Improve API auth to rate limit requests and verify they are root_admin
This commit is contained in:
parent
2def94c958
commit
72acf06353
1 changed files with 70 additions and 10 deletions
|
@ -3,11 +3,19 @@
|
||||||
namespace Pterodactyl\Http\Controllers\API;
|
namespace Pterodactyl\Http\Controllers\API;
|
||||||
|
|
||||||
use JWTAuth;
|
use JWTAuth;
|
||||||
|
use Hash;
|
||||||
|
use Validator;
|
||||||
|
|
||||||
use Tymon\JWTAuth\Exceptions\JWTException;
|
use Tymon\JWTAuth\Exceptions\JWTException;
|
||||||
|
|
||||||
|
use Dingo\Api\Exception\StoreResourceFailedException;
|
||||||
|
use Symfony\Component\HttpKernel\Exception\UnauthorizedHttpException;
|
||||||
|
use Symfony\Component\HttpKernel\Exception\ServiceUnavailableHttpException;
|
||||||
|
use Symfony\Component\HttpKernel\Exception\TooManyRequestsHttpException;
|
||||||
|
|
||||||
use Illuminate\Http\Request;
|
use Illuminate\Http\Request;
|
||||||
use \Symfony\Component\HttpKernel\Exception\UnauthorizedHttpException;
|
use Illuminate\Foundation\Auth\ThrottlesLogins;
|
||||||
use \Symfony\Component\HttpKernel\Exception\ServiceUnavailableHttpException;
|
use Illuminate\Foundation\Auth\AuthenticatesAndRegistersUsers;
|
||||||
|
|
||||||
use Pterodactyl\Transformers\UserTransformer;
|
use Pterodactyl\Transformers\UserTransformer;
|
||||||
use Pterodactyl\Models;
|
use Pterodactyl\Models;
|
||||||
|
@ -18,6 +26,32 @@ use Pterodactyl\Models;
|
||||||
class AuthController extends BaseController
|
class AuthController extends BaseController
|
||||||
{
|
{
|
||||||
|
|
||||||
|
use AuthenticatesAndRegistersUsers, ThrottlesLogins;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Lockout time for failed login requests.
|
||||||
|
*
|
||||||
|
* @var integer
|
||||||
|
*/
|
||||||
|
protected $lockoutTime = 120;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* After how many attempts should logins be throttled and locked.
|
||||||
|
*
|
||||||
|
* @var integer
|
||||||
|
*/
|
||||||
|
protected $maxLoginAttempts = 3;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Create a new authentication controller instance.
|
||||||
|
*
|
||||||
|
* @return void
|
||||||
|
*/
|
||||||
|
public function __construct()
|
||||||
|
{
|
||||||
|
//
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Authenticate
|
* Authenticate
|
||||||
*
|
*
|
||||||
|
@ -29,16 +63,42 @@ class AuthController extends BaseController
|
||||||
* @Response(200, body={"token": "<jwt-token>"})
|
* @Response(200, body={"token": "<jwt-token>"})
|
||||||
*/
|
*/
|
||||||
public function postLogin(Request $request) {
|
public function postLogin(Request $request) {
|
||||||
$credentials = $request->only('email', 'password');
|
|
||||||
|
$validator = Validator::make($request->only(['email', 'password']), [
|
||||||
|
'email' => 'required|email',
|
||||||
|
'password' => 'required|min:8'
|
||||||
|
]);
|
||||||
|
|
||||||
|
if ($validator->fails()) {
|
||||||
|
throw new StoreResourceFailedException('Required authentication fields were invalid.', $validator->errors());
|
||||||
|
}
|
||||||
|
|
||||||
|
$throttled = $this->isUsingThrottlesLoginsTrait();
|
||||||
|
if ($throttled && $this->hasTooManyLoginAttempts($request)) {
|
||||||
|
throw new TooManyRequestsHttpException('You have been login throttled for 120 seconds.');
|
||||||
|
}
|
||||||
|
|
||||||
|
// Is the email & password valid?
|
||||||
|
$user = Models\User::where('email', $request->input('email'))->first();
|
||||||
|
if (!$user || !Hash::check($request->input('password'), $user->password)) {
|
||||||
|
if ($throttled) {
|
||||||
|
$this->incrementLoginAttempts($request);
|
||||||
|
}
|
||||||
|
throw new UnauthorizedHttpException('A user by those credentials was not found.');
|
||||||
|
}
|
||||||
|
|
||||||
|
// @TODO: validate TOTP if enabled on account?
|
||||||
|
// Perhaps this could be implemented in such a way that they login to their
|
||||||
|
// account and generate a one time password that can be used? Would be a pain in
|
||||||
|
// the butt for multiple API requests though. Maybe just included a 'totp' field
|
||||||
|
// that can include the token for that timestamp. Would allow for programtic
|
||||||
|
// generation of the code and API requests.
|
||||||
|
if ($user->root_admin !== 1) {
|
||||||
|
throw new UnauthorizedHttpException('This account does not have permission to interface this API.');
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
$token = JWTAuth::attempt($credentials, [
|
$token = JWTAuth::fromUser($user);
|
||||||
'permissions' => [
|
|
||||||
'view_users' => true,
|
|
||||||
'edit_users' => true,
|
|
||||||
'delete_users' => false,
|
|
||||||
]
|
|
||||||
]);
|
|
||||||
if (!$token) {
|
if (!$token) {
|
||||||
throw new UnauthorizedHttpException('');
|
throw new UnauthorizedHttpException('');
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue