mirror of
https://github.com/sirjonasxx/G-Earth.git
synced 2024-11-22 16:30:51 +01:00
Merge branch 'master' into dependabot/maven/G-Earth/ch.qos.logback-logback-core-1.3.12
This commit is contained in:
commit
186141c4a0
@ -10,7 +10,7 @@
|
|||||||
|
|
||||||
<properties>
|
<properties>
|
||||||
<javafx.version>1.8</javafx.version>
|
<javafx.version>1.8</javafx.version>
|
||||||
<jettyVersion>9.4.51.v20230217</jettyVersion>
|
<jettyVersion>9.4.53.v20231009</jettyVersion>
|
||||||
<logback.version>1.3.12</logback.version>
|
<logback.version>1.3.12</logback.version>
|
||||||
</properties>
|
</properties>
|
||||||
|
|
||||||
@ -209,7 +209,7 @@
|
|||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.json</groupId>
|
<groupId>org.json</groupId>
|
||||||
<artifactId>json</artifactId>
|
<artifactId>json</artifactId>
|
||||||
<version>20230227</version>
|
<version>20231013</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.fxmisc.richtext</groupId>
|
<groupId>org.fxmisc.richtext</groupId>
|
||||||
|
@ -13,6 +13,7 @@ public class HOffer {
|
|||||||
private int priceInCredits;
|
private int priceInCredits;
|
||||||
private int priceInActivityPoints;
|
private int priceInActivityPoints;
|
||||||
private int activityPointType;
|
private int activityPointType;
|
||||||
|
private int priceInSilver;
|
||||||
private boolean giftable;
|
private boolean giftable;
|
||||||
private List<HProduct> products = new ArrayList<>();
|
private List<HProduct> products = new ArrayList<>();
|
||||||
private int clubLevel;
|
private int clubLevel;
|
||||||
@ -28,6 +29,7 @@ public class HOffer {
|
|||||||
this.priceInCredits = packet.readInteger();
|
this.priceInCredits = packet.readInteger();
|
||||||
this.priceInActivityPoints = packet.readInteger();
|
this.priceInActivityPoints = packet.readInteger();
|
||||||
this.activityPointType = packet.readInteger();
|
this.activityPointType = packet.readInteger();
|
||||||
|
this.priceInSilver = packet.readInteger();
|
||||||
this.giftable = packet.readBoolean();
|
this.giftable = packet.readBoolean();
|
||||||
|
|
||||||
int productCount = packet.readInteger();
|
int productCount = packet.readInteger();
|
||||||
@ -65,6 +67,10 @@ public class HOffer {
|
|||||||
return activityPointType;
|
return activityPointType;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public int getPriceInSilver() {
|
||||||
|
return priceInSilver;
|
||||||
|
}
|
||||||
|
|
||||||
public boolean isGiftable() {
|
public boolean isGiftable() {
|
||||||
return giftable;
|
return giftable;
|
||||||
}
|
}
|
||||||
|
@ -38,7 +38,7 @@ public class ProxyProviderFactory {
|
|||||||
autoDetectHosts.add("game-it.habbo.com:30000");
|
autoDetectHosts.add("game-it.habbo.com:30000");
|
||||||
autoDetectHosts.add("game-nl.habbo.com:30000");
|
autoDetectHosts.add("game-nl.habbo.com:30000");
|
||||||
autoDetectHosts.add("game-tr.habbo.com:30000");
|
autoDetectHosts.add("game-tr.habbo.com:30000");
|
||||||
autoDetectHosts.add("game-us.habbo.com:38101");
|
autoDetectHosts.add("game-us.habbo.com:30000");
|
||||||
autoDetectHosts.add("game-s2.habbo.com:30000");
|
autoDetectHosts.add("game-s2.habbo.com:30000");
|
||||||
|
|
||||||
List<Object> additionalCachedHotels = Cacher.getList(HOTELS_CACHE_KEY);
|
List<Object> additionalCachedHotels = Cacher.getList(HOTELS_CACHE_KEY);
|
||||||
|
@ -6,6 +6,8 @@ import gearth.protocol.connection.HProxySetter;
|
|||||||
import gearth.protocol.connection.HState;
|
import gearth.protocol.connection.HState;
|
||||||
import gearth.protocol.connection.HStateSetter;
|
import gearth.protocol.connection.HStateSetter;
