-| Type | Badges |
-|-------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| **General:** |   |
-| **Code quality:** | [](https://codeclimate.com/github/AuthMe/AuthMeReloaded) [](https://coveralls.io/github/AuthMe-Team/AuthMeReloaded?branch=master) |
-| **Jenkins CI:** | [](https://ci.codemc.org/) [](https://ci.codemc.org/job/AuthMe/job/AuthMeReloaded)  |
-| **Other CIs:** | [](https://www.travis-ci.com/AuthMe/AuthMeReloaded) |
+**Detailed Changes:**
+ 1. Improved mail sending logic & support more emails
+ 2. Shutdown mail sending(When server is closed, email you)
+ 3. Legacy bug fixes
+ 4. Anti Ghost Player(Doubled login bug)
+ 5. Use the best performance method by server brand
+ 6. Bedrock Compatibility(Floodgate needed)(based on UUID)
+ 7. Update checker
+ 8. Integrated GUI Captcha feature(Bedrock compatibility & ProtocolLib needed)(70% Asynchronous)
+ 9. Improved listeners
+ 10. Player login logic improvement to reduce lag
+ 11. Automatically purge bot data
+ 12. Folia
+ compatibility [Here](https://github.com/HaHaWTH/AuthMeReReloaded/releases/download/b20/AuthMe-5.6.0-FORK-Folia.jar)
+ 13. Offhand Menu compatibility(Thats amazing)
+ 14. Automatically fix portal stuck issue
+ 15. Automatically login for Bedrock players(configurable)
+ 16. Fix shulker box crash bug on legacy versions(MC 1.13-)
+ 17. **H2 database support**
+ 18. **100% compatibility with original authme and extensions**
+ 19. More......
-## Description
+**Download links:**
+[Releases](https://github.com/HaHaWTH/AuthMeReReloaded/releases/latest)
+[Actions(Dev builds, use at your own risk!)](https://github.com/HaHaWTH/AuthMeReReloaded/actions/workflows/maven.yml)
-Prevent username stealing on your server!
-Use it to secure your Offline mode server or to increase your Online mode server's protection!
+If you are using FRP(内网穿透) for your server, this plugin may help [HAProxy-Detector](https://github.com/HaHaWTH/HAProxy-Detector)
-AuthMeReloaded disallows players who aren't authenticated to do actions like placing blocks, moving,
-typing commands or using the inventory. It can also kick players with uncommonly long or short player names or kick players from banned countries.
+**Pull Requests and suggestions are welcome!**
-With the Session Login feature you don't have to execute the authentication command every time you connect to the server!
-Each command and every feature can be enabled or disabled from our well structured configuration file.
-
-You can also create your own translation file and, if you want, you can share it with us! :)
-
-#### Features:
-
Built-in Deprecated FlatFile (auths.db) to SQL (authme.sql) converter!
-
Import your old database from other plugins like Rakamak, xAuth, CrazyLogin, RoyalAuth and vAuth!
-
-
-#### Configuration
-[How to configure AuthMe](https://github.com/AuthMe/AuthMeReloaded/blob/master/docs/config.md)
-#### Commands
-[Command list and usage](https://github.com/AuthMe/AuthMeReloaded/blob/master/docs/commands.md)
-#### Permissions
-- authme.player.* - for all user commands
-- authme.admin.* - for all admin commands
-- [List of all permission nodes](http://github.com/AuthMe/AuthMeReloaded/blob/master/docs/permission_nodes.md)
-
-#### How To
-- [How to use the converter](https://github.com/AuthMe/AuthMeReloaded/wiki/Converters)
-- [How to import database from xAuth](https://dev.bukkit.org/projects/authme-reloaded/pages/how-to-import-database-from-xauth)
-- [Website integration](https://github.com/AuthMe/AuthMeReloaded/tree/master/samples/website_integration)
-- [How to convert from Rakamak](https://dev.bukkit.org/projects/authme-reloaded/pages/how-to-import-database-from-rakamak)
-- Convert between database types (e.g. SQLite to MySQL): /authme converter
-
-
-## Links and Contacts
-
- - **Support:**
- - [GitHub issue tracker](https://github.com/AuthMe/AuthMeReloaded/issues)
- - [Discord](https://discord.gg/Vn9eCyE)
- - [BukkitDev page](https://dev.bukkit.org/projects/authme-reloaded)
- - [Spigot page](https://www.spigotmc.org/resources/authmereloaded.6269/)
-
-- **Dev resources:**
- - JavaDocs
- - Maven Repository
- ```xml
-
-
- codemc-repo
- https://repo.codemc.org/repository/maven-public/
-
-
-
-
-
- fr.xephi
- authme
- 5.6.0-SNAPSHOT
- provided
-
-
- ```
-
-- **Statistics:**
- 
-
-## Requirements
-
-##### Compiling requirements:
->- JDK 11 (JDK 17 is recommended)
->- Maven
->- Git/Github (Optional)
-
-##### How to compile the project:
->- Clone the project with Git/GitHub
->- Execute command "mvn clean package"
-
-##### Running requirements:
->- Java 8 (Java 17 is recommended)
->- Paper or Spigot (1.8.X and up)
- (In case you use Thermos, Cauldron or similar, you have to update the SpecialSource library to support Java 8 plugins.
- HowTo: https://github.com/games647/FastLogin/issues/111#issuecomment-272331347)
->- ProtocolLib (optional, required by some features)
-
-## Credits
-
-##### Contributors:
-Team members: developers, translators
-
-Credits for the old version of the plugin: d4rkwarriors, fabe1337, Whoami2 and pomo4ka
-
-Thanks also to: AS1LV3RN1NJA, Hoeze and eprimex
-
-##### GeoIP License:
-This product uses data from the GeoLite API created by MaxMind, available at https://www.maxmind.com
+
+
+
+
diff --git a/docs/config.md b/docs/config.md
index 1c86eaf7..d5f46275 100644
--- a/docs/config.md
+++ b/docs/config.md
@@ -9,7 +9,7 @@ the generated config.yml file.
```yml
DataSource:
# What type of database do you want to use?
- # Valid values: SQLITE, MARIADB, MYSQL, POSTGRESQL
+ # Valid values: H2, SQLITE, MARIADB, MYSQL, POSTGRESQL
backend: SQLITE
# Enable the database caching system, should be disabled on bungeecord environments
# or when a website integration is being used.
@@ -304,13 +304,6 @@ settings:
forceKickAfterRegister: false
# Does AuthMe need to enforce a /login after a successful registration?
forceLoginAfterRegister: false
- # Enable to display the welcome message (welcome.txt) after a login
- # You can use colors in this welcome.txt + some replaced strings:
- # {PLAYER}: player name, {ONLINE}: display number of online players,
- # {MAXPLAYERS}: display server slots, {IP}: player ip, {LOGINS}: number of players logged,
- # {WORLD}: player current world, {SERVER}: server name
- # {VERSION}: get current bukkit version, {COUNTRY}: player country
- useWelcomeMessage: true
# Broadcast the welcome message to the server or only to the player?
# set true for server or false for player
broadcastWelcomeMessage: false
diff --git a/pom.xml b/pom.xml
index 85442ead..f05a73c8 100644
--- a/pom.xml
+++ b/pom.xml
@@ -6,10 +6,10 @@
fr.xephiauthme
- 5.6.0-SNAPSHOT
+ 5.6.0-FORK
- AuthMeReloaded
- The first authentication plugin for the Bukkit API!
+ AuthMeReReloaded
+ Fork of the first authentication plugin for the Bukkit API!2013https://github.com/AuthMe/AuthMeReloaded
@@ -47,7 +47,7 @@
- The GNU General Public Licence version 3 (GPLv3)
+ The GNU Public Licence version 3 (GPLv3)https://www.gnu.org/licenses/gpl-3.0.htmlrepo
@@ -67,11 +67,11 @@
3.6.3
- 1.19.2-R0.1-SNAPSHOT
+ 1.20.2-R0.1-SNAPSHOTAuthMe
- CUSTOM
+ 28${project.version}-b${project.buildNumber}${project.outputName}-${project.version}
@@ -189,19 +189,24 @@
org.apache.maven.pluginsmaven-clean-plugin
- 3.2.0
+ 3.3.2org.apache.maven.pluginsmaven-resources-plugin
- 3.3.0
+ 3.3.1
+
+
+ mmdb
+
+ org.apache.maven.pluginsmaven-compiler-plugin
- 3.10.1
+ 3.12.1${java.source}${java.target}
@@ -272,7 +277,7 @@
org.apache.maven.pluginsmaven-source-plugin
- 3.2.1
+ 3.3.0${project.finalNameBase}
@@ -289,7 +294,7 @@
org.apache.maven.pluginsmaven-shade-plugin
- 3.4.1
+ 3.5.2shaded-jar
@@ -319,7 +324,7 @@
shade
- ${project.finalNameBase}-legacy
+ ${project.finalNameBase}-Spigot-Universalcom.google.common
@@ -341,6 +346,10 @@
com.google.gsonfr.xephi.authme.libs.com.google.gson
+
+ org.h2
+ fr.xephi.authme.libs.org.h2
+
@@ -435,6 +444,14 @@
com.google.protobuffr.xephi.authme.libs.com.google.protobuf
+
+ io.netty
+ fr.xephi.authme.libs.io.netty
+
+
+ org.apache.commons.validator
+ fr.xephi.authme.libs.org.apache.commons.validator
+
@@ -502,6 +519,15 @@
+
+ opencollab-snapshot-main
+ https://repo.opencollab.dev/main/
+
+
+ opencollab-maven-snapshots
+ https://repo.opencollab.dev/maven-snapshots/
+
+
apache-snapshots
@@ -593,11 +619,43 @@
true
+
+
+
+ devmart-other
+ https://nexuslite.gcnt.net/repos/other/
+
+
+
+ opencollab-snapshot
+ https://repo.opencollab.dev/maven-snapshots/
+
+ false
+
+
+ true
+
+
+
+ jitpack
+ https://jitpack.io/
+
+ true
+
+
+ false
+
+
-
+
+ org.geysermc.floodgate
+ api
+ 2.2.2-SNAPSHOT
+ provided
+ ch.jalu
@@ -641,7 +699,7 @@
org.apache.commonscommons-email
- 1.6-SNAPSHOT
+ 1.6.0true
@@ -649,7 +707,7 @@
org.apache.logging.log4jlog4j-core
- 2.8.1
+ 2.20.0provided
@@ -692,7 +750,7 @@
org.mariadb.jdbcmariadb-java-client
- 3.3.0
+ 3.3.3true
@@ -737,7 +795,7 @@
com.google.guavaguava
- 31.0.1-jre
+ 31.1-jretrue
@@ -750,17 +808,15 @@
com.google.code.gsongson
- 2.8.9
+ 2.10.1true
-
-
ch.jaluconfigme
- 1.3.0
+ 1.3.1true
@@ -770,11 +826,11 @@
-
+
org.bstatsbstats-bukkit
- 3.0.0
+ 3.0.2true
@@ -782,7 +838,7 @@
com.comphenix.protocolProtocolLib
- 4.8.0
+ 5.1.0provided
@@ -826,6 +882,20 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
org.tyrannyofheaven.bukkit
@@ -1027,7 +1097,7 @@
org.mockitomockito-coretest
- 4.8.1
+ 5.2.0hamcrest-core
@@ -1048,14 +1118,14 @@
org.xerialsqlite-jdbc
- 3.44.0.0
+ 3.45.1.0testcom.h2databaseh2
- 2.2.220
- test
+ 2.2.224
+ compile
diff --git a/samples/NewConfig.yml b/samples/NewConfig.yml
index c0b392c4..08a8d225 100644
--- a/samples/NewConfig.yml
+++ b/samples/NewConfig.yml
@@ -412,12 +412,6 @@ settings:
forceRegisterCommands: []
# Force these commands after /register as a server console, without any '/', use %p for replace with player name
forceRegisterCommandsAsConsole: []
- # Do we need to display the welcome message (welcome.txt) after a register or a login?
- # You can use colors in this welcome.txt + some replaced strings :
- # {PLAYER} : player name, {ONLINE} : display number of online players, {MAXPLAYERS} : display server slots,
- # {IP} : player ip, {LOGINS} : number of players logged, {WORLD} : player current world, {SERVER} : server name
- # {VERSION} : get current bukkit version, {COUNTRY} : player country
- useWelcomeMessage: true
# Do we need to broadcast the welcome message to all server or only to the player? set true for server or false for player
broadcastWelcomeMessage: false
# Do we need to delay the join/leave message to be displayed only when the player is authenticated ?
diff --git a/src/main/java/fr/xephi/authme/AuthMe.java b/src/main/java/fr/xephi/authme/AuthMe.java
index 045d1ee9..8bf05070 100644
--- a/src/main/java/fr/xephi/authme/AuthMe.java
+++ b/src/main/java/fr/xephi/authme/AuthMe.java
@@ -2,7 +2,6 @@ package fr.xephi.authme;
import ch.jalu.injector.Injector;
import ch.jalu.injector.InjectorBuilder;
-import com.google.common.annotations.VisibleForTesting;
import fr.xephi.authme.api.v3.AuthMeApi;
import fr.xephi.authme.command.CommandHandler;
import fr.xephi.authme.datasource.DataSource;
@@ -12,13 +11,20 @@ import fr.xephi.authme.initialization.OnShutdownPlayerSaver;
import fr.xephi.authme.initialization.OnStartupTasks;
import fr.xephi.authme.initialization.SettingsProvider;
import fr.xephi.authme.initialization.TaskCloser;
+import fr.xephi.authme.listener.AdvancedShulkerFixListener;
+import fr.xephi.authme.listener.BedrockAutoLoginListener;
import fr.xephi.authme.listener.BlockListener;
+import fr.xephi.authme.listener.DoubleLoginFixListener;
import fr.xephi.authme.listener.EntityListener;
+import fr.xephi.authme.listener.GuiCaptchaHandler;
+import fr.xephi.authme.listener.LoginLocationFixListener;
import fr.xephi.authme.listener.PlayerListener;
import fr.xephi.authme.listener.PlayerListener111;
import fr.xephi.authme.listener.PlayerListener19;
import fr.xephi.authme.listener.PlayerListener19Spigot;
+import fr.xephi.authme.listener.PlayerListenerHigherThan18;
import fr.xephi.authme.listener.ServerListener;
+import fr.xephi.authme.mail.EmailService;
import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.security.crypts.Sha256;
import fr.xephi.authme.service.BackupService;
@@ -28,6 +34,8 @@ import fr.xephi.authme.service.bungeecord.BungeeReceiver;
import fr.xephi.authme.service.yaml.YamlParseException;
import fr.xephi.authme.settings.Settings;
import fr.xephi.authme.settings.SettingsWarner;
+import fr.xephi.authme.settings.properties.EmailSettings;
+import fr.xephi.authme.settings.properties.HooksSettings;
import fr.xephi.authme.settings.properties.SecuritySettings;
import fr.xephi.authme.task.CleanupTask;
import fr.xephi.authme.task.purge.PurgeService;
@@ -35,14 +43,21 @@ import fr.xephi.authme.util.ExceptionUtils;
import org.bukkit.Server;
import org.bukkit.command.Command;
import org.bukkit.command.CommandSender;
-import org.bukkit.plugin.PluginDescriptionFile;
import org.bukkit.plugin.PluginManager;
import org.bukkit.plugin.java.JavaPlugin;
-import org.bukkit.plugin.java.JavaPluginLoader;
import org.bukkit.scheduler.BukkitScheduler;
+import org.jetbrains.annotations.NotNull;
+import javax.inject.Inject;
import java.io.File;
+import java.io.IOException;
+import java.net.HttpURLConnection;
+import java.net.URL;
+import java.text.SimpleDateFormat;
+import java.util.Date;
+import java.util.Scanner;
import java.util.function.Consumer;
+import java.util.logging.Level;
import static fr.xephi.authme.service.BukkitService.TICKS_PER_MINUTE;
import static fr.xephi.authme.util.Utils.isClassLoaded;
@@ -58,17 +73,19 @@ public class AuthMe extends JavaPlugin {
private static final int CLEANUP_INTERVAL = 5 * TICKS_PER_MINUTE;
// Version and build number values
- private static String pluginVersion = "N/D";
- private static String pluginBuildNumber = "Unknown";
-
+ private static String pluginVersion = "5.6.0-Fork";
+ private static final String pluginBuild = "b";
+ private static String pluginBuildNumber = "42";
// Private instances
+ private EmailService emailService;
private CommandHandler commandHandler;
- private Settings settings;
+ @Inject
+ public static Settings settings;
private DataSource database;
private BukkitService bukkitService;
private Injector injector;
private BackupService backupService;
- private ConsoleLogger logger;
+ public static ConsoleLogger logger;
/**
* Constructor.
@@ -76,14 +93,16 @@ public class AuthMe extends JavaPlugin {
public AuthMe() {
}
- /*
- * Constructor for unit testing.
+ /**
+ * Get the plugin's build
+ *
+ * @return The plugin's build
*/
- @VisibleForTesting
- AuthMe(JavaPluginLoader loader, PluginDescriptionFile description, File dataFolder, File file) {
- super(loader, description, dataFolder, file);
+ public static String getPluginBuild() {
+ return pluginBuild;
}
+
/**
* Get the plugin's name.
*
@@ -111,6 +130,8 @@ public class AuthMe extends JavaPlugin {
return pluginBuildNumber;
}
+
+
/**
* Method called when the server enables the plugin.
*/
@@ -122,6 +143,8 @@ public class AuthMe extends JavaPlugin {
// Set the Logger instance and log file path
ConsoleLogger.initialize(getLogger(), new File(getDataFolder(), LOG_FILENAME));
logger = ConsoleLoggerFactory.get(AuthMe.class);
+ logger.info("You are running an unofficial fork version of AuthMe!");
+
// Check server version
if (!isClassLoaded("org.spigotmc.event.player.PlayerSpawnLocationEvent")
@@ -162,26 +185,42 @@ public class AuthMe extends JavaPlugin {
// Schedule clean up task
CleanupTask cleanupTask = injector.getSingleton(CleanupTask.class);
cleanupTask.runTaskTimerAsynchronously(this, CLEANUP_INTERVAL, CLEANUP_INTERVAL);
-
// Do a backup on start
backupService.doBackup(BackupService.BackupCause.START);
-
// Set up Metrics
OnStartupTasks.sendMetrics(this, settings);
-
+ if (settings.getProperty(SecuritySettings.SHOW_STARTUP_BANNER)) {
+ logger.info("\n" + " ___ __ __ __ ___ \n" +
+ " / | __ __/ /_/ /_ / |/ /__ \n" +
+ " / /| |/ / / / __/ __ \\/ /|_/ / _ \\\n" +
+ " / ___ / /_/ / /_/ / / / / / / __/\n" +
+ "/_/ |_\\__,_/\\__/_/ /_/_/ /_/\\___/ \n" +
+ " ");
+ }
// Successful message
- logger.info("AuthMe " + getPluginVersion() + " build n." + getPluginBuildNumber() + " successfully enabled!");
-
+ //detect server brand with classloader
+ checkServerType();
+ logger.info("AuthMeReReloaded is enabled successfully!");
// Purge on start if enabled
PurgeService purgeService = injector.getSingleton(PurgeService.class);
purgeService.runAutoPurge();
+ // 注册玩家加入事件监听
+// register3rdPartyListeners();
+ logger.info("GitHub: https://github.com/HaHaWTH/AuthMeReReloaded/");
+ if (settings.getProperty(SecuritySettings.CHECK_FOR_UPDATES)) {
+ checkForUpdates();
+ }
}
+
+ //Migrated
+
/**
* Load the version and build number of the plugin from the description file.
*
* @param versionRaw the version as given by the plugin description file
*/
+
private static void loadPluginInfo(String versionRaw) {
int index = versionRaw.lastIndexOf("-");
if (index != -1) {
@@ -245,6 +284,7 @@ public class AuthMe extends JavaPlugin {
database = injector.getSingleton(DataSource.class);
bukkitService = injector.getSingleton(BukkitService.class);
commandHandler = injector.getSingleton(CommandHandler.class);
+ emailService = injector.getSingleton(EmailService.class);
backupService = injector.getSingleton(BackupService.class);
// Trigger instantiation (class not used elsewhere)
@@ -269,10 +309,17 @@ public class AuthMe extends JavaPlugin {
pluginManager.registerEvents(injector.getSingleton(EntityListener.class), this);
pluginManager.registerEvents(injector.getSingleton(ServerListener.class), this);
- // Try to register 1.9 player listeners
- if (isClassLoaded("org.bukkit.event.player.PlayerSwapHandItemsEvent")) {
+
+ // Try to register 1.8+ player listeners
+ if (isClassLoaded("org.bukkit.event.entity.EntityPickupItemEvent") && isClassLoaded("org.bukkit.event.player.PlayerSwapHandItemsEvent")) {
+ pluginManager.registerEvents(injector.getSingleton(PlayerListenerHigherThan18.class), this);
+ } else if (isClassLoaded("org.bukkit.event.player.PlayerSwapHandItemsEvent")) {
pluginManager.registerEvents(injector.getSingleton(PlayerListener19.class), this);
}
+// Try to register 1.9 player listeners(Moved to else-if)
+// if (isClassLoaded("org.bukkit.event.player.PlayerSwapHandItemsEvent")) {
+// pluginManager.registerEvents(injector.getSingleton(PlayerListener19.class), this);
+// }
// Try to register 1.9 spigot player listeners
if (isClassLoaded("org.spigotmc.event.player.PlayerSpawnLocationEvent")) {
@@ -283,6 +330,31 @@ public class AuthMe extends JavaPlugin {
if (isClassLoaded("org.bukkit.event.entity.EntityAirChangeEvent")) {
pluginManager.registerEvents(injector.getSingleton(PlayerListener111.class), this);
}
+
+ //Register 3rd party listeners
+ if (settings.getProperty(SecuritySettings.GUI_CAPTCHA) && getServer().getPluginManager().getPlugin("ProtocolLib") != null) {
+ pluginManager.registerEvents(injector.getSingleton(GuiCaptchaHandler.class), this);
+ logger.info("(Beta)GUICaptcha is enabled successfully!");
+ logger.info("These features are still in early development, if you encountered any problem, please report.");
+ } else if (settings.getProperty(SecuritySettings.GUI_CAPTCHA) && getServer().getPluginManager().getPlugin("ProtocolLib") == null) {
+ logger.warning("ProtocolLib is not loaded, can't enable GUI Captcha.");
+ }
+ if (settings.getProperty(SecuritySettings.FORCE_LOGIN_BEDROCK) && settings.getProperty(HooksSettings.HOOK_FLOODGATE_PLAYER) && getServer().getPluginManager().getPlugin("floodgate") != null) {
+ pluginManager.registerEvents(injector.getSingleton(BedrockAutoLoginListener.class), this);
+ } else if (settings.getProperty(SecuritySettings.FORCE_LOGIN_BEDROCK) && (!settings.getProperty(HooksSettings.HOOK_FLOODGATE_PLAYER) || getServer().getPluginManager().getPlugin("floodgate") == null)) {
+ logger.warning("Failed to enable BedrockAutoLogin, ensure hookFloodgate: true and floodgate is loaded.");
+ }
+ if (settings.getProperty(SecuritySettings.LOGIN_LOC_FIX_SUB_UNDERGROUND) || settings.getProperty(SecuritySettings.LOGIN_LOC_FIX_SUB_PORTAL)) {
+ pluginManager.registerEvents(injector.getSingleton(LoginLocationFixListener.class), this);
+ }
+ if (settings.getProperty(SecuritySettings.ANTI_GHOST_PLAYERS)) {
+ pluginManager.registerEvents(injector.getSingleton(DoubleLoginFixListener.class), this);
+ }
+ if (settings.getProperty(SecuritySettings.ADVANCED_SHULKER_FIX) && !isClassLoaded("org.bukkit.event.player.PlayerCommandSendEvent")) {
+ pluginManager.registerEvents(injector.getSingleton(AdvancedShulkerFixListener.class), this);
+ } else if (settings.getProperty(SecuritySettings.ADVANCED_SHULKER_FIX) && isClassLoaded("org.bukkit.event.player.PlayerCommandSendEvent")) {
+ logger.warning("You are running an 1.13+ minecraft server, advancedShulkerFix won't enable.");
+ }
}
/**
@@ -307,6 +379,11 @@ public class AuthMe extends JavaPlugin {
if (onShutdownPlayerSaver != null) {
onShutdownPlayerSaver.saveAllPlayers();
}
+ if (settings.getProperty(EmailSettings.SHUTDOWN_MAIL)){
+ SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'.'MM'.'dd'.' HH:mm:ss");
+ Date date = new Date(System.currentTimeMillis());
+ emailService.sendShutDown(settings.getProperty(EmailSettings.SHUTDOWN_MAIL_ADDRESS),dateFormat.format(date));
+ }
// Do backup on stop if enabled
if (backupService != null) {
@@ -318,10 +395,76 @@ public class AuthMe extends JavaPlugin {
// Disabled correctly
Consumer infoLogMethod = logger == null ? getLogger()::info : logger::info;
- infoLogMethod.accept("AuthMe " + this.getDescription().getVersion() + " disabled!");
+ infoLogMethod.accept("AuthMe " + this.getDescription().getVersion() + " is unloaded successfully!");
ConsoleLogger.closeFileWriter();
}
+ private static final String owner = "HaHaWTH";
+// private static final String owner_gitee = "Shixuehan114514";
+ private static final String repo = "AuthMeReReloaded";
+
+ private void checkForUpdates() {
+ logger.info("Checking for updates...");
+ bukkitService.runTaskAsynchronously(() -> {
+ try {
+ // 从南通集线器获取最新版本号
+ URL url = new URL("https://api.github.com/repos/" + owner + "/" + repo + "/releases/latest");
+ HttpURLConnection conn = (HttpURLConnection) url.openConnection();
+ conn.setConnectTimeout(10000); // 设置连接超时为10秒
+ conn.setReadTimeout(10000); // 设置读取超时为10秒
+ Scanner scanner = new Scanner(conn.getInputStream());
+ String response = scanner.useDelimiter("\\Z").next();
+ scanner.close();
+
+ // 处理JSON响应
+ String latestVersion = response.substring(response.indexOf("tag_name") + 11);
+ latestVersion = latestVersion.substring(0, latestVersion.indexOf("\""));
+ if (isUpdateAvailable(latestVersion)) {
+ String message = "New version available! Latest:" + latestVersion + " Current:" + pluginBuild + pluginBuildNumber;
+ getLogger().log(Level.WARNING, message);
+ getLogger().log(Level.WARNING, "Download from here: https://github.com/HaHaWTH/AuthMeReReloaded/releases/latest");
+ } else {
+ getLogger().log(Level.INFO, "You are running the latest version.");
+ }
+ } catch (IOException ignored) {
+ }
+ });
+ }
+ private boolean isUpdateAvailable(String latestVersion) {
+ // Extract the first character and the remaining digits from the version string
+ char latestChar = latestVersion.charAt(0);
+ int latestNumber = Integer.parseInt(latestVersion.substring(1));
+
+ char currentChar = pluginBuild.charAt(0);
+ int currentNumber = Integer.parseInt(pluginBuildNumber);
+
+ // Compare the characters first
+ if (latestChar > currentChar) {
+ return true;
+ } else if (latestChar < currentChar) {
+ return false;
+ } else {
+ // If the characters are the same, compare the numbers
+ return latestNumber > currentNumber;
+ }
+ }
+
+
+ private void checkServerType() {
+ if (isClassLoaded("com.destroystokyo.paper.PaperConfig")) {
+ logger.info("AuthMeReReloaded is running on Paper");
+ } else if (isClassLoaded("catserver.server.CatServerConfig")) {
+ logger.info("AuthMeReReloaded is running on CatServer");
+ } else if (isClassLoaded("org.spigotmc.SpigotConfig")) {
+ logger.info("AuthMeReReloaded is running on Spigot");
+ } else if (isClassLoaded("org.bukkit.craftbukkit.CraftServer")) {
+ logger.info("AuthMeReReloaded is running on Bukkit");
+ } else {
+ logger.info("AuthMeReReloaded is running on Unknown*");
+ }
+ }
+
+
/**
* Handle Bukkit commands.
*
@@ -332,8 +475,8 @@ public class AuthMe extends JavaPlugin {
* @return True if the command was executed, false otherwise.
*/
@Override
- public boolean onCommand(CommandSender sender, Command cmd,
- String commandLabel, String[] args) {
+ public boolean onCommand(@NotNull CommandSender sender, @NotNull Command cmd,
+ @NotNull String commandLabel, String[] args) {
// Make sure the command handler has been initialized
if (commandHandler == null) {
getLogger().severe("AuthMe command handler is not available");
diff --git a/src/main/java/fr/xephi/authme/ConsoleLogger.java b/src/main/java/fr/xephi/authme/ConsoleLogger.java
index 88798ced..1b1d6788 100644
--- a/src/main/java/fr/xephi/authme/ConsoleLogger.java
+++ b/src/main/java/fr/xephi/authme/ConsoleLogger.java
@@ -142,7 +142,7 @@ public final class ConsoleLogger {
public void fine(String message) {
if (logLevel.includes(LogLevel.FINE)) {
logger.info(message);
- writeLog("[FINE] " + message);
+ writeLog("[INFO:FINE] " + message);
}
}
@@ -215,7 +215,7 @@ public final class ConsoleLogger {
}
private void logAndWriteWithDebugPrefix(String message) {
- String debugMessage = "[DEBUG] " + message;
+ String debugMessage = "[INFO:DEBUG] " + message;
logger.info(debugMessage);
writeLog(debugMessage);
}
diff --git a/src/main/java/fr/xephi/authme/command/executable/authme/ConverterCommand.java b/src/main/java/fr/xephi/authme/command/executable/authme/ConverterCommand.java
index b035b63e..1645a560 100644
--- a/src/main/java/fr/xephi/authme/command/executable/authme/ConverterCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/authme/ConverterCommand.java
@@ -11,11 +11,12 @@ import fr.xephi.authme.datasource.converter.LoginSecurityConverter;
import fr.xephi.authme.datasource.converter.MySqlToSqlite;
import fr.xephi.authme.datasource.converter.RakamakConverter;
import fr.xephi.authme.datasource.converter.RoyalAuthConverter;
+import fr.xephi.authme.datasource.converter.SqliteToH2;
import fr.xephi.authme.datasource.converter.SqliteToSql;
import fr.xephi.authme.datasource.converter.VAuthConverter;
import fr.xephi.authme.datasource.converter.XAuthConverter;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.service.BukkitService;
import fr.xephi.authme.service.CommonService;
import org.bukkit.command.CommandSender;
@@ -89,6 +90,7 @@ public class ConverterCommand implements ExecutableCommand {
.put("vauth", VAuthConverter.class)
.put("sqlitetosql", SqliteToSql.class)
.put("mysqltosqlite", MySqlToSqlite.class)
+ .put("sqlitetoh2", SqliteToH2.class)
.put("loginsecurity", LoginSecurityConverter.class)
.build();
}
diff --git a/src/main/java/fr/xephi/authme/command/executable/authme/FirstSpawnCommand.java b/src/main/java/fr/xephi/authme/command/executable/authme/FirstSpawnCommand.java
index acfc59be..7bd7d7cc 100644
--- a/src/main/java/fr/xephi/authme/command/executable/authme/FirstSpawnCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/authme/FirstSpawnCommand.java
@@ -1,7 +1,10 @@
package fr.xephi.authme.command.executable.authme;
import fr.xephi.authme.command.PlayerCommand;
+import fr.xephi.authme.settings.Settings;
import fr.xephi.authme.settings.SpawnLoader;
+import fr.xephi.authme.settings.properties.SecuritySettings;
+import fr.xephi.authme.util.TeleportUtils;
import org.bukkit.entity.Player;
import javax.inject.Inject;
@@ -11,16 +14,22 @@ import java.util.List;
* Teleports the player to the first spawn.
*/
public class FirstSpawnCommand extends PlayerCommand {
-
+ @Inject
+ private Settings settings;
@Inject
private SpawnLoader spawnLoader;
-
@Override
public void runCommand(Player player, List arguments) {
if (spawnLoader.getFirstSpawn() == null) {
player.sendMessage("[AuthMe] First spawn has failed, please try to define the first spawn");
} else {
- player.teleport(spawnLoader.getFirstSpawn());
+ //String name= player.getName();
+ if(settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
+ TeleportUtils.teleport(player, spawnLoader.getFirstSpawn());
+ } else {
+ player.teleport(spawnLoader.getFirstSpawn());
+ }
+ //player.teleport(spawnLoader.getFirstSpawn());
}
}
}
diff --git a/src/main/java/fr/xephi/authme/command/executable/authme/RegisterAdminCommand.java b/src/main/java/fr/xephi/authme/command/executable/authme/RegisterAdminCommand.java
index eaa56a41..a189b964 100644
--- a/src/main/java/fr/xephi/authme/command/executable/authme/RegisterAdminCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/authme/RegisterAdminCommand.java
@@ -4,8 +4,8 @@ import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.command.ExecutableCommand;
import fr.xephi.authme.data.auth.PlayerAuth;
import fr.xephi.authme.datasource.DataSource;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.security.PasswordSecurity;
import fr.xephi.authme.security.crypts.HashedPassword;
import fr.xephi.authme.service.BukkitService;
diff --git a/src/main/java/fr/xephi/authme/command/executable/authme/ReloadCommand.java b/src/main/java/fr/xephi/authme/command/executable/authme/ReloadCommand.java
index 84de195c..2956a39f 100644
--- a/src/main/java/fr/xephi/authme/command/executable/authme/ReloadCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/authme/ReloadCommand.java
@@ -7,8 +7,8 @@ import fr.xephi.authme.command.ExecutableCommand;
import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.initialization.Reloadable;
import fr.xephi.authme.initialization.SettingsDependent;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.service.CommonService;
import fr.xephi.authme.settings.Settings;
import fr.xephi.authme.settings.SettingsWarner;
diff --git a/src/main/java/fr/xephi/authme/command/executable/authme/VersionCommand.java b/src/main/java/fr/xephi/authme/command/executable/authme/VersionCommand.java
index 5c6abed5..2f7e8a7c 100644
--- a/src/main/java/fr/xephi/authme/command/executable/authme/VersionCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/authme/VersionCommand.java
@@ -3,6 +3,8 @@ package fr.xephi.authme.command.executable.authme;
import fr.xephi.authme.AuthMe;
import fr.xephi.authme.command.ExecutableCommand;
import fr.xephi.authme.service.BukkitService;
+import fr.xephi.authme.settings.Settings;
+import fr.xephi.authme.settings.properties.DatabaseSettings;
import org.bukkit.ChatColor;
import org.bukkit.command.CommandSender;
import org.bukkit.entity.Player;
@@ -17,6 +19,8 @@ public class VersionCommand implements ExecutableCommand {
@Inject
private BukkitService bukkitService;
+ @Inject
+ private Settings settings;
@Override
public void executeCommand(CommandSender sender, List arguments) {
@@ -24,6 +28,7 @@ public class VersionCommand implements ExecutableCommand {
sender.sendMessage(ChatColor.GOLD + "==========[ " + AuthMe.getPluginName() + " ABOUT ]==========");
sender.sendMessage(ChatColor.GOLD + "Version: " + ChatColor.WHITE + AuthMe.getPluginName()
+ " v" + AuthMe.getPluginVersion() + ChatColor.GRAY + " (build: " + AuthMe.getPluginBuildNumber() + ")");
+ sender.sendMessage(ChatColor.GOLD + "Database Implementation: " + ChatColor.WHITE + settings.getProperty(DatabaseSettings.BACKEND).toString());
sender.sendMessage(ChatColor.GOLD + "Authors:");
Collection onlinePlayers = bukkitService.getOnlinePlayers();
printDeveloper(sender, "Gabriele C.", "sgdc3", "Project manager, Contributor", onlinePlayers);
diff --git a/src/main/java/fr/xephi/authme/command/executable/authme/debug/TestEmailSender.java b/src/main/java/fr/xephi/authme/command/executable/authme/debug/TestEmailSender.java
index f393db72..388a18af 100644
--- a/src/main/java/fr/xephi/authme/command/executable/authme/debug/TestEmailSender.java
+++ b/src/main/java/fr/xephi/authme/command/executable/authme/debug/TestEmailSender.java
@@ -3,8 +3,8 @@ package fr.xephi.authme.command.executable.authme.debug;
import ch.jalu.datasourcecolumns.data.DataSourceValue;
import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.datasource.DataSource;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.mail.SendMailSsl;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.permission.DebugSectionPermissions;
import fr.xephi.authme.permission.PermissionNode;
import fr.xephi.authme.util.StringUtils;
diff --git a/src/main/java/fr/xephi/authme/command/executable/changepassword/ChangePasswordCommand.java b/src/main/java/fr/xephi/authme/command/executable/changepassword/ChangePasswordCommand.java
index 72ff55bc..83a0e5b2 100644
--- a/src/main/java/fr/xephi/authme/command/executable/changepassword/ChangePasswordCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/changepassword/ChangePasswordCommand.java
@@ -42,7 +42,6 @@ public class ChangePasswordCommand extends PlayerCommand {
commonService.send(player, MessageKey.NOT_LOGGED_IN);
return;
}
-
// Check if the user has been verified or not
if (codeManager.isVerificationRequired(player)) {
codeManager.codeExistOrGenerateNew(name);
diff --git a/src/main/java/fr/xephi/authme/command/executable/email/EmailSetPasswordCommand.java b/src/main/java/fr/xephi/authme/command/executable/email/EmailSetPasswordCommand.java
index 734fc064..f3979adc 100644
--- a/src/main/java/fr/xephi/authme/command/executable/email/EmailSetPasswordCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/email/EmailSetPasswordCommand.java
@@ -3,8 +3,8 @@ package fr.xephi.authme.command.executable.email;
import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.command.PlayerCommand;
import fr.xephi.authme.datasource.DataSource;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.security.PasswordSecurity;
import fr.xephi.authme.security.crypts.HashedPassword;
import fr.xephi.authme.service.CommonService;
diff --git a/src/main/java/fr/xephi/authme/command/executable/email/RecoverEmailCommand.java b/src/main/java/fr/xephi/authme/command/executable/email/RecoverEmailCommand.java
index 5fa7e27f..ebb71133 100644
--- a/src/main/java/fr/xephi/authme/command/executable/email/RecoverEmailCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/email/RecoverEmailCommand.java
@@ -5,9 +5,9 @@ import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.command.PlayerCommand;
import fr.xephi.authme.data.auth.PlayerCache;
import fr.xephi.authme.datasource.DataSource;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.mail.EmailService;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.service.BukkitService;
import fr.xephi.authme.service.CommonService;
import fr.xephi.authme.service.PasswordRecoveryService;
diff --git a/src/main/java/fr/xephi/authme/command/executable/register/RegisterCommand.java b/src/main/java/fr/xephi/authme/command/executable/register/RegisterCommand.java
index 922e1104..d2185491 100644
--- a/src/main/java/fr/xephi/authme/command/executable/register/RegisterCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/register/RegisterCommand.java
@@ -3,9 +3,10 @@ package fr.xephi.authme.command.executable.register;
import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.command.PlayerCommand;
import fr.xephi.authme.data.captcha.RegistrationCaptchaManager;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
+import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.mail.EmailService;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.process.Management;
import fr.xephi.authme.process.register.RegisterSecondaryArgument;
import fr.xephi.authme.process.register.RegistrationType;
@@ -23,6 +24,8 @@ import org.bukkit.entity.Player;
import javax.inject.Inject;
import java.util.List;
+import java.util.Timer;
+import java.util.TimerTask;
import static fr.xephi.authme.process.register.RegisterSecondaryArgument.CONFIRMATION;
import static fr.xephi.authme.process.register.RegisterSecondaryArgument.EMAIL_MANDATORY;
@@ -43,6 +46,9 @@ public class RegisterCommand extends PlayerCommand {
@Inject
private CommonService commonService;
+ @Inject
+ private DataSource dataSource;
+
@Inject
private EmailService emailService;
@@ -169,6 +175,20 @@ public class RegisterCommand extends PlayerCommand {
} else if (isSecondArgValidForEmailRegistration(player, arguments)) {
management.performRegister(RegistrationMethod.EMAIL_REGISTRATION,
EmailRegisterParams.of(player, email));
+ Timer timer = new Timer();
+ timer.schedule(new TimerTask() {
+ @Override
+ public void run() {
+ if (dataSource.getAuth(player.getName()) != null) {
+ if (dataSource.getAuth(player.getName()).getLastLogin() == null) {
+ management.performUnregisterByAdmin(null, player.getName(), player);
+ timer.cancel();
+ }
+ } else {
+ timer.cancel();
+ }
+ }
+ }, 600000);
}
}
diff --git a/src/main/java/fr/xephi/authme/command/executable/totp/ConfirmTotpCommand.java b/src/main/java/fr/xephi/authme/command/executable/totp/ConfirmTotpCommand.java
index a4cd7857..85d7bc8a 100644
--- a/src/main/java/fr/xephi/authme/command/executable/totp/ConfirmTotpCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/totp/ConfirmTotpCommand.java
@@ -5,9 +5,9 @@ import fr.xephi.authme.command.PlayerCommand;
import fr.xephi.authme.data.auth.PlayerAuth;
import fr.xephi.authme.data.auth.PlayerCache;
import fr.xephi.authme.datasource.DataSource;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
import fr.xephi.authme.message.Messages;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.security.totp.GenerateTotpService;
import fr.xephi.authme.security.totp.TotpAuthenticator.TotpGenerationResult;
import org.bukkit.entity.Player;
diff --git a/src/main/java/fr/xephi/authme/command/executable/totp/RemoveTotpCommand.java b/src/main/java/fr/xephi/authme/command/executable/totp/RemoveTotpCommand.java
index bc3cdd3d..649f13e4 100644
--- a/src/main/java/fr/xephi/authme/command/executable/totp/RemoveTotpCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/totp/RemoveTotpCommand.java
@@ -5,9 +5,9 @@ import fr.xephi.authme.command.PlayerCommand;
import fr.xephi.authme.data.auth.PlayerAuth;
import fr.xephi.authme.data.auth.PlayerCache;
import fr.xephi.authme.datasource.DataSource;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
import fr.xephi.authme.message.Messages;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.security.totp.TotpAuthenticator;
import org.bukkit.entity.Player;
diff --git a/src/main/java/fr/xephi/authme/command/executable/totp/TotpCodeCommand.java b/src/main/java/fr/xephi/authme/command/executable/totp/TotpCodeCommand.java
index 1ac48374..760b83ec 100644
--- a/src/main/java/fr/xephi/authme/command/executable/totp/TotpCodeCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/totp/TotpCodeCommand.java
@@ -8,9 +8,9 @@ import fr.xephi.authme.data.limbo.LimboPlayer;
import fr.xephi.authme.data.limbo.LimboPlayerState;
import fr.xephi.authme.data.limbo.LimboService;
import fr.xephi.authme.datasource.DataSource;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
import fr.xephi.authme.message.Messages;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.process.login.AsynchronousLogin;
import fr.xephi.authme.security.totp.TotpAuthenticator;
import org.bukkit.entity.Player;
diff --git a/src/main/java/fr/xephi/authme/command/executable/verification/VerificationCommand.java b/src/main/java/fr/xephi/authme/command/executable/verification/VerificationCommand.java
index ac8ddb86..dc28c95f 100644
--- a/src/main/java/fr/xephi/authme/command/executable/verification/VerificationCommand.java
+++ b/src/main/java/fr/xephi/authme/command/executable/verification/VerificationCommand.java
@@ -3,8 +3,8 @@ package fr.xephi.authme.command.executable.verification;
import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.command.PlayerCommand;
import fr.xephi.authme.data.VerificationCodeManager;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.service.CommonService;
import org.bukkit.entity.Player;
diff --git a/src/main/java/fr/xephi/authme/data/VerificationCodeManager.java b/src/main/java/fr/xephi/authme/data/VerificationCodeManager.java
index 0a8ff061..ad1b778d 100644
--- a/src/main/java/fr/xephi/authme/data/VerificationCodeManager.java
+++ b/src/main/java/fr/xephi/authme/data/VerificationCodeManager.java
@@ -15,6 +15,8 @@ import fr.xephi.authme.util.expiring.ExpiringMap;
import org.bukkit.entity.Player;
import javax.inject.Inject;
+import java.text.SimpleDateFormat;
+import java.util.Date;
import java.util.HashSet;
import java.util.Locale;
import java.util.Set;
@@ -132,12 +134,14 @@ public class VerificationCodeManager implements SettingsDependent, HasCleanup {
*/
private void generateCode(String name) {
DataSourceValue emailResult = dataSource.getEmail(name);
+ SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
+ Date date = new Date(System.currentTimeMillis());
if (emailResult.rowExists()) {
final String email = emailResult.getValue();
if (!Utils.isEmailEmpty(email)) {
String code = RandomStringUtils.generateNum(6); // 6 digits code
verificationCodes.put(name.toLowerCase(Locale.ROOT), code);
- emailService.sendVerificationMail(name, email, code);
+ emailService.sendVerificationMail(name, email, code, dateFormat.format(date));
}
}
}
diff --git a/src/main/java/fr/xephi/authme/datasource/DataSourceType.java b/src/main/java/fr/xephi/authme/datasource/DataSourceType.java
index 841542a5..f36faba7 100644
--- a/src/main/java/fr/xephi/authme/datasource/DataSourceType.java
+++ b/src/main/java/fr/xephi/authme/datasource/DataSourceType.java
@@ -4,6 +4,7 @@ package fr.xephi.authme.datasource;
* DataSource type.
*/
public enum DataSourceType {
+ H2,
MYSQL,
diff --git a/src/main/java/fr/xephi/authme/datasource/H2.java b/src/main/java/fr/xephi/authme/datasource/H2.java
new file mode 100644
index 00000000..94b28f58
--- /dev/null
+++ b/src/main/java/fr/xephi/authme/datasource/H2.java
@@ -0,0 +1,422 @@
+package fr.xephi.authme.datasource;
+
+import com.google.common.annotations.VisibleForTesting;
+import fr.xephi.authme.ConsoleLogger;
+import fr.xephi.authme.data.auth.PlayerAuth;
+import fr.xephi.authme.datasource.columnshandler.AuthMeColumnsHandler;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
+import fr.xephi.authme.settings.Settings;
+import fr.xephi.authme.settings.properties.DatabaseSettings;
+
+import java.io.File;
+import java.sql.Connection;
+import java.sql.DatabaseMetaData;
+import java.sql.DriverManager;
+import java.sql.PreparedStatement;
+import java.sql.ResultSet;
+import java.sql.SQLException;
+import java.sql.Statement;
+import java.util.ArrayList;
+import java.util.Collection;
+import java.util.HashSet;
+import java.util.List;
+import java.util.Locale;
+import java.util.Set;
+
+import static fr.xephi.authme.datasource.SqlDataSourceUtils.getNullableLong;
+import static fr.xephi.authme.datasource.SqlDataSourceUtils.logSqlException;
+
+/**
+ * H2 data source.
+ */
+@SuppressWarnings({"checkstyle:AbbreviationAsWordInName"}) // Justification: Class name cannot be changed anymore
+public class H2 extends AbstractSqlDataSource {
+
+ private final ConsoleLogger logger = ConsoleLoggerFactory.get(H2.class);
+ private final Settings settings;
+ private final File dataFolder;
+ private final String database;
+ private final String tableName;
+ private final Columns col;
+ private Connection con;
+
+ /**
+ * Constructor for H2.
+ *
+ * @param settings The settings instance
+ * @param dataFolder The data folder
+ * @throws SQLException when initialization of a SQL datasource failed
+ */
+ public H2(Settings settings, File dataFolder) throws SQLException {
+ this.settings = settings;
+ this.dataFolder = dataFolder;
+ this.database = settings.getProperty(DatabaseSettings.MYSQL_DATABASE);
+ this.tableName = settings.getProperty(DatabaseSettings.MYSQL_TABLE);
+ this.col = new Columns(settings);
+
+ try {
+ this.connect();
+ this.setup();
+ } catch (Exception ex) {
+ logger.logException("Error during H2 initialization:", ex);
+ throw ex;
+ }
+ }
+
+ @VisibleForTesting
+ H2(Settings settings, File dataFolder, Connection connection) {
+ this.settings = settings;
+ this.dataFolder = dataFolder;
+ this.database = settings.getProperty(DatabaseSettings.MYSQL_DATABASE);
+ this.tableName = settings.getProperty(DatabaseSettings.MYSQL_TABLE);
+ this.col = new Columns(settings);
+ this.con = connection;
+ this.columnsHandler = AuthMeColumnsHandler.createForH2(con, settings);
+ }
+
+ /**
+ * Initializes the connection to the H2 database.
+ *
+ * @throws SQLException when an SQL error occurs while connecting
+ */
+ protected void connect() throws SQLException {
+ try {
+ Class.forName("org.h2.Driver");
+ } catch (ClassNotFoundException e) {
+ throw new IllegalStateException("Failed to load H2 JDBC class", e);
+ }
+
+ logger.debug("H2 driver loaded");
+ this.con = DriverManager.getConnection(this.getJdbcUrl(this.dataFolder.getAbsolutePath(), "", this.database));
+ this.columnsHandler = AuthMeColumnsHandler.createForSqlite(con, settings);
+ }
+
+ /**
+ * Creates the table if necessary, or adds any missing columns to the table.
+ *
+ * @throws SQLException when an SQL error occurs while initializing the database
+ */
+ @VisibleForTesting
+ @SuppressWarnings("checkstyle:CyclomaticComplexity")
+ protected void setup() throws SQLException {
+ try (Statement st = con.createStatement()) {
+ // Note: cannot add unique fields later on in SQLite, so we add it on initialization
+ st.executeUpdate("CREATE TABLE IF NOT EXISTS " + tableName + " ("
+ + col.ID + " INTEGER AUTO_INCREMENT, "
+ + col.NAME + " VARCHAR(255) NOT NULL UNIQUE, "
+ + "CONSTRAINT table_const_prim PRIMARY KEY (" + col.ID + "));");
+
+ DatabaseMetaData md = con.getMetaData();
+
+ if (isColumnMissing(md, col.REAL_NAME)) {
+ st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS "
+ + col.REAL_NAME + " VARCHAR(255) NOT NULL DEFAULT 'Player';");
+ }
+
+ if (isColumnMissing(md, col.PASSWORD)) {
+ st.executeUpdate("ALTER TABLE " + tableName
+ + " ADD COLUMN IF NOT EXISTS " + col.PASSWORD + " VARCHAR(255) NOT NULL DEFAULT '';");
+ }
+
+ if (!col.SALT.isEmpty() && isColumnMissing(md, col.SALT)) {
+ st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS " + col.SALT + " VARCHAR(255);");
+ }
+
+ if (isColumnMissing(md, col.LAST_IP)) {
+ st.executeUpdate("ALTER TABLE " + tableName
+ + " ADD COLUMN IF NOT EXISTS " + col.LAST_IP + " VARCHAR(40);");
+ }
+
+ if (isColumnMissing(md, col.LAST_LOGIN)) {
+ st.executeUpdate("ALTER TABLE " + tableName
+ + " ADD COLUMN IF NOT EXISTS " + col.LAST_LOGIN + " BIGINT;");
+ }
+
+ if (isColumnMissing(md, col.REGISTRATION_IP)) {
+ st.executeUpdate("ALTER TABLE " + tableName
+ + " ADD COLUMN IF NOT EXISTS " + col.REGISTRATION_IP + " VARCHAR(40);");
+ }
+
+ if (isColumnMissing(md, col.REGISTRATION_DATE)) {
+ addRegistrationDateColumn(st);
+ }
+
+ if (isColumnMissing(md, col.LASTLOC_X)) {
+ st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS " + col.LASTLOC_X
+ + " DOUBLE NOT NULL DEFAULT '0.0';");
+ st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS " + col.LASTLOC_Y
+ + " DOUBLE NOT NULL DEFAULT '0.0';");
+ st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS " + col.LASTLOC_Z
+ + " DOUBLE NOT NULL DEFAULT '0.0';");
+ }
+
+ if (isColumnMissing(md, col.LASTLOC_WORLD)) {
+ st.executeUpdate("ALTER TABLE " + tableName
+ + " ADD COLUMN IF NOT EXISTS " + col.LASTLOC_WORLD + " VARCHAR(255) NOT NULL DEFAULT 'world';");
+ }
+
+ if (isColumnMissing(md, col.LASTLOC_YAW)) {
+ st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS "
+ + col.LASTLOC_YAW + " FLOAT;");
+ }
+
+ if (isColumnMissing(md, col.LASTLOC_PITCH)) {
+ st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS "
+ + col.LASTLOC_PITCH + " FLOAT;");
+ }
+
+ if (isColumnMissing(md, col.EMAIL)) {
+ st.executeUpdate("ALTER TABLE " + tableName
+ + " ADD COLUMN IF NOT EXISTS " + col.EMAIL + " VARCHAR_IGNORECASE(255);");
+ }
+
+ if (isColumnMissing(md, col.IS_LOGGED)) {
+ st.executeUpdate("ALTER TABLE " + tableName
+ + " ADD COLUMN IF NOT EXISTS " + col.IS_LOGGED + " INT NOT NULL DEFAULT '0';");
+ }
+
+ if (isColumnMissing(md, col.HAS_SESSION)) {
+ st.executeUpdate("ALTER TABLE " + tableName
+ + " ADD COLUMN IF NOT EXISTS " + col.HAS_SESSION + " INT NOT NULL DEFAULT '0';");
+ }
+
+ if (isColumnMissing(md, col.TOTP_KEY)) {
+ st.executeUpdate("ALTER TABLE " + tableName
+ + " ADD COLUMN IF NOT EXISTS " + col.TOTP_KEY + " VARCHAR(32);");
+ }
+
+ if (!col.PLAYER_UUID.isEmpty() && isColumnMissing(md, col.PLAYER_UUID)) {
+ st.executeUpdate("ALTER TABLE " + tableName
+ + " ADD COLUMN IF NOT EXISTS " + col.PLAYER_UUID + " VARCHAR(36)");
+ }
+ }
+ logger.info("H2 Setup finished");
+ }
+
+ /**
+ * Checks if a column is missing in the specified table.
+ * @param columnName the name of the column to look for
+ * @return true if the column is missing, false if it exists
+ * @throws SQLException if an error occurs while executing SQL or accessing the result set
+ * @deprecated Not work in H2, it always returns true
+ */
+ @Deprecated
+ private boolean isColumnMissing(DatabaseMetaData metaData, String columnName) throws SQLException {
+ String query = "SELECT * FROM INFORMATION_SCHEMA.COLUMNS WHERE TABLE_NAME = ? AND COLUMN_NAME = ?";
+// try (PreparedStatement preparedStatement = con.prepareStatement(query)) {
+// preparedStatement.setString(1, tableName);
+// preparedStatement.setString(2, columnName.toUpperCase());
+// try (ResultSet rs = preparedStatement.executeQuery()) {
+// return !rs.next();
+// }
+// }
+ return true;
+ }
+
+
+ @Override
+ public void reload() {
+ close(con);
+ try {
+ this.connect();
+ this.setup();
+ } catch (SQLException ex) {
+ logger.logException("Error while reloading H2:", ex);
+ }
+ }
+
+ @Override
+ public PlayerAuth getAuth(String user) {
+ String sql = "SELECT * FROM " + tableName + " WHERE LOWER(" + col.NAME + ")=LOWER(?);";
+ try (PreparedStatement pst = con.prepareStatement(sql)) {
+ pst.setString(1, user);
+ try (ResultSet rs = pst.executeQuery()) {
+ if (rs.next()) {
+ return buildAuthFromResultSet(rs);
+ }
+ }
+ } catch (SQLException ex) {
+ logSqlException(ex);
+ }
+ return null;
+ }
+
+ @Override
+ public Set getRecordsToPurge(long until) {
+ Set list = new HashSet<>();
+ String select = "SELECT " + col.NAME + " FROM " + tableName + " WHERE MAX("
+ + " COALESCE(" + col.LAST_LOGIN + ", 0),"
+ + " COALESCE(" + col.REGISTRATION_DATE + ", 0)"
+ + ") < ?;";
+ try (PreparedStatement selectPst = con.prepareStatement(select)) {
+ selectPst.setLong(1, until);
+ try (ResultSet rs = selectPst.executeQuery()) {
+ while (rs.next()) {
+ list.add(rs.getString(col.NAME));
+ }
+ }
+ } catch (SQLException ex) {
+ logSqlException(ex);
+ }
+
+ return list;
+ }
+
+ @Override
+ public void purgeRecords(Collection toPurge) {
+ String delete = "DELETE FROM " + tableName + " WHERE " + col.NAME + "=?;";
+ try (PreparedStatement deletePst = con.prepareStatement(delete)) {
+ for (String name : toPurge) {
+ deletePst.setString(1, name.toLowerCase(Locale.ROOT));
+ deletePst.executeUpdate();
+ }
+ } catch (SQLException ex) {
+ logSqlException(ex);
+ }
+ }
+
+ @Override
+ public boolean removeAuth(String user) {
+ String sql = "DELETE FROM " + tableName + " WHERE " + col.NAME + "=?;";
+ try (PreparedStatement pst = con.prepareStatement(sql)) {
+ pst.setString(1, user.toLowerCase(Locale.ROOT));
+ pst.executeUpdate();
+ return true;
+ } catch (SQLException ex) {
+ logSqlException(ex);
+ }
+ return false;
+ }
+
+ @Override
+ public void closeConnection() {
+ try {
+ if (con != null && !con.isClosed()) {
+ con.close();
+ }
+ } catch (SQLException ex) {
+ logSqlException(ex);
+ }
+ }
+
+ @Override
+ public DataSourceType getType() {
+ return DataSourceType.H2;
+ }
+
+ @Override
+ public List getAllAuths() {
+ List auths = new ArrayList<>();
+ String sql = "SELECT * FROM " + tableName + ";";
+ try (PreparedStatement pst = con.prepareStatement(sql); ResultSet rs = pst.executeQuery()) {
+ while (rs.next()) {
+ PlayerAuth auth = buildAuthFromResultSet(rs);
+ auths.add(auth);
+ }
+ } catch (SQLException ex) {
+ logSqlException(ex);
+ }
+ return auths;
+ }
+
+ @Override
+ public List getLoggedPlayersWithEmptyMail() {
+ List players = new ArrayList<>();
+ String sql = "SELECT " + col.REAL_NAME + " FROM " + tableName + " WHERE " + col.IS_LOGGED + " = 1"
+ + " AND (" + col.EMAIL + " = 'your@email.com' OR " + col.EMAIL + " IS NULL);";
+ try (Statement st = con.createStatement(); ResultSet rs = st.executeQuery(sql)) {
+ while (rs.next()) {
+ players.add(rs.getString(1));
+ }
+ } catch (SQLException ex) {
+ logSqlException(ex);
+ }
+ return players;
+ }
+
+ @Override
+ public List getRecentlyLoggedInPlayers() {
+ List players = new ArrayList<>();
+ String sql = "SELECT * FROM " + tableName + " ORDER BY " + col.LAST_LOGIN + " DESC LIMIT 10;";
+ try (Statement st = con.createStatement(); ResultSet rs = st.executeQuery(sql)) {
+ while (rs.next()) {
+ players.add(buildAuthFromResultSet(rs));
+ }
+ } catch (SQLException e) {
+ logSqlException(e);
+ }
+ return players;
+ }
+
+
+ @Override
+ public boolean setTotpKey(String user, String totpKey) {
+ String sql = "UPDATE " + tableName + " SET " + col.TOTP_KEY + " = ? WHERE " + col.NAME + " = ?";
+ try (PreparedStatement pst = con.prepareStatement(sql)) {
+ pst.setString(1, totpKey);
+ pst.setString(2, user.toLowerCase(Locale.ROOT));
+ pst.executeUpdate();
+ return true;
+ } catch (SQLException e) {
+ logSqlException(e);
+ }
+ return false;
+ }
+
+ private PlayerAuth buildAuthFromResultSet(ResultSet row) throws SQLException {
+ String salt = !col.SALT.isEmpty() ? row.getString(col.SALT) : null;
+
+ return PlayerAuth.builder()
+ .name(row.getString(col.NAME))
+ .email(row.getString(col.EMAIL))
+ .realName(row.getString(col.REAL_NAME))
+ .password(row.getString(col.PASSWORD), salt)
+ .totpKey(row.getString(col.TOTP_KEY))
+ .lastLogin(getNullableLong(row, col.LAST_LOGIN))
+ .lastIp(row.getString(col.LAST_IP))
+ .registrationDate(row.getLong(col.REGISTRATION_DATE))
+ .registrationIp(row.getString(col.REGISTRATION_IP))
+ .locX(row.getDouble(col.LASTLOC_X))
+ .locY(row.getDouble(col.LASTLOC_Y))
+ .locZ(row.getDouble(col.LASTLOC_Z))
+ .locWorld(row.getString(col.LASTLOC_WORLD))
+ .locYaw(row.getFloat(col.LASTLOC_YAW))
+ .locPitch(row.getFloat(col.LASTLOC_PITCH))
+ .build();
+ }
+
+ /**
+ * Creates the column for registration date and sets all entries to the current timestamp.
+ * We do so in order to avoid issues with purging, where entries with 0 / NULL might get
+ * purged immediately on startup otherwise.
+ *
+ * @param st Statement object to the database
+ */
+ private void addRegistrationDateColumn(Statement st) throws SQLException {
+ int affect = st.executeUpdate("ALTER TABLE " + tableName
+ + " ADD COLUMN IF NOT EXISTS " + col.REGISTRATION_DATE + " BIGINT NOT NULL DEFAULT '0';");
+ if (affect > 0) {
+ long currentTimestamp = System.currentTimeMillis();
+ int updatedRows = st.executeUpdate(String.format("UPDATE %s SET %s = %d;",
+ tableName, col.REGISTRATION_DATE, currentTimestamp));
+ logger.info("Created column '" + col.REGISTRATION_DATE + "' and set the current timestamp, "
+ + currentTimestamp + ", to all " + updatedRows + " rows");
+ }
+ }
+
+ @Override
+ String getJdbcUrl(String dataPath, String ignored, String database) {
+ return "jdbc:h2:" + dataPath + File.separator + database;
+ }
+
+ private static void close(Connection con) {
+ if (con != null) {
+ try {
+ con.close();
+ } catch (SQLException ex) {
+ logSqlException(ex);
+ }
+ }
+ }
+}
+
diff --git a/src/main/java/fr/xephi/authme/datasource/columnshandler/AuthMeColumns.java b/src/main/java/fr/xephi/authme/datasource/columnshandler/AuthMeColumns.java
index 7c4d2e6a..47851a5a 100644
--- a/src/main/java/fr/xephi/authme/datasource/columnshandler/AuthMeColumns.java
+++ b/src/main/java/fr/xephi/authme/datasource/columnshandler/AuthMeColumns.java
@@ -3,8 +3,6 @@ package fr.xephi.authme.datasource.columnshandler;
import fr.xephi.authme.data.auth.PlayerAuth;
import fr.xephi.authme.settings.properties.DatabaseSettings;
-import java.util.UUID;
-
import static fr.xephi.authme.datasource.columnshandler.AuthMeColumnsFactory.ColumnOptions.DEFAULT_FOR_NULL;
import static fr.xephi.authme.datasource.columnshandler.AuthMeColumnsFactory.ColumnOptions.OPTIONAL;
import static fr.xephi.authme.datasource.columnshandler.AuthMeColumnsFactory.createDouble;
diff --git a/src/main/java/fr/xephi/authme/datasource/columnshandler/AuthMeColumnsHandler.java b/src/main/java/fr/xephi/authme/datasource/columnshandler/AuthMeColumnsHandler.java
index fc172dcf..b910d36e 100644
--- a/src/main/java/fr/xephi/authme/datasource/columnshandler/AuthMeColumnsHandler.java
+++ b/src/main/java/fr/xephi/authme/datasource/columnshandler/AuthMeColumnsHandler.java
@@ -51,6 +51,26 @@ public final class AuthMeColumnsHandler {
return new AuthMeColumnsHandler(sqlColHandler);
}
+ /**
+ * Creates a column handler for H2.
+ *
+ * @param connection the connection to the database
+ * @param settings plugin settings
+ * @return created column handler
+ */
+ public static AuthMeColumnsHandler createForH2(Connection connection, Settings settings) {
+ ColumnContext columnContext = new ColumnContext(settings, false);
+ String tableName = settings.getProperty(DatabaseSettings.MYSQL_TABLE);
+ String nameColumn = settings.getProperty(DatabaseSettings.MYSQL_COL_NAME);
+
+ SqlColumnsHandler sqlColHandler = new SqlColumnsHandler<>(
+ forSingleConnection(connection, tableName, nameColumn, columnContext)
+ .setPredicateSqlGenerator(new PredicateSqlGenerator<>(columnContext, false))
+ );
+ return new AuthMeColumnsHandler(sqlColHandler);
+ }
+
+
/**
* Creates a column handler for MySQL.
