Compare commits
9 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
286ee9e51e | ||
|
|
9a2a88384b | ||
|
|
68068b29e1 | ||
|
|
3b0b50670d | ||
|
|
863b6dd220 | ||
|
|
e3c9e3088b | ||
|
|
27bdfc8581 | ||
|
|
a2b1731fac | ||
|
|
f96c9253fe |
BIN
AUTO_MAA.exe
21
LICENSE
Normal file
@@ -0,0 +1,21 @@
|
||||
MIT License
|
||||
|
||||
Copyright (c) 2024 DLmaster
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
of this software and associated documentation files (the "Software"), to deal
|
||||
in the Software without restriction, including without limitation the rights
|
||||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||
copies of the Software, and to permit persons to whom the Software is
|
||||
furnished to do so, subject to the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice shall be included in all
|
||||
copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
SOFTWARE.
|
||||
262
README.md
Normal file
@@ -0,0 +1,262 @@
|
||||
# AUTO_MAA
|
||||
MAA多账号管理与自动化软件
|
||||
|
||||

|
||||
|
||||
----------------------------------------------------------------------------------------------
|
||||
|
||||
## 免责声明
|
||||
本软件是一个外部工具,旨在优化MAA多账号功能体验。该软件包可以存储明日方舟多账号数据,并通过修改MAA配置文件、读取MAA日志等行为自动完成多账号代理。
|
||||
|
||||
This software is open source, free of charge and for learning and exchange purposes only. The developer team has the final right to interpret this project. All problems arising from the use of this software are not related to this project and the developer team. If you encounter a merchant using this software to practice on your behalf and charging for it, it may be the cost of equipment and time, etc. The problems and consequences arising from this software have nothing to do with it.
|
||||
|
||||
本软件开源、免费,仅供学习交流使用。开发者团队拥有本项目的最终解释权。使用本软件产生的所有问题与本项目与开发者团队无关。若您遇到商家使用本软件进行代练并收费,可能是设备与时间等费用,产生的问题及后果与本软件无关。
|
||||
|
||||
## 安装与配置MAA
|
||||
|
||||
本软件是MAA的外部工具,需要安装配置MAA后才能使用。
|
||||
|
||||
### MAA安装
|
||||
|
||||
什么是MAA? [官网](https://maa.plus/)/[GitHub](https://github.com/CHNZYX/Auto_Simulated_Universe/archive/refs/heads/main.zip)
|
||||
|
||||
MAA下载地址 [GitHub下载](https://github.com/MaaAssistantArknights/MaaAssistantArknights/releases)
|
||||
|
||||
### MAA配置
|
||||
|
||||
1.完成MAA的adb配置等基本配置
|
||||
|
||||
2.在“完成后”菜单,选择“退出MAA和模拟器”。勾选“手动输入关卡名”和“无限吃48小时内过期的理智药”
|
||||
|
||||

|
||||
|
||||
3.确保当前配置名为“Default”,取消所有“定时执行”
|
||||
|
||||

|
||||
|
||||
4.取消勾选“开机自启动MAA”,勾选“启动MAA后直接运行”和“启动MAA后自动开启模拟器”。配置自己模拟器所在的位置并根据实际情况填写“等待模拟器启动时间”(建议预留10s以防意外)。如果是多开用户,需要填写“附加命令”,具体填写值参见多开模拟器对应快捷方式路径(如“-v 1”)。
|
||||
|
||||

|
||||
|
||||
5.勾选“定时检查更新”、“自动下载更新包”和“自动安装更新包”
|
||||
|
||||

|
||||
|
||||
## 下载AUTO_MAA软件包 [](https://github.com/DLmaster361/AUTO_MAA/releases)
|
||||
|
||||
GitHub下载地址 [GitHub下载](https://github.com/DLmaster361/AUTO_MAA/releases)
|
||||
|
||||
## 配置用户信息与相关参数
|
||||
|
||||
**注意:** 当前所有的密码输入部分都存在一点“小问题”,请在输入密码时避免输入Delete、F12、Tab等功能键。
|
||||
|
||||
-------------------------------------------------
|
||||
|
||||
### 第一次启动
|
||||
|
||||
双击启动`manage.exe`,输入MAA所在文件夹路径并回车(注意使用斜杠的种类,不要使用反斜杠),然后设置管理密钥(密钥可以包含字母大小写与特殊字符)。
|
||||
|
||||

