Latest Threat Research:SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains.Details
Socket
Book a DemoInstallSign in
Socket

app-server

Package Overview
Dependencies
Maintainers
1
Versions
28
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

app-server - npm Package Compare versions

Comparing version
0.9.10
to
0.9.11
+1
-1
PKG-INFO
Metadata-Version: 2.1
Name: app_server
Version: 0.9.10
Version: 0.9.11
Summary: a lightweight web application launcher for gunicorn and static files.

@@ -5,0 +5,0 @@ Home-page: https://github.com/viur-framework/viur-app_server

Metadata-Version: 2.1
Name: app_server
Version: 0.9.10
Version: 0.9.11
Summary: a lightweight web application launcher for gunicorn and static files.

@@ -5,0 +5,0 @@ Home-page: https://github.com/viur-framework/viur-app_server

@@ -5,2 +5,3 @@ import argparse

import os
from pathlib import Path
import re

@@ -25,3 +26,3 @@ import subprocess

__version__ = "0.9.10"
__version__ = "0.9.11"

@@ -363,4 +364,5 @@ subprocesses = []

ap.add_argument("config_paths", metavar='yaml_path', nargs='+',
help='Path to app.yaml file')
ap.add_argument("distribution_folder", help="Path of the application")
ap.add_argument("--appyaml", default="app.yaml",
help="Path to app.yaml file (relative to the distribution_folder)")
ap.add_argument(

@@ -411,6 +413,6 @@ '-A', '--application', action='store', dest='app_id', required=True,

app_folder = os.path.abspath(args.config_paths[0])
app_folder = Path(args.distribution_folder)
# load & parse the app.yaml
with open(os.path.join(app_folder, "app.yaml"), "r") as f:
with open(app_folder / args.appyaml, "r") as f:
app_yaml = yaml.load(f, Loader=yaml.Loader)

@@ -417,0 +419,0 @@