我想禁用无头API端点的会话,但我必须保持它们打开,因为此服务还处理用户登录.
但是makeSessionBackend,无法访问Handler东西甚至是当前的URI isAuthorizedSource.
在我看来,我应该提升客户端会话后端代码并将其与包装器一起使用,直到我能从该WAI获得至少文本路径Request.
是不是有更好的方法告诉任何bakend忽略一些路线,如StaticR?
我已配置(几乎默认)supervisord.conf并启动了supervisord.已启动任务和xmlrpc接口已启动,但xmlrpclib.Fault: <Fault 1: 'UNKNOWN_METHOD'>即使启动supervisorctl本身,也会提供
evey xmlrpc请求.
日志中有相同的消息:
TRAC XML-RPC method called: supervisor.getAllProcessInfo()
TRAC XML-RPC method supervisor.getAllProcessInfo() returned fault: [1] UNKNOWN_METHOD
TRAC 127.0.0.1:44458 - - [11/Nov/2009:09:51:02 +0300] "POST /RPC2 HTTP/1.1" 200 391
Run Code Online (Sandbox Code Playgroud) 我想在我的attoparsec解析器中进行一些跟踪/调试.这是最小的[不]工作示例:
import Data.Text as T
import Data.Attoparsec.Text
import Data.Attoparsec.Combinator
import Control.Applicative ((<*), (*>))
parseSentences :: Parser [T.Text]
parseSentences = many1 $ takeWhile1 (/= '.') <* char '.' <* skipSpace
parser :: Parser [T.Text]
parser = do
stuff <- parseSentences
-- putStrLn $ "Got stuff: " ++ show stuff
tail <- takeText
-- putStrLn $ "Got tail: " ++ show tail
return $ stuff ++ [tail, T.pack "more stuff"]
main = do
let input = T.pack "sample. example. bang"
print $ …Run Code Online (Sandbox Code Playgroud) haskell ×2
attoparsec ×1
io ×1
monads ×1
python ×1
session ×1
supervisord ×1
xml-rpc ×1
yesod ×1