i downloaded this pack http://www.maxcheaters.com/forum/index.php?topic=69667.0
and i found it great !!
on problem is that when i heal myself through the buffer it uses Greater Battle Heal and it shows me some error on the window of the buffer...
this is from the ___init___.py
if event == "102":
st.takeItems(ADENA_ID,1000)
st.getPlayer().useMagic(SkillTable.getInstance().getInfo(1218,33),False,False)
st.getPlayer().restoreHPMP()
return "1.htm"
st.setState(State.COMPLETED)
and this is what i get in the console...
C:\L2ServerMaruca\GameServer\data\scripts\custom\9999_NPCBuffer\__init__.py
Traceback (innermost last):
File "__init__.py", line 776, in onEvent
AttributeError: restoreHPMP
at org.python.core.Py.AttributeError(Unknown Source)
at org.python.core.PyInstance.invoke(Unknown Source)
at org.python.pycode.serializable._pyx1252789985753.onEvent$3(__init__.py:776)
at org.python.pycode.serializable._pyx1252789985753.call_function(__init__.py)
at org.python.core.PyTableCode.call(Unknown Source)
at org.python.core.PyTableCode.call(Unknown Source)
at org.python.core.PyTableCode.call(Unknown Source)
at org.python.core.PyFunction.__call__(Unknown Source)
at org.python.core.PyMethod.__call__(Unknown Source)
at org.python.core.PyObject.__call__(Unknown Source)
at org.python.core.PyObject._jcallexc(Unknown Source)
at org.python.core.PyObject._jcall(Unknown Source)
at org.python.proxies.main$Quest$408.onEvent(Unknown Source)
at net.sf.l2j.gameserver.model.quest.Quest.onAdvEvent(Quest.java:571)
at net.sf.l2j.gameserver.model.quest.Quest.notifyEvent(Quest.java:399)
at net.sf.l2j.gameserver.model.actor.instance.L2PcInstance.processQuestEvent(L2PcInstance.java:1590)
at net.sf.l2j.gameserver.network.clientpackets.RequestBypassToServer.runImpl(RequestBypassToServer.java:201)
at net.sf.l2j.gameserver.network.clientpackets.L2GameClientPacket.run(L2GameClientPacket.java:76)
at java.util.concurrent.ThreadPoolExecutor$Worker.runTask(Unknown Source
)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source)
at java.lang.Thread.run(Unknown Source)