From 384059607e17e2704a137090facd91e460d86674 Mon Sep 17 00:00:00 2001 From: Zach Brown Date: Mon, 18 Jun 2018 16:27:33 -0500 Subject: [PATCH] Tie PlayerList#moveToWorld safety to existing config Also renames patch file to better express what it's doing. It is presumed that those using this config option intend for suffocation checks to be disabled in all instances. In doing so, they inherently assume the advantages and issues associated with removing said safety check. If the community expresses a desire for more specific options regarding the handling of this safety feature, we can investigate providing them. Fixes GH-1149 --- ...le-inter-world-teleportation-safety.patch} | 34 ++++++++++++++----- 1 file changed, 26 insertions(+), 8 deletions(-) rename Spigot-Server-Patches/{0059-Fix-inter-world-teleportation-glitches.patch => 0059-Configurable-inter-world-teleportation-safety.patch} (51%) diff --git a/Spigot-Server-Patches/0059-Fix-inter-world-teleportation-glitches.patch b/Spigot-Server-Patches/0059-Configurable-inter-world-teleportation-safety.patch similarity index 51% rename from Spigot-Server-Patches/0059-Fix-inter-world-teleportation-glitches.patch rename to Spigot-Server-Patches/0059-Configurable-inter-world-teleportation-safety.patch index 80b55497ef..5ae94f26a2 100644 --- a/Spigot-Server-Patches/0059-Fix-inter-world-teleportation-glitches.patch +++ b/Spigot-Server-Patches/0059-Configurable-inter-world-teleportation-safety.patch @@ -1,17 +1,22 @@ -From fcbd68f84a9637e4bb730429bd02ea4c4387c655 Mon Sep 17 00:00:00 2001 +From 52a843bdcf3007d3a162688c19e81226dd77bf9e Mon Sep 17 00:00:00 2001 From: Sudzzy Date: Thu, 3 Mar 2016 02:50:31 -0600 -Subject: [PATCH] Fix inter-world teleportation glitches +Subject: [PATCH] Configurable inter-world teleportation safety -People are able to abuse the way Bukkit handles teleportation across worlds since it provides a built in teleportation safety check. +People are able to abuse the way Bukkit handles teleportation across worlds since it provides a built in teleportation +safety check. -To abuse the safety check, players are required to get into a location deemed unsafe by Bukkit e.g. be within a chest or door block. While they are in this block, they accept a teleport request from a player within a different world. Once the player teleports, Minecraft will recursively search upwards for a safe location, this could eventually land within a player's skybase. +To abuse the safety check, players are required to get into a location deemed unsafe by Bukkit e.g. be within a chest +or door block. While they are in this block, they accept a teleport request from a player within a different world. Once +the player teleports, Minecraft will recursively search upwards for a safe location, this could eventually land within a +player's skybase. Example setup to perform the glitch: http://puu.sh/ng3PC/cf072dcbdb.png -The wanted destination was on top of the emerald block however the player ended on top of the diamond block. This only is the case if the player is teleporting between worlds. +The wanted destination was on top of the emerald block however the player ended on top of the diamond block. +This only is the case if the player is teleporting between worlds. diff --git a/src/main/java/com/destroystokyo/paper/PaperWorldConfig.java b/src/main/java/com/destroystokyo/paper/PaperWorldConfig.java -index 38ccabc0..b241c038 100644 +index 38ccabc0d..b241c0380 100644 --- a/src/main/java/com/destroystokyo/paper/PaperWorldConfig.java +++ b/src/main/java/com/destroystokyo/paper/PaperWorldConfig.java @@ -237,4 +237,9 @@ public class PaperWorldConfig { @@ -24,8 +29,21 @@ index 38ccabc0..b241c038 100644 + disableTeleportationSuffocationCheck = getBoolean("disable-teleportation-suffocation-check", false); + } } +diff --git a/src/main/java/net/minecraft/server/PlayerList.java b/src/main/java/net/minecraft/server/PlayerList.java +index 536534d2e..bf7aaebd6 100644 +--- a/src/main/java/net/minecraft/server/PlayerList.java ++++ b/src/main/java/net/minecraft/server/PlayerList.java +@@ -799,7 +799,7 @@ public abstract class PlayerList { + exitWorld.getTravelAgent().adjustExit(entityplayer, exit, velocity); + + entityplayer.worldChangeInvuln = true; // CraftBukkit - Set teleport invulnerability only if player changing worlds +- this.moveToWorld(entityplayer, exitWorld.dimension, true, exit, true); // SPIGOT-3864 ++ this.moveToWorld(entityplayer, exitWorld.dimension, true, exit, !exitWorld.paperConfig.disableTeleportationSuffocationCheck); // SPIGOT-3864 // Paper GH-1149 - Tie suffocation check to config option + if (entityplayer.motX != velocity.getX() || entityplayer.motY != velocity.getY() || entityplayer.motZ != velocity.getZ()) { + entityplayer.getBukkitEntity().setVelocity(velocity); + } diff --git a/src/main/java/org/bukkit/craftbukkit/entity/CraftPlayer.java b/src/main/java/org/bukkit/craftbukkit/entity/CraftPlayer.java -index c14100ac..6a43f567 100644 +index c14100ac6..6a43f5674 100644 --- a/src/main/java/org/bukkit/craftbukkit/entity/CraftPlayer.java +++ b/src/main/java/org/bukkit/craftbukkit/entity/CraftPlayer.java @@ -614,7 +614,8 @@ public class CraftPlayer extends CraftHumanEntity implements Player { @@ -39,5 +57,5 @@ index c14100ac..6a43f567 100644 return true; } -- -2.17.0 +2.17.1