|
||||||
import gearth.protocol.connection.proxy.ProxyProvider;
|
import gearth.protocol.connection.proxy.ProxyProvider;
|
||||||
|
import gearth.protocol.connection.proxy.nitro.http.NitroAuthority;
|
||||||
|
import gearth.protocol.connection.proxy.nitro.http.NitroCertificateSniffingManager;
|
||||||
import gearth.protocol.connection.proxy.nitro.http.NitroHttpProxy;
|
import gearth.protocol.connection.proxy.nitro.http.NitroHttpProxy;
|
||||||
import gearth.protocol.connection.proxy.nitro.http.NitroHttpProxyServerCallback;
|
import gearth.protocol.connection.proxy.nitro.http.NitroHttpProxyServerCallback;
|
||||||
import gearth.protocol.connection.proxy.nitro.websocket.NitroWebsocketProxy;
|
import gearth.protocol.connection.proxy.nitro.websocket.NitroWebsocketProxy;
|
||||||
@ -13,7 +15,6 @@ import org.slf4j.Logger;
|
|||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.net.ServerSocket;
|
|
||||||
import java.util.concurrent.atomic.AtomicBoolean;
|
import java.util.concurrent.atomic.AtomicBoolean;
|
||||||
|
|
||||||
public class NitroProxyProvider implements ProxyProvider, NitroHttpProxyServerCallback, StateChangeListener {
|
public class NitroProxyProvider implements ProxyProvider, NitroHttpProxyServerCallback, StateChangeListener {
|
||||||
@ -32,11 +33,14 @@ public class NitroProxyProvider implements ProxyProvider, NitroHttpProxyServerCa
|
|||||||
private String originalCookies;
|
private String originalCookies;
|
||||||
|
|
||||||
public NitroProxyProvider(HProxySetter proxySetter, HStateSetter stateSetter, HConnection connection) {
|
public NitroProxyProvider(HProxySetter proxySetter, HStateSetter stateSetter, HConnection connection) {
|
||||||
|
final NitroAuthority authority = new NitroAuthority();
|
||||||
|
final NitroCertificateSniffingManager certificateManager = new NitroCertificateSniffingManager(authority);
|
||||||
|
|
||||||
this.proxySetter = proxySetter;
|
this.proxySetter = proxySetter;
|
||||||
this.stateSetter = stateSetter;
|
this.stateSetter = stateSetter;
|
||||||
this.connection = connection;
|
this.connection = connection;
|
||||||
this.nitroHttpProxy = new NitroHttpProxy(this);
|
this.nitroHttpProxy = new NitroHttpProxy(this, certificateManager);
|
||||||
this.nitroWebsocketProxy = new NitroWebsocketProxy(proxySetter, stateSetter, connection, this);
|
this.nitroWebsocketProxy = new NitroWebsocketProxy(proxySetter, stateSetter, connection, this, certificateManager);
|
||||||
this.abortLock = new AtomicBoolean();
|
this.abortLock = new AtomicBoolean();
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -122,7 +126,7 @@ public class NitroProxyProvider implements ProxyProvider, NitroHttpProxyServerCa
|
|||||||
public String replaceWebsocketServer(String configUrl, String websocketUrl) {
|
public String replaceWebsocketServer(String configUrl, String websocketUrl) {
|
||||||
originalWebsocketUrl = websocketUrl;
|
originalWebsocketUrl = websocketUrl;
|
||||||
|
|
||||||
return String.format("ws://127.0.0.1:%d", websocketPort);
|
return String.format("wss://127.0.0.1:%d", websocketPort);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -20,12 +20,31 @@ public class NitroCertificateSniffingManager implements MitmManager {
|
|||||||
private static final boolean DEBUG = false;
|
private static final boolean DEBUG = false;
|
||||||
|
|
||||||
private final BouncyCastleSslEngineSource sslEngineSource;
|
private final BouncyCastleSslEngineSource sslEngineSource;
|
||||||
|
private final Authority authority;
|
||||||
|
|
||||||
public NitroCertificateSniffingManager(Authority authority) throws RootCertificateException {
|
public NitroCertificateSniffingManager(Authority authority) {
|
||||||
|
this.authority = authority;
|
||||||
try {
|
try {
|
||||||
sslEngineSource = new BouncyCastleSslEngineSource(authority, true, true, null);
|
sslEngineSource = new BouncyCastleSslEngineSource(authority, true, true, null);
|
||||||
} catch (final Exception e) {
|
} catch (final Exception e) {
|
||||||
throw new RootCertificateException("Errors during assembling root CA.", e);
|
throw new RuntimeException(new RootCertificateException("Errors during assembling root CA.", e));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public Authority getAuthority() {
|
||||||
|
return authority;
|
||||||
|
}
|
||||||
|
|
||||||
|
public SSLEngine websocketSslEngine(String commonName) {
|
||||||
|
final SubjectAlternativeNameHolder san = new SubjectAlternativeNameHolder();
|
||||||
|
|
||||||
|
san.addDomainName("localhost");
|
||||||
|
san.addIpAddress("127.0.0.1");
|
||||||
|
|
||||||
|
try {
|
||||||
|
return sslEngineSource.createCertForHost(commonName, san);
|
||||||
|
} catch (Exception e) {
|
||||||
|
throw new FakeCertificateException("Failed to create WebSocket certificate", e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -12,8 +12,6 @@ import javafx.scene.control.ButtonType;
|
|||||||
import javafx.scene.control.Label;
|
import javafx.scene.control.Label;
|
||||||
import org.littleshoot.proxy.HttpProxyServer;
|
import org.littleshoot.proxy.HttpProxyServer;
|
||||||
import org.littleshoot.proxy.impl.DefaultHttpProxyServer;
|
import org.littleshoot.proxy.impl.DefaultHttpProxyServer;
|
||||||
import org.littleshoot.proxy.mitm.Authority;
|
|
||||||
import org.littleshoot.proxy.mitm.RootCertificateException;
|
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
@ -25,20 +23,20 @@ public class NitroHttpProxy {
|
|||||||
private static final String ADMIN_WARNING_KEY = "admin_warning_dialog";
|
private static final String ADMIN_WARNING_KEY = "admin_warning_dialog";
|
||||||
private static final AtomicBoolean SHUTDOWN_HOOK = new AtomicBoolean();
|
private static final AtomicBoolean SHUTDOWN_HOOK = new AtomicBoolean();
|
||||||
|
|
||||||
private final Authority authority;
|
|
||||||
private final NitroOsFunctions osFunctions;
|
private final NitroOsFunctions osFunctions;
|
||||||
private final NitroHttpProxyServerCallback serverCallback;
|
private final NitroHttpProxyServerCallback serverCallback;
|
||||||
|
private final NitroCertificateSniffingManager certificateManager;
|
||||||
|
|
||||||
private HttpProxyServer proxyServer = null;
|
private HttpProxyServer proxyServer = null;
|
||||||
|
|
||||||
public NitroHttpProxy(NitroHttpProxyServerCallback serverCallback) {
|
public NitroHttpProxy(NitroHttpProxyServerCallback serverCallback, NitroCertificateSniffingManager certificateManager) {
|
||||||
this.serverCallback = serverCallback;
|
this.serverCallback = serverCallback;
|
||||||
this.authority = new NitroAuthority();
|
this.certificateManager = certificateManager;
|
||||||
this.osFunctions = NitroOsFunctionsFactory.create();
|
this.osFunctions = NitroOsFunctionsFactory.create();
|
||||||
}
|
}
|
||||||
|
|
||||||
private boolean initializeCertificate() {
|
private boolean initializeCertificate() {
|
||||||
final File certificate = this.authority.aliasFile(".pem");
|
final File certificate = this.certificateManager.getAuthority().aliasFile(".pem");
|
||||||
|
|
||||||
// All good if certificate is already trusted.
|
// All good if certificate is already trusted.
|
||||||
if (this.osFunctions.isRootCertificateTrusted(certificate)) {
|
if (this.osFunctions.isRootCertificateTrusted(certificate)) {
|
||||||
@ -80,7 +78,7 @@ public class NitroHttpProxy {
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
return this.osFunctions.installRootCertificate(this.authority.aliasFile(".pem"));
|
return this.osFunctions.installRootCertificate(this.certificateManager.getAuthority().aliasFile(".pem"));
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -100,33 +98,28 @@ public class NitroHttpProxy {
|
|||||||
public boolean start() {
|
public boolean start() {
|
||||||
setupShutdownHook();
|
setupShutdownHook();
|
||||||
|
|
||||||
try {
|
proxyServer = DefaultHttpProxyServer.bootstrap()
|
||||||
proxyServer = DefaultHttpProxyServer.bootstrap()
|
.withPort(NitroConstants.HTTP_PORT)
|
||||||
.withPort(NitroConstants.HTTP_PORT)
|
.withManInTheMiddle(this.certificateManager)
|
||||||
.withManInTheMiddle(new NitroCertificateSniffingManager(authority))
|
.withFiltersSource(new NitroHttpProxyFilterSource(serverCallback))
|
||||||
.withFiltersSource(new NitroHttpProxyFilterSource(serverCallback))
|
.withTransparent(true)
|
||||||
.withTransparent(true)
|
.start();
|
||||||
.start();
|
|
||||||
|
|
||||||
if (!initializeCertificate()) {
|
if (!initializeCertificate()) {
|
||||||
proxyServer.stop();
|
proxyServer.stop();
|
||||||
|
|
||||||
System.out.println("Failed to initialize certificate");
|
System.out.println("Failed to initialize certificate");
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!registerProxy()) {
|
|
||||||
proxyServer.stop();
|
|
||||||
|
|
||||||
System.out.println("Failed to register certificate");
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
} catch (RootCertificateException e) {
|
|
||||||
e.printStackTrace();
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!registerProxy()) {
|
||||||
|
proxyServer.stop();
|
||||||
|
|
||||||
|
System.out.println("Failed to register certificate");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
public void pause() {
|
public void pause() {
|
||||||
|
@ -16,19 +16,24 @@ import java.util.regex.Pattern;
|
|||||||
|
|
||||||
public class NitroHttpProxyFilter extends HttpFiltersAdapter {
|
public class NitroHttpProxyFilter extends HttpFiltersAdapter {
|
||||||
|
|
||||||
private static final String NitroConfigSearch = "\"socket.url\"";
|
private static final String NitroConfigSearch = "socket.url";
|
||||||
private static final String NitroClientSearch = "configurationUrls:";
|
private static final String NitroClientSearch = "configurationUrls:";
|
||||||
private static final Pattern NitroConfigPattern = Pattern.compile("\"socket\\.url\":.?\"(wss?://.*?)\"", Pattern.MULTILINE);
|
private static final Pattern NitroConfigPattern = Pattern.compile("[\"']socket\\.url[\"']:(\\s+)?[\"'](wss?:.*?)[\"']", Pattern.MULTILINE);
|
||||||
|
|
||||||
// https://developers.cloudflare.com/fundamentals/get-started/reference/cloudflare-cookies/
|
// https://developers.cloudflare.com/fundamentals/get-started/reference/cloudflare-cookies/
|
||||||
private static final HashSet<String> CloudflareCookies = new HashSet<>(Arrays.asList(
|
private static final HashSet<String> CloudflareCookies = new HashSet<>(Arrays.asList(
|
||||||
"__cflb",
|
"__cflb",
|
||||||
"__cf_bm",
|
"__cf_bm",
|
||||||
|
"__cfseq",
|
||||||
"cf_ob_info",
|
"cf_ob_info",
|
||||||
"cf_use_ob",
|
"cf_use_ob",
|
||||||
"__cfwaitingroom",
|
"__cfwaitingroom",
|
||||||
"__cfruid",
|
"__cfruid",
|
||||||
"cf_clearance"
|
"_cfuvid",
|
||||||
|
"cf_clearance",
|
||||||
|
"cf_chl_rc_i",
|
||||||
|
"cf_chl_rc_ni",
|
||||||
|
"cf_chl_rc_m"
|
||||||
));
|
));
|
||||||
|
|
||||||
private static final String HeaderAcceptEncoding = "Accept-Encoding";
|
private static final String HeaderAcceptEncoding = "Accept-Encoding";
|
||||||
@ -95,11 +100,11 @@ public class NitroHttpProxyFilter extends HttpFiltersAdapter {
|
|||||||
final Matcher matcher = NitroConfigPattern.matcher(responseBody);
|
final Matcher matcher = NitroConfigPattern.matcher(responseBody);
|
||||||
|
|
||||||
if (matcher.find()) {
|
if (matcher.find()) {
|
||||||
final String originalWebsocket = matcher.group(1);
|
final String originalWebsocket = matcher.group(2).replace("\\/", "/");
|
||||||
final String replacementWebsocket = callback.replaceWebsocketServer(this.url, originalWebsocket);
|
final String replacementWebsocket = callback.replaceWebsocketServer(this.url, originalWebsocket);
|
||||||
|
|
||||||
if (replacementWebsocket != null) {
|
if (replacementWebsocket != null) {
|
||||||
responseBody = responseBody.replace(originalWebsocket, replacementWebsocket);
|
responseBody = responseBody.replace(matcher.group(2), replacementWebsocket);
|
||||||
responseModified = true;
|
responseModified = true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -0,0 +1,20 @@
|
|||||||
|
package gearth.protocol.connection.proxy.nitro.http;
|
||||||
|
|
||||||
|
import org.eclipse.jetty.util.ssl.SslContextFactory;
|
||||||
|
|
||||||
|
import javax.net.ssl.SSLEngine;
|
||||||
|
|
||||||
|
public class NitroSslContextFactory extends SslContextFactory.Server {
|
||||||
|
|
||||||
|
private final NitroCertificateSniffingManager certificateManager;
|
||||||
|
|
||||||
|
public NitroSslContextFactory(NitroCertificateSniffingManager certificateManager) {
|
||||||
|
this.certificateManager = certificateManager;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public SSLEngine newSSLEngine(String host, int port) {
|
||||||
|
System.out.printf("[NitroSslContextFactory] Creating SSLEngine for %s:%d%n", host, port);
|
||||||
|
return certificateManager.websocketSslEngine(host);
|
||||||
|
}
|
||||||
|
}
|
@ -1,6 +1,7 @@
|
|||||||
package gearth.protocol.connection.proxy.nitro.os;
|
package gearth.protocol.connection.proxy.nitro.os;
|
||||||
|
|
||||||
import gearth.misc.OSValidator;
|
import gearth.misc.OSValidator;
|
||||||
|
import gearth.protocol.connection.proxy.nitro.os.macos.NitroMacOS;
|
||||||
import gearth.protocol.connection.proxy.nitro.os.windows.NitroWindows;
|
import gearth.protocol.connection.proxy.nitro.os.windows.NitroWindows;
|
||||||
import org.apache.commons.lang3.NotImplementedException;
|
import org.apache.commons.lang3.NotImplementedException;
|
||||||
|
|
||||||
@ -15,7 +16,10 @@ public final class NitroOsFunctionsFactory {
|
|||||||
throw new NotImplementedException("unix nitro is not implemented yet");
|
throw new NotImplementedException("unix nitro is not implemented yet");
|
||||||
}
|
}
|
||||||
|
|
||||||
throw new NotImplementedException("macOS nitro is not implemented yet");
|
if (OSValidator.isMac()) {
|
||||||
}
|
return new NitroMacOS();
|
||||||
|
}
|
||||||
|
|
||||||
|
throw new NotImplementedException("unsupported operating system");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -0,0 +1,96 @@
|
|||||||
|
package gearth.protocol.connection.proxy.nitro.os.macos;
|
||||||
|
|
||||||
|
import gearth.misc.RuntimeUtil;
|
||||||
|
import gearth.protocol.connection.proxy.nitro.os.NitroOsFunctions;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.IOException;
|
||||||
|
|
||||||
|
public class NitroMacOS implements NitroOsFunctions {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Semicolon separated hosts to ignore for proxying.
|
||||||
|
*/
|
||||||
|
private static final String PROXY_IGNORE = "discord.com;discordapp.com;github.com;";
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks if the certificate is trusted by the local machine.
|
||||||
|
* @param certificate Absolute path to the certificate.