|
||||
|
||||
管理密钥是解密用户密码的唯一凭证,与数据库绑定。密钥丢失或`data/key/`目录下任一文件损坏都将导致解密无法正常进行。
|
||||
|
||||
本项目采用自主开发的混合加密模式,项目组也无法找回您的管理密钥或修复`data/key/`目录下的文件。如果不幸的事发生,建议您删除`data/data.db`重新录入信息。
|
||||
|
||||
### 添加用户
|
||||
|
||||
输入“+”以开始添加用户。依次输入:
|
||||
|
||||
**用户名:** 管理用户的惟一凭证
|
||||
|
||||
**手机号码:** 允许隐去中间四位以“****”代替
|
||||
|
||||
**代理天数:** 这个还要我解释吗?
|
||||
|
||||

|
||||
|
||||
### 删除用户
|
||||
|
||||
输入用户名+“-”以删除用户。格式:
|
||||
|
||||
```
|
||||
用户名 -
|
||||
```
|
||||
|
||||

|
||||
|
||||
### 配置用户状态
|
||||
|
||||
**启用代理:** 输入用户名+“y”以启用该用户的代理。格式:
|
||||
|
||||
```
|
||||
用户名 y
|
||||
```
|
||||
|
||||

|
||||
|
||||
**禁用代理:** 输入用户名+“n”以禁用该用户的代理。格式:
|
||||
|
||||
```
|
||||
用户名 n
|
||||
```
|
||||
|
||||

|
||||
|
||||
### 续期
|
||||
|
||||
输入用户名+续期天数+“+”以延长该用户的代理天数。格式:
|
||||
|
||||
```
|
||||
用户名 续期天数 +
|
||||
```
|
||||
|
||||

|
||||
|
||||
### 修改刷取关卡
|
||||
|
||||
输入用户名+关卡号+“~”以更改该用户的代理关卡。格式:
|
||||
|
||||
```
|
||||
用户名 关卡号 ~
|
||||
```
|
||||
|
||||

|
||||
|
||||
**特别的:**
|
||||
|
||||
你可以自定义关卡号替换方案。程序会读取`gameid.txt`中的数据,依据此进行关卡号的替换,便于常用关卡的使用。`gameid.txt`在初始已经存储了一些常用资源本的替代方案。
|
||||
|
||||

|
||||
|
||||
### 设置MAA路径
|
||||
|
||||
输入“/”+新的MAA文件夹路径以修改MAA安装位置的配置。格式:
|
||||
|
||||
```
|
||||
/新的MAA文件夹路径
|
||||
```
|
||||
|
||||
**注意:** ‘/’与路径间没有空格,路径同样不能使用反斜杠
|
||||
|
||||

|
||||
|
||||
### 设置启动时间
|
||||
|
||||
**添加启动时间:** 输入“:+”+时间以添加定时启动时间。格式:
|
||||
|
||||
```
|
||||
:+小时:分钟
|
||||
```
|
||||
|
||||
**注意:** 所有输入间没有空格
|
||||
|
||||

|
||||
|
||||
**删除启动时间:** 输入“:-”+时间以删除定时启动时间。格式:
|
||||
|
||||
```
|
||||
:-小时:分钟
|
||||
```
|
||||
|
||||
**注意:** 所有输入间没有空格
|
||||
|
||||

|
||||
|
||||
### 检索信息
|
||||
|
||||
**检索所有信息:** `manage.exe`打开时会打印所有用户与配置信息。除此之外,你可以通过输入“all ?”以打印所有信息,如下:
|
||||
|
||||
```
|
||||
all ?
|
||||
```
|
||||
|
||||

