// SVR.JS - a web server running on Node.JS /* * MIT License * * Copyright (c) 2018-2024 SVR.JS * * Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */ // Check if SVR.JS is running on Node.JS-compatible runtime. If not, just error it out. if (typeof require === "undefined") { if (typeof ActiveXObject !== "undefined" && typeof WScript !== "undefined") { // If it runs on Windows Script Host, display an error message. var shell = new ActiveXObject("WScript.Shell"); shell.Popup("SVR.JS doesn't work on Windows Script Host. SVR.JS requires use of Node.JS (or compatible JS runtime).", undefined, "Can't start SVR.JS", 16); WScript.quit(); } else { if (typeof alert !== "undefined" && typeof document !== "undefined") { // If it runs on web browser, display an alert. alert("SVR.JS doesn't work on a web browser. SVR.JS requires use of Node.JS (or compatible JS runtime)."); } // If it's not, throw an error. if (typeof document !== "undefined") { throw new Error("SVR.JS doesn't work on a web browser. SVR.JS requires use of Node.JS (or compatible JS runtime)."); } else { throw new Error("SVR.JS doesn't work on Deno/QuickJS. SVR.JS requires use of Node.JS (or compatible JS runtime)."); } } } var secure = false; var disableMods = false; // ASCII art SVR.JS logo ;) var logo = ["", "", "", " \x1b[38;5;002m&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&", " &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&", " &&&\x1b[38;5;243m(((((((((((((((((((((((((((((((((((((((((((((((((((\x1b[38;5;002m&&&", " \x1b[38;5;002m&&\x1b[38;5;243m((((((\x1b[38;5;241m###########\x1b[38;5;243m(((((((((((((((((((((((\x1b[38;5;011m***\x1b[38;5;243m(\x1b[38;5;011m***\x1b[38;5;243m(\x1b[38;5;011m***\x1b[38;5;243m((\x1b[38;5;002m&&", " \x1b[38;5;002m&&&\x1b[38;5;243m(((((((((((((((((((((((((((((((((((((((((((((((((((\x1b[38;5;002m&&&", " \x1b[38;5;002m&&&\x1b[38;5;243m(((((((((((((((((((((((((((((((((((((((((((((((((((\x1b[38;5;002m&&&", " \x1b[38;5;002m&&\x1b[38;5;243m((((((\x1b[38;5;241m###########\x1b[38;5;243m(((((((((((((((((((((((\x1b[38;5;011m***\x1b[38;5;243m(\x1b[38;5;015m \x1b[38;5;243m(\x1b[38;5;011m***\x1b[38;5;243m((\x1b[38;5;002m&&", " \x1b[38;5;002m&&&\x1b[38;5;243m(((((((((((((((((((((((((((((((((((((((((((((((((((\x1b[38;5;002m&&&", " \x1b[38;5;002m&&&\x1b[38;5;243m(((((((((((((((((((((((((((((((((((((((((((((((((((\x1b[38;5;002m&&&", " \x1b[38;5;002m&&\x1b[38;5;243m((((((\x1b[38;5;241m###########\x1b[38;5;243m(((((((((((((((((((((((\x1b[38;5;015m \x1b[38;5;243m(\x1b[38;5;015m \x1b[38;5;243m(\x1b[38;5;015m \x1b[38;5;243m((\x1b[38;5;002m&&", " \x1b[38;5;002m&&&\x1b[38;5;243m(((((((((((((((((((((((((((((((((((((((((((((((((((\x1b[38;5;002m&&&", " \x1b[38;5;002m&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&", " \x1b[38;5;002m&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&", " \x1b[38;5;002m&&&&&&&&\x1b[38;5;010m#########################################\x1b[38;5;002m&&&&&&&&", " \x1b[38;5;002m&&&&&\x1b[38;5;010m###############################################\x1b[38;5;002m&&&&&", " \x1b[38;5;002m&&&\x1b[38;5;010m###################################################\x1b[38;5;002m&&&", " \x1b[38;5;002m&&\x1b[38;5;010m####\x1b[38;5;016m@@@@@@\x1b[38;5;010m#\x1b[38;5;016m@@@\x1b[38;5;010m###\x1b[38;5;016m@@@\x1b[38;5;010m#\x1b[38;5;016m@@@@@@@\x1b[38;5;010m###########\x1b[38;5;016m@@\x1b[38;5;010m##\x1b[38;5;016m@@@@@@\x1b[38;5;010m####\x1b[38;5;002m&&", " \x1b[38;5;002m&&\x1b[38;5;010m###\x1b[38;5;016m@@\x1b[38;5;010m#######\x1b[38;5;016m@@\x1b[38;5;010m###\x1b[38;5;016m@@\x1b[38;5;010m##\x1b[38;5;016m@@\x1b[38;5;010m####\x1b[38;5;016m@@\x1b[38;5;010m##########\x1b[38;5;016m@@\x1b[38;5;010m#\x1b[38;5;016m@@\x1b[38;5;010m#########\x1b[38;5;002m&&", " \x1b[38;5;002m&&\x1b[38;5;010m######\x1b[38;5;040m#\x1b[38;5;016m@@@@\x1b[38;5;010m##\x1b[38;5;016m@@\x1b[38;5;010m#\x1b[38;5;016m@@\x1b[38;5;010m###\x1b[38;5;016m@@@@@@@\x1b[38;5;010m#######\x1b[38;5;016m@@\x1b[38;5;010m##\x1b[38;5;016m@@\x1b[38;5;010m####\x1b[38;5;040m#\x1b[38;5;016m@@@@\x1b[38;5;010m###\x1b[38;5;002m&&", " \x1b[38;5;002m&&\x1b[38;5;010m###\x1b[38;5;016m@@\x1b[38;5;034m%\x1b[38;5;010m###\x1b[38;5;016m@@\x1b[38;5;010m###\x1b[38;5;016m@@@\x1b[38;5;010m####\x1b[38;5;016m@@\x1b[38;5;010m####\x1b[38;5;016m@@\x1b[38;5;010m##\x1b[38;5;016m@@\x1b[38;5;010m###\x1b[38;5;016m@@@@\x1b[38;5;010m##\x1b[38;5;016m@@\x1b[38;5;034m%\x1b[38;5;010m###\x1b[38;5;016m@@\x1b[38;5;010m###\x1b[38;5;002m&&", " \x1b[38;5;002m&&\x1b[38;5;010m#####################################################\x1b[38;5;002m&&", " \x1b[38;5;002m&&&\x1b[38;5;010m###################################################\x1b[38;5;002m&&&", " \x1b[38;5;002m&&&&&\x1b[38;5;010m###############################################\x1b[38;5;002m&&&&&", " \x1b[38;5;002m&&&&&&&&\x1b[38;5;010m#########################################\x1b[38;5;002m&&&&&&&&", " \x1b[38;5;002m&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&", " &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&", " &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&", " \x1b[38;5;246m///////", " ///////", " \x1b[38;5;208m((((/))))", " \x1b[38;5;208m(((((/)))))", " \x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m///\x1b[38;5;247m*\x1b[38;5;246m///\x1b[38;5;247m*\x1b[38;5;246m///\x1b[38;5;247m*\x1b[38;5;246m///\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m/\x1b[38;5;208m(((((/)))))\x1b[38;5;246m//\x1b[38;5;247m*\x1b[38;5;246m///\x1b[38;5;247m*\x1b[38;5;246m///\x1b[38;5;247m*\x1b[38;5;246m///\x1b[38;5;247m*\x1b[38;5;246m///\x1b[38;5;247m*\x1b[38;5;246m/", " //\x1b[38;5;247m*\x1b[38;5;246m///////\x1b[38;5;247m*\x1b[38;5;246m///////\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m/\x1b[38;5;208m(((((/)))))\x1b[38;5;246m//\x1b[38;5;247m*\x1b[38;5;246m///////\x1b[38;5;247m*\x1b[38;5;246m///////\x1b[38;5;247m*\x1b[38;5;246m//", " *\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;208m(((((/)))))\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*\x1b[38;5;246m/\x1b[38;5;247m*", " \x1b[38;5;208m((((/))))", "", "", "", "\x1b[0m"]; var fs = require("fs"); function factoryReset() { console.log("Removing logs..."); deleteFolderRecursive(__dirname + "/log"); fs.mkdirSync(__dirname + "/log"); console.log("Removing temp folder..."); deleteFolderRecursive(__dirname + "/temp"); fs.mkdirSync(__dirname + "/temp"); console.log("Removing configuration file..."); fs.unlinkSync("config.json"); console.log("Done!"); process.exit(0); } function deleteFolderRecursive(path) { if (fs.existsSync(path)) { fs.readdirSync(path).forEach(function (file) { var curPath = path + "/" + file; if (fs.statSync(curPath).isDirectory()) { // recurse deleteFolderRecursive(curPath); } else { // delete file fs.unlinkSync(curPath); } }); fs.rmdirSync(path); } } var os = require("os"); var version = "Nightly-GitMain"; var singlethreaded = false; if (process.versions) process.versions.svrjs = version; // Inject SVR.JS into process.versions var args = process.argv; for (var i = (process.argv[0].indexOf("node") > -1 || process.argv[0].indexOf("bun") > -1 ? 2 : 1); i < args.length; i++) { if (args[i] == "-h" || args[i] == "--help" || args[i] == "-?" || args[i] == "/h" || args[i] == "/?") { console.log("SVR.JS usage:"); console.log("node svr.js [-h] [--help] [-?] [/h] [/?] [--secure] [--reset] [--clean] [--disable-mods] [--single-threaded] [-v] [--version]"); console.log("-h -? /h /? --help -- Displays help"); console.log("--clean -- Cleans up files created by SVR.JS"); console.log("--reset -- Resets SVR.JS to default settings (WARNING: DANGEROUS)"); console.log("--secure -- Runs HTTPS server"); console.log("--disable-mods -- Disables mods (safe mode)"); console.log("--single-threaded -- Run single-threaded"); console.log("-v --version -- Display server version"); process.exit(0); } else if (args[i] == "--secure") { secure = true; } else if (args[i] == "-v" || args[i] == "--version") { console.log("SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")"); process.exit(0); } else if (args[i] == "--clean") { console.log("Removing logs..."); deleteFolderRecursive(__dirname + "/log"); fs.mkdirSync(__dirname + "/log"); console.log("Removing temp folder..."); deleteFolderRecursive(__dirname + "/temp"); fs.mkdirSync(__dirname + "/temp"); console.log("Done!"); process.exit(0); } else if (args[i] == "--reset") { factoryReset(); } else if (args[i] == "--disable-mods") { disableMods = true; } else if (args[i] == "--single-threaded") { singlethreaded = true; } else { console.log("Unrecognized argument: " + args[i]); console.log("SVR.JS usage:"); console.log("node svr.js [-h] [--help] [-?] [/h] [/?] [--secure] [--reset] [--clean] [--disable-mods] [--single-threaded] [-v] [--version]"); console.log("-h -? /h /? --help -- Displays help"); console.log("--clean -- Cleans up files created by SVR.JS"); console.log("--reset -- Resets SVR.JS to default settings (WARNING: DANGEROUS)"); console.log("--secure -- Runs HTTPS server"); console.log("--disable-mods -- Disables mods (safe mode)"); console.log("--single-threaded -- Run single-threaded"); console.log("-v --version -- Display server version"); process.exit(1); } } var readline = require("readline"); var net = require("net"); var cluster = {}; if (!singlethreaded) { try { // Import cluster module var cluster = require("cluster"); } catch (err) { // Clustering is not supported! } // Cluster & IPC shim for Bun cluster.bunShim = function () { cluster.isMaster = !process.env.NODE_UNIQUE_ID; cluster.isPrimary = cluster.isMaster; cluster.isWorker = !cluster.isMaster; cluster.__shimmed__ = true; if (cluster.isWorker) { // Shim the cluster.worker object for worker processes cluster.worker = { id: parseInt(process.env.NODE_UNIQUE_ID), process: process, isDead: function () { return false; }, send: function (message, b, c, d) { process.send(message, b, c, d); } }; if (!process.send) { // Shim the process.send function for worker processes var net = require("net"); var os = require("os"); var path = require("path"); // Create a fake IPC server to receive messages var fakeIPCServer = net.createServer(function (socket) { var receivedData = ""; socket.on("data", function (data) { receivedData += data.toString(); }); socket.on("end", function () { process.emit("message", receivedData); }); }); fakeIPCServer.listen(os.platform() === "win32" ? path.join("\\\\?\\pipe", __dirname, "temp/.W" + process.pid + ".ipc") : (__dirname + "/temp/.W" + process.pid + ".ipc")); process.send = function (message) { // Create a fake IPC connection to send messages var fakeIPCConnection = net.createConnection(os.platform() === "win32" ? path.join("\\\\?\\pipe", __dirname, "temp/.P" + process.pid + ".ipc") : (__dirname + "/temp/.P" + process.pid + ".ipc"), function () { fakeIPCConnection.end(message); }); }; process.removeFakeIPC = function () { // Close IPC server process.send = function () {}; fakeIPCServer.close(); }; } } // Custom implementation for cluster.fork() cluster._workersCounter = 1; cluster.workers = {}; cluster.fork = function (env) { var child_process = require("child_process"); var newEnvironment = JSON.parse(JSON.stringify(env ? env : process.env)); newEnvironment.NODE_UNIQUE_ID = cluster._workersCounter; var newArguments = JSON.parse(JSON.stringify(process.argv)); var command = newArguments.shift(); var newWorker = child_process.spawn(command, newArguments, { env: newEnvironment, stdio: ["inherit", "inherit", "inherit", "ipc"] }); newWorker.process = newWorker; newWorker.isDead = function () { return newWorker.exitCode !== null || newWorker.killed; }; newWorker.id = newEnvironment.NODE_UNIQUE_ID; function checkSendImplementation(worker) { var sendImplemented = true; if (!(process.versions && process.versions.bun && process.versions.bun[0] != "0")) { if (!worker.send) { sendImplemented = false; } var oldLog = console.log; console.log = function (a, b, c, d, e, f) { if (a == "ChildProcess.prototype.send() - Sorry! Not implemented yet") { throw new Error("NOT IMPLEMENTED"); } else { oldLog(a, b, c, d, e, f); } }; try { worker.send(undefined); } catch (err) { if (err.message === "NOT IMPLEMENTED") { sendImplemented = false; } console.log(err); } console.log = oldLog; } return sendImplemented; } if (!checkSendImplementation(newWorker)) { var net = require("net"); var os = require("os"); // Create a fake IPC server for worker process to receive messages var fakeWorkerIPCServer = net.createServer(function (socket) { var receivedData = ""; socket.on("data", function (data) { receivedData += data.toString(); }); socket.on("end", function () { newWorker.emit("message", receivedData); }); }); fakeWorkerIPCServer.listen(os.platform() === "win32" ? path.join("\\\\?\\pipe", __dirname, "temp/.P" + newWorker.process.pid + ".ipc") : (__dirname + "/temp/.P" + newWorker.process.pid + ".ipc")); // Cleanup when worker process exits newWorker.on("exit", function () { fakeWorkerIPCServer.close(); delete cluster.workers[newWorker.id]; }); newWorker.send = function (message, fakeParam2, fakeParam3, fakeParam4, tries) { if (!tries) tries = 0; try { // Create a fake IPC connection to send messages to worker process var fakeWorkerIPCConnection = net.createConnection(os.platform() === "win32" ? path.join("\\\\?\\pipe", __dirname, "temp/.W" + newWorker.process.pid + ".ipc") : (__dirname + "/temp/.W" + newWorker.process.pid + ".ipc"), function () { fakeWorkerIPCConnection.end(message); }); } catch (err) { if (tries > 50) throw err; newWorker.send(message, fakeParam2, fakeParam3, fakeParam4, tries + 1); } }; } else { newWorker.on("exit", function () { delete cluster.workers[newWorker.id]; }); } cluster.workers[newWorker.id] = newWorker; cluster._workersCounter++; return newWorker; }; }; if (process.isBun && (cluster.isMaster === undefined || (cluster.isMaster && process.env.NODE_UNIQUE_ID))) { cluster.bunShim(); } // Shim cluster.isPrimary field if (cluster.isPrimary === undefined && cluster.isMaster !== undefined) cluster.isPrimary = cluster.isMaster; } // ETag-related var ETagDB = {}; function generateETag(filePath, stat) { if (!ETagDB[filePath + "-" + stat.size + "-" + stat.mtime]) ETagDB[filePath + "-" + stat.size + "-" + stat.mtime] = sha256(filePath + "-" + stat.size + "-" + stat.mtime); return ETagDB[filePath + "-" + stat.size + "-" + stat.mtime]; } // Brute force protection-related var bruteForceDb = {}; // PBKDF2/scrypt cache var pbkdf2Cache = []; var scryptCache = []; var passwordHashCacheIntervalId = -1; // SVR.JS worker spawn-related var SVRJSInitialized = false; var exiting = false; var reallyExiting = false; var crashed = false; var threadLimitWarned = false; // SVR.JS worker forking function function SVRJSFork() { // Log if (SVRJSInitialized) serverconsole.locmessage("Starting next thread, because previous one hung up/crashed..."); // Fork new worker var newWorker = {}; try { if (!threadLimitWarned && cluster.__shimmed__ && process.isBun && process.versions.bun && process.versions.bun[0] != "0") { threadLimitWarned = true; serverconsole.locwarnmessage("SVR.JS limited the number of workers to one, because of startup problems in Bun 1.0 and newer with shimmed (not native) clustering module. Reliability may suffer."); } if (!(cluster.__shimmed__ && process.isBun && process.versions.bun && process.versions.bun[0] != "0" && Object.keys(cluster.workers) > 0)) { newWorker = cluster.fork(); } else { if (SVRJSInitialized) serverconsole.locwarnmessage("SVR.JS limited the number of workers to one, because of startup problems in Bun 1.0 and newer with shimmed (not native) clustering module. Reliability may suffer."); } } catch (err) { if (err.name == "NotImplementedError") { // If cluster.fork throws a NotImplementedError, shim cluster module cluster.bunShim(); if (!threadLimitWarned && cluster.__shimmed__ && process.isBun && process.versions.bun && process.versions.bun[0] != "0") { threadLimitWarned = true; serverconsole.locwarnmessage("SVR.JS limited the number of workers to one, because of startup problems in Bun 1.0 and newer with shimmed (not native) clustering module. Reliability may suffer."); } if (!(cluster.__shimmed__ && process.isBun && process.versions.bun && process.versions.bun[0] != "0" && Object.keys(cluster.workers) > 0)) { newWorker = cluster.fork(); } else { if (SVRJSInitialized) serverconsole.locwarnmessage("SVR.JS limited the number of workers to one, because of startup problems in Bun 1.0 and newer with shimmed (not native) clustering module. Reliability may suffer."); } } else { throw err; } } // Add event listeners if (newWorker.on) { newWorker.on("error", function (err) { if (!reallyExiting) serverconsole.locwarnmessage("There was a problem when handling SVR.JS worker! (from master process side) Reason: " + err.message); }); newWorker.on("exit", function () { if (!exiting && Object.keys(cluster.workers).length == 0) { crashed = true; SVRJSFork(); } }); newWorker.on("message", bruteForceListenerWrapper(newWorker)); newWorker.on("message", listenConnListener); } } var http = require("http"); http.STATUS_CODES[497] = "HTTP Request Sent to HTTPS Port"; http.STATUS_CODES[598] = "Network Read Timeout Error"; http.STATUS_CODES[599] = "Network Connect Timeout Error"; var url = require("url"); var dns = require("dns"); try { var gracefulFs = require("graceful-fs"); if (!process.isBun) gracefulFs.gracefulify(fs); // Bun + graceful-fs + SVR.JS + requests about static content = 500 Internal Server Error! } catch (err) { // Don't use graceful-fs } var path = require("path"); var hexstrbase64 = undefined; try { hexstrbase64 = require("./hexstrbase64/index.js"); } catch (err) { // Don't use hexstrbase64 } var inspector = undefined; try { inspector = require("inspector"); } catch (err) { // Don't use inspector } var zlib = require("zlib"); var tar = undefined; try { tar = require("tar"); } catch (err) { tar = { _errored: err }; } var formidable = undefined; try { formidable = require("formidable"); } catch (err) { formidable = { _errored: err }; } var ocsp = undefined; var ocspCache = undefined; try { ocsp = require("ocsp"); ocspCache = new ocsp.Cache(); } catch (err) { ocsp = { _errored: err }; } var http2 = {}; try { http2 = require("http2"); if (process.isBun) { try { http2.Http2ServerRequest(); } catch (err) { if (err.name == "NotImplementedError" || err.code == "ERR_NOT_IMPLEMENTED") throw err; } } } catch (err) { http2.__disabled__ = null; http2.createServer = function () { throw new Error("HTTP/2 support is not present"); }; http2.createSecureServer = function () { throw new Error("HTTP/2 support is not present"); }; http2.connect = function () { throw new Error("HTTP/2 support is not present"); }; http2.get = function () { throw new Error("HTTP/2 support is not present"); }; } var crypto = {}; var https = {}; try { crypto = require("crypto"); https = require("https"); } catch (err) { crypto = { __disabled__: null }; https = { createServer: function () { throw new Error("Crypto support is not present"); }, connect: function () { throw new Error("Crypto support is not present"); }, get: function () { throw new Error("Crypto support is not present"); } }; http2.createSecureServer = function () { throw new Error("Crypto support is not present"); }; } var mime = require("mime-types"); var pubip = ""; var listenAddress = undefined; var sListenAddress = undefined; var pubport = 80; var port = 80; var domain = ""; var spubport = 443; var sport = 443; var mods = []; if (!fs.existsSync(__dirname + "/log")) fs.mkdirSync(__dirname + "/log"); if (!fs.existsSync(__dirname + "/mods")) fs.mkdirSync(__dirname + "/mods"); if (!fs.existsSync(__dirname + "/temp")) fs.mkdirSync(__dirname + "/temp"); var modFiles = fs.readdirSync(__dirname + "/mods").sort(); var modInfos = []; function sizify(bytes, addI) { if (bytes == 0) return "0"; if (bytes < 0) bytes = -bytes; var prefixes = ["", "K", "M", "G", "T", "P", "E", "Z", "Y", "R", "Q"]; var prefixIndex = Math.floor(Math.log2 ? Math.log2(bytes) / 10 : (Math.log(bytes) / (Math.log(2) * 10))); if (prefixIndex >= prefixes.length - 1) prefixIndex = prefixes.length - 1; var prefixIndexTranslated = Math.pow(2, 10 * prefixIndex); var decimalPoints = 2 - Math.floor(Math.log10 ? Math.log10(bytes / prefixIndexTranslated) : (Math.log(bytes / prefixIndexTranslated) / Math.log(10))); if (decimalPoints < 0) decimalPoints = 0; return (Math.ceil((bytes / prefixIndexTranslated) * Math.pow(10, decimalPoints)) / Math.pow(10, decimalPoints)) + prefixes[prefixIndex] + ((prefixIndex > 0 && addI) ? "i" : ""); } function getOS() { var osType = os.type(); var platform = os.platform(); if (platform == "android") { return "Android"; } else if (osType == "Windows_NT" || osType == "WindowsNT") { var arch = os.arch(); if (arch == "ia32") { return "Win32"; } else if (arch == "x64") { return "Win64"; } else { return "Win" + arch.toUpperCase(); } } else if (osType.indexOf("CYGWIN") == 0) { return "Cygwin"; } else if (osType.indexOf("MINGW") == 0) { return "MinGW"; } else if (osType.indexOf("MSYS") == 0) { return "MSYS"; } else if (osType.indexOf("UWIN") == 0) { return "UWIN"; } else if (osType == "GNU") { return "GNU Hurd"; } else { return osType; } } function createRegex(regex, isPath) { var regexStrMatch = regex.match(/^\/((?:\\.|[^\/\\])*)\/([a-zA-Z0-9]*)$/); if (!regexStrMatch) throw new Error("Invalid regular expression: " + regex); var searchString = regexStrMatch[1]; var modifiers = regexStrMatch[2]; if (isPath && !modifiers.match(/i/i) && os.platform() == "win32") modifiers += "i"; return new RegExp(searchString, modifiers); } // Function to check if IPs are equal function ipMatch(IP1, IP2) { if (!IP1) return true; if (!IP2) return false; // Function to normalize IPv4 address (remove leading zeros) function normalizeIPv4Address(address) { return address.replace(/(^|\.)(?:0(?!\.|$))+/g, ""); } // Function to expand IPv6 address to full format function expandIPv6Address(address) { var fullAddress = ""; var expandedAddress = ""; var validGroupCount = 8; var validGroupSize = 4; var ipv4 = ""; var extractIpv4 = /([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})/; var validateIpv4 = /((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3})/; if (validateIpv4.test(address)) { var oldGroups = address.match(extractIpv4); for (var i = 1; i < oldGroups.length; i++) { ipv4 += ("00" + (parseInt(oldGroups[i], 10).toString(16))).slice(-2) + (i == 2 ? ":" : ""); } address = address.replace(extractIpv4, ipv4); } if (address.indexOf("::") == -1) { fullAddress = address; } else { var sides = address.split("::"); var groupsPresent = 0; sides.forEach(function (side) { groupsPresent += side.split(":").length; }); fullAddress += sides[0] + ":"; if (validGroupCount - groupsPresent > 1) { fullAddress += "0000:".repeat(validGroupCount - groupsPresent); } fullAddress += sides[1]; } var groups = fullAddress.split(":"); for (var i = 0; i < validGroupCount; i++) { if (groups[i].length < validGroupSize) { groups[i] = "0".repeat(validGroupSize - groups[i].length) + groups[i]; } expandedAddress += (i != validGroupCount - 1) ? groups[i] + ":" : groups[i]; } return expandedAddress; } // Normalize or expand IP addresses IP1 = IP1.toLowerCase(); if (IP1 == "localhost") IP1 = "::1"; if (IP1.indexOf("::ffff:") == 0) IP1 = IP1.substring(7); if (IP1.indexOf(":") > -1) { IP1 = expandIPv6Address(IP1); } else { IP1 = normalizeIPv4Address(IP1); } IP2 = IP2.toLowerCase(); if (IP2 == "localhost") IP2 = "::1"; if (IP2.indexOf("::ffff:") == 0) IP2 = IP2.substring(7); if (IP2.indexOf(":") > -1) { IP2 = expandIPv6Address(IP2); } else { IP2 = normalizeIPv4Address(IP2); } // Check if processed IPs are equal if (IP1 == IP2) return true; else return false; } function checkForEnabledDirectoryListing(hostname, localAddress) { function matchHostname(hostnameM) { if (typeof hostnameM == "undefined" || hostnameM == "*") { return true; } else if (hostname && hostnameM.indexOf("*.") == 0 && hostnameM != "*.") { var hostnamesRoot = hostnameM.substring(2); if (hostname == hostnamesRoot || (hostname.length > hostnamesRoot.length && hostname.indexOf("." + hostnamesRoot) == hostname.length - hostnamesRoot.length - 1)) { return true; } } else if (hostname && hostname == hostnameM) { return true; } return false; } var main = (configJSON.enableDirectoryListing || configJSON.enableDirectoryListing === undefined); if (!configJSON.enableDirectoryListingVHost) return main; var vhostP = null; configJSON.enableDirectoryListingVHost.every(function (vhost) { if (matchHostname(vhost.host) && ipMatch(vhost.ip, localAddress)) { vhostP = vhost; return false; } else { return true; } }); if (!vhostP || vhostP.enabled === undefined) return main; else return vhostP.enabled; } // IP Block list object function ipBlockList(rawBlockList) { // Initialize the instance with empty arrays if (rawBlockList === undefined) rawBlockList = []; var instance = { raw: [], rawtoPreparedMap: [], prepared: [], cidrs: [] }; // Function to normalize IPv4 address (remove leading zeros) function normalizeIPv4Address(address) { return address.replace(/(^|\.)