2018-02-28 00:03:28 +01:00
|
|
|
use bytes::{Bytes, BytesMut};
|
2018-04-14 01:02:01 +02:00
|
|
|
use encoding::all::UTF_8;
|
2018-02-28 00:03:28 +01:00
|
|
|
use encoding::label::encoding_from_whatwg_label;
|
2018-04-14 01:02:01 +02:00
|
|
|
use encoding::types::{DecoderTrap, Encoding};
|
2018-04-29 07:55:47 +02:00
|
|
|
use encoding::EncodingRef;
|
2018-06-16 23:26:34 +02:00
|
|
|
use futures::{Async, Future, Poll, Stream};
|
2018-02-28 00:03:28 +01:00
|
|
|
use http::{header, HeaderMap};
|
2018-04-14 01:02:01 +02:00
|
|
|
use mime::Mime;
|
|
|
|
use serde::de::DeserializeOwned;
|
|
|
|
use serde_urlencoded;
|
|
|
|
use std::str;
|
2018-02-28 00:03:28 +01:00
|
|
|
|
2018-05-17 21:20:20 +02:00
|
|
|
use error::{
|
2018-06-17 04:48:50 +02:00
|
|
|
ContentTypeError, ParseError, PayloadError, ReadlinesError, UrlencodedError,
|
2018-05-17 21:20:20 +02:00
|
|
|
};
|
2018-03-06 04:28:42 +01:00
|
|
|
use header::Header;
|
2018-04-14 01:02:01 +02:00
|
|
|
use json::JsonBody;
|
2018-02-28 00:03:28 +01:00
|
|
|
use multipart::Multipart;
|
|
|
|
|
2018-02-28 08:30:26 +01:00
|
|
|
/// Trait that implements general purpose operations on http messages
|
2018-06-25 06:58:04 +02:00
|
|
|
pub trait HttpMessage: Sized {
|
|
|
|
/// Type of message payload stream
|
|
|
|
type Stream: Stream<Item = Bytes, Error = PayloadError> + Sized;
|
|
|
|
|
2018-02-28 08:30:26 +01:00
|
|
|
/// Read the message headers.
|
2018-02-28 00:03:28 +01:00
|
|
|
fn headers(&self) -> &HeaderMap;
|
|
|
|
|
2018-06-25 06:58:04 +02:00
|
|
|
/// Message payload stream
|
|
|
|
fn payload(&self) -> Self::Stream;
|
|
|
|
|
2018-03-06 04:28:42 +01:00
|
|
|
#[doc(hidden)]
|
|
|
|
/// Get a header
|
2018-04-14 01:02:01 +02:00
|
|
|
fn get_header<H: Header>(&self) -> Option<H>
|
|
|
|
where
|
|
|
|
Self: Sized,
|
|
|
|
{
|
2018-03-08 02:40:13 +01:00
|
|
|
if self.headers().contains_key(H::name()) {
|
|
|
|
H::parse(self).ok()
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
}
|
2018-03-06 04:28:42 +01:00
|
|
|
}
|
2018-04-14 01:02:01 +02:00
|
|
|
|
2018-02-28 00:03:28 +01:00
|
|
|
/// Read the request content type. If request does not contain
|
|
|
|
/// *Content-Type* header, empty str get returned.
|
|
|
|
fn content_type(&self) -> &str {
|
|
|
|
if let Some(content_type) = self.headers().get(header::CONTENT_TYPE) {
|
|
|
|
if let Ok(content_type) = content_type.to_str() {
|
2018-04-14 01:02:01 +02:00
|
|
|
return content_type.split(';').next().unwrap().trim();
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
""
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Get content type encoding
|
|
|
|
///
|
|
|
|
/// UTF-8 is used by default, If request charset is not set.
|
|
|
|
fn encoding(&self) -> Result<EncodingRef, ContentTypeError> {
|
|
|
|
if let Some(mime_type) = self.mime_type()? {
|
|
|
|
if let Some(charset) = mime_type.get_param("charset") {
|
|
|
|
if let Some(enc) = encoding_from_whatwg_label(charset.as_str()) {
|
|
|
|
Ok(enc)
|
|
|
|
} else {
|
|
|
|
Err(ContentTypeError::UnknownEncoding)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
Ok(UTF_8)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
Ok(UTF_8)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Convert the request content type to a known mime type.
|
|
|
|
fn mime_type(&self) -> Result<Option<Mime>, ContentTypeError> {
|
|
|
|
if let Some(content_type) = self.headers().get(header::CONTENT_TYPE) {
|
|
|
|
if let Ok(content_type) = content_type.to_str() {
|
|
|
|
return match content_type.parse() {
|
|
|
|
Ok(mt) => Ok(Some(mt)),
|
|
|
|
Err(_) => Err(ContentTypeError::ParseError),
|
|
|
|
};
|
|
|
|
} else {
|
2018-04-14 01:02:01 +02:00
|
|
|
return Err(ContentTypeError::ParseError);
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(None)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Check if request has chunked transfer encoding
|
|
|
|
fn chunked(&self) -> Result<bool, ParseError> {
|
|
|
|
if let Some(encodings) = self.headers().get(header::TRANSFER_ENCODING) {
|
|
|
|
if let Ok(s) = encodings.to_str() {
|
|
|
|
Ok(s.to_lowercase().contains("chunked"))
|
|
|
|
} else {
|
|
|
|
Err(ParseError::Header)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
Ok(false)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Load http message body.
|
|
|
|
///
|
2018-04-14 01:02:01 +02:00
|
|
|
/// By default only 256Kb payload reads to a memory, then
|
|
|
|
/// `PayloadError::Overflow` get returned. Use `MessageBody::limit()`
|
|
|
|
/// method to change upper limit.
