text stringlengths 0 601k |
|---|
let description html = let preview_image = match og_description html with None -> description html | Some x -> Some x in match Option . map String . trim preview_image with | Some " " -> None | Some x -> Some x | None -> None |
type t = { image : string option ; description : string option } |
let all url = let html = Http_client . get_sync url |> Result . get_ok in { image = preview_image html ; description = description html } |
let websocket_handler stream socket = let frames , push_frame = Lwt_stream . create ( ) in let message_is_binary = ref ` Binary in let frame ~ opcode ~ is_fin ~ len : _ payload = match opcode with | ` Connection_close -> push_frame ( Some ( ` Close , payload ) ) | ` Ping -> push_frame ( Some ( ` Ping , payload ) ) | ` ... |
let client_websocket_handler : Stream . stream -> Websocketaf . Wsd . t -> Websocketaf . Client_connection . input_handlers = Obj . magic websocket_handler |
module Wsprotocol ( IO : Iteratees . Monad ) = struct module I = Iteratees . Iteratee ( IO ) open I type ' a t = ' a I . t let sanitize s = let result = Buffer . create ( String . length s ) in for i = 0 to String . length s - 1 do if ( String . unsafe_get s i >= ' \ 000 ' && String . unsafe_get s i <= ' \ 032 ' ) || S... |
module Async_IO = Websocket . Make ( Cohttp_async . Io ) |
let set_tcp_nodelay writer = let socket = Socket . of_fd ( Writer . fd writer ) Socket . Type . tcp in Socket . setopt socket Socket . Opt . nodelay true |
let src = Logs . Src . create " websocket . async . client " ~ doc " : Websocket client for Async " |
let client ( ? name = " websocket . client " ) ( ? extra_headers = Header . init ( ) ) ( ? random_string = Rng . init ( ) ) ? initialized ~ app_to_ws ~ ws_to_app ~ net_to_ws ~ ws_to_net uri = let drain_handshake r w = let nonce = Base64 . encode_exn ( random_string 16 ) in let headers = Header . add_list extra_headers ... |
let client_ez ? opcode ( ? name = " websocket . client_ez " ) ? extra_headers ? heartbeat ? random_string uri net_to_ws ws_to_net = let app_to_ws , reactor_write = Pipe . create ( ) in let to_reactor_write , client_write = Pipe . create ( ) in let client_read , ws_to_app = Pipe . create ( ) in let initialized = Ivar . ... |
let src = Logs . Src . create " websocket . async . server " ~ doc " : Websocket server for Async " |
let server ( ? name = " websocket . server " ) ( ? check_request = fun _ -> Deferred . return true ) ( ? select_protocol = fun _ -> None ) ~ reader ~ writer ~ app_to_ws ~ ws_to_app ( ) = let handshake r w = Request . read r >>= ( function | ` Ok r -> Deferred . return r | ` Eof -> Logs_async . info ~ src ( fun m -> m "... |
let upgrade_connection ( ? select_protocol = fun _ -> None ) ( ? ping_interval = Time_ns . Span . of_int_sec 50 ) ~ app_to_ws ~ ws_to_app ~ f request = let headers = Cohttp . Request . headers request in let key = Option . value_exn ~ message " : missing sec - websocket - key " ( Header . get headers " sec - websocket ... |
module Lwt_IO = Websocket . Make ( Cohttp_lwt_unix . IO ) |
let send_frames stream oc = let buf = Buffer . create 128 in let send_frame fr = Buffer . clear buf ; Lwt_IO . write_frame_to_buf ~ mode : Server buf fr ; Lwt_io . write oc @@ Buffer . contents buf in Lwt_stream . iter_s send_frame stream |
let read_frames ic oc handler_fn = let read_frame = Lwt_IO . make_read_frame ~ mode : Server ic oc in let rec inner ( ) = read_frame ( ) >>= Lwt . wrap1 handler_fn >>= inner in inner ( ) |
let upgrade_connection request incoming_handler = let headers = Cohttp . Request . headers request in ( match Cohttp . Header . get headers " sec - websocket - key " with | None -> Lwt . fail_invalid_arg " upgrade_connection : missing header ` sec - websocket - key ` " | Some key -> Lwt . return key ) >>= fun key -> le... |
module Make ( IO : Graphql_intf . IO ) ( Ws : Graphql_websocket . Connection . S with type ' a IO . t = ' a IO . t ) = struct module Json = Yojson . Basic . Util let ( >>= ) = IO . bind type t = { conn : Ws . t ; subscriptions : ( string , unit -> unit ) Hashtbl . t } type client_message = | Gql_connection_init | Gql_s... |
let section = Lwt_log . Section . make " websocket_lwt_unix " |
let http_error msg = Lwt . fail ( HTTP_Error msg ) |
let protocol_error msg = Lwt . fail ( Protocol_error msg ) |
