itsi-server 0.1.1 → 0.1.18
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/CODE_OF_CONDUCT.md +7 -0
- data/Cargo.lock +3937 -0
- data/Cargo.toml +7 -0
- data/README.md +4 -0
- data/Rakefile +8 -1
- data/_index.md +6 -0
- data/exe/itsi +141 -46
- data/ext/itsi_error/Cargo.toml +3 -0
- data/ext/itsi_error/src/lib.rs +98 -24
- data/ext/itsi_error/target/debug/build/clang-sys-da71b0344e568175/out/common.rs +355 -0
- data/ext/itsi_error/target/debug/build/clang-sys-da71b0344e568175/out/dynamic.rs +276 -0
- data/ext/itsi_error/target/debug/build/clang-sys-da71b0344e568175/out/macros.rs +49 -0
- data/ext/itsi_error/target/debug/build/rb-sys-49f554618693db24/out/bindings-0.9.110-mri-arm64-darwin23-3.4.2.rs +8865 -0
- data/ext/itsi_error/target/debug/incremental/itsi_error-1mmt5sux7jb0i/s-h510z7m8v9-0bxu7yd.lock +0 -0
- data/ext/itsi_error/target/debug/incremental/itsi_error-2vn3jey74oiw0/s-h5113n0e7e-1v5qzs6.lock +0 -0
- data/ext/itsi_error/target/debug/incremental/itsi_error-37uv9dicz7awp/s-h510ykifhe-0tbnep2.lock +0 -0
- data/ext/itsi_error/target/debug/incremental/itsi_error-37uv9dicz7awp/s-h510yyocpj-0tz7ug7.lock +0 -0
- data/ext/itsi_error/target/debug/incremental/itsi_error-37uv9dicz7awp/s-h510z0xc8g-14ol18k.lock +0 -0
- data/ext/itsi_error/target/debug/incremental/itsi_error-3g5qf4y7d54uj/s-h5113n0e7d-1trk8on.lock +0 -0
- data/ext/itsi_error/target/debug/incremental/itsi_error-3lpfftm45d3e2/s-h510z7m8r3-1pxp20o.lock +0 -0
- data/ext/itsi_error/target/debug/incremental/itsi_error-3o4qownhl3d7n/s-h510ykifek-1uxasnk.lock +0 -0
- data/ext/itsi_error/target/debug/incremental/itsi_error-3o4qownhl3d7n/s-h510yyocki-11u37qm.lock +0 -0
- data/ext/itsi_error/target/debug/incremental/itsi_error-3o4qownhl3d7n/s-h510z0xc93-0pmy0zm.lock +0 -0
- data/ext/itsi_instrument_entry/Cargo.toml +15 -0
- data/ext/itsi_instrument_entry/src/lib.rs +31 -0
- data/ext/itsi_rb_helpers/Cargo.toml +3 -0
- data/ext/itsi_rb_helpers/src/heap_value.rs +139 -0
- data/ext/itsi_rb_helpers/src/lib.rs +140 -10
- data/ext/itsi_rb_helpers/target/debug/build/clang-sys-da71b0344e568175/out/common.rs +355 -0
- data/ext/itsi_rb_helpers/target/debug/build/clang-sys-da71b0344e568175/out/dynamic.rs +276 -0
- data/ext/itsi_rb_helpers/target/debug/build/clang-sys-da71b0344e568175/out/macros.rs +49 -0
- data/ext/itsi_rb_helpers/target/debug/build/rb-sys-eb9ed4ff3a60f995/out/bindings-0.9.110-mri-arm64-darwin23-3.4.2.rs +8865 -0
- data/ext/itsi_rb_helpers/target/debug/incremental/itsi_rb_helpers-040pxg6yhb3g3/s-h5113n7a1b-03bwlt4.lock +0 -0
- data/ext/itsi_rb_helpers/target/debug/incremental/itsi_rb_helpers-131g1u4dzkt1a/s-h51113xnh3-1eik1ip.lock +0 -0
- data/ext/itsi_rb_helpers/target/debug/incremental/itsi_rb_helpers-131g1u4dzkt1a/s-h5111704jj-0g4rj8x.lock +0 -0
- data/ext/itsi_rb_helpers/target/debug/incremental/itsi_rb_helpers-1q2d3drtxrzs5/s-h5113n79yl-0bxcqc5.lock +0 -0
- data/ext/itsi_rb_helpers/target/debug/incremental/itsi_rb_helpers-374a9h7ovycj0/s-h51113xoox-10de2hp.lock +0 -0
- data/ext/itsi_rb_helpers/target/debug/incremental/itsi_rb_helpers-374a9h7ovycj0/s-h5111704w7-0vdq7gq.lock +0 -0
- data/ext/itsi_scheduler/Cargo.toml +24 -0
- data/ext/itsi_scheduler/src/itsi_scheduler/io_helpers.rs +56 -0
- data/ext/itsi_scheduler/src/itsi_scheduler/io_waiter.rs +44 -0
- data/ext/itsi_scheduler/src/itsi_scheduler/timer.rs +44 -0
- data/ext/itsi_scheduler/src/itsi_scheduler.rs +308 -0
- data/ext/itsi_scheduler/src/lib.rs +38 -0
- data/ext/itsi_server/Cargo.lock +2956 -0
- data/ext/itsi_server/Cargo.toml +72 -14
- data/ext/itsi_server/extconf.rb +1 -1
- data/ext/itsi_server/src/default_responses/html/401.html +68 -0
- data/ext/itsi_server/src/default_responses/html/403.html +68 -0
- data/ext/itsi_server/src/default_responses/html/404.html +68 -0
- data/ext/itsi_server/src/default_responses/html/413.html +71 -0
- data/ext/itsi_server/src/default_responses/html/429.html +68 -0
- data/ext/itsi_server/src/default_responses/html/500.html +71 -0
- data/ext/itsi_server/src/default_responses/html/502.html +71 -0
- data/ext/itsi_server/src/default_responses/html/503.html +68 -0
- data/ext/itsi_server/src/default_responses/html/504.html +69 -0
- data/ext/itsi_server/src/default_responses/html/index.html +238 -0
- data/ext/itsi_server/src/default_responses/json/401.json +6 -0
- data/ext/itsi_server/src/default_responses/json/403.json +6 -0
- data/ext/itsi_server/src/default_responses/json/404.json +6 -0
- data/ext/itsi_server/src/default_responses/json/413.json +6 -0
