2264 lines
64 KiB
SourcePawn
2264 lines
64 KiB
SourcePawn
/**
|
|
* sourcebans.sp
|
|
*
|
|
* This file contains all Source Server Plugin Functions
|
|
* @author SourceBans Development Team
|
|
* @version 0.0.0.$Rev: 108 $
|
|
* @copyright InterWave Studios (www.interwavestudios.com)
|
|
* @package SourceBans
|
|
* @link http://www.sourcebans.net
|
|
*/
|
|
|
|
#pragma semicolon 1
|
|
#include <sourcemod>
|
|
#include <sourcebans>
|
|
|
|
#undef REQUIRE_PLUGIN
|
|
#include <adminmenu>
|
|
#include "dbi.inc"
|
|
|
|
#define SB_VERSION "1.4.8"
|
|
|
|
//GLOBAL DEFINES
|
|
#define YELLOW 0x01
|
|
#define NAMECOLOR 0x02
|
|
#define TEAMCOLOR 0x03
|
|
#define GREEN 0x04
|
|
|
|
#define DISABLE_ADDBAN 1
|
|
#define DISABLE_UNBAN 2
|
|
|
|
//#define DEBUG
|
|
|
|
enum State /* ConfigState */
|
|
{
|
|
ConfigStateNone = 0,
|
|
ConfigStateConfig,
|
|
ConfigStateReasons,
|
|
ConfigStateHacking
|
|
}
|
|
|
|
new g_BanTarget[MAXPLAYERS+1] = {-1, ...};
|
|
new g_BanTime[MAXPLAYERS+1] = {-1, ...};
|
|
|
|
new State:ConfigState;
|
|
new Handle:ConfigParser;
|
|
|
|
new Handle:hTopMenu = INVALID_HANDLE;
|
|
|
|
new const String:BLANK[] = "";
|
|
new const String:Prefix[] = "[SourceBans] ";
|
|
|
|
new String:ServerIp[24];
|
|
new String:ServerPort[7];
|
|
new String:DatabasePrefix[10] = "sb";
|
|
new String:WebsiteAddress[128];
|
|
|
|
/* Admin Stuff*/
|
|
new AdminCachePart:loadPart;
|
|
new bool:loadAdmins;
|
|
new bool:loadGroups;
|
|
new bool:loadOverrides;
|
|
new curLoading=0;
|
|
new AdminFlag:g_FlagLetters[26];
|
|
|
|
/* Admin KeyValues */
|
|
new String:groupsLoc[128];
|
|
new String:adminsLoc[128];
|
|
|
|
/* Cvar handle*/
|
|
new Handle:CvarHostIp;
|
|
new Handle:CvarPort;
|
|
|
|
/* Database handle */
|
|
new Handle:Database;
|
|
new Handle:SQLiteDB;
|
|
|
|
/* Menu file globals */
|
|
new Handle:ReasonMenuHandle;
|
|
new Handle:HackingMenuHandle;
|
|
|
|
/* Datapack and Timer handles */
|
|
new Handle:PlayerRecheck[MAXPLAYERS + 1] = {INVALID_HANDLE, ...};
|
|
new Handle:PlayerDataPack[MAXPLAYERS + 1] = {INVALID_HANDLE, ...};
|
|
|
|
/* Player ban check status */
|
|
new bool:PlayerStatus[MAXPLAYERS + 1];
|
|
|
|
/* Disable of addban and unban */
|
|
new CommandDisable;
|
|
new bool:backupConfig = true;
|
|
new bool:enableAdmins = true;
|
|
|
|
/* Require a lastvisited from SB site */
|
|
new bool:requireSiteLogin = false;
|
|
|
|
/* Log Stuff */
|
|
new String:logFile[256];
|
|
|
|
/* Own Chat Reason */
|
|
new g_ownReasons[MAXPLAYERS+1] = {false, ...};
|
|
|
|
new MaxSlots;
|
|
new Float:RetryTime = 15.0;
|
|
new ProcessQueueTime = 5;
|
|
new bool:LateLoaded;
|
|
new bool:AutoAdd;
|
|
new bool:g_bConnecting = false;
|
|
|
|
new serverID = -1;
|
|
|
|
public Plugin:myinfo =
|
|
{
|
|
name = "SourceBans",
|
|
author = "SourceBans Development Team",
|
|
description = "Advanced ban management for the Source engine",
|
|
version = SB_VERSION,
|
|
url = "http://www.sourcebans.net"
|
|
};
|
|
|
|
#if SOURCEMOD_V_MAJOR >= 1 && SOURCEMOD_V_MINOR >= 3
|
|
public APLRes:AskPluginLoad2(Handle:myself, bool:late, String:error[], err_max)
|
|
#else
|
|
public bool:AskPluginLoad(Handle:myself, bool:late, String:error[], err_max)
|
|
#endif
|
|
{
|
|
RegPluginLibrary("sourcebans");
|
|
CreateNative("SBBanPlayer", Native_SBBanPlayer);
|
|
LateLoaded = late;
|
|
|
|
#if SOURCEMOD_V_MAJOR >= 1 && SOURCEMOD_V_MINOR >= 3
|
|
return APLRes_Success;
|
|
#else
|
|
return true;
|
|
#endif
|
|
}
|
|
|
|
public OnPluginStart()
|
|
{
|
|
LoadTranslations("common.phrases");
|
|
LoadTranslations("plugin.basecommands");
|
|
LoadTranslations("sourcebans.phrases");
|
|
LoadTranslations("basebans.phrases");
|
|
loadAdmins = loadGroups = loadOverrides = false;
|
|
|
|
CvarHostIp = FindConVar("hostip");
|
|
CvarPort = FindConVar("hostport");
|
|
CreateConVar("sb_version", SB_VERSION, _, FCVAR_PLUGIN|FCVAR_SPONLY|FCVAR_REPLICATED|FCVAR_NOTIFY);
|
|
RegServerCmd("sm_rehash",sm_rehash,"Reload SQL admins");
|
|
RegAdminCmd("sm_ban", CommandBan, ADMFLAG_BAN, "sm_ban <#userid|name> <minutes|0> [reason]");
|
|
RegAdminCmd("sm_banip", CommandBanIp, ADMFLAG_BAN, "sm_banip <ip|#userid|name> <time> [reason]");
|
|
RegAdminCmd("sm_addban", CommandAddBan, ADMFLAG_RCON, "sm_addban <time> <steamid> [reason]");
|
|
RegAdminCmd("sm_unban", CommandUnban, ADMFLAG_UNBAN, "sm_unban <steamid|ip> [reason]");
|
|
RegAdminCmd("sb_reload",
|
|
_CmdReload,
|
|
ADMFLAG_RCON,
|
|
"Reload sourcebans config and ban reason menu options",
|
|
BLANK);
|
|
|
|
RegConsoleCmd("say", ChatHook);
|
|
RegConsoleCmd("say_team", ChatHook);
|
|
|
|
if((ReasonMenuHandle = CreateMenu(ReasonSelected)) != INVALID_HANDLE)
|
|
{
|
|
SetMenuPagination(ReasonMenuHandle, 8);
|
|
SetMenuExitBackButton(ReasonMenuHandle, true);
|
|
}
|
|
|
|
if((HackingMenuHandle = CreateMenu(HackingSelected)) != INVALID_HANDLE)
|
|
{
|
|
SetMenuPagination(HackingMenuHandle, 8);
|
|
SetMenuExitBackButton(HackingMenuHandle, true);
|
|
}
|
|
|
|
g_FlagLetters['a'-'a'] = Admin_Reservation;
|
|
g_FlagLetters['b'-'a'] = Admin_Generic;
|
|
g_FlagLetters['c'-'a'] = Admin_Kick;
|
|
g_FlagLetters['d'-'a'] = Admin_Ban;
|
|
g_FlagLetters['e'-'a'] = Admin_Unban;
|
|
g_FlagLetters['f'-'a'] = Admin_Slay;
|
|
g_FlagLetters['g'-'a'] = Admin_Changemap;
|
|
g_FlagLetters['h'-'a'] = Admin_Convars;
|
|
g_FlagLetters['i'-'a'] = Admin_Config;
|
|
g_FlagLetters['j'-'a'] = Admin_Chat;
|
|
g_FlagLetters['k'-'a'] = Admin_Vote;
|
|
g_FlagLetters['l'-'a'] = Admin_Password;
|
|
g_FlagLetters['m'-'a'] = Admin_RCON;
|
|
g_FlagLetters['n'-'a'] = Admin_Cheats;
|
|
g_FlagLetters['o'-'a'] = Admin_Custom1;
|
|
g_FlagLetters['p'-'a'] = Admin_Custom2;
|
|
g_FlagLetters['q'-'a'] = Admin_Custom3;
|
|
g_FlagLetters['r'-'a'] = Admin_Custom4;
|
|
g_FlagLetters['s'-'a'] = Admin_Custom5;
|
|
g_FlagLetters['t'-'a'] = Admin_Custom6;
|
|
g_FlagLetters['z'-'a'] = Admin_Root;
|
|
|
|
|
|
BuildPath(Path_SM, logFile, sizeof(logFile), "logs/sourcebans.log");
|
|
g_bConnecting = true;
|
|
|
|
// Catch config error and show link to FAQ
|
|
if(!SQL_CheckConfig("sourcebans"))
|
|
{
|
|
if(ReasonMenuHandle != INVALID_HANDLE)
|
|
CloseHandle(ReasonMenuHandle);
|
|
if(HackingMenuHandle != INVALID_HANDLE)
|
|
CloseHandle(HackingMenuHandle);
|
|
LogToFile(logFile, "Database failure: Could not find Database conf \"sourcebans\". See FAQ: http://sourcebans.net/node/19");
|
|
SetFailState("Database failure: Could not find Database conf \"sourcebans\"");
|
|
return;
|
|
}
|
|
SQL_TConnect(GotDatabase, "sourcebans");
|
|
|
|
BuildPath(Path_SM,groupsLoc,sizeof(groupsLoc),"configs/admin_groups.cfg");
|
|
|
|
BuildPath(Path_SM,adminsLoc,sizeof(adminsLoc),"configs/admins.cfg");
|
|
|
|
InitializeBackupDB();
|
|
|
|
// This timer is what processes the SQLite queue when the database is unavailable
|
|
CreateTimer(float(ProcessQueueTime * 60), ProcessQueue);
|
|
|
|
/* Account for late loading */
|
|
if(LateLoaded)
|
|
{
|
|
decl String:auth[30];
|
|
for(new i = 1; i <= GetMaxClients(); i++)
|
|
{
|
|
if(IsClientConnected(i) && !IsFakeClient(i))
|
|
{
|
|
PlayerStatus[i] = false;
|
|
}
|
|
if(IsClientInGame(i) && !IsFakeClient(i))
|
|
{
|
|
GetClientAuthString(i, auth, sizeof(auth));
|
|
OnClientAuthorized(i, auth);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
public OnAllPluginsLoaded()
|
|
{
|
|
new Handle:topmenu;
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "OnAllPluginsLoaded()");
|
|
#endif
|
|
|
|
if (LibraryExists("adminmenu") && ((topmenu = GetAdminTopMenu()) != INVALID_HANDLE))
|
|
{
|
|
OnAdminMenuReady(topmenu);
|
|
}
|
|
}
|
|
|
|
public OnConfigsExecuted()
|
|
{
|
|
decl String:filename[200];
|
|
BuildPath(Path_SM, filename, sizeof(filename), "plugins/basebans.smx");
|
|
if(FileExists(filename))
|
|
{
|
|
decl String:newfilename[200];
|
|
BuildPath(Path_SM, newfilename, sizeof(newfilename), "plugins/disabled/basebans.smx");
|
|
ServerCommand("sm plugins unload basebans");
|
|
if(FileExists(newfilename))
|
|
DeleteFile(newfilename);
|
|
RenameFile(newfilename, filename);
|
|
LogToFile(logFile, "plugins/basebans.smx was unloaded and moved to plugins/disabled/basebans.smx");
|
|
}
|
|
}
|
|
|
|
public OnMapStart()
|
|
{
|
|
MaxSlots = GetMaxClients();
|
|
ResetSettings();
|
|
}
|
|
|
|
public OnMapEnd()
|
|
{
|
|
for(new i = 0; i <= MaxSlots; i++)
|
|
{
|
|
if(PlayerDataPack[i] != INVALID_HANDLE)
|
|
{
|
|
/* Need to close reason pack */
|
|
CloseHandle(PlayerDataPack[i]);
|
|
PlayerDataPack[i] = INVALID_HANDLE;
|
|
}
|
|
}
|
|
}
|
|
|
|
// CLIENT CONNECTION FUNCTIONS //
|
|
|
|
public Action:OnClientPreAdminCheck(client)
|
|
{
|
|
if (curLoading > 0)
|
|
return Plugin_Stop;
|
|
return Plugin_Continue;
|
|
}
|
|
|
|
public OnClientDisconnect(client)
|
|
{
|
|
if(PlayerRecheck[client] != INVALID_HANDLE)
|
|
{
|
|
KillTimer(PlayerRecheck[client]);
|
|
PlayerRecheck[client] = INVALID_HANDLE;
|
|
}
|
|
g_ownReasons[client] = false;
|
|
}
|
|
|
|