let set_tcp_nodelay flow = let open Conduit_lwt_unix in match flow with | TCP { fd ; _ } -> Lwt_unix . setsockopt fd Lwt_unix . TCP_NODELAY true | _ -> ( ) |
let fail_unless eq f = if not eq then f ( ) else Lwt . return_unit |
let fail_if eq f = if eq then f ( ) else Lwt . return_unit |
let drain_handshake req ic oc nonce = Request . write ( fun _writer -> Lwt . return ( ) ) req oc >>= fun ( ) -> Response . read ic >>= ( function | ` Ok r -> Lwt . return r | ` Eof -> Lwt . fail End_of_file | ` Invalid s -> Lwt . fail @@ Failure s ) >>= fun response -> let open Cohttp in let status = Response . status ... |
let connect ctx client url nonce extra_headers = let open Cohttp in let headers = Header . add_list extra_headers [ ( " Upgrade " , " websocket " ) ; ( " Connection " , " Upgrade " ) ; ( " Sec - WebSocket - Key " , nonce ) ; ( " Sec - WebSocket - Version " , " 13 " ) ] in let req = Request . make ~ headers url in Condu... |
type conn = { read_frame : unit -> Frame . t Lwt . t ; write_frame : Websocket . Frame . t -> unit Lwt . t ; oc : Lwt_io . output_channel } |
let read { read_frame ; _ } = read_frame ( ) |
let write { write_frame ; _ } frame = write_frame frame |
let close_transport { oc ; _ } = Lwt_io . close oc |
let connect ( ? extra_headers = Cohttp . Header . init ( ) ) ( ? random_string = Websocket . Rng . init ( ) ) ( ? ctx = Lazy . force Conduit_lwt_unix . default_ctx ) ? buf client url = let nonce = Base64 . encode_exn ( random_string 16 ) in connect ctx client url nonce extra_headers >|= fun ( ic , oc ) -> let read_fram... |
let write_failed_response oc = let body = " 403 Forbidden " in let body_len = String . length body |> Int64 . of_int in let response = Cohttp . Response . make ~ status ` : Forbidden ~ encoding ( : Cohttp . Transfer . Fixed body_len ) ( ) in let open Response in write ~ flush : true ( fun writer -> write_body writer bo... |
let server_fun ? read_buf ? write_buf check_request flow ic oc react = let read = function | ` Ok r -> Lwt . return r | ` Eof -> Lwt_log . info ~ section " Remote endpoint closed connection " >>= fun ( ) -> Lwt . fail End_of_file | ` Invalid reason -> Lwt_log . info_f ~ section " Invalid input from remote endpoint : % ... |
let establish_server ? read_buf ? write_buf ? timeout ? stop ( ? on_exn = fun exn -> ! Lwt . async_exception_hook exn ) ( ? check_request = check_origin_with_host ) ( ? ctx = Lazy . force Conduit_lwt_unix . default_ctx ) ~ mode react = let module C = Cohttp in Conduit_lwt_unix . serve ~ on_exn ? timeout ? stop ~ ctx ~ ... |
let mk_frame_stream recv = let f ( ) = recv ( ) >>= fun fr -> match fr . Frame . opcode with | Frame . Opcode . Close -> Lwt . return_none | _ -> Lwt . return ( Some fr ) in Lwt_stream . from f |
let establish_standard_server ? read_buf ? write_buf ? timeout ? stop ? on_exn ? check_request ( ? ctx = Lazy . force Conduit_lwt_unix . default_ctx ) ~ mode react = let f client = react ( Connected_client . make_standard client ) in establish_server ? read_buf ? write_buf ? timeout ? stop ? on_exn ? check_request ~ ct... |
module Suite = struct exception TestFailure of string type result = | Error of exn | Fail of string | Pass type outcome = { label : string ; result : result ; time_s : float ; } let string_of_result = function | Error e -> Printf . sprintf " Error : % s " ( Printexc . to_string e ) | Fail msg -> Printf . sprintf " Fail... |
module Zipper = struct type crumb = { left : Suite . t list ; label : string ; right : Suite . t list ; } type t = { crumbs : crumb list ; location : Suite . t ; } let of_suite suite = { crumbs = [ ] ; location = suite ; } let to_suite { location ; _ } = location let move_up { crumbs ; location } = match crumbs with | ... |
module Utils = struct type output = { log : string list ; outcomes : Suite . outcome list ; } type raw_summary = { total : int ; errors : int ; failures : int ; passes : int ; passed : bool } type summary = { report : string ; passed : bool ; } let run suite callback = let log = ref [ ] in let log_with_prefix prefix ms... |
module Runner = struct let paint color string = match color with | ` Red -> " \ 027 [ 31m " ^ string ^ " \ 027 [ 0m " | ` Green -> " \ 027 [ 32m " ^ string ^ " \ 027 [ 0m " | ` Yellow -> " \ 027 [ 33m " ^ string ^ " \ 027 [ 0m " | _ -> string let colored_string_of_result r = let s = Webtest . Suite . string_of_result r... |
