2015-12-06 19:58:49 +01:00
|
|
|
<?php
|
2016-01-20 01:10:39 +01:00
|
|
|
/**
|
2016-01-20 22:05:16 +01:00
|
|
|
* Pterodactyl - Panel
|
2017-01-24 23:57:08 +01:00
|
|
|
* Copyright (c) 2015 - 2017 Dane Everitt <dane@daneeveritt.com>.
|
2016-01-20 01:10:39 +01:00
|
|
|
*
|
2016-01-20 21:56:40 +01:00
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
|
|
* in the Software without restriction, including without limitation the rights
|
|
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
|
|
* furnished to do so, subject to the following conditions:
|
2016-01-20 01:10:39 +01:00
|
|
|
*
|
2016-01-20 21:56:40 +01:00
|
|
|
* The above copyright notice and this permission notice shall be included in all
|
|
|
|
* copies or substantial portions of the Software.
|
2016-01-20 01:10:39 +01:00
|
|
|
*
|
2016-01-20 21:56:40 +01:00
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
|
|
* SOFTWARE.
|
2016-01-20 01:10:39 +01:00
|
|
|
*/
|
2016-12-07 23:46:38 +01:00
|
|
|
|
2015-12-06 19:58:49 +01:00
|
|
|
namespace Pterodactyl\Models;
|
|
|
|
|
2015-12-14 04:22:16 +01:00
|
|
|
use Hash;
|
2015-12-06 19:58:49 +01:00
|
|
|
use Google2FA;
|
2017-06-25 02:49:09 +02:00
|
|
|
use Sofa\Eloquence\Eloquence;
|
|
|
|
use Sofa\Eloquence\Validable;
|
2015-12-06 19:58:49 +01:00
|
|
|
use Illuminate\Auth\Authenticatable;
|
|
|
|
use Illuminate\Database\Eloquent\Model;
|
2016-12-07 23:46:38 +01:00
|
|
|
use Illuminate\Notifications\Notifiable;
|
|
|
|
use Pterodactyl\Exceptions\DisplayException;
|
2017-08-12 22:29:01 +02:00
|
|
|
use Sofa\Eloquence\Contracts\CleansAttributes;
|
2015-12-06 19:58:49 +01:00
|
|
|
use Illuminate\Auth\Passwords\CanResetPassword;
|
|
|
|
use Illuminate\Foundation\Auth\Access\Authorizable;
|
2017-06-25 02:49:09 +02:00
|
|
|
use Sofa\Eloquence\Contracts\Validable as ValidableContract;
|
2015-12-06 19:58:49 +01:00
|
|
|
use Illuminate\Contracts\Auth\Authenticatable as AuthenticatableContract;
|
|
|
|
use Illuminate\Contracts\Auth\Access\Authorizable as AuthorizableContract;
|
|
|
|
use Illuminate\Contracts\Auth\CanResetPassword as CanResetPasswordContract;
|
2016-12-07 23:46:38 +01:00
|
|
|
use Pterodactyl\Notifications\SendPasswordReset as ResetPasswordNotification;
|
2015-12-06 19:58:49 +01:00
|
|
|
|
2017-08-12 22:29:01 +02:00
|
|
|
class User extends Model implements
|
|
|
|
AuthenticatableContract,
|
|
|
|
AuthorizableContract,
|
|
|
|
CanResetPasswordContract,
|
|
|
|
CleansAttributes,
|
|
|
|
ValidableContract
|
2015-12-06 19:58:49 +01:00
|
|
|
{
|
2017-06-25 02:49:09 +02:00
|
|
|
use Authenticatable, Authorizable, CanResetPassword, Eloquence, Notifiable, Validable;
|
2015-12-06 19:58:49 +01:00
|
|
|
|
2017-05-01 21:28:43 +02:00
|
|
|
/**
|
|
|
|
* Level of servers to display when using access() on a user.
|
|
|
|
*
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
protected $accessLevel = 'all';
|
|
|
|
|
2015-12-06 19:58:49 +01:00
|
|
|
/**
|
|
|
|
* The table associated with the model.
|
|
|
|
*
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
protected $table = 'users';
|
|
|
|
|
|
|
|
/**
|
2017-01-12 21:40:24 +01:00
|
|
|
* A list of mass-assignable variables.
