mirror of
https://gitlab.com/crafty-controller/crafty-4.git
synced 2024-08-30 18:23:09 +00:00
e0ce1d118c
Fix uploads, Only send server stats to user page when they have access to servers
557 lines
25 KiB
Python
557 lines
25 KiB
Python
import os
|
|
import shutil
|
|
import html
|
|
import re
|
|
import logging
|
|
import tornado.web
|
|
import tornado.escape
|
|
import bleach
|
|
|
|
from app.classes.shared.console import console
|
|
from app.classes.shared.helpers import helper
|
|
from app.classes.shared.server import ServerOutBuf
|
|
|
|
from app.classes.web.base_handler import BaseHandler
|
|
from app.classes.models.server_permissions import Enum_Permissions_Server
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
class AjaxHandler(BaseHandler):
|
|
|
|
def render_page(self, template, page_data):
|
|
self.render(
|
|
template,
|
|
data=page_data,
|
|
translate=self.translator.translate,
|
|
)
|
|
|
|
@tornado.web.authenticated
|
|
def get(self, page):
|
|
_, _, exec_user = self.current_user
|
|
error = bleach.clean(self.get_argument('error', "WTF Error!"))
|
|
|
|
template = "panel/denied.html"
|
|
|
|
page_data = {
|
|
'user_data': exec_user,
|
|
'error': error
|
|
}
|
|
|
|
if page == "error":
|
|
template = "public/error.html"
|
|
self.render_page(template, page_data)
|
|
|
|
elif page == 'server_log':
|
|
server_id = self.get_argument('id', None)
|
|
full_log = self.get_argument('full', False)
|
|
|
|
if server_id is None:
|
|
logger.warning("Server ID not found in server_log ajax call")
|
|
self.redirect("/panel/error?error=Server ID Not Found")
|
|
return
|
|
|
|
server_id = bleach.clean(server_id)
|
|
|
|
server_data = self.controller.servers.get_server_data_by_id(server_id)
|
|
if not server_data:
|
|
logger.warning("Server Data not found in server_log ajax call")
|
|
self.redirect("/panel/error?error=Server ID Not Found")
|
|
return
|
|
|
|
if not server_data['log_path']:
|
|
logger.warning(f"Log path not found in server_log ajax call ({server_id})")
|
|
|
|
if full_log:
|
|
log_lines = helper.get_setting('max_log_lines')
|
|
data = helper.tail_file(helper.get_os_understandable_path(server_data['log_path']), log_lines)
|
|
else:
|
|
data = ServerOutBuf.lines.get(server_id, [])
|
|
|
|
|
|
for d in data:
|
|
try:
|
|
d = re.sub('(\033\\[(0;)?[0-9]*[A-z]?(;[0-9])?m?)|(> )', '', d)
|
|
d = re.sub('[A-z]{2}\b\b', '', d)
|
|
line = helper.log_colors(html.escape(d))
|
|
self.write(f'{line}<br />')
|
|
# self.write(d.encode("utf-8"))
|
|
|
|
except Exception as e:
|
|
logger.warning(f"Skipping Log Line due to error: {e}")
|
|
|
|
elif page == "announcements":
|
|
data = helper.get_announcements()
|
|
page_data['notify_data'] = data
|
|
self.render_page('ajax/notify.html', page_data)
|
|
|
|
elif page == "get_file":
|
|
file_path = helper.get_os_understandable_path(self.get_argument('file_path', None))
|
|
server_id = self.get_argument('id', None)
|
|
|
|
if not self.check_server_id(server_id, 'get_file'):
|
|
return
|
|
else:
|
|
server_id = bleach.clean(server_id)
|
|
|
|
if not helper.in_path(helper.get_os_understandable_path(self.controller.servers.get_server_data_by_id(server_id)['path']), file_path)\
|
|
or not helper.check_file_exists(os.path.abspath(file_path)):
|
|
logger.warning(f"Invalid path in get_file ajax call ({file_path})")
|
|
console.warning(f"Invalid path in get_file ajax call ({file_path})")
|
|
return
|
|
|
|
|
|
error = None
|
|
|
|
try:
|
|
with open(file_path, encoding='utf-8') as file:
|
|
file_contents = file.read()
|
|
except UnicodeDecodeError:
|
|
file_contents = ''
|
|
error = 'UnicodeDecodeError'
|
|
|
|
