Spaces:
Runtime error
Runtime error
// native node modules | |
const fs = require('fs'); | |
const http = require('http'); | |
const https = require('https'); | |
const path = require('path'); | |
const util = require('util'); | |
// cli/fs related library imports | |
const open = require('open'); | |
const yargs = require('yargs/yargs'); | |
const { hideBin } = require('yargs/helpers'); | |
// express/server related library imports | |
const cors = require('cors'); | |
const doubleCsrf = require('csrf-csrf').doubleCsrf; | |
const express = require('express'); | |
const compression = require('compression'); | |
const cookieParser = require('cookie-parser'); | |
const cookieSession = require('cookie-session'); | |
const multer = require('multer'); | |
const responseTime = require('response-time'); | |
const helmet = require('helmet').default; | |
// net related library imports | |
const net = require('net'); | |
const dns = require('dns'); | |
const fetch = require('node-fetch').default; | |
// Unrestrict console logs display limit | |
util.inspect.defaultOptions.maxArrayLength = null; | |
util.inspect.defaultOptions.maxStringLength = null; | |
util.inspect.defaultOptions.depth = 4; | |
// local library imports | |
const userModule = require('./src/users'); | |
const basicAuthMiddleware = require('./src/middleware/basicAuth'); | |
const whitelistMiddleware = require('./src/middleware/whitelist'); | |
const contentManager = require('./src/endpoints/content-manager'); | |
const { | |
getVersion, | |
getConfigValue, | |
color, | |
forwardFetchResponse, | |
removeColorFormatting, | |
getSeparator, | |
} = require('./src/util'); | |
const { ensureThumbnailCache } = require('./src/endpoints/thumbnails'); | |
// Work around a node v20.0.0, v20.1.0, and v20.2.0 bug. The issue was fixed in v20.3.0. | |
// https://github.com/nodejs/node/issues/47822#issuecomment-1564708870 | |
// Safe to remove once support for Node v20 is dropped. | |
if (process.versions && process.versions.node && process.versions.node.match(/20\.[0-2]\.0/)) { | |
// @ts-ignore | |
if (net.setDefaultAutoSelectFamily) net.setDefaultAutoSelectFamily(false); | |
} | |
const DEFAULT_PORT = 8000; | |
const DEFAULT_AUTORUN = false; | |
const DEFAULT_LISTEN = false; | |
const DEFAULT_CORS_PROXY = false; | |
const DEFAULT_WHITELIST = true; | |
const DEFAULT_ACCOUNTS = false; | |
const DEFAULT_CSRF_DISABLED = false; | |
const DEFAULT_BASIC_AUTH = false; | |
const DEFAULT_ENABLE_IPV6 = false; | |
const DEFAULT_ENABLE_IPV4 = true; | |
const DEFAULT_PREFER_IPV6 = false; | |
const DEFAULT_AVOID_LOCALHOST = false; | |
const DEFAULT_AUTORUN_HOSTNAME = 'auto'; | |
const DEFAULT_AUTORUN_PORT = -1; | |
const cliArguments = yargs(hideBin(process.argv)) | |
.usage('Usage: <your-start-script> <command> [options]') | |
.option('enableIPv6', { | |
type: 'boolean', | |
default: null, | |
describe: `Enables IPv6.\n[config default: ${DEFAULT_ENABLE_IPV6}]`, | |
}).option('enableIPv4', { | |
type: 'boolean', | |
default: null, | |
describe: `Enables IPv4.\n[config default: ${DEFAULT_ENABLE_IPV4}]`, | |
}).option('port', { | |
type: 'number', | |
default: null, | |
describe: `Sets the port under which SillyTavern will run.\nIf not provided falls back to yaml config 'port'.\n[config default: ${DEFAULT_PORT}]`, | |
}).option('dnsPreferIPv6', { | |
type: 'boolean', | |
default: null, | |
describe: `Prefers IPv6 for dns\nyou should probably have the enabled if you're on an IPv6 only network\nIf not provided falls back to yaml config 'preferIPv6'.\n[config default: ${DEFAULT_PREFER_IPV6}]`, | |
}).option('autorun', { | |
type: 'boolean', | |
default: null, | |
describe: `Automatically launch SillyTavern in the browser.\nAutorun is automatically disabled if --ssl is set to true.\nIf not provided falls back to yaml config 'autorun'.\n[config default: ${DEFAULT_AUTORUN}]`, | |
}).option('autorunHostname', { | |
type: 'string', | |
default: null, | |