*
diff --git a/src/main/java/fr/xephi/authme/datasource/converter/SqliteToH2.java b/src/main/java/fr/xephi/authme/datasource/converter/SqliteToH2.java
new file mode 100644
index 00000000..eea2bfca
--- /dev/null
+++ b/src/main/java/fr/xephi/authme/datasource/converter/SqliteToH2.java
@@ -0,0 +1,33 @@
+package fr.xephi.authme.datasource.converter;
+
+import fr.xephi.authme.datasource.DataSource;
+import fr.xephi.authme.datasource.DataSourceType;
+import fr.xephi.authme.datasource.SQLite;
+import fr.xephi.authme.initialization.DataFolder;
+import fr.xephi.authme.settings.Settings;
+
+import javax.inject.Inject;
+import java.io.File;
+import java.sql.SQLException;
+
+/**
+ * Converts SQLite to H2
+ *
+ */
+public class SqliteToH2 extends AbstractDataSourceConverter{
+
+ private final Settings settings;
+ private final File dataFolder;
+
+ @Inject
+ SqliteToH2(Settings settings, DataSource dataSource, @DataFolder File dataFolder) {
+ super(dataSource, DataSourceType.H2);
+ this.settings = settings;
+ this.dataFolder = dataFolder;
+ }
+
+ @Override
+ protected SQLite getSource() throws SQLException {
+ return new SQLite(settings, dataFolder);
+ }
+}
diff --git a/src/main/java/fr/xephi/authme/initialization/DataSourceProvider.java b/src/main/java/fr/xephi/authme/initialization/DataSourceProvider.java
index de5eea46..3593e7ea 100644
--- a/src/main/java/fr/xephi/authme/initialization/DataSourceProvider.java
+++ b/src/main/java/fr/xephi/authme/initialization/DataSourceProvider.java
@@ -5,6 +5,7 @@ import fr.xephi.authme.data.auth.PlayerCache;
import fr.xephi.authme.datasource.CacheDataSource;
import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.datasource.DataSourceType;
+import fr.xephi.authme.datasource.H2;
import fr.xephi.authme.datasource.MariaDB;
import fr.xephi.authme.datasource.MySQL;
import fr.xephi.authme.datasource.PostgreSqlDataSource;
@@ -76,6 +77,9 @@ public class DataSourceProvider implements Provider {
case SQLITE:
dataSource = new SQLite(settings, dataFolder);
break;
+ case H2:
+ dataSource = new H2(settings, dataFolder);
+ break;
default:
throw new UnsupportedOperationException("Unknown data source type '" + dataSourceType + "'");
}
diff --git a/src/main/java/fr/xephi/authme/initialization/OnStartupTasks.java b/src/main/java/fr/xephi/authme/initialization/OnStartupTasks.java
index 029c9b60..02f17e95 100644
--- a/src/main/java/fr/xephi/authme/initialization/OnStartupTasks.java
+++ b/src/main/java/fr/xephi/authme/initialization/OnStartupTasks.java
@@ -3,10 +3,10 @@ package fr.xephi.authme.initialization;
import fr.xephi.authme.AuthMe;
import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.datasource.DataSource;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
import fr.xephi.authme.message.Messages;
import fr.xephi.authme.output.ConsoleFilter;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.output.Log4JFilter;
import fr.xephi.authme.service.BukkitService;
import fr.xephi.authme.settings.Settings;
@@ -53,7 +53,7 @@ public class OnStartupTasks {
* @param settings the settings
*/
public static void sendMetrics(AuthMe plugin, Settings settings) {
- final Metrics metrics = new Metrics(plugin, 164);
+ final Metrics metrics = new Metrics(plugin, 18479);
metrics.addCustomChart(new SimplePie("messages_language",
() -> settings.getProperty(PluginSettings.MESSAGES_LANGUAGE)));
@@ -109,6 +109,6 @@ public class OnStartupTasks {
}
});
}
- }, 1, TICKS_PER_MINUTE * settings.getProperty(EmailSettings.DELAY_RECALL));
+ }, 1, (long) TICKS_PER_MINUTE * settings.getProperty(EmailSettings.DELAY_RECALL));
}
}
diff --git a/src/main/java/fr/xephi/authme/listener/AdvancedShulkerFixListener.java b/src/main/java/fr/xephi/authme/listener/AdvancedShulkerFixListener.java
new file mode 100644
index 00000000..64045591
--- /dev/null
+++ b/src/main/java/fr/xephi/authme/listener/AdvancedShulkerFixListener.java
@@ -0,0 +1,20 @@
+package fr.xephi.authme.listener;
+
+import org.bukkit.block.Block;
+import org.bukkit.event.EventHandler;
+import org.bukkit.event.EventPriority;
+import org.bukkit.event.Listener;
+import org.bukkit.event.block.BlockDispenseEvent;
+
+//This fix is only for Minecraft 1.13-
+public class AdvancedShulkerFixListener implements Listener {
+
+ @EventHandler(priority = EventPriority.LOWEST, ignoreCancelled = true)
+ public void onDispenserActivate(BlockDispenseEvent event) {
+ Block block = event.getBlock();
+
+ if (block.getY() <= 0 || block.getY() >= block.getWorld().getMaxHeight() - 1) {
+ event.setCancelled(true);
+ }
+ }
+}
diff --git a/src/main/java/fr/xephi/authme/listener/BedrockAutoLoginListener.java b/src/main/java/fr/xephi/authme/listener/BedrockAutoLoginListener.java
new file mode 100644
index 00000000..16f2f5ea
--- /dev/null
+++ b/src/main/java/fr/xephi/authme/listener/BedrockAutoLoginListener.java
@@ -0,0 +1,62 @@
+package fr.xephi.authme.listener;
+/* Inspired by DongShaoNB/BedrockPlayerSupport **/
+
+import fr.xephi.authme.AuthMe;
+import fr.xephi.authme.api.v3.AuthMeApi;
+import fr.xephi.authme.events.RestoreSessionEvent;
+import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.message.Messages;
+import fr.xephi.authme.service.BukkitService;
+import fr.xephi.authme.settings.Settings;
+import fr.xephi.authme.settings.properties.HooksSettings;
+import fr.xephi.authme.settings.properties.SecuritySettings;
+import org.bukkit.entity.Player;
+import org.bukkit.event.EventHandler;
+import org.bukkit.event.EventPriority;
+import org.bukkit.event.Listener;
+import org.bukkit.event.player.PlayerJoinEvent;
+
+import javax.inject.Inject;
+import java.util.UUID;
+
+import static org.bukkit.Bukkit.getServer;
+
+public class BedrockAutoLoginListener implements Listener {
+ private final AuthMeApi authmeApi = AuthMeApi.getInstance();
+ @Inject
+ private BukkitService bukkitService;
+ @Inject
+ private AuthMe plugin;
+ @Inject
+ private Messages messages;
+
+ @Inject
+ private Settings settings;
+
+ public BedrockAutoLoginListener() {
+ }
+
+ private boolean isBedrockPlayer(UUID uuid) {
+ return settings.getProperty(HooksSettings.HOOK_FLOODGATE_PLAYER) && settings.getProperty(SecuritySettings.FORCE_LOGIN_BEDROCK) && org.geysermc.floodgate.api.FloodgateApi.getInstance().isFloodgateId(uuid) && getServer().getPluginManager().getPlugin("floodgate") != null;
+ }
+
+ @EventHandler(priority = EventPriority.LOWEST)
+ public void onPlayerJoin(PlayerJoinEvent event) {
+ Player player = event.getPlayer();
+ String name = event.getPlayer().getName();
+ UUID uuid = event.getPlayer().getUniqueId();
+ if (isBedrockPlayer(uuid) && !authmeApi.isAuthenticated(player) && authmeApi.isRegistered(name)) {
+ authmeApi.forceLogin(player);
+ messages.send(player, MessageKey.BEDROCK_AUTO_LOGGED_IN);
+ }
+ }
+
+ @EventHandler(priority = EventPriority.HIGHEST)
+ public void onPlayerAuthMeSessionRestore(RestoreSessionEvent event) {
+ Player player = event.getPlayer();
+ UUID uuid = player.getUniqueId();
+ if (isBedrockPlayer(uuid)) {
+ event.setCancelled(true);
+ }
+ }
+}
diff --git a/src/main/java/fr/xephi/authme/listener/DoubleLoginFixListener.java b/src/main/java/fr/xephi/authme/listener/DoubleLoginFixListener.java
new file mode 100644
index 00000000..2c0370a4
--- /dev/null
+++ b/src/main/java/fr/xephi/authme/listener/DoubleLoginFixListener.java
@@ -0,0 +1,35 @@
+package fr.xephi.authme.listener;
+//Prevent Ghost Players
+
+import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.service.CommonService;
+import org.bukkit.Bukkit;
+import org.bukkit.entity.Player;
+import org.bukkit.event.EventHandler;
+import org.bukkit.event.Listener;
+import org.bukkit.event.player.PlayerJoinEvent;
+
+import javax.inject.Inject;
+import java.util.Collection;
+import java.util.HashSet;
+
+public class DoubleLoginFixListener implements Listener {
+ @Inject
+ private CommonService service;
+
+ public DoubleLoginFixListener() {
+ }
+
+ @EventHandler
+ public void onPlayerJoin(PlayerJoinEvent event) {
+ Collection extends Player> PlayerList = Bukkit.getServer().getOnlinePlayers();
+ HashSet PlayerSet = new HashSet();
+ for (Player ep : PlayerList) {
+ if (PlayerSet.contains(ep.getName().toLowerCase())) {
+ ep.kickPlayer(service.retrieveSingleMessage(ep.getPlayer(), MessageKey.DOUBLE_LOGIN_FIX));
+ break;
+ }
+ PlayerSet.add(ep.getName().toLowerCase());
+ }
+ }
+}
diff --git a/src/main/java/fr/xephi/authme/listener/GuiCaptchaHandler.java b/src/main/java/fr/xephi/authme/listener/GuiCaptchaHandler.java
new file mode 100644
index 00000000..497de210
--- /dev/null
+++ b/src/main/java/fr/xephi/authme/listener/GuiCaptchaHandler.java
@@ -0,0 +1,328 @@
+package fr.xephi.authme.listener;
+
+import com.comphenix.protocol.PacketType;
+import com.comphenix.protocol.ProtocolLibrary;
+import com.comphenix.protocol.events.ListenerPriority;
+import com.comphenix.protocol.events.PacketAdapter;
+import com.comphenix.protocol.events.PacketEvent;
+import fr.xephi.authme.AuthMe;
+import fr.xephi.authme.api.v3.AuthMeApi;
+import fr.xephi.authme.events.LoginEvent;
+import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.message.Messages;
+import fr.xephi.authme.service.BukkitService;
+import fr.xephi.authme.service.CommonService;
+import fr.xephi.authme.settings.Settings;
+import fr.xephi.authme.settings.properties.HooksSettings;
+import fr.xephi.authme.settings.properties.RestrictionSettings;
+import fr.xephi.authme.settings.properties.SecuritySettings;
+import org.bukkit.Bukkit;
+import org.bukkit.Material;
+import org.bukkit.entity.Player;
+import org.bukkit.event.EventHandler;
+import org.bukkit.event.EventPriority;
+import org.bukkit.event.Listener;
+import org.bukkit.event.inventory.InventoryClickEvent;
+import org.bukkit.event.player.PlayerJoinEvent;
+import org.bukkit.event.player.PlayerLoginEvent;
+import org.bukkit.event.player.PlayerQuitEvent;
+import org.bukkit.inventory.Inventory;
+import org.bukkit.inventory.ItemStack;
+import org.bukkit.inventory.meta.ItemMeta;
+
+import javax.inject.Inject;
+import java.io.File;
+import java.util.List;
+import java.util.Random;
+import java.util.UUID;
+import java.util.concurrent.ConcurrentHashMap;
+import java.util.concurrent.atomic.AtomicInteger;
+import java.util.logging.Level;
+
+import static fr.xephi.authme.util.PlayerUtils.getPlayerIp;
+import static fr.xephi.authme.util.PlayerUtils.isNpc;
+import static org.bukkit.Bukkit.getLogger;
+import static org.bukkit.Bukkit.getServer;
+
+/**
+ * This class handles ALL the GUI captcha features in the plugin.
+ */
+public class GuiCaptchaHandler implements Listener {
+ //define AuthMeApi
+ private final AuthMeApi authmeApi = AuthMeApi.getInstance();
+ @Inject
+ private BukkitService bukkitService;
+ @Inject
+ private AuthMe plugin;
+ @Inject
+ private Messages messages;
+ @Inject
+ private CommonService service;
+
+ @Inject
+ private Settings settings;
+
+
+ private PacketAdapter chatPacketListener;
+ private PacketAdapter windowPacketListener;
+
+ //define timesLeft
+ private int timesLeft = 3;
+ //Use ConcurrentHashMap to store player and their close reason
+ /* We used many async tasks so there is concurrent**/
+ public static ConcurrentHashMap closeReasonMap = new ConcurrentHashMap<>();
+ //define randomStringSet
+ String randomSet = "ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890abcdefghijklmnopqrstuvwxyz!@#%&*()_+";
+ String randomString = "";
+ Random randomItemSet = new Random();
+ Random howManyRandom = new Random();
+ private Material captchaMaterial = getRandomMaterial();
+
+
+ private boolean isPacketListenersActive = false;
+
+ public GuiCaptchaHandler() {
+ }
+
+ private StringBuilder sb;
+ private final List whiteList = AuthMe.settings.getProperty(SecuritySettings.GUI_CAPTCHA_COUNTRY_WHITELIST);
+
+ private boolean isBedrockPlayer(UUID uuid) {
+ if (getServer().getPluginManager().getPlugin("floodgate") != null) {
+ return settings.getProperty(HooksSettings.HOOK_FLOODGATE_PLAYER) && settings.getProperty(SecuritySettings.GUI_CAPTCHA_BE_COMPATIBILITY) && org.geysermc.floodgate.api.FloodgateApi.getInstance().isFloodgateId(uuid);
+ }
+ return false;
+ }
+
+
+ private void initializePacketListeners() {
+ if (!isPacketListenersActive) {
+ ProtocolLibrary.getProtocolManager().addPacketListener(windowPacketListener);
+ ProtocolLibrary.getProtocolManager().addPacketListener(chatPacketListener);
+ isPacketListenersActive = true;
+ }
+ }
+
+
+ @EventHandler
+ public void onInventoryClick(InventoryClickEvent event) {
+ if (event.getWhoClicked() instanceof Player) {
+ Player player = (Player) event.getWhoClicked();
+ ItemStack currentItem = event.getCurrentItem();
+ if (!authmeApi.isRegistered(player.getName())) {
+ if (isBedrockPlayer(player.getUniqueId())) {
+ return;
+ }
+ if (currentItem != null && currentItem.getType().equals(captchaMaterial)) {
+ event.setCancelled(true);
+ if (!closeReasonMap.containsKey(player)) {
+ closeReasonMap.put(player, "verified");
+ }
+ player.closeInventory();
+ messages.send(player, MessageKey.GUI_CAPTCHA_VERIFIED);
+ }
+ }
+ }
+ }
+
+ @EventHandler(priority = EventPriority.HIGHEST)
+ public void onPlayerLogin(PlayerLoginEvent event) {
+ Player player = event.getPlayer();
+ bukkitService.runTaskAsynchronously(() -> {
+ sb = new StringBuilder();
+ int howLongIsRandomString = (howManyRandom.nextInt(3) + 1);
+ for (int i = 0; i < howLongIsRandomString; i++) {
+ //生成随机索引号
+ int index = randomItemSet.nextInt(randomSet.length());
+
+ // 从字符串中获取由索引 index 指定的字符
+ char randomChar = randomSet.charAt(index);
+
+ // 将字符追加到字符串生成器
+ sb.append(randomChar);
+ }
+ if (!whiteList.isEmpty()) {
+ String ip = getPlayerIp(player);
+ if (whiteList.contains(authmeApi.getCountryCode(ip)) && ip != null) {
+ if (!closeReasonMap.containsKey(player)) {
+ closeReasonMap.put(player, "verified:whitelist");
+ }
+ }
+ }
+ });
+ }
+
+ @EventHandler(ignoreCancelled = true, priority = EventPriority.HIGHEST)
+ public void onPlayerJoin(PlayerJoinEvent event) {
+ randomString = "";
+ Player playerunreg = event.getPlayer();
+ String name = playerunreg.getName();
+ if (!authmeApi.isRegistered(name) && !isNpc(playerunreg) && !closeReasonMap.containsKey(playerunreg)) {
+ if (isBedrockPlayer(playerunreg.getUniqueId())) {
+ if (!closeReasonMap.containsKey(playerunreg)) {
+ closeReasonMap.put(playerunreg, "verified:bedrock");
+ }
+ messages.send(playerunreg, MessageKey.GUI_CAPTCHA_VERIFIED_AUTO_BEDROCK);
+ return;
+ }
+ bukkitService.runTask(() -> {
+ randomString = sb.toString();
+ Random random_blockpos = new Random();
+ AtomicInteger random_num = new AtomicInteger(random_blockpos.nextInt(26));
+ Inventory menu = Bukkit.createInventory(playerunreg, 27, messages.retrieveSingle(playerunreg, MessageKey.GUI_CAPTCHA_WINDOW_NAME, randomString));
+ ItemStack item = new ItemStack(captchaMaterial);
+ ItemMeta meta = item.getItemMeta();
+ try {
+ if (meta != null) {
+ meta.setDisplayName(messages.retrieveSingle(playerunreg, MessageKey.GUI_CAPTCHA_CLICKABLE_NAME, randomString));
+ item.setItemMeta(meta);
+ }
+ } catch (NullPointerException e) {
+ getLogger().log(Level.WARNING, "Unexpected error occurred while setting item meta.");
+ }
+ windowPacketListener = new PacketAdapter(this.plugin, ListenerPriority.HIGHEST, PacketType.Play.Client.CLOSE_WINDOW) {
+ @Override
+ public void onPacketReceiving(PacketEvent event) {
+ Player packetPlayer = event.getPlayer();
+ if (!closeReasonMap.containsKey(packetPlayer) && !authmeApi.isRegistered(packetPlayer.getName())) {
+ if (timesLeft <= 0) {
+ bukkitService.runTask(() -> {
+ packetPlayer.kickPlayer(service.retrieveSingleMessage(packetPlayer, MessageKey.GUI_CAPTCHA_KICK_FAILED));
+ });
+ timesLeft = 3;
+ } else {
+ --timesLeft;
+ if (timesLeft <= 0) {
+ bukkitService.runTask(() -> {
+ packetPlayer.kickPlayer(service.retrieveSingleMessage(packetPlayer, MessageKey.GUI_CAPTCHA_KICK_FAILED));
+ });
+ timesLeft = 3;
+ return;
+ }
+ messages.send(packetPlayer, MessageKey.GUI_CAPTCHA_RETRY_MESSAGE, String.valueOf(timesLeft));
+ event.setCancelled(true);
+ random_num.set(random_blockpos.nextInt(26));
+ bukkitService.runTask(() -> {
+ menu.clear();
+ menu.setItem(random_num.get(), item);
+ packetPlayer.openInventory(menu);
+ });
+ }
+ }
+ }
+ };
+ chatPacketListener = new PacketAdapter(this.plugin, ListenerPriority.HIGHEST, PacketType.Play.Client.CHAT) {
+ @Override
+ public void onPacketReceiving(PacketEvent event) {
+ Player packetPlayer = event.getPlayer();
+ if (!closeReasonMap.containsKey(packetPlayer) && !authmeApi.isRegistered(packetPlayer.getName())) {
+ messages.send(packetPlayer, MessageKey.GUI_CAPTCHA_DENIED_MESSAGE);
+ event.setCancelled(true);
+ }
+ }
+ };
+ initializePacketListeners();
+ //Open captcha inventory
+ menu.setItem(random_num.get(), item);
+ playerunreg.openInventory(menu);
+ if (settings.getProperty(SecuritySettings.GUI_CAPTCHA_TIMEOUT) > 0) {
+ long timeOut = settings.getProperty(SecuritySettings.GUI_CAPTCHA_TIMEOUT);
+ if (settings.getProperty(SecuritySettings.GUI_CAPTCHA_TIMEOUT) > settings.getProperty(RestrictionSettings.TIMEOUT)) {
+ bukkitService.runTask(() -> {
+ getLogger().warning("AuthMe detected that your GUI captcha timeout seconds(" + settings.getProperty(SecuritySettings.GUI_CAPTCHA_TIMEOUT) + ") is bigger than the Login timeout seconds(" +
+ settings.getProperty(RestrictionSettings.TIMEOUT) + "). To prevent issues, we will let the GUI captcha follow the Login timeout seconds, please check and modify your config.");
+ });
+ timeOut = settings.getProperty(RestrictionSettings.TIMEOUT);
+ }
+ long finalTimeOut = timeOut;
+ bukkitService.runTaskLater(() -> {
+ if (!closeReasonMap.containsKey(playerunreg) && !authmeApi.isRegistered(playerunreg.getName())) {
+ playerunreg.kickPlayer(service.retrieveSingleMessage(playerunreg, MessageKey.GUI_CAPTCHA_KICK_TIMEOUT));
+ timesLeft = 3; // Reset the attempt counter
+ }
+ }, finalTimeOut * 20L);
+ }
+ });
+ }
+ }
+
+ //This prevents players from unregistering by Admins
+ @EventHandler
+ public void onPlayerAuthMeLogin(LoginEvent event) {
+ Player player = event.getPlayer();
+ if (!closeReasonMap.containsKey(player)) {
+ closeReasonMap.put(player, "verified:login");
+ }
+ }
+
+
+ private void deletePlayerData(UUID playerUUID) {
+ // 获取服务器的存储文件夹路径
+ File serverFolder = Bukkit.getServer().getWorldContainer();
+ String worldFolderName = settings.getProperty(SecuritySettings.DELETE_PLAYER_DATA_WORLD);
+ // 构建playerdata文件夹路径
+ File playerDataFolder = new File(serverFolder, File.separator + worldFolderName + File.separator + "playerdata");
+
+ // 构建玩家数据文件路径
+ File playerDataFile = new File(playerDataFolder, File.separator + playerUUID + ".dat");
+
+ // 删除玩家数据文件
+ if (playerDataFile.exists()) {
+ playerDataFile.delete();
+ }
+ }
+
+ private void deletePlayerStats(UUID playerUUID) {
+ // 获取服务器的存储文件夹路径
+ File serverFolder = Bukkit.getServer().getWorldContainer();
+ String worldFolderName = settings.getProperty(SecuritySettings.DELETE_PLAYER_DATA_WORLD);
+ // 构建stats文件夹路径
+ File statsFolder = new File(serverFolder, File.separator + worldFolderName + File.separator + "stats");
+ // 构建玩家统计数据文件路径
+ File statsFile = new File(statsFolder, File.separator + playerUUID + ".json");
+ // 删除玩家统计数据文件
+ if (statsFile.exists()) {
+ statsFile.delete();
+ }
+ }
+
+ private void deleteAuthMePlayerData(UUID playerUUID) {
+ File pluginFolder = plugin.getDataFolder();
+ File path = new File(pluginFolder, File.separator + "playerdata" + File.separator + playerUUID);
+ File dataFile = new File(path, File.separator + "data.json");
+ if (dataFile.exists()) {
+ dataFile.delete();
+ path.delete();
+ }
+ }
+
+ @EventHandler
+ public void onPlayerQuit(PlayerQuitEvent event) {
+ Player player = event.getPlayer();
+ String name = player.getName();
+ UUID playerUUID = event.getPlayer().getUniqueId();
+ if (!authmeApi.isRegistered(name)) {
+ if (settings.getProperty(SecuritySettings.DELETE_UNVERIFIED_PLAYER_DATA) && !closeReasonMap.containsKey(player)) {
+ bukkitService.runTaskLater(() -> {
+ if (!player.isOnline()) {
+ deletePlayerData(playerUUID);
+ deletePlayerStats(playerUUID);
+ deleteAuthMePlayerData(playerUUID);
+ }
+ }, 100L);
+ return;
+ }
+ closeReasonMap.remove(player);
+ }
+ }
+
+ private Material getRandomMaterial() {
+ Material[] allMaterials = Material.values();
+ Random random = new Random();
+ return allMaterials[random.nextInt(allMaterials.length)];
+ }
+}
+
+
+
+
diff --git a/src/main/java/fr/xephi/authme/listener/ListenerService.java b/src/main/java/fr/xephi/authme/listener/ListenerService.java
index d283f3e4..073b3975 100644
--- a/src/main/java/fr/xephi/authme/listener/ListenerService.java
+++ b/src/main/java/fr/xephi/authme/listener/ListenerService.java
@@ -1,11 +1,14 @@
package fr.xephi.authme.listener;
+import fr.xephi.authme.AuthMe;
+import fr.xephi.authme.api.v3.AuthMeApi;
import fr.xephi.authme.data.auth.PlayerCache;
import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.initialization.SettingsDependent;
import fr.xephi.authme.service.ValidationService;
import fr.xephi.authme.settings.Settings;
import fr.xephi.authme.settings.properties.RegistrationSettings;
+import fr.xephi.authme.settings.properties.SecuritySettings;
import fr.xephi.authme.util.PlayerUtils;
import org.bukkit.entity.Entity;
import org.bukkit.entity.Player;
@@ -18,13 +21,13 @@ import javax.inject.Inject;
* Service class for the AuthMe listeners to determine whether an event should be canceled.
*/
class ListenerService implements SettingsDependent {
-
+ private final AuthMeApi authmeApi = AuthMeApi.getInstance();
private final DataSource dataSource;
private final PlayerCache playerCache;
private final ValidationService validationService;
-
private boolean isRegistrationForced;
+
@Inject
ListenerService(Settings settings, DataSource dataSource, PlayerCache playerCache,
ValidationService validationService) {
@@ -76,9 +79,18 @@ class ListenerService implements SettingsDependent {
* @param player the player to verify
* @return true if the associated event should be canceled, false otherwise
*/
+
public boolean shouldCancelEvent(Player player) {
+
return player != null && !checkAuth(player.getName()) && !PlayerUtils.isNpc(player);
}
+ public boolean shouldCancelInvEvent(Player player) {
+ try {
+ return !AuthMe.settings.getProperty(SecuritySettings.GUI_CAPTCHA) || authmeApi.isRegistered(player.getName()) || GuiCaptchaHandler.closeReasonMap.containsKey(player)/* || !player.getOpenInventory().getTitle().equals("请验证你是真人")*/;
+ } catch (Exception e) {
+ return true;
+ }
+ }
@Override
public void reload(Settings settings) {
@@ -93,7 +105,7 @@ class ListenerService implements SettingsDependent {
* @return true if the player may play, false otherwise
*/
private boolean checkAuth(String name) {
- if (validationService.isUnrestricted(name) || playerCache.isAuthenticated(name)) {
+ if (validationService.isUnrestricted(name) || playerCache.isAuthenticated(name)){
return true;
}
if (!isRegistrationForced && !dataSource.isAuthAvailable(name)) {
diff --git a/src/main/java/fr/xephi/authme/listener/LoginLocationFixListener.java b/src/main/java/fr/xephi/authme/listener/LoginLocationFixListener.java
new file mode 100644
index 00000000..344290ac
--- /dev/null
+++ b/src/main/java/fr/xephi/authme/listener/LoginLocationFixListener.java
@@ -0,0 +1,130 @@
+package fr.xephi.authme.listener;
+
+import fr.xephi.authme.AuthMe;
+import fr.xephi.authme.api.v3.AuthMeApi;
+import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.message.Messages;
+import fr.xephi.authme.settings.Settings;
+import fr.xephi.authme.settings.properties.SecuritySettings;
+import fr.xephi.authme.util.TeleportUtils;
+import org.bukkit.Location;
+import org.bukkit.Material;
+import org.bukkit.World;
+import org.bukkit.block.Block;
+import org.bukkit.block.BlockFace;
+import org.bukkit.entity.Player;
+import org.bukkit.event.EventHandler;
+import org.bukkit.event.Listener;
+import org.bukkit.event.player.PlayerJoinEvent;
+
+import javax.inject.Inject;
+import java.lang.reflect.Method;
+
+
+public class LoginLocationFixListener implements Listener {
+ @Inject
+ private AuthMe plugin;
+ @Inject
+ private Messages messages;
+ @Inject
+ private Settings settings;
+ private final AuthMeApi authmeApi = AuthMeApi.getInstance();
+
+ public LoginLocationFixListener() {
+ }
+
+ private static Material materialPortal = Material.matchMaterial("PORTAL");
+
+ private static boolean isAvailable; // false: unchecked/method not available true: method is available
+ BlockFace[] faces = {BlockFace.WEST, BlockFace.EAST, BlockFace.NORTH, BlockFace.SOUTH, BlockFace.SOUTH_EAST, BlockFace.SOUTH_WEST, BlockFace.NORTH_EAST, BlockFace.NORTH_WEST};
+
+ static {
+ if (materialPortal == null) {
+ materialPortal = Material.matchMaterial("PORTAL_BLOCK");
+ if (materialPortal == null) {
+ materialPortal = Material.matchMaterial("NETHER_PORTAL");
+ }
+ }
+ try {
+ Method getMinHeightMethod = World.class.getMethod("getMinHeight");
+ isAvailable = true;
+ } catch (NoSuchMethodException e) {
+ isAvailable = false;
+ }
+ }
+
+ private int getMinHeight(World world) {
+ //This keeps compatibility of 1.16.x and lower
+ if (isAvailable) {
+ return world.getMinHeight();
+ } else {
+ return 0;
+ }
+ }
+
+
+ @EventHandler
+ public void onPlayerJoin(PlayerJoinEvent event) {
+ Player player = event.getPlayer();
+ Location JoinLocation = player.getLocation();
+ if (settings.getProperty(SecuritySettings.LOGIN_LOC_FIX_SUB_PORTAL)) {
+ if (!JoinLocation.getBlock().getType().equals(materialPortal) && !JoinLocation.getBlock().getRelative(BlockFace.UP).getType().equals(materialPortal)) {
+ return;
+ }
+ Block JoinBlock = JoinLocation.getBlock();
+ boolean solved = false;
+ for (BlockFace face : faces) {
+ if (JoinBlock.getRelative(face).getType().equals(Material.AIR) && JoinBlock.getRelative(face).getRelative(BlockFace.UP).getType().equals(Material.AIR)) {
+ if (settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
+ TeleportUtils.teleport(player, JoinBlock.getRelative(face).getLocation().add(0.5, 0.1, 0.5));
+ } else {
+ player.teleport(JoinBlock.getRelative(face).getLocation().add(0.5, 0.1, 0.5));
+ }
+ solved = true;
+ break;
+ }
+ }
+ if (!solved) {
+ JoinBlock.getRelative(BlockFace.UP).breakNaturally();
+ JoinBlock.breakNaturally();
+ }
+ messages.send(player, MessageKey.LOCATION_FIX_PORTAL);
+ }
+ if (settings.getProperty(SecuritySettings.LOGIN_LOC_FIX_SUB_UNDERGROUND)) {
+ Material UpType = JoinLocation.getBlock().getRelative(BlockFace.UP).getType();
+ World world = player.getWorld();
+ int MaxHeight = world.getMaxHeight();
+ int MinHeight = getMinHeight(world);
+ if (!UpType.isOccluding() && !UpType.equals(Material.LAVA)) {
+ return;
+ }
+ for (int i = MinHeight; i <= MaxHeight; i++) {
+ JoinLocation.setY(i);
+ Block JoinBlock = JoinLocation.getBlock();
+ if ((JoinBlock.getRelative(BlockFace.DOWN).getType().isBlock())
+ && JoinBlock.getType().equals(Material.AIR)
+ && JoinBlock.getRelative(BlockFace.UP).getType().equals(Material.AIR)) {
+ if (JoinBlock.getRelative(BlockFace.DOWN).getType().equals(Material.LAVA)) {
+ JoinBlock.getRelative(BlockFace.DOWN).setType(Material.DIRT);
+ }
+ if (settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
+ TeleportUtils.teleport(player, JoinBlock.getLocation().add(0.5, 0.1, 0.5));
+ } else {
+ player.teleport(JoinBlock.getLocation().add(0.5, 0.1, 0.5));
+ }
+ messages.send(player, MessageKey.LOCATION_FIX_UNDERGROUND);
+ break;
+ }
+ if (i == MaxHeight) {
+ if (settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
+ TeleportUtils.teleport(player, JoinBlock.getLocation().add(0.5, 1.1, 0.5));
+ } else {
+ player.teleport(JoinBlock.getLocation().add(0.5, 1.1, 0.5));
+ }
+ messages.send(player, MessageKey.LOCATION_FIX_UNDERGROUND_CANT_FIX);
+ }
+ }
+ }
+
+ }
+}
diff --git a/src/main/java/fr/xephi/authme/listener/OnJoinVerifier.java b/src/main/java/fr/xephi/authme/listener/OnJoinVerifier.java
index b125bf0a..08224841 100644
--- a/src/main/java/fr/xephi/authme/listener/OnJoinVerifier.java
+++ b/src/main/java/fr/xephi/authme/listener/OnJoinVerifier.java
@@ -4,9 +4,9 @@ import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.data.auth.PlayerAuth;
import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.initialization.Reloadable;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
import fr.xephi.authme.message.Messages;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.permission.PermissionsManager;
import fr.xephi.authme.permission.PlayerStatePermission;
import fr.xephi.authme.service.AntiBotService;
diff --git a/src/main/java/fr/xephi/authme/listener/PlayerListener.java b/src/main/java/fr/xephi/authme/listener/PlayerListener.java
index 53ea908f..fc12bab9 100644
--- a/src/main/java/fr/xephi/authme/listener/PlayerListener.java
+++ b/src/main/java/fr/xephi/authme/listener/PlayerListener.java
@@ -1,5 +1,6 @@
package fr.xephi.authme.listener;
+import fr.xephi.authme.api.v3.AuthMeApi;
import fr.xephi.authme.data.QuickCommandsProtectionManager;
import fr.xephi.authme.data.auth.PlayerAuth;
import fr.xephi.authme.datasource.DataSource;
@@ -18,6 +19,8 @@ import fr.xephi.authme.settings.SpawnLoader;
import fr.xephi.authme.settings.properties.HooksSettings;
import fr.xephi.authme.settings.properties.RegistrationSettings;
import fr.xephi.authme.settings.properties.RestrictionSettings;
+import fr.xephi.authme.settings.properties.SecuritySettings;
+import fr.xephi.authme.util.TeleportUtils;
import org.bukkit.ChatColor;
import org.bukkit.Location;
import org.bukkit.entity.HumanEntity;
@@ -45,7 +48,6 @@ import org.bukkit.event.player.PlayerJoinEvent;
import org.bukkit.event.player.PlayerKickEvent;
import org.bukkit.event.player.PlayerLoginEvent;
import org.bukkit.event.player.PlayerMoveEvent;
-import org.bukkit.event.player.PlayerPickupItemEvent;
import org.bukkit.event.player.PlayerQuitEvent;
import org.bukkit.event.player.PlayerRespawnEvent;
import org.bukkit.event.player.PlayerShearEntityEvent;
@@ -57,11 +59,16 @@ import java.util.Set;
import static fr.xephi.authme.settings.properties.RestrictionSettings.ALLOWED_MOVEMENT_RADIUS;
import static fr.xephi.authme.settings.properties.RestrictionSettings.ALLOW_UNAUTHED_MOVEMENT;
+import static org.bukkit.Bukkit.getServer;
/**
* Listener class for player events.
