This article explains the new features in :app:`Pyramid` version 1.9 as compared to its predecessor, :app:`Pyramid` 1.8. It also documents backwards incompatibilities between the two versions and deprecations added to :app:`Pyramid` 1.9, as well as software dependency changes and notable documentation additions.
The file format used by all
p*
command line scripts such aspserve
andpshell
, as well as the :func:`pyramid.paster.bootstrap` function is now replaceable thanks to a new dependency on plaster.For now, Pyramid is still shipping with integrated support for the PasteDeploy INI format by depending on the plaster_pastedeploy binding library. This may change in the future so it is recommended for applications to start depending on the appropriate plaster binding for their needs.
See Pylons#2985
Added an :term:`execution policy` hook to the request pipeline. An execution policy has the ability to control creation and execution of the request objects before they enter the rest of the pipeline. This means for a single request environ the policy may create more than one request object.
The execution policy can be replaced using the new :meth:`pyramid.config.Configurator.set_execution_policy` config directive.
The first library to use this feature is pyramid_retry.
Pyramid's default :term:`execution policy` will attempt to handle and render uncaught exceptions. This is a subtle, but fundamental, change indicating that an :term:`exception view` may expect to be called outside of the default
EXCVIEW
tween. There are various predicates available to assist in defining valid exception views for various parts of the pipeline. For example,pyramid_tm
defines thetm_active=True
predicate which can be applied to exception views that require access to the default transaction. In general this means that exception views may be expected to cover more possible error conditions, including when exceptions occur from tweens that are placed OVER theEXCVIEW
tween. If necessary, when provided aresponse
object, you may inspectrequest.exception
orrequest.exc_info
to determine if the response was generated as the result of an exception. See Pylons#2964CSRF support has been refactored out of sessions and into its own independent API in the :mod:`pyramid.csrf` module. It supports a pluggable :class:`pyramid.interfaces.ICSRFStoragePolicy` which can be used to define your own mechanism for generating and validating CSRF tokens. By default, Pyramid continues to use the :class:`pyramid.csrf.LegacySessionCSRFStoragePolicy` that uses the
request.session.get_csrf_token
andrequest.session.new_csrf_token
APIs under the hood to preserve compatibility with older Pyramid applications. Two new policies are shipped as well, :class:`pyramid.csrf.SessionCSRFStoragePolicy` and :class:`pyramid.csrf.CookieCSRFStoragePolicy` which will store the CSRF tokens in the session and in a standalone cookie, respectively. The storage policy can be changed by using the new :meth:`pyramid.config.Configurator.set_csrf_storage_policy` config directive.CSRF tokens should be used via the new :func:`pyramid.csrf.get_csrf_token`, :func:`pyramid.csrf.new_csrf_token` and :func:`pyramid.csrf.check_csrf_token` APIs in order to continue working if the storage policy is changed. Also, the :func:`pyramid.csrf.get_csrf_token` function is now injected into templates to be used conveniently in UI code.
See Pylons#2854 and Pylons#3019
- Support an
open_url
config setting in thepserve
section of the config file. This url is used to open a web browser whenpserve --browser
is invoked. When this setting is unavailable thepserve
script will attempt to guess the port the server is using from theserver:<server_name>
section of the config file but there is no requirement that the server is being run in this format so it may fail. See Pylons#2984 - The :class:`pyramid.config.Configurator` can now be used as a context manager which will automatically push/pop threadlocals (similar to :meth:`pyramid.config.Configurator.begin` and :meth:`pyramid.config.Configurator.end`). It will also automatically perform a :meth:`pyramid.config.Configurator.commit` at the end and thus it is only recommended to be used at the top-level of your app. See Pylons#2874
- The threadlocals are now available inside any function invoked via :meth:`pyramid.config.Configurator.include`. This means the only config-time code that cannot rely on threadlocals is code executed from non-actions inside the main. This can be alleviated by invoking :meth:`pyramid.config.Configurator.begin` and :meth:`pyramid.config.Configurator.end` appropriately or using the new context manager feature of the configurator. See Pylons#2989
- The threadlocals are now available inside exception views invoked via :meth:`pyramid.request.Request.invoke_exception_view` even when the
request
argument is overridden. See Pylons#3060 - When unsupported predicates are supplied to :meth:`pyramid.config.Configurator.add_view`, :meth:`pyramid.config.Configurator.add_route` and :meth:`pyramid.config.Configurator.add_subscriber` a much more helpful error message is output with a guess as to which predicate was intended. See Pylons#3054
- Normalize the permission results to a proper class hierarchy. :class:`pyramid.security.ACLAllowed` is now a subclass of :class:`pyramid.security.Allowed` and :class:`pyramid.security.ACLDenied` is now a subclass of :class:`pyramid.security.Denied`. See Pylons#3084
- Add a
quote_via
argument to :func:`pyramid.encode.urlencode` to follow the stdlib's version and enable custom quoting functions. See Pylons#3088 - Support _query=None and _anchor=None in :meth:`pyramid.request.Request.route_url` as well as
query=None
andanchor=None
in :meth:`pyramid.request.Request.resource_url`. Previously this would cause an ? and a #, respectively, in the url with nothing after it. Now the unnecessary parts are dropped from the generated URL. See Pylons#3034
Pyramid currently depends on
plaster_pastedeploy
to simplify the transition toplaster
by maintaining integrated support for INI files. This dependency onplaster_pastedeploy
should be considered subject to Pyramid's deprecation policy and may be removed in the future. Applications should depend on the appropriate plaster binding to satisfy their needs.Retrieving CSRF token from the session has been deprecated in favor of equivalent methods in the :mod:`pyramid.csrf` module. The CSRF methods (
ISession.get_csrf_token
andISession.new_csrf_token
) are no longer required on the :class:`pyramid.interfaces.ISession` interface except when using the default :class:`pyramid.csrf.LegacySessionCSRFStoragePolicy`.Also,
pyramid.session.check_csrf_token
is now located at :func:`pyramid.csrf.check_csrf_token` andpyramid.session.check_csrf_origin
is moved to :func:`pyramid.csrf.check_csrf_origin`.See Pylons#2854 and Pylons#3019
request.exception
andrequest.exc_info
will only be set if the response was generated by the EXCVIEW tween. This is to avoid any confusion where a response was generated elsewhere in the pipeline and not in direct relation to the original exception. If anyone upstream wants to catch and render responses for exceptions they should setrequest.exception
andrequest.exc_info
themselves to indicate the exception that was squashed when generating the response.Similar behavior occurs with :meth:`pyramid.request.Request.invoke_exception_view` in which the exception properties are set to reflect the exception if a response is successfully generated by the method.
This is a very minor incompatibility. Most tweens right now would give priority to the raised exception and ignore
request.exception
. This change just improves and clarifies that bookkeeping by trying to be more clear about the relationship between the response and its squashed exception. See Pylons#3029 and Pylons#3031
- Added the :term:`execution policy` to the routing diagram in :ref:`router_chapter`. See Pylons#2993