0.5.2

  • Fixed bahn algorithm skipping not displaying trains with SEV present

Version 0.5.1

  • Fixed dashboard layout now being loaded from database correctly

Version 0.5.0

  • New Dashboard is now customizeable

Version 0.4.2

  • Fixes error preventing the auth proxy from returning properly

Version 0.4.1

  • Fixes some minor security issues with dependencies

Version 0.4.0

  • The SSO server is now being proxied by default. This can be disabled with the --no-proxy option or by disabling it in the config file.
  • Instead of localhost, the default url is now the local ip


Running Mission Control on port 80

On Linux, running an http server on port 80 requires root priviliges. Generally this isn't a problem as you can simply sudo mission-control -p 80 which works, but this approach falls apart when using systemd.

I found this workaround which seems to be the safest option to use instead:

sudo apt-get install libcap2-bin
sudo setcap 'cap_net_bind_service=+ep' /usr/bin/node # Replace path to node binary

Notes about internal package updating

  • public-ip kept at 4.0.4 until we move to ESM
  • internal-ip kept at 6.1.0 until we move to ESM
  • auto-bind kept at 4.0.0 until we move to ESM
  • on-change kept at 3.0.2 until we move to ESM
  • passport kept at 0.4 until we're sure, JWT-based caddy login still works

Packages by internal plugins

  • db-hafas: bahn
  • internal-ip and public-ip: system-info
  • @oznu/hap-client: homebridge


Lukas Mateffy @Capevace mateffy.me

Distributed under the MIT license. See LICENSE for more information.


  1. Fork it (https://github.com/capevace/mission-control/fork)
  2. Create your feature branch (git checkout -b feature/fooBar)
  3. Commit your changes (git commit -am 'Add some fooBar')
  4. Push to the branch (git push origin feature/fooBar)
  5. Create a new Pull Request
Popular Dashboard Projects
Popular Javascript Framework Projects
Popular Web User Interface Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Command Line
Raspberry Pi
Internet Of Things
Real Time
Home Automation
Smart Home
Javascript Framework