mirror of
https://github.com/GeyserMC/Geyser.git
synced 2024-12-22 22:45:04 +01:00
Merge Floodgate changes
This commit is contained in:
commit
2fc591e341
16 changed files with 351 additions and 24 deletions
1
.gitignore
vendored
1
.gitignore
vendored
|
@ -224,3 +224,4 @@ nbdist/
|
||||||
### Geyser ###
|
### Geyser ###
|
||||||
config.yml
|
config.yml
|
||||||
logs/
|
logs/
|
||||||
|
public-key.pem
|
||||||
|
|
|
@ -96,6 +96,11 @@ public class GeyserBukkitConfiguration implements IGeyserConfiguration {
|
||||||
return config.getBoolean("allow-third-party-capes", true);
|
return config.getBoolean("allow-third-party-capes", true);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getFloodgateKeyFile() {
|
||||||
|
return config.getString("floodgate-key-file", "public-key.pem");
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public IMetricsInfo getMetrics() {
|
public IMetricsInfo getMetrics() {
|
||||||
return metricsInfo;
|
return metricsInfo;
|
||||||
|
|
|
@ -97,6 +97,11 @@ public class GeyserBungeeConfiguration implements IGeyserConfiguration {
|
||||||
return config.getBoolean("allow-third-party-capes", true);
|
return config.getBoolean("allow-third-party-capes", true);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getFloodgateKeyFile() {
|
||||||
|
return config.getString("floodgate-key-file", "public-key.pem");
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public BungeeMetricsInfo getMetrics() {
|
public BungeeMetricsInfo getMetrics() {
|
||||||
return metricsInfo;
|
return metricsInfo;
|
||||||
|
|
|
@ -100,6 +100,11 @@ public class GeyserSpongeConfiguration implements IGeyserConfiguration {
|
||||||
return node.getNode("allow-third-party-capes").getBoolean(true);
|
return node.getNode("allow-third-party-capes").getBoolean(true);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getFloodgateKeyFile() {
|
||||||
|
return node.getNode("floodgate-key-file").getString("public-key.pem");
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public SpongeMetricsInfo getMetrics() {
|
public SpongeMetricsInfo getMetrics() {
|
||||||
return metricsInfo;
|
return metricsInfo;
|
||||||
|
|
|
@ -39,6 +39,9 @@ public class GeyserConfiguration implements IGeyserConfiguration {
|
||||||
private BedrockConfiguration bedrock;
|
private BedrockConfiguration bedrock;
|
||||||
private RemoteConfiguration remote;
|
private RemoteConfiguration remote;
|
||||||
|
|
||||||
|
@JsonProperty("floodgate-key-file")
|
||||||
|
private String floodgateKeyFile;
|
||||||
|
|
||||||
private Map<String, UserAuthenticationInfo> userAuths;
|
private Map<String, UserAuthenticationInfo> userAuths;
|
||||||
|
|
||||||
@JsonProperty("ping-passthrough")
|
@JsonProperty("ping-passthrough")
|
||||||
|
|
26
common/src/main/java/org/geysermc/common/AuthType.java
Normal file
26
common/src/main/java/org/geysermc/common/AuthType.java
Normal file
|
@ -0,0 +1,26 @@
|
||||||
|
package org.geysermc.common;
|
||||||
|
|
||||||
|
import lombok.Getter;
|
||||||
|
|
||||||
|
@Getter
|
||||||
|
public enum AuthType {
|
||||||
|
OFFLINE,
|
||||||
|
ONLINE,
|
||||||
|
FLOODGATE;
|
||||||
|
|
||||||
|
public static final AuthType[] VALUES = values();
|
||||||
|
|
||||||
|
public static AuthType getById(int id) {
|
||||||
|
return id < VALUES.length ? VALUES[id] : OFFLINE;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static AuthType getByName(String name) {
|
||||||
|
String upperCase = name.toUpperCase();
|
||||||
|
for (AuthType type : VALUES) {
|
||||||
|
if (type.name().equals(upperCase)) {
|
||||||
|
return type;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return OFFLINE;
|
||||||
|
}
|
||||||
|
}
|
|
@ -45,6 +45,8 @@ public interface IGeyserConfiguration {
|
||||||
|
|
||||||
boolean isAllowThirdPartyCapes();
|
boolean isAllowThirdPartyCapes();
|
||||||
|
|
||||||
|
String getFloodgateKeyFile();
|
||||||
|
|
||||||
IMetricsInfo getMetrics();
|
IMetricsInfo getMetrics();
|
||||||
|
|
||||||
interface IBedrockConfiguration {
|
interface IBedrockConfiguration {
|
||||||
|
|
|
@ -0,0 +1,44 @@
