Compare commits

..

No commits in common. "main" and "1.0.4" have entirely different histories.
main ... 1.0.4

10 changed files with 265 additions and 116 deletions

View file

@ -2,6 +2,6 @@ FROM python:3.13
WORKDIR /syscheck_receiver
COPY . /syscheck_receiver
RUN pip install --no-cache-dir -r requirements.txt
RUN mkdir -p /data
RUN mkdir -p /data/reports
EXPOSE 6969/tcp
ENTRYPOINT ["python", "app.py"]

114
app.py
View file

@ -7,16 +7,18 @@ import random
import sqlite3
import time
import html
import zipfile
from argparse import ArgumentParser
from flask import Flask, request, render_template, send_file
from datetime import datetime
from io import BytesIO
# stuff
with open(f"{os.getcwd()}/config.json", "r") as f:
config = json.load(f)
parser = ArgumentParser(prog="syscheck_receiver", description="Server that saves SysCheck report uploads.")
parser.add_argument("-d", "--debug", dest="debug", action='store_true', help="Runs with Flask debug server instead of Waitress. DO NOT USE IN PRODUCTION!!!!")
parser = ArgumentParser()
parser.add_argument("-d", "--debug", dest="debug")
args = parser.parse_args()
def id_generator(size=6, chars=string.ascii_uppercase + string.digits):
@ -30,17 +32,6 @@ def get_console_id(txt):
return "0"
def return_error(message: string, code: int):
jsonstring = {"message": message, "code": code, "error": True}
resp = flask.Response(json.dumps(jsonstring))
resp.headers["Content-Type"] = "application/json"
return resp
def no_cf_chunking(txt):
resp = flask.Response(txt)
resp.headers["X-Content-Length"] = len(txt.encode("utf-8")) # Cloudflares Proxy strips "Content-Length" when chunking, so we just re-add it manually.
return resp
# docker
if config["docker"]:
report_dir = "/data/reports"
@ -67,30 +58,24 @@ def index():
upload_time = datetime.fromtimestamp(upload[1])
uploadIndex+="ID: <a href='/view_report?id={}' target='_blank'>{}</a> -- Uploaded at {}!<br>".format(upload[0], upload[0], upload_time)
return render_template("index.html", uploadIndex=uploadIndex, report_count=report_count[0][0], svr_ver=config["version"]), 200
return render_template("index.html", uploadIndex=uploadIndex, report_count=report_count[0][0]), 200
@app.route("/syscheck_receiver.php", methods=["POST"])
@app.route("/syscheck_send.php", methods=["POST"]) # SysCheck2.1.0b.19
@app.route("/syscheck_receiver.php", methods=["POST"]) # literally anything else
def syscheck_report():
form_data = request.form.to_dict(flat=False)
report_txt = form_data["syscheck"][0]
console_id = get_console_id(report_txt)[:-4]
# check if console id: is present
console_id = get_console_id(report_txt)
if console_id == "0":
return no_cf_chunking("ERROR: Not a valid sysCheck!"), 200
# check if syscheck isn't too small or too large
if len(report_txt.encode("utf-8")) > 6144:
return no_cf_chunking("ERROR: Report is too large! Max is 6KB."), 200
elif len(report_txt.encode("utf-8")) < 1330:
return no_cf_chunking("ERROR: Report is too small! Min is 1.3KB."), 200
return "ERROR: Not a valid sysCheck!", 200
console_id_censor = "Console ID: "+console_id[:-4]+"***"
timestamp = int(time.time())
report_id = id_generator(6, 'AaBbCcDdFfeEgGhHiIjJkKlLmMnNoOpPqQrRsStTuUvVwWXxYyZz1234567890')
if form_data["password"][0] == config["upload_password"]:
if form_data["password"][0] in config["upload_passwords"]:
try:
with open(f"{report_dir}/{report_id}.csv", "a+") as report:
report.write(report_txt)
report.write(report_txt.replace(f"Console ID: {console_id}", "Console ID: {}".format(console_id_censor)))
db = sqlite3.connect(db_dir)
cursor = db.cursor()
@ -98,26 +83,49 @@ def syscheck_report():
db.commit()
db.close()
return no_cf_chunking(f"Success! Report ID: {report_id}"), 200
except Exception as ex:
print(ex)
return no_cf_chunking("ERROR: Failed to save SysCheck report!"), 200
else:
return no_cf_chunking("ERROR: Unauthorized"), 200
