mad/hosts/filedot.sh
kittykat a62ac882de
# 2025.03.08 - [mad] Only check files in determining which curl header
# 2025.03.06 - [uploadhive] Disable global resume for servers without resume
# 2025.03.05 - [torup] Fix torup removed response change from prior
# 2025.03.05 - [mad] Add uploadflix.cc back to recommended download upload host lists (working)
# 2025.03.04 - [mad] Add "expect100-timeout" header to curl upload request
# 2025.03.03 - [up_sendspace] Add sendspace.com as upload host (300MB)
# 2025.03.01 - [filedot] Fix filename parsing. Add 3 second wait for Free Download post.
# 2025.03.01 - [torup] Update file removed response
# 2025.02.26 - [uploadhive] Fix "Wrong IP" error -- use uploadhive.com IP4 address to connect for post
# 2025.02.26 - [up_lainsafe] Fix retry terminal output
2025-03-11 01:03:01 +00:00

593 lines
27 KiB
Bash

#! Name: filedot.sh
#! Author: kittykat
#! Version: 2025.03.01
#! Desc: Add support for downloading and processing of urls for a new host
#! Usage: Copy this file into the ./${ScriptDir}/hosts/ folder
#!
#!
#! ------------ REQUIRED SECTION ---------------
#! @[UPDATE] HostAndDomainRegexes: This string is loaded into mad.sh and allows dynamic handling of new url data
#! Format: '/HostCode/HostNick/HostFuncPrefix:HostDomainRegex@'
#! HostCode: <aUniqueCodeForHost> (ie. 'fh' for filehaus -- cannot be used by other hosts)
#! HostNick: What is displayed throughout MAD output (ie. 'filehaus' -- "urls.txt has 10 filehaus.." will be displayed)
#! HostFuncPrefix: <aUniqueStringThatMustPrefixHostFunctions> (ie. 'fh' -- fh_DownloadFile(), fh_FetchFileInfo() .. )
#! * Note: Must begin with a letter a-z (functions beginning with numbers are no bueno)
#! HostDomainRegex: The regex used to verify matching urls
HostCode='fdot'
HostNick='filedot'
HostFuncPrefix='fdot'
HostUrls='filedot.to'
HostDomainRegex='^(http|https)://(.*\.)?filedot\.(to|top)'
#!
#! !! DO NOT UPDATE OR REMOVE !!
#! This merges the Required HostAndDomainRegexes into mad.sh
ListHostAndDomainRegexes=${ListHostAndDomainRegexes}'/'${HostCode}'/'${HostNick}'/'${HostFuncPrefix}'/'${HostUrls}':'${HostDomainRegex}'@'
#!
#!
#! ------------ (1) Host Main Download Function --------------- #
#!
#! @REQUIRED: Host Main Download function
#! Must be named specifically as such:
#! <HostFuncPrefix>_DownloadFile()
fdot_DownloadFile() {
local remote_url=${1}
local file_url=${1}
local filecnt=${2}
warnAndRetryUnknownError=false
exitDownloadError=false
exitDownloadNotAvailable=false
fileAlreadyDone=false
download_inflight_path="${WorkDir}/.inflight/"
mkdir -p "$download_inflight_path"
completed_location="${WorkDir}/downloads/"
tor_identity="${RANDOM}"
finalAttempt="false"
for ((z=0; z<=$MaxUrlRetries; z++)); do
if [[ $z -eq $MaxUrlRetries ]] ; then
finalAttempt="true"
fi
CLEANSTRING=${remote_url//[^a-zA-Z0-9]/}
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
if fdot_FetchFileInfo $finalAttempt && fdot_GetFile "${filecnt}" $((z+1)) $finalAttempt ; then
return 0
elif [[ $z -lt $MaxUrlRetries ]]; then
if [[ "${fileAlreadyDone}" == "true" ]] ; then
break
fi
if [[ "${warnAndRetryUnknownError}" == "true" ]] ; then
if [[ "${DebugAllEnabled}" == "true" ]] ; then
debugHtml "${remote_url##*/}" "error" "Retry due to an unknown issue: attempt #$((z+1)) of ${MaxUrlRetries}"
fi
fi
if [[ "${exitDownloadError}" == "true" || "${exitDownloadNotAvailable}" == "true" ]] ; then
if [[ "${DebugAllEnabled}" == "true" ]] ; then
debugHtml "${remote_url##*/}" "error" "Exit due to unrecoverable issue"
fi
rm -f "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}"
break
fi
echo -e "\n${YELLOW}A recoverable error occurred, retry attempt $((z+1))/${MaxUrlRetries}${NC}"
sleep 3
fi
done
rm -f "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}"
}
#!
