mirror of
https://github.com/etlegacy/wolfadmin.git
synced 2024-11-29 15:32:19 +00:00
67 lines
2.9 KiB
Lua
67 lines
2.9 KiB
Lua
|
|
-- WolfAdmin module for Wolfenstein: Enemy Territory servers.
|
|
-- Copyright (C) 2015-2016 Timo 'Timothy' Smit
|
|
|
|
-- This program is free software: you can redistribute it and/or modify
|
|
-- it under the terms of the GNU General Public License as published by
|
|
-- the Free Software Foundation, either version 3 of the License, or
|
|
-- at your option any later version.
|
|
|
|
-- This program is distributed in the hope that it will be useful,
|
|
-- but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
-- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
-- GNU General Public License for more details.
|
|
|
|
-- You should have received a copy of the GNU General Public License
|
|
-- along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
local auth = require "luascripts.wolfadmin.auth.auth"
|
|
|
|
local commands = require "luascripts.wolfadmin.commands.commands"
|
|
|
|
local players = require "luascripts.wolfadmin.players.players"
|
|
|
|
local util = require "luascripts.wolfadmin.util.util"
|
|
|
|
function commandPlayerLock(clientId, cmdArguments)
|
|
if cmdArguments[1] == nil then
|
|
et.trap_SendConsoleCommand(et.EXEC_APPEND, "csay "..clientId.." \"^dplock usage: "..commands.getadmin("plock")["syntax"].."\";")
|
|
|
|
return true
|
|
elseif tonumber(cmdArguments[1]) == nil then
|
|
cmdClient = et.ClientNumberFromString(cmdArguments[1])
|
|
else
|
|
cmdClient = tonumber(cmdArguments[1])
|
|
end
|
|
|
|
if cmdClient == -1 then
|
|
et.trap_SendConsoleCommand(et.EXEC_APPEND, "csay "..clientId.." \"^dplock: ^9no or multiple matches for '^7"..cmdArguments[1].."^9'.\";")
|
|
|
|
return true
|
|
elseif not et.gentity_get(cmdClient, "pers.netname") then
|
|
et.trap_SendConsoleCommand(et.EXEC_APPEND, "csay "..clientId.." \"^dplock: ^9no connected player by that name or slot #\";")
|
|
|
|
return true
|
|
end
|
|
|
|
if players.isTeamLocked(cmdClient) then
|
|
et.trap_SendConsoleCommand(et.EXEC_APPEND, "csay "..clientId.." \"^dplock: ^7"..et.gentity_get(cmdClient, "pers.netname").." ^9is already locked to a team.\";")
|
|
|
|
return true
|
|
elseif auth.isallowed(cmdClient, "!") == 1 then
|
|
et.trap_SendConsoleCommand(et.EXEC_APPEND, "csay "..clientId.." \"^dplock: ^7"..et.gentity_get(cmdClient, "pers.netname").." ^9is immune to this command.\";")
|
|
|
|
return true
|
|
elseif auth.getlevel(cmdClient) > auth.getlevel(clientId) then
|
|
et.trap_SendConsoleCommand(et.EXEC_APPEND, "csay "..clientId.." \"^dplock: ^9sorry, but your intended victim has a higher admin level than you do.\";")
|
|
|
|
return true
|
|
end
|
|
|
|
et.trap_SendConsoleCommand(et.EXEC_APPEND, "chat \"^dplock: ^7"..et.gentity_get(cmdClient, "pers.netname").." ^9has been locked to his team\";")
|
|
|
|
players.setTeamLocked(cmdClient, true)
|
|
|
|
return true
|
|
end
|
|
commands.addadmin("plock", commandPlayerLock, auth.PERM_LOCKPLAYER, "locks a player to a specific team", "^9[^3name|slot#^9]")
|