|
|
@ -10,167 +10,175 @@ import sys |
|
|
|
import json |
|
|
|
import base64 |
|
|
|
|
|
|
|
|
|
|
|
class MuJsonLoader(object): |
|
|
|
def __init__(self): |
|
|
|
self.json = None |
|
|
|
def __init__(self): |
|
|
|
self.json = None |
|
|
|
|
|
|
|
def load(self, path): |
|
|
|
with open(path, 'rb+') as f: |
|
|
|
self.json = json.loads(f.read().decode('utf8')) |
|
|
|
|
|
|
|
def load(self, path): |
|
|
|
with open(path, 'rb+') as f: |
|
|
|
self.json = json.loads(f.read().decode('utf8')) |
|
|
|
def save(self, path): |
|
|
|
if self.json: |
|
|
|
output = json.dumps(self.json, sort_keys=True, indent=4, separators=(',', ': ')) |
|
|
|
with open(path, 'r+') as f: |
|
|
|
f.write(output) |
|
|
|
f.truncate() |
|
|
|
|
|
|
|
def save(self, path): |
|
|
|
if self.json: |
|
|
|
output = json.dumps(self.json, sort_keys=True, indent=4, separators=(',', ': ')) |
|
|
|
with open(path, 'r+') as f: |
|
|
|
f.write(output) |
|
|
|
f.truncate() |
|
|
|
|
|
|
|
class MuMgr(object): |
|
|
|
def __init__(self): |
|
|
|
self.config_path = get_config().MUDB_FILE |
|
|
|
try: |
|
|
|
self.server_addr = get_config().SERVER_PUB_ADDR |
|
|
|
except: |
|
|
|
self.server_addr = '127.0.0.1' |
|
|
|
self.data = MuJsonLoader() |
|
|
|
def __init__(self): |
|
|
|
self.config_path = get_config().MUDB_FILE |
|
|
|
try: |
|
|
|
self.server_addr = get_config().SERVER_PUB_ADDR |
|
|
|
except: |
|
|
|
self.server_addr = '127.0.0.1' |
|
|
|
self.data = MuJsonLoader() |
|
|
|
|
|
|
|
if self.server_addr == '127.0.0.1': |
|
|
|
self.server_addr = self.getipaddr() |
|
|
|
|
|
|
|
if self.server_addr == '127.0.0.1': |
|
|
|
self.server_addr = self.getipaddr() |
|
|
|
def getipaddr(self, ifname='eth0'): |
|
|
|
import socket |
|
|
|
import struct |
|
|
|
import fcntl |
|
|
|
ret = '127.0.0.1' |
|
|
|
try: |
|
|
|
ret = socket.gethostbyname(socket.getfqdn(socket.gethostname())) |
|
|
|
except: |
|
|
|
pass |
|
|
|
if ret == '127.0.0.1': |
|
|
|
try: |
|
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) |
|
|
|
ret = socket.inet_ntoa(fcntl.ioctl(s.fileno(), 0x8915, struct.pack('256s', ifname[:15]))[20:24]) |
|
|
|
except: |
|
|
|
pass |
|
|
|
return ret |
|
|
|
|
|
|
|
def getipaddr(self, ifname = 'eth0'): |
|
|
|
import socket |
|
|
|
import struct |
|
|
|
import fcntl |
|
|
|
ret = '127.0.0.1' |
|
|
|
try: |
|
|
|
ret = socket.gethostbyname(socket.getfqdn(socket.gethostname())) |
|
|
|
except: |
|
|
|
pass |
|
|
|
if ret == '127.0.0.1': |
|
|
|
try: |
|
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) |
|
|
|
ret = socket.inet_ntoa(fcntl.ioctl(s.fileno(), 0x8915, struct.pack('256s', ifname[:15]))[20:24]) |
|
|
|
except: |
|
|
|
pass |
|
|
|
return ret |
|
|
|
def ssrlink(self, user, encode): |
|
|
|
protocol = user.get('protocol', '') |
|
|
|
obfs = user.get('obfs', '') |
|
|
|
protocol = protocol.replace("_compatible", "") |
|
|
|
obfs = obfs.replace("_compatible", "") |
|
|
|
link = "%s:%s:%s:%s:%s:%s" % (self.server_addr, user['port'], protocol, user['method'], obfs, |
|
|
|
common.to_str(base64.urlsafe_b64encode(common.to_bytes(user['passwd']))).replace( |
|
|
|
"=", "")) |
|
|
|
return "ssr://" + ( |
|
|
|
encode and common.to_str(base64.urlsafe_b64encode(common.to_bytes(link))).replace("=", "") or link) |
|
|
|
|
|
|
|
def ssrlink(self, user, encode): |
|
|
|
protocol = user.get('protocol', '') |
|
|
|
obfs = user.get('obfs', '') |
|
|
|
protocol = protocol.replace("_compatible", "") |
|
|
|
obfs = obfs.replace("_compatible", "") |
|
|
|
link = "%s:%s:%s:%s:%s:%s" % (self.server_addr, user['port'], protocol, user['method'], obfs, common.to_str(base64.urlsafe_b64encode(common.to_bytes(user['passwd']))).replace("=", "")) |
|
|
|
return "ssr://" + ( encode and common.to_str(base64.urlsafe_b64encode(common.to_bytes(link))).replace("=", "") or link) |
|
|
|
def userinfo(self, user): |
|
|
|
ret = "" |
|
|
|
for key in sorted(user): |
|
|
|
if key in ['enable']: |
|
|
|
continue |
|
|
|
ret += '\n' |
|
|
|
if key in ['transfer_enable', 'u', 'd']: |
|
|
|
val = user[key] |
|
|
|
if val / 1024 < 4: |
|
|
|
ret += " %s : %s" % (key, val) |
|
|
|
elif val / 1024 ** 2 < 4: |
|
|
|
val /= float(1024) |
|
|
|
ret += " %s : %s K Bytes" % (key, val) |
|
|
|
elif val / 1024 ** 3 < 4: |
|
|
|
val /= float(1024 ** 2) |
|
|
|
ret += " %s : %s M Bytes" % (key, val) |
|
|
|
else: |
|
|
|
val /= float(1024 ** 3) |
|
|
|
ret += " %s : %s G Bytes" % (key, val) |
|
|
|
else: |
|
|
|
ret += " %s : %s" % (key, user[key]) |
|
|
|
ret += "\n " + self.ssrlink(user, False) |
|
|
|
ret += "\n " + self.ssrlink(user, True) |
|
|
|
return ret |
|
|
|
|
|
|
|
def userinfo(self, user): |
|
|
|
ret = "" |
|
|
|
for key in sorted(user): |
|
|
|
if key in ['enable']: |
|
|
|
continue |
|
|
|
ret += '\n' |
|
|
|
if key in ['transfer_enable', 'u', 'd'] : |
|
|
|
val = user[key] |
|
|
|
if val / 1024 < 4: |
|
|
|
ret += " %s : %s" % (key, val) |
|
|
|
elif val / 1024**2 < 4: |
|
|
|
val /= float(1024) |
|
|
|
ret += " %s : %s K Bytes" % (key, val) |
|
|
|
elif val / 1024**3 < 4: |
|
|
|
val /= float(1024**2) |
|
|
|
ret += " %s : %s M Bytes" % (key, val) |
|
|
|
else: |
|
|
|
val /= float(1024**3) |
|
|
|
ret += " %s : %s G Bytes" % (key, val) |
|
|
|
else: |
|
|
|
ret += " %s : %s" % (key, user[key]) |
|
|
|
ret += "\n " + self.ssrlink(user, False) |
|
|
|
ret += "\n " + self.ssrlink(user, True) |
|
|
|
return ret |
|
|
|
def rand_pass(self): |
|
|
|
return ''.join( |
|
|
|
[random.choice('''ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789~-_=+(){}[]^&%$@''') for i |
|
|
|
in range(8)]) |
|
|
|
|
|
|
|
def rand_pass(self): |
|
|
|
return ''.join([random.choice('''ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789~-_=+(){}[]^&%$@''') for i in range(8)]) |
|
|
|
def add(self, user): |
|
|
|
up = {'enable': 1, 'u': 0, 'd': 0, 'method': "aes-128-cfb", |
|
|
|
'protocol': "auth_sha1_v4", |
|
|
|
'obfs': "tls1.2_ticket_auth_compatible", |
|
|
|
'transfer_enable': 1125899906842624} |
|
|
|
up['passwd'] = self.rand_pass() |
|
|
|
up.update(user) |
|
|
|
|
|
|
|
def add(self, user): |
|
|
|
up = {'enable': 1, 'u': 0, 'd': 0, 'method': "aes-128-cfb", |
