]>
Raphaƫl G. Git Repositories - youtubedl/blob - youtube_dl/extractor/ooyala.py
a262a9f6d4ec232e78ee34f3ce38b03ea27d01e9
   1 from __future__ 
import unicode_literals
 
   6 from .common 
import InfoExtractor
 
  15 class OoyalaBaseIE(InfoExtractor
): 
  17     def _extract_result(self
, info
, more_info
): 
  18         embedCode 
= info
['embedCode'] 
  19         video_url 
= info
.get('ipad_url') or info
['url'] 
  21         if determine_ext(video_url
) == 'm3u8': 
  22             formats 
= self
._extract
_m
3u8_formats
(video_url
, embedCode
, ext
='mp4') 
  31             'title': unescapeHTML(info
['title']), 
  33             'description': unescapeHTML(more_info
['description']), 
  34             'thumbnail': more_info
['promo'], 
  37     def _extract(self
, player_url
, video_id
): 
  38         player 
= self
._download
_webpage
(player_url
, video_id
) 
  39         mobile_url 
= self
._search
_regex
(r
'mobile_player_url="(.+?)&device="', 
  40                                         player
, 'mobile player url') 
  41         # Looks like some videos are only available for particular devices 
  42         # (e.g. http://player.ooyala.com/player.js?embedCode=x1b3lqZDq9y_7kMyC2Op5qo-p077tXD0 
  43         # is only available for ipad) 
  44         # Working around with fetching URLs for all the devices found starting with 'unknown' 
  45         # until we succeed or eventually fail for each device. 
  46         devices 
= re
.findall(r
'device\s*=\s*"([^"]+)";', player
) 
  47         devices
.remove('unknown') 
  48         devices
.insert(0, 'unknown') 
  49         for device 
in devices
: 
  50             mobile_player 
= self
._download
_webpage
( 
  51                 '%s&device=%s' % (mobile_url
, device
), video_id
, 
  52                 'Downloading mobile player JS for %s device' % device
) 
  53             videos_info 
= self
._search
_regex
( 
  54                 r
'var streams=window.oo_testEnv\?\[\]:eval\("\((\[{.*?}\])\)"\);', 
  55                 mobile_player
, 'info', fatal
=False, default
=None) 
  61             auth_data 
= self
._download
_json
( 
  62                 'http://player.ooyala.com/sas/player_api/v1/authorization/embed_code/%s/%s?domain=www.example.org&supportedFormats=mp4,webm' % (video_id
, video_id
), 
  65             cur_auth_data 
= auth_data
['authorization_data'][video_id
] 
  67             for stream 
in cur_auth_data
['streams']: 
  69                     'url': base64
.b64decode(stream
['url']['data'].encode('ascii')).decode('utf-8'), 
  70                     'ext': stream
.get('delivery_type'), 
  71                     'format': stream
.get('video_codec'), 
  72                     'format_id': stream
.get('profile'), 
  73                     'width': int_or_none(stream
.get('width')), 
  74                     'height': int_or_none(stream
.get('height')), 
  75                     'abr': int_or_none(stream
.get('audio_bitrate')), 
  76                     'vbr': int_or_none(stream
.get('video_bitrate')), 
  82                     'title': 'Ooyala video', 
  85             if not cur_auth_data
['authorized']: 
  86                 raise ExtractorError(cur_auth_data
['message'], expected
=True) 
  89             raise ExtractorError('Unable to extract info') 
  90         videos_info 
= videos_info
.replace('\\"', '"') 
  91         videos_more_info 
= self
._search
_regex
( 
  92             r
'eval\("\(({.*?\\"promo\\".*?})\)"', mobile_player
, 'more info').replace('\\"', '"') 
  93         videos_info 
= json
.loads(videos_info
) 
  94         videos_more_info 
= json
.loads(videos_more_info
) 
  96         if videos_more_info
.get('lineup'): 
  97             videos 
= [self
._extract
_result
(info
, more_info
) for (info
, more_info
) in zip(videos_info
, videos_more_info
['lineup'])] 
 101                 'title': unescapeHTML(videos_more_info
['title']), 
 105             return self
._extract
_result
(videos_info
[0], videos_more_info
) 
 108 class OoyalaIE(OoyalaBaseIE
): 
 109     _VALID_URL 
= r
'(?:ooyala:|https?://.+?\.ooyala\.com/.*?(?:embedCode|ec)=)(?P<id>.+?)(&|$)' 
 113             # From http://it.slashdot.org/story/13/04/25/178216/recovering-data-from-broken-hard-drives-and-ssds-video 
 114             'url': 'http://player.ooyala.com/player.js?embedCode=pxczE2YjpfHfn1f3M-ykG_AmJRRn0PD8', 
 116                 'id': 'pxczE2YjpfHfn1f3M-ykG_AmJRRn0PD8', 
 118                 'title': 'Explaining Data Recovery from Hard Drives and SSDs', 
 119                 'description': 'How badly damaged does a drive have to be to defeat Russell and his crew? Apparently, smashed to bits.', 
 122             # Only available for ipad 
 123             'url': 'http://player.ooyala.com/player.js?embedCode=x1b3lqZDq9y_7kMyC2Op5qo-p077tXD0', 
 125                 'id': 'x1b3lqZDq9y_7kMyC2Op5qo-p077tXD0', 
 127                 'title': 'Simulation Overview - Levels of Simulation', 
 132             # Information available only through SAS api 
 133             # From http://community.plm.automation.siemens.com/t5/News-NX-Manufacturing/Tool-Path-Divide/ba-p/4187 
 134             'url': 'http://player.ooyala.com/player.js?embedCode=FiOG81ZTrvckcchQxmalf4aQj590qTEx', 
 135             'md5': 'a84001441b35ea492bc03736e59e7935', 
 137                 'id': 'FiOG81ZTrvckcchQxmalf4aQj590qTEx', 
 139                 'title': 'Ooyala video', 
 145     def _url_for_embed_code(embed_code
): 
 146         return 'http://player.ooyala.com/player.js?embedCode=%s' % embed_code
 
 149     def _build_url_result(cls
, embed_code
): 
 150         return cls
.url_result(cls
._url
_for
_embed
_code
(embed_code
), 
 153     def _real_extract(self
, url
): 
 154         embed_code 
= self
._match
_id
(url
) 
 155         player_url 
= 'http://player.ooyala.com/player.js?embedCode=%s' % embed_code
 
 156         return self
._extract
(player_url
, embed_code
) 
 159 class OoyalaExternalIE(OoyalaBaseIE
): 
 160     _VALID_URL 
= r
'''(?x) 
 163                         https?://.+?\.ooyala\.com/.*?\bexternalId= 
 165                     (?P<partner_id>[^:]+) 
 177         'url': 'https://player.ooyala.com/player.js?externalId=espn:10365079&pcode=1kNG061cgaoolOncv54OAO1ceO-I&adSetCode=91cDU6NuXTGKz3OdjOxFdAgJVtQcKJnI&callback=handleEvents&hasModuleParams=1&height=968&playerBrandingId=7af3bd04449c444c964f347f11873075&targetReplaceId=videoPlayer&width=1656&wmode=opaque&allowScriptAccess=always', 
 179             'id': 'FkYWtmazr6Ed8xmvILvKLWjd4QvYZpzG', 
 181             'title': 'dm_140128_30for30Shorts___JudgingJewellv2', 
 186             'skip_download': True, 
 190     def _real_extract(self
, url
): 
 191         mobj 
= re
.match(self
._VALID
_URL
, url
) 
 192         partner_id 
= mobj
.group('partner_id') 
 193         video_id 
= mobj
.group('id') 
 194         pcode 
= mobj
.group('pcode') 
 195         player_url 
= 'http://player.ooyala.com/player.js?externalId=%s:%s&pcode=%s' % (partner_id
, video_id
, pcode
) 
 196         return self
._extract
(player_url
, video_id
)