Merge branch 'master' into dependabot/maven/G-Earth/ch.qos.logback-logback-core-1.3.12

This commit is contained in:
sirjonasxx 2024-06-21 00:16:28 +02:00 committed by GitHub
commit 186141c4a0
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
13 changed files with 218 additions and 50 deletions

View File

@ -10,7 +10,7 @@
<properties> <properties>
<javafx.version>1.8</javafx.version> <javafx.version>1.8</javafx.version>
<jettyVersion>9.4.51.v20230217</jettyVersion> <jettyVersion>9.4.53.v20231009</jettyVersion>
<logback.version>1.3.12</logback.version> <logback.version>1.3.12</logback.version>
</properties> </properties>
@ -209,7 +209,7 @@
<dependency> <dependency>
<groupId>org.json</groupId> <groupId>org.json</groupId>
<artifactId>json</artifactId> <artifactId>json</artifactId>
<version>20230227</version> <version>20231013</version>
</dependency> </dependency>
<dependency> <dependency>
<groupId>org.fxmisc.richtext</groupId> <groupId>org.fxmisc.richtext</groupId>

View File

@ -13,6 +13,7 @@ public class HOffer {
private int priceInCredits; private int priceInCredits;
private int priceInActivityPoints; private int priceInActivityPoints;
private int activityPointType; private int activityPointType;
private int priceInSilver;
private boolean giftable; private boolean giftable;
private List<HProduct> products = new ArrayList<>(); private List<HProduct> products = new ArrayList<>();
private int clubLevel; private int clubLevel;
@ -28,6 +29,7 @@ public class HOffer {
this.priceInCredits = packet.readInteger(); this.priceInCredits = packet.readInteger();
this.priceInActivityPoints = packet.readInteger(); this.priceInActivityPoints = packet.readInteger();
this.activityPointType = packet.readInteger(); this.activityPointType = packet.readInteger();
this.priceInSilver = packet.readInteger();
this.giftable = packet.readBoolean(); this.giftable = packet.readBoolean();
int productCount = packet.readInteger(); int productCount = packet.readInteger();
@ -65,6 +67,10 @@ public class HOffer {
return activityPointType; return activityPointType;
} }
public int getPriceInSilver() {
return priceInSilver;
}
public boolean isGiftable() { public boolean isGiftable() {
return giftable; return giftable;
} }

View File

@ -38,7 +38,7 @@ public class ProxyProviderFactory {
autoDetectHosts.add("game-it.habbo.com:30000"); autoDetectHosts.add("game-it.habbo.com:30000");
autoDetectHosts.add("game-nl.habbo.com:30000"); autoDetectHosts.add("game-nl.habbo.com:30000");
autoDetectHosts.add("game-tr.habbo.com:30000"); autoDetectHosts.add("game-tr.habbo.com:30000");
autoDetectHosts.add("game-us.habbo.com:38101"); autoDetectHosts.add("game-us.habbo.com:30000");
autoDetectHosts.add("game-s2.habbo.com:30000"); autoDetectHosts.add("game-s2.habbo.com:30000");
List<Object> additionalCachedHotels = Cacher.getList(HOTELS_CACHE_KEY); List<Object> additionalCachedHotels = Cacher.getList(HOTELS_CACHE_KEY);

