adobepass.py 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. # -*- coding: utf-8 -*-
  2. from __future__ import unicode_literals
  3. import re
  4. import time
  5. import xml.etree.ElementTree as etree
  6. from .common import InfoExtractor
  7. from ..compat import compat_urlparse
  8. from ..utils import (
  9. unescapeHTML,
  10. urlencode_postdata,
  11. unified_timestamp,
  12. ExtractorError,
  13. )
  14. class AdobePassIE(InfoExtractor):
  15. _SERVICE_PROVIDER_TEMPLATE = 'https://sp.auth.adobe.com/adobe-services/%s'
  16. _USER_AGENT = 'Mozilla/5.0 (X11; Linux i686; rv:47.0) Gecko/20100101 Firefox/47.0'
  17. @staticmethod
  18. def _get_mvpd_resource(provider_id, title, guid, rating):
  19. channel = etree.Element('channel')
  20. channel_title = etree.SubElement(channel, 'title')
  21. channel_title.text = provider_id
  22. item = etree.SubElement(channel, 'item')
  23. resource_title = etree.SubElement(item, 'title')
  24. resource_title.text = title
  25. resource_guid = etree.SubElement(item, 'guid')
  26. resource_guid.text = guid
  27. resource_rating = etree.SubElement(item, 'media:rating')
  28. resource_rating.attrib = {'scheme': 'urn:v-chip'}
  29. resource_rating.text = rating
  30. return '<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">' + etree.tostring(channel).decode() + '</rss>'
  31. def _extract_mvpd_auth(self, url, video_id, requestor_id, resource):
  32. def xml_text(xml_str, tag):
  33. return self._search_regex(
  34. '<%s>(.+?)</%s>' % (tag, tag), xml_str, tag)
  35. def is_expired(token, date_ele):
  36. token_expires = unified_timestamp(re.sub(r'[_ ]GMT', '', xml_text(token, date_ele)))
  37. return token_expires and token_expires <= int(time.time())
  38. def raise_mvpd_required():
  39. raise ExtractorError('This video is only available for users of participating TV providers. '
  40. 'Use --ap-mso-id to specify Adobe Pass Multiple-system operator Identifier '
  41. 'and --netrc to provide account credentials.', expected=True)
  42. mvpd_headers = {
  43. 'ap_42': 'anonymous',
  44. 'ap_11': 'Linux i686',
  45. 'ap_z': self._USER_AGENT,
  46. 'User-Agent': self._USER_AGENT,
  47. }
  48. guid = xml_text(resource, 'guid')
  49. requestor_info = self._downloader.cache.load('mvpd', requestor_id) or {}
  50. authn_token = requestor_info.get('authn_token')
  51. if authn_token and is_expired(authn_token, 'simpleTokenExpires'):
  52. authn_token = None
  53. if not authn_token:
  54. # TODO add support for other TV Providers
  55. mso_id = self._downloader.params.get('ap_mso_id')
  56. if not mso_id:
  57. raise_mvpd_required()
  58. username, password = self._get_netrc_login_info(mso_id)
  59. if not username or not password:
  60. return raise_mvpd_required()
  61. def post_form(form_page_res, note, data={}):
  62. form_page, urlh = form_page_res
  63. post_url = self._html_search_regex(r'<form[^>]+action=(["\'])(?P<url>.+?)\1', form_page, 'post url', group='url')
  64. if not re.match(r'https?://', post_url):
  65. post_url = compat_urlparse.urljoin(urlh.geturl(), post_url)
  66. form_data = self._hidden_inputs(form_page)
  67. form_data.update(data)
  68. return self._download_webpage_handle(
  69. post_url, video_id, note, data=urlencode_postdata(form_data), headers={
  70. 'Content-Type': 'application/x-www-form-urlencoded',
  71. })
  72. provider_redirect_page_res = self._download_webpage_handle(
  73. self._SERVICE_PROVIDER_TEMPLATE % 'authenticate/saml', video_id,
  74. 'Downloading Provider Redirect Page', query={
  75. 'noflash': 'true',
  76. 'mso_id': mso_id,
  77. 'requestor_id': requestor_id,
  78. 'no_iframe': 'false',
  79. 'domain_name': 'adobe.com',
  80. 'redirect_url': url,
  81. })
  82. provider_login_page_res = post_form(
  83. provider_redirect_page_res, 'Downloading Provider Login Page')
  84. login_data = {}
  85. if mso_id == 'DTV':
  86. login_data = {
  87. 'username': username,
  88. 'password': password,
  89. }
  90. elif mso_id == 'Rogers':
  91. login_data = {
  92. 'UserName': username,
  93. 'UserPassword': password,
  94. }
  95. mvpd_confirm_page_res = post_form(provider_login_page_res, 'Logging in', login_data)
  96. if mso_id == 'DTV':
  97. post_form(mvpd_confirm_page_res, 'Confirming Login')
  98. session = self._download_webpage(
  99. self._SERVICE_PROVIDER_TEMPLATE % 'session', video_id,
  100. 'Retrieving Session', data=urlencode_postdata({
  101. '_method': 'GET',
  102. 'requestor_id': requestor_id,
  103. }), headers=mvpd_headers)
  104. if '<pendingLogout' in session:
  105. self._downloader.cache.store('mvpd', requestor_id, {})
  106. return self._extract_mvpd_auth(url, video_id, requestor_id, resource)
  107. authn_token = unescapeHTML(xml_text(session, 'authnToken'))
  108. requestor_info['authn_token'] = authn_token
  109. self._downloader.cache.store('mvpd', requestor_id, requestor_info)
  110. authz_token = requestor_info.get(guid)
  111. if authz_token and is_expired(authz_token, 'simpleTokenTTL'):
  112. authz_token = None
  113. if not authz_token:
  114. authorize = self._download_webpage(
  115. self._SERVICE_PROVIDER_TEMPLATE % 'authorize', video_id,
  116. 'Retrieving Authorization Token', data=urlencode_postdata({
  117. 'resource_id': resource,
  118. 'requestor_id': requestor_id,
  119. 'authentication_token': authn_token,
  120. 'mso_id': xml_text(authn_token, 'simpleTokenMsoID'),
  121. 'userMeta': '1',
  122. }), headers=mvpd_headers)
  123. if '<pendingLogout' in authorize:
  124. self._downloader.cache.store('mvpd', requestor_id, {})
  125. return self._extract_mvpd_auth(url, video_id, requestor_id, resource)
  126. authz_token = unescapeHTML(xml_text(authorize, 'authzToken'))
  127. requestor_info[guid] = authz_token
  128. self._downloader.cache.store('mvpd', requestor_id, requestor_info)
  129. mvpd_headers.update({
  130. 'ap_19': xml_text(authn_token, 'simpleSamlNameID'),
  131. 'ap_23': xml_text(authn_token, 'simpleSamlSessionIndex'),
  132. })
  133. short_authorize = self._download_webpage(
  134. self._SERVICE_PROVIDER_TEMPLATE % 'shortAuthorize',
  135. video_id, 'Retrieving Media Token', data=urlencode_postdata({
  136. 'authz_token': authz_token,
  137. 'requestor_id': requestor_id,
  138. 'session_guid': xml_text(authn_token, 'simpleTokenAuthenticationGuid'),
  139. 'hashed_guid': 'false',
  140. }), headers=mvpd_headers)
  141. if '<pendingLogout' in short_authorize:
  142. self._downloader.cache.store('mvpd', requestor_id, {})
  143. return self._extract_mvpd_auth(url, video_id, requestor_id, resource)
  144. return short_authorize