*/
-public class PlayerListener implements Listener {
+public class PlayerListener implements Listener{
+ private final AuthMeApi authmeApi = AuthMeApi.getInstance();
+
+
+
@Inject
private Settings settings;
@@ -92,9 +99,11 @@ public class PlayerListener implements Listener {
@Inject
private QuickCommandsProtectionManager quickCommandsProtectionManager;
+
// Lowest priority to apply fast protection checks
@EventHandler(priority = EventPriority.LOWEST)
public void onAsyncPlayerPreLoginEventLowest(AsyncPlayerPreLoginEvent event) {
+
if (event.getLoginResult() != AsyncPlayerPreLoginEvent.Result.ALLOWED) {
return;
}
@@ -110,13 +119,18 @@ public class PlayerListener implements Listener {
if (validationService.isUnrestricted(name)) {
return;
}
-
+ if (settings.getProperty(HooksSettings.HOOK_FLOODGATE_PLAYER)) {
+ if (getServer().getPluginManager().getPlugin("floodgate") != null) {
+ if (org.geysermc.floodgate.api.FloodgateApi.getInstance().isFloodgateId(event.getUniqueId())) return;
+ }
+ }
// Non-blocking checks
try {
onJoinVerifier.checkIsValidName(name);
} catch (FailedVerificationException e) {
event.setKickMessage(messages.retrieveSingle(name, e.getReason(), e.getArgs()));
event.setLoginResult(AsyncPlayerPreLoginEvent.Result.KICK_OTHER);
+
}
}
@@ -179,7 +193,7 @@ public class PlayerListener implements Listener {
@EventHandler(priority = EventPriority.NORMAL)
public void onPlayerJoin(PlayerJoinEvent event) {
final Player player = event.getPlayer();
-
+ final AuthMeApi authmeApi = AuthMeApi.getInstance();
if (!PlayerListener19Spigot.isPlayerSpawnLocationEventCalled()) {
teleportationService.teleportOnJoin(player);
}
@@ -189,12 +203,15 @@ public class PlayerListener implements Listener {
management.performJoin(player);
teleportationService.teleportNewPlayerToFirstSpawn(player);
+
}
+
@EventHandler(priority = EventPriority.HIGH) // HIGH as EssentialsX listens at HIGHEST
public void onJoinMessage(PlayerJoinEvent event) {
final Player player = event.getPlayer();
+
// Note: join message can be null, despite api documentation says not
if (settings.getProperty(RegistrationSettings.REMOVE_JOIN_MESSAGE)) {
event.setJoinMessage(null);
@@ -329,12 +346,12 @@ public class PlayerListener implements Listener {
}
/*
- * Limit player X and Z movements to 1 block
+ * Limit player X and Z movements
* Deny player Y+ movements (allows falling)
*/
- if (from.getBlockX() == to.getBlockX()
- && from.getBlockZ() == to.getBlockZ()
+ if (from.getX() == to.getX()
+ && from.getZ() == to.getZ()
&& from.getY() - to.getY() >= 0) {
return;
}
@@ -357,9 +374,17 @@ public class PlayerListener implements Listener {
Location spawn = spawnLoader.getSpawnLocation(player);
if (spawn != null && spawn.getWorld() != null) {
if (!player.getWorld().equals(spawn.getWorld())) {
- player.teleport(spawn);
+ if(settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
+ TeleportUtils.teleport(player,spawn);
+ } else {
+ player.teleport(spawn);
+ }
} else if (spawn.distance(player.getLocation()) > settings.getProperty(ALLOWED_MOVEMENT_RADIUS)) {
- player.teleport(spawn);
+ if(settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
+ TeleportUtils.teleport(player,spawn);
+ } else {
+ player.teleport(spawn);
+ }
}
}
}
@@ -450,12 +475,12 @@ public class PlayerListener implements Listener {
* Inventory interactions
*/
- @EventHandler(ignoreCancelled = true, priority = EventPriority.LOWEST)
- public void onPlayerPickupItem(PlayerPickupItemEvent event) {
- if (listenerService.shouldCancelEvent(event)) {
- event.setCancelled(true);
- }
- }
+// @EventHandler(ignoreCancelled = true, priority = EventPriority.LOWEST)
+// public void onPlayerPickupItem(EntityPickupItemEvent event) {
+// if (listenerService.shouldCancelEvent(event)) {
+// event.setCancelled(true);
+// }
+// }
@EventHandler(ignoreCancelled = true, priority = EventPriority.LOWEST)
public void onPlayerDropItem(PlayerDropItemEvent event) {
@@ -483,15 +508,16 @@ public class PlayerListener implements Listener {
return false;
}
Set whitelist = settings.getProperty(RestrictionSettings.UNRESTRICTED_INVENTORIES);
+ //append a string for String whitelist
return whitelist.contains(ChatColor.stripColor(inventory.getTitle()).toLowerCase(Locale.ROOT));
}
@EventHandler(ignoreCancelled = true, priority = EventPriority.LOWEST)
public void onPlayerInventoryOpen(InventoryOpenEvent event) {
final HumanEntity player = event.getPlayer();
-
+ Player ply = (Player) event.getPlayer();
if (listenerService.shouldCancelEvent(player)
- && !isInventoryWhitelisted(event.getView())) {
+ && !isInventoryWhitelisted(event.getView()) && listenerService.shouldCancelInvEvent(ply)) {
event.setCancelled(true);
/*
@@ -509,4 +535,12 @@ public class PlayerListener implements Listener {
event.setCancelled(true);
}
}
+// @EventHandler(priority = EventPriority.LOWEST)
+// public void onSwitchHand(PlayerSwapHandItemsEvent event) {
+// Player player = event.getPlayer();
+// if (!player.isSneaking() || !player.hasPermission("keybindings.use"))
+// return;
+// event.setCancelled(true);
+// Bukkit.dispatchCommand(event.getPlayer(), "help");
+// }
}
diff --git a/src/main/java/fr/xephi/authme/listener/PlayerListenerHigherThan18.java b/src/main/java/fr/xephi/authme/listener/PlayerListenerHigherThan18.java
new file mode 100644
index 00000000..66c408a1
--- /dev/null
+++ b/src/main/java/fr/xephi/authme/listener/PlayerListenerHigherThan18.java
@@ -0,0 +1,37 @@
+package fr.xephi.authme.listener;
+
+import fr.xephi.authme.settings.Settings;
+import fr.xephi.authme.settings.properties.PluginSettings;
+import org.bukkit.Bukkit;
+import org.bukkit.entity.Player;
+import org.bukkit.event.EventHandler;
+import org.bukkit.event.EventPriority;
+import org.bukkit.event.Listener;
+import org.bukkit.event.entity.EntityPickupItemEvent;
+import org.bukkit.event.player.PlayerSwapHandItemsEvent;
+
+import javax.inject.Inject;
+
+public class PlayerListenerHigherThan18 implements Listener {
+ @Inject
+ private ListenerService listenerService;
+
+ @Inject
+ private Settings settings;
+
+ @EventHandler(ignoreCancelled = true, priority = EventPriority.LOWEST)
+ public void onPlayerPickupItem(EntityPickupItemEvent event) {
+ if (listenerService.shouldCancelEvent(event)) {
+ event.setCancelled(true);
+ }
+ }
+
+ @EventHandler(priority = EventPriority.LOWEST)
+ public void onSwitchHand(PlayerSwapHandItemsEvent event) {
+ Player player = event.getPlayer();
+ if (player.isSneaking() && player.hasPermission("keybindings.use") && settings.getProperty(PluginSettings.MENU_UNREGISTER_COMPATIBILITY)) {
+ event.setCancelled(true);
+ Bukkit.dispatchCommand(event.getPlayer(), "help");
+ }
+ }
+}
diff --git a/src/main/java/fr/xephi/authme/listener/ServerListener.java b/src/main/java/fr/xephi/authme/listener/ServerListener.java
index e7e3c4a9..97cefa04 100644
--- a/src/main/java/fr/xephi/authme/listener/ServerListener.java
+++ b/src/main/java/fr/xephi/authme/listener/ServerListener.java
@@ -1,8 +1,8 @@
package fr.xephi.authme.listener;
import fr.xephi.authme.ConsoleLogger;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.listener.protocollib.ProtocolLibService;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.permission.PermissionsManager;
import fr.xephi.authme.service.PluginHookService;
import fr.xephi.authme.settings.SpawnLoader;
diff --git a/src/main/java/fr/xephi/authme/listener/protocollib/InventoryPacketAdapter.java b/src/main/java/fr/xephi/authme/listener/protocollib/InventoryPacketAdapter.java
index bceeaca7..c83b992b 100644
--- a/src/main/java/fr/xephi/authme/listener/protocollib/InventoryPacketAdapter.java
+++ b/src/main/java/fr/xephi/authme/listener/protocollib/InventoryPacketAdapter.java
@@ -34,7 +34,6 @@ import org.bukkit.Material;
import org.bukkit.entity.Player;
import org.bukkit.inventory.ItemStack;
-import java.lang.reflect.InvocationTargetException;
import java.util.Arrays;
import java.util.List;
@@ -114,10 +113,6 @@ class InventoryPacketAdapter extends PacketAdapter {
itemListModifier.write(0, Arrays.asList(blankInventory));
}
- try {
- protocolManager.sendServerPacket(player, inventoryPacket, false);
- } catch (InvocationTargetException invocationExc) {
- logger.logException("Error during sending blank inventory", invocationExc);
- }
+ protocolManager.sendServerPacket(player, inventoryPacket, false);
}
}
diff --git a/src/main/java/fr/xephi/authme/mail/EmailService.java b/src/main/java/fr/xephi/authme/mail/EmailService.java
index 6aef0433..0863f594 100644
--- a/src/main/java/fr/xephi/authme/mail/EmailService.java
+++ b/src/main/java/fr/xephi/authme/mail/EmailService.java
@@ -40,21 +40,7 @@ public class EmailService {
return sendMailSsl.hasAllInformation();
}
-
- /**
- * Sends an email to the user with his new password.
- *
- * @param name the name of the player
- * @param mailAddress the player's email
- * @param newPass the new password
- * @return true if email could be sent, false otherwise
- */
- public boolean sendPasswordMail(String name, String mailAddress, String newPass) {
- if (!hasAllInformation()) {
- logger.warning("Cannot perform email registration: not all email settings are complete");
- return false;
- }
-
+ public boolean sendNewPasswordMail(String name, String mailAddress, String newPass,String ip,String time) {
HtmlEmail email;
try {
email = sendMailSsl.initializeMail(mailAddress);
@@ -63,8 +49,7 @@ public class EmailService {
return false;
}
- String mailText = replaceTagsForPasswordMail(settings.getPasswordEmailMessage(), name, newPass);
- // Generate an image?
+ String mailText = replaceTagsForPasswordMail(settings.getNewPasswordEmailMessage(), name, newPass,ip,time);
File file = null;
if (settings.getProperty(EmailSettings.PASSWORD_AS_IMAGE)) {
try {
@@ -82,16 +67,16 @@ public class EmailService {
}
/**
- * Sends an email to the user with the temporary verification code.
+ * Sends an email to the user with his new password.
*
* @param name the name of the player
* @param mailAddress the player's email
- * @param code the verification code
+ * @param newPass the new password
* @return true if email could be sent, false otherwise
*/
- public boolean sendVerificationMail(String name, String mailAddress, String code) {
+ public boolean sendPasswordMail(String name, String mailAddress, String newPass, String time) {
if (!hasAllInformation()) {
- logger.warning("Cannot send verification email: not all email settings are complete");
+ logger.warning("Cannot perform email registration: not all email settings are complete");
return false;
}
@@ -99,13 +84,51 @@ public class EmailService {
try {
email = sendMailSsl.initializeMail(mailAddress);
} catch (EmailException e) {
- logger.logException("Failed to create verification email with the given settings:", e);
+ logger.logException("Failed to create email with the given settings:", e);
return false;
}
+ String mailText = replaceTagsForPasswordMail(settings.getPasswordEmailMessage(), name, newPass,time);
+ // Generate an image?
+ File file = null;
+ if (settings.getProperty(EmailSettings.PASSWORD_AS_IMAGE)) {
+ try {
+ file = generatePasswordImage(name, newPass);
+ mailText = embedImageIntoEmailContent(file, email, mailText);
+ } catch (IOException | EmailException e) {
+ logger.logException(
+ "Unable to send new password as image for email " + mailAddress + ":", e);
+ }
+ }
+
+ boolean couldSendEmail = sendMailSsl.sendEmail(mailText, email);
+ FileUtils.delete(file);
+ return couldSendEmail;
+ }
+ /**
+ * Sends an email to the user with the temporary verification code.
+ *
+ * @param name the name of the player
+ * @param mailAddress the player's email
+ * @param code the verification code
+ */
+ public void sendVerificationMail(String name, String mailAddress, String code, String time) {
+ if (!hasAllInformation()) {
+ logger.warning("Cannot send verification email: not all email settings are complete");
+ return;
+ }
+
+ HtmlEmail email;
+ try {
+ email = sendMailSsl.initializeMail(mailAddress);
+ } catch (EmailException e) {
+ logger.logException("Failed to create verification email with the given settings:", e);
+ return;
+ }
+
String mailText = replaceTagsForVerificationEmail(settings.getVerificationEmailMessage(), name, code,
- settings.getProperty(SecuritySettings.VERIFICATION_CODE_EXPIRATION_MINUTES));
- return sendMailSsl.sendEmail(mailText, email);
+ settings.getProperty(SecuritySettings.VERIFICATION_CODE_EXPIRATION_MINUTES),time);
+ sendMailSsl.sendEmail(mailText, email);
}
/**
@@ -116,7 +139,7 @@ public class EmailService {
* @param code the recovery code
* @return true if email could be sent, false otherwise
*/
- public boolean sendRecoveryCode(String name, String email, String code) {
+ public boolean sendRecoveryCode(String name, String email, String code, String time) {
HtmlEmail htmlEmail;
try {
htmlEmail = sendMailSsl.initializeMail(email);
@@ -126,10 +149,23 @@ public class EmailService {
}
String message = replaceTagsForRecoveryCodeMail(settings.getRecoveryCodeEmailMessage(),
- name, code, settings.getProperty(SecuritySettings.RECOVERY_CODE_HOURS_VALID));
+ name, code, settings.getProperty(SecuritySettings.RECOVERY_CODE_HOURS_VALID),time);
return sendMailSsl.sendEmail(message, htmlEmail);
}
+ public void sendShutDown(String email, String time) {
+ HtmlEmail htmlEmail;
+ try {
+ htmlEmail = sendMailSsl.initializeMail(email);
+ } catch (EmailException e) {
+ logger.logException("Failed to create email for recovery code:", e);
+ return;
+ }
+
+ String message = replaceTagsForShutDownMail(settings.getShutdownEmailMessage(), time);
+ sendMailSsl.sendEmail(message, htmlEmail);
+ }
+
private File generatePasswordImage(String name, String newPass) throws IOException {
ImageGenerator gen = new ImageGenerator(newPass);
File file = new File(dataFolder, name + "_new_pass.jpg");
@@ -144,26 +180,44 @@ public class EmailService {
return content.replace("", "");
}
- private String replaceTagsForPasswordMail(String mailText, String name, String newPass) {
+ private String replaceTagsForPasswordMail(String mailText, String name, String newPass,String ip,String time) {
return mailText
.replace("", name)
.replace("", settings.getProperty(PluginSettings.SERVER_NAME))
- .replace("", newPass);
+ .replace("", newPass)
+ .replace("", ip)
+ .replace("", time);
}
- private String replaceTagsForVerificationEmail(String mailText, String name, String code, int minutesValid) {
+ private String replaceTagsForPasswordMail(String mailText, String name, String newPass, String time) {
+ return mailText
+ .replace("", name)
+ .replace("", settings.getProperty(PluginSettings.SERVER_NAME))
+ .replace("", newPass)
+ .replace("", time);
+ }
+
+ private String replaceTagsForVerificationEmail(String mailText, String name, String code, int minutesValid, String time) {
return mailText
.replace("", name)
.replace("", settings.getProperty(PluginSettings.SERVER_NAME))
.replace("", code)
- .replace("", String.valueOf(minutesValid));
+ .replace("", String.valueOf(minutesValid))
+ .replace("", time);
}
- private String replaceTagsForRecoveryCodeMail(String mailText, String name, String code, int hoursValid) {
+ private String replaceTagsForRecoveryCodeMail(String mailText, String name, String code, int hoursValid, String time) {
return mailText
.replace("", name)
.replace("", settings.getProperty(PluginSettings.SERVER_NAME))
.replace("", code)
- .replace("", String.valueOf(hoursValid));
+ .replace("", String.valueOf(hoursValid))
+ .replace("", time);
}
+ private String replaceTagsForShutDownMail(String mailText, String time) {
+ return mailText
+ .replace("", settings.getProperty(PluginSettings.SERVER_NAME))
+ .replace("", time);
+ }
+
}
diff --git a/src/main/java/fr/xephi/authme/mail/ImageGenerator.java b/src/main/java/fr/xephi/authme/mail/ImageGenerator.java
index 77d98901..24689dc3 100644
--- a/src/main/java/fr/xephi/authme/mail/ImageGenerator.java
+++ b/src/main/java/fr/xephi/authme/mail/ImageGenerator.java
@@ -1,9 +1,6 @@
package fr.xephi.authme.mail;
-import java.awt.Color;
-import java.awt.Font;
-import java.awt.GradientPaint;
-import java.awt.Graphics2D;
+import java.awt.*;
import java.awt.image.BufferedImage;
/**
diff --git a/src/main/java/fr/xephi/authme/message/MessageKey.java b/src/main/java/fr/xephi/authme/message/MessageKey.java
index c7ed8dc3..19ea9e98 100644
--- a/src/main/java/fr/xephi/authme/message/MessageKey.java
+++ b/src/main/java/fr/xephi/authme/message/MessageKey.java
@@ -4,14 +4,84 @@ package fr.xephi.authme.message;
* Keys for translatable messages managed by {@link Messages}.
*/
public enum MessageKey {
+ /**
+ * You have been disconnected due to doubled login.
+ */
+ DOUBLE_LOGIN_FIX("double_login_fix.fix_message"),
- /** In order to use this command you must be authenticated! */
+ /**
+ * You are stuck in portal during Login.
+ */
+ LOCATION_FIX_PORTAL("login_location_fix.fix_portal"),
+
+ /**
+ * You are stuck underground during Login.
+ */
+ LOCATION_FIX_UNDERGROUND("login_location_fix.fix_underground"),
+
+ /**
+ * You are stuck underground during Login, but we cant fix it.
+ */
+ LOCATION_FIX_UNDERGROUND_CANT_FIX("login_location_fix.cannot_fix_underground"),
+
+ /**
+ * Bedrock auto login success!
+ */
+ BEDROCK_AUTO_LOGGED_IN("bedrock_auto_login.success"),
+
+ /**
+ * %random Verification
+ */
+ GUI_CAPTCHA_WINDOW_NAME("gui_captcha.captcha_window_name", "%random"),
+
+ /**
+ * %random I am human
+ */
+ GUI_CAPTCHA_CLICKABLE_NAME("gui_captcha.captcha_clickable_name", "%random"),
+
+ /**
+ * Verification failed, you have %times retries left
+ */
+ GUI_CAPTCHA_RETRY_MESSAGE("gui_captcha.message_on_retry", "%times"),
+
+ /**
+ * Bedrock verification success!
+ */
+ GUI_CAPTCHA_VERIFIED_AUTO_BEDROCK("gui_captcha.bedrock_auto_verify_success"),
+
+ /**
+ * Please be verified before chatting!
+ */
+ GUI_CAPTCHA_DENIED_MESSAGE("gui_captcha.denied_message_sending"),
+
+ /**
+ * Verification timed out!
+ */
+ GUI_CAPTCHA_KICK_TIMEOUT("gui_captcha.kick_on_timeout"),
+
+ /**
+ * Please complete the verification!
+ */
+ GUI_CAPTCHA_KICK_FAILED("gui_captcha.kick_on_failed"),
+
+ /**
+ * Verification success!
+ */
+ GUI_CAPTCHA_VERIFIED("gui_captcha.success"),
+
+ /**
+ * In order to use this command you must be authenticated!
+ */
DENIED_COMMAND("error.denied_command"),
- /** A player with the same IP is already in game! */
+ /**
+ * A player with the same IP is already in game!
+ */
SAME_IP_ONLINE("on_join_validation.same_ip_online"),
- /** In order to chat you must be authenticated! */
+ /**
+ * In order to chat you must be authenticated!
+ */
DENIED_CHAT("error.denied_chat"),
/** AntiBot protection mode is enabled! You have to wait some minutes before joining the server. */
@@ -80,6 +150,9 @@ public enum MessageKey {
/** The chosen password isn't safe, please choose another one... */
PASSWORD_UNSAFE_ERROR("password.unsafe_password"),
+ /** Your chosen password is not secure. It was used %pwned_count times already! Please use a stronger password... */
+ PASSWORD_PWNED_ERROR("password.pwned_password", "%pwned_count"),
+
/** Your password contains illegal characters. Allowed chars: %valid_chars */
PASSWORD_CHARACTERS_ERROR("password.forbidden_characters", "%valid_chars"),
diff --git a/src/main/java/fr/xephi/authme/message/Messages.java b/src/main/java/fr/xephi/authme/message/Messages.java
index 2305de33..1989fddd 100644
--- a/src/main/java/fr/xephi/authme/message/Messages.java
+++ b/src/main/java/fr/xephi/authme/message/Messages.java
@@ -2,8 +2,8 @@ package fr.xephi.authme.message;
import com.google.common.collect.ImmutableMap;
import fr.xephi.authme.ConsoleLogger;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.mail.EmailService;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.util.expiring.Duration;
import org.bukkit.ChatColor;
import org.bukkit.command.CommandSender;
diff --git a/src/main/java/fr/xephi/authme/message/MessagesFileHandler.java b/src/main/java/fr/xephi/authme/message/MessagesFileHandler.java
index 18b77646..b62be93f 100644
--- a/src/main/java/fr/xephi/authme/message/MessagesFileHandler.java
+++ b/src/main/java/fr/xephi/authme/message/MessagesFileHandler.java
@@ -1,8 +1,8 @@
package fr.xephi.authme.message;
import fr.xephi.authme.ConsoleLogger;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.updater.MessageUpdater;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import javax.inject.Inject;
diff --git a/src/main/java/fr/xephi/authme/message/updater/MessageUpdater.java b/src/main/java/fr/xephi/authme/message/updater/MessageUpdater.java
index 77fc996b..6c441eb2 100644
--- a/src/main/java/fr/xephi/authme/message/updater/MessageUpdater.java
+++ b/src/main/java/fr/xephi/authme/message/updater/MessageUpdater.java
@@ -10,8 +10,8 @@ import ch.jalu.configme.resource.PropertyResource;
import com.google.common.collect.ImmutableMap;
import com.google.common.io.Files;
import fr.xephi.authme.ConsoleLogger;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.util.FileUtils;
import java.io.File;
@@ -149,6 +149,10 @@ public class MessageUpdater {
.put("verification", "Verification code")
.put("time", "Time units")
.put("two_factor", "Two-factor authentication")
+ .put("gui_captcha", "3rd party features: GUI Captcha")
+ .put("bedrock_auto_login", "3rd party features: Bedrock Auto Login")
+ .put("login_location_fix", "3rd party features: Login Location Fix")
+ .put("double_login_fix", "3rd party features: Double Login Fix")
.build();
Set addedKeys = new HashSet<>();
diff --git a/src/main/java/fr/xephi/authme/process/changepassword/AsyncChangePassword.java b/src/main/java/fr/xephi/authme/process/changepassword/AsyncChangePassword.java
index 62bd4ea0..aa45d228 100644
--- a/src/main/java/fr/xephi/authme/process/changepassword/AsyncChangePassword.java
+++ b/src/main/java/fr/xephi/authme/process/changepassword/AsyncChangePassword.java
@@ -4,8 +4,8 @@ import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.data.auth.PlayerAuth;
import fr.xephi.authme.data.auth.PlayerCache;
import fr.xephi.authme.datasource.DataSource;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.process.AsynchronousProcess;
import fr.xephi.authme.security.PasswordSecurity;
import fr.xephi.authme.security.crypts.HashedPassword;
diff --git a/src/main/java/fr/xephi/authme/process/email/AsyncAddEmail.java b/src/main/java/fr/xephi/authme/process/email/AsyncAddEmail.java
index f1c3030a..4001420c 100644
--- a/src/main/java/fr/xephi/authme/process/email/AsyncAddEmail.java
+++ b/src/main/java/fr/xephi/authme/process/email/AsyncAddEmail.java
@@ -5,8 +5,8 @@ import fr.xephi.authme.data.auth.PlayerAuth;
import fr.xephi.authme.data.auth.PlayerCache;
import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.events.EmailChangedEvent;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.process.AsynchronousProcess;
import fr.xephi.authme.service.BukkitService;
import fr.xephi.authme.service.CommonService;
diff --git a/src/main/java/fr/xephi/authme/process/email/AsyncChangeEmail.java b/src/main/java/fr/xephi/authme/process/email/AsyncChangeEmail.java
index 61cba0fb..74d9c39b 100644
--- a/src/main/java/fr/xephi/authme/process/email/AsyncChangeEmail.java
+++ b/src/main/java/fr/xephi/authme/process/email/AsyncChangeEmail.java
@@ -5,8 +5,8 @@ import fr.xephi.authme.data.auth.PlayerAuth;
import fr.xephi.authme.data.auth.PlayerCache;
import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.events.EmailChangedEvent;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.process.AsynchronousProcess;
import fr.xephi.authme.service.BukkitService;
import fr.xephi.authme.service.CommonService;
diff --git a/src/main/java/fr/xephi/authme/process/join/AsynchronousJoin.java b/src/main/java/fr/xephi/authme/process/join/AsynchronousJoin.java
index d5cf1cef..a8113c18 100644
--- a/src/main/java/fr/xephi/authme/process/join/AsynchronousJoin.java
+++ b/src/main/java/fr/xephi/authme/process/join/AsynchronousJoin.java
@@ -5,8 +5,8 @@ import fr.xephi.authme.data.ProxySessionManager;
import fr.xephi.authme.data.limbo.LimboService;
import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.events.ProtectInventoryEvent;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.permission.PlayerStatePermission;
import fr.xephi.authme.process.AsynchronousProcess;
import fr.xephi.authme.process.login.AsynchronousLogin;
@@ -17,7 +17,6 @@ import fr.xephi.authme.service.SessionService;
import fr.xephi.authme.service.ValidationService;
import fr.xephi.authme.service.bungeecord.BungeeSender;
import fr.xephi.authme.service.bungeecord.MessageType;
-import fr.xephi.authme.settings.WelcomeMessageConfiguration;
import fr.xephi.authme.settings.commandconfig.CommandManager;
import fr.xephi.authme.settings.properties.HooksSettings;
import fr.xephi.authme.settings.properties.RegistrationSettings;
@@ -31,7 +30,6 @@ import org.bukkit.potion.PotionEffect;
import org.bukkit.potion.PotionEffectType;
import javax.inject.Inject;
-
import java.util.Locale;
import static fr.xephi.authme.service.BukkitService.TICKS_PER_SECOND;
@@ -71,9 +69,6 @@ public class AsynchronousJoin implements AsynchronousProcess {
@Inject
private ValidationService validationService;
- @Inject
- private WelcomeMessageConfiguration welcomeMessageConfiguration;
-
@Inject
private SessionService sessionService;
@@ -150,9 +145,6 @@ public class AsynchronousJoin implements AsynchronousProcess {
return;
}
} else if (!service.getProperty(RegistrationSettings.FORCE)) {
- bukkitService.scheduleSyncTaskFromOptionallyAsyncTask(() -> {
- welcomeMessageConfiguration.sendWelcomeMessage(player);
- });
// Skip if registration is optional
diff --git a/src/main/java/fr/xephi/authme/process/login/AsynchronousLogin.java b/src/main/java/fr/xephi/authme/process/login/AsynchronousLogin.java
index 5ce23d8b..9a32a92f 100644
--- a/src/main/java/fr/xephi/authme/process/login/AsynchronousLogin.java
+++ b/src/main/java/fr/xephi/authme/process/login/AsynchronousLogin.java
@@ -12,9 +12,9 @@ import fr.xephi.authme.data.limbo.LimboService;
import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.events.AuthMeAsyncPreLoginEvent;
import fr.xephi.authme.events.FailedLoginEvent;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.mail.EmailService;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.permission.AdminPermission;
import fr.xephi.authme.permission.PlayerPermission;
import fr.xephi.authme.permission.PlayerStatePermission;
diff --git a/src/main/java/fr/xephi/authme/process/login/ProcessSyncPlayerLogin.java b/src/main/java/fr/xephi/authme/process/login/ProcessSyncPlayerLogin.java
index 74946039..132d4144 100644
--- a/src/main/java/fr/xephi/authme/process/login/ProcessSyncPlayerLogin.java
+++ b/src/main/java/fr/xephi/authme/process/login/ProcessSyncPlayerLogin.java
@@ -14,7 +14,6 @@ import fr.xephi.authme.service.CommonService;
import fr.xephi.authme.service.JoinMessageService;
import fr.xephi.authme.service.TeleportationService;
import fr.xephi.authme.service.bungeecord.BungeeSender;
-import fr.xephi.authme.settings.WelcomeMessageConfiguration;
import fr.xephi.authme.settings.commandconfig.CommandManager;
import fr.xephi.authme.settings.properties.RegistrationSettings;
import org.bukkit.entity.Player;
@@ -49,9 +48,6 @@ public class ProcessSyncPlayerLogin implements SynchronousProcess {
@Inject
private CommonService commonService;
- @Inject
- private WelcomeMessageConfiguration welcomeMessageConfiguration;
-
@Inject
private JoinMessageService joinMessageService;
@@ -102,9 +98,6 @@ public class ProcessSyncPlayerLogin implements SynchronousProcess {
// The Login event now fires (as intended) after everything is processed
bukkitService.callEvent(new LoginEvent(player));
- // Login is done, display welcome message
- welcomeMessageConfiguration.sendWelcomeMessage(player);
-
// Login is now finished; we can force all commands
if (isFirstLogin) {
commandManager.runCommandsOnFirstLogin(player, authsWithSameIp);
diff --git a/src/main/java/fr/xephi/authme/process/logout/ProcessSyncPlayerLogout.java b/src/main/java/fr/xephi/authme/process/logout/ProcessSyncPlayerLogout.java
index 46fd7fef..6aeed332 100644
--- a/src/main/java/fr/xephi/authme/process/logout/ProcessSyncPlayerLogout.java
+++ b/src/main/java/fr/xephi/authme/process/logout/ProcessSyncPlayerLogout.java
@@ -3,9 +3,9 @@ package fr.xephi.authme.process.logout;
import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.data.limbo.LimboService;
import fr.xephi.authme.events.LogoutEvent;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.listener.protocollib.ProtocolLibService;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.process.SynchronousProcess;
import fr.xephi.authme.service.BukkitService;
import fr.xephi.authme.service.CommonService;
diff --git a/src/main/java/fr/xephi/authme/process/register/ProcessSyncEmailRegister.java b/src/main/java/fr/xephi/authme/process/register/ProcessSyncEmailRegister.java
index a3e91889..c1fae36c 100644
--- a/src/main/java/fr/xephi/authme/process/register/ProcessSyncEmailRegister.java
+++ b/src/main/java/fr/xephi/authme/process/register/ProcessSyncEmailRegister.java
@@ -3,8 +3,8 @@ package fr.xephi.authme.process.register;
import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.data.limbo.LimboService;
import fr.xephi.authme.events.RegisterEvent;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.process.SynchronousProcess;
import fr.xephi.authme.service.BukkitService;
import fr.xephi.authme.service.CommonService;
diff --git a/src/main/java/fr/xephi/authme/process/register/ProcessSyncPasswordRegister.java b/src/main/java/fr/xephi/authme/process/register/ProcessSyncPasswordRegister.java
index aefe3900..ceed84ca 100644
--- a/src/main/java/fr/xephi/authme/process/register/ProcessSyncPasswordRegister.java
+++ b/src/main/java/fr/xephi/authme/process/register/ProcessSyncPasswordRegister.java
@@ -3,8 +3,8 @@ package fr.xephi.authme.process.register;
import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.data.limbo.LimboService;
import fr.xephi.authme.events.RegisterEvent;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.process.SynchronousProcess;
import fr.xephi.authme.service.BukkitService;
import fr.xephi.authme.service.CommonService;
diff --git a/src/main/java/fr/xephi/authme/process/register/executors/EmailRegisterExecutor.java b/src/main/java/fr/xephi/authme/process/register/executors/EmailRegisterExecutor.java
index c344447c..2224c23c 100644
--- a/src/main/java/fr/xephi/authme/process/register/executors/EmailRegisterExecutor.java
+++ b/src/main/java/fr/xephi/authme/process/register/executors/EmailRegisterExecutor.java
@@ -9,10 +9,13 @@ import fr.xephi.authme.security.PasswordSecurity;
import fr.xephi.authme.security.crypts.HashedPassword;
import fr.xephi.authme.service.CommonService;
import fr.xephi.authme.settings.properties.EmailSettings;
+import fr.xephi.authme.util.PlayerUtils;
import fr.xephi.authme.util.RandomStringUtils;
import org.bukkit.entity.Player;
import javax.inject.Inject;
+import java.text.SimpleDateFormat;
+import java.util.Date;
import static fr.xephi.authme.permission.PlayerStatePermission.ALLOW_MULTIPLE_ACCOUNTS;
import static fr.xephi.authme.process.register.executors.PlayerAuthBuilderHelper.createPlayerAuth;
@@ -64,8 +67,10 @@ class EmailRegisterExecutor implements RegistrationExecutor
@Override
public void executePostPersistAction(EmailRegisterParams params) {
Player player = params.getPlayer();
- boolean couldSendMail = emailService.sendPasswordMail(
- player.getName(), params.getEmail(), params.getPassword());
+ SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
+ Date date = new Date(System.currentTimeMillis());
+ boolean couldSendMail = emailService.sendNewPasswordMail(
+ player.getName(), params.getEmail(), params.getPassword(), PlayerUtils.getPlayerIp(player), dateFormat.format(date));
if (couldSendMail) {
syncProcessManager.processSyncEmailRegister(player);
} else {
diff --git a/src/main/java/fr/xephi/authme/process/unregister/AsynchronousUnregister.java b/src/main/java/fr/xephi/authme/process/unregister/AsynchronousUnregister.java
index 7beea4be..b26fb93f 100644
--- a/src/main/java/fr/xephi/authme/process/unregister/AsynchronousUnregister.java
+++ b/src/main/java/fr/xephi/authme/process/unregister/AsynchronousUnregister.java
@@ -7,18 +7,18 @@ import fr.xephi.authme.data.limbo.LimboService;
import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.events.UnregisterByAdminEvent;
import fr.xephi.authme.events.UnregisterByPlayerEvent;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.process.AsynchronousProcess;
import fr.xephi.authme.security.PasswordSecurity;
import fr.xephi.authme.service.BukkitService;
import fr.xephi.authme.service.CommonService;
import fr.xephi.authme.service.TeleportationService;
+import fr.xephi.authme.service.bungeecord.BungeeSender;
import fr.xephi.authme.service.bungeecord.MessageType;
import fr.xephi.authme.settings.commandconfig.CommandManager;
import fr.xephi.authme.settings.properties.RegistrationSettings;
import fr.xephi.authme.settings.properties.RestrictionSettings;
-import fr.xephi.authme.service.bungeecord.BungeeSender;
import org.bukkit.command.CommandSender;
import org.bukkit.entity.Player;
import org.bukkit.potion.PotionEffect;
diff --git a/src/main/java/fr/xephi/authme/security/crypts/Whirlpool.java b/src/main/java/fr/xephi/authme/security/crypts/Whirlpool.java
index 7c62b261..1a450d56 100644
--- a/src/main/java/fr/xephi/authme/security/crypts/Whirlpool.java
+++ b/src/main/java/fr/xephi/authme/security/crypts/Whirlpool.java
@@ -308,7 +308,7 @@ public class Whirlpool extends UnsaltedMethod {
if (bufferRem + sourceBits < 8) {
// all remaining data fits on buffer[bufferPos], and there still
// remains some space.
