parent
715913a6b3
commit
9782a47456
12
Cargo.toml
12
Cargo.toml
|
@ -42,9 +42,21 @@ rocket_codegen = "0.3"
|
||||||
serde_json = "1.0"
|
serde_json = "1.0"
|
||||||
serde_test = "1.0"
|
serde_test = "1.0"
|
||||||
|
|
||||||
|
[[example]]
|
||||||
|
name = "fairing"
|
||||||
|
|
||||||
|
[[example]]
|
||||||
|
name = "guard"
|
||||||
|
|
||||||
[[example]]
|
[[example]]
|
||||||
name = "json"
|
name = "json"
|
||||||
required-features = ["serialization"]
|
required-features = ["serialization"]
|
||||||
|
|
||||||
|
[[example]]
|
||||||
|
name = "manual"
|
||||||
|
|
||||||
|
[[example]]
|
||||||
|
name = "mix"
|
||||||
|
|
||||||
[package.metadata.docs.rs]
|
[package.metadata.docs.rs]
|
||||||
all-features = true
|
all-features = true
|
||||||
|
|
|
@ -0,0 +1,74 @@
|
||||||
|
//! This is an example of how you can mix and match the "Truly manual" mode with "Guard".
|
||||||
|
//!
|
||||||
|
//! In this example, you typically have an application wide `Cors` struct except for one specific
|
||||||
|
//! `ping` route that you want to allow all Origins to access.
|
||||||
|
|
||||||
|
#![feature(plugin, conservative_impl_trait)]
|
||||||
|
#![plugin(rocket_codegen)]
|
||||||
|
extern crate rocket;
|
||||||
|
extern crate rocket_cors;
|
||||||
|
|
||||||
|
use rocket::http::Method;
|
||||||
|
use rocket::response::Responder;
|
||||||
|
use rocket_cors::{Cors, Guard, AllowedOrigins, AllowedHeaders};
|
||||||
|
|
||||||
|
/// The "usual" app route
|
||||||
|
#[get("/")]
|
||||||
|
fn app(cors: Guard) -> rocket_cors::Responder<&str> {
|
||||||
|
cors.responder("Hello CORS!")
|
||||||
|
}
|
||||||
|
|
||||||
|
/// The special "ping" route
|
||||||
|
#[get("/ping")]
|
||||||
|
fn ping<'r>() -> impl Responder<'r> {
|
||||||
|
let options = cors_options_all();
|
||||||
|
options.respond_owned(|guard| guard.responder("Pong!"))
|
||||||
|
}
|
||||||
|
|
||||||
|
/// You need to define an OPTIONS route for preflight checks if you want to use `Cors` struct
|
||||||
|
/// that is not in Rocket's managed state.
|
||||||
|
/// These routes can just return the unit type `()`
|
||||||
|
#[options("/ping")]
|
||||||
|
fn ping_options<'r>() -> impl Responder<'r> {
|
||||||
|
let options = cors_options_all();
|
||||||
|
options.respond_owned(|guard| guard.responder(()))
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Returns the "application wide" Cors struct
|
||||||
|
fn cors_options() -> Cors {
|
||||||
|
let (allowed_origins, failed_origins) = AllowedOrigins::some(&["https://www.acme.com"]);
|
||||||
|
assert!(failed_origins.is_empty());
|
||||||
|
|
||||||
|
// You can also deserialize this
|
||||||
|
rocket_cors::Cors {
|
||||||
|
allowed_origins: allowed_origins,
|
||||||
|
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
|
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
||||||
|
allow_credentials: true,
|
||||||
|
..Default::default()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// A special struct that allows all origins
|
||||||
|
///
|
||||||
|
/// Note: In your real application, you might want to use something like `lazy_static` to generate
|
||||||
|
/// a `&'static` reference to this instead of creating a new struct on every request.
|
||||||
|
fn cors_options_all() -> Cors {
|
||||||
|
// You can also deserialize this
|
||||||
|
Default::default()
|
||||||
|
}
|
||||||
|
|
||||||
|
fn main() {
|
||||||
|
rocket::ignite()
|
||||||
|
.mount(
|
||||||
|
"/",
|
||||||
|
routes![
|
||||||
|
app,
|
||||||
|
ping,
|
||||||
|
ping_options,
|
||||||
|
],
|
||||||
|
)
|
||||||
|
.mount("/", rocket_cors::catch_all_options_routes()) // mount the catch all routes
|
||||||
|
.manage(cors_options())
|
||||||
|
.launch();
|
||||||
|
}
|
84
src/lib.rs
84
src/lib.rs
|
@ -388,6 +388,90 @@
|
||||||
//! .launch();
|
//! .launch();
|
||||||
//! }
|
//! }
|
||||||
//! ```
|
//! ```
|
||||||
|
//!
|
||||||
|
//! ## Mixing Guard and Manual
|
||||||
|
//!
|
||||||
|
//! You can mix `Guard` and `Truly Manual` modes together for your application. For example, your
|
||||||
|
//! application might restrict the Origins that can access it, except for one `ping` route that
|
||||||
|
//! allows all access.
|
||||||
|
//!
|
||||||
|
//! You can run the example code below with `cargo run --example mix`.
|
||||||
|
//!
|
||||||
|
//! ```rust,no_run
|
||||||
|
//! #![feature(plugin, conservative_impl_trait)]
|
||||||
|
//! #![plugin(rocket_codegen)]
|
||||||
|
//! extern crate rocket;
|
||||||
|
//! extern crate rocket_cors;
|
||||||
|
//!
|
||||||
|
//! use rocket::http::Method;
|
||||||
|
//! use rocket::response::Responder;
|
||||||
|
//! use rocket_cors::{Cors, Guard, AllowedOrigins, AllowedHeaders};
|
||||||
|
//!
|
||||||
|
//! /// The "usual" app route
|
||||||
|
//! #[get("/")]
|
||||||
|
//! fn app(cors: Guard) -> rocket_cors::Responder<&str> {
|
||||||
|
//! cors.responder("Hello CORS!")
|
||||||
|
//! }
|
||||||
|
//!
|
||||||
|
//! /// The special "ping" route
|
||||||
|
//! #[get("/ping")]
|
||||||
|
//! fn ping<'r>() -> impl Responder<'r> {
|
||||||
|
//! let options = cors_options_all();
|
||||||
|
//! options.respond_owned(|guard| guard.responder("Pong!"))
|
||||||
|
//! }
|
||||||
|
//!
|
||||||
|
//! /// You need to define an OPTIONS route for preflight checks if you want to use `Cors` struct
|
||||||
|
//! /// that is not in Rocket's managed state.
|
||||||
|
//! /// These routes can just return the unit type `()`
|
||||||
|
//! #[options("/ping")]
|
||||||
|
//! fn ping_options<'r>() -> impl Responder<'r> {
|
||||||
|
//! let options = cors_options_all();
|
||||||
|
//! options.respond_owned(|guard| guard.responder(()))
|
||||||
|
//! }
|
||||||
|
//!
|
||||||
|
//! /// Returns the "application wide" Cors struct
|
||||||
|
//! fn cors_options() -> Cors {
|
||||||
|
//! let (allowed_origins, failed_origins) = AllowedOrigins::some(&["https://www.acme.com"]);
|
||||||
|
//! assert!(failed_origins.is_empty());
|
||||||
|
//!
|
||||||
|
//! // You can also deserialize this
|
||||||
|
//! rocket_cors::Cors {
|
||||||
|
//! allowed_origins: allowed_origins,
|
||||||
|
//! allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
|
//! allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
||||||
|
//! allow_credentials: true,
|
||||||
|
//! ..Default::default()
|
||||||
|
//! }
|
||||||
|
//! }
|
||||||
|
//!
