diff --git a/docs/api/steam.client.cdn.rst b/docs/api/steam.client.cdn.rst new file mode 100644 index 0000000..a6982d6 --- /dev/null +++ b/docs/api/steam.client.cdn.rst @@ -0,0 +1,10 @@ +cdn +=== + +.. automodule:: steam.client.cdn + :members: + :member-order: alphabetical + :undoc-members: + :inherited-members: + :show-inheritance: + diff --git a/docs/api/steam.client.rst b/docs/api/steam.client.rst index 641ffe2..61db034 100644 --- a/docs/api/steam.client.rst +++ b/docs/api/steam.client.rst @@ -10,6 +10,7 @@ client .. toctree:: steam.client.builtins + steam.client.cdn steam.client.gc steam.client.user diff --git a/docs/api/steam.core.manifest.rst b/docs/api/steam.core.manifest.rst new file mode 100644 index 0000000..fddc0be --- /dev/null +++ b/docs/api/steam.core.manifest.rst @@ -0,0 +1,7 @@ +manifest +======== + +.. automodule:: steam.core.manifest + :members: + :undoc-members: + :show-inheritance: diff --git a/docs/api/steam.core.rst b/docs/api/steam.core.rst index 5a2286a..1f04a8b 100644 --- a/docs/api/steam.core.rst +++ b/docs/api/steam.core.rst @@ -11,4 +11,5 @@ core steam.core.cm steam.core.connection steam.core.crypto + steam.core.manifest steam.core.msg diff --git a/requirements.txt b/requirements.txt index 08a91c2..d72929a 100644 --- a/requirements.txt +++ b/requirements.txt @@ -12,4 +12,6 @@ pytest-cov==2.5.1 mock==1.3.0 PyYAML==5.1 vcrpy==1.7.4 -sphinx==1.3.5 +sphinx==1.8.5 +sphinx_rtd_theme +cachetools>=3.0.0 diff --git a/setup.py b/setup.py index 9978cee..af0c1a7 100644 --- a/setup.py +++ b/setup.py @@ -22,6 +22,7 @@ install_requires = [ 'gevent>=1.2.0', 'protobuf>=3.0.0', 'gevent-eventemitter>=2.0', + 'cachetools>=3.0.0', ] install_extras = { diff --git a/steam/client/builtins/apps.py b/steam/client/builtins/apps.py index f358873..007894b 100644 --- a/steam/client/builtins/apps.py +++ b/steam/client/builtins/apps.py @@ -1,12 +1,25 @@ import vdf -from steam.enums import EResult +from steam.enums import EResult, EServerType from steam.enums.emsg import EMsg from steam.core.msg import MsgProto +from steam.util import ip_from_int, proto_fill_from_dict class Apps(object): + licenses = None #: :class:`dict` Account licenses + def __init__(self, *args, **kwargs): super(Apps, self).__init__(*args, **kwargs) + self.licenses = {} + self.on(self.EVENT_DISCONNECTED, self.__handle_disconnect) + self.on(EMsg.ClientLicenseList, self._handle_licenses) + + def __handle_disconnect(self): + self.licenses = {} + + def _handle_licenses(self, message): + for entry in message.body.licenses: + self.licenses[entry.package_id] = entry def get_player_count(self, app_id, timeout=5): """Get numbers of players for app id @@ -19,7 +32,7 @@ class Apps(object): resp = self.send_job_and_wait(MsgProto(EMsg.ClientGetNumberOfCurrentPlayersDP), {'appid': app_id}, timeout=timeout - ) + ) if resp is None: return EResult.Timeout elif resp.eresult == EResult.OK: @@ -30,9 +43,9 @@ class Apps(object): def get_product_info(self, apps=[], packages=[], timeout=15): """Get product info for apps and packages - :param apps: items in the list should be either just ``app_id``, or ``(app_id, access_token)`` + :param apps: items in the list should be either just ``app_id``, or :class:`dict` :type apps: :class:`list` - :param packages: items in the list should be either just ``package_id``, or ``(package_id, access_token)`` + :param packages: items in the list should be either just ``package_id``, or :class:`dict` :type packages: :class:`list` :return: dict with ``apps`` and ``packages`` containing their info, see example below :rtype: :class:`dict`, :class:`None` @@ -43,22 +56,23 @@ class Apps(object): 'packages': {123: {...}, ...