mirror of
https://github.com/AuthMe/AuthMeReloaded.git
synced 2024-12-28 03:27:34 +01:00
commit
14900d84fa
@ -1,20 +1,44 @@
|
|||||||
package fr.xephi.authme;
|
package fr.xephi.authme;
|
||||||
|
|
||||||
import static fr.xephi.authme.settings.properties.EmailSettings.RECALL_PLAYERS;
|
import ch.jalu.injector.Injector;
|
||||||
import static fr.xephi.authme.util.BukkitService.TICKS_PER_MINUTE;
|
import ch.jalu.injector.InjectorBuilder;
|
||||||
|
import com.google.common.annotations.VisibleForTesting;
|
||||||
import java.io.File;
|
import fr.xephi.authme.api.API;
|
||||||
import java.io.IOException;
|
import fr.xephi.authme.api.NewAPI;
|
||||||
import java.sql.SQLException;
|
import fr.xephi.authme.cache.auth.PlayerAuth;
|
||||||
import java.util.ArrayList;
|
import fr.xephi.authme.cache.auth.PlayerCache;
|
||||||
import java.util.Collection;
|
import fr.xephi.authme.cache.backup.PlayerDataStorage;
|
||||||
import java.util.Iterator;
|
import fr.xephi.authme.cache.limbo.LimboCache;
|
||||||
import java.util.List;
|
import fr.xephi.authme.command.CommandHandler;
|
||||||
import java.util.logging.Level;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import java.util.logging.Logger;
|
import fr.xephi.authme.hooks.PluginHooks;
|
||||||
|
import fr.xephi.authme.initialization.DataFolder;
|
||||||
import org.apache.logging.log4j.LogManager;
|
import fr.xephi.authme.initialization.Initializer;
|
||||||
import org.bukkit.Bukkit;
|
import fr.xephi.authme.initialization.MetricsManager;
|
||||||
|
import fr.xephi.authme.listener.BlockListener;
|
||||||
|
import fr.xephi.authme.listener.EntityListener;
|
||||||
|
import fr.xephi.authme.listener.PlayerListener;
|
||||||
|
import fr.xephi.authme.listener.PlayerListener16;
|
||||||
|
import fr.xephi.authme.listener.PlayerListener18;
|
||||||
|
import fr.xephi.authme.listener.PlayerListener19;
|
||||||
|
import fr.xephi.authme.listener.ServerListener;
|
||||||
|
import fr.xephi.authme.output.Messages;
|
||||||
|
import fr.xephi.authme.permission.PermissionsManager;
|
||||||
|
import fr.xephi.authme.permission.PermissionsSystemType;
|
||||||
|
import fr.xephi.authme.process.Management;
|
||||||
|
import fr.xephi.authme.security.crypts.SHA256;
|
||||||
|
import fr.xephi.authme.settings.Settings;
|
||||||
|
import fr.xephi.authme.settings.SpawnLoader;
|
||||||
|
import fr.xephi.authme.settings.properties.PluginSettings;
|
||||||
|
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
||||||
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
|
import fr.xephi.authme.task.CleanupTask;
|
||||||
|
import fr.xephi.authme.task.purge.PurgeService;
|
||||||
|
import fr.xephi.authme.util.BukkitService;
|
||||||
|
import fr.xephi.authme.util.GeoLiteAPI;
|
||||||
|
import fr.xephi.authme.util.MigrationService;
|
||||||
|
import fr.xephi.authme.util.Utils;
|
||||||
|
import fr.xephi.authme.util.ValidationService;
|
||||||
import org.bukkit.Location;
|
import org.bukkit.Location;
|
||||||
import org.bukkit.Server;
|
import org.bukkit.Server;
|
||||||
import org.bukkit.command.Command;
|
import org.bukkit.command.Command;
|
||||||
@ -27,71 +51,25 @@ import org.bukkit.plugin.java.JavaPlugin;
|
|||||||
import org.bukkit.scheduler.BukkitScheduler;
|
import org.bukkit.scheduler.BukkitScheduler;
|
||||||
import org.bukkit.scheduler.BukkitWorker;
|
import org.bukkit.scheduler.BukkitWorker;
|
||||||
|
|
||||||
import com.google.common.annotations.VisibleForTesting;
|
import java.io.File;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Collection;
|
||||||
|
import java.util.Date;
|
||||||
|
import java.util.Iterator;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.logging.Level;
|
||||||
|
|
||||||
import ch.jalu.injector.Injector;
|
import static fr.xephi.authme.util.BukkitService.TICKS_PER_MINUTE;
|
||||||
import ch.jalu.injector.InjectorBuilder;
|
import static fr.xephi.authme.util.Utils.isClassLoaded;
|
||||||
import fr.xephi.authme.api.API;
|
|
||||||
import fr.xephi.authme.api.NewAPI;
|
|
||||||
import fr.xephi.authme.cache.auth.PlayerAuth;
|
|
||||||
import fr.xephi.authme.cache.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.cache.backup.PlayerDataStorage;
|
|
||||||
import fr.xephi.authme.cache.limbo.LimboCache;
|
|
||||||
import fr.xephi.authme.command.CommandHandler;
|
|
||||||
import fr.xephi.authme.datasource.CacheDataSource;
|
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
|
||||||
import fr.xephi.authme.datasource.DataSourceType;
|
|
||||||
import fr.xephi.authme.datasource.FlatFile;
|
|
||||||
import fr.xephi.authme.datasource.MySQL;
|
|
||||||
import fr.xephi.authme.datasource.SQLite;
|
|
||||||
import fr.xephi.authme.hooks.PluginHooks;
|
|
||||||
import fr.xephi.authme.initialization.DataFolder;
|
|
||||||
import fr.xephi.authme.initialization.MetricsManager;
|
|
||||||
import fr.xephi.authme.listener.BlockListener;
|
|
||||||
import fr.xephi.authme.listener.EntityListener;
|
|
||||||
import fr.xephi.authme.listener.PlayerListener;
|
|
||||||
import fr.xephi.authme.listener.PlayerListener16;
|
|
||||||
import fr.xephi.authme.listener.PlayerListener18;
|
|
||||||
import fr.xephi.authme.listener.PlayerListener19;
|
|
||||||
import fr.xephi.authme.listener.ServerListener;
|
|
||||||
import fr.xephi.authme.output.ConsoleFilter;
|
|
||||||
import fr.xephi.authme.output.Log4JFilter;
|
|
||||||
import fr.xephi.authme.output.MessageKey;
|
|
||||||
import fr.xephi.authme.output.Messages;
|
|
||||||
import fr.xephi.authme.permission.PermissionsManager;
|
|
||||||
import fr.xephi.authme.permission.PermissionsSystemType;
|
|
||||||
import fr.xephi.authme.process.Management;
|
|
||||||
import fr.xephi.authme.security.crypts.SHA256;
|
|
||||||
import fr.xephi.authme.settings.Settings;
|
|
||||||
import fr.xephi.authme.settings.SettingsMigrationService;
|
|
||||||
import fr.xephi.authme.settings.SpawnLoader;
|
|
||||||
import fr.xephi.authme.settings.properties.DatabaseSettings;
|
|
||||||
import fr.xephi.authme.settings.properties.EmailSettings;
|
|
||||||
import fr.xephi.authme.settings.properties.PluginSettings;
|
|
||||||
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
|
||||||
import fr.xephi.authme.settings.properties.SecuritySettings;
|
|
||||||
import fr.xephi.authme.settings.properties.SettingsFieldRetriever;
|
|
||||||
import fr.xephi.authme.settings.propertymap.PropertyMap;
|
|
||||||
import fr.xephi.authme.task.CleanupTask;
|
|
||||||
import fr.xephi.authme.task.purge.PurgeService;
|
|
||||||
import fr.xephi.authme.util.BukkitService;
|
|
||||||
import fr.xephi.authme.util.FileUtils;
|
|
||||||
import fr.xephi.authme.util.GeoLiteAPI;
|
|
||||||
import fr.xephi.authme.util.MigrationService;
|
|
||||||
import fr.xephi.authme.util.StringUtils;
|
|
||||||
import fr.xephi.authme.util.Utils;
|
|
||||||
import fr.xephi.authme.util.ValidationService;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The AuthMe main class.
|
* The AuthMe main class.
|
||||||
*/
|
*/
|
||||||
public class AuthMe extends JavaPlugin {
|
public class AuthMe extends JavaPlugin {
|
||||||
|
|
||||||
// Costants
|
// Constants
|
||||||
private static final String PLUGIN_NAME = "AuthMeReloaded";
|
private static final String PLUGIN_NAME = "AuthMeReloaded";
|
||||||
private static final String LOG_FILENAME = "authme.log";
|
private static final String LOG_FILENAME = "authme.log";
|
||||||
private static final String FLATFILE_FILENAME = "auths.db";
|
|
||||||
private static final int SQLITE_MAX_SIZE = 4000;
|
|
||||||
private static final int CLEANUP_INTERVAL = 5 * TICKS_PER_MINUTE;
|
private static final int CLEANUP_INTERVAL = 5 * TICKS_PER_MINUTE;
|
||||||
|
|
||||||
// Default version and build number values;
|
// Default version and build number values;
|
||||||
@ -162,69 +140,12 @@ public class AuthMe extends JavaPlugin {
|
|||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
public void onEnable() {
|
public void onEnable() {
|
||||||
// Set the plugin instance and load plugin info from the plugin description.
