Merge branch 'master' into patch
This commit is contained in:
commit
b5a46d94de
2
.github/dependabot.yml
vendored
2
.github/dependabot.yml
vendored
@ -12,3 +12,5 @@ updates:
|
|||||||
- dependency-name: com.zaxxer:HikariCP
|
- dependency-name: com.zaxxer:HikariCP
|
||||||
- dependency-name: "org.mockito:mockito-core" # Mockito 5 requires Java 11
|
- dependency-name: "org.mockito:mockito-core" # Mockito 5 requires Java 11
|
||||||
versions: ">= 5"
|
versions: ">= 5"
|
||||||
|
- dependency-name: "org.slf4j:slf4j-simple"
|
||||||
|
versions: ">= 1.7.36"
|
||||||
|
|||||||
44
.github/workflows/maven.yml
vendored
44
.github/workflows/maven.yml
vendored
@ -7,17 +7,41 @@ on:
|
|||||||
- master
|
- master
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build_and_test:
|
Build:
|
||||||
strategy:
|
strategy:
|
||||||
matrix:
|
matrix:
|
||||||
jdkversion: [11]
|
jdkversion: [ 11 ]
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- uses: actions/setup-java@v3
|
- uses: actions/setup-java@v3
|
||||||
with:
|
with:
|
||||||
distribution: 'temurin'
|
distribution: 'temurin'
|
||||||
java-version: ${{ matrix.jdkversion }}
|
java-version: ${{ matrix.jdkversion }}
|
||||||
cache: 'maven'
|
cache: 'maven'
|
||||||
- name: Build with Maven
|
- name: Build
|
||||||
run: mvn -V -B clean package --file pom.xml
|
run: mvn -V -B clean package --file pom.xml
|
||||||
|
- name: Upload Artifacts
|
||||||
|
uses: actions/upload-artifact@v3.1.2
|
||||||
|
with:
|
||||||
|
name: Download
|
||||||
|
path: ./target/AuthMe-5.6.0-FORK-Spigot-Universal.jar
|
||||||
|
runtime-test:
|
||||||
|
name: Plugin Runtime Test
|
||||||
|
needs: [Build]
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
include:
|
||||||
|
- mcVersion: '1.8.8'
|
||||||
|
javaVersion: '8'
|
||||||
|
- mcVersion: '1.12.2'
|
||||||
|
javaVersion: '8'
|
||||||
|
- mcVersion: '1.20.2'
|
||||||
|
javaVersion: '20'
|
||||||
|
steps:
|
||||||
|
- uses: HaHaWTH/minecraft-plugin-runtime-test@paper
|
||||||
|
with:
|
||||||
|
server-version: ${{ matrix.mcVersion }}
|
||||||
|
java-version: ${{ matrix.javaVersion }}
|
||||||
|
artifact-name: Download
|
||||||
|
|||||||
3
.gitignore
vendored
3
.gitignore
vendored
@ -21,9 +21,10 @@ hs_err_pid*
|
|||||||
|
|
||||||
# Ignore IDEA directory
|
# Ignore IDEA directory
|
||||||
.idea/*
|
.idea/*
|
||||||
|
.idea/
|
||||||
|
|
||||||
|
|
||||||
# Include the project's code style settings file
|
# Include the project's code style settings file
|
||||||
!.idea/codeStyleSettings.xml
|
|
||||||
|
|
||||||
# File-based project format:
|
# File-based project format:
|
||||||
*.ipr
|
*.ipr
|
||||||
|
|||||||
3
.idea/.gitignore
generated
vendored
Normal file
3
.idea/.gitignore
generated
vendored
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# 默认忽略的文件
|
||||||
|
/shelf/
|
||||||
|
/workspace.xml
|
||||||
181
README.md
181
README.md
@ -1,144 +1,49 @@
|
|||||||
# AuthMeReloaded
|
# AuthMeReReloaded
|
||||||
**"The best authentication plugin for the Bukkit modding API!"**
|
**"A fork of the best authentication plugin for the Bukkit modding API!⭐"**
|
||||||
|
|
||||||
<img src="wallpaper.png?raw=true" alt="AuthMeLogo"/>
|

|
||||||
|
<p align="center">
|
||||||
|
<img src="https://img.shields.io/github/languages/code-size/HaHaWTH/AuthMeReReloaded.svg" alt="Code size"/>
|
||||||
|
<img src="https://img.shields.io/github/repo-size/HaHaWTH/AuthMeReReloaded.svg" alt="GitHub repo size"/>
|
||||||
|
<img src="https://www.codefactor.io/repository/github/hahawth/authmerereloaded/badge" alt="CodeFactor" />
|
||||||
|
</p>
|
||||||
|
|
||||||
| Type | Badges |
|
**Detailed Changes:**
|
||||||
|-------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
1. Improved mail sending logic & support more emails
|
||||||
| **General:** |   |
|
2. Shutdown mail sending(When server is closed, email you)
|
||||||
| **Code quality:** | [](https://codeclimate.com/github/AuthMe/AuthMeReloaded) [](https://coveralls.io/github/AuthMe-Team/AuthMeReloaded?branch=master) |
|
3. Legacy bug fixes
|
||||||
| **Jenkins CI:** | [](https://ci.codemc.org/) [](https://ci.codemc.org/job/AuthMe/job/AuthMeReloaded)  |
|
4. Anti Ghost Player(Doubled login bug)
|
||||||
| **Other CIs:** | [](https://www.travis-ci.com/AuthMe/AuthMeReloaded) |
|
5. Use the best performance method by server brand
|
||||||
|
6. Bedrock Compatibility(Floodgate needed)(based on UUID)
|
||||||
|
7. Update checker
|
||||||
|
8. Integrated GUI Captcha feature(Bedrock compatibility & ProtocolLib needed)(70% Asynchronous)
|
||||||
|
9. Improved listeners
|
||||||
|
10. Player login logic improvement to reduce lag
|
||||||
|
11. Automatically purge bot data
|
||||||
|
12. Folia
|
||||||
|
compatibility [Here](https://github.com/HaHaWTH/AuthMeReReloaded/releases/download/b20/AuthMe-5.6.0-FORK-Folia.jar)
|
||||||
|
13. Offhand Menu compatibility(Thats amazing)
|
||||||
|
14. Automatically fix portal stuck issue
|
||||||
|
15. Automatically login for Bedrock players(configurable)
|
||||||
|
16. Fix shulker box crash bug on legacy versions(MC 1.13-)
|
||||||
|
17. **H2 database support**
|
||||||
|
18. **100% compatibility with original authme and extensions**
|
||||||
|
19. More......
|
||||||
|
|
||||||
## Description
|
**Download links:**
|
||||||
|
[Releases](https://github.com/HaHaWTH/AuthMeReReloaded/releases/latest)
|
||||||
|
[Actions(Dev builds, use at your own risk!)](https://github.com/HaHaWTH/AuthMeReReloaded/actions/workflows/maven.yml)
|
||||||
|
|
||||||
Prevent username stealing on your server!<br>
|
If you are using FRP(内网穿透) for your server, this plugin may help [HAProxy-Detector](https://github.com/HaHaWTH/HAProxy-Detector)
|
||||||
Use it to secure your Offline mode server or to increase your Online mode server's protection!
|
|
||||||
|
|
||||||
AuthMeReloaded disallows players who aren't authenticated to do actions like placing blocks, moving,<br>
|
**Pull Requests and suggestions are welcome!**
|
||||||
typing commands or using the inventory. It can also kick players with uncommonly long or short player names or kick players from banned countries.
|
|
||||||
|
|
||||||
With the Session Login feature you don't have to execute the authentication command every time you connect to the server!
|
<picture>
|
||||||
Each command and every feature can be enabled or disabled from our well structured configuration file.
|
<source
|
||||||
|
media="(prefers-color-scheme: dark)"
|
||||||
You can also create your own translation file and, if you want, you can share it with us! :)
|
srcset="
|
||||||
|
https://api.star-history.com/svg?repos=HaHaWTH/AuthMeReReloaded&type=Date&theme=dark
|
||||||
#### Features:
|
"
|
||||||
<ul>
|
/>
|
||||||
<li><strong>E-Mail Recovery System!</strong></li>
|
<img alt="Star History Chart" src="https://api.star-history.com/svg?repos=HaHaWTH/AuthMeReReloaded&type=Date" />
|
||||||
<li>Username spoofing protection.</li>
|
</picture>
|
||||||
<li>Countries Whitelist/Blacklist! <a href="https://dev.maxmind.com/geoip/legacy/codes/iso3166/">(country codes)</a></li>
|
|
||||||
<li><strong>Built-in AntiBot System!</strong></li>
|
|
||||||
<li><strong>ForceLogin Feature: Admins can login with all account via console command!</strong></li>
|
|
||||||
<li><strong>Avoid the "Logged in from another location" message!</strong></li>
|
|
||||||
<li>Two-factor (2FA) support!</li>
|
|
||||||
<li>Session Login!</li>
|
|
||||||
<li>Editable translations and messages!</li>
|
|
||||||
<li><strong>MySQL and SQLite Backend support!</strong></li>
|
|
||||||
<li>Supported password encryption algorithms: SHA256, ARGON2, BCRYPT, PBKDF2, <a href="https://github.com/CypherX/xAuth/wiki/Password-Hashing">xAuth</a></li>
|
|
||||||
<li>Supported alternative registration methods:<br>
|
|
||||||
<ul>
|
|
||||||
<li>PHPBB, VBulletin: PHPBB - MD5VB</li>
|
|
||||||
<li>Xenforo: XFBCRYPT</li>
|
|
||||||
<li>MyBB: MYBB</li>
|
|
||||||
<li>IPB3: IPB3</li>
|
|
||||||
<li>IPB4: IPB4</li>
|
|
||||||
<li>PhpFusion: PHPFUSION</li>
|
|
||||||
<li>Joomla: JOOMLA</li>
|
|
||||||
<li>WBB3: WBB3*</li>
|
|
||||||
<li>SHA512: SALTEDSHA512</li>
|
|
||||||
<li>DoubleSaltedMD5: SALTED2MD5</li>
|
|
||||||
<li>WordPress: WORDPRESS</li>
|
|
||||||
<li><a href="https://github.com/AuthMe/AuthMeReloaded/blob/master/docs/hash_algorithms.md">List of all supported hashes</a></li>
|
|
||||||
</ul></li>
|
|
||||||
<li>Custom MySQL tables/columns names (useful with forum databases)</li>
|
|
||||||
<li><strong>Cached database queries!</strong></li>
|
|
||||||
<li><strong>Fully compatible with Citizens2, CombatTag, CombatTagPlus!</strong></li>
|
|
||||||
<li>Compatible with Minecraft mods like <strong>BuildCraft or RedstoneCraft</strong></li>
|
|
||||||
<li>Restricted users (associate a username with an IP)</li>
|
|
||||||
<li>Protect player's inventory until correct authentication (requires ProtocolLib)</li>
|
|
||||||
<li>Saves the quit location of the player</li>
|
|
||||||
<li>Automatic database backup</li>
|
|
||||||
<li>Available languages: <a href="https://github.com/AuthMe/AuthMeReloaded/blob/master/docs/translations.md">translations</a></li>
|
|
||||||
<li>Built-in Deprecated FlatFile (auths.db) to SQL (authme.sql) converter!</li>
|
|
||||||
<li><strong>Import your old database from other plugins like Rakamak, xAuth, CrazyLogin, RoyalAuth and vAuth!</strong></li>
|
|
||||||
</ul>
|
|
||||||
|
|
||||||
#### Configuration
|
|
||||||
[How to configure AuthMe](https://github.com/AuthMe/AuthMeReloaded/blob/master/docs/config.md)
|
|
||||||
#### Commands
|
|
||||||
[Command list and usage](https://github.com/AuthMe/AuthMeReloaded/blob/master/docs/commands.md)
|
|
||||||
#### Permissions
|
|
||||||
- authme.player.* - for all user commands
|
|
||||||
- authme.admin.* - for all admin commands
|
|
||||||
- [List of all permission nodes](http://github.com/AuthMe/AuthMeReloaded/blob/master/docs/permission_nodes.md)
|
|
||||||
|
|
||||||
#### How To
|
|
||||||
- [How to use the converter](https://github.com/AuthMe/AuthMeReloaded/wiki/Converters)
|
|
||||||
- [How to import database from xAuth](https://dev.bukkit.org/projects/authme-reloaded/pages/how-to-import-database-from-xauth)
|
|
||||||
- [Website integration](https://github.com/AuthMe/AuthMeReloaded/tree/master/samples/website_integration)
|
|
||||||
- [How to convert from Rakamak](https://dev.bukkit.org/projects/authme-reloaded/pages/how-to-import-database-from-rakamak)
|
|
||||||
- Convert between database types (e.g. SQLite to MySQL): /authme converter
|
|
||||||
|
|
||||||
|
|
||||||
## Links and Contacts
|
|
||||||
|
|
||||||
- **Support:**
|
|
||||||
- [GitHub issue tracker](https://github.com/AuthMe/AuthMeReloaded/issues)
|
|
||||||
- [Discord](https://discord.gg/Vn9eCyE)
|
|
||||||
- [BukkitDev page](https://dev.bukkit.org/projects/authme-reloaded)
|
|
||||||
- [Spigot page](https://www.spigotmc.org/resources/authmereloaded.6269/)
|
|
||||||
|
|
||||||
- **Dev resources:**
|
|
||||||
- <a href="https://ci.codemc.org/job/AuthMe/job/AuthMeReloaded/javadoc/">JavaDocs</a>
|
|
||||||
- <a href="http://repo.codemc.org/repository/maven-public/">Maven Repository</a>
|
|
||||||
```xml
|
|
||||||
<repositories>
|
|
||||||
<repository>
|
|
||||||
<id>codemc-repo</id>
|
|
||||||
<url>https://repo.codemc.org/repository/maven-public/</url>
|
|
||||||
</repository>
|
|
||||||
</repositories>
|
|
||||||
|
|
||||||
<dependencies>
|
|
||||||
<dependency>
|
|
||||||
<groupId>fr.xephi</groupId>
|
|
||||||
<artifactId>authme</artifactId>
|
|
||||||
<version>5.6.0-SNAPSHOT</version>
|
|
||||||
<scope>provided</scope>
|
|
||||||
</dependency>
|
|
||||||
</dependencies>
|
|
||||||
```
|
|
||||||
|
|
||||||
- **Statistics:**
|
|
||||||

|
|
||||||
|
|
||||||
## Requirements
|
|
||||||
|
|
||||||
##### Compiling requirements:
|
|
||||||
>- JDK 11 (JDK 17 is recommended)
|
|
||||||
>- Maven
|
|
||||||
>- Git/Github (Optional)
|
|
||||||
|
|
||||||
##### How to compile the project:
|
|
||||||
>- Clone the project with Git/GitHub
|
|
||||||
>- Execute command "mvn clean package"
|
|
||||||
|
|
||||||
##### Running requirements:
|
|
||||||
>- Java 8 (Java 17 is recommended)
|
|
||||||
>- Paper or Spigot (1.8.X and up)<br>
|
|
||||||
(In case you use Thermos, Cauldron or similar, you have to update the SpecialSource library to support Java 8 plugins.
|
|
||||||
HowTo: https://github.com/games647/FastLogin/issues/111#issuecomment-272331347)
|
|
||||||
>- ProtocolLib (optional, required by some features)
|
|
||||||
|
|
||||||
## Credits
|
|
||||||
|
|
||||||
##### Contributors:
|
|
||||||
Team members: <a href="https://github.com/AuthMe/AuthMeReloaded/wiki/Development-team">developers</a>, <a href="https://github.com/AuthMe/AuthMeReloaded/wiki/Translators">translators</a>
|
|
||||||
|
|
||||||
Credits for the old version of the plugin: d4rkwarriors, fabe1337, Whoami2 and pomo4ka
|
|
||||||
|
|
||||||
Thanks also to: AS1LV3RN1NJA, Hoeze and eprimex
|
|
||||||
|
|
||||||
##### GeoIP License:
|
|
||||||
This product uses data from the GeoLite API created by MaxMind, available at https://www.maxmind.com
|
|
||||||
|
|||||||
@ -9,7 +9,7 @@ the generated config.yml file.
|
|||||||
```yml
|
```yml
|
||||||
DataSource:
|
DataSource:
|
||||||
# What type of database do you want to use?
|
# What type of database do you want to use?
|
||||||
# Valid values: SQLITE, MARIADB, MYSQL, POSTGRESQL
|
# Valid values: H2, SQLITE, MARIADB, MYSQL, POSTGRESQL
|
||||||
backend: SQLITE
|
backend: SQLITE
|
||||||
# Enable the database caching system, should be disabled on bungeecord environments
|
# Enable the database caching system, should be disabled on bungeecord environments
|
||||||
# or when a website integration is being used.
|
# or when a website integration is being used.
|
||||||
@ -304,13 +304,6 @@ settings:
|
|||||||
forceKickAfterRegister: false
|
forceKickAfterRegister: false
|
||||||
# Does AuthMe need to enforce a /login after a successful registration?
|
# Does AuthMe need to enforce a /login after a successful registration?
|
||||||
forceLoginAfterRegister: false
|
forceLoginAfterRegister: false
|
||||||
# Enable to display the welcome message (welcome.txt) after a login
|
|
||||||
# You can use colors in this welcome.txt + some replaced strings:
|
|
||||||
# {PLAYER}: player name, {ONLINE}: display number of online players,
|
|
||||||
# {MAXPLAYERS}: display server slots, {IP}: player ip, {LOGINS}: number of players logged,
|
|
||||||
# {WORLD}: player current world, {SERVER}: server name
|
|
||||||
# {VERSION}: get current bukkit version, {COUNTRY}: player country
|
|
||||||
useWelcomeMessage: true
|
|
||||||
# Broadcast the welcome message to the server or only to the player?
|
# Broadcast the welcome message to the server or only to the player?
|
||||||
# set true for server or false for player
|
# set true for server or false for player
|
||||||
broadcastWelcomeMessage: false
|
broadcastWelcomeMessage: false
|
||||||
|
|||||||
126
pom.xml
126
pom.xml
@ -6,10 +6,10 @@
|
|||||||
|
|
||||||
<groupId>fr.xephi</groupId>
|
<groupId>fr.xephi</groupId>
|
||||||
<artifactId>authme</artifactId>
|
<artifactId>authme</artifactId>
|
||||||
<version>5.6.0-SNAPSHOT</version>
|
<version>5.6.0-FORK</version>
|
||||||
|
|
||||||
<name>AuthMeReloaded</name>
|
<name>AuthMeReReloaded</name>
|
||||||
<description>The first authentication plugin for the Bukkit API!</description>
|
<description>Fork of the first authentication plugin for the Bukkit API!</description>
|
||||||
<inceptionYear>2013</inceptionYear>
|
<inceptionYear>2013</inceptionYear>
|
||||||
<url>https://github.com/AuthMe/AuthMeReloaded</url>
|
<url>https://github.com/AuthMe/AuthMeReloaded</url>
|
||||||
|
|
||||||
@ -47,7 +47,7 @@
|
|||||||
|
|
||||||
<licenses>
|
<licenses>
|
||||||
<license>
|
<license>
|
||||||
<name>The GNU General Public Licence version 3 (GPLv3)</name>
|
<name>The GNU Public Licence version 3 (GPLv3)</name>
|
||||||
<url>https://www.gnu.org/licenses/gpl-3.0.html</url>
|
<url>https://www.gnu.org/licenses/gpl-3.0.html</url>
|
||||||
<distribution>repo</distribution>
|
<distribution>repo</distribution>
|
||||||
</license>
|
</license>
|
||||||
@ -67,11 +67,11 @@
|
|||||||
<maven.minimumVersion>3.6.3</maven.minimumVersion>
|
<maven.minimumVersion>3.6.3</maven.minimumVersion>
|
||||||
|
|
||||||
<!-- Dependencies versions -->
|
<!-- Dependencies versions -->
|
||||||
<spigot.version>1.19.2-R0.1-SNAPSHOT</spigot.version>
|
<spigot.version>1.20.2-R0.1-SNAPSHOT</spigot.version>
|
||||||
|
|
||||||
<!-- Versioning properties -->
|
<!-- Versioning properties -->
|
||||||
<project.outputName>AuthMe</project.outputName>
|
<project.outputName>AuthMe</project.outputName>
|
||||||
<project.buildNumber>CUSTOM</project.buildNumber>
|
<project.buildNumber>28</project.buildNumber>
|
||||||
<project.versionCode>${project.version}-b${project.buildNumber}</project.versionCode>
|
<project.versionCode>${project.version}-b${project.buildNumber}</project.versionCode>
|
||||||
<project.finalNameBase>${project.outputName}-${project.version}</project.finalNameBase>
|
<project.finalNameBase>${project.outputName}-${project.version}</project.finalNameBase>
|
||||||
|
|
||||||
@ -189,19 +189,24 @@
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-clean-plugin</artifactId>
|
<artifactId>maven-clean-plugin</artifactId>
|
||||||
<version>3.2.0</version>
|
<version>3.3.2</version>
|
||||||
</plugin>
|
</plugin>
|
||||||
<!-- Include resource files -->
|
<!-- Include resource files -->
|
||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-resources-plugin</artifactId>
|
<artifactId>maven-resources-plugin</artifactId>
|
||||||
<version>3.3.0</version>
|
<version>3.3.1</version>
|
||||||
|
<configuration>
|
||||||
|
<nonFilteredFileExtensions>
|
||||||
|
<nonFilteredFileExtension>mmdb</nonFilteredFileExtension>
|
||||||
|
</nonFilteredFileExtensions>
|
||||||
|
</configuration>
|
||||||
</plugin>
|
</plugin>
|
||||||
<!-- Compile and include classes -->
|
<!-- Compile and include classes -->
|
||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-compiler-plugin</artifactId>
|
<artifactId>maven-compiler-plugin</artifactId>
|
||||||
<version>3.10.1</version>
|
<version>3.12.1</version>
|
||||||
<configuration>
|
<configuration>
|
||||||
<source>${java.source}</source>
|
<source>${java.source}</source>
|
||||||
<target>${java.target}</target>
|
<target>${java.target}</target>
|
||||||
@ -272,7 +277,7 @@
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-source-plugin</artifactId>
|
<artifactId>maven-source-plugin</artifactId>
|
||||||
<version>3.2.1</version>
|
<version>3.3.0</version>
|
||||||
<configuration>
|
<configuration>
|
||||||
<finalName>${project.finalNameBase}</finalName>
|
<finalName>${project.finalNameBase}</finalName>
|
||||||
</configuration>
|
</configuration>
|
||||||
@ -289,7 +294,7 @@
|
|||||||
<plugin>
|
<plugin>
|
||||||
<groupId>org.apache.maven.plugins</groupId>
|
<groupId>org.apache.maven.plugins</groupId>
|
||||||
<artifactId>maven-shade-plugin</artifactId>
|
<artifactId>maven-shade-plugin</artifactId>
|
||||||
<version>3.4.1</version>
|
<version>3.5.2</version>
|
||||||
<executions>
|
<executions>
|
||||||
<execution>
|
<execution>
|
||||||
<id>shaded-jar</id>
|
<id>shaded-jar</id>
|
||||||
@ -319,7 +324,7 @@
|
|||||||
<goal>shade</goal>
|
<goal>shade</goal>
|
||||||
</goals>
|
</goals>
|
||||||
<configuration>
|
<configuration>
|
||||||
<finalName>${project.finalNameBase}-legacy</finalName>
|
<finalName>${project.finalNameBase}-Spigot-Universal</finalName>
|
||||||
<relocations>
|
<relocations>
|
||||||
<relocation>
|
<relocation>
|
||||||
<pattern>com.google.common</pattern>
|
<pattern>com.google.common</pattern>
|
||||||
@ -341,6 +346,10 @@
|
|||||||
<pattern>com.google.gson</pattern>
|
<pattern>com.google.gson</pattern>
|
||||||
<shadedPattern>fr.xephi.authme.libs.com.google.gson</shadedPattern>
|
<shadedPattern>fr.xephi.authme.libs.com.google.gson</shadedPattern>
|
||||||
</relocation>
|
</relocation>
|
||||||
|
<relocation>
|
||||||
|
<pattern>org.h2</pattern>
|
||||||
|
<shadedPattern>fr.xephi.authme.libs.org.h2</shadedPattern>
|
||||||
|
</relocation>
|
||||||
</relocations>
|
</relocations>
|
||||||
</configuration>
|
</configuration>
|
||||||
</execution>
|
</execution>
|
||||||
@ -435,6 +444,14 @@
|
|||||||
<pattern>com.google.protobuf</pattern>
|
<pattern>com.google.protobuf</pattern>
|
||||||
<shadedPattern>fr.xephi.authme.libs.com.google.protobuf</shadedPattern>
|
<shadedPattern>fr.xephi.authme.libs.com.google.protobuf</shadedPattern>
|
||||||
</relocation>
|
</relocation>
|
||||||
|
<relocation>
|
||||||
|
<pattern>io.netty</pattern>
|
||||||
|
<shadedPattern>fr.xephi.authme.libs.io.netty</shadedPattern>
|
||||||
|
</relocation>
|
||||||
|
<relocation>
|
||||||
|
<pattern>org.apache.commons.validator</pattern>
|
||||||
|
<shadedPattern>fr.xephi.authme.libs.org.apache.commons.validator</shadedPattern>
|
||||||
|
</relocation>
|
||||||
</relocations>
|
</relocations>
|
||||||
|
|
||||||
<filters>
|
<filters>
|
||||||
@ -502,6 +519,15 @@
|
|||||||
</build>
|
</build>
|
||||||
|
|
||||||
<repositories>
|
<repositories>
|
||||||
|
<repository>
|
||||||
|
<id>opencollab-snapshot-main</id>
|
||||||
|
<url>https://repo.opencollab.dev/main/</url>
|
||||||
|
</repository>
|
||||||
|
<repository>
|
||||||
|
<id>opencollab-maven-snapshots</id>
|
||||||
|
<url>https://repo.opencollab.dev/maven-snapshots/</url>
|
||||||
|
</repository>
|
||||||
|
|
||||||
<!-- Apache snapshots repo -->
|
<!-- Apache snapshots repo -->
|
||||||
<repository>
|
<repository>
|
||||||
<id>apache-snapshots</id>
|
<id>apache-snapshots</id>
|
||||||
@ -593,11 +619,43 @@
|
|||||||
<enabled>true</enabled>
|
<enabled>true</enabled>
|
||||||
</snapshots>
|
</snapshots>
|
||||||
</repository>
|
</repository>
|
||||||
|
|
||||||
|
<!-- FoliaLib -->
|
||||||
|
<repository>
|
||||||
|
<id>devmart-other</id>
|
||||||
|
<url>https://nexuslite.gcnt.net/repos/other/</url>
|
||||||
|
</repository>
|
||||||
|
|
||||||
|
<repository>
|
||||||
|
<id>opencollab-snapshot</id>
|
||||||
|
<url>https://repo.opencollab.dev/maven-snapshots/</url>
|
||||||
|
<releases>
|
||||||
|
<enabled>false</enabled>
|
||||||
|
</releases>
|
||||||
|
<snapshots>
|
||||||
|
<enabled>true</enabled>
|
||||||
|
</snapshots>
|
||||||
|
</repository>
|
||||||
|
<repository>
|
||||||
|
<id>jitpack</id>
|
||||||
|
<url>https://jitpack.io/</url>
|
||||||
|
<releases>
|
||||||
|
<enabled>true</enabled>
|
||||||
|
</releases>
|
||||||
|
<snapshots>
|
||||||
|
<enabled>false</enabled>
|
||||||
|
</snapshots>
|
||||||
|
</repository>
|
||||||
</repositories>
|
</repositories>
|
||||||
|
|
||||||
<dependencies>
|
<dependencies>
|
||||||
<!-- Java Libraries -->
|
<!-- Java Libraries -->
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.geysermc.floodgate</groupId>
|
||||||
|
<artifactId>api</artifactId>
|
||||||
|
<version>2.2.2-SNAPSHOT</version>
|
||||||
|
<scope>provided</scope>
|
||||||
|
</dependency>
|
||||||
<!-- Jalu Injector -->
|
<!-- Jalu Injector -->
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>ch.jalu</groupId>
|
<groupId>ch.jalu</groupId>
|
||||||
@ -641,7 +699,7 @@
|
|||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.apache.commons</groupId>
|
<groupId>org.apache.commons</groupId>
|
||||||
<artifactId>commons-email</artifactId>
|
<artifactId>commons-email</artifactId>
|
||||||
<version>1.6-SNAPSHOT</version>
|
<version>1.6.0</version>
|
||||||
<optional>true</optional>
|
<optional>true</optional>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
@ -649,7 +707,7 @@
|
|||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.apache.logging.log4j</groupId>
|
<groupId>org.apache.logging.log4j</groupId>
|
||||||
<artifactId>log4j-core</artifactId>
|
<artifactId>log4j-core</artifactId>
|
||||||
<version>2.8.1</version> <!-- Log4J version bundled in 1.12.2 -->
|
<version>2.20.0</version> <!-- Log4J version bundled in 1.12.2 -->
|
||||||
<scope>provided</scope>
|
<scope>provided</scope>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
@ -692,7 +750,7 @@
|
|||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.mariadb.jdbc</groupId>
|
<groupId>org.mariadb.jdbc</groupId>
|
||||||
<artifactId>mariadb-java-client</artifactId>
|
<artifactId>mariadb-java-client</artifactId>
|
||||||
<version>3.3.0</version>
|
<version>3.3.3</version>
|
||||||
<optional>true</optional>
|
<optional>true</optional>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
@ -737,7 +795,7 @@
|
|||||||
<dependency>
|
<dependency>
|
||||||
<groupId>com.google.guava</groupId>
|
<groupId>com.google.guava</groupId>
|
||||||
<artifactId>guava</artifactId>
|
<artifactId>guava</artifactId>
|
||||||
<version>31.0.1-jre</version>
|
<version>31.1-jre</version>
|
||||||
<optional>true</optional>
|
<optional>true</optional>
|
||||||
<exclusions>
|
<exclusions>
|
||||||
<exclusion>
|
<exclusion>
|
||||||
@ -750,17 +808,15 @@
|
|||||||
<dependency>
|
<dependency>
|
||||||
<groupId>com.google.code.gson</groupId>
|
<groupId>com.google.code.gson</groupId>
|
||||||
<artifactId>gson</artifactId>
|
<artifactId>gson</artifactId>
|
||||||
<version>2.8.9</version>
|
<version>2.10.1</version>
|
||||||
<optional>true</optional>
|
<optional>true</optional>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
<!-- Bukkit Libraries -->
|
|
||||||
|
|
||||||
<!-- ConfigMe -->
|
<!-- ConfigMe -->
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>ch.jalu</groupId>
|
<groupId>ch.jalu</groupId>
|
||||||
<artifactId>configme</artifactId>
|
<artifactId>configme</artifactId>
|
||||||
<version>1.3.0</version>
|
<version>1.3.1</version>
|
||||||
<optional>true</optional>
|
<optional>true</optional>
|
||||||
<exclusions>
|
<exclusions>
|
||||||
<exclusion>
|
<exclusion>
|
||||||
@ -770,11 +826,11 @@
|
|||||||
</exclusions>
|
</exclusions>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
<!-- bStats metrics -->
|
<!-- bStats metrics -->
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.bstats</groupId>
|
<groupId>org.bstats</groupId>
|
||||||
<artifactId>bstats-bukkit</artifactId>
|
<artifactId>bstats-bukkit</artifactId>
|
||||||
<version>3.0.0</version>
|
<version>3.0.2</version>
|
||||||
<optional>true</optional>
|
<optional>true</optional>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
@ -782,7 +838,7 @@
|
|||||||
<dependency>
|
<dependency>
|
||||||
<groupId>com.comphenix.protocol</groupId>
|
<groupId>com.comphenix.protocol</groupId>
|
||||||
<artifactId>ProtocolLib</artifactId>
|
<artifactId>ProtocolLib</artifactId>
|
||||||
<version>4.8.0</version>
|
<version>5.1.0</version>
|
||||||
<scope>provided</scope>
|
<scope>provided</scope>
|
||||||
<exclusions>
|
<exclusions>
|
||||||
<exclusion>
|
<exclusion>
|
||||||
@ -826,6 +882,20 @@
|
|||||||
</exclusions>
|
</exclusions>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
|
<!-- dependencies used by HAProxy feature -->
|
||||||
|
<!-- <dependency>-->
|
||||||
|
<!-- <groupId>io.netty</groupId>-->
|
||||||
|
<!-- <artifactId>netty-codec-haproxy</artifactId>-->
|
||||||
|
<!-- <version>4.1.104.Final</version>-->
|
||||||
|
<!-- <scope>compile</scope>-->
|
||||||
|
<!-- </dependency>-->
|
||||||
|
<!-- <dependency>-->
|
||||||
|
<!-- <groupId>commons-validator</groupId>-->
|
||||||
|
<!-- <artifactId>commons-validator</artifactId>-->
|
||||||
|
<!-- <version>1.8.0</version>-->
|
||||||
|
<!-- <scope>provided</scope>-->
|
||||||
|
<!-- </dependency>-->
|
||||||
|
|
||||||
<!-- zPermissions plugin -->
|
<!-- zPermissions plugin -->
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.tyrannyofheaven.bukkit</groupId>
|
<groupId>org.tyrannyofheaven.bukkit</groupId>
|
||||||
@ -1027,7 +1097,7 @@
|
|||||||
<groupId>org.mockito</groupId>
|
<groupId>org.mockito</groupId>
|
||||||
<artifactId>mockito-core</artifactId>
|
<artifactId>mockito-core</artifactId>
|
||||||
<scope>test</scope>
|
<scope>test</scope>
|
||||||
<version>4.8.1</version>
|
<version>5.2.0</version>
|
||||||
<exclusions>
|
<exclusions>
|
||||||
<exclusion>
|
<exclusion>
|
||||||
<artifactId>hamcrest-core</artifactId>
|
<artifactId>hamcrest-core</artifactId>
|
||||||
@ -1048,14 +1118,14 @@
|
|||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.xerial</groupId>
|
<groupId>org.xerial</groupId>
|
||||||
<artifactId>sqlite-jdbc</artifactId>
|
<artifactId>sqlite-jdbc</artifactId>
|
||||||
<version>3.44.0.0</version>
|
<version>3.45.1.0</version>
|
||||||
<scope>test</scope>
|
<scope>test</scope>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>com.h2database</groupId>
|
<groupId>com.h2database</groupId>
|
||||||
<artifactId>h2</artifactId>
|
<artifactId>h2</artifactId>
|
||||||
<version>2.2.220</version>
|
<version>2.2.224</version>
|
||||||
<scope>test</scope>
|
<scope>compile</scope>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
</dependencies>
|
</dependencies>
|
||||||
|
|||||||
@ -412,12 +412,6 @@ settings:
|
|||||||
forceRegisterCommands: []
|
forceRegisterCommands: []
|
||||||
# Force these commands after /register as a server console, without any '/', use %p for replace with player name
|
# Force these commands after /register as a server console, without any '/', use %p for replace with player name
|
||||||
forceRegisterCommandsAsConsole: []
|
forceRegisterCommandsAsConsole: []
|
||||||
# Do we need to display the welcome message (welcome.txt) after a register or a login?
|
|
||||||
# You can use colors in this welcome.txt + some replaced strings :
|
|
||||||
# {PLAYER} : player name, {ONLINE} : display number of online players, {MAXPLAYERS} : display server slots,
|
|
||||||
# {IP} : player ip, {LOGINS} : number of players logged, {WORLD} : player current world, {SERVER} : server name
|
|
||||||
# {VERSION} : get current bukkit version, {COUNTRY} : player country
|
|
||||||
useWelcomeMessage: true
|
|
||||||
# Do we need to broadcast the welcome message to all server or only to the player? set true for server or false for player
|
# Do we need to broadcast the welcome message to all server or only to the player? set true for server or false for player
|
||||||
broadcastWelcomeMessage: false
|
broadcastWelcomeMessage: false
|
||||||
# Do we need to delay the join/leave message to be displayed only when the player is authenticated ?
|
# Do we need to delay the join/leave message to be displayed only when the player is authenticated ?
|
||||||
|
|||||||
@ -2,7 +2,6 @@ package fr.xephi.authme;
|
|||||||
|
|
||||||
import ch.jalu.injector.Injector;
|
import ch.jalu.injector.Injector;
|
||||||
import ch.jalu.injector.InjectorBuilder;
|
import ch.jalu.injector.InjectorBuilder;
|
||||||
import com.google.common.annotations.VisibleForTesting;
|
|
||||||
import fr.xephi.authme.api.v3.AuthMeApi;
|
import fr.xephi.authme.api.v3.AuthMeApi;
|
||||||
import fr.xephi.authme.command.CommandHandler;
|
import fr.xephi.authme.command.CommandHandler;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
@ -12,13 +11,20 @@ import fr.xephi.authme.initialization.OnShutdownPlayerSaver;
|
|||||||
import fr.xephi.authme.initialization.OnStartupTasks;
|
import fr.xephi.authme.initialization.OnStartupTasks;
|
||||||
import fr.xephi.authme.initialization.SettingsProvider;
|
import fr.xephi.authme.initialization.SettingsProvider;
|
||||||
import fr.xephi.authme.initialization.TaskCloser;
|
import fr.xephi.authme.initialization.TaskCloser;
|
||||||
|
import fr.xephi.authme.listener.AdvancedShulkerFixListener;
|
||||||
|
import fr.xephi.authme.listener.BedrockAutoLoginListener;
|
||||||
import fr.xephi.authme.listener.BlockListener;
|
import fr.xephi.authme.listener.BlockListener;
|
||||||
|
import fr.xephi.authme.listener.DoubleLoginFixListener;
|
||||||
import fr.xephi.authme.listener.EntityListener;
|
import fr.xephi.authme.listener.EntityListener;
|
||||||
|
import fr.xephi.authme.listener.GuiCaptchaHandler;
|
||||||
|
import fr.xephi.authme.listener.LoginLocationFixListener;
|
||||||
import fr.xephi.authme.listener.PlayerListener;
|
import fr.xephi.authme.listener.PlayerListener;
|
||||||
import fr.xephi.authme.listener.PlayerListener111;
|
import fr.xephi.authme.listener.PlayerListener111;
|
||||||
import fr.xephi.authme.listener.PlayerListener19;
|
import fr.xephi.authme.listener.PlayerListener19;
|
||||||
import fr.xephi.authme.listener.PlayerListener19Spigot;
|
import fr.xephi.authme.listener.PlayerListener19Spigot;
|
||||||
|
import fr.xephi.authme.listener.PlayerListenerHigherThan18;
|
||||||
import fr.xephi.authme.listener.ServerListener;
|
import fr.xephi.authme.listener.ServerListener;
|
||||||
|
import fr.xephi.authme.mail.EmailService;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.security.crypts.Sha256;
|
import fr.xephi.authme.security.crypts.Sha256;
|
||||||
import fr.xephi.authme.service.BackupService;
|
import fr.xephi.authme.service.BackupService;
|
||||||
@ -28,6 +34,8 @@ import fr.xephi.authme.service.bungeecord.BungeeReceiver;
|
|||||||
import fr.xephi.authme.service.yaml.YamlParseException;
|
import fr.xephi.authme.service.yaml.YamlParseException;
|
||||||
import fr.xephi.authme.settings.Settings;
|
import fr.xephi.authme.settings.Settings;
|
||||||
import fr.xephi.authme.settings.SettingsWarner;
|
import fr.xephi.authme.settings.SettingsWarner;
|
||||||
|
import fr.xephi.authme.settings.properties.EmailSettings;
|
||||||
|
import fr.xephi.authme.settings.properties.HooksSettings;
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
import fr.xephi.authme.task.CleanupTask;
|
import fr.xephi.authme.task.CleanupTask;
|
||||||
import fr.xephi.authme.task.purge.PurgeService;
|
import fr.xephi.authme.task.purge.PurgeService;
|
||||||
@ -35,14 +43,21 @@ import fr.xephi.authme.util.ExceptionUtils;
|
|||||||
import org.bukkit.Server;
|
import org.bukkit.Server;
|
||||||
import org.bukkit.command.Command;
|
import org.bukkit.command.Command;
|
||||||
import org.bukkit.command.CommandSender;
|
import org.bukkit.command.CommandSender;
|
||||||
import org.bukkit.plugin.PluginDescriptionFile;
|
|
||||||
import org.bukkit.plugin.PluginManager;
|
import org.bukkit.plugin.PluginManager;
|
||||||
import org.bukkit.plugin.java.JavaPlugin;
|
import org.bukkit.plugin.java.JavaPlugin;
|
||||||
import org.bukkit.plugin.java.JavaPluginLoader;
|
|
||||||
import org.bukkit.scheduler.BukkitScheduler;
|
import org.bukkit.scheduler.BukkitScheduler;
|
||||||
|
import org.jetbrains.annotations.NotNull;
|
||||||
|
|
||||||
|
import javax.inject.Inject;
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.net.HttpURLConnection;
|
||||||
|
import java.net.URL;
|
||||||
|
import java.text.SimpleDateFormat;
|
||||||
|
import java.util.Date;
|
||||||
|
import java.util.Scanner;
|
||||||
import java.util.function.Consumer;
|
import java.util.function.Consumer;
|
||||||
|
import java.util.logging.Level;
|
||||||
|
|
||||||
import static fr.xephi.authme.service.BukkitService.TICKS_PER_MINUTE;
|
import static fr.xephi.authme.service.BukkitService.TICKS_PER_MINUTE;
|
||||||
import static fr.xephi.authme.util.Utils.isClassLoaded;
|
import static fr.xephi.authme.util.Utils.isClassLoaded;
|
||||||
@ -58,17 +73,19 @@ public class AuthMe extends JavaPlugin {
|
|||||||
private static final int CLEANUP_INTERVAL = 5 * TICKS_PER_MINUTE;
|
private static final int CLEANUP_INTERVAL = 5 * TICKS_PER_MINUTE;
|
||||||
|
|
||||||
// Version and build number values
|
// Version and build number values
|
||||||
private static String pluginVersion = "N/D";
|
private static String pluginVersion = "5.6.0-Fork";
|
||||||
private static String pluginBuildNumber = "Unknown";
|
private static final String pluginBuild = "b";
|
||||||
|
private static String pluginBuildNumber = "42";
|
||||||
// Private instances
|
// Private instances
|
||||||
|
private EmailService emailService;
|
||||||
private CommandHandler commandHandler;
|
private CommandHandler commandHandler;
|
||||||
private Settings settings;
|
@Inject
|
||||||
|
public static Settings settings;
|
||||||
private DataSource database;
|
private DataSource database;
|
||||||
private BukkitService bukkitService;
|
private BukkitService bukkitService;
|
||||||
private Injector injector;
|
private Injector injector;
|
||||||
private BackupService backupService;
|
private BackupService backupService;
|
||||||
private ConsoleLogger logger;
|
public static ConsoleLogger logger;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Constructor.
|
* Constructor.
|
||||||
@ -76,14 +93,16 @@ public class AuthMe extends JavaPlugin {
|
|||||||
public AuthMe() {
|
public AuthMe() {
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/**
|
||||||
* Constructor for unit testing.
|
* Get the plugin's build
|
||||||
|
*
|
||||||
|
* @return The plugin's build
|
||||||
*/
|
*/
|
||||||
@VisibleForTesting
|
public static String getPluginBuild() {
|
||||||
AuthMe(JavaPluginLoader loader, PluginDescriptionFile description, File dataFolder, File file) {
|
return pluginBuild;
|
||||||
super(loader, description, dataFolder, file);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get the plugin's name.
|
* Get the plugin's name.
|
||||||
*
|
*
|
||||||
@ -111,6 +130,8 @@ public class AuthMe extends JavaPlugin {
|
|||||||
return pluginBuildNumber;
|
return pluginBuildNumber;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Method called when the server enables the plugin.
|
* Method called when the server enables the plugin.
|
||||||
*/
|
*/
|
||||||
@ -122,6 +143,8 @@ public class AuthMe extends JavaPlugin {
|
|||||||
// Set the Logger instance and log file path
|
// Set the Logger instance and log file path
|
||||||
ConsoleLogger.initialize(getLogger(), new File(getDataFolder(), LOG_FILENAME));
|
ConsoleLogger.initialize(getLogger(), new File(getDataFolder(), LOG_FILENAME));
|
||||||
logger = ConsoleLoggerFactory.get(AuthMe.class);
|
logger = ConsoleLoggerFactory.get(AuthMe.class);
|
||||||
|
logger.info("You are running an unofficial fork version of AuthMe!");
|
||||||
|
|
||||||
|
|
||||||
// Check server version
|
// Check server version
|
||||||
if (!isClassLoaded("org.spigotmc.event.player.PlayerSpawnLocationEvent")
|
if (!isClassLoaded("org.spigotmc.event.player.PlayerSpawnLocationEvent")
|
||||||
@ -162,26 +185,42 @@ public class AuthMe extends JavaPlugin {
|
|||||||
// Schedule clean up task
|
// Schedule clean up task
|
||||||
CleanupTask cleanupTask = injector.getSingleton(CleanupTask.class);
|
CleanupTask cleanupTask = injector.getSingleton(CleanupTask.class);
|
||||||
cleanupTask.runTaskTimerAsynchronously(this, CLEANUP_INTERVAL, CLEANUP_INTERVAL);
|
cleanupTask.runTaskTimerAsynchronously(this, CLEANUP_INTERVAL, CLEANUP_INTERVAL);
|
||||||
|
|
||||||
// Do a backup on start
|
// Do a backup on start
|
||||||
backupService.doBackup(BackupService.BackupCause.START);
|
backupService.doBackup(BackupService.BackupCause.START);
|
||||||
|
|
||||||
// Set up Metrics
|
// Set up Metrics
|
||||||
OnStartupTasks.sendMetrics(this, settings);
|
OnStartupTasks.sendMetrics(this, settings);
|
||||||
|
if (settings.getProperty(SecuritySettings.SHOW_STARTUP_BANNER)) {
|
||||||
|
logger.info("\n" + " ___ __ __ __ ___ \n" +
|
||||||
|
" / | __ __/ /_/ /_ / |/ /__ \n" +
|
||||||
|
" / /| |/ / / / __/ __ \\/ /|_/ / _ \\\n" +
|
||||||
|
" / ___ / /_/ / /_/ / / / / / / __/\n" +
|
||||||
|
"/_/ |_\\__,_/\\__/_/ /_/_/ /_/\\___/ \n" +
|
||||||
|
" ");
|
||||||
|
}
|
||||||
// Successful message
|
// Successful message
|
||||||
logger.info("AuthMe " + getPluginVersion() + " build n." + getPluginBuildNumber() + " successfully enabled!");
|
//detect server brand with classloader
|
||||||
|
checkServerType();
|
||||||
|
logger.info("AuthMeReReloaded is enabled successfully!");
|
||||||
// Purge on start if enabled
|
// Purge on start if enabled
|
||||||
PurgeService purgeService = injector.getSingleton(PurgeService.class);
|
PurgeService purgeService = injector.getSingleton(PurgeService.class);
|
||||||
purgeService.runAutoPurge();
|
purgeService.runAutoPurge();
|
||||||
|
// 注册玩家加入事件监听
|
||||||
|
// register3rdPartyListeners();
|
||||||
|
logger.info("GitHub: https://github.com/HaHaWTH/AuthMeReReloaded/");
|
||||||
|
if (settings.getProperty(SecuritySettings.CHECK_FOR_UPDATES)) {
|
||||||
|
checkForUpdates();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
//Migrated
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Load the version and build number of the plugin from the description file.
|
* Load the version and build number of the plugin from the description file.
|
||||||
*
|
*
|
||||||
* @param versionRaw the version as given by the plugin description file
|
* @param versionRaw the version as given by the plugin description file
|
||||||
*/
|
*/
|
||||||
|
|
||||||
private static void loadPluginInfo(String versionRaw) {
|
private static void loadPluginInfo(String versionRaw) {
|
||||||
int index = versionRaw.lastIndexOf("-");
|
int index = versionRaw.lastIndexOf("-");
|
||||||
if (index != -1) {
|
if (index != -1) {
|
||||||
@ -245,6 +284,7 @@ public class AuthMe extends JavaPlugin {
|
|||||||
database = injector.getSingleton(DataSource.class);
|
database = injector.getSingleton(DataSource.class);
|
||||||
bukkitService = injector.getSingleton(BukkitService.class);
|
bukkitService = injector.getSingleton(BukkitService.class);
|
||||||
commandHandler = injector.getSingleton(CommandHandler.class);
|
commandHandler = injector.getSingleton(CommandHandler.class);
|
||||||
|
emailService = injector.getSingleton(EmailService.class);
|
||||||
backupService = injector.getSingleton(BackupService.class);
|
backupService = injector.getSingleton(BackupService.class);
|
||||||
|
|
||||||
// Trigger instantiation (class not used elsewhere)
|
// Trigger instantiation (class not used elsewhere)
|
||||||
@ -269,10 +309,17 @@ public class AuthMe extends JavaPlugin {
|
|||||||
pluginManager.registerEvents(injector.getSingleton(EntityListener.class), this);
|
pluginManager.registerEvents(injector.getSingleton(EntityListener.class), this);
|
||||||
pluginManager.registerEvents(injector.getSingleton(ServerListener.class), this);
|
pluginManager.registerEvents(injector.getSingleton(ServerListener.class), this);
|
||||||
|
|
||||||
// Try to register 1.9 player listeners
|
|
||||||
if (isClassLoaded("org.bukkit.event.player.PlayerSwapHandItemsEvent")) {
|
// Try to register 1.8+ player listeners
|
||||||
|
if (isClassLoaded("org.bukkit.event.entity.EntityPickupItemEvent") && isClassLoaded("org.bukkit.event.player.PlayerSwapHandItemsEvent")) {
|
||||||
|
pluginManager.registerEvents(injector.getSingleton(PlayerListenerHigherThan18.class), this);
|
||||||
|
} else if (isClassLoaded("org.bukkit.event.player.PlayerSwapHandItemsEvent")) {
|
||||||
pluginManager.registerEvents(injector.getSingleton(PlayerListener19.class), this);
|
pluginManager.registerEvents(injector.getSingleton(PlayerListener19.class), this);
|
||||||
}
|
}
|
||||||
|
// Try to register 1.9 player listeners(Moved to else-if)
|
||||||
|
// if (isClassLoaded("org.bukkit.event.player.PlayerSwapHandItemsEvent")) {
|
||||||
|
// pluginManager.registerEvents(injector.getSingleton(PlayerListener19.class), this);
|
||||||
|
// }
|
||||||
|
|
||||||
// Try to register 1.9 spigot player listeners
|
// Try to register 1.9 spigot player listeners
|
||||||
if (isClassLoaded("org.spigotmc.event.player.PlayerSpawnLocationEvent")) {
|
if (isClassLoaded("org.spigotmc.event.player.PlayerSpawnLocationEvent")) {
|
||||||
@ -283,6 +330,31 @@ public class AuthMe extends JavaPlugin {
|
|||||||
if (isClassLoaded("org.bukkit.event.entity.EntityAirChangeEvent")) {
|
if (isClassLoaded("org.bukkit.event.entity.EntityAirChangeEvent")) {
|
||||||
pluginManager.registerEvents(injector.getSingleton(PlayerListener111.class), this);
|
pluginManager.registerEvents(injector.getSingleton(PlayerListener111.class), this);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//Register 3rd party listeners
|
||||||
|
if (settings.getProperty(SecuritySettings.GUI_CAPTCHA) && getServer().getPluginManager().getPlugin("ProtocolLib") != null) {
|
||||||
|
pluginManager.registerEvents(injector.getSingleton(GuiCaptchaHandler.class), this);
|
||||||
|
logger.info("(Beta)GUICaptcha is enabled successfully!");
|
||||||
|
logger.info("These features are still in early development, if you encountered any problem, please report.");
|
||||||
|
} else if (settings.getProperty(SecuritySettings.GUI_CAPTCHA) && getServer().getPluginManager().getPlugin("ProtocolLib") == null) {
|
||||||
|
logger.warning("ProtocolLib is not loaded, can't enable GUI Captcha.");
|
||||||
|
}
|
||||||
|
if (settings.getProperty(SecuritySettings.FORCE_LOGIN_BEDROCK) && settings.getProperty(HooksSettings.HOOK_FLOODGATE_PLAYER) && getServer().getPluginManager().getPlugin("floodgate") != null) {
|
||||||
|
pluginManager.registerEvents(injector.getSingleton(BedrockAutoLoginListener.class), this);
|
||||||
|
} else if (settings.getProperty(SecuritySettings.FORCE_LOGIN_BEDROCK) && (!settings.getProperty(HooksSettings.HOOK_FLOODGATE_PLAYER) || getServer().getPluginManager().getPlugin("floodgate") == null)) {
|
||||||
|
logger.warning("Failed to enable BedrockAutoLogin, ensure hookFloodgate: true and floodgate is loaded.");
|
||||||
|
}
|
||||||
|
if (settings.getProperty(SecuritySettings.LOGIN_LOC_FIX_SUB_UNDERGROUND) || settings.getProperty(SecuritySettings.LOGIN_LOC_FIX_SUB_PORTAL)) {
|
||||||
|
pluginManager.registerEvents(injector.getSingleton(LoginLocationFixListener.class), this);
|
||||||
|
}
|
||||||
|
if (settings.getProperty(SecuritySettings.ANTI_GHOST_PLAYERS)) {
|
||||||
|
pluginManager.registerEvents(injector.getSingleton(DoubleLoginFixListener.class), this);
|
||||||
|
}
|
||||||
|
if (settings.getProperty(SecuritySettings.ADVANCED_SHULKER_FIX) && !isClassLoaded("org.bukkit.event.player.PlayerCommandSendEvent")) {
|
||||||
|
pluginManager.registerEvents(injector.getSingleton(AdvancedShulkerFixListener.class), this);
|
||||||
|
} else if (settings.getProperty(SecuritySettings.ADVANCED_SHULKER_FIX) && isClassLoaded("org.bukkit.event.player.PlayerCommandSendEvent")) {
|
||||||
|
logger.warning("You are running an 1.13+ minecraft server, advancedShulkerFix won't enable.");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -307,6 +379,11 @@ public class AuthMe extends JavaPlugin {
|
|||||||
if (onShutdownPlayerSaver != null) {
|
if (onShutdownPlayerSaver != null) {
|
||||||
onShutdownPlayerSaver.saveAllPlayers();
|
onShutdownPlayerSaver.saveAllPlayers();
|
||||||
}
|
}
|
||||||
|
if (settings.getProperty(EmailSettings.SHUTDOWN_MAIL)){
|
||||||
|
SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'.'MM'.'dd'.' HH:mm:ss");
|
||||||
|
Date date = new Date(System.currentTimeMillis());
|
||||||
|
emailService.sendShutDown(settings.getProperty(EmailSettings.SHUTDOWN_MAIL_ADDRESS),dateFormat.format(date));
|
||||||
|
}
|
||||||
|
|
||||||
// Do backup on stop if enabled
|
// Do backup on stop if enabled
|
||||||
if (backupService != null) {
|
if (backupService != null) {
|
||||||
@ -318,10 +395,76 @@ public class AuthMe extends JavaPlugin {
|
|||||||
|
|
||||||
// Disabled correctly
|
// Disabled correctly
|
||||||
Consumer<String> infoLogMethod = logger == null ? getLogger()::info : logger::info;
|
Consumer<String> infoLogMethod = logger == null ? getLogger()::info : logger::info;
|
||||||
infoLogMethod.accept("AuthMe " + this.getDescription().getVersion() + " disabled!");
|
infoLogMethod.accept("AuthMe " + this.getDescription().getVersion() + " is unloaded successfully!");
|
||||||
ConsoleLogger.closeFileWriter();
|
ConsoleLogger.closeFileWriter();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private static final String owner = "HaHaWTH";
|
||||||
|
// private static final String owner_gitee = "Shixuehan114514";
|
||||||
|
private static final String repo = "AuthMeReReloaded";
|
||||||
|
|
||||||
|
private void checkForUpdates() {
|
||||||
|
logger.info("Checking for updates...");
|
||||||
|
bukkitService.runTaskAsynchronously(() -> {
|
||||||
|
try {
|
||||||
|
// 从南通集线器获取最新版本号
|
||||||
|
URL url = new URL("https://api.github.com/repos/" + owner + "/" + repo + "/releases/latest");
|
||||||
|
HttpURLConnection conn = (HttpURLConnection) url.openConnection();
|
||||||
|
conn.setConnectTimeout(10000); // 设置连接超时为10秒
|
||||||
|
conn.setReadTimeout(10000); // 设置读取超时为10秒
|
||||||
|
Scanner scanner = new Scanner(conn.getInputStream());
|
||||||
|
String response = scanner.useDelimiter("\\Z").next();
|
||||||
|
scanner.close();
|
||||||
|
|
||||||
|
// 处理JSON响应
|
||||||
|
String latestVersion = response.substring(response.indexOf("tag_name") + 11);
|
||||||
|
latestVersion = latestVersion.substring(0, latestVersion.indexOf("\""));
|
||||||
|
if (isUpdateAvailable(latestVersion)) {
|
||||||
|
String message = "New version available! Latest:" + latestVersion + " Current:" + pluginBuild + pluginBuildNumber;
|
||||||
|
getLogger().log(Level.WARNING, message);
|
||||||
|
getLogger().log(Level.WARNING, "Download from here: https://github.com/HaHaWTH/AuthMeReReloaded/releases/latest");
|
||||||
|
} else {
|
||||||
|
getLogger().log(Level.INFO, "You are running the latest version.");
|
||||||
|
}
|
||||||
|
} catch (IOException ignored) {
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
private boolean isUpdateAvailable(String latestVersion) {
|
||||||
|
// Extract the first character and the remaining digits from the version string
|
||||||
|
char latestChar = latestVersion.charAt(0);
|
||||||
|
int latestNumber = Integer.parseInt(latestVersion.substring(1));
|
||||||
|
|
||||||
|
char currentChar = pluginBuild.charAt(0);
|
||||||
|
int currentNumber = Integer.parseInt(pluginBuildNumber);
|
||||||
|
|
||||||
|
// Compare the characters first
|
||||||
|
if (latestChar > currentChar) {
|
||||||
|
return true;
|
||||||
|
} else if (latestChar < currentChar) {
|
||||||
|
return false;
|
||||||
|
} else {
|
||||||
|
// If the characters are the same, compare the numbers
|
||||||
|
return latestNumber > currentNumber;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
private void checkServerType() {
|
||||||
|
if (isClassLoaded("com.destroystokyo.paper.PaperConfig")) {
|
||||||
|
logger.info("AuthMeReReloaded is running on Paper");
|
||||||
|
} else if (isClassLoaded("catserver.server.CatServerConfig")) {
|
||||||
|
logger.info("AuthMeReReloaded is running on CatServer");
|
||||||
|
} else if (isClassLoaded("org.spigotmc.SpigotConfig")) {
|
||||||
|
logger.info("AuthMeReReloaded is running on Spigot");
|
||||||
|
} else if (isClassLoaded("org.bukkit.craftbukkit.CraftServer")) {
|
||||||
|
logger.info("AuthMeReReloaded is running on Bukkit");
|
||||||
|
} else {
|
||||||
|
logger.info("AuthMeReReloaded is running on Unknown*");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Handle Bukkit commands.
|
* Handle Bukkit commands.
|
||||||
*
|
*
|
||||||
@ -332,8 +475,8 @@ public class AuthMe extends JavaPlugin {
|
|||||||
* @return True if the command was executed, false otherwise.
|
* @return True if the command was executed, false otherwise.
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
public boolean onCommand(CommandSender sender, Command cmd,
|
public boolean onCommand(@NotNull CommandSender sender, @NotNull Command cmd,
|
||||||
String commandLabel, String[] args) {
|
@NotNull String commandLabel, String[] args) {
|
||||||
// Make sure the command handler has been initialized
|
// Make sure the command handler has been initialized
|
||||||
if (commandHandler == null) {
|
if (commandHandler == null) {
|
||||||
getLogger().severe("AuthMe command handler is not available");
|
getLogger().severe("AuthMe command handler is not available");
|
||||||
|
|||||||
@ -142,7 +142,7 @@ public final class ConsoleLogger {
|
|||||||
public void fine(String message) {
|
public void fine(String message) {
|
||||||
if (logLevel.includes(LogLevel.FINE)) {
|
if (logLevel.includes(LogLevel.FINE)) {
|
||||||
logger.info(message);
|
logger.info(message);
|
||||||
writeLog("[FINE] " + message);
|
writeLog("[INFO:FINE] " + message);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -215,7 +215,7 @@ public final class ConsoleLogger {
|
|||||||
}
|
}
|
||||||
|
|
||||||
private void logAndWriteWithDebugPrefix(String message) {
|
private void logAndWriteWithDebugPrefix(String message) {
|
||||||
String debugMessage = "[DEBUG] " + message;
|
String debugMessage = "[INFO:DEBUG] " + message;
|
||||||
logger.info(debugMessage);
|
logger.info(debugMessage);
|
||||||
writeLog(debugMessage);
|
writeLog(debugMessage);
|
||||||
}
|
}
|
||||||
|
|||||||
@ -11,11 +11,12 @@ import fr.xephi.authme.datasource.converter.LoginSecurityConverter;
|
|||||||
import fr.xephi.authme.datasource.converter.MySqlToSqlite;
|
import fr.xephi.authme.datasource.converter.MySqlToSqlite;
|
||||||
import fr.xephi.authme.datasource.converter.RakamakConverter;
|
import fr.xephi.authme.datasource.converter.RakamakConverter;
|
||||||
import fr.xephi.authme.datasource.converter.RoyalAuthConverter;
|
import fr.xephi.authme.datasource.converter.RoyalAuthConverter;
|
||||||
|
import fr.xephi.authme.datasource.converter.SqliteToH2;
|
||||||
import fr.xephi.authme.datasource.converter.SqliteToSql;
|
import fr.xephi.authme.datasource.converter.SqliteToSql;
|
||||||
import fr.xephi.authme.datasource.converter.VAuthConverter;
|
import fr.xephi.authme.datasource.converter.VAuthConverter;
|
||||||
import fr.xephi.authme.datasource.converter.XAuthConverter;
|
import fr.xephi.authme.datasource.converter.XAuthConverter;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.service.BukkitService;
|
import fr.xephi.authme.service.BukkitService;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
import org.bukkit.command.CommandSender;
|
import org.bukkit.command.CommandSender;
|
||||||
@ -89,6 +90,7 @@ public class ConverterCommand implements ExecutableCommand {
|
|||||||
.put("vauth", VAuthConverter.class)
|
.put("vauth", VAuthConverter.class)
|
||||||
.put("sqlitetosql", SqliteToSql.class)
|
.put("sqlitetosql", SqliteToSql.class)
|
||||||
.put("mysqltosqlite", MySqlToSqlite.class)
|
.put("mysqltosqlite", MySqlToSqlite.class)
|
||||||
|
.put("sqlitetoh2", SqliteToH2.class)
|
||||||
.put("loginsecurity", LoginSecurityConverter.class)
|
.put("loginsecurity", LoginSecurityConverter.class)
|
||||||
.build();
|
.build();
|
||||||
}
|
}
|
||||||
|
|||||||
@ -1,7 +1,10 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
package fr.xephi.authme.command.executable.authme;
|
||||||
|
|
||||||
import fr.xephi.authme.command.PlayerCommand;
|
import fr.xephi.authme.command.PlayerCommand;
|
||||||
|
import fr.xephi.authme.settings.Settings;
|
||||||
import fr.xephi.authme.settings.SpawnLoader;
|
import fr.xephi.authme.settings.SpawnLoader;
|
||||||
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
|
import fr.xephi.authme.util.TeleportUtils;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
@ -11,16 +14,22 @@ import java.util.List;
|
|||||||
* Teleports the player to the first spawn.
|
* Teleports the player to the first spawn.
|
||||||
*/
|
*/
|
||||||
public class FirstSpawnCommand extends PlayerCommand {
|
public class FirstSpawnCommand extends PlayerCommand {
|
||||||
|
@Inject
|
||||||
|
private Settings settings;
|
||||||
@Inject
|
@Inject
|
||||||
private SpawnLoader spawnLoader;
|
private SpawnLoader spawnLoader;
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void runCommand(Player player, List<String> arguments) {
|
public void runCommand(Player player, List<String> arguments) {
|
||||||
if (spawnLoader.getFirstSpawn() == null) {
|
if (spawnLoader.getFirstSpawn() == null) {
|
||||||
player.sendMessage("[AuthMe] First spawn has failed, please try to define the first spawn");
|
player.sendMessage("[AuthMe] First spawn has failed, please try to define the first spawn");
|
||||||
} else {
|
} else {
|
||||||
player.teleport(spawnLoader.getFirstSpawn());
|
//String name= player.getName();
|
||||||
|
if(settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
|
||||||
|
TeleportUtils.teleport(player, spawnLoader.getFirstSpawn());
|
||||||
|
} else {
|
||||||
|
player.teleport(spawnLoader.getFirstSpawn());
|
||||||
|
}
|
||||||
|
//player.teleport(spawnLoader.getFirstSpawn());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -4,8 +4,8 @@ import fr.xephi.authme.ConsoleLogger;
|
|||||||
import fr.xephi.authme.command.ExecutableCommand;
|
import fr.xephi.authme.command.ExecutableCommand;
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
import fr.xephi.authme.data.auth.PlayerAuth;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.security.PasswordSecurity;
|
import fr.xephi.authme.security.PasswordSecurity;
|
||||||
import fr.xephi.authme.security.crypts.HashedPassword;
|
import fr.xephi.authme.security.crypts.HashedPassword;
|
||||||
import fr.xephi.authme.service.BukkitService;
|
import fr.xephi.authme.service.BukkitService;
|
||||||
|
|||||||
@ -7,8 +7,8 @@ import fr.xephi.authme.command.ExecutableCommand;
|
|||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.initialization.Reloadable;
|
import fr.xephi.authme.initialization.Reloadable;
|
||||||
import fr.xephi.authme.initialization.SettingsDependent;
|
import fr.xephi.authme.initialization.SettingsDependent;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
import fr.xephi.authme.settings.Settings;
|
import fr.xephi.authme.settings.Settings;
|
||||||
import fr.xephi.authme.settings.SettingsWarner;
|
import fr.xephi.authme.settings.SettingsWarner;
|
||||||
|
|||||||
@ -3,6 +3,8 @@ package fr.xephi.authme.command.executable.authme;
|
|||||||
import fr.xephi.authme.AuthMe;
|
import fr.xephi.authme.AuthMe;
|
||||||
import fr.xephi.authme.command.ExecutableCommand;
|
import fr.xephi.authme.command.ExecutableCommand;
|
||||||
import fr.xephi.authme.service.BukkitService;
|
import fr.xephi.authme.service.BukkitService;
|
||||||
|
import fr.xephi.authme.settings.Settings;
|
||||||
|
import fr.xephi.authme.settings.properties.DatabaseSettings;
|
||||||
import org.bukkit.ChatColor;
|
import org.bukkit.ChatColor;
|
||||||
import org.bukkit.command.CommandSender;
|
import org.bukkit.command.CommandSender;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
@ -17,6 +19,8 @@ public class VersionCommand implements ExecutableCommand {
|
|||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
private BukkitService bukkitService;
|
private BukkitService bukkitService;
|
||||||
|
@Inject
|
||||||
|
private Settings settings;
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void executeCommand(CommandSender sender, List<String> arguments) {
|
public void executeCommand(CommandSender sender, List<String> arguments) {
|
||||||
@ -24,6 +28,7 @@ public class VersionCommand implements ExecutableCommand {
|
|||||||
sender.sendMessage(ChatColor.GOLD + "==========[ " + AuthMe.getPluginName() + " ABOUT ]==========");
|
sender.sendMessage(ChatColor.GOLD + "==========[ " + AuthMe.getPluginName() + " ABOUT ]==========");
|
||||||
sender.sendMessage(ChatColor.GOLD + "Version: " + ChatColor.WHITE + AuthMe.getPluginName()
|
sender.sendMessage(ChatColor.GOLD + "Version: " + ChatColor.WHITE + AuthMe.getPluginName()
|
||||||
+ " v" + AuthMe.getPluginVersion() + ChatColor.GRAY + " (build: " + AuthMe.getPluginBuildNumber() + ")");
|
+ " v" + AuthMe.getPluginVersion() + ChatColor.GRAY + " (build: " + AuthMe.getPluginBuildNumber() + ")");
|
||||||
|
sender.sendMessage(ChatColor.GOLD + "Database Implementation: " + ChatColor.WHITE + settings.getProperty(DatabaseSettings.BACKEND).toString());
|
||||||
sender.sendMessage(ChatColor.GOLD + "Authors:");
|
sender.sendMessage(ChatColor.GOLD + "Authors:");
|
||||||
Collection<Player> onlinePlayers = bukkitService.getOnlinePlayers();
|
Collection<Player> onlinePlayers = bukkitService.getOnlinePlayers();
|
||||||
printDeveloper(sender, "Gabriele C.", "sgdc3", "Project manager, Contributor", onlinePlayers);
|
printDeveloper(sender, "Gabriele C.", "sgdc3", "Project manager, Contributor", onlinePlayers);
|
||||||
|
|||||||
@ -3,8 +3,8 @@ package fr.xephi.authme.command.executable.authme.debug;
|
|||||||
import ch.jalu.datasourcecolumns.data.DataSourceValue;
|
import ch.jalu.datasourcecolumns.data.DataSourceValue;
|
||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.mail.SendMailSsl;
|
import fr.xephi.authme.mail.SendMailSsl;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.permission.DebugSectionPermissions;
|
import fr.xephi.authme.permission.DebugSectionPermissions;
|
||||||
import fr.xephi.authme.permission.PermissionNode;
|
import fr.xephi.authme.permission.PermissionNode;
|
||||||
import fr.xephi.authme.util.StringUtils;
|
import fr.xephi.authme.util.StringUtils;
|
||||||
|
|||||||
@ -42,7 +42,6 @@ public class ChangePasswordCommand extends PlayerCommand {
|
|||||||
commonService.send(player, MessageKey.NOT_LOGGED_IN);
|
commonService.send(player, MessageKey.NOT_LOGGED_IN);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if the user has been verified or not
|
// Check if the user has been verified or not
|
||||||
if (codeManager.isVerificationRequired(player)) {
|
if (codeManager.isVerificationRequired(player)) {
|
||||||
codeManager.codeExistOrGenerateNew(name);
|
codeManager.codeExistOrGenerateNew(name);
|
||||||
|
|||||||
@ -3,8 +3,8 @@ package fr.xephi.authme.command.executable.email;
|
|||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.command.PlayerCommand;
|
import fr.xephi.authme.command.PlayerCommand;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.security.PasswordSecurity;
|
import fr.xephi.authme.security.PasswordSecurity;
|
||||||
import fr.xephi.authme.security.crypts.HashedPassword;
|
import fr.xephi.authme.security.crypts.HashedPassword;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
|
|||||||
@ -5,9 +5,9 @@ import fr.xephi.authme.ConsoleLogger;
|
|||||||
import fr.xephi.authme.command.PlayerCommand;
|
import fr.xephi.authme.command.PlayerCommand;
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
import fr.xephi.authme.data.auth.PlayerCache;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.mail.EmailService;
|
import fr.xephi.authme.mail.EmailService;
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.service.BukkitService;
|
import fr.xephi.authme.service.BukkitService;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
import fr.xephi.authme.service.PasswordRecoveryService;
|
import fr.xephi.authme.service.PasswordRecoveryService;
|
||||||
|
|||||||
@ -3,9 +3,10 @@ package fr.xephi.authme.command.executable.register;
|
|||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.command.PlayerCommand;
|
import fr.xephi.authme.command.PlayerCommand;
|
||||||
import fr.xephi.authme.data.captcha.RegistrationCaptchaManager;
|
import fr.xephi.authme.data.captcha.RegistrationCaptchaManager;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.mail.EmailService;
|
import fr.xephi.authme.mail.EmailService;
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.process.Management;
|
import fr.xephi.authme.process.Management;
|
||||||
import fr.xephi.authme.process.register.RegisterSecondaryArgument;
|
import fr.xephi.authme.process.register.RegisterSecondaryArgument;
|
||||||
import fr.xephi.authme.process.register.RegistrationType;
|
import fr.xephi.authme.process.register.RegistrationType;
|
||||||
@ -23,6 +24,8 @@ import org.bukkit.entity.Player;
|
|||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
import java.util.Timer;
|
||||||
|
import java.util.TimerTask;
|
||||||
|
|
||||||
import static fr.xephi.authme.process.register.RegisterSecondaryArgument.CONFIRMATION;
|
import static fr.xephi.authme.process.register.RegisterSecondaryArgument.CONFIRMATION;
|
||||||
import static fr.xephi.authme.process.register.RegisterSecondaryArgument.EMAIL_MANDATORY;
|
import static fr.xephi.authme.process.register.RegisterSecondaryArgument.EMAIL_MANDATORY;
|
||||||
@ -43,6 +46,9 @@ public class RegisterCommand extends PlayerCommand {
|
|||||||
@Inject
|
@Inject
|
||||||
private CommonService commonService;
|
private CommonService commonService;
|
||||||
|
|
||||||
|
@Inject
|
||||||
|
private DataSource dataSource;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
private EmailService emailService;
|
private EmailService emailService;
|
||||||
|
|
||||||
@ -169,6 +175,20 @@ public class RegisterCommand extends PlayerCommand {
|
|||||||
} else if (isSecondArgValidForEmailRegistration(player, arguments)) {
|
} else if (isSecondArgValidForEmailRegistration(player, arguments)) {
|
||||||
management.performRegister(RegistrationMethod.EMAIL_REGISTRATION,
|
management.performRegister(RegistrationMethod.EMAIL_REGISTRATION,
|
||||||
EmailRegisterParams.of(player, email));
|
EmailRegisterParams.of(player, email));
|
||||||
|
Timer timer = new Timer();
|
||||||
|
timer.schedule(new TimerTask() {
|
||||||
|
@Override
|
||||||
|
public void run() {
|
||||||
|
if (dataSource.getAuth(player.getName()) != null) {
|
||||||
|
if (dataSource.getAuth(player.getName()).getLastLogin() == null) {
|
||||||
|
management.performUnregisterByAdmin(null, player.getName(), player);
|
||||||
|
timer.cancel();
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
timer.cancel();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}, 600000);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -5,9 +5,9 @@ import fr.xephi.authme.command.PlayerCommand;
|
|||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
import fr.xephi.authme.data.auth.PlayerAuth;
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
import fr.xephi.authme.data.auth.PlayerCache;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
import fr.xephi.authme.message.Messages;
|
import fr.xephi.authme.message.Messages;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.security.totp.GenerateTotpService;
|
import fr.xephi.authme.security.totp.GenerateTotpService;
|
||||||
import fr.xephi.authme.security.totp.TotpAuthenticator.TotpGenerationResult;
|
import fr.xephi.authme.security.totp.TotpAuthenticator.TotpGenerationResult;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|||||||
@ -5,9 +5,9 @@ import fr.xephi.authme.command.PlayerCommand;
|
|||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
import fr.xephi.authme.data.auth.PlayerAuth;
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
import fr.xephi.authme.data.auth.PlayerCache;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
import fr.xephi.authme.message.Messages;
|
import fr.xephi.authme.message.Messages;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.security.totp.TotpAuthenticator;
|
import fr.xephi.authme.security.totp.TotpAuthenticator;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|
||||||
|
|||||||
@ -8,9 +8,9 @@ import fr.xephi.authme.data.limbo.LimboPlayer;
|
|||||||
import fr.xephi.authme.data.limbo.LimboPlayerState;
|
import fr.xephi.authme.data.limbo.LimboPlayerState;
|
||||||
import fr.xephi.authme.data.limbo.LimboService;
|
import fr.xephi.authme.data.limbo.LimboService;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
import fr.xephi.authme.message.Messages;
|
import fr.xephi.authme.message.Messages;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.process.login.AsynchronousLogin;
|
import fr.xephi.authme.process.login.AsynchronousLogin;
|
||||||
import fr.xephi.authme.security.totp.TotpAuthenticator;
|
import fr.xephi.authme.security.totp.TotpAuthenticator;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|||||||
@ -3,8 +3,8 @@ package fr.xephi.authme.command.executable.verification;
|
|||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.command.PlayerCommand;
|
import fr.xephi.authme.command.PlayerCommand;
|
||||||
import fr.xephi.authme.data.VerificationCodeManager;
|
import fr.xephi.authme.data.VerificationCodeManager;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|
||||||
|
|||||||
@ -15,6 +15,8 @@ import fr.xephi.authme.util.expiring.ExpiringMap;
|
|||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
|
import java.text.SimpleDateFormat;
|
||||||
|
import java.util.Date;
|
||||||
import java.util.HashSet;
|
import java.util.HashSet;
|
||||||
import java.util.Locale;
|
import java.util.Locale;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
@ -132,12 +134,14 @@ public class VerificationCodeManager implements SettingsDependent, HasCleanup {
|
|||||||
*/
|
*/
|
||||||
private void generateCode(String name) {
|
private void generateCode(String name) {
|
||||||
DataSourceValue<String> emailResult = dataSource.getEmail(name);
|
DataSourceValue<String> emailResult = dataSource.getEmail(name);
|
||||||
|
SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
|
||||||
|
Date date = new Date(System.currentTimeMillis());
|
||||||
if (emailResult.rowExists()) {
|
if (emailResult.rowExists()) {
|
||||||
final String email = emailResult.getValue();
|
final String email = emailResult.getValue();
|
||||||
if (!Utils.isEmailEmpty(email)) {
|
if (!Utils.isEmailEmpty(email)) {
|
||||||
String code = RandomStringUtils.generateNum(6); // 6 digits code
|
String code = RandomStringUtils.generateNum(6); // 6 digits code
|
||||||
verificationCodes.put(name.toLowerCase(Locale.ROOT), code);
|
verificationCodes.put(name.toLowerCase(Locale.ROOT), code);
|
||||||
emailService.sendVerificationMail(name, email, code);
|
emailService.sendVerificationMail(name, email, code, dateFormat.format(date));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -4,6 +4,7 @@ package fr.xephi.authme.datasource;
|
|||||||
* DataSource type.
|
* DataSource type.
|
||||||
*/
|
*/
|
||||||
public enum DataSourceType {
|
public enum DataSourceType {
|
||||||
|
H2,
|
||||||
|
|
||||||
MYSQL,
|
MYSQL,
|
||||||
|
|
||||||
|
|||||||
422
src/main/java/fr/xephi/authme/datasource/H2.java
Normal file
422
src/main/java/fr/xephi/authme/datasource/H2.java
Normal file
@ -0,0 +1,422 @@
|
|||||||
|
package fr.xephi.authme.datasource;
|
||||||
|
|
||||||
|
import com.google.common.annotations.VisibleForTesting;
|
||||||
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
|
import fr.xephi.authme.data.auth.PlayerAuth;
|
||||||
|
import fr.xephi.authme.datasource.columnshandler.AuthMeColumnsHandler;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
|
import fr.xephi.authme.settings.Settings;
|
||||||
|
import fr.xephi.authme.settings.properties.DatabaseSettings;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
|
import java.sql.Connection;
|
||||||
|
import java.sql.DatabaseMetaData;
|
||||||
|
import java.sql.DriverManager;
|
||||||
|
import java.sql.PreparedStatement;
|
||||||
|
import java.sql.ResultSet;
|
||||||
|
import java.sql.SQLException;
|
||||||
|
import java.sql.Statement;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Collection;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Locale;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
|
import static fr.xephi.authme.datasource.SqlDataSourceUtils.getNullableLong;
|
||||||
|
import static fr.xephi.authme.datasource.SqlDataSourceUtils.logSqlException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* H2 data source.
|
||||||
|
*/
|
||||||
|
@SuppressWarnings({"checkstyle:AbbreviationAsWordInName"}) // Justification: Class name cannot be changed anymore
|
||||||
|
public class H2 extends AbstractSqlDataSource {
|
||||||
|
|
||||||
|
private final ConsoleLogger logger = ConsoleLoggerFactory.get(H2.class);
|
||||||
|
private final Settings settings;
|
||||||
|
private final File dataFolder;
|
||||||
|
private final String database;
|
||||||
|
private final String tableName;
|
||||||
|
private final Columns col;
|
||||||
|
private Connection con;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Constructor for H2.
|
||||||
|
*
|
||||||
|
* @param settings The settings instance
|
||||||
|
* @param dataFolder The data folder
|
||||||
|
* @throws SQLException when initialization of a SQL datasource failed
|
||||||
|
*/
|
||||||
|
public H2(Settings settings, File dataFolder) throws SQLException {
|
||||||
|
this.settings = settings;
|
||||||
|
this.dataFolder = dataFolder;
|
||||||
|
this.database = settings.getProperty(DatabaseSettings.MYSQL_DATABASE);
|
||||||
|
this.tableName = settings.getProperty(DatabaseSettings.MYSQL_TABLE);
|
||||||
|
this.col = new Columns(settings);
|
||||||
|
|
||||||
|
try {
|
||||||
|
this.connect();
|
||||||
|
this.setup();
|
||||||
|
} catch (Exception ex) {
|
||||||
|
logger.logException("Error during H2 initialization:", ex);
|
||||||
|
throw ex;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@VisibleForTesting
|
||||||
|
H2(Settings settings, File dataFolder, Connection connection) {
|
||||||
|
this.settings = settings;
|
||||||
|
this.dataFolder = dataFolder;
|
||||||
|
this.database = settings.getProperty(DatabaseSettings.MYSQL_DATABASE);
|
||||||
|
this.tableName = settings.getProperty(DatabaseSettings.MYSQL_TABLE);
|
||||||
|
this.col = new Columns(settings);
|
||||||
|
this.con = connection;
|
||||||
|
this.columnsHandler = AuthMeColumnsHandler.createForH2(con, settings);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Initializes the connection to the H2 database.
|
||||||
|
*
|
||||||
|
* @throws SQLException when an SQL error occurs while connecting
|
||||||
|
*/
|
||||||
|
protected void connect() throws SQLException {
|
||||||
|
try {
|
||||||
|
Class.forName("org.h2.Driver");
|
||||||
|
} catch (ClassNotFoundException e) {
|
||||||
|
throw new IllegalStateException("Failed to load H2 JDBC class", e);
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.debug("H2 driver loaded");
|
||||||
|
this.con = DriverManager.getConnection(this.getJdbcUrl(this.dataFolder.getAbsolutePath(), "", this.database));
|
||||||
|
this.columnsHandler = AuthMeColumnsHandler.createForSqlite(con, settings);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates the table if necessary, or adds any missing columns to the table.
|
||||||
|
*
|
||||||
|
* @throws SQLException when an SQL error occurs while initializing the database
|
||||||
|
*/
|
||||||
|
@VisibleForTesting
|
||||||
|
@SuppressWarnings("checkstyle:CyclomaticComplexity")
|
||||||
|
protected void setup() throws SQLException {
|
||||||
|
try (Statement st = con.createStatement()) {
|
||||||
|
// Note: cannot add unique fields later on in SQLite, so we add it on initialization
|
||||||
|
st.executeUpdate("CREATE TABLE IF NOT EXISTS " + tableName + " ("
|
||||||
|
+ col.ID + " INTEGER AUTO_INCREMENT, "
|
||||||
|
+ col.NAME + " VARCHAR(255) NOT NULL UNIQUE, "
|
||||||
|
+ "CONSTRAINT table_const_prim PRIMARY KEY (" + col.ID + "));");
|
||||||
|
|
||||||
|
DatabaseMetaData md = con.getMetaData();
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.REAL_NAME)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS "
|
||||||
|
+ col.REAL_NAME + " VARCHAR(255) NOT NULL DEFAULT 'Player';");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.PASSWORD)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName
|
||||||
|
+ " ADD COLUMN IF NOT EXISTS " + col.PASSWORD + " VARCHAR(255) NOT NULL DEFAULT '';");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!col.SALT.isEmpty() && isColumnMissing(md, col.SALT)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS " + col.SALT + " VARCHAR(255);");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.LAST_IP)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName
|
||||||
|
+ " ADD COLUMN IF NOT EXISTS " + col.LAST_IP + " VARCHAR(40);");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.LAST_LOGIN)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName
|
||||||
|
+ " ADD COLUMN IF NOT EXISTS " + col.LAST_LOGIN + " BIGINT;");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.REGISTRATION_IP)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName
|
||||||
|
+ " ADD COLUMN IF NOT EXISTS " + col.REGISTRATION_IP + " VARCHAR(40);");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.REGISTRATION_DATE)) {
|
||||||
|
addRegistrationDateColumn(st);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.LASTLOC_X)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS " + col.LASTLOC_X
|
||||||
|
+ " DOUBLE NOT NULL DEFAULT '0.0';");
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS " + col.LASTLOC_Y
|
||||||
|
+ " DOUBLE NOT NULL DEFAULT '0.0';");
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS " + col.LASTLOC_Z
|
||||||
|
+ " DOUBLE NOT NULL DEFAULT '0.0';");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.LASTLOC_WORLD)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName
|
||||||
|
+ " ADD COLUMN IF NOT EXISTS " + col.LASTLOC_WORLD + " VARCHAR(255) NOT NULL DEFAULT 'world';");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.LASTLOC_YAW)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS "
|
||||||
|
+ col.LASTLOC_YAW + " FLOAT;");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.LASTLOC_PITCH)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName + " ADD COLUMN IF NOT EXISTS "
|
||||||
|
+ col.LASTLOC_PITCH + " FLOAT;");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.EMAIL)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName
|
||||||
|
+ " ADD COLUMN IF NOT EXISTS " + col.EMAIL + " VARCHAR_IGNORECASE(255);");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.IS_LOGGED)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName
|
||||||
|
+ " ADD COLUMN IF NOT EXISTS " + col.IS_LOGGED + " INT NOT NULL DEFAULT '0';");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.HAS_SESSION)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName
|
||||||
|
+ " ADD COLUMN IF NOT EXISTS " + col.HAS_SESSION + " INT NOT NULL DEFAULT '0';");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (isColumnMissing(md, col.TOTP_KEY)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName
|
||||||
|
+ " ADD COLUMN IF NOT EXISTS " + col.TOTP_KEY + " VARCHAR(32);");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!col.PLAYER_UUID.isEmpty() && isColumnMissing(md, col.PLAYER_UUID)) {
|
||||||
|
st.executeUpdate("ALTER TABLE " + tableName
|
||||||
|
+ " ADD COLUMN IF NOT EXISTS " + col.PLAYER_UUID + " VARCHAR(36)");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
logger.info("H2 Setup finished");
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks if a column is missing in the specified table.