public bool:OnClientConnect(client, String:rejectmsg[], maxlen)
|
|
{
|
|
PlayerStatus[client] = false;
|
|
return true;
|
|
}
|
|
|
|
public OnClientAuthorized(client, const String:auth[])
|
|
{
|
|
/* Do not check bots nor check player with lan steamid. */
|
|
if(auth[0] == 'B' || auth[9] == 'L' || Database == INVALID_HANDLE)
|
|
{
|
|
PlayerStatus[client] = true;
|
|
return;
|
|
}
|
|
|
|
decl String:Query[256], String:ip[30];
|
|
GetClientIP(client, ip, sizeof(ip));
|
|
FormatEx(Query, sizeof(Query), "SELECT bid FROM %s_bans WHERE ((type = 0 AND authid REGEXP '^STEAM_[0-9]:%s$') OR (type = 1 AND ip = '%s')) AND (length = '0' OR ends > UNIX_TIMESTAMP()) AND RemoveType IS NULL", DatabasePrefix, auth[8], ip);
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "Checking ban for: %s", auth);
|
|
#endif
|
|
|
|
SQL_TQuery(Database, VerifyBan, Query, GetClientUserId(client), DBPrio_High);
|
|
}
|
|
|
|
public OnRebuildAdminCache(AdminCachePart:part)
|
|
{
|
|
loadPart = part;
|
|
switch(loadPart)
|
|
{
|
|
case AdminCache_Overrides:
|
|
loadOverrides = true;
|
|
case AdminCache_Groups:
|
|
loadGroups = true;
|
|
case AdminCache_Admins:
|
|
loadAdmins = true;
|
|
}
|
|
if(enableAdmins)
|
|
{
|
|
if(Database == INVALID_HANDLE) {
|
|
if(!g_bConnecting) {
|
|
g_bConnecting = true;
|
|
SQL_TConnect(GotDatabase,"sourcebans");
|
|
}
|
|
}
|
|
else {
|
|
GotDatabase(Database,Database,"",0);
|
|
}
|
|
}
|
|
}
|
|
|
|
// COMMAND CODE //
|
|
|
|
public Action:ChatHook(client, args)
|
|
{
|
|
// is this player preparing to ban someone
|
|
if (g_ownReasons[client])
|
|
{
|
|
// get the reason
|
|
new String:reason[512];
|
|
GetCmdArgString(reason, sizeof(reason));
|
|
StripQuotes(reason);
|
|
|
|
g_ownReasons[client] = false;
|
|
|
|
if(StrEqual(reason[0], "!noreason"))
|
|
{
|
|
PrintToChat(client, "%c[%cSourceBans%c]%c %t", GREEN, NAMECOLOR, GREEN, NAMECOLOR, "Chat Reason Aborted");
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
// ban him!
|
|
PrepareBan(client, g_BanTarget[client], g_BanTime[client], reason, sizeof(reason));
|
|
|
|
// block the reason to be sent in chat
|
|
return Plugin_Handled;
|
|
}
|
|
return Plugin_Continue;
|
|
}
|
|
|
|
public Action:_CmdReload(client, args)
|
|
{
|
|
ResetSettings();
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
public Action:CommandBan(client, args)
|
|
{
|
|
if(args < 2)
|
|
{
|
|
ReplyToCommand(client, "%sUsage: sm_ban <#userid|name> <time|0> [reason]", Prefix);
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
// This is mainly for me sanity since client used to be called admin and target used to be called client
|
|
new admin = client;
|
|
|
|
// Get the target, find target returns a message on failure so we do not
|
|
decl String:buffer[100];
|
|
GetCmdArg(1, buffer, sizeof(buffer));
|
|
new target = FindTarget(client, buffer, true);
|
|
if(target == -1)
|
|
{
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
// Get the ban time
|
|
GetCmdArg(2, buffer, sizeof(buffer));
|
|
new time = StringToInt(buffer);
|
|
if(!time && client && !(GetUserFlagBits(client) & (ADMFLAG_UNBAN|ADMFLAG_ROOT)))
|
|
{
|
|
ReplyToCommand(client, "You do not have Perm Ban Permission");
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
// Get the reason
|
|
decl String:reason[128];
|
|
if(args >= 3)
|
|
{
|
|
GetCmdArg(3, reason, sizeof(reason));
|
|
}
|
|
else
|
|
{
|
|
reason[0] = '\0';
|
|
}
|
|
|
|
g_BanTarget[client] = target;
|
|
g_BanTime[client] = time;
|
|
|
|
if(!PlayerStatus[target])
|
|
{
|
|
// The target has not been banned verify. It must be completed before you can ban anyone.
|
|
ReplyToCommand(admin, "%c[%cSourceBans%c]%c %t", GREEN, NAMECOLOR, GREEN, NAMECOLOR, "Ban Not Verified");
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
|
|
CreateBan(client, target, time, reason);
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
public Action:CommandBanIp(client, args)
|
|
{
|
|
if (args < 2)
|
|
{
|
|
ReplyToCommand(client, "%sUsage: sm_banip <ip|#userid|name> <time> [reason]", Prefix);
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
decl len, next_len;
|
|
decl String:Arguments[256];
|
|
decl String:arg[50], String:time[20];
|
|
|
|
GetCmdArgString(Arguments, sizeof(Arguments));
|
|
len = BreakString(Arguments, arg, sizeof(arg));
|
|
|
|
if ((next_len = BreakString(Arguments[len], time, sizeof(time))) != -1)
|
|
{
|
|
len += next_len;
|
|
}
|
|
else
|
|
{
|
|
len = 0;
|
|
Arguments[0] = '\0';
|
|
}
|
|
|
|
decl String:target_name[MAX_TARGET_LENGTH];
|
|
decl target_list[1], bool:tn_is_ml;
|
|
new target = -1;
|
|
|
|
if (ProcessTargetString(
|
|
arg,
|
|
client,
|
|
target_list,
|
|
1,
|
|
COMMAND_FILTER_CONNECTED|COMMAND_FILTER_NO_MULTI,
|
|
target_name,
|
|
sizeof(target_name),
|
|
tn_is_ml) > 0)
|
|
{
|
|
target = target_list[0];
|
|
|
|
if (!IsFakeClient(target) && CanUserTarget(client, target))
|
|
GetClientIP(target, arg, sizeof(arg));
|
|
}
|
|
|
|
decl String:adminIp[24], String:adminAuth[64];
|
|
new minutes = StringToInt(time);
|
|
if(!minutes && client && !(GetUserFlagBits(client) & (ADMFLAG_UNBAN|ADMFLAG_ROOT)))
|
|
{
|
|
ReplyToCommand(client, "You do not have Perm Ban Permission");
|
|
return Plugin_Handled;
|
|
}
|
|
if(!client)
|
|
{
|
|
// setup dummy adminAuth and adminIp for server
|
|
strcopy(adminAuth, sizeof(adminAuth), "STEAM_ID_SERVER");
|
|
strcopy(adminIp, sizeof(adminIp), ServerIp);
|
|
} else {
|
|
GetClientIP(client, adminIp, sizeof(adminIp));
|
|
GetClientAuthString(client, adminAuth, sizeof(adminAuth));
|
|
}
|
|
|
|
// Pack everything into a data pack so we can retain it
|
|
new Handle:dataPack = CreateDataPack();
|
|
WritePackCell(dataPack, client);
|
|
WritePackCell(dataPack, minutes);
|
|
WritePackString(dataPack, Arguments[len]);
|
|
WritePackString(dataPack, arg);
|
|
WritePackString(dataPack, adminAuth);
|
|
WritePackString(dataPack, adminIp);
|
|
|
|
decl String:Query[256];
|
|
FormatEx(Query, sizeof(Query), "SELECT bid FROM %s_bans WHERE type = 1 AND ip = '%s' AND (length = 0 OR ends > UNIX_TIMESTAMP()) AND RemoveType IS NULL",
|
|
DatabasePrefix, arg);
|
|
|
|
SQL_TQuery(Database, SelectBanIpCallback, Query, dataPack, DBPrio_High);
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
public Action:CommandUnban(client, args)
|
|
{
|
|
if(args < 1)
|
|
{
|
|
ReplyToCommand(client, "%sUsage: sm_unban <steamid|ip> [reason]", Prefix);
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
if(CommandDisable & DISABLE_UNBAN)
|
|
{
|
|
// They must go to the website to unban people
|
|
ReplyToCommand(client, "%s%t", Prefix, "Can Not Unban", WebsiteAddress);
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
decl len, String:Arguments[256], String:arg[50], String:adminAuth[64];
|
|
GetCmdArgString(Arguments, sizeof(Arguments));
|
|
|
|
if ((len = BreakString(Arguments, arg, sizeof(arg))) == -1)
|
|
{
|
|
len = 0;
|
|
Arguments[0] = '\0';
|
|
}
|
|
if(!client)
|
|
{
|
|
// setup dummy adminAuth and adminIp for server
|
|
strcopy(adminAuth, sizeof(adminAuth), "STEAM_ID_SERVER");
|
|
} else {
|
|
GetClientAuthString(client, adminAuth, sizeof(adminAuth));
|
|
}
|
|
|
|
// Pack everything into a data pack so we can retain it
|
|
new Handle:dataPack = CreateDataPack();
|
|
WritePackCell(dataPack, client);
|
|
WritePackString(dataPack, Arguments[len]);
|
|
WritePackString(dataPack, arg);
|
|
WritePackString(dataPack, adminAuth);
|
|
|
|
decl String:query[200];
|
|
if (strncmp(arg, "STEAM_", 6) == 0)
|
|
{
|
|
Format(query, sizeof(query), "SELECT bid FROM %s_bans WHERE (type = 0 AND authid = '%s') AND (length = '0' OR ends > UNIX_TIMESTAMP()) AND RemoveType IS NULL", DatabasePrefix, arg);
|
|
} else {
|
|
Format(query, sizeof(query), "SELECT bid FROM %s_bans WHERE (type = 1 AND ip = '%s') AND (length = '0' OR ends > UNIX_TIMESTAMP()) AND RemoveType IS NULL", DatabasePrefix, arg);
|
|
}
|
|
SQL_TQuery(Database, SelectUnbanCallback, query, dataPack);
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
public Action:CommandAddBan(client, args)
|
|
{
|
|
if (args < 2)
|
|
{
|
|
ReplyToCommand(client, "%sUsage: sm_addban <time> <steamid> [reason]", Prefix);
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
if(CommandDisable & DISABLE_ADDBAN)
|
|
{
|
|
// They must go to the website to add bans
|
|
ReplyToCommand(client, "%s%t", Prefix, "Can Not Add Ban", WebsiteAddress);
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
decl String:arg_string[256], String:time[50], String:authid[50];
|
|
GetCmdArgString(arg_string, sizeof(arg_string));
|
|
|
|
new len, total_len;
|
|
|
|
/* Get time */
|
|
if ((len = BreakString(arg_string, time, sizeof(time))) == -1)
|
|
{
|
|
ReplyToCommand(client, "%sUsage: sm_addban <time> <steamid> [reason]", Prefix);
|
|
return Plugin_Handled;
|
|
}
|
|
total_len += len;
|
|
|
|
/* Get steamid */
|
|
if ((len = BreakString(arg_string[total_len], authid, sizeof(authid))) != -1)
|
|
{
|
|
total_len += len;
|
|
}
|
|
else
|
|
{
|
|
total_len = 0;
|
|
arg_string[0] = '\0';
|
|
}
|
|
|
|
decl String:adminIp[24], String:adminAuth[64];
|
|
new minutes = StringToInt(time);
|
|
if(!minutes && client && !(GetUserFlagBits(client) & (ADMFLAG_UNBAN|ADMFLAG_ROOT)))
|
|
{
|
|
ReplyToCommand(client, "You do not have Perm Ban Permission");
|
|
return Plugin_Handled;
|
|
}
|
|
if(!client)
|
|
{
|
|
// setup dummy adminAuth and adminIp for server
|
|
strcopy(adminAuth, sizeof(adminAuth), "STEAM_ID_SERVER");
|
|
strcopy(adminIp, sizeof(adminIp), ServerIp);
|
|
} else {
|
|
GetClientIP(client, adminIp, sizeof(adminIp));
|
|
GetClientAuthString(client, adminAuth, sizeof(adminAuth));
|
|
}
|
|
|
|
// Pack everything into a data pack so we can retain it
|
|
new Handle:dataPack = CreateDataPack();
|
|
WritePackCell(dataPack, client);
|
|
WritePackCell(dataPack, minutes);
|
|
WritePackString(dataPack, arg_string[total_len]);
|
|
WritePackString(dataPack, authid);
|
|
WritePackString(dataPack, adminAuth);
|
|
WritePackString(dataPack, adminIp);
|
|
|
|
decl String:Query[256];
|
|
FormatEx(Query, sizeof(Query), "SELECT bid FROM %s_bans WHERE type = 0 AND authid = '%s' AND (length = 0 OR ends > UNIX_TIMESTAMP()) AND RemoveType IS NULL",
|
|
DatabasePrefix, authid);
|
|
|
|
SQL_TQuery(Database, SelectAddbanCallback, Query, dataPack, DBPrio_High);
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
public Action:sm_rehash(args)
|
|
{
|
|
if(enableAdmins)
|
|
DumpAdminCache(AdminCache_Groups,true);
|
|
return Plugin_Handled;
|
|
}
|
|
|
|
|
|
|
|
// MENU CODE //
|
|
|
|
public OnAdminMenuReady(Handle:topmenu)
|
|
{
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "OnAdminMenuReady()");
|
|
#endif
|
|
|
|
/* Block us from being called twice */
|
|
if (topmenu == hTopMenu)
|
|
{
|
|
return;
|
|
}
|
|
|
|
/* Save the Handle */
|
|
hTopMenu = topmenu;
|
|
|
|
/* Find the "Player Commands" category */
|
|
new TopMenuObject:player_commands = FindTopMenuCategory(hTopMenu, ADMINMENU_PLAYERCOMMANDS);
|
|
|
|
if (player_commands != INVALID_TOPMENUOBJECT)
|
|
{
|
|
// just to avoid "unused variable 'res'" warning
|
|
#if defined DEBUG
|
|
new TopMenuObject:res = AddToTopMenu(hTopMenu,
|
|
"sm_ban", // Name
|
|
TopMenuObject_Item, // We are a submenu
|
|
AdminMenu_Ban, // Handler function
|
|
player_commands, // We are a submenu of Player Commands
|
|
"sm_ban", // The command to be finally called (Override checks)
|
|
ADMFLAG_BAN); // What flag do we need to see the menu option
|
|
decl String:temp[125];
|
|
Format(temp, 125, "Result of AddToTopMenu: %d", res);
|
|
LogToFile(logFile, temp);
|
|
LogToFile(logFile, "Added Ban option to admin menu");
|
|
#else
|
|
AddToTopMenu(hTopMenu,
|
|
"sm_ban", // Name
|
|
TopMenuObject_Item, // We are a submenu
|
|
AdminMenu_Ban, // Handler function
|
|
player_commands, // We are a submenu of Player Commands
|
|
"sm_ban", // The command to be finally called (Override checks)
|
|
ADMFLAG_BAN); // What flag do we need to see the menu option
|
|
#endif
|
|
}
|
|
}
|
|
|
|
public AdminMenu_Ban(Handle:topmenu,
|
|
TopMenuAction:action, // Action being performed
|
|
TopMenuObject:object_id,// The object ID (if used)
|
|
param, // client idx of admin who chose the option (if used)
|
|
String:buffer[], // Output buffer (if used)
|
|
maxlength) // Output buffer (if used)
|
|
{
|
|
/* Clear the Ownreason bool, so he is able to chat again;) */
|
|
g_ownReasons[param] = false;
|
|
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "AdminMenu_Ban()");
|
|
#endif
|
|
if (action == TopMenuAction_DisplayOption) // We are only being displayed, We only need to show the option name
|
|
{
|
|
Format(buffer, maxlength, "%T", "Ban player", param);
|
|
//Format(buffer, maxlength, "Ban player", param); // Show the menu option
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "AdminMenu_Ban() -> Formatted the Ban option text");
|
|
#endif
|
|
}
|
|
else if (action == TopMenuAction_SelectOption)
|
|
{
|
|
DisplayBanTargetMenu(param); // Someone chose to ban someone, show the list of users menu
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "AdminMenu_Ban() -> DisplayBanTargetMenu()");
|
|
#endif
|
|
}
|
|
}
|
|
|
|
public ReasonSelected(Handle:menu, MenuAction:action, param1, param2)
|
|
{
|
|
if (action == MenuAction_Select)
|
|
{
|
|
decl String:info[128];
|
|
decl String:key[128];
|
|
GetMenuItem(menu, param2, key, sizeof(key), _, info, sizeof(info));
|
|
|
|
if(StrEqual("Hacking", key))
|
|
{
|
|
DisplayMenu(HackingMenuHandle, param1, MENU_TIME_FOREVER);
|
|
return;
|
|
}
|
|
if(StrEqual("Own Reason", key))
|
|
{
|
|
// admin wants to use his own reason
|
|
g_ownReasons[param1] = true;
|
|
PrintToChat(param1, "%c[%cSourceBans%c]%c %t", GREEN, NAMECOLOR, GREEN, NAMECOLOR, "Chat Reason");
|
|
return;
|
|
}
|
|
if(g_BanTarget[param1] != -1 && g_BanTime[param1] != -1)
|
|
PrepareBan(param1, g_BanTarget[param1], g_BanTime[param1], info, sizeof(info));
|
|
|
|
}
|
|
else if (action == MenuAction_Cancel && param2 == MenuCancel_Disconnected)
|
|
{
|
|
if(PlayerDataPack[param1] != INVALID_HANDLE)
|
|
{
|
|
CloseHandle(PlayerDataPack[param1]);
|
|
PlayerDataPack[param1] = INVALID_HANDLE;
|
|
}
|
|
|
|
}
|
|
else if (action == MenuAction_Cancel)
|
|
{
|
|
DisplayBanTimeMenu(param1);
|
|
}
|
|
}
|
|
|
|
public HackingSelected(Handle:menu, MenuAction:action, param1, param2)
|
|
{
|
|
if (action == MenuAction_Select)
|
|
{
|
|
decl String:info[128];
|
|
decl String:key[128];
|
|
GetMenuItem(menu, param2, key, sizeof(key), _, info, sizeof(info));
|
|
|
|
if(g_BanTarget[param1] != -1 && g_BanTime[param1] != -1)
|
|
PrepareBan(param1, g_BanTarget[param1], g_BanTime[param1], info, sizeof(info));
|
|
|
|
} else if (action == MenuAction_Cancel && param2 == MenuCancel_Disconnected) {
|
|
|
|
new Handle:Pack = PlayerDataPack[param1];
|
|
|
|
if(Pack != INVALID_HANDLE)
|
|
{
|
|
SetPackPosition(Pack, 40);
|
|
new Handle:ReasonPack = Handle:ReadPackCell(Pack);
|
|
|
|
if(ReasonPack != INVALID_HANDLE)
|
|
{
|
|
CloseHandle(ReasonPack);
|
|
}
|
|
|
|
CloseHandle(Pack);
|
|
PlayerDataPack[param1] = INVALID_HANDLE;
|
|
}
|
|
}
|
|
else if (action == MenuAction_Cancel)
|
|
{
|
|
DisplayMenu(ReasonMenuHandle, param1, MENU_TIME_FOREVER);
|
|
}
|
|
}
|
|
|
|
public MenuHandler_BanPlayerList(Handle:menu, MenuAction:action, param1, param2)
|
|
{
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "MenuHandler_BanPlayerList()");
|
|
#endif
|
|
if (action == MenuAction_End)
|
|
{
|
|
CloseHandle(menu); // Chose to close the menu
|
|
}
|
|
else if (action == MenuAction_Cancel)
|
|
{
|
|
if (param2 == MenuCancel_ExitBack && hTopMenu != INVALID_HANDLE)
|
|
{
|
|
DisplayTopMenu(hTopMenu, param1, TopMenuPosition_LastCategory);
|
|
}
|
|
}
|
|
else if (action == MenuAction_Select) // Chose someone!
|
|
{
|
|
decl String:info[32], String:name[32];
|
|
new userid, target;
|
|
|
|
GetMenuItem(menu, param2, info, sizeof(info), _, name, sizeof(name));
|
|
userid = StringToInt(info);
|
|
|
|
if ((target = GetClientOfUserId(userid)) == 0)
|
|
{
|
|
PrintToChat(param1, "%s%t", Prefix, "Player no longer available");
|
|
}
|
|
else if (!CanUserTarget(param1, target))
|
|
{
|
|
PrintToChat(param1, "%s%t", Prefix, "Unable to target");
|
|
}
|
|
else
|
|
{
|
|
g_BanTarget[param1] = target;
|
|
DisplayBanTimeMenu(param1);
|
|
}
|
|
}
|
|
}
|
|
|
|
public MenuHandler_BanTimeList(Handle:menu, MenuAction:action, param1, param2)
|
|
{
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "MenuHandler_BanTimeList()");
|
|
#endif
|
|
if (action == MenuAction_End)
|
|
{
|
|
CloseHandle(menu);
|
|
}
|
|
else if (action == MenuAction_Cancel)
|
|
{
|
|
if (param2 == MenuCancel_ExitBack && hTopMenu != INVALID_HANDLE)
|
|
{
|
|
DisplayTopMenu(hTopMenu, param1, TopMenuPosition_LastCategory);
|
|
}
|
|
}
|
|
else if (action == MenuAction_Select)
|
|
{
|
|
decl String:info[32];
|
|
|
|
GetMenuItem(menu, param2, info, sizeof(info));
|
|
g_BanTime[param1] = StringToInt(info);
|
|
|
|
//DisplayBanReasonMenu(param1);
|
|
DisplayMenu(ReasonMenuHandle, param1, MENU_TIME_FOREVER);
|
|
}
|
|
}
|
|
|
|
stock DisplayBanTargetMenu(client)
|
|
{
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "DisplayBanTargetMenu()");
|
|
#endif
|
|
new Handle:menu = CreateMenu(MenuHandler_BanPlayerList);// Create a new menu, pass it the handler.
|
|
|
|
decl String:title[100];
|
|
Format(title, sizeof(title), "%T:", "Ban player", client);
|
|
|
|
//Format(title, sizeof(title), "Ban player", client); // Create the title of the menu
|
|
SetMenuTitle(menu, title); // Set the title
|
|
SetMenuExitBackButton(menu, true); // Yes we want back/exit
|
|
|
|
AddTargetsToMenu(menu, // Add clients to our menu
|
|
client, // The client that called the display
|
|
false, // We want to see people connecting
|
|
false); // And dead people
|
|
|
|
DisplayMenu(menu, client, MENU_TIME_FOREVER); // Show the menu to the client FOREVER!