} } """ - if not apps and not packages: return + if not apps and not packages: + return message = MsgProto(EMsg.ClientPICSProductInfoRequest) for app in apps: app_info = message.body.apps.add() app_info.only_public = False - if isinstance(app, tuple): - app_info.appid, app_info.access_token = app + if isinstance(app, dict): + proto_fill_from_dict(app_info, app) else: app_info.appid = app for package in packages: package_info = message.body.packages.add() - if isinstance(package, tuple): - package_info.appid, package_info.access_token = package + if isinstance(package, dict): + proto_fill_from_dict(package_info, package) else: package_info.packageid = package @@ -69,9 +83,8 @@ class Apps(object): data = dict(apps={}, packages={}) while True: - chunk = self.wait_event(job_id, timeout=timeout) + chunk = self.wait_event(job_id, timeout=timeout, raises=True) - if chunk is None: return chunk = chunk[0].body for app in chunk.apps: @@ -102,8 +115,8 @@ class Apps(object): 'send_app_info_changes': app_changes, 'send_package_info_changes': package_changes, }, - timeout=15 - ) + timeout=10 + ) def get_app_ticket(self, app_id): """Get app ownership ticket @@ -115,52 +128,55 @@ class Apps(object): """ return self.send_job_and_wait(MsgProto(EMsg.ClientGetAppOwnershipTicket), {'app_id': app_id}, - timeout=15 - ) + timeout=10 + ) - def get_depot_key(self, depot_id, app_id=0): + def get_depot_key(self, app_id, depot_id): """Get depot decryption key - :param depot_id: depot id - :type depot_id: :class:`int` :param app_id: app id - :type app_id: :class:`int` + :type app_id: :class:`int` + :param depot_id: depot id + :type depot_id: :class:`int` :return: `CMsgClientGetDepotDecryptionKeyResponse `_ :rtype: proto message """ return self.send_job_and_wait(MsgProto(EMsg.ClientGetDepotDecryptionKey), { - 'depot_id': depot_id, 'app_id': app_id, + 'depot_id': depot_id, }, - timeout=15 - ) + timeout=10 + ) - def get_cdn_auth_token(self, app_id, hostname): + def get_cdn_auth_token(self, depot_id, hostname): """Get CDN authentication token - :param app_id: app id - :type app_id: :class:`int` + .. note:: + This token is no longer needed for access to CDN files + + :param depot_id: depot id + :type depot_id: :class:`int` :param hostname: cdn hostname - :type hostname: :class:`str` + :type hostname: :class:`str` :return: `CMsgClientGetCDNAuthTokenResponse `_ :rtype: proto message """ return self.send_job_and_wait(MsgProto(EMsg.ClientGetCDNAuthToken), { - 'app_id': app_id, + 'depot_id': depot_id, 'host_name': hostname, }, - timeout=15 - ) + timeout=10 + ) - def get_product_access_tokens(self, app_ids=[], package_ids=[]): + def get_access_tokens(self, app_ids=[], package_ids=[]): """Get access tokens :param app_ids: list of app ids - :type app_ids: :class:`list` + :type app_ids: :class:`list` :param package_ids: list of package ids - :type package_ids: :class:`list` + :type package_ids: :class:`list` :return: dict with ``apps`` and ``packages`` containing their access tokens, see example below :rtype: :class:`dict`, :class:`None` @@ -170,20 +186,21 @@ class Apps(object): 'packages': {456: 'token', ...} } """ - if not app_ids and not package_ids: return + if not app_ids and not package_ids: + return resp = self.send_job_and_wait(MsgProto(EMsg.ClientPICSAccessTokenRequest), { 'appids': map(int, app_ids), 'packageids': map(int, package_ids), }, - timeout=15 - ) + timeout=10 + ) if resp: return {'apps': dict(map(lambda app: (app.appid, app.access_token), resp.app_access_tokens)), 'packages': dict(map(lambda pkg: (pkg.appid, pkg.access_token), resp.package_access_tokens)), - } + } def register_product_key(self, key): """Register/Redeem a CD-Key diff --git a/steam/client/cdn.py b/steam/client/cdn.py new file mode 100644 index 0000000..420e304 --- /dev/null +++ b/steam/client/cdn.py @@ -0,0 +1,807 @@ +""" +The :class:`.CDNClient` class provides a simple API for downloading Steam content from SteamPipe + +Initializing :class:`.CDNClient` requires a logged in :class:`.SteamClient` instance + +.. code:: python + + mysteam = SteamClient() + ... + mycdn = CDNClient(mysteam) + + +Getting depot manifests for an app + +.. code:: python + + >>> mycdn.get_manifests(570) + [, + , + , + , + , + , + , + , + , + , + , + , + , + , + , + , + , + , + , + , + ] + + >>> mycdn.get_manifests(570, filter_func=lambda depot_id, info: 'Dota 2 Content' in info['name']) + [, + , + , + , + , + ] + + +Listing files + +.. code:: python + + >>> file_list = mycdn.iter_files(570) + >>> list(file_list)[:10] + [, + , + , + , + , + , + , + , + , + + +Reading a file directly from SteamPipe + +.. code:: python + + >>> file_list = mycdn.iter_files(570, r'game\dota\gameinfo.gi') + >>> myfile = next(file_list) + + >>> print(myfile.read(80).decode('utf-8')) + "GameInfo" + { + game "Dota 2" + title "Dota 2" + + gamelogo 1 + type multiplayer_only + ... + +""" + +from zipfile import ZipFile +from io import BytesIO +from collections import OrderedDict, deque +from six import itervalues, iteritems +from binascii import crc32, unhexlify +from datetime import datetime +import logging +import struct + +import vdf +from gevent.pool import Pool as GPool +from cachetools import LRUCache +from steam import webapi +from steam.core.msg import MsgProto +from steam.enums import EResult, EServerType, EType +from steam.enums.emsg import EMsg +from steam.util.web import make_requests_session +from steam.core.crypto import symmetric_decrypt, symmetric_decrypt_ecb +from steam.core.manifest import DepotManifest, DepotFile +from steam.protobufs.content_manifest_pb2 import ContentManifestPayload + +try: + import lzma +except ImportError: + from backports import lzma + +def decrypt_manifest_gid_2(encrypted_gid, password): + """Decrypt manifest gid v2 bytes + + :param encrypted_gid: encrypted gid v2 bytes + :type encrypted_gid: bytes + :param password: encryption password + :type password: byt + :return: manifest gid + :rtype: int + """ + return struct.unpack('" % ( + self.__class__.__name__, + 'https' if self.https else 'http', + self.host, + self.port, + repr(self.type), + repr(self.cell_id), + ) + + +class CDNClient(object): + _LOG = logging.getLogger("CDNClient") + servers = deque() #: CS Server list + _chunk_cache = LRUCache(20) + cell_id = 0 #: Cell ID to use, initialized from SteamClient instance + + def __init__(self, client): + """CDNClient allows loading and reading of manifests for Steam apps are used + to list and download content + + :param client: logged in SteamClient instance + :type client: :class:`.SteamClient` + """ + self.steam = client #: SteamClient instance + if self.steam: + self.cell_id = self.steam.cell_id + + self.web = make_requests_session() + self.depot_keys = {} #: depot decryption keys + self.manifests = {} #: CDNDepotManifest instances + self.app_depots = {} #: app depot info + self.beta_passwords = {} #: beta branch decryption keys + self.licensed_app_ids = set() #: app_ids that the SteamClient instance has access to + self.licensed_depot_ids = set() #: depot_ids that the SteamClient instance has access to + + if not self.servers: + self.fetch_content_servers() + + self.load_licenses() + + def load_licenses(self): + """Read licenses from SteamClient instance, required for determining accessible content""" + self.licensed_app_ids.clear() + self.licensed_depot_ids.clear() + + if self.steam.steam_id.type == EType.AnonUser: + packages = [17906] + else: + if not self.steam.licenses: + self._LOG.debug("No steam licenses available. Is