v2024.11.06
This commit is contained in:
parent
1f87d598a4
commit
808d64768b
118 changed files with 28958 additions and 0 deletions
634
hosts/dailyuploads.sh
Executable file
634
hosts/dailyuploads.sh
Executable file
|
|
@ -0,0 +1,634 @@
|
|||
#! Name: dailyuploads.sh
|
||||
#! Author: kittykat
|
||||
#! Version: 2024.10.13
|
||||
#! Desc: Add support for downloading and processing of urls for a new host
|
||||
#! Usage: Copy this file into the ./${ScriptDir}/hosts/ folder
|
||||
#!
|
||||
#!
|
||||
#! ------------ REQUIRED SECTION ---------------
|
||||
#! @[UPDATE] HostAndDomainRegexes: This string is loaded into mad.sh and allows dynamic handling of new url data
|
||||
#! Format: '/HostCode/HostNick/HostFuncPrefix:HostDomainRegex@'
|
||||
#! HostCode: <aUniqueCodeForHost> (ie. 'fh' for filehaus -- cannot be used by other hosts)
|
||||
#! HostNick: What is displayed throughout MAD output (ie. 'filehaus' -- "urls.txt has 10 filehaus.." will be displayed)
|
||||
#! HostFuncPrefix: <aUniqueStringThatMustPrefixHostFunctions> (ie. 'fh' -- fh_DownloadFile(), fh_FetchFileInfo() .. )
|
||||
#! * Note: Must begin with a letter a-z (functions beginning with numbers are no bueno)
|
||||
#! HostDomainRegex: The regex used to verify matching urls
|
||||
HostCode='daily'
|
||||
HostNick='dailyuploads'
|
||||
HostFuncPrefix='daily'
|
||||
HostUrls='dailyuploads.net'
|
||||
HostDomainRegex='^(http|https)://(.*\.)?dailyuploads\.net/'
|
||||
#!
|
||||
#! !! DO NOT UPDATE OR REMOVE !!
|
||||
#! This merges the Required HostAndDomainRegexes into mad.sh
|
||||
ListHostAndDomainRegexes=${ListHostAndDomainRegexes}'/'${HostCode}'/'${HostNick}'/'${HostFuncPrefix}'/'${HostUrls}':'${HostDomainRegex}'@'
|
||||
#!
|
||||
#!
|
||||
#! ------------ (1) Host Main Download Function --------------- #
|
||||
#!
|
||||
#! @REQUIRED: Host Main Download function
|
||||
#! Must be named specifically as such:
|
||||
#! <HostFuncPrefix>_DownloadFile()
|
||||
daily_DownloadFile() {
|
||||
if ! grep -Eq "ocr_captcha.sh" <<< "$LoadPlugins" ; then
|
||||
echo -e "${RED}| The host dailyuploads requires OcrCaptcha.sh plugin + dependencies.${NC}"
|
||||
failedRetryDownload "${remote_url}" "The host dailyuploads requires OcrCaptcha.sh plugin + dependencies."
|
||||
return 0
|
||||
fi
|
||||
local remote_url=${1}
|
||||
local file_url=${1}
|
||||
local filecnt=${2}
|
||||
warnAndRetryUnknownError=false
|
||||
exitDownloadError=false
|
||||
exitDownloadNotAvailable=false
|
||||
fileAlreadyDone=false
|
||||
daily_recaptcha_detected=false
|
||||
download_inflight_path="${WorkDir}/.inflight/"
|
||||
mkdir -p "$download_inflight_path"
|
||||
completed_location="${WorkDir}/downloads/"
|
||||
tor_identity="${RANDOM}"
|
||||
finalAttempt="false"
|
||||
for ((z=0; z<=$MaxUrlRetries; z++)); do
|
||||
if [ $z -eq $MaxUrlRetries ] ; then
|
||||
finalAttempt="true"
|
||||
fi
|
||||
CLEANSTRING=${remote_url//[^a-zA-Z0-9]/}
|
||||
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
|
||||
if daily_FetchFileInfo $finalAttempt && daily_GetFile "${filecnt}" $((z+1)) $finalAttempt ; then
|
||||
return 0
|
||||
elif [ $z -lt $MaxUrlRetries ]; then
|
||||
if [ "${fileAlreadyDone}" == "true" ] ; then
|
||||
break
|
||||
fi
|
||||
if [[ "${warnAndRetryUnknownError}" == "true" ]] ; then
|
||||
if [ "${DebugAllEnabled}" == "true" ] ; then
|
||||
debugHtml "${remote_url##*/}" "error" "Retry due to an unknown issue: attempt #$((z+1)) of ${MaxUrlRetries}"
|
||||
fi
|
||||
fi
|
||||
if [[ "${exitDownloadError}" == "true" || "${exitDownloadNotAvailable}" == "true" ]] ; then
|
||||
if [ "${DebugAllEnabled}" == "true" ] ; then
|
||||
debugHtml "${remote_url##*/}" "error" "Exit due to unrecoverable issue"
|
||||
fi
|
||||
rm -f "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}"
|
||||
break
|
||||
fi
|
||||
echo -e "\n${YELLOW}A recoverable error occurred, retry attempt $((z+1))/${MaxUrlRetries}${NC}"
|
||||
sleep 3
|
||||
fi
|
||||
done
|
||||
rm -f "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}"
|
||||
}
|
||||
#!
