| Crates.io | rosu-render |
| lib.rs | rosu-render |
| version | 0.4.1 |
| created_at | 2023-07-20 11:42:56.467195+00 |
| updated_at | 2025-02-17 12:38:43.540547+00 |
| description | An o!rdr wrapper to render osu! replays |
| homepage | |
| repository | https://github.com/MaxOhn/rosu-render |
| max_upload_size | |
| id | 921242 |
| size | 308,489 |
Rust wrapper for the API and websocket of o!rdr to render osu! replays.
use rosu_render::{
model::{RenderSkinOption, Verification},
OrdrClient, OrdrWebsocket,
};
#[tokio::main]
async fn main() {
// In production, use your key as verification or omit verification entirely.
let client = OrdrClient::builder().verification(Verification::DevModeSuccess).build();
let mut websocket = OrdrWebsocket::connect().await.expect("Failed to connect websocket");
// The channel lets us notify the websocket when to disconnect
let (disconnect_tx, mut disconnect_rx) = tokio::sync::oneshot::channel::<()>();
// Handle websocket events in a different task
let websocket_handle = tokio::spawn(async move {
loop {
tokio::select! {
event_res = websocket.next_event() => {
match event_res {
Ok(event) => println!("{event:?}"),
Err(err) => println!("Websocket error: {err:?}"),
}
},
_ = &mut disconnect_rx => {
println!("Received disconnect notification");
websocket.disconnect().await.expect("Failed to disconnect gracefully");
return;
}
}
}
});
// Requesting from the API
let render_list = client
.render_list()
.page_size(2)
.await
.expect("Failed to get render list");
println!("{render_list:#?}");
let skin_list = client
.skin_list()
.page_size(3)
.page(2)
.await
.expect("Failed to get skin list");
println!("{skin_list:#?}");
let server_list_count = client
.server_online_count()
.await
.expect("Failed to get server list count");
println!("{server_list_count:?}");
let replay_file = tokio::fs::read("./assets/2283307549.osr")
.await
.expect("Failed to get replay file");
let skin = RenderSkinOption::default();
let render = client
.render_with_replay_file(&replay_file, "your_name", &skin)
.await
.expect("Failed to commission replay render");
println!("{render:#?}");
// Now the websocket will receive events for your commissioned replay render
tokio::time::sleep(std::time::Duration::from_secs(5)).await;
// Notify the websocket to disconnect
let _ = disconnect_tx.send(());
websocket_handle.await.expect("websocket worker panicked");
println!("Shutting down");
}
Using rustls for TLS requires configuring a crypto provider via crate
features or manually installing a global default. The default is rustls-ring.
rustls-ringThe rustls-ring feature will enable the use of ring as the crypto
provider. This is recommended for platform compatibility.
rustls-aws_lc_rsThe rustls-aws_lc_rs feature will enable the use of aws-lc-rs as the
crypto provider. This is recommended for performance and on widely used
platforms.
If none of the other crypto providers are enabled, a custom one must be
installed by the application using CryptoProvider::install_default.
rosu-render has features to enable HTTPS connectivity with hyper. These
features are mutually exclusive. rustls-webpki-roots is enabled by default.
native-tlsThe native-tls feature uses a HTTPS connector provided by hyper-tls.
rustls-native-rootsThe rustls-native-roots feature uses a HTTPS connector provided by hyper-rustls, which uses
rustls as the TLS backend, and enables its native-tokio feature, which uses rustls-native-certs
for root certificates. This requires configuring a crypto provider.
rustls-platform-verifierThe rustls-platform-verifier feature uses a HTTPS connector provided by hyper-rustls, which uses
rustls as the TLS backend, and enables its rustls-platform-verifier feature, which uses
rustls-platform-verifier for certificate validation. This requires configuring a crypto provider.
rustls-webpki-rootsThe rustls-webpki-roots feature uses a HTTPS connector provided by hyper-rustls, which uses
rustls as the TLS backend, and enables its webpki-tokio feature, which uses webpki-roots
for root certificates. This requires configuring a crypto provider.
This should be preferred over rustls-native-roots in Docker containers based on scratch.
This is enabled by default.
The hickory feature enables hyper-hickory, which replaces the default
GaiResolver in hyper. hyper-hickory instead provides a fully async
DNS resolver on the application level.