# 2025.02.18 - [uploadhive] Add handling of the new /cgi-bin/dl.cgi/ url tickets (WIP)
# (unfortunately, this is tied to the requesting ip, so downloads get "Wrong IP") # 2025.02.18 - [up_oshi] Add Manage url as comment on uploads # 2025.02.18 - [up_oshi / oshi] use /nossl/ url and http # 2025.02.17 - [gofile] Add a random sleep if 429 response detected (too many requests) # 2025.02.17 - [*ALL] Audit and update all single bracket operations # 2025.02.17 - [filehaus] Fix downloading from fh # 2025.02.15 - [uploadbay] Update urls regex for acceptable alternate # 2025.02.15 - [up_sendnow] Add send.now as upload host # 2025.02.15 - [sendnow] Fix handling of filenames with special characters in url
This commit is contained in:
parent
d48116dbe3
commit
d62376f7a8
103 changed files with 3541 additions and 3517 deletions
|
|
@ -49,24 +49,24 @@ daily_DownloadFile() {
|
|||
tor_identity="${RANDOM}"
|
||||
finalAttempt="false"
|
||||
for ((z=0; z<=$MaxUrlRetries; z++)); do
|
||||
if [ $z -eq $MaxUrlRetries ] ; then
|
||||
if [[ $z -eq $MaxUrlRetries ]] ; then
|
||||
finalAttempt="true"
|
||||
fi
|
||||
CLEANSTRING=${remote_url//[^a-zA-Z0-9]/}
|
||||
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
|
||||
if daily_FetchFileInfo $finalAttempt && daily_GetFile "${filecnt}" $((z+1)) $finalAttempt ; then
|
||||
return 0
|
||||
elif [ $z -lt $MaxUrlRetries ]; then
|
||||
if [ "${fileAlreadyDone}" == "true" ] ; then
|
||||
elif [[ $z -lt $MaxUrlRetries ]]; then
|
||||
if [[ "${fileAlreadyDone}" == "true" ]] ; then
|
||||
break
|
||||
fi
|
||||
if [[ "${warnAndRetryUnknownError}" == "true" ]] ; then
|
||||
if [ "${DebugAllEnabled}" == "true" ] ; then
|
||||
if [[ "${DebugAllEnabled}" == "true" ]] ; then
|
||||
debugHtml "${remote_url##*/}" "error" "Retry due to an unknown issue: attempt #$((z+1)) of ${MaxUrlRetries}"
|
||||
fi
|
||||
fi
|
||||
if [[ "${exitDownloadError}" == "true" || "${exitDownloadNotAvailable}" == "true" ]] ; then
|
||||
if [ "${DebugAllEnabled}" == "true" ] ; then
|
||||
if [[ "${DebugAllEnabled}" == "true" ]] ; then
|
||||
debugHtml "${remote_url##*/}" "error" "Exit due to unrecoverable issue"
|
||||
fi
|
||||
rm -f "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}"
|
||||
|
|
@ -97,16 +97,16 @@ daily_FetchFileInfo() {
|
|||
response=$(tor_curl_request --insecure -L -s -b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \
|
||||
-w "\n\nHTTP_CODE: %{http_code}\nEFFECTIVE_URL: %{url_effective}\n" \
|
||||
"$fixed_url")
|
||||
if [ "${DebugAllEnabled}" == "true" ] ; then
|
||||
if [[ "${DebugAllEnabled}" == "true" ]] ; then
|
||||
debugHtml "${remote_url##*/}" "daily_fetch$i" "${response}"
|
||||
fi
|
||||
if [[ -z $response ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [1].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -138,7 +138,7 @@ daily_FetchFileInfo() {
|
|||
tmp_captcha_img="$WorkDir/.temp/${remote_url//[^a-zA-Z0-9]/}.jpg"
|
||||
tor_curl_request --insecure -s "$captcha_img_url" --output "$tmp_captcha_img"
|
||||
captcha_ocr_output=$(CaptchaOcrImageTesseract "$tmp_captcha_img" "NUMBERONLY" "ContrastStretch_5x90,Brightness_130")
|
||||
if [ "${DebugPluginsEnabled}" == "true" ]; then
|
||||
if [[ "${DebugPluginsEnabled}" == "true" ]]; then
|
||||
printf "\\n"
|
||||
echo -e "$captcha_ocr_output"
|
||||
fi
|
||||
|
|
@ -146,9 +146,9 @@ daily_FetchFileInfo() {
|
|||
rm -f "$tmp_captcha_img"
|
||||
rm -f "$captcha_ocr_output"
|
||||
local caplength=${#captcha_code}
|
||||
if [ -z "$captcha_code" ] || ((caplength != 4)) ; then
|
||||
if [[ -z "$captcha_code" ]] || ((caplength != 4)) ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Bad or unknown captcha$NC (${GREY}$captcha_code${NC}).${NC}"
|
||||
exitDownloadError=true
|
||||
|
|
@ -171,11 +171,11 @@ daily_FetchFileInfo() {
|
|||
post_referer=""
|
||||
else
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [2].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -186,11 +186,11 @@ daily_FetchFileInfo() {
|
|||
fi
|
||||
if [[ -z "$captcha_code" ]] || [[ -z "$post_op" ]] || [[ -z "$post_id" ]] || [[ -z "$post_rand" ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [2].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -202,7 +202,7 @@ daily_FetchFileInfo() {
|
|||
break
|
||||
fi
|
||||
elif grep -Eqi 'class="g-recaptcha" data-sitekey="' <<< "$response" ; then
|
||||
if grep -Eq "pjscloud.sh" <<< "$LoadPlugins" && [ "$PJSCloud_daily" == "true" ]; then
|
||||
if grep -Eq "pjscloud.sh" <<< "$LoadPlugins" && [[ "$PJSCloud_daily" == "true" ]]; then
|
||||
daily_recaptcha_detected=true
|
||||
if grep -Eqi 'input type="hidden" name="id" value="' <<< "$response"; then
|
||||
printf "\\n"
|
||||
|
|
@ -213,11 +213,11 @@ daily_FetchFileInfo() {
|
|||
post_referer=""
|
||||
else
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [2].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -228,11 +228,11 @@ daily_FetchFileInfo() {
|
|||
fi
|
||||
if [[ -z "$post_op" ]] || [[ -z "$post_id" ]] || [[ -z "$post_rand" ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [2].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -245,7 +245,7 @@ daily_FetchFileInfo() {
|
|||
fi
|
||||
else
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Recaptcha detected (js required)${NC}"
|
||||
exitDownloadError=true
|
||||
|
|
@ -257,7 +257,7 @@ daily_FetchFileInfo() {
|
|||
fi
|
||||
else
|
||||
rm -f "${daily_cookie_jar}";
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
printf "\\n"
|
||||
echo -e "${RED}| No download button found${NC}"
|
||||
exitDownloadError=true
|
||||
|
|
@ -275,10 +275,10 @@ daily_FetchFileInfo() {
|
|||
download_url=""
|
||||
CLEANSTRING=${remote_url//[^a-zA-Z0-9]/}
|
||||
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f ${daily_cookie_jar}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
|
||||
if [ "$daily_recaptcha_detected" == "true" ]; then
|
||||
if [[ "$daily_recaptcha_detected" == "true" ]]; then
|
||||
form_data="op=${post_op}&id=${post_id}&rand=${post_rand}&referer=${post_referer}&method_free=&method_premium=&adblock_detected="
|
||||
response=$(pjscloud_tor_request "https://hexload.com/download" "$form_data")
|
||||
if [ "${DebugAllEnabled}" == "true" ] ; then
|
||||
if [[ "${DebugAllEnabled}" == "true" ]] ; then
|
||||
debugHtml "${remote_url##*/}" "daily_post2$i" "form_data: ${form_data}"$'\n'"${response}"
|
||||
fi
|
||||
else
|
||||
|
|
@ -286,17 +286,17 @@ daily_FetchFileInfo() {
|
|||
response=$(tor_curl_request --insecure -L -s -X POST \
|
||||
-b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \
|
||||
--data "$form_data" "$fixed_url")
|
||||
if [ "${DebugAllEnabled}" == "true" ] ; then
|
||||
if [[ "${DebugAllEnabled}" == "true" ]] ; then
|
||||
debugHtml "${remote_url##*/}" "daily_post2_$i" "url: ${fixed_url}"$'\n'"form_data: ${form_data}"$'\n'"${response}"
|
||||
fi
|
||||
fi
|
||||
if [[ -z $response ]] ; then
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [3].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -314,12 +314,12 @@ daily_FetchFileInfo() {
|
|||
return 1
|
||||
fi
|
||||
if grep -Eqi 'you have to wait|seconds till next download' <<< "$response"; then
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Rate limited. [2].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -329,12 +329,12 @@ daily_FetchFileInfo() {
|
|||
fi
|
||||
fi
|
||||
if grep -Eqi 'Just a moment...' <<< "$response"; then
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [3].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "Failed to extract download link [3]" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -344,12 +344,12 @@ daily_FetchFileInfo() {
|
|||
fi
|
||||
fi
|
||||
if grep -Eqi '<div class="err">Wrong captcha</div>' <<< "$response"; then