SteamClient instances connected?") + return + + packages = list(self.steam.licenses.keys()) + + for package_id, info in iteritems(self.steam.get_product_info(packages=packages)['packages']): + self.licensed_app_ids.update(info['appids'].values()) + self.licensed_depot_ids.update(info['depotids'].values()) + + def fetch_content_servers(self, num_servers=20): + """Update CS server list + + :param num_servers: numbers of CS server to fetch + :type num_servers: int + """ + self.servers.clear() + + self._LOG.debug("Trying to fetch content servers from Steam API") + + servers = get_content_servers_from_webapi(self.cell_id) + self.servers.extend(servers) + + if not self.servers: + raise ValueError("Failed to fetch content servers") + + def get_content_server(self, rotate=False): + """Get a CS server for content download + + :param rotate: forcefully rotate server list and get a new server + :type rotate: bool + """ + if rotate: + self.servers.rotate(-1) + return self.servers[0] + + def get_depot_key(self, app_id, depot_id): + """Get depot key, which is needed to decrypt files + + :param app_id: app id + :type app_id: int + :param depot_id: depot id + :type depot_id: int + :return: returns decryption key + :rtype: bytes + """ + if (app_id, depot_id) not in self.depot_keys: + msg = self.steam.get_depot_key(app_id, depot_id) + + if msg and msg.eresult == EResult.OK: + self.depot_keys[(app_id, depot_id)] = msg.depot_encryption_key + else: + raise ValueError("Failed getting depot key: %s" % repr( + EResult.Timeout if msg is None else EResult(msg.eresult))) + + return self.depot_keys[(app_id, depot_id)] + + def get(self, command, args): + server = self.get_content_server() + + while True: + url = "%s://%s:%s/%s/%s" % ( + 'https' if server.https else 'http', + server.host, + server.port, + command, + args, + ) + + try: + resp = self.web.get(url) + except: + pass + else: + if resp.ok: + return resp + elif resp.status_code in (401, 403, 404): + resp.raise_for_status() + + server = self.get_content_server(rotate=True) + + def get_chunk(self, app_id, depot_id, chunk_id): + """Download a single content chunk + + :param app_id: App ID + :type app_id: int + :param depot_id: Depot ID + :type depot_id: int + :param chunk_id: Chunk ID + :type chunk_id: int + :returns: chunk data + :rtype: bytes + """ + if (depot_id, chunk_id) not in self._chunk_cache: + resp = self.get('depot', '%s/chunk/%s' % (depot_id, chunk_id)) + + data = symmetric_decrypt(resp.content, self.get_depot_key(app_id, depot_id)) + + if data[:2] == b'VZ': + if data[-2:] != b'zv': + raise ValueError("VZ: Invalid footer: %s" % repr(data[-2:])) + if data[2:3] != b'a': + raise ValueError("VZ: Invalid version: %s" % repr(data[2:3])) + + vzfilter = lzma._decode_filter_properties(lzma.FILTER_LZMA1, data[7:12]) + vzdec = lzma.LZMADecompressor(lzma.FORMAT_RAW, filters=[vzfilter]) + checksum, decompressed_size = struct.unpack(' 0: + is_enc_branch = True + + if (app_id, branch) not in self.beta_passwords: + if not password: + raise ValueError("Branch %r requires a password" % branch) + + result = self.check_beta_password(app_id, password) + + if result != EResult.OK: + raise ValueError("Branch password is not valid. %r" % result) + + if (app_id, branch) not in self.beta_passwords: + raise ValueError("Incorrect password for branch %r" % branch) + + def async_fetch_manifest(app_id, depot_id, manifest_gid, name): + manifest = self.get_manifest(app_id, depot_id, manifest_gid) + manifest.name = name + return manifest + + tasks = [] + gpool = GPool(8) + + for depot_id, depot_info in iteritems(depots): + if not depot_id.isdigit(): + continue + + depot_id = int(depot_id) + + # if we have no license for the depot, no point trying