self.write({
|
|
'content': file_contents,
|
|
'error': error
|
|
})
|
|
self.finish()
|
|
|
|
elif page == "get_tree":
|
|
server_id = self.get_argument('id', None)
|
|
path = self.get_argument('path', None)
|
|
|
|
if not self.check_server_id(server_id, 'get_tree'):
|
|
return
|
|
else:
|
|
server_id = bleach.clean(server_id)
|
|
|
|
if helper.validate_traversal(self.controller.servers.get_server_data_by_id(server_id)['path'], path):
|
|
self.write(helper.get_os_understandable_path(path) + '\n' +
|
|
helper.generate_tree(path))
|
|
self.finish()
|
|
|
|
elif page == "get_zip_tree":
|
|
server_id = self.get_argument('id', None)
|
|
path = self.get_argument('path', None)
|
|
|
|
self.write(helper.get_os_understandable_path(path) + '\n' +
|
|
helper.generate_zip_tree(path))
|
|
self.finish()
|
|
|
|
elif page == "get_zip_dir":
|
|
server_id = self.get_argument('id', None)
|
|
path = self.get_argument('path', None)
|
|
|
|
self.write(helper.get_os_understandable_path(path) + '\n' +
|
|
helper.generate_zip_dir(path))
|
|
self.finish()
|
|
|
|
elif page == "get_dir":
|
|
server_id = self.get_argument('id', None)
|
|
path = self.get_argument('path', None)
|
|
|
|
if not self.check_server_id(server_id, 'get_tree'):
|
|
return
|
|
else:
|
|
server_id = bleach.clean(server_id)
|
|
|
|
if helper.validate_traversal(self.controller.servers.get_server_data_by_id(server_id)['path'], path):
|
|
self.write(helper.get_os_understandable_path(path) + '\n' +
|
|
helper.generate_dir(path))
|
|
self.finish()
|
|
|
|
@tornado.web.authenticated
|
|
def post(self, page):
|
|
api_key, _, exec_user = self.current_user
|
|
superuser = exec_user['superuser']
|
|
if api_key is not None:
|
|
superuser = superuser and api_key.superuser
|
|
|
|
server_id = self.get_argument('id', None)
|
|
|
|
permissions = {
|
|
'Commands': Enum_Permissions_Server.Commands,
|
|
'Terminal': Enum_Permissions_Server.Terminal,
|
|
'Logs': Enum_Permissions_Server.Logs,
|
|
'Schedule': Enum_Permissions_Server.Schedule,
|
|
'Backup': Enum_Permissions_Server.Backup,
|
|
'Files': Enum_Permissions_Server.Files,
|
|
'Config': Enum_Permissions_Server.Config,
|
|
'Players': Enum_Permissions_Server.Players,
|
|
}
|
|
user_perms = self.controller.server_perms.get_user_id_permissions_list(exec_user['user_id'], server_id)
|
|
|
|
if page == "send_command":
|
|
command = self.get_body_argument('command', default=None, strip=True)
|
|
server_id = self.get_argument('id', None)
|
|
|
|
if server_id is None:
|
|
logger.warning("Server ID not found in send_command ajax call")
|
|
console.warning("Server ID not found in send_command ajax call")
|
|
|
|
srv_obj = self.controller.get_server_obj(server_id)
|
|
|
|
if command == srv_obj.settings['stop_command']:
|
|
logger.info("Stop command detected as terminal input - intercepting." +
|
|
f"Starting Crafty's stop process for server with id: {server_id}")
|
|
self.controller.management.send_command(exec_user['user_id'], server_id, self.get_remote_ip(), 'stop_server')
|
|
command = None
|
|
elif command == 'restart':
|
|
logger.info("Restart command detected as terminal input - intercepting." +
|
|
f"Starting Crafty's stop process for server with id: {server_id}")
|
|
self.controller.management.send_command(exec_user['user_id'], server_id, self.get_remote_ip(), 'restart_server')
|
|
command = None
|
|
if command:
|
|
if srv_obj.check_running():
|
|
srv_obj.send_command(command)
|
|
|
|
self.controller.management.add_to_audit_log(exec_user['user_id'],
|
|
f"Sent command to {self.controller.servers.get_server_friendly_name(server_id)} terminal: {command}",
|
|
server_id,
|
|