View File

@ -6,6 +6,8 @@ import gearth.protocol.connection.HProxySetter;
import gearth.protocol.connection.HState; import gearth.protocol.connection.HState;
import gearth.protocol.connection.HStateSetter; import gearth.protocol.connection.HStateSetter;
import gearth.protocol.connection.proxy.ProxyProvider; import gearth.protocol.connection.proxy.ProxyProvider;
import gearth.protocol.connection.proxy.nitro.http.NitroAuthority;
import gearth.protocol.connection.proxy.nitro.http.NitroCertificateSniffingManager;
import gearth.protocol.connection.proxy.nitro.http.NitroHttpProxy; import gearth.protocol.connection.proxy.nitro.http.NitroHttpProxy;
import gearth.protocol.connection.proxy.nitro.http.NitroHttpProxyServerCallback; import gearth.protocol.connection.proxy.nitro.http.NitroHttpProxyServerCallback;
import gearth.protocol.connection.proxy.nitro.websocket.NitroWebsocketProxy; import gearth.protocol.connection.proxy.nitro.websocket.NitroWebsocketProxy;
@ -13,7 +15,6 @@ import org.slf4j.Logger;
import org.slf4j.LoggerFactory; import org.slf4j.LoggerFactory;
import java.io.IOException; import java.io.IOException;
import java.net.ServerSocket;
import java.util.concurrent.atomic.AtomicBoolean; import java.util.concurrent.atomic.AtomicBoolean;
public class NitroProxyProvider implements ProxyProvider, NitroHttpProxyServerCallback, StateChangeListener { public class NitroProxyProvider implements ProxyProvider, NitroHttpProxyServerCallback, StateChangeListener {
@ -32,11 +33,14 @@ public class NitroProxyProvider implements ProxyProvider, NitroHttpProxyServerCa
private String originalCookies; private String originalCookies;
public NitroProxyProvider(HProxySetter proxySetter, HStateSetter stateSetter, HConnection connection) { public NitroProxyProvider(HProxySetter proxySetter, HStateSetter stateSetter, HConnection connection) {
final NitroAuthority authority = new NitroAuthority();
final NitroCertificateSniffingManager certificateManager = new NitroCertificateSniffingManager(authority);
this.proxySetter = proxySetter; this.proxySetter = proxySetter;
this.stateSetter = stateSetter; this.stateSetter = stateSetter;
this.connection = connection; this.connection = connection;
this.nitroHttpProxy = new NitroHttpProxy(this); this.nitroHttpProxy = new NitroHttpProxy(this, certificateManager);
this.nitroWebsocketProxy = new NitroWebsocketProxy(proxySetter, stateSetter, connection, this); this.nitroWebsocketProxy = new NitroWebsocketProxy(proxySetter, stateSetter, connection, this, certificateManager);
this.abortLock = new AtomicBoolean(); this.abortLock = new AtomicBoolean();
} }
@ -122,7 +126,7 @@ public class NitroProxyProvider implements ProxyProvider, NitroHttpProxyServerCa
public String replaceWebsocketServer(String configUrl, String websocketUrl) { public String replaceWebsocketServer(String configUrl, String websocketUrl) {
originalWebsocketUrl = websocketUrl; originalWebsocketUrl = websocketUrl;
return String.format("ws://127.0.0.1:%d", websocketPort); return String.format("wss://127.0.0.1:%d", websocketPort);
} }
@Override @Override

View File

@ -20,12 +20,31 @@ public class NitroCertificateSniffingManager implements MitmManager {
private static final boolean DEBUG = false; private static final boolean DEBUG = false;
private final BouncyCastleSslEngineSource sslEngineSource; private final BouncyCastleSslEngineSource sslEngineSource;
private final Authority authority;
public NitroCertificateSniffingManager(Authority authority) throws RootCertificateException { public NitroCertificateSniffingManager(Authority authority) {
this.authority = authority;
try { try {
sslEngineSource = new BouncyCastleSslEngineSource(authority, true, true, null); sslEngineSource = new BouncyCastleSslEngineSource(authority, true, true, null);
} catch (final Exception e) { } catch (final Exception e) {
throw new RootCertificateException("Errors during assembling root CA.", e); throw new RuntimeException(new RootCertificateException("Errors during assembling root CA.", e));
}
}
public Authority getAuthority() {
return authority;
}
public SSLEngine websocketSslEngine(String commonName) {
final SubjectAlternativeNameHolder san = new SubjectAlternativeNameHolder();
san.addDomainName("localhost");
san.addIpAddress("127.0.0.1");
try {
return sslEngineSource.createCertForHost(commonName, san);
} catch (Exception e) {
throw new FakeCertificateException("Failed to create WebSocket certificate", e);
} }
} }