as we won't get depot_key + if depot_id not in self.licensed_depot_ids: + self._LOG.debug("No license for depot %s (%s). Skipping...", + repr(depot_info['name']), + depot_id, + ) + continue + + # if filter_func set, use it to filter the list the depots + if filter_func and not filter_func(depot_id, depot_info): + continue + + # get manifests for the sharedinstalls + if depot_info.get('sharedinstall') == '1': + tasks.append(gpool.spawn(self.get_manifests, + int(depot_info['depotfromapp']), + filter_func=(lambda a, b: int(a) == depot_id), + )) + continue + + + # process depot, and get manifest for branch + if is_enc_branch: + egid = depot_info.get('encryptedmanifests', {}).get(branch, {}).get('encrypted_gid_2') + + if egid is not None: + manifest_gid = decrypt_manifest_gid_2(unhexlify(egid), + self.beta_passwords[(app_id, branch)]) + else: + manifest_gid = depot_info.get('manifests', {}).get('public') + else: + manifest_gid = depot_info.get('manifests', {}).get(branch) + + if manifest_gid is not None: + tasks.append(gpool.spawn(async_fetch_manifest, + app_id, + depot_id, + manifest_gid, + depot_info['name'], + )) + + manifests = [] + + for task in tasks: + try: + result = task.get() + except ValueError as exp: + self._LOG.error("Depot %s (%s): %s", + repr(depot_info['name']), + depot_id, + str(exp), + ) + else: + if isinstance(result, list): + manifests.extend(result) + else: + manifests.append(result) + + return manifests + + def iter_files(self, app_id, filename_filter=None, branch='public', password=None, filter_func=None): + """Like :meth:`.get_manifests` but returns a iterator that goes through all the files + in all the manifest. + + :param app_id: App ID + :type app_id: int + :param filename_filter: wildcard filter for file paths + :type branch: str + :param branch: branch name + :type branch: str + :param password: branch password for locked branches + :type password: str + :param filter_func: + Function to filter depots. ``func(depot_id, depot_info)`` + :returns: generator of of CDN files + :rtype: :class:`.CDNDepotFile` + """ + for manifest in self.get_manifests(app_id, branch, password, filter_func): + for fp in manifest.iter_files(filename_filter): + yield fp + + def get_manifest_for_workshop_item(self, item_id): + """Get the manifest file for a worshop item that is hosted on SteamPipe + + :param item_id: Workshop ID + :type item_id: int + :returns: manifest instance + :rtype: :class:`.CDNDepotManifest` + """ + resp, error = self.steam.unified_messages.send_and_wait('PublishedFile.GetDetails#1', { + 'publishedfileids': [item_id], + 'includetags': False, + 'includeadditionalpreviews': False, + 'includechildren': False, + 'includekvtags': False, + 'includevotes': False, + 'short_description': True, + 'includeforsaledata': False, + 'includemetadata': False, + 'language': 0 + }, timeout=7) + + if error: + raise error + + wf = None if resp is None else resp.publishedfiledetails[0] + + if wf is None or wf.result != EResult.OK: + raise ValueError("Failed getting workshop file info: %s" % repr( + EResult.Timeout if resp is None else EResult(wf.result))) + elif not wf.hcontent_file: + raise ValueError("Workshop file is not on SteamPipe") + + app_id = ws_app_id = wf.consumer_appid + + manifest = self.get_manifest(app_id, ws_app_id, wf.hcontent_file) + manifest.name = wf.title + return manifest + + +class CDNDepotManifest(DepotManifest): + name = None #: set only by :meth:`CDNClient.get_manifests` + + def __init__(self, cdn_client, app_id, data): + """Holds manifest metadata and file list. + + :param cdn_client: CDNClient instance + :type cdn_client: :class:`.CDNClient` + :param app_id: App ID + :type app_id: int + :param data: serialized manifest data + :type data: bytes + """ + self.cdn_client = cdn_client + self.app_id = app_id + DepotManifest.__init__(self, data) + + def __repr__(self): + params = ', '.join([ + "app_id=" + str(self.app_id), + "depot_id=" + str(self.depot_id), + "gid=" + str(self.gid), + "creation_time=" + repr( + datetime.utcfromtimestamp(self.metadata.creation_time).isoformat().replace('T', ' ') + ), + ]) + + if self.name: + params = repr(self.name) + ', ' + params + + if self.metadata.filenames_encrypted: + params += ', filenames_encrypted=True' + + return "<%s(%s)>" % ( + self.__class__.__name__, + params, + ) + + def deserialize(self, data): + DepotManifest.deserialize(self, data) + + # order chunks in ascending order by their offset + # required for CDNDepotFile + for mapping in self.payload.mappings: + mapping.chunks.sort(key=lambda x: x.offset) + + def _make_depot_file(self, file_mapping): + return CDNDepotFile(self, file_mapping) + + +class CDNDepotFile(DepotFile): + def __init__(self, manifest, file_mapping): + """File-like object proxy for content files located on SteamPipe + + :param manifest: parrent manifest instance + :type manifest: :class:`.CDNDepotManifest` + :param file_mapping: file mapping instance from manifest + :type file_mapping: ContentManifestPayload.FileMapping + """ + if not isinstance(manifest, CDNDepotManifest): + raise TypeError("Expected 'manifest' to be of type CDNDepotFile") + if not isinstance(file_mapping, ContentManifestPayload.FileMapping): + raise TypeError("Expected 'file_mapping' to be of type ContentManifestPayload.FileMapping") + + DepotFile.__init__(self, manifest, file_mapping) + + self.offset = 0 + self._lc = None + self._lcbuff = b'' + + def __repr__(self): + return "<%s(%s, %s, %s, %s, %s)>" % ( + self.__class__.__name__, + self.manifest.app_id, + self.manifest.depot_id, + self.manifest.gid, + repr(self.filename_raw), + 'is_directory=True' if self.is_directory else self.size, + ) + + @property + def seekable(self): + """:type: bool""" + return self.is_file + + def tell(self): + """:type: int""" + if not self.seekable: + raise ValueError("This file is not seekable, probably because its directory or symlink") + return self.offset + + def seek(self, offset, whence=0): + """Seen file + + :param offset: file offset + :type offset: int + :param whence: offset mode, see :meth:`io.IOBase.seek` + :type whence: int + """ + if not self.seekable: + raise ValueError("This file is not seekable, probably because its directory or symlink") + + if whence == 0: + if offset < 0: + raise IOError("Invalid argument") + elif whence == 1: + offset = self.offset + offset + elif whence == 2: + offset = self.size + offset + else: + raise ValueError("Invalid value for whence") + + self.offset = max(0, min(self.size, offset)) + + def _get_chunk(self, chunk): + if not self._lc or self._lc.sha != chunk.sha: + self._lcbuff = self.manifest.cdn_client.get_chunk( + self.manifest.app_id, + self.manifest.depot_id, + chunk.sha.hex(), + ) + self._lc = chunk + return self._lcbuff + + def __iter__(self): + return self + + def __next__(self): + return self.next() + + def __enter__(self): + return self + + def __exit__(self, type, value, traceback): + pass + + def next(self): + line = self.readline() + if line == b'': + raise StopIteration + return line + + def read(self, length=-1): + """Read bytes from the file + + :param length: number of bytes to read. Read the whole if not set + :type length: int + :returns: file data + :rtype: bytes + """ + if length == -1: + length = self.size - self.offset + if length == 0 or self.offset >= self.size or self.size == 0: + return b'' + + end_offset = self.offset + length + + # we cache last chunk to allow small length reads and