loongson/pypi/: curl-cffi-0.15.0b4 metadata and description

Simple index Mirror page Stable version available

libcurl ffi bindings for Python, with impersonation support.

author_email lexiforest <infinitesheldon@gmail.com>
classifiers
  • Development Status :: 4 - Beta
  • Intended Audience :: Developers
  • Programming Language :: Python :: 3
  • Programming Language :: Python :: 3.10
  • Programming Language :: Python :: 3.11
  • Programming Language :: Python :: 3.12
  • Programming Language :: Python :: 3.13
  • Programming Language :: Python :: 3.14
  • Programming Language :: Python :: Free Threading
description_content_type text/markdown
project_urls
  • repository, https://github.com/lexiforest/curl_cffi
requires_dist
  • cffi>=2.0.0
  • certifi>=2024.2.2
  • readability-lxml>=0.8.1; extra == "extra"
  • markdownify>=1.1.0; extra == "extra"
  • lxml_html_clean; extra == "extra"
  • charset_normalizer<4.0,>=3.3.2; extra == "dev"
  • coverage<7.0,>=6.4.1; extra == "dev"
  • cryptography<47.0,>=46.0.4; extra == "dev"
  • httpx==0.23.1; extra == "dev"
  • mypy<2.0,>=1.9.0; extra == "dev"
  • pytest<9.0,>=8.1.1; extra == "dev"
  • pytest-asyncio<1.0,>=0.23.6; extra == "dev"
  • pytest-trio<1.0,>=0.8.0; extra == "dev"
  • ruff<1.0,>=0.3.5; extra == "dev"
  • trio<1.0,>=0.25.0; extra == "dev"
  • trustme<2.0,>=1.1.0; extra == "dev"
  • uvicorn<1.0,>=0.29.0; extra == "dev"
  • websockets>=14.0; extra == "dev"
  • typing_extensions; extra == "dev"
  • cibuildwheel; extra == "build"
  • wheel; extra == "build"
  • charset_normalizer<4.0,>=3.3.2; extra == "test"
  • cryptography<47.0,>=46.0.4; extra == "test"
  • litestar<3.0,>=2.19.0; extra == "test"
  • httpx==0.23.1; extra == "test"
  • proxy.py<3.0,>=2.4.3; extra == "test"
  • pytest<9.0,>=8.1.1; extra == "test"
  • pytest-asyncio<1.0,>=0.23.6; extra == "test"
  • pytest-trio<1.0,>=0.8.0; extra == "test"
  • python-multipart<1.0,>=0.0.9; extra == "test"
  • trio<1.0,>=0.25.0; extra == "test"
  • trustme<2.0,>=1.1.0; extra == "test"
  • uvicorn<1.0,>=0.29.0; extra == "test"
  • websockets>=14.0; extra == "test"
  • typing_extensions; extra == "test"
requires_python >=3.10
File Tox results History
curl_cffi-0.15.0b4-cp310-abi3-manylinux_2_36_loongarch64.manylinux_2_38_loongarch64.whl
Size
10 MB
Type
Python Wheel
Python
3.10

curl_cffi

PyPI Downloads PyPI - Python Version PyPI version Generic badge Generic badge

Documentation

Python binding for curl-impersonate fork via cffi. For commercial support, visit impersonate.pro.

curl_cffi is the most popular Python binding for curl. Unlike other pure python http clients like httpx or requests, curl_cffi can impersonate browsers' TLS/JA3 and HTTP/2 fingerprints. If you are blocked by some website for no obvious reason, you can give curl_cffi a try.

Python 3.10 is the minimum supported version since v0.14.

Recent highlights

Recall.ai - API for meeting recordings

Recall.ai

If you’re looking for a meeting recording API, consider checking out Recall.ai, an API that records Zoom, Google Meet, Microsoft Teams, in-person meetings, and more.

Residential Proxies

Thordata

Thordata: A reliable and cost-effective proxy service provider. One-click collection of public network data, providing enterprises and developers with stable, efficient, and compliant global proxy IP services. Register for a free trial of residential proxies and receive 2000 free SERP API calls.

