repo
stringlengths
6
65
file_url
stringlengths
81
311
file_path
stringlengths
6
227
content
stringlengths
0
32.8k
language
stringclasses
1 value
license
stringclasses
7 values
commit_sha
stringlengths
40
40
retrieved_at
stringdate
2026-01-04 15:31:58
2026-01-04 20:25:31
truncated
bool
2 classes
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/response/response.rs
actix-web/src/response/response.rs
use std::{ cell::{Ref, RefMut}, fmt, }; use actix_http::{ body::{BoxBody, EitherBody, MessageBody}, header::HeaderMap, Extensions, Response, ResponseHead, StatusCode, }; #[cfg(feature = "cookies")] use { actix_http::{ error::HttpError, header::{self, HeaderValue}, }, cookie::Cookie, }; use crate::{error::Error, HttpRequest, HttpResponseBuilder, Responder}; /// An outgoing response. pub struct HttpResponse<B = BoxBody> { res: Response<B>, error: Option<Error>, } impl HttpResponse<BoxBody> { /// Constructs a response. #[inline] pub fn new(status: StatusCode) -> Self { Self { res: Response::new(status), error: None, } } /// Constructs a response builder with specific HTTP status. #[inline] pub fn build(status: StatusCode) -> HttpResponseBuilder { HttpResponseBuilder::new(status) } /// Create an error response. #[inline] pub fn from_error(error: impl Into<Error>) -> Self { let error = error.into(); let mut response = error.as_response_error().error_response(); response.error = Some(error); response } } impl<B> HttpResponse<B> { /// Constructs a response with body #[inline] pub fn with_body(status: StatusCode, body: B) -> Self { Self { res: Response::with_body(status, body), error: None, } } /// Returns a reference to response head. #[inline] pub fn head(&self) -> &ResponseHead { self.res.head() } /// Returns a mutable reference to response head. #[inline] pub fn head_mut(&mut self) -> &mut ResponseHead { self.res.head_mut() } /// The source `error` for this response #[inline] pub fn error(&self) -> Option<&Error> { self.error.as_ref() } /// Get the response status code #[inline] pub fn status(&self) -> StatusCode { self.res.status() } /// Set the `StatusCode` for this response #[inline] pub fn status_mut(&mut self) -> &mut StatusCode { self.res.status_mut() } /// Get the headers from the response #[inline] pub fn headers(&self) -> &HeaderMap { self.res.headers() } /// Get a mutable reference to the headers #[inline] pub fn headers_mut(&mut self) -> &mut HeaderMap { self.res.headers_mut() } /// Get an iterator for the cookies set by this response. #[cfg(feature = "cookies")] pub fn cookies(&self) -> CookieIter<'_> { CookieIter { iter: self.headers().get_all(header::SET_COOKIE), } } /// Add a cookie to this response. /// /// # Errors /// Returns an error if the cookie results in a malformed `Set-Cookie` header. #[cfg(feature = "cookies")] pub fn add_cookie(&mut self, cookie: &Cookie<'_>) -> Result<(), HttpError> { HeaderValue::from_str(&cookie.to_string()) .map(|cookie| self.headers_mut().append(header::SET_COOKIE, cookie)) .map_err(Into::into) } /// Add a "removal" cookie to the response that matches attributes of given cookie. /// /// This will cause browsers/clients to remove stored cookies with this name. /// /// The `Set-Cookie` header added to the response will have: /// - name matching given cookie; /// - domain matching given cookie; /// - path matching given cookie; /// - an empty value; /// - a max-age of `0`; /// - an expiration date far in the past. /// /// If the cookie you're trying to remove has an explicit path or domain set, those attributes /// will need to be included in the cookie passed in here. /// /// # Errors /// Returns an error if the given name results in a malformed `Set-Cookie` header. #[cfg(feature = "cookies")] pub fn add_removal_cookie(&mut self, cookie: &Cookie<'_>) -> Result<(), HttpError> { let mut removal_cookie = cookie.to_owned(); removal_cookie.make_removal(); HeaderValue::from_str(&removal_cookie.to_string()) .map(|cookie| self.headers_mut().append(header::SET_COOKIE, cookie)) .map_err(Into::into) } /// Remove all cookies with the given name from this response. /// /// Returns the number of cookies removed. /// /// This method can _not_ cause a browser/client to delete any of its stored cookies. Its only /// purpose is to delete cookies that were added to this response using [`add_cookie`] /// and [`add_removal_cookie`]. Use [`add_removal_cookie`] to send a "removal" cookie. /// /// [`add_cookie`]: Self::add_cookie /// [`add_removal_cookie`]: Self::add_removal_cookie #[cfg(feature = "cookies")] pub fn del_cookie(&mut self, name: &str) -> usize { let headers = self.headers_mut(); let vals: Vec<HeaderValue> = headers .get_all(header::SET_COOKIE) .map(|v| v.to_owned()) .collect(); headers.remove(header::SET_COOKIE); let mut count: usize = 0; for v in vals { if let Ok(s) = v.to_str() { if let Ok(c) = Cookie::parse_encoded(s) { if c.name() == name { count += 1; continue; } } } // put set-cookie header head back if it does not validate headers.append(header::SET_COOKIE, v); } count } /// Connection upgrade status #[inline] pub fn upgrade(&self) -> bool { self.res.upgrade() } /// Keep-alive status for this connection pub fn keep_alive(&self) -> bool { self.res.keep_alive() } /// Returns reference to the response-local data/extensions container. #[inline] pub fn extensions(&self) -> Ref<'_, Extensions> { self.res.extensions() } /// Returns reference to the response-local data/extensions container. #[inline] pub fn extensions_mut(&mut self) -> RefMut<'_, Extensions> { self.res.extensions_mut() } /// Returns a reference to this response's body. #[inline] pub fn body(&self) -> &B { self.res.body() } /// Sets new body. pub fn set_body<B2>(self, body: B2) -> HttpResponse<B2> { HttpResponse { res: self.res.set_body(body), error: self.error, } } /// Returns split head and body. /// /// # Implementation Notes /// Due to internal performance optimizations, the first element of the returned tuple is an /// `HttpResponse` as well but only contains the head of the response this was called on. pub fn into_parts(self) -> (HttpResponse<()>, B) { let (head, body) = self.res.into_parts(); ( HttpResponse { res: head, error: self.error, }, body, ) } /// Drops body and returns new response. pub fn drop_body(self) -> HttpResponse<()> { HttpResponse { res: self.res.drop_body(), error: self.error, } } /// Map the current body type to another using a closure, returning a new response. /// /// Closure receives the response head and the current body type. pub fn map_body<F, B2>(self, f: F) -> HttpResponse<B2> where F: FnOnce(&mut ResponseHead, B) -> B2, { HttpResponse { res: self.res.map_body(f), error: self.error, } } /// Map the current body type `B` to `EitherBody::Left(B)`. /// /// Useful for middleware which can generate their own responses. #[inline] pub fn map_into_left_body<R>(self) -> HttpResponse<EitherBody<B, R>> { self.map_body(|_, body| EitherBody::left(body)) } /// Map the current body type `B` to `EitherBody::Right(B)`. /// /// Useful for middleware which can generate their own responses. #[inline] pub fn map_into_right_body<L>(self) -> HttpResponse<EitherBody<L, B>> { self.map_body(|_, body| EitherBody::right(body)) } /// Map the current body to a type-erased `BoxBody`. #[inline] pub fn map_into_boxed_body(self) -> HttpResponse<BoxBody> where B: MessageBody + 'static, { self.map_body(|_, body| body.boxed()) } /// Returns the response body, dropping all other parts. pub fn into_body(self) -> B { self.res.into_body() } } impl<B> fmt::Debug for HttpResponse<B> where B: MessageBody, { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { f.debug_struct("HttpResponse") .field("error", &self.error) .field("res", &self.res) .finish() } } impl<B> From<Response<B>> for HttpResponse<B> { fn from(res: Response<B>) -> Self { HttpResponse { res, error: None } } } impl From<Error> for HttpResponse { fn from(err: Error) -> Self { HttpResponse::from_error(err) } } impl<B> From<HttpResponse<B>> for Response<B> { fn from(res: HttpResponse<B>) -> Self { // this impl will always be called as part of dispatcher res.res } } // Rationale for cfg(test): this impl causes false positives on a clippy lint (async_yields_async) // when returning an HttpResponse from an async function/closure and it's not very useful outside of // tests anyway. #[cfg(test)] mod response_fut_impl { use std::{ future::Future, mem, pin::Pin, task::{Context, Poll}, }; use super::*; // Future is only implemented for BoxBody payload type because it's the most useful for making // simple handlers without async blocks. Making it generic over all MessageBody types requires a // future impl on Response which would cause its body field to be, undesirably, Option<B>. // // This impl is not particularly efficient due to the Response construction and should probably // not be invoked if performance is important. Prefer an async fn/block in such cases. impl Future for HttpResponse<BoxBody> { type Output = Result<Response<BoxBody>, Error>; fn poll(mut self: Pin<&mut Self>, _: &mut Context<'_>) -> Poll<Self::Output> { if let Some(err) = self.error.take() { return Poll::Ready(Err(err)); } Poll::Ready(Ok(mem::replace( &mut self.res, Response::new(StatusCode::default()), ))) } } } impl<B> Responder for HttpResponse<B> where B: MessageBody + 'static, { type Body = B; #[inline] fn respond_to(self, _: &HttpRequest) -> HttpResponse<Self::Body> { self } } #[cfg(feature = "cookies")] pub struct CookieIter<'a> { iter: std::slice::Iter<'a, HeaderValue>, } #[cfg(feature = "cookies")] impl<'a> Iterator for CookieIter<'a> { type Item = Cookie<'a>; #[inline] fn next(&mut self) -> Option<Cookie<'a>> { for v in self.iter.by_ref() { if let Ok(c) = Cookie::parse_encoded(v.to_str().ok()?) { return Some(c); } } None } } #[cfg(test)] mod tests { use static_assertions::assert_impl_all; use super::*; use crate::http::header::COOKIE; assert_impl_all!(HttpResponse: Responder); assert_impl_all!(HttpResponse<String>: Responder); assert_impl_all!(HttpResponse<&'static str>: Responder); assert_impl_all!(HttpResponse<crate::body::None>: Responder); #[test] fn test_debug() { let resp = HttpResponse::Ok() .append_header((COOKIE, HeaderValue::from_static("cookie1=value1; "))) .append_header((COOKIE, HeaderValue::from_static("cookie2=value2; "))) .finish(); let dbg = format!("{:?}", resp); assert!(dbg.contains("HttpResponse")); } } #[cfg(test)] #[cfg(feature = "cookies")] mod cookie_tests { use super::*; #[test] fn removal_cookies() { let mut res = HttpResponse::Ok().finish(); let cookie = Cookie::new("foo", ""); res.add_removal_cookie(&cookie).unwrap(); let set_cookie_hdr = res.headers().get(header::SET_COOKIE).unwrap(); assert_eq!( &set_cookie_hdr.as_bytes()[..25], &b"foo=; Max-Age=0; Expires="[..], "unexpected set-cookie value: {:?}", set_cookie_hdr.to_str() ); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/response/responder.rs
actix-web/src/response/responder.rs
use std::borrow::Cow; use actix_http::{ body::{BoxBody, EitherBody, MessageBody}, header::TryIntoHeaderPair, StatusCode, }; use bytes::{Bytes, BytesMut}; use super::CustomizeResponder; use crate::{Error, HttpRequest, HttpResponse}; /// Trait implemented by types that can be converted to an HTTP response. /// /// Any types that implement this trait can be used in the return type of a handler. Since handlers /// will only have one return type, it is idiomatic to use opaque return types `-> impl Responder`. /// /// # Implementations /// It is often not required to implement `Responder` for your own types due to a broad base of /// built-in implementations: /// - `HttpResponse` and `HttpResponseBuilder` /// - `Option<R>` where `R: Responder` /// - `Result<R, E>` where `R: Responder` and [`E: ResponseError`](crate::ResponseError) /// - `(R, StatusCode)` where `R: Responder` /// - `&'static str`, `String`, `&'_ String`, `Cow<'_, str>`, [`ByteString`](bytestring::ByteString) /// - `&'static [u8]`, `Vec<u8>`, `Bytes`, `BytesMut` /// - [`Json<T>`](crate::web::Json) and [`Form<T>`](crate::web::Form) where `T: Serialize` /// - [`Either<L, R>`](crate::web::Either) where `L: Serialize` and `R: Serialize` /// - [`CustomizeResponder<R>`] /// - [`actix_files::NamedFile`](https://docs.rs/actix-files/latest/actix_files/struct.NamedFile.html) /// - [Experimental responders from `actix-web-lab`](https://docs.rs/actix-web-lab/latest/actix_web_lab/respond/index.html) /// - Third party integrations may also have implemented `Responder` where appropriate. For example, /// HTML templating engines. /// /// # Customizing Responder Output /// Calling [`.customize()`](Responder::customize) on any responder type will wrap it in a /// [`CustomizeResponder`] capable of overriding various parts of the response such as the status /// code and header map. pub trait Responder { type Body: MessageBody + 'static; /// Convert self to `HttpResponse`. fn respond_to(self, req: &HttpRequest) -> HttpResponse<Self::Body>; /// Wraps responder to allow alteration of its response. /// /// See [`CustomizeResponder`] docs for more details on its capabilities. /// /// # Examples /// ``` /// use actix_web::{Responder, http::StatusCode, test::TestRequest}; /// /// let responder = "Hello world!" /// .customize() /// .with_status(StatusCode::BAD_REQUEST) /// .insert_header(("x-hello", "world")); /// /// let request = TestRequest::default().to_http_request(); /// let response = responder.respond_to(&request); /// assert_eq!(response.status(), StatusCode::BAD_REQUEST); /// assert_eq!(response.headers().get("x-hello").unwrap(), "world"); /// ``` #[inline] fn customize(self) -> CustomizeResponder<Self> where Self: Sized, { CustomizeResponder::new(self) } #[doc(hidden)] #[deprecated(since = "4.0.0", note = "Prefer `.customize().with_status(header)`.")] fn with_status(self, status: StatusCode) -> CustomizeResponder<Self> where Self: Sized, { self.customize().with_status(status) } #[doc(hidden)] #[deprecated(since = "4.0.0", note = "Prefer `.customize().insert_header(header)`.")] fn with_header(self, header: impl TryIntoHeaderPair) -> CustomizeResponder<Self> where Self: Sized, { self.customize().insert_header(header) } } impl Responder for actix_http::Response<BoxBody> { type Body = BoxBody; #[inline] fn respond_to(self, _: &HttpRequest) -> HttpResponse<Self::Body> { HttpResponse::from(self) } } impl Responder for actix_http::ResponseBuilder { type Body = BoxBody; #[inline] fn respond_to(mut self, req: &HttpRequest) -> HttpResponse<Self::Body> { self.finish().map_into_boxed_body().respond_to(req) } } impl<R: Responder> Responder for Option<R> { type Body = EitherBody<R::Body>; fn respond_to(self, req: &HttpRequest) -> HttpResponse<Self::Body> { match self { Some(val) => val.respond_to(req).map_into_left_body(), None => HttpResponse::new(StatusCode::NOT_FOUND).map_into_right_body(), } } } impl<R, E> Responder for Result<R, E> where R: Responder, E: Into<Error>, { type Body = EitherBody<R::Body>; fn respond_to(self, req: &HttpRequest) -> HttpResponse<Self::Body> { match self { Ok(val) => val.respond_to(req).map_into_left_body(), Err(err) => HttpResponse::from_error(err.into()).map_into_right_body(), } } } // Note: see https://github.com/actix/actix-web/issues/1108 for reasoning why Responder is not // implemented for `()`, and https://github.com/actix/actix-web/pull/3560 for discussion about this // impl and the decision not to include a similar one for `Option<()>`. impl<E> Responder for Result<(), E> where E: Into<Error>, { type Body = BoxBody; fn respond_to(self, _req: &HttpRequest) -> HttpResponse { match self { Ok(()) => HttpResponse::new(StatusCode::NO_CONTENT), Err(err) => HttpResponse::from_error(err.into()), } } } impl<R: Responder> Responder for (R, StatusCode) { type Body = R::Body; fn respond_to(self, req: &HttpRequest) -> HttpResponse<Self::Body> { let mut res = self.0.respond_to(req); *res.status_mut() = self.1; res } } macro_rules! impl_responder_by_forward_into_base_response { ($res:ty, $body:ty) => { impl Responder for $res { type Body = $body; fn respond_to(self, _: &HttpRequest) -> HttpResponse<Self::Body> { let res: actix_http::Response<_> = self.into(); res.into() } } }; ($res:ty) => { impl_responder_by_forward_into_base_response!($res, $res); }; } impl_responder_by_forward_into_base_response!(&'static [u8]); impl_responder_by_forward_into_base_response!(Vec<u8>); impl_responder_by_forward_into_base_response!(Bytes); impl_responder_by_forward_into_base_response!(BytesMut); impl_responder_by_forward_into_base_response!(&'static str); impl_responder_by_forward_into_base_response!(String); impl_responder_by_forward_into_base_response!(bytestring::ByteString); macro_rules! impl_into_string_responder { ($res:ty) => { impl Responder for $res { type Body = String; fn respond_to(self, _: &HttpRequest) -> HttpResponse<Self::Body> { let string: String = self.into(); let res: actix_http::Response<_> = string.into(); res.into() } } }; } impl_into_string_responder!(&'_ String); impl_into_string_responder!(Cow<'_, str>); #[cfg(test)] pub(crate) mod tests { use actix_http::body::to_bytes; use actix_service::Service; use super::*; use crate::{ error, http::header::{HeaderValue, CONTENT_TYPE}, test::{assert_body_eq, init_service, TestRequest}, web, App, }; #[actix_rt::test] async fn test_option_responder() { let srv = init_service( App::new() .service(web::resource("/none").to(|| async { Option::<&'static str>::None })) .service(web::resource("/some").to(|| async { Some("some") })), ) .await; let req = TestRequest::with_uri("/none").to_request(); let resp = srv.call(req).await.unwrap(); assert_eq!(resp.status(), StatusCode::NOT_FOUND); let req = TestRequest::with_uri("/some").to_request(); let resp = srv.call(req).await.unwrap(); assert_eq!(resp.status(), StatusCode::OK); assert_body_eq!(resp, b"some"); } #[actix_rt::test] async fn test_responder() { let req = TestRequest::default().to_http_request(); let res = "test".respond_to(&req); assert_eq!(res.status(), StatusCode::OK); assert_eq!( res.headers().get(CONTENT_TYPE).unwrap(), HeaderValue::from_static("text/plain; charset=utf-8") ); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); let res = b"test".respond_to(&req); assert_eq!(res.status(), StatusCode::OK); assert_eq!( res.headers().get(CONTENT_TYPE).unwrap(), HeaderValue::from_static("application/octet-stream") ); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); let res = "test".to_string().respond_to(&req); assert_eq!(res.status(), StatusCode::OK); assert_eq!( res.headers().get(CONTENT_TYPE).unwrap(), HeaderValue::from_static("text/plain; charset=utf-8") ); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); let res = (&"test".to_string()).respond_to(&req); assert_eq!(res.status(), StatusCode::OK); assert_eq!( res.headers().get(CONTENT_TYPE).unwrap(), HeaderValue::from_static("text/plain; charset=utf-8") ); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); let s = String::from("test"); let res = Cow::Borrowed(s.as_str()).respond_to(&req); assert_eq!(res.status(), StatusCode::OK); assert_eq!( res.headers().get(CONTENT_TYPE).unwrap(), HeaderValue::from_static("text/plain; charset=utf-8") ); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); let res = Cow::<'_, str>::Owned(s).respond_to(&req); assert_eq!(res.status(), StatusCode::OK); assert_eq!( res.headers().get(CONTENT_TYPE).unwrap(), HeaderValue::from_static("text/plain; charset=utf-8") ); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); let res = Cow::Borrowed("test").respond_to(&req); assert_eq!(res.status(), StatusCode::OK); assert_eq!( res.headers().get(CONTENT_TYPE).unwrap(), HeaderValue::from_static("text/plain; charset=utf-8") ); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); let res = Bytes::from_static(b"test").respond_to(&req); assert_eq!(res.status(), StatusCode::OK); assert_eq!( res.headers().get(CONTENT_TYPE).unwrap(), HeaderValue::from_static("application/octet-stream") ); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); let res = BytesMut::from(b"test".as_ref()).respond_to(&req); assert_eq!(res.status(), StatusCode::OK); assert_eq!( res.headers().get(CONTENT_TYPE).unwrap(), HeaderValue::from_static("application/octet-stream") ); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); // InternalError let res = error::InternalError::new("err", StatusCode::BAD_REQUEST).respond_to(&req); assert_eq!(res.status(), StatusCode::BAD_REQUEST); } #[actix_rt::test] async fn test_result_responder() { let req = TestRequest::default().to_http_request(); // Result<I, E> let resp = Ok::<_, Error>("test".to_string()).respond_to(&req); assert_eq!(resp.status(), StatusCode::OK); assert_eq!( resp.headers().get(CONTENT_TYPE).unwrap(), HeaderValue::from_static("text/plain; charset=utf-8") ); assert_eq!( to_bytes(resp.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); let res = Err::<String, _>(error::InternalError::new("err", StatusCode::BAD_REQUEST)) .respond_to(&req); assert_eq!(res.status(), StatusCode::BAD_REQUEST); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/response/mod.rs
actix-web/src/response/mod.rs
mod builder; mod customize_responder; mod http_codes; mod responder; #[allow(clippy::module_inception)] mod response; pub use self::{ builder::HttpResponseBuilder, customize_responder::CustomizeResponder, responder::Responder, response::HttpResponse, };
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/response/customize_responder.rs
actix-web/src/response/customize_responder.rs
use actix_http::{ body::EitherBody, error::HttpError, header::{HeaderMap, TryIntoHeaderPair}, StatusCode, }; use crate::{HttpRequest, HttpResponse, Responder}; /// Allows overriding status code and headers (including cookies) for a [`Responder`]. /// /// Created by calling the [`customize`](Responder::customize) method on a [`Responder`] type. pub struct CustomizeResponder<R> { inner: CustomizeResponderInner<R>, error: Option<HttpError>, } struct CustomizeResponderInner<R> { responder: R, status: Option<StatusCode>, override_headers: HeaderMap, append_headers: HeaderMap, } impl<R: Responder> CustomizeResponder<R> { pub(crate) fn new(responder: R) -> Self { CustomizeResponder { inner: CustomizeResponderInner { responder, status: None, override_headers: HeaderMap::new(), append_headers: HeaderMap::new(), }, error: None, } } /// Override a status code for the Responder's response. /// /// # Examples /// ``` /// use actix_web::{Responder, http::StatusCode, test::TestRequest}; /// /// let responder = "Welcome!".customize().with_status(StatusCode::ACCEPTED); /// /// let request = TestRequest::default().to_http_request(); /// let response = responder.respond_to(&request); /// assert_eq!(response.status(), StatusCode::ACCEPTED); /// ``` pub fn with_status(mut self, status: StatusCode) -> Self { if let Some(inner) = self.inner() { inner.status = Some(status); } self } /// Insert (override) header in the final response. /// /// Overrides other headers with the same name. /// See [`HeaderMap::insert`](crate::http::header::HeaderMap::insert). /// /// Headers added with this method will be inserted before those added /// with [`append_header`](Self::append_header). As such, header(s) can be overridden with more /// than one new header by first calling `insert_header` followed by `append_header`. /// /// # Examples /// ``` /// use actix_web::{Responder, test::TestRequest}; /// /// let responder = "Hello world!" /// .customize() /// .insert_header(("x-version", "1.2.3")); /// /// let request = TestRequest::default().to_http_request(); /// let response = responder.respond_to(&request); /// assert_eq!(response.headers().get("x-version").unwrap(), "1.2.3"); /// ``` pub fn insert_header(mut self, header: impl TryIntoHeaderPair) -> Self { if let Some(inner) = self.inner() { match header.try_into_pair() { Ok((key, value)) => { inner.override_headers.insert(key, value); } Err(err) => self.error = Some(err.into()), }; } self } /// Append header to the final response. /// /// Unlike [`insert_header`](Self::insert_header), this will not override existing headers. /// See [`HeaderMap::append`](crate::http::header::HeaderMap::append). /// /// Headers added here are appended _after_ additions/overrides from `insert_header`. /// /// # Examples /// ``` /// use actix_web::{Responder, test::TestRequest}; /// /// let responder = "Hello world!" /// .customize() /// .append_header(("x-version", "1.2.3")); /// /// let request = TestRequest::default().to_http_request(); /// let response = responder.respond_to(&request); /// assert_eq!(response.headers().get("x-version").unwrap(), "1.2.3"); /// ``` pub fn append_header(mut self, header: impl TryIntoHeaderPair) -> Self { if let Some(inner) = self.inner() { match header.try_into_pair() { Ok((key, value)) => { inner.append_headers.append(key, value); } Err(err) => self.error = Some(err.into()), }; } self } #[doc(hidden)] #[deprecated(since = "4.0.0", note = "Renamed to `insert_header`.")] pub fn with_header(self, header: impl TryIntoHeaderPair) -> Self where Self: Sized, { self.insert_header(header) } fn inner(&mut self) -> Option<&mut CustomizeResponderInner<R>> { if self.error.is_some() { None } else { Some(&mut self.inner) } } /// Appends a `cookie` to the final response. /// /// # Errors /// /// Final response will be an error if `cookie` cannot be converted into a valid header value. #[cfg(feature = "cookies")] pub fn add_cookie(mut self, cookie: &crate::cookie::Cookie<'_>) -> Self { use actix_http::header::{TryIntoHeaderValue as _, SET_COOKIE}; if let Some(inner) = self.inner() { match cookie.to_string().try_into_value() { Ok(val) => { inner.append_headers.append(SET_COOKIE, val); } Err(err) => { self.error = Some(err.into()); } } } self } } impl<T> Responder for CustomizeResponder<T> where T: Responder, { type Body = EitherBody<T::Body>; fn respond_to(self, req: &HttpRequest) -> HttpResponse<Self::Body> { if let Some(err) = self.error { return HttpResponse::from_error(err).map_into_right_body(); } let mut res = self.inner.responder.respond_to(req); if let Some(status) = self.inner.status { *res.status_mut() = status; } for (k, v) in self.inner.override_headers { res.headers_mut().insert(k, v); } for (k, v) in self.inner.append_headers { res.headers_mut().append(k, v); } res.map_into_left_body() } } #[cfg(test)] mod tests { use actix_http::body::to_bytes; use bytes::Bytes; use super::*; use crate::{ cookie::Cookie, http::header::{HeaderValue, CONTENT_TYPE}, test::TestRequest, }; #[actix_rt::test] async fn customize_responder() { let req = TestRequest::default().to_http_request(); let res = "test" .to_string() .customize() .with_status(StatusCode::BAD_REQUEST) .respond_to(&req); assert_eq!(res.status(), StatusCode::BAD_REQUEST); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); let res = "test" .to_string() .customize() .insert_header(("content-type", "json")) .respond_to(&req); assert_eq!(res.status(), StatusCode::OK); assert_eq!( res.headers().get(CONTENT_TYPE).unwrap(), HeaderValue::from_static("json") ); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); let res = "test" .to_string() .customize() .add_cookie(&Cookie::new("name", "value")) .respond_to(&req); assert!(res.status().is_success()); assert_eq!( res.cookies().collect::<Vec<Cookie<'_>>>(), vec![Cookie::new("name", "value")], ); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); } #[actix_rt::test] async fn tuple_responder_with_status_code() { let req = TestRequest::default().to_http_request(); let res = ("test".to_string(), StatusCode::BAD_REQUEST).respond_to(&req); assert_eq!(res.status(), StatusCode::BAD_REQUEST); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); let req = TestRequest::default().to_http_request(); let res = ("test".to_string(), StatusCode::OK) .customize() .insert_header((CONTENT_TYPE, mime::APPLICATION_JSON)) .respond_to(&req); assert_eq!(res.status(), StatusCode::OK); assert_eq!( res.headers().get(CONTENT_TYPE).unwrap(), HeaderValue::from_static("application/json") ); assert_eq!( to_bytes(res.into_body()).await.unwrap(), Bytes::from_static(b"test"), ); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/response/http_codes.rs
actix-web/src/response/http_codes.rs
//! Status code based HTTP response builders. use actix_http::StatusCode; use crate::{HttpResponse, HttpResponseBuilder}; macro_rules! static_resp { ($name:ident, $status:expr) => { #[allow(non_snake_case)] #[doc = concat!("Creates a new response builder with the status code `", stringify!($status), "`.")] pub fn $name() -> HttpResponseBuilder { HttpResponseBuilder::new($status) } }; } impl HttpResponse { static_resp!(Continue, StatusCode::CONTINUE); static_resp!(SwitchingProtocols, StatusCode::SWITCHING_PROTOCOLS); static_resp!(Processing, StatusCode::PROCESSING); static_resp!(Ok, StatusCode::OK); static_resp!(Created, StatusCode::CREATED); static_resp!(Accepted, StatusCode::ACCEPTED); static_resp!( NonAuthoritativeInformation, StatusCode::NON_AUTHORITATIVE_INFORMATION ); static_resp!(NoContent, StatusCode::NO_CONTENT); static_resp!(ResetContent, StatusCode::RESET_CONTENT); static_resp!(PartialContent, StatusCode::PARTIAL_CONTENT); static_resp!(MultiStatus, StatusCode::MULTI_STATUS); static_resp!(AlreadyReported, StatusCode::ALREADY_REPORTED); static_resp!(ImUsed, StatusCode::IM_USED); static_resp!(MultipleChoices, StatusCode::MULTIPLE_CHOICES); static_resp!(MovedPermanently, StatusCode::MOVED_PERMANENTLY); static_resp!(Found, StatusCode::FOUND); static_resp!(SeeOther, StatusCode::SEE_OTHER); static_resp!(NotModified, StatusCode::NOT_MODIFIED); static_resp!(UseProxy, StatusCode::USE_PROXY); static_resp!(TemporaryRedirect, StatusCode::TEMPORARY_REDIRECT); static_resp!(PermanentRedirect, StatusCode::PERMANENT_REDIRECT); static_resp!(BadRequest, StatusCode::BAD_REQUEST); static_resp!(Unauthorized, StatusCode::UNAUTHORIZED); static_resp!(PaymentRequired, StatusCode::PAYMENT_REQUIRED); static_resp!(Forbidden, StatusCode::FORBIDDEN); static_resp!(NotFound, StatusCode::NOT_FOUND); static_resp!(MethodNotAllowed, StatusCode::METHOD_NOT_ALLOWED); static_resp!(NotAcceptable, StatusCode::NOT_ACCEPTABLE); static_resp!( ProxyAuthenticationRequired, StatusCode::PROXY_AUTHENTICATION_REQUIRED ); static_resp!(RequestTimeout, StatusCode::REQUEST_TIMEOUT); static_resp!(Conflict, StatusCode::CONFLICT); static_resp!(Gone, StatusCode::GONE); static_resp!(LengthRequired, StatusCode::LENGTH_REQUIRED); static_resp!(PreconditionFailed, StatusCode::PRECONDITION_FAILED); static_resp!(PayloadTooLarge, StatusCode::PAYLOAD_TOO_LARGE); static_resp!(UriTooLong, StatusCode::URI_TOO_LONG); static_resp!(UnsupportedMediaType, StatusCode::UNSUPPORTED_MEDIA_TYPE); static_resp!(RangeNotSatisfiable, StatusCode::RANGE_NOT_SATISFIABLE); static_resp!(ExpectationFailed, StatusCode::EXPECTATION_FAILED); static_resp!(ImATeapot, StatusCode::IM_A_TEAPOT); static_resp!(MisdirectedRequest, StatusCode::MISDIRECTED_REQUEST); static_resp!(UnprocessableEntity, StatusCode::UNPROCESSABLE_ENTITY); static_resp!(Locked, StatusCode::LOCKED); static_resp!(FailedDependency, StatusCode::FAILED_DEPENDENCY); static_resp!(UpgradeRequired, StatusCode::UPGRADE_REQUIRED); static_resp!(PreconditionRequired, StatusCode::PRECONDITION_REQUIRED); static_resp!(TooManyRequests, StatusCode::TOO_MANY_REQUESTS); static_resp!( RequestHeaderFieldsTooLarge, StatusCode::REQUEST_HEADER_FIELDS_TOO_LARGE ); static_resp!( UnavailableForLegalReasons, StatusCode::UNAVAILABLE_FOR_LEGAL_REASONS ); static_resp!(InternalServerError, StatusCode::INTERNAL_SERVER_ERROR); static_resp!(NotImplemented, StatusCode::NOT_IMPLEMENTED); static_resp!(BadGateway, StatusCode::BAD_GATEWAY); static_resp!(ServiceUnavailable, StatusCode::SERVICE_UNAVAILABLE); static_resp!(GatewayTimeout, StatusCode::GATEWAY_TIMEOUT); static_resp!(VersionNotSupported, StatusCode::HTTP_VERSION_NOT_SUPPORTED); static_resp!(VariantAlsoNegotiates, StatusCode::VARIANT_ALSO_NEGOTIATES); static_resp!(InsufficientStorage, StatusCode::INSUFFICIENT_STORAGE); static_resp!(LoopDetected, StatusCode::LOOP_DETECTED); static_resp!(NotExtended, StatusCode::NOT_EXTENDED); static_resp!( NetworkAuthenticationRequired, StatusCode::NETWORK_AUTHENTICATION_REQUIRED ); } #[cfg(test)] mod tests { use crate::{http::StatusCode, HttpResponse}; #[test] fn test_build() { let resp = HttpResponse::Ok().finish(); assert_eq!(resp.status(), StatusCode::OK); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/mod.rs
actix-web/src/http/mod.rs
//! Various HTTP related types. pub mod header; pub use actix_http::{uri, ConnectionType, Error, KeepAlive, Method, StatusCode, Uri, Version};
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/if_range.rs
actix-web/src/http/header/if_range.rs
use std::fmt::{self, Display, Write}; use super::{ from_one_raw_str, EntityTag, Header, HeaderName, HeaderValue, HttpDate, InvalidHeaderValue, TryIntoHeaderValue, Writer, }; use crate::{error::ParseError, http::header, HttpMessage}; /// `If-Range` header, defined /// in [RFC 7233 §3.2](https://datatracker.ietf.org/doc/html/rfc7233#section-3.2) /// /// If a client has a partial copy of a representation and wishes to have /// an up-to-date copy of the entire representation, it could use the /// Range header field with a conditional GET (using either or both of /// If-Unmodified-Since and If-Match.) However, if the precondition /// fails because the representation has been modified, the client would /// then have to make a second request to obtain the entire current /// representation. /// /// The `If-Range` header field allows a client to \"short-circuit\" the /// second request. Informally, its meaning is as follows: if the /// representation is unchanged, send me the part(s) that I am requesting /// in Range; otherwise, send me the entire representation. /// /// # ABNF /// ```plain /// If-Range = entity-tag / HTTP-date /// ``` /// /// # Example Values /// /// * `Sat, 29 Oct 1994 19:43:31 GMT` /// * `\"xyzzy\"` /// /// # Examples /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{EntityTag, IfRange}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// IfRange::EntityTag( /// EntityTag::new(false, "abc".to_owned()) /// ) /// ); /// ``` /// /// ``` /// use std::time::{Duration, SystemTime}; /// use actix_web::{http::header::IfRange, HttpResponse}; /// /// let mut builder = HttpResponse::Ok(); /// let fetched = SystemTime::now() - Duration::from_secs(60 * 60 * 24); /// builder.insert_header( /// IfRange::Date(fetched.into()) /// ); /// ``` #[derive(Clone, Debug, PartialEq, Eq)] pub enum IfRange { /// The entity-tag the client has of the resource. EntityTag(EntityTag), /// The date when the client retrieved the resource. Date(HttpDate), } impl Header for IfRange { fn name() -> HeaderName { header::IF_RANGE } #[inline] fn parse<T>(msg: &T) -> Result<Self, ParseError> where T: HttpMessage, { let etag: Result<EntityTag, _> = from_one_raw_str(msg.headers().get(&header::IF_RANGE)); if let Ok(etag) = etag { return Ok(IfRange::EntityTag(etag)); } let date: Result<HttpDate, _> = from_one_raw_str(msg.headers().get(&header::IF_RANGE)); if let Ok(date) = date { return Ok(IfRange::Date(date)); } Err(ParseError::Header) } } impl Display for IfRange { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { match *self { IfRange::EntityTag(ref x) => Display::fmt(x, f), IfRange::Date(ref x) => Display::fmt(x, f), } } } impl TryIntoHeaderValue for IfRange { type Error = InvalidHeaderValue; fn try_into_value(self) -> Result<HeaderValue, Self::Error> { let mut writer = Writer::new(); let _ = write!(&mut writer, "{}", self); HeaderValue::from_maybe_shared(writer.take()) } } #[cfg(test)] mod test_parse_and_format { use std::str; use super::IfRange as HeaderField; use crate::http::header::*; crate::http::header::common_header_test!(test1, [b"Sat, 29 Oct 1994 19:43:31 GMT"]); crate::http::header::common_header_test!(test2, [b"\"abc\""]); crate::http::header::common_header_test!(test3, [b"this-is-invalid"], None::<IfRange>); }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/content_language.rs
actix-web/src/http/header/content_language.rs
use language_tags::LanguageTag; use super::{common_header, QualityItem, CONTENT_LANGUAGE}; common_header! { /// `Content-Language` header, defined /// in [RFC 7231 §3.1.3.2](https://datatracker.ietf.org/doc/html/rfc7231#section-3.1.3.2) /// /// The `Content-Language` header field describes the natural language(s) /// of the intended audience for the representation. Note that this /// might not be equivalent to all the languages used within the /// representation. /// /// # ABNF /// ```plain /// Content-Language = 1#language-tag /// ``` /// /// # Example Values /// * `da` /// * `mi, en` /// /// # Examples /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{ContentLanguage, LanguageTag, QualityItem}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// ContentLanguage(vec![ /// QualityItem::max(LanguageTag::parse("en").unwrap()), /// ]) /// ); /// ``` /// /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{ContentLanguage, LanguageTag, QualityItem}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// ContentLanguage(vec![ /// QualityItem::max(LanguageTag::parse("da").unwrap()), /// QualityItem::max(LanguageTag::parse("en-GB").unwrap()), /// ]) /// ); /// ``` (ContentLanguage, CONTENT_LANGUAGE) => (QualityItem<LanguageTag>)+ test_parse_and_format { crate::http::header::common_header_test!(test1, [b"da"]); crate::http::header::common_header_test!(test2, [b"mi, en"]); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/date.rs
actix-web/src/http/header/date.rs
use std::time::SystemTime; use super::{HttpDate, DATE}; crate::http::header::common_header! { /// `Date` header, defined /// in [RFC 7231 §7.1.1.2](https://datatracker.ietf.org/doc/html/rfc7231#section-7.1.1.2) /// /// The `Date` header field represents the date and time at which the /// message was originated. /// /// # ABNF /// ```plain /// Date = HTTP-date /// ``` /// /// # Example Values /// * `Tue, 15 Nov 1994 08:12:31 GMT` /// /// # Examples /// /// ``` /// use std::time::SystemTime; /// use actix_web::HttpResponse; /// use actix_web::http::header::Date; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// Date(SystemTime::now().into()) /// ); /// ``` (Date, DATE) => [HttpDate] test_parse_and_format { crate::http::header::common_header_test!(test1, [b"Tue, 15 Nov 1994 08:12:31 GMT"]); } } impl Date { /// Create a date instance set to the current system time pub fn now() -> Date { Date(SystemTime::now().into()) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/range.rs
actix-web/src/http/header/range.rs
use std::{ cmp, fmt::{self, Display, Write}, str::FromStr, }; use actix_http::{error::ParseError, header, HttpMessage}; use super::{Header, HeaderName, HeaderValue, InvalidHeaderValue, TryIntoHeaderValue, Writer}; /// `Range` header, defined /// in [RFC 7233 §3.1](https://datatracker.ietf.org/doc/html/rfc7233#section-3.1) /// /// The "Range" header field on a GET request modifies the method semantics to request transfer of /// only one or more sub-ranges of the selected representation data, rather than the entire selected /// representation data. /// /// # ABNF /// ```plain /// Range = byte-ranges-specifier / other-ranges-specifier /// other-ranges-specifier = other-range-unit "=" other-range-set /// other-range-set = 1*VCHAR /// /// bytes-unit = "bytes" /// /// byte-ranges-specifier = bytes-unit "=" byte-range-set /// byte-range-set = 1#(byte-range-spec / suffix-byte-range-spec) /// byte-range-spec = first-byte-pos "-" [last-byte-pos] /// suffix-byte-range-spec = "-" suffix-length /// suffix-length = 1*DIGIT /// first-byte-pos = 1*DIGIT /// last-byte-pos = 1*DIGIT /// ``` /// /// # Example Values /// * `bytes=1000-` /// * `bytes=-50` /// * `bytes=0-1,30-40` /// * `bytes=0-10,20-90,-100` /// * `custom_unit=0-123` /// * `custom_unit=xxx-yyy` /// /// # Examples /// ``` /// use actix_web::http::header::{Range, ByteRangeSpec}; /// use actix_web::HttpResponse; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header(Range::Bytes( /// vec![ByteRangeSpec::FromTo(1, 100), ByteRangeSpec::From(200)] /// )); /// builder.insert_header(Range::Unregistered("letters".to_owned(), "a-f".to_owned())); /// builder.insert_header(Range::bytes(1, 100)); /// builder.insert_header(Range::bytes_multi(vec![(1, 100), (200, 300)])); /// ``` #[derive(Debug, Clone, PartialEq, Eq)] pub enum Range { /// Byte range. Bytes(Vec<ByteRangeSpec>), /// Custom range, with unit not registered at IANA. /// /// (`other-range-unit`: String , `other-range-set`: String) Unregistered(String, String), } /// A range of bytes to fetch. /// /// Each [`Range::Bytes`] header can contain one or more `ByteRangeSpec`s. #[derive(Debug, Clone, PartialEq, Eq)] pub enum ByteRangeSpec { /// All bytes from `x` to `y`, inclusive. /// /// Serialized as `x-y`. /// /// Example: `bytes=500-999` would represent the second 500 bytes. FromTo(u64, u64), /// All bytes starting from `x`, inclusive. /// /// Serialized as `x-`. /// /// Example: For a file of 1000 bytes, `bytes=950-` would represent bytes 950-999, inclusive. From(u64), /// The last `y` bytes, inclusive. /// /// Using the spec terminology, this is `suffix-byte-range-spec`. Serialized as `-y`. /// /// Example: For a file of 1000 bytes, `bytes=-50` is equivalent to `bytes=950-`. Last(u64), } impl ByteRangeSpec { /// Given the full length of the entity, attempt to normalize the byte range into an satisfiable /// end-inclusive `(from, to)` range. /// /// The resulting range is guaranteed to be a satisfiable range within the bounds /// of `0 <= from <= to < full_length`. /// /// If the byte range is deemed unsatisfiable, `None` is returned. An unsatisfiable range is /// generally cause for a server to either reject the client request with a /// `416 Range Not Satisfiable` status code, or to simply ignore the range header and serve the /// full entity using a `200 OK` status code. /// /// This function closely follows [RFC 7233 §2.1]. As such, it considers ranges to be /// satisfiable if they meet the following conditions: /// /// > If a valid byte-range-set includes at least one byte-range-spec with a first-byte-pos that /// > is less than the current length of the representation, or at least one /// > suffix-byte-range-spec with a non-zero suffix-length, then the byte-range-set is /// > satisfiable. Otherwise, the byte-range-set is unsatisfiable. /// /// The function also computes remainder ranges based on the RFC: /// /// > If the last-byte-pos value is absent, or if the value is greater than or equal to the /// > current length of the representation data, the byte range is interpreted as the remainder /// > of the representation (i.e., the server replaces the value of last-byte-pos with a value /// > that is one less than the current length of the selected representation). /// /// [RFC 7233 §2.1]: https://datatracker.ietf.org/doc/html/rfc7233 pub fn to_satisfiable_range(&self, full_length: u64) -> Option<(u64, u64)> { // If the full length is zero, there is no satisfiable end-inclusive range. if full_length == 0 { return None; } match *self { ByteRangeSpec::FromTo(from, to) => { if from < full_length && from <= to { Some((from, cmp::min(to, full_length - 1))) } else { None } } ByteRangeSpec::From(from) => { if from < full_length { Some((from, full_length - 1)) } else { None } } ByteRangeSpec::Last(last) => { if last > 0 { // From the RFC: If the selected representation is shorter than the specified // suffix-length, the entire representation is used. if last > full_length { Some((0, full_length - 1)) } else { Some((full_length - last, full_length - 1)) } } else { None } } } } } impl Range { /// Constructs a common byte range header. /// /// Eg: `bytes=from-to` pub fn bytes(from: u64, to: u64) -> Range { Range::Bytes(vec![ByteRangeSpec::FromTo(from, to)]) } /// Constructs a byte range header with multiple subranges. /// /// Eg: `bytes=from1-to1,from2-to2,fromX-toX` pub fn bytes_multi(ranges: Vec<(u64, u64)>) -> Range { Range::Bytes( ranges .into_iter() .map(|(from, to)| ByteRangeSpec::FromTo(from, to)) .collect(), ) } } impl fmt::Display for ByteRangeSpec { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { match *self { ByteRangeSpec::FromTo(from, to) => write!(f, "{}-{}", from, to), ByteRangeSpec::Last(pos) => write!(f, "-{}", pos), ByteRangeSpec::From(pos) => write!(f, "{}-", pos), } } } impl fmt::Display for Range { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { match self { Range::Bytes(ranges) => { write!(f, "bytes=")?; for (i, range) in ranges.iter().enumerate() { if i != 0 { f.write_str(",")?; } Display::fmt(range, f)?; } Ok(()) } Range::Unregistered(unit, range_str) => { write!(f, "{}={}", unit, range_str) } } } } impl FromStr for Range { type Err = ParseError; fn from_str(s: &str) -> Result<Range, ParseError> { let (unit, val) = s.split_once('=').ok_or(ParseError::Header)?; match (unit, val) { ("bytes", ranges) => { let ranges = from_comma_delimited(ranges); if ranges.is_empty() { return Err(ParseError::Header); } Ok(Range::Bytes(ranges)) } (_, "") => Err(ParseError::Header), ("", _) => Err(ParseError::Header), (unit, range_str) => Ok(Range::Unregistered(unit.to_owned(), range_str.to_owned())), } } } impl FromStr for ByteRangeSpec { type Err = ParseError; fn from_str(s: &str) -> Result<ByteRangeSpec, ParseError> { let (start, end) = s.split_once('-').ok_or(ParseError::Header)?; match (start, end) { ("", end) => end .parse() .or(Err(ParseError::Header)) .map(ByteRangeSpec::Last), (start, "") => start .parse() .or(Err(ParseError::Header)) .map(ByteRangeSpec::From), (start, end) => match (start.parse(), end.parse()) { (Ok(start), Ok(end)) if start <= end => Ok(ByteRangeSpec::FromTo(start, end)), _ => Err(ParseError::Header), }, } } } impl Header for Range { fn name() -> HeaderName { header::RANGE } #[inline] fn parse<T: HttpMessage>(msg: &T) -> Result<Self, ParseError> { header::from_one_raw_str(msg.headers().get(Self::name())) } } impl TryIntoHeaderValue for Range { type Error = InvalidHeaderValue; fn try_into_value(self) -> Result<HeaderValue, Self::Error> { let mut wrt = Writer::new(); let _ = write!(wrt, "{}", self); HeaderValue::from_maybe_shared(wrt.take()) } } /// Parses 0 or more items out of a comma delimited string, ignoring invalid items. fn from_comma_delimited<T: FromStr>(s: &str) -> Vec<T> { s.split(',') .filter_map(|x| match x.trim() { "" => None, y => Some(y), }) .filter_map(|x| x.parse().ok()) .collect() } #[cfg(test)] mod tests { use actix_http::{test::TestRequest, Request}; use super::*; fn req(s: &str) -> Request { TestRequest::default() .insert_header((header::RANGE, s)) .finish() } #[test] fn test_parse_bytes_range_valid() { let r: Range = Header::parse(&req("bytes=1-100")).unwrap(); let r2: Range = Header::parse(&req("bytes=1-100,-")).unwrap(); let r3 = Range::bytes(1, 100); assert_eq!(r, r2); assert_eq!(r2, r3); let r: Range = Header::parse(&req("bytes=1-100,200-")).unwrap(); let r2: Range = Header::parse(&req("bytes= 1-100 , 101-xxx, 200- ")).unwrap(); let r3 = Range::Bytes(vec![ ByteRangeSpec::FromTo(1, 100), ByteRangeSpec::From(200), ]); assert_eq!(r, r2); assert_eq!(r2, r3); let r: Range = Header::parse(&req("bytes=1-100,-100")).unwrap(); let r2: Range = Header::parse(&req("bytes=1-100, ,,-100")).unwrap(); let r3 = Range::Bytes(vec![ ByteRangeSpec::FromTo(1, 100), ByteRangeSpec::Last(100), ]); assert_eq!(r, r2); assert_eq!(r2, r3); let r: Range = Header::parse(&req("custom=1-100,-100")).unwrap(); let r2 = Range::Unregistered("custom".to_owned(), "1-100,-100".to_owned()); assert_eq!(r, r2); } #[test] fn test_parse_unregistered_range_valid() { let r: Range = Header::parse(&req("custom=1-100,-100")).unwrap(); let r2 = Range::Unregistered("custom".to_owned(), "1-100,-100".to_owned()); assert_eq!(r, r2); let r: Range = Header::parse(&req("custom=abcd")).unwrap(); let r2 = Range::Unregistered("custom".to_owned(), "abcd".to_owned()); assert_eq!(r, r2); let r: Range = Header::parse(&req("custom=xxx-yyy")).unwrap(); let r2 = Range::Unregistered("custom".to_owned(), "xxx-yyy".to_owned()); assert_eq!(r, r2); } #[test] fn test_parse_invalid() { let r: Result<Range, ParseError> = Header::parse(&req("bytes=1-a,-")); assert_eq!(r.ok(), None); let r: Result<Range, ParseError> = Header::parse(&req("bytes=1-2-3")); assert_eq!(r.ok(), None); let r: Result<Range, ParseError> = Header::parse(&req("abc")); assert_eq!(r.ok(), None); let r: Result<Range, ParseError> = Header::parse(&req("bytes=1-100=")); assert_eq!(r.ok(), None); let r: Result<Range, ParseError> = Header::parse(&req("bytes=")); assert_eq!(r.ok(), None); let r: Result<Range, ParseError> = Header::parse(&req("custom=")); assert_eq!(r.ok(), None); let r: Result<Range, ParseError> = Header::parse(&req("=1-100")); assert_eq!(r.ok(), None); } #[test] fn test_fmt() { let range = Range::Bytes(vec![ ByteRangeSpec::FromTo(0, 1000), ByteRangeSpec::From(2000), ]); assert_eq!(&range.to_string(), "bytes=0-1000,2000-"); let range = Range::Bytes(vec![]); assert_eq!(&range.to_string(), "bytes="); let range = Range::Unregistered("custom".to_owned(), "1-xxx".to_owned()); assert_eq!(&range.to_string(), "custom=1-xxx"); } #[test] fn test_byte_range_spec_to_satisfiable_range() { assert_eq!( Some((0, 0)), ByteRangeSpec::FromTo(0, 0).to_satisfiable_range(3) ); assert_eq!( Some((1, 2)), ByteRangeSpec::FromTo(1, 2).to_satisfiable_range(3) ); assert_eq!( Some((1, 2)), ByteRangeSpec::FromTo(1, 5).to_satisfiable_range(3) ); assert_eq!(None, ByteRangeSpec::FromTo(3, 3).to_satisfiable_range(3)); assert_eq!(None, ByteRangeSpec::FromTo(2, 1).to_satisfiable_range(3)); assert_eq!(None, ByteRangeSpec::FromTo(0, 0).to_satisfiable_range(0)); assert_eq!(Some((0, 2)), ByteRangeSpec::From(0).to_satisfiable_range(3)); assert_eq!(Some((2, 2)), ByteRangeSpec::From(2).to_satisfiable_range(3)); assert_eq!(None, ByteRangeSpec::From(3).to_satisfiable_range(3)); assert_eq!(None, ByteRangeSpec::From(5).to_satisfiable_range(3)); assert_eq!(None, ByteRangeSpec::From(0).to_satisfiable_range(0)); assert_eq!(Some((1, 2)), ByteRangeSpec::Last(2).to_satisfiable_range(3)); assert_eq!(Some((2, 2)), ByteRangeSpec::Last(1).to_satisfiable_range(3)); assert_eq!(Some((0, 2)), ByteRangeSpec::Last(5).to_satisfiable_range(3)); assert_eq!(None, ByteRangeSpec::Last(0).to_satisfiable_range(3)); assert_eq!(None, ByteRangeSpec::Last(2).to_satisfiable_range(0)); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/entity.rs
actix-web/src/http/header/entity.rs
use std::{ fmt::{self, Display, Write}, str::FromStr, }; use super::{HeaderValue, InvalidHeaderValue, TryIntoHeaderValue, Writer}; /// check that each char in the slice is either: /// 1. `%x21`, or /// 2. in the range `%x23` to `%x7E`, or /// 3. above `%x80` fn entity_validate_char(c: u8) -> bool { c == 0x21 || (0x23..=0x7e).contains(&c) || (c >= 0x80) } fn check_slice_validity(slice: &str) -> bool { slice.bytes().all(entity_validate_char) } /// An entity tag, defined in [RFC 7232 §2.3]. /// /// An entity tag consists of a string enclosed by two literal double quotes. /// Preceding the first double quote is an optional weakness indicator, /// which always looks like `W/`. Examples for valid tags are `"xyzzy"` and /// `W/"xyzzy"`. /// /// # ABNF /// ```plain /// entity-tag = [ weak ] opaque-tag /// weak = %x57.2F ; "W/", case-sensitive /// opaque-tag = DQUOTE *etagc DQUOTE /// etagc = %x21 / %x23-7E / obs-text /// ; VCHAR except double quotes, plus obs-text /// ``` /// /// # Comparison /// To check if two entity tags are equivalent in an application always use the /// `strong_eq` or `weak_eq` methods based on the context of the Tag. Only use /// `==` to check if two tags are identical. /// /// The example below shows the results for a set of entity-tag pairs and /// both the weak and strong comparison function results: /// /// | `ETag 1`| `ETag 2`| Strong Comparison | Weak Comparison | /// |---------|---------|-------------------|-----------------| /// | `W/"1"` | `W/"1"` | no match | match | /// | `W/"1"` | `W/"2"` | no match | no match | /// | `W/"1"` | `"1"` | no match | match | /// | `"1"` | `"1"` | match | match | /// /// [RFC 7232 §2.3](https://datatracker.ietf.org/doc/html/rfc7232#section-2.3) #[derive(Debug, Clone, PartialEq, Eq)] pub struct EntityTag { /// Weakness indicator for the tag pub weak: bool, /// The opaque string in between the DQUOTEs tag: String, } impl EntityTag { /// Constructs a new `EntityTag`. /// /// # Panics /// If the tag contains invalid characters. pub fn new(weak: bool, tag: String) -> EntityTag { assert!(check_slice_validity(&tag), "Invalid tag: {:?}", tag); EntityTag { weak, tag } } /// Constructs a new weak EntityTag. /// /// # Panics /// If the tag contains invalid characters. pub fn new_weak(tag: String) -> EntityTag { EntityTag::new(true, tag) } #[deprecated(since = "3.0.0", note = "Renamed to `new_weak`.")] pub fn weak(tag: String) -> EntityTag { Self::new_weak(tag) } /// Constructs a new strong EntityTag. /// /// # Panics /// If the tag contains invalid characters. pub fn new_strong(tag: String) -> EntityTag { EntityTag::new(false, tag) } #[deprecated(since = "3.0.0", note = "Renamed to `new_strong`.")] pub fn strong(tag: String) -> EntityTag { Self::new_strong(tag) } /// Returns tag. pub fn tag(&self) -> &str { self.tag.as_ref() } /// Sets tag. /// /// # Panics /// If the tag contains invalid characters. pub fn set_tag(&mut self, tag: impl Into<String>) { let tag = tag.into(); assert!(check_slice_validity(&tag), "Invalid tag: {:?}", tag); self.tag = tag } /// For strong comparison two entity-tags are equivalent if both are not weak and their /// opaque-tags match character-by-character. pub fn strong_eq(&self, other: &EntityTag) -> bool { !self.weak && !other.weak && self.tag == other.tag } /// For weak comparison two entity-tags are equivalent if their opaque-tags match /// character-by-character, regardless of either or both being tagged as "weak". pub fn weak_eq(&self, other: &EntityTag) -> bool { self.tag == other.tag } /// Returns the inverse of `strong_eq()`. pub fn strong_ne(&self, other: &EntityTag) -> bool { !self.strong_eq(other) } /// Returns inverse of `weak_eq()`. pub fn weak_ne(&self, other: &EntityTag) -> bool { !self.weak_eq(other) } } impl Display for EntityTag { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { if self.weak { write!(f, "W/\"{}\"", self.tag) } else { write!(f, "\"{}\"", self.tag) } } } impl FromStr for EntityTag { type Err = crate::error::ParseError; fn from_str(slice: &str) -> Result<EntityTag, crate::error::ParseError> { let length = slice.len(); // Early exits if it doesn't terminate in a DQUOTE. if !slice.ends_with('"') || slice.len() < 2 { return Err(crate::error::ParseError::Header); } // The etag is weak if its first char is not a DQUOTE. if slice.len() >= 2 && slice.starts_with('"') && check_slice_validity(&slice[1..length - 1]) { // No need to check if the last char is a DQUOTE, // we already did that above. return Ok(EntityTag { weak: false, tag: slice[1..length - 1].to_owned(), }); } else if slice.len() >= 4 && slice.starts_with("W/\"") && check_slice_validity(&slice[3..length - 1]) { return Ok(EntityTag { weak: true, tag: slice[3..length - 1].to_owned(), }); } Err(crate::error::ParseError::Header) } } impl TryIntoHeaderValue for EntityTag { type Error = InvalidHeaderValue; fn try_into_value(self) -> Result<HeaderValue, Self::Error> { let mut wrt = Writer::new(); write!(wrt, "{}", self).unwrap(); HeaderValue::from_maybe_shared(wrt.take()) } } #[cfg(test)] mod tests { use super::EntityTag; #[test] fn test_etag_parse_success() { // Expected success assert_eq!( "\"foobar\"".parse::<EntityTag>().unwrap(), EntityTag::new_strong("foobar".to_owned()) ); assert_eq!( "\"\"".parse::<EntityTag>().unwrap(), EntityTag::new_strong("".to_owned()) ); assert_eq!( "W/\"weaktag\"".parse::<EntityTag>().unwrap(), EntityTag::new_weak("weaktag".to_owned()) ); assert_eq!( "W/\"\x65\x62\"".parse::<EntityTag>().unwrap(), EntityTag::new_weak("\x65\x62".to_owned()) ); assert_eq!( "W/\"\"".parse::<EntityTag>().unwrap(), EntityTag::new_weak("".to_owned()) ); } #[test] fn test_etag_parse_failures() { // Expected failures assert!("no-dquotes".parse::<EntityTag>().is_err()); assert!("w/\"the-first-w-is-case-sensitive\"" .parse::<EntityTag>() .is_err()); assert!("".parse::<EntityTag>().is_err()); assert!("\"unmatched-dquotes1".parse::<EntityTag>().is_err()); assert!("unmatched-dquotes2\"".parse::<EntityTag>().is_err()); assert!("matched-\"dquotes\"".parse::<EntityTag>().is_err()); } #[test] fn test_etag_fmt() { assert_eq!( format!("{}", EntityTag::new_strong("foobar".to_owned())), "\"foobar\"" ); assert_eq!(format!("{}", EntityTag::new_strong("".to_owned())), "\"\""); assert_eq!( format!("{}", EntityTag::new_weak("weak-etag".to_owned())), "W/\"weak-etag\"" ); assert_eq!( format!("{}", EntityTag::new_weak("\u{0065}".to_owned())), "W/\"\x65\"" ); assert_eq!(format!("{}", EntityTag::new_weak("".to_owned())), "W/\"\""); } #[test] fn test_cmp() { // | ETag 1 | ETag 2 | Strong Comparison | Weak Comparison | // |---------|---------|-------------------|-----------------| // | `W/"1"` | `W/"1"` | no match | match | // | `W/"1"` | `W/"2"` | no match | no match | // | `W/"1"` | `"1"` | no match | match | // | `"1"` | `"1"` | match | match | let mut etag1 = EntityTag::new_weak("1".to_owned()); let mut etag2 = EntityTag::new_weak("1".to_owned()); assert!(!etag1.strong_eq(&etag2)); assert!(etag1.weak_eq(&etag2)); assert!(etag1.strong_ne(&etag2)); assert!(!etag1.weak_ne(&etag2)); etag1 = EntityTag::new_weak("1".to_owned()); etag2 = EntityTag::new_weak("2".to_owned()); assert!(!etag1.strong_eq(&etag2)); assert!(!etag1.weak_eq(&etag2)); assert!(etag1.strong_ne(&etag2)); assert!(etag1.weak_ne(&etag2)); etag1 = EntityTag::new_weak("1".to_owned()); etag2 = EntityTag::new_strong("1".to_owned()); assert!(!etag1.strong_eq(&etag2)); assert!(etag1.weak_eq(&etag2)); assert!(etag1.strong_ne(&etag2)); assert!(!etag1.weak_ne(&etag2)); etag1 = EntityTag::new_strong("1".to_owned()); etag2 = EntityTag::new_strong("1".to_owned()); assert!(etag1.strong_eq(&etag2)); assert!(etag1.weak_eq(&etag2)); assert!(!etag1.strong_ne(&etag2)); assert!(!etag1.weak_ne(&etag2)); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/content_length.rs
actix-web/src/http/header/content_length.rs
use std::{convert::Infallible, str}; use derive_more::{Deref, DerefMut}; use crate::{ error::ParseError, http::header::{ from_one_raw_str, Header, HeaderName, HeaderValue, TryIntoHeaderValue, CONTENT_LENGTH, }, HttpMessage, }; /// `Content-Length` header, defined in [RFC 9110 §8.6]. /// /// The Content-Length /// /// # ABNF /// /// ```plain /// Content-Length = 1*DIGIT /// ``` /// /// # Example Values /// /// - `0` /// - `3495` /// /// # Examples /// /// ``` /// use actix_web::{http::header::ContentLength, HttpResponse}; /// /// let res_empty = HttpResponse::Ok() /// .insert_header(ContentLength(0)); /// /// let res_fake_cl = HttpResponse::Ok() /// .insert_header(ContentLength(3_495)); /// ``` /// /// [RFC 9110 §8.6]: https://www.rfc-editor.org/rfc/rfc9110#name-content-length #[derive(Debug, Clone, PartialEq, Eq, PartialOrd, Ord, Deref, DerefMut)] pub struct ContentLength(pub usize); impl ContentLength { /// Returns Content-Length value. pub fn into_inner(&self) -> usize { self.0 } } impl str::FromStr for ContentLength { type Err = <usize as str::FromStr>::Err; #[inline] fn from_str(val: &str) -> Result<Self, Self::Err> { let val = val.trim(); // decoder prevents this case debug_assert!(!val.starts_with('+')); val.parse().map(Self) } } impl TryIntoHeaderValue for ContentLength { type Error = Infallible; fn try_into_value(self) -> Result<HeaderValue, Self::Error> { Ok(HeaderValue::from(self.0)) } } impl Header for ContentLength { fn name() -> HeaderName { CONTENT_LENGTH } fn parse<M: HttpMessage>(msg: &M) -> Result<Self, ParseError> { let val = from_one_raw_str(msg.headers().get(Self::name()))?; // decoder prevents multiple CL headers debug_assert_eq!(msg.headers().get_all(Self::name()).count(), 1); Ok(val) } } impl From<ContentLength> for usize { fn from(ContentLength(len): ContentLength) -> Self { len } } impl From<usize> for ContentLength { fn from(len: usize) -> Self { ContentLength(len) } } impl PartialEq<usize> for ContentLength { fn eq(&self, other: &usize) -> bool { self.0 == *other } } impl PartialEq<ContentLength> for usize { fn eq(&self, other: &ContentLength) -> bool { *self == other.0 } } impl PartialOrd<usize> for ContentLength { fn partial_cmp(&self, other: &usize) -> Option<std::cmp::Ordering> { self.0.partial_cmp(other) } } impl PartialOrd<ContentLength> for usize { fn partial_cmp(&self, other: &ContentLength) -> Option<std::cmp::Ordering> { self.partial_cmp(&other.0) } } #[cfg(test)] mod tests { use std::fmt; use super::*; use crate::{test::TestRequest, HttpRequest}; fn req_from_raw_headers<H: Header, I: IntoIterator<Item = V>, V: AsRef<[u8]>>( header_lines: I, ) -> HttpRequest { header_lines .into_iter() .fold(TestRequest::default(), |req, item| { req.append_header((H::name(), item.as_ref().to_vec())) }) .to_http_request() } #[track_caller] pub(crate) fn assert_parse_fail< H: Header + fmt::Debug, I: IntoIterator<Item = V>, V: AsRef<[u8]>, >( headers: I, ) { let req = req_from_raw_headers::<H, _, _>(headers); H::parse(&req).unwrap_err(); } #[track_caller] pub(crate) fn assert_parse_eq< H: Header + fmt::Debug + PartialEq, I: IntoIterator<Item = V>, V: AsRef<[u8]>, >( headers: I, expect: H, ) { let req = req_from_raw_headers::<H, _, _>(headers); assert_eq!(H::parse(&req).unwrap(), expect); } #[test] fn missing_header() { assert_parse_fail::<ContentLength, _, _>([""; 0]); assert_parse_fail::<ContentLength, _, _>([""]); } #[test] fn bad_header() { assert_parse_fail::<ContentLength, _, _>(["-123"]); assert_parse_fail::<ContentLength, _, _>(["123_456"]); assert_parse_fail::<ContentLength, _, _>(["123.456"]); // too large for u64 (2^64, 2^64 + 1) assert_parse_fail::<ContentLength, _, _>(["18446744073709551616"]); assert_parse_fail::<ContentLength, _, _>(["18446744073709551617"]); // hex notation assert_parse_fail::<ContentLength, _, _>(["0x123"]); // multi-value assert_parse_fail::<ContentLength, _, _>(["0, 123"]); } #[test] #[should_panic] fn bad_header_plus() { // prevented by HTTP decoder anyway assert_parse_fail::<ContentLength, _, _>(["+123"]); } #[test] #[should_panic] fn bad_multiple_value() { // prevented by HTTP decoder anyway assert_parse_fail::<ContentLength, _, _>(["0", "123"]); } #[test] fn good_header() { assert_parse_eq::<ContentLength, _, _>(["0"], ContentLength(0)); assert_parse_eq::<ContentLength, _, _>(["1"], ContentLength(1)); assert_parse_eq::<ContentLength, _, _>(["123"], ContentLength(123)); // value that looks like octal notation is not interpreted as such assert_parse_eq::<ContentLength, _, _>(["0123"], ContentLength(123)); // whitespace variations assert_parse_eq::<ContentLength, _, _>([" 0"], ContentLength(0)); assert_parse_eq::<ContentLength, _, _>(["0 "], ContentLength(0)); assert_parse_eq::<ContentLength, _, _>([" 0 "], ContentLength(0)); // large value (2^64 - 1) assert_parse_eq::<ContentLength, _, _>( ["18446744073709551615"], ContentLength(18_446_744_073_709_551_615), ); } #[test] fn equality() { assert!(ContentLength(0) == ContentLength(0)); assert!(ContentLength(0) == 0); assert!(0 != ContentLength(123)); } #[test] fn ordering() { assert!(ContentLength(0) < ContentLength(123)); assert!(ContentLength(0) < 123); assert!(0 < ContentLength(123)); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/content_disposition.rs
actix-web/src/http/header/content_disposition.rs
//! The `Content-Disposition` header and associated types. //! //! # References //! - "The Content-Disposition Header Field": //! <https://datatracker.ietf.org/doc/html/rfc2183> //! - "The Content-Disposition Header Field in the Hypertext Transfer Protocol (HTTP)": //! <https://datatracker.ietf.org/doc/html/rfc6266> //! - "Returning Values from Forms: multipart/form-data": //! <https://datatracker.ietf.org/doc/html/rfc7578> //! - Browser conformance tests at: <http://greenbytes.de/tech/tc2231/> //! - IANA assignment: <http://www.iana.org/assignments/cont-disp/cont-disp.xhtml> use std::fmt::{self, Write}; use once_cell::sync::Lazy; #[cfg(feature = "unicode")] use regex::Regex; #[cfg(not(feature = "unicode"))] use regex_lite::Regex; use super::{ExtendedValue, Header, TryIntoHeaderValue, Writer}; use crate::http::header; /// Split at the index of the first `needle` if it exists or at the end. fn split_once(haystack: &str, needle: char) -> (&str, &str) { haystack.find(needle).map_or_else( || (haystack, ""), |sc| { let (first, last) = haystack.split_at(sc); (first, last.split_at(1).1) }, ) } /// Split at the index of the first `needle` if it exists or at the end, trim the right of the /// first part and the left of the last part. fn split_once_and_trim(haystack: &str, needle: char) -> (&str, &str) { let (first, last) = split_once(haystack, needle); (first.trim_end(), last.trim_start()) } /// The implied disposition of the content of the HTTP body. #[derive(Debug, Clone, PartialEq, Eq)] pub enum DispositionType { /// Inline implies default processing. Inline, /// Attachment implies that the recipient should prompt the user to save the response locally, /// rather than process it normally (as per its media type). Attachment, /// Used in *multipart/form-data* as defined in /// [RFC 7578](https://datatracker.ietf.org/doc/html/rfc7578) to carry the field name and /// optional filename. FormData, /// Extension type. Should be handled by recipients the same way as Attachment. Ext(String), } impl<'a> From<&'a str> for DispositionType { fn from(origin: &'a str) -> DispositionType { if origin.eq_ignore_ascii_case("inline") { DispositionType::Inline } else if origin.eq_ignore_ascii_case("attachment") { DispositionType::Attachment } else if origin.eq_ignore_ascii_case("form-data") { DispositionType::FormData } else { DispositionType::Ext(origin.to_owned()) } } } /// Parameter in [`ContentDisposition`]. /// /// # Examples /// ``` /// use actix_web::http::header::DispositionParam; /// /// let param = DispositionParam::Filename(String::from("sample.txt")); /// assert!(param.is_filename()); /// assert_eq!(param.as_filename().unwrap(), "sample.txt"); /// ``` #[derive(Debug, Clone, PartialEq, Eq)] #[allow(clippy::large_enum_variant)] pub enum DispositionParam { /// For [`DispositionType::FormData`] (i.e. *multipart/form-data*), the name of an field from /// the form. Name(String), /// A plain file name. /// /// It is [not supposed](https://datatracker.ietf.org/doc/html/rfc6266#appendix-D) to contain /// any non-ASCII characters when used in a *Content-Disposition* HTTP response header, where /// [`FilenameExt`](DispositionParam::FilenameExt) with charset UTF-8 may be used instead /// in case there are Unicode characters in file names. Filename(String), /// An extended file name. It must not exist for `ContentType::Formdata` according to /// [RFC 7578 §4.2](https://datatracker.ietf.org/doc/html/rfc7578#section-4.2). FilenameExt(ExtendedValue), /// An unrecognized regular parameter as defined in /// [RFC 5987 §3.2.1](https://datatracker.ietf.org/doc/html/rfc5987#section-3.2.1) as /// `reg-parameter`, in /// [RFC 6266 §4.1](https://datatracker.ietf.org/doc/html/rfc6266#section-4.1) as /// `token "=" value`. Recipients should ignore unrecognizable parameters. Unknown(String, String), /// An unrecognized extended parameter as defined in /// [RFC 5987 §3.2.1](https://datatracker.ietf.org/doc/html/rfc5987#section-3.2.1) as /// `ext-parameter`, in /// [RFC 6266 §4.1](https://datatracker.ietf.org/doc/html/rfc6266#section-4.1) as /// `ext-token "=" ext-value`. The single trailing asterisk is not included. Recipients should /// ignore unrecognizable parameters. UnknownExt(String, ExtendedValue), } impl DispositionParam { /// Returns `true` if the parameter is [`Name`](DispositionParam::Name). #[inline] pub fn is_name(&self) -> bool { self.as_name().is_some() } /// Returns `true` if the parameter is [`Filename`](DispositionParam::Filename). #[inline] pub fn is_filename(&self) -> bool { self.as_filename().is_some() } /// Returns `true` if the parameter is [`FilenameExt`](DispositionParam::FilenameExt). #[inline] pub fn is_filename_ext(&self) -> bool { self.as_filename_ext().is_some() } /// Returns `true` if the parameter is [`Unknown`](DispositionParam::Unknown) and the `name` #[inline] /// matches. pub fn is_unknown<T: AsRef<str>>(&self, name: T) -> bool { self.as_unknown(name).is_some() } /// Returns `true` if the parameter is [`UnknownExt`](DispositionParam::UnknownExt) and the /// `name` matches. #[inline] pub fn is_unknown_ext<T: AsRef<str>>(&self, name: T) -> bool { self.as_unknown_ext(name).is_some() } /// Returns the name if applicable. #[inline] pub fn as_name(&self) -> Option<&str> { match self { DispositionParam::Name(name) => Some(name.as_str()), _ => None, } } /// Returns the filename if applicable. #[inline] pub fn as_filename(&self) -> Option<&str> { match self { DispositionParam::Filename(filename) => Some(filename.as_str()), _ => None, } } /// Returns the filename* if applicable. #[inline] pub fn as_filename_ext(&self) -> Option<&ExtendedValue> { match self { DispositionParam::FilenameExt(value) => Some(value), _ => None, } } /// Returns the value of the unrecognized regular parameter if it is /// [`Unknown`](DispositionParam::Unknown) and the `name` matches. #[inline] pub fn as_unknown<T: AsRef<str>>(&self, name: T) -> Option<&str> { match self { DispositionParam::Unknown(ref ext_name, ref value) if ext_name.eq_ignore_ascii_case(name.as_ref()) => { Some(value.as_str()) } _ => None, } } /// Returns the value of the unrecognized extended parameter if it is /// [`Unknown`](DispositionParam::Unknown) and the `name` matches. #[inline] pub fn as_unknown_ext<T: AsRef<str>>(&self, name: T) -> Option<&ExtendedValue> { match self { DispositionParam::UnknownExt(ref ext_name, ref value) if ext_name.eq_ignore_ascii_case(name.as_ref()) => { Some(value) } _ => None, } } } /// `Content-Disposition` header. /// /// It is compatible to be used either as [a response header for the main body][use_main_body] /// as (re)defined in [RFC 6266], or as [a header for a multipart body][use_multipart] as /// (re)defined in [RFC 7587]. /// /// In a regular HTTP response, the *Content-Disposition* response header is a header indicating if /// the content is expected to be displayed *inline* in the browser, that is, as a Web page or as /// part of a Web page, or as an attachment, that is downloaded and saved locally, and also can be /// used to attach additional metadata, such as the filename to use when saving the response payload /// locally. /// /// In a *multipart/form-data* body, the HTTP *Content-Disposition* general header is a header that /// can be used on the subpart of a multipart body to give information about the field it applies to. /// The subpart is delimited by the boundary defined in the *Content-Type* header. Used on the body /// itself, *Content-Disposition* has no effect. /// /// # ABNF /// ```plain /// content-disposition = "Content-Disposition" ":" /// disposition-type *( ";" disposition-parm ) /// /// disposition-type = "inline" | "attachment" | disp-ext-type /// ; case-insensitive /// /// disp-ext-type = token /// /// disposition-parm = filename-parm | disp-ext-parm /// /// filename-parm = "filename" "=" value /// | "filename*" "=" ext-value /// /// disp-ext-parm = token "=" value /// | ext-token "=" ext-value /// /// ext-token = <the characters in token, followed by "*"> /// ``` /// /// # Note /// *filename* is [not supposed](https://datatracker.ietf.org/doc/html/rfc6266#appendix-D) to /// contain any non-ASCII characters when used in a *Content-Disposition* HTTP response header, /// where filename* with charset UTF-8 may be used instead in case there are Unicode characters in /// file names. Filename is [acceptable](https://datatracker.ietf.org/doc/html/rfc7578#section-4.2) /// to be UTF-8 encoded directly in a *Content-Disposition* header for /// *multipart/form-data*, though. /// /// *filename* [must not](https://datatracker.ietf.org/doc/html/rfc7578#section-4.2) be used within /// *multipart/form-data*. /// /// # Examples /// ``` /// use actix_web::http::header::{ /// Charset, ContentDisposition, DispositionParam, DispositionType, /// ExtendedValue, /// }; /// /// let cd1 = ContentDisposition { /// disposition: DispositionType::Attachment, /// parameters: vec![DispositionParam::FilenameExt(ExtendedValue { /// charset: Charset::Iso_8859_1, // The character set for the bytes of the filename /// language_tag: None, // The optional language tag (see `language-tag` crate) /// value: b"\xA9 Ferris 2011.txt".to_vec(), // the actual bytes of the filename /// })], /// }; /// assert!(cd1.is_attachment()); /// assert!(cd1.get_filename_ext().is_some()); /// /// let cd2 = ContentDisposition { /// disposition: DispositionType::FormData, /// parameters: vec![ /// DispositionParam::Name(String::from("file")), /// DispositionParam::Filename(String::from("bill.odt")), /// ], /// }; /// assert_eq!(cd2.get_name(), Some("file")); // field name /// assert_eq!(cd2.get_filename(), Some("bill.odt")); /// /// // HTTP response header with Unicode characters in file names /// let cd3 = ContentDisposition { /// disposition: DispositionType::Attachment, /// parameters: vec![ /// DispositionParam::FilenameExt(ExtendedValue { /// charset: Charset::Ext(String::from("UTF-8")), /// language_tag: None, /// value: String::from("\u{1f600}.svg").into_bytes(), /// }), /// // fallback for better compatibility /// DispositionParam::Filename(String::from("Grinning-Face-Emoji.svg")) /// ], /// }; /// assert_eq!(cd3.get_filename_ext().map(|ev| ev.value.as_ref()), /// Some("\u{1f600}.svg".as_bytes())); /// ``` /// /// # Security Note /// If "filename" parameter is supplied, do not use the file name blindly, check and possibly /// change to match local file system conventions if applicable, and do not use directory path /// information that may be present. /// See [RFC 2183 §2.3](https://datatracker.ietf.org/doc/html/rfc2183#section-2.3). /// /// [use_main_body]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Disposition#as_a_response_header_for_the_main_body /// [RFC 6266]: https://datatracker.ietf.org/doc/html/rfc6266 /// [use_multipart]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Disposition#as_a_header_for_a_multipart_body /// [RFC 7587]: https://datatracker.ietf.org/doc/html/rfc7578 #[derive(Debug, Clone, PartialEq, Eq)] pub struct ContentDisposition { /// The disposition type pub disposition: DispositionType, /// Disposition parameters pub parameters: Vec<DispositionParam>, } impl ContentDisposition { /// Constructs a Content-Disposition header suitable for downloads. /// /// # Examples /// ``` /// use actix_web::http::header::{ContentDisposition, TryIntoHeaderValue as _}; /// /// let cd = ContentDisposition::attachment("files.zip"); /// /// let cd_val = cd.try_into_value().unwrap(); /// assert_eq!(cd_val, "attachment; filename=\"files.zip\""); /// ``` pub fn attachment(filename: impl Into<String>) -> Self { Self { disposition: DispositionType::Attachment, parameters: vec![DispositionParam::Filename(filename.into())], } } /// Parse a raw Content-Disposition header value. pub fn from_raw(hv: &header::HeaderValue) -> Result<Self, crate::error::ParseError> { // `header::from_one_raw_str` invokes `hv.to_str` which assumes `hv` contains only visible // ASCII characters. So `hv.as_bytes` is necessary here. let hv = String::from_utf8(hv.as_bytes().to_vec()) .map_err(|_| crate::error::ParseError::Header)?; let (disp_type, mut left) = split_once_and_trim(hv.as_str().trim(), ';'); if disp_type.is_empty() { return Err(crate::error::ParseError::Header); } let mut cd = ContentDisposition { disposition: disp_type.into(), parameters: Vec::new(), }; while !left.is_empty() { let (param_name, new_left) = split_once_and_trim(left, '='); if param_name.is_empty() || param_name == "*" || new_left.is_empty() { return Err(crate::error::ParseError::Header); } left = new_left; if let Some(param_name) = param_name.strip_suffix('*') { // extended parameters let (ext_value, new_left) = split_once_and_trim(left, ';'); left = new_left; let ext_value = header::parse_extended_value(ext_value)?; let param = if param_name.eq_ignore_ascii_case("filename") { DispositionParam::FilenameExt(ext_value) } else { DispositionParam::UnknownExt(param_name.to_owned(), ext_value) }; cd.parameters.push(param); } else { // regular parameters let value = if left.starts_with('\"') { // quoted-string: defined in RFC 6266 -> RFC 2616 Section 3.6 let mut escaping = false; let mut quoted_string = vec![]; let mut end = None; // search for closing quote for (i, &c) in left.as_bytes().iter().skip(1).enumerate() { if escaping { escaping = false; quoted_string.push(c); } else if c == 0x5c { // backslash escaping = true; } else if c == 0x22 { // double quote end = Some(i + 1); // cuz skipped 1 for the leading quote break; } else { quoted_string.push(c); } } left = &left[end.ok_or(crate::error::ParseError::Header)? + 1..]; left = split_once(left, ';').1.trim_start(); // In fact, it should not be Err if the above code is correct. String::from_utf8(quoted_string) .map_err(|_| crate::error::ParseError::Header)? } else { // token: won't contains semicolon according to RFC 2616 Section 2.2 let (token, new_left) = split_once_and_trim(left, ';'); left = new_left; if token.is_empty() { // quoted-string can be empty, but token cannot be empty return Err(crate::error::ParseError::Header); } token.to_owned() }; let param = if param_name.eq_ignore_ascii_case("name") { DispositionParam::Name(value) } else if param_name.eq_ignore_ascii_case("filename") { // See also comments in test_from_raw_unnecessary_percent_decode. DispositionParam::Filename(value) } else { DispositionParam::Unknown(param_name.to_owned(), value) }; cd.parameters.push(param); } } Ok(cd) } /// Returns `true` if type is [`Inline`](DispositionType::Inline). pub fn is_inline(&self) -> bool { matches!(self.disposition, DispositionType::Inline) } /// Returns `true` if type is [`Attachment`](DispositionType::Attachment). pub fn is_attachment(&self) -> bool { matches!(self.disposition, DispositionType::Attachment) } /// Returns `true` if type is [`FormData`](DispositionType::FormData). pub fn is_form_data(&self) -> bool { matches!(self.disposition, DispositionType::FormData) } /// Returns `true` if type is [`Ext`](DispositionType::Ext) and the `disp_type` matches. pub fn is_ext(&self, disp_type: impl AsRef<str>) -> bool { matches!( self.disposition, DispositionType::Ext(ref t) if t.eq_ignore_ascii_case(disp_type.as_ref()) ) } /// Return the value of *name* if exists. pub fn get_name(&self) -> Option<&str> { self.parameters.iter().find_map(DispositionParam::as_name) } /// Return the value of *filename* if exists. pub fn get_filename(&self) -> Option<&str> { self.parameters .iter() .find_map(DispositionParam::as_filename) } /// Return the value of *filename\** if exists. pub fn get_filename_ext(&self) -> Option<&ExtendedValue> { self.parameters .iter() .find_map(DispositionParam::as_filename_ext) } /// Return the value of the parameter which the `name` matches. pub fn get_unknown(&self, name: impl AsRef<str>) -> Option<&str> { let name = name.as_ref(); self.parameters.iter().find_map(|p| p.as_unknown(name)) } /// Return the value of the extended parameter which the `name` matches. pub fn get_unknown_ext(&self, name: impl AsRef<str>) -> Option<&ExtendedValue> { let name = name.as_ref(); self.parameters.iter().find_map(|p| p.as_unknown_ext(name)) } } impl TryIntoHeaderValue for ContentDisposition { type Error = header::InvalidHeaderValue; fn try_into_value(self) -> Result<header::HeaderValue, Self::Error> { let mut writer = Writer::new(); let _ = write!(&mut writer, "{}", self); header::HeaderValue::from_maybe_shared(writer.take()) } } impl Header for ContentDisposition { fn name() -> header::HeaderName { header::CONTENT_DISPOSITION } fn parse<T: crate::HttpMessage>(msg: &T) -> Result<Self, crate::error::ParseError> { if let Some(h) = msg.headers().get(Self::name()) { Self::from_raw(h) } else { Err(crate::error::ParseError::Header) } } } impl fmt::Display for DispositionType { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { match self { DispositionType::Inline => write!(f, "inline"), DispositionType::Attachment => write!(f, "attachment"), DispositionType::FormData => write!(f, "form-data"), DispositionType::Ext(ref s) => write!(f, "{}", s), } } } impl fmt::Display for DispositionParam { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { // All ASCII control characters (0-30, 127) including horizontal tab, double quote, and // backslash should be escaped in quoted-string (i.e. "foobar"). // // Ref: RFC 6266 §4.1 -> RFC 2616 §3.6 // // filename-parm = "filename" "=" value // value = token | quoted-string // quoted-string = ( <"> *(qdtext | quoted-pair ) <"> ) // qdtext = <any TEXT except <">> // quoted-pair = "\" CHAR // TEXT = <any OCTET except CTLs, // but including LWS> // LWS = [CRLF] 1*( SP | HT ) // OCTET = <any 8-bit sequence of data> // CHAR = <any US-ASCII character (octets 0 - 127)> // CTL = <any US-ASCII control character // (octets 0 - 31) and DEL (127)> // // Ref: RFC 7578 S4.2 -> RFC 2183 S2 -> RFC 2045 S5.1 // parameter := attribute "=" value // attribute := token // ; Matching of attributes // ; is ALWAYS case-insensitive. // value := token / quoted-string // token := 1*<any (US-ASCII) CHAR except SPACE, CTLs, // or tspecials> // tspecials := "(" / ")" / "<" / ">" / "@" / // "," / ";" / ":" / "\" / <"> // "/" / "[" / "]" / "?" / "=" // ; Must be in quoted-string, // ; to use within parameter values // // // See also comments in test_from_raw_unnecessary_percent_decode. static RE: Lazy<Regex> = Lazy::new(|| Regex::new("[\x00-\x08\x10-\x1F\x7F\"\\\\]").unwrap()); match self { DispositionParam::Name(ref value) => write!(f, "name={}", value), DispositionParam::Filename(ref value) => { write!(f, "filename=\"{}\"", RE.replace_all(value, "\\$0").as_ref()) } DispositionParam::Unknown(ref name, ref value) => write!( f, "{}=\"{}\"", name, &RE.replace_all(value, "\\$0").as_ref() ), DispositionParam::FilenameExt(ref ext_value) => { write!(f, "filename*={}", ext_value) } DispositionParam::UnknownExt(ref name, ref ext_value) => { write!(f, "{}*={}", name, ext_value) } } } } impl fmt::Display for ContentDisposition { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { write!(f, "{}", self.disposition)?; self.parameters .iter() .try_for_each(|param| write!(f, "; {}", param)) } } #[cfg(test)] mod tests { use super::{ContentDisposition, DispositionParam, DispositionType}; use crate::http::header::{Charset, ExtendedValue, HeaderValue}; #[test] fn test_from_raw_basic() { assert!(ContentDisposition::from_raw(&HeaderValue::from_static("")).is_err()); let a = HeaderValue::from_static("form-data; dummy=3; name=upload; filename=\"sample.png\""); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::FormData, parameters: vec![ DispositionParam::Unknown("dummy".to_owned(), "3".to_owned()), DispositionParam::Name("upload".to_owned()), DispositionParam::Filename("sample.png".to_owned()), ], }; assert_eq!(a, b); let a = HeaderValue::from_static("attachment; filename=\"image.jpg\""); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::Attachment, parameters: vec![DispositionParam::Filename("image.jpg".to_owned())], }; assert_eq!(a, b); let a = HeaderValue::from_static("inline; filename=image.jpg"); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::Inline, parameters: vec![DispositionParam::Filename("image.jpg".to_owned())], }; assert_eq!(a, b); let a = HeaderValue::from_static( "attachment; creation-date=\"Wed, 12 Feb 1997 16:29:51 -0500\"", ); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::Attachment, parameters: vec![DispositionParam::Unknown( String::from("creation-date"), "Wed, 12 Feb 1997 16:29:51 -0500".to_owned(), )], }; assert_eq!(a, b); } #[test] fn test_from_raw_extended() { let a = HeaderValue::from_static( "attachment; filename*=UTF-8''%c2%a3%20and%20%e2%82%ac%20rates", ); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::Attachment, parameters: vec![DispositionParam::FilenameExt(ExtendedValue { charset: Charset::Ext(String::from("UTF-8")), language_tag: None, value: vec![ 0xc2, 0xa3, 0x20, b'a', b'n', b'd', 0x20, 0xe2, 0x82, 0xac, 0x20, b'r', b'a', b't', b'e', b's', ], })], }; assert_eq!(a, b); let a = HeaderValue::from_static( "attachment; filename*=UTF-8''%c2%a3%20and%20%e2%82%ac%20rates", ); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::Attachment, parameters: vec![DispositionParam::FilenameExt(ExtendedValue { charset: Charset::Ext(String::from("UTF-8")), language_tag: None, value: vec![ 0xc2, 0xa3, 0x20, b'a', b'n', b'd', 0x20, 0xe2, 0x82, 0xac, 0x20, b'r', b'a', b't', b'e', b's', ], })], }; assert_eq!(a, b); } #[test] fn test_from_raw_extra_whitespace() { let a = HeaderValue::from_static( "form-data ; du-mmy= 3 ; name =upload ; filename = \"sample.png\" ; ", ); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::FormData, parameters: vec![ DispositionParam::Unknown("du-mmy".to_owned(), "3".to_owned()), DispositionParam::Name("upload".to_owned()), DispositionParam::Filename("sample.png".to_owned()), ], }; assert_eq!(a, b); } #[test] fn test_from_raw_unordered() { let a = HeaderValue::from_static( "form-data; dummy=3; filename=\"sample.png\" ; name=upload;", // Actually, a trailing semicolon is not compliant. But it is fine to accept. ); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::FormData, parameters: vec![ DispositionParam::Unknown("dummy".to_owned(), "3".to_owned()), DispositionParam::Filename("sample.png".to_owned()), DispositionParam::Name("upload".to_owned()), ], }; assert_eq!(a, b); let a = HeaderValue::from_str( "attachment; filename*=iso-8859-1''foo-%E4.html; filename=\"foo-ä.html\"", ) .unwrap(); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::Attachment, parameters: vec![ DispositionParam::FilenameExt(ExtendedValue { charset: Charset::Iso_8859_1, language_tag: None, value: b"foo-\xe4.html".to_vec(), }), DispositionParam::Filename("foo-ä.html".to_owned()), ], }; assert_eq!(a, b); } #[test] fn test_from_raw_only_disp() { let a = ContentDisposition::from_raw(&HeaderValue::from_static("attachment")).unwrap(); let b = ContentDisposition { disposition: DispositionType::Attachment, parameters: vec![], }; assert_eq!(a, b); let a = ContentDisposition::from_raw(&HeaderValue::from_static("inline ;")).unwrap(); let b = ContentDisposition { disposition: DispositionType::Inline, parameters: vec![], }; assert_eq!(a, b); let a = ContentDisposition::from_raw(&HeaderValue::from_static("unknown-disp-param")).unwrap(); let b = ContentDisposition { disposition: DispositionType::Ext(String::from("unknown-disp-param")), parameters: vec![], }; assert_eq!(a, b); } #[test] fn from_raw_with_mixed_case() { let a = HeaderValue::from_str( "InLInE; fIlenAME*=iso-8859-1''foo-%E4.html; filEName=\"foo-ä.html\"", ) .unwrap(); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::Inline, parameters: vec![ DispositionParam::FilenameExt(ExtendedValue { charset: Charset::Iso_8859_1, language_tag: None, value: b"foo-\xe4.html".to_vec(), }), DispositionParam::Filename("foo-ä.html".to_owned()), ], }; assert_eq!(a, b); } #[test] fn from_raw_with_unicode() { /* RFC 7578 Section 4.2: Some commonly deployed systems use multipart/form-data with file names directly encoded including octets outside the US-ASCII range. The encoding used for the file names is typically UTF-8, although HTML forms will use the charset associated with the form. Mainstream browsers like Firefox (gecko) and Chrome use UTF-8 directly as above. (And now, only UTF-8 is handled by this implementation.) */ let a = HeaderValue::from_str("form-data; name=upload; filename=\"文件.webp\"").unwrap(); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::FormData, parameters: vec![ DispositionParam::Name(String::from("upload")), DispositionParam::Filename(String::from("文件.webp")), ], }; assert_eq!(a, b); let a = HeaderValue::from_str( "form-data; name=upload; filename=\"余固知謇謇之為患兮,忍而不能舍也.pptx\"", ) .unwrap(); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::FormData, parameters: vec![ DispositionParam::Name(String::from("upload")), DispositionParam::Filename(String::from("余固知謇謇之為患兮,忍而不能舍也.pptx")), ], }; assert_eq!(a, b); } #[test] fn test_from_raw_escape() { let a = HeaderValue::from_static( "form-data; dummy=3; name=upload; filename=\"s\\amp\\\"le.png\"", ); let a: ContentDisposition = ContentDisposition::from_raw(&a).unwrap(); let b = ContentDisposition { disposition: DispositionType::FormData, parameters: vec![ DispositionParam::Unknown("dummy".to_owned(), "3".to_owned()), DispositionParam::Name("upload".to_owned()), DispositionParam::Filename( ['s', 'a', 'm', 'p', '\"', 'l', 'e', '.', 'p', 'n', 'g'] .iter() .collect(), ), ], };
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
true
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/accept.rs
actix-web/src/http/header/accept.rs
use std::cmp::Ordering; use mime::Mime; use super::{common_header, QualityItem}; use crate::http::header; common_header! { /// `Accept` header, defined in [RFC 7231 §5.3.2]. /// /// The `Accept` header field can be used by user agents to specify /// response media types that are acceptable. Accept header fields can /// be used to indicate that the request is specifically limited to a /// small set of desired types, as in the case of a request for an /// in-line image /// /// # ABNF /// ```plain /// Accept = #( media-range [ accept-params ] ) /// /// media-range = ( "*/*" /// / ( type "/" "*" ) /// / ( type "/" subtype ) /// ) *( OWS ";" OWS parameter ) /// accept-params = weight *( accept-ext ) /// accept-ext = OWS ";" OWS token [ "=" ( token / quoted-string ) ] /// ``` /// /// # Example Values /// * `audio/*; q=0.2, audio/basic` /// * `text/plain; q=0.5, text/html, text/x-dvi; q=0.8, text/x-c` /// /// # Examples /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{Accept, QualityItem}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// Accept(vec![ /// QualityItem::max(mime::TEXT_HTML), /// ]) /// ); /// ``` /// /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{Accept, QualityItem}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// Accept(vec![ /// QualityItem::max(mime::APPLICATION_JSON), /// ]) /// ); /// ``` /// /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{Accept, QualityItem, q}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// Accept(vec![ /// QualityItem::max(mime::TEXT_HTML), /// QualityItem::max("application/xhtml+xml".parse().unwrap()), /// QualityItem::new(mime::TEXT_XML, q(0.9)), /// QualityItem::max("image/webp".parse().unwrap()), /// QualityItem::new(mime::STAR_STAR, q(0.8)), /// ]) /// ); /// ``` /// /// [RFC 7231 §5.3.2]: https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.2 (Accept, header::ACCEPT) => (QualityItem<Mime>)* test_parse_and_format { // Tests from the RFC crate::http::header::common_header_test!( test1, [b"audio/*; q=0.2, audio/basic"], Some(Accept(vec![ QualityItem::new("audio/*".parse().unwrap(), q(0.2)), QualityItem::max("audio/basic".parse().unwrap()), ]))); crate::http::header::common_header_test!( test2, [b"text/plain; q=0.5, text/html, text/x-dvi; q=0.8, text/x-c"], Some(Accept(vec![ QualityItem::new(mime::TEXT_PLAIN, q(0.5)), QualityItem::max(mime::TEXT_HTML), QualityItem::new( "text/x-dvi".parse().unwrap(), q(0.8)), QualityItem::max("text/x-c".parse().unwrap()), ]))); // Custom tests crate::http::header::common_header_test!( test3, [b"text/plain; charset=utf-8"], Some(Accept(vec![ QualityItem::max(mime::TEXT_PLAIN_UTF_8), ]))); crate::http::header::common_header_test!( test4, [b"text/plain; charset=utf-8; q=0.5"], Some(Accept(vec![ QualityItem::new(mime::TEXT_PLAIN_UTF_8, q(0.5)), ]))); #[test] fn test_fuzzing1() { let req = test::TestRequest::default() .insert_header((header::ACCEPT, "chunk#;e")) .finish(); let header = Accept::parse(&req); assert!(header.is_ok()); } } } impl Accept { /// Construct `Accept: */*`. pub fn star() -> Accept { Accept(vec![QualityItem::max(mime::STAR_STAR)]) } /// Construct `Accept: application/json`. pub fn json() -> Accept { Accept(vec![QualityItem::max(mime::APPLICATION_JSON)]) } /// Construct `Accept: text/*`. pub fn text() -> Accept { Accept(vec![QualityItem::max(mime::TEXT_STAR)]) } /// Construct `Accept: image/*`. pub fn image() -> Accept { Accept(vec![QualityItem::max(mime::IMAGE_STAR)]) } /// Construct `Accept: text/html`. pub fn html() -> Accept { Accept(vec![QualityItem::max(mime::TEXT_HTML)]) } // TODO: method for getting best content encoding based on q-factors, available from server side // and if none are acceptable return None /// Extracts the most preferable mime type, accounting for [q-factor weighting]. /// /// If no q-factors are provided, the first mime type is chosen. Note that items without /// q-factors are given the maximum preference value. /// /// As per the spec, will return [`mime::STAR_STAR`] (indicating no preference) if the contained /// list is empty. /// /// [q-factor weighting]: https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.2 pub fn preference(&self) -> Mime { use actix_http::header::Quality; let mut max_item = None; let mut max_pref = Quality::ZERO; // uses manual max lookup loop since we want the first occurrence in the case of same // preference but `Iterator::max_by_key` would give us the last occurrence for pref in &self.0 { // only change if strictly greater // equal items, even while unsorted, still have higher preference if they appear first if pref.quality > max_pref { max_pref = pref.quality; max_item = Some(pref.item.clone()); } } max_item.unwrap_or(mime::STAR_STAR) } /// Returns a sorted list of mime types from highest to lowest preference, accounting for /// [q-factor weighting] and specificity. /// /// [q-factor weighting]: https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.2 pub fn ranked(&self) -> Vec<Mime> { if self.is_empty() { return vec![]; } let mut types = self.0.clone(); // use stable sort so items with equal q-factor and specificity retain listed order types.sort_by(|a, b| { // sort by q-factor descending b.quality.cmp(&a.quality).then_with(|| { // use specificity rules on mime types with // same q-factor (eg. text/html > text/* > */*) // subtypes are not comparable if main type is star, so return match (a.item.type_(), b.item.type_()) { (mime::STAR, mime::STAR) => return Ordering::Equal, // a is sorted after b (mime::STAR, _) => return Ordering::Greater, // a is sorted before b (_, mime::STAR) => return Ordering::Less, _ => {} } // in both these match expressions, the returned ordering appears // inverted because sort is high-to-low ("descending") precedence match (a.item.subtype(), b.item.subtype()) { (mime::STAR, mime::STAR) => Ordering::Equal, // a is sorted after b (mime::STAR, _) => Ordering::Greater, // a is sorted before b (_, mime::STAR) => Ordering::Less, _ => Ordering::Equal, } }) }); types.into_iter().map(|qitem| qitem.item).collect() } } #[cfg(test)] mod tests { use super::*; use crate::http::header::q; #[test] fn ranking_precedence() { let test = Accept(vec![]); assert!(test.ranked().is_empty()); let test = Accept(vec![QualityItem::max(mime::APPLICATION_JSON)]); assert_eq!(test.ranked(), vec![mime::APPLICATION_JSON]); let test = Accept(vec![ QualityItem::max(mime::TEXT_HTML), "application/xhtml+xml".parse().unwrap(), QualityItem::new("application/xml".parse().unwrap(), q(0.9)), QualityItem::new(mime::STAR_STAR, q(0.8)), ]); assert_eq!( test.ranked(), vec![ mime::TEXT_HTML, "application/xhtml+xml".parse().unwrap(), "application/xml".parse().unwrap(), mime::STAR_STAR, ] ); let test = Accept(vec![ QualityItem::max(mime::STAR_STAR), QualityItem::max(mime::IMAGE_STAR), QualityItem::max(mime::IMAGE_PNG), ]); assert_eq!( test.ranked(), vec![mime::IMAGE_PNG, mime::IMAGE_STAR, mime::STAR_STAR] ); } #[test] fn preference_selection() { let test = Accept(vec![ QualityItem::max(mime::TEXT_HTML), "application/xhtml+xml".parse().unwrap(), QualityItem::new("application/xml".parse().unwrap(), q(0.9)), QualityItem::new(mime::STAR_STAR, q(0.8)), ]); assert_eq!(test.preference(), mime::TEXT_HTML); let test = Accept(vec![ QualityItem::new("video/*".parse().unwrap(), q(0.8)), QualityItem::max(mime::IMAGE_PNG), QualityItem::new(mime::STAR_STAR, q(0.5)), QualityItem::max(mime::IMAGE_SVG), QualityItem::new(mime::IMAGE_STAR, q(0.8)), ]); assert_eq!(test.preference(), mime::IMAGE_PNG); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/allow.rs
actix-web/src/http/header/allow.rs
use actix_http::Method; use crate::http::header; crate::http::header::common_header! { /// `Allow` header, defined /// in [RFC 7231 §7.4.1](https://datatracker.ietf.org/doc/html/rfc7231#section-7.4.1) /// /// The `Allow` header field lists the set of methods advertised as /// supported by the target resource. The purpose of this field is /// strictly to inform the recipient of valid request methods associated /// with the resource. /// /// # ABNF /// ```plain /// Allow = #method /// ``` /// /// # Example Values /// * `GET, HEAD, PUT` /// * `OPTIONS, GET, PUT, POST, DELETE, HEAD, TRACE, CONNECT, PATCH, fOObAr` /// * `` /// /// # Examples /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::{header::Allow, Method}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// Allow(vec![Method::GET]) /// ); /// ``` /// /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::{header::Allow, Method}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// Allow(vec![ /// Method::GET, /// Method::POST, /// Method::PATCH, /// ]) /// ); /// ``` (Allow, header::ALLOW) => (Method)* test_parse_and_format { // from the RFC crate::http::header::common_header_test!( test1, [b"GET, HEAD, PUT"], Some(HeaderField(vec![Method::GET, Method::HEAD, Method::PUT]))); // other tests crate::http::header::common_header_test!( test2, [b"OPTIONS, GET, PUT, POST, DELETE, HEAD, TRACE, CONNECT, PATCH"], Some(HeaderField(vec![ Method::OPTIONS, Method::GET, Method::PUT, Method::POST, Method::DELETE, Method::HEAD, Method::TRACE, Method::CONNECT, Method::PATCH]))); crate::http::header::common_header_test!( test3, [b""], Some(HeaderField(Vec::<Method>::new()))); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/cache_control.rs
actix-web/src/http/header/cache_control.rs
use std::{fmt, str}; use super::common_header; use crate::http::header; common_header! { /// `Cache-Control` header, defined /// in [RFC 7234 §5.2](https://datatracker.ietf.org/doc/html/rfc7234#section-5.2). /// /// The `Cache-Control` header field is used to specify directives for /// caches along the request/response chain. Such cache directives are /// unidirectional in that the presence of a directive in a request does /// not imply that the same directive is to be given in the response. /// /// # ABNF /// ```text /// Cache-Control = 1#cache-directive /// cache-directive = token [ "=" ( token / quoted-string ) ] /// ``` /// /// # Example Values /// * `no-cache` /// * `private, community="UCI"` /// * `max-age=30` /// /// # Examples /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{CacheControl, CacheDirective}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header(CacheControl(vec![CacheDirective::MaxAge(86400u32)])); /// ``` /// /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{CacheControl, CacheDirective}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header(CacheControl(vec![ /// CacheDirective::NoCache, /// CacheDirective::Private, /// CacheDirective::MaxAge(360u32), /// CacheDirective::Extension("foo".to_owned(), Some("bar".to_owned())), /// ])); /// ``` (CacheControl, header::CACHE_CONTROL) => (CacheDirective)+ test_parse_and_format { common_header_test!(no_headers, [b""; 0], None); common_header_test!(empty_header, [b""; 1], None); common_header_test!(bad_syntax, [b"foo="], None); common_header_test!( multiple_headers, [&b"no-cache"[..], &b"private"[..]], Some(CacheControl(vec![ CacheDirective::NoCache, CacheDirective::Private, ])) ); common_header_test!( argument, [b"max-age=100, private"], Some(CacheControl(vec![ CacheDirective::MaxAge(100), CacheDirective::Private, ])) ); common_header_test!( extension, [b"foo, bar=baz"], Some(CacheControl(vec![ CacheDirective::Extension("foo".to_owned(), None), CacheDirective::Extension("bar".to_owned(), Some("baz".to_owned())), ])) ); #[test] fn parse_quote_form() { let req = test::TestRequest::default() .insert_header((header::CACHE_CONTROL, "max-age=\"200\"")) .finish(); assert_eq!( Header::parse(&req).ok(), Some(CacheControl(vec![CacheDirective::MaxAge(200)])) ) } } } /// `CacheControl` contains a list of these directives. #[derive(Debug, Clone, PartialEq, Eq)] pub enum CacheDirective { /// "no-cache" NoCache, /// "no-store" NoStore, /// "no-transform" NoTransform, /// "only-if-cached" OnlyIfCached, // request directives /// "max-age=delta" MaxAge(u32), /// "max-stale=delta" MaxStale(u32), /// "min-fresh=delta" MinFresh(u32), // response directives /// "must-revalidate" MustRevalidate, /// "public" Public, /// "private" Private, /// "proxy-revalidate" ProxyRevalidate, /// "s-maxage=delta" SMaxAge(u32), /// Extension directives. Optionally include an argument. Extension(String, Option<String>), } impl fmt::Display for CacheDirective { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { use self::CacheDirective::*; let dir_str = match self { NoCache => "no-cache", NoStore => "no-store", NoTransform => "no-transform", OnlyIfCached => "only-if-cached", MaxAge(secs) => return write!(f, "max-age={}", secs), MaxStale(secs) => return write!(f, "max-stale={}", secs), MinFresh(secs) => return write!(f, "min-fresh={}", secs), MustRevalidate => "must-revalidate", Public => "public", Private => "private", ProxyRevalidate => "proxy-revalidate", SMaxAge(secs) => return write!(f, "s-maxage={}", secs), Extension(name, None) => name.as_str(), Extension(name, Some(arg)) => return write!(f, "{}={}", name, arg), }; f.write_str(dir_str) } } impl str::FromStr for CacheDirective { type Err = Option<<u32 as str::FromStr>::Err>; fn from_str(s: &str) -> Result<Self, Self::Err> { use self::CacheDirective::*; match s { "" => Err(None), "no-cache" => Ok(NoCache), "no-store" => Ok(NoStore), "no-transform" => Ok(NoTransform), "only-if-cached" => Ok(OnlyIfCached), "must-revalidate" => Ok(MustRevalidate), "public" => Ok(Public), "private" => Ok(Private), "proxy-revalidate" => Ok(ProxyRevalidate), _ => match s.find('=') { Some(idx) if idx + 1 < s.len() => { match (&s[..idx], s[idx + 1..].trim_matches('"')) { ("max-age", secs) => secs.parse().map(MaxAge).map_err(Some), ("max-stale", secs) => secs.parse().map(MaxStale).map_err(Some), ("min-fresh", secs) => secs.parse().map(MinFresh).map_err(Some), ("s-maxage", secs) => secs.parse().map(SMaxAge).map_err(Some), (left, right) => Ok(Extension(left.to_owned(), Some(right.to_owned()))), } } Some(_) => Err(None), None => Ok(Extension(s.to_owned(), None)), }, } } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/if_modified_since.rs
actix-web/src/http/header/if_modified_since.rs
use super::{HttpDate, IF_MODIFIED_SINCE}; crate::http::header::common_header! { /// `If-Modified-Since` header, defined /// in [RFC 7232 §3.3](https://datatracker.ietf.org/doc/html/rfc7232#section-3.3) /// /// The `If-Modified-Since` header field makes a GET or HEAD request /// method conditional on the selected representation's modification date /// being more recent than the date provided in the field-value. /// Transfer of the selected representation's data is avoided if that /// data has not changed. /// /// # ABNF /// ```plain /// If-Unmodified-Since = HTTP-date /// ``` /// /// # Example Values /// * `Sat, 29 Oct 1994 19:43:31 GMT` /// /// # Examples /// /// ``` /// use std::time::{SystemTime, Duration}; /// use actix_web::HttpResponse; /// use actix_web::http::header::IfModifiedSince; /// /// let mut builder = HttpResponse::Ok(); /// let modified = SystemTime::now() - Duration::from_secs(60 * 60 * 24); /// builder.insert_header( /// IfModifiedSince(modified.into()) /// ); /// ``` (IfModifiedSince, IF_MODIFIED_SINCE) => [HttpDate] test_parse_and_format { // Test case from RFC crate::http::header::common_header_test!(test1, [b"Sat, 29 Oct 1994 19:43:31 GMT"]); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/content_range.rs
actix-web/src/http/header/content_range.rs
use std::{ fmt::{self, Display, Write}, str::FromStr, }; use super::{HeaderValue, InvalidHeaderValue, TryIntoHeaderValue, Writer, CONTENT_RANGE}; use crate::error::ParseError; crate::http::header::common_header! { /// `Content-Range` header, defined /// in [RFC 7233 §4.2](https://datatracker.ietf.org/doc/html/rfc7233#section-4.2) (ContentRange, CONTENT_RANGE) => [ContentRangeSpec] test_parse_and_format { crate::http::header::common_header_test!(test_bytes, [b"bytes 0-499/500"], Some(ContentRange(ContentRangeSpec::Bytes { range: Some((0, 499)), instance_length: Some(500) }))); crate::http::header::common_header_test!(test_bytes_unknown_len, [b"bytes 0-499/*"], Some(ContentRange(ContentRangeSpec::Bytes { range: Some((0, 499)), instance_length: None }))); crate::http::header::common_header_test!(test_bytes_unknown_range, [b"bytes */500"], Some(ContentRange(ContentRangeSpec::Bytes { range: None, instance_length: Some(500) }))); crate::http::header::common_header_test!(test_unregistered, [b"seconds 1-2"], Some(ContentRange(ContentRangeSpec::Unregistered { unit: "seconds".to_owned(), resp: "1-2".to_owned() }))); crate::http::header::common_header_test!(test_no_len, [b"bytes 0-499"], None::<ContentRange>); crate::http::header::common_header_test!(test_only_unit, [b"bytes"], None::<ContentRange>); crate::http::header::common_header_test!(test_end_less_than_start, [b"bytes 499-0/500"], None::<ContentRange>); crate::http::header::common_header_test!(test_blank, [b""], None::<ContentRange>); crate::http::header::common_header_test!(test_bytes_many_spaces, [b"bytes 1-2/500 3"], None::<ContentRange>); crate::http::header::common_header_test!(test_bytes_many_slashes, [b"bytes 1-2/500/600"], None::<ContentRange>); crate::http::header::common_header_test!(test_bytes_many_dashes, [b"bytes 1-2-3/500"], None::<ContentRange>); } } /// Content-Range header, defined /// in [RFC 7233 §4.2](https://datatracker.ietf.org/doc/html/rfc7233#section-4.2) /// /// # ABNF /// ```plain /// Content-Range = byte-content-range /// / other-content-range /// /// byte-content-range = bytes-unit SP /// ( byte-range-resp / unsatisfied-range ) /// /// byte-range-resp = byte-range "/" ( complete-length / "*" ) /// byte-range = first-byte-pos "-" last-byte-pos /// unsatisfied-range = "*/" complete-length /// /// complete-length = 1*DIGIT /// /// other-content-range = other-range-unit SP other-range-resp /// other-range-resp = *CHAR /// ``` #[derive(Debug, Clone, PartialEq, Eq)] pub enum ContentRangeSpec { /// Byte range Bytes { /// First and last bytes of the range, omitted if request could not be /// satisfied range: Option<(u64, u64)>, /// Total length of the instance, can be omitted if unknown instance_length: Option<u64>, }, /// Custom range, with unit not registered at IANA Unregistered { /// other-range-unit unit: String, /// other-range-resp resp: String, }, } impl FromStr for ContentRangeSpec { type Err = ParseError; fn from_str(s: &str) -> Result<Self, ParseError> { let res = match s.split_once(' ') { Some(("bytes", resp)) => { let (range, instance_length) = resp.split_once('/').ok_or(ParseError::Header)?; let instance_length = if instance_length == "*" { None } else { Some(instance_length.parse().map_err(|_| ParseError::Header)?) }; let range = if range == "*" { None } else { let (first_byte, last_byte) = range.split_once('-').ok_or(ParseError::Header)?; let first_byte = first_byte.parse().map_err(|_| ParseError::Header)?; let last_byte = last_byte.parse().map_err(|_| ParseError::Header)?; if last_byte < first_byte { return Err(ParseError::Header); } Some((first_byte, last_byte)) }; ContentRangeSpec::Bytes { range, instance_length, } } Some((unit, resp)) => ContentRangeSpec::Unregistered { unit: unit.to_owned(), resp: resp.to_owned(), }, _ => return Err(ParseError::Header), }; Ok(res) } } impl Display for ContentRangeSpec { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { match *self { ContentRangeSpec::Bytes { range, instance_length, } => { f.write_str("bytes ")?; match range { Some((first_byte, last_byte)) => { write!(f, "{}-{}", first_byte, last_byte)?; } None => { f.write_str("*")?; } }; f.write_str("/")?; if let Some(v) = instance_length { write!(f, "{}", v) } else { f.write_str("*") } } ContentRangeSpec::Unregistered { ref unit, ref resp } => { f.write_str(unit)?; f.write_str(" ")?; f.write_str(resp) } } } } impl TryIntoHeaderValue for ContentRangeSpec { type Error = InvalidHeaderValue; fn try_into_value(self) -> Result<HeaderValue, Self::Error> { let mut writer = Writer::new(); let _ = write!(&mut writer, "{}", self); HeaderValue::from_maybe_shared(writer.take()) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/content_type.rs
actix-web/src/http/header/content_type.rs
use mime::Mime; use super::CONTENT_TYPE; crate::http::header::common_header! { /// `Content-Type` header, defined in [RFC 9110 §8.3]. /// /// The `Content-Type` header field indicates the media type of the associated representation: /// either the representation enclosed in the message payload or the selected representation, /// as determined by the message semantics. The indicated media type defines both the data /// format and how that data is intended to be processed by a recipient, within the scope of the /// received message semantics, after any content codings indicated by Content-Encoding are /// decoded. /// /// Although the `mime` crate allows the mime options to be any slice, this crate forces the use /// of Vec. This is to make sure the same header can't have more than 1 type. If this is an /// issue, it's possible to implement `Header` on a custom struct. /// /// # ABNF /// /// ```plain /// Content-Type = media-type /// ``` /// /// # Example Values /// /// - `text/html; charset=utf-8` /// - `application/json` /// /// # Examples /// /// ``` /// use actix_web::{http::header::ContentType, HttpResponse}; /// /// let res_json = HttpResponse::Ok() /// .insert_header(ContentType::json()); /// /// let res_html = HttpResponse::Ok() /// .insert_header(ContentType(mime::TEXT_HTML)); /// ``` /// /// [RFC 9110 §8.3]: https://datatracker.ietf.org/doc/html/rfc9110#section-8.3 (ContentType, CONTENT_TYPE) => [Mime] test_parse_and_format { crate::http::header::common_header_test!( test_text_html, [b"text/html"], Some(HeaderField(mime::TEXT_HTML))); crate::http::header::common_header_test!( test_image_star, [b"image/*"], Some(HeaderField(mime::IMAGE_STAR))); } } impl ContentType { /// Constructs a `Content-Type: application/json` header. #[inline] pub fn json() -> ContentType { ContentType(mime::APPLICATION_JSON) } /// Constructs a `Content-Type: text/plain; charset=utf-8` header. #[inline] pub fn plaintext() -> ContentType { ContentType(mime::TEXT_PLAIN_UTF_8) } /// Constructs a `Content-Type: text/html; charset=utf-8` header. #[inline] pub fn html() -> ContentType { ContentType(mime::TEXT_HTML_UTF_8) } /// Constructs a `Content-Type: text/xml` header. #[inline] pub fn xml() -> ContentType { ContentType(mime::TEXT_XML) } /// Constructs a `Content-Type: application/www-form-url-encoded` header. #[inline] pub fn form_url_encoded() -> ContentType { ContentType(mime::APPLICATION_WWW_FORM_URLENCODED) } /// Constructs a `Content-Type: image/jpeg` header. #[inline] pub fn jpeg() -> ContentType { ContentType(mime::IMAGE_JPEG) } /// Constructs a `Content-Type: image/png` header. #[inline] pub fn png() -> ContentType { ContentType(mime::IMAGE_PNG) } /// Constructs a `Content-Type: application/octet-stream` header. #[inline] pub fn octet_stream() -> ContentType { ContentType(mime::APPLICATION_OCTET_STREAM) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/if_match.rs
actix-web/src/http/header/if_match.rs
use super::{common_header, EntityTag, IF_MATCH}; common_header! { /// `If-Match` header, defined /// in [RFC 7232 §3.1](https://datatracker.ietf.org/doc/html/rfc7232#section-3.1) /// /// The `If-Match` header field makes the request method conditional on /// the recipient origin server either having at least one current /// representation of the target resource, when the field-value is "*", /// or having a current representation of the target resource that has an /// entity-tag matching a member of the list of entity-tags provided in /// the field-value. /// /// An origin server MUST use the strong comparison function when /// comparing entity-tags for `If-Match`, since the client /// intends this precondition to prevent the method from being applied if /// there have been any changes to the representation data. /// /// # ABNF /// ```plain /// If-Match = "*" / 1#entity-tag /// ``` /// /// # Example Values /// * `"xyzzy"` /// * "xyzzy", "r2d2xxxx", "c3piozzzz" /// /// # Examples /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::IfMatch; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header(IfMatch::Any); /// ``` /// /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{IfMatch, EntityTag}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// IfMatch::Items(vec![ /// EntityTag::new(false, "xyzzy".to_owned()), /// EntityTag::new(false, "foobar".to_owned()), /// EntityTag::new(false, "bazquux".to_owned()), /// ]) /// ); /// ``` (IfMatch, IF_MATCH) => {Any / (EntityTag)+} test_parse_and_format { crate::http::header::common_header_test!( test1, [b"\"xyzzy\""], Some(HeaderField::Items( vec![EntityTag::new_strong("xyzzy".to_owned())]))); crate::http::header::common_header_test!( test2, [b"\"xyzzy\", \"r2d2xxxx\", \"c3piozzzz\""], Some(HeaderField::Items( vec![EntityTag::new_strong("xyzzy".to_owned()), EntityTag::new_strong("r2d2xxxx".to_owned()), EntityTag::new_strong("c3piozzzz".to_owned())]))); crate::http::header::common_header_test!(test3, [b"*"], Some(IfMatch::Any)); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/any_or_some.rs
actix-web/src/http/header/any_or_some.rs
use std::{ fmt::{self, Write as _}, str, }; /// A wrapper for types used in header values where wildcard (`*`) items are allowed but the /// underlying type does not support them. /// /// For example, we use the `language-tags` crate for the [`AcceptLanguage`](super::AcceptLanguage) /// typed header but it does parse `*` successfully. On the other hand, the `mime` crate, used for /// [`Accept`](super::Accept), has first-party support for wildcard items so this wrapper is not /// used in those header types. #[derive(Clone, Copy, Debug, PartialEq, Eq, PartialOrd, Hash)] pub enum AnyOrSome<T> { /// A wildcard value. Any, /// A valid `T`. Item(T), } impl<T> AnyOrSome<T> { /// Returns true if item is wildcard (`*`) variant. pub fn is_any(&self) -> bool { matches!(self, Self::Any) } /// Returns true if item is a valid item (`T`) variant. pub fn is_item(&self) -> bool { matches!(self, Self::Item(_)) } /// Returns reference to value in `Item` variant, if it is set. pub fn item(&self) -> Option<&T> { match self { AnyOrSome::Item(ref item) => Some(item), AnyOrSome::Any => None, } } /// Consumes the container, returning the value in the `Item` variant, if it is set. pub fn into_item(self) -> Option<T> { match self { AnyOrSome::Item(item) => Some(item), AnyOrSome::Any => None, } } } impl<T: fmt::Display> fmt::Display for AnyOrSome<T> { #[inline] fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { match self { AnyOrSome::Any => f.write_char('*'), AnyOrSome::Item(item) => fmt::Display::fmt(item, f), } } } impl<T: str::FromStr> str::FromStr for AnyOrSome<T> { type Err = T::Err; #[inline] fn from_str(s: &str) -> Result<Self, Self::Err> { match s.trim() { "*" => Ok(Self::Any), other => other.parse().map(AnyOrSome::Item), } } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/macros.rs
actix-web/src/http/header/macros.rs
macro_rules! common_header_test_module { ($id:ident, $tm:ident{$($tf:item)*}) => { #[cfg(test)] mod $tm { #![allow(unused_imports)] use ::core::str; use ::actix_http::{Method, test}; use ::mime::*; use $crate::http::header::{self, *}; use super::{$id as HeaderField, *}; $($tf)* } } } #[cfg(test)] macro_rules! common_header_test { ($id:ident, $raw:expr) => { #[test] fn $id() { use ::actix_http::test; let raw = $raw; let headers = raw.iter().map(|x| x.to_vec()).collect::<Vec<_>>(); let mut req = test::TestRequest::default(); for item in headers { req = req.append_header((HeaderField::name(), item)).take(); } let req = req.finish(); let value = HeaderField::parse(&req); let result = format!("{}", value.unwrap()); let expected = ::std::string::String::from_utf8(raw[0].to_vec()).unwrap(); let result_cmp: Vec<String> = result .to_ascii_lowercase() .split(' ') .map(|x| x.to_owned()) .collect(); let expected_cmp: Vec<String> = expected .to_ascii_lowercase() .split(' ') .map(|x| x.to_owned()) .collect(); assert_eq!(result_cmp.concat(), expected_cmp.concat()); } }; ($id:ident, $raw:expr, $exp:expr) => { #[test] fn $id() { use actix_http::test; let headers = $raw.iter().map(|x| x.to_vec()).collect::<Vec<_>>(); let mut req = test::TestRequest::default(); for item in headers { req.append_header((HeaderField::name(), item)); } let req = req.finish(); let val = HeaderField::parse(&req); let exp: ::core::option::Option<HeaderField> = $exp; // test parsing assert_eq!(val.ok(), exp); // test formatting if let Some(exp) = exp { let raw = &($raw)[..]; let mut iter = raw.iter().map(|b| str::from_utf8(&b[..]).unwrap()); let mut joined = String::new(); if let Some(s) = iter.next() { joined.push_str(s); for s in iter { joined.push_str(", "); joined.push_str(s); } } assert_eq!(format!("{}", exp), joined); } } }; } macro_rules! common_header { // TODO: these docs are wrong, there's no $n or $nn // $attrs:meta: Attributes associated with the header item (usually docs) // $id:ident: Identifier of the header // $n:expr: Lowercase name of the header // $nn:expr: Nice name of the header // List header, zero or more items ($(#[$attrs:meta])*($id:ident, $name:expr) => ($item:ty)*) => { $(#[$attrs])* #[derive(Debug, Clone, PartialEq, Eq, ::derive_more::Deref, ::derive_more::DerefMut)] pub struct $id(pub Vec<$item>); impl $crate::http::header::Header for $id { #[inline] fn name() -> $crate::http::header::HeaderName { $name } #[inline] fn parse<M: $crate::HttpMessage>(msg: &M) -> Result<Self, $crate::error::ParseError> { let headers = msg.headers().get_all(Self::name()); $crate::http::header::from_comma_delimited(headers).map($id) } } impl ::core::fmt::Display for $id { #[inline] fn fmt(&self, f: &mut ::core::fmt::Formatter<'_>) -> ::core::fmt::Result { $crate::http::header::fmt_comma_delimited(f, &self.0[..]) } } impl $crate::http::header::TryIntoHeaderValue for $id { type Error = $crate::http::header::InvalidHeaderValue; #[inline] fn try_into_value(self) -> Result<$crate::http::header::HeaderValue, Self::Error> { use ::core::fmt::Write; let mut writer = $crate::http::header::Writer::new(); let _ = write!(&mut writer, "{}", self); $crate::http::header::HeaderValue::from_maybe_shared(writer.take()) } } }; // List header, one or more items ($(#[$attrs:meta])*($id:ident, $name:expr) => ($item:ty)+) => { $(#[$attrs])* #[derive(Debug, Clone, PartialEq, Eq, ::derive_more::Deref, ::derive_more::DerefMut)] pub struct $id(pub Vec<$item>); impl $crate::http::header::Header for $id { #[inline] fn name() -> $crate::http::header::HeaderName { $name } #[inline] fn parse<M: $crate::HttpMessage>(msg: &M) -> Result<Self, $crate::error::ParseError>{ let headers = msg.headers().get_all(Self::name()); $crate::http::header::from_comma_delimited(headers) .and_then(|items| { if items.is_empty() { Err($crate::error::ParseError::Header) } else { Ok($id(items)) } }) } } impl ::core::fmt::Display for $id { #[inline] fn fmt(&self, f: &mut ::core::fmt::Formatter<'_>) -> ::core::fmt::Result { $crate::http::header::fmt_comma_delimited(f, &self.0[..]) } } impl $crate::http::header::TryIntoHeaderValue for $id { type Error = $crate::http::header::InvalidHeaderValue; #[inline] fn try_into_value(self) -> Result<$crate::http::header::HeaderValue, Self::Error> { use ::core::fmt::Write; let mut writer = $crate::http::header::Writer::new(); let _ = write!(&mut writer, "{}", self); $crate::http::header::HeaderValue::from_maybe_shared(writer.take()) } } }; // Single value header ($(#[$attrs:meta])*($id:ident, $name:expr) => [$value:ty]) => { $(#[$attrs])* #[derive(Debug, Clone, PartialEq, Eq, ::derive_more::Deref, ::derive_more::DerefMut)] pub struct $id(pub $value); impl $crate::http::header::Header for $id { #[inline] fn name() -> $crate::http::header::HeaderName { $name } #[inline] fn parse<M: $crate::HttpMessage>(msg: &M) -> Result<Self, $crate::error::ParseError> { let header = msg.headers().get(Self::name()); $crate::http::header::from_one_raw_str(header).map($id) } } impl ::core::fmt::Display for $id { #[inline] fn fmt(&self, f: &mut ::core::fmt::Formatter<'_>) -> ::core::fmt::Result { ::core::fmt::Display::fmt(&self.0, f) } } impl $crate::http::header::TryIntoHeaderValue for $id { type Error = $crate::http::header::InvalidHeaderValue; #[inline] fn try_into_value(self) -> Result<$crate::http::header::HeaderValue, Self::Error> { self.0.try_into_value() } } }; // List header, one or more items with "*" option ($(#[$attrs:meta])*($id:ident, $name:expr) => {Any / ($item:ty)+}) => { $(#[$attrs])* #[derive(Clone, Debug, PartialEq, Eq)] pub enum $id { /// Any value is a match Any, /// Only the listed items are a match Items(Vec<$item>), } impl $crate::http::header::Header for $id { #[inline] fn name() -> $crate::http::header::HeaderName { $name } #[inline] fn parse<M: $crate::HttpMessage>(msg: &M) -> Result<Self, $crate::error::ParseError> { let is_any = msg .headers() .get(Self::name()) .and_then(|hdr| hdr.to_str().ok()) .map(|hdr| hdr.trim() == "*"); if let Some(true) = is_any { Ok($id::Any) } else { let headers = msg.headers().get_all(Self::name()); Ok($id::Items($crate::http::header::from_comma_delimited(headers)?)) } } } impl ::core::fmt::Display for $id { #[inline] fn fmt(&self, f: &mut ::core::fmt::Formatter<'_>) -> ::core::fmt::Result { match *self { $id::Any => f.write_str("*"), $id::Items(ref fields) => $crate::http::header::fmt_comma_delimited(f, &fields[..]) } } } impl $crate::http::header::TryIntoHeaderValue for $id { type Error = $crate::http::header::InvalidHeaderValue; #[inline] fn try_into_value(self) -> Result<$crate::http::header::HeaderValue, Self::Error> { use ::core::fmt::Write; let mut writer = $crate::http::header::Writer::new(); let _ = write!(&mut writer, "{}", self); $crate::http::header::HeaderValue::from_maybe_shared(writer.take()) } } }; // optional test module ($(#[$attrs:meta])*($id:ident, $name:expr) => ($item:ty)* $tm:ident{$($tf:item)*}) => { crate::http::header::common_header! { $(#[$attrs])* ($id, $name) => ($item)* } crate::http::header::common_header_test_module! { $id, $tm { $($tf)* }} }; ($(#[$attrs:meta])*($id:ident, $n:expr) => ($item:ty)+ $tm:ident{$($tf:item)*}) => { crate::http::header::common_header! { $(#[$attrs])* ($id, $n) => ($item)+ } crate::http::header::common_header_test_module! { $id, $tm { $($tf)* }} }; ($(#[$attrs:meta])*($id:ident, $name:expr) => [$item:ty] $tm:ident{$($tf:item)*}) => { crate::http::header::common_header! { $(#[$attrs])* ($id, $name) => [$item] } crate::http::header::common_header_test_module! { $id, $tm { $($tf)* }} }; ($(#[$attrs:meta])*($id:ident, $name:expr) => {Any / ($item:ty)+} $tm:ident{$($tf:item)*}) => { crate::http::header::common_header! { $(#[$attrs])* ($id, $name) => {Any / ($item)+} } crate::http::header::common_header_test_module! { $id, $tm { $($tf)* }} }; } pub(crate) use common_header; #[cfg(test)] pub(crate) use common_header_test; pub(crate) use common_header_test_module;
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/preference.rs
actix-web/src/http/header/preference.rs
use std::{ fmt::{self, Write as _}, str, }; /// A wrapper for types used in header values where wildcard (`*`) items are allowed but the /// underlying type does not support them. /// /// For example, we use the `language-tags` crate for the [`AcceptLanguage`](super::AcceptLanguage) /// typed header but it does not parse `*` successfully. On the other hand, the `mime` crate, used /// for [`Accept`](super::Accept), has first-party support for wildcard items so this wrapper is not /// used in those header types. #[derive(Clone, Copy, Debug, PartialEq, Eq, PartialOrd, Hash)] pub enum Preference<T> { /// A wildcard value. Any, /// A valid `T`. Specific(T), } impl<T> Preference<T> { /// Returns true if preference is the any/wildcard (`*`) value. pub fn is_any(&self) -> bool { matches!(self, Self::Any) } /// Returns true if preference is the specific item (`T`) variant. pub fn is_specific(&self) -> bool { matches!(self, Self::Specific(_)) } /// Returns reference to value in `Specific` variant, if it is set. pub fn item(&self) -> Option<&T> { match self { Preference::Specific(ref item) => Some(item), Preference::Any => None, } } /// Consumes the container, returning the value in the `Specific` variant, if it is set. pub fn into_item(self) -> Option<T> { match self { Preference::Specific(item) => Some(item), Preference::Any => None, } } } impl<T: fmt::Display> fmt::Display for Preference<T> { #[inline] fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { match self { Preference::Any => f.write_char('*'), Preference::Specific(item) => fmt::Display::fmt(item, f), } } } impl<T: str::FromStr> str::FromStr for Preference<T> { type Err = T::Err; #[inline] fn from_str(s: &str) -> Result<Self, Self::Err> { match s.trim() { "*" => Ok(Self::Any), other => other.parse().map(Preference::Specific), } } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/mod.rs
actix-web/src/http/header/mod.rs
//! A Collection of Header implementations for common HTTP Headers. //! //! ## Mime Types //! Several header fields use MIME values for their contents. Keeping with the strongly-typed theme, //! the [mime] crate is used in such headers as [`ContentType`] and [`Accept`]. use std::fmt; // re-export from actix-http // - header name / value types // - relevant traits for converting to header name / value // - all const header names // - header map // - the few typed headers from actix-http // - header parsing utils pub use actix_http::header::*; use bytes::{Bytes, BytesMut}; mod accept; mod accept_charset; mod accept_encoding; mod accept_language; mod allow; mod cache_control; mod content_disposition; mod content_language; mod content_length; mod content_range; mod content_type; mod date; mod encoding; mod entity; mod etag; mod expires; mod if_match; mod if_modified_since; mod if_none_match; mod if_range; mod if_unmodified_since; mod last_modified; mod macros; mod preference; mod range; #[cfg(test)] pub(crate) use self::macros::common_header_test; pub(crate) use self::macros::{common_header, common_header_test_module}; pub use self::{ accept::Accept, accept_charset::AcceptCharset, accept_encoding::AcceptEncoding, accept_language::AcceptLanguage, allow::Allow, cache_control::{CacheControl, CacheDirective}, content_disposition::{ContentDisposition, DispositionParam, DispositionType}, content_language::ContentLanguage, content_length::ContentLength, content_range::{ContentRange, ContentRangeSpec}, content_type::ContentType, date::Date, encoding::Encoding, entity::EntityTag, etag::ETag, expires::Expires, if_match::IfMatch, if_modified_since::IfModifiedSince, if_none_match::IfNoneMatch, if_range::IfRange, if_unmodified_since::IfUnmodifiedSince, last_modified::LastModified, preference::Preference, range::{ByteRangeSpec, Range}, }; /// Format writer ([`fmt::Write`]) for a [`BytesMut`]. #[derive(Debug, Default)] struct Writer { buf: BytesMut, } impl Writer { /// Constructs new bytes writer. pub fn new() -> Writer { Writer::default() } /// Splits bytes out of writer, leaving writer buffer empty. pub fn take(&mut self) -> Bytes { self.buf.split().freeze() } } impl fmt::Write for Writer { #[inline] fn write_str(&mut self, s: &str) -> fmt::Result { self.buf.extend_from_slice(s.as_bytes()); Ok(()) } #[inline] fn write_fmt(&mut self, args: fmt::Arguments<'_>) -> fmt::Result { fmt::write(self, args) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/accept_charset.rs
actix-web/src/http/header/accept_charset.rs
use super::{common_header, Charset, QualityItem, ACCEPT_CHARSET}; common_header! { /// `Accept-Charset` header, defined in [RFC 7231 §5.3.3]. /// /// The `Accept-Charset` header field can be sent by a user agent to /// indicate what charsets are acceptable in textual response content. /// This field allows user agents capable of understanding more /// comprehensive or special-purpose charsets to signal that capability /// to an origin server that is capable of representing information in /// those charsets. /// /// # ABNF /// ```plain /// Accept-Charset = 1#( ( charset / "*" ) [ weight ] ) /// ``` /// /// # Example Values /// * `iso-8859-5, unicode-1-1;q=0.8` /// /// # Examples /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{AcceptCharset, Charset, QualityItem}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// AcceptCharset(vec![QualityItem::max(Charset::Us_Ascii)]) /// ); /// ``` /// /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{AcceptCharset, Charset, q, QualityItem}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// AcceptCharset(vec![ /// QualityItem::new(Charset::Us_Ascii, q(0.9)), /// QualityItem::new(Charset::Iso_8859_10, q(0.2)), /// ]) /// ); /// ``` /// /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{AcceptCharset, Charset, QualityItem}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// AcceptCharset(vec![QualityItem::max(Charset::Ext("utf-8".to_owned()))]) /// ); /// ``` /// /// [RFC 7231 §5.3.3]: https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.3 (AcceptCharset, ACCEPT_CHARSET) => (QualityItem<Charset>)* test_parse_and_format { // Test case from RFC common_header_test!(test1, [b"iso-8859-5, unicode-1-1;q=0.8"]); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/last_modified.rs
actix-web/src/http/header/last_modified.rs
use super::{HttpDate, LAST_MODIFIED}; crate::http::header::common_header! { /// `Last-Modified` header, defined /// in [RFC 7232 §2.2](https://datatracker.ietf.org/doc/html/rfc7232#section-2.2) /// /// The `Last-Modified` header field in a response provides a timestamp /// indicating the date and time at which the origin server believes the /// selected representation was last modified, as determined at the /// conclusion of handling the request. /// /// # ABNF /// ```plain /// Expires = HTTP-date /// ``` /// /// # Example Values /// * `Sat, 29 Oct 1994 19:43:31 GMT` /// /// # Examples /// /// ``` /// use std::time::{SystemTime, Duration}; /// use actix_web::HttpResponse; /// use actix_web::http::header::LastModified; /// /// let mut builder = HttpResponse::Ok(); /// let modified = SystemTime::now() - Duration::from_secs(60 * 60 * 24); /// builder.insert_header( /// LastModified(modified.into()) /// ); /// ``` (LastModified, LAST_MODIFIED) => [HttpDate] test_parse_and_format { // Test case from RFC crate::http::header::common_header_test!(test1, [b"Sat, 29 Oct 1994 19:43:31 GMT"]); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/if_unmodified_since.rs
actix-web/src/http/header/if_unmodified_since.rs
use super::{HttpDate, IF_UNMODIFIED_SINCE}; crate::http::header::common_header! { /// `If-Unmodified-Since` header, defined /// in [RFC 7232 §3.4](https://datatracker.ietf.org/doc/html/rfc7232#section-3.4) /// /// The `If-Unmodified-Since` header field makes the request method /// conditional on the selected representation's last modification date /// being earlier than or equal to the date provided in the field-value. /// This field accomplishes the same purpose as If-Match for cases where /// the user agent does not have an entity-tag for the representation. /// /// # ABNF /// ```plain /// If-Unmodified-Since = HTTP-date /// ``` /// /// # Example Values /// * `Sat, 29 Oct 1994 19:43:31 GMT` /// /// # Examples /// /// ``` /// use std::time::{SystemTime, Duration}; /// use actix_web::HttpResponse; /// use actix_web::http::header::IfUnmodifiedSince; /// /// let mut builder = HttpResponse::Ok(); /// let modified = SystemTime::now() - Duration::from_secs(60 * 60 * 24); /// builder.insert_header( /// IfUnmodifiedSince(modified.into()) /// ); /// ``` (IfUnmodifiedSince, IF_UNMODIFIED_SINCE) => [HttpDate] test_parse_and_format { // Test case from RFC crate::http::header::common_header_test!(test1, [b"Sat, 29 Oct 1994 19:43:31 GMT"]); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/if_none_match.rs
actix-web/src/http/header/if_none_match.rs
use super::{EntityTag, IF_NONE_MATCH}; crate::http::header::common_header! { /// `If-None-Match` header, defined /// in [RFC 7232 §3.2](https://datatracker.ietf.org/doc/html/rfc7232#section-3.2) /// /// The `If-None-Match` header field makes the request method conditional /// on a recipient cache or origin server either not having any current /// representation of the target resource, when the field-value is "*", /// or having a selected representation with an entity-tag that does not /// match any of those listed in the field-value. /// /// A recipient MUST use the weak comparison function when comparing /// entity-tags for If-None-Match (Section 2.3.2), since weak entity-tags /// can be used for cache validation even if there have been changes to /// the representation data. /// /// # ABNF /// ```plain /// If-None-Match = "*" / 1#entity-tag /// ``` /// /// # Example Values /// * `"xyzzy"` /// * `W/"xyzzy"` /// * `"xyzzy", "r2d2xxxx", "c3piozzzz"` /// * `W/"xyzzy", W/"r2d2xxxx", W/"c3piozzzz"` /// * `*` /// /// # Examples /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::IfNoneMatch; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header(IfNoneMatch::Any); /// ``` /// /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{IfNoneMatch, EntityTag}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// IfNoneMatch::Items(vec![ /// EntityTag::new(false, "xyzzy".to_owned()), /// EntityTag::new(false, "foobar".to_owned()), /// EntityTag::new(false, "bazquux".to_owned()), /// ]) /// ); /// ``` (IfNoneMatch, IF_NONE_MATCH) => {Any / (EntityTag)+} test_parse_and_format { crate::http::header::common_header_test!(test1, [b"\"xyzzy\""]); crate::http::header::common_header_test!(test2, [b"W/\"xyzzy\""]); crate::http::header::common_header_test!(test3, [b"\"xyzzy\", \"r2d2xxxx\", \"c3piozzzz\""]); crate::http::header::common_header_test!(test4, [b"W/\"xyzzy\", W/\"r2d2xxxx\", W/\"c3piozzzz\""]); crate::http::header::common_header_test!(test5, [b"*"]); } } #[cfg(test)] mod tests { use actix_http::test::TestRequest; use super::IfNoneMatch; use crate::http::header::{EntityTag, Header, IF_NONE_MATCH}; #[test] fn test_if_none_match() { let req = TestRequest::default() .insert_header((IF_NONE_MATCH, "*")) .finish(); let mut if_none_match = IfNoneMatch::parse(&req); assert_eq!(if_none_match.ok(), Some(IfNoneMatch::Any)); let req = TestRequest::default() .insert_header((IF_NONE_MATCH, &b"\"foobar\", W/\"weak-etag\""[..])) .finish(); if_none_match = Header::parse(&req); let mut entities: Vec<EntityTag> = Vec::new(); let foobar_etag = EntityTag::new_strong("foobar".to_owned()); let weak_etag = EntityTag::new_weak("weak-etag".to_owned()); entities.push(foobar_etag); entities.push(weak_etag); assert_eq!(if_none_match.ok(), Some(IfNoneMatch::Items(entities))); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/etag.rs
actix-web/src/http/header/etag.rs
use super::{EntityTag, ETAG}; crate::http::header::common_header! { /// `ETag` header, defined in /// [RFC 7232 §2.3](https://datatracker.ietf.org/doc/html/rfc7232#section-2.3) /// /// The `ETag` header field in a response provides the current entity-tag /// for the selected representation, as determined at the conclusion of /// handling the request. An entity-tag is an opaque validator for /// differentiating between multiple representations of the same /// resource, regardless of whether those multiple representations are /// due to resource state changes over time, content negotiation /// resulting in multiple representations being valid at the same time, /// or both. An entity-tag consists of an opaque quoted string, possibly /// prefixed by a weakness indicator. /// /// # ABNF /// ```plain /// ETag = entity-tag /// ``` /// /// # Example Values /// * `"xyzzy"` /// * `W/"xyzzy"` /// * `""` /// /// # Examples /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{ETag, EntityTag}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// ETag(EntityTag::new_strong("xyzzy".to_owned())) /// ); /// ``` /// /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{ETag, EntityTag}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// ETag(EntityTag::new_weak("xyzzy".to_owned())) /// ); /// ``` (ETag, ETAG) => [EntityTag] test_parse_and_format { // From the RFC crate::http::header::common_header_test!(test1, [b"\"xyzzy\""], Some(ETag(EntityTag::new_strong("xyzzy".to_owned())))); crate::http::header::common_header_test!(test2, [b"W/\"xyzzy\""], Some(ETag(EntityTag::new_weak("xyzzy".to_owned())))); crate::http::header::common_header_test!(test3, [b"\"\""], Some(ETag(EntityTag::new_strong("".to_owned())))); // Own tests crate::http::header::common_header_test!(test4, [b"\"foobar\""], Some(ETag(EntityTag::new_strong("foobar".to_owned())))); crate::http::header::common_header_test!(test5, [b"\"\""], Some(ETag(EntityTag::new_strong("".to_owned())))); crate::http::header::common_header_test!(test6, [b"W/\"weak-etag\""], Some(ETag(EntityTag::new_weak("weak-etag".to_owned())))); crate::http::header::common_header_test!(test7, [b"W/\"\x65\x62\""], Some(ETag(EntityTag::new_weak("\u{0065}\u{0062}".to_owned())))); crate::http::header::common_header_test!(test8, [b"W/\"\""], Some(ETag(EntityTag::new_weak("".to_owned())))); crate::http::header::common_header_test!(test9, [b"no-dquotes"], None::<ETag>); crate::http::header::common_header_test!(test10, [b"w/\"the-first-w-is-case-sensitive\""], None::<ETag>); crate::http::header::common_header_test!(test11, [b""], None::<ETag>); crate::http::header::common_header_test!(test12, [b"\"unmatched-dquotes1"], None::<ETag>); crate::http::header::common_header_test!(test13, [b"unmatched-dquotes2\""], None::<ETag>); crate::http::header::common_header_test!(test14, [b"matched-\"dquotes\""], None::<ETag>); crate::http::header::common_header_test!(test15, [b"\""], None::<ETag>); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/accept_encoding.rs
actix-web/src/http/header/accept_encoding.rs
use std::collections::HashSet; use super::{common_header, ContentEncoding, Encoding, Preference, Quality, QualityItem}; use crate::http::header; common_header! { /// `Accept-Encoding` header, defined /// in [RFC 7231](https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.4) /// /// The `Accept-Encoding` header field can be used by user agents to indicate what response /// content-codings are acceptable in the response. An `identity` token is used as a synonym /// for "no encoding" in order to communicate when no encoding is preferred. /// /// # ABNF /// ```plain /// Accept-Encoding = #( codings [ weight ] ) /// codings = content-coding / "identity" / "*" /// ``` /// /// # Example Values /// * `compress, gzip` /// * `` /// * `*` /// * `compress;q=0.5, gzip;q=1` /// * `gzip;q=1.0, identity; q=0.5, *;q=0` /// /// # Examples /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{AcceptEncoding, Encoding, Preference, QualityItem}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// AcceptEncoding(vec![QualityItem::max(Preference::Specific(Encoding::gzip()))]) /// ); /// ``` /// /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{AcceptEncoding, Encoding, QualityItem}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// AcceptEncoding(vec![ /// "gzip".parse().unwrap(), /// "br".parse().unwrap(), /// ]) /// ); /// ``` (AcceptEncoding, header::ACCEPT_ENCODING) => (QualityItem<Preference<Encoding>>)* test_parse_and_format { common_header_test!(no_headers, [b""; 0], Some(AcceptEncoding(vec![]))); common_header_test!(empty_header, [b""; 1], Some(AcceptEncoding(vec![]))); common_header_test!( order_of_appearance, [b"br, gzip"], Some(AcceptEncoding(vec![ QualityItem::max(Preference::Specific(Encoding::brotli())), QualityItem::max(Preference::Specific(Encoding::gzip())), ])) ); common_header_test!(any, [b"*"], Some(AcceptEncoding(vec![ QualityItem::max(Preference::Any), ]))); // Note: Removed quality 1 from gzip common_header_test!(implicit_quality, [b"gzip, identity; q=0.5, *;q=0"]); // Note: Removed quality 1 from gzip common_header_test!(implicit_quality_out_of_order, [b"compress;q=0.5, gzip"]); common_header_test!( only_gzip_no_identity, [b"gzip, *; q=0"], Some(AcceptEncoding(vec![ QualityItem::max(Preference::Specific(Encoding::gzip())), QualityItem::zero(Preference::Any), ])) ); } } impl AcceptEncoding { /// Selects the most acceptable encoding according to client preference and supported types. /// /// The "identity" encoding is not assumed and should be included in the `supported` iterator /// if a non-encoded representation can be selected. /// /// If `None` is returned, this indicates that none of the supported encodings are acceptable to /// the client. The caller should generate a 406 Not Acceptable response (unencoded) that /// includes the server's supported encodings in the body plus a [`Vary`] header. /// /// [`Vary`]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Vary pub fn negotiate<'a>(&self, supported: impl Iterator<Item = &'a Encoding>) -> Option<Encoding> { // 1. If no Accept-Encoding field is in the request, any content-coding is considered // acceptable by the user agent. let supported_set = supported.collect::<HashSet<_>>(); if supported_set.is_empty() { return None; } if self.0.is_empty() { // though it is not recommended to encode in this case, return identity encoding return Some(Encoding::identity()); } // 2. If the representation has no content-coding, then it is acceptable by default unless // specifically excluded by the Accept-Encoding field stating either "identity;q=0" or // "*;q=0" without a more specific entry for "identity". let acceptable_items = self.ranked_items().collect::<Vec<_>>(); let identity_acceptable = is_identity_acceptable(&acceptable_items); let identity_supported = supported_set.contains(&Encoding::identity()); if identity_acceptable && identity_supported && supported_set.len() == 1 { return Some(Encoding::identity()); } // 3. If the representation's content-coding is one of the content-codings listed in the // Accept-Encoding field, then it is acceptable unless it is accompanied by a qvalue of 0. // 4. If multiple content-codings are acceptable, then the acceptable content-coding with // the highest non-zero qvalue is preferred. let matched = acceptable_items .into_iter() .filter(|q| q.quality > Quality::ZERO) // search relies on item list being in descending order of quality .find(|q| { let enc = &q.item; matches!(enc, Preference::Specific(enc) if supported_set.contains(enc)) }) .map(|q| q.item); match matched { Some(Preference::Specific(enc)) => Some(enc), _ if identity_acceptable => Some(Encoding::identity()), _ => None, } } /// Extracts the most preferable encoding, accounting for [q-factor weighting]. /// /// If no q-factors are provided, we prefer brotli > zstd > gzip. Note that items without /// q-factors are given the maximum preference value. /// /// As per the spec, returns [`Preference::Any`] if acceptable list is empty. Though, if this is /// returned, it is recommended to use an un-encoded representation. /// /// If `None` is returned, it means that the client has signalled that no representations /// are acceptable. This should never occur for a well behaved user-agent. /// /// [q-factor weighting]: https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.2 pub fn preference(&self) -> Option<Preference<Encoding>> { // empty header indicates no preference if self.0.is_empty() { return Some(Preference::Any); } let mut max_item = None; let mut max_pref = Quality::ZERO; let mut max_rank = 0; // uses manual max lookup loop since we want the first occurrence in the case of same // preference but `Iterator::max_by_key` would give us the last occurrence for pref in &self.0 { // only change if strictly greater // equal items, even while unsorted, still have higher preference if they appear first let rank = encoding_rank(pref); if (pref.quality, rank) > (max_pref, max_rank) { max_pref = pref.quality; max_item = Some(pref.item.clone()); max_rank = rank; } } // Return max_item if any items were above 0 quality... max_item.or_else(|| { // ...or else check for "*" or "identity". We can elide quality checks since // entering this block means all items had "q=0". match self.0.iter().find(|pref| { matches!( pref.item, Preference::Any | Preference::Specific(Encoding::Known(ContentEncoding::Identity)) ) }) { // "identity" or "*" found so no representation is acceptable Some(_) => None, // implicit "identity" is acceptable None => Some(Preference::Specific(Encoding::identity())), } }) } /// Returns a sorted list of encodings from highest to lowest precedence, accounting /// for [q-factor weighting]. /// /// If no q-factors are provided, we prefer brotli > zstd > gzip. /// /// [q-factor weighting]: https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.2 pub fn ranked(&self) -> Vec<Preference<Encoding>> { self.ranked_items().map(|q| q.item).collect() } fn ranked_items(&self) -> impl Iterator<Item = QualityItem<Preference<Encoding>>> { if self.0.is_empty() { return Vec::new().into_iter(); } let mut types = self.0.clone(); // use stable sort so items with equal q-factor retain listed order types.sort_by(|a, b| { // sort by q-factor descending then server ranking descending b.quality .cmp(&a.quality) .then(encoding_rank(b).cmp(&encoding_rank(a))) }); types.into_iter() } } /// Returns server-defined encoding ranking. fn encoding_rank(qv: &QualityItem<Preference<Encoding>>) -> u8 { // ensure that q=0 items are never sorted above identity encoding // invariant: sorting methods calling this fn use first-on-equal approach if qv.quality == Quality::ZERO { return 0; } match qv.item { Preference::Specific(Encoding::Known(ContentEncoding::Brotli)) => 5, Preference::Specific(Encoding::Known(ContentEncoding::Zstd)) => 4, Preference::Specific(Encoding::Known(ContentEncoding::Gzip)) => 3, Preference::Specific(Encoding::Known(ContentEncoding::Deflate)) => 2, Preference::Any => 0, Preference::Specific(Encoding::Known(ContentEncoding::Identity)) => 0, Preference::Specific(Encoding::Known(_)) => 1, Preference::Specific(Encoding::Unknown(_)) => 1, } } /// Returns true if "identity" is an acceptable encoding. /// /// Internal algorithm relies on item list being in descending order of quality. fn is_identity_acceptable(items: &'_ [QualityItem<Preference<Encoding>>]) -> bool { if items.is_empty() { return true; } // Loop algorithm depends on items being sorted in descending order of quality. As such, it // is sufficient to return (q > 0) when reaching either an "identity" or "*" item. for q in items { match (q.quality, &q.item) { // occurrence of "identity;q=n"; return true if quality is non-zero (q, Preference::Specific(Encoding::Known(ContentEncoding::Identity))) => { return q > Quality::ZERO } // occurrence of "*;q=n"; return true if quality is non-zero (q, Preference::Any) => return q > Quality::ZERO, _ => {} } } // implicit acceptable identity true } #[cfg(test)] mod tests { use super::*; use crate::http::header::*; macro_rules! accept_encoding { () => { AcceptEncoding(vec![]) }; ($($q:expr),+ $(,)?) => { AcceptEncoding(vec![$($q.parse().unwrap()),+]) }; } /// Parses an encoding string. fn enc(enc: &str) -> Preference<Encoding> { enc.parse().unwrap() } #[test] fn detect_identity_acceptable() { macro_rules! accept_encoding_ranked { () => { accept_encoding!().ranked_items().collect::<Vec<_>>() }; ($($q:expr),+ $(,)?) => { accept_encoding!($($q),+).ranked_items().collect::<Vec<_>>() }; } let test = accept_encoding_ranked!(); assert!(is_identity_acceptable(&test)); let test = accept_encoding_ranked!("gzip"); assert!(is_identity_acceptable(&test)); let test = accept_encoding_ranked!("gzip", "br"); assert!(is_identity_acceptable(&test)); let test = accept_encoding_ranked!("gzip", "*;q=0.1"); assert!(is_identity_acceptable(&test)); let test = accept_encoding_ranked!("gzip", "identity;q=0.1"); assert!(is_identity_acceptable(&test)); let test = accept_encoding_ranked!("gzip", "identity;q=0.1", "*;q=0"); assert!(is_identity_acceptable(&test)); let test = accept_encoding_ranked!("gzip", "*;q=0", "identity;q=0.1"); assert!(is_identity_acceptable(&test)); let test = accept_encoding_ranked!("gzip", "*;q=0"); assert!(!is_identity_acceptable(&test)); let test = accept_encoding_ranked!("gzip", "identity;q=0"); assert!(!is_identity_acceptable(&test)); let test = accept_encoding_ranked!("gzip", "identity;q=0", "*;q=0"); assert!(!is_identity_acceptable(&test)); let test = accept_encoding_ranked!("gzip", "*;q=0", "identity;q=0"); assert!(!is_identity_acceptable(&test)); } #[test] fn encoding_negotiation() { // no preference let test = accept_encoding!(); assert_eq!(test.negotiate([].iter()), None); let test = accept_encoding!(); assert_eq!( test.negotiate([Encoding::identity()].iter()), Some(Encoding::identity()), ); let test = accept_encoding!("identity;q=0"); assert_eq!(test.negotiate([Encoding::identity()].iter()), None); let test = accept_encoding!("*;q=0"); assert_eq!(test.negotiate([Encoding::identity()].iter()), None); let test = accept_encoding!(); assert_eq!( test.negotiate([Encoding::gzip(), Encoding::identity()].iter()), Some(Encoding::identity()), ); let test = accept_encoding!("gzip"); assert_eq!( test.negotiate([Encoding::gzip(), Encoding::identity()].iter()), Some(Encoding::gzip()), ); assert_eq!( test.negotiate([Encoding::brotli(), Encoding::identity()].iter()), Some(Encoding::identity()), ); assert_eq!( test.negotiate([Encoding::brotli(), Encoding::gzip(), Encoding::identity()].iter()), Some(Encoding::gzip()), ); let test = accept_encoding!("gzip", "identity;q=0"); assert_eq!( test.negotiate([Encoding::gzip(), Encoding::identity()].iter()), Some(Encoding::gzip()), ); assert_eq!( test.negotiate([Encoding::brotli(), Encoding::identity()].iter()), None ); let test = accept_encoding!("gzip", "*;q=0"); assert_eq!( test.negotiate([Encoding::gzip(), Encoding::identity()].iter()), Some(Encoding::gzip()), ); assert_eq!( test.negotiate([Encoding::brotli(), Encoding::identity()].iter()), None ); let test = accept_encoding!("gzip", "deflate", "br"); assert_eq!( test.negotiate([Encoding::gzip(), Encoding::identity()].iter()), Some(Encoding::gzip()), ); assert_eq!( test.negotiate([Encoding::brotli(), Encoding::identity()].iter()), Some(Encoding::brotli()) ); assert_eq!( test.negotiate([Encoding::deflate(), Encoding::identity()].iter()), Some(Encoding::deflate()) ); assert_eq!( test.negotiate([Encoding::gzip(), Encoding::deflate(), Encoding::identity()].iter()), Some(Encoding::gzip()) ); assert_eq!( test.negotiate([Encoding::gzip(), Encoding::brotli(), Encoding::identity()].iter()), Some(Encoding::brotli()) ); assert_eq!( test.negotiate([Encoding::brotli(), Encoding::gzip(), Encoding::identity()].iter()), Some(Encoding::brotli()) ); } #[test] fn ranking_precedence() { let test = accept_encoding!(); assert!(test.ranked().is_empty()); let test = accept_encoding!("gzip"); assert_eq!(test.ranked(), vec![enc("gzip")]); let test = accept_encoding!("gzip;q=0.900", "*;q=0.700", "br;q=1.0"); assert_eq!(test.ranked(), vec![enc("br"), enc("gzip"), enc("*")]); let test = accept_encoding!("br", "gzip", "*"); assert_eq!(test.ranked(), vec![enc("br"), enc("gzip"), enc("*")]); let test = accept_encoding!("gzip", "br", "*"); assert_eq!(test.ranked(), vec![enc("br"), enc("gzip"), enc("*")]); } #[test] fn preference_selection() { assert_eq!(accept_encoding!().preference(), Some(Preference::Any)); assert_eq!(accept_encoding!("identity;q=0").preference(), None); assert_eq!(accept_encoding!("*;q=0").preference(), None); assert_eq!(accept_encoding!("compress;q=0", "*;q=0").preference(), None); assert_eq!(accept_encoding!("identity;q=0", "*;q=0").preference(), None); let test = accept_encoding!("*;q=0.5"); assert_eq!(test.preference().unwrap(), enc("*")); let test = accept_encoding!("br;q=0"); assert_eq!(test.preference().unwrap(), enc("identity")); let test = accept_encoding!("br;q=0.900", "gzip;q=1.0", "*;q=0.500"); assert_eq!(test.preference().unwrap(), enc("gzip")); let test = accept_encoding!("br", "gzip", "*"); assert_eq!(test.preference().unwrap(), enc("br")); let test = accept_encoding!("gzip", "br", "*"); assert_eq!(test.preference().unwrap(), enc("br")); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/encoding.rs
actix-web/src/http/header/encoding.rs
use std::{fmt, str}; use actix_http::ContentEncoding; /// A value to represent an encoding used in the `Accept-Encoding` and `Content-Encoding` header. #[derive(Debug, Clone, PartialEq, Eq, Hash)] pub enum Encoding { /// A supported content encoding. See [`ContentEncoding`] for variants. Known(ContentEncoding), /// Some other encoding that is less common, can be any string. Unknown(String), } impl Encoding { pub const fn identity() -> Self { Self::Known(ContentEncoding::Identity) } pub const fn brotli() -> Self { Self::Known(ContentEncoding::Brotli) } pub const fn deflate() -> Self { Self::Known(ContentEncoding::Deflate) } pub const fn gzip() -> Self { Self::Known(ContentEncoding::Gzip) } pub const fn zstd() -> Self { Self::Known(ContentEncoding::Zstd) } } impl fmt::Display for Encoding { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { f.write_str(match self { Encoding::Known(enc) => enc.as_str(), Encoding::Unknown(enc) => enc.as_str(), }) } } impl str::FromStr for Encoding { type Err = crate::error::ParseError; fn from_str(enc: &str) -> Result<Self, crate::error::ParseError> { match enc.parse::<ContentEncoding>() { Ok(enc) => Ok(Self::Known(enc)), Err(_) => Ok(Self::Unknown(enc.to_owned())), } } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/accept_language.rs
actix-web/src/http/header/accept_language.rs
use language_tags::LanguageTag; use super::{common_header, Preference, Quality, QualityItem}; use crate::http::header; common_header! { /// `Accept-Language` header, defined /// in [RFC 7231 §5.3.5](https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.5) /// /// The `Accept-Language` header field can be used by user agents to indicate the set of natural /// languages that are preferred in the response. /// /// The `Accept-Language` header is defined in /// [RFC 7231 §5.3.5](https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.5) using language /// ranges defined in [RFC 4647 §2.1](https://datatracker.ietf.org/doc/html/rfc4647#section-2.1). /// /// # ABNF /// ```plain /// Accept-Language = 1#( language-range [ weight ] ) /// language-range = (1*8ALPHA *("-" 1*8alphanum)) / "*" /// alphanum = ALPHA / DIGIT /// weight = OWS ";" OWS "q=" qvalue /// qvalue = ( "0" [ "." 0*3DIGIT ] ) /// / ( "1" [ "." 0*3("0") ] ) /// ``` /// /// # Example Values /// - `da, en-gb;q=0.8, en;q=0.7` /// - `en-us;q=1.0, en;q=0.5, fr` /// - `fr-CH, fr;q=0.9, en;q=0.8, de;q=0.7, *;q=0.5` /// /// # Examples /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{AcceptLanguage, QualityItem}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// AcceptLanguage(vec![ /// "en-US".parse().unwrap(), /// ]) /// ); /// ``` /// /// ``` /// use actix_web::HttpResponse; /// use actix_web::http::header::{AcceptLanguage, QualityItem, q}; /// /// let mut builder = HttpResponse::Ok(); /// builder.insert_header( /// AcceptLanguage(vec![ /// "da".parse().unwrap(), /// "en-GB;q=0.8".parse().unwrap(), /// "en;q=0.7".parse().unwrap(), /// ]) /// ); /// ``` (AcceptLanguage, header::ACCEPT_LANGUAGE) => (QualityItem<Preference<LanguageTag>>)* test_parse_and_format { common_header_test!(no_headers, [b""; 0], Some(AcceptLanguage(vec![]))); common_header_test!(empty_header, [b""; 1], Some(AcceptLanguage(vec![]))); common_header_test!( example_from_rfc, [b"da, en-gb;q=0.8, en;q=0.7"] ); common_header_test!( not_ordered_by_weight, [b"en-US, en; q=0.5, fr"], Some(AcceptLanguage(vec![ QualityItem::max("en-US".parse().unwrap()), QualityItem::new("en".parse().unwrap(), q(0.5)), QualityItem::max("fr".parse().unwrap()), ])) ); common_header_test!( has_wildcard, [b"fr-CH, fr; q=0.9, en; q=0.8, de; q=0.7, *; q=0.5"], Some(AcceptLanguage(vec![ QualityItem::max("fr-CH".parse().unwrap()), QualityItem::new("fr".parse().unwrap(), q(0.9)), QualityItem::new("en".parse().unwrap(), q(0.8)), QualityItem::new("de".parse().unwrap(), q(0.7)), QualityItem::new("*".parse().unwrap(), q(0.5)), ])) ); } } impl AcceptLanguage { /// Extracts the most preferable language, accounting for [q-factor weighting]. /// /// If no q-factors are provided, the first language is chosen. Note that items without /// q-factors are given the maximum preference value. /// /// As per the spec, returns [`Preference::Any`] if contained list is empty. /// /// [q-factor weighting]: https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.2 pub fn preference(&self) -> Preference<LanguageTag> { let mut max_item = None; let mut max_pref = Quality::ZERO; // uses manual max lookup loop since we want the first occurrence in the case of same // preference but `Iterator::max_by_key` would give us the last occurrence for pref in &self.0 { // only change if strictly greater // equal items, even while unsorted, still have higher preference if they appear first if pref.quality > max_pref { max_pref = pref.quality; max_item = Some(pref.item.clone()); } } max_item.unwrap_or(Preference::Any) } /// Returns a sorted list of languages from highest to lowest precedence, accounting /// for [q-factor weighting]. /// /// [q-factor weighting]: https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.2 pub fn ranked(&self) -> Vec<Preference<LanguageTag>> { if self.0.is_empty() { return vec![]; } let mut types = self.0.clone(); // use stable sort so items with equal q-factor retain listed order types.sort_by(|a, b| { // sort by q-factor descending b.quality.cmp(&a.quality) }); types.into_iter().map(|q_item| q_item.item).collect() } } #[cfg(test)] mod tests { use super::*; use crate::http::header::*; #[test] fn ranking_precedence() { let test = AcceptLanguage(vec![]); assert!(test.ranked().is_empty()); let test = AcceptLanguage(vec![QualityItem::max("fr-CH".parse().unwrap())]); assert_eq!(test.ranked(), vec!["fr-CH".parse().unwrap()]); let test = AcceptLanguage(vec![ QualityItem::new("fr".parse().unwrap(), q(0.900)), QualityItem::new("fr-CH".parse().unwrap(), q(1.0)), QualityItem::new("en".parse().unwrap(), q(0.800)), QualityItem::new("*".parse().unwrap(), q(0.500)), QualityItem::new("de".parse().unwrap(), q(0.700)), ]); assert_eq!( test.ranked(), vec![ "fr-CH".parse().unwrap(), "fr".parse().unwrap(), "en".parse().unwrap(), "de".parse().unwrap(), "*".parse().unwrap(), ] ); let test = AcceptLanguage(vec![ QualityItem::max("fr".parse().unwrap()), QualityItem::max("fr-CH".parse().unwrap()), QualityItem::max("en".parse().unwrap()), QualityItem::max("*".parse().unwrap()), QualityItem::max("de".parse().unwrap()), ]); assert_eq!( test.ranked(), vec![ "fr".parse().unwrap(), "fr-CH".parse().unwrap(), "en".parse().unwrap(), "*".parse().unwrap(), "de".parse().unwrap(), ] ); } #[test] fn preference_selection() { let test = AcceptLanguage(vec![ QualityItem::new("fr".parse().unwrap(), q(0.900)), QualityItem::new("fr-CH".parse().unwrap(), q(1.0)), QualityItem::new("en".parse().unwrap(), q(0.800)), QualityItem::new("*".parse().unwrap(), q(0.500)), QualityItem::new("de".parse().unwrap(), q(0.700)), ]); assert_eq!( test.preference(), Preference::Specific("fr-CH".parse().unwrap()) ); let test = AcceptLanguage(vec![ QualityItem::max("fr".parse().unwrap()), QualityItem::max("fr-CH".parse().unwrap()), QualityItem::max("en".parse().unwrap()), QualityItem::max("*".parse().unwrap()), QualityItem::max("de".parse().unwrap()), ]); assert_eq!( test.preference(), Preference::Specific("fr".parse().unwrap()) ); let test = AcceptLanguage(vec![]); assert_eq!(test.preference(), Preference::Any); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/src/http/header/expires.rs
actix-web/src/http/header/expires.rs
use super::{HttpDate, EXPIRES}; crate::http::header::common_header! { /// `Expires` header, defined /// in [RFC 7234 §5.3](https://datatracker.ietf.org/doc/html/rfc7234#section-5.3) /// /// The `Expires` header field gives the date/time after which the /// response is considered stale. /// /// The presence of an Expires field does not imply that the original /// resource will change or cease to exist at, before, or after that /// time. /// /// # ABNF /// ```plain /// Expires = HTTP-date /// ``` /// /// # Example Values /// * `Thu, 01 Dec 1994 16:00:00 GMT` /// /// # Examples /// /// ``` /// use std::time::{SystemTime, Duration}; /// use actix_web::HttpResponse; /// use actix_web::http::header::Expires; /// /// let mut builder = HttpResponse::Ok(); /// let expiration = SystemTime::now() + Duration::from_secs(60 * 60 * 24); /// builder.insert_header( /// Expires(expiration.into()) /// ); /// ``` (Expires, EXPIRES) => [HttpDate] test_parse_and_format { // Test case from RFC crate::http::header::common_header_test!(test1, [b"Thu, 01 Dec 1994 16:00:00 GMT"]); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/tests/test_streaming_response.rs
actix-web/tests/test_streaming_response.rs
use std::{ pin::Pin, task::{Context, Poll}, }; use actix_web::{ http::header::{self, HeaderValue}, HttpResponse, }; use bytes::Bytes; use futures_core::Stream; struct FixedSizeStream { data: Vec<u8>, yielded: bool, } impl FixedSizeStream { fn new(size: usize) -> Self { Self { data: vec![0u8; size], yielded: false, } } } impl Stream for FixedSizeStream { type Item = Result<Bytes, std::io::Error>; fn poll_next(mut self: Pin<&mut Self>, _: &mut Context<'_>) -> Poll<Option<Self::Item>> { if self.yielded { Poll::Ready(None) } else { self.yielded = true; let data = std::mem::take(&mut self.data); Poll::Ready(Some(Ok(Bytes::from(data)))) } } } #[actix_rt::test] async fn test_streaming_response_with_content_length() { let stream = FixedSizeStream::new(100); let resp = HttpResponse::Ok() .append_header((header::CONTENT_LENGTH, "100")) .streaming(stream); assert_eq!( resp.headers().get(header::CONTENT_LENGTH), Some(&HeaderValue::from_static("100")), "Content-Length should be preserved when explicitly set" ); let has_chunked = resp .headers() .get(header::TRANSFER_ENCODING) .map(|v| v.to_str().unwrap_or("")) .unwrap_or("") .contains("chunked"); assert!( !has_chunked, "chunked should not be used when Content-Length is provided" ); assert_eq!( resp.headers().get(header::CONTENT_TYPE), Some(&HeaderValue::from_static("application/octet-stream")), "Content-Type should default to application/octet-stream" ); } #[actix_rt::test] async fn test_streaming_response_default_content_type() { let stream = FixedSizeStream::new(50); let resp = HttpResponse::Ok().streaming(stream); assert_eq!( resp.headers().get(header::CONTENT_TYPE), Some(&HeaderValue::from_static("application/octet-stream")), "Content-Type should default to application/octet-stream" ); } #[actix_rt::test] async fn test_streaming_response_user_defined_content_type() { let stream = FixedSizeStream::new(25); let resp = HttpResponse::Ok() .insert_header((header::CONTENT_TYPE, "text/plain")) .streaming(stream); assert_eq!( resp.headers().get(header::CONTENT_TYPE), Some(&HeaderValue::from_static("text/plain")), "User-defined Content-Type should be preserved" ); } #[actix_rt::test] async fn test_streaming_response_empty_stream() { let stream = FixedSizeStream::new(0); let resp = HttpResponse::Ok() .append_header((header::CONTENT_LENGTH, "0")) .streaming(stream); assert_eq!( resp.headers().get(header::CONTENT_LENGTH), Some(&HeaderValue::from_static("0")), "Content-Length 0 should be preserved for empty streams" ); }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/tests/weird_poll.rs
actix-web/tests/weird_poll.rs
//! Regression test for https://github.com/actix/actix-web/issues/1321 // use actix_http::body::{BodyStream, MessageBody}; // use bytes::Bytes; // use futures_channel::oneshot; // use futures_util::{ // stream::once, // task::{noop_waker, Context}, // }; // #[test] // fn weird_poll() { // let (sender, receiver) = oneshot::channel(); // let mut body_stream = Ok(BodyStream::new(once(async { // let x = Box::new(0); // let y = &x; // receiver.await.unwrap(); // let _z = **y; // Ok::<_, ()>(Bytes::new()) // }))); // let waker = noop_waker(); // let mut cx = Context::from_waker(&waker); // let _ = body_stream.as_mut().unwrap().poll_next(&mut cx); // sender.send(()).unwrap(); // let _ = std::mem::replace(&mut body_stream, Err([0; 32])) // .unwrap() // .poll_next(&mut cx); // }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/tests/test_server.rs
actix-web/tests/test_server.rs
#[cfg(feature = "openssl")] extern crate tls_openssl as openssl; #[cfg(feature = "rustls-0_23")] extern crate tls_rustls as rustls; use std::{ future::Future, io::{Read, Write}, pin::Pin, task::{Context, Poll}, time::Duration, }; use actix_web::{ cookie::Cookie, http::{header, StatusCode}, middleware::{Compress, NormalizePath, TrailingSlash}, web, App, Error, HttpResponse, }; use bytes::Bytes; use futures_core::ready; #[cfg(feature = "openssl")] use openssl::{ pkey::PKey, ssl::{SslAcceptor, SslMethod}, x509::X509, }; use rand::distr::{Alphanumeric, SampleString as _}; mod utils; const S: &str = "Hello World "; const STR: &str = const_str::repeat!(S, 100); #[cfg(feature = "openssl")] fn openssl_config() -> SslAcceptor { let rcgen::CertifiedKey { cert, key_pair } = rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap(); let cert_file = cert.pem(); let key_file = key_pair.serialize_pem(); let cert = X509::from_pem(cert_file.as_bytes()).unwrap(); let key = PKey::private_key_from_pem(key_file.as_bytes()).unwrap(); let mut builder = SslAcceptor::mozilla_intermediate(SslMethod::tls()).unwrap(); builder.set_certificate(&cert).unwrap(); builder.set_private_key(&key).unwrap(); builder.set_alpn_select_callback(|_, protos| { const H2: &[u8] = b"\x02h2"; if protos.windows(3).any(|window| window == H2) { Ok(b"h2") } else { Err(openssl::ssl::AlpnError::NOACK) } }); builder.set_alpn_protos(b"\x02h2").unwrap(); builder.build() } struct TestBody { data: Bytes, chunk_size: usize, delay: Pin<Box<actix_rt::time::Sleep>>, } impl TestBody { fn new(data: Bytes, chunk_size: usize) -> Self { TestBody { data, chunk_size, delay: Box::pin(actix_rt::time::sleep(std::time::Duration::from_millis(10))), } } } impl futures_core::stream::Stream for TestBody { type Item = Result<Bytes, Error>; fn poll_next(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Option<Self::Item>> { ready!(Pin::new(&mut self.delay).poll(cx)); self.delay = Box::pin(actix_rt::time::sleep(std::time::Duration::from_millis(10))); let chunk_size = std::cmp::min(self.chunk_size, self.data.len()); let chunk = self.data.split_to(chunk_size); if chunk.is_empty() { Poll::Ready(None) } else { Poll::Ready(Some(Ok(chunk))) } } } #[actix_rt::test] async fn test_body() { let srv = actix_test::start(|| { App::new() .service(web::resource("/").route(web::to(|| async { HttpResponse::Ok().body(STR) }))) }); let mut res = srv.get("/").send().await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(STR.as_ref())); srv.stop().await; } // enforcing an encoding per-response is removed // #[actix_rt::test] // async fn test_body_encoding_override() { // let srv = actix_test::start_with(actix_test::config().h1(), || { // App::new() // .wrap(Compress::default()) // .service(web::resource("/").route(web::to(|| { // HttpResponse::Ok() // .encode_with(ContentEncoding::Deflate) // .body(STR) // }))) // .service(web::resource("/raw").route(web::to(|| { // let mut res = HttpResponse::with_body(actix_web::http::StatusCode::OK, STR); // res.encode_with(ContentEncoding::Deflate); // res.map_into_boxed_body() // }))) // }); // // Builder // let mut res = srv // .get("/") // .no_decompress() // .append_header((ACCEPT_ENCODING, "deflate")) // .send() // .await // .unwrap(); // assert_eq!(res.status(), StatusCode::OK); // let bytes = res.body().await.unwrap(); // assert_eq!(utils::deflate::decode(bytes), STR.as_bytes()); // // Raw Response // let mut res = srv // .request(actix_web::http::Method::GET, srv.url("/raw")) // .no_decompress() // .append_header((ACCEPT_ENCODING, "deflate")) // .send() // .await // .unwrap(); // assert_eq!(res.status(), StatusCode::OK); // let bytes = res.body().await.unwrap(); // assert_eq!(utils::deflate::decode(bytes), STR.as_bytes()); // srv.stop().await; // } #[actix_rt::test] async fn body_gzip_large() { let data = STR.repeat(10); let srv_data = data.clone(); let srv = actix_test::start_with(actix_test::config().h1(), move || { let data = srv_data.clone(); App::new() .wrap(Compress::default()) .service(web::resource("/").route(web::to(move || { let data = data.clone(); async move { HttpResponse::Ok().body(data.clone()) } }))) }); let mut res = srv .get("/") .no_decompress() .append_header((header::ACCEPT_ENCODING, "gzip")) .send() .await .unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(utils::gzip::decode(bytes), data.as_bytes()); srv.stop().await; } #[actix_rt::test] async fn test_body_gzip_large_random() { let data = Alphanumeric.sample_string(&mut rand::rng(), 70_000); let srv_data = data.clone(); let srv = actix_test::start_with(actix_test::config().h1(), move || { let data = srv_data.clone(); App::new() .wrap(Compress::default()) .service(web::resource("/").route(web::to(move || { let data = data.clone(); async move { HttpResponse::Ok().body(data.clone()) } }))) }); let mut res = srv .get("/") .no_decompress() .append_header((header::ACCEPT_ENCODING, "gzip")) .send() .await .unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(utils::gzip::decode(bytes), data.as_bytes()); srv.stop().await; } #[actix_rt::test] async fn test_body_chunked_implicit() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new() .wrap(Compress::default()) .service(web::resource("/").route(web::get().to(|| async { HttpResponse::Ok().streaming(TestBody::new(Bytes::from_static(STR.as_ref()), 24)) }))) }); let mut res = srv .get("/") .no_decompress() .append_header((header::ACCEPT_ENCODING, "gzip")) .send() .await .unwrap(); assert_eq!(res.status(), StatusCode::OK); assert_eq!( res.headers().get(header::TRANSFER_ENCODING).unwrap(), "chunked" ); let bytes = res.body().await.unwrap(); assert_eq!(utils::gzip::decode(bytes), STR.as_bytes()); srv.stop().await; } #[actix_rt::test] async fn test_body_br_streaming() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new() .wrap(Compress::default()) .service(web::resource("/").route(web::to(|| async { HttpResponse::Ok().streaming(TestBody::new(Bytes::from_static(STR.as_ref()), 24)) }))) }); let mut res = srv .get("/") .append_header((header::ACCEPT_ENCODING, "br")) .no_decompress() .send() .await .unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(utils::brotli::decode(bytes), STR.as_bytes()); srv.stop().await; } #[actix_rt::test] async fn test_head_binary() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().service( web::resource("/") .route(web::head().to(move || async { HttpResponse::Ok().body(STR) })), ) }); let mut res = srv.head("/").send().await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let len = res.headers().get(header::CONTENT_LENGTH).unwrap(); assert_eq!(format!("{}", STR.len()), len.to_str().unwrap()); let bytes = res.body().await.unwrap(); assert!(bytes.is_empty()); srv.stop().await; } #[actix_rt::test] async fn test_no_chunking() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().service(web::resource("/").route(web::to(move || async { HttpResponse::Ok() .no_chunking(STR.len() as u64) .streaming(TestBody::new(Bytes::from_static(STR.as_ref()), 24)) }))) }); let mut res = srv.get("/").send().await.unwrap(); assert_eq!(res.status(), StatusCode::OK); assert!(!res.headers().contains_key(header::TRANSFER_ENCODING)); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(STR.as_ref())); srv.stop().await; } #[actix_rt::test] async fn test_body_deflate() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().wrap(Compress::default()).service( web::resource("/").route(web::to(move || async { HttpResponse::Ok().body(STR) })), ) }); let mut res = srv .get("/") .append_header((header::ACCEPT_ENCODING, "deflate")) .no_decompress() .send() .await .unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(utils::deflate::decode(bytes), STR.as_bytes()); srv.stop().await; } #[actix_rt::test] async fn test_body_brotli() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().wrap(Compress::default()).service( web::resource("/").route(web::to(move || async { HttpResponse::Ok().body(STR) })), ) }); let mut res = srv .get("/") .append_header((header::ACCEPT_ENCODING, "br")) .no_decompress() .send() .await .unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(utils::brotli::decode(bytes), STR.as_bytes()); srv.stop().await; } #[actix_rt::test] async fn test_body_zstd() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().wrap(Compress::default()).service( web::resource("/").route(web::to(move || async { HttpResponse::Ok().body(STR) })), ) }); let mut res = srv .get("/") .append_header((header::ACCEPT_ENCODING, "zstd")) .no_decompress() .send() .await .unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(utils::zstd::decode(bytes), STR.as_bytes()); srv.stop().await; } #[actix_rt::test] async fn test_body_zstd_streaming() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new() .wrap(Compress::default()) .service(web::resource("/").route(web::to(move || async { HttpResponse::Ok().streaming(TestBody::new(Bytes::from_static(STR.as_ref()), 24)) }))) }); let mut res = srv .get("/") .append_header((header::ACCEPT_ENCODING, "zstd")) .no_decompress() .send() .await .unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(utils::zstd::decode(bytes), STR.as_bytes()); srv.stop().await; } #[actix_rt::test] async fn test_zstd_encoding() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().service(web::resource("/").route(web::to(move |body: Bytes| async { HttpResponse::Ok().body(body) }))) }); let request = srv .post("/") .append_header((header::CONTENT_ENCODING, "zstd")) .send_body(utils::zstd::encode(STR)); let mut res = request.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(STR.as_ref())); srv.stop().await; } #[actix_rt::test] async fn test_zstd_encoding_large() { let data = Alphanumeric.sample_string(&mut rand::rng(), 320_000); let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().service( web::resource("/") .app_data(web::PayloadConfig::new(320_000)) .route(web::to(move |body: Bytes| async { HttpResponse::Ok().streaming(TestBody::new(body, 10240)) })), ) }); let request = srv .post("/") .append_header((header::CONTENT_ENCODING, "zstd")) .send_body(utils::zstd::encode(&data)); let mut res = request.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().limit(320_000).await.unwrap(); assert_eq!(bytes, data.as_bytes()); srv.stop().await; } #[actix_rt::test] async fn test_encoding() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new() .wrap(Compress::default()) .service(web::resource("/").route(web::to(move |body: Bytes| async { HttpResponse::Ok().body(body) }))) }); let request = srv .post("/") .insert_header((header::CONTENT_ENCODING, "gzip")) .send_body(utils::gzip::encode(STR)); let mut res = request.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(STR.as_ref())); srv.stop().await; } #[actix_rt::test] async fn test_gzip_encoding() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().service(web::resource("/").route(web::to(move |body: Bytes| async { HttpResponse::Ok().body(body) }))) }); let request = srv .post("/") .append_header((header::CONTENT_ENCODING, "gzip")) .send_body(utils::gzip::encode(STR)); let mut res = request.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(bytes, STR.as_bytes()); srv.stop().await; } #[actix_rt::test] async fn test_gzip_encoding_large() { let data = STR.repeat(10); let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().service(web::resource("/").route(web::to(move |body: Bytes| async { HttpResponse::Ok().body(body) }))) }); let req = srv .post("/") .append_header((header::CONTENT_ENCODING, "gzip")) .send_body(utils::gzip::encode(&data)); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(bytes, data); srv.stop().await; } #[actix_rt::test] async fn test_reading_gzip_encoding_large_random() { let data = Alphanumeric.sample_string(&mut rand::rng(), 60_000); let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().service(web::resource("/").route(web::to(move |body: Bytes| async { HttpResponse::Ok().body(body) }))) }); let request = srv .post("/") .append_header((header::CONTENT_ENCODING, "gzip")) .send_body(utils::gzip::encode(&data)); let mut res = request.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(bytes, data.as_bytes()); srv.stop().await; } #[actix_rt::test] async fn test_reading_deflate_encoding() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().service(web::resource("/").route(web::to(move |body: Bytes| async { HttpResponse::Ok().body(body) }))) }); let request = srv .post("/") .append_header((header::CONTENT_ENCODING, "deflate")) .send_body(utils::deflate::encode(STR)); let mut res = request.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(STR.as_ref())); srv.stop().await; } #[actix_rt::test] async fn test_reading_deflate_encoding_large() { let data = STR.repeat(10); let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().service(web::resource("/").route(web::to(move |body: Bytes| async { HttpResponse::Ok().body(body) }))) }); let request = srv .post("/") .append_header((header::CONTENT_ENCODING, "deflate")) .send_body(utils::deflate::encode(&data)); let mut res = request.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from(data)); srv.stop().await; } #[actix_rt::test] async fn test_reading_deflate_encoding_large_random() { let data = Alphanumeric.sample_string(&mut rand::rng(), 160_000); let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().service(web::resource("/").route(web::to(move |body: Bytes| async { HttpResponse::Ok().body(body) }))) }); let request = srv .post("/") .append_header((header::CONTENT_ENCODING, "deflate")) .send_body(utils::deflate::encode(&data)); let mut res = request.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(bytes.len(), data.len()); assert_eq!(bytes, Bytes::from(data)); srv.stop().await; } #[actix_rt::test] async fn test_brotli_encoding() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().service(web::resource("/").route(web::to(move |body: Bytes| async { HttpResponse::Ok().body(body) }))) }); let request = srv .post("/") .append_header((header::CONTENT_ENCODING, "br")) .send_body(utils::brotli::encode(STR)); let mut res = request.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(STR.as_ref())); srv.stop().await; } #[actix_rt::test] async fn test_brotli_encoding_large() { let data = Alphanumeric.sample_string(&mut rand::rng(), 320_000); let srv = actix_test::start_with(actix_test::config().h1(), || { App::new().service( web::resource("/") .app_data(web::PayloadConfig::new(320_000)) .route(web::to(move |body: Bytes| async { HttpResponse::Ok().streaming(TestBody::new(body, 10240)) })), ) }); let request = srv .post("/") .append_header((header::CONTENT_ENCODING, "br")) .send_body(utils::brotli::encode(&data)); let mut res = request.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().limit(320_000).await.unwrap(); assert_eq!(bytes, Bytes::from(data)); srv.stop().await; } #[cfg(feature = "openssl")] #[actix_rt::test] async fn test_brotli_encoding_large_openssl() { use actix_web::http::header; let data = STR.repeat(10); let srv = actix_test::start_with(actix_test::config().openssl(openssl_config()), move || { App::new().service(web::resource("/").route(web::to(|bytes: Bytes| async { // echo decompressed request body back in response HttpResponse::Ok() .insert_header(header::ContentEncoding::Identity) .body(bytes) }))) }); let mut res = srv .post("/") .append_header((header::CONTENT_ENCODING, "br")) .send_body(utils::brotli::encode(&data)) .await .unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from(data)); srv.stop().await; } #[cfg(feature = "rustls-0_23")] mod plus_rustls { use rustls::{pki_types::PrivateKeyDer, ServerConfig as RustlsServerConfig}; use rustls_pki_types::PrivatePkcs8KeyDer; use super::*; fn tls_config() -> RustlsServerConfig { let rcgen::CertifiedKey { cert, key_pair } = rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap(); let cert_chain = vec![cert.der().clone()]; let key_der = PrivateKeyDer::Pkcs8(PrivatePkcs8KeyDer::from(key_pair.serialize_der())); RustlsServerConfig::builder() .with_no_client_auth() .with_single_cert(cert_chain, key_der) .unwrap() } #[actix_rt::test] async fn test_reading_deflate_encoding_large_random_rustls() { let data = Alphanumeric.sample_string(&mut rand::rng(), 160_000); let srv = actix_test::start_with(actix_test::config().rustls_0_23(tls_config()), || { App::new().service(web::resource("/").route(web::to(|bytes: Bytes| async { // echo decompressed request body back in response HttpResponse::Ok() .insert_header(header::ContentEncoding::Identity) .body(bytes) }))) }); let req = srv .post("/") .insert_header((header::CONTENT_ENCODING, "deflate")) .send_stream(TestBody::new( Bytes::from(utils::deflate::encode(&data)), 1024, )); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); let bytes = res.body().await.unwrap(); assert_eq!(bytes.len(), data.len()); assert_eq!(bytes, Bytes::from(data)); srv.stop().await; } } #[actix_rt::test] async fn test_server_cookies() { use actix_web::http; let srv = actix_test::start(|| { App::new().default_service(web::to(|| async { HttpResponse::Ok() .cookie( Cookie::build("first", "first_value") .http_only(true) .finish(), ) .cookie(Cookie::new("second", "first_value")) .cookie(Cookie::new("second", "second_value")) .finish() })) }); let req = srv.get("/"); let res = req.send().await.unwrap(); assert!(res.status().is_success()); { let first_cookie = Cookie::build("first", "first_value") .http_only(true) .finish(); let second_cookie = Cookie::new("second", "first_value"); let cookies = res.cookies().expect("To have cookies"); assert_eq!(cookies.len(), 3); if cookies[0] == first_cookie { assert_eq!(cookies[1], second_cookie); } else { assert_eq!(cookies[0], second_cookie); assert_eq!(cookies[1], first_cookie); } let first_cookie = first_cookie.to_string(); let second_cookie = second_cookie.to_string(); // Check that we have exactly two instances of raw cookie headers let cookies = res .headers() .get_all(http::header::SET_COOKIE) .map(|header| header.to_str().expect("To str").to_string()) .collect::<Vec<_>>(); assert_eq!(cookies.len(), 3); if cookies[0] == first_cookie { assert_eq!(cookies[1], second_cookie); } else { assert_eq!(cookies[0], second_cookie); assert_eq!(cookies[1], first_cookie); } } srv.stop().await; } #[actix_rt::test] async fn test_slow_request() { use std::net; let srv = actix_test::start_with( actix_test::config().client_request_timeout(Duration::from_millis(200)), || App::new().service(web::resource("/").route(web::to(HttpResponse::Ok))), ); let mut stream = net::TcpStream::connect(srv.addr()).unwrap(); let mut data = String::new(); let _ = stream.read_to_string(&mut data); assert!(data.starts_with("HTTP/1.1 408 Request Timeout")); let mut stream = net::TcpStream::connect(srv.addr()).unwrap(); let _ = stream.write_all(b"GET /test/tests/test HTTP/1.1\r\n"); let mut data = String::new(); let _ = stream.read_to_string(&mut data); assert!(data.starts_with("HTTP/1.1 408 Request Timeout")); srv.stop().await; } #[actix_rt::test] async fn test_normalize() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new() .wrap(NormalizePath::new(TrailingSlash::Trim)) .service(web::resource("/one").route(web::to(HttpResponse::Ok))) }); let res = srv.get("/one/").send().await.unwrap(); assert_eq!(res.status(), StatusCode::OK); srv.stop().await } // allow deprecated App::data #[allow(deprecated)] #[actix_rt::test] async fn test_data_drop() { use std::sync::{ atomic::{AtomicUsize, Ordering}, Arc, }; struct TestData(Arc<AtomicUsize>); impl TestData { fn new(inner: Arc<AtomicUsize>) -> Self { let _ = inner.fetch_add(1, Ordering::SeqCst); Self(inner) } } impl Clone for TestData { fn clone(&self) -> Self { let inner = self.0.clone(); let _ = inner.fetch_add(1, Ordering::SeqCst); Self(inner) } } impl Drop for TestData { fn drop(&mut self) { self.0.fetch_sub(1, Ordering::SeqCst); } } let num = Arc::new(AtomicUsize::new(0)); let data = TestData::new(num.clone()); assert_eq!(num.load(Ordering::SeqCst), 1); let srv = actix_test::start(move || { let data = data.clone(); App::new() .data(data) .service(web::resource("/").to(|_data: web::Data<TestData>| async { "ok" })) }); assert!(srv.get("/").send().await.unwrap().status().is_success()); srv.stop().await; assert_eq!(num.load(Ordering::SeqCst), 0); } #[actix_rt::test] async fn test_accept_encoding_no_match() { let srv = actix_test::start_with(actix_test::config().h1(), || { App::new() .wrap(Compress::default()) .service(web::resource("/").route(web::to(HttpResponse::Ok))) }); let mut res = srv .get("/") .insert_header((header::ACCEPT_ENCODING, "xz, identity;q=0")) .no_decompress() .send() .await .unwrap(); assert_eq!(res.status(), StatusCode::NOT_ACCEPTABLE); assert_eq!(res.headers().get(header::CONTENT_ENCODING), None); let bytes = res.body().await.unwrap(); // body should contain the supported encodings assert!(!bytes.is_empty()); srv.stop().await; }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/tests/test_weird_poll.rs
actix-web/tests/test_weird_poll.rs
//! Regression test for https://github.com/actix/actix-web/issues/1321 // use actix_http::body::{BodyStream, MessageBody}; // use bytes::Bytes; // use futures_channel::oneshot; // use futures_util::{ // stream::once, // task::{noop_waker, Context}, // }; // #[test] // fn weird_poll() { // let (sender, receiver) = oneshot::channel(); // let mut body_stream = Ok(BodyStream::new(once(async { // let x = Box::new(0); // let y = &x; // receiver.await.unwrap(); // let _z = **y; // Ok::<_, ()>(Bytes::new()) // }))); // let waker = noop_waker(); // let mut cx = Context::from_waker(&waker); // let _ = body_stream.as_mut().unwrap().poll_next(&mut cx); // sender.send(()).unwrap(); // let _ = std::mem::replace(&mut body_stream, Err([0; 32])) // .unwrap() // .poll_next(&mut cx); // }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/tests/test-macro-import-conflict.rs
actix-web/tests/test-macro-import-conflict.rs
//! Checks that test macro does not cause problems in the presence of imports named "test" that //! could be either a module with test items or the "test with runtime" macro itself. //! //! Before actix/actix-net#399 was implemented, this macro was running twice. The first run output //! `#[test]` and it got run again and since it was in scope. //! //! Prevented by using the fully-qualified test marker (`#[::core::prelude::v1::test]`). use actix_web::test; #[actix_web::test] async fn test_macro_naming_conflict() { let _req = test::TestRequest::default(); assert_eq!(async { 1 }.await, 1); }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/tests/test_httpserver.rs
actix-web/tests/test_httpserver.rs
#[cfg(feature = "openssl")] extern crate tls_openssl as openssl; use std::{sync::mpsc, thread, time::Duration}; use actix_web::{web, App, HttpResponse, HttpServer}; #[actix_rt::test] async fn test_start() { let addr = actix_test::unused_addr(); let (tx, rx) = mpsc::channel(); thread::spawn(move || { actix_rt::System::new() .block_on(async { let srv = HttpServer::new(|| { App::new().service( web::resource("/") .route(web::to(|| async { HttpResponse::Ok().body("test") })), ) }) .workers(1) .backlog(1) .max_connections(10) .max_connection_rate(10) .keep_alive(Duration::from_secs(10)) .client_request_timeout(Duration::from_secs(5)) .client_disconnect_timeout(Duration::ZERO) .server_hostname("localhost") .system_exit() .disable_signals() .bind(format!("{}", addr)) .unwrap() .run(); tx.send(srv.handle()).unwrap(); srv.await }) .unwrap(); }); let srv = rx.recv().unwrap(); let client = awc::Client::builder() .connector(awc::Connector::new().timeout(Duration::from_millis(100))) .finish(); let host = format!("http://{}", addr); let response = client.get(host.clone()).send().await.unwrap(); assert!(response.status().is_success()); // Attempt to start a second server using the same address. let result = HttpServer::new(|| { App::new().service( web::resource("/").route(web::to(|| async { HttpResponse::Ok().body("test") })), ) }) .workers(1) .backlog(1) .max_connections(10) .max_connection_rate(10) .keep_alive(Duration::from_secs(10)) .client_request_timeout(Duration::from_secs(5)) .client_disconnect_timeout(Duration::ZERO) .server_hostname("localhost") .system_exit() .disable_signals() .bind(format!("{}", addr)); // This should fail: the address is in use. assert!(result.is_err()); srv.stop(false).await; } #[cfg(feature = "openssl")] fn ssl_acceptor() -> openssl::ssl::SslAcceptorBuilder { use openssl::{ pkey::PKey, ssl::{SslAcceptor, SslMethod}, x509::X509, }; let rcgen::CertifiedKey { cert, key_pair } = rcgen::generate_simple_self_signed(["localhost".to_owned()]).unwrap(); let cert_file = cert.pem(); let key_file = key_pair.serialize_pem(); let cert = X509::from_pem(cert_file.as_bytes()).unwrap(); let key = PKey::private_key_from_pem(key_file.as_bytes()).unwrap(); let mut builder = SslAcceptor::mozilla_intermediate(SslMethod::tls()).unwrap(); builder.set_certificate(&cert).unwrap(); builder.set_private_key(&key).unwrap(); builder } #[actix_rt::test] #[cfg(feature = "openssl")] async fn test_start_ssl() { use actix_web::HttpRequest; use openssl::ssl::{SslConnector, SslMethod, SslVerifyMode}; let addr = actix_test::unused_addr(); let (tx, rx) = mpsc::channel(); thread::spawn(move || { actix_rt::System::new() .block_on(async { let builder = ssl_acceptor(); let srv = HttpServer::new(|| { App::new().service(web::resource("/").route(web::to(|req: HttpRequest| { assert!(req.app_config().secure()); async { HttpResponse::Ok().body("test") } }))) }) .workers(1) .shutdown_timeout(1) .system_exit() .disable_signals() .bind_openssl(format!("{}", addr), builder) .unwrap(); let srv = srv.run(); tx.send(srv.handle()).unwrap(); srv.await }) .unwrap() }); let srv = rx.recv().unwrap(); let mut builder = SslConnector::builder(SslMethod::tls()).unwrap(); builder.set_verify(SslVerifyMode::NONE); let _ = builder .set_alpn_protos(b"\x02h2\x08http/1.1") .map_err(|e| log::error!("Can not set alpn protocol: {:?}", e)); let client = awc::Client::builder() .connector( awc::Connector::new() .openssl(builder.build()) .timeout(Duration::from_millis(100)), ) .finish(); let host = format!("https://{}", addr); let response = client.get(host.clone()).send().await.unwrap(); assert!(response.status().is_success()); srv.stop(false).await; }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/tests/test_error_propagation.rs
actix-web/tests/test_error_propagation.rs
use std::sync::Arc; use actix_utils::future::{ok, Ready}; use actix_web::{ dev::{forward_ready, Service, ServiceRequest, ServiceResponse, Transform}, get, test::{call_service, init_service, TestRequest}, ResponseError, }; use futures_core::future::LocalBoxFuture; use futures_util::lock::Mutex; #[derive(Debug, Clone)] pub struct MyError; impl ResponseError for MyError {} impl std::fmt::Display for MyError { fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { write!(f, "A custom error") } } #[get("/test")] async fn test() -> Result<actix_web::HttpResponse, actix_web::error::Error> { Err(MyError.into()) } #[derive(Clone)] pub struct SpyMiddleware(Arc<Mutex<Option<bool>>>); impl<S, B> Transform<S, ServiceRequest> for SpyMiddleware where S: Service<ServiceRequest, Response = ServiceResponse<B>, Error = actix_web::Error>, S::Future: 'static, B: 'static, { type Response = ServiceResponse<B>; type Error = actix_web::Error; type Transform = Middleware<S>; type InitError = (); type Future = Ready<Result<Self::Transform, Self::InitError>>; fn new_transform(&self, service: S) -> Self::Future { ok(Middleware { was_error: self.0.clone(), service, }) } } #[doc(hidden)] pub struct Middleware<S> { was_error: Arc<Mutex<Option<bool>>>, service: S, } impl<S, B> Service<ServiceRequest> for Middleware<S> where S: Service<ServiceRequest, Response = ServiceResponse<B>, Error = actix_web::Error>, S::Future: 'static, B: 'static, { type Response = ServiceResponse<B>; type Error = actix_web::Error; type Future = LocalBoxFuture<'static, Result<Self::Response, Self::Error>>; forward_ready!(service); fn call(&self, req: ServiceRequest) -> Self::Future { let lock = self.was_error.clone(); let response_future = self.service.call(req); Box::pin(async move { let response = response_future.await; if let Ok(success) = &response { *lock.lock().await = Some(success.response().error().is_some()); } response }) } } #[actix_rt::test] async fn error_cause_should_be_propagated_to_middlewares() { let lock = Arc::new(Mutex::new(None)); let spy_middleware = SpyMiddleware(lock.clone()); let app = init_service( actix_web::App::new() .wrap(spy_middleware.clone()) .service(test), ) .await; call_service(&app, TestRequest::with_uri("/test").to_request()).await; let was_error_captured = lock.lock().await.unwrap(); assert!(was_error_captured); }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/tests/utils.rs
actix-web/tests/utils.rs
// compiling some tests will trigger unused function warnings even though other tests use them #![allow(dead_code)] use std::io::{Read as _, Write as _}; pub mod gzip { use flate2::{read::GzDecoder, write::GzEncoder, Compression}; use super::*; pub fn encode(bytes: impl AsRef<[u8]>) -> Vec<u8> { let mut encoder = GzEncoder::new(Vec::new(), Compression::fast()); encoder.write_all(bytes.as_ref()).unwrap(); encoder.finish().unwrap() } pub fn decode(bytes: impl AsRef<[u8]>) -> Vec<u8> { let mut decoder = GzDecoder::new(bytes.as_ref()); let mut buf = Vec::new(); decoder.read_to_end(&mut buf).unwrap(); buf } } pub mod deflate { use flate2::{read::ZlibDecoder, write::ZlibEncoder, Compression}; use super::*; pub fn encode(bytes: impl AsRef<[u8]>) -> Vec<u8> { let mut encoder = ZlibEncoder::new(Vec::new(), Compression::fast()); encoder.write_all(bytes.as_ref()).unwrap(); encoder.finish().unwrap() } pub fn decode(bytes: impl AsRef<[u8]>) -> Vec<u8> { let mut decoder = ZlibDecoder::new(bytes.as_ref()); let mut buf = Vec::new(); decoder.read_to_end(&mut buf).unwrap(); buf } } pub mod brotli { use ::brotli::{reader::Decompressor as BrotliDecoder, CompressorWriter as BrotliEncoder}; use super::*; pub fn encode(bytes: impl AsRef<[u8]>) -> Vec<u8> { let mut encoder = BrotliEncoder::new( Vec::new(), 8 * 1024, // 32 KiB buffer 3, // BROTLI_PARAM_QUALITY 22, // BROTLI_PARAM_LGWIN ); encoder.write_all(bytes.as_ref()).unwrap(); encoder.flush().unwrap(); encoder.into_inner() } pub fn decode(bytes: impl AsRef<[u8]>) -> Vec<u8> { let mut decoder = BrotliDecoder::new(bytes.as_ref(), 8_096); let mut buf = Vec::new(); decoder.read_to_end(&mut buf).unwrap(); buf } } pub mod zstd { use ::zstd::stream::{read::Decoder, write::Encoder}; use super::*; pub fn encode(bytes: impl AsRef<[u8]>) -> Vec<u8> { let mut encoder = Encoder::new(Vec::new(), 3).unwrap(); encoder.write_all(bytes.as_ref()).unwrap(); encoder.finish().unwrap() } pub fn decode(bytes: impl AsRef<[u8]>) -> Vec<u8> { let mut decoder = Decoder::new(bytes.as_ref()).unwrap(); let mut buf = Vec::new(); decoder.read_to_end(&mut buf).unwrap(); buf } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/tests/compression.rs
actix-web/tests/compression.rs
use actix_http::ContentEncoding; use actix_web::{ http::{header, StatusCode}, middleware::Compress, web, App, HttpResponse, }; use bytes::Bytes; mod utils; static LOREM: &[u8] = include_bytes!("fixtures/lorem.txt"); static LOREM_GZIP: &[u8] = include_bytes!("fixtures/lorem.txt.gz"); static LOREM_BR: &[u8] = include_bytes!("fixtures/lorem.txt.br"); static LOREM_ZSTD: &[u8] = include_bytes!("fixtures/lorem.txt.zst"); static LOREM_XZ: &[u8] = include_bytes!("fixtures/lorem.txt.xz"); macro_rules! test_server { () => { actix_test::start(|| { App::new() .wrap(Compress::default()) .route( "/static", web::to(|| async { HttpResponse::Ok().body(LOREM) }), ) .route( "/static-gzip", web::to(|| async { HttpResponse::Ok() // signal to compressor that content should not be altered // signal to client that content is encoded .insert_header(ContentEncoding::Gzip) .body(LOREM_GZIP) }), ) .route( "/static-br", web::to(|| async { HttpResponse::Ok() // signal to compressor that content should not be altered // signal to client that content is encoded .insert_header(ContentEncoding::Brotli) .body(LOREM_BR) }), ) .route( "/static-zstd", web::to(|| async { HttpResponse::Ok() // signal to compressor that content should not be altered // signal to client that content is encoded .insert_header(ContentEncoding::Zstd) .body(LOREM_ZSTD) }), ) .route( "/static-xz", web::to(|| async { HttpResponse::Ok() // signal to compressor that content should not be altered // signal to client that content is encoded as 7zip .insert_header((header::CONTENT_ENCODING, "xz")) .body(LOREM_XZ) }), ) .route( "/echo", web::to(|body: Bytes| async move { HttpResponse::Ok().body(body) }), ) }) }; } #[actix_rt::test] async fn negotiate_encoding_identity() { let srv = test_server!(); let req = srv .post("/static") .insert_header((header::ACCEPT_ENCODING, "identity")) .send(); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); assert_eq!(res.headers().get(header::CONTENT_ENCODING), None); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(LOREM)); srv.stop().await; } #[actix_rt::test] async fn negotiate_encoding_gzip() { let srv = test_server!(); let req = srv .post("/static") .insert_header((header::ACCEPT_ENCODING, "gzip, br;q=0.8, zstd;q=0.5")) .send(); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); assert_eq!(res.headers().get(header::CONTENT_ENCODING).unwrap(), "gzip"); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(LOREM)); let mut res = srv .post("/static") .no_decompress() .insert_header((header::ACCEPT_ENCODING, "gzip, br;q=0.8, zstd;q=0.5")) .send() .await .unwrap(); let bytes = res.body().await.unwrap(); assert_eq!(utils::gzip::decode(bytes), LOREM); srv.stop().await; } #[actix_rt::test] async fn negotiate_encoding_br() { let srv = test_server!(); // check that brotli content-encoding header is returned let req = srv .post("/static") .insert_header((header::ACCEPT_ENCODING, "br, zstd, gzip")) .send(); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); assert_eq!(res.headers().get(header::CONTENT_ENCODING).unwrap(), "br"); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(LOREM)); // check that brotli is preferred even when later in (q-less) list let req = srv .post("/static") .insert_header((header::ACCEPT_ENCODING, "gzip, zstd, br")) .send(); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); assert_eq!(res.headers().get(header::CONTENT_ENCODING).unwrap(), "br"); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(LOREM)); // check that returned content is actually brotli encoded let mut res = srv .post("/static") .no_decompress() .insert_header((header::ACCEPT_ENCODING, "br, zstd, gzip")) .send() .await .unwrap(); let bytes = res.body().await.unwrap(); assert_eq!(utils::brotli::decode(bytes), LOREM); srv.stop().await; } #[actix_rt::test] async fn negotiate_encoding_zstd() { let srv = test_server!(); let req = srv .post("/static") .insert_header((header::ACCEPT_ENCODING, "zstd, gzip, br;q=0.8")) .send(); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); assert_eq!(res.headers().get(header::CONTENT_ENCODING).unwrap(), "zstd"); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(LOREM)); let mut res = srv .post("/static") .no_decompress() .insert_header((header::ACCEPT_ENCODING, "zstd, gzip, br;q=0.8")) .send() .await .unwrap(); let bytes = res.body().await.unwrap(); assert_eq!(utils::zstd::decode(bytes), LOREM); srv.stop().await; } #[cfg(all( feature = "compress-brotli", feature = "compress-gzip", feature = "compress-zstd", ))] #[actix_rt::test] async fn client_encoding_prefers_brotli() { let srv = test_server!(); let req = srv.post("/static").send(); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); assert_eq!(res.headers().get(header::CONTENT_ENCODING).unwrap(), "br"); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(LOREM)); srv.stop().await; } #[actix_rt::test] async fn gzip_no_decompress() { let srv = test_server!(); let req = srv .post("/static-gzip") // don't decompress response body .no_decompress() // signal that we want a compressed body .insert_header((header::ACCEPT_ENCODING, "gzip, br;q=0.8, zstd;q=0.5")) .send(); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); assert_eq!(res.headers().get(header::CONTENT_ENCODING).unwrap(), "gzip"); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(LOREM_GZIP)); srv.stop().await; } #[actix_rt::test] async fn manual_custom_coding() { let srv = test_server!(); let req = srv .post("/static-xz") // don't decompress response body .no_decompress() // signal that we want a compressed body .insert_header((header::ACCEPT_ENCODING, "xz")) .send(); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); assert_eq!(res.headers().get(header::CONTENT_ENCODING).unwrap(), "xz"); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(LOREM_XZ)); srv.stop().await; } #[actix_rt::test] async fn deny_identity_coding() { let srv = test_server!(); let req = srv .post("/static") // signal that we want a compressed body .insert_header((header::ACCEPT_ENCODING, "br, identity;q=0")) .send(); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); assert_eq!(res.headers().get(header::CONTENT_ENCODING).unwrap(), "br"); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(LOREM)); srv.stop().await; } #[actix_rt::test] async fn deny_identity_coding_no_decompress() { let srv = test_server!(); let req = srv .post("/static-br") // don't decompress response body .no_decompress() // signal that we want a compressed body .insert_header((header::ACCEPT_ENCODING, "br, identity;q=0")) .send(); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); assert_eq!(res.headers().get(header::CONTENT_ENCODING).unwrap(), "br"); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(LOREM_BR)); srv.stop().await; } // TODO: fix test // currently fails because negotiation doesn't consider unknown encoding types #[ignore] #[actix_rt::test] async fn deny_identity_for_manual_coding() { let srv = test_server!(); let req = srv .post("/static-xz") // don't decompress response body .no_decompress() // signal that we want a compressed body .insert_header((header::ACCEPT_ENCODING, "xz, identity;q=0")) .send(); let mut res = req.await.unwrap(); assert_eq!(res.status(), StatusCode::OK); assert_eq!(res.headers().get(header::CONTENT_ENCODING).unwrap(), "xz"); let bytes = res.body().await.unwrap(); assert_eq!(bytes, Bytes::from_static(LOREM_XZ)); srv.stop().await; }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/benches/responder.rs
actix-web/benches/responder.rs
use std::{future::Future, time::Instant}; use actix_http::body::BoxBody; use actix_utils::future::{ready, Ready}; use actix_web::{http::StatusCode, test::TestRequest, Error, HttpRequest, HttpResponse, Responder}; use criterion::{criterion_group, criterion_main, Criterion}; use futures_util::future::join_all; // responder simulate the old responder trait. trait FutureResponder { type Error; type Future: Future<Output = Result<HttpResponse, Self::Error>>; fn future_respond_to(self, req: &HttpRequest) -> Self::Future; } // a simple wrapper type around string struct StringResponder(String); impl FutureResponder for StringResponder { type Error = Error; type Future = Ready<Result<HttpResponse, Self::Error>>; fn future_respond_to(self, _: &HttpRequest) -> Self::Future { // this is default builder for string response in both new and old responder trait. ready(Ok(HttpResponse::build(StatusCode::OK) .content_type("text/plain; charset=utf-8") .body(self.0))) } } impl Responder for StringResponder { type Body = BoxBody; fn respond_to(self, _: &HttpRequest) -> HttpResponse<Self::Body> { HttpResponse::build(StatusCode::OK) .content_type("text/plain; charset=utf-8") .body(self.0) } } fn future_responder(c: &mut Criterion) { let rt = actix_rt::System::new(); let req = TestRequest::default().to_http_request(); c.bench_function("future_responder", move |b| { b.iter_custom(|_| { let futs = (0..100_000).map(|_| async { StringResponder(String::from("Hello World!!")) .future_respond_to(&req) .await }); let futs = join_all(futs); let start = Instant::now(); let _res = rt.block_on(futs); start.elapsed() }) }); } fn responder(c: &mut Criterion) { let rt = actix_rt::System::new(); let req = TestRequest::default().to_http_request(); c.bench_function("responder", move |b| { b.iter_custom(|_| { let responders = (0..100_000).map(|_| StringResponder(String::from("Hello World!!"))); let start = Instant::now(); let _res = rt.block_on(async { // don't need runtime block on but to be fair. responders.map(|r| r.respond_to(&req)).collect::<Vec<_>>() }); start.elapsed() }) }); } criterion_group!(responder_bench, future_responder, responder); criterion_main!(responder_bench);
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/benches/service.rs
actix-web/benches/service.rs
use std::{cell::RefCell, rc::Rc}; use actix_service::Service; use actix_web::{ dev::{ServiceRequest, ServiceResponse}, test::{init_service, ok_service, TestRequest}, web, App, Error, HttpResponse, }; use criterion::{criterion_main, Criterion}; /// Criterion Benchmark for async Service /// Should be used from within criterion group: /// ```ignore /// let mut criterion: ::criterion::Criterion<_> = /// ::criterion::Criterion::default().configure_from_args(); /// bench_async_service(&mut criterion, ok_service(), "async_service_direct"); /// ``` /// /// Usable for benching Service wrappers: /// Using minimum service code implementation we first measure /// time to run minimum service, then measure time with wrapper. /// /// Sample output /// async_service_direct time: [1.0908 us 1.1656 us 1.2613 us] pub fn bench_async_service<S>(c: &mut Criterion, srv: S, name: &str) where S: Service<ServiceRequest, Response = ServiceResponse, Error = Error> + 'static, { let rt = actix_rt::System::new(); let srv = Rc::new(RefCell::new(srv)); let req = TestRequest::default().to_srv_request(); assert!(rt .block_on(srv.borrow_mut().call(req)) .unwrap() .status() .is_success()); // start benchmark loops c.bench_function(name, move |b| { b.iter_custom(|iters| { let srv = srv.clone(); // exclude request generation, it appears it takes significant time vs call (3us vs 1us) let futs = (0..iters) .map(|_| TestRequest::default().to_srv_request()) .map(|req| srv.borrow_mut().call(req)); let start = std::time::Instant::now(); // benchmark body rt.block_on(async move { for fut in futs { fut.await.unwrap(); } }); // check that at least first request succeeded start.elapsed() }) }); } async fn index(req: ServiceRequest) -> Result<ServiceResponse, Error> { Ok(req.into_response(HttpResponse::Ok().finish())) } // Benchmark basic WebService directly // this approach is usable for benching WebService, though it adds some time to direct service call: // Sample results on MacBook Pro '14 // time: [2.0724 us 2.1345 us 2.2074 us] fn async_web_service(c: &mut Criterion) { let rt = actix_rt::System::new(); let srv = Rc::new(RefCell::new(rt.block_on(init_service( App::new().service(web::service("/").finish(index)), )))); let req = TestRequest::get().uri("/").to_request(); assert!(rt .block_on(srv.borrow_mut().call(req)) .unwrap() .status() .is_success()); // start benchmark loops c.bench_function("async_web_service_direct", move |b| { b.iter_custom(|iters| { let srv = srv.clone(); let futs = (0..iters) .map(|_| TestRequest::get().uri("/").to_request()) .map(|req| srv.borrow_mut().call(req)); let start = std::time::Instant::now(); // benchmark body rt.block_on(async move { for fut in futs { fut.await.unwrap(); } }); // check that at least first request succeeded start.elapsed() }) }); } pub fn service_benches() { let mut criterion: ::criterion::Criterion<_> = ::criterion::Criterion::default().configure_from_args(); bench_async_service(&mut criterion, ok_service(), "async_service_direct"); async_web_service(&mut criterion); } criterion_main!(service_benches);
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/benches/server.rs
actix-web/benches/server.rs
use actix_web::{web, App, HttpResponse}; use awc::Client; use criterion::{criterion_group, criterion_main, Criterion}; use futures_util::future::join_all; const STR: &str = "Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World \ Hello World Hello World Hello World Hello World Hello World"; // benchmark sending all requests at the same time fn bench_async_burst(c: &mut Criterion) { // We are using System here, since Runtime requires preinitialized tokio // Maybe add to actix_rt docs let rt = actix_rt::System::new(); let srv = rt.block_on(async { actix_test::start(|| { App::new().service( web::resource("/").route(web::to(|| async { HttpResponse::Ok().body(STR) })), ) }) }); let url = srv.url("/"); c.bench_function("get_body_async_burst", move |b| { b.iter_custom(|iters| { rt.block_on(async { let client = Client::new().get(url.clone()).freeze().unwrap(); let start = std::time::Instant::now(); // benchmark body let burst = (0..iters).map(|_| client.send()); let resps = join_all(burst).await; let elapsed = start.elapsed(); // if there are failed requests that might be an issue let failed = resps.iter().filter(|r| r.is_err()).count(); if failed > 0 { eprintln!("failed {} requests (might be bench timeout)", failed); }; elapsed }) }) }); } criterion_group!(server_benches, bench_async_burst); criterion_main!(server_benches);
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/examples/on-connect.rs
actix-web/examples/on-connect.rs
//! This example shows how to use `actix_web::HttpServer::on_connect` to access a lower-level socket //! properties and pass them to a handler through request-local data. //! //! For an example of extracting a client TLS certificate, see: //! <https://github.com/actix/examples/tree/main/https-tls/rustls-client-cert> use std::{any::Any, io, net::SocketAddr}; use actix_web::{ dev::Extensions, rt::net::TcpStream, web, App, HttpRequest, HttpResponse, HttpServer, Responder, }; #[allow(dead_code)] #[derive(Debug, Clone)] struct ConnectionInfo { bind: SocketAddr, peer: SocketAddr, ttl: Option<u32>, } async fn route_whoami(req: HttpRequest) -> impl Responder { match req.conn_data::<ConnectionInfo>() { Some(info) => HttpResponse::Ok().body(format!( "Here is some info about your connection:\n\n{info:#?}", )), None => HttpResponse::InternalServerError().body("Missing expected request extension data"), } } fn get_conn_info(connection: &dyn Any, data: &mut Extensions) { if let Some(sock) = connection.downcast_ref::<TcpStream>() { data.insert(ConnectionInfo { bind: sock.local_addr().unwrap(), peer: sock.peer_addr().unwrap(), ttl: sock.ttl().ok(), }); } else { unreachable!("connection should only be plaintext since no TLS is set up"); } } #[actix_web::main] async fn main() -> io::Result<()> { env_logger::init_from_env(env_logger::Env::new().default_filter_or("info")); let bind = ("127.0.0.1", 8080); log::info!("staring server at http://{}:{}", &bind.0, &bind.1); HttpServer::new(|| App::new().default_service(web::to(route_whoami))) .on_connect(get_conn_info) .bind_auto_h2c(bind)? .workers(2) .run() .await }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/examples/middleware_from_fn.rs
actix-web/examples/middleware_from_fn.rs
//! Shows a couple of ways to use the `from_fn` middleware. use std::{collections::HashMap, io, rc::Rc, time::Duration}; use actix_web::{ body::MessageBody, dev::{Service, ServiceRequest, ServiceResponse, Transform}, http::header::{self, HeaderValue, Range}, middleware::{from_fn, Logger, Next}, web::{self, Header, Query}, App, Error, HttpResponse, HttpServer, }; async fn noop<B>(req: ServiceRequest, next: Next<B>) -> Result<ServiceResponse<B>, Error> { next.call(req).await } async fn print_range_header<B>( range_header: Option<Header<Range>>, req: ServiceRequest, next: Next<B>, ) -> Result<ServiceResponse<B>, Error> { if let Some(Header(range)) = range_header { println!("Range: {range}"); } else { println!("No Range header"); } next.call(req).await } async fn mutate_body_type( req: ServiceRequest, next: Next<impl MessageBody + 'static>, ) -> Result<ServiceResponse<impl MessageBody>, Error> { let res = next.call(req).await?; Ok(res.map_into_left_body::<()>()) } async fn mutate_body_type_with_extractors( string_body: String, query: Query<HashMap<String, String>>, req: ServiceRequest, next: Next<impl MessageBody + 'static>, ) -> Result<ServiceResponse<impl MessageBody>, Error> { println!("body is: {string_body}"); println!("query string: {query:?}"); let res = next.call(req).await?; Ok(res.map_body(move |_, _| string_body)) } async fn timeout_10secs( req: ServiceRequest, next: Next<impl MessageBody + 'static>, ) -> Result<ServiceResponse<impl MessageBody>, Error> { match tokio::time::timeout(Duration::from_secs(10), next.call(req)).await { Ok(res) => res, Err(_err) => Err(actix_web::error::ErrorRequestTimeout("")), } } struct MyMw(bool); impl MyMw { async fn mw_cb( &self, req: ServiceRequest, next: Next<impl MessageBody + 'static>, ) -> Result<ServiceResponse<impl MessageBody>, Error> { let mut res = match self.0 { true => req.into_response("short-circuited").map_into_right_body(), false => next.call(req).await?.map_into_left_body(), }; res.headers_mut() .insert(header::WARNING, HeaderValue::from_static("42")); Ok(res) } pub fn into_middleware<S, B>( self, ) -> impl Transform< S, ServiceRequest, Response = ServiceResponse<impl MessageBody>, Error = Error, InitError = (), > where S: Service<ServiceRequest, Response = ServiceResponse<B>, Error = Error> + 'static, B: MessageBody + 'static, { let this = Rc::new(self); from_fn(move |req, next| { let this = Rc::clone(&this); async move { Self::mw_cb(&this, req, next).await } }) } } #[actix_web::main] async fn main() -> io::Result<()> { env_logger::init_from_env(env_logger::Env::new().default_filter_or("info")); let bind = ("127.0.0.1", 8080); log::info!("staring server at http://{}:{}", &bind.0, &bind.1); HttpServer::new(|| { App::new() .wrap(from_fn(noop)) .wrap(from_fn(print_range_header)) .wrap(from_fn(mutate_body_type)) .wrap(from_fn(mutate_body_type_with_extractors)) .wrap(from_fn(timeout_10secs)) // switch bool to true to observe early response .wrap(MyMw(false).into_middleware()) .wrap(Logger::default()) .default_service(web::to(HttpResponse::Ok)) }) .workers(1) .bind(bind)? .run() .await }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/examples/worker-cpu-pin.rs
actix-web/examples/worker-cpu-pin.rs
use std::{ io, sync::{ atomic::{AtomicUsize, Ordering}, Arc, }, thread, }; use actix_web::{middleware, web, App, HttpServer}; async fn hello() -> &'static str { "Hello world!" } #[actix_web::main] async fn main() -> io::Result<()> { env_logger::init_from_env(env_logger::Env::new().default_filter_or("info")); let core_ids = core_affinity::get_core_ids().unwrap(); let n_core_ids = core_ids.len(); let next_core_id = Arc::new(AtomicUsize::new(0)); HttpServer::new(move || { let pin = Arc::clone(&next_core_id).fetch_add(1, Ordering::AcqRel); log::info!( "setting CPU affinity for worker {}: pinning to core {}", thread::current().name().unwrap(), pin, ); core_affinity::set_for_current(core_ids[pin]); App::new() .wrap(middleware::Logger::default()) .service(web::resource("/").get(hello)) }) .bind(("127.0.0.1", 8080))? .workers(n_core_ids) .run() .await }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/examples/from_fn.rs
actix-web/examples/from_fn.rs