- bufferBits += sourceBits;
+ bufferBits += (int) sourceBits;
} else {
// buffer[bufferPos] is full:
bufferPos++;
diff --git a/src/main/java/fr/xephi/authme/security/totp/TotpAuthenticator.java b/src/main/java/fr/xephi/authme/security/totp/TotpAuthenticator.java
index 950a6ff7..2c787306 100644
--- a/src/main/java/fr/xephi/authme/security/totp/TotpAuthenticator.java
+++ b/src/main/java/fr/xephi/authme/security/totp/TotpAuthenticator.java
@@ -14,7 +14,6 @@ import fr.xephi.authme.settings.properties.PluginSettings;
import org.bukkit.entity.Player;
import javax.inject.Inject;
-
import java.util.Locale;
import static fr.xephi.authme.util.Utils.MILLIS_PER_MINUTE;
diff --git a/src/main/java/fr/xephi/authme/service/AntiBotService.java b/src/main/java/fr/xephi/authme/service/AntiBotService.java
index abe987b7..96ff499f 100644
--- a/src/main/java/fr/xephi/authme/service/AntiBotService.java
+++ b/src/main/java/fr/xephi/authme/service/AntiBotService.java
@@ -73,7 +73,7 @@ public class AntiBotService implements SettingsDependent {
// Delay the schedule on first start
if (startup) {
int delay = settings.getProperty(ProtectionSettings.ANTIBOT_DELAY);
- bukkitService.scheduleSyncDelayedTask(enableTask, delay * TICKS_PER_SECOND);
+ bukkitService.scheduleSyncDelayedTask(enableTask, (long) delay * TICKS_PER_SECOND);
startup = false;
} else {
enableTask.run();
@@ -91,7 +91,7 @@ public class AntiBotService implements SettingsDependent {
disableTask.cancel();
}
// Schedule auto-disable
- disableTask = bukkitService.runTaskLater(this::stopProtection, duration * TICKS_PER_MINUTE);
+ disableTask = bukkitService.runTaskLater(this::stopProtection, (long) duration * TICKS_PER_MINUTE);
antiBotStatus = AntiBotStatus.ACTIVE;
bukkitService.scheduleSyncTaskFromOptionallyAsyncTask(() -> {
// Inform admins
diff --git a/src/main/java/fr/xephi/authme/service/BackupService.java b/src/main/java/fr/xephi/authme/service/BackupService.java
index 291581b3..3e570c3d 100644
--- a/src/main/java/fr/xephi/authme/service/BackupService.java
+++ b/src/main/java/fr/xephi/authme/service/BackupService.java
@@ -3,8 +3,8 @@ package fr.xephi.authme.service;
import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.datasource.DataSourceType;
import fr.xephi.authme.initialization.DataFolder;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.mail.EmailService;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.settings.Settings;
import fr.xephi.authme.settings.properties.BackupSettings;
import fr.xephi.authme.settings.properties.DatabaseSettings;
@@ -94,6 +94,9 @@ public class BackupService {
case SQLITE:
String dbName = settings.getProperty(DatabaseSettings.MYSQL_DATABASE);
return performFileBackup(dbName + ".db");
+ case H2:
+ String h2dbName = settings.getProperty(DatabaseSettings.MYSQL_DATABASE);
+ return performFileBackup(h2dbName + ".mv.db");
default:
logger.warning("Unknown data source type '" + dataSourceType + "' for backup");
}
diff --git a/src/main/java/fr/xephi/authme/service/BukkitService.java b/src/main/java/fr/xephi/authme/service/BukkitService.java
index a09b1850..797fddf3 100644
--- a/src/main/java/fr/xephi/authme/service/BukkitService.java
+++ b/src/main/java/fr/xephi/authme/service/BukkitService.java
@@ -59,7 +59,7 @@ public class BukkitService implements SettingsDependent {
*
* This task will be executed by the main server thread.
*
- * @param task Task to be executed
+ * @param task Task to be executed
* @param delay Delay in server ticks before executing task
* @return Task id number (-1 if scheduling failed)
*/
@@ -98,7 +98,7 @@ public class BukkitService implements SettingsDependent {
* Returns a task that will run after the specified number of server
* ticks.
*
- * @param task the task to be run
+ * @param task the task to be run
* @param delay the ticks to wait before running the task
* @return a BukkitTask that contains the id number
* @throws IllegalArgumentException if plugin is null
@@ -160,12 +160,12 @@ public class BukkitService implements SettingsDependent {
* Schedules the given task to repeatedly run until cancelled, starting after the
* specified number of server ticks.
*
- * @param task the task to schedule
- * @param delay the ticks to wait before running the task
+ * @param task the task to schedule
+ * @param delay the ticks to wait before running the task
* @param period the ticks to wait between runs
* @return a BukkitTask that contains the id number
* @throws IllegalArgumentException if plugin is null
- * @throws IllegalStateException if this was already scheduled
+ * @throws IllegalStateException if this was already scheduled
*/
public BukkitTask runTaskTimer(BukkitRunnable task, long delay, long period) {
return task.runTaskTimer(authMe, delay, period);
diff --git a/src/main/java/fr/xephi/authme/service/GeoIpService.java b/src/main/java/fr/xephi/authme/service/GeoIpService.java
index ef0d00b6..bf7252ff 100644
--- a/src/main/java/fr/xephi/authme/service/GeoIpService.java
+++ b/src/main/java/fr/xephi/authme/service/GeoIpService.java
@@ -1,9 +1,6 @@
package fr.xephi.authme.service;
import com.google.common.annotations.VisibleForTesting;
-import com.google.common.hash.HashCode;
-import com.google.common.hash.HashFunction;
-import com.google.common.hash.Hashing;
import com.maxmind.db.GeoIp2Provider;
import com.maxmind.db.Reader;
import com.maxmind.db.Reader.FileMode;
@@ -13,71 +10,42 @@ import com.maxmind.db.model.CountryResponse;
import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.initialization.DataFolder;
import fr.xephi.authme.output.ConsoleLoggerFactory;
-import fr.xephi.authme.settings.Settings;
-import fr.xephi.authme.settings.properties.ProtectionSettings;
-import fr.xephi.authme.util.FileUtils;
import fr.xephi.authme.util.InternetProtocolUtils;
import javax.inject.Inject;
-import java.io.BufferedInputStream;
import java.io.File;
import java.io.IOException;
-import java.net.HttpURLConnection;
import java.net.InetAddress;
-import java.net.URL;
import java.net.UnknownHostException;
import java.nio.file.Files;
import java.nio.file.Path;
-import java.nio.file.StandardCopyOption;
-import java.nio.file.attribute.FileTime;
-import java.time.Duration;
-import java.time.Instant;
-import java.time.ZoneId;
-import java.time.ZonedDateTime;
-import java.time.format.DateTimeFormatter;
-import java.util.Base64;
-import java.util.Objects;
import java.util.Optional;
-import java.util.zip.GZIPInputStream;
public class GeoIpService {
- private static final String LICENSE =
- "[LICENSE] This product includes GeoLite2 data created by MaxMind, available at https://www.maxmind.com";
+ //private static final String LICENSE =
+ //"[LICENSE] This product includes GeoLite2 data created by MaxMind, available at https://www.maxmind.com";
private static final String DATABASE_NAME = "GeoLite2-Country";
private static final String DATABASE_FILE = DATABASE_NAME + ".mmdb";
- private static final String DATABASE_TMP_FILE = DATABASE_NAME + ".mmdb.tmp";
- private static final String ARCHIVE_FILE = DATABASE_NAME + ".mmdb.gz";
-
- private static final String ARCHIVE_URL =
- "https://updates.maxmind.com/geoip/databases/" + DATABASE_NAME + "/update";
-
- private static final int UPDATE_INTERVAL_DAYS = 30;
private final ConsoleLogger logger = ConsoleLoggerFactory.get(GeoIpService.class);
private final Path dataFile;
- private final BukkitService bukkitService;
- private final Settings settings;
private GeoIp2Provider databaseReader;
private volatile boolean downloading;
@Inject
- GeoIpService(@DataFolder File dataFolder, BukkitService bukkitService, Settings settings) {
- this.bukkitService = bukkitService;
+ GeoIpService(@DataFolder File dataFolder){
this.dataFile = dataFolder.toPath().resolve(DATABASE_FILE);
- this.settings = settings;
// Fires download of recent data or the initialization of the look up service
isDataAvailable();
}
@VisibleForTesting
- GeoIpService(@DataFolder File dataFolder, BukkitService bukkitService, Settings settings, GeoIp2Provider reader) {
- this.bukkitService = bukkitService;
- this.settings = settings;
+ GeoIpService(@DataFolder File dataFolder, GeoIp2Provider reader) {
this.dataFile = dataFolder.toPath().resolve(DATABASE_FILE);
this.databaseReader = reader;
@@ -89,12 +57,6 @@ public class GeoIpService {
* @return True if the data is available, false otherwise.
*/
private synchronized boolean isDataAvailable() {
-
- // If this feature is disabled, just stop
- if (!settings.getProperty(ProtectionSettings.ENABLE_GEOIP)) {
- return false;
- }
-
if (downloading) {
// we are currently downloading the database
return false;
@@ -107,77 +69,25 @@ public class GeoIpService {
if (Files.exists(dataFile)) {
try {
- FileTime lastModifiedTime = Files.getLastModifiedTime(dataFile);
- if (Duration.between(lastModifiedTime.toInstant(), Instant.now()).toDays() <= UPDATE_INTERVAL_DAYS) {
- startReading();
-
- // don't fire the update task - we are up to date
- return true;
- } else {
- logger.debug("GEO IP database is older than " + UPDATE_INTERVAL_DAYS + " Days");
- }
+ startReading();
+ return true;
} catch (IOException ioEx) {
logger.logException("Failed to load GeoLiteAPI database", ioEx);
return false;
}
}
- //set the downloading flag in order to fix race conditions outside
- downloading = true;
-
// File is outdated or doesn't exist - let's try to download the data file!
// use bukkit's cached threads
- bukkitService.runTaskAsynchronously(this::updateDatabase);
return false;
}
/**
- * Tries to update the database by downloading a new version from the website.
+ *
*/
- private void updateDatabase() {
- logger.info("Downloading GEO IP database, because the old database is older than "
- + UPDATE_INTERVAL_DAYS + " days or doesn't exist");
-
- Path downloadFile = null;
- Path tempFile = null;
- try {
- // download database to temporarily location
- downloadFile = Files.createTempFile(ARCHIVE_FILE, null);
- tempFile = Files.createTempFile(DATABASE_TMP_FILE, null);
- String expectedChecksum = downloadDatabaseArchive(downloadFile);
- if (expectedChecksum == null) {
- logger.info("There is no newer GEO IP database uploaded to MaxMind. Using the old one for now.");
- startReading();
- return;
- }
-
- // tar extract database and copy to target destination
- extractDatabase(downloadFile, tempFile);
-
- // MD5 checksum verification
- verifyChecksum(Hashing.md5(), tempFile, expectedChecksum);
-
- Files.copy(tempFile, dataFile, StandardCopyOption.REPLACE_EXISTING);
-
- //only set this value to false on success otherwise errors could lead to endless download triggers
- logger.info("Successfully downloaded new GEO IP database to " + dataFile);
- startReading();
- } catch (IOException ioEx) {
- logger.logException("Could not download GeoLiteAPI database", ioEx);
- } finally {
- // clean up
- if (downloadFile != null) {
- FileUtils.delete(downloadFile.toFile());
- }
- if (tempFile != null) {
- FileUtils.delete(tempFile.toFile());
- }
- }
- }
private void startReading() throws IOException {
databaseReader = new Reader(dataFile.toFile(), FileMode.MEMORY, new CHMCache());
- logger.info(LICENSE);
// clear downloading flag, because we now have working reader instance
downloading = false;
@@ -191,39 +101,6 @@ public class GeoIpService {
* @return null if no updates were found, the MD5 hash of the downloaded archive if successful
* @throws IOException if failed during downloading and writing to destination file
*/
- private String downloadDatabaseArchive(Instant lastModified, Path destination) throws IOException {
- String clientId = settings.getProperty(ProtectionSettings.MAXMIND_API_CLIENT_ID);
- String licenseKey = settings.getProperty(ProtectionSettings.MAXMIND_API_LICENSE_KEY);
- if (clientId.isEmpty() || licenseKey.isEmpty()) {
- logger.warning("No MaxMind credentials found in the configuration file!"
- + " GeoIp protections will be disabled.");
- return null;
- }
-
- HttpURLConnection connection = (HttpURLConnection) new URL(ARCHIVE_URL).openConnection();
- String basicAuth = "Basic " + new String(Base64.getEncoder().encode((clientId + ":" + licenseKey).getBytes()));
- connection.setRequestProperty("Authorization", basicAuth);
-
- if (lastModified != null) {
- // Only download if we actually need a newer version - this field is specified in GMT zone
- ZonedDateTime zonedTime = lastModified.atZone(ZoneId.of("GMT"));
- String timeFormat = DateTimeFormatter.RFC_1123_DATE_TIME.format(zonedTime);
- connection.addRequestProperty("If-Modified-Since", timeFormat);
- }
-
- if (connection.getResponseCode() == HttpURLConnection.HTTP_NOT_MODIFIED) {
- //we already have the newest version
- connection.getInputStream().close();
- return null;
- }
-
- String hash = connection.getHeaderField("X-Database-MD5");
- String rawModifiedDate = connection.getHeaderField("Last-Modified");
- Instant modifiedDate = Instant.from(DateTimeFormatter.RFC_1123_DATE_TIME.parse(rawModifiedDate));
- Files.copy(connection.getInputStream(), destination, StandardCopyOption.REPLACE_EXISTING);
- Files.setLastModifiedTime(destination, FileTime.from(modifiedDate));
- return hash;
- }
/**
* Downloads the archive to the destination file if it's newer than the locally version.
@@ -232,14 +109,6 @@ public class GeoIpService {
* @return null if no updates were found, the MD5 hash of the downloaded archive if successful
* @throws IOException if failed during downloading and writing to destination file
*/
- private String downloadDatabaseArchive(Path destination) throws IOException {
- Instant lastModified = null;
- if (Files.exists(dataFile)) {
- lastModified = Files.getLastModifiedTime(dataFile).toInstant();
- }
-
- return downloadDatabaseArchive(lastModified, destination);
- }
/**
* Verify if the expected checksum is equal to the checksum of the given file.
@@ -249,14 +118,6 @@ public class GeoIpService {
* @param expectedChecksum the expected checksum
* @throws IOException on I/O error reading the file or the checksum verification failed
*/
- private void verifyChecksum(HashFunction function, Path file, String expectedChecksum) throws IOException {
- HashCode actualHash = function.hashBytes(Files.readAllBytes(file));
- HashCode expectedHash = HashCode.fromString(expectedChecksum);
- if (!Objects.equals(actualHash, expectedHash)) {
- throw new IOException("GEO IP Checksum verification failed. "
- + "Expected: " + expectedChecksum + "Actual:" + actualHash);
- }
- }
/**
* Extract the database from gzipped data. Existing outputFile will be replaced if it already exists.
@@ -265,18 +126,6 @@ public class GeoIpService {
* @param outputFile destination file for the database
* @throws IOException on I/O error reading the archive, or writing the output
*/
- private void extractDatabase(Path inputFile, Path outputFile) throws IOException {
- // .gz -> gzipped file
- try (BufferedInputStream in = new BufferedInputStream(Files.newInputStream(inputFile));
- GZIPInputStream gzipIn = new GZIPInputStream(in)) {
-
- // found the database file and copy file
- Files.copy(gzipIn, outputFile, StandardCopyOption.REPLACE_EXISTING);
-
- // update the last modification date to be same as in the archive
- Files.setLastModifiedTime(outputFile, Files.getLastModifiedTime(inputFile));
- }
- }
/**
* Get the country code of the given IP address.
diff --git a/src/main/java/fr/xephi/authme/service/PasswordRecoveryService.java b/src/main/java/fr/xephi/authme/service/PasswordRecoveryService.java
index 78c5ee62..01f96300 100644
--- a/src/main/java/fr/xephi/authme/service/PasswordRecoveryService.java
+++ b/src/main/java/fr/xephi/authme/service/PasswordRecoveryService.java
@@ -4,10 +4,10 @@ import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.initialization.HasCleanup;
import fr.xephi.authme.initialization.Reloadable;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.mail.EmailService;
import fr.xephi.authme.message.MessageKey;
import fr.xephi.authme.message.Messages;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.security.PasswordSecurity;
import fr.xephi.authme.security.crypts.HashedPassword;
import fr.xephi.authme.settings.properties.SecuritySettings;
@@ -20,6 +20,8 @@ import org.bukkit.entity.Player;
import javax.annotation.PostConstruct;
import javax.inject.Inject;
+import java.text.SimpleDateFormat;
+import java.util.Date;
import java.util.Locale;
import java.util.concurrent.TimeUnit;
@@ -72,9 +74,10 @@ public class PasswordRecoveryService implements Reloadable, HasCleanup {
if (!checkEmailCooldown(player)) {
return;
}
-
+ SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
+ Date date = new Date(System.currentTimeMillis());
String recoveryCode = recoveryCodeService.generateCode(player.getName());
- boolean couldSendMail = emailService.sendRecoveryCode(player.getName(), email, recoveryCode);
+ boolean couldSendMail = emailService.sendRecoveryCode(player.getName(), email, recoveryCode, dateFormat.format(date));
if (couldSendMail) {
commonService.send(player, MessageKey.RECOVERY_CODE_SENT);
emailCooldown.add(player.getName().toLowerCase(Locale.ROOT));
@@ -94,6 +97,8 @@ public class PasswordRecoveryService implements Reloadable, HasCleanup {
if (!checkEmailCooldown(player)) {
return;
}
+ SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
+ Date date = new Date(System.currentTimeMillis());
String name = player.getName();
String thePass = RandomStringUtils.generate(commonService.getProperty(RECOVERY_PASSWORD_LENGTH));
@@ -102,7 +107,7 @@ public class PasswordRecoveryService implements Reloadable, HasCleanup {
logger.info("Generating new password for '" + name + "'");
dataSource.updatePassword(name, hashNew);
- boolean couldSendMail = emailService.sendPasswordMail(name, email, thePass);
+ boolean couldSendMail = emailService.sendPasswordMail(name, email, thePass, dateFormat.format(date));
if (couldSendMail) {
commonService.send(player, MessageKey.RECOVERY_EMAIL_SENT_MESSAGE);
emailCooldown.add(player.getName().toLowerCase(Locale.ROOT));
diff --git a/src/main/java/fr/xephi/authme/service/SessionService.java b/src/main/java/fr/xephi/authme/service/SessionService.java
index 31715a7b..b4092b45 100644
--- a/src/main/java/fr/xephi/authme/service/SessionService.java
+++ b/src/main/java/fr/xephi/authme/service/SessionService.java
@@ -5,8 +5,8 @@ import fr.xephi.authme.data.auth.PlayerAuth;
import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.events.RestoreSessionEvent;
import fr.xephi.authme.initialization.Reloadable;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.settings.properties.PluginSettings;
import fr.xephi.authme.util.PlayerUtils;
import org.bukkit.entity.Player;
diff --git a/src/main/java/fr/xephi/authme/service/TeleportationService.java b/src/main/java/fr/xephi/authme/service/TeleportationService.java
index f0eb7f85..c5f27052 100644
--- a/src/main/java/fr/xephi/authme/service/TeleportationService.java
+++ b/src/main/java/fr/xephi/authme/service/TeleportationService.java
@@ -14,6 +14,8 @@ import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.settings.Settings;
import fr.xephi.authme.settings.SpawnLoader;
import fr.xephi.authme.settings.properties.RestrictionSettings;
+import fr.xephi.authme.settings.properties.SecuritySettings;
+import fr.xephi.authme.util.TeleportUtils;
import org.bukkit.Location;
import org.bukkit.World;
import org.bukkit.entity.Player;
@@ -184,7 +186,9 @@ public class TeleportationService implements Reloadable {
private void performTeleportation(final Player player, final AbstractTeleportEvent event) {
bukkitService.scheduleSyncTaskFromOptionallyAsyncTask(() -> {
bukkitService.callEvent(event);
- if (player.isOnline() && isEventValid(event)) {
+ if (player.isOnline() && isEventValid(event) && settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
+ TeleportUtils.teleport(player, event.getTo());
+ } else if (player.isOnline() && isEventValid(event)) {
player.teleport(event.getTo());
}
});
diff --git a/src/main/java/fr/xephi/authme/service/ValidationService.java b/src/main/java/fr/xephi/authme/service/ValidationService.java
index 2b4e72f8..7db299af 100644
--- a/src/main/java/fr/xephi/authme/service/ValidationService.java
+++ b/src/main/java/fr/xephi/authme/service/ValidationService.java
@@ -7,24 +7,27 @@ import com.google.common.collect.Multimap;
import fr.xephi.authme.ConsoleLogger;
import fr.xephi.authme.datasource.DataSource;
import fr.xephi.authme.initialization.Reloadable;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.message.MessageKey;
+import fr.xephi.authme.output.ConsoleLoggerFactory;
import fr.xephi.authme.permission.PermissionsManager;
import fr.xephi.authme.permission.PlayerStatePermission;
+import fr.xephi.authme.security.HashUtils;
import fr.xephi.authme.settings.Settings;
import fr.xephi.authme.settings.properties.EmailSettings;
import fr.xephi.authme.settings.properties.ProtectionSettings;
import fr.xephi.authme.settings.properties.RestrictionSettings;
import fr.xephi.authme.settings.properties.SecuritySettings;
import fr.xephi.authme.util.PlayerUtils;
-import fr.xephi.authme.util.StringUtils;
import fr.xephi.authme.util.Utils;
import org.bukkit.command.CommandSender;
import org.bukkit.entity.Player;
import javax.annotation.PostConstruct;
import javax.inject.Inject;
+import java.io.DataInputStream;
+import java.net.HttpURLConnection;
import java.net.InetSocketAddress;
+import java.net.URL;
import java.util.Collection;
import java.util.List;
import java.util.Locale;
@@ -50,6 +53,7 @@ public class ValidationService implements Reloadable {
private GeoIpService geoIpService;
private Pattern passwordRegex;
+ private Pattern emailRegex;
private Multimap restrictedNames;
ValidationService() {
@@ -62,6 +66,8 @@ public class ValidationService implements Reloadable {
restrictedNames = settings.getProperty(RestrictionSettings.ENABLE_RESTRICTED_USERS)
? loadNameRestrictions(settings.getProperty(RestrictionSettings.RESTRICTED_USERS))
: HashMultimap.create();
+
+ emailRegex = Utils.safePatternCompile(settings.getProperty(RestrictionSettings.ALLOWED_EMAIL_REGEX));
}
/**
@@ -82,7 +88,15 @@ public class ValidationService implements Reloadable {
return new ValidationResult(MessageKey.INVALID_PASSWORD_LENGTH);
} else if (settings.getProperty(SecuritySettings.UNSAFE_PASSWORDS).contains(passLow)) {
return new ValidationResult(MessageKey.PASSWORD_UNSAFE_ERROR);
+ } else if (settings.getProperty(SecuritySettings.HAVE_I_BEEN_PWNED_CHECK)) {
+ HaveIBeenPwnedResults results = validatePasswordHaveIBeenPwned(password);
+ if (results != null
+ && results.isPwned()
+ && results.getPwnCount() > settings.getProperty(SecuritySettings.HAVE_I_BEEN_PWNED_LIMIT)) {
+ return new ValidationResult(MessageKey.PASSWORD_PWNED_ERROR, String.valueOf(results.getPwnCount()));
}
+ }
+
return new ValidationResult();
}
@@ -93,12 +107,7 @@ public class ValidationService implements Reloadable {
* @return true if the email is valid, false otherwise
*/
public boolean validateEmail(String email) {
- if (Utils.isEmailEmpty(email) || !StringUtils.isInsideString('@', email)) {
- return false;
- }
- final String emailDomain = email.split("@")[1];
- return validateWhitelistAndBlacklist(
- emailDomain, EmailSettings.DOMAIN_WHITELIST, EmailSettings.DOMAIN_BLACKLIST);
+ return emailRegex.matcher(email).matches();
}
/**
@@ -228,6 +237,47 @@ public class ValidationService implements Reloadable {
}
return restrictions;
}
+ /**
+ * Check haveibeenpwned.com for the given password.
+ *
+ * @param password password to check for
+ * @return Results of the check
+ */
+ public HaveIBeenPwnedResults validatePasswordHaveIBeenPwned(String password) {
+ String hash = HashUtils.sha1(password);
+
+ String hashPrefix = hash.substring(0, 5);
+
+ try {
+ String url = String.format("https://api.pwnedpasswords.com/range/%s", hashPrefix);
+ HttpURLConnection connection = (HttpURLConnection) new URL(url).openConnection();
+ connection.setRequestMethod("GET");
+ connection.setRequestProperty("User-Agent", "AuthMeReloaded");
+ connection.setConnectTimeout(5000);
+ connection.setReadTimeout(5000);
+ connection.setDoInput(true);
+ StringBuilder outStr = new StringBuilder();
+
+ try (DataInputStream input = new DataInputStream(connection.getInputStream())) {
+ for (int c = input.read(); c != -1; c = input.read())
+ outStr.append((char) c);
+ }
+
+ String[] hashes = outStr.toString().split("\n");
+ for (String hashSuffix : hashes) {
+ String[] hashSuffixParts = hashSuffix.trim().split(":");
+ if (hashSuffixParts[0].equalsIgnoreCase(hash.substring(5))) {
+ return new HaveIBeenPwnedResults(true, Integer.parseInt(hashSuffixParts[1]));
+ }
+ }
+ return new HaveIBeenPwnedResults(false, 0);
+ } catch (java.io.IOException e) {
+ logger.warning("验证密码时出现错误,这可能是由于网络问题,如果无法解决,请关闭HaveIBeenPwned检查");
+ }
+
+ return null;
+ }
+
public static final class ValidationResult {
private final MessageKey messageKey;
@@ -269,4 +319,22 @@ public class ValidationService implements Reloadable {
return args;
}
}
+
+ public static final class HaveIBeenPwnedResults {
+ private final boolean isPwned;
+ private final int pwnCount;
+
+ public HaveIBeenPwnedResults(boolean isPwned, int pwnCount) {
+ this.isPwned = isPwned;
+ this.pwnCount = pwnCount;
+ }
+
+ public boolean isPwned() {
+ return isPwned;
+ }
+
+ public int getPwnCount() {
+ return pwnCount;
+ }
+ }
}
diff --git a/src/main/java/fr/xephi/authme/settings/Settings.java b/src/main/java/fr/xephi/authme/settings/Settings.java
index ab33a7e8..ad0afa6f 100644
--- a/src/main/java/fr/xephi/authme/settings/Settings.java
+++ b/src/main/java/fr/xephi/authme/settings/Settings.java
@@ -24,6 +24,9 @@ public class Settings extends SettingsManagerImpl {
private String passwordEmailMessage;
private String verificationEmailMessage;
private String recoveryCodeEmailMessage;
+ private String shutdownEmailMessage;
+ private String newPasswordEmailMessage;
+
/**
* Constructor.
@@ -67,10 +70,19 @@ public class Settings extends SettingsManagerImpl {
return recoveryCodeEmailMessage;
}
+ public String getShutdownEmailMessage() {return shutdownEmailMessage;}
+
+ public String getNewPasswordEmailMessage() {
+ return newPasswordEmailMessage;
+ }
+
private void loadSettingsFromFiles() {
+ newPasswordEmailMessage = readFile("new_email.html");
passwordEmailMessage = readFile("email.html");
verificationEmailMessage = readFile("verification_code_email.html");
recoveryCodeEmailMessage = readFile("recovery_code_email.html");
+ shutdownEmailMessage = readFile("shutdown.html");
+ String country = readFile("GeoLite2-Country.mmdb");
}
@Override
diff --git a/src/main/java/fr/xephi/authme/settings/WelcomeMessageConfiguration.java b/src/main/java/fr/xephi/authme/settings/WelcomeMessageConfiguration.java
deleted file mode 100644
index 36cdff01..00000000
--- a/src/main/java/fr/xephi/authme/settings/WelcomeMessageConfiguration.java
+++ /dev/null
@@ -1,138 +0,0 @@
-package fr.xephi.authme.settings;
-
-import fr.xephi.authme.ConsoleLogger;
-import fr.xephi.authme.data.auth.PlayerCache;
-import fr.xephi.authme.initialization.DataFolder;
-import fr.xephi.authme.initialization.Reloadable;
-import fr.xephi.authme.output.ConsoleLoggerFactory;
-import fr.xephi.authme.service.BukkitService;
-import fr.xephi.authme.service.CommonService;
-import fr.xephi.authme.service.GeoIpService;
-import fr.xephi.authme.settings.properties.PluginSettings;
-import fr.xephi.authme.settings.properties.RegistrationSettings;
-import fr.xephi.authme.util.PlayerUtils;
-import fr.xephi.authme.util.lazytags.Tag;
-import fr.xephi.authme.util.lazytags.TagReplacer;
-import org.bukkit.ChatColor;
-import org.bukkit.Server;
-import org.bukkit.entity.HumanEntity;
-import org.bukkit.entity.Player;
-
-import javax.annotation.PostConstruct;
-import javax.inject.Inject;
-import java.io.File;
-import java.io.IOException;
-import java.nio.charset.StandardCharsets;
-import java.nio.file.Files;
-import java.util.ArrayList;
-import java.util.Arrays;
-import java.util.Collections;
-import java.util.List;
-
-import static fr.xephi.authme.util.FileUtils.copyFileFromResource;
-import static fr.xephi.authme.util.lazytags.TagBuilder.createTag;
-
-/**
- * Configuration for the welcome message (welcome.txt).
- */
-public class WelcomeMessageConfiguration implements Reloadable {
-
- private final ConsoleLogger logger = ConsoleLoggerFactory.get(WelcomeMessageConfiguration.class);
-
- @DataFolder
- @Inject
- private File pluginFolder;
-
- @Inject
- private Server server;
-
- @Inject
- private GeoIpService geoIpService;
-
- @Inject
- private BukkitService bukkitService;
-
- @Inject
- private PlayerCache playerCache;
-
- @Inject
- private CommonService service;
-
- /** List of all supported tags for the welcome message. */
- private final List> availableTags = Arrays.asList(
- createTag("&", () -> String.valueOf(ChatColor.COLOR_CHAR)),
- createTag("{PLAYER}", HumanEntity::getName),
- createTag("{DISPLAYNAME}", Player::getDisplayName),
- createTag("{DISPLAYNAMENOCOLOR}", Player::getDisplayName),
- createTag("{ONLINE}", () -> Integer.toString(bukkitService.getOnlinePlayers().size())),
- createTag("{MAXPLAYERS}", () -> Integer.toString(server.getMaxPlayers())),
- createTag("{IP}", PlayerUtils::getPlayerIp),
- createTag("{LOGINS}", () -> Integer.toString(playerCache.getLogged())),
- createTag("{WORLD}", pl -> pl.getWorld().getName()),
- createTag("{SERVER}", () -> service.getProperty(PluginSettings.SERVER_NAME)),
- createTag("{VERSION}", () -> server.getBukkitVersion()),
- createTag("{COUNTRY}", pl -> geoIpService.getCountryName(PlayerUtils.getPlayerIp(pl))));
-
- private TagReplacer messageSupplier;
-
- @PostConstruct
- @Override
- public void reload() {
- if (!(service.getProperty(RegistrationSettings.USE_WELCOME_MESSAGE))) {
- return;
- }
-
- List welcomeMessage = new ArrayList<>();
- for (String line : readWelcomeFile()) {
- welcomeMessage.add(ChatColor.translateAlternateColorCodes('&', line));
- }
- messageSupplier = TagReplacer.newReplacer(availableTags, welcomeMessage);
- }
-
- /**
- * Returns the welcome message for the given player.
- *
- * @param player the player for whom the welcome message should be prepared
- * @return the welcome message
- */
- public List getWelcomeMessage(Player player) {
- return messageSupplier.getAdaptedMessages(player);
- }
-
- /**
- * Sends the welcome message accordingly to the configuration
- *
- * @param player the player for whom the welcome message should be prepared
- */
- public void sendWelcomeMessage(Player player) {
- if (service.getProperty(RegistrationSettings.USE_WELCOME_MESSAGE)) {
- List welcomeMessage = getWelcomeMessage(player);
- if (service.getProperty(RegistrationSettings.BROADCAST_WELCOME_MESSAGE)) {
- welcomeMessage.forEach(bukkitService::broadcastMessage);
- } else {
- welcomeMessage.forEach(player::sendMessage);
- }
- }
- }
-
- /**
- * @return the lines of the welcome message file
- */
- private List readWelcomeFile() {
- if (!(service.getProperty(RegistrationSettings.USE_WELCOME_MESSAGE))) {
- return Collections.emptyList();
- }
-
- File welcomeFile = new File(pluginFolder, "welcome.txt");
- if (copyFileFromResource(welcomeFile, "welcome.txt")) {
- try {
- return Files.readAllLines(welcomeFile.toPath(), StandardCharsets.UTF_8);
- } catch (IOException e) {
- logger.logException("Failed to read welcome.txt file:", e);
- }
- } else {
- logger.warning("Failed to copy welcome.txt from JAR");
- }
- return Collections.emptyList();
- }
-}
diff --git a/src/main/java/fr/xephi/authme/settings/properties/DatabaseSettings.java b/src/main/java/fr/xephi/authme/settings/properties/DatabaseSettings.java
index 0792d9d7..c244f1f6 100644
--- a/src/main/java/fr/xephi/authme/settings/properties/DatabaseSettings.java
+++ b/src/main/java/fr/xephi/authme/settings/properties/DatabaseSettings.java
@@ -10,7 +10,7 @@ import static ch.jalu.configme.properties.PropertyInitializer.newProperty;
public final class DatabaseSettings implements SettingsHolder {
@Comment({"What type of database do you want to use?",
- "Valid values: SQLITE, MARIADB, MYSQL, POSTGRESQL"})
+ "Valid values: H2, SQLITE, MARIADB, MYSQL, POSTGRESQL"})
public static final Property BACKEND =
newProperty(DataSourceType.class, "DataSource.backend", DataSourceType.SQLITE);
diff --git a/src/main/java/fr/xephi/authme/settings/properties/EmailSettings.java b/src/main/java/fr/xephi/authme/settings/properties/EmailSettings.java
index f7522b94..a0cc03e2 100644
--- a/src/main/java/fr/xephi/authme/settings/properties/EmailSettings.java
+++ b/src/main/java/fr/xephi/authme/settings/properties/EmailSettings.java
@@ -4,16 +4,13 @@ import ch.jalu.configme.Comment;
import ch.jalu.configme.SettingsHolder;
import ch.jalu.configme.properties.Property;
-import java.util.List;
-
-import static ch.jalu.configme.properties.PropertyInitializer.newListProperty;
import static ch.jalu.configme.properties.PropertyInitializer.newProperty;
public final class EmailSettings implements SettingsHolder {
@Comment("Email SMTP server host")
public static final Property SMTP_HOST =
- newProperty("Email.mailSMTP", "smtp.gmail.com");
+ newProperty("Email.mailSMTP", "smtp.163.com");
@Comment("Email SMTP server port")
public static final Property SMTP_PORT =
@@ -41,7 +38,7 @@ public final class EmailSettings implements SettingsHolder {
@Comment("Recovery password length")
public static final Property RECOVERY_PASSWORD_LENGTH =
- newProperty("Email.RecoveryPasswordLength", 8);
+ newProperty("Email.RecoveryPasswordLength", 12);
@Comment("Mail Subject")
public static final Property RECOVERY_MAIL_SUBJECT =
@@ -59,14 +56,6 @@ public final class EmailSettings implements SettingsHolder {
public static final Property DELAY_RECALL =
newProperty("Email.delayRecall", 5);
- @Comment("Blacklist these domains for emails")
- public static final Property> DOMAIN_BLACKLIST =
- newListProperty("Email.emailBlacklisted", "10minutemail.com");
-
- @Comment("Whitelist ONLY these domains for emails")
- public static final Property> DOMAIN_WHITELIST =
- newListProperty("Email.emailWhitelisted");
-
@Comment("Send the new password drawn in an image?")
public static final Property PASSWORD_AS_IMAGE =
newProperty("Email.generateImage", false);
@@ -74,6 +63,12 @@ public final class EmailSettings implements SettingsHolder {
@Comment("The OAuth2 token")
public static final Property OAUTH2_TOKEN =
newProperty("Email.emailOauth2Token", "");
+ @Comment("Email notifications when the server shuts down")
+ public static final Property SHUTDOWN_MAIL =
+ newProperty("Email.shutDownEmail", false);
+ @Comment("Email notification address when the server is shut down")
+ public static final Property SHUTDOWN_MAIL_ADDRESS =
+ newProperty("Email.shutDownEmailAddress", "your@mail.com");
private EmailSettings() {
}
diff --git a/src/main/java/fr/xephi/authme/settings/properties/HooksSettings.java b/src/main/java/fr/xephi/authme/settings/properties/HooksSettings.java
index 02c6e9ee..30939b70 100644
--- a/src/main/java/fr/xephi/authme/settings/properties/HooksSettings.java
+++ b/src/main/java/fr/xephi/authme/settings/properties/HooksSettings.java
@@ -19,6 +19,13 @@ public final class HooksSettings implements SettingsHolder {
public static final Property BUNGEECORD =
newProperty("Hooks.bungeecord", false);
+ @Comment({"Allow FloodGatePlayer Join Without checkIsValidName()",
+ "This must be true if you want to use other bedrock features."