self.get_remote_ip())
|
|
|
|
elif page == "create_file":
|
|
if not permissions['Files'] in user_perms:
|
|
if not superuser:
|
|
self.redirect("/panel/error?error=Unauthorized access to Files")
|
|
return
|
|
file_parent = helper.get_os_understandable_path(self.get_body_argument('file_parent', default=None, strip=True))
|
|
file_name = self.get_body_argument('file_name', default=None, strip=True)
|
|
file_path = os.path.join(file_parent, file_name)
|
|
server_id = self.get_argument('id', None)
|
|
|
|
if not self.check_server_id(server_id, 'create_file'):
|
|
return
|
|
else:
|
|
server_id = bleach.clean(server_id)
|
|
|
|
if not helper.in_path(helper.get_os_understandable_path(self.controller.servers.get_server_data_by_id(server_id)['path']), file_path) \
|
|
or helper.check_file_exists(os.path.abspath(file_path)):
|
|
logger.warning(f"Invalid path in create_file ajax call ({file_path})")
|
|
console.warning(f"Invalid path in create_file ajax call ({file_path})")
|
|
return
|
|
|
|
# Create the file by opening it
|
|
with open(file_path, 'w', encoding='utf-8') as file_object:
|
|
file_object.close()
|
|
|
|
elif page == "create_dir":
|
|
if not permissions['Files'] in user_perms:
|
|
if not superuser:
|
|
self.redirect("/panel/error?error=Unauthorized access to Files")
|
|
return
|
|
dir_parent = helper.get_os_understandable_path(self.get_body_argument('dir_parent', default=None, strip=True))
|
|
dir_name = self.get_body_argument('dir_name', default=None, strip=True)
|
|
dir_path = os.path.join(dir_parent, dir_name)
|
|
server_id = self.get_argument('id', None)
|
|
|
|
if not self.check_server_id(server_id, 'create_dir'):
|
|
return
|
|
else:
|
|
server_id = bleach.clean(server_id)
|
|
|
|
if not helper.in_path(helper.get_os_understandable_path(self.controller.servers.get_server_data_by_id(server_id)['path']), dir_path) \
|
|
or helper.check_path_exists(os.path.abspath(dir_path)):
|
|
logger.warning(f"Invalid path in create_dir ajax call ({dir_path})")
|
|
console.warning(f"Invalid path in create_dir ajax call ({dir_path})")
|
|
return
|
|
# Create the directory
|
|
os.mkdir(dir_path)
|
|
|
|
elif page == "unzip_file":
|
|
if not permissions['Files'] in user_perms:
|
|
if not superuser:
|
|
self.redirect("/panel/error?error=Unauthorized access to Files")
|
|
return
|
|
server_id = self.get_argument('id', None)
|
|
path = helper.get_os_understandable_path(self.get_argument('path', None))
|
|
helper.unzipFile(path)
|
|
self.redirect(f"/panel/server_detail?id={server_id}&subpage=files")
|
|
return
|
|
|
|
elif page == "kill":
|
|
if not permissions['Commands'] in user_perms:
|
|
if not superuser:
|
|
self.redirect("/panel/error?error=Unauthorized access to Commands")
|
|
return
|
|
server_id = self.get_argument('id', None)
|
|
svr = self.controller.get_server_obj(server_id)
|
|
try:
|
|
svr.kill()
|
|
except Exception as e:
|
|
logger.error(f"Could not find PID for requested termsig. Full error: {e}")
|
|
return
|
|
elif page == "eula":
|
|
server_id = self.get_argument('id', None)
|
|
svr = self.controller.get_server_obj(server_id)
|
|
svr.agree_eula(exec_user['user_id'])
|
|
|
|
elif page == "restore_backup":
|
|
if not permissions['Backup'] in user_perms:
|
|
if not superuser:
|
|
self.redirect("/panel/error?error=Unauthorized access to Backups")
|
|
return
|
|
server_id = bleach.clean(self.get_argument('id', None))
|
|
zip_name = bleach.clean(self.get_argument('zip_file', None))
|
|
svr_obj = self.controller.servers.get_server_obj(server_id)
|
|
server_data = self.controller.servers.get_server_data_by_id(server_id)
|
|
backup_path = svr_obj.backup_path
|
|
if helper.validate_traversal(backup_path, zip_name):
|
|
tempDir = helper.unzip_backup_archive(backup_path, zip_name)
|
|
new_server = self.controller.import_zip_server(svr_obj.server_name,
|
|
tempDir,
|
|
server_data['executable'],
|
|
'1', '2',
|
|
server_data['server_port'])
|
|
new_server_id = new_server
|
|
new_server = self.controller.get_server_data(new_server)
|
|
self.controller.rename_backup_dir(server_id, new_server_id, new_server['server_uuid'])
|
|
self.controller.remove_server(server_id, True)
|
|
self.redirect('/panel/dashboard')
|
|
|
|
elif page == "unzip_server":
|
|
path = self.get_argument('path', None)
|
|
helper.unzipServer(path, exec_user['user_id'])
|
|
return
|
|
|
|
|
|
@tornado.web.authenticated
|
|
def delete(self, page):
|
|
api_key, _, exec_user = self.current_user
|
|
superuser = exec_user['superuser']
|
|
if api_key is not None:
|
|
superuser = superuser and api_key.superuser
|
|
|
|
server_id = self.get_argument('id', None)
|
|
|
|
|
|
|
|
permissions = {
|
|
'Commands': Enum_Permissions_Server.Commands,
|
|
'Terminal': Enum_Permissions_Server.Terminal,
|
|
'Logs': Enum_Permissions_Server.Logs,
|
|
'Schedule': Enum_Permissions_Server.Schedule,
|
|
'Backup': Enum_Permissions_Server.Backup,
|
|
'Files': Enum_Permissions_Server.Files,
|
|
'Config': Enum_Permissions_Server.Config,
|
|
'Players': Enum_Permissions_Server.Players,
|
|
}
|
|
user_perms = self.controller.server_perms.get_user_id_permissions_list(exec_user['user_id'], server_id)
|
|
if page == "del_file":
|
|
if not permissions['Files'] in user_perms:
|
|
if not superuser:
|
|
self.redirect("/panel/error?error=Unauthorized access to Files")
|
|
return
|
|
file_path = helper.get_os_understandable_path(self.get_body_argument('file_path', default=None, strip=True))
|
|
server_id = self.get_argument('id', None)
|
|
|
|
console.warning(f"Delete {file_path} for server {server_id}")
|
|
|
|
if not self.check_server_id(server_id, 'del_file'):
|
|
return
|
|
else: server_id = bleach.clean(server_id)
|
|
|
|
server_info = self.controller.servers.get_server_data_by_id(server_id)
|
|
if not (helper.in_path(helper.get_os_understandable_path(server_info['path']), file_path) \
|
|
or helper.in_path(helper.get_os_understandable_path(server_info['backup_path']), file_path)) \
|
|
or not helper.check_file_exists(os.path.abspath(file_path)):
|
|
logger.warning(f"Invalid path in del_file ajax call ({file_path})")
|
|
console.warning(f"Invalid path in del_file ajax call ({file_path})")
|
|
return
|
|
|
|
# Delete the file
|
|
os.remove(file_path)
|
|
|
|
if page == "del_task":
|
|
if not permissions['Schedule'] in user_perms:
|
|
self.redirect("/panel/error?error=Unauthorized access to Tasks")
|
|
else:
|
|
sch_id = self.get_argument('schedule_id', '-404')
|
|
self.tasks_manager.remove_job(sch_id)
|
|
|
|
if page == "del_backup":
|
|
if not permissions['Backup'] in user_perms:
|
|
if not superuser:
|
|
self.redirect("/panel/error?error=Unauthorized access to Backups")
|
|
return
|
|
file_path = helper.get_os_understandable_path(self.get_body_argument('file_path', default=None, strip=True))
|
|
server_id = self.get_argument('id', None)
|
|
|
|
console.warning(f"Delete {file_path} for server {server_id}")
|
|
|
|
if not self.check_server_id(server_id, 'del_file'):
|
|
return
|
|
else: server_id = bleach.clean(server_id)
|
|
|
|
server_info = self.controller.servers.get_server_data_by_id(server_id)
|
|
if not (helper.in_path(helper.get_os_understandable_path(server_info['path']), file_path) \
|
|
or helper.in_path(helper.get_os_understandable_path(server_info['backup_path']), file_path)) \