View File

@ -12,8 +12,6 @@ import javafx.scene.control.ButtonType;
import javafx.scene.control.Label; import javafx.scene.control.Label;
import org.littleshoot.proxy.HttpProxyServer; import org.littleshoot.proxy.HttpProxyServer;
import org.littleshoot.proxy.impl.DefaultHttpProxyServer; import org.littleshoot.proxy.impl.DefaultHttpProxyServer;
import org.littleshoot.proxy.mitm.Authority;
import org.littleshoot.proxy.mitm.RootCertificateException;
import java.io.File; import java.io.File;
import java.io.IOException; import java.io.IOException;
@ -25,20 +23,20 @@ public class NitroHttpProxy {
private static final String ADMIN_WARNING_KEY = "admin_warning_dialog"; private static final String ADMIN_WARNING_KEY = "admin_warning_dialog";
private static final AtomicBoolean SHUTDOWN_HOOK = new AtomicBoolean(); private static final AtomicBoolean SHUTDOWN_HOOK = new AtomicBoolean();
private final Authority authority;
private final NitroOsFunctions osFunctions; private final NitroOsFunctions osFunctions;
private final NitroHttpProxyServerCallback serverCallback; private final NitroHttpProxyServerCallback serverCallback;
private final NitroCertificateSniffingManager certificateManager;
private HttpProxyServer proxyServer = null; private HttpProxyServer proxyServer = null;
public NitroHttpProxy(NitroHttpProxyServerCallback serverCallback) { public NitroHttpProxy(NitroHttpProxyServerCallback serverCallback, NitroCertificateSniffingManager certificateManager) {
this.serverCallback = serverCallback; this.serverCallback = serverCallback;
this.authority = new NitroAuthority(); this.certificateManager = certificateManager;
this.osFunctions = NitroOsFunctionsFactory.create(); this.osFunctions = NitroOsFunctionsFactory.create();
} }
private boolean initializeCertificate() { private boolean initializeCertificate() {
final File certificate = this.authority.aliasFile(".pem"); final File certificate = this.certificateManager.getAuthority().aliasFile(".pem");
// All good if certificate is already trusted. // All good if certificate is already trusted.
if (this.osFunctions.isRootCertificateTrusted(certificate)) { if (this.osFunctions.isRootCertificateTrusted(certificate)) {
@ -80,7 +78,7 @@ public class NitroHttpProxy {
return false; return false;
} }
return this.osFunctions.installRootCertificate(this.authority.aliasFile(".pem")); return this.osFunctions.installRootCertificate(this.certificateManager.getAuthority().aliasFile(".pem"));
} }
/** /**
@ -100,10 +98,9 @@ public class NitroHttpProxy {
public boolean start() { public boolean start() {
setupShutdownHook(); setupShutdownHook();
try {
proxyServer = DefaultHttpProxyServer.bootstrap() proxyServer = DefaultHttpProxyServer.bootstrap()
.withPort(NitroConstants.HTTP_PORT) .withPort(NitroConstants.HTTP_PORT)
.withManInTheMiddle(new NitroCertificateSniffingManager(authority)) .withManInTheMiddle(this.certificateManager)
.withFiltersSource(new NitroHttpProxyFilterSource(serverCallback)) .withFiltersSource(new NitroHttpProxyFilterSource(serverCallback))
.withTransparent(true) .withTransparent(true)
.start(); .start();
@ -123,10 +120,6 @@ public class NitroHttpProxy {
} }
return true; return true;
} catch (RootCertificateException e) {
e.printStackTrace();
return false;
}
} }
public void pause() { public void pause() {