|
||||||
|
package org.geysermc.floodgate.util;
|
||||||
|
|
||||||
|
import lombok.AllArgsConstructor;
|
||||||
|
import lombok.Getter;
|
||||||
|
|
||||||
|
@AllArgsConstructor
|
||||||
|
@Getter
|
||||||
|
public class BedrockData {
|
||||||
|
public static final int EXPECTED_LENGTH = 7;
|
||||||
|
public static final String FLOODGATE_IDENTIFIER = "Geyser-Floodgate";
|
||||||
|
|
||||||
|
private String version;
|
||||||
|
private String username;
|
||||||
|
private String xuid;
|
||||||
|
private int deviceId;
|
||||||
|
private String languageCode;
|
||||||
|
private int inputMode;
|
||||||
|
private String ip;
|
||||||
|
private int dataLength;
|
||||||
|
|
||||||
|
public BedrockData(String version, String username, String xuid, int deviceId, String languageCode, int inputMode, String ip) {
|
||||||
|
this(version, username, xuid, deviceId, languageCode, inputMode, ip, EXPECTED_LENGTH);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static BedrockData fromString(String data) {
|
||||||
|
String[] split = data.split("\0");
|
||||||
|
if (split.length != EXPECTED_LENGTH) return null;
|
||||||
|
|
||||||
|
return new BedrockData(
|
||||||
|
split[0], split[1], split[2], Integer.parseInt(split[3]),
|
||||||
|
split[4], Integer.parseInt(split[5]), split[6], split.length
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static BedrockData fromRawData(byte[] data) {
|
||||||
|
return fromString(new String(data));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return version +'\0'+ username +'\0'+ xuid +'\0'+ deviceId +'\0'+ languageCode +'\0'+
|
||||||
|
inputMode +'\0'+ ip;
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,76 @@
|
||||||
|
package org.geysermc.floodgate.util;
|
||||||
|
|
||||||
|
import javax.crypto.*;
|
||||||
|
import javax.crypto.spec.SecretKeySpec;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.nio.file.Files;
|
||||||
|
import java.nio.file.Path;
|
||||||
|
import java.security.*;
|
||||||
|
import java.security.spec.EncodedKeySpec;
|
||||||
|
import java.security.spec.InvalidKeySpecException;
|
||||||
|
import java.security.spec.PKCS8EncodedKeySpec;
|
||||||
|
import java.security.spec.X509EncodedKeySpec;
|
||||||
|
import java.util.Base64;
|
||||||
|
|
||||||
|
public class EncryptionUtil {
|
||||||
|
public static String encrypt(Key key, String data) throws IllegalBlockSizeException,
|
||||||
|
InvalidKeyException, BadPaddingException, NoSuchAlgorithmException, NoSuchPaddingException {
|
||||||
|
KeyGenerator generator = KeyGenerator.getInstance("AES");
|
||||||
|
generator.init(128);
|
||||||
|
SecretKey secretKey = generator.generateKey();
|
||||||
|
|
||||||
|
Cipher cipher = Cipher.getInstance("AES");
|
||||||
|
cipher.init(Cipher.ENCRYPT_MODE, secretKey);
|
||||||
|
byte[] encryptedText = cipher.doFinal(data.getBytes());
|
||||||
|
|
||||||
|
cipher = Cipher.getInstance("RSA/ECB/PKCS1Padding");
|
||||||
|
cipher.init(key instanceof PublicKey ? Cipher.PUBLIC_KEY : Cipher.PRIVATE_KEY, key);
|
||||||
|
return Base64.getEncoder().encodeToString(cipher.doFinal(secretKey.getEncoded())) + '\0' +
|
||||||
|
Base64.getEncoder().encodeToString(encryptedText);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static String encryptBedrockData(Key key, BedrockData data) throws IllegalBlockSizeException,
|
||||||
|
InvalidKeyException, BadPaddingException, NoSuchAlgorithmException, NoSuchPaddingException {
|
||||||
|
return encrypt(key, data.toString());
|
||||||
|
}
|
||||||
|
|
||||||
|
public static byte[] decrypt(Key key, String encryptedData) throws IllegalBlockSizeException,
|
||||||
|
InvalidKeyException, BadPaddingException, NoSuchAlgorithmException, NoSuchPaddingException {
|
||||||
|
String[] split = encryptedData.split("\0");
|
||||||
|
if (split.length != 2) {
|
||||||
|
throw new IllegalArgumentException("Expected two arguments, got " + split.length);
|
||||||
|
}
|
||||||
|
|
||||||
|
Cipher cipher = Cipher.getInstance("RSA/ECB/PKCS1Padding");
|
||||||
|
cipher.init(key instanceof PublicKey ? Cipher.PUBLIC_KEY : Cipher.PRIVATE_KEY, key);
