Support Regex in origins configuration (#62)
* Refactor Origin * Fix tests * Fix tests * Add JSON deserialization test * Support regex * Fix wording * Fix wording
This commit is contained in:
parent
f9bffe77d6
commit
6f56109d77
|
@ -1,6 +1,6 @@
|
||||||
[package]
|
[package]
|
||||||
name = "rocket_cors"
|
name = "rocket_cors"
|
||||||
version = "0.4.0"
|
version = "0.5.0"
|
||||||
license = "MIT/Apache-2.0"
|
license = "MIT/Apache-2.0"
|
||||||
authors = ["Yong Wen Chua <me@yongwen.xyz>"]
|
authors = ["Yong Wen Chua <me@yongwen.xyz>"]
|
||||||
description = "Cross-origin resource sharing (CORS) for Rocket.rs applications"
|
description = "Cross-origin resource sharing (CORS) for Rocket.rs applications"
|
||||||
|
@ -21,6 +21,7 @@ default = ["serialization"]
|
||||||
serialization = ["serde", "serde_derive", "unicase_serde"]
|
serialization = ["serde", "serde_derive", "unicase_serde"]
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
|
regex = "1.1"
|
||||||
rocket = "0.4.0"
|
rocket = "0.4.0"
|
||||||
log = "0.3"
|
log = "0.3"
|
||||||
unicase = "2.0"
|
unicase = "2.0"
|
||||||
|
|
|
@ -1,7 +1,6 @@
|
||||||
# rocket_cors
|
# rocket_cors
|
||||||
|
|
||||||
[![Build Status](https://travis-ci.org/lawliet89/rocket_cors.svg)](https://travis-ci.org/lawliet89/rocket_cors)
|
[![Build Status](https://travis-ci.org/lawliet89/rocket_cors.svg)](https://travis-ci.org/lawliet89/rocket_cors)
|
||||||
[![Dependency Status](https://dependencyci.com/github/lawliet89/rocket_cors/badge)](https://dependencyci.com/github/lawliet89/rocket_cors)
|
|
||||||
[![Repository](https://img.shields.io/github/tag/lawliet89/rocket_cors.svg)](https://github.com/lawliet89/rocket_cors)
|
[![Repository](https://img.shields.io/github/tag/lawliet89/rocket_cors.svg)](https://github.com/lawliet89/rocket_cors)
|
||||||
[![Crates.io](https://img.shields.io/crates/v/rocket_cors.svg)](https://crates.io/crates/rocket_cors)
|
[![Crates.io](https://img.shields.io/crates/v/rocket_cors.svg)](https://crates.io/crates/rocket_cors)
|
||||||
|
|
||||||
|
@ -31,7 +30,7 @@ work, but they are subject to the minimum that Rocket sets.
|
||||||
Add the following to Cargo.toml:
|
Add the following to Cargo.toml:
|
||||||
|
|
||||||
```toml
|
```toml
|
||||||
rocket_cors = "0.4.0"
|
rocket_cors = "0.5.0"
|
||||||
```
|
```
|
||||||
|
|
||||||
To use the latest `master` branch, for example:
|
To use the latest `master` branch, for example:
|
||||||
|
|
|
@ -12,11 +12,11 @@ fn cors<'a>() -> &'a str {
|
||||||
}
|
}
|
||||||
|
|
||||||
fn main() -> Result<(), Error> {
|
fn main() -> Result<(), Error> {
|
||||||
let allowed_origins = AllowedOrigins::some(&["https://www.acme.com"]);
|
let allowed_origins = AllowedOrigins::some_exact(&["https://www.acme.com"]);
|
||||||
|
|
||||||
// You can also deserialize this
|
// You can also deserialize this
|
||||||
let cors = rocket_cors::CorsOptions {
|
let cors = rocket_cors::CorsOptions {
|
||||||
allowed_origins: allowed_origins,
|
allowed_origins,
|
||||||
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
||||||
allow_credentials: true,
|
allow_credentials: true,
|
||||||
|
|
|
@ -36,11 +36,11 @@ fn manual(cors: Guard<'_>) -> Responder<'_, &str> {
|
||||||
}
|
}
|
||||||
|
|
||||||
fn main() -> Result<(), Error> {
|
fn main() -> Result<(), Error> {
|
||||||
let allowed_origins = AllowedOrigins::some(&["https://www.acme.com"]);
|
let allowed_origins = AllowedOrigins::some_exact(&["https://www.acme.com"]);
|
||||||
|
|
||||||
// You can also deserialize this
|
// You can also deserialize this
|
||||||
let cors = rocket_cors::CorsOptions {
|
let cors = rocket_cors::CorsOptions {
|
||||||
allowed_origins: allowed_origins,
|
allowed_origins,
|
||||||
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
||||||
allow_credentials: true,
|
allow_credentials: true,
|
||||||
|
|
|
@ -13,10 +13,10 @@ fn main() {
|
||||||
// The default demonstrates the "All" serialization of several of the settings
|
// The default demonstrates the "All" serialization of several of the settings
|
||||||
let default: CorsOptions = Default::default();
|
let default: CorsOptions = Default::default();
|
||||||
|
|
||||||
let allowed_origins = AllowedOrigins::some(&["https://www.acme.com"]);
|
let allowed_origins = AllowedOrigins::some_exact(&["https://www.acme.com"]);
|
||||||
|
|
||||||
let options = cors::CorsOptions {
|
let options = cors::CorsOptions {
|
||||||
allowed_origins: allowed_origins,
|
allowed_origins,
|
||||||
allowed_methods: vec![Method::Get, Method::Post, Method::Delete]
|
allowed_methods: vec![Method::Get, Method::Post, Method::Delete]
|
||||||
.into_iter()
|
.into_iter()
|
||||||
.map(From::from)
|
.map(From::from)
|
||||||
|
|
|
@ -59,11 +59,11 @@ fn owned_options<'r>() -> impl Responder<'r> {
|
||||||
}
|
}
|
||||||
|
|
||||||
fn cors_options() -> CorsOptions {
|
fn cors_options() -> CorsOptions {
|
||||||
let allowed_origins = AllowedOrigins::some(&["https://www.acme.com"]);
|
let allowed_origins = AllowedOrigins::some_exact(&["https://www.acme.com"]);
|
||||||
|
|
||||||
// You can also deserialize this
|
// You can also deserialize this
|
||||||
rocket_cors::CorsOptions {
|
rocket_cors::CorsOptions {
|
||||||
allowed_origins: allowed_origins,
|
allowed_origins,
|
||||||
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
||||||
allow_credentials: true,
|
allow_credentials: true,
|
||||||
|
|
|
@ -36,11 +36,11 @@ fn ping_options<'r>() -> impl Responder<'r> {
|
||||||
|
|
||||||
/// Returns the "application wide" Cors struct
|
/// Returns the "application wide" Cors struct
|
||||||
fn cors_options() -> CorsOptions {
|
fn cors_options() -> CorsOptions {
|
||||||
let allowed_origins = AllowedOrigins::some(&["https://www.acme.com"]);
|
let allowed_origins = AllowedOrigins::some_exact(&["https://www.acme.com"]);
|
||||||
|
|
||||||
// You can also deserialize this
|
// You can also deserialize this
|
||||||
rocket_cors::CorsOptions {
|
rocket_cors::CorsOptions {
|
||||||
allowed_origins: allowed_origins,
|
allowed_origins,
|
||||||
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
||||||
allow_credentials: true,
|
allow_credentials: true,
|
||||||
|
|
|
@ -63,6 +63,7 @@ fn on_response_wrapper(
|
||||||
return Ok(());
|
return Ok(());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
let origin = origin.to_string();
|
||||||
let cors_response = if request.method() == http::Method::Options {
|
let cors_response = if request.method() == http::Method::Options {
|
||||||
let headers = request_headers(request)?;
|
let headers = request_headers(request)?;
|
||||||
preflight_response(options, &origin, headers.as_ref())
|
preflight_response(options, &origin, headers.as_ref())
|
||||||
|
@ -137,10 +138,10 @@ mod tests {
|
||||||
|
|
||||||
use crate::{AllowedHeaders, AllowedOrigins, Cors, CorsOptions};
|
use crate::{AllowedHeaders, AllowedOrigins, Cors, CorsOptions};
|
||||||
|
|
||||||
const CORS_ROOT: &'static str = "/my_cors";
|
const CORS_ROOT: &str = "/my_cors";
|
||||||
|
|
||||||
fn make_cors_options() -> Cors {
|
fn make_cors_options() -> Cors {
|
||||||
let allowed_origins = AllowedOrigins::some(&["https://www.acme.com"]);
|
let allowed_origins = AllowedOrigins::some_exact(&["https://www.acme.com"]);
|
||||||
|
|
||||||
CorsOptions {
|
CorsOptions {
|
||||||
allowed_origins,
|
allowed_origins,
|
||||||
|
|
|
@ -63,28 +63,51 @@ pub type HeaderFieldNamesSet = HashSet<HeaderFieldName>;
|
||||||
///
|
///
|
||||||
/// You can use this as a rocket [Request Guard](https://rocket.rs/guide/requests/#request-guards)
|
/// You can use this as a rocket [Request Guard](https://rocket.rs/guide/requests/#request-guards)
|
||||||
/// to ensure that `Origin` is passed in correctly.
|
/// to ensure that `Origin` is passed in correctly.