#! ------------- (2) Fetch File Info Function ----------------- #
#!
fdot_FetchFileInfo() {
finalAttempt=$1
local fdot_cookie_jar="" fdot_token=""
CLEANSTRING=${remote_url//[^a-zA-Z0-9]/}
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
echo -e "${GREEN}# Logging into filedot (each dot is a blocked Tor IP attempt or timeout)…${NC}"
file_id=$(grep -oP '[^\/]*$' <<< "$remote_url")
if grep -Eqi "filedot.top" <<< "$remote_url"; then
fixed_url=${remote_url/filedot.top/filedot.to}
else
fixed_url=${remote_url}
fi
GetRandomFiledotUser
fdotUser=${RandomFdotUser%%\|*}
fdotPass=${RandomFdotUser##*\|}
if [[ "$fdotUser" == "#ALLACCOUNTSMAXED#" ]]; then
printf "\\n"
echo -e "${RED}| All fdot accounts have reached the daily-limit (do one of the folowing):${NC}"
echo -e "${YELLOW}| 1. Wait 24 hours and try again${NC}"
echo -e "${YELLOW}| 2. Create another fdot account and add user/pass to the script${NC}"
echo -e "${YELLOW}| 3. Remove the file ./.temp/_fdot-limitreached-accounts.txt or run ./mad.sh reset${NC}"
failedRetryDownload "${remote_url}" "All fdot accounts have reached the daily limit (wait 24hrs)" ""
addResultsNote "${remote_url}" "All fdot accounts download-limit reached (./.temp/_fdot-limitreached-accounts.txt)"
exitDownloadNotAvailable=true
return 1
fi
echo -e "${BLUE}| Filedot user:${NC}\t${fdotUser}"
for ((a=1; a<=26; a++)); do
printf "${YELLOW} .${NC}"
mkdir -p "${WorkDir}/.temp"
fdot_cookie_jar=$(mktemp "${WorkDir}/.temp/fdot_cookies""${instance_no}"".XXXXXX")
tor_identity="${RANDOM}"
GetRandomUA
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f ${fdot_cookie_jar}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
PAGE=$(tor_curl_request --insecure --max-time "$ConnectTimeout" -L -s \
-H "User-Agent: $RandomUA" \
-H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8' \
-H 'Accept-Language: en-US,en;q=0.5' \
-H 'Accept-Encoding: gzip, deflate, br' -H 'Connection: keep-alive' -H 'Upgrade-Insecure-Requests: 1' \
-H 'Sec-Fetch-Dest: document' -H 'Sec-Fetch-Mode: navigate' -H 'Sec-Fetch-Site: none' -H 'Sec-Fetch-User: ?1' \
-c "${fdot_cookie_jar}" \
"https://filedot.to/login.html")
if [[ "${DebugAllEnabled}" == "true" ]] ; then
debugHtml "${remote_url##*/}" "fdot_login_$a" "${PAGE}"
fi
if grep -Eqi 'Sorry, you have been blocked' <<< "${PAGE}" ; then
rm -f "${fdot_cookie_jar}";
if ((a >= 26)) ; then
printf "\\n"
echo -e "${YELLOW}| Login failed [1]${NC}"
return 1
fi
continue
fi
if grep -Eqi '<input type="hidden" name="op" value="login">' <<< "${PAGE}" ; then
post_token=$(grep -oP -m 1 '(?<=input type="hidden" name="token" value=").*(?=">.*$)' <<< "$PAGE")
break
else
rm -f "${fdot_cookie_jar}";
if ((a >= 26)) ; then
printf "\\n"
echo -e "${YELLOW}| Login failed [1]${NC}"
return 1
fi
continue
fi
done
printf "\\n"
for ((b=1; b<=26; b++)); do
printf "${YELLOW}${NC}"
mkdir -p "${WorkDir}/.temp"
encfdotuser=$(urlencode_literal_grouped_case $fdotUser)
encfdotpass=$(urlencode_literal_grouped_case $fdotPass)
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f ${fdot_cookie_jar}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
form_data="op=login&token=${post_token}&rand=&redirect=https%3A%2F%2Ffiledot.to%2F${file_id}&login=${encfdotuser}&password=${encfdotpass}"
resp_login=$(tor_curl_request --insecure -L -s \
-H "Host: filedot.to" \
-H "User-Agent: $RandomUA" \
-H "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \
-H "Accept-Language: en-US,en;q=0.5" \
-H "Accept-Encoding: gzip, deflate, br" \
-H "Content-Type: application/x-www-form-urlencoded" \
-H "Origin: https://filedot.to" \
-H "Connection: keep-alive" \
-H "Referer: https://filedot.to/login.html" \
-H "DNT: 1" \
-H "Sec-GPC: 1" \
-H "Sec-Fetch-Dest: document" \
-H "Sec-Fetch-Mode: navigate" \
-H "Sec-Fetch-Site: same-origin" \
-H "Sec-Fetch-User: ?1" \
-b "${fdot_cookie_jar}" -c "${fdot_cookie_jar}" \
-d "$form_data" "https://filedot.to/")
if [[ "${DebugAllEnabled}" == "true" ]] ; then
debugHtml "${remote_url##*/}" "fdot_loginP_$b" "form_data: ${form_data}"$'\n'"${resp_login}"
fi
if grep -Eqi 'Sorry, you have been blocked' <<< "${resp_login}" ; then
if ((b >= 26)) ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${YELLOW}| Login failed [1]${NC}"
return 1
fi
continue
fi
if grep -Eqi 'Sorry, you have been blocked' <<< "${resp_login}" ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${YELLOW}| Login failed [1]: Incorrect User ($fdotUser) or Password ($fdotPass)${NC}"
return 1
fi
if grep -Eqi 'Not Found' <<< "${resp_login}" ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${RED}| The file has been removed${NC}"
removedDownload "${remote_url}"
exitDownloadNotAvailable=true
return 1
fi
if grep -Eqi 'This file is available for Premium Users only' <<< "${resp_login}" ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${RED}| The file is only available for Premium Users${NC}"
failedDownload "${remote_url}" "File only available for Premium Users" "${remote_url}"
exitDownloadNotAvailable=true
return 1
fi
if grep -Eqi 'You have reached the download-limit:' <<< "${resp_login}" ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${YELLOW}| Daily download limit reached for account ${BLUE}${fdotUser}${NC} ${YELLOW}[1]${NC}"
printf "${fdotUser}|" >> "${WorkDir}/.temp/_fdot-limitreached-accounts.txt"
addResultsNote "${remote_url}" "Download-limit reached for fdot account (${fdotUser})"
return 1
fi
if grep -Eqi '<input type="hidden" name="op" value="download1">' <<< "${resp_login}" ; then
post_id=$(grep -oP -m 1 '(?<=input type="hidden" name="id" value=").*(?=">.*$)' <<< "$resp_login")
post_fname=$(grep -oP -m 1 '(?<=input type="hidden" name="fname" value=").*(?=">.*$)' <<< "$resp_login")
post_fname_enc=$(urlencode_literal_grouped_case $post_fname)
break
else
if ((b >= 26)) ; then
printf "\\n"
rm -f "${fdot_cookie_jar}";
echo -e "${YELLOW}| Login failed [2]${NC}"
return 1
fi
continue
fi
done
if [[ -z "$post_fname" ]]; then
echo -e "${YELLOW}| Login failed [2] (filename not found)${NC}"
return 1
fi
filename="$post_fname"
printf "\\n"
echo -e "${GREEN}# Getting download link…${NC}"
sleep 3s
for ((c=1; c<=30; c++)); do
printf "${YELLOW}${NC}"
mkdir -p "${WorkDir}/.temp"
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f ${fdot_cookie_jar}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
form_data="op=download1&usr_login=&id=${file_id}&fname=${post_fname_enc}&referer=https%3A%2F%2Ffiledot.to%2Flogin.html&method_free=Free+Download"
response=$(tor_curl_request --insecure -L -s \
-H "Host: filedot.to" \
-H "User-Agent: $RandomUA" \
-H "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \
-H "Accept-Language: en-US,en;q=0.5" \
-H "Accept-Encoding: gzip, deflate, br" \
-H "Content-Type: application/x-www-form-urlencoded" \
-H "Origin: https://filedot.to" \
-H "Connection: keep-alive" \
-H "Referer: https://filedot.to/login.html" \
-H "DNT: 1" \
-H "Sec-GPC: 1" \
-H "Sec-Fetch-Dest: document" \
-H "Sec-Fetch-Mode: navigate" \
-H "Sec-Fetch-Site: same-origin" \
-H "Sec-Fetch-User: ?1" \
-b "${fdot_cookie_jar}" -c "${fdot_cookie_jar}" \
-d "$form_data" "https://filedot.to/")
if [[ "${DebugAllEnabled}" == "true" ]] ; then
debugHtml "${remote_url##*/}" "fdot_fdownP_$c" "form_data: ${form_data}"$'\n'"${response}"
fi
if grep -Eqi 'Sorry, you have been blocked' <<< "${response}" ; then
if ((c >= 26)) ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${YELLOW}| Login failed [1]${NC}"
return 1
fi
continue
fi
if grep -Eqi '">Error</td></tr>' <<< "${response}" ; then
errTxt=$(grep -oP '(?<=font style="color:#d33;">).*(?=</font>)' <<< "$response")
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${RED}| Error: $errTxt${NC}"
return 1
fi
if grep -Eqi 'Not Found' <<< "${response}" ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${RED}| The file has been removed${NC}"
removedDownload "${remote_url}"
exitDownloadNotAvailable=true
return 1
fi
if grep -Eqi 'This file is available for Premium Users only' <<< "${response}" ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${RED}| The file is only available for Premium Users${NC}"
failedDownload "${remote_url}" "File only available for Premium Users" "${remote_url}"
exitDownloadNotAvailable=true
return 1
fi
if grep -Eqi 'You have reached the download-limit:' <<< "${response}" ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${YELLOW}| Daily download limit reached for account ${BLUE}${fdotUser}${NC} ${YELLOW}[1]${NC}"
printf "${fdotUser}|" >> "${WorkDir}/.temp/_fdot-limitreached-accounts.txt"
addResultsNote "${remote_url}" "Download-limit reached for fdot account (${fdotUser})"
return 1
fi
if grep -Eqi '<input type="hidden" name="op" value="download2">' <<< "${response}" ; then
break
else
if ((c >= 26)) ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${YELLOW}| Failed to get download link [1]${NC}"
return 1
fi
continue
fi
done
printf "\\n"
for ((d=1; d<=30; d++)); do
printf "${YELLOW} _${NC}"
mkdir -p "${WorkDir}/.temp"
download_url=""
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f ${fdot_cookie_jar}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
form_data="op=download2&id=${file_id}&rand=&referer=https%3A%2F%2Ffiledot.to%2Flogin.html&method_free=Free+Download&method_premium=&adblock_detected=0"
response=$(tor_curl_request --insecure -L -s \
-H "Host: filedot.to" \
-H "User-Agent: $RandomUA" \
-H "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8" \
-H "Accept-Language: en-US,en;q=0.5" \
-H "Accept-Encoding: gzip, deflate, br" \
-H "Content-Type: application/x-www-form-urlencoded" \
-H "Origin: https://filedot.to" \
-H "Connection: keep-alive" \
-H "Referer: $remote_url" \
-H "DNT: 1" \
-H "Sec-GPC: 1" \
-H "Sec-Fetch-Dest: document" \
-H "Sec-Fetch-Mode: navigate" \
-H "Sec-Fetch-Site: same-origin" \
-H "Sec-Fetch-User: ?1" \
-b "${fdot_cookie_jar}" -c "${fdot_cookie_jar}" \
-d "$form_data" "$fixed_url")
if [[ "${DebugAllEnabled}" == "true" ]] ; then
debugHtml "${remote_url##*/}" "fdot_downlnkP_$d" "form_data: ${form_data}"$'\n'"${response}"
fi
if grep -Eqi 'Sorry, you have been blocked' <<< "${response}" ; then
if ((d >= 26)) ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${YELLOW}| Login failed [1]${NC}"
return 1
fi
continue
fi
if grep -Eqi 'Not Found' <<< "${response}" ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${RED}| The file has been removed${NC}"
removedDownload "${remote_url}"
exitDownloadNotAvailable=true
return 1
fi
if grep -Eqi 'This file is available for Premium Users only' <<< "${response}" ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${RED}| The file is only available for Premium Users${NC}"
failedDownload "${remote_url}" "File only available for Premium Users" "${remote_url}"
exitDownloadNotAvailable=true
return 1
fi
if grep -Eqi 'You have reached the download-limit:' <<< "${response}" ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${YELLOW}| Daily download limit reached for account ${BLUE}${fdotUser}${NC} ${YELLOW}[1]${NC}"
printf "${fdotUser}|" >> "${WorkDir}/.temp/_fdot-limitreached-accounts.txt"
addResultsNote "${remote_url}" "Download-limit reached for fdot account (${fdotUser})"
return 1
fi
if grep -Eqi 'class="bigres"><a href="' <<< "${response}" ; then
download_url=$(grep -oP -m 1 '(?<=class="bigres"><a href=").*(?="><img src=.*$)' <<< "$response")
download_url=$(urlencode_literal_grouped_case_urlendingonly "$download_url")
if [[ -z $download_url ]] ; then
if ((d >= 26)) ; then
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${YELLOW}| Failed to get download link [2a]${NC}"
return 1
fi
continue
else
break
fi
else
if ((d >= 26)) ; then
printf "\\n"
rm -f "${fdot_cookie_jar}";
echo -e "${YELLOW}| Failed to get download link [2b]${NC}"
return 1
fi
continue
fi
done
rm -f "${fdot_cookie_jar}";
printf "\\n"
echo -e "${GREEN}# Fetching file info…${NC}"
maxfetchretries=10
for ((j=1; j<=$maxfetchretries; j++)); do
printf " ."