|
||||
|
||||
**检索MAA路径:** 输入“maa ?”以检索MAA安装路径,如下:
|
||||
|
||||
```
|
||||
maa ?
|
||||
```
|
||||
|
||||

|
||||
|
||||
**检索启动时间:** 输入“time ?”以检索定时启动的时间,如下:
|
||||
|
||||
```
|
||||
time ?
|
||||
```
|
||||
|
||||

|
||||
|
||||
**检索指定用户:** 输入用户名+“?”以检索指定用户信息,如下:
|
||||
|
||||
```
|
||||
用户名 ?
|
||||
```
|
||||
|
||||
**注意:** 由于需要检索用户密码,每一次`manage.exe`启动后的首次查询需要验证管理密钥。为了方便操作,之后的查询不会再要求重复验证。因此,完成密码查询后,请及时关闭`manage.exe`。
|
||||
|
||||

|
||||
|
||||
### 修改管理密钥
|
||||
|
||||
输入“*”以开始修改管理密钥。依次输入:
|
||||
|
||||
**旧管理密钥:** 当数据库中没有存储用户信息时,允许跳过验证直接配置新管理密钥
|
||||
|
||||
**新管理密钥:** 请妥善保管,丢失无法找回。
|
||||
|
||||

|
||||
|
||||
### 退出
|
||||
|
||||
输入“-”以退出`manage.exe`,如下:
|
||||
|
||||
```
|
||||
-
|
||||
```
|
||||
|
||||
## 运行代理
|
||||
|
||||
### 直接运行
|
||||
|
||||
双击`run.exe`直接运行
|
||||
|
||||
### 定时运行
|
||||
|
||||
双击`AUTO_MAA.exe`打开,不要关闭。它会读取设定时间,在该时刻自动运行
|
||||
|
||||
**注意:** 周一将自动进行剿灭代理
|
||||
|
||||
## 关于
|
||||
|
||||
项目图标由文心一格AI生成
|
||||
|
||||
----------------------------------------------------------------------------------------------
|
||||
|
||||
欢迎加入AUTO_MAA项目组,欢迎反馈bug
|
||||
|
||||
QQ群:暂时没有
|
||||
|
||||
----------------------------------------------------------------------------------------------
|
||||
|
||||
如果喜欢本项目,可以打赏送作者一杯咖啡喵!
|
||||
|
||||

|
||||
|
||||
----------------------------------------------------------------------------------------------
|
||||
## 贡献者
|
||||
|
||||
感谢以下贡献者对本项目做出的贡献
|
||||
|
||||
<a href="https://github.com/DLmaster361/AUTO_MAA/graphs/contributors">
|
||||
|
||||
<img src="https://contrib.rocks/image?repo=DLmaster361/AUTO_MAA" />
|
||||
|
||||
</a>
|
||||
|
||||

