Two trainees embarking on their coding adventure!

A lack of beginner-level projects brought us to the idea of starting our own little game forge.

Using Python, Pygame and a lot of creativity.

(Hopefully) Starring Geeko, Sleeko and you! :D

Looking for hackers with the skills:

python gamedesign creativity

This project is part of:

Hack Week 11

Activity

  • about 8 years ago: paper318 liked this project.
  • about 8 years ago: paper318 disliked this project.
  • about 8 years ago: paper318 liked this project.
  • about 8 years ago: paper318 disliked this project.
  • about 8 years ago: paper318 liked this project.
  • about 8 years ago: paper318 liked this project.
  • about 8 years ago: paper318 disliked this project.
  • about 8 years ago: paper318 liked this project.
  • about 8 years ago: paper318 liked this project.
  • about 11 years ago: drpaneas liked this project.
  • about 11 years ago: fschueller added keyword "creativity" to this project.
  • about 11 years ago: fschueller added keyword "gamedesign" to this project.
  • about 11 years ago: fschueller added keyword "python" to this project.
  • about 11 years ago: bhertwig liked this project.
  • about 11 years ago: fschueller liked this project.
  • about 11 years ago: fschueller joined this project.
  • about 11 years ago: bhertwig started this project.
  • about 11 years ago: bhertwig originated this project.

  • Comments

    Be the first to comment!

    Similar Projects

    Improvements to osc (especially with regards to the Git workflow) by mcepl

    Description

    There is plenty of hacking on osc, where we could spent some fun time. I would like to see a solution for https://github.com/openSUSE/osc/issues/2006 (which is sufficiently non-serious, that it could be part of HackWeek project).


    Help Create A Chat Control Resistant Turnkey Chatmail/Deltachat Relay Stack - Rootless Podman Compose, OpenSUSE BCI, Hardened, & SELinux by 3nd5h1771fy

    Description

    The Mission: Decentralized & Sovereign Messaging

    FYI: If you have never heard of "Chatmail", you can visit their site here, but simply put it can be thought of as the underlying protocol/platform decentralized messengers like DeltaChat use for their communications. Do not confuse it with the honeypot looking non-opensource paid for prodect with better seo that directs you to chatmailsecure(dot)com

    In an era of increasing centralized surveillance by unaccountable bad actors (aka BigTech), "Chat Control," and the erosion of digital privacy, the need for sovereign communication infrastructure is critical. Chatmail is a pioneering initiative that bridges the gap between classic email and modern instant messaging, offering metadata-minimized, end-to-end encrypted (E2EE) communication that is interoperable and open.

    However, unless you are a seasoned sysadmin, the current recommended deployment method of a Chatmail relay is rigid, fragile, difficult to properly secure, and effectively takes over the entire host the "relay" is deployed on.

    Why This Matters

    A simple, host agnostic, reproducible deployment lowers the entry cost for anyone wanting to run a privacy‑preserving, decentralized messaging relay. In an era of perpetually resurrected chat‑control legislation threats, EU digital‑sovereignty drives, and many dangers of using big‑tech messaging platforms (Apple iMessage, WhatsApp, FB Messenger, Instagram, SMS, Google Messages, etc...) for any type of communication, providing an easy‑to‑use alternative empowers:

    • Censorship resistance - No single entity controls the relay; operators can spin up new nodes quickly.
    • Surveillance mitigation - End‑to‑end OpenPGP encryption ensures relay operators never see plaintext.
    • Digital sovereignty - Communities can host their own infrastructure under local jurisdiction, aligning with national data‑policy goals.

    By turning the Chatmail relay into a plug‑and‑play container stack, we enable broader adoption, foster a resilient messaging fabric, and give developers, activists, and hobbyists a concrete tool to defend privacy online.

    Goals

    As I indicated earlier, this project aims to drastically simplify the deployment of Chatmail relay. By converting this architecture into a portable, containerized stack using Podman and OpenSUSE base container images, we can allow anyone to deploy their own censorship-resistant, privacy-preserving communications node in minutes.

    Our goal for Hack Week: package every component into containers built on openSUSE/MicroOS base images, initially orchestrated with a single container-compose.yml (podman-compose compatible). The stack will:

    • Run on any host that supports Podman (including optimizations and enhancements for SELinux‑enabled systems).
    • Allow network decoupling by refactoring configurations to move from file-system constrained Unix sockets to internal TCP networking, allowing containers achieve stricter isolation.
    • Utilize Enhanced Security with SELinux by using purpose built utilities such as udica we can quickly generate custom SELinux policies for the container stack, ensuring strict confinement superior to standard/typical Docker deployments.
    • Allow the use of bind or remote mounted volumes for shared data (/var/vmail, DKIM keys, TLS certs, etc.).
    • Replace the local DNS server requirement with a remote DNS‑provider API for DKIM/TXT record publishing.

