package router import ( "context" "net/http" "os" "strconv" "emperror.dev/errors" "github.com/apex/log" "github.com/gin-gonic/gin" "github.com/pterodactyl/wings/router/downloader" "github.com/pterodactyl/wings/router/middleware" "github.com/pterodactyl/wings/router/tokens" "github.com/pterodactyl/wings/server" ) // Returns a single server from the collection of servers. func getServer(c *gin.Context) { c.JSON(http.StatusOK, ExtractServer(c).ToAPIResponse()) } // Returns the logs for a given server instance. func getServerLogs(c *gin.Context) { s := ExtractServer(c) l, _ := strconv.Atoi(c.DefaultQuery("size", "100")) if l <= 0 { l = 100 } else if l > 100 { l = 100 } out, err := s.ReadLogfile(l) if err != nil { NewServerError(err, s).Abort(c) return } c.JSON(http.StatusOK, gin.H{"data": out}) } // Handles a request to control the power state of a server. If the action being passed // through is invalid a 404 is returned. Otherwise, a HTTP/202 Accepted response is returned // and the actual power action is run asynchronously so that we don't have to block the // request until a potentially slow operation completes. // // This is done because for the most part the Panel is using websockets to determine when // things are happening, so theres no reason to sit and wait for a request to finish. We'll // just see over the socket if something isn't working correctly. func postServerPower(c *gin.Context) { s := ExtractServer(c) var data struct { Action server.PowerAction `json:"action"` } if err := c.BindJSON(&data); err != nil { return } if !data.Action.IsValid() { c.AbortWithStatusJSON(http.StatusUnprocessableEntity, gin.H{ "error": "The power action provided was not valid, should be one of \"stop\", \"start\", \"restart\", \"kill\"", }) return } // Because we route all of the actual bootup process to a separate thread we need to // check the suspension status here, otherwise the user will hit the endpoint and then // just sit there wondering why it returns a success but nothing actually happens. // // We don't really care about any of the other actions at this point, they'll all result // in the process being stopped, which should have happened anyways if the server is suspended. if (data.Action == server.PowerActionStart || data.Action == server.PowerActionRestart) && s.IsSuspended() { c.AbortWithStatusJSON(http.StatusBadRequest, gin.H{ "error": "Cannot start or restart a server that is suspended.", }) return } // Pass the actual heavy processing off to a separate thread to handle so that // we can immediately return a response from the server. Some of these actions // can take quite some time, especially stopping or restarting. go func(s *server.Server) { if err := s.HandlePowerAction(data.Action, 30); err != nil { if errors.Is(err, context.DeadlineExceeded) { s.Log().WithField("action", data.Action). Warn("could not acquire a lock while attempting to perform a power action") } else { s.Log().WithFields(log.Fields{"action": data, "error": err}). Error("encountered error processing a server power action in the background") } } }(s) c.Status(http.StatusAccepted) } // Sends an array of commands to a running server instance. func postServerCommands(c *gin.Context) { s := ExtractServer(c) if running, err := s.Environment.IsRunning(); err != nil { NewServerError(err, s).Abort(c) return } else if !running { c.AbortWithStatusJSON(http.StatusBadGateway, gin.H{ "error": "Cannot send commands to a stopped server instance.", }) return } var data struct { Commands []string `json:"commands"` } // BindJSON sends 400 if the request fails, all we need to do is return if err := c.BindJSON(&data); err != nil { return } for _, command := range data.Commands { if err := s.Environment.SendCommand(command); err != nil { s.Log().WithFields(log.Fields{"command": command, "error": err}).Warn("failed to send command to server instance") } } c.Status(http.StatusNoContent) } // postServerSync will accept a POST request and trigger a re-sync of the given // server against the Panel. This can be manually triggered when needed by an // external system, or triggered by the Panel itself when modifications are made // to the build of a server internally. func postServerSync(c *gin.Context) { s := ExtractServer(c) if err := s.Sync(); err != nil { WithError(c, err) } else { c.Status(http.StatusNoContent) } } // Performs a server installation in a background thread. func postServerInstall(c *gin.Context) { s := ExtractServer(c) go func(serv *server.Server) { if err := serv.Install(true); err != nil { serv.Log().WithField("error", err).Error("failed to execute server installation process") } }(s) c.Status(http.StatusAccepted) } // Reinstalls a server. func postServerReinstall(c *gin.Context) { s := ExtractServer(c) if s.ExecutingPowerAction() { c.AbortWithStatusJSON(http.StatusConflict, gin.H{ "error": "Cannot execute server reinstall event while another power action is running.", }) return } go func(s *server.Server) { if err := s.Reinstall(); err != nil { s.Log().WithField("error", err).Error("failed to complete server re-install process") } }(s) c.Status(http.StatusAccepted) } // Deletes a server from the wings daemon and dissociate it's objects. func deleteServer(c *gin.Context) { s := middleware.ExtractServer(c) // Immediately suspend the server to prevent a user from attempting // to start it while this process is running. s.Config().SetSuspended(true) // Stop all running background tasks for this server that are using the context on // the server struct. This will cancel any running install processes for the server // as well. s.CtxCancel() s.Events().Destroy() s.Websockets().CancelAll() // Remove any pending remote file downloads for the server. for _, dl := range downloader.ByServer(s.ID()) { dl.Cancel() } // Destroy the environment; in Docker this will handle a running container and // forcibly terminate it before removing the container, so we do not need to handle // that here. if err := s.Environment.Destroy(); err != nil { WithError(c, err) return } // Once the environment is terminated, remove the server files from the system. This is // done in a separate process since failure is not the end of the world and can be // manually cleaned up after the fact. // // In addition, servers with large amounts of files can take some time to finish deleting // so we don't want to block the HTTP call while waiting on this. go func(p string) { if err := os.RemoveAll(p); err != nil { log.WithFields(log.Fields{"path": p, "error": err}).Warn("failed to remove server files during deletion process") } }(s.Filesystem().Path()) middleware.ExtractManager(c).Remove(func(server *server.Server) bool { return server.ID() == s.ID() }) // Deallocate the reference to this server. s = nil c.Status(http.StatusNoContent) } // Adds any of the JTIs passed through in the body to the deny list for the websocket // preventing any JWT generated before the current time from being used to connect to // the socket or send along commands. func postServerDenyWSTokens(c *gin.Context) { var data struct { JTIs []string `json:"jtis"` } if err := c.BindJSON(&data); err != nil { return } for _, jti := range data.JTIs { tokens.DenyJTI(jti) } c.Status(http.StatusNoContent) }