//! This crate tests using `rocket_cors` using manual mode #![feature(proc_macro_hygiene, decl_macro)] use hyper; #[macro_use] extern crate rocket; use std::str::FromStr; use rocket::http::Method; use rocket::http::{Header, Status}; use rocket::local::Client; use rocket::response::Responder; use rocket::State; use rocket_cors::*; /// Using a borrowed `Cors` #[get("/")] fn cors(options: State<'_, Cors>) -> impl Responder<'_> { options .inner() .respond_borrowed(|guard| guard.responder("Hello CORS")) } #[get("/panic")] fn panicking_route(options: State<'_, Cors>) -> impl Responder<'_> { options.inner().respond_borrowed(|_| -> () { panic!("This route will panic"); }) } /// Respond with an owned option instead #[options("/owned")] fn owned_options<'r>() -> impl Responder<'r> { let borrow = make_different_cors_options().to_cors()?; borrow.respond_owned(|guard| guard.responder("Manual CORS Preflight")) } /// Respond with an owned option instead #[get("/owned")] fn owned<'r>() -> impl Responder<'r> { let borrow = make_different_cors_options().to_cors()?; borrow.respond_owned(|guard| guard.responder("Hello CORS Owned")) } // The following routes tests that the routes can be compiled with manual CORS /// `Responder` with String #[get("/")] fn responder_string(options: State<'_, Cors>) -> impl Responder<'_> { options .inner() .respond_borrowed(|guard| guard.responder("Hello CORS".to_string())) } struct TestState; /// Borrow something else from Rocket with lifetime `'r` #[get("/")] fn borrow<'r>(options: State<'r, Cors>, test_state: State<'r, TestState>) -> impl Responder<'r> { let borrow = test_state.inner(); options.inner().respond_borrowed(move |guard| { let _ = borrow; guard.responder("Hello CORS".to_string()) }) } fn make_cors_options() -> CorsOptions { let allowed_origins = AllowedOrigins::some_exact(&["https://www.acme.com"]); CorsOptions { allowed_origins: allowed_origins, allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(), allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]), allow_credentials: true, ..Default::default() } } fn make_different_cors_options() -> CorsOptions { let allowed_origins = AllowedOrigins::some_exact(&["https://www.example.com"]); CorsOptions { allowed_origins: allowed_origins, allowed_methods: vec![Method::Get].into_iter().map(From::from).collect(), allowed_headers: AllowedHeaders::some(&["Authorization", "Accept"]), allow_credentials: true, ..Default::default() } } fn rocket() -> rocket::Rocket { rocket::ignite() .mount("/", routes![cors, panicking_route]) .mount("/", routes![owned, owned_options]) .mount("/", catch_all_options_routes()) // mount the catch all routes .manage(make_cors_options().to_cors().expect("Not to fail")) } #[test] fn smoke_test() { let client = Client::new(rocket()).unwrap(); // `Options` pre-flight checks let origin_header = Header::from(hyper::header::Origin::from_str("https://www.acme.com").unwrap()); let method_header = Header::from(hyper::header::AccessControlRequestMethod( hyper::method::Method::Get, )); let request_headers = hyper::header::AccessControlRequestHeaders(vec![ FromStr::from_str("Authorization").unwrap() ]); let request_headers = Header::from(request_headers); let req = client .options("/") .header(origin_header) .header(method_header) .header(request_headers); let response = req.dispatch(); assert!(response.status().class().is_success()); // "Actual" request let origin_header = Header::from(hyper::header::Origin::from_str("https://www.acme.com").unwrap()); let authorization = Header::new("Authorization", "let me in"); let req = client.get("/").header(origin_header).header(authorization); let mut response = req.dispatch(); assert!(response.status().class().is_success()); let body_str = response.body().and_then(|body| body.into_string()); assert_eq!(body_str, Some("Hello CORS".to_string())); let origin_header = response .headers() .get_one("Access-Control-Allow-Origin") .expect("to exist"); assert_eq!("https://www.acme.com", origin_header); } #[test] fn cors_options_borrowed_check() { let client = Client::new(rocket()).unwrap(); let origin_header = Header::from(hyper::header::Origin::from_str("https://www.acme.com").unwrap()); let method_header = Header::from(hyper::header::AccessControlRequestMethod( hyper::method::Method::Get, )); let request_headers = hyper::header::AccessControlRequestHeaders(vec![ FromStr::from_str("Authorization").unwrap() ]); let request_headers = Header::from(request_headers); let req = client .options("/") .header(origin_header) .header(method_header) .header(request_headers); let response = req.dispatch(); assert!(response.status().class().is_success()); let origin_header = response .headers() .get_one("Access-Control-Allow-Origin") .expect("to exist"); assert_eq!("https://www.acme.com", origin_header); } #[test] fn cors_get_borrowed_check() { let client = Client::new(rocket()).unwrap(); let origin_header = Header::from(hyper::header::Origin::from_str("https://www.acme.com").unwrap()); let authorization = Header::new("Authorization", "let me in"); let req = client.get("/").header(origin_header).header(authorization); let mut response = req.dispatch(); assert!(response.status().class().is_success()); let body_str = response.body().and_then(|body| body.into_string()); assert_eq!(body_str, Some("Hello CORS".to_string())); let origin_header = response .headers() .get_one("Access-Control-Allow-Origin") .expect("to exist"); assert_eq!("https://www.acme.com", origin_header); } /// This test is to check that non CORS compliant requests to GET should still work. (i.e. curl) #[test] fn cors_get_no_origin() { let client = Client::new(rocket()).unwrap(); let authorization = Header::new("Authorization", "let me in"); let req = client.get("/").header(authorization); let mut response = req.dispatch(); assert!(response.status().class().is_success()); let body_str = response.body().and_then(|body| body.into_string()); assert_eq!