1
0
mirror of https://github.com/actix/actix-extras.git synced 2024-11-30 18:34:36 +01:00
actix-extras/src/error.rs

778 lines
24 KiB
Rust
Raw Normal View History

2017-11-20 04:26:31 +01:00
//! Error and Result module
2017-12-02 23:58:22 +01:00
use std::{io, fmt, result};
2017-10-07 06:48:14 +02:00
use std::str::Utf8Error;
use std::string::FromUtf8Error;
2017-11-16 07:06:28 +01:00
use std::io::Error as IoError;
2017-10-07 06:48:14 +02:00
use cookie;
2017-10-07 06:48:14 +02:00
use httparse;
use actix::MailboxError;
2017-12-21 05:30:54 +01:00
use futures::Canceled;
use failure;
2018-01-21 05:12:24 +01:00
use failure::{Fail, Backtrace};
2017-11-16 07:06:28 +01:00
use http2::Error as Http2Error;
use http::{header, StatusCode, Error as HttpError};
2017-12-01 04:01:25 +01:00
use http::uri::InvalidUriBytes;
2017-11-16 07:06:28 +01:00
use http_range::HttpRangeParseError;
use serde_json::error::Error as JsonError;
2018-01-28 07:03:03 +01:00
pub use url::ParseError as UrlParseError;
2017-11-16 07:06:28 +01:00
// re-exports
pub use cookie::{ParseError as CookieParseError};
2017-10-07 06:48:14 +02:00
2017-10-24 08:25:32 +02:00
use body::Body;
2018-01-21 05:12:24 +01:00
use handler::Responder;
use httprequest::HttpRequest;
2017-11-16 07:06:28 +01:00
use httpresponse::HttpResponse;
2018-03-02 04:12:59 +01:00
use httpcodes::{self, HttpExpectationFailed};
2017-10-07 06:48:14 +02:00
2017-11-16 07:06:28 +01:00
/// A specialized [`Result`](https://doc.rust-lang.org/std/result/enum.Result.html)
2017-11-20 04:26:31 +01:00
/// for actix web operations
2017-11-16 07:06:28 +01:00
///
/// This typedef is generally used to avoid writing out `actix_web::error::Error` directly and
/// is otherwise a direct mapping to `Result`.
2017-12-04 03:15:09 +01:00
pub type Result<T, E=Error> = result::Result<T, E>;
2017-11-27 02:30:35 +01:00
/// General purpose actix web error
2017-11-16 07:06:28 +01:00
pub struct Error {
cause: Box<ResponseError>,
2018-01-21 05:12:24 +01:00
backtrace: Option<Backtrace>,
2017-11-16 07:06:28 +01:00
}
2017-11-20 04:26:31 +01:00
impl Error {
/// Returns a reference to the underlying cause of this Error.
// this should return &Fail but needs this https://github.com/rust-lang/rust/issues/5665
pub fn cause(&self) -> &ResponseError {
2017-11-20 04:26:31 +01:00
self.cause.as_ref()
}
}
/// Error that can be converted to `HttpResponse`
pub trait ResponseError: Fail {
2017-11-16 07:06:28 +01:00
/// Create response for error
///
/// Internal server error is generated by default.
