代码拉取完成,页面将自动刷新
同步操作将从 Ranossy/majsoul_wrapper 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
# -*- coding: utf-8 -*-
#捕获websocket数据并解析雀魂"动作"语义为Json
import os
import sys
import time
import json
import struct
import pickle
import random
import argparse
from xmlrpc.client import ServerProxy
import base64
from enum import Enum
import importlib
from typing import List, Tuple, Dict
from google.protobuf.json_format import MessageToDict
try:
from .proto import liqi_pb2 as pb
except:
from proto import liqi_pb2 as pb
class MsgType(Enum):
Notify = 1
Req = 2
Res = 3
class LiqiProto:
def __init__(self):
#解析一局的WS消息队列
self.tot = 0 # 当前总共解析的包数量
# (method_name:str,pb.MethodObj) for 256 sliding windows; req->res
self.res_type = dict() # int -> (method_name,pb2obj)
self.jsonProto = json.load(
open(os.path.join(os.path.dirname(__file__), 'proto\liqi.json'), 'r'))
def init(self):
self.tot = 0
self.res_type.clear()
def parse(self, flow_msg) -> bool:
#parse一帧WS flow msg,要求按顺序parse
buf = flow_msg.content
from_client = flow_msg.from_client
result = dict()
msg_type = MsgType(buf[0]) # 通信报文类型
if msg_type == MsgType.Notify:
msg_block = fromProtobuf(buf[1:]) # 解析剩余报文结构
method_name = msg_block[0]['data'].decode()
"""
msg_block结构通常为
[{'id': 1, 'type': 'string', 'data': b'.lq.ActionPrototype'},
{'id': 2, 'type': 'string','data': b'protobuf_bytes'}]
"""
_, lq, message_name = method_name.split('.')
liqi_pb2_notify = getattr(pb, message_name)
proto_obj = liqi_pb2_notify.FromString(msg_block[1]['data'])
dict_obj = MessageToDict(proto_obj)
if 'data' in dict_obj:
B = base64.b64decode(dict_obj['data'])
action_proto_obj = getattr(pb, dict_obj['name']).FromString(B)
action_dict_obj = MessageToDict(action_proto_obj)
dict_obj['data'] = action_dict_obj
msg_id = self.tot
else:
msg_id = struct.unpack('<H', buf[1:3])[0] # 小端序解析报文编号(0~255)
msg_block = fromProtobuf(buf[3:]) # 解析剩余报文结构
"""
msg_block结构通常为
[{'id': 1, 'type': 'string', 'data': b'.lq.FastTest.authGame'},
{'id': 2, 'type': 'string','data': b'protobuf_bytes'}]
"""
if msg_type == MsgType.Req:
assert(msg_id < 1 << 16)
assert(len(msg_block) == 2)
assert(msg_id not in self.res_type)
method_name = msg_block[0]['data'].decode()
_, lq, service, rpc = method_name.split('.')
proto_domain = self.jsonProto['nested'][lq]['nested'][service]['methods'][rpc]
liqi_pb2_req = getattr(pb, proto_domain['requestType'])
proto_obj = liqi_pb2_req.FromString(msg_block[1]['data'])
dict_obj = MessageToDict(proto_obj)
self.res_type[msg_id] = (method_name, getattr(
pb, proto_domain['responseType'])) # wait response
elif msg_type == MsgType.Res:
assert(len(msg_block[0]['data']) == 0)
assert(msg_id in self.res_type)
method_name, liqi_pb2_res = self.res_type.pop(msg_id)
proto_obj = liqi_pb2_res.FromString(msg_block[1]['data'])
dict_obj = MessageToDict(proto_obj)
result = {'id': msg_id, 'type': msg_type,
'method': method_name, 'data': dict_obj}
self.tot += 1
return result
def tamperUsetime(flow_msg) -> bool:
"""
If flow_msg is a '.lq.FastTest.inputOperation' and
have a 'timeuse' domain, change it to a random number in 1-4
for extending the time limit of the server to the client.
Return whether the data has been tampered.
"""
def getById(A, id):
for d in A:
if d['id'] == id:
return d
return None
buf = flow_msg.content
from_client = flow_msg.from_client
result = dict()
msg_type = MsgType(buf[0]) # 通信报文类型
if msg_type == MsgType.Notify:
L0 = fromProtobuf(buf[1:]) # 解析剩余报文结构
assert(toProtobuf(L0) == buf[1:])
method_name = L0[0]['data'].decode()
if method_name == '.lq.ActionPrototype':
_, lq, message_name = method_name.split('.')