//! Shows a few of ways to use the `from_fn` middleware. use std::{collections::HashMap, io, rc::Rc, time::Duration}; use actix_web::{ body::MessageBody, dev::{Service, ServiceRequest, ServiceResponse, Transform}, http::header::{self, HeaderValue, Range}, middleware::{from_fn, Logger, Next}, web::{self, Header, Query}, App, Error, HttpResponse, HttpServer, }; use tracing::info; async fn noop<B>(req: ServiceRequest, next: Next<B>) -> Result<ServiceResponse<B>, Error> { next.call(req).await } async fn print_range_header<B>( range_header: Option<Header<Range>>, req: ServiceRequest, next: Next<B>, ) -> Result<ServiceResponse<B>, Error> { if let Some(Header(range)) = range_header { println!("Range: {range}"); } else { println!("No Range header"); } next.call(req).await } async fn mutate_body_type( req: ServiceRequest, next: Next<impl MessageBody + 'static>, ) -> Result<ServiceResponse<impl MessageBody>, Error> { let res = next.call(req).await?; Ok(res.map_into_left_body::<()>()) } async fn mutate_body_type_with_extractors( string_body: String, query: Query<HashMap<String, String>>, req: ServiceRequest, next: Next<impl MessageBody + 'static>, ) -> Result<ServiceResponse<impl MessageBody>, Error> { println!("body is: {string_body}"); println!("query string: {query:?}"); let res = next.call(req).await?; Ok(res.map_body(move |_, _| string_body)) } async fn timeout_10secs( req: ServiceRequest, next: Next<impl MessageBody + 'static>, ) -> Result<ServiceResponse<impl MessageBody>, Error> { match tokio::time::timeout(Duration::from_secs(10), next.call(req)).await { Ok(res) => res, Err(_err) => Err(actix_web::error::ErrorRequestTimeout("")), } } struct MyMw(bool); impl MyMw { async fn mw_cb( &self, req: ServiceRequest, next: Next<impl MessageBody + 'static>, ) -> Result<ServiceResponse<impl MessageBody>, Error> { let mut res = match self.0 { true => req.into_response("short-circuited").map_into_right_body(), false => next.call(req).await?.map_into_left_body(), }; res.headers_mut() .insert(header::WARNING, HeaderValue::from_static("42")); Ok(res) } pub fn into_middleware<S, B>( self, ) -> impl Transform< S, ServiceRequest, Response = ServiceResponse<impl MessageBody>, Error = Error, InitError = (), > where S: Service<ServiceRequest, Response = ServiceResponse<B>, Error = Error> + 'static, B: MessageBody + 'static, { let this = Rc::new(self); from_fn(move |req, next| { let this = Rc::clone(&this); async move { Self::mw_cb(&this, req, next).await } }) } } #[actix_web::main] async fn main() -> io::Result<()> { env_logger::init_from_env(env_logger::Env::new().default_filter_or("info")); let bind = ("127.0.0.1", 8080); info!("staring server at http://{}:{}", &bind.0, &bind.1); HttpServer::new(|| { App::new() .wrap(from_fn(noop)) .wrap(from_fn(print_range_header)) .wrap(from_fn(mutate_body_type)) .wrap(from_fn(mutate_body_type_with_extractors)) .wrap(from_fn(timeout_10secs)) // switch bool to true to observe early response .wrap(MyMw(false).into_middleware()) .wrap(Logger::default()) .default_service(web::to(HttpResponse::Ok)) }) .workers(1) .bind(bind)? .run() .await }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/examples/basic.rs
actix-web/examples/basic.rs
use actix_web::{get, middleware, web, App, HttpRequest, HttpResponse, HttpServer}; #[get("/resource1/{name}/index.html")] async fn index(req: HttpRequest, name: web::Path<String>) -> String { println!("REQ: {:?}", req); format!("Hello: {}!\r\n", name) } async fn index_async(req: HttpRequest) -> &'static str { println!("REQ: {:?}", req); "Hello world!\r\n" } #[get("/")] async fn no_params() -> &'static str { "Hello world!\r\n" } #[actix_web::main] async fn main() -> std::io::Result<()> { env_logger::init_from_env(env_logger::Env::new().default_filter_or("info")); log::info!("starting HTTP server at http://localhost:8080"); HttpServer::new(|| { App::new() .wrap(middleware::DefaultHeaders::new().add(("X-Version", "0.2"))) .wrap(middleware::Compress::default()) .wrap(middleware::Logger::default().log_target("http_log")) .service(index) .service(no_params) .service( web::resource("/resource2/index.html") .wrap(middleware::DefaultHeaders::new().add(("X-Version-R2", "0.3"))) .default_service(web::route().to(HttpResponse::MethodNotAllowed)) .route(web::get().to(index_async)), ) .service(web::resource("/test1.html").to(|| async { "Test\r\n" })) }) .bind(("127.0.0.1", 8080))? .workers(1) .run() .await }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/examples/uds.rs
actix-web/examples/uds.rs
use actix_web::{get, web, HttpRequest}; #[cfg(unix)] use actix_web::{middleware, App, Error, HttpResponse, HttpServer}; #[get("/resource1/{name}/index.html")] async fn index(req: HttpRequest, name: web::Path<String>) -> String { println!("REQ: {:?}", req); format!("Hello: {}!\r\n", name) } #[cfg(unix)] async fn index_async(req: HttpRequest) -> Result<&'static str, Error> { println!("REQ: {:?}", req); Ok("Hello world!\r\n") } #[get("/")] async fn no_params() -> &'static str { "Hello world!\r\n" } #[cfg(unix)] #[actix_web::main] async fn main() -> std::io::Result<()> { env_logger::init_from_env(env_logger::Env::new().default_filter_or("info")); HttpServer::new(|| { App::new() .wrap(middleware::DefaultHeaders::new().add(("X-Version", "0.2"))) .wrap(middleware::Compress::default()) .wrap(middleware::Logger::default()) .service(index) .service(no_params) .service( web::resource("/resource2/index.html") .wrap(middleware::DefaultHeaders::new().add(("X-Version-R2", "0.3"))) .default_service(web::route().to(HttpResponse::MethodNotAllowed)) .route(web::get().to(index_async)), ) .service(web::resource("/test1.html").to(|| async { "Test\r\n" })) }) .bind_uds("/Users/me/uds-test")? .workers(1) .run() .await } #[cfg(not(unix))] fn main() {}
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-web/examples/macroless.rs
actix-web/examples/macroless.rs
use actix_web::{middleware, rt, web, App, HttpRequest, HttpServer}; async fn index(req: HttpRequest) -> &'static str { println!("REQ: {:?}", req); "Hello world!\r\n" } fn main() -> std::io::Result<()> { env_logger::init_from_env(env_logger::Env::new().default_filter_or("info")); rt::System::new().block_on( HttpServer::new(|| { App::new() .wrap(middleware::Logger::default()) .service(web::resource("/").route(web::get().to(index))) }) .bind(("127.0.0.1", 8080))? .workers(1) .run(), ) }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-test/src/lib.rs
actix-test/src/lib.rs
//! Integration testing tools for Actix Web applications. //! //! The main integration testing tool is [`TestServer`]. It spawns a real HTTP server on an //! unused port and provides methods that use a real HTTP client. Therefore, it is much closer to //! real-world cases than using `init_service`, which skips HTTP encoding and decoding. //! //! # Examples //! //! ``` //! use actix_web::{get, web, test, App, HttpResponse, Error, Responder}; //! //! #[get("/")] //! async fn my_handler() -> Result<impl Responder, Error> { //! Ok(HttpResponse::Ok()) //! } //! //! #[actix_rt::test] //! async fn test_example() { //! let srv = actix_test::start(|| //! App::new().service(my_handler) //! ); //! //! let req = srv.get("/"); //! let res = req.send().await.unwrap(); //! //! assert!(res.status().is_success()); //! } //! ``` #![doc(html_logo_url = "https://actix.rs/img/logo.png")] #![doc(html_favicon_url = "https://actix.rs/favicon.ico")] #![cfg_attr(docsrs, feature(doc_cfg))] #[cfg(feature = "openssl")] extern crate tls_openssl as openssl; use std::{fmt, net, thread, time::Duration}; use actix_codec::{AsyncRead, AsyncWrite, Framed}; pub use actix_http::{body::to_bytes, test::TestBuffer}; use actix_http::{header::HeaderMap, ws, HttpService, Method, Request, Response}; pub use actix_http_test::unused_addr; use actix_service::{map_config, IntoServiceFactory, ServiceFactory, ServiceFactoryExt as _}; pub use actix_web::test::{ call_and_read_body, call_and_read_body_json, call_service, init_service, ok_service, read_body, read_body_json, status_service, TestRequest, }; use actix_web::{ body::MessageBody, dev::{AppConfig, Server, ServerHandle, Service}, rt::{self, System}, web, Error, }; pub use awc::{error::PayloadError, Client, ClientRequest, ClientResponse, Connector}; use futures_core::Stream; use tokio::sync::mpsc; /// Start default [`TestServer`]. /// /// # Examples /// ``` /// use actix_web::{get, web, test, App, HttpResponse, Error, Responder}; /// /// #[get("/")] /// async fn my_handler() -> Result<impl Responder, Error> { /// Ok(HttpResponse::Ok()) /// } /// /// #[actix_web::test] /// async fn test_example() { /// let srv = actix_test::start(|| /// App::new().service(my_handler) /// ); /// /// let req = srv.get("/"); /// let res = req.send().await.unwrap(); /// /// assert!(res.status().is_success()); /// } /// ``` pub fn start<F, I, S, B>(factory: F) -> TestServer where F: Fn() -> I + Send + Clone + 'static, I: IntoServiceFactory<S, Request>, S: ServiceFactory<Request, Config = AppConfig> + 'static, S::Error: Into<Error> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, { start_with(TestServerConfig::default(), factory) } /// Start test server with custom configuration /// /// Check [`TestServerConfig`] docs for configuration options. /// /// # Examples /// ``` /// use actix_web::{get, web, test, App, HttpResponse, Error, Responder}; /// /// #[get("/")] /// async fn my_handler() -> Result<impl Responder, Error> { /// Ok(HttpResponse::Ok()) /// } /// /// #[actix_web::test] /// async fn test_example() { /// let srv = actix_test::start_with(actix_test::config().h1(), || /// App::new().service(my_handler) /// ); /// /// let req = srv.get("/"); /// let res = req.send().await.unwrap(); /// /// assert!(res.status().is_success()); /// } /// ``` pub fn start_with<F, I, S, B>(cfg: TestServerConfig, factory: F) -> TestServer where F: Fn() -> I + Send + Clone + 'static, I: IntoServiceFactory<S, Request>, S: ServiceFactory<Request, Config = AppConfig> + 'static, S::Error: Into<Error> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, { // for sending handles and server info back from the spawned thread let (started_tx, started_rx) = std::sync::mpsc::channel(); // for signaling the shutdown of spawned server and system let (thread_stop_tx, thread_stop_rx) = mpsc::channel(1); let tls = match cfg.stream { StreamType::Tcp => false, #[cfg(feature = "openssl")] StreamType::Openssl(_) => true, #[cfg(feature = "rustls-0_20")] StreamType::Rustls020(_) => true, #[cfg(feature = "rustls-0_21")] StreamType::Rustls021(_) => true, #[cfg(feature = "rustls-0_22")] StreamType::Rustls022(_) => true, #[cfg(feature = "rustls-0_23")] StreamType::Rustls023(_) => true, }; let client_cfg = cfg.clone(); // run server in separate orphaned thread thread::spawn(move || { rt::System::new().block_on(async move { let tcp = net::TcpListener::bind((cfg.listen_address.clone(), cfg.port)).unwrap(); let local_addr = tcp.local_addr().unwrap(); let factory = factory.clone(); let srv_cfg = cfg.clone(); let timeout = cfg.client_request_timeout; let builder = Server::build() .workers(cfg.workers) .disable_signals() .system_exit(); let srv = match srv_cfg.stream { StreamType::Tcp => match srv_cfg.tp { HttpVer::Http1 => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .h1(map_config(fac, move |_| app_cfg.clone())) .tcp() }), HttpVer::Http2 => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .h2(map_config(fac, move |_| app_cfg.clone())) .tcp() }), HttpVer::Both => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .finish(map_config(fac, move |_| app_cfg.clone())) .tcp() }), }, #[cfg(feature = "openssl")] StreamType::Openssl(acceptor) => match cfg.tp { HttpVer::Http1 => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .h1(map_config(fac, move |_| app_cfg.clone())) .openssl(acceptor.clone()) }), HttpVer::Http2 => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .h2(map_config(fac, move |_| app_cfg.clone())) .openssl(acceptor.clone()) }), HttpVer::Both => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .finish(map_config(fac, move |_| app_cfg.clone())) .openssl(acceptor.clone()) }), }, #[cfg(feature = "rustls-0_20")] StreamType::Rustls020(config) => match cfg.tp { HttpVer::Http1 => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .h1(map_config(fac, move |_| app_cfg.clone())) .rustls(config.clone()) }), HttpVer::Http2 => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .h2(map_config(fac, move |_| app_cfg.clone())) .rustls(config.clone()) }), HttpVer::Both => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .finish(map_config(fac, move |_| app_cfg.clone())) .rustls(config.clone()) }), }, #[cfg(feature = "rustls-0_21")] StreamType::Rustls021(config) => match cfg.tp { HttpVer::Http1 => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .h1(map_config(fac, move |_| app_cfg.clone())) .rustls_021(config.clone()) }), HttpVer::Http2 => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .h2(map_config(fac, move |_| app_cfg.clone())) .rustls_021(config.clone()) }), HttpVer::Both => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .finish(map_config(fac, move |_| app_cfg.clone())) .rustls_021(config.clone()) }), }, #[cfg(feature = "rustls-0_22")] StreamType::Rustls022(config) => match cfg.tp { HttpVer::Http1 => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .h1(map_config(fac, move |_| app_cfg.clone())) .rustls_0_22(config.clone()) }), HttpVer::Http2 => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .h2(map_config(fac, move |_| app_cfg.clone())) .rustls_0_22(config.clone()) }), HttpVer::Both => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .finish(map_config(fac, move |_| app_cfg.clone())) .rustls_0_22(config.clone()) }), }, #[cfg(feature = "rustls-0_23")] StreamType::Rustls023(config) => match cfg.tp { HttpVer::Http1 => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .h1(map_config(fac, move |_| app_cfg.clone())) .rustls_0_23(config.clone()) }), HttpVer::Http2 => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .h2(map_config(fac, move |_| app_cfg.clone())) .rustls_0_23(config.clone()) }), HttpVer::Both => builder.listen("test", tcp, move || { let app_cfg = AppConfig::__priv_test_new(false, local_addr.to_string(), local_addr); let fac = factory() .into_factory() .map_err(|err| err.into().error_response()); HttpService::build() .client_request_timeout(timeout) .finish(map_config(fac, move |_| app_cfg.clone())) .rustls_0_23(config.clone()) }), }, } .expect("test server could not be created"); let srv = srv.run(); started_tx .send((System::current(), srv.handle(), local_addr)) .unwrap(); // drive server loop srv.await.unwrap(); // notify TestServer that server and system have shut down // all thread managed resources should be dropped at this point }); #[allow(clippy::let_underscore_future)] let _ = thread_stop_tx.send(()); }); let (system, server, addr) = started_rx.recv().unwrap(); let client = { let connector = { #[cfg(feature = "openssl")] { use openssl::ssl::{SslConnector, SslMethod, SslVerifyMode}; let mut builder = SslConnector::builder(SslMethod::tls()).unwrap(); builder.set_verify(SslVerifyMode::NONE); let _ = builder .set_alpn_protos(b"\x02h2\x08http/1.1") .map_err(|err| log::error!("Can not set alpn protocol: {err:?}")); Connector::new() .conn_lifetime(Duration::from_secs(0)) .timeout(Duration::from_millis(30000)) .openssl(builder.build()) } #[cfg(not(feature = "openssl"))] { Connector::new() .conn_lifetime(Duration::from_secs(0)) .timeout(Duration::from_millis(30000)) } }; let mut client_builder = Client::builder().connector(connector); if client_cfg.disable_redirects { client_builder = client_builder.disable_redirects(); } client_builder.finish() }; TestServer { server, thread_stop_rx, client, system, addr, tls, } } #[derive(Debug, Clone)] enum HttpVer { Http1, Http2, Both, } #[allow(clippy::large_enum_variant)] #[derive(Clone)] enum StreamType { Tcp, #[cfg(feature = "openssl")] Openssl(openssl::ssl::SslAcceptor), #[cfg(feature = "rustls-0_20")] Rustls020(tls_rustls_0_20::ServerConfig), #[cfg(feature = "rustls-0_21")] Rustls021(tls_rustls_0_21::ServerConfig), #[cfg(feature = "rustls-0_22")] Rustls022(tls_rustls_0_22::ServerConfig), #[cfg(feature = "rustls-0_23")] Rustls023(tls_rustls_0_23::ServerConfig), } /// Create default test server config. pub fn config() -> TestServerConfig { TestServerConfig::default() } #[derive(Clone)] pub struct TestServerConfig { tp: HttpVer, stream: StreamType, client_request_timeout: Duration, listen_address: String, port: u16, workers: usize, disable_redirects: bool, } impl Default for TestServerConfig { fn default() -> Self { TestServerConfig::new() } } impl TestServerConfig { /// Constructs default server configuration. pub(crate) fn new() -> TestServerConfig { TestServerConfig { tp: HttpVer::Both, stream: StreamType::Tcp, client_request_timeout: Duration::from_secs(5), listen_address: "127.0.0.1".to_string(), port: 0, workers: 1, disable_redirects: false, } } /// Accepts HTTP/1.1 only. pub fn h1(mut self) -> Self { self.tp = HttpVer::Http1; self } /// Accepts HTTP/2 only. pub fn h2(mut self) -> Self { self.tp = HttpVer::Http2; self } /// Accepts secure connections via OpenSSL. #[cfg(feature = "openssl")] pub fn openssl(mut self, acceptor: openssl::ssl::SslAcceptor) -> Self { self.stream = StreamType::Openssl(acceptor); self } #[doc(hidden)] #[deprecated(note = "Renamed to `rustls_0_20()`.")] #[cfg(feature = "rustls-0_20")] pub fn rustls(mut self, config: tls_rustls_0_20::ServerConfig) -> Self { self.stream = StreamType::Rustls020(config); self } /// Accepts secure connections via Rustls v0.20. #[cfg(feature = "rustls-0_20")] pub fn rustls_0_20(mut self, config: tls_rustls_0_20::ServerConfig) -> Self { self.stream = StreamType::Rustls020(config); self } #[doc(hidden)] #[deprecated(note = "Renamed to `rustls_0_21()`.")] #[cfg(feature = "rustls-0_21")] pub fn rustls_021(mut self, config: tls_rustls_0_21::ServerConfig) -> Self { self.stream = StreamType::Rustls021(config); self } /// Accepts secure connections via Rustls v0.21. #[cfg(feature = "rustls-0_21")] pub fn rustls_0_21(mut self, config: tls_rustls_0_21::ServerConfig) -> Self { self.stream = StreamType::Rustls021(config); self } /// Accepts secure connections via Rustls v0.22. #[cfg(feature = "rustls-0_22")] pub fn rustls_0_22(mut self, config: tls_rustls_0_22::ServerConfig) -> Self { self.stream = StreamType::Rustls022(config); self } /// Accepts secure connections via Rustls v0.23. #[cfg(feature = "rustls-0_23")] pub fn rustls_0_23(mut self, config: tls_rustls_0_23::ServerConfig) -> Self { self.stream = StreamType::Rustls023(config); self } /// Sets client timeout for first request. pub fn client_request_timeout(mut self, dur: Duration) -> Self { self.client_request_timeout = dur; self } /// Sets the address the server will listen on. /// /// By default, only listens on `127.0.0.1`. pub fn listen_address(mut self, addr: impl Into<String>) -> Self { self.listen_address = addr.into(); self } /// Sets test server port. /// /// By default, a random free port is determined by the OS. pub fn port(mut self, port: u16) -> Self { self.port = port; self } /// Sets number of workers for the test server. /// /// By default, the server uses 1 worker pub fn workers(mut self, workers: usize) -> Self { self.workers = workers; self } /// Instruct the client to not follow redirects. /// /// By default, the client will follow up to 10 consecutive redirects /// before giving up. pub fn disable_redirects(mut self) -> Self { self.disable_redirects = true; self } } /// A basic HTTP server controller that simplifies the process of writing integration tests for /// Actix Web applications. /// /// See [`start`] for usage example. pub struct TestServer { server: ServerHandle, thread_stop_rx: mpsc::Receiver<()>, client: awc::Client, system: rt::System, addr: net::SocketAddr, tls: bool, } impl TestServer { /// Construct test server url pub fn addr(&self) -> net::SocketAddr { self.addr } /// Construct test server url pub fn url(&self, uri: &str) -> String { let scheme = if self.tls { "https" } else { "http" }; if uri.starts_with('/') { format!("{}://{}{}", scheme, self.addr, uri) } else { format!("{}://{}/{}", scheme, self.addr, uri) } } /// Create `GET` request. pub fn get(&self, path: impl AsRef<str>) -> ClientRequest { self.client.get(self.url(path.as_ref()).as_str()) } /// Create `POST` request. pub fn post(&self, path: impl AsRef<str>) -> ClientRequest { self.client.post(self.url(path.as_ref()).as_str()) } /// Create `HEAD` request. pub fn head(&self, path: impl AsRef<str>) -> ClientRequest { self.client.head(self.url(path.as_ref()).as_str()) } /// Create `PUT` request. pub fn put(&self, path: impl AsRef<str>) -> ClientRequest { self.client.put(self.url(path.as_ref()).as_str()) } /// Create `PATCH` request. pub fn patch(&self, path: impl AsRef<str>) -> ClientRequest { self.client.patch(self.url(path.as_ref()).as_str()) } /// Create `DELETE` request. pub fn delete(&self, path: impl AsRef<str>) -> ClientRequest { self.client.delete(self.url(path.as_ref()).as_str()) } /// Create `OPTIONS` request. pub fn options(&self, path: impl AsRef<str>) -> ClientRequest { self.client.options(self.url(path.as_ref()).as_str()) } /// Connect request with given method and path. pub fn request(&self, method: Method, path: impl AsRef<str>) -> ClientRequest { self.client.request(method, path.as_ref()) } pub async fn load_body<S>( &mut self, mut response: ClientResponse<S>, ) -> Result<web::Bytes, PayloadError> where S: Stream<Item = Result<web::Bytes, PayloadError>> + Unpin + 'static, { response.body().limit(10_485_760).await } /// Connect to WebSocket server at a given path. pub async fn ws_at( &mut self, path: &str, ) -> Result<Framed<impl AsyncRead + AsyncWrite, ws::Codec>, awc::error::WsClientError> { let url = self.url(path); let connect = self.client.ws(url).connect(); connect.await.map(|(_, framed)| framed) } /// Connect to a WebSocket server. pub async fn ws( &mut self, ) -> Result<Framed<impl AsyncRead + AsyncWrite, ws::Codec>, awc::error::WsClientError> { self.ws_at("/").await } /// Get default HeaderMap of Client. /// /// Returns Some(&mut HeaderMap) when Client object is unique /// (No other clone of client exists at the same time). pub fn client_headers(&mut self) -> Option<&mut HeaderMap> { self.client.headers() } /// Stop HTTP server. /// /// Waits for spawned `Server` and `System` to shutdown (force) shutdown. pub async fn stop(mut self) { // signal server to stop self.server.stop(false).await; // also signal system to stop // though this is handled by `ServerBuilder::exit_system` too self.system.stop(); // wait for thread to be stopped but don't care about result let _ = self.thread_stop_rx.recv().await; } } impl Drop for TestServer { fn drop(&mut self) { // calls in this Drop impl should be enough to shut down the server, system, and thread // without needing to await anything // signal server to stop #[allow(clippy::let_underscore_future)] let _ = self.server.stop(true); // signal system to stop self.system.stop(); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/config.rs
actix-http/src/config.rs
use std::{ net::SocketAddr, rc::Rc, time::{Duration, Instant}, }; use bytes::BytesMut; use crate::{date::DateService, KeepAlive}; /// A builder for creating a [`ServiceConfig`] #[derive(Default, Debug)] pub struct ServiceConfigBuilder { inner: Inner, } impl ServiceConfigBuilder { /// Creates a new, default, [`ServiceConfigBuilder`] /// /// It uses the following default values: /// /// - [`KeepAlive::default`] for the connection keep-alive setting /// - 5 seconds for the client request timeout /// - 0 seconds for the client shutdown timeout /// - secure value of `false` /// - [`None`] for the local address setting /// - Allow for half closed HTTP/1 connections pub fn new() -> Self { Self::default() } /// Sets the `secure` attribute for this configuration pub fn secure(mut self, secure: bool) -> Self { self.inner.secure = secure; self } /// Sets the local address for this configuration pub fn local_addr(mut self, local_addr: Option<SocketAddr>) -> Self { self.inner.local_addr = local_addr; self } /// Sets connection keep-alive setting pub fn keep_alive(mut self, keep_alive: KeepAlive) -> Self { self.inner.keep_alive = keep_alive; self } /// Sets the timeout for the client to finish sending the head of its first request pub fn client_request_timeout(mut self, timeout: Duration) -> Self { self.inner.client_request_timeout = timeout; self } /// Sets the timeout for cleanly disconnecting from the client after connection shutdown has /// started pub fn client_disconnect_timeout(mut self, timeout: Duration) -> Self { self.inner.client_disconnect_timeout = timeout; self } /// Sets whether HTTP/1 connections should support half-closures. /// /// Clients can choose to shutdown their writer-side of the connection after completing their /// request and while waiting for the server response. Setting this to `false` will cause the /// server to abort the connection handling as soon as it detects an EOF from the client pub fn h1_allow_half_closed(mut self, allow: bool) -> Self { self.inner.h1_allow_half_closed = allow; self } /// Builds a [`ServiceConfig`] from this [`ServiceConfigBuilder`] instance pub fn build(self) -> ServiceConfig { ServiceConfig(Rc::new(self.inner)) } } /// HTTP service configuration. #[derive(Debug, Clone, Default)] pub struct ServiceConfig(Rc<Inner>); #[derive(Debug)] struct Inner { keep_alive: KeepAlive, client_request_timeout: Duration, client_disconnect_timeout: Duration, secure: bool, local_addr: Option<SocketAddr>, date_service: DateService, h1_allow_half_closed: bool, } impl Default for Inner { fn default() -> Self { Self { keep_alive: KeepAlive::default(), client_request_timeout: Duration::from_secs(5), client_disconnect_timeout: Duration::ZERO, secure: false, local_addr: None, date_service: DateService::new(), h1_allow_half_closed: true, } } } impl ServiceConfig { /// Create instance of `ServiceConfig`. pub fn new( keep_alive: KeepAlive, client_request_timeout: Duration, client_disconnect_timeout: Duration, secure: bool, local_addr: Option<SocketAddr>, ) -> ServiceConfig { ServiceConfig(Rc::new(Inner { keep_alive: keep_alive.normalize(), client_request_timeout, client_disconnect_timeout, secure, local_addr, date_service: DateService::new(), h1_allow_half_closed: true, })) } /// Returns `true` if connection is secure (i.e., using TLS / HTTPS). #[inline] pub fn secure(&self) -> bool { self.0.secure } /// Returns the local address that this server is bound to. /// /// Returns `None` for connections via UDS (Unix Domain Socket). #[inline] pub fn local_addr(&self) -> Option<SocketAddr> { self.0.local_addr } /// Connection keep-alive setting. #[inline] pub fn keep_alive(&self) -> KeepAlive { self.0.keep_alive } /// Creates a time object representing the deadline for this connection's keep-alive period, if /// enabled. /// /// When [`KeepAlive::Os`] or [`KeepAlive::Disabled`] is set, this will return `None`. pub fn keep_alive_deadline(&self) -> Option<Instant> { match self.keep_alive() { KeepAlive::Timeout(dur) => Some(self.now() + dur), KeepAlive::Os => None, KeepAlive::Disabled => None, } } /// Creates a time object representing the deadline for the client to finish sending the head of /// its first request. /// /// Returns `None` if this `ServiceConfig was` constructed with `client_request_timeout: 0`. pub fn client_request_deadline(&self) -> Option<Instant> { let timeout = self.0.client_request_timeout; (timeout != Duration::ZERO).then(|| self.now() + timeout) } /// Creates a time object representing the deadline for the client to disconnect. pub fn client_disconnect_deadline(&self) -> Option<Instant> { let timeout = self.0.client_disconnect_timeout; (timeout != Duration::ZERO).then(|| self.now() + timeout) } /// Whether HTTP/1 connections should support half-closures. /// /// Clients can choose to shutdown their writer-side of the connection after completing their /// request and while waiting for the server response. If this configuration is `false`, the /// server will abort the connection handling as soon as it detects an EOF from the client pub fn h1_allow_half_closed(&self) -> bool { self.0.h1_allow_half_closed } pub(crate) fn now(&self) -> Instant { self.0.date_service.now() } /// Writes date header to `dst` buffer. /// /// Low-level method that utilizes the built-in efficient date service, requiring fewer syscalls /// than normal. Note that a CRLF (`\r\n`) is included in what is written. #[doc(hidden)] pub fn write_date_header(&self, dst: &mut BytesMut, camel_case: bool) { let mut buf: [u8; 37] = [0; 37]; buf[..6].copy_from_slice(if camel_case { b"Date: " } else { b"date: " }); self.0 .date_service .with_date(|date| buf[6..35].copy_from_slice(&date.bytes)); buf[35..].copy_from_slice(b"\r\n"); dst.extend_from_slice(&buf); } #[allow(unused)] // used with `http2` feature flag pub(crate) fn write_date_header_value(&self, dst: &mut BytesMut) { self.0 .date_service .with_date(|date| dst.extend_from_slice(&date.bytes)); } } #[cfg(test)] mod tests { use actix_rt::{ task::yield_now, time::{sleep, sleep_until}, }; use memchr::memmem; use super::*; use crate::{date::DATE_VALUE_LENGTH, notify_on_drop}; #[actix_rt::test] async fn test_date_service_update() { let settings = ServiceConfig::new(KeepAlive::Os, Duration::ZERO, Duration::ZERO, false, None); yield_now().await; let mut buf1 = BytesMut::with_capacity(DATE_VALUE_LENGTH + 10); settings.write_date_header(&mut buf1, false); let now1 = settings.now(); sleep_until((Instant::now() + Duration::from_secs(2)).into()).await; yield_now().await; let now2 = settings.now(); let mut buf2 = BytesMut::with_capacity(DATE_VALUE_LENGTH + 10); settings.write_date_header(&mut buf2, false); assert_ne!(now1, now2); assert_ne!(buf1, buf2); drop(settings); // Ensure the task will drop eventually let mut times = 0; while !notify_on_drop::is_dropped() { sleep(Duration::from_millis(100)).await; times += 1; assert!(times < 10, "Timeout waiting for task drop"); } } #[actix_rt::test] async fn test_date_service_drop() { let service = Rc::new(DateService::new()); // yield so date service have a chance to register the spawned timer update task. yield_now().await; let clone1 = service.clone(); let clone2 = service.clone(); let clone3 = service.clone(); drop(clone1); assert!(!notify_on_drop::is_dropped()); drop(clone2); assert!(!notify_on_drop::is_dropped()); drop(clone3); assert!(!notify_on_drop::is_dropped()); drop(service); // Ensure the task will drop eventually let mut times = 0; while !notify_on_drop::is_dropped() { sleep(Duration::from_millis(100)).await; times += 1; assert!(times < 10, "Timeout waiting for task drop"); } } #[test] fn test_date_len() { assert_eq!(DATE_VALUE_LENGTH, "Sun, 06 Nov 1994 08:49:37 GMT".len()); } #[actix_rt::test] async fn test_date() { let settings = ServiceConfig::default(); let mut buf1 = BytesMut::with_capacity(DATE_VALUE_LENGTH + 10); settings.write_date_header(&mut buf1, false); let mut buf2 = BytesMut::with_capacity(DATE_VALUE_LENGTH + 10); settings.write_date_header(&mut buf2, false); assert_eq!(buf1, buf2); } #[actix_rt::test] async fn test_date_camel_case() { let settings = ServiceConfig::default(); let mut buf = BytesMut::with_capacity(DATE_VALUE_LENGTH + 10); settings.write_date_header(&mut buf, false); assert!(memmem::find(&buf, b"date:").is_some()); let mut buf = BytesMut::with_capacity(DATE_VALUE_LENGTH + 10); settings.write_date_header(&mut buf, true); assert!(memmem::find(&buf, b"Date:").is_some()); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/test.rs
actix-http/src/test.rs
//! Various testing helpers for use in internal and app tests. use std::{ cell::{Ref, RefCell, RefMut}, io::{self, Read, Write}, pin::Pin, rc::Rc, str::FromStr, task::{Context, Poll}, }; use actix_codec::{AsyncRead, AsyncWrite, ReadBuf}; use bytes::{Bytes, BytesMut}; use http::{header, Method, Uri, Version}; use crate::{ header::{HeaderMap, TryIntoHeaderPair}, payload::Payload, Request, }; /// Test `Request` builder. pub struct TestRequest(Option<Inner>); struct Inner { version: Version, method: Method, uri: Uri, headers: HeaderMap, payload: Option<Payload>, } impl Default for TestRequest { fn default() -> TestRequest { TestRequest(Some(Inner { method: Method::GET, uri: Uri::from_str("/").unwrap(), version: Version::HTTP_11, headers: HeaderMap::new(), payload: None, })) } } impl TestRequest { /// Create a default TestRequest and then set its URI. pub fn with_uri(path: &str) -> TestRequest { TestRequest::default().uri(path).take() } /// Set HTTP version of this request. pub fn version(&mut self, ver: Version) -> &mut Self { parts(&mut self.0).version = ver; self } /// Set HTTP method of this request. pub fn method(&mut self, meth: Method) -> &mut Self { parts(&mut self.0).method = meth; self } /// Set URI of this request. /// /// # Panics /// If provided URI is invalid. pub fn uri(&mut self, path: &str) -> &mut Self { parts(&mut self.0).uri = Uri::from_str(path).unwrap(); self } /// Insert a header, replacing any that were set with an equivalent field name. pub fn insert_header(&mut self, header: impl TryIntoHeaderPair) -> &mut Self { match header.try_into_pair() { Ok((key, value)) => { parts(&mut self.0).headers.insert(key, value); } Err(err) => { panic!("Error inserting test header: {}.", err.into()); } } self } /// Append a header, keeping any that were set with an equivalent field name. pub fn append_header(&mut self, header: impl TryIntoHeaderPair) -> &mut Self { match header.try_into_pair() { Ok((key, value)) => { parts(&mut self.0).headers.append(key, value); } Err(err) => { panic!("Error inserting test header: {}.", err.into()); } } self } /// Set request payload. /// /// This sets the `Content-Length` header with the size of `data`. pub fn set_payload(&mut self, data: impl Into<Bytes>) -> &mut Self { let mut payload = crate::h1::Payload::empty(); let bytes = data.into(); self.insert_header((header::CONTENT_LENGTH, bytes.len())); payload.unread_data(bytes); parts(&mut self.0).payload = Some(payload.into()); self } pub fn take(&mut self) -> TestRequest { TestRequest(self.0.take()) } /// Complete request creation and generate `Request` instance. pub fn finish(&mut self) -> Request { let inner = self.0.take().expect("cannot reuse test request builder"); let mut req = if let Some(pl) = inner.payload { Request::with_payload(pl) } else { Request::with_payload(crate::h1::Payload::empty().into()) }; let head = req.head_mut(); head.uri = inner.uri; head.method = inner.method; head.version = inner.version; head.headers = inner.headers; req } } #[inline] fn parts(parts: &mut Option<Inner>) -> &mut Inner { parts.as_mut().expect("cannot reuse test request builder") } /// Async I/O test buffer. #[derive(Debug)] pub struct TestBuffer { pub read_buf: Rc<RefCell<BytesMut>>, pub write_buf: Rc<RefCell<BytesMut>>, pub err: Option<Rc<io::Error>>, } impl TestBuffer { /// Create new `TestBuffer` instance with initial read buffer. pub fn new<T>(data: T) -> Self where T: Into<BytesMut>, { Self { read_buf: Rc::new(RefCell::new(data.into())), write_buf: Rc::new(RefCell::new(BytesMut::new())), err: None, } } // intentionally not using Clone trait #[allow(dead_code)] pub(crate) fn clone(&self) -> Self { Self { read_buf: Rc::clone(&self.read_buf), write_buf: Rc::clone(&self.write_buf), err: self.err.clone(), } } /// Create new empty `TestBuffer` instance. pub fn empty() -> Self { Self::new("") } #[allow(dead_code)] pub(crate) fn read_buf_slice(&self) -> Ref<'_, [u8]> { Ref::map(self.read_buf.borrow(), |b| b.as_ref()) } #[allow(dead_code)] pub(crate) fn read_buf_slice_mut(&self) -> RefMut<'_, [u8]> { RefMut::map(self.read_buf.borrow_mut(), |b| b.as_mut()) } #[allow(dead_code)] pub(crate) fn write_buf_slice(&self) -> Ref<'_, [u8]> { Ref::map(self.write_buf.borrow(), |b| b.as_ref()) } #[allow(dead_code)] pub(crate) fn write_buf_slice_mut(&self) -> RefMut<'_, [u8]> { RefMut::map(self.write_buf.borrow_mut(), |b| b.as_mut()) } #[allow(dead_code)] pub(crate) fn take_write_buf(&self) -> Bytes { self.write_buf.borrow_mut().split().freeze() } /// Add data to read buffer. pub fn extend_read_buf<T: AsRef<[u8]>>(&mut self, data: T) { self.read_buf.borrow_mut().extend_from_slice(data.as_ref()) } } impl io::Read for TestBuffer { fn read(&mut self, dst: &mut [u8]) -> Result<usize, io::Error> { if self.read_buf.borrow().is_empty() { if self.err.is_some() { Err(Rc::try_unwrap(self.err.take().unwrap()).unwrap()) } else { Err(io::Error::new(io::ErrorKind::WouldBlock, "")) } } else { let size = std::cmp::min(self.read_buf.borrow().len(), dst.len()); let b = self.read_buf.borrow_mut().split_to(size); dst[..size].copy_from_slice(&b); Ok(size) } } } impl io::Write for TestBuffer { fn write(&mut self, buf: &[u8]) -> io::Result<usize> { self.write_buf.borrow_mut().extend(buf); Ok(buf.len()) } fn flush(&mut self) -> io::Result<()> { Ok(()) } } impl AsyncRead for TestBuffer { fn poll_read( self: Pin<&mut Self>, _: &mut Context<'_>, buf: &mut ReadBuf<'_>, ) -> Poll<io::Result<()>> { let dst = buf.initialize_unfilled(); let res = self.get_mut().read(dst).map(|n| buf.advance(n)); Poll::Ready(res) } } impl AsyncWrite for TestBuffer { fn poll_write( self: Pin<&mut Self>, _: &mut Context<'_>, buf: &[u8], ) -> Poll<io::Result<usize>> { Poll::Ready(self.get_mut().write(buf)) } fn poll_flush(self: Pin<&mut Self>, _: &mut Context<'_>) -> Poll<io::Result<()>> { Poll::Ready(Ok(())) } fn poll_shutdown(self: Pin<&mut Self>, _: &mut Context<'_>) -> Poll<io::Result<()>> { Poll::Ready(Ok(())) } } /// Async I/O test buffer with ability to incrementally add to the read buffer. #[derive(Clone)] pub struct TestSeqBuffer(Rc<RefCell<TestSeqInner>>); impl TestSeqBuffer { /// Create new `TestBuffer` instance with initial read buffer. pub fn new<T>(data: T) -> Self where T: Into<BytesMut>, { Self(Rc::new(RefCell::new(TestSeqInner { read_buf: data.into(), read_closed: false, write_buf: BytesMut::new(), err: None, }))) } /// Create new empty `TestBuffer` instance. pub fn empty() -> Self { Self::new(BytesMut::new()) } pub fn read_buf(&self) -> Ref<'_, BytesMut> { Ref::map(self.0.borrow(), |inner| &inner.read_buf) } pub fn write_buf(&self) -> Ref<'_, BytesMut> { Ref::map(self.0.borrow(), |inner| &inner.write_buf) } pub fn take_write_buf(&self) -> Bytes { self.0.borrow_mut().write_buf.split().freeze() } pub fn err(&self) -> Ref<'_, Option<io::Error>> { Ref::map(self.0.borrow(), |inner| &inner.err) } /// Add data to read buffer. /// /// # Panics /// /// Panics if called after [`TestSeqBuffer::close_read`] has been called pub fn extend_read_buf<T: AsRef<[u8]>>(&mut self, data: T) { let mut inner = self.0.borrow_mut(); if inner.read_closed { panic!("Tried to extend the read buffer after calling close_read"); } inner.read_buf.extend_from_slice(data.as_ref()) } /// Closes the [`AsyncRead`]/[`Read`] part of this test buffer. /// /// The current data in the buffer will still be returned by a call to read/poll_read, however, /// after the buffer is empty, it will return `Ok(0)` to signify the EOF condition pub fn close_read(&self) { self.0.borrow_mut().read_closed = true; } } pub struct TestSeqInner { read_buf: BytesMut, read_closed: bool, write_buf: BytesMut, err: Option<io::Error>, } impl io::Read for TestSeqBuffer { fn read(&mut self, dst: &mut [u8]) -> Result<usize, io::Error> { let mut inner = self.0.borrow_mut(); if inner.read_buf.is_empty() { if let Some(err) = inner.err.take() { Err(err) } else if inner.read_closed { Ok(0) } else { Err(io::Error::new(io::ErrorKind::WouldBlock, "")) } } else { let size = std::cmp::min(inner.read_buf.len(), dst.len()); let b = inner.read_buf.split_to(size); dst[..size].copy_from_slice(&b); Ok(size) } } } impl io::Write for TestSeqBuffer { fn write(&mut self, buf: &[u8]) -> io::Result<usize> { self.0.borrow_mut().write_buf.extend(buf); Ok(buf.len()) } fn flush(&mut self) -> io::Result<()> { Ok(()) } } impl AsyncRead for TestSeqBuffer { fn poll_read( self: Pin<&mut Self>, _: &mut Context<'_>, buf: &mut ReadBuf<'_>, ) -> Poll<io::Result<()>> { let dst = buf.initialize_unfilled(); let r = self.get_mut().read(dst); match r { Ok(n) => { buf.advance(n); Poll::Ready(Ok(())) } Err(err) if err.kind() == io::ErrorKind::WouldBlock => Poll::Pending, Err(err) => Poll::Ready(Err(err)), } } } impl AsyncWrite for TestSeqBuffer { fn poll_write( self: Pin<&mut Self>, _: &mut Context<'_>, buf: &[u8], ) -> Poll<io::Result<usize>> { Poll::Ready(self.get_mut().write(buf)) } fn poll_flush(self: Pin<&mut Self>, _: &mut Context<'_>) -> Poll<io::Result<()>> { Poll::Ready(Ok(())) } fn poll_shutdown(self: Pin<&mut Self>, _: &mut Context<'_>) -> Poll<io::Result<()>> { Poll::Ready(Ok(())) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/date.rs
actix-http/src/date.rs
use std::{ cell::Cell, fmt::{self, Write}, rc::Rc, time::{Duration, Instant, SystemTime}, }; use actix_rt::{task::JoinHandle, time::interval}; /// "Thu, 01 Jan 1970 00:00:00 GMT".len() pub(crate) const DATE_VALUE_LENGTH: usize = 29; #[derive(Clone, Copy)] pub(crate) struct Date { pub(crate) bytes: [u8; DATE_VALUE_LENGTH], pos: usize, } impl Date { fn new() -> Date { let mut date = Date { bytes: [0; DATE_VALUE_LENGTH], pos: 0, }; date.update(); date } fn update(&mut self) { self.pos = 0; write!(self, "{}", httpdate::HttpDate::from(SystemTime::now())).unwrap(); } } impl fmt::Write for Date { fn write_str(&mut self, s: &str) -> fmt::Result { let len = s.len(); self.bytes[self.pos..self.pos + len].copy_from_slice(s.as_bytes()); self.pos += len; Ok(()) } } /// Service for update Date and Instant periodically at 500 millis interval. pub(crate) struct DateService { current: Rc<Cell<(Date, Instant)>>, handle: JoinHandle<()>, } impl DateService { pub(crate) fn new() -> Self { // shared date and timer for DateService and update async task. let current = Rc::new(Cell::new((Date::new(), Instant::now()))); let current_clone = Rc::clone(&current); // spawn an async task sleep for 500 millis and update current date/timer in a loop. // handle is used to stop the task on DateService drop. let handle = actix_rt::spawn(async move { #[cfg(test)] let _notify = crate::notify_on_drop::NotifyOnDrop::new(); let mut interval = interval(Duration::from_millis(500)); loop { let now = interval.tick().await; let date = Date::new(); current_clone.set((date, now.into_std())); } }); DateService { current, handle } } pub(crate) fn now(&self) -> Instant { self.current.get().1 } pub(crate) fn with_date<F: FnMut(&Date)>(&self, mut f: F) { f(&self.current.get().0); } } impl fmt::Debug for DateService { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { f.debug_struct("DateService").finish_non_exhaustive() } } impl Drop for DateService { fn drop(&mut self) { // stop the timer update async task on drop. self.handle.abort(); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/builder.rs
actix-http/src/builder.rs
use std::{fmt, marker::PhantomData, net, rc::Rc, time::Duration}; use actix_codec::Framed; use actix_service::{IntoServiceFactory, Service, ServiceFactory}; use crate::{ body::{BoxBody, MessageBody}, h1::{self, ExpectHandler, H1Service, UpgradeHandler}, service::HttpService, ConnectCallback, Extensions, KeepAlive, Request, Response, ServiceConfigBuilder, }; /// An HTTP service builder. /// /// This type can construct an instance of [`HttpService`] through a builder-like pattern. pub struct HttpServiceBuilder<T, S, X = ExpectHandler, U = UpgradeHandler> { keep_alive: KeepAlive, client_request_timeout: Duration, client_disconnect_timeout: Duration, secure: bool, local_addr: Option<net::SocketAddr>, h1_allow_half_closed: bool, expect: X, upgrade: Option<U>, on_connect_ext: Option<Rc<ConnectCallback<T>>>, _phantom: PhantomData<S>, } impl<T, S> Default for HttpServiceBuilder<T, S, ExpectHandler, UpgradeHandler> where S: ServiceFactory<Request, Config = ()>, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, <S::Service as Service<Request>>::Future: 'static, { fn default() -> Self { HttpServiceBuilder { // ServiceConfig parts (make sure defaults match) keep_alive: KeepAlive::default(), client_request_timeout: Duration::from_secs(5), client_disconnect_timeout: Duration::ZERO, secure: false, local_addr: None, h1_allow_half_closed: true, // dispatcher parts expect: ExpectHandler, upgrade: None, on_connect_ext: None, _phantom: PhantomData, } } } impl<T, S, X, U> HttpServiceBuilder<T, S, X, U> where S: ServiceFactory<Request, Config = ()>, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, <S::Service as Service<Request>>::Future: 'static, X: ServiceFactory<Request, Config = (), Response = Request>, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory<(Request, Framed<T, h1::Codec>), Config = (), Response = ()>, U::Error: fmt::Display, U::InitError: fmt::Debug, { /// Set connection keep-alive setting. /// /// Applies to HTTP/1.1 keep-alive and HTTP/2 ping-pong. /// /// By default keep-alive is 5 seconds. pub fn keep_alive<W: Into<KeepAlive>>(mut self, val: W) -> Self { self.keep_alive = val.into(); self } /// Set connection secure state pub fn secure(mut self) -> Self { self.secure = true; self } /// Set the local address that this service is bound to. pub fn local_addr(mut self, addr: net::SocketAddr) -> Self { self.local_addr = Some(addr); self } /// Set client request timeout (for first request). /// /// Defines a timeout for reading client request header. If the client does not transmit the /// request head within this duration, the connection is terminated with a `408 Request Timeout` /// response error. /// /// A duration of zero disables the timeout. /// /// By default, the client timeout is 5 seconds. pub fn client_request_timeout(mut self, dur: Duration) -> Self { self.client_request_timeout = dur; self } #[doc(hidden)] #[deprecated(since = "3.0.0", note = "Renamed to `client_request_timeout`.")] pub fn client_timeout(self, dur: Duration) -> Self { self.client_request_timeout(dur) } /// Set client connection disconnect timeout. /// /// Defines a timeout for disconnect connection. If a disconnect procedure does not complete /// within this time, the request get dropped. This timeout affects secure connections. /// /// A duration of zero disables the timeout. /// /// By default, the disconnect timeout is disabled. pub fn client_disconnect_timeout(mut self, dur: Duration) -> Self { self.client_disconnect_timeout = dur; self } #[doc(hidden)] #[deprecated(since = "3.0.0", note = "Renamed to `client_disconnect_timeout`.")] pub fn client_disconnect(self, dur: Duration) -> Self { self.client_disconnect_timeout(dur) } /// Sets whether HTTP/1 connections should support half-closures. /// /// Clients can choose to shutdown their writer-side of the connection after completing their /// request and while waiting for the server response. Setting this to `false` will cause the /// server to abort the connection handling as soon as it detects an EOF from the client. /// /// The default behavior is to allow, i.e. `true` pub fn h1_allow_half_closed(mut self, allow: bool) -> Self { self.h1_allow_half_closed = allow; self } /// Provide service for `EXPECT: 100-Continue` support. /// /// Service get called with request that contains `EXPECT` header. /// Service must return request in case of success, in that case /// request will be forwarded to main service. pub fn expect<F, X1>(self, expect: F) -> HttpServiceBuilder<T, S, X1, U> where F: IntoServiceFactory<X1, Request>, X1: ServiceFactory<Request, Config = (), Response = Request>, X1::Error: Into<Response<BoxBody>>, X1::InitError: fmt::Debug, { HttpServiceBuilder { keep_alive: self.keep_alive, client_request_timeout: self.client_request_timeout, client_disconnect_timeout: self.client_disconnect_timeout, secure: self.secure, local_addr: self.local_addr, h1_allow_half_closed: self.h1_allow_half_closed, expect: expect.into_factory(), upgrade: self.upgrade, on_connect_ext: self.on_connect_ext, _phantom: PhantomData, } } /// Provide service for custom `Connection: UPGRADE` support. /// /// If service is provided then normal requests handling get halted /// and this service get called with original request and framed object. pub fn upgrade<F, U1>(self, upgrade: F) -> HttpServiceBuilder<T, S, X, U1> where F: IntoServiceFactory<U1, (Request, Framed<T, h1::Codec>)>, U1: ServiceFactory<(Request, Framed<T, h1::Codec>), Config = (), Response = ()>, U1::Error: fmt::Display, U1::InitError: fmt::Debug, { HttpServiceBuilder { keep_alive: self.keep_alive, client_request_timeout: self.client_request_timeout, client_disconnect_timeout: self.client_disconnect_timeout, secure: self.secure, local_addr: self.local_addr, h1_allow_half_closed: self.h1_allow_half_closed, expect: self.expect, upgrade: Some(upgrade.into_factory()), on_connect_ext: self.on_connect_ext, _phantom: PhantomData, } } /// Sets the callback to be run on connection establishment. /// /// Has mutable access to a data container that will be merged into request extensions. /// This enables transport layer data (like client certificates) to be accessed in middleware /// and handlers. pub fn on_connect_ext<F>(mut self, f: F) -> Self where F: Fn(&T, &mut Extensions) + 'static, { self.on_connect_ext = Some(Rc::new(f)); self } /// Finish service configuration and create a service for the HTTP/1 protocol. pub fn h1<F, B>(self, service: F) -> H1Service<T, S, B, X, U> where B: MessageBody, F: IntoServiceFactory<S, Request>, S::Error: Into<Response<BoxBody>>, S::InitError: fmt::Debug, S::Response: Into<Response<B>>, { let cfg = ServiceConfigBuilder::new() .keep_alive(self.keep_alive) .client_request_timeout(self.client_request_timeout) .client_disconnect_timeout(self.client_disconnect_timeout) .secure(self.secure) .local_addr(self.local_addr) .h1_allow_half_closed(self.h1_allow_half_closed) .build(); H1Service::with_config(cfg, service.into_factory()) .expect(self.expect) .upgrade(self.upgrade) .on_connect_ext(self.on_connect_ext) } /// Finish service configuration and create a service for the HTTP/2 protocol. #[cfg(feature = "http2")] pub fn h2<F, B>(self, service: F) -> crate::h2::H2Service<T, S, B> where F: IntoServiceFactory<S, Request>, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, B: MessageBody + 'static, { let cfg = ServiceConfigBuilder::new() .keep_alive(self.keep_alive) .client_request_timeout(self.client_request_timeout) .client_disconnect_timeout(self.client_disconnect_timeout) .secure(self.secure) .local_addr(self.local_addr) .h1_allow_half_closed(self.h1_allow_half_closed) .build(); crate::h2::H2Service::with_config(cfg, service.into_factory()) .on_connect_ext(self.on_connect_ext) } /// Finish service configuration and create `HttpService` instance. pub fn finish<F, B>(self, service: F) -> HttpService<T, S, B, X, U> where F: IntoServiceFactory<S, Request>, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, B: MessageBody + 'static, { let cfg = ServiceConfigBuilder::new() .keep_alive(self.keep_alive) .client_request_timeout(self.client_request_timeout) .client_disconnect_timeout(self.client_disconnect_timeout) .secure(self.secure) .local_addr(self.local_addr) .h1_allow_half_closed(self.h1_allow_half_closed) .build(); HttpService::with_config(cfg, service.into_factory()) .expect(self.expect) .upgrade(self.upgrade) .on_connect_ext(self.on_connect_ext) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/lib.rs
actix-http/src/lib.rs
//! HTTP types and services for the Actix ecosystem. //! //! ## Crate Features //! //! | Feature | Functionality | //! | ------------------- | ------------------------------------------- | //! | `http2` | HTTP/2 support via [h2]. | //! | `openssl` | TLS support via [OpenSSL]. | //! | `rustls-0_20` | TLS support via rustls 0.20. | //! | `rustls-0_21` | TLS support via rustls 0.21. | //! | `rustls-0_22` | TLS support via rustls 0.22. | //! | `rustls-0_23` | TLS support via [rustls] 0.23. | //! | `compress-brotli` | Payload compression support: Brotli. | //! | `compress-gzip` | Payload compression support: Deflate, Gzip. | //! | `compress-zstd` | Payload compression support: Zstd. | //! | `trust-dns` | Use [trust-dns] as the client DNS resolver. | //! //! [h2]: https://crates.io/crates/h2 //! [OpenSSL]: https://crates.io/crates/openssl //! [rustls]: https://crates.io/crates/rustls //! [trust-dns]: https://crates.io/crates/trust-dns #![allow( clippy::type_complexity, clippy::too_many_arguments, clippy::borrow_interior_mutable_const )] #![doc(html_logo_url = "https://actix.rs/img/logo.png")] #![doc(html_favicon_url = "https://actix.rs/favicon.ico")] #![cfg_attr(docsrs, feature(doc_cfg))] pub use http::{uri, uri::Uri, Method, StatusCode, Version}; pub mod body; mod builder; mod config; mod date; #[cfg(feature = "__compress")] pub mod encoding; pub mod error; mod extensions; pub mod h1; #[cfg(feature = "http2")] pub mod h2; pub mod header; mod helpers; mod http_message; mod keep_alive; mod message; #[cfg(test)] mod notify_on_drop; mod payload; mod requests; mod responses; mod service; pub mod test; #[cfg(feature = "ws")] pub mod ws; #[allow(deprecated)] pub use self::payload::PayloadStream; #[cfg(feature = "__tls")] pub use self::service::TlsAcceptorConfig; pub use self::{ builder::HttpServiceBuilder, config::{ServiceConfig, ServiceConfigBuilder}, error::Error, extensions::Extensions, header::ContentEncoding, http_message::HttpMessage, keep_alive::KeepAlive, message::{ConnectionType, Message}, payload::{BoxedPayloadStream, Payload}, requests::{Request, RequestHead, RequestHeadType}, responses::{Response, ResponseBuilder, ResponseHead}, service::HttpService, }; /// A major HTTP protocol version. #[derive(Copy, Clone, Debug, PartialEq, Eq, Hash)] #[non_exhaustive] pub enum Protocol { Http1, Http2, Http3, } type ConnectCallback<IO> = dyn Fn(&IO, &mut Extensions); /// Container for data that extract with ConnectCallback. /// /// # Implementation Details /// Uses Option to reduce necessary allocations when merging with request extensions. #[derive(Default)] pub(crate) struct OnConnectData(Option<Extensions>); impl OnConnectData { /// Construct by calling the on-connect callback with the underlying transport I/O. pub(crate) fn from_io<T>(io: &T, on_connect_ext: Option<&ConnectCallback<T>>) -> Self { let ext = on_connect_ext.map(|handler| { let mut extensions = Extensions::default(); handler(io, &mut extensions); extensions }); Self(ext) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/notify_on_drop.rs
actix-http/src/notify_on_drop.rs
/// Test Module for checking the drop state of certain async tasks that are spawned /// with `actix_rt::spawn` /// /// The target task must explicitly generate `NotifyOnDrop` when spawn the task use std::cell::RefCell; thread_local! { static NOTIFY_DROPPED: RefCell<Option<bool>> = const { RefCell::new(None) }; } /// Check if the spawned task is dropped. /// /// # Panics /// Panics when there was no `NotifyOnDrop` instance on current thread. pub(crate) fn is_dropped() -> bool { NOTIFY_DROPPED.with(|bool| { bool.borrow() .expect("No NotifyOnDrop existed on current thread") }) } pub(crate) struct NotifyOnDrop; impl NotifyOnDrop { /// # Panics /// Panics hen construct multiple instances on any given thread. pub(crate) fn new() -> Self { NOTIFY_DROPPED.with(|bool| { let mut bool = bool.borrow_mut(); if bool.is_some() { panic!("NotifyOnDrop existed on current thread"); } else { *bool = Some(false); } }); NotifyOnDrop } } impl Drop for NotifyOnDrop { fn drop(&mut self) { NOTIFY_DROPPED.with(|bool| { if let Some(b) = bool.borrow_mut().as_mut() { *b = true; } }); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/helpers.rs
actix-http/src/helpers.rs
use std::io; use bytes::BufMut; use http::Version; const DIGITS_START: u8 = b'0'; pub(crate) fn write_status_line<B: BufMut>(version: Version, n: u16, buf: &mut B) { match version { Version::HTTP_11 => buf.put_slice(b"HTTP/1.1 "), Version::HTTP_10 => buf.put_slice(b"HTTP/1.0 "), Version::HTTP_09 => buf.put_slice(b"HTTP/0.9 "), _ => { // other HTTP version handlers do not use this method } } let d100 = (n / 100) as u8; let d10 = ((n / 10) % 10) as u8; let d1 = (n % 10) as u8; buf.put_u8(DIGITS_START + d100); buf.put_u8(DIGITS_START + d10); buf.put_u8(DIGITS_START + d1); // trailing space before reason buf.put_u8(b' '); } /// Write out content length header. /// /// Buffer must to contain enough space or be implicitly extendable. pub fn write_content_length<B: BufMut>(n: u64, buf: &mut B, camel_case: bool) { if n == 0 { if camel_case { buf.put_slice(b"\r\nContent-Length: 0\r\n"); } else { buf.put_slice(b"\r\ncontent-length: 0\r\n"); } return; } let mut buffer = itoa::Buffer::new(); if camel_case { buf.put_slice(b"\r\nContent-Length: "); } else { buf.put_slice(b"\r\ncontent-length: "); } buf.put_slice(buffer.format(n).as_bytes()); buf.put_slice(b"\r\n"); } /// An `io::Write`r that only requires mutable reference and assumes that there is space available /// in the buffer for every write operation or that it can be extended implicitly (like /// `bytes::BytesMut`, for example). /// /// This is slightly faster (~10%) than `bytes::buf::Writer` in such cases because it does not /// perform a remaining length check before writing. pub(crate) struct MutWriter<'a, B>(pub(crate) &'a mut B); impl<B> io::Write for MutWriter<'_, B> where B: BufMut, { fn write(&mut self, buf: &[u8]) -> io::Result<usize> { self.0.put_slice(buf); Ok(buf.len()) } fn flush(&mut self) -> io::Result<()> { Ok(()) } } #[cfg(test)] mod tests { use std::str::from_utf8; use bytes::BytesMut; use super::*; #[test] fn test_status_line() { let mut bytes = BytesMut::new(); bytes.reserve(50); write_status_line(Version::HTTP_11, 200, &mut bytes); assert_eq!(from_utf8(&bytes.split().freeze()).unwrap(), "HTTP/1.1 200 "); let mut bytes = BytesMut::new(); bytes.reserve(50); write_status_line(Version::HTTP_09, 404, &mut bytes); assert_eq!(from_utf8(&bytes.split().freeze()).unwrap(), "HTTP/0.9 404 "); let mut bytes = BytesMut::new(); bytes.reserve(50); write_status_line(Version::HTTP_09, 515, &mut bytes); assert_eq!(from_utf8(&bytes.split().freeze()).unwrap(), "HTTP/0.9 515 "); } #[test] fn test_write_content_length() { let mut bytes = BytesMut::new(); bytes.reserve(50); write_content_length(0, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 0\r\n"[..]); bytes.reserve(50); write_content_length(9, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 9\r\n"[..]); bytes.reserve(50); write_content_length(10, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 10\r\n"[..]); bytes.reserve(50); write_content_length(99, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 99\r\n"[..]); bytes.reserve(50); write_content_length(100, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 100\r\n"[..]); bytes.reserve(50); write_content_length(101, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 101\r\n"[..]); bytes.reserve(50); write_content_length(998, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 998\r\n"[..]); bytes.reserve(50); write_content_length(1000, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 1000\r\n"[..]); bytes.reserve(50); write_content_length(1001, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 1001\r\n"[..]); bytes.reserve(50); write_content_length(5909, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 5909\r\n"[..]); bytes.reserve(50); write_content_length(9999, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 9999\r\n"[..]); bytes.reserve(50); write_content_length(10001, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 10001\r\n"[..]); bytes.reserve(50); write_content_length(59094, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 59094\r\n"[..]); bytes.reserve(50); write_content_length(99999, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 99999\r\n"[..]); bytes.reserve(50); write_content_length(590947, &mut bytes, false); assert_eq!( bytes.split().freeze(), b"\r\ncontent-length: 590947\r\n"[..] ); bytes.reserve(50); write_content_length(999999, &mut bytes, false); assert_eq!( bytes.split().freeze(), b"\r\ncontent-length: 999999\r\n"[..] ); bytes.reserve(50); write_content_length(5909471, &mut bytes, false); assert_eq!( bytes.split().freeze(), b"\r\ncontent-length: 5909471\r\n"[..] ); bytes.reserve(50); write_content_length(59094718, &mut bytes, false); assert_eq!( bytes.split().freeze(), b"\r\ncontent-length: 59094718\r\n"[..] ); bytes.reserve(50); write_content_length(4294973728, &mut bytes, false); assert_eq!( bytes.split().freeze(), b"\r\ncontent-length: 4294973728\r\n"[..] ); } #[test] fn write_content_length_camel_case() { let mut bytes = BytesMut::new(); write_content_length(0, &mut bytes, false); assert_eq!(bytes.split().freeze(), b"\r\ncontent-length: 0\r\n"[..]); let mut bytes = BytesMut::new(); write_content_length(0, &mut bytes, true); assert_eq!(bytes.split().freeze(), b"\r\nContent-Length: 0\r\n"[..]); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/keep_alive.rs
actix-http/src/keep_alive.rs
use std::time::Duration; /// Connection keep-alive config. #[derive(Debug, Clone, Copy, PartialEq, Eq)] pub enum KeepAlive { /// Keep-alive duration. /// /// `KeepAlive::Timeout(Duration::ZERO)` is mapped to `KeepAlive::Disabled`. Timeout(Duration), /// Rely on OS to shutdown TCP connection. /// /// Some defaults can be very long, check your OS documentation. Os, /// Keep-alive is disabled. /// /// Connections will be closed immediately. Disabled, } impl KeepAlive { pub(crate) fn enabled(&self) -> bool { !matches!(self, Self::Disabled) } #[allow(unused)] // used with `http2` feature flag pub(crate) fn duration(&self) -> Option<Duration> { match self { KeepAlive::Timeout(dur) => Some(*dur), _ => None, } } /// Map zero duration to disabled. pub(crate) fn normalize(self) -> KeepAlive { match self { KeepAlive::Timeout(Duration::ZERO) => KeepAlive::Disabled, ka => ka, } } } impl Default for KeepAlive { fn default() -> Self { Self::Timeout(Duration::from_secs(5)) } } impl From<Duration> for KeepAlive { fn from(dur: Duration) -> Self { KeepAlive::Timeout(dur).normalize() } } impl From<Option<Duration>> for KeepAlive { fn from(ka_dur: Option<Duration>) -> Self { match ka_dur { Some(dur) => KeepAlive::from(dur), None => KeepAlive::Disabled, } .normalize() } } #[cfg(test)] mod tests { use super::*; #[test] fn from_impls() { let test: KeepAlive = Duration::from_secs(1).into(); assert_eq!(test, KeepAlive::Timeout(Duration::from_secs(1))); let test: KeepAlive = Duration::from_secs(0).into(); assert_eq!(test, KeepAlive::Disabled); let test: KeepAlive = Some(Duration::from_secs(0)).into(); assert_eq!(test, KeepAlive::Disabled); let test: KeepAlive = None.into(); assert_eq!(test, KeepAlive::Disabled); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/error.rs
actix-http/src/error.rs
//! Error and Result module use std::{error::Error as StdError, fmt, io, str::Utf8Error, string::FromUtf8Error}; use derive_more::{Display, Error, From}; pub use http::{status::InvalidStatusCode, Error as HttpError}; use http::{uri::InvalidUri, StatusCode}; use crate::{body::BoxBody, Response}; pub struct Error { inner: Box<ErrorInner>, } pub(crate) struct ErrorInner { #[allow(dead_code)] kind: Kind, cause: Option<Box<dyn StdError>>, } impl Error { fn new(kind: Kind) -> Self { Self { inner: Box::new(ErrorInner { kind, cause: None }), } } pub(crate) fn with_cause(mut self, cause: impl Into<Box<dyn StdError>>) -> Self { self.inner.cause = Some(cause.into()); self } pub(crate) fn new_http() -> Self { Self::new(Kind::Http) } pub(crate) fn new_parse() -> Self { Self::new(Kind::Parse) } pub(crate) fn new_payload() -> Self { Self::new(Kind::Payload) } pub(crate) fn new_body() -> Self { Self::new(Kind::Body) } pub(crate) fn new_send_response() -> Self { Self::new(Kind::SendResponse) } #[allow(unused)] // available for future use pub(crate) fn new_io() -> Self { Self::new(Kind::Io) } #[allow(unused)] // used in encoder behind feature flag so ignore unused warning pub(crate) fn new_encoder() -> Self { Self::new(Kind::Encoder) } #[allow(unused)] // used with `ws` feature flag pub(crate) fn new_ws() -> Self { Self::new(Kind::Ws) } } impl From<Error> for Response<BoxBody> { fn from(err: Error) -> Self { // TODO: more appropriate error status codes, usage assessment needed let status_code = match err.inner.kind { Kind::Parse => StatusCode::BAD_REQUEST, _ => StatusCode::INTERNAL_SERVER_ERROR, }; Response::new(status_code).set_body(BoxBody::new(err.to_string())) } } #[derive(Debug, Clone, Copy, PartialEq, Eq, Display)] pub(crate) enum Kind { #[display("error processing HTTP")] Http, #[display("error parsing HTTP message")] Parse, #[display("request payload read error")] Payload, #[display("response body write error")] Body, #[display("send response error")] SendResponse, #[display("error in WebSocket process")] Ws, #[display("connection error")] Io, #[display("encoder error")] Encoder, } impl fmt::Debug for Error { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { f.debug_struct("actix_http::Error") .field("kind", &self.inner.kind) .field("cause", &self.inner.cause) .finish() } } impl fmt::Display for Error { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { match self.inner.cause.as_ref() { Some(err) => write!(f, "{}: {}", &self.inner.kind, err), None => write!(f, "{}", &self.inner.kind), } } } impl StdError for Error { fn source(&self) -> Option<&(dyn StdError + 'static)> { self.inner.cause.as_ref().map(Box::as_ref) } } impl From<std::convert::Infallible> for Error { fn from(err: std::convert::Infallible) -> Self { match err {} } } impl From<HttpError> for Error { fn from(err: HttpError) -> Self { Self::new_http().with_cause(err) } } #[cfg(feature = "ws")] impl From<crate::ws::HandshakeError> for Error { fn from(err: crate::ws::HandshakeError) -> Self { Self::new_ws().with_cause(err) } } #[cfg(feature = "ws")] impl From<crate::ws::ProtocolError> for Error { fn from(err: crate::ws::ProtocolError) -> Self { Self::new_ws().with_cause(err) } } /// A set of errors that can occur during parsing HTTP streams. #[derive(Debug, Display, Error)] #[non_exhaustive] pub enum ParseError { /// An invalid `Method`, such as `GE.T`. #[display("invalid method specified")] Method, /// An invalid `Uri`, such as `exam ple.domain`. #[display("URI error: {}", _0)] Uri(InvalidUri), /// An invalid `HttpVersion`, such as `HTP/1.1` #[display("invalid HTTP version specified")] Version, /// An invalid `Header`. #[display("invalid Header provided")] Header, /// A message head is too large to be reasonable. #[display("message head is too large")] TooLarge, /// A message reached EOF, but is not complete. #[display("message is incomplete")] Incomplete, /// An invalid `Status`, such as `1337 ELITE`. #[display("invalid status provided")] Status, /// A timeout occurred waiting for an IO event. #[allow(dead_code)] #[display("timeout")] Timeout, /// An I/O error that occurred while trying to read or write to a network stream. #[display("I/O error: {}", _0)] Io(io::Error), /// Parsing a field as string failed. #[display("UTF-8 error: {}", _0)] Utf8(Utf8Error), } impl From<io::Error> for ParseError { fn from(err: io::Error) -> ParseError { ParseError::Io(err) } } impl From<InvalidUri> for ParseError { fn from(err: InvalidUri) -> ParseError { ParseError::Uri(err) } } impl From<Utf8Error> for ParseError { fn from(err: Utf8Error) -> ParseError { ParseError::Utf8(err) } } impl From<FromUtf8Error> for ParseError { fn from(err: FromUtf8Error) -> ParseError { ParseError::Utf8(err.utf8_error()) } } impl From<httparse::Error> for ParseError { fn from(err: httparse::Error) -> ParseError { match err { httparse::Error::HeaderName | httparse::Error::HeaderValue | httparse::Error::NewLine | httparse::Error::Token => ParseError::Header, httparse::Error::Status => ParseError::Status, httparse::Error::TooManyHeaders => ParseError::TooLarge, httparse::Error::Version => ParseError::Version, } } } impl From<ParseError> for Error { fn from(err: ParseError) -> Self { Self::new_parse().with_cause(err) } } impl From<ParseError> for Response<BoxBody> { fn from(err: ParseError) -> Self { Error::from(err).into() } } /// A set of errors that can occur during payload parsing. #[derive(Debug, Display)] #[non_exhaustive] pub enum PayloadError { /// A payload reached EOF, but is not complete. #[display("payload reached EOF before completing: {:?}", _0)] Incomplete(Option<io::Error>), /// Content encoding stream corruption. #[display("can not decode content-encoding")] EncodingCorrupted, /// Payload reached size limit. #[display("payload reached size limit")] Overflow, /// Payload length is unknown. #[display("payload length is unknown")] UnknownLength, /// HTTP/2 payload error. #[cfg(feature = "http2")] #[display("{}", _0)] Http2Payload(::h2::Error), /// Generic I/O error. #[display("{}", _0)] Io(io::Error), } impl std::error::Error for PayloadError { fn source(&self) -> Option<&(dyn std::error::Error + 'static)> { match self { PayloadError::Incomplete(None) => None, PayloadError::Incomplete(Some(err)) => Some(err), PayloadError::EncodingCorrupted => None, PayloadError::Overflow => None, PayloadError::UnknownLength => None, #[cfg(feature = "http2")] PayloadError::Http2Payload(err) => Some(err), PayloadError::Io(err) => Some(err), } } } #[cfg(feature = "http2")] impl From<::h2::Error> for PayloadError { fn from(err: ::h2::Error) -> Self { PayloadError::Http2Payload(err) } } impl From<Option<io::Error>> for PayloadError { fn from(err: Option<io::Error>) -> Self { PayloadError::Incomplete(err) } } impl From<io::Error> for PayloadError { fn from(err: io::Error) -> Self { PayloadError::Incomplete(Some(err)) } } impl From<PayloadError> for Error { fn from(err: PayloadError) -> Self { Self::new_payload().with_cause(err) } } /// A set of errors that can occur during dispatching HTTP requests. #[derive(Debug, Display, From)] #[non_exhaustive] pub enum DispatchError { /// Service error. #[display("service error")] Service(Response<BoxBody>), /// Body streaming error. #[display("body error: {}", _0)] Body(Box<dyn StdError>), /// Upgrade service error. #[display("upgrade error")] Upgrade, /// An `io::Error` that occurred while trying to read or write to a network stream. #[display("I/O error: {}", _0)] Io(io::Error), /// Request parse error. #[display("request parse error: {}", _0)] Parse(ParseError), /// HTTP/2 error. #[display("{}", _0)] #[cfg(feature = "http2")] H2(h2::Error), /// The first request did not complete within the specified timeout. #[display("request did not complete within the specified timeout")] SlowRequestTimeout, /// Disconnect timeout. Makes sense for TLS streams. #[display("connection shutdown timeout")] DisconnectTimeout, /// Handler dropped payload before reading EOF. #[display("handler dropped payload before reading EOF")] HandlerDroppedPayload, /// Internal error. #[display("internal error")] InternalError, } impl StdError for DispatchError { fn source(&self) -> Option<&(dyn StdError + 'static)> { match self { DispatchError::Service(_res) => None, DispatchError::Body(err) => Some(&**err), DispatchError::Io(err) => Some(err), DispatchError::Parse(err) => Some(err), #[cfg(feature = "http2")] DispatchError::H2(err) => Some(err), _ => None, } } } /// A set of error that can occur during parsing content type. #[derive(Debug, Display, Error)] #[cfg_attr(test, derive(PartialEq, Eq))] #[non_exhaustive] pub enum ContentTypeError { /// Can not parse content type. #[display("could not parse content type")] ParseError, /// Unknown content encoding. #[display("unknown content encoding")] UnknownEncoding, } #[cfg(test)] mod tests { use http::Error as HttpError; use super::*; #[test] fn test_into_response() { let resp: Response<BoxBody> = ParseError::Incomplete.into(); assert_eq!(resp.status(), StatusCode::BAD_REQUEST); let err: HttpError = StatusCode::from_u16(10000).err().unwrap().into(); let resp: Response<BoxBody> = Error::new_http().with_cause(err).into(); assert_eq!(resp.status(), StatusCode::INTERNAL_SERVER_ERROR); } #[test] fn test_as_response() { let orig = io::Error::other("other"); let err: Error = ParseError::Io(orig).into(); assert_eq!( format!("{}", err), "error parsing HTTP message: I/O error: other" ); } #[test] fn test_error_display() { let orig = io::Error::other("other"); let err = Error::new_io().with_cause(orig); assert_eq!("connection error: other", err.to_string()); } #[test] fn test_error_http_response() { let orig = io::Error::other("other"); let err = Error::new_io().with_cause(orig); let resp: Response<BoxBody> = err.into(); assert_eq!(resp.status(), StatusCode::INTERNAL_SERVER_ERROR); } #[test] fn test_payload_error() { let err: PayloadError = io::Error::other("ParseError").into(); assert!(err.to_string().contains("ParseError")); let err = PayloadError::Incomplete(None); assert_eq!( err.to_string(), "payload reached EOF before completing: None" ); } macro_rules! from { ($from:expr => $error:pat) => { match ParseError::from($from) { err @ $error => { assert!(err.to_string().len() >= 5); } err => unreachable!("{:?}", err), } }; } macro_rules! from_and_cause { ($from:expr => $error:pat) => { match ParseError::from($from) { e @ $error => { let desc = format!("{}", e); assert_eq!(desc, format!("I/O error: {}", $from)); } _ => unreachable!("{:?}", $from), } }; } #[test] fn test_from() { from_and_cause!(io::Error::other("other") => ParseError::Io(..)); from!(httparse::Error::HeaderName => ParseError::Header); from!(httparse::Error::HeaderName => ParseError::Header); from!(httparse::Error::HeaderValue => ParseError::Header); from!(httparse::Error::NewLine => ParseError::Header); from!(httparse::Error::Status => ParseError::Status); from!(httparse::Error::Token => ParseError::Header); from!(httparse::Error::TooManyHeaders => ParseError::TooLarge); from!(httparse::Error::Version => ParseError::Version); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/service.rs