|
||||||
|
byte[] decryptedKey = cipher.doFinal(Base64.getDecoder().decode(split[0]));
|
||||||
|
|
||||||
|
SecretKey secretKey = new SecretKeySpec(decryptedKey, 0, decryptedKey.length, "AES");
|
||||||
|
cipher = Cipher.getInstance("AES");
|
||||||
|
cipher.init(Cipher.DECRYPT_MODE, secretKey);
|
||||||
|
return cipher.doFinal(Base64.getDecoder().decode(split[1]));
|
||||||
|
}
|
||||||
|
|
||||||
|
public static BedrockData decryptBedrockData(Key key, String encryptedData) throws IllegalBlockSizeException,
|
||||||
|
InvalidKeyException, BadPaddingException, NoSuchAlgorithmException, NoSuchPaddingException {
|
||||||
|
return BedrockData.fromRawData(decrypt(key, encryptedData));
|
||||||
|
}
|
||||||
|
|
||||||
|
@SuppressWarnings("unchecked")
|
||||||
|
public static <T extends Key> T getKeyFromFile(Path fileLocation, Class<T> keyType) throws
|
||||||
|
IOException, InvalidKeySpecException, NoSuchAlgorithmException {
|
||||||
|
boolean isPublicKey = keyType == PublicKey.class;
|
||||||
|
if (!isPublicKey && keyType != PrivateKey.class) {
|
||||||
|
throw new RuntimeException("I can only read public and private keys!");
|
||||||
|
}
|
||||||
|
|
||||||
|
byte[] key = Files.readAllBytes(fileLocation);
|
||||||
|
|
||||||
|
KeyFactory keyFactory = KeyFactory.getInstance("RSA");
|
||||||
|
EncodedKeySpec keySpec = isPublicKey ? new X509EncodedKeySpec(key) : new PKCS8EncodedKeySpec(key);
|
||||||
|
return (T) (isPublicKey ?
|
||||||
|
keyFactory.generatePublic(keySpec) :
|
||||||
|
keyFactory.generatePrivate(keySpec)
|
||||||
|
);
|
||||||
|
}
|
||||||
|
}
|
|
@ -31,6 +31,7 @@ import com.nukkitx.protocol.bedrock.v389.Bedrock_v389;
|
||||||
|
|
||||||
import lombok.Getter;
|
import lombok.Getter;
|
||||||
|
|
||||||
|
import org.geysermc.common.AuthType;
|
||||||
import org.geysermc.common.PlatformType;
|
import org.geysermc.common.PlatformType;
|
||||||
import org.geysermc.common.bootstrap.IGeyserBootstrap;
|
import org.geysermc.common.bootstrap.IGeyserBootstrap;
|
||||||
import org.geysermc.common.logger.IGeyserLogger;
|
import org.geysermc.common.logger.IGeyserLogger;
|
||||||
|
@ -65,6 +66,7 @@ public class GeyserConnector {
|
||||||
private static GeyserConnector instance;
|
private static GeyserConnector instance;
|
||||||
|
|
||||||
private RemoteServer remoteServer;
|
private RemoteServer remoteServer;
|
||||||
|
private AuthType authType;
|
||||||
|
|
||||||
private IGeyserLogger logger;
|
private IGeyserLogger logger;
|
||||||
private IGeyserConfiguration config;
|
private IGeyserConfiguration config;
|
||||||
|
@ -105,6 +107,7 @@ public class GeyserConnector {
|
||||||
|
|
||||||
commandMap = new GeyserCommandMap(this);
|
commandMap = new GeyserCommandMap(this);
|
||||||
remoteServer = new RemoteServer(config.getRemote().getAddress(), config.getRemote().getPort());
|
remoteServer = new RemoteServer(config.getRemote().getAddress(), config.getRemote().getPort());
|
||||||
|
authType = AuthType.getByName(config.getRemote().getAuthType());
|
||||||
|
|
||||||
passthroughThread = new PingPassthroughThread(this);
|
passthroughThread = new PingPassthroughThread(this);
|
||||||
if (config.isPingPassthrough())
|
if (config.isPingPassthrough())
|
||||||
|
@ -125,7 +128,7 @@ public class GeyserConnector {
|
||||||
metrics = new Metrics(this, "GeyserMC", config.getMetrics().getUniqueId(), false, java.util.logging.Logger.getLogger(""));
|
metrics = new Metrics(this, "GeyserMC", config.getMetrics().getUniqueId(), false, java.util.logging.Logger.getLogger(""));
|
||||||
metrics.addCustomChart(new Metrics.SingleLineChart("servers", () -> 1));
|
metrics.addCustomChart(new Metrics.SingleLineChart("servers", () -> 1));
|
||||||
metrics.addCustomChart(new Metrics.SingleLineChart("players", players::size));
|
metrics.addCustomChart(new Metrics.SingleLineChart("players", players::size));
|
||||||
metrics.addCustomChart(new Metrics.SimplePie("authMode", config.getRemote()::getAuthType));
|
metrics.addCustomChart(new Metrics.SimplePie("authMode", authType.name()::toLowerCase));
