summaryrefslogtreecommitdiffstats
path: root/pyload/plugin/account/Keep2shareCc.py
diff options
context:
space:
mode:
Diffstat (limited to 'pyload/plugin/account/Keep2shareCc.py')
-rw-r--r--pyload/plugin/account/Keep2shareCc.py69
1 files changed, 69 insertions, 0 deletions
diff --git a/pyload/plugin/account/Keep2shareCc.py b/pyload/plugin/account/Keep2shareCc.py
new file mode 100644
index 000000000..1086d893f
--- /dev/null
+++ b/pyload/plugin/account/Keep2shareCc.py
@@ -0,0 +1,69 @@
+# -*- coding: utf-8 -*-
+
+import re
+
+from time import gmtime, mktime, strptime
+
+from pyload.plugin.Account import Account
+
+
+class Keep2shareCc(Account):
+ __name = "Keep2shareCc"
+ __type = "account"
+ __version = "0.02"
+
+ __description = """Keep2share.cc account plugin"""
+ __license = "GPLv3"
+ __authors = [("aeronaut", "aeronaut@pianoguy.de")]
+
+
+ VALID_UNTIL_PATTERN = r'Premium expires: <b>(.+?)</b>'
+ TRAFFIC_LEFT_PATTERN = r'Available traffic \(today\):<b><a href="/user/statistic.html">(.+?)</a>'
+
+ LOGIN_FAIL_PATTERN = r'Please fix the following input errors'
+
+
+ def loadAccountInfo(self, user, req):
+ validuntil = None
+ trafficleft = None
+ premium = None
+
+ html = req.load("http://keep2share.cc/site/profile.html", decode=True)
+
+ m = re.search(self.VALID_UNTIL_PATTERN, html)
+ if m:
+ expiredate = m.group(1).strip()
+ self.logDebug("Expire date: " + expiredate)
+
+ try:
+ validuntil = mktime(strptime(expiredate, "%Y.%m.%d"))
+
+ except Exception, e:
+ self.logError(e)
+
+ else:
+ if validuntil > mktime(gmtime()):
+ premium = True
+ else:
+ premium = False
+ validuntil = None
+
+ m = re.search(self.TRAFFIC_LEFT_PATTERN, html)
+ if m:
+ try:
+ trafficleft = self.parseTraffic(m.group(1))
+
+ except Exception, e:
+ self.logError(e)
+
+ return {'validuntil': validuntil, 'trafficleft': trafficleft, 'premium': premium}
+
+
+ def login(self, user, data, req):
+ req.cj.setCookie("keep2share.cc", "lang", "en")
+
+ html = req.load("http://keep2share.cc/login.html",
+ post={'LoginForm[username]': user, 'LoginForm[password]': data['password']})
+
+ if re.search(self.LOGIN_FAIL_PATTERN, html):
+ self.wrongPassword()