View File

@ -16,19 +16,24 @@ import java.util.regex.Pattern;
public class NitroHttpProxyFilter extends HttpFiltersAdapter { public class NitroHttpProxyFilter extends HttpFiltersAdapter {
private static final String NitroConfigSearch = "\"socket.url\""; private static final String NitroConfigSearch = "socket.url";
private static final String NitroClientSearch = "configurationUrls:"; private static final String NitroClientSearch = "configurationUrls:";
private static final Pattern NitroConfigPattern = Pattern.compile("\"socket\\.url\":.?\"(wss?://.*?)\"", Pattern.MULTILINE); private static final Pattern NitroConfigPattern = Pattern.compile("[\"']socket\\.url[\"']:(\\s+)?[\"'](wss?:.*?)[\"']", Pattern.MULTILINE);
// https://developers.cloudflare.com/fundamentals/get-started/reference/cloudflare-cookies/ // https://developers.cloudflare.com/fundamentals/get-started/reference/cloudflare-cookies/
private static final HashSet<String> CloudflareCookies = new HashSet<>(Arrays.asList( private static final HashSet<String> CloudflareCookies = new HashSet<>(Arrays.asList(
"__cflb", "__cflb",
"__cf_bm", "__cf_bm",
"__cfseq",
"cf_ob_info", "cf_ob_info",
"cf_use_ob", "cf_use_ob",
"__cfwaitingroom", "__cfwaitingroom",
"__cfruid", "__cfruid",
"cf_clearance" "_cfuvid",
"cf_clearance",
"cf_chl_rc_i",
"cf_chl_rc_ni",
"cf_chl_rc_m"
)); ));
private static final String HeaderAcceptEncoding = "Accept-Encoding"; private static final String HeaderAcceptEncoding = "Accept-Encoding";
@ -95,11 +100,11 @@ public class NitroHttpProxyFilter extends HttpFiltersAdapter {
final Matcher matcher = NitroConfigPattern.matcher(responseBody); final Matcher matcher = NitroConfigPattern.matcher(responseBody);
if (matcher.find()) { if (matcher.find()) {
final String originalWebsocket = matcher.group(1); final String originalWebsocket = matcher.group(2).replace("\\/", "/");
final String replacementWebsocket = callback.replaceWebsocketServer(this.url, originalWebsocket); final String replacementWebsocket = callback.replaceWebsocketServer(this.url, originalWebsocket);
if (replacementWebsocket != null) { if (replacementWebsocket != null) {
responseBody = responseBody.replace(originalWebsocket, replacementWebsocket); responseBody = responseBody.replace(matcher.group(2), replacementWebsocket);
responseModified = true; responseModified = true;
} }
} }

View File

@ -0,0 +1,20 @@
package gearth.protocol.connection.proxy.nitro.http;
import org.eclipse.jetty.util.ssl.SslContextFactory;
import javax.net.ssl.SSLEngine;
public class NitroSslContextFactory extends SslContextFactory.Server {
private final NitroCertificateSniffingManager certificateManager;
public NitroSslContextFactory(NitroCertificateSniffingManager certificateManager) {
this.certificateManager = certificateManager;
}
@Override
public SSLEngine newSSLEngine(String host, int port) {
System.out.printf("[NitroSslContextFactory] Creating SSLEngine for %s:%d%n", host, port);
return certificateManager.websocketSslEngine(host);
}
}

View File

@ -1,6 +1,7 @@
package gearth.protocol.connection.proxy.nitro.os; package gearth.protocol.connection.proxy.nitro.os;
import gearth.misc.OSValidator; import gearth.misc.OSValidator;
import gearth.protocol.connection.proxy.nitro.os.macos.NitroMacOS;
import gearth.protocol.connection.proxy.nitro.os.windows.NitroWindows; import gearth.protocol.connection.proxy.nitro.os.windows.NitroWindows;
import org.apache.commons.lang3.NotImplementedException; import org.apache.commons.lang3.NotImplementedException;
@ -15,7 +16,10 @@ public final class NitroOsFunctionsFactory {
throw new NotImplementedException("unix nitro is not implemented yet"); throw new NotImplementedException("unix nitro is not implemented yet");
} }
throw new NotImplementedException("macOS nitro is not implemented yet"); if (OSValidator.isMac()) {
return new NitroMacOS();
} }
throw new NotImplementedException("unsupported operating system");
}
} }

