view MANIFEST.in @ 5705:457fc482e6b1

Method PUT: ignore specification of protected properties which can not be set. Filtering them out of the payload list. This lets the result of a get using: class/id?@protected=true&@verbose=0 be used as input to a PUT operation without having to strip the protected properties. Note this does not raise an error if the PUT protected property is different from the value in the db. If the property is different but the etag/if-match passes, the user attempted to set the protected property and this should result in an error, but will not with this patch. Method DELETE class/id/attribute: raise error when trying to delete protected or required attribute/property. Raise UsageError when attribute doesn't exist. Method PATCH class/id: raise error when trying to replace/remove protected attribute/property raise error when trying to remove required attribute/property Catch KeyError at top level and turn into 400 error. If payload has an attribute/property that does not exist, raise UsageError which becomes a 400 error.
author John Rouillard <rouilj@ieee.org>
date Thu, 11 Apr 2019 20:54:39 -0400
parents c652849bfc75
children a635a60ffb84
line wrap: on
line source

recursive-include share *
recursive-include roundup *.*
recursive-include frontends *.*
recursive-include scripts *.* *-*
recursive-include tools *.* base64
recursive-include test *.py *.txt
recursive-include doc *.html *.png *.txt *.css *.example
recursive-include detectors *.py README.txt
global-exclude *.pyc *.pyo .DS_Store *.orig *.rej *~ \#*
include run_tests.py demo.py *.txt
include doc/conf.py doc/roundup-favicon.ico
exclude doc/security.txt
include locale/*.po locale/*.mo locale/roundup.pot

Roundup Issue Tracker: http://roundup-tracker.org/