Giter Club home page Giter Club logo

docs's Introduction

docs's People

Contributors

aronwk-aaron avatar bdavies18 avatar brieflory avatar darwinanim8or avatar emosewamc avatar jettford avatar knightoffaith avatar okarin99 avatar simonnitzsche avatar wesley-demontigny avatar xiphoseer avatar

Stargazers

 avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar

docs's Issues

Where did the Pakets go?

Hi, I just wondered where the packet and game message documentation went. Did you delete them by accident or is this part of bigger changes?

Component 77

PartA
[bit] - flag

    PartB
    [u8] - NDAudioMusicCue
        [u8-string] - Name
        [u32] - Result
        [float] - BoredomTime
    
    PartC
    [u16] - ???
    
    PartD
    [u8] - GUID2_count
        [u32] - GUID2_PartA
        [u16] - GUID2_PartB
        [u16] - GUID2_PartC
        [u16] - GUID2_PartD
        [u16] - GUID2_PartE0
        [u32] - GUID2_PartE1
        [u32] - ???
    
    PartE
    [u8] - mixer count
        [u8-string] - NDAudioMixerProgram_Name
        [u32] - ???``` 

Update BasicAttackBehavior to be correct

def BasicAttackBehaviorHandle():
    # Align to byte boundary
    readBitLength = int() # Actually a short
    if isDead:
        return
    readIsBlocked = bool()
    if readIsBlocked:
        doFailBlockedAction
        return
    else:
        readIsImmune = bool()
        if readIsImmune:
            doFailImmuneAction
            return
        else:
            readIsSuccess = bool()
            if readIsSuccess:
                readArmorDamageDealt = int()
                readHealthDamageDealt = int()
                readIsDead = bool()
    readSuccessState = int() # Actually a byte but python no have built in type and i wanna get this written down fast
    if readSuccessState == 1:
        doSuccessAction()
    elif readSuccessState == 2:
        doFailArmorAction()
    elif readSuccessState == 3:
        doFailImmuneAction()
    else:
        # Do nothing!
        pass

def doFailBlockedAction():
    pass

def doFailImmuneAction():
    pass

def doFailArmorAction():
    pass

def doSuccessAction():
    pass

This is the correct serialization and handling of the basic attack behavior. All information is obtained from reverse engineered client code. My confidence interval for this information is ~90%

Document Module Assemly Component

For the module assembly component, if it exists, use the rebuild componentID to lookup the info for the lot that has a module assembly component in the Modular Build Component table. This is how you are supposed to know what lot to give the player if they complete a build in a specific module assembly build area. Doesnt seem to be documented anywhere and its hard coded in dlu so thought id mention it
-- @EmosewaMC

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.