|
2018-02-28 00:03:28 +01:00
|
|
|
///
|
|
|
|
/// ## Server example
|
|
|
|
///
|
|
|
|
/// ```rust
|
|
|
|
/// # extern crate bytes;
|
|
|
|
/// # extern crate actix_web;
|
|
|
|
/// # extern crate futures;
|
|
|
|
/// # #[macro_use] extern crate serde_derive;
|
2018-06-01 18:36:16 +02:00
|
|
|
/// use actix_web::{
|
|
|
|
/// AsyncResponder, FutureResponse, HttpMessage, HttpRequest, HttpResponse,
|
|
|
|
/// };
|
2018-02-28 00:03:28 +01:00
|
|
|
/// use bytes::Bytes;
|
|
|
|
/// use futures::future::Future;
|
|
|
|
///
|
2018-04-14 04:10:42 +02:00
|
|
|
/// fn index(mut req: HttpRequest) -> FutureResponse<HttpResponse> {
|
2018-02-28 00:03:28 +01:00
|
|
|
/// req.body() // <- get Body future
|
|
|
|
/// .limit(1024) // <- change max size of the body to a 1kb
|
|
|
|
/// .from_err()
|
|
|
|
/// .and_then(|bytes: Bytes| { // <- complete body
|
|
|
|
/// println!("==== BODY ==== {:?}", bytes);
|
2018-03-31 08:07:33 +02:00
|
|
|
/// Ok(HttpResponse::Ok().into())
|
2018-02-28 00:03:28 +01:00
|
|
|
/// }).responder()
|
|
|
|
/// }
|
|
|
|
/// # fn main() {}
|
|
|
|
/// ```
|
2018-06-25 06:58:04 +02:00
|
|
|
fn body(&self) -> MessageBody<Self> {
|
2018-02-28 00:03:28 +01:00
|
|
|
MessageBody::new(self)
|
|
|
|
}
|
|
|
|
|
2018-03-28 05:33:24 +02:00
|
|
|
/// Parse `application/x-www-form-urlencoded` encoded request's body.
|
2018-04-14 01:02:01 +02:00
|
|
|
/// Return `UrlEncoded` future. Form can be deserialized to any type that
|
|
|
|
/// implements `Deserialize` trait from *serde*.
|
2018-02-28 00:03:28 +01:00
|
|
|
///
|
|
|
|
/// Returns error:
|
|
|
|
///
|
|
|
|
/// * content type is not `application/x-www-form-urlencoded`
|
|
|
|
/// * content-length is greater than 256k
|
|
|
|
///
|
|
|
|
/// ## Server example
|
|
|
|
///
|
|
|
|
/// ```rust
|
|
|
|
/// # extern crate actix_web;
|
|
|
|
/// # extern crate futures;
|
2018-03-28 05:33:24 +02:00
|
|
|
/// # use futures::Future;
|
2018-04-02 23:00:18 +02:00
|
|
|
/// # use std::collections::HashMap;
|
2018-06-01 18:36:16 +02:00
|
|
|
/// use actix_web::{FutureResponse, HttpMessage, HttpRequest, HttpResponse};
|
2018-02-28 00:03:28 +01:00
|
|
|
///
|
2018-03-28 05:33:24 +02:00
|
|
|
/// fn index(mut req: HttpRequest) -> FutureResponse<HttpResponse> {
|
2018-04-02 23:00:18 +02:00
|
|
|
/// Box::new(
|
|
|
|
/// req.urlencoded::<HashMap<String, String>>() // <- get UrlEncoded future
|
|
|
|
/// .from_err()
|
|
|
|
/// .and_then(|params| { // <- url encoded parameters
|
|
|
|
/// println!("==== BODY ==== {:?}", params);
|
|
|
|
/// Ok(HttpResponse::Ok().into())
|
2018-06-01 18:36:16 +02:00
|
|
|
/// }),
|
|
|
|
/// )
|
2018-02-28 00:03:28 +01:00
|
|
|
/// }
|
|
|
|
/// # fn main() {}
|
|
|
|
/// ```
|
2018-06-25 06:58:04 +02:00
|
|
|
fn urlencoded<T: DeserializeOwned>(&self) -> UrlEncoded<Self, T> {
|
2018-02-28 00:03:28 +01:00
|
|
|
UrlEncoded::new(self)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Parse `application/json` encoded body.
|
|
|
|
/// Return `JsonBody<T>` future. It resolves to a `T` value.
|
|
|
|
///
|
|
|
|
/// Returns error:
|
|
|
|
///
|
|
|
|
/// * content type is not `application/json`
|
|
|
|
/// * content length is greater than 256k
|
|
|
|
///
|
|
|
|
/// ## Server example
|
|
|
|
///
|
|
|
|
/// ```rust
|
|
|
|
/// # extern crate actix_web;
|
|
|
|
/// # extern crate futures;
|
|
|
|
/// # #[macro_use] extern crate serde_derive;
|
|
|
|
/// use actix_web::*;
|
2018-06-01 18:36:16 +02:00
|
|
|
/// use futures::future::{ok, Future};
|
2018-02-28 00:03:28 +01:00
|
|
|
///
|
|
|
|
/// #[derive(Deserialize, Debug)]
|
|
|
|
/// struct MyObj {
|
|
|
|
/// name: String,
|
|
|
|
/// }
|
|
|
|
///
|
2018-06-01 18:36:16 +02:00
|
|
|
/// fn index(mut req: HttpRequest) -> Box<Future<Item = HttpResponse, Error = Error>> {
|
2018-02-28 00:03:28 +01:00
|
|
|
/// req.json() // <- get JsonBody future
|
|
|
|
/// .from_err()
|
|
|
|
/// .and_then(|val: MyObj| { // <- deserialized value
|
|
|
|
/// println!("==== BODY ==== {:?}", val);
|
2018-03-31 08:07:33 +02:00
|
|
|
/// Ok(HttpResponse::Ok().into())
|
2018-02-28 00:03:28 +01:00
|
|
|
/// }).responder()
|
|
|
|
/// }
|
|
|
|
/// # fn main() {}
|
|
|
|
/// ```
|
2018-06-25 06:58:04 +02:00
|
|
|
fn json<T: DeserializeOwned>(&self) -> JsonBody<Self, T> {
|
2018-02-28 00:03:28 +01:00
|
|
|
JsonBody::new(self)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Return stream to http payload processes as multipart.
