2019-03-06 03:47:18 +01:00
|
|
|
//! Cookie session.
|
|
|
|
//!
|
|
|
|
//! [**CookieSession**](struct.CookieSession.html)
|
|
|
|
//! uses cookies as session storage. `CookieSession` creates sessions
|
|
|
|
//! which are limited to storing fewer than 4000 bytes of data, as the payload
|
|
|
|
//! must fit into a single cookie. An internal server error is generated if a
|
|
|
|
//! session contains more than 4000 bytes.
|
|
|
|
//!
|
|
|
|
//! A cookie may have a security policy of *signed* or *private*. Each has
|
|
|
|
//! a respective `CookieSession` constructor.
|
|
|
|
//!
|
|
|
|
//! A *signed* cookie may be viewed but not modified by the client. A *private*
|
|
|
|
//! cookie may neither be viewed nor modified by the client.
|
|
|
|
//!
|
|
|
|
//! The constructors take a key as an argument. This is the private key
|
|
|
|
//! for cookie session - when this value is changed, all session data is lost.
|
|
|
|
|
|
|
|
use std::collections::HashMap;
|
|
|
|
use std::rc::Rc;
|
|
|
|
|
|
|
|
use actix_service::{Service, Transform};
|
2019-03-30 05:13:39 +01:00
|
|
|
use actix_web::cookie::{Cookie, CookieJar, Key, SameSite};
|
2019-03-11 00:39:46 +01:00
|
|
|
use actix_web::dev::{ServiceRequest, ServiceResponse};
|
2019-03-06 03:47:18 +01:00
|
|
|
use actix_web::http::{header::SET_COOKIE, HeaderValue};
|
2019-03-11 00:39:46 +01:00
|
|
|
use actix_web::{Error, HttpMessage, ResponseError};
|
2019-03-06 03:47:18 +01:00
|
|
|
use derive_more::{Display, From};
|
|
|
|
use futures::future::{ok, Future, FutureResult};
|
|
|
|
use futures::Poll;
|
|
|
|
use serde_json::error::Error as JsonError;
|
|
|
|
|
2019-06-29 20:24:02 +02:00
|
|
|
use crate::{Session, SessionStatus};
|
2019-03-06 03:47:18 +01:00
|
|
|
|
|
|
|
/// Errors that can occur during handling cookie session
|
|
|
|
#[derive(Debug, From, Display)]
|
|
|
|
pub enum CookieSessionError {
|
|
|
|
/// Size of the serialized session is greater than 4000 bytes.
|
|
|
|
#[display(fmt = "Size of the serialized session is greater than 4000 bytes.")]
|
|
|
|
Overflow,
|
|
|
|
/// Fail to serialize session.
|
|
|
|
#[display(fmt = "Fail to serialize session")]
|
|
|
|
Serialize(JsonError),
|
|
|
|
}
|
|
|
|
|
|
|
|
impl ResponseError for CookieSessionError {}
|
|
|
|
|
|
|
|
enum CookieSecurity {
|
|
|
|
Signed,
|
|
|
|
Private,
|
|
|
|
}
|
|
|
|
|
|
|
|
struct CookieSessionInner {
|
|
|
|
key: Key,
|
|
|
|
security: CookieSecurity,
|
|
|
|
name: String,
|
|
|
|
path: String,
|
|
|
|
domain: Option<String>,
|
|
|
|
secure: bool,
|
|
|
|
http_only: bool,
|
2019-04-20 02:23:17 +02:00
|
|
|
max_age: Option<time::Duration>,
|
2019-03-06 03:47:18 +01:00
|
|
|
same_site: Option<SameSite>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl CookieSessionInner {
|
|
|
|
fn new(key: &[u8], security: CookieSecurity) -> CookieSessionInner {
|
|
|
|
CookieSessionInner {
|
|
|
|
security,
|
|
|
|
key: Key::from_master(key),
|
|
|
|
name: "actix-session".to_owned(),
|
|
|
|
path: "/".to_owned(),
|
|
|
|
domain: None,
|
|
|
|
secure: true,
|
|
|
|
http_only: true,
|
|
|
|
max_age: None,
|
|
|
|
same_site: None,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn set_cookie<B>(
|
|
|
|
&self,
|
|
|
|
res: &mut ServiceResponse<B>,
|
|
|
|
