Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Ixigua] ERROR: Failed to get SSR_HYDRATED_DATA #5374

Open
10 tasks done
kinnerful opened this issue Oct 28, 2022 · 4 comments
Open
10 tasks done

[Ixigua] ERROR: Failed to get SSR_HYDRATED_DATA #5374

kinnerful opened this issue Oct 28, 2022 · 4 comments
Labels
site-bug Issue with a specific website

Comments

@kinnerful
Copy link

kinnerful commented Oct 28, 2022

DO NOT REMOVE OR SKIP THE ISSUE TEMPLATE

  • I understand that I will be blocked if I remove or skip any mandatory* field

Checklist

Region

US

Provide a description that is worded well enough to be understood

Downloading using the following argument:
--cookies-from-browser firefox https://www.ixigua.com/7136520673781875232?logTag=38fe102fafe8e209dffa

I get the following error message:
[Cookies] Extracting cookies from firefox
[Cookies] Extracted 2724 cookies from firefox
[Ixigua] 7136520673781875232: Downloading webpage
ERROR: [Ixigua] 7136520673781875232: Failed to get SSR_HYDRATED_DATA; please report this issue on https://github.com/yt-dlp/yt-dlp/issues?q= , filling out the appropriate issue template. Confirm you are on the latest version using yt-dlp -U

Provide verbose output that clearly demonstrates the problem

  • Run your yt-dlp command with -vU flag added (yt-dlp -vU <your command line>)
  • Copy the WHOLE output (starting with [debug] Command-line config) and insert it below

Complete Verbose Output

[debug] Command-line config: ['-vU', '--cookies-from-browser', 'firefox', 'https://www.ixigua.com/7136520673781875232?logTag=38fe102fafe8e209dffa', '-']
[debug] Encodings: locale cp1252, fs utf-8, pref cp1252, out cp1252 (No ANSI), error cp1252 (No ANSI), screen cp1252 (No ANSI)
[debug] yt-dlp version 2022.10.04 [4e0511f] (win32_exe)
[debug] Python 3.8.10 (CPython 64bit) - Windows-10-10.0.19044-SP0
[debug] Checking exe version: ffmpeg -bsfs
[debug] Checking exe version: ffprobe -bsfs
[debug] exe versions: ffmpeg N-108709-g3bd0bf76fb-20221017 (setts), ffprobe N-108709-g3bd0bf76fb-20221017
[debug] Optional libraries: Cryptodome-3.15.0, brotli-1.0.9, certifi-2022.09.24, mutagen-1.45.1, sqlite3-2.6.0, websockets-10.3
[Cookies] Extracting cookies from firefox
[debug] Extracting cookies from: "C:\Users\kinne\AppData\Roaming\Mozilla\Firefox\Profiles\89ozw6n0.default-release\cookies.sqlite"
[Cookies] Extracted 2728 cookies from firefox
[debug] Proxy map: {}
[debug] Loaded 1690 extractors
[debug] Fetching release info: https://api.github.com/repos/yt-dlp/yt-dlp/releases/latest
Latest version: 2022.10.04, Current version: 2022.10.04
yt-dlp is up to date (2022.10.04)
[debug] [Ixigua] Extracting URL: https://www.ixigua.com/7136520673781875232?logTag=38fe102fafe8e209dffa
[Ixigua] 7136520673781875232: Downloading webpage
ERROR: [Ixigua] 7136520673781875232: Failed to get SSR_HYDRATED_DATA; please report this issue on  https://github.com/yt-dlp/yt-dlp/issues?q= , filling out the appropriate issue template. Confirm you are on the latest version using  yt-dlp -U
  File "yt_dlp\extractor\common.py", line 672, in extract
  File "yt_dlp\extractor\ixigua.py", line 67, in _real_extract
  File "yt_dlp\extractor\ixigua.py", line 39, in _get_json_data

[debug] [generic] Extracting URL: -
ERROR: [generic] '-' is not a valid URL. Set --default-search "ytsearch" (or run  yt-dlp "ytsearch:-" ) to search YouTube
  File "yt_dlp\extractor\common.py", line 672, in extract
  File "yt_dlp\extractor\generic.py", line 2588, in _real_extract
@kinnerful kinnerful added site-bug Issue with a specific website triage Untriaged issue labels Oct 28, 2022
@HobbyistDev
Copy link
Contributor

The extractor will work if the cookie have some keys like __ac_nonce , __ac_signature, ttwid. These keys are needed to get expected result. The webpage itself seems using javascript to redirect and add some header while redirecting.
Anyway, i think the extractor is related to tiktok as this website also send ttwid, aid, and other value.

For workaround, you need to open at least one video, check the webpage url in dev tool that have required cookie value and pass it to yt-dlp.

