mirror of
https://github.com/FlareSolverr/FlareSolverr.git
synced 2025-12-05 17:18:19 +01:00
Compare commits
241 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
fd773e5909 | ||
|
|
35c7bff3c8 | ||
|
|
afdc1c7a8e | ||
|
|
0bc7a4498c | ||
|
|
c5a5f6d65e | ||
|
|
aaf29be8e1 | ||
|
|
800866d033 | ||
|
|
043f18b231 | ||
|
|
d21a332519 | ||
|
|
3ca6d08f41 | ||
|
|
227bd7ac72 | ||
|
|
e6a08584c0 | ||
|
|
df06d13cf8 | ||
|
|
993b8c41ac | ||
|
|
a4d42d7834 | ||
|
|
1c855b8af0 | ||
|
|
745c69491f | ||
|
|
f7e316fd5a | ||
|
|
16c8ab5f3d | ||
|
|
7af311b73c | ||
|
|
daec97532d | ||
|
|
8d7ed48f21 | ||
|
|
220f2599ae | ||
|
|
d772cf3f50 | ||
|
|
ab4365894b | ||
|
|
3fa9631559 | ||
|
|
04858c22fd | ||
|
|
5085ca6990 | ||
|
|
cd4df1e061 | ||
|
|
6c79783f7c | ||
|
|
4139e8d47c | ||
|
|
1942eb5fdc | ||
|
|
401bf5be76 | ||
|
|
d8ffdd3061 | ||
|
|
2d66590b08 | ||
|
|
a217510dc7 | ||
|
|
553bd8ab4f | ||
|
|
1b197c3e53 | ||
|
|
fd308f01be | ||
|
|
b5eef32615 | ||
|
|
644a843d89 | ||
|
|
82e1c94c6f | ||
|
|
fbc71516f5 | ||
|
|
40bd1cba4c | ||
|
|
d1588c1156 | ||
|
|
b4ad583baa | ||
|
|
5d31e551cc | ||
|
|
d92845f34f | ||
|
|
5d3b73ea9d | ||
|
|
2aa095ed5d | ||
|
|
687c8f75ae | ||
|
|
22ed3d324b | ||
|
|
5ba9ef03f3 | ||
|
|
d2e144ea12 | ||
|
|
313fb2c14b | ||
|
|
6d69f40b58 | ||
|
|
a1c36f60d2 | ||
|
|
0edc50e271 | ||
|
|
f4a4baa57c | ||
|
|
f7e434c6e3 | ||
|
|
7728f2ab31 | ||
|
|
c920bea4ca | ||
|
|
a785f83034 | ||
|
|
b42c22f5b1 | ||
|
|
9c62410a8b | ||
|
|
b8768ae17d | ||
|
|
9b2c602a1f | ||
|
|
8316350b98 | ||
|
|
33307ce461 | ||
|
|
cedb7bc54e | ||
|
|
6ecaf2362c | ||
|
|
3c97c9603a | ||
|
|
efaa5f31b6 | ||
|
|
4db85a2d0f | ||
|
|
66b9db21e5 | ||
|
|
ab0fe58d4a | ||
|
|
f68ddb7573 | ||
|
|
ac77110578 | ||
|
|
a9d1a2de2d | ||
|
|
ab5f14d6c3 | ||
|
|
e0bf02fb8b | ||
|
|
82a1cd835a | ||
|
|
7017715e21 | ||
|
|
ae18559db1 | ||
|
|
2680521008 | ||
|
|
2297bab185 | ||
|
|
8d9bac9dd4 | ||
|
|
30ccf18e85 | ||
|
|
a15d041a0c | ||
|
|
c6c74e7c9d | ||
|
|
49fd1aacfc | ||
|
|
f6879c70de | ||
|
|
24f59a39cb | ||
|
|
4d16105176 | ||
|
|
5957b7b3bc | ||
|
|
8de16058d0 | ||
|
|
5fc4f966a5 | ||
|
|
b903a5dd84 | ||
|
|
7e9d5f424f | ||
|
|
fc6d2d9095 | ||
|
|
aef9b2d4d6 | ||
|
|
6dc279a9d3 | ||
|
|
96fcd21174 | ||
|
|
3a6e8e0f92 | ||
|
|
2d97f88276 | ||
|
|
ac5c64319e | ||
|
|
c93834e2f0 | ||
|
|
e3b4200d94 | ||
|
|
0941861f80 | ||
|
|
8a10eb27a6 | ||
|
|
e9c08c84ef | ||
|
|
2aa1744476 | ||
|
|
a89679a52d | ||
|
|
410ee7981f | ||
|
|
e163019f28 | ||
|
|
7d84f1b663 | ||
|
|
4807e9dbe2 | ||
|
|
85360df336 | ||
|
|
fd42fcee66 | ||
|
|
90a831a13b | ||
|
|
904072267a | ||
|
|
f63816905b | ||
|
|
258225a091 | ||
|
|
da2263c85b | ||
|
|
70a423805d | ||
|
|
99d074084a | ||
|
|
c7251da54f | ||
|
|
676a930f02 | ||
|
|
ecaac2e1d9 | ||
|
|
60a22625be | ||
|
|
b32d7b70be | ||
|
|
f10f7269ca | ||
|
|
33bed9428e | ||
|
|
5092b1eef9 | ||
|
|
0cfcb57e3a | ||
|
|
59bd7c8bdd | ||
|
|
b90d263159 | ||
|
|
5257f47d34 | ||
|
|
613e49e6cb | ||
|
|
1505595591 | ||
|
|
8d1ac09bf2 | ||
|
|
31265a510d | ||
|
|
e967e135a3 | ||
|
|
383025032b | ||
|
|
345628e3e4 | ||
|
|
35c2f09202 | ||
|
|
197258e921 | ||
|
|
c99101f74b | ||
|
|
5703caa9d3 | ||
|
|
aa254eb830 | ||
|
|
436831edb8 | ||
|
|
b17a3a369b | ||
|
|
a74884d0c1 | ||
|
|
0e2452e40e | ||
|
|
ce52321b78 | ||
|
|
4e07ed0f6c | ||
|
|
9d607dcc8c | ||
|
|
a2345affb3 | ||
|
|
d79782bec9 | ||
|
|
1440e3c253 | ||
|
|
c5df58529a | ||
|
|
3ed7cc713e | ||
|
|
e505f906ea | ||
|
|
2fc9fdf3ae | ||
|
|
3f279e9aa9 | ||
|
|
d962e1a14e | ||
|
|
93d8350097 | ||
|
|
d34b43e0a8 | ||
|
|
2bf4dc62da | ||
|
|
bb0d757755 | ||
|
|
fc1fa601eb | ||
|
|
9b1f8332c7 | ||
|
|
6175fee75a | ||
|
|
bb4fa9cabc | ||
|
|
c951ba2523 | ||
|
|
6c598d5360 | ||
|
|
2893f72237 | ||
|
|
cd221bbbf1 | ||
|
|
68fb96f0d8 | ||
|
|
07724e598f | ||
|
|
56fc688517 | ||
|
|
0a438358d1 | ||
|
|
0cbca1fb79 | ||
|
|
05dcae979c | ||
|
|
fe6cfd75b8 | ||
|
|
bb7e82e6c4 | ||
|
|
fdd1d245f4 | ||
|
|
bc6ac68e52 | ||
|
|
a9ab2569bc | ||
|
|
b1a6ad7688 | ||
|
|
642d67b927 | ||
|
|
c4ef6a472e | ||
|
|
a24b665bd1 | ||
|
|
6576e1908d | ||
|
|
8e518d7267 | ||
|
|
3005ba3629 | ||
|
|
176c69d1e8 | ||
|
|
7a1cf7dd80 | ||
|
|
456dfc222e | ||
|
|
23fde49f2b | ||
|
|
78daf24bc3 | ||
|
|
47c83ded58 | ||
|
|
35890cade4 | ||
|
|
753e8e1be8 | ||
|
|
a6628d0cda | ||
|
|
a79a5f2b42 | ||
|
|
1e463bb3e2 | ||
|
|
02204a84d3 | ||
|
|
95d178b37a | ||
|
|
c4f890f9a1 | ||
|
|
d16b982bb9 | ||
|
|
075b53ee24 | ||
|
|
356b893c18 | ||
|
|
a841d67745 | ||
|
|
2408a75a70 | ||
|
|
77a87c79fd | ||
|
|
cfd158462f | ||
|
|
ccfe21c15a | ||
|
|
a5b3e08e1f | ||
|
|
a0e897067a | ||
|
|
744de4d158 | ||
|
|
0459f2642d | ||
|
|
ca3f84f458 | ||
|
|
5dd563e003 | ||
|
|
78c10d6b24 | ||
|
|
3de2e44bfd | ||
|
|
7738f7a360 | ||
|
|
1b01caaa78 | ||
|
|
447c8f67a1 | ||
|
|
9dae74bc28 | ||
|
|
4199db5a41 | ||
|
|
2a4fae37c0 | ||
|
|
232ddca512 | ||
|
|
8572fab781 | ||
|
|
fdb3eae051 | ||
|
|
6dd8206a10 | ||
|
|
c4e4d28c8d | ||
|
|
543ce89eb6 | ||
|
|
0f30e17ef1 | ||
|
|
24f1b4ec6f | ||
|
|
f3b30268c3 |
@@ -1,7 +1,5 @@
|
|||||||
.git/
|
.git/
|
||||||
.github/
|
.github/
|
||||||
.idea/
|
.idea/
|
||||||
bin/
|
html_samples/
|
||||||
dist/
|
|
||||||
node_modules/
|
|
||||||
resources/
|
resources/
|
||||||
|
|||||||
15
.eslintrc.js
15
.eslintrc.js
@@ -1,15 +0,0 @@
|
|||||||
module.exports = {
|
|
||||||
env: {
|
|
||||||
browser: true,
|
|
||||||
commonjs: true,
|
|
||||||
es2020: true
|
|
||||||
},
|
|
||||||
extends: [
|
|
||||||
'standard'
|
|
||||||
],
|
|
||||||
parserOptions: {
|
|
||||||
ecmaVersion: 11
|
|
||||||
},
|
|
||||||
rules: {
|
|
||||||
}
|
|
||||||
}
|
|
||||||
31
.github/ISSUE_TEMPLATE.md
vendored
31
.github/ISSUE_TEMPLATE.md
vendored
@@ -1,31 +0,0 @@
|
|||||||
**Please use the search bar** at the top of the page and make sure you are not creating an already submitted issue.
|
|
||||||
Check closed issues as well, because your issue may have already been fixed.
|
|
||||||
|
|
||||||
### How to enable debug and html traces
|
|
||||||
|
|
||||||
[Follow the instructions from this wiki page](https://github.com/FlareSolverr/FlareSolverr/wiki/How-to-enable-debug-and-html-trace)
|
|
||||||
|
|
||||||
### Environment
|
|
||||||
|
|
||||||
* **FlareSolverr version**:
|
|
||||||
* **Last working FlareSolverr version**:
|
|
||||||
* **Operating system**:
|
|
||||||
* **Are you using Docker**: [yes/no]
|
|
||||||
* **Are you using a proxy or VPN?** [yes/no]
|
|
||||||
* **Are you using Captcha Solver:** [yes/no]
|
|
||||||
* **If using captcha solver, which one:**
|
|
||||||
* **URL to test this issue:**
|
|
||||||
|
|
||||||
### Description
|
|
||||||
|
|
||||||
[List steps to reproduce the error and details on what happens and what you expected to happen]
|
|
||||||
|
|
||||||
### Logged Error Messages
|
|
||||||
|
|
||||||
[Place any relevant error messages you noticed from the logs here.]
|
|
||||||
|
|
||||||
[Make sure you attach the full logs with your personal information removed in case we need more information]
|
|
||||||
|
|
||||||
### Screenshots
|
|
||||||
|
|
||||||
[Place any screenshots of the issue here if needed]
|
|
||||||
71
.github/ISSUE_TEMPLATE/bug_report.yml
vendored
Normal file
71
.github/ISSUE_TEMPLATE/bug_report.yml
vendored
Normal file
@@ -0,0 +1,71 @@
|
|||||||
|
name: Bug report
|
||||||
|
description: Create a report of your issue
|
||||||
|
body:
|
||||||
|
- type: checkboxes
|
||||||
|
attributes:
|
||||||
|
label: Have you checked our README?
|
||||||
|
description: Please check the <a href="https://github.com/FlareSolverr/FlareSolverr/blob/master/README.md">README</a>.
|
||||||
|
options:
|
||||||
|
- label: I have checked the README
|
||||||
|
required: true
|
||||||
|
- type: checkboxes
|
||||||
|
attributes:
|
||||||
|
label: Have you followed our Troubleshooting?
|
||||||
|
description: Please follow our <a href="https://github.com/FlareSolverr/FlareSolverr/wiki/Troubleshooting">Troubleshooting</a>.
|
||||||
|
options:
|
||||||
|
- label: I have followed your Troubleshooting
|
||||||
|
required: true
|
||||||
|
- type: checkboxes
|
||||||
|
attributes:
|
||||||
|
label: Is there already an issue for your problem?
|
||||||
|
description: Please make sure you are not creating an already submitted <a href="https://github.com/FlareSolverr/FlareSolverr/issues">Issue</a>. Check closed issues as well, because your issue may have already been fixed.
|
||||||
|
options:
|
||||||
|
- label: I have checked older issues, open and closed
|
||||||
|
required: true
|
||||||
|
- type: checkboxes
|
||||||
|
attributes:
|
||||||
|
label: Have you checked the discussions?
|
||||||
|
description: Please read our <a href="https://github.com/FlareSolverr/FlareSolverr/discussions">Discussions</a> before submitting your issue, some wider problems may be dealt with there.
|
||||||
|
options:
|
||||||
|
- label: I have read the Discussions
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Environment
|
||||||
|
description: Please provide the details of the system FlareSolverr is running on.
|
||||||
|
value: |
|
||||||
|
- FlareSolverr version:
|
||||||
|
- Last working FlareSolverr version:
|
||||||
|
- Operating system:
|
||||||
|
- Are you using Docker: [yes/no]
|
||||||
|
- FlareSolverr User-Agent (see log traces or / endpoint):
|
||||||
|
- Are you using a VPN: [yes/no]
|
||||||
|
- Are you using a Proxy: [yes/no]
|
||||||
|
- Are you using Captcha Solver: [yes/no]
|
||||||
|
- If using captcha solver, which one:
|
||||||
|
- URL to test this issue:
|
||||||
|
render: markdown
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Description
|
||||||
|
description: List steps to reproduce the error and details on what happens and what you expected to happen.
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Logged Error Messages
|
||||||
|
description: |
|
||||||
|
Place any relevant error messages you noticed from the logs here.
|
||||||
|
Make sure you attach the full logs with your personal information removed in case we need more information.
|
||||||
|
If you wish to provide debug logs, follow the instructions from this <a href="https://github.com/FlareSolverr/FlareSolverr/wiki/How-to-enable-debug-and-html-trace">wiki page</a>.
|
||||||
|
render: text
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
- type: textarea
|
||||||
|
attributes:
|
||||||
|
label: Screenshots
|
||||||
|
description: Place any screenshots of the issue here if needed
|
||||||
|
validations:
|
||||||
|
required: false
|
||||||
8
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
8
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
blank_issues_enabled: false
|
||||||
|
contact_links:
|
||||||
|
- name: Requesting new features or changes
|
||||||
|
url: https://github.com/FlareSolverr/FlareSolverr/discussions
|
||||||
|
about: Please create a new discussion topic, grouped under "Ideas".
|
||||||
|
- name: Asking questions
|
||||||
|
url: https://github.com/FlareSolverr/FlareSolverr/discussions
|
||||||
|
about: Please create a new discussion topic, grouped under "Q&A".
|
||||||
4
.github/workflows/autotag.yml
vendored
4
.github/workflows/autotag.yml
vendored
@@ -6,12 +6,12 @@ on:
|
|||||||
- "master"
|
- "master"
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build:
|
tag-release:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
-
|
-
|
||||||
name: Checkout
|
name: Checkout
|
||||||
uses: actions/checkout@v2
|
uses: actions/checkout@v3
|
||||||
-
|
-
|
||||||
name: Auto Tag
|
name: Auto Tag
|
||||||
uses: Klemensas/action-autotag@stable
|
uses: Klemensas/action-autotag@stable
|
||||||
|
|||||||
20
.github/workflows/release-docker.yml
vendored
20
.github/workflows/release-docker.yml
vendored
@@ -6,48 +6,48 @@ on:
|
|||||||
- 'v*.*.*'
|
- 'v*.*.*'
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build:
|
build-docker-images:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-22.04
|
||||||
steps:
|
steps:
|
||||||
-
|
-
|
||||||
name: Checkout
|
name: Checkout
|
||||||
uses: actions/checkout@v2
|
uses: actions/checkout@v3
|
||||||
-
|
-
|
||||||
name: Downcase repo
|
name: Downcase repo
|
||||||
run: echo REPOSITORY=$(echo ${{ github.repository }} | tr '[:upper:]' '[:lower:]') >> $GITHUB_ENV
|
run: echo REPOSITORY=$(echo ${{ github.repository }} | tr '[:upper:]' '[:lower:]') >> $GITHUB_ENV
|
||||||
-
|
-
|
||||||
name: Docker meta
|
name: Docker meta
|
||||||
id: docker_meta
|
id: docker_meta
|
||||||
uses: crazy-max/ghaction-docker-meta@v1
|
uses: crazy-max/ghaction-docker-meta@v3
|
||||||
with:
|
with:
|
||||||
images: ${{ env.REPOSITORY }},ghcr.io/${{ env.REPOSITORY }}
|
images: ${{ env.REPOSITORY }},ghcr.io/${{ env.REPOSITORY }}
|
||||||
tag-sha: false
|
tag-sha: false
|
||||||
-
|
-
|
||||||
name: Set up QEMU
|
name: Set up QEMU
|
||||||
uses: docker/setup-qemu-action@v1.0.1
|
uses: docker/setup-qemu-action@v2
|
||||||
-
|
-
|
||||||
name: Set up Docker Buildx
|
name: Set up Docker Buildx
|
||||||
uses: docker/setup-buildx-action@v1
|
uses: docker/setup-buildx-action@v2
|
||||||
-
|
-
|
||||||
name: Login to DockerHub
|
name: Login to DockerHub
|
||||||
uses: docker/login-action@v1
|
uses: docker/login-action@v2
|
||||||
with:
|
with:
|
||||||
username: ${{ secrets.DOCKERHUB_USERNAME }}
|
username: ${{ secrets.DOCKERHUB_USERNAME }}
|
||||||
password: ${{ secrets.DOCKERHUB_TOKEN }}
|
password: ${{ secrets.DOCKERHUB_TOKEN }}
|
||||||
-
|
-
|
||||||
name: Login to GitHub Container Registry
|
name: Login to GitHub Container Registry
|
||||||
uses: docker/login-action@v1
|
uses: docker/login-action@v2
|
||||||
with:
|
with:
|
||||||
registry: ghcr.io
|
registry: ghcr.io
|
||||||
username: ${{ github.repository_owner }}
|
username: ${{ github.repository_owner }}
|
||||||
password: ${{ secrets.GH_PAT }}
|
password: ${{ secrets.GH_PAT }}
|
||||||
-
|
-
|
||||||
name: Build and push
|
name: Build and push
|
||||||
uses: docker/build-push-action@v2
|
uses: docker/build-push-action@v3
|
||||||
with:
|
with:
|
||||||
context: .
|
context: .
|
||||||
file: ./Dockerfile
|
file: ./Dockerfile
|
||||||
platforms: linux/amd64,linux/arm/v7,linux/arm64
|
platforms: linux/386,linux/amd64,linux/arm/v7,linux/arm64/v8
|
||||||
push: ${{ github.event_name != 'pull_request' }}
|
push: ${{ github.event_name != 'pull_request' }}
|
||||||
tags: ${{ steps.docker_meta.outputs.tags }}
|
tags: ${{ steps.docker_meta.outputs.tags }}
|
||||||
labels: ${{ steps.docker_meta.outputs.labels }}
|
labels: ${{ steps.docker_meta.outputs.labels }}
|
||||||
|
|||||||
72
.github/workflows/release.yml
vendored
72
.github/workflows/release.yml
vendored
@@ -6,26 +6,15 @@ on:
|
|||||||
- 'v*.*.*'
|
- 'v*.*.*'
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build:
|
create-release:
|
||||||
name: Create release
|
name: Create release
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-22.04
|
||||||
steps:
|
steps:
|
||||||
- name: Checkout code
|
- name: Checkout code
|
||||||
uses: actions/checkout@v2
|
uses: actions/checkout@v3
|
||||||
with:
|
with:
|
||||||
fetch-depth: 0 # get all commits, branches and tags (required for the changelog)
|
fetch-depth: 0 # get all commits, branches and tags (required for the changelog)
|
||||||
|
|
||||||
- name: Setup Node
|
|
||||||
uses: actions/setup-node@v2
|
|
||||||
with:
|
|
||||||
node-version: '14'
|
|
||||||
|
|
||||||
- name: Build artifacts
|
|
||||||
run: |
|
|
||||||
npm install
|
|
||||||
npm run build
|
|
||||||
npm run package
|
|
||||||
|
|
||||||
- name: Build changelog
|
- name: Build changelog
|
||||||
id: github_changelog
|
id: github_changelog
|
||||||
run: |
|
run: |
|
||||||
@@ -47,9 +36,60 @@ jobs:
|
|||||||
draft: false
|
draft: false
|
||||||
prerelease: false
|
prerelease: false
|
||||||
|
|
||||||
|
build-linux-package:
|
||||||
|
name: Build Linux binary
|
||||||
|
needs: create-release
|
||||||
|
runs-on: ubuntu-22.04
|
||||||
|
steps:
|
||||||
|
- name: Checkout code
|
||||||
|
uses: actions/checkout@v3
|
||||||
|
with:
|
||||||
|
fetch-depth: 0 # get all commits, branches and tags (required for the changelog)
|
||||||
|
|
||||||
|
- name: Setup Python
|
||||||
|
uses: actions/setup-python@v4
|
||||||
|
with:
|
||||||
|
python-version: '3.11'
|
||||||
|
|
||||||
|
- name: Build artifacts
|
||||||
|
run: |
|
||||||
|
python -m pip install -r requirements.txt
|
||||||
|
python -m pip install pyinstaller==5.13.0
|
||||||
|
cd src
|
||||||
|
python build_package.py
|
||||||
|
|
||||||
- name: Upload release artifacts
|
- name: Upload release artifacts
|
||||||
uses: alexellis/upload-assets@0.2.2
|
uses: alexellis/upload-assets@0.4.0
|
||||||
env:
|
env:
|
||||||
GITHUB_TOKEN: ${{ secrets.GH_PAT }}
|
GITHUB_TOKEN: ${{ secrets.GH_PAT }}
|
||||||
with:
|
with:
|
||||||
asset_paths: '["./bin/*.zip"]'
|
asset_paths: '["./dist/flaresolverr_*"]'
|
||||||
|
|
||||||
|
build-windows-package:
|
||||||
|
name: Build Windows binary
|
||||||
|
needs: create-release
|
||||||
|
runs-on: windows-2022
|
||||||
|
steps:
|
||||||
|
- name: Checkout code
|
||||||
|
uses: actions/checkout@v3
|
||||||
|
with:
|
||||||
|
fetch-depth: 0 # get all commits, branches and tags (required for the changelog)
|
||||||
|
|
||||||
|
- name: Setup Python
|
||||||
|
uses: actions/setup-python@v4
|
||||||
|
with:
|
||||||
|
python-version: '3.11'
|
||||||
|
|
||||||
|
- name: Build artifacts
|
||||||
|
run: |
|
||||||
|
python -m pip install -r requirements.txt
|
||||||
|
python -m pip install pyinstaller==5.13.0
|
||||||
|
cd src
|
||||||
|
python build_package.py
|
||||||
|
|
||||||
|
- name: Upload release artifacts
|
||||||
|
uses: alexellis/upload-assets@0.4.0
|
||||||
|
env:
|
||||||
|
GITHUB_TOKEN: ${{ secrets.GH_PAT }}
|
||||||
|
with:
|
||||||
|
asset_paths: '["./dist/flaresolverr_*"]'
|
||||||
|
|||||||
249
.gitignore
vendored
249
.gitignore
vendored
@@ -1,126 +1,129 @@
|
|||||||
# Logs
|
# Editors
|
||||||
logs
|
.vscode/
|
||||||
*.log
|
|
||||||
npm-debug.log*
|
|
||||||
yarn-debug.log*
|
|
||||||
yarn-error.log*
|
|
||||||
lerna-debug.log*
|
|
||||||
|
|
||||||
# Diagnostic reports (https://nodejs.org/api/report.html)
|
|
||||||
report.[0-9]*.[0-9]*.[0-9]*.[0-9]*.json
|
|
||||||
|
|
||||||
# Runtime data
|
|
||||||
pids
|
|
||||||
*.pid
|
|
||||||
*.seed
|
|
||||||
*.pid.lock
|
|
||||||
|
|
||||||
# Directory for instrumented libs generated by jscoverage/JSCover
|
|
||||||
lib-cov
|
|
||||||
|
|
||||||
# Coverage directory used by tools like istanbul
|
|
||||||
coverage
|
|
||||||
*.lcov
|
|
||||||
|
|
||||||
# nyc test coverage
|
|
||||||
.nyc_output
|
|
||||||
|
|
||||||
# Grunt intermediate storage (https://gruntjs.com/creating-plugins#storing-task-files)
|
|
||||||
.grunt
|
|
||||||
|
|
||||||
# Bower dependency directory (https://bower.io/)
|
|
||||||
bower_components
|
|
||||||
|
|
||||||
# node-waf configuration
|
|
||||||
.lock-wscript
|
|
||||||
|
|
||||||
# Compiled binary addons (https://nodejs.org/api/addons.html)
|
|
||||||
build/Release
|
|
||||||
|
|
||||||
# Dependency directories
|
|
||||||
node_modules/
|
|
||||||
jspm_packages/
|
|
||||||
|
|
||||||
# Snowpack dependency directory (https://snowpack.dev/)
|
|
||||||
web_modules/
|
|
||||||
|
|
||||||
# TypeScript cache
|
|
||||||
*.tsbuildinfo
|
|
||||||
|
|
||||||
# Optional npm cache directory
|
|
||||||
.npm
|
|
||||||
|
|
||||||
# Optional eslint cache
|
|
||||||
.eslintcache
|
|
||||||
|
|
||||||
# Microbundle cache
|
|
||||||
.rpt2_cache/
|
|
||||||
.rts2_cache_cjs/
|
|
||||||
.rts2_cache_es/
|
|
||||||
.rts2_cache_umd/
|
|
||||||
|
|
||||||
# Optional REPL history
|
|
||||||
.node_repl_history
|
|
||||||
|
|
||||||
# Output of 'npm pack'
|
|
||||||
*.tgz
|
|
||||||
|
|
||||||
# Yarn Integrity file
|
|
||||||
.yarn-integrity
|
|
||||||
|
|
||||||
# dotenv environment variables file
|
|
||||||
.env
|
|
||||||
.env.test
|
|
||||||
|
|
||||||
# parcel-bundler cache (https://parceljs.org/)
|
|
||||||
.cache
|
|
||||||
.parcel-cache
|
|
||||||
|
|
||||||
# Next.js build output
|
|
||||||
.next
|
|
||||||
out
|
|
||||||
|
|
||||||
# Nuxt.js build / generate output
|
|
||||||
.nuxt
|
|
||||||
dist
|
|
||||||
|
|
||||||
# Gatsby files
|
|
||||||
.cache/
|
|
||||||
# Comment in the public line in if your project uses Gatsby and not Next.js
|
|
||||||
# https://nextjs.org/blog/next-9-1#public-directory-support
|
|
||||||
# public
|
|
||||||
|
|
||||||
# vuepress build output
|
|
||||||
.vuepress/dist
|
|
||||||
|
|
||||||
# Serverless directories
|
|
||||||
.serverless/
|
|
||||||
|
|
||||||
# FuseBox cache
|
|
||||||
.fusebox/
|
|
||||||
|
|
||||||
# DynamoDB Local files
|
|
||||||
.dynamodb/
|
|
||||||
|
|
||||||
# TernJS port file
|
|
||||||
.tern-port
|
|
||||||
|
|
||||||
# Stores VSCode versions used for testing VSCode extensions
|
|
||||||
.vscode-test
|
|
||||||
|
|
||||||
# yarn v2
|
|
||||||
.yarn/cache
|
|
||||||
.yarn/unplugged
|
|
||||||
.yarn/build-state.yml
|
|
||||||
.yarn/install-state.gz
|
|
||||||
.pnp.*
|
|
||||||
|
|
||||||
# IntelliJ IDEA
|
|
||||||
.idea/
|
.idea/
|
||||||
*.iml
|
|
||||||
|
|
||||||
# Project Development
|
# Vagrant
|
||||||
testing/
|
.vagrant/
|
||||||
|
|
||||||
# Binaries
|
# Mac/OSX
|
||||||
bin/
|
.DS_Store
|
||||||
|
|
||||||
|
# Windows
|
||||||
|
Thumbs.db
|
||||||
|
|
||||||
|
# Source for the following rules: https://raw.githubusercontent.com/github/gitignore/master/Python.gitignore
|
||||||
|
# Byte-compiled / optimized / DLL files
|
||||||
|
__pycache__/
|
||||||
|
*.py[cod]
|
||||||
|
*$py.class
|
||||||
|
|
||||||
|
# C extensions
|
||||||
|
*.so
|
||||||
|
|
||||||
|
# Distribution / packaging
|
||||||
|
.Python
|
||||||
|
build/
|
||||||
|
develop-eggs/
|
||||||
|
dist/
|
||||||
|
dist_chrome/
|
||||||
|
downloads/
|
||||||
|
eggs/
|
||||||
|
.eggs/
|
||||||
|
lib/
|
||||||
|
lib64/
|
||||||
|
parts/
|
||||||
|
sdist/
|
||||||
|
var/
|
||||||
|
wheels/
|
||||||
|
*.egg-info/
|
||||||
|
.installed.cfg
|
||||||
|
*.egg
|
||||||
|
MANIFEST
|
||||||
|
|
||||||
|
# PyInstaller
|
||||||
|
# Usually these files are written by a python script from a template
|
||||||
|
# before PyInstaller builds the exe, so as to inject date/other infos into it.
|
||||||
|
*.manifest
|
||||||
|
*.spec
|
||||||
|
|
||||||
|
# Installer logs
|
||||||
|
pip-log.txt
|
||||||
|
pip-delete-this-directory.txt
|
||||||
|
|
||||||
|
# Unit test / coverage reports
|
||||||
|
htmlcov/
|
||||||
|
.tox/
|
||||||
|
.nox/
|
||||||
|
.coverage
|
||||||
|
.coverage.*
|
||||||
|
.cache
|
||||||
|
nosetests.xml
|
||||||
|
coverage.xml
|
||||||
|
*.cover
|
||||||
|
.hypothesis/
|
||||||
|
.pytest_cache/
|
||||||
|
|
||||||
|
# Translations
|
||||||
|
*.mo
|
||||||
|
*.pot
|
||||||
|
|
||||||
|
# Django stuff:
|
||||||
|
*.log
|
||||||
|
local_settings.py
|
||||||
|
db.sqlite3
|
||||||
|
|
||||||
|
# Flask stuff:
|
||||||
|
instance/
|
||||||
|
.webassets-cache
|
||||||
|
|
||||||
|
# Scrapy stuff:
|
||||||
|
.scrapy
|
||||||
|
|
||||||
|
# Sphinx documentation
|
||||||
|
docs/_build/
|
||||||
|
|
||||||
|
# PyBuilder
|
||||||
|
target/
|
||||||
|
|
||||||
|
# Jupyter Notebook
|
||||||
|
.ipynb_checkpoints
|
||||||
|
|
||||||
|
# IPython
|
||||||
|
profile_default/
|
||||||
|
ipython_config.py
|
||||||
|
|
||||||
|
# pyenv
|
||||||
|
.python-version
|
||||||
|
|
||||||
|
# celery beat schedule file
|
||||||
|
celerybeat-schedule
|
||||||
|
|
||||||
|
# SageMath parsed files
|
||||||
|
*.sage.py
|
||||||
|
|
||||||
|
# Environments
|
||||||
|
.env
|
||||||
|
.venv
|
||||||
|
env/
|
||||||
|
venv/
|
||||||
|
ENV/
|
||||||
|
env.bak/
|
||||||
|
venv.bak/
|
||||||
|
|
||||||
|
# Spyder project settings
|
||||||
|
.spyderproject
|
||||||
|
.spyproject
|
||||||
|
|
||||||
|
# Rope project settings
|
||||||
|
.ropeproject
|
||||||
|
|
||||||
|
# mkdocs documentation
|
||||||
|
/site
|
||||||
|
|
||||||
|
# mypy
|
||||||
|
.mypy_cache/
|
||||||
|
.dmypy.json
|
||||||
|
dmypy.json
|
||||||
|
|
||||||
|
# node
|
||||||
|
node_modules/
|
||||||
401
CHANGELOG.md
Normal file
401
CHANGELOG.md
Normal file
@@ -0,0 +1,401 @@
|
|||||||
|
# Changelog
|
||||||
|
|
||||||
|
## v3.3.16 (2024/02/28)
|
||||||
|
|
||||||
|
* Fix of the subprocess.STARTUPINFO() call. Thanks @ceconelo
|
||||||
|
* Add FreeBSD support. Thanks @Asthowen
|
||||||
|
* Use headless configuration properly. Thanks @hashworks
|
||||||
|
|
||||||
|
## v3.3.15 (2024/02/20)
|
||||||
|
|
||||||
|
* Fix looping challenges
|
||||||
|
|
||||||
|
## v3.3.14-hotfix2 (2024/02/17)
|
||||||
|
|
||||||
|
* Hotfix 2 - bad Chromium build, instances failed to terminate
|
||||||
|
|
||||||
|
## v3.3.14-hotfix (2024/02/17)
|
||||||
|
|
||||||
|
* Hotfix for Linux build - some Chrome files no longer exist
|
||||||
|
|
||||||
|
## v3.3.14 (2024/02/17)
|
||||||
|
|
||||||
|
* Update Chrome downloads. Thanks @opemvbs
|
||||||
|
|
||||||
|
## v3.3.13 (2024/01/07)
|
||||||
|
|
||||||
|
* Fix too many open files error
|
||||||
|
|
||||||
|
## v3.3.12 (2023/12/15)
|
||||||
|
|
||||||
|
* Fix looping challenges and invalid cookies
|
||||||
|
|
||||||
|
## v3.3.11 (2023/12/11)
|
||||||
|
|
||||||
|
* Update UC 3.5.4 & Selenium 4.15.2. Thanks @txtsd
|
||||||
|
|
||||||
|
## v3.3.10 (2023/11/14)
|
||||||
|
|
||||||
|
* Add LANG ENV - resolves issues with YGGtorrent
|
||||||
|
|
||||||
|
## v3.3.9 (2023/11/13)
|
||||||
|
|
||||||
|
* Fix for Docker build, capture TypeError
|
||||||
|
|
||||||
|
## v3.3.8 (2023/11/13)
|
||||||
|
|
||||||
|
* Fix headless=true for Chrome 117+. Thanks @NabiKAZ
|
||||||
|
* Support running Chrome 119 from source. Thanks @koleg and @Chris7X
|
||||||
|
* Fix "OSError: [WinError 6] The handle is invalid" on exit. Thanks @enesgorkemgenc
|
||||||
|
|
||||||
|
## v3.3.7 (2023/11/05)
|
||||||
|
|
||||||
|
* Bump to rebuild. Thanks @JoachimDorchies
|
||||||
|
|
||||||
|
## v3.3.6 (2023/09/15)
|
||||||
|
|
||||||
|
* Update checkbox selector, again
|
||||||
|
|
||||||
|
## v3.3.5 (2023/09/13)
|
||||||
|
|
||||||
|
* Change checkbox selector, support languages other than English
|
||||||
|
|
||||||
|
## v3.3.4 (2023/09/02)
|
||||||
|
|
||||||
|
* Update checkbox selector
|
||||||
|
|
||||||
|
## v3.3.3 (2023/08/31)
|
||||||
|
|
||||||
|
* Update undetected_chromedriver to v3.5.3
|
||||||
|
|
||||||
|
## v3.3.2 (2023/08/03)
|
||||||
|
|
||||||
|
* Fix URL domain in Prometheus exporter
|
||||||
|
|
||||||
|
## v3.3.1 (2023/08/03)
|
||||||
|
|
||||||
|
* Fix for Cloudflare verify checkbox
|
||||||
|
* Fix HEADLESS=false in Windows binary
|
||||||
|
* Fix Prometheus exporter for management and health endpoints
|
||||||
|
* Remove misleading stack trace when the verify checkbox is not found
|
||||||
|
* Revert "Update base Docker image to Debian Bookworm" #849
|
||||||
|
* Revert "Install Chromium 115 from Debian testing" #849
|
||||||
|
|
||||||
|
## v3.3.0 (2023/08/02)
|
||||||
|
|
||||||
|
* Fix for new Cloudflare detection. Thanks @cedric-bour for #845
|
||||||
|
* Add support for proxy authentication username/password. Thanks @jacobprice808 for #807
|
||||||
|
* Implement Prometheus metrics
|
||||||
|
* Fix Chromium Driver for Chrome / Chromium version > 114
|
||||||
|
* Use Chromium 115 in binary packages (Windows and Linux)
|
||||||
|
* Install Chromium 115 from Debian testing (Docker)
|
||||||
|
* Update base Docker image to Debian Bookworm
|
||||||
|
* Update Selenium 4.11.2
|
||||||
|
* Update pyinstaller 5.13.0
|
||||||
|
* Add more traces in build_package.py
|
||||||
|
|
||||||
|
## v3.2.2 (2023/07/16)
|
||||||
|
|
||||||
|
* Workaround for updated 'verify you are human' check
|
||||||
|
|
||||||
|
## v3.2.1 (2023/06/10)
|
||||||
|
|
||||||
|
* Kill dead Chrome processes in Windows
|
||||||
|
* Fix Chrome GL erros in ASUSTOR NAS
|
||||||
|
|
||||||
|
## v3.2.0 (2023/05/23)
|
||||||
|
|
||||||
|
* Support "proxy" param in requests and sessions
|
||||||
|
* Support "cookies" param in requests
|
||||||
|
* Fix Chromium exec permissions in Linux package
|
||||||
|
* Update Python dependencies
|
||||||
|
|
||||||
|
## v3.1.2 (2023/04/02)
|
||||||
|
|
||||||
|
* Fix headless mode in macOS
|
||||||
|
* Remove redundant artifact from Windows binary package
|
||||||
|
* Bump Selenium dependency
|
||||||
|
|
||||||
|
## v3.1.1 (2023/03/25)
|
||||||
|
|
||||||
|
* Distribute binary executables in compressed package
|
||||||
|
* Add icon for binary executable
|
||||||
|
* Include information about supported architectures in the readme
|
||||||
|
* Check Python version on start
|
||||||
|
|
||||||
|
## v3.1.0 (2023/03/20)
|
||||||
|
|
||||||
|
* Build binaries for Linux x64 and Windows x64
|
||||||
|
* Sessions with auto-creation on fetch request and TTL
|
||||||
|
* Fix error trace: Crash Reports/pending No such file or directory
|
||||||
|
* Fix Waitress server error with asyncore_use_poll=true
|
||||||
|
* Attempt to fix Docker ARM32 build
|
||||||
|
* Print platform information on start up
|
||||||
|
* Add Fairlane challenge selector
|
||||||
|
* Update DDOS-GUARD title
|
||||||
|
* Update dependencies
|
||||||
|
|
||||||
|
## v3.0.4 (2023/03/07)
|
||||||
|
|
||||||
|
* Click on the Cloudflare's 'Verify you are human' button if necessary
|
||||||
|
|
||||||
|
## v3.0.3 (2023/03/06)
|
||||||
|
|
||||||
|
* Update undetected_chromedriver version to 3.4.6
|
||||||
|
|
||||||
|
## v3.0.2 (2023/01/08)
|
||||||
|
|
||||||
|
* Detect Cloudflare blocked access
|
||||||
|
* Check Chrome / Chromium web browser is installed correctly
|
||||||
|
|
||||||
|
## v3.0.1 (2023/01/06)
|
||||||
|
|
||||||
|
* Kill Chromium processes properly to avoid defunct/zombie processes
|
||||||
|
* Update undetected-chromedriver
|
||||||
|
* Disable Zygote sandbox in Chromium browser
|
||||||
|
* Add more selectors to detect blocked access
|
||||||
|
* Include procps (ps), curl and vim packages in the Docker image
|
||||||
|
|
||||||
|
## v3.0.0 (2023/01/04)
|
||||||
|
|
||||||
|
* This is the first release of FlareSolverr v3. There are some breaking changes
|
||||||
|
* Docker images for linux/386, linux/amd64, linux/arm/v7 and linux/arm64/v8
|
||||||
|
* Replaced Firefox with Chrome
|
||||||
|
* Replaced NodeJS / Typescript with Python
|
||||||
|
* Replaced Puppeter with Selenium
|
||||||
|
* No binaries for Linux / Windows. You have to use the Docker image or install from Source code
|
||||||
|
* No proxy support
|
||||||
|
* No session support
|
||||||
|
|
||||||
|
## v2.2.10 (2022/10/22)
|
||||||
|
|
||||||
|
* Detect DDoS-Guard through title content
|
||||||
|
|
||||||
|
## v2.2.9 (2022/09/25)
|
||||||
|
|
||||||
|
* Detect Cloudflare Access Denied
|
||||||
|
* Commit the complete changelog
|
||||||
|
|
||||||
|
## v2.2.8 (2022/09/17)
|
||||||
|
|
||||||
|
* Remove 30 s delay and clean legacy code
|
||||||
|
|
||||||
|
## v2.2.7 (2022/09/12)
|
||||||
|
|
||||||
|
* Temporary fix: add 30s delay
|
||||||
|
* Update README.md
|
||||||
|
|
||||||
|
## v2.2.6 (2022/07/31)
|
||||||
|
|
||||||
|
* Fix Cloudflare detection in POST requests
|
||||||
|
|
||||||
|
## v2.2.5 (2022/07/30)
|
||||||
|
|
||||||
|
* Update GitHub actions to build executables with NodeJs 16
|
||||||
|
* Update Cloudflare selectors and add HTML samples
|
||||||
|
* Install Firefox 94 instead of the latest Nightly
|
||||||
|
* Update dependencies
|
||||||
|
* Upgrade Puppeteer (#396)
|
||||||
|
|
||||||
|
## v2.2.4 (2022/04/17)
|
||||||
|
|
||||||
|
* Detect DDoS-Guard challenge
|
||||||
|
|
||||||
|
## v2.2.3 (2022/04/16)
|
||||||
|
|
||||||
|
* Fix 2000 ms navigation timeout
|
||||||
|
* Update README.md (libseccomp2 package in Debian)
|
||||||
|
* Update README.md (clarify proxy parameter) (#307)
|
||||||
|
* Update NPM dependencies
|
||||||
|
* Disable Cloudflare ban detection
|
||||||
|
|
||||||
|
## v2.2.2 (2022/03/19)
|
||||||
|
|
||||||
|
* Fix ban detection. Resolves #330 (#336)
|
||||||
|
|
||||||
|
## v2.2.1 (2022/02/06)
|
||||||
|
|
||||||
|
* Fix max timeout error in some pages
|
||||||
|
* Avoid crashing in NodeJS 17 due to Unhandled promise rejection
|
||||||
|
* Improve proxy validation and debug traces
|
||||||
|
* Remove @types/puppeteer dependency
|
||||||
|
|
||||||
|
## v2.2.0 (2022/01/31)
|
||||||
|
|
||||||
|
* Increase default BROWSER_TIMEOUT=40000 (40 seconds)
|
||||||
|
* Fix Puppeter deprecation warnings
|
||||||
|
* Update base Docker image Alpine 3.15 / NodeJS 16
|
||||||
|
* Build precompiled binaries with NodeJS 16
|
||||||
|
* Update Puppeter and other dependencies
|
||||||
|
* Add support for Custom CloudFlare challenge
|
||||||
|
* Add support for DDoS-GUARD challenge
|
||||||
|
|
||||||
|
## v2.1.0 (2021/12/12)
|
||||||
|
|
||||||
|
* Add aarch64 to user agents to be replaced (#248)
|
||||||
|
* Fix SOCKSv4 and SOCKSv5 proxy. resolves #214 #220
|
||||||
|
* Remove redundant JSON key (postData) (#242)
|
||||||
|
* Make test URL configurable with TEST_URL env var. resolves #240
|
||||||
|
* Bypass new Cloudflare protection
|
||||||
|
* Update donation links
|
||||||
|
|
||||||
|
## v2.0.2 (2021/10/31)
|
||||||
|
|
||||||
|
* Fix SOCKS5 proxy. Resolves #214
|
||||||
|
* Replace Firefox ERS with a newer version
|
||||||
|
* Catch startup exceptions and give some advices
|
||||||
|
* Add env var BROWSER_TIMEOUT for slow systems
|
||||||
|
* Fix NPM warning in Docker images
|
||||||
|
|
||||||
|
## v2.0.1 (2021/10/24)
|
||||||
|
|
||||||
|
* Check user home dir before testing web browser installation
|
||||||
|
|
||||||
|
## v2.0.0 (2021/10/20)
|
||||||
|
|
||||||
|
FlareSolverr 2.0.0 is out with some important changes:
|
||||||
|
|
||||||
|
* It is capable of solving the automatic challenges of Cloudflare. CAPTCHAs (hCaptcha) cannot be resolved and the old solvers have been removed.