|
|
||||||
loadPluginInfo();
|
|
||||||
|
|
||||||
// Set the Logger instance and log file path
|
|
||||||
ConsoleLogger.setLogger(getLogger());
|
|
||||||
ConsoleLogger.setLogFile(new File(getDataFolder(), LOG_FILENAME));
|
|
||||||
|
|
||||||
// Load settings and custom configurations, if it fails, stop the server due to security reasons.
|
|
||||||
settings = createSettings();
|
|
||||||
if (settings == null) {
|
|
||||||
ConsoleLogger.warning("Could not load the configuration file!"
|
|
||||||
+ "The server is going to shutdown NOW!");
|
|
||||||
setEnabled(false);
|
|
||||||
getServer().shutdown();
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Apply settings to the logger
|
|
||||||
ConsoleLogger.setLoggingOptions(settings);
|
|
||||||
|
|
||||||
// Set console filter
|
|
||||||
setupConsoleFilter();
|
|
||||||
|
|
||||||
// Connect to the database and setup tables
|
|
||||||
try {
|
try {
|
||||||
setupDatabase();
|
initializeServices();
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
ConsoleLogger.logException("Fatal error occurred during database connection! "
|
ConsoleLogger.logException("Aborting initialization of AuthMe:", e);
|
||||||
+ "Authme initialization aborted!", e);
|
|
||||||
stopOrUnload();
|
stopOrUnload();
|
||||||
return;
|
|
||||||
}
|
}
|
||||||
// Convert deprecated PLAINTEXT hash entries
|
|
||||||
MigrationService.changePlainTextToSha256(settings, database, new SHA256());
|
|
||||||
|
|
||||||
// Injector initialization
|
|
||||||
injector = new InjectorBuilder().addDefaultHandlers("fr.xephi.authme").create();
|
|
||||||
|
|
||||||
// Register elements of the Bukkit / JavaPlugin environment
|
|
||||||
injector.register(AuthMe.class, this);
|
|
||||||
injector.register(Server.class, getServer());
|
|
||||||
injector.register(PluginManager.class, getServer().getPluginManager());
|
|
||||||
injector.register(BukkitScheduler.class, getServer().getScheduler());
|
|
||||||
injector.provide(DataFolder.class, getDataFolder());
|
|
||||||
|
|
||||||
// Register elements we instantiate manually
|
|
||||||
injector.register(Settings.class, settings);
|
|
||||||
injector.register(DataSource.class, database);
|
|
||||||
|
|
||||||
instantiateServices(injector);
|
|
||||||
|
|
||||||
// Reload support hook
|
|
||||||
reloadSupportHook();
|
|
||||||
|
|
||||||
// Do a backup on start
|
|
||||||
// TODO: maybe create a backup manager?
|
|
||||||
new PerformBackup(this, settings).doBackup(PerformBackup.BackupCause.START);
|
|
||||||
|
|
||||||
// Register event listeners
|
|
||||||
registerEventListeners(injector);
|
|
||||||
|
|
||||||
// Start Email recall task if needed
|
|
||||||
scheduleRecallEmailTask();
|
|
||||||
|
|
||||||
// Show settings warnings
|
// Show settings warnings
|
||||||
showSettingsWarnings();
|
showSettingsWarnings();
|
||||||
@ -234,6 +155,9 @@ public class AuthMe extends JavaPlugin {
|
|||||||
ConsoleLogger.warning("Warning! This server uses PermissionsBukkit for permissions. Some permissions features may not be supported!");
|
ConsoleLogger.warning("Warning! This server uses PermissionsBukkit for permissions. Some permissions features may not be supported!");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Do a backup on start
|
||||||
|
new PerformBackup(this, settings).doBackup(PerformBackup.BackupCause.START);
|
||||||
|
|
||||||
// Set up Metrics
|
// Set up Metrics
|
||||||
MetricsManager.sendMetrics(this, settings);
|
MetricsManager.sendMetrics(this, settings);
|
||||||
|
|
||||||
@ -253,6 +177,55 @@ public class AuthMe extends JavaPlugin {
|
|||||||
cleanupTask.runTaskTimerAsynchronously(this, CLEANUP_INTERVAL, CLEANUP_INTERVAL);
|
cleanupTask.runTaskTimerAsynchronously(this, CLEANUP_INTERVAL, CLEANUP_INTERVAL);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void initializeServices() throws Exception {
|
||||||
|
// Set the plugin instance and load plugin info from the plugin description.
|
||||||
|
loadPluginInfo();
|
||||||
|
|
||||||
|
// Set the Logger instance and log file path
|
||||||
|
ConsoleLogger.setLogger(getLogger());
|
||||||
|
ConsoleLogger.setLogFile(new File(getDataFolder(), LOG_FILENAME));
|
||||||
|
|
||||||
|
bukkitService = new BukkitService(this);
|
||||||
|
Initializer initializer = new Initializer(this, bukkitService);
|
||||||
|
|
||||||
|
// Load settings and set up the console and console filter
|
||||||
|
settings = initializer.createSettings();
|
||||||
|
ConsoleLogger.setLoggingOptions(settings);
|
||||||
|
initializer.setupConsoleFilter(settings, getLogger());
|
||||||
|
|
||||||
|
// Connect to the database and set up tables
|
||||||
|
database = initializer.setupDatabase(settings);
|
||||||
|
|
||||||
|
// Convert deprecated PLAINTEXT hash entries
|
||||||
|
MigrationService.changePlainTextToSha256(settings, database, new SHA256());
|
||||||
|
|
||||||
|
// Injector initialization
|
||||||
|
injector = new InjectorBuilder().addDefaultHandlers("fr.xephi.authme").create();
|
||||||
|
|
||||||
|
// Register elements of the Bukkit / JavaPlugin environment
|
||||||
|
injector.register(AuthMe.class, this);
|
||||||
|
injector.register(Server.class, getServer());
|
||||||
|
injector.register(PluginManager.class, getServer().getPluginManager());
|
||||||
|
injector.register(BukkitScheduler.class, getServer().getScheduler());
|
||||||
|
injector.provide(DataFolder.class, getDataFolder());
|
||||||
|
|
||||||
|
// Register elements we instantiate manually
|
||||||
|
injector.register(Settings.class, settings);
|
||||||
|
injector.register(DataSource.class, database);
|
||||||
|
injector.register(BukkitService.class, bukkitService);
|
||||||
|
|
||||||
|
instantiateServices(injector);
|
||||||
|
|
||||||
|
// Reload support hook
|
||||||
|
reloadSupportHook();
|
||||||
|
|
||||||
|
// Register event listeners
|
||||||
|
registerEventListeners(injector);
|
||||||
|
|
||||||
|
// Start Email recall task if needed
|
||||||
|
initializer.scheduleRecallEmailTask(settings, database, messages);
|
||||||
|
}
|
||||||
|
|
||||||
// Get version and build number of the plugin
|
// Get version and build number of the plugin
|
||||||
private void loadPluginInfo() {
|
private void loadPluginInfo() {
|
||||||
String versionRaw = this.getDescription().getVersion();
|
String versionRaw = this.getDescription().getVersion();
|
||||||
@ -315,119 +288,18 @@ public class AuthMe extends JavaPlugin {
|
|||||||
pluginManager.registerEvents(injector.getSingleton(ServerListener.class), this);
|
pluginManager.registerEvents(injector.getSingleton(ServerListener.class), this);
|
||||||
|
|
||||||
// Try to register 1.6 player listeners
|
// Try to register 1.6 player listeners
|
||||||
try {
|
if (isClassLoaded("org.bukkit.event.player.PlayerEditBookEvent")) {
|
||||||
Class.forName("org.bukkit.event.player.PlayerEditBookEvent");
|
|
||||||
pluginManager.registerEvents(injector.getSingleton(PlayerListener16.class), this);
|
pluginManager.registerEvents(injector.getSingleton(PlayerListener16.class), this);
|
||||||
} catch (ClassNotFoundException ignore) {
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Try to register 1.8 player listeners
|
// Try to register 1.8 player listeners
|
||||||
try {
|
if (isClassLoaded("org.bukkit.event.player.PlayerInteractAtEntityEvent")) {
|
||||||
Class.forName("org.bukkit.event.player.PlayerInteractAtEntityEvent");
|
|
||||||
pluginManager.registerEvents(injector.getSingleton(PlayerListener18.class), this);
|
pluginManager.registerEvents(injector.getSingleton(PlayerListener18.class), this);
|
||||||
} catch (ClassNotFoundException ignore) {
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Try to register 1.9 player listeners
|
// Try to register 1.9 player listeners
|
||||||
try {
|
if (isClassLoaded("org.bukkit.event.player.PlayerSwapHandItemsEvent")) {
|
||||||
Class.forName("org.bukkit.event.player.PlayerSwapHandItemsEvent");
|
|
||||||
pluginManager.registerEvents(injector.getSingleton(PlayerListener19.class), this);
|
pluginManager.registerEvents(injector.getSingleton(PlayerListener19.class), this);
|
||||||
} catch (ClassNotFoundException ignore) {
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Loads the plugin's settings.
|
|
||||||
*
|
|
||||||
* @return The settings instance, or null if it could not be constructed
|
|
||||||
*/
|
|
||||||
private Settings createSettings() {
|
|
||||||
File configFile = new File(getDataFolder(), "config.yml");
|
|
||||||
PropertyMap properties = SettingsFieldRetriever.getAllPropertyFields();
|
|
||||||
SettingsMigrationService migrationService = new SettingsMigrationService();
|
|
||||||
return FileUtils.copyFileFromResource(configFile, "config.yml")
|
|
||||||
? new Settings(configFile, getDataFolder(), properties, migrationService)
|
|
||||||
: null;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set up the console filter.
|
|
||||||
*/
|
|
||||||
private void setupConsoleFilter() {
|
|
||||||
if (!settings.getProperty(SecuritySettings.REMOVE_PASSWORD_FROM_CONSOLE)) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
// Try to set the log4j filter
|
|
||||||
try {
|
|
||||||
Class.forName("org.apache.logging.log4j.core.filter.AbstractFilter");
|
|
||||||
setLog4JFilter();
|
|
||||||
} catch (ClassNotFoundException | NoClassDefFoundError e) {
|
|
||||||
// log4j is not available
|
|
||||||
ConsoleLogger.info("You're using Minecraft 1.6.x or older, Log4J support will be disabled");
|
|
||||||
ConsoleFilter filter = new ConsoleFilter();
|
|
||||||
getLogger().setFilter(filter);
|
|
||||||
Bukkit.getLogger().setFilter(filter);
|
|
||||||
Logger.getLogger("Minecraft").setFilter(filter);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Set the console filter to remove the passwords
|
|
||||||
private void setLog4JFilter() {
|
|
||||||
org.apache.logging.log4j.core.Logger logger;
|
|
||||||
logger = (org.apache.logging.log4j.core.Logger) LogManager.getRootLogger();
|
|
||||||
logger.addFilter(new Log4JFilter());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Sets up the data source.
|
|
||||||
*
|
|
||||||
* @throws ClassNotFoundException if no driver could be found for the datasource
|
|
||||||
* @throws SQLException when initialization of a SQL datasource failed
|
|
||||||
* @throws IOException if flat file cannot be read
|
|
||||||
* @see AuthMe#database
|
|
||||||
*/
|
|
||||||
private void setupDatabase() throws ClassNotFoundException, SQLException, IOException {
|
|
||||||
if (database != null) {
|
|
||||||
database.close();
|
|
||||||
database = null;
|
|
||||||
}
|
|
||||||
|
|
||||||
DataSourceType dataSourceType = settings.getProperty(DatabaseSettings.BACKEND);
|
|
||||||
DataSource dataSource;
|
|
||||||
switch (dataSourceType) {
|
|
||||||
case FILE:
|
|
||||||
File source = new File(getDataFolder(), FLATFILE_FILENAME);
|
|
||||||
dataSource = new FlatFile(source);
|
|
||||||
break;
|
|
||||||
case MYSQL:
|
|
||||||
dataSource = new MySQL(settings);
|
|
||||||
break;
|
|
||||||
case SQLITE:
|
|
||||||
dataSource = new SQLite(settings);
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
throw new UnsupportedOperationException("Unknown data source type '" + dataSourceType + "'");
|
|
||||||
}
|
|
||||||
|
|
||||||
DataSource convertedSource = MigrationService.convertFlatfileToSqlite(settings, dataSource);
|
|
||||||
dataSource = convertedSource == null ? dataSource : convertedSource;
|
|
||||||
|
|
||||||
if (settings.getProperty(DatabaseSettings.USE_CACHING)) {
|
|
||||||
dataSource = new CacheDataSource(dataSource);
|
|
||||||
}
|
|
||||||
|
|
||||||
database = dataSource;
|
|
||||||
if (DataSourceType.SQLITE == dataSourceType) {
|
|
||||||
getServer().getScheduler().runTaskAsynchronously(this, new Runnable() {
|
|
||||||
@Override
|
|
||||||
public void run() {
|
|
||||||
int accounts = database.getAccountsRegistered();
|
|
||||||
if (accounts >= SQLITE_MAX_SIZE) {
|
|
||||||
ConsoleLogger.warning("YOU'RE USING THE SQLITE DATABASE WITH "
|
|
||||||
+ accounts + "+ ACCOUNTS; FOR BETTER PERFORMANCE, PLEASE UPGRADE TO MYSQL!!");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -442,26 +314,6 @@ public class AuthMe extends JavaPlugin {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private void scheduleRecallEmailTask() {
|
|
||||||
if (!settings.getProperty(RECALL_PLAYERS)) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
Bukkit.getScheduler().runTaskTimerAsynchronously(this, new Runnable() {
|
|
||||||
@Override
|
|
||||||
public void run() {
|
|
||||||
for (PlayerAuth auth : database.getLoggedPlayers()) {
|
|
||||||
String email = auth.getEmail();
|
|
||||||
if (StringUtils.isEmpty(email) || "your@email.com".equalsIgnoreCase(email)) {
|
|
||||||
Player player = bukkitService.getPlayerExact(auth.getRealName());
|
|
||||||
if (player != null) {
|
|
||||||
messages.send(player, MessageKey.ADD_EMAIL_MESSAGE);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}, 1, 1200 * settings.getProperty(EmailSettings.DELAY_RECALL));
|
|
||||||
}
|
|
||||||
|
|
||||||
// TODO: check this, do we really need it? -sgdc3
|
// TODO: check this, do we really need it? -sgdc3
|
||||||
private void reloadSupportHook() {
|
private void reloadSupportHook() {
|
||||||
if (database != null) {
|
if (database != null) {
|
||||||
@ -471,8 +323,8 @@ public class AuthMe extends JavaPlugin {
|
|||||||
} else if (settings.getProperty(SecuritySettings.USE_RELOAD_COMMAND_SUPPORT)) {
|
} else if (settings.getProperty(SecuritySettings.USE_RELOAD_COMMAND_SUPPORT)) {
|
||||||
for (PlayerAuth auth : database.getLoggedPlayers()) {
|
for (PlayerAuth auth : database.getLoggedPlayers()) {
|
||||||
if (auth != null) {
|
if (auth != null) {
|
||||||
//auth.setLastLogin(new Date().getTime());
|
auth.setLastLogin(new Date().getTime());
|
||||||
//database.updateSession(auth);
|
database.updateSession(auth);
|
||||||
playerCache.addPlayer(auth);
|
playerCache.addPlayer(auth);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -216,6 +216,6 @@ public class NewAPI {
|
|||||||
* @param player The player to unregister
|
* @param player The player to unregister
|
||||||
*/
|
*/
|
||||||
public void forceUnregister(Player player) {
|
public void forceUnregister(Player player) {
|
||||||
management.performUnregister(player, "", true);
|
management.performUnregisterByAdmin(null, player.getName(), player);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,13 +1,9 @@
|
|||||||
package fr.xephi.authme.command.executable.authme;
|
package fr.xephi.authme.command.executable.authme;
|
||||||
|
|
||||||
import fr.xephi.authme.ConsoleLogger;
|
|
||||||
import fr.xephi.authme.cache.auth.PlayerCache;
|
|
||||||
import fr.xephi.authme.command.CommandService;
|
import fr.xephi.authme.command.CommandService;
|
||||||
import fr.xephi.authme.command.ExecutableCommand;
|
import fr.xephi.authme.command.ExecutableCommand;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.output.MessageKey;
|
import fr.xephi.authme.output.MessageKey;
|
||||||
import fr.xephi.authme.permission.AuthGroupHandler;
|
|
||||||
import fr.xephi.authme.permission.AuthGroupType;
|
|
||||||
import fr.xephi.authme.process.Management;
|
import fr.xephi.authme.process.Management;
|
||||||
import fr.xephi.authme.util.BukkitService;
|
import fr.xephi.authme.util.BukkitService;
|
||||||
import org.bukkit.command.CommandSender;
|
import org.bukkit.command.CommandSender;
|
||||||
@ -27,47 +23,27 @@ public class UnregisterAdminCommand implements ExecutableCommand {
|
|||||||
@Inject
|
@Inject
|
||||||
private CommandService commandService;
|
private CommandService commandService;
|
||||||
|
|
||||||
@Inject
|
|
||||||
private PlayerCache playerCache;
|
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
private BukkitService bukkitService;
|
private BukkitService bukkitService;
|
||||||
|
|
||||||
@Inject
|
|
||||||
private AuthGroupHandler authGroupHandler;
|
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
private Management management;
|
private Management management;
|
||||||
|
|
||||||
|
UnregisterAdminCommand() {
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void executeCommand(final CommandSender sender, List<String> arguments) {
|
public void executeCommand(final CommandSender sender, List<String> arguments) {
|
||||||
// Get the player name
|
|
||||||
String playerName = arguments.get(0);
|
String playerName = arguments.get(0);
|
||||||
String playerNameLowerCase = playerName.toLowerCase();
|
|
||||||
|
|
||||||
// Make sure the user is valid
|
// Make sure the user exists
|
||||||
if (!dataSource.isAuthAvailable(playerNameLowerCase)) {
|
if (!dataSource.isAuthAvailable(playerName)) {
|
||||||
commandService.send(sender, MessageKey.UNKNOWN_USER);
|
commandService.send(sender, MessageKey.UNKNOWN_USER);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Remove the player
|
// Get the player from the server and perform unregister
|
||||||
if (!dataSource.removeAuth(playerNameLowerCase)) {
|
Player target = bukkitService.getPlayerExact(playerName);
|
||||||
commandService.send(sender, MessageKey.ERROR);
|
management.performUnregisterByAdmin(sender, playerName, target);
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Unregister the player
|
|
||||||
Player target = bukkitService.getPlayerExact(playerNameLowerCase);
|
|
||||||
playerCache.removePlayer(playerNameLowerCase);
|
|
||||||
authGroupHandler.setGroup(target, AuthGroupType.UNREGISTERED);
|
|
||||||
if (target != null && target.isOnline()) {
|
|
||||||
management.performUnregister(target, "dontneed", true);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Show a status message
|
|
||||||
commandService.send(sender, MessageKey.UNREGISTERED_SUCCESS);
|
|
||||||
ConsoleLogger.info(sender.getName() + " unregistered " + playerName);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -10,6 +10,9 @@ import org.bukkit.entity.Player;
|
|||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Command for a player to unregister himself.
