mirror of
https://github.com/ytdl-org/youtube-dl
synced 2025-01-27 13:50:11 +09:00
Compare commits
14 Commits
c178cbd07c
...
abfd1aa808
Author | SHA1 | Date | |
---|---|---|---|
|
abfd1aa808 | ||
|
c5098961b0 | ||
|
dbc08fba83 | ||
|
71223bff39 | ||
|
d893535d7b | ||
|
7a489eaa6d | ||
|
9a14872ffd | ||
|
95e0844f0c | ||
|
5f15109dff | ||
|
56251c4d2e | ||
|
62798011e3 | ||
|
6aa0183a43 | ||
|
96d2ecc584 | ||
|
dc96ac5f09 |
@ -425,6 +425,34 @@ class TestJSInterpreter(unittest.TestCase):
|
|||||||
self._test(jsi, [''], args=['', '-'])
|
self._test(jsi, [''], args=['', '-'])
|
||||||
self._test(jsi, [], args=['', ''])
|
self._test(jsi, [], args=['', ''])
|
||||||
|
|
||||||
|
def test_slice(self):
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice()}', [0, 1, 2, 3, 4, 5, 6, 7, 8])
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice(0)}', [0, 1, 2, 3, 4, 5, 6, 7, 8])
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice(5)}', [5, 6, 7, 8])
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice(99)}', [])
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice(-2)}', [7, 8])
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice(-99)}', [0, 1, 2, 3, 4, 5, 6, 7, 8])
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice(0, 0)}', [])
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice(1, 0)}', [])
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice(0, 1)}', [0])
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice(3, 6)}', [3, 4, 5])
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice(1, -1)}', [1, 2, 3, 4, 5, 6, 7])
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice(-1, 1)}', [])
|
||||||
|
self._test('function f(){return [0, 1, 2, 3, 4, 5, 6, 7, 8].slice(-3, -1)}', [6, 7])
|
||||||
|
self._test('function f(){return "012345678".slice()}', '012345678')
|
||||||
|
self._test('function f(){return "012345678".slice(0)}', '012345678')
|
||||||
|
self._test('function f(){return "012345678".slice(5)}', '5678')
|
||||||
|
self._test('function f(){return "012345678".slice(99)}', '')
|
||||||
|
self._test('function f(){return "012345678".slice(-2)}', '78')
|
||||||
|
self._test('function f(){return "012345678".slice(-99)}', '012345678')
|
||||||
|
self._test('function f(){return "012345678".slice(0, 0)}', '')
|
||||||
|
self._test('function f(){return "012345678".slice(1, 0)}', '')
|
||||||
|
self._test('function f(){return "012345678".slice(0, 1)}', '0')
|
||||||
|
self._test('function f(){return "012345678".slice(3, 6)}', '345')
|
||||||
|
self._test('function f(){return "012345678".slice(1, -1)}', '1234567')
|
||||||
|
self._test('function f(){return "012345678".slice(-1, 1)}', '')
|
||||||
|
self._test('function f(){return "012345678".slice(-3, -1)}', '67')
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
unittest.main()
|
unittest.main()
|
||||||
|
@ -174,6 +174,14 @@ _NSIG_TESTS = [
|
|||||||
'https://www.youtube.com/s/player/5604538d/player_ias.vflset/en_US/base.js',
|
'https://www.youtube.com/s/player/5604538d/player_ias.vflset/en_US/base.js',
|
||||||
'7X-he4jjvMx7BCX', 'sViSydX8IHtdWA',
|
'7X-he4jjvMx7BCX', 'sViSydX8IHtdWA',
|
||||||
),
|
),
|
||||||
|
(
|
||||||
|
'https://www.youtube.com/s/player/20dfca59/player_ias.vflset/en_US/base.js',
|
||||||
|
'-fLCxedkAk4LUTK2', 'O8kfRq1y1eyHGw',
|
||||||
|
),
|
||||||
|
(
|
||||||
|
'https://www.youtube.com/s/player/b12cc44b/player_ias.vflset/en_US/base.js',
|
||||||
|
'keLa5R2U00sR9SQK', 'N1OGyujjEwMnLw',
|
||||||
|
),
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
|
@ -1482,7 +1482,7 @@ from .vidme import (
|
|||||||
VidmeUserIE,
|
VidmeUserIE,
|
||||||
VidmeUserLikesIE,
|
VidmeUserLikesIE,
|
||||||
)
|
)
|
||||||
from .vier import VierIE, VierVideosIE
|
from .vier import VierIE, VierVideosIE, VierVijfKijkOnlineIE
|
||||||
from .viewlift import (
|
from .viewlift import (
|
||||||
ViewLiftIE,
|
ViewLiftIE,
|
||||||
ViewLiftEmbedIE,
|
ViewLiftEmbedIE,
|
||||||
|
@ -2,8 +2,10 @@
|
|||||||
from __future__ import unicode_literals
|
from __future__ import unicode_literals
|
||||||
|
|
||||||
import re
|
import re
|
||||||
|
import json
|
||||||
import itertools
|
import itertools
|
||||||
|
|
||||||
|
from .vier_auth_aws import AwsIdp
|
||||||
from .common import InfoExtractor
|
from .common import InfoExtractor
|
||||||
from ..utils import (
|
from ..utils import (
|
||||||
urlencode_postdata,
|
urlencode_postdata,
|
||||||
@ -12,16 +14,116 @@ from ..utils import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class VierVijfKijkOnlineIE(InfoExtractor):
|
||||||
|
IE_NAME = 'viervijfkijkonline'
|
||||||
|
IE_DESC = 'vier.be and vijf.be - Kijk Online'
|
||||||
|
_VALID_URL = r'https?://(?:www\.)?(?P<site>vier|vijf|goplay)\.be/video/(?P<series>(?!v3)[^/]+)/(?P<season>[^/]+)(/(?P<episode>[^/]+)|)'
|
||||||
|
_NETRC_MACHINE = 'vier'
|
||||||
|
_TESTS = [{
|
||||||
|
'url': 'https://www.vier.be/video/hotel-romantiek/2017/hotel-romantiek-aflevering-1',
|
||||||
|
'info_dict': {
|
||||||
|
'id': 'ebcd3c39-10a2-4730-b137-b0e7aaed247c',
|
||||||
|
'ext': 'mp4',
|
||||||
|
'title': 'Hotel Römantiek - Seizoen 1 - Aflevering 1',
|
||||||
|
'series': 'Hotel Römantiek',
|
||||||
|
'season_number': 1,
|
||||||
|
'episode_number': 1,
|
||||||
|
},
|
||||||
|
'skip': 'This video is only available for registered users'
|
||||||
|
}, {
|
||||||
|
'url': 'https://www.vier.be/video/blockbusters/in-juli-en-augustus-summer-classics',
|
||||||
|
'only_matching': True,
|
||||||
|
}, {
|
||||||
|
'url': 'https://www.vier.be/video/achter-de-rug/2017/achter-de-rug-seizoen-1-aflevering-6',
|
||||||
|
'only_matching': True,
|
||||||
|
}]
|
||||||
|
|
||||||
|
def _real_initialize(self):
|
||||||
|
self._logged_in = False
|
||||||
|
self.id_token = ''
|
||||||
|
|
||||||
|
def _login(self):
|
||||||
|
|
||||||
|
username, password = self._get_login_info()
|
||||||
|
if username is None or password is None:
|
||||||
|
self.raise_login_required()
|
||||||
|
|
||||||
|
aws = AwsIdp(pool_id='eu-west-1_dViSsKM5Y', client_id='6s1h851s8uplco5h6mqh1jac8m')
|
||||||
|
self.id_token, _ = aws.authenticate(username=username, password=password)
|
||||||
|
self._logged_in = True
|
||||||
|
|
||||||
|
def _real_extract(self, url):
|
||||||
|
if "#" in url:
|
||||||
|
url = url.split("#")[0]
|
||||||
|
|
||||||
|
if not self._logged_in:
|
||||||
|
self._login()
|
||||||
|
|
||||||
|
webpage = self._download_webpage(url, None)
|
||||||
|
|
||||||
|
title = self._html_search_regex(
|
||||||
|
r'<meta\s*property="og:title"\s*content="(.+?)"\s*/>',
|
||||||
|
webpage, 'title')
|
||||||
|
|
||||||
|
title_split = title.split(' - ')
|
||||||
|
series = title_split[0].strip()
|
||||||
|
if len(title_split) == 3:
|
||||||
|
if 'Seizoen' in title_split[1]:
|
||||||
|
season = title_split[1].split('Seizoen')[1].strip()
|
||||||
|
else:
|
||||||
|
season = title_split[1].strip()
|
||||||
|
episode = title_split[2].split('Aflevering')[1].strip()
|
||||||
|
elif len(title_split) == 1:
|
||||||
|
season = None
|
||||||
|
episode = None
|
||||||
|
else:
|
||||||
|
season = None
|
||||||
|
episode = title_split[1].split('Aflevering')[1].strip()
|
||||||
|
|
||||||
|
video_data = self._html_search_regex(
|
||||||
|
r'<div data-hero="([^"]*)"',
|
||||||
|
webpage, 'video_data')
|
||||||
|
|
||||||
|
playlists = json.loads(video_data.replace('"', '"'))['data']['playlists']
|
||||||
|
wanted_playlist = [x for x in playlists if x['pageInfo']['url'] in url][0]
|
||||||
|
wanted_episode = [x for x in wanted_playlist['episodes'] if x['pageInfo']['url'] == url][0] or [x for x in wanted_playlist['episodes'] if x['pageInfo']['url'] in url][0]
|
||||||
|
video_id = wanted_episode['videoUuid']