|
||||||
|
* The Chrome browser has been replaced by Firefox. This has caused some functionality to be removed. Parameters: `userAgent`, `headers`, `rawHtml` and `downloadare` no longer available.
|
||||||
|
* Included `proxy` support without user/password credentials. If you are writing your own integration with FlareSolverr, make sure your client uses the same User-Agent header and Proxy that FlareSolverr uses. Those values together with the Cookie are checked and detected by Cloudflare.
|
||||||
|
* FlareSolverr has been rewritten from scratch. From now on it should be easier to maintain and test.
|
||||||
|
* If you are using Jackett make sure you have version v0.18.1041 or higher. FlareSolverSharp v2.0.0 is out too.
|
||||||
|
|
||||||
|
Complete changelog:
|
||||||
|
|
||||||
|
* Bump version 2.0.0
|
||||||
|
* Set puppeteer timeout half of maxTimeout param. Resolves #180
|
||||||
|
* Add test for blocked IP
|
||||||
|
* Avoid reloading the page in case of error
|
||||||
|
* Improve Cloudflare detection
|
||||||
|
* Fix version
|
||||||
|
* Fix browser preferences and proxy
|
||||||
|
* Fix request.post method and clean error traces
|
||||||
|
* Use Firefox ESR for Docker images
|
||||||
|
* Improve Firefox start time and code clean up
|
||||||
|
* Improve bad request management and tests
|
||||||
|
* Build native packages with Firefox
|
||||||
|
* Update readme
|
||||||
|
* Improve Docker image and clean TODOs
|
||||||
|
* Add proxy support
|
||||||
|
* Implement request.post method for Firefox
|
||||||
|
* Code clean up, remove returnRawHtml, download, headers params
|
||||||
|
* Remove outdated chaptcha solvers
|
||||||
|
* Refactor the app to use Express server and Jest for tests
|
||||||
|
* Fix Cloudflare resolver for Linux ARM builds
|
||||||
|
* Fix Cloudflare resolver
|
||||||
|
* Replace Chrome web browser with Firefox
|
||||||
|
* Remove userAgent parameter since any modification is detected by CF
|
||||||
|
* Update dependencies
|
||||||
|
* Remove Puppeter steath plugin
|
||||||
|
|
||||||
|
## v1.2.9 (2021/08/01)
|
||||||
|
|
||||||
|
* Improve "Execution context was destroyed" error handling
|
||||||
|
* Implement returnRawHtml parameter. resolves #172 resolves #165
|
||||||
|
* Capture Docker stop signal. resolves #158
|
||||||
|
* Reduce Docker image size 20 MB
|
||||||
|
* Fix page reload after challenge is solved. resolves #162 resolves #143
|
||||||
|
* Avoid loading images/css/fonts to speed up page load
|
||||||
|
* Improve Cloudflare IP ban detection
|
||||||
|
* Fix vulnerabilities
|
||||||
|
|
||||||
|
## v1.2.8 (2021/06/01)
|
||||||
|
|
||||||
|
* Improve old JS challenge waiting. Resolves #129
|
||||||
|
|
||||||
|
## v1.2.7 (2021/06/01)
|
||||||
|
|
||||||
|
* Improvements in Cloudflare redirect detection. Resolves #140
|
||||||
|
* Fix installation instructions
|
||||||
|
|
||||||
|
## v1.2.6 (2021/05/30)
|
||||||
|
|
||||||
|
* Handle new Cloudflare challenge. Resolves #135 Resolves #134
|
||||||
|
* Provide reference Systemd unit file. Resolves #72
|
||||||
|
* Fix EACCES: permission denied, open '/tmp/flaresolverr.txt'. Resolves #120
|
||||||
|
* Configure timezone with TZ env var. Resolves #109
|
||||||
|
* Return the redirected URL in the response (#126)
|
||||||
|
* Show an error in hcaptcha-solver. Resolves #132
|
||||||
|
* Regenerate package-lock.json lockfileVersion 2
|
||||||
|
* Update issue template. Resolves #130
|
||||||
|
* Bump ws from 7.4.1 to 7.4.6 (#137)
|
||||||
|
* Bump hosted-git-info from 2.8.8 to 2.8.9 (#124)
|
||||||
|
* Bump lodash from 4.17.20 to 4.17.21 (#125)
|
||||||
|
|
||||||
|
## v1.2.5 (2021/04/05)
|
||||||
|
|
||||||
|
* Fix memory regression, close test browser
|
||||||
|
* Fix release-docker GitHub action
|
||||||
|
|
||||||
|
## v1.2.4 (2021/04/04)
|
||||||
|
|
||||||
|
* Include license in release zips. resolves #75
|
||||||
|
* Validate Chrome is working at startup
|
||||||
|
* Speedup Docker image build
|
||||||
|
* Add health check endpoint
|
||||||
|
* Update issue template
|
||||||
|
* Minor improvements in debug traces
|
||||||
|
* Validate environment variables at startup. resolves #101
|
||||||
|
* Add FlareSolverr logo. resolves #23
|
||||||
|
|
||||||
|
## v1.2.3 (2021/01/10)
|
||||||
|
|
||||||
|
* CI/CD: Generate release changelog from commits. resolves #34
|
||||||
|
* Update README.md
|
||||||
|
* Add donation links
|
||||||
|
* Simplify docker-compose.yml
|
||||||
|
* Allow to configure "none" captcha resolver
|
||||||
|
* Override docker-compose.yml variables via .env resolves #64 (#66)
|
||||||
|
|
||||||
|
## v1.2.2 (2021/01/09)
|
||||||
|
|
||||||
|
* Add documentation for precompiled binaries installation
|
||||||
|
* Add instructions to set environment variables in Windows
|
||||||
|
* Build Windows and Linux binaries. resolves #18
|
||||||
|
* Add release badge in the readme
|
||||||
|
* CI/CD: Generate release changelog from commits. resolves #34
|
||||||
|
* Add a notice about captcha solvers
|
||||||
|
* Add Chrome flag --disable-dev-shm-usage to fix crashes. resolves #45
|
||||||
|
* Fix Docker CLI documentation
|
||||||
|
* Add traces with captcha solver service. resolves #39
|
||||||
|
* Improve logic to detect Cloudflare captcha. resolves #48
|
||||||
|
* Move Cloudflare provider logic to his own class
|
||||||
|
* Simplify and document the "return only cookies" parameter
|
||||||
|
* Show message when debug log is enabled
|
||||||
|
* Update readme to add more clarifications. resolves #53 (#60)
|
||||||
|
* issue_template: typo fix (#52)
|
||||||
|
|
||||||
|
## v1.2.1 (2020/12/20)
|
||||||
|
|
||||||
|
* Change version to match release tag / 1.2.0 => v1.2.0
|
||||||
|
* CI/CD Publish release in GitHub repository. resolves #34
|
||||||
|
* Add welcome message in / endpoint
|
||||||
|
* Rewrite request timeout handling (maxTimeout) resolves #42
|
||||||
|
* Add http status for better logging
|
||||||
|
* Return an error when no selectors are found, #25
|
||||||
|
* Add issue template, fix #32
|
||||||
|
* Moving log.html right after loading the page and add one on reload, fix #30
|
||||||
|
* Update User-Agent to match chromium version, ref: #15 (#28)
|
||||||
|
* Update install from source code documentation
|
||||||
|
* Update readme to add Docker instructions (#20)
|
||||||
|
* Clean up readme (#19)
|
||||||
|
* Add docker-compose
|
||||||
|
* Change default log level to info
|
||||||
|
|
||||||
|
## v1.2.0 (2020/12/20)
|
||||||
|
|
||||||
|
* Fix User-Agent detected by CouldFlare (Docker ARM) resolves #15
|
||||||
|
* Include exception message in error response
|
||||||
|
* CI/CD: Rename GitHub Action build => publish
|
||||||
|
* Bump version
|
||||||
|
* Fix TypeScript compilation and bump minor version
|
||||||
|
* CI/CD: Bump minor version
|
||||||
|
* CI/CD: Configure GitHub Actions
|
||||||
|
* CI/CD: Configure GitHub Actions
|
||||||
|
* CI/CD: Bump minor version
|
||||||
|
* CI/CD: Configure Build GitHub Action
|
||||||
|
* CI/CD: Configure AutoTag GitHub Action (#14)
|
||||||
|
* CI/CD: Build the Docker images with GitHub Actions (#13)
|
||||||
|
* Update dependencies
|
||||||
|
* Backport changes from Cloudproxy (#11)
|
||||||
94
Dockerfile
94
Dockerfile
@@ -1,30 +1,78 @@
|
|||||||
FROM --platform=${TARGETPLATFORM:-linux/amd64} node:15.2.1-alpine3.11
|
FROM python:3.11-slim-bullseye as builder
|
||||||
|
|
||||||
# Print build information
|
# Build dummy packages to skip installing them and their dependencies
|
||||||
ARG TARGETPLATFORM
|
RUN apt-get update \
|
||||||
ARG BUILDPLATFORM
|
&& apt-get install -y --no-install-recommends equivs \
|
||||||
RUN printf "I am running on ${BUILDPLATFORM:-linux/amd64}, building for ${TARGETPLATFORM:-linux/amd64}\n$(uname -a)\n"
|
&& equivs-control libgl1-mesa-dri \
|
||||||
|
&& printf 'Section: misc\nPriority: optional\nStandards-Version: 3.9.2\nPackage: libgl1-mesa-dri\nVersion: 99.0.0\nDescription: Dummy package for libgl1-mesa-dri\n' >> libgl1-mesa-dri \
|
||||||
|
&& equivs-build libgl1-mesa-dri \
|
||||||
|
&& mv libgl1-mesa-dri_*.deb /libgl1-mesa-dri.deb \
|
||||||
|
&& equivs-control adwaita-icon-theme \
|
||||||
|
&& printf 'Section: misc\nPriority: optional\nStandards-Version: 3.9.2\nPackage: adwaita-icon-theme\nVersion: 99.0.0\nDescription: Dummy package for adwaita-icon-theme\n' >> adwaita-icon-theme \
|
||||||
|
&& equivs-build adwaita-icon-theme \
|
||||||
|
&& mv adwaita-icon-theme_*.deb /adwaita-icon-theme.deb
|
||||||
|
|
||||||
# Install Chromium, dumb-init and remove all locales but en-US
|
FROM python:3.11-slim-bullseye
|
||||||
RUN apk add --no-cache chromium dumb-init && \
|
|
||||||
find /usr/lib/chromium/locales -type f ! -name 'en-US.*' -delete
|
|
||||||
|
|
||||||
# Copy FlareSolverr code
|
# Copy dummy packages
|
||||||
USER node
|
COPY --from=builder /*.deb /
|
||||||
RUN mkdir -p /home/node/flaresolverr
|
|
||||||
WORKDIR /home/node/flaresolverr
|
|
||||||
COPY --chown=node:node package.json package-lock.json tsconfig.json ./
|
|
||||||
COPY --chown=node:node src ./src/
|
|
||||||
|
|
||||||
# Install package. Skip installing Chrome, we will use the installed package.
|
# Install dependencies and create flaresolverr user
|
||||||
ENV PUPPETEER_PRODUCT=chrome \
|
# You can test Chromium running this command inside the container:
|
||||||
PUPPETEER_SKIP_CHROMIUM_DOWNLOAD=true \
|
# xvfb-run -s "-screen 0 1600x1200x24" chromium --no-sandbox
|
||||||
PUPPETEER_EXECUTABLE_PATH=/usr/bin/chromium-browser
|
# The error traces is like this: "*** stack smashing detected ***: terminated"
|
||||||
RUN npm install && \
|
# To check the package versions available you can use this command:
|
||||||
npm run build && \
|
# apt-cache madison chromium
|
||||||
rm -rf src tsconfig.json && \
|
WORKDIR /app
|
||||||
npm prune --production
|
# Install dummy packages
|
||||||
|
RUN dpkg -i /libgl1-mesa-dri.deb \
|
||||||
|
&& dpkg -i /adwaita-icon-theme.deb \
|
||||||
|
# Install dependencies
|
||||||
|
&& apt-get update \
|
||||||
|
&& apt-get install -y --no-install-recommends chromium chromium-common chromium-driver xvfb dumb-init \
|
||||||
|
procps curl vim xauth \
|
||||||
|
# Remove temporary files and hardware decoding libraries
|
||||||
|
&& rm -rf /var/lib/apt/lists/* \
|
||||||
|
&& rm -f /usr/lib/x86_64-linux-gnu/libmfxhw* \
|
||||||
|
&& rm -f /usr/lib/x86_64-linux-gnu/mfx/* \
|
||||||
|
# Create flaresolverr user
|
||||||
|
&& useradd --home-dir /app --shell /bin/sh flaresolverr \
|
||||||
|
&& mv /usr/bin/chromedriver chromedriver \
|
||||||
|
&& chown -R flaresolverr:flaresolverr .
|
||||||
|
|
||||||
|
# Install Python dependencies
|
||||||
|
COPY requirements.txt .
|
||||||
|
RUN pip install -r requirements.txt \
|
||||||
|
# Remove temporary files
|
||||||
|
&& rm -rf /root/.cache
|
||||||
|
|
||||||
|
USER flaresolverr
|
||||||
|
|
||||||
|
RUN mkdir -p "/app/.config/chromium/Crash Reports/pending"
|
||||||
|
|
||||||
|
COPY src .
|
||||||
|
COPY package.json ../
|
||||||
|
|
||||||
EXPOSE 8191
|
EXPOSE 8191
|
||||||
|
EXPOSE 8192
|
||||||
|
|
||||||
|
# dumb-init avoids zombie chromium processes
|
||||||
ENTRYPOINT ["/usr/bin/dumb-init", "--"]
|
ENTRYPOINT ["/usr/bin/dumb-init", "--"]
|
||||||
CMD ["npm", "start"]
|
|
||||||
|
CMD ["/usr/local/bin/python", "-u", "/app/flaresolverr.py"]
|
||||||
|
|
||||||
|
# Local build
|
||||||
|
# docker build -t ngosang/flaresolverr:3.3.16 .
|
||||||
|
# docker run -p 8191:8191 ngosang/flaresolverr:3.3.16
|
||||||
|
|
||||||
|
# Multi-arch build
|
||||||
|
# docker run --rm --privileged multiarch/qemu-user-static --reset -p yes
|
||||||
|
# docker buildx create --use
|
||||||
|
# docker buildx build -t ngosang/flaresolverr:3.3.16 --platform linux/386,linux/amd64,linux/arm/v7,linux/arm64/v8 .
|
||||||
|
# add --push to publish in DockerHub
|
||||||
|
|
||||||
|
# Test multi-arch build
|
||||||
|
# docker run --rm --privileged multiarch/qemu-user-static --reset -p yes
|
||||||
|
# docker buildx create --use
|
||||||
|
# docker buildx build -t ngosang/flaresolverr:3.3.16 --platform linux/arm/v7 --load .
|
||||||
|
# docker run -p 8191:8191 --platform linux/arm/v7 ngosang/flaresolverr:3.3.16
|
||||||
|
|||||||
3
LICENSE
3
LICENSE
@@ -1,7 +1,6 @@
|
|||||||
MIT License
|
MIT License
|
||||||
|
|
||||||
Copyright (c) 2020 Diego Heras (ngosang)
|
Copyright (c) 2023 Diego Heras (ngosang / ngosang@hotmail.es)
|
||||||
Copyright (c) 2020 Noah Cardoza (NoahCardoza)
|
|
||||||
|
|
||||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
of this software and associated documentation files (the "Software"), to deal
|
of this software and associated documentation files (the "Software"), to deal
|
||||||
|
|||||||
232
README.md
232
README.md
@@ -4,20 +4,18 @@
|
|||||||
[](https://hub.docker.com/r/flaresolverr/flaresolverr/)
|
[](https://hub.docker.com/r/flaresolverr/flaresolverr/)
|
||||||
[](https://github.com/FlareSolverr/FlareSolverr/issues)
|
[](https://github.com/FlareSolverr/FlareSolverr/issues)
|
||||||
[](https://github.com/FlareSolverr/FlareSolverr/pulls)
|
[](https://github.com/FlareSolverr/FlareSolverr/pulls)
|
||||||
[](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=X5NJLLX5GLTV6&source=url)
|
[](https://www.paypal.com/paypalme/diegoheras0xff)
|
||||||
[](https://www.buymeacoffee.com/ngosang)
|
[](https://www.blockchain.com/btc/address/13Hcv77AdnFWEUZ9qUpoPBttQsUT7q9TTh)
|
||||||
[](https://en.cryptobadges.io/donate/13Hcv77AdnFWEUZ9qUpoPBttQsUT7q9TTh)
|
[](https://www.blockchain.com/eth/address/0x0D1549BbB00926BF3D92c1A8A58695e982f1BE2E)
|
||||||
|
|
||||||
FlareSolverr is a proxy server to bypass Cloudflare protection
|
FlareSolverr is a proxy server to bypass Cloudflare and DDoS-GUARD protection.
|
||||||
|
|
||||||
:warning: This project is in beta state. Some things may not work and the API can change at any time.
|
|
||||||
|
|
||||||
## How it works
|
## How it works
|
||||||
|
|
||||||
FlareSolverr starts a proxy server and it waits for user requests in an idle state using few resources.
|
FlareSolverr starts a proxy server, and it waits for user requests in an idle state using few resources.
|
||||||
When some request arrives, it uses [puppeteer](https://github.com/puppeteer/puppeteer) with the
|
When some request arrives, it uses [Selenium](https://www.selenium.dev) with the
|
||||||
[stealth plugin](https://github.com/berstend/puppeteer-extra/tree/master/packages/puppeteer-extra-plugin-stealth)
|
[undetected-chromedriver](https://github.com/ultrafunkamsterdam/undetected-chromedriver)
|
||||||
to create a headless browser (Chrome). It opens the URL with user parameters and waits until the Cloudflare challenge
|
to create a web browser (Chrome). It opens the URL with user parameters and waits until the Cloudflare challenge
|
||||||
is solved (or timeout). The HTML code and the cookies are sent back to the user, and those cookies can be used to
|
is solved (or timeout). The HTML code and the cookies are sent back to the user, and those cookies can be used to
|
||||||
bypass Cloudflare using other HTTP clients.
|
bypass Cloudflare using other HTTP clients.
|
||||||
|
|
||||||
@@ -39,11 +37,13 @@ Docker images are available in:
|
|||||||
* DockerHub => https://hub.docker.com/r/flaresolverr/flaresolverr
|
* DockerHub => https://hub.docker.com/r/flaresolverr/flaresolverr
|
||||||
|
|
||||||
Supported architectures are:
|
Supported architectures are:
|
||||||
| Architecture | Tag |
|
|
||||||
| :----: | --- |
|
| Architecture | Tag |
|
||||||
| x86-64 | linux/amd64 |
|
|--------------|--------------|
|
||||||
| ARM64 | linux/arm64 |
|
| x86 | linux/386 |
|
||||||
| ARM32 | linux/arm/v7 |
|
| x86-64 | linux/amd64 |
|
||||||
|
| ARM32 | linux/arm/v7 |
|
||||||
|
| ARM64 | linux/arm64 |
|
||||||
|
|
||||||
We provide a `docker-compose.yml` configuration file. Clone this repository and execute `docker-compose up -d` to start
|
We provide a `docker-compose.yml` configuration file. Clone this repository and execute `docker-compose up -d` to start
|
||||||
the container.
|
the container.
|
||||||
@@ -58,21 +58,37 @@ docker run -d \
|
|||||||
ghcr.io/flaresolverr/flaresolverr:latest
|
ghcr.io/flaresolverr/flaresolverr:latest
|
||||||
```
|
```
|
||||||
|
|
||||||
|
If your host OS is Debian, make sure `libseccomp2` version is 2.5.x. You can check the version with `sudo apt-cache policy libseccomp2`
|
||||||
|
and update the package with `sudo apt install libseccomp2=2.5.1-1~bpo10+1` or `sudo apt install libseccomp2=2.5.1-1+deb11u1`.
|
||||||
|
Remember to restart the Docker daemon and the container after the update.
|
||||||
|
|
||||||
### Precompiled binaries
|
### Precompiled binaries
|
||||||
|
|
||||||
|
> **Warning**
|
||||||
|
> Precompiled binaries are only available for x64 architecture. For other architectures see Docker images.
|
||||||
|
|
||||||
This is the recommended way for Windows users.
|
This is the recommended way for Windows users.
|
||||||
* Download the [FlareSolverr zip](https://github.com/FlareSolverr/FlareSolverr/releases) from the release's assets. It is available for Windows and Linux.
|
* Download the [FlareSolverr executable](https://github.com/FlareSolverr/FlareSolverr/releases) from the release's page. It is available for Windows x64 and Linux x64.
|
||||||
* Extract the zip file. FlareSolverr executable and chrome folder must be in the same directory.
|
|
||||||
* Execute FlareSolverr binary. In the environment variables section you can find how to change the configuration.
|
* Execute FlareSolverr binary. In the environment variables section you can find how to change the configuration.
|
||||||
|
|
||||||
### From source code
|
### From source code
|
||||||
|
|
||||||
This is the recommended way for macOS users and for developers.
|
> **Warning**
|
||||||
* Install [NodeJS](https://nodejs.org/)
|
> Installing from source code only works for x64 architecture. For other architectures see Docker images.
|
||||||
* Clone this repository and open a shell in that path
|
|
||||||
* Run `npm install` command to install FlareSolverr dependencies
|
* Install [Python 3.11](https://www.python.org/downloads/).
|
||||||
* Run `npm run build` command to compile TypeScript code
|
* Install [Chrome](https://www.google.com/intl/en_us/chrome/) (all OS) or [Chromium](https://www.chromium.org/getting-involved/download-chromium/) (just Linux, it doesn't work in Windows) web browser.
|
||||||
* Run `npm start` command to start FlareSolverr
|
* (Only in Linux / macOS) Install [Xvfb](https://en.wikipedia.org/wiki/Xvfb) package.
|
||||||
|
* Clone this repository and open a shell in that path.
|
||||||
|
* Run `pip install -r requirements.txt` command to install FlareSolverr dependencies.
|
||||||
|
* Run `python src/flaresolverr.py` command to start FlareSolverr.
|
||||||
|
|
||||||
|
### From source code (FreeBSD/TrueNAS CORE)
|
||||||
|
|
||||||
|
* Run `pkg install chromium python39 py39-pip xorg-vfbserver` command to install the required dependencies.
|
||||||
|
* Clone this repository and open a shell in that path.
|
||||||
|
* Run `python3.9 -m pip install -r requirements.txt` command to install FlareSolverr dependencies.
|
||||||
|
* Run `python3.9 src/flaresolverr.py` command to start FlareSolverr.
|
||||||
|
|
||||||
### Systemd service
|
### Systemd service
|
||||||
|
|
||||||
@@ -80,21 +96,43 @@ We provide an example Systemd unit file `flaresolverr.service` as reference. You
|
|||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Example request:
|
Example Bash request:
|
||||||
```bash
|
```bash
|
||||||
curl -L -X POST 'http://localhost:8191/v1' \
|
curl -L -X POST 'http://localhost:8191/v1' \
|
||||||
-H 'Content-Type: application/json' \
|
-H 'Content-Type: application/json' \
|
||||||
--data-raw '{
|
--data-raw '{
|
||||||
"cmd": "request.get",
|
"cmd": "request.get",
|
||||||
"url":"http://www.google.com/",
|
"url": "http://www.google.com/",
|
||||||
"userAgent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleW...",
|
"maxTimeout": 60000
|
||||||
"maxTimeout": 60000,
|
|
||||||
"headers": {
|
|
||||||
"X-Test": "Testing 123..."
|
|
||||||
}
|
|
||||||
}'
|
}'
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Example Python request:
|
||||||
|
```py
|
||||||
|
import requests
|
||||||
|
|
||||||
|
url = "http://localhost:8191/v1"
|
||||||
|
headers = {"Content-Type": "application/json"}
|
||||||
|
data = {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": "http://www.google.com/",
|
||||||
|
"maxTimeout": 60000
|
||||||
|
}
|
||||||
|
response = requests.post(url, headers=headers, json=data)
|
||||||
|
print(response.text)
|
||||||
|
```
|
||||||
|
|
||||||
|
Example PowerShell request:
|
||||||
|
```ps1
|
||||||
|
$body = @{
|
||||||
|
cmd = "request.get"
|
||||||
|
url = "http://www.google.com/"
|
||||||
|
maxTimeout = 60000
|
||||||
|
} | ConvertTo-Json
|
||||||
|
|
||||||
|
irm -UseBasicParsing 'http://localhost:8191/v1' -Headers @{"Content-Type"="application/json"} -Method Post -Body $body
|
||||||
|
```
|
||||||
|
|
||||||
### Commands
|
### Commands
|
||||||
|
|
||||||
#### + `sessions.create`
|
#### + `sessions.create`
|
||||||
@@ -105,10 +143,10 @@ cookies for the browser to use.
|
|||||||
|
|
||||||
This also speeds up the requests since it won't have to launch a new browser instance for every request.
|
This also speeds up the requests since it won't have to launch a new browser instance for every request.
|
||||||
|
|
||||||
Parameter | Notes
|
| Parameter | Notes |
|
||||||
|--|--|
|
|-----------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||||
session | Optional. The session ID that you want to be assigned to the instance. If isn't set a random UUID will be assigned.
|
| session | Optional. The session ID that you want to be assigned to the instance. If isn't set a random UUID will be assigned. |
|
||||||
userAgent | Optional. Will be used by the headless browser.
|
| proxy | Optional, default disabled. Eg: `"proxy": {"url": "http://127.0.0.1:8888"}`. You must include the proxy schema in the URL: `http://`, `socks4://` or `socks5://`. Authorization (username/password) is supported. Eg: `"proxy": {"url": "http://127.0.0.1:8888", "username": "testuser", "password": "testpass"}` |
|
||||||
|
|
||||||
#### + `sessions.list`
|
#### + `sessions.list`
|
||||||
|
|
||||||
@@ -133,20 +171,24 @@ Example response:
|
|||||||
This will properly shutdown a browser instance and remove all files associated with it to free up resources for a new
|
This will properly shutdown a browser instance and remove all files associated with it to free up resources for a new
|
||||||
session. When you no longer need to use a session you should make sure to close it.
|
session. When you no longer need to use a session you should make sure to close it.
|
||||||
|
|
||||||
Parameter | Notes
|
| Parameter | Notes |
|
||||||
|--|--|
|
|-----------|-----------------------------------------------|
|
||||||
session | The session ID that you want to be destroyed.
|
| session | The session ID that you want to be destroyed. |
|
||||||
|
|
||||||
#### + `request.get`
|
#### + `request.get`
|
||||||
|
|
||||||
Parameter | Notes
|
| Parameter | Notes |
|
||||||
|--|--|
|
|---------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||||
url | Mandatory
|
| url | Mandatory |
|
||||||
session | Optional. Will send the request from and existing browser instance. If one is not sent it will create a temporary instance that will be destroyed immediately after the request is completed.
|
| session | Optional. Will send the request from and existing browser instance. If one is not sent it will create a temporary instance that will be destroyed immediately after the request is completed. |
|
||||||
headers | Optional. To specify user headers.
|
| session_ttl_minutes | Optional. FlareSolverr will automatically rotate expired sessions based on the TTL provided in minutes. |
|
||||||
maxTimeout | Optional, default value 60000. Max timeout to solve the challenge in milliseconds.
|
| maxTimeout | Optional, default value 60000. Max timeout to solve the challenge in milliseconds. |
|
||||||
cookies | Optional. Will be used by the headless browser. Follow [this](https://github.com/puppeteer/puppeteer/blob/v3.3.0/docs/api.md#pagesetcookiecookies) format.
|
| cookies | Optional. Will be used by the headless browser. Eg: `"cookies": [{"name": "cookie1", "value": "value1"}, {"name": "cookie2", "value": "value2"}]`. |
|
||||||
returnOnlyCookies | Optional, default false. Only returns the cookies. Response data, headers and other parts of the response are removed.
|
| returnOnlyCookies | Optional, default false. Only returns the cookies. Response data, headers and other parts of the response are removed. |
|
||||||
|
| proxy | Optional, default disabled. Eg: `"proxy": {"url": "http://127.0.0.1:8888"}`. You must include the proxy schema in the URL: `http://`, `socks4://` or `socks5://`. Authorization (username/password) is not supported. (When the `session` parameter is set, the proxy is ignored; a session specific proxy can be set in `sessions.create`.) |
|
||||||
|
|
||||||
|
> **Warning**
|
||||||
|
> If you want to use Cloudflare clearance cookie in your scripts, make sure you use the FlareSolverr User-Agent too. If they don't match you will see the challenge.
|
||||||
|
|
||||||
Example response from running the `curl` above:
|
Example response from running the `curl` above:
|
||||||
|
|
||||||
@@ -211,78 +253,70 @@ Example response from running the `curl` above:
|
|||||||
|
|
||||||
This is the same as `request.get` but it takes one more param:
|
This is the same as `request.get` but it takes one more param:
|
||||||
|
|
||||||
Parameter | Notes
|
| Parameter | Notes |
|
||||||
|--|--|
|
|-----------|--------------------------------------------------------------------------|
|
||||||
postData | Must be a string. If you want to POST a form, don't forget to set the `Content-Type` header to `application/x-www-form-urlencoded` or the server might not understand your request.
|
| postData | Must be a string with `application/x-www-form-urlencoded`. Eg: `a=b&c=d` |
|
||||||
|
|
||||||
### Download small files
|
|
||||||
|
|
||||||
If you need to access an image/pdf or small file, you should pass the `download` parameter to `request.get` setting it
|
|
||||||
to `true`. Rather than access the html and return text it will return the buffer **base64** encoded which you will be
|
|
||||||
able to decode and save the image/pdf.
|
|
||||||
|
|
||||||
This method isn't recommended for videos or anything larger. As that should be streamed back to the client and at the
|
|
||||||
moment there is nothing setup to do so. If this is something you need feel free to create an issue and/or submit a PR.
|
|
||||||
|
|
||||||
## Environment variables
|
## Environment variables
|
||||||
|
|
||||||
Name | Default | Notes
|
| Name | Default | Notes |
|
||||||
|--|--|--|
|
|--------------------|------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||||
LOG_LEVEL | info | Verbosity of the logging. Use `LOG_LEVEL=debug` for more information.
|
| LOG_LEVEL | info | Verbosity of the logging. Use `LOG_LEVEL=debug` for more information. |
|
||||||
LOG_HTML | false | Only for debugging. If `true` all HTML that passes through the proxy will be logged to the console in `debug` level.
|
| LOG_HTML | false | Only for debugging. If `true` all HTML that passes through the proxy will be logged to the console in `debug` level. |
|
||||||
CAPTCHA_SOLVER | none | Captcha solving method. It is used when a captcha is encountered. See the Captcha Solvers section.
|
| CAPTCHA_SOLVER | none | Captcha solving method. It is used when a captcha is encountered. See the Captcha Solvers section. |
|
||||||
TZ | UTC | Timezone used in the logs and the web browser. Example: `TZ=Europe/London`.
|
| TZ | UTC | Timezone used in the logs and the web browser. Example: `TZ=Europe/London`. |
|
||||||
HEADLESS | true | Only for debugging. To run the web browser in headless mode or visible.
|
| LANG | none | Language used in the web browser. Example: `LANG=en_GB`. |
|
||||||
PORT | 8191 | Listening port. You don't need to change this if you are running on Docker.
|
| HEADLESS | true | Only for debugging. To run the web browser in headless mode or visible. |
|
||||||
HOST | 0.0.0.0 | Listening interface. You don't need to change this if you are running on Docker.
|
| BROWSER_TIMEOUT | 40000 | If you are experiencing errors/timeouts because your system is slow, you can try to increase this value. Remember to increase the `maxTimeout` parameter too. |
|
||||||
|
| TEST_URL | https://www.google.com | FlareSolverr makes a request on start to make sure the web browser is working. You can change that URL if it is blocked in your country. |
|
||||||
|
| PORT | 8191 | Listening port. You don't need to change this if you are running on Docker. |
|
||||||
|
| HOST | 0.0.0.0 | Listening interface. You don't need to change this if you are running on Docker. |
|
||||||
|
| PROMETHEUS_ENABLED | false | Enable Prometheus exporter. See the Prometheus section below. |
|
||||||
|
| PROMETHEUS_PORT | 8192 | Listening port for Prometheus exporter. See the Prometheus section below. |
|
||||||
|
|
||||||
Environment variables are set differently depending on the operating system. Some examples:
|
Environment variables are set differently depending on the operating system. Some examples:
|
||||||
* Docker: Take a look at the Docker section in this document. Environment variables can be set in the `docker-compose.yml` file or in the Docker CLI command.
|
* Docker: Take a look at the Docker section in this document. Environment variables can be set in the `docker-compose.yml` file or in the Docker CLI command.
|
||||||
* Linux: Run `export LOG_LEVEL=debug` and then start FlareSolverr in the same shell.
|
* Linux: Run `export LOG_LEVEL=debug` and then start FlareSolverr in the same shell.
|
||||||
* Windows: Open `cmd.exe`, run `set LOG_LEVEL=debug` and then start FlareSolverr in the same shell.
|
* Windows: Open `cmd.exe`, run `set LOG_LEVEL=debug` and then start FlareSolverr in the same shell.
|
||||||
|
|
||||||
|
## Prometheus exporter
|
||||||
|
|
||||||
|
The Prometheus exporter for FlareSolverr is disabled by default. It can be enabled with the environment variable `PROMETHEUS_ENABLED`. If you are using Docker make sure you expose the `PROMETHEUS_PORT`.
|
||||||
|
|
||||||
|
Example metrics:
|
||||||
|
```shell
|
||||||
|
# HELP flaresolverr_request_total Total requests with result
|
||||||
|
# TYPE flaresolverr_request_total counter
|
||||||
|
flaresolverr_request_total{domain="nowsecure.nl",result="solved"} 1.0
|
||||||
|
# HELP flaresolverr_request_created Total requests with result
|
||||||
|
# TYPE flaresolverr_request_created gauge
|
||||||
|
flaresolverr_request_created{domain="nowsecure.nl",result="solved"} 1.690141657157109e+09
|
||||||
|
# HELP flaresolverr_request_duration Request duration in seconds
|
||||||
|
# TYPE flaresolverr_request_duration histogram
|
||||||
|
flaresolverr_request_duration_bucket{domain="nowsecure.nl",le="0.0"} 0.0
|
||||||
|
flaresolverr_request_duration_bucket{domain="nowsecure.nl",le="10.0"} 1.0
|
||||||
|
flaresolverr_request_duration_bucket{domain="nowsecure.nl",le="25.0"} 1.0
|
||||||
|
flaresolverr_request_duration_bucket{domain="nowsecure.nl",le="50.0"} 1.0
|
||||||
|
flaresolverr_request_duration_bucket{domain="nowsecure.nl",le="+Inf"} 1.0
|
||||||
|
flaresolverr_request_duration_count{domain="nowsecure.nl"} 1.0
|
||||||
|
flaresolverr_request_duration_sum{domain="nowsecure.nl"} 5.858
|
||||||
|
# HELP flaresolverr_request_duration_created Request duration in seconds
|
||||||
|
# TYPE flaresolverr_request_duration_created gauge
|
||||||
|
flaresolverr_request_duration_created{domain="nowsecure.nl"} 1.6901416571570296e+09
|
||||||
|
```
|
||||||
|
|
||||||
## Captcha Solvers
|
## Captcha Solvers
|
||||||
|
|
||||||
:warning: At this time none of the captcha solvers work. You can check the status in the open issues. Any help is welcome.
|
> **Warning**
|
||||||
|
> At this time none of the captcha solvers work. You can check the status in the open issues. Any help is welcome.
|
||||||
|
|
||||||
Sometimes CloudFlare not only gives mathematical computations and browser tests, sometimes they also require the user to
|
Sometimes CloudFlare not only gives mathematical computations and browser tests, sometimes they also require the user to
|
||||||
solve a captcha.
|
solve a captcha.
|
||||||
If this is the case, FlareSolverr will return the error `Captcha detected but no automatic solver is configured.`
|
If this is the case, FlareSolverr will return the error `Captcha detected but no automatic solver is configured.`
|
||||||
|
|
||||||
FlareSolverr can be customized to solve the captchas automatically by setting the environment variable `CAPTCHA_SOLVER`
|
FlareSolverr can be customized to solve the CAPTCHA automatically by setting the environment variable `CAPTCHA_SOLVER`
|
||||||
to the file name of one of the adapters inside the [/captcha](src/captcha) directory.
|
to the file name of one of the adapters inside the [/captcha](src/captcha) directory.
|
||||||
|
|
||||||
### hcaptcha-solver
|
|
||||||
|
|
||||||
This method makes use of the [hcaptcha-solver](https://github.com/JimmyLaurent/hcaptcha-solver) project.
|
|
||||||
|
|
||||||
NOTE: This solver works picking random images so it will fail in a lot of requests and it's hard to know if it is
|
|
||||||
working or not. In a real use case with Sonarr/Radarr + Jackett it is still useful because those apps make a new request
|
|
||||||
each 15 minutes. Eventually one of the requests is going to work and Jackett saves the cookie forever (until it stops
|
|
||||||
working).
|
|
||||||
|
|
||||||
To use this solver you must set the environment variable:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
CAPTCHA_SOLVER=hcaptcha-solver
|
|
||||||
```
|
|
||||||
|
|
||||||
### CaptchaHarvester
|
|
||||||
|
|
||||||
This method makes use of the [CaptchaHarvester](https://github.com/NoahCardoza/CaptchaHarvester) project which allows
|
|
||||||
users to collect their own tokens from ReCaptcha V2/V3 and hCaptcha for free.
|
|
||||||
|
|
||||||
To use this method you must set these environment variables:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
CAPTCHA_SOLVER=harvester
|
|
||||||
HARVESTER_ENDPOINT=https://127.0.0.1:5000/token
|
|
||||||
```
|
|
||||||
|
|
||||||
**Note**: above I set `HARVESTER_ENDPOINT` to the default configuration of the captcha harvester's server, but that
|
|
||||||
could change if you customize the command line flags. Simply put, `HARVESTER_ENDPOINT` should be set to the URI of the
|
|
||||||
route that returns a token in plain text when called.
|
|
||||||
|
|
||||||
## Related projects
|
## Related projects
|
||||||
|
|
||||||
* C# implementation => https://github.com/FlareSolverr/FlareSolverrSharp
|
* C# implementation => https://github.com/FlareSolverr/FlareSolverrSharp
|
||||||
|
|||||||
@@ -1,85 +0,0 @@
|
|||||||
const fs = require('fs')
|
|
||||||
const path = require('path')
|
|
||||||
const { execSync } = require('child_process')
|
|
||||||
const archiver = require('archiver')
|
|
||||||
const puppeteer = require('puppeteer')
|
|
||||||
const version = 'v' + require('./package.json').version;
|
|
||||||
|
|
||||||
(async () => {
|
|
||||||
const builds = [
|
|
||||||
{
|
|
||||||
platform: 'linux',
|
|
||||||
version: 756035,
|
|
||||||
chromeFolder: 'chrome-linux',
|
|
||||||
fsExec: 'flaresolverr-linux',
|
|
||||||
fsZipExec: 'flaresolverr',
|
|
||||||
fsZipName: 'linux-x64',
|
|
||||||
fsLicenseName: 'LICENSE'
|
|
||||||
},
|
|
||||||
{
|
|
||||||
platform: 'win64',
|
|
||||||
version: 756035,
|
|
||||||
chromeFolder: 'chrome-win',
|
|
||||||
fsExec: 'flaresolverr-win.exe',
|
|
||||||
fsZipExec: 'flaresolverr.exe',
|
|
||||||
fsZipName: 'windows-x64',
|
|
||||||
fsLicenseName: 'LICENSE.txt'
|
|
||||||
}
|
|
||||||
// TODO: this is working but changes are required in session.ts to find chrome path
|
|
||||||
// {
|
|
||||||
// platform: 'mac',
|
|
||||||
// version: 756035,
|
|
||||||
// chromeFolder: 'chrome-mac',
|
|
||||||
// fsExec: 'flaresolverr-macos',
|
|
||||||
// fsZipExec: 'flaresolverr',
|
|
||||||
// fsZipName: 'macos',
|
|
||||||
// fsLicenseName: 'LICENSE'
|
|
||||||
// }
|
|
||||||
]
|
|
||||||
|
|
||||||
// generate executables
|
|
||||||
console.log('Generating executables...')
|
|
||||||
if (fs.existsSync('bin')) {
|
|
||||||
fs.rmSync('bin', { recursive: true })
|
|
||||||
}
|
|
||||||
execSync('pkg -t node14-win-x64,node14-linux-x64 --out-path bin .')
|
|
||||||
// execSync('pkg -t node14-win-x64,node14-mac-x64,node14-linux-x64 --out-path bin .')
|
|
||||||
|
|
||||||
// download Chrome and zip together
|
|
||||||
for (const os of builds) {
|
|
||||||
console.log('Building ' + os.fsZipName + ' artifact')
|
|
||||||
|
|
||||||
// download chrome
|
|
||||||
console.log('Downloading Chrome...')
|
|
||||||
const f = puppeteer.createBrowserFetcher({
|
|
||||||
platform: os.platform,
|
|
||||||
path: path.join(__dirname, 'bin', 'puppeteer')
|
|
||||||
})
|
|
||||||
await f.download(os.version)
|
|
||||||
|
|
||||||
// compress in zip
|
|
||||||
console.log('Compressing zip file...')
|
|
||||||
const zipName = 'bin/flaresolverr-' + version + '-' + os.fsZipName + '.zip'
|
|
||||||
const output = fs.createWriteStream(zipName)
|
|
||||||
const archive = archiver('zip')
|
|
||||||
|
|
||||||
output.on('close', function () {
|
|
||||||
console.log('File ' + zipName + ' created. Size: ' + archive.pointer() + ' bytes')
|
|
||||||
})
|
|
||||||
|
|
||||||
archive.on('error', function (err) {
|
|
||||||
throw err
|
|
||||||
})
|
|
||||||
|
|
||||||
archive.pipe(output)
|
|
||||||
|
|
||||||
archive.file('LICENSE', { name: 'flaresolverr/' + os.fsLicenseName })
|
|
||||||
archive.file('bin/' + os.fsExec, { name: 'flaresolverr/' + os.fsZipExec })
|
|
||||||
archive.directory('bin/puppeteer/' + os.platform + '-' + os.version + '/' + os.chromeFolder, 'flaresolverr/chrome')
|
|
||||||
if (os.platform === 'linux') {
|
|
||||||
archive.file('flaresolverr.service', { name: 'flaresolverr/flaresolverr.service' })
|
|
||||||
}
|
|
||||||
|
|
||||||
await archive.finalize()
|
|
||||||
}
|
|
||||||
})()
|
|
||||||
@@ -1,19 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=FlareSolverr
|
|
||||||
After=network.target
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
SyslogIdentifier=flaresolverr
|
|
||||||
Restart=always
|
|
||||||
RestartSec=5
|
|
||||||
Type=simple
|
|
||||||
User=flaresolverr
|
|
||||||
Group=flaresolverr
|
|
||||||
Environment="LOG_LEVEL=info"
|
|
||||||
Environment="CAPTCHA_SOLVER=none"
|
|
||||||
WorkingDirectory=/opt/flaresolverr
|
|
||||||
ExecStart=/opt/flaresolverr/flaresolverr
|
|
||||||
TimeoutStopSec=30
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
||||||
219
html_samples/cloudflare_captcha_hcaptcha_v1.html
Normal file
219
html_samples/cloudflare_captcha_hcaptcha_v1.html
Normal file
@@ -0,0 +1,219 @@
|
|||||||
|
<!DOCTYPE html>
|
||||||
|
<html lang="en-US">
|
||||||
|
|
||||||
|
<head>
|
||||||
|
<title>Just a moment...</title>
|
||||||
|
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
|
||||||
|
<meta http-equiv="X-UA-Compatible" content="IE=Edge">
|
||||||
|
<meta name="robots" content="noindex,nofollow">
|
||||||
|
<meta name="viewport" content="width=device-width,initial-scale=1">
|
||||||
|
<link href="Just%20a%20moment_files/cf-errors.css" rel="stylesheet">
|
||||||
|
|
||||||
|
<script>
|
||||||
|
(function () {
|
||||||
|
window._cf_chl_opt = {
|
||||||
|
cvId: '2',
|
||||||
|
cType: 'managed',
|
||||||
|
cNounce: '67839',
|
||||||
|
cRay: '732fbc436ab471ed',
|
||||||
|
cHash: 'dce5bd920f3aa51',
|
||||||
|
cUPMDTk: "\/search?q=2022&__cf_chl_tk=lkycIb1jDXlmFqiB7AXTwy38_EzYPvu79CCQyU9lhUE-1659201316-0-gaNycGzNCf0",
|
||||||
|
cFPWv: 'g',
|
||||||
|
cTTimeMs: '1000',
|
||||||
|
cTplV: 2,
|
||||||
|
cRq: {
|
||||||
|
ru: 'aHR0cHM6Ly8wbWFnbmV0LmNvbS9zZWFyY2g/cT0yMDIy',
|
||||||
|
ra: 'TW96aWxsYS81LjAgKFgxMTsgTGludXggeDg2XzY0OyBydjoxMDUuMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC8xMDUuMA==',
|
||||||
|
rm: 'R0VU',
|
||||||
|
d: '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',
|
||||||
|
t: 'MTY1OTIwMTMxNi4zOTIwMDA=',
|
||||||
|
m: '3l81qRkXiMTbjTzBtc0v1XwSheF46UfagbXVhYgbAVw=',
|
||||||
|
i1: 'Iu5a1gH3p9igzqBwncow9g==',
|
||||||
|
i2: 'PmNXozjc73unhnp/X0+kUQ==',
|
||||||
|
zh: 'qP4bnGc6j96JlnjNSE7HmQci3S9L50bHFtm4bQRjjKU=',
|
||||||
|
uh: 'SK3PXNkeRzZtkRARhJpbmZpCIiWQw6+5gpOE7vojWx4=',
|
||||||
|
hh: 'azXzJl8Ou22g0nN/9idVUoB9EqZ7fLmkSdDRHM3Lkmw=',
|
||||||
|
}
|
||||||
|
}
|
||||||
|
window._cf_chl_enter = function () { window._cf_chl_opt.p = 1 };
|
||||||
|
})();
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<script src="Just%20a%20moment_files/v1.js"></script>
|
||||||
|
<script type="text/javascript" src="Just%20a%20moment_files/api.js"></script>
|
||||||
|
</head>
|
||||||
|
|
||||||
|
<body class="no-js">
|
||||||
|
|
||||||
|
<div class="privacy-pass">
|
||||||
|
<a rel="noopener noreferrer" href="https://addons.mozilla.org/en-US/firefox/addon/privacy-pass/"
|
||||||
|
target="_blank">
|
||||||
|
Privacy Pass
|
||||||
|
<span class="privacy-pass-icon-wrapper">
|
||||||
|
<div class="privacy-pass-icon"></div>
|
||||||
|
</span>
|
||||||
|
</a>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div class="main-wrapper" role="main">
|
||||||
|
<div class="main-content">
|
||||||
|
<h1 class="zone-name-title h1">
|
||||||
|
<img class="heading-favicon" src="Just%20a%20moment_files/favicon.ico"
|
||||||
|
onerror="this.onerror=null;this.parentNode.removeChild(this)">
|
||||||
|
0MAGNET.COM
|
||||||
|
</h1>
|
||||||
|
<h2 class="h2" id="cf-challenge-running">
|
||||||
|
Checking if the site connection is secure
|
||||||
|
</h2>
|
||||||
|
<div id="cf-challenge-stage" style="display: block;">
|
||||||
|
<div id="cf-challenge-hcaptcha-wrapper" class="captcha-prompt spacer">
|
||||||
|
<div style="display: none;" class="hcaptcha-box"><iframe src="Just%20a%20moment_files/hcaptcha.html"
|
||||||
|
title="widget containing checkbox for hCaptcha security challenge" tabindex="0"
|
||||||
|
scrolling="no" data-hcaptcha-widget-id="0tiueg8lyuj" data-hcaptcha-response=""
|
||||||
|
style="width: 303px; height: 78px; overflow: hidden;" frameborder="0"></iframe><textarea
|
||||||
|
id="h-captcha-response-0tiueg8lyuj" name="h-captcha-response"
|
||||||
|
style="display: none;"></textarea></div>
|
||||||
|
<div class="hcaptcha-box"><iframe src="Just%20a%20moment_files/hcaptcha_002.html"
|
||||||
|
title="widget containing checkbox for hCaptcha security challenge" tabindex="0"
|
||||||
|
scrolling="no" data-hcaptcha-widget-id="10tlmhzz0qyq" data-hcaptcha-response=""
|
||||||
|
style="width: 303px; height: 78px; overflow: hidden;" frameborder="0"></iframe><textarea
|
||||||
|
id="h-captcha-response-10tlmhzz0qyq" name="h-captcha-response"
|
||||||
|
style="display: none;"></textarea></div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-spinner" class="spacer loading-spinner" style="display: none; visibility: hidden;">
|
||||||
|
<div class="lds-ring">
|
||||||
|
<div></div>
|
||||||
|
<div></div>
|
||||||
|
<div></div>
|
||||||
|
<div></div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<noscript>
|
||||||
|
<div id="cf-challenge-error-title">
|
||||||
|
<div class="h2">
|
||||||
|
<span class="icon-wrapper">
|
||||||
|
<div class="heading-icon warning-icon"></div>
|
||||||
|
</span>
|
||||||
|
<span id="cf-challenge-error-text">
|
||||||
|
Enable JavaScript and cookies to continue
|
||||||
|
</span>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</noscript>
|
||||||
|
<div
|
||||||
|
style="display:none;background-image:url('/cdn-cgi/images/trace/captcha/nojs/transparent.gif?ray=732fbc436ab471ed')">
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-body-text" class="core-msg spacer">
|
||||||
|
0magnet.com needs to review the security of your connection before
|
||||||
|
proceeding.
