async def from_submission(cls, data: list[str]) -> "Score": """Create a score object from an osu! submission string.""" s = cls() """ parse the following format # 0 online_checksum # 1 n300 # 2 n100 # 3 n50 # 4 ngeki # 5 nkatu # 6 nmiss # 7 score # 8 max_combo # 9 perfect # 10 grade # 11 mods # 12 passed # 13 gamemode # 14 play_time # yyMMddHHmmss # 15 osu_version + (" " * client_flags) """ s.online_checksum = data[0] s.n300, s.n100, s.n50, s.ngeki, s.nkatu, s.nmiss, s.score, s.max_combo = map( int, data[1:9], ) s.perfect = data[9] == "True" _grade = data[10] # letter grade s.mods = Mods(int(data[11])) s.passed = data[12] == "True" s.mode = GameMode.from_params(int(data[13]), s.mods) # TODO: we might want to use data[14] to get more # accurate submission time (client side) but # we'd probably want to check if it's close. s.play_time = datetime.now() s.client_flags = ClientFlags(data[15].count(" ") & ~4) s.grade = Grade.from_str(_grade) if s.passed else Grade.F return s
async def from_sql(cls, scoreid: int, scores_table: str) -> Optional['Score']: """Create a score object from sql using it's scoreid.""" # XXX: perhaps in the future this should take a gamemode rather # than just the sql table? just faster on the current setup :P res = await glob.db.fetch( 'SELECT id, map_md5, userid, pp, score, ' 'max_combo, mods, acc, n300, n100, n50, ' 'nmiss, ngeki, nkatu, grade, perfect, ' 'status, mode, play_time, ' 'time_elapsed, client_flags, online_checksum ' f'FROM {scores_table} WHERE id = %s', [scoreid], _dict=False) if not res: return s = cls() s.id = res[0] s.bmap = await Beatmap.from_md5(res[1]) s.player = await glob.players.get_ensure(id=res[2]) (s.pp, s.score, s.max_combo, s.mods, s.acc, s.n300, s.n100, s.n50, s.nmiss, s.ngeki, s.nkatu, s.grade, s.perfect, s.status, mode_vn, s.play_time, s.time_elapsed, s.client_flags, s.online_checksum) = res[3:] # fix some types s.passed = s.status != 0 s.status = SubmissionStatus(s.status) s.grade = Grade.from_str(s.grade) s.mods = Mods(s.mods) s.mode = GameMode.from_params(mode_vn, s.mods) s.client_flags = ClientFlags(s.client_flags) if s.bmap: s.rank = await s.calc_lb_placement() return s
async def lastFM(p: Player, conn: AsyncConnection) -> Optional[bytes]: if conn.args['b'][0] != 'a': # not anticheat related, tell the # client not to send any more for now. return b'-3' flags = ClientFlags(int(conn.args['b'][1:])) if flags & (ClientFlags.HQAssembly | ClientFlags.HQFile): # Player is currently running hq!osu; could possibly # be a separate client, buuuut prooobably not lol. await p.ban(glob.bot, f'hq!osu running ({flags})') return b'-3' if flags & ClientFlags.RegistryEdits: # Player has registry edits left from # hq!osu's multiaccounting tool. This # does not necessarily mean they are # using it now, but they have in the past. if random.randrange(32) == 0: # Random chance (1/32) for a ban. await p.ban(glob.bot, f'hq!osu relife 1/32') return b'-3' p.enqueue(packets.notification('\n'.join([ "Hey!", "It appears you have hq!osu's multiaccounting tool (relife) enabled.", "This tool leaves a change in your registry that the osu! client can detect.", "Please re-install relife and disable the program to avoid possible ban." ]))) await p.logout() return b'-3' """ These checks only worked for ~5 hours from release. rumoi's quick!