CLEANSTRING=${remote_url//[^a-zA-Z0-9]/}
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; echo ""; tput cnorm; exit" 0 1 2 3 6 15
file_header=$(tor_curl_request --insecure -L --head -s --referer "${fixed_url}" "$download_url")
if [[ "${DebugAllEnabled}" == "true" ]] ; then
debugHtml "${remote_url##*/}" "fdot_head_$j" "download_url: ${download_url}"$'\n'"${file_header}"
fi
if [[ -z $file_header ]] ; then
if [[ $j == $maxfetchretries ]] ; then
printf "\\n"
echo -e "${RED}| Failed to extract file info [1]${NC}"
warnAndRetryUnknownError=true
if [[ "${finalAttempt}" == "true" ]] ; then
failedRetryDownload "${remote_url}" "Failed to extract file info [1]" ""
fi
return 1
else
continue
fi
fi
if ! grep -Eqi 'HTTP/2 200|HTTP/1.1 200|200 OK' <<< $file_header ; then
if [[ $j == $maxfetchretries ]] ; then
printf "\\n"
echo -e "${RED}| Failed to extract file info [2]${NC}"
warnAndRetryUnknownError=true
if [[ "${finalAttempt}" == "true" ]] ; then
failedRetryDownload "${remote_url}" "Failed to extract file info [2]" ""
fi
return 1
else
continue
fi
fi
file_size_bytes=$(grep -oPi -m 1 '(?<=content-length: ).*$' <<< "$file_header")
file_size_bytes=${file_size_bytes//[$'\t\r\n']}
if [[ -z "$file_size_bytes" ]]; then
if [[ $j == $maxfetchretries ]] ; then
printf "\\n"
echo -e "${RED}| Failed to extract file info [3]${NC}"
warnAndRetryUnknownError=true
if [[ "${finalAttempt}" == "true" ]] ; then
failedRetryDownload "${remote_url}" "Failed to extract file info [3]" ""
fi
return 1
else
continue
fi
fi
break #Good to go here
done
touch "${WorkDir}/.flocks/${remote_url//[^a-zA-Z0-9]/}"
if [[ ! "$filename_override" == "" ]] ; then
filename="$filename_override"
fi
filename=$(sanitize_file_or_folder_name "${filename}")
printf "\\n"
echo -e "${YELLOW}| File name:${NC}\t\"${filename}\""
if [[ -z $file_size_bytes ]] ; then
if [[ "${finalAttempt}" == "true" ]] ; then
failedRetryDownload "${remote_url}" "Filesize not found!" ""
fi
echo -e "${YELLOW}| Filesize not found… retry${NC}"
return 1
else
file_size_readable="$(numfmt --to=iec --from=auto --format "%.2f" <<< "$file_size_bytes")"
fi
echo -e "${YELLOW}| File size:${NC}\t${file_size_readable}"
file_path="${download_inflight_path}${filename}"
flockDownload="${WorkDir}/.flocks/${filename//[^a-zA-Z0-9\.\_\-]/}.flock"
if CheckFileSize "${remote_url}" "${file_size_bytes}" ; then
return 1
fi
if CheckDownloadExists "$remote_url" "$MoveToFolder" "$filecnt" "$filename" "$file_path" "$completed_location" ; then
return 1
fi
echo "${remote_url//[^a-zA-Z0-9]/}" > $flockDownload
}
#!