|
||||
#! ------------- (2) Fetch File Info Function ----------------- #
|
||||
#!
|
||||
daily_FetchFileInfo() {
|
||||
finalAttempt=$1
|
||||
maxfetchretries=16
|
||||
daily_cookie_jar=""
|
||||
fixed_url=${remote_url}
|
||||
echo -e "${GREEN}# Fetching post info / processing captcha…${NC}"
|
||||
for ((i=1; i<=$maxfetchretries; i++)); do
|
||||
mkdir -p "${WorkDir}/.temp"
|
||||
daily_cookie_jar=$(mktemp "${WorkDir}/.temp/daily_cookies""${instance_no}"".XXXXXX")
|
||||
printf " ."
|
||||
tor_identity="${RANDOM}"
|
||||
CLEANSTRING=${remote_url//[^a-zA-Z0-9]/}
|
||||
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f ${daily_cookie_jar}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
|
||||
response=$(tor_curl_request --insecure -L -s -b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \
|
||||
-w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \
|
||||
"$fixed_url")
|
||||
if [ "${DebugAllEnabled}" == "true" ] ; then
|
||||
debugHtml "${remote_url##*/}" "daily_fetch$i" "${response}"
|
||||
fi
|
||||
if [[ -z $response ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [1].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
if grep -Eqi 'File Not Found|No such file with this filename|File was deleted|<table id="error_message"' <<< "$response"; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| The file was not found. It could be deleted or expired.${NC}"
|
||||
exitDownloadError=true
|
||||
removedDownload "${remote_url}"
|
||||
return 1
|
||||
fi
|
||||
if grep -Eqi 'img src="https://dailyuploads.net/captchas/' <<< "$response" ; then
|
||||
if grep -Eqi 'EFFECTIVE_URL:' <<< "$response" ; then
|
||||
fixed_url=$(grep -oP 'EFFECTIVE_URL: \K.*$' <<< "${response}")
|
||||
fixed_url=${fixed_url//[$'\t\r\n']}
|
||||
fi
|
||||
if ! grep -Eq "ocr_captcha.sh" <<< "$LoadPlugins" ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
echo -e "${RED}| The host dailyuploads requires OcrCaptcha.sh plugin + dependencies.${NC}"
|
||||
failedRetryDownload "${remote_url}" "The host dailyuploads requires OcrCaptcha.sh plugin + dependencies."