|
|
|
'protocol': "auth_sha1_v4", |
|
|
|
'obfs': "tls1.2_ticket_auth_compatible", |
|
|
|
'transfer_enable': 1125899906842624} |
|
|
|
up['passwd'] = self.rand_pass() |
|
|
|
up.update(user) |
|
|
|
self.data.load(self.config_path) |
|
|
|
for row in self.data.json: |
|
|
|
match = False |
|
|
|
if 'user' in user and row['user'] == user['user']: |
|
|
|
match = True |
|
|
|
if 'port' in user and row['port'] == user['port']: |
|
|
|
match = True |
|
|
|
if match: |
|
|
|
print("user [%s] port [%s] already exist" % (row['user'], row['port'])) |
|
|
|
return |
|
|
|
self.data.json.append(up) |
|
|
|
print("### add user info %s" % self.userinfo(up)) |
|
|
|
self.data.save(self.config_path) |
|
|
|
|
|
|
|
self.data.load(self.config_path) |
|
|
|
for row in self.data.json: |
|
|
|
match = False |
|
|
|
if 'user' in user and row['user'] == user['user']: |
|
|
|
match = True |
|
|
|
if 'port' in user and row['port'] == user['port']: |
|
|
|
match = True |
|
|
|
if match: |
|
|
|
print("user [%s] port [%s] already exist" % (row['user'], row['port'])) |
|
|
|
return |
|
|
|
self.data.json.append(up) |
|
|
|
print("### add user info %s" % self.userinfo(up)) |
|
|
|
self.data.save(self.config_path) |
|
|
|
def edit(self, user): |
|
|
|
self.data.load(self.config_path) |
|
|
|
for row in self.data.json: |
|
|
|
match = True |
|
|
|
if 'user' in user and row['user'] != user['user']: |
|
|
|
match = False |
|
|
|
if 'port' in user and row['port'] != user['port']: |
|
|
|
match = False |
|
|
|
if match: |
|
|
|
print("edit user [%s]" % (row['user'],)) |
|
|
|
row.update(user) |
|
|
|
print("### new user info %s" % self.userinfo(row)) |
|
|
|
break |
|
|
|
self.data.save(self.config_path) |
|
|
|
|
|
|
|
def edit(self, user): |
|
|
|
self.data.load(self.config_path) |
|
|
|
for row in self.data.json: |
|
|
|
match = True |
|
|
|
if 'user' in user and row['user'] != user['user']: |
|
|
|
match = False |
|
|
|
if 'port' in user and row['port'] != user['port']: |
|
|
|
match = False |
|
|
|
if match: |
|
|
|
print("edit user [%s]" % (row['user'],)) |
|
|
|
row.update(user) |
|
|
|
print("### new user info %s" % self.userinfo(row)) |
|
|
|
break |
|
|
|
self.data.save(self.config_path) |
|
|
|
def delete(self, user): |
|
|
|
self.data.load(self.config_path) |
|
|
|
index = 0 |
|
|
|
for row in self.data.json: |
|
|
|
match = True |
|
|
|
if 'user' in user and row['user'] != user['user']: |
|
|
|
match = False |
|
|
|
if 'port' in user and row['port'] != user['port']: |
|
|
|
match = False |
|
|
|
if match: |
|
|
|
print("delete user [%s]" % row['user']) |
|
|
|
del self.data.json[index] |
|
|
|
break |
|
|
|
index += 1 |
|
|
|
self.data.save(self.config_path) |
|
|
|
|
|
|
|
def delete(self, user): |
|
|
|
self.data.load(self.config_path) |
|
|
|
index = 0 |
|
|
|
for row in self.data.json: |
|
|
|
match = True |
|
|
|
if 'user' in user and row['user'] != user['user']: |
|
|
|
match = False |
|
|
|
if 'port' in user and row['port'] != user['port']: |
|
|
|
match = False |
|
|
|
if match: |
|
|
|
print("delete user [%s]" % row['user']) |