(body_str, Some("Hello CORS".to_string())); } #[test] fn cors_options_bad_origin() { let client = Client::new(rocket()).unwrap(); let origin_header = Header::from(hyper::header::Origin::from_str("https://www.bad-origin.com").unwrap()); let method_header = Header::from(hyper::header::AccessControlRequestMethod( hyper::method::Method::Get, )); let request_headers = hyper::header::AccessControlRequestHeaders(vec![ FromStr::from_str("Authorization").unwrap() ]); let request_headers = Header::from(request_headers); let req = client .options("/") .header(origin_header) .header(method_header) .header(request_headers); let response = req.dispatch(); assert_eq!(response.status(), Status::Forbidden); } #[test] fn cors_options_missing_origin() { let client = Client::new(rocket()).unwrap(); let method_header = Header::from(hyper::header::AccessControlRequestMethod( hyper::method::Method::Get, )); let request_headers = hyper::header::AccessControlRequestHeaders(vec![ FromStr::from_str("Authorization").unwrap() ]); let request_headers = Header::from(request_headers); let req = client .options("/") .header(method_header) .header(request_headers); let response = req.dispatch(); assert!(response.status().class().is_success()); assert!(response .headers() .get_one("Access-Control-Allow-Origin") .is_none()); } #[test] fn cors_options_bad_request_method() { let client = Client::new(rocket()).unwrap(); let origin_header = Header::from(hyper::header::Origin::from_str("https://www.acme.com").unwrap()); let method_header = Header::from(hyper::header::AccessControlRequestMethod( hyper::method::Method::Post, )); let request_headers = hyper::header::AccessControlRequestHeaders(vec![ FromStr::from_str("Authorization").unwrap() ]); let request_headers = Header::from(request_headers); let req = client .options("/") .header(origin_header) .header(method_header) .header(request_headers); let response = req.dispatch(); assert_eq!(response.status(), Status::Forbidden); assert!(response .headers() .get_one("Access-Control-Allow-Origin") .is_none()); } #[test] fn cors_options_bad_request_header() { let client = Client::new(rocket()).unwrap(); let origin_header = Header::from(hyper::header::Origin::from_str("https://www.acme.com").unwrap()); let method_header = Header::from(hyper::header::AccessControlRequestMethod( hyper::method::Method::Get, )); let request_headers = hyper::header::AccessControlRequestHeaders(vec![FromStr::from_str("Foobar").unwrap()]); let request_headers = Header::from(request_headers); let req = client .options("/") .header(origin_header) .header(method_header) .header(request_headers); let response = req.dispatch(); assert_eq!(response.status(), Status::Forbidden); assert!(response .headers() .get_one("Access-Control-Allow-Origin") .is_none()); } #[test] fn cors_get_bad_origin() { let client = Client::new(rocket()).unwrap(); let origin_header = Header::from(hyper::header::Origin::from_str("https://www.bad-origin.com").unwrap()); let authorization = Header::new("Authorization", "let me in"); let req = client.get("/").header(origin_header).header(authorization); let response = req.dispatch(); assert_eq!(response.status(), Status::Forbidden); assert!(response .headers() .get_one("Access-Control-Allow-Origin") .is_none()); } /// This test ensures that on a failing CORS request, the route (along with its side effects) /// should never be executed. /// The route used will panic if executed #[test] fn routes_failing_checks_are_not_executed() { let client = Client::new(rocket()).unwrap(); let origin_header = Header::from(hyper::header::Origin::from_str("https://www.bad-origin.com").unwrap()); let method_header = Header::from(hyper::header::AccessControlRequestMethod( hyper::method::Method::Get, )); let request_headers = hyper::header::AccessControlRequestHeaders(vec![ FromStr::from_str("Authorization").unwrap() ]); let request_headers = Header::from(request_headers); let req = client .options("/panic") .header(origin_header) .header(method_header) .header(request_headers); let response = req.dispatch(); assert_eq!(response.status(), Status::Forbidden); assert!(response .headers() .get_one("Access-Control-Allow-Origin") .is_none()); } /// Manual OPTIONS routes are called #[test] fn cors_options_owned_check() { let rocket = rocket(); let client = Client::new(rocket).unwrap(); let origin_header = Header::from(hyper::header::Origin::from_str("https://www.example.com").unwrap()); let method_header = Header::from(hyper::header::AccessControlRequestMethod( hyper::method::Method::Get, )); let request_headers = hyper::header::AccessControlRequestHeaders(vec![ FromStr::from_str("Authorization").unwrap() ]); let request_headers = Header::from(request_headers); let req = client .options("/owned") .header(origin_header) .header(method_header) .header(request_headers); let mut response = req.dispatch(); let body_str = response.body().and_then(|body| body.into_string()); assert!(response.status().class().is_success()); assert_eq!(body_str, Some("Manual CORS Preflight".to_string())); let origin_header = response .headers() .get_one("Access-Control-Allow-Origin") .expect("to exist"); assert_eq!("https://www.example.com", origin_header); } /// Owned manual response works #[test] fn cors_get_owned_check() { let client = Client::new(rocket()).unwrap(); let origin_header = Header::from(hyper::header::Origin::from_str("https://www.example.com").unwrap()); let authorization = Header::new("Authorization", "let me in"); let req = client .get("/owned") .header(origin_header) .header(authorization); let mut response = req.dispatch(); assert!(response.status().class().is_success()); let body_str = response.body().and_then(|body| body.into_string()); assert_eq!(body_str, Some("Hello CORS Owned".to_string())); let origin_header = response .headers() .get_one("Access-Control-Allow-Origin") .expect("to exist"); assert_eq!("https://www.example.com", origin_header); }