|
||||||
|
* @param columnName the name of the column to look for
|
||||||
|
* @return true if the column is missing, false if it exists
|
||||||
|
* @throws SQLException if an error occurs while executing SQL or accessing the result set
|
||||||
|
* @deprecated Not work in H2, it always returns true
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
|
private boolean isColumnMissing(DatabaseMetaData metaData, String columnName) throws SQLException {
|
||||||
|
String query = "SELECT * FROM INFORMATION_SCHEMA.COLUMNS WHERE TABLE_NAME = ? AND COLUMN_NAME = ?";
|
||||||
|
// try (PreparedStatement preparedStatement = con.prepareStatement(query)) {
|
||||||
|
// preparedStatement.setString(1, tableName);
|
||||||
|
// preparedStatement.setString(2, columnName.toUpperCase());
|
||||||
|
// try (ResultSet rs = preparedStatement.executeQuery()) {
|
||||||
|
// return !rs.next();
|
||||||
|
// }
|
||||||
|
// }
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void reload() {
|
||||||
|
close(con);
|
||||||
|
try {
|
||||||
|
this.connect();
|
||||||
|
this.setup();
|
||||||
|
} catch (SQLException ex) {
|
||||||
|
logger.logException("Error while reloading H2:", ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public PlayerAuth getAuth(String user) {
|
||||||
|
String sql = "SELECT * FROM " + tableName + " WHERE LOWER(" + col.NAME + ")=LOWER(?);";
|
||||||
|
try (PreparedStatement pst = con.prepareStatement(sql)) {
|
||||||
|
pst.setString(1, user);
|
||||||
|
try (ResultSet rs = pst.executeQuery()) {
|
||||||
|
if (rs.next()) {
|
||||||
|
return buildAuthFromResultSet(rs);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} catch (SQLException ex) {
|
||||||
|
logSqlException(ex);
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Set<String> getRecordsToPurge(long until) {
|
||||||
|
Set<String> list = new HashSet<>();
|
||||||
|
String select = "SELECT " + col.NAME + " FROM " + tableName + " WHERE MAX("
|
||||||
|
+ " COALESCE(" + col.LAST_LOGIN + ", 0),"
|
||||||
|
+ " COALESCE(" + col.REGISTRATION_DATE + ", 0)"
|
||||||
|
+ ") < ?;";
|
||||||
|
try (PreparedStatement selectPst = con.prepareStatement(select)) {
|
||||||
|
selectPst.setLong(1, until);
|
||||||
|
try (ResultSet rs = selectPst.executeQuery()) {
|
||||||
|
while (rs.next()) {
|
||||||
|
list.add(rs.getString(col.NAME));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} catch (SQLException ex) {
|
||||||
|
logSqlException(ex);
|
||||||
|
}
|
||||||
|
|
||||||
|
return list;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void purgeRecords(Collection<String> toPurge) {
|
||||||
|
String delete = "DELETE FROM " + tableName + " WHERE " + col.NAME + "=?;";
|
||||||
|
try (PreparedStatement deletePst = con.prepareStatement(delete)) {
|
||||||
|
for (String name : toPurge) {
|
||||||
|
deletePst.setString(1, name.toLowerCase(Locale.ROOT));
|
||||||
|
deletePst.executeUpdate();
|
||||||
|
}
|
||||||
|
} catch (SQLException ex) {
|
||||||
|
logSqlException(ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean removeAuth(String user) {
|
||||||
|
String sql = "DELETE FROM " + tableName + " WHERE " + col.NAME + "=?;";
|
||||||
|
try (PreparedStatement pst = con.prepareStatement(sql)) {
|
||||||
|
pst.setString(1, user.toLowerCase(Locale.ROOT));
|
||||||
|
pst.executeUpdate();
|
||||||
|
return true;
|
||||||
|
} catch (SQLException ex) {
|
||||||
|
logSqlException(ex);
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void closeConnection() {
|
||||||
|
try {
|
||||||
|
if (con != null && !con.isClosed()) {
|
||||||
|
con.close();
|
||||||
|
}
|
||||||
|
} catch (SQLException ex) {
|
||||||
|
logSqlException(ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public DataSourceType getType() {
|
||||||
|
return DataSourceType.H2;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<PlayerAuth> getAllAuths() {
|
||||||
|
List<PlayerAuth> auths = new ArrayList<>();
|
||||||
|
String sql = "SELECT * FROM " + tableName + ";";
|
||||||
|
try (PreparedStatement pst = con.prepareStatement(sql); ResultSet rs = pst.executeQuery()) {
|
||||||
|
while (rs.next()) {
|
||||||
|
PlayerAuth auth = buildAuthFromResultSet(rs);
|
||||||
|
auths.add(auth);
|
||||||
|
}
|
||||||
|
} catch (SQLException ex) {
|
||||||
|
logSqlException(ex);
|
||||||
|
}
|
||||||
|
return auths;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<String> getLoggedPlayersWithEmptyMail() {
|
||||||
|
List<String> players = new ArrayList<>();
|
||||||
|
String sql = "SELECT " + col.REAL_NAME + " FROM " + tableName + " WHERE " + col.IS_LOGGED + " = 1"
|
||||||
|
+ " AND (" + col.EMAIL + " = 'your@email.com' OR " + col.EMAIL + " IS NULL);";
|
||||||
|
try (Statement st = con.createStatement(); ResultSet rs = st.executeQuery(sql)) {
|
||||||
|
while (rs.next()) {
|
||||||
|
players.add(rs.getString(1));
|
||||||
|
}
|
||||||
|
} catch (SQLException ex) {
|
||||||
|
logSqlException(ex);
|
||||||
|
}
|
||||||
|
return players;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<PlayerAuth> getRecentlyLoggedInPlayers() {
|
||||||
|
List<PlayerAuth> players = new ArrayList<>();
|
||||||
|
String sql = "SELECT * FROM " + tableName + " ORDER BY " + col.LAST_LOGIN + " DESC LIMIT 10;";
|
||||||
|
try (Statement st = con.createStatement(); ResultSet rs = st.executeQuery(sql)) {
|
||||||
|
while (rs.next()) {
|
||||||
|
players.add(buildAuthFromResultSet(rs));
|
||||||
|
}
|
||||||
|
} catch (SQLException e) {
|
||||||
|
logSqlException(e);
|
||||||
|
}
|
||||||
|
return players;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean setTotpKey(String user, String totpKey) {
|
||||||
|
String sql = "UPDATE " + tableName + " SET " + col.TOTP_KEY + " = ? WHERE " + col.NAME + " = ?";
|
||||||
|
try (PreparedStatement pst = con.prepareStatement(sql)) {
|
||||||
|
pst.setString(1, totpKey);
|
||||||
|
pst.setString(2, user.toLowerCase(Locale.ROOT));
|
||||||
|
pst.executeUpdate();
|
||||||
|
return true;
|
||||||
|
} catch (SQLException e) {
|
||||||
|
logSqlException(e);
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
private PlayerAuth buildAuthFromResultSet(ResultSet row) throws SQLException {
|
||||||
|
String salt = !col.SALT.isEmpty() ? row.getString(col.SALT) : null;
|
||||||
|
|
||||||
|
return PlayerAuth.builder()
|
||||||
|
.name(row.getString(col.NAME))
|
||||||
|
.email(row.getString(col.EMAIL))
|
||||||
|
.realName(row.getString(col.REAL_NAME))
|
||||||
|
.password(row.getString(col.PASSWORD), salt)
|
||||||
|
.totpKey(row.getString(col.TOTP_KEY))
|
||||||
|
.lastLogin(getNullableLong(row, col.LAST_LOGIN))
|
||||||
|
.lastIp(row.getString(col.LAST_IP))
|
||||||
|
.registrationDate(row.getLong(col.REGISTRATION_DATE))
|
||||||
|
.registrationIp(row.getString(col.REGISTRATION_IP))
|
||||||
|
.locX(row.getDouble(col.LASTLOC_X))
|
||||||
|
.locY(row.getDouble(col.LASTLOC_Y))
|
||||||
|
.locZ(row.getDouble(col.LASTLOC_Z))
|
||||||
|
.locWorld(row.getString(col.LASTLOC_WORLD))
|
||||||
|
.locYaw(row.getFloat(col.LASTLOC_YAW))
|
||||||
|
.locPitch(row.getFloat(col.LASTLOC_PITCH))
|
||||||
|
.build();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates the column for registration date and sets all entries to the current timestamp.
|
||||||
|
* We do so in order to avoid issues with purging, where entries with 0 / NULL might get
|
||||||
|
* purged immediately on startup otherwise.
|
||||||
|
*
|
||||||
|
* @param st Statement object to the database
|
||||||
|
*/
|
||||||
|
private void addRegistrationDateColumn(Statement st) throws SQLException {
|
||||||
|
int affect = st.executeUpdate("ALTER TABLE " + tableName
|
||||||
|
+ " ADD COLUMN IF NOT EXISTS " + col.REGISTRATION_DATE + " BIGINT NOT NULL DEFAULT '0';");
|
||||||
|
if (affect > 0) {
|
||||||
|
long currentTimestamp = System.currentTimeMillis();
|
||||||
|
int updatedRows = st.executeUpdate(String.format("UPDATE %s SET %s = %d;",
|
||||||
|
tableName, col.REGISTRATION_DATE, currentTimestamp));
|
||||||
|
logger.info("Created column '" + col.REGISTRATION_DATE + "' and set the current timestamp, "
|
||||||
|
+ currentTimestamp + ", to all " + updatedRows + " rows");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
String getJdbcUrl(String dataPath, String ignored, String database) {
|
||||||
|
return "jdbc:h2:" + dataPath + File.separator + database;
|
||||||
|
}
|
||||||
|
|
||||||
|
private static void close(Connection con) {
|
||||||
|
if (con != null) {
|
||||||
|
try {
|
||||||
|
con.close();
|
||||||
|
} catch (SQLException ex) {
|
||||||
|
logSqlException(ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
@ -3,8 +3,6 @@ package fr.xephi.authme.datasource.columnshandler;
|
|||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
import fr.xephi.authme.data.auth.PlayerAuth;
|
||||||
import fr.xephi.authme.settings.properties.DatabaseSettings;
|
import fr.xephi.authme.settings.properties.DatabaseSettings;
|
||||||
|
|
||||||
import java.util.UUID;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.datasource.columnshandler.AuthMeColumnsFactory.ColumnOptions.DEFAULT_FOR_NULL;
|
import static fr.xephi.authme.datasource.columnshandler.AuthMeColumnsFactory.ColumnOptions.DEFAULT_FOR_NULL;
|
||||||
import static fr.xephi.authme.datasource.columnshandler.AuthMeColumnsFactory.ColumnOptions.OPTIONAL;
|
import static fr.xephi.authme.datasource.columnshandler.AuthMeColumnsFactory.ColumnOptions.OPTIONAL;
|
||||||
import static fr.xephi.authme.datasource.columnshandler.AuthMeColumnsFactory.createDouble;
|
import static fr.xephi.authme.datasource.columnshandler.AuthMeColumnsFactory.createDouble;
|
||||||
|
|||||||
@ -51,6 +51,26 @@ public final class AuthMeColumnsHandler {
|
|||||||
return new AuthMeColumnsHandler(sqlColHandler);
|
return new AuthMeColumnsHandler(sqlColHandler);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Creates a column handler for H2.
|
||||||
|
*
|
||||||
|
* @param connection the connection to the database
|
||||||
|
* @param settings plugin settings
|
||||||
|
* @return created column handler
|
||||||
|
*/
|
||||||
|
public static AuthMeColumnsHandler createForH2(Connection connection, Settings settings) {
|
||||||
|
ColumnContext columnContext = new ColumnContext(settings, false);
|
||||||
|
String tableName = settings.getProperty(DatabaseSettings.MYSQL_TABLE);
|
||||||
|
String nameColumn = settings.getProperty(DatabaseSettings.MYSQL_COL_NAME);
|
||||||
|
|
||||||
|
SqlColumnsHandler<ColumnContext, String> sqlColHandler = new SqlColumnsHandler<>(
|
||||||
|
forSingleConnection(connection, tableName, nameColumn, columnContext)
|
||||||
|
.setPredicateSqlGenerator(new PredicateSqlGenerator<>(columnContext, false))
|
||||||
|
);
|
||||||
|
return new AuthMeColumnsHandler(sqlColHandler);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Creates a column handler for MySQL.
|
* Creates a column handler for MySQL.
|
||||||
*
|
*
|
||||||
|
|||||||
@ -0,0 +1,33 @@
|
|||||||
|
package fr.xephi.authme.datasource.converter;
|
||||||
|
|
||||||
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
|
import fr.xephi.authme.datasource.DataSourceType;
|
||||||
|
import fr.xephi.authme.datasource.SQLite;
|
||||||
|
import fr.xephi.authme.initialization.DataFolder;
|
||||||
|
import fr.xephi.authme.settings.Settings;
|
||||||
|
|
||||||
|
import javax.inject.Inject;
|
||||||
|
import java.io.File;
|
||||||
|
import java.sql.SQLException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Converts SQLite to H2
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
public class SqliteToH2 extends AbstractDataSourceConverter<SQLite>{
|
||||||
|
|
||||||
|
private final Settings settings;
|
||||||
|
private final File dataFolder;
|
||||||
|
|
||||||
|
@Inject
|
||||||
|
SqliteToH2(Settings settings, DataSource dataSource, @DataFolder File dataFolder) {
|
||||||
|
super(dataSource, DataSourceType.H2);
|
||||||
|
this.settings = settings;
|
||||||
|
this.dataFolder = dataFolder;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected SQLite getSource() throws SQLException {
|
||||||
|
return new SQLite(settings, dataFolder);
|
||||||
|
}
|
||||||
|
}
|
||||||
@ -5,6 +5,7 @@ import fr.xephi.authme.data.auth.PlayerCache;
|
|||||||
import fr.xephi.authme.datasource.CacheDataSource;
|
import fr.xephi.authme.datasource.CacheDataSource;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.datasource.DataSourceType;
|
import fr.xephi.authme.datasource.DataSourceType;
|
||||||
|
import fr.xephi.authme.datasource.H2;
|
||||||
import fr.xephi.authme.datasource.MariaDB;
|
import fr.xephi.authme.datasource.MariaDB;
|
||||||
import fr.xephi.authme.datasource.MySQL;
|
import fr.xephi.authme.datasource.MySQL;
|
||||||
import fr.xephi.authme.datasource.PostgreSqlDataSource;
|
import fr.xephi.authme.datasource.PostgreSqlDataSource;
|
||||||
@ -76,6 +77,9 @@ public class DataSourceProvider implements Provider<DataSource> {
|
|||||||
case SQLITE:
|
case SQLITE:
|
||||||
dataSource = new SQLite(settings, dataFolder);
|
dataSource = new SQLite(settings, dataFolder);
|
||||||
break;
|
break;
|
||||||
|
case H2:
|
||||||
|
dataSource = new H2(settings, dataFolder);
|
||||||
|
break;
|
||||||
default:
|
default:
|
||||||
throw new UnsupportedOperationException("Unknown data source type '" + dataSourceType + "'");
|
throw new UnsupportedOperationException("Unknown data source type '" + dataSourceType + "'");
|
||||||
}
|
}
|
||||||
|
|||||||
@ -3,10 +3,10 @@ package fr.xephi.authme.initialization;
|
|||||||
import fr.xephi.authme.AuthMe;
|
import fr.xephi.authme.AuthMe;
|
||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
import fr.xephi.authme.message.Messages;
|
import fr.xephi.authme.message.Messages;
|
||||||
import fr.xephi.authme.output.ConsoleFilter;
|
import fr.xephi.authme.output.ConsoleFilter;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.output.Log4JFilter;
|
import fr.xephi.authme.output.Log4JFilter;
|
||||||
import fr.xephi.authme.service.BukkitService;
|
import fr.xephi.authme.service.BukkitService;
|
||||||
import fr.xephi.authme.settings.Settings;
|
import fr.xephi.authme.settings.Settings;
|
||||||
@ -53,7 +53,7 @@ public class OnStartupTasks {
|
|||||||
* @param settings the settings
|
* @param settings the settings
|
||||||
*/
|
*/
|
||||||
public static void sendMetrics(AuthMe plugin, Settings settings) {
|
public static void sendMetrics(AuthMe plugin, Settings settings) {
|
||||||
final Metrics metrics = new Metrics(plugin, 164);
|
final Metrics metrics = new Metrics(plugin, 18479);
|
||||||
|
|
||||||
metrics.addCustomChart(new SimplePie("messages_language",
|
metrics.addCustomChart(new SimplePie("messages_language",
|
||||||
() -> settings.getProperty(PluginSettings.MESSAGES_LANGUAGE)));
|
() -> settings.getProperty(PluginSettings.MESSAGES_LANGUAGE)));
|
||||||
@ -109,6 +109,6 @@ public class OnStartupTasks {
|
|||||||
}
|
}
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
}, 1, TICKS_PER_MINUTE * settings.getProperty(EmailSettings.DELAY_RECALL));
|
}, 1, (long) TICKS_PER_MINUTE * settings.getProperty(EmailSettings.DELAY_RECALL));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -0,0 +1,20 @@
|
|||||||
|
package fr.xephi.authme.listener;
|
||||||
|
|
||||||
|
import org.bukkit.block.Block;
|
||||||
|
import org.bukkit.event.EventHandler;
|
||||||
|
import org.bukkit.event.EventPriority;
|
||||||
|
import org.bukkit.event.Listener;
|
||||||
|
import org.bukkit.event.block.BlockDispenseEvent;
|
||||||
|
|
||||||
|
//This fix is only for Minecraft 1.13-
|
||||||
|
public class AdvancedShulkerFixListener implements Listener {
|
||||||
|
|
||||||
|
@EventHandler(priority = EventPriority.LOWEST, ignoreCancelled = true)
|
||||||
|
public void onDispenserActivate(BlockDispenseEvent event) {
|
||||||
|
Block block = event.getBlock();
|
||||||
|
|
||||||
|
if (block.getY() <= 0 || block.getY() >= block.getWorld().getMaxHeight() - 1) {
|
||||||
|
event.setCancelled(true);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@ -0,0 +1,62 @@
|
|||||||
|
package fr.xephi.authme.listener;
|
||||||
|
/* Inspired by DongShaoNB/BedrockPlayerSupport **/
|
||||||
|
|
||||||
|
import fr.xephi.authme.AuthMe;
|
||||||
|
import fr.xephi.authme.api.v3.AuthMeApi;
|
||||||
|
import fr.xephi.authme.events.RestoreSessionEvent;
|
||||||
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.message.Messages;
|
||||||
|
import fr.xephi.authme.service.BukkitService;
|
||||||
|
import fr.xephi.authme.settings.Settings;
|
||||||
|
import fr.xephi.authme.settings.properties.HooksSettings;
|
||||||
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
|
import org.bukkit.entity.Player;
|
||||||
|
import org.bukkit.event.EventHandler;
|
||||||
|
import org.bukkit.event.EventPriority;
|
||||||
|
import org.bukkit.event.Listener;
|
||||||
|
import org.bukkit.event.player.PlayerJoinEvent;
|
||||||
|
|
||||||
|
import javax.inject.Inject;
|
||||||
|
import java.util.UUID;
|
||||||
|
|
||||||
|
import static org.bukkit.Bukkit.getServer;
|
||||||
|
|
||||||
|
public class BedrockAutoLoginListener implements Listener {
|
||||||
|
private final AuthMeApi authmeApi = AuthMeApi.getInstance();
|
||||||
|
@Inject
|
||||||
|
private BukkitService bukkitService;
|
||||||
|
@Inject
|
||||||
|
private AuthMe plugin;
|
||||||
|
@Inject
|
||||||
|
private Messages messages;
|
||||||
|
|
||||||
|
@Inject
|
||||||
|
private Settings settings;
|
||||||
|
|
||||||
|
public BedrockAutoLoginListener() {
|
||||||
|
}
|
||||||
|
|
||||||
|
private boolean isBedrockPlayer(UUID uuid) {
|
||||||
|
return settings.getProperty(HooksSettings.HOOK_FLOODGATE_PLAYER) && settings.getProperty(SecuritySettings.FORCE_LOGIN_BEDROCK) && org.geysermc.floodgate.api.FloodgateApi.getInstance().isFloodgateId(uuid) && getServer().getPluginManager().getPlugin("floodgate") != null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@EventHandler(priority = EventPriority.LOWEST)
|
||||||
|
public void onPlayerJoin(PlayerJoinEvent event) {
|
||||||
|
Player player = event.getPlayer();
|
||||||
|
String name = event.getPlayer().getName();
|
||||||
|
UUID uuid = event.getPlayer().getUniqueId();
|
||||||
|
if (isBedrockPlayer(uuid) && !authmeApi.isAuthenticated(player) && authmeApi.isRegistered(name)) {
|
||||||
|
authmeApi.forceLogin(player);
|
||||||
|
messages.send(player, MessageKey.BEDROCK_AUTO_LOGGED_IN);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@EventHandler(priority = EventPriority.HIGHEST)
|
||||||
|
public void onPlayerAuthMeSessionRestore(RestoreSessionEvent event) {
|
||||||
|
Player player = event.getPlayer();
|
||||||
|
UUID uuid = player.getUniqueId();
|
||||||
|
if (isBedrockPlayer(uuid)) {
|
||||||
|
event.setCancelled(true);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@ -0,0 +1,35 @@
|
|||||||
|
package fr.xephi.authme.listener;
|
||||||
|
//Prevent Ghost Players
|
||||||
|
|
||||||
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.service.CommonService;
|
||||||
|
import org.bukkit.Bukkit;
|
||||||
|
import org.bukkit.entity.Player;
|
||||||
|
import org.bukkit.event.EventHandler;
|
||||||
|
import org.bukkit.event.Listener;
|
||||||
|
import org.bukkit.event.player.PlayerJoinEvent;
|
||||||
|
|
||||||
|
import javax.inject.Inject;
|
||||||
|
import java.util.Collection;
|
||||||
|
import java.util.HashSet;
|
||||||
|
|
||||||
|
public class DoubleLoginFixListener implements Listener {
|
||||||
|
@Inject
|
||||||
|
private CommonService service;
|
||||||
|
|
||||||
|
public DoubleLoginFixListener() {
|
||||||
|
}
|
||||||
|
|
||||||
|
@EventHandler
|
||||||
|
public void onPlayerJoin(PlayerJoinEvent event) {
|
||||||
|
Collection<? extends Player> PlayerList = Bukkit.getServer().getOnlinePlayers();
|
||||||
|
HashSet<String> PlayerSet = new HashSet<String>();
|
||||||
|
for (Player ep : PlayerList) {
|
||||||
|
if (PlayerSet.contains(ep.getName().toLowerCase())) {
|
||||||
|
ep.kickPlayer(service.retrieveSingleMessage(ep.getPlayer(), MessageKey.DOUBLE_LOGIN_FIX));
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
PlayerSet.add(ep.getName().toLowerCase());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
328
src/main/java/fr/xephi/authme/listener/GuiCaptchaHandler.java
Normal file
328
src/main/java/fr/xephi/authme/listener/GuiCaptchaHandler.java
Normal file
@ -0,0 +1,328 @@
|
|||||||
|
package fr.xephi.authme.listener;
|
||||||
|
|
||||||
|
import com.comphenix.protocol.PacketType;
|
||||||
|
import com.comphenix.protocol.ProtocolLibrary;
|
||||||
|
import com.comphenix.protocol.events.ListenerPriority;
|
||||||
|
import com.comphenix.protocol.events.PacketAdapter;
|
||||||
|
import com.comphenix.protocol.events.PacketEvent;
|
||||||
|
import fr.xephi.authme.AuthMe;
|
||||||
|
import fr.xephi.authme.api.v3.AuthMeApi;
|
||||||
|
import fr.xephi.authme.events.LoginEvent;
|
||||||
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.message.Messages;
|
||||||
|
import fr.xephi.authme.service.BukkitService;
|
||||||
|
import fr.xephi.authme.service.CommonService;
|
||||||
|
import fr.xephi.authme.settings.Settings;
|
||||||
|
import fr.xephi.authme.settings.properties.HooksSettings;
|
||||||
|
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
||||||
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
|
import org.bukkit.Bukkit;
|
||||||
|
import org.bukkit.Material;
|
||||||
|
import org.bukkit.entity.Player;
|
||||||
|
import org.bukkit.event.EventHandler;
|
||||||
|
import org.bukkit.event.EventPriority;
|
||||||
|
import org.bukkit.event.Listener;
|
||||||
|
import org.bukkit.event.inventory.InventoryClickEvent;
|
||||||
|
import org.bukkit.event.player.PlayerJoinEvent;
|
||||||
|
import org.bukkit.event.player.PlayerLoginEvent;
|
||||||
|
import org.bukkit.event.player.PlayerQuitEvent;
|
||||||
|
import org.bukkit.inventory.Inventory;
|
||||||
|
import org.bukkit.inventory.ItemStack;
|
||||||
|
import org.bukkit.inventory.meta.ItemMeta;
|
||||||
|
|
||||||
|
import javax.inject.Inject;
|
||||||
|
import java.io.File;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Random;
|
||||||
|
import java.util.UUID;
|
||||||
|
import java.util.concurrent.ConcurrentHashMap;
|
||||||
|
import java.util.concurrent.atomic.AtomicInteger;
|
||||||
|
import java.util.logging.Level;
|
||||||
|
|
||||||
|
import static fr.xephi.authme.util.PlayerUtils.getPlayerIp;
|
||||||
|
import static fr.xephi.authme.util.PlayerUtils.isNpc;
|
||||||
|
import static org.bukkit.Bukkit.getLogger;
|
||||||
|
import static org.bukkit.Bukkit.getServer;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This class handles ALL the GUI captcha features in the plugin.
|
||||||
|
*/
|
||||||
|
public class GuiCaptchaHandler implements Listener {
|
||||||
|
//define AuthMeApi
|
||||||
|
private final AuthMeApi authmeApi = AuthMeApi.getInstance();
|
||||||
|
@Inject
|
||||||
|
private BukkitService bukkitService;
|
||||||
|
@Inject
|
||||||
|
private AuthMe plugin;
|
||||||
|
@Inject
|
||||||
|
private Messages messages;
|
||||||
|
@Inject
|
||||||
|
private CommonService service;
|
||||||
|
|
||||||
|
@Inject
|
||||||
|
private Settings settings;
|
||||||
|
|
||||||
|
|
||||||
|
private PacketAdapter chatPacketListener;
|
||||||
|
private PacketAdapter windowPacketListener;
|
||||||
|
|
||||||
|
//define timesLeft
|
||||||
|
private int timesLeft = 3;
|
||||||
|
//Use ConcurrentHashMap to store player and their close reason
|
||||||
|
/* We used many async tasks so there is concurrent**/
|
||||||
|
public static ConcurrentHashMap<Player, String> closeReasonMap = new ConcurrentHashMap<>();
|
||||||
|
//define randomStringSet
|
||||||
|
String randomSet = "ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890abcdefghijklmnopqrstuvwxyz!@#%&*()_+";
|
||||||
|
String randomString = "";
|
||||||
|
Random randomItemSet = new Random();
|
||||||
|
Random howManyRandom = new Random();
|
||||||
|
private Material captchaMaterial = getRandomMaterial();
|
||||||
|
|
||||||
|
|
||||||
|
private boolean isPacketListenersActive = false;
|
||||||
|
|
||||||
|
public GuiCaptchaHandler() {
|
||||||
|
}
|
||||||
|
|
||||||
|
private StringBuilder sb;
|
||||||
|
private final List<String> whiteList = AuthMe.settings.getProperty(SecuritySettings.GUI_CAPTCHA_COUNTRY_WHITELIST);
|
||||||
|
|
||||||
|
private boolean isBedrockPlayer(UUID uuid) {
|
||||||
|
if (getServer().getPluginManager().getPlugin("floodgate") != null) {
|
||||||
|
return settings.getProperty(HooksSettings.HOOK_FLOODGATE_PLAYER) && settings.getProperty(SecuritySettings.GUI_CAPTCHA_BE_COMPATIBILITY) && org.geysermc.floodgate.api.FloodgateApi.getInstance().isFloodgateId(uuid);
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
private void initializePacketListeners() {
|
||||||
|
if (!isPacketListenersActive) {
|
||||||
|
ProtocolLibrary.getProtocolManager().addPacketListener(windowPacketListener);
|
||||||
|
ProtocolLibrary.getProtocolManager().addPacketListener(chatPacketListener);
|
||||||
|
isPacketListenersActive = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@EventHandler
|
||||||
|
public void onInventoryClick(InventoryClickEvent event) {
|
||||||
|
if (event.getWhoClicked() instanceof Player) {
|
||||||
|
Player player = (Player) event.getWhoClicked();
|
||||||
|
ItemStack currentItem = event.getCurrentItem();
|
||||||
|
if (!authmeApi.isRegistered(player.getName())) {
|
||||||
|
if (isBedrockPlayer(player.getUniqueId())) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
if (currentItem != null && currentItem.getType().equals(captchaMaterial)) {
|
||||||
|
event.setCancelled(true);
|
||||||
|
if (!closeReasonMap.containsKey(player)) {
|
||||||
|
closeReasonMap.put(player, "verified");
|
||||||
|
}
|
||||||
|
player.closeInventory();
|
||||||
|
messages.send(player, MessageKey.GUI_CAPTCHA_VERIFIED);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@EventHandler(priority = EventPriority.HIGHEST)
|
||||||
|
public void onPlayerLogin(PlayerLoginEvent event) {
|
||||||
|
Player player = event.getPlayer();
|
||||||
|
bukkitService.runTaskAsynchronously(() -> {
|
||||||
|
sb = new StringBuilder();
|
||||||
|
int howLongIsRandomString = (howManyRandom.nextInt(3) + 1);
|
||||||
|
for (int i = 0; i < howLongIsRandomString; i++) {
|
||||||
|
//生成随机索引号
|
||||||
|
int index = randomItemSet.nextInt(randomSet.length());
|
||||||
|
|
||||||
|
// 从字符串中获取由索引 index 指定的字符
|
||||||
|
char randomChar = randomSet.charAt(index);
|
||||||
|
|
||||||
|
// 将字符追加到字符串生成器
|
||||||
|
sb.append(randomChar);
|
||||||
|
}
|
||||||
|
if (!whiteList.isEmpty()) {
|
||||||
|
String ip = getPlayerIp(player);
|
||||||
|
if (whiteList.contains(authmeApi.getCountryCode(ip)) && ip != null) {
|
||||||
|
if (!closeReasonMap.containsKey(player)) {
|
||||||
|
closeReasonMap.put(player, "verified:whitelist");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
@EventHandler(ignoreCancelled = true, priority = EventPriority.HIGHEST)
|
||||||
|
public void onPlayerJoin(PlayerJoinEvent event) {
|
||||||
|
randomString = "";
|
||||||
|
Player playerunreg = event.getPlayer();
|
||||||
|
String name = playerunreg.getName();
|
||||||
|
if (!authmeApi.isRegistered(name) && !isNpc(playerunreg) && !closeReasonMap.containsKey(playerunreg)) {
|
||||||
|
if (isBedrockPlayer(playerunreg.getUniqueId())) {
|
||||||
|
if (!closeReasonMap.containsKey(playerunreg)) {
|
||||||
|
closeReasonMap.put(playerunreg, "verified:bedrock");
|
||||||
|
}
|
||||||
|
messages.send(playerunreg, MessageKey.GUI_CAPTCHA_VERIFIED_AUTO_BEDROCK);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
bukkitService.runTask(() -> {
|
||||||
|
randomString = sb.toString();
|
||||||
|
Random random_blockpos = new Random();
|
||||||
|
AtomicInteger random_num = new AtomicInteger(random_blockpos.nextInt(26));
|
||||||
|
Inventory menu = Bukkit.createInventory(playerunreg, 27, messages.retrieveSingle(playerunreg, MessageKey.GUI_CAPTCHA_WINDOW_NAME, randomString));
|
||||||
|
ItemStack item = new ItemStack(captchaMaterial);
|
||||||
|
ItemMeta meta = item.getItemMeta();
|
||||||
|
try {
|
||||||
|
if (meta != null) {
|
||||||
|
meta.setDisplayName(messages.retrieveSingle(playerunreg, MessageKey.GUI_CAPTCHA_CLICKABLE_NAME, randomString));
|
||||||
|
item.setItemMeta(meta);
|
||||||
|
}
|
||||||
|
} catch (NullPointerException e) {
|
||||||
|
getLogger().log(Level.WARNING, "Unexpected error occurred while setting item meta.");
|
||||||
|
}
|
||||||
|
windowPacketListener = new PacketAdapter(this.plugin, ListenerPriority.HIGHEST, PacketType.Play.Client.CLOSE_WINDOW) {
|
||||||
|
@Override
|
||||||
|
public void onPacketReceiving(PacketEvent event) {
|
||||||
|
Player packetPlayer = event.getPlayer();
|
||||||
|
if (!closeReasonMap.containsKey(packetPlayer) && !authmeApi.isRegistered(packetPlayer.getName())) {
|
||||||
|
if (timesLeft <= 0) {
|
||||||
|
bukkitService.runTask(() -> {
|
||||||
|
packetPlayer.kickPlayer(service.retrieveSingleMessage(packetPlayer, MessageKey.GUI_CAPTCHA_KICK_FAILED));
|
||||||
|
});
|
||||||
|
timesLeft = 3;
|
||||||
|
} else {
|
||||||
|
--timesLeft;
|
||||||
|
if (timesLeft <= 0) {
|
||||||
|
bukkitService.runTask(() -> {
|
||||||
|
packetPlayer.kickPlayer(service.retrieveSingleMessage(packetPlayer, MessageKey.GUI_CAPTCHA_KICK_FAILED));
|
||||||
|
});
|
||||||
|
timesLeft = 3;
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
messages.send(packetPlayer, MessageKey.GUI_CAPTCHA_RETRY_MESSAGE, String.valueOf(timesLeft));
|
||||||
|
event.setCancelled(true);
|
||||||
|
random_num.set(random_blockpos.nextInt(26));
|
||||||
|
bukkitService.runTask(() -> {
|
||||||
|
menu.clear();
|
||||||
|
menu.setItem(random_num.get(), item);
|
||||||
|
packetPlayer.openInventory(menu);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
chatPacketListener = new PacketAdapter(this.plugin, ListenerPriority.HIGHEST, PacketType.Play.Client.CHAT) {
|
||||||
|
@Override
|
||||||
|
public void onPacketReceiving(PacketEvent event) {
|
||||||
|
Player packetPlayer = event.getPlayer();
|
||||||
|
if (!closeReasonMap.containsKey(packetPlayer) && !authmeApi.isRegistered(packetPlayer.getName())) {
|
||||||
|
messages.send(packetPlayer, MessageKey.GUI_CAPTCHA_DENIED_MESSAGE);
|
||||||
|
event.setCancelled(true);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
initializePacketListeners();
|
||||||
|
//Open captcha inventory
|
||||||
|
menu.setItem(random_num.get(), item);
|
||||||
|
playerunreg.openInventory(menu);
|
||||||
|
if (settings.getProperty(SecuritySettings.GUI_CAPTCHA_TIMEOUT) > 0) {
|
||||||
|
long timeOut = settings.getProperty(SecuritySettings.GUI_CAPTCHA_TIMEOUT);
|
||||||
|
if (settings.getProperty(SecuritySettings.GUI_CAPTCHA_TIMEOUT) > settings.getProperty(RestrictionSettings.TIMEOUT)) {
|
||||||
|
bukkitService.runTask(() -> {
|
||||||
|
getLogger().warning("AuthMe detected that your GUI captcha timeout seconds(" + settings.getProperty(SecuritySettings.GUI_CAPTCHA_TIMEOUT) + ") is bigger than the Login timeout seconds(" +
|
||||||
|
settings.getProperty(RestrictionSettings.TIMEOUT) + "). To prevent issues, we will let the GUI captcha follow the Login timeout seconds, please check and modify your config.");
|
||||||
|
});
|
||||||
|
timeOut = settings.getProperty(RestrictionSettings.TIMEOUT);
|
||||||
|
}
|
||||||
|
long finalTimeOut = timeOut;
|
||||||
|
bukkitService.runTaskLater(() -> {
|
||||||
|
if (!closeReasonMap.containsKey(playerunreg) && !authmeApi.isRegistered(playerunreg.getName())) {
|
||||||
|
playerunreg.kickPlayer(service.retrieveSingleMessage(playerunreg, MessageKey.GUI_CAPTCHA_KICK_TIMEOUT));
|
||||||
|
timesLeft = 3; // Reset the attempt counter
|
||||||
|
}
|
||||||
|
}, finalTimeOut * 20L);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
//This prevents players from unregistering by Admins
|
||||||
|
@EventHandler
|
||||||
|
public void onPlayerAuthMeLogin(LoginEvent event) {
|
||||||
|
Player player = event.getPlayer();
|
||||||
|
if (!closeReasonMap.containsKey(player)) {
|
||||||
|
closeReasonMap.put(player, "verified:login");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
private void deletePlayerData(UUID playerUUID) {
|
||||||
|
// 获取服务器的存储文件夹路径
|
||||||
|
File serverFolder = Bukkit.getServer().getWorldContainer();
|
||||||
|
String worldFolderName = settings.getProperty(SecuritySettings.DELETE_PLAYER_DATA_WORLD);
|
||||||
|
// 构建playerdata文件夹路径
|
||||||
|
File playerDataFolder = new File(serverFolder, File.separator + worldFolderName + File.separator + "playerdata");
|
||||||
|
|
||||||
|
// 构建玩家数据文件路径
|
||||||
|
File playerDataFile = new File(playerDataFolder, File.separator + playerUUID + ".dat");
|
||||||
|
|
||||||
|
// 删除玩家数据文件
|
||||||
|
if (playerDataFile.exists()) {
|
||||||
|
playerDataFile.delete();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private void deletePlayerStats(UUID playerUUID) {
|
||||||
|
// 获取服务器的存储文件夹路径
|
||||||
|
File serverFolder = Bukkit.getServer().getWorldContainer();
|
||||||
|
String worldFolderName = settings.getProperty(SecuritySettings.DELETE_PLAYER_DATA_WORLD);
|
||||||
|
// 构建stats文件夹路径
|
||||||
|
File statsFolder = new File(serverFolder, File.separator + worldFolderName + File.separator + "stats");
|
||||||
|
// 构建玩家统计数据文件路径
|
||||||
|
File statsFile = new File(statsFolder, File.separator + playerUUID + ".json");
|
||||||
|
// 删除玩家统计数据文件
|
||||||
|
if (statsFile.exists()) {
|
||||||
|
statsFile.delete();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private void deleteAuthMePlayerData(UUID playerUUID) {
|
||||||
|
File pluginFolder = plugin.getDataFolder();
|
||||||
|
File path = new File(pluginFolder, File.separator + "playerdata" + File.separator + playerUUID);
|
||||||
|
File dataFile = new File(path, File.separator + "data.json");
|
||||||
|
if (dataFile.exists()) {
|
||||||
|
dataFile.delete();
|
||||||
|
path.delete();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@EventHandler
|
||||||
|
public void onPlayerQuit(PlayerQuitEvent event) {
|
||||||
|
Player player = event.getPlayer();
|
||||||
|
String name = player.getName();
|
||||||
|
UUID playerUUID = event.getPlayer().getUniqueId();
|
||||||
|
if (!authmeApi.isRegistered(name)) {
|
||||||
|
if (settings.getProperty(SecuritySettings.DELETE_UNVERIFIED_PLAYER_DATA) && !closeReasonMap.containsKey(player)) {
|
||||||
|
bukkitService.runTaskLater(() -> {
|
||||||
|
if (!player.isOnline()) {
|
||||||
|
deletePlayerData(playerUUID);
|
||||||
|
deletePlayerStats(playerUUID);
|
||||||
|
deleteAuthMePlayerData(playerUUID);
|
||||||
|
}
|
||||||
|
}, 100L);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
closeReasonMap.remove(player);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private Material getRandomMaterial() {
|
||||||
|
Material[] allMaterials = Material.values();
|
||||||
|
Random random = new Random();
|
||||||
|
return allMaterials[random.nextInt(allMaterials.length)];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -1,11 +1,14 @@
|
|||||||
package fr.xephi.authme.listener;
|
package fr.xephi.authme.listener;
|
||||||
|
|
||||||
|
import fr.xephi.authme.AuthMe;
|
||||||
|
import fr.xephi.authme.api.v3.AuthMeApi;
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
import fr.xephi.authme.data.auth.PlayerCache;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.initialization.SettingsDependent;
|
import fr.xephi.authme.initialization.SettingsDependent;
|
||||||
import fr.xephi.authme.service.ValidationService;
|
import fr.xephi.authme.service.ValidationService;
|
||||||
import fr.xephi.authme.settings.Settings;
|
import fr.xephi.authme.settings.Settings;
|
||||||
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
||||||
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
import fr.xephi.authme.util.PlayerUtils;
|
import fr.xephi.authme.util.PlayerUtils;
|
||||||
import org.bukkit.entity.Entity;
|
import org.bukkit.entity.Entity;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
@ -18,13 +21,13 @@ import javax.inject.Inject;
|
|||||||
* Service class for the AuthMe listeners to determine whether an event should be canceled.
|
* Service class for the AuthMe listeners to determine whether an event should be canceled.
|
||||||
*/
|
*/
|
||||||
class ListenerService implements SettingsDependent {
|
class ListenerService implements SettingsDependent {
|
||||||
|
private final AuthMeApi authmeApi = AuthMeApi.getInstance();
|
||||||
private final DataSource dataSource;
|
private final DataSource dataSource;
|
||||||
private final PlayerCache playerCache;
|
private final PlayerCache playerCache;
|
||||||
private final ValidationService validationService;
|
private final ValidationService validationService;
|
||||||
|
|
||||||
private boolean isRegistrationForced;
|
private boolean isRegistrationForced;
|
||||||
|
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
ListenerService(Settings settings, DataSource dataSource, PlayerCache playerCache,
|
ListenerService(Settings settings, DataSource dataSource, PlayerCache playerCache,
|
||||||
ValidationService validationService) {
|
ValidationService validationService) {
|
||||||
@ -76,9 +79,18 @@ class ListenerService implements SettingsDependent {
|
|||||||
* @param player the player to verify
|
* @param player the player to verify
|
||||||
* @return true if the associated event should be canceled, false otherwise
|
* @return true if the associated event should be canceled, false otherwise
|
||||||
*/
|
*/
|
||||||
|
|
||||||
public boolean shouldCancelEvent(Player player) {
|
public boolean shouldCancelEvent(Player player) {
|
||||||
|
|
||||||
return player != null && !checkAuth(player.getName()) && !PlayerUtils.isNpc(player);
|
return player != null && !checkAuth(player.getName()) && !PlayerUtils.isNpc(player);
|
||||||
}
|
}
|
||||||
|
public boolean shouldCancelInvEvent(Player player) {
|
||||||
|
try {
|
||||||
|
return !AuthMe.settings.getProperty(SecuritySettings.GUI_CAPTCHA) || authmeApi.isRegistered(player.getName()) || GuiCaptchaHandler.closeReasonMap.containsKey(player)/* || !player.getOpenInventory().getTitle().equals("请验证你是真人")*/;
|
||||||
|
} catch (Exception e) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void reload(Settings settings) {
|
public void reload(Settings settings) {
|
||||||
@ -93,7 +105,7 @@ class ListenerService implements SettingsDependent {
|
|||||||
* @return true if the player may play, false otherwise
|
* @return true if the player may play, false otherwise
|
||||||
*/
|
*/
|
||||||
private boolean checkAuth(String name) {
|
private boolean checkAuth(String name) {
|
||||||
if (validationService.isUnrestricted(name) || playerCache.isAuthenticated(name)) {
|
if (validationService.isUnrestricted(name) || playerCache.isAuthenticated(name)){
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
if (!isRegistrationForced && !dataSource.isAuthAvailable(name)) {
|
if (!isRegistrationForced && !dataSource.isAuthAvailable(name)) {
|
||||||
|
|||||||
@ -0,0 +1,130 @@
|
|||||||
|
package fr.xephi.authme.listener;
|
||||||
|
|
||||||
|
import fr.xephi.authme.AuthMe;
|
||||||
|
import fr.xephi.authme.api.v3.AuthMeApi;
|
||||||
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.message.Messages;
|
||||||
|
import fr.xephi.authme.settings.Settings;
|
||||||
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
|
import fr.xephi.authme.util.TeleportUtils;
|
||||||
|
import org.bukkit.Location;
|
||||||
|
import org.bukkit.Material;
|
||||||
|
import org.bukkit.World;
|
||||||
|
import org.bukkit.block.Block;
|
||||||
|
import org.bukkit.block.BlockFace;
|
||||||
|
import org.bukkit.entity.Player;
|
||||||
|
import org.bukkit.event.EventHandler;
|
||||||
|
import org.bukkit.event.Listener;
|
||||||
|
import org.bukkit.event.player.PlayerJoinEvent;
|
||||||
|
|
||||||
|
import javax.inject.Inject;
|
||||||
|
import java.lang.reflect.Method;
|
||||||
|
|
||||||
|
|
||||||
|
public class LoginLocationFixListener implements Listener {
|
||||||
|
@Inject
|
||||||
|
private AuthMe plugin;
|
||||||
|
@Inject
|
||||||
|
private Messages messages;
|
||||||
|
@Inject
|
||||||
|
private Settings settings;
|
||||||
|
private final AuthMeApi authmeApi = AuthMeApi.getInstance();
|
||||||
|
|
||||||
|
public LoginLocationFixListener() {
|
||||||
|
}
|
||||||
|
|
||||||
|
private static Material materialPortal = Material.matchMaterial("PORTAL");
|
||||||
|
|
||||||
|
private static boolean isAvailable; // false: unchecked/method not available true: method is available
|
||||||
|
BlockFace[] faces = {BlockFace.WEST, BlockFace.EAST, BlockFace.NORTH, BlockFace.SOUTH, BlockFace.SOUTH_EAST, BlockFace.SOUTH_WEST, BlockFace.NORTH_EAST, BlockFace.NORTH_WEST};
|
||||||
|
|
||||||
|
static {
|
||||||
|
if (materialPortal == null) {
|
||||||
|
materialPortal = Material.matchMaterial("PORTAL_BLOCK");
|
||||||
|
if (materialPortal == null) {
|
||||||
|
materialPortal = Material.matchMaterial("NETHER_PORTAL");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
try {
|
||||||
|
Method getMinHeightMethod = World.class.getMethod("getMinHeight");
|
||||||
|
isAvailable = true;
|
||||||
|
} catch (NoSuchMethodException e) {
|
||||||
|
isAvailable = false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private int getMinHeight(World world) {
|
||||||
|
//This keeps compatibility of 1.16.x and lower
|
||||||
|
if (isAvailable) {
|
||||||
|
return world.getMinHeight();
|
||||||
|
} else {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@EventHandler
|
||||||
|
public void onPlayerJoin(PlayerJoinEvent event) {
|
||||||
|
Player player = event.getPlayer();
|
||||||
|
Location JoinLocation = player.getLocation();
|
||||||
|
if (settings.getProperty(SecuritySettings.LOGIN_LOC_FIX_SUB_PORTAL)) {
|
||||||
|
if (!JoinLocation.getBlock().getType().equals(materialPortal) && !JoinLocation.getBlock().getRelative(BlockFace.UP).getType().equals(materialPortal)) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
Block JoinBlock = JoinLocation.getBlock();
|
||||||
|
boolean solved = false;
|
||||||
|
for (BlockFace face : faces) {
|
||||||
|
if (JoinBlock.getRelative(face).getType().equals(Material.AIR) && JoinBlock.getRelative(face).getRelative(BlockFace.UP).getType().equals(Material.AIR)) {
|
||||||
|
if (settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
|
||||||
|
TeleportUtils.teleport(player, JoinBlock.getRelative(face).getLocation().add(0.5, 0.1, 0.5));
|
||||||
|
} else {
|
||||||
|
player.teleport(JoinBlock.getRelative(face).getLocation().add(0.5, 0.1, 0.5));
|
||||||
|
}
|
||||||
|
solved = true;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (!solved) {
|
||||||
|
JoinBlock.getRelative(BlockFace.UP).breakNaturally();
|
||||||
|
JoinBlock.breakNaturally();
|
||||||
|
}
|
||||||
|
messages.send(player, MessageKey.LOCATION_FIX_PORTAL);
|
||||||
|
}
|
||||||
|
if (settings.getProperty(SecuritySettings.LOGIN_LOC_FIX_SUB_UNDERGROUND)) {
|
||||||
|
Material UpType = JoinLocation.getBlock().getRelative(BlockFace.UP).getType();
|
||||||
|
World world = player.getWorld();
|
||||||
|
int MaxHeight = world.getMaxHeight();
|
||||||
|
int MinHeight = getMinHeight(world);
|
||||||
|
if (!UpType.isOccluding() && !UpType.equals(Material.LAVA)) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
for (int i = MinHeight; i <= MaxHeight; i++) {
|
||||||
|
JoinLocation.setY(i);
|
||||||
|
Block JoinBlock = JoinLocation.getBlock();
|
||||||
|
if ((JoinBlock.getRelative(BlockFace.DOWN).getType().isBlock())
|
||||||
|
&& JoinBlock.getType().equals(Material.AIR)
|
||||||
|
&& JoinBlock.getRelative(BlockFace.UP).getType().equals(Material.AIR)) {
|
||||||
|
if (JoinBlock.getRelative(BlockFace.DOWN).getType().equals(Material.LAVA)) {
|
||||||
|
JoinBlock.getRelative(BlockFace.DOWN).setType(Material.DIRT);
|
||||||
|
}
|
||||||
|
if (settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
|
||||||
|
TeleportUtils.teleport(player, JoinBlock.getLocation().add(0.5, 0.1, 0.5));
|
||||||
|
} else {
|
||||||
|
player.teleport(JoinBlock.getLocation().add(0.5, 0.1, 0.5));
|
||||||
|
}
|
||||||
|
messages.send(player, MessageKey.LOCATION_FIX_UNDERGROUND);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
if (i == MaxHeight) {
|
||||||
|
if (settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
|
||||||
|
TeleportUtils.teleport(player, JoinBlock.getLocation().add(0.5, 1.1, 0.5));
|
||||||
|
} else {
|
||||||
|
player.teleport(JoinBlock.getLocation().add(0.5, 1.1, 0.5));
|
||||||
|
}
|
||||||
|
messages.send(player, MessageKey.LOCATION_FIX_UNDERGROUND_CANT_FIX);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
@ -4,9 +4,9 @@ import fr.xephi.authme.ConsoleLogger;
|
|||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
import fr.xephi.authme.data.auth.PlayerAuth;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.initialization.Reloadable;
|
import fr.xephi.authme.initialization.Reloadable;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
import fr.xephi.authme.message.Messages;
|
import fr.xephi.authme.message.Messages;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
import fr.xephi.authme.permission.PermissionsManager;
|
||||||
import fr.xephi.authme.permission.PlayerStatePermission;
|
import fr.xephi.authme.permission.PlayerStatePermission;
|
||||||
import fr.xephi.authme.service.AntiBotService;
|
import fr.xephi.authme.service.AntiBotService;
|
||||||
|
|||||||
@ -1,5 +1,6 @@
|
|||||||
package fr.xephi.authme.listener;
|
package fr.xephi.authme.listener;
|
||||||
|
|
||||||
|
import fr.xephi.authme.api.v3.AuthMeApi;
|
||||||
import fr.xephi.authme.data.QuickCommandsProtectionManager;
|
import fr.xephi.authme.data.QuickCommandsProtectionManager;
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
import fr.xephi.authme.data.auth.PlayerAuth;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
@ -18,6 +19,8 @@ import fr.xephi.authme.settings.SpawnLoader;
|
|||||||
import fr.xephi.authme.settings.properties.HooksSettings;
|
import fr.xephi.authme.settings.properties.HooksSettings;
|
||||||
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
||||||
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
||||||
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
|
import fr.xephi.authme.util.TeleportUtils;
|
||||||
import org.bukkit.ChatColor;
|
import org.bukkit.ChatColor;
|
||||||
import org.bukkit.Location;
|
import org.bukkit.Location;
|
||||||
import org.bukkit.entity.HumanEntity;
|
import org.bukkit.entity.HumanEntity;
|
||||||
@ -45,7 +48,6 @@ import org.bukkit.event.player.PlayerJoinEvent;
|
|||||||
import org.bukkit.event.player.PlayerKickEvent;
|
import org.bukkit.event.player.PlayerKickEvent;
|
||||||
import org.bukkit.event.player.PlayerLoginEvent;
|
import org.bukkit.event.player.PlayerLoginEvent;
|
||||||
import org.bukkit.event.player.PlayerMoveEvent;
|
import org.bukkit.event.player.PlayerMoveEvent;
|
||||||
import org.bukkit.event.player.PlayerPickupItemEvent;
|
|
||||||
import org.bukkit.event.player.PlayerQuitEvent;
|
import org.bukkit.event.player.PlayerQuitEvent;
|
||||||
import org.bukkit.event.player.PlayerRespawnEvent;
|
import org.bukkit.event.player.PlayerRespawnEvent;
|
||||||
import org.bukkit.event.player.PlayerShearEntityEvent;
|
import org.bukkit.event.player.PlayerShearEntityEvent;
|
||||||
@ -57,11 +59,16 @@ import java.util.Set;
|
|||||||
|
|
||||||
import static fr.xephi.authme.settings.properties.RestrictionSettings.ALLOWED_MOVEMENT_RADIUS;
|
import static fr.xephi.authme.settings.properties.RestrictionSettings.ALLOWED_MOVEMENT_RADIUS;
|
||||||
import static fr.xephi.authme.settings.properties.RestrictionSettings.ALLOW_UNAUTHED_MOVEMENT;
|
import static fr.xephi.authme.settings.properties.RestrictionSettings.ALLOW_UNAUTHED_MOVEMENT;
|
||||||
|
import static org.bukkit.Bukkit.getServer;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Listener class for player events.