return f"Success! Report ID: {report_id}", 200
except:
return "ERROR: Failed to save SysCheck report!", 200
@app.route("/download_csv", methods=["GET"], defaults={'_route': 'direct'})
@app.route("/view_report", methods=["GET"], defaults={'_route': 'template'})
def view_report(_route):
else:
return "ERROR: Unauthorized", 200
@app.route("/view_report", methods=["GET"])
def view_report():
report_id = request.args.get("id")
if os.path.isfile(f"{report_dir}/{report_id}.csv"):
if _route == "template":
with open(f"{report_dir}/{report_id}.csv", "r") as report:
return render_template("view_report.html", report_id=report_id, report_content=html.escape(report.read()), svr_ver=config["version"]), 200
else:
return send_file(f"{report_dir}/{report_id}.csv", as_attachment=True, download_name="report.csv")
with open(f"{report_dir}/{report_id}.csv", "r") as report:
return render_template("view_report.html", report_id=report_id, report_content=html.escape(report.read())), 200
else:
return "Report does not exist.", 404
@app.route("/syscheck2", methods=["GET"])
def syscheck():
if len("http://syscheck.softwii.de/syscheck_receiver.php") < len(config["replace_str"]):
return "Replacement host has to be exactly 48 characters; Specified URL is too long!", 400
elif len("http://syscheck.softwii.de/syscheck_receiver.php") > len(config["replace_str"]):
return "Replacement host has to be exactly 48 characters; Specified URL is too short!", 400
dol = BytesIO()
zip = BytesIO()
# hex edit boot.dol
dol2 = open(f"{os.getcwd()}/static/syscheck2/boot.dol", "rb")
dol.write(dol2.read().replace("http://syscheck.softwii.de/syscheck_receiver.php".encode("utf-8"), config["replace_str"].encode("utf-8")))
dol.seek(0)
dol2.close()
zf = zipfile.ZipFile(zip, "w", zipfile.ZIP_DEFLATED, False)
zf.writestr("apps/syscheck2/boot.dol", dol.read())
dol.close()
zf.write(f"{os.getcwd()}/static/syscheck2/icon.png", "apps/syscheck2/icon.png")
zf.write(f"{os.getcwd()}/static/syscheck2/meta.xml", "apps/syscheck2/meta.xml")
zf.close()
zip.seek(0)
# send zipfile
return send_file(zip, mimetype="application/zip", as_attachment=True, download_name="syscheck2.1.0.b19v2.zip"), 200
# handle errors
@app.errorhandler(400)
@app.errorhandler(404)
@ -125,13 +133,25 @@ def view_report(_route):
@app.errorhandler(502)
def errorhandler(e):
if e.code == 400:
return return_error("Bad request", 400), 400
jsonstring = {"message": "Bad Request.", "code": 400, "error": True}
resp = flask.Response(json.dumps(jsonstring))
resp.headers["Content-Type"] = "application/json"
return resp, 400
elif e.code == 404:
return return_error("Not found", 404), 404
jsonstring = {"message": "Not found.", "code": 404, "error": True}
resp = flask.Response(json.dumps(jsonstring))
resp.headers["Content-Type"] = "application/json"
return resp, 404
elif e.code == 405:
return return_error("Method not allowed", 405), 405
jsonstring = {"message": "Method not allowed.", "code": 405, "error": True}
resp = flask.Response(json.dumps(jsonstring))
resp.headers["Content-Type"] = "application/json"
return resp, 405
elif e.code == 502:
return return_error("Bad gateway", 502), 502
jsonstring = {"message": "Bad Gateway.", "code": 502, "error": True}
resp = flask.Response(json.dumps(jsonstring))
resp.headers["Content-Type"] = "application/json"
return resp, 502
# run server
@ -155,11 +175,9 @@ if __name__ == "__main__":
if config["docker"]:
print("Docker is TRUE")
if not os.path.isdir(report_dir):
os.mkdir(report_dir)
# start server
if args.debug:
if args.debug == "1":
print("Debug mode: on")
app.run(host=config["ip"], port=config["port"], debug=True)
else:

View file

@ -1,7 +1,11 @@
{
"ip": "0.0.0.0",
"port": "6969",
"version": "1.1.2",
"upload_password": "B277eNGp789a",
"version": "1.0.4",
"upload_passwords": [
"d2wRuTEObSAN",
"B277eNGp789a"
],
"replace_str": "http://syscheck.crafterpika.cc/syscheck_send.php",
"docker": false
}