state: impl Iterator<Item = (String, String)>,
|
|
|
|
) -> Result<(), Error> {
|
|
|
|
let state: HashMap<String, String> = state.collect();
|
|
|
|
let value =
|
|
|
|
serde_json::to_string(&state).map_err(CookieSessionError::Serialize)?;
|
|
|
|
if value.len() > 4064 {
|
|
|
|
return Err(CookieSessionError::Overflow.into());
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut cookie = Cookie::new(self.name.clone(), value);
|
|
|
|
cookie.set_path(self.path.clone());
|
|
|
|
cookie.set_secure(self.secure);
|
|
|
|
cookie.set_http_only(self.http_only);
|
|
|
|
|
|
|
|
if let Some(ref domain) = self.domain {
|
|
|
|
cookie.set_domain(domain.clone());
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(max_age) = self.max_age {
|
2019-04-20 02:23:17 +02:00
|
|
|
cookie.set_max_age(max_age);
|
2019-03-06 03:47:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(same_site) = self.same_site {
|
|
|
|
cookie.set_same_site(same_site);
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut jar = CookieJar::new();
|
|
|
|
|
|
|
|
match self.security {
|
|
|
|
CookieSecurity::Signed => jar.signed(&self.key).add(cookie),
|
|
|
|
CookieSecurity::Private => jar.private(&self.key).add(cookie),
|
|
|
|
}
|
|
|
|
|
|
|
|
for cookie in jar.delta() {
|
|
|
|
let val = HeaderValue::from_str(&cookie.encoded().to_string())?;
|
|
|
|
res.headers_mut().append(SET_COOKIE, val);
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2019-07-01 21:26:19 +02:00
|
|
|
/// invalidates session cookie
|
2019-07-08 19:25:51 +02:00
|
|
|
fn remove_cookie<B>(&self, res: &mut ServiceResponse<B>) -> Result<(), Error> {
|
2019-07-01 21:26:19 +02:00
|
|
|
let mut cookie = Cookie::named(self.name.clone());
|
|
|
|
cookie.set_value("");
|
|
|
|
cookie.set_max_age(time::Duration::seconds(0));
|
|
|
|
cookie.set_expires(time::now() - time::Duration::days(365));
|
|
|
|
|
|
|
|
let val = HeaderValue::from_str(&cookie.to_string())?;
|
|
|
|
res.headers_mut().append(SET_COOKIE, val);
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
fn load(&self, req: &ServiceRequest) -> (bool, HashMap<String, String>) {
|
2019-03-06 03:47:18 +01:00
|
|
|
if let Ok(cookies) = req.cookies() {
|
|
|
|
for cookie in cookies.iter() {
|
|
|
|
if cookie.name() == self.name {
|
|
|
|
let mut jar = CookieJar::new();
|
|
|
|
jar.add_original(cookie.clone());
|
|
|
|
|
|
|
|
let cookie_opt = match self.security {
|
|
|
|
CookieSecurity::Signed => jar.signed(&self.key).get(&self.name),
|
|
|
|
CookieSecurity::Private => {
|
|
|
|
jar.private(&self.key).get(&self.name)
|
|
|
|
}
|
|
|
|
};
|
|
|
|
if let Some(cookie) = cookie_opt {
|
|
|
|
if let Ok(val) = serde_json::from_str(cookie.value()) {
|
2019-07-01 21:26:19 +02:00
|
|
|
return (false, val);
|
2019-03-06 03:47:18 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-07-01 21:26:19 +02:00
|
|
|
(true, HashMap::new())
|
2019-03-06 03:47:18 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Use cookies for session storage.
|
|
|
|
///
|
|
|
|
/// `CookieSession` creates sessions which are limited to storing
|
|
|
|
/// fewer than 4000 bytes of data (as the payload must fit into a single
|
|
|
|
/// cookie). An Internal Server Error is generated if the session contains more
|
|
|
|
/// than 4000 bytes.