|
||||
|
||||
## Star History
|
||||
|
||||
[](https://star-history.com/#DLmaster361/AUTO_MAA&Date)
|
||||
BIN
manage.exe
201
manage.py
@@ -1,6 +1,147 @@
|
||||
import sqlite3
|
||||
import datetime
|
||||
import msvcrt
|
||||
import sys
|
||||
import os
|
||||
import hashlib
|
||||
import random
|
||||
import secrets
|
||||
from Crypto.Cipher import AES
|
||||
from Crypto.PublicKey import RSA
|
||||
from Crypto.Cipher import PKCS1_OAEP
|
||||
from Crypto.Util.Padding import pad,unpad
|
||||
|
||||
#读入密码
|
||||
def readpass(text):
|
||||
sys.stdout=sys.__stdout__
|
||||
sys.stdout.write(text)
|
||||
sys.stdout.flush()
|
||||
p=''
|
||||
while True:
|
||||
typed=msvcrt.getch()
|
||||
if len(p)!=0:
|
||||
if typed==b'\r':
|
||||
sys.stdout.write('\b*')
|
||||
sys.stdout.flush()
|
||||
break
|
||||
elif typed==b'\b':
|
||||
p=p[:-1]
|
||||
sys.stdout.write('\b \b')
|
||||
sys.stdout.flush()
|
||||
else:
|
||||
p+=typed.decode("utf-8")
|
||||
sys.stdout.write('\b*'+typed.decode("utf-8"))
|
||||
sys.stdout.flush()
|
||||
elif typed!=b'\r' and typed!=b'\b':
|
||||
p+=typed.decode("utf-8")
|
||||
sys.stdout.write(typed.decode("utf-8"))
|
||||
sys.stdout.flush()
|
||||
print('')
|
||||
return p
|
||||
|
||||
#配置密钥
|
||||
def getPASSWORD(PASSWORD):
|
||||
#生成RSA密钥对
|
||||
key=RSA.generate(2048)
|
||||
public_key_local=key.publickey()
|
||||
private_key=key
|
||||
#保存RSA公钥
|
||||
with open('data/key/public_key.pem','wb') as f:
|
||||
f.write(public_key_local.exportKey())
|
||||
#生成密钥转换与校验随机盐
|
||||
PASSWORDsalt=secrets.token_hex(random.randint(32,1024))
|
||||
with open("data/key/PASSWORDsalt.txt","w",encoding="utf-8") as f:
|
||||
print(PASSWORDsalt,file=f)
|
||||
verifysalt=secrets.token_hex(random.randint(32,1024))
|
||||
with open("data/key/verifysalt.txt","w",encoding="utf-8") as f:
|
||||
print(verifysalt,file=f)
|
||||
#将管理密钥转化为AES-256密钥
|
||||
AES_password=hashlib.sha256((PASSWORD+PASSWORDsalt).encode("utf-8")).digest()
|
||||
#生成AES-256密钥校验哈希值并保存
|
||||
AES_password_verify=hashlib.sha256(AES_password+verifysalt.encode("utf-8")).digest()
|
||||
with open("data/key/AES_password_verify.bin","wb") as f:
|
||||
f.write(AES_password_verify)
|
||||
#AES-256加密RSA私钥并保存密文
|
||||
AES_key=AES.new(AES_password,AES.MODE_ECB)
|
||||
private_key_local=AES_key.encrypt(pad(private_key.exportKey(),32))
|
||||
with open("data/key/private_key.bin","wb") as f:
|
||||
f.write(private_key_local)
|
||||
|
||||
#加密
|
||||
def encryptx(note):
|
||||
#读取RSA公钥
|
||||
with open('data/key/public_key.pem','rb') as f:
|
||||
public_key_local=RSA.import_key(f.read())
|
||||
#使用RSA公钥对数据进行加密
|
||||
cipher=PKCS1_OAEP.new(public_key_local)
|
||||
encrypted=cipher.encrypt(note.encode("utf-8"))
|
||||
return encrypted
|
||||
|
||||
#解密
|
||||
def decryptx(note,PASSWORD):
|
||||
#读入RSA私钥密文、盐与校验哈希值
|
||||
with open("data/key/private_key.bin","rb") as f:
|
||||
private_key_local=f.read().strip()
|
||||
with open("data/key/PASSWORDsalt.txt","r",encoding="utf-8") as f:
|
||||
PASSWORDsalt=f.read().strip()
|
||||
with open("data/key/verifysalt.txt","r",encoding="utf-8") as f:
|
||||
verifysalt=f.read().strip()
|
||||
with open("data/key/AES_password_verify.bin","rb") as f:
|
||||
AES_password_verify=f.read().strip()
|
||||
#将管理密钥转化为AES-256密钥并验证
|
||||
AES_password=hashlib.sha256((PASSWORD+PASSWORDsalt).encode("utf-8")).digest()
|
||||
AES_password_SHA=hashlib.sha256(AES_password+verifysalt.encode("utf-8")).digest()
|
||||
if AES_password_SHA!=AES_password_verify:
|
||||
return "管理密钥错误"
|
||||
else:
|
||||
#AES解密RSA私钥
|
||||
AES_key=AES.new(AES_password,AES.MODE_ECB)
|
||||
private_key_pem=unpad(AES_key.decrypt(private_key_local),32)
|
||||
private_key=RSA.import_key(private_key_pem)
|
||||
#使用RSA私钥解密数据
|
||||
decrypter=PKCS1_OAEP.new(private_key)
|
||||
note=decrypter.decrypt(note)
|
||||
return note.decode("utf-8")
|
||||
|
||||
#修改管理密钥
|
||||
def changePASSWORD():
|
||||
#获取用户信息
|
||||
db=sqlite3.connect(DATABASE)
|
||||
cur=db.cursor()
|
||||
cur.execute("SELECT * FROM adminx WHERE True")
|
||||
data=cur.fetchall()
|
||||
cur.close()
|
||||
db.close()
|
||||
data=[list(row) for row in data]
|
||||
global PASSWORD
|
||||
#验证管理密钥
|
||||
PASSWORDold=readpass("请输入旧管理密钥:")
|
||||
if len(data)==0:
|
||||
print("当前无用户,验证自动通过")
|
||||
PASSWORDnew=readpass("请输入新管理密钥:")
|
||||
getPASSWORD(PASSWORDnew)
|
||||
PASSWORD=PASSWORDnew
|
||||
return "管理密钥修改成功"
|
||||
while decryptx(data[0][6],PASSWORDold)=="管理密钥错误":
|
||||
print("管理密钥错误")
|
||||
PASSWORDold=readpass("请输入旧管理密钥:")
|
||||
print("验证通过")
|
||||
#修改管理密钥
|
||||
PASSWORDnew=readpass("请输入新管理密钥:")
|
||||
#使用旧管理密钥解密
|
||||
for i in range(len(data)):
|
||||
data[i][6]=decryptx(data[i][6],PASSWORDold)
|
||||
#使用新管理密钥重新加密
|
||||
getPASSWORD(PASSWORDnew)
|
||||
db=sqlite3.connect(DATABASE)
|
||||
cur=db.cursor()
|
||||
for i in range(len(data)):
|
||||
cur.execute("UPDATE adminx SET password=? WHERE admin=?",(encryptx(data[i][6]),data[i][0]))
|
||||
db.commit()
|
||||
cur.close()
|
||||
db.close()
|
||||
PASSWORD=PASSWORDnew
|
||||
return "管理密钥修改成功"
|
||||
|
||||
#添加用户
|
||||
def add():
|
||||
@@ -14,9 +155,10 @@ def add():
|
||||
numberx=input("手机号码:")
|
||||
dayx=int(input("代理天数:"))
|
||||
gamex=input("关卡号:")
|
||||
passwordx=input("密码:")
|
||||
passwordx=readpass("密码:")
|
||||
passwordx=encryptx(passwordx)
|
||||
#应用更新
|
||||
cur.execute("INSERT INTO adminx(admin,number,day,status,last,game,password) VALUES('%s','%s',%d,'y','2000-01-01','%s','%s')" %(adminx,numberx,dayx,gamex,passwordx))
|
||||
cur.execute("INSERT INTO adminx VALUES(?,?,?,'y','2000-01-01',?,?)",(adminx,numberx,dayx,gamex,passwordx))
|
||||
db.commit()
|
||||
cur.close()
|
||||
db.close()
|
||||
@@ -27,12 +169,12 @@ def delete(id):
