Latest Threat Research:SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains.Details
Socket
Book a DemoInstallSign in
Socket

php-wsgi

Package Overview
Dependencies
Maintainers
1
Versions
12
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

php-wsgi - npm Package Compare versions

Comparing version
0.0.5
to
0.0.6
+1
-1
php_wsgi.egg-info/PKG-INFO
Metadata-Version: 1.0
Name: php-wsgi
Version: 0.0.5
Version: 0.0.6
Summary: run php from python

@@ -5,0 +5,0 @@ Home-page: UNKNOWN

@@ -28,2 +28,6 @@ import os

def __init__(self,ctx,*args,**kwargs):
self.app_ctx = ctx
super(PhpWsgiApp,self).__init__(*args,**kwargs)
def _get_cmd(self):

@@ -33,5 +37,4 @@ has_php = op.exists(self.index_file)

def _run_php(self,url):
ctx = self.app.test_request_context()
ctx.push()
def _run_php(self,url):
self.app_ctx.push()

@@ -41,2 +44,3 @@ os.environ['REQUEST_URI'] = url

os.environ['PHP_SELF'] = self.index_file
self.app_ctx.pop()
return self._get_cmd() and getoutput(self._get_cmd())

@@ -115,4 +119,5 @@

self.app = app
ctx = app.test_request_context()
# and add our php handler
self.app.wsgi_app = PhpWsgiAppMiddleware(self.app_path,self.app.wsgi_app)
self.app.wsgi_app = PhpWsgiAppMiddleware(ctx,self.app_path,self.app.wsgi_app)
# now add our static handler

@@ -119,0 +124,0 @@ self.app.wsgi_app = StaticWSGIWrapperMiddleware(self.app_path,self.app.wsgi_app)

Metadata-Version: 1.0
Name: php-wsgi
Version: 0.0.5
Version: 0.0.6
Summary: run php from python

@@ -5,0 +5,0 @@ Home-page: UNKNOWN

@@ -7,3 +7,3 @@ from setuptools import setup

'author_email':'kyle@level2designs.com',
'version':'0.0.5',
'version':'0.0.6',
'description':'run php from python',

@@ -10,0 +10,0 @@ 'packages':['php_wsgi'],