935 lines
32 KiB
JavaScript
935 lines
32 KiB
JavaScript
#!/usr/bin/env node
|
|
|
|
// native node modules
|
|
const fs = require('fs');
|
|
const http = require('http');
|
|
const https = require('https');
|
|
const path = require('path');
|
|
const util = require('util');
|
|
|
|
// cli/fs related library imports
|
|
const open = require('open');
|
|
const yargs = require('yargs/yargs');
|
|
const { hideBin } = require('yargs/helpers');
|
|
|
|
// express/server related library imports
|
|
const cors = require('cors');
|
|
const doubleCsrf = require('csrf-csrf').doubleCsrf;
|
|
const express = require('express');
|
|
const compression = require('compression');
|
|
const cookieParser = require('cookie-parser');
|
|
const cookieSession = require('cookie-session');
|
|
const multer = require('multer');
|
|
const responseTime = require('response-time');
|
|
const helmet = require('helmet').default;
|
|
|
|
// net related library imports
|
|
const net = require('net');
|
|
const dns = require('dns');
|
|
const fetch = require('node-fetch').default;
|
|
|
|
// Unrestrict console logs display limit
|
|
util.inspect.defaultOptions.maxArrayLength = null;
|
|
util.inspect.defaultOptions.maxStringLength = null;
|
|
util.inspect.defaultOptions.depth = 4;
|
|
|
|
// local library imports
|
|
const userModule = require('./src/users');
|
|
const basicAuthMiddleware = require('./src/middleware/basicAuth');
|
|
const whitelistMiddleware = require('./src/middleware/whitelist');
|
|
const initRequestProxy = require('./src/request-proxy');
|
|
const contentManager = require('./src/endpoints/content-manager');
|
|
const {
|
|
getVersion,
|
|
getConfigValue,
|
|
color,
|
|
forwardFetchResponse,
|
|
removeColorFormatting,
|
|
getSeparator,
|
|
} = require('./src/util');
|
|
const { ensureThumbnailCache } = require('./src/endpoints/thumbnails');
|
|
|
|
// Work around a node v20.0.0, v20.1.0, and v20.2.0 bug. The issue was fixed in v20.3.0.
|
|
// https://github.com/nodejs/node/issues/47822#issuecomment-1564708870
|
|
// Safe to remove once support for Node v20 is dropped.
|
|
if (process.versions && process.versions.node && process.versions.node.match(/20\.[0-2]\.0/)) {
|
|
// @ts-ignore
|
|
if (net.setDefaultAutoSelectFamily) net.setDefaultAutoSelectFamily(false);
|
|
}
|
|
|
|
const DEFAULT_PORT = 8000;
|
|
const DEFAULT_AUTORUN = false;
|
|
const DEFAULT_LISTEN = false;
|
|
const DEFAULT_CORS_PROXY = false;
|
|
const DEFAULT_WHITELIST = true;
|
|
const DEFAULT_ACCOUNTS = false;
|
|
const DEFAULT_CSRF_DISABLED = false;
|
|
const DEFAULT_BASIC_AUTH = false;
|
|
|
|
const DEFAULT_ENABLE_IPV6 = false;
|
|
const DEFAULT_ENABLE_IPV4 = true;
|
|
|
|
const DEFAULT_PREFER_IPV6 = false;
|
|
|
|
const DEFAULT_AVOID_LOCALHOST = false;
|
|
|
|
const DEFAULT_AUTORUN_HOSTNAME = 'auto';
|
|
const DEFAULT_AUTORUN_PORT = -1;
|
|
|
|
const DEFAULT_PROXY_ENABLED = false;
|
|
const DEFAULT_PROXY_URL = '';
|
|
const DEFAULT_PROXY_BYPASS = [];
|
|
|
|
const cliArguments = yargs(hideBin(process.argv))
|
|
.usage('Usage: <your-start-script> <command> [options]')
|
|
.option('enableIPv6', {
|
|
type: 'boolean',
|
|
default: null,
|
|
describe: `Enables IPv6.\n[config default: ${DEFAULT_ENABLE_IPV6}]`,
|
|
}).option('enableIPv4', {
|
|
type: 'boolean',
|
|
default: null,
|
|
describe: `Enables IPv4.\n[config default: ${DEFAULT_ENABLE_IPV4}]`,
|
|
}).option('port', {
|
|
type: 'number',
|
|
default: null,
|
|
describe: `Sets the port under which SillyTavern will run.\nIf not provided falls back to yaml config 'port'.\n[config default: ${DEFAULT_PORT}]`,
|
|
}).option('dnsPreferIPv6', {
|
|
type: 'boolean',
|
|
default: null,
|
|
describe: `Prefers IPv6 for dns\nyou should probably have the enabled if you're on an IPv6 only network\nIf not provided falls back to yaml config 'preferIPv6'.\n[config default: ${DEFAULT_PREFER_IPV6}]`,
|
|
}).option('autorun', {
|
|
type: 'boolean',
|
|
default: null,
|
|