|
|
|
|
///
|
|
|
|
/// Content-type: multipart/form-data;
|
|
|
|
///
|
|
|
|
/// ## Server example
|
|
|
|
///
|
|
|
|
/// ```rust
|
|
|
|
/// # extern crate actix_web;
|
|
|
|
/// # extern crate env_logger;
|
|
|
|
/// # extern crate futures;
|
|
|
|
/// # use std::str;
|
|
|
|
/// # use actix_web::*;
|
2018-06-01 19:27:23 +02:00
|
|
|
/// # use actix_web::actix::fut::FinishStream;
|
2018-02-28 00:03:28 +01:00
|
|
|
/// # use futures::{Future, Stream};
|
|
|
|
/// # use futures::future::{ok, result, Either};
|
2018-06-01 18:36:16 +02:00
|
|
|
/// fn index(mut req: HttpRequest) -> Box<Future<Item = HttpResponse, Error = Error>> {
|
2018-02-28 00:03:28 +01:00
|
|
|
/// req.multipart().from_err() // <- get multipart stream for current request
|
|
|
|
/// .and_then(|item| match item { // <- iterate over multipart items
|
|
|
|
/// multipart::MultipartItem::Field(field) => {
|
|
|
|
/// // Field in turn is stream of *Bytes* object
|
|
|
|
/// Either::A(field.from_err()
|
|
|
|
/// .map(|c| println!("-- CHUNK: \n{:?}", str::from_utf8(&c)))
|
|
|
|
/// .finish())
|
|
|
|
/// },
|
|
|
|
/// multipart::MultipartItem::Nested(mp) => {
|
|
|
|
/// // Or item could be nested Multipart stream
|
|
|
|
/// Either::B(ok(()))
|
|
|
|
/// }
|
|
|
|
/// })
|
|
|
|
/// .finish() // <- Stream::finish() combinator from actix
|
2018-03-31 08:07:33 +02:00
|
|
|
/// .map(|_| HttpResponse::Ok().into())
|
2018-02-28 00:03:28 +01:00
|
|
|
/// .responder()
|
|
|
|
/// }
|
|
|
|
/// # fn main() {}
|
|
|
|
/// ```
|
2018-06-25 06:58:04 +02:00
|
|
|
fn multipart(&self) -> Multipart<Self::Stream> {
|
2018-02-28 00:03:28 +01:00
|
|
|
let boundary = Multipart::boundary(self.headers());
|
2018-06-25 06:58:04 +02:00
|
|
|
Multipart::new(boundary, self.payload())
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
2018-06-16 23:26:34 +02:00
|
|
|
|
2018-06-13 19:43:03 +02:00
|
|
|
/// Return stream of lines.
|
2018-06-25 06:58:04 +02:00
|
|
|
fn readlines(&self) -> Readlines<Self> {
|
2018-06-13 19:43:03 +02:00
|
|
|
Readlines::new(self)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Stream to read request line by line.
|
2018-06-25 06:58:04 +02:00
|
|
|
pub struct Readlines<T: HttpMessage> {
|
|
|
|
stream: T::Stream,
|
2018-06-13 21:41:35 +02:00
|
|
|
buff: BytesMut,
|
2018-06-13 19:43:03 +02:00
|
|
|
limit: usize,
|
2018-06-13 23:19:48 +02:00
|
|
|
checked_buff: bool,
|
2018-06-25 06:58:04 +02:00
|
|
|
encoding: EncodingRef,
|
|
|
|
err: Option<ReadlinesError>,
|
2018-06-13 19:43:03 +02:00
|
|
|
}
|
|
|
|
|
2018-06-25 06:58:04 +02:00
|
|
|
impl<T: HttpMessage> Readlines<T> {
|
2018-06-13 19:43:03 +02:00
|
|
|
/// Create a new stream to read request line by line.
|
2018-06-25 06:58:04 +02:00
|
|
|
fn new(req: &T) -> Self {
|
|
|
|
let encoding = match req.encoding() {
|
|
|
|
Ok(enc) => enc,
|
|
|
|
Err(err) => return Self::err(req, err.into()),
|
|
|
|
};
|
|
|
|
|
2018-06-13 19:43:03 +02:00
|
|
|
Readlines {
|
2018-06-25 06:58:04 +02:00
|
|
|
stream: req.payload(),
|
2018-06-13 21:41:35 +02:00
|
|
|
buff: BytesMut::with_capacity(262_144),
|
2018-06-13 19:43:03 +02:00
|
|
|
limit: 262_144,
|
2018-06-13 23:19:48 +02:00
|
|
|
checked_buff: true,
|
2018-06-25 06:58:04 +02:00
|
|
|
err: None,
|
|
|
|
encoding,
|
2018-06-13 19:43:03 +02:00
|
|
|
}
|
|
|
|
}
|
2018-06-16 23:26:34 +02:00
|
|
|
|
2018-06-13 21:41:35 +02:00
|
|
|
/// Change max line size. By default max size is 256Kb
|
2018-06-13 19:43:03 +02:00
|
|
|
pub fn limit(mut self, limit: usize) -> Self {
|
|
|
|
self.limit = limit;
|
|
|
|
self
|
|
|
|
}
|
2018-06-25 06:58:04 +02:00
|
|
|
|
|
|
|
fn err(req: &T, err: ReadlinesError) -> Self {
|
|
|
|
Readlines {
|
|
|
|
stream: req.payload(),
|
2018-07-15 20:40:22 +02:00
|
|
|
buff: BytesMut::new(),
|
2018-06-25 06:58:04 +02:00
|
|
|
limit: 262_144,
|
|
|
|
checked_buff: true,
|
|
|
|
encoding: UTF_8,
|
|
|
|
err: Some(err),
|
|
|
|
}
|
|
|
|
}
|
2018-06-13 19:43:03 +02:00
|
|
|
}
|
|
|
|
|
2018-06-25 06:58:04 +02:00
|
|
|
impl<T: HttpMessage + 'static> Stream for Readlines<T> {
|
2018-06-13 19:43:03 +02:00
|
|
|
type Item = String;
|
|
|
|
type Error = ReadlinesError;
|
2018-06-16 23:26:34 +02:00
|
|
|
|
2018-06-13 19:43:03 +02:00
|
|
|
fn poll(&mut self) -> Poll<Option<Self::Item>, Self::Error> {
|
2018-06-25 06:58:04 +02:00
|
|
|
if let Some(err) = self.err.take() {
|
|
|
|
return Err(err);
|
|
|
|
}
|
|
|
|
|
2018-06-13 21:41:35 +02:00
|
|
|
// check if there is a newline in the buffer
|
2018-06-13 23:19:48 +02:00
|
|
|
if !self.checked_buff {
|
|
|
|
let mut found: Option<usize> = None;
|
|
|
|
for (ind, b) in self.buff.iter().enumerate() {
|
2018-06-16 23:26:34 +02:00
|
|
|
if *b == b'\n' {
|
2018-06-13 23:19:48 +02:00
|
|
|
found = Some(ind);
|
|
|
|
break;
|
|
|
|
}
|
2018-06-13 21:41:35 +02:00
|
|
|
}
|
2018-06-13 23:19:48 +02:00
|
|
|
if let Some(ind) = found {
|
|
|
|
// check if line is longer than limit
|
2018-06-16 23:26:34 +02:00
|
|
|
if ind + 1 > self.limit {
|
2018-06-13 23:19:48 +02:00
|
|
|
return Err(ReadlinesError::LimitOverflow);
|
|
|
|
}
|
2018-06-25 06:58:04 +02:00
|
|
|
let enc: *const Encoding = self.encoding as *const Encoding;
|
2018-06-13 23:19:48 +02:00
|
|
|
let line = if enc == UTF_8 {
|
2018-06-16 23:26:34 +02:00
|
|
|
str::from_utf8(&self.buff.split_to(ind + 1))
|
2018-06-13 23:19:48 +02:00
|
|
|
.map_err(|_| ReadlinesError::EncodingError)?
