1 from __future__
import unicode_literals
5 from .common
import InfoExtractor
12 from ..compat
import compat_urllib_parse
15 class OoyalaBaseIE(InfoExtractor
):
16 _PLAYER_BASE
= 'http://player.ooyala.com/'
17 _CONTENT_TREE_BASE
= _PLAYER_BASE
+ 'player_api/v1/content_tree/'
18 _AUTHORIZATION_URL_TEMPLATE
= _PLAYER_BASE
+ 'sas/player_api/v1/authorization/embed_code/%s/%s?'
20 def _extract(self
, content_tree_url
, video_id
, domain
='example.org'):
21 content_tree
= self
._download
_json
(content_tree_url
, video_id
)['content_tree']
22 metadata
= content_tree
[list(content_tree
)[0]]
23 embed_code
= metadata
['embed_code']
24 pcode
= metadata
.get('asset_pcode') or embed_code
27 'title': metadata
['title'],
28 'description': metadata
.get('description'),
29 'thumbnail': metadata
.get('thumbnail_image') or metadata
.get('promo_image'),
30 'duration': float_or_none(metadata
.get('duration'), 1000),
35 for supported_format
in ('mp4', 'm3u8', 'hds', 'rtmp'):
36 auth_data
= self
._download
_json
(
37 self
._AUTHORIZATION
_URL
_TEMPLATE
% (pcode
, embed_code
) +
38 compat_urllib_parse
.urlencode({
40 'supportedFormats': supported_format
42 video_id
, 'Downloading %s JSON' % supported_format
)
44 cur_auth_data
= auth_data
['authorization_data'][embed_code
]
46 if cur_auth_data
['authorized']:
47 for stream
in cur_auth_data
['streams']:
48 url
= base64
.b64decode(
49 stream
['url']['data'].encode('ascii')).decode('utf-8')
53 delivery_type
= stream
['delivery_type']
54 if delivery_type
== 'hls' or '.m3u8' in url
:
55 formats
.extend(self
._extract
_m
3u8_formats
(
56 url
, embed_code
, 'mp4', 'm3u8_native',
57 m3u8_id
='hls', fatal
=False))
58 elif delivery_type
== 'hds' or '.f4m' in url
:
59 formats
.extend(self
._extract
_f
4m
_formats
(
60 url
+ '?hdcore=3.7.0', embed_code
, f4m_id
='hds', fatal
=False))
62 formats
.extend(self
._extract
_smil
_formats
(
63 url
, embed_code
, fatal
=False))
67 'ext': stream
.get('delivery_type'),
68 'vcodec': stream
.get('video_codec'),
69 'format_id': delivery_type
,
70 'width': int_or_none(stream
.get('width')),
71 'height': int_or_none(stream
.get('height')),
72 'abr': int_or_none(stream
.get('audio_bitrate')),
73 'vbr': int_or_none(stream
.get('video_bitrate')),
74 'fps': float_or_none(stream
.get('framerate')),
77 raise ExtractorError('%s said: %s' % (
78 self
.IE_NAME
, cur_auth_data
['message']), expected
=True)
79 self
._sort
_formats
(formats
)
81 video_info
['formats'] = formats
85 class OoyalaIE(OoyalaBaseIE
):
86 _VALID_URL
= r
'(?:ooyala:|https?://.+?\.ooyala\.com/.*?(?:embedCode|ec)=)(?P<id>.+?)(&|$)'
90 # From http://it.slashdot.org/story/13/04/25/178216/recovering-data-from-broken-hard-drives-and-ssds-video
91 'url': 'http://player.ooyala.com/player.js?embedCode=pxczE2YjpfHfn1f3M-ykG_AmJRRn0PD8',
93 'id': 'pxczE2YjpfHfn1f3M-ykG_AmJRRn0PD8',
95 'title': 'Explaining Data Recovery from Hard Drives and SSDs',
96 'description': 'How badly damaged does a drive have to be to defeat Russell and his crew? Apparently, smashed to bits.',
100 # Only available for ipad
101 'url': 'http://player.ooyala.com/player.js?embedCode=x1b3lqZDq9y_7kMyC2Op5qo-p077tXD0',
103 'id': 'x1b3lqZDq9y_7kMyC2Op5qo-p077tXD0',
105 'title': 'Simulation Overview - Levels of Simulation',
110 # Information available only through SAS api
111 # From http://community.plm.automation.siemens.com/t5/News-NX-Manufacturing/Tool-Path-Divide/ba-p/4187
112 'url': 'http://player.ooyala.com/player.js?embedCode=FiOG81ZTrvckcchQxmalf4aQj590qTEx',
113 'md5': 'a84001441b35ea492bc03736e59e7935',
115 'id': 'FiOG81ZTrvckcchQxmalf4aQj590qTEx',
117 'title': 'Divide Tool Path.mp4',
124 def _url_for_embed_code(embed_code
):
125 return 'http://player.ooyala.com/player.js?embedCode=%s' % embed_code
128 def _build_url_result(cls
, embed_code
):
129 return cls
.url_result(cls
._url
_for
_embed
_code
(embed_code
),
132 def _real_extract(self
, url
):
133 url
, smuggled_data
= unsmuggle_url(url
, {})
134 embed_code
= self
._match
_id
(url
)
135 domain
= smuggled_data
.get('domain')
136 content_tree_url
= self
._CONTENT
_TREE
_BASE
+ 'embed_code/%s/%s' % (embed_code
, embed_code
)
137 return self
._extract
(content_tree_url
, embed_code
, domain
)
140 class OoyalaExternalIE(OoyalaBaseIE
):
141 _VALID_URL
= r
'''(?x)
144 https?://.+?\.ooyala\.com/.*?\bexternalId=
146 (?P<partner_id>[^:]+)
158 'url': 'https://player.ooyala.com/player.js?externalId=espn:10365079&pcode=1kNG061cgaoolOncv54OAO1ceO-I&adSetCode=91cDU6NuXTGKz3OdjOxFdAgJVtQcKJnI&callback=handleEvents&hasModuleParams=1&height=968&playerBrandingId=7af3bd04449c444c964f347f11873075&targetReplaceId=videoPlayer&width=1656&wmode=opaque&allowScriptAccess=always',
160 'id': 'FkYWtmazr6Ed8xmvILvKLWjd4QvYZpzG',
162 'title': 'dm_140128_30for30Shorts___JudgingJewellv2',
167 'skip_download': True,
171 def _real_extract(self
, url
):
172 partner_id
, video_id
, pcode
= re
.match(self
._VALID
_URL
, url
).groups()
173 content_tree_url
= self
._CONTENT
_TREE
_BASE
+ 'external_id/%s/%s:%s' % (pcode
, partner_id
, video_id
)
174 return self
._extract
(content_tree_url
, video_id
)