|
||||||
|
///
|
||||||
|
/// Reference: [Mozilla](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Origin)
|
||||||
#[derive(Eq, PartialEq, Clone, Hash, Debug)]
|
#[derive(Eq, PartialEq, Clone, Hash, Debug)]
|
||||||
pub struct Origin(pub url::Origin);
|
pub enum Origin {
|
||||||
|
/// A `null` Origin
|
||||||
|
Null,
|
||||||
|
/// A well-formed origin that was parsed by [`url::Url::origin`]
|
||||||
|
Parsed(url::Origin),
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Origin {
|
||||||
|
/// Perform an
|
||||||
|
/// [ASCII serialization](https://html.spec.whatwg.org/multipage/#ascii-serialisation-of-an-origin)
|
||||||
|
/// of this origin.
|
||||||
|
pub fn ascii_serialization(&self) -> String {
|
||||||
|
self.to_string()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Returns whether the origin was parsed as non-opaque
|
||||||
|
pub fn is_tuple(&self) -> bool {
|
||||||
|
match self {
|
||||||
|
Origin::Null => false,
|
||||||
|
Origin::Parsed(ref parsed) => parsed.is_tuple(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
impl FromStr for Origin {
|
impl FromStr for Origin {
|
||||||
type Err = crate::Error;
|
type Err = crate::Error;
|
||||||
|
|
||||||
fn from_str(input: &str) -> Result<Self, Self::Err> {
|
fn from_str(input: &str) -> Result<Self, Self::Err> {
|
||||||
Ok(Origin(crate::to_origin(input)?))
|
if input.to_lowercase() == "null" {
|
||||||
}
|
Ok(Origin::Null)
|
||||||
}
|
} else {
|
||||||
|
Ok(Origin::Parsed(crate::to_origin(input)?))
|
||||||
impl Deref for Origin {
|
}
|
||||||
type Target = url::Origin;
|
|
||||||
|
|
||||||
fn deref(&self) -> &Self::Target {
|
|
||||||
&self.0
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl fmt::Display for Origin {
|
impl fmt::Display for Origin {
|
||||||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||||||
write!(f, "{}", self.ascii_serialization())
|
match self {
|
||||||
|
Origin::Null => write!(f, "null"),
|
||||||
|
Origin::Parsed(ref parsed) => write!(f, "{}", parsed.ascii_serialization()),
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -195,6 +218,10 @@ mod tests {
|
||||||
let parsed = not_err!(Origin::from_str(url));
|
let parsed = not_err!(Origin::from_str(url));
|
||||||
assert_eq!(parsed.ascii_serialization(), url);
|
assert_eq!(parsed.ascii_serialization(), url);
|
||||||
|
|
||||||
|
let url = "https://foo.bar.xyz:1234";
|
||||||
|
let parsed = not_err!(Origin::from_str(url));
|
||||||
|
assert_eq!(parsed.ascii_serialization(), url);
|
||||||
|
|
||||||
// this should never really be sent by a compliant user agent
|
// this should never really be sent by a compliant user agent
|
||||||
let url = "https://foo.bar.xyz/path/somewhere";
|
let url = "https://foo.bar.xyz/path/somewhere";
|
||||||
let parsed = not_err!(Origin::from_str(url));
|
let parsed = not_err!(Origin::from_str(url));
|
||||||
|
@ -239,7 +266,7 @@ mod tests {
|
||||||
);
|
);
|
||||||
|
|
||||||
let method = "INVALID";
|
let method = "INVALID";
|
||||||
let _ = is_err!(AccessControlRequestMethod::from_str(method));
|
is_err!(AccessControlRequestMethod::from_str(method));
|
||||||
}
|
}
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
|
@ -281,7 +308,7 @@ mod tests {
|
||||||
let parsed_header = assert_matches!(outcome, Outcome::Success(s), s);
|
let parsed_header = assert_matches!(outcome, Outcome::Success(s), s);
|
||||||
let AccessControlRequestHeaders(parsed_headers) = parsed_header;
|
let AccessControlRequestHeaders(parsed_headers) = parsed_header;
|
||||||
let mut parsed_headers: Vec<String> =
|
let mut parsed_headers: Vec<String> =
|
||||||
parsed_headers.iter().map(|s| s.to_string()).collect();
|
parsed_headers.iter().map(ToString::to_string).collect();
|
||||||
parsed_headers.sort();
|
parsed_headers.sort();
|
||||||
assert_eq!(
|
assert_eq!(
|
||||||
vec!["accept-language".to_string(), "date".to_string()],
|
vec!["accept-language".to_string(), "date".to_string()],
|
||||||
|
|
383
src/lib.rs
383
src/lib.rs
|
@ -1,6 +1,5 @@
|
||||||
/*!
|
/*!
|
||||||
[![Build Status](https://travis-ci.org/lawliet89/rocket_cors.svg)](https://travis-ci.org/lawliet89/rocket_cors)
|
[![Build Status](https://travis-ci.org/lawliet89/rocket_cors.svg)](https://travis-ci.org/lawliet89/rocket_cors)
|
||||||
[![Dependency Status](https://dependencyci.com/github/lawliet89/rocket_cors/badge)](https://dependencyci.com/github/lawliet89/rocket_cors)
|
|
||||||
[![Repository](https://img.shields.io/github/tag/lawliet89/rocket_cors.svg)](https://github.com/lawliet89/rocket_cors)
|
[![Repository](https://img.shields.io/github/tag/lawliet89/rocket_cors.svg)](https://github.com/lawliet89/rocket_cors)
|
||||||
[![Crates.io](https://img.shields.io/crates/v/rocket_cors.svg)](https://crates.io/crates/rocket_cors)
|
[![Crates.io](https://img.shields.io/crates/v/rocket_cors.svg)](https://crates.io/crates/rocket_cors)
|
||||||
|
|
||||||
|
@ -30,7 +29,7 @@ might work, but they are subject to the minimum that Rocket sets.
|
||||||
Add the following to Cargo.toml:
|
Add the following to Cargo.toml:
|
||||||
|
|
||||||
```toml
|
```toml
|
||||||
rocket_cors = "0.4.0"
|
rocket_cors = "0.5.0"
|
||||||
```
|
```
|
||||||
|
|
||||||
To use the latest `master` branch, for example:
|
To use the latest `master` branch, for example:
|
||||||
|
@ -46,7 +45,7 @@ the [`CorsOptions`] struct that is described below. If you would like to disable
|
||||||
change your `Cargo.toml` to:
|
change your `Cargo.toml` to:
|
||||||
|
|
||||||
```toml
|
```toml
|
||||||
rocket_cors = { version = "0.4.0", default-features = false }
|
rocket_cors = { version = "0.5.0", default-features = false }
|
||||||
```
|
```
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
@ -63,9 +62,9 @@ Each of the examples can be run off the repository via `cargo run --example xxx`
|
||||||
|
|
||||||
### `CorsOptions` Struct
|
### `CorsOptions` Struct
|
||||||
|
|
||||||
The [`CorsOptiopns`] struct contains the settings for CORS requests to be validated
|
The [`CorsOptions`] struct contains the settings for CORS requests to be validated
|
||||||
and for responses to be generated. Defaults are defined for every field in the struct, and
|
and for responses to be generated. Defaults are defined for every field in the struct, and
|
||||||
are documented on the [`CorsOptiopns`] page. You can also deserialize
|
are documented on the [`CorsOptions`] page. You can also deserialize
|
||||||
the struct from some format like JSON, YAML or TOML when the default `serialization` feature
|
the struct from some format like JSON, YAML or TOML when the default `serialization` feature
|
||||||
is enabled.
|
is enabled.
|
||||||
|
|
||||||
|
@ -284,6 +283,7 @@ use std::ops::Deref;
|
||||||
use std::str::FromStr;
|
use std::str::FromStr;
|
||||||
|
|
||||||
use ::log::{error, info, log};
|
use ::log::{error, info, log};
|
||||||
|
use regex::RegexSet;
|
||||||
use rocket::http::{self, Status};
|
use rocket::http::{self, Status};
|
||||||
use rocket::request::{FromRequest, Request};
|
use rocket::request::{FromRequest, Request};
|
||||||
use rocket::response;
|
use rocket::response;
|
||||||
|
@ -309,6 +309,8 @@ pub enum Error {
|
||||||
MissingOrigin,
|
MissingOrigin,
|
||||||
/// The HTTP request header `Origin` could not be parsed correctly.
|
/// The HTTP request header `Origin` could not be parsed correctly.
|
||||||
BadOrigin(url::ParseError),
|
BadOrigin(url::ParseError),
|
||||||
|
/// The configured Allowed Origin is opaque and cannot be parsed.
|
||||||
|
OpaqueAllowedOrigin(String),
|
||||||
/// The request header `Access-Control-Request-Method` is required but is missing
|
/// The request header `Access-Control-Request-Method` is required but is missing
|
||||||
MissingRequestMethod,
|
MissingRequestMethod,
|
||||||
/// The request header `Access-Control-Request-Method` has an invalid value
|
/// The request header `Access-Control-Request-Method` has an invalid value
|
||||||
|
@ -316,9 +318,11 @@ pub enum Error {
|
||||||
/// The request header `Access-Control-Request-Headers` is required but is missing.
|
/// The request header `Access-Control-Request-Headers` is required but is missing.