local seek + if (self._lc + and self.offset >= self._lc.offset + and end_offset <= self._lc.offset + self._lc.cb_original): + data = self._lcbuff[self.offset - self._lc.offset:self.offset - self._lc.offset + length] + # if we need to read outside the bounds of the cached chunk + # we go to loop over chunks to determine which to download + else: + data = BytesIO() + start_offset = None + + # Manifest orders the chunks in ascending order by offset + for chunk in self.chunks: + if chunk.offset >= end_offset: + break + elif (chunk.offset <= self.offset < chunk.offset + chunk.cb_original + or chunk.offset < end_offset <= chunk.offset + chunk.cb_original): + if start_offset is None: + start_offset = chunk.offset + data.write(self._get_chunk(chunk)) + + data.seek(self.offset - start_offset) + data = data.read(length) + + self.offset = min(self.size, end_offset) + return data + + def readline(self): + """Read a single line + + :return: single file line + :rtype: bytes + """ + buf = b'' + + for chunk in iter(lambda: self.read(256), b''): + pos = chunk.find(b'\n') + if pos > -1: + pos += 1 # include \n + buf += chunk[:pos] + self.seek(self.offset - (len(chunk) - pos)) + break + + buf += chunk + + return buf + + def readlines(self): + """Get file contents as list of lines + + :return: list of lines + :rtype: :class:`list` [:class:`bytes`] + """ + return [line for line in self] diff --git a/steam/core/crypto.py b/steam/core/crypto.py index 07f83f4..6fb2867 100644 --- a/steam/core/crypto.py +++ b/steam/core/crypto.py @@ -48,6 +48,9 @@ def symmetric_encrypt(message, key): iv = random_bytes(BS) return symmetric_encrypt_with_iv(message, key, iv) +def symmetric_encrypt_ecb(message, key): + return AES.new(key, AES.MODE_ECB).encrypt(pad(message)) + def symmetric_encrypt_HMAC(message, key, hmac_secret): prefix = random_bytes(3) hmac = hmac_sha1(hmac_secret, prefix + message) @@ -66,6 +69,9 @@ def symmetric_decrypt(cyphertext, key): iv = symmetric_decrypt_iv(cyphertext, key) return symmetric_decrypt_with_iv(cyphertext, key, iv) +def symmetric_decrypt_ecb(cyphertext, key): + return unpad(AES.new(key, AES.MODE_ECB).decrypt(cyphertext)) + def symmetric_decrypt_HMAC(cyphertext, key, hmac_secret): """:raises: :class:`RuntimeError` when HMAC verification fails""" iv = symmetric_decrypt_iv(cyphertext, key) diff --git a/steam/core/manifest.py b/steam/core/manifest.py new file mode 100644 index 0000000..591e1ad --- /dev/null +++ b/steam/core/manifest.py @@ -0,0 +1,276 @@ + +from base64 import b64decode +from io import BytesIO +from zipfile import ZipFile, ZIP_DEFLATED, BadZipFile +from struct import pack +from datetime import datetime +from fnmatch import fnmatch +import os.path + +from steam.enums import EDepotFileFlag +from steam.core.crypto import symmetric_decrypt +from steam.util.binary import StructReader +from steam.protobufs.content_manifest_pb2 import (ContentManifestMetadata, + ContentManifestPayload, + ContentManifestSignature) + + +class DepotManifest(object): + PROTOBUF_PAYLOAD_MAGIC = 0x71F617D0 + PROTOBUF_METADATA_MAGIC = 0x1F4812BE + PROTOBUF_SIGNATURE_MAGIC = 0x1B81B817 + PROTOBUF_ENDOFMANIFEST_MAGIC = 0x32C415AB + + def __init__(self, data=None): + """Represents depot manifest + + :param data: manifest data + :type data: bytes + """ + self.metadata = ContentManifestMetadata() + self.payload = ContentManifestPayload() + self.signature = ContentManifestSignature() + + if data: + self.deserialize(data) + + def __repr__(self): + params = ', '.join([ + "depot_id=" + str(self.depot_id), + "gid=" + str(self.gid), + "creation_time=" + repr( + datetime.utcfromtimestamp(self.metadata.creation_time).isoformat().replace('T', ' ') + ), + ]) + + if self.metadata.filenames_encrypted: + params += ', filenames_encrypted=True' + + return "<%s(%s)>" % ( + self.