1.购买服务器阿里云:服务器购买地址https://t.aliyun.com/U/DT4XYh若失效,可用地址
阿里云:
服务器购买地址
https://t.aliyun.com/U/DT4XYh若失效,可用地址
https://www.aliyun.com/activity/wuying/dj?source=5176.29345612&userCode=49hts92d腾讯云:
https://curl.qcloud.com/wJpWmSfU若失效,可用地址
https://cloud.tencent.com/act/cps/redirect?redirect=2446&cps_key=ad201ee2ef3b771157f72ee5464b1fea&from=console华为云
https://activity.huaweicloud.com/cps.html?fromacct=64b5cf7cc11b4840bb4ed2ea0b2f4468&utm_source=V1g3MDY4NTY=&utm_medium=cps&utm_campaign=2019052.部署教程
3.代码如下
#!/usr/bin/env python3import timeimport osimport randomimport jsonimport base64import hashlibimport rsaimport requestsimport refrom urllib.parse import urlparse# 常量定义BI_RM = list("0123456789abcdefghijklmnopqrstuvwxyz")B64MAP = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"def mask_phone(phone):"""隐藏手机号中间四位:param phone: 手机号字符串:return: 隐藏后的手机号,如138****1234"""return phone[:3] + "****" + phone[-4:] if len(phone) == 11 else phonedef int2char(a):"""将数字转换为对应的字符:param a: 0-35的数字:return: 对应的字符"""return BI_RM[a]def b64tohex(a):"""Base64字符串转换为十六进制字符串:param a: Base64编码的字符串:return: 十六进制字符串"""d = ""e = 0c = 0for i in range(len(a)):if list(a)[i] != "=":v = B64MAP.index(list(a)[i])if 0 == e:e = 1d += int2char(v >> 2)c = 3 & velif 1 == e:e = 2d += int2char(c << 2 | v >> 4)c = 15 & velif 2 == e:e = 3d += int2char(c)d += int2char(v >> 2)c = 3 & velse:e = 0d += int2char(c << 2 | v >> 4)d += int2char(15 & v)if e == 1:d += int2char(c << 2)return ddef rsa_encode(j_rsakey, string):"""使用RSA公钥加密字符串:param j_rsakey: RSA公钥:param string: 需要加密的字符串:return: 加密后的字符串"""rsa_key = f"-----BEGIN PUBLIC KEY-----\n{j_rsakey}\n-----END PUBLIC KEY-----"pubkey = rsa.PublicKey.load_pkcs1_openssl_pem(rsa_key.encode())result = b64tohex((base64.b64encode(rsa.encrypt(f'{string}'.encode(), pubkey))).decode())return resultdef login(username, password):"""登录天翼云盘:param username: 用户名:param password: 密码:return: 登录成功的session对象,失败返回None"""print(" 正在执行登录流程...")session = requests.Session()try:# 获取登录令牌url_token = "https://m.cloud.189.cn/udb/udb_login.jsp?pageId=1&pageKey=default&clientType=wap&redirectURL=https://m.cloud.189.cn/zhuanti/2021/shakeLottery/index.html"response = session.get(url_token)match = re.search(r"https?://[^\s'\"]+", response.text)if not match:print(" 错误:未找到动态登录页")return None# 获取登录页面url = match.group()response = session.get(url)match = re.search(r"<a id=\"j-tab-login-link\"[^>]*href=\"([^\"]+)\"", response.text)if not match:print(" 错误:登录入口获取失败")return None# 解析登录参数href = match.group(1)response = session.get(href)captcha_token = re.findall(r"captchaToken' value='(.+?)'", response.text)[0]lt = re.findall(r'lt = "(.+?)"', response.text)[0]return_url = re.findall(r"returnUrl= '(.+?)'", response.text)[0]param_id = re.findall(r'paramId = "(.