|
||||||
|
*/
|
||||||
public class UnregisterCommand extends PlayerCommand {
|
public class UnregisterCommand extends PlayerCommand {
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
@ -24,15 +27,15 @@ public class UnregisterCommand extends PlayerCommand {
|
|||||||
@Override
|
@Override
|
||||||
public void runCommand(Player player, List<String> arguments) {
|
public void runCommand(Player player, List<String> arguments) {
|
||||||
String playerPass = arguments.get(0);
|
String playerPass = arguments.get(0);
|
||||||
final String playerNameLowerCase = player.getName().toLowerCase();
|
final String playerName = player.getName();
|
||||||
|
|
||||||
// Make sure the player is authenticated
|
// Make sure the player is authenticated
|
||||||
if (!playerCache.isAuthenticated(playerNameLowerCase)) {
|
if (!playerCache.isAuthenticated(playerName)) {
|
||||||
commandService.send(player, MessageKey.NOT_LOGGED_IN);
|
commandService.send(player, MessageKey.NOT_LOGGED_IN);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Unregister the player
|
// Unregister the player
|
||||||
management.performUnregister(player, playerPass, false);
|
management.performUnregister(player, playerPass);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
167
src/main/java/fr/xephi/authme/initialization/Initializer.java
Normal file
167
src/main/java/fr/xephi/authme/initialization/Initializer.java
Normal file
@ -0,0 +1,167 @@
|
|||||||
|
package fr.xephi.authme.initialization;
|
||||||
|
|
||||||
|
import fr.xephi.authme.AuthMe;
|
||||||
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
|
import fr.xephi.authme.cache.auth.PlayerAuth;
|
||||||
|
import fr.xephi.authme.datasource.CacheDataSource;
|
||||||
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
|
import fr.xephi.authme.datasource.DataSourceType;
|
||||||
|
import fr.xephi.authme.datasource.FlatFile;
|
||||||
|
import fr.xephi.authme.datasource.MySQL;
|
||||||
|
import fr.xephi.authme.datasource.SQLite;
|
||||||
|
import fr.xephi.authme.output.ConsoleFilter;
|
||||||
|
import fr.xephi.authme.output.Log4JFilter;
|
||||||
|
import fr.xephi.authme.output.MessageKey;
|
||||||
|
import fr.xephi.authme.output.Messages;
|
||||||
|
import fr.xephi.authme.settings.Settings;
|
||||||
|
import fr.xephi.authme.settings.SettingsMigrationService;
|
||||||
|
import fr.xephi.authme.settings.properties.DatabaseSettings;
|
||||||
|
import fr.xephi.authme.settings.properties.EmailSettings;
|
||||||
|
import fr.xephi.authme.settings.properties.SecuritySettings;
|
||||||
|
import fr.xephi.authme.settings.properties.SettingsFieldRetriever;
|
||||||
|
import fr.xephi.authme.settings.propertymap.PropertyMap;
|
||||||
|
import fr.xephi.authme.util.BukkitService;
|
||||||
|
import fr.xephi.authme.util.FileUtils;
|
||||||
|
import fr.xephi.authme.util.MigrationService;
|
||||||
|
import fr.xephi.authme.util.StringUtils;
|
||||||
|
import org.apache.logging.log4j.LogManager;
|
||||||
|
import org.bukkit.Bukkit;
|
||||||
|
import org.bukkit.entity.Player;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.sql.SQLException;
|
||||||
|
import java.util.logging.Logger;
|
||||||
|
|
||||||
|
import static fr.xephi.authme.settings.properties.EmailSettings.RECALL_PLAYERS;
|
||||||
|
import static fr.xephi.authme.util.BukkitService.TICKS_PER_MINUTE;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Initializes the plugin's data source.
|
||||||
|
*/
|
||||||
|
public class Initializer {
|
||||||
|
|
||||||
|
private static final String FLATFILE_FILENAME = "auths.db";
|
||||||
|
private static final int SQLITE_MAX_SIZE = 4000;
|
||||||
|
|
||||||
|
private AuthMe authMe;
|
||||||
|
private BukkitService bukkitService;
|
||||||
|
|
||||||
|
public Initializer(AuthMe authMe, BukkitService bukkitService) {
|
||||||
|
this.authMe = authMe;
|
||||||
|
this.bukkitService = bukkitService;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Loads the plugin's settings.
|
||||||
|
*
|
||||||
|
* @return The settings instance, or null if it could not be constructed
|
||||||
|
*/
|
||||||
|
public Settings createSettings() throws Exception {
|
||||||
|
File configFile = new File(authMe.getDataFolder(), "config.yml");
|
||||||
|
PropertyMap properties = SettingsFieldRetriever.getAllPropertyFields();
|
||||||
|
SettingsMigrationService migrationService = new SettingsMigrationService();
|
||||||
|
if (FileUtils.copyFileFromResource(configFile, "config.yml")) {
|
||||||
|
return new Settings(configFile, authMe.getDataFolder(), properties, migrationService);
|
||||||
|
}
|
||||||
|
throw new Exception("Could not copy config.yml from JAR to plugin folder");
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets up the data source.
|
||||||
|
*
|
||||||
|
* @throws ClassNotFoundException if no driver could be found for the datasource
|
||||||
|
* @throws SQLException when initialization of a SQL datasource failed
|
||||||
|
* @throws IOException if flat file cannot be read
|
||||||
|
*/
|
||||||
|
public DataSource setupDatabase(Settings settings) throws ClassNotFoundException, SQLException, IOException {
|
||||||
|
DataSourceType dataSourceType = settings.getProperty(DatabaseSettings.BACKEND);
|
||||||
|
DataSource dataSource;
|
||||||
|
switch (dataSourceType) {
|
||||||
|
case FILE:
|
||||||
|
File source = new File(authMe.getDataFolder(), FLATFILE_FILENAME);
|
||||||
|
dataSource = new FlatFile(source);
|
||||||
|
break;
|
||||||
|
case MYSQL:
|
||||||
|
dataSource = new MySQL(settings);
|
||||||
|
break;
|
||||||
|
case SQLITE:
|
||||||
|
dataSource = new SQLite(settings);
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
throw new UnsupportedOperationException("Unknown data source type '" + dataSourceType + "'");
|
||||||
|
}
|
||||||
|
|
||||||
|
DataSource convertedSource = MigrationService.convertFlatfileToSqlite(settings, dataSource);
|
||||||
|
dataSource = convertedSource == null ? dataSource : convertedSource;
|
||||||
|
|
||||||
|
if (settings.getProperty(DatabaseSettings.USE_CACHING)) {
|
||||||
|
dataSource = new CacheDataSource(dataSource);
|
||||||
|
}
|
||||||
|
if (DataSourceType.SQLITE.equals(dataSourceType)) {
|
||||||
|
checkDataSourceSize(dataSource);
|
||||||
|
}
|
||||||
|
return dataSource;
|
||||||
|
}
|
||||||
|
|
||||||
|
private void checkDataSourceSize(final DataSource dataSource) {
|
||||||
|
bukkitService.runTaskAsynchronously(new Runnable() {
|
||||||
|
@Override
|
||||||
|
public void run() {
|
||||||
|
int accounts = dataSource.getAccountsRegistered();
|
||||||
|
if (accounts >= SQLITE_MAX_SIZE) {
|
||||||
|
ConsoleLogger.warning("YOU'RE USING THE SQLITE DATABASE WITH "
|
||||||
|
+ accounts + "+ ACCOUNTS; FOR BETTER PERFORMANCE, PLEASE UPGRADE TO MYSQL!!");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets up the console filter if enabled.