View file

@ -1,52 +0,0 @@
sysCheck v2.1.0b19 by Double_A and R2-D2199, Nano
...runs on IOS58 (rev 32033).
Region: PAL
System Menu 4.3E (v4610)
Priiloader installed
Drive date: 2012.06.29
Homebrew Channel 1.1.2 running on IOS58
HomebrewFilter ist nicht installiert
Console ID: 23620***
Boot2 v4
Found 45 titles.
Found 34 IOS on this console. 2 of them are stub.
IOS3 (rev 65280): Stub
IOS4 (rev 65280): Stub
IOS9 (rev 26891): No Patches
IOS12 (rev 26383): No Patches
IOS13 (rev 26889): No Patches
IOS14 (rev 26889): No Patches
IOS15 (rev 26889): No Patches
IOS17 (rev 26889): No Patches
IOS21 (rev 26896): No Patches
IOS22 (rev 27151): No Patches
IOS28 (rev 27664): No Patches
IOS31 (rev 29465): No Patches
IOS33 (rev 29465): No Patches
IOS34 (rev 29465): No Patches
IOS35 (rev 29465): No Patches
IOS36 (rev 29465): No Patches
IOS37 (rev 31520): No Patches
IOS38 (rev 29981): No Patches
IOS41 (rev 29464): No Patches
IOS43 (rev 29464): No Patches
IOS45 (rev 29464): No Patches
IOS46 (rev 29464): No Patches
IOS48 (rev 29981): No Patches
IOS53 (rev 31520): No Patches
IOS55 (rev 31520): No Patches
IOS56 (rev 31519): No Patches
IOS57 (rev 31776): No Patches
IOS58 (rev 32033): USB 2.0
IOS59 (rev 32802): No Patches
IOS61 (rev 31519): No Patches
IOS62 (rev 31264): No Patches
IOS80 (rev 32801): No Patches
IOS236[36] (rev 65535, Info: rev 29465): Trucha Bug, ES Identify, NAND Access
IOS249[57] (rev 21001, Info: d2xl-v1beta2): Trucha Bug, NAND Access, USB 2.0
BC v6
MIOS v10
Report generated on 2024/10/13.
1 sysCheck v2.1.0b19 by Double_A and R2-D2199, Nano
2 ...runs on IOS58 (rev 32033).
3 Region: PAL
4 System Menu 4.3E (v4610)
5 Priiloader installed
6 Drive date: 2012.06.29
7 Homebrew Channel 1.1.2 running on IOS58
8 HomebrewFilter ist nicht installiert
9 Console ID: 23620***
10 Boot2 v4
11 Found 45 titles.
12 Found 34 IOS on this console. 2 of them are stub.
13 IOS3 (rev 65280): Stub
14 IOS4 (rev 65280): Stub
15 IOS9 (rev 26891): No Patches
16 IOS12 (rev 26383): No Patches
17 IOS13 (rev 26889): No Patches
18 IOS14 (rev 26889): No Patches
19 IOS15 (rev 26889): No Patches
20 IOS17 (rev 26889): No Patches
21 IOS21 (rev 26896): No Patches
22 IOS22 (rev 27151): No Patches
23 IOS28 (rev 27664): No Patches
24 IOS31 (rev 29465): No Patches
25 IOS33 (rev 29465): No Patches
26 IOS34 (rev 29465): No Patches
27 IOS35 (rev 29465): No Patches
28 IOS36 (rev 29465): No Patches
29 IOS37 (rev 31520): No Patches
30 IOS38 (rev 29981): No Patches
31 IOS41 (rev 29464): No Patches
32 IOS43 (rev 29464): No Patches
33 IOS45 (rev 29464): No Patches
34 IOS46 (rev 29464): No Patches
35 IOS48 (rev 29981): No Patches
36 IOS53 (rev 31520): No Patches
37 IOS55 (rev 31520): No Patches
38 IOS56 (rev 31519): No Patches
39 IOS57 (rev 31776): No Patches
40 IOS58 (rev 32033): USB 2.0
41 IOS59 (rev 32802): No Patches
42 IOS61 (rev 31519): No Patches
43 IOS62 (rev 31264): No Patches
44 IOS80 (rev 32801): No Patches
45 IOS236[36] (rev 65535, Info: rev 29465): Trucha Bug, ES Identify, NAND Access
46 IOS249[57] (rev 21001, Info: d2xl-v1beta2): Trucha Bug, NAND Access, USB 2.0
47 BC v6
48 MIOS v10
49 Report generated on 2024/10/13.