|
|
|
del self.data.json[index] |
|
|
|
break |
|
|
|
index += 1 |
|
|
|
self.data.save(self.config_path) |
|
|
|
def clear_ud(self, user): |
|
|
|
up = {'u': 0, 'd': 0} |
|
|
|
self.data.load(self.config_path) |
|
|
|
for row in self.data.json: |
|
|
|
match = True |
|
|
|
if 'user' in user and row['user'] != user['user']: |
|
|
|
match = False |
|
|
|
if 'port' in user and row['port'] != user['port']: |
|
|
|
match = False |
|
|
|
if match: |
|
|
|
row.update(up) |
|
|
|
print("clear user [%s]" % row['user']) |
|
|
|
self.data.save(self.config_path) |
|
|
|
|
|
|
|
def clear_ud(self, user): |
|
|
|
up = {'u': 0, 'd': 0} |
|
|
|
self.data.load(self.config_path) |
|
|
|
for row in self.data.json: |
|
|
|
match = True |
|
|
|
if 'user' in user and row['user'] != user['user']: |
|
|
|
match = False |
|
|
|
if 'port' in user and row['port'] != user['port']: |
|
|
|
match = False |
|
|
|
if match: |
|
|
|
row.update(up) |
|
|
|
print("clear user [%s]" % row['user']) |
|
|
|
self.data.save(self.config_path) |
|
|
|
def list_user(self, user): |
|
|
|
self.data.load(self.config_path) |
|
|
|
if not user: |
|
|
|
for row in self.data.json: |
|
|
|
print("user [%s] port %s" % (row['user'], row['port'])) |
|
|
|
return |
|
|
|
for row in self.data.json: |
|
|
|
match = True |
|
|
|
if 'user' in user and row['user'] != user['user']: |
|
|
|
match = False |
|
|
|
if 'port' in user and row['port'] != user['port']: |
|
|
|
match = False |
|
|
|
if match: |
|
|
|
print("### user [%s] info %s" % (row['user'], self.userinfo(row))) |
|
|
|
|
|
|
|
def list_user(self, user): |
|
|
|
self.data.load(self.config_path) |
|
|
|
if not user: |
|
|
|
for row in self.data.json: |
|
|
|
print("user [%s] port %s" % (row['user'], row['port'])) |
|
|
|
return |
|
|
|
for row in self.data.json: |
|
|
|
match = True |
|
|
|
if 'user' in user and row['user'] != user['user']: |
|
|
|
match = False |
|
|
|
if 'port' in user and row['port'] != user['port']: |
|
|
|
match = False |
|
|
|
if match: |
|
|
|
print("### user [%s] info %s" % (row['user'], self.userinfo(row))) |
|
|
|
|
|
|
|
def print_server_help(): |
|
|
|
print('''usage: python mujson_manage.py -a|-d|-e|-c|-l [OPTION]... |
|
|
@ -198,119 +206,120 @@ General options: |
|
|
|
-h, --help show this help message and exit |
|
|
|
''') |
|
|
|
|
|
|
|
|
|
|
|
def main(): |
|
|
|
shortopts = 'adeclu:p:k:O:o:G:g:m:t:f:h' |
|
|
|
longopts = ['help'] |
|
|
|
action = None |
|
|
|
user = {} |
|
|
|
fast_set_obfs = {'0': 'plain', |
|
|
|
'+1': 'http_simple_compatible', |
|
|
|
'1': 'http_simple', |
|
|
|
'+2': 'tls1.2_ticket_auth_compatible', |
|
|
|
'2': 'tls1.2_ticket_auth'} |
|
|
|
fast_set_protocol = {'0': 'origin', |
|
|
|
'+1': 'verify_sha1_compatible', |
|
|
|
'1': 'verify_sha1', |
|
|
|
'2': 'auth_sha1', |
|
|
|
'3': 'auth_sha1_v2', |
|
|
|
'4': 'auth_sha1_v4', |
|
|
|
'am': 'auth_aes128_md5', |
|
|
|
'as': 'auth_aes128_sha1', |
|
|
|
} |
|
|
|
fast_set_method = {'a0': 'aes-128-cfb', |
|
|
|
'a1': 'aes-192-cfb', |
|
|
|
'a2': 'aes-256-cfb', |
|
|
|
'r': 'rc4-md5', |
|
|
|
'r6': 'rc4-md5-6', |
|
|
|
'c': 'chacha20', |
|
|
|
'ci': 'chacha20-ietf', |
|
|
|
's': 'salsa20', |
|
|
|
'b': 'bf-cfb', |
|
|
|
'm0': 'camellia-128-cfb', |
|
|
|
'm1': 'camellia-192-cfb', |
|
|
|
'm2': 'camellia-256-cfb', |
|
|
|
'a0t': 'aes-128-ctr', |
|
|
|
'a1t': 'aes-192-ctr', |
|
|
|
'a2t': 'aes-256-ctr'} |
|
|
|
try: |
|
|
|
optlist, args = getopt.getopt(sys.argv[1:], shortopts, longopts) |
|
|
|
for key, value in optlist: |
|
|
|
if key == '-a': |
|
|
|
action = 1 |
|
|
|
elif key == '-d': |
|
|
|
action = 2 |
|
|
|
elif key == '-e': |
|
|
|
action = 3 |
|
|
|
elif key == '-l': |
|
|
|
action = 4 |
|
|
|
elif key == '-c': |
|
|
|
action = 0 |
|
|
|
elif key == '-u': |
|
|
|
user['user'] = value |
|
|
|
elif key == '-p': |
|
|
|
user['port'] = int(value) |
|
|
|
elif key == '-k': |
|
|
|
user['passwd'] = value |
|
|
|
elif key == '-o': |
|
|
|
if value in fast_set_obfs: |
|
|
|
user['obfs'] = fast_set_obfs[value] |
|
|
|
else: |
|
|
|
user['obfs'] = value |
|
|
|
elif key == '-O': |
|
|
|
if value in fast_set_protocol: |
|
|
|
user['protocol'] = fast_set_protocol[value] |
|
|
|
else: |
|
|
|
user['protocol'] = value |
|
|
|
elif key == '-g': |
|
|
|
user['obfs_param'] = value |
|
|
|
elif key == '-G': |
|
|
|
user['protocol_param'] = value |
|
|
|
elif key == '-m': |
|
|
|
if value in fast_set_method: |
|
|
|
user['method'] = fast_set_method[value] |
|
|
|
else: |
|
|
|
user['method'] = value |
|
|
|
elif key == '-f': |
|
|
|
user['forbidden_port'] = value |
|
|
|
elif key == '-t': |
|
|
|
val = float(value) |
|
|
|
try: |
|
|
|
val = int(value) |
|
|
|
except: |
|
|
|
pass |
|
|
|
user['transfer_enable'] = val * (1024 ** 3) |
|
|
|
elif key in ('-h', '--help'): |
|
|
|
print_server_help() |
|
|
|
sys.exit(0) |
|
|
|
except getopt.GetoptError as e: |
|
|
|
print(e) |
|
|
|
sys.exit(2) |
|
|
|
shortopts = 'adeclu:p:k:O:o:G:g:m:t:f:h' |
|
|
|
longopts = ['help'] |
|
|
|
action = None |
|
|
|
user = {} |
|
|
|
fast_set_obfs = {'0': 'plain', |
|
|
|
'+1': 'http_simple_compatible', |
|
|
|
'1': 'http_simple', |
|
|
|
'+2': 'tls1.2_ticket_auth_compatible', |
|
|
|
'2': 'tls1.2_ticket_auth'} |
|
|
|
fast_set_protocol = {'0': 'origin', |
|
|
|
'+1': 'verify_sha1_compatible', |
|
|
|
'1': 'verify_sha1', |
|
|
|
'2': 'auth_sha1', |
|
|
|
'3': 'auth_sha1_v2', |
|
|
|
'4': 'auth_sha1_v4', |
|
|
|
'am': 'auth_aes128_md5', |
|
|
|
'as': 'auth_aes128_sha1', |
|
|
|
} |
|
|
|
fast_set_method = {'a0': 'aes-128-cfb', |
|
|
|
'a1': 'aes-192-cfb', |
|
|
|
'a2': 'aes-256-cfb', |
|
|
|
'r': 'rc4-md5', |
|
|
|
'r6': 'rc4-md5-6', |
|
|
|
'c': 'chacha20', |
|
|
|
'ci': 'chacha20-ietf', |
|
|
|
's': 'salsa20', |
|
|
|
'b': 'bf-cfb', |
|
|
|
'm0': 'camellia-128-cfb', |
|
|
|
'm1': 'camellia-192-cfb', |
|
|
|
'm2': 'camellia-256-cfb', |
|
|
|
'a0t': 'aes-128-ctr', |
|
|
|
'a1t': 'aes-192-ctr', |
|
|
|
'a2t': 'aes-256-ctr'} |
|
|
|
try: |
|
|
|
optlist, args = getopt.getopt(sys.argv[1:], shortopts, longopts) |
|
|
|
for key, value in optlist: |
|
|
|
if key == '-a': |
|
|
|
action = 1 |
|
|
|
elif key == '-d': |
