Date: Fri, 19 Apr 2019 08:37:44 +0000 (UTC) From: "Tobias C. Berner" <tcberner@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r499335 - in head/net: . py-cloudflare-scrape-js2py Message-ID: <201904190837.x3J8biOs045535@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: tcberner Date: Fri Apr 19 08:37:44 2019 New Revision: 499335 URL: https://svnweb.freebsd.org/changeset/ports/499335 Log: New port: net/py-cloudflare-scrape-js2py A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm Under Attack Mode", or IUAM), implemented with Requests. WWW: https://github.com/VeNoMouS/cloudflare-scrape-js2py Added: head/net/py-cloudflare-scrape-js2py/ head/net/py-cloudflare-scrape-js2py/Makefile (contents, props changed) head/net/py-cloudflare-scrape-js2py/distinfo (contents, props changed) head/net/py-cloudflare-scrape-js2py/pkg-descr (contents, props changed) Modified: head/net/Makefile Modified: head/net/Makefile ============================================================================== --- head/net/Makefile Fri Apr 19 08:36:44 2019 (r499334) +++ head/net/Makefile Fri Apr 19 08:37:44 2019 (r499335) @@ -1019,6 +1019,7 @@ SUBDIR += py-beanstalkc SUBDIR += py-cjdns SUBDIR += py-cloudflare-scrape + SUBDIR += py-cloudflare-scrape-js2py SUBDIR += py-coherence SUBDIR += py-confluent-kafka SUBDIR += py-cymruwhois Added: head/net/py-cloudflare-scrape-js2py/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/net/py-cloudflare-scrape-js2py/Makefile Fri Apr 19 08:37:44 2019 (r499335) @@ -0,0 +1,26 @@ +# $FreeBSD$ + +PORTNAME= cloudflare-scrape-js2py +DISTVERSIONPREFIX= v +DISTVERSION= 2.0.3 +CATEGORIES= net python +PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} + +MAINTAINER= tcberner@FreeBSD.org +COMMENT= Python module to bypass Cloudflare's anti-bot page using js2py #' + +LICENSE= MIT +LICENSE_FILE= ${WRKSRC}/LICENSE + +RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}requests>2.4.0:www/py-requests@${PY_FLAVOR} \ + ${PYTHON_PKGNAMEPREFIX}Js2Py>=0:devel/py-Js2Py@${PY_FLAVOR} + +USES= python +USE_PYTHON= distutils autoplist + +USE_GITHUB= yes +GH_ACCOUNT= VeNoMouS + +CONFLICTS_INSTALL= ${PYTHON_PKGNAMEPREFIX}cloudflare-scrape-1.* + +.include <bsd.port.mk> Added: head/net/py-cloudflare-scrape-js2py/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/net/py-cloudflare-scrape-js2py/distinfo Fri Apr 19 08:37:44 2019 (r499335) @@ -0,0 +1,3 @@ +TIMESTAMP = 1555662065 +SHA256 (VeNoMouS-cloudflare-scrape-js2py-v2.0.3_GH0.tar.gz) = f0c198a44145e3ed75f6756b5875ad754d9551a9a48abd89981be60c061018cf +SIZE (VeNoMouS-cloudflare-scrape-js2py-v2.0.3_GH0.tar.gz) = 9906 Added: head/net/py-cloudflare-scrape-js2py/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/net/py-cloudflare-scrape-js2py/pkg-descr Fri Apr 19 08:37:44 2019 (r499335) @@ -0,0 +1,14 @@ +A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm +Under Attack Mode", or IUAM), implemented with Requests. Cloudflare changes +their techniques periodically, so I will update this repo frequently. + +This can be useful if you wish to scrape or crawl a website protected with +Cloudflare. Cloudflare's anti-bot page currently just checks if the client +supports Javascript, though they may add additional techniques in the future. + +Due to Cloudflare continually changing and hardening their protection page, +cloudflare-scrape requires js2py to solve Javascript challenges. This allows +the script to easily impersonate a regular web browser without explicitly +deobfuscating and parsing Cloudflare's Javascript. + +WWW: https://github.com/VeNoMouS/cloudflare-scrape-js2py
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201904190837.x3J8biOs045535>