@web_handler('lastfm.php') def lastFM(req: Request) -> Optional[bytes]: if not all(x in req.args for x in required_params_lastFM): printlog(f'lastfm req missing params.') return if not (p := glob.players.get_from_cred(req.args['us'], req.args['ha'])): return if not req.args['b'].startswith('a') \ or not req.args['b'][1:].isnumeric(): return # Non-anticheat related. flags = ClientFlags(int(req.args['b'][1:])) if flags & (ClientFlags.HQAssembly | ClientFlags.HQFile): # Player is currently running hq!osu; could possibly # be a separate client, buuuut prooobably not lol. p.restrict() return if flags & ClientFlags.RegistryEdits: # Player has registry edits left from # hq!osu's multiaccounting tool. This # does not necessarily mean they are # using it now, but they have in the past. if randrange(32) == 0:
async def from_submission(cls, data_b64: str, iv_b64: str, osu_ver: str, pw_md5: str) -> Optional['Score']: """Create a score object from an osu! submission string.""" aes = RijndaelCbc(key=f'osu!-scoreburgr---------{osu_ver}', iv=b64decode(iv_b64), padding=Pkcs7Padding(32), block_size=32) # score data is delimited by colons (:). data = aes.decrypt(b64decode(data_b64)).decode().split(':') if len(data) != 18: log('Received an invalid score submission.', Ansi.LRED) return s = cls() if len(data[0]) != 32 or len(data[2]) != 32: return map_md5 = data[0] pname = data[1].rstrip() # rstrip 1 space if client has supporter s.online_checksum = data[2] # get the map & player for the score. s.bmap = await Beatmap.from_md5(map_md5) s.player = await glob.players.get_login(pname, pw_md5) if not s.player: # return the obj with an empty player to # determine whether the score failed to # be parsed vs. the user could not be found # logged in (we want to not send a reply to # the osu! client if they're simply not logged # in, so that it will retry once they login). return s # XXX: unused idx 2: online score checksum # perhaps will use to improve security at some point? # ensure all ints are safe to cast. if not all(map(str.isdecimal, data[3:11] + [data[13], data[15]])): log('Invalid parameter passed into submit-modular.', Ansi.LRED) return (s.n300, s.n100, s.n50, s.ngeki, s.nkatu, s.nmiss, s.score, s.max_combo) = map(int, data[3:11]) s.perfect = data[11] == 'True' _grade = data[12] # letter grade s.mods = Mods(int(data[13])) s.passed = data[14] == 'True' s.mode = GameMode.from_params(int(data[15]), s.mods) s.play_time = datetime.now() # TODO: use data[16] s.client_flags = ClientFlags(data[17].count(' ') & ~4) s.grade = Grade.from_str(_grade) if s.passed else Grade.F # all data read from submission. # now we can calculate things based on our data. s.calc_accuracy() if s.bmap: osu_file_path = BEATMAPS_PATH / f'{s.bmap.id}.osu' if await ensure_local_osu_file(osu_file_path, s.bmap.id, s.bmap.md5): s.pp, s.sr = s.calc_diff(osu_file_path) if s.passed: await s.calc_status() if s.bmap.status != RankedStatus.Pending: s.rank = await s.calc_lb_placement() else: s.status = SubmissionStatus.FAILED else: s.pp = s.sr = 0.0 if s.passed: s.status = SubmissionStatus.SUBMITTED else: s.status = SubmissionStatus.FAILED return s
@web_handler('lastfm.php', required_args=('b', 'action', 'us', 'ha')) async def lastFM(conn: AsyncConnection) -> Optional[bytes]: pname = unquote(conn.args['us']) phash = conn.args['ha'] if not (p := await glob.players.get_login(pname, phash)): return # not logged in if conn.args['b'][0] != 'a': # not anticheat related, tell the # client not to send any more for now. return b'-3' flags = ClientFlags(int(conn.args['b'][1:])) if flags & (ClientFlags.HQAssembly | ClientFlags.HQFile): # Player is currently running hq!osu; could possibly # be a separate client, buuuut prooobably not lol. await p.restrict() return b'-3' if flags & ClientFlags.RegistryEdits: # Player has registry edits left from # hq!osu's multiaccounting tool. This # does not necessarily mean they are # using it now, but they have in the past. if random.randrange(32) == 0: