tf2_bot_detector icon indicating copy to clipboard operation
tf2_bot_detector copied to clipboard

Terminate connection to server before fully connecting if the server has X amount of bots/cheaters on X team.

Open slender100 opened this issue 1 year ago • 3 comments

A clear and concise description of what the problem is.

It can be tiring to manually terminate the connection from a server before fully connecting when it's filled with bots/cheaters.

Describe the solution you'd like

A disconnect command can be sent through the pre-existing bot detector via rcon if the bot detector sees there are X amount of bots/cheaters on X team before it full connects to a server, which could also be adjusted via a setting.

Describe alternatives you've considered

N/A

Additional context

Auto requeue would also be helpful as an additional setting that could be used in conjunction with this.

slender100 avatar Jun 13 '24 19:06 slender100

while it's possible to disconnect from the server ("disconnect") we can't abandon the match or requeue automatically (command does not exist, needs to call the function directly)

I'll experiment how fast it disconnects when disconnect command is sent though rcon, I will note that there's a chance that just mashing esc on the loading screen might be faster. (which, i won't bother implementing and releasing if this is the case)

surepy avatar Jun 14 '24 01:06 surepy

while it's possible to disconnect from the server ("disconnect") we can't abandon the match or requeue automatically (command does not exist, needs to call the function directly)

I'll experiment how fast it disconnects when disconnect command is sent though rcon, I will note that there's a chance that just mashing esc on the loading screen might be faster. (which, i won't bother implementing and releasing if this is the case)

You could jank it by just getting active connections and closing the connection.

In powershell this would be

$ProcessIDs = (Get-process -name tf2_win64).id -join '|'
$NetConnections = Get-NetTCPConnection | Where-Object {$_.owningprocess -match $ProcessIDs}
$NetConnections.Dispose()

rcmaehl avatar Oct 25 '24 04:10 rcmaehl

while it's possible to disconnect from the server ("disconnect") we can't abandon the match or requeue automatically (command does not exist, needs to call the function directly) I'll experiment how fast it disconnects when disconnect command is sent though rcon, I will note that there's a chance that just mashing esc on the loading screen might be faster. (which, i won't bother implementing and releasing if this is the case)

You could jank it by just getting active connections and closing the connection.

In powershell this would be

$ProcessIDs = (Get-process -name tf2_win64).id -join '|'
$NetConnections = Get-NetTCPConnection | Where-Object {$_.owningprocess -match $ProcessIDs}
$NetConnections.Dispose()

I haven't gotten around this because I didn't even play tf2 recently

problem with that is as far as i know the engine will still retry the connection and that really doesn't seem like a great solution to have tbh, I write jank but even that's too jank for me HAHA

Get-NetTCPConnection also games like TF2 are UDP, I don't think this will work at all in the first place

surepy avatar Oct 25 '24 09:10 surepy