actix-http/src/service.rs
use std::{ fmt, future::Future, marker::PhantomData, net, pin::Pin, rc::Rc, task::{Context, Poll}, }; use actix_codec::{AsyncRead, AsyncWrite, Framed}; use actix_rt::net::TcpStream; use actix_service::{ fn_service, IntoServiceFactory, Service, ServiceFactory, ServiceFactoryExt as _, }; use futures_core::{future::LocalBoxFuture, ready}; use pin_project_lite::pin_project; use tracing::error; use crate::{ body::{BoxBody, MessageBody}, builder::HttpServiceBuilder, error::DispatchError, h1, ConnectCallback, OnConnectData, Protocol, Request, Response, ServiceConfig, }; /// A [`ServiceFactory`] for HTTP/1.1 and HTTP/2 connections. /// /// Use [`build`](Self::build) to begin constructing service. Also see [`HttpServiceBuilder`]. /// /// # Automatic HTTP Version Selection /// There are two ways to select the HTTP version of an incoming connection: /// - One is to rely on the ALPN information that is provided when using TLS (HTTPS); both versions /// are supported automatically when using either of the `.rustls()` or `.openssl()` finalizing /// methods. /// - The other is to read the first few bytes of the TCP stream. This is the only viable approach /// for supporting H2C, which allows the HTTP/2 protocol to work over plaintext connections. Use /// the `.tcp_auto_h2c()` finalizing method to enable this behavior. /// /// # Examples /// ``` /// # use std::convert::Infallible; /// use actix_http::{HttpService, Request, Response, StatusCode}; /// /// // this service would constructed in an actix_server::Server /// /// # actix_rt::System::new().block_on(async { /// HttpService::build() /// // the builder finalizing method, other finalizers would not return an `HttpService` /// .finish(|_req: Request| async move { /// Ok::<_, Infallible>( /// Response::build(StatusCode::OK).body("Hello!") /// ) /// }) /// // the service finalizing method method /// // you can use `.tcp_auto_h2c()`, `.rustls()`, or `.openssl()` instead of `.tcp()` /// .tcp(); /// # }) /// ``` pub struct HttpService<T, S, B, X = h1::ExpectHandler, U = h1::UpgradeHandler> { srv: S, cfg: ServiceConfig, expect: X, upgrade: Option<U>, on_connect_ext: Option<Rc<ConnectCallback<T>>>, _phantom: PhantomData<B>, } impl<T, S, B> HttpService<T, S, B> where S: ServiceFactory<Request, Config = ()>, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, { /// Constructs builder for `HttpService` instance. pub fn build() -> HttpServiceBuilder<T, S> { HttpServiceBuilder::default() } } impl<T, S, B> HttpService<T, S, B> where S: ServiceFactory<Request, Config = ()>, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, { /// Constructs new `HttpService` instance from service with default config. pub fn new<F: IntoServiceFactory<S, Request>>(service: F) -> Self { HttpService { cfg: ServiceConfig::default(), srv: service.into_factory(), expect: h1::ExpectHandler, upgrade: None, on_connect_ext: None, _phantom: PhantomData, } } /// Constructs new `HttpService` instance from config and service. pub(crate) fn with_config<F: IntoServiceFactory<S, Request>>( cfg: ServiceConfig, service: F, ) -> Self { HttpService { cfg, srv: service.into_factory(), expect: h1::ExpectHandler, upgrade: None, on_connect_ext: None, _phantom: PhantomData, } } } impl<T, S, B, X, U> HttpService<T, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody, { /// Sets service for `Expect: 100-Continue` handling. /// /// An expect service is called with requests that contain an `Expect` header. A successful /// response type is also a request which will be forwarded to the main service. pub fn expect<X1>(self, expect: X1) -> HttpService<T, S, B, X1, U> where X1: ServiceFactory<Request, Config = (), Response = Request>, X1::Error: Into<Response<BoxBody>>, X1::InitError: fmt::Debug, { HttpService { expect, cfg: self.cfg, srv: self.srv, upgrade: self.upgrade, on_connect_ext: self.on_connect_ext, _phantom: PhantomData, } } /// Sets service for custom `Connection: Upgrade` handling. /// /// If service is provided then normal requests handling get halted and this service get called /// with original request and framed object. pub fn upgrade<U1>(self, upgrade: Option<U1>) -> HttpService<T, S, B, X, U1> where U1: ServiceFactory<(Request, Framed<T, h1::Codec>), Config = (), Response = ()>, U1::Error: fmt::Display, U1::InitError: fmt::Debug, { HttpService { upgrade, cfg: self.cfg, srv: self.srv, expect: self.expect, on_connect_ext: self.on_connect_ext, _phantom: PhantomData, } } /// Set connect callback with mutable access to request data container. pub(crate) fn on_connect_ext(mut self, f: Option<Rc<ConnectCallback<T>>>) -> Self { self.on_connect_ext = f; self } } impl<S, B, X, U> HttpService<TcpStream, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory<(Request, Framed<TcpStream, h1::Codec>), Config = (), Response = ()>, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { /// Creates TCP stream service from HTTP service. /// /// The resulting service only supports HTTP/1.x. pub fn tcp( self, ) -> impl ServiceFactory<TcpStream, Config = (), Response = (), Error = DispatchError, InitError = ()> { fn_service(|io: TcpStream| async { let peer_addr = io.peer_addr().ok(); Ok((io, Protocol::Http1, peer_addr)) }) .and_then(self) } /// Creates TCP stream service from HTTP service that automatically selects HTTP/1.x or HTTP/2 /// on plaintext connections. #[cfg(feature = "http2")] pub fn tcp_auto_h2c( self, ) -> impl ServiceFactory<TcpStream, Config = (), Response = (), Error = DispatchError, InitError = ()> { fn_service(move |io: TcpStream| async move { // subset of HTTP/2 preface defined by RFC 9113 §3.4 // this subset was chosen to maximize likelihood that peeking only once will allow us to // reliably determine version or else it should fallback to h1 and fail quickly if data // on the wire is junk const H2_PREFACE: &[u8] = b"PRI * HTTP/2"; let mut buf = [0; 12]; io.peek(&mut buf).await?; let proto = if buf == H2_PREFACE { Protocol::Http2 } else { Protocol::Http1 }; let peer_addr = io.peer_addr().ok(); Ok((io, proto, peer_addr)) }) .and_then(self) } } /// Configuration options used when accepting TLS connection. #[cfg(feature = "__tls")] #[derive(Debug, Default)] pub struct TlsAcceptorConfig { pub(crate) handshake_timeout: Option<std::time::Duration>, } #[cfg(feature = "__tls")] impl TlsAcceptorConfig { /// Set TLS handshake timeout duration. pub fn handshake_timeout(self, dur: std::time::Duration) -> Self { Self { handshake_timeout: Some(dur), // ..self } } } #[cfg(feature = "openssl")] mod openssl { use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ openssl::{ reexports::{Error as SslError, SslAcceptor}, Acceptor, TlsStream, }, TlsError, }; use super::*; impl<S, B, X, U> HttpService<TlsStream<TcpStream>, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory< (Request, Framed<TlsStream<TcpStream>, h1::Codec>), Config = (), Response = (), >, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { /// Create OpenSSL based service. pub fn openssl( self, acceptor: SslAcceptor, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<SslError, DispatchError>, InitError = (), > { self.openssl_with_config(acceptor, TlsAcceptorConfig::default()) } /// Create OpenSSL based service with custom TLS acceptor configuration. pub fn openssl_with_config( self, acceptor: SslAcceptor, tls_acceptor_config: TlsAcceptorConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<SslError, DispatchError>, InitError = (), > { let mut acceptor = Acceptor::new(acceptor); if let Some(handshake_timeout) = tls_acceptor_config.handshake_timeout { acceptor.set_handshake_timeout(handshake_timeout); } acceptor .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .map(|io: TlsStream<TcpStream>| { let proto = if let Some(protos) = io.ssl().selected_alpn_protocol() { if protos.windows(2).any(|window| window == b"h2") { Protocol::Http2 } else { Protocol::Http1 } } else { Protocol::Http1 }; let peer_addr = io.get_ref().peer_addr().ok(); (io, proto, peer_addr) }) .and_then(self.map_err(TlsError::Service)) } } } #[cfg(feature = "rustls-0_20")] mod rustls_0_20 { use std::io; use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ rustls_0_20::{reexports::ServerConfig, Acceptor, TlsStream}, TlsError, }; use super::*; impl<S, B, X, U> HttpService<TlsStream<TcpStream>, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory< (Request, Framed<TlsStream<TcpStream>, h1::Codec>), Config = (), Response = (), >, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { /// Create Rustls v0.20 based service. pub fn rustls( self, config: ServerConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = (), > { self.rustls_with_config(config, TlsAcceptorConfig::default()) } /// Create Rustls v0.20 based service with custom TLS acceptor configuration. pub fn rustls_with_config( self, mut config: ServerConfig, tls_acceptor_config: TlsAcceptorConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = (), > { let mut protos = vec![b"h2".to_vec(), b"http/1.1".to_vec()]; protos.extend_from_slice(&config.alpn_protocols); config.alpn_protocols = protos; let mut acceptor = Acceptor::new(config); if let Some(handshake_timeout) = tls_acceptor_config.handshake_timeout { acceptor.set_handshake_timeout(handshake_timeout); } acceptor .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .and_then(|io: TlsStream<TcpStream>| async { let proto = if let Some(protos) = io.get_ref().1.alpn_protocol() { if protos.windows(2).any(|window| window == b"h2") { Protocol::Http2 } else { Protocol::Http1 } } else { Protocol::Http1 }; let peer_addr = io.get_ref().0.peer_addr().ok(); Ok((io, proto, peer_addr)) }) .and_then(self.map_err(TlsError::Service)) } } } #[cfg(feature = "rustls-0_21")] mod rustls_0_21 { use std::io; use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ rustls_0_21::{reexports::ServerConfig, Acceptor, TlsStream}, TlsError, }; use super::*; impl<S, B, X, U> HttpService<TlsStream<TcpStream>, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory< (Request, Framed<TlsStream<TcpStream>, h1::Codec>), Config = (), Response = (), >, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { /// Create Rustls v0.21 based service. pub fn rustls_021( self, config: ServerConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = (), > { self.rustls_021_with_config(config, TlsAcceptorConfig::default()) } /// Create Rustls v0.21 based service with custom TLS acceptor configuration. pub fn rustls_021_with_config( self, mut config: ServerConfig, tls_acceptor_config: TlsAcceptorConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = (), > { let mut protos = vec![b"h2".to_vec(), b"http/1.1".to_vec()]; protos.extend_from_slice(&config.alpn_protocols); config.alpn_protocols = protos; let mut acceptor = Acceptor::new(config); if let Some(handshake_timeout) = tls_acceptor_config.handshake_timeout { acceptor.set_handshake_timeout(handshake_timeout); } acceptor .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .and_then(|io: TlsStream<TcpStream>| async { let proto = if let Some(protos) = io.get_ref().1.alpn_protocol() { if protos.windows(2).any(|window| window == b"h2") { Protocol::Http2 } else { Protocol::Http1 } } else { Protocol::Http1 }; let peer_addr = io.get_ref().0.peer_addr().ok(); Ok((io, proto, peer_addr)) }) .and_then(self.map_err(TlsError::Service)) } } } #[cfg(feature = "rustls-0_22")] mod rustls_0_22 { use std::io; use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ rustls_0_22::{reexports::ServerConfig, Acceptor, TlsStream}, TlsError, }; use super::*; impl<S, B, X, U> HttpService<TlsStream<TcpStream>, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory< (Request, Framed<TlsStream<TcpStream>, h1::Codec>), Config = (), Response = (), >, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { /// Create Rustls v0.22 based service. pub fn rustls_0_22( self, config: ServerConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = (), > { self.rustls_0_22_with_config(config, TlsAcceptorConfig::default()) } /// Create Rustls v0.22 based service with custom TLS acceptor configuration. pub fn rustls_0_22_with_config( self, mut config: ServerConfig, tls_acceptor_config: TlsAcceptorConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = (), > { let mut protos = vec![b"h2".to_vec(), b"http/1.1".to_vec()]; protos.extend_from_slice(&config.alpn_protocols); config.alpn_protocols = protos; let mut acceptor = Acceptor::new(config); if let Some(handshake_timeout) = tls_acceptor_config.handshake_timeout { acceptor.set_handshake_timeout(handshake_timeout); } acceptor .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .and_then(|io: TlsStream<TcpStream>| async { let proto = if let Some(protos) = io.get_ref().1.alpn_protocol() { if protos.windows(2).any(|window| window == b"h2") { Protocol::Http2 } else { Protocol::Http1 } } else { Protocol::Http1 }; let peer_addr = io.get_ref().0.peer_addr().ok(); Ok((io, proto, peer_addr)) }) .and_then(self.map_err(TlsError::Service)) } } } #[cfg(feature = "rustls-0_23")] mod rustls_0_23 { use std::io; use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ rustls_0_23::{reexports::ServerConfig, Acceptor, TlsStream}, TlsError, }; use super::*; impl<S, B, X, U> HttpService<TlsStream<TcpStream>, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory< (Request, Framed<TlsStream<TcpStream>, h1::Codec>), Config = (), Response = (), >, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { /// Create Rustls v0.23 based service. pub fn rustls_0_23( self, config: ServerConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = (), > { self.rustls_0_23_with_config(config, TlsAcceptorConfig::default()) } /// Create Rustls v0.23 based service with custom TLS acceptor configuration. pub fn rustls_0_23_with_config( self, mut config: ServerConfig, tls_acceptor_config: TlsAcceptorConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = (), > { let mut protos = vec![b"h2".to_vec(), b"http/1.1".to_vec()]; protos.extend_from_slice(&config.alpn_protocols); config.alpn_protocols = protos; let mut acceptor = Acceptor::new(config); if let Some(handshake_timeout) = tls_acceptor_config.handshake_timeout { acceptor.set_handshake_timeout(handshake_timeout); } acceptor .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .and_then(|io: TlsStream<TcpStream>| async { let proto = if let Some(protos) = io.get_ref().1.alpn_protocol() { if protos.windows(2).any(|window| window == b"h2") { Protocol::Http2 } else { Protocol::Http1 } } else { Protocol::Http1 }; let peer_addr = io.get_ref().0.peer_addr().ok(); Ok((io, proto, peer_addr)) }) .and_then(self.map_err(TlsError::Service)) } } } impl<T, S, B, X, U> ServiceFactory<(T, Protocol, Option<net::SocketAddr>)> for HttpService<T, S, B, X, U> where T: AsyncRead + AsyncWrite + Unpin + 'static, S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::InitError: fmt::Debug, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory<(Request, Framed<T, h1::Codec>), Config = (), Response = ()>, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { type Response = (); type Error = DispatchError; type Config = (); type Service = HttpServiceHandler<T, S::Service, B, X::Service, U::Service>; type InitError = (); type Future = LocalBoxFuture<'static, Result<Self::Service, Self::InitError>>; fn new_service(&self, _: ()) -> Self::Future { let service = self.srv.new_service(()); let expect = self.expect.new_service(()); let upgrade = self.upgrade.as_ref().map(|s| s.new_service(())); let on_connect_ext = self.on_connect_ext.clone(); let cfg = self.cfg.clone(); Box::pin(async move { let expect = expect.await.map_err(|err| { tracing::error!("Initialization of HTTP expect service error: {err:?}"); })?; let upgrade = match upgrade { Some(upgrade) => { let upgrade = upgrade.await.map_err(|err| { tracing::error!("Initialization of HTTP upgrade service error: {err:?}"); })?; Some(upgrade) } None => None, }; let service = service.await.map_err(|err| { tracing::error!("Initialization of HTTP service error: {err:?}"); })?; Ok(HttpServiceHandler::new( cfg, service, expect, upgrade, on_connect_ext, )) }) } } /// `Service` implementation for HTTP/1 and HTTP/2 transport pub struct HttpServiceHandler<T, S, B, X, U> where S: Service<Request>, X: Service<Request>, U: Service<(Request, Framed<T, h1::Codec>)>, { pub(super) flow: Rc<HttpFlow<S, X, U>>, pub(super) cfg: ServiceConfig, pub(super) on_connect_ext: Option<Rc<ConnectCallback<T>>>, _phantom: PhantomData<B>, } impl<T, S, B, X, U> HttpServiceHandler<T, S, B, X, U> where S: Service<Request>, S::Error: Into<Response<BoxBody>>, X: Service<Request>, X::Error: Into<Response<BoxBody>>, U: Service<(Request, Framed<T, h1::Codec>)>, U::Error: Into<Response<BoxBody>>, { pub(super) fn new( cfg: ServiceConfig, service: S, expect: X, upgrade: Option<U>, on_connect_ext: Option<Rc<ConnectCallback<T>>>, ) -> HttpServiceHandler<T, S, B, X, U> { HttpServiceHandler { cfg, on_connect_ext, flow: HttpFlow::new(service, expect, upgrade), _phantom: PhantomData, } } pub(super) fn _poll_ready(&self, cx: &mut Context<'_>) -> Poll<Result<(), Response<BoxBody>>> { ready!(self.flow.expect.poll_ready(cx).map_err(Into::into))?; ready!(self.flow.service.poll_ready(cx).map_err(Into::into))?; if let Some(ref upg) = self.flow.upgrade { ready!(upg.poll_ready(cx).map_err(Into::into))?; }; Poll::Ready(Ok(())) } } /// A collection of services that describe an HTTP request flow. pub(super) struct HttpFlow<S, X, U> { pub(super) service: S, pub(super) expect: X, pub(super) upgrade: Option<U>, } impl<S, X, U> HttpFlow<S, X, U> { pub(super) fn new(service: S, expect: X, upgrade: Option<U>) -> Rc<Self> { Rc::new(Self { service, expect, upgrade, }) } } impl<T, S, B, X, U> Service<(T, Protocol, Option<net::SocketAddr>)> for HttpServiceHandler<T, S, B, X, U> where T: AsyncRead + AsyncWrite + Unpin, S: Service<Request>, S::Error: Into<Response<BoxBody>> + 'static, S::Future: 'static, S::Response: Into<Response<B>> + 'static, B: MessageBody + 'static, X: Service<Request, Response = Request>, X::Error: Into<Response<BoxBody>>, U: Service<(Request, Framed<T, h1::Codec>), Response = ()>, U::Error: fmt::Display + Into<Response<BoxBody>>, { type Response = (); type Error = DispatchError; type Future = HttpServiceHandlerResponse<T, S, B, X, U>; fn poll_ready(&self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> { self._poll_ready(cx).map_err(|err| { error!("HTTP service readiness error: {:?}", err); DispatchError::Service(err) }) } fn call(&self, (io, proto, peer_addr): (T, Protocol, Option<net::SocketAddr>)) -> Self::Future { let conn_data = OnConnectData::from_io(&io, self.on_connect_ext.as_deref()); match proto { #[cfg(feature = "http2")] Protocol::Http2 => HttpServiceHandlerResponse { state: State::H2Handshake { handshake: Some(( crate::h2::handshake_with_timeout(io, &self.cfg), self.cfg.clone(), Rc::clone(&self.flow), conn_data, peer_addr, )), }, }, #[cfg(not(feature = "http2"))] Protocol::Http2 => { panic!("HTTP/2 support is disabled (enable with the `http2` feature flag)") } Protocol::Http1 => HttpServiceHandlerResponse { state: State::H1 { dispatcher: h1::Dispatcher::new( io, Rc::clone(&self.flow), self.cfg.clone(), peer_addr, conn_data, ), }, }, proto => unimplemented!("Unsupported HTTP version: {:?}.", proto), } } } #[cfg(not(feature = "http2"))] pin_project! { #[project = StateProj] enum State<T, S, B, X, U> where T: AsyncRead, T: AsyncWrite, T: Unpin, S: Service<Request>, S::Future: 'static, S::Error: Into<Response<BoxBody>>, B: MessageBody, X: Service<Request, Response = Request>, X::Error: Into<Response<BoxBody>>, U: Service<(Request, Framed<T, h1::Codec>), Response = ()>, U::Error: fmt::Display, { H1 { #[pin] dispatcher: h1::Dispatcher<T, S, B, X, U> }, } } #[cfg(feature = "http2")] pin_project! { #[project = StateProj] enum State<T, S, B, X, U> where T: AsyncRead, T: AsyncWrite, T: Unpin, S: Service<Request>, S::Future: 'static, S::Error: Into<Response<BoxBody>>, B: MessageBody, X: Service<Request, Response = Request>, X::Error: Into<Response<BoxBody>>, U: Service<(Request, Framed<T, h1::Codec>), Response = ()>, U::Error: fmt::Display, { H1 { #[pin] dispatcher: h1::Dispatcher<T, S, B, X, U> }, H2 { #[pin] dispatcher: crate::h2::Dispatcher<T, S, B, X, U> }, H2Handshake { handshake: Option<( crate::h2::HandshakeWithTimeout<T>, ServiceConfig, Rc<HttpFlow<S, X, U>>, OnConnectData, Option<net::SocketAddr>, )>, }, } } pin_project! { pub struct HttpServiceHandlerResponse<T, S, B, X, U> where T: AsyncRead, T: AsyncWrite, T: Unpin, S: Service<Request>,
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
true
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/extensions.rs
actix-http/src/extensions.rs
use std::{ any::{Any, TypeId}, collections::HashMap, fmt, hash::{BuildHasherDefault, Hasher}, }; /// A hasher for `TypeId`s that takes advantage of its known characteristics. /// /// Author of `anymap` crate has done research on the topic: /// https://github.com/chris-morgan/anymap/blob/2e9a5704/src/lib.rs#L599 #[derive(Debug, Default)] struct NoOpHasher(u64); impl Hasher for NoOpHasher { fn write(&mut self, _bytes: &[u8]) { unimplemented!("This NoOpHasher can only handle u64s") } fn write_u64(&mut self, i: u64) { self.0 = i; } fn finish(&self) -> u64 { self.0 } } /// A type map for request extensions. /// /// All entries into this map must be owned types (or static references). #[derive(Default)] pub struct Extensions { // use no-op hasher with a std HashMap with for faster lookups on the small `TypeId` keys map: HashMap<TypeId, Box<dyn Any>, BuildHasherDefault<NoOpHasher>>, } impl Extensions { /// Creates an empty `Extensions`. #[inline] pub fn new() -> Extensions { Extensions { map: HashMap::default(), } } /// Insert an item into the map. /// /// If an item of this type was already stored, it will be replaced and returned. /// /// ``` /// # use actix_http::Extensions; /// let mut map = Extensions::new(); /// assert_eq!(map.insert(""), None); /// assert_eq!(map.insert(1u32), None); /// assert_eq!(map.insert(2u32), Some(1u32)); /// assert_eq!(*map.get::<u32>().unwrap(), 2u32); /// ``` pub fn insert<T: 'static>(&mut self, val: T) -> Option<T> { self.map .insert(TypeId::of::<T>(), Box::new(val)) .and_then(downcast_owned) } /// Check if map contains an item of a given type. /// /// ``` /// # use actix_http::Extensions; /// let mut map = Extensions::new(); /// assert!(!map.contains::<u32>()); /// /// assert_eq!(map.insert(1u32), None); /// assert!(map.contains::<u32>()); /// ``` pub fn contains<T: 'static>(&self) -> bool { self.map.contains_key(&TypeId::of::<T>()) } /// Get a reference to an item of a given type. /// /// ``` /// # use actix_http::Extensions; /// let mut map = Extensions::new(); /// map.insert(1u32); /// assert_eq!(map.get::<u32>(), Some(&1u32)); /// ``` pub fn get<T: 'static>(&self) -> Option<&T> { self.map .get(&TypeId::of::<T>()) .and_then(|boxed| boxed.downcast_ref()) } /// Get a mutable reference to an item of a given type. /// /// ``` /// # use actix_http::Extensions; /// let mut map = Extensions::new(); /// map.insert(1u32); /// assert_eq!(map.get_mut::<u32>(), Some(&mut 1u32)); /// ``` pub fn get_mut<T: 'static>(&mut self) -> Option<&mut T> { self.map .get_mut(&TypeId::of::<T>()) .and_then(|boxed| boxed.downcast_mut()) } /// Inserts the given `value` into the extensions if it is not present, then returns a reference /// to the value in the extensions. /// /// ``` /// # use actix_http::Extensions; /// let mut map = Extensions::new(); /// assert_eq!(map.get::<Vec<u32>>(), None); /// /// map.get_or_insert(Vec::<u32>::new()).push(1); /// assert_eq!(map.get::<Vec<u32>>(), Some(&vec![1])); /// /// map.get_or_insert(Vec::<u32>::new()).push(2); /// assert_eq!(map.get::<Vec<u32>>(), Some(&vec![1,2])); /// ``` pub fn get_or_insert<T: 'static>(&mut self, value: T) -> &mut T { self.get_or_insert_with(|| value) } /// Inserts a value computed from `f` into the extensions if the given `value` is not present, /// then returns a reference to the value in the extensions. /// /// ``` /// # use actix_http::Extensions; /// let mut map = Extensions::new(); /// assert_eq!(map.get::<Vec<u32>>(), None); /// /// map.get_or_insert_with(Vec::<u32>::new).push(1); /// assert_eq!(map.get::<Vec<u32>>(), Some(&vec![1])); /// /// map.get_or_insert_with(Vec::<u32>::new).push(2); /// assert_eq!(map.get::<Vec<u32>>(), Some(&vec![1,2])); /// ``` pub fn get_or_insert_with<T: 'static, F: FnOnce() -> T>(&mut self, default: F) -> &mut T { self.map .entry(TypeId::of::<T>()) .or_insert_with(|| Box::new(default())) .downcast_mut() .expect("extensions map should now contain a T value") } /// Remove an item from the map of a given type. /// /// If an item of this type was already stored, it will be returned. /// /// ``` /// # use actix_http::Extensions; /// let mut map = Extensions::new(); /// /// map.insert(1u32); /// assert_eq!(map.get::<u32>(), Some(&1u32)); /// /// assert_eq!(map.remove::<u32>(), Some(1u32)); /// assert!(!map.contains::<u32>()); /// ``` pub fn remove<T: 'static>(&mut self) -> Option<T> { self.map.remove(&TypeId::of::<T>()).and_then(downcast_owned) } /// Clear the `Extensions` of all inserted extensions. /// /// ``` /// # use actix_http::Extensions; /// let mut map = Extensions::new(); /// /// map.insert(1u32); /// assert!(map.contains::<u32>()); /// /// map.clear(); /// assert!(!map.contains::<u32>()); /// ``` #[inline] pub fn clear(&mut self) { self.map.clear(); } /// Extends self with the items from another `Extensions`. pub fn extend(&mut self, other: Extensions) { self.map.extend(other.map); } } impl fmt::Debug for Extensions { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { f.debug_struct("Extensions").finish() } } fn downcast_owned<T: 'static>(boxed: Box<dyn Any>) -> Option<T> { boxed.downcast().ok().map(|boxed| *boxed) } #[cfg(test)] mod tests { use super::*; #[test] fn test_remove() { let mut map = Extensions::new(); map.insert::<i8>(123); assert!(map.get::<i8>().is_some()); map.remove::<i8>(); assert!(map.get::<i8>().is_none()); } #[test] fn test_clear() { let mut map = Extensions::new(); map.insert::<i8>(8); map.insert::<i16>(16); map.insert::<i32>(32); assert!(map.contains::<i8>()); assert!(map.contains::<i16>()); assert!(map.contains::<i32>()); map.clear(); assert!(!map.contains::<i8>()); assert!(!map.contains::<i16>()); assert!(!map.contains::<i32>()); map.insert::<i8>(10); assert_eq!(*map.get::<i8>().unwrap(), 10); } #[test] fn test_integers() { static A: u32 = 8; let mut map = Extensions::new(); map.insert::<i8>(8); map.insert::<i16>(16); map.insert::<i32>(32); map.insert::<i64>(64); map.insert::<i128>(128); map.insert::<u8>(8); map.insert::<u16>(16); map.insert::<u32>(32); map.insert::<u64>(64); map.insert::<u128>(128); map.insert::<&'static u32>(&A); assert!(map.get::<i8>().is_some()); assert!(map.get::<i16>().is_some()); assert!(map.get::<i32>().is_some()); assert!(map.get::<i64>().is_some()); assert!(map.get::<i128>().is_some()); assert!(map.get::<u8>().is_some()); assert!(map.get::<u16>().is_some()); assert!(map.get::<u32>().is_some()); assert!(map.get::<u64>().is_some()); assert!(map.get::<u128>().is_some()); assert!(map.get::<&'static u32>().is_some()); } #[test] fn test_composition() { struct Magi<T>(pub T); struct Madoka { pub god: bool, } struct Homura { pub attempts: usize, } struct Mami { pub guns: usize, } let mut map = Extensions::new(); map.insert(Magi(Madoka { god: false })); map.insert(Magi(Homura { attempts: 0 })); map.insert(Magi(Mami { guns: 999 })); assert!(!map.get::<Magi<Madoka>>().unwrap().0.god); assert_eq!(0, map.get::<Magi<Homura>>().unwrap().0.attempts); assert_eq!(999, map.get::<Magi<Mami>>().unwrap().0.guns); } #[test] fn test_extensions() { #[derive(Debug, PartialEq)] struct MyType(i32); let mut extensions = Extensions::new(); extensions.insert(5i32); extensions.insert(MyType(10)); assert_eq!(extensions.get(), Some(&5i32)); assert_eq!(extensions.get_mut(), Some(&mut 5i32)); assert_eq!(extensions.remove::<i32>(), Some(5i32)); assert!(extensions.get::<i32>().is_none()); assert_eq!(extensions.get::<bool>(), None); assert_eq!(extensions.get(), Some(&MyType(10))); } #[test] fn test_extend() { #[derive(Debug, PartialEq)] struct MyType(i32); let mut extensions = Extensions::new(); extensions.insert(5i32); extensions.insert(MyType(10)); let mut other = Extensions::new(); other.insert(15i32); other.insert(20u8); extensions.extend(other); assert_eq!(extensions.get(), Some(&15i32)); assert_eq!(extensions.get_mut(), Some(&mut 15i32)); assert_eq!(extensions.remove::<i32>(), Some(15i32)); assert!(extensions.get::<i32>().is_none()); assert_eq!(extensions.get::<bool>(), None); assert_eq!(extensions.get(), Some(&MyType(10))); assert_eq!(extensions.get(), Some(&20u8)); assert_eq!(extensions.get_mut(), Some(&mut 20u8)); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/payload.rs
actix-http/src/payload.rs
use std::{ mem, pin::Pin, task::{Context, Poll}, }; use bytes::Bytes; use futures_core::Stream; use pin_project_lite::pin_project; use crate::error::PayloadError; /// A boxed payload stream. pub type BoxedPayloadStream = Pin<Box<dyn Stream<Item = Result<Bytes, PayloadError>>>>; #[doc(hidden)] #[deprecated(since = "3.0.0", note = "Renamed to `BoxedPayloadStream`.")] pub type PayloadStream = BoxedPayloadStream; #[cfg(not(feature = "http2"))] pin_project! { /// A streaming payload. #[project = PayloadProj] pub enum Payload<S = BoxedPayloadStream> { None, H1 { payload: crate::h1::Payload }, Stream { #[pin] payload: S }, } } #[cfg(feature = "http2")] pin_project! { /// A streaming payload. #[project = PayloadProj] pub enum Payload<S = BoxedPayloadStream> { None, H1 { payload: crate::h1::Payload }, H2 { payload: crate::h2::Payload }, Stream { #[pin] payload: S }, } } impl<S> From<crate::h1::Payload> for Payload<S> { #[inline] fn from(payload: crate::h1::Payload) -> Self { Payload::H1 { payload } } } impl<S> From<Bytes> for Payload<S> { #[inline] fn from(bytes: Bytes) -> Self { let (_, mut pl) = crate::h1::Payload::create(true); pl.unread_data(bytes); self::Payload::from(pl) } } impl<S> From<Vec<u8>> for Payload<S> { #[inline] fn from(vec: Vec<u8>) -> Self { Payload::from(Bytes::from(vec)) } } #[cfg(feature = "http2")] impl<S> From<crate::h2::Payload> for Payload<S> { #[inline] fn from(payload: crate::h2::Payload) -> Self { Payload::H2 { payload } } } #[cfg(feature = "http2")] impl<S> From<::h2::RecvStream> for Payload<S> { #[inline] fn from(stream: ::h2::RecvStream) -> Self { Payload::H2 { payload: crate::h2::Payload::new(stream), } } } impl From<BoxedPayloadStream> for Payload { #[inline] fn from(payload: BoxedPayloadStream) -> Self { Payload::Stream { payload } } } impl<S> Payload<S> { /// Takes current payload and replaces it with `None` value. #[must_use] pub fn take(&mut self) -> Payload<S> { mem::replace(self, Payload::None) } } impl<S> Stream for Payload<S> where S: Stream<Item = Result<Bytes, PayloadError>>, { type Item = Result<Bytes, PayloadError>; #[inline] fn poll_next(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Option<Self::Item>> { match self.project() { PayloadProj::None => Poll::Ready(None), PayloadProj::H1 { payload } => Pin::new(payload).poll_next(cx), #[cfg(feature = "http2")] PayloadProj::H2 { payload } => Pin::new(payload).poll_next(cx), PayloadProj::Stream { payload } => payload.poll_next(cx), } } } #[cfg(test)] mod tests { use static_assertions::{assert_impl_all, assert_not_impl_any}; use super::*; assert_impl_all!(Payload: Unpin); assert_not_impl_any!(Payload: Send, Sync); }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/http_message.rs
actix-http/src/http_message.rs
use std::{ cell::{Ref, RefMut}, str, }; use encoding_rs::{Encoding, UTF_8}; use http::header; use mime::Mime; use crate::{ error::{ContentTypeError, ParseError}, header::{Header, HeaderMap}, payload::Payload, Extensions, }; /// Trait that implements general purpose operations on HTTP messages. pub trait HttpMessage: Sized { /// Type of message payload stream type Stream; /// Read the message headers. fn headers(&self) -> &HeaderMap; /// Message payload stream fn take_payload(&mut self) -> Payload<Self::Stream>; /// Returns a reference to the request-local data/extensions container. fn extensions(&self) -> Ref<'_, Extensions>; /// Returns a mutable reference to the request-local data/extensions container. fn extensions_mut(&self) -> RefMut<'_, Extensions>; /// Get a header. #[doc(hidden)] fn get_header<H: Header>(&self) -> Option<H> where Self: Sized, { if self.headers().contains_key(H::name()) { H::parse(self).ok() } else { None } } /// Read the request content type. If request did not contain a *Content-Type* header, an empty /// string is returned. fn content_type(&self) -> &str { if let Some(content_type) = self.headers().get(header::CONTENT_TYPE) { if let Ok(content_type) = content_type.to_str() { return content_type.split(';').next().unwrap().trim(); } } "" } /// Get content type encoding. /// /// UTF-8 is used by default, If request charset is not set. fn encoding(&self) -> Result<&'static Encoding, ContentTypeError> { if let Some(mime_type) = self.mime_type()? { if let Some(charset) = mime_type.get_param("charset") { if let Some(enc) = Encoding::for_label_no_replacement(charset.as_str().as_bytes()) { Ok(enc) } else { Err(ContentTypeError::UnknownEncoding) } } else { Ok(UTF_8) } } else { Ok(UTF_8) } } /// Convert the request content type to a known mime type. fn mime_type(&self) -> Result<Option<Mime>, ContentTypeError> { if let Some(content_type) = self.headers().get(header::CONTENT_TYPE) { if let Ok(content_type) = content_type.to_str() { return match content_type.parse() { Ok(mt) => Ok(Some(mt)), Err(_) => Err(ContentTypeError::ParseError), }; } else { return Err(ContentTypeError::ParseError); } } Ok(None) } /// Check if request has chunked transfer encoding. fn chunked(&self) -> Result<bool, ParseError> { if let Some(encodings) = self.headers().get(header::TRANSFER_ENCODING) { if let Ok(s) = encodings.to_str() { Ok(s.to_lowercase().contains("chunked")) } else { Err(ParseError::Header) } } else { Ok(false) } } } impl<T> HttpMessage for &mut T where T: HttpMessage, { type Stream = T::Stream; fn headers(&self) -> &HeaderMap { (**self).headers() } /// Message payload stream fn take_payload(&mut self) -> Payload<Self::Stream> { (**self).take_payload() } /// Request's extensions container fn extensions(&self) -> Ref<'_, Extensions> { (**self).extensions() } /// Mutable reference to a the request's extensions container fn extensions_mut(&self) -> RefMut<'_, Extensions> { (**self).extensions_mut() } } #[cfg(test)] mod tests { use bytes::Bytes; use encoding_rs::ISO_8859_2; use super::*; use crate::test::TestRequest; #[test] fn test_content_type() { let req = TestRequest::default() .insert_header(("content-type", "text/plain")) .finish(); assert_eq!(req.content_type(), "text/plain"); let req = TestRequest::default() .insert_header(("content-type", "application/json; charset=utf-8")) .finish(); assert_eq!(req.content_type(), "application/json"); let req = TestRequest::default().finish(); assert_eq!(req.content_type(), ""); } #[test] fn test_mime_type() { let req = TestRequest::default() .insert_header(("content-type", "application/json")) .finish(); assert_eq!(req.mime_type().unwrap(), Some(mime::APPLICATION_JSON)); let req = TestRequest::default().finish(); assert_eq!(req.mime_type().unwrap(), None); let req = TestRequest::default() .insert_header(("content-type", "application/json; charset=utf-8")) .finish(); let mt = req.mime_type().unwrap().unwrap(); assert_eq!(mt.get_param(mime::CHARSET), Some(mime::UTF_8)); assert_eq!(mt.type_(), mime::APPLICATION); assert_eq!(mt.subtype(), mime::JSON); } #[test] fn test_mime_type_error() { let req = TestRequest::default() .insert_header(("content-type", "applicationadfadsfasdflknadsfklnadsfjson")) .finish(); assert_eq!(Err(ContentTypeError::ParseError), req.mime_type()); } #[test] fn test_encoding() { let req = TestRequest::default().finish(); assert_eq!(UTF_8.name(), req.encoding().unwrap().name()); let req = TestRequest::default() .insert_header(("content-type", "application/json")) .finish(); assert_eq!(UTF_8.name(), req.encoding().unwrap().name()); let req = TestRequest::default() .insert_header(("content-type", "application/json; charset=ISO-8859-2")) .finish(); assert_eq!(ISO_8859_2, req.encoding().unwrap()); } #[test] fn test_encoding_error() { let req = TestRequest::default() .insert_header(("content-type", "applicatjson")) .finish(); assert_eq!(Some(ContentTypeError::ParseError), req.encoding().err()); let req = TestRequest::default() .insert_header(("content-type", "application/json; charset=kkkttktk")) .finish(); assert_eq!( Some(ContentTypeError::UnknownEncoding), req.encoding().err() ); } #[test] fn test_chunked() { let req = TestRequest::default().finish(); assert!(!req.chunked().unwrap()); let req = TestRequest::default() .insert_header((header::TRANSFER_ENCODING, "chunked")) .finish(); assert!(req.chunked().unwrap()); let req = TestRequest::default() .insert_header(( header::TRANSFER_ENCODING, Bytes::from_static(b"some va\xadscc\xacas0xsdasdlue"), )) .finish(); assert!(req.chunked().is_err()); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/message.rs
actix-http/src/message.rs
use std::{cell::RefCell, ops, rc::Rc}; use bitflags::bitflags; /// Represents various types of connection #[derive(Debug, Clone, Copy, PartialEq, Eq)] pub enum ConnectionType { /// Close connection after response. Close, /// Keep connection alive after response. KeepAlive, /// Connection is upgraded to different type. Upgrade, } bitflags! { #[derive(Debug, Clone, Copy)] pub(crate) struct Flags: u8 { const CLOSE = 0b0000_0001; const KEEP_ALIVE = 0b0000_0010; const UPGRADE = 0b0000_0100; const EXPECT = 0b0000_1000; const NO_CHUNKING = 0b0001_0000; const CAMEL_CASE = 0b0010_0000; } } #[doc(hidden)] pub trait Head: Default + 'static { fn clear(&mut self); fn with_pool<F, R>(f: F) -> R where F: FnOnce(&MessagePool<Self>) -> R; } pub struct Message<T: Head> { /// Rc here should not be cloned by anyone. /// It's used to reuse allocation of T and no shared ownership is allowed. head: Rc<T>, } impl<T: Head> Message<T> { /// Get new message from the pool of objects #[allow(clippy::new_without_default)] pub fn new() -> Self { T::with_pool(MessagePool::get_message) } } impl<T: Head> ops::Deref for Message<T> { type Target = T; fn deref(&self) -> &Self::Target { self.head.as_ref() } } impl<T: Head> ops::DerefMut for Message<T> { fn deref_mut(&mut self) -> &mut Self::Target { Rc::get_mut(&mut self.head).expect("Multiple copies exist") } } impl<T: Head> Drop for Message<T> { fn drop(&mut self) { T::with_pool(|p| p.release(Rc::clone(&self.head))) } } /// Generic `Head` object pool. #[doc(hidden)] pub struct MessagePool<T: Head>(RefCell<Vec<Rc<T>>>); impl<T: Head> MessagePool<T> { pub(crate) fn create() -> MessagePool<T> { MessagePool(RefCell::new(Vec::with_capacity(128))) } /// Get message from the pool #[inline] fn get_message(&self) -> Message<T> { if let Some(mut msg) = self.0.borrow_mut().pop() { // Message is put in pool only when it's the last copy. // which means it's guaranteed to be unique when popped out. Rc::get_mut(&mut msg) .expect("Multiple copies exist") .clear(); Message { head: msg } } else { Message { head: Rc::new(T::default()), } } } #[inline] /// Release message instance fn release(&self, msg: Rc<T>) { let pool = &mut self.0.borrow_mut(); if pool.len() < 128 { pool.push(msg); } } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/encoding/encoder.rs
actix-http/src/encoding/encoder.rs
//! Stream encoders. use std::{ error::Error as StdError, future::Future, io::{self, Write as _}, pin::Pin, task::{Context, Poll}, }; use actix_rt::task::{spawn_blocking, JoinHandle}; use bytes::Bytes; use derive_more::Display; #[cfg(feature = "compress-gzip")] use flate2::write::{GzEncoder, ZlibEncoder}; use futures_core::ready; use pin_project_lite::pin_project; use tracing::trace; #[cfg(feature = "compress-zstd")] use zstd::stream::write::Encoder as ZstdEncoder; use super::Writer; use crate::{ body::{self, BodySize, MessageBody}, header::{self, ContentEncoding, HeaderValue, CONTENT_ENCODING}, ResponseHead, StatusCode, }; const MAX_CHUNK_SIZE_ENCODE_IN_PLACE: usize = 1024; pin_project! { pub struct Encoder<B> { #[pin] body: EncoderBody<B>, encoder: Option<ContentEncoder>, fut: Option<JoinHandle<Result<ContentEncoder, io::Error>>>, eof: bool, } } impl<B: MessageBody> Encoder<B> { fn none() -> Self { Encoder { body: EncoderBody::None { body: body::None::new(), }, encoder: None, fut: None, eof: true, } } fn empty() -> Self { Encoder { body: EncoderBody::Full { body: Bytes::new() }, encoder: None, fut: None, eof: true, } } pub fn response(encoding: ContentEncoding, head: &mut ResponseHead, body: B) -> Self { // no need to compress empty bodies match body.size() { BodySize::None => return Self::none(), BodySize::Sized(0) => return Self::empty(), _ => {} } let should_encode = !(head.headers().contains_key(&CONTENT_ENCODING) || head.status == StatusCode::SWITCHING_PROTOCOLS || head.status == StatusCode::NO_CONTENT || encoding == ContentEncoding::Identity); let body = match body.try_into_bytes() { Ok(body) => EncoderBody::Full { body }, Err(body) => EncoderBody::Stream { body }, }; if should_encode { // wrap body only if encoder is feature-enabled if let Some(enc) = ContentEncoder::select(encoding) { update_head(encoding, head); return Encoder { body, encoder: Some(enc), fut: None, eof: false, }; } } Encoder { body, encoder: None, fut: None, eof: false, } } } pin_project! { #[project = EncoderBodyProj] enum EncoderBody<B> { None { body: body::None }, Full { body: Bytes }, Stream { #[pin] body: B }, } } impl<B> MessageBody for EncoderBody<B> where B: MessageBody, { type Error = EncoderError; #[inline] fn size(&self) -> BodySize { match self { EncoderBody::None { body } => body.size(), EncoderBody::Full { body } => body.size(), EncoderBody::Stream { body } => body.size(), } } fn poll_next( self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { match self.project() { EncoderBodyProj::None { body } => { Pin::new(body).poll_next(cx).map_err(|err| match err {}) } EncoderBodyProj::Full { body } => { Pin::new(body).poll_next(cx).map_err(|err| match err {}) } EncoderBodyProj::Stream { body } => body .poll_next(cx) .map_err(|err| EncoderError::Body(err.into())), } } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> where Self: Sized, { match self { EncoderBody::None { body } => Ok(body.try_into_bytes().unwrap()), EncoderBody::Full { body } => Ok(body.try_into_bytes().unwrap()), _ => Err(self), } } } impl<B> MessageBody for Encoder<B> where B: MessageBody, { type Error = EncoderError; #[inline] fn size(&self) -> BodySize { if self.encoder.is_some() { BodySize::Stream } else { self.body.size() } } fn poll_next( self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { let mut this = self.project(); loop { if *this.eof { return Poll::Ready(None); } if let Some(ref mut fut) = this.fut { let mut encoder = ready!(Pin::new(fut).poll(cx)) .map_err(|_| { EncoderError::Io(io::Error::other( "Blocking task was cancelled unexpectedly", )) })? .map_err(EncoderError::Io)?; let chunk = encoder.take(); *this.encoder = Some(encoder); this.fut.take(); if !chunk.is_empty() { return Poll::Ready(Some(Ok(chunk))); } } let result = ready!(this.body.as_mut().poll_next(cx)); match result { Some(Err(err)) => return Poll::Ready(Some(Err(err))), Some(Ok(chunk)) => { if let Some(mut encoder) = this.encoder.take() { if chunk.len() < MAX_CHUNK_SIZE_ENCODE_IN_PLACE { encoder.write(&chunk).map_err(EncoderError::Io)?; let chunk = encoder.take(); *this.encoder = Some(encoder); if !chunk.is_empty() { return Poll::Ready(Some(Ok(chunk))); } } else { *this.fut = Some(spawn_blocking(move || { encoder.write(&chunk)?; Ok(encoder) })); } } else { return Poll::Ready(Some(Ok(chunk))); } } None => { if let Some(encoder) = this.encoder.take() { let chunk = encoder.finish().map_err(EncoderError::Io)?; if chunk.is_empty() { return Poll::Ready(None); } else { *this.eof = true; return Poll::Ready(Some(Ok(chunk))); } } else { return Poll::Ready(None); } } } } } #[inline] fn try_into_bytes(mut self) -> Result<Bytes, Self> where Self: Sized, { if self.encoder.is_some() { Err(self) } else { match self.body.try_into_bytes() { Ok(body) => Ok(body), Err(body) => { self.body = body; Err(self) } } } } } fn update_head(encoding: ContentEncoding, head: &mut ResponseHead) { head.headers_mut() .insert(header::CONTENT_ENCODING, encoding.to_header_value()); head.headers_mut() .append(header::VARY, HeaderValue::from_static("accept-encoding")); head.no_chunking(false); } enum ContentEncoder { #[cfg(feature = "compress-gzip")] Deflate(ZlibEncoder<Writer>), #[cfg(feature = "compress-gzip")] Gzip(GzEncoder<Writer>), #[cfg(feature = "compress-brotli")] Brotli(Box<brotli::CompressorWriter<Writer>>), // Wwe need explicit 'static lifetime here because ZstdEncoder needs a lifetime argument and we // use `spawn_blocking` in `Encoder::poll_next` that requires `FnOnce() -> R + Send + 'static`. #[cfg(feature = "compress-zstd")] Zstd(ZstdEncoder<'static, Writer>), } impl ContentEncoder { fn select(encoding: ContentEncoding) -> Option<Self> { match encoding { #[cfg(feature = "compress-gzip")] ContentEncoding::Deflate => Some(ContentEncoder::Deflate(ZlibEncoder::new( Writer::new(), flate2::Compression::fast(), ))), #[cfg(feature = "compress-gzip")] ContentEncoding::Gzip => Some(ContentEncoder::Gzip(GzEncoder::new( Writer::new(), flate2::Compression::fast(), ))), #[cfg(feature = "compress-brotli")] ContentEncoding::Brotli => Some(ContentEncoder::Brotli(new_brotli_compressor())), #[cfg(feature = "compress-zstd")] ContentEncoding::Zstd => { let encoder = ZstdEncoder::new(Writer::new(), 3).ok()?; Some(ContentEncoder::Zstd(encoder)) } _ => None, } } #[inline] pub(crate) fn take(&mut self) -> Bytes { match *self { #[cfg(feature = "compress-brotli")] ContentEncoder::Brotli(ref mut encoder) => encoder.get_mut().take(), #[cfg(feature = "compress-gzip")] ContentEncoder::Deflate(ref mut encoder) => encoder.get_mut().take(), #[cfg(feature = "compress-gzip")] ContentEncoder::Gzip(ref mut encoder) => encoder.get_mut().take(), #[cfg(feature = "compress-zstd")] ContentEncoder::Zstd(ref mut encoder) => encoder.get_mut().take(), } } fn finish(self) -> Result<Bytes, io::Error> { match self { #[cfg(feature = "compress-brotli")] ContentEncoder::Brotli(mut encoder) => match encoder.flush() { Ok(()) => Ok(encoder.into_inner().buf.freeze()), Err(err) => Err(err), }, #[cfg(feature = "compress-gzip")] ContentEncoder::Gzip(encoder) => match encoder.finish() { Ok(writer) => Ok(writer.buf.freeze()), Err(err) => Err(err), }, #[cfg(feature = "compress-gzip")] ContentEncoder::Deflate(encoder) => match encoder.finish() { Ok(writer) => Ok(writer.buf.freeze()), Err(err) => Err(err), }, #[cfg(feature = "compress-zstd")] ContentEncoder::Zstd(encoder) => match encoder.finish() { Ok(writer) => Ok(writer.buf.freeze()), Err(err) => Err(err), }, } } fn write(&mut self, data: &[u8]) -> Result<(), io::Error> { match *self { #[cfg(feature = "compress-brotli")] ContentEncoder::Brotli(ref mut encoder) => match encoder.write_all(data) { Ok(_) => Ok(()), Err(err) => { trace!("Error decoding br encoding: {}", err); Err(err) } }, #[cfg(feature = "compress-gzip")] ContentEncoder::Gzip(ref mut encoder) => match encoder.write_all(data) { Ok(_) => Ok(()), Err(err) => { trace!("Error decoding gzip encoding: {}", err); Err(err) } }, #[cfg(feature = "compress-gzip")] ContentEncoder::Deflate(ref mut encoder) => match encoder.write_all(data) { Ok(_) => Ok(()), Err(err) => { trace!("Error decoding deflate encoding: {}", err); Err(err) } }, #[cfg(feature = "compress-zstd")] ContentEncoder::Zstd(ref mut encoder) => match encoder.write_all(data) { Ok(_) => Ok(()), Err(err) => { trace!("Error decoding ztsd encoding: {}", err); Err(err) } }, } } } #[cfg(feature = "compress-brotli")] fn new_brotli_compressor() -> Box<brotli::CompressorWriter<Writer>> { Box::new(brotli::CompressorWriter::new( Writer::new(), 32 * 1024, // 32 KiB buffer 3, // BROTLI_PARAM_QUALITY 22, // BROTLI_PARAM_LGWIN )) } #[derive(Debug, Display)] #[non_exhaustive] pub enum EncoderError { /// Wrapped body stream error. #[display("body")] Body(Box<dyn StdError>), /// Generic I/O error. #[display("io")] Io(io::Error), } impl StdError for EncoderError { fn source(&self) -> Option<&(dyn StdError + 'static)> { match self { EncoderError::Body(err) => Some(&**err), EncoderError::Io(err) => Some(err), } } } impl From<EncoderError> for crate::Error { fn from(err: EncoderError) -> Self { crate::Error::new_encoder().with_cause(err) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/encoding/decoder.rs
actix-http/src/encoding/decoder.rs
//! Stream decoders. use std::{ future::Future, io::{self, Write as _}, pin::Pin, task::{Context, Poll}, }; use actix_rt::task::{spawn_blocking, JoinHandle}; use bytes::Bytes; #[cfg(feature = "compress-gzip")] use flate2::write::{GzDecoder, ZlibDecoder}; use futures_core::{ready, Stream}; #[cfg(feature = "compress-zstd")] use zstd::stream::write::Decoder as ZstdDecoder; use crate::{ encoding::Writer, error::PayloadError, header::{ContentEncoding, HeaderMap, CONTENT_ENCODING}, }; const MAX_CHUNK_SIZE_DECODE_IN_PLACE: usize = 2049; pin_project_lite::pin_project! { pub struct Decoder<S> { decoder: Option<ContentDecoder>, #[pin] stream: S, eof: bool, fut: Option<JoinHandle<Result<(Option<Bytes>, ContentDecoder), io::Error>>>, } } impl<S> Decoder<S> where S: Stream<Item = Result<Bytes, PayloadError>>, { /// Construct a decoder. #[inline] pub fn new(stream: S, encoding: ContentEncoding) -> Decoder<S> { let decoder = match encoding { #[cfg(feature = "compress-brotli")] ContentEncoding::Brotli => Some(ContentDecoder::Brotli(Box::new( brotli::DecompressorWriter::new(Writer::new(), 8_096), ))), #[cfg(feature = "compress-gzip")] ContentEncoding::Deflate => Some(ContentDecoder::Deflate(Box::new(ZlibDecoder::new( Writer::new(), )))), #[cfg(feature = "compress-gzip")] ContentEncoding::Gzip => Some(ContentDecoder::Gzip(Box::new(GzDecoder::new( Writer::new(), )))), #[cfg(feature = "compress-zstd")] ContentEncoding::Zstd => Some(ContentDecoder::Zstd(Box::new( ZstdDecoder::new(Writer::new()).expect( "Failed to create zstd decoder. This is a bug. \ Please report it to the actix-web repository.", ), ))), _ => None, }; Decoder { decoder, stream, fut: None, eof: false, } } /// Construct decoder based on headers. #[inline] pub fn from_headers(stream: S, headers: &HeaderMap) -> Decoder<S> { // check content-encoding let encoding = headers .get(&CONTENT_ENCODING) .and_then(|val| val.to_str().ok()) .and_then(|x| x.parse().ok()) .unwrap_or(ContentEncoding::Identity); Self::new(stream, encoding) } } impl<S> Stream for Decoder<S> where S: Stream<Item = Result<Bytes, PayloadError>>, { type Item = Result<Bytes, PayloadError>; fn poll_next(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Option<Self::Item>> { let mut this = self.project(); loop { if let Some(ref mut fut) = this.fut { let (chunk, decoder) = ready!(Pin::new(fut).poll(cx)).map_err(|_| { PayloadError::Io(io::Error::other("Blocking task was cancelled unexpectedly")) })??; *this.decoder = Some(decoder); this.fut.take(); if let Some(chunk) = chunk { return Poll::Ready(Some(Ok(chunk))); } } if *this.eof { return Poll::Ready(None); } match ready!(this.stream.as_mut().poll_next(cx)) { Some(Err(err)) => return Poll::Ready(Some(Err(err))), Some(Ok(chunk)) => { if let Some(mut decoder) = this.decoder.take() { if chunk.len() < MAX_CHUNK_SIZE_DECODE_IN_PLACE { let chunk = decoder.feed_data(chunk)?; *this.decoder = Some(decoder); if let Some(chunk) = chunk { return Poll::Ready(Some(Ok(chunk))); } } else { *this.fut = Some(spawn_blocking(move || { let chunk = decoder.feed_data(chunk)?; Ok((chunk, decoder)) })); } continue; } else { return Poll::Ready(Some(Ok(chunk))); } } None => { *this.eof = true; return if let Some(mut decoder) = this.decoder.take() { match decoder.feed_eof() { Ok(Some(res)) => Poll::Ready(Some(Ok(res))), Ok(None) => Poll::Ready(None), Err(err) => Poll::Ready(Some(Err(err.into()))), } } else { Poll::Ready(None) }; } } } } } enum ContentDecoder { #[cfg(feature = "compress-gzip")] Deflate(Box<ZlibDecoder<Writer>>), #[cfg(feature = "compress-gzip")] Gzip(Box<GzDecoder<Writer>>), #[cfg(feature = "compress-brotli")] Brotli(Box<brotli::DecompressorWriter<Writer>>), // We need explicit 'static lifetime here because ZstdDecoder need lifetime // argument, and we use `spawn_blocking` in `Decoder::poll_next` that require `FnOnce() -> R + Send + 'static` #[cfg(feature = "compress-zstd")] Zstd(Box<ZstdDecoder<'static, Writer>>), } impl ContentDecoder { fn feed_eof(&mut self) -> io::Result<Option<Bytes>> { match self { #[cfg(feature = "compress-brotli")] ContentDecoder::Brotli(ref mut decoder) => match decoder.flush() { Ok(()) => { let b = decoder.get_mut().take(); if !b.is_empty() { Ok(Some(b)) } else { Ok(None) } } Err(err) => Err(err), }, #[cfg(feature = "compress-gzip")] ContentDecoder::Gzip(ref mut decoder) => match decoder.try_finish() { Ok(_) => { let b = decoder.get_mut().take(); if !b.is_empty() { Ok(Some(b)) } else { Ok(None) } } Err(err) => Err(err), }, #[cfg(feature = "compress-gzip")] ContentDecoder::Deflate(ref mut decoder) => match decoder.try_finish() { Ok(_) => { let b = decoder.get_mut().take(); if !b.is_empty() { Ok(Some(b)) } else { Ok(None) } } Err(err) => Err(err), }, #[cfg(feature = "compress-zstd")] ContentDecoder::Zstd(ref mut decoder) => match decoder.flush() { Ok(_) => { let b = decoder.get_mut().take(); if !b.is_empty() { Ok(Some(b)) } else { Ok(None) } } Err(err) => Err(err), }, } } fn feed_data(&mut self, data: Bytes) -> io::Result<Option<Bytes>> { match self { #[cfg(feature = "compress-brotli")] ContentDecoder::Brotli(ref mut decoder) => match decoder.write_all(&data) { Ok(_) => { decoder.flush()?; let b = decoder.get_mut().take(); if !b.is_empty() { Ok(Some(b)) } else { Ok(None) } } Err(err) => Err(err), }, #[cfg(feature = "compress-gzip")] ContentDecoder::Gzip(ref mut decoder) => match decoder.write_all(&data) { Ok(_) => { decoder.flush()?; let b = decoder.get_mut().take(); if !b.is_empty() { Ok(Some(b)) } else { Ok(None) } } Err(err) => Err(err), }, #[cfg(feature = "compress-gzip")] ContentDecoder::Deflate(ref mut decoder) => match decoder.write_all(&data) { Ok(_) => { decoder.flush()?; let b = decoder.get_mut().take(); if !b.is_empty() { Ok(Some(b)) } else { Ok(None) } } Err(err) => Err(err), }, #[cfg(feature = "compress-zstd")] ContentDecoder::Zstd(ref mut decoder) => match decoder.write_all(&data) { Ok(_) => { decoder.flush()?; let b = decoder.get_mut().take(); if !b.is_empty() { Ok(Some(b)) } else { Ok(None) } } Err(err) => Err(err), }, } } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/encoding/mod.rs
actix-http/src/encoding/mod.rs
//! Content-Encoding support. use std::io; use bytes::{Bytes, BytesMut}; mod decoder; mod encoder; pub use self::{decoder::Decoder, encoder::Encoder}; /// Special-purpose writer for streaming (de-)compression. /// /// Pre-allocates 8KiB of capacity. struct Writer { buf: BytesMut, } impl Writer { fn new() -> Writer { Writer { buf: BytesMut::with_capacity(8192), } } fn take(&mut self) -> Bytes { self.buf.split().freeze() } } impl io::Write for Writer { fn write(&mut self, buf: &[u8]) -> io::Result<usize> { self.buf.extend_from_slice(buf); Ok(buf.len()) } fn flush(&mut self) -> io::Result<()> { Ok(()) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/requests/mod.rs
actix-http/src/requests/mod.rs
//! HTTP requests. mod head; mod request; pub use self::{ head::{RequestHead, RequestHeadType}, request::Request, };
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/requests/head.rs
actix-http/src/requests/head.rs
use std::{net, rc::Rc}; use crate::{ header::{self, HeaderMap}, message::{Flags, Head, MessagePool}, ConnectionType, Method, Uri, Version, }; thread_local! { static REQUEST_POOL: MessagePool<RequestHead> = MessagePool::<RequestHead>::create() } #[derive(Debug, Clone)] pub struct RequestHead { pub method: Method, pub uri: Uri, pub version: Version, pub headers: HeaderMap, /// Will only be None when called in unit tests unless set manually. pub peer_addr: Option<net::SocketAddr>, flags: Flags, } impl Default for RequestHead { fn default() -> RequestHead { RequestHead { method: Method::default(), uri: Uri::default(), version: Version::HTTP_11, headers: HeaderMap::with_capacity(16), peer_addr: None, flags: Flags::empty(), } } } impl Head for RequestHead { fn clear(&mut self) { self.flags = Flags::empty(); self.headers.clear(); } fn with_pool<F, R>(f: F) -> R where F: FnOnce(&MessagePool<Self>) -> R, { REQUEST_POOL.with(|p| f(p)) } } impl RequestHead { /// Read the message headers. pub fn headers(&self) -> &HeaderMap { &self.headers } /// Mutable reference to the message headers. pub fn headers_mut(&mut self) -> &mut HeaderMap { &mut self.headers } /// Is to uppercase headers with Camel-Case. /// Default is `false` #[inline] pub fn camel_case_headers(&self) -> bool { self.flags.contains(Flags::CAMEL_CASE) } /// Set `true` to send headers which are formatted as Camel-Case. #[inline] pub fn set_camel_case_headers(&mut self, val: bool) { if val { self.flags.insert(Flags::CAMEL_CASE); } else { self.flags.remove(Flags::CAMEL_CASE); } } #[inline] /// Set connection type of the message pub fn set_connection_type(&mut self, ctype: ConnectionType) { match ctype { ConnectionType::Close => self.flags.insert(Flags::CLOSE), ConnectionType::KeepAlive => self.flags.insert(Flags::KEEP_ALIVE), ConnectionType::Upgrade => self.flags.insert(Flags::UPGRADE), } } #[inline] /// Connection type pub fn connection_type(&self) -> ConnectionType { if self.flags.contains(Flags::CLOSE) { ConnectionType::Close } else if self.flags.contains(Flags::KEEP_ALIVE) { ConnectionType::KeepAlive } else if self.flags.contains(Flags::UPGRADE) { ConnectionType::Upgrade } else if self.version < Version::HTTP_11 { ConnectionType::Close } else { ConnectionType::KeepAlive } } /// Connection upgrade status pub fn upgrade(&self) -> bool { self.headers() .get(header::CONNECTION) .map(|hdr| { if let Ok(s) = hdr.to_str() { s.to_ascii_lowercase().contains("upgrade") } else { false } }) .unwrap_or(false) } #[inline] /// Get response body chunking state pub fn chunked(&self) -> bool { !self.flags.contains(Flags::NO_CHUNKING) } #[inline] pub fn no_chunking(&mut self, val: bool) { if val { self.flags.insert(Flags::NO_CHUNKING); } else { self.flags.remove(Flags::NO_CHUNKING); } } /// Request contains `EXPECT` header. #[inline] pub fn expect(&self) -> bool { self.flags.contains(Flags::EXPECT) } #[inline] pub(crate) fn set_expect(&mut self) { self.flags.insert(Flags::EXPECT); } } #[allow(clippy::large_enum_variant)] #[derive(Debug)] pub enum RequestHeadType { Owned(RequestHead), Rc(Rc<RequestHead>, Option<HeaderMap>), } impl RequestHeadType { pub fn extra_headers(&self) -> Option<&HeaderMap> { match self { RequestHeadType::Owned(_) => None, RequestHeadType::Rc(_, headers) => headers.as_ref(), } } } impl AsRef<RequestHead> for RequestHeadType { fn as_ref(&self) -> &RequestHead { match self { RequestHeadType::Owned(head) => head, RequestHeadType::Rc(head, _) => head.as_ref(), } } } impl From<RequestHead> for RequestHeadType { fn from(head: RequestHead) -> Self { RequestHeadType::Owned(head) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/requests/request.rs
actix-http/src/requests/request.rs
//! HTTP requests. use std::{ cell::{Ref, RefCell, RefMut}, fmt, mem, net, rc::Rc, str, }; use http::{header, Method, Uri, Version}; use crate::{ header::HeaderMap, BoxedPayloadStream, Extensions, HttpMessage, Message, Payload, RequestHead, }; /// An HTTP request. pub struct Request<P = BoxedPayloadStream> { pub(crate) payload: Payload<P>, pub(crate) head: Message<RequestHead>, pub(crate) conn_data: Option<Rc<Extensions>>, pub(crate) extensions: RefCell<Extensions>, } impl<P> HttpMessage for Request<P> { type Stream = P; #[inline] fn headers(&self) -> &HeaderMap { &self.head().headers } fn take_payload(&mut self) -> Payload<P> { mem::replace(&mut self.payload, Payload::None) } #[inline] fn extensions(&self) -> Ref<'_, Extensions> { self.extensions.borrow() } #[inline] fn extensions_mut(&self) -> RefMut<'_, Extensions> { self.extensions.borrow_mut() } } impl From<Message<RequestHead>> for Request<BoxedPayloadStream> { fn from(head: Message<RequestHead>) -> Self { Request { head, payload: Payload::None, extensions: RefCell::new(Extensions::default()), conn_data: None, } } } impl Request<BoxedPayloadStream> { /// Create new Request instance #[allow(clippy::new_without_default)] pub fn new() -> Request<BoxedPayloadStream> { Request { head: Message::new(), payload: Payload::None, extensions: RefCell::new(Extensions::default()), conn_data: None, } } } impl<P> Request<P> { /// Create new Request instance pub fn with_payload(payload: Payload<P>) -> Request<P> { Request { payload, head: Message::new(), extensions: RefCell::new(Extensions::default()), conn_data: None, } } /// Create new Request instance pub fn replace_payload<P1>(self, payload: Payload<P1>) -> (Request<P1>, Payload<P>) { let pl = self.payload; ( Request { payload, head: self.head, extensions: self.extensions, conn_data: self.conn_data, }, pl, ) } /// Get request's payload pub fn payload(&mut self) -> &mut Payload<P> { &mut self.payload } /// Get request's payload pub fn take_payload(&mut self) -> Payload<P> { mem::replace(&mut self.payload, Payload::None) } /// Split request into request head and payload pub fn into_parts(self) -> (Message<RequestHead>, Payload<P>) { (self.head, self.payload) } #[inline] /// Http message part of the request pub fn head(&self) -> &RequestHead { &self.head } #[inline] #[doc(hidden)] /// Mutable reference to a HTTP message part of the request pub fn head_mut(&mut self) -> &mut RequestHead { &mut self.head } /// Mutable reference to the message's headers. pub fn headers_mut(&mut self) -> &mut HeaderMap { &mut self.head.headers } /// Request's uri. #[inline] pub fn uri(&self) -> &Uri { &self.head().uri } /// Mutable reference to the request's uri. #[inline] pub fn uri_mut(&mut self) -> &mut Uri { &mut self.head.uri } /// Read the Request method. #[inline] pub fn method(&self) -> &Method { &self.head().method } /// Read the Request Version. #[inline] pub fn version(&self) -> Version { self.head().version } /// The target path of this Request. #[inline] pub fn path(&self) -> &str { self.head().uri.path() } /// Check if request requires connection upgrade #[inline] pub fn upgrade(&self) -> bool { if let Some(conn) = self.head().headers.get(header::CONNECTION) { if let Ok(s) = conn.to_str() { return s.to_lowercase().contains("upgrade"); } } self.head().method == Method::CONNECT } /// Peer socket address. /// /// Peer address is the directly connected peer's socket address. If a proxy is used in front of /// the Actix Web server, then it would be address of this proxy. /// /// Will only return None when called in unit tests unless set manually. #[inline] pub fn peer_addr(&self) -> Option<net::SocketAddr> { self.head().peer_addr } /// Returns a reference a piece of connection data set in an [on-connect] callback. /// /// ```ignore /// let opt_t = req.conn_data::<PeerCertificate>(); /// ``` /// /// [on-connect]: crate::HttpServiceBuilder::on_connect_ext pub fn conn_data<T: 'static>(&self) -> Option<&T> { self.conn_data .as_deref() .and_then(|container| container.get::<T>()) } /// Returns the connection-level data/extensions container if an [on-connect] callback was /// registered, leaving an empty one in its place. /// /// [on-connect]: crate::HttpServiceBuilder::on_connect_ext pub fn take_conn_data(&mut self) -> Option<Rc<Extensions>> { self.conn_data.take() } /// Returns the request-local data/extensions container, leaving an empty one in its place. pub fn take_req_data(&mut self) -> Extensions { mem::take(self.extensions.get_mut()) } } impl<P> fmt::Debug for Request<P> { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { writeln!( f, "\nRequest {:?} {}:{}", self.version(), self.method(), self.path() )?; if let Some(q) = self.uri().query().as_ref() { writeln!(f, " query: ?{:?}", q)?; } writeln!(f, " headers:")?; for (key, val) in self.headers().iter() { writeln!(f, " {:?}: {:?}", key, val)?; } Ok(()) } } #[cfg(test)] mod tests { use super::*; #[test] fn test_basics() { let msg = Message::new(); let mut req = Request::from(msg); req.headers_mut().insert( header::CONTENT_TYPE, header::HeaderValue::from_static("text/plain"), ); assert!(req.headers().contains_key(header::CONTENT_TYPE)); *req.uri_mut() = Uri::try_from("/index.html?q=1").unwrap(); assert_eq!(req.uri().path(), "/index.html"); assert_eq!(req.uri().query(), Some("q=1")); let s = format!("{:?}", req); assert!(s.contains("Request HTTP/1.1 GET:/index.html")); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/h2/dispatcher.rs
actix-http/src/h2/dispatcher.rs
use std::{ cmp, error::Error as StdError, future::Future, marker::PhantomData, net, pin::{pin, Pin}, rc::Rc, task::{Context, Poll}, }; use actix_codec::{AsyncRead, AsyncWrite}; use actix_rt::time::{sleep, Sleep}; use actix_service::Service; use actix_utils::future::poll_fn; use bytes::{Bytes, BytesMut}; use futures_core::ready; use h2::{ server::{Connection, SendResponse}, Ping, PingPong, }; use pin_project_lite::pin_project; use crate::{ body::{BodySize, BoxBody, MessageBody}, config::ServiceConfig, header::{ HeaderName, HeaderValue, CONNECTION, CONTENT_LENGTH, DATE, TRANSFER_ENCODING, UPGRADE, }, service::HttpFlow, Extensions, Method, OnConnectData, Payload, Request, Response, ResponseHead, }; const CHUNK_SIZE: usize = 16_384; pin_project! { /// Dispatcher for HTTP/2 protocol. pub struct Dispatcher<T, S, B, X, U> { flow: Rc<HttpFlow<S, X, U>>, connection: Connection<T, Bytes>, conn_data: Option<Rc<Extensions>>, config: ServiceConfig, peer_addr: Option<net::SocketAddr>, ping_pong: Option<H2PingPong>, _phantom: PhantomData<B> } } impl<T, S, B, X, U> Dispatcher<T, S, B, X, U> where T: AsyncRead + AsyncWrite + Unpin, { pub(crate) fn new( mut conn: Connection<T, Bytes>, flow: Rc<HttpFlow<S, X, U>>, config: ServiceConfig, peer_addr: Option<net::SocketAddr>, conn_data: OnConnectData, timer: Option<Pin<Box<Sleep>>>, ) -> Self { let ping_pong = config.keep_alive().duration().map(|dur| H2PingPong { timer: timer .map(|mut timer| { // reuse timer slot if it was initialized for handshake timer.as_mut().reset((config.now() + dur).into()); timer }) .unwrap_or_else(|| Box::pin(sleep(dur))), in_flight: false, ping_pong: conn.ping_pong().unwrap(), }); Self { flow, config, peer_addr, connection: conn, conn_data: conn_data.0.map(Rc::new), ping_pong, _phantom: PhantomData, } } } struct H2PingPong { /// Handle to send ping frames from the peer. ping_pong: PingPong, /// True when a ping has been sent and is waiting for a reply. in_flight: bool, /// Timeout for pong response. timer: Pin<Box<Sleep>>, } impl<T, S, B, X, U> Future for Dispatcher<T, S, B, X, U> where T: AsyncRead + AsyncWrite + Unpin, S: Service<Request>, S::Error: Into<Response<BoxBody>>, S::Future: 'static, S::Response: Into<Response<B>>, B: MessageBody, { type Output = Result<(), crate::error::DispatchError>; #[inline] fn poll(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Self::Output> { let this = self.get_mut(); loop { match Pin::new(&mut this.connection).poll_accept(cx)? { Poll::Ready(Some((req, tx))) => { let (parts, body) = req.into_parts(); let payload = crate::h2::Payload::new(body); let pl = Payload::H2 { payload }; let mut req = Request::with_payload(pl); let head_req = parts.method == Method::HEAD; let head = req.head_mut(); head.uri = parts.uri; head.method = parts.method; head.version = parts.version; head.headers = parts.headers.into(); head.peer_addr = this.peer_addr; req.conn_data.clone_from(&this.conn_data); let fut = this.flow.service.call(req); let config = this.config.clone(); // multiplex request handling with spawn task actix_rt::spawn(async move { // resolve service call and send response. let res = match fut.await { Ok(res) => handle_response(res.into(), tx, config, head_req).await, Err(err) => { let res: Response<BoxBody> = err.into(); handle_response(res, tx, config, head_req).await } }; // log error. if let Err(err) = res { match err { DispatchError::SendResponse(err) => { tracing::trace!("Error sending response: {err:?}"); } DispatchError::SendData(err) => { tracing::warn!("Send data error: {err:?}"); } DispatchError::ResponseBody(err) => { tracing::error!("Response payload stream error: {err:?}"); } } } }); } Poll::Ready(None) => return Poll::Ready(Ok(())), Poll::Pending => match this.ping_pong.as_mut() { Some(ping_pong) => loop { if ping_pong.in_flight { // When there is an in-flight ping-pong, poll pong and and keep-alive // timer. On successful pong received, update keep-alive timer to // determine the next timing of ping pong. match ping_pong.ping_pong.poll_pong(cx)? { Poll::Ready(_) => { ping_pong.in_flight = false; let dead_line = this.config.keep_alive_deadline().unwrap(); ping_pong.timer.as_mut().reset(dead_line.into()); } Poll::Pending => { return ping_pong.timer.as_mut().poll(cx).map(|_| Ok(())); } } } else { // When there is no in-flight ping-pong, keep-alive timer is used to // wait for next timing of ping-pong. Therefore, at this point it serves // as an interval instead. ready!(ping_pong.timer.as_mut().poll(cx)); ping_pong.ping_pong.send_ping(Ping::opaque())?; let dead_line = this.config.keep_alive_deadline().unwrap(); ping_pong.timer.as_mut().reset(dead_line.into()); ping_pong.in_flight = true; } }, None => return Poll::Pending, }, } } } } enum DispatchError { SendResponse(h2::Error), SendData(h2::Error), ResponseBody(Box<dyn StdError>), } async fn handle_response<B>( res: Response<B>, mut tx: SendResponse<Bytes>, config: ServiceConfig, head_req: bool, ) -> Result<(), DispatchError> where B: MessageBody, { let (res, body) = res.replace_body(()); // prepare response. let mut size = body.size(); let res = prepare_response(config, res.head(), &mut size); let eof_or_head = size.is_eof() || head_req; // send response head and return on eof. let mut stream = tx .send_response(res, eof_or_head) .map_err(DispatchError::SendResponse)?; if eof_or_head { return Ok(()); } let mut body = pin!(body); // poll response body and send chunks to client while let Some(res) = poll_fn(|cx| body.as_mut().poll_next(cx)).await { let mut chunk = res.map_err(|err| DispatchError::ResponseBody(err.into()))?; 'send: loop { let chunk_size = cmp::min(chunk.len(), CHUNK_SIZE); // reserve enough space and wait for stream ready. stream.reserve_capacity(chunk_size); match poll_fn(|cx| stream.poll_capacity(cx)).await { // No capacity left. drop body and return. None => return Ok(()), Some(Err(err)) => return Err(DispatchError::SendData(err)), Some(Ok(cap)) => { // split chunk to writeable size and send to client let len = chunk.len(); let bytes = chunk.split_to(cmp::min(len, cap)); stream .send_data(bytes, false) .map_err(DispatchError::SendData)?; // Current chuck completely sent. break send loop and poll next one. if chunk.is_empty() { break 'send; } } } } } // response body streaming finished. send end of stream and return. stream .send_data(Bytes::new(), true) .map_err(DispatchError::SendData)?; Ok(()) } fn prepare_response( config: ServiceConfig, head: &ResponseHead, size: &mut BodySize, ) -> http::Response<()> { let mut has_date = false; let mut skip_len = size != &BodySize::Stream; let mut res = http::Response::new(()); *res.status_mut() = head.status; *res.version_mut() = http::Version::HTTP_2; // Content length match head.status { http::StatusCode::NO_CONTENT | http::StatusCode::CONTINUE | http::StatusCode::PROCESSING => *size = BodySize::None, http::StatusCode::SWITCHING_PROTOCOLS => { skip_len = true; *size = BodySize::Stream; } _ => {} } match size { BodySize::None | BodySize::Stream => {} BodySize::Sized(0) => { #[allow(clippy::declare_interior_mutable_const)] const HV_ZERO: HeaderValue = HeaderValue::from_static("0"); res.headers_mut().insert(CONTENT_LENGTH, HV_ZERO); } BodySize::Sized(len) => { let mut buf = itoa::Buffer::new(); res.headers_mut().insert( CONTENT_LENGTH, HeaderValue::from_str(buf.format(*len)).unwrap(), ); } }; // copy headers for (key, value) in head.headers.iter() { match key { // omit HTTP/1.x only headers according to: // https://datatracker.ietf.org/doc/html/rfc7540#section-8.1.2.2 &CONNECTION | &TRANSFER_ENCODING | &UPGRADE => continue, &CONTENT_LENGTH if skip_len => continue, &DATE => has_date = true, // omit HTTP/1.x only headers according to: // https://datatracker.ietf.org/doc/html/rfc7540#section-8.1.2.2 hdr if hdr == HeaderName::from_static("keep-alive") || hdr == HeaderName::from_static("proxy-connection") => { continue } _ => {} } res.headers_mut().append(key, value.clone()); } // set date header if !has_date { let mut bytes = BytesMut::with_capacity(29); config.write_date_header_value(&mut bytes); res.headers_mut().insert( DATE, // SAFETY: serialized date-times are known ASCII strings unsafe { HeaderValue::from_maybe_shared_unchecked(bytes.freeze()) }, ); } res }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/h2/service.rs