module type S = sig type t type data val create : filename : string -> logger : Logger . t -> t Deferred . t val store : t -> data -> unit Deferred . t end |
module type Storage_intf = sig type data type location val store : location -> data -> unit Deferred . t end |
module Make ( Data : sig type t end ) end type t = { filename : string ; reader : Data . t Linear_pipe . Reader . t ; writer : Data . t Linear_pipe . Writer . t } let write_to_storage { filename ; _ } request data = let % bind ( ) = Store . store filename data in Request . put request filename let create ~ filename ~ l... |
let can_parse_uri_safe _ ( ) = let open Csrf . Crypto in let with_secret = Sihl . Configuration . read_secret ( ) |> Secret . make in let value = Nocrypto . Rng . generate token_length in let enc = Encrypted_token . from_struct ~ with_secret value in let parsed = enc |> Encrypted_token . to_uri_safe_string |> Encrypted... |
let crypto_undo_helper encrypt decrypt = let open Csrf . Crypto in let with_secret = Sihl . Configuration . read_secret ( ) |> Secret . make in let value = Nocrypto . Rng . generate token_length in let dec = encrypt ~ with_secret value |> decrypt ~ with_secret in let open Alcotest in check bool " Same decrypted CSRF to... |
let decrypt_random_undoes_encrypt_random _ ( ) = let open Csrf . Crypto in crypto_undo_helper Encrypted_token . from_struct_random Decrypted_token . from_encrypted_random ; ; |
let decrypt_undoes_encrypt _ ( ) = let open Csrf . Crypto in crypto_undo_helper Encrypted_token . from_struct Decrypted_token . from_encrypted ; ; |
let csrf_simulation _ ( ) = let open Csrf . Crypto in let with_secret = Sihl . Configuration . read_secret ( ) |> Secret . make in let value = Nocrypto . Rng . generate token_length in let enc = Encrypted_token . from_struct ~ with_secret value in let req = Decrypted_token . from_encrypted_to_encrypted_random ~ with_se... |
let apply_middlewares handler ? not_allowed_handler = handler |> Rock . Middleware . apply ( Sihl . Web . Middleware . csrf ? not_allowed_handler ~ key : csrf_name ( ) ) ; ; |
let default_response ? status ( ) = Lwt . return @@ Response . of_plain_text ? status " Pizzas " ; ; |
let get_csrf req = Csrf . find req |> Option . get |
let uri_decrypt token = let open Csrf . Crypto in let with_secret = Sihl . Configuration . read_secret ( ) |> Secret . make in token |> Encrypted_token . of_uri_safe_string |> Option . get |> Decrypted_token . from_encrypted_random ~ with_secret ; ; |
let get_request_without_token_succeeds _ ( ) = let req = Request . get route in let handler _ = default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt response = wrapped_handler req in let status = Response . status response |> Opium . Status . to_code in let open Alcotest in check int " H... |
let get_request_yields_token _ ( ) = let req = Request . get route in let token = ref " " in let handler req = token := get_csrf req ; default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt response = wrapped_handler req in let value = Sihl . Test . Session . find_resp csrf_name response i... |
let two_get_requests_yield_correct_tokens _ ( ) = let req = Request . get route in let token1 = ref " " in let token2 = ref " " in let handler tkn req = tkn := get_csrf req ; default_response ( ) in let wrapped_handler1 = apply_middlewares @@ handler token1 in let % lwt resp1 = wrapped_handler1 req in let cookie = resp... |
let post_request_yields_token _ ( ) = let post_req = Request . post route in let token = ref " " in let not_allowed_handler req = token := get_csrf req ; default_response ~ status ` : Forbidden ( ) in let handler _ = default_response ( ) in let wrapped_handler = apply_middlewares handler ~ not_allowed_handler in let % ... |
let two_post_requests_yield_different_token _ ( ) = let req = Request . post route in let token1 = ref " " in let token2 = ref " " in let not_allowed_handler tkn req = tkn := get_csrf req ; default_response ( ) in let handler _ = default_response ( ) in let wrapped_handler1 = apply_middlewares handler ~ not_allowed_han... |
