dr_py icon indicating copy to clipboard operation
dr_py copied to clipboard

A webServer convert web and x5 movie sites to cms api data

Results 25 dr_py issues
Sort by recently updated
recently updated
newest added

比如:js:内置变量 input,html,VODS,VOD,TABS,LISTS,MY_CATE,MY_FL getProxyUrl的各个含义,以及用了JS如何打印log去查看

一、docker镜像虽然能运行,但是升级就会提示,代码错误,原因是镜像文件的升级代码仓库是以前弃用的,不能升级到最新版,然后docker不知道怎么使用更新代码`cd utils && wget https://ghproxy.liuzhicong.com/https://raw.githubusercontent.com/hjdhnx/dr_py/main/utils/update.py -O update.py `,有知道的大佬如果知道方法,忘告知,感激不尽。或者有大佬分享一个最新的docker镜像文件,谢谢。 `二、使用源码安装的时候,运行app.py提示Traceback (most recent call last): File "/var/local/drpyy/dr_py/app.py", line 7, in from flask.app import Flask File "/usr/local/lib/python3.9/dist-packages/flask/__init__.py", line 5, in from .app import...

live2cms.js可否支持读取本地的txt文件?比如以下这种: [ {"name": "饭太硬", "url": "./live.txt"} ]

写了代码不能执行,cms里也没接口调试这个功能

道长你好!我看不太懂嗅探方面的规则,希望可以指点一下!

搜索:'js:let d=[];pdfa=jsp.pdfa;pdfh=jsp.pdfh;pd=jsp.pd;let html=request(input);let baseList=pdfa(html,"body&&.result_item_v");baseList.forEach(function(it){let longText=pdfh(it,".result_title&&a&&Text");let shortText=pdfh(it,".type&&Text");let fromTag=pdfh(it,".result_source&&Text");let score=pdfh(it,".figure_info&&Text");let content=pdfh(it,".desc_text&&Text");let url=pdfh(it,".result_title&&a&&href");let img=pd(it,".figure_pic&&src");url="https://node.video.qq.com/x/api/float_vinfo2?cid="+url.match(/.*\\/(.*?)\\.html/)[1];log(shortText+"|"+url);if(fromTag.match(/腾讯/)){d.push({title:longText.split(shortText)[0],img:img,url:url,content:content,desc:shortText+" "+score})}});setResult(d);',

`Building wheels for collected packages: quickjs Building wheel for quickjs (setup.py): started Building wheel for quickjs (setup.py): finished with status 'error' error: subprocess-exited-with-error python setup.py bdist_wheel did not run successfully....

从Zyplayer的推荐过来的,但是下载之后不会使用,app.py运行报错cannot import name 'url_quote' from 'werkzeug.urls' ,想求大佬给个简单的使用步骤

A code execution vulnerability in `controllers.cms.CMS.searchContent` allows an attacker to unconditionally execute system commands. The relevant code is as follows. ```python if wd: # 搜索 if rule == 'drpy': print(f'准备单独处理聚合搜索:{wd}')...