/*
* Copyright (C) 2021 - 2022 Elytrium
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see .
*/
package net.elytrium.limboauth.handler;
import at.favre.lib.crypto.bcrypt.BCrypt;
import com.j256.ormlite.dao.Dao;
import com.velocitypowered.api.proxy.Player;
import dev.samstevens.totp.code.CodeVerifier;
import dev.samstevens.totp.code.DefaultCodeGenerator;
import dev.samstevens.totp.code.DefaultCodeVerifier;
import dev.samstevens.totp.time.SystemTimeProvider;
import java.nio.charset.StandardCharsets;
import java.sql.SQLException;
import java.text.MessageFormat;
import java.util.List;
import java.util.Locale;
import java.util.UUID;
import java.util.concurrent.ScheduledFuture;
import java.util.concurrent.TimeUnit;
import java.util.stream.Collectors;
import net.elytrium.java.commons.mc.serialization.Serializer;
import net.elytrium.limboapi.api.Limbo;
import net.elytrium.limboapi.api.LimboSessionHandler;
import net.elytrium.limboapi.api.player.LimboPlayer;
import net.elytrium.limboauth.LimboAuth;
import net.elytrium.limboauth.Settings;
import net.elytrium.limboauth.event.PostAuthorizationEvent;
import net.elytrium.limboauth.event.PostRegisterEvent;
import net.elytrium.limboauth.event.TaskEvent;
import net.elytrium.limboauth.migration.MigrationHash;
import net.elytrium.limboauth.model.RegisteredPlayer;
import net.kyori.adventure.audience.MessageType;
import net.kyori.adventure.bossbar.BossBar;
import net.kyori.adventure.text.Component;
import net.kyori.adventure.title.Title;
import org.checkerframework.checker.nullness.qual.Nullable;
public class AuthSessionHandler implements LimboSessionHandler {
private static final CodeVerifier TOTP_CODE_VERIFIER = new DefaultCodeVerifier(new DefaultCodeGenerator(), new SystemTimeProvider());
private static final BCrypt.Verifyer HASH_VERIFIER = BCrypt.verifyer();
private static final BCrypt.Hasher HASHER = BCrypt.withDefaults();
private static BossBar.Color bossbarColor;
private static BossBar.Overlay bossbarOverlay;
private static Component ipLimitKick;
private static Component databaseErrorKick;
private static Component wrongNicknameCaseKick;
private static Component timesUp;
private static Component registerSuccessful;
@Nullable
private static Title registerSuccessfulTitle;
private static Component[] loginWrongPassword;
private static Component loginWrongPasswordKick;
private static Component totp;
@Nullable
private static Title totpTitle;
private static Component register;
@Nullable
private static Title registerTitle;
private static Component[] login;
@Nullable
private static Title loginTitle;
private static Component registerDifferentPasswords;
private static Component registerPasswordTooLong;
private static Component registerPasswordTooShort;
private static Component registerPasswordUnsafe;
private static Component loginSuccessful;
@Nullable
private static Title loginSuccessfulTitle;
@Nullable
private static MigrationHash migrationHash;
private final Dao playerDao;
private final Player proxyPlayer;
private final LimboAuth plugin;
private final long joinTime = System.currentTimeMillis();
private final BossBar bossBar = BossBar.bossBar(
Component.empty(),
1.0F,
bossbarColor,
bossbarOverlay
);
@Nullable
private RegisteredPlayer playerInfo;
private ScheduledFuture> authMainTask;
private LimboPlayer player;
private String ip;
private int attempts = Settings.IMP.MAIN.LOGIN_ATTEMPTS;
private boolean totpState;
public AuthSessionHandler(Dao playerDao, Player proxyPlayer, LimboAuth plugin, @Nullable RegisteredPlayer playerInfo) {
this.playerDao = playerDao;
this.proxyPlayer = proxyPlayer;
this.plugin = plugin;
this.playerInfo = playerInfo;
}
@Override
public void onSpawn(Limbo server, LimboPlayer player) {
this.player = player;
this.ip = this.proxyPlayer.getRemoteAddress().getAddress().getHostAddress();
this.player.disableFalling();
if (this.playerInfo == null) {
try {
List alreadyRegistered = this.playerDao.queryForEq("IP", this.ip);
if (alreadyRegistered != null) {
int sizeOfValidRegistrations = alreadyRegistered.size();
if (Settings.IMP.MAIN.IP_LIMIT_VALID_TIME > 0) {
for (RegisteredPlayer registeredPlayer : alreadyRegistered.stream()
.filter(registeredPlayer -> registeredPlayer.getRegDate() < System.currentTimeMillis() - Settings.IMP.MAIN.IP_LIMIT_VALID_TIME)
.collect(Collectors.toList())) {
registeredPlayer.setIP("");
this.playerDao.update(registeredPlayer);
--sizeOfValidRegistrations;
}
}
if (sizeOfValidRegistrations >= Settings.IMP.MAIN.IP_LIMIT_REGISTRATIONS) {
this.proxyPlayer.disconnect(ipLimitKick);
return;
}
}
} catch (SQLException e) {
e.printStackTrace();
this.proxyPlayer.disconnect(databaseErrorKick);
return;
}
} else {
if (!this.proxyPlayer.getUsername().equals(this.playerInfo.getNickname())) {
this.proxyPlayer.disconnect(wrongNicknameCaseKick);
return;
}
}
boolean bossBarEnabled = Settings.IMP.MAIN.ENABLE_BOSSBAR;
Serializer serializer = LimboAuth.getSerializer();
int authTime = Settings.IMP.MAIN.AUTH_TIME;
float multiplier = 1000.0F / authTime;
this.authMainTask = this.player.getScheduledExecutor().scheduleWithFixedDelay(() -> {
if (System.currentTimeMillis() - this.joinTime > authTime) {
this.proxyPlayer.disconnect(timesUp);
} else {
if (bossBarEnabled) {
float secondsLeft = (authTime - (System.currentTimeMillis() - this.joinTime)) / 1000.0F;
this.bossBar.name(serializer.deserialize(MessageFormat.format(Settings.IMP.MAIN.STRINGS.BOSSBAR, (int) secondsLeft)));
// It's possible, that the progress value can overcome 1, e.g. 1.0000001.
this.bossBar.progress(Math.min(1.0F, secondsLeft * multiplier));
}
}
}, 0, 1, TimeUnit.SECONDS);
if (bossBarEnabled) {
this.proxyPlayer.showBossBar(this.bossBar);
}
this.sendMessage(true);
}
@Override
public void onChat(String message) {
String[] args = message.split(" ");
if (args.length != 0 && this.checkArgsLength(args.length)) {
Command command = Command.parse(args[0]);
if (command == Command.REGISTER && !this.totpState && this.playerInfo == null) {
if (this.checkPasswordsRepeat(args) && this.checkPasswordLength(args[1]) && this.checkPasswordStrength(args[1])) {
String username = this.proxyPlayer.getUsername();
RegisteredPlayer registeredPlayer = new RegisteredPlayer(
username,
username.toLowerCase(Locale.ROOT),
genHash(args[1]),
this.ip,
"",
System.currentTimeMillis(),
this.proxyPlayer.getUniqueId().toString(),
""
);
try {
this.playerDao.create(registeredPlayer);
this.playerInfo = registeredPlayer;
} catch (SQLException e) {
e.printStackTrace();
this.proxyPlayer.disconnect(databaseErrorKick);
}
this.proxyPlayer.sendMessage(registerSuccessful, MessageType.SYSTEM);
if (registerSuccessfulTitle != null) {
this.proxyPlayer.showTitle(registerSuccessfulTitle);
}
this.plugin.getServer().getEventManager()
.fire(new PostRegisterEvent(this::finishAuth, this.player, this.playerInfo))
.thenAcceptAsync(this::finishAuth);
}
// {@code return} placed here (not above), because
// AuthSessionHandler#checkPasswordsRepeat, AuthSessionHandler#checkPasswordLength, and AuthSessionHandler#checkPasswordStrength methods are
// invoking Player#sendMessage that sends its own message in case if the return value is false.
// If we don't place {@code return} here, an another message (AuthSessionHandler#sendMessage) will be sent.
return;
} else if (command == Command.LOGIN && !this.totpState && this.playerInfo != null) {
if (args[1].length() > 0 && checkPassword(args[1], this.playerInfo, this.playerDao)) {
if (this.playerInfo.getTotpToken().isEmpty()) {
this.finishLogin();
} else {
this.totpState = true;
this.sendMessage(true);
}
} else if (--this.attempts != 0) {
this.proxyPlayer.sendMessage(loginWrongPassword[this.attempts - 1], MessageType.SYSTEM);
} else {
this.proxyPlayer.disconnect(loginWrongPasswordKick);
}
return;
} else if (command == Command.TOTP && this.totpState && this.playerInfo != null) {
if (TOTP_CODE_VERIFIER.isValidCode(this.playerInfo.getTotpToken(), args[1])) {
this.finishLogin();
return;
}
}
}
this.sendMessage(false);
}
@Override
public void onDisconnect() {
if (this.authMainTask != null) {
this.authMainTask.cancel(true);
}
this.proxyPlayer.hideBossBar(this.bossBar);
}
private void sendMessage(boolean sendTitle) {
if (this.totpState) {
this.proxyPlayer.sendMessage(totp, MessageType.SYSTEM);
if (sendTitle && totpTitle != null) {
this.proxyPlayer.showTitle(totpTitle);
}
} else if (this.playerInfo == null) {
this.proxyPlayer.sendMessage(register, MessageType.SYSTEM);
if (sendTitle && registerTitle != null) {
this.proxyPlayer.showTitle(registerTitle);
}
} else {
this.proxyPlayer.sendMessage(login[this.attempts - 1], MessageType.SYSTEM);
if (sendTitle && loginTitle != null) {
this.proxyPlayer.showTitle(loginTitle);
}
}
}
private boolean checkArgsLength(int argsLength) {
if (this.playerInfo == null && Settings.IMP.MAIN.REGISTER_NEED_REPEAT_PASSWORD) {
return argsLength == 3;
} else {
return argsLength == 2;
}
}
private boolean checkPasswordsRepeat(String[] args) {
if (!Settings.IMP.MAIN.REGISTER_NEED_REPEAT_PASSWORD || args[1].equals(args[2])) {
return true;
} else {
this.proxyPlayer.sendMessage(registerDifferentPasswords, MessageType.SYSTEM);
return false;
}
}
private boolean checkPasswordLength(String password) {
int length = password.length();
if (length > Settings.IMP.MAIN.MAX_PASSWORD_LENGTH) {
this.proxyPlayer.sendMessage(registerPasswordTooLong, MessageType.SYSTEM);
return false;
} else if (length < Settings.IMP.MAIN.MIN_PASSWORD_LENGTH) {
this.proxyPlayer.sendMessage(registerPasswordTooShort, MessageType.SYSTEM);
return false;
} else {
return true;
}
}
private boolean checkPasswordStrength(String password) {
if (Settings.IMP.MAIN.CHECK_PASSWORD_STRENGTH && this.plugin.getUnsafePasswords().contains(password)) {
this.proxyPlayer.sendMessage(registerPasswordUnsafe, MessageType.SYSTEM);
return false;
} else {
return true;
}
}
private void finishLogin() {
this.proxyPlayer.sendMessage(loginSuccessful, MessageType.SYSTEM);
if (loginSuccessfulTitle != null) {
this.proxyPlayer.showTitle(loginSuccessfulTitle);
}
this.plugin.getServer().getEventManager()
.fire(new PostAuthorizationEvent(this::finishAuth, this.player, this.playerInfo))
.thenAcceptAsync(this::finishAuth);
}
private void finishAuth(TaskEvent event) {
if (Settings.IMP.MAIN.CRACKED_TITLE_SETTINGS.CLEAR_AFTER_LOGIN) {
this.proxyPlayer.clearTitle();
}
if (event.getResult() == TaskEvent.Result.CANCEL) {
this.proxyPlayer.disconnect(event.getReason());
return;
} else if (event.getResult() == TaskEvent.Result.WAIT) {
return;
}
this.plugin.cacheAuthUser(this.proxyPlayer);
this.player.disconnect();
}
public static void reload() {
Serializer serializer = LimboAuth.getSerializer();
bossbarColor = BossBar.Color.valueOf(Settings.IMP.MAIN.BOSSBAR_COLOR.toUpperCase(Locale.ROOT));
bossbarOverlay = BossBar.Overlay.valueOf(Settings.IMP.MAIN.BOSSBAR_OVERLAY.toUpperCase(Locale.ROOT));
ipLimitKick = serializer.deserialize(Settings.IMP.MAIN.STRINGS.IP_LIMIT_KICK);
databaseErrorKick = serializer.deserialize(Settings.IMP.MAIN.STRINGS.DATABASE_ERROR_KICK);
wrongNicknameCaseKick = serializer.deserialize(Settings.IMP.MAIN.STRINGS.WRONG_NICKNAME_CASE_KICK);
timesUp = serializer.deserialize(Settings.IMP.MAIN.STRINGS.TIMES_UP);
registerSuccessful = serializer.deserialize(Settings.IMP.MAIN.STRINGS.REGISTER_SUCCESSFUL);
if (Settings.IMP.MAIN.STRINGS.REGISTER_SUCCESSFUL_TITLE.isEmpty() && Settings.IMP.MAIN.STRINGS.REGISTER_SUCCESSFUL_SUBTITLE.isEmpty()) {
registerSuccessfulTitle = null;
} else {
registerSuccessfulTitle = Title.title(
serializer.deserialize(Settings.IMP.MAIN.STRINGS.REGISTER_SUCCESSFUL_TITLE),
serializer.deserialize(Settings.IMP.MAIN.STRINGS.REGISTER_SUCCESSFUL_SUBTITLE),
Settings.IMP.MAIN.CRACKED_TITLE_SETTINGS.toTimes()
);
}
int loginAttempts = Settings.IMP.MAIN.LOGIN_ATTEMPTS;
loginWrongPassword = new Component[loginAttempts];
for (int i = 0; i < loginAttempts; ++i) {
loginWrongPassword[i] = serializer.deserialize(MessageFormat.format(Settings.IMP.MAIN.STRINGS.LOGIN_WRONG_PASSWORD, i + 1));
}
loginWrongPasswordKick = serializer.deserialize(Settings.IMP.MAIN.STRINGS.LOGIN_WRONG_PASSWORD_KICK);
totp = serializer.deserialize(Settings.IMP.MAIN.STRINGS.TOTP);
if (Settings.IMP.MAIN.STRINGS.TOTP_TITLE.isEmpty() && Settings.IMP.MAIN.STRINGS.TOTP_SUBTITLE.isEmpty()) {
totpTitle = null;
} else {
totpTitle = Title.title(
serializer.deserialize(Settings.IMP.MAIN.STRINGS.TOTP_TITLE),
serializer.deserialize(Settings.IMP.MAIN.STRINGS.TOTP_SUBTITLE),
Settings.IMP.MAIN.CRACKED_TITLE_SETTINGS.toTimes()
);
}
register = serializer.deserialize(Settings.IMP.MAIN.STRINGS.REGISTER);
if (Settings.IMP.MAIN.STRINGS.REGISTER_TITLE.isEmpty() && Settings.IMP.MAIN.STRINGS.REGISTER_SUBTITLE.isEmpty()) {
registerTitle = null;
} else {
registerTitle = Title.title(
serializer.deserialize(Settings.IMP.MAIN.STRINGS.REGISTER_TITLE),
serializer.deserialize(Settings.IMP.MAIN.STRINGS.REGISTER_SUBTITLE),
Settings.IMP.MAIN.CRACKED_TITLE_SETTINGS.toTimes()
);
}
login = new Component[loginAttempts];
for (int i = 0; i < loginAttempts; ++i) {
login[i] = serializer.deserialize(MessageFormat.format(Settings.IMP.MAIN.STRINGS.LOGIN, i + 1));
}
if (Settings.IMP.MAIN.STRINGS.LOGIN_TITLE.isEmpty() && Settings.IMP.MAIN.STRINGS.LOGIN_SUBTITLE.isEmpty()) {
loginTitle = null;
} else {
loginTitle = Title.title(
serializer.deserialize(MessageFormat.format(Settings.IMP.MAIN.STRINGS.LOGIN_TITLE, loginAttempts)),
