1
0
Fork 0
mirror of https://github.com/actix/actix-web.git synced 2024-06-02 13:29:24 +00:00
actix-web/src/httpmessage.rs

903 lines
28 KiB
Rust
Raw Normal View History

use std::cell::{Ref, RefMut};
2019-02-13 21:52:11 +00:00
use std::str;
2019-02-12 19:07:42 +00:00
use bytes::{Bytes, BytesMut};
use cookie::Cookie;
2018-04-13 23:02:01 +00:00
use encoding::all::UTF_8;
use encoding::label::encoding_from_whatwg_label;
2018-04-13 23:02:01 +00:00
use encoding::types::{DecoderTrap, Encoding};
2018-04-29 05:55:47 +00:00
use encoding::EncodingRef;
2018-06-16 21:26:34 +00:00
use futures::{Async, Future, Poll, Stream};
use http::{header, HeaderMap};
2018-04-13 23:02:01 +00:00
use mime::Mime;
use serde::de::DeserializeOwned;
use serde_urlencoded;
2018-12-06 22:32:52 +00:00
use crate::error::{
ContentTypeError, CookieParseError, ParseError, PayloadError, ReadlinesError,
UrlencodedError,
2018-05-17 19:20:20 +00:00
};
use crate::extensions::Extensions;
2018-12-06 22:32:52 +00:00
use crate::header::Header;
use crate::json::JsonBody;
2019-02-12 19:07:42 +00:00
use crate::payload::Payload;
struct Cookies(Vec<Cookie<'static>>);
2018-02-28 07:30:26 +00:00
/// Trait that implements general purpose operations on http messages
2018-06-25 04:58:04 +00:00
pub trait HttpMessage: Sized {
/// Type of message payload stream
2019-02-13 21:52:11 +00:00
type Stream;
2018-06-25 04:58:04 +00:00
2018-02-28 07:30:26 +00:00
/// Read the message headers.
fn headers(&self) -> &HeaderMap;
/// Mutable reference to the message's headers.
fn headers_mut(&mut self) -> &mut HeaderMap;
2018-06-25 04:58:04 +00:00
/// Message payload stream
2019-02-13 21:52:11 +00:00
fn take_payload(&mut self) -> Payload<Self::Stream>;
2018-06-25 04:58:04 +00:00
/// Request's extensions container
fn extensions(&self) -> Ref<Extensions>;
/// Mutable reference to a the request's extensions container
fn extensions_mut(&self) -> RefMut<Extensions>;
2018-03-06 03:28:42 +00:00
#[doc(hidden)]
/// Get a header
2018-04-13 23:02:01 +00:00
fn get_header<H: Header>(&self) -> Option<H>
where
Self: Sized,
{
2018-03-08 01:40:13 +00:00
if self.headers().contains_key(H::name()) {
H::parse(self).ok()
} else {
None
}
2018-03-06 03:28:42 +00:00
}
2018-04-13 23:02:01 +00:00
/// Read the request content type. If request does not contain
/// *Content-Type* header, empty str get returned.
fn content_type(&self) -> &str {
if let Some(content_type) = self.headers().get(header::CONTENT_TYPE) {
if let Ok(content_type) = content_type.to_str() {
2018-04-13 23:02:01 +00:00
return content_type.split(';').next().unwrap().trim();
}
}
""
}
/// Get content type encoding
///
/// UTF-8 is used by default, If request charset is not set.
fn encoding(&self) -> Result<EncodingRef, ContentTypeError> {
if let Some(mime_type) = self.mime_type()? {
if let Some(charset) = mime_type.get_param("charset") {
if let Some(enc) = encoding_from_whatwg_label(charset.as_str()) {
Ok(enc)
} else {
Err(ContentTypeError::UnknownEncoding)
}
} else {
Ok(UTF_8)
}
} else {
Ok(UTF_8)
}
}
/// Convert the request content type to a known mime type.
fn mime_type(&self) -> Result<Option<Mime>, ContentTypeError> {
if let Some(content_type) = self.headers().get(header::CONTENT_TYPE) {
if let Ok(content_type) = content_type.to_str() {
return match content_type.parse() {
Ok(mt) => Ok(Some(mt)),
Err(_) => Err(ContentTypeError::ParseError),
};
} else {
2018-04-13 23:02:01 +00:00
return Err(ContentTypeError::ParseError);
}
}
Ok(None)
}
/// Check if request has chunked transfer encoding
fn chunked(&self) -> Result<bool, ParseError> {
if let Some(encodings) = self.headers().get(header::TRANSFER_ENCODING) {
if let Ok(s) = encodings.to_str() {
Ok(s.to_lowercase().contains("chunked"))
} else {
Err(ParseError::Header)
}
} else {
Ok(false)
}
}
/// Load request cookies.
