summaryrefslogtreecommitdiff
path: root/protocol.py
blob: 33ff2033a8d57047e943e361c33cd166a2956983 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
########################################################################################
#     This file is part of Spheres.
#     Copyright (C) 2019  Jesusalva

#     This library is free software; you can redistribute it and/or
#     modify it under the terms of the GNU Lesser General Public
#     License as published by the Free Software Foundation; either
#     version 2.1 of the License, or (at your option) any later version.

#     This library is distributed in the hope that it will be useful,
#     but WITHOUT ANY WARRANTY; without even the implied warranty of
#     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
#     Lesser General Public License for more details.

#     You should have received a copy of the GNU Lesser General Public
#     License along with this library; if not, write to the Free Software
#     Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
########################################################################################
# Protocol Module
# Parses packets
import utils
import player
import battle.main as battle
from consts import ERR_BAD, ERR_DONE, PACKET_NACK, PACKET_ACK

# self.data structure: <Token> ; <Message> ; <JSON Arguments>
def parse(packet, conn):
    ##########################################################################
    # Maybe it is a RAW packet
    if (packet.lower() == "ping"):
        return [PACKET_ACK, "PONG"]

    ##########################################################################
    # Not a raw packet, so it must adhere to the convention
    data=packet.split(';')
    if (len(data) != 3):
        return [PACKET_NACK, "Invalid packet (RAW)"]
    t=data[0]

    ##########################################################################
    # Maybe it is an honest login attempt, or a registration attempt
    if data[1] == "login":
        # TODO: Create a token
        if t == "0":
            t=utils.create_token()
        r=player.get_data(data[2], t)
        if r is ERR_BAD:
            return [PACKET_NACK, "Login error"]
        else:
            conn.token = t
            return [PACKET_ACK, r]
    elif data[1] == "register":
        r=player.register(data[2], t)
        if r is ERR_BAD:
            return [PACKET_NACK, "Invalid registration attempt"]
        else:
            return [PACKET_ACK, r]

    ##########################################################################
    # It is not, so Validate token format
    print("Data0: %s | Alpnum: %s" % (str(data[0]), str(data[0].isalnum()) ))
    if not data[0].isalnum():
        return [PACKET_NACK, "Invalid packet (TOKENF)"]

    # TODO: Now validate the token itself

    ##########################################################################
    # Top level protocols
    if data[1] == "logout":
        player.clear(t)
        r=ERR_DONE
    elif data[1] == "get_inv":
        r=player.get_inv(data[2], t)
    elif data[1] == "battle":
        r=battle.battle(data[2], t)
    elif data[1] == "reload_battle":
        try:
            r=battle.reload_battle(t)
        except:
            r=[PACKET_ACK, "CANCELLED"]
    elif data[1] == "begin_quest":
        r=battle.begin_quest(data[2], t)
    elif data[1] == "get_party":
        r=player.get_party(data[2], t)
    else:
        r=ERR_BAD

    if r == ERR_BAD:
        return [PACKET_NACK, "Invalid Protocol (400)"]
    else:
        return [PACKET_ACK, r]