KC's Workspace
    Preparing search index...

    Interface ServerOptions<Request, Response>

    interface ServerOptions<
        Request extends typeof IncomingMessage = typeof IncomingMessage,
        Response extends typeof ServerResponse = typeof ServerResponse,
    > {
        allowHalfOpen?: boolean;
        allowPartialTrustChain?: boolean;
        ALPNCallback?: (
            arg: { protocols: string[]; servername: string },
        ) => string | undefined;
        ALPNProtocols?: readonly string[] | ArrayBufferView<ArrayBufferLike>;
        blockList?: BlockList;
        ca?:
            | string
            | Buffer<ArrayBufferLike>
            | (string | Buffer<ArrayBufferLike>)[];
        cert?:
            | string
            | Buffer<ArrayBufferLike>
            | (string | Buffer<ArrayBufferLike>)[];
        ciphers?: string;
        clientCertEngine?: string;
        connectionsCheckingInterval?: number;
        crl?:
            | string
            | Buffer<ArrayBufferLike>
            | (string | Buffer<ArrayBufferLike>)[];
        dhparam?: string | Buffer<ArrayBufferLike>;
        ecdhCurve?: string;
        enableTrace?: boolean;
        handshakeTimeout?: number;
        headersTimeout?: number;
        highWaterMark?: number;
        honorCipherOrder?: boolean;
        IncomingMessage?: Request;
        insecureHTTPParser?: boolean;
        joinDuplicateHeaders?: boolean;
        keepAlive?: boolean;
        keepAliveInitialDelay?: number;
        keepAliveTimeout?: number;
        keepAliveTimeoutBuffer?: number;
        key?:
            | string
            | Buffer<ArrayBufferLike>
            | (string | Buffer<ArrayBufferLike> | KeyObject)[];
        maxHeaderSize?: number;
        maxVersion?: SecureVersion;
        minVersion?: SecureVersion;
        noDelay?: boolean;
        passphrase?: string;
        pauseOnConnect?: boolean;
        pfx?:
            | string
            | Buffer<ArrayBufferLike>
            | (string | Buffer<ArrayBufferLike> | PxfObject)[];
        privateKeyEngine?: string;
        privateKeyIdentifier?: string;
        pskCallback?: (
            socket: TLSSocket,
            identity: string,
        ) => ArrayBufferView<ArrayBufferLike> | null;
        pskIdentityHint?: string;
        rejectNonStandardBodyWrites?: boolean;
        rejectUnauthorized?: boolean;
        requestCert?: boolean;
        requestTimeout?: number;
        requireHostHeader?: boolean;
        secureContext?: SecureContext;
        secureOptions?: number;
        secureProtocol?: string;
        ServerResponse?: Response;
        sessionIdContext?: string;
        sessionTimeout?: number;
        shouldUpgradeCallback?: (request: InstanceType<Request>) => boolean;
        sigalgs?: string;
        SNICallback?: (
            servername: string,
            cb: (err: Error | null, ctx?: SecureContext) => void,
        ) => void;
        ticketKeys?: Buffer<ArrayBufferLike>;
        uniqueHeaders?: (string | string[])[];
    }

    Type Parameters

    Hierarchy (View Summary)

    Index

    Properties

    allowHalfOpen?: boolean

    Indicates whether half-opened TCP connections are allowed.

    false
    
    allowPartialTrustChain?: boolean

    Treat intermediate (non-self-signed) certificates in the trust CA certificate list as trusted.

    v22.9.0, v20.18.0

    ALPNCallback?: (
        arg: { protocols: string[]; servername: string },
    ) => string | undefined

    If set, this will be called when a client opens a connection using the ALPN extension. One argument will be passed to the callback: an object containing servername and protocols fields, respectively containing the server name from the SNI extension (if any) and an array of ALPN protocol name strings. The callback must return either one of the strings listed in protocols, which will be returned to the client as the selected ALPN protocol, or undefined, to reject the connection with a fatal alert. If a string is returned that does not match one of the client's ALPN protocols, an error will be thrown. This option cannot be used with the ALPNProtocols option, and setting both options will throw an error.