|
||||||
|
|
||||||
|
api_url = 'https://api.viervijfzes.be/content/%s' % (video_id)
|
||||||
|
api_headers = {
|
||||||
|
'authorization': self.id_token,
|
||||||
|
}
|
||||||
|
api = self._download_json(
|
||||||
|
api_url,
|
||||||
|
None, note='Peforming API Call', errnote='API Call Failed',
|
||||||
|
headers=api_headers,
|
||||||
|
)
|
||||||
|
|
||||||
|
formats = []
|
||||||
|
formats.extend(self._extract_m3u8_formats(
|
||||||
|
api['video']['S'], video_id, 'mp4', entry_protocol='m3u8_native',
|
||||||
|
m3u8_id='HLS', fatal=False))
|
||||||
|
|
||||||
|
self._sort_formats(formats)
|
||||||
|
return {
|
||||||
|
'id': video_id,
|
||||||
|
'title': title,
|
||||||
|
'series': series,
|
||||||
|
'season_number': int_or_none(season),
|
||||||
|
'episode_number': int_or_none(episode),
|
||||||
|
'formats': formats,
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
class VierIE(InfoExtractor):
|
class VierIE(InfoExtractor):
|
||||||
IE_NAME = 'vier'
|
IE_NAME = 'vier'
|
||||||
IE_DESC = 'vier.be and vijf.be'
|
IE_DESC = 'vier.be and vijf.be'
|
||||||
_VALID_URL = r'''(?x)
|
_VALID_URL = r'''(?x)
|
||||||
https?://
|
https?://
|
||||||
(?:www\.)?(?P<site>vier|vijf)\.be/
|
(?:www\.)?(?P<site>vier|vijf|goplay)\.be/
|
||||||
(?:
|
(?:
|
||||||
(?:
|
(?:
|
||||||
[^/]+/videos|
|
[^/]+/videos
|
||||||
video(?:/[^/]+)*
|
|
||||||
)/
|
)/
|
||||||
(?P<display_id>[^/]+)(?:/(?P<id>\d+))?|
|
(?P<display_id>[^/]+)(?:/(?P<id>\d+))?|
|
||||||
(?:
|
(?:
|
||||||
@ -100,12 +202,6 @@ class VierIE(InfoExtractor):
|
|||||||
}, {
|
}, {
|
||||||
'url': 'https://www.vijf.be/embed/video/public/4093',
|
'url': 'https://www.vijf.be/embed/video/public/4093',
|
||||||
'only_matching': True,
|
'only_matching': True,
|
||||||
}, {
|
|
||||||
'url': 'https://www.vier.be/video/blockbusters/in-juli-en-augustus-summer-classics',
|
|
||||||
'only_matching': True,
|
|
||||||
}, {
|
|
||||||
'url': 'https://www.vier.be/video/achter-de-rug/2017/achter-de-rug-seizoen-1-aflevering-6',
|
|
||||||
'only_matching': True,
|
|
||||||
}]
|
}]
|
||||||
|
|
||||||
def _real_initialize(self):
|
def _real_initialize(self):
|
||||||
|
320
youtube_dl/extractor/vier_auth_aws.py
Normal file
320
youtube_dl/extractor/vier_auth_aws.py
Normal file
@ -0,0 +1,320 @@
|
|||||||
|
# coding: utf-8
|
||||||
|
from __future__ import absolute_import, division, unicode_literals
|
||||||
|
|
||||||
|
# Taken from https://github.com/add-ons/plugin.video.viervijfzes/blob/master/resources/lib/viervijfzes/auth_awsidp.py
|
||||||
|
# with some small modifications (replacement of six and requests, removal of unused function, reformatting)
|
||||||
|
# This file is licensed as GPL-3 from https://github.com/add-ons/plugin.video.viervijfzes:
|
||||||
|
# https://github.com/add-ons/plugin.video.viervijfzes/blob/master/LICENSE
|
||||||
|
|
||||||
|
# Amazon Cognito implementation without external dependencies
|
||||||
|
# Based on https://github.com/retrospect-addon/plugin.video.retrospect/blob/master/channels/channel.be/vier/awsidp.py
|
||||||
|
|
||||||
|
import base64
|
||||||
|
import binascii
|
||||||
|
import datetime
|
||||||
|
import hashlib
|
||||||
|
import hmac
|
||||||
|
import json
|
||||||
|
import os
|
||||||
|
|
||||||
|
from ..compat import compat_basestring, compat_urllib_request
|
||||||
|
|
||||||
|
|
||||||
|
class InvalidLoginException(Exception):
|
||||||
|
""" The login credentials are invalid """
|
||||||
|
|
||||||
|
|
||||||
|
class AuthenticationException(Exception):
|
||||||
|
""" Something went wrong while logging in """
|
||||||
|
|
||||||
|
|
||||||
|
class AwsIdp:
|
||||||
|
""" AWS Identity Provider """
|
||||||
|
|
||||||
|
def __init__(self, pool_id, client_id):
|
||||||
|
"""
|
||||||
|
:param str pool_id: The AWS user pool to connect to (format: <region>_<poolid>).