|
||||||
|
//! /// A special struct that allows all origins
|
||||||
|
//! ///
|
||||||
|
//! /// Note: In your real application, you might want to use something like `lazy_static` to generate
|
||||||
|
//! /// a `&'static` reference to this instead of creating a new struct on every request.
|
||||||
|
//! fn cors_options_all() -> Cors {
|
||||||
|
//! // You can also deserialize this
|
||||||
|
//! rocket_cors::Cors {
|
||||||
|
//! allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
|
//! ..Default::default()
|
||||||
|
//! }
|
||||||
|
//! }
|
||||||
|
//!
|
||||||
|
//! fn main() {
|
||||||
|
//! rocket::ignite()
|
||||||
|
//! .mount(
|
||||||
|
//! "/",
|
||||||
|
//! routes![
|
||||||
|
//! app,
|
||||||
|
//! ping,
|
||||||
|
//! ping_options,
|
||||||
|
//! ],
|
||||||
|
//! )
|
||||||
|
//! .mount("/", rocket_cors::catch_all_options_routes()) // mount the catch all routes
|
||||||
|
//! .manage(cors_options())
|
||||||
|
//! .launch();
|
||||||
|
//! }
|
||||||
|
//!
|
||||||
|
//! ```
|
||||||
|
|
||||||
#![allow(
|
#![allow(
|
||||||
legacy_directory_ownership,
|
legacy_directory_ownership,
|
||||||
|
|
|
@ -126,7 +126,6 @@ fn cors_get_check() {
|
||||||
let req = client.get("/").header(origin_header).header(authorization);
|
let req = client.get("/").header(origin_header).header(authorization);
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
println!("{:?}", response);
|
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(|body| body.into_string());
|
||||||
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
||||||
|
|
|
@ -204,7 +204,6 @@ fn cors_get_check() {
|
||||||
let req = client.get("/").header(origin_header).header(authorization);
|
let req = client.get("/").header(origin_header).header(authorization);
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
println!("{:?}", response);
|
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(|body| body.into_string());
|
||||||
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
||||||
|
|
|
@ -187,7 +187,6 @@ fn cors_get_borrowed_check() {
|
||||||
let req = client.get("/").header(origin_header).header(authorization);
|
let req = client.get("/").header(origin_header).header(authorization);
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
println!("{:?}", response);
|
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(|body| body.into_string());
|
||||||
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
assert_eq!(body_str, Some("Hello CORS".to_string()));
|
||||||
|
@ -422,7 +421,6 @@ fn cors_get_owned_check() {
|
||||||
);
|
);
|
||||||
|
|
||||||
let mut response = req.dispatch();
|
let mut response = req.dispatch();
|
||||||
println!("{:?}", response);
|
|
||||||
assert!(response.status().class().is_success());
|
assert!(response.status().class().is_success());
|
||||||
let body_str = response.body().and_then(|body| body.into_string());
|
let body_str = response.body().and_then(|body| body.into_string());
|
||||||
assert_eq!(body_str, Some("Hello CORS Owned".to_string()));
|
assert_eq!(body_str, Some("Hello CORS Owned".to_string()));
|
||||||
|
|
|
@ -0,0 +1,364 @@
|
||||||
|
//! This is an example of how you can mix and match the "Truly manual" mode with "Guard".
|
||||||
|
//!
|
||||||
|
//! In this example, you typically have an application wide `Cors` struct except for one specific
|
||||||
|
//! `ping` route that you want to allow all Origins to access.
