4 from .common
import InfoExtractor
19 class OoyalaBaseIE(InfoExtractor
):
20 _PLAYER_BASE
= 'http://player.ooyala.com/'
21 _CONTENT_TREE_BASE
= _PLAYER_BASE
+ 'player_api/v1/content_tree/'
22 _AUTHORIZATION_URL_TEMPLATE
= _PLAYER_BASE
+ 'sas/player_api/v2/authorization/embed_code/%s/%s'
24 def _extract(self
, content_tree_url
, video_id
, domain
=None, supportedformats
=None, embed_token
=None):
25 content_tree
= self
._download
_json
(content_tree_url
, video_id
)['content_tree']
26 metadata
= content_tree
[list(content_tree
)[0]]
27 embed_code
= metadata
['embed_code']
28 pcode
= metadata
.get('asset_pcode') or embed_code
29 title
= metadata
['title']
31 auth_data
= self
._download
_json
(
32 self
._AUTHORIZATION
_URL
_TEMPLATE
% (pcode
, embed_code
),
33 video_id
, headers
=self
.geo_verification_headers(), query
={
34 'domain': domain
or 'player.ooyala.com',
35 'supportedFormats': supportedformats
or 'mp4,rtmp,m3u8,hds,dash,smooth',
36 'embedToken': embed_token
,
37 })['authorization_data'][embed_code
]
41 streams
= auth_data
.get('streams') or [{
42 'delivery_type': 'hls',
44 'data': base64
.b64encode(('http://player.ooyala.com/hls/player/all/%s.m3u8' % embed_code
).encode()).decode(),
47 for stream
in streams
:
48 url_data
= try_get(stream
, lambda x
: x
['url']['data'], compat_str
)
51 s_url
= compat_b64decode(url_data
).decode('utf-8')
52 if not s_url
or s_url
in urls
:
55 ext
= determine_ext(s_url
, None)
56 delivery_type
= stream
.get('delivery_type')
57 if delivery_type
== 'hls' or ext
== 'm3u8':
58 formats
.extend(self
._extract
_m
3u8_formats
(
59 re
.sub(r
'/ip(?:ad|hone)/', '/all/', s_url
), embed_code
, 'mp4', 'm3u8_native',
60 m3u8_id
='hls', fatal
=False))
61 elif delivery_type
== 'hds' or ext
== 'f4m':
62 formats
.extend(self
._extract
_f
4m
_formats
(
63 s_url
+ '?hdcore=3.7.0', embed_code
, f4m_id
='hds', fatal
=False))
64 elif delivery_type
== 'dash' or ext
== 'mpd':
65 formats
.extend(self
._extract
_mpd
_formats
(
66 s_url
, embed_code
, mpd_id
='dash', fatal
=False))
67 elif delivery_type
== 'smooth':
68 self
._extract
_ism
_formats
(
69 s_url
, embed_code
, ism_id
='mss', fatal
=False)
71 formats
.extend(self
._extract
_smil
_formats
(
72 s_url
, embed_code
, fatal
=False))
76 'ext': ext
or delivery_type
,
77 'vcodec': stream
.get('video_codec'),
78 'format_id': delivery_type
,
79 'width': int_or_none(stream
.get('width')),
80 'height': int_or_none(stream
.get('height')),
81 'abr': int_or_none(stream
.get('audio_bitrate')),
82 'vbr': int_or_none(stream
.get('video_bitrate')),
83 'fps': float_or_none(stream
.get('framerate')),
85 if not formats
and not auth_data
.get('authorized'):
86 self
.raise_no_formats('%s said: %s' % (
87 self
.IE_NAME
, auth_data
['message']), expected
=True)
88 self
._sort
_formats
(formats
)
91 for lang
, sub
in metadata
.get('closed_captions_vtt', {}).get('captions', {}
).items():
92 sub_url
= sub
.get('url')
102 'description': metadata
.get('description'),
103 'thumbnail': metadata
.get('thumbnail_image') or metadata
.get('promo_image'),
104 'duration': float_or_none(metadata
.get('duration'), 1000),
105 'subtitles': subtitles
,
110 class OoyalaIE(OoyalaBaseIE
):
111 _VALID_URL
= r
'(?:ooyala:|https?://.+?\.ooyala\.com/.*?(?:embedCode|ec)=)(?P<id>.+?)(&|$)'
115 # From http://it.slashdot.org/story/13/04/25/178216/recovering-data-from-broken-hard-drives-and-ssds-video
116 'url': 'http://player.ooyala.com/player.js?embedCode=pxczE2YjpfHfn1f3M-ykG_AmJRRn0PD8',
118 'id': 'pxczE2YjpfHfn1f3M-ykG_AmJRRn0PD8',
120 'title': 'Explaining Data Recovery from Hard Drives and SSDs',
121 'description': 'How badly damaged does a drive have to be to defeat Russell and his crew? Apparently, smashed to bits.',
124 # The video in the original webpage now uses PlayWire
125 'skip': 'Ooyala said: movie expired',
127 # Only available for ipad
128 'url': 'http://player.ooyala.com/player.js?embedCode=x1b3lqZDq9y_7kMyC2Op5qo-p077tXD0',
130 'id': 'x1b3lqZDq9y_7kMyC2Op5qo-p077tXD0',
132 'title': 'Simulation Overview - Levels of Simulation',
137 # Information available only through SAS api
138 # From http://community.plm.automation.siemens.com/t5/News-NX-Manufacturing/Tool-Path-Divide/ba-p/4187
139 'url': 'http://player.ooyala.com/player.js?embedCode=FiOG81ZTrvckcchQxmalf4aQj590qTEx',
140 'md5': 'a84001441b35ea492bc03736e59e7935',
142 'id': 'FiOG81ZTrvckcchQxmalf4aQj590qTEx',
144 'title': 'Divide Tool Path.mp4',
149 # empty stream['url']['data']
150 'url': 'http://player.ooyala.com/player.js?embedCode=w2bnZtYjE6axZ_dw1Cd0hQtXd_ige2Is',
151 'only_matching': True,
155 def _extract_from_webpage(self
, url
, webpage
):
156 mobj
= (re
.search(r
'player\.ooyala\.com/[^"?]+[?#][^"]*?(?:embedCode|ec)=(?P<ec>[^"&]+)', webpage
)
157 or re
.search(r
'OO\.Player\.create\([\'"].*?[\'"],\s
*[\'"](?P<ec>.{32})[\'"]', webpage)
158 or re.search(r'OO\
.Player\
.create\
.apply\
(\s
*OO\
.Player\s
*,\s
*op\
(\s
*\
[\s
*[\'"][^\'"]*[\'"]\s*,\s*[\'"](?P
<ec
>.{32}
)[\'"]', webpage)
159 or re.search(r'SBN\.VideoLinkset\.ooyala\([\'"](?P
<ec
>.{32}
)[\'"]\)', webpage)
160 or re.search(r'data-ooyala-video-id\s*=\s*[\'"](?P
<ec
>.{32}
)[\'"]', webpage))
162 embed_token = self._search_regex(
163 r'embedToken[\'"]?\s
*:\s
*[\'"]([^\'"]+)',
164 webpage, 'ooyala embed token
', default=None)
165 yield self._build_url_result(smuggle_url(
168 'embed_token
': embed_token,
172 # Look for multiple Ooyala embeds on SBN network websites
173 mobj = re.search(r'SBN\
.VideoLinkset\
.entryGroup\
((\
[.*?\
])', webpage)
175 for v in self._parse_json(mobj.group(1), self._generic_id(url), fatal=False) or []:
176 yield self._build_url_result(smuggle_url(v['provider_video_id
'], {'domain': url}))
179 def _url_for_embed_code(embed_code):
180 return 'http
://player
.ooyala
.com
/player
.js?embedCode
=%s' % embed_code
183 def _build_url_result(cls, embed_code):
184 return cls.url_result(cls._url_for_embed_code(embed_code),
187 def _real_extract(self, url):
188 url, smuggled_data = unsmuggle_url(url, {})
189 embed_code = self._match_id(url)
190 domain = smuggled_data.get('domain
')
191 supportedformats = smuggled_data.get('supportedformats
')
192 embed_token = smuggled_data.get('embed_token
')
193 content_tree_url = self._CONTENT_TREE_BASE + 'embed_code
/%s/%s' % (embed_code, embed_code)
194 return self._extract(content_tree_url, embed_code, domain, supportedformats, embed_token)
197 class OoyalaExternalIE(OoyalaBaseIE):
198 _VALID_URL = r'''(?x)
201 https?://.+?\.ooyala\.com/.*?\bexternalId=
203 (?P<partner_id>[^:]+)
215 'url
': 'https
://player
.ooyala
.com
/player
.js?externalId
=espn
:10365079&pcode
=1kNG061cgaoolOncv54OAO1ceO
-I
&adSetCode
=91cDU6NuXTGKz3OdjOxFdAgJVtQcKJnI
&callback
=handleEvents
&hasModuleParams
=1&height
=968&playerBrandingId
=7af3bd04449c444c964f347f11873075
&targetReplaceId
=videoPlayer
&width
=1656&wmode
=opaque
&allowScriptAccess
=always
',
217 'id': 'FkYWtmazr6Ed8xmvILvKLWjd4QvYZpzG
',
219 'title
': 'dm_140128_30for30Shorts___JudgingJewellv2
',
224 'skip_download
': True,
228 def _real_extract(self, url):
229 partner_id, video_id, pcode = self._match_valid_url(url).groups()
230 content_tree_url = self._CONTENT_TREE_BASE + 'external_id
/%s/%s:%s' % (pcode, partner_id, video_id)
231 return self._extract(content_tree_url, video_id)