|
|
@ -0,0 +1,92 @@ |
|
|
|
# coding: utf-8 |
|
|
|
from __future__ import unicode_literals |
|
|
|
|
|
|
|
import re |
|
|
|
|
|
|
|
from .common import InfoExtractor |
|
|
|
from ..compat import compat_chr |
|
|
|
from ..utils import encode_base_n |
|
|
|
|
|
|
|
|
|
|
|
class OpenloadIE(InfoExtractor): |
|
|
|
_VALID_URL = r'https://openload.co/f/(?P<id>[a-zA-Z0-9]+)' |
|
|
|
|
|
|
|
_TEST = { |
|
|
|
'url': 'https://openload.co/f/kUEfGclsU9o', |
|
|
|
'md5': 'bf1c059b004ebc7a256f89408e65c36e', |
|
|
|
'info_dict': { |
|
|
|
'id': 'kUEfGclsU9o', |
|
|
|
'ext': 'mp4', |
|
|
|
'title': 'skyrim_no-audio_1080.mp4', |
|
|
|
}, |
|
|
|
} |
|
|
|
|
|
|
|
@staticmethod |
|
|
|
def openload_level2_debase(m): |
|
|
|
radix, num = int(m.group(1)) + 27, int(m.group(2)) |
|
|
|
return '"' + encode_base_n(num, radix) + '"' |
|
|
|
|
|
|
|
@classmethod |
|
|
|
def openload_level2(cls, txt): |
|
|
|
# The function name is ǃ \u01c3 |
|
|
|
# Using escaped unicode literals does not work in Python 3.2 |
|
|
|
return re.sub(r'ǃ\((\d+),(\d+)\)', cls.openload_level2_debase, txt, re.UNICODE).replace('"+"', '') |
|
|
|
|
|
|
|
# Openload uses a variant of aadecode |
|
|
|
# openload_decode and related functions are originally written by |
|
|
|
# vitas@matfyz.cz and released with public domain |
|
|
|
# See https://github.com/rg3/youtube-dl/issues/8489 |
|
|
|
@classmethod |
|
|
|
def openload_decode(cls, txt): |
|
|
|
symbol_table = [ |
|
|
|
('_', '(゚Д゚) [゚Θ゚]'), |
|
|
|
('a', '(゚Д゚) [゚ω゚ノ]'), |
|
|
|
('b', '(゚Д゚) [゚Θ゚ノ]'), |
|
|
|
('c', '(゚Д゚) [\'c\']'), |
|
|
|
('d', '(゚Д゚) [゚ー゚ノ]'), |
|
|
|
('e', '(゚Д゚) [゚Д゚ノ]'), |
|
|
|
('f', '(゚Д゚) [1]'), |
|
|
|
|
|
|
|
('o', '(゚Д゚) [\'o\']'), |
|
|
|
('u', '(o゚ー゚o)'), |
|
|
|
('c', '(゚Д゚) [\'c\']'), |
|
|
|
|
|
|
|
('7', '((゚ー゚) + (o^_^o))'), |
|
|
|
('6', '((o^_^o) +(o^_^o) +(c^_^o))'), |
|
|
|
('5', '((゚ー゚) + (゚Θ゚))'), |
|
|
|
('4', '(-~3)'), |
|
|
|
('3', '(-~-~1)'), |
|
|
|
('2', '(-~1)'), |
|
|
|
('1', '(-~0)'), |
|
|
|
('0', '((c^_^o)-(c^_^o))'), |
|
|
|
] |
|
|
|
delim = '(゚Д゚)[゚ε゚]+' |
|
|
|
ret = '' |
|
|
|
for aachar in txt.split(delim): |
|
|
|
for val, pat in symbol_table: |
|
|
|
aachar = aachar.replace(pat, val) |
|
|
|
aachar = aachar.replace('+ ', '') |
|
|
|
m = re.match(r'^\d+', aachar) |
|
|
|
if m: |
|
|
|
ret += compat_chr(int(m.group(0), 8)) |
|
|
|
else: |
|
|
|
m = re.match(r'^u([\da-f]+)', aachar) |
|
|
|
if m: |
|
|
|
ret += compat_chr(int(m.group(1), 16)) |
|
|
|
return cls.openload_level2(ret) |
|
|
|
|
|
|
|
def _real_extract(self, url): |
|
|
|
video_id = self._match_id(url) |
|
|
|
webpage = self._download_webpage(url, video_id) |
|
|
|
code = self._search_regex( |
|
|
|
r'<video[^>]+>\s*<script[^>]+>([^<]+)</script>', |
|
|
|
webpage, 'JS code') |
|
|
|
|
|
|
|
video_url = self._search_regex( |
|
|
|
r'return\s+"(https?://[^"]+)"', self.openload_decode(code), 'video URL') |
|
|
|
|
|
|
|
return { |
|
|
|
'id': video_id, |
|
|
|
'title': self._og_search_title(webpage), |
|
|
|
'url': video_url, |
|
|
|
} |