(?:0(?!\.|$))+/g, ""); } // Function to expand IPv6 address to full format function expandIPv6Address(address) { var fullAddress = ""; var expandedAddress = ""; var validGroupCount = 8; var validGroupSize = 4; var ipv4 = ""; var extractIpv4 = /([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})/; var validateIpv4 = /((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3})/; if (validateIpv4.test(address)) { var oldGroups = address.match(extractIpv4); for (var i = 1; i < oldGroups.length; i++) { ipv4 += ("00" + (parseInt(oldGroups[i], 10).toString(16))).slice(-2) + (i == 2 ? ":" : ""); } address = address.replace(extractIpv4, ipv4); } if (address.indexOf("::") == -1) { fullAddress = address; } else { var sides = address.split("::"); var groupsPresent = 0; sides.forEach(function (side) { groupsPresent += side.split(":").length; }); fullAddress += sides[0] + ":"; if (validGroupCount - groupsPresent > 1) { fullAddress += "0000:".repeat(validGroupCount - groupsPresent); } fullAddress += sides[1]; } var groups = fullAddress.split(":"); for (var i = 0; i < validGroupCount; i++) { if (groups[i].length < validGroupSize) { groups[i] = "0".repeat(validGroupSize - groups[i].length) + groups[i]; } expandedAddress += (i != validGroupCount - 1) ? groups[i] + ":" : groups[i]; } return expandedAddress; } // Convert IPv4 address to an integer representation function ipv4ToInt(ip) { var ips = ip.split("."); return parseInt(ips[0]) * 16777216 + parseInt(ips[1]) * 65536 + parseInt(ips[2]) * 256 + parseInt(ips[3]); } // Get IPv4 CIDR block limits (min and max) function getIPv4CIDRLimits(ip, cidrMask) { var ipInt = ipv4ToInt(ip); var exp = Math.pow(2, 32 - cidrMask); var ipMin = Math.floor(ipInt / exp) * exp; var ipMax = ipMin + exp - 1; return { min: ipMin, max: ipMax }; } // Convert IPv6 address to an array of blocks function ipv6ToBlocks(ip) { var ips = ip.split(":"); var ip2s = []; ips.forEach(function (ipe) { ip2s.push(parseInt(ipe)); }); return ip2s; } // Get IPv6 CIDR block limits (min and max) function getIPv6CIDRLimits(ip, cidrMask) { var ipBlocks = ipv6ToBlocks(ip); var fieldsToDelete = Math.floor((128 - cidrMask) / 16); var fieldMaskModify = (128 - cidrMask) % 16; var ipBlockMin = []; var ipBlockMax = []; for (var i = 0; i < 8; i++) { ipBlockMin.push((i < 8 - fieldsToDelete) ? ((i < 7 - fieldsToDelete) ? ipBlocks[i] : (ipBlocks[i] >> fieldMaskModify << fieldMaskModify)) : 0); } for (var i = 0; i < 8; i++) { ipBlockMax.push((i < 8 - fieldsToDelete) ? ((i < 7 - fieldsToDelete) ? ipBlocks[i] : ((ipBlocks[i] >> fieldMaskModify << fieldMaskModify) + Math.pow(2, fieldMaskModify) - 1)) : 65535); } return { min: ipBlockMin, max: ipBlockMax }; } // Check if the IPv4 address matches the given CIDR block function checkIfIPv4CIDRMatches(ipInt, cidrObject) { if (cidrObject.v6) return false; return ipInt >= cidrObject.min && ipInt <= cidrObject.max; } // Check if the IPv6 address matches the given CIDR block function checkIfIPv6CIDRMatches(ipBlock, cidrObject) { if (!cidrObject.v6) return false; for (var i = 0; i < 8; i++) { if (ipBlock[i] < cidrObject.min[i] || ipBlock[i] > cidrObject.max[i]) return true; } return false; } // Function to add an IP or CIDR block to the block list instance.add = function (rawValue) { // Add to raw block list instance.raw.push(rawValue); // Initialize variables var beginIndex = instance.prepared.length; var cidrIndex = instance.cidrs.length; var cidrMask = null; var isIPv6 = false; // Check if the input contains CIDR notation if (rawValue.indexOf("/") > -1) { var rwArray = rawValue.split("/"); cidrMask = rwArray.pop(); rawValue = rwArray.join("/"); } // Normalize the IP address or expand the IPv6 address rawValue = rawValue.toLowerCase(); if (rawValue.indexOf("::ffff:") == 0) rawValue = rawValue.substring(7); if (rawValue.indexOf(":") > -1) { isIPv6 = true; rawValue = expandIPv6Address(rawValue); } else { rawValue = normalizeIPv4Address(rawValue); } // Add the IP or CIDR block to the appropriate list if (cidrMask) { var cidrLimits = {}; if (isIPv6) { cidrLimits = getIPv6CIDRLimits(rawValue, cidrMask); cidrLimits.v6 = true; } else { cidrLimits = getIPv4CIDRLimits(rawValue, cidrMask); cidrLimits.v6 = false; } instance.cidrs.push(cidrLimits); instance.rawtoPreparedMap.push({ cidr: true, index: cidrIndex }); } else { instance.prepared.push(rawValue); instance.rawtoPreparedMap.push({ cidr: false, index: beginIndex }); } }; // Function to remove an IP or CIDR block from the block list instance.remove = function (ip) { var index = instance.raw.indexOf(ip); if (index == -1) return false; var map = instance.rawtoPreparedMap[index]; instance.raw.splice(index, 1); instance.rawtoPreparedMap.splice(index, 1); if (map.cidr) { instance.cidrs.splice(map.index, 1); } else { instance.prepared.splice(map.index, 1); } return true; }; // Function to check if an IP is blocked by the block list instance.check = function (rawValue) { if (instance.raw.length == 0) return false; var isIPv6 = false; // Normalize or expand the IP address rawValue = rawValue.toLowerCase(); if (rawValue == "localhost") rawValue = "::1"; if (rawValue.indexOf("::ffff:") == 0) rawValue = rawValue.substring(7); if (rawValue.indexOf(":") > -1) { isIPv6 = true; rawValue = expandIPv6Address(rawValue); } else { rawValue = normalizeIPv4Address(rawValue); } // Check if the IP is in the prepared list if (instance.prepared.indexOf(rawValue) > -1) return true; // Check if the IP is within any CIDR block in the block list if (instance.cidrs.length == 0) return false; var ipParsedObject = (!isIPv6 ? ipv4ToInt : ipv6ToBlocks)(rawValue); var checkMethod = (!isIPv6 ? checkIfIPv4CIDRMatches : checkIfIPv6CIDRMatches); return instance.cidrs.some(function (iCidr) { return checkMethod(ipParsedObject, iCidr); }); }; // Add initial raw block list values to the instance rawBlockList.forEach(function (rbe) { instance.add(rbe); }); return instance; } // Generate V8-style error stack from Error object. function generateErrorStack(errorObject) { // Split the error stack by newlines. var errorStack = errorObject.stack ? errorObject.stack.split("\n") : []; // If the error stack starts with the error name, return the original stack (it is V8-style then). if (errorStack.some(function (errorStackLine) { return (errorStackLine.indexOf(errorObject.name) == 0); })) { return errorObject.stack; } // Create a new error stack with the error name and code (if available). var newErrorStack = [errorObject.name + (errorObject.code ? ": " + errorObject.code : "") + (errorObject.message == "" ? "" : ": " + errorObject.message)]; // Process each line of the original error stack. errorStack.forEach(function (errorStackLine) { if (errorStackLine != "") { // Split the line into function and location parts (if available). var errorFrame = errorStackLine.split("@"); var location = ""; if (errorFrame.length > 1) location = errorFrame.pop(); var func = errorFrame.join("@"); // Build the new error stack entry with function and location information. newErrorStack.push(" at " + (func == "" ? (!location || location == "" ? "" : location) : (func + (!location || location == "" ? "" : " (" + location + ")")))); } }); // Join the new error stack entries with newlines and return the final stack. return newErrorStack.join("\n"); } function calculateBroadcastIPv4FromCidr(ipWithCidr) { // Check if CIDR notation is valid, if it's not, return null if (!ipWithCidr) return null; var ipCA = ipWithCidr.split("/"); if (ipCA.length != 2) return null; // Extract IP and mask (numberic format) var ip = ipCA[0]; var mask = parseInt(ipCA[1]); return ip.split(".").map(function (num, index) { // Calculate resulting 8-bit var power = Math.max(Math.min(mask - (index * 8), 8), 0); return ((parseInt(num) & ((Math.pow(2, power) - 1) << (8 - power))) | Math.pow(2, 8 - power) - 1).toString(); }).join("."); } function calculateNetworkIPv4FromCidr(ipWithCidr) { // Check if CIDR notation is valid, if it's not, return null if (!ipWithCidr) return null; var ipCA = ipWithCidr.split("/"); if (ipCA.length != 2) return null; // Extract IP and mask (numberic format) var ip = ipCA[0]; var mask = parseInt(ipCA[1]); return ip.split(".").map(function (num, index) { // Calculate resulting 8-bit var power = Math.max(Math.min(mask - (index * 8), 8), 0); return ((parseInt(num) & ((Math.pow(2, power) - 1) << (8 - power)))).toString(); }).join("."); } var inspectorURL = undefined; try { if (inspector) { inspectorURL = inspector.url(); } } catch (err) { // Failed to get inspector URL } if (!process.stdout.isTTY && !inspectorURL) { // When stdout is not a terminal and not attached to an Node.JS inspector, disable it to improve performance of SVR.JS console.log = function () {}; process.stdout.write = function () {}; process.stdout._write = function () {}; process.stdout._writev = function () {}; } // IP and network inteface-related var ifaces = {}; var ifaceEx = null; try { ifaces = os.networkInterfaces(); } catch (err) { ifaceEx = err; } var ips = []; var brdIPs = ["255.255.255.255", "127.255.255.255", "0.255.255.255"]; var netIPs = ["127.0.0.0"]; Object.keys(ifaces).forEach(function (ifname) { var alias = 0; ifaces[ifname].forEach(function (iface) { if (iface.family !== "IPv4" || iface.internal !== false) { return; } if (alias >= 1) { ips.push(ifname + ":" + alias, iface.address); } else { ips.push(ifname, iface.address); } brdIPs.push(calculateBroadcastIPv4FromCidr(iface.cidr)); netIPs.push(calculateNetworkIPv4FromCidr(iface.cidr)); alias++; }); }); if (ips.length == 0) { Object.keys(ifaces).forEach(function (ifname) { var alias = 0; ifaces[ifname].forEach(function (iface) { if (iface.family !== "IPv6" || iface.internal !== false) { return; } if (alias >= 1) { ips.push(ifname + ":" + alias, iface.address); } else { ips.push(ifname, iface.address); } alias++; }); }); } // Server startup attempt counter var attmts = 5; var attmtsRedir = 5; // Some variables... var errors = os.constants.errno; var timestamp = new Date().getTime(); // Server IP address var host = ips[(ips.length) - 1]; if (!host) host = "[offline]"; // Public IP address-related var ipRequestCompleted = false; var ipRequestGotError = false; if (host != "[offline]" || ifaceEx) { var ipRequest = (crypto.__disabled__ !== undefined ? http : https).get({ host: "api64.ipify.org", port: (crypto.__disabled__ !== undefined ? 80 : 443), path: "/", headers: { "User-Agent": (exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS") }, timeout: 5000 }, function (res) { ipRequest.removeAllListeners("timeout"); res.on("data", function (d) { if (res.statusCode != 200) { ipRequestCompleted = true; process.emit("ipRequestCompleted"); return; } pubip = d.toString(); if (domain) { ipRequestCompleted = true; process.emit("ipRequestCompleted"); } else { var callbackDone = false; var dnsTimeout = setTimeout(function () { callbackDone = true; ipRequestCompleted = true; process.emit("ipRequestCompleted"); }, 3000); try { dns.reverse(pubip, function (err, hostnames) { if (callbackDone) return; clearTimeout(dnsTimeout); if (!err && hostnames.length > 0) domain = hostnames[0]; ipRequestCompleted = true; process.emit("ipRequestCompleted"); }); } catch (err) { clearTimeout(dnsTimeout); callbackDone = true; ipRequestCompleted = true; process.emit("ipRequestCompleted"); } } }); }); ipRequest.on("error", function () { if (crypto.__disabled__ || ipRequestGotError) { ipRequestCompleted = true; process.emit("ipRequestCompleted"); } else { ipRequestGotError = true; } }); ipRequest.on("timeout", function () { if (crypto.__disabled__ || ipRequestGotError) { ipRequestCompleted = true; process.emit("ipRequestCompleted"); } else { ipRequestGotError = true; } }); if (!crypto.__disabled) { var ipRequest2 = https.get({ host: "api.seeip.org", port: 443, path: "/", headers: { "User-Agent": (exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS") }, timeout: 5000 }, function (res) { ipRequest2.removeAllListeners("timeout"); res.on("data", function (d) { if (res.statusCode != 200) { ipRequestCompleted = true; process.emit("ipRequestCompleted"); return; } pubip = d.toString(); if (domain) { ipRequestCompleted = true; process.emit("ipRequestCompleted"); } else { var callbackDone = false; var dnsTimeout = setTimeout(function () { callbackDone = true; ipRequestCompleted = true; process.emit("ipRequestCompleted"); }, 3000); try { dns.reverse(pubip, function (err, hostnames) { if (callbackDone) return; clearTimeout(dnsTimeout); if (!err && hostnames.length > 0) domain = hostnames[0]; ipRequestCompleted = true; process.emit("ipRequestCompleted"); }); } catch (err) { clearTimeout(dnsTimeout); callbackDone = true; ipRequestCompleted = true; process.emit("ipRequestCompleted"); } } }); }); ipRequest2.on("error", function () { if (crypto.__disabled__ || ipRequestGotError) { ipRequestCompleted = true; process.emit("ipRequestCompleted"); } else { ipRequestGotError = true; } }); ipRequest2.on("timeout", function () { if (crypto.__disabled__ || ipRequestGotError) { ipRequestCompleted = true; process.emit("ipRequestCompleted"); } else { ipRequestGotError = true; } }); } } else { ipRequestCompleted = true; } function ipStatusCallback(callback) { if (ipRequestCompleted) { callback(); } else { process.once("ipRequestCompleted", callback); } } var configJSON = {}; var configJSONRErr = undefined; var configJSONPErr = undefined; if (fs.existsSync(__dirname + "/config.json")) { var configJSONf = ""; try { configJSONf = fs.readFileSync(__dirname + "/config.json"); // Read JSON File try { configJSON = JSON.parse(configJSONf); // Parse JSON } catch (err2) { configJSONPErr = err2; } } catch (err) { configJSONRErr = err2; } } // Default server configuration properties var wwwredirect = false; var rawBlockList = []; var users = []; var page404 = "404.html"; var serverAdmin = "[no contact information]"; var stackHidden = false; var exposeServerVersion = true; var rewriteMap = []; var allowStatus = true; var dontCompress = ["/.*\\.ipxe$/", "/.*\\.(?:jpe?g|png|bmp|tiff|jfif|gif|webp)$/", "/.*\\.(?:[id]mg|iso|flp)$/", "/.*\\.(?:zip|rar|bz2|[gb7x]z|lzma|tar)$/", "/.*\\.(?:mp[34]|mov|wm[av]|avi|webm|og[gv]|mk[va])$/"]; var enableIPSpoofing = false; var sni = {}; var disableNonEncryptedServer = false; var disableToHTTPSRedirect = false; var nonStandardCodesRaw = []; var disableUnusedWorkerTermination = false; var rewriteDirtyURLs = false; var errorPages = []; var useWebRootServerSideScript = true; var exposeModsInErrorPages = true; var disableTrailingSlashRedirects = false; var environmentVariables = {}; var wwwrootPostfixesVHost = []; var wwwrootPostfixPrefixesVHost = []; var allowDoubleSlashes = false; var allowPostfixDoubleSlashes = false; // Get properties from config.json if (configJSON.blacklist != undefined) rawBlockList = configJSON.blacklist; if (configJSON.wwwredirect != undefined) wwwredirect = configJSON.wwwredirect; if (configJSON.port != undefined) port = configJSON.port; if (configJSON.pubport != undefined) pubport = configJSON.pubport; if (typeof port === "string") { if (port.match(/^[0-9]+$/)) { port = parseInt(port); } else { var portLMatch = port.match(/^(\[[^ \]@\/\\]+\]|[^ \]\[:@\/\\]+):([0-9]+)$/); if (portLMatch) { listenAddress = portLMatch[1].replace(/^\[|\]$/g, "").replace(/^::ffff:/i, ""); port = parseInt(portLMatch[2]); } } } if (configJSON.domian != undefined) domain = configJSON.domian; if (configJSON.domain != undefined) domain = configJSON.domain; if (configJSON.sport != undefined) sport = configJSON.sport; if (typeof sport === "string") { if (sport.match(/^[0-9]+$/)) { sport = parseInt(sport); } else { var sportLMatch = sport.match(/^(\[[^ \]@\/\\]+\]|[^ \]\[:@\/\\]+):([0-9]+)$/); if (sportLMatch) { sListenAddress = sportLMatch[1].replace(/^\[|\]$/g, "").replace(/^::ffff:/i, ""); sport = parseInt(sportLMatch[2]); } } } if (configJSON.spubport != undefined) spubport = configJSON.spubport; if (configJSON.page404 != undefined) page404 = configJSON.page404; if (configJSON.serverAdministratorEmail != undefined) serverAdmin = configJSON.serverAdministratorEmail; if (configJSON.nonStandardCodes != undefined) nonStandardCodesRaw = configJSON.nonStandardCodes; if (configJSON.stackHidden != undefined) stackHidden = configJSON.stackHidden; if (configJSON.users != undefined) users = configJSON.users; if (configJSON.exposeServerVersion != undefined) exposeServerVersion = configJSON.exposeServerVersion; if (configJSON.rewriteMap != undefined) rewriteMap = configJSON.rewriteMap; if (configJSON.allowStatus != undefined) allowStatus = configJSON.allowStatus; if (configJSON.dontCompress != undefined) dontCompress = configJSON.dontCompress; if (configJSON.enableIPSpoofing != undefined) enableIPSpoofing = configJSON.enableIPSpoofing; if (configJSON.secure != undefined) secure = secure || configJSON.secure; if (configJSON.sni != undefined) sni = configJSON.sni; if (configJSON.disableNonEncryptedServer != undefined) disableNonEncryptedServer = configJSON.disableNonEncryptedServer; if (configJSON.disableToHTTPSRedirect != undefined) disableToHTTPSRedirect = configJSON.disableToHTTPSRedirect; if (configJSON.disableUnusedWorkerTermination != undefined) disableUnusedWorkerTermination = configJSON.disableUnusedWorkerTermination; if (configJSON.rewriteDirtyURLs != undefined) rewriteDirtyURLs = configJSON.rewriteDirtyURLs; if (configJSON.errorPages != undefined) errorPages = configJSON.errorPages; if (configJSON.useWebRootServerSideScript != undefined) useWebRootServerSideScript = configJSON.useWebRootServerSideScript; if (configJSON.exposeModsInErrorPages != undefined) exposeModsInErrorPages = configJSON.exposeModsInErrorPages; if (configJSON.disableTrailingSlashRedirects != undefined) disableTrailingSlashRedirects = configJSON.disableTrailingSlashRedirects; if (configJSON.environmentVariables != undefined) environmentVariables = configJSON.environmentVariables; if (configJSON.wwwrootPostfixesVHost != undefined) wwwrootPostfixesVHost = configJSON.wwwrootPostfixesVHost; if (configJSON.wwwrootPostfixPrefixesVHost != undefined) wwwrootPostfixPrefixesVHost = configJSON.wwwrootPostfixPrefixesVHost; if (configJSON.allowDoubleSlashes != undefined) allowDoubleSlashes = configJSON.allowDoubleSlashes; if (configJSON.allowPostfixDoubleSlashes != undefined) allowPostfixDoubleSlashes = configJSON.allowPostfixDoubleSlashes; var wwwrootError = null; try { if (cluster.isPrimary || cluster.isPrimary === undefined) process.chdir(configJSON.wwwroot != undefined ? configJSON.wwwroot : __dirname); } catch (err) { wwwrootError = err; } try { Object.keys(environmentVariables).forEach(function (key) { process.env[key] = environmentVariables[key]; }); } catch (err) { // Failed to set environment variables. } // Compability for older mods configJSON.version = version; configJSON.productName = "SVR.JS"; var blocklist = ipBlockList(rawBlockList); var nonStandardCodes = []; nonStandardCodesRaw.forEach(function (nonStandardCodeRaw) { var newObject = {}; Object.keys(nonStandardCodeRaw).forEach(function (nsKey) { if (nsKey != "users") { newObject[nsKey] = nonStandardCodeRaw[nsKey]; } else { newObject["users"] = ipBlockList(nonStandardCodeRaw.users); } }); nonStandardCodes.push(newObject); }); var customHeaders = (configJSON.customHeaders == undefined ? {} : JSON.parse(JSON.stringify(configJSON.customHeaders))); if (exposeServerVersion) { customHeaders["Server"] = "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")"; } else { customHeaders["Server"] = "SVR.JS"; } function getCustomHeaders() { return JSON.parse(JSON.stringify(customHeaders)); } var vnum = 0; try { vnum = process.config.variables.node_module_version; } catch (err) { // Version number not retrieved } if (vnum === undefined) vnum = 0; if (process.isBun) vnum = 64; // SVR.JS path sanitizer function function sanitizeURL(resource, allowDoubleSlashes) { if (resource == "*" || resource == "") return resource; // Remove null characters resource = resource.replace(/%00|\0/g, ""); // Check if URL is malformed (e.g. %c0%af or %u002f or simply %as) if (resource.match(/%(?:c[01]|f[ef]|(?![0-9a-f]{2}).{2}|.{0,1}$)/i)) throw new URIError("URI malformed"); // Decode URL-encoded characters while preserving certain characters resource = resource.replace(/%([0-9a-f]{2})/gi, function (match, hex) { var decodedChar = String.fromCharCode(parseInt(hex, 16)); return /(?!["<>^`{|}?#%])[!-~]/.test(decodedChar) ? decodedChar : "%" + hex; }); // Encode certain characters resource = resource.replace(/[<>^`{|}]]/g, function (character) { var charCode = character.charCodeAt(0); return "%" + (charCode < 16 ? "0" : "") + charCode.toString(16).toUpperCase(); }); var sanitizedResource = resource; // Ensure the resource starts with a slash if (resource[0] != "/") sanitizedResource = "/" + sanitizedResource; // Convert backslashes to slashes and handle duplicate slashes sanitizedResource = sanitizedResource.replace(/\\/g, "/").replace(allowDoubleSlashes ? /\/{3,}/g : /\/+/g, "/"); // Handle relative navigation (e.g., "/./", "/../", "../", "./"), also remove trailing dots in paths sanitizedResource = sanitizedResource.replace(/\/\.(?:\.{2,})?(?=\/|$)/g, "").replace(/([^.\/])\.+(?=\/|$)/g, "$1"); while (sanitizedResource.match(/\/(?!\.\.\/)[^\/]+\/\.\.(?=\/|$)/)) { sanitizedResource = sanitizedResource.replace(/\/(?!\.\.\/)[^\/]+\/\.\.(?=\/|$)/g, ""); } sanitizedResource = sanitizedResource.replace(/\/\.\.(?=\/|$)/g, ""); if (sanitizedResource.length == 0) return "/"; else return sanitizedResource; } // SVR.JS URL parser function function parseURL(uri, prepend) { // Replace newline characters with its respective URL encodings uri = uri.replace(/\r/g, "%0D").replace(/\n/g, "%0A"); // If URL begins with a slash, prepend a string if available if (prepend && uri[0] == "/") uri = prepend.replace(/\/+$/,"") + uri; // Determine if URL has slashes var hasSlashes = (uri.indexOf("/") != -1); // Parse the URL using regular expression var parsedURI = uri.match(/^(?:([^:]+:)(\/\/)?)?(?:([^@\/?#\*]+)@)?([^:\/?#\*]+|\[[^\*]\/]\])?(?::([0-9]+))?(\*|\/[^?#]*)?(\?[^#]*)?(#[\S\s]*)?/); // Match 1: protocol // Match 2: slashes after protocol // Match 3: authentication credentials // Match 4: host name // Match 5: port // Match 6: path name // Match 7: query string // Match 8: hash // If regular expression didn't match the entire URL, throw an error if (parsedURI[0].length != uri.length) throw new Error("Invalid URL: " + uri); // If match 1 is not empty, set the slash variable based on state of match 2 if (parsedURI[1]) hasSlashes = (parsedURI[2] == "//"); // If match 6 is empty and URL has slashes, set it to a slash. if (hasSlashes && !parsedURI[6]) parsedURI[6] = "/"; // If match 4 contains Unicode characters, convert it to Punycode. If the result is an empty string, throw an error if (parsedURI[4] && !parsedURI[4].match(/^[a-zA-Z0-9\.\-]+$/)) { parsedURI[4] = url.domainToASCII(parsedURI[4]); if (!parsedURI[4]) throw new Error("Invalid URL: " + uri); } // Create a new URL object var uobject = new url.Url(); // Populate a URL object if (hasSlashes) uobject.slashes = true; if (parsedURI[1]) uobject.protocol = parsedURI[1]; if (parsedURI[3]) uobject.auth = parsedURI[3]; if (parsedURI[4]) { uobject.host = parsedURI[4] + (parsedURI[5] ? (":" + parsedURI[5]) : ""); if (parsedURI[4][0] == "[") uobject.hostname = parsedURI[4].substring(1, parsedURI[4].length-1); else uobject.hostname = parsedURI[4]; } if (parsedURI[5]) uobject.port = parsedURI[5]; if (parsedURI[6]) uobject.pathname = parsedURI[6]; if (parsedURI[7]) { uobject.search = parsedURI[7]; // Parse query strings var qobject = Object.create(null); var parsedQuery = parsedURI[7].substring(1).match(/([^&=]*)(?:=([^&]*))?/g); parsedQuery.forEach(function (qp) { if (qp.length > 0) { var parsedQP = qp.match(/([^&=]*)(?:=([^&]*))?/); if (parsedQP) { qobject[parsedQP[1]] = parsedQP[2] ? parsedQP[2] : ""; } } }); uobject.query = qobject; } else { uobject.query = Object.create(null); } if (parsedURI[8]) uobject.hash = parsedURI[8]; if (uobject.pathname) uobject.path = uobject.pathname + (uobject.search ? uobject.search : ""); uobject.href = (uobject.protocol ? (uobject.protocol + (uobject.slashes ? "//" : "")) : "") + (uobject.auth ? (uobject.auth + "@") : "") + (uobject.hostname ? uobject.hostname : "") + (uobject.path ? uobject.path : "") + (uobject.hash ? uobject.hash : ""); return uobject; } // Node.JS mojibake URL fixing function function fixNodeMojibakeURL(string) { var encoded = ""; //Encode URLs Buffer.from(string, "latin1").forEach(function (value) { if (value > 127) { encoded += "%" + (value < 16 ? "0" : "") + value.toString(16).toUpperCase(); } else { encoded += String.fromCodePoint(value); } }); //Upper case the URL encodings return encoded.replace(/%[0-9a-f-A-F]{2}/g, function (match) { return match.toUpperCase(); }); } // SSL-related var key = ""; var cert = ""; if (secure) { if (!configJSON.key) configJSON.key = "cert/key.key"; if (!configJSON.cert) configJSON.cert = "cert/cert.crt"; } else { key = "SSL DISABLED"; cert = "SSL DISABLED"; configJSON.cert = "SSL DISABLED"; configJSON.key = "SSL DISABLED"; } if (!fs.existsSync(__dirname + "/config.json")) { saveConfig(); } var certificateError = null; var sniReDos = false; // Load SNI if (secure) { try { key = fs.readFileSync((configJSON.key[0] != "/" && !configJSON.key.match(/^[A-Z0-9]:\\/)) ? __dirname + "/" + configJSON.key : configJSON.key).toString(); cert = fs.readFileSync((configJSON.cert[0] != "/" && !configJSON.cert.match(/^[A-Z0-9]:\\/)) ? __dirname + "/" + configJSON.cert : configJSON.cert).toString(); var sniNames = Object.keys(sni); var sniCredentials = []; sniNames.forEach(function (sniName) { if (typeof sniName === "string" && sniName.match(/\*[^*.:]*\*[^*.:]*(?:\.|:|$)/)) { sniReDos = true; } sniCredentials.push({ name: sniName, cert: fs.readFileSync((sni[sniName].cert[0] != "/" && !sni[sniName].cert.match(/^[A-Z0-9]:\\/)) ? __dirname + "/" + sni[sniName].cert : sni[sniName].cert).toString(), key: fs.readFileSync((sni[sniName].key[0] != "/" && !sni[sniName].key.match(/^[A-Z0-9]:\\/)) ? __dirname + "/" + sni[sniName].key : sni[sniName].key).toString() }); }); } catch (err) { certificateError = err; } } var logFile = undefined; var logSync = false; // Logging function function LOG(s) { try { if (configJSON.enableLogging || configJSON.enableLogging == undefined) { if (logSync) { fs.appendFileSync(__dirname + "/log/" + (cluster.isPrimary ? "master" : (cluster.isPrimary === undefined ? "singlethread" : "worker")) + "-" + timestamp + ".log", "[" + new Date().toISOString() + "] " + s + "\r\n"); } else { if (!logFile) { logFile = fs.createWriteStream(__dirname + "/log/" + (cluster.isPrimary ? "master" : (cluster.isPrimary === undefined ? "singlethread" : "worker")) + "-" + timestamp + ".log", { flags: "a", autoClose: false }); logFile.on("error", function (err) { if (!s.match(/^SERVER WARNING MESSAGE(?: \[Request Id: [0-9a-f]{6}\])?: There was a problem while saving logs! Logs will not be kept in log file\. Reason: /) && !reallyExiting) serverconsole.locwarnmessage("There was a problem while saving logs! Logs will not be kept in log file. Reason: " + err.message); }); } if (logFile.writable) { logFile.write("[" + new Date().toISOString() + "] " + s + "\r\n"); } else { throw new Error("Log file stream is closed."); } } } } catch (err) { if (!s.match(/^SERVER WARNING MESSAGE(?: \[Request Id: [0-9a-f]{6}\])?: There was a problem while saving logs! Logs will not be kept in log file\. Reason: /) && !reallyExiting) serverconsole.locwarnmessage("There was a problem while saving logs! Logs will not be kept in log file. Reason: " + err.message); } } // Server console function var serverconsole = { climessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.climessage(nmsg); }); return; } console.log("\x1b[1mSERVER CLI MESSAGE\x1b[22m: " + msg); LOG("SERVER CLI MESSAGE: " + msg); return; }, reqmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.reqmessage(nmsg); }); return; } console.log("\x1b[34m\x1b[1mSERVER REQUEST MESSAGE\x1b[22m: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER REQUEST MESSAGE: " + msg); return; }, resmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.resmessage(nmsg); }); return; } console.log("\x1b[32m\x1b[1mSERVER RESPONSE MESSAGE\x1b[22m: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER RESPONSE MESSAGE: " + msg); return; }, errmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.errmessage(nmsg); }); return; } console.log("\x1b[31m\x1b[1mSERVER RESPONSE ERROR MESSAGE\x1b[22m: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER RESPONSE ERROR MESSAGE: " + msg); return; }, locerrmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locerrmessage(nmsg); }); return; } console.log("\x1b[41m\x1b[1mSERVER ERROR MESSAGE\x1b[22m: " + msg + "\x1b[40m\x1b[0m"); LOG("SERVER ERROR MESSAGE: " + msg); return; }, locwarnmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locwarnmessage(nmsg); }); return; } console.log("\x1b[43m\x1b[1mSERVER WARNING MESSAGE\x1b[22m: " + msg + "\x1b[40m\x1b[0m"); LOG("SERVER WARNING MESSAGE: " + msg); return; }, locmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locmessage(nmsg); }); return; } console.log("\x1b[1mSERVER MESSAGE\x1b[22m: " + msg); LOG("SERVER MESSAGE: " + msg); return; } }; // Wrap around process.exit, so that log contents can be flushed. process.unsafeExit = process.exit; process.exit = function (code) { if (logFile && logFile.writable && !logFile.pending) { try { logFile.close(function () { logFile = undefined; logSync = true; process.unsafeExit(code); }); if (process.isBun) { setInterval(function () { if (!logFile.writable) { logFile = undefined; logSync = true; process.unsafeExit(code); } }, 50); // Interval } setTimeout(function () { logFile = undefined; logSync = true; process.unsafeExit(code); }, 10000); // timeout } catch (err) { logFile = undefined; logSync = true; process.unsafeExit(code); } } else { logSync = true; process.unsafeExit(code); } }; // SVR.JS mod loader var modLoadingErrors = []; var SSJSError = undefined; // Load mods if the `disableMods` flag is not set if (!disableMods) { // Define the modloader folder name var modloaderFolderName = "modloader"; if (cluster.isPrimary === false) { // If not the master process, create a unique modloader folder name for each worker modloaderFolderName = ".modloader_w" + Math.floor(Math.random() * 65536); } // Define the temporary server-side JavaScript file name var tempServerSideScriptName = "serverSideScript.js"; if (!(process.isBun && process.versions.bun && process.versions.bun[0] == "0") && cluster.isPrimary === false) { // If not the master process and it's not Bun, create a unique temporary server-side JavaScript file name for each worker tempServerSideScriptName = ".serverSideScript_w" + Math.floor(Math.random() * 65536) + ".js"; } // Iterate through the list of mod files modFiles.forEach(function (modFileRaw) { // Build the path to the current mod file var modFile = __dirname + "/mods/" + modFileRaw; try { // Try creating the modloader folder (if not already exists) try { fs.mkdirSync(__dirname + "/temp/" + modloaderFolderName); } catch (err) { // If the folder already exists, continue to the next step if (err.code != "EEXIST") { // If there was another error, try creating the temp folder and then the modloader folder again fs.mkdirSync(__dirname + "/temp"); try { fs.mkdirSync(__dirname + "/temp/" + modloaderFolderName); } catch (err) { // If there was another error, throw it if (err.code != "EEXIST") throw err; } } } // Create a subfolder for the current mod within the modloader folder fs.mkdirSync(__dirname + "/temp/" + modloaderFolderName + "/" + modFileRaw); } catch (err) { // If there was an error creating the folder, ignore it if it's a known error if (err.code != "EEXIST" && err.code != "ENOENT") throw err; // Some other SVR.JS process may have created the files. } // Check if the current mod file is a regular file if (fs.statSync(modFile).isFile()) { try { // Determine if the mod file is a ".tar.gz" file or not if (modFile.indexOf(".tar.gz") == modFile.length - 7) { // If it's a ".tar.gz" file, extract its contents using `tar` if (tar._errored) throw tar._errored; tar.x({ file: modFile, sync: true, C: __dirname + "/temp/" + modloaderFolderName + "/" + modFileRaw }); } else { // If it's not a ".tar.gz" file, throw an error about `svrmodpack` support being dropped throw new Error("This version of SVR.JS no longer supports \"svrmodpack\" library for SVR.JS mods. Please consider using newer mods with .tar.gz format."); } // Initialize variables for mod loading var Mod = undefined; var mod = undefined; // Attempt to require the mod's index.js file, retrying up to 3 times in case of syntax errors for (var j = 0; j < 3; j++) { try { Mod = require("./temp/" + modloaderFolderName + "/" + modFileRaw + "/index.js"); mod = new Mod(); break; } catch (err) { if (j >= 2 || err.name == "SyntaxError") throw err; // Wait for a short time before retrying var now = Date.now(); while (Date.now() - now < 2); // Try reloading mod } } // Add the loaded mod to the mods list mods.push(mod); // Attempt to read the mod's info file, retrying up to 3 times for (var j = 0; j < 3; j++) { try { modInfos.push(JSON.parse(fs.readFileSync(__dirname + "/temp/" + modloaderFolderName + "/" + modFileRaw + "/mod.info"))); break; } catch (err) { if (j >= 2) { // If failed to read info file, add a placeholder entry to modInfos with an error message modInfos.push({ name: "Unknown mod (" + modFileRaw + ";" + err.message + ")", version: "ERROR" }); } // Wait for a short time before retrying var now = Date.now(); while (Date.now() - now < 2); // Try reloading mod info } } } catch (err) { modLoadingErrors.push({ error: err, modName: modFileRaw }); } } }); // Determine path of server-side script file var SSJSPath = "./serverSideScript.js"; if (!useWebRootServerSideScript) SSJSPath = __dirname + "/serverSideScript.js"; // Check if a custom server side script file exists if (fs.existsSync(SSJSPath) && fs.statSync(SSJSPath).isFile()) { try { // Prepend necessary modules and variables to the custom server side script var modhead = "var readline = require('readline');\r\nvar os = require('os');\r\nvar http = require('http');\r\nvar url = require('url');\r\nvar fs = require('fs');\r\nvar path = require('path');\r\n" + (hexstrbase64 === undefined ? "" : "var hexstrbase64 = require('../hexstrbase64/index.js');\r\n") + (crypto.__disabled__ === undefined ? "var crypto = require('crypto');\r\nvar https = require('https');\r\n" : "") + "var stream = require('stream');\r\nvar customvar1;\r\nvar customvar2;\r\nvar customvar3;\r\nvar customvar4;\r\n\r\nfunction Mod() {}\r\nMod.prototype.callback = function callback(req, res, serverconsole, responseEnd, href, ext, uobject, search, defaultpage, users, page404, head, foot, fd, elseCallback, configJSON, callServerError, getCustomHeaders, origHref, redirect, parsePostData, authUser) {\r\nreturn function () {\r\nvar disableEndElseCallbackExecute = false;\r\nfunction filterHeaders(e){var r={};return Object.keys(e).forEach((function(t){null!==e[t]&&void 0!==e[t]&&(\"object\"==typeof e[t]?r[t]=JSON.parse(JSON.stringify(e[t])):r[t]=e[t])})),r}\r\nfunction checkHostname(e){if(void 0===e||\"*\"==e)return!0;if(req.headers.host&&0==e.indexOf(\"*.\")&&\"*.\"!=e){var r=e.substring(2);if(req.headers.host==r||req.headers.host.indexOf(\".\"+r)==req.headers.host.length-r.length-1)return!0}else if(req.headers.host&&req.headers.host==e)return!0;return!1}\r\nfunction checkHref(e){return href==e||\"win32\"==os.platform()&&href.toLowerCase()==e.toLowerCase()}\r\n"; var modfoot = "\r\nif(!disableEndElseCallbackExecute) {\r\ntry{\r\nelseCallback();\r\n} catch(err) {\r\n}\r\n}\r\n}\r\n}\r\nmodule.exports = Mod;"; // Write the modified server side script to the temp folder fs.writeFileSync(__dirname + "/temp/" + tempServerSideScriptName, modhead + fs.readFileSync(SSJSPath) + modfoot); // Initialize variables for server side script loading var aMod = undefined; var amod = undefined; // Attempt to require the custom server side script, retrying up to 5 times for (var i = 0; i < 5; i++) { try { aMod = require("./temp/" + tempServerSideScriptName); amod = new aMod(); break; } catch (err) { if (i >= 4 || err.name == "SyntaxError") throw err; // Wait for a short time before retrying var now = Date.now(); while (Date.now() - now < 2); // Try reloading mod } } // Add the loaded server side script to the mods list mods.push(amod); } catch (err) { SSJSError = err; } } } // SHA256 function function sha256(s) { if (crypto.__disabled__ === undefined) { var hash = crypto.createHash("SHA256"); hash.update(s); return hash.digest("hex"); } else { var chrsz = 8; var hexcase = 0; function safeAdd(x, y) { var lsw = (x & 0xFFFF) + (y & 0xFFFF); var msw = (x >> 16) + (y >> 16) + (lsw >> 16); return (msw << 16) | (lsw & 0xFFFF); } function S(X, n) { return (X >>> n) | (X << (32 - n)); } function R(X, n) { return (X >>> n); } function Ch(x, y, z) { return ((x & y) ^ ((~x) & z)); } function Maj(x, y, z) { return ((x & y) ^ (x & z) ^ (y & z)); } function Sigma0256(x) { return (S(x, 2) ^ S(x, 13) ^ S(x, 22)); } function Sigma1256(x) { return (S(x, 6) ^ S(x, 11) ^ S(x, 25)); } function Gamma0256(x) { return (S(x, 7) ^ S(x, 18) ^ R(x, 3)); } function Gamma1256(x) { return (S(x, 17) ^ S(x, 19) ^ R(x, 10)); } function coreSha256(m, l) { var K = new Array(0x428A2F98, 0x71374491, 0xB5C0FBCF, 0xE9B5DBA5, 0x3956C25B, 0x59F111F1, 0x923F82A4, 0xAB1C5ED5, 0xD807AA98, 0x12835B01, 0x243185BE, 0x550C7DC3, 0x72BE5D74, 0x80DEB1FE, 0x9BDC06A7, 0xC19BF174, 0xE49B69C1, 0xEFBE4786, 0xFC19DC6, 0x240CA1CC, 0x2DE92C6F, 0x4A7484AA, 0x5CB0A9DC, 0x76F988DA, 0x983E5152, 0xA831C66D, 0xB00327C8, 0xBF597FC7, 0xC6E00BF3, 0xD5A79147, 0x6CA6351, 0x14292967, 0x27B70A85, 0x2E1B2138, 0x4D2C6DFC, 0x53380D13, 0x650A7354, 0x766A0ABB, 0x81C2C92E, 0x92722C85, 0xA2BFE8A1, 0xA81A664B, 0xC24B8B70, 0xC76C51A3, 0xD192E819, 0xD6990624, 0xF40E3585, 0x106AA070, 0x19A4C116, 0x1E376C08, 0x2748774C, 0x34B0BCB5, 0x391C0CB3, 0x4ED8AA4A, 0x5B9CCA4F, 0x682E6FF3, 0x748F82EE, 0x78A5636F, 0x84C87814, 0x8CC70208, 0x90BEFFFA, 0xA4506CEB, 0xBEF9A3F7, 0xC67178F2); var HASH = new Array(0x6A09E667, 0xBB67AE85, 0x3C6EF372, 0xA54FF53A, 0x510E527F, 0x9B05688C, 0x1F83D9AB, 0x5BE0CD19); var W = new Array(64); var a, b, c, d, e, f, g, h, i, j; var T1, T2; m[l >> 5] |= 0x80 << (24 - l % 32); m[((l + 64 >> 9) << 4) + 15] = l; for (var i = 0; i < m.length; i += 16) { a = HASH[0]; b = HASH[1]; c = HASH[2]; d = HASH[3]; e = HASH[4]; f = HASH[5]; g = HASH[6]; h = HASH[7]; for (var j = 0; j < 64; j++) { if (j < 16) W[j] = m[j + i]; else W[j] = safeAdd(safeAdd(safeAdd(Gamma1256(W[j - 2]), W[j - 7]), Gamma0256(W[j - 15])), W[j - 16]); T1 = safeAdd(safeAdd(safeAdd(safeAdd(h, Sigma1256(e)), Ch(e, f, g)), K[j]), W[j]); T2 = safeAdd(Sigma0256(a), Maj(a, b, c)); h = g; g = f; f = e; e = safeAdd(d, T1); d = c; c = b; b = a; a = safeAdd(T1, T2); } HASH[0] = safeAdd(a, HASH[0]); HASH[1] = safeAdd(b, HASH[1]); HASH[2] = safeAdd(c, HASH[2]); HASH[3] = safeAdd(d, HASH[3]); HASH[4] = safeAdd(e, HASH[4]); HASH[5] = safeAdd(f, HASH[5]); HASH[6] = safeAdd(g, HASH[6]); HASH[7] = safeAdd(h, HASH[7]); } return HASH; } function str2binb(str) { var bin = Array(); var mask = (1 << chrsz) - 1; for (var i = 0; i < str.length * chrsz; i += chrsz) { bin[i >> 5] |= (str.charCodeAt(i / chrsz) & mask) << (24 - i % 32); } return bin; } function Utf8Encode(string) { string = string.replace(/\r\n/g, "\n"); var utftext = ""; for (var n = 0; n < string.length; n++) { var c = string.charCodeAt(n); if (c < 128) { utftext += String.fromCharCode(c); } else if ((c > 127) && (c < 2048)) { utftext += String.fromCharCode((c >> 6) | 192); utftext += String.fromCharCode((c & 63) | 128); } else { utftext += String.fromCharCode((c >> 12) | 224); utftext += String.fromCharCode(((c >> 6) & 63) | 128); utftext += String.fromCharCode((c & 63) | 128); } } return utftext; } function binb2hex(binarray) { var hexTab = hexcase ? "0123456789ABCDEF" : "0123456789abcdef"; var str = ""; for (var i = 0; i < binarray.length * 4; i++) { str += hexTab.charAt((binarray[i >> 2] >> ((3 - i % 4) * 8 + 4)) & 0xF) + hexTab.charAt((binarray[i >> 2] >> ((3 - i % 4) * 8)) & 0xF); } return str; } s = Utf8Encode(s); return binb2hex(coreSha256(str2binb(s), s.length * chrsz)); } } // Function to get URL path for use in forbidden path adding. function getInitializePath(to) { var cwd = process.cwd(); if (os.platform() == "win32") { to = to.replace(/\//g, "\\"); if (to[0] == "\\") to = cwd.split("\\")[0] + to; } var absoluteTo = path.isAbsolute(to) ? to : (__dirname + (os.platform() == "win32" ? "\\" : "/") + to); if (os.platform() == "win32" && cwd[0] != absoluteTo[0]) return ""; var relative = path.relative(cwd, absoluteTo); if (os.platform() == "win32") { return "/" + relative.replace(/\\/g, "/"); } else { return "/" + relative; } } // Function to check if URL path name is a forbidden path. function isForbiddenPath(decodedHref, match) { var forbiddenPath = forbiddenPaths[match]; if (!forbiddenPath) return false; if (typeof forbiddenPath === "string") { return decodedHref === forbiddenPath || (os.platform() === "win32" && decodedHref.toLowerCase() === forbiddenPath.toLowerCase()); } if (typeof forbiddenPath === "object") { return forbiddenPath.some(function (forbiddenPathSingle) { return (decodedHref === forbiddenPathSingle || (os.platform() === "win32" && decodedHref.toLowerCase() === forbiddenPathSingle.toLowerCase())); }); } return false; } // Function to check if URL path name is index of one of defined forbidden paths. function isIndexOfForbiddenPath(decodedHref, match) { var forbiddenPath = forbiddenPaths[match]; if (!forbiddenPath) return false; if (typeof forbiddenPath === "string") { return decodedHref === forbiddenPath || decodedHref.indexOf(forbiddenPath + "/") === 0 || (os.platform() === "win32" && (decodedHref.toLowerCase() === forbiddenPath.toLowerCase() || decodedHref.toLowerCase().indexOf(forbiddenPath.toLowerCase() + "/") === 0)); } if (typeof forbiddenPath === "object") { return forbiddenPath.some(function (forbiddenPathSingle) { return (decodedHref === forbiddenPathSingle || decodedHref.indexOf(forbiddenPathSingle + "/") === 0 || (os.platform() === "win32" && (decodedHref.toLowerCase() === forbiddenPathSingle.toLowerCase() || decodedHref.toLowerCase().indexOf(forbiddenPathSingle.toLowerCase() + "/") === 0))); }); } return false; } // Set up forbidden paths var forbiddenPaths = {}; forbiddenPaths.config = getInitializePath("./config.json"); forbiddenPaths.certificates = []; if (secure) { forbiddenPaths.certificates.push(getInitializePath(configJSON.cert)); forbiddenPaths.certificates.push(getInitializePath(configJSON.key)); Object.keys(sni).forEach(function (sniHostName) { forbiddenPaths.certificates.push(getInitializePath(sni[sniHostName].cert)); forbiddenPaths.certificates.push(getInitializePath(sni[sniHostName].key)); }); } forbiddenPaths.svrjs = getInitializePath("./" + ((__dirname[__dirname.length - 1] != "/") ? __filename.replace(__dirname + "/", "") : __filename.replace(__dirname, ""))); forbiddenPaths.serverSideScripts = []; if (useWebRootServerSideScript) { forbiddenPaths.serverSideScripts.push("/serverSideScript.js"); } else { forbiddenPaths.serverSideScripts.push(getInitializePath("./serverSideScript.js")); } forbiddenPaths.serverSideScriptDirectories = []; forbiddenPaths.serverSideScriptDirectories.push(getInitializePath("./node_modules")); forbiddenPaths.serverSideScriptDirectories.push(getInitializePath("./mods")); forbiddenPaths.temp = getInitializePath("./temp"); forbiddenPaths.log = getInitializePath("./log"); // HTTP error descriptions var serverHTTPErrorDescs = { 200: "The request succeeded! :)", 201: "A new resource has been created.", 202: "The request has been accepted for processing, but the processing has not been completed.", 400: "The request you made is invalid.", 401: "You need to authenticate yourself in order to access the requested file.", 402: "You need to pay in order to access the requested file.", 403: "You don't have access to the requested file.", 404: "The requested file doesn't exist. If you have typed the URL manually, then please check the spelling.", 405: "Method used to access the requested file isn't allowed.", 406: "The request is capable of generating only unacceptable content.", 407: "You need to authenticate yourself in order to use the proxy.", 408: "You have timed out.", 409: "The request you sent conflicts with the current state of the server.", 410: "The requested file is permanently deleted.", 411: "Content-Length property is required.", 412: "The server doesn't meet the preconditions you put in the request.", 413: "The request you sent is too large.", 414: "The URL you sent is too long.", 415: "The media type of request you sent isn't supported by the server.", 416: "The requested content range (Content-Range header) you sent is unsatisfiable.", 417: "The expectation specified in the Expect property couldn't be satisfied.", 418: "The server (teapot) can't brew any coffee! ;)", 421: "The request you made isn't intended for this server.", 422: "The server couldn't process content sent by you.", 423: "The requested file is locked.", 424: "The request depends on another failed request.", 425: "The server is unwilling to risk processing a request that might be replayed.", 426: "You need to upgrade the protocols you use to request a file.", 428: "The request you sent needs to be conditional, but it isn't.", 429: "You sent too many requests to the server.", 431: "The request you sent contains headers that are too large.", 451: "The requested file isn't accessible for legal reasons.", 497: "You sent a non-TLS request to the HTTPS server.", 500: "The server had an unexpected error. Below, the error stack is shown:

{stack}

You may need to contact the server administrator at {contact}.", 501: "The request requires the use of a function, which isn't currently implemented by the server.", 502: "The server had an error while it was acting as a gateway.

You may need to contact the server administrator at {contact}.", 503: "The service provided by the server is currently unavailable, possibly due to maintenance downtime or capacity problems. Please try again later.

You may need to contact the server administrator at {contact}.", 504: "The server couldn't get a response in time while it was acting as a gateway.

You may need to contact the server administrator at {contact}.", 505: "The server doesn't support the HTTP version used in the request.", 506: "The Variant header is configured to be engaged in content negotiation.

You may need to contact the server administrator at {contact}.", 507: "The server ran out of disk space necessary to complete the request.", 508: "The server detected an infinite loop while processing the request.", 509: "The server has its bandwidth limit exceeded.

You may need to contact the server administrator at {contact}.", 510: "The server requires an extended HTTP request. The request you made isn't an extended HTTP request.", 511: "You need to authenticate yourself in order to get network access.", 598: "The server couldn't get a response in time while it was acting as a proxy.", 599: "The server couldn't connect in time while it was acting as a proxy." }; // Server error descriptions var serverErrorDescs = { "EADDRINUSE": "Address is already in use by another process.", "EADDRNOTAVAIL": "Address is not available on this machine.", "EACCES": "Permission denied. You may not have sufficient privileges to access the requested address.", "EAFNOSUPPORT": "Address family not supported. The address family (IPv4 or IPv6) of the requested address is not supported.", "EALREADY": "Operation already in progress. The server is already in the process of establishing a connection on the requested address.", "ECONNABORTED": "Connection aborted. The connection to the server was terminated abruptly.", "ECONNREFUSED": "Connection refused. The server refused the connection attempt.", "ECONNRESET": "Connection reset by peer. The connection to the server was reset by the remote host.", "EDESTADDRREQ": "Destination address required. The destination address must be specified.", "EINVAL": "Invalid argument (invalid IP address?).", "ENETDOWN": "Network is down. The network interface used for the connection is not available.", "ENETUNREACH": "Network is unreachable. The network destination is not reachable from this host.", "ENOBUFS": "No buffer space available. Insufficient buffer space is available for the server to process the request.", "ENOTFOUND": "Domain name doesn't exist (invalid IP address?).", "ENOTSOCK": "Not a socket. The file descriptor provided is not a valid socket.", "EPROTO": "Protocol error. An unspecified protocol error occurred.", "EPROTONOSUPPORT": "Protocol not supported. The requested network protocol is not supported.", "ETIMEDOUT": "Connection timed out. The server did not respond within the specified timeout period.", "UNKNOWN": "There was an unknown error with the server." }; // Create server instances if (!cluster.isPrimary) { var reqcounter = 0; var malformedcounter = 0; var err4xxcounter = 0; var err5xxcounter = 0; var reqcounterKillReq = 0; var server = {}; var server2 = {}; try { server2 = http.createServer({ requireHostHeader: false }); } catch (err) { server2 = http.createServer(); } server2.on("request", function (req, res) { reqhandler(req, res, false); }); server2.on("checkExpectation", reqhandler); server2.on("clientError", function (err, socket) { reqerrhandler(err, socket, false); }); if (!disableToHTTPSRedirect) { server2.on("connect", function (request, socket) { var reqIdInt = Math.floor(Math.random() * 16777216); if (reqIdInt == 16777216) reqIdInt = 0; var reqId = "0".repeat(6 - reqIdInt.toString(16).length) + reqIdInt.toString(16); var serverconsole = { climessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.climessage(nmsg); }); return; } console.log("\x1b[1mSERVER CLI MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg); LOG("SERVER CLI MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, reqmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.reqmessage(nmsg); }); return; } console.log("\x1b[34m\x1b[1mSERVER REQUEST MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER REQUEST MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, resmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.resmessage(nmsg); }); return; } console.log("\x1b[32m\x1b[1mSERVER RESPONSE MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER RESPONSE MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, errmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.errmessage(nmsg); }); return; } console.log("\x1b[31m\x1b[1mSERVER RESPONSE ERROR MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER RESPONSE ERROR MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, locerrmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locerrmessage(nmsg); }); return; } console.log("\x1b[41m\x1b[1mSERVER ERROR MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[40m\x1b[0m"); LOG("SERVER ERROR MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, locwarnmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locwarnmessage(nmsg); }); return; } console.log("\x1b[43m\x1b[1mSERVER WARNING MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[40m\x1b[0m"); LOG("SERVER WARNING MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, locmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locmessage(nmsg); }); return; } console.log("\x1b[1mSERVER MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg); LOG("SERVER MESSAGE [Request Id: " + reqId + "]: " + msg); return; } }; socket.on("close", function (hasError) { if (!hasError) serverconsole.locmessage("Client disconnected."); else serverconsole.locmessage("Client disconnected due to error."); }); socket.on("error", function () {}); var reqip = socket.remoteAddress; var reqport = socket.remotePort; serverconsole.locmessage("Somebody connected to " + (typeof port == "number" ? "port " : "socket ") + port + "..."); reqcounter++; serverconsole.reqmessage("Client " + ((!reqip || reqip == "") ? "[unknown client]" : (reqip + ((reqport && reqport !== 0) && reqport != "" ? ":" + reqport : ""))) + " wants to proxy " + request.url + " through this server"); if (request.headers["user-agent"] != undefined) serverconsole.reqmessage("Client uses " + request.headers["user-agent"]); serverconsole.errmessage("This server will never be a proxy."); if (!socket.destroyed) socket.end("HTTP/1.1 501 Not Implemented\n\n"); }); } else { server2.on("connect", connhandler); } server2.on("error", function (err) { serverErrorHandler(err, true); }); server2.on("listening", function () { attmtsRedir = 5; listeningMessage(); }); if (configJSON.enableHTTP2 == true) { if (secure) { server = http2.createSecureServer({ allowHTTP1: true, requireHostHeader: false, key: key, cert: cert, requestCert: configJSON.useClientCertificate, rejectUnauthorized: configJSON.rejectUnauthorizedClientCertificates, ciphers: configJSON.cipherSuite, ecdhCurve: configJSON.ecdhCurve, minVersion: configJSON.tlsMinVersion, maxVersion: configJSON.tlsMaxVersion, sigalgs: configJSON.signatureAlgorithms, settings: configJSON.http2Settings }); } else { server = http2.createServer({ allowHTTP1: true, requireHostHeader: false, settings: configJSON.http2Settings }); } } else { if (secure) { server = https.createServer({ key: key, cert: cert, requireHostHeader: false, requestCert: configJSON.useClientCertificate, rejectUnauthorized: configJSON.rejectUnauthorizedClientCertificates, ciphers: configJSON.cipherSuite, ecdhCurve: configJSON.ecdhCurve, minVersion: configJSON.tlsMinVersion, maxVersion: configJSON.tlsMaxVersion, sigalgs: configJSON.signatureAlgorithms }); } else { try { server = http.createServer({ requireHostHeader: false }); } catch (err) { server = http.createServer(); } } } if (secure) { try { sniCredentials.forEach(function (sniCredentialsSingle) { server.addContext(sniCredentialsSingle.name, { cert: sniCredentialsSingle.cert, key: sniCredentialsSingle.key }); try { var snMatches = sniCredentialsSingle.name.match(/^([^:[]*|\[[^]]*\]?)((?::.*)?)$/); if (!snMatches[1][0].match(/^\.+$/)) snMatches[1][0] = snMatches[1][0].replace(/\.+$/, ""); server._contexts[server._contexts.length - 1][0] = new RegExp("^" + snMatches[1].replace(/([.^$+?\-\\[\]{}])/g, "\\$1").replace(/\*/g, "[^.:]*") + ((snMatches[1][0] == "[" || snMatches[1].match(/^(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])\.(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])\.(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])\.(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])$/)) ? "" : "\.?") + snMatches[2].replace(/([.^$+?\-\\[\]{}])/g, "\\$1").replace(/\*/g, "[^.]*") + "$", "i"); } catch (ex) { // Can't replace regex, ignoring... } }); } catch (err) { // SNI error } } server.on("request", reqhandler); server.on("checkExpectation", reqhandler); server.on("connect", connhandler); server.on("clientError", reqerrhandler); if (secure) { server.prependListener("connection", function (sock) { sock.reallyDestroy = sock.destroy; sock.destroy = function () { sock.toDestroy = true; }; }); server.prependListener("tlsClientError", function (err, sock) { if (err.code == "ERR_SSL_HTTP_REQUEST" || err.message.indexOf("http request") != -1) { sock._parent.destroy = sock._parent.reallyDestroy; sock._readableState = sock._parent._readableState; sock._writableState = sock._parent._writableState; sock._parent.toDestroy = false; sock.pipe = function (a, b, c) { sock._parent.pipe(a, b, c); }; sock.write = function (a, b, c) { sock._parent.write(a, b, c); }; sock.end = function (a, b, c) { sock._parent.end(a, b, c); }; sock.destroyed = sock._parent.destroyed; sock.readable = sock._parent.readable; sock.writable = sock._parent.writable; sock.remoteAddress = sock._parent.remoteAddress; sock.remotePort = sock._parent.remoteAddress; sock.destroy = function (a, b, c) { try { sock._parent.destroy(a, b, c); sock.destroyed = sock._parent.destroyed; } catch (err) { // Socket is probably already destroyed. } }; } else { sock._parent.destroy = sock._parent.reallyDestroy; try { if (sock._parent.toDestroy) sock._parent.destroy(); } catch (err) { // Socket is probably already destroyed. } } }); server.prependListener("secureConnection", function (sock) { sock._parent.destroy = sock._parent.reallyDestroy; delete sock._parent.reallyDestroy; }); if (configJSON.enableOCSPStapling && !ocsp._errored) { server.on("OCSPRequest", function (cert, issuer, callback) { ocsp.getOCSPURI(cert, function (err, uri) { if (err) return callback(err); var req = ocsp.request.generate(cert, issuer); var options = { url: uri, ocsp: req.data }; ocspCache.request(req.id, options, callback); }); }); } } // Patches from Node.JS v18.0.0 if (server.requestTimeout !== undefined && server.requestTimeout === 0) server.requestTimeout = 300000; if (server2.requestTimeout !== undefined && server2.requestTimeout === 0) server2.requestTimeout = 300000; function reqerrhandler(err, socket, fromMain) { if (fromMain === undefined) fromMain = true; // Define response object similar to Node.JS native one var res = {}; res.socket = socket; res.write = function (x) { if (err.code === "ECONNRESET" || !socket.writable) { return; } socket.write(x); }; res.end = function (x) { if (err.code === "ECONNRESET" || !socket.writable) { return; } socket.end(x, function () { try { socket.destroy(); } catch (err) { // Socket is probably already destroyed } }); }; res.writeHead = function (code, name, headers) { if (code >= 400 && code <= 499) err4xxcounter++; if (code >= 500 && code <= 599) err5xxcounter++; var head = ("HTTP/1.1 " + code.toString() + " " + name + "\r\n"); var headers = JSON.parse(JSON.stringify(headers)); headers["Date"] = (new Date()).toGMTString(); headers["Connection"] = "close"; Object.keys(headers).forEach(function (headername) { if (headername.toLowerCase() == "set-cookie") { headers[headername].forEach(function (headerValueS) { if (headername.match(/[^\x09\x20-\x7e\x80-\xff]|.:/) || headerValueS.match(/[^\x09\x20-\x7e\x80-\xff]/)) throw new Error("Invalid header!!! (" + headername + ")"); head += (headername + ": " + headerValueS); }); } else { if (headername.match(/[^\x09\x20-\x7e\x80-\xff]|.:/) || headers[headername].match(/[^\x09\x20-\x7e\x80-\xff]/)) throw new Error("Invalid header!!! (" + headername + ")"); head += (headername + ": " + headers[headername]); } head += "\r\n"; }); head += ("\r\n"); res.write(head); }; var reqIdInt = Math.floor(Math.random() * 16777216); if (reqIdInt == 16777216) reqIdInt = 0; var reqId = "0".repeat(6 - reqIdInt.toString(16).length) + reqIdInt.toString(16); var serverconsole = { climessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.climessage(nmsg); }); return; } console.log("\x1b[1mSERVER CLI MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg); LOG("SERVER CLI MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, reqmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.reqmessage(nmsg); }); return; } console.log("\x1b[34m\x1b[1mSERVER REQUEST MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER REQUEST MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, resmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.resmessage(nmsg); }); return; } console.log("\x1b[32m\x1b[1mSERVER RESPONSE MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER RESPONSE MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, errmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.errmessage(nmsg); }); return; } console.log("\x1b[31m\x1b[1mSERVER RESPONSE ERROR MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER RESPONSE ERROR MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, locerrmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locerrmessage(nmsg); }); return; } console.log("\x1b[41m\x1b[1mSERVER ERROR MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[40m\x1b[0m"); LOG("SERVER ERROR MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, locwarnmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locwarnmessage(nmsg); }); return; } console.log("\x1b[43m\x1b[1mSERVER WARNING MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[40m\x1b[0m"); LOG("SERVER WARNING MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, locmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locmessage(nmsg); }); return; } console.log("\x1b[1mSERVER MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg); LOG("SERVER MESSAGE [Request Id: " + reqId + "]: " + msg); return; } }; socket.on("close", function (hasError) { if (!hasError || err.code == "ERR_SSL_HTTP_REQUEST" || err.message.indexOf("http request") != -1) serverconsole.locmessage("Client disconnected."); else serverconsole.locmessage("Client disconnected due to error."); }); socket.on("error", function () {}); // Header and footer placeholders var head = ""; var foot = ""; function responseEnd(body) { // If body is Buffer, then it is converted to String anyway. res.write(head + body + foot); res.end(); } // Server error calling method function callServerError(errorCode, extName, stack, ch) { if (typeof errorCode !== "number") { throw new TypeError("HTTP error code parameter needs to be an integer."); } // Handle optional parameters if (extName && typeof extName === "object") { ch = stack; stack = extName; extName = undefined; } else if (typeof extName !== "string" && extName !== null && extName !== undefined) { throw new TypeError("Extension name parameter needs to be a string."); } if (stack && typeof stack === "object" && Object.prototype.toString.call(stack) !== "[object Error]") { ch = stack; stack = undefined; } else if (typeof stack !== "object" && typeof stack !== "string" && stack) { throw new TypeError("Error stack parameter needs to be either a string or an instance of Error object."); } // Determine error file function getErrorFileName(list, callback, _i) { if (err.code == "ERR_SSL_HTTP_REQUEST" && process.version && parseInt(process.version.split(".")[0].substring(1)) >= 16) { // Disable custom error page for HTTP SSL error callback(errorCode.toString() + ".html"); return; } function medCallback(p) { if (p) callback(p); else { if (errorCode == 404) { fs.access(page404, fs.constants.F_OK, function (err) { if (err) { fs.access("." + errorCode.toString(), fs.constants.F_OK, function (err) { try { if (err) { callback(errorCode.toString() + ".html"); } else { callback("." + errorCode.toString()); } } catch (err2) { callServerError(500, err2); } }); } else { try { callback(page404); } catch (err2) { callServerError(500, err2); } } }); } else { fs.access("." + errorCode.toString(), fs.constants.F_OK, function (err) { try { if (err) { callback(errorCode.toString() + ".html"); } else { callback("." + errorCode.toString()); } } catch (err2) { callServerError(500, err2); } }); } } } if (!_i) _i = 0; if (_i >= list.length) { medCallback(false); return; } if (list[_i].scode != errorCode) { getErrorFileName(list, callback, _i + 1); return; } else { fs.access(list[_i].path, fs.constants.F_OK, function (err) { if (err) { getErrorFileName(list, callback, _i + 1); } else { medCallback(list[_i].path); } }); } } getErrorFileName(errorPages, function (errorFile) { if (Object.prototype.toString.call(stack) === "[object Error]") stack = generateErrorStack(stack); if (stack === undefined) stack = generateErrorStack(new Error("Unknown error")); if (errorCode == 500 || errorCode == 502) { serverconsole.errmessage("There was an error while processing the request!"); serverconsole.errmessage("Stack:"); serverconsole.errmessage(stack); } if (stackHidden) stack = "[error stack hidden]"; if (serverHTTPErrorDescs[errorCode] === undefined) { callServerError(501, extName, stack); } else { var cheaders = getCustomHeaders(); if (ch) { var chon = Object.keys(cheaders); Object.keys(ch).forEach(function (chnS) { var nhn = chnS; for (var j = 0; j < chon.length; j++) { if (chon[j].toLowerCase() == chnS.toLowerCase()) { nhn = chon[j]; break; } } if (ch[chnS]) cheaders[nhn] = ch[chnS]; }); } cheaders["Content-Type"] = "text/html; charset=utf-8"; if (errorCode == 405 && !cheaders["Allow"]) cheaders["Allow"] = "GET, POST, HEAD, OPTIONS"; if (err.code == "ERR_SSL_HTTP_REQUEST" && process.version && parseInt(process.version.split(".")[0].substring(1)) >= 16) { // Disable custom error page for HTTP SSL error res.writeHead(errorCode, http.STATUS_CODES[errorCode], cheaders); res.write(("{errorMessage}

{errorMessage}

{errorDesc}

{server}

").replace(/{errorMessage}/g, errorCode.toString() + " " + http.STATUS_CODES[errorCode].replace(/&/g, "&").replace(//g, ">")).replace(/{errorDesc}/g, serverHTTPErrorDescs[errorCode]).replace(/{stack}/g, stack.replace(/&/g, "&").replace(//g, ">").replace(/\r\n/g, "
").replace(/\n/g, "
").replace(/\r/g, "
").replace(/ {2}/g, "  ")).replace(/{server}/g, "" + ((exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS") + ((!exposeModsInErrorPages || extName == undefined) ? "" : " " + extName)).replace(/&/g, "&").replace(//g, ">")).replace(/{contact}/g, serverAdmin.replace(/&/g, "&").replace(//g, ">").replace(/\./g, "[dot]").replace(/@/g, "[at]"))); res.end(); } else { fs.readFile(errorFile, function (err, data) { try { if (err) throw err; res.writeHead(errorCode, http.STATUS_CODES[errorCode], cheaders); responseEnd(data.toString().replace(/{errorMessage}/g, errorCode.toString() + " " + http.STATUS_CODES[errorCode].replace(/&/g, "&").replace(//g, ">")).replace(/{errorDesc}/g, serverHTTPErrorDescs[errorCode]).replace(/{stack}/g, stack.replace(/&/g, "&").replace(//g, ">").replace(/\r\n/g, "
").replace(/\n/g, "
").replace(/\r/g, "
").replace(/ {2}/g, "  ")).replace(/{server}/g, "" + ((exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS") + ((!exposeModsInErrorPages || extName == undefined) ? "" : " " + extName)).replace(/&/g, "&").replace(//g, ">")).replace(/{contact}/g, serverAdmin.replace(/&/g, "&").replace(//g, ">").replace(/\./g, "[dot]").replace(/@/g, "[at]"))); } catch (err) { var additionalError = 500; if (err.code == "ENOENT") { additionalError = 404; } else if (err.code == "ENOTDIR") { additionalError = 404; // Assume that file doesn't exist } else if (err.code == "EACCES") { additionalError = 403; } else if (err.code == "ENAMETOOLONG") { additionalError = 414; } else if (err.code == "EMFILE") { additionalError = 503; } else if (err.code == "ELOOP") { additionalError = 508; } res.writeHead(errorCode, http.STATUS_CODES[errorCode], cheaders); res.write(("{errorMessage}

{errorMessage}

{errorDesc}

" + ((additionalError == 404) ? "" : "

Additionally, a {additionalError} error occurred while loading an error page.

") + "

{server}

").replace(/{errorMessage}/g, errorCode.toString() + " " + http.STATUS_CODES[errorCode].replace(/&/g, "&").replace(//g, ">")).replace(/{errorDesc}/g, serverHTTPErrorDescs[errorCode]).replace(/{stack}/g, stack.replace(/&/g, "&").replace(//g, ">").replace(/\r\n/g, "
").replace(/\n/g, "
").replace(/\r/g, "
").replace(/ {2}/g, "  ")).replace(/{server}/g, "" + ((exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS") + ((!exposeModsInErrorPages || extName == undefined) ? "" : " " + extName)).replace(/&/g, "&").replace(//g, ">")).replace(/{contact}/g, serverAdmin.replace(/&/g, "&").replace(//g, ">").replace(/\./g, "[dot]").replace(/@/g, "[at]")).replace(/{additionalError}/g, additionalError.toString())); res.end(); } }); } } }); } var reqip = socket.remoteAddress; var reqport = socket.remotePort; reqcounter++; malformedcounter++; serverconsole.locmessage("Somebody connected to " + (secure && fromMain ? ((typeof sport == "number" ? "port " : "socket ") + sport) : ((typeof port == "number" ? "port " : "socket ") + port)) + "..."); serverconsole.reqmessage("Client " + ((!reqip || reqip == "") ? "[unknown client]" : (reqip + ((reqport && reqport !== 0) && reqport != "" ? ":" + reqport : ""))) + " sent invalid request."); try { head = fs.existsSync("./.head") ? fs.readFileSync("./.head").toString() : (fs.existsSync("./head.html") ? fs.readFileSync("./head.html").toString() : ""); // header foot = fs.existsSync("./.foot") ? fs.readFileSync("./.foot").toString() : (fs.existsSync("./foot.html") ? fs.readFileSync("./foot.html").toString() : ""); // footer if ((err.code && (err.code.indexOf("ERR_SSL_") == 0 || err.code.indexOf("ERR_TLS_") == 0)) || (!err.code && err.message.indexOf("SSL routines") != -1)) { if (err.code == "ERR_SSL_HTTP_REQUEST" || err.message.indexOf("http request") != -1) { serverconsole.errmessage("Client sent HTTP request to HTTPS port."); callServerError(497); return; } else { serverconsole.errmessage("An SSL error occured: " + (err.code ? err.code : err.message)); callServerError(400); return; } } if (err.code && err.code.indexOf("ERR_HTTP2_") == 0) { serverconsole.errmessage("An HTTP/2 error occured: " + err.code); callServerError(400); return; } if (err.code && err.code == "ERR_HTTP_REQUEST_TIMEOUT") { serverconsole.errmessage("Client timed out."); callServerError(408); return; } if (!err.rawPacket) { serverconsole.errmessage("Connection ended prematurely."); callServerError(400); return; } var packetLines = err.rawPacket.toString().split("\r\n"); if (packetLines.length == 0) { serverconsole.errmessage("Invalid request."); callServerError(400); return; } function checkHeaders(beginsFromFirst) { for (var i = (beginsFromFirst ? 0 : 1); i < packetLines.length; i++) { var header = packetLines[i]; if (header == "") return false; // Beginning of body else if (header.indexOf(":") < 1) { serverconsole.errmessage("Invalid header."); callServerError(400); return true; } else if (header.length > 8192) { serverconsole.errmessage("Header too large."); callServerError(431); // Headers too large return true; } } return false; } var packetLine1 = packetLines[0].split(" "); var method = "GET"; var httpVersion = "HTTP/1.1"; if (String(packetLine1[0]).indexOf(":") > 0) { if (!checkHeaders(true)) { serverconsole.errmessage("The request is invalid (it may be a part of larger invalid request)."); callServerError(400); // Also malformed Packet return; } } if (String(packetLine1[0]).length < 50) method = packetLine1.shift(); if (String(packetLine1[packetLine1.length - 1]).length < 50) httpVersion = packetLine1.pop(); if (packetLine1.length != 1) { serverconsole.errmessage("The head of request is invalid."); callServerError(400); // Malformed Packet } else if (!httpVersion.toString().match(/^HTTP[\/]/i)) { serverconsole.errmessage("Invalid protocol."); callServerError(400); // bad protocol version } else if (http.METHODS.indexOf(method) == -1) { serverconsole.errmessage("Invalid method."); callServerError(405); // Also malformed Packet } else { if (checkHeaders(false)) return; if (packetLine1[0].length > 255) { serverconsole.errmessage("URI too long."); callServerError(414); // Also malformed Packet } else { serverconsole.errmessage("The request is invalid."); callServerError(400); // Also malformed Packet } } } catch (err) { serverconsole.errmessage("There was an error while determining type of malformed request."); callServerError(400); } } function connhandler(request, socket, head) { var reqIdInt = Math.floor(Math.random() * 16777216); if (reqIdInt == 16777216) reqIdInt = 0; var reqId = "0".repeat(6 - reqIdInt.toString(16).length) + reqIdInt.toString(16); var serverconsole = { climessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.climessage(nmsg); }); return; } console.log("\x1b[1mSERVER CLI MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg); LOG("SERVER CLI MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, reqmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.reqmessage(nmsg); }); return; } console.log("\x1b[34m\x1b[1mSERVER REQUEST MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER REQUEST MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, resmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.resmessage(nmsg); }); return; } console.log("\x1b[32m\x1b[1mSERVER RESPONSE MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER RESPONSE MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, errmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.errmessage(nmsg); }); return; } console.log("\x1b[31m\x1b[1mSERVER RESPONSE ERROR MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER RESPONSE ERROR MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, locerrmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locerrmessage(nmsg); }); return; } console.log("\x1b[41m\x1b[1mSERVER ERROR MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[40m\x1b[0m"); LOG("SERVER ERROR MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, locwarnmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locwarnmessage(nmsg); }); return; } console.log("\x1b[43m\x1b[1mSERVER WARNING MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[40m\x1b[0m"); LOG("SERVER WARNING MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, locmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locmessage(nmsg); }); return; } console.log("\x1b[1mSERVER MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg); LOG("SERVER MESSAGE [Request Id: " + reqId + "]: " + msg); return; } }; var req = request; socket.on("close", function (hasError) { if (!hasError) serverconsole.locmessage("Client disconnected."); else serverconsole.locmessage("Client disconnected due to error."); }); socket.on("error", function () {}); var reqip = socket.remoteAddress; var reqport = socket.remotePort; reqcounter++; serverconsole.locmessage("Somebody connected to " + (secure ? ((typeof sport == "number" ? "port " : "socket ") + sport) : ((typeof port == "number" ? "port " : "socket ") + port)) + "..."); serverconsole.reqmessage("Client " + ((!reqip || reqip == "") ? "[unknown client]" : (reqip + ((reqport && reqport !== 0) && reqport != "" ? ":" + reqport : ""))) + " wants to proxy " + request.url + " through this server"); if (request.headers["user-agent"] != undefined) serverconsole.reqmessage("Client uses " + request.headers["user-agent"]); function modExecute(mods, ffinals) { var proxyMods = []; mods.forEach(function (mod) { if (mod.proxyCallback !== undefined) proxyMods.push(mod); }); var modFunction = ffinals; proxyMods.reverse().forEach(function (proxyMod) { modFunction = proxyMod.proxyCallback(req, socket, head, configJSON, serverconsole, modFunction); }); modFunction(); } function vres() { serverconsole.errmessage("SVR.JS doesn't support proxy without proxy mod."); if (!socket.destroyed) socket.end("HTTP/1.1 501 Not Implemented\n\n"); } modExecute(mods, vres); } function reqhandler(req, res, fromMain) { if (fromMain === undefined) fromMain = true; var reqIdInt = Math.floor(Math.random() * 16777216); if (reqIdInt == 16777216) reqIdInt = 0; var reqId = "0".repeat(6 - reqIdInt.toString(16).length) + reqIdInt.toString(16); var serverconsole = { climessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.climessage(nmsg); }); return; } console.log("\x1b[1mSERVER CLI MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg); LOG("SERVER CLI MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, reqmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.reqmessage(nmsg); }); return; } console.log("\x1b[34m\x1b[1mSERVER REQUEST MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER REQUEST MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, resmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.resmessage(nmsg); }); return; } console.log("\x1b[32m\x1b[1mSERVER RESPONSE MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER RESPONSE MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, errmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.errmessage(nmsg); }); return; } console.log("\x1b[31m\x1b[1mSERVER RESPONSE ERROR MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[37m\x1b[0m"); LOG("SERVER RESPONSE ERROR MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, locerrmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locerrmessage(nmsg); }); return; } console.log("\x1b[41m\x1b[1mSERVER ERROR MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[40m\x1b[0m"); LOG("SERVER ERROR MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, locwarnmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locwarnmessage(nmsg); }); return; } console.log("\x1b[43m\x1b[1mSERVER WARNING MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg + "\x1b[40m\x1b[0m"); LOG("SERVER WARNING MESSAGE [Request Id: " + reqId + "]: " + msg); return; }, locmessage: function (msg) { if (msg.indexOf("\n") != -1) { msg.split("\n").forEach(function (nmsg) { serverconsole.locmessage(nmsg); }); return; } console.log("\x1b[1mSERVER MESSAGE\x1b[22m [Request Id: " + reqId + "]: " + msg); LOG("SERVER MESSAGE [Request Id: " + reqId + "]: " + msg); return; } }; function matchHostname(hostname) { if (typeof hostname == "undefined" || hostname == "*") { return true; } else if (req.headers.host && hostname.indexOf("*.") == 0 && hostname != "*.") { var hostnamesRoot = hostname.substring(2); if (req.headers.host == hostnamesRoot || (req.headers.host.length > hostnamesRoot.length && req.headers.host.indexOf("." + hostnamesRoot) == req.headers.host.length - hostnamesRoot.length - 1)) { return true; } } else if (req.headers.host && req.headers.host == hostname) { return true; } return false; } function getCustomHeaders() { var ph = JSON.parse(JSON.stringify(customHeaders)); if (configJSON.customHeadersVHost) { var vhostP = null; configJSON.customHeadersVHost.every(function (vhost) { if (matchHostname(vhost.host) && ipMatch(vhost.ip, req.socket ? req.socket.localAddress : undefined)) { vhostP = vhost; return false; } else { return true; } }); if (vhostP && vhostP.headers) { var phNu = JSON.parse(JSON.stringify(vhostP.headers)); Object.keys(phNu).forEach(function (phNuK) { ph[phNuK] = phNu[phNuK]; }); } } Object.keys(ph).forEach(function (phk) { if (typeof ph[phk] == "string") ph[phk] = ph[phk].replace(/\{path\}/g, req.url); }); return ph; } // Make HTTP/1.x API-based scripts compatible with HTTP/2.0 API if (configJSON.enableHTTP2 == true && req.httpVersion == "2.0") { // Set HTTP/1.x methods (to prevent process warnings) res.writeHeadNodeApi = res.writeHead; res.setHeaderNodeApi = res.setHeader; res.writeHead = function (a, b, c) { var table = c; if (typeof (b) == "object") table = b; if (table == undefined) table = this.tHeaders; if (table == undefined) table = {}; table = JSON.parse(JSON.stringify(table)); Object.keys(table).forEach(function (key) { var al = key.toLowerCase(); if (al == "transfer-encoding" || al == "connection" || al == "keep-alive" || al == "upgrade") delete table[key]; }); if (res.stream && res.stream.destroyed) { return false; } else { return res.writeHeadNodeApi(a, table); } }; res.setHeader = function (headerName, headerValue) { var al = headerName.toLowerCase(); if (al != "transfer-encoding" && al != "connection" && al != "keep-alive" && al != "upgrade") return res.setHeaderNodeApi(headerName, headerValue); return false; }; // Set HTTP/1.x headers if (!req.headers.host) req.headers.host = req.headers[":authority"]; if (!req.url) req.url = req.headers[":path"]; if (!req.protocol) req.protocol = req.headers[":scheme"]; if (!req.method) req.method = req.headers[":method"]; if (req.headers[":path"] == undefined || req.headers[":method"] == undefined) { var err = new Error("Either \":path\" or \":method\" pseudoheader is missing."); if(Buffer.alloc) err.rawPacket = Buffer.alloc(0); reqerrhandler(err, req.socket, fromMain); } } if (req.headers["x-svr-js-from-main-thread"] == "true" && req.socket && (!req.socket.remoteAddress || req.socket.remoteAddress == "::1" || req.socket.remoteAddress == "::ffff:127.0.0.1" || req.socket.remoteAddress == "127.0.0.1" || req.socket.remoteAddress == "localhost" || req.socket.remoteAddress == host || req.socket.remoteAddress == "::ffff:" + host)) { var headers = getCustomHeaders(); res.writeHead(204, http.STATUS_CODES[204], headers); res.end(); return; } req.url = fixNodeMojibakeURL(req.url); var headWritten = false; var lastStatusCode = null; res.writeHeadNative = res.writeHead; res.writeHead = function (code, codeDescription, headers) { if (!(headWritten && process.isBun && code === lastStatusCode && codeDescription === undefined && codeDescription === undefined)) { if (headWritten) { process.emitWarning("res.writeHead called multiple times.", { code: "WARN_SVRJS_MULTIPLE_WRITEHEAD" }); return res; } else { headWritten = true; } if (code >= 400 && code <= 599) { if (code >= 400 && code <= 499) err4xxcounter++; else if (code >= 500 && code <= 599) err5xxcounter++; serverconsole.errmessage("Server responded with " + code.toString() + " code."); } else { serverconsole.resmessage("Server responded with " + code.toString() + " code."); } if (typeof codeDescription != "string" && http.STATUS_CODES[code]) { if (!headers) headers = codeDescription; codeDescription = http.STATUS_CODES[code]; } lastStatusCode = code; } res.writeHeadNative(code, codeDescription, headers); }; var finished = false; res.on("finish", function () { if (!finished) { finished = true; serverconsole.locmessage("Client disconnected."); } }); res.on("close", function () { if (!finished) { finished = true; serverconsole.locmessage("Client disconnected."); } }); var isProxy = false; if (req.url[0] != "/" && req.url != "*") isProxy = true; serverconsole.locmessage("Somebody connected to " + (secure && fromMain ? ((typeof sport == "number" ? "port " : "socket ") + sport) : ((typeof port == "number" ? "port " : "socket ") + port)) + "..."); if (req.socket == null) { serverconsole.errmessage("Client socket is null!!!"); return; } // Set up X-Forwarded-For var reqip = req.socket.remoteAddress; var reqport = req.socket.remotePort; var oldip = ""; var oldport = ""; var isForwardedValid = true; if (enableIPSpoofing) { if (req.headers["x-forwarded-for"] != undefined) { var preparedReqIP = req.headers["x-forwarded-for"].split(",")[0].replace(/ /g, ""); var preparedReqIPvalid = net.isIP(preparedReqIP); if (preparedReqIPvalid) { if (preparedReqIPvalid == 4 && req.socket.remoteAddress && req.socket.remoteAddress.indexOf(":") > -1) preparedReqIP = "::ffff:" + preparedReqIP; reqip = preparedReqIP; reqport = null; try { oldport = req.socket.remotePort; oldip = req.socket.remoteAddress; req.socket.realRemotePort = reqport; req.socket.realRemoteAddress = reqip; req.socket.originalRemotePort = oldport; req.socket.originalRemoteAddress = oldip; res.socket.realRemotePort = reqport; res.socket.realRemoteAddress = reqip; res.socket.originalRemotePort = oldport; res.socket.originalRemoteAddress = oldip; } catch (err) { // Address setting failed } } else { isForwardedValid = false; } } } reqcounter++; // Process the Host header var oldHostHeader = req.headers.host; if (typeof req.headers.host == "string") { req.headers.host = req.headers.host.toLowerCase(); if (!req.headers.host.match(/^\.+$/)) req.headers.host = req.headers.host.replace(/\.$/g, ""); } serverconsole.reqmessage("Client " + ((!reqip || reqip == "") ? "[unknown client]" : (reqip + ((reqport && reqport !== 0) && reqport != "" ? ":" + reqport : ""))) + " wants " + (req.method == "GET" ? "content in " : (req.method == "POST" ? "to post content in " : (req.method == "PUT" ? "to add content in " : (req.method == "DELETE" ? "to delete content in " : (req.method == "PATCH" ? "to patch content in " : "to access content using " + req.method + " method in "))))) + ((req.headers.host == undefined || isProxy) ? "" : req.headers.host) + req.url); if (req.headers["user-agent"] != undefined) serverconsole.reqmessage("Client uses " + req.headers["user-agent"]); if (oldHostHeader && oldHostHeader != req.headers.host) serverconsole.resmessage("Host name rewritten: " + oldHostHeader + " => " + req.headers.host); var acceptEncoding = req.headers["accept-encoding"]; if (!acceptEncoding) acceptEncoding = ""; // Header and footer placeholders var head = ""; var foot = ""; function responseEnd(body) { // If body is Buffer, then it is converted to String anyway. res.write(head + body + foot); res.end(); } // Server error calling method function callServerError(errorCode, extName, stack, ch) { if (typeof errorCode !== "number") { throw new TypeError("HTTP error code parameter needs to be an integer."); } // Handle optional parameters if (extName && typeof extName === "object") { ch = stack; stack = extName; extName = undefined; } else if (typeof extName !== "string" && extName !== null && extName !== undefined) { throw new TypeError("Extension name parameter needs to be a string."); } if (stack && typeof stack === "object" && Object.prototype.toString.call(stack) !== "[object Error]") { ch = stack; stack = undefined; } else if (typeof stack !== "object" && typeof stack !== "string" && stack) { throw new TypeError("Error stack parameter needs to be either a string or an instance of Error object."); } // Determine error file function getErrorFileName(list, callback, _i) { function medCallback(p) { if (p) callback(p); else { if (errorCode == 404) { fs.access(page404, fs.constants.F_OK, function (err) { if (err) { fs.access("." + errorCode.toString(), fs.constants.F_OK, function (err) { try { if (err) { callback(errorCode.toString() + ".html"); } else { callback("." + errorCode.toString()); } } catch (err2) { callServerError(500, err2); } }); } else { try { callback(page404); } catch (err2) { callServerError(500, err2); } } }); } else { fs.access("." + errorCode.toString(), fs.constants.F_OK, function (err) { try { if (err) { callback(errorCode.toString() + ".html"); } else { callback("." + errorCode.toString()); } } catch (err2) { callServerError(500, err2); } }); } } } if (!_i) _i = 0; if (_i >= list.length) { medCallback(false); return; } if (list[_i].scode != errorCode || !(matchHostname(list[_i].host) && ipMatch(list[_i].ip, req.socket ? req.socket.localAddress : undefined))) { getErrorFileName(list, callback, _i + 1); return; } else { fs.access(list[_i].path, fs.constants.F_OK, function (err) { if (err) { getErrorFileName(list, callback, _i + 1); } else { medCallback(list[_i].path); } }); } } getErrorFileName(errorPages, function (errorFile) { // Generate error stack if not provided if (Object.prototype.toString.call(stack) === "[object Error]") stack = generateErrorStack(stack); if (stack === undefined) stack = generateErrorStack(new Error("Unknown error")); if (errorCode == 500 || errorCode == 502) { serverconsole.errmessage("There was an error while processing the request!"); serverconsole.errmessage("Stack:"); serverconsole.errmessage(stack); } // Hide the error stack if specified if (stackHidden) stack = "[error stack hidden]"; // Validate the error code and handle unknown codes if (serverHTTPErrorDescs[errorCode] === undefined) { callServerError(501, extName, stack); } else { var cheaders = getCustomHeaders(); // Process custom headers if provided if (ch) { var chon = Object.keys(cheaders); Object.keys(ch).forEach(function (chnS) { var nhn = chnS; for (var j = 0; j < chon.length; j++) { if (chon[j].toLowerCase() == chnS.toLowerCase()) { nhn = chon[j]; break; } } if (ch[chnS]) cheaders[nhn] = ch[chnS]; }); } cheaders["Content-Type"] = "text/html; charset=utf-8"; // Set default Allow header for 405 error if not provided if (errorCode == 405 && !cheaders["Allow"]) cheaders["Allow"] = "GET, POST, HEAD, OPTIONS"; // Read the error file and replace placeholders with error information fs.readFile(errorFile, function (err, data) { try { if (err) throw err; res.writeHead(errorCode, http.STATUS_CODES[errorCode], cheaders); responseEnd(data.toString().replace(/{errorMessage}/g, errorCode.toString() + " " + http.STATUS_CODES[errorCode].replace(/&/g, "&").replace(//g, ">")).replace(/{errorDesc}/g, serverHTTPErrorDescs[errorCode]).replace(/{stack}/g, stack.replace(/&/g, "&").replace(//g, ">").replace(/\r\n/g, "
").replace(/\n/g, "
").replace(/\r/g, "
").replace(/ {2}/g, "  ")).replace(/{path}/g, req.url.replace(/&/g, "&").replace(//g, ">")).replace(/{server}/g, "" + ((exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS") + ((!exposeModsInErrorPages || extName == undefined) ? "" : " " + extName)).replace(/&/g, "&").replace(//g, ">") + ((req.headers.host == undefined || isProxy) ? "" : " on " + String(req.headers.host).replace(/&/g, "&").replace(//g, ">"))).replace(/{contact}/g, serverAdmin.replace(/&/g, "&").replace(//g, ">").replace(/\./g, "[dot]").replace(/@/g, "[at]"))); // Replace placeholders in error response } catch (err) { var additionalError = 500; // Handle additional error cases if (err.code == "ENOENT") { additionalError = 404; } else if (err.code == "ENOTDIR") { additionalError = 404; // Assume that file doesn't exist } else if (err.code == "EACCES") { additionalError = 403; } else if (err.code == "ENAMETOOLONG") { additionalError = 414; } else if (err.code == "EMFILE") { additionalError = 503; } else if (err.code == "ELOOP") { additionalError = 508; } res.writeHead(errorCode, http.STATUS_CODES[errorCode], cheaders); res.write(("{errorMessage}

{errorMessage}

{errorDesc}

" + ((additionalError == 404) ? "" : "

Additionally, a {additionalError} error occurred while loading an error page.

") + "

{server}

").replace(/{errorMessage}/g, errorCode.toString() + " " + http.STATUS_CODES[errorCode].replace(/&/g, "&").replace(//g, ">")).replace(/{errorDesc}/g, serverHTTPErrorDescs[errorCode]).replace(/{stack}/g, stack.replace(/&/g, "&").replace(//g, ">").replace(/\r\n/g, "
").replace(/\n/g, "
").replace(/\r/g, "
").replace(/ {2}/g, "  ")).replace(/{path}/g, req.url.replace(/&/g, "&").replace(//g, ">")).replace(/{server}/g, "" + ((exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS") + ((!exposeModsInErrorPages || extName == undefined) ? "" : " " + extName)).replace(/&/g, "&").replace(//g, ">") + ((req.headers.host == undefined || isProxy) ? "" : " on " + String(req.headers.host).replace(/&/g, "&").replace(//g, ">"))).replace(/{contact}/g, serverAdmin.replace(/&/g, "&").replace(//g, ">").replace(/\./g, "[dot]").replace(/@/g, "[at]")).replace(/{additionalError}/g, additionalError.toString())); // Replace placeholders in error response res.end(); } }); } }); } try { head = fs.existsSync("./.head") ? fs.readFileSync("./.head").toString() : (fs.existsSync("./head.html") ? fs.readFileSync("./head.html").toString() : ""); // header foot = fs.existsSync("./.foot") ? fs.readFileSync("./.foot").toString() : (fs.existsSync("./foot.html") ? fs.readFileSync("./foot.html").toString() : ""); // footer } catch (err) { callServerError(500, err); } // Function to perform HTTP redirection to a specified destination URL function redirect(destination, isTemporary, keepMethod, customHeaders) { // If keepMethod is a object, then save it to customHeaders if (typeof keepMethod == "object") customHeaders = keepMethod; // If isTemporary is a object, then save it to customHeaders if (typeof isTemporary == "object") customHeaders = isTemporary; // If customHeaders are not provided, get the default custom headers if (customHeaders === undefined) customHeaders = getCustomHeaders(); // Set the "Location" header to the destination URL customHeaders["Location"] = destination; // Determine the status code for redirection based on the isTemporary and keepMethod flags var statusCode = keepMethod ? (isTemporary ? 307 : 308) : (isTemporary ? 302 : 301); // Write the response header with the appropriate status code and message res.writeHead(statusCode, http.STATUS_CODES[statusCode], customHeaders); // Log the redirection message serverconsole.resmessage("Client redirected to " + destination); // End the response res.end(); // Return from the function return; } // Function to parse incoming POST data from the request function parsePostData(options, callback) { // If the request method is not POST, return a 405 Method Not Allowed error if (req.method != "POST") { // Get the default custom headers and add "Allow" header with value "POST" var customHeaders = getCustomHeaders(); customHeaders["Allow"] = "POST"; // Call the server error function with 405 status code and custom headers callServerError(405, customHeaders); return; } // Set formidableOptions to options, if provided; otherwise, set it to an empty object var formidableOptions = options ? options : {}; // If no callback is provided, set the callback to options and reset formidableOptions if (!callback) { callback = options; formidableOptions = {}; } // If the formidable module had an error, call the server error function with 500 status code and error stack if (formidable._errored) callServerError(500, formidable._errored); // Create a new formidable form var form = formidable(formidableOptions); // Parse the request and process the fields and files form.parse(req, function (err, fields, files) { // If there was an error, call the server error function with status code determined by error if (err) { if (err.httpCode) callServerError(err.httpCode); else callServerError(400); return; } // Otherwise, call the provided callback function with the parsed fields and files callback(fields, files); }); } // Authenticated user variable var authUser = null; // URL-related objects. var uobject = {}; try { uobject = parseURL(req.url, "http" + (req.socket.encrypted ? "s" : "") + "://" + (req.headers.host ? req.headers.host : (domain ? domain : "unknown.invalid"))); } catch (err) { // Return an 400 error callServerError(400); serverconsole.errmessage("Bad request!"); return; } var search = uobject.search; var href = uobject.pathname; var ext = href.match(/[^\/]\.([^.]+)$/); if(!ext) ext = ""; else ext = ext[1].toLowerCase(); var decodedHref = ""; try { decodedHref = decodeURIComponent(href); } catch (err) { // Return an 400 error callServerError(400); serverconsole.errmessage("Bad request!"); return; } var origHref = href; // Placeholder origHref if (req.headers["expect"] && req.headers["expect"] != "100-continue") { // Expectations not met. callServerError(417); return; } // Mod execution function function modExecute(mods, ffinals) { // Prepare modFunction var modFunction = ffinals; var useMods = mods.slice(); if (isProxy) { // Get list of forward proxy mods useMods = []; mods.forEach(function (mod) { if (mod.proxyCallback !== undefined) useMods.push(mod); }); } useMods.reverse().forEach(function (modO) { modFunction = modO.callback(req, res, serverconsole, responseEnd, href, ext, uobject, search, "index.html", users, page404, head, foot, "", modFunction, configJSON, callServerError, getCustomHeaders, origHref, redirect, parsePostData, authUser); }); // Execute modFunction modFunction(); } var vresCalled = false; function vres() { if (vresCalled) { process.emitWarning("elseCallback() invoked multiple times.", { code: "WARN_SVRJS_MULTIPLE_ELSECALLBACK" }); return; } else { vresCalled = true; } // Function to check the level of a path relative to the web root function checkPathLevel(path) { // Split the path into an array of components based on "/" var pathComponents = path.split("/"); // Initialize counters for level up (..) and level down (.) var levelUpCount = 0; var levelDownCount = 0; // Loop through the path components for (var i = 0; i < pathComponents.length; i++) { // If the component is "..", decrement the levelUpCount if (".." === pathComponents[i]) { levelUpCount--; } // If the component is not "." or an empty string, increment the levelDownCount else if ("." !== pathComponents[i] && "" !== pathComponents[i]) { levelDownCount++; } } // Calculate the overall level by subtracting levelUpCount from levelDownCount var overallLevel = levelDownCount - levelUpCount; // Return the overall level return overallLevel; } if (isProxy) { var eheaders = getCustomHeaders(); eheaders["Content-Type"] = "text/html; charset=utf-8"; res.writeHead(501, http.STATUS_CODES[501], eheaders); res.write("Proxy not implemented

Proxy not implemented

SVR.JS doesn't support proxy without proxy mod. If you're administator of this server, then install this mod in order to use SVR.JS as a proxy.

" + (exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS").replace(/&/g, "&").replace(//g, ">") + "

"); res.end(); serverconsole.errmessage("SVR.JS doesn't support proxy without proxy mod."); return; } if (req.method == "OPTIONS") { var hdss = getCustomHeaders(); hdss["Allow"] = "GET, POST, HEAD, OPTIONS"; res.writeHead(204, http.STATUS_CODES[204], hdss); res.end(); return; } else if (req.method != "GET" && req.method != "POST" && req.method != "HEAD") { callServerError(405); serverconsole.errmessage("Invaild method: " + req.method); return; } if (allowStatus && (href == "/svrjsstatus.svr" || (os.platform() == "win32" && href.toLowerCase() == "/svrjsstatus.svr"))) { function formatRelativeTime(relativeTime) { var days = Math.floor(relativeTime / 60 / (60 * 24)); var dateDiff = new Date(relativeTime * 1000); return days + " days, " + dateDiff.getUTCHours() + " hours, " + dateDiff.getUTCMinutes() + " minutes, " + dateDiff.getUTCSeconds() + " seconds"; } var statusBody = ""; statusBody += "Server version: " + (exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS").replace(/&/g, "&").replace(//g, ">") + "

"; //Those entries are just dates and numbers converted/formatted to strings, so no escaping is needed. statusBody += "Current time: " + new Date().toString() + "
Thread start time: " + new Date(new Date() - (process.uptime() * 1000)).toString() + "
Thread uptime: " + formatRelativeTime(Math.floor(process.uptime())) + "
"; statusBody += "OS uptime: " + formatRelativeTime(os.uptime()) + "
"; statusBody += "Total request count: " + reqcounter + "
"; statusBody += "Average request rate: " + (Math.round((reqcounter / process.uptime()) * 100) / 100) + " requests/s
"; statusBody += "Client errors (4xx): " + err4xxcounter + "
"; statusBody += "Server errors (5xx): " + err5xxcounter + "
"; statusBody += "Average error rate: " + (Math.round(((err4xxcounter + err5xxcounter) / reqcounter) * 10000) / 100) + "%
"; statusBody += "Malformed HTTP requests: " + malformedcounter; if (process.memoryUsage) statusBody += "
Memory usage of thread: " + sizify(process.memoryUsage().rss, true) + "B"; if (process.cpuUsage) statusBody += "
Total CPU usage by thread: u" + (process.cpuUsage().user / 1000) + "ms s" + (process.cpuUsage().system / 1000) + "ms - " + (Math.round((((process.cpuUsage().user + process.cpuUsage().system) / 1000000) / process.uptime()) * 1000) / 1000) + "%"; statusBody += "
Thread PID: " + process.pid + "
"; res.writeHead(200, http.STATUS_CODES[200], { "Content-Type": "text/html; charset=utf-8" }); res.end((head == "" ? "SVR.JS status" + (req.headers.host == undefined ? "" : " for " + String(req.headers.host).replace(/&/g, "&").replace(/</g, "<").replace(/>/g, ">")) + "" : head.replace(//i, "SVR.JS status" + (req.headers.host == undefined ? "" : " for " + String(req.headers.host).replace(/&/g, "&").replace(/</g, "<").replace(/>/g, ">")) + "")) + "

SVR.JS status" + (req.headers.host == undefined ? "" : " for " + String(req.headers.host).replace(/&/g, "&").replace(//g, ">")) + "

" + statusBody + (foot == "" ? "" : foot)); return; } var dHref = decodeURIComponent(href); var readFrom = "." + dHref; var dirImagesMissing = false; fs.stat(readFrom, function (err, stats) { if (err) { if (err.code == "ENOENT") { if (__dirname != process.cwd() && dHref.match(/^\/\.dirimages\/(?:(?!\.png$).)+\.png$/)) { dirImagesMissing = true; readFrom = __dirname + dHref; } else { callServerError(404); serverconsole.errmessage("Resource not found."); return; } } else if (err.code == "ENOTDIR") { callServerError(404); // Assume that file doesn't exist. serverconsole.errmessage("Resource not found."); return; } else if (err.code == "EACCES") { callServerError(403); serverconsole.errmessage("Access denied."); return; } else if (err.code == "ENAMETOOLONG") { callServerError(414); return; } else if (err.code == "EMFILE") { callServerError(503); return; } else if (err.code == "ELOOP") { callServerError(508); // The symbolic link loop is detected during file system operations. serverconsole.errmessage("Symbolic link loop detected."); return; } else { callServerError(500, err); return; } } // Check if index file exists if (!dirImagesMissing && (req.url == "/" || stats.isDirectory())) { fs.stat((readFrom + "/index.html").replace(/\/+/g, "/"), function (e, s) { if (e || !s.isFile()) { fs.stat((readFrom + "/index.htm").replace(/\/+/g, "/"), function (e, s) { if (e || !s.isFile()) { fs.stat((readFrom + "/index.xhtml").replace(/\/+/g, "/"), function (e, s) { if (e || !s.isFile()) { properDirectoryListingAndStaticFileServe(); } else { stats = s; ext = "xhtml"; readFrom = (readFrom + "/index.xhtml").replace(/\/+/g, "/"); properDirectoryListingAndStaticFileServe(); } }); } else { stats = s; ext = "htm"; readFrom = (readFrom + "/index.htm").replace(/\/+/g, "/"); properDirectoryListingAndStaticFileServe(); } }); } else { stats = s; ext = "html"; readFrom = (readFrom + "/index.html").replace(/\/+/g, "/"); properDirectoryListingAndStaticFileServe(); } }); } else if (dirImagesMissing) { fs.stat(readFrom, function (e, s) { if (e || !s.isFile()) { properDirectoryListingAndStaticFileServe(); } else { stats = s; properDirectoryListingAndStaticFileServe(); } }); } else { properDirectoryListingAndStaticFileServe(); } function properDirectoryListingAndStaticFileServe() { if (stats.isFile()) { var acceptEncoding = req.headers["accept-encoding"]; if (!acceptEncoding) acceptEncoding = ""; var filelen = stats.size; // ETag code var fileETag = undefined; if (configJSON.enableETag == undefined || configJSON.enableETag) { fileETag = generateETag(href, stats); // Check if the client's request matches the ETag value (If-None-Match) var clientETag = req.headers["if-none-match"]; if (clientETag === fileETag) { res.writeHead(304, http.STATUS_CODES[304], { "ETag": clientETag }); res.end(); return; } // Check if the client's request doesn't match the ETag value (If-Match) var ifMatchETag = req.headers["if-match"]; if (ifMatchETag && ifMatchETag !== "*" && ifMatchETag !== fileETag) { callServerError(412, { "ETag": clientETag }); return; } } // Handle partial content request if (req.headers["range"]) { try { var rhd = getCustomHeaders(); rhd["Accept-Ranges"] = "bytes"; rhd["Content-Range"] = "bytes */" + filelen; var regexmatch = req.headers["range"].match(/bytes=([0-9]*)-([0-9]*)/); if (!regexmatch) { callServerError(416, rhd); } else { // Process the partial content request var beginOrig = regexmatch[1]; var endOrig = regexmatch[2]; var maxEnd = filelen - 1 + (ext == "html" ? head.length + foot.length : 0) var begin = 0; var end = maxEnd; if (beginOrig == "" && endOrig == "") { callServerError(416, rhd); return; } else if (beginOrig == "") { begin = end - parseInt(endOrig) + 1; } else { begin = parseInt(beginOrig); if (endOrig != "") end = parseInt(endOrig); } if (begin > end || begin < 0 || begin > maxEnd) { callServerError(416, rhd); return; } if (end > maxEnd) end = maxEnd; rhd["Content-Range"] = "bytes " + begin + "-" + end + "/" + filelen; rhd["Content-Length"] = end - begin + 1; delete rhd["Content-Type"]; var mtype = mime.contentType(ext); if (mtype && ext != "") rhd["Content-Type"] = mtype; if (fileETag) rhd["ETag"] = fileETag; if (req.method != "HEAD") { if (ext == "html" && begin < head.length && (end - begin) < head.length) { res.writeHead(206, http.STATUS_CODES[206], hdhds); res.end(head.substring(begin, end + 1)); return; } else if (ext == "html" && begin >= head.length + filelen){ res.writeHead(206, http.STATUS_CODES[206], hdhds); res.end(foot.substring(begin - head.length - filelen, end - head.length - filelen + 1)); return; } var readStream = fs.createReadStream(readFrom, { start: ext == "html" ? Math.max(0, begin - head.length) : begin, end: ext == "html" ? Math.min(filelen, end - head.length) : end }); readStream.on("error", function (err) { if (err.code == "ENOENT") { callServerError(404); serverconsole.errmessage("Resource not found."); } else if (err.code == "ENOTDIR") { callServerError(404); // Assume that file doesn't exist. serverconsole.errmessage("Resource not found."); } else if (err.code == "EACCES") { callServerError(403); serverconsole.errmessage("Access denied."); } else if (err.code == "ENAMETOOLONG") { callServerError(414); } else if (err.code == "EMFILE") { callServerError(503); } else if (err.code == "ELOOP") { callServerError(508); // The symbolic link loop is detected during file system operations. serverconsole.errmessage("Symbolic link loop detected."); } else { callServerError(500, err); } }).on("open", function () { try { if (ext == "html") { function afterWriteCallback() { if(foot.length > 0 && end > head.length + filelen) { readStream.on("end", function () { res.end(foot.substring(0, end - head.length - filelen + 1)); }); } readStream.pipe(res, { end: !(foot.length > 0 && end > head.length + filelen) }); } res.writeHead(206, http.STATUS_CODES[206], hdhds); if (head.length == 0 || begin > head.length) { afterWriteCallback(); } else if (!res.write(head.substring(begin, head.length - begin))) { res.on("drain", afterWriteCallback); } else { process.nextTick(afterWriteCallback); } } else { res.writeHead(206, http.STATUS_CODES[206], rhd); readStream.pipe(res); } serverconsole.resmessage("Client successfully received content."); } catch (err) { callServerError(500, err); } }); } else { res.writeHead(206, http.STATUS_CODES[206], rhd); res.end(); } } } catch (err) { callServerError(500, err); } } else { // Helper function to check if compression is allowed for the file function canCompress(path, list) { var canCompress = true; for (var i = 0; i < list.length; i++) { if (createRegex(list[i], true).test(path)) { canCompress = false; break; } } return canCompress; } var useBrotli = (ext != "br" && filelen > 256 && zlib.createBrotliCompress && acceptEncoding.match(/\bbr\b/)); var useDeflate = (ext != "zip" && filelen > 256 && acceptEncoding.match(/\bdeflate\b/)); var useGzip = (ext != "gz" && filelen > 256 && acceptEncoding.match(/\bgzip\b/)); var isCompressable = true; try { // Check for files not to compressed and compression enabling setting. Also check for browser quirks and adjust compression accordingly if((!useBrotli && !useDeflate && !useGzip) || configJSON.enableCompression !== true || !canCompress(href, dontCompress)) { isCompressable = false; // Compression is disabled } else if (ext != "html" && ext != "htm" && ext != "xhtml" && ext != "xht" && ext != "shtml") { if (/^Mozilla\/4\.[0-9]+(( *\[[^)]*\] *| *)\([^)\]]*\))? *$/.test(req.headers["user-agent"]) && !(/https?:\/\/|[bB][oO][tT]|[sS][pP][iI][dD][eE][rR]|[sS][uU][rR][vV][eE][yY]|MSIE/.test(req.headers["user-agent"]))) { isCompressable = false; // Netscape 4.x doesn't handle compressed data properly outside of HTML documents. } else if (/^w3m\/[^ ]*$/.test(req.headers["user-agent"])) { isCompressable = false; // w3m doesn't handle compressed data properly outside of HTML documents. } } else { if (/^Mozilla\/4\.0[6-8](( *\[[^)]*\] *| *)\([^)\]]*\))? *$/.test(req.headers["user-agent"]) && !(/https?:\/\/|[bB][oO][tT]|[sS][pP][iI][dD][eE][rR]|[sS][uU][rR][vV][eE][yY]|MSIE/.test(req.headers["user-agent"]))) { isCompressable = false; // Netscape 4.06-4.08 doesn't handle compressed data properly. } } } catch (err) { callServerError(500, err); return; } // Bun 1.1 has definition for zlib.createBrotliCompress, but throws an error while invoking the function. if (process.isBun && useBrotli && isCompressable) { try { zlib.createBrotliCompress(); } catch (err) { useBrotli = false; } } try { var hdhds = {}; if (useBrotli && isCompressable) { hdhds["Content-Encoding"] = "br"; } else if (useDeflate && isCompressable) { hdhds["Content-Encoding"] = "deflate"; } else if (useGzip && isCompressable) { hdhds["Content-Encoding"] = "gzip"; } else { if (ext == "html") { hdhds["Content-Length"] = head.length + filelen + foot.length; } else { hdhds["Content-Length"] = filelen; } } hdhds["Accept-Ranges"] = "bytes"; delete hdhds["Content-Type"]; var mtype = mime.contentType(ext); if (mtype && ext != "") hdhds["Content-Type"] = mtype; if (fileETag) hdhds["ETag"] = fileETag; if (req.method != "HEAD") { var readStream = fs.createReadStream(readFrom); readStream.on("error", function (err) { if (err.code == "ENOENT") { callServerError(404); serverconsole.errmessage("Resource not found."); } else if (err.code == "ENOTDIR") { callServerError(404); // Assume that file doesn't exist. serverconsole.errmessage("Resource not found."); } else if (err.code == "EACCES") { callServerError(403); serverconsole.errmessage("Access denied."); } else if (err.code == "ENAMETOOLONG") { callServerError(414); } else if (err.code == "EMFILE") { callServerError(503); } else if (err.code == "ELOOP") { callServerError(508); // The symbolic link loop is detected during file system operations. serverconsole.errmessage("Symbolic link loop detected."); } else { callServerError(500, err); } }).on("open", function () { try { var resStream = {}; if (useBrotli && isCompressable) { resStream = zlib.createBrotliCompress(); resStream.pipe(res); } else if (useDeflate && isCompressable) { resStream = zlib.createDeflateRaw(); resStream.pipe(res); } else if (useGzip && isCompressable) { resStream = zlib.createGzip(); resStream.pipe(res); } else { resStream = res; } if (ext == "html") { function afterWriteCallback() { if (foot.length > 0) { readStream.on("end", function () { resStream.end(foot); }); } readStream.pipe(resStream, { end: (foot.length == 0) }); } res.writeHead(200, http.STATUS_CODES[200], hdhds); if (head.length == 0) { afterWriteCallback(); } else if (!resStream.write(head)) { resStream.on("drain", afterWriteCallback); } else { process.nextTick(afterWriteCallback); } } else { res.writeHead(200, http.STATUS_CODES[200], hdhds); readStream.pipe(resStream); } serverconsole.resmessage("Client successfully received content."); } catch (err) { callServerError(500, err); } }); } else { res.writeHead(200, http.STATUS_CODES[200], hdhds); res.end(); serverconsole.resmessage("Client successfully received content."); } } catch (err) { callServerError(500, err); } } } else if (stats.isDirectory()) { // Check if directory listing is enabled in the configuration if (checkForEnabledDirectoryListing(req.headers.host, req.socket ? req.socket.localAddress : undefined)) { var customDirListingHeader = ""; var customDirListingFooter = ""; function getCustomDirListingHeader(callback) { fs.readFile(("." + dHref + "/.dirhead").replace(/\/+/g, "/"), function (err, data) { if (err) { if (err.code == "ENOENT" || err.code == "EISDIR") { if (os.platform != "win32" || href != "/") { fs.readFile(("." + dHref + "/HEAD.html").replace(/\/+/g, "/"), function (err, data) { if (err) { if (err.code == "ENOENT" || err.code == "EISDIR") { callback(); } else { callServerError(500, err); } } else { customDirListingHeader = data.toString(); callback(); } }); } else { callback(); } } else { callServerError(500, err); } } else { customDirListingHeader = data.toString(); callback(); } }); } function getCustomDirListingFooter(callback) { fs.readFile(("." + dHref + "/.dirfoot").replace(/\/+/g, "/"), function (err, data) { if (err) { if (err.code == "ENOENT" || err.code == "EISDIR") { if (os.platform != "win32" || href != "/") { fs.readFile(("." + dHref + "/FOOT.html").replace(/\/+/g, "/"), function (err, data) { if (err) { if (err.code == "ENOENT" || err.code == "EISDIR") { callback(); } else { callServerError(500, err); } } else { customDirListingFooter = data.toString(); callback(); } }); } else { callback(); } } else { callServerError(500, err); } } else { customDirListingFooter = data.toString(); callback(); } }); } // Read custom header and footer content (if available) getCustomDirListingHeader(function () { getCustomDirListingFooter(function () { // Check if custom header has HTML tag var headerHasHTMLTag = customDirListingHeader.replace(/|$)/g, "").match(/])*(?:>|$)/i); // Generate HTML head and footer based on configuration and custom content var htmlHead = (!configJSON.enableDirectoryListingWithDefaultHead || head == "" ? (!headerHasHTMLTag ? "Directory: " + decodeURIComponent(origHref).replace(/&/g, "&").replace(/</g, "<").replace(/>/g, ">") + "" : customDirListingHeader.replace(//i, "Directory: " + decodeURIComponent(origHref).replace(/&/g, "&").replace(/</g, "<").replace(/>/g, ">") + "")) : head.replace(//i, "Directory: " + decodeURIComponent(origHref).replace(/&/g, "&").replace(/</g, "<").replace(/>/g, ">") + "")) + (!headerHasHTMLTag ? customDirListingHeader : "") + "

Directory: " + decodeURIComponent(origHref).replace(/&/g, "&").replace(//g, ">") + "

" + (checkPathLevel(decodeURIComponent(origHref)) < 1 ? "" : ""); var htmlFoot = "
Filename Size Date
\"[RET]\"Return

" + (exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS").replace(/&/g, "&").replace(//g, ">") + (req.headers.host == undefined ? "" : " on " + String(req.headers.host).replace(/&/g, "&").replace(//g, ">")) + "

" + customDirListingFooter + (!configJSON.enableDirectoryListingWithDefaultHead || foot == "" ? "" : foot); if (fs.existsSync("." + decodeURIComponent(href) + "/.maindesc".replace(/\/+/g, "/"))) { htmlFoot = "
" + fs.readFileSync("." + decodeURIComponent(href) + "/.maindesc".replace(/\/+/g, "/")) + htmlFoot; } fs.readdir(readFrom, function (err, list) { try { if (err) throw err; list = list.sort(); // Function to get stats for all files in the directory function getStatsForAllFilesI(fileList, callback, prefix, pushArray, index) { if (fileList.length == 0) { callback(pushArray); return; } fs.stat((prefix + "/" + fileList[index]).replace(/\/+/g, "/"), function (err, stats) { if (err) { fs.lstat((prefix + "/" + fileList[index]).replace(/\/+/g, "/"), function (err, stats) { pushArray.push({ name: fileList[index], stats: err ? null : stats, errored: true }); if (index < fileList.length - 1) { getStatsForAllFilesI(fileList, callback, prefix, pushArray, index + 1); } else { callback(pushArray); } }); } else { pushArray.push({ name: fileList[index], stats: stats, errored: false }); if (index < fileList.length - 1) { getStatsForAllFilesI(fileList, callback, prefix, pushArray, index + 1); } else { callback(pushArray); } } }); } // Wrapper function to get stats for all files function getStatsForAllFiles(fileList, prefix, callback) { if (!prefix) prefix = ""; getStatsForAllFilesI(fileList, callback, prefix, [], 0); } // Get stats for all files in the directory and generate the listing getStatsForAllFiles(list, readFrom, function (filelist) { var directoryListingRows = []; for (var i = 0; i < filelist.length; i++) { if (filelist[i].name[0] !== ".") { var estats = filelist[i].stats; var ename = filelist[i].name; var eext = ename.match(/\.([^.]+)$/); eext = eext ? eext[1] : ""; var emime = eext ? mime.contentType(eext) : false; if (filelist[i].errored) { directoryListingRows.push( "\"[BAD]\"" + ename.replace(/&/g, "&").replace(//g, ">") + "-" + (estats ? estats.mtime.toDateString() : "-") + "\r\n" ); } else { var entry = "\"[alt]\"" + ename.replace(/&/g, "&").replace(//g, ">") + "" + (estats.isDirectory() ? "-" : sizify(estats.size.toString())) + "" + estats.mtime.toDateString() + "\r\n"; // Determine the file type and set the appropriate image and alt text if (estats.isDirectory()) { entry = entry.replace("[img]", "/.dirimages/directory.png").replace("[alt]", "[DIR]"); } else if (!estats.isFile()) { entry = "\"[alt]\"" + ename.replace(/&/g, "&").replace(//g, ">") + "-" + estats.mtime.toDateString() + "\r\n"; // Determine the special file types (block device, character device, etc.) if (estats.isBlockDevice()) { entry = entry.replace("[img]", "/.dirimages/hwdevice.png").replace("[alt]", "[BLK]"); } else if (estats.isCharacterDevice()) { entry = entry.replace("[img]", "/.dirimages/hwdevice.png").replace("[alt]", "[CHR]"); } else if (estats.isFIFO()) { entry = entry.replace("[img]", "/.dirimages/fifo.png").replace("[alt]", "[FIF]"); } else if (estats.isSocket()) { entry = entry.replace("[img]", "/.dirimages/socket.png").replace("[alt]", "[SCK]"); } } else if (ename.match(/README|LICEN[SC]E/i)) { entry = entry.replace("[img]", "/.dirimages/important.png").replace("[alt]", "[IMP]"); } else if (eext.match(/^(?:[xs]?html?|xml)$/i)) { entry = entry.replace("[img]", "/.dirimages/html.png").replace("[alt]", (eext == "xml" ? "[XML]" : "[HTM]")); } else if (eext == "js") { entry = entry.replace("[img]", "/.dirimages/javascript.png").replace("[alt]", "[JS ]"); } else if (eext == "php") { entry = entry.replace("[img]", "/.dirimages/php.png").replace("[alt]", "[PHP]"); } else if (eext == "css") { entry = entry.replace("[img]", "/.dirimages/css.png").replace("[alt]", "[CSS]"); } else if (emime && emime.split("/")[0] == "image") { entry = entry.replace("[img]", "/.dirimages/image.png").replace("[alt]", (eext == "ico" ? "[ICO]" : "[IMG]")); } else if (emime && emime.split("/")[0] == "font") { entry = entry.replace("[img]", "/.dirimages/font.png").replace("[alt]", "[FON]"); } else if (emime && emime.split("/")[0] == "audio") { entry = entry.replace("[img]", "/.dirimages/audio.png").replace("[alt]", "[AUD]"); } else if ((emime && emime.split("/")[0] == "text") || eext == "json") { entry = entry.replace("[img]", "/.dirimages/text.png").replace("[alt]", (eext == "json" ? "[JSO]" : "[TXT]")); } else if (emime && emime.split("/")[0] == "video") { entry = entry.replace("[img]", "/.dirimages/video.png").replace("[alt]", "[VID]"); } else if (eext.match(/^(?:zip|rar|bz2|[gb7x]z|lzma|tar)$/i)) { entry = entry.replace("[img]", "/.dirimages/archive.png").replace("[alt]", "[ARC]"); } else if (eext.match(/^(?:[id]mg|iso|flp)$/i)) { entry = entry.replace("[img]", "/.dirimages/diskimage.png").replace("[alt]", "[DSK]"); } else { entry = entry.replace("[img]", "/.dirimages/other.png").replace("[alt]", "[OTH]"); } directoryListingRows.push(entry); } } } // Push the information about empty directory if (directoryListingRows.length == 0) { directoryListingRows.push("No files found"); } // Send the directory listing response res.writeHead(200, http.STATUS_CODES[200], { "Content-Type": "text/html; charset=utf-8" }); res.end(htmlHead + directoryListingRows.join("") + htmlFoot); serverconsole.resmessage("Client successfully received content."); }); } catch (err) { if (err.code == "ENOENT") { callServerError(404); serverconsole.errmessage("Resource not found."); } else if (err.code == "ENOTDIR") { callServerError(404); // Assume that file doesn't exist. serverconsole.errmessage("Resource not found."); } else if (err.code == "EACCES") { callServerError(403); serverconsole.errmessage("Access denied."); } else if (err.code == "ENAMETOOLONG") { callServerError(414); } else if (err.code == "EMFILE") { callServerError(503); } else if (err.code == "ELOOP") { callServerError(508); // The symbolic link loop is detected during file system operations. serverconsole.errmessage("Symbolic link loop detected."); } else { callServerError(500, err); } } }); }); }); } else { // Directory listing is disabled, call 403 Forbidden error callServerError(403); serverconsole.errmessage("Directory listing is disabled."); } } else { callServerError(501); serverconsole.errmessage("SVR.JS doesn't support block devices, character devices, FIFOs nor sockets."); return; } } }); } try { // Scan the block list if (blocklist.check(reqip)) { // Invoke 403 Forbidden error callServerError(403); serverconsole.errmessage("Client is in the block list."); return; } if (req.url == "*") { // Handle "*" URL if (req.method == "OPTIONS") { // Respond with list of methods var hdss = getCustomHeaders(); hdss["Allow"] = "GET, POST, HEAD, OPTIONS"; res.writeHead(204, http.STATUS_CODES[204], hdss); res.end(); return; } else { // SVR.JS doesn't understand that request, so throw an 400 error callServerError(400); return; } } if (req.method == "CONNECT") { // CONNECT requests should be handled in "connect" event. callServerError(501); serverconsole.errmessage("CONNECT requests aren't supported. Your JS runtime probably doesn't support 'connect' handler for HTTP library."); return; } // Check for invalid X-Forwarded-For header if (!isForwardedValid) { serverconsole.errmessage("X-Forwarded-For header is invalid."); callServerError(400); return; } // Sanitize URL var sanitizedHref = sanitizeURL(href, allowDoubleSlashes); var preparedReqUrl = uobject.pathname + (uobject.search ? uobject.search : "") + (uobject.hash ? uobject.hash : ""); // Check if URL is "dirty" if (href != sanitizedHref && !isProxy) { var sanitizedURL = uobject; sanitizedURL.path = null; sanitizedURL.href = null; sanitizedURL.pathname = sanitizedHref; sanitizedURL.hostname = null; sanitizedURL.host = null; sanitizedURL.port = null; sanitizedURL.protocol = null; sanitizedURL.slashes = null; sanitizedURL = url.format(sanitizedURL); serverconsole.resmessage("URL sanitized: " + req.url + " => " + sanitizedURL); if (rewriteDirtyURLs) { req.url = sanitizedURL; try { uobject = parseURL(req.url, "http" + (req.socket.encrypted ? "s" : "") + "://" + (req.headers.host ? req.headers.host : (domain ? domain : "unknown.invalid"))); } catch (err) { // Return an 400 error callServerError(400); serverconsole.errmessage("Bad request!"); return; } search = uobject.search; href = uobject.pathname; ext = href.match(/[^\/]\.([^.]+)$/); if(!ext) ext = ""; else ext = ext[1].toLowerCase(); try { decodedHref = decodeURIComponent(href); } catch (err) { // Return 400 error callServerError(400); serverconsole.errmessage("Bad request!"); return; } } else { redirect(sanitizedURL, false); return; } } else if (req.url != preparedReqUrl && !isProxy) { serverconsole.resmessage("URL sanitized: " + req.url + " => " + preparedReqUrl); if (rewriteDirtyURLs) { req.url = preparedReqUrl; } else { redirect(preparedReqUrl, false); return; } } // Handle redirects to HTTPS if (secure && !fromMain && !disableNonEncryptedServer && !disableToHTTPSRedirect) { var hostx = req.headers.host; if (hostx === undefined) { serverconsole.errmessage("Host header is missing."); callServerError(400); return; } if (isProxy) { callServerError(501); serverconsole.errmessage("This server will never be a proxy."); return; } var isPublicServer = !(req.socket.realRemoteAddress ? req.socket.realRemoteAddress : req.socket.remoteAddress).match(/^(?:localhost$|::1$|f[c-d][0-9a-f]{2}:|(?:::ffff:)?(?:(?:127|10)\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}|192\.168\.[0-9]{1,3}\.[0-9]{1,3}|172\.(?:1[6-9]|2[0-9]|3[0-1])\.[0-9]{1,3}\.[0-9]{1,3})$)/i); var destinationPort = 0; var parsedHostx = hostx.match(/(\[[^\]]*\]|[^:]*)(?::([0-9]+))?/); var hostname = parsedHostx[1]; var hostPort = parsedHostx[2] ? parseInt(parsedHostx[2]) : 80; if (isNaN(hostPort)) hostPort = 80; if (hostPort == port || (port == pubport && !isPublicServer)) { destinationPort = sport; } else { destinationPort = spubport; } redirect("https://" + hostname + (destinationPort == 443 ? "" : (":" + destinationPort)) + req.url); return; } // Handle redirects to addresses with "www." prefix if (wwwredirect) { var hostname = req.headers.host.split(":"); var hostport = null; if (hostname.length > 1 && (hostname[0] != "[" || hostname[hostname.length - 1] != "]")) hostport = hostname.pop(); hostname = hostname.join(":"); if (hostname == domain && hostname.indexOf("www.") != 0) { redirect((req.socket.encrypted ? "https" : "http") + "://www." + hostname + (hostport ? ":" + hostport : "") + req.url.replace(/\/+/g, "/")); return; } } // Handle URL rewriting function rewriteURL(address, map, callback, _fileState, _mapBegIndex) { var rewrittenURL = address; var doCallback = true; if (!isProxy) { for (var i = (_mapBegIndex ? _mapBegIndex : 0); i < map.length; i++) { var mapEntry = map[i]; if (href != "/" && (mapEntry.isNotDirectory || mapEntry.isNotFile) && !_fileState) { fs.stat("." + decodeURIComponent(href), function (err, stats) { var _fileState = 3; if (err) { _fileState = 3; } else if (stats.isDirectory()) { _fileState = 2; } else if (stats.isFile()) { _fileState = 1; } else { _fileState = 3; } rewriteURL(address, map, callback, _fileState, i); }); doCallback = false; break; } var tempRewrittenURL = rewrittenURL; if (!mapEntry.allowDoubleSlashes) { address = address.replace(/\/+/g,"/"); tempRewrittenURL = address; } if (matchHostname(mapEntry.host) && ipMatch(mapEntry.ip, req.socket ? req.socket.localAddress : undefined) && address.match(createRegex(mapEntry.definingRegex)) && !(mapEntry.isNotDirectory && _fileState == 2) && !(mapEntry.isNotFile && _fileState == 1)) { rewrittenURL = tempRewrittenURL; try { mapEntry.replacements.forEach(function (replacement) { rewrittenURL = rewrittenURL.replace(createRegex(replacement.regex), replacement.replacement); }); if (mapEntry.append) rewrittenURL += mapEntry.append; } catch (err) { doCallback = false; callback(err, null); } break; } } } if (doCallback) callback(null, rewrittenURL); } // Trailing slash redirection function redirectTrailingSlashes(callback) { if (!isProxy && !disableTrailingSlashRedirects && href[href.length - 1] != "/" && origHref[origHref.length - 1] != "/") { fs.stat("." + decodeURIComponent(href), function (err, stats) { if (err || !stats.isDirectory()) { try { callback(); } catch (err) { callServerError(500, err); } } else { var destinationURL = uobject; destinationURL.path = null; destinationURL.href = null; destinationURL.pathname = origHref + "/"; destinationURL.hostname = null; destinationURL.host = null; destinationURL.port = null; destinationURL.protocol = null; destinationURL.slashes = null; destinationURL = url.format(destinationURL); redirect(destinationURL); } }); } else { callback(); } } origHref = href; // Add web root postfixes if (!isProxy) { var preparedReqUrl3 = (allowPostfixDoubleSlashes ? (href.replace(/\/+/,"/") + (uobject.search ? uobject.search : "") + (uobject.hash ? uobject.hash : "")) : req.url); var urlWithPostfix = preparedReqUrl3; var postfixPrefix = ""; wwwrootPostfixPrefixesVHost.every(function (currentPostfixPrefix) { if (preparedReqUrl3.indexOf(currentPostfixPrefix) == 0) { if (currentPostfixPrefix.match(/\/+$/)) postfixPrefix = currentPostfixPrefix.replace(/\/+$/, ""); else if (urlWithPostfix.length == currentPostfixPrefix.length || urlWithPostfix[currentPostfixPrefix.length] == "?" || urlWithPostfix[currentPostfixPrefix.length] == "/" || urlWithPostfix[currentPostfixPrefix.length] == "#") postfixPrefix = currentPostfixPrefix; else return true; urlWithPostfix = urlWithPostfix.substring(postfixPrefix.length); return false; } else { return true; } }); wwwrootPostfixesVHost.every(function (postfixEntry) { if (matchHostname(postfixEntry.host) && ipMatch(postfixEntry.ip, req.socket ? req.socket.localAddress : undefined) && !(postfixEntry.skipRegex && preparedReqUrl3.match(createRegex(postfixEntry.skipRegex)))) { urlWithPostfix = postfixPrefix + "/" + postfixEntry.postfix + urlWithPostfix; return false; } else { return true; } }); if (urlWithPostfix != preparedReqUrl3) { serverconsole.resmessage("Added web root postfix: " + req.url + " => " + urlWithPostfix); req.url = urlWithPostfix; try { uobject = parseURL(req.url, "http" + (req.socket.encrypted ? "s" : "") + "://" + (req.headers.host ? req.headers.host : (domain ? domain : "unknown.invalid"))); } catch (err) { // Return an 400 error callServerError(400); serverconsole.errmessage("Bad request!"); return; } search = uobject.search; href = uobject.pathname; ext = href.match(/[^\/]\.([^.]+)$/); if(!ext) ext = ""; else ext = ext[1].toLowerCase(); try { decodedHref = decodeURIComponent(href); } catch (err) { // Return 400 error callServerError(400); serverconsole.errmessage("Bad request!"); return; } var sHref = sanitizeURL(href, allowDoubleSlashes); var preparedReqUrl2 = uobject.pathname + (uobject.search ? uobject.search : "") + (uobject.hash ? uobject.hash : ""); if (req.url != preparedReqUrl2 || sHref != href.replace(/\/\.(?=\/|$)/g, "/").replace(/\/+/g, "/")) { callServerError(403); serverconsole.errmessage("Content blocked."); return; } else if (sHref != href) { var rewrittenAgainURL = uobject; rewrittenAgainURL.path = null; rewrittenAgainURL.href = null; rewrittenAgainURL.pathname = sHref; rewrittenAgainURL.hostname = null; rewrittenAgainURL.host = null; rewrittenAgainURL.port = null; rewrittenAgainURL.protocol = null; rewrittenAgainURL.slashes = null; rewrittenAgainURL = url.format(rewrittenAgainURL); serverconsole.resmessage("URL sanitized: " + req.url + " => " + rewrittenAgainURL); req.url = rewrittenAgainURL; try { uobject = parseURL(req.url, "http" + (req.socket.encrypted ? "s" : "") + "://" + (req.headers.host ? req.headers.host : (domain ? domain : "unknown.invalid"))); } catch (err) { // Return an 400 error callServerError(400); serverconsole.errmessage("Bad request!"); return; } search = uobject.search; href = uobject.pathname; ext = href.match(/[^\/]\.([^.]+)$/); if(!ext) ext = ""; else ext = ext[1].toLowerCase(); try { decodedHref = decodeURIComponent(href); } catch (err) { // Return 400 error callServerError(400); serverconsole.errmessage("Bad request!"); return; } } } } // Rewrite URLs rewriteURL(req.url, rewriteMap, function (err, rewrittenURL) { if (err) { callServerError(500, err); return; } if (rewrittenURL != req.url) { serverconsole.resmessage("URL rewritten: " + req.url + " => " + rewrittenURL); req.url = rewrittenURL; try { uobject = parseURL(req.url, "http" + (req.socket.encrypted ? "s" : "") + "://" + (req.headers.host ? req.headers.host : (domain ? domain : "unknown.invalid"))); } catch (err) { // Return an 400 error callServerError(400); serverconsole.errmessage("Bad request!"); return; } search = uobject.search; href = uobject.pathname; ext = href.match(/[^\/]\.([^.]+)$/); if(!ext) ext = ""; else ext = ext[1].toLowerCase(); try { decodedHref = decodeURIComponent(href); } catch (err) { // Return 400 error callServerError(400); serverconsole.errmessage("Bad request!"); return; } var sHref = sanitizeURL(href, allowDoubleSlashes); var preparedReqUrl2 = uobject.pathname + (uobject.search ? uobject.search : "") + (uobject.hash ? uobject.hash : ""); if (req.url != preparedReqUrl2 || sHref != href.replace(/\/\.(?=\/|$)/g, "/").replace(/\/+/g, "/")) { callServerError(403); serverconsole.errmessage("Content blocked."); return; } else if (sHref != href) { var rewrittenAgainURL = uobject; rewrittenAgainURL.path = null; rewrittenAgainURL.href = null; rewrittenAgainURL.pathname = sHref; rewrittenAgainURL.hostname = null; rewrittenAgainURL.host = null; rewrittenAgainURL.port = null; rewrittenAgainURL.protocol = null; rewrittenAgainURL.slashes = null; rewrittenAgainURL = url.format(rewrittenAgainURL); serverconsole.resmessage("URL sanitized: " + req.url + " => " + rewrittenAgainURL); req.url = rewrittenAgainURL; try { uobject = parseURL(req.url, "http" + (req.socket.encrypted ? "s" : "") + "://" + (req.headers.host ? req.headers.host : (domain ? domain : "unknown.invalid"))); } catch (err) { // Return an 400 error callServerError(400); serverconsole.errmessage("Bad request!"); return; } search = uobject.search; href = uobject.pathname; ext = href.match(/[^\/]\.([^.]+)$/); if(!ext) ext = ""; else ext = ext[1].toLowerCase(); try { decodedHref = decodeURIComponent(href); } catch (err) { // Return 400 error callServerError(400); serverconsole.errmessage("Bad request!"); return; } } } // Set response headers if (!isProxy) { var hkh = getCustomHeaders(); Object.keys(hkh).forEach(function (hkS) { try { res.setHeader(hkS, hkh[hkS]); } catch (err) { // Headers will not be set. } }); } // Prepare the path (remove multiple slashes) var decodedHrefWithoutDuplicateSlashes = decodedHref.replace(/\/+/g,"/"); // Check if path is forbidden if ((isForbiddenPath(decodedHrefWithoutDuplicateSlashes, "config") || isForbiddenPath(decodedHrefWithoutDuplicateSlashes, "certificates")) && !isProxy) { callServerError(403); serverconsole.errmessage("Access to configuration file/certificates is denied."); return; } else if (isIndexOfForbiddenPath(decodedHrefWithoutDuplicateSlashes, "temp") && !isProxy) { callServerError(403); serverconsole.errmessage("Access to temporary folder is denied."); return; } else if (isIndexOfForbiddenPath(decodedHrefWithoutDuplicateSlashes, "log") && !isProxy && (configJSON.enableLogging || configJSON.enableLogging == undefined) && !configJSON.enableRemoteLogBrowsing) { callServerError(403); serverconsole.errmessage("Access to log files is denied."); return; } else if (isForbiddenPath(decodedHrefWithoutDuplicateSlashes, "svrjs") && !isProxy && !exposeServerVersion) { callServerError(403); serverconsole.errmessage("Access to SVR.JS script is denied."); return; } else if ((isForbiddenPath(decodedHrefWithoutDuplicateSlashes, "svrjs") || isForbiddenPath(decodedHrefWithoutDuplicateSlashes, "serverSideScripts") || isIndexOfForbiddenPath(decodedHrefWithoutDuplicateSlashes, "serverSideScriptDirectories")) && !isProxy && (configJSON.disableServerSideScriptExpose || configJSON.disableServerSideScriptExpose === undefined)) { callServerError(403); serverconsole.errmessage("Access to sources is denied."); return; } else { var nonscodeIndex = -1; var authIndex = -1; var regexI = []; // Scan for non-standard codes if (!isProxy && nonStandardCodes != undefined) { for (var i = 0; i < nonStandardCodes.length; i++) { if (matchHostname(nonStandardCodes[i].host) && ipMatch(nonStandardCodes[i].ip, req.socket ? req.socket.localAddress : undefined)) { var isMatch = false; var hrefWithoutDuplicateSlashes = href.replace(/\/+/g,"/"); if (nonStandardCodes[i].regex) { // Regex match var createdRegex = createRegex(nonStandardCodes[i].regex, true); isMatch = req.url.match(createdRegex) || hrefWithoutDuplicateSlashes.match(createdRegex); regexI[i] = createdRegex; } else { // Non-regex match isMatch = nonStandardCodes[i].url == hrefWithoutDuplicateSlashes || (os.platform() == "win32" && nonStandardCodes[i].url.toLowerCase() == hrefWithoutDuplicateSlashes.toLowerCase()); } if (isMatch) { if (nonStandardCodes[i].scode == 401) { // HTTP authentication if (authIndex == -1) { authIndex = i; } } else { if (nonscodeIndex == -1) { if ((nonStandardCodes[i].scode == 403 || nonStandardCodes[i].scode == 451) && nonStandardCodes[i].users !== undefined) { if (nonStandardCodes[i].users.check(reqip)) nonscodeIndex = i; } else { nonscodeIndex = i; } } } } } } } // Handle non-standard codes if (nonscodeIndex > -1) { var nonscode = nonStandardCodes[nonscodeIndex]; if (nonscode.scode == 301 || nonscode.scode == 302 || nonscode.scode == 307 || nonscode.scode == 308) { var location = ""; if (regexI[nonscodeIndex]) { location = req.url.replace(regexI[nonscodeIndex], nonscode.location); if(location == req.url) { // Fallback replacement location = hrefWithoutDuplicateSlashes.replace(regexI[nonscodeIndex], nonscode.location); } } else if (req.url.split("?")[1] == undefined || req.url.split("?")[1] == null || req.url.split("?")[1] == "" || req.url.split("?")[1] == " ") { location = nonscode.location; } else { location = nonscode.location + "?" + req.url.split("?")[1]; } redirect(location, nonscode.scode == 302 || nonscode.scode == 307, nonscode.scode == 307 || nonscode.scode == 308); return; } else { callServerError(nonscode.scode); if (nonscode.scode == 403) { serverconsole.errmessage("Content blocked."); } else if (nonscode.scode == 410) { serverconsole.errmessage("Content is gone."); } else if (nonscode.scode == 418) { serverconsole.errmessage("SVR.JS is always a teapot ;)"); } else { serverconsole.errmessage("Client fails receiving content."); } return; } } // Handle HTTP authentication if (authIndex > -1) { var authcode = nonStandardCodes[authIndex]; // Function to check if passwords match function checkIfPasswordMatches(list, password, callback, _i) { if (!_i) _i = 0; var cb = function (hash) { if (hash == list[_i].pass) { callback(true); } else if (_i >= list.length - 1) { callback(false); } else { checkIfPasswordMatches(list, password, callback, _i + 1); } }; var hashedPassword = sha256(password + list[_i].salt); var cacheEntry = null; if (list[_i].scrypt) { if (!crypto.scrypt) { callServerError(500, new Error("SVR.JS doesn't support scrypt-hashed passwords on Node.JS versions without scrypt hash support.")); return; } else { cacheEntry = scryptCache.find(function (entry) { return (entry.password == hashedPassword && entry.salt == list[_i].salt); }); if (cacheEntry) { cb(cacheEntry.hash); } else { crypto.scrypt(password, list[_i].salt, 64, function (err, derivedKey) { if (err) { callServerError(500, err); } else { var key = derivedKey.toString("hex"); scryptCache.push({ hash: key, password: hashedPassword, salt: list[_i].salt, addDate: new Date() }); cb(key); } }); } } } else if (list[_i].pbkdf2) { if (crypto.__disabled__ !== undefined) { callServerError(500, new Error("SVR.JS doesn't support PBKDF2-hashed passwords on Node.JS versions without crypto support.")); return; } else { cacheEntry = pbkdf2Cache.find(function (entry) { return (entry.password == hashedPassword && entry.salt == list[_i].salt); }); if (cacheEntry) { cb(cacheEntry.hash); } else { crypto.pbkdf2(password, list[_i].salt, 36250, 64, "sha512", function (err, derivedKey) { if (err) { callServerError(500, err); } else { var key = derivedKey.toString("hex"); pbkdf2Cache.push({ hash: key, password: hashedPassword, salt: list[_i].salt, addDate: new Date() }); cb(key); } }); } } } else { cb(hashedPassword); } } function authorizedCallback(bruteProtection) { try { var ha = getCustomHeaders(); ha["WWW-Authenticate"] = "Basic realm=\"" + (authcode.realm ? authcode.realm.replace(/(\\|")/g, "\\$1") : "SVR.JS HTTP Basic Authorization") + "\", charset=\"UTF-8\""; var credentials = req.headers["authorization"]; if (!credentials) { callServerError(401, ha); serverconsole.errmessage("Content needs authorization."); return; } var credentialsMatch = credentials.match(/^Basic (.+)$/); if (!credentialsMatch) { callServerError(401, ha); serverconsole.errmessage("Malformed credentials."); return; } var decodedCredentials = Buffer.from(credentialsMatch[1], "base64").toString("utf8"); var decodedCredentialsMatch = decodedCredentials.match(/^([^:]*):(.*)$/); if (!decodedCredentialsMatch) { callServerError(401, ha); serverconsole.errmessage("Malformed credentials."); return; } var username = decodedCredentialsMatch[1]; var password = decodedCredentialsMatch[2]; var usernameMatch = []; var sha256Count = 0; var pbkdf2Count = 0; var scryptCount = 0; if (!authcode.userList || authcode.userList.indexOf(username) > -1) { usernameMatch = users.filter(function (entry) { if(entry.scrypt) { scryptCount++; } else if(entry.pbkdf2) { pbkdf2Count++; } else { sha256Count++; } return entry.name == username; }); } if (usernameMatch.length == 0) { // Pushing false user match to prevent time-based user enumeration var fakeCredentials = { name: username, pass: "SVRJSAWebServerRunningOnNodeJS", salt: "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0" }; if (!process.isBun) { if (scryptCount > sha256Count && scryptCount > pbkdf2Count) { fakeCredentials.scrypt = true; } else if (pbkdf2Count > sha256Count) { fakeCredentials.pbkdf2 = true; } } usernameMatch.push(fakeCredentials); } checkIfPasswordMatches(usernameMatch, password, function (authorized) { try { if (!authorized) { if (bruteProtection) { if (process.send) { process.send("\x12AUTHW" + reqip); } else { if (!bruteForceDb[reqip]) bruteForceDb[reqip] = { invalidAttempts: 0 }; bruteForceDb[reqip].invalidAttempts++; if (bruteForceDb[reqip].invalidAttempts >= 10) { bruteForceDb[reqip].lastAttemptDate = new Date(); } } } callServerError(401, ha); serverconsole.errmessage("User \"" + String(username).replace(/[\r\n]/g, "") + "\" failed to log in."); } else { if (bruteProtection) { if (process.send) { process.send("\x12AUTHR" + reqip); } else { if (bruteForceDb[reqip]) bruteForceDb[reqip] = { invalidAttempts: 0 }; } } serverconsole.reqmessage("Client is logged in as \"" + String(username).replace(/[\r\n]/g, "") + "\"."); authUser = username; redirectTrailingSlashes(function () { modExecute(mods, vres); }); } } catch (err) { callServerError(500, err); return; } }); } catch (err) { callServerError(500, err); return; } } if (authcode.disableBruteProtection) { // Don't brute-force protect it, just do HTTP authentication authorizedCallback(false); } else if (!process.send) { // Query data from JS object database if (!bruteForceDb[reqip] || !bruteForceDb[reqip].lastAttemptDate || (new Date() - 300000 >= bruteForceDb[reqip].lastAttemptDate)) { if (bruteForceDb[reqip] && bruteForceDb[reqip].invalidAttempts >= 10) bruteForceDb[reqip] = { invalidAttempts: 5 }; authorizedCallback(true); } else { callServerError(429); serverconsole.errmessage("Brute force limit reached!"); } } else { var listenerEmitted = false; // Listen for brute-force protection response function authMessageListener(message) { if (listenerEmitted) return; if (message == "\x14AUTHA" + reqip || message == "\x14AUTHD" + reqip) { process.removeListener("message", authMessageListener); listenerEmitted = true; } if (message == "\x14AUTHD" + reqip) { callServerError(429); serverconsole.errmessage("Brute force limit reached!"); } else if (message == "\x14AUTHA" + reqip) { authorizedCallback(true); } } process.on("message", authMessageListener); process.send("\x12AUTHQ" + reqip); } } else { redirectTrailingSlashes(function () { modExecute(mods, vres); }); } } }); } catch (err) { callServerError(500, err); } } function serverErrorHandler(err, isRedirect) { if(isRedirect) attmtsRedir--; else attmts--; if (cluster.isPrimary === undefined && (isRedirect ? attmtsRedir : attmts)) { serverconsole.locerrmessage(serverErrorDescs[err.code] ? serverErrorDescs[err.code] : serverErrorDescs["UNKNOWN"]); serverconsole.locmessage((isRedirect ? attmtsRedir : attmts) + " attempts left."); } else { try { process.send("\x12ERRLIST" + (isRedirect ? attmtsRedir : attmts) + err.code); } catch (err) { // Probably main process exited } } if ((isRedirect ? attmtsRedir : attmts) > 0) { (isRedirect ? server2 : server).close(); setTimeout(start, 900); } else { try { if (cluster.isPrimary !== undefined) process.send("\x12ERRCRASH" + err.code); } catch (err) { // Probably main process exited } setTimeout(function () { var errno = errors[err.code]; process.exit(errno ? errno : 1); }, 50); } } server.on("error", function (err) { serverErrorHandler(err, false); }); server.on("listening", function () { attmts = 5; listeningMessage(); }); } var closedMaster = true; // IPC listener for server listening signalization function listenConnListener(msg) { if (msg == "\x12LISTEN") { listeningMessage(); } } // IPC listener for brue force protection function bruteForceListenerWrapper(worker) { return function bruteForceListener(message) { var ip = ""; if (message.substring(0, 6) == "\x12AUTHQ") { ip = message.substring(6); if (!bruteForceDb[ip] || !bruteForceDb[ip].lastAttemptDate || (new Date() - 300000 >= bruteForceDb[ip].lastAttemptDate)) { if (bruteForceDb[ip] && bruteForceDb[ip].invalidAttempts >= 10) bruteForceDb[ip] = { invalidAttempts: 5 }; worker.send("\x14AUTHA" + ip); } else { worker.send("\x14AUTHD" + ip); } } else if (message.substring(0, 6) == "\x12AUTHR") { ip = message.substring(6); if (bruteForceDb[ip]) bruteForceDb[ip] = { invalidAttempts: 0 }; } else if (message.substring(0, 6) == "\x12AUTHW") { ip = message.substring(6); if (!bruteForceDb[ip]) bruteForceDb[ip] = { invalidAttempts: 0 }; bruteForceDb[ip].invalidAttempts++; if (bruteForceDb[ip].invalidAttempts >= 10) { bruteForceDb[ip].lastAttemptDate = new Date(); } } }; } var isWorkerHungUpBuff = true; var isWorkerHungUpBuff2 = true; // General IPC message listener function msgListener(msg) { for (var i = 0; i < Object.keys(cluster.workers).length; i++) { if (msg == "\x12END") { cluster.workers[Object.keys(cluster.workers)[i]].removeAllListeners("message"); cluster.workers[Object.keys(cluster.workers)[i]].on("message", bruteForceListenerWrapper(cluster.workers[Object.keys(cluster.workers)[i]])); cluster.workers[Object.keys(cluster.workers)[i]].on("message", listenConnListener); } } if (msg == "\x12CLOSE") { closedMaster = true; } else if (msg == "\x12LISTEN" || msg.substring(0, 4) == "\x12AUTH") { // Do nothing! } else if (msg == "\x12KILLOK") { if (typeof isWorkerHungUpBuff != "undefined") isWorkerHungUpBuff = false; } else if (msg == "\x12PINGOK") { if (typeof isWorkerHungUpBuff2 != "undefined") isWorkerHungUpBuff2 = false; } else if (msg == "\x12KILLTERMMSG") { serverconsole.locmessage("Terminating unused worker process..."); } else if (msg == "\x12SAVEGOOD") { serverconsole.locmessage("Configuration saved."); } else if (msg.indexOf("\x12SAVEERR") == 0) { serverconsole.locwarnmessage("There was a problem while saving configuration file. Reason: " + msg.substring(8)); } else if (msg == "\x12END") { cluster.workers[Object.keys(cluster.workers)[0]].on("message", function (msg) { if (msg.length >= 8 && msg.indexOf("\x12ERRLIST") == 0) { var tries = parseInt(msg.substring(8, 9)); var errCode = msg.substring(9); serverconsole.locerrmessage(serverErrorDescs[errCode] ? serverErrorDescs[errCode] : serverErrorDescs["UNKNOWN"]); serverconsole.locmessage(tries + " attempts left."); } if (msg.length >= 9 && msg.indexOf("\x12ERRCRASH") == 0) { var errno = errors[msg.substring(9)]; process.exit(errno ? errno : 1); } }); } else { serverconsole.climessage(msg); } } var messageTransmitted = false; function listeningMessage() { if (typeof closedMaster !== "undefined") closedMaster = false; if (!cluster.isPrimary && cluster.isPrimary !== undefined) { process.send("\x12LISTEN"); return; } var listenToLocalhost = (listenAddress && (listenAddress == "localhost" || listenAddress.match(/^127\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$/) || listenAddress.match(/^(?:0{0,4}:)+0{0,3}1$/))); var listenToAny = (!listenAddress || listenAddress.match(/^0{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$/) || listenAddress.match(/^(?:0{0,4}:)+0{0,4}$/)); var sListenToLocalhost = (sListenAddress && (sListenAddress == "localhost" || sListenAddress.match(/^127\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$/) || sListenAddress.match(/^(?:0{0,4}:)+0{0,3}1$/))); var sListenToAny = (!sListenAddress || sListenAddress.match(/^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$/) || sListenAddress.match(/^(?:0{0,4}:)+0{0,4}$/)); var accHost = host; var sAccHost = host; if (!listenToAny) accHost = listenAddress; if (!sListenToAny) sAccHost = sListenAddress; if (messageTransmitted) return; messageTransmitted = true; serverconsole.locmessage("Started server at: "); if (secure && (sListenToLocalhost || sListenToAny)) { if (typeof sport === "number") { serverconsole.locmessage("* https://localhost" + (sport == 443 ? "" : (":" + sport))); } else { serverconsole.locmessage("* " + sport); // Unix socket or Windows named pipe } } if (!(secure && disableNonEncryptedServer) && (listenToLocalhost || listenToAny)) { if (typeof port === "number") { serverconsole.locmessage("* http://localhost" + (port == 80 ? "" : (":" + port))); } else { serverconsole.locmessage("* " + port); // Unix socket or Windows named pipe } } if (secure && typeof sport === "number" && !sListenToLocalhost && (!sListenToAny || (host != "" && host != "[offline]"))) serverconsole.locmessage("* https://" + (sAccHost.indexOf(":") > -1 ? "[" + sAccHost + "]" : sAccHost) + (sport == 443 ? "" : (":" + sport))); if (!(secure && disableNonEncryptedServer) && !listenToLocalhost && (!listenToAny || (host != "" && host != "[offline]")) && typeof port === "number") serverconsole.locmessage("* http://" + (accHost.indexOf(":") > -1 ? "[" + accHost + "]" : accHost) + (port == 80 ? "" : (":" + port))); ipStatusCallback(function () { if (pubip != "") { if (secure && !sListenToLocalhost) serverconsole.locmessage("* https://" + (pubip.indexOf(":") > -1 ? "[" + pubip + "]" : pubip) + (spubport == 443 ? "" : (":" + spubport))); if (!(secure && disableNonEncryptedServer) && !listenToLocalhost) serverconsole.locmessage("* http://" + (pubip.indexOf(":") > -1 ? "[" + pubip + "]" : pubip) + (pubport == 80 ? "" : (":" + pubport))); } if (domain != "") { if (secure && !sListenToLocalhost) serverconsole.locmessage("* https://" + domain + (spubport == 443 ? "" : (":" + spubport))); if (!(secure && disableNonEncryptedServer) && !listenToLocalhost) serverconsole.locmessage("* http://" + domain + (pubport == 80 ? "" : (":" + pubport))); } serverconsole.locmessage("For CLI help, you can type \"help\""); }); } function start(init) { init = Boolean(init); if (cluster.isPrimary || cluster.isPrimary === undefined) { if (init) { for (i = 0; i < logo.length; i++) console.log(logo[i]); // Print logo console.log(); console.log("Welcome to \x1b[1mSVR.JS - a web server running on Node.JS\x1b[0m"); // Print warnings if (version.indexOf("Nightly-") === 0) serverconsole.locwarnmessage("This version is only for test purposes and may be unstable."); if (configJSON.enableHTTP2 && !secure) serverconsole.locwarnmessage("HTTP/2 without HTTPS may not work in web browsers. Web browsers only support HTTP/2 with HTTPS!"); if (process.isBun) { serverconsole.locwarnmessage("Bun support is experimental. Some features of SVR.JS, SVR.JS mods and SVR.JS server-side JavaScript may not work as expected."); if (process.isBun && !(process.versions.bun && !process.versions.bun.match(/^(?:0\.|1\.0\.|1\.1\.[0-9](?![0-9])|1\.1\.1[0-2](?![0-9]))/)) && users.some(function (entry) { return entry.pbkdf2; })) serverconsole.locwarnmessage("PBKDF2 password hashing function in Bun versions older than v1.1.13 blocks the event loop, which may result in denial of service."); } if (cluster.isPrimary === undefined) serverconsole.locwarnmessage("You're running SVR.JS on single thread. Reliability may suffer, as the server is stopped after crash."); if (crypto.__disabled__ !== undefined) serverconsole.locwarnmessage("Your Node.JS version doesn't have crypto support! The 'crypto' module is essential for providing cryptographic functionality in Node.JS. Without crypto support, certain security features may be unavailable, and some functionality may not work as expected. It's recommended to use a Node.JS version that includes crypto support to ensure the security and proper functioning of your server."); if (crypto.__disabled__ === undefined && !crypto.scrypt) serverconsole.locwarnmessage("Your JavaScript runtime doesn't have native scrypt support. HTTP authentication involving scrypt hashes will not work."); if (!process.isBun && /^v(?:[0-9]\.|1[0-7]\.|18\.(?:[0-9]|1[0-8])\.|18\.19\.0|20\.(?:[0-9]|10)\.|20\.11\.0|21\.[0-5]\.|21\.6\.0|21\.6\.1(?![0-9]))/.test(process.version)) serverconsole.locwarnmessage("Your Node.JS version is vulnerable to HTTP server DoS (CVE-2024-22019)."); if (!process.isBun && /^v(?:[0-9]\.|1[0-7]\.|18\.(?:1?[0-9])\.|18\.20\.0|20\.(?:[0-9]|1[01])\.|20\.12\.0|21\.[0-6]\.|21\.7\.0|21\.7\.1(?![0-9]))/.test(process.version)) serverconsole.locwarnmessage("Your Node.JS version is vulnerable to HTTP server request smuggling (CVE-2024-27982)."); if (process.getuid && process.getuid() == 0) serverconsole.locwarnmessage("You're running SVR.JS as root. It's recommended to run SVR.JS as an non-root user. Running SVR.JS as root may increase the risks of OS command execution vulnerabilities."); if (!process.isBun && secure && process.versions && process.versions.openssl && process.versions.openssl.substring(0, 2) == "1.") { if (new Date() > new Date("11 September 2023")) { serverconsole.locwarnmessage("OpenSSL 1.x is no longer receiving security updates after 11th September 2023. Your HTTPS communication might be vulnerable. It is recommended to update to a newer version of Node.JS that includes OpenSSL 3.0 or higher to ensure the security of your server and data."); } else { serverconsole.locwarnmessage("OpenSSL 1.x will no longer receive security updates after 11th September 2023. Your HTTPS communication might be vulnerable in future. It is recommended to update to a newer version of Node.JS that includes OpenSSL 3.0 or higher to ensure the security of your server and data."); } } if (secure && configJSON.enableOCSPStapling && ocsp._errored) serverconsole.locwarnmessage("Can't load OCSP module. OCSP stapling will be disabled. OCSP stapling is a security feature that improves the performance and security of HTTPS connections by caching the certificate status response. If you require this feature, consider updating your Node.JS version or checking for any issues with the 'ocsp' module."); if (disableMods) serverconsole.locwarnmessage("SVR.JS is running without mods and server-side JavaScript enabled. Web applications may not work as expected"); console.log(); // Display mod and server-side JavaScript errors if (process.isPrimary || process.isPrimary === undefined) { modLoadingErrors.forEach(function (modLoadingError) { serverconsole.locwarnmessage("There was a problem while loading a \"" + String(modLoadingError.modName).replace(/[\r\n]/g, "") + "\" mod."); serverconsole.locwarnmessage("Stack:"); serverconsole.locwarnmessage(generateErrorStack(modLoadingError.error)); }); if (SSJSError) { serverconsole.locwarnmessage("There was a problem while loading server-side JavaScript."); serverconsole.locwarnmessage("Stack:"); serverconsole.locwarnmessage(generateErrorStack(SSJSError)); } if (SSJSError || modLoadingErrors.length > 0) console.log(); } // Print server information serverconsole.locmessage("Server version: " + version); if (process.isBun) serverconsole.locmessage("Bun version: v" + process.versions.bun); else serverconsole.locmessage("Node.JS version: " + process.version); var CPUs = os.cpus(); if (CPUs.length > 0) serverconsole.locmessage("CPU: " + (CPUs.length > 1 ? CPUs.length + "x " : "") + CPUs[0].model); // Throw errors if (vnum < 64) throw new Error("SVR.JS requires Node.JS 10.0.0 and newer, but your Node.JS version isn't supported by SVR.JS."); if (configJSONRErr) throw new Error("Can't read SVR.JS configuration file: " + configJSONRErr.message); if (configJSONPErr) throw new Error("SVR.JS configuration parse error: " + configJSONPErr.message); if (configJSON.enableHTTP2 && !secure && (typeof port != "number")) throw new Error("HTTP/2 without HTTPS, along with Unix sockets/Windows named pipes aren't supported by SVR.JS."); if (configJSON.enableHTTP2 && http2.__disabled__ !== undefined) throw new Error("HTTP/2 isn't supported by your Node.JS version! You may not be able to use HTTP/2 with SVR.JS"); if (listenAddress) { if (listenAddress.match(/^[0-9]+$/)) throw new Error("Listening network address can't be numeric (it need to be either valid IP address, or valid domain name)."); if (listenAddress.match(/^(?:2(?:2[4-9]|3[0-9])\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$|ff[0-9a-f][0-9a-f]:[0-9a-f:])/i)) throw new Error("SVR.JS can't listen on multicast address."); if (brdIPs.indexOf(listenAddress) > -1) throw new Error("SVR.JS can't listen on broadcast address."); if (netIPs.indexOf(listenAddress) > -1) throw new Error("SVR.JS can't listen on subnet address."); } if (certificateError) throw new Error("There was a problem with SSL certificate/private key: " + certificateError.message); if (wwwrootError) throw new Error("There was a problem with your web root: " + wwwrootError.message); if (sniReDos) throw new Error("Refusing to start, because the current SNI configuration would make the server vulnerable to ReDoS."); } // Print server startup information if (!(secure && disableNonEncryptedServer)) serverconsole.locmessage("Starting HTTP server at " + (typeof port == "number" ? (listenAddress ? ((listenAddress.indexOf(":") > -1 ? "[" + listenAddress + "]" : listenAddress)) + ":" : "port ") : "") + port.toString() + "..."); if (secure) serverconsole.locmessage("Starting HTTPS server at " + (typeof sport == "number" ? (sListenAddress ? ((sListenAddress.indexOf(":") > -1 ? "[" + sListenAddress + "]" : sListenAddress)) + ":" : "port ") : "") + sport.toString() + "..."); } if (!cluster.isPrimary) { try { if (typeof (secure ? sport : port) == "number" && (secure ? sListenAddress : listenAddress)) { server.listen(secure ? sport : port, secure ? sListenAddress : listenAddress); } else { server.listen(secure ? sport : port); } } catch (err) { if (err.code != "ERR_SERVER_ALREADY_LISTEN") throw err; } if (secure && !disableNonEncryptedServer) { try { if (typeof port == "number" && listenAddress) { server2.listen(port, listenAddress); } else { server2.listen(port); } } catch (err) { if (err.code != "ERR_SERVER_ALREADY_LISTEN") throw err; } } } // SVR.JS commmands var commands = { close: function () { try { server.close(); if (secure && !disableNonEncryptedServer) { server2.close(); } if (cluster.isPrimary === undefined) serverconsole.climessage("Server closed."); else { process.send("Server closed."); process.send("\x12CLOSE"); } } catch (err) { if (cluster.isPrimary === undefined) serverconsole.climessage("Cannot close server! Reason: " + err.message); else process.send("Cannot close server! Reason: " + err.message); } }, open: function () { try { if (typeof (secure ? sport : port) == "number" && (secure ? sListenAddress : listenAddress)) { server.listen(secure ? sport : port, secure ? sListenAddress : listenAddress); } else { server.listen(secure ? sport : port); } if (secure && !disableNonEncryptedServer) { if (typeof port == "number" && listenAddress) { server2.listen(port, listenAddress); } else { server2.listen(port); } } if (cluster.isPrimary === undefined) serverconsole.climessage("Server opened."); else { process.send("Server opened."); } } catch (err) { if (cluster.isPrimary === undefined) serverconsole.climessage("Cannot open server! Reason: " + err.message); else process.send("Cannot open server! Reason: " + err.message); } }, help: function () { if (cluster.isPrimary === undefined) serverconsole.climessage("Server commands:\n" + Object.keys(commands).join(" ")); else process.send("Server commands:\n" + Object.keys(commands).join(" ")); }, mods: function () { if (cluster.isPrimary === undefined) serverconsole.climessage("Mods:"); else process.send("Mods:"); for (var i = 0; i < modInfos.length; i++) { if (cluster.isPrimary === undefined) serverconsole.climessage((i + 1).toString() + ". " + modInfos[i].name + " " + modInfos[i].version); else process.send((i + 1).toString() + ". " + modInfos[i].name + " " + modInfos[i].version); } if (modInfos.length == 0) { if (cluster.isPrimary === undefined) serverconsole.climessage("No mods installed."); else process.send("No mods installed."); } }, stop: function (retcode) { reallyExiting = true; clearInterval(passwordHashCacheIntervalId); if ((!cluster.isPrimary && cluster.isPrimary !== undefined) && server.listening) { try { server.close(function () { if (server2.listening) { try { server2.close(function () { if (!process.removeFakeIPC) { if (typeof retcode == "number") { process.exit(retcode); } else { process.exit(0); } } }); } catch (err) { if (!process.removeFakeIPC) { if (typeof retcode == "number") { process.exit(retcode); } else { process.exit(0); } } } } else { if (!process.removeFakeIPC) { if (typeof retcode == "number") { process.exit(retcode); } else { process.exit(0); } } } }); } catch (err) { if (typeof retcode == "number") { process.exit(retcode); } else { process.exit(0); } } if (process.removeFakeIPC) process.removeFakeIPC(); } else { if (typeof retcode == "number") { process.exit(retcode); } else { process.exit(0); } } }, clear: function () { console.clear(); }, block: function (ip) { if (ip == undefined || JSON.stringify(ip) == "[]") { if (cluster.isPrimary === undefined) serverconsole.climessage("Cannot block non-existent IP."); else if (!cluster.isPrimary) process.send("Cannot block non-existent IP."); } else { for (var i = 0; i < ip.length; i++) { if (ip[i] != "localhost" && ip[i].indexOf(":") == -1) { ip[i] = "::ffff:" + ip[i]; } if (!blocklist.check(ip[i])) { blocklist.add(ip[i]); } } if (cluster.isPrimary === undefined) serverconsole.climessage("IPs successfully blocked."); else if (!cluster.isPrimary) process.send("IPs successfully blocked."); } }, unblock: function (ip) { if (ip == undefined || JSON.stringify(ip) == "[]") { if (cluster.isPrimary === undefined) serverconsole.climessage("Cannot unblock non-existent IP."); else if (!cluster.isPrimary) process.send("Cannot unblock non-existent IP."); } else { for (var i = 0; i < ip.length; i++) { if (ip[i].indexOf(":") == -1) { ip[i] = "::ffff:" + ip[i]; } blocklist.remove(ip[i]); } if (cluster.isPrimary === undefined) serverconsole.climessage("IPs successfully unblocked."); else if (!cluster.isPrimary) process.send("IPs successfully unblocked."); } }, restart: function () { if (cluster.isPrimary === undefined) serverconsole.climessage("This command is not supported on single-threaded SVR.JS."); else process.send("This command need to be run in SVR.JS master."); } }; if (init) { var workersToFork = 1; function getWorkerCountToFork() { var workersToFork = os.availableParallelism ? os.availableParallelism() : os.cpus().length; try { var useAvailableCores = Math.round((os.freemem()) / 50000000) - 1; // 1 core deleted for safety... if (workersToFork > useAvailableCores) workersToFork = useAvailableCores; } catch (err) { // Nevermind... Don't want SVR.JS to fail starting, because os.freemem function is not working. } if (workersToFork < 1) workersToFork = 1; // If SVR.JS is run on Haiku (os.cpus in Haiku returns empty array) or if useAvailableCores = 0 return workersToFork; } function forkWorkers(workersToFork, callback) { for (var i = 0; i < workersToFork; i++) { if (i == 0) { SVRJSFork(); } else { setTimeout((function (i) { return function () { SVRJSFork(); if (i >= workersToFork - 1) callback(); }; })(i), i * 6.6); } } } if (cluster.isPrimary === undefined) { setInterval(function () { try { saveConfig(); serverconsole.locmessage("Configuration saved."); } catch (err) { throw new Error(err); } }, 300000); } else if (cluster.isPrimary) { setInterval(function () { var allWorkers = Object.keys(cluster.workers); var goodWorkers = []; function checkWorker(callback, _id) { if (typeof _id === "undefined") _id = 0; if (_id >= allWorkers.length) { callback(); return; } try { if (cluster.workers[allWorkers[_id]]) { isWorkerHungUpBuff2 = true; cluster.workers[allWorkers[_id]].on("message", msgListener); cluster.workers[allWorkers[_id]].send("\x14PINGPING"); setTimeout(function () { if (isWorkerHungUpBuff2) { checkWorker(callback, _id + 1); } else { goodWorkers.push(allWorkers[_id]); checkWorker(callback, _id + 1); } }, 250); } else { checkWorker(callback, _id + 1); } } catch (err) { if (cluster.workers[allWorkers[_id]]) { cluster.workers[allWorkers[_id]].removeAllListeners("message"); cluster.workers[allWorkers[_id]].on("message", bruteForceListenerWrapper(cluster.workers[allWorkers[_id]])); cluster.workers[allWorkers[_id]].on("message", listenConnListener); } checkWorker(callback, _id + 1); } } checkWorker(function () { var wN = Math.floor(Math.random() * goodWorkers.length); //Send a configuration saving message to a random worker. try { if (cluster.workers[goodWorkers[wN]]) { isWorkerHungUpBuff2 = true; cluster.workers[goodWorkers[wN]].on("message", msgListener); cluster.workers[goodWorkers[wN]].send("\x14SAVECONF"); } } catch (err) { if (cluster.workers[goodWorkers[wN]]) { cluster.workers[goodWorkers[wN]].removeAllListeners("message"); cluster.workers[goodWorkers[wN]].on("message", bruteForceListenerWrapper(cluster.workers[goodWorkers[wN]])); cluster.workers[goodWorkers[wN]].on("message", listenConnListener); } serverconsole.locwarnmessage("There was a problem while saving configuration file. Reason: " + err.message); } }); }, 300000); } if (!cluster.isPrimary) { passwordHashCacheIntervalId = setInterval(function () { pbkdf2Cache = pbkdf2Cache.filter(function (entry) { return entry.addDate > (new Date() - 3600000); }); scryptCache = scryptCache.filter(function (entry) { return entry.addDate > (new Date() - 3600000); }); }, 1800000); } if (!cluster.isPrimary && cluster.isPrimary !== undefined) { process.on("message", function (line) { try { if (line == "") { // Does Nothing process.send("\x12END"); } else if (line == "\x14SAVECONF") { // Save configuration file try { saveConfig(); process.send("\x12SAVEGOOD"); } catch (err) { process.send("\x12SAVEERR" + err.message); } process.send("\x12END"); } else if (line == "\x14KILLPING") { if (!reallyExiting) { process.send("\x12KILLOK"); process.send("\x12END"); } // Refuse to send, when it's really exiting. Main process will treat the worker as hung up anyway... } else if (line == "\x14PINGPING") { if (!reallyExiting) { process.send("\x12PINGOK"); process.send("\x12END"); } // Refuse to send, when it's really exiting. Main process will treat the worker as hung up anyway... } else if (line == "\x14KILLREQ") { if (reqcounter - reqcounterKillReq < 2) { process.send("\x12KILLTERMMSG"); process.nextTick(commands.stop); } else { reqcounterKillReq = reqcounter; } } else if (commands[line.split(" ")[0]] !== undefined && commands[line.split(" ")[0]] !== null) { var argss = line.split(" "); var command = argss.shift(); commands[command](argss); process.send("\x12END"); } else { process.send("Unrecognized command \"" + line.split(" ")[0] + "\"."); process.send("\x12END"); } } catch (err) { if (line != "") { process.send("Can't execute command \"" + line.split(" ")[0] + "\"."); process.send("\x12END"); } } }); } else { var rla = readline.createInterface({ input: process.stdin, output: process.stdout, prompt: "" }); rla.prompt(); rla.on("line", function (line) { line = line.trim(); var argss = line.split(" "); var command = argss.shift(); if (line != "") { if (cluster.isPrimary !== undefined) { var allWorkers = Object.keys(cluster.workers); if (command == "block") commands.block(argss); if (command == "unblock") commands.unblock(argss); if (command == "restart") { var stopError = false; exiting = true; for (var i = 0; i < allWorkers.length; i++) { try { if (cluster.workers[allWorkers[i]]) { cluster.workers[allWorkers[i]].kill(); } } catch (err) { stopError = true; } } if (stopError) serverconsole.climessage("Some SVR.JS workers might not be stopped."); SVRJSInitialized = false; closedMaster = true; workersToFork = getWorkerCountToFork(); forkWorkers(workersToFork, function () { SVRJSInitialized = true; exiting = false; serverconsole.climessage("SVR.JS workers restarted."); }); return; } if (command == "stop") { exiting = true; allWorkers = Object.keys(cluster.workers); } allWorkers.forEach(function (clusterID) { try { if (cluster.workers[clusterID]) { cluster.workers[clusterID].on("message", msgListener); cluster.workers[clusterID].send(line); } } catch (err) { if (cluster.workers[clusterID]) { cluster.workers[clusterID].removeAllListeners("message"); cluster.workers[clusterID].on("message", bruteForceListenerWrapper(cluster.workers[clusterID])); cluster.workers[clusterID].on("message", listenConnListener); } serverconsole.climessage("Can't run command \"" + command + "\"."); } }); if (command == "stop") { setTimeout(function () { reallyExiting = true; process.exit(0); }, 50); } } else { if (command == "stop") { reallyExiting = true; process.exit(0); } try { commands[command](argss); } catch (err) { serverconsole.climessage("Unrecognized command \"" + command + "\"."); } } } rla.prompt(); }); } if (cluster.isPrimary || cluster.isPrimary === undefined) { // Cluster forking code if (cluster.isPrimary !== undefined && init) { workersToFork = getWorkerCountToFork(); forkWorkers(workersToFork, function () { SVRJSInitialized = true; }); cluster.workers[Object.keys(cluster.workers)[0]].on("message", function (msg) { if (msg.length >= 8 && msg.indexOf("\x12ERRLIST") == 0) { var tries = parseInt(msg.substring(8, 9)); var errCode = msg.substring(9); serverconsole.locerrmessage(serverErrorDescs[errCode] ? serverErrorDescs[errCode] : serverErrorDescs["UNKNOWN"]); serverconsole.locmessage(tries + " attempts left."); } if (msg.length >= 9 && msg.indexOf("\x12ERRCRASH") == 0) { var errno = errors[msg.substring(9)]; process.exit(errno ? errno : 1); } }); // Hangup check and restart setInterval(function () { if (!closedMaster && !exiting) { var chksocket = {}; if (secure && disableNonEncryptedServer) { chksocket = https.get({ hostname: (typeof sport == "number" && sListenAddress) ? sListenAddress : "localhost", port: (typeof sport == "number") ? sport : undefined, socketPath: (typeof sport == "number") ? undefined : sport, headers: { "X-SVR-JS-From-Main-Thread": "true", "User-Agent": (exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS") }, timeout: 1620, rejectUnauthorized: false }, function (res) { chksocket.removeAllListeners("timeout"); res.destroy(); res.on("data", function () {}); res.on("end", function () {}); crashed = false; }).on("error", function () { if (!exiting) { if (!crashed) SVRJSFork(); else crashed = false; } }).on("timeout", function () { if (!exiting) SVRJSFork(); crashed = true; }); } else if ((configJSON.enableHTTP2 == undefined ? false : configJSON.enableHTTP2) && !secure) { // It doesn't support through Unix sockets or Windows named pipes var address = ((typeof port == "number" && listenAddress) ? listenAddress : "localhost").replace(/\/@/g, ""); if (address.indexOf(":") > -1) { address = "[" + address + "]"; } var connection = http2.connect("http://" + address + ":" + port.toString()); connection.on("error", function () { if (!exiting) { if (!crashed) SVRJSFork(); else crashed = false; } }); connection.setTimeout(1620, function () { if (!exiting) SVRJSFork(); crashed = true; }); chksocket = connection.request({ ":path": "/", "x-svr-js-from-main-thread": "true", "user-agent": (exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS") }); chksocket.on("response", function () { connection.close(); crashed = false; }); chksocket.on("error", function () { if (!exiting) { if (!crashed) SVRJSFork(); else crashed = false; } }); } else { chksocket = http.get({ hostname: (typeof port == "number" && listenAddress) ? listenAddress : "localhost", port: (typeof port == "number") ? port : undefined, socketPath: (typeof port == "number") ? undefined : port, headers: { "X-SVR-JS-From-Main-Thread": "true", "User-Agent": (exposeServerVersion ? "SVR.JS/" + version + " (" + getOS() + "; " + (process.isBun ? ("Bun/v" + process.versions.bun + "; like Node.JS/" + process.version) : ("Node.JS/" + process.version)) + ")" : "SVR.JS") }, timeout: 1620 }, function (res) { chksocket.removeAllListeners("timeout"); res.destroy(); res.on("data", function () {}); res.on("end", function () {}); crashed = false; }).on("error", function () { if (!exiting) { if (!crashed) SVRJSFork(); else crashed = false; } }).on("timeout", function () { if (!exiting) SVRJSFork(); crashed = true; }); } } }, 4550); // Termination of unused good workers if (!disableUnusedWorkerTermination && cluster.isPrimary !== undefined) { setTimeout(function () { setInterval(function () { if (!closedMaster && !exiting) { var allWorkers = Object.keys(cluster.workers); var minWorkers = 0; minWorkers = Math.ceil(workersToFork * 0.625); if (minWorkers < 2) minWorkers = 2; if (minWorkers > 12) minWorkers = 12; var goodWorkers = []; function checkWorker(callback, _id) { if (typeof _id === "undefined") _id = 0; if (_id >= allWorkers.length) { callback(); return; } try { if (cluster.workers[allWorkers[_id]]) { isWorkerHungUpBuff = true; cluster.workers[allWorkers[_id]].on("message", msgListener); cluster.workers[allWorkers[_id]].send("\x14KILLPING"); setTimeout(function () { if (isWorkerHungUpBuff) { checkWorker(callback, _id + 1); } else { goodWorkers.push(allWorkers[_id]); checkWorker(callback, _id + 1); } }, 250); } else { checkWorker(callback, _id + 1); } } catch (err) { if (cluster.workers[allWorkers[_id]]) { cluster.workers[allWorkers[_id]].removeAllListeners("message"); cluster.workers[allWorkers[_id]].on("message", bruteForceListenerWrapper(cluster.workers[allWorkers[_id]])); cluster.workers[allWorkers[_id]].on("message", listenConnListener); } checkWorker(callback, _id + 1); } } checkWorker(function () { if (goodWorkers.length > minWorkers) { var wN = Math.floor(Math.random() * goodWorkers.length); if (wN == goodWorkers.length) return; try { if (cluster.workers[goodWorkers[wN]]) { isWorkerHungUpBuff = true; cluster.workers[goodWorkers[wN]].on("message", msgListener); cluster.workers[goodWorkers[wN]].send("\x14KILLREQ"); } } catch (err) { if (cluster.workers[goodWorkers[wN]]) { cluster.workers[goodWorkers[wN]].removeAllListeners("message"); cluster.workers[goodWorkers[wN]].on("message", bruteForceListenerWrapper(cluster.workers[goodWorkers[wN]])); cluster.workers[goodWorkers[wN]].on("message", listenConnListener); } serverconsole.locwarnmessage("There was a problem while terminating unused worker process. Reason: " + err.message); } } }); } }, 300000); }, 2000); } } } } } // Save configuration file function saveConfig() { for (var i = 0; i < 3; i++) { try { var configJSONobj = {}; if (fs.existsSync(__dirname + "/config.json")) configJSONobj = JSON.parse(fs.readFileSync(__dirname + "/config.json").toString()); if (configJSONobj.users === undefined) configJSONobj.users = []; if (secure) { if (configJSONobj.key === undefined) configJSONobj.key = "cert/key.key"; if (configJSONobj.cert === undefined) configJSONobj.cert = "cert/cert.crt"; if (configJSONobj.sport === undefined) configJSONobj.sport = 443; if (configJSONobj.spubport === undefined) configJSONobj.spubport = 443; if (configJSONobj.sni === undefined) configJSONobj.sni = {}; if (configJSONobj.enableOCSPStapling === undefined) configJSONobj.enableOCSPStapling = false; } if (configJSONobj.port === undefined) configJSONobj.port = 80; if (configJSONobj.pubport === undefined) configJSONobj.pubport = 80; if (configJSONobj.domain === undefined && configJSONobj.domian !== undefined) configJSONobj.domain = configJSONobj.domian; delete configJSONobj.domian; if (configJSONobj.page404 === undefined) configJSONobj.page404 = "404.html"; configJSONobj.timestamp = timestamp; configJSONobj.blacklist = blocklist.raw; if (configJSONobj.nonStandardCodes === undefined) configJSONobj.nonStandardCodes = []; if (configJSONobj.enableCompression === undefined) configJSONobj.enableCompression = true; if (configJSONobj.customHeaders === undefined) configJSONobj.customHeaders = {}; if (configJSONobj.enableHTTP2 === undefined) configJSONobj.enableHTTP2 = false; if (configJSONobj.enableLogging === undefined) configJSONobj.enableLogging = true; if (configJSONobj.enableDirectoryListing === undefined) configJSONobj.enableDirectoryListing = true; if (configJSONobj.enableDirectoryListingWithDefaultHead === undefined) configJSONobj.enableDirectoryListingWithDefaultHead = false; if (configJSONobj.serverAdministratorEmail === undefined) configJSONobj.serverAdministratorEmail = "[no contact information]"; if (configJSONobj.stackHidden === undefined) configJSONobj.stackHidden = false; if (configJSONobj.enableRemoteLogBrowsing === undefined) configJSONobj.enableRemoteLogBrowsing = false; if (configJSONobj.exposeServerVersion === undefined) configJSONobj.exposeServerVersion = true; if (configJSONobj.disableServerSideScriptExpose === undefined) configJSONobj.disableServerSideScriptExpose = true; if (configJSONobj.allowStatus === undefined) configJSONobj.allowStatus = true; if (configJSONobj.rewriteMap === undefined) configJSONobj.rewriteMap = []; if (configJSONobj.dontCompress === undefined) configJSONobj.dontCompress = ["/.*\\.ipxe$/", "/.*\\.(?:jpe?g|png|bmp|tiff|jfif|gif|webp)$/", "/.*\\.(?:[id]mg|iso|flp)$/", "/.*\\.(?:zip|rar|bz2|[gb7x]z|lzma|tar)$/", "/.*\\.(?:mp[34]|mov|wm[av]|avi|webm|og[gv]|mk[va])$/"]; if (configJSONobj.enableIPSpoofing === undefined) configJSONobj.enableIPSpoofing = false; if (configJSONobj.secure === undefined) configJSONobj.secure = false; if (configJSONobj.disableNonEncryptedServer === undefined) configJSONobj.disableNonEncryptedServer = false; if (configJSONobj.disableToHTTPSRedirect === undefined) configJSONobj.disableToHTTPSRedirect = false; if (configJSONobj.enableETag === undefined) configJSONobj.enableETag = true; if (configJSONobj.disableUnusedWorkerTermination === undefined) configJSONobj.disableUnusedWorkerTermination = false; if (configJSONobj.rewriteDirtyURLs === undefined) configJSONobj.rewriteDirtyURLs = false; if (configJSONobj.errorPages === undefined) configJSONobj.errorPages = []; if (configJSONobj.useWebRootServerSideScript === undefined) configJSONobj.useWebRootServerSideScript = true; if (configJSONobj.exposeModsInErrorPages === undefined) configJSONobj.exposeModsInErrorPages = true; if (configJSONobj.disableTrailingSlashRedirects === undefined) configJSONobj.disableTrailingSlashRedirects = false; if (configJSONobj.environmentVariables === undefined) configJSONobj.environmentVariables = {}; if (configJSONobj.allowDoubleSlashes === undefined) configJSONobj.allowDoubleSlashes = false; var configString = JSON.stringify(configJSONobj, null, 2) + "\n"; fs.writeFileSync(__dirname + "/config.json", configString); break; } catch (err) { if (i >= 2) throw err; var now = Date.now(); while (Date.now() - now < 2); } } } // Process event listeners if (cluster.isPrimary || cluster.isPrimary === undefined) { // Crash handler function crashHandlerMaster(err) { serverconsole.locerrmessage("SVR.JS worker just crashed!!!"); serverconsole.locerrmessage("Stack:"); serverconsole.locerrmessage(err.stack ? generateErrorStack(err) : String(err)); process.exit(err.errno); } process.on("uncaughtException", crashHandlerMaster); process.on("unhandledRejection", crashHandlerMaster); process.on("exit", function (code) { try { if (!configJSONRErr && !configJSONPErr) { saveConfig(); } } catch (err) { serverconsole.locwarnmessage("There was a problem while saving configuration file. Reason: " + err.message); } try { deleteFolderRecursive(__dirname + "/temp"); } catch (err) { // Error! } try { fs.mkdirSync(__dirname + "/temp"); } catch (err) { // Error! } if (process.isBun && process.versions.bun && process.versions.bun[0] == "0") { try { fs.writeFileSync(__dirname + "/temp/serverSideScript.js", "// Placeholder server-side JavaScript to workaround Bun bug.\r\n"); } catch (err) { // Error! } } serverconsole.locmessage("Server closed with exit code: " + code); }); process.on("warning", function (warning) { serverconsole.locwarnmessage(warning.message); if (generateErrorStack(warning)) { serverconsole.locwarnmessage("Stack:"); serverconsole.locwarnmessage(generateErrorStack(warning)); } }); process.on("SIGINT", function () { reallyExiting = true; if (cluster.isPrimary !== undefined) { exiting = true; var allWorkers = Object.keys(cluster.workers); for (var i = 0; i < allWorkers.length; i++) { try { if (cluster.workers[allWorkers[i]]) { cluster.workers[allWorkers[i]].send("stop"); } } catch (err) { // Worker will crash with EPIPE anyway. } } } serverconsole.locmessage("Server terminated using SIGINT"); process.exit(); }); } else { // Crash handler function crashHandler(err) { serverconsole.locerrmessage("SVR.JS worker just crashed!!!"); serverconsole.locerrmessage("Stack:"); serverconsole.locerrmessage(err.stack ? generateErrorStack(err) : String(err)); process.exit(err.errno); } process.on("uncaughtException", crashHandler); process.on("unhandledRejection", crashHandler); // Warning handler process.on("warning", function (warning) { serverconsole.locwarnmessage(warning.message); if (warning.stack) { serverconsole.locwarnmessage("Stack:"); serverconsole.locwarnmessage(generateErrorStack(warning)); } }); } // Start SVR.JS! try { start(true); } catch (err) { serverconsole.locerrmessage("There was a problem starting SVR.JS!!!"); serverconsole.locerrmessage("Stack:"); serverconsole.locerrmessage(generateErrorStack(err)); setTimeout(function () { process.exit(err.errno ? err.errno : 1); }, 10); }