|
||||||
metrics.addCustomChart(new Metrics.SimplePie("platform", platformType::getPlatformName));
|
metrics.addCustomChart(new Metrics.SimplePie("platform", platformType::getPlatformName));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -126,9 +126,4 @@ public class UpstreamPacketHandler extends LoggingPacketHandler {
|
||||||
boolean defaultHandler(BedrockPacket packet) {
|
boolean defaultHandler(BedrockPacket packet) {
|
||||||
return translateAndDefault(packet);
|
return translateAndDefault(packet);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean handle(InventoryTransactionPacket packet) {
|
|
||||||
return translateAndDefault(packet);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -29,11 +29,9 @@ import com.github.steveice10.mc.auth.data.GameProfile;
|
||||||
import com.github.steveice10.mc.auth.exception.request.RequestException;
|
import com.github.steveice10.mc.auth.exception.request.RequestException;
|
||||||
import com.github.steveice10.mc.protocol.MinecraftProtocol;
|
import com.github.steveice10.mc.protocol.MinecraftProtocol;
|
||||||
import com.github.steveice10.mc.protocol.data.game.entity.player.GameMode;
|
import com.github.steveice10.mc.protocol.data.game.entity.player.GameMode;
|
||||||
|
import com.github.steveice10.mc.protocol.packet.handshake.client.HandshakePacket;
|
||||||
import com.github.steveice10.packetlib.Client;
|
import com.github.steveice10.packetlib.Client;
|
||||||
import com.github.steveice10.packetlib.event.session.ConnectedEvent;
|
import com.github.steveice10.packetlib.event.session.*;
|
||||||
import com.github.steveice10.packetlib.event.session.DisconnectedEvent;
|
|
||||||
import com.github.steveice10.packetlib.event.session.PacketReceivedEvent;
|
|
||||||
import com.github.steveice10.packetlib.event.session.SessionAdapter;
|
|
||||||
import com.github.steveice10.packetlib.packet.Packet;
|
import com.github.steveice10.packetlib.packet.Packet;
|
||||||
import com.github.steveice10.packetlib.tcp.TcpSessionFactory;
|
import com.github.steveice10.packetlib.tcp.TcpSessionFactory;
|
||||||
import com.nukkitx.math.vector.Vector2f;
|
import com.nukkitx.math.vector.Vector2f;
|
||||||
|
@ -49,6 +47,7 @@ import com.nukkitx.protocol.bedrock.packet.*;
|
||||||
import lombok.Getter;
|
import lombok.Getter;
|
||||||
import lombok.Setter;
|
import lombok.Setter;
|
||||||
|
|
||||||
|
import org.geysermc.common.AuthType;
|
||||||
import org.geysermc.common.window.FormWindow;
|
import org.geysermc.common.window.FormWindow;
|
||||||
import org.geysermc.connector.GeyserConnector;
|
import org.geysermc.connector.GeyserConnector;
|
||||||
import org.geysermc.connector.command.CommandSender;
|
import org.geysermc.connector.command.CommandSender;
|
||||||
|
@ -56,12 +55,20 @@ import org.geysermc.connector.entity.PlayerEntity;
|
||||||
import org.geysermc.connector.inventory.PlayerInventory;
|
import org.geysermc.connector.inventory.PlayerInventory;
|
||||||
import org.geysermc.connector.network.remote.RemoteServer;
|
import org.geysermc.connector.network.remote.RemoteServer;
|
||||||
import org.geysermc.connector.network.session.auth.AuthData;
|
import org.geysermc.connector.network.session.auth.AuthData;
|
||||||
|
import org.geysermc.connector.network.session.auth.BedrockClientData;
|
||||||
import org.geysermc.connector.network.session.cache.*;
|
import org.geysermc.connector.network.session.cache.*;
|
||||||
import org.geysermc.connector.network.translators.Registry;
|
import org.geysermc.connector.network.translators.Registry;
|
||||||
import org.geysermc.connector.network.translators.TranslatorsInit;
|
import org.geysermc.connector.network.translators.TranslatorsInit;
|
||||||
import org.geysermc.connector.utils.Toolbox;
|
import org.geysermc.connector.utils.Toolbox;
|
||||||
|
import org.geysermc.floodgate.util.BedrockData;
|
||||||
|
import org.geysermc.floodgate.util.EncryptionUtil;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
import java.net.InetSocketAddress;
|
import java.net.InetSocketAddress;
|
||||||
|