|
* Listener class for player events.
|
||||||
*/
|
*/
|
||||||
public class PlayerListener implements Listener {
|
public class PlayerListener implements Listener{
|
||||||
|
private final AuthMeApi authmeApi = AuthMeApi.getInstance();
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
private Settings settings;
|
private Settings settings;
|
||||||
@ -92,9 +99,11 @@ public class PlayerListener implements Listener {
|
|||||||
@Inject
|
@Inject
|
||||||
private QuickCommandsProtectionManager quickCommandsProtectionManager;
|
private QuickCommandsProtectionManager quickCommandsProtectionManager;
|
||||||
|
|
||||||
|
|
||||||
// Lowest priority to apply fast protection checks
|
// Lowest priority to apply fast protection checks
|
||||||
@EventHandler(priority = EventPriority.LOWEST)
|
@EventHandler(priority = EventPriority.LOWEST)
|
||||||
public void onAsyncPlayerPreLoginEventLowest(AsyncPlayerPreLoginEvent event) {
|
public void onAsyncPlayerPreLoginEventLowest(AsyncPlayerPreLoginEvent event) {
|
||||||
|
|
||||||
if (event.getLoginResult() != AsyncPlayerPreLoginEvent.Result.ALLOWED) {
|
if (event.getLoginResult() != AsyncPlayerPreLoginEvent.Result.ALLOWED) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
@ -110,13 +119,18 @@ public class PlayerListener implements Listener {
|
|||||||
if (validationService.isUnrestricted(name)) {
|
if (validationService.isUnrestricted(name)) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
if (settings.getProperty(HooksSettings.HOOK_FLOODGATE_PLAYER)) {
|
||||||
|
if (getServer().getPluginManager().getPlugin("floodgate") != null) {
|
||||||
|
if (org.geysermc.floodgate.api.FloodgateApi.getInstance().isFloodgateId(event.getUniqueId())) return;
|
||||||
|
}
|
||||||
|
}
|
||||||
// Non-blocking checks
|
// Non-blocking checks
|
||||||
try {
|
try {
|
||||||
onJoinVerifier.checkIsValidName(name);
|
onJoinVerifier.checkIsValidName(name);
|
||||||
} catch (FailedVerificationException e) {
|
} catch (FailedVerificationException e) {
|
||||||
event.setKickMessage(messages.retrieveSingle(name, e.getReason(), e.getArgs()));
|
event.setKickMessage(messages.retrieveSingle(name, e.getReason(), e.getArgs()));
|
||||||
event.setLoginResult(AsyncPlayerPreLoginEvent.Result.KICK_OTHER);
|
event.setLoginResult(AsyncPlayerPreLoginEvent.Result.KICK_OTHER);
|
||||||
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -179,7 +193,7 @@ public class PlayerListener implements Listener {
|
|||||||
@EventHandler(priority = EventPriority.NORMAL)
|
@EventHandler(priority = EventPriority.NORMAL)
|
||||||
public void onPlayerJoin(PlayerJoinEvent event) {
|
public void onPlayerJoin(PlayerJoinEvent event) {
|
||||||
final Player player = event.getPlayer();
|
final Player player = event.getPlayer();
|
||||||
|
final AuthMeApi authmeApi = AuthMeApi.getInstance();
|
||||||
if (!PlayerListener19Spigot.isPlayerSpawnLocationEventCalled()) {
|
if (!PlayerListener19Spigot.isPlayerSpawnLocationEventCalled()) {
|
||||||
teleportationService.teleportOnJoin(player);
|
teleportationService.teleportOnJoin(player);
|
||||||
}
|
}
|
||||||
@ -189,12 +203,15 @@ public class PlayerListener implements Listener {
|
|||||||
management.performJoin(player);
|
management.performJoin(player);
|
||||||
|
|
||||||
teleportationService.teleportNewPlayerToFirstSpawn(player);
|
teleportationService.teleportNewPlayerToFirstSpawn(player);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@EventHandler(priority = EventPriority.HIGH) // HIGH as EssentialsX listens at HIGHEST
|
@EventHandler(priority = EventPriority.HIGH) // HIGH as EssentialsX listens at HIGHEST
|
||||||
public void onJoinMessage(PlayerJoinEvent event) {
|
public void onJoinMessage(PlayerJoinEvent event) {
|
||||||
final Player player = event.getPlayer();
|
final Player player = event.getPlayer();
|
||||||
|
|
||||||
|
|
||||||
// Note: join message can be null, despite api documentation says not
|
// Note: join message can be null, despite api documentation says not
|
||||||
if (settings.getProperty(RegistrationSettings.REMOVE_JOIN_MESSAGE)) {
|
if (settings.getProperty(RegistrationSettings.REMOVE_JOIN_MESSAGE)) {
|
||||||
event.setJoinMessage(null);
|
event.setJoinMessage(null);
|
||||||
@ -329,12 +346,12 @@ public class PlayerListener implements Listener {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Limit player X and Z movements to 1 block
|
* Limit player X and Z movements
|
||||||
* Deny player Y+ movements (allows falling)
|
* Deny player Y+ movements (allows falling)
|
||||||
*/
|
*/
|
||||||
|
|
||||||
if (from.getBlockX() == to.getBlockX()
|
if (from.getX() == to.getX()
|
||||||
&& from.getBlockZ() == to.getBlockZ()
|
&& from.getZ() == to.getZ()
|
||||||
&& from.getY() - to.getY() >= 0) {
|
&& from.getY() - to.getY() >= 0) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
@ -357,9 +374,17 @@ public class PlayerListener implements Listener {
|
|||||||
Location spawn = spawnLoader.getSpawnLocation(player);
|
Location spawn = spawnLoader.getSpawnLocation(player);
|
||||||
if (spawn != null && spawn.getWorld() != null) {
|
if (spawn != null && spawn.getWorld() != null) {
|
||||||
if (!player.getWorld().equals(spawn.getWorld())) {
|
if (!player.getWorld().equals(spawn.getWorld())) {
|
||||||
player.teleport(spawn);
|
if(settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
|
||||||
|
TeleportUtils.teleport(player,spawn);
|
||||||
|
} else {
|
||||||
|
player.teleport(spawn);
|
||||||
|
}
|
||||||
} else if (spawn.distance(player.getLocation()) > settings.getProperty(ALLOWED_MOVEMENT_RADIUS)) {
|
} else if (spawn.distance(player.getLocation()) > settings.getProperty(ALLOWED_MOVEMENT_RADIUS)) {
|
||||||
player.teleport(spawn);
|
if(settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
|
||||||
|
TeleportUtils.teleport(player,spawn);
|
||||||
|
} else {
|
||||||
|
player.teleport(spawn);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -450,12 +475,12 @@ public class PlayerListener implements Listener {
|
|||||||
* Inventory interactions
|
* Inventory interactions
|
||||||
*/
|
*/
|
||||||
|
|
||||||
@EventHandler(ignoreCancelled = true, priority = EventPriority.LOWEST)
|
// @EventHandler(ignoreCancelled = true, priority = EventPriority.LOWEST)
|
||||||
public void onPlayerPickupItem(PlayerPickupItemEvent event) {
|
// public void onPlayerPickupItem(EntityPickupItemEvent event) {
|
||||||
if (listenerService.shouldCancelEvent(event)) {
|
// if (listenerService.shouldCancelEvent(event)) {
|
||||||
event.setCancelled(true);
|
// event.setCancelled(true);
|
||||||
}
|
// }
|
||||||
}
|
// }
|
||||||
|
|
||||||
@EventHandler(ignoreCancelled = true, priority = EventPriority.LOWEST)
|
@EventHandler(ignoreCancelled = true, priority = EventPriority.LOWEST)
|
||||||
public void onPlayerDropItem(PlayerDropItemEvent event) {
|
public void onPlayerDropItem(PlayerDropItemEvent event) {
|
||||||
@ -483,15 +508,16 @@ public class PlayerListener implements Listener {
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
Set<String> whitelist = settings.getProperty(RestrictionSettings.UNRESTRICTED_INVENTORIES);
|
Set<String> whitelist = settings.getProperty(RestrictionSettings.UNRESTRICTED_INVENTORIES);
|
||||||
|
//append a string for String whitelist
|
||||||
return whitelist.contains(ChatColor.stripColor(inventory.getTitle()).toLowerCase(Locale.ROOT));
|
return whitelist.contains(ChatColor.stripColor(inventory.getTitle()).toLowerCase(Locale.ROOT));
|
||||||
}
|
}
|
||||||
|
|
||||||
@EventHandler(ignoreCancelled = true, priority = EventPriority.LOWEST)
|
@EventHandler(ignoreCancelled = true, priority = EventPriority.LOWEST)
|
||||||
public void onPlayerInventoryOpen(InventoryOpenEvent event) {
|
public void onPlayerInventoryOpen(InventoryOpenEvent event) {
|
||||||
final HumanEntity player = event.getPlayer();
|
final HumanEntity player = event.getPlayer();
|
||||||
|
Player ply = (Player) event.getPlayer();
|
||||||
if (listenerService.shouldCancelEvent(player)
|
if (listenerService.shouldCancelEvent(player)
|
||||||
&& !isInventoryWhitelisted(event.getView())) {
|
&& !isInventoryWhitelisted(event.getView()) && listenerService.shouldCancelInvEvent(ply)) {
|
||||||
event.setCancelled(true);
|
event.setCancelled(true);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@ -509,4 +535,12 @@ public class PlayerListener implements Listener {
|
|||||||
event.setCancelled(true);
|
event.setCancelled(true);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
// @EventHandler(priority = EventPriority.LOWEST)
|
||||||
|
// public void onSwitchHand(PlayerSwapHandItemsEvent event) {
|
||||||
|
// Player player = event.getPlayer();
|
||||||
|
// if (!player.isSneaking() || !player.hasPermission("keybindings.use"))
|
||||||
|
// return;
|
||||||
|
// event.setCancelled(true);
|
||||||
|
// Bukkit.dispatchCommand(event.getPlayer(), "help");
|
||||||
|
// }
|
||||||
}
|
}
|
||||||
|
|||||||
@ -0,0 +1,37 @@
|
|||||||
|
package fr.xephi.authme.listener;
|
||||||
|
|
||||||
|
import fr.xephi.authme.settings.Settings;
|
||||||
|
import fr.xephi.authme.settings.properties.PluginSettings;
|
||||||
|
import org.bukkit.Bukkit;
|
||||||
|
import org.bukkit.entity.Player;
|
||||||
|
import org.bukkit.event.EventHandler;
|
||||||
|
import org.bukkit.event.EventPriority;
|
||||||
|
import org.bukkit.event.Listener;
|
||||||
|
import org.bukkit.event.entity.EntityPickupItemEvent;
|
||||||
|
import org.bukkit.event.player.PlayerSwapHandItemsEvent;
|
||||||
|
|
||||||
|
import javax.inject.Inject;
|
||||||
|
|
||||||
|
public class PlayerListenerHigherThan18 implements Listener {
|
||||||
|
@Inject
|
||||||
|
private ListenerService listenerService;
|
||||||
|
|
||||||
|
@Inject
|
||||||
|
private Settings settings;
|
||||||
|
|
||||||
|
@EventHandler(ignoreCancelled = true, priority = EventPriority.LOWEST)
|
||||||
|
public void onPlayerPickupItem(EntityPickupItemEvent event) {
|
||||||
|
if (listenerService.shouldCancelEvent(event)) {
|
||||||
|
event.setCancelled(true);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@EventHandler(priority = EventPriority.LOWEST)
|
||||||
|
public void onSwitchHand(PlayerSwapHandItemsEvent event) {
|
||||||
|
Player player = event.getPlayer();
|
||||||
|
if (player.isSneaking() && player.hasPermission("keybindings.use") && settings.getProperty(PluginSettings.MENU_UNREGISTER_COMPATIBILITY)) {
|
||||||
|
event.setCancelled(true);
|
||||||
|
Bukkit.dispatchCommand(event.getPlayer(), "help");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@ -1,8 +1,8 @@
|
|||||||
package fr.xephi.authme.listener;
|
package fr.xephi.authme.listener;
|
||||||
|
|
||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.listener.protocollib.ProtocolLibService;
|
import fr.xephi.authme.listener.protocollib.ProtocolLibService;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
import fr.xephi.authme.permission.PermissionsManager;
|
||||||
import fr.xephi.authme.service.PluginHookService;
|
import fr.xephi.authme.service.PluginHookService;
|
||||||
import fr.xephi.authme.settings.SpawnLoader;
|
import fr.xephi.authme.settings.SpawnLoader;
|
||||||
|
|||||||
@ -34,7 +34,6 @@ import org.bukkit.Material;
|
|||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
import org.bukkit.inventory.ItemStack;
|
import org.bukkit.inventory.ItemStack;
|
||||||
|
|
||||||
import java.lang.reflect.InvocationTargetException;
|
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
@ -114,10 +113,6 @@ class InventoryPacketAdapter extends PacketAdapter {
|
|||||||
itemListModifier.write(0, Arrays.asList(blankInventory));
|
itemListModifier.write(0, Arrays.asList(blankInventory));
|
||||||
}
|
}
|
||||||
|
|
||||||
try {
|
protocolManager.sendServerPacket(player, inventoryPacket, false);
|
||||||
protocolManager.sendServerPacket(player, inventoryPacket, false);
|
|
||||||
} catch (InvocationTargetException invocationExc) {
|
|
||||||
logger.logException("Error during sending blank inventory", invocationExc);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -40,21 +40,7 @@ public class EmailService {
|
|||||||
return sendMailSsl.hasAllInformation();
|
return sendMailSsl.hasAllInformation();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public boolean sendNewPasswordMail(String name, String mailAddress, String newPass,String ip,String time) {
|
||||||
/**
|
|
||||||
* Sends an email to the user with his new password.
|
|
||||||
*
|
|
||||||
* @param name the name of the player
|
|
||||||
* @param mailAddress the player's email
|
|
||||||
* @param newPass the new password
|
|
||||||
* @return true if email could be sent, false otherwise
|
|
||||||
*/
|
|
||||||
public boolean sendPasswordMail(String name, String mailAddress, String newPass) {
|
|
||||||
if (!hasAllInformation()) {
|
|
||||||
logger.warning("Cannot perform email registration: not all email settings are complete");
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
HtmlEmail email;
|
HtmlEmail email;
|
||||||
try {
|
try {
|
||||||
email = sendMailSsl.initializeMail(mailAddress);
|
email = sendMailSsl.initializeMail(mailAddress);
|
||||||
@ -63,8 +49,7 @@ public class EmailService {
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
String mailText = replaceTagsForPasswordMail(settings.getPasswordEmailMessage(), name, newPass);
|
String mailText = replaceTagsForPasswordMail(settings.getNewPasswordEmailMessage(), name, newPass,ip,time);
|
||||||
// Generate an image?
|
|
||||||
File file = null;
|
File file = null;
|
||||||
if (settings.getProperty(EmailSettings.PASSWORD_AS_IMAGE)) {
|
if (settings.getProperty(EmailSettings.PASSWORD_AS_IMAGE)) {
|
||||||
try {
|
try {
|
||||||
@ -82,16 +67,16 @@ public class EmailService {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Sends an email to the user with the temporary verification code.
|
* Sends an email to the user with his new password.
|
||||||
*
|
*
|
||||||
* @param name the name of the player
|
* @param name the name of the player
|
||||||
* @param mailAddress the player's email
|
* @param mailAddress the player's email
|
||||||
* @param code the verification code
|
* @param newPass the new password
|
||||||
* @return true if email could be sent, false otherwise
|
* @return true if email could be sent, false otherwise
|
||||||
*/
|
*/
|
||||||
public boolean sendVerificationMail(String name, String mailAddress, String code) {
|
public boolean sendPasswordMail(String name, String mailAddress, String newPass, String time) {
|
||||||
if (!hasAllInformation()) {
|
if (!hasAllInformation()) {
|
||||||
logger.warning("Cannot send verification email: not all email settings are complete");
|
logger.warning("Cannot perform email registration: not all email settings are complete");
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -99,13 +84,51 @@ public class EmailService {
|
|||||||
try {
|
try {
|
||||||
email = sendMailSsl.initializeMail(mailAddress);
|
email = sendMailSsl.initializeMail(mailAddress);
|
||||||
} catch (EmailException e) {
|
} catch (EmailException e) {
|
||||||
logger.logException("Failed to create verification email with the given settings:", e);
|
logger.logException("Failed to create email with the given settings:", e);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
String mailText = replaceTagsForPasswordMail(settings.getPasswordEmailMessage(), name, newPass,time);
|
||||||
|
// Generate an image?
|
||||||
|
File file = null;
|
||||||
|
if (settings.getProperty(EmailSettings.PASSWORD_AS_IMAGE)) {
|
||||||
|
try {
|
||||||
|
file = generatePasswordImage(name, newPass);
|
||||||
|
mailText = embedImageIntoEmailContent(file, email, mailText);
|
||||||
|
} catch (IOException | EmailException e) {
|
||||||
|
logger.logException(
|
||||||
|
"Unable to send new password as image for email " + mailAddress + ":", e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
boolean couldSendEmail = sendMailSsl.sendEmail(mailText, email);
|
||||||
|
FileUtils.delete(file);
|
||||||
|
return couldSendEmail;
|
||||||
|
}
|
||||||
|
/**
|
||||||
|
* Sends an email to the user with the temporary verification code.
|
||||||
|
*
|
||||||
|
* @param name the name of the player
|
||||||
|
* @param mailAddress the player's email
|
||||||
|
* @param code the verification code
|
||||||
|
*/
|
||||||
|
public void sendVerificationMail(String name, String mailAddress, String code, String time) {
|
||||||
|
if (!hasAllInformation()) {
|
||||||
|
logger.warning("Cannot send verification email: not all email settings are complete");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
HtmlEmail email;
|
||||||
|
try {
|
||||||
|
email = sendMailSsl.initializeMail(mailAddress);
|
||||||
|
} catch (EmailException e) {
|
||||||
|
logger.logException("Failed to create verification email with the given settings:", e);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
String mailText = replaceTagsForVerificationEmail(settings.getVerificationEmailMessage(), name, code,
|
String mailText = replaceTagsForVerificationEmail(settings.getVerificationEmailMessage(), name, code,
|
||||||
settings.getProperty(SecuritySettings.VERIFICATION_CODE_EXPIRATION_MINUTES));
|
settings.getProperty(SecuritySettings.VERIFICATION_CODE_EXPIRATION_MINUTES),time);
|
||||||
return sendMailSsl.sendEmail(mailText, email);
|
sendMailSsl.sendEmail(mailText, email);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -116,7 +139,7 @@ public class EmailService {
|
|||||||
* @param code the recovery code
|
* @param code the recovery code
|
||||||
* @return true if email could be sent, false otherwise
|
* @return true if email could be sent, false otherwise
|
||||||
*/
|
*/
|
||||||
public boolean sendRecoveryCode(String name, String email, String code) {
|
public boolean sendRecoveryCode(String name, String email, String code, String time) {
|
||||||
HtmlEmail htmlEmail;
|
HtmlEmail htmlEmail;
|
||||||
try {
|
try {
|
||||||
htmlEmail = sendMailSsl.initializeMail(email);
|
htmlEmail = sendMailSsl.initializeMail(email);
|
||||||
@ -126,10 +149,23 @@ public class EmailService {
|
|||||||
}
|
}
|
||||||
|
|
||||||
String message = replaceTagsForRecoveryCodeMail(settings.getRecoveryCodeEmailMessage(),
|
String message = replaceTagsForRecoveryCodeMail(settings.getRecoveryCodeEmailMessage(),
|
||||||
name, code, settings.getProperty(SecuritySettings.RECOVERY_CODE_HOURS_VALID));
|
name, code, settings.getProperty(SecuritySettings.RECOVERY_CODE_HOURS_VALID),time);
|
||||||
return sendMailSsl.sendEmail(message, htmlEmail);
|
return sendMailSsl.sendEmail(message, htmlEmail);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public void sendShutDown(String email, String time) {
|
||||||
|
HtmlEmail htmlEmail;
|
||||||
|
try {
|
||||||
|
htmlEmail = sendMailSsl.initializeMail(email);
|
||||||
|
} catch (EmailException e) {
|
||||||
|
logger.logException("Failed to create email for recovery code:", e);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
String message = replaceTagsForShutDownMail(settings.getShutdownEmailMessage(), time);
|
||||||
|
sendMailSsl.sendEmail(message, htmlEmail);
|
||||||
|
}
|
||||||
|
|
||||||
private File generatePasswordImage(String name, String newPass) throws IOException {
|
private File generatePasswordImage(String name, String newPass) throws IOException {
|
||||||
ImageGenerator gen = new ImageGenerator(newPass);
|
ImageGenerator gen = new ImageGenerator(newPass);
|
||||||
File file = new File(dataFolder, name + "_new_pass.jpg");
|
File file = new File(dataFolder, name + "_new_pass.jpg");
|
||||||
@ -144,26 +180,44 @@ public class EmailService {
|
|||||||
return content.replace("<image />", "<img src=\"cid:" + tag + "\">");
|
return content.replace("<image />", "<img src=\"cid:" + tag + "\">");
|
||||||
}
|
}
|
||||||
|
|
||||||
private String replaceTagsForPasswordMail(String mailText, String name, String newPass) {
|
private String replaceTagsForPasswordMail(String mailText, String name, String newPass,String ip,String time) {
|
||||||
return mailText
|
return mailText
|
||||||
.replace("<playername />", name)
|
.replace("<playername />", name)
|
||||||
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
||||||
.replace("<generatedpass />", newPass);
|
.replace("<generatedpass />", newPass)
|
||||||
|
.replace("<playerip />", ip)
|
||||||
|
.replace("<time />", time);
|
||||||
}
|
}
|
||||||
|
|
||||||
private String replaceTagsForVerificationEmail(String mailText, String name, String code, int minutesValid) {
|
private String replaceTagsForPasswordMail(String mailText, String name, String newPass, String time) {
|
||||||
|
return mailText
|
||||||
|
.replace("<playername />", name)
|
||||||
|
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
||||||
|
.replace("<generatedpass />", newPass)
|
||||||
|
.replace("<time />", time);
|
||||||
|
}
|
||||||
|
|
||||||
|
private String replaceTagsForVerificationEmail(String mailText, String name, String code, int minutesValid, String time) {
|
||||||
return mailText
|
return mailText
|
||||||
.replace("<playername />", name)
|
.replace("<playername />", name)
|
||||||
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
||||||
.replace("<generatedcode />", code)
|
.replace("<generatedcode />", code)
|
||||||
.replace("<minutesvalid />", String.valueOf(minutesValid));
|
.replace("<minutesvalid />", String.valueOf(minutesValid))
|
||||||
|
.replace("<time />", time);
|
||||||
}
|
}
|
||||||
|
|
||||||
private String replaceTagsForRecoveryCodeMail(String mailText, String name, String code, int hoursValid) {
|
private String replaceTagsForRecoveryCodeMail(String mailText, String name, String code, int hoursValid, String time) {
|
||||||
return mailText
|
return mailText
|
||||||
.replace("<playername />", name)
|
.replace("<playername />", name)
|
||||||
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
||||||
.replace("<recoverycode />", code)
|
.replace("<recoverycode />", code)
|
||||||
.replace("<hoursvalid />", String.valueOf(hoursValid));
|
.replace("<hoursvalid />", String.valueOf(hoursValid))
|
||||||
|
.replace("<time />", time);
|
||||||
}
|
}
|
||||||
|
private String replaceTagsForShutDownMail(String mailText, String time) {
|
||||||
|
return mailText
|
||||||
|
.replace("<servername />", settings.getProperty(PluginSettings.SERVER_NAME))
|
||||||
|
.replace("<time />", time);
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -1,9 +1,6 @@
|
|||||||
package fr.xephi.authme.mail;
|
package fr.xephi.authme.mail;
|
||||||
|
|
||||||
import java.awt.Color;
|
import java.awt.*;
|
||||||
import java.awt.Font;
|
|
||||||
import java.awt.GradientPaint;
|
|
||||||
import java.awt.Graphics2D;
|
|
||||||
import java.awt.image.BufferedImage;
|
import java.awt.image.BufferedImage;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|||||||
@ -4,14 +4,84 @@ package fr.xephi.authme.message;
|
|||||||
* Keys for translatable messages managed by {@link Messages}.
|
* Keys for translatable messages managed by {@link Messages}.
|
||||||
*/
|
*/
|
||||||
public enum MessageKey {
|
public enum MessageKey {
|
||||||
|
/**
|
||||||
|
* You have been disconnected due to doubled login.
|
||||||
|
*/
|
||||||
|
DOUBLE_LOGIN_FIX("double_login_fix.fix_message"),
|
||||||
|
|
||||||
/** In order to use this command you must be authenticated! */
|
/**
|
||||||
|
* You are stuck in portal during Login.
|
||||||
|
*/
|
||||||
|
LOCATION_FIX_PORTAL("login_location_fix.fix_portal"),
|
||||||
|
|
||||||
|
/**
|
||||||
|
* You are stuck underground during Login.
|
||||||
|
*/
|
||||||
|
LOCATION_FIX_UNDERGROUND("login_location_fix.fix_underground"),
|
||||||
|
|
||||||
|
/**
|
||||||
|
* You are stuck underground during Login, but we cant fix it.
|
||||||
|
*/
|
||||||
|
LOCATION_FIX_UNDERGROUND_CANT_FIX("login_location_fix.cannot_fix_underground"),
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Bedrock auto login success!
|
||||||
|
*/
|
||||||
|
BEDROCK_AUTO_LOGGED_IN("bedrock_auto_login.success"),
|
||||||
|
|
||||||
|
/**
|
||||||
|
* %random Verification
|
||||||
|
*/
|
||||||
|
GUI_CAPTCHA_WINDOW_NAME("gui_captcha.captcha_window_name", "%random"),
|
||||||
|
|
||||||
|
/**
|
||||||
|
* %random I am human
|
||||||
|
*/
|
||||||
|
GUI_CAPTCHA_CLICKABLE_NAME("gui_captcha.captcha_clickable_name", "%random"),
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Verification failed, you have %times retries left
|
||||||
|
*/
|
||||||
|
GUI_CAPTCHA_RETRY_MESSAGE("gui_captcha.message_on_retry", "%times"),
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Bedrock verification success!
|
||||||
|
*/
|
||||||
|
GUI_CAPTCHA_VERIFIED_AUTO_BEDROCK("gui_captcha.bedrock_auto_verify_success"),
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Please be verified before chatting!
|
||||||
|
*/
|
||||||
|
GUI_CAPTCHA_DENIED_MESSAGE("gui_captcha.denied_message_sending"),
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Verification timed out!
|
||||||
|
*/
|
||||||
|
GUI_CAPTCHA_KICK_TIMEOUT("gui_captcha.kick_on_timeout"),
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Please complete the verification!
|
||||||
|
*/
|
||||||
|
GUI_CAPTCHA_KICK_FAILED("gui_captcha.kick_on_failed"),
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Verification success!
|
||||||
|
*/
|
||||||
|
GUI_CAPTCHA_VERIFIED("gui_captcha.success"),
|
||||||
|
|
||||||
|
/**
|
||||||
|
* In order to use this command you must be authenticated!
|
||||||
|
*/
|
||||||
DENIED_COMMAND("error.denied_command"),
|
DENIED_COMMAND("error.denied_command"),
|
||||||
|
|
||||||
/** A player with the same IP is already in game! */
|
/**
|
||||||
|
* A player with the same IP is already in game!
|
||||||
|
*/
|
||||||
SAME_IP_ONLINE("on_join_validation.same_ip_online"),
|
SAME_IP_ONLINE("on_join_validation.same_ip_online"),
|
||||||
|
|
||||||
/** In order to chat you must be authenticated! */
|
/**
|
||||||
|
* In order to chat you must be authenticated!
|
||||||
|
*/
|
||||||
DENIED_CHAT("error.denied_chat"),
|
DENIED_CHAT("error.denied_chat"),
|
||||||
|
|
||||||
/** AntiBot protection mode is enabled! You have to wait some minutes before joining the server. */
|
/** AntiBot protection mode is enabled! You have to wait some minutes before joining the server. */
|
||||||
@ -80,6 +150,9 @@ public enum MessageKey {
|
|||||||
/** The chosen password isn't safe, please choose another one... */
|
/** The chosen password isn't safe, please choose another one... */
|
||||||
PASSWORD_UNSAFE_ERROR("password.unsafe_password"),
|
PASSWORD_UNSAFE_ERROR("password.unsafe_password"),
|
||||||
|
|
||||||
|
/** Your chosen password is not secure. It was used %pwned_count times already! Please use a stronger password... */
|
||||||
|
PASSWORD_PWNED_ERROR("password.pwned_password", "%pwned_count"),
|
||||||
|
|
||||||
/** Your password contains illegal characters. Allowed chars: %valid_chars */
|
/** Your password contains illegal characters. Allowed chars: %valid_chars */
|
||||||
PASSWORD_CHARACTERS_ERROR("password.forbidden_characters", "%valid_chars"),
|
PASSWORD_CHARACTERS_ERROR("password.forbidden_characters", "%valid_chars"),
|
||||||
|
|
||||||
|
|||||||
@ -2,8 +2,8 @@ package fr.xephi.authme.message;
|
|||||||
|
|
||||||
import com.google.common.collect.ImmutableMap;
|
import com.google.common.collect.ImmutableMap;
|
||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.mail.EmailService;
|
import fr.xephi.authme.mail.EmailService;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.util.expiring.Duration;
|
import fr.xephi.authme.util.expiring.Duration;
|
||||||
import org.bukkit.ChatColor;
|
import org.bukkit.ChatColor;
|
||||||
import org.bukkit.command.CommandSender;
|
import org.bukkit.command.CommandSender;
|
||||||
|
|||||||
@ -1,8 +1,8 @@
|
|||||||
package fr.xephi.authme.message;
|
package fr.xephi.authme.message;
|
||||||
|
|
||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.updater.MessageUpdater;
|
import fr.xephi.authme.message.updater.MessageUpdater;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
|
|
||||||
|
|||||||
@ -10,8 +10,8 @@ import ch.jalu.configme.resource.PropertyResource;
|
|||||||
import com.google.common.collect.ImmutableMap;
|
import com.google.common.collect.ImmutableMap;
|
||||||
import com.google.common.io.Files;
|
import com.google.common.io.Files;
|
||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.util.FileUtils;
|
import fr.xephi.authme.util.FileUtils;
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
@ -149,6 +149,10 @@ public class MessageUpdater {
|
|||||||
.put("verification", "Verification code")
|
.put("verification", "Verification code")
|
||||||
.put("time", "Time units")
|
.put("time", "Time units")
|
||||||
.put("two_factor", "Two-factor authentication")
|
.put("two_factor", "Two-factor authentication")
|
||||||
|
.put("gui_captcha", "3rd party features: GUI Captcha")
|
||||||
|
.put("bedrock_auto_login", "3rd party features: Bedrock Auto Login")
|
||||||
|
.put("login_location_fix", "3rd party features: Login Location Fix")
|
||||||
|
.put("double_login_fix", "3rd party features: Double Login Fix")
|
||||||
.build();
|
.build();
|
||||||
|
|
||||||
Set<String> addedKeys = new HashSet<>();
|
Set<String> addedKeys = new HashSet<>();
|
||||||
|
|||||||
@ -4,8 +4,8 @@ import fr.xephi.authme.ConsoleLogger;
|
|||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
import fr.xephi.authme.data.auth.PlayerAuth;
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
import fr.xephi.authme.data.auth.PlayerCache;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.process.AsynchronousProcess;
|
import fr.xephi.authme.process.AsynchronousProcess;
|
||||||
import fr.xephi.authme.security.PasswordSecurity;
|
import fr.xephi.authme.security.PasswordSecurity;
|
||||||
import fr.xephi.authme.security.crypts.HashedPassword;
|
import fr.xephi.authme.security.crypts.HashedPassword;
|
||||||
|
|||||||
@ -5,8 +5,8 @@ import fr.xephi.authme.data.auth.PlayerAuth;
|
|||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
import fr.xephi.authme.data.auth.PlayerCache;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.events.EmailChangedEvent;
|
import fr.xephi.authme.events.EmailChangedEvent;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.process.AsynchronousProcess;
|
import fr.xephi.authme.process.AsynchronousProcess;
|
||||||
import fr.xephi.authme.service.BukkitService;
|
import fr.xephi.authme.service.BukkitService;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
|
|||||||
@ -5,8 +5,8 @@ import fr.xephi.authme.data.auth.PlayerAuth;
|
|||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
import fr.xephi.authme.data.auth.PlayerCache;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.events.EmailChangedEvent;
|
import fr.xephi.authme.events.EmailChangedEvent;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.process.AsynchronousProcess;
|
import fr.xephi.authme.process.AsynchronousProcess;
|
||||||
import fr.xephi.authme.service.BukkitService;
|
import fr.xephi.authme.service.BukkitService;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
|
|||||||
@ -5,8 +5,8 @@ import fr.xephi.authme.data.ProxySessionManager;
|
|||||||
import fr.xephi.authme.data.limbo.LimboService;
|
import fr.xephi.authme.data.limbo.LimboService;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.events.ProtectInventoryEvent;
|
import fr.xephi.authme.events.ProtectInventoryEvent;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.permission.PlayerStatePermission;
|
import fr.xephi.authme.permission.PlayerStatePermission;
|
||||||
import fr.xephi.authme.process.AsynchronousProcess;
|
import fr.xephi.authme.process.AsynchronousProcess;
|
||||||
import fr.xephi.authme.process.login.AsynchronousLogin;
|
import fr.xephi.authme.process.login.AsynchronousLogin;
|
||||||
@ -17,7 +17,6 @@ import fr.xephi.authme.service.SessionService;
|
|||||||
import fr.xephi.authme.service.ValidationService;
|
import fr.xephi.authme.service.ValidationService;
|
||||||
import fr.xephi.authme.service.bungeecord.BungeeSender;
|
import fr.xephi.authme.service.bungeecord.BungeeSender;
|
||||||
import fr.xephi.authme.service.bungeecord.MessageType;
|
import fr.xephi.authme.service.bungeecord.MessageType;
|
||||||
import fr.xephi.authme.settings.WelcomeMessageConfiguration;
|
|
||||||
import fr.xephi.authme.settings.commandconfig.CommandManager;
|
import fr.xephi.authme.settings.commandconfig.CommandManager;
|
||||||
import fr.xephi.authme.settings.properties.HooksSettings;
|
import fr.xephi.authme.settings.properties.HooksSettings;
|
||||||
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
||||||
@ -31,7 +30,6 @@ import org.bukkit.potion.PotionEffect;
|
|||||||
import org.bukkit.potion.PotionEffectType;
|
import org.bukkit.potion.PotionEffectType;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
|
|
||||||
import java.util.Locale;
|
import java.util.Locale;
|
||||||
|
|
||||||
import static fr.xephi.authme.service.BukkitService.TICKS_PER_SECOND;
|
import static fr.xephi.authme.service.BukkitService.TICKS_PER_SECOND;
|
||||||
@ -71,9 +69,6 @@ public class AsynchronousJoin implements AsynchronousProcess {
|
|||||||
@Inject
|
@Inject
|
||||||
private ValidationService validationService;
|
private ValidationService validationService;
|
||||||
|
|
||||||
@Inject
|
|
||||||
private WelcomeMessageConfiguration welcomeMessageConfiguration;
|
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
private SessionService sessionService;
|
private SessionService sessionService;
|
||||||
|
|
||||||
@ -150,9 +145,6 @@ public class AsynchronousJoin implements AsynchronousProcess {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
} else if (!service.getProperty(RegistrationSettings.FORCE)) {
|
} else if (!service.getProperty(RegistrationSettings.FORCE)) {
|
||||||
bukkitService.scheduleSyncTaskFromOptionallyAsyncTask(() -> {
|
|
||||||
welcomeMessageConfiguration.sendWelcomeMessage(player);
|
|
||||||
});
|
|
||||||
|
|
||||||
// Skip if registration is optional
|
// Skip if registration is optional
|
||||||
|
|
||||||
|
|||||||
@ -12,9 +12,9 @@ import fr.xephi.authme.data.limbo.LimboService;
|
|||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.events.AuthMeAsyncPreLoginEvent;
|
import fr.xephi.authme.events.AuthMeAsyncPreLoginEvent;
|
||||||
import fr.xephi.authme.events.FailedLoginEvent;
|
import fr.xephi.authme.events.FailedLoginEvent;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.mail.EmailService;
|
import fr.xephi.authme.mail.EmailService;
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.permission.AdminPermission;
|
import fr.xephi.authme.permission.AdminPermission;
|
||||||
import fr.xephi.authme.permission.PlayerPermission;
|
import fr.xephi.authme.permission.PlayerPermission;
|
||||||
import fr.xephi.authme.permission.PlayerStatePermission;
|
import fr.xephi.authme.permission.PlayerStatePermission;
|
||||||
|
|||||||
@ -14,7 +14,6 @@ import fr.xephi.authme.service.CommonService;
|
|||||||
import fr.xephi.authme.service.JoinMessageService;
|
import fr.xephi.authme.service.JoinMessageService;
|
||||||
import fr.xephi.authme.service.TeleportationService;
|
import fr.xephi.authme.service.TeleportationService;
|
||||||
import fr.xephi.authme.service.bungeecord.BungeeSender;
|
import fr.xephi.authme.service.bungeecord.BungeeSender;
|
||||||
import fr.xephi.authme.settings.WelcomeMessageConfiguration;
|
|
||||||
import fr.xephi.authme.settings.commandconfig.CommandManager;
|
import fr.xephi.authme.settings.commandconfig.CommandManager;
|
||||||
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
@ -49,9 +48,6 @@ public class ProcessSyncPlayerLogin implements SynchronousProcess {
|
|||||||
@Inject
|
@Inject
|
||||||
private CommonService commonService;
|
private CommonService commonService;
|
||||||
|
|
||||||
@Inject
|
|
||||||
private WelcomeMessageConfiguration welcomeMessageConfiguration;
|
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
private JoinMessageService joinMessageService;
|
private JoinMessageService joinMessageService;
|
||||||
|
|
||||||
@ -102,9 +98,6 @@ public class ProcessSyncPlayerLogin implements SynchronousProcess {
|
|||||||
// The Login event now fires (as intended) after everything is processed
|
// The Login event now fires (as intended) after everything is processed
|
||||||
bukkitService.callEvent(new LoginEvent(player));
|
bukkitService.callEvent(new LoginEvent(player));
|
||||||
|
|
||||||
// Login is done, display welcome message
|
|
||||||
welcomeMessageConfiguration.sendWelcomeMessage(player);
|
|
||||||
|
|
||||||
// Login is now finished; we can force all commands
|
// Login is now finished; we can force all commands
|
||||||
if (isFirstLogin) {
|
if (isFirstLogin) {
|
||||||
commandManager.runCommandsOnFirstLogin(player, authsWithSameIp);
|
commandManager.runCommandsOnFirstLogin(player, authsWithSameIp);
|
||||||
|
|||||||
@ -3,9 +3,9 @@ package fr.xephi.authme.process.logout;
|
|||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.data.limbo.LimboService;
|
import fr.xephi.authme.data.limbo.LimboService;
|
||||||
import fr.xephi.authme.events.LogoutEvent;
|
import fr.xephi.authme.events.LogoutEvent;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.listener.protocollib.ProtocolLibService;
|
import fr.xephi.authme.listener.protocollib.ProtocolLibService;
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.process.SynchronousProcess;
|
import fr.xephi.authme.process.SynchronousProcess;
|
||||||
import fr.xephi.authme.service.BukkitService;
|
import fr.xephi.authme.service.BukkitService;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
|
|||||||
@ -3,8 +3,8 @@ package fr.xephi.authme.process.register;
|
|||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.data.limbo.LimboService;
|
import fr.xephi.authme.data.limbo.LimboService;
|
||||||
import fr.xephi.authme.events.RegisterEvent;
|
import fr.xephi.authme.events.RegisterEvent;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.process.SynchronousProcess;
|
import fr.xephi.authme.process.SynchronousProcess;
|
||||||
import fr.xephi.authme.service.BukkitService;
|
import fr.xephi.authme.service.BukkitService;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
|
|||||||
@ -3,8 +3,8 @@ package fr.xephi.authme.process.register;
|
|||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.data.limbo.LimboService;
|
import fr.xephi.authme.data.limbo.LimboService;
|
||||||
import fr.xephi.authme.events.RegisterEvent;
|
import fr.xephi.authme.events.RegisterEvent;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.process.SynchronousProcess;
|
import fr.xephi.authme.process.SynchronousProcess;
|
||||||
import fr.xephi.authme.service.BukkitService;
|
import fr.xephi.authme.service.BukkitService;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
|
|||||||
@ -9,10 +9,13 @@ import fr.xephi.authme.security.PasswordSecurity;
|
|||||||
import fr.xephi.authme.security.crypts.HashedPassword;
|
import fr.xephi.authme.security.crypts.HashedPassword;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
import fr.xephi.authme.settings.properties.EmailSettings;
|
import fr.xephi.authme.settings.properties.EmailSettings;
|
||||||
|
import fr.xephi.authme.util.PlayerUtils;
|
||||||
import fr.xephi.authme.util.RandomStringUtils;
|
import fr.xephi.authme.util.RandomStringUtils;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
|
import java.text.SimpleDateFormat;
|
||||||
|
import java.util.Date;
|
||||||
|
|
||||||
import static fr.xephi.authme.permission.PlayerStatePermission.ALLOW_MULTIPLE_ACCOUNTS;
|
import static fr.xephi.authme.permission.PlayerStatePermission.ALLOW_MULTIPLE_ACCOUNTS;
|
||||||
import static fr.xephi.authme.process.register.executors.PlayerAuthBuilderHelper.createPlayerAuth;
|
import static fr.xephi.authme.process.register.executors.PlayerAuthBuilderHelper.createPlayerAuth;
|
||||||
@ -64,8 +67,10 @@ class EmailRegisterExecutor implements RegistrationExecutor<EmailRegisterParams>
|
|||||||
@Override
|
@Override
|
||||||
public void executePostPersistAction(EmailRegisterParams params) {
|
public void executePostPersistAction(EmailRegisterParams params) {
|
||||||
Player player = params.getPlayer();
|
Player player = params.getPlayer();
|
||||||
boolean couldSendMail = emailService.sendPasswordMail(
|
SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
|
||||||
player.getName(), params.getEmail(), params.getPassword());
|
Date date = new Date(System.currentTimeMillis());
|
||||||
|
boolean couldSendMail = emailService.sendNewPasswordMail(
|
||||||
|
player.getName(), params.getEmail(), params.getPassword(), PlayerUtils.getPlayerIp(player), dateFormat.format(date));
|
||||||
if (couldSendMail) {
|
if (couldSendMail) {
|
||||||
syncProcessManager.processSyncEmailRegister(player);
|
syncProcessManager.processSyncEmailRegister(player);
|
||||||
} else {
|
} else {
|
||||||
|
|||||||
@ -7,18 +7,18 @@ import fr.xephi.authme.data.limbo.LimboService;
|
|||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.events.UnregisterByAdminEvent;
|
import fr.xephi.authme.events.UnregisterByAdminEvent;
|
||||||
import fr.xephi.authme.events.UnregisterByPlayerEvent;
|
import fr.xephi.authme.events.UnregisterByPlayerEvent;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.process.AsynchronousProcess;
|
import fr.xephi.authme.process.AsynchronousProcess;
|
||||||
import fr.xephi.authme.security.PasswordSecurity;
|
import fr.xephi.authme.security.PasswordSecurity;
|
||||||
import fr.xephi.authme.service.BukkitService;
|
import fr.xephi.authme.service.BukkitService;
|
||||||
import fr.xephi.authme.service.CommonService;
|
import fr.xephi.authme.service.CommonService;
|
||||||
import fr.xephi.authme.service.TeleportationService;
|
import fr.xephi.authme.service.TeleportationService;
|
||||||
|
import fr.xephi.authme.service.bungeecord.BungeeSender;
|
||||||
import fr.xephi.authme.service.bungeecord.MessageType;
|
import fr.xephi.authme.service.bungeecord.MessageType;
|
||||||
import fr.xephi.authme.settings.commandconfig.CommandManager;
|
import fr.xephi.authme.settings.commandconfig.CommandManager;
|
||||||
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
||||||
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
||||||
import fr.xephi.authme.service.bungeecord.BungeeSender;
|
|
||||||
import org.bukkit.command.CommandSender;
|
import org.bukkit.command.CommandSender;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
import org.bukkit.potion.PotionEffect;
|
import org.bukkit.potion.PotionEffect;
|
||||||
|
|||||||
@ -308,7 +308,7 @@ public class Whirlpool extends UnsaltedMethod {
|
|||||||
if (bufferRem + sourceBits < 8) {
|
if (bufferRem + sourceBits < 8) {
|
||||||
// all remaining data fits on buffer[bufferPos], and there still
|
// all remaining data fits on buffer[bufferPos], and there still
|
||||||
// remains some space.
