UNPKG

mojang-auth

Version:

Mojang authentication client, re-implementing parts of `node-yggdrasil` in classes, and adding support for custom auth servers.

116 lines (115 loc) 6.65 kB
"use strict"; var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } return new (P || (P = Promise))(function (resolve, reject) { function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } step((generator = generator.apply(thisArg, _arguments || [])).next()); }); }; var __generator = (this && this.__generator) || function (thisArg, body) { var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g; return g = { next: verb(0), "throw": verb(1), "return": verb(2) }, typeof Symbol === "function" && (g[Symbol.iterator] = function() { return this; }), g; function verb(n) { return function (v) { return step([n, v]); }; } function step(op) { if (f) throw new TypeError("Generator is already executing."); while (_) try { if (f = 1, y && (t = op[0] & 2 ? y["return"] : op[0] ? y["throw"] || ((t = y["return"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t; if (y = 0, t) op = [op[0] & 2, t.value]; switch (op[0]) { case 0: case 1: t = op; break; case 4: _.label++; return { value: op[1], done: false }; case 5: _.label++; y = op[1]; op = [0]; continue; case 7: op = _.ops.pop(); _.trys.pop(); continue; default: if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; } if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; } if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; } if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; } if (t[2]) _.ops.pop(); _.trys.pop(); continue; } op = body.call(thisArg, _); } catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; } if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true }; } }; exports.__esModule = true; exports.setDefaultHost = exports.defaultHost = void 0; var crypto_1 = require("crypto"); var utils_1 = require("./utils"); var node_fetch_1 = require("node-fetch"); exports.defaultHost = 'https://sessionserver.mojang.com'; exports.setDefaultHost = function (val) { exports.defaultHost = val; }; var Server = /** @class */ (function () { function Server(options) { Object.assign(this, options); } /** * Client's Mojang handshake call * See http://wiki.vg/Protocol_Encryption#Client * @param {String} accessToken Client's accessToken * @param {String} selectedProfile Client's selectedProfile * @param {String} serverid ASCII encoding of the server ID * @param {String} sharedsecret Server's secret string * @param {String} serverkey Server's encoded public key * @param {Function} cb (is okay, data returned by server) * @async */ Server.prototype.join = function (accessToken, selectedProfile, serverid, sharedsecret, serverkey) { var _a, _b, _c; return __awaiter(this, void 0, void 0, function () { return __generator(this, function (_d) { switch (_d.label) { case 0: return [4 /*yield*/, utils_1["default"].call((_b = (_a = this) === null || _a === void 0 ? void 0 : _a.host) !== null && _b !== void 0 ? _b : exports.defaultHost, 'session/minecraft/join', { accessToken: accessToken, selectedProfile: selectedProfile, serverId: utils_1["default"].mcHexDigest(crypto_1.createHash('sha1').update(serverid).update(sharedsecret).update(serverkey).digest()) }, (_c = this) === null || _c === void 0 ? void 0 : _c.agent)]; case 1: return [2 /*return*/, _d.sent()]; } }); }); }; /** * Server's Mojang handshake call * @param {String} username Client's username, case-sensitive * @param {String} serverid ASCII encoding of the server ID * @param {String} sharedsecret Server's secret string * @param {String} serverkey Server's encoded public key * @param {Function} cb (is okay, client info) * @async */ Server.prototype.hasJoined = function (username, serverid, sharedsecret, serverkey) { var _a, _b, _c; return __awaiter(this, void 0, void 0, function () { var host, hash, data, body, _d, _e; return __generator(this, function (_f) { switch (_f.label) { case 0: host = (_b = (_a = this) === null || _a === void 0 ? void 0 : _a.host) !== null && _b !== void 0 ? _b : exports.defaultHost; hash = utils_1["default"].mcHexDigest(crypto_1.createHash('sha1').update(serverid).update(sharedsecret).update(serverkey).digest()); return [4 /*yield*/, node_fetch_1["default"](host + "/session/minecraft/hasJoined?username=" + username + "&serverId=" + hash, { agent: (_c = this) === null || _c === void 0 ? void 0 : _c.agent, method: 'GET' })]; case 1: data = _f.sent(); _e = (_d = JSON).parse; return [4 /*yield*/, data.text()]; case 2: body = _e.apply(_d, [_f.sent()]); if (body.id !== undefined) return [2 /*return*/, body]; else throw new Error('Failed to verify username!'); return [2 /*return*/]; } }); }); }; return Server; }()); exports["default"] = Server; Server.prototype.join = utils_1["default"].callbackify(Server.prototype.join, 5); Server.prototype.hasJoined = utils_1["default"].callbackify(Server.prototype.hasJoined, 4);