import java.nio.file.Paths;
|
||||||
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
import java.security.PublicKey;
|
||||||
|
import java.security.spec.InvalidKeySpecException;
|
||||||
import java.util.UUID;
|
import java.util.UUID;
|
||||||
|
|
||||||
@Getter
|
@Getter
|
||||||
|
@ -71,7 +78,8 @@ public class GeyserSession implements CommandSender {
|
||||||
private final UpstreamSession upstream;
|
private final UpstreamSession upstream;
|
||||||
private RemoteServer remoteServer;
|
private RemoteServer remoteServer;
|
||||||
private Client downstream;
|
private Client downstream;
|
||||||
private AuthData authData;
|
@Setter private AuthData authData;
|
||||||
|
@Setter private BedrockClientData clientData;
|
||||||
|
|
||||||
private PlayerEntity playerEntity;
|
private PlayerEntity playerEntity;
|
||||||
private PlayerInventory inventory;
|
private PlayerInventory inventory;
|
||||||
|
@ -123,8 +131,13 @@ public class GeyserSession implements CommandSender {
|
||||||
public void connect(RemoteServer remoteServer) {
|
public void connect(RemoteServer remoteServer) {
|
||||||
startGame();
|
startGame();
|
||||||
this.remoteServer = remoteServer;
|
this.remoteServer = remoteServer;
|
||||||
if (!(connector.getConfig().getRemote().getAuthType().hashCode() == "online".hashCode())) {
|
if (connector.getAuthType() != AuthType.ONLINE) {
|
||||||
connector.getLogger().info("Attempting to login using offline mode... authentication is disabled.");
|
connector.getLogger().info(
|
||||||
|
"Attempting to login using " + connector.getAuthType().name().toLowerCase() + " mode... " +
|
||||||
|
(connector.getAuthType() == AuthType.OFFLINE ?
|
||||||
|
"authentication is disabled." : "authentication will be encrypted"
|
||||||
|
)
|
||||||
|
);
|
||||||
authenticate(authData.getName());
|
authenticate(authData.getName());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -177,8 +190,56 @@ public class GeyserSession implements CommandSender {
|
||||||
protocol = new MinecraftProtocol(username);
|
protocol = new MinecraftProtocol(username);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
boolean floodgate = connector.getAuthType() == AuthType.FLOODGATE;
|
||||||
|
final PublicKey publicKey;
|
||||||
|
|
||||||
|
if (floodgate) {
|
||||||
|
PublicKey key = null;
|
||||||
|
try {
|
||||||
|
key = EncryptionUtil.getKeyFromFile(
|
||||||
|
Paths.get(connector.getConfig().getFloodgateKeyFile()),
|
||||||
|
PublicKey.class
|
||||||
|
);
|
||||||
|
} catch (IOException | InvalidKeySpecException | NoSuchAlgorithmException e) {
|
||||||
|
connector.getLogger().error("Error while reading Floodgate key file", e);
|
||||||
|
}
|
||||||
|
publicKey = key;
|
||||||
|
} else publicKey = null;
|
||||||
|
|
||||||
|
if (publicKey != null) {
|
||||||
|
connector.getLogger().info("Loaded Floodgate key!");
|
||||||
|
}
|
||||||
|
|
||||||
downstream = new Client(remoteServer.getAddress(), remoteServer.getPort(), protocol, new TcpSessionFactory());
|
downstream = new Client(remoteServer.getAddress(), remoteServer.getPort(), protocol, new TcpSessionFactory());
|
||||||
downstream.getSession().addListener(new SessionAdapter() {
|
downstream.getSession().addListener(new SessionAdapter() {
|
||||||
|
@Override
|
||||||
|
public void packetSending(PacketSendingEvent event) {
|
||||||
|
//todo move this somewhere else
|
||||||
|
if (event.getPacket() instanceof HandshakePacket && floodgate) {
|
||||||
|
String encrypted = "";
|
||||||
|
try {
|
||||||
|
encrypted = EncryptionUtil.encryptBedrockData(publicKey, new BedrockData(
|
||||||
|
clientData.getGameVersion(),
|
||||||
|
authData.getName(),
|
||||||
|
authData.getXboxUUID(),
|
||||||
|
clientData.getDeviceOS().ordinal(),
|
||||||
|
clientData.getLanguageCode(),
|
||||||
|
clientData.getCurrentInputMode().ordinal(),
|
||||||
|
upstream.getSession().getAddress().getAddress().getHostAddress()
|
||||||
|
));
|
||||||
|
} catch (Exception e) {
|
||||||
|
connector.getLogger().error("Failed to encrypt message", e);
|
||||||
|
}
|
||||||
|
|
||||||
|