describe: 'the autorun hostname, probably best left on \'auto\'.\nuse values like \'localhost\', \'st.example.com\'', | |
}).option('autorunPortOverride', { | |
type: 'string', | |
default: null, | |
describe: 'Overrides the port for autorun with open your browser with this port and ignore what port the server is running on. -1 is use server port', | |
}).option('listen', { | |
type: 'boolean', | |
default: null, | |
describe: `SillyTavern is listening on all network interfaces (Wi-Fi, LAN, localhost). If false, will limit it only to internal localhost (127.0.0.1).\nIf not provided falls back to yaml config 'listen'.\n[config default: ${DEFAULT_LISTEN}]`, | |
}).option('corsProxy', { | |
type: 'boolean', | |
default: null, | |
describe: `Enables CORS proxy\nIf not provided falls back to yaml config 'enableCorsProxy'.\n[config default: ${DEFAULT_CORS_PROXY}]`, | |
}).option('disableCsrf', { | |
type: 'boolean', | |
default: null, | |
describe: 'Disables CSRF protection', | |
}).option('ssl', { | |
type: 'boolean', | |
default: false, | |
describe: 'Enables SSL', | |
}).option('certPath', { | |
type: 'string', | |
default: 'certs/cert.pem', | |
describe: 'Path to your certificate file.', | |
}).option('keyPath', { | |
type: 'string', | |
default: 'certs/privkey.pem', | |
describe: 'Path to your private key file.', | |
}).option('whitelist', { | |
type: 'boolean', | |
default: null, | |
describe: 'Enables whitelist mode', | |
}).option('dataRoot', { | |
type: 'string', | |
default: null, | |
describe: 'Root directory for data storage', | |
}).option('avoidLocalhost', { | |
type: 'boolean', | |
default: null, | |
describe: 'Avoids using \'localhost\' for autorun in auto mode.\nuse if you don\'t have \'localhost\' in your hosts file', | |
}).option('basicAuthMode', { | |
type: 'boolean', | |
default: null, | |
describe: 'Enables basic authentication', | |
}).parseSync(); | |
// change all relative paths | |
console.log(`Node version: ${process.version}. Running in ${process.env.NODE_ENV} environment.`); | |
const serverDirectory = __dirname; | |
process.chdir(serverDirectory); | |
const app = express(); | |
app.use(helmet({ | |
contentSecurityPolicy: false, | |
})); | |
app.use(compression()); | |
app.use(responseTime()); | |
const server_port = cliArguments.port ?? process.env.SILLY_TAVERN_PORT ?? getConfigValue('port', DEFAULT_PORT); | |
const autorun = (cliArguments.autorun ?? getConfigValue('autorun', DEFAULT_AUTORUN)) && !cliArguments.ssl; | |
const listen = cliArguments.listen ?? getConfigValue('listen', DEFAULT_LISTEN); | |
const enableCorsProxy = cliArguments.corsProxy ?? getConfigValue('enableCorsProxy', DEFAULT_CORS_PROXY); | |
const enableWhitelist = cliArguments.whitelist ?? getConfigValue('whitelistMode', DEFAULT_WHITELIST); | |
const dataRoot = cliArguments.dataRoot ?? getConfigValue('dataRoot', './data'); | |
const disableCsrf = cliArguments.disableCsrf ?? getConfigValue('disableCsrfProtection', DEFAULT_CSRF_DISABLED); | |
const basicAuthMode = cliArguments.basicAuthMode ?? getConfigValue('basicAuthMode', DEFAULT_BASIC_AUTH); | |
const enableAccounts = getConfigValue('enableUserAccounts', DEFAULT_ACCOUNTS); | |
const uploadsPath = path.join(dataRoot, require('./src/constants').UPLOADS_DIRECTORY); | |
const enableIPv6 = cliArguments.enableIPv6 ?? getConfigValue('protocol.ipv6', DEFAULT_ENABLE_IPV6); | |
const enableIPv4 = cliArguments.enableIPv4 ?? getConfigValue('protocol.ipv4', DEFAULT_ENABLE_IPV4); | |
const autorunHostname = cliArguments.autorunHostname ?? getConfigValue('autorunHostname', DEFAULT_AUTORUN_HOSTNAME); | |
const autorunPortOverride = cliArguments.autorunPortOverride ?? getConfigValue('autorunPortOverride', DEFAULT_AUTORUN_PORT); | |
const dnsPreferIPv6 = cliArguments.dnsPreferIPv6 ?? getConfigValue('dnsPreferIPv6', DEFAULT_PREFER_IPV6); | |
const avoidLocalhost = cliArguments.avoidLocalhost ?? getConfigValue('avoidLocalhost', DEFAULT_AVOID_LOCALHOST); | |
if (dnsPreferIPv6) { | |
// Set default DNS resolution order to IPv6 first | |
