1
0
Fork 0
mirror of https://github.com/actix/actix-web.git synced 2024-06-02 13:29:24 +00:00
actix-web/src/httpmessage.rs

810 lines
27 KiB
Rust
Raw Normal View History

use bytes::{Bytes, BytesMut};
2018-04-13 23:02:01 +00:00
use encoding::all::UTF_8;
use encoding::label::encoding_from_whatwg_label;
2018-04-13 23:02:01 +00:00
use encoding::types::{DecoderTrap, Encoding};
2018-04-29 05:55:47 +00:00
use encoding::EncodingRef;
2018-06-16 21:26:34 +00:00
use futures::{Async, Future, Poll, Stream};
use http::{header, HeaderMap};
2018-04-13 23:02:01 +00:00
use mime::Mime;
use serde::de::DeserializeOwned;
use serde_urlencoded;
use std::str;
2018-05-17 19:20:20 +00:00
use error::{
2018-06-17 02:48:50 +00:00
ContentTypeError, ParseError, PayloadError, ReadlinesError, UrlencodedError,
2018-05-17 19:20:20 +00:00
};
2018-03-06 03:28:42 +00:00
use header::Header;
2018-04-13 23:02:01 +00:00
use json::JsonBody;
use multipart::Multipart;
2018-02-28 07:30:26 +00:00
/// Trait that implements general purpose operations on http messages
pub trait HttpMessage {
2018-02-28 07:30:26 +00:00
/// Read the message headers.
fn headers(&self) -> &HeaderMap;
2018-03-06 03:28:42 +00:00
#[doc(hidden)]
/// Get a header
2018-04-13 23:02:01 +00:00
fn get_header<H: Header>(&self) -> Option<H>
where
Self: Sized,
{
2018-03-08 01:40:13 +00:00
if self.headers().contains_key(H::name()) {
H::parse(self).ok()
} else {
None
}
2018-03-06 03:28:42 +00:00
}
2018-04-13 23:02:01 +00:00
/// Read the request content type. If request does not contain
/// *Content-Type* header, empty str get returned.
fn content_type(&self) -> &str {
if let Some(content_type) = self.headers().get(header::CONTENT_TYPE) {
if let Ok(content_type) = content_type.to_str() {
2018-04-13 23:02:01 +00:00
return content_type.split(';').next().unwrap().trim();
}
}
""
}
/// Get content type encoding
///
/// UTF-8 is used by default, If request charset is not set.
fn encoding(&self) -> Result<EncodingRef, ContentTypeError> {
if let Some(mime_type) = self.mime_type()? {
if let Some(charset) = mime_type.get_param("charset") {
if let Some(enc) = encoding_from_whatwg_label(charset.as_str()) {
Ok(enc)
} else {
Err(ContentTypeError::UnknownEncoding)
}
} else {
Ok(UTF_8)
}
} else {
Ok(UTF_8)
}
}
/// Convert the request content type to a known mime type.
fn mime_type(&self) -> Result<Option<Mime>, ContentTypeError> {
if let Some(content_type) = self.headers().get(header::CONTENT_TYPE) {
if let Ok(content_type) = content_type.to_str() {
return match content_type.parse() {
Ok(mt) => Ok(Some(mt)),
Err(_) => Err(ContentTypeError::ParseError),
};
} else {
2018-04-13 23:02:01 +00:00
return Err(ContentTypeError::ParseError);
}
}
Ok(None)
}
/// Check if request has chunked transfer encoding
fn chunked(&self) -> Result<bool, ParseError> {
if let Some(encodings) = self.headers().get(header::TRANSFER_ENCODING) {
if let Ok(s) = encodings.to_str() {
Ok(s.to_lowercase().contains("chunked"))
} else {
Err(ParseError::Header)
}
} else {
Ok(false)
}
}
/// Load http message body.
///
2018-04-13 23:02:01 +00:00
/// By default only 256Kb payload reads to a memory, then
/// `PayloadError::Overflow` get returned. Use `MessageBody::limit()`
/// method to change upper limit.
///
/// ## Server example
///
/// ```rust
/// # extern crate bytes;
/// # extern crate actix_web;
/// # extern crate futures;
/// # #[macro_use] extern crate serde_derive;
2018-06-01 16:36:16 +00:00
/// use actix_web::{
/// AsyncResponder, FutureResponse, HttpMessage, HttpRequest, HttpResponse,
/// };
/// use bytes::Bytes;
/// use futures::future::Future;
///
/// fn index(mut req: HttpRequest) -> FutureResponse<HttpResponse> {
/// req.body() // <- get Body future
/// .limit(1024) // <- change max size of the body to a 1kb
/// .from_err()
/// .and_then(|bytes: Bytes| { // <- complete body
/// println!("==== BODY ==== {:?}", bytes);
/// Ok(HttpResponse::Ok().into())
/// }).responder()
/// }
/// # fn main() {}
/// ```
fn body(self) -> MessageBody<Self>
2018-04-13 23:02:01 +00:00
where
Self: Stream<Item = Bytes, Error = PayloadError> + Sized,
{
MessageBody::new(self)
}
2018-03-28 03:33:24 +00:00
/// Parse `application/x-www-form-urlencoded` encoded request's body.
2018-04-13 23:02:01 +00:00
/// Return `UrlEncoded` future. Form can be deserialized to any type that
/// implements `Deserialize` trait from *serde*.
///
/// Returns error:
///
/// * content type is not `application/x-www-form-urlencoded`
/// * content-length is greater than 256k
///
/// ## Server example
///
/// ```rust
/// # extern crate actix_web;
/// # extern crate futures;
2018-03-28 03:33:24 +00:00
/// # use futures::Future;
2018-04-02 21:00:18 +00:00
/// # use std::collections::HashMap;
2018-06-01 16:36:16 +00:00
/// use actix_web::{FutureResponse, HttpMessage, HttpRequest, HttpResponse};
///
2018-03-28 03:33:24 +00:00
/// fn index(mut req: HttpRequest) -> FutureResponse<HttpResponse> {
2018-04-02 21:00:18 +00:00
/// Box::new(
/// req.urlencoded::<HashMap<String, String>>() // <- get UrlEncoded future
/// .from_err()
/// .and_then(|params| { // <- url encoded parameters
/// println!("==== BODY ==== {:?}", params);
/// Ok(HttpResponse::Ok().into())
2018-06-01 16:36:16 +00:00
/// }),
/// )
/// }
/// # fn main() {}
/// ```
2018-04-02 21:00:18 +00:00
fn urlencoded<T: DeserializeOwned>(self) -> UrlEncoded<Self, T>
2018-04-13 23:02:01 +00:00
where
Self: Stream<Item = Bytes, Error = PayloadError> + Sized,
{
UrlEncoded::new(self)
}
/// Parse `application/json` encoded body.
/// Return `JsonBody<T>` future. It resolves to a `T` value.
///
/// Returns error:
///
/// * content type is not `application/json`
/// * content length is greater than 256k
///
/// ## Server example
///
/// ```rust
/// # extern crate actix_web;
/// # extern crate futures;
/// # #[macro_use] extern crate serde_derive;
/// use actix_web::*;
2018-06-01 16:36:16 +00:00
/// use futures::future::{ok, Future};
///
/// #[derive(Deserialize, Debug)]
/// struct MyObj {
/// name: String,
/// }
///
2018-06-01 16:36:16 +00:00
/// fn index(mut req: HttpRequest) -> Box<Future<Item = HttpResponse, Error = Error>> {
/// req.json() // <- get JsonBody future
/// .from_err()
/// .and_then(|val: MyObj| { // <- deserialized value
/// println!("==== BODY ==== {:?}", val);
/// Ok(HttpResponse::Ok().into())
/// }).responder()
/// }
/// # fn main() {}
/// ```
fn json<T: DeserializeOwned>(self) -> JsonBody<Self, T>
2018-04-13 23:02:01 +00:00
where
Self: Stream<Item = Bytes, Error = PayloadError> + Sized,
{
JsonBody::new(self)
}
/// Return stream to http payload processes as multipart.
///
/// Content-type: multipart/form-data;
///
/// ## Server example
///
/// ```rust
/// # extern crate actix_web;
/// # extern crate env_logger;
/// # extern crate futures;
/// # use std::str;
/// # use actix_web::*;
2018-06-01 17:27:23 +00:00
/// # use actix_web::actix::fut::FinishStream;
/// # use futures::{Future, Stream};
/// # use futures::future::{ok, result, Either};
2018-06-01 16:36:16 +00:00
/// fn index(mut req: HttpRequest) -> Box<Future<Item = HttpResponse, Error = Error>> {
/// req.multipart().from_err() // <- get multipart stream for current request
/// .and_then(|item| match item { // <- iterate over multipart items
/// multipart::MultipartItem::Field(field) => {
/// // Field in turn is stream of *Bytes* object
/// Either::A(field.from_err()
/// .map(|c| println!("-- CHUNK: \n{:?}", str::from_utf8(&c)))
/// .finish())
/// },
/// multipart::MultipartItem::Nested(mp) => {
/// // Or item could be nested Multipart stream
/// Either::B(ok(()))
/// }
/// })
/// .finish() // <- Stream::finish() combinator from actix
/// .map(|_| HttpResponse::Ok().into())
/// .responder()
/// }
/// # fn main() {}
/// ```
fn multipart(self) -> Multipart<Self>
2018-04-13 23:02:01 +00:00
where
Self: Stream<Item = Bytes, Error = PayloadError> + Sized,
{
let boundary = Multipart::boundary(self.headers());
Multipart::new(boundary, self)
}
2018-06-16 21:26:34 +00:00
2018-06-13 17:43:03 +00:00
/// Return stream of lines.
fn readlines(self) -> Readlines<Self>
where
Self: Stream<Item = Bytes, Error = PayloadError> + Sized,
{
Readlines::new(self)
}
}
/// Stream to read request line by line.
pub struct Readlines<T>
where
T: HttpMessage + Stream<Item = Bytes, Error = PayloadError> + 'static,
{
req: T,
2018-06-13 19:41:35 +00:00
buff: BytesMut,
2018-06-13 17:43:03 +00:00
limit: usize,
2018-06-13 21:19:48 +00:00
checked_buff: bool,
2018-06-13 17:43:03 +00:00
}
impl<T> Readlines<T>
where
T: HttpMessage + Stream<Item = Bytes, Error = PayloadError> + 'static,
{
/// Create a new stream to read request line by line.
fn new(req: T) -> Self {
Readlines {
req,
2018-06-13 19:41:35 +00:00
buff: BytesMut::with_capacity(262_144),
2018-06-13 17:43:03 +00:00
limit: 262_144,
2018-06-13 21:19:48 +00:00
checked_buff: true,
2018-06-13 17:43:03 +00:00
}
}
2018-06-16 21:26:34 +00:00
2018-06-13 19:41:35 +00:00
/// Change max line size. By default max size is 256Kb
2018-06-13 17:43:03 +00:00
pub fn limit(mut self, limit: usize) -> Self {
self.limit = limit;
self
}
}
impl<T> Stream for Readlines<T>
where
T: HttpMessage + Stream<Item = Bytes, Error = PayloadError> + 'static,
{
type Item = String;
type Error = ReadlinesError;
2018-06-16 21:26:34 +00:00
2018-06-13 17:43:03 +00:00
fn poll(&mut self) -> Poll<Option<Self::Item>, Self::Error> {
2018-06-13 19:41:35 +00:00
let encoding = self.req.encoding()?;
// check if there is a newline in the buffer
2018-06-13 21:19:48 +00:00
if !self.checked_buff {
let mut found: Option<usize> = None;
for (ind, b) in self.buff.iter().enumerate() {
2018-06-16 21:26:34 +00:00
if *b == b'\n' {
2018-06-13 21:19:48 +00:00
found = Some(ind);
break;
}
2018-06-13 19:41:35 +00:00
}
2018-06-13 21:19:48 +00:00
if let Some(ind) = found {
// check if line is longer than limit
2018-06-16 21:26:34 +00:00
if ind + 1 > self.limit {
2018-06-13 21:19:48 +00:00
return Err(ReadlinesError::LimitOverflow);
}
let enc: *const Encoding = encoding as *const Encoding;
let line = if enc == UTF_8 {
2018-06-16 21:26:34 +00:00
str::from_utf8(&self.buff.split_to(ind + 1))
2018-06-13 21:19:48 +00:00
.map_err(|_| ReadlinesError::EncodingError)?
.to_owned()
} else {
encoding
2018-06-16 21:26:34 +00:00
.decode(&self.buff.split_to(ind + 1), DecoderTrap::Strict)
2018-06-13 21:19:48 +00:00
.map_err(|_| ReadlinesError::EncodingError)?
};
return Ok(Async::Ready(Some(line)));
2018-06-13 19:41:35 +00:00
}
2018-06-13 21:19:48 +00:00
self.checked_buff = true;
2018-06-13 19:41:35 +00:00
}
// poll req for more bytes
2018-06-13 17:43:03 +00:00
match self.req.poll() {
2018-06-13 19:41:35 +00:00
Ok(Async::Ready(Some(mut bytes))) => {
// check if there is a newline in bytes
let mut found: Option<usize> = None;
for (ind, b) in bytes.iter().enumerate() {
2018-06-16 21:26:34 +00:00
if *b == b'\n' {
2018-06-13 19:41:35 +00:00
found = Some(ind);
break;
2018-06-13 17:43:03 +00:00
}
2018-06-13 19:41:35 +00:00
}
if let Some(ind) = found {
// check if line is longer than limit
2018-06-16 21:26:34 +00:00
if ind + 1 > self.limit {
2018-06-13 17:43:03 +00:00
return Err(ReadlinesError::LimitOverflow);
}
2018-06-13 19:41:35 +00:00
let enc: *const Encoding = encoding as *const Encoding;
let line = if enc == UTF_8 {
2018-06-16 21:26:34 +00:00
str::from_utf8(&bytes.split_to(ind + 1))
2018-06-13 21:19:48 +00:00
.map_err(|_| ReadlinesError::EncodingError)?
2018-06-13 19:41:35 +00:00
.to_owned()
} else {
encoding
2018-06-16 21:26:34 +00:00
.decode(&bytes.split_to(ind + 1), DecoderTrap::Strict)
2018-06-13 21:19:48 +00:00
.map_err(|_| ReadlinesError::EncodingError)?
2018-06-13 19:41:35 +00:00
};
// extend buffer with rest of the bytes;
self.buff.extend_from_slice(&bytes);
2018-06-13 21:19:48 +00:00
self.checked_buff = false;
2018-06-13 19:41:35 +00:00
return Ok(Async::Ready(Some(line)));
2018-06-13 17:43:03 +00:00
}
2018-06-13 19:41:35 +00:00
self.buff.extend_from_slice(&bytes);
2018-06-13 17:43:03 +00:00
Ok(Async::NotReady)
2018-06-16 21:26:34 +00:00
}
2018-06-13 17:43:03 +00:00
Ok(Async::NotReady) => Ok(Async::NotReady),
Ok(Async::Ready(None)) => {
2018-06-16 21:26:34 +00:00
if self.buff.is_empty() {
2018-06-13 17:43:03 +00:00
return Ok(Async::Ready(None));
}
2018-06-13 19:41:35 +00:00
if self.buff.len() > self.limit {
return Err(ReadlinesError::LimitOverflow);
}
let enc: *const Encoding = encoding as *const Encoding;
let line = if enc == UTF_8 {
str::from_utf8(&self.buff)
2018-06-13 21:19:48 +00:00
.map_err(|_| ReadlinesError::EncodingError)?
2018-06-13 19:41:35 +00:00
.to_owned()
} else {
encoding
.decode(&self.buff, DecoderTrap::Strict)
2018-06-13 21:19:48 +00:00
.map_err(|_| ReadlinesError::EncodingError)?
2018-06-13 19:41:35 +00:00
};
2018-06-13 17:43:03 +00:00
self.buff.clear();
2018-06-16 21:26:34 +00:00
Ok(Async::Ready(Some(line)))
}
2018-06-13 17:43:03 +00:00
Err(e) => Err(ReadlinesError::from(e)),
}
}
}
/// Future that resolves to a complete http message body.
pub struct MessageBody<T> {
limit: usize,
req: Option<T>,
2018-04-13 23:02:01 +00:00
fut: Option<Box<Future<Item = Bytes, Error = PayloadError>>>,
}
impl<T> MessageBody<T> {
/// Create `RequestBody` for request.
pub fn new(req: T) -> MessageBody<T> {
MessageBody {
limit: 262_144,
req: Some(req),
fut: None,
}
}
/// Change max size of payload. By default max size is 256Kb
pub fn limit(mut self, limit: usize) -> Self {
self.limit = limit;
self
}
}
impl<T> Future for MessageBody<T>
2018-04-13 23:02:01 +00:00
where
T: HttpMessage + Stream<Item = Bytes, Error = PayloadError> + 'static,
{
type Item = Bytes;
type Error = PayloadError;
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
if let Some(req) = self.req.take() {
if let Some(len) = req.headers().get(header::CONTENT_LENGTH) {
if let Ok(s) = len.to_str() {
if let Ok(len) = s.parse::<usize>() {
if len > self.limit {
return Err(PayloadError::Overflow);
}
} else {
return Err(PayloadError::UnknownLength);
}
} else {
return Err(PayloadError::UnknownLength);
}
}
// future
let limit = self.limit;
self.fut = Some(Box::new(
req.from_err()
.fold(BytesMut::new(), move |mut body, chunk| {
if (body.len() + chunk.len()) > limit {
Err(PayloadError::Overflow)
} else {
body.extend_from_slice(&chunk);
Ok(body)
}
})
2018-04-13 23:02:01 +00:00
.map(|body| body.freeze()),
));
}
2018-04-29 16:09:08 +00:00
self.fut
.as_mut()
.expect("UrlEncoded could not be used second time")
.poll()
}
}
/// Future that resolves to a parsed urlencoded values.
2018-04-02 21:00:18 +00:00
pub struct UrlEncoded<T, U> {
req: Option<T>,
limit: usize,
2018-04-13 23:02:01 +00:00
fut: Option<Box<Future<Item = U, Error = UrlencodedError>>>,
}
2018-04-02 21:00:18 +00:00
impl<T, U> UrlEncoded<T, U> {
/// Create a new future to URL encode a request
2018-04-02 21:00:18 +00:00
pub fn new(req: T) -> UrlEncoded<T, U> {
UrlEncoded {
req: Some(req),
limit: 262_144,
fut: None,
}
}
/// Change max size of payload. By default max size is 256Kb
pub fn limit(mut self, limit: usize) -> Self {
self.limit = limit;
self
}
}
2018-04-02 21:00:18 +00:00
impl<T, U> Future for UrlEncoded<T, U>
2018-04-13 23:02:01 +00:00
where
T: HttpMessage + Stream<Item = Bytes, Error = PayloadError> + 'static,
U: DeserializeOwned + 'static,
{
2018-04-02 21:00:18 +00:00
type Item = U;
type Error = UrlencodedError;
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
if let Some(req) = self.req.take() {
if let Some(len) = req.headers().get(header::CONTENT_LENGTH) {
if let Ok(s) = len.to_str() {
if let Ok(len) = s.parse::<u64>() {
if len > 262_144 {
return Err(UrlencodedError::Overflow);
}
} else {
2018-04-13 23:02:01 +00:00
return Err(UrlencodedError::UnknownLength);
}
} else {
2018-04-13 23:02:01 +00:00
return Err(UrlencodedError::UnknownLength);
}
}
// check content type
if req.content_type().to_lowercase() != "application/x-www-form-urlencoded" {
2018-04-13 23:02:01 +00:00
return Err(UrlencodedError::ContentType);
}
2018-05-17 19:20:20 +00:00
let encoding = req.encoding().map_err(|_| UrlencodedError::ContentType)?;
// future
let limit = self.limit;
2018-05-17 19:20:20 +00:00
let fut = req
.from_err()
.fold(BytesMut::new(), move |mut body, chunk| {
if (body.len() + chunk.len()) > limit {
Err(UrlencodedError::Overflow)
} else {
body.extend_from_slice(&chunk);
Ok(body)
}
})
.and_then(move |body| {
2018-04-02 21:00:18 +00:00
let enc: *const Encoding = encoding as *const Encoding;
if enc == UTF_8 {
serde_urlencoded::from_bytes::<U>(&body)
.map_err(|_| UrlencodedError::Parse)
} else {
2018-04-13 23:02:01 +00:00
let body = encoding
.decode(&body, DecoderTrap::Strict)
2018-04-02 21:00:18 +00:00
.map_err(|_| UrlencodedError::Parse)?;
serde_urlencoded::from_str::<U>(&body)
.map_err(|_| UrlencodedError::Parse)
}
});
self.fut = Some(Box::new(fut));
}
2018-04-29 16:09:08 +00:00
self.fut
.as_mut()
.expect("UrlEncoded could not be used second time")
.poll()
}
}
#[cfg(test)]
mod tests {
use super::*;
use encoding::all::ISO_8859_2;
2018-04-29 05:55:47 +00:00
use encoding::Encoding;
use futures::Async;
2018-04-13 23:02:01 +00:00
use http::{Method, Uri, Version};
use httprequest::HttpRequest;
2018-04-13 23:02:01 +00:00
use mime;
use std::str::FromStr;
use test::TestRequest;
#[test]
fn test_content_type() {
let req = TestRequest::with_header("content-type", "text/plain").finish();
assert_eq!(req.content_type(), "text/plain");
2018-04-13 23:02:01 +00:00
let req =
TestRequest::with_header("content-type", "application/json; charset=utf=8")
.finish();
assert_eq!(req.content_type(), "application/json");
let req = HttpRequest::default();
assert_eq!(req.content_type(), "");
}
#[test]
fn test_mime_type() {
let req = TestRequest::with_header("content-type", "application/json").finish();
assert_eq!(req.mime_type().unwrap(), Some(mime::APPLICATION_JSON));
let req = HttpRequest::default();
assert_eq!(req.mime_type().unwrap(), None);
2018-04-13 23:02:01 +00:00
let req =
TestRequest::with_header("content-type", "application/json; charset=utf-8")
.finish();
let mt = req.mime_type().unwrap().unwrap();
assert_eq!(mt.get_param(mime::CHARSET), Some(mime::UTF_8));
assert_eq!(mt.type_(), mime::APPLICATION);
assert_eq!(mt.subtype(), mime::JSON);
}
#[test]
fn test_mime_type_error() {
let req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
"content-type",
"applicationadfadsfasdflknadsfklnadsfjson",
).finish();
assert_eq!(Err(ContentTypeError::ParseError), req.mime_type());
}
#[test]
fn test_encoding() {
let req = HttpRequest::default();
assert_eq!(UTF_8.name(), req.encoding().unwrap().name());
2018-04-13 23:02:01 +00:00
let req = TestRequest::with_header("content-type", "application/json").finish();
assert_eq!(UTF_8.name(), req.encoding().unwrap().name());
let req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
"content-type",
"application/json; charset=ISO-8859-2",
).finish();
assert_eq!(ISO_8859_2.name(), req.encoding().unwrap().name());
}
#[test]
fn test_encoding_error() {
2018-04-13 23:02:01 +00:00
let req = TestRequest::with_header("content-type", "applicatjson").finish();
2018-05-17 19:20:20 +00:00
assert_eq!(Some(ContentTypeError::ParseError), req.encoding().err());
let req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
"content-type",
"application/json; charset=kkkttktk",
).finish();
2018-04-29 16:09:08 +00:00
assert_eq!(
Some(ContentTypeError::UnknownEncoding),
req.encoding().err()
);
}
#[test]
fn test_chunked() {
let req = HttpRequest::default();
assert!(!req.chunked().unwrap());
2018-04-13 23:02:01 +00:00
let req =
TestRequest::with_header(header::TRANSFER_ENCODING, "chunked").finish();
assert!(req.chunked().unwrap());
let mut headers = HeaderMap::new();
2018-06-19 18:36:32 +00:00
let hdr = Bytes::from_static(b"some va\xadscc\xacas0xsdasdlue");
2018-04-13 23:02:01 +00:00
headers.insert(
header::TRANSFER_ENCODING,
2018-06-19 18:36:32 +00:00
header::HeaderValue::from_shared(hdr).unwrap(),
2018-04-13 23:02:01 +00:00
);
let req = HttpRequest::new(
2018-04-13 23:02:01 +00:00
Method::GET,
Uri::from_str("/").unwrap(),
Version::HTTP_11,
headers,
None,
);
assert!(req.chunked().is_err());
}
impl PartialEq for UrlencodedError {
fn eq(&self, other: &UrlencodedError) -> bool {
match *self {
UrlencodedError::Chunked => match *other {
UrlencodedError::Chunked => true,
_ => false,
},
UrlencodedError::Overflow => match *other {
UrlencodedError::Overflow => true,
_ => false,
},
UrlencodedError::UnknownLength => match *other {
UrlencodedError::UnknownLength => true,
_ => false,
},
UrlencodedError::ContentType => match *other {
UrlencodedError::ContentType => true,
_ => false,
},
_ => false,
}
}
}
2018-04-02 21:00:18 +00:00
#[derive(Deserialize, Debug, PartialEq)]
struct Info {
hello: String,
}
#[test]
fn test_urlencoded_error() {
let req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
header::CONTENT_TYPE,
"application/x-www-form-urlencoded",
).header(header::CONTENT_LENGTH, "xxxx")
.finish();
2018-04-13 23:02:01 +00:00
assert_eq!(
req.urlencoded::<Info>().poll().err().unwrap(),
UrlencodedError::UnknownLength
);
let req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
header::CONTENT_TYPE,
"application/x-www-form-urlencoded",
).header(header::CONTENT_LENGTH, "1000000")
.finish();
2018-04-13 23:02:01 +00:00
assert_eq!(
req.urlencoded::<Info>().poll().err().unwrap(),
UrlencodedError::Overflow