|
||||||
|
|
||||||
|
#![feature(plugin, conservative_impl_trait)]
|
||||||
|
#![plugin(rocket_codegen)]
|
||||||
|
extern crate hyper;
|
||||||
|
extern crate rocket;
|
||||||
|
extern crate rocket_cors;
|
||||||
|
|
||||||
|
use std::str::FromStr;
|
||||||
|
|
||||||
|
use rocket::http::{Method, Header, Status};
|
||||||
|
use rocket::local::Client;
|
||||||
|
use rocket::response::Responder;
|
||||||
|
|
||||||
|
use rocket_cors::{Cors, Guard, AllowedOrigins, AllowedHeaders};
|
||||||
|
|
||||||
|
/// The "usual" app route
|
||||||
|
#[get("/")]
|
||||||
|
fn app(cors: Guard) -> rocket_cors::Responder<&str> {
|
||||||
|
cors.responder("Hello CORS!")
|
||||||
|
}
|
||||||
|
|
||||||
|
/// The special "ping" route
|
||||||
|
#[get("/ping")]
|
||||||
|
fn ping<'r>() -> impl Responder<'r> {
|
||||||
|
let options = cors_options_all();
|
||||||
|
options.respond_owned(|guard| guard.responder("Pong!"))
|
||||||
|
}
|
||||||
|
|
||||||
|
/// You need to define an OPTIONS route for preflight checks if you want to use `Cors` struct
|
||||||
|
/// that is not in Rocket's managed state.
|
||||||
|
/// These routes can just return the unit type `()`
|
||||||
|
#[options("/ping")]
|
||||||
|
fn ping_options<'r>() -> impl Responder<'r> {
|
||||||
|
let options = cors_options_all();
|
||||||
|
options.respond_owned(|guard| guard.responder(()))
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Returns the "application wide" Cors struct
|
||||||
|
fn cors_options() -> Cors {
|
||||||
|
let (allowed_origins, failed_origins) = AllowedOrigins::some(&["https://www.acme.com"]);
|
||||||
|
assert!(failed_origins.is_empty());
|
||||||
|
|
||||||
|
// You can also deserialize this
|
||||||
|
rocket_cors::Cors {
|
||||||
|
allowed_origins: allowed_origins,
|
||||||
|
allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(),
|
||||||
|
allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]),
|
||||||
|
allow_credentials: true,
|
||||||
|
..Default::default()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// A special struct that allows all origins
|
||||||
|
///
|
||||||
|
/// Note: In your real application, you might want to use something like `lazy_static` to generate
|
||||||
|
/// a `&'static` reference to this instead of creating a new struct on every request.
|
||||||
|
fn cors_options_all() -> Cors {
|
||||||
|
// You can also deserialize this
|
||||||
|
Default::default()
|
||||||
|
}
|
||||||
|
|
||||||
|
fn rocket() -> rocket::Rocket {
|
||||||
|
rocket::ignite()
|
||||||
|
.mount(
|
||||||
|
"/",
|
||||||
|
routes![
|
||||||
|
app,
|
||||||
|
ping,
|
||||||
|
ping_options,
|
||||||
|
],
|
||||||
|
)
|
||||||
|
.mount("/", rocket_cors::catch_all_options_routes()) // mount the catch all routes
|
||||||
|
.manage(cors_options())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn smoke_test() {
|
||||||
|
let client = Client::new(rocket()).unwrap();
|
||||||
|
|
||||||
|
// `Options` pre-flight checks
|
||||||
|
let origin_header = Header::from(
|
||||||
|
hyper::header::Origin::from_str("https://www.acme.com").unwrap(),
|
||||||
|
);
|
||||||
|
let method_header = Header::from(hyper::header::AccessControlRequestMethod(
|
||||||
|
hyper::method::Method::Get,
|
||||||
|
));
|
||||||
|
let request_headers = hyper::header::AccessControlRequestHeaders(
|
||||||
|
vec![FromStr::from_str("Authorization").unwrap()],
|
||||||
|
);
|
||||||
|
let request_headers = Header::from(request_headers);
