1
0
Fork 0
mirror of https://github.com/blackjack4494/yt-dlc.git synced 2024-12-22 07:43:08 +00:00

Merge pull request #10 from adrianheine/videa

[videa] Adapt to updates
This commit is contained in:
Tom-Oliver Heidel 2020-08-31 23:38:20 +02:00 committed by GitHub
commit 7f3558b00c
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -2,15 +2,24 @@
from __future__ import unicode_literals
import re
import random
import string
import struct
from .common import InfoExtractor
from ..utils import (
ExtractorError,
int_or_none,
mimetype2ext,
parse_codecs,
xpath_element,
xpath_text,
)
from ..compat import (
compat_b64decode,
compat_ord,
compat_parse_qs,
)
class VideaIE(InfoExtractor):
@ -60,15 +69,63 @@ class VideaIE(InfoExtractor):
r'<iframe[^>]+src=(["\'])(?P<url>(?:https?:)?//videa\.hu/player\?.*?\bv=.+?)\1',
webpage)]
def rc4(self, ciphertext, key):
res = b''
keyLen = len(key)
S = list(range(256))
j = 0
for i in range(256):
j = (j + S[i] + ord(key[i % keyLen])) % 256
S[i], S[j] = S[j], S[i]
i = 0
j = 0
for m in range(len(ciphertext)):
i = (i + 1) % 256
j = (j + S[i]) % 256
S[i], S[j] = S[j], S[i]
k = S[(S[i] + S[j]) % 256]
res += struct.pack("B", k ^ compat_ord(ciphertext[m]))
return res
def _real_extract(self, url):
video_id = self._match_id(url)
webpage = self._download_webpage(url, video_id, fatal=True)
error = self._search_regex(r'<p class="error-text">([^<]+)</p>', webpage, 'error', default=None)
if error:
raise ExtractorError(error, expected=True)
info = self._download_xml(
video_src_params_raw = self._search_regex(r'<iframe[^>]+id="videa_player_iframe"[^>]+src="/player\?([^"]+)"', webpage, 'video_src_params')
video_src_params = compat_parse_qs(video_src_params_raw)
player_page = self._download_webpage("https://videa.hu/videojs_player?%s" % video_src_params_raw, video_id, fatal=True)
nonce = self._search_regex(r'_xt\s*=\s*"([^"]+)"', player_page, 'nonce')
random_seed = ''.join(random.choice(string.ascii_uppercase + string.ascii_lowercase + string.digits) for _ in range(8))
static_secret = 'xHb0ZvME5q8CBcoQi6AngerDu3FGO9fkUlwPmLVY_RTzj2hJIS4NasXWKy1td7p'
l = nonce[:32]
s = nonce[32:]
result = ''
for i in range(0, 32):
result += s[i - (static_secret.index(l[i]) - 31)]
video_src_params['_s'] = random_seed
video_src_params['_t'] = result[:16]
encryption_key_stem = result[16:] + random_seed
[b64_info, handle] = self._download_webpage_handle(
'http://videa.hu/videaplayer_get_xml.php', video_id,
query={'v': video_id})
query=video_src_params, fatal=True)
encrypted_info = compat_b64decode(b64_info)
key = encryption_key_stem + handle.info()['x-videa-xs']
info_str = self.rc4(encrypted_info, key).decode('utf8')
info = self._parse_xml(info_str, video_id)
video = xpath_element(info, './/video', 'video', fatal=True)
sources = xpath_element(info, './/video_sources', 'sources', fatal=True)
hash_values = xpath_element(info, './/hash_values', 'hash_values', fatal=True)
title = xpath_text(video, './title', fatal=True)
@ -77,6 +134,7 @@ class VideaIE(InfoExtractor):
source_url = source.text
if not source_url:
continue
source_url += '?md5=%s&expires=%s' % (hash_values.find('hash_value_%s' % source.get('name')).text, source.get('exp'))
f = parse_codecs(source.get('codecs'))
f.update({
'url': source_url,