|
|
|
action = 2 |
|
|
|
elif key == '-e': |
|
|
|
action = 3 |
|
|
|
elif key == '-l': |
|
|
|
action = 4 |
|
|
|
elif key == '-c': |
|
|
|
action = 0 |
|
|
|
elif key == '-u': |
|
|
|
user['user'] = value |
|
|
|
elif key == '-p': |
|
|
|
user['port'] = int(value) |
|
|
|
elif key == '-k': |
|
|
|
user['passwd'] = value |
|
|
|
elif key == '-o': |
|
|
|
if value in fast_set_obfs: |
|
|
|
user['obfs'] = fast_set_obfs[value] |
|
|
|
else: |
|
|
|
user['obfs'] = value |
|
|
|
elif key == '-O': |
|
|
|
if value in fast_set_protocol: |
|
|
|
user['protocol'] = fast_set_protocol[value] |
|
|
|
else: |
|
|
|
user['protocol'] = value |
|
|
|
elif key == '-g': |
|
|
|
user['obfs_param'] = value |
|
|
|
elif key == '-G': |
|
|
|
user['protocol_param'] = value |
|
|
|
elif key == '-m': |
|
|
|
if value in fast_set_method: |
|
|
|
user['method'] = fast_set_method[value] |
|
|
|
else: |
|
|
|
user['method'] = value |
|
|
|
elif key == '-f': |
|
|
|
user['forbidden_port'] = value |
|
|
|
elif key == '-t': |
|
|
|
val = float(value) |
|
|
|
try: |
|
|
|
val = int(value) |
|
|
|
except: |
|
|
|
pass |
|
|
|
user['transfer_enable'] = val * (1024 ** 3) |
|
|
|
elif key in ('-h', '--help'): |
|
|
|
print_server_help() |
|
|
|
sys.exit(0) |
|
|
|
except getopt.GetoptError as e: |
|
|
|
print(e) |
|
|
|
sys.exit(2) |
|
|
|
|
|
|
|
manage = MuMgr() |
|
|
|
if action == 0: |
|
|
|
manage.clear_ud(user) |
|
|
|
elif action == 1: |
|
|
|
if 'user' not in user and 'port' in user: |
|
|
|
user['user'] = str(user['port']) |
|
|
|
if 'user' in user and 'port' in user: |
|
|
|
manage.add(user) |
|
|
|
else: |
|
|
|
print("You have to set the port with -p") |
|
|
|
elif action == 2: |
|
|
|
if 'user' in user or 'port' in user: |
|
|
|
manage.delete(user) |
|
|
|
else: |
|
|
|
print("You have to set the user name or port with -u/-p") |
|
|
|
elif action == 3: |
|
|
|
if 'user' in user or 'port' in user: |
|
|
|
manage.edit(user) |
|
|
|
else: |
|
|
|
print("You have to set the user name or port with -u/-p") |
|
|
|
elif action == 4: |
|
|
|
manage.list_user(user) |
|
|
|
elif action is None: |
|
|
|
print_server_help() |
|
|
|
manage = MuMgr() |
|
|
|
if action == 0: |
|
|
|
manage.clear_ud(user) |
|
|
|
elif action == 1: |
|
|
|
if 'user' not in user and 'port' in user: |
|
|
|
user['user'] = str(user['port']) |
|
|
|
if 'user' in user and 'port' in user: |
|
|
|
manage.add(user) |
|
|
|
else: |
|
|
|
print("You have to set the port with -p") |
|
|
|
elif action == 2: |
|
|
|
if 'user' in user or 'port' in user: |
|
|
|
manage.delete(user) |
|
|
|
else: |
|
|
|
print("You have to set the user name or port with -u/-p") |
|
|
|
elif action == 3: |
|
|
|
if 'user' in user or 'port' in user: |
|
|
|
manage.edit(user) |
|
|
|
else: |
|
|
|
print("You have to set the user name or port with -u/-p") |
|
|
|
elif action == 4: |
|
|
|
manage.list_user(user) |
|
|
|
elif action is None: |
|
|
|
print_server_help() |
|
|
|
|
|
|
|
if __name__ == '__main__': |
|
|
|
main() |
|
|
|
|
|
|
|
if __name__ == '__main__': |
|
|
|
main() |
|
|
|