wings/router/websocket/websocket.go

429 lines
12 KiB
Go
Raw Permalink Normal View History

2020-04-06 01:00:33 +00:00
package websocket
import (
"context"
2020-04-06 01:00:33 +00:00
"fmt"
"net/http"
"strings"
"sync"
"time"
"emperror.dev/errors"
2020-06-13 17:26:35 +00:00
"github.com/apex/log"
2020-04-06 01:00:33 +00:00
"github.com/gbrlsnchs/jwt/v3"
"github.com/google/uuid"
"github.com/gorilla/websocket"
"github.com/goccy/go-json"
2020-04-06 01:00:33 +00:00
"github.com/pterodactyl/wings/config"
"github.com/pterodactyl/wings/environment"
"github.com/pterodactyl/wings/environment/docker"
"github.com/pterodactyl/wings/router/tokens"
2020-04-06 01:00:33 +00:00
"github.com/pterodactyl/wings/server"
)
const (
2020-04-17 17:21:33 +00:00
PermissionConnect = "websocket.connect"
PermissionSendCommand = "control.console"
PermissionSendPowerStart = "control.start"
PermissionSendPowerStop = "control.stop"
PermissionSendPowerRestart = "control.restart"
2020-04-17 17:21:33 +00:00
PermissionReceiveErrors = "admin.websocket.errors"
PermissionReceiveInstall = "admin.websocket.install"
PermissionReceiveTransfer = "admin.websocket.transfer"
PermissionReceiveBackups = "backup.read"
2020-04-06 01:00:33 +00:00
)
type Handler struct {
sync.RWMutex `json:"-"`
Connection *websocket.Conn `json:"-"`
jwt *tokens.WebsocketPayload
server *server.Server
uuid uuid.UUID
2020-04-06 01:00:33 +00:00
}
var (
ErrJwtNotPresent = errors.New("jwt: no jwt present")
ErrJwtNoConnectPerm = errors.New("jwt: missing connect permission")
ErrJwtUuidMismatch = errors.New("jwt: server uuid mismatch")
ErrJwtOnDenylist = errors.New("jwt: created too far in past (denylist)")
)
func IsJwtError(err error) bool {
return errors.Is(err, ErrJwtNotPresent) ||
errors.Is(err, ErrJwtNoConnectPerm) ||
errors.Is(err, ErrJwtUuidMismatch) ||
errors.Is(err, ErrJwtOnDenylist) ||
errors.Is(err, jwt.ErrExpValidation)
}
// NewTokenPayload parses a JWT into a websocket token payload.
func NewTokenPayload(token []byte) (*tokens.WebsocketPayload, error) {
var payload tokens.WebsocketPayload
if err := tokens.ParseToken(token, &payload); err != nil {
return nil, err
}
if payload.Denylisted() {
return nil, ErrJwtOnDenylist
}
if !payload.HasPermission(PermissionConnect) {
return nil, ErrJwtNoConnectPerm
}
return &payload, nil
}
// GetHandler returns a new websocket handler using the context provided.
2020-04-06 01:00:33 +00:00
func GetHandler(s *server.Server, w http.ResponseWriter, r *http.Request) (*Handler, error) {
upgrader := websocket.Upgrader{
// Ensure that the websocket request is originating from the Panel itself,
// and not some other location.
CheckOrigin: func(r *http.Request) bool {
o := r.Header.Get("Origin")
if o == config.Get().PanelLocation {
return true
}
for _, origin := range config.Get().AllowedOrigins {
2020-12-25 22:40:28 +00:00
if origin == "*" || origin == o {
return true
}
}
return false
2020-04-06 01:00:33 +00:00
},
}
conn, err := upgrader.Upgrade(w, r, nil)
if err != nil {
return nil, err
}
u, err := uuid.NewRandom()
if err != nil {
return nil, err
}
2020-04-06 01:00:33 +00:00
return &Handler{
Connection: conn,
jwt: nil,
2020-04-06 01:00:33 +00:00
server: s,
uuid: u,
2020-04-06 01:00:33 +00:00
}, nil
}
func (h *Handler) Uuid() uuid.UUID {
return h.uuid
}
func (h *Handler) Logger() *log.Entry {
return log.WithField("subsystem", "websocket").
WithField("connection", h.Uuid().String()).
WithField("server", h.server.ID())
}
2022-01-18 03:23:29 +00:00
func (h *Handler) SendJson(v Message) error {
// Do not send JSON down the line if the JWT on the connection is not valid!
2020-04-06 01:00:33 +00:00
if err := h.TokenValid(); err != nil {
2022-01-18 03:23:29 +00:00
_ = h.unsafeSendJson(Message{
2020-09-27 16:09:34 +00:00
Event: JwtErrorEvent,
Args: []string{err.Error()},
})
2020-04-06 01:00:33 +00:00
return nil
}
2022-01-18 03:23:29 +00:00
if j := h.GetJwt(); j != nil {
// If we're sending installation output but the user does not have the required
// permissions to see the output, don't send it down the line.
if v.Event == server.InstallOutputEvent {
if !j.HasPermission(PermissionReceiveInstall) {
return nil
}
2020-04-06 01:00:33 +00:00
}
// If the user does not have permission to see backup events, do not emit
// them over the socket.
if strings.HasPrefix(v.Event, server.BackupCompletedEvent) {
if !j.HasPermission(PermissionReceiveBackups) {
return nil
}
}
// If we are sending transfer output, only send it to the user if they have the required permissions.
if v.Event == server.TransferLogsEvent {
if !j.HasPermission(PermissionReceiveTransfer) {
return nil
}
}
}
if err := h.unsafeSendJson(v); err != nil {
// Not entirely sure how this happens (likely just when there is a ton of console spam)
// but I don't care to fix it right now, so just mask the error and throw a warning into
// the logs for us to look into later.
if errors.Is(err, websocket.ErrCloseSent) {
if h.server != nil {
h.server.Log().WithField("subsystem", "websocket").
WithField("event", v.Event).
Warn("failed to send event to websocket: close already sent")
}
return nil
}
return err
}
return nil
2020-04-06 01:00:33 +00:00
}
// Sends JSON over the websocket connection, ignoring the authentication state of the
// socket user. Do not call this directly unless you are positive a response should be
// sent back to the client!
func (h *Handler) unsafeSendJson(v interface{}) error {
h.Lock()
defer h.Unlock()
2020-04-06 01:00:33 +00:00
return h.Connection.WriteJSON(v)
}
// TokenValid checks if the JWT is still valid.
2020-04-06 01:00:33 +00:00
func (h *Handler) TokenValid() error {
j := h.GetJwt()
if j == nil {
return ErrJwtNotPresent
2020-04-06 01:00:33 +00:00
}
if err := jwt.ExpirationTimeValidator(time.Now())(&j.Payload); err != nil {
2020-04-06 01:00:33 +00:00
return err
}
if j.Denylisted() {
return ErrJwtOnDenylist
}
if !j.HasPermission(PermissionConnect) {
return ErrJwtNoConnectPerm
2020-04-06 01:00:33 +00:00
}
if h.server.ID() != j.GetServerUuid() {
return ErrJwtUuidMismatch
2020-04-06 01:00:33 +00:00
}
return nil
}
// SendErrorJson sends an error back to the connected websocket instance by checking the permissions
2020-04-06 01:00:33 +00:00
// of the token. If the user has the "receive-errors" grant we will send back the actual
// error message, otherwise we just send back a standard error message.
func (h *Handler) SendErrorJson(msg Message, err error, shouldLog ...bool) error {
j := h.GetJwt()
isJWTError := IsJwtError(err)
2020-04-06 01:00:33 +00:00
wsm := Message{
Event: ErrorEvent,
Args: []string{"an unexpected error was encountered while handling this request"},
}
if isJWTError || (j != nil && j.HasPermission(PermissionReceiveErrors)) {
if isJWTError {
wsm.Event = JwtErrorEvent
}
wsm.Args = []string{err.Error()}
2020-04-06 01:00:33 +00:00
}
m, u := h.GetErrorMessage(wsm.Args[0])
2020-04-06 01:00:33 +00:00
wsm.Args = []string{m}
if !isJWTError && (len(shouldLog) == 0 || (len(shouldLog) == 1 && shouldLog[0] == true)) {
h.server.Log().WithFields(log.Fields{"event": msg.Event, "error_identifier": u.String(), "error": err}).
Errorf("error processing websocket event \"%s\"", msg.Event)
2020-04-06 01:00:33 +00:00
}
return h.unsafeSendJson(wsm)
2020-04-06 01:00:33 +00:00
}
// GetErrorMessage converts an error message into a more readable representation and returns a UUID
2020-04-06 01:00:33 +00:00
// that can be cross-referenced to find the specific error that triggered.
func (h *Handler) GetErrorMessage(msg string) (string, uuid.UUID) {
u := uuid.Must(uuid.NewRandom())
m := fmt.Sprintf("Error Event [%s]: %s", u.String(), msg)
return m, u
}
// GetJwt returns the JWT for the websocket in a race-safe manner.
func (h *Handler) GetJwt() *tokens.WebsocketPayload {
h.RLock()
defer h.RUnlock()
return h.jwt
}
// setJwt sets the JWT for the websocket in a race-safe manner.
func (h *Handler) setJwt(token *tokens.WebsocketPayload) {
h.Lock()
h.jwt = token
h.Unlock()
}
// HandleInbound handles an inbound socket request and route it to the proper action.
func (h *Handler) HandleInbound(ctx context.Context, m Message) error {
2020-04-06 01:00:33 +00:00
if m.Event != AuthenticationEvent {
if err := h.TokenValid(); err != nil {
h.unsafeSendJson(Message{
2020-09-27 16:09:34 +00:00
Event: JwtErrorEvent,
Args: []string{err.Error()},
2020-04-06 01:00:33 +00:00
})
return nil
}
}
switch m.Event {
case AuthenticationEvent:
{
token, err := NewTokenPayload([]byte(strings.Join(m.Args, "")))
2020-04-06 01:00:33 +00:00
if err != nil {
return err
}
2020-06-10 21:00:59 +00:00
// Check if the user has previously authenticated successfully.
newConnection := h.GetJwt() == nil
// Previously there was a HasPermission(PermissionConnect) check around this,
// however NewTokenPayload will return an error if it doesn't have the connect
// permission meaning that it was a redundant function call.
h.setJwt(token)
2020-04-06 01:00:33 +00:00
2020-06-10 21:00:59 +00:00
// Tell the client they authenticated successfully.
2022-01-18 03:23:29 +00:00
_ = h.unsafeSendJson(Message{Event: AuthenticationSuccessEvent})
2020-04-06 01:00:33 +00:00
2020-06-10 21:00:59 +00:00
// Check if the client was refreshing their authentication token
// instead of authenticating for the first time.
if !newConnection {
// This prevents duplicate status messages as outlined in
// https://github.com/pterodactyl/panel/issues/2077
return nil
}
// Now that we've authenticated with the token and confirmed that we're not
// reconnecting to the socket, register the event listeners for the server and
// the token expiration.
h.registerListenerEvents(ctx)
// On every authentication event, send the current server status back
// to the client. :)
state := h.server.Environment.State()
2022-01-18 03:23:29 +00:00
_ = h.SendJson(Message{
Event: server.StatusEvent,
Args: []string{state},
})
// Only send the current disk usage if the server is offline, if docker container is running,
// Environment#EnableResourcePolling() will send this data to all clients.
if state == environment.ProcessOfflineState {
if !h.server.IsInstalling() && !h.server.IsTransferring() {
_ = h.server.Filesystem().HasSpaceAvailable(false)
b, _ := json.Marshal(h.server.Proc())
2022-01-18 03:23:29 +00:00
_ = h.SendJson(Message{
Event: server.StatsEvent,
Args: []string{string(b)},
})
}
}
2020-04-06 01:00:33 +00:00
return nil
}
case SetStateEvent:
{
action := server.PowerAction(strings.Join(m.Args, ""))
actions := make(map[server.PowerAction]string)
actions[server.PowerActionStart] = PermissionSendPowerStart
actions[server.PowerActionStop] = PermissionSendPowerStop
actions[server.PowerActionRestart] = PermissionSendPowerRestart
actions[server.PowerActionTerminate] = PermissionSendPowerStop
// Check that they have permission to perform this action if it is needed.
if permission, exists := actions[action]; exists {
if !h.GetJwt().HasPermission(permission) {
return nil
}
2020-04-06 01:00:33 +00:00
}
err := h.server.HandlePowerAction(action)
if errors.Is(err, context.DeadlineExceeded) {
m, _ := h.GetErrorMessage("another power action is currently being processed for this server, please try again later")
2022-01-18 03:23:29 +00:00
_ = h.SendJson(Message{
Event: ErrorEvent,
Args: []string{m},
})
return nil
}
return err
2020-04-06 01:00:33 +00:00
}
case SendServerLogsEvent:
{
2021-11-15 17:37:56 +00:00
ctx, cancel := context.WithTimeout(context.Background(), time.Second*5)
defer cancel()
if running, _ := h.server.Environment.IsRunning(ctx); !running {
2020-04-06 01:00:33 +00:00
return nil
}
logs, err := h.server.Environment.Readlog(config.Get().System.WebsocketLogCount)
2020-04-06 01:00:33 +00:00
if err != nil {
return err
}
for _, line := range logs {
2022-01-18 03:23:29 +00:00
_ = h.SendJson(Message{
2020-04-06 01:00:33 +00:00
Event: server.ConsoleOutputEvent,
Args: []string{line},
})
}
return nil
}
case SendStatsEvent:
{
b, _ := json.Marshal(h.server.Proc())
2022-01-18 03:23:29 +00:00
_ = h.SendJson(Message{
Event: server.StatsEvent,
Args: []string{string(b)},
})
2020-04-06 01:00:33 +00:00
return nil
}
case SendCommandEvent:
{
if !h.GetJwt().HasPermission(PermissionSendCommand) {
2020-04-06 01:00:33 +00:00
return nil
}
if h.server.Environment.State() == environment.ProcessOfflineState {
2020-04-06 01:00:33 +00:00
return nil
}
// TODO(dane): should probably add a new process state that is "booting environment" or something
// so that we can better handle this and only set the environment to booted once we're attached.
//
// Or maybe just an IsBooted function?
if h.server.Environment.State() == environment.ProcessStartingState {
if e, ok := h.server.Environment.(*docker.Environment); ok {
if !e.IsAttached() {
return nil
}
}
}
2020-04-06 01:00:33 +00:00
return h.server.Environment.SendCommand(strings.Join(m.Args, ""))
}
}
return nil
}