);
2018-04-13 23:02:01 +00:00
let req = TestRequest::with_header(header::CONTENT_TYPE, "text/plain")
.header(header::CONTENT_LENGTH, "10")
.finish();
2018-04-13 23:02:01 +00:00
assert_eq!(
req.urlencoded::<Info>().poll().err().unwrap(),
UrlencodedError::ContentType
);
}
#[test]
fn test_urlencoded() {
let mut req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
header::CONTENT_TYPE,
"application/x-www-form-urlencoded",
).header(header::CONTENT_LENGTH, "11")
.finish();
2018-04-29 16:09:08 +00:00
req.payload_mut()
.unread_data(Bytes::from_static(b"hello=world"));
2018-04-02 21:00:18 +00:00
let result = req.urlencoded::<Info>().poll().ok().unwrap();
2018-04-13 23:02:01 +00:00
assert_eq!(
result,
Async::Ready(Info {
hello: "world".to_owned()
})
);
let mut req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
header::CONTENT_TYPE,
"application/x-www-form-urlencoded; charset=utf-8",
).header(header::CONTENT_LENGTH, "11")
.finish();
2018-04-29 16:09:08 +00:00
req.payload_mut()
.unread_data(Bytes::from_static(b"hello=world"));
let result = req.urlencoded().poll().ok().unwrap();
2018-04-13 23:02:01 +00:00
assert_eq!(
result,
Async::Ready(Info {
hello: "world".to_owned()
})
);
2018-04-02 21:00:18 +00:00
}
#[test]
fn test_message_body() {
let req = TestRequest::with_header(header::CONTENT_LENGTH, "xxxx").finish();
match req.body().poll().err().unwrap() {
PayloadError::UnknownLength => (),
2018-03-29 22:55:27 +00:00
_ => unreachable!("error"),
}
let req = TestRequest::with_header(header::CONTENT_LENGTH, "1000000").finish();
match req.body().poll().err().unwrap() {
PayloadError::Overflow => (),
2018-03-29 22:55:27 +00:00
_ => unreachable!("error"),
}
let mut req = HttpRequest::default();
2018-05-17 19:20:20 +00:00
req.payload_mut().unread_data(Bytes::from_static(b"test"));
match req.body().poll().ok().unwrap() {
Async::Ready(bytes) => assert_eq!(bytes, Bytes::from_static(b"test")),
2018-03-29 22:55:27 +00:00
_ => unreachable!("error"),
}
let mut req = HttpRequest::default();
2018-04-29 16:09:08 +00:00
req.payload_mut()
.unread_data(Bytes::from_static(b"11111111111111"));
match req.body().limit(5).poll().err().unwrap() {
PayloadError::Overflow => (),
2018-03-29 22:55:27 +00:00
_ => unreachable!("error"),
}
}
2018-06-16 21:26:34 +00:00
2018-06-13 21:19:48 +00:00
#[test]
fn test_readlines() {
let mut req = HttpRequest::default();
req.payload_mut().unread_data(Bytes::from_static(
b"Lorem Ipsum is simply dummy text of the printing and typesetting\n\
industry. Lorem Ipsum has been the industry's standard dummy\n\
2018-06-16 21:26:34 +00:00
Contrary to popular belief, Lorem Ipsum is not simply random text.",
2018-06-13 21:19:48 +00:00
));
let mut r = Readlines::new(req);
match r.poll().ok().unwrap() {
2018-06-16 21:26:34 +00:00
Async::Ready(Some(s)) => assert_eq!(
s,
"Lorem Ipsum is simply dummy text of the printing and typesetting\n"
),
2018-06-13 21:19:48 +00:00
_ => unreachable!("error"),
}
match r.poll().ok().unwrap() {
2018-06-16 21:26:34 +00:00
Async::Ready(Some(s)) => assert_eq!(
s,
"industry. Lorem Ipsum has been the industry's standard dummy\n"
),
2018-06-13 21:19:48 +00:00
_ => unreachable!("error"),
}
match r.poll().ok().unwrap() {
2018-06-16 21:26:34 +00:00
Async::Ready(Some(s)) => assert_eq!(
s,
"Contrary to popular belief, Lorem Ipsum is not simply random text."
),
2018-06-13 21:19:48 +00:00
_ => unreachable!("error"),
}
}
}