dns.setDefaultResultOrder('ipv6first'); | |
console.log('Preferring IPv6 for DNS resolution'); | |
} else { | |
// Set default DNS resolution order to IPv4 first | |
dns.setDefaultResultOrder('ipv4first'); | |
console.log('Preferring IPv4 for DNS resolution'); | |
} | |
if (!enableIPv6 && !enableIPv4) { | |
console.error('error: You can\'t disable all internet protocols: at least IPv6 or IPv4 must be enabled.'); | |
process.exit(1); | |
} | |
// CORS Settings // | |
const CORS = cors({ | |
origin: 'null', | |
methods: ['OPTIONS'], | |
}); | |
app.use(CORS); | |
if (listen && basicAuthMode) app.use(basicAuthMiddleware); | |
app.use(whitelistMiddleware(enableWhitelist, listen)); | |
if (enableCorsProxy) { | |
const bodyParser = require('body-parser'); | |
app.use(bodyParser.json({ | |
limit: '200mb', | |
})); | |
console.log('Enabling CORS proxy'); | |
app.use('/proxy/:url(*)', async (req, res) => { | |
const url = req.params.url; // get the url from the request path | |
// Disallow circular requests | |
const serverUrl = req.protocol + '://' + req.get('host'); | |
if (url.startsWith(serverUrl)) { | |
return res.status(400).send('Circular requests are not allowed'); | |
} | |
try { | |
const headers = JSON.parse(JSON.stringify(req.headers)); | |
const headersToRemove = [ | |
'x-csrf-token', 'host', 'referer', 'origin', 'cookie', | |
'x-forwarded-for', 'x-forwarded-protocol', 'x-forwarded-proto', | |
'x-forwarded-host', 'x-real-ip', 'sec-fetch-mode', | |
'sec-fetch-site', 'sec-fetch-dest', | |
]; | |
headersToRemove.forEach(header => delete headers[header]); | |
const bodyMethods = ['POST', 'PUT', 'PATCH']; | |
const response = await fetch(url, { | |
method: req.method, | |
headers: headers, | |
body: bodyMethods.includes(req.method) ? JSON.stringify(req.body) : undefined, | |
}); | |
// Copy over relevant response params to the proxy response | |
forwardFetchResponse(response, res); | |
} catch (error) { | |
res.status(500).send('Error occurred while trying to proxy to: ' + url + ' ' + error); | |
} | |
}); | |
} else { | |
app.use('/proxy/:url(*)', async (_, res) => { | |
const message = 'CORS proxy is disabled. Enable it in config.yaml or use the --corsProxy flag.'; | |
console.log(message); | |
res.status(404).send(message); | |
}); | |
} | |
function getSessionCookieAge() { | |
// Defaults to 24 hours in seconds if not set | |
const configValue = getConfigValue('sessionTimeout', 24 * 60 * 60); | |
// Convert to milliseconds | |
if (configValue > 0) { | |
return configValue * 1000; | |
} | |
// "No expiration" is just 400 days as per RFC 6265 | |
if (configValue < 0) { | |
return 400 * 24 * 60 * 60 * 1000; | |
} | |
// 0 means session cookie is deleted when the browser session ends | |
// (depends on the implementation of the browser) | |
return undefined; | |
} | |
app.use(cookieSession({ | |
name: userModule.getCookieSessionName(), | |
sameSite: 'strict', | |
httpOnly: true, | |
maxAge: getSessionCookieAge(), | |
secret: userModule.getCookieSecret(), | |
})); | |
app.use(userModule.setUserDataMiddleware); | |
// CSRF Protection // | |
if (!disableCsrf) { | |
const COOKIES_SECRET = userModule.getCookieSecret(); | |
const { generateToken, doubleCsrfProtection } = doubleCsrf({ | |
getSecret: userModule.getCsrfSecret, | |
cookieName: 'X-CSRF-Token', | |
cookieOptions: { | |
httpOnly: true, | |
sameSite: 'strict', | |
secure: false, | |
}, | |
size: 64, | |
getTokenFromRequest: (req) => req.headers['x-csrf-token'], | |
}); | |
app.get('/csrf-token', (req, res) => { | |
res.json({ | |
'token': generateToken(res, req), | |
}); | |
}); | |
app.use(cookieParser(COOKIES_SECRET)); | |
app.use(doubleCsrfProtection); | |
} else { | |
console.warn('\nCSRF protection is disabled. This will make your server vulnerable to CSRF attacks.\n'); | |
app.get('/csrf-token', (req, res) => { | |
res.json({ | |
'token': 'disabled', | |
}); | |
}); | |
} | |
// Static files | |
// Host index page | |
app.get('/', (request, response) => { | |