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-fact-wrapper" style="display: block; visibility: visible;" class="fact spacer hidden">
|
||||||
|
<span class="fact-title">Did you know</span> <span id="cf-challenge-fact" class="body-text">the first
|
||||||
|
botnet in 2003 took over 500-1000 devices? Today, botnets take over millions of devices at
|
||||||
|
once.</span>
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-explainer-expandable" class="hidden expandable body-text spacer"
|
||||||
|
style="display: block; visibility: visible;">
|
||||||
|
<div class="expandable-title" id="cf-challenge-explainer-summary"><button class="expandable-summary-btn"
|
||||||
|
id="cf-challenge-explainer-btn" type="button"> Why am I seeing this page? <span
|
||||||
|
class="caret-icon-wrapper">
|
||||||
|
<div class="caret-icon"></div>
|
||||||
|
</span> </button> </div>
|
||||||
|
<div class="expandable-details" id="cf-challenge-explainer-details">
|
||||||
|
Requests from malicious bots can pose as legitimate traffic.
|
||||||
|
Occasionally, you may see this page while the site ensures that the
|
||||||
|
connection is secure.</div>
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-success" style="display: none;">
|
||||||
|
<div class="h2"><span class="icon-wrapper"><img class="heading-icon" alt="Success icon"
|
||||||
|
src="data:image/png;base64,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"></span>Connection
|
||||||
|
is secure</div>
|
||||||
|
<div class="core-msg spacer">Proceeding...</div>
|
||||||
|
</div>
|
||||||
|
<form id="challenge-form"
|
||||||
|
action="/search?q=2022&__cf_chl_f_tk=lkycIb1jDXlmFqiB7AXTwy38_EzYPvu79CCQyU9lhUE-1659201316-0-gaNycGzNCf0"
|
||||||
|
method="POST" enctype="application/x-www-form-urlencoded">
|
||||||
|
<input type="hidden" name="md"
|
||||||
|
value="P4fDbSohR3e3VZmGdBSN0Gd8t8ueht.ZVgSdQYwa45Y-1659201316-0-AesEKnKN8eJLiLESJle3R0T3fwKbVMlX09CR0sIU1LruDXen0nSlT2a5OpMUFYR7HQMGcF9Ja227n2p2D2ffUlWHPVeFX-YSNiewLZA3XuAQmOn-1DyWKA-SaMH_MW2vOSC7PCHAdJDhoRWjM_o3MyKziopj3WmDcaCI_ikk68bJTIValZ_e9tO7hmHC8zjsxDC8kXmI0tbrhyW5nyS2hRlx_ZVRcRHbHsVRN0-FGtEbCoaHmnp-q0N4AYhCJXofYRunPcSG_Y1iWMk-7ofOXON_gO7oGG_8-WWD5EG1jaz2ldpNO1RTkS7dQvTiC1Io1qAsVnQtokEaDR2zoWK_MF-hz6tOmuJIDgnAoH6vPFAa9EyJOUiG2RV-3q1CKTUgr82XRJw5CaXpN0QeBq0xHxFl5mzkFO8xqQsRnPkGUKtxBQ58syPIhR4AvNp8HA028gUNmaztJZ9i2UcWydut4VghHsoJjS5DEKTamjJhNrrkargjXUekXTfKXMVKCXxo0NFObTmKwzsNB5hrk3M43KzZCOOgTnqsrVUk54bAeDsr4qmTVW2wVk-0u78QpV2JFFOIJxRLikPmqo9CUokgUJ_IPsEjA5Q3kjrf9yq2OHU0MkwzLFNOAyc5N3A4WSYp91kESwxM98qFetpAZ0R3LID2c2-MraHnpOI2Xn4bxbDIdUPmjy6VB8Huuuf6M-o3Tw">
|
||||||
|
<input type="hidden" name="r"
|
||||||
|
value="bdZ7.nm8dGOZxq3EDOv_Kx7nKVv68q7b0RARXAlR9kQ-1659201316-0-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">
|
||||||
|
|
||||||
|
<span style="display: none;"><span class="text-gray-600" data-translate="error">error code:
|
||||||
|
1020</span></span>
|
||||||
|
</form>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<script>
|
||||||
|
(function () {
|
||||||
|
var trkjs = document.createElement('img');
|
||||||
|
trkjs.setAttribute('src', '/cdn-cgi/images/trace/captcha/js/transparent.gif?ray=732fbc436ab471ed');
|
||||||
|
trkjs.setAttribute('style', 'display: none');
|
||||||
|
document.body.appendChild(trkjs);
|
||||||
|
var cpo = document.createElement('script');
|
||||||
|
cpo.src = '/cdn-cgi/challenge-platform/h/g/orchestrate/managed/v1?ray=732fbc436ab471ed';
|
||||||
|
window._cf_chl_opt.cOgUHash = location.hash === '' && location.href.indexOf('#') !== -1 ? '#' : location.hash;
|
||||||
|
window._cf_chl_opt.cOgUQuery = location.search === '' && location.href.slice(0, -window._cf_chl_opt.cOgUHash.length).indexOf('?') !== -1 ? '?' : location.search;
|
||||||
|
if (window.history && window.history.replaceState) {
|
||||||
|
var ogU = location.pathname + window._cf_chl_opt.cOgUQuery + window._cf_chl_opt.cOgUHash;
|
||||||
|
history.replaceState(null, null, "\/search?q=2022&__cf_chl_rt_tk=lkycIb1jDXlmFqiB7AXTwy38_EzYPvu79CCQyU9lhUE-1659201316-0-gaNycGzNCf0" + window._cf_chl_opt.cOgUHash);
|
||||||
|
cpo.onload = function () {
|
||||||
|
history.replaceState(null, null, ogU);
|
||||||
|
};
|
||||||
|
}
|
||||||
|
document.getElementsByTagName('head')[0].appendChild(cpo);
|
||||||
|
}());
|
||||||
|
</script><img src="Just%20a%20moment_files/transparent.gif" style="display: none">
|
||||||
|
|
||||||
|
<div class="footer" role="contentinfo">
|
||||||
|
<div class="footer-inner">
|
||||||
|
<div class="clearfix diagnostic-wrapper">
|
||||||
|
<div class="ray-id">Ray ID: <code>732fbc436ab471ed</code></div>
|
||||||
|
</div>
|
||||||
|
<div class="text-center">
|
||||||
|
Performance & security by
|
||||||
|
<a rel="noopener noreferrer" href="https://www.cloudflare.com/" target="_blank">Cloudflare</a>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
|
||||||
|
<div style="background-color: rgb(255, 255, 255); border: 1px solid rgb(215, 215, 215); box-shadow: rgba(0, 0, 0, 0.1) 0px 0px 4px; border-radius: 4px; left: -10000px; top: -10000px; z-index: -2147483648; position: absolute; transition: opacity 0.15s ease-out 0s; opacity: 0; visibility: hidden;"
|
||||||
|
aria-hidden="true">
|
||||||
|
<div style="position: relative; z-index: 1;"><iframe src="Just%20a%20moment_files/hcaptcha_003.html"
|
||||||
|
title="Main content of the hCaptcha challenge" scrolling="no"
|
||||||
|
style="border: 0px none; z-index: 2000000000; position: relative;" frameborder="0"></iframe></div>
|
||||||
|
<div
|
||||||
|
style="width: 100%; height: 100%; position: fixed; pointer-events: none; top: 0px; left: 0px; z-index: 0; background-color: rgb(255, 255, 255); opacity: 0.05;">
|
||||||
|
</div>
|
||||||
|
<div
|
||||||
|
style="border-width: 11px; position: absolute; pointer-events: none; margin-top: -11px; z-index: 1; right: 100%;">
|
||||||
|
<div
|
||||||
|
style="border-width: 10px; border-style: solid; border-color: transparent rgb(255, 255, 255) transparent transparent; position: relative; top: 10px; z-index: 1;">
|
||||||
|
</div>
|
||||||
|
<div
|
||||||
|
style="border-width: 11px; border-style: solid; border-color: transparent rgb(215, 215, 215) transparent transparent; position: relative; top: -11px; z-index: 0;">
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div style="background-color: rgb(255, 255, 255); border: 1px solid rgb(215, 215, 215); box-shadow: rgba(0, 0, 0, 0.1) 0px 0px 4px; border-radius: 4px; left: -10000px; top: -10000px; z-index: -2147483648; position: absolute; transition: opacity 0.15s ease-out 0s; opacity: 0; visibility: hidden;"
|
||||||
|
aria-hidden="true">
|
||||||
|
<div style="position: relative; z-index: 1;"><iframe src="Just%20a%20moment_files/hcaptcha_004.html"
|
||||||
|
title="Main content of the hCaptcha challenge" scrolling="no"
|
||||||
|
style="border: 0px none; z-index: 2000000000; position: relative;" frameborder="0"></iframe></div>
|
||||||
|
<div
|
||||||
|
style="width: 100%; height: 100%; position: fixed; pointer-events: none; top: 0px; left: 0px; z-index: 0; background-color: rgb(255, 255, 255); opacity: 0.05;">
|
||||||
|
</div>
|
||||||
|
<div
|
||||||
|
style="border-width: 11px; position: absolute; pointer-events: none; margin-top: -11px; z-index: 1; right: 100%;">
|
||||||
|
<div
|
||||||
|
style="border-width: 10px; border-style: solid; border-color: transparent rgb(255, 255, 255) transparent transparent; position: relative; top: 10px; z-index: 1;">
|
||||||
|
</div>
|
||||||
|
<div
|
||||||
|
style="border-width: 11px; border-style: solid; border-color: transparent rgb(215, 215, 215) transparent transparent; position: relative; top: -11px; z-index: 0;">
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</body>
|
||||||
|
|
||||||
|
</html>
|
||||||
170
html_samples/cloudflare_captcha_norobot_v1.html
Normal file
170
html_samples/cloudflare_captcha_norobot_v1.html
Normal file
@@ -0,0 +1,170 @@
|
|||||||
|
<!DOCTYPE html>
|
||||||
|
<html lang="en-US">
|
||||||
|
|
||||||
|
<head>
|
||||||
|
<title>Just a moment...</title>
|
||||||
|
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
|
||||||
|
<meta http-equiv="X-UA-Compatible" content="IE=Edge">
|
||||||
|
<meta name="robots" content="noindex,nofollow">
|
||||||
|
<meta name="viewport" content="width=device-width,initial-scale=1">
|
||||||
|
<link href="Just%20a%20moment2_files/cf-errors.css" rel="stylesheet">
|
||||||
|
|
||||||
|
<script>
|
||||||
|
(function () {
|
||||||
|
window._cf_chl_opt = {
|
||||||
|
cvId: '2',
|
||||||
|
cType: 'managed',
|
||||||
|
cNounce: '94250',
|
||||||
|
cRay: '732fc1c74f757330',
|
||||||
|
cHash: '8c4978fa93c1751',
|
||||||
|
cUPMDTk: "\/search?q=2022&__cf_chl_tk=6E3KpS5eCzuCMJG64ch2shvOMHdwQ8ioliqACpoQqM8-1659201542-0-gaNycGzNCeU",
|
||||||
|
cFPWv: 'g',
|
||||||
|
cTTimeMs: '1000',
|
||||||
|
cTplV: 2,
|
||||||
|
cRq: {
|
||||||
|
ru: 'aHR0cHM6Ly8wbWFnbmV0LmNvbS9zZWFyY2g/cT0yMDIy',
|
||||||
|
ra: 'TW96aWxsYS81LjAgKFgxMTsgTGludXggeDg2XzY0OyBydjoxMDUuMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC8xMDUuMA==',
|
||||||
|
rm: 'R0VU',
|
||||||
|
d: 'C4CtJo9JDMtUWZ0r+/s2CwjYdSTdqGYK3qFo1OXpvSc9v7/3d5QuMwmvG3e5oV1BpjlQb8eJJ23gVRxavjw/gpPp1brmKoHuvcJEmAP3Sof38vqcpF91/9NHe3JbmCM2xshiGvJdbpJXb5wXdYKYPMqy7NUHL1VU4hupa3Da3tBq9zyuMa1NcZaiyeE6piSl7n96m+VziRdwyG+SBUldIG/Fsv9J1yl+Gj19wbX1XEneMXChcClGgRrSe1MTd9thLkq2NGFqROnsUmpA8b+2Eqi+IPYQfkPcydWkHmJqQixN9ZFTIBChIC60hGHOQ7O354ju65tVGAhB/nBRREpdqvwoYzgufgg83+dbPHVdQasiuLRHvftOtHhS5/iaBOVoEBH+rElTSk/OYjU2Yh6gkQj0FjkbebEBptFeVAxgqoYZljOrhamWYYZ14tOKeonzc1rz/FXNTM5qVtrWCwAlt9SsXDjM/GYXZMTbOdNLnLZGlLNQCx+l6hMC0OQC45sWFzZECljbjXwiYfodKobeqe11lUXnskj8AN5Qc7O8OqtALsxoNCLZ7ou+ORY0lauremeuu3U3WqadgSGFGA+TZZw2VcCA3BIUKCGlsNLBlJ8wQS2UAGJfGLOVuhErmtsM',
|
||||||
|
t: 'MTY1OTIwMTU0Mi4yOTUwMDA=',
|
||||||
|
m: 'eWHHJ28v6yOyvSePVqcdyHxAYkkc3xq3VJ8YiDCk5nk=',
|
||||||
|
i1: 'M3dMvem+HcwSbNQrJbaYdQ==',
|
||||||
|
i2: 'ebY327qYCu6NZKHSQXkbaQ==',
|
||||||
|
zh: 'qP4bnGc6j96JlnjNSE7HmQci3S9L50bHFtm4bQRjjKU=',
|
||||||
|
uh: 'SK3PXNkeRzZtkRARhJpbmZpCIiWQw6+5gpOE7vojWx4=',
|
||||||
|
hh: 'azXzJl8Ou22g0nN/9idVUoB9EqZ7fLmkSdDRHM3Lkmw=',
|
||||||
|
}
|
||||||
|
}
|
||||||
|
window._cf_chl_enter = function () { window._cf_chl_opt.p = 1 };
|
||||||
|
})();
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<script src="Just%20a%20moment2_files/v1.js"></script>
|
||||||
|
<script type="text/javascript" src="Just%20a%20moment2_files/api.js"></script>
|
||||||
|
</head>
|
||||||
|
|
||||||
|
<body class="no-js">
|
||||||
|
|
||||||
|
<div class="privacy-pass">
|
||||||
|
<a rel="noopener noreferrer" href="https://addons.mozilla.org/en-US/firefox/addon/privacy-pass/"
|
||||||
|
target="_blank">
|
||||||
|
Privacy Pass
|
||||||
|
<span class="privacy-pass-icon-wrapper">
|
||||||
|
<div class="privacy-pass-icon"></div>
|
||||||
|
</span>
|
||||||
|
</a>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div class="main-wrapper" role="main">
|
||||||
|
<div class="main-content">
|
||||||
|
<h1 class="zone-name-title h1">
|
||||||
|
<img class="heading-favicon" src="Just%20a%20moment2_files/favicon.ico"
|
||||||
|
onerror="this.onerror=null;this.parentNode.removeChild(this)">
|
||||||
|
0MAGNET.COM
|
||||||
|
</h1>
|
||||||
|
<h2 class="h2" id="cf-challenge-running">
|
||||||
|
Checking if the site connection is secure
|
||||||
|
</h2>
|
||||||
|
<div id="cf-challenge-stage" style="display: block;">
|
||||||
|
<div id="cf-norobot-container" style="display: flex;"><input type="button" value="Verify you are human"
|
||||||
|
class="big-button pow-button" style="cursor: pointer;"></div>
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-spinner" class="spacer loading-spinner" style="display: none; visibility: hidden;">
|
||||||
|
<div class="lds-ring">
|
||||||
|
<div></div>
|
||||||
|
<div></div>
|
||||||
|
<div></div>
|
||||||
|
<div></div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<noscript>
|
||||||
|
<div id="cf-challenge-error-title">
|
||||||
|
<div class="h2">
|
||||||
|
<span class="icon-wrapper">
|
||||||
|
<div class="heading-icon warning-icon"></div>
|
||||||
|
</span>
|
||||||
|
<span id="cf-challenge-error-text">
|
||||||
|
Enable JavaScript and cookies to continue
|
||||||
|
</span>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</noscript>
|
||||||
|
<div
|
||||||
|
style="display:none;background-image:url('/cdn-cgi/images/trace/captcha/nojs/transparent.gif?ray=732fc1c74f757330')">
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-body-text" class="core-msg spacer">
|
||||||
|
0magnet.com needs to review the security of your connection before
|
||||||
|
proceeding.
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-fact-wrapper" style="display: block; visibility: visible;" class="fact spacer hidden">
|
||||||
|
<span class="fact-title">Did you know</span> <span id="cf-challenge-fact" class="body-text">botnets can
|
||||||
|
be used to shutdown popular websites?</span>
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-explainer-expandable" class="hidden expandable body-text spacer"
|
||||||
|
style="display: block; visibility: visible;">
|
||||||
|
<div class="expandable-title" id="cf-challenge-explainer-summary"><button class="expandable-summary-btn"
|
||||||
|
id="cf-challenge-explainer-btn" type="button"> Why am I seeing this page? <span
|
||||||
|
class="caret-icon-wrapper">
|
||||||
|
<div class="caret-icon"></div>
|
||||||
|
</span> </button> </div>
|
||||||
|
<div class="expandable-details" id="cf-challenge-explainer-details">
|
||||||
|
Requests from malicious bots can pose as legitimate traffic.
|
||||||
|
Occasionally, you may see this page while the site ensures that the
|
||||||
|
connection is secure.</div>
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-success" style="display: none;">
|
||||||
|
<div class="h2"><span class="icon-wrapper"><img class="heading-icon" alt="Success icon"
|
||||||
|
src="data:image/png;base64,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"></span>Connection
|
||||||
|
is secure</div>
|
||||||
|
<div class="core-msg spacer">Proceeding...</div>
|
||||||
|
</div>
|
||||||
|
<form id="challenge-form"
|
||||||
|
action="/search?q=2022&__cf_chl_f_tk=6E3KpS5eCzuCMJG64ch2shvOMHdwQ8ioliqACpoQqM8-1659201542-0-gaNycGzNCeU"
|
||||||
|
method="POST" enctype="application/x-www-form-urlencoded">
|
||||||
|
<input type="hidden" name="md"
|
||||||
|
value="UPeuijc1TS5ZQ21GIY6wjg6HHN_jWKH9sqolcSJABwg-1659201542-0-AR_ZxgiwVB4GwEgAjllIrmnGAumHNwuvfpFBddySYLh6CWexrUnxVYlX_wlB19Yndm45fs-KngMxbYB4dEOuf4MOJ_yL_BsNG3_cIPybV0bNn9WQXecJg3FfFrIBuMFIappZOX4hdDjLtRo9f4JsVsU6FzD9sUoKJRd4BTkjTAm25yFbqmPgV15XZhnJ5HRux044u0IIOVZCwTTzgRLCqToVb-OfiuUcHBzt4W7_wNlF1ObUi2oEr00DA1zZvzzY2KnXdZVN8m2OaNY_f2zkk9uDlLQRob_Ti6MHPNDr4eRkyMqZMZ1XDCxe-9lBkcEfpqtg6_4yac9ZiIEoNdJnJVE6cuNzb59DcBooXAq3IWp6fK4y4UIBStjqOXk4bxQb5yt1COfdPuQ9iLE_7yYOPG_t7n5I-4mjwvG7_U337A17oeEemXHfJkGC88Vm3SQdEHiW96VJuOA_X-rb7p3iOMlLYB5DKJ5DaBoPnP86uAWhoHWE6nrVzeAxeQ1y0uBHYPioJba5Kn9d-e2HsTMuAi7ZgSKuk90ApclIiW3owI4bLc4wxO5cu3ZIz7sZfbdvIKDhf9ESZhpQrITU_4Hgqjz0s3lt-MVeNP_0bz31XSeA--pdiulzUpQWLx1jhC4s7Av6STUb9bmbHpE41283KbbpuzBbmHN1UczNiaaquYZiEXRHKYyEMhKD782nWTJwQA">
|
||||||
|
<input type="hidden" name="r"
|
||||||
|
value="i1ShtnCs9Zs8QexeFnp6EFtrWs3WbGEVQGXbVfYwpRI-1659201542-0-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">
|
||||||
|
|
||||||
|
<span style="display: none;"><span style="display: none;" class="text-gray-600"
|
||||||
|
data-translate="error">error code: 1020</span></span>
|
||||||
|
</form>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<script>
|
||||||
|
(function () {
|
||||||
|
var trkjs = document.createElement('img');
|
||||||
|
trkjs.setAttribute('src', '/cdn-cgi/images/trace/captcha/js/transparent.gif?ray=732fc1c74f757330');
|
||||||
|
trkjs.setAttribute('style', 'display: none');
|
||||||
|
document.body.appendChild(trkjs);
|
||||||
|
var cpo = document.createElement('script');
|
||||||
|
cpo.src = '/cdn-cgi/challenge-platform/h/g/orchestrate/managed/v1?ray=732fc1c74f757330';
|
||||||
|
window._cf_chl_opt.cOgUHash = location.hash === '' && location.href.indexOf('#') !== -1 ? '#' : location.hash;
|
||||||
|
window._cf_chl_opt.cOgUQuery = location.search === '' && location.href.slice(0, -window._cf_chl_opt.cOgUHash.length).indexOf('?') !== -1 ? '?' : location.search;
|
||||||
|
if (window.history && window.history.replaceState) {
|
||||||
|
var ogU = location.pathname + window._cf_chl_opt.cOgUQuery + window._cf_chl_opt.cOgUHash;
|
||||||
|
history.replaceState(null, null, "\/search?q=2022&__cf_chl_rt_tk=6E3KpS5eCzuCMJG64ch2shvOMHdwQ8ioliqACpoQqM8-1659201542-0-gaNycGzNCeU" + window._cf_chl_opt.cOgUHash);
|
||||||
|
cpo.onload = function () {
|
||||||
|
history.replaceState(null, null, ogU);
|
||||||
|
};
|
||||||
|
}
|
||||||
|
document.getElementsByTagName('head')[0].appendChild(cpo);
|
||||||
|
}());
|
||||||
|
</script><img src="Just%20a%20moment2_files/transparent.gif" style="display: none">
|
||||||
|
|
||||||
|
<div class="footer" role="contentinfo">
|
||||||
|
<div class="footer-inner">
|
||||||
|
<div class="clearfix diagnostic-wrapper">
|
||||||
|
<div class="ray-id">Ray ID: <code>732fc1c74f757330</code></div>
|
||||||
|
</div>
|
||||||
|
<div class="text-center">
|
||||||
|
Performance & security by
|
||||||
|
<a rel="noopener noreferrer" href="https://www.cloudflare.com/" target="_blank">Cloudflare</a>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
|
||||||
|
</body>
|
||||||
|
|
||||||
|
</html>
|
||||||
120
html_samples/cloudflare_init_v1.html
Normal file
120
html_samples/cloudflare_init_v1.html
Normal file
@@ -0,0 +1,120 @@
|
|||||||
|
<!DOCTYPE html>
|
||||||
|
<html lang="en-US">
|
||||||
|
|
||||||
|
<head>
|
||||||
|
<title>Just a moment...</title>
|
||||||
|
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
|
||||||
|
<meta http-equiv="X-UA-Compatible" content="IE=Edge" />
|
||||||
|
<meta name="robots" content="noindex,nofollow" />
|
||||||
|
<meta name="viewport" content="width=device-width,initial-scale=1" />
|
||||||
|
<link href="/cdn-cgi/styles/cf-errors.css" rel="stylesheet" />
|
||||||
|
|
||||||
|
<script>
|
||||||
|
(function () {
|
||||||
|
window._cf_chl_opt = {
|
||||||
|
cvId: '2',
|
||||||
|
cType: 'managed',
|
||||||
|
cNounce: '46449',
|
||||||
|
cRay: '732fd3bc9c1d72de',
|
||||||
|
cHash: '8838fcad2a7f56c',
|
||||||
|
cUPMDTk: "\/search?q=2022&__cf_chl_tk=y4XnN88eYeUiXmFkQeqEipve1VuK0jJA.G4Hz6xztsM-1659202277-0-gaNycGzNBz0",
|
||||||
|
cFPWv: 'g',
|
||||||
|
cTTimeMs: '1000',
|
||||||
|
cTplV: 2,
|
||||||
|
cRq: {
|
||||||
|
ru: 'aHR0cHM6Ly8wbWFnbmV0LmNvbS9zZWFyY2g/cT0yMDIy',
|
||||||
|
ra: 'Y3VybC83Ljg0LjA=',
|
||||||
|
rm: 'R0VU',
|
||||||
|
d: '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',
|
||||||
|
t: 'MTY1OTIwMjI3Ny44NjMwMDA=',
|
||||||
|
m: 'zvAOPvfoONkW1BzH+jMnKOPtDpPpZijRP52DVDWH+i8=',
|
||||||
|
i1: 'dDlQDNhOEuHzFEPo/etoAA==',
|
||||||
|
i2: '+LTK9hchBRjTTQk1WQU1Vw==',
|
||||||
|
zh: 'qP4bnGc6j96JlnjNSE7HmQci3S9L50bHFtm4bQRjjKU=',
|
||||||
|
uh: 'IdIU2i4FhVxxcYhzSFWdjoBuQm7qnyVK65JGofJuWV4=',
|
||||||
|
hh: 'azXzJl8Ou22g0nN/9idVUoB9EqZ7fLmkSdDRHM3Lkmw=',
|
||||||
|
}
|
||||||
|
}
|
||||||
|
window._cf_chl_enter = function () { window._cf_chl_opt.p = 1 };
|
||||||
|
})();
|
||||||
|
</script>
|
||||||
|
|
||||||
|
</head>
|
||||||
|
|
||||||
|
<body class="no-js">
|
||||||
|
|
||||||
|
<div class="main-wrapper" role="main">
|
||||||
|
<div class="main-content">
|
||||||
|
<h1 class="zone-name-title h1">
|
||||||
|
<img class="heading-favicon" src="/favicon.ico"
|
||||||
|
onerror="this.onerror=null;this.parentNode.removeChild(this)" />
|
||||||
|
0MAGNET.COM
|
||||||
|
</h1>
|
||||||
|
<h2 class="h2" id="cf-challenge-running">
|
||||||
|
Checking if the site connection is secure
|
||||||
|
</h2>
|
||||||
|
<noscript>
|
||||||
|
<div id="cf-challenge-error-title">
|
||||||
|
<div class="h2">
|
||||||
|
<span class="icon-wrapper">
|
||||||
|
<div class="heading-icon warning-icon"></div>
|
||||||
|
</span>
|
||||||
|
<span id="cf-challenge-error-text">
|
||||||
|
Enable JavaScript and cookies to continue
|
||||||
|
</span>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</noscript>
|
||||||
|
<div
|
||||||
|
style="display:none;background-image:url('/cdn-cgi/images/trace/captcha/nojs/transparent.gif?ray=732fd3bc9c1d72de')">
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-body-text" class="core-msg spacer">
|
||||||
|
0magnet.com needs to review the security of your connection before
|
||||||
|
proceeding.
|
||||||
|
</div>
|
||||||
|
<form id="challenge-form"
|
||||||
|
action="/search?q=2022&__cf_chl_f_tk=y4XnN88eYeUiXmFkQeqEipve1VuK0jJA.G4Hz6xztsM-1659202277-0-gaNycGzNBz0"
|
||||||
|
method="POST" enctype="application/x-www-form-urlencoded">
|
||||||
|
<input type="hidden" name="md"
|
||||||
|
value="DpGhFnuVRfDhqsQNASrgdT4WiiJ8m6lqTIs03.l6RLc-1659202277-0-AfUEAk9DsJ4rmpVI_Al7-eogy2CmM3YgWe4-31iw0oG2CcDIbYvauEW2IvK9m27_gq1FvdH-UPaGHR0q6Q2haXlX4pgmQK5rlQUSEd5HquGdtWMasHWqL_Q_TZGdOKz30bE2FEk8wLHRErHJRJloDRj0tiG8MreT2La_GLvovNK1XbMXDxFZT2Cc-DThBvxbgbDffw3okYfdl1ECXhLw9G6L4o8xgLsz3QZQG3dNZNhm5n4mf55-BBsFDzDTEN1_1BgORVw3mtbsodedktcACsVBCRupyBpTev9MML1jHzk06ZT9dhcCP4zXvsMS4-gG212LFu79Cpl0MHifKvPk0DTJQja1ulaT4gVuIvmLPihPh1IYMGbEcdX4MFH0Wu_RL6UPINE6esf-oAx8-imKhKITB_R4974rpq9XJk65Kf9R6AJhu072CyOqW1YcmYMkUCqFjdZnRyNgHRT2Q5bMEJ8fv0DwfFV6ynG7n6JGMd_pEnZp0nEvjWXpK6Ft8ZZGOXtFMfmW4vNgFhs6xJ1wnaJWuLXae3V6gTZYxMkeIsyMzlvRSzYBz_rgRBNkvvAwbNvOZ369tKbaElS39hOI1WTaoOsnY2d0Z4mDe4AVbSs3fVJGikzZSa3Ctr1RnqqOztVIRYL1Q7IYRJ02P6egL7sn7RniJ6znNAoPhaWJLYzynWXeQF5YO5U0Zf779qkm3A" />
|
||||||
|
<input type="hidden" name="r"
|
||||||
|
value="QJznOl.RWpNvkdG1Pf6TAzaNhRIFpH8DJ0w1yAuwRLw-1659202277-0-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" />
|
||||||
|
|
||||||
|
</form>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<script>
|
||||||
|
(function () {
|
||||||
|
var trkjs = document.createElement('img');
|
||||||
|
trkjs.setAttribute('src', '/cdn-cgi/images/trace/captcha/js/transparent.gif?ray=732fd3bc9c1d72de');
|
||||||
|
trkjs.setAttribute('style', 'display: none');
|
||||||
|
document.body.appendChild(trkjs);
|
||||||
|
var cpo = document.createElement('script');
|
||||||
|
cpo.src = '/cdn-cgi/challenge-platform/h/g/orchestrate/managed/v1?ray=732fd3bc9c1d72de';
|
||||||
|
window._cf_chl_opt.cOgUHash = location.hash === '' && location.href.indexOf('#') !== -1 ? '#' : location.hash;
|
||||||
|
window._cf_chl_opt.cOgUQuery = location.search === '' && location.href.slice(0, -window._cf_chl_opt.cOgUHash.length).indexOf('?') !== -1 ? '?' : location.search;
|
||||||
|
if (window.history && window.history.replaceState) {
|
||||||
|
var ogU = location.pathname + window._cf_chl_opt.cOgUQuery + window._cf_chl_opt.cOgUHash;
|
||||||
|
history.replaceState(null, null, "\/search?q=2022&__cf_chl_rt_tk=y4XnN88eYeUiXmFkQeqEipve1VuK0jJA.G4Hz6xztsM-1659202277-0-gaNycGzNBz0" + window._cf_chl_opt.cOgUHash);
|
||||||
|
cpo.onload = function () {
|
||||||
|
history.replaceState(null, null, ogU);
|
||||||
|
};
|
||||||
|
}
|
||||||
|
document.getElementsByTagName('head')[0].appendChild(cpo);
|
||||||
|
}());
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<div class="footer" role="contentinfo">
|
||||||
|
<div class="footer-inner">
|
||||||
|
<div class="clearfix diagnostic-wrapper">
|
||||||
|
<div class="ray-id">Ray ID: <code>732fd3bc9c1d72de</code></div>
|
||||||
|
</div>
|
||||||
|
<div class="text-center">
|
||||||
|
Performance & security by
|
||||||
|
<a rel="noopener noreferrer" href="https://www.cloudflare.com" target="_blank">Cloudflare</a>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</body>
|
||||||
|
|
||||||
|
</html>
|
||||||
167
html_samples/cloudflare_spinner_v1.html
Normal file
167
html_samples/cloudflare_spinner_v1.html
Normal file
@@ -0,0 +1,167 @@
|
|||||||
|
<html lang="en-US">
|
||||||
|
|
||||||
|
<head>
|
||||||
|
<title>Just a moment...</title>
|
||||||
|
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
|
||||||
|
<meta http-equiv="X-UA-Compatible" content="IE=Edge">
|
||||||
|
<meta name="robots" content="noindex,nofollow">
|
||||||
|
<meta name="viewport" content="width=device-width,initial-scale=1">
|
||||||
|
<link href="/cdn-cgi/styles/cf-errors.css" rel="stylesheet">
|
||||||
|
|
||||||
|
<script>
|
||||||
|
(function () {
|
||||||
|
window._cf_chl_opt = {
|
||||||
|
cvId: '2',
|
||||||
|
cType: 'managed',
|
||||||
|
cNounce: '52875',
|
||||||
|
cRay: '732fa2449b567521',
|
||||||
|
cHash: '79cce74ebb92671',
|
||||||
|
cUPMDTk: "\/search?q=2022&__cf_chl_tk=1qWQAgl8.irfEoDb73Rb0pUm1SXbis3ZamDAIoTcPks-1659200251-0-gaNycGzNCFE",
|
||||||
|
cFPWv: 'g',
|
||||||
|
cTTimeMs: '1000',
|
||||||
|
cTplV: 2,
|
||||||
|
cRq: {
|
||||||
|
ru: 'aHR0cHM6Ly8wbWFnbmV0LmNvbS9zZWFyY2g/cT0yMDIy',
|
||||||
|
ra: 'TW96aWxsYS81LjAgKFgxMTsgTGludXggeDg2XzY0KSBBcHBsZVdlYktpdC81MzcuMzYgKEtIVE1MLCBsaWtlIEdlY2tvKSBDaHJvbWUvMTAzLjAuNTA2MC4xMzQgU2FmYXJpLzUzNy4zNg==',
|
||||||
|
rm: 'R0VU',
|
||||||
|
d: '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',
|
||||||
|
t: 'MTY1OTIwMDI1MS42MjAwMDA=',
|
||||||
|
m: '/e8nTBb03IHZzN/DSkoHPRu0Ndm3ynYs8g6ZC+VxHcc=',
|
||||||
|
i1: 'tx+ntPfeE2Gv81s52vIOlA==',
|
||||||
|
i2: 'fpw8a/EO+Fo2t/ZiNKxEcg==',
|
||||||
|
zh: 'qP4bnGc6j96JlnjNSE7HmQci3S9L50bHFtm4bQRjjKU=',
|
||||||
|
uh: 'Eex9UQDjphKtV6LyVQ95F/MC5kBA3Rj4lC6CudiU3Vs=',
|
||||||
|
hh: 'azXzJl8Ou22g0nN/9idVUoB9EqZ7fLmkSdDRHM3Lkmw=',
|
||||||
|
}
|
||||||
|
}
|
||||||
|
window._cf_chl_enter = function () { window._cf_chl_opt.p = 1 };
|
||||||
|
})();
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<script src="/cdn-cgi/challenge-platform/h/g/orchestrate/managed/v1?ray=732fa2449b567521"></script>
|
||||||
|
<script type="text/javascript"
|
||||||
|
src="https://cloudflare.hcaptcha.com/1/api.js?endpoint=https%3A%2F%2Fcloudflare.hcaptcha.com&assethost=https%3A%2F%2Fcf-assets.hcaptcha.com&imghost=https%3A%2F%2Fcf-imgs.hcaptcha.com&render=explicit&recaptchacompat=off&onload=_cf_chl_hload"></script>
|
||||||
|
</head>
|
||||||
|
|
||||||
|
<body class="no-js">
|
||||||
|
|
||||||
|
<div class="privacy-pass">
|
||||||
|
<a rel="noopener noreferrer"
|
||||||
|
href="https://chrome.google.com/webstore/detail/privacy-pass/ajhmfdgkijocedmfjonnpjfojldioehi"
|
||||||
|
target="_blank">
|
||||||
|
Privacy Pass
|
||||||
|
<span class="privacy-pass-icon-wrapper">
|
||||||
|
<div class="privacy-pass-icon"></div>
|
||||||
|
</span>
|
||||||
|
</a>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div class="main-wrapper" role="main">
|
||||||
|
<div class="main-content">
|
||||||
|
<h1 class="zone-name-title h1">
|
||||||
|
<img class="heading-favicon" src="/favicon.ico"
|
||||||
|
onerror="this.onerror=null;this.parentNode.removeChild(this)">
|
||||||
|
0MAGNET.COM
|
||||||
|
</h1>
|
||||||
|
<h2 class="h2" id="cf-challenge-running">
|
||||||
|
Checking if the site connection is secure
|
||||||
|
</h2>
|
||||||
|
<div id="cf-challenge-stage" style="display: none;"></div>
|
||||||
|
<div id="cf-challenge-spinner" class="spacer loading-spinner" style="display: block; visibility: visible;">
|
||||||
|
<div class="lds-ring">
|
||||||
|
<div></div>
|
||||||
|
<div></div>
|
||||||
|
<div></div>
|
||||||
|
<div></div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<noscript>
|
||||||
|
<div id="cf-challenge-error-title">
|
||||||
|
<div class="h2">
|
||||||
|
<span class="icon-wrapper">
|
||||||
|
<div class="heading-icon warning-icon"></div>
|
||||||
|
</span>
|
||||||
|
<span id="cf-challenge-error-text">
|
||||||
|
Enable JavaScript and cookies to continue
|
||||||
|
</span>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</noscript>
|
||||||
|
<div
|
||||||
|
style="display:none;background-image:url('/cdn-cgi/images/trace/captcha/nojs/transparent.gif?ray=732fa2449b567521')">
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-body-text" class="core-msg spacer">
|
||||||
|
0magnet.com needs to review the security of your connection before
|
||||||
|
proceeding.
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-fact-wrapper" class="fact spacer hidden" style="display: block; visibility: visible;">
|
||||||
|
<span class="fact-title">Did you know</span> <span id="cf-challenge-fact" class="body-text">bots
|
||||||
|
historically made up nearly 40% of all internet traffic?</span>
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-explainer-expandable" class="hidden expandable body-text spacer"
|
||||||
|
style="display: none;">
|
||||||
|
<div class="expandable-title" id="cf-challenge-explainer-summary"><button class="expandable-summary-btn"
|
||||||
|
id="cf-challenge-explainer-btn" type="button"> Why am I seeing this page? <span
|
||||||
|
class="caret-icon-wrapper">
|
||||||
|
<div class="caret-icon"></div>
|
||||||
|
</span> </button> </div>
|
||||||
|
<div class="expandable-details" id="cf-challenge-explainer-details"> Requests from malicious bots can
|
||||||
|
pose as legitimate traffic. Occasionally, you may see this page while the site ensures that the
|
||||||
|
connection is secure.</div>
|
||||||
|
</div>
|
||||||
|
<div id="cf-challenge-success" style="display: none;">
|
||||||
|
<div class="h2"><span class="icon-wrapper"><img class="heading-icon" alt="Success icon"
|
||||||
|
src="data:image/png;base64,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"></span>Connection
|
||||||
|
is secure</div>
|
||||||
|
<div class="core-msg spacer">Proceeding...</div>
|
||||||
|
</div>
|
||||||
|
<form id="challenge-form"
|
||||||
|
action="/search?q=2022&__cf_chl_f_tk=1qWQAgl8.irfEoDb73Rb0pUm1SXbis3ZamDAIoTcPks-1659200251-0-gaNycGzNCFE"
|
||||||
|
method="POST" enctype="application/x-www-form-urlencoded">
|
||||||
|
<input type="hidden" name="md"
|
||||||
|
value="OghUU_ltYW6I0fpWl7rE4yHBGBPHfpZQIKZRSEpJKjE-1659200251-0-AWB-KR-MabhObmvYa3mR5-xDk3qZVV73547wjnl-QtfPoTxe017AXt4WUskEcVzEIUKC7dsJoiy8ec1NA0fxdnI8X9OfPhtynl00ReWBVZc_3Gba_wigWMmM_9e8PX9vpVDcXpCRbz1BJ5_YLsba9TJM1sp14U9RtIce-tRBB53qoxLxJRz9QFmckEVBvsba4RfoycOvYPMMsfAqSkq13qtsA3Kd6RDB5Rb5-qF8674DsB4AMvd9xu_fBplQqKjOpEtrThCUtw8M2DHY8FUr_owUo1NIS1s6fSBEyHh6ehz9CidJ7zpRwYZFwgz_Pq9i8LmQG_AajozOJJhLp-tox0dptbUZnRNGt3hGQgrNu3jlCfwPC2XVp7xgLvmZoPYrzzrZoi_wErnIvVgyGCw9-sDPblPdvLBUz6uXNreWwThEW6PeRtMXnePO9UwcZmj_2awhwcVSHSLz1t1z22LtVsQ8xNpMbiE7xDvI2D5LNHAPIUC7Wp4AcehWD-fEm0w5jnVTWOmFlVRxtcnYZSMfDSaRUxsZ3hg5B1-ghVMEX6M-r_hAd6pLKNmjIfdl_Nvdm6veQvV-gTFaULbfuhmQQjYEb9G2IptDiNTZs5S7FtmjqVBAA7PmvwBTQwxw86J0cV3v_4pT1Oj8tigwiPny35HMTrKRmRZWaAZudCmWxDZkJIW8Eir7KQ57ba-u9cHh0A">
|
||||||
|
<input type="hidden" name="r"
|
||||||
|
value="q.UUtPBFcFi4IkcVw3l4U_xJJKDIbHJj7xmuB43IIAI-1659200251-0-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">
|
||||||
|
|
||||||
|
<span style="display: none;"><span class="text-gray-600" data-translate="error">error code:
|
||||||
|
1020</span></span>
|
||||||
|
</form>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<script>
|
||||||
|
(function () {
|
||||||
|
var trkjs = document.createElement('img');
|
||||||
|
trkjs.setAttribute('src', '/cdn-cgi/images/trace/captcha/js/transparent.gif?ray=732fa2449b567521');
|
||||||
|
trkjs.setAttribute('style', 'display: none');
|
||||||
|
document.body.appendChild(trkjs);
|
||||||
|
var cpo = document.createElement('script');
|
||||||
|
cpo.src = '/cdn-cgi/challenge-platform/h/g/orchestrate/managed/v1?ray=732fa2449b567521';
|
||||||
|
window._cf_chl_opt.cOgUHash = location.hash === '' && location.href.indexOf('#') !== -1 ? '#' : location.hash;
|
||||||
|
window._cf_chl_opt.cOgUQuery = location.search === '' && location.href.slice(0, -window._cf_chl_opt.cOgUHash.length).indexOf('?') !== -1 ? '?' : location.search;
|
||||||
|
if (window.history && window.history.replaceState) {
|
||||||
|
var ogU = location.pathname + window._cf_chl_opt.cOgUQuery + window._cf_chl_opt.cOgUHash;
|
||||||
|
history.replaceState(null, null, "\/search?q=2022&__cf_chl_rt_tk=1qWQAgl8.irfEoDb73Rb0pUm1SXbis3ZamDAIoTcPks-1659200251-0-gaNycGzNCFE" + window._cf_chl_opt.cOgUHash);
|
||||||
|
cpo.onload = function () {
|
||||||
|
history.replaceState(null, null, ogU);
|
||||||
|
};
|
||||||
|
}
|
||||||
|
document.getElementsByTagName('head')[0].appendChild(cpo);
|
||||||
|
}());
|
||||||
|
</script><img src="/cdn-cgi/images/trace/captcha/js/transparent.gif?ray=732fa2449b567521" style="display: none">
|
||||||
|
|
||||||
|
<div class="footer" role="contentinfo">
|
||||||
|
<div class="footer-inner">
|
||||||
|
<div class="clearfix diagnostic-wrapper">
|
||||||
|
<div class="ray-id">Ray ID: <code>732fa2449b567521</code></div>
|
||||||
|
</div>
|
||||||
|
<div class="text-center">
|
||||||
|
Performance & security by
|
||||||
|
<a rel="noopener noreferrer" href="https://www.cloudflare.com" target="_blank">Cloudflare</a>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
|
||||||
|
</body>
|
||||||
|
|
||||||
|
</html>
|
||||||
9344
package-lock.json
generated
9344
package-lock.json
generated
File diff suppressed because it is too large
Load Diff
60
package.json
60
package.json
@@ -1,59 +1,7 @@
|
|||||||
{
|
{
|
||||||
"name": "flaresolverr",
|
"name": "flaresolverr",
|
||||||
"version": "1.2.6",
|
"version": "3.3.16",
|
||||||
"description": "Proxy server to bypass Cloudflare protection.",
|
"description": "Proxy server to bypass Cloudflare protection",
|
||||||
"scripts": {
|
"author": "Diego Heras (ngosang / ngosang@hotmail.es)",
|
||||||
"start": "node ./dist/index.js",
|
"license": "MIT"
|
||||||
"build": "tsc",
|
|
||||||
"dev": "nodemon -e ts --exec ts-node src/index.ts",
|
|
||||||
"package": "node build-binaries.js"
|
|
||||||
},
|
|
||||||
"author": "Diego Heras (ngosang)",
|
|
||||||
"contributors": [
|
|
||||||
{
|
|
||||||
"name": "Noah Cardoza",
|
|
||||||
"url": "https://github.com/NoahCardoza/CloudProxy.git"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"license": "MIT",
|
|
||||||
"repository": {
|
|
||||||
"type": "git",
|
|
||||||
"url": "https://github.com/ngosang/FlareSolverr"
|
|
||||||
},
|
|
||||||
"pkg": {
|
|
||||||
"assets": [
|
|
||||||
"node_modules/puppeteer-extra-plugin-stealth/**/*.*"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"bin": {
|
|
||||||
"flaresolverr": "dist/index.js"
|
|
||||||
},
|
|
||||||
"dependencies": {
|
|
||||||
"await-timeout": "^1.1.1",
|
|
||||||
"console-log-level": "^1.4.1",
|
|
||||||
"got": "^11.5.1",
|
|
||||||
"hcaptcha-solver": "^1.0.2",
|
|
||||||
"puppeteer": "^3.3.0",
|
|
||||||
"puppeteer-extra": "^3.1.15",
|
|
||||||
"puppeteer-extra-plugin-stealth": "^2.6.5",
|
|
||||||
"uuid": "^8.2.0"
|
|
||||||
},
|
|
||||||
"devDependencies": {
|
|
||||||
"@types/await-timeout": "^0.3.1",
|
|
||||||
"@types/node": "^14.0.23",
|
|
||||||
"@types/puppeteer": "^3.0.1",
|
|
||||||
"@types/uuid": "^8.0.0",
|
|
||||||
"archiver": "^5.2.0",
|
|
||||||
"eslint": "^7.5.0",
|
|
||||||
"eslint-config-airbnb-base": "^14.2.0",
|
|
||||||
"eslint-config-standard": "^14.1.1",
|
|
||||||
"eslint-plugin-import": "^2.22.0",
|
|
||||||
"eslint-plugin-node": "^11.1.0",
|
|
||||||
"eslint-plugin-promise": "^4.2.1",
|
|
||||||
"eslint-plugin-standard": "^4.0.1",
|
|
||||||
"nodemon": "^2.0.4",
|
|
||||||
"pkg": "^4.4.9",
|
|
||||||
"ts-node": "^8.10.2",
|
|
||||||
"typescript": "^3.9.7"
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|||||||
13
requirements.txt
Normal file
13
requirements.txt
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
bottle==0.12.25
|
||||||
|
waitress==2.1.2
|
||||||
|
selenium==4.15.2
|
||||||
|
func-timeout==4.3.5
|
||||||
|
prometheus-client==0.17.1
|
||||||
|
# required by undetected_chromedriver
|
||||||
|
requests==2.31.0
|
||||||
|
certifi==2023.7.22
|
||||||
|
websockets==11.0.3
|
||||||
|
# only required for linux and macos
|
||||||
|
xvfbwrapper==0.2.9; platform_system != "Windows"
|
||||||
|
# only required for windows
|
||||||
|
pefile==2023.2.7; platform_system == "Windows"
|
||||||
BIN
resources/flaresolverr_logo.ico
Normal file
BIN
resources/flaresolverr_logo.ico
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 8.8 KiB |
0
src/bottle_plugins/__init__.py
Normal file
0
src/bottle_plugins/__init__.py
Normal file
22
src/bottle_plugins/error_plugin.py
Normal file
22
src/bottle_plugins/error_plugin.py
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
from bottle import response
|
||||||
|
import logging
|
||||||
|
|
||||||
|
|
||||||
|
def error_plugin(callback):
|
||||||
|
"""
|
||||||
|
Bottle plugin to handle exceptions
|
||||||
|
https://stackoverflow.com/a/32764250
|
||||||
|
"""
|
||||||
|
|
||||||
|
def wrapper(*args, **kwargs):
|
||||||
|
try:
|
||||||
|
actual_response = callback(*args, **kwargs)
|
||||||
|
except Exception as e:
|
||||||
|
logging.error(str(e))
|
||||||
|
actual_response = {
|
||||||
|
"error": str(e)
|
||||||
|
}
|
||||||
|
response.status = 500
|
||||||
|
return actual_response
|
||||||
|
|
||||||
|
return wrapper
|
||||||
23
src/bottle_plugins/logger_plugin.py
Normal file
23
src/bottle_plugins/logger_plugin.py
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
from bottle import request, response
|
||||||
|
import logging
|
||||||
|
|
||||||
|
|
||||||
|
def logger_plugin(callback):
|
||||||
|
"""
|
||||||
|
Bottle plugin to use logging module
|
||||||
|
http://bottlepy.org/docs/dev/plugindev.html
|
||||||
|
|
||||||
|
Wrap a Bottle request so that a log line is emitted after it's handled.
|
||||||
|
(This decorator can be extended to take the desired logger as a param.)
|
||||||
|
"""
|
||||||
|
|
||||||
|
def wrapper(*args, **kwargs):
|
||||||
|
actual_response = callback(*args, **kwargs)
|
||||||
|
if not request.url.endswith("/health"):
|
||||||
|
logging.info('%s %s %s %s' % (request.remote_addr,
|
||||||
|
request.method,
|
||||||
|
request.url,
|
||||||
|
response.status))
|
||||||
|
return actual_response
|
||||||
|
|
||||||
|
return wrapper
|
||||||
66
src/bottle_plugins/prometheus_plugin.py
Normal file
66
src/bottle_plugins/prometheus_plugin.py
Normal file
@@ -0,0 +1,66 @@
|
|||||||
|
import logging
|
||||||
|
import os
|
||||||
|
import urllib.parse
|
||||||
|
|
||||||
|
from bottle import request
|
||||||
|
from dtos import V1RequestBase, V1ResponseBase
|
||||||
|
from metrics import start_metrics_http_server, REQUEST_COUNTER, REQUEST_DURATION
|
||||||
|
|
||||||
|
PROMETHEUS_ENABLED = os.environ.get('PROMETHEUS_ENABLED', 'false').lower() == 'true'
|
||||||
|
PROMETHEUS_PORT = int(os.environ.get('PROMETHEUS_PORT', 8192))
|
||||||
|
|
||||||
|
|
||||||
|
def setup():
|
||||||
|
if PROMETHEUS_ENABLED:
|
||||||
|
start_metrics_http_server(PROMETHEUS_PORT)
|
||||||
|
|
||||||
|
|
||||||
|
def prometheus_plugin(callback):
|
||||||
|
"""
|
||||||
|
Bottle plugin to expose Prometheus metrics
|
||||||
|
http://bottlepy.org/docs/dev/plugindev.html
|
||||||
|
"""
|
||||||
|
def wrapper(*args, **kwargs):
|
||||||
|
actual_response = callback(*args, **kwargs)
|
||||||
|
|
||||||
|
if PROMETHEUS_ENABLED:
|
||||||
|
try:
|
||||||
|
export_metrics(actual_response)
|
||||||
|
except Exception as e:
|
||||||
|
logging.warning("Error exporting metrics: " + str(e))
|
||||||
|
|
||||||
|
return actual_response
|
||||||
|
|
||||||
|
def export_metrics(actual_response):
|
||||||
|
res = V1ResponseBase(actual_response)
|
||||||
|
|
||||||
|
if res.startTimestamp is None or res.endTimestamp is None:
|
||||||
|
# skip management and healthcheck endpoints
|
||||||
|
return
|
||||||
|
|
||||||
|
domain = "unknown"
|
||||||
|
if res.solution and res.solution.url:
|
||||||
|
domain = parse_domain_url(res.solution.url)
|
||||||
|
else:
|
||||||
|
# timeout error
|
||||||
|
req = V1RequestBase(request.json)
|
||||||
|
if req.url:
|
||||||
|
domain = parse_domain_url(req.url)
|
||||||
|
|
||||||
|
run_time = (res.endTimestamp - res.startTimestamp) / 1000
|
||||||
|
REQUEST_DURATION.labels(domain=domain).observe(run_time)
|
||||||
|
|
||||||
|
result = "unknown"
|
||||||
|
if res.message == "Challenge solved!":
|
||||||
|
result = "solved"
|
||||||
|
elif res.message == "Challenge not detected!":
|
||||||
|
result = "not_detected"
|
||||||
|
elif res.message.startswith("Error"):
|
||||||
|
result = "error"
|
||||||
|
REQUEST_COUNTER.labels(domain=domain, result=result).inc()
|
||||||
|
|
||||||
|
def parse_domain_url(url):
|
||||||
|
parsed_url = urllib.parse.urlparse(url)
|
||||||
|
return parsed_url.hostname
|
||||||
|
|
||||||
|
return wrapper
|
||||||
110
src/build_package.py
Normal file
110
src/build_package.py
Normal file
@@ -0,0 +1,110 @@
|
|||||||
|
import os
|
||||||
|
import platform
|
||||||
|
import shutil
|
||||||
|
import subprocess
|
||||||
|
import sys
|
||||||
|
import zipfile
|
||||||
|
|
||||||
|
import requests
|
||||||
|
|
||||||
|
|
||||||
|
def clean_files():
|
||||||
|
try:
|
||||||
|
shutil.rmtree(os.path.join(os.path.dirname(os.path.abspath(__file__)), os.pardir, 'build'))
|
||||||
|
except Exception:
|
||||||
|
pass
|
||||||
|
try:
|
||||||
|
shutil.rmtree(os.path.join(os.path.dirname(os.path.abspath(__file__)), os.pardir, 'dist'))
|
||||||
|
except Exception:
|
||||||
|
pass
|
||||||
|
try:
|
||||||
|
shutil.rmtree(os.path.join(os.path.dirname(os.path.abspath(__file__)), os.pardir, 'dist_chrome'))
|
||||||
|
except Exception:
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
def download_chromium():
|
||||||
|
# https://commondatastorage.googleapis.com/chromium-browser-snapshots/index.html?prefix=Linux_x64/
|
||||||
|
revision = "1260008" if os.name == 'nt' else '1260015'
|
||||||
|
arch = 'Win_x64' if os.name == 'nt' else 'Linux_x64'
|
||||||
|
dl_file = 'chrome-win' if os.name == 'nt' else 'chrome-linux'
|
||||||
|
dl_path = os.path.join(os.path.dirname(os.path.abspath(__file__)), os.pardir, 'dist_chrome')
|
||||||
|
dl_path_folder = os.path.join(dl_path, dl_file)
|
||||||
|
dl_path_zip = dl_path_folder + '.zip'
|
||||||
|
|
||||||
|
# response = requests.get(
|
||||||
|
# f'https://commondatastorage.googleapis.com/chromium-browser-snapshots/{arch}/LAST_CHANGE',
|
||||||
|
# timeout=30)
|
||||||
|
# revision = response.text.strip()
|
||||||
|
print("Downloading revision: " + revision)
|
||||||
|
|
||||||
|
os.mkdir(dl_path)
|
||||||
|
with requests.get(
|
||||||
|
f'https://commondatastorage.googleapis.com/chromium-browser-snapshots/{arch}/{revision}/{dl_file}.zip',
|
||||||
|
stream=True) as r:
|
||||||
|
r.raise_for_status()
|
||||||
|
with open(dl_path_zip, 'wb') as f:
|
||||||
|
for chunk in r.iter_content(chunk_size=8192):
|
||||||
|
f.write(chunk)
|
||||||
|
print("File downloaded: " + dl_path_zip)
|
||||||
|
with zipfile.ZipFile(dl_path_zip, 'r') as zip_ref:
|
||||||
|
zip_ref.extractall(dl_path)
|
||||||
|
os.remove(dl_path_zip)
|
||||||
|
|
||||||
|
chrome_path = os.path.join(dl_path, "chrome")
|
||||||
|
shutil.move(dl_path_folder, chrome_path)
|
||||||
|
print("Extracted in: " + chrome_path)
|
||||||
|
|
||||||
|
if os.name != 'nt':
|
||||||
|
# Give executable permissions for *nix
|
||||||
|
# file * | grep executable | cut -d: -f1
|
||||||
|
print("Giving executable permissions...")
|
||||||
|
execs = ['chrome', 'chrome_crashpad_handler', 'chrome_sandbox', 'chrome-wrapper', 'xdg-mime', 'xdg-settings']
|
||||||
|
for exec_file in execs:
|
||||||
|
exec_path = os.path.join(chrome_path, exec_file)
|
||||||
|
os.chmod(exec_path, 0o755)
|
||||||
|
|
||||||
|
|
||||||
|
def run_pyinstaller():
|
||||||
|
sep = ';' if os.name == 'nt' else ':'
|
||||||
|
result = subprocess.run([sys.executable, "-m", "PyInstaller",
|
||||||
|
"--icon", "resources/flaresolverr_logo.ico",
|
||||||
|
"--add-data", f"package.json{sep}.",
|
||||||
|
"--add-data", f"{os.path.join('dist_chrome', 'chrome')}{sep}chrome",
|
||||||
|
os.path.join("src", "flaresolverr.py")],
|
||||||
|
cwd=os.pardir, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
||||||
|
if result.returncode != 0:
|
||||||
|
print(result.stderr.decode('utf-8'))
|
||||||
|
raise Exception("Error running pyInstaller")
|
||||||
|
|
||||||
|
|
||||||
|
def compress_package():
|
||||||
|
dist_folder = os.path.join(os.path.dirname(os.path.abspath(__file__)), os.pardir, 'dist')
|
||||||
|
package_folder = os.path.join(dist_folder, 'package')
|
||||||
|
shutil.move(os.path.join(dist_folder, 'flaresolverr'), os.path.join(package_folder, 'flaresolverr'))
|
||||||
|
print("Package folder: " + package_folder)
|
||||||
|
|
||||||
|
compr_format = 'zip' if os.name == 'nt' else 'gztar'
|
||||||
|
compr_file_name = 'flaresolverr_windows_x64' if os.name == 'nt' else 'flaresolverr_linux_x64'
|
||||||
|
compr_file_path = os.path.join(dist_folder, compr_file_name)
|
||||||
|
shutil.make_archive(compr_file_path, compr_format, package_folder)
|
||||||
|
print("Compressed file path: " + compr_file_path)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
print("Building package...")
|
||||||
|
print("Platform: " + platform.platform())
|
||||||
|
|
||||||
|
print("Cleaning previous build...")
|
||||||
|
clean_files()
|
||||||
|
|
||||||
|
print("Downloading Chromium...")
|
||||||
|
download_chromium()
|
||||||
|
|
||||||
|
print("Building pyinstaller executable... ")
|
||||||
|
run_pyinstaller()
|
||||||
|
|
||||||
|
print("Compressing package... ")
|
||||||
|
compress_package()
|
||||||
|
|
||||||
|
# NOTE: python -m pip install pyinstaller
|
||||||
@@ -1,31 +0,0 @@
|
|||||||
import got from 'got'
|
|
||||||
import { sleep } from '../utils'
|
|
||||||
|
|
||||||
/*
|
|
||||||
This method uses the captcha-harvester project:
|
|
||||||
https://github.com/NoahCardoza/CaptchaHarvester
|
|
||||||
|
|
||||||
While the function must take url/sitekey/type args,
|
|
||||||
they aren't used because the harvester server must
|
|
||||||
be preconfigured.
|
|
||||||
|
|
||||||
ENV:
|
|
||||||
HARVESTER_ENDPOINT: This must be the full path
|
|
||||||
to the /token endpoint of the harvester.
|
|
||||||
E.G. "https://127.0.0.1:5000/token"
|
|
||||||
*/
|
|
||||||
|
|
||||||
export default async function solve(): Promise<string> {
|
|
||||||
const endpoint = process.env.HARVESTER_ENDPOINT
|
|
||||||
if (!endpoint) { throw Error('ENV variable `HARVESTER_ENDPOINT` must be set.') }
|
|
||||||
while (true) {
|
|
||||||
try {
|
|
||||||
return (await got.get(process.env.HARVESTER_ENDPOINT, {
|
|
||||||
https: { rejectUnauthorized: false }
|
|
||||||
})).body
|
|
||||||
} catch (e) {
|
|
||||||
if (e.response.statusCode !== 418) { throw e }
|
|
||||||
}
|
|
||||||
await sleep(3000)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,25 +0,0 @@
|
|||||||
const solveCaptcha = require('hcaptcha-solver');
|
|
||||||
import { SolverOptions } from '.'
|
|
||||||
/*
|
|
||||||
This method uses the hcaptcha-solver project:
|
|
||||||
https://github.com/JimmyLaurent/hcaptcha-solver
|
|
||||||
|
|
||||||
TODO: allow user pass custom options to the solver.
|
|
||||||
|
|
||||||
ENV:
|
|
||||||
There are no other variables that must be set to get this to work
|
|
||||||
*/
|
|
||||||
|
|
||||||
export default async function solve({ url }: SolverOptions): Promise<string> {
|
|
||||||
throw new Error("hcaptcha-solver is not able to solve the new hCaptcha challenge. This issue is already reported #31.");
|
|
||||||
|
|
||||||
/*
|
|
||||||
try {
|
|
||||||
return await solveCaptcha(url)
|
|
||||||
} catch (e) {
|
|
||||||
console.error(e)
|
|
||||||
return null
|
|
||||||
}
|
|
||||||
*/
|
|
||||||
|
|
||||||
}
|
|
||||||
@@ -1,41 +0,0 @@
|
|||||||
import log from "../log";
|
|
||||||
|
|
||||||
export enum CaptchaType {
|
|
||||||
re = 'reCaptcha',
|
|
||||||
h = 'hCaptcha'
|
|
||||||
}
|
|
||||||
|
|
||||||
export interface SolverOptions {
|
|
||||||
url: string
|
|
||||||
sitekey: string
|
|
||||||
type: CaptchaType
|
|
||||||
}
|
|
||||||
|
|
||||||
export type Solver = (options: SolverOptions) => Promise<string>
|
|
||||||
|
|
||||||
const captchaSolvers: { [key: string]: Solver } = {}
|
|
||||||
|
|
||||||
export default (): Solver => {
|
|
||||||
const method = process.env.CAPTCHA_SOLVER
|
|
||||||
|
|
||||||
if (!method || method.toLowerCase() == 'none') {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!(method in captchaSolvers)) {
|
|
||||||
try {
|
|
||||||
captchaSolvers[method] = require('./' + method).default as Solver
|
|
||||||
} catch (e) {
|
|
||||||
if (e.code === 'MODULE_NOT_FOUND') {
|
|
||||||
throw Error(`The solver '${method}' is not a valid captcha solving method.`)
|
|
||||||
} else {
|
|
||||||
console.error(e)
|
|
||||||
throw Error(`An error occurred loading the solver '${method}'.`)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
log.info(`Using '${method}' to solve the captcha.`);
|
|
||||||
|
|
||||||
return captchaSolvers[method]
|
|
||||||
}
|
|
||||||
86
src/dtos.py
Normal file
86
src/dtos.py
Normal file
@@ -0,0 +1,86 @@
|
|||||||
|
|
||||||
|
STATUS_OK = "ok"
|
||||||
|
STATUS_ERROR = "error"
|
||||||
|
|
||||||
|
|
||||||
|
class ChallengeResolutionResultT:
|
||||||
|
url: str = None
|
||||||
|
status: int = None
|
||||||
|
headers: list = None
|
||||||
|
response: str = None
|
||||||
|
cookies: list = None
|
||||||
|
userAgent: str = None
|
||||||
|
|
||||||
|
def __init__(self, _dict):
|
||||||
|
self.__dict__.update(_dict)
|
||||||
|
|
||||||
|
|
||||||
|
class ChallengeResolutionT:
|
||||||
|
status: str = None
|
||||||
|
message: str = None
|
||||||
|
result: ChallengeResolutionResultT = None
|
||||||
|
|
||||||
|
def __init__(self, _dict):
|
||||||
|
self.__dict__.update(_dict)
|
||||||
|
if self.result is not None:
|
||||||
|
self.result = ChallengeResolutionResultT(self.result)
|
||||||
|
|
||||||
|
|
||||||
|
class V1RequestBase(object):
|
||||||
|
# V1RequestBase
|
||||||
|
cmd: str = None
|
||||||
|
cookies: list = None
|
||||||
|
maxTimeout: int = None
|
||||||
|
proxy: dict = None
|
||||||
|
session: str = None
|
||||||
|
session_ttl_minutes: int = None
|
||||||
|
headers: list = None # deprecated v2.0.0, not used
|
||||||
|
userAgent: str = None # deprecated v2.0.0, not used
|
||||||
|
|
||||||
|
# V1Request
|
||||||
|
url: str = None
|
||||||
|
postData: str = None
|
||||||
|
returnOnlyCookies: bool = None
|
||||||
|
download: bool = None # deprecated v2.0.0, not used
|
||||||
|
returnRawHtml: bool = None # deprecated v2.0.0, not used
|
||||||
|
|
||||||
|
def __init__(self, _dict):
|
||||||
|
self.__dict__.update(_dict)
|
||||||
|
|
||||||
|
|
||||||
|
class V1ResponseBase(object):
|
||||||
|
# V1ResponseBase
|
||||||
|
status: str = None
|
||||||
|
message: str = None
|
||||||
|
session: str = None
|
||||||
|
sessions: list[str] = None
|
||||||
|
startTimestamp: int = None
|
||||||
|
endTimestamp: int = None
|
||||||
|
version: str = None
|
||||||
|
|
||||||
|
# V1ResponseSolution
|
||||||
|
solution: ChallengeResolutionResultT = None
|
||||||
|
|
||||||
|
# hidden vars
|
||||||
|
__error_500__: bool = False
|
||||||
|
|
||||||
|
def __init__(self, _dict):
|
||||||
|
self.__dict__.update(_dict)
|
||||||
|
if self.solution is not None:
|
||||||
|
self.solution = ChallengeResolutionResultT(self.solution)
|
||||||
|
|
||||||
|
|
||||||
|
class IndexResponse(object):
|
||||||
|
msg: str = None
|
||||||
|
version: str = None
|
||||||
|
userAgent: str = None
|
||||||
|
|
||||||
|
def __init__(self, _dict):
|
||||||
|
self.__dict__.update(_dict)
|
||||||
|
|
||||||
|
|
||||||
|
class HealthResponse(object):
|
||||||
|
status: str = None
|
||||||
|
|
||||||
|
def __init__(self, _dict):
|
||||||
|
self.__dict__.update(_dict)
|
||||||
122
src/flaresolverr.py
Normal file
122
src/flaresolverr.py
Normal file
@@ -0,0 +1,122 @@
|
|||||||
|
import json
|
||||||
|
import logging
|
||||||
|
import os
|
||||||
|
import sys
|
||||||
|
|
||||||
|
import certifi
|
||||||
|
from bottle import run, response, Bottle, request, ServerAdapter
|
||||||
|
|
||||||
|
from bottle_plugins.error_plugin import error_plugin
|
||||||
|
from bottle_plugins.logger_plugin import logger_plugin
|
||||||
|
from bottle_plugins import prometheus_plugin
|
||||||
|
from dtos import V1RequestBase
|
||||||
|
import flaresolverr_service
|
||||||
|
import utils
|
||||||
|
|
||||||
|
|
||||||
|
class JSONErrorBottle(Bottle):
|
||||||
|
"""
|
||||||
|
Handle 404 errors
|
||||||
|
"""
|
||||||
|
def default_error_handler(self, res):
|
||||||
|
response.content_type = 'application/json'
|
||||||
|
return json.dumps(dict(error=res.body, status_code=res.status_code))
|
||||||
|
|
||||||
|
|
||||||
|
app = JSONErrorBottle()
|
||||||
|
|
||||||
|
|
||||||
|
@app.route('/')
|
||||||
|
def index():
|
||||||
|
"""
|
||||||
|
Show welcome message
|
||||||
|
"""
|
||||||
|
res = flaresolverr_service.index_endpoint()
|
||||||
|
return utils.object_to_dict(res)
|
||||||
|
|
||||||
|
|
||||||
|
@app.route('/health')
|
||||||
|
def health():
|
||||||
|
"""
|
||||||
|
Healthcheck endpoint.
|
||||||
|
This endpoint is special because it doesn't print traces
|
||||||
|
"""
|
||||||
|
res = flaresolverr_service.health_endpoint()
|
||||||
|
return utils.object_to_dict(res)
|
||||||
|
|
||||||
|
|
||||||
|
@app.post('/v1')
|
||||||
|
def controller_v1():
|
||||||
|
"""
|
||||||
|
Controller v1
|
||||||
|
"""
|
||||||
|
req = V1RequestBase(request.json)
|
||||||
|
res = flaresolverr_service.controller_v1_endpoint(req)
|
||||||
|
if res.__error_500__:
|
||||||
|
response.status = 500
|
||||||
|
return utils.object_to_dict(res)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
# check python version
|
||||||
|
if sys.version_info < (3, 9):
|
||||||
|
raise Exception("The Python version is less than 3.9, a version equal to or higher is required.")
|
||||||
|
|
||||||
|
# fix for HEADLESS=false in Windows binary
|
||||||
|
# https://stackoverflow.com/a/27694505
|
||||||
|
if os.name == 'nt':
|
||||||
|
import multiprocessing
|
||||||
|
multiprocessing.freeze_support()
|
||||||
|
|
||||||
|
# fix ssl certificates for compiled binaries
|
||||||
|
# https://github.com/pyinstaller/pyinstaller/issues/7229
|
||||||
|
# https://stackoverflow.com/questions/55736855/how-to-change-the-cafile-argument-in-the-ssl-module-in-python3
|
||||||
|
os.environ["REQUESTS_CA_BUNDLE"] = certifi.where()
|
||||||
|
os.environ["SSL_CERT_FILE"] = certifi.where()
|
||||||
|
|
||||||
|
# validate configuration
|
||||||
|
log_level = os.environ.get('LOG_LEVEL', 'info').upper()
|
||||||
|
log_html = utils.get_config_log_html()
|
||||||
|
headless = utils.get_config_headless()
|
||||||
|
server_host = os.environ.get('HOST', '0.0.0.0')
|
||||||
|
server_port = int(os.environ.get('PORT', 8191))
|
||||||
|
|
||||||
|
# configure logger
|
||||||
|
logger_format = '%(asctime)s %(levelname)-8s %(message)s'
|
||||||
|
if log_level == 'DEBUG':
|
||||||
|
logger_format = '%(asctime)s %(levelname)-8s ReqId %(thread)s %(message)s'
|
||||||
|
logging.basicConfig(
|
||||||
|
format=logger_format,
|
||||||
|
level=log_level,
|
||||||
|
datefmt='%Y-%m-%d %H:%M:%S',
|
||||||
|
handlers=[
|
||||||
|
logging.StreamHandler(sys.stdout)
|
||||||
|
]
|
||||||
|
)
|
||||||
|
# disable warning traces from urllib3
|
||||||
|
logging.getLogger('urllib3').setLevel(logging.ERROR)
|
||||||
|
logging.getLogger('selenium.webdriver.remote.remote_connection').setLevel(logging.WARNING)
|
||||||
|
logging.getLogger('undetected_chromedriver').setLevel(logging.WARNING)
|
||||||
|
|
||||||
|
logging.info(f'FlareSolverr {utils.get_flaresolverr_version()}')
|
||||||
|
logging.debug('Debug log enabled')
|
||||||
|
|
||||||
|
# test browser installation
|
||||||
|
flaresolverr_service.test_browser_installation()
|
||||||
|
|
||||||
|
# start bootle plugins
|
||||||
|
# plugin order is important
|
||||||
|
app.install(logger_plugin)
|
||||||
|
app.install(error_plugin)
|
||||||
|
prometheus_plugin.setup()
|
||||||
|
app.install(prometheus_plugin.prometheus_plugin)
|
||||||
|
|
||||||
|
# start webserver
|
||||||
|
# default server 'wsgiref' does not support concurrent requests
|
||||||
|
# https://github.com/FlareSolverr/FlareSolverr/issues/680
|
||||||
|
# https://github.com/Pylons/waitress/issues/31
|
||||||
|
class WaitressServerPoll(ServerAdapter):
|
||||||
|
def run(self, handler):
|
||||||
|
from waitress import serve
|
||||||
|
serve(handler, host=self.host, port=self.port, asyncore_use_poll=True)
|
||||||
|
run(app, host=server_host, port=server_port, quiet=True, server=WaitressServerPoll)
|
||||||
452
src/flaresolverr_service.py
Normal file
452
src/flaresolverr_service.py
Normal file
@@ -0,0 +1,452 @@
|
|||||||
|
import logging
|
||||||
|
import platform
|
||||||
|
import sys
|
||||||
|
import time
|
||||||
|
from datetime import timedelta
|
||||||
|
from urllib.parse import unquote
|
||||||
|
|
||||||
|
from func_timeout import FunctionTimedOut, func_timeout
|
||||||
|
from selenium.common import TimeoutException
|
||||||
|
from selenium.webdriver.chrome.webdriver import WebDriver
|
||||||
|
from selenium.webdriver.common.by import By
|
||||||
|
from selenium.webdriver.support.expected_conditions import (
|
||||||
|
presence_of_element_located, staleness_of, title_is)
|
||||||
|
from selenium.webdriver.common.action_chains import ActionChains
|
||||||
|
from selenium.webdriver.support.wait import WebDriverWait
|
||||||
|
|
||||||
|
import utils
|
||||||
|
from dtos import (STATUS_ERROR, STATUS_OK, ChallengeResolutionResultT,
|
||||||
|
ChallengeResolutionT, HealthResponse, IndexResponse,
|
||||||
|
V1RequestBase, V1ResponseBase)
|
||||||
|
from sessions import SessionsStorage
|
||||||
|
|
||||||
|
ACCESS_DENIED_TITLES = [
|
||||||
|
# Cloudflare
|
||||||
|
'Access denied',
|
||||||
|
# Cloudflare http://bitturk.net/ Firefox
|
||||||
|
'Attention Required! | Cloudflare'
|
||||||
|
]
|
||||||
|
ACCESS_DENIED_SELECTORS = [
|
||||||
|
# Cloudflare
|
||||||
|
'div.cf-error-title span.cf-code-label span',
|
||||||
|
# Cloudflare http://bitturk.net/ Firefox
|
||||||
|
'#cf-error-details div.cf-error-overview h1'
|
||||||
|
]
|
||||||
|
CHALLENGE_TITLES = [
|
||||||
|
# Cloudflare
|
||||||
|
'Just a moment...',
|
||||||
|
# DDoS-GUARD
|
||||||
|
'DDoS-Guard'
|
||||||
|
]
|
||||||
|
CHALLENGE_SELECTORS = [
|
||||||
|
# Cloudflare
|
||||||
|
'#cf-challenge-running', '.ray_id', '.attack-box', '#cf-please-wait', '#challenge-spinner', '#trk_jschal_js',
|
||||||
|
# Custom CloudFlare for EbookParadijs, Film-Paleis, MuziekFabriek and Puur-Hollands
|
||||||
|
'td.info #js_info',
|
||||||
|
# Fairlane / pararius.com
|
||||||
|
'div.vc div.text-box h2'
|
||||||
|
]
|
||||||
|
SHORT_TIMEOUT = 1
|
||||||
|
SESSIONS_STORAGE = SessionsStorage()
|
||||||
|
|
||||||
|
|
||||||
|
def test_browser_installation():
|
||||||
|
logging.info("Testing web browser installation...")
|
||||||
|
logging.info("Platform: " + platform.platform())
|
||||||
|
|
||||||
|
chrome_exe_path = utils.get_chrome_exe_path()
|
||||||
|
if chrome_exe_path is None:
|
||||||
|
logging.error("Chrome / Chromium web browser not installed!")
|
||||||
|
sys.exit(1)
|
||||||
|
else:
|
||||||
|
logging.info("Chrome / Chromium path: " + chrome_exe_path)
|
||||||
|
|
||||||
|
chrome_major_version = utils.get_chrome_major_version()
|
||||||
|
if chrome_major_version == '':
|
||||||
|
logging.error("Chrome / Chromium version not detected!")
|
||||||
|
sys.exit(1)
|
||||||
|
else:
|
||||||
|
logging.info("Chrome / Chromium major version: " + chrome_major_version)
|
||||||
|
|
||||||
|
logging.info("Launching web browser...")
|
||||||
|
user_agent = utils.get_user_agent()
|
||||||
|
logging.info("FlareSolverr User-Agent: " + user_agent)
|
||||||
|
logging.info("Test successful!")
|
||||||
|
|
||||||
|
|
||||||
|
def index_endpoint() -> IndexResponse:
|
||||||
|
res = IndexResponse({})
|
||||||
|
res.msg = "FlareSolverr is ready!"
|
||||||
|
res.version = utils.get_flaresolverr_version()
|
||||||
|
res.userAgent = utils.get_user_agent()
|
||||||
|
return res
|
||||||
|
|
||||||
|
|
||||||
|
def health_endpoint() -> HealthResponse:
|
||||||
|
res = HealthResponse({})
|
||||||
|
res.status = STATUS_OK
|
||||||
|
return res
|
||||||
|
|
||||||
|
|
||||||
|
def controller_v1_endpoint(req: V1RequestBase) -> V1ResponseBase:
|
||||||
|
start_ts = int(time.time() * 1000)
|
||||||
|
logging.info(f"Incoming request => POST /v1 body: {utils.object_to_dict(req)}")
|
||||||
|
res: V1ResponseBase
|
||||||
|
try:
|
||||||
|
res = _controller_v1_handler(req)
|
||||||
|
except Exception as e:
|
||||||
|
res = V1ResponseBase({})
|
||||||
|
res.__error_500__ = True
|
||||||
|
res.status = STATUS_ERROR
|
||||||
|
res.message = "Error: " + str(e)
|
||||||
|
logging.error(res.message)
|
||||||
|
|
||||||
|
res.startTimestamp = start_ts
|
||||||
|
res.endTimestamp = int(time.time() * 1000)
|
||||||
|
res.version = utils.get_flaresolverr_version()
|
||||||
|
logging.debug(f"Response => POST /v1 body: {utils.object_to_dict(res)}")
|
||||||
|
logging.info(f"Response in {(res.endTimestamp - res.startTimestamp) / 1000} s")
|
||||||
|
return res
|
||||||
|
|
||||||
|
|
||||||
|
def _controller_v1_handler(req: V1RequestBase) -> V1ResponseBase:
|
||||||
|
# do some validations
|
||||||
|
if req.cmd is None:
|
||||||
|
raise Exception("Request parameter 'cmd' is mandatory.")
|
||||||
|
if req.headers is not None:
|
||||||
|
logging.warning("Request parameter 'headers' was removed in FlareSolverr v2.")
|
||||||
|
if req.userAgent is not None:
|
||||||
|
logging.warning("Request parameter 'userAgent' was removed in FlareSolverr v2.")
|
||||||
|
|
||||||
|
# set default values
|
||||||
|
if req.maxTimeout is None or req.maxTimeout < 1:
|
||||||
|
req.maxTimeout = 60000
|
||||||
|
|
||||||
|
# execute the command
|
||||||
|
res: V1ResponseBase
|
||||||
|
if req.cmd == 'sessions.create':
|
||||||
|
res = _cmd_sessions_create(req)
|
||||||
|
elif req.cmd == 'sessions.list':
|
||||||
|
res = _cmd_sessions_list(req)
|
||||||
|
elif req.cmd == 'sessions.destroy':
|
||||||
|
res = _cmd_sessions_destroy(req)
|
||||||
|
elif req.cmd == 'request.get':
|
||||||
|
res = _cmd_request_get(req)
|
||||||
|
elif req.cmd == 'request.post':
|
||||||
|
res = _cmd_request_post(req)
|
||||||
|
else:
|
||||||
|
raise Exception(f"Request parameter 'cmd' = '{req.cmd}' is invalid.")
|
||||||
|
|
||||||
|
return res
|
||||||
|
|
||||||
|
|
||||||
|
def _cmd_request_get(req: V1RequestBase) -> V1ResponseBase:
|
||||||
|
# do some validations
|
||||||
|
if req.url is None:
|
||||||
|
raise Exception("Request parameter 'url' is mandatory in 'request.get' command.")
|
||||||
|
if req.postData is not None:
|
||||||
|
raise Exception("Cannot use 'postBody' when sending a GET request.")
|
||||||
|
if req.returnRawHtml is not None:
|
||||||
|
logging.warning("Request parameter 'returnRawHtml' was removed in FlareSolverr v2.")
|
||||||
|
if req.download is not None:
|
||||||
|
logging.warning("Request parameter 'download' was removed in FlareSolverr v2.")
|
||||||
|
|
||||||
|
challenge_res = _resolve_challenge(req, 'GET')
|
||||||
|
res = V1ResponseBase({})
|
||||||
|
res.status = challenge_res.status
|
||||||
|
res.message = challenge_res.message
|
||||||
|
res.solution = challenge_res.result
|
||||||
|
return res
|
||||||
|
|
||||||
|
|
||||||
|
def _cmd_request_post(req: V1RequestBase) -> V1ResponseBase:
|
||||||
|
# do some validations
|
||||||
|
if req.postData is None:
|
||||||
|
raise Exception("Request parameter 'postData' is mandatory in 'request.post' command.")
|
||||||
|
if req.returnRawHtml is not None:
|
||||||
|
logging.warning("Request parameter 'returnRawHtml' was removed in FlareSolverr v2.")
|
||||||
|
if req.download is not None:
|
||||||
|
logging.warning("Request parameter 'download' was removed in FlareSolverr v2.")
|
||||||
|
|
||||||
|
challenge_res = _resolve_challenge(req, 'POST')
|
||||||
|
res = V1ResponseBase({})
|
||||||
|
res.status = challenge_res.status
|
||||||
|
res.message = challenge_res.message
|
||||||
|
res.solution = challenge_res.result
|
||||||
|
return res
|
||||||
|
|
||||||
|
|
||||||
|
def _cmd_sessions_create(req: V1RequestBase) -> V1ResponseBase:
|
||||||
|
logging.debug("Creating new session...")
|
||||||
|
|
||||||
|
session, fresh = SESSIONS_STORAGE.create(session_id=req.session, proxy=req.proxy)
|
||||||
|
session_id = session.session_id
|
||||||
|
|
||||||
|
if not fresh:
|
||||||
|
return V1ResponseBase({
|
||||||
|
"status": STATUS_OK,
|
||||||
|
"message": "Session already exists.",
|
||||||
|
"session": session_id
|
||||||
|
})
|
||||||
|
|
||||||
|
return V1ResponseBase({
|
||||||
|
"status": STATUS_OK,
|
||||||
|
"message": "Session created successfully.",
|
||||||
|
"session": session_id
|
||||||
|
})
|
||||||
|
|
||||||
|
|
||||||
|
def _cmd_sessions_list(req: V1RequestBase) -> V1ResponseBase:
|
||||||
|
session_ids = SESSIONS_STORAGE.session_ids()
|
||||||
|
|
||||||
|
return V1ResponseBase({
|
||||||
|
"status": STATUS_OK,
|
||||||
|
"message": "",
|
||||||
|
"sessions": session_ids
|
||||||
|
})
|
||||||
|
|
||||||
|
|
||||||
|
def _cmd_sessions_destroy(req: V1RequestBase) -> V1ResponseBase:
|
||||||
|
session_id = req.session
|
||||||
|
existed = SESSIONS_STORAGE.destroy(session_id)
|
||||||
|
|
||||||
|
if not existed:
|
||||||
|
raise Exception("The session doesn't exist.")
|
||||||
|
|
||||||
|
return V1ResponseBase({
|
||||||
|
"status": STATUS_OK,
|
||||||
|
"message": "The session has been removed."
|
||||||
|
})
|
||||||
|
|
||||||
|
|
||||||
|
def _resolve_challenge(req: V1RequestBase, method: str) -> ChallengeResolutionT:
|
||||||
|
timeout = req.maxTimeout / 1000
|
||||||
|
driver = None
|
||||||
|
try:
|
||||||
|
if req.session:
|
||||||
|
session_id = req.session
|
||||||
|
ttl = timedelta(minutes=req.session_ttl_minutes) if req.session_ttl_minutes else None
|
||||||
|
session, fresh = SESSIONS_STORAGE.get(session_id, ttl)
|
||||||
|
|
||||||
|
if fresh:
|
||||||
|
logging.debug(f"new session created to perform the request (session_id={session_id})")
|
||||||
|
else:
|
||||||
|
logging.debug(f"existing session is used to perform the request (session_id={session_id}, "
|
||||||
|
f"lifetime={str(session.lifetime())}, ttl={str(ttl)})")
|
||||||
|
|
||||||
|
driver = session.driver
|
||||||
|
else:
|
||||||
|
driver = utils.get_webdriver(req.proxy)
|
||||||
|
logging.debug('New instance of webdriver has been created to perform the request')
|
||||||
|
return func_timeout(timeout, _evil_logic, (req, driver, method))
|
||||||
|
except FunctionTimedOut:
|
||||||
|
raise Exception(f'Error solving the challenge. Timeout after {timeout} seconds.')
|
||||||
|
except Exception as e:
|
||||||
|
raise Exception('Error solving the challenge. ' + str(e).replace('\n', '\\n'))
|
||||||
|
finally:
|
||||||
|
if not req.session and driver is not None:
|
||||||
|
driver.quit()
|
||||||
|
logging.debug('A used instance of webdriver has been destroyed')
|
||||||
|
|
||||||
|
|
||||||
|
def click_verify(driver: WebDriver):
|
||||||
|
try:
|
||||||
|
logging.debug("Try to find the Cloudflare verify checkbox...")
|
||||||
|
iframe = driver.find_element(By.XPATH, "//iframe[starts-with(@id, 'cf-chl-widget-')]")
|
||||||
|
driver.switch_to.frame(iframe)
|
||||||
|
checkbox = driver.find_element(
|
||||||
|
by=By.XPATH,
|
||||||
|
value='//*[@id="challenge-stage"]/div/label/input',
|
||||||
|
)
|
||||||
|
if checkbox:
|
||||||
|
actions = ActionChains(driver)
|
||||||
|
actions.move_to_element_with_offset(checkbox, 5, 7)
|
||||||
|
actions.click(checkbox)
|
||||||
|
actions.perform()
|
||||||
|
logging.debug("Cloudflare verify checkbox found and clicked!")
|
||||||
|
except Exception:
|
||||||
|
logging.debug("Cloudflare verify checkbox not found on the page.")
|
||||||
|
finally:
|
||||||
|
driver.switch_to.default_content()
|
||||||
|
|
||||||
|
try:
|
||||||
|
logging.debug("Try to find the Cloudflare 'Verify you are human' button...")
|
||||||
|
button = driver.find_element(
|
||||||
|
by=By.XPATH,
|
||||||
|
value="//input[@type='button' and @value='Verify you are human']",
|
||||||
|
)
|
||||||
|
if button:
|
||||||
|
actions = ActionChains(driver)
|
||||||
|
actions.move_to_element_with_offset(button, 5, 7)
|
||||||
|
actions.click(button)
|
||||||
|
actions.perform()
|
||||||
|
logging.debug("The Cloudflare 'Verify you are human' button found and clicked!")
|
||||||
|
except Exception:
|
||||||
|
logging.debug("The Cloudflare 'Verify you are human' button not found on the page.")
|
||||||
|
|
||||||
|
time.sleep(2)
|
||||||
|
|
||||||
|
|
||||||
|
def get_correct_window(driver: WebDriver) -> WebDriver:
|
||||||
|
if len(driver.window_handles) > 1:
|
||||||
|
for window_handle in driver.window_handles:
|
||||||
|
driver.switch_to.window(window_handle)
|
||||||
|
current_url = driver.current_url
|
||||||
|
if not current_url.startswith("devtools://devtools"):
|
||||||
|
return driver
|
||||||
|
return driver
|
||||||
|
|
||||||
|
|
||||||
|
def access_page(driver: WebDriver, url: str) -> None:
|
||||||
|
driver.get(url)
|
||||||
|
driver.start_session()
|
||||||
|
driver.start_session() # required to bypass Cloudflare
|
||||||
|
|
||||||
|
|
||||||
|
def _evil_logic(req: V1RequestBase, driver: WebDriver, method: str) -> ChallengeResolutionT:
|
||||||
|
res = ChallengeResolutionT({})
|
||||||
|
res.status = STATUS_OK
|
||||||
|
res.message = ""
|
||||||
|
|
||||||
|
|
||||||
|
# navigate to the page
|
||||||
|
logging.debug(f'Navigating to... {req.url}')
|
||||||
|
if method == 'POST':
|
||||||
|
_post_request(req, driver)
|
||||||
|
else:
|
||||||
|
access_page(driver, req.url)
|
||||||
|
driver = get_correct_window(driver)
|
||||||
|
|
||||||
|
# set cookies if required
|
||||||
|
if req.cookies is not None and len(req.cookies) > 0:
|
||||||
|
logging.debug(f'Setting cookies...')
|
||||||
|
for cookie in req.cookies:
|
||||||
|
driver.delete_cookie(cookie['name'])
|
||||||
|
driver.add_cookie(cookie)
|
||||||
|
# reload the page
|
||||||
|
if method == 'POST':
|
||||||
|
_post_request(req, driver)
|
||||||
|
else:
|
||||||
|
access_page(driver, req.url)
|
||||||
|
driver = get_correct_window(driver)
|
||||||
|
|
||||||
|
# wait for the page
|
||||||
|
if utils.get_config_log_html():
|
||||||
|
logging.debug(f"Response HTML:\n{driver.page_source}")
|
||||||
|
html_element = driver.find_element(By.TAG_NAME, "html")
|
||||||
|
page_title = driver.title
|
||||||
|
|
||||||
|
# find access denied titles
|
||||||
|
for title in ACCESS_DENIED_TITLES:
|
||||||
|
if title == page_title:
|
||||||
|
raise Exception('Cloudflare has blocked this request. '
|
||||||
|
'Probably your IP is banned for this site, check in your web browser.')
|
||||||
|
# find access denied selectors
|
||||||
|
for selector in ACCESS_DENIED_SELECTORS:
|
||||||
|
found_elements = driver.find_elements(By.CSS_SELECTOR, selector)
|
||||||
|
if len(found_elements) > 0:
|
||||||
|
raise Exception('Cloudflare has blocked this request. '
|
||||||
|
'Probably your IP is banned for this site, check in your web browser.')
|
||||||
|
|
||||||
|
# find challenge by title
|
||||||
|
challenge_found = False
|
||||||
|
for title in CHALLENGE_TITLES:
|
||||||
|
if title.lower() == page_title.lower():
|
||||||
|
challenge_found = True
|
||||||
|
logging.info("Challenge detected. Title found: " + page_title)
|
||||||
|
break
|
||||||
|
if not challenge_found:
|
||||||
|
# find challenge by selectors
|
||||||
|
for selector in CHALLENGE_SELECTORS:
|
||||||
|
found_elements = driver.find_elements(By.CSS_SELECTOR, selector)
|
||||||
|
if len(found_elements) > 0:
|
||||||
|
challenge_found = True
|
||||||
|
logging.info("Challenge detected. Selector found: " + selector)
|
||||||
|
break
|
||||||
|
|
||||||
|
attempt = 0
|
||||||
|
if challenge_found:
|
||||||
|
while True:
|
||||||
|
try:
|
||||||
|
attempt = attempt + 1
|
||||||
|
# wait until the title changes
|
||||||
|
for title in CHALLENGE_TITLES:
|
||||||
|
logging.debug("Waiting for title (attempt " + str(attempt) + "): " + title)
|
||||||
|
WebDriverWait(driver, SHORT_TIMEOUT).until_not(title_is(title))
|
||||||
|
|
||||||
|
# then wait until all the selectors disappear
|
||||||
|
for selector in CHALLENGE_SELECTORS:
|
||||||
|
logging.debug("Waiting for selector (attempt " + str(attempt) + "): " + selector)
|
||||||
|
WebDriverWait(driver, SHORT_TIMEOUT).until_not(
|
||||||
|
presence_of_element_located((By.CSS_SELECTOR, selector)))
|
||||||
|
|
||||||
|
# all elements not found
|
||||||
|
break
|
||||||
|
|
||||||
|
except TimeoutException:
|
||||||
|
logging.debug("Timeout waiting for selector")
|
||||||
|
|
||||||
|
click_verify(driver)
|
||||||
|
|
||||||
|
# update the html (cloudflare reloads the page every 5 s)
|
||||||
|
html_element = driver.find_element(By.TAG_NAME, "html")
|
||||||
|
|
||||||
|
# waits until cloudflare redirection ends
|
||||||
|
logging.debug("Waiting for redirect")
|
||||||
|
# noinspection PyBroadException
|
||||||
|
try:
|
||||||
|
WebDriverWait(driver, SHORT_TIMEOUT).until(staleness_of(html_element))
|
||||||
|
except Exception:
|
||||||
|
logging.debug("Timeout waiting for redirect")
|
||||||
|
|
||||||
|
logging.info("Challenge solved!")
|
||||||
|
res.message = "Challenge solved!"
|
||||||
|
else:
|
||||||
|
logging.info("Challenge not detected!")
|
||||||
|
res.message = "Challenge not detected!"
|
||||||
|
|
||||||
|
challenge_res = ChallengeResolutionResultT({})
|
||||||
|
challenge_res.url = driver.current_url
|
||||||
|
challenge_res.status = 200 # todo: fix, selenium not provides this info
|
||||||
|
challenge_res.cookies = driver.get_cookies()
|
||||||
|
challenge_res.userAgent = utils.get_user_agent(driver)
|
||||||
|
|
||||||
|
if not req.returnOnlyCookies:
|
||||||
|
challenge_res.headers = {} # todo: fix, selenium not provides this info
|
||||||
|
challenge_res.response = driver.page_source
|
||||||
|
|
||||||
|
res.result = challenge_res
|
||||||
|
return res
|
||||||
|
|
||||||
|
|
||||||
|
def _post_request(req: V1RequestBase, driver: WebDriver):
|
||||||
|
post_form = f'<form id="hackForm" action="{req.url}" method="POST">'
|
||||||
|
query_string = req.postData if req.postData[0] != '?' else req.postData[1:]
|
||||||
|
pairs = query_string.split('&')
|
||||||
|
for pair in pairs:
|
||||||
|
parts = pair.split('=')
|
||||||
|
# noinspection PyBroadException
|
||||||
|
try:
|
||||||
|
name = unquote(parts[0])
|
||||||
|
except Exception:
|
||||||
|
name = parts[0]
|
||||||
|
if name == 'submit':
|
||||||
|
continue
|
||||||
|
# noinspection PyBroadException
|
||||||
|
try:
|
||||||
|
value = unquote(parts[1])
|
||||||
|
except Exception:
|
||||||
|
value = parts[1]
|
||||||
|
post_form += f'<input type="text" name="{name}" value="{value}"><br>'
|
||||||
|
post_form += '</form>'
|
||||||
|
html_content = f"""
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
{post_form}
|
||||||
|
<script>document.getElementById('hackForm').submit();</script>
|
||||||
|
</body>
|
||||||
|
</html>"""
|
||||||
|
driver.get("data:text/html;charset=utf-8," + html_content)
|
||||||
|
driver.start_session()
|
||||||
|
driver.start_session() # required to bypass Cloudflare
|
||||||
186
src/index.ts
186
src/index.ts
@@ -1,186 +0,0 @@
|
|||||||
const fs = require('fs');
|
|
||||||
const os = require('os');
|
|
||||||
const path = require('path');
|
|
||||||
import log from './log'
|
|
||||||
import { createServer, IncomingMessage, ServerResponse } from 'http';
|
|
||||||
import { RequestContext } from './types'
|
|
||||||
import Router, { BaseAPICall } from './routes'
|
|
||||||
import getCaptchaSolver from "./captcha";
|
|
||||||
import sessions from "./session";
|
|
||||||
import {v1 as UUIDv1} from "uuid";
|
|
||||||
|
|
||||||
const version: string = "v" + require('../package.json').version
|
|
||||||
const serverPort: number = Number(process.env.PORT) || 8191
|
|
||||||
const serverHost: string = process.env.HOST || '0.0.0.0'
|
|
||||||
|
|
||||||
function validateEnvironmentVariables() {
|
|
||||||
// ip and port variables are validated by nodejs
|
|
||||||
if (process.env.LOG_LEVEL && ['error', 'warn', 'info', 'verbose', 'debug'].indexOf(process.env.LOG_LEVEL) == -1) {
|
|
||||||
log.error(`The environment variable 'LOG_LEVEL' is wrong. Check the documentation.`);
|
|
||||||
process.exit(1);
|
|
||||||
}
|
|
||||||
if (process.env.LOG_HTML && ['true', 'false'].indexOf(process.env.LOG_HTML) == -1) {
|
|
||||||
log.error(`The environment variable 'LOG_HTML' is wrong. Check the documentation.`);
|
|
||||||
process.exit(1);
|
|
||||||
}
|
|
||||||
if (process.env.HEADLESS && ['true', 'false'].indexOf(process.env.HEADLESS) == -1) {
|
|
||||||
log.error(`The environment variable 'HEADLESS' is wrong. Check the documentation.`);
|
|
||||||
process.exit(1);
|
|
||||||
}
|
|
||||||
try {
|
|
||||||
getCaptchaSolver();
|
|
||||||
} catch (e) {
|
|
||||||
log.error(`The environment variable 'CAPTCHA_SOLVER' is wrong. ${e.message}`);
|
|
||||||
process.exit(1);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
async function testChromeInstallation() {
|
|
||||||
const sessionId = UUIDv1()
|
|
||||||
// create a temporary file for testing
|
|
||||||
log.debug("Testing Chrome installation...")
|
|
||||||
const fileContent = `flaresolverr_${version}`
|
|
||||||
const filePath = path.join(os.tmpdir(), `flaresolverr_${sessionId}.txt`)
|
|
||||||
const fileUrl = `file://${filePath}`
|
|
||||||
fs.writeFileSync(filePath, fileContent)
|
|
||||||
// launch the browser
|
|
||||||
const session = await sessions.create(sessionId, {
|
|
||||||
userAgent: null,
|
|
||||||
oneTimeSession: true
|
|
||||||
})
|
|
||||||
const page = await session.browser.newPage()
|
|
||||||
const response = await page.goto(fileUrl, { waitUntil: 'domcontentloaded' })
|
|
||||||
const responseBody = (await response.buffer()).toString().trim()
|
|
||||||
if (responseBody != fileContent) {
|
|
||||||
throw new Error("The response body does not match!")
|
|
||||||
}
|
|
||||||
await page.close()
|
|
||||||
await sessions.destroy(sessionId)
|
|
||||||
log.debug("Test successful")
|
|
||||||
}
|
|
||||||
|
|
||||||
function errorResponse(errorMsg: string, res: ServerResponse, startTimestamp: number) {
|
|
||||||
log.error(errorMsg)
|
|
||||||
const response = {
|
|
||||||
status: 'error',
|
|
||||||
message: errorMsg,
|
|
||||||
startTimestamp,
|
|
||||||
endTimestamp: Date.now(),
|
|
||||||
version
|
|
||||||
}
|
|
||||||
res.writeHead(500, {
|
|
||||||
'Content-Type': 'application/json'
|
|
||||||
})
|
|
||||||
res.write(JSON.stringify(response))
|
|
||||||
res.end()
|
|
||||||
}
|
|
||||||
|
|
||||||
function successResponse(successMsg: string, extendedProperties: object, res: ServerResponse, startTimestamp: number) {
|
|
||||||
const endTimestamp = Date.now()
|
|
||||||
log.info(`Response in ${(endTimestamp - startTimestamp) / 1000} s`)
|
|
||||||
if (successMsg) { log.info(successMsg) }
|
|
||||||
|
|
||||||
const response = Object.assign({
|
|
||||||
status: 'ok',
|
|
||||||
message: successMsg || '',
|
|
||||||
startTimestamp,
|
|
||||||
endTimestamp,
|
|
||||||
version
|
|
||||||
}, extendedProperties || {})
|
|
||||||
res.writeHead(200, {
|
|
||||||
'Content-Type': 'application/json'
|
|
||||||
})
|
|
||||||
res.write(JSON.stringify(response))
|
|
||||||
res.end()
|
|
||||||
}
|
|
||||||
|
|
||||||
function validateIncomingRequest(ctx: RequestContext, params: BaseAPICall) {
|
|
||||||
log.info(`Params: ${JSON.stringify(params)}`)
|
|
||||||
|
|
||||||
if (ctx.req.method !== 'POST') {
|
|
||||||
ctx.errorResponse('Only the POST method is allowed')
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
if (ctx.req.url !== '/v1') {
|
|
||||||
ctx.errorResponse('Only /v1 endpoint is allowed')
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!params.cmd) {
|
|
||||||
ctx.errorResponse("Parameter 'cmd' is mandatory")
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
|
|
||||||
// init
|
|
||||||
log.info(`FlareSolverr ${version}`);
|
|
||||||
log.debug('Debug log enabled');
|
|
||||||
validateEnvironmentVariables();
|
|
||||||
testChromeInstallation()
|
|
||||||
.catch(e => {
|
|
||||||
log.error("Error starting Chrome browser.", e);
|
|
||||||
process.exit(1);
|
|
||||||
})
|
|
||||||
.then(r =>
|
|
||||||
createServer((req: IncomingMessage, res: ServerResponse) => {
|
|
||||||
const startTimestamp = Date.now()
|
|
||||||
|
|
||||||
// health endpoint. this endpoint is special because it doesn't print traces
|
|
||||||
if (req.url == '/health') {
|
|
||||||
res.writeHead(200, {
|
|
||||||
'Content-Type': 'application/json'
|
|
||||||
})
|
|
||||||
res.write(JSON.stringify({"status": "ok"}))
|
|
||||||
res.end()
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// count the request for the log prefix
|
|
||||||
log.incRequests()
|
|
||||||
log.info(`Incoming request: ${req.method} ${req.url}`)
|
|
||||||
|
|
||||||
// show welcome message
|
|
||||||
if (req.url == '/') {
|
|
||||||
successResponse("FlareSolverr is ready!", null, res, startTimestamp);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// get request body
|
|
||||||
const bodyParts: any[] = []
|
|
||||||
req.on('data', chunk => {
|
|
||||||
bodyParts.push(chunk)
|
|
||||||
}).on('end', () => {
|
|
||||||
// parse params
|
|
||||||
const body = Buffer.concat(bodyParts).toString()
|
|
||||||
let params: BaseAPICall = null
|
|
||||||
try {
|
|
||||||
params = JSON.parse(body)
|
|
||||||
} catch (err) {
|
|
||||||
errorResponse('Body must be in JSON format', res, startTimestamp)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
const ctx: RequestContext = {
|
|
||||||
req,
|
|
||||||
res,
|
|
||||||
startTimestamp,
|
|
||||||
errorResponse: (msg) => errorResponse(msg, res, startTimestamp),
|
|
||||||
successResponse: (msg, extendedProperties) => successResponse(msg, extendedProperties, res, startTimestamp)
|
|
||||||
}
|
|
||||||
|
|
||||||
// validate params
|
|
||||||
if (!validateIncomingRequest(ctx, params)) { return }
|
|
||||||
|
|
||||||
// process request
|
|
||||||
Router(ctx, params).catch(e => {
|
|
||||||
console.error(e)
|
|
||||||
ctx.errorResponse(e.message)
|
|
||||||
})
|
|
||||||
})
|
|
||||||
}).listen(serverPort, serverHost, () => {
|
|
||||||
log.info(`Listening on http://${serverHost}:${serverPort}`);
|
|
||||||
})
|
|
||||||
)
|
|
||||||
38
src/log.ts
38
src/log.ts
@@ -1,38 +0,0 @@
|
|||||||
let requests = 0
|
|
||||||
|
|
||||||
const LOG_HTML: boolean = process.env.LOG_HTML == 'true';
|
|
||||||
|
|
||||||
function toIsoString(date: Date) {
|
|
||||||
// this function fixes Date.toISOString() adding timezone
|
|
||||||
let tzo = -date.getTimezoneOffset(),
|
|
||||||
dif = tzo >= 0 ? '+' : '-',
|
|
||||||
pad = function(num: number) {
|
|
||||||
let norm = Math.floor(Math.abs(num));
|
|
||||||
return (norm < 10 ? '0' : '') + norm;
|
|
||||||
};
|
|
||||||
|
|
||||||
return date.getFullYear() +
|
|
||||||
'-' + pad(date.getMonth() + 1) +
|
|
||||||
'-' + pad(date.getDate()) +
|
|
||||||
'T' + pad(date.getHours()) +
|
|
||||||
':' + pad(date.getMinutes()) +
|
|
||||||
':' + pad(date.getSeconds()) +
|
|
||||||
dif + pad(tzo / 60) +
|
|
||||||
':' + pad(tzo % 60);
|
|
||||||
}
|
|
||||||
|
|
||||||
export default {
|
|
||||||
incRequests: () => { requests++ },
|
|
||||||
html(html: string) {
|
|
||||||
if (LOG_HTML)
|
|
||||||
this.debug(html)
|
|
||||||
},
|
|
||||||
...require('console-log-level')(
|
|
||||||
{level: process.env.LOG_LEVEL || 'info',
|
|
||||||
prefix(level: string) {
|
|
||||||
const req = (requests > 0) ? ` REQ-${requests}` : '';
|
|
||||||
return `${toIsoString(new Date())} ${level.toUpperCase()}${req}`
|
|
||||||
}
|
|
||||||
}
|
|
||||||
)
|
|
||||||
}
|
|
||||||
32
src/metrics.py
Normal file
32
src/metrics.py
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
import logging
|
||||||
|
|
||||||
|
from prometheus_client import Counter, Histogram, start_http_server
|
||||||
|
import time
|
||||||
|
|
||||||
|
REQUEST_COUNTER = Counter(
|
||||||
|
name='flaresolverr_request',
|
||||||
|
documentation='Total requests with result',
|
||||||
|
labelnames=['domain', 'result']
|
||||||
|
)
|
||||||
|
REQUEST_DURATION = Histogram(
|
||||||
|
name='flaresolverr_request_duration',
|
||||||
|
documentation='Request duration in seconds',
|
||||||
|
labelnames=['domain'],
|
||||||
|
buckets=[0, 10, 25, 50]
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
def serve(port):
|
||||||
|
start_http_server(port=port)
|
||||||
|
while True:
|
||||||
|
time.sleep(600)
|
||||||
|
|
||||||
|
|
||||||
|
def start_metrics_http_server(prometheus_port: int):
|
||||||
|
logging.info(f"Serving Prometheus exporter on http://0.0.0.0:{prometheus_port}/metrics")
|
||||||
|
from threading import Thread
|
||||||
|
Thread(
|
||||||
|
target=serve,
|
||||||
|
kwargs=dict(port=prometheus_port),
|
||||||
|
daemon=True,
|
||||||
|
).start()
|
||||||
@@ -1,178 +0,0 @@
|
|||||||
import {Response} from 'puppeteer'
|
|
||||||
import {Page} from "puppeteer-extra/dist/puppeteer";
|
|
||||||
|
|
||||||
import log from "../log";
|
|
||||||
import getCaptchaSolver, {CaptchaType} from "../captcha";
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class contains the logic to solve protections provided by CloudFlare
|
|
||||||
**/
|
|
||||||
|
|
||||||
const CHALLENGE_SELECTORS = ['#trk_jschal_js', '.ray_id', '.attack-box', '#cf-please-wait'];
|
|
||||||
const TOKEN_INPUT_NAMES = ['g-recaptcha-response', 'h-captcha-response'];
|
|
||||||
|
|
||||||
export default async function resolveChallenge(url: string, page: Page, response: Response): Promise<Response> {
|
|
||||||
|
|
||||||
// look for challenge and return fast if not detected
|
|
||||||
if (!response.headers().server.startsWith('cloudflare')) {
|
|
||||||
log.info('Cloudflare not detected');
|
|
||||||
return response;
|
|
||||||
}
|
|
||||||
log.info('Cloudflare detected');
|
|
||||||
|
|
||||||
if (await page.$('.cf-error-code')) {
|
|
||||||
throw new Error('Cloudflare has blocked this request (Code 1020 Detected).')
|
|
||||||
}
|
|
||||||
|
|
||||||
let selectorFoundCount = 0;
|
|
||||||
if (response.status() > 400) {
|
|
||||||
// detect cloudflare wait 5s
|
|
||||||
for (const selector of CHALLENGE_SELECTORS) {
|
|
||||||
const cfChallengeElem = await page.$(selector)
|
|
||||||
if (cfChallengeElem) {
|
|
||||||
selectorFoundCount++
|
|
||||||
log.debug(`Javascript challenge element '${selector}' detected.`)
|
|
||||||
log.debug('Waiting for Cloudflare challenge...')
|
|
||||||
|
|
||||||
while (true) {
|
|
||||||
await page.waitFor(1000)
|
|
||||||
try {
|
|
||||||
// catch exception timeout in waitForNavigation
|
|
||||||
response = await page.waitForNavigation({ waitUntil: 'domcontentloaded', timeout: 9000 })
|
|
||||||
} catch (error) { }
|
|
||||||
|
|
||||||
try {
|
|
||||||
// catch Execution context was destroyed
|
|
||||||
const cfChallengeElem = await page.$(selector)
|
|
||||||
if (!cfChallengeElem) {
|
|
||||||
// solved!
|
|
||||||
break
|
|
||||||
} else {
|
|
||||||
const displayStyle = await page.evaluate((selector) => {
|
|
||||||
return getComputedStyle(document.querySelector(selector)).getPropertyValue("display");
|
|
||||||
}, selector);
|
|
||||||
if (displayStyle == "none") {
|
|
||||||
// spinner is hidden, could be a captcha or not
|
|
||||||
await page.waitFor(1000)
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
log.debug('Found challenge element again...')
|
|
||||||
} catch (error)
|
|
||||||
{
|
|
||||||
log.debug("Unexpected error: " + error);
|
|
||||||
}
|
|
||||||
|
|
||||||
response = await page.reload({ waitUntil: 'domcontentloaded' })
|
|
||||||
log.debug('Page reloaded.')
|
|
||||||
log.html(await page.content())
|
|
||||||
}
|
|
||||||
|
|
||||||
log.debug('Validating HTML code...')
|
|
||||||
break
|
|
||||||
} else {
|
|
||||||
log.debug(`No '${selector}' challenge element detected.`)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
log.debug("Javascript challenge selectors found: " + selectorFoundCount + ", total selectors: " + CHALLENGE_SELECTORS.length)
|
|
||||||
} else {
|
|
||||||
// some sites use cloudflare but there is no challenge
|
|
||||||
log.debug(`Javascript challenge not detected. Status code: ${response.status()}`);
|
|
||||||
selectorFoundCount = 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
// it seems some captcha pages return 200 sometimes
|
|
||||||
if (await page.$('input[name="cf_captcha_kind"]')) {
|
|
||||||
log.info('Captcha challenge detected.');
|
|
||||||
const captchaSolver = getCaptchaSolver()
|
|
||||||
if (captchaSolver) {
|
|
||||||
const captchaStartTimestamp = Date.now()
|
|
||||||
const challengeForm = await page.$('#challenge-form')
|
|
||||||
if (challengeForm) {
|
|
||||||
const captchaTypeElm = await page.$('input[name="cf_captcha_kind"]')
|
|
||||||
const cfCaptchaType: string = await captchaTypeElm.evaluate((e: any) => e.value)
|
|
||||||
const captchaType: CaptchaType = (CaptchaType as any)[cfCaptchaType]
|
|
||||||
if (!captchaType) {
|
|
||||||
throw new Error('Unknown captcha type!');
|
|
||||||
}
|
|
||||||
|
|
||||||
let sitekey = null
|
|
||||||
if (captchaType != 'hCaptcha' && process.env.CAPTCHA_SOLVER != 'hcaptcha-solver') {
|
|
||||||
const sitekeyElem = await page.$('*[data-sitekey]')
|
|
||||||
if (!sitekeyElem) {
|
|
||||||
throw new Error('Could not find sitekey!');
|
|
||||||
}
|
|
||||||
sitekey = await sitekeyElem.evaluate((e) => e.getAttribute('data-sitekey'))
|
|
||||||
}
|
|
||||||
|
|
||||||
log.info('Waiting to receive captcha token to bypass challenge...')
|
|
||||||
const token = await captchaSolver({
|
|
||||||
url,
|
|
||||||
sitekey,
|
|
||||||
type: captchaType
|
|
||||||
})
|
|
||||||
log.debug(`Token received: ${token}`);
|
|
||||||
if (!token) {
|
|
||||||
throw new Error('Token solver failed to return a token.')
|
|
||||||
}
|
|
||||||
|
|
||||||
let responseFieldsFoundCount = 0;
|
|
||||||
for (const name of TOKEN_INPUT_NAMES) {
|
|
||||||
const input = await page.$(`textarea[name="${name}"]`)
|
|
||||||
if (input) {
|
|
||||||
responseFieldsFoundCount ++;
|
|
||||||
log.debug(`Challenge response field '${name}' found in challenge form.`);
|
|
||||||
await input.evaluate((e: HTMLTextAreaElement, token) => { e.value = token }, token);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (responseFieldsFoundCount == 0) {
|
|
||||||
throw new Error('Challenge response field not found in challenge form.');
|
|
||||||
}
|
|
||||||
|
|
||||||
// ignore preset event listeners on the form
|
|
||||||
await page.evaluate(() => {
|
|
||||||
window.addEventListener('submit', (e) => { e.stopPropagation() }, true)
|
|
||||||
})
|
|
||||||
|
|
||||||
// it seems some sites obfuscate their challenge forms
|
|
||||||
// TODO: look into how they do it and come up with a more solid solution
|
|
||||||
try {
|
|
||||||
// this element is added with js and we want to wait for all the js to load before submitting
|
|
||||||
await page.waitForSelector('#challenge-form', { timeout: 10000 })
|
|
||||||
} catch (err) {
|
|
||||||
throw new Error("No '#challenge-form' element detected.");
|
|
||||||
}
|
|
||||||
|
|
||||||
// calculates the time it took to solve the captcha
|
|
||||||
const captchaSolveTotalTime = Date.now() - captchaStartTimestamp
|
|
||||||
|
|
||||||
// generates a random wait time
|
|
||||||
const randomWaitTime = (Math.floor(Math.random() * 10) + 10) * 1000
|
|
||||||
|
|
||||||
// waits, if any, time remaining to appear human but stay as fast as possible
|
|
||||||
const timeLeft = randomWaitTime - captchaSolveTotalTime
|
|
||||||
if (timeLeft > 0) {
|
|
||||||
log.debug(`Waiting for '${timeLeft}' milliseconds.`);
|
|
||||||
await page.waitFor(timeLeft);
|
|
||||||
}
|
|
||||||
|
|
||||||
// submit captcha response
|
|
||||||
challengeForm.evaluate((e: HTMLFormElement) => e.submit())
|
|
||||||
response = await page.waitForNavigation({ waitUntil: 'domcontentloaded' })
|
|
||||||
|
|
||||||
if (await page.$('input[name="cf_captcha_kind"]')) {
|
|
||||||
throw new Error('Captcha service failed to solve the challenge.');
|
|
||||||
}
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
throw new Error('Captcha detected but no automatic solver is configured.');
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
if (selectorFoundCount == 0)
|
|
||||||
{
|
|
||||||
throw new Error('No challenge selectors found, unable to proceed')
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return response;
|
|
||||||
}
|
|
||||||
298
src/routes.ts
298
src/routes.ts
@@ -1,298 +0,0 @@
|
|||||||
import { v1 as UUIDv1 } from 'uuid'
|
|
||||||
import { SetCookie, Request, Response, Headers, HttpMethod, Overrides } from 'puppeteer'
|
|
||||||
import { Page, Browser } from "puppeteer-extra/dist/puppeteer";
|
|
||||||
const Timeout = require('await-timeout');
|
|
||||||
|
|
||||||
import log from './log'
|
|
||||||
import sessions, { SessionsCacheItem } from './session'
|
|
||||||
import { RequestContext } from './types'
|
|
||||||
import cloudflareProvider from './providers/cloudflare';
|
|
||||||
|
|
||||||
export interface BaseAPICall {
|
|
||||||
cmd: string
|
|
||||||
}
|
|
||||||
|
|
||||||
interface BaseSessionsAPICall extends BaseAPICall {
|
|
||||||
session?: string
|
|
||||||
}
|
|
||||||
|
|
||||||
interface SessionsCreateAPICall extends BaseSessionsAPICall {
|
|
||||||
userAgent?: string,
|
|
||||||
cookies?: SetCookie[],
|
|
||||||
headers?: Headers
|
|
||||||
maxTimeout?: number
|
|
||||||
proxy?: any
|
|
||||||
}
|
|
||||||
|
|
||||||
interface BaseRequestAPICall extends BaseAPICall {
|
|
||||||
url: string
|
|
||||||
method?: HttpMethod
|
|
||||||
postData?: string
|
|
||||||
session?: string
|
|
||||||
userAgent?: string
|
|
||||||
maxTimeout?: number
|
|
||||||
cookies?: SetCookie[],
|
|
||||||
headers?: Headers
|
|
||||||
proxy?: any, // TODO: use interface not any
|
|
||||||
download?: boolean
|
|
||||||
returnOnlyCookies?: boolean
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
interface Routes {
|
|
||||||
[key: string]: (ctx: RequestContext, params: BaseAPICall) => void | Promise<void>
|
|
||||||
}
|
|
||||||
|
|
||||||
interface ChallengeResolutionResultT {
|
|
||||||
url: string
|
|
||||||
status: number,
|
|
||||||
headers?: Headers,
|
|
||||||
response: string,
|
|
||||||
cookies: object[]
|
|
||||||
userAgent: string
|
|
||||||
}
|
|
||||||
|
|
||||||
interface ChallengeResolutionT {
|
|
||||||
status?: string
|
|
||||||
message: string
|
|
||||||
result: ChallengeResolutionResultT
|
|
||||||
}
|
|
||||||
|
|
||||||
interface OverrideResolvers {
|
|
||||||
method?: (request: Request) => HttpMethod,
|
|
||||||
postData?: (request: Request) => string,
|
|
||||||
headers?: (request: Request) => Headers
|
|
||||||
}
|
|
||||||
|
|
||||||
type OverridesProps =
|
|
||||||
'method' |
|
|
||||||
'postData' |
|
|
||||||
'headers'
|
|
||||||
|
|
||||||
// We always set a Windows User-Agent because ARM builds are detected by Cloudflare
|
|
||||||
const DEFAULT_USER_AGENT = "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.138 Safari/537.36"
|
|
||||||
|
|
||||||
async function resolveChallengeWithTimeout(ctx: RequestContext, params: BaseRequestAPICall, page: Page) {
|
|
||||||
const maxTimeout = params.maxTimeout || 60000
|
|
||||||
const timer = new Timeout();
|
|
||||||
try {
|
|
||||||
const promise = resolveChallenge(ctx, params, page);
|
|
||||||
return await Promise.race([
|
|
||||||
promise,
|
|
||||||
timer.set(maxTimeout, `Maximum timeout reached. maxTimeout=${maxTimeout} (ms)`)
|
|
||||||
]);
|
|
||||||
} finally {
|
|
||||||
timer.clear();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
async function resolveChallenge(ctx: RequestContext, { url, proxy, download, returnOnlyCookies }: BaseRequestAPICall, page: Page): Promise<ChallengeResolutionT | void> {
|
|
||||||
|
|
||||||
let status = 'ok'
|
|
||||||
let message = ''
|
|
||||||
|
|
||||||
if (proxy) {
|
|
||||||
log.debug("Apply proxy");
|
|
||||||
if (proxy.username)
|
|
||||||
await page.authenticate({ username: proxy.username, password: proxy.password });
|
|
||||||
}
|
|
||||||
|
|
||||||
log.debug(`Navigating to... ${url}`)
|
|
||||||
let response: Response = await page.goto(url, { waitUntil: 'domcontentloaded' })
|
|
||||||
log.html(await page.content())
|
|
||||||
|
|
||||||
// Detect protection services and solve challenges
|
|
||||||
try {
|
|
||||||
response = await cloudflareProvider(url, page, response);
|
|
||||||
} catch (e) {
|
|
||||||
status = "error";
|
|
||||||
message = "Cloudflare " + e.toString();
|
|
||||||
}
|
|
||||||
|
|
||||||
const payload: ChallengeResolutionT = {
|
|
||||||
status,
|
|
||||||
message,
|
|
||||||
result: {
|
|
||||||
url: page.url(),
|
|
||||||
status: response.status(),
|
|
||||||
headers: response.headers(),
|
|
||||||
response: null,
|
|
||||||
cookies: await page.cookies(),
|
|
||||||
userAgent: await page.evaluate(() => navigator.userAgent)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (returnOnlyCookies) {
|
|
||||||
payload.result.headers = null;
|
|
||||||
payload.result.userAgent = null;
|
|
||||||
} else {
|
|
||||||
if (download) {
|
|
||||||
// for some reason we get an error unless we reload the page
|
|
||||||
// has something to do with a stale buffer and this is the quickest
|
|
||||||
// fix since I am short on time
|
|
||||||
response = await page.goto(url, { waitUntil: 'domcontentloaded' })
|
|
||||||
payload.result.response = (await response.buffer()).toString('base64')
|
|
||||||
} else {
|
|
||||||
payload.result.response = await page.content()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Add final url in result
|
|
||||||
payload.result.url = page.url();
|
|
||||||
|
|
||||||
// make sure the page is closed because if it isn't and error will be thrown
|
|
||||||
// when a user uses a temporary session, the browser make be quit before
|
|
||||||
// the page is properly closed.
|
|
||||||
await page.close()
|
|
||||||
|
|
||||||
return payload
|
|
||||||
}
|
|
||||||
|
|
||||||
function mergeSessionWithParams({ defaults }: SessionsCacheItem, params: BaseRequestAPICall): BaseRequestAPICall {
|
|
||||||
const copy = { ...defaults, ...params }
|
|
||||||
|
|
||||||
// custom merging logic
|
|
||||||
copy.headers = { ...defaults.headers || {}, ...params.headers || {} } || null
|
|
||||||
|
|
||||||
return copy
|
|
||||||
}
|
|
||||||
|
|
||||||
async function setupPage(ctx: RequestContext, params: BaseRequestAPICall, browser: Browser): Promise<Page> {
|
|
||||||
const page = await browser.newPage()
|
|
||||||
|
|
||||||
// merge session defaults with params
|
|
||||||
const { method, postData, userAgent, headers, cookies } = params
|
|
||||||
|
|
||||||
let overrideResolvers: OverrideResolvers = {}
|
|
||||||
|
|
||||||
if (method !== 'GET') {
|
|
||||||
log.debug(`Setting method to ${method}`)
|
|
||||||
overrideResolvers.method = request => method
|
|
||||||
}
|
|
||||||
|
|
||||||
if (postData) {
|
|
||||||
log.debug(`Setting body data to ${postData}`)
|
|
||||||
overrideResolvers.postData = request => postData
|
|
||||||
}
|
|
||||||
|
|
||||||
if (userAgent) {
|
|
||||||
log.debug(`Using custom UA: ${userAgent}`)
|
|
||||||
await page.setUserAgent(userAgent)
|
|
||||||
} else {
|
|
||||||
await page.setUserAgent(DEFAULT_USER_AGENT)
|
|
||||||
}
|
|
||||||
|
|
||||||
if (headers) {
|
|
||||||
log.debug(`Adding custom headers: ${JSON.stringify(headers)}`)
|
|
||||||
overrideResolvers.headers = request => Object.assign(request.headers(), headers)
|
|
||||||
}
|
|
||||||
|
|
||||||
if (cookies) {
|
|
||||||
log.debug(`Setting custom cookies: ${JSON.stringify(cookies)}`)
|
|
||||||
await page.setCookie(...cookies)
|
|
||||||
}
|
|
||||||
|
|
||||||
// if any keys have been set on the object
|
|
||||||
if (Object.keys(overrideResolvers).length > 0) {
|
|
||||||
let callbackRunOnce = false
|
|
||||||
const callback = (request: Request) => {
|
|
||||||
|
|
||||||
if (callbackRunOnce || !request.isNavigationRequest()) {
|
|
||||||
request.continue()
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
callbackRunOnce = true
|
|
||||||
const overrides: Overrides = {}
|
|
||||||
|
|
||||||
Object.keys(overrideResolvers).forEach((key: OverridesProps) => {
|
|
||||||
// @ts-ignore
|
|
||||||
overrides[key] = overrideResolvers[key](request)
|
|
||||||
});
|
|
||||||
|
|
||||||
log.debug(`Overrides: ${JSON.stringify(overrides)}`)
|
|
||||||
request.continue(overrides)
|
|
||||||
}
|
|
||||||
|
|
||||||
await page.setRequestInterception(true)
|
|
||||||
page.on('request', callback)
|
|
||||||
}
|
|
||||||
|
|
||||||
return page
|
|
||||||
}
|
|
||||||
|
|
||||||
const browserRequest = async (ctx: RequestContext, params: BaseRequestAPICall) => {
|
|
||||||
const oneTimeSession = params.session === undefined
|
|
||||||
const sessionId = params.session || UUIDv1()
|
|
||||||
const session = oneTimeSession
|
|
||||||
? await sessions.create(sessionId, {
|
|
||||||
userAgent: params.userAgent,
|
|
||||||
oneTimeSession
|
|
||||||
})
|
|
||||||
: sessions.get(sessionId)
|
|
||||||
|
|
||||||
if (session === false) {
|
|
||||||
return ctx.errorResponse('This session does not exist. Use \'list_sessions\' to see all the existing sessions.')
|
|
||||||
}
|
|
||||||
|
|
||||||
params = mergeSessionWithParams(session, params)
|
|
||||||
|
|
||||||
try {
|
|
||||||
const page = await setupPage(ctx, params, session.browser)
|
|
||||||
const data = await resolveChallengeWithTimeout(ctx, params, page)
|
|
||||||
|
|
||||||
if (data) {
|
|
||||||
const { status } = data
|
|
||||||
delete data.status
|
|
||||||
ctx.successResponse(data.message, {
|
|
||||||
...(oneTimeSession ? {} : { session: sessionId }),
|
|
||||||
...(status ? { status } : {}),
|
|
||||||
solution: data.result
|
|
||||||
})
|
|
||||||
}
|
|
||||||
} catch (error) {
|
|
||||||
log.error(error)
|
|
||||||
return ctx.errorResponse("Unable to process browser request. Error: " + error)
|
|
||||||
} finally {
|
|
||||||
if (oneTimeSession) {
|
|
||||||
await sessions.destroy(sessionId)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
export const routes: Routes = {
|
|
||||||
'sessions.create': async (ctx, { session, ...options }: SessionsCreateAPICall) => {
|
|
||||||
session = session || UUIDv1()
|
|
||||||
const { browser } = await sessions.create(session, options)
|
|
||||||
if (browser) { ctx.successResponse('Session created successfully.', { session }) }
|
|
||||||
},
|
|
||||||
'sessions.list': (ctx) => {
|
|
||||||
ctx.successResponse(null, { sessions: sessions.list() })
|
|
||||||
},
|
|
||||||
'sessions.destroy': async (ctx, { session }: BaseSessionsAPICall) => {
|
|
||||||
if (await sessions.destroy(session)) { return ctx.successResponse('The session has been removed.') }
|
|
||||||
ctx.errorResponse('This session does not exist.')
|
|
||||||
},
|
|
||||||
'request.get': async (ctx, params: BaseRequestAPICall) => {
|
|
||||||
params.method = 'GET'
|
|
||||||
if (params.postData) {
|
|
||||||
return ctx.errorResponse('Cannot use "postBody" when sending a GET request.')
|
|
||||||
}
|
|
||||||
await browserRequest(ctx, params)
|
|
||||||
},
|
|
||||||
'request.post': async (ctx, params: BaseRequestAPICall) => {
|
|
||||||
params.method = 'POST'
|
|
||||||
|
|
||||||
if (!params.postData) {
|
|
||||||
return ctx.errorResponse('Must send param "postBody" when sending a POST request.')
|
|
||||||
}
|
|
||||||
|
|
||||||
await browserRequest(ctx, params)
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
export default async function Router(ctx: RequestContext, params: BaseAPICall): Promise<void> {
|
|
||||||
const route = routes[params.cmd]
|
|
||||||
if (route) { return await route(ctx, params) }
|
|
||||||
return ctx.errorResponse(`The command '${params.cmd}' is invalid.`)
|
|
||||||
}
|
|
||||||
150
src/session.ts
150
src/session.ts
@@ -1,150 +0,0 @@
|
|||||||
import * as os from 'os'
|
|
||||||
import * as path from 'path'
|
|
||||||
import * as fs from 'fs'
|
|
||||||
|
|
||||||
import puppeteer from 'puppeteer-extra'
|
|
||||||
import { LaunchOptions, Headers, SetCookie } from 'puppeteer'
|
|
||||||
|
|
||||||
import log from './log'
|
|
||||||
import { deleteFolderRecursive, sleep, removeEmptyFields } from './utils'
|
|
||||||
import * as Puppeteer from "puppeteer-extra/dist/puppeteer";
|
|
||||||
|
|
||||||
interface SessionPageDefaults {
|
|
||||||
headers?: Headers
|
|
||||||
userAgent?: string
|
|
||||||
}
|
|
||||||
|
|
||||||
export interface SessionsCacheItem {
|
|
||||||
browser: Puppeteer.Browser
|
|
||||||
userDataDir?: string
|
|
||||||
defaults: SessionPageDefaults
|
|
||||||
}
|
|
||||||
|
|
||||||
interface SessionsCache {
|
|
||||||
[key: string]: SessionsCacheItem
|
|
||||||
}
|
|
||||||
|
|
||||||
interface SessionCreateOptions {
|
|
||||||
oneTimeSession?: boolean
|
|
||||||
userAgent?: string
|
|
||||||
cookies?: SetCookie[]
|
|
||||||
headers?: Headers,
|
|
||||||
maxTimeout?: number
|
|
||||||
proxy?: any
|
|
||||||
}
|
|
||||||
|
|
||||||
const sessionCache: SessionsCache = {}
|
|
||||||
|
|
||||||
// setting "user-agent-override" evasion is not working for us because it can't be changed
|
|
||||||
// in each request. we set the user-agent in the browser args instead
|
|
||||||
puppeteer.use(require('puppeteer-extra-plugin-stealth')())
|
|
||||||
|
|
||||||
function userDataDirFromId(id: string): string {
|
|
||||||
return path.join(os.tmpdir(), `/puppeteer_chrome_profile_${id}`)
|
|
||||||
}
|
|
||||||
|
|
||||||
function prepareBrowserProfile(id: string): string {
|
|
||||||
// TODO: maybe pass SessionCreateOptions for loading later?
|
|
||||||
const userDataDir = userDataDirFromId(id)
|
|
||||||
|
|
||||||
if (!fs.existsSync(userDataDir)) {
|
|
||||||
fs.mkdirSync(userDataDir, { recursive: true })
|
|
||||||
}
|
|
||||||
|
|
||||||
return userDataDir
|
|
||||||
}
|
|
||||||
|
|
||||||
export default {
|
|
||||||
create: async (id: string, { cookies, oneTimeSession, userAgent, headers, maxTimeout, proxy }: SessionCreateOptions): Promise<SessionsCacheItem> => {
|
|
||||||
let args = [
|
|
||||||
'--no-sandbox',
|
|
||||||
'--disable-setuid-sandbox',
|
|
||||||
'--disable-dev-shm-usage' // issue #45
|
|
||||||
];
|
|
||||||
if (proxy && proxy.url) {
|
|
||||||
args.push(`--proxy-server=${proxy.url}`);
|
|
||||||
}
|
|
||||||
|
|
||||||
const puppeteerOptions: LaunchOptions = {
|
|
||||||
product: 'chrome',
|
|
||||||
headless: process.env.HEADLESS !== 'false',
|
|
||||||
args
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!oneTimeSession) {
|
|
||||||
log.debug('Creating userDataDir for session.')
|
|
||||||
puppeteerOptions.userDataDir = prepareBrowserProfile(id)
|
|
||||||
}
|
|
||||||
|
|
||||||
// if we are running inside executable binary, change chrome path
|
|
||||||
if (typeof (process as any).pkg !== 'undefined') {
|
|
||||||
const exe = process.platform === "win32" ? 'chrome.exe' : 'chrome';
|
|
||||||
puppeteerOptions.executablePath = path.join(path.dirname(process.execPath), 'chrome', exe)
|
|
||||||
}
|
|
||||||
|
|
||||||
log.debug('Launching browser...')
|
|
||||||
|
|
||||||
// TODO: maybe access env variable?
|
|
||||||
// TODO: sometimes browser instances are created and not connected to correctly.
|
|
||||||
// how do we handle/quit those instances inside Docker?
|
|
||||||
let launchTries = 3
|
|
||||||
let browser: Puppeteer.Browser;
|
|
||||||
|
|
||||||
while (0 <= launchTries--) {
|
|
||||||
try {
|
|
||||||
browser = await puppeteer.launch(puppeteerOptions)
|
|
||||||
break
|
|
||||||
} catch (e) {
|
|
||||||
if (e.message !== 'Failed to launch the browser process!')
|
|
||||||
throw e
|
|
||||||
log.warn('Failed to open browser, trying again...')