#[inline]
fn cookies(&self) -> Result<Ref<Vec<Cookie<'static>>>, CookieParseError> {
if self.extensions().get::<Cookies>().is_none() {
let mut cookies = Vec::new();
for hdr in self.headers().get_all(header::COOKIE) {
let s =
str::from_utf8(hdr.as_bytes()).map_err(CookieParseError::from)?;
for cookie_str in s.split(';').map(|s| s.trim()) {
if !cookie_str.is_empty() {
cookies.push(Cookie::parse_encoded(cookie_str)?.into_owned());
}
}
}
self.extensions_mut().insert(Cookies(cookies));
}
Ok(Ref::map(self.extensions(), |ext| {
&ext.get::<Cookies>().unwrap().0
}))
}
/// Return request cookie.
fn cookie(&self, name: &str) -> Option<Cookie<'static>> {
if let Ok(cookies) = self.cookies() {
for cookie in cookies.iter() {
if cookie.name() == name {
return Some(cookie.to_owned());
}
}
}
None
}
/// Load http message body.
///
2018-04-13 23:02:01 +00:00
/// By default only 256Kb payload reads to a memory, then
/// `PayloadError::Overflow` get returned. Use `MessageBody::limit()`
/// method to change upper limit.
///
/// ## Server example
///
2018-10-05 04:14:18 +00:00
/// ```rust,ignore
/// # extern crate bytes;
/// # extern crate actix_web;
/// # extern crate futures;
/// # #[macro_use] extern crate serde_derive;
2018-06-01 16:36:16 +00:00
/// use actix_web::{
2018-10-05 18:04:59 +00:00
/// AsyncResponder, FutureResponse, HttpMessage, HttpRequest, Response,
2018-06-01 16:36:16 +00:00
/// };
/// use bytes::Bytes;
/// use futures::future::Future;
///
2018-10-05 18:04:59 +00:00
/// fn index(mut req: HttpRequest) -> FutureResponse<Response> {
/// req.body() // <- get Body future
/// .limit(1024) // <- change max size of the body to a 1kb
/// .from_err()
/// .and_then(|bytes: Bytes| { // <- complete body
/// println!("==== BODY ==== {:?}", bytes);
2018-10-05 18:04:59 +00:00
/// Ok(Response::Ok().into())
/// }).responder()
/// }
/// # fn main() {}
/// ```
2019-02-13 21:52:11 +00:00
fn body(&mut self) -> MessageBody<Self>
where
Self::Stream: Stream<Item = Bytes, Error = PayloadError> + Sized,
{
MessageBody::new(self)
}
2018-03-28 03:33:24 +00:00
/// Parse `application/x-www-form-urlencoded` encoded request's body.
2018-04-13 23:02:01 +00:00
/// Return `UrlEncoded` future. Form can be deserialized to any type that
/// implements `Deserialize` trait from *serde*.
///
/// Returns error:
///
/// * content type is not `application/x-www-form-urlencoded`
/// * content-length is greater than 256k
///
/// ## Server example
///
2018-10-05 04:14:18 +00:00
/// ```rust,ignore
/// # extern crate actix_web;
/// # extern crate futures;
2018-03-28 03:33:24 +00:00
/// # use futures::Future;
2018-04-02 21:00:18 +00:00
/// # use std::collections::HashMap;
2018-10-05 18:04:59 +00:00
/// use actix_web::{FutureResponse, HttpMessage, HttpRequest, Response};
///
2018-10-05 18:04:59 +00:00
/// fn index(mut req: HttpRequest) -> FutureResponse<Response> {
2018-04-02 21:00:18 +00:00
/// Box::new(
/// req.urlencoded::<HashMap<String, String>>() // <- get UrlEncoded future
/// .from_err()
/// .and_then(|params| { // <- url encoded parameters
/// println!("==== BODY ==== {:?}", params);
2018-10-05 18:04:59 +00:00
/// Ok(Response::Ok().into())
2018-06-01 16:36:16 +00:00
/// }),
/// )
/// }
/// # fn main() {}
/// ```
2019-02-13 21:52:11 +00:00
fn urlencoded<T: DeserializeOwned>(&mut self) -> UrlEncoded<Self, T>
where
Self::Stream: Stream<Item = Bytes, Error = PayloadError>,
{
UrlEncoded::new(self)
}
/// Parse `application/json` encoded body.