|
|
}
|
|
|
|
stock DisplayBanTimeMenu(client)
|
|
{
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "DisplayBanTimeMenu()");
|
|
#endif
|
|
|
|
new Handle:menu = CreateMenu(MenuHandler_BanTimeList);
|
|
|
|
decl String:title[100];
|
|
Format(title, sizeof(title), "%T:", "Ban player", client);
|
|
//Format(title, sizeof(title), "Ban player", client);
|
|
SetMenuTitle(menu, title);
|
|
SetMenuExitBackButton(menu, true);
|
|
|
|
if(GetUserFlagBits(client) & (ADMFLAG_UNBAN|ADMFLAG_ROOT))
|
|
AddMenuItem(menu, "0", "Permanent");
|
|
AddMenuItem(menu, "10", "10 Minutes");
|
|
AddMenuItem(menu, "30", "30 Minutes");
|
|
AddMenuItem(menu, "60", "1 Hour");
|
|
AddMenuItem(menu, "240", "4 Hours");
|
|
AddMenuItem(menu, "1440", "1 Day");
|
|
AddMenuItem(menu, "10080", "1 Week");
|
|
|
|
DisplayMenu(menu, client, MENU_TIME_FOREVER);
|
|
}
|
|
|
|
stock ResetMenu()
|
|
{
|
|
if(ReasonMenuHandle != INVALID_HANDLE)
|
|
{
|
|
RemoveAllMenuItems(ReasonMenuHandle);
|
|
}
|
|
}
|
|
|
|
// QUERY CALL BACKS //
|
|
|
|
public GotDatabase(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
if (hndl == INVALID_HANDLE)
|
|
{
|
|
LogToFile(logFile, "Database failure: %s. See FAQ: http://www.sourcebans.net/node/20", error);
|
|
g_bConnecting = false;
|
|
return;
|
|
}
|
|
|
|
Database = hndl;
|
|
|
|
decl String:query[1024];
|
|
FormatEx(query, sizeof(query), "SET NAMES \"UTF8\"");
|
|
SQL_TQuery(Database, ErrorCheckCallback, query);
|
|
|
|
InsertServerInfo();
|
|
|
|
//CreateTimer(900.0, PruneBans);
|
|
|
|
if(loadOverrides)
|
|
{
|
|
loadOverrides = false;
|
|
}
|
|
|
|
if(loadGroups && enableAdmins)
|
|
{
|
|
FormatEx(query,1024,"SELECT name, flags, immunity, groups_immune \
|
|
FROM %s_srvgroups ORDER BY id",DatabasePrefix);
|
|
curLoading++;
|
|
SQL_TQuery(Database,GroupsDone,query);
|
|
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "Fetching Group List");
|
|
#endif
|
|
loadGroups = false;
|
|
}
|
|
|
|
if(loadAdmins && enableAdmins)
|
|
{
|
|
new String:queryLastLogin[50] = "";
|
|
|
|
if (requireSiteLogin)
|
|
queryLastLogin = "lastvisit IS NOT NULL AND lastvisit != '' AND";
|
|
|
|
if( serverID == -1 )
|
|
{
|
|
FormatEx(query,1024,"SELECT authid, srv_password, (SELECT name FROM %s_srvgroups WHERE name = srv_group AND flags != '') AS srv_group, srv_flags, user, immunity \
|
|
FROM %s_admins_servers_groups AS asg \
|
|
LEFT JOIN %s_admins AS a ON a.aid = asg.admin_id \
|
|
WHERE %s (server_id = (SELECT sid FROM %s_servers WHERE ip = '%s' AND port = '%s' LIMIT 0,1) \
|
|
OR srv_group_id = ANY (SELECT group_id FROM %s_servers_groups WHERE server_id = (SELECT sid FROM %s_servers WHERE ip = '%s' AND port = '%s' LIMIT 0,1))) \
|
|
GROUP BY aid, authid, srv_password, srv_group, srv_flags, user",
|
|
DatabasePrefix, DatabasePrefix,DatabasePrefix, queryLastLogin, DatabasePrefix, ServerIp, ServerPort,DatabasePrefix, DatabasePrefix, ServerIp, ServerPort);
|
|
}else{
|
|
FormatEx(query,1024,"SELECT authid, srv_password, (SELECT name FROM %s_srvgroups WHERE name = srv_group AND flags != '') AS srv_group, srv_flags, user, immunity \
|
|
FROM %s_admins_servers_groups AS asg \
|
|
LEFT JOIN %s_admins AS a ON a.aid = asg.admin_id \
|
|
WHERE %s server_id = %d \
|
|
OR srv_group_id = ANY (SELECT group_id FROM %s_servers_groups WHERE server_id = %d) \
|
|
GROUP BY aid, authid, srv_password, srv_group, srv_flags, user",
|
|
DatabasePrefix, DatabasePrefix,DatabasePrefix, queryLastLogin, serverID, DatabasePrefix, serverID);
|
|
}
|
|
curLoading++;
|
|
SQL_TQuery(Database,AdminsDone,query);
|
|
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "Fetching Admin List");
|
|
LogToFile(logFile, query);
|
|
#endif
|
|
loadAdmins = false;
|
|
}
|
|
g_bConnecting = false;
|
|
}
|
|
|
|
public VerifyInsert(Handle:owner, Handle:hndl, const String:error[], any:dataPack)
|
|
{
|
|
if(dataPack == INVALID_HANDLE)
|
|
{
|
|
LogToFile(logFile, "Ban Failed: %s", error);
|
|
return;
|
|
}
|
|
|
|
if(hndl == INVALID_HANDLE || error[0])
|
|
{
|
|
LogToFile(logFile, "Verify Insert Query Failed: %s", error);
|
|
new admin = ReadPackCell(dataPack);
|
|
SetPackPosition(dataPack, 32);
|
|
new time = ReadPackCell(dataPack);
|
|
new Handle:reasonPack = Handle:ReadPackCell(dataPack);
|
|
decl String:reason[128];
|
|
ReadPackString(reasonPack, reason, sizeof(reason));
|
|
decl String:name[50];
|
|
ReadPackString(dataPack, name, sizeof(name));
|
|
decl String:auth[30];
|
|
ReadPackString(dataPack, auth, sizeof(auth));
|
|
decl String:ip[20];
|
|
ReadPackString(dataPack, ip, sizeof(ip));
|
|
decl String:adminAuth[30];
|
|
ReadPackString(dataPack, adminAuth, sizeof(adminAuth));
|
|
decl String:adminIp[20];
|
|
ReadPackString(dataPack, adminIp, sizeof(adminIp));
|
|
ResetPack(dataPack);
|
|
ResetPack(reasonPack);
|
|
|
|
PlayerDataPack[admin] = INVALID_HANDLE;
|
|
UTIL_InsertTempBan(time, name, auth, ip, reason, adminAuth, adminIp, Handle:dataPack);
|
|
return;
|
|
}
|
|
|
|
new admin = ReadPackCell(dataPack);
|
|
new client = ReadPackCell(dataPack);
|
|
|
|
if( !IsClientConnected(client) || IsFakeClient(client) )
|
|
return;
|
|
|
|
SetPackPosition(dataPack, 24);
|
|
new UserId = ReadPackCell(dataPack);
|
|
new time = ReadPackCell(dataPack);
|
|
new Handle:ReasonPack = Handle:ReadPackCell(dataPack);
|
|
|
|
decl String:Name[64], String:Reason[128];
|
|
|
|
ReadPackString(dataPack, Name, sizeof(Name));
|
|
ReadPackString(ReasonPack, Reason, sizeof(Reason));
|
|
|
|
if (!time)
|
|
{
|
|
if (Reason[0] == '\0')
|
|
{
|
|
ShowActivityEx(admin, Prefix, "%t", "Permabanned player", Name);
|
|
} else {
|
|
ShowActivityEx(admin, Prefix, "%t","Permabanned player reason", Name, Reason);
|
|
}
|
|
} else {
|
|
if (Reason[0] == '\0')
|
|
{
|
|
ShowActivityEx(admin, Prefix, "%t", "Banned player", Name, time);
|
|
} else {
|
|
ShowActivityEx(admin, Prefix, "%t", "Banned player reason", Name, time, Reason);
|
|
}
|
|
}
|
|
|
|
LogAction(admin, client, "\"%L\" banned \"%L\" (minutes \"%d\") (reason \"%s\")", admin, client, time, Reason);
|
|
|
|
if(PlayerDataPack[admin] != INVALID_HANDLE)
|
|
{
|
|
CloseHandle(PlayerDataPack[admin]);
|
|
CloseHandle(ReasonPack);
|
|
PlayerDataPack[admin] = INVALID_HANDLE;
|
|
}
|
|
|
|
// Kick player
|
|
if(GetClientUserId(client) == UserId)
|
|
KickClient(client, "%t", "Banned Check Site", WebsiteAddress);
|
|
}
|
|
|
|
public SelectBanIpCallback(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
decl admin, minutes, String:adminAuth[30], String:adminIp[30], String:banReason[256], String:ip[16], String:Query[512], String:reason[128];
|
|
ResetPack(data);
|
|
admin = ReadPackCell(data);
|
|
minutes = ReadPackCell(data);
|
|
ReadPackString(data, reason, sizeof(reason));
|
|
ReadPackString(data, ip, sizeof(ip));
|
|
ReadPackString(data, adminAuth, sizeof(adminAuth));
|
|
ReadPackString(data, adminIp, sizeof(adminIp));
|
|
SQL_EscapeString(Database, reason, banReason, sizeof(banReason));
|
|
|
|
if(error[0])
|
|
{
|
|
LogToFile(logFile, "Ban IP Select Query Failed: %s", error);
|
|
if(admin && IsClientInGame(admin))
|
|
PrintToChat(admin, "%sFailed to ban %s.", Prefix, ip);
|
|
else
|
|
PrintToServer("%sFailed to ban %s.", Prefix, ip);
|
|
return;
|
|
}
|
|
if(SQL_GetRowCount(hndl))
|
|
{
|
|
if(admin && IsClientInGame(admin))
|
|
PrintToChat(admin, "%s%s is already banned.", Prefix, ip);
|
|
else
|
|
PrintToServer("%s%s is already banned.", Prefix, ip);
|
|
return;
|
|
}
|
|
if( serverID == -1 )
|
|
{
|
|
FormatEx(Query, sizeof(Query), "INSERT INTO %s_bans (type, ip, name, created, ends, length, reason, aid, adminIp, sid, country) VALUES \
|
|
(1, '%s', '', UNIX_TIMESTAMP(), UNIX_TIMESTAMP() + %d, %d, '%s', (SELECT aid FROM %s_admins WHERE authid = '%s' OR authid REGEXP '^STEAM_[0-9]:%s$'), '%s', \
|
|
(SELECT sid FROM %s_servers WHERE ip = '%s' AND port = '%s' LIMIT 0,1), ' ')",
|
|
DatabasePrefix, ip, (minutes*60), (minutes*60), banReason, DatabasePrefix, adminAuth, adminAuth[8], adminIp, DatabasePrefix, ServerIp, ServerPort);
|
|
} else {
|
|
FormatEx(Query, sizeof(Query), "INSERT INTO %s_bans (type, ip, name, created, ends, length, reason, aid, adminIp, sid, country) VALUES \
|
|
(1, '%s', '', UNIX_TIMESTAMP(), UNIX_TIMESTAMP() + %d, %d, '%s', (SELECT aid FROM %s_admins WHERE authid = '%s' OR authid REGEXP '^STEAM_[0-9]:%s$'), '%s', \
|
|
%d, ' ')",
|
|
DatabasePrefix, ip, (minutes*60), (minutes*60), banReason, DatabasePrefix, adminAuth, adminAuth[8], adminIp, serverID);
|
|
}
|
|
|
|
SQL_TQuery(Database, InsertBanIpCallback, Query, data, DBPrio_High);
|
|
}
|
|
|
|
public InsertBanIpCallback(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
// if the pack is good unpack it and close the handle
|
|
new admin, minutes;
|
|
decl String:reason[128], String:arg[30];
|
|
if(data != INVALID_HANDLE)
|
|
{
|
|
ResetPack(data);
|
|
admin = ReadPackCell(data);