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!browser) { throw Error(`Failed to launch browser 3 times in a row.`) }
|
|
||||||
|
|
||||||
if (cookies) {
|
|
||||||
const page = await browser.newPage()
|
|
||||||
await page.setCookie(...cookies)
|
|
||||||
}
|
|
||||||
|
|
||||||
sessionCache[id] = {
|
|
||||||
browser: browser,
|
|
||||||
userDataDir: puppeteerOptions.userDataDir,
|
|
||||||
defaults: removeEmptyFields({
|
|
||||||
userAgent,
|
|
||||||
headers,
|
|
||||||
maxTimeout
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
return sessionCache[id]
|
|
||||||
},
|
|
||||||
|
|
||||||
list: (): string[] => Object.keys(sessionCache),
|
|
||||||
|
|
||||||
// TODO: create a sessions.close that doesn't rm the userDataDir
|
|
||||||
|
|
||||||
destroy: async (id: string): Promise<boolean> => {
|
|
||||||
const { browser, userDataDir } = sessionCache[id]
|
|
||||||
if (browser) {
|
|
||||||
await browser.close()
|
|
||||||
delete sessionCache[id]
|
|
||||||
if (userDataDir) {
|
|
||||||
const userDataDirPath = userDataDirFromId(id)
|
|
||||||
try {
|
|
||||||
// for some reason this keeps an error from being thrown in Windows, figures
|
|
||||||
await sleep(5000)
|
|
||||||
deleteFolderRecursive(userDataDirPath)
|
|
||||||
} catch (e) {
|
|
||||||
console.error(e)
|
|
||||||
throw Error(`Error deleting browser session folder. ${e.message}`)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
},
|
|
||||||
|
|
||||||
get: (id: string): SessionsCacheItem | false => sessionCache[id] && sessionCache[id] || false
|
|
||||||
}
|
|
||||||
82
src/sessions.py
Normal file
82
src/sessions.py
Normal file
@@ -0,0 +1,82 @@
|
|||||||
|
import logging
|
||||||
|
from dataclasses import dataclass
|
||||||
|
from datetime import datetime, timedelta
|
||||||
|
from typing import Optional, Tuple
|
||||||
|
from uuid import uuid1
|
||||||
|
|
||||||
|
from selenium.webdriver.chrome.webdriver import WebDriver
|
||||||
|
|
||||||
|
import utils
|
||||||
|
|
||||||
|
|
||||||
|
@dataclass
|
||||||
|
class Session:
|
||||||
|
session_id: str
|
||||||
|
driver: WebDriver
|
||||||
|
created_at: datetime
|
||||||
|
|
||||||
|
def lifetime(self) -> timedelta:
|
||||||
|
return datetime.now() - self.created_at
|
||||||
|
|
||||||
|
|
||||||
|
class SessionsStorage:
|
||||||
|
"""SessionsStorage creates, stores and process all the sessions"""
|
||||||
|
|
||||||
|
def __init__(self):
|
||||||
|
self.sessions = {}
|
||||||
|
|
||||||
|
def create(self, session_id: Optional[str] = None, proxy: Optional[dict] = None,
|
||||||
|
force_new: Optional[bool] = False) -> Tuple[Session, bool]:
|
||||||
|
"""create creates new instance of WebDriver if necessary,
|
||||||
|
assign defined (or newly generated) session_id to the instance
|
||||||
|
and returns the session object. If a new session has been created
|
||||||
|
second argument is set to True.
|
||||||
|
|
||||||
|
Note: The function is idempotent, so in case if session_id
|
||||||
|
already exists in the storage a new instance of WebDriver won't be created
|
||||||
|
and existing session will be returned. Second argument defines if
|
||||||
|
new session has been created (True) or an existing one was used (False).
|
||||||
|
"""
|
||||||
|
session_id = session_id or str(uuid1())
|
||||||
|
|
||||||
|
if force_new:
|
||||||
|
self.destroy(session_id)
|
||||||
|
|
||||||
|
if self.exists(session_id):
|
||||||
|
return self.sessions[session_id], False
|
||||||
|
|
||||||
|
driver = utils.get_webdriver(proxy)
|
||||||
|
created_at = datetime.now()
|
||||||
|
session = Session(session_id, driver, created_at)
|
||||||
|
|
||||||
|
self.sessions[session_id] = session
|
||||||
|
|
||||||
|
return session, True
|
||||||
|
|
||||||
|
def exists(self, session_id: str) -> bool:
|
||||||
|
return session_id in self.sessions
|
||||||
|
|
||||||
|
def destroy(self, session_id: str) -> bool:
|
||||||
|
"""destroy closes the driver instance and removes session from the storage.
|
||||||
|
The function is noop if session_id doesn't exist.
|
||||||
|
The function returns True if session was found and destroyed,
|
||||||
|
and False if session_id wasn't found.
|
||||||
|
"""
|
||||||
|
if not self.exists(session_id):
|
||||||
|
return False
|
||||||
|
|
||||||
|
session = self.sessions.pop(session_id)
|
||||||
|
session.driver.quit()
|
||||||
|
return True
|
||||||
|
|
||||||
|
def get(self, session_id: str, ttl: Optional[timedelta] = None) -> Tuple[Session, bool]:
|
||||||
|
session, fresh = self.create(session_id)
|
||||||
|
|
||||||
|
if ttl is not None and not fresh and session.lifetime() > ttl:
|
||||||
|
logging.debug(f'session\'s lifetime has expired, so the session is recreated (session_id={session_id})')
|
||||||
|
session, fresh = self.create(session_id, force_new=True)
|
||||||
|
|
||||||
|
return session, fresh
|
||||||
|
|
||||||
|
def session_ids(self) -> list[str]:
|
||||||
|
return list(self.sessions.keys())
|
||||||
632
src/tests.py
Normal file
632
src/tests.py
Normal file
@@ -0,0 +1,632 @@
|
|||||||
|
import unittest
|
||||||
|
from typing import Optional
|
||||||
|
|
||||||
|
from webtest import TestApp
|
||||||
|
|
||||||
|
from dtos import IndexResponse, HealthResponse, V1ResponseBase, STATUS_OK, STATUS_ERROR
|
||||||
|
import flaresolverr
|
||||||
|
import utils
|
||||||
|
|
||||||
|
|
||||||
|
def _find_obj_by_key(key: str, value: str, _list: list) -> Optional[dict]:
|
||||||
|
for obj in _list:
|
||||||
|
if obj[key] == value:
|
||||||
|
return obj
|
||||||
|
return None
|
||||||
|
|
||||||
|
|
||||||
|
class TestFlareSolverr(unittest.TestCase):
|
||||||
|
|
||||||
|
proxy_url = "http://127.0.0.1:8888"
|
||||||
|
proxy_socks_url = "socks5://127.0.0.1:1080"
|
||||||
|
google_url = "https://www.google.com"
|
||||||
|
post_url = "https://httpbin.org/post"
|
||||||
|
cloudflare_url = "https://nowsecure.nl"
|
||||||
|
cloudflare_url_2 = "https://idope.se/torrent-list/harry/"
|
||||||
|
ddos_guard_url = "https://anidex.info/"
|
||||||
|
fairlane_url = "https://www.pararius.com/apartments/amsterdam"
|
||||||
|
custom_cloudflare_url = "https://www.muziekfabriek.org"
|
||||||
|
cloudflare_blocked_url = "https://cpasbiens3.fr/index.php?do=search&subaction=search"
|
||||||
|
|
||||||
|
app = TestApp(flaresolverr.app)
|
||||||
|
# wait until the server is ready
|
||||||
|
app.get('/')
|
||||||
|
|
||||||
|
def test_wrong_endpoint(self):
|
||||||
|
res = self.app.get('/wrong', status=404)
|
||||||
|
self.assertEqual(res.status_code, 404)
|
||||||
|
|
||||||
|
body = res.json
|
||||||
|
self.assertEqual("Not found: '/wrong'", body['error'])
|
||||||
|
self.assertEqual(404, body['status_code'])
|
||||||
|
|
||||||
|
def test_index_endpoint(self):
|
||||||
|
res = self.app.get('/')
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = IndexResponse(res.json)
|
||||||
|
self.assertEqual("FlareSolverr is ready!", body.msg)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
self.assertIn("Chrome/", body.userAgent)
|
||||||
|
|
||||||
|
def test_health_endpoint(self):
|
||||||
|
res = self.app.get('/health')
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = HealthResponse(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
|
||||||
|
def test_v1_endpoint_wrong_cmd(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.bad",
|
||||||
|
"url": self.google_url
|
||||||
|
}, status=500)
|
||||||
|
self.assertEqual(res.status_code, 500)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_ERROR, body.status)
|
||||||
|
self.assertEqual("Error: Request parameter 'cmd' = 'request.bad' is invalid.", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_no_cloudflare(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.google_url
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge not detected!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.google_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn("<title>Google</title>", solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_cloudflare_js_1(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.cloudflare_url
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge solved!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.cloudflare_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn("<title>nowSecure</title>", solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
cf_cookie = _find_obj_by_key("name", "cf_clearance", solution.cookies)
|
||||||
|
self.assertIsNotNone(cf_cookie, "Cloudflare cookie not found")
|
||||||
|
self.assertGreater(len(cf_cookie["value"]), 30)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_cloudflare_js_2(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.cloudflare_url_2
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge solved!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.cloudflare_url_2, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn("<title>harry - idope torrent search</title>", solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
cf_cookie = _find_obj_by_key("name", "cf_clearance", solution.cookies)
|
||||||
|
self.assertIsNotNone(cf_cookie, "Cloudflare cookie not found")
|
||||||
|
self.assertGreater(len(cf_cookie["value"]), 30)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_ddos_guard_js(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.ddos_guard_url
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge solved!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.ddos_guard_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn("<title>AniDex</title>", solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
cf_cookie = _find_obj_by_key("name", "__ddg1_", solution.cookies)
|
||||||
|
self.assertIsNotNone(cf_cookie, "DDOS-Guard cookie not found")
|
||||||
|
self.assertGreater(len(cf_cookie["value"]), 10)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_fairlane_js(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.fairlane_url
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge solved!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.fairlane_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn("<title>Rental Apartments Amsterdam</title>", solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
cf_cookie = _find_obj_by_key("name", "fl_pass_v2_b", solution.cookies)
|
||||||
|
self.assertIsNotNone(cf_cookie, "Fairlane cookie not found")
|
||||||
|
self.assertGreater(len(cf_cookie["value"]), 50)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_custom_cloudflare_js(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.custom_cloudflare_url
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge solved!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.custom_cloudflare_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn("<title>MuziekFabriek : Aanmelden</title>", solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
cf_cookie = _find_obj_by_key("name", "ct_anti_ddos_key", solution.cookies)
|
||||||
|
self.assertIsNotNone(cf_cookie, "Custom Cloudflare cookie not found")
|
||||||
|
self.assertGreater(len(cf_cookie["value"]), 10)
|
||||||
|
|
||||||
|
# todo: test Cmd 'request.get' should return fail with Cloudflare CAPTCHA
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_cloudflare_blocked(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.cloudflare_blocked_url
|
||||||
|
}, status=500)
|
||||||
|
self.assertEqual(res.status_code, 500)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_ERROR, body.status)
|
||||||
|
self.assertEqual("Error: Error solving the challenge. Cloudflare has blocked this request. "
|
||||||
|
"Probably your IP is banned for this site, check in your web browser.", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_cookies_param(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.google_url,
|
||||||
|
"cookies": [
|
||||||
|
{
|
||||||
|
"name": "testcookie1",
|
||||||
|
"value": "testvalue1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "testcookie2",
|
||||||
|
"value": "testvalue2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge not detected!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.google_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn("<title>Google</title>", solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 1)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
user_cookie1 = _find_obj_by_key("name", "testcookie1", solution.cookies)
|
||||||
|
self.assertIsNotNone(user_cookie1, "User cookie 1 not found")
|
||||||
|
self.assertEqual("testvalue1", user_cookie1["value"])
|
||||||
|
|
||||||
|
user_cookie2 = _find_obj_by_key("name", "testcookie2", solution.cookies)
|
||||||
|
self.assertIsNotNone(user_cookie2, "User cookie 2 not found")
|
||||||
|
self.assertEqual("testvalue2", user_cookie2["value"])
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_returnOnlyCookies_param(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.google_url,
|
||||||
|
"returnOnlyCookies": True
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge not detected!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.google_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIsNone(solution.headers)
|
||||||
|
self.assertIsNone(solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_proxy_http_param(self):
|
||||||
|
"""
|
||||||
|
To configure TinyProxy in local:
|
||||||
|
* sudo vim /etc/tinyproxy/tinyproxy.conf
|
||||||
|
* edit => LogFile "/tmp/tinyproxy.log"
|
||||||
|
* edit => Syslog Off
|
||||||
|
* sudo tinyproxy -d
|
||||||
|
* sudo tail -f /tmp/tinyproxy.log
|
||||||
|
"""
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.google_url,
|
||||||
|
"proxy": {
|
||||||
|
"url": self.proxy_url
|
||||||
|
}
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge not detected!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.google_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn("<title>Google</title>", solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_proxy_http_param_with_credentials(self):
|
||||||
|
"""
|
||||||
|
To configure TinyProxy in local:
|
||||||
|
* sudo vim /etc/tinyproxy/tinyproxy.conf
|
||||||
|
* edit => LogFile "/tmp/tinyproxy.log"
|
||||||
|
* edit => Syslog Off
|
||||||
|
* add => BasicAuth testuser testpass
|
||||||
|
* sudo tinyproxy -d
|
||||||
|
* sudo tail -f /tmp/tinyproxy.log
|
||||||
|
"""
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.google_url,
|
||||||
|
"proxy": {
|
||||||
|
"url": self.proxy_url,
|
||||||
|
"username": "testuser",
|
||||||
|
"password": "testpass"
|
||||||
|
}
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge not detected!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.google_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn("<title>Google</title>", solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_proxy_socks_param(self):
|
||||||
|
"""
|
||||||
|
To configure Dante in local:
|
||||||
|
* https://linuxhint.com/set-up-a-socks5-proxy-on-ubuntu-with-dante/
|
||||||
|
* sudo vim /etc/sockd.conf
|
||||||
|
* sudo systemctl restart sockd.service
|
||||||
|
* curl --socks5 socks5://127.0.0.1:1080 https://www.google.com
|
||||||
|
"""
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.google_url,
|
||||||
|
"proxy": {
|
||||||
|
"url": self.proxy_socks_url
|
||||||
|
}
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge not detected!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.google_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn("<title>Google</title>", solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_proxy_wrong_param(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.google_url,
|
||||||
|
"proxy": {
|
||||||
|
"url": "http://127.0.0.1:43210"
|
||||||
|
}
|
||||||
|
}, status=500)
|
||||||
|
self.assertEqual(res.status_code, 500)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_ERROR, body.status)
|
||||||
|
self.assertIn("Error: Error solving the challenge. Message: unknown error: net::ERR_PROXY_CONNECTION_FAILED",
|
||||||
|
body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_fail_timeout(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.google_url,
|
||||||
|
"maxTimeout": 10
|
||||||
|
}, status=500)
|
||||||
|
self.assertEqual(res.status_code, 500)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_ERROR, body.status)
|
||||||
|
self.assertEqual("Error: Error solving the challenge. Timeout after 0.01 seconds.", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_fail_bad_domain(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": "https://www.google.combad"
|
||||||
|
}, status=500)
|
||||||
|
self.assertEqual(res.status_code, 500)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_ERROR, body.status)
|
||||||
|
self.assertIn("Message: unknown error: net::ERR_NAME_NOT_RESOLVED", body.message)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_deprecated_param(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": self.google_url,
|
||||||
|
"userAgent": "Test User-Agent" # was removed in v2, not used
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge not detected!", body.message)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_post_no_cloudflare(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.post",
|
||||||
|
"url": self.post_url,
|
||||||
|
"postData": "param1=value1¶m2=value2"
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge not detected!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.post_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn('"form": {\n "param1": "value1", \n "param2": "value2"\n }', solution.response)
|
||||||
|
self.assertEqual(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_post_cloudflare(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.post",
|
||||||
|
"url": self.cloudflare_url,
|
||||||
|
"postData": "param1=value1¶m2=value2"
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge solved!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(self.cloudflare_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn("<title>405 Not Allowed</title>", solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
cf_cookie = _find_obj_by_key("name", "cf_clearance", solution.cookies)
|
||||||
|
self.assertIsNotNone(cf_cookie, "Cloudflare cookie not found")
|
||||||
|
self.assertGreater(len(cf_cookie["value"]), 30)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_post_fail_no_post_data(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.post",
|
||||||
|
"url": self.google_url
|
||||||
|
}, status=500)
|
||||||
|
self.assertEqual(res.status_code, 500)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_ERROR, body.status)
|
||||||
|
self.assertIn("Request parameter 'postData' is mandatory in 'request.post' command", body.message)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_post_deprecated_param(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.post",
|
||||||
|
"url": self.google_url,
|
||||||
|
"postData": "param1=value1¶m2=value2",
|
||||||
|
"userAgent": "Test User-Agent" # was removed in v2, not used
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge not detected!", body.message)
|
||||||
|
|
||||||
|
def test_v1_endpoint_sessions_create_without_session(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "sessions.create"
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Session created successfully.", body.message)
|
||||||
|
self.assertIsNotNone(body.session)
|
||||||
|
|
||||||
|
def test_v1_endpoint_sessions_create_with_session(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "sessions.create",
|
||||||
|
"session": "test_create_session"
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Session created successfully.", body.message)
|
||||||
|
self.assertEqual(body.session, "test_create_session")
|
||||||
|
|
||||||
|
def test_v1_endpoint_sessions_create_with_proxy(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "sessions.create",
|
||||||
|
"proxy": {
|
||||||
|
"url": self.proxy_url
|
||||||
|
}
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Session created successfully.", body.message)
|
||||||
|
self.assertIsNotNone(body.session)
|
||||||
|
|
||||||
|
def test_v1_endpoint_sessions_list(self):
|
||||||
|
self.app.post_json('/v1', {
|
||||||
|
"cmd": "sessions.create",
|
||||||
|
"session": "test_list_sessions"
|
||||||
|
})
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "sessions.list"
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("", body.message)
|
||||||
|
self.assertGreaterEqual(len(body.sessions), 1)
|
||||||
|
self.assertIn("test_list_sessions", body.sessions)
|
||||||
|
|
||||||
|
def test_v1_endpoint_sessions_destroy_existing_session(self):
|
||||||
|
self.app.post_json('/v1', {
|
||||||
|
"cmd": "sessions.create",
|
||||||
|
"session": "test_destroy_sessions"
|
||||||
|
})
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "sessions.destroy",
|
||||||
|
"session": "test_destroy_sessions"
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("The session has been removed.", body.message)
|
||||||
|
|
||||||
|
def test_v1_endpoint_sessions_destroy_non_existing_session(self):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "sessions.destroy",
|
||||||
|
"session": "non_existing_session_name"
|
||||||
|
}, status=500)
|
||||||
|
self.assertEqual(res.status_code, 500)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_ERROR, body.status)
|
||||||
|
self.assertEqual("Error: The session doesn't exist.", body.message)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_with_session(self):
|
||||||
|
self.app.post_json('/v1', {
|
||||||
|
"cmd": "sessions.create",
|
||||||
|
"session": "test_request_sessions"
|
||||||
|
})
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"session": "test_request_sessions",
|
||||||
|
"url": self.google_url
|
||||||
|
})
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
unittest.main()
|
||||||
102
src/tests_sites.py
Normal file
102
src/tests_sites.py
Normal file
@@ -0,0 +1,102 @@
|
|||||||
|
import unittest
|
||||||
|
|
||||||
|
from webtest import TestApp
|
||||||
|
|
||||||
|
from dtos import V1ResponseBase, STATUS_OK
|
||||||
|
import flaresolverr
|
||||||
|
import utils
|
||||||
|
|
||||||
|
|
||||||
|
def _find_obj_by_key(key: str, value: str, _list: list) -> dict | None:
|
||||||
|
for obj in _list:
|
||||||
|
if obj[key] == value:
|
||||||
|
return obj
|
||||||
|
return None
|
||||||
|
|
||||||
|
|
||||||
|
def asset_cloudflare_solution(self, res, site_url, site_text):
|
||||||
|
self.assertEqual(res.status_code, 200)
|
||||||
|
|
||||||
|
body = V1ResponseBase(res.json)
|
||||||
|
self.assertEqual(STATUS_OK, body.status)
|
||||||
|
self.assertEqual("Challenge solved!", body.message)
|
||||||
|
self.assertGreater(body.startTimestamp, 10000)
|
||||||
|
self.assertGreaterEqual(body.endTimestamp, body.startTimestamp)
|
||||||
|
self.assertEqual(utils.get_flaresolverr_version(), body.version)
|
||||||
|
|
||||||
|
solution = body.solution
|
||||||
|
self.assertIn(site_url, solution.url)
|
||||||
|
self.assertEqual(solution.status, 200)
|
||||||
|
self.assertIs(len(solution.headers), 0)
|
||||||
|
self.assertIn(site_text, solution.response)
|
||||||
|
self.assertGreater(len(solution.cookies), 0)
|
||||||
|
self.assertIn("Chrome/", solution.userAgent)
|
||||||
|
|
||||||
|
cf_cookie = _find_obj_by_key("name", "cf_clearance", solution.cookies)
|
||||||
|
self.assertIsNotNone(cf_cookie, "Cloudflare cookie not found")
|
||||||
|
self.assertGreater(len(cf_cookie["value"]), 30)
|
||||||
|
|
||||||
|
|
||||||
|
class TestFlareSolverr(unittest.TestCase):
|
||||||
|
app = TestApp(flaresolverr.app)
|
||||||
|
# wait until the server is ready
|
||||||
|
app.get('/')
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_get_cloudflare(self):
|
||||||
|
sites_get = [
|
||||||
|
('nowsecure', 'https://nowsecure.nl', '<title>nowSecure</title>'),
|
||||||
|
('0magnet', 'https://0magnet.com/search?q=2022', 'Torrent Search - ØMagnet'),
|
||||||
|
('1337x', 'https://1337x.unblockit.cat/cat/Movies/time/desc/1/', ''),
|
||||||
|
('avistaz', 'https://avistaz.to/api/v1/jackett/torrents?in=1&type=0&search=',
|
||||||
|
'<title>Access denied</title>'),
|
||||||
|
('badasstorrents', 'https://badasstorrents.com/torrents/search/720p/date/desc',
|
||||||
|
'<title>Latest Torrents - BadassTorrents</title>'),
|
||||||
|
('bt4g', 'https://bt4g.org/search/2022', '<title>Download 2022 Torrents - BT4G</title>'),
|
||||||
|
('cinemaz', 'https://cinemaz.to/api/v1/jackett/torrents?in=1&type=0&search=',
|
||||||
|
'<title>Access denied</title>'),
|
||||||
|
('epublibre', 'https://epublibre.unblockit.cat/catalogo/index/0/nuevo/todos/sin/todos/--/ajax',
|
||||||
|
'<title>epublibre - catálogo</title>'),
|
||||||
|
('ext', 'https://ext.to/latest/?order=age&sort=desc',
|
||||||
|
'<title>Download Latest Torrents - EXT Torrents</title>'),
|
||||||
|
('extratorrent', 'https://extratorrent.st/search/?srt=added&order=desc&search=720p&new=1&x=0&y=0',
|
||||||
|
'Page 1 - ExtraTorrent'),
|
||||||
|
('idope', 'https://idope.se/browse.html', '<title>Recent Torrents</title>'),
|
||||||
|
('limetorrents', 'https://limetorrents.unblockninja.com/latest100',
|
||||||
|
'<title>Latest 100 torrents - LimeTorrents</title>'),
|
||||||
|
('privatehd', 'https://privatehd.to/api/v1/jackett/torrents?in=1&type=0&search=',
|
||||||
|
'<title>Access denied</title>'),
|
||||||
|
('torrentcore', 'https://torrentcore.xyz/index', '<title>Torrent[CORE] - Torrent community.</title>'),
|
||||||
|
('torrentqq223', 'https://torrentqq223.com/torrent/newest.html', 'https://torrentqq223.com/ads/'),
|
||||||
|
('36dm', 'https://www.36dm.club/1.html', 'https://www.36dm.club/yesterday-1.html'),
|
||||||
|
('erai-raws', 'https://www.erai-raws.info/feed/?type=magnet', '403 Forbidden'),
|
||||||
|
('teamos', 'https://www.teamos.xyz/torrents/?filename=&freeleech=',
|
||||||
|
'<title>Log in | Team OS : Your Only Destination To Custom OS !!</title>'),
|
||||||
|
('yts', 'https://yts.unblockninja.com/api/v2/list_movies.json?query_term=&limit=50&sort=date_added',
|
||||||
|
'{"movie_count":')
|
||||||
|
]
|
||||||
|
for site_name, site_url, site_text in sites_get:
|
||||||
|
with self.subTest(msg=site_name):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.get",
|
||||||
|
"url": site_url
|
||||||
|
})
|
||||||
|
asset_cloudflare_solution(self, res, site_url, site_text)
|
||||||
|
|
||||||
|
def test_v1_endpoint_request_post_cloudflare(self):
|
||||||
|
sites_post = [
|
||||||
|
('nnmclub', 'https://nnmclub.to/forum/tracker.php', '<title>Трекер :: NNM-Club</title>',
|
||||||
|
'prev_sd=0&prev_a=0&prev_my=0&prev_n=0&prev_shc=0&prev_shf=1&prev_sha=1&prev_shs=0&prev_shr=0&prev_sht=0&f%5B%5D=-1&o=1&s=2&tm=-1&shf=1&sha=1&ta=-1&sns=-1&sds=-1&nm=&pn=&submit=%CF%EE%E8%F1%EA')
|
||||||
|
]
|
||||||
|
|
||||||
|
for site_name, site_url, site_text, post_data in sites_post:
|
||||||
|
with self.subTest(msg=site_name):
|
||||||
|
res = self.app.post_json('/v1', {
|
||||||
|
"cmd": "request.post",
|
||||||
|
"url": site_url,
|
||||||
|
"postData": post_data
|
||||||
|
})
|
||||||
|
asset_cloudflare_solution(self, res, site_url, site_text)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
unittest.main()
|
||||||
@@ -1,9 +0,0 @@
|
|||||||
import { IncomingMessage, ServerResponse } from 'http';
|
|
||||||
|
|
||||||
export interface RequestContext {
|
|
||||||
req: IncomingMessage
|
|
||||||
res: ServerResponse
|
|
||||||
startTimestamp: number
|
|
||||||
errorResponse: (msg: string) => void,
|
|
||||||
successResponse: (msg: string, extendedProperties?: object) => void
|
|
||||||
}
|
|
||||||
921
src/undetected_chromedriver/__init__.py
Normal file
921
src/undetected_chromedriver/__init__.py
Normal file
@@ -0,0 +1,921 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
|
||||||
|
"""
|
||||||
|
|
||||||
|
888 888 d8b
|
||||||
|
888 888 Y8P
|
||||||
|
888 888
|
||||||
|
.d8888b 88888b. 888d888 .d88b. 88888b.d88b. .d88b. .d88888 888d888 888 888 888 .d88b. 888d888
|
||||||
|
d88P" 888 "88b 888P" d88""88b 888 "888 "88b d8P Y8b d88" 888 888P" 888 888 888 d8P Y8b 888P"
|
||||||
|
888 888 888 888 888 888 888 888 888 88888888 888 888 888 888 Y88 88P 88888888 888
|
||||||
|
Y88b. 888 888 888 Y88..88P 888 888 888 Y8b. Y88b 888 888 888 Y8bd8P Y8b. 888
|
||||||
|
"Y8888P 888 888 888 "Y88P" 888 888 888 "Y8888 "Y88888 888 888 Y88P "Y8888 888 88888888
|
||||||
|
|
||||||
|
by UltrafunkAmsterdam (https://github.com/ultrafunkamsterdam)
|
||||||
|
|
||||||
|
"""
|
||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
|
||||||
|
__version__ = "3.5.5"
|
||||||
|
|
||||||
|
import json
|
||||||
|
import logging
|
||||||
|
import os
|
||||||
|
import pathlib
|
||||||
|
import re
|
||||||
|
import shutil
|
||||||
|
import subprocess
|
||||||
|
import sys
|
||||||
|
import tempfile
|
||||||
|
import time
|
||||||
|
from weakref import finalize
|
||||||
|
|
||||||
|
import selenium.webdriver.chrome.service
|
||||||
|
import selenium.webdriver.chrome.webdriver
|
||||||
|
from selenium.webdriver.common.by import By
|
||||||
|
import selenium.webdriver.chromium.service
|
||||||
|
import selenium.webdriver.remote.command
|
||||||
|
import selenium.webdriver.remote.webdriver
|
||||||
|
|
||||||
|
from .cdp import CDP
|
||||||
|
from .dprocess import start_detached
|
||||||
|
from .options import ChromeOptions
|
||||||
|
from .patcher import IS_POSIX
|
||||||
|
from .patcher import Patcher
|
||||||
|
from .reactor import Reactor
|
||||||
|
from .webelement import UCWebElement
|
||||||
|
from .webelement import WebElement
|
||||||
|
|
||||||
|
|
||||||
|
__all__ = (
|
||||||
|
"Chrome",
|
||||||
|
"ChromeOptions",
|
||||||
|
"Patcher",
|
||||||
|
"Reactor",
|
||||||
|
"CDP",
|
||||||
|
"find_chrome_executable",
|
||||||
|
)
|
||||||
|
|
||||||
|
logger = logging.getLogger("uc")
|
||||||
|
logger.setLevel(logging.getLogger().getEffectiveLevel())
|
||||||
|
|
||||||
|
|
||||||
|
class Chrome(selenium.webdriver.chrome.webdriver.WebDriver):
|
||||||
|
"""
|
||||||
|
|
||||||
|
Controls the ChromeDriver and allows you to drive the browser.
|
||||||
|
|
||||||
|
The webdriver file will be downloaded by this module automatically,
|
||||||
|
you do not need to specify this. however, you may if you wish.
|
||||||
|
|
||||||
|
Attributes
|
||||||
|
----------
|
||||||
|
|
||||||
|
Methods
|
||||||
|
-------
|
||||||
|
|
||||||
|
reconnect()
|
||||||
|
|
||||||
|
this can be useful in case of heavy detection methods
|
||||||
|
-stops the chromedriver service which runs in the background
|
||||||
|
-starts the chromedriver service which runs in the background
|
||||||
|
-recreate session
|
||||||
|
|
||||||
|
|
||||||
|
start_session(capabilities=None, browser_profile=None)
|
||||||
|
|
||||||
|
differentiates from the regular method in that it does not
|
||||||
|
require a capabilities argument. The capabilities are automatically
|
||||||
|
recreated from the options at creation time.
|
||||||
|
|
||||||
|
--------------------------------------------------------------------------
|
||||||
|
NOTE:
|
||||||
|
Chrome has everything included to work out of the box.
|
||||||
|
it does not `need` customizations.
|
||||||
|
any customizations MAY lead to trigger bot migitation systems.
|
||||||
|
|
||||||
|
--------------------------------------------------------------------------
|
||||||
|
"""
|
||||||
|
|
||||||
|
_instances = set()
|
||||||
|
session_id = None
|
||||||
|
debug = False
|
||||||
|
|
||||||
|
def __init__(
|
||||||
|
self,
|
||||||
|
options=None,
|
||||||
|
user_data_dir=None,
|
||||||
|
driver_executable_path=None,
|
||||||
|
browser_executable_path=None,
|
||||||
|
port=0,
|
||||||
|
enable_cdp_events=False,
|
||||||
|
# service_args=None,
|
||||||
|
# service_creationflags=None,
|
||||||
|
desired_capabilities=None,
|
||||||
|
advanced_elements=False,
|
||||||
|
# service_log_path=None,
|
||||||
|
keep_alive=True,
|
||||||
|
log_level=0,
|
||||||
|
headless=False,
|
||||||
|
version_main=None,
|
||||||
|
patcher_force_close=False,
|
||||||
|
suppress_welcome=True,
|
||||||
|
use_subprocess=False,
|
||||||
|
debug=False,
|
||||||
|
no_sandbox=True,
|
||||||
|
windows_headless=False,
|
||||||
|
user_multi_procs: bool = False,
|
||||||
|
**kw,
|
||||||
|
):
|
||||||
|
"""
|
||||||
|
Creates a new instance of the chrome driver.
|
||||||
|
|
||||||
|
Starts the service and then creates new instance of chrome driver.
|
||||||
|
|
||||||
|
Parameters
|
||||||
|
----------
|
||||||
|
|
||||||
|
options: ChromeOptions, optional, default: None - automatic useful defaults
|
||||||
|
this takes an instance of ChromeOptions, mainly to customize browser behavior.
|
||||||
|
anything other dan the default, for example extensions or startup options
|
||||||
|
are not supported in case of failure, and can probably lowers your undetectability.
|
||||||
|
|
||||||
|
|
||||||
|
user_data_dir: str , optional, default: None (creates temp profile)
|
||||||
|
if user_data_dir is a path to a valid chrome profile directory, use it,
|
||||||
|
and turn off automatic removal mechanism at exit.
|
||||||
|
|
||||||
|
driver_executable_path: str, optional, default: None(=downloads and patches new binary)
|
||||||
|
|
||||||
|
browser_executable_path: str, optional, default: None - use find_chrome_executable
|
||||||
|
Path to the browser executable.
|
||||||
|
If not specified, make sure the executable's folder is in $PATH
|
||||||
|
|
||||||
|
port: int, optional, default: 0
|
||||||
|
port to be used by the chromedriver executable, this is NOT the debugger port.
|
||||||
|
leave it at 0 unless you know what you are doing.
|
||||||
|
the default value of 0 automatically picks an available port.
|
||||||
|
|
||||||
|
enable_cdp_events: bool, default: False
|
||||||
|
:: currently for chrome only
|
||||||
|
this enables the handling of wire messages
|
||||||
|
when enabled, you can subscribe to CDP events by using:
|
||||||
|
|
||||||
|
driver.add_cdp_listener("Network.dataReceived", yourcallback)
|
||||||
|
# yourcallback is an callable which accepts exactly 1 dict as parameter
|
||||||
|
|
||||||
|
|
||||||
|
service_args: list of str, optional, default: None
|
||||||
|
arguments to pass to the driver service
|
||||||
|
|
||||||
|
desired_capabilities: dict, optional, default: None - auto from config
|
||||||
|
Dictionary object with non-browser specific capabilities only, such as "item" or "loggingPref".
|
||||||
|
|
||||||
|
advanced_elements: bool, optional, default: False
|
||||||
|
makes it easier to recognize elements like you know them from html/browser inspection, especially when working
|
||||||
|
in an interactive environment
|
||||||
|
|
||||||
|
default webelement repr:
|
||||||
|
<selenium.webdriver.remote.webelement.WebElement (session="85ff0f671512fa535630e71ee951b1f2", element="6357cb55-92c3-4c0f-9416-b174f9c1b8c4")>
|
||||||
|
|
||||||
|
advanced webelement repr
|
||||||
|
<WebElement(<a class="mobile-show-inline-block mc-update-infos init-ok" href="#" id="main-cat-switcher-mobile">)>
|
||||||
|
|
||||||
|
note: when retrieving large amounts of elements ( example: find_elements_by_tag("*") ) and print them, it does take a little more time.
|
||||||
|
|
||||||
|
|
||||||
|
service_log_path: str, optional, default: None
|
||||||
|
path to log information from the driver.
|
||||||
|
|
||||||
|
keep_alive: bool, optional, default: True
|
||||||
|
Whether to configure ChromeRemoteConnection to use HTTP keep-alive.
|
||||||
|
|
||||||
|
log_level: int, optional, default: adapts to python global log level
|
||||||
|
|
||||||
|
headless: bool, optional, default: False
|
||||||
|
can also be specified in the options instance.
|
||||||
|
Specify whether you want to use the browser in headless mode.
|
||||||
|
warning: this lowers undetectability and not fully supported.
|
||||||
|
|
||||||
|
version_main: int, optional, default: None (=auto)
|
||||||
|
if you, for god knows whatever reason, use
|
||||||
|
an older version of Chrome. You can specify it's full rounded version number
|
||||||
|
here. Example: 87 for all versions of 87
|
||||||
|
|
||||||
|
patcher_force_close: bool, optional, default: False
|
||||||
|
instructs the patcher to do whatever it can to access the chromedriver binary
|
||||||
|
if the file is locked, it will force shutdown all instances.
|
||||||
|
setting it is not recommended, unless you know the implications and think
|
||||||
|
you might need it.
|
||||||
|
|
||||||
|
suppress_welcome: bool, optional , default: True
|
||||||
|
a "welcome" alert might show up on *nix-like systems asking whether you want to set
|
||||||
|
chrome as your default browser, and if you want to send even more data to google.
|
||||||
|
now, in case you are nag-fetishist, or a diagnostics data feeder to google, you can set this to False.
|
||||||
|
Note: if you don't handle the nag screen in time, the browser loses it's connection and throws an Exception.
|
||||||
|
|
||||||
|
use_subprocess: bool, optional , default: True,
|
||||||
|
|
||||||
|
False (the default) makes sure Chrome will get it's own process (so no subprocess of chromedriver.exe or python
|
||||||
|
This fixes a LOT of issues, like multithreaded run, but mst importantly. shutting corectly after
|
||||||
|
program exits or using .quit()
|
||||||
|
you should be knowing what you're doing, and know how python works.
|
||||||
|
|
||||||
|
unfortunately, there is always an edge case in which one would like to write an single script with the only contents being:
|
||||||
|
--start script--
|
||||||
|
import undetected_chromedriver as uc
|
||||||
|
d = uc.Chrome()
|
||||||
|
d.get('https://somesite/')
|
||||||
|
---end script --
|
||||||
|
|
||||||
|
and will be greeted with an error, since the program exists before chrome has a change to launch.
|
||||||
|
in that case you can set this to `True`. The browser will start via subprocess, and will keep running most of times.
|
||||||
|
! setting it to True comes with NO support when being detected. !
|
||||||
|
|
||||||
|
no_sandbox: bool, optional, default=True
|
||||||
|
uses the --no-sandbox option, and additionally does suppress the "unsecure option" status bar
|
||||||
|
this option has a default of True since many people seem to run this as root (....) , and chrome does not start
|
||||||
|
when running as root without using --no-sandbox flag.
|
||||||
|
|
||||||
|
user_multi_procs:
|
||||||
|
set to true when you are using multithreads/multiprocessing
|
||||||
|
ensures not all processes are trying to modify a binary which is in use by another.
|
||||||
|
for this to work. YOU MUST HAVE AT LEAST 1 UNDETECTED_CHROMEDRIVER BINARY IN YOUR ROAMING DATA FOLDER.
|
||||||
|
this requirement can be easily satisfied, by just running this program "normal" and close/kill it.
|
||||||
|
|
||||||
|
|
||||||
|
"""
|
||||||
|
|
||||||
|
finalize(self, self._ensure_close, self)
|
||||||
|
self.debug = debug
|
||||||
|
self.patcher = Patcher(
|
||||||
|
executable_path=driver_executable_path,
|
||||||
|
force=patcher_force_close,
|
||||||
|
version_main=version_main,
|
||||||
|
user_multi_procs=user_multi_procs,
|
||||||
|
)
|
||||||
|
# self.patcher.auto(user_multiprocess = user_multi_num_procs)
|
||||||
|
self.patcher.auto()
|
||||||
|
|
||||||
|
# self.patcher = patcher
|
||||||
|
if not options:
|
||||||
|
options = ChromeOptions()
|
||||||
|
|
||||||
|
try:
|
||||||
|
if hasattr(options, "_session") and options._session is not None:
|
||||||
|
# prevent reuse of options,
|
||||||
|
# as it just appends arguments, not replace them
|
||||||
|
# you'll get conflicts starting chrome
|
||||||
|
raise RuntimeError("you cannot reuse the ChromeOptions object")
|
||||||
|
except AttributeError:
|
||||||
|
pass
|
||||||
|
|
||||||
|
options._session = self
|
||||||
|
|
||||||
|
if not options.debugger_address:
|
||||||
|
debug_port = (
|
||||||
|
port
|
||||||
|
if port != 0
|
||||||
|
else selenium.webdriver.common.service.utils.free_port()
|
||||||
|
)
|
||||||
|
debug_host = "127.0.0.1"
|
||||||
|
options.debugger_address = "%s:%d" % (debug_host, debug_port)
|
||||||
|
else:
|
||||||
|
debug_host, debug_port = options.debugger_address.split(":")
|
||||||
|
debug_port = int(debug_port)
|
||||||
|
|
||||||
|
if enable_cdp_events:
|
||||||
|
options.set_capability(
|
||||||
|
"goog:loggingPrefs", {"performance": "ALL", "browser": "ALL"}
|
||||||
|
)
|
||||||
|
|
||||||
|
options.add_argument("--remote-debugging-host=%s" % debug_host)
|
||||||
|
options.add_argument("--remote-debugging-port=%s" % debug_port)
|
||||||
|
|
||||||
|
if user_data_dir:
|
||||||
|
options.add_argument("--user-data-dir=%s" % user_data_dir)
|
||||||
|
|
||||||
|
language, keep_user_data_dir = None, bool(user_data_dir)
|
||||||
|
|
||||||
|
# see if a custom user profile is specified in options
|
||||||
|
for arg in options.arguments:
|
||||||
|
|
||||||
|
if any([_ in arg for _ in ("--headless", "headless")]):
|
||||||
|
options.arguments.remove(arg)
|
||||||
|
options.headless = True
|
||||||
|
|
||||||
|
if "lang" in arg:
|
||||||
|
m = re.search("(?:--)?lang(?:[ =])?(.*)", arg)
|
||||||
|
try:
|
||||||
|
language = m[1]
|
||||||
|
except IndexError:
|
||||||
|
logger.debug("will set the language to en-US,en;q=0.9")
|
||||||
|
language = "en-US,en;q=0.9"
|
||||||
|
|
||||||
|
if "user-data-dir" in arg:
|
||||||
|
m = re.search("(?:--)?user-data-dir(?:[ =])?(.*)", arg)
|
||||||
|
try:
|
||||||
|
user_data_dir = m[1]
|
||||||
|
logger.debug(
|
||||||
|
"user-data-dir found in user argument %s => %s" % (arg, m[1])
|
||||||
|
)
|
||||||
|
keep_user_data_dir = True
|
||||||
|
|
||||||
|
except IndexError:
|
||||||
|
logger.debug(
|
||||||
|
"no user data dir could be extracted from supplied argument %s "
|
||||||
|
% arg
|
||||||
|
)
|
||||||
|
|
||||||
|
if not user_data_dir:
|
||||||
|
# backward compatiblity
|
||||||
|
# check if an old uc.ChromeOptions is used, and extract the user data dir
|
||||||
|
|
||||||
|
if hasattr(options, "user_data_dir") and getattr(
|
||||||
|
options, "user_data_dir", None
|
||||||
|
):
|
||||||
|
import warnings
|
||||||
|
|
||||||
|
warnings.warn(
|
||||||
|
"using ChromeOptions.user_data_dir might stop working in future versions."