- data/ext/itsi_server/src/default_responses/json/429.json +6 -0
- data/ext/itsi_server/src/default_responses/json/500.json +6 -0
- data/ext/itsi_server/src/default_responses/json/502.json +6 -0
- data/ext/itsi_server/src/default_responses/json/503.json +6 -0
- data/ext/itsi_server/src/default_responses/json/504.json +6 -0
- data/ext/itsi_server/src/default_responses/mod.rs +11 -0
- data/ext/itsi_server/src/env.rs +43 -0
- data/ext/itsi_server/src/lib.rs +132 -40
- data/ext/itsi_server/src/prelude.rs +2 -0
- data/ext/itsi_server/src/ruby_types/itsi_body_proxy/big_bytes.rs +109 -0
- data/ext/itsi_server/src/ruby_types/itsi_body_proxy/mod.rs +143 -0
- data/ext/itsi_server/src/ruby_types/itsi_grpc_call.rs +344 -0
- data/ext/itsi_server/src/ruby_types/itsi_grpc_response_stream/mod.rs +264 -0
- data/ext/itsi_server/src/ruby_types/itsi_http_request.rs +345 -0
- data/ext/itsi_server/src/ruby_types/itsi_http_response.rs +391 -0
- data/ext/itsi_server/src/ruby_types/itsi_server/file_watcher.rs +225 -0
- data/ext/itsi_server/src/ruby_types/itsi_server/itsi_server_config.rs +375 -0
- data/ext/itsi_server/src/ruby_types/itsi_server.rs +83 -0
- data/ext/itsi_server/src/ruby_types/mod.rs +48 -0
- data/ext/itsi_server/src/server/binds/bind.rs +201 -0
- data/ext/itsi_server/src/server/binds/bind_protocol.rs +37 -0
- data/ext/itsi_server/src/server/binds/listener.rs +432 -0
- data/ext/itsi_server/src/server/binds/mod.rs +4 -0
- data/ext/itsi_server/src/server/binds/tls/locked_dir_cache.rs +132 -0
- data/ext/itsi_server/src/server/binds/tls.rs +270 -0
- data/ext/itsi_server/src/server/byte_frame.rs +32 -0
- data/ext/itsi_server/src/server/http_message_types.rs +97 -0
- data/ext/itsi_server/src/server/io_stream.rs +105 -0
- data/ext/itsi_server/src/server/lifecycle_event.rs +12 -0
- data/ext/itsi_server/src/server/middleware_stack/middleware.rs +165 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/allow_list.rs +56 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/auth_api_key.rs +87 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/auth_basic.rs +86 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/auth_jwt.rs +285 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/cache_control.rs +142 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/compression.rs +289 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/cors.rs +292 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/deny_list.rs +55 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/error_response/default_responses.rs +190 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/error_response.rs +157 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/etag.rs +195 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/header_interpretation.rs +82 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/intrusion_protection.rs +201 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/log_requests.rs +82 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/max_body.rs +47 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/mod.rs +87 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/proxy.rs +414 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/rate_limit.rs +131 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/redirect.rs +76 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/request_headers.rs +44 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/response_headers.rs +36 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/ruby_app.rs +126 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/static_assets.rs +180 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/static_response.rs +55 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/string_rewrite.rs +163 -0
- data/ext/itsi_server/src/server/middleware_stack/middlewares/token_source.rs +12 -0
- data/ext/itsi_server/src/server/middleware_stack/mod.rs +347 -0
- data/ext/itsi_server/src/server/mod.rs +12 -5
- data/ext/itsi_server/src/server/process_worker.rs +247 -0
- data/ext/itsi_server/src/server/request_job.rs +11 -0
- data/ext/itsi_server/src/server/serve_strategy/cluster_mode.rs +342 -0
- data/ext/itsi_server/src/server/serve_strategy/mod.rs +30 -0
- data/ext/itsi_server/src/server/serve_strategy/single_mode.rs +421 -0
- data/ext/itsi_server/src/server/signal.rs +76 -0
- data/ext/itsi_server/src/server/size_limited_incoming.rs +101 -0
- data/ext/itsi_server/src/server/thread_worker.rs +475 -0
- data/ext/itsi_server/src/services/cache_store.rs +74 -0
- data/ext/itsi_server/src/services/itsi_http_service.rs +239 -0