|
||||||
MissingRequestHeaders,
|
MissingRequestHeaders,
|
||||||
/// Origin is not allowed to make this request
|
/// Origin is not allowed to make this request
|
||||||
OriginNotAllowed(url::Origin),
|
OriginNotAllowed(String),
|
||||||
/// Requested method is not allowed
|
/// Requested method is not allowed
|
||||||
MethodNotAllowed(String),
|
MethodNotAllowed(String),
|
||||||
|
/// A regular expression compilation error
|
||||||
|
RegexError(regex::Error),
|
||||||
/// One or more headers requested are not allowed
|
/// One or more headers requested are not allowed
|
||||||
HeadersNotAllowed,
|
HeadersNotAllowed,
|
||||||
/// Credentials are allowed, but the Origin is set to "*". This is not allowed by W3C
|
/// Credentials are allowed, but the Origin is set to "*". This is not allowed by W3C
|
||||||
|
@ -365,7 +369,7 @@ impl fmt::Display for Error {
|
||||||
"The request header `Access-Control-Request-Headers` \
|
"The request header `Access-Control-Request-Headers` \
|
||||||
is required but is missing")
|
is required but is missing")
|
||||||
}
|
}
|
||||||
Error::OriginNotAllowed(origin) => write!(f, "Origin '{}' is not allowed to request", origin.ascii_serialization()),
|
Error::OriginNotAllowed(origin) => write!(f, "Origin '{}' is not allowed to request", origin),
|
||||||
Error::MethodNotAllowed(method) => write!(f, "Method '{}' is not allowed", &method),
|
Error::MethodNotAllowed(method) => write!(f, "Method '{}' is not allowed", &method),
|
||||||
Error::HeadersNotAllowed => write!(f, "Headers are not allowed"),
|
Error::HeadersNotAllowed => write!(f, "Headers are not allowed"),
|
||||||
Error::CredentialsWithWildcardOrigin => { write!(f,
|
Error::CredentialsWithWildcardOrigin => { write!(f,
|
||||||
|
@ -377,7 +381,9 @@ impl fmt::Display for Error {
|
||||||
}
|
}
|
||||||
Error::MissingInjectedHeader => write!(f,
|
Error::MissingInjectedHeader => write!(f,
|
||||||
"The `on_response` handler of Fairing could not find the injected header from the \
|
"The `on_response` handler of Fairing could not find the injected header from the \
|
||||||
Request. Either some other fairing has removed it, or this is a bug.")
|
Request. Either some other fairing has removed it, or this is a bug."),
|
||||||
|
Error::OpaqueAllowedOrigin(ref origin) => write!(f, "The configured Origin '{}' not have a parsable Origin. Use a regex instead.", origin),
|
||||||
|
Error::RegexError(ref e) => write!(f, "{}", e),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -404,6 +410,12 @@ impl From<url::ParseError> for Error {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
impl From<regex::Error> for Error {
|
||||||
|
fn from(error: regex::Error) -> Self {
|
||||||
|
Error::RegexError(error)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/// An enum signifying that some of type T is allowed, or `All` (everything is allowed).
|
/// An enum signifying that some of type T is allowed, or `All` (everything is allowed).
|
||||||
///
|
///
|
||||||
/// `Default` is implemented for this enum and is `All`.
|
/// `Default` is implemented for this enum and is `All`.
|
||||||
|
@ -529,16 +541,47 @@ mod method_serde {
|
||||||
/// use rocket_cors::AllowedOrigins;
|
/// use rocket_cors::AllowedOrigins;
|
||||||
///
|
///
|
||||||
/// let all_origins = AllowedOrigins::all();
|
/// let all_origins = AllowedOrigins::all();
|
||||||
/// let some_origins = AllowedOrigins::some(&["https://www.acme.com"]);
|
/// let some_origins = AllowedOrigins::some_exact(&["https://www.acme.com"]);
|
||||||
|
/// let null_origins = AllowedOrigins::some_null();
|
||||||
/// ```
|
/// ```
|
||||||
pub type AllowedOrigins = AllOrSome<HashSet<String>>;
|
pub type AllowedOrigins = AllOrSome<Origins>;
|
||||||
|
|
||||||
impl AllowedOrigins {
|
impl AllowedOrigins {
|
||||||
/// Allows some origins
|
/// Allows some origins
|
||||||
///
|
///
|
||||||
/// Validation is not performed at this stage, but at a later stage.
|
/// Validation is not performed at this stage, but at a later stage.
|
||||||
pub fn some(urls: &[&str]) -> Self {
|
pub fn some<S1: AsRef<str>, S2: AsRef<str>>(exact: &[S1], regex: &[S2]) -> Self {
|
||||||
AllOrSome::Some(urls.iter().map(|s| s.to_string()).collect())
|
AllOrSome::Some(Origins {
|
||||||
|
exact: Some(exact.iter().map(|s| s.as_ref().to_string()).collect()),
|
||||||
|
regex: Some(regex.iter().map(|s| s.as_ref().to_string()).collect()),
|
||||||
|
..Default::default()
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Allows some _exact_ origins
|
||||||
|
///
|
||||||
|
/// Validation is not performed at this stage, but at a later stage.
|
||||||
|
pub fn some_exact<S: AsRef<str>>(exact: &[S]) -> Self {
|
||||||
|
AllOrSome::Some(Origins {
|
||||||
|
exact: Some(exact.iter().map(|s| s.as_ref().to_string()).collect()),
|
||||||
|
..Default::default()
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Allow some __regex__ origins
|
||||||
|
pub fn some_regex<S: AsRef<str>>(regex: &[S]) -> Self {
|
||||||
|
AllOrSome::Some(Origins {
|
||||||
|
regex: Some(regex.iter().map(|s| s.as_ref().to_string()).collect()),
|
||||||
|
..Default::default()
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Allow some `null` origins
|
||||||
|
pub fn some_null() -> Self {
|
||||||
|
AllOrSome::Some(Origins {
|
||||||
|
allow_null: true,
|
||||||
|
..Default::default()
|
||||||
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Allows all origins
|
/// Allows all origins
|
||||||
|
@ -547,6 +590,105 @@ impl AllowedOrigins {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Origins that are allowed to make CORS requests.
|
||||||
|
///
|
||||||
|
/// An origin is defined according to the defined
|
||||||
|
/// [syntax](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Origin).
|
||||||
|
///
|
||||||
|
/// Origins can be specified as an exact match or using regex.
|
||||||
|
///
|
||||||
|
/// These Origins are specified as logical `ORs`. That is, if any of the origins match, the entire
|
||||||
|
/// request is considered to be valid.
|
||||||
|
#[derive(Clone, PartialEq, Eq, Debug, Default)]
|
||||||
|
#[cfg_attr(feature = "serialization", derive(Serialize, Deserialize))]
|
||||||
|
#[cfg_attr(feature = "serialization", serde(default))]
|
||||||
|
pub struct Origins {
|
||||||
|
/// Whether null origins are accepted
|
||||||
|
#[cfg_attr(feature = "serialization", serde(default))]
|
||||||
|
pub allow_null: bool,
|
||||||
|
/// Origins that must be matched exactly as provided.
|
||||||
|
///
|
||||||
|
/// These __must__ be valid URL strings that will be parsed and validated when
|
||||||
|
/// creating [`Cors`].
|
||||||
|
#[cfg_attr(feature = "serialization", serde(default))]
|
||||||
|
pub exact: Option<HashSet<String>>,
|
||||||
|
/// Origins that will be matched via __any__ regex in this list.
|
||||||
|
///
|
||||||
|
/// These __must__ be valid Regex that will be parsed and validated when creating [`Cors`].
|
||||||
|
///
|
||||||
|
/// The regex will be matched according to the
|
||||||
|
/// [ASCII serialization](https://html.spec.whatwg.org/multipage/#ascii-serialisation-of-an-origin)
|
||||||
|
/// of the incoming Origin.
|
||||||
|
///
|
||||||
|
/// For more information on the syntax of Regex in Rust, see the
|
||||||
|
/// [documentation](https://docs.rs/regex).