describe: `Automatically launch SillyTavern in the browser.\nAutorun is automatically disabled if --ssl is set to true.\nIf not provided falls back to yaml config 'autorun'.\n[config default: ${DEFAULT_AUTORUN}]`,
|
|
}).option('autorunHostname', {
|
|
type: 'string',
|
|
default: null,
|
|
describe: 'the autorun hostname, probably best left on \'auto\'.\nuse values like \'localhost\', \'st.example.com\'',
|
|
}).option('autorunPortOverride', {
|
|
type: 'string',
|
|
default: null,
|
|
describe: 'Overrides the port for autorun with open your browser with this port and ignore what port the server is running on. -1 is use server port',
|
|
}).option('listen', {
|
|
type: 'boolean',
|
|
default: null,
|
|
describe: `SillyTavern is listening on all network interfaces (Wi-Fi, LAN, localhost). If false, will limit it only to internal localhost (127.0.0.1).\nIf not provided falls back to yaml config 'listen'.\n[config default: ${DEFAULT_LISTEN}]`,
|
|
}).option('corsProxy', {
|
|
type: 'boolean',
|
|
default: null,
|
|
describe: `Enables CORS proxy\nIf not provided falls back to yaml config 'enableCorsProxy'.\n[config default: ${DEFAULT_CORS_PROXY}]`,
|
|
}).option('disableCsrf', {
|
|
type: 'boolean',
|
|
default: null,
|
|
describe: 'Disables CSRF protection',
|
|
}).option('ssl', {
|
|
type: 'boolean',
|
|
default: false,
|
|
describe: 'Enables SSL',
|
|
}).option('certPath', {
|
|
type: 'string',
|
|
default: 'certs/cert.pem',
|
|
describe: 'Path to your certificate file.',
|
|
}).option('keyPath', {
|
|
type: 'string',
|
|
default: 'certs/privkey.pem',
|
|
describe: 'Path to your private key file.',
|
|
}).option('whitelist', {
|
|
type: 'boolean',
|
|
default: null,
|
|
describe: 'Enables whitelist mode',
|
|
}).option('dataRoot', {
|
|
type: 'string',
|
|
default: null,
|
|
describe: 'Root directory for data storage',
|
|
}).option('avoidLocalhost', {
|
|
type: 'boolean',
|
|
default: null,
|
|
describe: 'Avoids using \'localhost\' for autorun in auto mode.\nuse if you don\'t have \'localhost\' in your hosts file',
|
|
}).option('basicAuthMode', {
|
|
type: 'boolean',
|
|
default: null,
|
|
describe: 'Enables basic authentication',
|
|
}).option('requestProxyEnabled', {
|
|
type: 'boolean',
|
|
default: null,
|
|
describe: 'Enables a use of proxy for outgoing requests',
|
|
}).option('requestProxyUrl', {
|
|
type: 'string',
|
|
default: null,
|
|
describe: 'Request proxy URL (HTTP or SOCKS protocols)',
|
|
}).option('requestProxyBypass', {
|
|
type: 'array',
|
|
default: null,
|
|
describe: 'Request proxy bypass list (space separated list of hosts)',
|
|
}).parseSync();
|
|
|
|
// change all relative paths
|
|
console.log(`Node version: ${process.version}. Running in ${process.env.NODE_ENV} environment.`);
|
|
const serverDirectory = __dirname;
|
|
process.chdir(serverDirectory);
|
|
|
|
const app = express();
|
|
app.use(helmet({
|
|
contentSecurityPolicy: false,
|
|
}));
|
|
app.use(compression());
|
|
app.use(responseTime());
|
|
|
|
const server_port = cliArguments.port ?? process.env.SILLY_TAVERN_PORT ?? getConfigValue('port', DEFAULT_PORT);
|
|
const autorun = (cliArguments.autorun ?? getConfigValue('autorun', DEFAULT_AUTORUN)) && !cliArguments.ssl;
|
|
const listen = cliArguments.listen ?? getConfigValue('listen', DEFAULT_LISTEN);
|
|
const enableCorsProxy = cliArguments.corsProxy ?? getConfigValue('enableCorsProxy', DEFAULT_CORS_PROXY);
|
|
const enableWhitelist = cliArguments.whitelist ?? getConfigValue('whitelistMode', DEFAULT_WHITELIST);
|
|
const dataRoot = cliArguments.dataRoot ?? getConfigValue('dataRoot', './data');
|
|
const disableCsrf = cliArguments.disableCsrf ?? getConfigValue('disableCsrfProtection', DEFAULT_CSRF_DISABLED);
|
|
const basicAuthMode = cliArguments.basicAuthMode ?? getConfigValue('basicAuthMode', DEFAULT_BASIC_AUTH);
|
|
const enableAccounts = getConfigValue('enableUserAccounts', DEFAULT_ACCOUNTS);
|
|
|
|
const uploadsPath = path.join(dataRoot, require('./src/constants').UPLOADS_DIRECTORY);
|
|
|
|
const enableIPv6 = cliArguments.enableIPv6 ?? getConfigValue('protocol.ipv6', DEFAULT_ENABLE_IPV6);