#! ----------- (3) Fetch File / Download File Function --------------- #
#!
fdot_GetFile() {
echo -e "${GREEN}# Downloading…"
echo -e "${YELLOW}| File path:${NC}\t./.inflight/${filename}\n"
fileCnt=$1
retryCnt=$2
finalAttempt=$3
flockDownload="${WorkDir}/.flocks/${filename//[^a-zA-Z0-9\.\_\-]/}.flock"
for ((j=1; j<=$MaxDownloadRetries; j++)); do
pd_presize=0
if [[ -f "$file_path" ]] ; then
pd_presize=$(stat --format="%s" "$file_path" | tr -d '[:space:]')
fi
tor_identity="${RANDOM}"
CLEANSTRING=${remote_url//[^a-zA-Z0-9]/}
trap "rm -f ${WorkDir}/.flocks/${CLEANSTRING}; rm -f $flockDownload; echo ""; tput cnorm; exit" 0 1 2 3 6 15
if [[ "${RateMonitorEnabled}" == "true" ]]; then
tor_curl_request --insecure -L -G --speed-limit $DownloadSpeedMin --speed-time $DownloadTimeoutInterval "$download_url" --continue-at - --output "$file_path"
else
tor_curl_request --insecure -L -G "$download_url" --continue-at - --output "$file_path"
fi
received_file_size=0
if [[ -f "$file_path" ]] ; then
received_file_size=$(stat --format="%s" "$file_path" | tr -d '[:space:]')
fi
if CheckNoHtml "$remote_url" "$filename" "$file_path" "$((received_file_size - pd_presize))" ; then
containsHtml=false
else
containsHtml=true
fi
downDelta=$(( received_file_size - pd_presize ))
if [[ "${received_file_size}" -ne "${file_size_bytes}" ]] || [[ "$containsHtml" == "true" ]]; then
if [[ "${AutoRepairBadPartials}" == "true" ]] && (( downDelta > 0 && downDelta < 1024 )) ; then
if [[ -f "${file_path}" ]] ; then
if ((pd_presize > 0)); then
echo -e "${YELLOW}Bad node / HTML found:${NC} reverting to previous file..."
truncateDownload "$remote_url" "$filename" "$pd_presize" "$received_file_size"
truncate -s $pd_presize "${file_path}"
else
echo -e "${YELLOW}Bad node / HTML found:${NC} tainted partial removed..."
rm -f "${file_path}"
fi
fi
if ((j >= $MaxDownloadRetries)) ; then
rm -f "$flockDownload";
if [[ "${finalAttempt}" == "true" ]] ; then
droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}"
fi
return 1
else
continue
fi
elif [[ "${AutoRepairBadPartials}" == "true" ]] && [[ "$containsHtml" == "true" ]] ; then
if [[ -f "${file_path}" ]] ; then
if ((pd_presize > 0)); then
echo -e "${YELLOW}Bad node / HTML found:${NC} reverting to previous file..."
truncateDownload "$remote_url" "$filename" "$pd_presize" "$received_file_size"
truncate -s $pd_presize "${file_path}"
else
echo -e "${YELLOW}Bad node / HTML found:${NC} tainted partial removed..."
rm -f "${file_path}"
fi
fi
if ((j >= $MaxDownloadRetries)) ; then
rm -f "$flockDownload";
if [[ "${finalAttempt}" == "true" ]] ; then
droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}"
fi
return 1
else
continue
fi
elif (( downDelta > 0 && downDelta < 1024 )) || [[ "$containsHtml" == "true" ]] ; then
if [[ -f "$file_path" ]] ; then
rm -rf "$file_path"
fi
echo -e "\n${YELLOW}Bad node / HTML found:${NC} tainted partial removed..."
if ((j >= $MaxDownloadRetries)) ; then
rm -f "$flockDownload";
if [[ "${finalAttempt}" == "true" ]] ; then
droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}"
fi
return 1
else
continue
fi
fi
if [[ "${received_file_size}" -ne "${file_size_bytes}" ]]; then
echo -e "\n${RED}Download failed, file is incomplete.${NC}"
if ((j >= $MaxDownloadRetries)) ; then
rm -f "$flockDownload";
if [[ "${finalAttempt}" == "true" ]] ; then
droppedSizeBadDownload "${remote_url}" "${filename}" "${received_file_size}"
fi
return 1
else
continue
fi
fi
else
break
fi
done
rm -f "$flockDownload";
rm -f "${fdot_cookie_jar}";
ProcessCompletedDownload "$remote_url" "$MoveToFolder" "$filecnt" "$filename" "$file_size_bytes" "$completed_location" "$file_path"
return 0
}
#!
#! --------------- Host Extra Functions ------------------- #
#!