|
||||||
|
#[cfg_attr(feature = "serialization", serde(default))]
|
||||||
|
pub regex: Option<HashSet<String>>,
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Parsed set of configured allowed origins
|
||||||
|
#[derive(Clone, Debug)]
|
||||||
|
pub(crate) struct ParsedAllowedOrigins {
|
||||||
|
pub allow_null: bool,
|
||||||
|
pub exact: HashSet<url::Origin>,
|
||||||
|
pub regex: Option<RegexSet>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl ParsedAllowedOrigins {
|
||||||
|
fn parse(origins: &Origins) -> Result<Self, Error> {
|
||||||
|
let exact: Result<HashSet<url::Origin>, Error> = match &origins.exact {
|
||||||
|
Some(exact) => exact.iter().map(|url| to_origin(url.as_str())).collect(),
|
||||||
|
None => Ok(Default::default()),
|
||||||
|
};
|
||||||
|
let exact = exact?;
|
||||||
|
|
||||||
|
// Let's check if any of them is Opaque
|
||||||
|
exact.iter().try_for_each(|url| {
|
||||||
|
if !url.is_tuple() {
|
||||||
|
Err(Error::OpaqueAllowedOrigin(url.ascii_serialization()))
|
||||||
|
} else {
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
})?;
|
||||||
|
|
||||||
|
let regex = match &origins.regex {
|
||||||
|
None => None,
|
||||||
|
Some(ref regex) => Some(RegexSet::new(regex)?),
|
||||||
|
};
|
||||||
|
|
||||||
|
Ok(Self {
|
||||||
|
allow_null: origins.allow_null,
|
||||||
|
exact,
|
||||||
|
regex,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
fn verify(&self, origin: &Origin) -> bool {
|
||||||
|
info_!("Verifying origin: {}", origin);
|
||||||
|
match origin {
|
||||||
|
Origin::Null => {
|
||||||
|
info_!("Origin is null. Allowing? {}", self.allow_null);
|
||||||
|
self.allow_null
|
||||||
|
}
|
||||||
|
Origin::Parsed(ref parsed) => {
|
||||||
|
// Verify by exact, then regex
|
||||||
|
if self.exact.get(parsed).is_some() {
|
||||||
|
info_!("Origin has an exact match");
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
if let Some(regex_set) = &self.regex {
|
||||||
|
let regex_match = regex_set.is_match(&parsed.ascii_serialization());
|
||||||
|
info_!("Origin has a regex match? {}", regex_match);
|
||||||
|
return regex_match;
|
||||||
|
}
|
||||||
|
|
||||||
|
info!("Origin does not match anything");
|
||||||
|
false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/// A list of allowed methods
|
/// A list of allowed methods
|
||||||
///
|
///
|
||||||
/// The [list](https://api.rocket.rs/rocket/http/enum.Method.html)
|
/// The [list](https://api.rocket.rs/rocket/http/enum.Method.html)
|
||||||
|
@ -636,9 +778,10 @@ impl AllowedHeaders {
|
||||||
/// ```json
|
/// ```json
|
||||||
/// {
|
/// {
|
||||||
/// "allowed_origins": {
|
/// "allowed_origins": {
|
||||||
/// "Some": [
|
/// "Some": {
|
||||||
/// "https://www.acme.com"
|
/// "exact": ["https://www.acme.com"],
|
||||||
/// ]
|
/// "regex": ["^https://www.example-[A-z0-9]*.com$"]
|
||||||
|
/// }
|
||||||
/// },
|
/// },
|
||||||
/// "allowed_methods": [
|
/// "allowed_methods": [
|
||||||
/// "POST",
|
/// "POST",
|
||||||
|
@ -831,9 +974,9 @@ impl CorsOptions {
|
||||||
/// documentation at the [crate root](index.html) for usage information.
|
/// documentation at the [crate root](index.html) for usage information.
|
||||||
///
|
///
|
||||||
/// This struct can be created by using [`CorsOptions::to_cors`] or [`Cors::from_options`].
|
/// This struct can be created by using [`CorsOptions::to_cors`] or [`Cors::from_options`].
|
||||||
#[derive(Clone, Debug, Eq, PartialEq)]
|
#[derive(Clone, Debug)]
|
||||||
pub struct Cors {
|
pub struct Cors {
|
||||||
pub(crate) allowed_origins: AllOrSome<HashSet<url::Origin>>,
|
pub(crate) allowed_origins: AllOrSome<ParsedAllowedOrigins>,
|
||||||
pub(crate) allowed_methods: AllowedMethods,
|
pub(crate) allowed_methods: AllowedMethods,
|
||||||
pub(crate) allowed_headers: AllOrSome<HashSet<HeaderFieldName>>,
|
pub(crate) allowed_headers: AllOrSome<HashSet<HeaderFieldName>>,
|
||||||
pub(crate) allow_credentials: bool,
|
pub(crate) allow_credentials: bool,
|
||||||
|
@ -921,7 +1064,7 @@ impl Cors {
|
||||||
/// You can get this struct by using `Cors::validate_request` in an ad-hoc manner.
|
/// You can get this struct by using `Cors::validate_request` in an ad-hoc manner.
|
||||||
#[derive(Eq, PartialEq, Debug)]
|
#[derive(Eq, PartialEq, Debug)]
|
||||||
pub(crate) struct Response {
|
pub(crate) struct Response {
|
||||||
allow_origin: Option<AllOrSome<url::Origin>>,
|
allow_origin: Option<AllOrSome<String>>,
|
||||||
allow_methods: HashSet<Method>,
|
allow_methods: HashSet<Method>,
|
||||||
allow_headers: HeaderFieldNamesSet,
|
allow_headers: HeaderFieldNamesSet,
|
||||||
allow_credentials: bool,
|
allow_credentials: bool,
|
||||||
|
@ -945,8 +1088,8 @@ impl Response {
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Consumes the `Response` and return an altered response with origin and `vary_origin` set
|
/// Consumes the `Response` and return an altered response with origin and `vary_origin` set
|
||||||
fn origin(mut self, origin: &url::Origin, vary_origin: bool) -> Self {
|
fn origin(mut self, origin: &str, vary_origin: bool) -> Self {
|
||||||
self.allow_origin = Some(AllOrSome::Some(origin.clone()));
|
self.allow_origin = Some(AllOrSome::Some(origin.to_string()));
|
||||||
self.vary_origin = vary_origin;
|
self.vary_origin = vary_origin;
|
||||||
self
|
self
|
||||||
}
|
}
|
||||||
|
@ -1022,7 +1165,7 @@ impl Response {
|
||||||
|
|
||||||
let origin = match *origin {
|
let origin = match *origin {
|
||||||
AllOrSome::All => "*".to_string(),
|
AllOrSome::All => "*".to_string(),
|
||||||
AllOrSome::Some(ref origin) => origin.ascii_serialization(),
|
AllOrSome::Some(ref origin) => origin.to_string(),
|
||||||
};
|
};
|
||||||
|
|
||||||
let _ = response.set_raw_header("Access-Control-Allow-Origin", origin);
|
let _ = response.set_raw_header("Access-Control-Allow-Origin", origin);
|
||||||
|
@ -1251,27 +1394,25 @@ enum ValidationResult {
|
||||||
None,
|
None,
|
||||||
/// Successful preflight request
|
/// Successful preflight request
|
||||||
Preflight {
|
Preflight {
|
||||||
origin: url::Origin,
|
origin: String,
|
||||||
headers: Option<AccessControlRequestHeaders>,
|
headers: Option<AccessControlRequestHeaders>,
|
||||||
},
|
},
|
||||||
/// Successful actual request
|
/// Successful actual request
|
||||||
Request { origin: url::Origin },
|
Request { origin: String },
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Convert a str to Origin
|
/// Convert a str to a URL Origin
|
||||||
fn to_origin<S: AsRef<str>>(origin: S) -> Result<url::Origin, Error> {
|
fn to_origin<S: AsRef<str>>(origin: S) -> Result<url::Origin, Error> {
|
||||||
// What to do about Opaque origins?
|
|
||||||
Ok(url::Url::parse(origin.as_ref())?.origin())
|
Ok(url::Url::parse(origin.as_ref())?.origin())
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Parse and process allowed origins
|
/// Parse and process allowed origins
|
||||||
fn parse_origins(origins: &AllowedOrigins) -> Result<AllOrSome<HashSet<url::Origin>>, Error> {
|
fn parse_origins(origins: &AllowedOrigins) -> Result<AllOrSome<ParsedAllowedOrigins>, Error> {
|
||||||
match origins {
|
match origins {
|
||||||
AllOrSome::All => Ok(AllOrSome::All),
|
AllOrSome::All => Ok(AllOrSome::All),
|
||||||
AllOrSome::Some(ref origins) => {
|
AllOrSome::Some(origins) => {
|
||||||
let parsed: Result<HashSet<url::Origin>, Error> =
|
let parsed = ParsedAllowedOrigins::parse(origins)?;
|
||||||
origins.iter().map(to_origin).collect();
|
Ok(AllOrSome::Some(parsed))
|
||||||
Ok(AllOrSome::Some(parsed?))
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1309,14 +1450,14 @@ fn validate(options: &Cors, request: &Request<'_>) -> Result<ValidationResult, E
|
||||||
let headers = request_headers(request)?;
|
let headers = request_headers(request)?;
|
||||||
preflight_validate(options, &origin, &method, &headers)?;
|
preflight_validate(options, &origin, &method, &headers)?;
|
||||||
Ok(ValidationResult::Preflight {
|
Ok(ValidationResult::Preflight {
|
||||||
origin: origin.deref().clone(),
|
origin: origin.to_string(),
|
||||||
headers,
|
headers,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
_ => {
|
_ => {
|
||||||
actual_request_validate(options, &origin)?;
|
actual_request_validate(options, &origin)?;
|
||||||
Ok(ValidationResult::Request {
|
Ok(ValidationResult::Request {
|
||||||
origin: origin.deref().clone(),
|
origin: origin.to_string(),
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1326,16 +1467,19 @@ fn validate(options: &Cors, request: &Request<'_>) -> Result<ValidationResult, E
|
||||||
/// check if the requested origin is allowed.
|
/// check if the requested origin is allowed.
|
||||||
/// Useful for pre-flight and during requests
|
/// Useful for pre-flight and during requests
|
||||||
fn validate_origin(
|
fn validate_origin(
|
||||||
origin: &url::Origin,
|
origin: &Origin,
|
||||||
allowed_origins: &AllOrSome<HashSet<url::Origin>>,
|
allowed_origins: &AllOrSome<ParsedAllowedOrigins>,
|
||||||
) -> Result<(), Error> {
|
) -> Result<(), Error> {
|
||||||
match *allowed_origins {
|
match *allowed_origins {
|
||||||
// Always matching is acceptable since the list of origins can be unbounded.
|
// Always matching is acceptable since the list of origins can be unbounded.