|
||||||
|
"use uc.Chrome(user_data_dir='/xyz/some/data') in case you need existing profile folder"
|
||||||
|
)
|
||||||
|
options.add_argument("--user-data-dir=%s" % options.user_data_dir)
|
||||||
|
keep_user_data_dir = True
|
||||||
|
logger.debug(
|
||||||
|
"user_data_dir property found in options object: %s" % user_data_dir
|
||||||
|
)
|
||||||
|
|
||||||
|
else:
|
||||||
|
user_data_dir = os.path.normpath(tempfile.mkdtemp())
|
||||||
|
keep_user_data_dir = False
|
||||||
|
arg = "--user-data-dir=%s" % user_data_dir
|
||||||
|
options.add_argument(arg)
|
||||||
|
logger.debug(
|
||||||
|
"created a temporary folder in which the user-data (profile) will be stored during this\n"
|
||||||
|
"session, and added it to chrome startup arguments: %s" % arg
|
||||||
|
)
|
||||||
|
|
||||||
|
if not language:
|
||||||
|
try:
|
||||||
|
import locale
|
||||||
|
|
||||||
|
language = locale.getdefaultlocale()[0].replace("_", "-")
|
||||||
|
except Exception:
|
||||||
|
pass
|
||||||
|
if not language:
|
||||||
|
language = "en-US"
|
||||||
|
|
||||||
|
options.add_argument("--lang=%s" % language)
|
||||||
|
|
||||||
|
if not options.binary_location:
|
||||||
|
options.binary_location = (
|
||||||
|
browser_executable_path or find_chrome_executable()
|
||||||
|
)
|
||||||
|
|
||||||
|
if not options.binary_location or not \
|
||||||
|
pathlib.Path(options.binary_location).exists():
|
||||||
|
raise FileNotFoundError(
|
||||||
|
"\n---------------------\n"
|
||||||
|
"Could not determine browser executable."
|
||||||
|
"\n---------------------\n"
|
||||||
|
"Make sure your browser is installed in the default location (path).\n"
|
||||||
|
"If you are sure about the browser executable, you can specify it using\n"
|
||||||
|
"the `browser_executable_path='{}` parameter.\n\n"
|
||||||
|
.format("/path/to/browser/executable" if IS_POSIX else "c:/path/to/your/browser.exe")
|
||||||
|
)
|
||||||
|
|
||||||
|
self._delay = 3
|
||||||
|
|
||||||
|
self.user_data_dir = user_data_dir
|
||||||
|
self.keep_user_data_dir = keep_user_data_dir
|
||||||
|
|
||||||
|
if suppress_welcome:
|
||||||
|
options.arguments.extend(["--no-default-browser-check", "--no-first-run"])
|
||||||
|
if no_sandbox:
|
||||||
|
options.arguments.extend(["--no-sandbox", "--test-type"])
|
||||||
|
|
||||||
|
if headless or getattr(options, 'headless', None):
|
||||||
|
#workaround until a better checking is found
|
||||||
|
try:
|
||||||
|
v_main = int(self.patcher.version_main) if self.patcher.version_main else 108
|
||||||
|
if v_main < 108:
|
||||||
|
options.add_argument("--headless=chrome")
|
||||||
|
elif v_main >= 108:
|
||||||
|
options.add_argument("--headless=new")
|
||||||
|
except:
|
||||||
|
logger.warning("could not detect version_main."
|
||||||
|
"therefore, we are assuming it is chrome 108 or higher")
|
||||||
|
options.add_argument("--headless=new")
|
||||||
|
|
||||||
|
options.add_argument("--window-size=1920,1080")
|
||||||
|
options.add_argument("--start-maximized")
|
||||||
|
options.add_argument("--no-sandbox")
|
||||||
|
# fixes "could not connect to chrome" error when running
|
||||||
|
# on linux using privileged user like root (which i don't recommend)
|
||||||
|
|
||||||
|
options.add_argument(
|
||||||
|
"--log-level=%d" % log_level
|
||||||
|
or divmod(logging.getLogger().getEffectiveLevel(), 10)[0]
|
||||||
|
)
|
||||||
|
|
||||||
|
if hasattr(options, "handle_prefs"):
|
||||||
|
options.handle_prefs(user_data_dir)
|
||||||
|
|
||||||
|
# fix exit_type flag to prevent tab-restore nag
|
||||||
|
try:
|
||||||
|
with open(
|
||||||
|
os.path.join(user_data_dir, "Default/Preferences"),
|
||||||
|
encoding="latin1",
|
||||||
|
mode="r+",
|
||||||
|
) as fs:
|
||||||
|
config = json.load(fs)
|
||||||
|
if config["profile"]["exit_type"] is not None:
|
||||||
|
# fixing the restore-tabs-nag
|
||||||
|
config["profile"]["exit_type"] = None
|
||||||
|
fs.seek(0, 0)
|
||||||
|
json.dump(config, fs)
|
||||||
|
fs.truncate() # the file might be shorter
|
||||||
|
logger.debug("fixed exit_type flag")
|
||||||
|
except Exception as e:
|
||||||
|
logger.debug("did not find a bad exit_type flag ")
|
||||||
|
|
||||||
|
self.options = options
|
||||||
|
|
||||||
|
if not desired_capabilities:
|
||||||
|
desired_capabilities = options.to_capabilities()
|
||||||
|
|
||||||
|
if not use_subprocess and not windows_headless:
|
||||||
|
self.browser_pid = start_detached(
|
||||||
|
options.binary_location, *options.arguments
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
startupinfo = None
|
||||||
|
if os.name == 'nt' and windows_headless:
|
||||||
|
# STARTUPINFO() is Windows only
|
||||||
|
startupinfo = subprocess.STARTUPINFO()
|
||||||
|
startupinfo.dwFlags |= subprocess.STARTF_USESHOWWINDOW
|
||||||
|
browser = subprocess.Popen(
|
||||||
|
[options.binary_location, *options.arguments],
|
||||||
|
stdin=subprocess.PIPE,
|
||||||
|
stdout=subprocess.PIPE,
|
||||||
|
stderr=subprocess.PIPE,
|
||||||
|
close_fds=IS_POSIX,
|
||||||
|
startupinfo=startupinfo
|
||||||
|
)
|
||||||
|
self.browser_pid = browser.pid
|
||||||
|
|
||||||
|
|
||||||
|
service = selenium.webdriver.chromium.service.ChromiumService(
|
||||||
|
self.patcher.executable_path
|
||||||
|
)
|
||||||
|
|
||||||
|
super(Chrome, self).__init__(
|
||||||
|
service=service,
|
||||||
|
options=options,
|
||||||
|
keep_alive=keep_alive,
|
||||||
|
)
|
||||||
|
|
||||||
|
self.reactor = None
|
||||||
|
|
||||||
|
if enable_cdp_events:
|
||||||
|
if logging.getLogger().getEffectiveLevel() == logging.DEBUG:
|
||||||
|
logging.getLogger(
|
||||||
|
"selenium.webdriver.remote.remote_connection"
|
||||||
|
).setLevel(20)
|
||||||
|
reactor = Reactor(self)
|
||||||
|
reactor.start()
|
||||||
|
self.reactor = reactor
|
||||||
|
|
||||||
|
if advanced_elements:
|
||||||
|
self._web_element_cls = UCWebElement
|
||||||
|
else:
|
||||||
|
self._web_element_cls = WebElement
|
||||||
|
|
||||||
|
if headless or getattr(options, 'headless', None):
|
||||||
|
self._configure_headless()
|
||||||
|
|
||||||
|
def _configure_headless(self):
|
||||||
|
orig_get = self.get
|
||||||
|
logger.info("setting properties for headless")
|
||||||
|
|
||||||
|
def get_wrapped(*args, **kwargs):
|
||||||
|
if self.execute_script("return navigator.webdriver"):
|
||||||
|
logger.info("patch navigator.webdriver")
|
||||||
|
self.execute_cdp_cmd(
|
||||||
|
"Page.addScriptToEvaluateOnNewDocument",
|
||||||
|
{
|
||||||
|
"source": """
|
||||||
|
|
||||||
|
Object.defineProperty(window, "navigator", {
|
||||||
|
Object.defineProperty(window, "navigator", {
|
||||||
|
value: new Proxy(navigator, {
|
||||||
|
has: (target, key) => (key === "webdriver" ? false : key in target),
|
||||||
|
get: (target, key) =>
|
||||||
|
key === "webdriver"
|
||||||
|
? false
|
||||||
|
: typeof target[key] === "function"
|
||||||
|
? target[key].bind(target)
|
||||||
|
: target[key],
|
||||||
|
}),
|
||||||
|
});
|
||||||
|
"""
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
logger.info("patch user-agent string")
|
||||||
|
self.execute_cdp_cmd(
|
||||||
|
"Network.setUserAgentOverride",
|
||||||
|
{
|
||||||
|
"userAgent": self.execute_script(
|
||||||
|
"return navigator.userAgent"
|
||||||
|
).replace("Headless", "")
|
||||||
|
},
|
||||||
|
)
|
||||||
|
self.execute_cdp_cmd(
|
||||||
|
"Page.addScriptToEvaluateOnNewDocument",
|
||||||
|
{
|
||||||
|
"source": """
|
||||||
|
Object.defineProperty(navigator, 'maxTouchPoints', {get: () => 1});
|
||||||
|
Object.defineProperty(navigator.connection, 'rtt', {get: () => 100});
|
||||||
|
|
||||||
|
// https://github.com/microlinkhq/browserless/blob/master/packages/goto/src/evasions/chrome-runtime.js
|
||||||
|
window.chrome = {
|
||||||
|
app: {
|
||||||
|
isInstalled: false,
|
||||||
|
InstallState: {
|
||||||
|
DISABLED: 'disabled',
|
||||||
|
INSTALLED: 'installed',
|
||||||
|
NOT_INSTALLED: 'not_installed'
|
||||||
|
},
|
||||||
|
RunningState: {
|
||||||
|
CANNOT_RUN: 'cannot_run',
|
||||||
|
READY_TO_RUN: 'ready_to_run',
|
||||||
|
RUNNING: 'running'
|
||||||
|
}
|
||||||
|
},
|
||||||
|
runtime: {
|
||||||
|
OnInstalledReason: {
|
||||||
|
CHROME_UPDATE: 'chrome_update',
|
||||||
|
INSTALL: 'install',
|
||||||
|
SHARED_MODULE_UPDATE: 'shared_module_update',
|
||||||
|
UPDATE: 'update'
|
||||||
|
},
|
||||||
|
OnRestartRequiredReason: {
|
||||||
|
APP_UPDATE: 'app_update',
|
||||||
|
OS_UPDATE: 'os_update',
|
||||||
|
PERIODIC: 'periodic'
|
||||||
|
},
|
||||||
|
PlatformArch: {
|
||||||
|
ARM: 'arm',
|
||||||
|
ARM64: 'arm64',
|
||||||
|
MIPS: 'mips',
|
||||||
|
MIPS64: 'mips64',
|
||||||
|
X86_32: 'x86-32',
|
||||||
|
X86_64: 'x86-64'
|
||||||
|
},
|
||||||
|
PlatformNaclArch: {
|
||||||
|
ARM: 'arm',
|
||||||
|
MIPS: 'mips',
|
||||||
|
MIPS64: 'mips64',
|
||||||
|
X86_32: 'x86-32',
|
||||||
|
X86_64: 'x86-64'
|
||||||
|
},
|
||||||
|
PlatformOs: {
|
||||||
|
ANDROID: 'android',
|
||||||
|
CROS: 'cros',
|
||||||
|
LINUX: 'linux',
|
||||||
|
MAC: 'mac',
|
||||||
|
OPENBSD: 'openbsd',
|
||||||
|
WIN: 'win'
|
||||||
|
},
|
||||||
|
RequestUpdateCheckStatus: {
|
||||||
|
NO_UPDATE: 'no_update',
|
||||||
|
THROTTLED: 'throttled',
|
||||||
|
UPDATE_AVAILABLE: 'update_available'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// https://github.com/microlinkhq/browserless/blob/master/packages/goto/src/evasions/navigator-permissions.js
|
||||||
|
if (!window.Notification) {
|
||||||
|
window.Notification = {
|
||||||
|
permission: 'denied'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
const originalQuery = window.navigator.permissions.query
|
||||||
|
window.navigator.permissions.__proto__.query = parameters =>
|
||||||
|
parameters.name === 'notifications'
|
||||||
|
? Promise.resolve({ state: window.Notification.permission })
|
||||||
|
: originalQuery(parameters)
|
||||||
|
|
||||||
|
const oldCall = Function.prototype.call
|
||||||
|
function call() {
|
||||||
|
return oldCall.apply(this, arguments)
|
||||||
|
}
|
||||||
|
Function.prototype.call = call
|
||||||
|
|
||||||
|
const nativeToStringFunctionString = Error.toString().replace(/Error/g, 'toString')
|
||||||
|
const oldToString = Function.prototype.toString
|
||||||
|
|
||||||
|
function functionToString() {
|
||||||
|
if (this === window.navigator.permissions.query) {
|
||||||
|
return 'function query() { [native code] }'
|
||||||
|
}
|
||||||
|
if (this === functionToString) {
|
||||||
|
return nativeToStringFunctionString
|
||||||
|
}
|
||||||
|
return oldCall.call(oldToString, this)
|
||||||
|
}
|
||||||
|
// eslint-disable-next-line
|
||||||
|
Function.prototype.toString = functionToString
|
||||||
|
"""
|
||||||
|
},
|
||||||
|
)
|
||||||
|
return orig_get(*args, **kwargs)
|
||||||
|
|
||||||
|
self.get = get_wrapped
|
||||||
|
|
||||||
|
# def _get_cdc_props(self):
|
||||||
|
# return self.execute_script(
|
||||||
|
# """
|
||||||
|
# let objectToInspect = window,
|
||||||
|
# result = [];
|
||||||
|
# while(objectToInspect !== null)
|
||||||
|
# { result = result.concat(Object.getOwnPropertyNames(objectToInspect));
|
||||||
|
# objectToInspect = Object.getPrototypeOf(objectToInspect); }
|
||||||
|
#
|
||||||
|
# return result.filter(i => i.match(/^([a-zA-Z]){27}(Array|Promise|Symbol)$/ig))
|
||||||
|
# """
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
# def _hook_remove_cdc_props(self):
|
||||||
|
# self.execute_cdp_cmd(
|
||||||
|
# "Page.addScriptToEvaluateOnNewDocument",
|
||||||
|
# {
|
||||||
|
# "source": """
|
||||||
|
# let objectToInspect = window,
|
||||||
|
# result = [];
|
||||||
|
# while(objectToInspect !== null)
|
||||||
|
# { result = result.concat(Object.getOwnPropertyNames(objectToInspect));
|
||||||
|
# objectToInspect = Object.getPrototypeOf(objectToInspect); }
|
||||||
|
# result.forEach(p => p.match(/^([a-zA-Z]){27}(Array|Promise|Symbol)$/ig)
|
||||||
|
# &&delete window[p]&&console.log('removed',p))
|
||||||
|
# """
|
||||||
|
# },
|
||||||
|
# )
|
||||||
|
|
||||||
|
def get(self, url):
|
||||||
|
# if self._get_cdc_props():
|
||||||
|
# self._hook_remove_cdc_props()
|
||||||
|
return super().get(url)
|
||||||
|
|
||||||
|
def add_cdp_listener(self, event_name, callback):
|
||||||
|
if (
|
||||||
|
self.reactor
|
||||||
|
and self.reactor is not None
|
||||||
|
and isinstance(self.reactor, Reactor)
|
||||||
|
):
|
||||||
|
self.reactor.add_event_handler(event_name, callback)
|
||||||
|
return self.reactor.handlers
|
||||||
|
return False
|
||||||
|
|
||||||
|
def clear_cdp_listeners(self):
|
||||||
|
if self.reactor and isinstance(self.reactor, Reactor):
|
||||||
|
self.reactor.handlers.clear()
|
||||||
|
|
||||||
|
def window_new(self):
|
||||||
|
self.execute(
|
||||||
|
selenium.webdriver.remote.command.Command.NEW_WINDOW, {"type": "window"}
|
||||||
|
)
|
||||||
|
|
||||||
|
def tab_new(self, url: str):
|
||||||
|
"""
|
||||||
|
this opens a url in a new tab.
|
||||||
|
apparently, that passes all tests directly!
|
||||||
|
|
||||||
|
Parameters
|
||||||
|
----------
|
||||||
|
url
|
||||||
|
|
||||||
|
Returns
|
||||||
|
-------
|
||||||
|
|
||||||
|
"""
|
||||||
|
if not hasattr(self, "cdp"):
|
||||||
|
from .cdp import CDP
|
||||||
|
|
||||||
|
cdp = CDP(self.options)
|
||||||
|
cdp.tab_new(url)
|
||||||
|
|
||||||
|
def reconnect(self, timeout=0.1):
|
||||||
|
try:
|
||||||
|
self.service.stop()
|
||||||
|
except Exception as e:
|
||||||
|
logger.debug(e)
|
||||||
|
time.sleep(timeout)
|
||||||
|
try:
|
||||||
|
self.service.start()
|
||||||
|
except Exception as e:
|
||||||
|
logger.debug(e)
|
||||||
|
|
||||||
|
try:
|
||||||
|
self.start_session()
|
||||||
|
except Exception as e:
|
||||||
|
logger.debug(e)
|
||||||
|
|
||||||
|
def start_session(self, capabilities=None, browser_profile=None):
|
||||||
|
if not capabilities:
|
||||||
|
capabilities = self.options.to_capabilities()
|
||||||
|
super(selenium.webdriver.chrome.webdriver.WebDriver, self).start_session(
|
||||||
|
capabilities
|
||||||
|
)
|
||||||
|
# super(Chrome, self).start_session(capabilities, browser_profile)
|
||||||
|
|
||||||
|
def find_elements_recursive(self, by, value):
|
||||||
|
"""
|
||||||
|
find elements in all frames
|
||||||
|
this is a generator function, which is needed
|
||||||
|
since if it would return a list of elements, they
|
||||||
|
will be stale on arrival.
|
||||||
|
using generator, when the element is returned we are in the correct frame
|
||||||
|
to use it directly
|
||||||
|
Args:
|
||||||
|
by: By
|
||||||
|
value: str
|
||||||
|
Returns: Generator[webelement.WebElement]
|
||||||
|
"""
|
||||||
|
def search_frame(f=None):
|
||||||
|
if not f:
|
||||||
|
# ensure we are on main content frame
|
||||||
|
self.switch_to.default_content()
|
||||||
|
else:
|
||||||
|
self.switch_to.frame(f)
|
||||||
|
for elem in self.find_elements(by, value):
|
||||||
|
yield elem
|
||||||
|
# switch back to main content, otherwise we will get StaleElementReferenceException
|
||||||
|
self.switch_to.default_content()
|
||||||
|
|
||||||
|
# search root frame
|
||||||
|
for elem in search_frame():
|
||||||
|
yield elem
|
||||||
|
# get iframes
|
||||||
|
frames = self.find_elements('css selector', 'iframe')
|
||||||
|
|
||||||
|
# search per frame
|
||||||
|
for f in frames:
|
||||||
|
for elem in search_frame(f):
|
||||||
|
yield elem
|
||||||
|
|
||||||
|
def quit(self):
|
||||||
|
try:
|
||||||
|
self.service.process.kill()
|
||||||
|
self.service.process.wait(5)
|
||||||
|
logger.debug("webdriver process ended")
|
||||||
|
except (AttributeError, RuntimeError, OSError):
|
||||||
|
pass
|
||||||
|
try:
|
||||||
|
self.reactor.event.set()
|
||||||
|
logger.debug("shutting down reactor")
|
||||||
|
except AttributeError:
|
||||||
|
pass
|
||||||
|
try:
|
||||||
|
os.kill(self.browser_pid, 15)
|
||||||
|
logger.debug("gracefully closed browser")
|
||||||
|
except Exception as e: # noqa
|
||||||
|
pass
|
||||||
|
# Force kill Chrome process in Windows
|
||||||
|
# https://github.com/FlareSolverr/FlareSolverr/issues/772
|
||||||
|
if os.name == 'nt':
|
||||||
|
try:
|
||||||
|
subprocess.call(['taskkill', '/f', '/pid', str(self.browser_pid)],
|
||||||
|
stdout=subprocess.DEVNULL,
|
||||||
|
stderr=subprocess.DEVNULL)
|
||||||
|
except Exception:
|
||||||
|
pass
|
||||||
|
if (
|
||||||
|
hasattr(self, "keep_user_data_dir")
|
||||||
|
and hasattr(self, "user_data_dir")
|
||||||
|
and not self.keep_user_data_dir
|
||||||
|
):
|
||||||
|
for _ in range(5):
|
||||||
|
try:
|
||||||
|
shutil.rmtree(self.user_data_dir, ignore_errors=False)
|
||||||
|
except FileNotFoundError:
|
||||||
|
pass
|
||||||
|
except (RuntimeError, OSError, PermissionError) as e:
|
||||||
|
logger.debug(
|
||||||
|
"When removing the temp profile, a %s occured: %s\nretrying..."
|
||||||
|
% (e.__class__.__name__, e)
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
logger.debug("successfully removed %s" % self.user_data_dir)
|
||||||
|
break
|
||||||
|
|
||||||
|
try:
|
||||||
|
time.sleep(0.1)
|
||||||
|
except OSError:
|
||||||
|
pass
|
||||||
|
|
||||||
|
# dereference patcher, so patcher can start cleaning up as well.
|
||||||
|
# this must come last, otherwise it will throw 'in use' errors
|
||||||
|
self.patcher = None
|
||||||
|
|
||||||
|
def __getattribute__(self, item):
|
||||||
|
if not super().__getattribute__("debug"):
|
||||||
|
return super().__getattribute__(item)
|
||||||
|
else:
|
||||||
|
import inspect
|
||||||
|
|
||||||
|
original = super().__getattribute__(item)
|
||||||
|
if inspect.ismethod(original) and not inspect.isclass(original):
|
||||||
|
|
||||||
|
def newfunc(*args, **kwargs):
|
||||||
|
logger.debug(
|
||||||
|
"calling %s with args %s and kwargs %s\n"
|
||||||
|
% (original.__qualname__, args, kwargs)
|
||||||
|
)
|
||||||
|
return original(*args, **kwargs)
|
||||||
|
|
||||||
|
return newfunc
|
||||||
|
return original
|
||||||
|
|
||||||
|
def __enter__(self):
|
||||||
|
return self
|
||||||
|
|
||||||
|
def __exit__(self, exc_type, exc_val, exc_tb):
|
||||||
|
self.service.stop()
|
||||||
|
time.sleep(self._delay)
|
||||||
|
self.service.start()
|
||||||
|
self.start_session()
|
||||||
|
|
||||||
|
def __hash__(self):
|
||||||
|
return hash(self.options.debugger_address)
|
||||||
|
|
||||||
|
def __dir__(self):
|
||||||
|
return object.__dir__(self)
|
||||||
|
|
||||||
|
def __del__(self):
|
||||||
|
try:
|
||||||
|
self.service.process.kill()
|
||||||
|
except: # noqa
|
||||||
|
pass
|
||||||
|
self.quit()
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def _ensure_close(cls, self):
|
||||||
|
# needs to be a classmethod so finalize can find the reference
|
||||||
|
logger.info("ensuring close")
|
||||||
|
if (
|
||||||
|
hasattr(self, "service")
|
||||||
|
and hasattr(self.service, "process")
|
||||||
|
and hasattr(self.service.process, "kill")
|
||||||
|
):
|
||||||
|
self.service.process.kill()
|
||||||
|
|
||||||
|
|
||||||
|
def find_chrome_executable():
|
||||||
|
"""
|
||||||
|
Finds the chrome, chrome beta, chrome canary, chromium executable
|
||||||
|
|
||||||
|
Returns
|
||||||
|
-------
|
||||||
|
executable_path : str
|
||||||
|
the full file path to found executable
|
||||||
|
|
||||||
|
"""
|
||||||
|
candidates = set()
|
||||||
|
if IS_POSIX:
|
||||||
|
for item in os.environ.get("PATH").split(os.pathsep):
|
||||||
|
for subitem in (
|
||||||
|
"google-chrome",
|
||||||
|
"chromium",
|
||||||
|
"chromium-browser",
|
||||||
|
"chrome",
|
||||||
|
"google-chrome-stable",
|
||||||
|
):
|
||||||
|
candidates.add(os.sep.join((item, subitem)))
|
||||||
|
if "darwin" in sys.platform:
|
||||||
|
candidates.update(
|
||||||
|
[
|
||||||
|
"/Applications/Google Chrome.app/Contents/MacOS/Google Chrome",
|
||||||
|
"/Applications/Chromium.app/Contents/MacOS/Chromium",
|
||||||
|
]
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
for item in map(
|
||||||
|
os.environ.get,
|
||||||
|
("PROGRAMFILES", "PROGRAMFILES(X86)", "LOCALAPPDATA", "PROGRAMW6432"),
|
||||||
|
):
|
||||||
|
if item is not None:
|
||||||
|
for subitem in (
|
||||||
|
"Google/Chrome/Application",
|
||||||
|
):
|
||||||
|
candidates.add(os.sep.join((item, subitem, "chrome.exe")))
|
||||||
|
for candidate in candidates:
|
||||||
|
logger.debug('checking if %s exists and is executable' % candidate)
|
||||||
|
if os.path.exists(candidate) and os.access(candidate, os.X_OK):
|
||||||
|
logger.debug('found! using %s' % candidate)
|
||||||
|
return os.path.normpath(candidate)
|
||||||
112
src/undetected_chromedriver/cdp.py
Normal file
112
src/undetected_chromedriver/cdp.py
Normal file
@@ -0,0 +1,112 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
# this module is part of undetected_chromedriver
|
||||||
|
|
||||||
|
import json
|
||||||
|
import logging
|
||||||
|
|
||||||
|
import requests
|
||||||
|
import websockets
|
||||||
|
|
||||||
|
|
||||||
|
log = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
class CDPObject(dict):
|
||||||
|
def __init__(self, *a, **k):
|
||||||
|
super().__init__(*a, **k)
|
||||||
|
self.__dict__ = self
|
||||||
|
for k in self.__dict__:
|
||||||
|
if isinstance(self.__dict__[k], dict):
|
||||||
|
self.__dict__[k] = CDPObject(self.__dict__[k])
|
||||||
|
elif isinstance(self.__dict__[k], list):
|
||||||
|
for i in range(len(self.__dict__[k])):
|
||||||
|
if isinstance(self.__dict__[k][i], dict):
|
||||||
|
self.__dict__[k][i] = CDPObject(self)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
tpl = f"{self.__class__.__name__}(\n\t{{}}\n\t)"
|
||||||
|
return tpl.format("\n ".join(f"{k} = {v}" for k, v in self.items()))
|
||||||
|
|
||||||
|
|
||||||
|
class PageElement(CDPObject):
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
class CDP:
|
||||||
|
log = logging.getLogger("CDP")
|
||||||
|
|
||||||
|
endpoints = CDPObject(
|
||||||
|
{
|
||||||
|
"json": "/json",
|
||||||
|
"protocol": "/json/protocol",
|
||||||
|
"list": "/json/list",
|
||||||
|
"new": "/json/new?{url}",
|
||||||
|
"activate": "/json/activate/{id}",
|
||||||
|
"close": "/json/close/{id}",
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
def __init__(self, options: "ChromeOptions"): # noqa
|
||||||
|
self.server_addr = "http://{0}:{1}".format(*options.debugger_address.split(":"))
|
||||||
|
|
||||||
|
self._reqid = 0
|
||||||
|
self._session = requests.Session()
|
||||||
|
self._last_resp = None
|
||||||
|
self._last_json = None
|
||||||
|
|
||||||
|
resp = self.get(self.endpoints.json) # noqa
|
||||||
|
self.sessionId = resp[0]["id"]
|
||||||
|
self.wsurl = resp[0]["webSocketDebuggerUrl"]
|
||||||
|
|
||||||
|
def tab_activate(self, id=None):
|
||||||
|
if not id:
|
||||||
|
active_tab = self.tab_list()[0]
|
||||||
|
id = active_tab.id # noqa
|
||||||
|
self.wsurl = active_tab.webSocketDebuggerUrl # noqa
|
||||||
|
return self.post(self.endpoints["activate"].format(id=id))
|
||||||
|
|
||||||
|
def tab_list(self):
|
||||||
|
retval = self.get(self.endpoints["list"])
|
||||||
|
return [PageElement(o) for o in retval]
|
||||||
|
|
||||||
|
def tab_new(self, url):
|
||||||
|
return self.post(self.endpoints["new"].format(url=url))
|
||||||
|
|
||||||
|
def tab_close_last_opened(self):
|
||||||
|
sessions = self.tab_list()
|
||||||
|
opentabs = [s for s in sessions if s["type"] == "page"]
|
||||||
|
return self.post(self.endpoints["close"].format(id=opentabs[-1]["id"]))
|
||||||
|
|
||||||
|
async def send(self, method: str, params: dict):
|
||||||
|
self._reqid += 1
|
||||||
|
async with websockets.connect(self.wsurl) as ws:
|
||||||
|
await ws.send(
|
||||||
|
json.dumps({"method": method, "params": params, "id": self._reqid})
|
||||||
|
)
|
||||||
|
self._last_resp = await ws.recv()
|
||||||
|
self._last_json = json.loads(self._last_resp)
|
||||||
|
self.log.info(self._last_json)
|
||||||
|
|
||||||
|
def get(self, uri):
|
||||||
|
resp = self._session.get(self.server_addr + uri)
|
||||||
|
try:
|
||||||
|
self._last_resp = resp
|
||||||
|
self._last_json = resp.json()
|
||||||
|
except Exception:
|
||||||
|
return
|
||||||
|
else:
|
||||||
|
return self._last_json
|
||||||
|
|
||||||
|
def post(self, uri, data: dict = None):
|
||||||
|
if not data:
|
||||||
|
data = {}
|
||||||
|
resp = self._session.post(self.server_addr + uri, json=data)
|
||||||
|
try:
|
||||||
|
self._last_resp = resp
|
||||||
|
self._last_json = resp.json()
|
||||||
|
except Exception:
|
||||||
|
return self._last_resp
|
||||||
|
|
||||||
|
@property
|
||||||
|
def last_json(self):
|
||||||
|
return self._last_json
|
||||||
190
src/undetected_chromedriver/devtool.py
Normal file
190
src/undetected_chromedriver/devtool.py
Normal file
@@ -0,0 +1,190 @@
|
|||||||
|
import asyncio
|
||||||
|
from collections.abc import Mapping
|
||||||
|
from collections.abc import Sequence
|
||||||
|
from functools import wraps
|
||||||
|
import logging
|
||||||
|
import threading
|
||||||
|
import time
|
||||||
|
import traceback
|
||||||
|
from typing import Any
|
||||||
|
from typing import Awaitable
|
||||||
|
from typing import Callable
|
||||||
|
from typing import List
|
||||||
|
from typing import Optional
|
||||||
|
|
||||||
|
|
||||||
|
class Structure(dict):
|
||||||
|
"""
|
||||||
|
This is a dict-like object structure, which you should subclass
|
||||||
|
Only properties defined in the class context are used on initialization.
|
||||||
|
|
||||||
|
See example
|
||||||
|
"""
|
||||||
|
|
||||||
|
_store = {}
|
||||||
|
|
||||||
|
def __init__(self, *a, **kw):
|
||||||
|
"""
|
||||||
|
Instantiate a new instance.
|
||||||
|
|
||||||
|
:param a:
|
||||||
|
:param kw:
|
||||||
|
"""
|
||||||
|
|
||||||
|
super().__init__()
|
||||||
|
|
||||||
|
# auxiliar dict
|
||||||
|
d = dict(*a, **kw)
|
||||||
|
for k, v in d.items():
|
||||||
|
if isinstance(v, Mapping):
|
||||||
|
self[k] = self.__class__(v)
|
||||||
|
elif isinstance(v, Sequence) and not isinstance(v, (str, bytes)):
|
||||||
|
self[k] = [self.__class__(i) for i in v]
|
||||||
|
else:
|
||||||
|
self[k] = v
|
||||||
|
super().__setattr__("__dict__", self)
|
||||||
|
|
||||||
|
def __getattr__(self, item):
|
||||||
|
return getattr(super(), item)
|
||||||
|
|
||||||
|
def __getitem__(self, item):
|
||||||
|
return super().__getitem__(item)
|
||||||
|
|
||||||
|
def __setattr__(self, key, value):
|
||||||
|
self.__setitem__(key, value)
|
||||||
|
|
||||||
|
def __setitem__(self, key, value):
|
||||||
|
super().__setitem__(key, value)
|
||||||
|
|
||||||
|
def update(self, *a, **kw):
|
||||||
|
super().update(*a, **kw)
|
||||||
|
|
||||||
|
def __eq__(self, other):
|
||||||
|
return frozenset(other.items()) == frozenset(self.items())
|
||||||
|
|
||||||
|
def __hash__(self):
|
||||||
|
return hash(frozenset(self.items()))
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def __init_subclass__(cls, **kwargs):
|
||||||
|
cls._store = {}
|
||||||
|
|
||||||
|
def _normalize_strings(self):
|
||||||
|
for k, v in self.copy().items():
|
||||||
|
if isinstance(v, (str)):
|
||||||
|
self[k] = v.strip()
|
||||||
|
|
||||||
|
|
||||||
|
def timeout(seconds=3, on_timeout: Optional[Callable[[callable], Any]] = None):
|
||||||
|
def wrapper(func):
|
||||||
|
@wraps(func)
|
||||||
|
def wrapped(*args, **kwargs):
|
||||||
|
def function_reached_timeout():
|
||||||
|
if on_timeout:
|
||||||
|
on_timeout(func)
|
||||||
|
else:
|
||||||
|
raise TimeoutError("function call timed out")
|
||||||
|
|
||||||
|
t = threading.Timer(interval=seconds, function=function_reached_timeout)
|
||||||
|
t.start()
|
||||||
|
try:
|
||||||
|
return func(*args, **kwargs)
|
||||||
|
except:
|
||||||
|
t.cancel()
|
||||||
|
raise
|
||||||
|
finally:
|
||||||
|
t.cancel()
|
||||||
|
|
||||||
|
return wrapped
|
||||||
|
|
||||||
|
return wrapper
|
||||||
|
|
||||||
|
|
||||||
|
def test():
|
||||||
|
import sys, os
|
||||||
|
|
||||||
|
sys.path.insert(0, os.path.abspath(os.path.dirname(__file__)))
|
||||||
|
import undetected_chromedriver as uc
|
||||||
|
import threading
|
||||||
|
|
||||||
|
def collector(
|
||||||
|
driver: uc.Chrome,
|
||||||
|
stop_event: threading.Event,
|
||||||
|
on_event_coro: Optional[Callable[[List[str]], Awaitable[Any]]] = None,
|
||||||
|
listen_events: Sequence = ("browser", "network", "performance"),
|
||||||
|
):
|
||||||
|
def threaded(driver, stop_event, on_event_coro):
|
||||||
|
async def _ensure_service_started():
|
||||||
|
while (
|
||||||
|
getattr(driver, "service", False)
|
||||||
|
and getattr(driver.service, "process", False)
|
||||||
|
and driver.service.process.poll()
|
||||||
|
):
|
||||||
|
print("waiting for driver service to come back on")
|
||||||
|
await asyncio.sleep(0.05)
|
||||||
|
# await asyncio.sleep(driver._delay or .25)
|
||||||
|
|
||||||
|
async def get_log_lines(typ):
|
||||||
|
await _ensure_service_started()
|
||||||
|
return driver.get_log(typ)
|
||||||
|
|
||||||
|
async def looper():
|
||||||
|
while not stop_event.is_set():
|
||||||
|
log_lines = []
|
||||||
|
try:
|
||||||
|
for _ in listen_events:
|
||||||
|
try:
|
||||||
|
log_lines += await get_log_lines(_)
|
||||||
|
except:
|
||||||
|
if logging.getLogger().getEffectiveLevel() <= 10:
|
||||||
|
traceback.print_exc()
|
||||||
|
continue
|
||||||
|
if log_lines and on_event_coro:
|
||||||
|
await on_event_coro(log_lines)
|
||||||
|
except Exception as e:
|
||||||
|
if logging.getLogger().getEffectiveLevel() <= 10:
|
||||||
|
traceback.print_exc()
|
||||||
|
|
||||||
|
loop = asyncio.new_event_loop()
|
||||||
|
asyncio.set_event_loop(loop)
|
||||||
|
loop.run_until_complete(looper())
|
||||||
|
|
||||||
|
t = threading.Thread(target=threaded, args=(driver, stop_event, on_event_coro))
|
||||||
|
t.start()
|
||||||
|
|
||||||
|
async def on_event(data):
|
||||||
|
print("on_event")
|
||||||
|
print("data:", data)
|
||||||
|
|
||||||
|
def func_called(fn):
|
||||||
|
def wrapped(*args, **kwargs):
|
||||||
|
print(
|
||||||
|
"func called! %s (args: %s, kwargs: %s)" % (fn.__name__, args, kwargs)
|
||||||
|
)
|
||||||
|
while driver.service.process and driver.service.process.poll() is not None:
|
||||||
|
time.sleep(0.1)
|
||||||
|
res = fn(*args, **kwargs)
|
||||||
|
print("func completed! (result: %s)" % res)
|
||||||
|
return res
|
||||||
|
|
||||||
|
return wrapped
|
||||||
|
|
||||||
|
logging.basicConfig(level=10)
|
||||||
|
|
||||||
|
options = uc.ChromeOptions()
|
||||||
|
options.set_capability(
|
||||||
|
"goog:loggingPrefs", {"performance": "ALL", "browser": "ALL", "network": "ALL"}
|
||||||
|
)
|
||||||
|
|
||||||
|
driver = uc.Chrome(version_main=96, options=options)
|
||||||
|
|
||||||
|
# driver.command_executor._request = timeout(seconds=1)(driver.command_executor._request)
|
||||||
|
driver.command_executor._request = func_called(driver.command_executor._request)
|
||||||
|
collector_stop = threading.Event()
|
||||||
|
collector(driver, collector_stop, on_event)
|
||||||
|
|
||||||
|
driver.get("https://nowsecure.nl")
|
||||||
|
|
||||||
|
time.sleep(10)
|
||||||
|
|
||||||
|
driver.quit()
|
||||||
77
src/undetected_chromedriver/dprocess.py
Normal file
77
src/undetected_chromedriver/dprocess.py
Normal file
@@ -0,0 +1,77 @@
|
|||||||
|
import atexit
|
||||||
|
import logging
|
||||||
|
import multiprocessing
|
||||||
|
import os
|
||||||
|
import platform
|
||||||
|
import signal
|
||||||
|
from subprocess import PIPE
|
||||||
|
from subprocess import Popen
|
||||||
|
import sys
|
||||||
|
|
||||||
|
|
||||||
|
CREATE_NEW_PROCESS_GROUP = 0x00000200
|
||||||
|
DETACHED_PROCESS = 0x00000008
|
||||||
|
|
||||||
|
REGISTERED = []
|
||||||
|
|
||||||
|
|
||||||
|
def start_detached(executable, *args):
|
||||||
|
"""
|
||||||
|
Starts a fully independent subprocess (with no parent)
|
||||||
|
:param executable: executable
|
||||||
|
:param args: arguments to the executable, eg: ['--param1_key=param1_val', '-vvv' ...]
|
||||||
|
:return: pid of the grandchild process
|
||||||
|
"""
|
||||||
|
|
||||||
|
# create pipe
|
||||||
|
reader, writer = multiprocessing.Pipe(False)
|
||||||
|
|
||||||
|
# do not keep reference
|
||||||
|
process = multiprocessing.Process(
|
||||||
|
target=_start_detached,
|
||||||
|
args=(executable, *args),
|
||||||
|
kwargs={"writer": writer},
|
||||||
|
daemon=True,
|
||||||
|
)
|
||||||
|
process.start()
|
||||||
|
process.join()
|
||||||
|
# receive pid from pipe
|
||||||
|
pid = reader.recv()
|
||||||
|
REGISTERED.append(pid)
|
||||||
|
# close pipes
|
||||||
|
writer.close()
|
||||||
|
reader.close()
|
||||||
|
process.close()
|
||||||
|
|
||||||
|
return pid
|
||||||
|
|
||||||
|
|
||||||
|
def _start_detached(executable, *args, writer: multiprocessing.Pipe = None):
|
||||||
|
# configure launch
|
||||||
|
kwargs = {}
|
||||||
|
if platform.system() == "Windows":
|
||||||
|
kwargs.update(creationflags=DETACHED_PROCESS | CREATE_NEW_PROCESS_GROUP)
|
||||||
|
elif sys.version_info < (3, 2):
|
||||||
|
# assume posix
|
||||||
|
kwargs.update(preexec_fn=os.setsid)
|
||||||
|
else: # Python 3.2+ and Unix
|
||||||
|
kwargs.update(start_new_session=True)
|
||||||
|
|
||||||
|
# run
|
||||||
|
p = Popen([executable, *args], stdin=PIPE, stdout=PIPE, stderr=PIPE, **kwargs)
|
||||||
|
|
||||||
|
# send pid to pipe
|
||||||
|
writer.send(p.pid)
|
||||||
|
sys.exit()
|
||||||
|
|
||||||
|
|
||||||
|
def _cleanup():
|
||||||
|
for pid in REGISTERED:
|
||||||
|
try:
|
||||||
|
logging.getLogger(__name__).debug("cleaning up pid %d " % pid)
|
||||||
|
os.kill(pid, signal.SIGTERM)
|
||||||
|
except: # noqa
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
atexit.register(_cleanup)
|
||||||
85
src/undetected_chromedriver/options.py
Normal file
85
src/undetected_chromedriver/options.py
Normal file
@@ -0,0 +1,85 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
# this module is part of undetected_chromedriver
|
||||||
|
|
||||||
|
|
||||||
|
import json
|
||||||
|
import os
|
||||||
|
|
||||||
|
from selenium.webdriver.chromium.options import ChromiumOptions as _ChromiumOptions
|
||||||
|
|
||||||
|
|
||||||
|
class ChromeOptions(_ChromiumOptions):
|
||||||
|
_session = None
|
||||||
|
_user_data_dir = None
|
||||||
|
|
||||||
|
@property
|
||||||
|
def user_data_dir(self):
|
||||||
|
return self._user_data_dir
|
||||||
|
|
||||||
|
@user_data_dir.setter
|
||||||
|
def user_data_dir(self, path: str):
|
||||||
|
"""
|
||||||
|
Sets the browser profile folder to use, or creates a new profile
|
||||||
|
at given <path>.