fn error_response(&self) -> HttpResponse {
HttpResponse::new(StatusCode::INTERNAL_SERVER_ERROR, Body::Empty)
}
}
impl fmt::Display for Error {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
fmt::Display::fmt(&self.cause, f)
}
}
2018-01-21 05:12:24 +01:00
impl fmt::Debug for Error {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
2018-01-21 06:11:46 +01:00
if let Some(bt) = self.cause.backtrace() {
write!(f, "{:?}\n\n{:?}", &self.cause, bt)
2018-01-21 05:12:24 +01:00
} else {
write!(f, "{:?}\n\n{:?}", &self.cause, self.backtrace.as_ref().unwrap())
}
}
}
2017-11-20 04:26:31 +01:00
/// `HttpResponse` for `Error`
2017-11-16 07:06:28 +01:00
impl From<Error> for HttpResponse {
fn from(err: Error) -> Self {
2017-11-25 18:03:44 +01:00
HttpResponse::from_error(err)
2017-11-16 07:06:28 +01:00
}
}
/// `Error` for any error that implements `ResponseError`
impl<T: ResponseError> From<T> for Error {
2017-11-16 07:06:28 +01:00
fn from(err: T) -> Error {
2018-01-21 05:12:24 +01:00
let backtrace = if err.backtrace().is_none() {
Some(Backtrace::new())
} else {
None
};
2018-02-26 23:33:56 +01:00
Error { cause: Box::new(err), backtrace }
2017-11-16 07:06:28 +01:00
}
}
/// Compatibility for `failure::Error`
impl<T> ResponseError for failure::Compat<T>
where T: fmt::Display + fmt::Debug + Sync + Send + 'static { }
impl From<failure::Error> for Error {
fn from(err: failure::Error) -> Error {
err.compat().into()
}
}
/// `InternalServerError` for `JsonError`
impl ResponseError for JsonError {}
2017-11-16 07:06:28 +01:00
2018-01-28 07:03:03 +01:00
/// `InternalServerError` for `UrlParseError`
impl ResponseError for UrlParseError {}
2017-11-25 19:52:43 +01:00
/// Return `InternalServerError` for `HttpError`,
/// Response generation can return `HttpError`, so it is internal error
impl ResponseError for HttpError {}
2017-11-25 19:52:43 +01:00
/// Return `InternalServerError` for `io::Error`
2017-12-02 23:58:22 +01:00
impl ResponseError for io::Error {
fn error_response(&self) -> HttpResponse {
match self.kind() {
io::ErrorKind::NotFound =>
HttpResponse::new(StatusCode::NOT_FOUND, Body::Empty),
io::ErrorKind::PermissionDenied =>
HttpResponse::new(StatusCode::FORBIDDEN, Body::Empty),
_ =>
HttpResponse::new(StatusCode::INTERNAL_SERVER_ERROR, Body::Empty)
}
}
}
2017-11-25 19:52:43 +01:00
/// `BadRequest` for `InvalidHeaderValue`
impl ResponseError for header::InvalidHeaderValue {
fn error_response(&self) -> HttpResponse {
HttpResponse::new(StatusCode::BAD_REQUEST, Body::Empty)
}
}
/// `BadRequest` for `InvalidHeaderValue`
impl ResponseError for header::InvalidHeaderValueBytes {
fn error_response(&self) -> HttpResponse {
HttpResponse::new(StatusCode::BAD_REQUEST, Body::Empty)
}
}
2017-11-25 19:52:43 +01:00
2017-12-21 05:30:54 +01:00
/// `InternalServerError` for `futures::Canceled`
impl ResponseError for Canceled {}
/// `InternalServerError` for `actix::MailboxError`
impl ResponseError for MailboxError {}
2017-11-20 04:26:31 +01:00
/// A set of errors that can occur during parsing HTTP streams
2017-11-16 07:06:28 +01:00
#[derive(Fail, Debug)]
pub enum ParseError {
2017-11-20 04:26:31 +01:00
/// An invalid `Method`, such as `GE.T`.
2017-11-16 07:06:28 +01:00
#[fail(display="Invalid Method specified")]
2017-10-07 06:48:14 +02:00
Method,
/// An invalid `Uri`, such as `exam ple.domain`.
2017-12-01 04:01:25 +01:00
#[fail(display="Uri error: {}", _0)]
Uri(InvalidUriBytes),
2017-10-07 06:48:14 +02:00
/// An invalid `HttpVersion`, such as `HTP/1.1`
2017-11-16 07:06:28 +01:00
#[fail(display="Invalid HTTP version specified")]
2017-10-07 06:48:14 +02:00
Version,
/// An invalid `Header`.
2017-11-16 07:06:28 +01:00
#[fail(display="Invalid Header provided")]
2017-10-07 06:48:14 +02:00
Header,
/// A message head is too large to be reasonable.
2017-11-16 07:06:28 +01:00
#[fail(display="Message head is too large")]
2017-10-07 06:48:14 +02:00
TooLarge,
/// A message reached EOF, but is not complete.
2017-11-16 07:06:28 +01:00
#[fail(display="Message is incomplete")]
2017-10-07 06:48:14 +02:00
Incomplete,
/// An invalid `Status`, such as `1337 ELITE`.
2017-11-16 07:06:28 +01:00
#[fail(display="Invalid Status provided")]
2017-10-07 06:48:14 +02:00
Status,
/// A timeout occurred waiting for an IO event.
#[allow(dead_code)]
2017-11-16 07:06:28 +01:00
#[fail(display="Timeout")]
2017-10-07 06:48:14 +02:00
Timeout,
/// An `io::Error` that occurred while trying to read or write to a network stream.
