2020-10-08 12:50:56 +02:00
|
|
|
|
use std::{collections::HashSet, convert::TryInto, iter::FromIterator, rc::Rc};
|
|
|
|
|
|
|
|
|
|
use actix_web::{
|
|
|
|
|
dev::{RequestHead, Service, ServiceRequest, ServiceResponse, Transform},
|
|
|
|
|
error::{Error, Result},
|
|
|
|
|
http::{self, header::HeaderName, Error as HttpError, Method, Uri},
|
|
|
|
|
};
|
|
|
|
|
use futures_util::future::{ok, Ready};
|
|
|
|
|
|
|
|
|
|
use crate::{cors, AllOrSome, CorsMiddleware, Inner, OriginFn};
|
|
|
|
|
|
|
|
|
|
/// Builder for CORS middleware.
|
|
|
|
|
///
|
|
|
|
|
/// To construct a CORS middleware:
|
|
|
|
|
///
|
|
|
|
|
/// 1. Call [`Cors::new()`] to start building.
|
|
|
|
|
/// 2. Use any of the builder methods to customize CORS behavior.
|
|
|
|
|
/// 3. Call [`Cors::finish()`] to build the middleware.
|
|
|
|
|
///
|
|
|
|
|
/// # Example
|
|
|
|
|
///
|
|
|
|
|
/// ```rust
|
|
|
|
|
/// use actix_cors::{Cors, CorsFactory};
|
|
|
|
|
/// use actix_web::http::header;
|
|
|
|
|
///
|
|
|
|
|
/// let cors = Cors::new()
|
|
|
|
|
/// .allowed_origin("https://www.rust-lang.org")
|
|
|
|
|
/// .allowed_methods(vec!["GET", "POST"])
|
|
|
|
|
/// .allowed_headers(vec![header::AUTHORIZATION, header::ACCEPT])
|
|
|
|
|
/// .allowed_header(header::CONTENT_TYPE)
|
|
|
|
|
/// .max_age(3600)
|
|
|
|
|
/// .finish();
|
|
|
|
|
///
|
|
|
|
|
/// // `cors` can now be used in `App::wrap`.
|
|
|
|
|
/// ```
|
|
|
|
|
#[derive(Debug, Default)]
|
|
|
|
|
pub struct Cors {
|
|
|
|
|
cors: Option<Inner>,
|
|
|
|
|
methods: bool,
|
|
|
|
|
error: Option<http::Error>,
|
|
|
|
|
expose_headers: HashSet<HeaderName>,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl Cors {
|
|
|
|
|
/// Return a new builder.
|
|
|
|
|
pub fn new() -> Cors {
|
|
|
|
|
Cors {
|
|
|
|
|
cors: Some(Inner {
|
|
|
|
|
origins: AllOrSome::All,
|
|
|
|
|
origins_str: None,
|
|
|
|
|
origins_fns: Vec::new(),
|
|
|
|
|
methods: HashSet::new(),
|
|
|
|
|
headers: AllOrSome::All,
|
|
|
|
|
expose_headers: None,
|
|
|
|
|
max_age: None,
|
|
|
|
|
preflight: true,
|
|
|
|
|
send_wildcard: false,
|
|
|
|
|
supports_credentials: false,
|
|
|
|
|
vary_header: true,
|
|
|
|
|
}),
|
|
|
|
|
methods: false,
|
|
|
|
|
error: None,
|
|
|
|
|
expose_headers: HashSet::new(),
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Build a CORS middleware with default settings.
