mirror of
https://git.freebsd.org/ports.git
synced 2025-06-03 11:56:28 -04:00
New port: net/py-cloudflare-scrape-js2py
A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm Under Attack Mode", or IUAM), implemented with Requests. WWW: https://github.com/VeNoMouS/cloudflare-scrape-js2py
This commit is contained in:
parent
e7e64a505e
commit
4226769ee3
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=499335
4 changed files with 44 additions and 0 deletions
|
@ -1019,6 +1019,7 @@
|
|||
SUBDIR += py-beanstalkc
|
||||
SUBDIR += py-cjdns
|
||||
SUBDIR += py-cloudflare-scrape
|
||||
SUBDIR += py-cloudflare-scrape-js2py
|
||||
SUBDIR += py-coherence
|
||||
SUBDIR += py-confluent-kafka
|
||||
SUBDIR += py-cymruwhois
|
||||
|
|
26
net/py-cloudflare-scrape-js2py/Makefile
Normal file
26
net/py-cloudflare-scrape-js2py/Makefile
Normal file
|
@ -0,0 +1,26 @@
|
|||
# $FreeBSD$
|
||||
|
||||
PORTNAME= cloudflare-scrape-js2py
|
||||
DISTVERSIONPREFIX= v
|
||||
DISTVERSION= 2.0.3
|
||||
CATEGORIES= net python
|
||||
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
|
||||
|
||||
MAINTAINER= tcberner@FreeBSD.org
|
||||
COMMENT= Python module to bypass Cloudflare's anti-bot page using js2py #'
|
||||
|
||||
LICENSE= MIT
|
||||
LICENSE_FILE= ${WRKSRC}/LICENSE
|
||||
|
||||
RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}requests>2.4.0:www/py-requests@${PY_FLAVOR} \
|
||||
${PYTHON_PKGNAMEPREFIX}Js2Py>=0:devel/py-Js2Py@${PY_FLAVOR}
|
||||
|
||||
USES= python
|
||||
USE_PYTHON= distutils autoplist
|
||||
|
||||
USE_GITHUB= yes
|
||||
GH_ACCOUNT= VeNoMouS
|
||||
|
||||
CONFLICTS_INSTALL= ${PYTHON_PKGNAMEPREFIX}cloudflare-scrape-1.*
|
||||
|
||||
.include <bsd.port.mk>
|
3
net/py-cloudflare-scrape-js2py/distinfo
Normal file
3
net/py-cloudflare-scrape-js2py/distinfo
Normal file
|
@ -0,0 +1,3 @@
|
|||
TIMESTAMP = 1555662065
|
||||
SHA256 (VeNoMouS-cloudflare-scrape-js2py-v2.0.3_GH0.tar.gz) = f0c198a44145e3ed75f6756b5875ad754d9551a9a48abd89981be60c061018cf
|
||||
SIZE (VeNoMouS-cloudflare-scrape-js2py-v2.0.3_GH0.tar.gz) = 9906
|
14
net/py-cloudflare-scrape-js2py/pkg-descr
Normal file
14
net/py-cloudflare-scrape-js2py/pkg-descr
Normal file
|
@ -0,0 +1,14 @@
|
|||
A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm
|
||||
Under Attack Mode", or IUAM), implemented with Requests. Cloudflare changes
|
||||
their techniques periodically, so I will update this repo frequently.
|
||||
|
||||
This can be useful if you wish to scrape or crawl a website protected with
|
||||
Cloudflare. Cloudflare's anti-bot page currently just checks if the client
|
||||
supports Javascript, though they may add additional techniques in the future.
|
||||
|
||||
Due to Cloudflare continually changing and hardening their protection page,
|
||||
cloudflare-scrape requires js2py to solve Javascript challenges. This allows
|
||||
the script to easily impersonate a regular web browser without explicitly
|
||||
deobfuscating and parsing Cloudflare's Javascript.
|
||||
|
||||
WWW: https://github.com/VeNoMouS/cloudflare-scrape-js2py
|
Loading…
Add table
Reference in a new issue