2017-11-16 07:06:28 +01:00
#[fail(display="IO error: {}", _0)]
2017-11-16 07:28:02 +01:00
Io(#[cause] IoError),
2017-10-07 06:48:14 +02:00
/// Parsing a field as string failed
2017-11-16 07:06:28 +01:00
#[fail(display="UTF8 error: {}", _0)]
2017-11-16 07:28:02 +01:00
Utf8(#[cause] Utf8Error),
2017-10-07 06:48:14 +02:00
}
2017-11-16 07:06:28 +01:00
/// Return `BadRequest` for `ParseError`
impl ResponseError for ParseError {
2017-11-16 07:06:28 +01:00
fn error_response(&self) -> HttpResponse {
HttpResponse::new(StatusCode::BAD_REQUEST, Body::Empty)
2017-10-07 06:48:14 +02:00
}
}
impl From<IoError> for ParseError {
fn from(err: IoError) -> ParseError {
ParseError::Io(err)
2017-10-07 06:48:14 +02:00
}
}
impl From<Utf8Error> for ParseError {
fn from(err: Utf8Error) -> ParseError {
ParseError::Utf8(err)
2017-10-07 06:48:14 +02:00
}
}
impl From<FromUtf8Error> for ParseError {
fn from(err: FromUtf8Error) -> ParseError {
ParseError::Utf8(err.utf8_error())
2017-10-07 06:48:14 +02:00
}
}
impl From<httparse::Error> for ParseError {
fn from(err: httparse::Error) -> ParseError {
2017-10-07 06:48:14 +02:00
match err {
2017-12-02 21:14:16 +01:00
httparse::Error::HeaderName | httparse::Error::HeaderValue |
httparse::Error::NewLine | httparse::Error::Token => ParseError::Header,
httparse::Error::Status => ParseError::Status,
httparse::Error::TooManyHeaders => ParseError::TooLarge,
httparse::Error::Version => ParseError::Version,
2017-10-07 06:48:14 +02:00
}
}
}
2017-11-16 07:06:28 +01:00
#[derive(Fail, Debug)]
2017-11-20 04:26:31 +01:00
/// A set of errors that can occur during payload parsing
2017-11-16 07:06:28 +01:00
pub enum PayloadError {
/// A payload reached EOF, but is not complete.
#[fail(display="A payload reached EOF, but is not complete.")]
Incomplete,
/// Content encoding stream corruption
#[fail(display="Can not decode content-encoding.")]
EncodingCorrupted,
/// A payload reached size limit.
#[fail(display="A payload reached size limit.")]
Overflow,
/// A payload length is unknown.
#[fail(display="A payload length is unknown.")]
UnknownLength,
2018-02-20 07:48:27 +01:00
/// Io error
2017-11-16 07:06:28 +01:00
#[fail(display="{}", _0)]
2018-02-20 07:48:27 +01:00
Io(#[cause] IoError),
2017-11-16 07:06:28 +01:00
/// Http2 error
#[fail(display="{}", _0)]
Http2(#[cause] Http2Error),
}
impl From<IoError> for PayloadError {
fn from(err: IoError) -> PayloadError {
2018-02-20 07:48:27 +01:00
PayloadError::Io(err)
}
}
2017-12-14 07:36:28 +01:00
/// `InternalServerError` for `PayloadError`
impl ResponseError for PayloadError {}
2017-11-16 07:06:28 +01:00
/// Return `BadRequest` for `cookie::ParseError`
impl ResponseError for cookie::ParseError {
2017-11-16 07:06:28 +01:00
fn error_response(&self) -> HttpResponse {
HttpResponse::new(StatusCode::BAD_REQUEST, Body::Empty)
}
}
2017-11-16 07:06:28 +01:00
/// Http range header parsing error
2017-11-20 04:58:47 +01:00
#[derive(Fail, PartialEq, Debug)]
2017-11-16 07:06:28 +01:00
pub enum HttpRangeError {
/// Returned if range is invalid.
#[fail(display="Range header is invalid")]
InvalidRange,
/// Returned if first-byte-pos of all of the byte-range-spec
/// values is greater than the content size.