if (userModule.shouldRedirectToLogin(request)) { | |
const query = request.url.split('?')[1]; | |
const redirectUrl = query ? `/login?${query}` : '/login'; | |
return response.redirect(redirectUrl); | |
} | |
return response.sendFile('index.html', { root: path.join(process.cwd(), 'public') }); | |
}); | |
// Host login page | |
app.get('/login', async (request, response) => { | |
if (!enableAccounts) { | |
console.log('User accounts are disabled. Redirecting to index page.'); | |
return response.redirect('/'); | |
} | |
try { | |
const autoLogin = await userModule.tryAutoLogin(request); | |
if (autoLogin) { | |
return response.redirect('/'); | |
} | |
} catch (error) { | |
console.error('Error during auto-login:', error); | |
} | |
return response.sendFile('login.html', { root: path.join(process.cwd(), 'public') }); | |
}); | |
// Host frontend assets | |
app.use(express.static(process.cwd() + '/public', {})); | |
// Public API | |
app.use('/api/users', require('./src/endpoints/users-public').router); | |
// Everything below this line requires authentication | |
app.use(userModule.requireLoginMiddleware); | |
app.get('/api/ping', (_, response) => response.sendStatus(204)); | |
// File uploads | |
app.use(multer({ dest: uploadsPath, limits: { fieldSize: 10 * 1024 * 1024 } }).single('avatar')); | |
app.use(require('./src/middleware/multerMonkeyPatch')); | |
// User data mount | |
app.use('/', userModule.router); | |
// Private endpoints | |
app.use('/api/users', require('./src/endpoints/users-private').router); | |
// Admin endpoints | |
app.use('/api/users', require('./src/endpoints/users-admin').router); | |
app.get('/version', async function (_, response) { | |
const data = await getVersion(); | |
response.send(data); | |
}); | |
function cleanUploads() { | |
try { | |
if (fs.existsSync(uploadsPath)) { | |
const uploads = fs.readdirSync(uploadsPath); | |
if (!uploads.length) { | |
return; | |
} | |
console.debug(`Cleaning uploads folder (${uploads.length} files)`); | |
uploads.forEach(file => { | |
const pathToFile = path.join(uploadsPath, file); | |
fs.unlinkSync(pathToFile); | |
}); | |
} | |
} catch (err) { | |
console.error(err); | |
} | |
} | |
/** | |
* Redirect a deprecated API endpoint URL to its replacement. Because fetch, form submissions, and $.ajax follow | |
* redirects, this is transparent to client-side code. | |
* @param {string} src The URL to redirect from. | |
* @param {string} destination The URL to redirect to. | |
*/ | |
function redirect(src, destination) { | |
app.use(src, (req, res) => { | |
console.warn(`API endpoint ${src} is deprecated; use ${destination} instead`); | |
// HTTP 301 causes the request to become a GET. 308 preserves the request method. | |
res.redirect(308, destination); | |
}); | |
} | |
// Redirect deprecated character API endpoints | |
redirect('/createcharacter', '/api/characters/create'); | |
redirect('/renamecharacter', '/api/characters/rename'); | |
redirect('/editcharacter', '/api/characters/edit'); | |
redirect('/editcharacterattribute', '/api/characters/edit-attribute'); | |
redirect('/v2/editcharacterattribute', '/api/characters/merge-attributes'); | |
redirect('/deletecharacter', '/api/characters/delete'); | |
redirect('/getcharacters', '/api/characters/all'); | |
redirect('/getonecharacter', '/api/characters/get'); | |
redirect('/getallchatsofcharacter', '/api/characters/chats'); | |
redirect('/importcharacter', '/api/characters/import'); | |
redirect('/dupecharacter', '/api/characters/duplicate'); | |
redirect('/exportcharacter', '/api/characters/export'); | |
// Redirect deprecated chat API endpoints | |
redirect('/savechat', '/api/chats/save'); | |
redirect('/getchat', '/api/chats/get'); | |
redirect('/renamechat', '/api/chats/rename'); | |
redirect('/delchat', '/api/chats/delete'); | |
redirect('/exportchat', '/api/chats/export'); | |
redirect('/importgroupchat', '/api/chats/group/import'); | |
redirect('/importchat', '/api/chats/import'); | |
