1
0
mirror of synced 2024-11-28 07:50:48 +01:00
artemis/titles/sao/index.py

138 lines
5.2 KiB
Python
Raw Normal View History

from typing import Tuple, Dict, List
from twisted.web.http import Request
import yaml
import logging, coloredlogs
from logging.handlers import TimedRotatingFileHandler
from os import path
2023-11-09 17:51:50 +01:00
from Crypto.Cipher import Blowfish
2023-11-10 00:11:58 +01:00
from hashlib import md5
2023-11-10 02:56:03 +01:00
import random
from core import CoreConfig, Utils
from core.title import BaseServlet
from titles.sao.config import SaoConfig
from titles.sao.const import SaoConstants
from titles.sao.base import SaoBase
from titles.sao.handlers.base import *
class SaoServlet(BaseServlet):
def __init__(self, core_cfg: CoreConfig, cfg_dir: str) -> None:
super().__init__(core_cfg, cfg_dir)
self.config_dir = cfg_dir
self.game_cfg = SaoConfig()
if path.exists(f"{cfg_dir}/sao.yaml"):
self.game_cfg.update(yaml.safe_load(open(f"{cfg_dir}/sao.yaml")))
self.logger = logging.getLogger("sao")
if not hasattr(self.logger, "inited"):
log_fmt_str = "[%(asctime)s] SAO | %(levelname)s | %(message)s"
log_fmt = logging.Formatter(log_fmt_str)
fileHandler = TimedRotatingFileHandler(
"{0}/{1}.log".format(self.core_cfg.server.log_dir, "sao"),
encoding="utf8",
when="d",
backupCount=10,
)
fileHandler.setFormatter(log_fmt)
consoleHandler = logging.StreamHandler()
consoleHandler.setFormatter(log_fmt)
self.logger.addHandler(fileHandler)
self.logger.addHandler(consoleHandler)
self.logger.setLevel(self.game_cfg.server.loglevel)
coloredlogs.install(
level=self.game_cfg.server.loglevel, logger=self.logger, fmt=log_fmt_str
)
self.logger.inited = True
self.base = SaoBase(core_cfg, self.game_cfg)
2023-11-10 00:11:58 +01:00
self.static_hash = None
if self.game_cfg.hash.verify_hash:
2023-11-10 03:00:51 +01:00
self.static_hash = md5(self.game_cfg.hash.hash_base.encode()).digest() # Greate hashing guys, really validates the data
def get_endpoint_matchers(self) -> Tuple[List[Tuple[str, str, Dict]], List[Tuple[str, str, Dict]]]:
return (
[],
[("render_POST", "/{datecode}/proto/if/{category}/{endpoint}", {})]
)
@classmethod
def is_game_enabled(cls, game_code: str, core_cfg: CoreConfig, cfg_dir: str) -> bool:
game_cfg = SaoConfig()
if path.exists(f"{cfg_dir}/{SaoConstants.CONFIG_NAME}"):
game_cfg.update(
yaml.safe_load(open(f"{cfg_dir}/{SaoConstants.CONFIG_NAME}"))
)
if not game_cfg.server.enable:
return False
return True
def get_allnet_info(self, game_code: str, game_ver: int, keychip: str) -> Tuple[str, str]:
if not self.core_cfg.server.is_using_proxy and Utils.get_title_port_ssl(self.core_cfg):
2023-11-11 05:20:30 +01:00
return (
f"https://{self.core_cfg.title.hostname}:{self.core_cfg.title.port_ssl}/",
f"{self.core_cfg.title.hostname}/",
)
return (f"http://{self.core_cfg.title.hostname}:{self.core_cfg.title.port}/", "")
def get_mucha_info(self, core_cfg: CoreConfig, cfg_dir: str) -> Tuple[bool, str]:
if not self.game_cfg.server.enable:
return (False, "")
return (True, "SAO1")
def render_POST(self, request: Request, game_code: str, matchers: Dict) -> bytes:
endpoint = matchers.get('endpoint', '')
request.responseHeaders.addRawHeader(b"content-type", b"text/html; charset=utf-8")
2023-11-10 02:56:03 +01:00
iv = b""
2023-11-09 19:16:32 +01:00
req_raw = request.content.read()
sao_request = req_raw.hex()
req_header = SaoRequestHeader(req_raw)
cmd_str = f"{req_header.cmd:04x}"
2023-11-10 00:11:58 +01:00
if self.game_cfg.hash.verify_hash and self.static_hash != req_header.hash:
self.logger.error(f"Hash mismatch! Expecting {self.static_hash} but recieved {req_header.hash}")
return b""
2023-11-09 19:16:32 +01:00
if self.game_cfg.crypt.enable:
2023-11-10 00:11:58 +01:00
iv = req_raw[40:48]
2023-11-10 03:00:51 +01:00
cipher = Blowfish.new(self.game_cfg.crypt.key.encode(), Blowfish.MODE_CBC, iv)
2023-11-10 00:11:58 +01:00
crypt_data = req_raw[48:]
2023-11-09 19:16:32 +01:00
req_data = cipher.decrypt(crypt_data)
2023-11-10 00:11:58 +01:00
self.logger.debug(f"Decrypted {req_data.hex()} with IV {iv.hex()}")
2023-11-09 19:16:32 +01:00
else:
2023-11-10 00:11:58 +01:00
req_data = req_raw[40:]
2023-11-09 19:16:32 +01:00
handler = getattr(self.base, f"handle_{cmd_str}", self.base.handle_noop)
self.logger.info(f"{endpoint} - {cmd_str} request")
self.logger.debug(f"Request: {req_raw.hex()}")
resp = handler(req_header, req_data)
2023-11-10 03:09:55 +01:00
2023-07-05 18:35:00 +02:00
self.logger.debug(f"Response: {resp.hex()}")
2023-11-10 02:56:03 +01:00
if self.game_cfg.crypt.enable:
iv = random.randbytes(8)
2023-11-10 03:05:30 +01:00
data_to_crypt = resp[24:]
while len(data_to_crypt) % 8 != 0:
data_to_crypt += b"\x00"
2023-11-10 03:00:51 +01:00
cipher = Blowfish.new(self.game_cfg.crypt.key.encode(), Blowfish.MODE_CBC, iv)
2023-11-10 03:05:30 +01:00
data_crypt = cipher.encrypt(data_to_crypt)
2023-11-10 03:23:19 +01:00
crypt_data_len = len(data_crypt) + len(iv)
2023-11-10 03:17:18 +01:00
tmp = struct.pack("!I", crypt_data_len) # does it want the length of the encrypted response??
resp = resp[:20] + tmp + iv + data_crypt
2023-11-10 02:56:33 +01:00
self.logger.debug(f"Encrypted Response: {resp.hex()}")
2023-11-10 02:56:03 +01:00
2023-07-05 18:35:00 +02:00
return resp