#! Name: kraken.sh #! Author: kittykat #! Version: 2024.09.22 #! Desc: Add support for downloading and processing of urls for a new host #! Usage: Copy this file into the ./${ScriptDir}/hosts/ folder #! #! #! ------------ REQUIRED SECTION --------------- #! @[UPDATE] HostAndDomainRegexes: This string is loaded into mad.sh and allows dynamic handling of new url data #! Format: '/HostCode/HostNick/HostFuncPrefix:HostDomainRegex@' #! HostCode: (ie. 'fh' for filehaus -- cannot be used by other hosts) #! HostNick: What is displayed throughout MAD output (ie. 'filehaus' -- "urls.txt has 10 filehaus.." will be displayed) #! HostFuncPrefix: (ie. 'fh' -- fh_DownloadFile(), fh_FetchFileInfo() .. ) #! * Note: Must begin with a letter a-z (functions beginning with numbers are no bueno) #! HostDomainRegex: The regex used to verify matching urls HostCode='kraken' HostNick='kraken' HostFuncPrefix='kraken' HostUrls='krakenfiles.com' HostDomainRegex='^(http|https)://(.*\.)?krakenfiles\.com' #! #! !! DO NOT UPDATE OR REMOVE !! #! This merges the Required HostAndDomainRegexes into mad.sh ListHostAndDomainRegexes=${ListHostAndDomainRegexes}'/'${HostCode}'/'${HostNick}'/'${HostFuncPrefix}'/'${HostUrls}':'${HostDomainRegex}'@' #! #! #! ------------ (1) Host Main Download Function --------------- # #! #! @REQUIRED: Host Main Download function #! Must be named specifically as such: #! _DownloadFile() kraken_DownloadFile() { local remote_url=${1} local file_url=${1} local filecnt=${2} warnAndRetryUnknownError=false exitDownloadError=false exitDownloadNotAvailable=false fileAlreadyDone=false download_inflight_path="${WorkDir}/.inflight/" mkdir -p "$download_inflight_path" completed_location="${WorkDir}/downloads/" tor_identity="${RANDOM}" finalAttempt="false" for ((z=0; z<=$MaxUrlRetries; z++)); do if [[ $z -eq $MaxUrlRetries ]] ; then finalAttempt="true" fi CLEANSTRING=${remote_url//[^a-zA-Z0-9]/} trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; echo ""; tput cnorm; exit" 0 1 2 3 6 15 if kraken_FetchFileInfo "" $((i+1)) $finalAttempt && kraken_GetFile "${filecnt}" $((z+1)) $finalAttempt ; then return 0 elif [[ $z -lt $MaxUrlRetries ]]; then if [[ "${fileAlreadyDone}" == "true" ]] ; then break fi if [[ "${warnAndRetryUnknownError}" == "true" ]] ; then if [[ "${DebugAllEnabled}" == "true" ]] ; then debugHtml "${remote_url##*/}" "error" "Retry due to an unknown issue: attempt #$((z+1)) of ${MaxUrlRetries}" fi fi if [[ "${exitDownloadError}" == "true" || "${exitDownloadNotAvailable}" == "true" ]] ; then if [[ "${DebugAllEnabled}" == "true" ]] ; then debugHtml "${remote_url##*/}" "error" "Exit due to unrecoverable issue" fi rm -f "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}" break fi echo -e "\n${YELLOW}A recoverable error occurred, retry attempt $((z+1))/${MaxUrlRetries}${NC}" sleep 3 fi done rm -f "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}" } #! #! ------------- (2) Fetch File Info Function ----------------- # #! kraken_FetchFileInfo() { fileCnt=$1 retryCnt=$2 finalAttempt=$3 if grep -Eqi 'krakenfiles.com/download/' <<< "${remote_url}" ; then fixed_url=${remote_url/krakenfiles.com\/download\//krakenfiles.com\/view\/} else fixed_url=${remote_url} fi if ! grep -Eqi '/file.html' <<< "${fixed_url}" ; then fixed_url=${fixed_url}'/file.html' fi krak_id=${fixed_url%%\/file.htm*} krak_id=${krak_id##*\/} krak_id=${krak_id//[^a-zA-Z0-9]/} echo -e "${GREEN}# Fetching file info…${NC}" local num_attempt=$1 mkdir -p "${WorkDir}/.temp" local max_attempts=${CircuitRetries} local iter=0 instance_no="$fileCnt" time_out=5 instances="$2" kraken_cookie_jar="" tor_identity="" PAGE="" kraken_token="" kraken_action="" mkdir -p "${WorkDir}/.temp" for ((i=1; i<=5; i++)); do printf " ." kraken_cookie_jar=$(mktemp "${WorkDir}/.temp/kraken_cookies""${instance_no}"".XXXXXX") tor_identity="${RANDOM}" trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f ${kraken_cookie_jar}; echo ""; tput cnorm; exit" 0 1 2 3 6 15 PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -s -L -c "${kraken_cookie_jar}" "${fixed_url}") if [[ "${DebugAllEnabled}" == "true" ]] ; then debugHtml "${krak_id}" "kraken_token${num_attempt}_$i" "url: ${fixed_url}"$'\n'"krakenid: ${krak_id}"$'\n'"${PAGE}" fi if grep -Eqi 'sendFormCaptcha()' <<< "${PAGE}"; then rm -f "$kraken_cookie_jar"; printf "\n" echo -e "${RED}| Captcha required (Recaptcha)${NC}" exitDownloadError=true failedRetryDownload "${remote_url}" "Captcha required (Recaptcha)" "" return 1 fi if ! grep -Eqi 'name="token" value="' <<< "${PAGE}"; then if grep -Eqi 'a page that either has been deleted or never existed' <<< "${PAGE}"; then rm -f "$kraken_cookie_jar"; printf "\n" echo -e "${RED}| The file has been deleted or does not exist.${NC}" exitDownloadError=true removedDownload "${remote_url}" return 1 fi if grep -Eqi 'class="alert-danger"' <<< "${PAGE}"; then rm -f "$kraken_cookie_jar"; req_msg=$(grep -oP '(?<=class="alert-danger").*(?=)' <<< "$PAGE") req_msg=$(grep -oP '">\K[^>]+' <<< "$req_msg") printf "\n" echo -e "${RED}| ${req_msg}.${NC}" exitDownloadError=true failedRetryDownload "${remote_url}" "$req_msg" "" return 1 fi if grep -Eqi '521: Web server is down' <<< "${PAGE}"; then rm -f "$kraken_cookie_jar"; printf "\n" echo -e "${RED}| 521: Web server is down. Try again later${NC}" exitDownloadError=true failedRetryDownload "${remote_url}" "521: Web server is down. Try again later" "" return 1 fi if grep -Eqi 'Oops! Why you’re here?' <<< "${PAGE}"; then rm -f "$kraken_cookie_jar"; req_msg=$(grep -oP '(?<=nk-error-text">).*(?= $flockDownload } #! #! ----------- (3) Fetch File / Download File Function --------------- # #! kraken_GetFile() { echo -e "${GREEN}# Downloading…" echo -e "${YELLOW}| File path:${NC}\t./.inflight/${filename}\n" fileCnt=$1 retryCnt=$2 finalAttempt=$3 flockDownload="${WorkDir}/.flocks/${filename//[^a-zA-Z0-9\.\_\-]/}.flock" for ((j=1; j<=$MaxDownloadRetries; j++)); do pd_presize=0 if [[ -f "$file_path" ]] ; then pd_presize=$(stat --format="%s" "$file_path" | tr -d '[:space:]') fi GetRandomUA CLEANSTRING=${remote_url//[^a-zA-Z0-9]/} trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f $flockDownload; echo ""; tput cnorm; exit" 0 1 2 3 6 15 if [[ "${RateMonitorEnabled}" == "true" ]] && [[ ! -f "$file_path" ]]; then tor_curl_request --insecure --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval --referer "$kraken_action" "$download_url" --continue-at - --output "$file_path" else tor_curl_request --insecure --referer "$kraken_action" "$download_url" --continue-at - --output "$file_path" fi received_file_size=0 if [[ -f "$file_path" ]] ; then received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]') fi if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then containsHtml=false else containsHtml=true fi downDelta=$(( received_file_size - pd_presize )) if [[ "${received_file_size}" -ne "${file_size_bytes}" ]] || [[ "$containsHtml" == "true" ]]; then if [[ "${AutoRepairBadPartials}" == "true" ]] && (( downDelta > 0 && downDelta < 1024 )) ; then if [[ -f "${file_path}" ]] ; then if ((pd_presize > 0)); then echo -e "${YELLOW}Bad node / HTML found:${NC} reverting to previous file..." truncateDownload "$remote_url" "$filename" "$pd_presize" "$received_file_size" truncate -s $pd_presize "${file_path}" else echo -e "${YELLOW}Bad node / HTML found:${NC} tainted partial removed..." rm -f "${file_path}" fi fi if ((j >= $MaxDownloadRetries)) ; then rm -f "$flockDownload"; if [[ "${finalAttempt}" == "true" ]] ; then droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}" fi return 1 else continue fi elif [[ "${AutoRepairBadPartials}" == "true" ]] && [[ "$containsHtml" == "true" ]] ; then if [[ -f "${file_path}" ]] ; then if ((pd_presize > 0)); then echo -e "${YELLOW}Bad node / HTML found:${NC} reverting to previous file..." truncateDownload "$remote_url" "$filename" "$pd_presize" "$received_file_size" truncate -s $pd_presize "${file_path}" else echo -e "${YELLOW}Bad node / HTML found:${NC} tainted partial removed..." rm -f "${file_path}" fi fi if ((j >= $MaxDownloadRetries)) ; then rm -f "$flockDownload"; if [[ "${finalAttempt}" == "true" ]] ; then droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}" fi return 1 else continue fi elif (( downDelta > 0 && downDelta < 1024 )) || [[ "$containsHtml" == "true" ]] ; then if [[ -f "$file_path" ]] ; then rm -rf "$file_path" fi echo -e "\n${YELLOW}Bad node / HTML found:${NC} tainted partial removed..." if ((j >= $MaxDownloadRetries)) ; then rm -f "$flockDownload"; if [[ "${finalAttempt}" == "true" ]] ; then droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}" fi return 1 else continue fi fi if [[ "${received_file_size}" -ne "${file_size_bytes}" ]]; then echo -e "\n${RED}Download failed, file is incomplete.${NC}" if ((j >= $MaxDownloadRetries)) ; then rm -f "$flockDownload"; if [[ "${finalAttempt}" == "true" ]] ; then droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}" fi return 1 else continue fi fi else break fi done rm -f "$flockDownload"; ProcessCompletedDownload "$remote_url" "$MoveToFolder" "$filecnt" "$filename" "$file_size_bytes" "$completed_location" "$file_path" return 0 } #! #! --------------- Host Extra Functions ------------------- # #!