|
|
minutes = ReadPackCell(data);
|
|
ReadPackString(data, reason, sizeof(reason));
|
|
ReadPackString(data, arg, sizeof(arg));
|
|
CloseHandle(data);
|
|
} else {
|
|
// Technically this should not be possible
|
|
ThrowError("Invalid Handle in InsertBanIpCallback");
|
|
}
|
|
|
|
// If error is not an empty string the query failed
|
|
if(error[0] != '\0')
|
|
{
|
|
LogToFile(logFile, "Ban IP Insert Query Failed: %s", error);
|
|
if(admin && IsClientInGame(admin))
|
|
PrintToChat(admin, "%ssm_banip failed", Prefix);
|
|
return;
|
|
}
|
|
|
|
LogAction(admin,
|
|
-1,
|
|
"\"%L\" added ban (minutes \"%d\") (ip \"%s\") (reason \"%s\")",
|
|
admin,
|
|
minutes,
|
|
arg,
|
|
reason);
|
|
if(admin && IsClientInGame(admin))
|
|
PrintToChat(admin, "%s%s successfully banned", Prefix, arg);
|
|
else
|
|
PrintToServer("%s%s successfully banned", Prefix, arg);
|
|
}
|
|
|
|
public SelectUnbanCallback(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
decl admin, String:arg[30], String:adminAuth[30], String:unbanReason[256], String:reason[128];
|
|
ResetPack(data);
|
|
admin = ReadPackCell(data);
|
|
ReadPackString(data, reason, sizeof(reason));
|
|
ReadPackString(data, arg, sizeof(arg));
|
|
ReadPackString(data, adminAuth, sizeof(adminAuth));
|
|
SQL_EscapeString(Database, reason, unbanReason, sizeof(unbanReason));
|
|
|
|
// If error is not an empty string the query failed
|
|
if(error[0] != '\0')
|
|
{
|
|
LogToFile(logFile, "Unban Select Query Failed: %s", error);
|
|
if(admin && IsClientInGame(admin))
|
|
{
|
|
PrintToChat(admin, "%ssm_unban failed", Prefix);
|
|
}
|
|
return;
|
|
}
|
|
|
|
// If there was no results then a ban does not exist for that id
|
|
if(hndl == INVALID_HANDLE || !SQL_GetRowCount(hndl))
|
|
{
|
|
if(admin && IsClientInGame(admin))
|
|
{
|
|
PrintToChat(admin, "%sNo active bans found for that filter", Prefix);
|
|
} else {
|
|
PrintToServer("%sNo active bans found for that filter", Prefix);
|
|
}
|
|
return;
|
|
}
|
|
|
|
// There is ban
|
|
if(hndl != INVALID_HANDLE && SQL_FetchRow(hndl))
|
|
{
|
|
// Get the values from the existing ban record
|
|
new bid = SQL_FetchInt(hndl, 0);
|
|
|
|
decl String:query[1000];
|
|
Format(query, sizeof(query), "UPDATE %s_bans SET RemovedBy = (SELECT aid FROM %s_admins WHERE authid = '%s' OR authid REGEXP '^STEAM_[0-9]:%s$'), RemoveType = 'U', RemovedOn = UNIX_TIMESTAMP(), ureason = '%s' WHERE bid = %d",
|
|
DatabasePrefix, DatabasePrefix, adminAuth, adminAuth[8], unbanReason, bid);
|
|
|
|
SQL_TQuery(Database, InsertUnbanCallback, query, data);
|
|
}
|
|
return;
|
|
}
|
|
|
|
public InsertUnbanCallback(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
// if the pack is good unpack it and close the handle
|
|
decl admin, String:reason[128], String:arg[30];
|
|
if(data != INVALID_HANDLE)
|
|
{
|
|
ResetPack(data);
|
|
admin = ReadPackCell(data);
|
|
ReadPackString(data, reason, sizeof(reason));
|
|
ReadPackString(data, arg, sizeof(arg));
|
|
CloseHandle(data);
|
|
} else {
|
|
// Technically this should not be possible
|
|
ThrowError("Invalid Handle in InsertUnbanCallback");
|
|
}
|
|
|
|
// If error is not an empty string the query failed
|
|
if(error[0] != '\0')
|
|
{
|
|
LogToFile(logFile, "Unban Insert Query Failed: %s", error);
|
|
if(admin && IsClientInGame(admin))
|
|
{
|
|
PrintToChat(admin, "%ssm_unban failed", Prefix);
|
|
}
|
|
return;
|
|
}
|
|
|
|
LogAction(admin, -1, "\"%L\" removed ban (filter \"%s\") (reason \"%s\")", admin, arg, reason);
|
|
if(admin && IsClientInGame(admin))
|
|
{
|
|
PrintToChat(admin, "%s%s successfully unbanned", Prefix, arg);
|
|
} else {
|
|
PrintToServer("%s%s successfully unbanned", Prefix, arg);
|
|
}
|
|
}
|
|
|
|
public SelectAddbanCallback(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
decl admin, minutes, String:adminAuth[30], String:adminIp[30], String:authid[20], String:banReason[256], String:Query[512], String:reason[128];
|
|
ResetPack(data);
|
|
admin = ReadPackCell(data);
|
|
minutes = ReadPackCell(data);
|
|
ReadPackString(data, reason, sizeof(reason));
|
|
ReadPackString(data, authid, sizeof(authid));
|
|
ReadPackString(data, adminAuth, sizeof(adminAuth));
|
|
ReadPackString(data, adminIp, sizeof(adminIp));
|
|
SQL_EscapeString(Database, reason, banReason, sizeof(banReason));
|
|
|
|
if(error[0])
|
|
{
|
|
LogToFile(logFile, "Add Ban Select Query Failed: %s", error);
|
|
if(admin && IsClientInGame(admin))
|
|
PrintToChat(admin, "%sFailed to ban %s.", Prefix, authid);
|
|
else
|
|
PrintToServer("%sFailed to ban %s.", Prefix, authid);
|
|
return;
|
|
}
|
|
if(SQL_GetRowCount(hndl))
|
|
{
|
|
if(admin && IsClientInGame(admin))
|
|
PrintToChat(admin, "%s%s is already banned.", Prefix, authid);
|
|
else
|
|
PrintToServer("%s%s is already banned.", Prefix, authid);
|
|
return;
|
|
}
|
|
if( serverID == -1 )
|
|
{
|
|
FormatEx(Query, sizeof(Query), "INSERT INTO %s_bans (authid, name, created, ends, length, reason, aid, adminIp, sid, country) VALUES \
|
|
('%s', '', UNIX_TIMESTAMP(), UNIX_TIMESTAMP() + %d, %d, '%s', (SELECT aid FROM %s_admins WHERE authid = '%s' OR authid REGEXP '^STEAM_[0-9]:%s$'), '%s', \
|
|
(SELECT sid FROM %s_servers WHERE ip = '%s' AND port = '%s' LIMIT 0,1), ' ')",
|
|
DatabasePrefix, authid, (minutes*60), (minutes*60), banReason, DatabasePrefix, adminAuth, adminAuth[8], adminIp, DatabasePrefix, ServerIp, ServerPort);
|
|
} else {
|
|
FormatEx(Query, sizeof(Query), "INSERT INTO %s_bans (authid, name, created, ends, length, reason, aid, adminIp, sid, country) VALUES \
|
|
('%s', '', UNIX_TIMESTAMP(), UNIX_TIMESTAMP() + %d, %d, '%s', (SELECT aid FROM %s_admins WHERE authid = '%s' OR authid REGEXP '^STEAM_[0-9]:%s$'), '%s', \
|
|
%d, ' ')",
|
|
DatabasePrefix, authid, (minutes*60), (minutes*60), banReason, DatabasePrefix, adminAuth, adminAuth[8], adminIp, serverID);
|
|
}
|
|
|
|
SQL_TQuery(Database, InsertAddbanCallback, Query, data, DBPrio_High);
|
|
}
|
|
|
|
public InsertAddbanCallback(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
decl admin, minutes, String:authid[20], String:reason[128];
|
|
ResetPack(data);
|
|
admin = ReadPackCell(data);
|
|
minutes = ReadPackCell(data);
|
|
ReadPackString(data, reason, sizeof(reason));
|
|
ReadPackString(data, authid, sizeof(authid));
|
|
|
|
// If error is not an empty string the query failed
|
|
if(error[0] != '\0')
|
|
{
|
|
LogToFile(logFile, "Add Ban Insert Query Failed: %s", error);
|
|
if(admin && IsClientInGame(admin))
|
|
{
|
|
PrintToChat(admin, "%ssm_addban failed", Prefix);
|
|
}
|
|
return;
|
|
}
|
|
|
|
LogAction(admin,
|
|
-1,
|
|
"\"%L\" added ban (minutes \"%i\") (id \"%s\") (reason \"%s\")",
|
|
admin,
|
|
minutes,
|
|
authid,
|
|
reason);
|
|
if(admin && IsClientInGame(admin))
|
|
{
|
|
PrintToChat(admin, "%s%s successfully banned", Prefix, authid);
|
|
} else {
|
|
PrintToServer("%s%s successfully banned", Prefix, authid);
|
|
}
|
|
}
|
|
|
|
// ProcessQueueCallback is called as the result of selecting all the rows from the queue table
|
|
public ProcessQueueCallback(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
if (hndl == INVALID_HANDLE || strlen(error) > 0)
|
|
{
|
|
LogToFile(logFile, "Failed to retrieve queued bans from sqlite database, %s", error);
|
|
return;
|
|
}
|
|
|
|
decl String:auth[30];
|
|
decl time;
|
|
decl startTime;
|
|
decl String:reason[128];
|
|
decl String:name[64];
|
|
decl String:ip[20];
|
|
decl String:adminAuth[30];
|
|
decl String:adminIp[20];
|
|
decl String:query[1024];
|
|
decl String:banName[128];
|
|
decl String:banReason[256];
|
|
while(SQL_MoreRows(hndl))
|
|
{
|
|
SQL_FetchRow(hndl);
|
|
|
|
// if we get to here then there are rows in the queue pending processing
|
|
SQL_FetchString(hndl, 0, auth, sizeof(auth));
|
|
time = SQL_FetchInt(hndl, 1);
|
|
startTime = SQL_FetchInt(hndl, 2);
|
|
SQL_FetchString(hndl, 3, reason, sizeof(reason));
|
|
SQL_FetchString(hndl, 4, name, sizeof(name));
|
|
SQL_FetchString(hndl, 5, ip, sizeof(ip));
|
|
SQL_FetchString(hndl, 6, adminAuth, sizeof(adminAuth));
|
|
SQL_FetchString(hndl, 7, adminIp, sizeof(adminIp));
|
|
SQL_EscapeString(SQLiteDB, name, banName, sizeof(banName));
|
|
SQL_EscapeString(SQLiteDB, reason, banReason, sizeof(banReason));
|
|
if(startTime + time * 60 > GetTime() || time == 0)
|
|
{
|
|
// This ban is still valid and should be entered into the db
|
|
if( serverID == -1 )
|
|
{
|
|
FormatEx(query, sizeof(query),
|
|
"INSERT INTO %s_bans (ip, authid, name, created, ends, length, reason, aid, adminIp, sid) VALUES \
|
|
('%s', '%s', '%s', %d, %d, %d, '%s', (SELECT aid FROM %s_admins WHERE authid = '%s' OR authid REGEXP '^STEAM_[0-9]:%s$'), '%s', \
|
|
(SELECT sid FROM %s_servers WHERE ip = '%s' AND port = '%s' LIMIT 0,1))",
|
|
DatabasePrefix, ip, auth, banName, startTime, startTime + time * 60, time * 60, banReason, DatabasePrefix, adminAuth, adminAuth[8], adminIp, DatabasePrefix, ServerIp, ServerPort);