|
||||
return 0
|
||||
else
|
||||
captcha_img_url=$(grep -oP -m 1 '(?<=<td align="right"><img src=").*?(?=")' <<< "$response")
|
||||
mkdir -p "$WorkDir/.temp"
|
||||
tmp_captcha_img="$WorkDir/.temp/${remote_url//[^a-zA-Z0-9]/}.jpg"
|
||||
tor_curl_request --insecure -s "$captcha_img_url" --output "$tmp_captcha_img"
|
||||
captcha_ocr_output=$(CaptchaOcrImage "$tmp_captcha_img" "NUMBERONLY" "ContrastStretch_5x90,Brightness_130")
|
||||
if [ "${DebugPluginsEnabled}" == "true" ]; then
|
||||
printf "\\n"
|
||||
echo -e "$captcha_ocr_output"
|
||||
fi
|
||||
captcha_code=$(grep -oP -m 1 "(?<=\[CAPTCHA_CODE\:).*?(?=\])" <<< "$captcha_ocr_output")
|
||||
rm -f "$tmp_captcha_img"
|
||||
rm -f "$captcha_ocr_output"
|
||||
local caplength=${#captcha_code}
|
||||
if [ -z "$captcha_code" ] || ((caplength != 4)) ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Bad or unknown captcha$NC (${GREY}$captcha_code${NC}).${NC}"
|
||||
exitDownloadError=true
|
||||
failedRetryDownload "${remote_url}" "Bad or unknown captcha" "(code: $captcha_code)"
|
||||
return 1
|
||||
else
|
||||
printf "${GREY}[$captcha_code]${NC}"
|
||||
continue
|
||||
fi
|
||||
else
|
||||
printf "${GREEN}[$captcha_code]${NC}"
|
||||
fi
|
||||
fi
|
||||
if grep -Eqi 'input type="hidden" name="id" value="' <<< "$response"; then
|
||||
printf "\\n"
|
||||
echo -e "${GREEN}| Captcha found.${NC}"
|
||||
post_op=$(grep -oP '(?<=input type="hidden" name="op" value=").*(?=">)' <<< "$response")
|
||||
post_id=$(grep -oP '(?<=input type="hidden" name="id" value=").*(?=">)' <<< "$response")
|
||||
post_rand=$(grep -oP '(?<=input type="hidden" name="rand" value=").*(?=">)' <<< "$response")
|
||||
post_referer=""
|
||||
else
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [2].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
tor_identity="${RANDOM}"
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
if [[ -z "$captcha_code" ]] || [[ -z "$post_op" ]] || [[ -z "$post_id" ]] || [[ -z "$post_rand" ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [2].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
tor_identity="${RANDOM}"
|
||||
continue
|
||||
fi
|
||||
else
|
||||
break
|
||||
fi
|
||||
elif grep -Eqi 'class="g-recaptcha" data-sitekey="' <<< "$response" ; then
|
||||
if grep -Eq "pjscloud.sh" <<< "$LoadPlugins" && [ "$PJSCloud_daily" == "true" ]; then
|
||||
daily_recaptcha_detected=true
|
||||
if grep -Eqi 'input type="hidden" name="id" value="' <<< "$response"; then
|
||||
printf "\\n"
|
||||
echo -e "${BLUE}| Recaptcha detected. Attempting PJSCloud request.${NC}"
|
||||
post_op=$(grep -oP '(?<=input type="hidden" name="op" value=").*(?=">)' <<< "$response")
|
||||
post_id=$(grep -oP '(?<=input type="hidden" name="id" value=").*(?=">)' <<< "$response")
|
||||
post_rand=$(grep -oP '(?<=input type="hidden" name="rand" value=").*(?=">)' <<< "$response")
|
||||
post_referer=""
|
||||
else
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [2].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
tor_identity="${RANDOM}"
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
if [[ -z "$post_op" ]] || [[ -z "$post_id" ]] || [[ -z "$post_rand" ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [2].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
tor_identity="${RANDOM}"
|
||||
continue
|
||||
fi
|
||||
else
|
||||
break
|
||||
fi
|
||||
else
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Recaptcha detected (js required)${NC}"
|
||||
exitDownloadError=true
|
||||
failedRetryDownload "${remote_url}" "Recaptcha detected (js required)" ""
|
||||
return 1
|
||||
else
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
else
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| No download button found${NC}"
|
||||
exitDownloadError=true
|
||||
failedRetryDownload "${remote_url}" "No download button found" ""
|
||||
return 1
|
||||
else
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
done
|
||||
maxfetchretries=1
|
||||
echo -e "${GREEN}# Fetching download url…${NC}"
|
||||
for ((i=1; i<=$maxfetchretries; i++)); do
|
||||
printf " _"
|
||||
download_url=""
|
||||
