svn commit: r499335 - in head/net: . py-cloudflare-scrape-js2py

Tobias C. Berner tcberner at FreeBSD.org
Fri Apr 19 08:37:46 UTC 2019


Author: tcberner
Date: Fri Apr 19 08:37:44 2019
New Revision: 499335
URL: https://svnweb.freebsd.org/changeset/ports/499335

Log:
  New port: net/py-cloudflare-scrape-js2py
  
  A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm
  Under Attack Mode", or IUAM), implemented with Requests.
  
  WWW: https://github.com/VeNoMouS/cloudflare-scrape-js2py

Added:
  head/net/py-cloudflare-scrape-js2py/
  head/net/py-cloudflare-scrape-js2py/Makefile   (contents, props changed)
  head/net/py-cloudflare-scrape-js2py/distinfo   (contents, props changed)
  head/net/py-cloudflare-scrape-js2py/pkg-descr   (contents, props changed)
Modified:
  head/net/Makefile

Modified: head/net/Makefile
==============================================================================
--- head/net/Makefile	Fri Apr 19 08:36:44 2019	(r499334)
+++ head/net/Makefile	Fri Apr 19 08:37:44 2019	(r499335)
@@ -1019,6 +1019,7 @@
     SUBDIR += py-beanstalkc
     SUBDIR += py-cjdns
     SUBDIR += py-cloudflare-scrape
+    SUBDIR += py-cloudflare-scrape-js2py
     SUBDIR += py-coherence
     SUBDIR += py-confluent-kafka
     SUBDIR += py-cymruwhois

Added: head/net/py-cloudflare-scrape-js2py/Makefile
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/net/py-cloudflare-scrape-js2py/Makefile	Fri Apr 19 08:37:44 2019	(r499335)
@@ -0,0 +1,26 @@
+# $FreeBSD$
+
+PORTNAME=	cloudflare-scrape-js2py
+DISTVERSIONPREFIX=	v
+DISTVERSION=	2.0.3
+CATEGORIES=	net python
+PKGNAMEPREFIX=	${PYTHON_PKGNAMEPREFIX}
+
+MAINTAINER=	tcberner at FreeBSD.org
+COMMENT=	Python module to bypass Cloudflare's anti-bot page using js2py #'
+
+LICENSE=	MIT
+LICENSE_FILE=	${WRKSRC}/LICENSE
+
+RUN_DEPENDS=	${PYTHON_PKGNAMEPREFIX}requests>2.4.0:www/py-requests@${PY_FLAVOR} \
+		${PYTHON_PKGNAMEPREFIX}Js2Py>=0:devel/py-Js2Py@${PY_FLAVOR}
+
+USES=		python
+USE_PYTHON=	distutils autoplist
+
+USE_GITHUB=	yes
+GH_ACCOUNT=	VeNoMouS
+
+CONFLICTS_INSTALL=	${PYTHON_PKGNAMEPREFIX}cloudflare-scrape-1.*
+
+.include <bsd.port.mk>

Added: head/net/py-cloudflare-scrape-js2py/distinfo
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/net/py-cloudflare-scrape-js2py/distinfo	Fri Apr 19 08:37:44 2019	(r499335)
@@ -0,0 +1,3 @@
+TIMESTAMP = 1555662065
+SHA256 (VeNoMouS-cloudflare-scrape-js2py-v2.0.3_GH0.tar.gz) = f0c198a44145e3ed75f6756b5875ad754d9551a9a48abd89981be60c061018cf
+SIZE (VeNoMouS-cloudflare-scrape-js2py-v2.0.3_GH0.tar.gz) = 9906

Added: head/net/py-cloudflare-scrape-js2py/pkg-descr
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/net/py-cloudflare-scrape-js2py/pkg-descr	Fri Apr 19 08:37:44 2019	(r499335)
@@ -0,0 +1,14 @@
+A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm
+Under Attack Mode", or IUAM), implemented with Requests. Cloudflare changes
+their techniques periodically, so I will update this repo frequently.
+
+This can be useful if you wish to scrape or crawl a website protected with
+Cloudflare. Cloudflare's anti-bot page currently just checks if the client
+supports Javascript, though they may add additional techniques in the future.
+
+Due to Cloudflare continually changing and hardening their protection page,
+cloudflare-scrape requires js2py to solve Javascript challenges. This allows
+the script to easily impersonate a regular web browser without explicitly
+deobfuscating and parsing Cloudflare's Javascript.
+
+WWW: https://github.com/VeNoMouS/cloudflare-scrape-js2py


More information about the svn-ports-all mailing list