Commit 7ee4b71f authored by wang's avatar wang

开始按压验证码

parent 29b5bbba
......@@ -97,7 +97,7 @@ function createPX1132(hash, hash2, hashv) {
puzzleHelperVars: u,
targetHash: v
})
if (t){
if (t) {
console.log({
index: e,
puzzleHelperVars: u,
......@@ -250,7 +250,7 @@ function createPX11926() {
"PX11699": performanceNow(randomInt(100, 200)),
"PX12270": "true"
})
}else{
} else {
res.push({
"PX12343": "mouseover",
"PX11652": 1,
......@@ -280,107 +280,6 @@ function genPayload(uuid, vid, hash, hash2, hashv, token, ci, init_time) {
let startX = randomInt(820, 820 + 50);
let startY = randomInt(428, 428 + 30);
let startT = randomInt(40256, 40256 * 0.8);
let PX11547 = {
// canvas 相关
"PX12492": "78f763eab3a2082c63c66cf47f9e05a0",
"PX12570": "78f763eab3a2082c63c66cf47f9e05a0",
"PX11352": "e089aa3d700a35da7244dd4da7a68f9c",
"PX12292": "WebKit",
"PX11811": [],
"PX11567": "WebKit WebGL",
"PX12032": "WebGL 1.0 (OpenGL ES 2.0 Chromium)",
"PX11536": ["ANGLE_instanced_arrays", "EXT_blend_minmax", "EXT_color_buffer_half_float", "EXT_disjoint_timer_query", "EXT_float_blend", "EXT_frag_depth", "EXT_shader_texture_lod", "EXT_texture_compression_rgtc", "EXT_texture_filter_anisotropic", "EXT_sRGB", "KHR_parallel_shader_compile", "OES_element_index_uint", "OES_fbo_render_mipmap", "OES_standard_derivatives", "OES_texture_float", "OES_texture_float_linear", "OES_texture_half_float", "OES_texture_half_float_linear", "OES_vertex_array_object", "WEBGL_color_buffer_float", "WEBGL_compressed_texture_s3tc", "WEBGL_compressed_texture_s3tc_srgb", "WEBGL_debug_renderer_info", "WEBGL_debug_shaders", "WEBGL_depth_texture", "WEBGL_draw_buffers", "WEBGL_lose_context", "WEBGL_multi_draw"],
"PX12149": ["[1, 1]", "[1, 64]", 8, "yes", 8, 24, 8, 16, 32, 16384, 1024, 16384, 16, 16384, 31, 16, 16, 1024, "[16384, 16384]", "no_fp", 23, 127, 127, 23, 127, 127, 23, 127, 127, 23, 127, 127, 23, 127, 127, 23, 127, 127, 23, 127, 127, 23, 127, 127, 23, 127, 127, 23, 127, 127, 23, 127, 127, 23, 127, 127],
"PX12352": "Google Inc. (Apple)",
"PX11455": "ANGLE (Apple, Apple M1 Max, OpenGL 4.1)",
"PX11534": "WebGL GLSL ES 1.0 (OpenGL ES GLSL ES 1.0 Chromium)",
"PX12503": "d9153fa5509ac1e988e36776dd8d598a",
"PX12502": "32fe0262ba56767dfd83466855e47bec",
"PX11927": "a02e9e2368744e62770d4a78862f75fa",
"PX12572": "7ec700f02277463745cc71774c12c8aa",
"PX11477": "126.8696939282454",
"PX12109": "b908567e93d9ed24c036da7986349e97",
"PX12362": "155544ea72c7d7c945942b868512c4bf", // m.storage.estimate()
"PX12491": "7523bf6e5dcadcffdae6b3063827e345",
"PX11386": ["webdriver"],
"PX12525": "c18d06246c690fb8ad9b48da91f15244",
"PX12526": "dce55f9ff67647ad6cebc7ee410e4b00",
"PX11948": 1,
"PX11685": 10,
"PX11986": true,
"PX12299": true,
"PX12331": true,
"PX11316": false,
"PX11448": true,
"PX12196": "missing",
"PX12427": ["_pxVid", "_pxUuid", "_pxAppId", "_pxHostUrl", "_pxCustomLogo", "_pxJsClientSrc", "_pxFirstPartyEnabled", "_pxDisplayErrorMessage", "_pxToggleOpenForm", "_pxUuidCopyToClipboard", "_pxSubmitForm", "_pxItemSelected", "_pxAction", "_pxMobile", "_Vb73hTEghandler", "_pxInit"],
"PX11842": [],
"PX12439": ["PDF Viewer::Portable Document Format::application/pdf~pdf::text/pdf~pdf", "Chrome PDF Viewer::Portable Document Format::application/pdf~pdf::text/pdf~pdf", "Chromium PDF Viewer::Portable Document Format::application/pdf~pdf::text/pdf~pdf", "Microsoft Edge PDF Viewer::Portable Document Format::application/pdf~pdf::text/pdf~pdf", "WebKit built-in PDF::Portable Document Format::application/pdf~pdf::text/pdf~pdf"],
"PX11993": Date.now() + '',
"PX12228": "TypeError: Cannot read properties of null (reading '0') at Be (https://client.perimeterx.net/PXVb73hTEg/main.min.js:855:13) at func (https://client.perimeterx.net/PXVb73hTEg/main.min.js:4925:19) at Ee (https://client.perimeterx.net/PXVb73hTEg/main.min.js:903:13) at https://client.perimeterx.net/PXVb73hTEg/main.min.js:5097:13",
"PX12288": true,
"PX12446": 33,
"PX12236": "fd7149bbfb316699ef918fa7bb7510a8",
"PX11309": "d41d8cd98f00b204e9800998ecf8427e",
"PX11551": "fd7149bbfb316699ef918fa7bb7510a8",
"PX12586": 1,
"PX11843": 1920,
"PX11781": 1080,
"PX12121": 1920,
"PX12387": "1920X1080",
"PX11380": 24,
"PX12003": 24,
"PX12128": 1055,
"PX11849": "",
"PX11583": "en-US",
"PX12458": "MacIntel",
"PX11754": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36",
"PX11681": ["en-US", "en", "zh-CN", "ru"],
"PX12037": true,
"PX11621": 8,
"PX11390": -480,
"PX11678": false,
"PX11840": new Date() + '',
"PX11540": true,
"PX11539": "",
"PX11555": 4294705152,
"PX12527": "3207084bd110f1ac964863e23aa78e04",
"PX11484": [],
"PX12501": md5(vid),
"PX11902": 3,
"PX11560": performanceNow(0),
"PX11719": true,
"PX12280": Date.now() - parseInt(Math.random() * 500 + 2000),
"PX11496": uuid,
"PX12564": null,
"PX12565": -1,
"PX11379": false,
"PX12307": "PX11745",
"PX11668": "pxhc",
"PX12348": false,
"PX11645": "https://booking.flyfrontier.com/Flight/Select"
};
let PX12123 = {
"PX12108": startX,
"PX12414": startY,
"PX11984": "TypeError: Cannot read properties of null (reading '0')\n at Be (https://client.perimeterx.net/PXVb73hTEg/main.min.js:855:13)\n at Dc (https://client.perimeterx.net/PXVb73hTEg/main.min.js:3100:101)\n at https://client.perimeterx.net/PXVb73hTEg/main.min.js:3110:13\n at HTMLBodyElement.$C_bSE (https://captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=e3b0b7b4-461f-11ee-a066-62465543537a&v=&m=0:1854:29)",
"PX12303": "mouseover",
"PX11699": startT,
"PX11987": "true",
"PX12461": true,
"PX11652": "#px-captcha-wrapper>DIV:nth-child(1)>DIV:nth-child(2)",
"PX11902": 4,
"PX11560": performanceNow(randomInt(2000, 3000)),