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link. (Wrong captcha)${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "Failed to extract download link. (Wrong captcha)" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -365,12 +365,12 @@ daily_FetchFileInfo() {
|
|||
download_url=$(urlencode_literal_grouped_case_urlendingonly "$download_url")
|
||||
fi
|
||||
if [[ -z "$download_url" ]] ; then
|
||||
if [ $i == $maxfetchretries ] ; then
|
||||
if [[ $i == $maxfetchretries ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract download link [3].${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -393,16 +393,16 @@ daily_FetchFileInfo() {
|
|||
-b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \
|
||||
--referer "${fixed_url}" \
|
||||
"$download_url")
|
||||
if [ "${DebugAllEnabled}" == "true" ] ; then
|
||||
if [[ "${DebugAllEnabled}" == "true" ]] ; then
|
||||
debugHtml "${remote_url##*/}" "daily_head$j" "download_url: ${download_url}"$'\n'"${file_header}"
|
||||
fi
|
||||
if [[ -z $file_header ]] ; then
|
||||
if [ $j == $maxfetchretries ] ; then
|
||||
if [[ $j == $maxfetchretries ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract file info${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "Failed to extract file info" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -412,12 +412,12 @@ daily_FetchFileInfo() {
|
|||
fi
|
||||
fi
|
||||
if ! grep -Eqi 'HTTP/2 200|HTTP/1.1 200|200 OK' <<< $file_header ; then
|
||||
if [ $j == $maxfetchretries ] ; then
|
||||
if [[ $j == $maxfetchretries ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract file info${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -429,12 +429,12 @@ daily_FetchFileInfo() {
|
|||
file_size_bytes=$(grep -oPi '(?<=content-length: ).*' <<< "$file_header")
|
||||
file_size_bytes=${file_size_bytes//[$'\t\r\n']}
|
||||
if [[ -z "$file_size_bytes" ]]; then
|
||||
if [ $j == $maxfetchretries ] ; then
|
||||
if [[ $j == $maxfetchretries ]] ; then
|
||||
rm -f "${daily_cookie_jar}";
|
||||
printf "\\n"
|
||||
echo -e "${RED}| Failed to extract file size.${NC}"
|
||||
warnAndRetryUnknownError=true
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "" ""
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -445,8 +445,8 @@ daily_FetchFileInfo() {
|
|||
fi
|
||||
break #Good to go here
|
||||
done
|
||||
touch ${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}
|
||||
if [ ! "$filename_override" == "" ] ; then
|
||||
touch "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}"
|
||||
if [[ ! "$filename_override" == "" ]] ; then
|
||||
filename="$filename_override"
|
||||
else
|
||||
filename="${download_url##*\/}"
|
||||
|
|
@ -454,8 +454,8 @@ daily_FetchFileInfo() {
|
|||
filename=$(sanitize_file_or_folder_name "${filename}")
|
||||
printf "\\n"
|
||||
echo -e "${YELLOW}| File name:${NC}\t\"${filename}\""
|
||||
if [ -z $file_size_bytes ] ; then
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ -z $file_size_bytes ]] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
failedRetryDownload "${remote_url}" "Filesize not found!" ""
|
||||
fi
|
||||
echo -e "${YELLOW}| Filesize not found… retry${NC}"
|
||||
|
|
@ -486,15 +486,15 @@ daily_GetFile() {
|
|||
flockDownload="${WorkDir}/.flocks/${filename//[^a-zA-Z0-9\.\_\-]/}.flock"
|
||||
for ((j=1; j<=$MaxDownloadRetries; j++)); do
|
||||
pd_presize=0
|
||||
if [ -f "$file_path" ] ; then
|
||||
if [[ -f "$file_path" ]] ; then
|
||||
pd_presize=$(stat --format="%s" "$file_path" | tr -d '[:space:]')
|
||||
fi
|
||||
GetRandomUA
|
||||
daily_host=$(grep -oPi '(?<=https://).*(?=/)' <<< "$fixed_url")
|
||||
CLEANSTRING=${remote_url//[^a-zA-Z0-9]/}
|
||||
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f ${daily_cookie_jar}; rm -f $flockDownload; echo ""; tput cnorm; exit" 0 1 2 3 6 15
|
||||
if [ "${UseTorCurlImpersonate}" == "true" ]; then