+?)"', response.text)[0]j_rsakey = re.findall(r'j_rsaKey" value="(\S+)"', response.text, re.M)[0]session.headers.update({"lt": lt})# RSA加密用户名和密码username_encrypted = rsa_encode(j_rsakey, username)password_encrypted = rsa_encode(j_rsakey, password)# 准备登录数据data = {"appKey": "cloud","accountType": '01',"userName": f"{{RSA}}{username_encrypted}","password": f"{{RSA}}{password_encrypted}","validateCode": "","captchaToken": captcha_token,"returnUrl": return_url,"mailSuffix": "@189.cn","paramId": param_id}headers = {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:74.0) Gecko/20100101 Firefox/76.0','Referer': 'https://open.e.189.cn/',}# 提交登录请求response = session.post("https://open.e.189.cn/api/logbox/oauth2/loginSubmit.do",data=data,headers=headers,timeout=10)# 检查登录结果if response.json().get('result', 1) != 0:print(f" 登录错误:{response.json().get('msg')}")return None# 跳转到返回URL完成登录session.get(response.json()['toUrl'])print(" 登录成功")return sessionexcept Exception as e:print(f" 登录异常:{str(e)}")return Nonedef send_wxpusher(msg):"""发送消息到WxPusher:param msg: 要发送的消息内容"""# 从环境变量获取WxPusher配置app_token = os.getenv("WXPUSHER_APP_TOKEN")uids = os.getenv("WXPUSHER_UID", "").split('&')if not app_token or not uids:print(" 未配置WxPusher,跳过消息推送")returnurl = "https://wxpusher.zjiecode.com/api/send/message"headers = {"Content-Type": "application/json"}for uid in uids:data = {"appToken": app_token,"content": msg,"contentType": 3, # 3表示HTML格式"topicIds": [],"uids": [uid],}try:response = requests.post(url, json=data, headers=headers, timeout=10)if response.json().get('code') == 1000:print(f" 消息推送成功 -> UID: {uid}")else:print(f" 消息推送失败:{response.text}")except Exception as e:print(f" 推送异常:{str(e)}")def main():"""主函数:处理所有账号的签到和抽奖"""print("\n=============== 天翼云盘签到开始 ===============")# 从环境变量获取账号信息usernames = os.getenv("ty_username", "").split('&')passwords = os.getenv("ty_password", "").split('&')# 检查环境变量if not usernames or not passwords or not usernames[0] or not passwords[0]:print(" 请设置环境变量 ty_username 和 ty_password")return# 确保账号密码数量匹配if len(usernames) != len(passwords):print(" 账号和密码数量不匹配")return# 组合账号信息accounts = [{"username": u, "password": p} for u, p in zip(usernames, passwords)]all_results = []for acc in accounts:username = acc["username"]password = acc["password"]masked_phone = mask_phone(username)account_result = {"username": masked_phone, "sign": "", "lottery": ""}print(f"\n 处理账号:{masked_phone}")# 登录流程session = login(username, password)if not session:account_result["sign"] = " 登录失败"all_results.append(account_result)continue# 签到流程try:# 每日签到rand = str(round(time.time() * 1000))sign_url = f'https://api.cloud.189.cn/mkt/userSign.action?rand={rand}&clientType=TELEANDROID&version=8.6.3&model=SM-G930K'headers = {'User-Agent': 'Mozilla/5.0 (Linux; Android 5.1.1; SM-G930K Build/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/74.0.3729.136 Mobile Safari/537.36 Ecloud/8.6.3 Android/22 clientId/355325117317828 clientModel/SM-G930K imsi/460071114317824 clientChannelId/qq proVersion/1.0.6',"Referer": "https://m.cloud.189.cn/zhuanti/2016/sign/index.jsp?albumBackupOpened=1","Host": "m.cloud.189.cn",}response = session.get(sign_url, headers=headers).json()if 'isSign' in response:if response.get('isSign') == "false":account_result["sign"] = f" +{response.get('netdiskBonus', '0')}M"else:account_result["sign"] = f" 已签到+{response.get('netdiskBonus', '0')}M"else:account_result["sign"] = f" 签到失败: {response.get('errorMsg', '未知错误')}"# 单次抽奖time.sleep(random.randint(2, 5))lottery_url = 'https://m.cloud.189.cn/v2/drawPrizeMarketDetails.action?taskId=TASK_SIGNIN&activityId=ACT_SIGNIN'response = session.get(lottery_url, headers=headers).json()if "errorCode" in response:account_result["lottery"] = f" {response.get('errorCode')}"else:prize = response.get('prizeName') or response.get('description', '未知奖品')account_result["lottery"] = f" {prize}"except Exception as e:account_result["sign"] = " 操作异常"account_result["lottery"] = f" {str(e)}"all_results.append(account_result)print(f" {account_result['sign']} | {account_result['lottery']}")# 生成汇总表格table = "### 天翼云盘签到汇总\n\n"table += "| 账号 | 签到结果 | 每日抽奖 |\n"table += "|:-:|:-:|:-:|\n"for res in all_results:table += f"| {res['username']} | {res['sign']} | {res['lottery']} |\n"# 发送汇总推送send_wxpusher(table)print("\n 所有账号处理完成!")if __name__ == "__main__":main()
解析
该脚本为天翼云盘签到脚本,主要作用包括:
支持多账号(环境变量
ty_username、ty_password用&分隔)自动:登录天翼云盘(模拟 WAP/开放平台登录流程,用户名与密码 RSA 加密)
调用签到接口领取网盘容量奖励
调用抽奖接口参与"每日一次"抽奖
通过 WxPusher 推送各账号签到/抽奖汇总结果(Markdown 表格)
关键环境变量
ty_username:手机号登录名,多个以&分隔ty_password:对应密码,多个以&分隔(数量必须与用户名对齐)WXPUSHER_APP_TOKEN、WXPUSHER_UID:用于推送(UID 可多个,用&分隔)
主要方法
mask_phone(phone)
将 11 位手机号中间 4 位打码,便于日志/推送中脱敏展示。int2char(a)/b64tohex(a)
为 RSA 加密后的 Base64 串做自定义"Base64→伪十六进制"转换的工具函数(配合目标站登录参数格式)。rsa_encode(j_rsakey, string)
用页面下发的 RSA 公钥(j_rsakey)对用户名/密码加密:组装 PEM 公钥
rsa.encrypt→ Base64b64tohex转换为目标站需要的提交格式login(username, password)
登录流程:访问入口页,跟随重定向拿真实登录页
从登录页解析
captchaToken、lt、returnUrl、paramId、j_rsaKey等动态参数用
rsa_encode分别加密用户名与密码,按要求加上{RSA}前缀向
loginSubmit.do提交登录数据,结果为 0 视为成功,再跳转toUrl完成会话建立
— 返回可用的requests.Session;失败返回Nonesend_wxpusher(msg)
读取WXPUSHER_APP_TOKEN和WXPUSHER_UID(可多个),循环向每个 UID 推送消息,contentType=3(HTML/Markdown 适配)。main()(总控)login()成功则继续签到:GET
userSign.action(带随机时间戳与 Android UA);解析isSign、netdiskBonus抽奖:GET
drawPrizeMarketDetails.action?taskId=TASK_SIGNIN&activityId=ACT_SIGNIN记录每个账号的"签到结果/抽奖结果"
解析多账号环境变量并校验一一对应
逐账号执行:
生成 Markdown 汇总表格,调用
send_wxpusher推送控制台打印整体处理完成
依赖与运行
依赖:
requests、rsa(脚本里也用到了re、base64等标准库)安装:
pip install requests rsa青龙 cron 示例:
30 4 * * *支持"多账号"并发顺序执行(非多线程)
异常与风控提示
若出现图形验证码:需要网页端手动登录一次并等待风控解除。
登录流程高度依赖页面结构与参数名(
lt、paramId、j_rsaKey等);若官方改版需同步调整解析正则。请求 UA、
clientType/version/model等参数用于模拟官方 App/端行为,异常时可适度更新。
注意:
本文部分变量已做脱敏处理,仅用于测试和学习研究,禁止用于商业用途,不能保证其合法性,准确性,完整性和有效性,请根据情况自行判断。技术层面需要提供帮助,可以通过打赏的方式进行探讨。
【相关文章】
没有评论:
发表评论