CLEANSTRING=${remote_url//[^a-zA-Z0-9]/}
|
||||
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f ${daily_cookie_jar}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
|
||||
if [ "$daily_recaptcha_detected" == "true" ]; then
|
||||
form_data="op=${post_op}&id=${post_id}&rand=${post_rand}&referer=${post_referer}&method_free=&method_premium=&adblock_detected="
|
||||
response=$(pjscloud_tor_request "https://hexload.com/download" "$form_data")
|
||||
if [ "${DebugAllEnabled}" == "true" ] ; then
|
||||
debugHtml "${remote_url##*/}" "daily_post2$i" "form_data: ${form_data}"$'\n'"${response}"
|
||||
fi
|
||||
else
|
||||
form_data="op=${post_op}&id=${post_id}&rand=${post_rand}&referer=${post_referer}&method_free=&method_premium=&adblock_detected=&code=${captcha_code}"
|
||||
response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
-b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \
|
||||
--data "$form_data" "$fixed_url")
|
||||
if [ "${DebugAllEnabled}" == "true" ] ; then
|
||||
debugHtml "${remote_url##*/}" "daily_post2_$i" "url: ${fixed_url}"$'\n'"form_data: ${form_data}"$'\n'"${response}"
|
||||
fi
|
||||
fi
|
||||
if [[ -z $response ]] ; then
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [3].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
tor_identity="${RANDOM}"
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
if grep -Eqi 'Whoo! No such file|No such file with this filename|File was deleted' <<< "$response"; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| The file was not found. It could be deleted or expired.${NC}"
|
||||
exitDownloadError=true
|
||||
removedDownload "${remote_url}"
|
||||
return 1
|
||||
fi
|
||||
if grep -Eqi 'you have to wait|seconds till next download' <<< "$response"; then
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Rate limited. [2].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
tor_identity="${RANDOM}"
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
if grep -Eqi 'Just a moment...' <<< "$response"; then
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [3].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "Failed to extract download link [3]" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
tor_identity="${RANDOM}"
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
if grep -Eqi '<div class="err">Wrong captcha</div>' <<< "$response"; then
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link. (Wrong captcha)${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "Failed to extract download link. (Wrong captcha)" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
tor_identity="${RANDOM}"
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
if grep -Eqi '<a id="fbtn1" href="' <<< "$response"; then
|
||||
printf "\\n"
|
||||
echo -e "${GREEN}| Download url found.${NC}"
|
||||
download_url=$(grep -oP '(?<=<a id="fbtn1" href=").*?(?=">.*$)' <<< "$response")
|
||||
download_url=$(urlencode_literal_grouped_case_urlendingonly "$download_url")
|
||||
fi
|
||||
if [[ -z "$download_url" ]] ; then
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [3].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
tor_identity="${RANDOM}"
|
||||
continue
|
||||
fi
|
||||
else
|
||||
break
|
||||
fi
|
||||
done
|
||||
echo -e "${GREEN}# Fetching file info…${NC}"
|
||||
maxfetchretries=3
|
||||
for ((j=1; j<=$maxfetchretries; j++)); do
|
||||
printf " ."
|
||||
CLEANSTRING=${remote_url//[^a-zA-Z0-9]/}
|
||||
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f ${daily_cookie_jar}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
|
||||
GetRandomUA
|
||||
file_header=$(tor_curl_request -i -s --head \
|
||||
-b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \
|
||||
--referer "${fixed_url}" \
|
||||
"$download_url")
|
||||
if [ "${DebugAllEnabled}" == "true" ] ; then
|
||||
debugHtml "${remote_url##*/}" "daily_head$j" "download_url: ${download_url}"$'\n'"${file_header}"
|
||||
fi
|
||||
if [[ -z $file_header ]] ; then
|
||||
if [ $j == $maxfetchretries ] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract file info${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "Failed to extract file info" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
