2015-12-06 18:58:49 +00:00
|
|
|
<?php
|
2016-01-20 00:10:39 +00:00
|
|
|
/**
|
|
|
|
* Pterodactyl Panel
|
|
|
|
* Copyright (c) 2015 - 2016 Dane Everitt <dane@daneeveritt.com>
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2015-12-06 18:58:49 +00:00
|
|
|
namespace Pterodactyl\Http\Controllers\Base;
|
|
|
|
|
|
|
|
use Auth;
|
2015-12-14 03:22:16 +00:00
|
|
|
use Hash;
|
2015-12-06 18:58:49 +00:00
|
|
|
use Google2FA;
|
|
|
|
use Alert;
|
2015-12-14 03:22:16 +00:00
|
|
|
|
2015-12-06 18:58:49 +00:00
|
|
|
use Pterodactyl\Models\Server;
|
2015-12-14 03:22:16 +00:00
|
|
|
use Pterodactyl\Exceptions\DisplayException;
|
2015-12-06 18:58:49 +00:00
|
|
|
|
|
|
|
use Pterodactyl\Http\Controllers\Controller;
|
|
|
|
use Illuminate\Http\Request;
|
|
|
|
|
|
|
|
class IndexController extends Controller
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Controller Constructor
|
|
|
|
*/
|
|
|
|
public function __construct()
|
|
|
|
{
|
2016-01-04 21:09:39 +00:00
|
|
|
//
|
2015-12-06 18:58:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns listing of user's servers.
|
|
|
|
*
|
|
|
|
* @param \Illuminate\Http\Request $request
|
|
|
|
* @return \Illuminate\Contracts\View\View
|
|
|
|
*/
|
|
|
|
public function getIndex(Request $request)
|
|
|
|
{
|
|
|
|
return view('base.index', [
|
2016-01-05 06:15:23 +00:00
|
|
|
'servers' => Server::getUserServers(10),
|
2015-12-06 18:58:49 +00:00
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
2015-12-12 06:21:17 +00:00
|
|
|
/**
|
|
|
|
* Generate a random string.
|
|
|
|
*
|
|
|
|
* @param \Illuminate\Http\Request $request
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function getPassword(Request $request, $length = 16)
|
|
|
|
{
|
|
|
|
$length = ($length < 8) ? 8 : $length;
|
|
|
|
return str_random($length);
|
|
|
|
}
|
|
|
|
|
2015-12-06 18:58:49 +00:00
|
|
|
/**
|
|
|
|
* Returns TOTP Management Page.
|
|
|
|
*
|
|
|
|
* @param \Illuminate\Http\Request $request
|
|
|
|
* @return \Illuminate\Contracts\View\View
|
|
|
|
*/
|
|
|
|
public function getAccountTotp(Request $request)
|
|
|
|
{
|
|
|
|
return view('base.totp');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Generates TOTP Secret and returns popup data for user to verify
|
|
|
|
* that they can generate a valid response.
|
|
|
|
*
|
|
|
|
* @param \Illuminate\Http\Request $request
|
|
|
|
* @return \Illuminate\Contracts\View\View
|
|
|
|
*/
|
|
|
|
public function putAccountTotp(Request $request)
|
|
|
|
{
|
|
|
|
|
2015-12-14 03:22:16 +00:00
|
|
|
$user = $request->user();
|
|
|
|
|
|
|
|
$user->totp_secret = Google2FA::generateSecretKey();
|
|
|
|
$user->save();
|
2015-12-06 18:58:49 +00:00
|
|
|
|
|
|
|
return response()->json([
|
|
|
|
'qrImage' => Google2FA::getQRCodeGoogleUrl(
|
|
|
|
'Pterodactyl',
|
2015-12-14 03:22:16 +00:00
|
|
|
$user->email,
|
|
|
|
$user->totp_secret
|
2015-12-06 18:58:49 +00:00
|
|
|
),
|
2015-12-14 03:22:16 +00:00
|
|
|
'secret' => $user->totp_secret
|
2015-12-06 18:58:49 +00:00
|
|
|
]);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Verifies that 2FA token recieved is valid and will work on the account.
|
|
|
|
*
|
|
|
|
* @param \Illuminate\Http\Request $request
|
|
|
|
* @return \Illuminate\Http\Response
|
|
|
|
*/
|
|
|
|
public function postAccountTotp(Request $request)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (!$request->has('token')) {
|
2015-12-14 03:22:16 +00:00
|
|
|
return response(null, 500);
|
2015-12-06 18:58:49 +00:00
|
|
|
}
|
|
|
|
|
2015-12-14 03:22:16 +00:00
|
|
|
$user = $request->user();
|
|
|
|
if($user->toggleTotp($request->input('token'))) {
|
|
|
|
return response('true');
|
2015-12-06 18:58:49 +00:00
|
|
|
}
|
|
|
|
|
2015-12-14 03:22:16 +00:00
|
|
|
return response('false');
|
|
|
|
|
2015-12-06 18:58:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Disables TOTP on an account.