2017-12-06 20:00:39 +01:00
/// See `https://github.com/golang/go/commit/aa9b3d7`
2017-11-16 07:06:28 +01:00
#[fail(display="First-byte-pos of all of the byte-range-spec values is greater than the content size")]
NoOverlap,
}
/// Return `BadRequest` for `HttpRangeError`
impl ResponseError for HttpRangeError {
2017-11-16 07:06:28 +01:00
fn error_response(&self) -> HttpResponse {
HttpResponse::new(
StatusCode::BAD_REQUEST, Body::from("Invalid Range header provided"))
2017-10-30 05:39:59 +01:00
}
}
2017-11-16 07:06:28 +01:00
impl From<HttpRangeParseError> for HttpRangeError {
fn from(err: HttpRangeParseError) -> HttpRangeError {
match err {
HttpRangeParseError::InvalidRange => HttpRangeError::InvalidRange,
HttpRangeParseError::NoOverlap => HttpRangeError::NoOverlap,
}
}
}
2017-11-20 04:26:31 +01:00
/// A set of errors that can occur during parsing multipart streams
2017-11-16 07:06:28 +01:00
#[derive(Fail, Debug)]
pub enum MultipartError {
/// Content-Type header is not found
#[fail(display="No Content-type header found")]
NoContentType,
/// Can not parse Content-Type header
#[fail(display="Can not parse Content-Type header")]
ParseContentType,
/// Multipart boundary is not found
#[fail(display="Multipart boundary is not found")]
Boundary,
2018-02-26 03:55:07 +01:00
/// Multipart stream is incomplete
#[fail(display="Multipart stream is incomplete")]
Incomplete,
2017-11-16 07:06:28 +01:00
/// Error during field parsing
#[fail(display="{}", _0)]
Parse(#[cause] ParseError),
/// Payload error
#[fail(display="{}", _0)]
Payload(#[cause] PayloadError),
}
impl From<ParseError> for MultipartError {
fn from(err: ParseError) -> MultipartError {
MultipartError::Parse(err)
}
}
impl From<PayloadError> for MultipartError {
fn from(err: PayloadError) -> MultipartError {
MultipartError::Payload(err)
}
}
2017-10-20 01:22:21 +02:00
/// Return `BadRequest` for `MultipartError`
impl ResponseError for MultipartError {
2017-11-16 07:06:28 +01:00
fn error_response(&self) -> HttpResponse {
HttpResponse::new(StatusCode::BAD_REQUEST, Body::Empty)
2017-10-20 01:22:21 +02:00
}
}
2017-11-20 04:51:14 +01:00
/// Error during handling `Expect` header
#[derive(Fail, PartialEq, Debug)]
pub enum ExpectError {
/// Expect header value can not be converted to utf8
#[fail(display="Expect header value can not be converted to utf8")]
Encoding,
/// Unknown expect value
#[fail(display="Unknown expect value")]
UnknownExpect,
}
impl ResponseError for ExpectError {
2017-11-20 04:51:14 +01:00
fn error_response(&self) -> HttpResponse {
2018-03-02 04:12:59 +01:00
HttpExpectationFailed.with_body("Unknown Expect")
2017-11-20 04:51:14 +01:00
}
}
/// A set of error that can occure during parsing content type
#[derive(Fail, PartialEq, Debug)]
pub enum ContentTypeError {
/// Can not parse content type
#[fail(display="Can not parse content type")]
ParseError,
/// Unknown content encoding
#[fail(display="Unknown content encoding")]
UnknownEncoding,
}
/// Return `BadRequest` for `ContentTypeError`
impl ResponseError for ContentTypeError {
fn error_response(&self) -> HttpResponse {
HttpResponse::new(StatusCode::BAD_REQUEST, Body::Empty)
}
}
2017-11-27 07:00:25 +01:00
/// A set of errors that can occur during parsing urlencoded payloads
2017-12-19 23:03:01 +01:00
#[derive(Fail, Debug)]
2017-11-27 07:00:25 +01:00
pub enum UrlencodedError {
/// Can not decode chunked transfer encoding
#[fail(display="Can not decode chunked transfer encoding")]
Chunked,
/// Payload size is bigger than 256k
#[fail(display="Payload size is bigger than 256k")]
Overflow,
/// Payload size is now known
#[fail(display="Payload size is now known")]
UnknownLength,
/// Content type error
#[fail(display="Content type error")]
ContentType,
/// Parse error
#[fail(display="Parse error")]
Parse,
2017-12-19 23:03:01 +01:00
/// Payload error
#[fail(display="Error that occur during reading payload: {}", _0)]
Payload(#[cause] PayloadError),
2017-11-27 07:00:25 +01:00
}
/// Return `BadRequest` for `UrlencodedError`
impl ResponseError for UrlencodedError {
fn error_response(&self) -> HttpResponse {
2018-01-31 21:34:58 +01:00
match *self {
2018-03-02 04:12:59 +01:00
UrlencodedError::Overflow => httpcodes::HttpPayloadTooLarge.into(),
UrlencodedError::UnknownLength => httpcodes::HttpLengthRequired.into(),
_ => httpcodes::HttpBadRequest.into(),
2018-01-31 21:34:58 +01:00
}
}
}
2017-12-19 23:03:01 +01:00
impl From<PayloadError> for UrlencodedError {
fn from(err: PayloadError) -> UrlencodedError {
UrlencodedError::Payload(err)
}
}
2017-12-21 05:30:54 +01:00
/// A set of errors that can occur during parsing json payloads
#[derive(Fail, Debug)]
pub enum JsonPayloadError {
/// Payload size is bigger than 256k
#[fail(display="Payload size is bigger than 256k")]
Overflow,
/// Content type error
#[fail(display="Content type error")]
ContentType,
/// Deserialize error
#[fail(display="Json deserialize error: {}", _0)]
Deserialize(#[cause] JsonError),
2017-12-21 05:30:54 +01:00
/// Payload error
#[fail(display="Error that occur during reading payload: {}", _0)]
Payload(#[cause] PayloadError),
2017-12-21 05:30:54 +01:00
}
/// Return `BadRequest` for `UrlencodedError`
impl ResponseError for JsonPayloadError {
fn error_response(&self) -> HttpResponse {
2018-01-31 21:34:58 +01:00
match *self {
2018-03-02 04:12:59 +01:00
JsonPayloadError::Overflow => httpcodes::HttpPayloadTooLarge.into(),
_ => httpcodes::HttpBadRequest.into(),
2018-01-31 21:34:58 +01:00
}
2017-12-21 05:30:54 +01:00
}
}
impl From<PayloadError> for JsonPayloadError {
fn from(err: PayloadError) -> JsonPayloadError {
JsonPayloadError::Payload(err)
}
}
impl From<JsonError> for JsonPayloadError {
fn from(err: JsonError) -> JsonPayloadError {
JsonPayloadError::Deserialize(err)
}
}
/// Errors which can occur when attempting to interpret a segment string as a
/// valid path segment.
#[derive(Fail, Debug, PartialEq)]
pub enum UriSegmentError {
/// The segment started with the wrapped invalid character.
#[fail(display="The segment started with the wrapped invalid character")]
BadStart(char),
/// The segment contained the wrapped invalid character.
#[fail(display="The segment contained the wrapped invalid character")]
BadChar(char),
/// The segment ended with the wrapped invalid character.
#[fail(display="The segment ended with the wrapped invalid character")]
BadEnd(char),
}
/// Return `BadRequest` for `UriSegmentError`
impl ResponseError for UriSegmentError {
2017-11-27 07:00:25 +01:00
fn error_response(&self) -> HttpResponse {
HttpResponse::new(StatusCode::BAD_REQUEST, Body::Empty)
}
}
2017-12-05 22:31:06 +01:00
/// Errors which can occur when attempting to generate resource uri.
#[derive(Fail, Debug, PartialEq)]
2017-12-07 01:26:27 +01:00
pub enum UrlGenerationError {
2017-12-05 22:31:06 +01:00
#[fail(display="Resource not found")]
ResourceNotFound,
#[fail(display="Not all path pattern covered")]
NotEnoughElements,
2017-12-07 01:26:27 +01:00
#[fail(display="Router is not available")]
RouterNotAvailable,
#[fail(display="{}", _0)]
ParseError(#[cause] UrlParseError),
}
/// `InternalServerError` for `UrlGeneratorError`
impl ResponseError for UrlGenerationError {}
impl From<UrlParseError> for UrlGenerationError {
fn from(err: UrlParseError) -> Self {
UrlGenerationError::ParseError(err)
}
2017-12-05 22:31:06 +01:00
}
2018-01-21 06:11:46 +01:00
/// Helper type that can wrap any error and generate custom response.
2017-12-09 00:25:37 +01:00
///
/// In following example any `io::Error` will be converted into "BAD REQUEST" response
2018-01-15 22:47:25 +01:00
/// as opposite to *INNTERNAL SERVER ERROR* which is defined by default.
2017-12-09 00:25:37 +01:00
///
/// ```rust
/// # extern crate actix_web;
/// # use actix_web::*;
/// use actix_web::fs::NamedFile;
///
/// fn index(req: HttpRequest) -> Result<fs::NamedFile> {
/// let f = NamedFile::open("test.txt").map_err(error::ErrorBadRequest)?;
/// Ok(f)
/// }
/// # fn main() {}
/// ```
2018-01-21 06:11:46 +01:00
pub struct InternalError<T> {
cause: T,
status: StatusCode,
backtrace: Backtrace,
}
unsafe impl<T> Sync for InternalError<T> {}
unsafe impl<T> Send for InternalError<T> {}
impl<T> InternalError<T> {
2018-02-26 23:33:56 +01:00
pub fn new(cause: T, status: StatusCode) -> Self {
2018-01-21 06:11:46 +01:00
InternalError {
2018-02-26 23:33:56 +01:00
cause,
status,
2018-01-21 06:11:46 +01:00
backtrace: Backtrace::new(),
}
}
}
impl<T> Fail for InternalError<T>
2018-01-21 07:02:42 +01:00
where T: Send + Sync + fmt::Debug + 'static
2018-01-21 06:11:46 +01:00
{
fn backtrace(&self) -> Option<&Backtrace> {
Some(&self.backtrace)
}
}
impl<T> fmt::Debug for InternalError<T>
2018-01-21 07:02:42 +01:00
where T: Send + Sync + fmt::Debug + 'static
2018-01-21 06:11:46 +01:00
{
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
fmt::Debug::fmt(&self.cause, f)
}
}
impl<T> fmt::Display for InternalError<T>
2018-01-21 07:02:42 +01:00
where T: Send + Sync + fmt::Debug + 'static
2018-01-21 06:11:46 +01:00
{
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
2018-01-21 07:02:42 +01:00
fmt::Debug::fmt(&self.cause, f)
2018-01-21 06:11:46 +01:00
}
}
impl<T> ResponseError for InternalError<T>
2018-01-21 07:02:42 +01:00
where T: Send + Sync + fmt::Debug + 'static
2018-01-21 06:11:46 +01:00
{
fn error_response(&self) -> HttpResponse {
HttpResponse::new(self.status, Body::Empty)
}
}
impl<T> Responder for InternalError<T>
2018-01-21 07:02:42 +01:00
where T: Send + Sync + fmt::Debug + 'static
2018-01-21 06:11:46 +01:00
{
type Item = HttpResponse;
type Error = Error;
fn respond_to(self, _: HttpRequest) -> Result<HttpResponse, Error> {
Err(self.into())
}
}
2018-01-21 06:16:31 +01:00
/// Helper function that creates wrapper of any error and generate *BAD REQUEST* response.
2018-01-21 06:11:46 +01:00
#[allow(non_snake_case)]
pub fn ErrorBadRequest<T>(err: T) -> InternalError<T> {
InternalError::new(err, StatusCode::BAD_REQUEST)
}
2017-12-09 00:25:37 +01:00
2018-01-21 06:16:31 +01:00
/// Helper function that creates wrapper of any error and generate *UNAUTHORIZED* response.
2018-01-21 06:11:46 +01:00
#[allow(non_snake_case)]
pub fn ErrorUnauthorized<T>(err: T) -> InternalError<T> {
InternalError::new(err, StatusCode::UNAUTHORIZED)
}
2017-12-09 00:25:37 +01:00
2018-01-21 06:16:31 +01:00
/// Helper function that creates wrapper of any error and generate *FORBIDDEN* response.
2018-01-21 06:11:46 +01:00
#[allow(non_snake_case)]
pub fn ErrorForbidden<T>(err: T) -> InternalError<T> {
InternalError::new(err, StatusCode::FORBIDDEN)
}
2017-12-09 00:25:37 +01:00
2018-01-21 06:16:31 +01:00
/// Helper function that creates wrapper of any error and generate *NOT FOUND* response.
2018-01-21 06:11:46 +01:00
#[allow(non_snake_case)]
pub fn ErrorNotFound<T>(err: T) -> InternalError<T> {
InternalError::new(err, StatusCode::NOT_FOUND)
}
2017-12-09 00:25:37 +01:00
2018-01-21 06:16:31 +01:00
/// Helper function that creates wrapper of any error and generate *METHOD NOT ALLOWED* response.
2018-01-21 06:11:46 +01:00
#[allow(non_snake_case)]
pub fn ErrorMethodNotAllowed<T>(err: T) -> InternalError<T> {
InternalError::new(err, StatusCode::METHOD_NOT_ALLOWED)
}
2017-12-09 00:52:46 +01:00
2018-01-21 06:16:31 +01:00
/// Helper function that creates wrapper of any error and generate *REQUEST TIMEOUT* response.
2018-01-21 06:11:46 +01:00
#[allow(non_snake_case)]
pub fn ErrorRequestTimeout<T>(err: T) -> InternalError<T> {
InternalError::new(err, StatusCode::REQUEST_TIMEOUT)
}
2017-12-09 00:52:46 +01:00
2018-01-21 06:16:31 +01:00
/// Helper function that creates wrapper of any error and generate *CONFLICT* response.
2018-01-21 06:11:46 +01:00
#[allow(non_snake_case)]
pub fn ErrorConflict<T>(err: T) -> InternalError<T> {
InternalError::new(err, StatusCode::CONFLICT)
}
2017-12-09 00:52:46 +01:00
2018-01-21 06:16:31 +01:00
/// Helper function that creates wrapper of any error and generate *GONE* response.
2018-01-21 06:11:46 +01:00
#[allow(non_snake_case)]
pub fn ErrorGone<T>(err: T) -> InternalError<T> {
InternalError::new(err, StatusCode::GONE)
}
2017-12-09 00:52:46 +01:00
2018-01-21 06:16:31 +01:00
/// Helper function that creates wrapper of any error and generate *PRECONDITION FAILED* response.
2018-01-21 06:11:46 +01:00
#[allow(non_snake_case)]
pub fn ErrorPreconditionFailed<T>(err: T) -> InternalError<T> {
InternalError::new(err, StatusCode::PRECONDITION_FAILED)
}
2017-12-09 00:52:46 +01:00
2018-01-21 06:16:31 +01:00
/// Helper function that creates wrapper of any error and generate *EXPECTATION FAILED* response.
2018-01-21 06:11:46 +01:00
#[allow(non_snake_case)]
pub fn ErrorExpectationFailed<T>(err: T) -> InternalError<T> {
InternalError::new(err, StatusCode::EXPECTATION_FAILED)
}
2017-12-09 00:52:46 +01:00
2018-01-21 06:16:31 +01:00
/// Helper function that creates wrapper of any error and generate *INTERNAL SERVER ERROR* response.
2018-01-21 06:11:46 +01:00
#[allow(non_snake_case)]
pub fn ErrorInternalServerError<T>(err: T) -> InternalError<T> {
InternalError::new(err, StatusCode::INTERNAL_SERVER_ERROR)
}
2017-12-09 00:25:37 +01:00
2017-10-07 06:48:14 +02:00
#[cfg(test)]
mod tests {
use std::env;
2017-10-07 06:48:14 +02:00
use std::error::Error as StdError;
use std::io;
use httparse;
2017-10-22 18:45:53 +02:00
use http::{StatusCode, Error as HttpError};
2017-10-15 08:14:26 +02:00
use cookie::ParseError as CookieParseError;
use failure;
2017-11-16 07:06:28 +01:00
use super::*;
2017-10-15 08:14:26 +02:00
2017-11-24 19:28:43 +01:00
#[test]
#[cfg(actix_nightly)]
fn test_nightly() {
let resp: HttpResponse = IoError::new(io::ErrorKind::Other, "test").error_response();
assert_eq!(resp.status(), StatusCode::INTERNAL_SERVER_ERROR);
}
2017-10-15 08:14:26 +02:00
#[test]
fn test_into_response() {
2017-11-16 07:06:28 +01:00
let resp: HttpResponse = ParseError::Incomplete.error_response();
2017-10-15 08:14:26 +02:00
assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
2017-11-16 07:06:28 +01:00
let resp: HttpResponse = HttpRangeError::InvalidRange.error_response();
2017-10-15 08:14:26 +02:00
assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
2017-11-16 07:06:28 +01:00
let resp: HttpResponse = CookieParseError::EmptyName.error_response();
2017-10-15 08:14:26 +02:00
assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
2017-10-22 18:45:53 +02:00
2017-11-16 07:06:28 +01:00
let resp: HttpResponse = MultipartError::Boundary.error_response();
2017-10-22 18:45:53 +02:00
assert_eq!(resp.status(), StatusCode::BAD_REQUEST);