"PX11719": true,
"PX12280": Date.now() - parseInt(Math.random() * 500 + 2000),
"PX11496": uuid,
"PX12564": null,
"PX12565": -1,
"PX11379": false,
"PX12307": "PX11745",
"PX11668": "pxhc",
"PX12348": false
}
;
let PX11945 = parseFloat((287.17 + Math.random() * 10).toFixed(2));
let PX12174 = parseFloat((21.32 + Math.random() * 3).toFixed(2));
......@@ -392,7 +291,7 @@ function genPayload(uuid, vid, hash, hash2, hashv, token, ci, init_time) {
"PX11933": true,
"PX11454": "visible",
"PX12099": "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",
"PX11699": performanceNow(randomInt(10,20)),
"PX11699": performanceNow(randomInt(10, 20)),
"PX1133": 479975.60000002384,
// "PX1132": "9070627c1aacaba969ef060613099afeba063d308a0f2cce94d09c4cb0e7c90d",
"PX1132": createPX1132(hash, hash2, hashv),
......@@ -485,7 +384,7 @@ function genPayload(uuid, vid, hash, hash2, hashv, token, ci, init_time) {
"PX11933": true,
"PX11454": "visible",
"PX12099": "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",
"PX11699": performanceNow(randomInt(10,20)),
"PX11699": performanceNow(randomInt(10, 20)),
"PX755": ci,
"PX12057": "pxCaptcha",
"PX11490": "www.flyfrontier.com",
......@@ -565,14 +464,8 @@ function genPayload(uuid, vid, hash, hash2, hashv, token, ci, init_time) {
"PX11668": "pxhc",
"PX12348": false
};
let data = [{
"t": "PX11547",
"d": PX11547
}, {
"t": "PX12123",
"d": PX12123
}, {
let data = [
{
"t": "PX561",
"d": PX561
}, {
......
......@@ -9,19 +9,19 @@
</head>
<body>
<script>
window._pxVid = 'dda98c53-88fe-11ee-b1d0-462e4e6aaa17';
window._pxUuid = '304283c8-4d90-49cd-84b3-39b091404f5c';
window._pxVid = '';
window._pxUuid = '6d650541-8ab1-11ee-bff9-5ba7b1e8c527';
window._pxAppId = 'PXVb73hTEg';
window._pxHostUrl = 'https://collector-PXVb73hTEg.perimeterx.net';
window._pxCustomLogo = '';
window._pxJsClientSrc = '//client.perimeterx.net/PXVb73hTEg/main.min.js';
window._pxFirstPartyEnabled = 'false';
var script = document.createElement('script');
script.src = '//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=304283c8-4d90-49cd-84b3-39b091404f5c&v=dda98c53-88fe-11ee-b1d0-462e4e6aaa17&m=0';
script.src = '//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=6d650541-8ab1-11ee-bff9-5ba7b1e8c527&v=&m=0';
document.head.appendChild(script);
script.onerror = function () {
script = document.createElement('script');
script.src = 'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=304283c8-4d90-49cd-84b3-39b091404f5c&v=dda98c53-88fe-11ee-b1d0-462e4e6aaa17&m=0';
script.src = 'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=6d650541-8ab1-11ee-bff9-5ba7b1e8c527&v=&m=0';
script.onerror = window._pxDisplayErrorMessage;
document.head.appendChild(script);
};
......
This diff is collapsed.
This diff is collapsed.
This diff is collapsed.
