ooyala.py 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184
  1. from __future__ import unicode_literals
  2. import re
  3. import base64
  4. from .common import InfoExtractor
  5. from ..utils import (
  6. int_or_none,
  7. float_or_none,
  8. ExtractorError,
  9. unsmuggle_url,
  10. )
  11. from ..compat import compat_urllib_parse_urlencode
  12. class OoyalaBaseIE(InfoExtractor):
  13. _PLAYER_BASE = 'http://player.ooyala.com/'
  14. _CONTENT_TREE_BASE = _PLAYER_BASE + 'player_api/v1/content_tree/'
  15. _AUTHORIZATION_URL_TEMPLATE = _PLAYER_BASE + 'sas/player_api/v2/authorization/embed_code/%s/%s?'
  16. def _extract(self, content_tree_url, video_id, domain='example.org'):
  17. content_tree = self._download_json(content_tree_url, video_id)['content_tree']
  18. metadata = content_tree[list(content_tree)[0]]
  19. embed_code = metadata['embed_code']
  20. pcode = metadata.get('asset_pcode') or embed_code
  21. title = metadata['title']
  22. auth_data = self._download_json(
  23. self._AUTHORIZATION_URL_TEMPLATE % (pcode, embed_code) +
  24. compat_urllib_parse_urlencode({
  25. 'domain': domain,
  26. 'supportedFormats': 'mp4,rtmp,m3u8,hds',
  27. }), video_id)
  28. cur_auth_data = auth_data['authorization_data'][embed_code]
  29. urls = []
  30. formats = []
  31. if cur_auth_data['authorized']:
  32. for stream in cur_auth_data['streams']:
  33. url = base64.b64decode(
  34. stream['url']['data'].encode('ascii')).decode('utf-8')
  35. if url in urls:
  36. continue
  37. urls.append(url)
  38. delivery_type = stream['delivery_type']
  39. if delivery_type == 'hls' or '.m3u8' in url:
  40. formats.extend(self._extract_m3u8_formats(
  41. url, embed_code, 'mp4', 'm3u8_native',
  42. m3u8_id='hls', fatal=False))
  43. elif delivery_type == 'hds' or '.f4m' in url:
  44. formats.extend(self._extract_f4m_formats(
  45. url + '?hdcore=3.7.0', embed_code, f4m_id='hds', fatal=False))
  46. elif '.smil' in url:
  47. formats.extend(self._extract_smil_formats(
  48. url, embed_code, fatal=False))
  49. else:
  50. formats.append({
  51. 'url': url,
  52. 'ext': stream.get('delivery_type'),
  53. 'vcodec': stream.get('video_codec'),
  54. 'format_id': delivery_type,
  55. 'width': int_or_none(stream.get('width')),
  56. 'height': int_or_none(stream.get('height')),
  57. 'abr': int_or_none(stream.get('audio_bitrate')),
  58. 'vbr': int_or_none(stream.get('video_bitrate')),
  59. 'fps': float_or_none(stream.get('framerate')),
  60. })
  61. else:
  62. raise ExtractorError('%s said: %s' % (
  63. self.IE_NAME, cur_auth_data['message']), expected=True)
  64. self._sort_formats(formats)
  65. subtitles = {}
  66. for lang, sub in metadata.get('closed_captions_vtt', {}).get('captions', {}).items():
  67. sub_url = sub.get('url')
  68. if not sub_url:
  69. continue
  70. subtitles[lang] = [{
  71. 'url': sub_url,
  72. }]
  73. return {
  74. 'id': embed_code,
  75. 'title': title,
  76. 'description': metadata.get('description'),
  77. 'thumbnail': metadata.get('thumbnail_image') or metadata.get('promo_image'),
  78. 'duration': float_or_none(metadata.get('duration'), 1000),
  79. 'subtitles': subtitles,
  80. 'formats': formats,
  81. }
  82. class OoyalaIE(OoyalaBaseIE):
  83. _VALID_URL = r'(?:ooyala:|https?://.+?\.ooyala\.com/.*?(?:embedCode|ec)=)(?P<id>.+?)(&|$)'
  84. _TESTS = [
  85. {
  86. # From http://it.slashdot.org/story/13/04/25/178216/recovering-data-from-broken-hard-drives-and-ssds-video
  87. 'url': 'http://player.ooyala.com/player.js?embedCode=pxczE2YjpfHfn1f3M-ykG_AmJRRn0PD8',
  88. 'info_dict': {
  89. 'id': 'pxczE2YjpfHfn1f3M-ykG_AmJRRn0PD8',
  90. 'ext': 'mp4',
  91. 'title': 'Explaining Data Recovery from Hard Drives and SSDs',
  92. 'description': 'How badly damaged does a drive have to be to defeat Russell and his crew? Apparently, smashed to bits.',
  93. 'duration': 853.386,
  94. },
  95. # The video in the original webpage now uses PlayWire
  96. 'skip': 'Ooyala said: movie expired',
  97. }, {
  98. # Only available for ipad
  99. 'url': 'http://player.ooyala.com/player.js?embedCode=x1b3lqZDq9y_7kMyC2Op5qo-p077tXD0',
  100. 'info_dict': {
  101. 'id': 'x1b3lqZDq9y_7kMyC2Op5qo-p077tXD0',
  102. 'ext': 'mp4',
  103. 'title': 'Simulation Overview - Levels of Simulation',
  104. 'duration': 194.948,
  105. },
  106. },
  107. {
  108. # Information available only through SAS api
  109. # From http://community.plm.automation.siemens.com/t5/News-NX-Manufacturing/Tool-Path-Divide/ba-p/4187
  110. 'url': 'http://player.ooyala.com/player.js?embedCode=FiOG81ZTrvckcchQxmalf4aQj590qTEx',
  111. 'md5': 'a84001441b35ea492bc03736e59e7935',
  112. 'info_dict': {
  113. 'id': 'FiOG81ZTrvckcchQxmalf4aQj590qTEx',
  114. 'ext': 'mp4',
  115. 'title': 'Divide Tool Path.mp4',
  116. 'duration': 204.405,
  117. }
  118. }
  119. ]
  120. @staticmethod
  121. def _url_for_embed_code(embed_code):
  122. return 'http://player.ooyala.com/player.js?embedCode=%s' % embed_code
  123. @classmethod
  124. def _build_url_result(cls, embed_code):
  125. return cls.url_result(cls._url_for_embed_code(embed_code),
  126. ie=cls.ie_key())
  127. def _real_extract(self, url):
  128. url, smuggled_data = unsmuggle_url(url, {})
  129. embed_code = self._match_id(url)
  130. domain = smuggled_data.get('domain')
  131. content_tree_url = self._CONTENT_TREE_BASE + 'embed_code/%s/%s' % (embed_code, embed_code)
  132. return self._extract(content_tree_url, embed_code, domain)
  133. class OoyalaExternalIE(OoyalaBaseIE):
  134. _VALID_URL = r'''(?x)
  135. (?:
  136. ooyalaexternal:|
  137. https?://.+?\.ooyala\.com/.*?\bexternalId=
  138. )
  139. (?P<partner_id>[^:]+)
  140. :
  141. (?P<id>.+)
  142. (?:
  143. :|
  144. .*?&pcode=
  145. )
  146. (?P<pcode>.+?)
  147. (?:&|$)
  148. '''
  149. _TEST = {
  150. 'url': 'https://player.ooyala.com/player.js?externalId=espn:10365079&pcode=1kNG061cgaoolOncv54OAO1ceO-I&adSetCode=91cDU6NuXTGKz3OdjOxFdAgJVtQcKJnI&callback=handleEvents&hasModuleParams=1&height=968&playerBrandingId=7af3bd04449c444c964f347f11873075&targetReplaceId=videoPlayer&width=1656&wmode=opaque&allowScriptAccess=always',
  151. 'info_dict': {
  152. 'id': 'FkYWtmazr6Ed8xmvILvKLWjd4QvYZpzG',
  153. 'ext': 'mp4',
  154. 'title': 'dm_140128_30for30Shorts___JudgingJewellv2',
  155. 'duration': 1302.0,
  156. },
  157. 'params': {
  158. # m3u8 download
  159. 'skip_download': True,
  160. },
  161. }
  162. def _real_extract(self, url):
  163. partner_id, video_id, pcode = re.match(self._VALID_URL, url).groups()
  164. content_tree_url = self._CONTENT_TREE_BASE + 'external_id/%s/%s:%s' % (pcode, partner_id, video_id)
  165. return self._extract(content_tree_url, video_id)