HandshakePacket handshakePacket = event.getPacket();
|
||||||
|
event.setPacket(new HandshakePacket(
|
||||||
|
handshakePacket.getProtocolVersion(),
|
||||||
|
handshakePacket.getHostname() + '\0' + BedrockData.FLOODGATE_IDENTIFIER + '\0' + encrypted,
|
||||||
|
handshakePacket.getPort(),
|
||||||
|
handshakePacket.getIntent()
|
||||||
|
));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void connected(ConnectedEvent event) {
|
public void connected(ConnectedEvent event) {
|
||||||
|
@ -227,10 +288,6 @@ public class GeyserSession implements CommandSender {
|
||||||
closed = true;
|
closed = true;
|
||||||
}
|
}
|
||||||
|
|
||||||
public boolean isClosed() {
|
|
||||||
return closed;
|
|
||||||
}
|
|
||||||
|
|
||||||
public void close() {
|
public void close() {
|
||||||
disconnect("Server closed.");
|
disconnect("Server closed.");
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,91 @@
|
||||||
|
package org.geysermc.connector.network.session.auth;
|
||||||
|
|
||||||
|
import com.fasterxml.jackson.annotation.JsonEnumDefaultValue;
|
||||||
|
import com.fasterxml.jackson.annotation.JsonIgnoreProperties;
|
||||||
|
import com.fasterxml.jackson.annotation.JsonProperty;
|
||||||
|
import lombok.Getter;
|
||||||
|
|
||||||
|
import java.util.UUID;
|
||||||
|
|
||||||
|
@JsonIgnoreProperties(ignoreUnknown = true)
|
||||||
|
@Getter
|
||||||
|
public class BedrockClientData {
|
||||||
|
@JsonProperty(value = "GameVersion")
|
||||||
|
private String gameVersion;
|
||||||
|
@JsonProperty(value = "ServerAddress")
|
||||||
|
private String serverAddress;
|
||||||
|
@JsonProperty(value = "ThirdPartyName")
|
||||||
|
private String username;
|
||||||
|
@JsonProperty(value = "LanguageCode")
|
||||||
|
private String languageCode;
|
||||||
|
|
||||||
|
@JsonProperty(value = "SkinId")
|
||||||
|
private String skinId;
|
||||||
|
@JsonProperty(value = "SkinData")
|
||||||
|
private String skinData;
|
||||||
|
@JsonProperty(value = "CapeId")
|
||||||
|
private String capeId;
|
||||||
|
@JsonProperty(value = "CapeData")
|
||||||
|
private byte[] capeData;
|
||||||
|
@JsonProperty(value = "CapeOnClassicSkin")
|
||||||
|
private boolean capeOnClassicSkin;
|
||||||
|
@JsonProperty(value = "SkinResourcePatch")
|
||||||
|
private String geometryName;
|
||||||
|
@JsonProperty(value = "SkinGeometryData")
|
||||||
|
private String geometryData;
|
||||||
|
@JsonProperty(value = "PremiumSkin")
|
||||||
|
private boolean premiumSkin;
|
||||||
|
|
||||||
|
@JsonProperty(value = "DeviceId")
|
||||||
|
private String deviceId;
|
||||||
|
@JsonProperty(value = "DeviceModel")
|
||||||
|
private String deviceModel;
|
||||||
|
@JsonProperty(value = "DeviceOS")
|
||||||
|
private DeviceOS deviceOS;
|
||||||
|
@JsonProperty(value = "UIProfile")
|
||||||
|
private UIProfile uiProfile;
|
||||||
|
@JsonProperty(value = "GuiScale")
|
||||||
|
private int guiScale;
|
||||||
|
@JsonProperty(value = "CurrentInputMode")
|
||||||
|
private InputMode currentInputMode;
|
||||||
|
@JsonProperty(value = "DefaultInputMode")
|
||||||
|
private InputMode defaultInputMode;
|
||||||
|
@JsonProperty("PlatformOnlineId")
|
||||||
|
private String platformOnlineId;
|
||||||
|
@JsonProperty(value = "PlatformOfflineId")
|
||||||
|
private String platformOfflineId;
|
||||||
|
@JsonProperty(value = "SelfSignedId")
|
||||||
|
private UUID selfSignedId;
|
||||||
|
@JsonProperty(value = "ClientRandomId")
|
||||||
|
private long clientRandomId;
|
||||||
|
|
||||||
|
public enum UIProfile {
|
||||||
|
@JsonEnumDefaultValue
|
||||||
|
CLASSIC,
|
||||||
|
POCKET
|
||||||
|
}
|
||||||
|
|
||||||
|
public enum DeviceOS {
|
||||||
|
@JsonEnumDefaultValue
|
||||||
|
UNKOWN,
|
||||||
|
ANDROID,
|
||||||
|
IOS,
|
||||||
|
OSX,
|
||||||
|
FIREOS,
|
||||||
|
GEARVR,
|
||||||
|
HOLOLENS,
|
||||||
|
WIN10,
|
||||||
|
WIN32,
|
||||||
|
DEDICATED,
|
||||||
|
ORBIS,
|
||||||
|
NX
|
||||||
|
}
|
||||||
|
|
||||||
|
public enum InputMode {
|
||||||
|
@JsonEnumDefaultValue
|
||||||
|
UNKNOWN,
|
||||||
|
KEYBOARD_MOUSE,
|
||||||
|
TOUCH, // I guess Touch?