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.1 KiB

BIN
static/syscheck2/boot.dol Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.1 MiB

BIN
static/syscheck2/icon.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 12 KiB

190
static/syscheck2/meta.xml Normal file
View file

@ -0,0 +1,190 @@
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<app version="1">
<name>sysCheck</name>
<coder>Double_A, R2-D2199 and Nano</coder>
<version>2.1.0.b19v2</version>
<release_date>20121227000000</release_date>
<short_description>System Checker</short_description>
<long_description>Homebrew application which does several checks on installed IOS and custom IOS:
- Base IOS Detection
- IOS Stub;
- Fake signature (aka Trucha Bug);
- ES_DiVerify (aka ES_Identify);
- Flash Access;
- NAND Access;
- Boot2 Access;
- USB 2.0.
sysCheck generates a report on the root of the SD card (sd:/sysCheck.csv).
The author can not be held responsible for any damage sysCheck might cause!
------------------
Changelog
Version 2.1.0.b19v2
* Fixed broken server url with a hex editor
P.S. you should only use this version of sysCheck on a Wii Mini (because every other sysCheck version crashes on the console)
Version 2.1.0.b19
* Fixed HBC 1.1.x detection, thanks Nano
* Added HBF detection, thanks Nano
* Added DIOS MIOS detection
Version 2.1.0.b18
* Fixed HBC 1.1.0 detection
* Compiled with libogc 1.8.9 (this should fix the newer wii motes)
Version 2.1.0.b17
* Fixed bug in stub detection / changed stub detection
* Added some debug outputs
* New Italian translation by Roberto Boriotti
Version 2.1.0.b16
* Changed HTTP GET to HTTP POST request in sysCheck transmission
* Added debug log file option (in meta.xml change parameter "--debug=false" to "--debug=true")
* Hopefully fixed crash when no HW_AHBPROT is available
* Some bugfixes and improvements
Version 2.1.0.b15
* Changed drive detection to drive date detection
* Report upload feature
* Some bugfixes in base IOS detection
* Fixed some typos in some languages
* Added detection for region changed Wiis, thanks Joostinonline
Version 2.1.0.b14
* Added drive detection
* Compiled with libOGC 1.8.8
Version 2.1.0.b13
* Improved Base IOS detection
* Added PreFiix detection
* Added IOS252 (bootcb2) detection
Version 2.1.0.b12
* Fixed "Priiloader NAND Access Bug", thanks BoehserOnkel
* Fixed HW_AHBPROT Bug, thanks davebaol
* Improved Base IOS Detection, thanks Black.Pearl
* Added Gecko output/debugging
* Added update function
Version 2.1.0.b11
* Code improvements
Version 2.1.0.b10
* Added HW_AHBPROT to use the new Base IOS Detection faster
* Improved Base IOS Detection
* Added Indetification for IOS patched with SIP
Version 2.1.0.b9
* Improved Base IOS Detection
* Added new Base IOS Detection (thanks to WiiPower)
* Integrated IOSinfo Tool
* Added Priiloader Detection
Version 2.1.0.b8
* Improved Base IOS Detection
* New Stub Detection
* New Page scroll function in syscheck viewer
* fixed french language, thanks to rlelamer
Version 2.1.0.b7
* Improved Base IOS Detection
* Prepared USB Support
Version 2.1.0.b6
* Improved Base IOS Detection
* Added IOS58 USB2.0 Detection
* Added IOS253 NANDEmu Detection
Version 2.1.0.b5
* Bugfixes
Version 2.1.0.b4
* Improved Base IOS Detection (cIOSX rev21)
* Added Systemmenue Detection by IOS
Version 2.1.0.b3
* Bugfixes
* Improved Base IOS Detection
* Added HBC Detection
Version 2.1.0.b2
* Bugfixes
* Improved Base IOS Detection
Version 2.1.0.b
* Base IOS Detection
Version 2.0.1
* Fixed Bug in English System Menu version (v-2145571844)
* Shows which IOS is beeing tested
* Added French translation (thx Attila)
Version 2.0
* Added a very nice GUI (thx NeoRame)
* Improved report text (no Enabled/Disabled anymore)
* Added BC and MIOS check
* Report can be displayed without SD
* Fixed some bugs
* Easy to translate (language file in source)
Version 1.6.3
* Automatically detect the language settings (supports English and German only);
* Possible to select individual IOS to check;
* Select "back to HBC", "back to System Menu" or "shutdown" at the end;
* Option to read the report directly on Wii at the end.
Version 1.6.2
* Automatically detect the language settings (supports English and French only);
* Improve IOS stubs detection;
* Recompiled with the latest version of DevkitPro;
* Code cleanup.
Version 1.6.1
* Fix BootMii as IOS issue.
Version 1.6
* Improve IOS Stubs detection;
* Improve Fake Signature check;
* Check for NAND Access;
* Display Hollywood GPU version;
* Display Console ID;
* Display Boot2 version.
Version 1.5
* Fix IOS202 issue;
* Improve IOS stubs detection;
* Error handling corrections;
* Wii Light is turn on when generating the CSV report;
* Code cleanup.
Version 1.4
* Check for USB 2.0 IOS Tree;
* Display the current date and time in the report;
* Recompiled with the latest version of DevkitPro;
* Code cleanup.
Version 1.3 (unreleased)
* Detect the console region;
* Error handling corrections.
Version 1.2 (unreleased)
* Check for Flash Access;
* Check for Boot2 Access.
Version 1.1
* Fix IOS stubs detection;
* Fix IOS revision number displayed on Reload;
* Code cleanup.
Version 1.0
* Initial public release
</long_description>
<arguments>
<arg>--debug=false</arg>
</arguments>
<no_ios_reload/>
</app>

