2018-08-25 22:07:42 +00:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace Pterodactyl\Http\Middleware\Api\Client\Server;
|
|
|
|
|
|
|
|
use Closure;
|
|
|
|
use Illuminate\Http\Request;
|
|
|
|
use Pterodactyl\Models\Server;
|
|
|
|
use Pterodactyl\Contracts\Repository\ServerRepositoryInterface;
|
|
|
|
use Symfony\Component\HttpKernel\Exception\NotFoundHttpException;
|
2021-01-30 21:28:31 +00:00
|
|
|
use Pterodactyl\Exceptions\Http\Server\ServerStateConflictException;
|
2018-08-25 22:07:42 +00:00
|
|
|
|
|
|
|
class AuthenticateServerAccess
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* @var \Pterodactyl\Contracts\Repository\ServerRepositoryInterface
|
|
|
|
*/
|
|
|
|
private $repository;
|
|
|
|
|
2020-04-26 20:21:39 +00:00
|
|
|
/**
|
|
|
|
* Routes that this middleware should not apply to if the user is an admin.
|
|
|
|
*
|
|
|
|
* @var string[]
|
|
|
|
*/
|
|
|
|
protected $except = [
|
|
|
|
'api:client:server.ws',
|
|
|
|
];
|
|
|
|
|
2018-08-25 22:07:42 +00:00
|
|
|
/**
|
|
|
|
* AuthenticateServerAccess constructor.
|
|
|
|
*/
|
|
|
|
public function __construct(ServerRepositoryInterface $repository)
|
|
|
|
{
|
|
|
|
$this->repository = $repository;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Authenticate that this server exists and is not suspended or marked as installing.
|
|
|
|
*
|
|
|
|
* @return mixed
|
|
|
|
*/
|
|
|
|
public function handle(Request $request, Closure $next)
|
|
|
|
{
|
2020-04-26 20:21:39 +00:00
|
|
|
/** @var \Pterodactyl\Models\User $user */
|
|
|
|
$user = $request->user();
|
2018-08-25 22:07:42 +00:00
|
|
|
$server = $request->route()->parameter('server');
|
|
|
|
|
2021-01-23 20:33:34 +00:00
|
|
|
if (!$server instanceof Server) {
|
2019-05-02 04:45:39 +00:00
|
|
|
throw new NotFoundHttpException(trans('exceptions.api.resource_not_found'));
|
2018-08-25 22:07:42 +00:00
|
|
|
}
|
|
|
|
|
2020-03-28 23:23:18 +00:00
|
|
|
// At the very least, ensure that the user trying to make this request is the
|
|
|
|
// server owner, a subuser, or a root admin. We'll leave it up to the controllers
|
|
|
|
// to authenticate more detailed permissions if needed.
|
2021-01-23 20:33:34 +00:00
|
|
|
if ($user->id !== $server->owner_id && !$user->root_admin) {
|
2020-03-28 23:23:18 +00:00
|
|
|
// Check for subuser status.
|
2021-01-23 20:33:34 +00:00
|
|
|
if (!$server->subusers->contains('user_id', $user->id)) {
|
2020-03-28 23:23:18 +00:00
|
|
|
throw new NotFoundHttpException(trans('exceptions.api.resource_not_found'));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-30 21:28:31 +00:00
|
|
|
try {
|
|
|
|
$server->validateCurrentState();
|
|
|
|
} catch (ServerStateConflictException $exception) {
|
|
|
|
// Still allow users to get information about their server if it is installing or
|
|
|
|
// being transferred.
|
|
|
|
if (!$request->routeIs('api:client:server.view')) {
|
|
|
|
if ($server->isSuspended() && !$request->routeIs('api:client:server.resources')) {
|
|
|
|
throw $exception;
|
2020-12-16 16:34:47 +00:00
|
|
|
}
|
2021-01-30 21:28:31 +00:00
|
|
|
if (!$user->root_admin || !$request->routeIs($this->except)) {
|
|
|
|
throw $exception;
|
2020-12-16 16:34:47 +00:00
|
|
|
}
|
2020-04-26 20:21:39 +00:00
|
|
|
}
|
2018-08-25 22:07:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
$request->attributes->set('server', $server);
|
|
|
|
|
|
|
|
return $next($request);
|
|
|
|
}
|
|
|
|
}
|