|
|
|
|
.to_owned()
|
|
|
|
} else {
|
2018-06-25 06:58:04 +02:00
|
|
|
self.encoding
|
2018-06-16 23:26:34 +02:00
|
|
|
.decode(&self.buff.split_to(ind + 1), DecoderTrap::Strict)
|
2018-06-13 23:19:48 +02:00
|
|
|
.map_err(|_| ReadlinesError::EncodingError)?
|
|
|
|
};
|
|
|
|
return Ok(Async::Ready(Some(line)));
|
2018-06-13 21:41:35 +02:00
|
|
|
}
|
2018-06-13 23:19:48 +02:00
|
|
|
self.checked_buff = true;
|
2018-06-13 21:41:35 +02:00
|
|
|
}
|
|
|
|
// poll req for more bytes
|
2018-06-25 06:58:04 +02:00
|
|
|
match self.stream.poll() {
|
2018-06-13 21:41:35 +02:00
|
|
|
Ok(Async::Ready(Some(mut bytes))) => {
|
|
|
|
// check if there is a newline in bytes
|
|
|
|
let mut found: Option<usize> = None;
|
|
|
|
for (ind, b) in bytes.iter().enumerate() {
|
2018-06-16 23:26:34 +02:00
|
|
|
if *b == b'\n' {
|
2018-06-13 21:41:35 +02:00
|
|
|
found = Some(ind);
|
|
|
|
break;
|
2018-06-13 19:43:03 +02:00
|
|
|
}
|
2018-06-13 21:41:35 +02:00
|
|
|
}
|
|
|
|
if let Some(ind) = found {
|
|
|
|
// check if line is longer than limit
|
2018-06-16 23:26:34 +02:00
|
|
|
if ind + 1 > self.limit {
|
2018-06-13 19:43:03 +02:00
|
|
|
return Err(ReadlinesError::LimitOverflow);
|
|
|
|
}
|
2018-06-25 06:58:04 +02:00
|
|
|
let enc: *const Encoding = self.encoding as *const Encoding;
|
2018-06-13 21:41:35 +02:00
|
|
|
let line = if enc == UTF_8 {
|
2018-06-16 23:26:34 +02:00
|
|
|
str::from_utf8(&bytes.split_to(ind + 1))
|
2018-06-13 23:19:48 +02:00
|
|
|
.map_err(|_| ReadlinesError::EncodingError)?
|
2018-06-13 21:41:35 +02:00
|
|
|
.to_owned()
|
|
|
|
} else {
|
2018-06-25 06:58:04 +02:00
|
|
|
self.encoding
|
2018-06-16 23:26:34 +02:00
|
|
|
.decode(&bytes.split_to(ind + 1), DecoderTrap::Strict)
|
2018-06-13 23:19:48 +02:00
|
|
|
.map_err(|_| ReadlinesError::EncodingError)?
|
2018-06-13 21:41:35 +02:00
|
|
|
};
|
|
|
|
// extend buffer with rest of the bytes;
|
|
|
|
self.buff.extend_from_slice(&bytes);
|
2018-06-13 23:19:48 +02:00
|
|
|
self.checked_buff = false;
|
2018-06-13 21:41:35 +02:00
|
|
|
return Ok(Async::Ready(Some(line)));
|
2018-06-13 19:43:03 +02:00
|
|
|
}
|
2018-06-13 21:41:35 +02:00
|
|
|
self.buff.extend_from_slice(&bytes);
|
2018-06-13 19:43:03 +02:00
|
|
|
Ok(Async::NotReady)
|
2018-06-16 23:26:34 +02:00
|
|
|
}
|
2018-06-13 19:43:03 +02:00
|
|
|
Ok(Async::NotReady) => Ok(Async::NotReady),
|
|
|
|
Ok(Async::Ready(None)) => {
|
2018-06-16 23:26:34 +02:00
|
|
|
if self.buff.is_empty() {
|
2018-06-13 19:43:03 +02:00
|
|
|
return Ok(Async::Ready(None));
|
|
|
|
}
|
2018-06-13 21:41:35 +02:00
|
|
|
if self.buff.len() > self.limit {
|
|
|
|
return Err(ReadlinesError::LimitOverflow);
|
|
|
|
}
|
2018-06-25 06:58:04 +02:00
|
|
|
let enc: *const Encoding = self.encoding as *const Encoding;
|
2018-06-13 21:41:35 +02:00
|
|
|
let line = if enc == UTF_8 {
|
|
|
|
str::from_utf8(&self.buff)
|
2018-06-13 23:19:48 +02:00
|
|
|
.map_err(|_| ReadlinesError::EncodingError)?