|
|
|
|
*
|
|
|
|
* @param \Illuminate\Http\Request $request
|
|
|
|
* @return \Illuminate\Http\Response
|
|
|
|
*/
|
|
|
|
public function deleteAccountTotp(Request $request)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (!$request->has('token')) {
|
|
|
|
Alert::danger('Missing required `token` field in request.')->flash();
|
|
|
|
return redirect()->route('account.totp');
|
|
|
|
}
|
|
|
|
|
2015-12-14 03:22:16 +00:00
|
|
|
$user = $request->user();
|
|
|
|
if($user->toggleTotp($request->input('token'))) {
|
2015-12-06 18:58:49 +00:00
|
|
|
return redirect()->route('account.totp');
|
|
|
|
}
|
|
|
|
|
2015-12-14 03:22:16 +00:00
|
|
|
Alert::danger('The TOTP token provided was invalid.')->flash();
|
|
|
|
return redirect()->route('account.totp');
|
|
|
|
|
2015-12-06 18:58:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Display base account information page.
|
|
|
|
*
|
|
|
|
* @param \Illuminate\Http\Request $request
|
|
|
|
* @return \Illuminate\Contracts\View\View
|
|
|
|
*/
|
|
|
|
public function getAccount(Request $request)
|
|
|
|
{
|
|
|
|
return view('base.account');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Update an account email.
|
|
|
|
*
|
|
|
|
* @param \Illuminate\Http\Request $request
|
|
|
|
* @return \Illuminate\Http\Response
|
|
|
|
*/
|
|
|
|
public function postAccountEmail(Request $request)
|
|
|
|
{
|
|
|
|
|
|
|
|
$this->validate($request, [
|
|
|
|
'new_email' => 'required|email',
|
|
|
|
'password' => 'required'
|
|
|
|
]);
|
|
|
|
|
2015-12-14 03:22:16 +00:00
|
|
|
$user = $request->user();
|
|
|
|
|
|
|
|
if (!password_verify($request->input('password'), $user->password)) {
|
2015-12-06 18:58:49 +00:00
|
|
|
Alert::danger('The password provided was not valid for this account.')->flash();
|
|
|
|
return redirect()->route('account');
|
|
|
|
}
|
|
|
|
|
2015-12-14 03:22:16 +00:00
|
|
|
$user->email = $request->input('new_email');
|
|
|
|
$user->save();
|
|
|
|
|
|
|
|
Alert::success('Your email address has successfully been updated.')->flash();
|
|
|
|
return redirect()->route('account');
|
|
|
|
|
2015-12-06 18:58:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Update an account password.
|
|
|
|
*
|
|
|
|
* @param \Illuminate\Http\Request $request
|
|
|
|
* @return \Illuminate\Http\Response
|
|
|
|
*/
|
|
|
|
public function postAccountPassword(Request $request)
|
|
|
|
{
|
|
|
|
|
|
|
|
$this->validate($request, [
|
|
|
|
'current_password' => 'required',
|
|
|
|
'new_password' => 'required|confirmed|different:current_password|regex:((?=.*\d)(?=.*[a-z])(?=.*[A-Z]).{8,})',
|
|
|
|
'new_password_confirmation' => 'required'
|
|
|
|
]);
|
|
|
|
|
2015-12-14 03:22:16 +00:00
|
|
|
$user = $request->user();
|
|
|
|
|
|
|
|
if (!password_verify($request->input('current_password'), $user->password)) {
|
2015-12-06 18:58:49 +00:00
|
|
|
Alert::danger('The password provided was not valid for this account.')->flash();
|
|
|
|
return redirect()->route('account');
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
2015-12-14 03:22:16 +00:00
|
|
|
$user->setPassword($request->input('new_password'));
|
2015-12-06 18:58:49 +00:00
|
|
|
Alert::success('Your password has successfully been updated.')->flash();
|
2015-12-14 03:22:16 +00:00
|
|
|
} catch (DisplayException $e) {
|
|
|
|
Alert::danger($e->getMessage())->flash();
|
2015-12-06 18:58:49 +00:00
|
|
|
}
|
|
|
|
|
2015-12-14 03:22:16 +00:00
|
|
|
return redirect()->route('account');
|
|
|
|
|
2015-12-06 18:58:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|