/// Return `JsonBody<T>` future. It resolves to a `T` value.
///
/// Returns error:
///
/// * content type is not `application/json`
/// * content length is greater than 256k
///
/// ## Server example
///
2018-10-05 04:14:18 +00:00
/// ```rust,ignore
/// # extern crate actix_web;
/// # extern crate futures;
/// # #[macro_use] extern crate serde_derive;
/// use actix_web::*;
2018-06-01 16:36:16 +00:00
/// use futures::future::{ok, Future};
///
/// #[derive(Deserialize, Debug)]
/// struct MyObj {
/// name: String,
/// }
///
2018-10-05 18:04:59 +00:00
/// fn index(mut req: HttpRequest) -> Box<Future<Item = Response, Error = Error>> {
/// req.json() // <- get JsonBody future
/// .from_err()
/// .and_then(|val: MyObj| { // <- deserialized value
/// println!("==== BODY ==== {:?}", val);
2018-10-05 18:04:59 +00:00
/// Ok(Response::Ok().into())
/// }).responder()
/// }
/// # fn main() {}
/// ```
2019-02-13 21:52:11 +00:00
fn json<T: DeserializeOwned + 'static>(&mut self) -> JsonBody<Self, T>
where
Self::Stream: Stream<Item = Bytes, Error = PayloadError> + 'static,
{
JsonBody::new(self)
}
2018-06-13 17:43:03 +00:00
/// Return stream of lines.
2019-02-13 21:52:11 +00:00
fn readlines(&mut self) -> Readlines<Self>
where
Self::Stream: Stream<Item = Bytes, Error = PayloadError> + 'static,
{
2018-06-13 17:43:03 +00:00
Readlines::new(self)
}
}
/// Stream to read request line by line.
2018-06-25 04:58:04 +00:00
pub struct Readlines<T: HttpMessage> {
2019-02-12 19:07:42 +00:00
stream: Payload<T::Stream>,
2018-06-13 19:41:35 +00:00
buff: BytesMut,
2018-06-13 17:43:03 +00:00
limit: usize,
2018-06-13 21:19:48 +00:00
checked_buff: bool,
2018-06-25 04:58:04 +00:00
encoding: EncodingRef,
err: Option<ReadlinesError>,
2018-06-13 17:43:03 +00:00
}
2019-02-13 21:52:11 +00:00
impl<T> Readlines<T>
where
T: HttpMessage,
T::Stream: Stream<Item = Bytes, Error = PayloadError>,
{
2018-06-13 17:43:03 +00:00
/// Create a new stream to read request line by line.
2019-02-13 21:52:11 +00:00
fn new(req: &mut T) -> Self {
2018-06-25 04:58:04 +00:00
let encoding = match req.encoding() {
Ok(enc) => enc,
2019-02-08 03:53:48 +00:00
Err(err) => return Self::err(err.into()),
2018-06-25 04:58:04 +00:00
};
2018-06-13 17:43:03 +00:00
Readlines {
2019-02-13 21:52:11 +00:00
stream: req.take_payload(),
2018-06-13 19:41:35 +00:00
buff: BytesMut::with_capacity(262_144),
2018-06-13 17:43:03 +00:00
limit: 262_144,
2018-06-13 21:19:48 +00:00
checked_buff: true,
2018-06-25 04:58:04 +00:00
err: None,
encoding,
2018-06-13 17:43:03 +00:00
}
}
2018-06-16 21:26:34 +00:00
2018-06-13 19:41:35 +00:00
/// Change max line size. By default max size is 256Kb
2018-06-13 17:43:03 +00:00
pub fn limit(mut self, limit: usize) -> Self {
self.limit = limit;
self
}
2018-06-25 04:58:04 +00:00
2019-02-08 03:53:48 +00:00
fn err(err: ReadlinesError) -> Self {
2018-06-25 04:58:04 +00:00
Readlines {
2019-02-12 19:07:42 +00:00
stream: Payload::None,
buff: BytesMut::new(),
2018-06-25 04:58:04 +00:00
limit: 262_144,
checked_buff: true,
encoding: UTF_8,
err: Some(err),
}
}
2018-06-13 17:43:03 +00:00
}
2019-02-13 21:52:11 +00:00
impl<T> Stream for Readlines<T>
where
T: HttpMessage,
T::Stream: Stream<Item = Bytes, Error = PayloadError>,
{
2018-06-13 17:43:03 +00:00
type Item = String;
type Error = ReadlinesError;
2018-06-16 21:26:34 +00:00
2018-06-13 17:43:03 +00:00
fn poll(&mut self) -> Poll<Option<Self::Item>, Self::Error> {
2018-06-25 04:58:04 +00:00
if let Some(err) = self.err.take() {
return Err(err);
}
2018-06-13 19:41:35 +00:00
// check if there is a newline in the buffer
2018-06-13 21:19:48 +00:00
if !self.checked_buff {
let mut found: Option<usize> = None;
for (ind, b) in self.buff.iter().enumerate() {
2018-06-16 21:26:34 +00:00
if *b == b'\n' {
2018-06-13 21:19:48 +00:00
found = Some(ind);
break;
}
2018-06-13 19:41:35 +00:00
}
2018-06-13 21:19:48 +00:00
if let Some(ind) = found {
// check if line is longer than limit
2018-06-16 21:26:34 +00:00
if ind + 1 > self.limit {
2018-06-13 21:19:48 +00:00
return Err(ReadlinesError::LimitOverflow);
}
2018-06-25 04:58:04 +00:00
let enc: *const Encoding = self.encoding as *const Encoding;
2018-06-13 21:19:48 +00:00
let line = if enc == UTF_8 {
2018-06-16 21:26:34 +00:00
str::from_utf8(&self.buff.split_to(ind + 1))
2018-06-13 21:19:48 +00:00
.map_err(|_| ReadlinesError::EncodingError)?
