svn commit: r499335 - in head/net: . py-cloudflare-scrape-js2py
Tobias C. Berner
tcberner at FreeBSD.org
Fri Apr 19 08:37:46 UTC 2019
Author: tcberner
Date: Fri Apr 19 08:37:44 2019
New Revision: 499335
URL: https://svnweb.freebsd.org/changeset/ports/499335
Log:
New port: net/py-cloudflare-scrape-js2py
A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm
Under Attack Mode", or IUAM), implemented with Requests.
WWW: https://github.com/VeNoMouS/cloudflare-scrape-js2py
Added:
head/net/py-cloudflare-scrape-js2py/
head/net/py-cloudflare-scrape-js2py/Makefile (contents, props changed)
head/net/py-cloudflare-scrape-js2py/distinfo (contents, props changed)
head/net/py-cloudflare-scrape-js2py/pkg-descr (contents, props changed)
Modified:
head/net/Makefile
Modified: head/net/Makefile
==============================================================================
--- head/net/Makefile Fri Apr 19 08:36:44 2019 (r499334)
+++ head/net/Makefile Fri Apr 19 08:37:44 2019 (r499335)
@@ -1019,6 +1019,7 @@
SUBDIR += py-beanstalkc
SUBDIR += py-cjdns
SUBDIR += py-cloudflare-scrape
+ SUBDIR += py-cloudflare-scrape-js2py
SUBDIR += py-coherence
SUBDIR += py-confluent-kafka
SUBDIR += py-cymruwhois
Added: head/net/py-cloudflare-scrape-js2py/Makefile
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/net/py-cloudflare-scrape-js2py/Makefile Fri Apr 19 08:37:44 2019 (r499335)
@@ -0,0 +1,26 @@
+# $FreeBSD$
+
+PORTNAME= cloudflare-scrape-js2py
+DISTVERSIONPREFIX= v
+DISTVERSION= 2.0.3
+CATEGORIES= net python
+PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
+
+MAINTAINER= tcberner at FreeBSD.org
+COMMENT= Python module to bypass Cloudflare's anti-bot page using js2py #'
+
+LICENSE= MIT
+LICENSE_FILE= ${WRKSRC}/LICENSE
+
+RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}requests>2.4.0:www/py-requests@${PY_FLAVOR} \
+ ${PYTHON_PKGNAMEPREFIX}Js2Py>=0:devel/py-Js2Py@${PY_FLAVOR}
+
+USES= python
+USE_PYTHON= distutils autoplist
+
+USE_GITHUB= yes
+GH_ACCOUNT= VeNoMouS
+
+CONFLICTS_INSTALL= ${PYTHON_PKGNAMEPREFIX}cloudflare-scrape-1.*
+
+.include <bsd.port.mk>
Added: head/net/py-cloudflare-scrape-js2py/distinfo
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/net/py-cloudflare-scrape-js2py/distinfo Fri Apr 19 08:37:44 2019 (r499335)
@@ -0,0 +1,3 @@
+TIMESTAMP = 1555662065
+SHA256 (VeNoMouS-cloudflare-scrape-js2py-v2.0.3_GH0.tar.gz) = f0c198a44145e3ed75f6756b5875ad754d9551a9a48abd89981be60c061018cf
+SIZE (VeNoMouS-cloudflare-scrape-js2py-v2.0.3_GH0.tar.gz) = 9906
Added: head/net/py-cloudflare-scrape-js2py/pkg-descr
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/net/py-cloudflare-scrape-js2py/pkg-descr Fri Apr 19 08:37:44 2019 (r499335)
@@ -0,0 +1,14 @@
+A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm
+Under Attack Mode", or IUAM), implemented with Requests. Cloudflare changes
+their techniques periodically, so I will update this repo frequently.
+
+This can be useful if you wish to scrape or crawl a website protected with
+Cloudflare. Cloudflare's anti-bot page currently just checks if the client
+supports Javascript, though they may add additional techniques in the future.
+
+Due to Cloudflare continually changing and hardening their protection page,
+cloudflare-scrape requires js2py to solve Javascript challenges. This allows
+the script to easily impersonate a regular web browser without explicitly
+deobfuscating and parsing Cloudflare's Javascript.
+
+WWW: https://github.com/VeNoMouS/cloudflare-scrape-js2py
More information about the svn-ports-head
mailing list