let post_request_both_invalid_tokens_fails _ ( ) = let requests = CCList . map ( fun body -> Request . of_urlencoded ~ body route ` POST ) [ [ ] ; [ csrf_name , [ " garbage " ] ] ] in let add_cookie = [ CCFun . id ; Sihl . Test . Session . set_value_req [ csrf_name , " garbage " ] ] in let reqs = CCList . product CCFun... |
let cookie_invalid_helper reqs = let req = Request . get route in let token = ref " " in let allowed = ref 0 in let handler1 req = token := get_csrf req ; default_response ( ) in let handler2 _ = allowed := ! allowed + 1 ; default_response ( ) in let wrapped_handler = apply_middlewares handler1 in let % lwt response = ... |
let post_request_cookie_invalid_token_fails _ ( ) = let reqs ( token , _ ) = CCList . map ( fun add_cookie -> Request . of_urlencoded ~ body [ : csrf_name , [ token ] ] route ` POST |> add_cookie ) [ CCFun . id ; Sihl . Test . Session . set_value_req [ csrf_name , " garbage " ] ] in cookie_invalid_helper reqs ; ; |
let post_request_request_invalid_token_fails _ ( ) = let reqs ( _ , cookie ) = CCList . map ( fun body -> Request . of_urlencoded ~ body route ` POST |> Request . add_cookie cookie . Cookie . value ) [ [ ] ; [ csrf_name , [ " garbage " ] ] ] in cookie_invalid_helper reqs ; ; |
let post_request_with_nonmatching_token_fails _ ( ) = let open Csrf . Crypto in let req = Request . get route in let token = ref " " in let handler req = token := get_csrf req ; default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt response = wrapped_handler req in let cookie = response |... |
let post_request_with_nonmatching_cookie_fails _ ( ) = let open Csrf . Crypto in let req = Request . get route in let token = ref " " in let handler req = token := get_csrf req ; default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt _ = wrapped_handler req in let with_secret = Sihl . Conf... |
let post_request_with_valid_token_succeeds _ ( ) = let req = Request . get route in let token = ref " " in let handler req = token := get_csrf req ; default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt response = wrapped_handler req in let cookie = response |> Response . cookies |> List ... |
let two_post_requests_succeed _ ( ) = let req = Request . get route in let token1 = ref " " in let token2 = ref " " in let token3 = ref " " in let handler tkn req = tkn := get_csrf req ; default_response ( ) in let wrapped_handler = apply_middlewares @@ handler token1 in let % lwt response = wrapped_handler req in let ... |
let stale_duplicated_token_post_request_succeed _ ( ) = let req = Request . get route in let token = ref " " in let handler req = token := get_csrf req ; default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt response = wrapped_handler req in let old_token = ! token in let cookie = respons... |
let suite = [ ( " csrf crypto " , [ test_case " uri safe encoded string can be decoded " ` Quick can_parse_uri_safe ; test_case " decryption accounting for random undoes random encryption " ` Quick decrypt_random_undoes_encrypt_random ; test_case " decryption undoes encryption " ` Quick decrypt_undoes_encrypt ; test_ca... |
let ( ) = Unix . putenv " CHECK_CSRF " " true " ; Logs . set_level ( Sihl . Log . get_log_level ( ) ) ; Logs . set_reporter ( Sihl . Log . cli_reporter ( ) ) ; Lwt_main . run ( Alcotest_lwt . run " csrf " suite ) ; ; |
let log_src = Logs . Src . create " sihl . middleware . error " |
module Logs = ( val Logs . src_log log_src : Logs . LOG ) |
let page request_id = Format . asprintf { | < head > < meta charset " = utf - 8 " > < meta name " = viewport " content " = width = device - width , initial - scale = 1 , shrink - to - fit = no " > < title > Internal Server Error </ title > < style > % s </ style > </ head > < div class " = py - 4 sm : py - 12 " > < div... |
let site_error_handler req = let request_id = Web_id . find req |> Option . value ~ default " " :- in let site = page request_id in Opium . Response . of_plain_text site |> Opium . Response . set_content_type " text / html ; charset = utf - 8 " |> Lwt . return ; ; |
let json_error_handler req = let request_id = Web_id . find req |> Option . value ~ default " " :- in let msg = Format . sprintf " Something went wrong , our administrators have been notified . " in let body = Format . sprintf { " { " | errors " : [ " % s " ] , " request_id " : " % s " } " } | msg request_id in Opium .... |