|
|
or not helper.check_file_exists(os.path.abspath(file_path)):
|
|
logger.warning(f"Invalid path in del_file ajax call ({file_path})")
|
|
console.warning(f"Invalid path in del_file ajax call ({file_path})")
|
|
return
|
|
|
|
# Delete the file
|
|
if helper.validate_traversal(helper.get_os_understandable_path(server_info['backup_path']), file_path):
|
|
os.remove(file_path)
|
|
|
|
elif page == "del_dir":
|
|
if not permissions['Files'] in user_perms:
|
|
if not superuser:
|
|
self.redirect("/panel/error?error=Unauthorized access to Files")
|
|
return
|
|
dir_path = helper.get_os_understandable_path(self.get_body_argument('dir_path', default=None, strip=True))
|
|
server_id = self.get_argument('id', None)
|
|
|
|
console.warning(f"Delete {dir_path} for server {server_id}")
|
|
|
|
if not self.check_server_id(server_id, 'del_dir'):
|
|
return
|
|
else:
|
|
server_id = bleach.clean(server_id)
|
|
|
|
server_info = self.controller.servers.get_server_data_by_id(server_id)
|
|
if not helper.in_path(helper.get_os_understandable_path(server_info['path']), dir_path) \
|
|
or not helper.check_path_exists(os.path.abspath(dir_path)):
|
|
logger.warning(f"Invalid path in del_file ajax call ({dir_path})")
|
|
console.warning(f"Invalid path in del_file ajax call ({dir_path})")
|
|
return
|
|
|
|
# Delete the directory
|
|
# os.rmdir(dir_path) # Would only remove empty directories
|
|
if helper.validate_traversal(helper.get_os_understandable_path(server_info['path']), dir_path):
|
|
shutil.rmtree(dir_path) # Removes also when there are contents
|
|
|
|
elif page == "delete_server":
|
|
if not permissions['Config'] in user_perms:
|
|
if not superuser:
|
|
self.redirect("/panel/error?error=Unauthorized access to Config")
|
|
return
|
|
server_id = self.get_argument('id', None)
|
|
logger.info(f"Removing server from panel for server: {self.controller.servers.get_server_friendly_name(server_id)}")
|
|
|
|
server_data = self.controller.get_server_data(server_id)
|
|
server_name = server_data['server_name']
|
|
|
|
self.controller.management.add_to_audit_log(exec_user['user_id'],
|
|
f"Deleted server {server_id} named {server_name}",
|
|
server_id,
|
|
self.get_remote_ip())
|
|
|
|
self.tasks_manager.remove_all_server_tasks(server_id)
|
|
self.controller.remove_server(server_id, False)
|
|
|
|
elif page == "delete_server_files":
|
|
if not permissions['Config'] in user_perms:
|
|
if not superuser:
|
|
self.redirect("/panel/error?error=Unauthorized access to Config")
|
|
return
|
|
server_id = self.get_argument('id', None)
|
|
logger.info(f"Removing server and all associated files for server: {self.controller.servers.get_server_friendly_name(server_id)}")
|
|
|
|
server_data = self.controller.get_server_data(server_id)
|
|
server_name = server_data['server_name']
|
|
|
|
self.controller.management.add_to_audit_log(exec_user['user_id'],
|
|
f"Deleted server {server_id} named {server_name}",
|
|
server_id,
|
|
self.get_remote_ip())
|
|
|
|
self.tasks_manager.remove_all_server_tasks(server_id)
|
|
self.controller.remove_server(server_id, True)
|
|
|
|
@tornado.web.authenticated
|
|
def put(self, page):
|
|
api_key, _, exec_user = self.current_user
|
|
superuser = exec_user['superuser']
|
|
if api_key is not None:
|
|
superuser = superuser and api_key.superuser
|
|
|
|
server_id = self.get_argument('id', None)
|
|
permissions = {
|
|
'Commands': Enum_Permissions_Server.Commands,
|
|
'Terminal': Enum_Permissions_Server.Terminal,
|
|
'Logs': Enum_Permissions_Server.Logs,
|
|
'Schedule': Enum_Permissions_Server.Schedule,
|
|
'Backup': Enum_Permissions_Server.Backup,