Sponsors

Maintenance of this project is made possible by all the contributors and sponsors. If you'd like to sponsor this project and have your avatar or company logo appear below click here. πŸ’–


Bypass Cloudflare with API

Yes Captcha!

Yescaptcha is a proxy service that bypasses Cloudflare and uses the API interface to obtain verified cookies (e.g. cf_clearance). Click here to register: https://yescaptcha.com/i/stfnIO


TLS fingerprinting alone isn't enough for modern bot protection. Hyper Solutions provides the missing piece - API endpoints that generate valid antibot tokens for:

Akamai β€’ DataDome β€’ Kasada β€’ Incapsula

No browser automation. Just simple API calls that return the exact cookies and headers these systems require.

πŸš€ Get Your API Key | πŸ“– Docs | πŸ’¬ Discord


Features

requests aiohttp httpx pycurl curl_cffi
http/2 ❌ ❌ βœ… βœ… βœ…
http/3 ❌ ❌ ❌ β˜‘οΈ1 βœ…2
sync βœ… ❌ βœ… βœ… βœ…
async ❌ βœ… βœ… ❌ βœ…
websocket ❌ βœ… ❌ ❌ βœ…
native retry ❌ ❌ ❌ ❌ βœ…
fingerprints ❌ ❌ ❌ ❌ βœ…
speed πŸ‡ πŸ‡πŸ‡ πŸ‡ πŸ‡πŸ‡ πŸ‡πŸ‡

Notes:

  1. For pycurl, you need an http/3 enabled libcurl to make it work, while curl_cffi packages libcurl-impersonate inside Python wheels.
  2. Since v0.11.4.

Install

pip install curl_cffi --upgrade

This should work on Linux, macOS and Windows out of the box. If it does not work on you platform, you may need to compile and install curl-impersonate first and set some environment variables like LD_LIBRARY_PATH.

Android support, including Termux, is currently in beta, you can install the beta release for testing. For BSD systems, we need to get libcurl-impersonate compile first, and then add support in curl_cffi. If you are using these OSes, please lend an hand.

To install beta releases:

pip install curl_cffi --upgrade --pre

To install unstable version from GitHub:

git clone https://github.com/lexiforest/curl_cffi/
cd curl_cffi
make preprocess
pip install .

Usage

curl_cffi comes with a low-level curl API and a high-level requests-like API.

requests-like

import curl_cffi

# Notice the impersonate parameter
r = curl_cffi.get("https://tls.browserleaks.com/json", impersonate="chrome")

print(r.json())
# output: {..., "ja3n_hash": "aa56c057ad164ec4fdcb7a5a283be9fc", ...}
# the js3n fingerprint should be the same as target browser

# To keep using the latest browser version as `curl_cffi` updates,
# simply set impersonate="chrome" without specifying a version.
# Other similar values are: "safari" and "safari_ios"
r = curl_cffi.get("https://tls.browserleaks.com/json", impersonate="chrome")

# Use http/3 with impersonation
r = curl_cffi.get(
    "https://fp.impersonate.pro/api/http3",
    http_version="v3",
    impersonate="chrome"
)

# Randomly choose a browser version based on current market share in real world
# from: https://caniuse.com/usage-table
# NOTE: this is a pro feature.
r = curl_cffi.get("https://example.com", impersonate="realworld")

# To pin a specific version, use version numbers together.
r = curl_cffi.get("https://tls.browserleaks.com/json", impersonate="chrome124")

# To impersonate other than browsers, bring your own ja3/akamai strings
# See examples directory for details.
r = curl_cffi.get("https://tls.browserleaks.com/json", ja3=..., akamai=...)

