GregoBarzo

GregoBarzo / BlogContentExtractor / 0.2.0

README.md

Overview

Get the main text content for a given URL.

Usage

Input

Required The URL of the page to inspect

Output

NameTypeDescription
article_urlStringThe URL of the post we got content from
titleStringThe title of the post
descriptionStringDescription of the post
imagesArrayList of images URLs contained in the body of the post
body_textStringText of the post
titleStringThe title of the post
image_countIntegerNumber of images contained in the post
word_countIntegerNumber of words of the post
authorStringAuthor's name

Examples

Input

"https://techcrunch.com/2017/11/29/apple-releases-a-macos-security-update-to-fix-huge-login-security-flaw/"

Output

{
  "article_url": "https://techcrunch.com/2017/11/29/apple-releases-a-macos-security-update-to-fix-huge-login-security-flaw/",
  "author":"Romain Dillet",
  "body_text":"\n\n\n\nApple has just released a security update for macOS High Sierra and you should update right now (Apple will automatically push the security patch later today). This update fixes yesterday’s very concerning vulnerability that let anyone log into your Mac without your password.\nIn order to install the update, open the Mac App Store and click on the “Updates” tab. Interestingly, the release notes say “install this update as soon as possible.” Apple has worked long hours to fix yesterday’s flaw as soon as possible. But it shouldn’t have happened in the first place.\n\nThe security flaw affected all Macs running the latest version of High Sierra (at least version 10.13.1 — 17B48). On the login screen or in the preference panel, you could bypass all security screens by entering the root username and no password. Multiple persons at TechCrunch tested the flaw and could replicate it effortlessly. After that, you can see everything on the computer even if it’s not yours. It even works with a screen sharing session. For hackers, it’s a great way to access your emails, personal data and more.\n\nThe patch release notes are quite short. “A logic error existed in the validation of credentials. This was addressed with improved credential validation,” Apple says.\nUpdate: Apple will automatically roll out the update later today for everyone who is affected. Apple has provided the following statement:\n\n“Security is a top priority for every Apple product, and regrettably we stumbled with this release of macOS.\nWhen our security engineers became aware of the issue Tuesday afternoon, we immediately began working on an update that closes the security hole. This morning, as of 8:00 a.m., the update is available for download, and starting later today it will be automatically installed on all systems running the latest version (10.13.1) of macOS High Sierra. \nWe greatly regret this error and we apologize to all Mac users, both for releasing with this vulnerability and for the concern it has caused. Our customers deserve better. We are auditing our development processes to help prevent this from happening again.”\n\n\n\nFeatured Image: TechCrunch\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t",
  "description":"Apple has just released a security update for macOS High Sierra and you should update right now (Apple will automatically push the security patch later..",
  "image_count":3,
  "images":[
    "https://tctechcrunch2011.files.wordpress.com/2017/11/high-sierra-root-login.jpg?w=738",
    "https://tctechcrunch2011.files.wordpress.com/2017/11/screen-shot-2017-11-29-at-5-38-36-pm.png",
    "https://tctechcrunch2011.files.wordpress.com/2017/11/ooooooh-dear.gif?w=712&h=436"
  ],
  "title":"Apple releases a macOS security update to fix huge login security flaw",
  "word_count":349
}