Parsita

Latest version: v2.2.1

Safety actively analyzes 723650 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 3 of 4

1.4.1

Not secure
Maintenance release with no change in behavior:

* Add support for Python 3.9
* Drop support for Python 3.5
* Fix typos in README examples

1.4.0

Not secure
One new feature and a few minor bug fixes:

* Add the `PredicateParser`, which allows for a boolean-returning function to be applied to the result of a parser to determine if the result is acceptable
* Do not crash if `StringReader.next_token_regex` does not match
* In `RegexParser.__repr__`, appropriately prepend `name_or_nothing`
* Various fixes to type hints

Thanks to arseniiv for contributing to this release.

1.3.3

Not secure
Update supported Python versions:

* Add support for Python 3.8
* Drop support for Python 3.4
* Disallow instantiation of `Parsers` classes. This was never supposed to be allowed and now raises a good exception.

1.3.2

Not secure
Update in supported Python versions:
* Add support for newly released Python 3.7
* Drop support for end-of-life Python 3.3

1.3.1

Not secure
Improvements in ergonomics:

* Whitespace is now consumed from both sides of tokens in `TextParser`s. Previously, it was only consumed from the trailing ends of tokens, leaving the leading whitespace to the previous parser. This resulted in weird interactions between parsers that ignored whitespace and those that did not (e.g. `examples/json.py`). It was thought that consuming whitespace from both sides would harm performance, but that turned out to not be the case. Typical parsers should be completely unaffected, while atypical parsers should be a little more predictable.

* Parsita always reports the failure message of the parser that consumed the most input, which is usually the most helpful message when many alternative branches fail. Previously, if multiple alternatives failed at the same position in the input, the first parser to get that far was the one reported. Now, when multiple alternatives fail at the same place, all expected values are included in the final failure message. This should improve the readability of error messages as the user can see all possible values for the next token at that position.

* Because failure messages need to be mergable, the previously undocumented `failure` parser was changed so that it will not display an arbitrary failure message, but only an arbitrary expected value. Due to the limited utility of `failure`, it was considered a reasonable tradeoff to get better failure messages for the rest of the standard parsers at the expense of `failure`.

* Added `success` and `failure` dummy parsers to the tutorial so that there is some documentation for these.

* If the internal member of a repeated parser matches an empty string, then the repeated parser will match an empty string forever. When this situation is detected, Parsita now raises a runtime exception, rather than hanging.

1.3.0

Not secure
Release documentation was broken on PyPI. Parsita 1.3.1 was released immediately with identical code.

Page 3 of 4

© 2025 Safety CLI Cybersecurity Inc. All Rights Reserved.