redirect('/getgroupchat', '/api/chats/group/get'); | |
redirect('/deletegroupchat', '/api/chats/group/delete'); | |
redirect('/savegroupchat', '/api/chats/group/save'); | |
// Redirect deprecated group API endpoints | |
redirect('/getgroups', '/api/groups/all'); | |
redirect('/creategroup', '/api/groups/create'); | |
redirect('/editgroup', '/api/groups/edit'); | |
redirect('/deletegroup', '/api/groups/delete'); | |
// Redirect deprecated worldinfo API endpoints | |
redirect('/getworldinfo', '/api/worldinfo/get'); | |
redirect('/deleteworldinfo', '/api/worldinfo/delete'); | |
redirect('/importworldinfo', '/api/worldinfo/import'); | |
redirect('/editworldinfo', '/api/worldinfo/edit'); | |
// Redirect deprecated stats API endpoints | |
redirect('/getstats', '/api/stats/get'); | |
redirect('/recreatestats', '/api/stats/recreate'); | |
redirect('/updatestats', '/api/stats/update'); | |
// Redirect deprecated backgrounds API endpoints | |
redirect('/getbackgrounds', '/api/backgrounds/all'); | |
redirect('/delbackground', '/api/backgrounds/delete'); | |
redirect('/renamebackground', '/api/backgrounds/rename'); | |
redirect('/downloadbackground', '/api/backgrounds/upload'); // yes, the downloadbackground endpoint actually uploads one | |
// Redirect deprecated theme API endpoints | |
redirect('/savetheme', '/api/themes/save'); | |
// Redirect deprecated avatar API endpoints | |
redirect('/getuseravatars', '/api/avatars/get'); | |
redirect('/deleteuseravatar', '/api/avatars/delete'); | |
redirect('/uploaduseravatar', '/api/avatars/upload'); | |
// Redirect deprecated quick reply endpoints | |
redirect('/deletequickreply', '/api/quick-replies/delete'); | |
redirect('/savequickreply', '/api/quick-replies/save'); | |
// Redirect deprecated image endpoints | |
redirect('/uploadimage', '/api/images/upload'); | |
redirect('/listimgfiles/:folder', '/api/images/list/:folder'); | |
redirect('/api/content/import', '/api/content/importURL'); | |
// Redirect deprecated moving UI endpoints | |
redirect('/savemovingui', '/api/moving-ui/save'); | |
// Redirect Serp endpoints | |
redirect('/api/serpapi/search', '/api/search/serpapi'); | |
redirect('/api/serpapi/visit', '/api/search/visit'); | |
redirect('/api/serpapi/transcript', '/api/search/transcript'); | |
// Moving UI | |
app.use('/api/moving-ui', require('./src/endpoints/moving-ui').router); | |
// Image management | |
app.use('/api/images', require('./src/endpoints/images').router); | |
// Quick reply management | |
app.use('/api/quick-replies', require('./src/endpoints/quick-replies').router); | |
// Avatar management | |
app.use('/api/avatars', require('./src/endpoints/avatars').router); | |
// Theme management | |
app.use('/api/themes', require('./src/endpoints/themes').router); | |
// OpenAI API | |
app.use('/api/openai', require('./src/endpoints/openai').router); | |
//Google API | |
app.use('/api/google', require('./src/endpoints/google').router); | |
//Anthropic API | |
app.use('/api/anthropic', require('./src/endpoints/anthropic').router); | |
// Tokenizers | |
app.use('/api/tokenizers', require('./src/endpoints/tokenizers').router); | |
// Preset management | |
app.use('/api/presets', require('./src/endpoints/presets').router); | |
// Secrets managemenet | |
app.use('/api/secrets', require('./src/endpoints/secrets').router); | |
// Thumbnail generation. These URLs are saved in chat, so this route cannot be renamed! | |
app.use('/thumbnail', require('./src/endpoints/thumbnails').router); | |
// NovelAI generation | |
app.use('/api/novelai', require('./src/endpoints/novelai').router); | |
// Third-party extensions | |
app.use('/api/extensions', require('./src/endpoints/extensions').router); | |
// Asset management | |
app.use('/api/assets', require('./src/endpoints/assets').router); | |
// File management | |
app.use('/api/files', require('./src/endpoints/files').router); | |
// Character management | |
app.use('/api/characters', require('./src/endpoints/characters').router); | |
// Chat management | |
