Fixed zimuku provider protection bypass. #2334

pull/2342/head
morpheus65535 11 months ago
parent 7d14798e69
commit eaa77bd511

@ -20,7 +20,7 @@ from subzero.language import Language
from guessit import guessit
from requests import Session
from six import text_type
from random import randint
from random import randint, randrange
from python_anticaptcha import AnticaptchaClient, ImageToTextTask
from subliminal.providers import ParserBeautifulSoup
@ -109,7 +109,7 @@ class ZimukuProvider(Provider):
verify_token = ""
code = ""
location_re = re.compile(
r'self\.location = "(.*)" \+ stringToHex\(text\)')
r'self\.location = "(.*)" \+ stringToHex\(')
verification_image_re = re.compile(r'<img.*?src="data:image/bmp;base64,(.*?)".*?>')
def yunsuo_bypass(self, url, *args, **kwargs):
@ -139,7 +139,10 @@ class ZimukuProvider(Provider):
# mock js script logic
tr = self.location_re.findall(r.text)
verification_image = self.verification_image_re.findall(r.text)
if len(verification_image):
self.code = parse_verification_image(verification_image[0])
else:
self.code = f"{randrange(800, 1920)},{randrange(600, 1080)}"
self.session.cookies.set("srcurl", string_to_hex(r.url))
if tr:
verify_resp = self.session.get(

Loading…
Cancel
Save