]>
jfr.im git - yt-dlp.git/blob - yt_dlp/extractor/defense.py
1 from .common
import InfoExtractor
4 class DefenseGouvFrIE(InfoExtractor
):
5 IE_NAME
= 'defense.gouv.fr'
6 _VALID_URL
= r
'https?://.*?\.defense\.gouv\.fr/layout/set/ligthboxvideo/base-de-medias/webtv/(?P<id>[^/?#]*)'
9 'url': 'http://www.defense.gouv.fr/layout/set/ligthboxvideo/base-de-medias/webtv/attaque-chimique-syrienne-du-21-aout-2013-1',
10 'md5': '75bba6124da7e63d2d60b5244ec9430c',
14 'title': 'attaque-chimique-syrienne-du-21-aout-2013-1'
18 def _real_extract(self
, url
):
19 title
= self
._match
_id
(url
)
20 webpage
= self
._download
_webpage
(url
, title
)
22 video_id
= self
._search
_regex
(
23 r
"flashvars.pvg_id=\"(\d
+)\";",
27 'http://static.videos.gouv.fr/brightcovehub/export/json/%s' %
29 info = self._download_json(json_url, title, 'Downloading JSON config')
30 video_url = info['renditions'][0]['url']