|
|
@ -1,6 +1,8 @@ |
|
|
|
# coding: utf-8 |
|
|
|
from __future__ import unicode_literals, division |
|
|
|
|
|
|
|
import re |
|
|
|
|
|
|
|
from .common import InfoExtractor |
|
|
|
from ..compat import ( |
|
|
|
compat_chr, |
|
|
@ -10,6 +12,10 @@ from ..utils import ( |
|
|
|
determine_ext, |
|
|
|
ExtractorError, |
|
|
|
) |
|
|
|
from ..jsinterp import ( |
|
|
|
JSInterpreter, |
|
|
|
_NAME_RE |
|
|
|
) |
|
|
|
|
|
|
|
|
|
|
|
class OpenloadIE(InfoExtractor): |
|
|
@ -56,6 +62,44 @@ class OpenloadIE(InfoExtractor): |
|
|
|
'only_matching': True, |
|
|
|
}] |
|
|
|
|
|
|
|
def openload_decode(self, txt): |
|
|
|
symbol_dict = { |
|
|
|
'(゚Д゚) [゚Θ゚]': '_', |
|
|
|
'(゚Д゚) [゚ω゚ノ]': 'a', |
|
|
|
'(゚Д゚) [゚Θ゚ノ]': 'b', |
|
|
|
'(゚Д゚) [\'c\']': 'c', |
|
|
|
'(゚Д゚) [゚ー゚ノ]': 'd', |
|
|
|
'(゚Д゚) [゚Д゚ノ]': 'e', |
|
|
|
'(゚Д゚) [1]': 'f', |
|
|
|
'(゚Д゚) [\'o\']': 'o', |
|
|
|
'(o゚ー゚o)': 'u', |
|
|
|
'(゚Д゚) [\'c\']': 'c', |
|
|
|
'((゚ー゚) + (o^_^o))': '7', |
|
|
|
'((o^_^o) +(o^_^o) +(c^_^o))': '6', |
|
|
|
'((゚ー゚) + (゚Θ゚))': '5', |
|
|
|
'(-~3)': '4', |
|
|
|
'(-~-~1)': '3', |
|
|
|
'(-~1)': '2', |
|
|
|
'(-~0)': '1', |
|
|
|
'((c^_^o)-(c^_^o))': '0', |
|
|
|
} |
|
|
|
delim = '(゚Д゚)[゚ε゚]+' |
|
|
|
end_token = '(゚Д゚)[゚o゚]' |
|
|
|
symbols = '|'.join(map(re.escape, symbol_dict.keys())) |
|
|
|
txt = re.sub('(%s)\+\s?' % symbols, lambda m: symbol_dict[m.group(1)], txt) |
|
|
|
ret = '' |
|
|
|
for aacode in re.findall(r'{0}\+\s?{1}(.*?){0}'.format(re.escape(end_token), re.escape(delim)), txt): |
|
|
|
for aachar in aacode.split(delim): |
|
|
|
if aachar.isdigit(): |
|
|
|
ret += compat_chr(int(aachar, 8)) |
|
|
|
else: |
|
|
|
m = re.match(r'^u([\da-f]{4})$', aachar) |
|
|
|
if m: |
|
|
|
ret += compat_chr(int(m.group(1), 16)) |
|
|
|
else: |
|
|
|
self.report_warning("Cannot decode: %s" % aachar) |
|
|
|
return ret |
|
|
|
|
|
|
|
def _real_extract(self, url): |
|
|
|
video_id = self._match_id(url) |
|
|
|
webpage = self._download_webpage('https://openload.co/embed/%s/' % video_id, video_id) |
|
|
@ -70,19 +114,26 @@ class OpenloadIE(InfoExtractor): |
|
|
|
r'<span[^>]*>([^<]+)</span>\s*<span[^>]*>[^<]+</span>\s*<span[^>]+id="streamurl"', |
|
|
|
webpage, 'encrypted data') |
|
|
|
|
|
|
|
magic = compat_ord(enc_data[-1]) |
|
|
|
enc_code = self._html_search_regex(r'<script[^>]+>(゚ω゚[^<]+)</script>', |
|
|
|
webpage, 'encrypted code') |
|
|
|
|
|
|
|
js_code = self.openload_decode(enc_code) |
|
|
|
jsi = JSInterpreter(js_code) |
|
|
|
|
|
|
|
m_offset_fun = self._search_regex(r'slice\(0\s*-\s*(%s)\(\)' % _NAME_RE, js_code, 'javascript offset function') |
|
|
|
m_diff_fun = self._search_regex(r'charCodeAt\(0\)\s*\+\s*(%s)\(\)' % _NAME_RE, js_code, 'javascript diff function') |
|
|
|
|
|
|
|
offset = jsi.call_function(m_offset_fun) |
|
|
|
diff = jsi.call_function(m_diff_fun) |
|
|
|
|
|
|
|
video_url_chars = [] |
|
|
|
|
|
|
|
for idx, c in enumerate(enc_data): |
|
|
|
j = compat_ord(c) |
|
|
|
if j == magic: |
|
|
|
j -= 1 |
|
|
|
elif j == magic - 1: |
|
|
|
j += 1 |
|
|
|
if j >= 33 and j <= 126: |
|
|
|
j = ((j + 14) % 94) + 33 |
|
|
|
if idx == len(enc_data) - 1: |
|
|
|
j += 3 |
|
|
|
if idx == len(enc_data) - offset: |
|
|
|
j += diff |
|
|
|
video_url_chars += compat_chr(j) |
|
|
|
|
|
|
|
video_url = 'https://openload.co/stream/%s?mime=true' % ''.join(video_url_chars) |
|
|
|