app.use('/api/chats', require('./src/endpoints/chats').router); | |
// Group management | |
app.use('/api/groups', require('./src/endpoints/groups').router); | |
// World info management | |
app.use('/api/worldinfo', require('./src/endpoints/worldinfo').router); | |
// Stats calculation | |
const statsEndpoint = require('./src/endpoints/stats'); | |
app.use('/api/stats', statsEndpoint.router); | |
// Background management | |
app.use('/api/backgrounds', require('./src/endpoints/backgrounds').router); | |
// Character sprite management | |
app.use('/api/sprites', require('./src/endpoints/sprites').router); | |
// Custom content management | |
app.use('/api/content', require('./src/endpoints/content-manager').router); | |
// Settings load/store | |
const settingsEndpoint = require('./src/endpoints/settings'); | |
app.use('/api/settings', settingsEndpoint.router); | |
// Stable Diffusion generation | |
app.use('/api/sd', require('./src/endpoints/stable-diffusion').router); | |
// LLM and SD Horde generation | |
app.use('/api/horde', require('./src/endpoints/horde').router); | |
// Vector storage DB | |
app.use('/api/vector', require('./src/endpoints/vectors').router); | |
// Chat translation | |
app.use('/api/translate', require('./src/endpoints/translate').router); | |
// Emotion classification | |
app.use('/api/extra/classify', require('./src/endpoints/classify').router); | |
// Image captioning | |
app.use('/api/extra/caption', require('./src/endpoints/caption').router); | |
// Web search and scraping | |
app.use('/api/search', require('./src/endpoints/search').router); | |
// The different text generation APIs | |
// Ooba/OpenAI text completions | |
app.use('/api/backends/text-completions', require('./src/endpoints/backends/text-completions').router); | |
// KoboldAI | |
app.use('/api/backends/kobold', require('./src/endpoints/backends/kobold').router); | |
// OpenAI chat completions | |
app.use('/api/backends/chat-completions', require('./src/endpoints/backends/chat-completions').router); | |
// Scale (alt method) | |
app.use('/api/backends/scale-alt', require('./src/endpoints/backends/scale-alt').router); | |
// Speech (text-to-speech and speech-to-text) | |
app.use('/api/speech', require('./src/endpoints/speech').router); | |
// Azure TTS | |
app.use('/api/azure', require('./src/endpoints/azure').router); | |
const tavernUrlV6 = new URL( | |
(cliArguments.ssl ? 'https://' : 'http://') + | |
(listen ? '[::]' : '[::1]') + | |
(':' + server_port), | |
); | |
const tavernUrl = new URL( | |
(cliArguments.ssl ? 'https://' : 'http://') + | |
(listen ? '0.0.0.0' : '127.0.0.1') + | |
(':' + server_port), | |
); | |
/** | |
* Tasks that need to be run before the server starts listening. | |
*/ | |
const preSetupTasks = async function () { | |
const version = await getVersion(); | |
// Print formatted header | |
console.log(); | |
console.log(`SillyTavern ${version.pkgVersion}`); | |
console.log(version.gitBranch ? `Running '${version.gitBranch}' (${version.gitRevision}) - ${version.commitDate}` : ''); | |
if (version.gitBranch && !version.isLatest && ['staging', 'release'].includes(version.gitBranch)) { | |
console.log('INFO: Currently not on the latest commit.'); | |
console.log(' Run \'git pull\' to update. If you have any merge conflicts, run \'git reset --hard\' and \'git pull\' to reset your branch.'); | |
} | |
console.log(); | |
const directories = await userModule.getUserDirectoriesList(); | |
await contentManager.checkForNewContent(directories); | |
await ensureThumbnailCache(); | |
cleanUploads(); | |
await settingsEndpoint.init(); | |
await statsEndpoint.init(); | |
const cleanupPlugins = await loadPlugins(); | |
const consoleTitle = process.title; | |
let isExiting = false; | |
const exitProcess = async () => { | |
if (isExiting) return; | |
isExiting = true; | |
statsEndpoint.onExit(); | |
if (typeof cleanupPlugins === 'function') { | |
await cleanupPlugins(); | |
} | |
setWindowTitle(consoleTitle); | |
process.exit(); | |
}; | |
// Set up event listeners for a graceful shutdown | |
process.on('SIGINT', exitProcess); | |
process.on('SIGTERM', exitProcess); | |
process.on('uncaughtException', (err) => { | |
console.error('Uncaught exception:', err); | |
exitProcess(); | |
}); | |
}; | |
/** | |
* Gets the hostname to use for autorun in the browser. | |
* @returns {string} The hostname to use for autorun | |
*/ | |
function getAutorunHostname() { | |
if (autorunHostname === 'auto') { | |
if (enableIPv6 && enableIPv4) { | |
if (avoidLocalhost) return '[::1]'; | |
return 'localhost'; | |
} | |
if (enableIPv6) { | |
return '[::1]'; | |
} | |
if (enableIPv4) { | |
return '127.0.0.1'; | |
} | |
} | |
return autorunHostname; | |
} | |
/** | |
* Tasks that need to be run after the server starts listening. | |
* @param {boolean} v6Failed If the server failed to start on IPv6 | |
* @param {boolean} v4Failed If the server failed to start on IPv4 | |
*/ | |
const postSetupTasks = async function (v6Failed, v4Failed) { | |
const autorunUrl = new URL( | |
(cliArguments.ssl ? 'https://' : 'http://') + | |
(getAutorunHostname()) + | |
(':') + | |
((autorunPortOverride >= 0) ? autorunPortOverride : server_port), | |
); | |
console.log('Launching...'); | |
if (autorun) open(autorunUrl.toString()); | |
setWindowTitle('SillyTavern WebServer'); | |
let logListen = 'SillyTavern is listening on'; | |
if (enableIPv6 && !v6Failed) { | |
logListen += color.green(' IPv6: ' + tavernUrlV6.host); | |
} | |
if (enableIPv4 && !v4Failed) { | |
logListen += color.green(' IPv4: ' + tavernUrl.host); | |
} | |
const goToLog = 'Go to: ' + color.blue(autorunUrl) + ' to open SillyTavern'; | |
const plainGoToLog = removeColorFormatting(goToLog); | |
console.log(logListen); | |
console.log('\n' + getSeparator(plainGoToLog.length) + '\n'); | |
console.log(goToLog); | |
console.log('\n' + getSeparator(plainGoToLog.length) + '\n'); | |
if (listen) { | |
console.log('[::] or 0.0.0.0 means SillyTavern is listening on all network interfaces (Wi-Fi, LAN, localhost). If you want to limit it only to internal localhost ([::1] or 127.0.0.1), change the setting in config.yaml to "listen: false". Check "access.log" file in the SillyTavern directory if you want to inspect incoming connections.\n'); | |
} | |
if (basicAuthMode) { | |
const basicAuthUser = getConfigValue('basicAuthUser', {}); | |
if (!basicAuthUser?.username || !basicAuthUser?.password) { | |
console.warn(color.yellow('Basic Authentication is enabled, but username or password is not set or empty!')); | |
} | |
} | |
}; | |
/** | |
* Loads server plugins from a directory. | |
* @returns {Promise<Function>} Function to be run on server exit | |
*/ | |
async function loadPlugins() { | |
try { | |
const pluginDirectory = path.join(serverDirectory, 'plugins'); | |
const loader = require('./src/plugin-loader'); | |
const cleanupPlugins = await loader.loadPlugins(app, pluginDirectory); | |
return cleanupPlugins; | |
} catch { | |
console.log('Plugin loading failed.'); | |
return () => { }; | |
} | |
} | |
/** | |
* Set the title of the terminal window | |
* @param {string} title Desired title for the window | |
*/ | |
function setWindowTitle(title) { | |
if (process.platform === 'win32') { | |
process.title = title; | |
} | |
else { | |
process.stdout.write(`\x1b]2;${title}\x1b\x5c`); | |
} | |
} | |
/** | |
* Prints an error message and exits the process if necessary | |
* @param {string} message The error message to print | |
* @returns {void} | |
*/ | |
function logSecurityAlert(message) { | |
if (basicAuthMode || enableWhitelist) return; // safe! | |
console.error(color.red(message)); | |
if (getConfigValue('securityOverride', false)) { | |
console.warn(color.red('Security has been overridden. If it\'s not a trusted network, change the settings.')); | |
return; | |
} | |
process.exit(1); | |
} | |
/** | |
* Handles the case where the server failed to start on one or both protocols. | |