|
||||||
|
* @return true if trusted
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public boolean isRootCertificateTrusted(File certificate) {
|
||||||
|
try {
|
||||||
|
final String output = RuntimeUtil.getCommandOutput(new String[] {"sh", "-c", "security verify-cert -c \"" + certificate.getAbsolutePath() + "\""});
|
||||||
|
|
||||||
|
return !output.contains("CSSMERR_TP_NOT_TRUSTED");
|
||||||
|
} catch (IOException e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean installRootCertificate(File certificate) {
|
||||||
|
final String certificatePath = certificate.getAbsolutePath();
|
||||||
|
|
||||||
|
try {
|
||||||
|
// Install the certificate
|
||||||
|
Process process = new ProcessBuilder("sh", "-c", "sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain \"" + certificatePath + "\"")
|
||||||
|
.inheritIO()
|
||||||
|
.start();
|
||||||
|
|
||||||
|
// Wait for the process to complete
|
||||||
|
int exitCode = process.waitFor();
|
||||||
|
if (exitCode != 0) {
|
||||||
|
System.out.printf("security add-trusted-cert command exited with exit code %d%n", exitCode);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
|
} catch (IOException | InterruptedException e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean registerSystemProxy(String host, int port) {
|
||||||
|
try {
|
||||||
|
final String[] ignoreHosts = PROXY_IGNORE.split(";");
|
||||||
|
|
||||||
|
// Enable proxy
|
||||||
|
Runtime.getRuntime().exec("networksetup -setwebproxy Wi-Fi " + host + " " + port);
|
||||||
|
Runtime.getRuntime().exec("networksetup -setsecurewebproxy Wi-Fi " + host + " " + port);
|
||||||
|
|
||||||
|
// Set proxy bypass domains
|
||||||
|
for (String ignoreHost : ignoreHosts) {
|
||||||
|
Runtime.getRuntime().exec("networksetup -setproxybypassdomains Wi-Fi " + ignoreHost);
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
|
} catch (IOException e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean unregisterSystemProxy() {
|
||||||
|
try {
|
||||||
|
// Disable proxy
|
||||||
|
Runtime.getRuntime().exec("networksetup -setwebproxystate Wi-Fi off");
|
||||||
|
Runtime.getRuntime().exec("networksetup -setsecurewebproxystate Wi-Fi off");
|
||||||
|
|
||||||
|
return true;
|
||||||
|
} catch (IOException e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -15,7 +15,8 @@ public class NitroWindows implements NitroOsFunctions {
|
|||||||
/**
|
/**
|
||||||
* Semicolon separated hosts to ignore for proxying.
|
* Semicolon separated hosts to ignore for proxying.
|
||||||
*/
|
*/
|
||||||
private static final String PROXY_IGNORE = "discord.com;discordapp.com;github.com;";
|
// habba.io;
|
||||||
|
private static final String PROXY_IGNORE = "discord.com;discordapp.com;github.com;challenges.cloudflare.com;";
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Checks if the certificate is trusted by the local machine.
|
* Checks if the certificate is trusted by the local machine.