actix-http/src/h2/service.rs
use std::{ future::Future, marker::PhantomData, mem, net, pin::Pin, rc::Rc, task::{Context, Poll}, }; use actix_codec::{AsyncRead, AsyncWrite}; use actix_rt::net::TcpStream; use actix_service::{ fn_factory, fn_service, IntoServiceFactory, Service, ServiceFactory, ServiceFactoryExt as _, }; use actix_utils::future::ready; use futures_core::{future::LocalBoxFuture, ready}; use tracing::{error, trace}; use super::{dispatcher::Dispatcher, handshake_with_timeout, HandshakeWithTimeout}; use crate::{ body::{BoxBody, MessageBody}, config::ServiceConfig, error::DispatchError, service::HttpFlow, ConnectCallback, OnConnectData, Request, Response, }; /// `ServiceFactory` implementation for HTTP/2 transport pub struct H2Service<T, S, B> { srv: S, cfg: ServiceConfig, on_connect_ext: Option<Rc<ConnectCallback<T>>>, _phantom: PhantomData<(T, B)>, } impl<T, S, B> H2Service<T, S, B> where S: ServiceFactory<Request, Config = ()>, S::Error: Into<Response<BoxBody>> + 'static, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, { /// Create new `H2Service` instance with config. pub(crate) fn with_config<F: IntoServiceFactory<S, Request>>( cfg: ServiceConfig, service: F, ) -> Self { H2Service { cfg, on_connect_ext: None, srv: service.into_factory(), _phantom: PhantomData, } } /// Set on connect callback. pub(crate) fn on_connect_ext(mut self, f: Option<Rc<ConnectCallback<T>>>) -> Self { self.on_connect_ext = f; self } } impl<S, B> H2Service<TcpStream, S, B> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, { /// Create plain TCP based service pub fn tcp( self, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = DispatchError, InitError = S::InitError, > { fn_factory(|| { ready(Ok::<_, S::InitError>(fn_service(|io: TcpStream| { let peer_addr = io.peer_addr().ok(); ready(Ok::<_, DispatchError>((io, peer_addr))) }))) }) .and_then(self) } } #[cfg(feature = "openssl")] mod openssl { use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ openssl::{ reexports::{Error as SslError, SslAcceptor}, Acceptor, TlsStream, }, TlsError, }; use super::*; impl<S, B> H2Service<TlsStream<TcpStream>, S, B> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, { /// Create OpenSSL based service. pub fn openssl( self, acceptor: SslAcceptor, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<SslError, DispatchError>, InitError = S::InitError, > { Acceptor::new(acceptor) .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .map(|io: TlsStream<TcpStream>| { let peer_addr = io.get_ref().peer_addr().ok(); (io, peer_addr) }) .and_then(self.map_err(TlsError::Service)) } } } #[cfg(feature = "rustls-0_20")] mod rustls_0_20 { use std::io; use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ rustls::{reexports::ServerConfig, Acceptor, TlsStream}, TlsError, }; use super::*; impl<S, B> H2Service<TlsStream<TcpStream>, S, B> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, { /// Create Rustls v0.20 based service. pub fn rustls( self, mut config: ServerConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = S::InitError, > { let mut protos = vec![b"h2".to_vec()]; protos.extend_from_slice(&config.alpn_protocols); config.alpn_protocols = protos; Acceptor::new(config) .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .map(|io: TlsStream<TcpStream>| { let peer_addr = io.get_ref().0.peer_addr().ok(); (io, peer_addr) }) .and_then(self.map_err(TlsError::Service)) } } } #[cfg(feature = "rustls-0_21")] mod rustls_0_21 { use std::io; use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ rustls_0_21::{reexports::ServerConfig, Acceptor, TlsStream}, TlsError, }; use super::*; impl<S, B> H2Service<TlsStream<TcpStream>, S, B> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, { /// Create Rustls v0.21 based service. pub fn rustls_021( self, mut config: ServerConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = S::InitError, > { let mut protos = vec![b"h2".to_vec()]; protos.extend_from_slice(&config.alpn_protocols); config.alpn_protocols = protos; Acceptor::new(config) .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .map(|io: TlsStream<TcpStream>| { let peer_addr = io.get_ref().0.peer_addr().ok(); (io, peer_addr) }) .and_then(self.map_err(TlsError::Service)) } } } #[cfg(feature = "rustls-0_22")] mod rustls_0_22 { use std::io; use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ rustls_0_22::{reexports::ServerConfig, Acceptor, TlsStream}, TlsError, }; use super::*; impl<S, B> H2Service<TlsStream<TcpStream>, S, B> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, { /// Create Rustls v0.22 based service. pub fn rustls_0_22( self, mut config: ServerConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = S::InitError, > { let mut protos = vec![b"h2".to_vec()]; protos.extend_from_slice(&config.alpn_protocols); config.alpn_protocols = protos; Acceptor::new(config) .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .map(|io: TlsStream<TcpStream>| { let peer_addr = io.get_ref().0.peer_addr().ok(); (io, peer_addr) }) .and_then(self.map_err(TlsError::Service)) } } } #[cfg(feature = "rustls-0_23")] mod rustls_0_23 { use std::io; use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ rustls_0_23::{reexports::ServerConfig, Acceptor, TlsStream}, TlsError, }; use super::*; impl<S, B> H2Service<TlsStream<TcpStream>, S, B> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, { /// Create Rustls v0.23 based service. pub fn rustls_0_23( self, mut config: ServerConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = S::InitError, > { let mut protos = vec![b"h2".to_vec()]; protos.extend_from_slice(&config.alpn_protocols); config.alpn_protocols = protos; Acceptor::new(config) .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .map(|io: TlsStream<TcpStream>| { let peer_addr = io.get_ref().0.peer_addr().ok(); (io, peer_addr) }) .and_then(self.map_err(TlsError::Service)) } } } impl<T, S, B> ServiceFactory<(T, Option<net::SocketAddr>)> for H2Service<T, S, B> where T: AsyncRead + AsyncWrite + Unpin + 'static, S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>> + 'static, S::Response: Into<Response<B>> + 'static, <S::Service as Service<Request>>::Future: 'static, B: MessageBody + 'static, { type Response = (); type Error = DispatchError; type Config = (); type Service = H2ServiceHandler<T, S::Service, B>; type InitError = S::InitError; type Future = LocalBoxFuture<'static, Result<Self::Service, Self::InitError>>; fn new_service(&self, _: ()) -> Self::Future { let service = self.srv.new_service(()); let cfg = self.cfg.clone(); let on_connect_ext = self.on_connect_ext.clone(); Box::pin(async move { let service = service.await?; Ok(H2ServiceHandler::new(cfg, on_connect_ext, service)) }) } } /// `Service` implementation for HTTP/2 transport pub struct H2ServiceHandler<T, S, B> where S: Service<Request>, { flow: Rc<HttpFlow<S, (), ()>>, cfg: ServiceConfig, on_connect_ext: Option<Rc<ConnectCallback<T>>>, _phantom: PhantomData<B>, } impl<T, S, B> H2ServiceHandler<T, S, B> where S: Service<Request>, S::Error: Into<Response<BoxBody>> + 'static, S::Future: 'static, S::Response: Into<Response<B>> + 'static, B: MessageBody + 'static, { fn new( cfg: ServiceConfig, on_connect_ext: Option<Rc<ConnectCallback<T>>>, service: S, ) -> H2ServiceHandler<T, S, B> { H2ServiceHandler { flow: HttpFlow::new(service, (), None), cfg, on_connect_ext, _phantom: PhantomData, } } } impl<T, S, B> Service<(T, Option<net::SocketAddr>)> for H2ServiceHandler<T, S, B> where T: AsyncRead + AsyncWrite + Unpin, S: Service<Request>, S::Error: Into<Response<BoxBody>> + 'static, S::Future: 'static, S::Response: Into<Response<B>> + 'static, B: MessageBody + 'static, { type Response = (); type Error = DispatchError; type Future = H2ServiceHandlerResponse<T, S, B>; fn poll_ready(&self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> { self.flow.service.poll_ready(cx).map_err(|err| { let err = err.into(); error!("Service readiness error: {:?}", err); DispatchError::Service(err) }) } fn call(&self, (io, addr): (T, Option<net::SocketAddr>)) -> Self::Future { let on_connect_data = OnConnectData::from_io(&io, self.on_connect_ext.as_deref()); H2ServiceHandlerResponse { state: State::Handshake( Some(Rc::clone(&self.flow)), Some(self.cfg.clone()), addr, on_connect_data, handshake_with_timeout(io, &self.cfg), ), } } } enum State<T, S: Service<Request>, B: MessageBody> where T: AsyncRead + AsyncWrite + Unpin, S::Future: 'static, { Handshake( Option<Rc<HttpFlow<S, (), ()>>>, Option<ServiceConfig>, Option<net::SocketAddr>, OnConnectData, HandshakeWithTimeout<T>, ), Established(Dispatcher<T, S, B, (), ()>), } pub struct H2ServiceHandlerResponse<T, S, B> where T: AsyncRead + AsyncWrite + Unpin, S: Service<Request>, S::Error: Into<Response<BoxBody>> + 'static, S::Future: 'static, S::Response: Into<Response<B>> + 'static, B: MessageBody + 'static, { state: State<T, S, B>, } impl<T, S, B> Future for H2ServiceHandlerResponse<T, S, B> where T: AsyncRead + AsyncWrite + Unpin, S: Service<Request>, S::Error: Into<Response<BoxBody>> + 'static, S::Future: 'static, S::Response: Into<Response<B>> + 'static, B: MessageBody, { type Output = Result<(), DispatchError>; fn poll(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Self::Output> { match self.state { State::Handshake( ref mut srv, ref mut config, ref peer_addr, ref mut conn_data, ref mut handshake, ) => match ready!(Pin::new(handshake).poll(cx)) { Ok((conn, timer)) => { let on_connect_data = mem::take(conn_data); self.state = State::Established(Dispatcher::new( conn, srv.take().unwrap(), config.take().unwrap(), *peer_addr, on_connect_data, timer, )); self.poll(cx) } Err(err) => { trace!("H2 handshake error: {}", err); Poll::Ready(Err(err)) } }, State::Established(ref mut disp) => Pin::new(disp).poll(cx), } } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/h2/mod.rs
actix-http/src/h2/mod.rs
//! HTTP/2 protocol. use std::{ future::Future, pin::Pin, task::{Context, Poll}, }; use actix_codec::{AsyncRead, AsyncWrite}; use actix_rt::time::{sleep_until, Sleep}; use bytes::Bytes; use futures_core::{ready, Stream}; use h2::{ server::{handshake, Connection, Handshake}, RecvStream, }; use crate::{ config::ServiceConfig, error::{DispatchError, PayloadError}, }; mod dispatcher; mod service; pub use self::{dispatcher::Dispatcher, service::H2Service}; /// HTTP/2 peer stream. pub struct Payload { stream: RecvStream, } impl Payload { pub(crate) fn new(stream: RecvStream) -> Self { Self { stream } } } impl Stream for Payload { type Item = Result<Bytes, PayloadError>; fn poll_next(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Option<Self::Item>> { let this = self.get_mut(); match ready!(Pin::new(&mut this.stream).poll_data(cx)) { Some(Ok(chunk)) => { let len = chunk.len(); match this.stream.flow_control().release_capacity(len) { Ok(()) => Poll::Ready(Some(Ok(chunk))), Err(err) => Poll::Ready(Some(Err(err.into()))), } } Some(Err(err)) => Poll::Ready(Some(Err(err.into()))), None => Poll::Ready(None), } } } pub(crate) fn handshake_with_timeout<T>(io: T, config: &ServiceConfig) -> HandshakeWithTimeout<T> where T: AsyncRead + AsyncWrite + Unpin, { HandshakeWithTimeout { handshake: handshake(io), timer: config .client_request_deadline() .map(|deadline| Box::pin(sleep_until(deadline.into()))), } } pub(crate) struct HandshakeWithTimeout<T: AsyncRead + AsyncWrite + Unpin> { handshake: Handshake<T>, timer: Option<Pin<Box<Sleep>>>, } impl<T> Future for HandshakeWithTimeout<T> where T: AsyncRead + AsyncWrite + Unpin, { type Output = Result<(Connection<T, Bytes>, Option<Pin<Box<Sleep>>>), DispatchError>; fn poll(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Self::Output> { let this = self.get_mut(); match Pin::new(&mut this.handshake).poll(cx)? { // return the timer on success handshake; its slot can be re-used for h2 ping-pong Poll::Ready(conn) => Poll::Ready(Ok((conn, this.timer.take()))), Poll::Pending => match this.timer.as_mut() { Some(timer) => { ready!(timer.as_mut().poll(cx)); Poll::Ready(Err(DispatchError::SlowRequestTimeout)) } None => Poll::Pending, }, } } } #[cfg(test)] mod tests { use static_assertions::assert_impl_all; use super::*; assert_impl_all!(Payload: Unpin, Send, Sync); }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/ws/codec.rs
actix-http/src/ws/codec.rs
use bitflags::bitflags; use bytes::{Bytes, BytesMut}; use bytestring::ByteString; use tokio_util::codec::{Decoder, Encoder}; use tracing::error; use super::{ frame::Parser, proto::{CloseReason, OpCode}, ProtocolError, }; /// A WebSocket message. #[derive(Debug, PartialEq, Eq)] pub enum Message { /// Text message. Text(ByteString), /// Binary message. Binary(Bytes), /// Continuation. Continuation(Item), /// Ping message. Ping(Bytes), /// Pong message. Pong(Bytes), /// Close message with optional reason. Close(Option<CloseReason>), /// No-op. Useful for low-level services. Nop, } /// A WebSocket frame. #[derive(Debug, PartialEq, Eq)] pub enum Frame { /// Text frame. Note that the codec does not validate UTF-8 encoding. Text(Bytes), /// Binary frame. Binary(Bytes), /// Continuation. Continuation(Item), /// Ping message. Ping(Bytes), /// Pong message. Pong(Bytes), /// Close message with optional reason. Close(Option<CloseReason>), } /// A WebSocket continuation item. #[derive(Debug, PartialEq, Eq)] pub enum Item { FirstText(Bytes), FirstBinary(Bytes), Continue(Bytes), Last(Bytes), } /// WebSocket protocol codec. #[derive(Debug, Clone)] pub struct Codec { flags: Flags, max_size: usize, } bitflags! { #[derive(Debug, Clone, Copy)] struct Flags: u8 { const SERVER = 0b0000_0001; const CONTINUATION = 0b0000_0010; const W_CONTINUATION = 0b0000_0100; } } impl Codec { /// Create new WebSocket frames decoder. pub const fn new() -> Codec { Codec { max_size: 65_536, flags: Flags::SERVER, } } /// Set max frame size. /// /// By default max size is set to 64KiB. #[must_use = "This returns the a new Codec, without modifying the original."] pub fn max_size(mut self, size: usize) -> Self { self.max_size = size; self } /// Set decoder to client mode. /// /// By default decoder works in server mode. #[must_use = "This returns the a new Codec, without modifying the original."] pub fn client_mode(mut self) -> Self { self.flags.remove(Flags::SERVER); self } } impl Default for Codec { fn default() -> Self { Self::new() } } impl Encoder<Message> for Codec { type Error = ProtocolError; fn encode(&mut self, item: Message, dst: &mut BytesMut) -> Result<(), Self::Error> { match item { Message::Text(txt) => Parser::write_message( dst, txt, OpCode::Text, true, !self.flags.contains(Flags::SERVER), ), Message::Binary(bin) => Parser::write_message( dst, bin, OpCode::Binary, true, !self.flags.contains(Flags::SERVER), ), Message::Ping(txt) => Parser::write_message( dst, txt, OpCode::Ping, true, !self.flags.contains(Flags::SERVER), ), Message::Pong(txt) => Parser::write_message( dst, txt, OpCode::Pong, true, !self.flags.contains(Flags::SERVER), ), Message::Close(reason) => { Parser::write_close(dst, reason, !self.flags.contains(Flags::SERVER)) } Message::Continuation(cont) => match cont { Item::FirstText(data) => { if self.flags.contains(Flags::W_CONTINUATION) { return Err(ProtocolError::ContinuationStarted); } else { self.flags.insert(Flags::W_CONTINUATION); Parser::write_message( dst, &data[..], OpCode::Text, false, !self.flags.contains(Flags::SERVER), ) } } Item::FirstBinary(data) => { if self.flags.contains(Flags::W_CONTINUATION) { return Err(ProtocolError::ContinuationStarted); } else { self.flags.insert(Flags::W_CONTINUATION); Parser::write_message( dst, &data[..], OpCode::Binary, false, !self.flags.contains(Flags::SERVER), ) } } Item::Continue(data) => { if self.flags.contains(Flags::W_CONTINUATION) { Parser::write_message( dst, &data[..], OpCode::Continue, false, !self.flags.contains(Flags::SERVER), ) } else { return Err(ProtocolError::ContinuationNotStarted); } } Item::Last(data) => { if self.flags.contains(Flags::W_CONTINUATION) { self.flags.remove(Flags::W_CONTINUATION); Parser::write_message( dst, &data[..], OpCode::Continue, true, !self.flags.contains(Flags::SERVER), ) } else { return Err(ProtocolError::ContinuationNotStarted); } } }, Message::Nop => {} } Ok(()) } } impl Decoder for Codec { type Item = Frame; type Error = ProtocolError; fn decode(&mut self, src: &mut BytesMut) -> Result<Option<Self::Item>, Self::Error> { match Parser::parse(src, self.flags.contains(Flags::SERVER), self.max_size) { Ok(Some((finished, opcode, payload))) => { // continuation is not supported if !finished { return match opcode { OpCode::Continue => { if self.flags.contains(Flags::CONTINUATION) { Ok(Some(Frame::Continuation(Item::Continue( payload.map(|pl| pl.freeze()).unwrap_or_else(Bytes::new), )))) } else { Err(ProtocolError::ContinuationNotStarted) } } OpCode::Binary => { if !self.flags.contains(Flags::CONTINUATION) { self.flags.insert(Flags::CONTINUATION); Ok(Some(Frame::Continuation(Item::FirstBinary( payload.map(|pl| pl.freeze()).unwrap_or_else(Bytes::new), )))) } else { Err(ProtocolError::ContinuationStarted) } } OpCode::Text => { if !self.flags.contains(Flags::CONTINUATION) { self.flags.insert(Flags::CONTINUATION); Ok(Some(Frame::Continuation(Item::FirstText( payload.map(|pl| pl.freeze()).unwrap_or_else(Bytes::new), )))) } else { Err(ProtocolError::ContinuationStarted) } } _ => { error!("Unfinished fragment {:?}", opcode); Err(ProtocolError::ContinuationFragment(opcode)) } }; } match opcode { OpCode::Continue => { if self.flags.contains(Flags::CONTINUATION) { self.flags.remove(Flags::CONTINUATION); Ok(Some(Frame::Continuation(Item::Last( payload.map(|pl| pl.freeze()).unwrap_or_else(Bytes::new), )))) } else { Err(ProtocolError::ContinuationNotStarted) } } OpCode::Bad => Err(ProtocolError::BadOpCode), OpCode::Close => { if let Some(ref pl) = payload { let close_reason = Parser::parse_close_payload(pl); Ok(Some(Frame::Close(close_reason))) } else { Ok(Some(Frame::Close(None))) } } OpCode::Ping => Ok(Some(Frame::Ping( payload.map(|pl| pl.freeze()).unwrap_or_else(Bytes::new), ))), OpCode::Pong => Ok(Some(Frame::Pong( payload.map(|pl| pl.freeze()).unwrap_or_else(Bytes::new), ))), OpCode::Binary => Ok(Some(Frame::Binary( payload.map(|pl| pl.freeze()).unwrap_or_else(Bytes::new), ))), OpCode::Text => Ok(Some(Frame::Text( payload.map(|pl| pl.freeze()).unwrap_or_else(Bytes::new), ))), } } Ok(None) => Ok(None), Err(err) => Err(err), } } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/ws/dispatcher.rs
actix-http/src/ws/dispatcher.rs
use std::{ future::Future, pin::Pin, task::{Context, Poll}, }; use actix_codec::{AsyncRead, AsyncWrite, Framed}; use actix_service::{IntoService, Service}; use pin_project_lite::pin_project; use super::{Codec, Frame, Message}; pin_project! { pub struct Dispatcher<S, T> where S: Service<Frame, Response = Message>, S: 'static, T: AsyncRead, T: AsyncWrite, { #[pin] inner: inner::Dispatcher<S, T, Codec, Message>, } } impl<S, T> Dispatcher<S, T> where T: AsyncRead + AsyncWrite, S: Service<Frame, Response = Message>, S::Future: 'static, S::Error: 'static, { pub fn new<F: IntoService<S, Frame>>(io: T, service: F) -> Self { Dispatcher { inner: inner::Dispatcher::new(Framed::new(io, Codec::new()), service), } } pub fn with<F: IntoService<S, Frame>>(framed: Framed<T, Codec>, service: F) -> Self { Dispatcher { inner: inner::Dispatcher::new(framed, service), } } } impl<S, T> Future for Dispatcher<S, T> where T: AsyncRead + AsyncWrite, S: Service<Frame, Response = Message>, S::Future: 'static, S::Error: 'static, { type Output = Result<(), inner::DispatcherError<S::Error, Codec, Message>>; fn poll(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Self::Output> { self.project().inner.poll(cx) } } /// Framed dispatcher service and related utilities. mod inner { // allow dead code since this mod was ripped from actix-utils #![allow(dead_code)] use core::{ fmt, future::Future, mem, pin::Pin, task::{Context, Poll}, }; use actix_codec::Framed; use actix_service::{IntoService, Service}; use futures_core::stream::Stream; use local_channel::mpsc; use pin_project_lite::pin_project; use tokio::io::{AsyncRead, AsyncWrite}; use tokio_util::codec::{Decoder, Encoder}; use tracing::debug; use crate::{body::BoxBody, Response}; /// Framed transport errors pub enum DispatcherError<E, U, I> where U: Encoder<I> + Decoder, { /// Inner service error. Service(E), /// Frame encoding error. Encoder(<U as Encoder<I>>::Error), /// Frame decoding error. Decoder(<U as Decoder>::Error), } impl<E, U, I> From<E> for DispatcherError<E, U, I> where U: Encoder<I> + Decoder, { fn from(err: E) -> Self { DispatcherError::Service(err) } } impl<E, U, I> fmt::Debug for DispatcherError<E, U, I> where E: fmt::Debug, U: Encoder<I> + Decoder, <U as Encoder<I>>::Error: fmt::Debug, <U as Decoder>::Error: fmt::Debug, { fn fmt(&self, fmt: &mut fmt::Formatter<'_>) -> fmt::Result { match *self { DispatcherError::Service(ref err) => { write!(fmt, "DispatcherError::Service({err:?})") } DispatcherError::Encoder(ref err) => { write!(fmt, "DispatcherError::Encoder({err:?})") } DispatcherError::Decoder(ref err) => { write!(fmt, "DispatcherError::Decoder({err:?})") } } } } impl<E, U, I> fmt::Display for DispatcherError<E, U, I> where E: fmt::Display, U: Encoder<I> + Decoder, <U as Encoder<I>>::Error: fmt::Debug, <U as Decoder>::Error: fmt::Debug, { fn fmt(&self, fmt: &mut fmt::Formatter<'_>) -> fmt::Result { match *self { DispatcherError::Service(ref err) => write!(fmt, "{err}"), DispatcherError::Encoder(ref err) => write!(fmt, "{err:?}"), DispatcherError::Decoder(ref err) => write!(fmt, "{err:?}"), } } } impl<E, U, I> From<DispatcherError<E, U, I>> for Response<BoxBody> where E: fmt::Debug + fmt::Display, U: Encoder<I> + Decoder, <U as Encoder<I>>::Error: fmt::Debug, <U as Decoder>::Error: fmt::Debug, { fn from(err: DispatcherError<E, U, I>) -> Self { Response::internal_server_error().set_body(BoxBody::new(err.to_string())) } } /// Message type wrapper for signalling end of message stream. pub enum Message<T> { /// Message item. Item(T), /// Signal from service to flush all messages and stop processing. Close, } pin_project! { /// A future that reads frames from a [`Framed`] object and passes them to a [`Service`]. pub struct Dispatcher<S, T, U, I> where S: Service<<U as Decoder>::Item, Response = I>, S::Error: 'static, S::Future: 'static, T: AsyncRead, T: AsyncWrite, U: Encoder<I>, U: Decoder, I: 'static, <U as Encoder<I>>::Error: fmt::Debug, { service: S, state: State<S, U, I>, #[pin] framed: Framed<T, U>, rx: mpsc::Receiver<Result<Message<I>, S::Error>>, tx: mpsc::Sender<Result<Message<I>, S::Error>>, } } enum State<S, U, I> where S: Service<<U as Decoder>::Item>, U: Encoder<I> + Decoder, { Processing, Error(DispatcherError<S::Error, U, I>), FramedError(DispatcherError<S::Error, U, I>), FlushAndStop, Stopping, } impl<S, U, I> State<S, U, I> where S: Service<<U as Decoder>::Item>, U: Encoder<I> + Decoder, { fn take_error(&mut self) -> DispatcherError<S::Error, U, I> { match mem::replace(self, State::Processing) { State::Error(err) => err, _ => panic!(), } } fn take_framed_error(&mut self) -> DispatcherError<S::Error, U, I> { match mem::replace(self, State::Processing) { State::FramedError(err) => err, _ => panic!(), } } } impl<S, T, U, I> Dispatcher<S, T, U, I> where S: Service<<U as Decoder>::Item, Response = I>, S::Error: 'static, S::Future: 'static, T: AsyncRead + AsyncWrite, U: Decoder + Encoder<I>, I: 'static, <U as Decoder>::Error: fmt::Debug, <U as Encoder<I>>::Error: fmt::Debug, { /// Create new `Dispatcher`. pub fn new<F>(framed: Framed<T, U>, service: F) -> Self where F: IntoService<S, <U as Decoder>::Item>, { let (tx, rx) = mpsc::channel(); Dispatcher { framed, rx, tx, service: service.into_service(), state: State::Processing, } } /// Construct new `Dispatcher` instance with customer `mpsc::Receiver` pub fn with_rx<F>( framed: Framed<T, U>, service: F, rx: mpsc::Receiver<Result<Message<I>, S::Error>>, ) -> Self where F: IntoService<S, <U as Decoder>::Item>, { let tx = rx.sender(); Dispatcher { framed, rx, tx, service: service.into_service(), state: State::Processing, } } /// Get sender handle. pub fn tx(&self) -> mpsc::Sender<Result<Message<I>, S::Error>> { self.tx.clone() } /// Get reference to a service wrapped by `Dispatcher` instance. pub fn service(&self) -> &S { &self.service } /// Get mutable reference to a service wrapped by `Dispatcher` instance. pub fn service_mut(&mut self) -> &mut S { &mut self.service } /// Get reference to a framed instance wrapped by `Dispatcher` instance. pub fn framed(&self) -> &Framed<T, U> { &self.framed } /// Get mutable reference to a framed instance wrapped by `Dispatcher` instance. pub fn framed_mut(&mut self) -> &mut Framed<T, U> { &mut self.framed } /// Read from framed object. fn poll_read(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> bool where S: Service<<U as Decoder>::Item, Response = I>, S::Error: 'static, S::Future: 'static, T: AsyncRead + AsyncWrite, U: Decoder + Encoder<I>, I: 'static, <U as Encoder<I>>::Error: fmt::Debug, { loop { let this = self.as_mut().project(); match this.service.poll_ready(cx) { Poll::Ready(Ok(_)) => { let item = match this.framed.next_item(cx) { Poll::Ready(Some(Ok(el))) => el, Poll::Ready(Some(Err(err))) => { *this.state = State::FramedError(DispatcherError::Decoder(err)); return true; } Poll::Pending => return false, Poll::Ready(None) => { *this.state = State::Stopping; return true; } }; let tx = this.tx.clone(); let fut = this.service.call(item); actix_rt::spawn(async move { let item = fut.await; let _ = tx.send(item.map(Message::Item)); }); } Poll::Pending => return false, Poll::Ready(Err(err)) => { *this.state = State::Error(DispatcherError::Service(err)); return true; } } } } /// Write to framed object. fn poll_write(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> bool where S: Service<<U as Decoder>::Item, Response = I>, S::Error: 'static, S::Future: 'static, T: AsyncRead + AsyncWrite, U: Decoder + Encoder<I>, I: 'static, <U as Encoder<I>>::Error: fmt::Debug, { loop { let mut this = self.as_mut().project(); while !this.framed.is_write_buf_full() { match Pin::new(&mut this.rx).poll_next(cx) { Poll::Ready(Some(Ok(Message::Item(msg)))) => { if let Err(err) = this.framed.as_mut().write(msg) { *this.state = State::FramedError(DispatcherError::Encoder(err)); return true; } } Poll::Ready(Some(Ok(Message::Close))) => { *this.state = State::FlushAndStop; return true; } Poll::Ready(Some(Err(err))) => { *this.state = State::Error(DispatcherError::Service(err)); return true; } Poll::Ready(None) | Poll::Pending => break, } } if !this.framed.is_write_buf_empty() { match this.framed.flush(cx) { Poll::Pending => break, Poll::Ready(Ok(_)) => {} Poll::Ready(Err(err)) => { debug!("Error sending data: {:?}", err); *this.state = State::FramedError(DispatcherError::Encoder(err)); return true; } } } else { break; } } false } } impl<S, T, U, I> Future for Dispatcher<S, T, U, I> where S: Service<<U as Decoder>::Item, Response = I>, S::Error: 'static, S::Future: 'static, T: AsyncRead + AsyncWrite, U: Decoder + Encoder<I>, I: 'static, <U as Encoder<I>>::Error: fmt::Debug, <U as Decoder>::Error: fmt::Debug, { type Output = Result<(), DispatcherError<S::Error, U, I>>; fn poll(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Self::Output> { loop { let this = self.as_mut().project(); return match this.state { State::Processing => { if self.as_mut().poll_read(cx) || self.as_mut().poll_write(cx) { continue; } else { Poll::Pending } } State::Error(_) => { // flush write buffer if !this.framed.is_write_buf_empty() && this.framed.flush(cx).is_pending() { return Poll::Pending; } Poll::Ready(Err(this.state.take_error())) } State::FlushAndStop => { if !this.framed.is_write_buf_empty() { this.framed.flush(cx).map(|res| { if let Err(err) = res { debug!("Error sending data: {:?}", err); } Ok(()) }) } else { Poll::Ready(Ok(())) } } State::FramedError(_) => Poll::Ready(Err(this.state.take_framed_error())), State::Stopping => Poll::Ready(Ok(())), }; } } } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/ws/mask.rs
actix-http/src/ws/mask.rs
//! This is code from [Tungstenite project](https://github.com/snapview/tungstenite-rs) /// Mask/unmask a frame. #[inline] pub fn apply_mask(buf: &mut [u8], mask: [u8; 4]) { apply_mask_fast32(buf, mask) } /// A safe unoptimized mask application. #[inline] fn apply_mask_fallback(buf: &mut [u8], mask: [u8; 4]) { for (i, byte) in buf.iter_mut().enumerate() { *byte ^= mask[i & 3]; } } /// Faster version of `apply_mask()` which operates on 4-byte blocks. #[inline] pub fn apply_mask_fast32(buf: &mut [u8], mask: [u8; 4]) { let mask_u32 = u32::from_ne_bytes(mask); // SAFETY: // // buf is a valid slice borrowed mutably from bytes::BytesMut. // // un aligned prefix and suffix would be mask/unmask per byte. // proper aligned middle slice goes into fast path and operates on 4-byte blocks. let (prefix, words, suffix) = unsafe { buf.align_to_mut::<u32>() }; apply_mask_fallback(prefix, mask); let head = prefix.len() & 3; let mask_u32 = if head > 0 { if cfg!(target_endian = "big") { mask_u32.rotate_left(8 * head as u32) } else { mask_u32.rotate_right(8 * head as u32) } } else { mask_u32 }; for word in words.iter_mut() { *word ^= mask_u32; } apply_mask_fallback(suffix, mask_u32.to_ne_bytes()); } #[cfg(test)] mod tests { use super::*; #[test] fn test_apply_mask() { let mask = [0x6d, 0xb6, 0xb2, 0x80]; let unmasked = [ 0xf3, 0x00, 0x01, 0x02, 0x03, 0x80, 0x81, 0x82, 0xff, 0xfe, 0x00, 0x17, 0x74, 0xf9, 0x12, 0x03, ]; for data_len in 0..=unmasked.len() { let unmasked = &unmasked[0..data_len]; // Check masking with different alignment. for off in 0..=3 { if unmasked.len() < off { continue; } let mut masked = unmasked.to_vec(); apply_mask_fallback(&mut masked[off..], mask); let mut masked_fast = unmasked.to_vec(); apply_mask_fast32(&mut masked_fast[off..], mask); assert_eq!(masked, masked_fast); } } } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/ws/mod.rs
actix-http/src/ws/mod.rs
//! WebSocket protocol implementation. //! //! To setup a WebSocket, first perform the WebSocket handshake then on success convert `Payload` into a //! `WsStream` stream and then use `WsWriter` to communicate with the peer. use std::io; use derive_more::{Display, Error, From}; use http::{header, Method, StatusCode}; use crate::{body::BoxBody, header::HeaderValue, RequestHead, Response, ResponseBuilder}; mod codec; mod dispatcher; mod frame; mod mask; mod proto; pub use self::{ codec::{Codec, Frame, Item, Message}, dispatcher::Dispatcher, frame::Parser, proto::{hash_key, CloseCode, CloseReason, OpCode}, }; /// WebSocket protocol errors. #[derive(Debug, Display, Error, From)] pub enum ProtocolError { /// Received an unmasked frame from client. #[display("received an unmasked frame from client")] UnmaskedFrame, /// Received a masked frame from server. #[display("received a masked frame from server")] MaskedFrame, /// Encountered invalid opcode. #[display("invalid opcode ({})", _0)] InvalidOpcode(#[error(not(source))] u8), /// Invalid control frame length #[display("invalid control frame length ({})", _0)] InvalidLength(#[error(not(source))] usize), /// Bad opcode. #[display("bad opcode")] BadOpCode, /// A payload reached size limit. #[display("payload reached size limit")] Overflow, /// Continuation has not started. #[display("continuation has not started")] ContinuationNotStarted, /// Received new continuation but it is already started. #[display("received new continuation but it has already started")] ContinuationStarted, /// Unknown continuation fragment. #[display("unknown continuation fragment: {}", _0)] ContinuationFragment(#[error(not(source))] OpCode), /// I/O error. #[display("I/O error: {}", _0)] Io(io::Error), } /// WebSocket handshake errors #[derive(Debug, Clone, Copy, PartialEq, Eq, Display, Error)] pub enum HandshakeError { /// Only get method is allowed. #[display("method not allowed")] GetMethodRequired, /// Upgrade header if not set to WebSocket. #[display("WebSocket upgrade is expected")] NoWebsocketUpgrade, /// Connection header is not set to upgrade. #[display("connection upgrade is expected")] NoConnectionUpgrade, /// WebSocket version header is not set. #[display("WebSocket version header is required")] NoVersionHeader, /// Unsupported WebSocket version. #[display("unsupported WebSocket version")] UnsupportedVersion, /// WebSocket key is not set or wrong. #[display("unknown WebSocket key")] BadWebsocketKey, } impl From<HandshakeError> for Response<BoxBody> { fn from(err: HandshakeError) -> Self { match err { HandshakeError::GetMethodRequired => { let mut res = Response::new(StatusCode::METHOD_NOT_ALLOWED); #[allow(clippy::declare_interior_mutable_const)] const HV_GET: HeaderValue = HeaderValue::from_static("GET"); res.headers_mut().insert(header::ALLOW, HV_GET); res } HandshakeError::NoWebsocketUpgrade => { let mut res = Response::bad_request(); res.head_mut().reason = Some("No WebSocket Upgrade header found"); res } HandshakeError::NoConnectionUpgrade => { let mut res = Response::bad_request(); res.head_mut().reason = Some("No Connection upgrade"); res } HandshakeError::NoVersionHeader => { let mut res = Response::bad_request(); res.head_mut().reason = Some("WebSocket version header is required"); res } HandshakeError::UnsupportedVersion => { let mut res = Response::bad_request(); res.head_mut().reason = Some("Unsupported WebSocket version"); res } HandshakeError::BadWebsocketKey => { let mut res = Response::bad_request(); res.head_mut().reason = Some("Handshake error"); res } } } } impl From<&HandshakeError> for Response<BoxBody> { fn from(err: &HandshakeError) -> Self { (*err).into() } } /// Verify WebSocket handshake request and create handshake response. pub fn handshake(req: &RequestHead) -> Result<ResponseBuilder, HandshakeError> { verify_handshake(req)?; Ok(handshake_response(req)) } /// Verify WebSocket handshake request. pub fn verify_handshake(req: &RequestHead) -> Result<(), HandshakeError> { // WebSocket accepts only GET if req.method != Method::GET { return Err(HandshakeError::GetMethodRequired); } // Check for "UPGRADE" to WebSocket header let has_hdr = if let Some(hdr) = req.headers().get(header::UPGRADE) { if let Ok(s) = hdr.to_str() { s.to_ascii_lowercase().contains("websocket") } else { false } } else { false }; if !has_hdr { return Err(HandshakeError::NoWebsocketUpgrade); } // Upgrade connection if !req.upgrade() { return Err(HandshakeError::NoConnectionUpgrade); } // check supported version if !req.headers().contains_key(header::SEC_WEBSOCKET_VERSION) { return Err(HandshakeError::NoVersionHeader); } let supported_ver = { if let Some(hdr) = req.headers().get(header::SEC_WEBSOCKET_VERSION) { hdr == "13" || hdr == "8" || hdr == "7" } else { false } }; if !supported_ver { return Err(HandshakeError::UnsupportedVersion); } // check client handshake for validity if !req.headers().contains_key(header::SEC_WEBSOCKET_KEY) { return Err(HandshakeError::BadWebsocketKey); } Ok(()) } /// Create WebSocket handshake response. /// /// This function returns handshake `Response`, ready to send to peer. pub fn handshake_response(req: &RequestHead) -> ResponseBuilder { let key = { let key = req.headers().get(header::SEC_WEBSOCKET_KEY).unwrap(); proto::hash_key(key.as_ref()) }; Response::build(StatusCode::SWITCHING_PROTOCOLS) .upgrade("websocket") .insert_header(( header::SEC_WEBSOCKET_ACCEPT, // key is known to be header value safe ascii HeaderValue::from_bytes(&key).unwrap(), )) .take() } #[cfg(test)] mod tests { use super::*; use crate::{header, test::TestRequest}; #[test] fn test_handshake() { let req = TestRequest::default().method(Method::POST).finish(); assert_eq!( HandshakeError::GetMethodRequired, verify_handshake(req.head()).unwrap_err(), ); let req = TestRequest::default().finish(); assert_eq!( HandshakeError::NoWebsocketUpgrade, verify_handshake(req.head()).unwrap_err(), ); let req = TestRequest::default() .insert_header((header::UPGRADE, header::HeaderValue::from_static("test"))) .finish(); assert_eq!( HandshakeError::NoWebsocketUpgrade, verify_handshake(req.head()).unwrap_err(), ); let req = TestRequest::default() .insert_header(( header::UPGRADE, header::HeaderValue::from_static("websocket"), )) .finish(); assert_eq!( HandshakeError::NoConnectionUpgrade, verify_handshake(req.head()).unwrap_err(), ); let req = TestRequest::default() .insert_header(( header::UPGRADE, header::HeaderValue::from_static("websocket"), )) .insert_header(( header::CONNECTION, header::HeaderValue::from_static("upgrade"), )) .finish(); assert_eq!( HandshakeError::NoVersionHeader, verify_handshake(req.head()).unwrap_err(), ); let req = TestRequest::default() .insert_header(( header::UPGRADE, header::HeaderValue::from_static("websocket"), )) .insert_header(( header::CONNECTION, header::HeaderValue::from_static("upgrade"), )) .insert_header(( header::SEC_WEBSOCKET_VERSION, header::HeaderValue::from_static("5"), )) .finish(); assert_eq!( HandshakeError::UnsupportedVersion, verify_handshake(req.head()).unwrap_err(), ); let req = TestRequest::default() .insert_header(( header::UPGRADE, header::HeaderValue::from_static("websocket"), )) .insert_header(( header::CONNECTION, header::HeaderValue::from_static("upgrade"), )) .insert_header(( header::SEC_WEBSOCKET_VERSION, header::HeaderValue::from_static("13"), )) .finish(); assert_eq!( HandshakeError::BadWebsocketKey, verify_handshake(req.head()).unwrap_err(), ); let req = TestRequest::default() .insert_header(( header::UPGRADE, header::HeaderValue::from_static("websocket"), )) .insert_header(( header::CONNECTION, header::HeaderValue::from_static("upgrade"), )) .insert_header(( header::SEC_WEBSOCKET_VERSION, header::HeaderValue::from_static("13"), )) .insert_header(( header::SEC_WEBSOCKET_KEY, header::HeaderValue::from_static("13"), )) .finish(); assert_eq!( StatusCode::SWITCHING_PROTOCOLS, handshake_response(req.head()).finish().status() ); } #[test] fn test_ws_error_http_response() { let resp: Response<BoxBody> = HandshakeError::GetMethodRequired.into(); assert_eq!(resp.status(), StatusCode::METHOD_NOT_ALLOWED); let resp: Response<BoxBody> = HandshakeError::NoWebsocketUpgrade.into(); assert_eq!(resp.status(), StatusCode::BAD_REQUEST); let resp: Response<BoxBody> = HandshakeError::NoConnectionUpgrade.into(); assert_eq!(resp.status(), StatusCode::BAD_REQUEST); let resp: Response<BoxBody> = HandshakeError::NoVersionHeader.into(); assert_eq!(resp.status(), StatusCode::BAD_REQUEST); let resp: Response<BoxBody> = HandshakeError::UnsupportedVersion.into(); assert_eq!(resp.status(), StatusCode::BAD_REQUEST); let resp: Response<BoxBody> = HandshakeError::BadWebsocketKey.into(); assert_eq!(resp.status(), StatusCode::BAD_REQUEST); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/ws/frame.rs
actix-http/src/ws/frame.rs
use std::cmp::min; use bytes::{Buf, BufMut, BytesMut}; use tracing::debug; use super::{ mask::apply_mask, proto::{CloseCode, CloseReason, OpCode}, ProtocolError, }; /// A struct representing a WebSocket frame. #[derive(Debug)] pub struct Parser; impl Parser { fn parse_metadata( src: &[u8], server: bool, ) -> Result<Option<(usize, bool, OpCode, usize, Option<[u8; 4]>)>, ProtocolError> { let chunk_len = src.len(); let mut idx = 2; if chunk_len < 2 { return Ok(None); } let first = src[0]; let second = src[1]; let finished = first & 0x80 != 0; // check masking let masked = second & 0x80 != 0; if !masked && server { return Err(ProtocolError::UnmaskedFrame); } else if masked && !server { return Err(ProtocolError::MaskedFrame); } // Op code let opcode = OpCode::from(first & 0x0F); if let OpCode::Bad = opcode { return Err(ProtocolError::InvalidOpcode(first & 0x0F)); } let len = second & 0x7F; let length = if len == 126 { if chunk_len < 4 { return Ok(None); } let len = usize::from(u16::from_be_bytes( TryFrom::try_from(&src[idx..idx + 2]).unwrap(), )); idx += 2; len } else if len == 127 { if chunk_len < 10 { return Ok(None); } let len = u64::from_be_bytes(TryFrom::try_from(&src[idx..idx + 8]).unwrap()); idx += 8; len as usize } else { len as usize }; let mask = if server { if chunk_len < idx + 4 { return Ok(None); } let mask = TryFrom::try_from(&src[idx..idx + 4]).unwrap(); idx += 4; Some(mask) } else { None }; Ok(Some((idx, finished, opcode, length, mask))) } /// Parse the input stream into a frame. pub fn parse( src: &mut BytesMut, server: bool, max_size: usize, ) -> Result<Option<(bool, OpCode, Option<BytesMut>)>, ProtocolError> { // try to parse ws frame metadata let (idx, finished, opcode, length, mask) = match Parser::parse_metadata(src, server)? { None => return Ok(None), Some(res) => res, }; let frame_len = match idx.checked_add(length) { Some(len) => len, None => return Err(ProtocolError::Overflow), }; // not enough data if src.len() < frame_len { let min_length = min(length, max_size); let required_cap = match idx.checked_add(min_length) { Some(cap) => cap, None => return Err(ProtocolError::Overflow), }; if src.capacity() < required_cap { src.reserve(required_cap - src.capacity()); } return Ok(None); } // remove prefix src.advance(idx); // check for max allowed size if length > max_size { // drop the payload src.advance(length); return Err(ProtocolError::Overflow); } // no need for body if length == 0 { return Ok(Some((finished, opcode, None))); } let mut data = src.split_to(length); // control frames must have length <= 125 match opcode { OpCode::Ping | OpCode::Pong if length > 125 => { return Err(ProtocolError::InvalidLength(length)); } OpCode::Close if length > 125 => { debug!("Received close frame with payload length exceeding 125. Morphing to protocol close frame."); return Ok(Some((true, OpCode::Close, None))); } _ => {} } // unmask if let Some(mask) = mask { apply_mask(&mut data, mask); } Ok(Some((finished, opcode, Some(data)))) } /// Parse the payload of a close frame. pub fn parse_close_payload(payload: &[u8]) -> Option<CloseReason> { if payload.len() >= 2 { let raw_code = u16::from_be_bytes(TryFrom::try_from(&payload[..2]).unwrap()); let code = CloseCode::from(raw_code); let description = if payload.len() > 2 { Some(String::from_utf8_lossy(&payload[2..]).into()) } else { None }; Some(CloseReason { code, description }) } else { None } } /// Generate binary representation pub fn write_message<B: AsRef<[u8]>>( dst: &mut BytesMut, pl: B, op: OpCode, fin: bool, mask: bool, ) { let payload = pl.as_ref(); let one: u8 = if fin { 0x80 | Into::<u8>::into(op) } else { op.into() }; let payload_len = payload.len(); let (two, p_len) = if mask { (0x80, payload_len + 4) } else { (0, payload_len) }; if payload_len < 126 { dst.reserve(p_len + 2); dst.put_slice(&[one, two | payload_len as u8]); } else if payload_len <= 65_535 { dst.reserve(p_len + 4); dst.put_slice(&[one, two | 126]); dst.put_u16(payload_len as u16); } else { dst.reserve(p_len + 10); dst.put_slice(&[one, two | 127]); dst.put_u64(payload_len as u64); }; if mask { let mask = rand::random::<[u8; 4]>(); dst.put_slice(mask.as_ref()); dst.put_slice(payload.as_ref()); let pos = dst.len() - payload_len; apply_mask(&mut dst[pos..], mask); } else { dst.put_slice(payload.as_ref()); } } /// Create a new Close control frame. #[inline] pub fn write_close(dst: &mut BytesMut, reason: Option<CloseReason>, mask: bool) { let payload = match reason { None => Vec::new(), Some(reason) => { let mut payload = Into::<u16>::into(reason.code).to_be_bytes().to_vec(); if let Some(description) = reason.description { payload.extend(description.as_bytes()); } payload } }; Parser::write_message(dst, payload, OpCode::Close, true, mask) } } #[cfg(test)] mod tests { use bytes::Bytes; use super::*; struct F { finished: bool, opcode: OpCode, payload: Bytes, } fn is_none(frm: &Result<Option<(bool, OpCode, Option<BytesMut>)>, ProtocolError>) -> bool { matches!(*frm, Ok(None)) } fn extract(frm: Result<Option<(bool, OpCode, Option<BytesMut>)>, ProtocolError>) -> F { match frm { Ok(Some((finished, opcode, payload))) => F { finished, opcode, payload: payload .map(|b| b.freeze()) .unwrap_or_else(|| Bytes::from("")), }, _ => unreachable!("error"), } } #[test] fn test_parse() { let mut buf = BytesMut::from(&[0b0000_0001u8, 0b0000_0001u8][..]); assert!(is_none(&Parser::parse(&mut buf, false, 1024))); let mut buf = BytesMut::from(&[0b0000_0001u8, 0b0000_0001u8][..]); buf.extend(b"1"); let frame = extract(Parser::parse(&mut buf, false, 1024)); assert!(!frame.finished); assert_eq!(frame.opcode, OpCode::Text); assert_eq!(frame.payload.as_ref(), &b"1"[..]); } #[test] fn test_parse_length0() { let mut buf = BytesMut::from(&[0b0000_0001u8, 0b0000_0000u8][..]); let frame = extract(Parser::parse(&mut buf, false, 1024)); assert!(!frame.finished); assert_eq!(frame.opcode, OpCode::Text); assert!(frame.payload.is_empty()); } #[test] fn test_parse_length2() { let mut buf = BytesMut::from(&[0b0000_0001u8, 126u8][..]); assert!(is_none(&Parser::parse(&mut buf, false, 1024))); let mut buf = BytesMut::from(&[0b0000_0001u8, 126u8][..]); buf.extend(&[0u8, 4u8][..]); buf.extend(b"1234"); let frame = extract(Parser::parse(&mut buf, false, 1024)); assert!(!frame.finished); assert_eq!(frame.opcode, OpCode::Text); assert_eq!(frame.payload.as_ref(), &b"1234"[..]); } #[test] fn test_parse_length4() { let mut buf = BytesMut::from(&[0b0000_0001u8, 127u8][..]); assert!(is_none(&Parser::parse(&mut buf, false, 1024))); let mut buf = BytesMut::from(&[0b0000_0001u8, 127u8][..]); buf.extend(&[0u8, 0u8, 0u8, 0u8, 0u8, 0u8, 0u8, 4u8][..]); buf.extend(b"1234"); let frame = extract(Parser::parse(&mut buf, false, 1024)); assert!(!frame.finished); assert_eq!(frame.opcode, OpCode::Text); assert_eq!(frame.payload.as_ref(), &b"1234"[..]); } #[test] fn test_parse_frame_mask() { let mut buf = BytesMut::from(&[0b0000_0001u8, 0b1000_0001u8][..]); buf.extend(b"0001"); buf.extend(b"1"); assert!(Parser::parse(&mut buf, false, 1024).is_err()); let frame = extract(Parser::parse(&mut buf, true, 1024)); assert!(!frame.finished); assert_eq!(frame.opcode, OpCode::Text); assert_eq!(frame.payload, Bytes::from(vec![1u8])); } #[test] fn test_parse_frame_no_mask() { let mut buf = BytesMut::from(&[0b0000_0001u8, 0b0000_0001u8][..]); buf.extend([1u8]); assert!(Parser::parse(&mut buf, true, 1024).is_err()); let frame = extract(Parser::parse(&mut buf, false, 1024)); assert!(!frame.finished); assert_eq!(frame.opcode, OpCode::Text); assert_eq!(frame.payload, Bytes::from(vec![1u8])); } #[test] fn test_parse_frame_max_size() { let mut buf = BytesMut::from(&[0b0000_0001u8, 0b0000_0010u8][..]); buf.extend([1u8, 1u8]); assert!(Parser::parse(&mut buf, true, 1).is_err()); if let Err(ProtocolError::Overflow) = Parser::parse(&mut buf, false, 0) { } else { unreachable!("error"); } } #[test] fn test_parse_frame_max_size_recoverability() { let mut buf = BytesMut::new(); // The first text frame with length == 2, payload doesn't matter. buf.extend([0b0000_0001u8, 0b0000_0010u8, 0b0000_0000u8, 0b0000_0000u8]); // Next binary frame with length == 2 and payload == `[0x1111_1111u8, 0x1111_1111u8]`. buf.extend([0b0000_0010u8, 0b0000_0010u8, 0b1111_1111u8, 0b1111_1111u8]); assert_eq!(buf.len(), 8); assert!(matches!( Parser::parse(&mut buf, false, 1), Err(ProtocolError::Overflow) )); assert_eq!(buf.len(), 4); let frame = extract(Parser::parse(&mut buf, false, 2)); assert!(!frame.finished); assert_eq!(frame.opcode, OpCode::Binary); assert_eq!( frame.payload, Bytes::from(vec![0b1111_1111u8, 0b1111_1111u8]) ); assert_eq!(buf.len(), 0); } #[test] fn test_ping_frame() { let mut buf = BytesMut::new(); Parser::write_message(&mut buf, Vec::from("data"), OpCode::Ping, true, false); let mut v = vec![137u8, 4u8]; v.extend(b"data"); assert_eq!(&buf[..], &v[..]); } #[test] fn test_pong_frame() { let mut buf = BytesMut::new(); Parser::write_message(&mut buf, Vec::from("data"), OpCode::Pong, true, false); let mut v = vec![138u8, 4u8]; v.extend(b"data"); assert_eq!(&buf[..], &v[..]); } #[test] fn test_close_frame() { let mut buf = BytesMut::new(); let reason = (CloseCode::Normal, "data"); Parser::write_close(&mut buf, Some(reason.into()), false); let mut v = vec![136u8, 6u8, 3u8, 232u8]; v.extend(b"data"); assert_eq!(&buf[..], &v[..]); } #[test] fn test_empty_close_frame() { let mut buf = BytesMut::new(); Parser::write_close(&mut buf, None, false); assert_eq!(&buf[..], &vec![0x88, 0x00][..]); } #[test] fn test_parse_length_overflow() { let buf: [u8; 14] = [ 0x0a, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xeb, 0x0e, 0x8f, ]; let mut buf = BytesMut::from(&buf[..]); let result = Parser::parse(&mut buf, true, 65536); assert!(matches!(result, Err(ProtocolError::Overflow))); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/ws/proto.rs
actix-http/src/ws/proto.rs
use std::fmt; use base64::prelude::*; use tracing::error; /// Operation codes defined in [RFC 6455 §11.8]. /// /// [RFC 6455]: https://datatracker.ietf.org/doc/html/rfc6455#section-11.8 #[derive(Debug, Eq, PartialEq, Clone, Copy)] pub enum OpCode { /// Indicates a continuation frame of a fragmented message. Continue, /// Indicates a text data frame. Text, /// Indicates a binary data frame. Binary, /// Indicates a close control frame. Close, /// Indicates a ping control frame. Ping, /// Indicates a pong control frame. Pong, /// Indicates an invalid opcode was received. Bad, } impl fmt::Display for OpCode { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { use OpCode::*; match self { Continue => write!(f, "CONTINUE"), Text => write!(f, "TEXT"), Binary => write!(f, "BINARY"), Close => write!(f, "CLOSE"), Ping => write!(f, "PING"), Pong => write!(f, "PONG"), Bad => write!(f, "BAD"), } } } impl From<OpCode> for u8 { fn from(op: OpCode) -> u8 { use self::OpCode::*; match op { Continue => 0, Text => 1, Binary => 2, Close => 8, Ping => 9, Pong => 10, Bad => { error!("Attempted to convert invalid opcode to u8. This is a bug."); 8 // if this somehow happens, a close frame will help us tear down quickly } } } } impl From<u8> for OpCode { fn from(byte: u8) -> OpCode { use self::OpCode::*; match byte { 0 => Continue, 1 => Text, 2 => Binary, 8 => Close, 9 => Ping, 10 => Pong, _ => Bad, } } } /// Status code used to indicate why an endpoint is closing the WebSocket connection. #[derive(Debug, Eq, PartialEq, Clone, Copy)] pub enum CloseCode { /// Indicates a normal closure, meaning that the purpose for which the connection was /// established has been fulfilled. Normal, /// Indicates that an endpoint is "going away", such as a server going down or a browser having /// navigated away from a page. Away, /// Indicates that an endpoint is terminating the connection due to a protocol error. Protocol, /// Indicates that an endpoint is terminating the connection because it has received a type of /// data it cannot accept (e.g., an endpoint that understands only text data MAY send this if it /// receives a binary message). Unsupported, /// Indicates an abnormal closure. If the abnormal closure was due to an error, this close code /// will not be used. Instead, the `on_error` method of the handler will be called with /// the error. However, if the connection is simply dropped, without an error, this close code /// will be sent to the handler. Abnormal, /// Indicates that an endpoint is terminating the connection because it has received data within /// a message that was not consistent with the type of the message (e.g., non-UTF-8 \[RFC 3629\] /// data within a text message). Invalid, /// Indicates that an endpoint is terminating the connection because it has received a message /// that violates its policy. This is a generic status code that can be returned when there is /// no other more suitable status code (e.g., Unsupported or Size) or if there is a need to hide /// specific details about the policy. Policy, /// Indicates that an endpoint is terminating the connection because it has received a message /// that is too big for it to process. Size, /// Indicates that an endpoint (client) is terminating the connection because it has expected /// the server to negotiate one or more extension, but the server didn't return them in the /// response message of the WebSocket handshake. The list of extensions that are needed should /// be given as the reason for closing. Note that this status code is not used by the server, /// because it can fail the WebSocket handshake instead. Extension, /// Indicates that a server is terminating the connection because it encountered an unexpected /// condition that prevented it from fulfilling the request. Error, /// Indicates that the server is restarting. A client may choose to reconnect, and if it does, /// it should use a randomized delay of 5-30 seconds between attempts. Restart, /// Indicates that the server is overloaded and the client should either connect to a different /// IP (when multiple targets exist), or reconnect to the same IP when a user has performed /// an action. Again, #[doc(hidden)] Tls, #[doc(hidden)] Other(u16), } impl From<CloseCode> for u16 { fn from(code: CloseCode) -> u16 { use self::CloseCode::*; match code { Normal => 1000, Away => 1001, Protocol => 1002, Unsupported => 1003, Abnormal => 1006, Invalid => 1007, Policy => 1008, Size => 1009, Extension => 1010, Error => 1011, Restart => 1012, Again => 1013, Tls => 1015, Other(code) => code, } } } impl From<u16> for CloseCode { fn from(code: u16) -> CloseCode { use self::CloseCode::*; match code { 1000 => Normal, 1001 => Away, 1002 => Protocol, 1003 => Unsupported, 1006 => Abnormal, 1007 => Invalid, 1008 => Policy, 1009 => Size, 1010 => Extension, 1011 => Error, 1012 => Restart, 1013 => Again, 1015 => Tls, _ => Other(code), } } } #[derive(Debug, Eq, PartialEq, Clone)] /// Reason for closing the connection pub struct CloseReason { /// Exit code pub code: CloseCode, /// Optional description of the exit code pub description: Option<String>, } impl From<CloseCode> for CloseReason { fn from(code: CloseCode) -> Self { CloseReason { code, description: None, } } } impl<T: Into<String>> From<(CloseCode, T)> for CloseReason { fn from(info: (CloseCode, T)) -> Self { CloseReason { code: info.0, description: Some(info.1.into()), } } } /// The WebSocket GUID as stated in the spec. /// See <https://datatracker.ietf.org/doc/html/rfc6455#section-1.3>. static WS_GUID: &[u8] = b"258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; /// Hashes the `Sec-WebSocket-Key` header according to the WebSocket spec. /// /// Result is a Base64 encoded byte array. `base64(sha1(input))` is always 28 bytes. pub fn hash_key(key: &[u8]) -> [u8; 28] { let hash = { use sha1::Digest as _; let mut hasher = sha1::Sha1::new(); hasher.update(key); hasher.update(WS_GUID); hasher.finalize() }; let mut hash_b64 = [0; 28]; let n = BASE64_STANDARD.encode_slice(hash, &mut hash_b64).unwrap(); assert_eq!(n, 28); hash_b64 } #[cfg(test)] mod test { #![allow(unused_imports, unused_variables, dead_code)] use super::*; macro_rules! opcode_into { ($from:expr => $opcode:pat) => { match OpCode::from($from) { e @ $opcode => {} e => unreachable!("{:?}", e), } }; } macro_rules! opcode_from { ($from:expr => $opcode:pat) => { let res: u8 = $from.into(); match res { e @ $opcode => {} e => unreachable!("{:?}", e), } }; } #[test] fn test_to_opcode() { opcode_into!(0 => OpCode::Continue); opcode_into!(1 => OpCode::Text); opcode_into!(2 => OpCode::Binary); opcode_into!(8 => OpCode::Close); opcode_into!(9 => OpCode::Ping); opcode_into!(10 => OpCode::Pong); opcode_into!(99 => OpCode::Bad); } #[test] fn test_from_opcode() { opcode_from!(OpCode::Continue => 0); opcode_from!(OpCode::Text => 1); opcode_from!(OpCode::Binary => 2); opcode_from!(OpCode::Close => 8); opcode_from!(OpCode::Ping => 9); opcode_from!(OpCode::Pong => 10); } #[test] #[should_panic] fn test_from_opcode_debug() { opcode_from!(OpCode::Bad => 99); } #[test] fn test_from_opcode_display() { assert_eq!(format!("{}", OpCode::Continue), "CONTINUE"); assert_eq!(format!("{}", OpCode::Text), "TEXT"); assert_eq!(format!("{}", OpCode::Binary), "BINARY"); assert_eq!(format!("{}", OpCode::Close), "CLOSE"); assert_eq!(format!("{}", OpCode::Ping), "PING"); assert_eq!(format!("{}", OpCode::Pong), "PONG"); assert_eq!(format!("{}", OpCode::Bad), "BAD"); } #[test] fn test_hash_key() { let hash = hash_key(b"hello actix-web"); assert_eq!(&hash, b"cR1dlyUUJKp0s/Bel25u5TgvC3E="); } #[test] fn close_code_from_u16() { assert_eq!(CloseCode::from(1000u16), CloseCode::Normal); assert_eq!(CloseCode::from(1001u16), CloseCode::Away); assert_eq!(CloseCode::from(1002u16), CloseCode::Protocol); assert_eq!(CloseCode::from(1003u16), CloseCode::Unsupported); assert_eq!(CloseCode::from(1006u16), CloseCode::Abnormal); assert_eq!(CloseCode::from(1007u16), CloseCode::Invalid); assert_eq!(CloseCode::from(1008u16), CloseCode::Policy); assert_eq!(CloseCode::from(1009u16), CloseCode::Size); assert_eq!(CloseCode::from(1010u16), CloseCode::Extension); assert_eq!(CloseCode::from(1011u16), CloseCode::Error); assert_eq!(CloseCode::from(1012u16), CloseCode::Restart); assert_eq!(CloseCode::from(1013u16), CloseCode::Again); assert_eq!(CloseCode::from(1015u16), CloseCode::Tls); assert_eq!(CloseCode::from(2000u16), CloseCode::Other(2000)); } #[test] fn close_code_into_u16() { assert_eq!(1000u16, Into::<u16>::into(CloseCode::Normal)); assert_eq!(1001u16, Into::<u16>::into(CloseCode::Away)); assert_eq!(1002u16, Into::<u16>::into(CloseCode::Protocol)); assert_eq!(1003u16, Into::<u16>::into(CloseCode::Unsupported)); assert_eq!(1006u16, Into::<u16>::into(CloseCode::Abnormal)); assert_eq!(1007u16, Into::<u16>::into(CloseCode::Invalid)); assert_eq!(1008u16, Into::<u16>::into(CloseCode::Policy)); assert_eq!(1009u16, Into::<u16>::into(CloseCode::Size)); assert_eq!(1010u16, Into::<u16>::into(CloseCode::Extension)); assert_eq!(1011u16, Into::<u16>::into(CloseCode::Error)); assert_eq!(1012u16, Into::<u16>::into(CloseCode::Restart)); assert_eq!(1013u16, Into::<u16>::into(CloseCode::Again)); assert_eq!(1015u16, Into::<u16>::into(CloseCode::Tls)); assert_eq!(2000u16, Into::<u16>::into(CloseCode::Other(2000))); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/body/none.rs
actix-http/src/body/none.rs
use std::{ convert::Infallible, pin::Pin, task::{Context, Poll}, }; use bytes::Bytes; use super::{BodySize, MessageBody}; /// Body type for responses that forbid payloads. /// /// This is distinct from an "empty" response which _would_ contain a `Content-Length` header. /// For an "empty" body, use `()` or `Bytes::new()`. /// /// For example, the HTTP spec forbids a payload to be sent with a `204 No Content` response. /// In this case, the payload (or lack thereof) is implicit from the status code, so a /// `Content-Length` header is not required. #[derive(Debug, Clone, Copy, Default)] #[non_exhaustive] pub struct None; impl None { /// Constructs new "none" body. #[inline] pub fn new() -> Self { None } } impl MessageBody for None { type Error = Infallible; #[inline] fn size(&self) -> BodySize { BodySize::None } #[inline] fn poll_next( self: Pin<&mut Self>, _cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { Poll::Ready(Option::None) } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { Ok(Bytes::new()) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/body/sized_stream.rs
actix-http/src/body/sized_stream.rs
use std::{ error::Error as StdError, pin::Pin, task::{Context, Poll}, }; use bytes::Bytes; use futures_core::{ready, Stream}; use pin_project_lite::pin_project; use super::{BodySize, MessageBody}; pin_project! { /// Known sized streaming response wrapper. /// /// This body implementation should be used if total size of stream is known. Data is sent as-is /// without using chunked transfer encoding. pub struct SizedStream<S> { size: u64, #[pin] stream: S, } } impl<S, E> SizedStream<S> where S: Stream<Item = Result<Bytes, E>>, E: Into<Box<dyn StdError>> + 'static, { #[inline] pub fn new(size: u64, stream: S) -> Self { SizedStream { size, stream } } } // TODO: from_infallible method impl<S, E> MessageBody for SizedStream<S> where S: Stream<Item = Result<Bytes, E>>, E: Into<Box<dyn StdError>> + 'static, { type Error = E; #[inline] fn size(&self) -> BodySize { BodySize::Sized(self.size) } /// Attempts to pull out the next value of the underlying [`Stream`]. /// /// Empty values are skipped to prevent [`SizedStream`]'s transmission being /// ended on a zero-length chunk, but rather proceed until the underlying /// [`Stream`] ends. fn poll_next( mut self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { loop { let stream = self.as_mut().project().stream; let chunk = match ready!(stream.poll_next(cx)) { Some(Ok(ref bytes)) if bytes.is_empty() => continue, val => val, }; return Poll::Ready(chunk); } } } #[cfg(test)] mod tests { use std::convert::Infallible; use actix_rt::pin; use actix_utils::future::poll_fn; use futures_util::stream; use static_assertions::{assert_impl_all, assert_not_impl_any}; use super::*; use crate::body::to_bytes; assert_impl_all!(SizedStream<stream::Empty<Result<Bytes, crate::Error>>>: MessageBody); assert_impl_all!(SizedStream<stream::Empty<Result<Bytes, &'static str>>>: MessageBody); assert_impl_all!(SizedStream<stream::Repeat<Result<Bytes, &'static str>>>: MessageBody); assert_impl_all!(SizedStream<stream::Empty<Result<Bytes, Infallible>>>: MessageBody); assert_impl_all!(SizedStream<stream::Repeat<Result<Bytes, Infallible>>>: MessageBody); assert_not_impl_any!(SizedStream<stream::Empty<Bytes>>: MessageBody); assert_not_impl_any!(SizedStream<stream::Repeat<Bytes>>: MessageBody); // crate::Error is not Clone assert_not_impl_any!(SizedStream<stream::Repeat<Result<Bytes, crate::Error>>>: MessageBody); #[actix_rt::test] async fn skips_empty_chunks() { let body = SizedStream::new( 2, stream::iter( ["1", "", "2"] .iter() .map(|&v| Ok::<_, Infallible>(Bytes::from(v))), ), ); pin!(body); assert_eq!( poll_fn(|cx| body.as_mut().poll_next(cx)) .await .unwrap() .ok(), Some(Bytes::from("1")), ); assert_eq!( poll_fn(|cx| body.as_mut().poll_next(cx)) .await .unwrap() .ok(), Some(Bytes::from("2")), ); } #[actix_rt::test] async fn read_to_bytes() { let body = SizedStream::new( 2, stream::iter( ["1", "", "2"] .iter() .map(|&v| Ok::<_, Infallible>(Bytes::from(v))), ), ); assert_eq!(to_bytes(body).await.ok(), Some(Bytes::from("12"))); } #[actix_rt::test] async fn stream_string_error() { // `&'static str` does not impl `Error` // but it does impl `Into<Box<dyn Error>>` let body = SizedStream::new(0, stream::once(async { Err("stringy error") })); assert_eq!(to_bytes(body).await, Ok(Bytes::new())); let body = SizedStream::new(1, stream::once(async { Err("stringy error") })); assert!(matches!(to_bytes(body).await, Err("stringy error"))); } #[actix_rt::test] async fn stream_boxed_error() { // `Box<dyn Error>` does not impl `Error` // but it does impl `Into<Box<dyn Error>>` let body = SizedStream::new( 0, stream::once(async { Err(Box::<dyn StdError>::from("stringy error")) }), ); assert_eq!(to_bytes(body).await.unwrap(), Bytes::new()); let body = SizedStream::new( 1, stream::once(async { Err(Box::<dyn StdError>::from("stringy error")) }), ); assert_eq!( to_bytes(body).await.unwrap_err().to_string(), "stringy error" ); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/body/either.rs
actix-http/src/body/either.rs
use std::{ pin::Pin, task::{Context, Poll}, }; use bytes::Bytes; use pin_project_lite::pin_project; use super::{BodySize, BoxBody, MessageBody}; use crate::Error; pin_project! { /// An "either" type specialized for body types. /// /// It is common, in middleware especially, to conditionally return an inner service's unknown/ /// generic body `B` type or return early with a new response. This type's "right" variant /// defaults to `BoxBody` since error responses are the common case. /// /// For example, middleware will often have `type Response = ServiceResponse<EitherBody<B>>`. /// This means that the inner service's response body type maps to the `Left` variant and the /// middleware's own error responses use the default `Right` variant of `BoxBody`. Of course, /// there's no reason it couldn't use `EitherBody<B, String>` instead if its alternative /// responses have a known type. #[project = EitherBodyProj] #[derive(Debug, Clone)] pub enum EitherBody<L, R = BoxBody> { /// A body of type `L`. Left { #[pin] body: L }, /// A body of type `R`. Right { #[pin] body: R }, } } impl<L> EitherBody<L, BoxBody> { /// Creates new `EitherBody` left variant with a boxed right variant. /// /// If the expected `R` type will be inferred and is not `BoxBody` then use the /// [`left`](Self::left) constructor instead. #[inline] pub fn new(body: L) -> Self { Self::Left { body } } } impl<L, R> EitherBody<L, R> { /// Creates new `EitherBody` using left variant. #[inline] pub fn left(body: L) -> Self { Self::Left { body } } /// Creates new `EitherBody` using right variant. #[inline] pub fn right(body: R) -> Self { Self::Right { body } } } impl<L, R> MessageBody for EitherBody<L, R> where L: MessageBody + 'static, R: MessageBody + 'static, { type Error = Error; #[inline] fn size(&self) -> BodySize { match self { EitherBody::Left { body } => body.size(), EitherBody::Right { body } => body.size(), } } #[inline] fn poll_next( self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { match self.project() { EitherBodyProj::Left { body } => body .poll_next(cx) .map_err(|err| Error::new_body().with_cause(err)), EitherBodyProj::Right { body } => body .poll_next(cx) .map_err(|err| Error::new_body().with_cause(err)), } } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { match self { EitherBody::Left { body } => body .try_into_bytes() .map_err(|body| EitherBody::Left { body }), EitherBody::Right { body } => body .try_into_bytes() .map_err(|body| EitherBody::Right { body }), } } #[inline] fn boxed(self) -> BoxBody { match self { EitherBody::Left { body } => body.boxed(), EitherBody::Right { body } => body.boxed(), } } } #[cfg(test)] mod tests { use super::*; #[test] fn type_parameter_inference() { let _body: EitherBody<(), _> = EitherBody::new(()); let _body: EitherBody<_, ()> = EitherBody::left(()); let _body: EitherBody<(), _> = EitherBody::right(()); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/body/utils.rs
actix-http/src/body/utils.rs
use std::task::Poll; use actix_rt::pin; use actix_utils::future::poll_fn; use bytes::{Bytes, BytesMut}; use derive_more::{Display, Error}; use futures_core::ready; use super::{BodySize, MessageBody}; /// Collects all the bytes produced by `body`. /// /// Any errors produced by the body stream are returned immediately. /// /// Consider using [`to_bytes_limited`] instead to protect against memory exhaustion. /// /// # Examples /// /// ``` /// use actix_http::body::{self, to_bytes}; /// use bytes::Bytes; /// /// # actix_rt::System::new().block_on(async { /// let body = body::None::new(); /// let bytes = to_bytes(body).await.unwrap(); /// assert!(bytes.is_empty()); /// /// let body = Bytes::from_static(b"123"); /// let bytes = to_bytes(body).await.unwrap(); /// assert_eq!(bytes, "123"); /// # }); /// ``` pub async fn to_bytes<B: MessageBody>(body: B) -> Result<Bytes, B::Error> { to_bytes_limited(body, usize::MAX) .await .expect("body should never yield more than usize::MAX bytes") } /// Error type returned from [`to_bytes_limited`] when body produced exceeds limit. #[derive(Debug, Display, Error)] #[display("limit exceeded while collecting body bytes")] #[non_exhaustive] pub struct BodyLimitExceeded; /// Collects the bytes produced by `body`, up to `limit` bytes. /// /// If a chunk read from `poll_next` causes the total number of bytes read to exceed `limit`, an /// `Err(BodyLimitExceeded)` is returned. /// /// Any errors produced by the body stream are returned immediately as `Ok(Err(B::Error))`. /// /// # Examples /// /// ``` /// use actix_http::body::{self, to_bytes_limited}; /// use bytes::Bytes; /// /// # actix_rt::System::new().block_on(async { /// let body = body::None::new(); /// let bytes = to_bytes_limited(body, 10).await.unwrap().unwrap(); /// assert!(bytes.is_empty()); /// /// let body = Bytes::from_static(b"123"); /// let bytes = to_bytes_limited(body, 10).await.unwrap().unwrap(); /// assert_eq!(bytes, "123"); /// /// let body = Bytes::from_static(b"123"); /// assert!(to_bytes_limited(body, 2).await.is_err()); /// # }); /// ``` pub async fn to_bytes_limited<B: MessageBody>( body: B, limit: usize, ) -> Result<Result<Bytes, B::Error>, BodyLimitExceeded> { /// Sensible default (32kB) for initial, bounded allocation when collecting body bytes. const INITIAL_ALLOC_BYTES: usize = 32 * 1024; let cap = match body.size() { BodySize::None | BodySize::Sized(0) => return Ok(Ok(Bytes::new())), BodySize::Sized(size) if size as usize > limit => return Err(BodyLimitExceeded), BodySize::Sized(size) => (size as usize).min(INITIAL_ALLOC_BYTES), BodySize::Stream => INITIAL_ALLOC_BYTES, }; let mut exceeded_limit = false; let mut buf = BytesMut::with_capacity(cap); pin!(body); match poll_fn(|cx| loop { let body = body.as_mut(); match ready!(body.poll_next(cx)) { Some(Ok(bytes)) => { // if limit is exceeded... if buf.len() + bytes.len() > limit { // ...set flag to true and break out of poll_fn exceeded_limit = true; return Poll::Ready(Ok(())); } buf.extend_from_slice(&bytes) } None => return Poll::Ready(Ok(())), Some(Err(err)) => return Poll::Ready(Err(err)), } }) .await { // propagate error returned from body poll Err(err) => Ok(Err(err)), // limit was exceeded while reading body Ok(()) if exceeded_limit => Err(BodyLimitExceeded), // otherwise return body buffer Ok(()) => Ok(Ok(buf.freeze())), } } #[cfg(test)] mod tests { use std::io; use futures_util::{stream, StreamExt as _}; use super::*; use crate::{ body::{BodyStream, SizedStream}, Error, }; #[actix_rt::test] async fn to_bytes_complete() { let bytes = to_bytes(()).await.unwrap(); assert!(bytes.is_empty()); let body = Bytes::from_static(b"123"); let bytes = to_bytes(body).await.unwrap(); assert_eq!(bytes, b"123"[..]); } #[actix_rt::test] async fn to_bytes_streams() { let stream = stream::iter(vec![Bytes::from_static(b"123"), Bytes::from_static(b"abc")]) .map(Ok::<_, Error>); let body = BodyStream::new(stream); let bytes = to_bytes(body).await.unwrap(); assert_eq!(bytes, b"123abc"[..]); } #[actix_rt::test] async fn to_bytes_limited_complete() { let bytes = to_bytes_limited((), 0).await.unwrap().unwrap(); assert!(bytes.is_empty()); let bytes = to_bytes_limited((), 1).await.unwrap().unwrap(); assert!(bytes.is_empty()); assert!(to_bytes_limited(Bytes::from_static(b"12"), 0) .await .is_err()); assert!(to_bytes_limited(Bytes::from_static(b"12"), 1) .await .is_err()); assert!(to_bytes_limited(Bytes::from_static(b"12"), 2).await.is_ok()); assert!(to_bytes_limited(Bytes::from_static(b"12"), 3).await.is_ok()); } #[actix_rt::test] async fn to_bytes_limited_streams() { // hinting a larger body fails let body = SizedStream::new(8, stream::empty().map(Ok::<_, Error>)); assert!(to_bytes_limited(body, 3).await.is_err()); // hinting a smaller body is okay let body = SizedStream::new(3, stream::empty().map(Ok::<_, Error>)); assert!(to_bytes_limited(body, 3).await.unwrap().unwrap().is_empty()); // hinting a smaller body then returning a larger one fails let stream = stream::iter(vec![Bytes::from_static(b"1234")]).map(Ok::<_, Error>); let body = SizedStream::new(3, stream); assert!(to_bytes_limited(body, 3).await.is_err()); let stream = stream::iter(vec![Bytes::from_static(b"123"), Bytes::from_static(b"abc")]) .map(Ok::<_, Error>); let body = BodyStream::new(stream); assert!(to_bytes_limited(body, 3).await.is_err()); } #[actix_rt::test] async fn to_body_limit_error() { let err_stream = stream::once(async { Err(io::Error::other("")) }); let body = SizedStream::new(8, err_stream); // not too big, but propagates error from body stream assert!(to_bytes_limited(body, 10).await.unwrap().is_err()); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/body/mod.rs
actix-http/src/body/mod.rs
//! Traits and structures to aid consuming and writing HTTP payloads. //! //! "Body" and "payload" are used somewhat interchangeably in this documentation. // Though the spec kinda reads like "payload" is the possibly-transfer-encoded part of the message // and the "body" is the intended possibly-decoded version of that. mod body_stream; mod boxed; mod either; mod message_body; mod none; mod size; mod sized_stream; mod utils; pub(crate) use self::message_body::MessageBodyMapErr; pub use self::{ body_stream::BodyStream, boxed::BoxBody, either::EitherBody, message_body::MessageBody, none::None, size::BodySize, sized_stream::SizedStream, utils::{to_bytes, to_bytes_limited, BodyLimitExceeded}, };
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/body/boxed.rs
actix-http/src/body/boxed.rs
use std::{ error::Error as StdError, fmt, pin::Pin, task::{Context, Poll}, }; use bytes::Bytes; use super::{BodySize, MessageBody, MessageBodyMapErr}; use crate::body; /// A boxed message body with boxed errors. #[derive(Debug)] pub struct BoxBody(BoxBodyInner); enum BoxBodyInner { None(body::None), Bytes(Bytes), Stream(Pin<Box<dyn MessageBody<Error = Box<dyn StdError>>>>), } impl fmt::Debug for BoxBodyInner { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { match self { Self::None(arg0) => f.debug_tuple("None").field(arg0).finish(), Self::Bytes(arg0) => f.debug_tuple("Bytes").field(arg0).finish(), Self::Stream(_) => f.debug_tuple("Stream").field(&"dyn MessageBody").finish(), } } } impl BoxBody { /// Boxes body type, erasing type information. /// /// If the body type to wrap is unknown or generic it is better to use [`MessageBody::boxed`] to /// avoid double boxing. #[inline] pub fn new<B>(body: B) -> Self where B: MessageBody + 'static, { match body.size() { BodySize::None => Self(BoxBodyInner::None(body::None)), _ => match body.try_into_bytes() { Ok(bytes) => Self(BoxBodyInner::Bytes(bytes)), Err(body) => { let body = MessageBodyMapErr::new(body, Into::into); Self(BoxBodyInner::Stream(Box::pin(body))) } }, } } /// Returns a mutable pinned reference to the inner message body type. #[inline] pub fn as_pin_mut(&mut self) -> Pin<&mut Self> { Pin::new(self) } } impl MessageBody for BoxBody { type Error = Box<dyn StdError>; #[inline] fn size(&self) -> BodySize { match &self.0 { BoxBodyInner::None(none) => none.size(), BoxBodyInner::Bytes(bytes) => bytes.size(), BoxBodyInner::Stream(stream) => stream.size(), } } #[inline] fn poll_next( mut self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { match &mut self.0 { BoxBodyInner::None(body) => Pin::new(body).poll_next(cx).map_err(|err| match err {}), BoxBodyInner::Bytes(body) => Pin::new(body).poll_next(cx).map_err(|err| match err {}), BoxBodyInner::Stream(body) => Pin::new(body).poll_next(cx), } } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { match self.0 { BoxBodyInner::None(body) => Ok(body.try_into_bytes().unwrap()), BoxBodyInner::Bytes(body) => Ok(body.try_into_bytes().unwrap()), _ => Err(self), } } #[inline] fn boxed(self) -> BoxBody { self } } #[cfg(test)] mod tests { use static_assertions::{assert_impl_all, assert_not_impl_any}; use super::*; use crate::body::to_bytes; assert_impl_all!(BoxBody: fmt::Debug, MessageBody, Unpin); assert_not_impl_any!(BoxBody: Send, Sync); #[actix_rt::test] async fn nested_boxed_body() { let body = Bytes::from_static(&[1, 2, 3]); let boxed_body = BoxBody::new(BoxBody::new(body)); assert_eq!( to_bytes(boxed_body).await.unwrap(), Bytes::from(vec![1, 2, 3]), ); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/body/body_stream.rs
actix-http/src/body/body_stream.rs
use std::{ error::Error as StdError, pin::Pin, task::{Context, Poll}, }; use bytes::Bytes; use futures_core::{ready, Stream}; use pin_project_lite::pin_project; use super::{BodySize, MessageBody}; pin_project! { /// Streaming response wrapper. /// /// Response does not contain `Content-Length` header and appropriate transfer encoding is used. pub struct BodyStream<S> { #[pin] stream: S, } } // TODO: from_infallible method impl<S, E> BodyStream<S> where S: Stream<Item = Result<Bytes, E>>, E: Into<Box<dyn StdError>> + 'static, { #[inline] pub fn new(stream: S) -> Self { BodyStream { stream } } } impl<S, E> MessageBody for BodyStream<S> where S: Stream<Item = Result<Bytes, E>>, E: Into<Box<dyn StdError>> + 'static, { type Error = E; #[inline] fn size(&self) -> BodySize { BodySize::Stream } /// Attempts to pull out the next value of the underlying [`Stream`]. /// /// Empty values are skipped to prevent [`BodyStream`]'s transmission being ended on a /// zero-length chunk, but rather proceed until the underlying [`Stream`] ends. fn poll_next( mut self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { loop { let stream = self.as_mut().project().stream; let chunk = match ready!(stream.poll_next(cx)) { Some(Ok(ref bytes)) if bytes.is_empty() => continue, opt => opt, }; return Poll::Ready(chunk); } } } #[cfg(test)] mod tests { use std::{convert::Infallible, time::Duration}; use actix_rt::{ pin, time::{sleep, Sleep}, }; use actix_utils::future::poll_fn; use derive_more::{Display, Error}; use futures_core::ready; use futures_util::{stream, FutureExt as _}; use pin_project_lite::pin_project; use static_assertions::{assert_impl_all, assert_not_impl_any}; use super::*; use crate::body::to_bytes; assert_impl_all!(BodyStream<stream::Empty<Result<Bytes, crate::Error>>>: MessageBody); assert_impl_all!(BodyStream<stream::Empty<Result<Bytes, &'static str>>>: MessageBody); assert_impl_all!(BodyStream<stream::Repeat<Result<Bytes, &'static str>>>: MessageBody); assert_impl_all!(BodyStream<stream::Empty<Result<Bytes, Infallible>>>: MessageBody); assert_impl_all!(BodyStream<stream::Repeat<Result<Bytes, Infallible>>>: MessageBody); assert_not_impl_any!(BodyStream<stream::Empty<Bytes>>: MessageBody); assert_not_impl_any!(BodyStream<stream::Repeat<Bytes>>: MessageBody); // crate::Error is not Clone assert_not_impl_any!(BodyStream<stream::Repeat<Result<Bytes, crate::Error>>>: MessageBody); #[actix_rt::test] async fn skips_empty_chunks() { let body = BodyStream::new(stream::iter( ["1", "", "2"] .iter() .map(|&v| Ok::<_, Infallible>(Bytes::from(v))), )); pin!(body); assert_eq!( poll_fn(|cx| body.as_mut().poll_next(cx)) .await .unwrap() .ok(), Some(Bytes::from("1")), ); assert_eq!( poll_fn(|cx| body.as_mut().poll_next(cx)) .await .unwrap() .ok(), Some(Bytes::from("2")), ); } #[actix_rt::test] async fn read_to_bytes() { let body = BodyStream::new(stream::iter( ["1", "", "2"] .iter() .map(|&v| Ok::<_, Infallible>(Bytes::from(v))), )); assert_eq!(to_bytes(body).await.ok(), Some(Bytes::from("12"))); } #[derive(Debug, Display, Error)] #[display("stream error")] struct StreamErr; #[actix_rt::test] async fn stream_immediate_error() { let body = BodyStream::new(stream::once(async { Err(StreamErr) })); assert!(matches!(to_bytes(body).await, Err(StreamErr))); } #[actix_rt::test] async fn stream_string_error() { // `&'static str` does not impl `Error` // but it does impl `Into<Box<dyn Error>>` let body = BodyStream::new(stream::once(async { Err("stringy error") })); assert!(matches!(to_bytes(body).await, Err("stringy error"))); } #[actix_rt::test] async fn stream_boxed_error() { // `Box<dyn Error>` does not impl `Error` // but it does impl `Into<Box<dyn Error>>` let body = BodyStream::new(stream::once(async { Err(Box::<dyn StdError>::from("stringy error")) })); assert_eq!( to_bytes(body).await.unwrap_err().to_string(), "stringy error" ); } #[actix_rt::test] async fn stream_delayed_error() { let body = BodyStream::new(stream::iter(vec![Ok(Bytes::from("1")), Err(StreamErr)])); assert!(matches!(to_bytes(body).await, Err(StreamErr))); pin_project! { #[derive(Debug)] #[project = TimeDelayStreamProj] enum TimeDelayStream { Start, Sleep { delay: Pin<Box<Sleep>> }, Done, } } impl Stream for TimeDelayStream { type Item = Result<Bytes, StreamErr>; fn poll_next( mut self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Poll<Option<Self::Item>> { match self.as_mut().get_mut() { TimeDelayStream::Start => { let sleep = sleep(Duration::from_millis(1)); self.as_mut().set(TimeDelayStream::Sleep { delay: Box::pin(sleep), }); cx.waker().wake_by_ref(); Poll::Pending } TimeDelayStream::Sleep { ref mut delay } => { ready!(delay.poll_unpin(cx)); self.set(TimeDelayStream::Done); cx.waker().wake_by_ref(); Poll::Pending } TimeDelayStream::Done => Poll::Ready(Some(Err(StreamErr))), } } } let body = BodyStream::new(TimeDelayStream::Start); assert!(matches!(to_bytes(body).await, Err(StreamErr))); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/body/message_body.rs
actix-http/src/body/message_body.rs
//! [`MessageBody`] trait and foreign implementations. use std::{ convert::Infallible, error::Error as StdError, mem, pin::Pin, task::{Context, Poll}, }; use bytes::{Bytes, BytesMut}; use futures_core::ready; use pin_project_lite::pin_project; use super::{BodySize, BoxBody}; /// An interface for types that can be used as a response body. /// /// It is not usually necessary to create custom body types, this trait is already [implemented for /// a large number of sensible body types](#foreign-impls) including: /// - Empty body: `()` /// - Text-based: `String`, `&'static str`, [`ByteString`](https://docs.rs/bytestring/1). /// - Byte-based: `Bytes`, `BytesMut`, `Vec<u8>`, `&'static [u8]`; /// - Streams: [`BodyStream`](super::BodyStream), [`SizedStream`](super::SizedStream) /// /// # Examples /// ``` /// # use std::convert::Infallible; /// # use std::task::{Poll, Context}; /// # use std::pin::Pin; /// # use bytes::Bytes; /// # use actix_http::body::{BodySize, MessageBody}; /// struct Repeat { /// chunk: String, /// n_times: usize, /// } /// /// impl MessageBody for Repeat { /// type Error = Infallible; /// /// fn size(&self) -> BodySize { /// BodySize::Sized((self.chunk.len() * self.n_times) as u64) /// } /// /// fn poll_next( /// self: Pin<&mut Self>, /// _cx: &mut Context<'_>, /// ) -> Poll<Option<Result<Bytes, Self::Error>>> { /// let payload_string = self.chunk.repeat(self.n_times); /// let payload_bytes = Bytes::from(payload_string); /// Poll::Ready(Some(Ok(payload_bytes))) /// } /// } /// ``` pub trait MessageBody { /// The type of error that will be returned if streaming body fails. /// /// Since it is not appropriate to generate a response mid-stream, it only requires `Error` for /// internal use and logging. type Error: Into<Box<dyn StdError>>; /// Body size hint. /// /// If [`BodySize::None`] is returned, optimizations that skip reading the body are allowed. fn size(&self) -> BodySize; /// Attempt to pull out the next chunk of body bytes. /// /// # Return Value /// Similar to the `Stream` interface, there are several possible return values, each indicating /// a distinct state: /// - `Poll::Pending` means that this body's next chunk is not ready yet. Implementations must /// ensure that the current task will be notified when the next chunk may be ready. /// - `Poll::Ready(Some(val))` means that the body has successfully produced a chunk, `val`, /// and may produce further values on subsequent `poll_next` calls. /// - `Poll::Ready(None)` means that the body is complete, and `poll_next` should not be /// invoked again. /// /// # Panics /// Once a body is complete (i.e., `poll_next` returned `Ready(None)`), calling its `poll_next` /// method again may panic, block forever, or cause other kinds of problems; this trait places /// no requirements on the effects of such a call. However, as the `poll_next` method is not /// marked unsafe, Rust’s usual rules apply: calls must never cause UB, regardless of its state. fn poll_next( self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>>; /// Try to convert into the complete chunk of body bytes. /// /// Override this method if the complete body can be trivially extracted. This is useful for /// optimizations where `poll_next` calls can be avoided. /// /// Body types with [`BodySize::None`] are allowed to return empty `Bytes`. Although, if calling /// this method, it is recommended to check `size` first and return early. /// /// # Errors /// The default implementation will error and return the original type back to the caller for /// further use. #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> where Self: Sized, { Err(self) } /// Wraps this body into a `BoxBody`. /// /// No-op when called on a `BoxBody`, meaning there is no risk of double boxing when calling /// this on a generic `MessageBody`. Prefer this over [`BoxBody::new`] when a boxed body /// is required. #[inline] fn boxed(self) -> BoxBody where Self: Sized + 'static, { BoxBody::new(self) } } mod foreign_impls { use std::{borrow::Cow, ops::DerefMut}; use super::*; impl<B> MessageBody for &mut B where B: MessageBody + Unpin + ?Sized, { type Error = B::Error; fn size(&self) -> BodySize { (**self).size() } fn poll_next( mut self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { Pin::new(&mut **self).poll_next(cx) } } impl MessageBody for Infallible { type Error = Infallible; fn size(&self) -> BodySize { match *self {} } fn poll_next( self: Pin<&mut Self>, _cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { match *self {} } } impl MessageBody for () { type Error = Infallible; #[inline] fn size(&self) -> BodySize { BodySize::Sized(0) } #[inline] fn poll_next( self: Pin<&mut Self>, _cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { Poll::Ready(None) } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { Ok(Bytes::new()) } } impl<B> MessageBody for Box<B> where B: MessageBody + Unpin + ?Sized, { type Error = B::Error; #[inline] fn size(&self) -> BodySize { self.as_ref().size() } #[inline] fn poll_next( self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { Pin::new(self.get_mut().as_mut()).poll_next(cx) } } impl<T, B> MessageBody for Pin<T> where T: DerefMut<Target = B> + Unpin, B: MessageBody + ?Sized, { type Error = B::Error; #[inline] fn size(&self) -> BodySize { self.as_ref().size() } #[inline] fn poll_next( self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { self.get_mut().as_mut().poll_next(cx) } } impl MessageBody for &'static [u8] { type Error = Infallible; #[inline] fn size(&self) -> BodySize { BodySize::Sized(self.len() as u64) } #[inline] fn poll_next( self: Pin<&mut Self>, _cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { if self.is_empty() { Poll::Ready(None) } else { Poll::Ready(Some(Ok(Bytes::from_static(mem::take(self.get_mut()))))) } } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { Ok(Bytes::from_static(self)) } } impl MessageBody for Bytes { type Error = Infallible; #[inline] fn size(&self) -> BodySize { BodySize::Sized(self.len() as u64) } #[inline] fn poll_next( self: Pin<&mut Self>, _cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { if self.is_empty() { Poll::Ready(None) } else { Poll::Ready(Some(Ok(mem::take(self.get_mut())))) } } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { Ok(self) } } impl MessageBody for BytesMut { type Error = Infallible; #[inline] fn size(&self) -> BodySize { BodySize::Sized(self.len() as u64) } #[inline] fn poll_next( self: Pin<&mut Self>, _cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { if self.is_empty() { Poll::Ready(None) } else { Poll::Ready(Some(Ok(mem::take(self.get_mut()).freeze()))) } } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { Ok(self.freeze()) } } impl MessageBody for Vec<u8> { type Error = Infallible; #[inline] fn size(&self) -> BodySize { BodySize::Sized(self.len() as u64) } #[inline] fn poll_next( self: Pin<&mut Self>, _cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { if self.is_empty() { Poll::Ready(None) } else { Poll::Ready(Some(Ok(mem::take(self.get_mut()).into()))) } } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { Ok(Bytes::from(self)) } } impl MessageBody for Cow<'static, [u8]> { type Error = Infallible; #[inline] fn size(&self) -> BodySize { BodySize::Sized(self.len() as u64) } #[inline] fn poll_next( self: Pin<&mut Self>, _cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { if self.is_empty() { Poll::Ready(None) } else { let bytes = match mem::take(self.get_mut()) { Cow::Borrowed(b) => Bytes::from_static(b), Cow::Owned(b) => Bytes::from(b), }; Poll::Ready(Some(Ok(bytes))) } } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { match self { Cow::Borrowed(b) => Ok(Bytes::from_static(b)), Cow::Owned(b) => Ok(Bytes::from(b)), } } } impl MessageBody for &'static str { type Error = Infallible; #[inline] fn size(&self) -> BodySize { BodySize::Sized(self.len() as u64) } #[inline] fn poll_next( self: Pin<&mut Self>, _cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { if self.is_empty() { Poll::Ready(None) } else { let string = mem::take(self.get_mut()); let bytes = Bytes::from_static(string.as_bytes()); Poll::Ready(Some(Ok(bytes))) } } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { Ok(Bytes::from_static(self.as_bytes())) } } impl MessageBody for String { type Error = Infallible; #[inline] fn size(&self) -> BodySize { BodySize::Sized(self.len() as u64) } #[inline] fn poll_next( self: Pin<&mut Self>, _cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { if self.is_empty() { Poll::Ready(None) } else { let string = mem::take(self.get_mut()); Poll::Ready(Some(Ok(Bytes::from(string)))) } } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { Ok(Bytes::from(self)) } } impl MessageBody for Cow<'static, str> { type Error = Infallible; #[inline] fn size(&self) -> BodySize { BodySize::Sized(self.len() as u64) } #[inline] fn poll_next( self: Pin<&mut Self>, _cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { if self.is_empty() { Poll::Ready(None) } else { let bytes = match mem::take(self.get_mut()) { Cow::Borrowed(s) => Bytes::from_static(s.as_bytes()), Cow::Owned(s) => Bytes::from(s.into_bytes()), }; Poll::Ready(Some(Ok(bytes))) } } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { match self { Cow::Borrowed(s) => Ok(Bytes::from_static(s.as_bytes())), Cow::Owned(s) => Ok(Bytes::from(s.into_bytes())), } } } impl MessageBody for bytestring::ByteString { type Error = Infallible; #[inline] fn size(&self) -> BodySize { BodySize::Sized(self.len() as u64) } #[inline] fn poll_next( self: Pin<&mut Self>, _cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { let string = mem::take(self.get_mut()); Poll::Ready(Some(Ok(string.into_bytes()))) } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { Ok(self.into_bytes()) } } } pin_project! { pub(crate) struct MessageBodyMapErr<B, F> { #[pin] body: B, mapper: Option<F>, } } impl<B, F, E> MessageBodyMapErr<B, F> where B: MessageBody, F: FnOnce(B::Error) -> E, { pub(crate) fn new(body: B, mapper: F) -> Self { Self { body, mapper: Some(mapper), } } } impl<B, F, E> MessageBody for MessageBodyMapErr<B, F> where B: MessageBody, F: FnOnce(B::Error) -> E, E: Into<Box<dyn StdError>>, { type Error = E; #[inline] fn size(&self) -> BodySize { self.body.size() } fn poll_next( mut self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Poll<Option<Result<Bytes, Self::Error>>> { let this = self.as_mut().project(); match ready!(this.body.poll_next(cx)) { Some(Err(err)) => { let f = self.as_mut().project().mapper.take().unwrap(); let mapped_err = (f)(err); Poll::Ready(Some(Err(mapped_err))) } Some(Ok(val)) => Poll::Ready(Some(Ok(val))), None => Poll::Ready(None), } } #[inline] fn try_into_bytes(self) -> Result<Bytes, Self> { let Self { body, mapper } = self; body.try_into_bytes().map_err(|body| Self { body, mapper }) } } #[cfg(test)] mod tests { use actix_rt::pin; use actix_utils::future::poll_fn; use futures_util::stream; use super::*; use crate::body::{self, EitherBody}; macro_rules! assert_poll_next { ($pin:expr, $exp:expr) => { assert_eq!( poll_fn(|cx| $pin.as_mut().poll_next(cx)) .await .unwrap() // unwrap option .unwrap(), // unwrap result $exp ); }; } macro_rules! assert_poll_next_none { ($pin:expr) => { assert!(poll_fn(|cx| $pin.as_mut().poll_next(cx)).await.is_none()); }; } #[allow(unused_allocation)] // triggered by `Box::new(()).size()` #[actix_rt::test] async fn boxing_equivalence() { assert_eq!(().size(), BodySize::Sized(0)); assert_eq!(().size(), Box::new(()).size()); assert_eq!(().size(), Box::pin(()).size()); let pl = Box::new(()); pin!(pl); assert_poll_next_none!(pl); let mut pl = Box::pin(()); assert_poll_next_none!(pl); } #[actix_rt::test] async fn mut_equivalence() { assert_eq!(().size(), BodySize::Sized(0)); assert_eq!(().size(), (&(&mut ())).size()); let pl = &mut (); pin!(pl); assert_poll_next_none!(pl); let pl = &mut Box::new(()); pin!(pl); assert_poll_next_none!(pl); let mut body = body::SizedStream::new( 8, stream::iter([ Ok::<_, std::io::Error>(Bytes::from("1234")), Ok(Bytes::from("5678")), ]), ); let body = &mut body; assert_eq!(body.size(), BodySize::Sized(8)); pin!(body); assert_poll_next!(body, Bytes::from_static(b"1234")); assert_poll_next!(body, Bytes::from_static(b"5678")); assert_poll_next_none!(body); } #[allow(clippy::let_unit_value)] #[actix_rt::test] async fn test_unit() { let pl = (); assert_eq!(pl.size(), BodySize::Sized(0)); pin!(pl); assert_poll_next_none!(pl); } #[actix_rt::test] async fn test_static_str() { assert_eq!("".size(), BodySize::Sized(0)); assert_eq!("test".size(), BodySize::Sized(4)); let pl = "test"; pin!(pl); assert_poll_next!(pl, Bytes::from("test")); } #[actix_rt::test] async fn test_static_bytes() { assert_eq!(b"".as_ref().size(), BodySize::Sized(0)); assert_eq!(b"test".as_ref().size(), BodySize::Sized(4)); let pl = b"test".as_ref(); pin!(pl); assert_poll_next!(pl, Bytes::from("test")); } #[actix_rt::test] async fn test_vec() { assert_eq!(vec![0; 0].size(), BodySize::Sized(0)); assert_eq!(Vec::from("test").size(), BodySize::Sized(4)); let pl = Vec::from("test"); pin!(pl); assert_poll_next!(pl, Bytes::from("test")); } #[actix_rt::test] async fn test_bytes() { assert_eq!(Bytes::new().size(), BodySize::Sized(0)); assert_eq!(Bytes::from_static(b"test").size(), BodySize::Sized(4)); let pl = Bytes::from_static(b"test"); pin!(pl); assert_poll_next!(pl, Bytes::from("test")); } #[actix_rt::test] async fn test_bytes_mut() { assert_eq!(BytesMut::new().size(), BodySize::Sized(0)); assert_eq!(BytesMut::from(b"test".as_ref()).size(), BodySize::Sized(4)); let pl = BytesMut::from("test"); pin!(pl); assert_poll_next!(pl, Bytes::from("test")); } #[actix_rt::test] async fn test_string() { assert_eq!(String::new().size(), BodySize::Sized(0)); assert_eq!("test".to_owned().size(), BodySize::Sized(4)); let pl = "test".to_owned(); pin!(pl); assert_poll_next!(pl, Bytes::from("test")); } #[actix_rt::test] async fn complete_body_combinators() { let body = Bytes::from_static(b"test"); let body = BoxBody::new(body); let body = EitherBody::<_, ()>::left(body); let body = EitherBody::<(), _>::right(body); // Do not support try_into_bytes: // let body = Box::new(body); // let body = Box::pin(body); assert_eq!(body.try_into_bytes().unwrap(), Bytes::from("test")); } #[actix_rt::test] async fn complete_body_combinators_poll() { let body = Bytes::from_static(b"test"); let body = BoxBody::new(body); let body = EitherBody::<_, ()>::left(body); let body = EitherBody::<(), _>::right(body); let mut body = body; assert_eq!(body.size(), BodySize::Sized(4)); assert_poll_next!(Pin::new(&mut body), Bytes::from("test")); assert_poll_next_none!(Pin::new(&mut body)); } #[actix_rt::test] async fn none_body_combinators() { fn none_body() -> BoxBody { let body = body::None; let body = BoxBody::new(body); let body = EitherBody::<_, ()>::left(body); let body = EitherBody::<(), _>::right(body); body.boxed() } assert_eq!(none_body().size(), BodySize::None); assert_eq!(none_body().try_into_bytes().unwrap(), Bytes::new()); assert_poll_next_none!(Pin::new(&mut none_body())); } // down-casting used to be done with a method on MessageBody trait // test is kept to demonstrate equivalence of Any trait #[actix_rt::test] async fn test_body_casting() { let mut body = String::from("hello cast"); // let mut resp_body: &mut dyn MessageBody<Error = Error> = &mut body; let resp_body: &mut dyn std::any::Any = &mut body; let body = resp_body.downcast_ref::<String>().unwrap(); assert_eq!(body, "hello cast"); let body = &mut resp_body.downcast_mut::<String>().unwrap(); body.push('!'); let body = resp_body.downcast_ref::<String>().unwrap(); assert_eq!(body, "hello cast!"); let not_body = resp_body.downcast_ref::<()>(); assert!(not_body.is_none()); } #[actix_rt::test] async fn non_owning_to_bytes() { let mut body = BoxBody::new(()); let bytes = body::to_bytes(&mut body).await.unwrap(); assert_eq!(bytes, Bytes::new()); let mut body = body::BodyStream::new(stream::iter([ Ok::<_, std::io::Error>(Bytes::from("1234")), Ok(Bytes::from("5678")), ])); let bytes = body::to_bytes(&mut body).await.unwrap(); assert_eq!(bytes, Bytes::from_static(b"12345678")); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/body/size.rs
actix-http/src/body/size.rs
/// Body size hint. #[derive(Debug, Clone, Copy, PartialEq, Eq)] pub enum BodySize { /// Implicitly empty body. /// /// Will omit the Content-Length header. Used for responses to certain methods (e.g., `HEAD`) or /// with particular status codes (e.g., 204 No Content). Consumers that read this as a body size /// hint are allowed to make optimizations that skip reading or writing the payload. None, /// Known size body. /// /// Will write `Content-Length: N` header. Sized(u64), /// Unknown size body. /// /// Will not write Content-Length header. Can be used with chunked Transfer-Encoding. Stream, } impl BodySize { /// Equivalent to `BodySize::Sized(0)`; pub const ZERO: Self = Self::Sized(0); /// Returns true if size hint indicates omitted or empty body. /// /// Streams will return false because it cannot be known without reading the stream. /// /// ``` /// # use actix_http::body::BodySize; /// assert!(BodySize::None.is_eof()); /// assert!(BodySize::Sized(0).is_eof()); /// /// assert!(!BodySize::Sized(64).is_eof()); /// assert!(!BodySize::Stream.is_eof()); /// ``` pub fn is_eof(&self) -> bool { matches!(self, BodySize::None | BodySize::Sized(0)) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/h1/chunked.rs
actix-http/src/h1/chunked.rs
use std::{io, task::Poll}; use bytes::{Buf as _, Bytes, BytesMut}; use tracing::{debug, trace}; macro_rules! byte ( ($rdr:ident) => ({ if $rdr.len() > 0 { let b = $rdr[0]; $rdr.advance(1); b } else { return Poll::Pending } }) ); #[derive(Debug, Clone, PartialEq, Eq)] pub(super) enum ChunkedState { Size, SizeLws, Extension, SizeLf, Body, BodyCr, BodyLf, EndCr, EndLf, End, } impl ChunkedState { pub(super) fn step( &self, body: &mut BytesMut, size: &mut u64, buf: &mut Option<Bytes>, ) -> Poll<Result<ChunkedState, io::Error>> { use self::ChunkedState::*; match *self { Size => ChunkedState::read_size(body, size), SizeLws => ChunkedState::read_size_lws(body), Extension => ChunkedState::read_extension(body), SizeLf => ChunkedState::read_size_lf(body, *size), Body => ChunkedState::read_body(body, size, buf), BodyCr => ChunkedState::read_body_cr(body), BodyLf => ChunkedState::read_body_lf(body), EndCr => ChunkedState::read_end_cr(body), EndLf => ChunkedState::read_end_lf(body), End => Poll::Ready(Ok(ChunkedState::End)), } } fn read_size(rdr: &mut BytesMut, size: &mut u64) -> Poll<Result<ChunkedState, io::Error>> { let radix = 16; let rem = match byte!(rdr) { b @ b'0'..=b'9' => b - b'0', b @ b'a'..=b'f' => b + 10 - b'a', b @ b'A'..=b'F' => b + 10 - b'A', b'\t' | b' ' => return Poll::Ready(Ok(ChunkedState::SizeLws)), b';' => return Poll::Ready(Ok(ChunkedState::Extension)), b'\r' => return Poll::Ready(Ok(ChunkedState::SizeLf)), _ => { return Poll::Ready(Err(io::Error::new( io::ErrorKind::InvalidInput, "Invalid chunk size line: Invalid Size", ))); } }; match size.checked_mul(radix) { Some(n) => { *size = n; *size += rem as u64; Poll::Ready(Ok(ChunkedState::Size)) } None => { debug!("chunk size would overflow u64"); Poll::Ready(Err(io::Error::new( io::ErrorKind::InvalidInput, "Invalid chunk size line: Size is too big", ))) } } } fn read_size_lws(rdr: &mut BytesMut) -> Poll<Result<ChunkedState, io::Error>> { match byte!(rdr) { // LWS can follow the chunk size, but no more digits can come b'\t' | b' ' => Poll::Ready(Ok(ChunkedState::SizeLws)), b';' => Poll::Ready(Ok(ChunkedState::Extension)), b'\r' => Poll::Ready(Ok(ChunkedState::SizeLf)), _ => Poll::Ready(Err(io::Error::new( io::ErrorKind::InvalidInput, "Invalid chunk size linear white space", ))), } } fn read_extension(rdr: &mut BytesMut) -> Poll<Result<ChunkedState, io::Error>> { match byte!(rdr) { b'\r' => Poll::Ready(Ok(ChunkedState::SizeLf)), // strictly 0x20 (space) should be disallowed but we don't parse quoted strings here 0x00..=0x08 | 0x0a..=0x1f | 0x7f => Poll::Ready(Err(io::Error::new( io::ErrorKind::InvalidInput, "Invalid character in chunk extension", ))), _ => Poll::Ready(Ok(ChunkedState::Extension)), // no supported extensions } } fn read_size_lf(rdr: &mut BytesMut, size: u64) -> Poll<Result<ChunkedState, io::Error>> { match byte!(rdr) { b'\n' if size > 0 => Poll::Ready(Ok(ChunkedState::Body)), b'\n' if size == 0 => Poll::Ready(Ok(ChunkedState::EndCr)), _ => Poll::Ready(Err(io::Error::new( io::ErrorKind::InvalidInput, "Invalid chunk size LF", ))), } } fn read_body( rdr: &mut BytesMut, rem: &mut u64, buf: &mut Option<Bytes>, ) -> Poll<Result<ChunkedState, io::Error>> { trace!("Chunked read, remaining={:?}", rem); let len = rdr.len() as u64; if len == 0 { Poll::Ready(Ok(ChunkedState::Body)) } else { let slice; if *rem > len { slice = rdr.split().freeze(); *rem -= len; } else { slice = rdr.split_to(*rem as usize).freeze(); *rem = 0; } *buf = Some(slice); if *rem > 0 { Poll::Ready(Ok(ChunkedState::Body)) } else { Poll::Ready(Ok(ChunkedState::BodyCr)) } } } fn read_body_cr(rdr: &mut BytesMut) -> Poll<Result<ChunkedState, io::Error>> { match byte!(rdr) { b'\r' => Poll::Ready(Ok(ChunkedState::BodyLf)), _ => Poll::Ready(Err(io::Error::new( io::ErrorKind::InvalidInput, "Invalid chunk body CR", ))), } } fn read_body_lf(rdr: &mut BytesMut) -> Poll<Result<ChunkedState, io::Error>> { match byte!(rdr) { b'\n' => Poll::Ready(Ok(ChunkedState::Size)), _ => Poll::Ready(Err(io::Error::new( io::ErrorKind::InvalidInput, "Invalid chunk body LF", ))), } } fn read_end_cr(rdr: &mut BytesMut) -> Poll<Result<ChunkedState, io::Error>> { match byte!(rdr) { b'\r' => Poll::Ready(Ok(ChunkedState::EndLf)), _ => Poll::Ready(Err(io::Error::new( io::ErrorKind::InvalidInput, "Invalid chunk end CR", ))), } } fn read_end_lf(rdr: &mut BytesMut) -> Poll<Result<ChunkedState, io::Error>> { match byte!(rdr) { b'\n' => Poll::Ready(Ok(ChunkedState::End)), _ => Poll::Ready(Err(io::Error::new( io::ErrorKind::InvalidInput, "Invalid chunk end LF", ))), } } } #[cfg(test)] mod tests { use actix_codec::Decoder as _; use bytes::{Bytes, BytesMut}; use http::Method; use crate::{ error::ParseError, h1::decoder::{MessageDecoder, PayloadItem}, HttpMessage as _, Request, }; macro_rules! parse_ready { ($e:expr) => {{ match MessageDecoder::<Request>::default().decode($e) { Ok(Some((msg, _))) => msg, Ok(_) => unreachable!("Eof during parsing http request"), Err(err) => unreachable!("Error during parsing http request: {:?}", err), } }}; } macro_rules! expect_parse_err { ($e:expr) => {{ match MessageDecoder::<Request>::default().decode($e) { Err(err) => match err { ParseError::Io(_) => unreachable!("Parse error expected"), _ => {} }, _ => unreachable!("Error expected"), } }}; } #[test] fn test_parse_chunked_payload_chunk_extension() { let mut buf = BytesMut::from( "GET /test HTTP/1.1\r\n\ transfer-encoding: chunked\r\n\ \r\n", ); let mut reader = MessageDecoder::<Request>::default(); let (msg, pl) = reader.decode(&mut buf).unwrap().unwrap(); let mut pl = pl.unwrap(); assert!(msg.chunked().unwrap()); buf.extend(b"4;test\r\ndata\r\n4\r\nline\r\n0\r\n\r\n"); // test: test\r\n\r\n") let chunk = pl.decode(&mut buf).unwrap().unwrap().chunk(); assert_eq!(chunk, Bytes::from_static(b"data")); let chunk = pl.decode(&mut buf).unwrap().unwrap().chunk(); assert_eq!(chunk, Bytes::from_static(b"line")); let msg = pl.decode(&mut buf).unwrap().unwrap(); assert!(msg.eof()); } #[test] fn test_request_chunked() { let mut buf = BytesMut::from( "GET /test HTTP/1.1\r\n\ transfer-encoding: chunked\r\n\r\n", ); let req = parse_ready!(&mut buf); if let Ok(val) = req.chunked() { assert!(val); } else { unreachable!("Error"); } // intentional typo in "chunked" let mut buf = BytesMut::from( "GET /test HTTP/1.1\r\n\ transfer-encoding: chnked\r\n\r\n", ); expect_parse_err!(&mut buf); } #[test] fn test_http_request_chunked_payload() { let mut buf = BytesMut::from( "GET /test HTTP/1.1\r\n\ transfer-encoding: chunked\r\n\r\n", ); let mut reader = MessageDecoder::<Request>::default(); let (req, pl) = reader.decode(&mut buf).unwrap().unwrap(); let mut pl = pl.unwrap(); assert!(req.chunked().unwrap()); buf.extend(b"4\r\ndata\r\n4\r\nline\r\n0\r\n\r\n"); assert_eq!( pl.decode(&mut buf).unwrap().unwrap().chunk().as_ref(), b"data" ); assert_eq!( pl.decode(&mut buf).unwrap().unwrap().chunk().as_ref(), b"line" ); assert!(pl.decode(&mut buf).unwrap().unwrap().eof()); } #[test] fn test_http_request_chunked_payload_and_next_message() { let mut buf = BytesMut::from( "GET /test HTTP/1.1\r\n\ transfer-encoding: chunked\r\n\r\n", ); let mut reader = MessageDecoder::<Request>::default(); let (req, pl) = reader.decode(&mut buf).unwrap().unwrap(); let mut pl = pl.unwrap(); assert!(req.chunked().unwrap()); buf.extend( b"4\r\ndata\r\n4\r\nline\r\n0\r\n\r\n\ POST /test2 HTTP/1.1\r\n\ transfer-encoding: chunked\r\n\r\n" .iter(), ); let msg = pl.decode(&mut buf).unwrap().unwrap(); assert_eq!(msg.chunk().as_ref(), b"data"); let msg = pl.decode(&mut buf).unwrap().unwrap(); assert_eq!(msg.chunk().as_ref(), b"line"); let msg = pl.decode(&mut buf).unwrap().unwrap(); assert!(msg.eof()); let (req, _) = reader.decode(&mut buf).unwrap().unwrap(); assert!(req.chunked().unwrap()); assert_eq!(*req.method(), Method::POST); assert!(req.chunked().unwrap()); } #[test] fn test_http_request_chunked_payload_chunks() { let mut buf = BytesMut::from( "GET /test HTTP/1.1\r\n\ transfer-encoding: chunked\r\n\r\n", ); let mut reader = MessageDecoder::<Request>::default(); let (req, pl) = reader.decode(&mut buf).unwrap().unwrap(); let mut pl = pl.unwrap(); assert!(req.chunked().unwrap()); buf.extend(b"4\r\n1111\r\n"); let msg = pl.decode(&mut buf).unwrap().unwrap(); assert_eq!(msg.chunk().as_ref(), b"1111"); buf.extend(b"4\r\ndata\r"); let msg = pl.decode(&mut buf).unwrap().unwrap(); assert_eq!(msg.chunk().as_ref(), b"data"); buf.extend(b"\n4"); assert!(pl.decode(&mut buf).unwrap().is_none()); buf.extend(b"\r"); assert!(pl.decode(&mut buf).unwrap().is_none()); buf.extend(b"\n"); assert!(pl.decode(&mut buf).unwrap().is_none()); buf.extend(b"li"); let msg = pl.decode(&mut buf).unwrap().unwrap(); assert_eq!(msg.chunk().as_ref(), b"li"); //trailers //buf.feed_data("test: test\r\n"); //not_ready!(reader.parse(&mut buf, &mut readbuf)); buf.extend(b"ne\r\n0\r\n"); let msg = pl.decode(&mut buf).unwrap().unwrap(); assert_eq!(msg.chunk().as_ref(), b"ne"); assert!(pl.decode(&mut buf).unwrap().is_none()); buf.extend(b"\r\n"); assert!(pl.decode(&mut buf).unwrap().unwrap().eof()); } #[test] fn chunk_extension_quoted() { let mut buf = BytesMut::from( "GET /test HTTP/1.1\r\n\ Host: localhost:8080\r\n\ Transfer-Encoding: chunked\r\n\ \r\n\ 2;hello=b;one=\"1 2 3\"\r\n\ xx", ); let mut reader = MessageDecoder::<Request>::default(); let (_msg, pl) = reader.decode(&mut buf).unwrap().unwrap(); let mut pl = pl.unwrap(); let chunk = pl.decode(&mut buf).unwrap().unwrap(); assert_eq!(chunk, PayloadItem::Chunk(Bytes::from_static(b"xx"))); } #[test] fn hrs_chunk_extension_invalid() { let mut buf = BytesMut::from( "GET / HTTP/1.1\r\n\ Host: localhost:8080\r\n\ Transfer-Encoding: chunked\r\n\ \r\n\ 2;x\nx\r\n\ 4c\r\n\ 0\r\n", ); let mut reader = MessageDecoder::<Request>::default(); let (_msg, pl) = reader.decode(&mut buf).unwrap().unwrap(); let mut pl = pl.unwrap(); let err = pl.decode(&mut buf).unwrap_err(); assert!(err .to_string() .contains("Invalid character in chunk extension")); } #[test] fn hrs_chunk_size_overflow() { let mut buf = BytesMut::from( "GET / HTTP/1.1\r\n\ Host: example.com\r\n\ Transfer-Encoding: chunked\r\n\ \r\n\ f0000000000000003\r\n\ abc\r\n\ 0\r\n", ); let mut reader = MessageDecoder::<Request>::default(); let (_msg, pl) = reader.decode(&mut buf).unwrap().unwrap(); let mut pl = pl.unwrap(); let err = pl.decode(&mut buf).unwrap_err(); assert!(err .to_string() .contains("Invalid chunk size line: Size is too big")); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/h1/encoder.rs
actix-http/src/h1/encoder.rs
use std::{ cmp, io::{self, Write as _}, marker::PhantomData, ptr::copy_nonoverlapping, slice::from_raw_parts_mut, }; use bytes::{BufMut, BytesMut}; use crate::{ body::BodySize, header::{ map::Value, HeaderMap, HeaderName, CONNECTION, CONTENT_LENGTH, DATE, TRANSFER_ENCODING, }, helpers, ConnectionType, RequestHeadType, Response, ServiceConfig, StatusCode, Version, }; const AVERAGE_HEADER_SIZE: usize = 30; #[derive(Debug)] pub(crate) struct MessageEncoder<T: MessageType> { #[allow(dead_code)] pub length: BodySize, pub te: TransferEncoding, _phantom: PhantomData<T>, } impl<T: MessageType> Default for MessageEncoder<T> { fn default() -> Self { MessageEncoder { length: BodySize::None, te: TransferEncoding::empty(), _phantom: PhantomData, } } } pub(crate) trait MessageType: Sized { fn status(&self) -> Option<StatusCode>; fn headers(&self) -> &HeaderMap; fn extra_headers(&self) -> Option<&HeaderMap>; fn camel_case(&self) -> bool { false } fn chunked(&self) -> bool; fn encode_status(&mut self, dst: &mut BytesMut) -> io::Result<()>; fn encode_headers( &mut self, dst: &mut BytesMut, version: Version, mut length: BodySize, conn_type: ConnectionType, config: &ServiceConfig, ) -> io::Result<()> { let chunked = self.chunked(); let mut skip_len = length != BodySize::Stream; let camel_case = self.camel_case(); // Content length if let Some(status) = self.status() { match status { StatusCode::CONTINUE | StatusCode::SWITCHING_PROTOCOLS | StatusCode::PROCESSING | StatusCode::NO_CONTENT => { // skip content-length and transfer-encoding headers // see https://datatracker.ietf.org/doc/html/rfc7230#section-3.3.1 // and https://datatracker.ietf.org/doc/html/rfc7230#section-3.3.2 skip_len = true; length = BodySize::None } StatusCode::NOT_MODIFIED => { // 304 responses should never have a body but should retain a manually set // content-length header // see https://datatracker.ietf.org/doc/html/rfc7232#section-4.1 skip_len = false; length = BodySize::None; } _ => {} } } match length { BodySize::Stream => { if chunked { skip_len = true; if camel_case { dst.put_slice(b"\r\nTransfer-Encoding: chunked\r\n") } else { dst.put_slice(b"\r\ntransfer-encoding: chunked\r\n") } } else { skip_len = false; dst.put_slice(b"\r\n"); } } BodySize::Sized(0) if camel_case => dst.put_slice(b"\r\nContent-Length: 0\r\n"), BodySize::Sized(0) => dst.put_slice(b"\r\ncontent-length: 0\r\n"), BodySize::Sized(len) => helpers::write_content_length(len, dst, camel_case), BodySize::None => dst.put_slice(b"\r\n"), } // Connection match conn_type { ConnectionType::Upgrade => dst.put_slice(b"connection: upgrade\r\n"), ConnectionType::KeepAlive if version < Version::HTTP_11 => { if camel_case { dst.put_slice(b"Connection: keep-alive\r\n") } else { dst.put_slice(b"connection: keep-alive\r\n") } } ConnectionType::Close if version >= Version::HTTP_11 => { if camel_case { dst.put_slice(b"Connection: close\r\n") } else { dst.put_slice(b"connection: close\r\n") } } _ => {} } // write headers let mut has_date = false; let mut buf = dst.chunk_mut().as_mut_ptr(); let mut remaining = dst.capacity() - dst.len(); // tracks bytes written since last buffer resize // since buf is a raw pointer to a bytes container storage but is written to without the // container's knowledge, this is used to sync the containers cursor after data is written let mut pos = 0; self.write_headers(|key, value| { match *key { CONNECTION => return, TRANSFER_ENCODING | CONTENT_LENGTH if skip_len => return, DATE => has_date = true, _ => {} } let k = key.as_str().as_bytes(); let k_len = k.len(); for val in value.iter() { let v = val.as_ref(); let v_len = v.len(); // key length + value length + colon + space + \r\n let len = k_len + v_len + 4; if len > remaining { // SAFETY: all the bytes written up to position "pos" are initialized // the written byte count and pointer advancement are kept in sync unsafe { dst.advance_mut(pos); } pos = 0; dst.reserve(len * 2); remaining = dst.capacity() - dst.len(); // re-assign buf raw pointer since it's possible that the buffer was // reallocated and/or resized buf = dst.chunk_mut().as_mut_ptr(); } // SAFETY: on each write, it is enough to ensure that the advancement of // the cursor matches the number of bytes written unsafe { if camel_case { // use Camel-Case headers write_camel_case(k, buf, k_len); } else { write_data(k, buf, k_len); } buf = buf.add(k_len); write_data(b": ", buf, 2); buf = buf.add(2); write_data(v, buf, v_len); buf = buf.add(v_len); write_data(b"\r\n", buf, 2); buf = buf.add(2); }; pos += len; remaining -= len; } }); // final cursor synchronization with the bytes container // // SAFETY: all the bytes written up to position "pos" are initialized // the written byte count and pointer advancement are kept in sync unsafe { dst.advance_mut(pos); } if !has_date { // optimized date header, write_date_header writes its own \r\n config.write_date_header(dst, camel_case); } // end-of-headers marker dst.extend_from_slice(b"\r\n"); Ok(()) } fn write_headers<F>(&mut self, mut f: F) where F: FnMut(&HeaderName, &Value), { match self.extra_headers() { Some(headers) => { // merging headers from head and extra headers. self.headers() .inner .iter() .filter(|(name, _)| !headers.contains_key(*name)) .chain(headers.inner.iter()) .for_each(|(k, v)| f(k, v)) } None => self.headers().inner.iter().for_each(|(k, v)| f(k, v)), } } } impl MessageType for Response<()> { fn status(&self) -> Option<StatusCode> { Some(self.head().status) } fn chunked(&self) -> bool { self.head().chunked() } fn headers(&self) -> &HeaderMap { &self.head().headers } fn extra_headers(&self) -> Option<&HeaderMap> { None } fn camel_case(&self) -> bool { self.head() .flags .contains(crate::message::Flags::CAMEL_CASE) } fn encode_status(&mut self, dst: &mut BytesMut) -> io::Result<()> { let head = self.head(); let reason = head.reason().as_bytes(); dst.reserve(256 + head.headers.len() * AVERAGE_HEADER_SIZE + reason.len()); // status line helpers::write_status_line(head.version, head.status.as_u16(), dst); dst.put_slice(reason); Ok(()) } } impl MessageType for RequestHeadType { fn status(&self) -> Option<StatusCode> { None } fn chunked(&self) -> bool { self.as_ref().chunked() } fn camel_case(&self) -> bool { self.as_ref().camel_case_headers() } fn headers(&self) -> &HeaderMap { self.as_ref().headers() } fn extra_headers(&self) -> Option<&HeaderMap> { self.extra_headers() } fn encode_status(&mut self, dst: &mut BytesMut) -> io::Result<()> { let head = self.as_ref(); dst.reserve(256 + head.headers.len() * AVERAGE_HEADER_SIZE); write!( helpers::MutWriter(dst), "{} {} {}", head.method, head.uri.path_and_query().map(|u| u.as_str()).unwrap_or("/"), match head.version { Version::HTTP_09 => "HTTP/0.9", Version::HTTP_10 => "HTTP/1.0", Version::HTTP_11 => "HTTP/1.1", Version::HTTP_2 => "HTTP/2.0", Version::HTTP_3 => "HTTP/3.0", _ => return Err(io::Error::other("Unsupported version")), } ) .map_err(io::Error::other) } } impl<T: MessageType> MessageEncoder<T> { /// Encode chunk. pub fn encode_chunk(&mut self, msg: &[u8], buf: &mut BytesMut) -> io::Result<bool> { self.te.encode(msg, buf) } /// Encode EOF. pub fn encode_eof(&mut self, buf: &mut BytesMut) -> io::Result<()> { self.te.encode_eof(buf) } /// Encode message. pub fn encode( &mut self, dst: &mut BytesMut, message: &mut T, head: bool, stream: bool, version: Version, length: BodySize, conn_type: ConnectionType, config: &ServiceConfig, ) -> io::Result<()> { // transfer encoding if !head { self.te = match length { BodySize::Sized(0) => TransferEncoding::empty(), BodySize::Sized(len) => TransferEncoding::length(len), BodySize::Stream => { if message.chunked() && !stream { TransferEncoding::chunked() } else { TransferEncoding::eof() } } BodySize::None => TransferEncoding::empty(), }; } else { self.te = TransferEncoding::empty(); } message.encode_status(dst)?; message.encode_headers(dst, version, length, conn_type, config) } } /// Encoders to handle different Transfer-Encodings. #[derive(Debug)] pub(crate) struct TransferEncoding { kind: TransferEncodingKind, } #[derive(Debug, PartialEq, Clone)] enum TransferEncodingKind { /// An Encoder for when Transfer-Encoding includes `chunked`. Chunked(bool), /// An Encoder for when Content-Length is set. /// /// Enforces that the body is not longer than the Content-Length header. Length(u64), /// An Encoder for when Content-Length is not known. /// /// Application decides when to stop writing. Eof, } impl TransferEncoding { #[inline] pub fn empty() -> TransferEncoding { TransferEncoding { kind: TransferEncodingKind::Length(0), } } #[inline] pub fn eof() -> TransferEncoding { TransferEncoding { kind: TransferEncodingKind::Eof, } } #[inline] pub fn chunked() -> TransferEncoding { TransferEncoding { kind: TransferEncodingKind::Chunked(false), } } #[inline] pub fn length(len: u64) -> TransferEncoding { TransferEncoding { kind: TransferEncodingKind::Length(len), } } /// Encode message. Return `EOF` state of encoder #[inline] pub fn encode(&mut self, msg: &[u8], buf: &mut BytesMut) -> io::Result<bool> { match self.kind { TransferEncodingKind::Eof => { let eof = msg.is_empty(); buf.extend_from_slice(msg); Ok(eof) } TransferEncodingKind::Chunked(ref mut eof) => { if *eof { return Ok(true); } if msg.is_empty() { *eof = true; buf.extend_from_slice(b"0\r\n\r\n"); } else { writeln!(helpers::MutWriter(buf), "{:X}\r", msg.len()) .map_err(io::Error::other)?; buf.reserve(msg.len() + 2); buf.extend_from_slice(msg); buf.extend_from_slice(b"\r\n"); } Ok(*eof) } TransferEncodingKind::Length(ref mut remaining) => { if *remaining > 0 { if msg.is_empty() { return Ok(*remaining == 0); } let len = cmp::min(*remaining, msg.len() as u64); buf.extend_from_slice(&msg[..len as usize]); *remaining -= len; Ok(*remaining == 0) } else { Ok(true) } } } } /// Encode eof. Return `EOF` state of encoder #[inline] pub fn encode_eof(&mut self, buf: &mut BytesMut) -> io::Result<()> { match self.kind { TransferEncodingKind::Eof => Ok(()), TransferEncodingKind::Length(rem) => { if rem != 0 { Err(io::Error::new(io::ErrorKind::UnexpectedEof, "")) } else { Ok(()) } } TransferEncodingKind::Chunked(ref mut eof) => { if !*eof { *eof = true; buf.extend_from_slice(b"0\r\n\r\n"); } Ok(()) } } } } /// # Safety /// Callers must ensure that the given `len` matches the given `value` length and that `buf` is /// valid for writes of at least `len` bytes. unsafe fn write_data(value: &[u8], buf: *mut u8, len: usize) { debug_assert_eq!(value.len(), len); copy_nonoverlapping(value.as_ptr(), buf, len); } /// # Safety /// Callers must ensure that the given `len` matches the given `value` length and that `buf` is /// valid for writes of at least `len` bytes. unsafe fn write_camel_case(value: &[u8], buf: *mut u8, len: usize) { // first copy entire (potentially wrong) slice to output write_data(value, buf, len); // SAFETY: We just initialized the buffer with `value` let buffer = from_raw_parts_mut(buf, len); let mut iter = value.iter(); // first character should be uppercase if let Some(c @ b'a'..=b'z') = iter.next() { buffer[0] = c & 0b1101_1111; } // track 1 ahead of the current position since that's the location being assigned to let mut index = 2; // remaining characters after hyphens should also be uppercase while let Some(&c) = iter.next() { if c == b'-' { // advance iter by one and uppercase if needed if let Some(c @ b'a'..=b'z') = iter.next() { buffer[index] = c & 0b1101_1111; } index += 1; } index += 1; } } #[cfg(test)] mod tests { use std::rc::Rc; use bytes::Bytes; use http::header::{AUTHORIZATION, UPGRADE_INSECURE_REQUESTS}; use super::*; use crate::{ header::{HeaderValue, CONTENT_TYPE}, RequestHead, }; #[test] fn test_chunked_te() { let mut bytes = BytesMut::new(); let mut enc = TransferEncoding::chunked(); { assert!(!enc.encode(b"test", &mut bytes).ok().unwrap()); assert!(enc.encode(b"", &mut bytes).ok().unwrap()); } assert_eq!( bytes.split().freeze(), Bytes::from_static(b"4\r\ntest\r\n0\r\n\r\n") ); } #[actix_rt::test] async fn test_camel_case() { let mut bytes = BytesMut::with_capacity(2048); let mut head = RequestHead::default(); head.set_camel_case_headers(true); head.headers.insert(DATE, HeaderValue::from_static("date")); head.headers .insert(CONTENT_TYPE, HeaderValue::from_static("plain/text")); head.headers .insert(UPGRADE_INSECURE_REQUESTS, HeaderValue::from_static("1")); let mut head = RequestHeadType::Owned(head); let _ = head.encode_headers( &mut bytes, Version::HTTP_11, BodySize::Sized(0), ConnectionType::Close, &ServiceConfig::default(), ); let data = String::from_utf8(Vec::from(bytes.split().freeze().as_ref())).unwrap(); assert!(data.contains("Content-Length: 0\r\n")); assert!(data.contains("Connection: close\r\n")); assert!(data.contains("Content-Type: plain/text\r\n")); assert!(data.contains("Date: date\r\n")); assert!(data.contains("Upgrade-Insecure-Requests: 1\r\n")); let _ = head.encode_headers( &mut bytes, Version::HTTP_11, BodySize::Stream, ConnectionType::KeepAlive, &ServiceConfig::default(), ); let data = String::from_utf8(Vec::from(bytes.split().freeze().as_ref())).unwrap(); assert!(data.contains("Transfer-Encoding: chunked\r\n")); assert!(data.contains("Content-Type: plain/text\r\n")); assert!(data.contains("Date: date\r\n")); let mut head = RequestHead::default(); head.set_camel_case_headers(false); head.headers.insert(DATE, HeaderValue::from_static("date")); head.headers .insert(CONTENT_TYPE, HeaderValue::from_static("plain/text")); head.headers .append(CONTENT_TYPE, HeaderValue::from_static("xml")); let mut head = RequestHeadType::Owned(head); let _ = head.encode_headers( &mut bytes, Version::HTTP_11, BodySize::Stream, ConnectionType::KeepAlive, &ServiceConfig::default(), ); let data = String::from_utf8(Vec::from(bytes.split().freeze().as_ref())).unwrap(); assert!(data.contains("transfer-encoding: chunked\r\n")); assert!(data.contains("content-type: xml\r\n")); assert!(data.contains("content-type: plain/text\r\n")); assert!(data.contains("date: date\r\n")); } #[actix_rt::test] async fn test_extra_headers() { let mut bytes = BytesMut::with_capacity(2048); let mut head = RequestHead::default(); head.headers.insert( AUTHORIZATION, HeaderValue::from_static("some authorization"), ); let mut extra_headers = HeaderMap::new(); extra_headers.insert( AUTHORIZATION, HeaderValue::from_static("another authorization"), ); extra_headers.insert(DATE, HeaderValue::from_static("date")); let mut head = RequestHeadType::Rc(Rc::new(head), Some(extra_headers)); let _ = head.encode_headers( &mut bytes, Version::HTTP_11, BodySize::Sized(0), ConnectionType::Close, &ServiceConfig::default(), ); let data = String::from_utf8(Vec::from(bytes.split().freeze().as_ref())).unwrap(); assert!(data.contains("content-length: 0\r\n")); assert!(data.contains("connection: close\r\n")); assert!(data.contains("authorization: another authorization\r\n")); assert!(data.contains("date: date\r\n")); } #[actix_rt::test] async fn test_no_content_length() { let mut bytes = BytesMut::with_capacity(2048); let mut res = Response::with_body(StatusCode::SWITCHING_PROTOCOLS, ()); res.headers_mut().insert(DATE, HeaderValue::from_static("")); res.headers_mut() .insert(CONTENT_LENGTH, HeaderValue::from_static("0")); let _ = res.encode_headers( &mut bytes, Version::HTTP_11, BodySize::Stream, ConnectionType::Upgrade, &ServiceConfig::default(), ); let data = String::from_utf8(Vec::from(bytes.split().freeze().as_ref())).unwrap(); assert!(!data.contains("content-length: 0\r\n")); assert!(!data.contains("transfer-encoding: chunked\r\n")); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/h1/codec.rs
actix-http/src/h1/codec.rs
use std::{fmt, io}; use bitflags::bitflags; use bytes::BytesMut; use http::{Method, Version}; use tokio_util::codec::{Decoder, Encoder}; use super::{ decoder::{self, PayloadDecoder, PayloadItem, PayloadType}, encoder, Message, MessageType, }; use crate::{body::BodySize, error::ParseError, ConnectionType, Request, Response, ServiceConfig}; bitflags! { #[derive(Debug, Clone, Copy)] struct Flags: u8 { const HEAD = 0b0000_0001; const KEEP_ALIVE_ENABLED = 0b0000_0010; const STREAM = 0b0000_0100; } } /// HTTP/1 Codec pub struct Codec { config: ServiceConfig, decoder: decoder::MessageDecoder<Request>, payload: Option<PayloadDecoder>, version: Version, conn_type: ConnectionType, // encoder part flags: Flags, encoder: encoder::MessageEncoder<Response<()>>, } impl Default for Codec { fn default() -> Self { Codec::new(ServiceConfig::default()) } } impl fmt::Debug for Codec { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { f.debug_struct("h1::Codec") .field("flags", &self.flags) .finish_non_exhaustive() } } impl Codec { /// Create HTTP/1 codec. /// /// `keepalive_enabled` how response `connection` header get generated. pub fn new(config: ServiceConfig) -> Self { let flags = if config.keep_alive().enabled() { Flags::KEEP_ALIVE_ENABLED } else { Flags::empty() }; Codec { config, flags, decoder: decoder::MessageDecoder::default(), payload: None, version: Version::HTTP_11, conn_type: ConnectionType::Close, encoder: encoder::MessageEncoder::default(), } } /// Check if request is upgrade. #[inline] pub fn upgrade(&self) -> bool { self.conn_type == ConnectionType::Upgrade } /// Check if last response is keep-alive. #[inline] pub fn keep_alive(&self) -> bool { self.conn_type == ConnectionType::KeepAlive } /// Check if keep-alive enabled on server level. #[inline] pub fn keep_alive_enabled(&self) -> bool { self.flags.contains(Flags::KEEP_ALIVE_ENABLED) } /// Check last request's message type. #[inline] pub fn message_type(&self) -> MessageType { if self.flags.contains(Flags::STREAM) { MessageType::Stream } else if self.payload.is_none() { MessageType::None } else { MessageType::Payload } } #[inline] pub fn config(&self) -> &ServiceConfig { &self.config } } impl Decoder for Codec { type Item = Message<Request>; type Error = ParseError; fn decode(&mut self, src: &mut BytesMut) -> Result<Option<Self::Item>, Self::Error> { if let Some(ref mut payload) = self.payload { Ok(match payload.decode(src)? { Some(PayloadItem::Chunk(chunk)) => Some(Message::Chunk(Some(chunk))), Some(PayloadItem::Eof) => { self.payload.take(); Some(Message::Chunk(None)) } None => None, }) } else if let Some((req, payload)) = self.decoder.decode(src)? { let head = req.head(); self.flags.set(Flags::HEAD, head.method == Method::HEAD); self.version = head.version; self.conn_type = head.connection_type(); if self.conn_type == ConnectionType::KeepAlive && !self.flags.contains(Flags::KEEP_ALIVE_ENABLED) { self.conn_type = ConnectionType::Close } match payload { PayloadType::None => self.payload = None, PayloadType::Payload(pl) => self.payload = Some(pl), PayloadType::Stream(pl) => { self.payload = Some(pl); self.flags.insert(Flags::STREAM); } } Ok(Some(Message::Item(req))) } else { Ok(None) } } } impl Encoder<Message<(Response<()>, BodySize)>> for Codec { type Error = io::Error; fn encode( &mut self, item: Message<(Response<()>, BodySize)>, dst: &mut BytesMut, ) -> Result<(), Self::Error> { match item { Message::Item((mut res, length)) => { // set response version res.head_mut().version = self.version; // connection status self.conn_type = if let Some(ct) = res.head().conn_type() { if ct == ConnectionType::KeepAlive { self.conn_type } else { ct } } else { self.conn_type }; // encode message self.encoder.encode( dst, &mut res, self.flags.contains(Flags::HEAD), self.flags.contains(Flags::STREAM), self.version, length, self.conn_type, &self.config, )?; } Message::Chunk(Some(bytes)) => { self.encoder.encode_chunk(bytes.as_ref(), dst)?; } Message::Chunk(None) => { self.encoder.encode_eof(dst)?; } } Ok(()) } } #[cfg(test)] mod tests { use super::*; use crate::HttpMessage as _; #[actix_rt::test] async fn test_http_request_chunked_payload_and_next_message() { let mut codec = Codec::default(); let mut buf = BytesMut::from( "GET /test HTTP/1.1\r\n\ transfer-encoding: chunked\r\n\r\n", ); let item = codec.decode(&mut buf).unwrap().unwrap(); let req = item.message(); assert_eq!(req.method(), Method::GET); assert!(req.chunked().unwrap()); buf.extend( b"4\r\ndata\r\n4\r\nline\r\n0\r\n\r\n\ POST /test2 HTTP/1.1\r\n\ transfer-encoding: chunked\r\n\r\n" .iter(), ); let msg = codec.decode(&mut buf).unwrap().unwrap(); assert_eq!(msg.chunk().as_ref(), b"data"); let msg = codec.decode(&mut buf).unwrap().unwrap(); assert_eq!(msg.chunk().as_ref(), b"line"); let msg = codec.decode(&mut buf).unwrap().unwrap(); assert!(msg.eof()); // decode next message let item = codec.decode(&mut buf).unwrap().unwrap(); let req = item.message(); assert_eq!(*req.method(), Method::POST); assert!(req.chunked().unwrap()); } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/h1/dispatcher.rs
actix-http/src/h1/dispatcher.rs
use std::{ collections::VecDeque, fmt, future::Future, io, mem, net, pin::Pin, rc::Rc, task::{Context, Poll}, }; use actix_codec::{Framed, FramedParts}; use actix_rt::time::sleep_until; use actix_service::Service; use bitflags::bitflags; use bytes::{Buf, BytesMut}; use futures_core::ready; use pin_project_lite::pin_project; use tokio::io::{AsyncRead, AsyncWrite}; use tokio_util::codec::{Decoder as _, Encoder as _}; use tracing::{error, trace}; use super::{ codec::Codec, decoder::MAX_BUFFER_SIZE, payload::{Payload, PayloadSender, PayloadStatus}, timer::TimerState, Message, MessageType, }; use crate::{ body::{BodySize, BoxBody, MessageBody}, config::ServiceConfig, error::{DispatchError, ParseError, PayloadError}, service::HttpFlow, Error, Extensions, OnConnectData, Request, Response, StatusCode, }; const LW_BUFFER_SIZE: usize = 1024; const HW_BUFFER_SIZE: usize = 1024 * 8; const MAX_PIPELINED_MESSAGES: usize = 16; bitflags! { #[derive(Debug, Clone, Copy)] pub struct Flags: u8 { /// Set when stream is read for first time. const STARTED = 0b0000_0001; /// Set when full request-response cycle has occurred. const FINISHED = 0b0000_0010; /// Set if connection is in keep-alive (inactive) state. const KEEP_ALIVE = 0b0000_0100; /// Set if in shutdown procedure. const SHUTDOWN = 0b0000_1000; /// Set if read-half is disconnected. const READ_DISCONNECT = 0b0001_0000; /// Set if write-half is disconnected. const WRITE_DISCONNECT = 0b0010_0000; } } // there's 2 versions of Dispatcher state because of: // https://github.com/taiki-e/pin-project-lite/issues/3 // // tl;dr: pin-project-lite doesn't play well with other attribute macros #[cfg(not(test))] pin_project! { /// Dispatcher for HTTP/1.1 protocol pub struct Dispatcher<T, S, B, X, U> where S: Service<Request>, S::Error: Into<Response<BoxBody>>, B: MessageBody, X: Service<Request, Response = Request>, X::Error: Into<Response<BoxBody>>, U: Service<(Request, Framed<T, Codec>), Response = ()>, U::Error: fmt::Display, { #[pin] inner: DispatcherState<T, S, B, X, U>, } } #[cfg(test)] pin_project! { /// Dispatcher for HTTP/1.1 protocol pub struct Dispatcher<T, S, B, X, U> where S: Service<Request>, S::Error: Into<Response<BoxBody>>, B: MessageBody, X: Service<Request, Response = Request>, X::Error: Into<Response<BoxBody>>, U: Service<(Request, Framed<T, Codec>), Response = ()>, U::Error: fmt::Display, { #[pin] pub(super) inner: DispatcherState<T, S, B, X, U>, // used in tests pub(super) poll_count: u64, } } pin_project! { #[project = DispatcherStateProj] pub(super) enum DispatcherState<T, S, B, X, U> where S: Service<Request>, S::Error: Into<Response<BoxBody>>, B: MessageBody, X: Service<Request, Response = Request>, X::Error: Into<Response<BoxBody>>, U: Service<(Request, Framed<T, Codec>), Response = ()>, U::Error: fmt::Display, { Normal { #[pin] inner: InnerDispatcher<T, S, B, X, U> }, Upgrade { #[pin] fut: U::Future }, } } pin_project! { #[project = InnerDispatcherProj] pub(super) struct InnerDispatcher<T, S, B, X, U> where S: Service<Request>, S::Error: Into<Response<BoxBody>>, B: MessageBody, X: Service<Request, Response = Request>, X::Error: Into<Response<BoxBody>>, U: Service<(Request, Framed<T, Codec>), Response = ()>, U::Error: fmt::Display, { flow: Rc<HttpFlow<S, X, U>>, pub(super) flags: Flags, peer_addr: Option<net::SocketAddr>, conn_data: Option<Rc<Extensions>>, config: ServiceConfig, error: Option<DispatchError>, #[pin] pub(super) state: State<S, B, X>, // when Some(_) dispatcher is in state of receiving request payload payload: Option<PayloadSender>, messages: VecDeque<DispatcherMessage>, head_timer: TimerState, ka_timer: TimerState, shutdown_timer: TimerState, pub(super) io: Option<T>, read_buf: BytesMut, write_buf: BytesMut, codec: Codec, } } enum DispatcherMessage { Item(Request), Upgrade(Request), Error(Response<()>), } pin_project! { #[project = StateProj] pub(super) enum State<S, B, X> where S: Service<Request>, X: Service<Request, Response = Request>, B: MessageBody, { None, ExpectCall { #[pin] fut: X::Future }, ServiceCall { #[pin] fut: S::Future }, SendPayload { #[pin] body: B }, SendErrorPayload { #[pin] body: BoxBody }, } } impl<S, B, X> State<S, B, X> where S: Service<Request>, X: Service<Request, Response = Request>, B: MessageBody, { pub(super) fn is_none(&self) -> bool { matches!(self, State::None) } } impl<S, B, X> fmt::Debug for State<S, B, X> where S: Service<Request>, X: Service<Request, Response = Request>, B: MessageBody, { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { match self { Self::None => write!(f, "State::None"), Self::ExpectCall { .. } => f.debug_struct("State::ExpectCall").finish_non_exhaustive(), Self::ServiceCall { .. } => { f.debug_struct("State::ServiceCall").finish_non_exhaustive() } Self::SendPayload { .. } => { f.debug_struct("State::SendPayload").finish_non_exhaustive() } Self::SendErrorPayload { .. } => f .debug_struct("State::SendErrorPayload") .finish_non_exhaustive(), } } } #[derive(Debug)] enum PollResponse { Upgrade(Request), DoNothing, DrainWriteBuf, } impl<T, S, B, X, U> Dispatcher<T, S, B, X, U> where T: AsyncRead + AsyncWrite + Unpin, S: Service<Request>, S::Error: Into<Response<BoxBody>>, S::Response: Into<Response<B>>, B: MessageBody, X: Service<Request, Response = Request>, X::Error: Into<Response<BoxBody>>, U: Service<(Request, Framed<T, Codec>), Response = ()>, U::Error: fmt::Display, { /// Create HTTP/1 dispatcher. pub(crate) fn new( io: T, flow: Rc<HttpFlow<S, X, U>>, config: ServiceConfig, peer_addr: Option<net::SocketAddr>, conn_data: OnConnectData, ) -> Self { Dispatcher { inner: DispatcherState::Normal { inner: InnerDispatcher { flow, flags: Flags::empty(), peer_addr, conn_data: conn_data.0.map(Rc::new), config: config.clone(), error: None, state: State::None, payload: None, messages: VecDeque::new(), head_timer: TimerState::new(config.client_request_deadline().is_some()), ka_timer: TimerState::new(config.keep_alive().enabled()), shutdown_timer: TimerState::new(config.client_disconnect_deadline().is_some()), io: Some(io), read_buf: BytesMut::with_capacity(HW_BUFFER_SIZE), write_buf: BytesMut::with_capacity(HW_BUFFER_SIZE), codec: Codec::new(config), }, }, #[cfg(test)] poll_count: 0, } } } impl<T, S, B, X, U> InnerDispatcher<T, S, B, X, U> where T: AsyncRead + AsyncWrite + Unpin, S: Service<Request>, S::Error: Into<Response<BoxBody>>, S::Response: Into<Response<B>>, B: MessageBody, X: Service<Request, Response = Request>, X::Error: Into<Response<BoxBody>>, U: Service<(Request, Framed<T, Codec>), Response = ()>, U::Error: fmt::Display, { fn can_read(&self, cx: &mut Context<'_>) -> bool { if self.flags.contains(Flags::READ_DISCONNECT) { false } else if let Some(ref info) = self.payload { info.need_read(cx) == PayloadStatus::Read } else { true } } fn client_disconnected(self: Pin<&mut Self>) { let this = self.project(); this.flags .insert(Flags::READ_DISCONNECT | Flags::WRITE_DISCONNECT); if let Some(mut payload) = this.payload.take() { payload.set_error(PayloadError::Incomplete(None)); } } fn poll_flush(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Result<(), io::Error>> { let InnerDispatcherProj { io, write_buf, .. } = self.project(); let mut io = Pin::new(io.as_mut().unwrap()); let len = write_buf.len(); let mut written = 0; while written < len { match io.as_mut().poll_write(cx, &write_buf[written..])? { Poll::Ready(0) => { error!("write zero; closing"); return Poll::Ready(Err(io::Error::new(io::ErrorKind::WriteZero, ""))); } Poll::Ready(n) => written += n, Poll::Pending => { write_buf.advance(written); return Poll::Pending; } } } // everything has written to I/O; clear buffer write_buf.clear(); // flush the I/O and check if get blocked io.poll_flush(cx) } fn send_response_inner( self: Pin<&mut Self>, res: Response<()>, body: &impl MessageBody, ) -> Result<BodySize, DispatchError> { let this = self.project(); let size = body.size(); this.codec .encode(Message::Item((res, size)), this.write_buf) .map_err(|err| { if let Some(mut payload) = this.payload.take() { payload.set_error(PayloadError::Incomplete(None)); } DispatchError::Io(err) })?; Ok(size) } fn send_response( mut self: Pin<&mut Self>, res: Response<()>, body: B, ) -> Result<(), DispatchError> { let size = self.as_mut().send_response_inner(res, &body)?; let mut this = self.project(); this.state.set(match size { BodySize::None | BodySize::Sized(0) => { let payload_unfinished = this.payload.is_some(); if payload_unfinished { this.flags.insert(Flags::SHUTDOWN | Flags::FINISHED); } else { this.flags.insert(Flags::FINISHED); } State::None } _ => State::SendPayload { body }, }); Ok(()) } fn send_error_response( mut self: Pin<&mut Self>, res: Response<()>, body: BoxBody, ) -> Result<(), DispatchError> { let size = self.as_mut().send_response_inner(res, &body)?; let mut this = self.project(); this.state.set(match size { BodySize::None | BodySize::Sized(0) => { let payload_unfinished = this.payload.is_some(); if payload_unfinished { this.flags.insert(Flags::SHUTDOWN | Flags::FINISHED); } else { this.flags.insert(Flags::FINISHED); } State::None } _ => State::SendErrorPayload { body }, }); Ok(()) } fn send_continue(self: Pin<&mut Self>) { self.project() .write_buf .extend_from_slice(b"HTTP/1.1 100 Continue\r\n\r\n"); } fn poll_response( mut self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Result<PollResponse, DispatchError> { 'res: loop { let mut this = self.as_mut().project(); match this.state.as_mut().project() { // no future is in InnerDispatcher state; pop next message StateProj::None => match this.messages.pop_front() { // handle request message Some(DispatcherMessage::Item(req)) => { // Handle `EXPECT: 100-Continue` header if req.head().expect() { // set InnerDispatcher state and continue loop to poll it let fut = this.flow.expect.call(req); this.state.set(State::ExpectCall { fut }); } else { // set InnerDispatcher state and continue loop to poll it let fut = this.flow.service.call(req); this.state.set(State::ServiceCall { fut }); }; } // handle error message Some(DispatcherMessage::Error(res)) => { // send_response would update InnerDispatcher state to SendPayload or None // (If response body is empty) // continue loop to poll it self.as_mut().send_error_response(res, BoxBody::new(()))?; } // return with upgrade request and poll it exclusively Some(DispatcherMessage::Upgrade(req)) => return Ok(PollResponse::Upgrade(req)), // all messages are dealt with None => { // start keep-alive if last request allowed it this.flags.set(Flags::KEEP_ALIVE, this.codec.keep_alive()); return Ok(PollResponse::DoNothing); } }, StateProj::ServiceCall { fut } => { match fut.poll(cx) { // service call resolved. send response. Poll::Ready(Ok(res)) => { let (res, body) = res.into().replace_body(()); self.as_mut().send_response(res, body)?; } // send service call error as response Poll::Ready(Err(err)) => { let res: Response<BoxBody> = err.into(); let (res, body) = res.replace_body(()); self.as_mut().send_error_response(res, body)?; } // service call pending and could be waiting for more chunk messages // (pipeline message limit and/or payload can_read limit) Poll::Pending => { // no new message is decoded and no new payload is fed // nothing to do except waiting for new incoming data from client if !self.as_mut().poll_request(cx)? { return Ok(PollResponse::DoNothing); } // else loop } } } StateProj::SendPayload { mut body } => { // keep populate writer buffer until buffer size limit hit, // get blocked or finished. while this.write_buf.len() < super::payload::MAX_BUFFER_SIZE { match body.as_mut().poll_next(cx) { Poll::Ready(Some(Ok(item))) => { this.codec .encode(Message::Chunk(Some(item)), this.write_buf)?; } Poll::Ready(None) => { this.codec.encode(Message::Chunk(None), this.write_buf)?; // if we have not yet pipelined to the next request, then // this.payload was the payload for the request we just finished // responding to. We can check to see if we finished reading it // yet, and if not, shutdown the connection. let payload_unfinished = this.payload.is_some(); let not_pipelined = this.messages.is_empty(); // payload stream finished. // set state to None and handle next message this.state.set(State::None); if not_pipelined && payload_unfinished { this.flags.insert(Flags::SHUTDOWN | Flags::FINISHED); } else { this.flags.insert(Flags::FINISHED); } continue 'res; } Poll::Ready(Some(Err(err))) => { let err = err.into(); tracing::error!("Response payload stream error: {err:?}"); this.flags.insert(Flags::FINISHED); return Err(DispatchError::Body(err)); } Poll::Pending => return Ok(PollResponse::DoNothing), } } // buffer is beyond max size // return and try to write the whole buffer to I/O stream. return Ok(PollResponse::DrainWriteBuf); } StateProj::SendErrorPayload { mut body } => { // TODO: de-dupe impl with SendPayload // keep populate writer buffer until buffer size limit hit, // get blocked or finished. while this.write_buf.len() < super::payload::MAX_BUFFER_SIZE { match body.as_mut().poll_next(cx) { Poll::Ready(Some(Ok(item))) => { this.codec .encode(Message::Chunk(Some(item)), this.write_buf)?; } Poll::Ready(None) => { this.codec.encode(Message::Chunk(None), this.write_buf)?; // if we have not yet pipelined to the next request, then // this.payload was the payload for the request we just finished // responding to. We can check to see if we finished reading it // yet, and if not, shutdown the connection. let payload_unfinished = this.payload.is_some(); let not_pipelined = this.messages.is_empty(); // payload stream finished. // set state to None and handle next message this.state.set(State::None); if not_pipelined && payload_unfinished { this.flags.insert(Flags::SHUTDOWN | Flags::FINISHED); } else { this.flags.insert(Flags::FINISHED); } continue 'res; } Poll::Ready(Some(Err(err))) => { tracing::error!("Response payload stream error: {err:?}"); this.flags.insert(Flags::FINISHED); return Err(DispatchError::Body( Error::new_body().with_cause(err).into(), )); } Poll::Pending => return Ok(PollResponse::DoNothing), } } // buffer is beyond max size // return and try to write the whole buffer to stream return Ok(PollResponse::DrainWriteBuf); } StateProj::ExpectCall { fut } => { trace!(" calling expect service"); match fut.poll(cx) { // expect resolved. write continue to buffer and set InnerDispatcher state // to service call. Poll::Ready(Ok(req)) => { this.write_buf .extend_from_slice(b"HTTP/1.1 100 Continue\r\n\r\n"); let fut = this.flow.service.call(req); this.state.set(State::ServiceCall { fut }); } // send expect error as response Poll::Ready(Err(err)) => { let res: Response<BoxBody> = err.into(); let (res, body) = res.replace_body(()); self.as_mut().send_error_response(res, body)?; } // expect must be solved before progress can be made. Poll::Pending => return Ok(PollResponse::DoNothing), } } } } } fn handle_request( mut self: Pin<&mut Self>, req: Request, cx: &mut Context<'_>, ) -> Result<(), DispatchError> { // initialize dispatcher state { let mut this = self.as_mut().project(); // Handle `EXPECT: 100-Continue` header if req.head().expect() { // set dispatcher state to call expect handler let fut = this.flow.expect.call(req); this.state.set(State::ExpectCall { fut }); } else { // set dispatcher state to call service handler let fut = this.flow.service.call(req); this.state.set(State::ServiceCall { fut }); }; }; // eagerly poll the future once (or twice if expect is resolved immediately). loop { match self.as_mut().project().state.project() { StateProj::ExpectCall { fut } => { match fut.poll(cx) { // expect is resolved; continue loop and poll the service call branch. Poll::Ready(Ok(req)) => { self.as_mut().send_continue(); let mut this = self.as_mut().project(); let fut = this.flow.service.call(req); this.state.set(State::ServiceCall { fut }); continue; } // future is error; send response and return a result // on success to notify the dispatcher a new state is set and the outer loop // should be continued Poll::Ready(Err(err)) => { let res: Response<BoxBody> = err.into(); let (res, body) = res.replace_body(()); return self.send_error_response(res, body); } // future is pending; return Ok(()) to notify that a new state is // set and the outer loop should be continue. Poll::Pending => return Ok(()), } } StateProj::ServiceCall { fut } => { // return no matter the service call future's result. return match fut.poll(cx) { // Future is resolved. Send response and return a result. On success // to notify the dispatcher a new state is set and the outer loop // should be continue. Poll::Ready(Ok(res)) => { let (res, body) = res.into().replace_body(()); self.as_mut().send_response(res, body) } // see the comment on ExpectCall state branch's Pending Poll::Pending => Ok(()), // see the comment on ExpectCall state branch's Ready(Err(_)) Poll::Ready(Err(err)) => { let res: Response<BoxBody> = err.into(); let (res, body) = res.replace_body(()); self.as_mut().send_error_response(res, body) } }; } _ => { unreachable!("State must be set to ServiceCall or ExceptCall in handle_request") } } } } /// Process one incoming request. /// /// Returns true if any meaningful work was done. fn poll_request(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Result<bool, DispatchError> { let pipeline_queue_full = self.messages.len() >= MAX_PIPELINED_MESSAGES; let can_not_read = !self.can_read(cx); // limit amount of non-processed requests if pipeline_queue_full || can_not_read { return Ok(false); } let mut this = self.as_mut().project(); let mut updated = false; // decode from read buf as many full requests as possible loop { match this.codec.decode(this.read_buf) { Ok(Some(msg)) => { updated = true; match msg { Message::Item(mut req) => { // head timer only applies to first request on connection this.head_timer.clear(line!()); req.head_mut().peer_addr = *this.peer_addr; req.conn_data.clone_from(this.conn_data); match this.codec.message_type() { // request has no payload MessageType::None => {} // Request is upgradable. Add upgrade message and break. // Everything remaining in read buffer will be handed to // upgraded Request. MessageType::Stream if this.flow.upgrade.is_some() => { this.messages.push_back(DispatcherMessage::Upgrade(req)); break; } // request is not upgradable MessageType::Payload | MessageType::Stream => { // PayloadSender and Payload are smart pointers share the // same state. PayloadSender is attached to dispatcher and used // to sink new chunked request data to state. Payload is // attached to Request and passed to Service::call where the // state can be collected and consumed. let (sender, payload) = Payload::create(false); *req.payload() = crate::Payload::H1 { payload }; *this.payload = Some(sender); } } // handle request early when no future in InnerDispatcher state. if this.state.is_none() { self.as_mut().handle_request(req, cx)?; this = self.as_mut().project(); } else { this.messages.push_back(DispatcherMessage::Item(req)); } } Message::Chunk(Some(chunk)) => { if let Some(ref mut payload) = this.payload { payload.feed_data(chunk); } else { error!("Internal server error: unexpected payload chunk"); this.flags.insert(Flags::READ_DISCONNECT); this.messages.push_back(DispatcherMessage::Error( Response::internal_server_error().drop_body(), )); *this.error = Some(DispatchError::InternalError); break; } } Message::Chunk(None) => { if let Some(mut payload) = this.payload.take() { payload.feed_eof(); } else { error!("Internal server error: unexpected eof"); this.flags.insert(Flags::READ_DISCONNECT); this.messages.push_back(DispatcherMessage::Error( Response::internal_server_error().drop_body(), )); *this.error = Some(DispatchError::InternalError); break; } } } } // decode is partial and buffer is not full yet // break and wait for more read Ok(None) => break, Err(ParseError::Io(err)) => { trace!("I/O error: {}", &err); self.as_mut().client_disconnected(); this = self.as_mut().project(); *this.error = Some(DispatchError::Io(err)); break; } Err(ParseError::TooLarge) => { trace!("request head was too big; returning 431 response"); if let Some(mut payload) = this.payload.take() { payload.set_error(PayloadError::Overflow); } // request heads that overflow buffer size return a 431 error this.messages .push_back(DispatcherMessage::Error(Response::with_body( StatusCode::REQUEST_HEADER_FIELDS_TOO_LARGE, (), ))); this.flags.insert(Flags::READ_DISCONNECT); *this.error = Some(ParseError::TooLarge.into()); break; } Err(err) => { trace!("parse error {}", &err); if let Some(mut payload) = this.payload.take() { payload.set_error(PayloadError::EncodingCorrupted); } // malformed requests should be responded with 400 this.messages.push_back(DispatcherMessage::Error( Response::bad_request().drop_body(), )); this.flags.insert(Flags::READ_DISCONNECT); *this.error = Some(err.into()); break; } } } Ok(updated) } fn poll_head_timer( mut self: Pin<&mut Self>, cx: &mut Context<'_>, ) -> Result<(), DispatchError> { let this = self.as_mut().project(); if let TimerState::Active { timer } = this.head_timer { if timer.as_mut().poll(cx).is_ready() { // timeout on first request (slow request) return 408 trace!("timed out on slow request; replying with 408 and closing connection"); let _ = self.as_mut().send_error_response( Response::with_body(StatusCode::REQUEST_TIMEOUT, ()), BoxBody::new(()), );