|
2018-06-13 21:41:35 +02:00
|
|
|
.to_owned()
|
|
|
|
} else {
|
2018-06-25 06:58:04 +02:00
|
|
|
self.encoding
|
2018-06-13 21:41:35 +02:00
|
|
|
.decode(&self.buff, DecoderTrap::Strict)
|
2018-06-13 23:19:48 +02:00
|
|
|
.map_err(|_| ReadlinesError::EncodingError)?
|
2018-06-13 21:41:35 +02:00
|
|
|
};
|
2018-06-13 19:43:03 +02:00
|
|
|
self.buff.clear();
|
2018-06-16 23:26:34 +02:00
|
|
|
Ok(Async::Ready(Some(line)))
|
|
|
|
}
|
2018-06-13 19:43:03 +02:00
|
|
|
Err(e) => Err(ReadlinesError::from(e)),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-28 00:03:28 +01:00
|
|
|
/// Future that resolves to a complete http message body.
|
2018-06-25 06:58:04 +02:00
|
|
|
pub struct MessageBody<T: HttpMessage> {
|
2018-02-28 00:03:28 +01:00
|
|
|
limit: usize,
|
2018-06-25 06:58:04 +02:00
|
|
|
length: Option<usize>,
|
|
|
|
stream: Option<T::Stream>,
|
|
|
|
err: Option<PayloadError>,
|
2018-04-14 01:02:01 +02:00
|
|
|
fut: Option<Box<Future<Item = Bytes, Error = PayloadError>>>,
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
|
2018-06-25 06:58:04 +02:00
|
|
|
impl<T: HttpMessage> MessageBody<T> {
|
|
|
|
/// Create `MessageBody` for request.
|
|
|
|
pub fn new(req: &T) -> MessageBody<T> {
|
|
|
|
let mut len = None;
|
|
|
|
if let Some(l) = req.headers().get(header::CONTENT_LENGTH) {
|
|
|
|
if let Ok(s) = l.to_str() {
|
|
|
|
if let Ok(l) = s.parse::<usize>() {
|
|
|
|
len = Some(l)
|
|
|
|
} else {
|
|
|
|
return Self::err(PayloadError::UnknownLength);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return Self::err(PayloadError::UnknownLength);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-28 00:03:28 +01:00
|
|
|
MessageBody {
|
|
|
|
limit: 262_144,
|
2018-06-25 06:58:04 +02:00
|
|
|
length: len,
|
|
|
|
stream: Some(req.payload()),
|
2018-02-28 00:03:28 +01:00
|
|
|
fut: None,
|
2018-06-25 06:58:04 +02:00
|
|
|
err: None,
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Change max size of payload. By default max size is 256Kb
|
|
|
|
pub fn limit(mut self, limit: usize) -> Self {
|
|
|
|
self.limit = limit;
|
|
|
|
self
|
|
|
|
}
|
2018-06-25 06:58:04 +02:00
|
|
|
|
|
|
|
fn err(e: PayloadError) -> Self {
|
|
|
|
MessageBody {
|
|
|
|
stream: None,
|
|
|
|
limit: 262_144,
|
|
|
|
fut: None,
|
|
|
|
err: Some(e),
|
|
|
|
length: None,
|
|
|
|
}
|
|
|
|
}
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
impl<T> Future for MessageBody<T>
|
2018-04-14 01:02:01 +02:00
|
|
|
where
|
2018-06-25 06:58:04 +02:00
|
|
|
T: HttpMessage + 'static,
|
2018-02-28 00:03:28 +01:00
|
|
|
{
|
|
|
|
type Item = Bytes;
|
|
|
|
type Error = PayloadError;
|
|
|
|
|
|
|
|
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
|
2018-06-25 06:58:04 +02:00
|
|
|
if let Some(ref mut fut) = self.fut {
|
|
|
|
return fut.poll();
|
|
|
|
}
|
2018-02-28 00:03:28 +01:00
|
|
|
|
2018-06-25 06:58:04 +02:00
|
|
|
if let Some(err) = self.err.take() {
|
|
|
|
return Err(err);
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
|
2018-06-25 06:58:04 +02:00
|
|
|
if let Some(len) = self.length.take() {
|
|
|
|
if len > self.limit {
|
|
|
|
return Err(PayloadError::Overflow);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// future
|
|
|
|
let limit = self.limit;
|
|
|
|
self.fut = Some(Box::new(
|
|
|
|
self.stream
|
|
|
|
.take()
|
|
|
|
.expect("Can not be used second time")
|
|
|
|
.from_err()
|
2018-07-15 20:40:22 +02:00
|
|
|
.fold(BytesMut::with_capacity(8192), move |mut body, chunk| {
|
2018-06-25 06:58:04 +02:00
|
|
|
if (body.len() + chunk.len()) > limit {
|
|
|
|
Err(PayloadError::Overflow)
|
|
|
|
} else {
|
|
|
|
body.extend_from_slice(&chunk);
|
|
|
|
Ok(body)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
.map(|body| body.freeze()),
|
|
|
|
));
|
|
|
|
self.poll()
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Future that resolves to a parsed urlencoded values.
|
2018-06-25 06:58:04 +02:00
|
|
|
pub struct UrlEncoded<T: HttpMessage, U> {
|
|
|
|
stream: Option<T::Stream>,
|
2018-02-28 00:03:28 +01:00
|
|
|
limit: usize,
|
2018-06-25 06:58:04 +02:00
|
|
|
length: Option<usize>,
|
|
|
|
encoding: EncodingRef,
|
|
|
|
err: Option<UrlencodedError>,
|
2018-04-14 01:02:01 +02:00
|
|
|
fut: Option<Box<Future<Item = U, Error = UrlencodedError>>>,
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
|
2018-06-25 06:58:04 +02:00
|
|
|
impl<T: HttpMessage, U> UrlEncoded<T, U> {
|
2018-06-02 15:51:58 +02:00
|
|
|
/// Create a new future to URL encode a request
|
2018-06-25 06:58:04 +02:00
|
|
|
pub fn new(req: &T) -> UrlEncoded<T, U> {
|
|
|
|
// check content type
|
|
|
|
if req.content_type().to_lowercase() != "application/x-www-form-urlencoded" {
|
|
|
|
return Self::err(UrlencodedError::ContentType);
|
|
|
|
}
|
|
|
|
let encoding = match req.encoding() {
|
|
|
|
Ok(enc) => enc,
|
|
|
|
Err(_) => return Self::err(UrlencodedError::ContentType),
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut len = None;
|
|
|
|
if let Some(l) = req.headers().get(header::CONTENT_LENGTH) {
|
|
|
|
if let Ok(s) = l.to_str() {
|
|
|
|
if let Ok(l) = s.parse::<usize>() {
|
|
|
|
len = Some(l)
|
|
|
|
} else {
|
|
|
|
return Self::err(UrlencodedError::UnknownLength);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return Self::err(UrlencodedError::UnknownLength);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2018-02-28 00:03:28 +01:00
|
|
|
UrlEncoded {
|
2018-06-25 06:58:04 +02:00
|
|
|
encoding,
|
|
|
|
stream: Some(req.payload()),
|
2018-02-28 00:03:28 +01:00
|
|
|
limit: 262_144,
|
2018-06-25 06:58:04 +02:00
|
|
|
length: len,
|
2018-02-28 00:03:28 +01:00
|
|
|
fut: None,
|
2018-06-25 06:58:04 +02:00
|
|
|
err: None,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn err(e: UrlencodedError) -> Self {
|
|
|
|
UrlEncoded {
|
|
|
|
stream: None,
|
|
|
|
limit: 262_144,
|
|
|
|
fut: None,
|
|
|
|
err: Some(e),
|
|
|
|
length: None,
|
|
|
|
encoding: UTF_8,
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Change max size of payload. By default max size is 256Kb
|
|
|
|
pub fn limit(mut self, limit: usize) -> Self {
|
|
|
|
self.limit = limit;
|
|
|
|
self
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-02 23:00:18 +02:00
|
|
|
impl<T, U> Future for UrlEncoded<T, U>
|
2018-04-14 01:02:01 +02:00
|
|
|
where
|
2018-06-25 06:58:04 +02:00
|
|
|
T: HttpMessage + 'static,
|
2018-04-14 01:02:01 +02:00
|
|
|
U: DeserializeOwned + 'static,
|
2018-02-28 00:03:28 +01:00
|
|
|
{
|
2018-04-02 23:00:18 +02:00
|
|
|
type Item = U;
|
2018-02-28 00:03:28 +01:00
|
|
|
type Error = UrlencodedError;
|
|
|
|
|
|
|
|
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
|
2018-06-25 06:58:04 +02:00
|
|
|
if let Some(ref mut fut) = self.fut {
|
|
|
|
return fut.poll();
|
|
|
|
}
|
2018-02-28 00:03:28 +01:00
|
|
|
|
2018-06-25 06:58:04 +02:00
|
|
|
if let Some(err) = self.err.take() {
|
|
|
|
return Err(err);
|
|
|
|
}
|
2018-02-28 00:03:28 +01:00
|
|
|
|
2018-06-25 06:58:04 +02:00
|
|
|
// payload size
|
|
|
|
let limit = self.limit;
|
|
|
|
if let Some(len) = self.length.take() {
|
|
|
|
if len > limit {
|
|
|
|
return Err(UrlencodedError::Overflow);
|
|
|
|
}
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
|
2018-06-25 06:58:04 +02:00
|
|
|
// future
|
|
|
|
let encoding = self.encoding;
|
|
|
|
let fut = self
|
|
|
|
.stream
|
|
|
|
.take()
|
2018-04-29 18:09:08 +02:00
|
|
|
.expect("UrlEncoded could not be used second time")
|
2018-06-25 06:58:04 +02:00
|
|
|
.from_err()
|
2018-07-15 20:40:22 +02:00
|
|
|
.fold(BytesMut::with_capacity(8192), move |mut body, chunk| {
|
2018-06-25 06:58:04 +02:00
|
|
|
if (body.len() + chunk.len()) > limit {
|
|
|
|
Err(UrlencodedError::Overflow)
|
|
|
|
} else {
|
|
|
|
body.extend_from_slice(&chunk);
|
|
|
|
Ok(body)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
.and_then(move |body| {
|
|
|
|
if (encoding as *const Encoding) == UTF_8 {
|
|
|
|
serde_urlencoded::from_bytes::<U>(&body)
|
|
|
|
.map_err(|_| UrlencodedError::Parse)
|
|
|
|
} else {
|
|
|
|
let body = encoding
|
|
|
|
.decode(&body, DecoderTrap::Strict)
|
|
|
|
.map_err(|_| UrlencodedError::Parse)?;
|
|
|
|
serde_urlencoded::from_str::<U>(&body)
|
|
|
|
.map_err(|_| UrlencodedError::Parse)
|
|
|
|
}
|
|
|
|
});
|
|
|
|
self.fut = Some(Box::new(fut));
|
|
|
|
self.poll()
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
|
|
|
use encoding::all::ISO_8859_2;
|
2018-04-29 07:55:47 +02:00
|
|
|
use encoding::Encoding;
|
2018-02-28 00:03:28 +01:00
|
|
|
use futures::Async;
|
2018-04-14 01:02:01 +02:00
|
|
|
use mime;
|
2018-02-28 00:03:28 +01:00
|
|
|
use test::TestRequest;
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_content_type() {
|
|
|
|
let req = TestRequest::with_header("content-type", "text/plain").finish();
|
|
|
|
assert_eq!(req.content_type(), "text/plain");
|
2018-04-14 01:02:01 +02:00
|
|
|
let req =
|
|
|
|
TestRequest::with_header("content-type", "application/json; charset=utf=8")
|
|
|
|
.finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
assert_eq!(req.content_type(), "application/json");
|
2018-06-25 06:58:04 +02:00
|
|
|
let req = TestRequest::default().finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
assert_eq!(req.content_type(), "");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_mime_type() {
|
|
|
|
let req = TestRequest::with_header("content-type", "application/json").finish();
|
|
|
|
assert_eq!(req.mime_type().unwrap(), Some(mime::APPLICATION_JSON));
|
2018-06-25 06:58:04 +02:00
|
|
|
let req = TestRequest::default().finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
assert_eq!(req.mime_type().unwrap(), None);
|
2018-04-14 01:02:01 +02:00
|
|
|
let req =
|
|
|
|
TestRequest::with_header("content-type", "application/json; charset=utf-8")
|
|
|
|
.finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
let mt = req.mime_type().unwrap().unwrap();
|
|
|
|
assert_eq!(mt.get_param(mime::CHARSET), Some(mime::UTF_8));
|
|
|
|
assert_eq!(mt.type_(), mime::APPLICATION);
|
|
|
|
assert_eq!(mt.subtype(), mime::JSON);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_mime_type_error() {
|
|
|
|
let req = TestRequest::with_header(
|
2018-04-14 01:02:01 +02:00
|
|
|
"content-type",
|
|
|
|
"applicationadfadsfasdflknadsfklnadsfjson",
|
|
|
|
).finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
assert_eq!(Err(ContentTypeError::ParseError), req.mime_type());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_encoding() {
|
2018-06-25 06:58:04 +02:00
|
|
|
let req = TestRequest::default().finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
assert_eq!(UTF_8.name(), req.encoding().unwrap().name());
|
|
|
|
|
2018-04-14 01:02:01 +02:00
|
|
|
let req = TestRequest::with_header("content-type", "application/json").finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
assert_eq!(UTF_8.name(), req.encoding().unwrap().name());
|
|
|
|
|
|
|
|
let req = TestRequest::with_header(
|
2018-04-14 01:02:01 +02:00
|
|
|
"content-type",
|
|
|
|
"application/json; charset=ISO-8859-2",
|
|
|
|
).finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
assert_eq!(ISO_8859_2.name(), req.encoding().unwrap().name());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_encoding_error() {
|
2018-04-14 01:02:01 +02:00
|
|
|
let req = TestRequest::with_header("content-type", "applicatjson").finish();
|
2018-05-17 21:20:20 +02:00
|
|
|
assert_eq!(Some(ContentTypeError::ParseError), req.encoding().err());
|
2018-02-28 00:03:28 +01:00
|
|
|
|
|
|
|
let req = TestRequest::with_header(
|
2018-04-14 01:02:01 +02:00
|
|
|
"content-type",
|
|
|
|
"application/json; charset=kkkttktk",
|
|
|
|
).finish();
|
2018-04-29 18:09:08 +02:00
|
|
|
assert_eq!(
|
|
|
|
Some(ContentTypeError::UnknownEncoding),
|
|
|
|
req.encoding().err()
|
|
|
|
);
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_chunked() {
|
2018-06-25 06:58:04 +02:00
|
|
|
let req = TestRequest::default().finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
assert!(!req.chunked().unwrap());
|
|
|
|
|
2018-04-14 01:02:01 +02:00
|
|
|
let req =
|
|
|
|
TestRequest::with_header(header::TRANSFER_ENCODING, "chunked").finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
assert!(req.chunked().unwrap());
|
|
|
|
|
2018-06-25 06:58:04 +02:00
|
|
|
let req = TestRequest::default()
|
|
|
|
.header(
|
|
|
|
header::TRANSFER_ENCODING,
|
|
|
|
Bytes::from_static(b"some va\xadscc\xacas0xsdasdlue"),
|
|
|
|
)
|
|
|
|
.finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
assert!(req.chunked().is_err());
|
|
|
|
}
|
|
|
|
|
|
|
|
impl PartialEq for UrlencodedError {
|
|
|
|
fn eq(&self, other: &UrlencodedError) -> bool {
|
|
|
|
match *self {
|
|
|
|
UrlencodedError::Chunked => match *other {
|
|
|
|
UrlencodedError::Chunked => true,
|
|
|
|
_ => false,
|
|
|
|
},
|
|
|
|
UrlencodedError::Overflow => match *other {
|
|
|
|
UrlencodedError::Overflow => true,
|
|
|
|
_ => false,
|
|
|
|
},
|
|
|
|
UrlencodedError::UnknownLength => match *other {
|
|
|
|
UrlencodedError::UnknownLength => true,
|
|
|
|
_ => false,
|
|
|
|
},
|
|
|
|
UrlencodedError::ContentType => match *other {
|
|
|
|
UrlencodedError::ContentType => true,
|
|
|
|
_ => false,
|
|
|
|
},
|
|
|
|
_ => false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-02 23:00:18 +02:00
|
|
|
#[derive(Deserialize, Debug, PartialEq)]
|
|
|
|
struct Info {
|
|
|
|
hello: String,
|
|
|
|
}
|
|
|
|
|
2018-02-28 00:03:28 +01:00
|
|
|
#[test]
|
|
|
|
fn test_urlencoded_error() {
|
|
|
|
let req = TestRequest::with_header(
|
2018-04-14 01:02:01 +02:00
|
|
|
header::CONTENT_TYPE,
|
|
|
|
"application/x-www-form-urlencoded",
|
|
|
|
).header(header::CONTENT_LENGTH, "xxxx")
|
2018-02-28 00:03:28 +01:00
|
|
|
.finish();
|
2018-04-14 01:02:01 +02:00
|
|
|
assert_eq!(
|
|
|
|
req.urlencoded::<Info>().poll().err().unwrap(),
|
|
|
|
UrlencodedError::UnknownLength
|
|
|
|
);
|
2018-02-28 00:03:28 +01:00
|
|
|
|
|
|
|
let req = TestRequest::with_header(
|
2018-04-14 01:02:01 +02:00
|
|
|
header::CONTENT_TYPE,
|
|
|
|
"application/x-www-form-urlencoded",
|
|
|
|
).header(header::CONTENT_LENGTH, "1000000")
|
2018-02-28 00:03:28 +01:00
|
|
|
.finish();
|
2018-04-14 01:02:01 +02:00
|
|
|
assert_eq!(
|
|
|
|
req.urlencoded::<Info>().poll().err().unwrap(),
|
|
|
|
UrlencodedError::Overflow
|
|
|
|
);
|
2018-02-28 00:03:28 +01:00
|
|
|
|
2018-04-14 01:02:01 +02:00
|
|
|
let req = TestRequest::with_header(header::CONTENT_TYPE, "text/plain")
|
2018-02-28 00:03:28 +01:00
|
|
|
.header(header::CONTENT_LENGTH, "10")
|
|
|
|
.finish();
|
2018-04-14 01:02:01 +02:00
|
|
|
assert_eq!(
|
|
|
|
req.urlencoded::<Info>().poll().err().unwrap(),
|
|
|
|
UrlencodedError::ContentType
|
|
|
|
);
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_urlencoded() {
|
2018-07-04 17:01:27 +02:00
|
|
|
let req = TestRequest::with_header(
|
2018-04-14 01:02:01 +02:00
|
|
|
header::CONTENT_TYPE,
|
|
|
|
"application/x-www-form-urlencoded",
|
|
|
|
).header(header::CONTENT_LENGTH, "11")
|
2018-06-25 06:58:04 +02:00
|
|
|
.set_payload(Bytes::from_static(b"hello=world"))
|
2018-02-28 00:03:28 +01:00
|
|
|
.finish();
|
|
|
|
|
2018-04-02 23:00:18 +02:00
|
|
|
let result = req.urlencoded::<Info>().poll().ok().unwrap();
|
2018-04-14 01:02:01 +02:00
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Async::Ready(Info {
|
|
|
|
hello: "world".to_owned()
|
|
|
|
})
|
|
|
|
);
|
2018-02-28 00:03:28 +01:00
|
|
|
|
2018-07-04 17:01:27 +02:00
|
|
|
let req = TestRequest::with_header(
|
2018-04-14 01:02:01 +02:00
|
|
|
header::CONTENT_TYPE,
|
|
|
|
"application/x-www-form-urlencoded; charset=utf-8",
|
|
|
|
).header(header::CONTENT_LENGTH, "11")
|
2018-06-25 06:58:04 +02:00
|
|
|
.set_payload(Bytes::from_static(b"hello=world"))
|
2018-02-28 00:03:28 +01:00
|
|
|
.finish();
|
|
|
|
|
|
|
|
let result = req.urlencoded().poll().ok().unwrap();
|
2018-04-14 01:02:01 +02:00
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Async::Ready(Info {
|
|
|
|
hello: "world".to_owned()
|
|
|
|
})
|
|
|
|
);
|
2018-04-02 23:00:18 +02:00
|
|
|
}
|
|
|
|
|
2018-02-28 00:03:28 +01:00
|
|
|
#[test]
|
|
|
|
fn test_message_body() {
|
|
|
|
let req = TestRequest::with_header(header::CONTENT_LENGTH, "xxxx").finish();
|
|
|
|
match req.body().poll().err().unwrap() {
|
|
|
|
PayloadError::UnknownLength => (),
|
2018-03-30 00:55:27 +02:00
|
|
|
_ => unreachable!("error"),
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
let req = TestRequest::with_header(header::CONTENT_LENGTH, "1000000").finish();
|
|
|
|
match req.body().poll().err().unwrap() {
|
|
|
|
PayloadError::Overflow => (),
|
2018-03-30 00:55:27 +02:00
|
|
|
_ => unreachable!("error"),
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
|
2018-06-25 06:58:04 +02:00
|
|
|
let req = TestRequest::default()
|
|
|
|
.set_payload(Bytes::from_static(b"test"))
|
|
|
|
.finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
match req.body().poll().ok().unwrap() {
|
|
|
|
Async::Ready(bytes) => assert_eq!(bytes, Bytes::from_static(b"test")),
|
2018-03-30 00:55:27 +02:00
|
|
|
_ => unreachable!("error"),
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
|
2018-07-04 17:01:27 +02:00
|
|
|
let req = TestRequest::default()
|
2018-06-25 06:58:04 +02:00
|
|
|
.set_payload(Bytes::from_static(b"11111111111111"))
|
|
|
|
.finish();
|
2018-02-28 00:03:28 +01:00
|
|
|
match req.body().limit(5).poll().err().unwrap() {
|
|
|
|
PayloadError::Overflow => (),
|
2018-03-30 00:55:27 +02:00
|
|
|
_ => unreachable!("error"),
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|
|
|
|
}
|
2018-06-16 23:26:34 +02:00
|
|
|
|
2018-06-13 23:19:48 +02:00
|
|
|
#[test]
|
|
|
|
fn test_readlines() {
|
2018-06-25 06:58:04 +02:00
|
|
|
let req = TestRequest::default()
|
|
|
|
.set_payload(Bytes::from_static(
|
|
|
|
b"Lorem Ipsum is simply dummy text of the printing and typesetting\n\
|
|
|
|
industry. Lorem Ipsum has been the industry's standard dummy\n\
|
|
|
|
Contrary to popular belief, Lorem Ipsum is not simply random text.",
|
|
|
|
))
|
|
|
|
.finish();
|
|
|
|
let mut r = Readlines::new(&req);
|
2018-06-13 23:19:48 +02:00
|
|
|
match r.poll().ok().unwrap() {
|
2018-06-16 23:26:34 +02:00
|
|
|
Async::Ready(Some(s)) => assert_eq!(
|
|
|
|
s,
|
|
|
|
"Lorem Ipsum is simply dummy text of the printing and typesetting\n"
|
|
|
|
),
|
2018-06-13 23:19:48 +02:00
|
|
|
_ => unreachable!("error"),
|
|
|
|
}
|
|
|
|
match r.poll().ok().unwrap() {
|
2018-06-16 23:26:34 +02:00
|
|
|
Async::Ready(Some(s)) => assert_eq!(
|
|
|
|
s,
|
|
|
|
"industry. Lorem Ipsum has been the industry's standard dummy\n"
|
|
|
|
),
|
2018-06-13 23:19:48 +02:00
|
|
|
_ => unreachable!("error"),
|
|
|
|
}
|
|
|
|
match r.poll().ok().unwrap() {
|
2018-06-16 23:26:34 +02:00
|
|
|
Async::Ready(Some(s)) => assert_eq!(
|
|
|
|
s,
|
|
|
|
"Contrary to popular belief, Lorem Ipsum is not simply random text."
|
|
|
|
),
|
2018-06-13 23:19:48 +02:00
|
|
|
_ => unreachable!("error"),
|
|
|
|
}
|
|
|
|
}
|
2018-02-28 00:03:28 +01:00
|
|
|
}
|