- data/ext/itsi_server/src/services/mime_types.rs +1416 -0
- data/ext/itsi_server/src/services/mod.rs +6 -0
- data/ext/itsi_server/src/services/password_hasher.rs +83 -0
- data/ext/itsi_server/src/services/rate_limiter.rs +569 -0
- data/ext/itsi_server/src/services/static_file_server.rs +1324 -0
- data/ext/itsi_tracing/Cargo.toml +5 -0
- data/ext/itsi_tracing/src/lib.rs +315 -7
- data/ext/itsi_tracing/target/debug/incremental/itsi_tracing-0994n8rpvvt9m/s-h510hfz1f6-1kbycmq.lock +0 -0
- data/ext/itsi_tracing/target/debug/incremental/itsi_tracing-0bob7bf4yq34i/s-h5113125h5-0lh4rag.lock +0 -0
- data/ext/itsi_tracing/target/debug/incremental/itsi_tracing-2fcodulrxbbxo/s-h510h2infk-0hp5kjw.lock +0 -0
- data/ext/itsi_tracing/target/debug/incremental/itsi_tracing-2iak63r1woi1l/s-h510h2in4q-0kxfzw1.lock +0 -0
- data/ext/itsi_tracing/target/debug/incremental/itsi_tracing-2kk4qj9gn5dg2/s-h5113124kv-0enwon2.lock +0 -0
- data/ext/itsi_tracing/target/debug/incremental/itsi_tracing-2mwo0yas7dtw4/s-h510hfz1ha-1udgpei.lock +0 -0
- data/lib/itsi/http_request/response_status_shortcodes.rb +74 -0
- data/lib/itsi/http_request.rb +186 -0
- data/lib/itsi/http_response.rb +41 -0
- data/lib/itsi/passfile.rb +109 -0
- data/lib/itsi/server/config/dsl.rb +565 -0
- data/lib/itsi/server/config.rb +166 -0
- data/lib/itsi/server/default_app/default_app.rb +34 -0
- data/lib/itsi/server/default_app/index.html +115 -0
- data/lib/itsi/server/default_config/Itsi-rackup.rb +119 -0
- data/lib/itsi/server/default_config/Itsi.rb +107 -0
- data/lib/itsi/server/grpc/grpc_call.rb +246 -0
- data/lib/itsi/server/grpc/grpc_interface.rb +100 -0
- data/lib/itsi/server/grpc/reflection/v1/reflection_pb.rb +26 -0
- data/lib/itsi/server/grpc/reflection/v1/reflection_services_pb.rb +122 -0
- data/lib/itsi/server/rack/handler/itsi.rb +27 -0
- data/lib/itsi/server/rack_interface.rb +94 -0
- data/lib/itsi/server/route_tester.rb +107 -0
- data/lib/itsi/server/scheduler_interface.rb +21 -0
- data/lib/itsi/server/scheduler_mode.rb +10 -0
- data/lib/itsi/server/signal_trap.rb +29 -0
- data/lib/itsi/server/typed_handlers/param_parser.rb +200 -0
- data/lib/itsi/server/typed_handlers/source_parser.rb +55 -0
- data/lib/itsi/server/typed_handlers.rb +17 -0
- data/lib/itsi/server/version.rb +1 -1
- data/lib/itsi/server.rb +160 -9
- data/lib/itsi/standard_headers.rb +86 -0
- data/lib/ruby_lsp/itsi/addon.rb +111 -0
- data/lib/shell_completions/completions.rb +26 -0
- metadata +182 -25
- data/ext/itsi_server/src/request/itsi_request.rs +0 -143
- data/ext/itsi_server/src/request/mod.rs +0 -1
- data/ext/itsi_server/src/server/bind.rs +0 -138
- data/ext/itsi_server/src/server/itsi_ca/itsi_ca.crt +0 -32
- data/ext/itsi_server/src/server/itsi_ca/itsi_ca.key +0 -52
- data/ext/itsi_server/src/server/itsi_server.rs +0 -182
- data/ext/itsi_server/src/server/listener.rs +0 -218
- data/ext/itsi_server/src/server/tls.rs +0 -138
- data/ext/itsi_server/src/server/transfer_protocol.rs +0 -23
- data/ext/itsi_server/src/stream_writer/mod.rs +0 -21
- data/lib/itsi/request.rb +0 -39
@@ -0,0 +1,270 @@
|
|
1
|
+
use base64::{engine::general_purpose, Engine as _};
|
2
|
+
use itsi_error::Result;
|
3
|
+
use itsi_tracing::info;
|
4
|
+
use locked_dir_cache::LockedDirCache;
|
5
|
+
use rcgen::{
|
6
|
+
BasicConstraints, CertificateParams, DistinguishedName, DnType, IsCa, KeyPair, SanType,
|
7
|
+
};
|
8
|
+
use rustls::{
|
9
|
+
pki_types::{CertificateDer, PrivateKeyDer},
|
10
|
+
ClientConfig, RootCertStore,
|
11
|
+
};
|
12
|
+
use rustls_pemfile::{certs, pkcs8_private_keys};
|
13
|
+
use std::{
|
14
|
+
collections::HashMap,
|
15
|
+
fs,
|
16
|
+
io::{BufReader, Error},
|
17
|
+
sync::Arc,
|
18
|
+
};
|
19
|
+
use tokio::sync::Mutex;
|
20
|
+
use tokio_rustls::{rustls::ServerConfig, TlsAcceptor};
|
21
|
+
use tokio_rustls_acme::{AcmeAcceptor, AcmeConfig, AcmeState};
|
22
|
+
|
23
|
+
use crate::env::{
|
24
|
+
ITSI_ACME_CACHE_DIR, ITSI_ACME_CA_PEM_PATH, ITSI_ACME_CONTACT_EMAIL, ITSI_ACME_DIRECTORY_URL,
|
25
|
+
ITSI_LOCAL_CA_DIR,
|
26
|
+
};
|
27
|
+
|
28
|
+
mod locked_dir_cache;
|
29
|
+
|
30
|
+
#[derive(Clone)]
|
31
|
+
pub enum ItsiTlsAcceptor {
|
32
|
+
Manual(TlsAcceptor),
|
33
|
+
Automatic(
|
34
|
+
AcmeAcceptor,
|
35
|
+
Arc<Mutex<AcmeState<Error>>>,
|
36
|
+
Arc<ServerConfig>,
|
37
|
+
),
|
38
|
+
}
|
39
|
+
|
40
|
+
/// Generates a TLS configuration based on either :
|
41
|
+
/// * Input "cert" and "key" options (either paths or Base64-encoded strings) or
|
42
|
+
