misc_pterodactyl-panel/app/Http/Controllers/Remote/RemoteController.php

145 lines
4.9 KiB
PHP
Raw Normal View History

2016-01-02 00:27:44 +00:00
<?php
2016-01-20 00:10:39 +00:00
/**
2016-01-20 21:05:16 +00:00
* Pterodactyl - Panel
2017-01-24 22:57:08 +00:00
* Copyright (c) 2015 - 2017 Dane Everitt <dane@daneeveritt.com>.
2016-01-20 00:10:39 +00:00
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
2016-01-20 00:10:39 +00:00
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
2016-01-20 00:10:39 +00:00
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
2016-01-20 00:10:39 +00:00
*/
2016-12-07 22:46:38 +00:00
2016-01-02 00:27:44 +00:00
namespace Pterodactyl\Http\Controllers\Remote;
use Carbon\Carbon;
use Pterodactyl\Models;
2016-01-02 00:27:44 +00:00
use Illuminate\Http\Request;
2016-12-07 22:46:38 +00:00
use Pterodactyl\Http\Controllers\Controller;
2016-01-02 00:27:44 +00:00
class RemoteController extends Controller
{
/**
2017-03-19 23:36:50 +00:00
* Handles download request from daemon.
*
* @param \Illuminate\Http\Request $request
* @return \Illuminate\Http\JsonResponse
2016-01-02 00:27:44 +00:00
*/
2016-12-07 22:46:38 +00:00
public function postDownload(Request $request)
{
2017-02-10 22:36:58 +00:00
$download = Models\Download::where('token', $request->input('token'))->first();
2016-12-07 22:46:38 +00:00
if (! $download) {
2016-01-02 00:27:44 +00:00
return response()->json([
2016-12-07 22:46:38 +00:00
'error' => 'An invalid request token was recieved with this request.',
2016-01-02 00:27:44 +00:00
], 403);
}
$download->delete();
2016-12-07 22:46:38 +00:00
2016-01-02 00:27:44 +00:00
return response()->json([
'path' => $download->path,
2016-12-07 22:46:38 +00:00
'server' => $download->server,
2016-01-02 00:27:44 +00:00
]);
}
2017-03-19 23:36:50 +00:00
/**
* Handles install toggle request from daemon.
*
* @param \Illuminate\Http\Request $request
* @return \Illuminate\Http\JsonResponse
*/
public function postInstall(Request $request)
{
2017-02-10 22:36:58 +00:00
$server = Models\Server::where('uuid', $request->input('server'))->with('node')->first();
2016-12-07 22:46:38 +00:00
if (! $server) {
return response()->json([
2016-12-07 22:46:38 +00:00
'error' => 'No server by that ID was found on the system.',
], 422);
}
$hmac = $request->input('signed');
$status = $request->input('installed');
2017-02-10 22:36:58 +00:00
if (base64_decode($hmac) !== hash_hmac('sha256', $server->uuid, $server->node->daemonSecret, true)) {
return response()->json([
2016-12-07 22:46:38 +00:00
'error' => 'Signed HMAC was invalid.',
], 403);
}
$server->installed = ($status === 'installed') ? 1 : 2;
$server->save();
return response()->json([
2016-12-07 22:46:38 +00:00
'message' => 'Recieved!',
], 200);
}
2017-03-19 23:36:50 +00:00
/**
* Handles event from daemon.
*
* @param \Illuminate\Http\Request $request
* @return \Illuminate\Http\JsonResponse|\Illuminate\Http\Response
* @deprecated
*/
public function event(Request $request)
{
2017-02-10 22:36:58 +00:00
$server = Models\Server::where('uuid', $request->input('server'))->with('node')->first();
2016-12-07 22:46:38 +00:00
if (! $server) {
return response()->json([
2016-12-07 22:46:38 +00:00
'error' => 'No server by that ID was found on the system.',
], 422);
}
$hmac = $request->input('signed');
2017-02-10 22:36:58 +00:00
if (base64_decode($hmac) !== hash_hmac('sha256', $server->uuid, $server->node->daemonSecret, true)) {
return response()->json([
2016-12-07 22:46:38 +00:00
'error' => 'Signed HMAC was invalid.',
], 403);
}
return response('', 201);
}
2017-03-19 23:36:50 +00:00
/**
* Handles configuration data request from daemon.
*
* @param \Illuminate\Http\Request $request
* @param string $token
* @return \Illuminate\Http\JsonResponse|\Illuminate\Http\Response
*/
public function getConfiguration(Request $request, $token)
2017-01-07 17:39:41 +00:00
{
// Try to query the token and the node from the database
try {
$model = Models\NodeConfigurationToken::with('node')->where('token', $token)->firstOrFail();
2017-01-07 17:39:41 +00:00
} catch (\Illuminate\Database\Eloquent\ModelNotFoundException $e) {
return response()->json(['error' => 'token_invalid'], 403);
}
// Check if token is expired
if ($model->created_at->lt(Carbon::now())) {
$model->delete();
return response()->json(['error' => 'token_expired'], 403);
}
// Delete the token, it's one-time use
$model->delete();
// Manually as getConfigurationAsJson() returns it in correct format already
return response($model->node->getConfigurationAsJson())->header('Content-Type', 'text/json');
}
2016-01-02 00:27:44 +00:00
}