    By delivering a turnkey, host agnostic, reproducible deployment, we lower the barrier for individuals and small communities to launch their own chatmail relays, fostering a decentralized, censorship‑resistant messaging ecosystem that can serve DeltaChat users and/or future services adopting this protocol

    Resources


    Bring to Cockpit + System Roles capabilities from YAST by miguelpc

    Bring to Cockpit + System Roles features from YAST

    Cockpit and System Roles have been added to SLES 16 There are several capabilities in YAST that are not yet present in Cockpit and System Roles We will follow the principle of "automate first, UI later" being System Roles the automation component and Cockpit the UI one.

    Goals

    The idea is to implement service configuration in System Roles and then add an UI to manage these in Cockpit. For some capabilities it will be required to have an specific Cockpit Module as they will interact with a reasource already configured.

    Resources

    A plan on capabilities missing and suggested implementation is available here: https://docs.google.com/spreadsheets/d/1ZhX-Ip9MKJNeKSYV3bSZG4Qc5giuY7XSV0U61Ecu9lo/edit

    Linux System Roles:

    First meeting Hackweek catchup


    Improve/rework household chore tracker `chorazon` by gniebler

    Description

    I wrote a household chore tracker named chorazon, which is meant to be deployed as a web application in the household's local network.

    It features the ability to set up different (so far only weekly) schedules per task and per person, where tasks may span several days.

    There are "tokens", which can be collected by users. Tasks can (and usually will) have rewards configured where they yield a certain amount of tokens. The idea is that they can later be redeemed for (surprise) gifts, but this is not implemented yet. (So right now one needs to edit the DB manually to subtract tokens when they're redeemed.)

    Days are not rolled over automatically, to allow for task completion control.

    We used it in my household for several months, with mixed success. There are many limitations in the system that would warrant a revisit.

    It's written using the Pyramid Python framework with URL traversal, ZODB as the data store and Web Components for the frontend.

    Goals

    • Add admin screens for users, tasks and schedules
    • Add models, pages etc. to allow redeeming tokens for gifts/surprises
    • …?

    Resources

    tbd (Gitlab repo)


    Song Search with CLAP by gcolangiuli

    Description

    Contrastive Language-Audio Pretraining (CLAP) is an open-source library that enables the training of a neural network on both Audio and Text descriptions, making it possible to search for Audio using a Text input. Several pre-trained models for song search are already available on huggingface

    SUSE Hackweek AI Song Search

    Goals

    Evaluate how CLAP can be used for song searching and determine which types of queries yield the best results by developing a Minimum Viable Product (MVP) in Python. Based on the results of this MVP, future steps could include:

    • Music Tagging;
    • Free text search;
    • Integration with an LLM (for example, with MCP or the OpenAI API) for music suggestions based on your own library.

    The code for this project will be entirely written using AI to better explore and demonstrate AI capabilities.

    Result

    In this MVP we implemented:

    • Async Song Analysis with Clap model
    • Free Text Search of the songs
    • Similar song search based on vector representation
    • Containerised version with web interface

    We also documented what went well and what can be improved in the use of AI.

    You can have a look at the result here:

    Future implementation can be related to performance improvement and stability of the analysis.

    References


    Gods & Steel: Tactical Prototype by pherranz

    Description

    A turn-based tactical combat prototype built in Godot, featuring two techno-sorcery factions in strategic warfare. This proof-of-concept demonstrates core gameplay mechanics including alternating activations, unique faction abilities, and tactical positioning on a grid-based battlefield.

    Goals

    Primary Objectives: Implement a complete turn-based tactical combat loop with alternating unit activation Create two distinct factions with 3-4 units each, showcasing unique mechanical identities Develop a modular code architecture for easy expansion to additional factions Deliver a playable 3v3 battle scenario with basic AI opponents

    Technical Milestones: Grid-based movement and positioning system Alternating activation turn manager Unit ability system with faction-specific mechanics Basic AI decision-making (move → attack patterns) Health/damage system with win/lose conditions

    Stretch Goals: Simple cover system for tactical positioning Additional faction-specific special abilities Enhanced visual feedback for actions

    Resources

    Technology Stack: Engine: Godot 4.2 Art Style: Top-down 64x64 pixel art Programming: GDScript Version Control: Git Tools: Aseprite/LibreSprite for pixel art, TrenchBroom for level blocking

    Development Approach: Day 1: Core architecture (scenes, grid system, unit base class) Day 2: Turn management and basic movement Day 3: Combat system and faction abilities Day 4: AI implementation and balancing Day 5: Polish, bug fixing, and demo preparation

    Technical Architecture: Scene Manager (handles game flow) Grid System (pathfinding, positioning) Unit Manager (turn order, activation) Faction System (modular ability definitions) AI Controller (state-based decision making)

    Asset Pipeline: Placeholder art → Greybox prototyping → Final pixel art Modular unit definition using Godot's resource system Data-driven ability definitions for easy balancing