|
||||||
|
let req = client
|
||||||
|
.options("/")
|
||||||
|
.header(origin_header)
|
||||||
|
.header(method_header)
|
||||||
|
.header(request_headers);
|
||||||
|
|
||||||
|
let response = req.dispatch();
|
||||||
|
assert!(response.status().class().is_success());
|
||||||
|
|
||||||
|
// "Actual" request
|
||||||
|
let origin_header = Header::from(
|
||||||
|
hyper::header::Origin::from_str("https://www.acme.com").unwrap(),
|
||||||
|
);
|
||||||
|
let authorization = Header::new("Authorization", "let me in");
|
||||||
|
let req = client.get("/").header(origin_header).header(authorization);
|
||||||
|
|
||||||
|
let mut response = req.dispatch();
|
||||||
|
assert!(response.status().class().is_success());
|
||||||
|
let body_str = response.body().and_then(|body| body.into_string());
|
||||||
|
assert_eq!(body_str, Some("Hello CORS!".to_string()));
|
||||||
|
|
||||||
|
let origin_header = response
|
||||||
|
.headers()
|
||||||
|
.get_one("Access-Control-Allow-Origin")
|
||||||
|
.expect("to exist");
|
||||||
|
assert_eq!("https://www.acme.com", origin_header);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn cors_options_check() {
|
||||||
|
let client = Client::new(rocket()).unwrap();
|
||||||
|
|
||||||
|
let origin_header = Header::from(
|
||||||
|
hyper::header::Origin::from_str("https://www.acme.com").unwrap(),
|
||||||
|
);
|
||||||
|
let method_header = Header::from(hyper::header::AccessControlRequestMethod(
|
||||||
|
hyper::method::Method::Get,
|
||||||
|
));
|
||||||
|
let request_headers = hyper::header::AccessControlRequestHeaders(
|
||||||
|
vec![FromStr::from_str("Authorization").unwrap()],
|
||||||
|
);
|
||||||
|
let request_headers = Header::from(request_headers);
|
||||||
|
let req = client
|
||||||
|
.options("/")
|
||||||
|
.header(origin_header)
|
||||||
|
.header(method_header)
|
||||||
|
.header(request_headers);
|
||||||
|
|
||||||
|
let response = req.dispatch();
|
||||||
|
assert!(response.status().class().is_success());
|
||||||
|
|
||||||
|
let origin_header = response
|
||||||
|
.headers()
|
||||||
|
.get_one("Access-Control-Allow-Origin")
|
||||||
|
.expect("to exist");
|
||||||
|
assert_eq!("https://www.acme.com", origin_header);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn cors_get_check() {
|
||||||
|
let client = Client::new(rocket()).unwrap();
|
||||||
|
|
||||||
|
let origin_header = Header::from(
|
||||||
|
hyper::header::Origin::from_str("https://www.acme.com").unwrap(),
|
||||||
|
);
|
||||||
|
let authorization = Header::new("Authorization", "let me in");
|
||||||
|
let req = client.get("/").header(origin_header).header(authorization);
|
||||||
|
|
||||||
|
let mut response = req.dispatch();
|
||||||
|
assert!(response.status().class().is_success());
|
||||||
|
let body_str = response.body().and_then(|body| body.into_string());
|
||||||
|
assert_eq!(body_str, Some("Hello CORS!".to_string()));
|
||||||
|
|
||||||
|
let origin_header = response
|
||||||
|
.headers()
|
||||||
|
.get_one("Access-Control-Allow-Origin")
|
||||||
|
.expect("to exist");
|
||||||
|
assert_eq!("https://www.acme.com", origin_header);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// This test is to check that non CORS compliant requests to GET should still work. (i.e. curl)
|
||||||
|
#[test]
|
||||||
|
fn cors_get_no_origin() {
|
||||||
|
let client = Client::new(rocket()).unwrap();
|
||||||
|
|
||||||
|