|
|
const enableIPv4 = cliArguments.enableIPv4 ?? getConfigValue('protocol.ipv4', DEFAULT_ENABLE_IPV4);
|
|
|
|
const autorunHostname = cliArguments.autorunHostname ?? getConfigValue('autorunHostname', DEFAULT_AUTORUN_HOSTNAME);
|
|
const autorunPortOverride = cliArguments.autorunPortOverride ?? getConfigValue('autorunPortOverride', DEFAULT_AUTORUN_PORT);
|
|
|
|
const dnsPreferIPv6 = cliArguments.dnsPreferIPv6 ?? getConfigValue('dnsPreferIPv6', DEFAULT_PREFER_IPV6);
|
|
|
|
const avoidLocalhost = cliArguments.avoidLocalhost ?? getConfigValue('avoidLocalhost', DEFAULT_AVOID_LOCALHOST);
|
|
|
|
const proxyEnabled = cliArguments.requestProxyEnabled ?? getConfigValue('requestProxy.enabled', DEFAULT_PROXY_ENABLED);
|
|
const proxyUrl = cliArguments.requestProxyUrl ?? getConfigValue('requestProxy.url', DEFAULT_PROXY_URL);
|
|
const proxyBypass = cliArguments.requestProxyBypass ?? getConfigValue('requestProxy.bypass', DEFAULT_PROXY_BYPASS);
|
|
|
|
if (dnsPreferIPv6) {
|
|
// Set default DNS resolution order to IPv6 first
|
|
dns.setDefaultResultOrder('ipv6first');
|
|
console.log('Preferring IPv6 for DNS resolution');
|
|
} else {
|
|
// Set default DNS resolution order to IPv4 first
|
|
dns.setDefaultResultOrder('ipv4first');
|
|
console.log('Preferring IPv4 for DNS resolution');
|
|
}
|
|
|
|
if (!enableIPv6 && !enableIPv4) {
|
|
console.error('error: You can\'t disable all internet protocols: at least IPv6 or IPv4 must be enabled.');
|
|
process.exit(1);
|
|
}
|
|
|
|
// CORS Settings //
|
|
const CORS = cors({
|
|
origin: 'null',
|
|
methods: ['OPTIONS'],
|
|
});
|
|
|
|
app.use(CORS);
|
|
|
|
if (listen && basicAuthMode) app.use(basicAuthMiddleware);
|
|
|
|
app.use(whitelistMiddleware(enableWhitelist, listen));
|
|
|
|
if (enableCorsProxy) {
|
|
const bodyParser = require('body-parser');
|
|
app.use(bodyParser.json({
|
|
limit: '200mb',
|
|
}));
|
|
console.log('Enabling CORS proxy');
|
|
|
|
app.use('/proxy/:url(*)', async (req, res) => {
|
|
const url = req.params.url; // get the url from the request path
|
|
|
|
// Disallow circular requests
|
|
const serverUrl = req.protocol + '://' + req.get('host');
|
|
if (url.startsWith(serverUrl)) {
|
|
return res.status(400).send('Circular requests are not allowed');
|
|
}
|
|
|
|
try {
|
|
const headers = JSON.parse(JSON.stringify(req.headers));
|
|
const headersToRemove = [
|
|
'x-csrf-token', 'host', 'referer', 'origin', 'cookie',
|
|
'x-forwarded-for', 'x-forwarded-protocol', 'x-forwarded-proto',
|
|
'x-forwarded-host', 'x-real-ip', 'sec-fetch-mode',
|
|
'sec-fetch-site', 'sec-fetch-dest',
|
|
];
|
|
|
|
headersToRemove.forEach(header => delete headers[header]);
|
|
|
|
const bodyMethods = ['POST', 'PUT', 'PATCH'];
|
|
|
|
const response = await fetch(url, {
|
|
method: req.method,
|
|
headers: headers,
|
|
body: bodyMethods.includes(req.method) ? JSON.stringify(req.body) : undefined,
|
|
});
|
|
|
|
// Copy over relevant response params to the proxy response
|
|
forwardFetchResponse(response, res);
|
|
|
|
} catch (error) {
|
|
res.status(500).send('Error occurred while trying to proxy to: ' + url + ' ' + error);
|
|
}
|
|
});
|
|
} else {
|
|
app.use('/proxy/:url(*)', async (_, res) => {
|
|
const message = 'CORS proxy is disabled. Enable it in config.yaml or use the --corsProxy flag.';
|
|
console.log(message);
|
|
res.status(404).send(message);
|
|
});
|
|
}
|
|
|
|
function getSessionCookieAge() {
|
|
// Defaults to 24 hours in seconds if not set
|
|
const configValue = getConfigValue('sessionTimeout', 24 * 60 * 60);
|
|
|
|
// Convert to milliseconds
|
|
if (configValue > 0) {
|
|
return configValue * 1000;
|
|
}
|
|
|
|
// "No expiration" is just 400 days as per RFC 6265
|
|
if (configValue < 0) {
|
|
return 400 * 24 * 60 * 60 * 1000;
|
|
}
|
|
|
|
// 0 means session cookie is deleted when the browser session ends
|
|
// (depends on the implementation of the browser)
|
|
return undefined;
|
|
}
|
|
|
|
app.use(cookieSession({
|
|
name: userModule.getCookieSessionName(),
|
|
sameSite: 'strict',
|
|
httpOnly: true,
|
|
maxAge: getSessionCookieAge(),
|
|
secret: userModule.getCookieSecret(),
|
|
}));
|
|
|
|
app.use(userModule.setUserDataMiddleware);
|
|
|
|
// CSRF Protection //
|
|
if (!disableCsrf) {
|
|
const COOKIES_SECRET = userModule.getCookieSecret();
|
|
|
|
const { generateToken, doubleCsrfProtection } = doubleCsrf({
|
|
getSecret: userModule.getCsrfSecret,
|
|
cookieName: 'X-CSRF-Token',
|
|
cookieOptions: {
|
|
httpOnly: true,
|
|
sameSite: 'strict',
|
|
secure: false,
|
|
},
|
|
size: 64,
|
|
getTokenFromRequest: (req) => req.headers['x-csrf-token'],
|
|
});
|
|
|
|
app.get('/csrf-token', (req, res) => {
|
|
res.json({
|
|
'token': generateToken(res, req),
|
|
});
|
|
});
|
|
|
|
app.use(cookieParser(COOKIES_SECRET));
|
|
app.use(doubleCsrfProtection);
|
|
} else {
|
|
console.warn('\nCSRF protection is disabled. This will make your server vulnerable to CSRF attacks.\n');
|
|
app.get('/csrf-token', (req, res) => {
|
|
res.json({
|
|
'token': 'disabled',
|
|
});
|
|
});
|
|
}
|
|
|
|
// Static files
|
|
// Host index page
|
|
app.get('/', (request, response) => {
|
|
if (userModule.shouldRedirectToLogin(request)) {
|
|
const query = request.url.split('?')[1];
|
|
const redirectUrl = query ? `/login?${query}` : '/login';
|
|
return response.redirect(redirectUrl);
|
|
}
|
|
|
|
return response.sendFile('index.html', { root: path.join(process.cwd(), 'public') });
|
|
});
|
|
|
|
// Host login page
|
|
app.get('/login', async (request, response) => {
|
|
if (!enableAccounts) {
|
|
console.log('User accounts are disabled. Redirecting to index page.');
|
|
return response.redirect('/');
|
|
}
|
|
|
|
try {
|
|
const autoLogin = await userModule.tryAutoLogin(request);
|
|
|
|
if (autoLogin) {
|
|
return response.redirect('/');
|
|
}
|
|
} catch (error) {
|
|
console.error('Error during auto-login:', error);
|
|
}
|
|
|
|
return response.sendFile('login.html', { root: path.join(process.cwd(), 'public') });
|
|
});
|
|
|
|
// Host frontend assets
|
|
app.use(express.static(process.cwd() + '/public', {}));
|
|
|
|
// Public API
|
|
app.use('/api/users', require('./src/endpoints/users-public').router);
|
|
|
|
// Everything below this line requires authentication
|
|
app.use(userModule.requireLoginMiddleware);
|
|
app.get('/api/ping', (_, response) => response.sendStatus(204));
|
|
|
|
// File uploads
|
|
app.use(multer({ dest: uploadsPath, limits: { fieldSize: 10 * 1024 * 1024 } }).single('avatar'));
|
|
app.use(require('./src/middleware/multerMonkeyPatch'));
|
|
|
|
// User data mount
|
|
app.use('/', userModule.router);
|
|
// Private endpoints
|
|
app.use('/api/users', require('./src/endpoints/users-private').router);
|
|
// Admin endpoints
|
|
app.use('/api/users', require('./src/endpoints/users-admin').router);
|
|
|
|
app.get('/version', async function (_, response) {
|
|
const data = await getVersion();
|
|
response.send(data);
|
|
});
|
|
|
|
function cleanUploads() {
|
|
try {
|
|
if (fs.existsSync(uploadsPath)) {
|
|
const uploads = fs.readdirSync(uploadsPath);
|
|
|
|
if (!uploads.length) {
|
|
return;
|
|
}
|
|
|
|
console.debug(`Cleaning uploads folder (${uploads.length} files)`);
|
|
uploads.forEach(file => {
|
|
const pathToFile = path.join(uploadsPath, file);
|
|
fs.unlinkSync(pathToFile);
|
|
});
|
|
}
|
|
} catch (err) {
|
|
console.error(err);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Redirect a deprecated API endpoint URL to its replacement. Because fetch, form submissions, and $.ajax follow
|
|
* redirects, this is transparent to client-side code.
|
|
* @param {string} src The URL to redirect from.
|
|
* @param {string} destination The URL to redirect to.
|
|
*/
|
|
function redirect(src, destination) {
|
|
app.use(src, (req, res) => {
|
|
console.warn(`API endpoint ${src} is deprecated; use ${destination} instead`);
|
|
// HTTP 301 causes the request to become a GET. 308 preserves the request method.
|
|
res.redirect(308, destination);
|
|
});
|
|
}
|
|
|
|
// Redirect deprecated character API endpoints
|
|
redirect('/createcharacter', '/api/characters/create');
|
|
redirect('/renamecharacter', '/api/characters/rename');
|
|
redirect('/editcharacter', '/api/characters/edit');
|
|
redirect('/editcharacterattribute', '/api/characters/edit-attribute');
|
|
redirect('/v2/editcharacterattribute', '/api/characters/merge-attributes');
|
|
redirect('/deletecharacter', '/api/characters/delete');
|
|
redirect('/getcharacters', '/api/characters/all');
|
|
redirect('/getonecharacter', '/api/characters/get');
|
|
redirect('/getallchatsofcharacter', '/api/characters/chats');
|
|
redirect('/importcharacter', '/api/characters/import');
|
|
redirect('/dupecharacter', '/api/characters/duplicate');
|
|
redirect('/exportcharacter', '/api/characters/export');
|
|
|
|
// Redirect deprecated chat API endpoints
|
|
redirect('/savechat', '/api/chats/save');
|
|
redirect('/getchat', '/api/chats/get');
|
|
redirect('/renamechat', '/api/chats/rename');
|
|
redirect('/delchat', '/api/chats/delete');
|
|
redirect('/exportchat', '/api/chats/export');
|
|
redirect('/importgroupchat', '/api/chats/group/import');
|
|
redirect('/importchat', '/api/chats/import');
|
|
redirect('/getgroupchat', '/api/chats/group/get');
|
|
redirect('/deletegroupchat', '/api/chats/group/delete');
|
|
redirect('/savegroupchat', '/api/chats/group/save');
|
|
|
|
// Redirect deprecated group API endpoints
|
|
redirect('/getgroups', '/api/groups/all');
|
|
redirect('/creategroup', '/api/groups/create');
|
|
redirect('/editgroup', '/api/groups/edit');
|
|
redirect('/deletegroup', '/api/groups/delete');
|
|
|
|
// Redirect deprecated worldinfo API endpoints
|
|
redirect('/getworldinfo', '/api/worldinfo/get');
|
|
redirect('/deleteworldinfo', '/api/worldinfo/delete');
|
|
redirect('/importworldinfo', '/api/worldinfo/import');
|
|
redirect('/editworldinfo', '/api/worldinfo/edit');
|
|
|
|
// Redirect deprecated stats API endpoints
|
|
redirect('/getstats', '/api/stats/get');
|
|
redirect('/recreatestats', '/api/stats/recreate');
|
|
redirect('/updatestats', '/api/stats/update');
|
|
|
|
// Redirect deprecated backgrounds API endpoints
|
|
redirect('/getbackgrounds', '/api/backgrounds/all');
|
|
redirect('/delbackground', '/api/backgrounds/delete');
|
|
redirect('/renamebackground', '/api/backgrounds/rename');
|
|
redirect('/downloadbackground', '/api/backgrounds/upload'); // yes, the downloadbackground endpoint actually uploads one
|
|
|
|
// Redirect deprecated theme API endpoints
|
|
redirect('/savetheme', '/api/themes/save');
|
|
|
|
// Redirect deprecated avatar API endpoints
|
|
redirect('/getuseravatars', '/api/avatars/get');
|
|
redirect('/deleteuseravatar', '/api/avatars/delete');
|
|
redirect('/uploaduseravatar', '/api/avatars/upload');
|
|
|
|
// Redirect deprecated quick reply endpoints
|
|
redirect('/deletequickreply', '/api/quick-replies/delete');
|
|
redirect('/savequickreply', '/api/quick-replies/save');
|
|
|
|
// Redirect deprecated image endpoints
|
|
redirect('/uploadimage', '/api/images/upload');
|
|
redirect('/listimgfiles/:folder', '/api/images/list/:folder');
|
|
redirect('/api/content/import', '/api/content/importURL');
|
|
|
|
// Redirect deprecated moving UI endpoints
|
|
redirect('/savemovingui', '/api/moving-ui/save');
|
|
|
|
// Redirect Serp endpoints
|
|
redirect('/api/serpapi/search', '/api/search/serpapi');
|
|
redirect('/api/serpapi/visit', '/api/search/visit');
|
|
redirect('/api/serpapi/transcript', '/api/search/transcript');
|
|
|
|
// Moving UI
|
|
app.use('/api/moving-ui', require('./src/endpoints/moving-ui').router);
|
|
|
|
// Image management
|
|
app.use('/api/images', require('./src/endpoints/images').router);
|
|
|
|
// Quick reply management
|
|
app.use('/api/quick-replies', require('./src/endpoints/quick-replies').router);
|
|
|
|
// Avatar management
|
|
app.use('/api/avatars', require('./src/endpoints/avatars').router);
|
|
|
|
// Theme management
|
|
app.use('/api/themes', require('./src/endpoints/themes').router);
|
|
|
|
// OpenAI API
|
|
app.use('/api/openai', require('./src/endpoints/openai').router);
|
|
|
|
//Google API
|
|
app.use('/api/google', require('./src/endpoints/google').router);
|
|
|
|
//Anthropic API
|
|
app.use('/api/anthropic', require('./src/endpoints/anthropic').router);
|
|
|
|
// Tokenizers
|
|
app.use('/api/tokenizers', require('./src/endpoints/tokenizers').router);
|
|
|
|
// Preset management
|
|
app.use('/api/presets', require('./src/endpoints/presets').router);
|
|
|
|
// Secrets managemenet
|
|
app.use('/api/secrets', require('./src/endpoints/secrets').router);
|
|
|
|
// Thumbnail generation. These URLs are saved in chat, so this route cannot be renamed!
