Date: Fri, 19 May 2017 15:56:44 +0000 (UTC) From: "Tobias C. Berner" <tcberner@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r441247 - in head/net: . py-cloudflare-scrape Message-ID: <201705191556.v4JFui7o093595@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: tcberner Date: Fri May 19 15:56:44 2017 New Revision: 441247 URL: https://svnweb.freebsd.org/changeset/ports/441247 Log: New port: net/py-cloudflare-scrape A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm Under Attack Mode", or IUAM), implemented with Requests. https://github.com/Anorov/cloudflare-scrape Approved by: rakuco (mentor, implicit) Differential Revision: https://reviews.freebsd.org/D10813 Added: head/net/py-cloudflare-scrape/ head/net/py-cloudflare-scrape/Makefile (contents, props changed) head/net/py-cloudflare-scrape/distinfo (contents, props changed) head/net/py-cloudflare-scrape/pkg-descr (contents, props changed) Modified: head/net/Makefile Modified: head/net/Makefile ============================================================================== --- head/net/Makefile Fri May 19 15:55:35 2017 (r441246) +++ head/net/Makefile Fri May 19 15:56:44 2017 (r441247) @@ -969,6 +969,7 @@ SUBDIR += py-beanstalkc SUBDIR += py-cjdns SUBDIR += py-cloudfiles + SUBDIR += py-cloudflare-scrape SUBDIR += py-coherence SUBDIR += py-cymruwhois SUBDIR += py-dpkt Added: head/net/py-cloudflare-scrape/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/net/py-cloudflare-scrape/Makefile Fri May 19 15:56:44 2017 (r441247) @@ -0,0 +1,22 @@ +# $FreeBSD$ + +PORTNAME= cloudflare-scrape +PORTVERSION= 1.8.0 +CATEGORIES= net python +PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} + +MAINTAINER= tcberner@FreeBSD.org +COMMENT= Python module to bypass Cloudflare's anti-bot page + +LICENSE= MIT +LICENSE_FILE= ${WRKSRC}/LICENSE + +RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}PyExecJS>=0:devel/py-PyExecJS + +USES= python +USE_PYTHON= distutils autoplist + +USE_GITHUB= yes +GH_ACCOUNT= Anorov + +.include <bsd.port.mk> Added: head/net/py-cloudflare-scrape/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/net/py-cloudflare-scrape/distinfo Fri May 19 15:56:44 2017 (r441247) @@ -0,0 +1,3 @@ +TIMESTAMP = 1495173015 +SHA256 (Anorov-cloudflare-scrape-1.8.0_GH0.tar.gz) = 59cc3b1a39a5965cf989bd459769c6ff76418cc133c32320bfd0880857d3e8d7 +SIZE (Anorov-cloudflare-scrape-1.8.0_GH0.tar.gz) = 7703 Added: head/net/py-cloudflare-scrape/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/net/py-cloudflare-scrape/pkg-descr Fri May 19 15:56:44 2017 (r441247) @@ -0,0 +1,9 @@ +A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm +Under Attack Mode", or IUAM), implemented with Requests. Cloudflare changes +their techniques periodically, so I will update this repo frequently. + +This can be useful if you wish to scrape or crawl a website protected with +Cloudflare. Cloudflare's anti-bot page currently just checks if the client +supports Javascript, though they may add additional techniques in the future. + +WWW: https://github.com/Anorov/cloudflare-scrape
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201705191556.v4JFui7o093595>