- Improvement about web form manipulation (remove a field, set a text value to input fields by name, ...)
- Improved web form html generation, especially for select and type checkbox
- Updated the date input field interface with a new set_date_value .
File response:
- "application/force-download" is not a standard MIME content type, so use "application_octet_stream" instead as default.
Standalone connector:
- Added expected creation procedure for the service launcher.
- Added new "secure_port" configuration variable, for SSL standalone service.
This way, if `is_secure` is True, the server will use `secure_port` (overrides `port` value).
Date:
- Improved support for RFC 3339 (a profile of ISO 8601)
Removed obsolete and warnings:
- removed usage of FILE_NAME
- updated code to avoid implicit conversion from STRING_32 to STRING_8
- avoid uneed conversion to STRING_8 (when possible)
- Added missing link to FEED.
- Closer to ATOM validation, especially for xhtml content.
- Closer to RSS2 specification.
- Removed unwanted conversion from STRING_32 to STRING_8. (fixing feed generation when dealing with Unicode content).
Adopted the nanoseconds timeout precision
- in config file added support for ns, us, ms, s timeout precision (without indication, it uses `seconds` precision).
Factorized the implementation in WGI_RESCUE_EXECUTION, and now by redefining the `WGI_EXECUTION.execute_rescue (...)` procedure, it is possible to have a custom response on such rescued execution.
This protection could be implemented with a regular expression,
or using another solution (as manual parsing).
Also, when a protection detects an issue, instead of returning empty string,
it returns Void. If the value is a multiple string value, if an item is detected for an issue,
the returned multiple string value is now Void.
This abstraction will allow to return either Void, or a "corrected" value,
for instance the string value, without the detected "<script..>..</script>" text.
TODO: improve the WSF_PROTECTION_REGEXP to allow replacement strategy.
Added a new library wsf_security.
Updated test cases to cover protections policy.
Added a simple filter using an XSS implementation with WSF_XSS_REQUEST, but
it's possible to build custom filters and request using different protection patterns.