Expand description
Cross-cutting services module
Augments requests with stealth, metrics, timing, ML, and TLS strategies. All modules support feature gating for lean builds.
Re-exports§
pub use adaptive_timing::AdaptiveTimingStrategy;pub use adaptive_timing::BehaviorProfile;pub use adaptive_timing::DefaultAdaptiveTiming;pub use adaptive_timing::DomainTimingSnapshot;pub use adaptive_timing::RequestKind;pub use adaptive_timing::TimingOutcome;pub use adaptive_timing::TimingProfile;pub use adaptive_timing::TimingRequest;pub use anti_detection::AntiDetectionConfig;pub use anti_detection::AntiDetectionContext;pub use anti_detection::AntiDetectionStrategy;pub use anti_detection::DefaultAntiDetection;pub use events::ChallengeEvent;pub use events::ErrorEvent;pub use events::EventDispatcher;pub use events::EventHandler;pub use events::LoggingHandler;pub use events::MetricsHandler;pub use events::PostResponseEvent;pub use events::PreRequestEvent;pub use events::RetryEvent;pub use events::ScraperEvent;pub use metrics::DomainStats;pub use metrics::GlobalStats;pub use metrics::MetricsCollector;pub use metrics::MetricsSnapshot;pub use ml::FeatureVector;pub use ml::MLConfig;pub use ml::MLOptimizer;pub use ml::StrategyRecommendation;pub use performance::PerformanceConfig;pub use performance::PerformanceMonitor;pub use performance::PerformanceReport;pub use proxy::ProxyConfig;pub use proxy::ProxyHealthReport;pub use proxy::ProxyManager;pub use proxy::RotationStrategy;pub use spoofing::BrowserFingerprint;pub use spoofing::BrowserType;pub use spoofing::ConsistencyLevel;pub use spoofing::FingerprintGenerator;pub use state::DomainState;pub use state::StateManager;pub use tls::BrowserProfile;pub use tls::DefaultTLSManager;pub use tls::TLSConfig;
Modules§
- adaptive_
timing - Adaptive timing algorithms for human-like request pacing.
- anti_
detection - Traffic pattern and anti-detection utilities.
- events
- Event system for the advanced infrastructure.
- metrics
- Metrics collection utilities.
- ml
- Lightweight ML-inspired optimizer for strategy selection.
- performance
- Performance monitoring utilities.
- proxy
- Proxy rotation and health tracking utilities.
- spoofing
- Browser fingerprint spoofing utilities.
- state
- Shared state management for domains.
- tls
- TLS fingerprint rotation utilities.