|
||||||
|
CONTROLLER
|
||||||
|
}
|
||||||
|
}
|
|
@ -21,6 +21,7 @@ import org.geysermc.common.window.response.CustomFormResponse;
|
||||||
import org.geysermc.connector.GeyserConnector;
|
import org.geysermc.connector.GeyserConnector;
|
||||||
import org.geysermc.connector.network.session.GeyserSession;
|
import org.geysermc.connector.network.session.GeyserSession;
|
||||||
import org.geysermc.connector.network.session.auth.AuthData;
|
import org.geysermc.connector.network.session.auth.AuthData;
|
||||||
|
import org.geysermc.connector.network.session.auth.BedrockClientData;
|
||||||
import org.geysermc.connector.network.session.cache.WindowCache;
|
import org.geysermc.connector.network.session.cache.WindowCache;
|
||||||
|
|
||||||
import javax.crypto.SecretKey;
|
import javax.crypto.SecretKey;
|
||||||
|
@ -73,7 +74,7 @@ public class LoginEncryptionUtils {
|
||||||
encryptConnectionWithCert(connector, session, loginPacket.getSkinData().toString(), certChainData);
|
encryptConnectionWithCert(connector, session, loginPacket.getSkinData().toString(), certChainData);
|
||||||
}
|
}
|
||||||
|
|
||||||
private static void encryptConnectionWithCert(GeyserConnector connector, GeyserSession session, String playerSkin, JsonNode certChainData) {
|
private static void encryptConnectionWithCert(GeyserConnector connector, GeyserSession session, String clientData, JsonNode certChainData) {
|
||||||
try {
|
try {
|
||||||
boolean validChain = validateChainData(certChainData);
|
boolean validChain = validateChainData(certChainData);
|
||||||
|
|
||||||
|
@ -86,17 +87,23 @@ public class LoginEncryptionUtils {
|
||||||
throw new RuntimeException("AuthData was not found!");
|
throw new RuntimeException("AuthData was not found!");
|
||||||
}
|
}
|
||||||
|
|
||||||
JSONObject extraData = (JSONObject) jwt.getPayload().toJSONObject().get("extraData");
|
JsonNode extraData = payload.get("extraData");
|
||||||
session.setAuthenticationData(new AuthData(extraData.getAsString("displayName"), UUID.fromString(extraData.getAsString("identity")), extraData.getAsString("XUID")));
|
session.setAuthenticationData(new AuthData(
|
||||||
|
extraData.get("displayName").asText(),
|
||||||
|
UUID.fromString(extraData.get("identity").asText()),
|
||||||
|
extraData.get("XUID").asText()
|
||||||
|
));
|
||||||
|
|
||||||
if (payload.get("identityPublicKey").getNodeType() != JsonNodeType.STRING) {
|
if (payload.get("identityPublicKey").getNodeType() != JsonNodeType.STRING) {
|
||||||
throw new RuntimeException("Identity Public Key was not found!");
|
throw new RuntimeException("Identity Public Key was not found!");
|
||||||
}
|
}
|
||||||
|
|
||||||
ECPublicKey identityPublicKey = EncryptionUtils.generateKey(payload.get("identityPublicKey").textValue());
|
ECPublicKey identityPublicKey = EncryptionUtils.generateKey(payload.get("identityPublicKey").textValue());
|
||||||
JWSObject clientJwt = JWSObject.parse(playerSkin);
|
JWSObject clientJwt = JWSObject.parse(clientData);
|
||||||
EncryptionUtils.verifyJwt(clientJwt, identityPublicKey);
|
EncryptionUtils.verifyJwt(clientJwt, identityPublicKey);
|
||||||
|
|
||||||
|
session.setClientData(JSON_MAPPER.convertValue(JSON_MAPPER.readTree(clientJwt.getPayload().toBytes()), BedrockClientData.class));
|
||||||
|
|
||||||
if (EncryptionUtils.canUseEncryption()) {
|
if (EncryptionUtils.canUseEncryption()) {
|
||||||
LoginEncryptionUtils.startEncryptionHandshake(session, identityPublicKey);
|
LoginEncryptionUtils.startEncryptionHandshake(session, identityPublicKey);
|
||||||
}
|
}
|
||||||
|
|
|
@ -9,6 +9,7 @@ import com.nukkitx.protocol.bedrock.packet.PlayerListPacket;
|