let err: HttpError = StatusCode::from_u16(10000).err().unwrap().into();
2017-11-16 07:06:28 +01:00
let resp: HttpResponse = err.error_response();
2017-10-22 18:45:53 +02:00
assert_eq!(resp.status(), StatusCode::INTERNAL_SERVER_ERROR);
}
2017-10-07 06:48:14 +02:00
#[test]
fn test_cause() {
let orig = io::Error::new(io::ErrorKind::Other, "other");
let desc = orig.description().to_owned();
2017-10-14 01:33:23 +02:00
let e = ParseError::Io(orig);
2017-11-16 07:06:28 +01:00
assert_eq!(format!("{}", e.cause().unwrap()), desc);
2017-10-07 06:48:14 +02:00
}
2017-11-20 04:26:31 +01:00
#[test]
fn test_error_cause() {
let orig = io::Error::new(io::ErrorKind::Other, "other");
let desc = orig.description().to_owned();
let e = Error::from(orig);
assert_eq!(format!("{}", e.cause()), desc);
}
2017-11-20 04:58:47 +01:00
#[test]
fn test_error_display() {
let orig = io::Error::new(io::ErrorKind::Other, "other");
let desc = orig.description().to_owned();
let e = Error::from(orig);
assert_eq!(format!("{}", e), desc);
}
#[test]
fn test_error_http_response() {
let orig = io::Error::new(io::ErrorKind::Other, "other");
let e = Error::from(orig);
let resp: HttpResponse = e.into();
assert_eq!(resp.status(), StatusCode::INTERNAL_SERVER_ERROR);
}
#[test]
fn test_range_error() {
let e: HttpRangeError = HttpRangeParseError::InvalidRange.into();
assert_eq!(e, HttpRangeError::InvalidRange);
let e: HttpRangeError = HttpRangeParseError::NoOverlap.into();
assert_eq!(e, HttpRangeError::NoOverlap);
}
2017-11-20 05:02:31 +01:00
#[test]
fn test_expect_error() {
let resp: HttpResponse = ExpectError::Encoding.error_response();
assert_eq!(resp.status(), StatusCode::EXPECTATION_FAILED);
let resp: HttpResponse = ExpectError::UnknownExpect.error_response();
assert_eq!(resp.status(), StatusCode::EXPECTATION_FAILED);
}
2017-10-07 06:48:14 +02:00
macro_rules! from {
($from:expr => $error:pat) => {
2017-10-14 01:33:23 +02:00
match ParseError::from($from) {
2017-10-07 06:48:14 +02:00
e @ $error => {
2017-11-16 07:06:28 +01:00
assert!(format!("{}", e).len() >= 5);
2017-10-07 06:48:14 +02:00
} ,
e => panic!("{:?}", e)
}
}
}
macro_rules! from_and_cause {
($from:expr => $error:pat) => {
2017-10-14 01:33:23 +02:00
match ParseError::from($from) {
2017-10-07 06:48:14 +02:00
e @ $error => {
2017-11-16 07:06:28 +01:00
let desc = format!("{}", e.cause().unwrap());
2017-10-07 06:48:14 +02:00
assert_eq!(desc, $from.description().to_owned());
},
_ => panic!("{:?}", $from)
}
}
}
#[test]
fn test_from() {
2017-10-14 01:33:23 +02:00
from_and_cause!(io::Error::new(io::ErrorKind::Other, "other") => ParseError::Io(..));
from!(httparse::Error::HeaderName => ParseError::Header);
from!(httparse::Error::HeaderName => ParseError::Header);
from!(httparse::Error::HeaderValue => ParseError::Header);
from!(httparse::Error::NewLine => ParseError::Header);
from!(httparse::Error::Status => ParseError::Status);
from!(httparse::Error::Token => ParseError::Header);
from!(httparse::Error::TooManyHeaders => ParseError::TooLarge);
from!(httparse::Error::Version => ParseError::Version);
2017-10-07 06:48:14 +02:00
}
#[test]
fn failure_error() {
const NAME: &str = "RUST_BACKTRACE";
let old_tb = env::var(NAME);
env::set_var(NAME, "0");
let error = failure::err_msg("Hello!");
let resp: Error = error.into();
assert_eq!(format!("{:?}", resp), "Compat { error: ErrorMessage { msg: \"Hello!\" } }\n\n");
match old_tb {
Ok(x) => env::set_var(NAME, x),
_ => env::remove_var(NAME),
}
}
2017-10-07 06:48:14 +02:00
}