|
||||||
|
E.g.: eu-west-1_aLkOfYN3T
|
||||||
|
:param str client_id: The client application ID (the ID of the application connecting)
|
||||||
|
"""
|
||||||
|
|
||||||
|
self.pool_id = pool_id
|
||||||
|
if "_" not in self.pool_id:
|
||||||
|
raise ValueError("Invalid pool_id format. Should be <region>_<poolid>.")
|
||||||
|
|
||||||
|
self.client_id = client_id
|
||||||
|
self.region = self.pool_id.split("_")[0]
|
||||||
|
self.url = "https://cognito-idp.%s.amazonaws.com/" % (self.region,)
|
||||||
|
|
||||||
|
# Initialize the values
|
||||||
|
# https://github.com/aws/amazon-cognito-identity-js/blob/master/src/AuthenticationHelper.js#L22
|
||||||
|
self.n_hex = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1' + \
|
||||||
|
'29024E088A67CC74020BBEA63B139B22514A08798E3404DD' + \
|
||||||
|
'EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245' + \
|
||||||
|
'E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' + \
|
||||||
|
'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D' + \
|
||||||
|
'C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F' + \
|
||||||
|
'83655D23DCA3AD961C62F356208552BB9ED529077096966D' + \
|
||||||
|
'670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B' + \
|
||||||
|
'E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9' + \
|
||||||
|
'DE2BCBF6955817183995497CEA956AE515D2261898FA0510' + \
|
||||||
|
'15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64' + \
|
||||||
|
'ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7' + \
|
||||||
|
'ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B' + \
|
||||||
|
'F12FFA06D98A0864D87602733EC86A64521F2B18177B200C' + \
|
||||||
|
'BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31' + \
|
||||||
|
'43DB5BFCE0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF'
|
||||||
|
|
||||||
|
# https://github.com/aws/amazon-cognito-identity-js/blob/master/src/AuthenticationHelper.js#L49
|
||||||
|
self.g_hex = '2'
|
||||||
|
self.info_bits = bytearray('Caldera Derived Key', 'utf-8')
|
||||||
|
|
||||||
|
self.big_n = self.__hex_to_long(self.n_hex)
|
||||||
|
self.g = self.__hex_to_long(self.g_hex) # pylint: disable=invalid-name
|
||||||
|
self.k = self.__hex_to_long(self.__hex_hash('00' + self.n_hex + '0' + self.g_hex)) # pylint: disable=invalid-name
|
||||||
|
self.small_a_value = self.__generate_random_small_a()
|
||||||
|
self.large_a_value = self.__calculate_a()
|
||||||
|
|
||||||
|
def authenticate(self, username, password):
|
||||||
|
""" Authenticate with a username and password. """
|
||||||
|
# Step 1: First initiate an authentication request
|
||||||
|
auth_data_dict = self.__get_authentication_request(username)
|
||||||
|
auth_data = json.dumps(auth_data_dict).encode("utf-8")
|
||||||
|
auth_headers = {
|
||||||
|
"X-Amz-Target": "AWSCognitoIdentityProviderService.InitiateAuth",
|
||||||
|
"Accept-Encoding": "identity",
|
||||||
|
"Content-Type": "application/x-amz-json-1.1"
|
||||||
|
}
|
||||||
|
auth_request = compat_urllib_request.Request(url=self.url, data=auth_data, headers=auth_headers)
|
||||||
|
auth_response = compat_urllib_request.urlopen(auth_request).read()
|
||||||
|
auth_response_json = json.loads(auth_response.decode("utf-8"))
|
||||||
|
challenge_parameters = auth_response_json.get("ChallengeParameters")
|
||||||
|
|
||||||
|
challenge_name = auth_response_json.get("ChallengeName")
|
||||||
|
if not challenge_name == "PASSWORD_VERIFIER":
|
||||||
|
raise AuthenticationException(auth_response_json.get("message"))
|
||||||
|
|
||||||
|
# Step 2: Respond to the Challenge with a valid ChallengeResponse
|
||||||
|
challenge_request = self.__get_challenge_response_request(challenge_parameters, password)
|
||||||
|
challenge_data = json.dumps(challenge_request).encode("utf-8")
|
||||||
|
challenge_headers = {
|
||||||
|
"X-Amz-Target": "AWSCognitoIdentityProviderService.RespondToAuthChallenge",
|
||||||
|
"Content-Type": "application/x-amz-json-1.1"
|
||||||
|
}
|
||||||
|
auth_request = compat_urllib_request.Request(url=self.url, data=challenge_data, headers=challenge_headers)
|
||||||
|
auth_response = compat_urllib_request.urlopen(auth_request).read()
|
||||||
|
auth_response_json = json.loads(auth_response.decode("utf-8"))
|
||||||
|
|
||||||
|
if "message" in auth_response_json:
|
||||||
|
raise InvalidLoginException(auth_response_json.get("message"))
|
||||||
|
|
||||||
|
id_token = auth_response_json.get("AuthenticationResult", {}).get("IdToken")
|
||||||
|
refresh_token = auth_response_json.get("AuthenticationResult", {}).get("RefreshToken")
|
||||||
|
return id_token, refresh_token
|
||||||
|
|
||||||
|
def __get_authentication_request(self, username):
|
||||||
|
"""
|
||||||
|
|
||||||
|
:param str username: The username to use
|
||||||
|
|
||||||
|
:return: A full Authorization request.
|
||||||
|
:rtype: dict
|
||||||
|
"""
|
||||||
|
auth_request = {
|
||||||
|
"AuthParameters": {
|
||||||
|
"USERNAME": username,
|
||||||
|
"SRP_A": self.__long_to_hex(self.large_a_value)
|
||||||
|
},
|
||||||
|
"AuthFlow": "USER_SRP_AUTH",
|
||||||
|
"ClientId": self.client_id
|
||||||
|
}
|
||||||
|
return auth_request
|
||||||
|
|
||||||
|
def __get_challenge_response_request(self, challenge_parameters, password):
|
||||||
|
""" Create a Challenge Response Request object.
|
||||||
|
|
||||||
|
:param dict[str,str|imt] challenge_parameters: The parameters for the challenge.
|
||||||
|
:param str password: The password.
|
||||||
|
|
||||||
|
:return: A valid and full request data object to use as a response for a challenge.
|
||||||
|
:rtype: dict
|
||||||
|
"""
|
||||||
|
user_id = challenge_parameters["USERNAME"]
|
||||||
|
user_id_for_srp = challenge_parameters["USER_ID_FOR_SRP"]
|
||||||
|
srp_b = challenge_parameters["SRP_B"]
|
||||||
|
salt = challenge_parameters["SALT"]
|
||||||
|
secret_block = challenge_parameters["SECRET_BLOCK"]
|
||||||
|
|
||||||
|
timestamp = self.__get_current_timestamp()
|
||||||
|
|
||||||
|
# Get a HKDF key for the password, SrpB and the Salt
|
||||||
|
hkdf = self.__get_hkdf_key_for_password(
|
||||||
|
user_id_for_srp,
|
||||||
|
password,
|
||||||
|
self.__hex_to_long(srp_b),
|
||||||
|
salt
|
||||||
|
)
|
||||||
|
secret_block_bytes = base64.standard_b64decode(secret_block)
|
||||||
|
|
||||||
|
# the message is a combo of the pool_id, provided SRP userId, the Secret and Timestamp
|
||||||
|
msg = \
|
||||||
|
bytearray(self.pool_id.split('_')[1], 'utf-8') + \
|
||||||
|
bytearray(user_id_for_srp, 'utf-8') + \
|
||||||
|
bytearray(secret_block_bytes) + \
|
||||||
|
bytearray(timestamp, 'utf-8')
|
||||||
|
hmac_obj = hmac.new(hkdf, msg, digestmod=hashlib.sha256)
|
||||||
|
signature_string = base64.standard_b64encode(hmac_obj.digest()).decode('utf-8')
|
||||||
|
challenge_request = {
|
||||||
|
"ChallengeResponses": {
|
||||||
|
"USERNAME": user_id,
|
||||||
|
"TIMESTAMP": timestamp,
|
||||||
|
"PASSWORD_CLAIM_SECRET_BLOCK": secret_block,
|
||||||
|
"PASSWORD_CLAIM_SIGNATURE": signature_string
|
||||||
|
},
|
||||||
|
"ChallengeName": "PASSWORD_VERIFIER",
|
||||||
|
"ClientId": self.client_id
|
||||||
|
}
|
||||||
|
return challenge_request
|
||||||
|
|
||||||
|
def __get_hkdf_key_for_password(self, username, password, server_b_value, salt):
|
||||||
|
""" Calculates the final hkdf based on computed S value, and computed U value and the key.
|
||||||
|
|
||||||
|
:param str username: Username.
|
||||||
|
:param str password: Password.
|
||||||
|
:param int server_b_value: Server B value.
|
||||||
|
:param int salt: Generated salt.
|
||||||
|
|
||||||
|
:return Computed HKDF value.
|
||||||
|
:rtype: object
|
||||||
|
"""
|
||||||
|
|
||||||
|
u_value = self.__calculate_u(self.large_a_value, server_b_value)
|
||||||
|
if u_value == 0:
|
||||||
|
raise ValueError('U cannot be zero.')
|
||||||
|
username_password = '%s%s:%s' % (self.pool_id.split('_')[1], username, password)
|
||||||
|
username_password_hash = self.__hash_sha256(username_password.encode('utf-8'))
|
||||||
|
|
||||||
|
x_value = self.__hex_to_long(self.__hex_hash(self.__pad_hex(salt) + username_password_hash))
|
||||||
|
g_mod_pow_xn = pow(self.g, x_value, self.big_n)
|
||||||
|
int_value2 = server_b_value - self.k * g_mod_pow_xn
|
||||||
|
s_value = pow(int_value2, self.small_a_value + u_value * x_value, self.big_n)
|
||||||
|
hkdf = self.__compute_hkdf(
|
||||||
|
bytearray.fromhex(self.__pad_hex(s_value)),
|
||||||
|
bytearray.fromhex(self.__pad_hex(self.__long_to_hex(u_value)))
|
||||||
|
)
|
||||||
|
return hkdf
|
||||||
|
|
||||||
|
def __compute_hkdf(self, ikm, salt):
|
||||||
|
""" Standard hkdf algorithm
|
||||||
|
|
||||||
|
:param {Buffer} ikm Input key material.
|
||||||
|
:param {Buffer} salt Salt value.
|
||||||
|
:return {Buffer} Strong key material.
|
||||||
|
"""
|
||||||
|
|
||||||
|
prk = hmac.new(salt, ikm, hashlib.sha256).digest()
|
||||||
|
info_bits_update = self.info_bits + bytearray(chr(1), 'utf-8')
|
||||||
|
hmac_hash = hmac.new(prk, info_bits_update, hashlib.sha256).digest()
|
||||||
|
return hmac_hash[:16]
|
||||||
|
|
||||||
|
def __calculate_u(self, big_a, big_b):
|
||||||
|
""" Calculate the client's value U which is the hash of A and B
|
||||||
|
|
||||||
|
:param int big_a: Large A value.
|
||||||
|
:param int big_b: Server B value.
|
||||||
|
|
||||||
|
:return Computed U value.
|
||||||
|
:rtype: int
|
||||||
|
"""
|
||||||
|
|
||||||
|
u_hex_hash = self.__hex_hash(self.__pad_hex(big_a) + self.__pad_hex(big_b))
|
||||||
|
return self.__hex_to_long(u_hex_hash)
|
||||||
|
|
||||||
|
def __generate_random_small_a(self):
|
||||||
|
""" Helper function to generate a random big integer
|
||||||
|
|
||||||
|
:return a random value.
|
||||||
|
:rtype: int
|
||||||
|
"""
|
||||||
|
random_long_int = self.__get_random(128)
|
||||||
|
return random_long_int % self.big_n
|
||||||
|
|
||||||
|
def __calculate_a(self):
|
||||||
|
""" Calculate the client's public value A = g^a%N with the generated random number a
|
||||||
|
|
||||||
|
:return Computed large A.
|
||||||
|
:rtype: int
|
||||||
|
"""
|
||||||
|
|
||||||
|
big_a = pow(self.g, self.small_a_value, self.big_n)
|
||||||
|
# safety check
|
||||||
|
if (big_a % self.big_n) == 0:
|
||||||
|
raise ValueError('Safety check for A failed')
|
||||||
|
return big_a
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def __long_to_hex(long_num):
|
||||||
|
return '%x' % long_num
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def __hex_to_long(hex_string):
|
||||||
|
return int(hex_string, 16)
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def __hex_hash(hex_string):
|
||||||
|
return AwsIdp.__hash_sha256(bytearray.fromhex(hex_string))
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def __hash_sha256(buf):
|
||||||
|
"""AuthenticationHelper.hash"""
|
||||||
|
digest = hashlib.sha256(buf).hexdigest()
|
||||||
|
return (64 - len(digest)) * '0' + digest
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def __pad_hex(long_int):
|
||||||
|
""" Converts a Long integer (or hex string) to hex format padded with zeroes for hashing
|
||||||
|
|
||||||
|
:param int|str long_int: Number or string to pad.
|
||||||
|
|
||||||
|
:return Padded hex string.
|
||||||
|
:rtype: str
|
||||||
|
"""
|
||||||
|
|
||||||
|
# noinspection PyTypeChecker
|
||||||
|
if not isinstance(long_int, compat_basestring):
|
||||||
|
hash_str = AwsIdp.__long_to_hex(long_int)
|
||||||
|
else:
|
||||||
|
hash_str = long_int
|
||||||
|
if len(hash_str) % 2 == 1:
|
||||||
|
hash_str = '0%s' % hash_str
|
||||||
|
elif hash_str[0] in '89ABCDEFabcdef':
|
||||||
|
hash_str = '00%s' % hash_str
|
||||||
|
return hash_str
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def __get_random(nbytes):
|
||||||
|
random_hex = binascii.hexlify(os.urandom(nbytes))
|
||||||
|
return AwsIdp.__hex_to_long(random_hex)
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def __get_current_timestamp():
|
||||||
|
""" Creates a timestamp with the correct English format.
|
||||||
|
|
||||||
|
:return: timestamp in format 'Sun Jan 27 19:00:04 UTC 2019'
|
||||||
|
:rtype: str
|
||||||
|
"""
|
||||||
|
|
||||||
|
# We need US only data, so we cannot just do a strftime:
|
||||||
|
# Sun Jan 27 19:00:04 UTC 2019
|
||||||
|
months = [None, 'Jan', 'Feb', 'Mar', 'Apr', 'May', 'Jun', 'Jul', 'Aug', 'Sep', 'Oct', 'Nov', 'Dec']
|
||||||
|
days = ['Mon', 'Tue', 'Wed', 'Thu', 'Fri', 'Sat', 'Sun']
|
||||||
|
|
||||||
|
time_now = datetime.datetime.utcnow()
|
||||||
|
format_string = "{} {} {} %H:%M:%S UTC %Y".format(days[time_now.weekday()], months[time_now.month], time_now.day)
|
||||||
|
time_string = datetime.datetime.utcnow().strftime(format_string)
|
||||||
|
return time_string
|
||||||
|
|
||||||
|
def __str__(self):
|
||||||
|
return "AWS IDP Client for:\nRegion: %s\nPoolId: %s\nAppId: %s" % (
|
||||||
|
self.region, self.pool_id.split("_")[1], self.client_id
|
||||||
|
)
|
@ -1659,17 +1659,46 @@ class YoutubeIE(YoutubeBaseInfoExtractor):
|
|||||||
def _extract_n_function_name(self, jscode):
|
def _extract_n_function_name(self, jscode):
|
||||||
func_name, idx = self._search_regex(
|
func_name, idx = self._search_regex(
|
||||||
# new: (b=String.fromCharCode(110),c=a.get(b))&&c=nfunc[idx](c)
|
# new: (b=String.fromCharCode(110),c=a.get(b))&&c=nfunc[idx](c)
|
||||||
# or: (b="nn"[+a.D],c=a.get(b))&&(c=nfunc[idx](c)s
|
# or: (b="nn"[+a.D],c=a.get(b))&&(c=nfunc[idx](c)
|
||||||
# old: .get("n"))&&(b=nfunc[idx](b)
|
# or: (PL(a),b=a.j.n||null)&&(b=nfunc[idx](b)
|
||||||
# older: .get("n"))&&(b=nfunc(b)
|
# or: (b="nn"[+a.D],vL(a),c=a.j[b]||null)&&(c=narray[idx](c),a.set(b,c),narray.length||nfunc("")
|
||||||
|
# old: (b=a.get("n"))&&(b=nfunc[idx](b)(?P<c>[a-z])\s*=\s*[a-z]\s*
|
||||||
|
# older: (b=a.get("n"))&&(b=nfunc(b)
|
||||||
r'''(?x)
|
r'''(?x)
|
||||||
(?:\(\s*(?P<b>[a-z])\s*=\s*(?:
|
\((?:[\w$()\s]+,)*?\s* # (
|
||||||
|
(?P<b>[a-z])\s*=\s* # b=
|
||||||
|
(?:
|
||||||
|
(?: # expect ,c=a.get(b) (etc)
|
||||||
String\s*\.\s*fromCharCode\s*\(\s*110\s*\)|
|
String\s*\.\s*fromCharCode\s*\(\s*110\s*\)|
|
||||||
"n+"\[\s*\+?s*[\w$.]+\s*]
|
"n+"\[\s*\+?s*[\w$.]+\s*]
|
||||||
)\s*,(?P<c>[a-z])\s*=\s*[a-z]\s*)?
|
)\s*(?:,[\w$()\s]+(?=,))*|
|
||||||
\.\s*get\s*\(\s*(?(b)(?P=b)|"n{1,2}")(?:\s*\)){2}\s*&&\s*\(\s*(?(c)(?P=c)|b)\s*=\s*
|
(?P<old>[\w$]+) # a (old[er])
|
||||||
|
)\s*
|
||||||
|
(?(old)
|
||||||
|
# b.get("n")
|
||||||
|
(?:\.\s*[\w$]+\s*|\[\s*[\w$]+\s*]\s*)*?
|
||||||
|
(?:\.\s*n|\[\s*"n"\s*]|\.\s*get\s*\(\s*"n"\s*\))
|
||||||
|
| # ,c=a.get(b)
|
||||||
|
,\s*(?P<c>[a-z])\s*=\s*[a-z]\s*
|
||||||
|
(?:\.\s*[\w$]+\s*|\[\s*[\w$]+\s*]\s*)*?
|
||||||
|
(?:\[\s*(?P=b)\s*]|\.\s*get\s*\(\s*(?P=b)\s*\))
|
||||||
|
)
|
||||||
|
# interstitial junk
|
||||||
|
\s*(?:\|\|\s*null\s*)?(?:\)\s*)?&&\s*(?:\(\s*)?
|
||||||
|
(?(c)(?P=c)|(?P=b))\s*=\s* # [c|b]=
|
||||||
|
# nfunc|nfunc[idx]
|
||||||
(?P<nfunc>[a-zA-Z_$][\w$]*)(?:\s*\[(?P<idx>\d+)\])?\s*\(\s*[\w$]+\s*\)
|
(?P<nfunc>[a-zA-Z_$][\w$]*)(?:\s*\[(?P<idx>\d+)\])?\s*\(\s*[\w$]+\s*\)
|
||||||
''', jscode, 'Initial JS player n function name', group=('nfunc', 'idx'))
|
''', jscode, 'Initial JS player n function name', group=('nfunc', 'idx'),
|
||||||
|
default=(None, None))
|
||||||
|
# thx bashonly: yt-dlp/yt-dlp/pull/10611
|
||||||
|
if not func_name:
|
||||||
|
self.report_warning('Falling back to generic n function search')
|
||||||
|
return self._search_regex(
|
||||||
|
r'''(?xs)
|
||||||
|
(?:(?<=[^\w$])|^) # instead of \b, which ignores $
|
||||||
|
(?P<name>(?!\d)[a-zA-Z\d_$]+)\s*=\s*function\((?!\d)[a-zA-Z\d_$]+\)
|
||||||
|
\s*\{(?:(?!};).)+?["']enhanced_except_
|
||||||
|
''', jscode, 'Initial JS player n function name', group='name')
|
||||||
if not idx:
|
if not idx:
|
||||||
return func_name
|
return func_name
|
||||||
|
|
||||||
|
@ -925,9 +925,16 @@ class JSInterpreter(object):
|
|||||||
obj.reverse()
|
obj.reverse()
|
||||||
return obj
|
return obj
|
||||||
elif member == 'slice':
|
elif member == 'slice':
|
||||||
assertion(isinstance(obj, list), 'must be applied on a list')
|
assertion(isinstance(obj, (list, compat_str)), 'must be applied on a list or string')
|
||||||
assertion(len(argvals) == 1, 'takes exactly one argument')
|
# From [1]:
|
||||||
return obj[argvals[0]:]
|
# .slice() - like [:]
|
||||||
|
# .slice(n) - like [n:] (not [slice(n)]
|
||||||
|
# .slice(m, n) - like [m:n] or [slice(m, n)]
|
||||||
|
# [1] https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Array/slice
|
||||||
|
assertion(len(argvals) <= 2, 'takes between 0 and 2 arguments')
|
||||||
|
if len(argvals) < 2:
|
||||||
|
argvals += (None,)
|
||||||
|
return obj[slice(*argvals)]
|
||||||
elif member == 'splice':
|
elif member == 'splice':
|
||||||
assertion(isinstance(obj, list), 'must be applied on a list')
|
assertion(isinstance(obj, list), 'must be applied on a list')
|
||||||
assertion(argvals, 'takes one or more arguments')
|
assertion(argvals, 'takes one or more arguments')
|
||||||
|
Loading…
Reference in New Issue
Block a user