2016-01-02 00:27:44 +00:00
|
|
|
<?php
|
2016-01-20 00:10:39 +00:00
|
|
|
/**
|
2016-01-20 21:05:16 +00:00
|
|
|
* Pterodactyl - Panel
|
2017-01-24 22:57:08 +00:00
|
|
|
* Copyright (c) 2015 - 2017 Dane Everitt <dane@daneeveritt.com>.
|
2016-01-20 00:10:39 +00:00
|
|
|
*
|
2016-01-20 20:56:40 +00:00
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
|
|
* in the Software without restriction, including without limitation the rights
|
|
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
|
|
* furnished to do so, subject to the following conditions:
|
2016-01-20 00:10:39 +00:00
|
|
|
*
|
2016-01-20 20:56:40 +00:00
|
|
|
* The above copyright notice and this permission notice shall be included in all
|
|
|
|
* copies or substantial portions of the Software.
|
2016-01-20 00:10:39 +00:00
|
|
|
*
|
2016-01-20 20:56:40 +00:00
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
|
|
* SOFTWARE.
|
2016-01-20 00:10:39 +00:00
|
|
|
*/
|
2016-12-07 22:46:38 +00:00
|
|
|
|
2016-01-02 00:27:44 +00:00
|
|
|
namespace Pterodactyl\Http\Controllers\Remote;
|
|
|
|
|
2017-01-07 17:10:11 +00:00
|
|
|
use Carbon\Carbon;
|
2016-01-23 01:31:47 +00:00
|
|
|
use Pterodactyl\Models;
|
2016-01-02 00:27:44 +00:00
|
|
|
use Illuminate\Http\Request;
|
2016-12-07 22:46:38 +00:00
|
|
|
use Pterodactyl\Http\Controllers\Controller;
|
2016-01-02 00:27:44 +00:00
|
|
|
|
|
|
|
class RemoteController extends Controller
|
|
|
|
{
|
|
|
|
/**
|
2016-12-07 22:46:38 +00:00
|
|
|
* Controller Constructor.
|
2016-01-02 00:27:44 +00:00
|
|
|
*/
|
|
|
|
public function __construct()
|
|
|
|
{
|
|
|
|
// No middleware for this route.
|
|
|
|
}
|
|
|
|
|
2016-12-07 22:46:38 +00:00
|
|
|
public function postDownload(Request $request)
|
|
|
|
{
|
2017-02-10 22:36:58 +00:00
|
|
|
$download = Models\Download::where('token', $request->input('token'))->first();
|
2016-12-07 22:46:38 +00:00
|
|
|
if (! $download) {
|
2016-01-02 00:27:44 +00:00
|
|
|
return response()->json([
|
2016-12-07 22:46:38 +00:00
|
|
|
'error' => 'An invalid request token was recieved with this request.',
|
2016-01-02 00:27:44 +00:00
|
|
|
], 403);
|
|
|
|
}
|
|
|
|
|
|
|
|
$download->delete();
|
2016-12-07 22:46:38 +00:00
|
|
|
|
2016-01-02 00:27:44 +00:00
|
|
|
return response()->json([
|
|
|
|
'path' => $download->path,
|
2016-12-07 22:46:38 +00:00
|
|
|
'server' => $download->server,
|
2016-01-02 00:27:44 +00:00
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
2016-01-23 01:31:47 +00:00
|
|
|
public function postInstall(Request $request)
|
|
|
|
{
|
2017-02-10 22:36:58 +00:00
|
|
|
$server = Models\Server::where('uuid', $request->input('server'))->with('node')->first();
|
2016-12-07 22:46:38 +00:00
|
|
|
if (! $server) {
|
2016-01-23 01:31:47 +00:00
|
|
|
return response()->json([
|
2016-12-07 22:46:38 +00:00
|
|
|
'error' => 'No server by that ID was found on the system.',
|
2016-01-23 01:31:47 +00:00
|
|
|
], 422);
|
|
|
|
}
|
|
|
|
|
|
|
|
$hmac = $request->input('signed');
|
|
|
|
$status = $request->input('installed');
