diff --git a/RangeBan.Tests/RangeBan.Tests.csproj b/RangeBan.Tests/RangeBan.Tests.csproj new file mode 100644 index 0000000..c5fdb94 --- /dev/null +++ b/RangeBan.Tests/RangeBan.Tests.csproj @@ -0,0 +1,27 @@ + + + + net9.0 + latest + enable + enable + false + + + + + + + + + + + + + + + + + + + diff --git a/RangeBan.Tests/UnitTest1.cs b/RangeBan.Tests/UnitTest1.cs new file mode 100644 index 0000000..aa6c860 --- /dev/null +++ b/RangeBan.Tests/UnitTest1.cs @@ -0,0 +1,61 @@ +namespace RangeBan.Tests; + +[TestFixture] +public class IpRangeTests +{ + [Test] + public void IsInRange_WithNullInput_ReturnsFalse() + { + Assert.That(RangeBan.IsInRange("192.168.1.0/24", null), Is.False); + } + + [Test] + public void IsInRange_WithEmptyInput_ReturnsFalse() + { + Assert.That(RangeBan.IsInRange("192.168.1.0/24", ""), Is.False); + } + + [Test] + public void IsInRange_WithInvalidRange_ReturnsFalse() + { + Assert.That(RangeBan.IsInRange("invalid-range", "192.168.1.1"), Is.False); + } + + [TestCase("192.168.1.0/24", "192.168.1.1", true)] + [TestCase("192.168.1.0/24", "192.168.1.254", true)] + [TestCase("192.168.1.0/24", "192.168.2.1", false)] + [TestCase("192.168.1.0/24", "10.0.0.1", false)] + [TestCase("176.2.0.0/16", "176.2.73.23", true)] + [TestCase("176.2.0.0/16", "176.2.70.50", true)] + public void IsInRange_WithCidrNotation_ReturnsExpectedResult(string range, string ip, bool expected) + { + Assert.That(RangeBan.IsInRange(range, ip), Is.EqualTo(expected)); + } + + [TestCase("192.168.2.0/33")] + [TestCase("192.168.1.0/invalid")] + public void IsInRange_WithInvalidCidrNotation_ReturnsFalse(string range) + { + Assert.That(RangeBan.IsInRange(range, "192.168.1.1"), Is.False); + } + + [Test] + public void IsInRange_WithInvalidIpAddress_ThrowsArgumentException() + { + Assert.Throws(() => RangeBan.IsInRange("192.168.1.0/24", "invalid.ip.address")); + } + + [TestCase("192.168.1.0/24", "192.168.1")] + [TestCase("192.168.1.0/24", "192.168.1.1.1")] + [TestCase("192.168.1.0/24", "not.an.ip.address")] + public void IsInRange_WithMalformedIpAddress_ThrowsArgumentException(string range, string ip) + { + Assert.Throws(() => RangeBan.IsInRange(range, ip)); + } + + [Test] + public void IsInRange_WithValidPublicIp_DoesNotThrow() + { + Assert.DoesNotThrow(() => RangeBan.IsInRange("192.168.1.0/24", "8.8.8.8")); + } +} \ No newline at end of file diff --git a/RangeBan/RangeBan.cs b/RangeBan/RangeBan.cs new file mode 100644 index 0000000..77418f5 --- /dev/null +++ b/RangeBan/RangeBan.cs @@ -0,0 +1,94 @@ +using System.Runtime.Serialization; +using LabApi.Events.Arguments.PlayerEvents; +using LabApi.Events.Handlers; +using LabApi.Features; +using LabApi.Features.Console; +using LabApi.Loader.Features.Plugins; + +namespace RangeBan; + +public class RangeBan: Plugin +{ + + public override void Enable() + { + Logger.Debug("Loading..."); + PlayerEvents.PreAuthenticating += OnAuth; + } + + public override void Disable() + { + Logger.Debug("Disabling..."); + PlayerEvents.PreAuthenticating -= OnAuth; + } + + private void OnAuth(PlayerPreAuthenticatingEventArgs ev) + { + Logger.Debug($"Ranges: {string.Join(" ; ", Config!.IpRanges)}"); + if (!Config!.IpRanges.Any(configIpRange => IsInRange(configIpRange, ev.IpAddress))) return; + ev.RejectCustom("Your IP belongs to a banned player, please contact the server administrator for more information."); + Logger.Warn($"Player with IP {ev.IpAddress} got kicked. UserId: {ev.UserId}"); + } + + public override string Name => "RangeBan"; + public override string Author => "Code002Lover"; + public override Version Version { get; } = new(1, 0, 0); + public override string Description => "Ban IP Ranges with ease"; + public override Version RequiredApiVersion { get; } = new(LabApiProperties.CompiledVersion); + + + public static bool IsInRange(string range, string ip) + { + if (string.IsNullOrEmpty(ip) || string.IsNullOrEmpty(range)) + return false; + + // Handle CIDR notation (e.g., "192.168.1.0/24") + if (!range.Contains("/")) + { + //We only handle direct IPs and CIDR + if (range.Split('.').Length != 4) + { + return false; + } + + return ip == range; + }; + + var parts = range.Split('/'); + if (parts.Length != 2 || !int.TryParse(parts[1], out var cidrBits)) + return false; + + if (cidrBits > 32) + { + return false; + } + + var networkAddress = IPToUInt32(parts[0]); + var mask = uint.MaxValue << (32 - cidrBits); + var ipAddress = IPToUInt32(ip); + + return (ipAddress & mask) == (networkAddress & mask); + + } + + private static uint IPToUInt32(string ipAddress) + { + var parts = ipAddress.Split('.'); + if (parts.Length != 4) + throw new ArgumentException("Invalid IP address format"); + + uint result = 0; + for (var i = 0; i < 4; i++) + { + if (!byte.TryParse(parts[i], out var part)) + throw new ArgumentException("Invalid IP address segment"); + result = (result << 8) | part; + } + return result; + } +} + +public class RangeBanConfig +{ + public string[] IpRanges { get; set; } = {}; +} diff --git a/RangeBan/RangeBan.csproj b/RangeBan/RangeBan.csproj new file mode 100644 index 0000000..56e256b --- /dev/null +++ b/RangeBan/RangeBan.csproj @@ -0,0 +1,37 @@ + + + + net48 + enable + disable + 10 + + + + true + true + full + + + + true + false + none + + + + + ..\..\.local\share\Steam\steamapps\common\SCP Secret Laboratory Dedicated Server\SCPSL_Data\Managed\Assembly-CSharp.dll + + + ..\..\.local\share\Steam\steamapps\common\SCP Secret Laboratory Dedicated Server\SCPSL_Data\Managed\Mirror.dll + + + ..\..\.local\share\Steam\steamapps\common\SCP Secret Laboratory Dedicated Server\SCPSL_Data\Managed\UnityEngine.CoreModule.dll + + + + + + + diff --git a/SecretPluginLaboratories.sln b/SecretPluginLaboratories.sln index e523ddb..3db4dbd 100644 --- a/SecretPluginLaboratories.sln +++ b/SecretPluginLaboratories.sln @@ -12,6 +12,10 @@ Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "SCPTeamHint", "SCPTeamHint\ EndProject Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "LogEvents", "LogEvents\LogEvents.csproj", "{2C9FD537-231C-4486-8C1B-6359E5120D19}" EndProject +Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "RangeBan", "RangeBan\RangeBan.csproj", "{17798161-3317-4E64-880D-1CD7DE0EBE56}" +EndProject +Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "RangeBan.Tests", "RangeBan.Tests\RangeBan.Tests.csproj", "{AA495D0E-0122-4C26-8D26-C728B65BFF12}" +EndProject Global GlobalSection(SolutionConfigurationPlatforms) = preSolution Debug|Any CPU = Debug|Any CPU @@ -42,5 +46,13 @@ Global {2C9FD537-231C-4486-8C1B-6359E5120D19}.Debug|Any CPU.Build.0 = Debug|Any CPU {2C9FD537-231C-4486-8C1B-6359E5120D19}.Release|Any CPU.ActiveCfg = Release|Any CPU {2C9FD537-231C-4486-8C1B-6359E5120D19}.Release|Any CPU.Build.0 = Release|Any CPU + {17798161-3317-4E64-880D-1CD7DE0EBE56}.Debug|Any CPU.ActiveCfg = Debug|Any CPU + {17798161-3317-4E64-880D-1CD7DE0EBE56}.Debug|Any CPU.Build.0 = Debug|Any CPU + {17798161-3317-4E64-880D-1CD7DE0EBE56}.Release|Any CPU.ActiveCfg = Release|Any CPU + {17798161-3317-4E64-880D-1CD7DE0EBE56}.Release|Any CPU.Build.0 = Release|Any CPU + {AA495D0E-0122-4C26-8D26-C728B65BFF12}.Debug|Any CPU.ActiveCfg = Debug|Any CPU + {AA495D0E-0122-4C26-8D26-C728B65BFF12}.Debug|Any CPU.Build.0 = Debug|Any CPU + {AA495D0E-0122-4C26-8D26-C728B65BFF12}.Release|Any CPU.ActiveCfg = Release|Any CPU + {AA495D0E-0122-4C26-8D26-C728B65BFF12}.Release|Any CPU.Build.0 = Release|Any CPU EndGlobalSection EndGlobal