|
|
@ -17,6 +17,7 @@ class VimeoIE(InfoExtractor): |
|
|
|
|
|
|
|
# _VALID_URL matches Vimeo URLs |
|
|
|
_VALID_URL = r'(?P<proto>https?://)?(?:(?:www|player)\.)?vimeo(?P<pro>pro)?\.com/(?:(?:(?:groups|album)/[^/]+)|(?:.*?)/)?(?P<direct_link>play_redirect_hls\?clip_id=)?(?:videos?/)?(?P<id>[0-9]+)(?:[?].*)?$' |
|
|
|
_NETRC_MACHINE = 'vimeo' |
|
|
|
IE_NAME = u'vimeo' |
|
|
|
_TEST = { |
|
|
|
u'url': u'http://vimeo.com/56015672', |
|
|
@ -31,6 +32,25 @@ class VimeoIE(InfoExtractor): |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
def _login(self): |
|
|
|
(username, password) = self._get_login_info() |
|
|
|
if username is None: |
|
|
|
return |
|
|
|
self.report_login() |
|
|
|
login_url = 'https://vimeo.com/log_in' |
|
|
|
webpage = self._download_webpage(login_url, None, False) |
|
|
|
token = re.search(r'xsrft: \'(.*?)\'', webpage).group(1) |
|
|
|
data = compat_urllib_parse.urlencode({'email': username, |
|
|
|
'password': password, |
|
|
|
'action': 'login', |
|
|
|
'service': 'vimeo', |
|
|
|
'token': token, |
|
|
|
}) |
|
|
|
login_request = compat_urllib_request.Request(login_url, data) |
|
|
|
login_request.add_header('Content-Type', 'application/x-www-form-urlencoded') |
|
|
|
login_request.add_header('Cookie', 'xsrft=%s' % token) |
|
|
|
self._download_webpage(login_request, None, False, u'Wrong login info') |
|
|
|
|
|
|
|
def _verify_video_password(self, url, video_id, webpage): |
|
|
|
password = self._downloader.params.get('videopassword', None) |
|
|
|
if password is None: |
|
|
@ -50,6 +70,9 @@ class VimeoIE(InfoExtractor): |
|
|
|
u'Verifying the password', |
|
|
|
u'Wrong password') |
|
|
|
|
|
|
|
def _real_initialize(self): |
|
|
|
self._login() |
|
|
|
|
|
|
|
def _real_extract(self, url, new_video=True): |
|
|
|
# Extract ID from URL |
|
|
|
mobj = re.match(self._VALID_URL, url) |
|
|
|