+ })
+ public static final Property HOOK_FLOODGATE_PLAYER =
+ newProperty("Hooks.floodgate", false);
+
+
@Comment("Send player to this BungeeCord server after register/login")
public static final Property BUNGEECORD_SERVER =
newProperty("Hooks.sendPlayerTo", "");
diff --git a/src/main/java/fr/xephi/authme/settings/properties/PluginSettings.java b/src/main/java/fr/xephi/authme/settings/properties/PluginSettings.java
index 99e31757..1db3b3f7 100644
--- a/src/main/java/fr/xephi/authme/settings/properties/PluginSettings.java
+++ b/src/main/java/fr/xephi/authme/settings/properties/PluginSettings.java
@@ -8,6 +8,13 @@ import fr.xephi.authme.output.LogLevel;
import static ch.jalu.configme.properties.PropertyInitializer.newProperty;
public final class PluginSettings implements SettingsHolder {
+ @Comment({
+ "Should we execute /help command when unregistered players press Shift+F?",
+ "This keeps compatibility with some menu plugins",
+ "If you are using TrMenu, don't enable this because TrMenu already implemented this."
+ })
+ public static final Property MENU_UNREGISTER_COMPATIBILITY =
+ newProperty("3rdPartyFeature.compatibility.menuPlugins", false);
@Comment({
"Do you want to enable the session feature?",
@@ -18,14 +25,14 @@ public final class PluginSettings implements SettingsHolder {
"expired, he will not need to authenticate."
})
public static final Property SESSIONS_ENABLED =
- newProperty("settings.sessions.enabled", false);
+ newProperty("settings.sessions.enabled", true);
@Comment({
"After how many minutes should a session expire?",
"A player's session ends after the timeout or if his IP has changed"
})
public static final Property SESSIONS_TIMEOUT =
- newProperty("settings.sessions.timeout", 10);
+ newProperty("settings.sessions.timeout", 43200);
@Comment({
"Message language, available languages:",
diff --git a/src/main/java/fr/xephi/authme/settings/properties/ProtectionSettings.java b/src/main/java/fr/xephi/authme/settings/properties/ProtectionSettings.java
index 2c4f3431..a5e62c02 100644
--- a/src/main/java/fr/xephi/authme/settings/properties/ProtectionSettings.java
+++ b/src/main/java/fr/xephi/authme/settings/properties/ProtectionSettings.java
@@ -18,22 +18,7 @@ public final class ProtectionSettings implements SettingsHolder {
@Comment("Apply the protection also to registered usernames")
public static final Property ENABLE_PROTECTION_REGISTERED =
- newProperty("Protection.enableProtectionRegistered", true);
-
- @Comment("Enable GeoIp database")
- public static final Property ENABLE_GEOIP =
- newProperty("Protection.geoIpDatabase.enabled", true);
-
- @Comment({"The MaxMind clientId used to download the GeoIp database,",
- "get one at https://www.maxmind.com/en/accounts/current/license-key",
- "The EssentialsX project has a very useful tutorial on how to generate",
- "the license key: https://github.com/EssentialsX/Wiki/blob/master/GeoIP.md"})
- public static final Property MAXMIND_API_CLIENT_ID =
- newProperty("Protection.geoIpDatabase.clientId", "");
-
- @Comment("The MaxMind licenseKey used to download the GeoIp database.")
- public static final Property MAXMIND_API_LICENSE_KEY =
- newProperty("Protection.geoIpDatabase.licenseKey", "");
+ newProperty("Protection.enableProtectionRegistered", false);
@Comment({
"Countries allowed to join the server and register. For country codes, see",
@@ -41,7 +26,7 @@ public final class ProtectionSettings implements SettingsHolder {
"Use \"LOCALHOST\" for local addresses.",
"PLEASE USE QUOTES!"})
public static final Property> COUNTRIES_WHITELIST =
- newListProperty("Protection.countries", "US", "GB", "LOCALHOST");
+ newListProperty("Protection.countries", "LOCALHOST");
@Comment({
"Countries not allowed to join the server and register",
@@ -73,7 +58,7 @@ public final class ProtectionSettings implements SettingsHolder {
@Comment("Kicks the player that issued a command before the defined time after the join process")
public static final Property QUICK_COMMANDS_DENIED_BEFORE_MILLISECONDS =
- newProperty("Protection.quickCommands.denyCommandsBeforeMilliseconds", 1000);
+ newProperty("Protection.quickCommands.denyCommandsBeforeMilliseconds", 3000);
private ProtectionSettings() {
}
diff --git a/src/main/java/fr/xephi/authme/settings/properties/RegistrationSettings.java b/src/main/java/fr/xephi/authme/settings/properties/RegistrationSettings.java
index daefe92c..ccf83cda 100644
--- a/src/main/java/fr/xephi/authme/settings/properties/RegistrationSettings.java
+++ b/src/main/java/fr/xephi/authme/settings/properties/RegistrationSettings.java
@@ -36,7 +36,8 @@ public final class RegistrationSettings implements SettingsHolder {
newProperty(RegistrationType.class, "settings.registration.type", RegistrationType.PASSWORD);
@Comment({
- "Second argument the /register command should take: NONE = no 2nd argument",
+ "Second argument the /register command should take: ",
+ "NONE = no 2nd argument",
"CONFIRMATION = must repeat first argument (pass or email)",
"EMAIL_OPTIONAL = for password register: 2nd argument can be empty or have email address",
"EMAIL_MANDATORY = for password register: 2nd argument MUST be an email address"
@@ -54,26 +55,9 @@ public final class RegistrationSettings implements SettingsHolder {
@Comment("Does AuthMe need to enforce a /login after a successful registration?")
public static final Property FORCE_LOGIN_AFTER_REGISTER =
newProperty("settings.registration.forceLoginAfterRegister", false);
-
- @Comment({
- "Enable to display the welcome message (welcome.txt) after a login",
- "You can use colors in this welcome.txt + some replaced strings:",
- "{PLAYER}: player name, {ONLINE}: display number of online players,",
- "{MAXPLAYERS}: display server slots, {IP}: player ip, {LOGINS}: number of players logged,",
- "{WORLD}: player current world, {SERVER}: server name",
- "{VERSION}: get current bukkit version, {COUNTRY}: player country"})
- public static final Property USE_WELCOME_MESSAGE =
- newProperty("settings.useWelcomeMessage", true);
-
- @Comment({
- "Broadcast the welcome message to the server or only to the player?",
- "set true for server or false for player"})
- public static final Property BROADCAST_WELCOME_MESSAGE =
- newProperty("settings.broadcastWelcomeMessage", false);
-
@Comment("Should we delay the join message and display it once the player has logged in?")
public static final Property DELAY_JOIN_MESSAGE =
- newProperty("settings.delayJoinMessage", false);
+ newProperty("settings.delayJoinMessage", true);
@Comment({
"The custom join message that will be sent after a successful login,",
@@ -87,15 +71,15 @@ public final class RegistrationSettings implements SettingsHolder {
@Comment("Should we remove the leave messages of unlogged users?")
public static final Property REMOVE_UNLOGGED_LEAVE_MESSAGE =
- newProperty("settings.removeUnloggedLeaveMessage", false);
+ newProperty("settings.removeUnloggedLeaveMessage", true);
@Comment("Should we remove join messages altogether?")
public static final Property REMOVE_JOIN_MESSAGE =
- newProperty("settings.removeJoinMessage", false);
+ newProperty("settings.removeJoinMessage", true);
@Comment("Should we remove leave messages altogether?")
public static final Property REMOVE_LEAVE_MESSAGE =
- newProperty("settings.removeLeaveMessage", false);
+ newProperty("settings.removeLeaveMessage", true);
@Comment("Do we need to add potion effect Blinding before login/register?")
public static final Property APPLY_BLIND_EFFECT =
diff --git a/src/main/java/fr/xephi/authme/settings/properties/RestrictionSettings.java b/src/main/java/fr/xephi/authme/settings/properties/RestrictionSettings.java
index 8794ba44..2a7472e3 100644
--- a/src/main/java/fr/xephi/authme/settings/properties/RestrictionSettings.java
+++ b/src/main/java/fr/xephi/authme/settings/properties/RestrictionSettings.java
@@ -33,7 +33,7 @@ public final class RestrictionSettings implements SettingsHolder {
"Max number of allowed registrations per IP",
"The value 0 means an unlimited number of registrations!"})
public static final Property MAX_REGISTRATION_PER_IP =
- newProperty("settings.restrictions.maxRegPerIp", 1);
+ newProperty("settings.restrictions.maxRegPerIp", 3);
@Comment("Minimum allowed username length")
public static final Property MIN_NICKNAME_LENGTH =
@@ -74,7 +74,7 @@ public final class RestrictionSettings implements SettingsHolder {
"To activate the restricted user feature you need",
"to enable this option and configure the AllowedRestrictedUser field."})
public static final Property ENABLE_RESTRICTED_USERS =
- newProperty("settings.restrictions.AllowRestrictedUser", false);
+ newProperty("settings.restrictions.AllowRestrictedUser", true);
@Comment({
"The restricted user feature will kick players listed below",
@@ -85,7 +85,12 @@ public final class RestrictionSettings implements SettingsHolder {
" - playername;127.0.0.1",
" - playername;regex:127\\.0\\.0\\..*"})
public static final Property> RESTRICTED_USERS =
- newLowercaseStringSetProperty("settings.restrictions.AllowedRestrictedUser");
+ newLowercaseStringSetProperty("settings.restrictions.AllowedRestrictedUser",
+ "server_land;127.0.0.1","server;127.0.0.1","bukkit;127.0.0.1","purpur;127.0.0.1",
+ "system;127.0.0.1","admin;127.0.0.1","md_5;127.0.0.1","administrator;127.0.0.1","notch;127.0.0.1",
+ "spigot;127.0.0.1","bukkit;127.0.0.1","bukkitcraft;127.0.0.1","paperclip;127.0.0.1","papermc;127.0.0.1",
+ "spigotmc;127.0.0.1","root;127.0.0.1","console;127.0.0.1","purpur;127.0.0.1","authme;127.0.0.1",
+ "owner;127.0.0.1");
@Comment("Ban unknown IPs trying to log in with a restricted username?")
public static final Property BAN_UNKNOWN_IP =
@@ -97,7 +102,7 @@ public final class RestrictionSettings implements SettingsHolder {
@Comment("Should players be kicked on wrong password?")
public static final Property KICK_ON_WRONG_PASSWORD =
- newProperty("settings.restrictions.kickOnWrongPassword", true);
+ newProperty("settings.restrictions.kickOnWrongPassword", false);
@Comment({
"Should not logged in players be teleported to the spawn?",
@@ -114,22 +119,23 @@ public final class RestrictionSettings implements SettingsHolder {
"After how many seconds should players who fail to login or register",
"be kicked? Set to 0 to disable."})
public static final Property TIMEOUT =
- newProperty("settings.restrictions.timeout", 30);
+ newProperty("settings.restrictions.timeout", 120);
@Comment("Regex pattern of allowed characters in the player name.")
public static final Property ALLOWED_NICKNAME_CHARACTERS =
newProperty("settings.restrictions.allowedNicknameCharacters", "[a-zA-Z0-9_]*");
+
@Comment({
"How far can unregistered players walk?",
"Set to 0 for unlimited radius"
})
public static final Property ALLOWED_MOVEMENT_RADIUS =
- newProperty("settings.restrictions.allowedMovementRadius", 100);
+ newProperty("settings.restrictions.allowedMovementRadius", 0);
@Comment("Should we protect the player inventory before logging in? Requires ProtocolLib.")
public static final Property PROTECT_INVENTORY_BEFORE_LOGIN =
- newProperty("settings.restrictions.ProtectInventoryBeforeLogIn", true);
+ newProperty("settings.restrictions.ProtectInventoryBeforeLogIn", false);
@Comment("Should we deny the tabcomplete feature before logging in? Requires ProtocolLib.")
public static final Property DENY_TABCOMPLETE_BEFORE_LOGIN =
@@ -139,7 +145,7 @@ public final class RestrictionSettings implements SettingsHolder {
"Should we display all other accounts from a player when he joins?",
"permission: /authme.admin.accounts"})
public static final Property DISPLAY_OTHER_ACCOUNTS =
- newProperty("settings.restrictions.displayOtherAccounts", true);
+ newProperty("settings.restrictions.displayOtherAccounts", false);
@Comment("Spawn priority; values: authme, essentials, cmi, multiverse, default")
public static final Property SPAWN_PRIORITY =
@@ -147,11 +153,11 @@ public final class RestrictionSettings implements SettingsHolder {
@Comment("Maximum Login authorized by IP")
public static final Property MAX_LOGIN_PER_IP =
- newProperty("settings.restrictions.maxLoginPerIp", 0);
+ newProperty("settings.restrictions.maxLoginPerIp", 3);
@Comment("Maximum Join authorized by IP")
public static final Property MAX_JOIN_PER_IP =
- newProperty("settings.restrictions.maxJoinPerIp", 0);
+ newProperty("settings.restrictions.maxJoinPerIp", 3);
@Comment("AuthMe will NEVER teleport players if set to true!")
public static final Property NO_TELEPORT =
@@ -165,6 +171,11 @@ public final class RestrictionSettings implements SettingsHolder {
public static final Property ALLOWED_PASSWORD_REGEX =
newProperty("settings.restrictions.allowedPasswordCharacters", "[!-~]*");
+ @Comment("Regex syntax for allowed chars in email.")
+ public static final Property ALLOWED_EMAIL_REGEX =
+ newProperty("settings.restrictions.allowedEmailCharacters", "^[A-Za-z0-9_]{4,15}@(qq|outlook|163|gmail|icloud)\\.com$");
+
+
@Comment("Force survival gamemode when player joins?")
public static final Property FORCE_SURVIVAL_MODE =
newProperty("settings.GameMode.ForceSurvivalMode", false);
@@ -181,6 +192,7 @@ public final class RestrictionSettings implements SettingsHolder {
public static final Property> UNRESTRICTED_NAMES =
newLowercaseStringSetProperty("settings.unrestrictions.UnrestrictedName");
+
@Comment({
"Below you can list all inventories names that AuthMe will ignore",
"for registration or login. Configure it at your own risk!!",
@@ -193,7 +205,9 @@ public final class RestrictionSettings implements SettingsHolder {
public static final Property> UNRESTRICTED_INVENTORIES =
newLowercaseStringSetProperty("settings.unrestrictions.UnrestrictedInventories");
+
private RestrictionSettings() {
+
}
}
diff --git a/src/main/java/fr/xephi/authme/settings/properties/SecuritySettings.java b/src/main/java/fr/xephi/authme/settings/properties/SecuritySettings.java
index 0cffd280..be65f20b 100644
--- a/src/main/java/fr/xephi/authme/settings/properties/SecuritySettings.java
+++ b/src/main/java/fr/xephi/authme/settings/properties/SecuritySettings.java
@@ -6,8 +6,10 @@ import ch.jalu.configme.properties.Property;
import fr.xephi.authme.security.HashAlgorithm;
import fr.xephi.authme.settings.EnumSetProperty;
+import java.util.List;
import java.util.Set;
+import static ch.jalu.configme.properties.PropertyInitializer.newListProperty;
import static ch.jalu.configme.properties.PropertyInitializer.newLowercaseStringSetProperty;
import static ch.jalu.configme.properties.PropertyInitializer.newProperty;
@@ -17,27 +19,98 @@ public final class SecuritySettings implements SettingsHolder {
"Take care with this, if you set this to false,",
"AuthMe will automatically disable and the server won't be protected!"})
public static final Property STOP_SERVER_ON_PROBLEM =
- newProperty("Security.SQLProblem.stopServer", true);
+ newProperty("Security.SQLProblem.stopServer", false);
+
+ @Comment({"Should send GUI captcha by country code whitelist?",
+ "If the country of the player is in this list, the captcha won't be sent."})
+ public static final Property> GUI_CAPTCHA_COUNTRY_WHITELIST =
+ newListProperty("3rdPartyFeature.features.captcha.whiteList");
+
+ @Comment({"Should we let Bedrock players login automatically?",
+ "(Requires hookFloodgate to be true & floodgate loaded)"})
+ public static final Property FORCE_LOGIN_BEDROCK =
+ newProperty("3rdPartyFeature.features.bedrockAutoLogin", false);
+
+ @Comment("Enable the new feature to prevent ghost players?")
+ public static final Property ANTI_GHOST_PLAYERS =
+ newProperty("3rdPartyFeature.fixes.antiGhostPlayer", false);
+
+ @Comment({"(MC1.13- only)",
+ "Should we fix the shulker crash bug with advanced method?"})
+ public static final Property ADVANCED_SHULKER_FIX =
+ newProperty("3rdPartyFeature.fixes.advancedShulkerFix", false);
+
+ @Comment({"Choose the best teleport method by server brand?",
+ "(Enable this if you are using Paper)"})
+ public static final Property SMART_ASYNC_TELEPORT =
+ newProperty("3rdPartyFeature.optimizes.smartAsyncTeleport", false);
+
+ @Comment("Send a GUI captcha to unregistered players?(Requires ProtocolLib)")
+ public static final Property GUI_CAPTCHA =
+ newProperty("3rdPartyFeature.features.captcha.guiCaptcha", false);
+
+ @Comment({"Should we kick the players when they don't finish the GUI captcha in seconds?",
+ "(less than or equals 0 is disabled)"})
+ public static final Property GUI_CAPTCHA_TIMEOUT =
+ newProperty("3rdPartyFeature.features.captcha.timeOut", 0);
+
+ @Comment({"Should we ignore floodgate players when sending GUI captcha?",
+ "(Requires floodgate and hookFloodgate: true)"})
+ public static final Property GUI_CAPTCHA_BE_COMPATIBILITY =
+ newProperty("3rdPartyFeature.features.captcha.ignoreBedrock", false);
+
+ @Comment("Should we delete player data and stats when they didn't finish the captcha?")
+ public static final Property DELETE_UNVERIFIED_PLAYER_DATA =
+ newProperty("3rdPartyFeature.features.captcha.purgePlayerData", false);
+
+ @Comment("Which world's player data should be deleted?(Enter the world *FOLDER* name where your players first logged in)")
+ public static final Property DELETE_PLAYER_DATA_WORLD =
+ newProperty("3rdPartyFeature.features.captcha.purgeWorldFolderName", "world");
+
+ @Comment("Should we fix the location when players logged in the portal?")
+ public static final Property LOGIN_LOC_FIX_SUB_PORTAL =
+ newProperty("3rdPartyFeature.fixes.loginLocationFix.fixPortalStuck", false);
+
+ @Comment("Should we fix the location when players logged underground?")
+ public static final Property LOGIN_LOC_FIX_SUB_UNDERGROUND =
+ newProperty("3rdPartyFeature.fixes.loginLocationFix.fixGroundStuck", false);
@Comment("Copy AuthMe log output in a separate file as well?")
public static final Property USE_LOGGING =
newProperty("Security.console.logConsole", true);
+ @Comment({"Query haveibeenpwned.com with a hashed version of the password.",
+ "This is used to check whether it is safe."})
+ public static final Property HAVE_I_BEEN_PWNED_CHECK =
+ newProperty("Security.account.haveIBeenPwned.check", false);
+
+ @Comment({"If the password is used more than this number of times, it is considered unsafe."})
+ public static final Property HAVE_I_BEEN_PWNED_LIMIT =
+ newProperty("Security.account.haveIBeenPwned.limit", 0);
+
@Comment("Enable captcha when a player uses wrong password too many times")
public static final Property ENABLE_LOGIN_FAILURE_CAPTCHA =
newProperty("Security.captcha.useCaptcha", false);
+ @Comment("Check for updates on enabled from GitHub?")
+ public static final Property CHECK_FOR_UPDATES =
+ newProperty("Plugin.updates.checkForUpdates", true);
+
+ @Comment("Should we show the AuthMe banner on startup?")
+ public static final Property SHOW_STARTUP_BANNER =
+ newProperty("Plugin.banners.showBanners", true);
+
@Comment("Max allowed tries before a captcha is required")
public static final Property MAX_LOGIN_TRIES_BEFORE_CAPTCHA =
- newProperty("Security.captcha.maxLoginTry", 5);
+ newProperty("Security.captcha.maxLoginTry", 8);
@Comment("Captcha length")
public static final Property CAPTCHA_LENGTH =
- newProperty("Security.captcha.captchaLength", 5);
+ newProperty("Security.captcha.captchaLength", 6);
@Comment("Minutes after which login attempts count is reset for a player")
public static final Property CAPTCHA_COUNT_MINUTES_BEFORE_RESET =
- newProperty("Security.captcha.captchaCountReset", 60);
+ newProperty("Security.captcha.captchaCountReset", 120);
@Comment("Require captcha before a player may register?")
public static final Property ENABLE_CAPTCHA_FOR_REGISTRATION =
@@ -45,11 +118,11 @@ public final class SecuritySettings implements SettingsHolder {
@Comment("Minimum length of password")
public static final Property MIN_PASSWORD_LENGTH =
- newProperty("settings.security.minPasswordLength", 5);
+ newProperty("settings.security.minPasswordLength", 8);
@Comment("Maximum length of password")
public static final Property MAX_PASSWORD_LENGTH =
- newProperty("settings.security.passwordMaxLength", 30);
+ newProperty("settings.security.passwordMaxLength", 26);
@Comment({
"Possible values: SHA256, BCRYPT, BCRYPT2Y, PBKDF2, SALTEDSHA512,",
@@ -87,7 +160,7 @@ public final class SecuritySettings implements SettingsHolder {
"- 'help'"})
public static final Property> UNSAFE_PASSWORDS =
newLowercaseStringSetProperty("settings.security.unsafePasswords",
- "123456", "password", "qwerty", "12345", "54321", "123456789", "help");
+ "12345678", "password", "qwertyui", "123456789", "87654321", "1234567890", "asdfghjkl","zxcvbnm,","asdfghjk","12312312","123123123","32132132","321321321");
@Comment("Tempban a user's IP address if they enter the wrong password too many times")
public static final Property TEMPBAN_ON_MAX_LOGINS =
@@ -95,7 +168,7 @@ public final class SecuritySettings implements SettingsHolder {
@Comment("How many times a user can attempt to login before their IP being tempbanned")
public static final Property MAX_LOGIN_TEMPBAN =
- newProperty("Security.tempban.maxLoginTries", 10);
+ newProperty("Security.tempban.maxLoginTries", 8);
@Comment({"The length of time a IP address will be tempbanned in minutes",
"Default: 480 minutes, or 8 hours"})
@@ -118,17 +191,17 @@ public final class SecuritySettings implements SettingsHolder {
@Comment("How many hours is a recovery code valid for?")
public static final Property RECOVERY_CODE_HOURS_VALID =
- newProperty("Security.recoveryCode.validForHours", 4);
+ newProperty("Security.recoveryCode.validForHours", 6);
@Comment("Max number of tries to enter recovery code")
public static final Property RECOVERY_CODE_MAX_TRIES =
- newProperty("Security.recoveryCode.maxTries", 3);
+ newProperty("Security.recoveryCode.maxTries", 4);
@Comment({"How long a player has after password recovery to change their password",
"without logging in. This is in minutes.",
"Default: 2 minutes"})
public static final Property PASSWORD_CHANGE_TIMEOUT =
- newProperty("Security.recoveryCode.passwordChangeTimeout", 2);
+ newProperty("Security.recoveryCode.passwordChangeTimeout", 5);
@Comment({
"Seconds a user has to wait for before a password recovery mail may be sent again",
diff --git a/src/main/java/fr/xephi/authme/util/PlayerUtils.java b/src/main/java/fr/xephi/authme/util/PlayerUtils.java
index 04216933..800993e8 100644
--- a/src/main/java/fr/xephi/authme/util/PlayerUtils.java
+++ b/src/main/java/fr/xephi/authme/util/PlayerUtils.java
@@ -28,7 +28,7 @@ public final class PlayerUtils {
* @return True if the player is an NPC, false otherwise
*/
public static boolean isNpc(Player player) {
- return player.hasMetadata("NPC");
+ return player.hasMetadata("NPC") || player.getAddress() == null;
}
}
diff --git a/src/main/java/fr/xephi/authme/util/TeleportUtils.java b/src/main/java/fr/xephi/authme/util/TeleportUtils.java
new file mode 100644
index 00000000..a6594447
--- /dev/null
+++ b/src/main/java/fr/xephi/authme/util/TeleportUtils.java
@@ -0,0 +1,44 @@
+package fr.xephi.authme.util;
+
+import org.bukkit.Location;
+import org.bukkit.entity.Player;
+
+import java.lang.reflect.InvocationTargetException;
+import java.lang.reflect.Method;
+
+/**
+ * This class is a utility class for handling async teleportation of players in game.
+ */
+public class TeleportUtils {
+ private static Method teleportAsyncMethod;
+
+ static {
+ try {//Detect Paper class
+ Class> paperClass = Class.forName("com.destroystokyo.paper.PaperConfig");
+ teleportAsyncMethod = Player.class.getMethod("teleportAsync", Location.class);
+ teleportAsyncMethod.setAccessible(true);
+ // if detected,use teleportAsync()
+ } catch (ClassNotFoundException | NoSuchMethodException e) {
+ teleportAsyncMethod = null;
+ //if not, set method to null
+ }
+ }
+
+ /**
+ * Teleport a player to a specified location.
+ *
+ * @param player The player to be teleported
+ * @param location Where should the player be teleported
+ */
+ public static void teleport(Player player, Location location) {
+ if (teleportAsyncMethod != null) {
+ try {
+ teleportAsyncMethod.invoke(player, location);
+ } catch (IllegalAccessException | InvocationTargetException e) {
+ player.teleport(location);
+ }
+ } else {
+ player.teleport(location);
+ }
+ }
+}
diff --git a/src/main/resources/GeoLite2-Country.mmdb b/src/main/resources/GeoLite2-Country.mmdb
new file mode 100644
index 00000000..7e1f157d
Binary files /dev/null and b/src/main/resources/GeoLite2-Country.mmdb differ
diff --git a/src/main/resources/commands.yml b/src/main/resources/commands.yml
index 6afd5a60..0ba270d6 100644
--- a/src/main/resources/commands.yml
+++ b/src/main/resources/commands.yml
@@ -52,4 +52,4 @@ onLogout: {}
onRegister: {}
onSessionLogin: {}
# Commands to run whenever a player is unregistered (by himself, or by an admin)
-onUnregister: {}
\ No newline at end of file
+onUnregister: {}
diff --git a/src/main/resources/email.html b/src/main/resources/email.html
index a2a7ed06..48213334 100644
--- a/src/main/resources/email.html
+++ b/src/main/resources/email.html
@@ -1,18 +1,121 @@
-
-Dear ,
-
-
-
-This is your new AuthMe password for the server :
-
-
-
-
-
-
-Do not forget to change password after login!
-/changepassword newPassword'
-
diff --git a/src/main/resources/welcome.txt b/src/main/resources/welcome.txt
deleted file mode 100644
index 1c49f042..00000000
--- a/src/main/resources/welcome.txt
+++ /dev/null
@@ -1,3 +0,0 @@
-Welcome {PLAYER} on {SERVER} server
-
-This server uses AuthMeReloaded protection!
diff --git a/src/test/java/fr/xephi/authme/AuthMeInitializationTest.java b/src/test/java/fr/xephi/authme/AuthMeInitializationTest.java
deleted file mode 100644
index 290312bb..00000000
--- a/src/test/java/fr/xephi/authme/AuthMeInitializationTest.java
+++ /dev/null
@@ -1,145 +0,0 @@
-package fr.xephi.authme;
-
-import ch.jalu.configme.resource.PropertyReader;
-import ch.jalu.configme.resource.PropertyResource;
-import ch.jalu.injector.Injector;
-import ch.jalu.injector.InjectorBuilder;
-import com.google.common.io.Files;
-import fr.xephi.authme.api.v3.AuthMeApi;
-import fr.xephi.authme.command.CommandHandler;
-import fr.xephi.authme.datasource.DataSource;
-import fr.xephi.authme.initialization.DataFolder;
-import fr.xephi.authme.listener.BlockListener;
-import fr.xephi.authme.permission.PermissionsManager;
-import fr.xephi.authme.process.Management;
-import fr.xephi.authme.process.login.ProcessSyncPlayerLogin;
-import fr.xephi.authme.security.PasswordSecurity;
-import fr.xephi.authme.service.BukkitService;
-import fr.xephi.authme.service.bungeecord.BungeeReceiver;
-import fr.xephi.authme.service.bungeecord.BungeeSender;
-import fr.xephi.authme.settings.Settings;
-import fr.xephi.authme.task.purge.PurgeService;
-import org.bukkit.Bukkit;
-import org.bukkit.Server;
-import org.bukkit.plugin.PluginDescriptionFile;
-import org.bukkit.plugin.PluginManager;
-import org.bukkit.plugin.java.JavaPluginLoader;
-import org.bukkit.scheduler.BukkitScheduler;
-import org.junit.Before;
-import org.junit.Rule;
-import org.junit.Test;
-import org.junit.rules.TemporaryFolder;
-import org.junit.runner.RunWith;
-import org.mockito.Mock;
-import org.mockito.junit.MockitoJUnitRunner;
-
-import java.io.File;
-import java.io.IOException;
-import java.util.Collections;
-import java.util.logging.Logger;
-
-import static fr.xephi.authme.settings.properties.AuthMeSettingsRetriever.buildConfigurationData;
-import static org.hamcrest.Matchers.not;
-import static org.hamcrest.Matchers.nullValue;
-import static org.junit.Assert.assertThat;
-import static org.mockito.ArgumentMatchers.anyString;
-import static org.mockito.BDDMockito.given;
-import static org.mockito.Mockito.RETURNS_DEEP_STUBS;
-import static org.mockito.Mockito.mock;
-import static org.mockito.Mockito.verify;
-
-/**
- * Integration test verifying that all services can be initialized in {@link AuthMe}
- * with the {@link Injector}.
- */
-@RunWith(MockitoJUnitRunner.class)
-public class AuthMeInitializationTest {
-
- @Mock
- private Server server;
-
- @Mock
- private PluginManager pluginManager;
-
- private AuthMe authMe;
- private File dataFolder;
-
- @Rule
- public TemporaryFolder temporaryFolder = new TemporaryFolder();
-
- @Before
- public void initAuthMe() throws IOException {
- dataFolder = temporaryFolder.newFolder();
- File settingsFile = new File(dataFolder, "config.yml");
- given(server.getLogger()).willReturn(Logger.getAnonymousLogger());
- JavaPluginLoader pluginLoader = new JavaPluginLoader(server);
- Files.copy(TestHelper.getJarFile(TestHelper.PROJECT_ROOT + "config.test.yml"), settingsFile);
-
- // Mock / wire various Bukkit components
- ReflectionTestUtils.setField(Bukkit.class, null, "server", server);
- given(server.getPluginManager()).willReturn(pluginManager);
-
- // PluginDescriptionFile is final: need to create a sample one
- PluginDescriptionFile descriptionFile = new PluginDescriptionFile(
- "AuthMe", "N/A", AuthMe.class.getCanonicalName());
-
- // Initialize AuthMe
- authMe = new AuthMe(pluginLoader, descriptionFile, dataFolder, null);
- }
-
- @Test
- public void shouldInitializeAllServices() {
- // given
- PropertyReader reader = mock(PropertyReader.class);
- PropertyResource resource = mock(PropertyResource.class);
- given(resource.createReader()).willReturn(reader);
- Settings settings = new Settings(dataFolder, resource, null, buildConfigurationData());
-
- TestHelper.setupLogger();
-
- Injector injector = new InjectorBuilder()
- .addDefaultHandlers("fr.xephi.authme")
- .create();
- injector.provide(DataFolder.class, dataFolder);
- injector.register(Server.class, server);
- injector.register(PluginManager.class, pluginManager);
-
- injector.register(AuthMe.class, authMe);
- injector.register(Settings.class, settings);
- injector.register(DataSource.class, mock(DataSource.class));
- injector.register(BukkitService.class, mock(BukkitService.class));
-
- // when
- authMe.instantiateServices(injector);
- authMe.registerEventListeners(injector);
-
- // then
- // Take a few samples and ensure that they are not null
- assertThat(injector.getIfAvailable(AuthMeApi.class), not(nullValue()));
- assertThat(injector.getIfAvailable(BlockListener.class), not(nullValue()));
- assertThat(injector.getIfAvailable(BungeeReceiver.class), not(nullValue()));
- assertThat(injector.getIfAvailable(BungeeSender.class), not(nullValue()));
- assertThat(injector.getIfAvailable(CommandHandler.class), not(nullValue()));
- assertThat(injector.getIfAvailable(Management.class), not(nullValue()));
- assertThat(injector.getIfAvailable(PasswordSecurity.class), not(nullValue()));
- assertThat(injector.getIfAvailable(PermissionsManager.class), not(nullValue()));
- assertThat(injector.getIfAvailable(ProcessSyncPlayerLogin.class), not(nullValue()));
- assertThat(injector.getIfAvailable(PurgeService.class), not(nullValue()));
- }
-
- @Test
- public void shouldHandlePrematureShutdownGracefully() {
- // given
- BukkitScheduler scheduler = mock(BukkitScheduler.class);
- given(server.getScheduler()).willReturn(scheduler);
-
- // Make sure ConsoleLogger has no logger reference since that may happen on unexpected stops
- ReflectionTestUtils.setField(ConsoleLogger.class, null, "logger", null);
-
- // when
- authMe.onDisable();
-
- // then - no exceptions
- verify(scheduler).getActiveWorkers(); // via TaskCloser
- }
-}
diff --git a/src/test/java/fr/xephi/authme/AuthMeMatchers.java b/src/test/java/fr/xephi/authme/AuthMeMatchers.java
deleted file mode 100644
index 86fe4cb9..00000000
--- a/src/test/java/fr/xephi/authme/AuthMeMatchers.java
+++ /dev/null
@@ -1,136 +0,0 @@
-package fr.xephi.authme;
-
-import fr.xephi.authme.data.auth.PlayerAuth;
-import fr.xephi.authme.security.crypts.HashedPassword;
-import org.hamcrest.Description;
-import org.hamcrest.Matcher;
-import org.hamcrest.TypeSafeMatcher;
-
-import java.util.Objects;
-
-/**
- * Custom matchers for AuthMe entities.