|
|
|
|
///
|
|
|
|
/// A cookie may have a security policy of *signed* or *private*. Each has a
|
|
|
|
/// respective `CookieSessionBackend` constructor.
|
|
|
|
///
|
|
|
|
/// A *signed* cookie is stored on the client as plaintext alongside
|
|
|
|
/// a signature such that the cookie may be viewed but not modified by the
|
|
|
|
/// client.
|
|
|
|
///
|
|
|
|
/// A *private* cookie is stored on the client as encrypted text
|
|
|
|
/// such that it may neither be viewed nor modified by the client.
|
|
|
|
///
|
|
|
|
/// The constructors take a key as an argument.
|
|
|
|
/// This is the private key for cookie session - when this value is changed,
|
|
|
|
/// all session data is lost. The constructors will panic if the key is less
|
|
|
|
/// than 32 bytes in length.
|
|
|
|
///
|
|
|
|
/// The backend relies on `cookie` crate to create and read cookies.
|
|
|
|
/// By default all cookies are percent encoded, but certain symbols may
|
|
|
|
/// cause troubles when reading cookie, if they are not properly percent encoded.
|
|
|
|
///
|
|
|
|
/// # Example
|
|
|
|
///
|
|
|
|
/// ```rust
|
|
|
|
/// use actix_session::CookieSession;
|
2019-03-07 00:47:15 +01:00
|
|
|
/// use actix_web::{web, App, HttpResponse, HttpServer};
|
2019-03-06 03:47:18 +01:00
|
|
|
///
|
|
|
|
/// fn main() {
|
2019-03-25 21:02:10 +01:00
|
|
|
/// let app = App::new().wrap(
|
2019-03-06 03:47:18 +01:00
|
|
|
/// CookieSession::signed(&[0; 32])
|
|
|
|
/// .domain("www.rust-lang.org")
|
|
|
|
/// .name("actix_session")
|
|
|
|
/// .path("/")
|
|
|
|
/// .secure(true))
|
2019-03-07 00:47:15 +01:00
|
|
|
/// .service(web::resource("/").to(|| HttpResponse::Ok()));
|
2019-03-06 03:47:18 +01:00
|
|
|
/// }
|
|
|
|
/// ```
|
|
|
|
pub struct CookieSession(Rc<CookieSessionInner>);
|
|
|
|
|
|
|
|
impl CookieSession {
|
|
|
|
/// Construct new *signed* `CookieSessionBackend` instance.
|
|
|
|
///
|
|
|
|
/// Panics if key length is less than 32 bytes.
|
|
|
|
pub fn signed(key: &[u8]) -> CookieSession {
|
|
|
|
CookieSession(Rc::new(CookieSessionInner::new(
|
|
|
|
key,
|
|
|
|
CookieSecurity::Signed,
|
|
|
|
)))
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Construct new *private* `CookieSessionBackend` instance.
|
|
|
|
///
|
|
|
|
/// Panics if key length is less than 32 bytes.
|
|
|
|
pub fn private(key: &[u8]) -> CookieSession {
|
|
|
|
CookieSession(Rc::new(CookieSessionInner::new(
|
|
|
|
key,
|
|
|
|
CookieSecurity::Private,
|
|
|
|
)))
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Sets the `path` field in the session cookie being built.
|
|
|
|
pub fn path<S: Into<String>>(mut self, value: S) -> CookieSession {
|
|
|
|
Rc::get_mut(&mut self.0).unwrap().path = value.into();
|
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Sets the `name` field in the session cookie being built.
|
|
|
|
pub fn name<S: Into<String>>(mut self, value: S) -> CookieSession {
|
|
|
|
Rc::get_mut(&mut self.0).unwrap().name = value.into();
|
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Sets the `domain` field in the session cookie being built.