View File

@ -0,0 +1,96 @@
package gearth.protocol.connection.proxy.nitro.os.macos;
import gearth.misc.RuntimeUtil;
import gearth.protocol.connection.proxy.nitro.os.NitroOsFunctions;
import java.io.File;
import java.io.IOException;
public class NitroMacOS implements NitroOsFunctions {
/**
* Semicolon separated hosts to ignore for proxying.
*/
private static final String PROXY_IGNORE = "discord.com;discordapp.com;github.com;";
/**
* Checks if the certificate is trusted by the local machine.
* @param certificate Absolute path to the certificate.
* @return true if trusted
*/
@Override
public boolean isRootCertificateTrusted(File certificate) {
try {
final String output = RuntimeUtil.getCommandOutput(new String[] {"sh", "-c", "security verify-cert -c \"" + certificate.getAbsolutePath() + "\""});
return !output.contains("CSSMERR_TP_NOT_TRUSTED");
} catch (IOException e) {
e.printStackTrace();
}
return false;
}
@Override
public boolean installRootCertificate(File certificate) {
final String certificatePath = certificate.getAbsolutePath();
try {
// Install the certificate
Process process = new ProcessBuilder("sh", "-c", "sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain \"" + certificatePath + "\"")
.inheritIO()
.start();
// Wait for the process to complete
int exitCode = process.waitFor();
if (exitCode != 0) {
System.out.printf("security add-trusted-cert command exited with exit code %d%n", exitCode);
return false;
}
return true;
} catch (IOException | InterruptedException e) {
e.printStackTrace();
}
return false;
}
@Override
public boolean registerSystemProxy(String host, int port) {
try {
final String[] ignoreHosts = PROXY_IGNORE.split(";");
// Enable proxy
Runtime.getRuntime().exec("networksetup -setwebproxy Wi-Fi " + host + " " + port);
Runtime.getRuntime().exec("networksetup -setsecurewebproxy Wi-Fi " + host + " " + port);
// Set proxy bypass domains
for (String ignoreHost : ignoreHosts) {
Runtime.getRuntime().exec("networksetup -setproxybypassdomains Wi-Fi " + ignoreHost);
}
return true;
} catch (IOException e) {
e.printStackTrace();
}
return false;
}
@Override
public boolean unregisterSystemProxy() {
try {
// Disable proxy
Runtime.getRuntime().exec("networksetup -setwebproxystate Wi-Fi off");
Runtime.getRuntime().exec("networksetup -setsecurewebproxystate Wi-Fi off");
return true;
} catch (IOException e) {
e.printStackTrace();
}
return false;
}
}

View File

@ -15,7 +15,8 @@ public class NitroWindows implements NitroOsFunctions {
/** /**
* Semicolon separated hosts to ignore for proxying. * Semicolon separated hosts to ignore for proxying.
*/ */
private static final String PROXY_IGNORE = "discord.com;discordapp.com;github.com;"; // habba.io;
private static final String PROXY_IGNORE = "discord.com;discordapp.com;github.com;challenges.cloudflare.com;";
/** /**
* Checks if the certificate is trusted by the local machine. * Checks if the certificate is trusted by the local machine.

View File

@ -4,7 +4,8 @@ import gearth.protocol.HConnection;
import gearth.protocol.connection.HProxySetter; import gearth.protocol.connection.HProxySetter;
import gearth.protocol.connection.HStateSetter; import gearth.protocol.connection.HStateSetter;
import gearth.protocol.connection.proxy.nitro.NitroProxyProvider; import gearth.protocol.connection.proxy.nitro.NitroProxyProvider;
import org.eclipse.jetty.server.Connector; import gearth.protocol.connection.proxy.nitro.http.NitroCertificateSniffingManager;
import gearth.protocol.connection.proxy.nitro.http.NitroSslContextFactory;
import org.eclipse.jetty.server.Handler; import org.eclipse.jetty.server.Handler;
import org.eclipse.jetty.server.Server; import org.eclipse.jetty.server.Server;
import org.eclipse.jetty.server.ServerConnector; import org.eclipse.jetty.server.ServerConnector;
@ -21,19 +22,37 @@ public class NitroWebsocketProxy {
private final HStateSetter stateSetter; private final HStateSetter stateSetter;
private final HConnection connection; private final HConnection connection;
private final NitroProxyProvider proxyProvider; private final NitroProxyProvider proxyProvider;
private final NitroCertificateSniffingManager certificateManager;
private final Server server; private final Server server;
private final int serverPort;
public NitroWebsocketProxy(HProxySetter proxySetter, HStateSetter stateSetter, HConnection connection, NitroProxyProvider proxyProvider) { public NitroWebsocketProxy(HProxySetter proxySetter,
HStateSetter stateSetter,
HConnection connection,
NitroProxyProvider proxyProvider,
NitroCertificateSniffingManager certificateManager) {
this.proxySetter = proxySetter; this.proxySetter = proxySetter;
this.stateSetter = stateSetter; this.stateSetter = stateSetter;
this.connection = connection; this.connection = connection;
this.proxyProvider = proxyProvider; this.proxyProvider = proxyProvider;
this.server = new Server(0); this.certificateManager = certificateManager;
this.server = new Server();
this.serverPort = 0;
} }
public boolean start() { public boolean start() {
try { try {
// Configure SSL.
final NitroSslContextFactory sslContextFactory = new NitroSslContextFactory(this.certificateManager);
final ServerConnector sslConnector = new ServerConnector(server, sslContextFactory);
sslConnector.setPort(this.serverPort);
// Add SSL to the server.
server.addConnector(sslConnector);
// Configure the WebSocket.
final ServletContextHandler context = new ServletContextHandler(ServletContextHandler.SESSIONS); final ServletContextHandler context = new ServletContextHandler(ServletContextHandler.SESSIONS);
context.setContextPath("/"); context.setContextPath("/");

View File

@ -39,6 +39,7 @@ G-Python<sup>1</sup> | Python | sirjonasxx | https://github.com/sirjonasxx/G-Pyt
Xabbo | C# | b7 | https://github.com/b7c/Xabbo.GEarth Xabbo | C# | b7 | https://github.com/b7c/Xabbo.GEarth
Xabbo scripter<sup>2</sup> | C# | b7 | https://github.com/b7c/Xabbo.Scripter Xabbo scripter<sup>2</sup> | C# | b7 | https://github.com/b7c/Xabbo.Scripter
G-Node | Node.js | WiredSpast | https://github.com/WiredSpast/G-Node G-Node | Node.js | WiredSpast | https://github.com/WiredSpast/G-Node
G-Rust | Rust | WiredSpast | https://github.com/WiredSpast/G-Rust
GProgrammer<sup>3</sup> | Javascript | at15four2020 | https://github.com/at15four2020/GProgrammer/wiki GProgrammer<sup>3</sup> | Javascript | at15four2020 | https://github.com/at15four2020/GProgrammer/wiki
<sub>1: built-in in G-Earth through the [live scripting console](https://github.com/sirjonasxx/G-Earth/wiki/G-Python-qtConsole) </sub> <sub>1: built-in in G-Earth through the [live scripting console](https://github.com/sirjonasxx/G-Earth/wiki/G-Python-qtConsole) </sub>