View file

@ -5,15 +5,13 @@
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta charset="UTF-8">
<link type="text/css" rel="stylesheet" href="{{ url_for('static', filename='main.css') }}"/>
<link rel="shortcut icon" href="{{ url_for('static', filename='favicon.ico') }}" type="image/vnd.microsoft.icon" />
</head>
<body>
<div class="topnav">
<a href="https://github.com/modmii/SysCheck-ModMii-Edition/releases/latest" target="_blank">Download SysCheckME</a>
<a href="https://wii.hacks.guide/syscheck" target="_blank">How to use</a>
<a href="/syscheck2">Download sysCheck2 (Wii Mini)</a>
</div>
<center>
<h1>Latest Uploads:</h1>
<h1>Last 15 SysCheck Uploads:</h1>
<div class="content">
{{ uploadIndex|safe }}
</div>
@ -23,12 +21,8 @@
<br>
<p>Enter you're SysCheck report ID here: <input type="text" id="report_id" placeholder="example"> <button type="button" id="submit-btn">Submit</button></p>
<br>
<hr>
<br>
<p>SysCheck server written by CrafterPika! <a href='https://github.com/CrafterPika/syscheck_receiver' target='_blank'>Source Code</a></p>
<p>SysCheck by <a href="https://github.com/modmii/SysCheck-ModMii-Edition" target="_blank">XFlak & Co</a></p>
<p>syscheck_receiver v{{ svr_ver }}</p>
<p>© CrafterPika <script>document.write(new Date().getFullYear());</script></p>
SysCheck server written by CrafterPika! <a href='https://github.com/CrafterPika/syscheck_receiver' target='_blank'>Source Code</a>
</center>
<script src="{{ url_for('static', filename='main.js') }}"></script>
</body>

View file

@ -5,7 +5,6 @@
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link type="text/css" rel="stylesheet" href="{{ url_for('static', filename='main.css') }}"/>
<link rel="shortcut icon" href="{{ url_for('static', filename='favicon.ico') }}" type="image/vnd.microsoft.icon" />
</head>
<body>
@ -13,13 +12,9 @@
{{ report_content }}
</pre>
<br>
<hr>
<br>
<center>
<p>SysCheck server written by CrafterPika! <a href='https://github.com/CrafterPika/syscheck_receiver' target='_blank'>Source Code</a></p>
<p>SysCheck by <a href="https://github.com/modmii/SysCheck-ModMii-Edition" target="_blank">XFlak & Co</a></p>
<p>syscheck_receiver v{{ svr_ver }}</p>
<p>© CrafterPika <script>document.write(new Date().getFullYear());</script></p>
</center>
</body>
</html>