|
|
|
|
pub fn domain<S: Into<String>>(mut self, value: S) -> CookieSession {
|
|
|
|
Rc::get_mut(&mut self.0).unwrap().domain = Some(value.into());
|
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Sets the `secure` field in the session cookie being built.
|
|
|
|
///
|
|
|
|
/// If the `secure` field is set, a cookie will only be transmitted when the
|
|
|
|
/// connection is secure - i.e. `https`
|
|
|
|
pub fn secure(mut self, value: bool) -> CookieSession {
|
|
|
|
Rc::get_mut(&mut self.0).unwrap().secure = value;
|
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Sets the `http_only` field in the session cookie being built.
|
|
|
|
pub fn http_only(mut self, value: bool) -> CookieSession {
|
|
|
|
Rc::get_mut(&mut self.0).unwrap().http_only = value;
|
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Sets the `same_site` field in the session cookie being built.
|
|
|
|
pub fn same_site(mut self, value: SameSite) -> CookieSession {
|
|
|
|
Rc::get_mut(&mut self.0).unwrap().same_site = Some(value);
|
|
|
|
self
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Sets the `max-age` field in the session cookie being built.
|
2019-04-20 02:23:17 +02:00
|
|
|
pub fn max_age(self, seconds: i64) -> CookieSession {
|
|
|
|
self.max_age_time(time::Duration::seconds(seconds))
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Sets the `max-age` field in the session cookie being built.
|
|
|
|
pub fn max_age_time(mut self, value: time::Duration) -> CookieSession {
|
2019-03-06 03:47:18 +01:00
|
|
|
Rc::get_mut(&mut self.0).unwrap().max_age = Some(value);
|
|
|
|
self
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-13 23:50:54 +02:00
|
|
|
impl<S, B: 'static> Transform<S> for CookieSession
|
2019-03-06 03:47:18 +01:00
|
|
|
where
|
2019-04-13 23:50:54 +02:00
|
|
|
S: Service<Request = ServiceRequest, Response = ServiceResponse<B>>,
|
2019-03-06 03:47:18 +01:00
|
|
|
S::Future: 'static,
|
|
|
|
S::Error: 'static,
|
|
|
|
{
|
2019-04-13 23:50:54 +02:00
|
|
|
type Request = ServiceRequest;
|
2019-03-06 03:47:18 +01:00
|
|
|
type Response = ServiceResponse<B>;
|
|
|
|
type Error = S::Error;
|
|
|
|
type InitError = ();
|
|
|
|
type Transform = CookieSessionMiddleware<S>;
|
|
|
|
type Future = FutureResult<Self::Transform, Self::InitError>;
|
|
|
|
|
|
|
|
fn new_transform(&self, service: S) -> Self::Future {
|
|
|
|
ok(CookieSessionMiddleware {
|
|
|
|
service,
|
|
|
|
inner: self.0.clone(),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Cookie session middleware
|
|
|
|
pub struct CookieSessionMiddleware<S> {
|
|
|
|
service: S,
|
|
|
|
inner: Rc<CookieSessionInner>,
|
|
|
|
}
|
|
|
|
|
2019-04-13 23:50:54 +02:00
|
|
|
impl<S, B: 'static> Service for CookieSessionMiddleware<S>
|
2019-03-06 03:47:18 +01:00
|
|
|
where
|
2019-04-13 23:50:54 +02:00
|
|
|
S: Service<Request = ServiceRequest, Response = ServiceResponse<B>>,
|
2019-03-06 03:47:18 +01:00
|
|
|
S::Future: 'static,
|
|
|
|
S::Error: 'static,
|
|
|
|
{
|
2019-04-13 23:50:54 +02:00
|
|
|
type Request = ServiceRequest;
|
2019-03-06 03:47:18 +01:00
|
|
|
type Response = ServiceResponse<B>;
|
|
|
|
type Error = S::Error;
|
2019-07-17 07:44:39 +02:00
|
|
|
type Future = Box<dyn Future<Item = Self::Response, Error = Self::Error>>;
|
2019-03-06 03:47:18 +01:00
|
|
|
|
|
|
|
fn poll_ready(&mut self) -> Poll<(), Self::Error> {
|
|
|
|
self.service.poll_ready()
|
|
|
|
}
|
|
|
|
|
2019-07-01 21:26:19 +02:00
|
|
|
/// On first request, a new session cookie is returned in response, regardless
|
2019-07-08 19:25:51 +02:00
|
|
|
/// of whether any session state is set. With subsequent requests, if the
|
2019-07-01 21:26:19 +02:00
|
|
|
/// session state changes, then set-cookie is returned in response. As
|
|
|
|
/// a user logs out, call session.purge() to set SessionStatus accordingly
|
|
|
|
/// and this will trigger removal of the session cookie in the response.