|
|
|
|
|
2017-02-10 22:36:58 +00:00
|
|
|
if (base64_decode($hmac) !== hash_hmac('sha256', $server->uuid, $server->node->daemonSecret, true)) {
|
2016-01-23 01:31:47 +00:00
|
|
|
return response()->json([
|
2016-12-07 22:46:38 +00:00
|
|
|
'error' => 'Signed HMAC was invalid.',
|
2016-01-23 01:31:47 +00:00
|
|
|
], 403);
|
|
|
|
}
|
|
|
|
|
|
|
|
$server->installed = ($status === 'installed') ? 1 : 2;
|
|
|
|
$server->save();
|
|
|
|
|
|
|
|
return response()->json([
|
2016-12-07 22:46:38 +00:00
|
|
|
'message' => 'Recieved!',
|
2016-01-23 01:31:47 +00:00
|
|
|
], 200);
|
|
|
|
}
|
|
|
|
|
2016-10-14 20:20:24 +00:00
|
|
|
public function event(Request $request)
|
|
|
|
{
|
2017-02-10 22:36:58 +00:00
|
|
|
$server = Models\Server::where('uuid', $request->input('server'))->with('node')->first();
|
2016-12-07 22:46:38 +00:00
|
|
|
if (! $server) {
|
2016-10-14 20:20:24 +00:00
|
|
|
return response()->json([
|
2016-12-07 22:46:38 +00:00
|
|
|
'error' => 'No server by that ID was found on the system.',
|
2016-10-14 20:20:24 +00:00
|
|
|
], 422);
|
|
|
|
}
|
|
|
|
|
|
|
|
$hmac = $request->input('signed');
|
2017-02-10 22:36:58 +00:00
|
|
|
if (base64_decode($hmac) !== hash_hmac('sha256', $server->uuid, $server->node->daemonSecret, true)) {
|
2016-10-14 20:20:24 +00:00
|
|
|
return response()->json([
|
2016-12-07 22:46:38 +00:00
|
|
|
'error' => 'Signed HMAC was invalid.',
|
2016-10-14 20:20:24 +00:00
|
|
|
], 403);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Passes Validation, Setup Notifications
|
|
|
|
$notify = new NotificationService($server);
|
|
|
|
$notify->pass($request->input('notification'));
|
|
|
|
|
|
|
|
return response('', 201);
|
|
|
|
}
|
2017-01-07 17:10:11 +00:00
|
|
|
|
2017-01-07 17:39:41 +00:00
|
|
|
public function getConfiguration(Request $request, $tokenString)
|
|
|
|
{
|
2017-01-07 17:10:11 +00:00
|
|
|
// Try to query the token and the node from the database
|
|
|
|
try {
|
|
|
|
$token = Models\NodeConfigurationToken::where('token', $tokenString)->firstOrFail();
|
|
|
|
$node = Models\Node::findOrFail($token->node);
|
2017-01-07 17:39:41 +00:00
|
|
|
} catch (\Illuminate\Database\Eloquent\ModelNotFoundException $e) {
|
2017-01-08 14:21:02 +00:00
|
|
|
return response()->json(['error' => 'token_invalid'], 403);
|
2017-01-07 17:10:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check if token is expired
|
|
|
|
if ($token->expires_at->lt(Carbon::now())) {
|
|
|
|
$token->delete();
|
2017-01-07 17:40:55 +00:00
|
|
|
|
2017-01-08 14:21:02 +00:00
|
|
|
return response()->json(['error' => 'token_expired'], 403);
|
2017-01-07 17:10:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Delete the token, it's one-time use
|
|
|
|
$token->delete();
|
|
|
|
|
2017-01-08 14:21:02 +00:00
|
|
|
// Manually as getConfigurationAsJson() returns it in correct format already
|
2017-02-16 20:38:56 +00:00
|
|
|
return response($node->getConfigurationAsJson());
|
2017-01-07 17:10:11 +00:00
|
|
|
}
|
2016-01-02 00:27:44 +00:00
|
|
|
}
|