|
|
|
|
|
pub fn default() -> CorsFactory {
|
|
|
|
|
let inner = Inner {
|
|
|
|
|
origins: AllOrSome::default(),
|
|
|
|
|
origins_str: None,
|
|
|
|
|
origins_fns: Vec::new(),
|
|
|
|
|
methods: HashSet::from_iter(
|
|
|
|
|
vec![
|
|
|
|
|
Method::GET,
|
|
|
|
|
Method::HEAD,
|
|
|
|
|
Method::POST,
|
|
|
|
|
Method::OPTIONS,
|
|
|
|
|
Method::PUT,
|
|
|
|
|
Method::PATCH,
|
|
|
|
|
Method::DELETE,
|
|
|
|
|
]
|
|
|
|
|
.into_iter(),
|
|
|
|
|
),
|
|
|
|
|
headers: AllOrSome::All,
|
|
|
|
|
expose_headers: None,
|
|
|
|
|
max_age: None,
|
|
|
|
|
preflight: true,
|
|
|
|
|
send_wildcard: false,
|
|
|
|
|
supports_credentials: false,
|
|
|
|
|
vary_header: true,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
CorsFactory {
|
|
|
|
|
inner: Rc::new(inner),
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Add an origin that is allowed to make requests.
|
|
|
|
|
///
|
|
|
|
|
/// By default, requests from all origins are accepted by CORS logic. This method allows to
|
|
|
|
|
/// specify a finite set of origins to verify the value of the `Origin` request header.
|
|
|
|
|
///
|
|
|
|
|
/// These are `origin-or-null` types in the [Fetch Standard].
|
|
|
|
|
///
|
|
|
|
|
/// When this list is set, the client's `Origin` request header will be checked in a
|
|
|
|
|
/// case-sensitive manner.
|
|
|
|
|
///
|
|
|
|
|
/// When all origins are allowed and `send_wildcard` is set, `*` will be sent in the
|
|
|
|
|
/// `Access-Control-Allow-Origin` response header. If `send_wildcard` is not set, the client's
|
|
|
|
|
/// `Origin` request header will be echoed back in the `Access-Control-Allow-Origin`
|
|
|
|
|
/// response header.
|
|
|
|
|
///
|
|
|
|
|
/// If the origin of the request doesn't match any allowed origins and at least one
|
|
|
|
|
/// `allowed_origin_fn` function is set, these functions will be used to determinate
|
|
|
|
|
/// allowed origins.
|
|
|
|
|
///
|
2020-10-10 15:25:33 +02:00
|
|
|
|
/// # Panics
|
|
|
|
|
///
|
|
|
|
|
/// * If supplied origin is not valid uri, or
|
|
|
|
|
/// * If supplied origin is a wildcard (`*`). [`Cors::send_wildcard`] should be used instead.
|
2020-10-08 12:50:56 +02:00
|
|
|
|
///
|
|
|
|
|
/// [Fetch Standard]: https://fetch.spec.whatwg.org/#origin-header
|
|
|
|
|
pub fn allowed_origin(mut self, origin: &str) -> Cors {
|
2020-10-10 15:25:33 +02:00
|
|
|
|
assert!(
|
|
|
|
|
origin != "*",
|
|
|
|
|
"Wildcard in `allowed_origin` is not allowed. Use `send_wildcard`."
|
|
|
|
|
);
|
|
|
|
|
|
2020-10-08 12:50:56 +02:00
|
|
|
|
if let Some(cors) = cors(&mut self.cors, &self.error) {
|
|
|
|
|
match TryInto::<Uri>::try_into(origin) {
|
|
|
|
|
Ok(_) => {
|
|
|
|
|
if cors.origins.is_all() {
|
|
|
|
|
cors.origins = AllOrSome::Some(HashSet::new());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if let AllOrSome::Some(ref mut origins) = cors.origins {
|
|
|
|
|
origins.insert(origin.to_owned());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Err(e) => {
|
|
|
|
|
self.error = Some(e.into());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
self
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Determinate allowed origins by processing requests which didn't match any origins specified
|
|
|
|
|
/// in the `allowed_origin`.
|
|
|
|
|
///
|
|
|
|
|
/// The function will receive a `RequestHead` of each request, which can be used to determine
|
|
|
|
|
/// whether it should be allowed or not.
|
|
|
|
|
///
|
|
|
|
|
/// If the function returns `true`, the client's `Origin` request header will be echoed back
|
|
|
|
|
/// into the `Access-Control-Allow-Origin` response header.
|
|
|
|
|
pub fn allowed_origin_fn<F>(mut self, f: F) -> Cors
|
|
|
|
|
where
|
|
|
|
|
F: (Fn(&RequestHead) -> bool) + 'static,
|
|
|
|
|
{
|
|
|
|
|
if let Some(cors) = cors(&mut self.cors, &self.error) {
|
|
|
|
|
cors.origins_fns.push(OriginFn {
|
|
|
|
|
boxed_fn: Box::new(f),
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
self
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Set a list of methods which allowed origins can perform.
|
|
|
|
|
///
|
|
|
|
|
/// These will be sent in the `Access-Control-Allow-Methods` response header as specified in
|
|
|
|
|
/// the [Fetch Standard CORS protocol].
|
|
|
|
|
///
|
|
|
|
|
/// Defaults to `[GET, HEAD, POST, OPTIONS, PUT, PATCH, DELETE]`
|
|
|
|
|
///
|
|
|
|
|
/// [Fetch Standard CORS protocol]: https://fetch.spec.whatwg.org/#http-cors-protocol
|
|
|
|
|
pub fn allowed_methods<U, M>(mut self, methods: U) -> Cors
|
|
|
|
|
where
|
|
|
|
|
U: IntoIterator<Item = M>,
|
|
|
|
|
M: TryInto<Method>,
|
|
|
|
|
<M as TryInto<Method>>::Error: Into<HttpError>,
|
|
|
|
|
{
|
|
|
|
|
self.methods = true;
|
|
|
|
|
if let Some(cors) = cors(&mut self.cors, &self.error) {
|
|
|
|
|
for m in methods {
|
|
|
|
|
match m.try_into() {
|
|
|
|
|
Ok(method) => {
|
|
|
|
|
cors.methods.insert(method);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Err(e) => {
|
|
|
|
|
self.error = Some(e.into());
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
self
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Add an allowed header.
|
|
|
|
|
///
|
|
|
|
|
/// See `Cors::allowed_headers()` for details.
|
|
|
|
|
pub fn allowed_header<H>(mut self, header: H) -> Cors
|
|
|
|
|
where
|
|
|
|
|
H: TryInto<HeaderName>,
|
|
|
|
|
<H as TryInto<HeaderName>>::Error: Into<HttpError>,
|
|
|
|
|
{
|
|
|
|
|
if let Some(cors) = cors(&mut self.cors, &self.error) {
|
|
|
|
|
match header.try_into() {
|
|
|
|
|
Ok(method) => {
|
|
|
|
|
if cors.headers.is_all() {
|
|
|
|
|
cors.headers = AllOrSome::Some(HashSet::new());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if let AllOrSome::Some(ref mut headers) = cors.headers {
|
|
|
|
|
headers.insert(method);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Err(e) => self.error = Some(e.into()),
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
self
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Set a list of header field names which can be used when this resource is accessed by
|
|
|
|
|
/// allowed origins.
|
|
|
|
|
///
|
|
|
|
|
/// If `All` is set, whatever is requested by the client in `Access-Control-Request-Headers`
|
|
|
|
|
/// will be echoed back in the `Access-Control-Allow-Headers` header as specified in
|
|
|
|
|
/// the [Fetch Standard CORS protocol].
|
|
|
|
|
///
|
|
|
|
|
/// Defaults to `All`.
|
|
|
|
|
///
|
|
|
|
|
/// [Fetch Standard CORS protocol]: https://fetch.spec.whatwg.org/#http-cors-protocol
|
|
|
|
|
pub fn allowed_headers<U, H>(mut self, headers: U) -> Cors
|
|
|
|
|
where
|
|
|
|
|
U: IntoIterator<Item = H>,
|
|
|
|
|
H: TryInto<HeaderName>,
|
|
|
|
|
<H as TryInto<HeaderName>>::Error: Into<HttpError>,
|
|
|
|
|
{
|
|
|
|
|
if let Some(cors) = cors(&mut self.cors, &self.error) {
|
|
|
|
|
for h in headers {
|
|
|
|
|
match h.try_into() {
|
|
|
|
|
Ok(method) => {
|
|
|
|
|
if cors.headers.is_all() {
|
|
|
|
|
cors.headers = AllOrSome::Some(HashSet::new());
|
|
|
|
|
}
|
|
|
|
|
if let AllOrSome::Some(ref mut headers) = cors.headers {
|
|
|
|
|
headers.insert(method);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
Err(e) => {
|
|
|
|
|
self.error = Some(e.into());
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
self
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Set a list of headers which are safe to expose to the API of a CORS API specification.
|
|
|
|
|
/// This corresponds to the `Access-Control-Expose-Headers` response header as specified in
|
|
|
|
|
/// the [Fetch Standard CORS protocol].
|
|
|
|
|
///
|
|
|
|
|
/// This defaults to an empty set.
|
|
|
|
|
///
|
|
|
|
|
/// [Fetch Standard CORS protocol]: https://fetch.spec.whatwg.org/#http-cors-protocol
|
|
|
|
|
pub fn expose_headers<U, H>(mut self, headers: U) -> Cors
|
|
|
|
|
where
|
|
|
|
|
U: IntoIterator<Item = H>,
|
|
|
|
|
H: TryInto<HeaderName>,
|
|
|
|
|
<H as TryInto<HeaderName>>::Error: Into<HttpError>,
|
|
|
|
|
{
|
|
|
|
|
for h in headers {
|
|
|
|
|
match h.try_into() {
|
|
|
|
|
Ok(method) => {
|
|
|
|
|
self.expose_headers.insert(method);
|
|
|
|
|
}
|
|
|
|
|
Err(e) => {
|
|
|
|
|
self.error = Some(e.into());
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
self
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Set a maximum time for which this CORS request maybe cached.
|
|
|
|
|
/// This value is set as the `Access-Control-Max-Age` header as specified in
|
|
|
|
|
/// the [Fetch Standard CORS protocol].
|
|
|
|
|
///
|
|
|
|
|
/// This defaults to `None` (unset).
|
|
|
|
|
///
|
|
|
|
|
/// [Fetch Standard CORS protocol]: https://fetch.spec.whatwg.org/#http-cors-protocol
|
|
|
|
|
pub fn max_age(mut self, max_age: usize) -> Cors {
|
|
|
|
|
if let Some(cors) = cors(&mut self.cors, &self.error) {
|
|
|
|
|
cors.max_age = Some(max_age)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
self
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Set to use wildcard origins.
|
|
|
|
|
///
|
|
|
|
|
/// If send wildcard is set and the `allowed_origins` parameter is `All`, a wildcard
|
|
|
|
|
/// `Access-Control-Allow-Origin` response header is sent, rather than the request’s
|
|
|
|
|
/// `Origin` header.
|
|
|
|
|
///
|
|
|
|
|
/// This **CANNOT** be used in conjunction with `allowed_origins` set to `All` and
|
|
|
|
|
/// `allow_credentials` set to `true`. Depending on the mode of usage, this will either result
|
|
|
|
|
/// in an `CorsError::CredentialsWithWildcardOrigin` error during actix launch or runtime.
|
|
|
|
|
///
|
|
|
|
|
/// Defaults to `false`.