|
2019-04-13 23:50:54 +02:00
|
|
|
fn call(&mut self, mut req: ServiceRequest) -> Self::Future {
|
2019-03-06 03:47:18 +01:00
|
|
|
let inner = self.inner.clone();
|
2019-07-01 21:26:19 +02:00
|
|
|
let (is_new, state) = self.inner.load(&req);
|
2019-03-06 03:47:18 +01:00
|
|
|
Session::set_session(state.into_iter(), &mut req);
|
|
|
|
|
|
|
|
Box::new(self.service.call(req).map(move |mut res| {
|
2019-06-29 20:24:02 +02:00
|
|
|
match Session::get_changes(&mut res) {
|
2019-07-01 21:26:19 +02:00
|
|
|
(SessionStatus::Changed, Some(state))
|
2019-07-08 19:25:51 +02:00
|
|
|
| (SessionStatus::Renewed, Some(state)) => {
|
|
|
|
res.checked_expr(|res| inner.set_cookie(res, state))
|
|
|
|
}
|
2019-07-01 21:26:19 +02:00
|
|
|
(SessionStatus::Unchanged, _) =>
|
2019-07-08 19:25:51 +02:00
|
|
|
// set a new session cookie upon first request (new client)
|
|
|
|
{
|
2019-07-01 21:26:19 +02:00
|
|
|
if is_new {
|
|
|
|
let state: HashMap<String, String> = HashMap::new();
|
|
|
|
res.checked_expr(|res| inner.set_cookie(res, state.into_iter()))
|
|
|
|
} else {
|
|
|
|
res
|
2019-07-08 19:25:51 +02:00
|
|
|
}
|
|
|
|
}
|
2019-07-01 21:26:19 +02:00
|
|
|
(SessionStatus::Purged, _) => {
|
2019-07-17 11:08:30 +02:00
|
|
|
let _ = inner.remove_cookie(&mut res);
|
2019-07-08 19:25:51 +02:00
|
|
|
res
|
|
|
|
}
|
|
|
|
_ => res,
|
2019-03-06 03:47:18 +01:00
|
|
|
}
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
2019-03-07 00:47:15 +01:00
|
|
|
use actix_web::{test, web, App};
|
2019-04-17 20:02:03 +02:00
|
|
|
use bytes::Bytes;
|
2019-03-06 03:47:18 +01:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn cookie_session() {
|
|
|
|
let mut app = test::init_service(
|
|
|
|
App::new()
|
2019-03-25 21:02:10 +01:00
|
|
|
.wrap(CookieSession::signed(&[0; 32]).secure(false))
|
2019-03-07 00:47:15 +01:00
|
|
|
.service(web::resource("/").to(|ses: Session| {
|
|
|
|
let _ = ses.set("counter", 100);
|
|
|
|
"test"
|
|
|
|
})),
|
2019-03-06 03:47:18 +01:00
|
|
|
);
|
|
|
|
|
|
|
|
let request = test::TestRequest::get().to_request();
|
|
|
|
let response = test::block_on(app.call(request)).unwrap();
|
|
|
|
assert!(response
|
2019-04-03 00:00:10 +02:00
|
|
|
.response()
|
2019-03-06 03:47:18 +01:00
|
|
|
.cookies()
|
|
|
|
.find(|c| c.name() == "actix-session")
|
|
|
|
.is_some());
|
|
|
|
}
|
|
|
|
|
2019-04-17 20:02:03 +02:00
|
|
|
#[test]
|
|
|
|
fn private_cookie() {
|
|
|
|
let mut app = test::init_service(
|
|
|
|
App::new()
|
|
|
|
.wrap(CookieSession::private(&[0; 32]).secure(false))
|
|
|
|
