wsgi/__init__.py
author Sylvain Thénault <sylvain.thenault@logilab.fr>
Tue, 23 Feb 2010 12:51:20 +0100
branchstable
changeset 4661 87672c718c3c
parent 4212 ab6573088b4a
child 5421 8167de96c523
permissions -rw-r--r--
[form] cache field value in form.formvalues using (field, form) key since in some case the same field instance may be shared accross multiple forms, which may share the formvalues dict in case of sub-forms

"""This package contains all WSGI specific code for cubicweb

NOTE: this package borrows a lot of code to Django
      (http://www.djangoproject.com) and to the wsgiref module
      of the python2.5's stdlib.

WSGI corresponding PEP: http://www.python.org/dev/peps/pep-0333/

:organization: Logilab
:copyright: 2008-2010 LOGILAB S.A. (Paris, FRANCE), license is LGPL v2.
:contact: http://www.logilab.fr/ -- mailto:contact@logilab.fr
:license: GNU Lesser General Public License, v2.1 - http://www.gnu.org/licenses
"""
__docformat__ = "restructuredtext en"

from email import message, message_from_string
from Cookie import SimpleCookie
from StringIO import StringIO
from cgi import parse_header, parse_qsl
from pprint import pformat as _pformat


def pformat(obj):
    """pretty prints `obj` if possible"""
    try:
        return _pformat(obj)
    except:
        return u'<could not parse>'

def qs2dict(qs):
    """transforms a query string into a regular python dict"""
    result = {}
    for key, value in parse_qsl(qs, True):
        result.setdefault(key, []).append(value)
    return result

def normalize_header(header):
    """returns a normalized header name

    >>> normalize_header('User_Agent')
    'User-agent'
    """
    return header.replace('_', '-').capitalize()

def safe_copyfileobj(fsrc, fdst, length=16*1024, size=0):
    """
    THIS COMES FROM DJANGO
    A version of shutil.copyfileobj that will not read more than 'size' bytes.
    This makes it safe from clients sending more than CONTENT_LENGTH bytes of
    data in the body.
    """
    if not size:
        return
    while size > 0:
        buf = fsrc.read(min(length, size))
        if not buf:
            break
        fdst.write(buf)
        size -= len(buf)

def parse_file_upload(header_dict, post_data):
    """This is adapted FROM DJANGO"""
    raw_message = '\r\n'.join('%s:%s' % pair for pair in header_dict.iteritems())
    raw_message += '\r\n\r\n' + post_data
    msg = message_from_string(raw_message)
    post, files = {}, {}
    for submessage in msg.get_payload():
        name_dict = parse_header(submessage['Content-Disposition'])[1]
        key = name_dict['name']
        # name_dict is something like {'name': 'file', 'filename': 'test.txt'} for file uploads
        # or {'name': 'blah'} for POST fields
        # We assume all uploaded files have a 'filename' set.
        if 'filename' in name_dict:
            assert type([]) != type(submessage.get_payload()), "Nested MIME messages are not supported"
            if not name_dict['filename'].strip():
                continue
            # IE submits the full path, so trim everything but the basename.
            # (We can't use os.path.basename because that uses the server's
            # directory separator, which may not be the same as the
            # client's one.)
            filename = name_dict['filename'][name_dict['filename'].rfind("\\")+1:]
            mimetype = 'Content-Type' in submessage and submessage['Content-Type'] or None
            content = StringIO(submessage.get_payload())
            files[key] = [filename, mimetype, content]
        else:
            post.setdefault(key, []).append(submessage.get_payload())
    return post, files