......@@ -13,14 +13,14 @@ import execjs
import requests
import tls_client
from loguru import logger
from env import PxEnv
from utils import PxUtils
with open('js/encodepayload.js', 'r', encoding='utf-8') as f:
jsCode = f.read()
ctx = execjs.compile(jsCode)
ctxPC = execjs.compile(open('pc.js').read())
ctxStep2 = execjs.compile(open('step2.js').read())
# with open('js/encodepayload.js', 'r', encoding='utf-8') as f:
# jsCode = f.read()
# # ctx = execjs.compile(jsCode)
# # ctxPC = execjs.compile(open('pc.js').read())
# ctxStep2 = execjs.compile(open('step2.js').read())
def get_timestamp():
......@@ -67,7 +67,7 @@ class PxBypass():
prox = 'http://user-uni001-region-us-sessid-1111-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
# prox = 'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:9000'
prox = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
# prox = 'http://127.0.0.1:7890'
prox = 'http://127.0.0.1:7890'
session.proxies = {
'http': prox,
'https': prox,
......@@ -169,10 +169,11 @@ class PxBypass():
self._token()
def _init(self):
cks = '_px2=eyJ1IjoiOGRjYjQ3NjAtODl2jYi0xMWVlLTkwMmUtODE4MTcxMjRjOTBlIiwidiI6IjhlOGIyMGMzLTg5Y2ItMTFlZS05YWI1LTAwMjc4Njk4ZmY1ZiIsInQiOjYyMDIzMzg4MDAwNCwiaCI6Ijk4NjYzMWNkZDBmNTBjMWE5NjZjYjgwOGNlNzFjYTJkMWNkYzc2MjdjYTc4MTBlZDVhODdmN2FiMzYzOGU1OTgifQ==; pxcts=8e8b30eb-89cb-11ee-9ab5-ccabb13183c7; _px2=eyJ1IjoiOGRjYjQ3NjAtODljYi0xMWVlLTkwMmUtODE4MTcxMjRjOTBlIiwidiI6IjhlOGIyMGMzLTg5Y2ItMTFlZS05YWI1LTAwMjc4Njk4ZmY1ZiIsInQiOjYyMDIzMzg4MDAwNCwiaCI6Ijk4NjYzMWNkZDBmNTBjMWE5NjZjYjgwOGNlNzFjYTJkMWNkYzc2MjdjYTc4MTBlZDVhODdmN2FiMzYzOGU1OTgifQ=='
res = self.session.get(
self.target_url,
# 'https://booking.flyfrontier.com/Flight/InternalSelect?o1=DEN&d1=LAS&dd1=2023-11-30&ADT=1&umnr=false&mon=true',
# self.target_url,
'https://booking.flyfrontier.com/Flight/InternalSelect?o1=DEN&d1=LAS&dd1=2023-11-30&ADT=1&umnr=false&mon=true',
headers={
"authority": "www.flyfrontier.com",
"accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7",
......@@ -187,6 +188,7 @@ class PxBypass():
"sec-fetch-site": "none",
"sec-fetch-user": "?1",
"upgrade-insecure-requests": "1",
'cookie': cks,
"user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36",
}, allow_redirects=False)
self.log.info(f"初始化请求 res {res.status_code}")
......@@ -194,8 +196,8 @@ class PxBypass():
for k, v in self.session.cookies.items():
self.params[k] = v
self.log.info(f"init cookie {self.params}")
# with open('index.html', 'w') as f:
# f.write(res.text)
with open('index.html', 'w') as f:
f.write(res.text)
def _uuid(self):
# return str(uuid.uuid4())
......@@ -373,11 +375,15 @@ class PxBypass():
self.log.info(self.uuid)
self.log.info(f'performanceNow {self.performanceNow}')
# sid, vid,ts, num1 ,num2,str1, uuid
data_str = ctxStep2.call('genPayload2', self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
# data_str = ctxStep2.call('genPayload2', self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
# self.str1, self.uuid,
# self.startTs, self.startTs2, self.performanceNow, self.px12280, nn)
# data_str =
# data = json.loads(data_str)
p = PxEnv(self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
self.str1, self.uuid,
self.startTs, self.startTs2, self.performanceNow, self.px12280, nn)
data = json.loads(data_str)
self.startTs, self.startTs2, self.performanceNow, self.px12280)
data = [p.get_px11590()]
# data_str2 = ctxStep2.call('genPayload3', self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
# self.str1, self.uuid,
# self.startTs, self.startTs2, nn)
......@@ -423,11 +429,14 @@ class PxBypass():
# sid, vid,ts, num1 ,num2,str1, uuid
# genPayload4(url, sid, vid, ts, num1, num2, str1, uuid, startTs, startTs2, performanceNow, px11280, n)
data_str = ctxStep2.call('genPayload4', self.target_url, self.sid, self.vid, self.ts, self.num1,
self.num2,
self.str1, self.uuid,self.startTs, self.startTs2, self.performanceNow, self.px12280)
self.do_collector(data_str)
# data_str = ctxStep2.call('genPayload4', self.target_url, self.sid, self.vid, self.ts, self.num1,
# self.num2,
# self.str1, self.uuid,self.startTs, self.startTs2, self.performanceNow, self.px12280)
p = PxEnv(self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
self.str1, self.uuid,
self.startTs, self.startTs2, self.performanceNow, self.px12280)
data = [p.get_px12123(), p.get_px11891(), p.get_px11547()]
self.do_collector(data)
def parse_resp(self, resp):
if 'ob' in resp:
......
......@@ -4862,7 +4862,11 @@ function createPx2(t, e) {
function createPx1(t) {
t = "" + t;
for (var e, n = 0, r = 0; r < t.length; r++) {
n = (n << 5) - n + t.charCodeAt(r), n |= 0;
console.log(n, t.charCodeAt(r))
n = (n << 5) - n + t.charCodeAt(r);
n |= 0;
console.log(r,n )
}
return e = n, (e |= 0) < 0 && (e += 4294967296), e.toString(16);
}
......@@ -5671,7 +5675,7 @@ function genPayload4(url, sid, vid, ts, num1, num2, str1, uuid, startTs, startTs
}
// startTs2 PX11280
console.log(genPayload4('https://www.flyfrontier.com/',
console.log(genPayload2('https://www.flyfrontier.com/',
sid, vid, ts, num1, num2, str1, uuid
, 1700552863875, 1700464712550
......
......@@ -60,13 +60,10 @@ a2 = "KysrKytSHj0SGlAeUVFSHgcbKFMrCA0LLBg3GjgmLxUvJTcWLCY7UiwbUhovNTQOLjUnFSw1Mx
a2 = "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"
a2 = "WVkHBwdZFDcYEFoUW1tYFA0RIlkhAgcBMRIuBSYvMVsxPCEcJywyBScrWBAlPz4EJD8tXSYsAxwyPz4DJzwmBSUSIgExPD0fIQEfAQwBIV4hBSUQMgI6BTEFJgUkPA9aMgIPHCU8LgQyO1kAJzw5XSQ8JgEyLAwDJi8yATI8AAAmASEbIQY5AScCLVslLClYJTwtWyUsMVglLD0bIQUPAScBIgQmAjkSJgIPXTFaJRAxEi4AMRILXCUsPVwlEiFbJiwtEicvJgUlWiYDMiwyAiY8IV0xPAQAMgU5XCc8BAElWi0RJjwyAyYsKgIxPC1bJiwlWiZaMgAhBlhVFBwaHQ0UW1hYFhYWFgdZB1lZWRQLHRYWFhYHWVkHWVlZBxRFWQ=="
a2 = 'WVkHBwdZFDcYEFoUW1tYFA0RIlkhAgcBJy86AjECOVsmAikcJywEAjEBWBAlPz4EJDwDHyUFPRwnLC1cJTwLECUCOgInPCoEIQEfAQwBIV4hAg8SJRIDXSUvMgEkPAAAMTwPHCU8LgQyO1kBJSwlWyQ8Cx8mWjIDJQILESc8OgQyKyEbIQY5AScCLVslLClcJTwDEic8OVwlAgsbIQUPAScBIgImBTlbJRILHyUFMgUnPy1dMTwtECUSC1wlPCICMQU6AjE/OREnPDkRJywmBCUSORInLAwEMRIAADECMRAxPDldJgU5XCc8CxExAg9YJTwyBTESLRIhBlhVFBwaHQ0UW1hYFhYWFgdZWQdZWVkHFEVZFhYWFgdZB1lZWRQLHQ=='
# a2 = "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"
# 0III0I00 判断是否通过
b2 = base64.b64decode(a2.encode())
for i in bytes(encrypt(b2, 872%128)).decode().split('~~~~'):
print('o11o111o'in i, i)
......