|
2015-12-06 19:58:49 +01:00
|
|
|
*
|
2017-03-11 21:02:04 +01:00
|
|
|
* @var array
|
2015-12-06 19:58:49 +01:00
|
|
|
*/
|
2017-01-22 14:47:09 +01:00
|
|
|
protected $fillable = ['username', 'email', 'name_first', 'name_last', 'password', 'language', 'use_totp', 'totp_secret', 'gravatar', 'root_admin'];
|
2015-12-06 19:58:49 +01:00
|
|
|
|
2017-03-20 00:36:50 +01:00
|
|
|
/**
|
|
|
|
* Cast values to correct type.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $casts = [
|
2017-08-31 04:11:14 +02:00
|
|
|
'root_admin' => 'boolean',
|
|
|
|
'use_totp' => 'boolean',
|
|
|
|
'gravatar' => 'boolean',
|
2017-03-20 00:36:50 +01:00
|
|
|
];
|
2016-01-27 04:17:51 +01:00
|
|
|
|
2015-12-06 19:58:49 +01:00
|
|
|
/**
|
|
|
|
* The attributes excluded from the model's JSON form.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $hidden = ['password', 'remember_token', 'totp_secret'];
|
|
|
|
|
2017-03-15 02:18:36 +01:00
|
|
|
/**
|
|
|
|
* Parameters for search querying.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
2017-07-01 22:29:49 +02:00
|
|
|
protected $searchableColumns = [
|
2017-06-25 02:49:09 +02:00
|
|
|
'email' => 10,
|
|
|
|
'username' => 9,
|
|
|
|
'name_first' => 6,
|
|
|
|
'name_last' => 6,
|
|
|
|
'uuid' => 1,
|
|
|
|
];
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Default values for specific fields in the database.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $attributes = [
|
|
|
|
'root_admin' => false,
|
|
|
|
'language' => 'en',
|
|
|
|
'use_totp' => false,
|
|
|
|
'totp_secret' => null,
|
|
|
|
];
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Rules verifying that the data passed in forms is valid and meets application logic rules.
|
2017-08-12 22:29:01 +02:00
|
|
|
*
|
2017-06-25 02:49:09 +02:00
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected static $applicationRules = [
|
2017-08-31 04:11:14 +02:00
|
|
|
'email' => 'required',
|
|
|
|
'username' => 'required',
|
|
|
|
'name_first' => 'required',
|
|
|
|
'name_last' => 'required',
|
|
|
|
'password' => 'sometimes',
|
2017-02-19 01:31:44 +01:00
|
|
|
];
|
|
|
|
|
2017-06-25 02:49:09 +02:00
|
|
|
/**
|
|
|
|
* Rules verifying that the data being stored matches the expectations of the database.
|
|
|
|
*
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected static $dataIntegrityRules = [
|
2017-08-31 04:11:14 +02:00
|
|
|
'email' => 'email|unique:users,email',
|
|
|
|
'username' => 'alpha_dash|between:1,255|unique:users,username',
|
|
|
|
'name_first' => 'string|between:1,255',
|
|
|
|
'name_last' => 'string|between:1,255',
|
2017-06-25 02:49:09 +02:00
|
|
|
'password' => 'nullable|string',
|
|
|
|
'root_admin' => 'boolean',
|
|
|
|
'language' => 'string|between:2,5',
|
|
|
|
'use_totp' => 'boolean',
|
|
|
|
'totp_secret' => 'nullable|string',
|
|
|
|
];
|
2017-04-01 19:14:49 +02:00
|
|
|
|
2015-12-06 19:58:49 +01:00
|
|
|
/**
|
|
|
|
* Enables or disables TOTP on an account if the token is valid.
|
|
|
|
*
|
2017-08-22 05:10:48 +02:00
|
|
|
* @param int $token
|
2016-12-07 23:46:38 +01:00
|
|
|
* @return bool
|
2017-06-11 05:28:44 +02:00
|
|
|
* @deprecated
|
2015-12-06 19:58:49 +01:00
|
|
|
*/
|
2015-12-14 04:22:16 +01:00
|
|
|
public function toggleTotp($token)
|
2015-12-06 19:58:49 +01:00
|
|
|
{
|
2017-02-02 05:05:19 +01:00
|
|
|
if (! Google2FA::verifyKey($this->totp_secret, $token, 1)) {
|
2015-12-06 19:58:49 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2016-12-07 23:46:38 +01:00
|
|
|
$this->use_totp = ! $this->use_totp;
|
2017-03-20 00:52:11 +01:00
|
|
|
|
2017-03-20 00:36:50 +01:00
|
|
|
return $this->save();
|
2015-12-06 19:58:49 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set a user password to a new value assuming it meets the following requirements:
|
2016-01-13 05:49:56 +01:00
|
|
|
* - 8 or more characters in length
|
|
|
|
* - at least one uppercase character
|
|
|
|
* - at least one lowercase character
|
2016-12-07 23:46:38 +01:00
|
|
|
* - at least one number.
|
2015-12-06 19:58:49 +01:00
|
|
|
*
|
2017-08-22 05:10:48 +02:00
|
|
|
* @param string $password
|
|
|
|
* @param string $regex
|
2017-06-11 05:28:44 +02:00
|
|
|
* @throws \Pterodactyl\Exceptions\DisplayException
|
|
|
|
* @deprecated
|
2015-12-06 19:58:49 +01:00
|
|
|
*/
|
2015-12-14 04:22:16 +01:00
|
|
|
public function setPassword($password, $regex = '((?=.*\d)(?=.*[a-z])(?=.*[A-Z]).{8,})')
|
2015-12-06 19:58:49 +01:00
|
|
|
{
|
2016-12-07 23:46:38 +01:00
|
|
|
if (! preg_match($regex, $password)) {
|
2015-12-06 19:58:49 +01:00
|
|
|
throw new DisplayException('The password passed did not meet the minimum password requirements.');
|
|
|
|
}
|
|
|
|
|
2015-12-14 04:22:16 +01:00
|
|
|
$this->password = Hash::make($password);
|
|
|
|
$this->save();
|
2015-12-06 19:58:49 +01:00
|
|
|
}
|
|
|
|
|
2016-09-03 23:09:00 +02:00
|
|
|
/**
|
|
|
|
* Send the password reset notification.
|
|
|
|
*
|
2017-08-22 05:10:48 +02:00
|
|
|
* @param string $token
|
2016-09-03 23:09:00 +02:00
|
|
|
*/
|
|
|
|
public function sendPasswordResetNotification($token)
|
|
|
|
{
|
|
|
|
$this->notify(new ResetPasswordNotification($token));
|
|
|
|
}
|
2017-01-18 21:13:05 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Return true or false depending on wether the user is root admin or not.
|
|
|
|
*
|
2017-03-20 00:36:50 +01:00
|
|
|
* @return bool
|
2017-06-11 05:28:44 +02:00
|
|
|
* @deprecated
|
2017-01-18 21:13:05 +01:00
|
|
|
*/
|
2017-01-21 21:56:32 +01:00
|
|
|
public function isRootAdmin()
|
|
|
|
{
|
2017-01-18 21:13:05 +01:00
|
|
|
return $this->root_admin === 1;
|
|
|
|
}
|
2017-02-03 00:21:36 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the user's daemon secret for a given server.
|
2017-03-20 00:36:50 +01:00
|
|
|
*
|
2017-08-22 05:10:48 +02:00
|
|
|
* @param \Pterodactyl\Models\Server $server
|
2017-02-03 00:21:36 +01:00
|
|
|
* @return null|string
|
|
|
|
*/
|
|
|
|
public function daemonToken(Server $server)
|
|
|
|
{
|
|
|
|
if ($this->id === $server->owner_id || $this->isRootAdmin()) {
|
|
|
|
return $server->daemonSecret;
|
|
|
|
}
|
|
|
|
|
2017-04-15 18:48:47 +02:00
|
|
|
$subuser = $this->subuserOf->where('server_id', $server->id)->first();
|
2017-02-03 00:21:36 +01:00
|
|
|
|
2017-04-15 18:48:47 +02:00
|
|
|
return ($subuser) ? $subuser->daemonSecret : null;
|
2017-02-03 00:21:36 +01:00
|
|
|
}
|
2017-02-06 01:19:46 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns an array of all servers a user is able to access.
|
|
|
|
* Note: does not account for user admin status.
|
|
|
|
*
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function serverAccessArray()
|
|
|
|
{
|
2017-04-15 18:48:47 +02:00
|
|
|
return Server::select('id')->where('owner_id', $this->id)->union(
|
|
|
|
Subuser::select('server_id')->where('user_id', $this->id)
|
|
|
|
)->pluck('id')->all();
|
2017-02-06 01:19:46 +01:00
|
|
|
}
|
|
|
|
|
2017-05-01 21:28:43 +02:00
|
|
|
/**
|
|
|
|
* Change the access level for a given call to `access()` on the user.
|
|
|
|
*
|
2017-08-22 05:10:48 +02:00
|
|
|
* @param string $level can be all, admin, subuser, owner
|
2017-06-25 02:49:09 +02:00
|
|
|
* @return $this
|
2017-05-01 21:28:43 +02:00
|
|
|
*/
|
|
|
|
public function setAccessLevel($level = 'all')
|
|
|
|
{
|
|
|
|
if (! in_array($level, ['all', 'admin', 'subuser', 'owner'])) {
|
|
|
|
$level = 'all';
|
|
|
|
}
|
|
|
|
$this->accessLevel = $level;
|
|
|
|
|
|
|
|
return $this;
|
|
|
|
}
|
|
|
|
|
2017-02-06 01:19:46 +01:00
|
|
|
/**
|
|
|
|
* Returns an array of all servers a user is able to access.
|
|
|
|
* Note: does not account for user admin status.
|
|
|
|
*
|
2017-08-22 05:10:48 +02:00
|
|
|
* @param array $load
|
2017-06-25 02:49:09 +02:00
|
|
|
* @return \Pterodactyl\Models\Server
|
2017-02-06 01:19:46 +01:00
|
|
|
*/
|
2017-04-01 19:14:49 +02:00
|
|
|
public function access(...$load)
|
2017-02-06 01:19:46 +01:00
|
|
|
{
|
2017-04-01 19:14:49 +02:00
|
|
|
if (count($load) > 0 && is_null($load[0])) {
|
|
|
|
$query = Server::query();
|
|
|
|
} else {
|
|
|
|
$query = Server::with(! empty($load) ? $load : ['service', 'node', 'allocation']);
|
|
|
|
}
|
|
|
|
|
2017-05-01 21:28:43 +02:00
|
|
|
// If access level is set to owner, only display servers
|
|
|
|
// that the user owns.
|
|
|
|
if ($this->accessLevel === 'owner') {
|
|
|
|
$query->where('owner_id', $this->id);
|
|
|
|
}
|
|
|
|
|
|
|
|
// If set to all, display all servers they can access, including
|
|
|
|
// those they access as an admin.
|
|
|
|
//
|
|
|
|
// If set to subuser, only return the servers they can access because
|
|
|
|
// they are owner, or marked as a subuser of the server.
|
|
|
|
if (($this->accessLevel === 'all' && ! $this->isRootAdmin()) || $this->accessLevel === 'subuser') {
|
2017-02-06 01:19:46 +01:00
|
|
|
$query->whereIn('id', $this->serverAccessArray());
|
|
|
|
}
|
|
|
|
|
2017-05-01 21:28:43 +02:00
|
|
|
// If set to admin, only display the servers a user can access
|
|
|
|
// as an administrator (leaves out owned and subuser of).
|
|
|
|
if ($this->accessLevel === 'admin' && $this->isRootAdmin()) {
|
|
|
|
$query->whereNotIn('id', $this->serverAccessArray());
|
|
|
|
}
|
|
|
|
|
2017-04-01 19:14:49 +02:00
|
|
|
return $query;
|
2017-02-06 01:19:46 +01:00
|
|
|
}
|
2017-02-09 23:43:54 +01:00
|
|
|
|
2017-06-11 05:28:44 +02:00
|
|
|
/**
|
|
|
|
* Store the username as a lowecase string.
|
|
|
|
*
|
2017-08-22 05:10:48 +02:00
|
|
|
* @param string $value
|
2017-06-11 05:28:44 +02:00
|
|
|
*/
|
|
|
|
public function setUsernameAttribute($value)
|
|
|
|
{
|
|
|
|
$this->attributes['username'] = strtolower($value);
|
|
|
|
}
|
|
|
|
|
2017-02-09 23:43:54 +01:00
|
|
|
/**
|
|
|
|
* Returns all permissions that a user has.
|
|
|
|
*
|
2017-02-10 00:44:07 +01:00
|
|
|
* @return \Illuminate\Database\Eloquent\Relations\HasManyThrough
|
2017-02-09 23:43:54 +01:00
|
|
|
*/
|
|
|
|
public function permissions()
|
|
|
|
{
|
2017-02-10 00:44:07 +01:00
|
|
|
return $this->hasManyThrough(Permission::class, Subuser::class);
|
2017-02-09 23:43:54 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns all servers that a user owns.
|
|
|
|
*
|
|
|
|
* @return \Illuminate\Database\Eloquent\Relations\HasMany
|
|
|
|
*/
|
|
|
|
public function servers()
|
|
|
|
{
|
|
|
|
return $this->hasMany(Server::class, 'owner_id');
|
|
|
|
}
|
2017-04-14 05:49:47 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Return all servers that user is listed as a subuser of directly.
|
|
|
|
*
|
|
|
|
* @return \Illuminate\Database\Eloquent\Relations\HasMany
|
|
|
|
*/
|
|
|
|
public function subuserOf()
|
|
|
|
{
|
|
|
|
return $this->hasMany(Subuser::class);
|
|
|
|
}
|
2015-12-06 19:58:49 +01:00
|
|
|
}
|