./python/py-cfscrape, Python module for dealing with Cloudfare protection

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 1.9.4, Package name: py27-cfscrape-1.9.4, Maintainer: pkgsrc-users

This Python module allows by-passing of Cloudfare's anti-bot page. It
will dynamically evaluate the Javascript challenge as proof of web
browserness. It cannot handle reCAPTCHA challenges.


Required to run:
[devel/py-setuptools] [lang/python27] [devel/py-requests] [lang/py-execjs]

Required to build:
[pkgtools/cwrappers]

Master sites:

SHA1: f2cd0dbd0452ff7835da531b9eaef7c348dce74b
RMD160: bec98f1a8ece193f3f7e2b5fd7f8efd6b8bc79de
Filesize: 8.046 KB

Version history: (Expand)


CVS history: (Expand)


   2018-02-12 09:20:01 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-cfscrape: updated to 1.9.4

1.9.4
Handle failed challenge submissions, update README, remove PyExecJS dependency
   2018-02-02 09:52:00 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-cfscrape: updated to 1.9.3

1.9.3:
Add LICENSE and README.md to source distribution.
   2018-01-31 12:53:33 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-cfscrape: updated to 1.9.2

1.9.2:
Add __version__ to __init__.py
   2017-12-21 09:08:13 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-cfscrape: updated to 1.9.1

1.9.1 - Support Cloudflare's new Server header
   2017-09-05 13:31:53 by Adam Ciarcinski | Files touched by this commit (2)
Log message:
1.9.0:
- Use vm.runInNewContext securely
   2017-09-03 10:53:18 by Thomas Klausner | Files touched by this commit (165)
Log message:
Follow some redirects.
   2017-08-16 20:04:34 by Adam Ciarcinski | Files touched by this commit (2)
Log message:
1.8.1:
Bug fix: Handle relative Location headers
   2017-07-28 09:04:36 by Adam Ciarcinski | Files touched by this commit (2)
Log message:
1.8.0:
Remove insecure Js2Py library (code execution risk)

Please upgrade to 1.8.0 immediately.

Versions 1.6.6 to 1.7.1 are vulnerable to code execution. If you are running a \ 
vulnerable version, a malicious website owner could craft a page which executes \ 
arbitrary Python code on the machine that runs this script. This can only occur \ 
if the website that the user attempts to scrape has specifically prepared a page \ 
to exploit vulnerable versions of cfscrape.