./www/py-WebOb, Python module providing WSGI request and response objects

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]

Branch: CURRENT, Version: 1.8.5, Package name: py27-WebOb-1.8.5, Maintainer: kamelderouiche

WebOb provides wrappers around the WSGI request environment, and an
object to help create WSGI responses.

The objects map much of the specified behavior of HTTP, including
header parsing and accessors for other standard parts of the

Required to run:
[devel/py-setuptools] [lang/python27]

Required to build:

Master sites:

SHA1: 62101f7f4b1e423388ee5b66c01d2eb8e931e493
RMD160: b393b75657ad0069bb67e58fe9bc502d15c5e27b
Filesize: 265.581 KB

Version history: (Expand)

CVS history: (Expand)

   2019-01-05 01:17:07 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-WebOb: updated to 1.8.5

- Fixed one last remaining invalid escape sequence in a docstring.
   2018-12-14 14:14:37 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-WebOb: updated to 1.8.4


- Response.content_type now accepts unicode strings on Python 2 and encodes
  them to latin-1.
- Accept header classes now support a .copy() function that may be used to
  create a copy. This allows create_accept_header and other like functions
  to accept an pre-existing Accept header.

- Some backslashes introduced with the new accept handling code were causing
  DeprecationWarnings upon compiling the source to pyc files, all of the
  backslashes have been reigned in as appropriate, and users should no longer
  see DeprecationWarnings for invalid escape sequence.


- acceptparse.AcceptValidHeader, acceptparse.AcceptInvalidHeader, and
  acceptparse.AcceptNoHeader will now always ignore offers that do not
  match the required media type grammar when calling .acceptable_offers().
  Previous versions raised a ValueError for invalid offers in
  AcceptValidHeader and returned them as acceptable in the others.

- Add Request.remote_host, exposing REMOTE_HOST environment variable.
- Added acceptparse.Accept.parse_offer to codify what types of offers
  are compatible with acceptparse.AcceptValidHeader.acceptable_offers,
  acceptparse.AcceptMissingHeader.acceptable_offers, and
  acceptparse.AcceptInvalidHeader.acceptable_offers. This API also
  normalizes the offer with lowercased type/subtype and parameter names.
   2018-07-26 12:38:12 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-WebOb: updated to 1.8.2

- SameSite may now be passed as str or bytes to Response.set_cookie and
  cookies.make_cookie. This was an oversight as all other arguments would be
  correctly coerced before being serialized.
   2018-05-16 09:57:06 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-WebOb: updated to 1.8.1


- acceptparse.MIMEAccept which is deprecated in WebOb 1.8.0 made a backwards
  incompatible change that led to it raising on an invalid Accept header. This
  behaviour has now been reversed, as well as some other fixes to allow
  MIMEAccept to behave more like the old version.


- request.POST now supports any requests with the appropriate
  Content-Type. Allowing any HTTP method to access form encoded content,
  including DELETE, PUT, and others.

- WebOb is no longer officially supported on Python 3.3 which was EOL'ed on

Backwards Incompatibilities
- Many changes have been made to the way WebOb does Accept handling, not just
  for the Accept header itself, but also for Accept-Charset, Accept-Encoding
  and Accept-Language.
- When calling a @wsgify decorated function, the default arguments passed
  to @wsgify are now used when called with the request, and not as a
- When setting app_iter on a Response object the content_md5 header
  is no longer cleared. This behaviour is odd and disallows setting the
  content_md5 and then returning an iterator for chunked content encoded

Experimental Features
These features are experimental and may change at any point in the future.
- The cookie APIs now have the ability to set the SameSite attribute on a
  cookie in both webob.cookies.make_cookie and

- Exceptions now use string.Template.safe_substitute rather than
  string.Template.substitute. The latter would raise for missing mappings, the
  former will simply not substitute the missing variable. This is safer in case
  the WSGI environ does not contain the keys necessary for the body template.
- Request.host_url, Request.host_port, Request.domain correctly parse IPv6 Host
  headers as provided by a browser.
- Request.authorization would raise ValueError for unusual or malformed header
- Allow unnamed fields in form data to be properly transcoded when calling
  request.decode with an alternate encoding.
- Response.__init__ would discard app_iter when a Response had no
  body, this would cause issues when app_iter was an object that was tied
  to the life-cycle of a web application and had to be properly closed.
  app_iter is more advanced API for Response and thus even if it
  contains a body and is thus against the HTTP RFC's, we should let the users
  shoot themselves by returning a body.
   2017-11-28 09:55:48 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-WebOb: updated to 1.7.4

Add support for wsgi.input_terminated in the wsgi environ to allow for Chunked \ 
Encoding to be used with WebOb
   2017-07-11 09:24:04 by Adam Ciarcinski | Files touched by this commit (2)
Log message:
- Request.host_url, Request.host_port and Request.domain now all understand and
  know how to parse IPv6 Host headers sent by browsers.
   2016-06-08 19:43:49 by Thomas Klausner | Files touched by this commit (356)
Log message:
   2015-11-04 03:47:43 by Alistair G. Crooks | Files touched by this commit (758)
Log message:
Add SHA512 digests for distfiles for www category

Problems found locating distfiles:
	Package haskell-cgi: missing distfile haskell-cgi-20001206.tar.gz
	Package nginx: missing distfile array-var-nginx-module-0.04.tar.gz
	Package nginx: missing distfile encrypted-session-nginx-module-0.04.tar.gz
	Package nginx: missing distfile headers-more-nginx-module-0.261.tar.gz
	Package nginx: missing distfile nginx_http_push_module-0.692.tar.gz
	Package nginx: missing distfile set-misc-nginx-module-0.29.tar.gz
	Package nginx-devel: missing distfile echo-nginx-module-0.58.tar.gz
	Package nginx-devel: missing distfile form-input-nginx-module-0.11.tar.gz
	Package nginx-devel: missing distfile lua-nginx-module-0.9.16.tar.gz
	Package nginx-devel: missing distfile nginx_http_push_module-0.692.tar.gz
	Package nginx-devel: missing distfile set-misc-nginx-module-0.29.tar.gz
	Package php-owncloud: missing distfile owncloud-8.2.0.tar.bz2

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.