|
||||
if [ "${RateMonitorEnabled}" == "true" ]; then
|
||||
if [[ "${UseTorCurlImpersonate}" == "true" ]]; then
|
||||
if [[ "${RateMonitorEnabled}" == "true" ]]; then
|
||||
tor_curl_request --insecure \
|
||||
--speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
|
||||
-b "${daily_cookie_jar}" -c "${daily_cookie_jar}" \
|
||||
|
|
@ -507,7 +507,7 @@ daily_GetFile() {
|
|||
"$download_url" --continue-at - --output "$file_path"
|
||||
fi
|
||||
else
|
||||
if [ "${RateMonitorEnabled}" == "true" ]; then
|
||||
if [[ "${RateMonitorEnabled}" == "true" ]]; then
|
||||
tor_curl_request --insecure \
|
||||
--speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval \
|
||||
-H "User-Agent: $RandomUA" \
|
||||
|
|
@ -543,7 +543,7 @@ daily_GetFile() {
|
|||
fi
|
||||
fi
|
||||
received_file_size=0
|
||||
if [ -f "$file_path" ] ; then
|
||||
if [[ -f "$file_path" ]] ; then
|
||||
received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]')
|
||||
fi
|
||||
if CheckNoHtml "$remote_url" "$filename" "$file_path" ; then
|
||||
|
|
@ -552,9 +552,9 @@ daily_GetFile() {
|
|||
containsHtml=true
|
||||
fi
|
||||
downDelta=$(( received_file_size - pd_presize ))
|
||||
if [[ "${received_file_size}" -ne "${file_size_bytes}" ]] || [ "$containsHtml" == "true" ]; then
|
||||
if [ "${AutoRepairBadPartials}" == "true" ] && (( downDelta > 0 && downDelta < 1024 )) ; then
|
||||
if [ -f "${file_path}" ] ; then
|
||||
if [[ "${received_file_size}" -ne "${file_size_bytes}" ]] || [[ "$containsHtml" == "true" ]]; then
|
||||
if [[ "${AutoRepairBadPartials}" == "true" ]] && (( downDelta > 0 && downDelta < 1024 )) ; then
|
||||
if [[ -f "${file_path}" ]] ; then
|
||||
if ((pd_presize > 0)); then
|
||||
echo -e "${YELLOW}Bad node / HTML found:${NC} reverting to previous file..."
|
||||
truncateDownload "$remote_url" "$filename" "$pd_presize" "$received_file_size"
|
||||
|
|
@ -566,15 +566,15 @@ daily_GetFile() {
|
|||
fi
|
||||
if ((j >= $MaxDownloadRetries)) ; then
|
||||
rm -f "$flockDownload";
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}"
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
continue
|
||||
fi
|
||||
elif [ "${AutoRepairBadPartials}" == "true" ] && [ "$containsHtml" == "true" ] ; then
|
||||
if [ -f "${file_path}" ] ; then
|
||||
elif [[ "${AutoRepairBadPartials}" == "true" ]] && [[ "$containsHtml" == "true" ]] ; then
|
||||
if [[ -f "${file_path}" ]] ; then
|
||||
if ((pd_presize > 0)); then
|
||||
echo -e "${YELLOW}Bad node / HTML found:${NC} reverting to previous file..."
|
||||
truncateDownload "$remote_url" "$filename" "$pd_presize" "$received_file_size"
|
||||
|
|
@ -586,21 +586,21 @@ daily_GetFile() {
|
|||
fi
|
||||
if ((j >= $MaxDownloadRetries)) ; then
|
||||
rm -f "$flockDownload";
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}"
|
||||
fi
|
||||
return 1
|
||||
else
|
||||
continue
|
||||
fi
|
||||
elif (( downDelta > 0 && downDelta < 1024 )) || [ "$containsHtml" == "true" ] ; then
|
||||
if [ -f "$file_path" ] ; then
|
||||
elif (( downDelta > 0 && downDelta < 1024 )) || [[ "$containsHtml" == "true" ]] ; then
|
||||
if [[ -f "$file_path" ]] ; then
|
||||
rm -rf "$file_path"
|
||||
fi
|
||||
echo -e "\n${YELLOW}Bad node / HTML found:${NC} tainted partial removed..."
|
||||
if ((j >= $MaxDownloadRetries)) ; then
|
||||
rm -f "$flockDownload";
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}"
|
||||
fi
|
||||
return 1
|
||||
|
|
@ -612,7 +612,7 @@ daily_GetFile() {
|
|||
echo -e "\n${RED}Download failed, file is incomplete.${NC}"
|
||||
if ((j >= $MaxDownloadRetries)) ; then
|
||||
rm -f "$flockDownload";
|
||||
if [ "${finalAttempt}" == "true" ] ; then
|
||||
if [[ "${finalAttempt}" == "true" ]] ; then
|
||||
droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}"
|
||||
fi
|
||||
return 1
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue