diff --git a/app/Extensions/Backups/BackupManager.php b/app/Extensions/Backups/BackupManager.php index fda52f90a..fb0e0a26a 100644 --- a/app/Extensions/Backups/BackupManager.php +++ b/app/Extensions/Backups/BackupManager.php @@ -9,6 +9,7 @@ use Illuminate\Support\Str; use Webmozart\Assert\Assert; use InvalidArgumentException; use League\Flysystem\AdapterInterface; +use Illuminate\Foundation\Application; use League\Flysystem\AwsS3v3\AwsS3Adapter; use League\Flysystem\Memory\MemoryAdapter; use Illuminate\Contracts\Config\Repository; @@ -44,7 +45,7 @@ class BackupManager * * @param \Illuminate\Foundation\Application $app */ - public function __construct($app) + public function __construct(Application $app) { $this->app = $app; $this->config = $app->make(Repository::class); diff --git a/app/Http/Controllers/Api/Remote/Backups/BackupRemoteUploadController.php b/app/Http/Controllers/Api/Remote/Backups/BackupRemoteUploadController.php index cf52fc450..497d12904 100644 --- a/app/Http/Controllers/Api/Remote/Backups/BackupRemoteUploadController.php +++ b/app/Http/Controllers/Api/Remote/Backups/BackupRemoteUploadController.php @@ -69,7 +69,7 @@ class BackupRemoteUploadController extends Controller // Ensure we are using the S3 adapter. $adapter = $this->backupManager->adapter(); if (! $adapter instanceof AwsS3Adapter) { - throw new BadRequestHttpException('The configured backup adapter is not an S3 compatiable adapter.'); + throw new BadRequestHttpException('The configured backup adapter is not an S3 compatible adapter.'); } // The path where backup will be uploaded to @@ -77,7 +77,7 @@ class BackupRemoteUploadController extends Controller // Get the S3 client $client = $adapter->getClient(); - $expires = CarbonImmutable::now()->addMinutes(30); + $expires = CarbonImmutable::now()->addMinutes(config('backups.presigned_url_lifespan', 60)); // Params for generating the presigned urls $params = [ @@ -102,14 +102,9 @@ class BackupRemoteUploadController extends Controller } return new JsonResponse([ + 'upload_id' => $params['UploadId'], 'parts' => $parts, 'part_size' => self::PART_SIZE, - 'complete_multipart_upload' => $client->createPresignedRequest( - $client->getCommand('CompleteMultipartUpload', $params), $expires - )->getUri()->__toString(), - 'abort_multipart_upload' => $client->createPresignedRequest( - $client->getCommand('AbortMultipartUpload', $params), $expires->addMinutes(15) - )->getUri()->__toString(), ]); } } diff --git a/app/Http/Controllers/Api/Remote/Backups/BackupStatusController.php b/app/Http/Controllers/Api/Remote/Backups/BackupStatusController.php index 85a3acf6a..ba98b56f9 100644 --- a/app/Http/Controllers/Api/Remote/Backups/BackupStatusController.php +++ b/app/Http/Controllers/Api/Remote/Backups/BackupStatusController.php @@ -3,8 +3,11 @@ namespace Pterodactyl\Http\Controllers\Api\Remote\Backups; use Carbon\CarbonImmutable; +use Pterodactyl\Models\Backup; use Illuminate\Http\JsonResponse; +use League\Flysystem\AwsS3v3\AwsS3Adapter; use Pterodactyl\Http\Controllers\Controller; +use Pterodactyl\Extensions\Backups\BackupManager; use Pterodactyl\Repositories\Eloquent\BackupRepository; use Symfony\Component\HttpKernel\Exception\BadRequestHttpException; use Pterodactyl\Http\Requests\Api\Remote\ReportBackupCompleteRequest; @@ -16,14 +19,21 @@ class BackupStatusController extends Controller */ private $repository; + /** + * @var \Pterodactyl\Extensions\Backups\BackupManager + */ + private $backupManager; + /** * BackupStatusController constructor. * * @param \Pterodactyl\Repositories\Eloquent\BackupRepository $repository + * @param \Pterodactyl\Extensions\Backups\BackupManager $backupManager */ - public function __construct(BackupRepository $repository) + public function __construct(BackupRepository $repository, BackupManager $backupManager) { $this->repository = $repository; + $this->backupManager = $backupManager; } /** @@ -31,9 +41,11 @@ class BackupStatusController extends Controller * * @param \Pterodactyl\Http\Requests\Api\Remote\ReportBackupCompleteRequest $request * @param string $backup + * * @return \Illuminate\Http\JsonResponse * * @throws \Pterodactyl\Exceptions\Repository\RecordNotFoundException + * @throws \Exception */ public function __invoke(ReportBackupCompleteRequest $request, string $backup) { @@ -47,6 +59,7 @@ class BackupStatusController extends Controller } $successful = $request->input('successful') ? true : false; + $model->forceFill([ 'is_successful' => $successful, 'checksum' => $successful ? ($request->input('checksum_type') . ':' . $request->input('checksum')) : null, @@ -54,6 +67,32 @@ class BackupStatusController extends Controller 'completed_at' => CarbonImmutable::now(), ])->save(); + // Check if we are using the s3 backup adapter. + $adapter = $this->backupManager->adapter(); + if ($adapter instanceof AwsS3Adapter) { + /** @var \Pterodactyl\Models\Backup $backup */ + $backup = Backup::query()->where('uuid', $backup)->firstOrFail(); + + $client = $adapter->getClient(); + + $params = [ + 'Bucket' => $adapter->getBucket(), + 'Key' => sprintf('%s/%s.tar.gz', $backup->server->uuid, $backup->uuid), + 'UploadId' => $request->input('upload_id'), + ]; + + // If the backup was not successful, send an AbortMultipartUpload request. + if (! $successful) { + $client->execute($client->getCommand('AbortMultipartUpload', $params)); + } else { + // Otherwise send a CompleteMultipartUpload request. + $params['MultipartUpload'] = [ + 'Parts' => $client->execute($client->getCommand('ListParts', $params))['Parts'], + ]; + $client->execute($client->getCommand('CompleteMultipartUpload', $params)); + } + } + return new JsonResponse([], JsonResponse::HTTP_NO_CONTENT); } } diff --git a/app/Http/Requests/Api/Client/Servers/Network/NewAllocationRequest.php b/app/Http/Requests/Api/Client/Servers/Network/NewAllocationRequest.php index 7628afaaf..4a29378dd 100644 --- a/app/Http/Requests/Api/Client/Servers/Network/NewAllocationRequest.php +++ b/app/Http/Requests/Api/Client/Servers/Network/NewAllocationRequest.php @@ -2,8 +2,6 @@ namespace Pterodactyl\Http\Requests\Api\Client\Servers\Network; -use Illuminate\Support\Collection; -use Pterodactyl\Models\Allocation; use Pterodactyl\Models\Permission; use Pterodactyl\Http\Requests\Api\Client\ClientApiRequest; @@ -16,5 +14,4 @@ class NewAllocationRequest extends ClientApiRequest { return Permission::ACTION_ALLOCATION_CREATE; } - } diff --git a/app/Services/Backups/InitiateBackupService.php b/app/Services/Backups/InitiateBackupService.php index 5c34961a4..210e92342 100644 --- a/app/Services/Backups/InitiateBackupService.php +++ b/app/Services/Backups/InitiateBackupService.php @@ -99,6 +99,8 @@ class InitiateBackupService * * @param \Pterodactyl\Models\Server $server * @param string|null $name + * @param bool $override + * * @return \Pterodactyl\Models\Backup * * @throws \Throwable diff --git a/config/backups.php b/config/backups.php index ec9bd175e..32ee1aa8a 100644 --- a/config/backups.php +++ b/config/backups.php @@ -8,6 +8,10 @@ return [ // have been made, without losing data. 'default' => env('APP_BACKUP_DRIVER', Backup::ADAPTER_WINGS), + // This value is used to determine the lifespan of UploadPart presigned urls that wings + // uses to upload backups to S3 storage. Value is in minutes, so this would default to an hour. + 'presigned_url_lifespan' => env('BACKUP_PRESIGNED_URL_LIFESPAN', 60), + 'disks' => [ // There is no configuration for the local disk for Wings. That configuration // is determined by the Daemon configuration, and not the Panel. diff --git a/resources/scripts/components/server/ServerDetailsBlock.tsx b/resources/scripts/components/server/ServerDetailsBlock.tsx index 321c01943..0d87089c1 100644 --- a/resources/scripts/components/server/ServerDetailsBlock.tsx +++ b/resources/scripts/components/server/ServerDetailsBlock.tsx @@ -1,5 +1,5 @@ import React, { useEffect, useState } from 'react'; -import tw from 'twin.macro'; +import tw, { TwStyle } from 'twin.macro'; import { faCircle, faEthernet, faHdd, faMemory, faMicrochip, faServer } from '@fortawesome/free-solid-svg-icons'; import { FontAwesomeIcon } from '@fortawesome/react-fontawesome'; import { bytesToHuman, megabytesToHuman } from '@/helpers'; @@ -13,6 +13,21 @@ interface Stats { disk: number; } +function statusToColor (status: string|null, installing: boolean): TwStyle { + if (installing) { + status = ''; + } + + switch (status) { + case 'offline': + return tw`text-red-500`; + case 'running': + return tw`text-green-500`; + default: + return tw`text-yellow-500`; + } +} + const ServerDetailsBlock = () => { const [ stats, setStats ] = useState({ memory: 0, cpu: 0, disk: 0 }); @@ -49,6 +64,7 @@ const ServerDetailsBlock = () => { }, [ instance, connected ]); const name = ServerContext.useStoreState(state => state.server.data!.name); + const isInstalling = ServerContext.useStoreState(state => state.server.data!.isInstalling); const limits = ServerContext.useStoreState(state => state.server.data!.limits); const primaryAllocation = ServerContext.useStoreState(state => state.server.data!.allocations.filter(alloc => alloc.isDefault).map( allocation => (allocation.alias || allocation.ip) + ':' + allocation.port @@ -65,10 +81,10 @@ const ServerDetailsBlock = () => { fixedWidth css={[ tw`mr-1`, - status === 'offline' ? tw`text-red-500` : (status === 'running' ? tw`text-green-500` : tw`text-yellow-500`), + statusToColor(status, isInstalling), ]} /> -  {!status ? 'Connecting...' : status} +  {!status ? 'Connecting...' : (isInstalling ? 'Installing' : status)}