.to_owned()
} else {
2018-06-25 04:58:04 +00:00
self.encoding
2018-06-16 21:26:34 +00:00
.decode(&self.buff.split_to(ind + 1), DecoderTrap::Strict)
2018-06-13 21:19:48 +00:00
.map_err(|_| ReadlinesError::EncodingError)?
};
return Ok(Async::Ready(Some(line)));
2018-06-13 19:41:35 +00:00
}
2018-06-13 21:19:48 +00:00
self.checked_buff = true;
2018-06-13 19:41:35 +00:00
}
// poll req for more bytes
2019-02-12 19:07:42 +00:00
match self.stream.poll() {
Ok(Async::Ready(Some(mut bytes))) => {
// check if there is a newline in bytes
let mut found: Option<usize> = None;
for (ind, b) in bytes.iter().enumerate() {
if *b == b'\n' {
found = Some(ind);
break;
2018-06-13 17:43:03 +00:00
}
2018-06-13 19:41:35 +00:00
}
2019-02-12 19:07:42 +00:00
if let Some(ind) = found {
// check if line is longer than limit
if ind + 1 > self.limit {
2018-06-13 17:43:03 +00:00
return Err(ReadlinesError::LimitOverflow);
}
2018-06-25 04:58:04 +00:00
let enc: *const Encoding = self.encoding as *const Encoding;
2018-06-13 19:41:35 +00:00
let line = if enc == UTF_8 {
2019-02-12 19:07:42 +00:00
str::from_utf8(&bytes.split_to(ind + 1))
2018-06-13 21:19:48 +00:00
.map_err(|_| ReadlinesError::EncodingError)?
2018-06-13 19:41:35 +00:00
.to_owned()
} else {
2018-06-25 04:58:04 +00:00
self.encoding
2019-02-12 19:07:42 +00:00
.decode(&bytes.split_to(ind + 1), DecoderTrap::Strict)
2018-06-13 21:19:48 +00:00
.map_err(|_| ReadlinesError::EncodingError)?
2018-06-13 19:41:35 +00:00
};
2019-02-12 19:07:42 +00:00
// extend buffer with rest of the bytes;
self.buff.extend_from_slice(&bytes);
self.checked_buff = false;
return Ok(Async::Ready(Some(line)));
2018-06-13 17:43:03 +00:00
}
2019-02-12 19:07:42 +00:00
self.buff.extend_from_slice(&bytes);
Ok(Async::NotReady)
2018-06-16 21:26:34 +00:00
}
2019-02-12 19:07:42 +00:00
Ok(Async::NotReady) => Ok(Async::NotReady),
Ok(Async::Ready(None)) => {
if self.buff.is_empty() {
return Ok(Async::Ready(None));
}
if self.buff.len() > self.limit {
return Err(ReadlinesError::LimitOverflow);
}
let enc: *const Encoding = self.encoding as *const Encoding;
let line = if enc == UTF_8 {
str::from_utf8(&self.buff)
.map_err(|_| ReadlinesError::EncodingError)?
.to_owned()
} else {
self.encoding
.decode(&self.buff, DecoderTrap::Strict)
.map_err(|_| ReadlinesError::EncodingError)?
};
self.buff.clear();
Ok(Async::Ready(Some(line)))
}
Err(e) => Err(ReadlinesError::from(e)),
2018-06-13 17:43:03 +00:00
}
}
}
/// Future that resolves to a complete http message body.
2018-06-25 04:58:04 +00:00
pub struct MessageBody<T: HttpMessage> {
limit: usize,
2018-06-25 04:58:04 +00:00
length: Option<usize>,
2019-02-12 19:07:42 +00:00
stream: Payload<T::Stream>,
2018-06-25 04:58:04 +00:00
err: Option<PayloadError>,
2018-04-13 23:02:01 +00:00
fut: Option<Box<Future<Item = Bytes, Error = PayloadError>>>,
}
2019-02-13 21:52:11 +00:00
impl<T> MessageBody<T>
where
T: HttpMessage,
T::Stream: Stream<Item = Bytes, Error = PayloadError>,
{
2018-06-25 04:58:04 +00:00
/// Create `MessageBody` for request.
2019-02-13 21:52:11 +00:00
pub fn new(req: &mut T) -> MessageBody<T> {
2018-06-25 04:58:04 +00:00
let mut len = None;
if let Some(l) = req.headers().get(header::CONTENT_LENGTH) {
if let Ok(s) = l.to_str() {
if let Ok(l) = s.parse::<usize>() {
len = Some(l)
} else {
return Self::err(PayloadError::UnknownLength);
}
} else {
return Self::err(PayloadError::UnknownLength);
}
}
MessageBody {
2019-02-13 21:52:11 +00:00
stream: req.take_payload(),
limit: 262_144,
2018-06-25 04:58:04 +00:00
length: len,
fut: None,
2018-06-25 04:58:04 +00:00
err: None,
}
}
/// Change max size of payload. By default max size is 256Kb
pub fn limit(mut self, limit: usize) -> Self {
self.limit = limit;
self
}
2018-06-25 04:58:04 +00:00
fn err(e: PayloadError) -> Self {
MessageBody {
2019-02-12 19:07:42 +00:00
stream: Payload::None,
2018-06-25 04:58:04 +00:00
limit: 262_144,
fut: None,
err: Some(e),
length: None,
}
}
}
impl<T> Future for MessageBody<T>
2018-04-13 23:02:01 +00:00
where
2019-02-13 21:52:11 +00:00
T: HttpMessage,
T::Stream: Stream<Item = Bytes, Error = PayloadError> + 'static,
{
type Item = Bytes;
type Error = PayloadError;
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
2018-06-25 04:58:04 +00:00
if let Some(ref mut fut) = self.fut {
return fut.poll();
}
2018-06-25 04:58:04 +00:00
if let Some(err) = self.err.take() {
return Err(err);
}
2018-06-25 04:58:04 +00:00
if let Some(len) = self.length.take() {
if len > self.limit {
return Err(PayloadError::Overflow);
}
}
// future
let limit = self.limit;
self.fut = Some(Box::new(
2019-02-13 21:52:11 +00:00
std::mem::replace(&mut self.stream, Payload::None)
2018-06-25 04:58:04 +00:00
.from_err()
.fold(BytesMut::with_capacity(8192), move |mut body, chunk| {
2018-06-25 04:58:04 +00:00
if (body.len() + chunk.len()) > limit {
Err(PayloadError::Overflow)
} else {
body.extend_from_slice(&chunk);
Ok(body)
}
2018-12-06 22:32:52 +00:00
})
.map(|body| body.freeze()),
2018-06-25 04:58:04 +00:00
));
self.poll()
}
}
/// Future that resolves to a parsed urlencoded values.