tor_identity="${RANDOM}"
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
if ! grep -Eqi 'HTTP/2 200|HTTP/1.1 200|200 OK' <<< $file_header ; then
|
||||
if [ $j == $maxfetchretries ] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract file info${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
tor_identity="${RANDOM}"
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
file_size_bytes=$(grep -oPi '(?<=content-length: ).*' <<< "$file_header")
|
||||
file_size_bytes=${file_size_bytes//[$'\t\r\n']}
|
||||
if [[ -z "$file_size_bytes" ]]; then
|
||||
if [ $j == $maxfetchretries ] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract file size.${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
tor_identity="${RANDOM}"
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
break #Good to go here
|
||||
done
|
||||
touch ${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}
|
||||
if [ ! "$filename_override" == "" ] ; then
|
||||
filename="$filename_override"
|
||||
else
|
||||
filename="${download_url##*\/}"
|
||||
fi
|
||||
filename=$(sanitize_file_or_folder_name "${filename}")
|
||||
printf "\\n"
|
||||
echo -e "${YELLOW}| File name:${NC}\t\"${filename}\""
|
||||
if [ -z $file_size_bytes ] ; then
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
failedRetryDownload "${remote_url}" "Filesize not found!" ""
|
||||
fi
|
||||
echo -e "${YELLOW}| Filesize not found… retry${NC}"
|
||||
return 1
|
||||
else
|
||||
file_size_readable="$(numfmt --to=iec --from=auto --format "%.2f" <<< "$file_size_bytes")"
|
||||
fi
|
||||
echo -e "${YELLOW}| File size:${NC}\t${file_size_readable}"
|
||||
file_path="${download_inflight_path}${filename}"
|
||||
flockDownload="${WorkDir}/.flocks/${filename//[^a-zA-Z0-9\.\_\-]/}.flock"
|
||||
if CheckFileSize "${remote_url}" "${file_size_bytes}" ; then
|
||||
return 1
|
||||
fi
|
||||
if CheckDownloadExists "$remote_url" "$MoveToFolder" "$filecnt" "$filename" "$file_path" "$completed_location" ; then
|
||||
return 1
|
||||
fi
|
||||
echo "${remote_url//[^a-zA-Z0-9]/}" > $flockDownload
|
||||
}
|
||||
#!
|
||||
#! ----------- (3) Fetch File / Download File Function --------------- #
|
||||
#!
|
||||
daily_GetFile() {
|
||||
echo -e "${GREEN}# Downloading…"
|
||||
echo -e "${YELLOW}| File path:${NC}\t./.inflight/${filename}\n"
|
||||
fileCnt=$1
|
||||
retryCnt=$2
|
||||
finalAttempt=$3
|
||||
flockDownload="${WorkDir}/.flocks/${filename//[^a-zA-Z0-9\.\_\-]/}.flock"
|
||||
for ((j=1; j<=$MaxDownloadRetries; j++)); do
|
||||
pd_presize=0
|
||||
if [ -f "$file_path" ] ; then
|
||||
pd_presize=$(stat --format="%s" "$file_path" | tr -d '[:space:]')
|
||||
fi
|
||||
GetRandomUA
|
||||
daily_host=$(grep -oPi '(?<=https://).*(?=/)' <<< "$fixed_url")
|
||||
CLEANSTRING=${remote_url//[^a-zA-Z0-9]/}
|
||||
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f ${daily_cookie_jar}; rm -f $flockDownload; echo ""; tput cnorm; exit" 0 1 2 3 6 15
|
||||
if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
if [ "${RateMonitorEnabled}" == "true" ]; then
|
||||
tor_curl_request --insecure \
|
||||
--speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
|
||||
-b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \
|
||||
--referer "${fixed_url}" \
|
||||
"$download_url" --continue-at - --output "$file_path"
|
||||
else
|
||||
tor_curl_request --insecure \
|
||||
-b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \
|
||||
--referer "${fixed_url}" \
|
||||
"$download_url" --continue-at - --output "$file_path"
|
||||
fi
|
||||
else
|
||||
if [ "${RateMonitorEnabled}" == "true" ]; then
|
||||
tor_curl_request --insecure \
|
||||
--speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
|
||||
-H "User-Agent: $RandomUA" \
|
||||
-H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \
|
||||
-H "Accept-Language: en-US,en;q=0.5" \
|
||||
-H "Accept-Encoding: gzip, deflate, br" \
|
||||
-H "Connection: keep-alive" \
|
||||
-H "Cookie: lng=eng" \
|
||||
-H "Upgrade-Insecure-Requests: 1" \
|
||||
