2020-06-27 19:04:41 +00:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace Pterodactyl\Tests\Integration\Api\Client\Server;
|
|
|
|
|
|
|
|
use Mockery;
|
|
|
|
use GuzzleHttp\Psr7\Request;
|
|
|
|
use Illuminate\Http\Response;
|
|
|
|
use Pterodactyl\Models\Permission;
|
|
|
|
use GuzzleHttp\Exception\BadResponseException;
|
|
|
|
use GuzzleHttp\Psr7\Response as GuzzleResponse;
|
|
|
|
use Pterodactyl\Repositories\Wings\DaemonCommandRepository;
|
2020-07-26 17:55:30 +00:00
|
|
|
use Pterodactyl\Exceptions\Http\Connection\DaemonConnectionException;
|
2020-06-27 19:04:41 +00:00
|
|
|
use Pterodactyl\Tests\Integration\Api\Client\ClientApiIntegrationTestCase;
|
|
|
|
|
|
|
|
class CommandControllerTest extends ClientApiIntegrationTestCase
|
|
|
|
{
|
|
|
|
/** @var \Mockery\MockInterface */
|
|
|
|
private $repository;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Setup tests.
|
|
|
|
*/
|
|
|
|
public function setUp(): void
|
|
|
|
{
|
|
|
|
parent::setUp();
|
|
|
|
|
|
|
|
$this->repository = Mockery::mock(DaemonCommandRepository::class);
|
|
|
|
$this->app->instance(DaemonCommandRepository::class, $this->repository);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test that a validation error is returned if there is no command present in the
|
|
|
|
* request.
|
|
|
|
*/
|
|
|
|
public function testValidationErrorIsReturnedIfNoCommandIsPresent()
|
|
|
|
{
|
|
|
|
[$user, $server] = $this->generateTestAccount();
|
|
|
|
|
|
|
|
$response = $this->actingAs($user)->postJson("/api/client/servers/{$server->uuid}/command", [
|
|
|
|
'command' => '',
|
|
|
|
]);
|
|
|
|
|
|
|
|
$response->assertStatus(Response::HTTP_UNPROCESSABLE_ENTITY);
|
|
|
|
$response->assertJsonPath('errors.0.code', 'required');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test that a subuser without the required permission receives an error when trying to
|
|
|
|
* execute the command.
|
|
|
|
*/
|
|
|
|
public function testSubuserWithoutPermissionReceivesError()
|
|
|
|
{
|
|
|
|
[$user, $server] = $this->generateTestAccount([Permission::ACTION_WEBSOCKET_CONNECT]);
|
|
|
|
|
|
|
|
$response = $this->actingAs($user)->postJson("/api/client/servers/{$server->uuid}/command", [
|
|
|
|
'command' => 'say Test',
|
|
|
|
]);
|
|
|
|
|
|
|
|
$response->assertStatus(Response::HTTP_FORBIDDEN);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test that a command can be sent to the server.
|
|
|
|
*/
|
|
|
|
public function testCommandCanSendToServer()
|
|
|
|
{
|
|
|
|
[$user, $server] = $this->generateTestAccount([Permission::ACTION_CONTROL_CONSOLE]);
|
|
|
|
|
|
|
|
$this->repository->expects('setServer')->with(Mockery::on(function ($value) use ($server) {
|
|
|
|
return $value->uuid === $server->uuid;
|
|
|
|
}))->andReturnSelf();
|
|
|
|
$this->repository->expects('send')->with('say Test')->andReturn(new GuzzleResponse);
|
|
|
|
|
|
|
|
$response = $this->actingAs($user)->postJson("/api/client/servers/{$server->uuid}/command", [
|
|
|
|
'command' => 'say Test',
|
|
|
|
]);
|
|
|
|
|
|
|
|
$response->assertStatus(Response::HTTP_NO_CONTENT);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Test that an error is returned when the server is offline that is more specific than the
|
|
|
|
* regular daemon connection error.
|
|
|
|
*/
|
|
|
|
public function testErrorIsReturnedWhenServerIsOffline()
|
|
|
|
{
|
|
|
|
[$user, $server] = $this->generateTestAccount();
|
|
|
|
|
|
|
|
$this->repository->expects('setServer->send')->andThrows(
|
2020-07-26 17:55:30 +00:00
|
|
|
new DaemonConnectionException(
|
|
|
|
new BadResponseException('', new Request('GET', 'test'), new GuzzleResponse(Response::HTTP_BAD_GATEWAY))
|
|
|
|
)
|
2020-06-27 19:04:41 +00:00
|
|
|
);
|
|
|
|
|
|
|
|
$response = $this->actingAs($user)->postJson("/api/client/servers/{$server->uuid}/command", [
|
|
|
|
'command' => 'say Test',
|
|
|
|
]);
|
|
|
|
|
|
|
|
$response->assertStatus(Response::HTTP_BAD_GATEWAY);
|
|
|
|
$response->assertJsonPath('errors.0.code', 'HttpException');
|
|
|
|
$response->assertJsonPath('errors.0.detail', 'Server must be online in order to send commands.');
|
|
|
|
}
|
|
|
|
}
|