|
||||||
|
@ -4,7 +4,8 @@ import gearth.protocol.HConnection;
|
|||||||
import gearth.protocol.connection.HProxySetter;
|
import gearth.protocol.connection.HProxySetter;
|
||||||
import gearth.protocol.connection.HStateSetter;
|
import gearth.protocol.connection.HStateSetter;
|
||||||
import gearth.protocol.connection.proxy.nitro.NitroProxyProvider;
|
import gearth.protocol.connection.proxy.nitro.NitroProxyProvider;
|
||||||
import org.eclipse.jetty.server.Connector;
|
import gearth.protocol.connection.proxy.nitro.http.NitroCertificateSniffingManager;
|
||||||
|
import gearth.protocol.connection.proxy.nitro.http.NitroSslContextFactory;
|
||||||
import org.eclipse.jetty.server.Handler;
|
import org.eclipse.jetty.server.Handler;
|
||||||
import org.eclipse.jetty.server.Server;
|
import org.eclipse.jetty.server.Server;
|
||||||
import org.eclipse.jetty.server.ServerConnector;
|
import org.eclipse.jetty.server.ServerConnector;
|
||||||
@ -21,19 +22,37 @@ public class NitroWebsocketProxy {
|
|||||||
private final HStateSetter stateSetter;
|
private final HStateSetter stateSetter;
|
||||||
private final HConnection connection;
|
private final HConnection connection;
|
||||||
private final NitroProxyProvider proxyProvider;
|
private final NitroProxyProvider proxyProvider;
|
||||||
|
private final NitroCertificateSniffingManager certificateManager;
|
||||||
|
|
||||||
private final Server server;
|
private final Server server;
|
||||||
|
private final int serverPort;
|
||||||
|
|
||||||
public NitroWebsocketProxy(HProxySetter proxySetter, HStateSetter stateSetter, HConnection connection, NitroProxyProvider proxyProvider) {
|
public NitroWebsocketProxy(HProxySetter proxySetter,
|
||||||
|
HStateSetter stateSetter,
|
||||||
|
HConnection connection,
|
||||||
|
NitroProxyProvider proxyProvider,
|
||||||
|
NitroCertificateSniffingManager certificateManager) {
|
||||||
this.proxySetter = proxySetter;
|
this.proxySetter = proxySetter;
|
||||||
this.stateSetter = stateSetter;
|
this.stateSetter = stateSetter;
|
||||||
this.connection = connection;
|
this.connection = connection;
|
||||||
this.proxyProvider = proxyProvider;
|
this.proxyProvider = proxyProvider;
|
||||||
this.server = new Server(0);
|
this.certificateManager = certificateManager;
|
||||||
|
this.server = new Server();
|
||||||
|
this.serverPort = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
public boolean start() {
|
public boolean start() {
|
||||||
try {
|
try {
|
||||||
|
// Configure SSL.
|
||||||
|
final NitroSslContextFactory sslContextFactory = new NitroSslContextFactory(this.certificateManager);
|
||||||
|
final ServerConnector sslConnector = new ServerConnector(server, sslContextFactory);
|
||||||
|
|
||||||
|
sslConnector.setPort(this.serverPort);
|
||||||
|
|
||||||
|
// Add SSL to the server.
|
||||||
|
server.addConnector(sslConnector);
|
||||||
|
|
||||||
|
// Configure the WebSocket.
|
||||||
final ServletContextHandler context = new ServletContextHandler(ServletContextHandler.SESSIONS);
|
final ServletContextHandler context = new ServletContextHandler(ServletContextHandler.SESSIONS);
|
||||||
context.setContextPath("/");
|
context.setContextPath("/");
|
||||||
|
|
||||||
|
@ -39,6 +39,7 @@ G-Python<sup>1</sup> | Python | sirjonasxx | https://github.com/sirjonasxx/G-Pyt
|
|||||||
Xabbo | C# | b7 | https://github.com/b7c/Xabbo.GEarth
|
Xabbo | C# | b7 | https://github.com/b7c/Xabbo.GEarth
|
||||||
Xabbo scripter<sup>2</sup> | C# | b7 | https://github.com/b7c/Xabbo.Scripter
|
Xabbo scripter<sup>2</sup> | C# | b7 | https://github.com/b7c/Xabbo.Scripter
|
||||||
G-Node | Node.js | WiredSpast | https://github.com/WiredSpast/G-Node
|
G-Node | Node.js | WiredSpast | https://github.com/WiredSpast/G-Node
|
||||||
|
G-Rust | Rust | WiredSpast | https://github.com/WiredSpast/G-Rust
|
||||||
GProgrammer<sup>3</sup> | Javascript | at15four2020 | https://github.com/at15four2020/GProgrammer/wiki
|
GProgrammer<sup>3</sup> | Javascript | at15four2020 | https://github.com/at15four2020/GProgrammer/wiki
|
||||||
|
|
||||||
<sub>1: built-in in G-Earth through the [live scripting console](https://github.com/sirjonasxx/G-Earth/wiki/G-Python-qtConsole) </sub>
|
<sub>1: built-in in G-Earth through the [live scripting console](https://github.com/sirjonasxx/G-Earth/wiki/G-Python-qtConsole) </sub>
|
||||||
|
Loading…
Reference in New Issue
Block a user