3m水下和水上的金叉和死叉这个牛逼的很

#这个牛逼的很

import requests
from datetime import datetime, timedelta
import time
import hmac
import hashlib
import base64
import urllib.parse
import json

def send_dingtalk_message(webhook, secret, message):
    timestamp = str(round(time.time() * 1000))
    secret_enc = secret.encode('utf-8')
    string_to_sign = '{}\n{}'.format(timestamp, secret)
    string_to_sign_enc = string_to_sign.encode('utf-8')
    hmac_code = hmac.new(secret_enc, string_to_sign_enc, digestmod=hashlib.sha256).digest()
    sign = urllib.parse.quote_plus(base64.b64encode(hmac_code))
    webhook = '{}&timestamp={}&sign={}'.format(webhook, timestamp, sign)
    headers = {'Content-Type': 'application/json'}
    data = {"msgtype": "text", "text": {"content": message}}
    response = requests.post(url=webhook, headers=headers, data=json.dumps(data))
    print(response.text)

def get_klines(symbol, interval, limit=500):
    url = "https://fapi.binance.com/fapi/v1/klines"
    params = {'symbol': symbol, 'interval': interval, 'limit': limit}
    response = requests.get(url, params=params)
    return response.json()

def calculate_ema(prices, days, smoothing=2):
    ema = [sum(prices[:days]) / days]
    for price in prices[days:]:
        ema.append((price * (smoothing / (1 + days))) + ema[-1] * (1 - (smoothing / (1 + days))))
    return ema

def calculate_macd(symbol, interval):
    klines = get_klines(symbol, interval)
    close_prices = [float(kline[4]) for kline in klines]
    original_dates = [datetime.utcfromtimestamp(int(kline[0]) / 1000) for kline in klines]

    fast_ema = calculate_ema(close_prices, 6)
    slow_ema = calculate_ema(close_prices, 7)
    dates = original_dates[-len(slow_ema):]  # 调整dates以匹配slow_ema的长度
    macd_line = [f - s for f, s in zip(fast_ema[-len(slow_ema):], slow_ema)]
    signal_line = calculate_ema(macd_line, 4)
    dates = dates[-len(signal_line):]  # 再次调整dates以匹配signal_line的长度
    macd_line = macd_line[-len(signal_line):]  # 确保长度匹配

    crosses = []
    for i in range(1, len(signal_line)):
        if macd_line[i] > signal_line[i] and macd_line[i - 1] < signal_line[i - 1] and macd_line[i] < 0:
            crosses.append((dates[i] + timedelta(hours=8), '水下金叉预测上涨', macd_line[i]))
        elif macd_line[i] < signal_line[i] and macd_line[i - 1] > signal_line[i - 1] and macd_line[i] > 0:
            crosses.append((dates[i] + timedelta(hours=8), '水上死叉预测下跌', macd_line[i]))

    return crosses

def main():
    symbol = 'BTCUSDT'
    interval = '3m'
    sent_crosses = set()  # 使用集合来存储已发送的交叉点的时间戳

    while True:
        try:
            crosses = calculate_macd(symbol, interval)
            for cross in crosses[-1:]:
                last_cross_date, cross_type, dif_value = cross
                # 转换为简单的字符串格式以进行比较和存储
                cross_signature = f"{last_cross_date.strftime('%Y-%m-%d %H:%M:%S')}_{cross_type}"
                if cross_signature not in sent_crosses:
                    sent_crosses.add(cross_signature)  # 添加到已发送集合
                    message = f"{last_cross_date.strftime('%Y-%m-%d %H:%M:%S')} {cross_type} DIF数值: {dif_value:.4f} 穿越"
                    print(message)
                    # 发送钉钉消息
                    send_dingtalk_message(webhook_url, secret, message)
                else:
                    print("已发送过的交叉点,跳过。")
        except Exception as e:
            print(f"Error: {e}")
        time.sleep(2)  # 等待2秒再次检查

if __name__ == "__main__":
    webhook_url = "https://oapi.dingtalk.com/robot/send?access_token=8a6ddcf98d3b47c63333580bfe9d0bad55b17272eea05cc9c0af7f7be4de070d"
    secret = "你的秘钥"
    main()

最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
【社区内容提示】社区部分内容疑似由AI辅助生成,浏览时请结合常识与多方信息审慎甄别。
平台声明:文章内容(如有图片或视频亦包括在内)由作者上传并发布,文章内容仅代表作者本人观点,简书系信息发布平台,仅提供信息存储服务。

友情链接更多精彩内容