    ALPNProtocols?: readonly string[] | ArrayBufferView<ArrayBufferLike>

    An array of strings or a Buffer naming possible ALPN protocols. (Protocols should be ordered by their priority.)

    blockList?: BlockList

    blockList can be used for disabling inbound access to specific IP addresses, IP ranges, or IP subnets. This does not work if the server is behind a reverse proxy, NAT, etc. because the address checked against the block list is the address of the proxy, or the one specified by the NAT.

    v22.13.0

    ca?: string | Buffer<ArrayBufferLike> | (string | Buffer<ArrayBufferLike>)[]

    Optionally override the trusted CA certificates. Default is to trust the well-known CAs curated by Mozilla. Mozilla's CAs are completely replaced when CAs are explicitly specified using this option.

    cert?: string | Buffer<ArrayBufferLike> | (string | Buffer<ArrayBufferLike>)[]

    Cert chains in PEM format. One cert chain should be provided per private key. Each cert chain should consist of the PEM formatted certificate for a provided private key, followed by the PEM formatted intermediate certificates (if any), in order, and not including the root CA (the root CA must be pre-known to the peer, see ca). When providing multiple cert chains, they do not have to be in the same order as their private keys in key. If the intermediate certificates are not provided, the peer will not be able to validate the certificate, and the handshake will fail.

    ciphers?: string

    Cipher suite specification, replacing the default. For more information, see modifying the default cipher suite. Permitted ciphers can be obtained via tls.getCiphers(). Cipher names must be uppercased in order for OpenSSL to accept them.

    clientCertEngine?: string

    Name of an OpenSSL engine which can provide the client certificate.

    connectionsCheckingInterval?: number

    Sets the interval value in milliseconds to check for request and headers timeout in incomplete requests.

    30000
    
    crl?: string | Buffer<ArrayBufferLike> | (string | Buffer<ArrayBufferLike>)[]

    PEM formatted CRLs (Certificate Revocation Lists).

    dhparam?: string | Buffer<ArrayBufferLike>

    'auto' or custom Diffie-Hellman parameters, required for non-ECDHE perfect forward secrecy. If omitted or invalid, the parameters are silently discarded and DHE ciphers will not be available. ECDHE-based perfect forward secrecy will still be available.

    ecdhCurve?: string

    A string describing a named curve or a colon separated list of curve NIDs or names, for example P-521:P-384:P-256, to use for ECDH key agreement. Set to auto to select the curve automatically. Use crypto.getCurves() to obtain a list of available curve names. On recent releases, openssl ecparam -list_curves will also display the name and description of each available elliptic curve. Default: tls.DEFAULT_ECDH_CURVE.

    enableTrace?: boolean

    When enabled, TLS packet trace information is written to stderr. This can be used to debug TLS connection problems.

    false
    
    handshakeTimeout?: number

    Abort the connection if the SSL/TLS handshake does not finish in the specified number of milliseconds. A 'tlsClientError' is emitted on the tls.Server object whenever a handshake times out. Default: 120000 (120 seconds).

    headersTimeout?: number

    Sets the timeout value in milliseconds for receiving the complete HTTP headers from the client. See Server.headersTimeout for more information.

    60000
    

    18.0.0

    highWaterMark?: number

    Optionally overrides all sockets' readableHighWaterMark and writableHighWaterMark. This affects highWaterMark property of both IncomingMessage and ServerResponse. Default:

    stream.getDefaultHighWaterMark().

    v20.1.0

    honorCipherOrder?: boolean

    Attempt to use the server's cipher suite preferences instead of the client's. When true, causes SSL_OP_CIPHER_SERVER_PREFERENCE to be set in secureOptions

    IncomingMessage?: Request

    Specifies the IncomingMessage class to be used. Useful for extending the original IncomingMessage.

    insecureHTTPParser?: boolean

    Use an insecure HTTP parser that accepts invalid HTTP headers when true. Using the insecure parser should be avoided. See --insecure-http-parser for more information.

    false
    
    joinDuplicateHeaders?: boolean

    It joins the field line values of multiple headers in a request with , instead of discarding the duplicates.

    false
    

    v18.14.0

    keepAlive?: boolean

    If set to true, it enables keep-alive functionality on the socket immediately after a new incoming connection is received, similarly on what is done in socket.setKeepAlive([enable][, initialDelay]).

    false
    

    v16.5.0

    keepAliveInitialDelay?: number

    If set to a positive number, it sets the initial delay before the first keepalive probe is sent on an idle socket.

    0
    

    v16.5.0

    keepAliveTimeout?: number

    The number of milliseconds of inactivity a server needs to wait for additional incoming data, after it has finished writing the last response, before a socket will be destroyed.

    Server.keepAliveTimeout for more information.

    5000
    

    v18.0.0

    keepAliveTimeoutBuffer?: number

    An additional buffer time added to the server.keepAliveTimeout to extend the internal socket timeout.

    24.6.0

    1000
    
    key?:
        | string
        | Buffer<ArrayBufferLike>
        | (string | Buffer<ArrayBufferLike> | KeyObject)[]

    Private keys in PEM format. PEM allows the option of private keys being encrypted. Encrypted keys will be decrypted with options.passphrase. Multiple keys using different algorithms can be provided either as an array of unencrypted key strings or buffers, or an array of objects in the form {pem: <string|buffer>[, passphrase: ]}. The object form can only occur in an array. object.passphrase is optional. Encrypted keys will be decrypted with object.passphrase if provided, or options.passphrase if it is not.

    maxHeaderSize?: number

    Optionally overrides the value of --max-http-header-size for requests received by this server, i.e. the maximum length of request headers in bytes.

    16384
    

    v13.3.0

    maxVersion?: SecureVersion

    Optionally set the maximum TLS version to allow. One of 'TLSv1.3', 'TLSv1.2', 'TLSv1.1', or 'TLSv1'. Cannot be specified along with the secureProtocol option, use one or the other. Default: 'TLSv1.3', unless changed using CLI options. Using --tls-max-v1.2 sets the default to 'TLSv1.2'. Using --tls-max-v1.3 sets the default to 'TLSv1.3'. If multiple of the options are provided, the highest maximum is used.

    minVersion?: SecureVersion

    Optionally set the minimum TLS version to allow. One of 'TLSv1.3', 'TLSv1.2', 'TLSv1.1', or 'TLSv1'. Cannot be specified along with the secureProtocol option, use one or the other. It is not recommended to use less than TLSv1.2, but it may be required for interoperability. Default: 'TLSv1.2', unless changed using CLI options. Using --tls-v1.0 sets the default to 'TLSv1'. Using --tls-v1.1 sets the default to 'TLSv1.1'. Using --tls-min-v1.3 sets the default to 'TLSv1.3'. If multiple of the options are provided, the lowest minimum is used.

    noDelay?: boolean

    If set to true, it disables the use of Nagle's algorithm immediately after a new incoming connection is received.

    true
    

    v16.5.0

    passphrase?: string

    Shared passphrase used for a single private key and/or a PFX.

    pauseOnConnect?: boolean

    Indicates whether the socket should be paused on incoming connections.

    false
    
    pfx?:
        | string
        | Buffer<ArrayBufferLike>
        | (string | Buffer<ArrayBufferLike> | PxfObject)[]

    PFX or PKCS12 encoded private key and certificate chain. pfx is an alternative to providing key and cert individually. PFX is usually encrypted, if it is, passphrase will be used to decrypt it. Multiple PFX can be provided either as an array of unencrypted PFX buffers, or an array of objects in the form {buf: <string|buffer>[, passphrase: ]}. The object form can only occur in an array. object.passphrase is optional. Encrypted PFX will be decrypted with object.passphrase if provided, or options.passphrase if it is not.

    privateKeyEngine?: string

    Name of an OpenSSL engine to get private key from. Should be used together with privateKeyIdentifier.

    privateKeyIdentifier?: string

    Identifier of a private key managed by an OpenSSL engine. Should be used together with privateKeyEngine. Should not be set together with key, because both options define a private key in different ways.

    pskCallback?: (
        socket: TLSSocket,
        identity: string,
    ) => ArrayBufferView<ArrayBufferLike> | null

    Type Declaration

      • (socket: TLSSocket, identity: string): ArrayBufferView<ArrayBufferLike> | null
      • Parameters

        • socket: TLSSocket
        • identity: string

          identity parameter sent from the client.

        Returns ArrayBufferView<ArrayBufferLike> | null

        pre-shared key that must either be a buffer or null to stop the negotiation process. Returned PSK must be compatible with the selected cipher's digest.

        When negotiating TLS-PSK (pre-shared keys), this function is called with the identity provided by the client. If the return value is null the negotiation process will stop and an "unknown_psk_identity" alert message will be sent to the other party. If the server wishes to hide the fact that the PSK identity was not known, the callback must provide some random data as psk to make the connection fail with "decrypt_error" before negotiation is finished. PSK ciphers are disabled by default, and using TLS-PSK thus requires explicitly specifying a cipher suite with the ciphers option. More information can be found in the RFC 4279.

    pskIdentityHint?: string

    hint to send to a client to help with selecting the identity during TLS-PSK negotiation. Will be ignored in TLS 1.3. Upon failing to set pskIdentityHint tlsClientError will be emitted with ERR_TLS_PSK_SET_IDENTIY_HINT_FAILED code.

    rejectNonStandardBodyWrites?: boolean

    If set to true, an error is thrown when writing to an HTTP response which does not have a body.

    false
    

    v18.17.0, v20.2.0

    rejectUnauthorized?: boolean

    If true the server will reject any connection which is not authorized with the list of supplied CAs. This option only has an effect if requestCert is true.

    true
    
    requestCert?: boolean

    If true the server will request a certificate from clients that connect and attempt to verify that certificate. Defaults to false.

    requestTimeout?: number

    Sets the timeout value in milliseconds for receiving the entire request from the client.

    Server.requestTimeout for more information.

    300000
    

    v18.0.0

    requireHostHeader?: boolean

    If set to true, it forces the server to respond with a 400 (Bad Request) status code to any HTTP/1.1 request message that lacks a Host header (as mandated by the specification).

    true
    

    20.0.0

    secureContext?: SecureContext

    An optional TLS context object from tls.createSecureContext()

    secureOptions?: number

    Optionally affect the OpenSSL protocol behavior, which is not usually necessary. This should be used carefully if at all! Value is a numeric bitmask of the SSL_OP_* options from OpenSSL Options

    secureProtocol?: string

    Legacy mechanism to select the TLS protocol version to use, it does not support independent control of the minimum and maximum version, and does not support limiting the protocol to TLSv1.3. Use minVersion and maxVersion instead. The possible values are listed as SSL_METHODS, use the function names as strings. For example, use 'TLSv1_1_method' to force TLS version 1.1, or 'TLS_method' to allow any TLS protocol version up to TLSv1.3. It is not recommended to use TLS versions less than 1.2, but it may be required for interoperability. Default: none, see minVersion.

    ServerResponse?: Response

    Specifies the ServerResponse class to be used. Useful for extending the original ServerResponse.

    sessionIdContext?: string

    Opaque identifier used by servers to ensure session state is not shared between applications. Unused by clients.

    sessionTimeout?: number

    The number of seconds after which a TLS session created by the server will no longer be resumable. See Session Resumption for more information. Default: 300.

    shouldUpgradeCallback?: (request: InstanceType<Request>) => boolean

    A callback which receives an incoming request and returns a boolean, to control which upgrade attempts should be accepted. Accepted upgrades will fire an 'upgrade' event (or their sockets will be destroyed, if no listener is registered) while rejected upgrades will fire a 'request' event like any non-upgrade request.

    v24.9.0

    () => server.listenerCount('upgrade') > 0
    
    sigalgs?: string

    Colon-separated list of supported signature algorithms. The list can contain digest algorithms (SHA256, MD5 etc.), public key algorithms (RSA-PSS, ECDSA etc.), combination of both (e.g 'RSA+SHA384') or TLS v1.3 scheme names (e.g. rsa_pss_pss_sha512).

    SNICallback?: (
        servername: string,
        cb: (err: Error | null, ctx?: SecureContext) => void,
    ) => void

    SNICallback(servername, cb) A function that will be called if the client supports SNI TLS extension. Two arguments will be passed when called: servername and cb. SNICallback should invoke cb(null, ctx), where ctx is a SecureContext instance. (tls.createSecureContext(...) can be used to get a proper SecureContext.) If SNICallback wasn't provided the default callback with high-level API will be used (see below).

    ticketKeys?: Buffer<ArrayBufferLike>

    48-bytes of cryptographically strong pseudo-random data.

    uniqueHeaders?: (string | string[])[]

    A list of response headers that should be sent only once. If the header's value is an array, the items will be joined using ; .