let authorization = Header::new("Authorization", "let me in");
|
||||||
|
let req = client.get("/").header(authorization);
|
||||||
|
|
||||||
|
let mut response = req.dispatch();
|
||||||
|
assert!(response.status().class().is_success());
|
||||||
|
let body_str = response.body().and_then(|body| body.into_string());
|
||||||
|
assert_eq!(body_str, Some("Hello CORS!".to_string()));
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn cors_options_bad_origin() {
|
||||||
|
let client = Client::new(rocket()).unwrap();
|
||||||
|
|
||||||
|
let origin_header = Header::from(
|
||||||
|
hyper::header::Origin::from_str("https://www.bad-origin.com").unwrap(),
|
||||||
|
);
|
||||||
|
let method_header = Header::from(hyper::header::AccessControlRequestMethod(
|
||||||
|
hyper::method::Method::Get,
|
||||||
|
));
|
||||||
|
let request_headers = hyper::header::AccessControlRequestHeaders(
|
||||||
|
vec![FromStr::from_str("Authorization").unwrap()],
|
||||||
|
);
|
||||||
|
let request_headers = Header::from(request_headers);
|
||||||
|
let req = client
|
||||||
|
.options("/")
|
||||||
|
.header(origin_header)
|
||||||
|
.header(method_header)
|
||||||
|
.header(request_headers);
|
||||||
|
|
||||||
|
let response = req.dispatch();
|
||||||
|
assert_eq!(response.status(), Status::Forbidden);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn cors_options_missing_origin() {
|
||||||
|
let client = Client::new(rocket()).unwrap();
|
||||||
|
|
||||||
|
let method_header = Header::from(hyper::header::AccessControlRequestMethod(
|
||||||
|
hyper::method::Method::Get,
|
||||||
|
));
|
||||||
|
let request_headers = hyper::header::AccessControlRequestHeaders(
|
||||||
|
vec![FromStr::from_str("Authorization").unwrap()],
|
||||||
|
);
|
||||||
|
let request_headers = Header::from(request_headers);
|
||||||
|
let req = client.options("/").header(method_header).header(
|
||||||
|
request_headers,
|
||||||
|
);
|
||||||
|
|
||||||
|
let response = req.dispatch();
|
||||||
|
assert!(response.status().class().is_success());
|
||||||
|
assert!(
|
||||||
|
response
|
||||||
|
.headers()
|
||||||
|
.get_one("Access-Control-Allow-Origin")
|
||||||
|
.is_none()
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn cors_options_bad_request_method() {
|
||||||
|
let client = Client::new(rocket()).unwrap();
|
||||||
|
|
||||||
|
let origin_header = Header::from(
|
||||||
|
hyper::header::Origin::from_str("https://www.acme.com").unwrap(),
|
||||||
|
);
|
||||||
|
let method_header = Header::from(hyper::header::AccessControlRequestMethod(
|
||||||
|
hyper::method::Method::Post,
|
||||||
|
));
|
||||||
|
let request_headers = hyper::header::AccessControlRequestHeaders(
|
||||||
|
vec![FromStr::from_str("Authorization").unwrap()],
|
||||||
|
);
|
||||||
|
let request_headers = Header::from(request_headers);
|
||||||
|
let req = client
|
||||||
|
.options("/")
|
||||||
|
.header(origin_header)
|
||||||
|
.header(method_header)
|
||||||
|
.header(request_headers);
|
||||||
|
|
||||||
|
let response = req.dispatch();
|
||||||
|
assert_eq!(response.status(), Status::Forbidden);
|
||||||
|
assert!(
|
||||||
|
response
|
||||||
|
.headers()
|
||||||
|
.get_one("Access-Control-Allow-Origin")
|
||||||
|
.is_none()
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn cors_options_bad_request_header() {
|
||||||
|
let client = Client::new(rocket()).unwrap();
|
||||||
|
|
||||||
|
let origin_header = Header::from(
|
||||||
|