let exn_to_string exn req = let msg = Printexc . to_string exn and stack = Printexc . get_backtrace ( ) in let request_id = Web_id . find req |> Option . value ~ default " " :- in let req_str = Format . asprintf " % a " Opium . Request . pp_hum req in Format . asprintf " Request id % s : % s \ nError : % s \ nStacktrac... |
let create_error_email ( sender , recipient ) error = Contract_email . create ~ sender ~ recipient ~ subject " : Exception caught " error ; ; |
let middleware ? email_config ( ? reporter = fun _ _ -> Lwt . return ( ) ) ? error_handler ( ) = let filter handler req = Lwt . catch ( fun ( ) -> handler req ) ( fun exn -> let error = exn_to_string exn req in Logs . err ( fun m -> m " % s " error ) ; let _ = match email_config with | Some ( sender , recipient , send_... |
let assert_delete_cookie cookie = Alcotest . ( check ( pair string string ) " flash is empty " ( " _flash " , " " ) cookie . Opium . Cookie . value ) ; match cookie . Opium . Cookie . expires with | ` Max_age value -> if Int64 . equal value Int64 . zero then ( ) else Alcotest . fail " Flash cookie did not expire " | _ ... |
let not_touching_flash_without_set_cookie_doesnt_set_cookie _ ( ) = let req = Opium . Request . get " " / in let % lwt res = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun _ -> Lwt . return @@ Opium . Response . of_plain_text " " ) req in let cookie = Opium . Response . cookie " _flash " res in... |
let not_touching_flash_removes_cookie _ ( ) = let req = Opium . Request . get " " / |> Opium . Request . add_cookie ( " _flash " , { { " | alert " : null , " notice " : null , " custom " [ ] } } ) :| in let % lwt res = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun _ -> Lwt . return @@ Opium . ... |
let flash_is_cleared_after_request _ ( ) = let req = Opium . Request . get " " / in let % lwt res = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun _ -> let res = Opium . Response . of_plain_text " " |> Sihl . Web . Flash . set_alert " foobar " in Lwt . return res ) req in let cookie = Opium . R... |
let set_and_read_flash_message _ ( ) = let req = Opium . Request . get " " / in let % lwt res = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun req -> let alert = Sihl . Web . Flash . find_alert req in let notice = Sihl . Web . Flash . find_notice req in Alcotest . ( check ( option string ) " ha... |
let suite = [ ( " flash " , [ test_case " not touching flash without set cookie doesn ' t change cookie " ` Quick not_touching_flash_without_set_cookie_doesnt_set_cookie ; test_case " not touching flash removes cookie " ` Quick not_touching_flash_removes_cookie ; test_case " flash is cleared after request " ` Quick fla... |
let ( ) = Logs . set_level ( Sihl . Log . get_log_level ( ) ) ; Logs . set_reporter ( Sihl . Log . cli_reporter ( ) ) ; Lwt_main . run ( Alcotest_lwt . run " flash " suite ) ; ; |
let log_src = Logs . Src . create " sihl . middleware . htmx " |
module Logs = ( val Logs . src_log log_src : Logs . LOG ) |
let is_htmx req = Opium . Request . header " HX - Request " req |> Option . is_some |
let current_url req = Opium . Request . header " HX - Current - URL " req |
let prompt req = Opium . Request . header " HX - Prompt " req |
let set_prompt prompt req = Opium . Request . add_header_or_replace ( " HX - Prompt " , prompt ) req ; ; |
let target req = Opium . Request . header " HX - Target " req |
let set_target target req = Opium . Request . add_header_or_replace ( " HX - Target " , target ) req ; ; |
let trigger_name req = Opium . Request . header " HX - Trigger - Name " req |
let set_trigger_name trigger_name req = Opium . Request . add_header_or_replace ( " HX - Trigger - Name " , trigger_name ) req ; ; |
let trigger_req req = Opium . Request . header " HX - Trigger " req |
let set_trigger_req trigger req = Opium . Request . add_header_or_replace ( " HX - Trigger " , trigger ) req ; ; |
let set_push push resp = Opium . Response . add_header_or_replace ( " HX - Push " , push ) resp ; ; |
let set_redirect redirect resp = Opium . Response . add_header_or_replace ( " HX - Redirect " , redirect ) resp ; ; |
let set_refresh refresh resp = Opium . Response . add_header_or_replace ( " HX - Refresh " , refresh ) resp ; ; |
let set_trigger trigger resp = Opium . Response . add_header_or_replace ( " HX - Trigger " , trigger ) resp ; ; |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.