|
// remains some space.
|
||||||
bufferBits += sourceBits;
|
bufferBits += (int) sourceBits;
|
||||||
} else {
|
} else {
|
||||||
// buffer[bufferPos] is full:
|
// buffer[bufferPos] is full:
|
||||||
bufferPos++;
|
bufferPos++;
|
||||||
|
|||||||
@ -14,7 +14,6 @@ import fr.xephi.authme.settings.properties.PluginSettings;
|
|||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
|
|
||||||
import java.util.Locale;
|
import java.util.Locale;
|
||||||
|
|
||||||
import static fr.xephi.authme.util.Utils.MILLIS_PER_MINUTE;
|
import static fr.xephi.authme.util.Utils.MILLIS_PER_MINUTE;
|
||||||
|
|||||||
@ -73,7 +73,7 @@ public class AntiBotService implements SettingsDependent {
|
|||||||
// Delay the schedule on first start
|
// Delay the schedule on first start
|
||||||
if (startup) {
|
if (startup) {
|
||||||
int delay = settings.getProperty(ProtectionSettings.ANTIBOT_DELAY);
|
int delay = settings.getProperty(ProtectionSettings.ANTIBOT_DELAY);
|
||||||
bukkitService.scheduleSyncDelayedTask(enableTask, delay * TICKS_PER_SECOND);
|
bukkitService.scheduleSyncDelayedTask(enableTask, (long) delay * TICKS_PER_SECOND);
|
||||||
startup = false;
|
startup = false;
|
||||||
} else {
|
} else {
|
||||||
enableTask.run();
|
enableTask.run();
|
||||||
@ -91,7 +91,7 @@ public class AntiBotService implements SettingsDependent {
|
|||||||
disableTask.cancel();
|
disableTask.cancel();
|
||||||
}
|
}
|
||||||
// Schedule auto-disable
|
// Schedule auto-disable
|
||||||
disableTask = bukkitService.runTaskLater(this::stopProtection, duration * TICKS_PER_MINUTE);
|
disableTask = bukkitService.runTaskLater(this::stopProtection, (long) duration * TICKS_PER_MINUTE);
|
||||||
antiBotStatus = AntiBotStatus.ACTIVE;
|
antiBotStatus = AntiBotStatus.ACTIVE;
|
||||||
bukkitService.scheduleSyncTaskFromOptionallyAsyncTask(() -> {
|
bukkitService.scheduleSyncTaskFromOptionallyAsyncTask(() -> {
|
||||||
// Inform admins
|
// Inform admins
|
||||||
|
|||||||
@ -3,8 +3,8 @@ package fr.xephi.authme.service;
|
|||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.datasource.DataSourceType;
|
import fr.xephi.authme.datasource.DataSourceType;
|
||||||
import fr.xephi.authme.initialization.DataFolder;
|
import fr.xephi.authme.initialization.DataFolder;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.mail.EmailService;
|
import fr.xephi.authme.mail.EmailService;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.settings.Settings;
|
import fr.xephi.authme.settings.Settings;
|
||||||
import fr.xephi.authme.settings.properties.BackupSettings;
|
import fr.xephi.authme.settings.properties.BackupSettings;
|
||||||
import fr.xephi.authme.settings.properties.DatabaseSettings;
|
import fr.xephi.authme.settings.properties.DatabaseSettings;
|
||||||
@ -94,6 +94,9 @@ public class BackupService {
|
|||||||
case SQLITE:
|
case SQLITE:
|
||||||
String dbName = settings.getProperty(DatabaseSettings.MYSQL_DATABASE);
|
String dbName = settings.getProperty(DatabaseSettings.MYSQL_DATABASE);
|
||||||
return performFileBackup(dbName + ".db");
|
return performFileBackup(dbName + ".db");
|
||||||
|
case H2:
|
||||||
|
String h2dbName = settings.getProperty(DatabaseSettings.MYSQL_DATABASE);
|
||||||
|
return performFileBackup(h2dbName + ".mv.db");
|
||||||
default:
|
default:
|
||||||
logger.warning("Unknown data source type '" + dataSourceType + "' for backup");
|
logger.warning("Unknown data source type '" + dataSourceType + "' for backup");
|
||||||
}
|
}
|
||||||
|
|||||||
@ -59,7 +59,7 @@ public class BukkitService implements SettingsDependent {
|
|||||||
* <p>
|
* <p>
|
||||||
* This task will be executed by the main server thread.
|
* This task will be executed by the main server thread.
|
||||||
*
|
*
|
||||||
* @param task Task to be executed
|
* @param task Task to be executed
|
||||||
* @param delay Delay in server ticks before executing task
|
* @param delay Delay in server ticks before executing task
|
||||||
* @return Task id number (-1 if scheduling failed)
|
* @return Task id number (-1 if scheduling failed)
|
||||||
*/
|
*/
|
||||||
@ -98,7 +98,7 @@ public class BukkitService implements SettingsDependent {
|
|||||||
* Returns a task that will run after the specified number of server
|
* Returns a task that will run after the specified number of server
|
||||||
* ticks.
|
* ticks.
|
||||||
*
|
*
|
||||||
* @param task the task to be run
|
* @param task the task to be run
|
||||||
* @param delay the ticks to wait before running the task
|
* @param delay the ticks to wait before running the task
|
||||||
* @return a BukkitTask that contains the id number
|
* @return a BukkitTask that contains the id number
|
||||||
* @throws IllegalArgumentException if plugin is null
|
* @throws IllegalArgumentException if plugin is null
|
||||||
@ -160,12 +160,12 @@ public class BukkitService implements SettingsDependent {
|
|||||||
* Schedules the given task to repeatedly run until cancelled, starting after the
|
* Schedules the given task to repeatedly run until cancelled, starting after the
|
||||||
* specified number of server ticks.
|
* specified number of server ticks.
|
||||||
*
|
*
|
||||||
* @param task the task to schedule
|
* @param task the task to schedule
|
||||||
* @param delay the ticks to wait before running the task
|
* @param delay the ticks to wait before running the task
|
||||||
* @param period the ticks to wait between runs
|
* @param period the ticks to wait between runs
|
||||||
* @return a BukkitTask that contains the id number
|
* @return a BukkitTask that contains the id number
|
||||||
* @throws IllegalArgumentException if plugin is null
|
* @throws IllegalArgumentException if plugin is null
|
||||||
* @throws IllegalStateException if this was already scheduled
|
* @throws IllegalStateException if this was already scheduled
|
||||||
*/
|
*/
|
||||||
public BukkitTask runTaskTimer(BukkitRunnable task, long delay, long period) {
|
public BukkitTask runTaskTimer(BukkitRunnable task, long delay, long period) {
|
||||||
return task.runTaskTimer(authMe, delay, period);
|
return task.runTaskTimer(authMe, delay, period);
|
||||||
|
|||||||
@ -1,9 +1,6 @@
|
|||||||
package fr.xephi.authme.service;
|
package fr.xephi.authme.service;
|
||||||
|
|
||||||
import com.google.common.annotations.VisibleForTesting;
|
import com.google.common.annotations.VisibleForTesting;
|
||||||
import com.google.common.hash.HashCode;
|
|
||||||
import com.google.common.hash.HashFunction;
|
|
||||||
import com.google.common.hash.Hashing;
|
|
||||||
import com.maxmind.db.GeoIp2Provider;
|
import com.maxmind.db.GeoIp2Provider;
|
||||||
import com.maxmind.db.Reader;
|
import com.maxmind.db.Reader;
|
||||||
import com.maxmind.db.Reader.FileMode;
|
import com.maxmind.db.Reader.FileMode;
|
||||||
@ -13,71 +10,42 @@ import com.maxmind.db.model.CountryResponse;
|
|||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.initialization.DataFolder;
|
import fr.xephi.authme.initialization.DataFolder;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.settings.properties.ProtectionSettings;
|
|
||||||
import fr.xephi.authme.util.FileUtils;
|
|
||||||
import fr.xephi.authme.util.InternetProtocolUtils;
|
import fr.xephi.authme.util.InternetProtocolUtils;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
import java.io.BufferedInputStream;
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.net.HttpURLConnection;
|
|
||||||
import java.net.InetAddress;
|
import java.net.InetAddress;
|
||||||
import java.net.URL;
|
|
||||||
import java.net.UnknownHostException;
|
import java.net.UnknownHostException;
|
||||||
import java.nio.file.Files;
|
import java.nio.file.Files;
|
||||||
import java.nio.file.Path;
|
import java.nio.file.Path;
|
||||||
import java.nio.file.StandardCopyOption;
|
|
||||||
import java.nio.file.attribute.FileTime;
|
|
||||||
import java.time.Duration;
|
|
||||||
import java.time.Instant;
|
|
||||||
import java.time.ZoneId;
|
|
||||||
import java.time.ZonedDateTime;
|
|
||||||
import java.time.format.DateTimeFormatter;
|
|
||||||
import java.util.Base64;
|
|
||||||
import java.util.Objects;
|
|
||||||
import java.util.Optional;
|
import java.util.Optional;
|
||||||
import java.util.zip.GZIPInputStream;
|
|
||||||
|
|
||||||
public class GeoIpService {
|
public class GeoIpService {
|
||||||
|
|
||||||
private static final String LICENSE =
|
//private static final String LICENSE =
|
||||||
"[LICENSE] This product includes GeoLite2 data created by MaxMind, available at https://www.maxmind.com";
|
//"[LICENSE] This product includes GeoLite2 data created by MaxMind, available at https://www.maxmind.com";
|
||||||
|
|
||||||
private static final String DATABASE_NAME = "GeoLite2-Country";
|
private static final String DATABASE_NAME = "GeoLite2-Country";
|
||||||
private static final String DATABASE_FILE = DATABASE_NAME + ".mmdb";
|
private static final String DATABASE_FILE = DATABASE_NAME + ".mmdb";
|
||||||
private static final String DATABASE_TMP_FILE = DATABASE_NAME + ".mmdb.tmp";
|
|
||||||
|
|
||||||
private static final String ARCHIVE_FILE = DATABASE_NAME + ".mmdb.gz";
|
|
||||||
|
|
||||||
private static final String ARCHIVE_URL =
|
|
||||||
"https://updates.maxmind.com/geoip/databases/" + DATABASE_NAME + "/update";
|
|
||||||
|
|
||||||
private static final int UPDATE_INTERVAL_DAYS = 30;
|
|
||||||
|
|
||||||
private final ConsoleLogger logger = ConsoleLoggerFactory.get(GeoIpService.class);
|
private final ConsoleLogger logger = ConsoleLoggerFactory.get(GeoIpService.class);
|
||||||
private final Path dataFile;
|
private final Path dataFile;
|
||||||
private final BukkitService bukkitService;
|
|
||||||
private final Settings settings;
|
|
||||||
|
|
||||||
private GeoIp2Provider databaseReader;
|
private GeoIp2Provider databaseReader;
|
||||||
private volatile boolean downloading;
|
private volatile boolean downloading;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
GeoIpService(@DataFolder File dataFolder, BukkitService bukkitService, Settings settings) {
|
GeoIpService(@DataFolder File dataFolder){
|
||||||
this.bukkitService = bukkitService;
|
|
||||||
this.dataFile = dataFolder.toPath().resolve(DATABASE_FILE);
|
this.dataFile = dataFolder.toPath().resolve(DATABASE_FILE);
|
||||||
this.settings = settings;
|
|
||||||
|
|
||||||
// Fires download of recent data or the initialization of the look up service
|
// Fires download of recent data or the initialization of the look up service
|
||||||
isDataAvailable();
|
isDataAvailable();
|
||||||
}
|
}
|
||||||
|
|
||||||
@VisibleForTesting
|
@VisibleForTesting
|
||||||
GeoIpService(@DataFolder File dataFolder, BukkitService bukkitService, Settings settings, GeoIp2Provider reader) {
|
GeoIpService(@DataFolder File dataFolder, GeoIp2Provider reader) {
|
||||||
this.bukkitService = bukkitService;
|
|
||||||
this.settings = settings;
|
|
||||||
this.dataFile = dataFolder.toPath().resolve(DATABASE_FILE);
|
this.dataFile = dataFolder.toPath().resolve(DATABASE_FILE);
|
||||||
|
|
||||||
this.databaseReader = reader;
|
this.databaseReader = reader;
|
||||||
@ -89,12 +57,6 @@ public class GeoIpService {
|
|||||||
* @return True if the data is available, false otherwise.
|
* @return True if the data is available, false otherwise.
|
||||||
*/
|
*/
|
||||||
private synchronized boolean isDataAvailable() {
|
private synchronized boolean isDataAvailable() {
|
||||||
|
|
||||||
// If this feature is disabled, just stop
|
|
||||||
if (!settings.getProperty(ProtectionSettings.ENABLE_GEOIP)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (downloading) {
|
if (downloading) {
|
||||||
// we are currently downloading the database
|
// we are currently downloading the database
|
||||||
return false;
|
return false;
|
||||||
@ -107,77 +69,25 @@ public class GeoIpService {
|
|||||||
|
|
||||||
if (Files.exists(dataFile)) {
|
if (Files.exists(dataFile)) {
|
||||||
try {
|
try {
|
||||||
FileTime lastModifiedTime = Files.getLastModifiedTime(dataFile);
|
startReading();
|
||||||
if (Duration.between(lastModifiedTime.toInstant(), Instant.now()).toDays() <= UPDATE_INTERVAL_DAYS) {
|
return true;
|
||||||
startReading();
|
|
||||||
|
|
||||||
// don't fire the update task - we are up to date
|
|
||||||
return true;
|
|
||||||
} else {
|
|
||||||
logger.debug("GEO IP database is older than " + UPDATE_INTERVAL_DAYS + " Days");
|
|
||||||
}
|
|
||||||
} catch (IOException ioEx) {
|
} catch (IOException ioEx) {
|
||||||
logger.logException("Failed to load GeoLiteAPI database", ioEx);
|
logger.logException("Failed to load GeoLiteAPI database", ioEx);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
//set the downloading flag in order to fix race conditions outside
|
|
||||||
downloading = true;
|
|
||||||
|
|
||||||
// File is outdated or doesn't exist - let's try to download the data file!
|
// File is outdated or doesn't exist - let's try to download the data file!
|
||||||
// use bukkit's cached threads
|
// use bukkit's cached threads
|
||||||
bukkitService.runTaskAsynchronously(this::updateDatabase);
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Tries to update the database by downloading a new version from the website.
|
*
|
||||||
*/
|
*/
|
||||||
private void updateDatabase() {
|
|
||||||
logger.info("Downloading GEO IP database, because the old database is older than "
|
|
||||||
+ UPDATE_INTERVAL_DAYS + " days or doesn't exist");
|
|
||||||
|
|
||||||
Path downloadFile = null;
|
|
||||||
Path tempFile = null;
|
|
||||||
try {
|
|
||||||
// download database to temporarily location
|
|
||||||
downloadFile = Files.createTempFile(ARCHIVE_FILE, null);
|
|
||||||
tempFile = Files.createTempFile(DATABASE_TMP_FILE, null);
|
|
||||||
String expectedChecksum = downloadDatabaseArchive(downloadFile);
|
|
||||||
if (expectedChecksum == null) {
|
|
||||||
logger.info("There is no newer GEO IP database uploaded to MaxMind. Using the old one for now.");
|
|
||||||
startReading();
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// tar extract database and copy to target destination
|
|
||||||
extractDatabase(downloadFile, tempFile);
|
|
||||||
|
|
||||||
// MD5 checksum verification
|
|
||||||
verifyChecksum(Hashing.md5(), tempFile, expectedChecksum);
|
|
||||||
|
|
||||||
Files.copy(tempFile, dataFile, StandardCopyOption.REPLACE_EXISTING);
|
|
||||||
|
|
||||||
//only set this value to false on success otherwise errors could lead to endless download triggers
|
|
||||||
logger.info("Successfully downloaded new GEO IP database to " + dataFile);
|
|
||||||
startReading();
|
|
||||||
} catch (IOException ioEx) {
|
|
||||||
logger.logException("Could not download GeoLiteAPI database", ioEx);
|
|
||||||
} finally {
|
|
||||||
// clean up
|
|
||||||
if (downloadFile != null) {
|
|
||||||
FileUtils.delete(downloadFile.toFile());
|
|
||||||
}
|
|
||||||
if (tempFile != null) {
|
|
||||||
FileUtils.delete(tempFile.toFile());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private void startReading() throws IOException {
|
private void startReading() throws IOException {
|
||||||
databaseReader = new Reader(dataFile.toFile(), FileMode.MEMORY, new CHMCache());
|
databaseReader = new Reader(dataFile.toFile(), FileMode.MEMORY, new CHMCache());
|
||||||
logger.info(LICENSE);
|
|
||||||
|
|
||||||
// clear downloading flag, because we now have working reader instance
|
// clear downloading flag, because we now have working reader instance
|
||||||
downloading = false;
|
downloading = false;
|
||||||
@ -191,39 +101,6 @@ public class GeoIpService {
|
|||||||
* @return null if no updates were found, the MD5 hash of the downloaded archive if successful
|
* @return null if no updates were found, the MD5 hash of the downloaded archive if successful
|
||||||
* @throws IOException if failed during downloading and writing to destination file
|
* @throws IOException if failed during downloading and writing to destination file
|
||||||
*/
|
*/
|
||||||
private String downloadDatabaseArchive(Instant lastModified, Path destination) throws IOException {
|
|
||||||
String clientId = settings.getProperty(ProtectionSettings.MAXMIND_API_CLIENT_ID);
|
|
||||||
String licenseKey = settings.getProperty(ProtectionSettings.MAXMIND_API_LICENSE_KEY);
|
|
||||||
if (clientId.isEmpty() || licenseKey.isEmpty()) {
|
|
||||||
logger.warning("No MaxMind credentials found in the configuration file!"
|
|
||||||
+ " GeoIp protections will be disabled.");
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
HttpURLConnection connection = (HttpURLConnection) new URL(ARCHIVE_URL).openConnection();
|
|
||||||
String basicAuth = "Basic " + new String(Base64.getEncoder().encode((clientId + ":" + licenseKey).getBytes()));
|
|
||||||
connection.setRequestProperty("Authorization", basicAuth);
|
|
||||||
|
|
||||||
if (lastModified != null) {
|
|
||||||
// Only download if we actually need a newer version - this field is specified in GMT zone
|
|
||||||
ZonedDateTime zonedTime = lastModified.atZone(ZoneId.of("GMT"));
|
|
||||||
String timeFormat = DateTimeFormatter.RFC_1123_DATE_TIME.format(zonedTime);
|
|
||||||
connection.addRequestProperty("If-Modified-Since", timeFormat);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (connection.getResponseCode() == HttpURLConnection.HTTP_NOT_MODIFIED) {
|
|
||||||
//we already have the newest version
|
|
||||||
connection.getInputStream().close();
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
String hash = connection.getHeaderField("X-Database-MD5");
|
|
||||||
String rawModifiedDate = connection.getHeaderField("Last-Modified");
|
|
||||||
Instant modifiedDate = Instant.from(DateTimeFormatter.RFC_1123_DATE_TIME.parse(rawModifiedDate));
|
|
||||||
Files.copy(connection.getInputStream(), destination, StandardCopyOption.REPLACE_EXISTING);
|
|
||||||
Files.setLastModifiedTime(destination, FileTime.from(modifiedDate));
|
|
||||||
return hash;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Downloads the archive to the destination file if it's newer than the locally version.
|
* Downloads the archive to the destination file if it's newer than the locally version.
|
||||||
@ -232,14 +109,6 @@ public class GeoIpService {
|
|||||||
* @return null if no updates were found, the MD5 hash of the downloaded archive if successful
|
* @return null if no updates were found, the MD5 hash of the downloaded archive if successful
|
||||||
* @throws IOException if failed during downloading and writing to destination file
|
* @throws IOException if failed during downloading and writing to destination file
|
||||||
*/
|
*/
|
||||||
private String downloadDatabaseArchive(Path destination) throws IOException {
|
|
||||||
Instant lastModified = null;
|
|
||||||
if (Files.exists(dataFile)) {
|
|
||||||
lastModified = Files.getLastModifiedTime(dataFile).toInstant();
|
|
||||||
}
|
|
||||||
|
|
||||||
return downloadDatabaseArchive(lastModified, destination);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Verify if the expected checksum is equal to the checksum of the given file.
|
* Verify if the expected checksum is equal to the checksum of the given file.
|
||||||
@ -249,14 +118,6 @@ public class GeoIpService {
|
|||||||
* @param expectedChecksum the expected checksum
|
* @param expectedChecksum the expected checksum
|
||||||
* @throws IOException on I/O error reading the file or the checksum verification failed
|
* @throws IOException on I/O error reading the file or the checksum verification failed
|
||||||
*/
|
*/
|
||||||
private void verifyChecksum(HashFunction function, Path file, String expectedChecksum) throws IOException {
|
|
||||||
HashCode actualHash = function.hashBytes(Files.readAllBytes(file));
|
|
||||||
HashCode expectedHash = HashCode.fromString(expectedChecksum);
|
|
||||||
if (!Objects.equals(actualHash, expectedHash)) {
|
|
||||||
throw new IOException("GEO IP Checksum verification failed. "
|
|
||||||
+ "Expected: " + expectedChecksum + "Actual:" + actualHash);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Extract the database from gzipped data. Existing outputFile will be replaced if it already exists.
|
* Extract the database from gzipped data. Existing outputFile will be replaced if it already exists.
|
||||||
@ -265,18 +126,6 @@ public class GeoIpService {
|
|||||||
* @param outputFile destination file for the database
|
* @param outputFile destination file for the database
|
||||||
* @throws IOException on I/O error reading the archive, or writing the output
|
* @throws IOException on I/O error reading the archive, or writing the output
|
||||||
*/
|
*/
|
||||||
private void extractDatabase(Path inputFile, Path outputFile) throws IOException {
|
|
||||||
// .gz -> gzipped file
|
|
||||||
try (BufferedInputStream in = new BufferedInputStream(Files.newInputStream(inputFile));
|
|
||||||
GZIPInputStream gzipIn = new GZIPInputStream(in)) {
|
|
||||||
|
|
||||||
// found the database file and copy file
|
|
||||||
Files.copy(gzipIn, outputFile, StandardCopyOption.REPLACE_EXISTING);
|
|
||||||
|
|
||||||
// update the last modification date to be same as in the archive
|
|
||||||
Files.setLastModifiedTime(outputFile, Files.getLastModifiedTime(inputFile));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get the country code of the given IP address.
|
* Get the country code of the given IP address.
|
||||||
|
|||||||
@ -4,10 +4,10 @@ import fr.xephi.authme.ConsoleLogger;
|
|||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.initialization.HasCleanup;
|
import fr.xephi.authme.initialization.HasCleanup;
|
||||||
import fr.xephi.authme.initialization.Reloadable;
|
import fr.xephi.authme.initialization.Reloadable;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.mail.EmailService;
|
import fr.xephi.authme.mail.EmailService;
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
import fr.xephi.authme.message.Messages;
|
import fr.xephi.authme.message.Messages;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.security.PasswordSecurity;
|
import fr.xephi.authme.security.PasswordSecurity;
|
||||||
import fr.xephi.authme.security.crypts.HashedPassword;
|
import fr.xephi.authme.security.crypts.HashedPassword;
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
@ -20,6 +20,8 @@ import org.bukkit.entity.Player;
|
|||||||
|
|
||||||
import javax.annotation.PostConstruct;
|
import javax.annotation.PostConstruct;
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
|
import java.text.SimpleDateFormat;
|
||||||
|
import java.util.Date;
|
||||||
import java.util.Locale;
|
import java.util.Locale;
|
||||||
import java.util.concurrent.TimeUnit;
|
import java.util.concurrent.TimeUnit;
|
||||||
|
|
||||||
@ -72,9 +74,10 @@ public class PasswordRecoveryService implements Reloadable, HasCleanup {
|
|||||||
if (!checkEmailCooldown(player)) {
|
if (!checkEmailCooldown(player)) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
|
||||||
|
Date date = new Date(System.currentTimeMillis());
|
||||||
String recoveryCode = recoveryCodeService.generateCode(player.getName());
|
String recoveryCode = recoveryCodeService.generateCode(player.getName());
|
||||||
boolean couldSendMail = emailService.sendRecoveryCode(player.getName(), email, recoveryCode);
|
boolean couldSendMail = emailService.sendRecoveryCode(player.getName(), email, recoveryCode, dateFormat.format(date));
|
||||||
if (couldSendMail) {
|
if (couldSendMail) {
|
||||||
commonService.send(player, MessageKey.RECOVERY_CODE_SENT);
|
commonService.send(player, MessageKey.RECOVERY_CODE_SENT);
|
||||||
emailCooldown.add(player.getName().toLowerCase(Locale.ROOT));
|
emailCooldown.add(player.getName().toLowerCase(Locale.ROOT));
|
||||||
@ -94,6 +97,8 @@ public class PasswordRecoveryService implements Reloadable, HasCleanup {
|
|||||||
if (!checkEmailCooldown(player)) {
|
if (!checkEmailCooldown(player)) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
SimpleDateFormat dateFormat = new SimpleDateFormat("yyyy'年'MM'月'dd'日' HH:mm:ss");
|
||||||
|
Date date = new Date(System.currentTimeMillis());
|
||||||
|
|
||||||
String name = player.getName();
|
String name = player.getName();
|
||||||
String thePass = RandomStringUtils.generate(commonService.getProperty(RECOVERY_PASSWORD_LENGTH));
|
String thePass = RandomStringUtils.generate(commonService.getProperty(RECOVERY_PASSWORD_LENGTH));
|
||||||
@ -102,7 +107,7 @@ public class PasswordRecoveryService implements Reloadable, HasCleanup {
|
|||||||
logger.info("Generating new password for '" + name + "'");
|
logger.info("Generating new password for '" + name + "'");
|
||||||
|
|
||||||
dataSource.updatePassword(name, hashNew);
|
dataSource.updatePassword(name, hashNew);
|
||||||
boolean couldSendMail = emailService.sendPasswordMail(name, email, thePass);
|
boolean couldSendMail = emailService.sendPasswordMail(name, email, thePass, dateFormat.format(date));
|
||||||
if (couldSendMail) {
|
if (couldSendMail) {
|
||||||
commonService.send(player, MessageKey.RECOVERY_EMAIL_SENT_MESSAGE);
|
commonService.send(player, MessageKey.RECOVERY_EMAIL_SENT_MESSAGE);
|
||||||
emailCooldown.add(player.getName().toLowerCase(Locale.ROOT));
|
emailCooldown.add(player.getName().toLowerCase(Locale.ROOT));
|
||||||
|
|||||||
@ -5,8 +5,8 @@ import fr.xephi.authme.data.auth.PlayerAuth;
|
|||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.events.RestoreSessionEvent;
|
import fr.xephi.authme.events.RestoreSessionEvent;
|
||||||
import fr.xephi.authme.initialization.Reloadable;
|
import fr.xephi.authme.initialization.Reloadable;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.settings.properties.PluginSettings;
|
import fr.xephi.authme.settings.properties.PluginSettings;
|
||||||
import fr.xephi.authme.util.PlayerUtils;
|
import fr.xephi.authme.util.PlayerUtils;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|||||||
@ -14,6 +14,8 @@ import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|||||||
import fr.xephi.authme.settings.Settings;
|
import fr.xephi.authme.settings.Settings;
|
||||||
import fr.xephi.authme.settings.SpawnLoader;
|
import fr.xephi.authme.settings.SpawnLoader;
|
||||||
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
||||||
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
|
import fr.xephi.authme.util.TeleportUtils;
|
||||||
import org.bukkit.Location;
|
import org.bukkit.Location;
|
||||||
import org.bukkit.World;
|
import org.bukkit.World;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
@ -184,7 +186,9 @@ public class TeleportationService implements Reloadable {
|
|||||||
private void performTeleportation(final Player player, final AbstractTeleportEvent event) {
|
private void performTeleportation(final Player player, final AbstractTeleportEvent event) {
|
||||||
bukkitService.scheduleSyncTaskFromOptionallyAsyncTask(() -> {
|
bukkitService.scheduleSyncTaskFromOptionallyAsyncTask(() -> {
|
||||||
bukkitService.callEvent(event);
|
bukkitService.callEvent(event);
|
||||||
if (player.isOnline() && isEventValid(event)) {
|
if (player.isOnline() && isEventValid(event) && settings.getProperty(SecuritySettings.SMART_ASYNC_TELEPORT)) {
|
||||||
|
TeleportUtils.teleport(player, event.getTo());
|
||||||
|
} else if (player.isOnline() && isEventValid(event)) {
|
||||||
player.teleport(event.getTo());
|
player.teleport(event.getTo());
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|||||||
@ -7,24 +7,27 @@ import com.google.common.collect.Multimap;
|
|||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.initialization.Reloadable;
|
import fr.xephi.authme.initialization.Reloadable;
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.message.MessageKey;
|
import fr.xephi.authme.message.MessageKey;
|
||||||
|
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
import fr.xephi.authme.permission.PermissionsManager;
|
||||||
import fr.xephi.authme.permission.PlayerStatePermission;
|
import fr.xephi.authme.permission.PlayerStatePermission;
|
||||||
|
import fr.xephi.authme.security.HashUtils;
|
||||||
import fr.xephi.authme.settings.Settings;
|
import fr.xephi.authme.settings.Settings;
|
||||||
import fr.xephi.authme.settings.properties.EmailSettings;
|
import fr.xephi.authme.settings.properties.EmailSettings;
|
||||||
import fr.xephi.authme.settings.properties.ProtectionSettings;
|
import fr.xephi.authme.settings.properties.ProtectionSettings;
|
||||||
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
import fr.xephi.authme.util.PlayerUtils;
|
import fr.xephi.authme.util.PlayerUtils;
|
||||||
import fr.xephi.authme.util.StringUtils;
|
|
||||||
import fr.xephi.authme.util.Utils;
|
import fr.xephi.authme.util.Utils;
|
||||||
import org.bukkit.command.CommandSender;
|
import org.bukkit.command.CommandSender;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|
||||||
import javax.annotation.PostConstruct;
|
import javax.annotation.PostConstruct;
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
|
import java.io.DataInputStream;
|
||||||
|
import java.net.HttpURLConnection;
|
||||||
import java.net.InetSocketAddress;
|
import java.net.InetSocketAddress;
|
||||||
|
import java.net.URL;
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Locale;
|
import java.util.Locale;
|
||||||
@ -50,6 +53,7 @@ public class ValidationService implements Reloadable {
|
|||||||
private GeoIpService geoIpService;
|
private GeoIpService geoIpService;
|
||||||
|
|
||||||
private Pattern passwordRegex;
|
private Pattern passwordRegex;
|
||||||
|
private Pattern emailRegex;
|
||||||
private Multimap<String, String> restrictedNames;
|
private Multimap<String, String> restrictedNames;
|
||||||
|
|
||||||
ValidationService() {
|
ValidationService() {
|
||||||
@ -62,6 +66,8 @@ public class ValidationService implements Reloadable {
|
|||||||
restrictedNames = settings.getProperty(RestrictionSettings.ENABLE_RESTRICTED_USERS)
|
restrictedNames = settings.getProperty(RestrictionSettings.ENABLE_RESTRICTED_USERS)
|
||||||
? loadNameRestrictions(settings.getProperty(RestrictionSettings.RESTRICTED_USERS))
|
? loadNameRestrictions(settings.getProperty(RestrictionSettings.RESTRICTED_USERS))
|
||||||
: HashMultimap.create();
|
: HashMultimap.create();
|
||||||
|
|
||||||
|
emailRegex = Utils.safePatternCompile(settings.getProperty(RestrictionSettings.ALLOWED_EMAIL_REGEX));
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -82,7 +88,15 @@ public class ValidationService implements Reloadable {
|
|||||||
return new ValidationResult(MessageKey.INVALID_PASSWORD_LENGTH);
|
return new ValidationResult(MessageKey.INVALID_PASSWORD_LENGTH);
|
||||||
} else if (settings.getProperty(SecuritySettings.UNSAFE_PASSWORDS).contains(passLow)) {
|
} else if (settings.getProperty(SecuritySettings.UNSAFE_PASSWORDS).contains(passLow)) {
|
||||||
return new ValidationResult(MessageKey.PASSWORD_UNSAFE_ERROR);
|
return new ValidationResult(MessageKey.PASSWORD_UNSAFE_ERROR);
|
||||||
|
} else if (settings.getProperty(SecuritySettings.HAVE_I_BEEN_PWNED_CHECK)) {
|
||||||
|
HaveIBeenPwnedResults results = validatePasswordHaveIBeenPwned(password);
|
||||||
|
if (results != null
|
||||||
|
&& results.isPwned()
|
||||||
|
&& results.getPwnCount() > settings.getProperty(SecuritySettings.HAVE_I_BEEN_PWNED_LIMIT)) {
|
||||||
|
return new ValidationResult(MessageKey.PASSWORD_PWNED_ERROR, String.valueOf(results.getPwnCount()));
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
return new ValidationResult();
|
return new ValidationResult();
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -93,12 +107,7 @@ public class ValidationService implements Reloadable {
|
|||||||
* @return true if the email is valid, false otherwise
|
* @return true if the email is valid, false otherwise
|
||||||
*/
|
*/
|
||||||
public boolean validateEmail(String email) {
|
public boolean validateEmail(String email) {
|
||||||
if (Utils.isEmailEmpty(email) || !StringUtils.isInsideString('@', email)) {
|
return emailRegex.matcher(email).matches();
|
||||||
return false;
|
|
||||||
}
|
|
||||||
final String emailDomain = email.split("@")[1];
|
|
||||||
return validateWhitelistAndBlacklist(
|
|
||||||
emailDomain, EmailSettings.DOMAIN_WHITELIST, EmailSettings.DOMAIN_BLACKLIST);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -228,6 +237,47 @@ public class ValidationService implements Reloadable {
|
|||||||
}
|
}
|
||||||
return restrictions;
|
return restrictions;
|
||||||
}
|
}
|
||||||
|
/**
|
||||||
|
* Check haveibeenpwned.com for the given password.
|
||||||
|
*
|
||||||
|
* @param password password to check for
|
||||||
|
* @return Results of the check
|
||||||
|
*/
|
||||||
|
public HaveIBeenPwnedResults validatePasswordHaveIBeenPwned(String password) {
|
||||||
|
String hash = HashUtils.sha1(password);
|
||||||
|
|
||||||
|
String hashPrefix = hash.substring(0, 5);
|
||||||
|
|
||||||
|
try {
|
||||||
|
String url = String.format("https://api.pwnedpasswords.com/range/%s", hashPrefix);
|
||||||
|
HttpURLConnection connection = (HttpURLConnection) new URL(url).openConnection();
|
||||||
|
connection.setRequestMethod("GET");
|
||||||
|
connection.setRequestProperty("User-Agent", "AuthMeReloaded");
|
||||||
|
connection.setConnectTimeout(5000);
|
||||||
|
connection.setReadTimeout(5000);
|
||||||
|
connection.setDoInput(true);
|
||||||
|
StringBuilder outStr = new StringBuilder();
|
||||||
|
|
||||||
|
try (DataInputStream input = new DataInputStream(connection.getInputStream())) {
|
||||||
|
for (int c = input.read(); c != -1; c = input.read())
|
||||||
|
outStr.append((char) c);
|
||||||
|
}
|
||||||
|
|
||||||
|
String[] hashes = outStr.toString().split("\n");
|
||||||
|
for (String hashSuffix : hashes) {
|
||||||
|
String[] hashSuffixParts = hashSuffix.trim().split(":");
|
||||||
|
if (hashSuffixParts[0].equalsIgnoreCase(hash.substring(5))) {
|
||||||
|
return new HaveIBeenPwnedResults(true, Integer.parseInt(hashSuffixParts[1]));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return new HaveIBeenPwnedResults(false, 0);
|
||||||
|
} catch (java.io.IOException e) {
|
||||||
|
logger.warning("验证密码时出现错误,这可能是由于网络问题,如果无法解决,请关闭HaveIBeenPwned检查");
|
||||||
|
}
|
||||||
|
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
public static final class ValidationResult {
|
public static final class ValidationResult {
|
||||||
private final MessageKey messageKey;
|
private final MessageKey messageKey;
|
||||||
@ -269,4 +319,22 @@ public class ValidationService implements Reloadable {
|
|||||||
return args;
|
return args;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public static final class HaveIBeenPwnedResults {
|
||||||
|
private final boolean isPwned;
|
||||||
|
private final int pwnCount;
|
||||||
|
|
||||||
|
public HaveIBeenPwnedResults(boolean isPwned, int pwnCount) {
|
||||||
|
this.isPwned = isPwned;
|
||||||
|
this.pwnCount = pwnCount;
|
||||||
|
}
|
||||||
|
|
||||||
|
public boolean isPwned() {
|
||||||
|
return isPwned;
|
||||||
|
}
|
||||||
|
|
||||||
|
public int getPwnCount() {
|
||||||
|
return pwnCount;
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -24,6 +24,9 @@ public class Settings extends SettingsManagerImpl {
|
|||||||
private String passwordEmailMessage;
|
private String passwordEmailMessage;
|
||||||
private String verificationEmailMessage;
|
private String verificationEmailMessage;
|
||||||
private String recoveryCodeEmailMessage;
|
private String recoveryCodeEmailMessage;
|
||||||
|
private String shutdownEmailMessage;
|
||||||
|
private String newPasswordEmailMessage;
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Constructor.
|
* Constructor.
|
||||||
@ -67,10 +70,19 @@ public class Settings extends SettingsManagerImpl {
|
|||||||
return recoveryCodeEmailMessage;
|
return recoveryCodeEmailMessage;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public String getShutdownEmailMessage() {return shutdownEmailMessage;}
|
||||||
|
|
||||||
|
public String getNewPasswordEmailMessage() {
|
||||||
|
return newPasswordEmailMessage;
|
||||||
|
}
|
||||||
|
|
||||||
private void loadSettingsFromFiles() {
|
private void loadSettingsFromFiles() {
|
||||||
|
newPasswordEmailMessage = readFile("new_email.html");
|
||||||
passwordEmailMessage = readFile("email.html");
|
passwordEmailMessage = readFile("email.html");
|
||||||
verificationEmailMessage = readFile("verification_code_email.html");
|
verificationEmailMessage = readFile("verification_code_email.html");
|
||||||
recoveryCodeEmailMessage = readFile("recovery_code_email.html");
|
recoveryCodeEmailMessage = readFile("recovery_code_email.html");
|
||||||
|
shutdownEmailMessage = readFile("shutdown.html");
|
||||||
|
String country = readFile("GeoLite2-Country.mmdb");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|||||||
@ -1,138 +0,0 @@
|
|||||||
package fr.xephi.authme.settings;
|
|
||||||
|
|
||||||
import fr.xephi.authme.ConsoleLogger;
|
|
||||||
import fr.xephi.authme.data.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.initialization.DataFolder;
|
|
||||||
import fr.xephi.authme.initialization.Reloadable;
|
|
||||||
import fr.xephi.authme.output.ConsoleLoggerFactory;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import fr.xephi.authme.service.CommonService;
|
|
||||||
import fr.xephi.authme.service.GeoIpService;
|
|
||||||
import fr.xephi.authme.settings.properties.PluginSettings;
|
|
||||||
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
|
||||||
import fr.xephi.authme.util.PlayerUtils;
|
|
||||||
import fr.xephi.authme.util.lazytags.Tag;
|
|
||||||
import fr.xephi.authme.util.lazytags.TagReplacer;
|
|
||||||
import org.bukkit.ChatColor;
|
|
||||||
import org.bukkit.Server;
|
|
||||||
import org.bukkit.entity.HumanEntity;
|
|
||||||
import org.bukkit.entity.Player;
|
|
||||||
|
|
||||||
import javax.annotation.PostConstruct;
|
|
||||||
import javax.inject.Inject;
|
|
||||||
import java.io.File;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.nio.charset.StandardCharsets;
|
|
||||||
import java.nio.file.Files;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.util.FileUtils.copyFileFromResource;
|
|
||||||
import static fr.xephi.authme.util.lazytags.TagBuilder.createTag;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Configuration for the welcome message (welcome.txt).
|
|
||||||
*/
|
|
||||||
public class WelcomeMessageConfiguration implements Reloadable {
|
|
||||||
|
|
||||||
private final ConsoleLogger logger = ConsoleLoggerFactory.get(WelcomeMessageConfiguration.class);
|
|
||||||
|
|
||||||
@DataFolder
|
|
||||||
@Inject
|
|
||||||
private File pluginFolder;
|
|
||||||
|
|
||||||
@Inject
|
|
||||||
private Server server;
|
|
||||||
|
|
||||||
@Inject
|
|
||||||
private GeoIpService geoIpService;
|
|
||||||
|
|
||||||
@Inject
|
|
||||||
private BukkitService bukkitService;
|
|
||||||
|
|
||||||
@Inject
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
|
|
||||||
@Inject
|
|
||||||
private CommonService service;
|
|
||||||
|
|
||||||
/** List of all supported tags for the welcome message. */
|
|
||||||
private final List<Tag<Player>> availableTags = Arrays.asList(
|
|
||||||
createTag("&", () -> String.valueOf(ChatColor.COLOR_CHAR)),
|
|
||||||
createTag("{PLAYER}", HumanEntity::getName),
|
|
||||||
createTag("{DISPLAYNAME}", Player::getDisplayName),
|
|
||||||
createTag("{DISPLAYNAMENOCOLOR}", Player::getDisplayName),
|
|
||||||
createTag("{ONLINE}", () -> Integer.toString(bukkitService.getOnlinePlayers().size())),
|
|
||||||
createTag("{MAXPLAYERS}", () -> Integer.toString(server.getMaxPlayers())),
|
|
||||||
createTag("{IP}", PlayerUtils::getPlayerIp),
|
|
||||||
createTag("{LOGINS}", () -> Integer.toString(playerCache.getLogged())),
|
|
||||||
createTag("{WORLD}", pl -> pl.getWorld().getName()),
|
|
||||||
createTag("{SERVER}", () -> service.getProperty(PluginSettings.SERVER_NAME)),
|
|
||||||
createTag("{VERSION}", () -> server.getBukkitVersion()),
|
|
||||||
createTag("{COUNTRY}", pl -> geoIpService.getCountryName(PlayerUtils.getPlayerIp(pl))));
|
|
||||||
|
|
||||||
private TagReplacer<Player> messageSupplier;
|
|
||||||
|
|
||||||
@PostConstruct
|
|
||||||
@Override
|
|
||||||
public void reload() {
|
|
||||||
if (!(service.getProperty(RegistrationSettings.USE_WELCOME_MESSAGE))) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
List<String> welcomeMessage = new ArrayList<>();
|
|
||||||
for (String line : readWelcomeFile()) {
|
|
||||||
welcomeMessage.add(ChatColor.translateAlternateColorCodes('&', line));
|
|
||||||
}
|
|
||||||
messageSupplier = TagReplacer.newReplacer(availableTags, welcomeMessage);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the welcome message for the given player.
|
|
||||||
*
|
|
||||||
* @param player the player for whom the welcome message should be prepared
|
|
||||||
* @return the welcome message
|
|
||||||
*/
|
|
||||||
public List<String> getWelcomeMessage(Player player) {
|
|
||||||
return messageSupplier.getAdaptedMessages(player);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Sends the welcome message accordingly to the configuration
|
|
||||||
*
|
|
||||||
* @param player the player for whom the welcome message should be prepared
|
|
||||||
*/
|
|
||||||
public void sendWelcomeMessage(Player player) {
|
|
||||||
if (service.getProperty(RegistrationSettings.USE_WELCOME_MESSAGE)) {
|
|
||||||
List<String> welcomeMessage = getWelcomeMessage(player);
|
|
||||||
if (service.getProperty(RegistrationSettings.BROADCAST_WELCOME_MESSAGE)) {
|
|
||||||
welcomeMessage.forEach(bukkitService::broadcastMessage);
|
|
||||||
} else {
|
|
||||||
welcomeMessage.forEach(player::sendMessage);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @return the lines of the welcome message file
|
|
||||||
*/
|
|
||||||
private List<String> readWelcomeFile() {
|
|
||||||
if (!(service.getProperty(RegistrationSettings.USE_WELCOME_MESSAGE))) {
|
|
||||||
return Collections.emptyList();
|
|
||||||
}
|
|
||||||
|
|
||||||
File welcomeFile = new File(pluginFolder, "welcome.txt");
|
|
||||||
if (copyFileFromResource(welcomeFile, "welcome.txt")) {
|
|
||||||
try {
|
|
||||||
return Files.readAllLines(welcomeFile.toPath(), StandardCharsets.UTF_8);
|
|
||||||
} catch (IOException e) {
|
|
||||||
logger.logException("Failed to read welcome.txt file:", e);
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
logger.warning("Failed to copy welcome.txt from JAR");
|
|
||||||
}
|
|
||||||
return Collections.emptyList();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -10,7 +10,7 @@ import static ch.jalu.configme.properties.PropertyInitializer.newProperty;
|
|||||||
public final class DatabaseSettings implements SettingsHolder {
|
public final class DatabaseSettings implements SettingsHolder {
|
||||||
|
|
||||||
@Comment({"What type of database do you want to use?",
|
@Comment({"What type of database do you want to use?",
|
||||||
"Valid values: SQLITE, MARIADB, MYSQL, POSTGRESQL"})
|
"Valid values: H2, SQLITE, MARIADB, MYSQL, POSTGRESQL"})
|
||||||
public static final Property<DataSourceType> BACKEND =
|
public static final Property<DataSourceType> BACKEND =
|
||||||
newProperty(DataSourceType.class, "DataSource.backend", DataSourceType.SQLITE);
|
newProperty(DataSourceType.class, "DataSource.backend", DataSourceType.SQLITE);
|
||||||
|
|
||||||
|
|||||||
@ -4,16 +4,13 @@ import ch.jalu.configme.Comment;
|
|||||||
import ch.jalu.configme.SettingsHolder;
|
import ch.jalu.configme.SettingsHolder;
|
||||||
import ch.jalu.configme.properties.Property;
|
import ch.jalu.configme.properties.Property;
|
||||||
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static ch.jalu.configme.properties.PropertyInitializer.newListProperty;
|
|
||||||
import static ch.jalu.configme.properties.PropertyInitializer.newProperty;
|
import static ch.jalu.configme.properties.PropertyInitializer.newProperty;
|
||||||
|
|
||||||
public final class EmailSettings implements SettingsHolder {
|
public final class EmailSettings implements SettingsHolder {
|
||||||
|
|
||||||
@Comment("Email SMTP server host")
|
@Comment("Email SMTP server host")
|
||||||
public static final Property<String> SMTP_HOST =
|
public static final Property<String> SMTP_HOST =
|
||||||
newProperty("Email.mailSMTP", "smtp.gmail.com");
|
newProperty("Email.mailSMTP", "smtp.163.com");
|
||||||
|
|
||||||
@Comment("Email SMTP server port")
|
@Comment("Email SMTP server port")
|
||||||
public static final Property<Integer> SMTP_PORT =
|
public static final Property<Integer> SMTP_PORT =
|
||||||
@ -41,7 +38,7 @@ public final class EmailSettings implements SettingsHolder {
|
|||||||
|
|
||||||
@Comment("Recovery password length")
|
@Comment("Recovery password length")
|
||||||
public static final Property<Integer> RECOVERY_PASSWORD_LENGTH =
|
public static final Property<Integer> RECOVERY_PASSWORD_LENGTH =
|
||||||
newProperty("Email.RecoveryPasswordLength", 8);
|
newProperty("Email.RecoveryPasswordLength", 12);
|
||||||
|
|
||||||
@Comment("Mail Subject")
|
@Comment("Mail Subject")
|
||||||
public static final Property<String> RECOVERY_MAIL_SUBJECT =
|
public static final Property<String> RECOVERY_MAIL_SUBJECT =
|
||||||
@ -59,14 +56,6 @@ public final class EmailSettings implements SettingsHolder {
|
|||||||
public static final Property<Integer> DELAY_RECALL =
|
public static final Property<Integer> DELAY_RECALL =
|
||||||
newProperty("Email.delayRecall", 5);
|
newProperty("Email.delayRecall", 5);
|
||||||
|
|
||||||
@Comment("Blacklist these domains for emails")
|
|
||||||
public static final Property<List<String>> DOMAIN_BLACKLIST =
|
|
||||||
newListProperty("Email.emailBlacklisted", "10minutemail.com");
|
|
||||||
|
|
||||||
@Comment("Whitelist ONLY these domains for emails")
|
|
||||||
public static final Property<List<String>> DOMAIN_WHITELIST =
|
|
||||||
newListProperty("Email.emailWhitelisted");
|
|
||||||
|
|
||||||
@Comment("Send the new password drawn in an image?")
|
@Comment("Send the new password drawn in an image?")
|
||||||
public static final Property<Boolean> PASSWORD_AS_IMAGE =
|
public static final Property<Boolean> PASSWORD_AS_IMAGE =
|
||||||
newProperty("Email.generateImage", false);
|
newProperty("Email.generateImage", false);
|
||||||
@ -74,6 +63,12 @@ public final class EmailSettings implements SettingsHolder {
|
|||||||
@Comment("The OAuth2 token")
|
@Comment("The OAuth2 token")
|
||||||
public static final Property<String> OAUTH2_TOKEN =
|
public static final Property<String> OAUTH2_TOKEN =
|
||||||
newProperty("Email.emailOauth2Token", "");
|
newProperty("Email.emailOauth2Token", "");
|
||||||
|
@Comment("Email notifications when the server shuts down")
|
||||||
|
public static final Property<Boolean> SHUTDOWN_MAIL =
|
||||||
|
newProperty("Email.shutDownEmail", false);
|
||||||
|
@Comment("Email notification address when the server is shut down")
|
||||||
|
public static final Property<String> SHUTDOWN_MAIL_ADDRESS =
|
||||||
|
newProperty("Email.shutDownEmailAddress", "your@mail.com");
|
||||||
|
|
||||||
private EmailSettings() {
|
private EmailSettings() {
|
||||||
}
|
}
|
||||||
|
|||||||
@ -19,6 +19,13 @@ public final class HooksSettings implements SettingsHolder {
|
|||||||
public static final Property<Boolean> BUNGEECORD =
|
public static final Property<Boolean> BUNGEECORD =
|
||||||
newProperty("Hooks.bungeecord", false);
|
newProperty("Hooks.bungeecord", false);
|
||||||
|
|
||||||
|
@Comment({"Allow FloodGatePlayer Join Without checkIsValidName()",
|
||||||
|
"This must be true if you want to use other bedrock features."
|
||||||
|
})
|
||||||
|
public static final Property<Boolean> HOOK_FLOODGATE_PLAYER =
|
||||||
|
newProperty("Hooks.floodgate", false);
|
||||||
|
|
||||||
|
|
||||||
@Comment("Send player to this BungeeCord server after register/login")
|
@Comment("Send player to this BungeeCord server after register/login")
|
||||||
public static final Property<String> BUNGEECORD_SERVER =
|
public static final Property<String> BUNGEECORD_SERVER =
|
||||||
newProperty("Hooks.sendPlayerTo", "");
|
newProperty("Hooks.sendPlayerTo", "");
|
||||||
|
|||||||
@ -8,6 +8,13 @@ import fr.xephi.authme.output.LogLevel;
|
|||||||
import static ch.jalu.configme.properties.PropertyInitializer.newProperty;
|
import static ch.jalu.configme.properties.PropertyInitializer.newProperty;
|
||||||
|
|
||||||
public final class PluginSettings implements SettingsHolder {
|
public final class PluginSettings implements SettingsHolder {
|
||||||
|
@Comment({
|
||||||
|
"Should we execute /help command when unregistered players press Shift+F?",
|
||||||
|
"This keeps compatibility with some menu plugins",
|
||||||
|
"If you are using TrMenu, don't enable this because TrMenu already implemented this."
|
||||||
|
})
|
||||||
|
public static final Property<Boolean> MENU_UNREGISTER_COMPATIBILITY =
|
||||||
|
newProperty("3rdPartyFeature.compatibility.menuPlugins", false);
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"Do you want to enable the session feature?",
|
"Do you want to enable the session feature?",
|
||||||
@ -18,14 +25,14 @@ public final class PluginSettings implements SettingsHolder {
|
|||||||
"expired, he will not need to authenticate."
|
"expired, he will not need to authenticate."
|
||||||
})
|
})
|
||||||
public static final Property<Boolean> SESSIONS_ENABLED =
|
public static final Property<Boolean> SESSIONS_ENABLED =
|
||||||
newProperty("settings.sessions.enabled", false);
|
newProperty("settings.sessions.enabled", true);
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"After how many minutes should a session expire?",
|
"After how many minutes should a session expire?",
|
||||||
"A player's session ends after the timeout or if his IP has changed"
|
"A player's session ends after the timeout or if his IP has changed"
|
||||||
})
|
})
|
||||||
public static final Property<Integer> SESSIONS_TIMEOUT =
|
public static final Property<Integer> SESSIONS_TIMEOUT =
|
||||||
newProperty("settings.sessions.timeout", 10);
|
newProperty("settings.sessions.timeout", 43200);
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"Message language, available languages:",
|
"Message language, available languages:",
|
||||||
|
|||||||
@ -18,22 +18,7 @@ public final class ProtectionSettings implements SettingsHolder {
|
|||||||
|
|
||||||
@Comment("Apply the protection also to registered usernames")
|
@Comment("Apply the protection also to registered usernames")
|
||||||
public static final Property<Boolean> ENABLE_PROTECTION_REGISTERED =
|
public static final Property<Boolean> ENABLE_PROTECTION_REGISTERED =
|
||||||
newProperty("Protection.enableProtectionRegistered", true);
|
newProperty("Protection.enableProtectionRegistered", false);
|
||||||
|
|
||||||
@Comment("Enable GeoIp database")
|
|
||||||
public static final Property<Boolean> ENABLE_GEOIP =
|
|
||||||
newProperty("Protection.geoIpDatabase.enabled", true);
|
|
||||||
|
|
||||||
@Comment({"The MaxMind clientId used to download the GeoIp database,",
|
|
||||||
"get one at https://www.maxmind.com/en/accounts/current/license-key",
|
|
||||||
"The EssentialsX project has a very useful tutorial on how to generate",
|
|
||||||
"the license key: https://github.com/EssentialsX/Wiki/blob/master/GeoIP.md"})
|
|
||||||
public static final Property<String> MAXMIND_API_CLIENT_ID =
|
|
||||||
newProperty("Protection.geoIpDatabase.clientId", "");
|
|
||||||
|
|
||||||
@Comment("The MaxMind licenseKey used to download the GeoIp database.")
|
|
||||||
public static final Property<String> MAXMIND_API_LICENSE_KEY =
|
|
||||||
newProperty("Protection.geoIpDatabase.licenseKey", "");
|
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"Countries allowed to join the server and register. For country codes, see",
|
"Countries allowed to join the server and register. For country codes, see",
|
||||||
@ -41,7 +26,7 @@ public final class ProtectionSettings implements SettingsHolder {
|
|||||||
"Use \"LOCALHOST\" for local addresses.",
|
"Use \"LOCALHOST\" for local addresses.",
|
||||||
"PLEASE USE QUOTES!"})
|
"PLEASE USE QUOTES!"})
|
||||||
public static final Property<List<String>> COUNTRIES_WHITELIST =
|
public static final Property<List<String>> COUNTRIES_WHITELIST =
|
||||||
newListProperty("Protection.countries", "US", "GB", "LOCALHOST");
|
newListProperty("Protection.countries", "LOCALHOST");
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"Countries not allowed to join the server and register",
|
"Countries not allowed to join the server and register",
|
||||||
@ -73,7 +58,7 @@ public final class ProtectionSettings implements SettingsHolder {
|
|||||||
|
|
||||||
@Comment("Kicks the player that issued a command before the defined time after the join process")
|
@Comment("Kicks the player that issued a command before the defined time after the join process")
|
||||||
public static final Property<Integer> QUICK_COMMANDS_DENIED_BEFORE_MILLISECONDS =
|
public static final Property<Integer> QUICK_COMMANDS_DENIED_BEFORE_MILLISECONDS =
|
||||||
newProperty("Protection.quickCommands.denyCommandsBeforeMilliseconds", 1000);
|
newProperty("Protection.quickCommands.denyCommandsBeforeMilliseconds", 3000);
|
||||||
|
|
||||||
private ProtectionSettings() {
|
private ProtectionSettings() {
|
||||||
}
|
}
|
||||||
|
|||||||
@ -36,7 +36,8 @@ public final class RegistrationSettings implements SettingsHolder {
|
|||||||
newProperty(RegistrationType.class, "settings.registration.type", RegistrationType.PASSWORD);
|
newProperty(RegistrationType.class, "settings.registration.type", RegistrationType.PASSWORD);
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"Second argument the /register command should take: NONE = no 2nd argument",
|
"Second argument the /register command should take: ",
|
||||||
|
"NONE = no 2nd argument",
|
||||||
"CONFIRMATION = must repeat first argument (pass or email)",
|
"CONFIRMATION = must repeat first argument (pass or email)",
|
||||||
"EMAIL_OPTIONAL = for password register: 2nd argument can be empty or have email address",
|
"EMAIL_OPTIONAL = for password register: 2nd argument can be empty or have email address",
|
||||||
"EMAIL_MANDATORY = for password register: 2nd argument MUST be an email address"
|
"EMAIL_MANDATORY = for password register: 2nd argument MUST be an email address"
|
||||||
@ -54,26 +55,9 @@ public final class RegistrationSettings implements SettingsHolder {
|
|||||||
@Comment("Does AuthMe need to enforce a /login after a successful registration?")
|
@Comment("Does AuthMe need to enforce a /login after a successful registration?")
|
||||||
public static final Property<Boolean> FORCE_LOGIN_AFTER_REGISTER =
|
public static final Property<Boolean> FORCE_LOGIN_AFTER_REGISTER =
|
||||||
newProperty("settings.registration.forceLoginAfterRegister", false);
|
newProperty("settings.registration.forceLoginAfterRegister", false);
|
||||||
|
|
||||||
@Comment({
|
|
||||||
"Enable to display the welcome message (welcome.txt) after a login",
|
|
||||||
"You can use colors in this welcome.txt + some replaced strings:",
|
|
||||||
"{PLAYER}: player name, {ONLINE}: display number of online players,",
|
|
||||||
"{MAXPLAYERS}: display server slots, {IP}: player ip, {LOGINS}: number of players logged,",
|
|
||||||
"{WORLD}: player current world, {SERVER}: server name",
|
|
||||||
"{VERSION}: get current bukkit version, {COUNTRY}: player country"})
|
|
||||||
public static final Property<Boolean> USE_WELCOME_MESSAGE =
|
|
||||||
newProperty("settings.useWelcomeMessage", true);
|
|
||||||
|
|
||||||
@Comment({
|
|
||||||
"Broadcast the welcome message to the server or only to the player?",
|
|
||||||
"set true for server or false for player"})
|
|
||||||
public static final Property<Boolean> BROADCAST_WELCOME_MESSAGE =
|
|
||||||
newProperty("settings.broadcastWelcomeMessage", false);
|
|
||||||
|
|
||||||
@Comment("Should we delay the join message and display it once the player has logged in?")
|
@Comment("Should we delay the join message and display it once the player has logged in?")
|
||||||
public static final Property<Boolean> DELAY_JOIN_MESSAGE =
|
public static final Property<Boolean> DELAY_JOIN_MESSAGE =
|
||||||
newProperty("settings.delayJoinMessage", false);
|
newProperty("settings.delayJoinMessage", true);
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"The custom join message that will be sent after a successful login,",
|
"The custom join message that will be sent after a successful login,",
|
||||||
@ -87,15 +71,15 @@ public final class RegistrationSettings implements SettingsHolder {
|
|||||||
|
|
||||||
@Comment("Should we remove the leave messages of unlogged users?")
|
@Comment("Should we remove the leave messages of unlogged users?")
|
||||||
public static final Property<Boolean> REMOVE_UNLOGGED_LEAVE_MESSAGE =
|
public static final Property<Boolean> REMOVE_UNLOGGED_LEAVE_MESSAGE =
|
||||||
newProperty("settings.removeUnloggedLeaveMessage", false);
|
newProperty("settings.removeUnloggedLeaveMessage", true);
|
||||||
|
|
||||||
@Comment("Should we remove join messages altogether?")
|
@Comment("Should we remove join messages altogether?")
|
||||||
public static final Property<Boolean> REMOVE_JOIN_MESSAGE =
|
public static final Property<Boolean> REMOVE_JOIN_MESSAGE =
|
||||||
newProperty("settings.removeJoinMessage", false);
|
newProperty("settings.removeJoinMessage", true);
|
||||||
|
|
||||||
@Comment("Should we remove leave messages altogether?")
|
@Comment("Should we remove leave messages altogether?")
|
||||||
public static final Property<Boolean> REMOVE_LEAVE_MESSAGE =
|
public static final Property<Boolean> REMOVE_LEAVE_MESSAGE =
|
||||||
newProperty("settings.removeLeaveMessage", false);
|
newProperty("settings.removeLeaveMessage", true);
|
||||||
|
|
||||||
@Comment("Do we need to add potion effect Blinding before login/register?")
|
@Comment("Do we need to add potion effect Blinding before login/register?")
|
||||||
public static final Property<Boolean> APPLY_BLIND_EFFECT =
|
public static final Property<Boolean> APPLY_BLIND_EFFECT =
|
||||||
|
|||||||
@ -33,7 +33,7 @@ public final class RestrictionSettings implements SettingsHolder {
|
|||||||
"Max number of allowed registrations per IP",
|
"Max number of allowed registrations per IP",
|
||||||
"The value 0 means an unlimited number of registrations!"})
|
"The value 0 means an unlimited number of registrations!"})
|
||||||
public static final Property<Integer> MAX_REGISTRATION_PER_IP =
|
public static final Property<Integer> MAX_REGISTRATION_PER_IP =
|
||||||
newProperty("settings.restrictions.maxRegPerIp", 1);
|
newProperty("settings.restrictions.maxRegPerIp", 3);
|
||||||
|
|
||||||
@Comment("Minimum allowed username length")
|
@Comment("Minimum allowed username length")
|
||||||
public static final Property<Integer> MIN_NICKNAME_LENGTH =
|
public static final Property<Integer> MIN_NICKNAME_LENGTH =
|
||||||
@ -74,7 +74,7 @@ public final class RestrictionSettings implements SettingsHolder {
|
|||||||
"To activate the restricted user feature you need",
|
"To activate the restricted user feature you need",
|
||||||
"to enable this option and configure the AllowedRestrictedUser field."})
|
"to enable this option and configure the AllowedRestrictedUser field."})
|
||||||
public static final Property<Boolean> ENABLE_RESTRICTED_USERS =
|
public static final Property<Boolean> ENABLE_RESTRICTED_USERS =
|
||||||
newProperty("settings.restrictions.AllowRestrictedUser", false);
|
newProperty("settings.restrictions.AllowRestrictedUser", true);
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"The restricted user feature will kick players listed below",
|
"The restricted user feature will kick players listed below",
|
||||||
@ -85,7 +85,12 @@ public final class RestrictionSettings implements SettingsHolder {
|
|||||||
" - playername;127.0.0.1",
|
" - playername;127.0.0.1",
|
||||||
" - playername;regex:127\\.0\\.0\\..*"})
|
" - playername;regex:127\\.0\\.0\\..*"})
|
||||||
public static final Property<Set<String>> RESTRICTED_USERS =
|
public static final Property<Set<String>> RESTRICTED_USERS =
|
||||||
newLowercaseStringSetProperty("settings.restrictions.AllowedRestrictedUser");
|
newLowercaseStringSetProperty("settings.restrictions.AllowedRestrictedUser",
|
||||||
|
"server_land;127.0.0.1","server;127.0.0.1","bukkit;127.0.0.1","purpur;127.0.0.1",
|
||||||
|
"system;127.0.0.1","admin;127.0.0.1","md_5;127.0.0.1","administrator;127.0.0.1","notch;127.0.0.1",
|
||||||
|
"spigot;127.0.0.1","bukkit;127.0.0.1","bukkitcraft;127.0.0.1","paperclip;127.0.0.1","papermc;127.0.0.1",
|
||||||
|
"spigotmc;127.0.0.1","root;127.0.0.1","console;127.0.0.1","purpur;127.0.0.1","authme;127.0.0.1",
|
||||||
|
"owner;127.0.0.1");
|
||||||
|
|
||||||
@Comment("Ban unknown IPs trying to log in with a restricted username?")
|
@Comment("Ban unknown IPs trying to log in with a restricted username?")
|
||||||
public static final Property<Boolean> BAN_UNKNOWN_IP =
|
public static final Property<Boolean> BAN_UNKNOWN_IP =
|
||||||
@ -97,7 +102,7 @@ public final class RestrictionSettings implements SettingsHolder {
|
|||||||
|
|
||||||
@Comment("Should players be kicked on wrong password?")
|
@Comment("Should players be kicked on wrong password?")
|
||||||
public static final Property<Boolean> KICK_ON_WRONG_PASSWORD =
|
public static final Property<Boolean> KICK_ON_WRONG_PASSWORD =
|
||||||
newProperty("settings.restrictions.kickOnWrongPassword", true);
|
newProperty("settings.restrictions.kickOnWrongPassword", false);
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"Should not logged in players be teleported to the spawn?",
|
"Should not logged in players be teleported to the spawn?",
|
||||||
@ -114,22 +119,23 @@ public final class RestrictionSettings implements SettingsHolder {
|
|||||||
"After how many seconds should players who fail to login or register",
|
"After how many seconds should players who fail to login or register",
|
||||||
"be kicked? Set to 0 to disable."})
|
"be kicked? Set to 0 to disable."})
|
||||||
public static final Property<Integer> TIMEOUT =
|
public static final Property<Integer> TIMEOUT =
|
||||||
newProperty("settings.restrictions.timeout", 30);
|
newProperty("settings.restrictions.timeout", 120);
|
||||||
|
|
||||||
@Comment("Regex pattern of allowed characters in the player name.")
|
@Comment("Regex pattern of allowed characters in the player name.")
|
||||||
public static final Property<String> ALLOWED_NICKNAME_CHARACTERS =
|
public static final Property<String> ALLOWED_NICKNAME_CHARACTERS =
|
||||||
newProperty("settings.restrictions.allowedNicknameCharacters", "[a-zA-Z0-9_]*");
|
newProperty("settings.restrictions.allowedNicknameCharacters", "[a-zA-Z0-9_]*");
|
||||||
|
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"How far can unregistered players walk?",
|
"How far can unregistered players walk?",
|
||||||
"Set to 0 for unlimited radius"
|
"Set to 0 for unlimited radius"
|
||||||
})
|
})
|
||||||
public static final Property<Integer> ALLOWED_MOVEMENT_RADIUS =
|
public static final Property<Integer> ALLOWED_MOVEMENT_RADIUS =
|
||||||
newProperty("settings.restrictions.allowedMovementRadius", 100);
|
newProperty("settings.restrictions.allowedMovementRadius", 0);
|
||||||
|
|
||||||
@Comment("Should we protect the player inventory before logging in? Requires ProtocolLib.")
|
@Comment("Should we protect the player inventory before logging in? Requires ProtocolLib.")
|
||||||
public static final Property<Boolean> PROTECT_INVENTORY_BEFORE_LOGIN =
|
public static final Property<Boolean> PROTECT_INVENTORY_BEFORE_LOGIN =
|
||||||
newProperty("settings.restrictions.ProtectInventoryBeforeLogIn", true);
|
newProperty("settings.restrictions.ProtectInventoryBeforeLogIn", false);
|
||||||
|
|
||||||
@Comment("Should we deny the tabcomplete feature before logging in? Requires ProtocolLib.")
|
@Comment("Should we deny the tabcomplete feature before logging in? Requires ProtocolLib.")
|
||||||
public static final Property<Boolean> DENY_TABCOMPLETE_BEFORE_LOGIN =
|
public static final Property<Boolean> DENY_TABCOMPLETE_BEFORE_LOGIN =
|
||||||
@ -139,7 +145,7 @@ public final class RestrictionSettings implements SettingsHolder {
|
|||||||
"Should we display all other accounts from a player when he joins?",
|
"Should we display all other accounts from a player when he joins?",
|
||||||
"permission: /authme.admin.accounts"})
|
"permission: /authme.admin.accounts"})
|
||||||
public static final Property<Boolean> DISPLAY_OTHER_ACCOUNTS =
|
public static final Property<Boolean> DISPLAY_OTHER_ACCOUNTS =
|
||||||
newProperty("settings.restrictions.displayOtherAccounts", true);
|
newProperty("settings.restrictions.displayOtherAccounts", false);
|
||||||
|
|
||||||
@Comment("Spawn priority; values: authme, essentials, cmi, multiverse, default")
|
@Comment("Spawn priority; values: authme, essentials, cmi, multiverse, default")
|
||||||
public static final Property<String> SPAWN_PRIORITY =
|
public static final Property<String> SPAWN_PRIORITY =
|
||||||
@ -147,11 +153,11 @@ public final class RestrictionSettings implements SettingsHolder {
|
|||||||
|
|
||||||
@Comment("Maximum Login authorized by IP")
|
@Comment("Maximum Login authorized by IP")
|
||||||
public static final Property<Integer> MAX_LOGIN_PER_IP =
|
public static final Property<Integer> MAX_LOGIN_PER_IP =
|
||||||
newProperty("settings.restrictions.maxLoginPerIp", 0);
|
newProperty("settings.restrictions.maxLoginPerIp", 3);
|
||||||
|
|
||||||
@Comment("Maximum Join authorized by IP")
|
@Comment("Maximum Join authorized by IP")
|
||||||
public static final Property<Integer> MAX_JOIN_PER_IP =
|
public static final Property<Integer> MAX_JOIN_PER_IP =
|
||||||
newProperty("settings.restrictions.maxJoinPerIp", 0);
|
newProperty("settings.restrictions.maxJoinPerIp", 3);
|
||||||
|
|
||||||
@Comment("AuthMe will NEVER teleport players if set to true!")
|
@Comment("AuthMe will NEVER teleport players if set to true!")
|
||||||
public static final Property<Boolean> NO_TELEPORT =
|
public static final Property<Boolean> NO_TELEPORT =
|
||||||
@ -165,6 +171,11 @@ public final class RestrictionSettings implements SettingsHolder {
|
|||||||
public static final Property<String> ALLOWED_PASSWORD_REGEX =
|
public static final Property<String> ALLOWED_PASSWORD_REGEX =
|
||||||
newProperty("settings.restrictions.allowedPasswordCharacters", "[!-~]*");
|
newProperty("settings.restrictions.allowedPasswordCharacters", "[!-~]*");
|
||||||
|
|
||||||
|
@Comment("Regex syntax for allowed chars in email.")
|
||||||
|
public static final Property<String> ALLOWED_EMAIL_REGEX =
|
||||||
|
newProperty("settings.restrictions.allowedEmailCharacters", "^[A-Za-z0-9_]{4,15}@(qq|outlook|163|gmail|icloud)\\.com$");
|
||||||
|
|
||||||
|
|
||||||
@Comment("Force survival gamemode when player joins?")
|
@Comment("Force survival gamemode when player joins?")
|
||||||
public static final Property<Boolean> FORCE_SURVIVAL_MODE =
|
public static final Property<Boolean> FORCE_SURVIVAL_MODE =
|
||||||
newProperty("settings.GameMode.ForceSurvivalMode", false);
|
newProperty("settings.GameMode.ForceSurvivalMode", false);
|
||||||
@ -181,6 +192,7 @@ public final class RestrictionSettings implements SettingsHolder {
|
|||||||
public static final Property<Set<String>> UNRESTRICTED_NAMES =
|
public static final Property<Set<String>> UNRESTRICTED_NAMES =
|
||||||
newLowercaseStringSetProperty("settings.unrestrictions.UnrestrictedName");
|
newLowercaseStringSetProperty("settings.unrestrictions.UnrestrictedName");
|
||||||
|
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"Below you can list all inventories names that AuthMe will ignore",
|
"Below you can list all inventories names that AuthMe will ignore",
|
||||||
"for registration or login. Configure it at your own risk!!",
|
"for registration or login. Configure it at your own risk!!",
|
||||||
@ -193,7 +205,9 @@ public final class RestrictionSettings implements SettingsHolder {
|
|||||||
public static final Property<Set<String>> UNRESTRICTED_INVENTORIES =
|
public static final Property<Set<String>> UNRESTRICTED_INVENTORIES =
|
||||||
newLowercaseStringSetProperty("settings.unrestrictions.UnrestrictedInventories");
|
newLowercaseStringSetProperty("settings.unrestrictions.UnrestrictedInventories");
|
||||||
|
|
||||||
|
|
||||||
private RestrictionSettings() {
|
private RestrictionSettings() {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -6,8 +6,10 @@ import ch.jalu.configme.properties.Property;
|
|||||||
import fr.xephi.authme.security.HashAlgorithm;
|
import fr.xephi.authme.security.HashAlgorithm;
|
||||||
import fr.xephi.authme.settings.EnumSetProperty;
|
import fr.xephi.authme.settings.EnumSetProperty;
|
||||||
|
|
||||||
|
import java.util.List;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
|
||||||
|
import static ch.jalu.configme.properties.PropertyInitializer.newListProperty;
|
||||||
import static ch.jalu.configme.properties.PropertyInitializer.newLowercaseStringSetProperty;
|
import static ch.jalu.configme.properties.PropertyInitializer.newLowercaseStringSetProperty;
|
||||||
import static ch.jalu.configme.properties.PropertyInitializer.newProperty;
|
import static ch.jalu.configme.properties.PropertyInitializer.newProperty;
|
||||||
|
|
||||||
@ -17,27 +19,98 @@ public final class SecuritySettings implements SettingsHolder {
|
|||||||
"Take care with this, if you set this to false,",
|
"Take care with this, if you set this to false,",
|
||||||
"AuthMe will automatically disable and the server won't be protected!"})
|
"AuthMe will automatically disable and the server won't be protected!"})
|
||||||
public static final Property<Boolean> STOP_SERVER_ON_PROBLEM =
|
public static final Property<Boolean> STOP_SERVER_ON_PROBLEM =
|
||||||
newProperty("Security.SQLProblem.stopServer", true);
|
newProperty("Security.SQLProblem.stopServer", false);
|
||||||
|
|
||||||
|
@Comment({"Should send GUI captcha by country code whitelist?",
|
||||||
|
"If the country of the player is in this list, the captcha won't be sent."})
|
||||||
|
public static final Property<List<String>> GUI_CAPTCHA_COUNTRY_WHITELIST =
|
||||||
|
newListProperty("3rdPartyFeature.features.captcha.whiteList");
|
||||||
|
|
||||||
|
@Comment({"Should we let Bedrock players login automatically?",
|
||||||
|
"(Requires hookFloodgate to be true & floodgate loaded)"})
|
||||||
|
public static final Property<Boolean> FORCE_LOGIN_BEDROCK =
|
||||||
|
newProperty("3rdPartyFeature.features.bedrockAutoLogin", false);
|
||||||
|
|
||||||
|
@Comment("Enable the new feature to prevent ghost players?")
|
||||||
|
public static final Property<Boolean> ANTI_GHOST_PLAYERS =
|
||||||
|
newProperty("3rdPartyFeature.fixes.antiGhostPlayer", false);
|
||||||
|
|
||||||
|
@Comment({"(MC1.13- only)",
|
||||||
|
"Should we fix the shulker crash bug with advanced method?"})
|
||||||
|
public static final Property<Boolean> ADVANCED_SHULKER_FIX =
|
||||||
|
newProperty("3rdPartyFeature.fixes.advancedShulkerFix", false);
|
||||||
|
|
||||||
|
@Comment({"Choose the best teleport method by server brand?",
|
||||||
|
"(Enable this if you are using Paper)"})
|
||||||
|
public static final Property<Boolean> SMART_ASYNC_TELEPORT =
|
||||||
|
newProperty("3rdPartyFeature.optimizes.smartAsyncTeleport", false);
|
||||||
|
|
||||||
|
@Comment("Send a GUI captcha to unregistered players?(Requires ProtocolLib)")
|
||||||
|
public static final Property<Boolean> GUI_CAPTCHA =
|
||||||
|
newProperty("3rdPartyFeature.features.captcha.guiCaptcha", false);
|
||||||
|
|
||||||
|
@Comment({"Should we kick the players when they don't finish the GUI captcha in seconds?",
|
||||||
|
"(less than or equals 0 is disabled)"})
|
||||||
|
public static final Property<Integer> GUI_CAPTCHA_TIMEOUT =
|
||||||
|
newProperty("3rdPartyFeature.features.captcha.timeOut", 0);
|
||||||
|
|
||||||
|
@Comment({"Should we ignore floodgate players when sending GUI captcha?",
|
||||||
|
"(Requires floodgate and hookFloodgate: true)"})
|
||||||
|
public static final Property<Boolean> GUI_CAPTCHA_BE_COMPATIBILITY =
|
||||||
|
newProperty("3rdPartyFeature.features.captcha.ignoreBedrock", false);
|
||||||
|
|
||||||
|
@Comment("Should we delete player data and stats when they didn't finish the captcha?")
|
||||||
|
public static final Property<Boolean> DELETE_UNVERIFIED_PLAYER_DATA =
|
||||||
|
newProperty("3rdPartyFeature.features.captcha.purgePlayerData", false);
|
||||||
|
|
||||||
|
@Comment("Which world's player data should be deleted?(Enter the world *FOLDER* name where your players first logged in)")
|
||||||
|
public static final Property<String> DELETE_PLAYER_DATA_WORLD =
|
||||||
|
newProperty("3rdPartyFeature.features.captcha.purgeWorldFolderName", "world");
|
||||||
|
|
||||||
|
@Comment("Should we fix the location when players logged in the portal?")
|
||||||
|
public static final Property<Boolean> LOGIN_LOC_FIX_SUB_PORTAL =
|
||||||
|
newProperty("3rdPartyFeature.fixes.loginLocationFix.fixPortalStuck", false);
|
||||||
|
|
||||||
|
@Comment("Should we fix the location when players logged underground?")
|
||||||
|
public static final Property<Boolean> LOGIN_LOC_FIX_SUB_UNDERGROUND =
|
||||||
|
newProperty("3rdPartyFeature.fixes.loginLocationFix.fixGroundStuck", false);
|
||||||
|
|
||||||
@Comment("Copy AuthMe log output in a separate file as well?")
|
@Comment("Copy AuthMe log output in a separate file as well?")
|
||||||
public static final Property<Boolean> USE_LOGGING =
|
public static final Property<Boolean> USE_LOGGING =
|
||||||
newProperty("Security.console.logConsole", true);
|
newProperty("Security.console.logConsole", true);
|
||||||
|
|
||||||
|
@Comment({"Query haveibeenpwned.com with a hashed version of the password.",
|
||||||
|
"This is used to check whether it is safe."})
|
||||||
|
public static final Property<Boolean> HAVE_I_BEEN_PWNED_CHECK =
|
||||||
|
newProperty("Security.account.haveIBeenPwned.check", false);
|
||||||
|
|
||||||
|
@Comment({"If the password is used more than this number of times, it is considered unsafe."})
|
||||||
|
public static final Property<Integer> HAVE_I_BEEN_PWNED_LIMIT =
|
||||||
|
newProperty("Security.account.haveIBeenPwned.limit", 0);
|
||||||
|
|
||||||
@Comment("Enable captcha when a player uses wrong password too many times")
|
@Comment("Enable captcha when a player uses wrong password too many times")
|
||||||
public static final Property<Boolean> ENABLE_LOGIN_FAILURE_CAPTCHA =
|
public static final Property<Boolean> ENABLE_LOGIN_FAILURE_CAPTCHA =
|
||||||
newProperty("Security.captcha.useCaptcha", false);
|
newProperty("Security.captcha.useCaptcha", false);
|
||||||
|
|
||||||
|
@Comment("Check for updates on enabled from GitHub?")
|
||||||
|
public static final Property<Boolean> CHECK_FOR_UPDATES =
|
||||||
|
newProperty("Plugin.updates.checkForUpdates", true);
|
||||||
|
|
||||||
|
@Comment("Should we show the AuthMe banner on startup?")
|
||||||
|
public static final Property<Boolean> SHOW_STARTUP_BANNER =
|
||||||
|
newProperty("Plugin.banners.showBanners", true);
|
||||||
|
|
||||||
@Comment("Max allowed tries before a captcha is required")
|
@Comment("Max allowed tries before a captcha is required")
|
||||||
public static final Property<Integer> MAX_LOGIN_TRIES_BEFORE_CAPTCHA =
|
public static final Property<Integer> MAX_LOGIN_TRIES_BEFORE_CAPTCHA =
|
||||||
newProperty("Security.captcha.maxLoginTry", 5);
|
newProperty("Security.captcha.maxLoginTry", 8);
|
||||||
|
|
||||||
@Comment("Captcha length")
|
@Comment("Captcha length")
|
||||||
public static final Property<Integer> CAPTCHA_LENGTH =
|
public static final Property<Integer> CAPTCHA_LENGTH =
|
||||||
newProperty("Security.captcha.captchaLength", 5);
|
newProperty("Security.captcha.captchaLength", 6);
|
||||||
|
|
||||||
@Comment("Minutes after which login attempts count is reset for a player")
|
@Comment("Minutes after which login attempts count is reset for a player")
|
||||||
public static final Property<Integer> CAPTCHA_COUNT_MINUTES_BEFORE_RESET =
|
public static final Property<Integer> CAPTCHA_COUNT_MINUTES_BEFORE_RESET =
|
||||||
newProperty("Security.captcha.captchaCountReset", 60);
|
newProperty("Security.captcha.captchaCountReset", 120);
|
||||||
|
|
||||||
@Comment("Require captcha before a player may register?")
|
@Comment("Require captcha before a player may register?")
|
||||||
public static final Property<Boolean> ENABLE_CAPTCHA_FOR_REGISTRATION =
|
public static final Property<Boolean> ENABLE_CAPTCHA_FOR_REGISTRATION =
|
||||||
@ -45,11 +118,11 @@ public final class SecuritySettings implements SettingsHolder {
|
|||||||
|
|
||||||
@Comment("Minimum length of password")
|
@Comment("Minimum length of password")
|
||||||
public static final Property<Integer> MIN_PASSWORD_LENGTH =
|
public static final Property<Integer> MIN_PASSWORD_LENGTH =
|
||||||
newProperty("settings.security.minPasswordLength", 5);
|
newProperty("settings.security.minPasswordLength", 8);
|
||||||
|
|
||||||
@Comment("Maximum length of password")
|
@Comment("Maximum length of password")
|
||||||
public static final Property<Integer> MAX_PASSWORD_LENGTH =
|
public static final Property<Integer> MAX_PASSWORD_LENGTH =
|
||||||
newProperty("settings.security.passwordMaxLength", 30);
|
newProperty("settings.security.passwordMaxLength", 26);
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"Possible values: SHA256, BCRYPT, BCRYPT2Y, PBKDF2, SALTEDSHA512,",
|
"Possible values: SHA256, BCRYPT, BCRYPT2Y, PBKDF2, SALTEDSHA512,",
|
||||||
@ -87,7 +160,7 @@ public final class SecuritySettings implements SettingsHolder {
|
|||||||
"- 'help'"})
|
"- 'help'"})
|
||||||
public static final Property<Set<String>> UNSAFE_PASSWORDS =
|
public static final Property<Set<String>> UNSAFE_PASSWORDS =
|
||||||
newLowercaseStringSetProperty("settings.security.unsafePasswords",
|
newLowercaseStringSetProperty("settings.security.unsafePasswords",
|
||||||
"123456", "password", "qwerty", "12345", "54321", "123456789", "help");
|
"12345678", "password", "qwertyui", "123456789", "87654321", "1234567890", "asdfghjkl","zxcvbnm,","asdfghjk","12312312","123123123","32132132","321321321");
|
||||||
|
|
||||||
@Comment("Tempban a user's IP address if they enter the wrong password too many times")
|
@Comment("Tempban a user's IP address if they enter the wrong password too many times")
|
||||||
public static final Property<Boolean> TEMPBAN_ON_MAX_LOGINS =
|
public static final Property<Boolean> TEMPBAN_ON_MAX_LOGINS =
|
||||||
@ -95,7 +168,7 @@ public final class SecuritySettings implements SettingsHolder {
|
|||||||
|
|
||||||
@Comment("How many times a user can attempt to login before their IP being tempbanned")
|
@Comment("How many times a user can attempt to login before their IP being tempbanned")
|
||||||
public static final Property<Integer> MAX_LOGIN_TEMPBAN =
|
public static final Property<Integer> MAX_LOGIN_TEMPBAN =
|
||||||
newProperty("Security.tempban.maxLoginTries", 10);
|
newProperty("Security.tempban.maxLoginTries", 8);
|
||||||
|
|
||||||
@Comment({"The length of time a IP address will be tempbanned in minutes",
|
@Comment({"The length of time a IP address will be tempbanned in minutes",
|
||||||
"Default: 480 minutes, or 8 hours"})
|
"Default: 480 minutes, or 8 hours"})
|
||||||
@ -118,17 +191,17 @@ public final class SecuritySettings implements SettingsHolder {
|
|||||||
|
|
||||||
@Comment("How many hours is a recovery code valid for?")
|
@Comment("How many hours is a recovery code valid for?")
|
||||||
public static final Property<Integer> RECOVERY_CODE_HOURS_VALID =
|
public static final Property<Integer> RECOVERY_CODE_HOURS_VALID =
|
||||||
newProperty("Security.recoveryCode.validForHours", 4);
|
newProperty("Security.recoveryCode.validForHours", 6);
|
||||||
|
|
||||||
@Comment("Max number of tries to enter recovery code")
|
@Comment("Max number of tries to enter recovery code")
|
||||||
public static final Property<Integer> RECOVERY_CODE_MAX_TRIES =
|
public static final Property<Integer> RECOVERY_CODE_MAX_TRIES =
|
||||||
newProperty("Security.recoveryCode.maxTries", 3);
|
newProperty("Security.recoveryCode.maxTries", 4);
|
||||||
|
|
||||||
@Comment({"How long a player has after password recovery to change their password",
|
@Comment({"How long a player has after password recovery to change their password",
|
||||||
"without logging in. This is in minutes.",
|
"without logging in. This is in minutes.",
|
||||||
"Default: 2 minutes"})
|
"Default: 2 minutes"})
|
||||||
public static final Property<Integer> PASSWORD_CHANGE_TIMEOUT =
|
public static final Property<Integer> PASSWORD_CHANGE_TIMEOUT =
|
||||||
newProperty("Security.recoveryCode.passwordChangeTimeout", 2);
|
newProperty("Security.recoveryCode.passwordChangeTimeout", 5);
|
||||||
|
|
||||||
@Comment({
|
@Comment({
|
||||||
"Seconds a user has to wait for before a password recovery mail may be sent again",
|
"Seconds a user has to wait for before a password recovery mail may be sent again",
|
||||||
|
|||||||
@ -28,7 +28,7 @@ public final class PlayerUtils {
|
|||||||
* @return True if the player is an NPC, false otherwise
|
* @return True if the player is an NPC, false otherwise
|
||||||
*/
|
*/
|
||||||
public static boolean isNpc(Player player) {
|
public static boolean isNpc(Player player) {
|
||||||
return player.hasMetadata("NPC");
|
return player.hasMetadata("NPC") || player.getAddress() == null;
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
44
src/main/java/fr/xephi/authme/util/TeleportUtils.java
Normal file
44
src/main/java/fr/xephi/authme/util/TeleportUtils.java
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
package fr.xephi.authme.util;
|
||||||
|
|
||||||
|
import org.bukkit.Location;
|
||||||
|
import org.bukkit.entity.Player;
|
||||||
|
|
||||||
|
import java.lang.reflect.InvocationTargetException;
|
||||||
|
import java.lang.reflect.Method;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This class is a utility class for handling async teleportation of players in game.
|
||||||
|
*/
|
||||||
|
public class TeleportUtils {
|
||||||
|
private static Method teleportAsyncMethod;
|
||||||
|
|
||||||
|
static {
|
||||||
|
try {//Detect Paper class
|
||||||
|
Class<?> paperClass = Class.forName("com.destroystokyo.paper.PaperConfig");
|
||||||
|
teleportAsyncMethod = Player.class.getMethod("teleportAsync", Location.class);
|
||||||
|
teleportAsyncMethod.setAccessible(true);
|
||||||
|
// if detected,use teleportAsync()
|
||||||
|
} catch (ClassNotFoundException | NoSuchMethodException e) {
|
||||||
|
teleportAsyncMethod = null;
|
||||||
|
//if not, set method to null
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Teleport a player to a specified location.
|
||||||
|
*
|
||||||
|
* @param player The player to be teleported
|
||||||
|
* @param location Where should the player be teleported
|
||||||
|
*/
|
||||||
|
public static void teleport(Player player, Location location) {
|
||||||
|
if (teleportAsyncMethod != null) {
|
||||||
|
try {
|
||||||
|
teleportAsyncMethod.invoke(player, location);
|
||||||
|
} catch (IllegalAccessException | InvocationTargetException e) {
|
||||||
|
player.teleport(location);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
player.teleport(location);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
BIN
src/main/resources/GeoLite2-Country.mmdb
Normal file
BIN
src/main/resources/GeoLite2-Country.mmdb
Normal file
Binary file not shown.
@ -1,18 +1,121 @@
|
|||||||
<h1>
|
<div class="mail">
|
||||||
Dear <playername />,
|
<style>
|
||||||
</h1>
|
.mail td{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
<p>
|
text-align: center;
|
||||||
This is your new AuthMe password for the server <servername />:
|
font-size: 16px;
|
||||||
</p>
|
color: #718096;
|
||||||
<p>
|
}
|
||||||
<generatedpass />
|
.mail th, div, p, a, h1, h2, h3, h4, h5, h6{
|
||||||
</p>
|
font-family: "Segoe UI", sans-serif;
|
||||||
<image />
|
text-align: center;
|
||||||
<p>
|
color: #3d4852;
|
||||||
Do not forget to change password after login!<br />
|
}
|
||||||
/changepassword <generatedpass /> newPassword'
|
.mail .mail-content {
|
||||||
</p>
|
max-width: 100vw;
|
||||||
<p>
|
padding: 32px;
|
||||||
See you on <servername />!
|
box-shadow: 0 15px 28px rgba(0, 0, 0, 0.25), 0 10px 10px rgba(0, 0, 0, 0.25);
|
||||||
</p>
|
}
|
||||||
|
.mail div{
|
||||||
|
background-color: #ffffff;color: #718096;height: 100%;line-height: 1.4;width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_wrapper{
|
||||||
|
background-color: #edf2f7;
|
||||||
|
width:100%;
|
||||||
|
}
|
||||||
|
.mail .x_content{
|
||||||
|
width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_inner-body{
|
||||||
|
background-color: #ffffff;border-color: #e8e5ef;border-radius: 2px;border-width: 1px;margin: 0 auto;padding:0;width: 570px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell{
|
||||||
|
margin: 0 auto;padding: 0;width: 570px;line-height: 1.5em;
|
||||||
|
color: #b0adc5;font-size: 12px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell td{
|
||||||
|
max-width: 100vw;padding: 32px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div>
|
||||||
|
<table class="x_wrapper">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="padding: 25px 0;">
|
||||||
|
<h1 style="font-size: 20px;">密码重置邮件</h1>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_inner-body">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="mail-content">
|
||||||
|
<h1 style="font-size: 18px;margin-bottom: 25px;">Minecraft · <servername /><br/><playername /></h1>
|
||||||
|
<hr>
|
||||||
|
<table style="width: 100%;">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
您正在申请的新密码为
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="font-weight: bold;">
|
||||||
|
<br/><generatedpass /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<br/>请妥善保存,在新地址上进行登录时,需提供该密码.
|
||||||
|
<br/>若非必要,请勿更换密码,否则将对您的账户安全构成威胁.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="text-align:right;">
|
||||||
|
<br/>
|
||||||
|
<br/>祝您游玩愉快~!
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<small>
|
||||||
|
<br/><time />
|
||||||
|
<br/>请勿回复
|
||||||
|
</small>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content-cell">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<p style="color:#b0adc5;">© 2023 HomoCraft. All rights reserved.</p>
|
||||||
|
<a href="1919810.com" target="_blank"
|
||||||
|
style="text-decoration: none; font-size: 16px">wdsj.io</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|||||||
@ -1,8 +1,5 @@
|
|||||||
# AuthmeReloaded帮助文件汉化
|
|
||||||
# Translated By CH1
|
|
||||||
# -------------------------------------------------------
|
|
||||||
common:
|
common:
|
||||||
header: '==========[ AuthMeReloaded ]=========='
|
header: '======================================'
|
||||||
optional: '可选'
|
optional: '可选'
|
||||||
hasPermission: '您拥有权限去使用这个指令'
|
hasPermission: '您拥有权限去使用这个指令'
|
||||||
noPermission: '您没有权限使用这个指令'
|
noPermission: '您没有权限使用这个指令'
|
||||||
|
|||||||
@ -20,6 +20,7 @@ password:
|
|||||||
unsafe_password: '&cThe chosen password isn''t safe, please choose another one...'
|
unsafe_password: '&cThe chosen password isn''t safe, please choose another one...'
|
||||||
forbidden_characters: '&4Your password contains illegal characters. Allowed chars: %valid_chars'
|
forbidden_characters: '&4Your password contains illegal characters. Allowed chars: %valid_chars'
|
||||||
wrong_length: '&cYour password is too short or too long! Please try with another one!'
|
wrong_length: '&cYour password is too short or too long! Please try with another one!'
|
||||||
|
pwned_password: '&cYour chosen password is not secure. It was used %pwned_count times already! Please use a strong password...'
|
||||||
|
|
||||||
# Login
|
# Login
|
||||||
login:
|
login:
|
||||||
@ -154,3 +155,28 @@ time:
|
|||||||
hours: 'hours'
|
hours: 'hours'
|
||||||
day: 'day'
|
day: 'day'
|
||||||
days: 'days'
|
days: 'days'
|
||||||
|
|
||||||
|
# 3rd party features: GUI Captcha
|
||||||
|
gui_captcha:
|
||||||
|
success: '&aVerification success!'
|
||||||
|
bedrock_auto_verify_success: '&aBedrock verification success!'
|
||||||
|
captcha_window_name: '%random Verification'
|
||||||
|
captcha_clickable_name: '%random I am human'
|
||||||
|
message_on_retry: '&cVerification failed, you have %times retries left'
|
||||||
|
denied_message_sending: '&cPlease be verified before chatting!'
|
||||||
|
kick_on_failed: '&cPlease complete the verification!'
|
||||||
|
kick_on_timeout: '&cVerification timed out!'
|
||||||
|
|
||||||
|
# 3rd party features: Bedrock Auto Login
|
||||||
|
bedrock_auto_login:
|
||||||
|
success: '&aBedrock auto login success!'
|
||||||
|
|
||||||
|
# 3rd party features: Login Location Fix
|
||||||
|
login_location_fix:
|
||||||
|
fix_portal: '&aYou are stuck in portal during Login.'
|
||||||
|
fix_underground: '&aYou are stuck underground during Login.'
|
||||||
|
cannot_fix_underground: '&aYou are stuck underground during Login, but we cant fix it.'
|
||||||
|
|
||||||
|
# 3rd party features: Double Login Fix
|
||||||
|
double_login_fix:
|
||||||
|
fix_message: '&cYou have been disconnected due to doubled login.'
|
||||||
|
|||||||
@ -5,132 +5,142 @@
|
|||||||
|
|
||||||
# Registration
|
# Registration
|
||||||
registration:
|
registration:
|
||||||
disabled: '&8[&6玩家系统&8] &c目前服务器暂时禁止注册,请到服务器论坛以得到更多资讯'
|
disabled: '&c注册已被禁止'
|
||||||
name_taken: '&8[&6玩家系统&8] &c此用户已经在此服务器注册过'
|
name_taken: '&c此用户已经在此服务器注册过'
|
||||||
register_request: '&8[&6玩家系统&8] &c请输入“/register <密码> <再输入一次以确定密码>”以注册'
|
register_request: '&b请输入“&a/reg <密码> <重复密码>&b”以注册'
|
||||||
command_usage: '&8[&6玩家系统&8] &c正确用法:“/register <密码> <再输入一次以确定密码>”'
|
command_usage: '&c正确用法:“/reg <密码> <重复密码>”'
|
||||||
reg_only: '&8[&6玩家系统&8] &f只允许注册过的玩家进服!请到 https://example.cn 注册'
|
reg_only: '&c只允许注册过的玩家进服!'
|
||||||
success: '&8[&6玩家系统&8] &c已成功注册!'
|
success: '&a*** 已成功注册 ***'
|
||||||
kicked_admin_registered: '有一位管理员刚刚为您完成了注册,请重新登录'
|
kicked_admin_registered: '&a*** 管理员刚刚注册了您; 请重新登录 ***'
|
||||||
|
|
||||||
# Password errors on registration
|
# Password errors on registration
|
||||||
password:
|
password:
|
||||||
match_error: '&8[&6玩家系统&8] &f密码不相同'
|
match_error: '&c密码不相同'
|
||||||
name_in_password: '&8[&6玩家系统&8] &f你不能使用你的名字作为密码。 '
|
name_in_password: '&c您不能使用您的名字作为密码。 '
|
||||||
unsafe_password: '&8[&6玩家系统&8] &f你不能使用安全性过低的密码。 '
|
unsafe_password: '&c您不能使用安全性过低的密码。 '
|
||||||
forbidden_characters: '&4您的密码包含了非法字符。可使用的字符: %valid_chars'
|
forbidden_characters: '&4您的密码包含了非法字符.可使用的字符: %valid_chars'
|
||||||
wrong_length: '&8[&6玩家系统&8] &c你的密码不符合要求'
|
wrong_length: '&4您的密码没有达到要求!'
|
||||||
|
pwned_password: '&c你使用的密码并不安全。它已经被使用了 %pwned_count 次! 请使用一个更强大的密码...'
|
||||||
|
|
||||||
# Login
|
# Login
|
||||||
login:
|
login:
|
||||||
command_usage: '&8[&6玩家系统&8] &c正确用法:“/login <密码>”'
|
command_usage: '&c正确用法:“/l <密码>”'
|
||||||
wrong_password: '&8[&6玩家系统&8] &c错误的密码'
|
wrong_password: '&c*** 密码错误 ***'
|
||||||
success: '&8[&6玩家系统&8] &c已成功登录!'
|
success: '&a*** 已成功登录 ***'
|
||||||
login_request: '&8[&6玩家系统&8] &c请输入“/login <密码>”以登录'
|
login_request: '&c请输入“/l <密码>”以登录'
|
||||||
timeout_error: '&8[&6玩家系统&8] &f登录超时'
|
timeout_error: '给您登录的时间已经过了'
|
||||||
|
|
||||||
# Errors
|
# Errors
|
||||||
error:
|
error:
|
||||||
denied_command: '&c您需要先通过验证才能使用该命令!'
|
denied_command: '&7您需要先通过验证才能使用该命令!'
|
||||||
denied_chat: '&c您需要先通过验证才能聊天!'
|
denied_chat: '&7您需要先通过验证才能聊天!'
|
||||||
unregistered_user: '&8[&6玩家系统&8] &c此用户名还未注册过'
|
unregistered_user: '&c此用户名还未注册过'
|
||||||
not_logged_in: '&8[&6玩家系统&8] &c你还未登录!'
|
not_logged_in: '&c您还未登录!'
|
||||||
no_permission: '&8[&6玩家系统&8] &c没有权限'
|
no_permission: '&c没有权限'
|
||||||
unexpected_error: '&8[&6玩家系统&8] &f发现错误,请联系管理员'
|
unexpected_error: '&4发现错误,请联系管理员'
|
||||||
max_registration: '&8[&6玩家系统&8] &f你不允许再为你的IP在服务器注册更多用户了!'
|
max_registration: '&c该地址已无法注册,请联系管理员进行注册.'
|
||||||
logged_in: '&8[&6玩家系统&8] &c你已经登陆过了!'
|
logged_in: '&c您已经登陆过了!'
|
||||||
kick_for_vip: '&8[&6玩家系统&8] &cA VIP玩家加入了已满的服务器!'
|
kick_for_vip: '&c一个VIP玩家加入了已满的服务器!'
|
||||||
kick_unresolved_hostname: '&8[&6玩家系统&8] &c发生了一个错误: 无法解析玩家的Hostname'
|
kick_unresolved_hostname: '&c发生了一个错误: 无法解析玩家的主机名'
|
||||||
tempban_max_logins: '&c由于您登录失败次数过多,已被暂时禁止登录。'
|
tempban_max_logins: '&c由于您登录失败次数过多,已被暂时禁止登录。'
|
||||||
|
|
||||||
# AntiBot
|
# AntiBot
|
||||||
antibot:
|
antibot:
|
||||||
kick_antibot: '&8[&6玩家系统&8] &f验证程序已启用 !请稍等几分钟后再次进入服务器'
|
kick_antibot: '连接异常,请稍后加入'
|
||||||
auto_enabled: '&8[&6玩家系统&8] &f验证程序由于大量异常连接而启用'
|
auto_enabled: '&c由于发生大量异常连接,本服将禁止连接.'
|
||||||
auto_disabled: '&8[&6玩家系统&8] &f验证程序由于异常连接减少而在 %m 分钟后停止'
|
auto_disabled: '&a异常连接减少,本服将在 &a%m &a分钟后自动开放连接.'
|
||||||
|
|
||||||
# Unregister
|
# Unregister
|
||||||
unregister:
|
unregister:
|
||||||
success: '&8[&6玩家系统&8] &c成功删除此用户!'
|
success: '&a*** 已成功注销 ***'
|
||||||
command_usage: '&8[&6玩家系统&8] &c正确用法:“/unregister <密码>”'
|
command_usage: '&c正确用法:“/unregister <密码>”'
|
||||||
|
|
||||||
# Other messages
|
# Other messages
|
||||||
misc:
|
misc:
|
||||||
account_not_activated: '&8[&6玩家系统&8] &f你的帐号还未激活,请查看你的邮箱!'
|
account_not_activated: |-
|
||||||
password_changed: '&8[&6玩家系统&8] &c密码已成功修改!'
|
&a一封包含密码的邮件已发送至您的收件箱.
|
||||||
logout: '&8[&6玩家系统&8] &c已成功登出!'
|
&a请在十分钟内完成登录,否则将注销此账户.
|
||||||
reload: '&8[&6玩家系统&8] &f配置以及数据已经重新加载完毕'
|
not_activated: '&c账户未激活,请注册激活后再次尝试.'
|
||||||
usage_change_password: '&8[&6玩家系统&8] &f正确用法:“/changepassword 旧密码 新密码”'
|
password_changed: '&a*** 密码已修改 ***'
|
||||||
accounts_owned_self: '您拥有 %count 个账户:'
|
logout: '&a*** 已成功登出 ***'
|
||||||
accounts_owned_other: '玩家 %name 拥有 %count 个账户:'
|
reload: '&a配置以及数据已经重新加载完毕'
|
||||||
|
usage_change_password: '&a正确用法:“/changepassword 旧密码 新密码”'
|
||||||
|
accounts_owned_self: '您拥有 %count 个账户:'
|
||||||
|
accounts_owned_other: '玩家 %name 拥有 %count 个账户:'
|
||||||
|
|
||||||
# Session messages
|
# Session messages
|
||||||
session:
|
session:
|
||||||
valid_session: '&8[&6玩家系统&8] &c欢迎回来,已帮你自动登录到此服务器'
|
valid_session: ''
|
||||||
invalid_session: '&8[&6玩家系统&8] &f登录数据异常,请等待登录结束'
|
invalid_session: '&c*** 请重新登录 ***'
|
||||||
|
|
||||||
# Error messages when joining
|
# Error messages when joining
|
||||||
on_join_validation:
|
on_join_validation:
|
||||||
same_ip_online: '已有一个同IP玩家在游戏中了!'
|
same_ip_online: '已有一个同IP玩家在游戏中了!'
|
||||||
same_nick_online: '&8[&6玩家系统&8] &f同样的用户名现在在线且已经登录了!'
|
same_nick_online: '&a同样的用户名现在在线且已经登录了!'
|
||||||
name_length: '&8[&6玩家系统&8] &c你的用户名太短或者太长了'
|
name_length: '&c您的用户名太短或者太长了'
|
||||||
characters_in_name: '&8[&6玩家系统&8] &c你的用户名包含非法字母,用户名里允许的字母: %valid_chars'
|
characters_in_name: '&c您的用户名不符合标准.'
|
||||||
kick_full_server: '&8[&6玩家系统&8] &c抱歉,服务器已满!'
|
kick_full_server: '&c抱歉,服务器已满!'
|
||||||
country_banned: '这个服务器禁止该国家登陆'
|
country_banned: |-
|
||||||
not_owner_error: '&8[&6玩家系统&8] &4警告! &c你并不是此帐户的拥有者,请立即登出! '
|
&6[&b&lAccount Security System&6]
|
||||||
invalid_name_case: '&8[&6玩家系统&8] &c你应该使用「%valid」而并非「%invalid」登入游戏。 '
|
&c为保证您的游玩体验,请使用中国境内网络连接.
|
||||||
quick_command: '&8[&6玩家系统&8] &c您发送命令的速度太快了,请重新加入服务器再等待一会后再使用命令'
|
&cTo ensure your play experience,please use the Internet connection within China.
|
||||||
|
not_owner_error: |-
|
||||||
|
&6[&b&lAccount Security System&6]
|
||||||
|
&c请勿尝试登陆系统账户,系统账户受安全系统保护.
|
||||||
|
&c如果您并不知情,请更换您的用户名重新加入该服务器.
|
||||||
|
invalid_name_case: '&c您应该使用 %valid 登录服务器,当前名字: %invalid .'
|
||||||
|
quick_command: '&c您发送命令的速度太快了,请重新加入服务器等待一会后再使用命令'
|
||||||
|
|
||||||
# Email
|
# Email
|
||||||
email:
|
email:
|
||||||
add_email_request: '&8[&6玩家系统&8] &c请输入“/email add <你的邮箱> <再输入一次以确认>”以添加您的邮箱到此帐号'
|
add_email_request: ''
|
||||||
usage_email_add: '&8[&6玩家系统&8] &f用法: /email add <邮箱> <确认邮箱地址> '
|
usage_email_add: '&a用法: /email add <邮箱> <确认邮箱> '
|
||||||
usage_email_change: '&8[&6玩家系统&8] &f用法: /email change <旧邮箱> <新邮箱> '
|
usage_email_change: '&a用法: /email change <旧邮箱> <新邮箱> '
|
||||||
new_email_invalid: '&8[&6玩家系统&8] &f新邮箱无效!'
|
new_email_invalid: '&c新邮箱无效!'
|
||||||
old_email_invalid: '&8[&6玩家系统&8] &f旧邮箱无效!'
|
old_email_invalid: '&c旧邮箱无效!'
|
||||||
invalid: '&8[&6玩家系统&8] &f无效的邮箱'
|
invalid: '&c无效的邮箱'
|
||||||
added: '&8[&6玩家系统&8] &f邮箱已添加 !'
|
added: '&a*** 邮箱已添加 ***'
|
||||||
add_not_allowed: '&8[&6玩家系统&8] &c服务器不允许添加邮箱地址'
|
add_not_allowed: '&c服务器不允许添加电子邮箱'
|
||||||
request_confirmation: '&8[&6玩家系统&8] &f确认你的邮箱 !'
|
request_confirmation: '&c确认您的邮箱'
|
||||||
changed: '&8[&6玩家系统&8] &f邮箱已修改 !'
|
changed: '&a*** 邮箱已修改 ***'
|
||||||
change_not_allowed: '&8[&6玩家系统&8] &c服务器不允许修改邮箱地址'
|
change_not_allowed: '&c服务器不允许修改邮箱地址'
|
||||||
email_show: '&8[&6玩家系统&8] &2您当前的电子邮件地址为: &f%email'
|
email_show: '&a该账户使用的电子邮箱为: &a%email'
|
||||||
no_email_for_account: '&8[&6玩家系统&8] &2您当前并没有任何邮箱与该账号绑定'
|
no_email_for_account: '&c当前并没有任何邮箱与该账号绑定'
|
||||||
already_used: '&8[&6玩家系统&8] &4邮箱已被使用'
|
already_used: '&c邮箱已被使用'
|
||||||
incomplete_settings: '&8[&6玩家系统&8] 错误:必要设置未设定完成,请联系管理员'
|
incomplete_settings: '&c错误: 必要设置未设定完成,请联系管理员'
|
||||||
send_failure: '&8[&6玩家系统&8] 邮件发送失败,请联系管理员'
|
send_failure: '&c邮件已被作废,请检查您的邮箱是否正常工作.'
|
||||||
change_password_expired: '&8[&6玩家系统&8] 您不能使用此命令更改密码'
|
change_password_expired: '&c您不能使用此命令更改密码'
|
||||||
email_cooldown_error: '&8[&6玩家系统&8] &c邮件已在几分钟前发送,您需要等待 %time 后才能再次请求发送'
|
email_cooldown_error: '&c您需要等待 %time 后才能再次请求发送'
|
||||||
|
|
||||||
# Password recovery by email
|
# Password recovery by email
|
||||||
recovery:
|
recovery:
|
||||||
forgot_password_hint: '&8[&6玩家系统&8] &c忘了你的密码?请输入:“/email recovery <你的邮箱>”'
|
forgot_password_hint: '&c忘了您的密码?请输入:“/email recovery <您的邮箱>”'
|
||||||
command_usage: '&8[&6玩家系统&8] &f用法: /email recovery <邮箱>'
|
command_usage: '&a用法: /email recovery <邮箱>'
|
||||||
email_sent: '&8[&6玩家系统&8] &f找回密码邮件已发送 !'
|
email_sent: '&a找回密码邮件已发送!'
|
||||||
code:
|
code:
|
||||||
code_sent: '一个用于重置您的密码的验证码已发到您的邮箱'
|
code_sent: '&a*** 已发送验证邮件 ***'
|
||||||
incorrect: '验证码不正确! 使用 /email recovery [邮箱] 以生成新的验证码'
|
incorrect: '&a验证码不正确! 使用 /email recovery [邮箱] 以生成新的验证码'
|
||||||
tries_exceeded: '您已经达到输入验证码次数的最大允许次数。请使用 "/email recovery [邮箱]" 来生成一个新的'
|
tries_exceeded: '&a您已经达到输入验证码次数的最大允许次数.'
|
||||||
correct: '验证码正确!'
|
correct: '&a*** 验证通过 ***'
|
||||||
change_password: '请使用 /email setpassword <新密码> 立即设置新的密码'
|
change_password: '&c请使用 /email setpassword <新密码> 立即设置新的密码'
|
||||||
|
|
||||||
# Captcha
|
# Captcha
|
||||||
captcha:
|
captcha:
|
||||||
usage_captcha: '&8[&6玩家系统&8] &c正确用法:/captcha %captcha_code'
|
usage_captcha: '&7请输入 /captcha %captcha_code 来验证操作.'
|
||||||
wrong_captcha: '&8[&6玩家系统&8] &c错误的验证码,请输入:“/captcha %captcha_code”'
|
wrong_captcha: '&c错误的验证码.'
|
||||||
valid_captcha: '&8[&6玩家系统&8] &c你的验证码是有效的!'
|
valid_captcha: '&a*** 验证通过 ***'
|
||||||
captcha_for_registration: '注册前您需要先提供验证码,请使用指令:/captcha %captcha_code'
|
captcha_for_registration: '&7请输入 /captcha %captcha_code 来验证操作.'
|
||||||
register_captcha_valid: '&2有效的验证码!您现在可以使用 /register 注册啦!'
|
register_captcha_valid: '&a验证通过, 现在可以使用 /register 注册啦!'
|
||||||
|
|
||||||
# Verification code
|
# Verification code
|
||||||
verification:
|
verification:
|
||||||
code_required: '&3这个命令非常敏感,需要电子邮件验证!请检查您的收件箱,并遵循邮件的指导。'
|
code_required: '&a*** 已发送验证邮件 ***'
|
||||||
command_usage: '&c使用方法: /verification <验证码>'
|
command_usage: '&c使用方法:/verification <验证码>'
|
||||||
incorrect_code: '&c验证码错误, 请在聊天框输入 "/verification <验证码>",使用您在电子邮件中收到的验证码。'
|
incorrect_code: '&c错误的验证码.'
|
||||||
success: '&2您的身份已经得到验证!您现在可以在当前会话中执行所有命令!'
|
success: '&a*** 验证通过 ***'
|
||||||
already_verified: '&2您已经可以在当前会话中执行任何敏感命令!'
|
already_verified: '&a您已经通过验证'
|
||||||
code_expired: '&3您的验证码已失效!执行另一个敏感命令以获得新的验证码!'
|
code_expired: '&c验证码已失效'
|
||||||
email_needed: '&3为了验证您的身份,您需要将一个电子邮件地址与您的帐户绑定!!'
|
email_needed: '&c邮箱未绑定'
|
||||||
|
|
||||||
# Time units
|
# Time units
|
||||||
time:
|
time:
|
||||||
@ -138,20 +148,47 @@ time:
|
|||||||
seconds: '秒'
|
seconds: '秒'
|
||||||
minute: '分'
|
minute: '分'
|
||||||
minutes: '分'
|
minutes: '分'
|
||||||
hour: '小时'
|
hour: '时'
|
||||||
hours: '小时'
|
hours: '时'
|
||||||
day: '天'
|
day: '天'
|
||||||
days: '天'
|
days: '天'
|
||||||
|
|
||||||
# Two-factor authentication
|
# Two-factor authentication
|
||||||
two_factor:
|
two_factor:
|
||||||
code_created: '&8[&6玩家系统&8] &a你的代码是 %code,你可以使用 %url 来进行扫描'
|
code_created: '&7您正在激活双重验证, 请打开 &a%url &7扫描二维码'
|
||||||
confirmation_required: '&8[&6玩家系统&8] &3请输入 &a/2fa confirm <验证码> &3来确认双重认证'
|
confirmation_required: '&7请输入“/totp confirm <验证码>”来确认激活双重验证'
|
||||||
code_required: '&8[&6玩家系统&8] &c请输入 &a/2fa code <验证码> &c来提交双重认证验证码'
|
code_required: '&c请输入“/totp code <验证码>”来提交验证码'
|
||||||
already_enabled: '&8[&6玩家系统&8] &a双重认证已在您的账号上启用'
|
already_enabled: '&a双重验证已启用'
|
||||||
enable_error_no_code: '&8[&6玩家系统&8] &c双重认证密钥不存在或已过期,请输入 &a/2fa add &c来添加'
|
enable_error_no_code: '&c验证码丢失'
|
||||||
enable_success: '&8[&6玩家系统&8] &a已成功启用双重认证'
|
enable_success: '&a已成功启用双重验证'
|
||||||
enable_error_wrong_code: '&8[&6玩家系统&8] &c双重认证代码错误或者已经过期,请重新执行 &a/2fa add'
|
enable_error_wrong_code: '&c验证码错误或者已经过期,请重新执行“/totp add”'
|
||||||
not_enabled_error: '&8[&6玩家系统&8] &c双重认证码未在您的账号上启用,请使用 &a/2fa add &c来启用'
|
not_enabled_error: '&c双重验证未在您的账号上启用,请使用“/totp add”来启用'
|
||||||
removed_success: '&8[&6玩家系统&8] &c双重认证码已从您的账号上删除'
|
removed_success: '&c双重验证已从您的账号上禁用'
|
||||||
invalid_code: '&8[&6玩家系统&8] &c无效的验证码'
|
invalid_code: '&c无效的验证码'
|
||||||
|
|
||||||
|
# 3rd party features: GUI Captcha
|
||||||
|
gui_captcha:
|
||||||
|
success: '&a*** 验证完成 ***'
|
||||||
|
bedrock_auto_verify_success: '&a*** 基岩版自动验证完成 ***'
|
||||||
|
captcha_window_name: '&k%random&r&n请验证你是真人'
|
||||||
|
captcha_clickable_name: '&k%random&r&n我是真人'
|
||||||
|
message_on_retry: '&c验证失败,你还有 %times 次机会'
|
||||||
|
denied_message_sending: '&c请先完成验证再聊天!'
|
||||||
|
kick_on_failed: '&c请先完成验证!'
|
||||||
|
kick_on_timeout: '&c验证超时'
|
||||||
|
|
||||||
|
# 3rd party features: Bedrock Auto Login
|
||||||
|
bedrock_auto_login:
|
||||||
|
success: "&a基岩版自动登录完成"
|
||||||
|
|
||||||
|
# 3rd party features: Login Location Fix
|
||||||
|
login_location_fix:
|
||||||
|
fix_portal: '&a你在登录时卡在了地狱门, 现已修正'
|
||||||
|
fix_underground: '&a你被埋住了, 坐标已修正, 下次下线之前请小心!'
|
||||||
|
cannot_fix_underground: '&a你被埋住了, 坐标无法修正, 只好送你去了最高点, 自求多福吧少年~'
|
||||||
|
|
||||||
|
# 3rd party features: Double Login Fix
|
||||||
|
double_login_fix:
|
||||||
|
fix_message: '&a已修复幽灵玩家, 请重新进入'
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
127
src/main/resources/new_email.html
Normal file
127
src/main/resources/new_email.html
Normal file
@ -0,0 +1,127 @@
|
|||||||
|
<div class="mail">
|
||||||
|
<style>
|
||||||
|
.mail td{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
|
text-align: center;
|
||||||
|
font-size: 16px;
|
||||||
|
color: #718096;
|
||||||
|
}
|
||||||
|
.mail th, div, p, a, h1, h2, h3, h4, h5, h6{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
|
text-align: center;
|
||||||
|
color: #3d4852;
|
||||||
|
}
|
||||||
|
.mail .mail-content {
|
||||||
|
max-width: 100vw;
|
||||||
|
padding: 32px;
|
||||||
|
box-shadow: 0 15px 28px rgba(0, 0, 0, 0.25), 0 10px 10px rgba(0, 0, 0, 0.25);
|
||||||
|
}
|
||||||
|
.mail div{
|
||||||
|
background-color: #ffffff;color: #718096;height: 100%;line-height: 1.4;width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_wrapper{
|
||||||
|
background-color: #edf2f7;
|
||||||
|
width:100%;
|
||||||
|
}
|
||||||
|
.mail .x_content{
|
||||||
|
width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_inner-body{
|
||||||
|
background-color: #ffffff;border-color: #e8e5ef;border-radius: 2px;border-width: 1px;margin: 0 auto;padding:0;width: 570px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell{
|
||||||
|
margin: 0 auto;padding: 0;width: 570px;line-height: 1.5em;
|
||||||
|
color: #b0adc5;font-size: 12px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell td{
|
||||||
|
max-width: 100vw;padding: 32px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div>
|
||||||
|
<table class="x_wrapper">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="padding: 25px 0;">
|
||||||
|
<h1 style="font-size: 20px;">账户激活邮件</h1>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_inner-body">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="mail-content">
|
||||||
|
<h1 style="font-size: 18px;margin-bottom: 25px;">Minecraft · <servername /><br/><playername /></h1>
|
||||||
|
<hr>
|
||||||
|
<table style="width: 100%;">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
您的账户初始密码为
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="font-weight: bold;">
|
||||||
|
<br/><generatedpass /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<br/>已将地址(<playerip />)进行记录.
|
||||||
|
<br/>
|
||||||
|
<br/>请妥善保存,在新地址上进行登录时,需提供该密码.
|
||||||
|
<br/>若非必要,请勿更换密码,否则将对您的账户安全构成威胁.
|
||||||
|
<br/>账户所绑定的邮箱地址已被永久存储,需要更换请联系管理员.
|
||||||
|
<br/>
|
||||||
|
<br/>更换密码: /changepassword <generatedpass /> [新密码]
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="text-align:right;">
|
||||||
|
<br/>
|
||||||
|
<br/>账户将在激活后生效
|
||||||
|
<br/>欢迎您的加入~!
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<small>
|
||||||
|
<br/><time />
|
||||||
|
<br/>请勿回复
|
||||||
|
</small>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content-cell">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<p style="color:#b0adc5;">© 2023 HomoCraft. All rights reserved.</p>
|
||||||
|
<a href="1919810.com" target="_blank"
|
||||||
|
style="text-decoration: none; font-size: 16px">wdsj.io</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
@ -1,9 +1,9 @@
|
|||||||
name: ${pluginDescription.name}
|
name: ${pluginDescription.name}
|
||||||
authors: [${pluginDescription.authors}]
|
authors: [${pluginDescription.authors}]
|
||||||
website: ${project.url}
|
website: http://github.com/HaHaWTH/AuthMeReReloaded/
|
||||||
description: ${project.description}
|
description: A fork of AuthMeReloaded that contains bug fixes
|
||||||
main: ${pluginDescription.main}
|
main: ${pluginDescription.main}
|
||||||
version: ${pluginDescription.version}
|
version: 5.6.0-FORK-b42
|
||||||
api-version: 1.13
|
api-version: 1.13
|
||||||
softdepend:
|
softdepend:
|
||||||
- Vault
|
- Vault
|
||||||
@ -15,6 +15,7 @@ softdepend:
|
|||||||
- Essentials
|
- Essentials
|
||||||
- EssentialsSpawn
|
- EssentialsSpawn
|
||||||
- ProtocolLib
|
- ProtocolLib
|
||||||
|
- floodgate
|
||||||
commands:
|
commands:
|
||||||
authme:
|
authme:
|
||||||
description: AuthMe op commands
|
description: AuthMe op commands
|
||||||
@ -27,7 +28,6 @@ commands:
|
|||||||
usage: /login <password>
|
usage: /login <password>
|
||||||
aliases:
|
aliases:
|
||||||
- l
|
- l
|
||||||
- log
|
|
||||||
logout:
|
logout:
|
||||||
description: Logout command
|
description: Logout command
|
||||||
usage: /logout
|
usage: /logout
|
||||||
@ -246,7 +246,6 @@ permissions:
|
|||||||
authme.player.captcha: true
|
authme.player.captcha: true
|
||||||
authme.player.changepassword: true
|
authme.player.changepassword: true
|
||||||
authme.player.email.add: true
|
authme.player.email.add: true
|
||||||
authme.player.email.change: true
|
|
||||||
authme.player.email.recover: true
|
authme.player.email.recover: true
|
||||||
authme.player.email.see: true
|
authme.player.email.see: true
|
||||||
authme.player.login: true
|
authme.player.login: true
|
||||||
@ -254,10 +253,8 @@ permissions:
|
|||||||
authme.player.protection.quickcommandsprotection: true
|
authme.player.protection.quickcommandsprotection: true
|
||||||
authme.player.register: true
|
authme.player.register: true
|
||||||
authme.player.security.verificationcode: true
|
authme.player.security.verificationcode: true
|
||||||
authme.player.seeownaccounts: true
|
|
||||||
authme.player.totpadd: true
|
authme.player.totpadd: true
|
||||||
authme.player.totpremove: true
|
authme.player.totpremove: true
|
||||||
authme.player.unregister: true
|
|
||||||
authme.player.canbeforced:
|
authme.player.canbeforced:
|
||||||
description: Permission for users a login can be forced to.
|
description: Permission for users a login can be forced to.
|
||||||
default: true
|
default: true
|
||||||
@ -271,7 +268,6 @@ permissions:
|
|||||||
description: Gives access to all email commands
|
description: Gives access to all email commands
|
||||||
children:
|
children:
|
||||||
authme.player.email.add: true
|
authme.player.email.add: true
|
||||||
authme.player.email.change: true
|
|
||||||
authme.player.email.recover: true
|
authme.player.email.recover: true
|
||||||
authme.player.email.see: true
|
authme.player.email.see: true
|
||||||
authme.player.email.add:
|
authme.player.email.add:
|
||||||
@ -279,7 +275,7 @@ permissions:
|
|||||||
default: true
|
default: true
|
||||||
authme.player.email.change:
|
authme.player.email.change:
|
||||||
description: Command permission to change the email address.
|
description: Command permission to change the email address.
|
||||||
default: true
|
default: op
|
||||||
authme.player.email.recover:
|
authme.player.email.recover:
|
||||||
description: Command permission to recover an account using its email address.
|
description: Command permission to recover an account using its email address.
|
||||||
default: true
|
default: true
|
||||||
@ -312,7 +308,7 @@ permissions:
|
|||||||
default: true
|
default: true
|
||||||
authme.player.unregister:
|
authme.player.unregister:
|
||||||
description: Command permission to unregister.
|
description: Command permission to unregister.
|
||||||
default: true
|
default: op
|
||||||
authme.vip:
|
authme.vip:
|
||||||
description: When the server is full and someone with this permission joins the
|
description: When the server is full and someone with this permission joins the
|
||||||
server, someone will be kicked.
|
server, someone will be kicked.
|
||||||
|
|||||||
@ -1,9 +1,120 @@
|
|||||||
<h1>Dear <playername />,</h1>
|
<div class="mail">
|
||||||
|
<style>
|
||||||
<p>
|
.mail td{
|
||||||
You have requested to reset your password on <servername />. To reset it,
|
font-family: "Segoe UI", sans-serif;
|
||||||
please use the recovery code <recoverycode />: /email code <recoverycode />.
|
text-align: center;
|
||||||
</p>
|
font-size: 16px;
|
||||||
<p>
|
color: #718096;
|
||||||
The code expires in <hoursvalid /> hours.
|
}
|
||||||
</p>
|
.mail th, div, p, a, h1, h2, h3, h4, h5, h6{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
|
text-align: center;
|
||||||
|
color: #3d4852;
|
||||||
|
}
|
||||||
|
.mail .mail-content {
|
||||||
|
max-width: 100vw;
|
||||||
|
padding: 32px;
|
||||||
|
box-shadow: 0 15px 28px rgba(0, 0, 0, 0.25), 0 10px 10px rgba(0, 0, 0, 0.25);
|
||||||
|
}
|
||||||
|
.mail div{
|
||||||
|
background-color: #ffffff;color: #718096;height: 100%;line-height: 1.4;width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_wrapper{
|
||||||
|
background-color: #edf2f7;
|
||||||
|
width:100%;
|
||||||
|
}
|
||||||
|
.mail .x_content{
|
||||||
|
width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_inner-body{
|
||||||
|
background-color: #ffffff;border-color: #e8e5ef;border-radius: 2px;border-width: 1px;margin: 0 auto;padding:0;width: 570px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell{
|
||||||
|
margin: 0 auto;padding: 0;width: 570px;line-height: 1.5em;
|
||||||
|
color: #b0adc5;font-size: 12px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell td{
|
||||||
|
max-width: 100vw;padding: 32px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div>
|
||||||
|
<table class="x_wrapper">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="padding: 25px 0;">
|
||||||
|
<h1 style="font-size: 20px;">代码验证邮件</h1>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_inner-body">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="mail-content">
|
||||||
|
<h1 style="font-size: 18px;margin-bottom: 25px;">Minecraft · <servername /><br/><playername /></h1>
|
||||||
|
<hr>
|
||||||
|
<table style="width: 100%;">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
您正在申请的验证码为
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="font-weight: bold;">
|
||||||
|
<br/><recoverycode /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<br/>使用指令: /email code <recoverycode /> 来完成验证过程.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="text-align:right;">
|
||||||
|
<br/>
|
||||||
|
<br/>验证码将在<hoursvalid />小时后失效
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<small>
|
||||||
|
<br/><time />
|
||||||
|
<br/>请勿回复
|
||||||
|
</small>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content-cell">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<p style="color:#b0adc5;">© 2023 HomoCraft. All rights reserved.</p>
|
||||||
|
<a href="1919810.com" target="_blank"
|
||||||
|
style="text-decoration: none; font-size: 16px">wdsj.io</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|||||||
118
src/main/resources/shutdown.html
Normal file
118
src/main/resources/shutdown.html
Normal file
@ -0,0 +1,118 @@
|
|||||||
|
<div class="mail">
|
||||||
|
<style>
|
||||||
|
.mail td{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
|
text-align: center;
|
||||||
|
font-size: 16px;
|
||||||
|
color: #718096;
|
||||||
|
}
|
||||||
|
.mail th, div, p, a, h1, h2, h3, h4, h5, h6{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
|
text-align: center;
|
||||||
|
color: #3d4852;
|
||||||
|
}
|
||||||
|
.mail .mail-content {
|
||||||
|
max-width: 100vw;
|
||||||
|
padding: 32px;
|
||||||
|
box-shadow: 0 15px 28px rgba(0, 0, 0, 0.25), 0 10px 10px rgba(0, 0, 0, 0.25);
|
||||||
|
}
|
||||||
|
.mail div{
|
||||||
|
background-color: #ffffff;color: #718096;height: 100%;line-height: 1.4;width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_wrapper{
|
||||||
|
background-color: #edf2f7;
|
||||||
|
width:100%;
|
||||||
|
}
|
||||||
|
.mail .x_content{
|
||||||
|
width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_inner-body{
|
||||||
|
background-color: #ffffff;border-color: #e8e5ef;border-radius: 2px;border-width: 1px;margin: 0 auto;padding:0;width: 570px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell{
|
||||||
|
margin: 0 auto;padding: 0;width: 570px;line-height: 1.5em;
|
||||||
|
color: #b0adc5;font-size: 12px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell td{
|
||||||
|
max-width: 100vw;padding: 32px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div>
|
||||||
|
<table class="x_wrapper">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="padding: 25px 0;">
|
||||||
|
<h1 style="font-size: 20px;">服务器关闭通知</h1>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_inner-body">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="mail-content">
|
||||||
|
<h1 style="font-size: 18px;margin-bottom: 25px;">Minecraft · <servername /></h1>
|
||||||
|
<hr>
|
||||||
|
<table style="width: 100%;">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="font-weight: bold;color: #da1515;">
|
||||||
|
<br/>紧急通知</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<br/>服务器当前已被关闭
|
||||||
|
<br/>
|
||||||
|
<br/>请及时检查服务器运行状态.