|
|
}
|
|
else
|
|
{
|
|
FormatEx(query, sizeof(query),
|
|
"INSERT INTO %s_bans (ip, authid, name, created, ends, length, reason, aid, adminIp, sid) VALUES \
|
|
('%s', '%s', '%s', %d, %d, %d, '%s', (SELECT aid FROM %s_admins WHERE authid = '%s' OR authid REGEXP '^STEAM_[0-9]:%s$'), '%s', \
|
|
%d)",
|
|
DatabasePrefix, ip, auth, banName, startTime, startTime + time * 60, time * 60, banReason, DatabasePrefix, adminAuth, adminAuth[8], adminIp, serverID);
|
|
}
|
|
new Handle:authPack = CreateDataPack();
|
|
WritePackString(authPack, auth);
|
|
ResetPack(authPack);
|
|
SQL_TQuery(Database, AddedFromSQLiteCallback, query, authPack);
|
|
} else {
|
|
// The ban is no longer valid and should be deleted from the queue
|
|
FormatEx(query, sizeof(query), "DELETE FROM queue WHERE steam_id = '%s'", auth);
|
|
SQL_TQuery(SQLiteDB, ErrorCheckCallback, query);
|
|
}
|
|
}
|
|
// We have finished processing the queue but should process again in ProcessQueueTime minutes
|
|
CreateTimer(float(ProcessQueueTime * 60), ProcessQueue);
|
|
}
|
|
|
|
public AddedFromSQLiteCallback(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
decl String:buffer[512];
|
|
decl String:auth[40];
|
|
ReadPackString(data, auth, sizeof(auth));
|
|
if(error[0] == '\0')
|
|
{
|
|
// The insert was successful so delete the record from the queue
|
|
FormatEx(buffer, sizeof(buffer), "DELETE FROM queue WHERE steam_id = '%s'", auth);
|
|
SQL_TQuery(SQLiteDB, ErrorCheckCallback, buffer);
|
|
|
|
// They are added to main banlist, so remove the temp ban
|
|
RemoveBan(auth, BANFLAG_AUTHID);
|
|
|
|
} else {
|
|
// the insert failed so we leave the record in the queue and increase our temporary ban
|
|
FormatEx(buffer, sizeof(buffer), "banid %d %s", ProcessQueueTime, auth);
|
|
ServerCommand(buffer);
|
|
}
|
|
CloseHandle(data);
|
|
}
|
|
|
|
public ServerInfoCallback(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
if(error[0])
|
|
{
|
|
LogToFile(logFile, "Server Select Query Failed: %s", error);
|
|
return;
|
|
}
|
|
|
|
if(hndl == INVALID_HANDLE || SQL_GetRowCount(hndl)==0)
|
|
{
|
|
// get the game folder name used to determine the mod
|
|
decl String:desc[64], String:query[200];
|
|
GetGameFolderName(desc, sizeof(desc));
|
|
FormatEx(query, sizeof(query), "INSERT INTO %s_servers (ip, port, rcon, modid) VALUES ('%s', '%s', '', (SELECT mid FROM %s_mods WHERE modfolder = '%s'))", DatabasePrefix, ServerIp, ServerPort, DatabasePrefix, desc);
|
|
SQL_TQuery(Database, ErrorCheckCallback, query);
|
|
}
|
|
}
|
|
|
|
public ErrorCheckCallback(Handle:owner, Handle:hndle, const String:error[], any:data)
|
|
{
|
|
if(error[0])
|
|
{
|
|
LogToFile(logFile, "Query Failed: %s", error);
|
|
}
|
|
}
|
|
|
|
public VerifyBan(Handle:owner, Handle:hndl, const String:error[], any:userid)
|
|
{
|
|
decl String:clientName[64];
|
|
decl String:clientAuth[64];
|
|
decl String:clientIp[64];
|
|
new client = GetClientOfUserId(userid);
|
|
|
|
if(!client)
|
|
return;
|
|
|
|
/* Failure happen. Do retry with delay */
|
|
if(hndl == INVALID_HANDLE)
|
|
{
|
|
LogToFile(logFile, "Verify Ban Query Failed: %s", error);
|
|
PlayerRecheck[client] = CreateTimer(RetryTime, ClientRecheck, client);
|
|
return;
|
|
}
|
|
GetClientIP(client, clientIp, sizeof(clientIp));
|
|
GetClientAuthString(client, clientAuth, sizeof(clientAuth));
|
|
GetClientName(client, clientName, sizeof(clientName));
|
|
if(SQL_GetRowCount(hndl) > 0)
|
|
{
|
|
decl String:buffer[40];
|
|
decl String:Name[128];
|
|
decl String:Query[512];
|
|
|
|
SQL_EscapeString(Database, clientName, Name, sizeof(Name));
|
|
if( serverID == -1 )
|
|
{
|
|
FormatEx(Query, sizeof(Query), "INSERT INTO %s_banlog (sid ,time ,name ,bid) VALUES \
|
|
((SELECT sid FROM %s_servers WHERE ip = '%s' AND port = '%s' LIMIT 0,1), UNIX_TIMESTAMP(), '%s', \
|
|
(SELECT bid FROM %s_bans WHERE ((type = 0 AND authid REGEXP '^STEAM_[0-9]:%s$') OR (type = 1 AND ip = '%s')) AND RemoveType IS NULL LIMIT 0,1))",
|
|
DatabasePrefix, DatabasePrefix, ServerIp, ServerPort, Name, DatabasePrefix, clientAuth[8], clientIp);
|
|
}
|
|
else
|
|
{
|
|
FormatEx(Query, sizeof(Query), "INSERT INTO %s_banlog (sid ,time ,name ,bid) VALUES \
|
|
(%d, UNIX_TIMESTAMP(), '%s', \
|
|
(SELECT bid FROM %s_bans WHERE ((type = 0 AND authid REGEXP '^STEAM_[0-9]:%s$') OR (type = 1 AND ip = '%s')) AND RemoveType IS NULL LIMIT 0,1))",
|
|
DatabasePrefix, serverID, Name, DatabasePrefix, clientAuth[8], clientIp);
|
|
}
|
|
|
|
SQL_TQuery(Database, ErrorCheckCallback, Query, client, DBPrio_High);
|
|
FormatEx(buffer, sizeof(buffer), "banid 5 %s", clientAuth);
|
|
ServerCommand(buffer);
|
|
KickClient(client, "%t", "Banned Check Site", WebsiteAddress);
|
|
return;
|
|
}
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "%s is NOT banned.", clientAuth);
|
|
#endif
|
|
|
|
PlayerStatus[client] = true;
|
|
}
|
|
|
|
public AdminsDone(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
//SELECT authid, srv_password , srv_group, srv_flags, user
|
|
if (hndl == INVALID_HANDLE || strlen(error) > 0)
|
|
{
|
|
--curLoading;
|
|
CheckLoadAdmins();
|
|
LogToFile(logFile, "Failed to retrieve admins from the database, %s", error);
|
|
return;
|
|
}
|
|
decl String:authType[] = "steam";
|
|
decl String:identity[66];
|
|
decl String:password[66];
|
|
decl String:groups[256];
|
|
decl String:flags[32];
|
|
decl String:name[66];
|
|
new admCount=0;
|
|
new Immunity=0;
|
|
new AdminId:curAdm = INVALID_ADMIN_ID;
|
|
new Handle:adminsKV = CreateKeyValues("Admins");
|
|
|
|
while (SQL_MoreRows(hndl))
|
|
{
|
|
SQL_FetchRow(hndl);
|
|
if(SQL_IsFieldNull(hndl, 0))
|
|
continue; // Sometimes some rows return NULL due to some setups
|
|
|
|
SQL_FetchString(hndl,0,identity,66);
|
|
SQL_FetchString(hndl,1,password,66);
|
|
SQL_FetchString(hndl,2,groups,256);
|
|
SQL_FetchString(hndl,3,flags,32);
|
|
SQL_FetchString(hndl,4,name,66);
|
|
|
|
Immunity = SQL_FetchInt(hndl,5);
|
|
|
|
TrimString(name);
|
|
TrimString(identity);
|
|
TrimString(groups);
|
|
TrimString(flags);
|
|
|
|
// Disable writing to file if they chose to
|
|
if(backupConfig)
|
|
{
|
|
KvJumpToKey(adminsKV, name, true);
|
|
|
|
KvSetString(adminsKV, "auth", "steam");
|
|
KvSetString(adminsKV, "identity", identity);
|
|
|
|
if(strlen(flags) > 0)
|
|
KvSetString(adminsKV, "flags", flags);
|
|
|
|
if(strlen(groups) > 0)
|
|
KvSetString(adminsKV, "group", groups);
|
|
|
|
if(strlen(password) > 0)
|
|
KvSetString(adminsKV, "password", password);
|
|
|
|
if(Immunity > 0)
|
|
KvSetNum(adminsKV, "immunity", Immunity);
|
|
|
|
KvRewind(adminsKV);
|
|
}
|
|
|
|
curAdm = CreateAdmin(name);
|
|
BindAdminIdentity(curAdm,authType,identity);
|
|
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "Given %s (%s) admin", name, identity);
|
|
#endif
|
|
|
|
decl String:grp[64];
|
|
new curPos = 0;
|
|
new nextPos = 0;
|
|
new GroupId:curGrp = INVALID_GROUP_ID;
|
|
while ((nextPos = SplitString(groups[curPos],",",grp,64)) != -1)
|
|
{
|
|
curPos += nextPos;
|
|
curGrp = FindAdmGroup(grp);
|
|
if (curGrp == INVALID_GROUP_ID)
|
|
{
|
|
LogToFile(logFile, "Unknown group \"%s\"",grp);
|
|
}
|
|
else
|
|
{
|
|
if (!AdminInheritGroup(curAdm,curGrp))
|
|
{
|
|
LogToFile(logFile, "Unable to inherit group \"%s\"",grp);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (strcmp(groups[curPos], "") != 0)
|
|
{
|
|
curGrp = FindAdmGroup(groups[curPos]);
|
|
if (curGrp == INVALID_GROUP_ID)
|
|
{
|
|
LogToFile(logFile, "Unknown group \"%s\"",groups[curPos]);
|
|
}
|
|
else
|
|
{
|
|
if (!AdminInheritGroup(curAdm,curGrp))
|
|
{
|
|
LogToFile(logFile, "Unable to inherit group \"%s\"",groups[curPos]);
|
|
}
|
|
|
|
if( Immunity > GetAdmGroupImmunityLevel(curGrp) )
|
|
{
|
|
SetAdminImmunityLevel(curAdm, Immunity);
|
|
}
|
|
else
|
|
{
|
|
SetAdminImmunityLevel(curAdm, GetAdmGroupImmunityLevel(curGrp));
|
|
}
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "Admin %s (%s) has %d immunity", name, identity, Immunity);
|
|
#endif
|
|
}
|
|
}
|
|
|
|
if (strlen(password) > 0)
|
|
SetAdminPassword(curAdm, password);
|
|
|
|
for (new i=0;i<strlen(flags);++i)
|
|
{
|
|
if (flags[i] < 'a' || flags[i] > 'z')
|
|
continue;
|
|
|
|
if (g_FlagLetters[flags[i] - 'a'] < Admin_Reservation)
|
|
continue;
|
|
|
|
SetAdminFlag(curAdm, g_FlagLetters[flags[i] - 'a'],true);
|
|
}
|
|
++admCount;
|
|
}
|
|
|
|
if(backupConfig)
|
|
KeyValuesToFile(adminsKV, adminsLoc);
|
|
CloseHandle(adminsKV);
|
|
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "Finished loading %i admins.",admCount);
|
|
#endif
|
|
|
|
--curLoading;
|
|
CheckLoadAdmins();
|
|
}
|
|
|
|
public GroupsDone(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
if (hndl == INVALID_HANDLE)
|
|
{
|
|
curLoading--;
|
|
CheckLoadAdmins();
|
|
LogToFile(logFile, "Failed to retrieve groups from the database, %s",error);
|
|
return;
|
|
}
|
|
decl String:grpName[128];
|
|
decl String:grpFlags[32];
|
|
new Immunity;
|
|
new bool:reparse = false;
|
|
new grpCount = 0;
|
|
new Handle:groupsKV = CreateKeyValues("Groups");
|
|
|
|
new GroupId:curGrp = INVALID_GROUP_ID;
|
|
while (SQL_MoreRows(hndl))
|
|
{
|
|
SQL_FetchRow(hndl);
|
|
if(SQL_IsFieldNull(hndl, 0))
|
|
continue; // Sometimes some rows return NULL due to some setups
|
|
SQL_FetchString(hndl,0,grpName,128);
|
|
SQL_FetchString(hndl,1,grpFlags,32);
|
|
Immunity = SQL_FetchInt(hndl,2);
|
|
|
|
TrimString(grpName);
|
|
TrimString(grpFlags);
|
|
|
|
if(!strcmp(grpName, " "))
|
|
continue;
|
|
|
|
curGrp = CreateAdmGroup(grpName);
|
|
|
|
if(backupConfig)
|
|
{
|
|
KvJumpToKey(groupsKV, grpName, true);
|
|
if(strlen(grpFlags) > 0)
|
|
KvSetString(groupsKV, "flags", grpFlags);
|
|
if(Immunity > 0)
|
|
KvSetNum(groupsKV, "immunity", Immunity);
|
|
|
|
KvRewind(groupsKV);
|
|
}
|
|
|
|
if (curGrp == INVALID_GROUP_ID)
|
|
{ //This occurs when the group already exists
|
|
curGrp = FindAdmGroup(grpName);
|
|
}
|
|
|
|
for (new i=0;i<strlen(grpFlags);++i)
|
|
{
|
|
if (grpFlags[i] < 'a' || grpFlags[i] > 'z')
|
|
continue;
|
|
|
|
if (g_FlagLetters[grpFlags[i] - 'a'] < Admin_Reservation)
|
|
continue;
|
|
|
|
SetAdmGroupAddFlag(curGrp, g_FlagLetters[grpFlags[i] - 'a'], true);
|
|
}
|
|
|
|
SetAdmGroupImmunityLevel(curGrp, Immunity);
|
|
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "Group %s has %d immunity", grpName, Immunity);
|
|
#endif
|
|
|
|
grpCount++;
|
|
}
|
|
|
|
if(backupConfig)
|
|
KeyValuesToFile(groupsKV, groupsLoc);
|
|
CloseHandle(groupsKV);
|
|
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "Finished loading %i groups.",grpCount);
|
|
#endif
|
|
|
|
if (reparse)
|
|
{
|
|
decl String:query[512];
|
|
FormatEx(query,512,"SELECT name, immunity, groups_immune FROM %s_srvgroups ORDER BY id",DatabasePrefix);
|
|
SQL_TQuery(Database,GroupsSecondPass,query);
|
|
}
|
|
else
|
|
{
|
|
curLoading--;
|
|
CheckLoadAdmins();
|
|
}
|
|
}
|
|
|
|
public GroupsSecondPass(Handle:owner, Handle:hndl, const String:error[], any:data)
|
|
{
|
|
if (hndl == INVALID_HANDLE)
|
|
{
|
|
curLoading--;
|
|
CheckLoadAdmins();
|
|
LogToFile(logFile, "Failed to retrieve groups from the database, %s",error);
|
|
return;
|
|
}
|
|
decl String:grpName[128];
|
|
new Immunity;
|
|
|
|
new GroupId:curGrp = INVALID_GROUP_ID;
|
|
while (SQL_MoreRows(hndl))
|
|
{
|
|
SQL_FetchRow(hndl);
|
|
if(SQL_IsFieldNull(hndl, 0))
|
|
continue; // Sometimes some rows return NULL due to some setups
|
|
SQL_FetchString(hndl,0,grpName,128);
|
|
TrimString(grpName);
|
|
if(!strcmp(grpName, " "))
|
|
continue;
|
|
Immunity = SQL_FetchInt(hndl,1);
|
|
|
|
curGrp = FindAdmGroup(grpName);
|
|
if (curGrp == INVALID_GROUP_ID)
|
|
curGrp = CreateAdmGroup(grpName);
|
|
|
|
SetAdmGroupImmunityLevel(curGrp, Immunity);
|
|
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "Group %s has %d immunity", grpName, Immunity);
|
|
#endif
|
|
|
|
}
|
|
--curLoading;
|
|
CheckLoadAdmins();
|
|
}
|
|
|
|
|
|
// TIMER CALL BACKS //
|
|
|
|
public Action:ClientRecheck(Handle:timer, any:client)
|
|
{
|
|
if(!PlayerStatus[client] && IsClientConnected(client))
|
|
{
|
|
decl String:Authid[64];
|
|
GetClientAuthString(client, Authid, sizeof(Authid));
|
|
OnClientAuthorized(client, Authid);
|
|
}
|
|
|
|
PlayerRecheck[client] = INVALID_HANDLE;
|
|
return Plugin_Stop;
|
|
}
|
|
|
|
/*
|
|
public Action:PruneBans(Handle:timer)
|
|
{
|
|
decl String:Query[512];
|
|
FormatEx(Query, sizeof(Query),
|
|
"UPDATE %s_bans SET RemovedBy = 0, RemoveType = 'E', RemovedOn = UNIX_TIMESTAMP() WHERE length != '0' AND ends < UNIX_TIMESTAMP()",
|
|
DatabasePrefix);
|
|
|
|
SQL_TQuery(Database, ErrorCheckCallback, Query);
|
|
return Plugin_Continue;
|
|
}
|
|
*/
|
|
|
|
public Action:ProcessQueue(Handle:timer, any:data)
|
|
{
|
|
decl String:buffer[512];
|
|
Format(buffer, sizeof(buffer), "SELECT steam_id, time, start_time, reason, name, ip, admin_id, admin_ip FROM queue");
|
|
SQL_TQuery(SQLiteDB, ProcessQueueCallback, buffer);
|
|
}
|
|
|
|
// PARSER //
|
|
|
|
static InitializeConfigParser()
|
|
{
|
|
if (ConfigParser == INVALID_HANDLE)
|
|
{
|
|
ConfigParser = SMC_CreateParser();
|
|
SMC_SetReaders(ConfigParser, ReadConfig_NewSection, ReadConfig_KeyValue, ReadConfig_EndSection);
|
|
}
|
|
}
|
|
|
|
static InternalReadConfig(const String:path[])
|
|
{
|
|
ConfigState = ConfigStateNone;
|
|
|
|
new SMCError:err = SMC_ParseFile(ConfigParser, path);
|
|
|
|
if (err != SMCError_Okay)
|
|
{
|
|
decl String:buffer[64];
|
|
if (SMC_GetErrorString(err, buffer, sizeof(buffer)))
|
|
{
|
|
PrintToServer(buffer);
|
|
} else {
|
|
PrintToServer("Fatal parse error");
|
|
}
|
|
}
|
|
}
|
|
|
|
public SMCResult:ReadConfig_NewSection(Handle:smc, const String:name[], bool:opt_quotes)
|
|
{
|
|
if(name[0])
|
|
{
|
|
if(strcmp("Config", name, false) == 0)
|
|
{
|
|
ConfigState = ConfigStateConfig;
|
|
} else if(strcmp("BanReasons", name, false) == 0) {
|
|
ConfigState = ConfigStateReasons;
|
|
} else if(strcmp("HackingReasons", name, false) == 0) {
|
|
ConfigState = ConfigStateHacking;
|
|
}
|
|
}
|
|
return SMCParse_Continue;
|
|
}
|
|
|
|
public SMCResult:ReadConfig_KeyValue(Handle:smc, const String:key[], const String:value[], bool:key_quotes, bool:value_quotes)
|
|
{
|
|
if(!key[0])
|
|
return SMCParse_Continue;
|
|
|
|
switch(ConfigState)
|
|
{
|
|
case ConfigStateConfig:
|
|
{
|
|
if(strcmp("website", key, false) == 0)
|
|
{
|
|
strcopy(WebsiteAddress, sizeof(WebsiteAddress), value);
|
|
} else if(strcmp("Addban", key, false) == 0)
|
|
{
|
|
if(StringToInt(value) == 0)
|
|
{
|
|
CommandDisable |= DISABLE_ADDBAN;
|
|
}
|
|
}
|
|
else if(strcmp("AutoAddServer", key, false) == 0)
|
|
{
|
|
if(StringToInt(value) == 1)
|
|
AutoAdd = true;
|
|
else
|
|
AutoAdd = false;
|
|
} else if(strcmp("Unban", key, false) == 0)
|
|
{
|
|
if(StringToInt(value) == 0)
|
|
{
|
|
CommandDisable |= DISABLE_UNBAN;
|
|
}
|
|
}
|
|
else if(strcmp("DatabasePrefix", key, false) == 0)
|
|
{
|
|
strcopy(DatabasePrefix, sizeof(DatabasePrefix), value);
|
|
|
|
if(DatabasePrefix[0] == '\0')
|
|
{
|
|
DatabasePrefix = "sb";
|
|
}
|
|
}
|
|
else if(strcmp("RetryTime", key, false) == 0)
|
|
{
|
|
RetryTime = StringToFloat(value);
|
|
if(RetryTime < 15.0)
|
|
{
|
|
RetryTime = 15.0;
|
|
} else if(RetryTime > 60.0) {
|
|
RetryTime = 60.0;
|
|
}
|
|
}
|
|
else if(strcmp("ProcessQueueTime", key, false) == 0)
|
|
{
|
|
ProcessQueueTime = StringToInt(value);
|
|
}
|
|
else if(strcmp("BackupConfigs", key, false) == 0)
|
|
{
|
|
if(StringToInt(value) == 1)
|
|
backupConfig = true;
|
|
else
|
|
backupConfig = false;
|
|
}
|
|
else if(strcmp("EnableAdmins", key, false) == 0)
|
|
{
|
|
if(StringToInt(value) == 1)
|
|
enableAdmins = true;
|
|
else
|
|
enableAdmins = false;
|
|
}
|
|
else if(strcmp("RequireSiteLogin", key, false) == 0)
|
|
{
|
|
if(StringToInt(value) == 1)
|
|
requireSiteLogin = true;
|
|
else
|
|
requireSiteLogin = false;
|
|
}
|
|
else if(strcmp("ServerID", key, false) == 0)
|
|
{
|
|
serverID = StringToInt(value);
|
|
}
|
|
}
|
|
|
|
case ConfigStateReasons:
|
|
{
|
|
if(ReasonMenuHandle != INVALID_HANDLE)
|
|
{
|
|
AddMenuItem(ReasonMenuHandle, key, value);
|
|
}
|
|
}
|
|
case ConfigStateHacking:
|
|
{
|
|
if(HackingMenuHandle != INVALID_HANDLE)
|
|
{
|
|
AddMenuItem(HackingMenuHandle, key, value);
|
|
}
|
|
}
|
|
}
|
|
return SMCParse_Continue;
|
|
}
|
|
|
|
public SMCResult:ReadConfig_EndSection(Handle:smc)
|
|
{
|
|
return SMCParse_Continue;
|
|
}
|
|
|
|
|
|
/*********************************************************
|
|
* Ban Player from server
|
|
*
|
|
* @param client The client index of the player to ban
|
|
* @param time The time to ban the player for (in minutes, 0 = permanent)
|
|
* @param reason The reason to ban the player from the server
|
|
* @noreturn
|
|
*********************************************************/
|
|
public Native_SBBanPlayer(Handle:plugin, numParams)
|
|
{
|
|
new client = GetNativeCell(1);
|
|
new target = GetNativeCell(2);
|
|
new time = GetNativeCell(3);
|
|
decl String:reason[128];
|
|
GetNativeString(4, reason, 128);
|
|
|
|
if(reason[0] == '\0')
|
|
strcopy(reason, sizeof(reason), "Banned by SourceBans");
|
|
|
|
if(client && IsClientInGame(client))
|
|
{
|
|
new AdminId:aid = GetUserAdmin(client);
|
|
if(aid == INVALID_ADMIN_ID)
|
|
{
|
|
ThrowNativeError(1, "Ban Error: Player is not an admin.");
|
|
return 0;
|
|
}
|
|
|
|
if(!GetAdminFlag(aid, Admin_Ban))
|
|
{
|
|
ThrowNativeError(2, "Ban Error: Player does not have BAN flag.");
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
PrepareBan(client, target, time, reason, sizeof(reason));
|
|
return true;
|
|
}
|
|
|
|
|
|
// STOCK FUNCTIONS //
|
|
|
|