|
||||||
|
*/
|
||||||
|
public void setupConsoleFilter(Settings settings, Logger logger) {
|
||||||
|
if (!settings.getProperty(SecuritySettings.REMOVE_PASSWORD_FROM_CONSOLE)) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
// Try to set the log4j filter
|
||||||
|
try {
|
||||||
|
Class.forName("org.apache.logging.log4j.core.filter.AbstractFilter");
|
||||||
|
setLog4JFilter();
|
||||||
|
} catch (ClassNotFoundException | NoClassDefFoundError e) {
|
||||||
|
// log4j is not available
|
||||||
|
ConsoleLogger.info("You're using Minecraft 1.6.x or older, Log4J support will be disabled");
|
||||||
|
ConsoleFilter filter = new ConsoleFilter();
|
||||||
|
logger.setFilter(filter);
|
||||||
|
Bukkit.getLogger().setFilter(filter);
|
||||||
|
Logger.getLogger("Minecraft").setFilter(filter);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set the console filter to remove the passwords
|
||||||
|
private static void setLog4JFilter() {
|
||||||
|
org.apache.logging.log4j.core.Logger logger;
|
||||||
|
logger = (org.apache.logging.log4j.core.Logger) LogManager.getRootLogger();
|
||||||
|
logger.addFilter(new Log4JFilter());
|
||||||
|
}
|
||||||
|
|
||||||
|
public void scheduleRecallEmailTask(Settings settings, final DataSource dataSource, final Messages messages) {
|
||||||
|
if (!settings.getProperty(RECALL_PLAYERS)) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
bukkitService.runTaskTimerAsynchronously(new Runnable() {
|
||||||
|
@Override
|
||||||
|
public void run() {
|
||||||
|
for (PlayerAuth auth : dataSource.getLoggedPlayers()) {
|
||||||
|
String email = auth.getEmail();
|
||||||
|
if (StringUtils.isEmpty(email) || "your@email.com".equalsIgnoreCase(email)) {
|
||||||
|
Player player = bukkitService.getPlayerExact(auth.getRealName());
|
||||||
|
if (player != null) {
|
||||||
|
messages.send(player, MessageKey.ADD_EMAIL_MESSAGE);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}, 1, TICKS_PER_MINUTE * settings.getProperty(EmailSettings.DELAY_RECALL));
|
||||||
|
}
|
||||||
|
}
|
@ -10,6 +10,7 @@ import fr.xephi.authme.process.quit.AsynchronousQuit;
|
|||||||
import fr.xephi.authme.process.register.AsyncRegister;
|
import fr.xephi.authme.process.register.AsyncRegister;
|
||||||
import fr.xephi.authme.process.unregister.AsynchronousUnregister;
|
import fr.xephi.authme.process.unregister.AsynchronousUnregister;
|
||||||
import fr.xephi.authme.util.BukkitService;
|
import fr.xephi.authme.util.BukkitService;
|
||||||
|
import org.bukkit.command.CommandSender;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
@ -70,11 +71,20 @@ public class Management {
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
public void performUnregister(final Player player, final String password, final boolean isForce) {
|
public void performUnregister(final Player player, final String password) {
|
||||||
runTask(new Runnable() {
|
runTask(new Runnable() {
|
||||||
@Override
|
@Override
|
||||||
public void run() {
|
public void run() {
|
||||||
asynchronousUnregister.unregister(player, password, isForce);
|
asynchronousUnregister.unregister(player, password);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
public void performUnregisterByAdmin(final CommandSender initiator, final String name, final Player player) {
|
||||||
|
runTask(new Runnable() {
|
||||||
|
@Override
|
||||||
|
public void run() {
|
||||||
|
asynchronousUnregister.adminUnregister(initiator, name, player);
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
@ -6,16 +6,17 @@ import fr.xephi.authme.cache.auth.PlayerCache;
|
|||||||
import fr.xephi.authme.cache.limbo.LimboCache;
|
import fr.xephi.authme.cache.limbo.LimboCache;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.output.MessageKey;
|
import fr.xephi.authme.output.MessageKey;
|
||||||
|
import fr.xephi.authme.permission.AuthGroupHandler;
|
||||||
import fr.xephi.authme.permission.AuthGroupType;
|
import fr.xephi.authme.permission.AuthGroupType;
|
||||||
import fr.xephi.authme.process.AsynchronousProcess;
|
import fr.xephi.authme.process.AsynchronousProcess;
|
||||||
import fr.xephi.authme.process.ProcessService;
|
import fr.xephi.authme.process.ProcessService;
|
||||||
import fr.xephi.authme.security.PasswordSecurity;
|
import fr.xephi.authme.security.PasswordSecurity;
|
||||||
import fr.xephi.authme.settings.properties.HooksSettings;
|
|
||||||
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
||||||
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
||||||
import fr.xephi.authme.task.PlayerDataTaskManager;
|
import fr.xephi.authme.task.PlayerDataTaskManager;
|
||||||
import fr.xephi.authme.util.BukkitService;
|
import fr.xephi.authme.util.BukkitService;
|
||||||
import fr.xephi.authme.util.TeleportationService;
|
import fr.xephi.authme.util.TeleportationService;
|
||||||
|
import org.bukkit.command.CommandSender;
|
||||||
import org.bukkit.entity.Player;
|
import org.bukkit.entity.Player;
|
||||||
import org.bukkit.potion.PotionEffect;
|
import org.bukkit.potion.PotionEffect;
|
||||||
import org.bukkit.potion.PotionEffectType;
|
import org.bukkit.potion.PotionEffectType;
|
||||||
@ -39,7 +40,7 @@ public class AsynchronousUnregister implements AsynchronousProcess {
|
|||||||
private PlayerCache playerCache;
|
private PlayerCache playerCache;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
private BukkitService bukktiService;
|
private BukkitService bukkitService;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
private LimboCache limboCache;
|
private LimboCache limboCache;
|
||||||
@ -50,54 +51,84 @@ public class AsynchronousUnregister implements AsynchronousProcess {
|
|||||||
@Inject
|
@Inject
|
||||||
private TeleportationService teleportationService;
|
private TeleportationService teleportationService;
|
||||||
|
|
||||||
|
@Inject
|
||||||
|
private AuthGroupHandler authGroupHandler;
|
||||||
|
|
||||||
AsynchronousUnregister() { }
|
AsynchronousUnregister() { }
|
||||||
|
|
||||||
|
/**
|
||||||
public void unregister(final Player player, String password, boolean force) {
|
* Processes a player's request to unregister himself. Unregisters the player after
|
||||||
final String name = player.getName().toLowerCase();
|
* successful password check.
|
||||||
PlayerAuth cachedAuth = playerCache.getAuth(name);
|
*
|
||||||
if (force || passwordSecurity.comparePassword(password, cachedAuth.getPassword(), player.getName())) {
|
* @param player the player
|
||||||
if (!dataSource.removeAuth(name)) {
|
* @param password the input password to check before unregister
|
||||||
|
*/
|
||||||
|
public void unregister(Player player, String password) {
|
||||||
|
final String name = player.getName();
|
||||||
|
final PlayerAuth cachedAuth = playerCache.getAuth(name);
|
||||||
|
if (passwordSecurity.comparePassword(password, cachedAuth.getPassword(), name)) {
|
||||||
|
if (dataSource.removeAuth(name)) {
|
||||||
|
performUnregister(name, player);
|
||||||
|
ConsoleLogger.info(name + " unregistered himself");
|
||||||
|
} else {
|
||||||
service.send(player, MessageKey.ERROR);
|
service.send(player, MessageKey.ERROR);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
service.send(player, MessageKey.WRONG_PASSWORD);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Unregisters a player.
|
||||||
|
*
|
||||||
|
* @param initiator the initiator of this process (nullable)
|
||||||
|
* @param name the name of the player
|
||||||
|
* @param player the according Player object (nullable)
|
||||||
|
*/
|
||||||
|
// We need to have the name and the player separate because Player might be null in this case:
|
||||||
|
// we might have some player in the database that has never been online on the server
|
||||||
|
public void adminUnregister(CommandSender initiator, String name, Player player) {
|
||||||
|
if (dataSource.removeAuth(name)) {
|
||||||
|
performUnregister(name, player);
|
||||||
|
if (initiator == null) {
|
||||||
|
ConsoleLogger.info(name + " was unregistered");
|
||||||
|
} else {
|
||||||
|
ConsoleLogger.info(name + " was unregistered by " + initiator.getName());
|
||||||
|
service.send(initiator, MessageKey.UNREGISTERED_SUCCESS);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private void performUnregister(String name, Player player) {
|
||||||
|
playerCache.removePlayer(name);
|
||||||
|
if (player == null || !player.isOnline()) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (service.getProperty(RegistrationSettings.FORCE)) {
|
if (service.getProperty(RegistrationSettings.FORCE)) {
|
||||||
teleportationService.teleportOnJoin(player);
|
teleportationService.teleportOnJoin(player);
|
||||||
player.saveData();
|
player.saveData();
|
||||||
playerCache.removePlayer(player.getName().toLowerCase());
|
|
||||||
if (!service.getProperty(HooksSettings.REGISTERED_GROUP).isEmpty()) {
|
|
||||||
service.setGroup(player, AuthGroupType.UNREGISTERED);
|
|
||||||
}
|
|
||||||
limboCache.deletePlayerData(player);
|
limboCache.deletePlayerData(player);
|
||||||
limboCache.addPlayerData(player);
|
limboCache.addPlayerData(player);
|
||||||
|
|
||||||
playerDataTaskManager.registerTimeoutTask(player);
|
playerDataTaskManager.registerTimeoutTask(player);
|
||||||
playerDataTaskManager.registerMessageTask(name, false);
|
playerDataTaskManager.registerMessageTask(name, false);
|
||||||
|
applyBlindEffect(player);
|
||||||
|
}
|
||||||
|
authGroupHandler.setGroup(player, AuthGroupType.UNREGISTERED);
|
||||||
service.send(player, MessageKey.UNREGISTERED_SUCCESS);
|
service.send(player, MessageKey.UNREGISTERED_SUCCESS);
|
||||||
ConsoleLogger.info(player.getName() + " unregistered himself");
|
|
||||||
return; // TODO ljacqu 20160612: Why return here? No blind effect? Player not removed from PlayerCache?
|
|
||||||
}
|
}
|
||||||
if (!service.getProperty(HooksSettings.UNREGISTERED_GROUP).isEmpty()) {
|
|
||||||
service.setGroup(player, AuthGroupType.UNREGISTERED);
|
|
||||||
}
|
|
||||||
playerCache.removePlayer(name);
|
|
||||||
|
|
||||||
// Apply blind effect
|
private void applyBlindEffect(final Player player) {
|
||||||
final int timeout = service.getProperty(RestrictionSettings.TIMEOUT) * TICKS_PER_SECOND;
|
|
||||||
if (service.getProperty(RegistrationSettings.APPLY_BLIND_EFFECT)) {
|
if (service.getProperty(RegistrationSettings.APPLY_BLIND_EFFECT)) {
|
||||||
bukktiService.runTask(new Runnable() {
|
final int timeout = service.getProperty(RestrictionSettings.TIMEOUT) * TICKS_PER_SECOND;
|
||||||
|
bukkitService.runTask(new Runnable() {
|
||||||
@Override
|
@Override
|
||||||
public void run() {
|
public void run() {
|
||||||
player.addPotionEffect(new PotionEffect(PotionEffectType.BLINDNESS, timeout, 2));
|
player.addPotionEffect(new PotionEffect(PotionEffectType.BLINDNESS, timeout, 2));
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
service.send(player, MessageKey.UNREGISTERED_SUCCESS);
|
|
||||||
ConsoleLogger.info(player.getName() + " unregistered himself");
|
|
||||||
} else {
|
|
||||||
service.send(player, MessageKey.WRONG_PASSWORD);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -67,6 +67,17 @@ public final class HashUtils {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Return whether the given hash starts like a BCrypt hash. Checking with this method
|
||||||
|
* beforehand prevents the BcryptService from throwing certain exceptions.
|
||||||
|
*
|
||||||
|
* @param hash The salt to verify
|
||||||
|
* @return True if the salt is valid, false otherwise
|
||||||
|
*/
|
||||||
|
public static boolean isValidBcryptHash(String hash) {
|
||||||
|
return hash.length() > 3 && hash.substring(0, 2).equals("$2");
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Hash the message with the given algorithm and return the hash in its hexadecimal notation.
|
* Hash the message with the given algorithm and return the hash in its hexadecimal notation.
|
||||||
*
|
*
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
package fr.xephi.authme.security.crypts;
|
package fr.xephi.authme.security.crypts;
|
||||||
|
|
||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
|
import fr.xephi.authme.security.HashUtils;
|
||||||
import fr.xephi.authme.security.crypts.description.HasSalt;
|
import fr.xephi.authme.security.crypts.description.HasSalt;
|
||||||
import fr.xephi.authme.security.crypts.description.Recommendation;
|
import fr.xephi.authme.security.crypts.description.Recommendation;
|
||||||
import fr.xephi.authme.security.crypts.description.SaltType;
|
import fr.xephi.authme.security.crypts.description.SaltType;
|
||||||
@ -36,7 +37,7 @@ public class BCRYPT implements EncryptionMethod {
|
|||||||
@Override
|
@Override
|
||||||
public boolean comparePassword(String password, HashedPassword hash, String name) {
|
public boolean comparePassword(String password, HashedPassword hash, String name) {
|
||||||
try {
|
try {
|
||||||
return hash.getHash().length() > 3 && BCryptService.checkpw(password, hash.getHash());
|
return HashUtils.isValidBcryptHash(hash.getHash()) && BCryptService.checkpw(password, hash.getHash());
|
||||||
} catch (IllegalArgumentException e) {
|
} catch (IllegalArgumentException e) {
|
||||||
ConsoleLogger.warning("Bcrypt checkpw() returned " + StringUtils.formatException(e));
|
ConsoleLogger.warning("Bcrypt checkpw() returned " + StringUtils.formatException(e));
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
package fr.xephi.authme.security.crypts;
|
package fr.xephi.authme.security.crypts;
|
||||||
|
|
||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
|
import fr.xephi.authme.security.HashUtils;
|
||||||
import fr.xephi.authme.security.RandomString;
|
import fr.xephi.authme.security.RandomString;
|
||||||
import fr.xephi.authme.security.crypts.description.HasSalt;
|
import fr.xephi.authme.security.crypts.description.HasSalt;
|
||||||
import fr.xephi.authme.security.crypts.description.Recommendation;
|
import fr.xephi.authme.security.crypts.description.Recommendation;
|
||||||
@ -34,7 +35,7 @@ public class IPB4 implements EncryptionMethod {
|
|||||||
@Override
|
@Override
|
||||||
public boolean comparePassword(String password, HashedPassword hash, String name) {
|
public boolean comparePassword(String password, HashedPassword hash, String name) {
|
||||||
try {
|
try {
|
||||||
return hash.getHash().length() > 3 && BCryptService.checkpw(password, hash.getHash());
|
return HashUtils.isValidBcryptHash(hash.getHash()) && BCryptService.checkpw(password, hash.getHash());
|
||||||
} catch (IllegalArgumentException e) {
|
} catch (IllegalArgumentException e) {
|
||||||
ConsoleLogger.warning("Bcrypt checkpw() returned " + StringUtils.formatException(e));
|
ConsoleLogger.warning("Bcrypt checkpw() returned " + StringUtils.formatException(e));
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
package fr.xephi.authme.security.crypts;
|
package fr.xephi.authme.security.crypts;
|
||||||
|
|
||||||
import fr.xephi.authme.ConsoleLogger;
|
import fr.xephi.authme.ConsoleLogger;
|
||||||
|
import fr.xephi.authme.security.HashUtils;
|
||||||
import fr.xephi.authme.util.StringUtils;
|
import fr.xephi.authme.util.StringUtils;
|
||||||
|
|
||||||
import java.util.regex.Matcher;
|
import java.util.regex.Matcher;
|
||||||
@ -29,7 +30,7 @@ public class XFBCRYPT implements EncryptionMethod {
|
|||||||
@Override
|
@Override
|
||||||
public boolean comparePassword(String password, HashedPassword hash, String salt) {
|
public boolean comparePassword(String password, HashedPassword hash, String salt) {
|
||||||
try {
|
try {
|
||||||
return hash.getHash().length() > 3 && BCryptService.checkpw(password, hash.getHash());
|
return HashUtils.isValidBcryptHash(hash.getHash()) && BCryptService.checkpw(password, hash.getHash());
|
||||||
} catch (IllegalArgumentException e) {
|
} catch (IllegalArgumentException e) {
|
||||||
ConsoleLogger.warning("XfBCrypt checkpw() returned " + StringUtils.formatException(e));
|
ConsoleLogger.warning("XfBCrypt checkpw() returned " + StringUtils.formatException(e));
|
||||||
}
|
}
|
||||||
|
@ -14,7 +14,6 @@ import org.bukkit.scheduler.BukkitRunnable;
|
|||||||
import org.bukkit.scheduler.BukkitScheduler;
|
import org.bukkit.scheduler.BukkitScheduler;
|
||||||
import org.bukkit.scheduler.BukkitTask;
|
import org.bukkit.scheduler.BukkitTask;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
|
||||||
import java.lang.reflect.InvocationTargetException;
|
import java.lang.reflect.InvocationTargetException;
|
||||||
import java.lang.reflect.Method;
|
import java.lang.reflect.Method;
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
@ -37,8 +36,7 @@ public class BukkitService {
|
|||||||
private final boolean getOnlinePlayersIsCollection;
|
private final boolean getOnlinePlayersIsCollection;
|
||||||
private Method getOnlinePlayers;
|
private Method getOnlinePlayers;
|
||||||
|
|
||||||
@Inject
|
public BukkitService(AuthMe authMe) {
|
||||||
BukkitService(AuthMe authMe) {
|
|
||||||
this.authMe = authMe;
|
this.authMe = authMe;
|
||||||
getOnlinePlayersIsCollection = initializeOnlinePlayersIsCollectionField();
|
getOnlinePlayersIsCollection = initializeOnlinePlayersIsCollectionField();
|
||||||
}
|
}
|
||||||
@ -113,17 +111,18 @@ public class BukkitService {
|
|||||||
* <b>Asynchronous tasks should never access any API in Bukkit. Great care
|
* <b>Asynchronous tasks should never access any API in Bukkit. Great care
|
||||||
* should be taken to assure the thread-safety of asynchronous tasks.</b>
|
* should be taken to assure the thread-safety of asynchronous tasks.</b>
|
||||||
* <p>
|
* <p>
|
||||||
* Returns a task that will run asynchronously after the specified number
|
* Returns a task that will repeatedly run asynchronously until cancelled,
|
||||||
* of server ticks.
|
* starting after the specified number of server ticks.
|
||||||
*
|
*
|
||||||
* @param task the task to be run
|
* @param task the task to be run
|
||||||
* @param delay the ticks to wait before running the task
|
* @param delay the ticks to wait before running the task for the first
|
||||||
|
* time
|
||||||
|
* @param period the ticks to wait between runs
|
||||||
* @return a BukkitTask that contains the id number
|
* @return a BukkitTask that contains the id number
|
||||||
* @throws IllegalArgumentException if plugin is null
|
|
||||||
* @throws IllegalArgumentException if task is null
|
* @throws IllegalArgumentException if task is null
|
||||||
*/
|
*/
|
||||||
public BukkitTask runTaskLaterAsynchronously(Runnable task, long delay) {
|
public BukkitTask runTaskTimerAsynchronously(Runnable task, long delay, long period) {
|
||||||
return Bukkit.getScheduler().runTaskLaterAsynchronously(authMe, task, delay);
|
return Bukkit.getScheduler().runTaskTimerAsynchronously(authMe, task, delay, period);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -13,7 +13,7 @@ import static java.lang.String.format;
|
|||||||
/**
|
/**
|
||||||
* File utilities.
|
* File utilities.
|
||||||
*/
|
*/
|
||||||
public class FileUtils {
|
public final class FileUtils {
|
||||||
|
|
||||||
private FileUtils() {
|
private FileUtils() {
|
||||||
}
|
}
|
||||||
|
@ -57,4 +57,20 @@ public final class Utils {
|
|||||||
public static String getPlayerIp(Player p) {
|
public static String getPlayerIp(Player p) {
|
||||||
return p.getAddress().getAddress().getHostAddress();
|
return p.getAddress().getAddress().getHostAddress();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns whether the class exists in the current class loader.
|
||||||
|
*
|
||||||
|
* @param className the class name to check
|
||||||
|
*
|
||||||
|
* @return true if the class is loaded, false otherwise
|
||||||
|
*/
|
||||||
|
public static boolean isClassLoaded(String className) {
|
||||||
|
try {
|
||||||
|
Class.forName(className);
|
||||||
|
return true;
|
||||||
|
} catch (ClassNotFoundException e) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -14,6 +14,7 @@ import fr.xephi.authme.process.login.ProcessSyncPlayerLogin;
|
|||||||
import fr.xephi.authme.security.PasswordSecurity;
|
import fr.xephi.authme.security.PasswordSecurity;
|
||||||
import fr.xephi.authme.settings.Settings;
|
import fr.xephi.authme.settings.Settings;
|
||||||
import fr.xephi.authme.task.purge.PurgeService;
|
import fr.xephi.authme.task.purge.PurgeService;
|
||||||
|
import fr.xephi.authme.util.BukkitService;
|
||||||
import org.bukkit.Bukkit;
|
import org.bukkit.Bukkit;
|
||||||
import org.bukkit.Server;
|
import org.bukkit.Server;
|
||||||
import org.bukkit.plugin.PluginDescriptionFile;
|
import org.bukkit.plugin.PluginDescriptionFile;
|
||||||
@ -102,6 +103,7 @@ public class AuthMeInitializationTest {
|
|||||||
injector.register(AuthMe.class, authMe);
|
injector.register(AuthMe.class, authMe);
|
||||||
injector.register(Settings.class, settings);
|
injector.register(Settings.class, settings);
|
||||||
injector.register(DataSource.class, mock(DataSource.class));
|
injector.register(DataSource.class, mock(DataSource.class));
|
||||||
|
injector.register(BukkitService.class, mock(BukkitService.class));
|
||||||
|
|
||||||
// when
|
// when
|
||||||
authMe.instantiateServices(injector);
|
authMe.instantiateServices(injector);
|
||||||
|
@ -33,7 +33,7 @@ import static org.mockito.Mockito.verifyZeroInteractions;
|
|||||||
@RunWith(MockitoJUnitRunner.class)
|
@RunWith(MockitoJUnitRunner.class)
|
||||||
public class TempbanManagerTest {
|
public class TempbanManagerTest {
|
||||||
|
|
||||||
private static final long DATE_TOLERANCE_MILLISECONDS = 100L;
|
private static final long DATE_TOLERANCE_MILLISECONDS = 200L;
|
||||||
|
|
||||||
@Mock
|
@Mock
|
||||||
private BukkitService bukkitService;
|
private BukkitService bukkitService;
|
||||||
|
@ -3,7 +3,10 @@ package fr.xephi.authme.command.executable.authme;
|
|||||||
import fr.xephi.authme.command.CommandService;
|
import fr.xephi.authme.command.CommandService;
|
||||||
import fr.xephi.authme.datasource.DataSource;
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
import fr.xephi.authme.output.MessageKey;
|
import fr.xephi.authme.output.MessageKey;
|
||||||
|
import fr.xephi.authme.process.Management;
|
||||||
|
import fr.xephi.authme.util.BukkitService;
|
||||||
import org.bukkit.command.CommandSender;
|
import org.bukkit.command.CommandSender;
|
||||||
|
import org.bukkit.entity.Player;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
import org.junit.runner.RunWith;
|
import org.junit.runner.RunWith;
|
||||||
import org.mockito.InjectMocks;
|
import org.mockito.InjectMocks;
|
||||||
@ -12,12 +15,10 @@ import org.mockito.runners.MockitoJUnitRunner;
|
|||||||
|
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.equalToIgnoringCase;
|
|
||||||
import static org.mockito.BDDMockito.given;
|
import static org.mockito.BDDMockito.given;
|
||||||
import static org.mockito.Matchers.argThat;
|
|
||||||
import static org.mockito.Mockito.mock;
|
import static org.mockito.Mockito.mock;
|
||||||
|
import static org.mockito.Mockito.only;
|
||||||
import static org.mockito.Mockito.verify;
|
import static org.mockito.Mockito.verify;
|
||||||
import static org.mockito.Mockito.verifyNoMoreInteractions;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Test for {@link UnregisterAdminCommand}.
|
* Test for {@link UnregisterAdminCommand}.
|
||||||
@ -34,6 +35,12 @@ public class UnregisterAdminCommandTest {
|
|||||||
@Mock
|
@Mock
|
||||||
private CommandService commandService;
|
private CommandService commandService;
|
||||||
|
|
||||||
|
@Mock
|
||||||
|
private BukkitService bukkitService;
|
||||||
|
|
||||||
|
@Mock
|
||||||
|
private Management management;
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void shouldHandleUnknownPlayer() {
|
public void shouldHandleUnknownPlayer() {
|
||||||
// given
|
// given
|
||||||
@ -45,27 +52,45 @@ public class UnregisterAdminCommandTest {
|
|||||||
command.executeCommand(sender, Collections.singletonList(user));
|
command.executeCommand(sender, Collections.singletonList(user));
|
||||||
|
|
||||||
// then
|
// then
|
||||||
verify(dataSource).isAuthAvailable(user);
|
verify(dataSource, only()).isAuthAvailable(user);
|
||||||
verifyNoMoreInteractions(dataSource);
|
|
||||||
verify(commandService).send(sender, MessageKey.UNKNOWN_USER);
|
verify(commandService).send(sender, MessageKey.UNKNOWN_USER);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void shouldHandleDatabaseError() {
|
public void shouldInvokeUnregisterProcess() {
|
||||||
// given
|
// given
|
||||||
String user = "personaNonGrata";
|
String user = "personaNonGrata";
|
||||||
given(dataSource.isAuthAvailable(argThat(equalToIgnoringCase(user)))).willReturn(true);
|
given(dataSource.isAuthAvailable(user)).willReturn(true);
|
||||||
given(dataSource.removeAuth(argThat(equalToIgnoringCase(user)))).willReturn(false);
|
given(dataSource.removeAuth(user)).willReturn(false);
|
||||||
|
Player player = mock(Player.class);
|
||||||
|
given(bukkitService.getPlayerExact(user)).willReturn(player);
|
||||||
CommandSender sender = mock(CommandSender.class);
|
CommandSender sender = mock(CommandSender.class);
|
||||||
|
|
||||||
// when
|
// when
|
||||||
command.executeCommand(sender, Collections.singletonList(user));
|
command.executeCommand(sender, Collections.singletonList(user));
|
||||||
|
|
||||||
// then
|
// then
|
||||||
verify(dataSource).isAuthAvailable(argThat(equalToIgnoringCase(user)));
|
verify(dataSource, only()).isAuthAvailable(user);
|
||||||
verify(dataSource).removeAuth(argThat(equalToIgnoringCase(user)));
|
verify(bukkitService).getPlayerExact(user);
|
||||||
verifyNoMoreInteractions(dataSource);
|
verify(management).performUnregisterByAdmin(sender, user, player);
|
||||||
verify(commandService).send(sender, MessageKey.ERROR);
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void shouldInvokeUnregisterProcessWithNullPlayer() {
|
||||||
|
// given
|
||||||
|
String user = "personaNonGrata";
|
||||||
|
given(dataSource.isAuthAvailable(user)).willReturn(true);
|
||||||
|
given(dataSource.removeAuth(user)).willReturn(false);
|
||||||
|
given(bukkitService.getPlayerExact(user)).willReturn(null);
|
||||||
|
CommandSender sender = mock(CommandSender.class);
|
||||||
|
|
||||||
|
// when
|
||||||
|
command.executeCommand(sender, Collections.singletonList(user));
|
||||||
|
|
||||||
|
// then
|
||||||
|
verify(dataSource, only()).isAuthAvailable(user);
|
||||||
|
verify(bukkitService).getPlayerExact(user);
|
||||||
|
verify(management).performUnregisterByAdmin(sender, user, null);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@ -68,7 +68,7 @@ public class UnregisterCommandTest {
|
|||||||
|
|
||||||
// then
|
// then
|
||||||
verify(playerCache).isAuthenticated(name);
|
verify(playerCache).isAuthenticated(name);
|
||||||
verify(management).performUnregister(player, password, false);
|
verify(management).performUnregister(player, password);
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@ -21,7 +21,7 @@ import static org.junit.Assert.fail;
|
|||||||
public final class ListenerConsistencyTest {
|
public final class ListenerConsistencyTest {
|
||||||
|
|
||||||
private static final Class<?>[] LISTENERS = { BlockListener.class, EntityListener.class,
|
private static final Class<?>[] LISTENERS = { BlockListener.class, EntityListener.class,
|
||||||
PlayerListener.class, PlayerListener16.class, PlayerListener18.class,
|
PlayerListener.class, PlayerListener16.class, PlayerListener18.class, PlayerListener19.class,
|
||||||
ServerListener.class };
|
ServerListener.class };
|
||||||
|
|
||||||
private static final Set<String> CANCELED_EXCEPTIONS = Sets.newHashSet(
|
private static final Set<String> CANCELED_EXCEPTIONS = Sets.newHashSet(
|
||||||
|
@ -0,0 +1,121 @@
|
|||||||
|
package fr.xephi.authme.process.unregister;
|
||||||
|
|
||||||
|
import fr.xephi.authme.TestHelper;
|
||||||
|
import fr.xephi.authme.cache.auth.PlayerAuth;
|
||||||
|
import fr.xephi.authme.cache.auth.PlayerCache;
|
||||||
|
import fr.xephi.authme.cache.limbo.LimboCache;
|
||||||
|
import fr.xephi.authme.datasource.DataSource;
|
||||||
|
import fr.xephi.authme.output.MessageKey;
|
||||||
|
import fr.xephi.authme.permission.AuthGroupHandler;
|
||||||
|
import fr.xephi.authme.permission.AuthGroupType;
|
||||||
|
import fr.xephi.authme.process.ProcessService;
|
||||||
|
import fr.xephi.authme.security.PasswordSecurity;
|
||||||
|
import fr.xephi.authme.security.crypts.HashedPassword;
|
||||||
|
import fr.xephi.authme.settings.properties.RegistrationSettings;
|
||||||
|
import fr.xephi.authme.settings.properties.RestrictionSettings;
|
||||||
|
import fr.xephi.authme.task.PlayerDataTaskManager;
|
||||||
|
import fr.xephi.authme.util.BukkitService;
|
||||||
|
import fr.xephi.authme.util.TeleportationService;
|
||||||
|
import org.bukkit.entity.Player;
|
||||||
|
import org.junit.BeforeClass;
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.junit.runner.RunWith;
|
||||||
|
import org.mockito.InjectMocks;
|
||||||
|
import org.mockito.Mock;
|
||||||
|
import org.mockito.runners.MockitoJUnitRunner;
|
||||||
|
|
||||||
|
import static org.mockito.BDDMockito.given;
|
||||||
|
import static org.mockito.Matchers.any;
|
||||||
|
import static org.mockito.Mockito.mock;
|
||||||
|
import static org.mockito.Mockito.only;
|
||||||
|
import static org.mockito.Mockito.verify;
|
||||||
|
import static org.mockito.Mockito.verifyZeroInteractions;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Test for {@link AsynchronousUnregister}.
|
||||||
|
*/
|
||||||
|
@RunWith(MockitoJUnitRunner.class)
|
||||||
|
public class AsynchronousUnregisterTest {
|
||||||
|
|
||||||
|
@InjectMocks
|
||||||
|
private AsynchronousUnregister asynchronousUnregister;
|
||||||
|
|
||||||
|
@Mock
|
||||||
|
private DataSource dataSource;
|
||||||
|
@Mock
|
||||||
|
private ProcessService service;
|
||||||
|
@Mock
|
||||||
|
private PasswordSecurity passwordSecurity;
|
||||||
|
@Mock
|
||||||
|
private PlayerCache playerCache;
|
||||||
|
@Mock
|
||||||
|
private BukkitService bukkitService;
|
||||||
|
@Mock
|
||||||
|
private LimboCache limboCache;
|
||||||
|
@Mock
|
||||||
|
private PlayerDataTaskManager playerDataTaskManager;
|
||||||
|
@Mock
|
||||||
|
private TeleportationService teleportationService;
|
||||||
|
@Mock
|
||||||
|
private AuthGroupHandler authGroupHandler;
|
||||||
|
|
||||||
|
@BeforeClass
|
||||||
|
public static void initLogger() {
|
||||||
|
TestHelper.setupLogger();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void shouldRejectWrongPassword() {
|
||||||
|
// given
|
||||||
|
Player player = mock(Player.class);
|
||||||
|
String name = "Bobby";
|
||||||
|
given(player.getName()).willReturn(name);
|
||||||
|
PlayerAuth auth = mock(PlayerAuth.class);
|
||||||
|
given(playerCache.getAuth(name)).willReturn(auth);
|
||||||
|
HashedPassword password = new HashedPassword("password", "in_auth_obj");
|
||||||
|
given(auth.getPassword()).willReturn(password);
|
||||||
|
String userPassword = "pass";
|
||||||
|
given(passwordSecurity.comparePassword(userPassword, password, name)).willReturn(false);
|
||||||
|
|
||||||
|
// when
|
||||||
|
asynchronousUnregister.unregister(player, userPassword);
|
||||||
|
|
||||||
|
// then
|
||||||
|
verify(service).send(player, MessageKey.WRONG_PASSWORD);
|
||||||
|
verify(passwordSecurity).comparePassword(userPassword, password, name);
|
||||||
|
verifyZeroInteractions(dataSource, playerDataTaskManager, limboCache, authGroupHandler, teleportationService);
|
||||||
|
verify(player, only()).getName();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void shouldPerformUnregister() {
|
||||||
|
// given
|
||||||
|
Player player = mock(Player.class);
|
||||||
|
String name = "Frank21";
|
||||||
|
given(player.getName()).willReturn(name);
|
||||||
|
given(player.isOnline()).willReturn(true);
|
||||||
|
PlayerAuth auth = mock(PlayerAuth.class);
|
||||||
|
given(playerCache.getAuth(name)).willReturn(auth);
|
||||||
|
HashedPassword password = new HashedPassword("password", "in_auth_obj");
|
||||||
|
given(auth.getPassword()).willReturn(password);
|
||||||
|
String userPassword = "pass";
|
||||||
|
given(passwordSecurity.comparePassword(userPassword, password, name)).willReturn(true);
|
||||||
|
given(dataSource.removeAuth(name)).willReturn(true);
|
||||||
|
given(service.getProperty(RegistrationSettings.FORCE)).willReturn(true);
|
||||||
|
given(service.getProperty(RegistrationSettings.APPLY_BLIND_EFFECT)).willReturn(true);
|
||||||
|
given(service.getProperty(RestrictionSettings.TIMEOUT)).willReturn(12);
|
||||||
|
|
||||||
|
// when
|
||||||
|
asynchronousUnregister.unregister(player, userPassword);
|
||||||
|
|
||||||
|
// then
|
||||||
|
verify(service).send(player, MessageKey.UNREGISTERED_SUCCESS);
|
||||||
|
verify(passwordSecurity).comparePassword(userPassword, password, name);
|
||||||
|
verify(dataSource).removeAuth(name);
|
||||||
|
verify(playerCache).removePlayer(name);
|
||||||
|
verify(teleportationService).teleportOnJoin(player);
|
||||||
|
verify(authGroupHandler).setGroup(player, AuthGroupType.UNREGISTERED);
|
||||||
|
verify(bukkitService).runTask(any(Runnable.class));
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -113,4 +113,14 @@ public class HashUtilsTest {
|
|||||||
assertThat(digest.getAlgorithm(), equalTo("MD5"));
|
assertThat(digest.getAlgorithm(), equalTo("MD5"));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void shouldCheckForValidBcryptHashStart() {
|
||||||
|
// given / when / then
|
||||||
|
assertThat(HashUtils.isValidBcryptHash(""), equalTo(false));
|
||||||
|
assertThat(HashUtils.isValidBcryptHash("$2afsdaf"), equalTo(true));
|
||||||
|
assertThat(HashUtils.isValidBcryptHash("$2"), equalTo(false));
|
||||||
|
assertThat(HashUtils.isValidBcryptHash("$2aead234adef"), equalTo(true));
|
||||||
|
assertThat(HashUtils.isValidBcryptHash("#2ae5fc78"), equalTo(false));
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@ -96,4 +96,11 @@ public class UtilsTest {
|
|||||||
// given / when / then
|
// given / when / then
|
||||||
TestHelper.validateHasOnlyPrivateEmptyConstructor(Utils.class);
|
TestHelper.validateHasOnlyPrivateEmptyConstructor(Utils.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void shouldCheckIfClassIsLoaded() {
|
||||||
|
// given / when / then
|
||||||
|
assertThat(Utils.isClassLoaded("org.bukkit.event.player.PlayerFishEvent"), equalTo(true));
|
||||||
|
assertThat(Utils.isClassLoaded("com.someclass.doesnot.exist"), equalTo(false));
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user