2016-05-18 17:12:46 +00:00
from helpers import userHelper
from constants import serverPackets
from constants import exceptions
from objects import glob
2016-05-17 21:40:34 +00:00
from helpers import consoleHelper
from constants import bcolors
2016-05-18 17:12:46 +00:00
from helpers import locationHelper
from helpers import countryHelper
2016-04-19 17:40:59 +00:00
import time
2016-05-18 17:12:46 +00:00
from helpers import generalFunctions
2016-05-17 21:40:34 +00:00
import sys
import traceback
2016-05-31 20:49:30 +00:00
from helpers import requestHelper
2016-06-02 17:22:02 +00:00
from helpers import discordBotHelper
2016-06-04 10:44:54 +00:00
from helpers import logHelper as log
2016-07-14 10:37:07 +00:00
from helpers import chatHelper as chat
2016-07-20 09:59:53 +00:00
from constants import privileges
2016-04-19 17:40:59 +00:00
2016-05-31 20:49:30 +00:00
def handle ( tornadoRequest ) :
2016-04-19 17:40:59 +00:00
# Data to return
responseTokenString = " ayy "
responseData = bytes ( )
2016-06-04 10:44:54 +00:00
# Get IP from tornado request
2016-05-31 20:49:30 +00:00
requestIP = tornadoRequest . getRequestIP ( )
2016-04-19 17:40:59 +00:00
2016-07-20 09:59:53 +00:00
# Avoid exceptions
clientData = [ " unknown " , " unknown " , " unknown " , " unknown " , " unknown " ]
osuVersion = " unknown "
2016-04-19 17:40:59 +00:00
# Split POST body so we can get username/password/hardware data
# 2:-3 thing is because requestData has some escape stuff that we don't need
2016-05-31 20:49:30 +00:00
loginData = str ( tornadoRequest . request . body ) [ 2 : - 3 ] . split ( " \\ n " )
2016-04-19 17:40:59 +00:00
try :
# If true, print error to console
err = False
2016-07-14 10:37:07 +00:00
# Make sure loginData is valid
if len ( loginData ) < 3 :
raise exceptions . haxException ( )
2016-07-20 09:59:53 +00:00
# Get HWID, MAC address and more
# Structure (new line = "|", already split)
# [0] osu! version
# [1] plain mac addressed, separated by "."
# [2] mac addresses hash set
# [3] unique ID
# [4] disk ID
splitData = loginData [ 2 ] . split ( " | " )
osuVersion = splitData [ 0 ]
2016-08-01 18:38:26 +00:00
timeOffset = int ( splitData [ 1 ] )
print ( str ( timeOffset ) )
2016-07-20 09:59:53 +00:00
clientData = splitData [ 3 ] . split ( " : " ) [ : 5 ]
if len ( clientData ) < 4 :
raise exceptions . forceUpdateException ( )
2016-04-19 17:40:59 +00:00
# Try to get the ID from username
2016-07-03 18:51:19 +00:00
username = str ( loginData [ 0 ] )
userID = userHelper . getID ( username )
2016-04-19 17:40:59 +00:00
if userID == False :
# Invalid username
raise exceptions . loginFailedException ( )
if userHelper . checkLogin ( userID , loginData [ 1 ] ) == False :
# Invalid password
raise exceptions . loginFailedException ( )
# Make sure we are not banned
2016-07-20 09:59:53 +00:00
priv = userHelper . getPrivileges ( userID )
if userHelper . isBanned ( userID ) == True and priv & privileges . USER_PENDING_VERIFICATION == 0 :
2016-04-19 17:40:59 +00:00
raise exceptions . loginBannedException ( )
2016-06-11 16:43:27 +00:00
# 2FA check
if userHelper . check2FA ( userID , requestIP ) == True :
log . warning ( " Need 2FA check for user {} " . format ( loginData [ 0 ] ) )
raise exceptions . need2FAException ( )