/// * Performs automatic certificate generation/retrieval. Generated certs use an internal self-signed Isti CA.
|
43
|
+
///
|
44
|
+
/// If a non-local host or optional domain parameter is provided,
|
45
|
+
/// an automated certificate will attempt to be fetched using let's encrypt.
|
46
|
+
pub fn configure_tls(
|
47
|
+
host: &str,
|
48
|
+
query_params: &HashMap<String, String>,
|
49
|
+
) -> Result<ItsiTlsAcceptor> {
|
50
|
+
let domains = query_params
|
51
|
+
.get("domains")
|
52
|
+
.map(|v| v.split(',').map(String::from).collect::<Vec<_>>())
|
53
|
+
.or_else(|| query_params.get("domain").map(|v| vec![v.to_string()]));
|
54
|
+
|
55
|
+
if query_params.get("cert").is_some_and(|c| c == "acme") {
|
56
|
+
if let Some(domains) = domains {
|
57
|
+
let directory_url = &*ITSI_ACME_DIRECTORY_URL;
|
58
|
+
info!(
|
59
|
+
domains = format!("{:?}", domains),
|
60
|
+
directory_url, "Requesting acme cert"
|
61
|
+
);
|
62
|
+
let acme_contact_email = query_params
|
63
|
+
.get("acme_email")
|
64
|
+
.map(|s| s.to_string())
|
65
|
+
.or_else(|| (*ITSI_ACME_CONTACT_EMAIL).as_ref().ok().map(|s| s.to_string()))
|
66
|
+
.ok_or_else(|| itsi_error::ItsiError::ArgumentError(
|
67
|
+
"acme_email query param or ITSI_ACME_CONTACT_EMAIL must be set before you can auto-generate let's encrypt certificates".to_string(),
|
68
|
+
))?;
|
69
|
+
|
70
|
+
let acme_config = AcmeConfig::new(domains)
|
71
|
+
.contact([format!("mailto:{}", acme_contact_email)])
|
72
|
+
.cache(LockedDirCache::new(&*ITSI_ACME_CACHE_DIR))
|
73
|
+
.directory(directory_url);
|
74
|
+
|
75
|
+
let acme_state = if let Ok(ca_pem_path) = &*ITSI_ACME_CA_PEM_PATH {
|
76
|
+
let mut root_cert_store = RootCertStore::empty();
|
77
|
+
|
78
|
+
let ca_pem = fs::read(ca_pem_path).expect("failed to read CA pem file");
|
79
|
+
let mut ca_reader = BufReader::new(&ca_pem[..]);
|
80
|
+
let der_certs: Vec<CertificateDer> = certs(&mut ca_reader)
|
81
|
+
.collect::<std::result::Result<Vec<CertificateDer>, _>>()
|
82
|
+
.map_err(|e| {
|
83
|
+
itsi_error::ItsiError::ArgumentError(format!(
|
84
|
+
"Invalid ACME CA Pem path {:?}",
|
85
|
+
e
|
86
|
+
))
|
87
|
+
})?;
|
88
|
+
root_cert_store.add_parsable_certificates(der_certs);
|
89
|
+
|
90
|
+
let client_config = ClientConfig::builder()
|
91
|
+
.with_root_certificates(root_cert_store)
|
92
|
+
.with_no_client_auth();
|
93
|
+
acme_config
|
94
|
+
.client_tls_config(Arc::new(client_config))
|
95
|
+
.state()
|
96
|
+
} else {
|
97
|
+
acme_config.state()
|
98
|
+
};
|
99
|
+
|
100
|
+
let mut rustls_config = ServerConfig::builder()
|
101
|
+
.with_no_client_auth()
|
102
|
+
.with_cert_resolver(acme_state.resolver());
|
103
|
+
|
104
|
+
rustls_config.alpn_protocols = vec![b"h2".to_vec(), b"http/1.1".to_vec()];
|
105
|
+
|
106
|
+
let acceptor = acme_state.acceptor();
|
107
|
+
return Ok(ItsiTlsAcceptor::Automatic(
|
108
|
+
acceptor,
|
109
|
+
Arc::new(Mutex::new(acme_state)),
|
110
|
+
Arc::new(rustls_config),
|
111
|
+
));
|
112
|
+
}
|
113
|
+
}
|
114
|
+
let (certs, key) = if let (Some(cert_path), Some(key_path)) =
|
115
|
+
(query_params.get("cert"), query_params.get("key"))
|
116
|
+
{
|
117
|
+
// Load from file or Base64
|
118
|
+
let certs = load_certs(cert_path);
|
119
|
+
let key = load_private_key(key_path);
|
120
|
+
(certs, key)
|
121
|
+
} else {
|
122
|
+
generate_ca_signed_cert(domains.unwrap_or(vec![host.to_owned()]))?
|
123
|
+
};
|
124
|
+
|
125
|
+
let mut config = ServerConfig::builder()
|
126
|
+
.with_no_client_auth()
|
127
|
+
.with_single_cert(certs, key)
|
128
|
+
.expect("Failed to build TLS config");
|
129
|
+
|
130
|
+
config.alpn_protocols = vec![b"h2".to_vec(), b"http/1.1".to_vec()];
|
131
|
+
Ok(ItsiTlsAcceptor::Manual(TlsAcceptor::from(Arc::new(config))))
|
132
|
+
}
|
133
|
+
|
134
|
+
pub fn load_certs(path: &str) -> Vec<CertificateDer<'static>> {
|
135
|
+
let data = if let Some(stripped) = path.strip_prefix("base64:") {
|
136
|
+
general_purpose::STANDARD
|
137
|
+
.decode(stripped)
|
138
|
+
.expect("Invalid base64 certificate")
|
139
|
+
} else {
|
140
|
+
fs::read(path).expect("Failed to read certificate file")
|
141
|
+
};
|
142
|
+
|
143
|
+
if data.starts_with(b"-----BEGIN ") {
|
144
|
+
let mut reader = BufReader::new(&data[..]);
|
145
|
+
let certs_der: Vec<Vec<u8>> = certs(&mut reader)
|
146
|
+
.map(|r| {
|
147
|
+
r.map(|der| der.as_ref().to_vec())
|
148
|
+
.map_err(itsi_error::ItsiError::from)
|
149
|
+
})
|
150
|
+
.collect::<Result<_>>()
|
151
|
+
.expect("Failed to parse certificate file");
|
152
|
+
certs_der
|
153
|
+
.into_iter()
|
154
|
+
.map(|vec| {
|
155
|
+
// Convert the owned Vec<u8> into a CertificateDer and force 'static.
|
156
|
+
unsafe { std::mem::transmute(CertificateDer::from(vec)) }
|
157
|
+
})
|
158
|
+
.collect()
|
159
|
+
} else {
|
160
|
+
vec![CertificateDer::from(data)]
|
161
|
+
}
|
162
|
+
}
|
163
|
+
|
164
|
+
/// Loads a private key from a file or Base64.
|
165
|
+
pub fn load_private_key(path: &str) -> PrivateKeyDer<'static> {
|
166
|
+
let key_data = if let Some(stripped) = path.strip_prefix("base64:") {
|
167
|
+
general_purpose::STANDARD
|
168
|
+
.decode(stripped)
|
169
|
+
.expect("Invalid base64 private key")
|
170
|
+
} else {
|
171
|
+
fs::read(path).expect("Failed to read private key file")
|
172
|
+
};
|
173
|
+
|
174
|
+
if key_data.starts_with(b"-----BEGIN ") {
|
175
|
+
let mut reader = BufReader::new(&key_data[..]);
|
176
|
+
let keys: Vec<Vec<u8>> = pkcs8_private_keys(&mut reader)
|
177
|
+
.map(|r| {
|
178
|
+
r.map(|key| key.secret_pkcs8_der().to_vec())
|
179
|
+
.map_err(itsi_error::ItsiError::from)
|
180
|
+
})
|
181
|
+
.collect::<Result<_>>()
|
182
|
+
.expect("Failed to parse private key");
|
183
|
+
if !keys.is_empty() {
|
184
|
+
return PrivateKeyDer::try_from(keys[0].clone()).unwrap();
|
185
|
+
}
|
186
|
+
}
|
187
|
+
PrivateKeyDer::try_from(key_data).unwrap()
|
188
|
+
}
|
189
|
+
|
190
|
+
pub fn generate_ca_signed_cert(
|
191
|
+
domains: Vec<String>,
|
192
|
+
) -> Result<(Vec<CertificateDer<'static>>, PrivateKeyDer<'static>)> {
|
193
|
+
info!(
|
194
|
+
domains = format!("{}", domains.join(", ")),
|
195
|
+
"Self signed cert",
|
196
|
+
);
|
197
|
+
info!(
|
198
|
+
"Add {} to your system's trusted cert store to resolve certificate errors.",
|
199
|
+
format!("{}/itsi_dev_ca.crt", ITSI_LOCAL_CA_DIR.to_str().unwrap())
|
200
|
+
);
|
201
|
+
info!("Dev CA path can be overridden by setting env var: `ITSI_LOCAL_CA_DIR`.");
|
202
|
+
let (ca_key_pem, ca_cert_pem) = get_or_create_local_dev_ca()?;
|
203
|
+
|
204
|
+
let ca_kp = KeyPair::from_pem(&ca_key_pem).expect("Failed to load CA key");
|
205
|
+
let ca_cert = CertificateParams::from_ca_cert_pem(&ca_cert_pem)
|
206
|
+
.expect("Failed to parse embedded CA certificate")
|
207
|
+
.self_signed(&ca_kp)
|
208
|
+
.expect("Failed to self-sign embedded CA cert");
|
209
|
+
|
210
|
+
let ee_key = KeyPair::generate_for(&rcgen::PKCS_ECDSA_P256_SHA256).unwrap();
|
211
|
+
let mut ee_params = CertificateParams::default();
|
212
|
+
|
213
|
+
use std::net::IpAddr;
|
214
|
+
|
215
|
+
ee_params.subject_alt_names = domains
|
216
|
+
.iter()
|
217
|
+
.map(|domain| {
|
218
|
+
if let Ok(ip) = domain.parse::<IpAddr>() {
|
219
|
+
SanType::IpAddress(ip)
|
220
|
+
} else {
|
221
|
+
SanType::DnsName(domain.clone().try_into().unwrap())
|
222
|
+
}
|
223
|
+
})
|
224
|
+
.collect();
|
225
|
+
|
226
|
+
ee_params
|
227
|
+
.distinguished_name
|
228
|
+
.push(DnType::CommonName, domains[0].clone());
|
229
|
+
|
230
|
+
ee_params.use_authority_key_identifier_extension = true;
|
231
|
+
|
232
|
+
let ee_cert = ee_params.signed_by(&ee_key, &ca_cert, &ca_kp).unwrap();
|
233
|
+
let ee_cert_der = ee_cert.der().to_vec();
|
234
|
+
let ee_cert = CertificateDer::from(ee_cert_der);
|
235
|
+
let ca_cert = CertificateDer::from(ca_cert.der().to_vec());
|
236
|
+
Ok((
|
237
|
+
vec![ee_cert, ca_cert],
|
238
|
+
PrivateKeyDer::try_from(ee_key.serialize_der()).unwrap(),
|
239
|
+
))
|
240
|
+
}
|
241
|
+
|
242
|
+
fn get_or_create_local_dev_ca() -> Result<(String, String)> {
|
243
|
+
let ca_dir = &*ITSI_LOCAL_CA_DIR;
|
244
|
+
fs::create_dir_all(ca_dir)?;
|
245
|
+
|
246
|
+
let key_path = ca_dir.join("itsi_dev_ca.key");
|
247
|
+
let cert_path = ca_dir.join("itsi_dev_ca.crt");
|
248
|
+
|
249
|
+
if key_path.exists() && cert_path.exists() {
|
250
|
+
// Already have a local CA
|
251
|
+
let key_pem = fs::read_to_string(&key_path)?;
|
252
|
+
let cert_pem = fs::read_to_string(&cert_path)?;
|
253
|
+
|
254
|
+
Ok((key_pem, cert_pem))
|
255
|
+
} else {
|
256
|
+
let subject_alt_names = vec!["dev.itsi.fyi".to_string(), "localhost".to_string()];
|
257
|
+
let mut params = CertificateParams::new(subject_alt_names)?;
|
258
|
+
let mut distinguished_name = DistinguishedName::new();
|
259
|
+
distinguished_name.push(DnType::CommonName, "Itsi Development CA");
|
260
|
+
params.distinguished_name = distinguished_name;
|
261
|
+
params.is_ca = IsCa::Ca(BasicConstraints::Unconstrained);
|
262
|
+
let key_pair = KeyPair::generate()?;
|
263
|
+
let cert = params.self_signed(&key_pair)?;
|
264
|
+
|
265
|
+
fs::write(&key_path, key_pair.serialize_pem())?;
|
266
|
+
fs::write(&cert_path, cert.pem())?;
|
267
|
+
|
268
|
+
Ok((key_pair.serialize_pem(), cert.pem()))
|
269
|
+
}
|
270
|
+
}
|
@@ -0,0 +1,32 @@
|
|
1
|
+
use std::ops::Deref;
|
2
|
+
|
3
|
+
use bytes::Bytes;
|
4
|
+
|
5
|
+
#[derive(Debug)]
|
6
|
+
pub enum ByteFrame {
|
7
|
+
Data(Bytes),
|
8
|
+
End(Bytes),
|
9
|
+
Empty,
|
10
|
+
}
|
11
|
+
|
12
|
+
impl Deref for ByteFrame {
|
13
|
+
type Target = Bytes;
|
14
|
+
|
15
|
+
fn deref(&self) -> &Self::Target {
|
16
|
+
match self {
|
17
|
+
ByteFrame::Data(data) => data,
|
18
|
+
ByteFrame::End(data) => data,
|
19
|
+
ByteFrame::Empty => unreachable!(),
|
20
|
+
}
|
21
|
+
}
|
22
|
+
}
|
23
|
+
|
24
|
+
impl From<ByteFrame> for Bytes {
|
25
|
+
fn from(frame: ByteFrame) -> Self {
|
26
|
+
match frame {
|
27
|
+
ByteFrame::Data(data) => data,
|
28
|
+
ByteFrame::End(data) => data,
|
29
|
+
ByteFrame::Empty => unreachable!(),
|
30
|
+
}
|
31
|
+
}
|
32
|
+
}
|
@@ -0,0 +1,97 @@
|
|
1
|
+
use std::convert::Infallible;
|
2
|
+
|
3
|
+
use bytes::Bytes;
|
4
|
+
use http::{Request, Response};
|
5
|
+
use http_body_util::combinators::BoxBody;
|
6
|
+
use hyper::body::Incoming;
|
7
|
+
|
8
|
+
use super::size_limited_incoming::SizeLimitedIncoming;
|
9
|
+
|
10
|
+
pub type HttpResponse = Response<BoxBody<Bytes, Infallible>>;
|
11
|
+
pub type HttpRequest = Request<SizeLimitedIncoming<Incoming>>;
|
12
|
+
|
13
|
+
pub trait ConversionExt {
|
14
|
+
fn limit(self) -> HttpRequest;
|
15
|
+
}
|
16
|
+
|
17
|
+
impl ConversionExt for Request<Incoming> {
|
18
|
+
fn limit(self) -> HttpRequest {
|
19
|
+
let (parts, body) = self.into_parts();
|
20
|
+
Request::from_parts(parts, SizeLimitedIncoming::new(body))
|
21
|
+
}
|
22
|
+
}
|
23
|
+
|
24
|
+
pub trait RequestExt {
|
25
|
+
fn content_type(&self) -> Option<&str>;
|
26
|
+
fn accept(&self) -> Option<&str>;
|
27
|
+
fn header(&self, header_name: &str) -> Option<&str>;
|
28
|
+
fn query_param(&self, query_name: &str) -> Option<&str>;
|
29
|
+
}
|
30
|
+
|
31
|
+
pub trait PathExt {
|
32
|
+
fn no_trailing_slash(&self) -> &str;
|
33
|
+
}
|
34
|
+
|
35
|
+
#[derive(Debug, Clone)]
|
36
|
+
pub enum ResponseFormat {
|
37
|
+
JSON,
|
38
|
+
HTML,
|
39
|
+
TEXT,
|
40
|
+
UNKNOWN,
|
41
|
+
}
|
42
|
+
|
43
|
+
#[derive(Debug, Clone, Default)]
|
44
|
+
pub struct SupportedEncodingSet {
|
45
|
+
pub zstd: bool,
|
46
|
+
pub br: bool,
|
47
|
+
pub deflate: bool,
|
48
|
+
pub gzip: bool,
|
49
|
+
}
|
50
|
+
|
51
|
+
impl From<Option<&str>> for ResponseFormat {
|
52
|
+
fn from(value: Option<&str>) -> Self {
|
53
|
+
match value {
|
54
|
+
Some("application/json") => ResponseFormat::JSON,
|
55
|
+
Some("text/html") => ResponseFormat::HTML,
|
56
|
+
Some("text/plain") => ResponseFormat::TEXT,
|
57
|
+
_ => ResponseFormat::UNKNOWN,
|
58
|
+
}
|
59
|
+
}
|
60
|
+
}
|
61
|
+
|
62
|
+
impl PathExt for str {
|
63
|
+
fn no_trailing_slash(&self) -> &str {
|
64
|
+
if self == "/" {
|
65
|
+
self
|
66
|
+
} else {
|
67
|
+
self.trim_end_matches("/")
|
68
|
+
}
|
69
|
+
}
|
70
|
+
}
|
71
|
+
|
72
|
+
impl RequestExt for HttpRequest {
|
73
|
+
fn content_type(&self) -> Option<&str> {
|
74
|
+
self.headers()
|
75
|
+
.get("content-type")
|
76
|
+
.map(|hv| hv.to_str().unwrap_or(""))
|
77
|
+
}
|
78
|
+
|
79
|
+
fn accept(&self) -> Option<&str> {
|
80
|
+
self.headers()
|
81
|
+
.get("accept")
|
82
|
+
.map(|hv| hv.to_str().unwrap_or(""))
|
83
|
+
}
|
84
|
+
|
85
|
+
fn header(&self, header_name: &str) -> Option<&str> {
|
86
|
+
self.headers()
|
87
|
+
.get(header_name)
|
88
|
+
.map(|hv| hv.to_str().unwrap_or(""))
|
89
|
+
}
|
90
|
+
|
91
|
+
fn query_param(&self, query_name: &str) -> Option<&str> {
|
92
|
+
self.uri()
|
93
|
+
.query()
|
94
|
+
.and_then(|query| query.split('&').find(|param| param.starts_with(query_name)))
|
95
|
+
.map(|param| param.split('=').nth(1).unwrap_or(""))
|
96
|
+
}
|
97
|
+
}
|
@@ -0,0 +1,105 @@
|
|
1
|
+
use pin_project::pin_project;
|
2
|
+
use tokio::net::{TcpStream, UnixStream};
|
3
|
+
use tokio_rustls::server::TlsStream;
|
4
|
+
|
5
|
+
use std::os::unix::io::{AsRawFd, RawFd};
|
6
|
+
use std::pin::Pin;
|
7
|
+
use std::task::{Context, Poll};
|
8
|
+
use tokio::io::{AsyncRead, AsyncWrite};
|
9
|
+
|
10
|
+
use super::binds::listener::SockAddr;
|
11
|
+
|
12
|
+
#[pin_project(project = IoStreamEnumProj)]
|
13
|
+
pub enum IoStream {
|
14
|
+
Tcp {
|
15
|
+
#[pin]
|
16
|
+
stream: TcpStream,
|
17
|
+
addr: SockAddr,
|
18
|
+
},
|
19
|
+
TcpTls {
|
20
|
+
#[pin]
|
21
|
+
stream: TlsStream<TcpStream>,
|
22
|
+
addr: SockAddr,
|
23
|
+
},
|
24
|
+
Unix {
|
25
|
+
#[pin]
|
26
|
+
stream: UnixStream,
|
27
|
+
addr: SockAddr,
|
28
|
+
},
|
29
|
+
UnixTls {
|
30
|
+
#[pin]
|
31
|
+
stream: TlsStream<UnixStream>,
|
32
|
+
addr: SockAddr,
|
33
|
+
},
|
34
|
+
}
|
35
|
+
|
36
|
+
impl IoStream {
|
37
|
+
pub fn addr(&self) -> SockAddr {
|
38
|
+
match self {
|
39
|
+
IoStream::Tcp { addr, .. } => addr.clone(),
|
40
|
+
IoStream::TcpTls { addr, .. } => addr.clone(),
|
41
|
+
IoStream::Unix { addr, .. } => addr.clone(),
|
42
|
+
IoStream::UnixTls { addr, .. } => addr.clone(),
|
43
|
+
}
|
44
|
+
}
|
45
|
+
}
|
46
|
+
|
47
|
+
impl AsyncRead for IoStream {
|
48
|
+
fn poll_read(
|
49
|
+
self: Pin<&mut Self>,
|
50
|
+
cx: &mut Context<'_>,
|
51
|
+
buf: &mut tokio::io::ReadBuf<'_>,
|
52
|
+
) -> Poll<std::io::Result<()>> {
|
53
|
+
match self.project() {
|
54
|
+
IoStreamEnumProj::Tcp { stream, .. } => stream.poll_read(cx, buf),
|
55
|
+
IoStreamEnumProj::TcpTls { stream, .. } => stream.poll_read(cx, buf),
|
56
|
+
IoStreamEnumProj::Unix { stream, .. } => stream.poll_read(cx, buf),
|
57
|
+
IoStreamEnumProj::UnixTls { stream, .. } => stream.poll_read(cx, buf),
|
58
|
+
}
|
59
|
+
}
|
60
|
+
}
|
61
|
+
|
62
|
+
impl AsyncWrite for IoStream {
|
63
|
+
fn poll_write(
|
64
|
+
self: Pin<&mut Self>,
|
65
|
+
cx: &mut Context<'_>,
|
66
|
+
buf: &[u8],
|
67
|
+
) -> Poll<std::io::Result<usize>> {
|
68
|
+
match self.project() {
|
69
|
+
IoStreamEnumProj::Tcp { stream, .. } => stream.poll_write(cx, buf),
|
70
|
+
IoStreamEnumProj::TcpTls { stream, .. } => stream.poll_write(cx, buf),
|
71
|
+
IoStreamEnumProj::Unix { stream, .. } => stream.poll_write(cx, buf),
|
72
|
+
IoStreamEnumProj::UnixTls { stream, .. } => stream.poll_write(cx, buf),
|
73
|
+
}
|
74
|
+
}
|
75
|
+
|
76
|
+
fn poll_flush(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<std::io::Result<()>> {
|
77
|
+
match self.project() {
|
78
|
+
IoStreamEnumProj::Tcp { stream, .. } => stream.poll_flush(cx),
|
79
|
+
IoStreamEnumProj::TcpTls { stream, .. } => stream.poll_flush(cx),
|
80
|
+
IoStreamEnumProj::Unix { stream, .. } => stream.poll_flush(cx),
|
81
|
+
IoStreamEnumProj::UnixTls { stream, .. } => stream.poll_flush(cx),
|
82
|
+
}
|
83
|
+
}
|
84
|
+
|
85
|
+
fn poll_shutdown(self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<std::io::Result<()>> {
|
86
|
+
match self.project() {
|
87
|
+
IoStreamEnumProj::Tcp { stream, .. } => stream.poll_shutdown(cx),
|
88
|
+
IoStreamEnumProj::TcpTls { stream, .. } => stream.poll_shutdown(cx),
|
89
|
+
IoStreamEnumProj::Unix { stream, .. } => stream.poll_shutdown(cx),
|
90
|
+
IoStreamEnumProj::UnixTls { stream, .. } => stream.poll_shutdown(cx),
|
91
|
+
}
|
92
|
+
}
|
93
|
+
}
|
94
|
+
|
95
|
+
impl AsRawFd for IoStream {
|
96
|
+
fn as_raw_fd(&self) -> RawFd {
|
97
|
+
// For immutable access, we can simply pattern-match on self.
|
98
|
+
match self {
|
99
|
+
IoStream::Tcp { stream, .. } => stream.as_raw_fd(),
|
100
|
+
IoStream::TcpTls { stream, .. } => stream.get_ref().0.as_raw_fd(),
|
101
|
+
IoStream::Unix { stream, .. } => stream.as_raw_fd(),
|
102
|
+
IoStream::UnixTls { stream, .. } => stream.get_ref().0.as_raw_fd(),
|
103
|
+
}
|
104
|
+
}
|
105
|
+
}
|
@@ -0,0 +1,165 @@
|
|
1
|
+
use crate::{
|
2
|
+
server::http_message_types::{HttpRequest, HttpResponse},
|
3
|
+
services::itsi_http_service::HttpRequestContext,
|
4
|
+
};
|
5
|
+
|
6
|
+
use super::middlewares::*;
|
7
|
+
|
8
|
+
use async_trait::async_trait;
|
9
|
+
use either::Either;
|
10
|
+
use magnus::error::Result;
|
11
|
+
use std::cmp::Ordering;
|
12
|
+
|
13
|
+
#[derive(Debug)]
|
14
|
+
pub enum Middleware {
|
15
|
+
AllowList(AllowList),
|
16
|
+
AuthAPIKey(AuthAPIKey),
|
17
|
+
AuthBasic(AuthBasic),
|
18
|
+
AuthJwt(Box<AuthJwt>),
|
19
|
+
CacheControl(CacheControl),
|
20
|
+
Compression(Compression),
|
21
|
+
Cors(Box<Cors>),
|
22
|
+
DenyList(DenyList),
|
23
|
+
ETag(ETag),
|
24
|
+
IntrusionProtection(IntrusionProtection),
|
25
|
+
LogRequests(LogRequests),
|
26
|
+
MaxBody(MaxBody),
|
27
|
+
Proxy(Proxy),
|
28
|
+
RateLimit(RateLimit),
|
29
|
+
Redirect(Redirect),
|
30
|
+
RequestHeaders(RequestHeaders),
|
31
|
+
ResponseHeaders(ResponseHeaders),
|
32
|
+
RubyApp(RubyApp),
|
33
|
+
StaticAssets(StaticAssets),
|
34
|
+
StaticResponse(StaticResponse),
|
35
|
+
}
|
36
|
+
|
37
|
+
#[async_trait]
|
38
|
+
impl MiddlewareLayer for Middleware {
|
39
|
+
/// Called just once, to initialize the middleware state.
|
40
|
+
async fn initialize(&self) -> Result<()> {
|
41
|
+
match self {
|
42
|
+
Middleware::DenyList(filter) => filter.initialize().await,
|
43
|
+
Middleware::AllowList(filter) => filter.initialize().await,
|
44
|
+
Middleware::AuthBasic(filter) => filter.initialize().await,
|
45
|
+
Middleware::AuthJwt(filter) => filter.initialize().await,
|
46
|
+
Middleware::AuthAPIKey(filter) => filter.initialize().await,
|
47
|
+
Middleware::IntrusionProtection(filter) => filter.initialize().await,
|
48
|
+
Middleware::MaxBody(filter) => filter.initialize().await,
|
49
|
+
Middleware::RateLimit(filter) => filter.initialize().await,
|
50
|
+
Middleware::RequestHeaders(filter) => filter.initialize().await,
|
51
|
+
Middleware::ResponseHeaders(filter) => filter.initialize().await,
|
52
|
+
Middleware::CacheControl(filter) => filter.initialize().await,
|
53
|
+
Middleware::Cors(filter) => filter.initialize().await,
|
54
|
+
Middleware::ETag(filter) => filter.initialize().await,
|
55
|
+
Middleware::StaticAssets(filter) => filter.initialize().await,
|
56
|
+
Middleware::StaticResponse(filter) => filter.initialize().await,
|
57
|
+
Middleware::Compression(filter) => filter.initialize().await,
|
58
|
+
Middleware::LogRequests(filter) => filter.initialize().await,
|
59
|
+
Middleware::Redirect(filter) => filter.initialize().await,
|
60
|
+
Middleware::Proxy(filter) => filter.initialize().await,
|
61
|
+
Middleware::RubyApp(filter) => filter.initialize().await,
|
62
|
+
}
|
63
|
+
}
|
64
|
+
|
65
|
+
async fn before(
|
66
|
+
&self,
|
67
|
+
req: HttpRequest,
|
68
|
+
context: &mut HttpRequestContext,
|
69
|
+
) -> Result<Either<HttpRequest, HttpResponse>> {
|
70
|
+
match self {
|
71
|
+
Middleware::DenyList(filter) => filter.before(req, context).await,
|
72
|
+
Middleware::AllowList(filter) => filter.before(req, context).await,
|
73
|
+
Middleware::AuthBasic(filter) => filter.before(req, context).await,
|
74
|
+
Middleware::AuthJwt(filter) => filter.before(req, context).await,
|
75
|
+
Middleware::AuthAPIKey(filter) => filter.before(req, context).await,
|
76
|
+
Middleware::IntrusionProtection(filter) => filter.before(req, context).await,
|
77
|
+
Middleware::MaxBody(filter) => filter.before(req, context).await,
|
78
|
+
Middleware::RequestHeaders(filter) => filter.before(req, context).await,
|
79
|
+
Middleware::ResponseHeaders(filter) => filter.before(req, context).await,
|
80
|
+
Middleware::RateLimit(filter) => filter.before(req, context).await,
|
81
|
+
Middleware::CacheControl(filter) => filter.before(req, context).await,
|
82
|
+
Middleware::Cors(filter) => filter.before(req, context).await,
|
83
|
+
Middleware::ETag(filter) => filter.before(req, context).await,
|
84
|
+
Middleware::StaticAssets(filter) => filter.before(req, context).await,
|
85
|
+
Middleware::StaticResponse(filter) => filter.before(req, context).await,
|
86
|
+
Middleware::Compression(filter) => filter.before(req, context).await,
|
87
|
+
Middleware::LogRequests(filter) => filter.before(req, context).await,
|
88
|
+
Middleware::Redirect(filter) => filter.before(req, context).await,
|
89
|
+
Middleware::Proxy(filter) => filter.before(req, context).await,
|
90
|
+
Middleware::RubyApp(filter) => filter.before(req, context).await,
|
91
|
+
}
|
92
|
+
}
|
93
|
+
|
94
|
+
async fn after(&self, res: HttpResponse, context: &mut HttpRequestContext) -> HttpResponse {
|
95
|
+
match self {
|
96
|
+
Middleware::DenyList(filter) => filter.after(res, context).await,
|
97
|
+
Middleware::AllowList(filter) => filter.after(res, context).await,
|
98
|
+
Middleware::AuthBasic(filter) => filter.after(res, context).await,
|
99
|
+
Middleware::AuthJwt(filter) => filter.after(res, context).await,
|
100
|
+
Middleware::AuthAPIKey(filter) => filter.after(res, context).await,
|
101
|
+
Middleware::IntrusionProtection(filter) => filter.after(res, context).await,
|
102
|
+
Middleware::MaxBody(filter) => filter.after(res, context).await,
|
103
|
+
Middleware::RateLimit(filter) => filter.after(res, context).await,
|
104
|
+
Middleware::RequestHeaders(filter) => filter.after(res, context).await,
|
105
|
+
Middleware::ResponseHeaders(filter) => filter.after(res, context).await,
|
106
|
+
Middleware::CacheControl(filter) => filter.after(res, context).await,
|
107
|
+
Middleware::Cors(filter) => filter.after(res, context).await,
|
108
|
+
Middleware::ETag(filter) => filter.after(res, context).await,
|
109
|
+
Middleware::StaticAssets(filter) => filter.after(res, context).await,
|
110
|
+
Middleware::StaticResponse(filter) => filter.after(res, context).await,
|
111
|
+
Middleware::Compression(filter) => filter.after(res, context).await,
|
112
|
+
Middleware::LogRequests(filter) => filter.after(res, context).await,
|
113
|
+
Middleware::Redirect(filter) => filter.after(res, context).await,
|
114
|
+
Middleware::Proxy(filter) => filter.after(res, context).await,
|
115
|
+
Middleware::RubyApp(filter) => filter.after(res, context).await,
|
116
|
+
}
|
117
|
+
}
|
118
|
+
}
|
119
|
+
|
120
|
+
impl Middleware {
|
121
|
+
fn variant_order(&self) -> usize {
|
122
|
+
match self {
|
123
|
+
Middleware::DenyList(_) => 0,
|
124
|
+
Middleware::AllowList(_) => 1,
|
125
|
+
Middleware::IntrusionProtection(_) => 2,
|
126
|
+
Middleware::Redirect(_) => 3,
|
127
|
+
Middleware::LogRequests(_) => 4,
|
128
|
+
Middleware::CacheControl(_) => 5,
|
129
|
+
Middleware::RequestHeaders(_) => 6,
|
130
|
+
Middleware::ResponseHeaders(_) => 7,
|
131
|
+
Middleware::MaxBody(_) => 8,
|
132
|
+
Middleware::AuthBasic(_) => 9,
|
133
|
+
Middleware::AuthJwt(_) => 10,
|
134
|
+
Middleware::AuthAPIKey(_) => 11,
|
135
|
+
Middleware::RateLimit(_) => 12,
|
136
|
+
Middleware::ETag(_) => 13,
|
137
|
+
Middleware::Compression(_) => 14,
|
138
|
+
Middleware::Proxy(_) => 15,
|
139
|
+
Middleware::Cors(_) => 16,
|
140
|
+
Middleware::StaticResponse(_) => 17,
|
141
|
+
Middleware::StaticAssets(_) => 18,
|
142
|
+
Middleware::RubyApp(_) => 19,
|
143
|
+
}
|
144
|
+
}
|
145
|
+
}
|
146
|
+
|
147
|
+
impl PartialEq for Middleware {
|
148
|
+
fn eq(&self, other: &Self) -> bool {
|
149
|
+
self.variant_order() == other.variant_order()
|
150
|
+
}
|
151
|
+
}
|
152
|
+
|
153
|
+
impl Eq for Middleware {}
|
154
|
+
|
155
|
+
impl PartialOrd for Middleware {
|
156
|
+
fn partial_cmp(&self, other: &Self) -> Option<Ordering> {
|
157
|
+
Some(self.variant_order().cmp(&other.variant_order()))
|
158
|
+
}
|
159
|
+
}
|
160
|
+
|
161
|
+
impl Ord for Middleware {
|
162
|
+
fn cmp(&self, other: &Self) -> Ordering {
|
163
|
+
self.variant_order().cmp(&other.variant_order())
|
164
|
+
}
|
165
|
+
}
|