2018-06-25 04:58:04 +00:00
pub struct UrlEncoded<T: HttpMessage, U> {
2019-02-12 19:07:42 +00:00
stream: Payload<T::Stream>,
limit: usize,
2018-06-25 04:58:04 +00:00
length: Option<usize>,
encoding: EncodingRef,
err: Option<UrlencodedError>,
2018-04-13 23:02:01 +00:00
fut: Option<Box<Future<Item = U, Error = UrlencodedError>>>,
}
2019-02-13 21:52:11 +00:00
impl<T, U> UrlEncoded<T, U>
where
T: HttpMessage,
T::Stream: Stream<Item = Bytes, Error = PayloadError>,
{
/// Create a new future to URL encode a request
2019-02-13 21:52:11 +00:00
pub fn new(req: &mut T) -> UrlEncoded<T, U> {
2018-06-25 04:58:04 +00:00
// check content type
if req.content_type().to_lowercase() != "application/x-www-form-urlencoded" {
return Self::err(UrlencodedError::ContentType);
}
let encoding = match req.encoding() {
Ok(enc) => enc,
Err(_) => return Self::err(UrlencodedError::ContentType),
};
let mut len = None;
if let Some(l) = req.headers().get(header::CONTENT_LENGTH) {
if let Ok(s) = l.to_str() {
if let Ok(l) = s.parse::<usize>() {
len = Some(l)
} else {
return Self::err(UrlencodedError::UnknownLength);
}
} else {
return Self::err(UrlencodedError::UnknownLength);
}
};
UrlEncoded {
2018-06-25 04:58:04 +00:00
encoding,
2019-02-13 21:52:11 +00:00
stream: req.take_payload(),
limit: 262_144,
2018-06-25 04:58:04 +00:00
length: len,
fut: None,
2018-06-25 04:58:04 +00:00
err: None,
}
}
fn err(e: UrlencodedError) -> Self {
UrlEncoded {
2019-02-12 19:07:42 +00:00
stream: Payload::None,
2018-06-25 04:58:04 +00:00
limit: 262_144,
fut: None,
err: Some(e),
length: None,
encoding: UTF_8,
}
}
/// Change max size of payload. By default max size is 256Kb
pub fn limit(mut self, limit: usize) -> Self {
self.limit = limit;
self
}
}
2018-04-02 21:00:18 +00:00
impl<T, U> Future for UrlEncoded<T, U>
2018-04-13 23:02:01 +00:00
where
2019-02-13 21:52:11 +00:00
T: HttpMessage,
T::Stream: Stream<Item = Bytes, Error = PayloadError> + 'static,
2018-04-13 23:02:01 +00:00
U: DeserializeOwned + 'static,
{
2018-04-02 21:00:18 +00:00
type Item = U;
type Error = UrlencodedError;
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
2018-06-25 04:58:04 +00:00
if let Some(ref mut fut) = self.fut {
return fut.poll();
}
2018-06-25 04:58:04 +00:00
if let Some(err) = self.err.take() {
return Err(err);
}
2018-06-25 04:58:04 +00:00
// payload size
let limit = self.limit;
if let Some(len) = self.length.take() {
if len > limit {
return Err(UrlencodedError::Overflow);
}
}
2018-06-25 04:58:04 +00:00
// future
let encoding = self.encoding;
2019-02-13 21:52:11 +00:00
let fut = std::mem::replace(&mut self.stream, Payload::None)
2018-06-25 04:58:04 +00:00
.from_err()
.fold(BytesMut::with_capacity(8192), move |mut body, chunk| {
2018-06-25 04:58:04 +00:00
if (body.len() + chunk.len()) > limit {
Err(UrlencodedError::Overflow)
} else {
body.extend_from_slice(&chunk);
Ok(body)
}
2018-12-06 22:32:52 +00:00
})
.and_then(move |body| {
2018-06-25 04:58:04 +00:00
if (encoding as *const Encoding) == UTF_8 {
serde_urlencoded::from_bytes::<U>(&body)
.map_err(|_| UrlencodedError::Parse)
} else {
let body = encoding
.decode(&body, DecoderTrap::Strict)
.map_err(|_| UrlencodedError::Parse)?;
serde_urlencoded::from_str::<U>(&body)
.map_err(|_| UrlencodedError::Parse)
}
});
self.fut = Some(Box::new(fut));
self.poll()
}
}
#[cfg(test)]
mod tests {
use encoding::all::ISO_8859_2;
2018-04-29 05:55:47 +00:00
use encoding::Encoding;
use futures::Async;
2018-04-13 23:02:01 +00:00
use mime;
2018-12-06 23:03:01 +00:00
use serde_derive::Deserialize;
2019-01-27 18:59:07 +00:00
use super::*;
use crate::test::TestRequest;
#[test]
fn test_content_type() {
let req = TestRequest::with_header("content-type", "text/plain").finish();
assert_eq!(req.content_type(), "text/plain");
2018-04-13 23:02:01 +00:00
let req =
TestRequest::with_header("content-type", "application/json; charset=utf=8")
.finish();
assert_eq!(req.content_type(), "application/json");
2018-06-25 04:58:04 +00:00
let req = TestRequest::default().finish();
assert_eq!(req.content_type(), "");
}
#[test]
fn test_mime_type() {
let req = TestRequest::with_header("content-type", "application/json").finish();
assert_eq!(req.mime_type().unwrap(), Some(mime::APPLICATION_JSON));
2018-06-25 04:58:04 +00:00
let req = TestRequest::default().finish();
assert_eq!(req.mime_type().unwrap(), None);
2018-04-13 23:02:01 +00:00
let req =
TestRequest::with_header("content-type", "application/json; charset=utf-8")
.finish();
let mt = req.mime_type().unwrap().unwrap();
assert_eq!(mt.get_param(mime::CHARSET), Some(mime::UTF_8));
assert_eq!(mt.type_(), mime::APPLICATION);
assert_eq!(mt.subtype(), mime::JSON);
}
#[test]
fn test_mime_type_error() {
let req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
"content-type",
"applicationadfadsfasdflknadsfklnadsfjson",
2018-12-06 22:32:52 +00:00
)
.finish();
assert_eq!(Err(ContentTypeError::ParseError), req.mime_type());
}
#[test]
fn test_encoding() {
2018-06-25 04:58:04 +00:00
let req = TestRequest::default().finish();
assert_eq!(UTF_8.name(), req.encoding().unwrap().name());
2018-04-13 23:02:01 +00:00
let req = TestRequest::with_header("content-type", "application/json").finish();
assert_eq!(UTF_8.name(), req.encoding().unwrap().name());
let req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
"content-type",
"application/json; charset=ISO-8859-2",
2018-12-06 22:32:52 +00:00
)
.finish();
assert_eq!(ISO_8859_2.name(), req.encoding().unwrap().name());
}
#[test]
fn test_encoding_error() {
2018-04-13 23:02:01 +00:00
let req = TestRequest::with_header("content-type", "applicatjson").finish();
2018-05-17 19:20:20 +00:00
assert_eq!(Some(ContentTypeError::ParseError), req.encoding().err());
let req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
"content-type",
"application/json; charset=kkkttktk",
2018-12-06 22:32:52 +00:00
)
.finish();
2018-04-29 16:09:08 +00:00
assert_eq!(
Some(ContentTypeError::UnknownEncoding),
req.encoding().err()
);
}
#[test]
fn test_chunked() {
2018-06-25 04:58:04 +00:00
let req = TestRequest::default().finish();
assert!(!req.chunked().unwrap());
2018-04-13 23:02:01 +00:00
let req =
TestRequest::with_header(header::TRANSFER_ENCODING, "chunked").finish();
assert!(req.chunked().unwrap());
2018-06-25 04:58:04 +00:00
let req = TestRequest::default()
.header(
header::TRANSFER_ENCODING,
Bytes::from_static(b"some va\xadscc\xacas0xsdasdlue"),
2018-12-06 22:32:52 +00:00
)
.finish();
assert!(req.chunked().is_err());
}
impl PartialEq for UrlencodedError {
fn eq(&self, other: &UrlencodedError) -> bool {
match *self {
UrlencodedError::Chunked => match *other {
UrlencodedError::Chunked => true,
_ => false,
},
UrlencodedError::Overflow => match *other {
UrlencodedError::Overflow => true,
_ => false,
},
UrlencodedError::UnknownLength => match *other {
UrlencodedError::UnknownLength => true,
_ => false,
},
UrlencodedError::ContentType => match *other {
UrlencodedError::ContentType => true,
_ => false,
},
_ => false,
}
}
}
2018-04-02 21:00:18 +00:00
#[derive(Deserialize, Debug, PartialEq)]
struct Info {
hello: String,
}
#[test]
fn test_urlencoded_error() {
2019-02-13 21:52:11 +00:00
let mut req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
header::CONTENT_TYPE,
"application/x-www-form-urlencoded",
2018-12-06 22:32:52 +00:00
)
.header(header::CONTENT_LENGTH, "xxxx")
2018-08-23 16:48:01 +00:00
.finish();
2018-04-13 23:02:01 +00:00
assert_eq!(
req.urlencoded::<Info>().poll().err().unwrap(),
UrlencodedError::UnknownLength
);
2019-02-13 21:52:11 +00:00
let mut req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
header::CONTENT_TYPE,
"application/x-www-form-urlencoded",
2018-12-06 22:32:52 +00:00
)
.header(header::CONTENT_LENGTH, "1000000")
2018-08-23 16:48:01 +00:00
.finish();
2018-04-13 23:02:01 +00:00
assert_eq!(
req.urlencoded::<Info>().poll().err().unwrap(),
UrlencodedError::Overflow
);
2019-02-13 21:52:11 +00:00
let mut req = TestRequest::with_header(header::CONTENT_TYPE, "text/plain")
.header(header::CONTENT_LENGTH, "10")
.finish();
2018-04-13 23:02:01 +00:00
assert_eq!(
req.urlencoded::<Info>().poll().err().unwrap(),
UrlencodedError::ContentType
);
}
#[test]
fn test_urlencoded() {
2019-02-13 21:52:11 +00:00
let mut req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
header::CONTENT_TYPE,
"application/x-www-form-urlencoded",
2018-12-06 22:32:52 +00:00
)
.header(header::CONTENT_LENGTH, "11")
2018-08-23 16:48:01 +00:00
.set_payload(Bytes::from_static(b"hello=world"))
.finish();
2018-04-02 21:00:18 +00:00
let result = req.urlencoded::<Info>().poll().ok().unwrap();
2018-04-13 23:02:01 +00:00
assert_eq!(
result,
Async::Ready(Info {
hello: "world".to_owned()
})
);
2019-02-13 21:52:11 +00:00
let mut req = TestRequest::with_header(
2018-04-13 23:02:01 +00:00
header::CONTENT_TYPE,
"application/x-www-form-urlencoded; charset=utf-8",
2018-12-06 22:32:52 +00:00
)
.header(header::CONTENT_LENGTH, "11")
2018-08-23 16:48:01 +00:00
.set_payload(Bytes::from_static(b"hello=world"))
.finish();
let result = req.urlencoded().poll().ok().unwrap();
2018-04-13 23:02:01 +00:00
assert_eq!(
result,
Async::Ready(Info {
hello: "world".to_owned()
})
);
2018-04-02 21:00:18 +00:00
}
#[test]
fn test_message_body() {
2019-02-13 21:52:11 +00:00
let mut req = TestRequest::with_header(header::CONTENT_LENGTH, "xxxx").finish();
match req.body().poll().err().unwrap() {
PayloadError::UnknownLength => (),
2018-03-29 22:55:27 +00:00
_ => unreachable!("error"),
}
2019-02-13 21:52:11 +00:00
let mut req =
TestRequest::with_header(header::CONTENT_LENGTH, "1000000").finish();
match req.body().poll().err().unwrap() {
PayloadError::Overflow => (),
2018-03-29 22:55:27 +00:00
_ => unreachable!("error"),
}
2019-02-13 21:52:11 +00:00
let mut req = TestRequest::default()
2018-06-25 04:58:04 +00:00
.set_payload(Bytes::from_static(b"test"))
.finish();
match req.body().poll().ok().unwrap() {
Async::Ready(bytes) => assert_eq!(bytes, Bytes::from_static(b"test")),
2018-03-29 22:55:27 +00:00
_ => unreachable!("error"),
}
2019-02-13 21:52:11 +00:00
let mut req = TestRequest::default()
2018-06-25 04:58:04 +00:00
.set_payload(Bytes::from_static(b"11111111111111"))
.finish();
match req.body().limit(5).poll().err().unwrap() {
PayloadError::Overflow => (),
2018-03-29 22:55:27 +00:00
_ => unreachable!("error"),
}
}
2018-06-16 21:26:34 +00:00
2018-06-13 21:19:48 +00:00
#[test]
fn test_readlines() {
2019-02-13 21:52:11 +00:00
let mut req = TestRequest::default()
2018-06-25 04:58:04 +00:00
.set_payload(Bytes::from_static(
b"Lorem Ipsum is simply dummy text of the printing and typesetting\n\
industry. Lorem Ipsum has been the industry's standard dummy\n\
Contrary to popular belief, Lorem Ipsum is not simply random text.",
2018-12-06 22:32:52 +00:00
))
.finish();
2019-02-13 21:52:11 +00:00
let mut r = Readlines::new(&mut req);
2018-06-13 21:19:48 +00:00
match r.poll().ok().unwrap() {
2018-06-16 21:26:34 +00:00
Async::Ready(Some(s)) => assert_eq!(
s,
"Lorem Ipsum is simply dummy text of the printing and typesetting\n"
),
2018-06-13 21:19:48 +00:00
_ => unreachable!("error"),
}
match r.poll().ok().unwrap() {
2018-06-16 21:26:34 +00:00
Async::Ready(Some(s)) => assert_eq!(
s,
"industry. Lorem Ipsum has been the industry's standard dummy\n"
),
2018-06-13 21:19:48 +00:00
_ => unreachable!("error"),
}
match r.poll().ok().unwrap() {
2018-06-16 21:26:34 +00:00
Async::Ready(Some(s)) => assert_eq!(
s,
"Contrary to popular belief, Lorem Ipsum is not simply random text."
),
2018-06-13 21:19:48 +00:00
_ => unreachable!("error"),
}
}
}