|
||||||
|
<br/>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="text-align:right;">
|
||||||
|
<br/>
|
||||||
|
<br/>IrisCraft Team
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<small>
|
||||||
|
<br/><time />
|
||||||
|
<br/>请勿回复
|
||||||
|
</small>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content-cell">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<p style="color:#b0adc5;">© 2023 HomoCraft. All rights reserved.</p>
|
||||||
|
<a href="1919810.com" target="_blank"
|
||||||
|
style="text-decoration: none; font-size: 16px">wdsj.io</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
@ -1,20 +1,120 @@
|
|||||||
<h1>
|
<div class="mail">
|
||||||
Dear <playername />,
|
<style>
|
||||||
</h1>
|
.mail td{
|
||||||
|
font-family: "Segoe UI", sans-serif;
|
||||||
<p>
|
text-align: center;
|
||||||
This is your temporary verification code for the server <servername />:
|
font-size: 16px;
|
||||||
</p>
|
color: #718096;
|
||||||
<p>
|
}
|
||||||
<generatedcode />
|
.mail th, div, p, a, h1, h2, h3, h4, h5, h6{
|
||||||
</p>
|
font-family: "Segoe UI", sans-serif;
|
||||||
|
text-align: center;
|
||||||
<p>
|
color: #3d4852;
|
||||||
This code will be valid for the next <minutesvalid /> mins!<br />
|
}
|
||||||
Use the command
|
.mail .mail-content {
|
||||||
/verification <generatedcode />
|
max-width: 100vw;
|
||||||
to complete the verification process.
|
padding: 32px;
|
||||||
</p>
|
box-shadow: 0 15px 28px rgba(0, 0, 0, 0.25), 0 10px 10px rgba(0, 0, 0, 0.25);
|
||||||
<p>
|
}
|
||||||
See you on <servername />!
|
.mail div{
|
||||||
</p>
|
background-color: #ffffff;color: #718096;height: 100%;line-height: 1.4;width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_wrapper{
|
||||||
|
background-color: #edf2f7;
|
||||||
|
width:100%;
|
||||||
|
}
|
||||||
|
.mail .x_content{
|
||||||
|
width: 100%;
|
||||||
|
}
|
||||||
|
.mail .x_inner-body{
|
||||||
|
background-color: #ffffff;border-color: #e8e5ef;border-radius: 2px;border-width: 1px;margin: 0 auto;padding:0;width: 570px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell{
|
||||||
|
margin: 0 auto;padding: 0;width: 570px;line-height: 1.5em;
|
||||||
|
color: #b0adc5;font-size: 12px;
|
||||||
|
}
|
||||||
|
.mail .x_content-cell td{
|
||||||
|
max-width: 100vw;padding: 32px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div>
|
||||||
|
<table class="x_wrapper">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="padding: 25px 0;">
|
||||||
|
<h1 style="font-size: 20px;">代码验证邮件</h1>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_inner-body">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td class="mail-content">
|
||||||
|
<h1 style="font-size: 18px;margin-bottom: 25px;">Minecraft · <servername /><br/><playername /></h1>
|
||||||
|
<hr>
|
||||||
|
<table style="width: 100%;">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
您正在申请的验证码为
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="font-weight: bold;">
|
||||||
|
<br/><generatedcode /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<br/>使用指令: /verification <generatedcode /> 来完成验证过程.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td style="text-align:right;">
|
||||||
|
<br/>
|
||||||
|
<br/>验证码将在30分钟后失效
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<small>
|
||||||
|
<br/><time />
|
||||||
|
<br/>请勿回复
|
||||||
|
</small>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<table class="x_content-cell">
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<p style="color:#b0adc5;">© 2023 HomoCraft. All rights reserved.</p>
|
||||||
|
<a href="1919810.com" target="_blank"
|
||||||
|
style="text-decoration: none; font-size: 16px">wdsj.io</a>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|||||||
@ -1,3 +0,0 @@
|
|||||||
Welcome {PLAYER} on {SERVER} server
|
|
||||||
|
|
||||||
This server uses AuthMeReloaded protection!
|
|
||||||
@ -1,145 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import ch.jalu.configme.resource.PropertyReader;
|
|
||||||
import ch.jalu.configme.resource.PropertyResource;
|
|
||||||
import ch.jalu.injector.Injector;
|
|
||||||
import ch.jalu.injector.InjectorBuilder;
|
|
||||||
import com.google.common.io.Files;
|
|
||||||
import fr.xephi.authme.api.v3.AuthMeApi;
|
|
||||||
import fr.xephi.authme.command.CommandHandler;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.initialization.DataFolder;
|
|
||||||
import fr.xephi.authme.listener.BlockListener;
|
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import fr.xephi.authme.process.login.ProcessSyncPlayerLogin;
|
|
||||||
import fr.xephi.authme.security.PasswordSecurity;
|
|
||||||
import fr.xephi.authme.service.BukkitService;
|
|
||||||
import fr.xephi.authme.service.bungeecord.BungeeReceiver;
|
|
||||||
import fr.xephi.authme.service.bungeecord.BungeeSender;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.task.purge.PurgeService;
|
|
||||||
import org.bukkit.Bukkit;
|
|
||||||
import org.bukkit.Server;
|
|
||||||
import org.bukkit.plugin.PluginDescriptionFile;
|
|
||||||
import org.bukkit.plugin.PluginManager;
|
|
||||||
import org.bukkit.plugin.java.JavaPluginLoader;
|
|
||||||
import org.bukkit.scheduler.BukkitScheduler;
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.Rule;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.rules.TemporaryFolder;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.logging.Logger;
|
|
||||||
|
|
||||||
import static fr.xephi.authme.settings.properties.AuthMeSettingsRetriever.buildConfigurationData;
|
|
||||||
import static org.hamcrest.Matchers.not;
|
|
||||||
import static org.hamcrest.Matchers.nullValue;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.RETURNS_DEEP_STUBS;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Integration test verifying that all services can be initialized in {@link AuthMe}
|
|
||||||
* with the {@link Injector}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class AuthMeInitializationTest {
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Server server;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private PluginManager pluginManager;
|
|
||||||
|
|
||||||
private AuthMe authMe;
|
|
||||||
private File dataFolder;
|
|
||||||
|
|
||||||
@Rule
|
|
||||||
public TemporaryFolder temporaryFolder = new TemporaryFolder();
|
|
||||||
|
|
||||||
@Before
|
|
||||||
public void initAuthMe() throws IOException {
|
|
||||||
dataFolder = temporaryFolder.newFolder();
|
|
||||||
File settingsFile = new File(dataFolder, "config.yml");
|
|
||||||
given(server.getLogger()).willReturn(Logger.getAnonymousLogger());
|
|
||||||
JavaPluginLoader pluginLoader = new JavaPluginLoader(server);
|
|
||||||
Files.copy(TestHelper.getJarFile(TestHelper.PROJECT_ROOT + "config.test.yml"), settingsFile);
|
|
||||||
|
|
||||||
// Mock / wire various Bukkit components
|
|
||||||
ReflectionTestUtils.setField(Bukkit.class, null, "server", server);
|
|
||||||
given(server.getPluginManager()).willReturn(pluginManager);
|
|
||||||
|
|
||||||
// PluginDescriptionFile is final: need to create a sample one
|
|
||||||
PluginDescriptionFile descriptionFile = new PluginDescriptionFile(
|
|
||||||
"AuthMe", "N/A", AuthMe.class.getCanonicalName());
|
|
||||||
|
|
||||||
// Initialize AuthMe
|
|
||||||
authMe = new AuthMe(pluginLoader, descriptionFile, dataFolder, null);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldInitializeAllServices() {
|
|
||||||
// given
|
|
||||||
PropertyReader reader = mock(PropertyReader.class);
|
|
||||||
PropertyResource resource = mock(PropertyResource.class);
|
|
||||||
given(resource.createReader()).willReturn(reader);
|
|
||||||
Settings settings = new Settings(dataFolder, resource, null, buildConfigurationData());
|
|
||||||
|
|
||||||
TestHelper.setupLogger();
|
|
||||||
|
|
||||||
Injector injector = new InjectorBuilder()
|
|
||||||
.addDefaultHandlers("fr.xephi.authme")
|
|
||||||
.create();
|
|
||||||
injector.provide(DataFolder.class, dataFolder);
|
|
||||||
injector.register(Server.class, server);
|
|
||||||
injector.register(PluginManager.class, pluginManager);
|
|
||||||
|
|
||||||
injector.register(AuthMe.class, authMe);
|
|
||||||
injector.register(Settings.class, settings);
|
|
||||||
injector.register(DataSource.class, mock(DataSource.class));
|
|
||||||
injector.register(BukkitService.class, mock(BukkitService.class));
|
|
||||||
|
|
||||||
// when
|
|
||||||
authMe.instantiateServices(injector);
|
|
||||||
authMe.registerEventListeners(injector);
|
|
||||||
|
|
||||||
// then
|
|
||||||
// Take a few samples and ensure that they are not null
|
|
||||||
assertThat(injector.getIfAvailable(AuthMeApi.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(BlockListener.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(BungeeReceiver.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(BungeeSender.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(CommandHandler.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(Management.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(PasswordSecurity.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(PermissionsManager.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(ProcessSyncPlayerLogin.class), not(nullValue()));
|
|
||||||
assertThat(injector.getIfAvailable(PurgeService.class), not(nullValue()));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandlePrematureShutdownGracefully() {
|
|
||||||
// given
|
|
||||||
BukkitScheduler scheduler = mock(BukkitScheduler.class);
|
|
||||||
given(server.getScheduler()).willReturn(scheduler);
|
|
||||||
|
|
||||||
// Make sure ConsoleLogger has no logger reference since that may happen on unexpected stops
|
|
||||||
ReflectionTestUtils.setField(ConsoleLogger.class, null, "logger", null);
|
|
||||||
|
|
||||||
// when
|
|
||||||
authMe.onDisable();
|
|
||||||
|
|
||||||
// then - no exceptions
|
|
||||||
verify(scheduler).getActiveWorkers(); // via TaskCloser
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,136 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.data.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.security.crypts.HashedPassword;
|
|
||||||
import org.hamcrest.Description;
|
|
||||||
import org.hamcrest.Matcher;
|
|
||||||
import org.hamcrest.TypeSafeMatcher;
|
|
||||||
|
|
||||||
import java.util.Objects;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Custom matchers for AuthMe entities.
|
|
||||||
*/
|
|
||||||
// Justification: Javadoc would be huge because of the many parameters
|
|
||||||
@SuppressWarnings("checkstyle:MissingJavadocMethod")
|
|
||||||
public final class AuthMeMatchers {
|
|
||||||
|
|
||||||
private AuthMeMatchers() {
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<? super HashedPassword> equalToHash(String hash) {
|
|
||||||
return equalToHash(new HashedPassword(hash));
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<? super HashedPassword> equalToHash(String hash, String salt) {
|
|
||||||
return equalToHash(new HashedPassword(hash, salt));
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<? super HashedPassword> equalToHash(HashedPassword hash) {
|
|
||||||
return new TypeSafeMatcher<HashedPassword>() {
|
|
||||||
@Override
|
|
||||||
public boolean matchesSafely(HashedPassword item) {
|
|
||||||
return Objects.equals(hash.getHash(), item.getHash())
|
|
||||||
&& Objects.equals(hash.getSalt(), item.getSalt());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
String representation = "'" + hash.getHash() + "'";
|
|
||||||
if (hash.getSalt() != null) {
|
|
||||||
representation += ", '" + hash.getSalt() + "'";
|
|
||||||
}
|
|
||||||
description.appendValue("HashedPassword(" + representation + ")");
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<PlayerAuth> hasAuthBasicData(String name, String realName,
|
|
||||||
String email, String lastIp) {
|
|
||||||
return new TypeSafeMatcher<PlayerAuth>() {
|
|
||||||
@Override
|
|
||||||
public boolean matchesSafely(PlayerAuth item) {
|
|
||||||
return Objects.equals(name, item.getNickname())
|
|
||||||
&& Objects.equals(realName, item.getRealName())
|
|
||||||
&& Objects.equals(email, item.getEmail())
|
|
||||||
&& Objects.equals(lastIp, item.getLastIp());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
description.appendValue(String.format("PlayerAuth with name %s, realname %s, email %s, lastIp %s",
|
|
||||||
name, realName, email, lastIp));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeMismatchSafely(PlayerAuth item, Description description) {
|
|
||||||
description.appendValue(String.format("PlayerAuth with name %s, realname %s, email %s, lastIp %s",
|
|
||||||
item.getNickname(), item.getRealName(), item.getEmail(), item.getLastIp()));
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<? super PlayerAuth> hasRegistrationInfo(String registrationIp, long registrationDate) {
|
|
||||||
return new TypeSafeMatcher<PlayerAuth>() {
|
|
||||||
@Override
|
|
||||||
public boolean matchesSafely(PlayerAuth item) {
|
|
||||||
return Objects.equals(registrationIp, item.getRegistrationIp())
|
|
||||||
&& Objects.equals(registrationDate, item.getRegistrationDate());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
description.appendValue(String.format("PlayerAuth with reg. IP %s and reg date %d",
|
|
||||||
registrationIp, registrationDate));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeMismatchSafely(PlayerAuth item, Description description) {
|
|
||||||
description.appendValue(String.format("PlayerAuth with reg. IP %s and reg date %d",
|
|
||||||
item.getRegistrationIp(), item.getRegistrationDate()));
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<? super PlayerAuth> hasAuthLocation(PlayerAuth auth) {
|
|
||||||
return hasAuthLocation(auth.getQuitLocX(), auth.getQuitLocY(), auth.getQuitLocZ(), auth.getWorld(),
|
|
||||||
auth.getYaw(), auth.getPitch());
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<? super PlayerAuth> hasAuthLocation(double x, double y, double z,
|
|
||||||
String world, float yaw, float pitch) {
|
|
||||||
return new TypeSafeMatcher<PlayerAuth>() {
|
|
||||||
@Override
|
|
||||||
public boolean matchesSafely(PlayerAuth item) {
|
|
||||||
return Objects.equals(x, item.getQuitLocX())
|
|
||||||
&& Objects.equals(y, item.getQuitLocY())
|
|
||||||
&& Objects.equals(z, item.getQuitLocZ())
|
|
||||||
&& Objects.equals(world, item.getWorld())
|
|
||||||
&& Objects.equals(yaw, item.getYaw())
|
|
||||||
&& Objects.equals(pitch, item.getPitch());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
description.appendValue(
|
|
||||||
String.format("PlayerAuth with quit location (x: %f, y: %f, z: %f, world: %s, yaw: %f, pitch: %f)",
|
|
||||||
x, y, z, world, yaw, pitch));
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
public static Matcher<String> stringWithLength(int length) {
|
|
||||||
return new TypeSafeMatcher<String>() {
|
|
||||||
@Override
|
|
||||||
protected boolean matchesSafely(String item) {
|
|
||||||
return item != null && item.length() == length;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
description.appendText("String with length " + length);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
@ -1,165 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.lang.reflect.Modifier;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.function.Function;
|
|
||||||
import java.util.function.Predicate;
|
|
||||||
import java.util.stream.Collectors;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Collects available classes by walking through a source directory.
|
|
||||||
* <p>
|
|
||||||
* This is a naive, zero dependency collector that walks through a file directory
|
|
||||||
* and loads classes from the class loader based on the .java files it encounters.
|
|
||||||
* This is a very slow approach and should be avoided for production code.
|
|
||||||
* <p>
|
|
||||||
* For more performant approaches, see e.g. <a href="https://github.com/ronmamo/reflections">org.reflections</a>.
|
|
||||||
*/
|
|
||||||
public class ClassCollector {
|
|
||||||
|
|
||||||
private final String root;
|
|
||||||
private final String nonCodePath;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constructor. The arguments make up the path from which the collector will start scanning.
|
|
||||||
*
|
|
||||||
* @param nonCodePath beginning of the starting path that are not Java packages, e.g. {@code src/main/java/}
|
|
||||||
* @param packagePath folders following {@code nonCodePath} that are packages, e.g. {@code com/project/app}
|
|
||||||
*/
|
|
||||||
public ClassCollector(String nonCodePath, String packagePath) {
|
|
||||||
if (!nonCodePath.endsWith("/") && !nonCodePath.endsWith("\\")) {
|
|
||||||
nonCodePath = nonCodePath.concat(File.separator);
|
|
||||||
}
|
|
||||||
this.root = nonCodePath + packagePath;
|
|
||||||
this.nonCodePath = nonCodePath;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Collects all classes from the parent folder and below.
|
|
||||||
*
|
|
||||||
* @return all classes
|
|
||||||
*/
|
|
||||||
public List<Class<?>> collectClasses() {
|
|
||||||
return collectClasses(x -> true);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Collects all classes from the parent folder and below which are of type {@link T}.
|
|
||||||
*
|
|
||||||
* @param parent the parent which classes need to extend (or be equal to) in order to be collected
|
|
||||||
* @param <T> the parent type
|
|
||||||
* @return list of matching classes
|
|
||||||
*/
|
|
||||||
@SuppressWarnings({ "unchecked", "rawtypes" })
|
|
||||||
public <T> List<Class<? extends T>> collectClasses(Class<T> parent) {
|
|
||||||
List<Class<?>> classes = collectClasses(parent::isAssignableFrom);
|
|
||||||
return new ArrayList<>((List) classes);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Collects all classes from the parent folder and below which match the given predicate.
|
|
||||||
*
|
|
||||||
* @param filter the predicate classes need to satisfy in order to be collected
|
|
||||||
* @return list of matching classes
|
|
||||||
*/
|
|
||||||
public List<Class<?>> collectClasses(Predicate<Class<?>> filter) {
|
|
||||||
File rootFolder = new File(root);
|
|
||||||
List<Class<?>> collection = new ArrayList<>();
|
|
||||||
gatherClassesFromFile(rootFolder, filter, collection);
|
|
||||||
return collection;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constructs an instance of all classes which are of the provided type {@code clazz}.
|
|
||||||
* This method assumes that every class has an accessible no-args constructor for creation.
|
|
||||||
*
|
|
||||||
* @param parent the parent which classes need to extend (or be equal to) in order to be instantiated
|
|
||||||
* @param <T> the parent type
|
|
||||||
* @return collection of created objects
|
|
||||||
*/
|
|
||||||
public <T> List<T> getInstancesOfType(Class<T> parent) {
|
|
||||||
return getInstancesOfType(parent, (clz) -> {
|
|
||||||
try {
|
|
||||||
return canInstantiate(clz) ? clz.newInstance() : null;
|
|
||||||
} catch (InstantiationException | IllegalAccessException e) {
|
|
||||||
throw new IllegalStateException(e);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constructs an instance of all classes which are of the provided type {@code clazz}
|
|
||||||
* with the provided {@code instantiator}.
|
|
||||||
*
|
|
||||||
* @param parent the parent which classes need to extend (or be equal to) in order to be instantiated
|
|
||||||
* @param instantiator function which returns an object of the given class, or null to skip the class
|
|
||||||
* @param <T> the parent type
|
|
||||||
* @return collection of created objects
|
|
||||||
*/
|
|
||||||
public <T> List<T> getInstancesOfType(Class<T> parent, Function<Class<? extends T>, T> instantiator) {
|
|
||||||
return collectClasses(parent)
|
|
||||||
.stream()
|
|
||||||
.map(instantiator)
|
|
||||||
.filter(o -> o != null)
|
|
||||||
.collect(Collectors.toList());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns whether the given class can be instantiated, i.e. if it is not abstract, an interface, etc.
|
|
||||||
*
|
|
||||||
* @param clazz the class to process
|
|
||||||
* @return true if the class can be instantiated, false otherwise
|
|
||||||
*/
|
|
||||||
public static boolean canInstantiate(Class<?> clazz) {
|
|
||||||
return clazz != null && !clazz.isEnum() && !clazz.isInterface()
|
|
||||||
&& !clazz.isArray() && !Modifier.isAbstract(clazz.getModifiers());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Recursively collects the classes based on the files in the directory and in its child directories.
|
|
||||||
*
|
|
||||||
* @param folder the folder to scan
|
|
||||||
* @param filter the class predicate
|
|
||||||
* @param collection collection to add classes to
|
|
||||||
*/
|
|
||||||
private void gatherClassesFromFile(File folder, Predicate<Class<?>> filter, List<Class<?>> collection) {
|
|
||||||
File[] files = folder.listFiles();
|
|
||||||
if (files == null) {
|
|
||||||
throw new IllegalStateException("Could not read files from '" + folder + "'");
|
|
||||||
}
|
|
||||||
for (File file : files) {
|
|
||||||
if (file.isDirectory()) {
|
|
||||||
gatherClassesFromFile(file, filter, collection);
|
|
||||||
} else if (file.isFile()) {
|
|
||||||
Class<?> clazz = loadTaskClassFromFile(file);
|
|
||||||
if (clazz != null && filter.test(clazz)) {
|
|
||||||
collection.add(clazz);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Loads a class from the class loader based on the given file.
|
|
||||||
*
|
|
||||||
* @param file the file whose corresponding Java class should be retrieved
|
|
||||||
* @return the corresponding class, or null if not applicable
|
|
||||||
*/
|
|
||||||
private Class<?> loadTaskClassFromFile(File file) {
|
|
||||||
if (!file.getName().endsWith(".java")) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
String filePath = file.getPath();
|
|
||||||
String className = filePath
|
|
||||||
.substring(nonCodePath.length(), filePath.length() - 5)
|
|
||||||
.replace(File.separator, ".");
|
|
||||||
try {
|
|
||||||
return Class.forName(className);
|
|
||||||
} catch (ClassNotFoundException e) {
|
|
||||||
throw new IllegalStateException(e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,173 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import ch.jalu.configme.properties.Property;
|
|
||||||
import com.google.common.collect.ImmutableList;
|
|
||||||
import com.google.common.collect.ImmutableMap;
|
|
||||||
import com.google.common.collect.ImmutableSet;
|
|
||||||
import fr.xephi.authme.data.captcha.CaptchaCodeStorage;
|
|
||||||
import fr.xephi.authme.datasource.AbstractSqlDataSource;
|
|
||||||
import fr.xephi.authme.datasource.Columns;
|
|
||||||
import fr.xephi.authme.datasource.columnshandler.DataSourceColumn;
|
|
||||||
import fr.xephi.authme.datasource.columnshandler.PlayerAuthColumn;
|
|
||||||
import fr.xephi.authme.datasource.mysqlextensions.MySqlExtension;
|
|
||||||
import fr.xephi.authme.initialization.HasCleanup;
|
|
||||||
import fr.xephi.authme.process.register.executors.RegistrationMethod;
|
|
||||||
import fr.xephi.authme.security.crypts.Whirlpool;
|
|
||||||
import fr.xephi.authme.util.expiring.ExpiringMap;
|
|
||||||
import fr.xephi.authme.util.expiring.ExpiringSet;
|
|
||||||
import fr.xephi.authme.util.expiring.TimedCounter;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.lang.reflect.Field;
|
|
||||||
import java.lang.reflect.Modifier;
|
|
||||||
import java.nio.charset.Charset;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collection;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.HashSet;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Map;
|
|
||||||
import java.util.Set;
|
|
||||||
import java.util.stream.Collectors;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.junit.Assert.fail;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Contains consistency tests across all AuthMe classes.
|
|
||||||
*/
|
|
||||||
public class ClassesConsistencyTest {
|
|
||||||
|
|
||||||
/** Contains all production classes. */
|
|
||||||
private static final List<Class<?>> ALL_CLASSES =
|
|
||||||
new ClassCollector(TestHelper.SOURCES_FOLDER, TestHelper.PROJECT_ROOT).collectClasses();
|
|
||||||
|
|
||||||
/** Expiring structure types. */
|
|
||||||
private static final Set<Class<?>> EXPIRING_STRUCTURES = ImmutableSet.of(
|
|
||||||
ExpiringSet.class, ExpiringMap.class, TimedCounter.class, CaptchaCodeStorage.class);
|
|
||||||
|
|
||||||
/** Immutable types, which are allowed to be used in non-private constants. */
|
|
||||||
private static final Set<Class<?>> IMMUTABLE_TYPES = ImmutableSet.of(
|
|
||||||
/* JDK */
|
|
||||||
int.class, long.class, float.class, String.class, File.class, Enum.class, collectionsUnmodifiableList(),
|
|
||||||
Charset.class,
|
|
||||||
/* AuthMe */
|
|
||||||
Property.class, RegistrationMethod.class, DataSourceColumn.class, PlayerAuthColumn.class,
|
|
||||||
/* Guava */
|
|
||||||
ImmutableMap.class, ImmutableList.class);
|
|
||||||
|
|
||||||
/** Classes excluded from the field visibility test. */
|
|
||||||
private static final Set<Class<?>> CLASSES_EXCLUDED_FROM_VISIBILITY_TEST = ImmutableSet.of(
|
|
||||||
Whirlpool.class, // not our implementation, so we don't touch it
|
|
||||||
MySqlExtension.class, // has immutable protected fields used by all children
|
|
||||||
AbstractSqlDataSource.class, // protected members for inheritance
|
|
||||||
Columns.class // uses non-static String constants, which is safe
|
|
||||||
);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Checks that there aren't two classes with the same name; this is confusing and should be avoided.
|
|
||||||
*/
|
|
||||||
@Test
|
|
||||||
public void shouldNotHaveSameName() {
|
|
||||||
// given
|
|
||||||
Set<String> names = new HashSet<>();
|
|
||||||
|
|
||||||
// when / then
|
|
||||||
for (Class<?> clazz : ALL_CLASSES) {
|
|
||||||
if (!names.add(clazz.getSimpleName())) {
|
|
||||||
fail("Class with name '" + clazz.getSimpleName() + "' already encountered!");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Checks that fields of classes are either private or static final fields of an immutable type.
|
|
||||||
*/
|
|
||||||
@Test
|
|
||||||
public void shouldHaveNonPrivateConstantsOnly() {
|
|
||||||
// given / when
|
|
||||||
Set<String> invalidFields = ALL_CLASSES.stream()
|
|
||||||
.filter(clz -> !CLASSES_EXCLUDED_FROM_VISIBILITY_TEST.contains(clz))
|
|
||||||
.map(Class::getDeclaredFields)
|
|
||||||
.flatMap(Arrays::stream)
|
|
||||||
.filter(f -> !f.getName().contains("$"))
|
|
||||||
.filter(f -> hasIllegalFieldVisibility(f))
|
|
||||||
.map(f -> formatField(f))
|
|
||||||
.collect(Collectors.toSet());
|
|
||||||
|
|
||||||
// then
|
|
||||||
if (!invalidFields.isEmpty()) {
|
|
||||||
fail("Found " + invalidFields.size() + " fields with non-private, mutable fields:\n- "
|
|
||||||
+ String.join("\n- ", invalidFields));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private static boolean hasIllegalFieldVisibility(Field field) {
|
|
||||||
final int modifiers = field.getModifiers();
|
|
||||||
if (Modifier.isPrivate(modifiers)) {
|
|
||||||
return false;
|
|
||||||
} else if (!Modifier.isStatic(modifiers) || !Modifier.isFinal(modifiers)) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Field is non-private, static and final
|
|
||||||
Class<?> valueType;
|
|
||||||
if (Collection.class.isAssignableFrom(field.getType()) || Map.class.isAssignableFrom(field.getType())) {
|
|
||||||
// For collections/maps, need to check the actual type to ensure it's an unmodifiable implementation
|
|
||||||
Object value = ReflectionTestUtils.getFieldValue(field, null);
|
|
||||||
valueType = value.getClass();
|
|
||||||
} else {
|
|
||||||
valueType = field.getType();
|
|
||||||
}
|
|
||||||
|
|
||||||
// Field is static, final, and not private -> check that it is immutable type
|
|
||||||
return IMMUTABLE_TYPES.stream()
|
|
||||||
.noneMatch(immutableType -> immutableType.isAssignableFrom(valueType));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Prints out the field with its modifiers.
|
|
||||||
*
|
|
||||||
* @param field the field to format
|
|
||||||
* @return description of the field
|
|
||||||
*/
|
|
||||||
private static String formatField(Field field) {
|
|
||||||
String modifiersText = Modifier.toString(field.getModifiers());
|
|
||||||
return String.format("[%s] %s %s %s", field.getDeclaringClass().getSimpleName(), modifiersText.trim(),
|
|
||||||
field.getType().getSimpleName(), field.getName());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Checks that classes with expiring collections (such as {@link ExpiringMap}) implement the {@link HasCleanup}
|
|
||||||
* interface to regularly clean up expired data.
|
|
||||||
*/
|
|
||||||
@Test
|
|
||||||
public void shouldImplementHasCleanup() {
|
|
||||||
// given / when / then
|
|
||||||
for (Class<?> clazz : ALL_CLASSES) {
|
|
||||||
if (hasExpiringCollectionAsField(clazz) && !EXPIRING_STRUCTURES.contains(clazz)) {
|
|
||||||
assertThat("Class '" + clazz.getSimpleName() + "' has expiring collections, should implement HasCleanup",
|
|
||||||
HasCleanup.class.isAssignableFrom(clazz), equalTo(true));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private static boolean hasExpiringCollectionAsField(Class<?> clazz) {
|
|
||||||
for (Field field : clazz.getDeclaredFields()) {
|
|
||||||
if (EXPIRING_STRUCTURES.stream().anyMatch(t -> t.isAssignableFrom(field.getType()))) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @return the concrete class of the unmodifiable list as returned by {@link Collections#unmodifiableList(List)}.
|
|
||||||
*/
|
|
||||||
private static Class<?> collectionsUnmodifiableList() {
|
|
||||||
return Collections.unmodifiableList(new ArrayList<>()).getClass();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,44 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import org.bukkit.configuration.file.FileConfiguration;
|
|
||||||
import org.bukkit.configuration.file.YamlConfiguration;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.empty;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.not;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.junit.Assert.fail;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Consistency test for the CodeClimate configuration file.
|
|
||||||
*/
|
|
||||||
public class CodeClimateConfigTest {
|
|
||||||
|
|
||||||
private static final String CONFIG_FILE = ".codeclimate.yml";
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHaveExistingClassesInExclusions() {
|
|
||||||
// given / when
|
|
||||||
FileConfiguration configuration = YamlConfiguration.loadConfiguration(new File(CONFIG_FILE));
|
|
||||||
List<String> excludePaths = configuration.getStringList("exclude_patterns");
|
|
||||||
|
|
||||||
// then
|
|
||||||
assertThat(excludePaths, not(empty()));
|
|
||||||
removeTestsExclusionOrThrow(excludePaths);
|
|
||||||
for (String path : excludePaths) {
|
|
||||||
if (!new File(path).exists()) {
|
|
||||||
fail("Path '" + path + "' does not exist!");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void removeTestsExclusionOrThrow(List<String> excludePaths) {
|
|
||||||
boolean wasRemoved = excludePaths.removeIf("src/test/java/**/*Test.java"::equals);
|
|
||||||
assertThat("Expected an exclusion for test classes",
|
|
||||||
wasRemoved, equalTo(true));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,227 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import fr.xephi.authme.output.LogLevel;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.settings.properties.PluginSettings;
|
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
|
||||||
import org.junit.After;
|
|
||||||
import org.junit.AfterClass;
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.Rule;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.rules.TemporaryFolder;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.io.FileWriter;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.nio.charset.StandardCharsets;
|
|
||||||
import java.nio.file.Files;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.logging.Logger;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.contains;
|
|
||||||
import static org.hamcrest.Matchers.containsString;
|
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
|
||||||
import static org.hamcrest.Matchers.greaterThan;
|
|
||||||
import static org.hamcrest.Matchers.hasSize;
|
|
||||||
import static org.hamcrest.Matchers.nullValue;
|
|
||||||
import static org.junit.Assert.assertThat;
|
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
|
||||||
import static org.mockito.Mockito.doThrow;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.times;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoMoreInteractions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test for {@link ConsoleLogger}.
|
|
||||||
*/
|
|
||||||
@RunWith(MockitoJUnitRunner.class)
|
|
||||||
public class ConsoleLoggerTest {
|
|
||||||
|
|
||||||
private ConsoleLogger consoleLogger;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
private Logger logger;
|
|
||||||
|
|
||||||
@Rule
|
|
||||||
public TemporaryFolder temporaryFolder = new TemporaryFolder();
|
|
||||||
|
|
||||||
private File logFile;
|
|
||||||
|
|
||||||
@Before
|
|
||||||
public void setMockLogger() throws IOException {
|
|
||||||
File folder = temporaryFolder.newFolder();
|
|
||||||
File logFile = new File(folder, "authme.log");
|
|
||||||
if (!logFile.createNewFile()) {
|
|
||||||
throw new IOException("Could not create file '" + logFile.getPath() + "'");
|
|
||||||
}
|
|
||||||
ConsoleLogger.initialize(logger, logFile);
|
|
||||||
this.logFile = logFile;
|
|
||||||
this.consoleLogger = new ConsoleLogger("test");
|
|
||||||
}
|
|
||||||
|
|
||||||
@After
|
|
||||||
public void closeFileHandlers() {
|
|
||||||
ConsoleLogger.closeFileWriter();
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Resets the ConsoleLogger back to its defaults after running all tests. Especially important
|
|
||||||
* is that we no longer enable logging to a file as the log file we've supplied will no longer
|
|
||||||
* be around after this test class has finished.
|
|
||||||
*/
|
|
||||||
@AfterClass
|
|
||||||
public static void resetConsoleToDefault() {
|
|
||||||
ConsoleLogger.initializeSharedSettings(newSettings(false, LogLevel.INFO));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldLogToFile() throws IOException {
|
|
||||||
// given
|
|
||||||
Settings settings = newSettings(true, LogLevel.FINE);
|
|
||||||
ConsoleLogger.initializeSharedSettings(settings);
|
|
||||||
consoleLogger.initializeSettings(settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
consoleLogger.fine("Logging a FINE message");
|
|
||||||
consoleLogger.debug("Logging a DEBUG message");
|
|
||||||
consoleLogger.info("This is an INFO message");
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(logger, times(2)).info(anyString());
|
|
||||||
verifyNoMoreInteractions(logger);
|
|
||||||
List<String> loggedLines = Files.readAllLines(logFile.toPath(), StandardCharsets.UTF_8);
|
|
||||||
assertThat(loggedLines, hasSize(2));
|
|
||||||
assertThat(loggedLines.get(0), containsString("[FINE] Logging a FINE message"));
|
|
||||||
assertThat(loggedLines.get(1), containsString("[INFO] This is an INFO message"));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldNotLogToFile() {
|
|
||||||
// given
|
|
||||||
Settings settings = newSettings(false, LogLevel.DEBUG);
|
|
||||||
ConsoleLogger.initializeSharedSettings(settings);
|
|
||||||
consoleLogger.initializeSettings(settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
consoleLogger.debug("Created test");
|
|
||||||
consoleLogger.warning("Encountered a warning");
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(logger).info("[DEBUG] Created test");
|
|
||||||
verify(logger).warning("Encountered a warning");
|
|
||||||
verifyNoMoreInteractions(logger);
|
|
||||||
assertThat(logFile.length(), equalTo(0L));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldLogStackTraceToFile() throws IOException {
|
|
||||||
// given
|
|
||||||
Settings settings = newSettings(true, LogLevel.INFO);
|
|
||||||
ConsoleLogger.initializeSharedSettings(settings);
|
|
||||||
Exception e = new IllegalStateException("Test exception message");
|
|
||||||
|
|
||||||
// when
|
|
||||||
consoleLogger.info("Info text");
|
|
||||||
consoleLogger.debug("Debug message");
|
|
||||||
consoleLogger.fine("Fine-level message");
|
|
||||||
consoleLogger.logException("Exception occurred:", e);
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(logger).info("Info text");
|
|
||||||
verify(logger).warning("Exception occurred: [IllegalStateException]: Test exception message");
|
|
||||||
verifyNoMoreInteractions(logger);
|
|
||||||
List<String> loggedLines = Files.readAllLines(logFile.toPath(), StandardCharsets.UTF_8);
|
|
||||||
assertThat(loggedLines.size(), greaterThan(3));
|
|
||||||
assertThat(loggedLines.get(0), containsString("[INFO] Info text"));
|
|
||||||
assertThat(loggedLines.get(1),
|
|
||||||
containsString("[WARN] Exception occurred: [IllegalStateException]: Test exception message"));
|
|
||||||
// Check that we have this class' full name somewhere in the file -> stacktrace of Exception e
|
|
||||||
assertThat(String.join("", loggedLines), containsString(getClass().getCanonicalName()));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldSupportVariousDebugMethods() throws IOException {
|
|
||||||
// given
|
|
||||||
Settings settings = newSettings(true, LogLevel.DEBUG);
|
|
||||||
ConsoleLogger.initializeSharedSettings(settings);
|
|
||||||
consoleLogger.initializeSettings(settings);
|
|
||||||
|
|
||||||
// when
|
|
||||||
consoleLogger.debug("Got {0} entries", 17);
|
|
||||||
consoleLogger.debug("Player `{0}` is in world `{1}`", "Bobby", new WorldDummy("world"));
|
|
||||||
consoleLogger.debug("{0} quick {1} jump over {2} lazy {3} (reason: {4})", 5, "foxes", 3, "dogs", null);
|
|
||||||
consoleLogger.debug(() -> "Too little too late");
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(logger).info("[DEBUG] Got 17 entries");
|
|
||||||
verify(logger).info("[DEBUG] Player `Bobby` is in world `w[world]`");
|
|
||||||
verify(logger).info("[DEBUG] 5 quick foxes jump over 3 lazy dogs (reason: null)");
|
|
||||||
verify(logger).info("[DEBUG] Too little too late");
|
|
||||||
verifyNoMoreInteractions(logger);
|
|
||||||
|
|
||||||
List<String> loggedLines = Files.readAllLines(logFile.toPath(), StandardCharsets.UTF_8);
|
|
||||||
assertThat(loggedLines, contains(
|
|
||||||
containsString("[DEBUG] Got 17 entries"),
|
|
||||||
containsString("[DEBUG] Player `Bobby` is in world `w[world]`"),
|
|
||||||
containsString("[DEBUG] 5 quick foxes jump over 3 lazy dogs (reason: null)"),
|
|
||||||
containsString("[DEBUG] Too little too late")));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldCloseFileWriterDespiteExceptionOnFlush() throws IOException {
|
|
||||||
// given
|
|
||||||
FileWriter fileWriter = mock(FileWriter.class);
|
|
||||||
doThrow(new IOException("Error during flush")).when(fileWriter).flush();
|
|
||||||
ReflectionTestUtils.setField(ConsoleLogger.class, null, "fileWriter", fileWriter);
|
|
||||||
|
|
||||||
// when
|
|
||||||
ConsoleLogger.closeFileWriter();
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(fileWriter).flush();
|
|
||||||
verify(fileWriter).close();
|
|
||||||
assertThat(ReflectionTestUtils.getFieldValue(ConsoleLogger.class, null, "fileWriter"), nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldHandleExceptionOnFileWriterClose() throws IOException {
|
|
||||||
// given
|
|
||||||
FileWriter fileWriter = mock(FileWriter.class);
|
|
||||||
doThrow(new IOException("Cannot close")).when(fileWriter).close();
|
|
||||||
ReflectionTestUtils.setField(ConsoleLogger.class, null, "fileWriter", fileWriter);
|
|
||||||
|
|
||||||
// when
|
|
||||||
ConsoleLogger.closeFileWriter();
|
|
||||||
|
|
||||||
// then
|
|
||||||
verify(fileWriter).flush();
|
|
||||||
verify(fileWriter).close();
|
|
||||||
assertThat(ReflectionTestUtils.getFieldValue(ConsoleLogger.class, null, "fileWriter"), nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Settings newSettings(boolean logToFile, LogLevel logLevel) {
|
|
||||||
Settings settings = mock(Settings.class);
|
|
||||||
given(settings.getProperty(SecuritySettings.USE_LOGGING)).willReturn(logToFile);
|
|
||||||
given(settings.getProperty(PluginSettings.LOG_LEVEL)).willReturn(logLevel);
|
|
||||||
return settings;
|
|
||||||
}
|
|
||||||
|
|
||||||
private static final class WorldDummy {
|
|
||||||
private final String name;
|
|
||||||
|
|
||||||
WorldDummy(String name) {
|
|
||||||
this.name = name;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public String toString() {
|
|
||||||
return "w[" + name + "]";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@ -1,91 +0,0 @@
|
|||||||
package fr.xephi.authme;
|
|
||||||
|
|
||||||
import org.hamcrest.Description;
|
|
||||||
import org.hamcrest.Matcher;
|
|
||||||
import org.hamcrest.TypeSafeMatcher;
|
|
||||||
|
|
||||||
import java.lang.reflect.Field;
|
|
||||||
import java.lang.reflect.Modifier;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Objects;
|
|
||||||
|
|
||||||
import static org.junit.Assert.fail;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Matcher which checks with reflection that all fields have the same value.
|
|
||||||
* This matcher considers all non-static fields until the Object parent.
|
|
||||||
*/
|
|
||||||
public final class IsEqualByReflectionMatcher<T> extends TypeSafeMatcher<T> {
|
|
||||||
|
|
||||||
private final T expected;
|
|
||||||
|
|
||||||
private IsEqualByReflectionMatcher(T expected) {
|
|
||||||
this.expected = expected;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates a matcher that checks if all fields are the same as on the {@code expected} object.
|
|
||||||
*
|
|
||||||
* @param expected the object to match
|
|
||||||
* @param <T> the object's type
|
|
||||||
* @return the matcher for the expected object
|
|
||||||
*/
|
|
||||||
public static <T> Matcher<T> hasEqualValuesOnAllFields(T expected) {
|
|
||||||
return new IsEqualByReflectionMatcher<>(expected);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
protected boolean matchesSafely(T item) {
|
|
||||||
return assertAreFieldsEqual(item);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void describeTo(Description description) {
|
|
||||||
description.appendText("parameters " + expected);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Checks that all fields of the given {@code item} are equal to the {@link #expected} object. Both objects must
|
|
||||||
* be exactly of the same type.
|
|
||||||
*
|
|
||||||
* @param item the object to check
|
|
||||||
* @return true if all fields are equal, false otherwise
|
|
||||||
*/
|
|
||||||
private boolean assertAreFieldsEqual(T item) {
|
|
||||||
if (expected.getClass() != item.getClass()) {
|
|
||||||
fail("Classes don't match, got " + expected.getClass().getSimpleName()
|
|
||||||
+ " and " + item.getClass().getSimpleName());
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
List<Field> fieldsToCheck = getAllFields(expected);
|
|
||||||
for (Field field : fieldsToCheck) {
|
|
||||||
Object lhsValue = ReflectionTestUtils.getFieldValue(field, expected);
|
|
||||||
Object rhsValue = ReflectionTestUtils.getFieldValue(field, item);
|
|
||||||
if (!Objects.equals(lhsValue, rhsValue)) {
|
|
||||||
fail("Field '" + field.getName() + "' does not have same value: '"
|
|
||||||
+ lhsValue + "' vs. '" + rhsValue + "'");
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
private static List<Field> getAllFields(Object object) {
|
|
||||||
List<Field> fields = new ArrayList<>();
|
|
||||||
Class<?> currentClass = object.getClass();
|
|
||||||
while (currentClass != null) {
|
|
||||||
for (Field f : currentClass.getDeclaredFields()) {
|
|
||||||
if (!Modifier.isStatic(f.getModifiers()) && !f.isSynthetic()) {
|
|
||||||
fields.add(f);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (currentClass == Object.class) {
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
currentClass = currentClass.getSuperclass();
|
|
||||||
}
|
|
||||||
return fields;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user