2016-06-10 11:15:42 +00:00
# No login errors!
2016-07-20 09:59:53 +00:00
# Verify this user (if pending activation)
firstLogin = False
if priv & privileges . USER_PENDING_VERIFICATION > 0 or userHelper . hasVerifiedHardware ( userID ) == False :
if userHelper . verifyUser ( userID , clientData ) == True :
# Valid account
log . info ( " Account {} verified successfully! " . format ( userID ) )
glob . verifiedCache [ str ( userID ) ] = 1
firstLogin = True
else :
# Multiaccount detected
log . info ( " Account {} NOT verified! " . format ( userID ) )
glob . verifiedCache [ str ( userID ) ] = 0
raise exceptions . loginBannedException ( )
2016-07-28 20:23:13 +00:00
# Save HWID in db for multiaccount detection
2016-07-20 09:59:53 +00:00
hwAllowed = userHelper . logHardware ( userID , clientData , firstLogin )
2016-07-28 20:23:13 +00:00
2016-07-20 09:59:53 +00:00
# This is false only if HWID is empty
# if HWID is banned, we get restricted so there's no
# need to deny bancho access
if hwAllowed == False :
raise exceptions . haxException ( )
2016-05-29 11:32:11 +00:00
# Log user IP
2016-07-28 20:23:13 +00:00
userHelper . logIP ( userID , requestIP )
2016-05-29 11:32:11 +00:00
2016-04-19 17:40:59 +00:00
# Delete old tokens for that user and generate a new one
glob . tokens . deleteOldTokens ( userID )
2016-08-01 18:38:26 +00:00
responseToken = glob . tokens . addToken ( userID , requestIP , timeOffset = timeOffset )
2016-04-19 17:40:59 +00:00
responseTokenString = responseToken . token
2016-07-14 10:37:07 +00:00
# Check restricted mode (and eventually send message)
responseToken . checkRestricted ( )
2016-06-09 08:43:28 +00:00
# Set silence end UNIX time in token
responseToken . silenceEndTime = userHelper . getSilenceEnd ( userID )
# Get only silence remaining seconds
silenceSeconds = responseToken . getSilenceSecondsLeft ( )
2016-04-19 17:40:59 +00:00
# Get supporter/GMT
userGMT = False
userSupporter = True
2016-07-03 18:51:19 +00:00
if responseToken . admin == True :
2016-04-19 17:40:59 +00:00
userGMT = True
# Server restarting check
if glob . restarting == True :
raise exceptions . banchoRestartingException ( )
2016-06-09 08:52:39 +00:00
# Send login notification before maintenance message
if glob . banchoConf . config [ " loginNotification " ] != " " :
responseToken . enqueue ( serverPackets . notification ( glob . banchoConf . config [ " loginNotification " ] ) )
2016-04-19 17:40:59 +00:00
# Maintenance check
if glob . banchoConf . config [ " banchoMaintenance " ] == True :
if userGMT == False :
# We are not mod/admin, delete token, send notification and logout
glob . tokens . deleteToken ( responseTokenString )
raise exceptions . banchoMaintenanceException ( )
else :
# We are mod/admin, send warning notification and continue
responseToken . enqueue ( serverPackets . notification ( " Bancho is in maintenance mode. Only mods/admins have full access to the server. \n Type !system maintenance off in chat to turn off maintenance mode. " ) )
# Send all needed login packets
2016-06-09 08:43:28 +00:00
responseToken . enqueue ( serverPackets . silenceEndTime ( silenceSeconds ) )
2016-04-19 17:40:59 +00:00
responseToken . enqueue ( serverPackets . userID ( userID ) )
responseToken . enqueue ( serverPackets . protocolVersion ( ) )
responseToken . enqueue ( serverPackets . userSupporterGMT ( userSupporter , userGMT ) )
2016-07-08 13:11:59 +00:00
responseToken . enqueue ( serverPackets . userPanel ( userID , True ) )
responseToken . enqueue ( serverPackets . userStats ( userID , True ) )