|
||||
db=sqlite3.connect(DATABASE)
|
||||
cur=db.cursor()
|
||||
#检查用户是否存在
|
||||
cur.execute("SELECT * FROM adminx WHERE admin='%s'" %(id))
|
||||
cur.execute("SELECT * FROM adminx WHERE admin=?",(id,))
|
||||
data=cur.fetchall()
|
||||
if len(data)==0:
|
||||
return "未找到"+id
|
||||
#应用更新
|
||||
cur.execute("DELETE FROM adminx WHERE admin='%s'" %(id))
|
||||
cur.execute("DELETE FROM adminx WHERE admin=?",(id,))
|
||||
db.commit()
|
||||
cur.close()
|
||||
db.close()
|
||||
@@ -71,7 +213,7 @@ def search(id,book):
|
||||
if id=="all":
|
||||
cur.execute("SELECT * FROM adminx WHERE True")
|
||||
else:
|
||||
cur.execute("SELECT * FROM adminx WHERE admin='%s'" %(id))
|
||||
cur.execute("SELECT * FROM adminx WHERE admin=?",(id,))
|
||||
data=cur.fetchall()
|
||||
#处理全部信息查询时的MAA路径与启动时间查询
|
||||
if id=="all":
|
||||
@@ -109,6 +251,12 @@ def search(id,book):
|
||||
data[i][3]="禁用"
|
||||
if id=="all":
|
||||
data[i][6]="******"
|
||||
else:
|
||||
#解密
|
||||
global PASSWORD
|
||||
if PASSWORD==0 or decryptx(data[i][6],PASSWORD)=="管理密钥错误":
|
||||
PASSWORD=readpass("请输入管理密钥:")
|
||||
data[i][6]=decryptx(data[i][6],PASSWORD)
|
||||
#制表输出
|
||||
if book==1:
|
||||
print('')
|
||||
@@ -132,14 +280,14 @@ def renewal(readxx):
|
||||
#检查用户是否存在
|
||||
db=sqlite3.connect(DATABASE)
|
||||
cur=db.cursor()
|
||||
cur.execute("SELECT * FROM adminx WHERE admin='%s'" %(id))
|
||||
cur.execute("SELECT * FROM adminx WHERE admin=?",(id,))
|
||||
data=cur.fetchall()
|
||||
if len(data)==0:
|
||||
cur.close()
|
||||
db.close()
|
||||
return "未找到"+id
|
||||
#应用更新
|
||||
cur.execute("UPDATE adminx SET day=%d WHERE admin='%s'" %(data[0][2]+dayp,id))
|
||||
cur.execute("UPDATE adminx SET day=? WHERE admin=?",(data[0][2]+dayp,id))
|
||||
db.commit()
|
||||
cur.close()
|
||||
db.close()
|
||||
@@ -150,14 +298,14 @@ def turn(id,t):
|
||||
#检查用户是否存在
|
||||
db=sqlite3.connect(DATABASE)
|
||||
cur=db.cursor()
|
||||
cur.execute("SELECT * FROM adminx WHERE admin='%s'" %(id))
|
||||
cur.execute("SELECT * FROM adminx WHERE admin=?",(id,))
|
||||
data=cur.fetchall()
|
||||
if len(data)==0:
|
||||
cur.close()
|
||||
db.close()
|
||||
return "未找到"+id
|
||||
#应用更新
|
||||
cur.execute("UPDATE adminx SET status='%s' WHERE admin='%s'" %(t,id))
|
||||
cur.execute("UPDATE adminx SET status=? WHERE admin=?",(t,id))
|
||||
db.commit()
|
||||
cur.close()
|
||||
db.close()
|
||||
@@ -177,7 +325,7 @@ def gameid(readxx):
|
||||
#检查用户是否存在
|
||||
db=sqlite3.connect(DATABASE)
|
||||
cur=db.cursor()
|
||||
cur.execute("SELECT * FROM adminx WHERE admin='%s'" %(id))
|
||||
cur.execute("SELECT * FROM adminx WHERE admin=?",(id,))
|
||||
data=cur.fetchall()
|
||||
if len(data)==0:
|
||||
cur.close()
|
||||
@@ -197,7 +345,7 @@ def gameid(readxx):
|
||||
if gamep in games:
|
||||
gamep=games[gamep]
|
||||
#应用更新
|
||||
cur.execute("UPDATE adminx SET game='%s' WHERE admin='%s'" %(gamep,id))