|
||||||
AllOrSome::All => Ok(()),
|
AllOrSome::All => Ok(()),
|
||||||
AllOrSome::Some(ref allowed_origins) => allowed_origins
|
AllOrSome::Some(ref allowed_origins) => {
|
||||||
.get(origin)
|
if allowed_origins.verify(origin) {
|
||||||
.and_then(|_| Some(()))
|
Ok(())
|
||||||
.ok_or_else(|| Error::OriginNotAllowed(origin.clone())),
|
} else {
|
||||||
|
Err(Error::OriginNotAllowed(origin.to_string()))
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1405,7 +1549,7 @@ fn request_headers(request: &Request<'_>) -> Result<Option<AccessControlRequestH
|
||||||
/// and [Fetch specification](https://fetch.spec.whatwg.org/#cors-preflight-fetch)
|
/// and [Fetch specification](https://fetch.spec.whatwg.org/#cors-preflight-fetch)
|
||||||
fn preflight_validate(
|
fn preflight_validate(
|
||||||
options: &Cors,
|
options: &Cors,
|
||||||
origin: &url::Origin,
|
origin: &Origin,
|
||||||
method: &Option<AccessControlRequestMethod>,
|
method: &Option<AccessControlRequestMethod>,
|
||||||
headers: &Option<AccessControlRequestHeaders>,
|
headers: &Option<AccessControlRequestHeaders>,
|
||||||
) -> Result<(), Error> {
|
) -> Result<(), Error> {
|
||||||
|
@ -1453,7 +1597,7 @@ fn preflight_validate(
|
||||||
/// and [Fetch specification](https://fetch.spec.whatwg.org/#cors-preflight-fetch).
|
/// and [Fetch specification](https://fetch.spec.whatwg.org/#cors-preflight-fetch).
|
||||||
fn preflight_response(
|
fn preflight_response(
|
||||||
options: &Cors,
|
options: &Cors,
|
||||||
origin: &url::Origin,
|
origin: &str,
|
||||||
headers: Option<&AccessControlRequestHeaders>,
|
headers: Option<&AccessControlRequestHeaders>,
|
||||||
) -> Response {
|
) -> Response {
|
||||||
let response = Response::new();
|
let response = Response::new();
|
||||||
|
@ -1524,7 +1668,7 @@ fn preflight_response(
|
||||||
/// This implementation references the
|
/// This implementation references the
|
||||||
/// [W3C recommendation](https://www.w3.org/TR/cors/#resource-requests)
|
/// [W3C recommendation](https://www.w3.org/TR/cors/#resource-requests)
|
||||||
/// and [Fetch specification](https://fetch.spec.whatwg.org/#cors-preflight-fetch).
|
/// and [Fetch specification](https://fetch.spec.whatwg.org/#cors-preflight-fetch).
|
||||||
fn actual_request_validate(options: &Cors, origin: &url::Origin) -> Result<(), Error> {
|
fn actual_request_validate(options: &Cors, origin: &Origin) -> Result<(), Error> {
|
||||||
// Note: All header parse failures are dealt with in the `FromRequest` trait implementation
|
// Note: All header parse failures are dealt with in the `FromRequest` trait implementation
|
||||||
|
|
||||||
// 2. If the value of the Origin header is not a case-sensitive match for any of the values
|
// 2. If the value of the Origin header is not a case-sensitive match for any of the values
|
||||||
|
@ -1541,7 +1685,7 @@ fn actual_request_validate(options: &Cors, origin: &url::Origin) -> Result<(), E
|
||||||
/// This implementation references the
|
/// This implementation references the
|
||||||
/// [W3C recommendation](https://www.w3.org/TR/cors/#resource-requests)
|
/// [W3C recommendation](https://www.w3.org/TR/cors/#resource-requests)
|
||||||
/// and [Fetch specification](https://fetch.spec.whatwg.org/#cors-preflight-fetch)
|
/// and [Fetch specification](https://fetch.spec.whatwg.org/#cors-preflight-fetch)
|
||||||
fn actual_request_response(options: &Cors, origin: &url::Origin) -> Response {
|
fn actual_request_response(options: &Cors, origin: &str) -> Response {
|
||||||
let response = Response::new();
|
let response = Response::new();
|
||||||
|
|
||||||
// 3. If the resource supports credentials add a single Access-Control-Allow-Origin header,
|
// 3. If the resource supports credentials add a single Access-Control-Allow-Origin header,
|
||||||
|
@ -1640,8 +1784,12 @@ mod tests {
|
||||||
use super::*;
|
use super::*;
|
||||||
use crate::http::Method;
|
use crate::http::Method;
|
||||||
|
|
||||||
|
fn to_parsed_origin<S: AsRef<str>>(origin: S) -> Result<Origin, Error> {
|
||||||
|
Origin::from_str(origin.as_ref())
|
||||||
|
}
|
||||||
|
|
||||||
fn make_cors_options() -> CorsOptions {
|
fn make_cors_options() -> CorsOptions {
|
||||||
let allowed_origins = AllowedOrigins::some(&["https://www.acme.com"]);
|
let allowed_origins = AllowedOrigins::some_exact(&["https://www.acme.com"]);
|
||||||
|
|
||||||
CorsOptions {
|
CorsOptions {
|
||||||
allowed_origins,
|
allowed_origins,
|
||||||
|
@ -1652,8 +1800,8 @@ mod tests {
|
||||||
allowed_headers: AllowedHeaders::some(&[&"Authorization", "Accept"]),
|
allowed_headers: AllowedHeaders::some(&[&"Authorization", "Accept"]),
|
||||||
allow_credentials: true,
|
allow_credentials: true,
|
||||||
expose_headers: ["Content-Type", "X-Custom"]
|
expose_headers: ["Content-Type", "X-Custom"]
|
||||||
.into_iter()
|
.iter()
|
||||||
.map(|s| s.to_string().into())
|
.map(|s| s.to_string())
|
||||||
.collect(),
|
.collect(),
|
||||||
..Default::default()
|
..Default::default()
|
||||||
}
|
}
|
||||||
|
@ -1727,6 +1875,64 @@ mod tests {
|
||||||
fn cors_default_deserialization_is_correct() {
|
fn cors_default_deserialization_is_correct() {
|
||||||
let deserialized: CorsOptions = serde_json::from_str("{}").expect("To not fail");
|
let deserialized: CorsOptions = serde_json::from_str("{}").expect("To not fail");
|
||||||
assert_eq!(deserialized, CorsOptions::default());
|
assert_eq!(deserialized, CorsOptions::default());
|
||||||
|
|
||||||
|
let expected_json = r#"
|
||||||
|
{
|
||||||
|
"allowed_origins": "All",
|
||||||
|
"allowed_methods": [
|
||||||
|
"POST",
|
||||||
|
"PATCH",
|
||||||
|
"PUT",
|
||||||
|
"DELETE",
|
||||||
|
"HEAD",
|
||||||
|
"OPTIONS",
|
||||||
|
"GET"
|
||||||
|
],
|
||||||
|
"allowed_headers": "All",
|
||||||
|
"allow_credentials": false,
|
||||||
|
"expose_headers": [],
|
||||||
|
"max_age": null,
|
||||||
|
"send_wildcard": false,
|
||||||
|
"fairing_route_base": "/cors",
|
||||||
|
"fairing_route_rank": 0
|
||||||
|
}
|
||||||
|
"#;
|
||||||
|
let actual: CorsOptions = serde_json::from_str(expected_json).expect("to not fail");
|
||||||
|
assert_eq!(actual, CorsOptions::default());
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Checks that the example provided can actually be deserialized
|
||||||
|
#[cfg(feature = "serialization")]
|
||||||
|
#[test]
|
||||||
|
fn cors_options_example_can_be_deserialized() {
|
||||||
|
let json = r#"{
|
||||||
|
"allowed_origins": {
|
||||||
|
"Some": {
|
||||||
|
"exact": ["https://www.acme.com"],
|
||||||
|
"regex": ["^https://www.example-[A-z0-9]*.com$"]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"allowed_methods": [
|
||||||
|
"POST",
|
||||||
|
"DELETE",
|
||||||
|
"GET"
|
||||||
|
],
|
||||||
|
"allowed_headers": {
|
||||||
|
"Some": [
|
||||||
|
"Accept",
|
||||||
|
"Authorization"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"allow_credentials": true,
|
||||||
|
"expose_headers": [
|
||||||
|
"Content-Type",
|
||||||
|
"X-Custom"
|
||||||
|
],
|
||||||
|
"max_age": 42,
|
||||||
|
"send_wildcard": false,
|
||||||
|
"fairing_route_base": "/mycors"
|
||||||
|
}"#;
|
||||||
|
let _: CorsOptions = serde_json::from_str(json).expect("to not fail");
|
||||||
}
|
}
|
||||||
|
|
||||||
// The following tests check validation
|
// The following tests check validation
|
||||||
|
@ -1734,7 +1940,7 @@ mod tests {
|
||||||
#[test]
|
#[test]
|
||||||
fn validate_origin_allows_all_origins() {
|
fn validate_origin_allows_all_origins() {
|
||||||
let url = "https://www.example.com";
|
let url = "https://www.example.com";
|
||||||
let origin = not_err!(to_origin(&url));
|
let origin = not_err!(to_parsed_origin(&url));
|
||||||
let allowed_origins = AllOrSome::All;
|
let allowed_origins = AllOrSome::All;
|
||||||
|
|
||||||
not_err!(validate_origin(&origin, &allowed_origins));
|
not_err!(validate_origin(&origin, &allowed_origins));
|
||||||
|
@ -1743,8 +1949,8 @@ mod tests {
|
||||||
#[test]
|
#[test]
|
||||||
fn validate_origin_allows_origin() {
|
fn validate_origin_allows_origin() {
|
||||||
let url = "https://www.example.com";
|
let url = "https://www.example.com";
|
||||||
let origin = not_err!(to_origin(&url));
|
let origin = not_err!(to_parsed_origin(&url));
|
||||||