__class__.__name__, + params, + ) + + @property + def depot_id(self): + """:type: int""" + return self.metadata.depot_id + + @property + def gid(self): + """:type: int""" + return self.metadata.gid_manifest + + @property + def creation_time(self): + """:type: int""" + return self.metadata.creation_time + + @property + def size_original(self): + """:type: int""" + return self.metadata.cb_disk_original + + @property + def size_compressed(self): + """:type: int""" + return self.metadata.cb_disk_compressed + + def decrypt_filenames(self, depot_key): + """Decrypt all filenames in the manifest + + :param depot_key: depot key + :type depot_key: bytes + :raises: :class:`RuntimeError` + """ + if not self.metadata.filenames_encrypted: + return + + for mapping in self.payload.mappings: + filename = b64decode(mapping.filename) + + try: + filename = symmetric_decrypt(filename, depot_key) + except Exception: + RuntimeError("Unable to decrypt filename for depot manifest") + + mapping.filename = filename + + self.metadata.filenames_encrypted = False + + def deserialize(self, data): + """Deserialize a manifest (compressed or uncompressed) + + :param data: manifest data + :type data: bytes + """ + try: + with ZipFile(BytesIO(data)) as zf: + data = zf.read(zf.filelist[0]) + except BadZipFile: + pass + + data = StructReader(data) + + magic, length = data.unpack('" % ( + self.__class__.__name__, + self.manifest.depot_id, + self.manifest.gid, + repr(self.filename), + 'is_directory=True' if self.is_directory else self.size, + ) + + @property + def filename_raw(self): + """Filename with null terminator and whitespaces removed + + :type: str + """ + return self.file_mapping.filename.rstrip('\x00 \n\t') + + @property + def filename(self): + """Filename matching the OS + + :type: str + """ + return os.path.join(*self.filename_raw.split('\\')) + + @property + def size(self): + """File size in bytes + + :type: int + """ + return self.file_mapping.size + + @property + def chunks(self): + """File chunks instances + + :type: :class:`list` [ContentManifestPayload.FileMapping.ChunkData] + """ + return self.file_mapping.chunks + + @property + def flags(self): + """File flags + + :type: :class:`.EDepotFileFlag` + """ + return self.file_mapping.flags + + @property + def is_directory(self): + """:type: bool""" + return self.flags & EDepotFileFlag.Directory > 0 + + @property + def is_symlink(self): + """:type: bool""" + return not not self.file_mapping.linktarget + + @property + def is_file(self): + """:type: bool""" + return not self.is_directory and not self.is_symlink diff --git a/steam/enums/common.py b/steam/enums/common.py index b9c2358..05ac877 100644 --- a/steam/enums/common.py +++ b/steam/enums/common.py @@ -539,6 +539,19 @@ class ECurrencyCode(SteamIntEnum): Max = 42 +class EDepotFileFlag(SteamIntEnum): + UserConfig = 1 + VersionedUserConfig = 2 + Encrypted = 4 + ReadOnly = 8 + Hidden = 16 + Executable = 32 + Directory = 64 + CustomExecutable = 128 + InstallScript = 256 + Symlink = 512 + + # Do not remove from enum import EnumMeta diff --git a/tests/test_core_crypto.py b/tests/test_core_crypto.py index b2fd27a..ae0b1f5 100644 --- a/tests/test_core_crypto.py +++ b/tests/test_core_crypto.py @@ -54,6 +54,15 @@ class crypto_testcase(unittest.TestCase): self.assertEqual(message, dmessage) + def test_encryption_ecb(self): + message = b'My secret message' + key = b'9' * 32 + + cyphertext = crypto.symmetric_encrypt_ecb(message, key) + dmessage = crypto.symmetric_decrypt_ecb(cyphertext, key) + + self.assertEqual(message, dmessage) + def test_encryption_hmac(self): message = b'My secret message' key = b'9' * 32