serializer.deserialize(MessageFormat.format(Settings.IMP.MAIN.STRINGS.LOGIN_SUBTITLE, loginAttempts)),
Settings.IMP.MAIN.CRACKED_TITLE_SETTINGS.toTimes()
);
}
registerDifferentPasswords = serializer.deserialize(Settings.IMP.MAIN.STRINGS.REGISTER_DIFFERENT_PASSWORDS);
registerPasswordTooLong = serializer.deserialize(Settings.IMP.MAIN.STRINGS.REGISTER_PASSWORD_TOO_LONG);
registerPasswordTooShort = serializer.deserialize(Settings.IMP.MAIN.STRINGS.REGISTER_PASSWORD_TOO_SHORT);
registerPasswordUnsafe = serializer.deserialize(Settings.IMP.MAIN.STRINGS.REGISTER_PASSWORD_UNSAFE);
loginSuccessful = serializer.deserialize(Settings.IMP.MAIN.STRINGS.LOGIN_SUCCESSFUL);
if (Settings.IMP.MAIN.STRINGS.LOGIN_SUCCESSFUL_TITLE.isEmpty() && Settings.IMP.MAIN.STRINGS.LOGIN_SUCCESSFUL_SUBTITLE.isEmpty()) {
loginSuccessfulTitle = null;
} else {
loginSuccessfulTitle = Title.title(
serializer.deserialize(Settings.IMP.MAIN.STRINGS.LOGIN_SUCCESSFUL_TITLE),
serializer.deserialize(Settings.IMP.MAIN.STRINGS.LOGIN_SUCCESSFUL_SUBTITLE),
Settings.IMP.MAIN.CRACKED_TITLE_SETTINGS.toTimes()
);
}
if (Settings.IMP.MAIN.MIGRATION_HASH.isEmpty()) {
migrationHash = null;
} else {
migrationHash = MigrationHash.valueOf(Settings.IMP.MAIN.MIGRATION_HASH);
}
}
public static boolean checkPassword(String password, RegisteredPlayer player, Dao playerDao) {
String hash = player.getHash();
boolean isCorrect = HASH_VERIFIER.verify(
password.getBytes(StandardCharsets.UTF_8),
hash.replace("BCRYPT$", "$2a$").getBytes(StandardCharsets.UTF_8)
).verified;
if (!isCorrect && migrationHash != null) {
isCorrect = migrationHash.checkPassword(hash, password);
if (isCorrect) {
player.setHash(genHash(password));
try {
playerDao.update(player);
} catch (SQLException e) {
e.printStackTrace();
return false;
}
}
}
return isCorrect;
}
public static RegisteredPlayer fetchInfo(Dao playerDao, UUID uuid) {
List playerList = null;
try {
playerList = playerDao.queryForEq("PREMIUMUUID", uuid.toString());
} catch (SQLException e) {
e.printStackTrace();
}
return (playerList != null ? playerList.size() : 0) == 0 ? null : playerList.get(0);
}
public static RegisteredPlayer fetchInfo(Dao playerDao, String nickname) {
List playerList = null;
try {
playerList = playerDao.queryForEq("LOWERCASENICKNAME", nickname.toLowerCase(Locale.ROOT));
} catch (SQLException e) {
e.printStackTrace();
}
return (playerList != null ? playerList.size() : 0) == 0 ? null : playerList.get(0);
}
public static String genHash(String password) {
return HASHER.hashToString(Settings.IMP.MAIN.BCRYPT_COST, password.toCharArray());
}
public static CodeVerifier getTotpCodeVerifier() {
return TOTP_CODE_VERIFIER;
}
private enum Command {
INVALID,
REGISTER,
LOGIN,
TOTP;
static Command parse(String command) {
if (Settings.IMP.MAIN.REGISTER_COMMAND.contains(command)) {
return Command.REGISTER;
} else if (Settings.IMP.MAIN.LOGIN_COMMAND.contains(command)) {
return Command.LOGIN;
} else if (Settings.IMP.MAIN.TOTP_COMMAND.contains(command)) {
return Command.TOTP;
} else {
return Command.INVALID;
}
}
}
}