|
||||||
|
|
||||||
|
Parameters
|
||||||
|
----------
|
||||||
|
path: str
|
||||||
|
the path to a chrome profile folder
|
||||||
|
if it does not exist, a new profile will be created at given location
|
||||||
|
"""
|
||||||
|
apath = os.path.abspath(path)
|
||||||
|
self._user_data_dir = os.path.normpath(apath)
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def _undot_key(key, value):
|
||||||
|
"""turn a (dotted key, value) into a proper nested dict"""
|
||||||
|
if "." in key:
|
||||||
|
key, rest = key.split(".", 1)
|
||||||
|
value = ChromeOptions._undot_key(rest, value)
|
||||||
|
return {key: value}
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def _merge_nested(a, b):
|
||||||
|
"""
|
||||||
|
merges b into a
|
||||||
|
leaf values in a are overwritten with values from b
|
||||||
|
"""
|
||||||
|
for key in b:
|
||||||
|
if key in a:
|
||||||
|
if isinstance(a[key], dict) and isinstance(b[key], dict):
|
||||||
|
ChromeOptions._merge_nested(a[key], b[key])
|
||||||
|
continue
|
||||||
|
a[key] = b[key]
|
||||||
|
return a
|
||||||
|
|
||||||
|
def handle_prefs(self, user_data_dir):
|
||||||
|
prefs = self.experimental_options.get("prefs")
|
||||||
|
if prefs:
|
||||||
|
user_data_dir = user_data_dir or self._user_data_dir
|
||||||
|
default_path = os.path.join(user_data_dir, "Default")
|
||||||
|
os.makedirs(default_path, exist_ok=True)
|
||||||
|
|
||||||
|
# undot prefs dict keys
|
||||||
|
undot_prefs = {}
|
||||||
|
for key, value in prefs.items():
|
||||||
|
undot_prefs = self._merge_nested(
|
||||||
|
undot_prefs, self._undot_key(key, value)
|
||||||
|
)
|
||||||
|
|
||||||
|
prefs_file = os.path.join(default_path, "Preferences")
|
||||||
|
if os.path.exists(prefs_file):
|
||||||
|
with open(prefs_file, encoding="latin1", mode="r") as f:
|
||||||
|
undot_prefs = self._merge_nested(json.load(f), undot_prefs)
|
||||||
|
|
||||||
|
with open(prefs_file, encoding="latin1", mode="w") as f:
|
||||||
|
json.dump(undot_prefs, f)
|
||||||
|
|
||||||
|
# remove the experimental_options to avoid an error
|
||||||
|
del self._experimental_options["prefs"]
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def from_options(cls, options):
|
||||||
|
o = cls()
|
||||||
|
o.__dict__.update(options.__dict__)
|
||||||
|
return o
|
||||||
449
src/undetected_chromedriver/patcher.py
Normal file
449
src/undetected_chromedriver/patcher.py
Normal file
@@ -0,0 +1,449 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
# this module is part of undetected_chromedriver
|
||||||
|
|
||||||
|
from distutils.version import LooseVersion
|
||||||
|
import io
|
||||||
|
import json
|
||||||
|
import logging
|
||||||
|
import os
|
||||||
|
import pathlib
|
||||||
|
import platform
|
||||||
|
import random
|
||||||
|
import re
|
||||||
|
import shutil
|
||||||
|
import string
|
||||||
|
import sys
|
||||||
|
import time
|
||||||
|
from urllib.request import urlopen
|
||||||
|
from urllib.request import urlretrieve
|
||||||
|
import zipfile
|
||||||
|
from multiprocessing import Lock
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
IS_POSIX = sys.platform.startswith(("darwin", "cygwin", "linux", "linux2", "freebsd"))
|
||||||
|
|
||||||
|
|
||||||
|
class Patcher(object):
|
||||||
|
lock = Lock()
|
||||||
|
exe_name = "chromedriver%s"
|
||||||
|
|
||||||
|
platform = sys.platform
|
||||||
|
if platform.endswith("win32"):
|
||||||
|
d = "~/appdata/roaming/undetected_chromedriver"
|
||||||
|
elif "LAMBDA_TASK_ROOT" in os.environ:
|
||||||
|
d = "/tmp/undetected_chromedriver"
|
||||||
|
elif platform.startswith(("linux", "linux2")):
|
||||||
|
d = "~/.local/share/undetected_chromedriver"
|
||||||
|
elif platform.endswith("darwin"):
|
||||||
|
d = "~/Library/Application Support/undetected_chromedriver"
|
||||||
|
else:
|
||||||
|
d = "~/.undetected_chromedriver"
|
||||||
|
data_path = os.path.abspath(os.path.expanduser(d))
|
||||||
|
|
||||||
|
def __init__(
|
||||||
|
self,
|
||||||
|
executable_path=None,
|
||||||
|
force=False,
|
||||||
|
version_main: int = 0,
|
||||||
|
user_multi_procs=False,
|
||||||
|
):
|
||||||
|
"""
|
||||||
|
Args:
|
||||||
|
executable_path: None = automatic
|
||||||
|
a full file path to the chromedriver executable
|
||||||
|
force: False
|
||||||
|
terminate processes which are holding lock
|
||||||
|
version_main: 0 = auto
|
||||||
|
specify main chrome version (rounded, ex: 82)
|
||||||
|
"""
|
||||||
|
self.force = force
|
||||||
|
self._custom_exe_path = False
|
||||||
|
prefix = "undetected"
|
||||||
|
self.user_multi_procs = user_multi_procs
|
||||||
|
|
||||||
|
try:
|
||||||
|
# Try to convert version_main into an integer
|
||||||
|
version_main_int = int(version_main)
|
||||||
|
# check if version_main_int is less than or equal to e.g 114
|
||||||
|
self.is_old_chromedriver = version_main and version_main_int <= 114
|
||||||
|
except (ValueError,TypeError):
|
||||||
|
# If the conversion fails, print an error message
|
||||||
|
print("version_main cannot be converted to an integer")
|
||||||
|
# Set self.is_old_chromedriver to False if the conversion fails
|
||||||
|
self.is_old_chromedriver = False
|
||||||
|
|
||||||
|
# Needs to be called before self.exe_name is accessed
|
||||||
|
self._set_platform_name()
|
||||||
|
|
||||||
|
if not os.path.exists(self.data_path):
|
||||||
|
os.makedirs(self.data_path, exist_ok=True)
|
||||||
|
|
||||||
|
if not executable_path:
|
||||||
|
if sys.platform.startswith("freebsd"):
|
||||||
|
self.executable_path = os.path.join(
|
||||||
|
self.data_path, self.exe_name
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
self.executable_path = os.path.join(
|
||||||
|
self.data_path, "_".join([prefix, self.exe_name])
|
||||||
|
)
|
||||||
|
|
||||||
|
if not IS_POSIX:
|
||||||
|
if executable_path:
|
||||||
|
if not executable_path[-4:] == ".exe":
|
||||||
|
executable_path += ".exe"
|
||||||
|
|
||||||
|
self.zip_path = os.path.join(self.data_path, prefix)
|
||||||
|
|
||||||
|
if not executable_path:
|
||||||
|
if not self.user_multi_procs:
|
||||||
|
self.executable_path = os.path.abspath(
|
||||||
|
os.path.join(".", self.executable_path)
|
||||||
|
)
|
||||||
|
|
||||||
|
if executable_path:
|
||||||
|
self._custom_exe_path = True
|
||||||
|
self.executable_path = executable_path
|
||||||
|
|
||||||
|
# Set the correct repository to download the Chromedriver from
|
||||||
|
if self.is_old_chromedriver:
|
||||||
|
self.url_repo = "https://chromedriver.storage.googleapis.com"
|
||||||
|
else:
|
||||||
|
self.url_repo = "https://googlechromelabs.github.io/chrome-for-testing"
|
||||||
|
|
||||||
|
self.version_main = version_main
|
||||||
|
self.version_full = None
|
||||||
|
|
||||||
|
def _set_platform_name(self):
|
||||||
|
"""
|
||||||
|
Set the platform and exe name based on the platform undetected_chromedriver is running on
|
||||||
|
in order to download the correct chromedriver.
|
||||||
|
"""
|
||||||
|
if self.platform.endswith("win32"):
|
||||||
|
self.platform_name = "win32"
|
||||||
|
self.exe_name %= ".exe"
|
||||||
|
if self.platform.endswith(("linux", "linux2")):
|
||||||
|
self.platform_name = "linux64"
|
||||||
|
self.exe_name %= ""
|
||||||
|
if self.platform.endswith("darwin"):
|
||||||
|
if self.is_old_chromedriver:
|
||||||
|
self.platform_name = "mac64"
|
||||||
|
else:
|
||||||
|
self.platform_name = "mac-x64"
|
||||||
|
self.exe_name %= ""
|
||||||
|
if self.platform.startswith("freebsd"):
|
||||||
|
self.platform_name = "freebsd"
|
||||||
|
self.exe_name %= ""
|
||||||
|
|
||||||
|
def auto(self, executable_path=None, force=False, version_main=None, _=None):
|
||||||
|
"""
|
||||||
|
|
||||||
|
Args:
|
||||||
|
executable_path:
|
||||||
|
force:
|
||||||
|
version_main:
|
||||||
|
|
||||||
|
Returns:
|
||||||
|
|
||||||
|
"""
|
||||||
|
p = pathlib.Path(self.data_path)
|
||||||
|
if self.user_multi_procs:
|
||||||
|
with Lock():
|
||||||
|
files = list(p.rglob("*chromedriver*"))
|
||||||
|
most_recent = max(files, key=lambda f: f.stat().st_mtime)
|
||||||
|
files.remove(most_recent)
|
||||||
|
list(map(lambda f: f.unlink(), files))
|
||||||
|
if self.is_binary_patched(most_recent):
|
||||||
|
self.executable_path = str(most_recent)
|
||||||
|
return True
|
||||||
|
|
||||||
|
if executable_path:
|
||||||
|
self.executable_path = executable_path
|
||||||
|
self._custom_exe_path = True
|
||||||
|
|
||||||
|
if self._custom_exe_path:
|
||||||
|
ispatched = self.is_binary_patched(self.executable_path)
|
||||||
|
if not ispatched:
|
||||||
|
return self.patch_exe()
|
||||||
|
else:
|
||||||
|
return
|
||||||
|
|
||||||
|
if version_main:
|
||||||
|
self.version_main = version_main
|
||||||
|
if force is True:
|
||||||
|
self.force = force
|
||||||
|
|
||||||
|
|
||||||
|
if self.platform_name == "freebsd":
|
||||||
|
chromedriver_path = shutil.which("chromedriver")
|
||||||
|
|
||||||
|
if not os.path.isfile(chromedriver_path) or not os.access(chromedriver_path, os.X_OK):
|
||||||
|
logging.error("Chromedriver not installed!")
|
||||||
|
return
|
||||||
|
|
||||||
|
version_path = os.path.join(os.path.dirname(self.executable_path), "version.txt")
|
||||||
|
|
||||||
|
process = os.popen(f'"{chromedriver_path}" --version')
|
||||||
|
chromedriver_version = process.read().split(' ')[1].split(' ')[0]
|
||||||
|
process.close()
|
||||||
|
|
||||||
|
current_version = None
|
||||||
|
if os.path.isfile(version_path) or os.access(version_path, os.X_OK):
|
||||||
|
with open(version_path, 'r') as f:
|
||||||
|
current_version = f.read()
|
||||||
|
|
||||||
|
if current_version != chromedriver_version:
|
||||||
|
logging.info("Copying chromedriver executable...")
|
||||||
|
shutil.copy(chromedriver_path, self.executable_path)
|
||||||
|
os.chmod(self.executable_path, 0o755)
|
||||||
|
|
||||||
|
with open(version_path, 'w') as f:
|
||||||
|
f.write(chromedriver_version)
|
||||||
|
|
||||||
|
logging.info("Chromedriver executable copied!")
|
||||||
|
else:
|
||||||
|
try:
|
||||||
|
os.unlink(self.executable_path)
|
||||||
|
except PermissionError:
|
||||||
|
if self.force:
|
||||||
|
self.force_kill_instances(self.executable_path)
|
||||||
|
return self.auto(force=not self.force)
|
||||||
|
try:
|
||||||
|
if self.is_binary_patched():
|
||||||
|
# assumes already running AND patched
|
||||||
|
return True
|
||||||
|
except PermissionError:
|
||||||
|
pass
|
||||||
|
# return False
|
||||||
|
except FileNotFoundError:
|
||||||
|
pass
|
||||||
|
|
||||||
|
release = self.fetch_release_number()
|
||||||
|
self.version_main = release.version[0]
|
||||||
|
self.version_full = release
|
||||||
|
self.unzip_package(self.fetch_package())
|
||||||
|
|
||||||
|
return self.patch()
|
||||||
|
|
||||||
|
def driver_binary_in_use(self, path: str = None) -> bool:
|
||||||
|
"""
|
||||||
|
naive test to check if a found chromedriver binary is
|
||||||
|
currently in use
|
||||||
|
|
||||||
|
Args:
|
||||||
|
path: a string or PathLike object to the binary to check.
|
||||||
|
if not specified, we check use this object's executable_path
|
||||||
|
"""
|
||||||
|
if not path:
|
||||||
|
path = self.executable_path
|
||||||
|
p = pathlib.Path(path)
|
||||||
|
|
||||||
|
if not p.exists():
|
||||||
|
raise OSError("file does not exist: %s" % p)
|
||||||
|
try:
|
||||||
|
with open(p, mode="a+b") as fs:
|
||||||
|
exc = []
|
||||||
|
try:
|
||||||
|
|
||||||
|
fs.seek(0, 0)
|
||||||
|
except PermissionError as e:
|
||||||
|
exc.append(e) # since some systems apprently allow seeking
|
||||||
|
# we conduct another test
|
||||||
|
try:
|
||||||
|
fs.readline()
|
||||||
|
except PermissionError as e:
|
||||||
|
exc.append(e)
|
||||||
|
|
||||||
|
if exc:
|
||||||
|
|
||||||
|
return True
|
||||||
|
return False
|
||||||
|
# ok safe to assume this is in use
|
||||||
|
except Exception as e:
|
||||||
|
# logger.exception("whoops ", e)
|
||||||
|
pass
|
||||||
|
|
||||||
|
def cleanup_unused_files(self):
|
||||||
|
p = pathlib.Path(self.data_path)
|
||||||
|
items = list(p.glob("*undetected*"))
|
||||||
|
for item in items:
|
||||||
|
try:
|
||||||
|
item.unlink()
|
||||||
|
except:
|
||||||
|
pass
|
||||||
|
|
||||||
|
def patch(self):
|
||||||
|
self.patch_exe()
|
||||||
|
return self.is_binary_patched()
|
||||||
|
|
||||||
|
def fetch_release_number(self):
|
||||||
|
"""
|
||||||
|
Gets the latest major version available, or the latest major version of self.target_version if set explicitly.
|
||||||
|
:return: version string
|
||||||
|
:rtype: LooseVersion
|
||||||
|
"""
|
||||||
|
# Endpoint for old versions of Chromedriver (114 and below)
|
||||||
|
if self.is_old_chromedriver:
|
||||||
|
path = f"/latest_release_{self.version_main}"
|
||||||
|
path = path.upper()
|
||||||
|
logger.debug("getting release number from %s" % path)
|
||||||
|
return LooseVersion(urlopen(self.url_repo + path).read().decode())
|
||||||
|
|
||||||
|
# Endpoint for new versions of Chromedriver (115+)
|
||||||
|
if not self.version_main:
|
||||||
|
# Fetch the latest version
|
||||||
|
path = "/last-known-good-versions-with-downloads.json"
|
||||||
|
logger.debug("getting release number from %s" % path)
|
||||||
|
with urlopen(self.url_repo + path) as conn:
|
||||||
|
response = conn.read().decode()
|
||||||
|
|
||||||
|
last_versions = json.loads(response)
|
||||||
|
return LooseVersion(last_versions["channels"]["Stable"]["version"])
|
||||||
|
|
||||||
|
# Fetch the latest minor version of the major version provided
|
||||||
|
path = "/latest-versions-per-milestone-with-downloads.json"
|
||||||
|
logger.debug("getting release number from %s" % path)
|
||||||
|
with urlopen(self.url_repo + path) as conn:
|
||||||
|
response = conn.read().decode()
|
||||||
|
|
||||||
|
major_versions = json.loads(response)
|
||||||
|
return LooseVersion(major_versions["milestones"][str(self.version_main)]["version"])
|
||||||
|
|
||||||
|
def parse_exe_version(self):
|
||||||
|
with io.open(self.executable_path, "rb") as f:
|
||||||
|
for line in iter(lambda: f.readline(), b""):
|
||||||
|
match = re.search(rb"platform_handle\x00content\x00([0-9.]*)", line)
|
||||||
|
if match:
|
||||||
|
return LooseVersion(match[1].decode())
|
||||||
|
|
||||||
|
def fetch_package(self):
|
||||||
|
"""
|
||||||
|
Downloads ChromeDriver from source
|
||||||
|
|
||||||
|
:return: path to downloaded file
|
||||||
|
"""
|
||||||
|
zip_name = f"chromedriver_{self.platform_name}.zip"
|
||||||
|
if self.is_old_chromedriver:
|
||||||
|
download_url = "%s/%s/%s" % (self.url_repo, self.version_full.vstring, zip_name)
|
||||||
|
else:
|
||||||
|
zip_name = zip_name.replace("_", "-", 1)
|
||||||
|
download_url = "https://storage.googleapis.com/chrome-for-testing-public/%s/%s/%s"
|
||||||
|
download_url %= (self.version_full.vstring, self.platform_name, zip_name)
|
||||||
|
|
||||||
|
logger.debug("downloading from %s" % download_url)
|
||||||
|
return urlretrieve(download_url)[0]
|
||||||
|
|
||||||
|
def unzip_package(self, fp):
|
||||||
|
"""
|
||||||
|
Does what it says
|
||||||
|
|
||||||
|
:return: path to unpacked executable
|
||||||
|
"""
|
||||||
|
exe_path = self.exe_name
|
||||||
|
if not self.is_old_chromedriver:
|
||||||
|
# The new chromedriver unzips into its own folder
|
||||||
|
zip_name = f"chromedriver-{self.platform_name}"
|
||||||
|
exe_path = os.path.join(zip_name, self.exe_name)
|
||||||
|
|
||||||
|
logger.debug("unzipping %s" % fp)
|
||||||
|
try:
|
||||||
|
os.unlink(self.zip_path)
|
||||||
|
except (FileNotFoundError, OSError):
|
||||||
|
pass
|
||||||
|
|
||||||
|
os.makedirs(self.zip_path, mode=0o755, exist_ok=True)
|
||||||
|
with zipfile.ZipFile(fp, mode="r") as zf:
|
||||||
|
zf.extractall(self.zip_path)
|
||||||
|
os.rename(os.path.join(self.zip_path, exe_path), self.executable_path)
|
||||||
|
os.remove(fp)
|
||||||
|
shutil.rmtree
|
||||||
|
os.chmod(self.executable_path, 0o755)
|
||||||
|
return self.executable_path
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def force_kill_instances(exe_name):
|
||||||
|
"""
|
||||||
|
kills running instances.
|
||||||
|
:param: executable name to kill, may be a path as well
|
||||||
|
|
||||||
|
:return: True on success else False
|
||||||
|
"""
|
||||||
|
exe_name = os.path.basename(exe_name)
|
||||||
|
if IS_POSIX:
|
||||||
|
r = os.system("kill -f -9 $(pidof %s)" % exe_name)
|
||||||
|
else:
|
||||||
|
r = os.system("taskkill /f /im %s" % exe_name)
|
||||||
|
return not r
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def gen_random_cdc():
|
||||||
|
cdc = random.choices(string.ascii_letters, k=27)
|
||||||
|
return "".join(cdc).encode()
|
||||||
|
|
||||||
|
def is_binary_patched(self, executable_path=None):
|
||||||
|
executable_path = executable_path or self.executable_path
|
||||||
|
try:
|
||||||
|
with io.open(executable_path, "rb") as fh:
|
||||||
|
return fh.read().find(b"undetected chromedriver") != -1
|
||||||
|
except FileNotFoundError:
|
||||||
|
return False
|
||||||
|
|
||||||
|
def patch_exe(self):
|
||||||
|
start = time.perf_counter()
|
||||||
|
logger.info("patching driver executable %s" % self.executable_path)
|
||||||
|
with io.open(self.executable_path, "r+b") as fh:
|
||||||
|
content = fh.read()
|
||||||
|
# match_injected_codeblock = re.search(rb"{window.*;}", content)
|
||||||
|
match_injected_codeblock = re.search(rb"\{window\.cdc.*?;\}", content)
|
||||||
|
if match_injected_codeblock:
|
||||||
|
target_bytes = match_injected_codeblock[0]
|
||||||
|
new_target_bytes = (
|
||||||
|
b'{console.log("undetected chromedriver 1337!")}'.ljust(
|
||||||
|
len(target_bytes), b" "
|
||||||
|
)
|
||||||
|
)
|
||||||
|
new_content = content.replace(target_bytes, new_target_bytes)
|
||||||
|
if new_content == content:
|
||||||
|
logger.warning(
|
||||||
|
"something went wrong patching the driver binary. could not find injection code block"
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
logger.debug(
|
||||||
|
"found block:\n%s\nreplacing with:\n%s"
|
||||||
|
% (target_bytes, new_target_bytes)
|
||||||
|
)
|
||||||
|
fh.seek(0)
|
||||||
|
fh.write(new_content)
|
||||||
|
logger.debug(
|
||||||
|
"patching took us {:.2f} seconds".format(time.perf_counter() - start)
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return "{0:s}({1:s})".format(
|
||||||
|
self.__class__.__name__,
|
||||||
|
self.executable_path,
|
||||||
|
)
|
||||||
|
|
||||||
|
def __del__(self):
|
||||||
|
if self._custom_exe_path:
|
||||||
|
# if the driver binary is specified by user
|
||||||
|
# we assume it is important enough to not delete it
|
||||||
|
return
|
||||||
|
else:
|
||||||
|
timeout = 3 # stop trying after this many seconds
|
||||||
|
t = time.monotonic()
|
||||||
|
now = lambda: time.monotonic()
|
||||||
|
while now() - t > timeout:
|
||||||
|
# we don't want to wait until the end of time
|
||||||
|
try:
|
||||||
|
if self.user_multi_procs:
|
||||||
|
break
|
||||||
|
os.unlink(self.executable_path)
|
||||||
|
logger.debug("successfully unlinked %s" % self.executable_path)
|
||||||
|
break
|
||||||
|
except (OSError, RuntimeError, PermissionError):
|
||||||
|
time.sleep(0.01)
|
||||||
|
continue
|
||||||
|
except FileNotFoundError:
|
||||||
|
break
|
||||||
99
src/undetected_chromedriver/reactor.py
Normal file
99
src/undetected_chromedriver/reactor.py
Normal file
@@ -0,0 +1,99 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
# this module is part of undetected_chromedriver
|
||||||
|
|
||||||
|
import asyncio
|
||||||
|
import json
|
||||||
|
import logging
|
||||||
|
import threading
|
||||||
|
|
||||||
|
|
||||||
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
class Reactor(threading.Thread):
|
||||||
|
def __init__(self, driver: "Chrome"):
|
||||||
|
super().__init__()
|
||||||
|
|
||||||
|
self.driver = driver
|
||||||
|
self.loop = asyncio.new_event_loop()
|
||||||
|
|
||||||
|
self.lock = threading.Lock()
|
||||||
|
self.event = threading.Event()
|
||||||
|
self.daemon = True
|
||||||
|
self.handlers = {}
|
||||||
|
|
||||||
|
def add_event_handler(self, method_name, callback: callable):
|
||||||
|
"""
|
||||||
|
|
||||||
|
Parameters
|
||||||
|
----------
|
||||||
|
event_name: str
|
||||||
|
example "Network.responseReceived"
|
||||||
|
|
||||||
|
callback: callable
|
||||||
|
callable which accepts 1 parameter: the message object dictionary
|
||||||
|
|
||||||
|
Returns
|
||||||
|
-------
|
||||||
|
|
||||||
|
"""
|
||||||
|
with self.lock:
|
||||||
|
self.handlers[method_name.lower()] = callback
|
||||||
|
|
||||||
|
@property
|
||||||
|
def running(self):
|
||||||
|
return not self.event.is_set()
|
||||||
|
|
||||||
|
def run(self):
|
||||||
|
try:
|
||||||
|
asyncio.set_event_loop(self.loop)
|
||||||
|
self.loop.run_until_complete(self.listen())
|
||||||
|
except Exception as e:
|
||||||
|
logger.warning("Reactor.run() => %s", e)
|
||||||
|
|
||||||
|
async def _wait_service_started(self):
|
||||||
|
while True:
|
||||||
|
with self.lock:
|
||||||
|
if (
|
||||||
|
getattr(self.driver, "service", None)
|
||||||
|
and getattr(self.driver.service, "process", None)
|
||||||
|
and self.driver.service.process.poll()
|
||||||
|
):
|
||||||
|
await asyncio.sleep(self.driver._delay or 0.25)
|
||||||
|
else:
|
||||||
|
break
|
||||||
|
|
||||||
|
async def listen(self):
|
||||||
|
while self.running:
|
||||||
|
await self._wait_service_started()
|
||||||
|
await asyncio.sleep(1)
|
||||||
|
|
||||||
|
try:
|
||||||
|
with self.lock:
|
||||||
|
log_entries = self.driver.get_log("performance")
|
||||||
|
|
||||||
|
for entry in log_entries:
|
||||||
|
try:
|
||||||
|
obj_serialized: str = entry.get("message")
|
||||||
|
obj = json.loads(obj_serialized)
|
||||||
|
message = obj.get("message")
|
||||||
|
method = message.get("method")
|
||||||
|
|
||||||
|
if "*" in self.handlers:
|
||||||
|
await self.loop.run_in_executor(
|
||||||
|
None, self.handlers["*"], message
|
||||||
|
)
|
||||||
|
elif method.lower() in self.handlers:
|
||||||
|
await self.loop.run_in_executor(
|
||||||
|
None, self.handlers[method.lower()], message
|
||||||
|
)
|
||||||
|
|
||||||
|
# print(type(message), message)
|
||||||
|
except Exception as e:
|
||||||
|
raise e from None
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
if "invalid session id" in str(e):
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
logging.debug("exception ignored :", e)
|
||||||
86
src/undetected_chromedriver/webelement.py
Normal file
86
src/undetected_chromedriver/webelement.py
Normal file
@@ -0,0 +1,86 @@
|
|||||||
|
from typing import List
|
||||||
|
|
||||||
|
from selenium.webdriver.common.by import By
|
||||||
|
import selenium.webdriver.remote.webelement
|
||||||
|
|
||||||
|
|
||||||
|
class WebElement(selenium.webdriver.remote.webelement.WebElement):
|
||||||
|
def click_safe(self):
|
||||||
|
super().click()
|
||||||
|
self._parent.reconnect(0.1)
|
||||||
|
|
||||||
|
def children(
|
||||||
|
self, tag=None, recursive=False
|
||||||
|
) -> List[selenium.webdriver.remote.webelement.WebElement]:
|
||||||
|
"""
|
||||||
|
returns direct child elements of current element
|
||||||
|
:param tag: str, if supplied, returns <tag> nodes only
|
||||||
|
"""
|
||||||
|
script = "return [... arguments[0].children]"
|
||||||
|
if tag:
|
||||||
|
script += ".filter( node => node.tagName === '%s')" % tag.upper()
|
||||||
|
if recursive:
|
||||||
|
return list(_recursive_children(self, tag))
|
||||||
|
return list(self._parent.execute_script(script, self))
|
||||||
|
|
||||||
|
|
||||||
|
class UCWebElement(WebElement):
|
||||||
|
"""
|
||||||
|
Custom WebElement class which makes it easier to view elements when
|
||||||
|
working in an interactive environment.
|
||||||
|
|
||||||
|
standard webelement repr:
|
||||||
|
<selenium.webdriver.remote.webelement.WebElement (session="85ff0f671512fa535630e71ee951b1f2", element="6357cb55-92c3-4c0f-9416-b174f9c1b8c4")>
|
||||||
|
|
||||||
|
using this WebElement class:
|
||||||
|
<WebElement(<a class="mobile-show-inline-block mc-update-infos init-ok" href="#" id="main-cat-switcher-mobile">)>
|
||||||
|
|
||||||
|
"""
|
||||||
|
|
||||||
|
def __init__(self, parent, id_):
|
||||||
|
super().__init__(parent, id_)
|
||||||
|
self._attrs = None
|
||||||
|
|
||||||
|
@property
|
||||||
|
def attrs(self):
|
||||||
|
if not self._attrs:
|
||||||
|
self._attrs = self._parent.execute_script(
|
||||||
|
"""
|
||||||
|
var items = {};
|
||||||
|
for (index = 0; index < arguments[0].attributes.length; ++index)
|
||||||
|
{
|
||||||
|
items[arguments[0].attributes[index].name] = arguments[0].attributes[index].value
|
||||||
|
};
|
||||||
|
return items;
|
||||||
|
""",
|
||||||
|
self,
|
||||||
|
)
|
||||||
|
return self._attrs
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
strattrs = " ".join([f'{k}="{v}"' for k, v in self.attrs.items()])
|
||||||
|
if strattrs:
|
||||||
|
strattrs = " " + strattrs
|
||||||
|
return f"{self.__class__.__name__} <{self.tag_name}{strattrs}>"
|
||||||
|
|
||||||
|
|
||||||
|
def _recursive_children(element, tag: str = None, _results=None):
|
||||||
|
"""
|
||||||
|
returns all children of <element> recursively
|
||||||
|
|
||||||
|
:param element: `WebElement` object.
|
||||||
|
find children below this <element>
|
||||||
|
|
||||||
|
:param tag: str = None.
|
||||||
|
if provided, return only <tag> elements. example: 'a', or 'img'
|
||||||
|
:param _results: do not use!
|
||||||
|
"""
|
||||||
|
results = _results or set()
|
||||||
|
for element in element.children():
|
||||||
|
if tag:
|
||||||
|
if element.tag_name == tag:
|
||||||
|
results.add(element)
|
||||||
|
else:
|
||||||
|
results.add(element)
|
||||||
|
results |= _recursive_children(element, tag, results)
|
||||||
|
return results
|
||||||
331
src/utils.py
Normal file
331
src/utils.py
Normal file
@@ -0,0 +1,331 @@
|
|||||||
|
import json
|
||||||
|
import logging
|
||||||
|
import os
|
||||||
|
import re
|
||||||
|
import shutil
|
||||||
|
import urllib.parse
|
||||||
|
import tempfile
|
||||||
|
import sys
|
||||||
|
|
||||||
|
from selenium.webdriver.chrome.webdriver import WebDriver
|
||||||
|
import undetected_chromedriver as uc
|
||||||
|
|
||||||
|
FLARESOLVERR_VERSION = None
|
||||||
|
CHROME_EXE_PATH = None
|
||||||
|
CHROME_MAJOR_VERSION = None
|
||||||
|
USER_AGENT = None
|
||||||
|
XVFB_DISPLAY = None
|
||||||
|
PATCHED_DRIVER_PATH = None
|
||||||
|
|
||||||
|
|
||||||
|
def get_config_log_html() -> bool:
|
||||||
|
return os.environ.get('LOG_HTML', 'false').lower() == 'true'
|
||||||
|
|
||||||
|
|
||||||
|
def get_config_headless() -> bool:
|
||||||
|
return os.environ.get('HEADLESS', 'true').lower() == 'true'
|
||||||
|
|
||||||
|
|
||||||
|
def get_flaresolverr_version() -> str:
|
||||||
|
global FLARESOLVERR_VERSION
|
||||||
|
if FLARESOLVERR_VERSION is not None:
|
||||||
|
return FLARESOLVERR_VERSION
|
||||||
|
|
||||||
|
package_path = os.path.join(os.path.dirname(os.path.abspath(__file__)), os.pardir, 'package.json')
|
||||||
|
if not os.path.isfile(package_path):
|
||||||
|
package_path = os.path.join(os.path.dirname(os.path.abspath(__file__)), 'package.json')
|
||||||
|
with open(package_path) as f:
|
||||||
|
FLARESOLVERR_VERSION = json.loads(f.read())['version']
|
||||||
|
return FLARESOLVERR_VERSION
|
||||||
|
|
||||||
|
|
||||||
|
def create_proxy_extension(proxy: dict) -> str:
|
||||||
|
parsed_url = urllib.parse.urlparse(proxy['url'])
|
||||||
|
scheme = parsed_url.scheme
|
||||||
|
host = parsed_url.hostname
|
||||||
|
port = parsed_url.port
|
||||||
|
username = proxy['username']
|
||||||
|
password = proxy['password']
|
||||||
|
manifest_json = """
|
||||||
|
{
|
||||||
|
"version": "1.0.0",
|
||||||
|
"manifest_version": 2,
|
||||||
|
"name": "Chrome Proxy",
|
||||||
|
"permissions": [
|
||||||
|
"proxy",
|
||||||
|
"tabs",
|
||||||
|
"unlimitedStorage",
|
||||||
|
"storage",
|
||||||
|
"<all_urls>",
|
||||||
|
"webRequest",
|
||||||
|
"webRequestBlocking"
|
||||||
|
],
|
||||||
|
"background": {"scripts": ["background.js"]},
|
||||||
|
"minimum_chrome_version": "76.0.0"
|
||||||
|
}
|
||||||
|
"""
|
||||||
|
|
||||||
|
background_js = """
|
||||||
|
var config = {
|
||||||
|
mode: "fixed_servers",
|
||||||
|
rules: {
|
||||||
|
singleProxy: {
|
||||||
|
scheme: "%s",
|
||||||
|
host: "%s",
|
||||||
|
port: %d
|
||||||
|
},
|
||||||
|
bypassList: ["localhost"]
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
chrome.proxy.settings.set({value: config, scope: "regular"}, function() {});
|
||||||
|
|
||||||
|
function callbackFn(details) {
|
||||||
|
return {
|
||||||
|
authCredentials: {
|
||||||
|
username: "%s",
|
||||||
|
password: "%s"
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
chrome.webRequest.onAuthRequired.addListener(
|
||||||
|
callbackFn,
|
||||||
|
{ urls: ["<all_urls>"] },
|
||||||
|
['blocking']
|
||||||
|
);
|
||||||
|
""" % (
|
||||||
|
scheme,
|
||||||
|
host,
|
||||||
|
port,
|
||||||
|
username,
|
||||||
|
password
|
||||||
|
)
|
||||||
|
|
||||||
|
proxy_extension_dir = tempfile.mkdtemp()
|
||||||
|
|
||||||
|
with open(os.path.join(proxy_extension_dir, "manifest.json"), "w") as f:
|
||||||
|
f.write(manifest_json)
|
||||||
|
|
||||||
|
with open(os.path.join(proxy_extension_dir, "background.js"), "w") as f:
|
||||||
|
f.write(background_js)
|
||||||
|
|
||||||
|
return proxy_extension_dir
|
||||||
|
|
||||||
|
|
||||||
|
def get_webdriver(proxy: dict = None) -> WebDriver:
|
||||||
|
global PATCHED_DRIVER_PATH, USER_AGENT
|
||||||
|
logging.debug('Launching web browser...')
|
||||||
|
|
||||||
|
# undetected_chromedriver
|
||||||
|
options = uc.ChromeOptions()
|
||||||
|
options.add_argument('--no-sandbox')
|
||||||
|
options.add_argument('--window-size=1920,1080')
|
||||||
|
# todo: this param shows a warning in chrome head-full
|
||||||
|
options.add_argument('--disable-setuid-sandbox')
|
||||||
|
options.add_argument('--disable-dev-shm-usage')
|
||||||
|
# this option removes the zygote sandbox (it seems that the resolution is a bit faster)
|
||||||
|
options.add_argument('--no-zygote')
|
||||||
|
# attempt to fix Docker ARM32 build
|
||||||
|
options.add_argument('--disable-gpu-sandbox')
|
||||||
|
options.add_argument('--disable-software-rasterizer')
|
||||||
|
options.add_argument('--ignore-certificate-errors')
|
||||||
|
options.add_argument('--ignore-ssl-errors')
|
||||||
|
# fix GL errors in ASUSTOR NAS
|
||||||
|
# https://github.com/FlareSolverr/FlareSolverr/issues/782
|
||||||
|
# https://github.com/microsoft/vscode/issues/127800#issuecomment-873342069
|
||||||
|
# https://peter.sh/experiments/chromium-command-line-switches/#use-gl
|
||||||
|
options.add_argument('--use-gl=swiftshader')
|
||||||
|
|
||||||
|
language = os.environ.get('LANG', None)
|
||||||
|
if language is not None:
|
||||||
|
options.add_argument('--lang=%s' % language)
|
||||||
|
|
||||||
|
# Fix for Chrome 117 | https://github.com/FlareSolverr/FlareSolverr/issues/910
|
||||||
|
if USER_AGENT is not None:
|
||||||
|
options.add_argument('--user-agent=%s' % USER_AGENT)
|
||||||
|
|
||||||
|
proxy_extension_dir = None
|
||||||
|
if proxy and all(key in proxy for key in ['url', 'username', 'password']):
|
||||||
|
proxy_extension_dir = create_proxy_extension(proxy)
|
||||||
|
options.add_argument("--load-extension=%s" % os.path.abspath(proxy_extension_dir))
|
||||||
|
elif proxy and 'url' in proxy:
|
||||||
|
proxy_url = proxy['url']
|
||||||
|
logging.debug("Using webdriver proxy: %s", proxy_url)
|
||||||
|
options.add_argument('--proxy-server=%s' % proxy_url)
|
||||||
|
|
||||||
|
# note: headless mode is detected (headless = True)
|
||||||
|
# we launch the browser in head-full mode with the window hidden
|
||||||
|
windows_headless = False
|
||||||
|
if get_config_headless():
|
||||||
|
if os.name == 'nt':
|
||||||
|
windows_headless = True
|
||||||
|
else:
|
||||||
|
start_xvfb_display()
|
||||||
|
# For normal headless mode:
|
||||||
|
# options.add_argument('--headless')
|
||||||
|
|
||||||
|
options.add_argument("--auto-open-devtools-for-tabs")
|
||||||
|
|
||||||
|
# if we are inside the Docker container, we avoid downloading the driver
|
||||||
|
driver_exe_path = None
|
||||||
|
version_main = None
|
||||||
|
if os.path.exists("/app/chromedriver"):
|
||||||
|
# running inside Docker
|
||||||
|
driver_exe_path = "/app/chromedriver"
|
||||||
|
else:
|
||||||
|
version_main = get_chrome_major_version()
|
||||||
|
if PATCHED_DRIVER_PATH is not None:
|
||||||
|
driver_exe_path = PATCHED_DRIVER_PATH
|
||||||
|
|
||||||
|
# detect chrome path
|
||||||
|
browser_executable_path = get_chrome_exe_path()
|
||||||
|
|
||||||
|
# downloads and patches the chromedriver
|
||||||
|
# if we don't set driver_executable_path it downloads, patches, and deletes the driver each time
|
||||||
|
try:
|
||||||
|
driver = uc.Chrome(options=options, browser_executable_path=browser_executable_path,
|
||||||
|
driver_executable_path=driver_exe_path, version_main=version_main,
|
||||||
|
windows_headless=windows_headless, headless=get_config_headless())
|
||||||
|
except Exception as e:
|
||||||
|
logging.error("Error starting Chrome: %s" % e)
|
||||||
|
|
||||||
|
# save the patched driver to avoid re-downloads
|
||||||
|
if driver_exe_path is None:
|
||||||
|
PATCHED_DRIVER_PATH = os.path.join(driver.patcher.data_path, driver.patcher.exe_name)
|
||||||
|
if PATCHED_DRIVER_PATH != driver.patcher.executable_path:
|
||||||
|
shutil.copy(driver.patcher.executable_path, PATCHED_DRIVER_PATH)
|
||||||
|
|
||||||
|
# clean up proxy extension directory
|
||||||
|
if proxy_extension_dir is not None:
|
||||||
|
shutil.rmtree(proxy_extension_dir)
|
||||||
|
|
||||||
|
# selenium vanilla
|
||||||
|
# options = webdriver.ChromeOptions()
|
||||||
|
# options.add_argument('--no-sandbox')
|
||||||
|
# options.add_argument('--window-size=1920,1080')
|
||||||
|
# options.add_argument('--disable-setuid-sandbox')
|
||||||
|
# options.add_argument('--disable-dev-shm-usage')
|
||||||
|
# driver = webdriver.Chrome(options=options)
|
||||||
|
|
||||||
|
return driver
|
||||||
|
|
||||||
|
|
||||||
|
def get_chrome_exe_path() -> str:
|
||||||
|
global CHROME_EXE_PATH
|
||||||
|
if CHROME_EXE_PATH is not None:
|
||||||
|
return CHROME_EXE_PATH
|
||||||
|
# linux pyinstaller bundle
|
||||||
|
chrome_path = os.path.join(os.path.dirname(os.path.abspath(__file__)), 'chrome', "chrome")
|
||||||
|
if os.path.exists(chrome_path):
|
||||||
|
if not os.access(chrome_path, os.X_OK):
|
||||||
|
raise Exception(f'Chrome binary "{chrome_path}" is not executable. '
|
||||||
|
f'Please, extract the archive with "tar xzf <file.tar.gz>".')
|
||||||
|
CHROME_EXE_PATH = chrome_path
|
||||||
|
return CHROME_EXE_PATH
|
||||||
|
# windows pyinstaller bundle
|
||||||
|
chrome_path = os.path.join(os.path.dirname(os.path.abspath(__file__)), 'chrome', "chrome.exe")
|
||||||
|
if os.path.exists(chrome_path):
|
||||||
|
CHROME_EXE_PATH = chrome_path
|
||||||
|
return CHROME_EXE_PATH
|
||||||
|
# system
|
||||||
|
CHROME_EXE_PATH = uc.find_chrome_executable()
|
||||||
|
return CHROME_EXE_PATH
|
||||||
|
|
||||||
|
|
||||||
|
def get_chrome_major_version() -> str:
|
||||||
|
global CHROME_MAJOR_VERSION
|
||||||
|
if CHROME_MAJOR_VERSION is not None:
|
||||||
|
return CHROME_MAJOR_VERSION
|
||||||
|
|
||||||
|
if os.name == 'nt':
|
||||||
|
# Example: '104.0.5112.79'
|
||||||
|
try:
|
||||||
|
complete_version = extract_version_nt_executable(get_chrome_exe_path())
|
||||||
|
except Exception:
|
||||||
|
try:
|
||||||
|
complete_version = extract_version_nt_registry()
|
||||||
|
except Exception:
|
||||||
|
# Example: '104.0.5112.79'
|
||||||
|
complete_version = extract_version_nt_folder()
|
||||||
|
else:
|
||||||
|
chrome_path = get_chrome_exe_path()
|
||||||
|
process = os.popen(f'"{chrome_path}" --version')
|
||||||
|
# Example 1: 'Chromium 104.0.5112.79 Arch Linux\n'
|
||||||
|
# Example 2: 'Google Chrome 104.0.5112.79 Arch Linux\n'
|
||||||
|
complete_version = process.read()
|
||||||
|
process.close()
|
||||||
|
|
||||||
|
CHROME_MAJOR_VERSION = complete_version.split('.')[0].split(' ')[-1]
|
||||||
|
return CHROME_MAJOR_VERSION
|
||||||
|
|
||||||
|
|
||||||
|
def extract_version_nt_executable(exe_path: str) -> str:
|
||||||
|
import pefile
|
||||||
|
pe = pefile.PE(exe_path, fast_load=True)
|
||||||
|
pe.parse_data_directories(
|
||||||
|
directories=[pefile.DIRECTORY_ENTRY["IMAGE_DIRECTORY_ENTRY_RESOURCE"]]
|
||||||
|
)
|
||||||
|
return pe.FileInfo[0][0].StringTable[0].entries[b"FileVersion"].decode('utf-8')
|
||||||
|
|
||||||
|
|
||||||
|
def extract_version_nt_registry() -> str:
|
||||||
|
stream = os.popen(
|
||||||
|
'reg query "HKLM\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\Google Chrome"')
|
||||||
|
output = stream.read()
|
||||||
|
google_version = ''
|
||||||
|
for letter in output[output.rindex('DisplayVersion REG_SZ') + 24:]:
|
||||||
|
if letter != '\n':
|
||||||
|
google_version += letter
|
||||||
|
else:
|
||||||
|
break
|
||||||
|
return google_version.strip()
|
||||||
|
|
||||||
|
|
||||||
|
def extract_version_nt_folder() -> str:
|
||||||
|
# Check if the Chrome folder exists in the x32 or x64 Program Files folders.
|
||||||
|
for i in range(2):
|
||||||
|
path = 'C:\\Program Files' + (' (x86)' if i else '') + '\\Google\\Chrome\\Application'
|
||||||
|
if os.path.isdir(path):
|
||||||
|
paths = [f.path for f in os.scandir(path) if f.is_dir()]
|
||||||
|
for path in paths:
|
||||||
|
filename = os.path.basename(path)
|
||||||
|
pattern = '\d+\.\d+\.\d+\.\d+'
|
||||||
|
match = re.search(pattern, filename)
|
||||||
|
if match and match.group():
|
||||||
|
# Found a Chrome version.
|
||||||
|
return match.group(0)
|
||||||
|
return ''
|
||||||
|
|
||||||
|
|
||||||
|
def get_user_agent(driver=None) -> str:
|
||||||
|
global USER_AGENT
|
||||||
|
if USER_AGENT is not None:
|
||||||
|
return USER_AGENT
|
||||||
|
|
||||||
|
try:
|
||||||
|
if driver is None:
|
||||||
|
driver = get_webdriver()
|
||||||
|
USER_AGENT = driver.execute_script("return navigator.userAgent")
|
||||||
|
# Fix for Chrome 117 | https://github.com/FlareSolverr/FlareSolverr/issues/910
|
||||||
|
USER_AGENT = re.sub('HEADLESS', '', USER_AGENT, flags=re.IGNORECASE)
|
||||||
|
return USER_AGENT
|
||||||
|
except Exception as e:
|
||||||
|
raise Exception("Error getting browser User-Agent. " + str(e))
|
||||||
|
finally:
|
||||||
|
if driver is not None:
|
||||||
|
driver.quit()
|
||||||
|
|
||||||
|
|
||||||
|
def start_xvfb_display():
|
||||||
|
global XVFB_DISPLAY
|
||||||
|
if XVFB_DISPLAY is None:
|
||||||
|
from xvfbwrapper import Xvfb
|
||||||
|
XVFB_DISPLAY = Xvfb()
|
||||||
|
XVFB_DISPLAY.start()
|
||||||
|
|
||||||
|
|
||||||
|
def object_to_dict(_object):
|
||||||
|
json_dict = json.loads(json.dumps(_object, default=lambda o: o.__dict__))
|
||||||
|
# remove hidden fields
|
||||||
|
return {k: v for k, v in json_dict.items() if not k.startswith('__')}
|
||||||
31
src/utils.ts
31
src/utils.ts
@@ -1,31 +0,0 @@
|
|||||||
import * as fs from 'fs'
|
|
||||||
import * as Path from 'path'
|
|
||||||
import { promisify } from 'util'
|
|
||||||
|
|
||||||
export const sleep = promisify(setTimeout)
|
|
||||||
|
|
||||||
// recursive fs.rmdir needs node version 12:
|
|
||||||
// https://github.com/ngosang/FlareSolverr/issues/5#issuecomment-655572712
|
|
||||||
export function deleteFolderRecursive(path: string) {
|
|
||||||
if (fs.existsSync(path)) {
|
|
||||||
fs.readdirSync(path).forEach((file) => {
|
|
||||||
const curPath = Path.join(path, file)
|
|
||||||
if (fs.lstatSync(curPath).isDirectory()) { // recurse
|
|
||||||
deleteFolderRecursive(curPath)
|
|
||||||
} else { // delete file
|
|
||||||
fs.unlinkSync(curPath)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
fs.rmdirSync(path)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
export const removeEmptyFields = (o: Record<string, any>): typeof o => {
|
|
||||||
const r: typeof o = {}
|
|
||||||
for (const k in o) {
|
|
||||||
if (o[k] !== undefined) {
|
|
||||||
r[k] = o[k]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return r
|
|
||||||
}
|
|
||||||
1
test-requirements.txt
Normal file
1
test-requirements.txt
Normal file
@@ -0,0 +1 @@
|
|||||||
|
WebTest==3.0.0
|
||||||
@@ -1,21 +0,0 @@
|
|||||||
{
|
|
||||||
"compilerOptions": {
|
|
||||||
"moduleResolution": "node",
|
|
||||||
"target": "es2017",
|
|
||||||
"noImplicitAny": true,
|
|
||||||
"removeComments": true,
|
|
||||||
"preserveConstEnums": true,
|
|
||||||
"allowSyntheticDefaultImports": true,
|
|
||||||
"resolveJsonModule": true,
|
|
||||||
"lib": [
|
|
||||||
"es2015", "dom"
|
|
||||||
],
|
|
||||||
"module": "commonjs",
|
|
||||||
"outDir": "dist",
|
|
||||||
"sourceMap": true
|
|
||||||
},
|
|
||||||
"include": [
|
|
||||||
"src", "node_modules/@types/puppeteer/index.d.ts"
|
|
||||||
],
|
|
||||||
"exclude": ["node_modules"]
|
|
||||||
}
|
|
||||||
Reference in New Issue
Block a user