- */
-// Justification: Javadoc would be huge because of the many parameters
-@SuppressWarnings("checkstyle:MissingJavadocMethod")
-public final class AuthMeMatchers {
-
- private AuthMeMatchers() {
- }
-
- public static Matcher super HashedPassword> equalToHash(String hash) {
- return equalToHash(new HashedPassword(hash));
- }
-
- public static Matcher super HashedPassword> equalToHash(String hash, String salt) {
- return equalToHash(new HashedPassword(hash, salt));
- }
-
- public static Matcher super HashedPassword> equalToHash(HashedPassword hash) {
- return new TypeSafeMatcher() {
- @Override
- public boolean matchesSafely(HashedPassword item) {
- return Objects.equals(hash.getHash(), item.getHash())
- && Objects.equals(hash.getSalt(), item.getSalt());
- }
-
- @Override
- public void describeTo(Description description) {
- String representation = "'" + hash.getHash() + "'";
- if (hash.getSalt() != null) {
- representation += ", '" + hash.getSalt() + "'";
- }
- description.appendValue("HashedPassword(" + representation + ")");
- }
- };
- }
-
- public static Matcher hasAuthBasicData(String name, String realName,
- String email, String lastIp) {
- return new TypeSafeMatcher() {
- @Override
- public boolean matchesSafely(PlayerAuth item) {
- return Objects.equals(name, item.getNickname())
- && Objects.equals(realName, item.getRealName())
- && Objects.equals(email, item.getEmail())
- && Objects.equals(lastIp, item.getLastIp());
- }
-
- @Override
- public void describeTo(Description description) {
- description.appendValue(String.format("PlayerAuth with name %s, realname %s, email %s, lastIp %s",
- name, realName, email, lastIp));
- }
-
- @Override
- public void describeMismatchSafely(PlayerAuth item, Description description) {
- description.appendValue(String.format("PlayerAuth with name %s, realname %s, email %s, lastIp %s",
- item.getNickname(), item.getRealName(), item.getEmail(), item.getLastIp()));
- }
- };
- }
-
- public static Matcher super PlayerAuth> hasRegistrationInfo(String registrationIp, long registrationDate) {
- return new TypeSafeMatcher() {
- @Override
- public boolean matchesSafely(PlayerAuth item) {
- return Objects.equals(registrationIp, item.getRegistrationIp())
- && Objects.equals(registrationDate, item.getRegistrationDate());
- }
-
- @Override
- public void describeTo(Description description) {
- description.appendValue(String.format("PlayerAuth with reg. IP %s and reg date %d",
- registrationIp, registrationDate));
- }
-
- @Override
- public void describeMismatchSafely(PlayerAuth item, Description description) {
- description.appendValue(String.format("PlayerAuth with reg. IP %s and reg date %d",
- item.getRegistrationIp(), item.getRegistrationDate()));
- }
- };
- }
-
- public static Matcher super PlayerAuth> hasAuthLocation(PlayerAuth auth) {
- return hasAuthLocation(auth.getQuitLocX(), auth.getQuitLocY(), auth.getQuitLocZ(), auth.getWorld(),
- auth.getYaw(), auth.getPitch());
- }
-
- public static Matcher super PlayerAuth> hasAuthLocation(double x, double y, double z,
- String world, float yaw, float pitch) {
- return new TypeSafeMatcher() {
- @Override
- public boolean matchesSafely(PlayerAuth item) {
- return Objects.equals(x, item.getQuitLocX())
- && Objects.equals(y, item.getQuitLocY())
- && Objects.equals(z, item.getQuitLocZ())
- && Objects.equals(world, item.getWorld())
- && Objects.equals(yaw, item.getYaw())
- && Objects.equals(pitch, item.getPitch());
- }
-
- @Override
- public void describeTo(Description description) {
- description.appendValue(
- String.format("PlayerAuth with quit location (x: %f, y: %f, z: %f, world: %s, yaw: %f, pitch: %f)",
- x, y, z, world, yaw, pitch));
- }
- };
- }
-
- public static Matcher stringWithLength(int length) {
- return new TypeSafeMatcher() {
- @Override
- protected boolean matchesSafely(String item) {
- return item != null && item.length() == length;
- }
-
- @Override
- public void describeTo(Description description) {
- description.appendText("String with length " + length);
- }
- };
- }
-
-}
diff --git a/src/test/java/fr/xephi/authme/ClassCollector.java b/src/test/java/fr/xephi/authme/ClassCollector.java
deleted file mode 100644
index 23c065e8..00000000
--- a/src/test/java/fr/xephi/authme/ClassCollector.java
+++ /dev/null
@@ -1,165 +0,0 @@
-package fr.xephi.authme;
-
-import java.io.File;
-import java.lang.reflect.Modifier;
-import java.util.ArrayList;
-import java.util.List;
-import java.util.function.Function;
-import java.util.function.Predicate;
-import java.util.stream.Collectors;
-
-/**
- * Collects available classes by walking through a source directory.
- *
- * This is a naive, zero dependency collector that walks through a file directory
- * and loads classes from the class loader based on the .java files it encounters.
- * This is a very slow approach and should be avoided for production code.
- *
- * For more performant approaches, see e.g. org.reflections.
- */
-public class ClassCollector {
-
- private final String root;
- private final String nonCodePath;
-
- /**
- * Constructor. The arguments make up the path from which the collector will start scanning.
- *
- * @param nonCodePath beginning of the starting path that are not Java packages, e.g. {@code src/main/java/}
- * @param packagePath folders following {@code nonCodePath} that are packages, e.g. {@code com/project/app}
- */
- public ClassCollector(String nonCodePath, String packagePath) {
- if (!nonCodePath.endsWith("/") && !nonCodePath.endsWith("\\")) {
- nonCodePath = nonCodePath.concat(File.separator);
- }
- this.root = nonCodePath + packagePath;
- this.nonCodePath = nonCodePath;
- }
-
- /**
- * Collects all classes from the parent folder and below.
- *
- * @return all classes
- */
- public List> collectClasses() {
- return collectClasses(x -> true);
- }
-
- /**
- * Collects all classes from the parent folder and below which are of type {@link T}.
- *
- * @param parent the parent which classes need to extend (or be equal to) in order to be collected
- * @param the parent type
- * @return list of matching classes
- */
- @SuppressWarnings({ "unchecked", "rawtypes" })
- public List> collectClasses(Class parent) {
- List> classes = collectClasses(parent::isAssignableFrom);
- return new ArrayList<>((List) classes);
- }
-
- /**
- * Collects all classes from the parent folder and below which match the given predicate.
- *
- * @param filter the predicate classes need to satisfy in order to be collected
- * @return list of matching classes
- */
- public List> collectClasses(Predicate> filter) {
- File rootFolder = new File(root);
- List> collection = new ArrayList<>();
- gatherClassesFromFile(rootFolder, filter, collection);
- return collection;
- }
-
- /**
- * Constructs an instance of all classes which are of the provided type {@code clazz}.
- * This method assumes that every class has an accessible no-args constructor for creation.
- *
- * @param parent the parent which classes need to extend (or be equal to) in order to be instantiated
- * @param the parent type
- * @return collection of created objects
- */
- public List getInstancesOfType(Class parent) {
- return getInstancesOfType(parent, (clz) -> {
- try {
- return canInstantiate(clz) ? clz.newInstance() : null;
- } catch (InstantiationException | IllegalAccessException e) {
- throw new IllegalStateException(e);
- }
- });
- }
-
- /**
- * Constructs an instance of all classes which are of the provided type {@code clazz}
- * with the provided {@code instantiator}.
- *
- * @param parent the parent which classes need to extend (or be equal to) in order to be instantiated
- * @param instantiator function which returns an object of the given class, or null to skip the class
- * @param the parent type
- * @return collection of created objects
- */
- public List getInstancesOfType(Class parent, Function, T> instantiator) {
- return collectClasses(parent)
- .stream()
- .map(instantiator)
- .filter(o -> o != null)
- .collect(Collectors.toList());
- }
-
- /**
- * Returns whether the given class can be instantiated, i.e. if it is not abstract, an interface, etc.
- *
- * @param clazz the class to process
- * @return true if the class can be instantiated, false otherwise
- */
- public static boolean canInstantiate(Class> clazz) {
- return clazz != null && !clazz.isEnum() && !clazz.isInterface()
- && !clazz.isArray() && !Modifier.isAbstract(clazz.getModifiers());
- }
-
- /**
- * Recursively collects the classes based on the files in the directory and in its child directories.
- *
- * @param folder the folder to scan
- * @param filter the class predicate
- * @param collection collection to add classes to
- */
- private void gatherClassesFromFile(File folder, Predicate> filter, List> collection) {
- File[] files = folder.listFiles();
- if (files == null) {
- throw new IllegalStateException("Could not read files from '" + folder + "'");
- }
- for (File file : files) {
- if (file.isDirectory()) {
- gatherClassesFromFile(file, filter, collection);
- } else if (file.isFile()) {
- Class> clazz = loadTaskClassFromFile(file);
- if (clazz != null && filter.test(clazz)) {
- collection.add(clazz);
- }
- }
- }
- }
-
- /**
- * Loads a class from the class loader based on the given file.
- *
- * @param file the file whose corresponding Java class should be retrieved
- * @return the corresponding class, or null if not applicable
- */
- private Class> loadTaskClassFromFile(File file) {
- if (!file.getName().endsWith(".java")) {
- return null;
- }
-
- String filePath = file.getPath();
- String className = filePath
- .substring(nonCodePath.length(), filePath.length() - 5)
- .replace(File.separator, ".");
- try {
- return Class.forName(className);
- } catch (ClassNotFoundException e) {
- throw new IllegalStateException(e);
- }
- }
-}
diff --git a/src/test/java/fr/xephi/authme/ClassesConsistencyTest.java b/src/test/java/fr/xephi/authme/ClassesConsistencyTest.java
deleted file mode 100644
index f02b5dc9..00000000
--- a/src/test/java/fr/xephi/authme/ClassesConsistencyTest.java
+++ /dev/null
@@ -1,173 +0,0 @@
-package fr.xephi.authme;
-
-import ch.jalu.configme.properties.Property;
-import com.google.common.collect.ImmutableList;
-import com.google.common.collect.ImmutableMap;
-import com.google.common.collect.ImmutableSet;
-import fr.xephi.authme.data.captcha.CaptchaCodeStorage;
-import fr.xephi.authme.datasource.AbstractSqlDataSource;
-import fr.xephi.authme.datasource.Columns;
-import fr.xephi.authme.datasource.columnshandler.DataSourceColumn;
-import fr.xephi.authme.datasource.columnshandler.PlayerAuthColumn;
-import fr.xephi.authme.datasource.mysqlextensions.MySqlExtension;
-import fr.xephi.authme.initialization.HasCleanup;
-import fr.xephi.authme.process.register.executors.RegistrationMethod;
-import fr.xephi.authme.security.crypts.Whirlpool;
-import fr.xephi.authme.util.expiring.ExpiringMap;
-import fr.xephi.authme.util.expiring.ExpiringSet;
-import fr.xephi.authme.util.expiring.TimedCounter;
-import org.junit.Test;
-
-import java.io.File;
-import java.lang.reflect.Field;
-import java.lang.reflect.Modifier;
-import java.nio.charset.Charset;
-import java.util.ArrayList;
-import java.util.Arrays;
-import java.util.Collection;
-import java.util.Collections;
-import java.util.HashSet;
-import java.util.List;
-import java.util.Map;
-import java.util.Set;
-import java.util.stream.Collectors;
-
-import static org.hamcrest.Matchers.equalTo;
-import static org.junit.Assert.assertThat;
-import static org.junit.Assert.fail;
-
-/**
- * Contains consistency tests across all AuthMe classes.
- */
-public class ClassesConsistencyTest {
-
- /** Contains all production classes. */
- private static final List> ALL_CLASSES =
- new ClassCollector(TestHelper.SOURCES_FOLDER, TestHelper.PROJECT_ROOT).collectClasses();
-
- /** Expiring structure types. */
- private static final Set> EXPIRING_STRUCTURES = ImmutableSet.of(
- ExpiringSet.class, ExpiringMap.class, TimedCounter.class, CaptchaCodeStorage.class);
-
- /** Immutable types, which are allowed to be used in non-private constants. */
- private static final Set> IMMUTABLE_TYPES = ImmutableSet.of(
- /* JDK */
- int.class, long.class, float.class, String.class, File.class, Enum.class, collectionsUnmodifiableList(),
- Charset.class,
- /* AuthMe */
- Property.class, RegistrationMethod.class, DataSourceColumn.class, PlayerAuthColumn.class,
- /* Guava */
- ImmutableMap.class, ImmutableList.class);
-
- /** Classes excluded from the field visibility test. */
- private static final Set> CLASSES_EXCLUDED_FROM_VISIBILITY_TEST = ImmutableSet.of(
- Whirlpool.class, // not our implementation, so we don't touch it
- MySqlExtension.class, // has immutable protected fields used by all children
- AbstractSqlDataSource.class, // protected members for inheritance
- Columns.class // uses non-static String constants, which is safe
- );
-
- /**
- * Checks that there aren't two classes with the same name; this is confusing and should be avoided.
- */
- @Test
- public void shouldNotHaveSameName() {
- // given
- Set names = new HashSet<>();
-
- // when / then
- for (Class> clazz : ALL_CLASSES) {
- if (!names.add(clazz.getSimpleName())) {
- fail("Class with name '" + clazz.getSimpleName() + "' already encountered!");
- }
- }
- }
-
- /**
- * Checks that fields of classes are either private or static final fields of an immutable type.
- */
- @Test
- public void shouldHaveNonPrivateConstantsOnly() {
- // given / when
- Set invalidFields = ALL_CLASSES.stream()
- .filter(clz -> !CLASSES_EXCLUDED_FROM_VISIBILITY_TEST.contains(clz))
- .map(Class::getDeclaredFields)
- .flatMap(Arrays::stream)
- .filter(f -> !f.getName().contains("$"))
- .filter(f -> hasIllegalFieldVisibility(f))
- .map(f -> formatField(f))
- .collect(Collectors.toSet());
-
- // then
- if (!invalidFields.isEmpty()) {
- fail("Found " + invalidFields.size() + " fields with non-private, mutable fields:\n- "
- + String.join("\n- ", invalidFields));
- }
- }
-
- private static boolean hasIllegalFieldVisibility(Field field) {
- final int modifiers = field.getModifiers();
- if (Modifier.isPrivate(modifiers)) {
- return false;
- } else if (!Modifier.isStatic(modifiers) || !Modifier.isFinal(modifiers)) {
- return true;
- }
-
- // Field is non-private, static and final
- Class> valueType;
- if (Collection.class.isAssignableFrom(field.getType()) || Map.class.isAssignableFrom(field.getType())) {
- // For collections/maps, need to check the actual type to ensure it's an unmodifiable implementation
- Object value = ReflectionTestUtils.getFieldValue(field, null);
- valueType = value.getClass();
- } else {
- valueType = field.getType();
- }
-
- // Field is static, final, and not private -> check that it is immutable type
- return IMMUTABLE_TYPES.stream()
- .noneMatch(immutableType -> immutableType.isAssignableFrom(valueType));
- }
-
- /**
- * Prints out the field with its modifiers.
- *
- * @param field the field to format
- * @return description of the field
- */
- private static String formatField(Field field) {
- String modifiersText = Modifier.toString(field.getModifiers());
- return String.format("[%s] %s %s %s", field.getDeclaringClass().getSimpleName(), modifiersText.trim(),
- field.getType().getSimpleName(), field.getName());
- }
-
- /**
- * Checks that classes with expiring collections (such as {@link ExpiringMap}) implement the {@link HasCleanup}
- * interface to regularly clean up expired data.
- */
- @Test
- public void shouldImplementHasCleanup() {
- // given / when / then
- for (Class> clazz : ALL_CLASSES) {
- if (hasExpiringCollectionAsField(clazz) && !EXPIRING_STRUCTURES.contains(clazz)) {
- assertThat("Class '" + clazz.getSimpleName() + "' has expiring collections, should implement HasCleanup",
- HasCleanup.class.isAssignableFrom(clazz), equalTo(true));
- }
- }
- }
-
- private static boolean hasExpiringCollectionAsField(Class> clazz) {
- for (Field field : clazz.getDeclaredFields()) {
- if (EXPIRING_STRUCTURES.stream().anyMatch(t -> t.isAssignableFrom(field.getType()))) {
- return true;
- }
- }
- return false;
- }
-
- /**
- * @return the concrete class of the unmodifiable list as returned by {@link Collections#unmodifiableList(List)}.
- */
- private static Class> collectionsUnmodifiableList() {
- return Collections.unmodifiableList(new ArrayList<>()).getClass();
- }
-}
diff --git a/src/test/java/fr/xephi/authme/CodeClimateConfigTest.java b/src/test/java/fr/xephi/authme/CodeClimateConfigTest.java
deleted file mode 100644
index e645922e..00000000
--- a/src/test/java/fr/xephi/authme/CodeClimateConfigTest.java
+++ /dev/null
@@ -1,44 +0,0 @@
-package fr.xephi.authme;
-
-import org.bukkit.configuration.file.FileConfiguration;
-import org.bukkit.configuration.file.YamlConfiguration;
-import org.junit.Test;
-
-import java.io.File;
-import java.util.List;
-
-import static org.hamcrest.Matchers.empty;
-import static org.hamcrest.Matchers.equalTo;
-import static org.hamcrest.Matchers.not;
-import static org.junit.Assert.assertThat;
-import static org.junit.Assert.fail;
-
-/**
- * Consistency test for the CodeClimate configuration file.
- */
-public class CodeClimateConfigTest {
-
- private static final String CONFIG_FILE = ".codeclimate.yml";
-
- @Test
- public void shouldHaveExistingClassesInExclusions() {
- // given / when
- FileConfiguration configuration = YamlConfiguration.loadConfiguration(new File(CONFIG_FILE));
- List excludePaths = configuration.getStringList("exclude_patterns");
-
- // then
- assertThat(excludePaths, not(empty()));
- removeTestsExclusionOrThrow(excludePaths);
- for (String path : excludePaths) {
- if (!new File(path).exists()) {
- fail("Path '" + path + "' does not exist!");
- }
- }
- }
-
- private static void removeTestsExclusionOrThrow(List excludePaths) {
- boolean wasRemoved = excludePaths.removeIf("src/test/java/**/*Test.java"::equals);
- assertThat("Expected an exclusion for test classes",
- wasRemoved, equalTo(true));
- }
-}
diff --git a/src/test/java/fr/xephi/authme/ConsoleLoggerTest.java b/src/test/java/fr/xephi/authme/ConsoleLoggerTest.java
deleted file mode 100644
index 3f334e47..00000000
--- a/src/test/java/fr/xephi/authme/ConsoleLoggerTest.java
+++ /dev/null
@@ -1,227 +0,0 @@
-package fr.xephi.authme;
-
-import fr.xephi.authme.output.LogLevel;
-import fr.xephi.authme.settings.Settings;
-import fr.xephi.authme.settings.properties.PluginSettings;
-import fr.xephi.authme.settings.properties.SecuritySettings;
-import org.junit.After;
-import org.junit.AfterClass;
-import org.junit.Before;
-import org.junit.Rule;
-import org.junit.Test;
-import org.junit.rules.TemporaryFolder;
-import org.junit.runner.RunWith;
-import org.mockito.Mock;
-import org.mockito.junit.MockitoJUnitRunner;
-
-import java.io.File;
-import java.io.FileWriter;
-import java.io.IOException;
-import java.nio.charset.StandardCharsets;
-import java.nio.file.Files;
-import java.util.List;
-import java.util.logging.Logger;
-
-import static org.hamcrest.Matchers.contains;
-import static org.hamcrest.Matchers.containsString;
-import static org.hamcrest.Matchers.equalTo;
-import static org.hamcrest.Matchers.greaterThan;
-import static org.hamcrest.Matchers.hasSize;
-import static org.hamcrest.Matchers.nullValue;
-import static org.junit.Assert.assertThat;
-import static org.mockito.ArgumentMatchers.anyString;
-import static org.mockito.BDDMockito.given;
-import static org.mockito.Mockito.doThrow;
-import static org.mockito.Mockito.mock;
-import static org.mockito.Mockito.times;
-import static org.mockito.Mockito.verify;
-import static org.mockito.Mockito.verifyNoMoreInteractions;
-
-/**
- * Test for {@link ConsoleLogger}.
- */
-@RunWith(MockitoJUnitRunner.class)
-public class ConsoleLoggerTest {
-
- private ConsoleLogger consoleLogger;
-
- @Mock
- private Logger logger;
-
- @Rule
- public TemporaryFolder temporaryFolder = new TemporaryFolder();
-
- private File logFile;
-
- @Before
- public void setMockLogger() throws IOException {
- File folder = temporaryFolder.newFolder();
- File logFile = new File(folder, "authme.log");
- if (!logFile.createNewFile()) {
- throw new IOException("Could not create file '" + logFile.getPath() + "'");
- }
- ConsoleLogger.initialize(logger, logFile);
- this.logFile = logFile;
- this.consoleLogger = new ConsoleLogger("test");
- }
-
- @After
- public void closeFileHandlers() {
- ConsoleLogger.closeFileWriter();
- }
-
- /**
- * Resets the ConsoleLogger back to its defaults after running all tests. Especially important
- * is that we no longer enable logging to a file as the log file we've supplied will no longer
- * be around after this test class has finished.
- */
- @AfterClass
- public static void resetConsoleToDefault() {
- ConsoleLogger.initializeSharedSettings(newSettings(false, LogLevel.INFO));
- }
-
- @Test
- public void shouldLogToFile() throws IOException {
- // given
- Settings settings = newSettings(true, LogLevel.FINE);
- ConsoleLogger.initializeSharedSettings(settings);
- consoleLogger.initializeSettings(settings);
-
- // when
- consoleLogger.fine("Logging a FINE message");
- consoleLogger.debug("Logging a DEBUG message");
- consoleLogger.info("This is an INFO message");
-
- // then
- verify(logger, times(2)).info(anyString());
- verifyNoMoreInteractions(logger);
- List loggedLines = Files.readAllLines(logFile.toPath(), StandardCharsets.UTF_8);
- assertThat(loggedLines, hasSize(2));
- assertThat(loggedLines.get(0), containsString("[FINE] Logging a FINE message"));
- assertThat(loggedLines.get(1), containsString("[INFO] This is an INFO message"));
- }
-
- @Test
- public void shouldNotLogToFile() {
- // given
- Settings settings = newSettings(false, LogLevel.DEBUG);
- ConsoleLogger.initializeSharedSettings(settings);
- consoleLogger.initializeSettings(settings);
-
- // when
- consoleLogger.debug("Created test");
- consoleLogger.warning("Encountered a warning");
-
- // then
- verify(logger).info("[DEBUG] Created test");
- verify(logger).warning("Encountered a warning");
- verifyNoMoreInteractions(logger);
- assertThat(logFile.length(), equalTo(0L));
- }
-
- @Test
- public void shouldLogStackTraceToFile() throws IOException {
- // given
- Settings settings = newSettings(true, LogLevel.INFO);
- ConsoleLogger.initializeSharedSettings(settings);
- Exception e = new IllegalStateException("Test exception message");
-
- // when
- consoleLogger.info("Info text");
- consoleLogger.debug("Debug message");
- consoleLogger.fine("Fine-level message");
- consoleLogger.logException("Exception occurred:", e);
-
- // then
- verify(logger).info("Info text");
- verify(logger).warning("Exception occurred: [IllegalStateException]: Test exception message");
- verifyNoMoreInteractions(logger);
- List loggedLines = Files.readAllLines(logFile.toPath(), StandardCharsets.UTF_8);
- assertThat(loggedLines.size(), greaterThan(3));
- assertThat(loggedLines.get(0), containsString("[INFO] Info text"));
- assertThat(loggedLines.get(1),
- containsString("[WARN] Exception occurred: [IllegalStateException]: Test exception message"));
- // Check that we have this class' full name somewhere in the file -> stacktrace of Exception e
- assertThat(String.join("", loggedLines), containsString(getClass().getCanonicalName()));
- }
-
- @Test
- public void shouldSupportVariousDebugMethods() throws IOException {
- // given
- Settings settings = newSettings(true, LogLevel.DEBUG);
- ConsoleLogger.initializeSharedSettings(settings);
- consoleLogger.initializeSettings(settings);
-
- // when
- consoleLogger.debug("Got {0} entries", 17);
- consoleLogger.debug("Player `{0}` is in world `{1}`", "Bobby", new WorldDummy("world"));
- consoleLogger.debug("{0} quick {1} jump over {2} lazy {3} (reason: {4})", 5, "foxes", 3, "dogs", null);
- consoleLogger.debug(() -> "Too little too late");
-
- // then
- verify(logger).info("[DEBUG] Got 17 entries");
- verify(logger).info("[DEBUG] Player `Bobby` is in world `w[world]`");
- verify(logger).info("[DEBUG] 5 quick foxes jump over 3 lazy dogs (reason: null)");
- verify(logger).info("[DEBUG] Too little too late");
- verifyNoMoreInteractions(logger);
-
- List loggedLines = Files.readAllLines(logFile.toPath(), StandardCharsets.UTF_8);
- assertThat(loggedLines, contains(
- containsString("[DEBUG] Got 17 entries"),
- containsString("[DEBUG] Player `Bobby` is in world `w[world]`"),
- containsString("[DEBUG] 5 quick foxes jump over 3 lazy dogs (reason: null)"),
- containsString("[DEBUG] Too little too late")));
- }
-
- @Test
- public void shouldCloseFileWriterDespiteExceptionOnFlush() throws IOException {
- // given
- FileWriter fileWriter = mock(FileWriter.class);
- doThrow(new IOException("Error during flush")).when(fileWriter).flush();
- ReflectionTestUtils.setField(ConsoleLogger.class, null, "fileWriter", fileWriter);
-
- // when
- ConsoleLogger.closeFileWriter();
-
- // then
- verify(fileWriter).flush();
- verify(fileWriter).close();
- assertThat(ReflectionTestUtils.getFieldValue(ConsoleLogger.class, null, "fileWriter"), nullValue());
- }
-
- @Test
- public void shouldHandleExceptionOnFileWriterClose() throws IOException {
- // given
- FileWriter fileWriter = mock(FileWriter.class);
- doThrow(new IOException("Cannot close")).when(fileWriter).close();
- ReflectionTestUtils.setField(ConsoleLogger.class, null, "fileWriter", fileWriter);
-
- // when
- ConsoleLogger.closeFileWriter();
-
- // then
- verify(fileWriter).flush();
- verify(fileWriter).close();
- assertThat(ReflectionTestUtils.getFieldValue(ConsoleLogger.class, null, "fileWriter"), nullValue());
- }
-
- private static Settings newSettings(boolean logToFile, LogLevel logLevel) {
- Settings settings = mock(Settings.class);
- given(settings.getProperty(SecuritySettings.USE_LOGGING)).willReturn(logToFile);
- given(settings.getProperty(PluginSettings.LOG_LEVEL)).willReturn(logLevel);
- return settings;
- }
-
- private static final class WorldDummy {
- private final String name;
-
- WorldDummy(String name) {
- this.name = name;
- }
-
- @Override
- public String toString() {
- return "w[" + name + "]";
- }
- }
-}
diff --git a/src/test/java/fr/xephi/authme/IsEqualByReflectionMatcher.java b/src/test/java/fr/xephi/authme/IsEqualByReflectionMatcher.java
deleted file mode 100644
index 2acf5ee7..00000000
--- a/src/test/java/fr/xephi/authme/IsEqualByReflectionMatcher.java
+++ /dev/null
@@ -1,91 +0,0 @@
-package fr.xephi.authme;
-
-import org.hamcrest.Description;
-import org.hamcrest.Matcher;
-import org.hamcrest.TypeSafeMatcher;
-
-import java.lang.reflect.Field;
-import java.lang.reflect.Modifier;
-import java.util.ArrayList;
-import java.util.List;
-import java.util.Objects;
-
-import static org.junit.Assert.fail;
-
-/**
- * Matcher which checks with reflection that all fields have the same value.
- * This matcher considers all non-static fields until the Object parent.
- */
-public final class IsEqualByReflectionMatcher extends TypeSafeMatcher {
-
- private final T expected;
-
- private IsEqualByReflectionMatcher(T expected) {
- this.expected = expected;
- }
-
- /**
- * Creates a matcher that checks if all fields are the same as on the {@code expected} object.
- *
- * @param expected the object to match
- * @param the object's type
- * @return the matcher for the expected object
- */
- public static Matcher hasEqualValuesOnAllFields(T expected) {
- return new IsEqualByReflectionMatcher<>(expected);
- }
-
- @Override
- protected boolean matchesSafely(T item) {
- return assertAreFieldsEqual(item);
- }
-
- @Override
- public void describeTo(Description description) {
- description.appendText("parameters " + expected);
- }
-
- /**
- * Checks that all fields of the given {@code item} are equal to the {@link #expected} object. Both objects must
- * be exactly of the same type.
- *
- * @param item the object to check
- * @return true if all fields are equal, false otherwise
- */
- private boolean assertAreFieldsEqual(T item) {
- if (expected.getClass() != item.getClass()) {
- fail("Classes don't match, got " + expected.getClass().getSimpleName()
- + " and " + item.getClass().getSimpleName());
- return false;
- }
-
- List fieldsToCheck = getAllFields(expected);
- for (Field field : fieldsToCheck) {
- Object lhsValue = ReflectionTestUtils.getFieldValue(field, expected);
- Object rhsValue = ReflectionTestUtils.getFieldValue(field, item);
- if (!Objects.equals(lhsValue, rhsValue)) {
- fail("Field '" + field.getName() + "' does not have same value: '"
- + lhsValue + "' vs. '" + rhsValue + "'");
- return false;
- }
- }
- return true;
- }
-
- private static List getAllFields(Object object) {
- List fields = new ArrayList<>();
- Class> currentClass = object.getClass();
- while (currentClass != null) {
- for (Field f : currentClass.getDeclaredFields()) {
- if (!Modifier.isStatic(f.getModifiers()) && !f.isSynthetic()) {
- fields.add(f);
- }
- }
- if (currentClass == Object.class) {
- break;
- }
- currentClass = currentClass.getSuperclass();
- }
- return fields;
- }
-}
diff --git a/src/test/java/fr/xephi/authme/ReflectionTestUtils.java b/src/test/java/fr/xephi/authme/ReflectionTestUtils.java
deleted file mode 100644
index 69a1e1d9..00000000
--- a/src/test/java/fr/xephi/authme/ReflectionTestUtils.java
+++ /dev/null
@@ -1,153 +0,0 @@
-package fr.xephi.authme;
-
-import ch.jalu.injector.handlers.postconstruct.PostConstructMethodInvoker;
-
-import java.lang.reflect.Constructor;
-import java.lang.reflect.Field;
-import java.lang.reflect.InvocationTargetException;
-import java.lang.reflect.Method;
-
-import static java.lang.String.format;
-
-/**
- * Offers reflection functionality to set up tests. Use only when absolutely necessary.
- */
-public final class ReflectionTestUtils {
-
- private ReflectionTestUtils() {
- // Util class
- }
-
- /**
- * Sets the field of a given object to a new value with reflection.
- *
- * @param clazz the class declaring the field
- * @param instance the instance to modify (pass null for static fields)
- * @param fieldName the field name
- * @param value the value to set the field to
- * @param the instance type
- */
- public static void setField(Class super T> clazz, T instance, String fieldName, Object value) {
- try {
- Field field = getField(clazz, fieldName);
- field.set(instance, value);
- } catch (IllegalAccessException e) {
- throw new IllegalStateException(
- format("Could not set value to field '%s' for instance '%s' of class '%s'",
- fieldName, instance, clazz.getName()), e);
- }
- }
-
- /**
- * Sets the field on the given instance to the new value.
- *
- * @param instance the instance to modify
- * @param fieldName the field name
- * @param value the value to set the field to
- */
- @SuppressWarnings("unchecked")
- public static void setField(Object instance, String fieldName, Object value) {
- setField((Class) instance.getClass(), instance, fieldName, value);
- }
-
- private static Field getField(Class clazz, String fieldName) {
- try {
- Field field = clazz.getDeclaredField(fieldName);
- field.setAccessible(true);
- return field;
- } catch (NoSuchFieldException e) {
- throw new IllegalStateException(format("Could not get field '%s' from class '%s'",
- fieldName, clazz.getName()), e);
- }
- }
-
- @SuppressWarnings("unchecked")
- public static V getFieldValue(Class clazz, T instance, String fieldName) {
- Field field = getField(clazz, fieldName);
- return getFieldValue(field, instance);
- }
-
- /**
- * Returns the value of the field on the given instance. Wraps exceptions into a runtime exception.
- *
- * @param field the field to read
- * @param instance the instance to get the value from, null if field is static
- * @param type of the field
- * @return value of the field
- */
- @SuppressWarnings("unchecked")
- public static V getFieldValue(Field field, Object instance) {
- field.setAccessible(true);
- try {
- return (V) field.get(instance);
- } catch (IllegalAccessException e) {
- throw new IllegalStateException("Could not get value of field '" + field.getName() + "'", e);
- }
- }
-
- /**
- * Returns the method on the given class with the supplied parameter types.
- *
- * @param clazz the class to retrieve a method from
- * @param methodName the name of the method
- * @param parameterTypes the parameter types the method to retrieve has
- * @return the method of the class, set to be accessible
- */
- public static Method getMethod(Class> clazz, String methodName, Class>... parameterTypes) {
- try {
- Method method = clazz.getDeclaredMethod(methodName, parameterTypes);
- method.setAccessible(true);
- return method;
- } catch (NoSuchMethodException e) {
- throw new IllegalStateException("Could not retrieve method '" + methodName + "' from class '"
- + clazz.getName() + "'");
- }
- }
-
- /**
- * Invokes the given method on the provided instance with the given parameters.
- *
- * @param method the method to invoke
- * @param instance the instance to invoke the method on (null for static methods)
- * @param parameters the parameters to pass to the method
- * @param return value of the method
- * @return method return value
- */
- @SuppressWarnings("unchecked")
- public static V invokeMethod(Method method, Object instance, Object... parameters) {
- method.setAccessible(true);
- try {
- return (V) method.invoke(instance, parameters);
- } catch (InvocationTargetException | IllegalAccessException e) {
- throw new IllegalStateException("Could not invoke method '" + method + "'", e);
- }
- }
-
- /**
- * Runs all methods annotated with {@link javax.annotation.PostConstruct} on the given instance
- * (including such methods on superclasses).
- *
- * @param instance the instance to process
- */
- public static void invokePostConstructMethods(Object instance) {
- // Use the implementation of the injector to invoke all @PostConstruct methods the same way
- new PostConstructMethodInvoker().postProcess(instance, null, null);
- }
-
- /**
- * Creates a new instance of the given class, using a no-args constructor (which may be hidden).
- *
- * @param clazz the class to instantiate
- * @param the class' type
- * @return the created instance
- */
- public static T newInstance(Class clazz) {
- try {
- Constructor constructor = clazz.getDeclaredConstructor();
- constructor.setAccessible(true);
- return constructor.newInstance();
- } catch (ReflectiveOperationException e) {
- throw new IllegalStateException("Could not invoke no-args constructor of class " + clazz, e);
- }
- }
-}
diff --git a/src/test/java/fr/xephi/authme/TestHelper.java b/src/test/java/fr/xephi/authme/TestHelper.java
deleted file mode 100644
index ad50c511..00000000
--- a/src/test/java/fr/xephi/authme/TestHelper.java
+++ /dev/null
@@ -1,121 +0,0 @@
-package fr.xephi.authme;
-
-import ch.jalu.configme.properties.Property;
-import fr.xephi.authme.settings.Settings;
-import org.bukkit.entity.Player;
-import org.mockito.Mockito;
-
-import java.io.File;
-import java.net.InetAddress;
-import java.net.InetSocketAddress;
-import java.net.URI;
-import java.net.URISyntaxException;
-import java.net.URL;
-import java.net.UnknownHostException;
-import java.nio.file.Path;
-import java.nio.file.Paths;
-import java.util.logging.Logger;
-
-import static org.mockito.ArgumentMatchers.any;
-import static org.mockito.BDDMockito.given;
-
-/**
- * AuthMe test utilities.
- */
-public final class TestHelper {
-
- public static final String SOURCES_FOLDER = "src/main/java/";
- public static final String TEST_SOURCES_FOLDER = "src/test/java/";
- public static final String TEST_RESOURCES_FOLDER = "src/test/resources/";
- public static final String PROJECT_ROOT = "/fr/xephi/authme/";
-
- private TestHelper() {
- }
-
- /**
- * Return a {@link File} to a file in the JAR's resources (main or test).
- *
- * @param path The absolute path to the file
- * @return The project file
- */
- public static File getJarFile(String path) {
- URI uri = getUriOrThrow(path);
- return new File(uri.getPath());
- }
-
- /**
- * Return a {@link Path} to a file in the JAR's resources (main or test).
- *
- * @param path The absolute path to the file
- * @return The Path object to the file
- */
- public static Path getJarPath(String path) {
- String sqlFilePath = getUriOrThrow(path).getPath();
- // Windows prepends the path with a '/' or '\', which Paths cannot handle
- String appropriatePath = System.getProperty("os.name").contains("indow")
- ? sqlFilePath.substring(1)
- : sqlFilePath;
- return Paths.get(appropriatePath);
- }
-
- private static URI getUriOrThrow(String path) {
- URL url = TestHelper.class.getResource(path);
- if (url == null) {
- throw new IllegalStateException("File '" + path + "' could not be loaded");
- }
- try {
- return new URI(url.toString());
- } catch (URISyntaxException e) {
- throw new IllegalStateException("File '" + path + "' cannot be converted to a URI");
- }
- }
-
- /**
- * Assign the necessary fields on ConsoleLogger with mocks.
- *
- * @return The logger mock used
- */
- public static Logger setupLogger() {
- Logger logger = Mockito.mock(Logger.class);
- ConsoleLogger.initialize(logger, null);
- return logger;
- }
-
- /**
- * Set ConsoleLogger to use a new real logger.
- *
- * @return The real logger used by ConsoleLogger
- */
- public static Logger setRealLogger() {
- Logger logger = Logger.getAnonymousLogger();
- ConsoleLogger.initialize(logger, null);
- return logger;
- }
-
- /**
- * Configures the player mock to return the given IP address.
- *
- * @param player the player mock
- * @param ip the ip address it should return
- */
- public static void mockIpAddressToPlayer(Player player, String ip) {
- try {
- InetAddress inetAddress = InetAddress.getByName(ip);
- InetSocketAddress inetSocketAddress = new InetSocketAddress(inetAddress, 8093);
- given(player.getAddress()).willReturn(inetSocketAddress);
- } catch (UnknownHostException e) {
- throw new IllegalStateException("Invalid IP address: " + ip, e);
- }
- }
-
- /**
- * Configures the Settings mock to return the property's default value for any given property.
- *
- * @param settings the settings mock
- */
- @SuppressWarnings("unchecked")
- public static void returnDefaultsForAllProperties(Settings settings) {
- given(settings.getProperty(any(Property.class)))
- .willAnswer(invocation -> ((Property>) invocation.getArgument(0)).getDefaultValue());
- }
-}
diff --git a/src/test/java/fr/xephi/authme/api/v3/AuthMeApiTest.java b/src/test/java/fr/xephi/authme/api/v3/AuthMeApiTest.java
deleted file mode 100644
index b52f7908..00000000
--- a/src/test/java/fr/xephi/authme/api/v3/AuthMeApiTest.java
+++ /dev/null
@@ -1,558 +0,0 @@
-package fr.xephi.authme.api.v3;
-
-import fr.xephi.authme.AuthMe;
-import fr.xephi.authme.ReflectionTestUtils;
-import fr.xephi.authme.data.auth.PlayerAuth;
-import fr.xephi.authme.data.auth.PlayerCache;
-import fr.xephi.authme.datasource.DataSource;
-import fr.xephi.authme.process.Management;
-import fr.xephi.authme.process.register.executors.ApiPasswordRegisterParams;
-import fr.xephi.authme.process.register.executors.RegistrationMethod;
-import fr.xephi.authme.security.PasswordSecurity;
-import fr.xephi.authme.security.crypts.HashedPassword;
-import fr.xephi.authme.service.GeoIpService;
-import fr.xephi.authme.service.ValidationService;
-import org.bukkit.Bukkit;
-import org.bukkit.Location;
-import org.bukkit.Server;
-import org.bukkit.World;
-import org.bukkit.entity.Player;
-import org.junit.Test;
-import org.junit.runner.RunWith;
-import org.mockito.ArgumentCaptor;
-import org.mockito.InjectMocks;
-import org.mockito.Mock;
-import org.mockito.junit.MockitoJUnitRunner;
-
-import java.time.Instant;
-import java.util.Arrays;
-import java.util.Date;
-import java.util.List;
-import java.util.Locale;
-import java.util.Optional;
-import java.util.stream.Collectors;
-
-import static fr.xephi.authme.IsEqualByReflectionMatcher.hasEqualValuesOnAllFields;
-import static org.hamcrest.MatcherAssert.assertThat;
-import static org.hamcrest.Matchers.contains;
-import static org.hamcrest.Matchers.equalTo;
-import static org.hamcrest.Matchers.not;
-import static org.hamcrest.Matchers.nullValue;
-import static org.hamcrest.Matchers.sameInstance;
-import static org.mockito.ArgumentMatchers.any;
-import static org.mockito.ArgumentMatchers.eq;
-import static org.mockito.BDDMockito.given;
-import static org.mockito.Mockito.mock;
-import static org.mockito.Mockito.only;
-import static org.mockito.Mockito.verify;
-import static org.mockito.Mockito.verifyNoInteractions;
-import static org.mockito.hamcrest.MockitoHamcrest.argThat;
-
-/**
- * Test for {@link AuthMeApi}.
- */
-@RunWith(MockitoJUnitRunner.class)
-public class AuthMeApiTest {
-
- @InjectMocks
- private AuthMeApi api;
-
- @Mock
- private ValidationService validationService;
- @Mock
- private DataSource dataSource;
- @Mock
- private Management management;
- @Mock
- private PasswordSecurity passwordSecurity;
- @Mock
- private PlayerCache playerCache;
- @Mock
- private AuthMe authMe;
- @Mock
- private GeoIpService geoIpService;
-
- @Test
- public void shouldReturnInstanceOrNull() {
- AuthMeApi result = AuthMeApi.getInstance();
- assertThat(result, sameInstance(api));
-
- ReflectionTestUtils.setField(AuthMeApi.class, null, "singleton", null);
- assertThat(AuthMeApi.getInstance(), nullValue());
- }
-
- @Test
- public void shouldReturnIfPlayerIsAuthenticated() {
- // given
- String name = "Bobby";
- Player player = mockPlayerWithName(name);
- given(playerCache.isAuthenticated(name)).willReturn(true);
-
- // when
- boolean result = api.isAuthenticated(player);
-
- // then
- verify(playerCache).isAuthenticated(name);
- assertThat(result, equalTo(true));
- }
-
- @Test
- public void shouldReturnIfPlayerIsNpc() {
- // given
- Player player = mock(Player.class);
- given(player.hasMetadata("NPC")).willReturn(true);
-
- // when
- boolean result = api.isNpc(player);
-
- // then
- assertThat(result, equalTo(true));
- verify(player).hasMetadata("NPC");
- }
-
- @Test
- public void shouldReturnIfPlayerIsUnrestricted() {
- // given
- String name = "Tester";
- Player player = mockPlayerWithName(name);
- given(validationService.isUnrestricted(name)).willReturn(true);
-
- // when
- boolean result = api.isUnrestricted(player);
-
- // then
- verify(validationService).isUnrestricted(name);
- assertThat(result, equalTo(true));
- }
-
- @Test
- public void shouldGetLastLocation() {
- // given
- String name = "Gary";
- Player player = mockPlayerWithName(name);
- PlayerAuth auth = PlayerAuth.builder().name(name)
- .locWorld("world")
- .locX(12.4)
- .locY(24.6)
- .locZ(-438.2)
- .locYaw(3.41f)
- .locPitch(0.29f)
- .build();
- given(playerCache.getAuth(name)).willReturn(auth);
- Server server = mock(Server.class);
- ReflectionTestUtils.setField(Bukkit.class, null, "server", server);
- World world = mock(World.class);
- given(server.getWorld(auth.getWorld())).willReturn(world);
-
- // when
- Location result = api.getLastLocation(player);
-
- // then
- assertThat(result, not(nullValue()));
- assertThat(result.getX(), equalTo(auth.getQuitLocX()));
- assertThat(result.getY(), equalTo(auth.getQuitLocY()));
- assertThat(result.getZ(), equalTo(auth.getQuitLocZ()));
- assertThat(result.getWorld(), equalTo(world));
- assertThat(result.getYaw(), equalTo(auth.getYaw()));
- assertThat(result.getPitch(), equalTo(auth.getPitch()));
- }
-
- @Test
- public void shouldGetLastIp() {
- // given
- String name = "Gabriel";
- Player player = mockPlayerWithName(name);
- PlayerAuth auth = PlayerAuth.builder().name(name)
- .lastIp("93.23.44.55")
- .build();
- given(playerCache.getAuth(name)).willReturn(auth);
-
- // when
- String result = api.getLastIp(player.getName());
-
- // then
- assertThat(result, not(nullValue()));
- assertThat(result, equalTo("93.23.44.55"));
- }
-
- @Test
- public void shouldReturnNullAsLastIpForUnknownUser() {
- // given
- String name = "Harrison";
- given(playerCache.getAuth(name)).willReturn(null);
- given(dataSource.getAuth(name)).willReturn(null);
-
- // when
- String result = api.getLastIp(name);
-
- // then
- assertThat(result, nullValue());
- verify(playerCache).getAuth(name);
- verify(dataSource).getAuth(name);
- }
-
- @Test
- public void shouldGetLastLogin() {
- // given
- String name = "David";
- PlayerAuth auth = PlayerAuth.builder().name(name)
- .lastLogin(1501597979L)
- .build();
- given(playerCache.getAuth(name)).willReturn(auth);
-
- // when
- Date result = api.getLastLogin(name);
-
- // then
- assertThat(result, not(nullValue()));
- assertThat(result, equalTo(new Date(1501597979L)));
- }
-
- @Test
- public void shouldHandleNullLastLogin() {
- // given
- String name = "John";
- PlayerAuth auth = PlayerAuth.builder().name(name)
- .lastLogin(null)
- .build();
- given(dataSource.getAuth(name)).willReturn(auth);
-
- // when
- Date result = api.getLastLogin(name);
-
- // then
- assertThat(result, nullValue());
- verify(dataSource).getAuth(name);
- }
-
- @Test
- public void shouldGetLastLoginTime() {
- // given
- String name = "David";
- PlayerAuth auth = PlayerAuth.builder().name(name)
- .lastLogin(1501597979L)
- .build();
- given(playerCache.getAuth(name)).willReturn(auth);
-
- // when
- Instant result = api.getLastLoginTime(name);
-
- // then
- assertThat(result, not(nullValue()));
- assertThat(result, equalTo(Instant.ofEpochMilli(1501597979L)));
- }
-
- @Test
- public void testGetLastLoginMillis() {
- AuthMeApi result = AuthMeApi.getInstance();
- assertThat(result.getLastLoginTime("notAPlayer"), nullValue());
- }
-
- @Test
- public void shouldHandleNullLastLoginTime() {
- // given
- String name = "John";
- PlayerAuth auth = PlayerAuth.builder().name(name)
- .lastLogin(null)
- .build();
- given(dataSource.getAuth(name)).willReturn(auth);
-
- // when
- Instant result = api.getLastLoginTime(name);
-
- // then
- assertThat(result, nullValue());
- verify(dataSource).getAuth(name);
- }
-
- @Test
- public void shouldReturnNullForUnavailablePlayer() {
- // given
- String name = "Numan";
- Player player = mockPlayerWithName(name);
- given(playerCache.getAuth(name)).willReturn(null);
-
- // when
- Location result = api.getLastLocation(player);
-
- // then
- assertThat(result, nullValue());
- }
-
- @Test
- public void shouldCheckForRegisteredName() {
- // given
- String name = "toaster";
- given(dataSource.isAuthAvailable(name)).willReturn(true);
-
- // when
- boolean result = api.isRegistered(name);
-
- // then
- assertThat(result, equalTo(true));
- }
-
- @Test
- public void shouldCheckPassword() {
- // given
- String playerName = "Robert";
- String password = "someSecretPhrase2983";
- given(passwordSecurity.comparePassword(password, playerName)).willReturn(true);
-
- // when
- boolean result = api.checkPassword(playerName, password);
-
- // then
- verify(passwordSecurity).comparePassword(password, playerName);
- assertThat(result, equalTo(true));
- }
-
- @Test
- public void shouldReturnAuthNames() {
- // given
- String[] names = {"bobby", "peter", "elisabeth", "craig"};
- List auths = Arrays.stream(names)
- .map(name -> PlayerAuth.builder().name(name).build())
- .collect(Collectors.toList());
- given(dataSource.getAllAuths()).willReturn(auths);
-
- // when
- List result = api.getRegisteredNames();
-
- // then
- assertThat(result, contains(names));
- }
-
- @Test
- public void shouldReturnAuthRealNames() {
- // given
- String[] names = {"Bobby", "peter", "Elisabeth", "CRAIG"};
- List auths = Arrays.stream(names)
- .map(name -> PlayerAuth.builder().name(name).realName(name).build())
- .collect(Collectors.toList());
- given(dataSource.getAllAuths()).willReturn(auths);
-
- // when
- List result = api.getRegisteredRealNames();
-
- // then
- assertThat(result, contains(names));
- }
-
- @Test
- public void shouldUnregisterPlayer() {
- // given
- Player player = mock(Player.class);
- String name = "Donald";
- given(player.getName()).willReturn(name);
-
- // when
- api.forceUnregister(player);
-
- // then
- verify(management).performUnregisterByAdmin(null, name, player);
- }
-
- @Test
- public void shouldUnregisterPlayerByName() {
- // given
- Server server = mock(Server.class);
- ReflectionTestUtils.setField(Bukkit.class, null, "server", server);
- String name = "tristan";
- Player player = mock(Player.class);
- given(server.getPlayer(name)).willReturn(player);
-
- // when
- api.forceUnregister(name);
-
- // then
- verify(management).performUnregisterByAdmin(null, name, player);
- }
-
- @Test
- public void shouldChangePassword() {
- // given
- String name = "Bobby12";
- String password = "resetPw!";
-
- // when
- api.changePassword(name, password);
-
- // then
- verify(management).performPasswordChangeAsAdmin(null, name, password);
- }
-
- @Test
- public void shouldReturnAuthMeInstance() {
- // given / when
- AuthMe result = api.getPlugin();
-
- // then
- assertThat(result, equalTo(authMe));
- }
-
- @Test
- public void shouldReturnVersion() {
- // given / when
- String result = api.getPluginVersion();
-
- // then
- assertThat(result, equalTo(AuthMe.getPluginVersion()));
- }
-
- @Test
- public void shouldForceLogin() {
- // given
- Player player = mock(Player.class);
-
- // when
- api.forceLogin(player);
-
- // then
- verify(management).forceLogin(player);
- }
-
- @Test
- public void shouldForceLogout() {
- // given
- Player player = mock(Player.class);
-
- // when
- api.forceLogout(player);
-
- // then
- verify(management).performLogout(player);
- }
-
- @Test
- public void shouldForceRegister() {
- // given
- Player player = mock(Player.class);
- String pass = "test235";
-
- // when
- api.forceRegister(player, pass);
-
- // then
- verify(management).performRegister(eq(RegistrationMethod.API_REGISTRATION),
- argThat(hasEqualValuesOnAllFields(ApiPasswordRegisterParams.of(player, pass, true))));
- }
-
- @Test
- public void shouldForceRegisterAndNotAutoLogin() {
- // given
- Player player = mock(Player.class);
- String pass = "test235";
-
- // when
- api.forceRegister(player, pass, false);
-
- // then
- verify(management).performRegister(eq(RegistrationMethod.API_REGISTRATION),
- argThat(hasEqualValuesOnAllFields(ApiPasswordRegisterParams.of(player, pass, false))));
- }
-
- @Test
- public void shouldRegisterPlayer() {
- // given
- String name = "Marco";
- String password = "myP4ss";
- HashedPassword hashedPassword = new HashedPassword("0395872SLKDFJOWEIUTEJSD");
- given(passwordSecurity.computeHash(password, name.toLowerCase(Locale.ROOT))).willReturn(hashedPassword);
- given(dataSource.saveAuth(any(PlayerAuth.class))).willReturn(true);
-
- // when
- boolean result = api.registerPlayer(name, password);
-
- // then
- assertThat(result, equalTo(true));
- verify(passwordSecurity).computeHash(password, name.toLowerCase(Locale.ROOT));
- ArgumentCaptor authCaptor = ArgumentCaptor.forClass(PlayerAuth.class);
- verify(dataSource).saveAuth(authCaptor.capture());
- assertThat(authCaptor.getValue().getNickname(), equalTo(name.toLowerCase(Locale.ROOT)));
- assertThat(authCaptor.getValue().getRealName(), equalTo(name));
- assertThat(authCaptor.getValue().getPassword(), equalTo(hashedPassword));
- }
-
- @Test
- public void shouldNotRegisterAlreadyRegisteredPlayer() {
- // given
- String name = "jonah";
- given(dataSource.isAuthAvailable(name)).willReturn(true);
-
- // when
- boolean result = api.registerPlayer(name, "pass");
-
- // then
- assertThat(result, equalTo(false));
- verify(dataSource, only()).isAuthAvailable(name);
- verifyNoInteractions(management, passwordSecurity);
- }
-
- @Test
- public void shouldGetNamesByIp() {
- // given
- String ip = "123.123.123.123";
- List names = Arrays.asList("Morgan", "Batista", "QUINN");
- given(dataSource.getAllAuthsByIp(ip)).willReturn(names);
-
- // when
- List result = api.getNamesByIp(ip);
-
- // then
- assertThat(result, equalTo(names));
- verify(dataSource).getAllAuthsByIp(ip);
- }
-
- @Test
- public void shouldReturnGeoIpInfo() {
- // given
- String ip = "127.127.12.1";
- given(geoIpService.getCountryCode(ip)).willReturn("XA");
- given(geoIpService.getCountryName(ip)).willReturn("Syldavia");
-
- // when
- String countryCode = api.getCountryCode(ip);
- String countryName = api.getCountryName(ip);
-
- // then
- assertThat(countryCode, equalTo("XA"));
- assertThat(countryName, equalTo("Syldavia"));
- }
-
- @Test
- public void shouldReturnAuthMePlayerInfo() {
- // given
- PlayerAuth auth = PlayerAuth.builder()
- .name("bobb")
- .realName("Bobb")
- .registrationDate(1433166082000L)
- .build();
- given(dataSource.getAuth("bobb")).willReturn(auth);
-
- // when
- Optional result = api.getPlayerInfo("bobb");
-
- // then
- AuthMePlayer playerInfo = result.get();
- assertThat(playerInfo.getName(), equalTo("Bobb"));
- assertThat(playerInfo.getRegistrationDate(), equalTo(Instant.ofEpochMilli(1433166082000L)));
- }
-
- @Test
- public void shouldReturnNullForNonExistentAuth() {
- // given / when
- Optional result = api.getPlayerInfo("doesNotExist");
-
- // then
- assertThat(result.isPresent(), equalTo(false));
- verify(playerCache).getAuth("doesNotExist");
- verify(dataSource).getAuth("doesNotExist");
- }
-
- private static Player mockPlayerWithName(String name) {
- Player player = mock(Player.class);
- given(player.getName()).willReturn(name);
- return player;
- }
-}
diff --git a/src/test/java/fr/xephi/authme/api/v3/AuthMePlayerImplTest.java b/src/test/java/fr/xephi/authme/api/v3/AuthMePlayerImplTest.java
deleted file mode 100644
index aa8b50c9..00000000
--- a/src/test/java/fr/xephi/authme/api/v3/AuthMePlayerImplTest.java
+++ /dev/null
@@ -1,95 +0,0 @@
-package fr.xephi.authme.api.v3;
-
-import fr.xephi.authme.data.auth.PlayerAuth;
-import org.hamcrest.Description;
-import org.hamcrest.Matcher;
-import org.hamcrest.TypeSafeMatcher;
-import org.junit.Test;
-
-import java.time.Instant;
-import java.util.Optional;
-import java.util.UUID;
-
-import static org.hamcrest.MatcherAssert.assertThat;
-import static org.hamcrest.Matchers.equalTo;
-
-/**
- * Test for {@link AuthMePlayerImpl}.
- */
-public class AuthMePlayerImplTest {
-
- @Test
- public void shouldMapNullWithoutError() {
- // given / when / then
- assertThat(AuthMePlayerImpl.fromPlayerAuth(null), emptyOptional());
- }
-
- @Test
- public void shouldMapFromPlayerAuth() {
- // given
- PlayerAuth auth = PlayerAuth.builder()
- .name("victor")
- .realName("Victor")
- .email("vic@example.com")
- .registrationDate(1480075661000L)
- .registrationIp("124.125.126.127")
- .lastLogin(1542675632000L)
- .lastIp("62.63.64.65")
- .uuid(UUID.fromString("deadbeef-2417-4653-9026-feedbabeface"))
- .build();
-
- // when
- Optional result = AuthMePlayerImpl.fromPlayerAuth(auth);
-
- // then
- AuthMePlayer playerInfo = result.get();
- assertThat(playerInfo.getName(), equalTo("Victor"));
- assertThat(playerInfo.getUuid().get(), equalTo(auth.getUuid()));
- assertThat(playerInfo.getEmail().get(), equalTo(auth.getEmail()));
- assertThat(playerInfo.getRegistrationDate(), equalTo(Instant.ofEpochMilli(auth.getRegistrationDate())));
- assertThat(playerInfo.getRegistrationIpAddress().get(), equalTo(auth.getRegistrationIp()));
- assertThat(playerInfo.getLastLoginDate().get(), equalTo(Instant.ofEpochMilli(auth.getLastLogin())));
- assertThat(playerInfo.getLastLoginIpAddress().get(), equalTo(auth.getLastIp()));
- }
-
- @Test
- public void shouldHandleNullAndDefaultValues() {
- // given
- PlayerAuth auth = PlayerAuth.builder()
- .name("victor")
- .realName("Victor")
- .email("your@email.com") // DB default
- .registrationDate(1480075661000L)
- .lastLogin(0L) // DB default
- .lastIp("127.0.0.1") // DB default
- .build();
-
- // when
- Optional result = AuthMePlayerImpl.fromPlayerAuth(auth);
-
- // then
- AuthMePlayer playerInfo = result.get();
- assertThat(playerInfo.getName(), equalTo("Victor"));
- assertThat(playerInfo.getUuid(), emptyOptional());
- assertThat(playerInfo.getEmail(), emptyOptional());
- assertThat(playerInfo.getRegistrationDate(), equalTo(Instant.ofEpochMilli(auth.getRegistrationDate())));
- assertThat(playerInfo.getRegistrationIpAddress(), emptyOptional());
- assertThat(playerInfo.getLastLoginDate(), emptyOptional());
- assertThat(playerInfo.getLastLoginIpAddress(), emptyOptional());
- }
-
- private static Matcher> emptyOptional() {
- return new TypeSafeMatcher>() {
-
- @Override
- public void describeTo(Description description) {
- description.appendText("an empty optional");
- }
-
- @Override
- protected boolean matchesSafely(Optional item) {
- return !item.isPresent();
- }
- };
- }
-}
diff --git a/src/test/java/fr/xephi/authme/command/CommandConsistencyTest.java b/src/test/java/fr/xephi/authme/command/CommandConsistencyTest.java
deleted file mode 100644
index d2033d1b..00000000
--- a/src/test/java/fr/xephi/authme/command/CommandConsistencyTest.java
+++ /dev/null
@@ -1,84 +0,0 @@
-package fr.xephi.authme.command;
-
-import org.bukkit.configuration.MemorySection;
-import org.bukkit.configuration.file.FileConfiguration;
-import org.bukkit.configuration.file.YamlConfiguration;
-import org.junit.Test;
-
-import java.util.ArrayList;
-import java.util.Collection;
-import java.util.Collections;
-import java.util.HashMap;
-import java.util.List;
-import java.util.Map;
-
-import static fr.xephi.authme.TestHelper.getJarFile;
-import static org.hamcrest.Matchers.containsInAnyOrder;
-import static org.hamcrest.Matchers.equalTo;
-import static org.hamcrest.Matchers.not;
-import static org.hamcrest.Matchers.nullValue;
-import static org.junit.Assert.assertThat;
-
-/**
- * Checks that the commands declared in plugin.yml correspond
- * to the ones built by the {@link CommandInitializer}.
- */
-public class CommandConsistencyTest {
-
- @Test
- public void shouldHaveEqualDefinitions() {
- // given
- Collection> initializedCommands = initializeCommands();
- Map> pluginFileLabels = getLabelsFromPluginFile();
-
- // when / then
- assertThat("number of base commands are equal in plugin.yml and CommandInitializer",
- initializedCommands.size(), equalTo(pluginFileLabels.size()));
- for (List commandLabels : initializedCommands) {
- List pluginYmlLabels = pluginFileLabels.get(commandLabels.get(0));
- // NB: the first label in CommandDescription needs to correspond to the key in plugin.yml
- assertThat("plugin.yml contains definition for command '" + commandLabels.get(0) + "'",
- pluginYmlLabels, not(nullValue()));
- assertThat("plugin.yml and CommandDescription have same alternative labels for /" + commandLabels.get(0),
- pluginYmlLabels, containsInAnyOrder(commandLabels.subList(1, commandLabels.size()).toArray()));
- }
- }
-
- /**
- * Gets the command definitions from CommandInitializer and returns the
- * labels of all base commands.
- *
- * @return collection of all base command labels
- */
- private static Collection> initializeCommands() {
- CommandInitializer initializer = new CommandInitializer();
- Collection> commandLabels = new ArrayList<>();
- for (CommandDescription baseCommand : initializer.getCommands()) {
- commandLabels.add(baseCommand.getLabels());
- }
- return commandLabels;
- }
-
- /**
- * Reads plugin.yml and returns the defined commands by main label and aliases.
- *
- * @return collection of all labels and their aliases
- */
- @SuppressWarnings("unchecked")
- private static Map> getLabelsFromPluginFile() {
- FileConfiguration pluginFile = YamlConfiguration.loadConfiguration(getJarFile("/plugin.yml"));
- MemorySection commandList = (MemorySection) pluginFile.get("commands");
- Map commandDefinitions = commandList.getValues(false);
-
- Map> commandLabels = new HashMap<>();
- for (Map.Entry commandDefinition : commandDefinitions.entrySet()) {
- MemorySection definition = (MemorySection) commandDefinition.getValue();
- List alternativeLabels = definition.get("aliases") == null
- ? Collections.EMPTY_LIST
- : (List) definition.get("aliases");
- commandLabels.put(commandDefinition.getKey(), alternativeLabels);
- }
- return commandLabels;
- }
-
-}
diff --git a/src/test/java/fr/xephi/authme/command/CommandHandlerTest.java b/src/test/java/fr/xephi/authme/command/CommandHandlerTest.java
deleted file mode 100644
index d80d8f8a..00000000
--- a/src/test/java/fr/xephi/authme/command/CommandHandlerTest.java
+++ /dev/null
@@ -1,302 +0,0 @@
-package fr.xephi.authme.command;
-
-import ch.jalu.injector.Injector;
-import ch.jalu.injector.factory.Factory;
-import com.google.common.collect.Sets;
-import fr.xephi.authme.command.TestCommandsUtil.TestLoginCommand;
-import fr.xephi.authme.command.TestCommandsUtil.TestRegisterCommand;
-import fr.xephi.authme.command.TestCommandsUtil.TestUnregisterCommand;
-import fr.xephi.authme.command.help.HelpProvider;
-import fr.xephi.authme.message.MessageKey;
-import fr.xephi.authme.message.Messages;
-import fr.xephi.authme.permission.PermissionsManager;
-import org.bukkit.command.CommandSender;
-import org.junit.Before;
-import org.junit.Test;
-import org.junit.runner.RunWith;
-import org.mockito.ArgumentCaptor;
-import org.mockito.Mock;
-import org.mockito.invocation.InvocationOnMock;
-import org.mockito.junit.MockitoJUnitRunner;
-import org.mockito.stubbing.Answer;
-
-import java.util.Collections;
-import java.util.HashMap;
-import java.util.Map;
-
-import static fr.xephi.authme.command.FoundResultStatus.INCORRECT_ARGUMENTS;
-import static fr.xephi.authme.command.FoundResultStatus.MISSING_BASE_COMMAND;
-import static fr.xephi.authme.command.FoundResultStatus.NO_PERMISSION;
-import static fr.xephi.authme.command.FoundResultStatus.SUCCESS;
-import static fr.xephi.authme.command.FoundResultStatus.UNKNOWN_LABEL;
-import static java.util.Arrays.asList;
-import static org.hamcrest.Matchers.containsString;
-import static org.junit.Assert.assertThat;
-import static org.mockito.ArgumentMatchers.any;
-import static org.mockito.ArgumentMatchers.anyList;
-import static org.mockito.ArgumentMatchers.anyString;
-import static org.mockito.ArgumentMatchers.eq;
-import static org.mockito.BDDMockito.given;
-import static org.mockito.Mockito.atLeastOnce;
-import static org.mockito.Mockito.doReturn;
-import static org.mockito.Mockito.mock;
-import static org.mockito.Mockito.never;
-import static org.mockito.Mockito.times;
-import static org.mockito.Mockito.verify;
-import static org.mockito.hamcrest.MockitoHamcrest.argThat;
-
-/**
- * Test for {@link CommandHandler}.
- */
-// Justification: It's more readable to use asList() everywhere in the test when we often generated two lists where one
-// often consists of only one element, e.g. myMethod(asList("authme"), asList("my", "args"), ...)
-@SuppressWarnings("ArraysAsListWithZeroOrOneArgument")
-@RunWith(MockitoJUnitRunner.class)
-public class CommandHandlerTest {
-
- private CommandHandler handler;
-
- @Mock
- private Factory commandFactory;
- @Mock
- private CommandMapper commandMapper;
- @Mock
- private PermissionsManager permissionsManager;
- @Mock
- private Messages messages;
- @Mock
- private HelpProvider helpProvider;
-
- private Map, ExecutableCommand> mockedCommands = new HashMap<>();
-
- @Before
- @SuppressWarnings("unchecked")
- public void initializeCommandMapper() {
- given(commandMapper.getCommandClasses()).willReturn(Sets.newHashSet(
- ExecutableCommand.class, TestLoginCommand.class, TestRegisterCommand.class, TestUnregisterCommand.class));
- setInjectorToMockExecutableCommandClasses();
-
- handler = new CommandHandler(commandFactory, commandMapper, permissionsManager, messages, helpProvider);
- }
-
- /**
- * Makes the injector return a mock when {@link Injector#newInstance(Class)} is invoked
- * with (a child of) ExecutableCommand.class. The mocks the injector creates are stored in {@link #mockedCommands}.
- *
- * The {@link CommandMapper} is mocked in {@link #initializeCommandMapper()} to return certain test classes.
- */
- @SuppressWarnings("unchecked")
- private void setInjectorToMockExecutableCommandClasses() {
- given(commandFactory.newInstance(any(Class.class))).willAnswer(new Answer