|
||||
cur.execute("UPDATE adminx SET game=? WHERE admin=?",(gamep,id))
|
||||
db.commit()
|
||||
cur.close()
|
||||
db.close()
|
||||
@@ -210,9 +358,9 @@ def setpath(pathx):
|
||||
cur.execute("SELECT * FROM pathset WHERE True")
|
||||
pathold=cur.fetchall()
|
||||
if len(pathold)>0:
|
||||
cur.execute("UPDATE pathset SET path='%s' WHERE True" %(pathx))
|
||||
cur.execute("UPDATE pathset SET path=? WHERE True",(pathx,))
|
||||
else:
|
||||
cur.execute("INSERT INTO pathset(path) VALUES('%s')" %(pathx))
|
||||
cur.execute("INSERT INTO pathset VALUES(?)",(pathx,))
|
||||
db.commit()
|
||||
cur.close()
|
||||
db.close()
|
||||
@@ -235,7 +383,7 @@ def settime(book,timex):
|
||||
db.close()
|
||||
return "已存在"+timex
|
||||
else:
|
||||
cur.execute("INSERT INTO timeset(time) VALUES('%s')" %(timex))
|
||||
cur.execute("INSERT INTO timeset VALUES(?)",(timex,))
|
||||
db.commit()
|
||||
cur.close()
|
||||
db.close()
|
||||
@@ -243,7 +391,7 @@ def settime(book,timex):
|
||||
#删除时间设置
|
||||
elif book=='-':
|
||||
if timenew in timeold:
|
||||
cur.execute("DELETE FROM timeset WHERE time='%s'" %(timex))
|
||||
cur.execute("DELETE FROM timeset WHERE time=?",(timex,))
|
||||
db.commit()
|
||||
cur.close()
|
||||
db.close()
|
||||
@@ -265,17 +413,20 @@ def unit(x,m):
|
||||
|
||||
#初期检查
|
||||
DATABASE="data/data.db"
|
||||
PASSWORD=0
|
||||
if not os.path.exists(DATABASE):
|
||||
db=sqlite3.connect(DATABASE)
|
||||
cur=db.cursor()
|
||||
db.execute("CREATE TABLE adminx(admin text,number text,day int,status text,last date,game text,password text)")
|
||||
db.execute("CREATE TABLE adminx(admin text,number text,day int,status text,last date,game text,password byte)")
|
||||
db.execute("CREATE TABLE pathset(path text)")
|
||||
db.execute("CREATE TABLE timeset(time text)")
|
||||
readx=input("首次启动,请设置MAA路径:")
|
||||
cur.execute("INSERT INTO pathset(path) VALUES('%s')" %(readx))
|
||||
cur.execute("INSERT INTO pathset VALUES(?)",(readx,))
|
||||
db.commit()
|
||||
cur.close()
|
||||
db.close()
|
||||
PASSWORD=readpass("请设置管理密钥(密钥与数据库绑定):")
|
||||
getPASSWORD(PASSWORD)
|
||||
|
||||
#初始界面
|
||||
print("Good evening!")
|
||||
@@ -286,24 +437,26 @@ while True:
|
||||
read=input()
|
||||
if len(read)==0:
|
||||
print("无法识别的输入")
|
||||
elif read[0]=='+':
|
||||
elif read[0]=='+' and len(read)==1:
|
||||
print(add())
|
||||
elif read[0]=='-':
|
||||
elif read[0]=='-' and len(read)==1:
|
||||
exit()
|
||||
elif read[0]=='/':
|
||||
print(setpath(read[1:]))
|
||||
elif read[0]=='*' and len(read)==1:
|
||||
print(changePASSWORD())
|
||||
elif read[0]==':' and (read[1]=='+' or read[1]=='-'):
|
||||
print(settime(read[1],read[2:]))
|
||||
else:
|
||||
if read[-1]=='?':
|
||||
if read[-1]=='?' and read[-2]==' ':
|
||||
print(search(read[:-2],1))
|
||||
elif read[-1]=='+':
|
||||