> yt-dlp -v "https://www.ixigua.com/7136520673781875232?logTag=38fe102fafe8e209dffa&wid_try=1" --add-header "Cookie: __ac_nonce=06397c25a005e9388388f; __ac_signature=_02B4Z6wo00f01x.CfOwAAIDCA4HCUsdAblsf83hAAKRxf1; ttwid=1%7Cc5jQ_rGFyWiGvUo58C6_9V3Jb1kDT3XYimT0sJw_b3k%7C1670890077%7C0d42fcf045a23d0d5398419c2429566b24ee08bb27728c21950b35adf5d98bb2" -f 30-1
[debug] Command-line config: ['-v', 'https://www.ixigua.com/7136520673781875232?logTag=38fe102fafe8e209dffa&wid_try=1', '--add-header', 'Cookie: __ac_nonce=06397c25a005e9388388f; __ac_signature=_02B4Z6wo00f01x.CfOwAAIDCA4HCUsdAblsf83hAAKRxf1; ttwid=1%7Cc5jQ_rGFyWiGvUo58C6_9V3Jb1kDT3XYimT0sJw_b3k%7C1670890077%7C0d42fcf045a23d0d5398419c2429566b24ee08bb27728c21950b35adf5d98bb2', '-f', '30-1']
[debug] Encodings: locale cp1252, fs utf-8, pref cp1252, out utf-8, error utf-8, screen utf-8
[debug] yt-dlp version 2022.11.11 [8b64402] (win_exe)
[debug] Python 3.8.10 (CPython AMD64 64bit) - Windows-10-10.0.22000-SP0 (OpenSSL 1.1.1k  25 Mar 2021)
[debug] exe versions: ffmpeg 5.1-full_build-www.gyan.dev (setts), ffprobe 5.1-full_build-www.gyan.dev
[debug] Optional libraries: Cryptodome-3.15.0, brotli-1.0.9, certifi-2022.09.24, mutagen-1.46.0, sqlite3-2.6.0, websockets-10.4
[debug] Proxy map: {}
[debug] Loaded 1723 extractors
[debug] [Ixigua] Extracting URL: https://www.ixigua.com/7136520673781875232?logTag=38fe102fafe8e209dffa&wid_try=1
[Ixigua] 7136520673781875232: Downloading webpage
[debug] Formats sorted by: hasvid, ie_pref, lang, quality, res, fps, hdr:12(7), vcodec:vp9.2(10), channels, acodec, filesize, fs_approx, tbr, vbr, abr, asr, proto, vext, aext, hasaud, source, id
[info] 7136520673781875232: Downloading 1 format(s): 30-1
[debug] Invoking http downloader on "http://v3-xg-web-pc.ixigua.com/6475375e621063ed004acc62722f3ac0/6397e0f1/video/tos/cn/tos-cn-v-0026/181a92e18dc4490ab7e6118a3704d846/media-video-avc1/?a=1768&ch=0&cr=0&dr=0&er=0&cd=0%7C0%7C0%7C0&cv=1&br=853&bt=853&cs=0&ds=2&mime_type=video_mp4&qs=0&rc=ZDxnZWU7OWhmOzdmaTc6NkBpanY8eTc6ZjwzZjMzNGQzM0BgMWAwNl82NmExMV9fNS0zYSMucy8ycjRvMTJgLS1kLi9zcw%3D%3D&l=2022121308293101015120421703297040&btag=38000"
[debug] File locking is not supported. Proceeding without locking
[download] Destination: 蝶龙之乱下阕超清版07 [7136520673781875232].mp4
[download]   0.0% of  281.00MiB at  108.51KiB/s ETA 44:10
ERROR: Interrupted by user

Currently, some url will return HTTP 403. If this happen, please select another format.

@bczhc
Copy link

bczhc commented Oct 29, 2023

Hi! Can anyone get any successful chance to download ixigua TV series compilations (that's, not single videos, not playlists)? With this workaround (let yt-dlp have browser cookies) I can download single videos but not TV series. Seems the workaround won't work for this case.

Test video: https://www.ixigua.com/7052200624728834591?logTag=4ac9c57f562d9b19f74c

Errors:

~ ❯ yt-dlp --cookies-from-browser firefox --downloader aria2c -F https://www.ixigua.com/7052200624728834591\?logTag\=4ac9c57f562d9b19f74c
Extracting cookies from firefox
Extracted 2834 cookies from firefox
[Ixigua] Extracting URL: https://www.ixigua.com/7052200624728834591?logTag=4ac9c57f562d9b19f74c
[Ixigua] 7052200624728834591: Downloading webpage
ERROR: [Ixigua] 7052200624728834591: Failed to get SSR_HYDRATED_DATA; please report this issue on  https://github.com/yt-dlp/yt-dlp/issues?q= , filling out the appropriate issue template. Confirm you are on the latest version using  yt-dlp -U

@bashonly
Copy link
Member

Currently, some [format] url[s] will return HTTP 403

per #9484, those formats need a referer header

@dirkf
Copy link
Contributor

dirkf commented May 13, 2024

The extractor will work if the cookie have some keys like __ac_nonce , __ac_signature, ttwid. These keys are needed to get expected result. The webpage itself seems using javascript to redirect and add some header while redirecting.

See #9784 (comment) for minimal request parameters to avoid the interstitial page.

Anyway, i think the extractor is related to tiktok as this website also send ttwid, aid, and other value.

Definitely: it's another ByteDance property.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
site-bug Issue with a specific website
Projects
None yet
Development

No branches or pull requests

6 participants