-H "Sec-Fetch-Dest: document" \
|
||||
-H "Sec-Fetch-Mode: navigate" \
|
||||
-H "Sec-Fetch-Site: same-origin" \
|
||||
-H "Sec-Fetch-User: ?1" \
|
||||
-b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \
|
||||
--referer "${fixed_url}" \
|
||||
"$download_url" --continue-at - --output "$file_path"
|
||||
else
|
||||
tor_curl_request --insecure \
|
||||
-H "User-Agent: $RandomUA" \
|
||||
-H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \
|
||||
-H "Accept-Language: en-US,en;q=0.5" \
|
||||
-H "Accept-Encoding: gzip, deflate, br" \
|
||||
-H "Connection: keep-alive" \
|
||||
-H "Cookie: lng=eng" \
|
||||
-H "Upgrade-Insecure-Requests: 1" \
|
||||
-H "Sec-Fetch-Dest: document" \
|
||||
-H "Sec-Fetch-Mode: navigate" \
|
||||
-H "Sec-Fetch-Site: same-origin" \
|
||||
-H "Sec-Fetch-User: ?1" \
|
||||
-b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \
|
||||
--referer "${fixed_url}" \
|
||||
"$download_url" --continue-at - --output "$file_path"
|
||||
fi
|
||||
fi
|
||||
received_file_size=0
|
||||
if [ -f "$file_path" ] ; then
|
||||
received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]')
|
||||
fi
|
||||
if CheckNoHtml "$remote_url" "$filename" "$file_path" ; then
|
||||
containsHtml=false
|
||||
else
|
||||
containsHtml=true
|
||||
fi
|
||||
downDelta=$(( received_file_size - pd_presize ))
|
||||
if [[ "${received_file_size}" -ne "${file_size_bytes}" ]] || [ "$containsHtml" == "true" ]; then
|
||||
if [ "${AutoRepairBadPartials}" == "true" ] && (( downDelta > 0 && downDelta < 1024 )) ; then
|
||||
if [ -f "${file_path}" ] ; then
|
||||
if ((pd_presize > 0)); then
|
||||
echo -e "${YELLOW}Bad node / HTML found:${NC} reverting to previous file..."
|
||||
truncateDownload "$remote_url" "$filename" "$pd_presize" "$received_file_size"
|
||||
truncate -s $pd_presize "${file_path}"
|
||||
else
|
||||
echo -e "${YELLOW}Bad node / HTML found:${NC} tainted partial removed..."
|
||||
rm -f "${file_path}"
|
||||
fi
|
||||
fi
|
||||
if ((j >= $MaxDownloadRetries)) ; then
|
||||
rm -f "$flockDownload";
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}"
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
continue
|
||||
fi
|
||||
elif [ "${AutoRepairBadPartials}" == "true" ] && [ "$containsHtml" == "true" ] ; then
|
||||
if [ -f "${file_path}" ] ; then
|
||||
if ((pd_presize > 0)); then
|
||||
echo -e "${YELLOW}Bad node / HTML found:${NC} reverting to previous file..."
|
||||
truncateDownload "$remote_url" "$filename" "$pd_presize" "$received_file_size"
|
||||
truncate -s $pd_presize "${file_path}"
|
||||
else
|
||||
echo -e "${YELLOW}Bad node / HTML found:${NC} tainted partial removed..."
|
||||
rm -f "${file_path}"
|
||||
fi
|
||||
fi
|
||||
if ((j >= $MaxDownloadRetries)) ; then
|
||||
rm -f "$flockDownload";
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}"
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
continue
|
||||
fi
|
||||
elif (( downDelta > 0 && downDelta < 1024 )) || [ "$containsHtml" == "true" ] ; then
|
||||
if [ -f "$file_path" ] ; then
|
||||
rm -rf "$file_path"
|
||||
fi
|
||||
echo -e "\n${YELLOW}Bad node / HTML found:${NC} tainted partial removed..."
|
||||
if ((j >= $MaxDownloadRetries)) ; then
|
||||
rm -f "$flockDownload";
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}"
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
if [[ "${received_file_size}" -ne "${file_size_bytes}" ]]; then
|
||||
echo -e "\n${RED}Download failed, file is incomplete.${NC}"
|
||||
if ((j >= $MaxDownloadRetries)) ; then
|
||||
rm -f "$flockDownload";
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}"
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
continue
|
||||
fi
|
||||
fi
|
||||
else
|
||||
break
|
||||
fi
|
||||
done
|
||||
rm -f "$flockDownload";
|
||||
rm -f "${daily_cookie_jar}";
|
||||
ProcessCompletedDownload "$remote_url" "$MoveToFolder" "$filecnt" "$filename" "$file_size_bytes" "$completed_location" "$file_path"
|
||||
return 0
|
||||
}
|
||||
#!
|
||||
#! --------------- Host Extra Functions ------------------- #
|
||||
#!
|
||||
Loading…
Add table
Add a link
Reference in a new issue