||||||
import lombok.AllArgsConstructor;
|
import lombok.AllArgsConstructor;
|
||||||
import lombok.Getter;
|
import lombok.Getter;
|
||||||
|
|
||||||
|
import org.geysermc.common.AuthType;
|
||||||
import org.geysermc.connector.GeyserConnector;
|
import org.geysermc.connector.GeyserConnector;
|
||||||
import org.geysermc.connector.entity.PlayerEntity;
|
import org.geysermc.connector.entity.PlayerEntity;
|
||||||
import org.geysermc.connector.network.session.GeyserSession;
|
import org.geysermc.connector.network.session.GeyserSession;
|
||||||
|
@ -20,6 +21,7 @@ import java.util.UUID;
|
||||||
import java.util.function.Consumer;
|
import java.util.function.Consumer;
|
||||||
|
|
||||||
public class SkinUtils {
|
public class SkinUtils {
|
||||||
|
|
||||||
public static PlayerListPacket.Entry buildCachedEntry(GameProfile profile, long geyserId) {
|
public static PlayerListPacket.Entry buildCachedEntry(GameProfile profile, long geyserId) {
|
||||||
GameProfileData data = GameProfileData.from(profile);
|
GameProfileData data = GameProfileData.from(profile);
|
||||||
SkinProvider.Cape cape = SkinProvider.getCachedCape(data.getCapeUrl());
|
SkinProvider.Cape cape = SkinProvider.getCachedCape(data.getCapeUrl());
|
||||||
|
@ -97,7 +99,7 @@ public class SkinUtils {
|
||||||
|
|
||||||
return new GameProfileData(skinUrl, capeUrl, isAlex);
|
return new GameProfileData(skinUrl, capeUrl, isAlex);
|
||||||
} catch (Exception exception) {
|
} catch (Exception exception) {
|
||||||
if (!GeyserConnector.getInstance().getConfig().getRemote().getAuthType().equals("offline")) {
|
if (GeyserConnector.getInstance().getAuthType() != AuthType.OFFLINE) {
|
||||||
GeyserConnector.getInstance().getLogger().debug("Got invalid texture data for " + profile.getName() + " " + exception.getMessage());
|
GeyserConnector.getInstance().getLogger().debug("Got invalid texture data for " + profile.getName() + " " + exception.getMessage());
|
||||||
}
|
}
|
||||||
// return default skin with default cape when texture data is invalid
|
// return default skin with default cape when texture data is invalid
|
||||||
|
@ -157,6 +159,7 @@ public class SkinUtils {
|
||||||
|
|
||||||
if (skinAndCapeConsumer != null) skinAndCapeConsumer.accept(skinAndCape);
|
if (skinAndCapeConsumer != null) skinAndCapeConsumer.accept(skinAndCape);
|
||||||
});
|
});
|
||||||
|
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -20,10 +20,14 @@ remote:
|
||||||
address: 127.0.0.1
|
address: 127.0.0.1
|
||||||
# The port of the remote (Java Edition) server
|
# The port of the remote (Java Edition) server
|
||||||
port: 25565
|
port: 25565
|
||||||
|
# Authentication type. Can be offline, online, or floodgate (see the wiki).
|
||||||
# Authentication type. Can be offline, online, or hybrid (see the wiki).
|
|
||||||
auth-type: online
|
auth-type: online
|
||||||
|
|
||||||
|
# Floodgate uses encryption to ensure use from authorised sources.
|
||||||
|
# This should point to the public key generated by Floodgate (Bungee or CraftBukkit)
|
||||||
|
# You can ignore this when not using Floodgate.
|
||||||
|
floodgate-key-file: public-key.pem
|
||||||
|
|
||||||
## the Xbox/MCPE username is the key for the Java server auth-info
|
## the Xbox/MCPE username is the key for the Java server auth-info
|
||||||
## this allows automatic configuration/login to the remote Java server
|
## this allows automatic configuration/login to the remote Java server
|
||||||
## if you are brave/stupid enough to put your Mojang account info into
|
## if you are brave/stupid enough to put your Mojang account info into
|
||||||
|
|
Loading…
Reference in a new issue