* @param {boolean} v6Failed If the server failed to start on IPv6 | |
* @param {boolean} v4Failed If the server failed to start on IPv4 | |
*/ | |
function handleServerListenFail(v6Failed, v4Failed) { | |
if (v6Failed && !enableIPv4) { | |
console.error(color.red('fatal error: Failed to start server on IPv6 and IPv4 disabled')); | |
process.exit(1); | |
} | |
if (v4Failed && !enableIPv6) { | |
console.error(color.red('fatal error: Failed to start server on IPv4 and IPv6 disabled')); | |
process.exit(1); | |
} | |
if (v6Failed && v4Failed) { | |
console.error(color.red('fatal error: Failed to start server on both IPv6 and IPv4')); | |
process.exit(1); | |
} | |
} | |
/** | |
* Creates an HTTPS server. | |
* @param {URL} url The URL to listen on | |
* @returns {Promise<void>} A promise that resolves when the server is listening | |
* @throws {Error} If the server fails to start | |
*/ | |
function createHttpsServer(url) { | |
return new Promise((resolve, reject) => { | |
const server = https.createServer( | |
{ | |
cert: fs.readFileSync(cliArguments.certPath), | |
key: fs.readFileSync(cliArguments.keyPath), | |
}, app); | |
server.on('error', reject); | |
server.on('listening', resolve); | |
server.listen(url.port || 443, url.hostname); | |
}); | |
} | |
/** | |
* Creates an HTTP server. | |
* @param {URL} url The URL to listen on | |
* @returns {Promise<void>} A promise that resolves when the server is listening | |
* @throws {Error} If the server fails to start | |
*/ | |
function createHttpServer(url) { | |
return new Promise((resolve, reject) => { | |
const server = http.createServer(app); | |
server.on('error', reject); | |
server.on('listening', resolve); | |
server.listen(url.port || 80, url.hostname); | |
}); | |
} | |
async function startHTTPorHTTPS() { | |
let v6Failed = false; | |
let v4Failed = false; | |
const createFunc = cliArguments.ssl ? createHttpsServer : createHttpServer; | |
if (enableIPv6) { | |
try { | |
await createFunc(tavernUrlV6); | |
} catch (error) { | |
console.error('non-fatal error: failed to start server on IPv6'); | |
console.error(error); | |
v6Failed = true; | |
} | |
} | |
if (enableIPv4) { | |
try { | |
await createFunc(tavernUrl); | |
} catch (error) { | |
console.error('non-fatal error: failed to start server on IPv4'); | |
console.error(error); | |
v4Failed = true; | |
} | |
} | |
return [v6Failed, v4Failed]; | |
} | |
async function startServer() { | |
const [v6Failed, v4Failed] = await startHTTPorHTTPS(); | |
handleServerListenFail(v6Failed, v4Failed); | |
postSetupTasks(v6Failed, v4Failed); | |
} | |
async function verifySecuritySettings() { | |
// Skip all security checks as listen is set to false | |
if (!listen) { | |
return; | |
} | |
if (!enableAccounts) { | |
logSecurityAlert('Your SillyTavern is currently insecurely open to the public. Enable whitelisting, basic authentication or user accounts.'); | |
} | |
const users = await userModule.getAllEnabledUsers(); | |
const unprotectedUsers = users.filter(x => !x.password); | |
const unprotectedAdminUsers = unprotectedUsers.filter(x => x.admin); | |
if (unprotectedUsers.length > 0) { | |
console.warn(color.blue('A friendly reminder that the following users are not password protected:')); | |
unprotectedUsers.map(x => `${color.yellow(x.handle)} ${color.red(x.admin ? '(admin)' : '')}`).forEach(x => console.warn(x)); | |
console.log(); | |
console.warn(`Consider setting a password in the admin panel or by using the ${color.blue('recover.js')} script.`); | |
console.log(); | |
if (unprotectedAdminUsers.length > 0) { | |
logSecurityAlert('If you are not using basic authentication or whitelisting, you should set a password for all admin users.'); | |
} | |
} | |
} | |
// User storage module needs to be initialized before starting the server | |
userModule.initUserStorage(dataRoot) | |
.then(userModule.ensurePublicDirectoriesExist) | |
.then(userModule.migrateUserData) | |
.then(verifySecuritySettings) | |
.then(preSetupTasks) | |
.finally(startServer); | |