......@@ -9,7 +9,7 @@ session = tls_client.Session(client_identifier='chrome_112')
prox = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
# prox = 'http://user-uni001-region-us-sessid-1111-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
cks = '_pxvid=8e8b20c3-89cb-11ee-9ab5-00278698ff5f; pxcts=8e8b30eb-89cb-11ee-9ab5-ccabb13183c7; _px2=eyJ1IjoiOGRjYjQ3NjAtODljYi0xMWVlLTkwMmUtODE4MTcxMjRjOTBlIiwidiI6IjhlOGIyMGMzLTg5Y2ItMTFlZS05YWI1LTAwMjc4Njk4ZmY1ZiIsInQiOjYyMDIzMzg4MDAwNCwiaCI6Ijk4NjYzMWNkZDBmNTBjMWE5NjZjYjgwOGNlNzFjYTJkMWNkYzc2MjdjYTc4MTBlZDVhODdmN2FiMzYzOGU1OTgifQ==; pxcts=8e8b30eb-89cb-11ee-9ab5-ccabb13183c7; _px2=eyJ1IjoiOGRjYjQ3NjAtODljYi0xMWVlLTkwMmUtODE4MTcxMjRjOTBlIiwidiI6IjhlOGIyMGMzLTg5Y2ItMTFlZS05YWI1LTAwMjc4Njk4ZmY1ZiIsInQiOjYyMDIzMzg4MDAwNCwiaCI6Ijk4NjYzMWNkZDBmNTBjMWE5NjZjYjgwOGNlNzFjYTJkMWNkYzc2MjdjYTc4MTBlZDVhODdmN2FiMzYzOGU1OTgifQ=='
cks = '_px2=eyJ1IjoiOGRjYjQ3NjAt1ODljYi011xMWVlLTkwMmUtODE4MTcxMjRjOTBlIiwidiI6IjhlOGIyMGMzLTg5Y2ItMTFlZS05YWI1LTAwMjc4Njk4ZmY1ZiIsInQiOjYyMDIzMzg4MDAwNCwiaCI6Ijk4NjYzMWNkZDBmNTBjMWE5NjZjYjgwOGNlNzFjYTJkMWNkYzc2MjdjYTc4MTBlZDVhODdmN2FiMzYzOGU1OTgifQ==; pxcts=8e8b30eb-89cb-11ee-9ab5-ccabb13183c7; _px2=eyJ1IjoiOGRjYjQ3NjAtODljYi0xMWVlLTkwMmUtODE4MTcxMjRjOTBlIiwidiI6IjhlOGIyMGMzLTg5Y2ItMTFlZS05YWI1LTAwMjc4Njk4ZmY1ZiIsInQiOjYyMDIzMzg4MDAwNCwiaCI6Ijk4NjYzMWNkZDBmNTBjMWE5NjZjYjgwOGNlNzFjYTJkMWNkYzc2MjdjYTc4MTBlZDVhODdmN2FiMzYzOGU1OTgifQ=='
......@@ -46,3 +46,5 @@ response = response.json()
print(response)
print(response['status_code'])
print(response['text'])
with open('index.html', 'w') as f:
f.write(response['text'])
\ No newline at end of file
......@@ -6,6 +6,12 @@ from urllib.parse import quote, unquote
def wv(t, e, n, r, o):
return math.floor(((t - e) / (n - e)) * (o - r) + r)
def left_shift(based, counter):
val = based << (counter % 32)
maxint = 2147483647
if not -maxint - 1 <= val <= maxint:
val = (val + (maxint + 1)) % (2 * (maxint + 1)) - maxint - 1
return val
class PxUtils():
......@@ -85,3 +91,6 @@ if __name__ == '__main__':
payload = '[{"t":"PX12095","d":{"PX11645":"https://www.flyfrontier.com/","PX12207":0,"PX12458":"MacIntel","PX11902":0,"PX11560":4769,"PX12248":3600,"PX11385":1700553697276,"PX12280":1700553697286,"PX11496":"31fafcb0-8844-11ee-8d49-97ed9bc8f96f","PX12564":null,"PX12565":-1,"PX11379":false}}]'
uuid = '31fafcb0-8844-11ee-8d49-97ed9bc8f96f'
print(p.encode_payload(payload, uuid))
t = 'url, sid, vid, ts, num1, num2, str1, uuid, startTs, startTs2, performanceNow, px11280'
for i in t.split(', '):
print(f'self.{i} = {i}')
\ No newline at end of file
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment