Port details |
- py-cloudflare-scrape-js2py Python module to bypass Cloudflare's anti-bot page using js2py
- 2.0.3 net =2 2.0.3Version of this port present on the latest quarterly branch.
- Maintainer: tcberner@FreeBSD.org
- Port Added: 2019-04-19 08:38:00
- Last Update: 2023-06-27 19:34:34
- Commit Hash: 3d9a815
- People watching this port, also watch:: jdictionary, py311-Automat, py311-python-gdsii, py39-PyOpenGL, p5-Sane
- Also Listed In: python
- License: MIT
- WWW:
- https://github.com/VeNoMouS/cloudflare-scrape-js2py
- Description:
- A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm
Under Attack Mode", or IUAM), implemented with Requests. Cloudflare changes
their techniques periodically, so I will update this repo frequently.
This can be useful if you wish to scrape or crawl a website protected with
Cloudflare. Cloudflare's anti-bot page currently just checks if the client
supports Javascript, though they may add additional techniques in the future.
Due to Cloudflare continually changing and hardening their protection page,
cloudflare-scrape requires js2py to solve Javascript challenges. This allows
the script to easily impersonate a regular web browser without explicitly
deobfuscating and parsing Cloudflare's Javascript.
- ¦ ¦ ¦ ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - There is no configure plist information for this port.
- Dependency lines:
-
- ${PYTHON_PKGNAMEPREFIX}cloudflare-scrape-js2py>0:net/py-cloudflare-scrape-js2py@${PY_FLAVOR}
- Conflicts:
- CONFLICTS_INSTALL:
- py39-cloudflare-scrape-1.*
- To install the port:
- cd /usr/ports/net/py-cloudflare-scrape-js2py/ && make install clean
- To add the package, run one of these commands:
- pkg install net/py-cloudflare-scrape-js2py
- pkg install py39-cloudflare-scrape-js2py
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above. NOTE: This is a Python port. Instead of py39-cloudflare-scrape-js2py listed in the above command, you can pick from the names under the Packages section.- PKGNAME: py39-cloudflare-scrape-js2py
- Package flavors (<flavor>: <package>)
- py39: py39-cloudflare-scrape-js2py
- distinfo:
- TIMESTAMP = 1555662065
SHA256 (VeNoMouS-cloudflare-scrape-js2py-v2.0.3_GH0.tar.gz) = f0c198a44145e3ed75f6756b5875ad754d9551a9a48abd89981be60c061018cf
SIZE (VeNoMouS-cloudflare-scrape-js2py-v2.0.3_GH0.tar.gz) = 9906
Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- py39-setuptools>=63.1.0 : devel/py-setuptools@py39
- python3.9 : lang/python39
- Test dependencies:
-
- python3.9 : lang/python39
- Runtime dependencies:
-
- py39-requests>2.4.0 : www/py-requests@py39
- py39-Js2Py>=0 : devel/py-Js2Py@py39
- py39-setuptools>=63.1.0 : devel/py-setuptools@py39
- python3.9 : lang/python39
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- net_py-cloudflare-scrape-js2py
- USES:
- python
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
|
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
2.0.3 27 Jun 2023 19:34:34 |
Rene Ladan (rene) |
all: remove explicit versions in USES=python for "3.x+"
The logic in USES=python will automatically convert this to 3.8+ by
itself.
Adjust two ports that only had Python 3.7 mentioned but build fine
on Python 3.8 too.
finance/quickfix: mark BROKEN with PYTHON
libtool: compile: c++ -DHAVE_CONFIG_H -I. -I../.. -I -I. -I.. -I../.. -I../C++
-DLIBICONV_PLUG -DPYTHON_MAJOR_VERSION=3 -Wno-unused-variable
-Wno-maybe-uninitialized -O2 -pipe -DLIBICONV_PLUG -fstack-protector-strong
-fno-strict-aliasing -DLIBICONV_PLUG -Wall -ansi
-Wno-unused-command-line-argument -Wpointer-arith -Wwrite-strings
-Wno-overloaded-virtual -Wno-deprecated-declarations -Wno-deprecated -std=c++0x
-MT _quickfix_la-QuickfixPython.lo -MD -MP -MF
.deps/_quickfix_la-QuickfixPython.Tpo -c QuickfixPython.cpp -fPIC -DPIC -o
.libs/_quickfix_la-QuickfixPython.o
warning: unknown warning option '-Wno-maybe-uninitialized'; did you mean
'-Wno-uninitialized'? [-Wunknown-warning-option]
QuickfixPython.cpp:175:11: fatal error: 'Python.h' file not found
^~~~~~~~~~
1 warning and 1 error generated.
Reviewed by: portmgr, vishwin, yuri
Differential Revision: <https://reviews.freebsd.org/D40568> |
07 Sep 2022 21:58:51 |
Stefan Eßer (se) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
2.0.3 07 Sep 2022 21:10:59 |
Stefan Eßer (se) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
2.0.3 07 Apr 2021 08:09:01 |
Mathieu Arnold (mat) |
One more small cleanup, forgotten yesterday.
Reported by: lwhsu |
2.0.3 06 Apr 2021 14:31:07 |
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles. |
2.0.3 28 Dec 2020 23:02:15 |
antoine |
Drop python 2.7 support from a few ports
With hat: portmgr |
2.0.3 19 Apr 2019 08:37:44 |
tcberner |
New port: net/py-cloudflare-scrape-js2py
A simple Python module to bypass Cloudflare's anti-bot page (also known as "I'm
Under Attack Mode", or IUAM), implemented with Requests.
WWW: https://github.com/VeNoMouS/cloudflare-scrape-js2py |