www/p5-Catalyst-Action-REST - The NetBSD Packages Collection

Automated REST Method Dispatching

This Action handles doing automatic method dispatching for REST
requests. It takes a normal Catalyst action, and changes the dispatch
to append an underscore and method name.

For example, in the synopsis above, calling GET on "/foo" would
result in the foo_GET method being dispatched.

If a method is requested that is not implemented, this action will
return a status 405 (Method Not Found). It will populate the "Allow"
header with the list of implemented request methods. You can override
this behavior by implementing a custom 405 handler like so:

   sub foo_not_implemented {
      ... handle not implemented methods ...
   }

If you do not provide an _OPTIONS subroutine, we will automatically
respond with a 200 OK. The "Allow" header will be populated with
the list of implemented request methods.

It is likely that you really want to look at Catalyst::Controller::REST,
which brings this class together with automatic Serialization of
requests and responses.

Build dependencies

pkgtools/mktools pkgtools/cwrappers

Runtime dependencies

www/p5-Catalyst-Runtime devel/p5-Class-Inspector devel/p5-Config-General devel/p5-Data-Serializer devel/p5-Data-Taxi devel/p5-FreezeThaw converters/p5-JSON devel/p5-MRO-Compat devel/p5-Module-Pluggable devel/p5-Moose devel/p5-PHP-Serialization devel/p5-Params-Validate www/p5-URI-Find textproc/p5-YAML-Syck www/p5-libwww devel/p5-namespace-autoclean lang/perl5 lang/perl5

Binary packages

OSArchitectureVersion
NetBSD 10.0aarch64p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0aarch64p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0aarch64ebp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0earmv6hfp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0earmv6hfp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0earmv6hfp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0earmv7hfp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0earmv7hfp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0earmv7hfp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0i386p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0i386p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0i386p5-Catalyst-Action-REST-1.21nb7.tgz
NetBSD 10.0powerpcp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0powerpcp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0powerpcp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0powerpcp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0sparc64p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0sparcp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0x86_64p5-Catalyst-Action-REST-1.21nb7.tgz
NetBSD 10.0x86_64p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 10.0x86_64p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0aarch64p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0aarch64p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0aarch64p5-Catalyst-Action-REST-1.21nb7.tgz
NetBSD 9.0earmv6hfp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0earmv6hfp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0earmv6hfp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0earmv7hfp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0earmv7hfp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0earmv7hfp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0i386p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0i386p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0i386p5-Catalyst-Action-REST-1.21nb7.tgz
NetBSD 9.0powerpcp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0powerpcp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0powerpcp5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0x86_64p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0x86_64p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.0x86_64p5-Catalyst-Action-REST-1.21nb7.tgz
NetBSD 9.3x86_64p5-Catalyst-Action-REST-1.21nb6.tgz
NetBSD 9.3x86_64p5-Catalyst-Action-REST-1.21nb7.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.