- Sep 9, 2016
- 4,389
- 39,368
Not really enjoying the new "features".
I noticed Ren'py ver 8.+.+ added a "sync" folder.
For example - C:\Users\Twistty\AppData\Roaming\RenPy\MidnightParadise_Sandbox\sync
I still have all my regular saves in C:\Users\Twistty\AppData\Roaming\RenPy\MidnightParadise_Sandbox root folder - but the bloody "sync" folder DOUBLES them - so our save AppData\Roaming\RenPy folder will become friggin huge over time!
How do I stop it from creating that?
Also....
That applies to the C:\Users\Twistty\AppData\Roaming\RenPy\tokens - which is a nice security feature - but totally killed my enjoyment of many games - as "save" editing is necessary sometimes.
Tried the security_keys.txt hack where you delete the 2 security keys and save it as read only - but that broke the persistent data of my games.
Only editing the savetoken.py within each individual game seems to work.
By changing this:
To this:
Any help, info or insights - would be appreciated.
I noticed Ren'py ver 8.+.+ added a "sync" folder.
For example - C:\Users\Twistty\AppData\Roaming\RenPy\MidnightParadise_Sandbox\sync
I still have all my regular saves in C:\Users\Twistty\AppData\Roaming\RenPy\MidnightParadise_Sandbox root folder - but the bloody "sync" folder DOUBLES them - so our save AppData\Roaming\RenPy folder will become friggin huge over time!
How do I stop it from creating that?
Also....
That applies to the C:\Users\Twistty\AppData\Roaming\RenPy\tokens - which is a nice security feature - but totally killed my enjoyment of many games - as "save" editing is necessary sometimes.
Tried the security_keys.txt hack where you delete the 2 security keys and save it as read only - but that broke the persistent data of my games.
Only editing the savetoken.py within each individual game seems to work.
By changing this:
Python:
def verify_data(data, signatures, check_verifying=True):
"""
Verifies that `data` has been signed by the keys in `signatures`.
"""
for i in signatures.splitlines():
kind, key, sig = decode_line(i)
if kind == "signature":
if key is None:
continue
if check_verifying and key not in verifying_keys:
continue
try:
vk = ecdsa.VerifyingKey.from_der(key)
if vk.verify(sig, data):
return True
except Exception:
continue
return False
Python:
def verify_data(data, signatures, check_verifying=True):
"""
Verifies that `data` has been signed by the keys in `signatures`.
"""
for i in signatures.splitlines():
kind, key, sig = decode_line(i)
if kind == "signature":
if key is None:
continue
if check_verifying and key not in verifying_keys:
continue
try:
vk = ecdsa.VerifyingKey.from_der(key)
if vk.verify(sig, data):
return True
except Exception:
continue
return True