let allowed_origins = not_err!(parse_origins(&AllowedOrigins::some(&[
|
let allowed_origins = not_err!(parse_origins(&AllowedOrigins::some_exact(&[
|
||||||
"https://www.example.com"
|
"https://www.example.com"
|
||||||
])));
|
])));
|
||||||
|
|
||||||
|
@ -1762,19 +1968,48 @@ mod tests {
|
||||||
];
|
];
|
||||||
|
|
||||||
for (url, allowed_origin) in cases {
|
for (url, allowed_origin) in cases {
|
||||||
let origin = not_err!(to_origin(&url));
|
let origin = not_err!(to_parsed_origin(&url));
|
||||||
let allowed_origins = not_err!(parse_origins(&AllowedOrigins::some(&[allowed_origin])));
|
let allowed_origins = not_err!(parse_origins(&AllowedOrigins::some_exact(&[
|
||||||
|
allowed_origin
|
||||||
|
])));
|
||||||
|
|
||||||
not_err!(validate_origin(&origin, &allowed_origins));
|
not_err!(validate_origin(&origin, &allowed_origins));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn validate_origin_validates_regex() {
|
||||||
|
let url = "https://www.example-something.com";
|
||||||
|
let origin = not_err!(to_parsed_origin(&url));
|
||||||
|
let allowed_origins = not_err!(parse_origins(&AllowedOrigins::some_regex(&[
|
||||||
|
"^https://www.example-[A-z0-9]+.com$"
|
||||||
|
])));
|
||||||
|
|
||||||
|
not_err!(validate_origin(&origin, &allowed_origins));
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn validate_origin_validates_mixed_settings() {
|
||||||
|
let allowed_origins = not_err!(parse_origins(&AllowedOrigins::some(
|
||||||
|
&["https://www.acme.com"],
|
||||||
|
&["^https://www.example-[A-z0-9]+.com$"]
|
||||||
|
)));
|
||||||
|
|
||||||
|
let url = "https://www.example-something123.com";
|
||||||
|
let origin = not_err!(to_parsed_origin(&url));
|
||||||
|
not_err!(validate_origin(&origin, &allowed_origins));
|
||||||
|
|
||||||
|
let url = "https://www.acme.com";
|
||||||
|
let origin = not_err!(to_parsed_origin(&url));
|
||||||
|
not_err!(validate_origin(&origin, &allowed_origins));
|
||||||
|
}
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
#[should_panic(expected = "OriginNotAllowed")]
|
#[should_panic(expected = "OriginNotAllowed")]
|
||||||
fn validate_origin_rejects_invalid_origin() {
|
fn validate_origin_rejects_invalid_origin() {
|
||||||
let url = "https://www.acme.com";
|
let url = "https://www.acme.com";
|
||||||
let origin = not_err!(to_origin(&url));
|
let origin = not_err!(to_parsed_origin(&url));
|
||||||
let allowed_origins = not_err!(parse_origins(&AllowedOrigins::some(&[
|
let allowed_origins = not_err!(parse_origins(&AllowedOrigins::some_exact(&[
|
||||||
"https://www.example.com"
|
"https://www.example.com"
|
||||||
])));
|
])));
|
||||||
|
|
||||||
|
@ -1784,7 +2019,7 @@ mod tests {
|
||||||
#[test]
|
#[test]
|
||||||
fn response_sets_allow_origin_without_vary_correctly() {
|
fn response_sets_allow_origin_without_vary_correctly() {
|
||||||
let response = Response::new();
|
let response = Response::new();
|
||||||
let response = response.origin(&to_origin("https://www.example.com").unwrap(), false);
|
let response = response.origin("https://www.example.com", false);
|
||||||
|
|
||||||
// Build response and check built response header
|
// Build response and check built response header
|
||||||
let expected_header = vec!["https://www.example.com"];
|
let expected_header = vec!["https://www.example.com"];
|
||||||
|
@ -1801,7 +2036,7 @@ mod tests {
|
||||||
#[test]
|
#[test]
|
||||||
fn response_sets_allow_origin_with_vary_correctly() {
|
fn response_sets_allow_origin_with_vary_correctly() {
|
||||||
let response = Response::new();
|
let response = Response::new();
|
||||||
let response = response.origin(&to_origin("https://www.example.com").unwrap(), true);
|
let response = response.origin("https://www.example.com", true);
|
||||||
|
|
||||||
// Build response and check built response header
|
// Build response and check built response header
|
||||||
let expected_header = vec!["https://www.example.com"];
|
let expected_header = vec!["https://www.example.com"];
|
||||||
|
@ -1828,27 +2063,11 @@ mod tests {
|
||||||
assert_eq!(expected_header, actual_header);
|
assert_eq!(expected_header, actual_header);
|
||||||
}
|
}
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn response_sets_allow_origin_with_ascii_serialization() {
|
|
||||||
let response = Response::new();
|
|
||||||
let response = response.origin(&to_origin("https://аpple.com").unwrap(), false);
|
|
||||||
|
|
||||||
// Build response and check built response header
|
|
||||||
// This is "punycode"
|
|
||||||
let expected_header = vec!["https://xn--pple-43d.com"];
|
|
||||||
let response = response.response(response::Response::new());
|
|
||||||
let actual_header: Vec<_> = response
|
|
||||||
.headers()
|
|
||||||
.get("Access-Control-Allow-Origin")
|
|
||||||
.collect();
|
|
||||||
assert_eq!(expected_header, actual_header);
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn response_sets_exposed_headers_correctly() {
|
fn response_sets_exposed_headers_correctly() {
|
||||||
let headers = vec!["Bar", "Baz", "Foo"];
|
let headers = vec!["Bar", "Baz", "Foo"];
|
||||||
let response = Response::new();
|
let response = Response::new();
|
||||||
let response = response.origin(&to_origin("https://www.example.com").unwrap(), false);
|
let response = response.origin("https://www.example.com", false);
|
||||||
let response = response.exposed_headers(&headers);
|
let response = response.exposed_headers(&headers);
|
||||||
|
|
||||||
// Build response and check built response header
|
// Build response and check built response header
|
||||||
|
@ -1870,7 +2089,7 @@ mod tests {
|
||||||
#[test]
|
#[test]
|
||||||
fn response_sets_max_age_correctly() {
|
fn response_sets_max_age_correctly() {
|
||||||
let response = Response::new();
|
let response = Response::new();
|
||||||
let response = response.origin(&to_origin("https://www.example.com").unwrap(), false);
|
let response = response.origin("https://www.example.com", false);
|
||||||
|
|
||||||
let response = response.max_age(Some(42));
|
let response = response.max_age(Some(42));
|
||||||
|
|
||||||
|
@ -1884,7 +2103,7 @@ mod tests {
|
||||||
#[test]
|
#[test]
|
||||||
fn response_does_not_set_max_age_when_none() {
|
fn response_does_not_set_max_age_when_none() {
|
||||||
let response = Response::new();
|
let response = Response::new();
|
||||||
let response = response.origin(&to_origin("https://www.example.com").unwrap(), false);
|
let response = response.origin("https://www.example.com", false);
|
||||||
|
|
||||||
let response = response.max_age(None);
|
let response = response.max_age(None);
|
||||||
|
|
||||||
|
@ -1997,7 +2216,7 @@ mod tests {
|
||||||
.finalize();
|
.finalize();
|
||||||
|
|
||||||
let response = Response::new();
|
let response = Response::new();
|
||||||
let response = response.origin(&to_origin("https://www.example.com").unwrap(), false);
|
let response = response.origin("https://www.example.com", false);
|
||||||
let response = response.response(original);
|
let response = response.response(original);
|
||||||
// Check CORS header
|
// Check CORS header
|
||||||
let expected_header = vec!["https://www.example.com"];
|
let expected_header = vec!["https://www.example.com"];
|
||||||
|
@ -2073,7 +2292,7 @@ mod tests {
|
||||||
|
|
||||||
let result = validate(&cors, request.inner()).expect("to not fail");
|
let result = validate(&cors, request.inner()).expect("to not fail");
|
||||||
let expected_result = ValidationResult::Preflight {
|
let expected_result = ValidationResult::Preflight {
|
||||||
origin: to_origin("https://www.acme.com").unwrap(),
|
origin: "https://www.acme.com".to_string(),
|
||||||
// Checks that only a subset of allowed headers are returned
|
// Checks that only a subset of allowed headers are returned
|
||||||
// -- i.e. whatever is requested for
|
// -- i.e. whatever is requested for
|
||||||
headers: Some(FromStr::from_str("Authorization").unwrap()),
|
headers: Some(FromStr::from_str("Authorization").unwrap()),
|
||||||
|
@ -2108,7 +2327,7 @@ mod tests {
|
||||||
|
|
||||||
let result = validate(&cors, request.inner()).expect("to not fail");
|
let result = validate(&cors, request.inner()).expect("to not fail");
|
||||||
let expected_result = ValidationResult::Preflight {
|
let expected_result = ValidationResult::Preflight {
|
||||||
origin: to_origin("https://www.example.com").unwrap(),
|
origin: "https://www.example.com".to_string(),
|
||||||
headers: Some(FromStr::from_str("Authorization").unwrap()),
|
headers: Some(FromStr::from_str("Authorization").unwrap()),
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -2226,7 +2445,7 @@ mod tests {
|
||||||
|
|
||||||
let result = validate(&cors, request.inner()).expect("to not fail");
|
let result = validate(&cors, request.inner()).expect("to not fail");
|
||||||
let expected_result = ValidationResult::Request {
|
let expected_result = ValidationResult::Request {
|
||||||
origin: to_origin("https://www.acme.com").unwrap(),
|
origin: "https://www.acme.com".to_string(),
|
||||||
};
|
};
|
||||||
|
|
||||||
assert_eq!(expected_result, result);
|
assert_eq!(expected_result, result);
|
||||||
|
@ -2245,7 +2464,7 @@ mod tests {
|
||||||
|
|
||||||
let result = validate(&cors, request.inner()).expect("to not fail");
|
let result = validate(&cors, request.inner()).expect("to not fail");
|
||||||
let expected_result = ValidationResult::Request {
|
let expected_result = ValidationResult::Request {
|
||||||
origin: to_origin("https://www.example.com").unwrap(),
|
origin: "https://www.example.com".to_string(),
|
||||||
};
|
};
|
||||||
|
|
||||||
assert_eq!(expected_result, result);
|
assert_eq!(expected_result, result);
|
||||||
|
@ -2301,7 +2520,7 @@ mod tests {
|
||||||
let response = validate_and_build(&cors, request.inner()).expect("to not fail");
|
let response = validate_and_build(&cors, request.inner()).expect("to not fail");
|
||||||
|
|
||||||
let expected_response = Response::new()
|
let expected_response = Response::new()
|
||||||
.origin(&to_origin("https://www.acme.com").unwrap(), false)
|
.origin("https://www.acme.com", false)
|
||||||
.headers(&["Authorization"])
|
.headers(&["Authorization"])
|
||||||
.methods(&options.allowed_methods)
|
.methods(&options.allowed_methods)
|
||||||
.credentials(options.allow_credentials)
|
.credentials(options.allow_credentials)
|
||||||
|
@ -2341,7 +2560,7 @@ mod tests {
|
||||||
let response = validate_and_build(&cors, request.inner()).expect("to not fail");
|
let response = validate_and_build(&cors, request.inner()).expect("to not fail");
|
||||||
|
|
||||||
let expected_response = Response::new()
|
let expected_response = Response::new()
|
||||||
.origin(&to_origin("https://www.acme.com").unwrap(), true)
|
.origin("https://www.acme.com", true)
|
||||||
.headers(&["Authorization"])
|
.headers(&["Authorization"])
|
||||||
.methods(&options.allowed_methods)
|
.methods(&options.allowed_methods)
|
||||||
.credentials(options.allow_credentials)
|
.credentials(options.allow_credentials)
|
||||||
|
@ -2402,7 +2621,7 @@ mod tests {
|
||||||
|
|
||||||
let response = validate_and_build(&cors, request.inner()).expect("to not fail");
|
let response = validate_and_build(&cors, request.inner()).expect("to not fail");
|
||||||
let expected_response = Response::new()
|
let expected_response = Response::new()
|
||||||
.origin(&to_origin("https://www.acme.com").unwrap(), false)
|
.origin("https://www.acme.com", false)
|
||||||
.credentials(options.allow_credentials)
|
.credentials(options.allow_credentials)
|
||||||
.exposed_headers(&["Content-Type", "X-Custom"]);
|
.exposed_headers(&["Content-Type", "X-Custom"]);
|
||||||
|
|
||||||
|
@ -2425,7 +2644,7 @@ mod tests {
|
||||||
|
|
||||||
let response = validate_and_build(&cors, request.inner()).expect("to not fail");
|
let response = validate_and_build(&cors, request.inner()).expect("to not fail");
|
||||||
let expected_response = Response::new()
|
let expected_response = Response::new()
|
||||||
.origin(&to_origin("https://www.acme.com").unwrap(), true)
|
.origin("https://www.acme.com", true)
|
||||||
.credentials(options.allow_credentials)
|
.credentials(options.allow_credentials)
|
||||||
.exposed_headers(&["Content-Type", "X-Custom"]);
|
.exposed_headers(&["Content-Type", "X-Custom"]);
|
||||||
|
|
||||||
|
|
|
@ -1,14 +1,14 @@
|
||||||
//! This crate tests using `rocket_cors` using Fairings
|
//! This crate tests using `rocket_cors` using Fairings
|
||||||
#![feature(proc_macro_hygiene, decl_macro)]
|
#![feature(proc_macro_hygiene, decl_macro)]
|
||||||
use hyper;
|
use hyper;
|
||||||
#[macro_use]
|
|
||||||
extern crate rocket;
|
|
||||||
|
|
||||||
use std::str::FromStr;
|
use std::str::FromStr;
|
||||||
|
|
||||||
use rocket::http::Method;
|
use rocket::http::Method;
|
||||||
use rocket::http::{Header, Status};
|
use rocket::http::{Header, Status};
|
||||||
use rocket::local::Client;
|
use rocket::local::Client;
|
||||||
|
use rocket::response::Body;
|
||||||
|
use rocket::{get, routes};
|
||||||
use rocket_cors::*;
|
use rocket_cors::*;
|
||||||
|
|
||||||
#[get("/")]
|
#[get("/")]
|
||||||
|
@ -22,10 +22,10 @@ fn panicking_route() {
|
||||||
}
|
}
|
||||||
|
|
||||||
fn make_cors() -> Cors {
|
fn make_cors() -> Cors {
|
||||||
let allowed_origins = AllowedOrigins::some(&["https://www.acme.com"]);
|
let allowed_origins = AllowedOrigins::some_exact(&["https://www.acme.com"]);
|
||||||
|
|
||||||
CorsOptions {
|
CorsOptions {
|
||||||
allowed_origins: allowed_origins,
|
allowed_origins,
|
||||||
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
||||||
allow_credentials: true,
|
allow_credentials: true,
|
||||||
|
@ -73,7 +73,7 @@ fn smoke_test() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
||||||
|
|
||||||
let origin_header = response
|
let origin_header = response
|
||||||
|
@ -124,7 +124,7 @@ fn cors_get_check() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
||||||
|
|
||||||
let origin_header = response
|
let origin_header = response
|
||||||
|
@ -144,7 +144,7 @@ fn cors_get_no_origin() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -1,8 +1,6 @@
|
||||||
//! This crate tests using `rocket_cors` using the per-route handling with request guard
|
//! This crate tests using `rocket_cors` using the per-route handling with request guard
|
||||||
#![feature(proc_macro_hygiene, decl_macro)]
|
#![feature(proc_macro_hygiene, decl_macro)]
|
||||||
use hyper;
|
use hyper;
|
||||||
#[macro_use]
|
|
||||||
extern crate rocket;
|
|
||||||
use rocket_cors as cors;
|
use rocket_cors as cors;
|
||||||
|
|
||||||
use std::str::FromStr;
|
use std::str::FromStr;
|
||||||
|
@ -10,6 +8,8 @@ use std::str::FromStr;
|
||||||
use rocket::http::Method;
|
use rocket::http::Method;
|
||||||
use rocket::http::{Header, Status};
|
use rocket::http::{Header, Status};
|
||||||
use rocket::local::Client;
|
use rocket::local::Client;
|
||||||
|
use rocket::response::Body;
|
||||||
|
use rocket::{get, options, routes};
|
||||||
use rocket::{Response, State};
|
use rocket::{Response, State};
|
||||||
|
|
||||||
#[get("/")]
|
#[get("/")]
|
||||||
|
@ -60,10 +60,10 @@ fn state<'r>(cors: cors::Guard<'r>, _state: State<'r, SomeState>) -> cors::Respo
|
||||||
}
|
}
|
||||||
|
|
||||||
fn make_cors() -> cors::Cors {
|
fn make_cors() -> cors::Cors {
|
||||||
let allowed_origins = cors::AllowedOrigins::some(&["https://www.acme.com"]);
|
let allowed_origins = cors::AllowedOrigins::some_exact(&["https://www.acme.com"]);
|
||||||
|
|
||||||
cors::CorsOptions {
|
cors::CorsOptions {
|
||||||
allowed_origins: allowed_origins,
|
allowed_origins,
|
||||||
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
allowed_headers: cors::AllowedHeaders::some(&["Authorization", "Accept"]),
|
allowed_headers: cors::AllowedHeaders::some(&["Authorization", "Accept"]),
|
||||||
allow_credentials: true,
|
allow_credentials: true,
|
||||||
|
@ -119,7 +119,7 @@ fn smoke_test() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
||||||
|
|
||||||
let origin_header = response
|
let origin_header = response
|
||||||
|
@ -205,7 +205,7 @@ fn cors_get_check() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
||||||
|
|
||||||
let origin_header = response
|
let origin_header = response
|
||||||
|
@ -226,7 +226,7 @@ fn cors_get_no_origin() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
||||||
assert!(response
|
assert!(response
|
||||||
.headers()
|
.headers()
|
||||||
|
@ -408,7 +408,7 @@ fn overridden_options_routes_are_used() {
|
||||||
.header(request_headers);
|
.header(request_headers);
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
assert_eq!(body_str, Some("Manual CORS Preflight".to_string()));
|
assert_eq!(body_str, Some("Manual CORS Preflight".to_string()));
|
||||||
|
|
||||||
|
|
|
@ -1,14 +1,14 @@
|
||||||
//! This crate tests that all the request headers are parsed correctly in the round trip
|
//! This crate tests that all the request headers are parsed correctly in the round trip
|
||||||
#![feature(proc_macro_hygiene, decl_macro)]
|
#![feature(proc_macro_hygiene, decl_macro)]
|
||||||
use hyper;
|
use hyper;
|
||||||
#[macro_use]
|
|
||||||
extern crate rocket;
|
|
||||||
|
|
||||||
use std::ops::Deref;
|
use std::ops::Deref;
|
||||||
use std::str::FromStr;
|
use std::str::FromStr;
|
||||||
|
|
||||||
use rocket::http::Header;
|
use rocket::http::Header;
|
||||||
use rocket::local::Client;
|
use rocket::local::Client;
|
||||||
|
use rocket::response::Body;
|
||||||
|
use rocket::{get, routes};
|
||||||
use rocket_cors::headers::*;
|
use rocket_cors::headers::*;
|
||||||
|
|
||||||
#[get("/request_headers")]
|
#[get("/request_headers")]
|
||||||
|
@ -53,7 +53,7 @@ fn request_headers_round_trip_smoke_test() {
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response
|
let body_str = response
|
||||||
.body()
|
.body()
|
||||||
.and_then(|body| body.into_string())
|
.and_then(Body::into_string)
|
||||||
.expect("Non-empty body");
|
.expect("Non-empty body");
|
||||||
let expected_body = r#"https://foo.bar.xyz
|
let expected_body = r#"https://foo.bar.xyz
|
||||||
GET
|
GET
|
||||||
|
|
|
@ -1,16 +1,16 @@
|
||||||
//! This crate tests using `rocket_cors` using manual mode
|
//! This crate tests using `rocket_cors` using manual mode
|
||||||
#![feature(proc_macro_hygiene, decl_macro)]
|
#![feature(proc_macro_hygiene, decl_macro)]
|
||||||
use hyper;
|
use hyper;
|
||||||
#[macro_use]
|
|
||||||
extern crate rocket;
|
|
||||||
|
|
||||||
use std::str::FromStr;
|
use std::str::FromStr;
|
||||||
|
|
||||||
use rocket::http::Method;
|
use rocket::http::Method;
|
||||||
use rocket::http::{Header, Status};
|
use rocket::http::{Header, Status};
|
||||||
use rocket::local::Client;
|
use rocket::local::Client;
|
||||||
|
use rocket::response::Body;
|
||||||
use rocket::response::Responder;
|
use rocket::response::Responder;
|
||||||
use rocket::State;
|
use rocket::State;
|
||||||
|
use rocket::{get, options, routes};
|
||||||
use rocket_cors::*;
|
use rocket_cors::*;
|
||||||
|
|
||||||
/// Using a borrowed `Cors`
|
/// Using a borrowed `Cors`
|
||||||
|
@ -23,7 +23,7 @@ fn cors(options: State<'_, Cors>) -> impl Responder<'_> {
|
||||||
|
|
||||||
#[get("/panic")]
|
#[get("/panic")]
|
||||||
fn panicking_route(options: State<'_, Cors>) -> impl Responder<'_> {
|
fn panicking_route(options: State<'_, Cors>) -> impl Responder<'_> {
|
||||||
options.inner().respond_borrowed(|_| -> () {
|
options.inner().respond_borrowed(|_| {
|
||||||
panic!("This route will panic");
|
panic!("This route will panic");
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
@ -66,10 +66,10 @@ fn borrow<'r>(options: State<'r, Cors>, test_state: State<'r, TestState>) -> imp
|
||||||
}
|
}
|
||||||
|
|
||||||
fn make_cors_options() -> CorsOptions {
|
fn make_cors_options() -> CorsOptions {
|
||||||
let allowed_origins = AllowedOrigins::some(&["https://www.acme.com"]);
|
let allowed_origins = AllowedOrigins::some_exact(&["https://www.acme.com"]);
|
||||||
|
|
||||||
CorsOptions {
|
CorsOptions {
|
||||||
allowed_origins: allowed_origins,
|
allowed_origins,
|
||||||
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
||||||
allow_credentials: true,
|
allow_credentials: true,
|
||||||
|
@ -78,10 +78,10 @@ fn make_cors_options() -> CorsOptions {
|
||||||
}
|
}
|
||||||
|
|
||||||
fn make_different_cors_options() -> CorsOptions {
|
fn make_different_cors_options() -> CorsOptions {
|
||||||
let allowed_origins = AllowedOrigins::some(&["https://www.example.com"]);
|
let allowed_origins = AllowedOrigins::some_exact(&["https://www.example.com"]);
|
||||||
|
|
||||||
CorsOptions {
|
CorsOptions {
|
||||||
allowed_origins: allowed_origins,
|
allowed_origins,
|
||||||
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
||||||
allow_credentials: true,
|
allow_credentials: true,
|
||||||
|
@ -129,7 +129,7 @@ fn smoke_test() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
||||||
|
|
||||||
let origin_header = response
|
let origin_header = response
|
||||||
|
@ -180,7 +180,7 @@ fn cors_get_borrowed_check() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
||||||
|
|
||||||
let origin_header = response
|
let origin_header = response
|
||||||
|
@ -200,7 +200,7 @@ fn cors_get_no_origin() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -378,7 +378,7 @@ fn cors_options_owned_check() {
|
||||||
.header(request_headers);
|
.header(request_headers);
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
assert_eq!(body_str, Some("Manual CORS Preflight".to_string()));
|
assert_eq!(body_str, Some("Manual CORS Preflight".to_string()));
|
||||||
|
|
||||||
|
@ -404,7 +404,7 @@ fn cors_get_owned_check() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS Owned".to_string()));
|
assert_eq!(body_str, Some("Hello CORS Owned".to_string()));
|
||||||
|
|
||||||
let origin_header = response
|
let origin_header = response
|
||||||
|
|
16
tests/mix.rs
16
tests/mix.rs
|
@ -4,15 +4,15 @@
|
||||||
//! `ping` route that you want to allow all Origins to access.
|
//! `ping` route that you want to allow all Origins to access.
|
||||||
#![feature(proc_macro_hygiene, decl_macro)]
|
#![feature(proc_macro_hygiene, decl_macro)]
|
||||||
use hyper;
|
use hyper;
|
||||||
#[macro_use]
|
|
||||||
extern crate rocket;
|
|
||||||
use rocket_cors;
|
use rocket_cors;
|
||||||
|
|
||||||
use std::str::FromStr;
|
use std::str::FromStr;
|
||||||
|
|
||||||
use rocket::http::{Header, Method, Status};
|
use rocket::http::{Header, Method, Status};
|
||||||
use rocket::local::Client;
|
use rocket::local::Client;
|
||||||
|
use rocket::response::Body;
|
||||||
use rocket::response::Responder;
|
use rocket::response::Responder;
|
||||||
|
use rocket::{get, options, routes};
|
||||||
|
|
||||||
use rocket_cors::{AllowedHeaders, AllowedOrigins, CorsOptions, Guard};
|
use rocket_cors::{AllowedHeaders, AllowedOrigins, CorsOptions, Guard};
|
||||||
|
|
||||||
|
@ -40,11 +40,11 @@ fn ping_options<'r>() -> impl Responder<'r> {
|
||||||
|
|
||||||
/// Returns the "application wide" Cors struct
|
/// Returns the "application wide" Cors struct
|
||||||
fn cors_options() -> CorsOptions {
|
fn cors_options() -> CorsOptions {
|
||||||
let allowed_origins = AllowedOrigins::some(&["https://www.acme.com"]);
|
let allowed_origins = AllowedOrigins::some_exact(&["https://www.acme.com"]);
|
||||||
|
|
||||||
// You can also deserialize this
|
// You can also deserialize this
|
||||||
rocket_cors::CorsOptions {
|
rocket_cors::CorsOptions {
|
||||||
allowed_origins: allowed_origins,
|
allowed_origins,
|
||||||
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
||||||
allow_credentials: true,
|
allow_credentials: true,
|
||||||
|
@ -100,7 +100,7 @@ fn smoke_test() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS!".to_string()));
|
assert_eq!(body_str, Some("Hello CORS!".to_string()));
|
||||||
|
|
||||||
let origin_header = response
|
let origin_header = response
|
||||||
|
@ -151,7 +151,7 @@ fn cors_get_check() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS!".to_string()));
|
assert_eq!(body_str, Some("Hello CORS!".to_string()));
|
||||||
|
|
||||||
let origin_header = response
|
let origin_header = response
|
||||||
|
@ -171,7 +171,7 @@ fn cors_get_no_origin() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Hello CORS!".to_string()));
|
assert_eq!(body_str, Some("Hello CORS!".to_string()));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -333,7 +333,7 @@ fn cors_get_ping_check() {
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(Body::into_string);
|
||||||
assert_eq!(body_str, Some("Pong!".to_string()));
|
assert_eq!(body_str, Some("Pong!".to_string()));
|
||||||
|
|
||||||
let origin_header = response
|
let origin_header = response
|
||||||
|
|
Loading…
Reference in New Issue