2016-04-19 17:40:59 +00:00
# Channel info end (before starting!?! wtf bancho?)
responseToken . enqueue ( serverPackets . channelInfoEnd ( ) )
# Default opened channels
# TODO: Configurable default channels
2016-07-14 10:37:07 +00:00
chat . joinChannel ( token = responseToken , channel = " #osu " )
chat . joinChannel ( token = responseToken , channel = " #announce " )
2016-07-03 18:51:19 +00:00
# Join admin channel if we are an admin
if responseToken . admin == True :
2016-07-14 10:37:07 +00:00
chat . joinChannel ( token = responseToken , channel = " #admin " )
2016-04-19 17:40:59 +00:00
# Output channels info
for key , value in glob . channels . channels . items ( ) :
2016-07-15 09:46:44 +00:00
if value . publicRead == True and value . hidden == False :
2016-04-19 17:40:59 +00:00
responseToken . enqueue ( serverPackets . channelInfo ( key ) )
2016-06-09 08:43:28 +00:00
# Send friends list
2016-04-19 17:40:59 +00:00
responseToken . enqueue ( serverPackets . friendList ( userID ) )
2016-06-09 08:52:39 +00:00
# Send main menu icon
2016-04-19 17:40:59 +00:00
if glob . banchoConf . config [ " menuIcon " ] != " " :
responseToken . enqueue ( serverPackets . mainMenuIcon ( glob . banchoConf . config [ " menuIcon " ] ) )
# Send online users IDs array
responseToken . enqueue ( serverPackets . onlineUsers ( ) )
# Get location and country from ip.zxq.co or database
2016-06-04 10:44:54 +00:00
if glob . localize == True :
2016-05-12 17:22:13 +00:00
# Get location and country from IP
location = locationHelper . getLocation ( requestIP )
countryLetters = locationHelper . getCountry ( requestIP )
country = countryHelper . getCountryID ( countryLetters )
2016-04-19 17:40:59 +00:00
else :
# Set location to 0,0 and get country from db
2016-06-04 10:44:54 +00:00
log . warning ( " Location skipped " )
2016-04-19 17:40:59 +00:00
location = [ 0 , 0 ]
2016-05-01 18:39:01 +00:00
countryLetters = " XX "
2016-04-19 17:40:59 +00:00
country = countryHelper . getCountryID ( userHelper . getCountry ( userID ) )
# Set location and country
responseToken . setLocation ( location )
responseToken . setCountry ( country )
2016-05-01 16:09:35 +00:00
# Set country in db if user has no country (first bancho login)
if userHelper . getCountry ( userID ) == " XX " :
userHelper . setCountry ( userID , countryLetters )
2016-07-08 13:11:59 +00:00
2016-07-03 18:51:19 +00:00
# Send to everyone our userpanel if we are not restricted
if responseToken . restricted == False :
glob . tokens . enqueueAll ( serverPackets . userPanel ( userID ) )
2016-04-19 17:40:59 +00:00
# Set reponse data to right value and reset our queue
responseData = responseToken . queue
responseToken . resetQueue ( )
except exceptions . loginFailedException :
# Login failed error packet
# (we don't use enqueue because we don't have a token since login has failed)
err = True
responseData + = serverPackets . loginFailed ( )
2016-07-14 10:37:07 +00:00
except exceptions . haxException :
# Invalid POST data
# (we don't use enqueue because we don't have a token since login has failed)
err = True
responseData + = serverPackets . loginFailed ( )
responseData + = serverPackets . notification ( " I see what you ' re doing... " )
2016-04-19 17:40:59 +00:00
except exceptions . loginBannedException :
# Login banned error packet
err = True
responseData + = serverPackets . loginBanned ( )
except exceptions . banchoMaintenanceException :
# Bancho is in maintenance mode
2016-07-08 13:11:59 +00:00
responseData = responseToken . queue
2016-04-19 17:40:59 +00:00
responseData + = serverPackets . notification ( " Our bancho server is in maintenance mode. Please try to login again later. " )
2016-06-11 16:43:27 +00:00
responseData + = serverPackets . loginFailed ( )
2016-04-19 17:40:59 +00:00
except exceptions . banchoRestartingException :
# Bancho is restarting
responseData + = serverPackets . notification ( " Bancho is restarting. Try again in a few minutes. " )
2016-06-11 16:43:27 +00:00
responseData + = serverPackets . loginFailed ( )
except exceptions . need2FAException :
# User tried to log in from unknown IP
responseData + = serverPackets . needVerification ( )
2016-07-20 09:59:53 +00:00
except exceptions . haxException :
2016-07-28 20:23:13 +00:00
# Using oldoldold client, we don't have client data. Force update.
2016-07-20 09:59:53 +00:00
# (we don't use enqueue because we don't have a token since login has failed)
err = True
responseData + = serverPackets . forceUpdate ( )
responseData + = serverPackets . notification ( " Hory shitto, your client is TOO old! Nice preistoria! Please turn off the switcher and update it. " )
2016-07-14 10:37:07 +00:00
except :
log . error ( " Unknown error! \n ``` \n {} \n {} ``` " . format ( sys . exc_info ( ) , traceback . format_exc ( ) ) )
2016-04-19 17:40:59 +00:00
finally :
2016-06-04 10:44:54 +00:00
# Console and discord log
2016-07-14 10:37:07 +00:00
if len ( loginData ) < 3 :
msg = " Invalid bancho login request from ** {} ** (insufficient POST data) " . format ( requestIP )
else :
2016-07-31 09:36:21 +00:00
msg = " Bancho login request from ** {} ** for user ** {} ** ( {} ) " . format ( requestIP , loginData [ 0 ] , " failed " if err == True else " success " )
2016-07-20 09:59:53 +00:00
log . info ( msg , " bunker " )
2016-06-02 17:22:02 +00:00
# Return token string and data
2016-08-23 18:35:47 +00:00
return ( responseTokenString , responseData )