etbloat: Enemy Territory mod based on legacy
This mod is based on the legacy mod, from https://www.etlegacy.com. Its goal is to add fun abilities to legacy, in conflict with legacy's goal to stay close to default game mod (etmain).
This project is not endorsed by the ET:Legacy Team.
Note that this mod uses a new directory named etbloat. It must not conflict with legacy mod.
- Double jump: see cvar
- Shot while leaning: see cvar
To add double jump. Jaymod style prevents double jumping after some time, ETPub style does based on velocity (may not work as expected), Nitmod style does no check.
- 0: disable (default)
- 1: Jaymod style (recommended)
- 2: Nitmod style
- 3: ETPub style
Default value: 1.4
Values must be greater than 0
To allow to shot while leaning.
- 0: disable (default)
- 1: enable
Here is a list of features that I want to add to etbloat. Cvars will be added to enable and customize these features. If possible, features will be implemented within Lua.
- Customizable shot rate (global or per weapon)
- Allow shot underwater
- Add new fun weapons (like tripmines)
The legacy mod contains an anti-wallhack (sv_wh_active) and an anti-warp (g_antiwarp). I believe these are the only things possible to prevent cheating, as well as human checks. It supports also a command (sv_cvar) to restrict client cvars values. On the other hand, I won't implement client checksum verification, firstly because it prevents custom clients (I love open source), and secondly because it's easily bypassable (just have to send a checksum accepted by the server).
Development and compilation
- etlegacy contains the code fetched from upstream/master (from etlegacy repo). It gets compiled, and if it works, it's merged into the development branch.
- development is the working branch.
- master contains the latest compilable code.
To compile etbloat, you need to check ET Legacy's README. Here is the list of CMake parameters needed to only compile the mod:
-DBUILD_CLIENT=OFF -DCROSS_COMPILE32=ON # do not build client, build 32-bit version (to target most of users) -DCMAKE_TOOLCHAIN_FILE=../cmake/Toolchain-cross-mingw-linux.cmake # to build for Windows (optional) - correct cmake path if not building in ./build
etbloat is released under the same license terms as ET Legacy.
Wolfenstein: Enemy Territory GPL Source Code Copyright (C) 1999-2010 id Software LLC, a ZeniMax Media company.
OpenWolf GPL Source Code Copyright (C) 2011 Dusan Jocic
ET: Legacy Copyright (C) 2012-2017 ET:Legacy Team firstname.lastname@example.org
etbloat Copyright (C) 2016-2017 Elouan Martinet email@example.com
etbloat is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
etbloat is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with etbloat (see COPYING.txt). If not, see http://www.gnu.org/licenses/.
ADDITIONAL TERMS: The Wolfenstein: Enemy Territory GPL Source Code is also subject to certain additional terms. You should have received a copy of these additional terms immediately following the terms and conditions of the GNU GPL which accompanied the Wolf ET Source Code. If not, please request a copy in writing from id Software at id Software LLC, c/o ZeniMax Media Inc., Suite 120, Rockville, Maryland 20850 USA.
EXCLUDED CODE: The code described below and contained in the Wolfenstein: Enemy Territory GPL Source Code release is not part of the Program covered by the GPL and is expressly excluded from its terms. You are solely responsible for obtaining from the copyright holder a license for such code and complying with the applicable license terms.
MD4 Message-Digest Algorithm
Copyright (C) 1991-1992, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all mater ial mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such work s are identified as "derived from the RSA Data Security, Inc. MD4 Message-Digest Algorithm" in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchanta bility of this software or the suitability of this software for any particular p urpose. It is provided "as is" without express or implied warranty of any kind.
MD5 Message-Digest Algorithm
The MD5 algorithm was developed by Ron Rivest. The public domain C language implementation used in this program was written by Colin Plumb in 1993, no copyright is claimed.
This software is in the public domain. Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, without any conditions or restrictions. This software is provided "as is" without express or implied warranty.