# http/socks proxies are supported
proxies = {"https": "http://localhost:3128"}
r = curl_cffi.get("https://tls.browserleaks.com/json", impersonate="chrome", proxies=proxies)

proxies = {"https": "socks://localhost:3128"}
r = curl_cffi.get("https://tls.browserleaks.com/json", impersonate="chrome", proxies=proxies)

Sessions

s = curl_cffi.Session()

# httpbin is a http test website, this endpoint makes the server set cookies
s.get("https://httpbin.org/cookies/set/foo/bar")
print(s.cookies)
# <Cookies[<Cookie foo=bar for httpbin.org />]>

# retrieve cookies again to verify
r = s.get("https://httpbin.org/cookies")
print(r.json())
# {'cookies': {'foo': 'bar'}}

Supported impersonate browsers

curl_cffi supports the same browser versions as supported by my fork of curl-impersonate:

Open source version of curl_cffi includes versions whose fingerprints differ from previous versions. If you see a version, e.g. chrome135, were skipped, you can simply impersonate it with your own headers and the previous version.

If you don't want to look up the headers etc, by yourself, consider buying commercial support from impersonate.pro, we have comprehensive browser fingerprints database for almost all the browser versions on various platforms.

If you are trying to impersonate a target other than a browser, use ja3=... and akamai=... to specify your own customized fingerprints. See the docs on impersonation for details.

Browser Open Source Pro version
Chrome chrome99, chrome100, chrome101, chrome104, chrome107, chrome110, chrome116[1], chrome119[1], chrome120[1], chrome123[3], chrome124[3], chrome131[4], chrome133a[5][6], chrome136[6], chrome142, chrome145[9] chrome132, chrome134, chrome135
Chrome Android chrome99_android, chrome131_android [4] chrome132_android, chrome133_android, chrome134_android, chrome135_android
Chrome iOS N/A coming soon
Safari [7] safari153 [2], safari155 [2], safari170 [1], safari180 [4], safari184 [6], safari260 [8] coming soon
Safari iOS [7] safari172_ios[1], safari180_ios[4], safari184_ios [6], safari260_ios [8] coming soon
Firefox firefox133[5], firefox135[7], firefox144, firefox147[9] coming soon
Firefox Android N/A firefox135_android
Tor tor145 [7] coming soon
Edge edge99, edge101 edge133, edge135
Opera N/A coming soon
Brave N/A coming soon

Notes:

  1. Added in version 0.6.0.
  2. Fixed in version 0.6.0, previous http2 fingerprints were not correct.
  3. Added in version 0.7.0.
  4. Added in version 0.8.0.
  5. Added in version 0.9.0.
  6. The version postfix -a(e.g. chrome133a) means that this is an alternative version, i.e. the fingerprint has not been officially updated by browser, but has been observed because of A/B testing.
  7. Added in version 0.10.0.
  8. Added in version 0.11.0.
  9. Since 0.11.0, the format safari184_ios is preferred over safari18_4_ios, both are supported, but the latter is quite confusing and hard to parse.
  10. Added in 0.12.0.
  11. chrome145 and firefox147 support http3.

Asyncio

from curl_cffi import AsyncSession

async with AsyncSession() as s:
    r = await s.get("https://example.com")

More concurrency:

import asyncio
from curl_cffi import AsyncSession

urls = [
    "https://google.com/",
    "https://facebook.com/",
    "https://twitter.com/",
]

async with AsyncSession() as s:
    tasks = []
    for url in urls:
        task = s.get(url)
        tasks.append(task)
    results = await asyncio.gather(*tasks)

For low-level APIs, Scrapy integration and other advanced topics, see the docs for more details.

WebSockets

from curl_cffi import WebSocket

def on_message(ws: WebSocket, message: str | bytes):
    print(message)

ws = WebSocket(on_message=on_message)
ws.run_forever("wss://api.gemini.com/v1/marketdata/BTCUSD")

Asyncio WebSockets

import asyncio
from curl_cffi import AsyncSession

async with AsyncSession() as session:
    async with session.ws_connect("wss://echo.websocket.org") as ws:
        await asyncio.gather(*[ws.send_str("Hello, World!") for _ in range(10)])
        async for message in ws:
            print(message)

Ecosystem

Acknowledgement

Contributing

When submitting an PR, please use a different branch other than main and check the "Allow edits by maintainers" box, so I can update your PR with lint or style fixes. Thanks!

AI Policy

You can even feed the policy above to your "copilot" to let it adjust the style for you. :P