hyper::header::Origin::from_str("https://www.acme.com").unwrap(),
|
||||||
|
);
|
||||||
|
let method_header = Header::from(hyper::header::AccessControlRequestMethod(
|
||||||
|
hyper::method::Method::Get,
|
||||||
|
));
|
||||||
|
let request_headers =
|
||||||
|
hyper::header::AccessControlRequestHeaders(vec![FromStr::from_str("Foobar").unwrap()]);
|
||||||
|
let request_headers = Header::from(request_headers);
|
||||||
|
let req = client
|
||||||
|
.options("/")
|
||||||
|
.header(origin_header)
|
||||||
|
.header(method_header)
|
||||||
|
.header(request_headers);
|
||||||
|
|
||||||
|
let response = req.dispatch();
|
||||||
|
assert_eq!(response.status(), Status::Forbidden);
|
||||||
|
assert!(
|
||||||
|
response
|
||||||
|
.headers()
|
||||||
|
.get_one("Access-Control-Allow-Origin")
|
||||||
|
.is_none()
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn cors_get_bad_origin() {
|
||||||
|
let client = Client::new(rocket()).unwrap();
|
||||||
|
|
||||||
|
let origin_header = Header::from(
|
||||||
|
hyper::header::Origin::from_str("https://www.bad-origin.com").unwrap(),
|
||||||
|
);
|
||||||
|
let authorization = Header::new("Authorization", "let me in");
|
||||||
|
let req = client.get("/").header(origin_header).header(authorization);
|
||||||
|
|
||||||
|
let response = req.dispatch();
|
||||||
|
assert_eq!(response.status(), Status::Forbidden);
|
||||||
|
assert!(
|
||||||
|
response
|
||||||
|
.headers()
|
||||||
|
.get_one("Access-Control-Allow-Origin")
|
||||||
|
.is_none()
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Tests that the `ping` route accepts other Origins
|
||||||
|
#[test]
|
||||||
|
fn cors_options_ping_check() {
|
||||||
|
let client = Client::new(rocket()).unwrap();
|
||||||
|
|
||||||
|
let origin_header = Header::from(
|
||||||
|
hyper::header::Origin::from_str("https://www.example.com").unwrap(),
|
||||||
|
);
|
||||||
|
let method_header = Header::from(hyper::header::AccessControlRequestMethod(
|
||||||
|
hyper::method::Method::Get,
|
||||||
|
));
|
||||||
|
|
||||||
|
let req = client.options("/ping").header(origin_header).header(
|
||||||
|
method_header,
|
||||||
|
);
|
||||||
|
|
||||||
|
let response = req.dispatch();
|
||||||
|
assert!(response.status().class().is_success());
|
||||||
|
|
||||||
|
let origin_header = response
|
||||||
|
.headers()
|
||||||
|
.get_one("Access-Control-Allow-Origin")
|
||||||
|
.expect("to exist");
|
||||||
|
assert_eq!("https://www.example.com", origin_header);
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Tests that the `ping` route accepts other Origins
|
||||||
|
#[test]
|
||||||
|
fn cors_get_ping_check() {
|
||||||
|
let client = Client::new(rocket()).unwrap();
|
||||||
|
|
||||||
|
let origin_header = Header::from(
|
||||||
|
hyper::header::Origin::from_str("https://www.example.com").unwrap(),
|
||||||
|
);
|
||||||
|
|
||||||
|
let req = client.get("/ping").header(origin_header);
|
||||||
|
|
||||||
|
let mut response = req.dispatch();
|
||||||
|
assert!(response.status().class().is_success());
|
||||||
|
let body_str = response.body().and_then(|body| body.into_string());
|
||||||
|
assert_eq!(body_str, Some("Pong!".to_string()));
|
||||||
|
|
||||||
|
let origin_header = response
|
||||||
|
.headers()
|
||||||
|
.get_one("Access-Control-Allow-Origin")
|
||||||
|
.expect("to exist");
|
||||||
|
assert_eq!("https://www.example.com", origin_header);
|
||||||
|
}
|
Loading…
Reference in New Issue