.service(web::resource("/").to(|ses: Session| {
|
|
|
|
let _ = ses.set("counter", 100);
|
|
|
|
"test"
|
|
|
|
})),
|
|
|
|
);
|
|
|
|
|
|
|
|
let request = test::TestRequest::get().to_request();
|
|
|
|
let response = test::block_on(app.call(request)).unwrap();
|
|
|
|
assert!(response
|
|
|
|
.response()
|
|
|
|
.cookies()
|
|
|
|
.find(|c| c.name() == "actix-session")
|
|
|
|
.is_some());
|
|
|
|
}
|
|
|
|
|
2019-03-06 03:47:18 +01:00
|
|
|
#[test]
|
|
|
|
fn cookie_session_extractor() {
|
|
|
|
let mut app = test::init_service(
|
|
|
|
App::new()
|
2019-03-25 21:02:10 +01:00
|
|
|
.wrap(CookieSession::signed(&[0; 32]).secure(false))
|
2019-03-07 00:47:15 +01:00
|
|
|
.service(web::resource("/").to(|ses: Session| {
|
|
|
|
let _ = ses.set("counter", 100);
|
|
|
|
"test"
|
|
|
|
})),
|
2019-03-06 03:47:18 +01:00
|
|
|
);
|
|
|
|
|
|
|
|
let request = test::TestRequest::get().to_request();
|
|
|
|
let response = test::block_on(app.call(request)).unwrap();
|
|
|
|
assert!(response
|
2019-04-03 00:00:10 +02:00
|
|
|
.response()
|
2019-03-06 03:47:18 +01:00
|
|
|
.cookies()
|
|
|
|
.find(|c| c.name() == "actix-session")
|
|
|
|
.is_some());
|
|
|
|
}
|
2019-04-17 20:02:03 +02:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn basics() {
|
|
|
|
let mut app = test::init_service(
|
|
|
|
App::new()
|
|
|
|
.wrap(
|
|
|
|
CookieSession::signed(&[0; 32])
|
|
|
|
.path("/test/")
|
|
|
|
.name("actix-test")
|
|
|
|
.domain("localhost")
|
|
|
|
.http_only(true)
|
|
|
|
.same_site(SameSite::Lax)
|
2019-04-20 02:23:17 +02:00
|
|
|
.max_age(100),
|
2019-04-17 20:02:03 +02:00
|
|
|
)
|
|
|
|
.service(web::resource("/").to(|ses: Session| {
|
|
|
|
let _ = ses.set("counter", 100);
|
|
|
|
"test"
|
|
|
|
}))
|
|
|
|
.service(web::resource("/test/").to(|ses: Session| {
|
|
|
|
let val: usize = ses.get("counter").unwrap().unwrap();
|
|
|
|
format!("counter: {}", val)
|
|
|
|
})),
|
|
|
|
);
|
|
|
|
|
|
|
|
let request = test::TestRequest::get().to_request();
|
|
|
|
let response = test::block_on(app.call(request)).unwrap();
|
|
|
|
let cookie = response
|
|
|
|
.response()
|
|
|
|
.cookies()
|
|
|
|
.find(|c| c.name() == "actix-test")
|
|
|
|
.unwrap()
|
|
|
|
.clone();
|
|
|
|
assert_eq!(cookie.path().unwrap(), "/test/");
|
|
|
|
|
|
|
|
let request = test::TestRequest::with_uri("/test/")
|
|
|
|
.cookie(cookie)
|
|
|
|
.to_request();
|
|
|
|
let body = test::read_response(&mut app, request);
|
|
|
|
assert_eq!(body, Bytes::from_static(b"counter: 100"));
|
|
|
|
}
|
2019-03-06 03:47:18 +01:00
|
|
|
}
|