|
|
app.use('/thumbnail', require('./src/endpoints/thumbnails').router);
|
|
|
|
// NovelAI generation
|
|
app.use('/api/novelai', require('./src/endpoints/novelai').router);
|
|
|
|
// Third-party extensions
|
|
app.use('/api/extensions', require('./src/endpoints/extensions').router);
|
|
|
|
// Asset management
|
|
app.use('/api/assets', require('./src/endpoints/assets').router);
|
|
|
|
// File management
|
|
app.use('/api/files', require('./src/endpoints/files').router);
|
|
|
|
// Character management
|
|
app.use('/api/characters', require('./src/endpoints/characters').router);
|
|
|
|
// Chat management
|
|
app.use('/api/chats', require('./src/endpoints/chats').router);
|
|
|
|
// Group management
|
|
app.use('/api/groups', require('./src/endpoints/groups').router);
|
|
|
|
// World info management
|
|
app.use('/api/worldinfo', require('./src/endpoints/worldinfo').router);
|
|
|
|
// Stats calculation
|
|
const statsEndpoint = require('./src/endpoints/stats');
|
|
app.use('/api/stats', statsEndpoint.router);
|
|
|
|
// Background management
|
|
app.use('/api/backgrounds', require('./src/endpoints/backgrounds').router);
|
|
|
|
// Character sprite management
|
|
app.use('/api/sprites', require('./src/endpoints/sprites').router);
|
|
|
|
// Custom content management
|
|
app.use('/api/content', require('./src/endpoints/content-manager').router);
|
|
|
|
// Settings load/store
|
|
const settingsEndpoint = require('./src/endpoints/settings');
|
|
app.use('/api/settings', settingsEndpoint.router);
|
|
|
|
// Stable Diffusion generation
|
|
app.use('/api/sd', require('./src/endpoints/stable-diffusion').router);
|
|
|
|
// LLM and SD Horde generation
|
|
app.use('/api/horde', require('./src/endpoints/horde').router);
|
|
|
|
// Vector storage DB
|
|
app.use('/api/vector', require('./src/endpoints/vectors').router);
|
|
|
|
// Chat translation
|
|
app.use('/api/translate', require('./src/endpoints/translate').router);
|
|
|
|
// Emotion classification
|
|
app.use('/api/extra/classify', require('./src/endpoints/classify').router);
|
|
|
|
// Image captioning
|
|
app.use('/api/extra/caption', require('./src/endpoints/caption').router);
|
|
|
|
// Web search and scraping
|
|
app.use('/api/search', require('./src/endpoints/search').router);
|
|
|
|
// The different text generation APIs
|
|
|
|
// Ooba/OpenAI text completions
|
|
app.use('/api/backends/text-completions', require('./src/endpoints/backends/text-completions').router);
|
|
|
|
// KoboldAI
|
|
app.use('/api/backends/kobold', require('./src/endpoints/backends/kobold').router);
|
|
|
|
// OpenAI chat completions
|
|
app.use('/api/backends/chat-completions', require('./src/endpoints/backends/chat-completions').router);
|
|
|
|
// Scale (alt method)
|
|
app.use('/api/backends/scale-alt', require('./src/endpoints/backends/scale-alt').router);
|
|
|
|
// Speech (text-to-speech and speech-to-text)
|
|
app.use('/api/speech', require('./src/endpoints/speech').router);
|
|
|
|
// Azure TTS
|
|
app.use('/api/azure', require('./src/endpoints/azure').router);
|
|
|
|
const tavernUrlV6 = new URL(
|
|
(cliArguments.ssl ? 'https://' : 'http://') +
|
|
(listen ? '[::]' : '[::1]') +
|
|
(':' + server_port),
|
|
);
|
|
|
|
const tavernUrl = new URL(
|
|
(cliArguments.ssl ? 'https://' : 'http://') +
|
|
(listen ? '0.0.0.0' : '127.0.0.1') +
|
|
(':' + server_port),
|
|
);
|
|
|
|
/**
|
|
* Tasks that need to be run before the server starts listening.
|
|
*/
|
|
const preSetupTasks = async function () {
|
|
const version = await getVersion();
|
|
|
|
// Print formatted header
|
|
console.log();
|
|
console.log(`SillyTavern ${version.pkgVersion}`);
|
|
console.log(version.gitBranch ? `Running '${version.gitBranch}' (${version.gitRevision}) - ${version.commitDate}` : '');
|
|
if (version.gitBranch && !version.isLatest && ['staging', 'release'].includes(version.gitBranch)) {
|
|
console.log('INFO: Currently not on the latest commit.');
|
|
console.log(' Run \'git pull\' to update. If you have any merge conflicts, run \'git reset --hard\' and \'git pull\' to reset your branch.');
|
|
}
|
|
console.log();
|
|
|
|
const directories = await userModule.getUserDirectoriesList();
|
|
await contentManager.checkForNewContent(directories);
|
|
await ensureThumbnailCache();
|
|
cleanUploads();
|
|
|
|
await settingsEndpoint.init();
|
|
await statsEndpoint.init();
|
|
|
|
const cleanupPlugins = await loadPlugins();
|
|
const consoleTitle = process.title;
|
|
|
|
let isExiting = false;
|
|
const exitProcess = async () => {
|
|
if (isExiting) return;
|
|
isExiting = true;
|
|
statsEndpoint.onExit();
|
|
if (typeof cleanupPlugins === 'function') {
|
|
await cleanupPlugins();
|
|
}
|
|
setWindowTitle(consoleTitle);
|
|
process.exit();
|
|
};
|
|
|
|
// Set up event listeners for a graceful shutdown
|
|
process.on('SIGINT', exitProcess);
|
|
process.on('SIGTERM', exitProcess);
|
|
process.on('uncaughtException', (err) => {
|
|
console.error('Uncaught exception:', err);
|
|
exitProcess();
|
|
});
|
|
|
|
// Add request proxy.
|
|
initRequestProxy({ enabled: proxyEnabled, url: proxyUrl, bypass: proxyBypass });
|
|
};
|
|
|
|
/**
|
|
* Gets the hostname to use for autorun in the browser.
|
|
* @returns {string} The hostname to use for autorun
|
|
*/
|
|
function getAutorunHostname() {
|
|
if (autorunHostname === 'auto') {
|
|
if (enableIPv6 && enableIPv4) {
|
|
if (avoidLocalhost) return '[::1]';
|
|
return 'localhost';
|
|
}
|
|
|
|
if (enableIPv6) {
|
|
return '[::1]';
|
|
}
|
|
|
|
if (enableIPv4) {
|
|
return '127.0.0.1';
|
|
}
|
|
}
|
|
|
|
return autorunHostname;
|
|
}
|
|
|
|
/**
|
|
* Tasks that need to be run after the server starts listening.
|
|
* @param {boolean} v6Failed If the server failed to start on IPv6
|
|
* @param {boolean} v4Failed If the server failed to start on IPv4
|
|
*/
|
|
const postSetupTasks = async function (v6Failed, v4Failed) {
|
|
const autorunUrl = new URL(
|
|
(cliArguments.ssl ? 'https://' : 'http://') +
|
|
(getAutorunHostname()) +
|
|
(':') +
|
|
((autorunPortOverride >= 0) ? autorunPortOverride : server_port),
|
|
);
|
|
|
|
console.log('Launching...');
|
|
|
|
if (autorun) open(autorunUrl.toString());
|
|
|
|
setWindowTitle('SillyTavern WebServer');
|
|
|
|
let logListen = 'SillyTavern is listening on';
|
|
|
|
if (enableIPv6 && !v6Failed) {
|
|
logListen += color.green(' IPv6: ' + tavernUrlV6.host);
|
|
}
|
|
|
|
if (enableIPv4 && !v4Failed) {
|
|
logListen += color.green(' IPv4: ' + tavernUrl.host);
|
|
}
|
|
|
|
const goToLog = 'Go to: ' + color.blue(autorunUrl) + ' to open SillyTavern';
|
|
const plainGoToLog = removeColorFormatting(goToLog);
|
|
|
|
console.log(logListen);
|
|
console.log('\n' + getSeparator(plainGoToLog.length) + '\n');
|
|
console.log(goToLog);
|
|
console.log('\n' + getSeparator(plainGoToLog.length) + '\n');
|
|
|
|
if (listen) {
|
|
console.log('[::] or 0.0.0.0 means SillyTavern is listening on all network interfaces (Wi-Fi, LAN, localhost). If you want to limit it only to internal localhost ([::1] or 127.0.0.1), change the setting in config.yaml to "listen: false". Check "access.log" file in the SillyTavern directory if you want to inspect incoming connections.\n');
|
|
}
|
|
|
|
if (basicAuthMode) {
|
|
const basicAuthUser = getConfigValue('basicAuthUser', {});
|
|
if (!basicAuthUser?.username || !basicAuthUser?.password) {
|
|
console.warn(color.yellow('Basic Authentication is enabled, but username or password is not set or empty!'));
|
|
}
|
|
}
|
|
};
|
|
|
|
/**
|
|
* Loads server plugins from a directory.
|
|
* @returns {Promise<Function>} Function to be run on server exit
|
|
*/
|
|
async function loadPlugins() {
|
|
try {
|
|
const pluginDirectory = path.join(serverDirectory, 'plugins');
|
|
const loader = require('./src/plugin-loader');
|
|
const cleanupPlugins = await loader.loadPlugins(app, pluginDirectory);
|
|
return cleanupPlugins;
|
|
} catch {
|
|
console.log('Plugin loading failed.');
|
|
return () => { };
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Set the title of the terminal window
|
|
* @param {string} title Desired title for the window
|
|
*/
|
|
function setWindowTitle(title) {
|
|
if (process.platform === 'win32') {
|
|
process.title = title;
|
|
}
|
|
else {
|
|
process.stdout.write(`\x1b]2;${title}\x1b\x5c`);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Prints an error message and exits the process if necessary
|
|
* @param {string} message The error message to print
|
|
* @returns {void}
|
|
*/
|
|
function logSecurityAlert(message) {
|
|
if (basicAuthMode || enableWhitelist) return; // safe!
|
|
console.error(color.red(message));
|
|
if (getConfigValue('securityOverride', false)) {
|
|
console.warn(color.red('Security has been overridden. If it\'s not a trusted network, change the settings.'));
|
|
return;
|
|
}
|
|
process.exit(1);
|
|
}
|
|
|
|
/**
|
|
* Handles the case where the server failed to start on one or both protocols.
|
|
* @param {boolean} v6Failed If the server failed to start on IPv6
|
|
* @param {boolean} v4Failed If the server failed to start on IPv4
|
|
*/
|
|
function handleServerListenFail(v6Failed, v4Failed) {
|
|
if (v6Failed && !enableIPv4) {
|
|
console.error(color.red('fatal error: Failed to start server on IPv6 and IPv4 disabled'));
|
|
process.exit(1);
|
|
}
|
|
|
|
if (v4Failed && !enableIPv6) {
|
|
console.error(color.red('fatal error: Failed to start server on IPv4 and IPv6 disabled'));
|
|
process.exit(1);
|
|
}
|
|
|
|
if (v6Failed && v4Failed) {
|
|
console.error(color.red('fatal error: Failed to start server on both IPv6 and IPv4'));
|
|
process.exit(1);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Creates an HTTPS server.
|
|
* @param {URL} url The URL to listen on
|
|
* @returns {Promise<void>} A promise that resolves when the server is listening
|
|
* @throws {Error} If the server fails to start
|
|
*/
|
|
function createHttpsServer(url) {
|
|
return new Promise((resolve, reject) => {
|
|
const server = https.createServer(
|
|
{
|
|
cert: fs.readFileSync(cliArguments.certPath),
|
|
key: fs.readFileSync(cliArguments.keyPath),
|
|
}, app);
|
|
server.on('error', reject);
|
|
server.on('listening', resolve);
|
|
server.listen(url.port || 443, url.hostname);
|
|
});
|
|
}
|
|
|
|
/**
|
|
* Creates an HTTP server.
|
|
* @param {URL} url The URL to listen on
|
|
* @returns {Promise<void>} A promise that resolves when the server is listening
|
|
* @throws {Error} If the server fails to start
|
|
*/
|
|
function createHttpServer(url) {
|
|
return new Promise((resolve, reject) => {
|
|
const server = http.createServer(app);
|
|
server.on('error', reject);
|
|
server.on('listening', resolve);
|
|
server.listen(url.port || 80, url.hostname);
|
|
});
|
|
}
|
|
|
|
async function startHTTPorHTTPS() {
|
|
let v6Failed = false;
|
|
let v4Failed = false;
|
|
|
|
const createFunc = cliArguments.ssl ? createHttpsServer : createHttpServer;
|
|
|
|
if (enableIPv6) {
|
|
try {
|
|
await createFunc(tavernUrlV6);
|
|
} catch (error) {
|
|
console.error('non-fatal error: failed to start server on IPv6');
|
|
console.error(error);
|
|
|
|
v6Failed = true;
|
|
}
|
|
}
|
|
|
|
if (enableIPv4) {
|
|
try {
|
|
await createFunc(tavernUrl);
|
|
} catch (error) {
|
|
console.error('non-fatal error: failed to start server on IPv4');
|
|
console.error(error);
|
|
|
|
v4Failed = true;
|
|
}
|
|
}
|
|
|
|
return [v6Failed, v4Failed];
|
|
}
|
|
|
|
async function startServer() {
|
|
const [v6Failed, v4Failed] = await startHTTPorHTTPS();
|
|
|
|
handleServerListenFail(v6Failed, v4Failed);
|
|
postSetupTasks(v6Failed, v4Failed);
|
|
}
|
|
|
|
async function verifySecuritySettings() {
|
|
// Skip all security checks as listen is set to false
|
|
if (!listen) {
|
|
return;
|
|
}
|
|
|
|
if (!enableAccounts) {
|
|
logSecurityAlert('Your SillyTavern is currently insecurely open to the public. Enable whitelisting, basic authentication or user accounts.');
|
|
}
|
|
|
|
const users = await userModule.getAllEnabledUsers();
|
|
const unprotectedUsers = users.filter(x => !x.password);
|
|
const unprotectedAdminUsers = unprotectedUsers.filter(x => x.admin);
|
|
|
|
if (unprotectedUsers.length > 0) {
|
|
console.warn(color.blue('A friendly reminder that the following users are not password protected:'));
|
|
unprotectedUsers.map(x => `${color.yellow(x.handle)} ${color.red(x.admin ? '(admin)' : '')}`).forEach(x => console.warn(x));
|
|
console.log();
|
|
console.warn(`Consider setting a password in the admin panel or by using the ${color.blue('recover.js')} script.`);
|
|
console.log();
|
|
|
|
if (unprotectedAdminUsers.length > 0) {
|
|
logSecurityAlert('If you are not using basic authentication or whitelisting, you should set a password for all admin users.');
|
|
}
|
|
}
|
|
}
|
|
|
|
// User storage module needs to be initialized before starting the server
|
|
userModule.initUserStorage(dataRoot)
|
|
.then(userModule.ensurePublicDirectoriesExist)
|
|
.then(userModule.migrateUserData)
|
|
.then(verifySecuritySettings)
|
|
.then(preSetupTasks)
|
|
.finally(startServer);
|