elif read[-1]=='+' and read[-2]==' ':
|
||||
print(renewal(read[:-2]))
|
||||
elif read[-1]=='-':
|
||||
elif read[-1]=='-' and read[-2]==' ':
|
||||
print(delete(read[:-2]))
|
||||
elif read[-1]=='~':
|
||||
elif read[-1]=='~' and read[-2]==' ':
|
||||
print(gameid(read[:-2]))
|
||||
elif read[-1]=='y' or read[-1]=='n':
|
||||
elif (read[-1]=='y' or read[-1]=='n') and read[-2]==' ':
|
||||
print(turn(read[:-2],read[-1]))
|
||||
else:
|
||||
print("无法识别的输入")
|
||||
BIN
res/README/MAA配置1.png
Normal file
|
After Width: | Height: | Size: 59 KiB |
BIN
res/README/MAA配置2.png
Normal file
|
After Width: | Height: | Size: 44 KiB |
BIN
res/README/MAA配置3.png
Normal file
|
After Width: | Height: | Size: 60 KiB |
BIN
res/README/MAA配置4.png
Normal file
|
After Width: | Height: | Size: 52 KiB |
BIN
res/README/gameid.png
Normal file
|
After Width: | Height: | Size: 35 KiB |
BIN
res/README/payid.png
Normal file
|
After Width: | Height: | Size: 746 KiB |
BIN
res/README/信息配置1.png
Normal file
|
After Width: | Height: | Size: 43 KiB |
BIN
res/README/信息配置10.png
Normal file
|
After Width: | Height: | Size: 93 KiB |
BIN
res/README/信息配置11.png
Normal file
|
After Width: | Height: | Size: 97 KiB |
BIN
res/README/信息配置12.png
Normal file
|
After Width: | Height: | Size: 94 KiB |
BIN
res/README/信息配置13.png
Normal file
|
After Width: | Height: | Size: 90 KiB |
BIN
res/README/信息配置14.png
Normal file
|
After Width: | Height: | Size: 96 KiB |
BIN
res/README/信息配置15.png
Normal file
|
After Width: | Height: | Size: 59 KiB |
BIN
res/README/信息配置2.png
Normal file
|
After Width: | Height: | Size: 51 KiB |
BIN
res/README/信息配置3.png
Normal file
|
After Width: | Height: | Size: 69 KiB |
BIN
res/README/信息配置4.png
Normal file
|
After Width: | Height: | Size: 73 KiB |
BIN
res/README/信息配置5.png
Normal file
|
After Width: | Height: | Size: 76 KiB |
BIN
res/README/信息配置6.png
Normal file
|
After Width: | Height: | Size: 85 KiB |
BIN
res/README/信息配置7.png
Normal file
|
After Width: | Height: | Size: 86 KiB |
BIN
res/README/信息配置8.png
Normal file
|
After Width: | Height: | Size: 92 KiB |
BIN
res/README/信息配置9.png
Normal file
|
After Width: | Height: | Size: 92 KiB |
7
run.py
@@ -47,12 +47,11 @@ def runmaa(tel,game,num=2):
|
||||
def updata(id):
|
||||
db=sqlite3.connect(DATABASE)
|
||||
cur=db.cursor()
|
||||
cur.execute("SELECT * FROM adminx WHERE admin='%s'" %(id))
|
||||
cur.execute("SELECT * FROM adminx WHERE admin=?",(id,))
|
||||
info=cur.fetchall()
|
||||
cur.execute("UPDATE adminx SET day=%d WHERE admin='%s'" %(info[0][2]-1,id))
|
||||
cur.execute("UPDATE adminx SET day=? WHERE admin=?",(info[0][2]-1,id))
|
||||
db.commit()
|
||||
cur.execute("UPDATE adminx SET last='%s' WHERE admin='%s'" %(curdate,id))
|
||||
print("upcurdate")
|
||||
cur.execute("UPDATE adminx SET last=? WHERE admin=?",(curdate,id))
|
||||
db.commit()
|
||||
cur.close()
|
||||
db.close()
|
||||
|
||||