liqi_pb2_notify = getattr(pb, message_name)
L1 = fromProtobuf(L0[1]['data'])
assert(toProtobuf(L1) == L0[1]['data'])
action_name = L1[1]['data'].decode()
if action_name == 'ActionDealTile':
L2 = fromProtobuf(L1[2]['data'])
assert(toProtobuf(L2) == L1[2]['data'])
d3 = getById(L2, 4)
if d3 != None:
L3 = fromProtobuf(d3['data'])
if getById(L3, 5) != None:
d4 = getById(L3, 4)
if d4 != None:
x = 1+L0[1]['begin']+2+L1[2]['begin'] + \
2+d3['begin']+2+d4['begin']+1
old_value, p = parseVarint(buf, x)
if old_value < 20000:
d4['data'] = 20000
else:
old_value = 0
L3.append(
{'id': 4, 'type': 'varint', 'data': 20000})
L3 = sorted(L3, key=lambda x: x['id'])
print('[TamperTimeAdd] from', old_value, 'to', 20000)
d3['data'] = toProtobuf(L3)
L1[2]['data'] = toProtobuf(L2)
L0[1]['data'] = toProtobuf(L1)
flow_msg.content = buf[0:1]+toProtobuf(L0)
return True
elif msg_type == MsgType.Req:
msg_id = struct.unpack('<H', buf[1:3])[0]
msg_block = fromProtobuf(buf[3:])
method_name = msg_block[0]['data'].decode()
if method_name == '.lq.FastTest.inputOperation':
data_block = fromProtobuf(msg_block[1]['data'])
x = None
for d in data_block:
if d['id'] == 6:
x = 3+msg_block[1]['begin']+2+d['begin']+1
if x == None or buf[x] < 5:
return False
new_usetime = int(random.randint(1, 4)).to_bytes(1, 'little')
print('[TamperUseTime] from', int(buf[x]), 'to', new_usetime)
flow_msg.content = buf[:x]+new_usetime+buf[x+1:]
return True
return False
def toVarint(x: int) -> bytes:
data = 0
base = 0
length = 0
if x == 0:
return b'\x00'
while(x > 0):
length += 1
data += (x & 127) << base
x >>= 7
if x > 0:
data += 1 << (base+7)
base += 8
return data.to_bytes(length, 'little')
def parseVarint(buf, p):
# parse a varint from protobuf
data = 0
base = 0
while(p < len(buf)):
data += (buf[p] & 127) << base
base += 7
p += 1
if buf[p-1] >> 7 == 0:
break
return (data, p)
def fromProtobuf(buf) -> List[Dict]:
"""
dump the struct of protobuf,观察报文结构
buf: protobuf bytes
"""
p = 0
result = []
while(p < len(buf)):
block_begin = p
block_type = (buf[p] & 7)
block_id = buf[p] >> 3
p += 1
if block_type == 0:
#varint
block_type = 'varint'
data, p = parseVarint(buf, p)
elif block_type == 2:
#string
block_type = 'string'
s_len, p = parseVarint(buf, p)
data = buf[p:p+s_len]
p += s_len
else:
raise Exception('unknow type:', block_type, ' at', p)
result.append({'id': block_id, 'type': block_type,
'data': data, 'begin': block_begin})
return result
def toProtobuf(data: List[Dict]) -> bytes:
"""
Inverse operation of 'fromProtobuf'
"""
result = b''
for d in data:
if d['type'] == 'varint':
result += ((d['id'] << 3)+0).to_bytes(length=1, byteorder='little')
result += toVarint(d['data'])
elif d['type'] == 'string':
result += ((d['id'] << 3)+2).to_bytes(length=1, byteorder='little')
result += toVarint(len(d['data']))
result += d['data']
else:
raise NotImplementedError
return result
def dumpWebSocket(filename='ws_dump.pkl'):
server = ServerProxy("http://127.0.0.1:37247") # 初始化服务器
liqi = LiqiProto()
tot = 0
history_msg = []
while True:
n = server.get_len()
if tot < n:
flow = pickle.loads(server.get_items(tot, n).data)
for flow_msg in flow:
result = liqi.parse(flow_msg)
print(result)
print('-'*65)
#packet = flow_msg.content
#from_client = flow_msg.from_client
#print("[" + ("Sended" if from_client else "Reveived") +
# "]: decode the packet here: %r…" % packet)
tot += 1
history_msg = history_msg+flow
path = filename
pickle.dump(history_msg, open(path, 'wb'))
time.sleep(0.2)
def replayWebSocket(filename='ws_dump.pkl'):
path = filename
history_msg = pickle.load(open(path, 'rb'))
liqi = LiqiProto()
for flow_msg in history_msg:
result = liqi.parse(flow_msg)
print(result)
print('-'*65)
if __name__ == '__main__':
parser = argparse.ArgumentParser(description="Demo of Liqi Proto")
parser.add_argument('-d', '--dump', default='')
parser.add_argument('-l', '--load', default='')
args = parser.parse_args()
if args.dump != '':
dumpWebSocket(args.dump)
elif args.load != '':
replayWebSocket(args.load)
else:
print('Instruction not supported.')
print('Use "python -m majsoul_wrapper.liqi --dump FILE"')
print(' or "python -m majsoul_wrapper.liqi --load FILE"')
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。