|
|
|
|
|
pub fn send_wildcard(mut self) -> Cors {
|
|
|
|
|
if let Some(cors) = cors(&mut self.cors, &self.error) {
|
|
|
|
|
cors.send_wildcard = true
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
self
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Allows users to make authenticated requests
|
|
|
|
|
///
|
|
|
|
|
/// If true, injects the `Access-Control-Allow-Credentials` header in responses. This allows
|
|
|
|
|
/// cookies and credentials to be submitted across domains as specified in
|
|
|
|
|
/// the [Fetch Standard CORS protocol].
|
|
|
|
|
///
|
|
|
|
|
/// This option cannot be used in conjunction with an `allowed_origin` set to `All` and
|
|
|
|
|
/// `send_wildcards` set to `true`.
|
|
|
|
|
///
|
|
|
|
|
/// Defaults to `false`.
|
|
|
|
|
///
|
|
|
|
|
/// Builder panics during `finish` if credentials are allowed, but the Origin is set to `*`.
|
|
|
|
|
/// This is not allowed by the CORS protocol.
|
|
|
|
|
///
|
|
|
|
|
/// [Fetch Standard CORS protocol]: https://fetch.spec.whatwg.org/#http-cors-protocol
|
|
|
|
|
pub fn supports_credentials(mut self) -> Cors {
|
|
|
|
|
if let Some(cors) = cors(&mut self.cors, &self.error) {
|
|
|
|
|
cors.supports_credentials = true
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
self
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Disable `Vary` header support.
|
|
|
|
|
///
|
|
|
|
|
/// When enabled the header `Vary: Origin` will be returned as per the Fetch Standard
|
|
|
|
|
/// implementation guidelines.
|
|
|
|
|
///
|
|
|
|
|
/// Setting this header when the `Access-Control-Allow-Origin` is dynamically generated
|
|
|
|
|
/// (eg. when there is more than one allowed origin, and an Origin other than '*' is returned)
|
|
|
|
|
/// informs CDNs and other caches that the CORS headers are dynamic, and cannot be cached.
|
|
|
|
|
///
|
|
|
|
|
/// By default, `Vary` header support is enabled.
|
|
|
|
|
pub fn disable_vary_header(mut self) -> Cors {
|
|
|
|
|
if let Some(cors) = cors(&mut self.cors, &self.error) {
|
|
|
|
|
cors.vary_header = false
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
self
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Disable support for preflight requests.
|
|
|
|
|
///
|
|
|
|
|
/// When enabled CORS middleware automatically handles `OPTIONS` requests.
|
|
|
|
|
/// This is useful for application level middleware.
|
|
|
|
|
///
|
|
|
|
|
/// By default *preflight* support is enabled.
|
|
|
|
|
pub fn disable_preflight(mut self) -> Cors {
|
|
|
|
|
if let Some(cors) = cors(&mut self.cors, &self.error) {
|
|
|
|
|
cors.preflight = false
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
self
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Construct CORS middleware.
|
|
|
|
|
pub fn finish(self) -> CorsFactory {
|
|
|
|
|
let mut this = if !self.methods {
|
|
|
|
|
self.allowed_methods(vec![
|
|
|
|
|
Method::GET,
|
|
|
|
|
Method::HEAD,
|
|
|
|
|
Method::POST,
|
|
|
|
|
Method::OPTIONS,
|
|
|
|
|
Method::PUT,
|
|
|
|
|
Method::PATCH,
|
|
|
|
|
Method::DELETE,
|
|
|
|
|
])
|
|
|
|
|
} else {
|
|
|
|
|
self
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
if let Some(e) = this.error.take() {
|
|
|
|
|
panic!("{}", e);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let mut cors = this.cors.take().expect("cannot reuse CorsBuilder");
|
|
|
|
|
|
|
|
|
|
if cors.supports_credentials && cors.send_wildcard && cors.origins.is_all() {
|
|
|
|
|
panic!("Credentials are allowed, but the Origin is set to \"*\"");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if let AllOrSome::Some(ref origins) = cors.origins {
|
|
|
|
|
let s = origins
|
|
|
|
|
.iter()
|
|
|
|
|
.fold(String::new(), |s, v| format!("{}, {}", s, v));
|
|
|
|
|
cors.origins_str = Some(s[2..].try_into().unwrap());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if !this.expose_headers.is_empty() {
|
|
|
|
|
cors.expose_headers = Some(
|
|
|
|
|
this.expose_headers
|
|
|
|
|
.iter()
|
|
|
|
|
.fold(String::new(), |s, v| format!("{}, {}", s, v.as_str()))[2..]
|
|
|
|
|
.to_owned(),
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
CorsFactory {
|
|
|
|
|
inner: Rc::new(cors),
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Middleware for Cross-Origin Resource Sharing support.
|
|
|
|
|
///
|
|
|
|
|
/// This struct contains the settings for CORS requests to be validated and for responses to
|
|
|
|
|
/// be generated.
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
|
pub struct CorsFactory {
|
|
|
|
|
inner: Rc<Inner>,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl<S, B> Transform<S> for CorsFactory
|
|
|
|
|
where
|
|
|
|
|
S: Service<Request = ServiceRequest, Response = ServiceResponse<B>, Error = Error>,
|
|
|
|
|
S::Future: 'static,
|
|
|
|
|
B: 'static,
|
|
|
|
|
{
|
|
|
|
|
type Request = ServiceRequest;
|
|
|
|
|
type Response = ServiceResponse<B>;
|
|
|
|
|
type Error = Error;
|
|
|
|
|
type InitError = ();
|
|
|
|
|
type Transform = CorsMiddleware<S>;
|
|
|
|
|
type Future = Ready<Result<Self::Transform, Self::InitError>>;
|
|
|
|
|
|
|
|
|
|
fn new_transform(&self, service: S) -> Self::Future {
|
|
|
|
|
ok(CorsMiddleware {
|
|
|
|
|
service,
|
|
|
|
|
inner: Rc::clone(&self.inner),
|
|
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
|
mod test {
|
|
|
|
|
use std::convert::{Infallible, TryInto};
|
|
|
|
|
|
|
|
|
|
use actix_web::{
|
|
|
|
|
dev::Transform,
|
|
|
|
|
http::{HeaderName, StatusCode},
|
|
|
|
|
test::{self, TestRequest},
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
use super::*;
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
#[should_panic(expected = "Credentials are allowed, but the Origin is set to")]
|
|
|
|
|
fn cors_validates_illegal_allow_credentials() {
|
|
|
|
|
let _cors = Cors::new().supports_credentials().send_wildcard().finish();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[actix_rt::test]
|
|
|
|
|
async fn default() {
|
|
|
|
|
let mut cors = Cors::default()
|
|
|
|
|
.new_transform(test::ok_service())
|
|
|
|
|
.await
|
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
|
|
let req = TestRequest::with_header("Origin", "https://www.example.com")
|
|
|
|
|
.to_srv_request();
|
|
|
|
|
|
|
|
|
|
let resp = test::call_service(&mut cors, req).await;
|
|
|
|
|
assert_eq!(resp.status(), StatusCode::OK);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[actix_rt::test]
|
|
|
|
|
async fn allowed_header_try_from() {
|
|
|
|
|
let _cors = Cors::new().allowed_header("Content-Type");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[actix_rt::test]
|
|
|
|
|
async fn allowed_header_try_into() {
|
|
|
|
|
struct ContentType;
|
|
|
|
|
|
|
|
|
|
impl TryInto<HeaderName> for ContentType {
|
|
|
|
|
type Error = Infallible;
|
|
|
|
|
|
|
|
|
|
fn try_into(self) -> Result<HeaderName, Self::Error> {
|
|
|
|
|
Ok(HeaderName::from_static("content-type"))
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let _cors = Cors::new().allowed_header(ContentType);
|
|
|
|
|
}
|
|
|
|
|
}
|