|
|
'Files': Enum_Permissions_Server.Files,
|
|
'Config': Enum_Permissions_Server.Config,
|
|
'Players': Enum_Permissions_Server.Players,
|
|
}
|
|
user_perms = self.controller.server_perms.get_user_id_permissions_list(exec_user['user_id'], server_id)
|
|
if page == "save_file":
|
|
if not permissions['Files'] in user_perms:
|
|
if not superuser:
|
|
self.redirect("/panel/error?error=Unauthorized access to Files")
|
|
return
|
|
file_contents = self.get_body_argument('file_contents', default=None, strip=True)
|
|
file_path = helper.get_os_understandable_path(self.get_body_argument('file_path', default=None, strip=True))
|
|
server_id = self.get_argument('id', None)
|
|
|
|
if not self.check_server_id(server_id, 'save_file'):
|
|
return
|
|
else:
|
|
server_id = bleach.clean(server_id)
|
|
|
|
if not helper.in_path(helper.get_os_understandable_path(self.controller.servers.get_server_data_by_id(server_id)['path']), file_path)\
|
|
or not helper.check_file_exists(os.path.abspath(file_path)):
|
|
logger.warning(f"Invalid path in save_file ajax call ({file_path})")
|
|
console.warning(f"Invalid path in save_file ajax call ({file_path})")
|
|
return
|
|
|
|
# Open the file in write mode and store the content in file_object
|
|
with open(file_path, 'w', encoding='utf-8') as file_object:
|
|
file_object.write(file_contents)
|
|
|
|
elif page == "rename_item":
|
|
if not permissions['Files'] in user_perms:
|
|
if not superuser:
|
|
self.redirect("/panel/error?error=Unauthorized access to Files")
|
|
return
|
|
item_path = helper.get_os_understandable_path(self.get_body_argument('item_path', default=None, strip=True))
|
|
new_item_name = self.get_body_argument('new_item_name', default=None, strip=True)
|
|
server_id = self.get_argument('id', None)
|
|
|
|
if not self.check_server_id(server_id, 'rename_item'):
|
|
return
|
|
else:
|
|
server_id = bleach.clean(server_id)
|
|
|
|
if item_path is None or new_item_name is None:
|
|
logger.warning("Invalid path(s) in rename_item ajax call")
|
|
console.warning("Invalid path(s) in rename_item ajax call")
|
|
return
|
|
|
|
if not helper.in_path(helper.get_os_understandable_path(self.controller.servers.get_server_data_by_id(server_id)['path']), item_path) \
|
|
or not helper.check_path_exists(os.path.abspath(item_path)):
|
|
logger.warning(f"Invalid old name path in rename_item ajax call ({server_id})")
|
|
console.warning(f"Invalid old name path in rename_item ajax call ({server_id})")
|
|
return
|
|
|
|
new_item_path = os.path.join(os.path.split(item_path)[0], new_item_name)
|
|
|
|
if not helper.in_path(helper.get_os_understandable_path(self.controller.servers.get_server_data_by_id(server_id)['path']),
|
|
new_item_path) \
|
|
or helper.check_path_exists(os.path.abspath(new_item_path)):
|
|
logger.warning(f"Invalid new name path in rename_item ajax call ({server_id})")
|
|
console.warning(f"Invalid new name path in rename_item ajax call ({server_id})")
|
|
return
|
|
|
|
# RENAME
|
|
os.rename(item_path, new_item_path)
|
|
|
|
def check_server_id(self, server_id, page_name):
|
|
if server_id is None:
|
|
logger.warning(f"Server ID not defined in {page_name} ajax call ({server_id})")
|
|
console.warning(f"Server ID not defined in {page_name} ajax call ({server_id})")
|
|
return
|
|
else:
|
|
server_id = bleach.clean(server_id)
|
|
|
|
# does this server id exist?
|
|
if not self.controller.servers.server_id_exists(server_id):
|
|
logger.warning(f"Server ID not found in {page_name} ajax call ({server_id})")
|
|
console.warning(f"Server ID not found in {page_name} ajax call ({server_id})")
|
|
return
|
|
return True
|