public InitializeBackupDB()
|
|
{
|
|
decl String:error[255];
|
|
SQLiteDB = SQLite_UseDatabase("sourcebans-queue", error, sizeof(error));
|
|
if(SQLiteDB == INVALID_HANDLE)
|
|
SetFailState(error);
|
|
|
|
SQL_LockDatabase(SQLiteDB);
|
|
SQL_FastQuery(SQLiteDB, "CREATE TABLE IF NOT EXISTS queue (steam_id TEXT PRIMARY KEY ON CONFLICT REPLACE, time INTEGER, start_time INTEGER, reason TEXT, name TEXT, ip TEXT, admin_id TEXT, admin_ip TEXT);");
|
|
SQL_UnlockDatabase(SQLiteDB);
|
|
}
|
|
|
|
public bool:CreateBan(client, target, time, String:reason[])
|
|
{
|
|
decl String:adminIp[24], String:adminAuth[64];
|
|
new admin = client;
|
|
|
|
// The server is the one calling the ban
|
|
if(!admin)
|
|
{
|
|
if(reason[0] == '\0')
|
|
{
|
|
// We cannot pop the reason menu if the command was issued from the server
|
|
PrintToServer("%s%T", Prefix, "Include Reason", LANG_SERVER);
|
|
return false;
|
|
}
|
|
|
|
// setup dummy adminAuth and adminIp for server
|
|
strcopy(adminAuth, sizeof(adminAuth), "STEAM_ID_SERVER");
|
|
strcopy(adminIp, sizeof(adminIp), ServerIp);
|
|
} else {
|
|
GetClientIP(admin, adminIp, sizeof(adminIp));
|
|
GetClientAuthString(admin, adminAuth, sizeof(adminAuth));
|
|
}
|
|
|
|
// target information
|
|
decl String:ip[24], String:auth[64], String:name[64];
|
|
|
|
GetClientName(target, name, sizeof(name));
|
|
GetClientIP(target, ip, sizeof(ip));
|
|
GetClientAuthString(target, auth, sizeof(auth));
|
|
|
|
new userid = admin ? GetClientUserId(admin) : 0;
|
|
|
|
// Pack everything into a data pack so we can retain it
|
|
new Handle:dataPack = CreateDataPack();
|
|
new Handle:reasonPack = CreateDataPack();
|
|
WritePackString(reasonPack, reason);
|
|
|
|
WritePackCell(dataPack, admin);
|
|
WritePackCell(dataPack, target);
|
|
WritePackCell(dataPack, userid);
|
|
WritePackCell(dataPack, GetClientUserId(target));
|
|
WritePackCell(dataPack, time);
|
|
WritePackCell(dataPack, _:reasonPack);
|
|
WritePackString(dataPack, name);
|
|
WritePackString(dataPack, auth);
|
|
WritePackString(dataPack, ip);
|
|
WritePackString(dataPack, adminAuth);
|
|
WritePackString(dataPack, adminIp);
|
|
|
|
ResetPack(dataPack);
|
|
ResetPack(reasonPack);
|
|
|
|
if(reason[0] != '\0')
|
|
{
|
|
// if we have a valid reason pass move forward with the ban
|
|
if(Database != INVALID_HANDLE)
|
|
{
|
|
UTIL_InsertBan(time, name, auth, ip, reason, adminAuth, adminIp, dataPack);
|
|
} else {
|
|
UTIL_InsertTempBan(time, name, auth, ip, reason, adminAuth, adminIp, dataPack);
|
|
}
|
|
} else {
|
|
// We need a reason so offer the administrator a menu of reasons
|
|
PlayerDataPack[admin] = dataPack;
|
|
DisplayMenu(ReasonMenuHandle, admin, MENU_TIME_FOREVER);
|
|
ReplyToCommand(admin, "%c[%cSourceBans%c]%c %t", GREEN, NAMECOLOR, GREEN, NAMECOLOR, "Check Menu");
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
stock UTIL_InsertBan(time, const String:Name[], const String:Authid[], const String:Ip[], const String:Reason[], const String:AdminAuthid[], const String:AdminIp[], Handle:Pack)
|
|
{
|
|
//new Handle:dummy;
|
|
//PruneBans(dummy);
|
|
decl String:banName[128];
|
|
decl String:banReason[256];
|
|
decl String:Query[1024];
|
|
SQL_EscapeString(Database, Name, banName, sizeof(banName));
|
|
SQL_EscapeString(Database, Reason, banReason, sizeof(banReason));
|
|
if( serverID == -1 )
|
|
{
|
|
FormatEx(Query, sizeof(Query), "INSERT INTO %s_bans (ip, authid, name, created, ends, length, reason, aid, adminIp, sid, country) VALUES \
|
|
('%s', '%s', '%s', UNIX_TIMESTAMP(), UNIX_TIMESTAMP() + %d, %d, '%s', IFNULL((SELECT aid FROM %s_admins WHERE authid = '%s' OR authid REGEXP '^STEAM_[0-9]:%s$'),'0'), '%s', \
|
|
(SELECT sid FROM %s_servers WHERE ip = '%s' AND port = '%s' LIMIT 0,1), ' ')",
|
|
DatabasePrefix, Ip, Authid, banName, (time*60), (time*60), banReason, DatabasePrefix, AdminAuthid, AdminAuthid[8], AdminIp, DatabasePrefix, ServerIp, ServerPort);
|
|
}else{
|
|
FormatEx(Query, sizeof(Query), "INSERT INTO %s_bans (ip, authid, name, created, ends, length, reason, aid, adminIp, sid, country) VALUES \
|
|
('%s', '%s', '%s', UNIX_TIMESTAMP(), UNIX_TIMESTAMP() + %d, %d, '%s', IFNULL((SELECT aid FROM %s_admins WHERE authid = '%s' OR authid REGEXP '^STEAM_[0-9]:%s$'),'0'), '%s', \
|
|
%d, ' ')",
|
|
DatabasePrefix, Ip, Authid, banName, (time*60), (time*60), banReason, DatabasePrefix, AdminAuthid, AdminAuthid[8], AdminIp, serverID);
|
|
}
|
|
|
|
SQL_TQuery(Database, VerifyInsert, Query, Pack, DBPrio_High);
|
|
}
|
|
|
|
stock UTIL_InsertTempBan(time, const String:name[], const String:auth[], const String:ip[], const String:reason[], const String:adminAuth[], const String:adminIp[], Handle:dataPack)
|
|
{
|
|
ReadPackCell(dataPack);
|
|
new client = ReadPackCell(dataPack);
|
|
SetPackPosition(dataPack, 40);
|
|
new Handle:reasonPack = Handle:ReadPackCell(dataPack);
|
|
if(reasonPack != INVALID_HANDLE)
|
|
{
|
|
CloseHandle(reasonPack);
|
|
}
|
|
CloseHandle(dataPack);
|
|
|
|
// we add a temporary ban and then add the record into the queue to be processed when the database is available
|
|
decl String:buffer[50];
|
|
Format(buffer, sizeof(buffer), "banid %d %s", ProcessQueueTime, auth);
|
|
ServerCommand(buffer);
|
|
if(IsClientInGame(client))
|
|
KickClient(client, "%t", "Banned Check Site", WebsiteAddress);
|
|
|
|
decl String:banName[128];
|
|
decl String:banReason[256];
|
|
decl String:query[512];
|
|
SQL_EscapeString(SQLiteDB, name, banName, sizeof(banName));
|
|
SQL_EscapeString(SQLiteDB, reason, banReason, sizeof(banReason));
|
|
FormatEx( query, sizeof(query), "INSERT INTO queue VALUES ('%s', %i, %i, '%s', '%s', '%s', '%s', '%s')",
|
|
auth, time, GetTime(), banReason, banName, ip, adminAuth, adminIp);
|
|
SQL_TQuery(SQLiteDB, ErrorCheckCallback, query);
|
|
}
|
|
|
|
stock CheckLoadAdmins()
|
|
{
|
|
for(new i = 1; i <= MaxClients; i++)
|
|
{
|
|
if(IsClientInGame(i))
|
|
{
|
|
RunAdminCacheChecks(i);
|
|
NotifyPostAdminCheck(i);
|
|
}
|
|
}
|
|
}
|
|
|
|
stock InsertServerInfo()
|
|
{
|
|
if(Database == INVALID_HANDLE)
|
|
{
|
|
return;
|
|
}
|
|
|
|
decl String:query[100], pieces[4];
|
|
new longip = GetConVarInt(CvarHostIp);
|
|
pieces[0] = (longip >> 24) & 0x000000FF;
|
|
pieces[1] = (longip >> 16) & 0x000000FF;
|
|
pieces[2] = (longip >> 8) & 0x000000FF;
|
|
pieces[3] = longip & 0x000000FF;
|
|
FormatEx(ServerIp, sizeof(ServerIp), "%d.%d.%d.%d", pieces[0], pieces[1], pieces[2], pieces[3]);
|
|
GetConVarString(CvarPort, ServerPort, sizeof(ServerPort));
|
|
|
|
if(AutoAdd != false)
|
|
{
|
|
FormatEx(query, sizeof(query), "SELECT sid FROM %s_servers WHERE ip = '%s' AND port = '%s'", DatabasePrefix, ServerIp, ServerPort);
|
|
SQL_TQuery(Database, ServerInfoCallback, query);
|
|
}
|
|
}
|
|
|
|
stock PrepareBan(client, target, time, String:reason[], size)
|
|
{
|
|
#if defined DEBUG
|
|
LogToFile(logFile, "PrepareBan()");
|
|
#endif
|
|
if(!target || !IsClientInGame(target))
|
|
return;
|
|
decl String:authid[64], String:name[32], String:bannedSite[512];
|
|
GetClientAuthString(target, authid, sizeof(authid));
|
|
GetClientName(target, name, sizeof(name));
|
|
|
|
|
|
if(CreateBan(client, target, time, reason))
|
|
{
|
|
if (!time)
|
|
{
|
|
if (reason[0] == '\0')
|
|
{
|
|
ShowActivity(client, "%t", "Permabanned player", name);
|
|
} else {
|
|
ShowActivity(client, "%t", "Permabanned player reason", name, reason);
|
|
}
|
|
} else {
|
|
if (reason[0] == '\0')
|
|
{
|
|
ShowActivity(client, "%t", "Banned player", name, time);
|
|
} else {
|
|
ShowActivity(client, "%t", "Banned player reason", name, time, reason);
|
|
}
|
|
}
|
|
LogAction(client, target, "\"%L\" banned \"%L\" (minutes \"%d\") (reason \"%s\")", client, target, time, reason);
|
|
|
|
if(time > 5 || time == 0)
|
|
time = 5;
|
|
Format(bannedSite, sizeof(bannedSite), "%T", "Banned Check Site", target, WebsiteAddress);
|
|
BanClient(target, time, BANFLAG_AUTO, bannedSite, bannedSite, "sm_ban", client);
|
|
}
|
|
|
|
g_BanTarget[client] = -1;
|
|
g_BanTime[client] = -1;
|
|
}
|
|
|
|
stock ReadConfig()
|
|
{
|
|
InitializeConfigParser();
|
|
|
|
if (ConfigParser == INVALID_HANDLE)
|
|
{
|
|
return;
|
|
}
|
|
|
|
decl String:ConfigFile[PLATFORM_MAX_PATH];
|
|
BuildPath(Path_SM, ConfigFile, sizeof(ConfigFile), "configs/sourcebans/sourcebans.cfg");
|
|
|
|
if(FileExists(ConfigFile))
|
|
{
|
|
InternalReadConfig(ConfigFile);
|
|
PrintToServer("%sLoading configs/sourcebans.cfg config file", Prefix);
|
|
} else {
|
|
decl String:Error[PLATFORM_MAX_PATH + 64];
|
|
FormatEx(Error, sizeof(Error), "%sFATAL *** ERROR *** can not find %s", Prefix, ConfigFile);
|
|
LogToFile(logFile, "FATAL *** ERROR *** can not find %s", ConfigFile);
|
|
SetFailState(Error);
|
|
}
|
|
}
|
|
|
|
stock ResetSettings()
|
|
{
|
|
CommandDisable = 0;
|
|
|
|
ResetMenu();
|
|
ReadConfig();
|
|
}
|
|
|
|
//Yarr! |