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
true
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/h1/client.rs
actix-http/src/h1/client.rs
use std::{fmt, io}; use bitflags::bitflags; use bytes::{Bytes, BytesMut}; use http::{Method, Version}; use tokio_util::codec::{Decoder, Encoder}; use super::{ decoder::{self, PayloadDecoder, PayloadItem, PayloadType}, encoder, reserve_readbuf, Message, MessageType, }; use crate::{ body::BodySize, error::{ParseError, PayloadError}, ConnectionType, RequestHeadType, ResponseHead, ServiceConfig, }; bitflags! { #[derive(Debug, Clone, Copy)] struct Flags: u8 { const HEAD = 0b0000_0001; const KEEP_ALIVE_ENABLED = 0b0000_1000; const STREAM = 0b0001_0000; } } /// HTTP/1 Codec pub struct ClientCodec { inner: ClientCodecInner, } /// HTTP/1 Payload Codec pub struct ClientPayloadCodec { inner: ClientCodecInner, } struct ClientCodecInner { config: ServiceConfig, decoder: decoder::MessageDecoder<ResponseHead>, payload: Option<PayloadDecoder>, version: Version, conn_type: ConnectionType, // encoder part flags: Flags, encoder: encoder::MessageEncoder<RequestHeadType>, } impl Default for ClientCodec { fn default() -> Self { ClientCodec::new(ServiceConfig::default()) } } impl fmt::Debug for ClientCodec { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { f.debug_struct("h1::ClientCodec") .field("flags", &self.inner.flags) .finish_non_exhaustive() } } impl ClientCodec { /// Create HTTP/1 codec. /// /// `keepalive_enabled` how response `connection` header get generated. pub fn new(config: ServiceConfig) -> Self { let flags = if config.keep_alive().enabled() { Flags::KEEP_ALIVE_ENABLED } else { Flags::empty() }; ClientCodec { inner: ClientCodecInner { config, decoder: decoder::MessageDecoder::default(), payload: None, version: Version::HTTP_11, conn_type: ConnectionType::Close, flags, encoder: encoder::MessageEncoder::default(), }, } } /// Check if request is upgrade pub fn upgrade(&self) -> bool { self.inner.conn_type == ConnectionType::Upgrade } /// Check if last response is keep-alive pub fn keep_alive(&self) -> bool { self.inner.conn_type == ConnectionType::KeepAlive } /// Check last request's message type pub fn message_type(&self) -> MessageType { if self.inner.flags.contains(Flags::STREAM) { MessageType::Stream } else if self.inner.payload.is_none() { MessageType::None } else { MessageType::Payload } } /// Convert message codec to a payload codec pub fn into_payload_codec(self) -> ClientPayloadCodec { ClientPayloadCodec { inner: self.inner } } } impl ClientPayloadCodec { /// Check if last response is keep-alive pub fn keep_alive(&self) -> bool { self.inner.conn_type == ConnectionType::KeepAlive } /// Transform payload codec to a message codec pub fn into_message_codec(self) -> ClientCodec { ClientCodec { inner: self.inner } } } impl Decoder for ClientCodec { type Item = ResponseHead; type Error = ParseError; fn decode(&mut self, src: &mut BytesMut) -> Result<Option<Self::Item>, Self::Error> { debug_assert!( self.inner.payload.is_none(), "Payload decoder should not be set" ); if let Some((req, payload)) = self.inner.decoder.decode(src)? { if let Some(conn_type) = req.conn_type() { // do not use peer's keep-alive self.inner.conn_type = if conn_type == ConnectionType::KeepAlive { self.inner.conn_type } else { conn_type }; } if !self.inner.flags.contains(Flags::HEAD) { match payload { PayloadType::None => self.inner.payload = None, PayloadType::Payload(pl) => self.inner.payload = Some(pl), PayloadType::Stream(pl) => { self.inner.payload = Some(pl); self.inner.flags.insert(Flags::STREAM); } } } else { self.inner.payload = None; } reserve_readbuf(src); Ok(Some(req)) } else { Ok(None) } } } impl Decoder for ClientPayloadCodec { type Item = Option<Bytes>; type Error = PayloadError; fn decode(&mut self, src: &mut BytesMut) -> Result<Option<Self::Item>, Self::Error> { debug_assert!( self.inner.payload.is_some(), "Payload decoder is not specified" ); Ok(match self.inner.payload.as_mut().unwrap().decode(src)? { Some(PayloadItem::Chunk(chunk)) => { reserve_readbuf(src); Some(Some(chunk)) } Some(PayloadItem::Eof) => { self.inner.payload.take(); Some(None) } None => None, }) } } impl Encoder<Message<(RequestHeadType, BodySize)>> for ClientCodec { type Error = io::Error; fn encode( &mut self, item: Message<(RequestHeadType, BodySize)>, dst: &mut BytesMut, ) -> Result<(), Self::Error> { match item { Message::Item((mut head, length)) => { let inner = &mut self.inner; inner.version = head.as_ref().version; inner .flags .set(Flags::HEAD, head.as_ref().method == Method::HEAD); // connection status inner.conn_type = match head.as_ref().connection_type() { ConnectionType::KeepAlive => { if inner.flags.contains(Flags::KEEP_ALIVE_ENABLED) { ConnectionType::KeepAlive } else { ConnectionType::Close } } ConnectionType::Upgrade => ConnectionType::Upgrade, ConnectionType::Close => ConnectionType::Close, }; inner.encoder.encode( dst, &mut head, false, false, inner.version, length, inner.conn_type, &inner.config, )?; } Message::Chunk(Some(bytes)) => { self.inner.encoder.encode_chunk(bytes.as_ref(), dst)?; } Message::Chunk(None) => { self.inner.encoder.encode_eof(dst)?; } } Ok(()) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/h1/decoder.rs
actix-http/src/h1/decoder.rs
use std::{io, marker::PhantomData, mem::MaybeUninit, task::Poll}; use actix_codec::Decoder; use bytes::{Bytes, BytesMut}; use http::{ header::{self, HeaderName, HeaderValue}, Method, StatusCode, Uri, Version, }; use tracing::{debug, error, trace}; use super::chunked::ChunkedState; use crate::{error::ParseError, header::HeaderMap, ConnectionType, Request, ResponseHead}; pub(crate) const MAX_BUFFER_SIZE: usize = 131_072; const MAX_HEADERS: usize = 96; /// Incoming message decoder pub(crate) struct MessageDecoder<T: MessageType>(PhantomData<T>); #[derive(Debug)] /// Incoming request type pub(crate) enum PayloadType { None, Payload(PayloadDecoder), Stream(PayloadDecoder), } impl<T: MessageType> Default for MessageDecoder<T> { fn default() -> Self { MessageDecoder(PhantomData) } } impl<T: MessageType> Decoder for MessageDecoder<T> { type Item = (T, PayloadType); type Error = ParseError; fn decode(&mut self, src: &mut BytesMut) -> Result<Option<Self::Item>, Self::Error> { T::decode(src) } } pub(crate) enum PayloadLength { Payload(PayloadType), UpgradeWebSocket, None, } impl PayloadLength { /// Returns true if variant is `None`. fn is_none(&self) -> bool { matches!(self, Self::None) } /// Returns true if variant is represents zero-length (not none) payload. fn is_zero(&self) -> bool { matches!( self, PayloadLength::Payload(PayloadType::Payload(PayloadDecoder { kind: Kind::Length(0) })) ) } } pub(crate) trait MessageType: Sized { fn set_connection_type(&mut self, conn_type: Option<ConnectionType>); fn set_expect(&mut self); fn headers_mut(&mut self) -> &mut HeaderMap; fn decode(src: &mut BytesMut) -> Result<Option<(Self, PayloadType)>, ParseError>; fn set_headers( &mut self, slice: &Bytes, raw_headers: &[HeaderIndex], version: Version, ) -> Result<PayloadLength, ParseError> { let mut ka = None; let mut has_upgrade_websocket = false; let mut expect = false; let mut chunked = false; let mut seen_te = false; let mut content_length = None; { let headers = self.headers_mut(); for idx in raw_headers.iter() { let name = HeaderName::from_bytes(&slice[idx.name.0..idx.name.1]).unwrap(); // SAFETY: httparse already checks header value is only visible ASCII bytes // from_maybe_shared_unchecked contains debug assertions so they are omitted here let value = unsafe { HeaderValue::from_maybe_shared_unchecked(slice.slice(idx.value.0..idx.value.1)) }; match name { header::CONTENT_LENGTH if content_length.is_some() => { debug!("multiple Content-Length"); return Err(ParseError::Header); } header::CONTENT_LENGTH => match value.to_str().map(str::trim) { Ok(val) if val.starts_with('+') => { debug!("illegal Content-Length: {:?}", val); return Err(ParseError::Header); } Ok(val) => { if let Ok(len) = val.parse::<u64>() { // accept 0 lengths here and remove them in `decode` after all // headers have been processed to prevent request smuggling issues content_length = Some(len); } else { debug!("illegal Content-Length: {:?}", val); return Err(ParseError::Header); } } Err(_) => { debug!("illegal Content-Length: {:?}", value); return Err(ParseError::Header); } }, // transfer-encoding header::TRANSFER_ENCODING if seen_te => { debug!("multiple Transfer-Encoding not allowed"); return Err(ParseError::Header); } header::TRANSFER_ENCODING if version == Version::HTTP_11 => { seen_te = true; if let Ok(val) = value.to_str().map(str::trim) { if val.eq_ignore_ascii_case("chunked") { chunked = true; } else if val.eq_ignore_ascii_case("identity") { // allow silently since multiple TE headers are already checked } else { debug!("illegal Transfer-Encoding: {:?}", val); return Err(ParseError::Header); } } else { return Err(ParseError::Header); } } // connection keep-alive state header::CONNECTION => { ka = if let Ok(conn) = value.to_str().map(str::trim) { if conn.eq_ignore_ascii_case("keep-alive") { Some(ConnectionType::KeepAlive) } else if conn.eq_ignore_ascii_case("close") { Some(ConnectionType::Close) } else if conn.eq_ignore_ascii_case("upgrade") { Some(ConnectionType::Upgrade) } else { None } } else { None }; } header::UPGRADE => { if let Ok(val) = value.to_str().map(str::trim) { if val.eq_ignore_ascii_case("websocket") { has_upgrade_websocket = true; } } } header::EXPECT => { let bytes = value.as_bytes(); if bytes.len() >= 4 && &bytes[0..4] == b"100-" { expect = true; } } _ => {} } headers.append(name, value); } } self.set_connection_type(ka); if expect { self.set_expect() } // https://datatracker.ietf.org/doc/html/rfc7230#section-3.3.3 if chunked { // Chunked encoding Ok(PayloadLength::Payload(PayloadType::Payload( PayloadDecoder::chunked(), ))) } else if has_upgrade_websocket { Ok(PayloadLength::UpgradeWebSocket) } else if let Some(len) = content_length { // Content-Length Ok(PayloadLength::Payload(PayloadType::Payload( PayloadDecoder::length(len), ))) } else { Ok(PayloadLength::None) } } } impl MessageType for Request { fn set_connection_type(&mut self, conn_type: Option<ConnectionType>) { if let Some(ctype) = conn_type { self.head_mut().set_connection_type(ctype); } } fn set_expect(&mut self) { self.head_mut().set_expect(); } fn headers_mut(&mut self) -> &mut HeaderMap { &mut self.head_mut().headers } fn decode(src: &mut BytesMut) -> Result<Option<(Self, PayloadType)>, ParseError> { let mut headers: [HeaderIndex; MAX_HEADERS] = EMPTY_HEADER_INDEX_ARRAY; let (len, method, uri, ver, h_len) = { // SAFETY: // Create an uninitialized array of `MaybeUninit`. The `assume_init` is safe because the // type we are claiming to have initialized here is a bunch of `MaybeUninit`s, which // do not require initialization. let mut parsed = unsafe { MaybeUninit::<[MaybeUninit<httparse::Header<'_>>; MAX_HEADERS]>::uninit() .assume_init() }; let mut req = httparse::Request::new(&mut []); match req.parse_with_uninit_headers(src, &mut parsed)? { httparse::Status::Complete(len) => { let method = Method::from_bytes(req.method.unwrap().as_bytes()) .map_err(|_| ParseError::Method)?; let uri = Uri::try_from(req.path.unwrap())?; let version = if req.version.unwrap() == 1 { Version::HTTP_11 } else { Version::HTTP_10 }; HeaderIndex::record(src, req.headers, &mut headers); (len, method, uri, version, req.headers.len()) } httparse::Status::Partial => { return if src.len() >= MAX_BUFFER_SIZE { trace!("MAX_BUFFER_SIZE unprocessed data reached, closing"); Err(ParseError::TooLarge) } else { // Return None to notify more read are needed for parsing request Ok(None) }; } } }; let mut msg = Request::new(); // convert headers let mut length = msg.set_headers(&src.split_to(len).freeze(), &headers[..h_len], ver)?; // disallow HTTP/1.0 POST requests that do not contain a Content-Length headers // see https://datatracker.ietf.org/doc/html/rfc1945#section-7.2.2 if ver == Version::HTTP_10 && method == Method::POST && length.is_none() { debug!("no Content-Length specified for HTTP/1.0 POST request"); return Err(ParseError::Header); } // Remove CL value if 0 now that all headers and HTTP/1.0 special cases are processed. // Protects against some request smuggling attacks. // See https://github.com/actix/actix-web/issues/2767. if length.is_zero() { length = PayloadLength::None; } // payload decoder let decoder = match length { PayloadLength::Payload(pl) => pl, PayloadLength::UpgradeWebSocket => { // upgrade (WebSocket) PayloadType::Stream(PayloadDecoder::eof()) } PayloadLength::None => { if method == Method::CONNECT { PayloadType::Stream(PayloadDecoder::eof()) } else { PayloadType::None } } }; let head = msg.head_mut(); head.uri = uri; head.method = method; head.version = ver; Ok(Some((msg, decoder))) } } impl MessageType for ResponseHead { fn set_connection_type(&mut self, conn_type: Option<ConnectionType>) { if let Some(ctype) = conn_type { ResponseHead::set_connection_type(self, ctype); } } fn set_expect(&mut self) {} fn headers_mut(&mut self) -> &mut HeaderMap { &mut self.headers } fn decode(src: &mut BytesMut) -> Result<Option<(Self, PayloadType)>, ParseError> { let mut headers: [HeaderIndex; MAX_HEADERS] = EMPTY_HEADER_INDEX_ARRAY; let (len, ver, status, h_len) = { // SAFETY: // Create an uninitialized array of `MaybeUninit`. The `assume_init` is safe because the // type we are claiming to have initialized here is a bunch of `MaybeUninit`s, which // do not require initialization. let mut parsed = unsafe { MaybeUninit::<[MaybeUninit<httparse::Header<'_>>; MAX_HEADERS]>::uninit() .assume_init() }; let mut res = httparse::Response::new(&mut []); let mut config = httparse::ParserConfig::default(); config.allow_spaces_after_header_name_in_responses(true); match config.parse_response_with_uninit_headers(&mut res, src, &mut parsed)? { httparse::Status::Complete(len) => { let version = if res.version.unwrap() == 1 { Version::HTTP_11 } else { Version::HTTP_10 }; let status = StatusCode::from_u16(res.code.unwrap()).map_err(|_| ParseError::Status)?; HeaderIndex::record(src, res.headers, &mut headers); (len, version, status, res.headers.len()) } httparse::Status::Partial => { return if src.len() >= MAX_BUFFER_SIZE { error!("MAX_BUFFER_SIZE unprocessed data reached, closing"); Err(ParseError::TooLarge) } else { Ok(None) } } } }; let mut msg = ResponseHead::new(status); msg.version = ver; // convert headers let mut length = msg.set_headers(&src.split_to(len).freeze(), &headers[..h_len], ver)?; // Remove CL value if 0 now that all headers and HTTP/1.0 special cases are processed. // Protects against some request smuggling attacks. // See https://github.com/actix/actix-web/issues/2767. if length.is_zero() { length = PayloadLength::None; } // message payload let decoder = if let PayloadLength::Payload(pl) = length { pl } else if status == StatusCode::SWITCHING_PROTOCOLS { // switching protocol or connect PayloadType::Stream(PayloadDecoder::eof()) } else { // for HTTP/1.0 read to eof and close connection if msg.version == Version::HTTP_10 { msg.set_connection_type(ConnectionType::Close); PayloadType::Payload(PayloadDecoder::eof()) } else { PayloadType::None } }; Ok(Some((msg, decoder))) } } #[derive(Clone, Copy)] pub(crate) struct HeaderIndex { pub(crate) name: (usize, usize), pub(crate) value: (usize, usize), } pub(crate) const EMPTY_HEADER_INDEX: HeaderIndex = HeaderIndex { name: (0, 0), value: (0, 0), }; pub(crate) const EMPTY_HEADER_INDEX_ARRAY: [HeaderIndex; MAX_HEADERS] = [EMPTY_HEADER_INDEX; MAX_HEADERS]; impl HeaderIndex { pub(crate) fn record( bytes: &[u8], headers: &[httparse::Header<'_>], indices: &mut [HeaderIndex], ) { let bytes_ptr = bytes.as_ptr() as usize; for (header, indices) in headers.iter().zip(indices.iter_mut()) { let name_start = header.name.as_ptr() as usize - bytes_ptr; let name_end = name_start + header.name.len(); indices.name = (name_start, name_end); let value_start = header.value.as_ptr() as usize - bytes_ptr; let value_end = value_start + header.value.len(); indices.value = (value_start, value_end); } } } #[derive(Debug, Clone, PartialEq, Eq)] /// Chunk type yielded while decoding a payload. pub enum PayloadItem { Chunk(Bytes), Eof, } /// Decoder that can handle different payload types. /// /// If a message body does not use `Transfer-Encoding`, it should include a `Content-Length`. #[derive(Debug, Clone, PartialEq, Eq)] pub struct PayloadDecoder { kind: Kind, } impl PayloadDecoder { /// Constructs a fixed-length payload decoder. pub fn length(x: u64) -> PayloadDecoder { PayloadDecoder { kind: Kind::Length(x), } } /// Constructs a chunked encoding decoder. pub fn chunked() -> PayloadDecoder { PayloadDecoder { kind: Kind::Chunked(ChunkedState::Size, 0), } } /// Creates an decoder that yields chunks until the stream returns EOF. pub fn eof() -> PayloadDecoder { PayloadDecoder { kind: Kind::Eof } } } #[derive(Debug, Clone, PartialEq, Eq)] enum Kind { /// A reader used when a `Content-Length` header is passed with a positive integer. Length(u64), /// A reader used when `Transfer-Encoding` is `chunked`. Chunked(ChunkedState, u64), /// A reader used for responses that don't indicate a length or chunked. /// /// Note: This should only used for `Response`s. It is illegal for a `Request` to be made /// without either of `Content-Length` and `Transfer-Encoding: chunked` missing, as explained /// in [RFC 7230 §3.3.3]: /// /// > If a Transfer-Encoding header field is present in a response and the chunked transfer /// > coding is not the final encoding, the message body length is determined by reading the /// > connection until it is closed by the server. If a Transfer-Encoding header field is /// > present in a request and the chunked transfer coding is not the final encoding, the /// > message body length cannot be determined reliably; the server MUST respond with the 400 /// > (Bad Request) status code and then close the connection. /// /// [RFC 7230 §3.3.3]: https://datatracker.ietf.org/doc/html/rfc7230#section-3.3.3 Eof, } impl Decoder for PayloadDecoder { type Item = PayloadItem; type Error = io::Error; fn decode(&mut self, src: &mut BytesMut) -> Result<Option<Self::Item>, Self::Error> { match self.kind { Kind::Length(ref mut remaining) => { if *remaining == 0 { Ok(Some(PayloadItem::Eof)) } else { if src.is_empty() { return Ok(None); } let len = src.len() as u64; let buf; if *remaining > len { buf = src.split().freeze(); *remaining -= len; } else { buf = src.split_to(*remaining as usize).freeze(); *remaining = 0; }; trace!("Length read: {}", buf.len()); Ok(Some(PayloadItem::Chunk(buf))) } } Kind::Chunked(ref mut state, ref mut size) => { loop { let mut buf = None; // advances the chunked state *state = match state.step(src, size, &mut buf) { Poll::Pending => return Ok(None), Poll::Ready(Ok(state)) => state, Poll::Ready(Err(err)) => return Err(err), }; if *state == ChunkedState::End { trace!("End of chunked stream"); return Ok(Some(PayloadItem::Eof)); } if let Some(buf) = buf { return Ok(Some(PayloadItem::Chunk(buf))); } if src.is_empty() { return Ok(None); } } } Kind::Eof => { if src.is_empty() { Ok(None) } else { Ok(Some(PayloadItem::Chunk(src.split().freeze()))) } } } } } #[cfg(test)] mod tests { use super::*; use crate::{header::SET_COOKIE, HttpMessage as _}; impl PayloadType { pub(crate) fn unwrap(self) -> PayloadDecoder { match self { PayloadType::Payload(pl) => pl, _ => panic!(), } } pub(crate) fn is_unhandled(&self) -> bool { matches!(self, PayloadType::Stream(_)) } } impl PayloadItem { pub(crate) fn chunk(self) -> Bytes { match self { PayloadItem::Chunk(chunk) => chunk, _ => panic!("error"), } } pub(crate) fn eof(&self) -> bool { matches!(*self, PayloadItem::Eof) } } macro_rules! parse_ready { ($e:expr) => {{ match MessageDecoder::<Request>::default().decode($e) { Ok(Some((msg, _))) => msg, Ok(_) => unreachable!("Eof during parsing http request"), Err(err) => unreachable!("Error during parsing http request: {:?}", err), } }}; } macro_rules! expect_parse_err { ($e:expr) => {{ match MessageDecoder::<Request>::default().decode($e) { Err(err) => match err { ParseError::Io(_) => unreachable!("Parse error expected"), _ => {} }, _ => unreachable!("Error expected"), } }}; } #[test] fn test_parse() { let mut buf = BytesMut::from("GET /test HTTP/1.1\r\n\r\n"); let mut reader = MessageDecoder::<Request>::default(); match reader.decode(&mut buf) { Ok(Some((req, _))) => { assert_eq!(req.version(), Version::HTTP_11); assert_eq!(*req.method(), Method::GET); assert_eq!(req.path(), "/test"); } Ok(_) | Err(_) => unreachable!("Error during parsing http request"), } } #[test] fn test_parse_partial() { let mut buf = BytesMut::from("PUT /test HTTP/1"); let mut reader = MessageDecoder::<Request>::default(); assert!(reader.decode(&mut buf).unwrap().is_none()); buf.extend(b".1\r\n\r\n"); let (req, _) = reader.decode(&mut buf).unwrap().unwrap(); assert_eq!(req.version(), Version::HTTP_11); assert_eq!(*req.method(), Method::PUT); assert_eq!(req.path(), "/test"); } #[test] fn parse_h09_reject() { let mut buf = BytesMut::from( "GET /test1 HTTP/0.9\r\n\ \r\n", ); let mut reader = MessageDecoder::<Request>::default(); reader.decode(&mut buf).unwrap_err(); let mut buf = BytesMut::from( "POST /test2 HTTP/0.9\r\n\ Content-Length: 3\r\n\ \r\n abc", ); let mut reader = MessageDecoder::<Request>::default(); reader.decode(&mut buf).unwrap_err(); } #[test] fn parse_h10_get() { let mut buf = BytesMut::from( "GET /test1 HTTP/1.0\r\n\ \r\n", ); let mut reader = MessageDecoder::<Request>::default(); let (req, _) = reader.decode(&mut buf).unwrap().unwrap(); assert_eq!(req.version(), Version::HTTP_10); assert_eq!(*req.method(), Method::GET); assert_eq!(req.path(), "/test1"); let mut buf = BytesMut::from( "GET /test2 HTTP/1.0\r\n\ Content-Length: 0\r\n\ \r\n", ); let mut reader = MessageDecoder::<Request>::default(); let (req, _) = reader.decode(&mut buf).unwrap().unwrap(); assert_eq!(req.version(), Version::HTTP_10); assert_eq!(*req.method(), Method::GET); assert_eq!(req.path(), "/test2"); let mut buf = BytesMut::from( "GET /test3 HTTP/1.0\r\n\ Content-Length: 3\r\n\ \r\n abc", ); let mut reader = MessageDecoder::<Request>::default(); let (req, _) = reader.decode(&mut buf).unwrap().unwrap(); assert_eq!(req.version(), Version::HTTP_10); assert_eq!(*req.method(), Method::GET); assert_eq!(req.path(), "/test3"); } #[test] fn parse_h10_post() { let mut buf = BytesMut::from( "POST /test1 HTTP/1.0\r\n\ Content-Length: 3\r\n\ \r\n\ abc", ); let mut reader = MessageDecoder::<Request>::default(); let (req, _) = reader.decode(&mut buf).unwrap().unwrap(); assert_eq!(req.version(), Version::HTTP_10); assert_eq!(*req.method(), Method::POST); assert_eq!(req.path(), "/test1"); let mut buf = BytesMut::from( "POST /test2 HTTP/1.0\r\n\ Content-Length: 0\r\n\ \r\n", ); let mut reader = MessageDecoder::<Request>::default(); let (req, _) = reader.decode(&mut buf).unwrap().unwrap(); assert_eq!(req.version(), Version::HTTP_10); assert_eq!(*req.method(), Method::POST); assert_eq!(req.path(), "/test2"); let mut buf = BytesMut::from( "POST /test3 HTTP/1.0\r\n\ \r\n", ); let mut reader = MessageDecoder::<Request>::default(); let err = reader.decode(&mut buf).unwrap_err(); assert!(err.to_string().contains("Header")) } #[test] fn test_parse_body() { let mut buf = BytesMut::from("GET /test HTTP/1.1\r\nContent-Length: 4\r\n\r\nbody"); let mut reader = MessageDecoder::<Request>::default(); let (req, pl) = reader.decode(&mut buf).unwrap().unwrap(); let mut pl = pl.unwrap(); assert_eq!(req.version(), Version::HTTP_11); assert_eq!(*req.method(), Method::GET); assert_eq!(req.path(), "/test"); assert_eq!( pl.decode(&mut buf).unwrap().unwrap().chunk().as_ref(), b"body" ); } #[test] fn test_parse_body_crlf() { let mut buf = BytesMut::from("\r\nGET /test HTTP/1.1\r\nContent-Length: 4\r\n\r\nbody"); let mut reader = MessageDecoder::<Request>::default(); let (req, pl) = reader.decode(&mut buf).unwrap().unwrap(); let mut pl = pl.unwrap(); assert_eq!(req.version(), Version::HTTP_11); assert_eq!(*req.method(), Method::GET); assert_eq!(req.path(), "/test"); assert_eq!( pl.decode(&mut buf).unwrap().unwrap().chunk().as_ref(), b"body" ); } #[test] fn test_parse_partial_eof() { let mut buf = BytesMut::from("GET /test HTTP/1.1\r\n"); let mut reader = MessageDecoder::<Request>::default(); assert!(reader.decode(&mut buf).unwrap().is_none()); buf.extend(b"\r\n"); let (req, _) = reader.decode(&mut buf).unwrap().unwrap(); assert_eq!(req.version(), Version::HTTP_11); assert_eq!(*req.method(), Method::GET); assert_eq!(req.path(), "/test"); } #[test] fn test_headers_split_field() { let mut buf = BytesMut::from("GET /test HTTP/1.1\r\n"); let mut reader = MessageDecoder::<Request>::default(); assert! { reader.decode(&mut buf).unwrap().is_none() } buf.extend(b"t"); assert! { reader.decode(&mut buf).unwrap().is_none() } buf.extend(b"es"); assert! { reader.decode(&mut buf).unwrap().is_none() } buf.extend(b"t: value\r\n\r\n"); let (req, _) = reader.decode(&mut buf).unwrap().unwrap(); assert_eq!(req.version(), Version::HTTP_11); assert_eq!(*req.method(), Method::GET); assert_eq!(req.path(), "/test"); assert_eq!( req.headers() .get(HeaderName::try_from("test").unwrap()) .unwrap() .as_bytes(), b"value" ); } #[test] fn test_headers_multi_value() { let mut buf = BytesMut::from( "GET /test HTTP/1.1\r\n\ Set-Cookie: c1=cookie1\r\n\ Set-Cookie: c2=cookie2\r\n\r\n", ); let mut reader = MessageDecoder::<Request>::default(); let (req, _) = reader.decode(&mut buf).unwrap().unwrap(); let val: Vec<_> = req .headers() .get_all(SET_COOKIE) .map(|v| v.to_str().unwrap().to_owned()) .collect(); assert_eq!(val[0], "c1=cookie1"); assert_eq!(val[1], "c2=cookie2"); } #[test] fn test_conn_default_1_0() { let req = parse_ready!(&mut BytesMut::from("GET /test HTTP/1.0\r\n\r\n")); assert_eq!(req.head().connection_type(), ConnectionType::Close); } #[test] fn test_conn_default_1_1() { let req = parse_ready!(&mut BytesMut::from("GET /test HTTP/1.1\r\n\r\n")); assert_eq!(req.head().connection_type(), ConnectionType::KeepAlive); } #[test] fn test_conn_close() { let req = parse_ready!(&mut BytesMut::from( "GET /test HTTP/1.1\r\n\ connection: close\r\n\r\n", )); assert_eq!(req.head().connection_type(), ConnectionType::Close); let req = parse_ready!(&mut BytesMut::from( "GET /test HTTP/1.1\r\n\ connection: Close\r\n\r\n", )); assert_eq!(req.head().connection_type(), ConnectionType::Close); } #[test] fn test_conn_close_1_0() { let req = parse_ready!(&mut BytesMut::from( "GET /test HTTP/1.0\r\n\ connection: close\r\n\r\n", )); assert_eq!(req.head().connection_type(), ConnectionType::Close); } #[test] fn test_conn_keep_alive_1_0() { let req = parse_ready!(&mut BytesMut::from( "GET /test HTTP/1.0\r\n\ connection: keep-alive\r\n\r\n", )); assert_eq!(req.head().connection_type(), ConnectionType::KeepAlive); let req = parse_ready!(&mut BytesMut::from( "GET /test HTTP/1.0\r\n\ connection: Keep-Alive\r\n\r\n", )); assert_eq!(req.head().connection_type(), ConnectionType::KeepAlive); } #[test] fn test_conn_keep_alive_1_1() { let req = parse_ready!(&mut BytesMut::from( "GET /test HTTP/1.1\r\n\ connection: keep-alive\r\n\r\n", )); assert_eq!(req.head().connection_type(), ConnectionType::KeepAlive); } #[test] fn test_conn_other_1_0() { let req = parse_ready!(&mut BytesMut::from( "GET /test HTTP/1.0\r\n\ connection: other\r\n\r\n", )); assert_eq!(req.head().connection_type(), ConnectionType::Close); } #[test] fn test_conn_other_1_1() { let req = parse_ready!(&mut BytesMut::from( "GET /test HTTP/1.1\r\n\ connection: other\r\n\r\n", )); assert_eq!(req.head().connection_type(), ConnectionType::KeepAlive); } #[test] fn test_conn_upgrade() { let req = parse_ready!(&mut BytesMut::from( "GET /test HTTP/1.1\r\n\ upgrade: websockets\r\n\ connection: upgrade\r\n\r\n", )); assert!(req.upgrade()); assert_eq!(req.head().connection_type(), ConnectionType::Upgrade); let req = parse_ready!(&mut BytesMut::from( "GET /test HTTP/1.1\r\n\ upgrade: Websockets\r\n\ connection: Upgrade\r\n\r\n", )); assert!(req.upgrade()); assert_eq!(req.head().connection_type(), ConnectionType::Upgrade); } #[test] fn test_conn_upgrade_connect_method() { let req = parse_ready!(&mut BytesMut::from( "CONNECT /test HTTP/1.1\r\n\ content-type: text/plain\r\n\r\n", )); assert!(req.upgrade()); } #[test] fn test_headers_bad_content_length() { // string CL expect_parse_err!(&mut BytesMut::from( "GET /test HTTP/1.1\r\n\ content-length: line\r\n\r\n", )); // negative CL expect_parse_err!(&mut BytesMut::from( "GET /test HTTP/1.1\r\n\ content-length: -1\r\n\r\n", )); } #[test] fn octal_ish_cl_parsed_as_decimal() { let mut buf = BytesMut::from( "POST /test HTTP/1.1\r\n\ content-length: 011\r\n\r\n", ); let mut reader = MessageDecoder::<Request>::default(); let (_req, pl) = reader.decode(&mut buf).unwrap().unwrap(); assert!(matches!( pl, PayloadType::Payload(pl) if pl == PayloadDecoder::length(11) )); } #[test] fn test_invalid_header() { expect_parse_err!(&mut BytesMut::from(
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
true
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/h1/dispatcher_tests.rs
actix-http/src/h1/dispatcher_tests.rs
use std::{ future::Future, pin::Pin, str, task::{Context, Poll}, time::Duration, }; use actix_codec::Framed; use actix_rt::{pin, time::sleep}; use actix_service::{fn_service, Service}; use actix_utils::future::{ready, Ready}; use bytes::{Buf, Bytes, BytesMut}; use futures_util::future::lazy; use super::dispatcher::{Dispatcher, DispatcherState, DispatcherStateProj, Flags}; use crate::{ body::{BoxBody, MessageBody}, config::ServiceConfig, h1::{Codec, ExpectHandler, UpgradeHandler}, service::HttpFlow, test::{TestBuffer, TestSeqBuffer}, Error, HttpMessage, KeepAlive, Method, OnConnectData, Request, Response, StatusCode, }; struct YieldService; impl Service<Request> for YieldService { type Response = Response<BoxBody>; type Error = Response<BoxBody>; type Future = Pin<Box<dyn Future<Output = Result<Self::Response, Self::Error>>>>; actix_service::always_ready!(); fn call(&self, _: Request) -> Self::Future { Box::pin(async { // Yield twice because the dispatcher can poll the service twice per dispatcher's poll: // once in `handle_request` and another in `poll_response` actix_rt::task::yield_now().await; actix_rt::task::yield_now().await; Ok(Response::ok()) }) } } fn find_slice(haystack: &[u8], needle: &[u8], from: usize) -> Option<usize> { memchr::memmem::find(&haystack[from..], needle) } fn stabilize_date_header(payload: &mut [u8]) { let mut from = 0; while let Some(pos) = find_slice(payload, b"date", from) { payload[(from + pos)..(from + pos + 35)] .copy_from_slice(b"date: Thu, 01 Jan 1970 12:34:56 UTC"); from += 35; } } fn ok_service() -> impl Service<Request, Response = Response<impl MessageBody>, Error = Error> { status_service(StatusCode::OK) } fn status_service( status: StatusCode, ) -> impl Service<Request, Response = Response<impl MessageBody>, Error = Error> { fn_service(move |_req: Request| ready(Ok::<_, Error>(Response::new(status)))) } fn echo_path_service() -> impl Service<Request, Response = Response<impl MessageBody>, Error = Error> { fn_service(|req: Request| { let path = req.path().as_bytes(); ready(Ok::<_, Error>( Response::ok().set_body(Bytes::copy_from_slice(path)), )) }) } fn drop_payload_service() -> impl Service<Request, Response = Response<&'static str>, Error = Error> { fn_service(|mut req: Request| async move { let _ = req.take_payload(); Ok::<_, Error>(Response::with_body(StatusCode::OK, "payload dropped")) }) } fn echo_payload_service() -> impl Service<Request, Response = Response<Bytes>, Error = Error> { fn_service(|mut req: Request| { Box::pin(async move { use futures_util::StreamExt as _; let mut pl = req.take_payload(); let mut body = BytesMut::new(); while let Some(chunk) = pl.next().await { body.extend_from_slice(chunk.unwrap().chunk()) } Ok::<_, Error>(Response::ok().set_body(body.freeze())) }) }) } #[actix_rt::test] async fn late_request() { let mut buf = TestBuffer::empty(); let cfg = ServiceConfig::new( KeepAlive::Disabled, Duration::from_millis(100), Duration::ZERO, false, None, ); let services = HttpFlow::new(ok_service(), ExpectHandler, None); let h1 = Dispatcher::<_, _, _, _, UpgradeHandler>::new( buf.clone(), services, cfg, None, OnConnectData::default(), ); pin!(h1); lazy(|cx| { assert!(matches!(&h1.inner, DispatcherState::Normal { .. })); match h1.as_mut().poll(cx) { Poll::Ready(_) => panic!("first poll should not be ready"), Poll::Pending => {} } // polls: initial assert_eq!(h1.poll_count, 1); buf.extend_read_buf("GET /abcd HTTP/1.1\r\nConnection: close\r\n\r\n"); match h1.as_mut().poll(cx) { Poll::Pending => panic!("second poll should not be pending"), Poll::Ready(res) => assert!(res.is_ok()), } // polls: initial pending => handle req => shutdown assert_eq!(h1.poll_count, 3); let mut res = buf.take_write_buf().to_vec(); stabilize_date_header(&mut res); let res = &res[..]; let exp = b"\ HTTP/1.1 200 OK\r\n\ content-length: 0\r\n\ connection: close\r\n\ date: Thu, 01 Jan 1970 12:34:56 UTC\r\n\r\n\ "; assert_eq!( res, exp, "\nexpected response not in write buffer:\n\ response: {:?}\n\ expected: {:?}", String::from_utf8_lossy(res), String::from_utf8_lossy(exp) ); }) .await; } #[actix_rt::test] async fn oneshot_connection() { let buf = TestBuffer::new("GET /abcd HTTP/1.1\r\n\r\n"); let cfg = ServiceConfig::new( KeepAlive::Disabled, Duration::from_millis(100), Duration::ZERO, false, None, ); let services = HttpFlow::new(echo_path_service(), ExpectHandler, None); let h1 = Dispatcher::<_, _, _, _, UpgradeHandler>::new( buf.clone(), services, cfg, None, OnConnectData::default(), ); pin!(h1); lazy(|cx| { assert!(matches!(&h1.inner, DispatcherState::Normal { .. })); match h1.as_mut().poll(cx) { Poll::Pending => panic!("first poll should not be pending"), Poll::Ready(res) => assert!(res.is_ok()), } // polls: initial => shutdown assert_eq!(h1.poll_count, 2); let mut res = buf.take_write_buf().to_vec(); stabilize_date_header(&mut res); let res = &res[..]; let exp = http_msg( r" HTTP/1.1 200 OK content-length: 5 connection: close date: Thu, 01 Jan 1970 12:34:56 UTC /abcd ", ); assert_eq!( res, exp, "\nexpected response not in write buffer:\n\ response: {:?}\n\ expected: {:?}", String::from_utf8_lossy(res), String::from_utf8_lossy(&exp) ); }) .await; } #[actix_rt::test] async fn keep_alive_timeout() { let buf = TestBuffer::new("GET /abcd HTTP/1.1\r\n\r\n"); let cfg = ServiceConfig::new( KeepAlive::Timeout(Duration::from_millis(200)), Duration::from_millis(100), Duration::ZERO, false, None, ); let services = HttpFlow::new(echo_path_service(), ExpectHandler, None); let h1 = Dispatcher::<_, _, _, _, UpgradeHandler>::new( buf.clone(), services, cfg, None, OnConnectData::default(), ); pin!(h1); lazy(|cx| { assert!(matches!(&h1.inner, DispatcherState::Normal { .. })); assert!( h1.as_mut().poll(cx).is_pending(), "keep-alive should prevent poll from resolving" ); // polls: initial assert_eq!(h1.poll_count, 1); let mut res = buf.take_write_buf().to_vec(); stabilize_date_header(&mut res); let res = &res[..]; let exp = b"\ HTTP/1.1 200 OK\r\n\ content-length: 5\r\n\ date: Thu, 01 Jan 1970 12:34:56 UTC\r\n\r\n\ /abcd\ "; assert_eq!( res, exp, "\nexpected response not in write buffer:\n\ response: {:?}\n\ expected: {:?}", String::from_utf8_lossy(res), String::from_utf8_lossy(exp) ); }) .await; // sleep slightly longer than keep-alive timeout sleep(Duration::from_millis(250)).await; lazy(|cx| { assert!( h1.as_mut().poll(cx).is_ready(), "keep-alive should have resolved", ); // polls: initial => keep-alive wake-up shutdown assert_eq!(h1.poll_count, 2); if let DispatcherStateProj::Normal { inner } = h1.project().inner.project() { // connection closed assert!(inner.flags.contains(Flags::SHUTDOWN)); assert!(inner.flags.contains(Flags::WRITE_DISCONNECT)); // and nothing added to write buffer assert!(buf.write_buf_slice().is_empty()); } }) .await; } #[actix_rt::test] async fn keep_alive_follow_up_req() { let mut buf = TestBuffer::new("GET /abcd HTTP/1.1\r\n\r\n"); let cfg = ServiceConfig::new( KeepAlive::Timeout(Duration::from_millis(500)), Duration::from_millis(100), Duration::ZERO, false, None, ); let services = HttpFlow::new(echo_path_service(), ExpectHandler, None); let h1 = Dispatcher::<_, _, _, _, UpgradeHandler>::new( buf.clone(), services, cfg, None, OnConnectData::default(), ); pin!(h1); lazy(|cx| { assert!(matches!(&h1.inner, DispatcherState::Normal { .. })); assert!( h1.as_mut().poll(cx).is_pending(), "keep-alive should prevent poll from resolving" ); // polls: initial assert_eq!(h1.poll_count, 1); let mut res = buf.take_write_buf().to_vec(); stabilize_date_header(&mut res); let res = &res[..]; let exp = b"\ HTTP/1.1 200 OK\r\n\ content-length: 5\r\n\ date: Thu, 01 Jan 1970 12:34:56 UTC\r\n\r\n\ /abcd\ "; assert_eq!( res, exp, "\nexpected response not in write buffer:\n\ response: {:?}\n\ expected: {:?}", String::from_utf8_lossy(res), String::from_utf8_lossy(exp) ); }) .await; // sleep for less than KA timeout sleep(Duration::from_millis(100)).await; lazy(|cx| { assert!( h1.as_mut().poll(cx).is_pending(), "keep-alive should not have resolved dispatcher yet", ); // polls: initial => manual assert_eq!(h1.poll_count, 2); if let DispatcherStateProj::Normal { inner } = h1.as_mut().project().inner.project() { // connection not closed assert!(!inner.flags.contains(Flags::SHUTDOWN)); assert!(!inner.flags.contains(Flags::WRITE_DISCONNECT)); // and nothing added to write buffer assert!(buf.write_buf_slice().is_empty()); } }) .await; lazy(|cx| { buf.extend_read_buf( "\ GET /efg HTTP/1.1\r\n\ Connection: close\r\n\ \r\n\r\n", ); assert!( h1.as_mut().poll(cx).is_ready(), "connection close header should override keep-alive setting", ); // polls: initial => manual => follow-up req => shutdown assert_eq!(h1.poll_count, 4); if let DispatcherStateProj::Normal { inner } = h1.as_mut().project().inner.project() { // connection closed assert!(inner.flags.contains(Flags::SHUTDOWN)); assert!(!inner.flags.contains(Flags::WRITE_DISCONNECT)); } let mut res = buf.take_write_buf().to_vec(); stabilize_date_header(&mut res); let res = &res[..]; let exp = b"\ HTTP/1.1 200 OK\r\n\ content-length: 4\r\n\ connection: close\r\n\ date: Thu, 01 Jan 1970 12:34:56 UTC\r\n\r\n\ /efg\ "; assert_eq!( res, exp, "\nexpected response not in write buffer:\n\ response: {:?}\n\ expected: {:?}", String::from_utf8_lossy(res), String::from_utf8_lossy(exp) ); }) .await; } #[actix_rt::test] async fn req_parse_err() { lazy(|cx| { let buf = TestBuffer::new("GET /test HTTP/1\r\n\r\n"); let services = HttpFlow::new(ok_service(), ExpectHandler, None); let h1 = Dispatcher::<_, _, _, _, UpgradeHandler>::new( buf.clone(), services, ServiceConfig::default(), None, OnConnectData::default(), ); pin!(h1); match h1.as_mut().poll(cx) { Poll::Pending => panic!(), Poll::Ready(res) => assert!(res.is_err()), } if let DispatcherStateProj::Normal { inner } = h1.project().inner.project() { assert!(inner.flags.contains(Flags::READ_DISCONNECT)); assert_eq!( &buf.write_buf_slice()[..26], b"HTTP/1.1 400 Bad Request\r\n" ); } }) .await; } #[actix_rt::test] async fn pipelining_ok_then_ok() { lazy(|cx| { let buf = TestBuffer::new( "\ GET /abcd HTTP/1.1\r\n\r\n\ GET /def HTTP/1.1\r\n\r\n\ ", ); let cfg = ServiceConfig::new( KeepAlive::Disabled, Duration::from_millis(1), Duration::from_millis(1), false, None, ); let services = HttpFlow::new(echo_path_service(), ExpectHandler, None); let h1 = Dispatcher::<_, _, _, _, UpgradeHandler>::new( buf.clone(), services, cfg, None, OnConnectData::default(), ); pin!(h1); assert!(matches!(&h1.inner, DispatcherState::Normal { .. })); match h1.as_mut().poll(cx) { Poll::Pending => panic!("first poll should not be pending"), Poll::Ready(res) => assert!(res.is_ok()), } // polls: initial => shutdown assert_eq!(h1.poll_count, 2); let mut res = buf.write_buf_slice_mut(); stabilize_date_header(&mut res); let res = &res[..]; let exp = b"\ HTTP/1.1 200 OK\r\n\ content-length: 5\r\n\ connection: close\r\n\ date: Thu, 01 Jan 1970 12:34:56 UTC\r\n\r\n\ /abcd\ HTTP/1.1 200 OK\r\n\ content-length: 4\r\n\ connection: close\r\n\ date: Thu, 01 Jan 1970 12:34:56 UTC\r\n\r\n\ /def\ "; assert_eq!( res, exp, "\nexpected response not in write buffer:\n\ response: {:?}\n\ expected: {:?}", String::from_utf8_lossy(res), String::from_utf8_lossy(exp) ); }) .await; } #[actix_rt::test] async fn early_response_with_payload_closes_connection() { lazy(|cx| { let buf = TestBuffer::new( "\ GET /unfinished HTTP/1.1\r\n\ Content-Length: 2\r\n\ \r\n\ ", ); let cfg = ServiceConfig::new( KeepAlive::Os, Duration::from_millis(1), Duration::from_millis(1), false, None, ); let services = HttpFlow::new(echo_path_service(), ExpectHandler, None); let h1 = Dispatcher::<_, _, _, _, UpgradeHandler>::new( buf.clone(), services, cfg, None, OnConnectData::default(), ); pin!(h1); assert!(matches!(&h1.inner, DispatcherState::Normal { .. })); match h1.as_mut().poll(cx) { Poll::Pending => panic!("Should have shut down"), Poll::Ready(res) => assert!(res.is_ok()), } // polls: initial => shutdown assert_eq!(h1.poll_count, 2); { let mut res = buf.write_buf_slice_mut(); stabilize_date_header(&mut res); let res = &res[..]; let exp = b"\ HTTP/1.1 200 OK\r\n\ content-length: 11\r\n\ date: Thu, 01 Jan 1970 12:34:56 UTC\r\n\r\n\ /unfinished\ "; assert_eq!( res, exp, "\nexpected response not in write buffer:\n\ response: {:?}\n\ expected: {:?}", String::from_utf8_lossy(res), String::from_utf8_lossy(exp) ); } }) .await; } #[actix_rt::test] async fn pipelining_ok_then_bad() { lazy(|cx| { let buf = TestBuffer::new( "\ GET /abcd HTTP/1.1\r\n\r\n\ GET /def HTTP/1\r\n\r\n\ ", ); let cfg = ServiceConfig::new( KeepAlive::Disabled, Duration::from_millis(1), Duration::from_millis(1), false, None, ); let services = HttpFlow::new(echo_path_service(), ExpectHandler, None); let h1 = Dispatcher::<_, _, _, _, UpgradeHandler>::new( buf.clone(), services, cfg, None, OnConnectData::default(), ); pin!(h1); assert!(matches!(&h1.inner, DispatcherState::Normal { .. })); match h1.as_mut().poll(cx) { Poll::Pending => panic!("first poll should not be pending"), Poll::Ready(res) => assert!(res.is_err()), } // polls: initial => shutdown assert_eq!(h1.poll_count, 1); let mut res = buf.write_buf_slice_mut(); stabilize_date_header(&mut res); let res = &res[..]; let exp = b"\ HTTP/1.1 200 OK\r\n\ content-length: 5\r\n\ connection: close\r\n\ date: Thu, 01 Jan 1970 12:34:56 UTC\r\n\r\n\ /abcd\ HTTP/1.1 400 Bad Request\r\n\ content-length: 0\r\n\ connection: close\r\n\ date: Thu, 01 Jan 1970 12:34:56 UTC\r\n\r\n\ "; assert_eq!( res, exp, "\nexpected response not in write buffer:\n\ response: {:?}\n\ expected: {:?}", String::from_utf8_lossy(res), String::from_utf8_lossy(exp) ); }) .await; } #[actix_rt::test] async fn expect_handling() { lazy(|cx| { let mut buf = TestSeqBuffer::empty(); let cfg = ServiceConfig::new( KeepAlive::Disabled, Duration::ZERO, Duration::ZERO, false, None, ); let services = HttpFlow::new(echo_payload_service(), ExpectHandler, None); let h1 = Dispatcher::<_, _, _, _, UpgradeHandler>::new( buf.clone(), services, cfg, None, OnConnectData::default(), ); buf.extend_read_buf( "\ POST /upload HTTP/1.1\r\n\ Content-Length: 5\r\n\ Expect: 100-continue\r\n\ \r\n\ ", ); pin!(h1); assert!(h1.as_mut().poll(cx).is_pending()); assert!(matches!(&h1.inner, DispatcherState::Normal { .. })); // polls: manual assert_eq!(h1.poll_count, 1); if let DispatcherState::Normal { ref inner } = h1.inner { let io = inner.io.as_ref().unwrap(); let res = &io.write_buf()[..]; assert_eq!( str::from_utf8(res).unwrap(), "HTTP/1.1 100 Continue\r\n\r\n" ); } buf.extend_read_buf("12345"); assert!(h1.as_mut().poll(cx).is_ready()); // polls: manual manual shutdown assert_eq!(h1.poll_count, 3); if let DispatcherState::Normal { ref inner } = h1.inner { let io = inner.io.as_ref().unwrap(); let mut res = io.write_buf()[..].to_owned(); stabilize_date_header(&mut res); assert_eq!( str::from_utf8(&res).unwrap(), "\ HTTP/1.1 100 Continue\r\n\ \r\n\ HTTP/1.1 200 OK\r\n\ content-length: 5\r\n\ connection: close\r\n\ date: Thu, 01 Jan 1970 12:34:56 UTC\r\n\ \r\n\ 12345\ " ); } }) .await; } #[actix_rt::test] async fn expect_eager() { lazy(|cx| { let mut buf = TestSeqBuffer::empty(); let cfg = ServiceConfig::new( KeepAlive::Disabled, Duration::ZERO, Duration::ZERO, false, None, ); let services = HttpFlow::new(echo_path_service(), ExpectHandler, None); let h1 = Dispatcher::<_, _, _, _, UpgradeHandler>::new( buf.clone(), services, cfg, None, OnConnectData::default(), ); buf.extend_read_buf( "\ POST /upload HTTP/1.1\r\n\ Content-Length: 5\r\n\ Expect: 100-continue\r\n\ \r\n\ ", ); pin!(h1); assert!(h1.as_mut().poll(cx).is_ready()); assert!(matches!(&h1.inner, DispatcherState::Normal { .. })); // polls: manual shutdown assert_eq!(h1.poll_count, 2); if let DispatcherState::Normal { ref inner } = h1.inner { let io = inner.io.as_ref().unwrap(); let mut res = io.write_buf()[..].to_owned(); stabilize_date_header(&mut res); // Despite the content-length header and even though the request payload has not // been sent, this test expects a complete service response since the payload // is not used at all. The service passed to dispatcher is path echo and doesn't // consume payload bytes. assert_eq!( str::from_utf8(&res).unwrap(), "\ HTTP/1.1 100 Continue\r\n\ \r\n\ HTTP/1.1 200 OK\r\n\ content-length: 7\r\n\ connection: close\r\n\ date: Thu, 01 Jan 1970 12:34:56 UTC\r\n\ \r\n\ /upload\ " ); } }) .await; } #[actix_rt::test] async fn upgrade_handling() { struct TestUpgrade; impl<T> Service<(Request, Framed<T, Codec>)> for TestUpgrade { type Response = (); type Error = Error; type Future = Ready<Result<Self::Response, Self::Error>>; actix_service::always_ready!(); fn call(&self, (req, _framed): (Request, Framed<T, Codec>)) -> Self::Future { assert_eq!(req.method(), Method::GET); assert!(req.upgrade()); assert_eq!(req.headers().get("upgrade").unwrap(), "websocket"); ready(Ok(())) } } lazy(|cx| { let mut buf = TestSeqBuffer::empty(); let cfg = ServiceConfig::new( KeepAlive::Disabled, Duration::ZERO, Duration::ZERO, false, None, ); let services = HttpFlow::new(ok_service(), ExpectHandler, Some(TestUpgrade)); let h1 = Dispatcher::<_, _, _, _, TestUpgrade>::new( buf.clone(), services, cfg, None, OnConnectData::default(), ); buf.extend_read_buf( "\ GET /ws HTTP/1.1\r\n\ Connection: Upgrade\r\n\ Upgrade: websocket\r\n\ \r\n\ ", ); pin!(h1); assert!(h1.as_mut().poll(cx).is_ready()); assert!(matches!(&h1.inner, DispatcherState::Upgrade { .. })); // polls: manual shutdown assert_eq!(h1.poll_count, 2); }) .await; } // fix in #2624 reverted temporarily // complete fix tracked in #2745 #[ignore] #[actix_rt::test] async fn handler_drop_payload() { let _ = env_logger::try_init(); let mut buf = TestBuffer::new(http_msg( r" POST /drop-payload HTTP/1.1 Content-Length: 3 abc ", )); let services = HttpFlow::new( drop_payload_service(), ExpectHandler, None::<UpgradeHandler>, ); let h1 = Dispatcher::new( buf.clone(), services, ServiceConfig::default(), None, OnConnectData::default(), ); pin!(h1); lazy(|cx| { assert!(h1.as_mut().poll(cx).is_pending()); // polls: manual assert_eq!(h1.poll_count, 1); let mut res = BytesMut::from(buf.take_write_buf().as_ref()); stabilize_date_header(&mut res); let res = &res[..]; let exp = http_msg( r" HTTP/1.1 200 OK content-length: 15 date: Thu, 01 Jan 1970 12:34:56 UTC payload dropped ", ); assert_eq!( res, exp, "\nexpected response not in write buffer:\n\ response: {:?}\n\ expected: {:?}", String::from_utf8_lossy(res), String::from_utf8_lossy(&exp) ); if let DispatcherStateProj::Normal { inner } = h1.as_mut().project().inner.project() { assert!(inner.state.is_none()); } }) .await; lazy(|cx| { // add message that claims to have payload longer than provided buf.extend_read_buf(http_msg( r" POST /drop-payload HTTP/1.1 Content-Length: 200 abc ", )); assert!(h1.as_mut().poll(cx).is_pending()); // polls: manual => manual assert_eq!(h1.poll_count, 2); let mut res = BytesMut::from(buf.take_write_buf().as_ref()); stabilize_date_header(&mut res); let res = &res[..]; // expect response immediately even though request side has not finished reading payload let exp = http_msg( r" HTTP/1.1 200 OK content-length: 15 date: Thu, 01 Jan 1970 12:34:56 UTC payload dropped ", ); assert_eq!( res, exp, "\nexpected response not in write buffer:\n\ response: {:?}\n\ expected: {:?}", String::from_utf8_lossy(res), String::from_utf8_lossy(&exp) ); }) .await; lazy(|cx| { assert!(h1.as_mut().poll(cx).is_ready()); // polls: manual => manual => manual assert_eq!(h1.poll_count, 3); let mut res = BytesMut::from(buf.take_write_buf().as_ref()); stabilize_date_header(&mut res); let res = &res[..]; // expect that unrequested error response is sent back since connection could not be cleaned let exp = http_msg( r" HTTP/1.1 500 Internal Server Error content-length: 0 connection: close date: Thu, 01 Jan 1970 12:34:56 UTC ", ); assert_eq!( res, exp, "\nexpected response not in write buffer:\n\ response: {:?}\n\ expected: {:?}", String::from_utf8_lossy(res), String::from_utf8_lossy(&exp) ); }) .await; } #[actix_rt::test] async fn allow_half_closed() { let buf = TestSeqBuffer::new(http_msg("GET / HTTP/1.1")); buf.close_read(); let services = HttpFlow::new(YieldService, ExpectHandler, None::<UpgradeHandler>); let mut cx = Context::from_waker(futures_util::task::noop_waker_ref()); let disptacher = Dispatcher::new( buf.clone(), services, ServiceConfig::default(), None, OnConnectData::default(), ); pin!(disptacher); assert!(disptacher.as_mut().poll(&mut cx).is_pending()); assert_eq!(disptacher.poll_count, 1); assert!(disptacher.as_mut().poll(&mut cx).is_ready()); assert_eq!(disptacher.poll_count, 3); let mut res = BytesMut::from(buf.take_write_buf().as_ref()); stabilize_date_header(&mut res); let exp = http_msg( r" HTTP/1.1 200 OK content-length: 0 date: Thu, 01 Jan 1970 12:34:56 UTC ", ); assert_eq!( res, exp, "\nexpected response not in write buffer:\n\ response: {:?}\n\ expected: {:?}", String::from_utf8_lossy(&res), String::from_utf8_lossy(&exp) ); let DispatcherStateProj::Normal { inner } = disptacher.as_mut().project().inner.project() else { panic!("End dispatcher state should be Normal"); }; assert!(inner.state.is_none()); } #[actix_rt::test] async fn disallow_half_closed() { use crate::{config::ServiceConfigBuilder, h1::dispatcher::State}; let buf = TestSeqBuffer::new(http_msg("GET / HTTP/1.1")); buf.close_read(); let services = HttpFlow::new(YieldService, ExpectHandler, None::<UpgradeHandler>); let config = ServiceConfigBuilder::new() .h1_allow_half_closed(false) .build(); let mut cx = Context::from_waker(futures_util::task::noop_waker_ref()); let disptacher = Dispatcher::new( buf.clone(), services, config, None, OnConnectData::default(), ); pin!(disptacher); assert!(disptacher.as_mut().poll(&mut cx).is_pending()); assert_eq!(disptacher.poll_count, 1); assert!(disptacher.as_mut().poll(&mut cx).is_ready()); assert_eq!(disptacher.poll_count, 2); let res = BytesMut::from(buf.take_write_buf().as_ref()); assert!(res.is_empty()); let DispatcherStateProj::Normal { inner } = disptacher.as_mut().project().inner.project() else { panic!("End dispatcher state should be Normal"); }; assert!(matches!(inner.state, State::ServiceCall { .. })) } fn http_msg(msg: impl AsRef<str>) -> BytesMut { let mut msg = msg .as_ref() .trim() .split('\n') .map(|line| [line.trim_start(), "\r"].concat()) .collect::<Vec<_>>() .join("\n"); // remove trailing \r msg.pop(); if !msg.is_empty() && !msg.contains("\r\n\r\n") { msg.push_str("\r\n\r\n"); } BytesMut::from(msg.as_bytes()) } #[test] fn http_msg_creates_msg() { assert_eq!(http_msg(r""), ""); assert_eq!( http_msg( r" POST / HTTP/1.1 Content-Length: 3 abc " ), "POST / HTTP/1.1\r\nContent-Length: 3\r\n\r\nabc" ); assert_eq!( http_msg( r" GET / HTTP/1.1 Content-Length: 3 " ), "GET / HTTP/1.1\r\nContent-Length: 3\r\n\r\n" ); }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/h1/service.rs
actix-http/src/h1/service.rs
use std::{ fmt, marker::PhantomData, net, rc::Rc, task::{Context, Poll}, }; use actix_codec::{AsyncRead, AsyncWrite, Framed}; use actix_rt::net::TcpStream; use actix_service::{ fn_service, IntoServiceFactory, Service, ServiceFactory, ServiceFactoryExt as _, }; use actix_utils::future::ready; use futures_core::future::LocalBoxFuture; use tracing::error; use super::{codec::Codec, dispatcher::Dispatcher, ExpectHandler, UpgradeHandler}; use crate::{ body::{BoxBody, MessageBody}, config::ServiceConfig, error::DispatchError, service::HttpServiceHandler, ConnectCallback, OnConnectData, Request, Response, }; /// `ServiceFactory` implementation for HTTP1 transport pub struct H1Service<T, S, B, X = ExpectHandler, U = UpgradeHandler> { srv: S, cfg: ServiceConfig, expect: X, upgrade: Option<U>, on_connect_ext: Option<Rc<ConnectCallback<T>>>, _phantom: PhantomData<B>, } impl<T, S, B> H1Service<T, S, B> where S: ServiceFactory<Request, Config = ()>, S::Error: Into<Response<BoxBody>>, S::InitError: fmt::Debug, S::Response: Into<Response<B>>, B: MessageBody, { /// Create new `HttpService` instance with config. pub(crate) fn with_config<F: IntoServiceFactory<S, Request>>( cfg: ServiceConfig, service: F, ) -> Self { H1Service { cfg, srv: service.into_factory(), expect: ExpectHandler, upgrade: None, on_connect_ext: None, _phantom: PhantomData, } } } impl<S, B, X, U> H1Service<TcpStream, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>>, S::InitError: fmt::Debug, S::Response: Into<Response<B>>, B: MessageBody, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory<(Request, Framed<TcpStream, Codec>), Config = (), Response = ()>, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { /// Create simple tcp stream service pub fn tcp( self, ) -> impl ServiceFactory<TcpStream, Config = (), Response = (), Error = DispatchError, InitError = ()> { fn_service(|io: TcpStream| { let peer_addr = io.peer_addr().ok(); ready(Ok((io, peer_addr))) }) .and_then(self) } } #[cfg(feature = "openssl")] mod openssl { use actix_tls::accept::{ openssl::{ reexports::{Error as SslError, SslAcceptor}, Acceptor, TlsStream, }, TlsError, }; use super::*; impl<S, B, X, U> H1Service<TlsStream<TcpStream>, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>>, S::InitError: fmt::Debug, S::Response: Into<Response<B>>, B: MessageBody, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory< (Request, Framed<TlsStream<TcpStream>, Codec>), Config = (), Response = (), >, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { /// Create OpenSSL based service. pub fn openssl( self, acceptor: SslAcceptor, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<SslError, DispatchError>, InitError = (), > { Acceptor::new(acceptor) .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .map(|io: TlsStream<TcpStream>| { let peer_addr = io.get_ref().peer_addr().ok(); (io, peer_addr) }) .and_then(self.map_err(TlsError::Service)) } } } #[cfg(feature = "rustls-0_20")] mod rustls_0_20 { use std::io; use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ rustls_0_20::{reexports::ServerConfig, Acceptor, TlsStream}, TlsError, }; use super::*; impl<S, B, X, U> H1Service<TlsStream<TcpStream>, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>>, S::InitError: fmt::Debug, S::Response: Into<Response<B>>, B: MessageBody, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory< (Request, Framed<TlsStream<TcpStream>, Codec>), Config = (), Response = (), >, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { /// Create Rustls v0.20 based service. pub fn rustls( self, config: ServerConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = (), > { Acceptor::new(config) .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .map(|io: TlsStream<TcpStream>| { let peer_addr = io.get_ref().0.peer_addr().ok(); (io, peer_addr) }) .and_then(self.map_err(TlsError::Service)) } } } #[cfg(feature = "rustls-0_21")] mod rustls_0_21 { use std::io; use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ rustls_0_21::{reexports::ServerConfig, Acceptor, TlsStream}, TlsError, }; use super::*; impl<S, B, X, U> H1Service<TlsStream<TcpStream>, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>>, S::InitError: fmt::Debug, S::Response: Into<Response<B>>, B: MessageBody, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory< (Request, Framed<TlsStream<TcpStream>, Codec>), Config = (), Response = (), >, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { /// Create Rustls v0.21 based service. pub fn rustls_021( self, config: ServerConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = (), > { Acceptor::new(config) .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .map(|io: TlsStream<TcpStream>| { let peer_addr = io.get_ref().0.peer_addr().ok(); (io, peer_addr) }) .and_then(self.map_err(TlsError::Service)) } } } #[cfg(feature = "rustls-0_22")] mod rustls_0_22 { use std::io; use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ rustls_0_22::{reexports::ServerConfig, Acceptor, TlsStream}, TlsError, }; use super::*; impl<S, B, X, U> H1Service<TlsStream<TcpStream>, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>>, S::InitError: fmt::Debug, S::Response: Into<Response<B>>, B: MessageBody, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory< (Request, Framed<TlsStream<TcpStream>, Codec>), Config = (), Response = (), >, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { /// Create Rustls v0.22 based service. pub fn rustls_0_22( self, config: ServerConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = (), > { Acceptor::new(config) .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .map(|io: TlsStream<TcpStream>| { let peer_addr = io.get_ref().0.peer_addr().ok(); (io, peer_addr) }) .and_then(self.map_err(TlsError::Service)) } } } #[cfg(feature = "rustls-0_23")] mod rustls_0_23 { use std::io; use actix_service::ServiceFactoryExt as _; use actix_tls::accept::{ rustls_0_23::{reexports::ServerConfig, Acceptor, TlsStream}, TlsError, }; use super::*; impl<S, B, X, U> H1Service<TlsStream<TcpStream>, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>>, S::InitError: fmt::Debug, S::Response: Into<Response<B>>, B: MessageBody, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory< (Request, Framed<TlsStream<TcpStream>, Codec>), Config = (), Response = (), >, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { /// Create Rustls v0.23 based service. pub fn rustls_0_23( self, config: ServerConfig, ) -> impl ServiceFactory< TcpStream, Config = (), Response = (), Error = TlsError<io::Error, DispatchError>, InitError = (), > { Acceptor::new(config) .map_init_err(|_| { unreachable!("TLS acceptor service factory does not error on init") }) .map_err(TlsError::into_service_error) .map(|io: TlsStream<TcpStream>| { let peer_addr = io.get_ref().0.peer_addr().ok(); (io, peer_addr) }) .and_then(self.map_err(TlsError::Service)) } } } impl<T, S, B, X, U> H1Service<T, S, B, X, U> where S: ServiceFactory<Request, Config = ()>, S::Error: Into<Response<BoxBody>>, S::Response: Into<Response<B>>, S::InitError: fmt::Debug, B: MessageBody, { pub fn expect<X1>(self, expect: X1) -> H1Service<T, S, B, X1, U> where X1: ServiceFactory<Request, Response = Request>, X1::Error: Into<Response<BoxBody>>, X1::InitError: fmt::Debug, { H1Service { expect, cfg: self.cfg, srv: self.srv, upgrade: self.upgrade, on_connect_ext: self.on_connect_ext, _phantom: PhantomData, } } pub fn upgrade<U1>(self, upgrade: Option<U1>) -> H1Service<T, S, B, X, U1> where U1: ServiceFactory<(Request, Framed<T, Codec>), Response = ()>, U1::Error: fmt::Display, U1::InitError: fmt::Debug, { H1Service { upgrade, cfg: self.cfg, srv: self.srv, expect: self.expect, on_connect_ext: self.on_connect_ext, _phantom: PhantomData, } } /// Set on connect callback. pub(crate) fn on_connect_ext(mut self, f: Option<Rc<ConnectCallback<T>>>) -> Self { self.on_connect_ext = f; self } } impl<T, S, B, X, U> ServiceFactory<(T, Option<net::SocketAddr>)> for H1Service<T, S, B, X, U> where T: AsyncRead + AsyncWrite + Unpin + 'static, S: ServiceFactory<Request, Config = ()>, S::Future: 'static, S::Error: Into<Response<BoxBody>>, S::Response: Into<Response<B>>, S::InitError: fmt::Debug, B: MessageBody, X: ServiceFactory<Request, Config = (), Response = Request>, X::Future: 'static, X::Error: Into<Response<BoxBody>>, X::InitError: fmt::Debug, U: ServiceFactory<(Request, Framed<T, Codec>), Config = (), Response = ()>, U::Future: 'static, U::Error: fmt::Display + Into<Response<BoxBody>>, U::InitError: fmt::Debug, { type Response = (); type Error = DispatchError; type Config = (); type Service = H1ServiceHandler<T, S::Service, B, X::Service, U::Service>; type InitError = (); type Future = LocalBoxFuture<'static, Result<Self::Service, Self::InitError>>; fn new_service(&self, _: ()) -> Self::Future { let service = self.srv.new_service(()); let expect = self.expect.new_service(()); let upgrade = self.upgrade.as_ref().map(|s| s.new_service(())); let on_connect_ext = self.on_connect_ext.clone(); let cfg = self.cfg.clone(); Box::pin(async move { let expect = expect.await.map_err(|err| { tracing::error!("Initialization of HTTP expect service error: {err:?}"); })?; let upgrade = match upgrade { Some(upgrade) => { let upgrade = upgrade.await.map_err(|err| { tracing::error!("Initialization of HTTP upgrade service error: {err:?}"); })?; Some(upgrade) } None => None, }; let service = service .await .map_err(|err| error!("Initialization of HTTP service error: {err:?}"))?; Ok(H1ServiceHandler::new( cfg, service, expect, upgrade, on_connect_ext, )) }) } } /// `Service` implementation for HTTP/1 transport pub type H1ServiceHandler<T, S, B, X, U> = HttpServiceHandler<T, S, B, X, U>; impl<T, S, B, X, U> Service<(T, Option<net::SocketAddr>)> for HttpServiceHandler<T, S, B, X, U> where T: AsyncRead + AsyncWrite + Unpin, S: Service<Request>, S::Error: Into<Response<BoxBody>>, S::Response: Into<Response<B>>, B: MessageBody, X: Service<Request, Response = Request>, X::Error: Into<Response<BoxBody>>, U: Service<(Request, Framed<T, Codec>), Response = ()>, U::Error: fmt::Display + Into<Response<BoxBody>>, { type Response = (); type Error = DispatchError; type Future = Dispatcher<T, S, B, X, U>; fn poll_ready(&self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> { self._poll_ready(cx).map_err(|err| { error!("HTTP/1 service readiness error: {:?}", err); DispatchError::Service(err) }) } fn call(&self, (io, addr): (T, Option<net::SocketAddr>)) -> Self::Future { let conn_data = OnConnectData::from_io(&io, self.on_connect_ext.as_deref()); Dispatcher::new(io, Rc::clone(&self.flow), self.cfg.clone(), addr, conn_data) } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false
actix/actix-web
https://github.com/actix/actix-web/blob/024addfc4063814ba9ddd5e0ac06992e74b98e5b/actix-http/src/h1/upgrade.rs
actix-http/src/h1/upgrade.rs
use actix_codec::Framed; use actix_service::{Service, ServiceFactory}; use futures_core::future::LocalBoxFuture; use crate::{h1::Codec, Error, Request}; pub struct UpgradeHandler; impl<T> ServiceFactory<(Request, Framed<T, Codec>)> for UpgradeHandler { type Response = (); type Error = Error; type Config = (); type Service = UpgradeHandler; type InitError = Error; type Future = LocalBoxFuture<'static, Result<Self::Service, Self::InitError>>; fn new_service(&self, _: ()) -> Self::Future { unimplemented!() } } impl<T> Service<(Request, Framed<T, Codec>)> for UpgradeHandler { type Response = (); type Error = Error; type Future = LocalBoxFuture<'static, Result<Self::Response, Self::Error>>; actix_service::always_ready!(); fn call(&self, _: (Request, Framed<T, Codec>)) -> Self::Future { unimplemented!() } }
rust
Apache-2.0
024addfc4063814ba9ddd5e0ac06992e74b98e5b
2026-01-04T15:37:59.021020Z
false