spikard 0.3.6 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (113) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +21 -6
  3. data/ext/spikard_rb/Cargo.toml +2 -2
  4. data/lib/spikard/app.rb +33 -14
  5. data/lib/spikard/testing.rb +47 -12
  6. data/lib/spikard/version.rb +1 -1
  7. data/vendor/crates/spikard-bindings-shared/Cargo.toml +63 -0
  8. data/vendor/crates/spikard-bindings-shared/examples/config_extraction.rs +132 -0
  9. data/vendor/crates/spikard-bindings-shared/src/config_extractor.rs +752 -0
  10. data/vendor/crates/spikard-bindings-shared/src/conversion_traits.rs +194 -0
  11. data/vendor/crates/spikard-bindings-shared/src/di_traits.rs +246 -0
  12. data/vendor/crates/spikard-bindings-shared/src/error_response.rs +401 -0
  13. data/vendor/crates/spikard-bindings-shared/src/handler_base.rs +238 -0
  14. data/vendor/crates/spikard-bindings-shared/src/lib.rs +24 -0
  15. data/vendor/crates/spikard-bindings-shared/src/lifecycle_base.rs +292 -0
  16. data/vendor/crates/spikard-bindings-shared/src/lifecycle_executor.rs +616 -0
  17. data/vendor/crates/spikard-bindings-shared/src/response_builder.rs +305 -0
  18. data/vendor/crates/spikard-bindings-shared/src/test_client_base.rs +248 -0
  19. data/vendor/crates/spikard-bindings-shared/src/validation_helpers.rs +351 -0
  20. data/vendor/crates/spikard-bindings-shared/tests/comprehensive_coverage.rs +454 -0
  21. data/vendor/crates/spikard-bindings-shared/tests/error_response_edge_cases.rs +383 -0
  22. data/vendor/crates/spikard-bindings-shared/tests/handler_base_integration.rs +280 -0
  23. data/vendor/crates/spikard-core/Cargo.toml +4 -4
  24. data/vendor/crates/spikard-core/src/debug.rs +64 -0
  25. data/vendor/crates/spikard-core/src/di/container.rs +3 -27
  26. data/vendor/crates/spikard-core/src/di/factory.rs +1 -5
  27. data/vendor/crates/spikard-core/src/di/graph.rs +8 -47
  28. data/vendor/crates/spikard-core/src/di/mod.rs +1 -1
  29. data/vendor/crates/spikard-core/src/di/resolved.rs +1 -7
  30. data/vendor/crates/spikard-core/src/di/value.rs +2 -4
  31. data/vendor/crates/spikard-core/src/errors.rs +30 -0
  32. data/vendor/crates/spikard-core/src/http.rs +262 -0
  33. data/vendor/crates/spikard-core/src/lib.rs +1 -1
  34. data/vendor/crates/spikard-core/src/lifecycle.rs +764 -0
  35. data/vendor/crates/spikard-core/src/metadata.rs +389 -0
  36. data/vendor/crates/spikard-core/src/parameters.rs +1962 -159
  37. data/vendor/crates/spikard-core/src/problem.rs +34 -0
  38. data/vendor/crates/spikard-core/src/request_data.rs +966 -1
  39. data/vendor/crates/spikard-core/src/router.rs +263 -2
  40. data/vendor/crates/spikard-core/src/validation/error_mapper.rs +688 -0
  41. data/vendor/crates/spikard-core/src/{validation.rs → validation/mod.rs} +26 -268
  42. data/vendor/crates/spikard-http/Cargo.toml +12 -16
  43. data/vendor/crates/spikard-http/examples/sse-notifications.rs +148 -0
  44. data/vendor/crates/spikard-http/examples/websocket-chat.rs +92 -0
  45. data/vendor/crates/spikard-http/src/auth.rs +65 -16
  46. data/vendor/crates/spikard-http/src/background.rs +1614 -3
  47. data/vendor/crates/spikard-http/src/cors.rs +515 -0
  48. data/vendor/crates/spikard-http/src/debug.rs +65 -0
  49. data/vendor/crates/spikard-http/src/di_handler.rs +1322 -77
  50. data/vendor/crates/spikard-http/src/handler_response.rs +711 -0
  51. data/vendor/crates/spikard-http/src/handler_trait.rs +607 -5
  52. data/vendor/crates/spikard-http/src/handler_trait_tests.rs +6 -0
  53. data/vendor/crates/spikard-http/src/lib.rs +33 -28
  54. data/vendor/crates/spikard-http/src/lifecycle/adapter.rs +81 -0
  55. data/vendor/crates/spikard-http/src/lifecycle.rs +765 -0
  56. data/vendor/crates/spikard-http/src/middleware/mod.rs +372 -117
  57. data/vendor/crates/spikard-http/src/middleware/multipart.rs +836 -10
  58. data/vendor/crates/spikard-http/src/middleware/urlencoded.rs +409 -43
  59. data/vendor/crates/spikard-http/src/middleware/validation.rs +513 -65
  60. data/vendor/crates/spikard-http/src/openapi/parameter_extraction.rs +345 -0
  61. data/vendor/crates/spikard-http/src/openapi/schema_conversion.rs +1055 -0
  62. data/vendor/crates/spikard-http/src/openapi/spec_generation.rs +473 -3
  63. data/vendor/crates/spikard-http/src/query_parser.rs +455 -31
  64. data/vendor/crates/spikard-http/src/response.rs +321 -0
  65. data/vendor/crates/spikard-http/src/server/handler.rs +1572 -9
  66. data/vendor/crates/spikard-http/src/server/lifecycle_execution.rs +136 -0
  67. data/vendor/crates/spikard-http/src/server/mod.rs +875 -178
  68. data/vendor/crates/spikard-http/src/server/request_extraction.rs +674 -23
  69. data/vendor/crates/spikard-http/src/server/routing_factory.rs +599 -0
  70. data/vendor/crates/spikard-http/src/sse.rs +983 -21
  71. data/vendor/crates/spikard-http/src/testing/form.rs +38 -0
  72. data/vendor/crates/spikard-http/src/testing/test_client.rs +0 -2
  73. data/vendor/crates/spikard-http/src/testing.rs +7 -7
  74. data/vendor/crates/spikard-http/src/websocket.rs +1055 -4
  75. data/vendor/crates/spikard-http/tests/background_behavior.rs +832 -0
  76. data/vendor/crates/spikard-http/tests/common/handlers.rs +309 -0
  77. data/vendor/crates/spikard-http/tests/common/mod.rs +26 -0
  78. data/vendor/crates/spikard-http/tests/di_integration.rs +192 -0
  79. data/vendor/crates/spikard-http/tests/doc_snippets.rs +5 -0
  80. data/vendor/crates/spikard-http/tests/lifecycle_execution.rs +1093 -0
  81. data/vendor/crates/spikard-http/tests/multipart_behavior.rs +656 -0
  82. data/vendor/crates/spikard-http/tests/server_config_builder.rs +314 -0
  83. data/vendor/crates/spikard-http/tests/sse_behavior.rs +620 -0
  84. data/vendor/crates/spikard-http/tests/websocket_behavior.rs +663 -0
  85. data/vendor/crates/spikard-rb/Cargo.toml +10 -4
  86. data/vendor/crates/spikard-rb/build.rs +196 -5
  87. data/vendor/crates/spikard-rb/src/config/mod.rs +5 -0
  88. data/vendor/crates/spikard-rb/src/{config.rs → config/server_config.rs} +100 -109
  89. data/vendor/crates/spikard-rb/src/conversion.rs +121 -20
  90. data/vendor/crates/spikard-rb/src/di/builder.rs +100 -0
  91. data/vendor/crates/spikard-rb/src/{di.rs → di/mod.rs} +12 -46
  92. data/vendor/crates/spikard-rb/src/handler.rs +100 -107
  93. data/vendor/crates/spikard-rb/src/integration/mod.rs +3 -0
  94. data/vendor/crates/spikard-rb/src/lib.rs +467 -1428
  95. data/vendor/crates/spikard-rb/src/lifecycle.rs +1 -0
  96. data/vendor/crates/spikard-rb/src/metadata/mod.rs +5 -0
  97. data/vendor/crates/spikard-rb/src/metadata/route_extraction.rs +447 -0
  98. data/vendor/crates/spikard-rb/src/runtime/mod.rs +5 -0
  99. data/vendor/crates/spikard-rb/src/runtime/server_runner.rs +324 -0
  100. data/vendor/crates/spikard-rb/src/server.rs +47 -22
  101. data/vendor/crates/spikard-rb/src/{test_client.rs → testing/client.rs} +187 -40
  102. data/vendor/crates/spikard-rb/src/testing/mod.rs +7 -0
  103. data/vendor/crates/spikard-rb/src/testing/websocket.rs +635 -0
  104. data/vendor/crates/spikard-rb/src/websocket.rs +178 -37
  105. metadata +46 -13
  106. data/vendor/crates/spikard-http/src/parameters.rs +0 -1
  107. data/vendor/crates/spikard-http/src/problem.rs +0 -1
  108. data/vendor/crates/spikard-http/src/router.rs +0 -1
  109. data/vendor/crates/spikard-http/src/schema_registry.rs +0 -1
  110. data/vendor/crates/spikard-http/src/type_hints.rs +0 -1
  111. data/vendor/crates/spikard-http/src/validation.rs +0 -1
  112. data/vendor/crates/spikard-rb/src/test_websocket.rs +0 -221
  113. /data/vendor/crates/spikard-rb/src/{test_sse.rs → testing/sse.rs} +0 -0
@@ -9,14 +9,20 @@ pub mod validation;
9
9
 
10
10
  use axum::{
11
11
  body::Body,
12
+ extract::State,
12
13
  extract::{FromRequest, Multipart, Request},
13
14
  http::StatusCode,
14
15
  middleware::Next,
15
16
  response::{IntoResponse, Response},
16
17
  };
17
18
  use serde_json::json;
18
- use std::collections::HashMap;
19
- use std::sync::Arc;
19
+ use std::cell::RefCell;
20
+ use std::num::NonZeroUsize;
21
+
22
+ thread_local! {
23
+ static URLENCODED_JSON_CACHE: RefCell<lru::LruCache<bytes::Bytes, bytes::Bytes>> =
24
+ RefCell::new(lru::LruCache::new(NonZeroUsize::new(256).expect("non-zero cache size")));
25
+ }
20
26
 
21
27
  /// Route information for middleware validation
22
28
  #[derive(Debug, Clone)]
@@ -25,8 +31,12 @@ pub struct RouteInfo {
25
31
  pub expects_json_body: bool,
26
32
  }
27
33
 
28
- /// Registry of route metadata indexed by (method, path)
29
- pub type RouteRegistry = Arc<HashMap<(String, String), RouteInfo>>;
34
+ /// Request extension carrying the already-collected request body.
35
+ ///
36
+ /// This avoids double-reading the body stream: middleware can read once for
37
+ /// content-length / syntax checks, and request extraction can reuse the bytes.
38
+ #[derive(Debug, Clone)]
39
+ pub struct PreReadBody(pub bytes::Bytes);
30
40
 
31
41
  /// Middleware to validate Content-Type headers and related requirements
32
42
  ///
@@ -50,7 +60,7 @@ pub type RouteRegistry = Arc<HashMap<(String, String), RouteInfo>>;
50
60
  /// # Behavior
51
61
  ///
52
62
  /// For request methods POST, PUT, and PATCH:
53
- /// 1. Checks if the route expects a JSON body (via `RouteRegistry`)
63
+ /// 1. Checks if the route expects a JSON body (via route state)
54
64
  /// 2. Validates Content-Type headers based on route configuration
55
65
  /// 3. Parses the request body according to Content-Type:
56
66
  /// - `multipart/form-data` → JSON (form fields as object properties)
@@ -76,99 +86,107 @@ pub type RouteRegistry = Arc<HashMap<(String, String), RouteInfo>>;
76
86
  /// // This is typically used as middleware in an Axum router:
77
87
  /// // router.layer(axum::middleware::from_fn(validate_content_type_middleware))
78
88
  /// ```
79
- pub async fn validate_content_type_middleware(request: Request, next: Next) -> Result<Response, Response> {
89
+ ///
90
+ /// Coverage: Tested via integration tests (multipart and form parsing tested end-to-end)
91
+ #[cfg(not(tarpaulin_include))]
92
+ pub async fn validate_content_type_middleware(
93
+ State(route_info): State<RouteInfo>,
94
+ request: Request,
95
+ next: Next,
96
+ ) -> Result<Response, Response> {
80
97
  use axum::body::to_bytes;
81
98
  use axum::http::Request as HttpRequest;
82
99
 
83
- let (parts, body) = request.into_parts();
100
+ let (mut parts, body) = request.into_parts();
84
101
  let headers = &parts.headers;
85
102
 
86
- let route_info = parts.extensions.get::<RouteRegistry>().and_then(|registry| {
87
- let method = parts.method.as_str();
88
- let path = parts.uri.path();
89
- registry.get(&(method.to_string(), path.to_string())).cloned()
90
- });
91
-
92
103
  let method = &parts.method;
93
104
  if method == axum::http::Method::POST || method == axum::http::Method::PUT || method == axum::http::Method::PATCH {
94
- if let Some(info) = &route_info
95
- && info.expects_json_body
96
- {
105
+ if route_info.expects_json_body {
97
106
  validation::validate_json_content_type(headers)?;
98
107
  }
99
108
 
100
109
  validation::validate_content_type_headers(headers, 0)?;
101
110
 
102
- let (final_parts, final_body) = if let Some(content_type) = headers.get(axum::http::header::CONTENT_TYPE) {
103
- if let Ok(content_type_str) = content_type.to_str() {
104
- let parsed_mime = content_type_str.parse::<mime::Mime>().ok();
111
+ let out_bytes: bytes::Bytes = if let Some(content_type) = headers.get(axum::http::header::CONTENT_TYPE) {
112
+ // `validate_content_type_headers()` already enforced basic Content-Type validity for us.
113
+ let is_multipart = validation::is_multipart_form_data(content_type);
114
+ let is_form_urlencoded = validation::is_form_urlencoded(content_type);
105
115
 
106
- let is_multipart = parsed_mime
107
- .as_ref()
108
- .map(|mime| mime.type_() == mime::MULTIPART && mime.subtype() == "form-data")
109
- .unwrap_or(false);
110
-
111
- let is_form_urlencoded = parsed_mime
112
- .as_ref()
113
- .map(|mime| mime.type_() == mime::APPLICATION && mime.subtype() == "x-www-form-urlencoded")
114
- .unwrap_or(false);
115
-
116
- if is_multipart {
117
- let mut response_headers = parts.headers.clone();
116
+ if is_multipart {
117
+ let body_bytes = match to_bytes(body, usize::MAX).await {
118
+ Ok(bytes) => bytes,
119
+ Err(_) => {
120
+ let error_body = json!({
121
+ "error": "Failed to read request body"
122
+ });
123
+ return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
124
+ }
125
+ };
118
126
 
119
- let request = HttpRequest::from_parts(parts, body);
120
- let multipart = match Multipart::from_request(request, &()).await {
121
- Ok(mp) => mp,
122
- Err(e) => {
123
- let error_body = json!({
124
- "error": format!("Failed to parse multipart data: {}", e)
125
- });
126
- return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
127
- }
128
- };
127
+ validation::validate_content_length(headers, body_bytes.len())?;
129
128
 
130
- let json_body = match multipart::parse_multipart_to_json(multipart).await {
131
- Ok(json) => json,
132
- Err(e) => {
133
- let error_body = json!({
134
- "error": format!("Failed to process multipart data: {}", e)
135
- });
136
- return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
137
- }
138
- };
129
+ let mut parse_request = HttpRequest::new(Body::from(body_bytes));
130
+ *parse_request.headers_mut() = parts.headers.clone();
139
131
 
140
- let json_bytes = match serde_json::to_vec(&json_body) {
141
- Ok(bytes) => bytes,
142
- Err(e) => {
143
- let error_body = json!({
144
- "error": format!("Failed to serialize multipart data to JSON: {}", e)
145
- });
146
- return Err((StatusCode::INTERNAL_SERVER_ERROR, axum::Json(error_body)).into_response());
147
- }
148
- };
132
+ let multipart = match Multipart::from_request(parse_request, &()).await {
133
+ Ok(mp) => mp,
134
+ Err(e) => {
135
+ let error_body = json!({
136
+ "error": format!("Failed to parse multipart data: {}", e)
137
+ });
138
+ return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
139
+ }
140
+ };
149
141
 
150
- response_headers.insert(
151
- axum::http::header::CONTENT_TYPE,
152
- axum::http::HeaderValue::from_static("application/json"),
153
- );
142
+ let json_body = match multipart::parse_multipart_to_json(multipart).await {
143
+ Ok(json) => json,
144
+ Err(e) => {
145
+ let error_body = json!({
146
+ "error": format!("Failed to process multipart data: {}", e)
147
+ });
148
+ return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
149
+ }
150
+ };
154
151
 
155
- let mut new_request = axum::http::Request::new(Body::from(json_bytes));
156
- *new_request.headers_mut() = response_headers;
152
+ let json_bytes = match serde_json::to_vec(&json_body) {
153
+ Ok(bytes) => bytes,
154
+ Err(e) => {
155
+ let error_body = json!({
156
+ "error": format!("Failed to serialize multipart data to JSON: {}", e)
157
+ });
158
+ return Err((StatusCode::INTERNAL_SERVER_ERROR, axum::Json(error_body)).into_response());
159
+ }
160
+ };
157
161
 
158
- return Ok(next.run(new_request).await);
159
- } else if is_form_urlencoded {
160
- let body_bytes = match to_bytes(body, usize::MAX).await {
161
- Ok(bytes) => bytes,
162
- Err(_) => {
163
- let error_body = json!({
164
- "error": "Failed to read request body"
165
- });
166
- return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
167
- }
168
- };
162
+ parts.headers.insert(
163
+ axum::http::header::CONTENT_TYPE,
164
+ axum::http::HeaderValue::from_static("application/json"),
165
+ );
166
+ if let Ok(value) = axum::http::HeaderValue::from_str(&json_bytes.len().to_string()) {
167
+ parts.headers.insert(axum::http::header::CONTENT_LENGTH, value);
168
+ }
169
+ bytes::Bytes::from(json_bytes)
170
+ } else if is_form_urlencoded {
171
+ let body_bytes = match to_bytes(body, usize::MAX).await {
172
+ Ok(bytes) => bytes,
173
+ Err(_) => {
174
+ let error_body = json!({
175
+ "error": "Failed to read request body"
176
+ });
177
+ return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
178
+ }
179
+ };
169
180
 
170
- validation::validate_content_length(headers, body_bytes.len())?;
181
+ validation::validate_content_length(headers, body_bytes.len())?;
171
182
 
183
+ parts.headers.insert(
184
+ axum::http::header::CONTENT_TYPE,
185
+ axum::http::HeaderValue::from_static("application/json"),
186
+ );
187
+ if let Some(cached) = URLENCODED_JSON_CACHE.with(|cache| cache.borrow_mut().get(&body_bytes).cloned()) {
188
+ cached
189
+ } else {
172
190
  let json_body = if body_bytes.is_empty() {
173
191
  serde_json::json!({})
174
192
  } else {
@@ -193,42 +211,11 @@ pub async fn validate_content_type_middleware(request: Request, next: Next) -> R
193
211
  }
194
212
  };
195
213
 
196
- let mut new_parts = parts;
197
- new_parts.headers.insert(
198
- axum::http::header::CONTENT_TYPE,
199
- axum::http::HeaderValue::from_static("application/json"),
200
- );
201
-
202
- (new_parts, Body::from(json_bytes))
203
- } else {
204
- let body_bytes = match to_bytes(body, usize::MAX).await {
205
- Ok(bytes) => bytes,
206
- Err(_) => {
207
- let error_body = json!({
208
- "error": "Failed to read request body"
209
- });
210
- return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
211
- }
212
- };
213
-
214
- validation::validate_content_length(headers, body_bytes.len())?;
215
-
216
- let is_json = parsed_mime
217
- .as_ref()
218
- .map(validation::is_json_content_type)
219
- .unwrap_or(false);
220
-
221
- if is_json
222
- && !body_bytes.is_empty()
223
- && serde_json::from_slice::<serde_json::Value>(&body_bytes).is_err()
224
- {
225
- let error_body = json!({
226
- "detail": "Invalid request format"
227
- });
228
- return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
229
- }
230
-
231
- (parts, Body::from(body_bytes))
214
+ let json_bytes = bytes::Bytes::from(json_bytes);
215
+ URLENCODED_JSON_CACHE.with(|cache| {
216
+ cache.borrow_mut().put(body_bytes.clone(), json_bytes.clone());
217
+ });
218
+ json_bytes
232
219
  }
233
220
  } else {
234
221
  let body_bytes = match to_bytes(body, usize::MAX).await {
@@ -243,7 +230,18 @@ pub async fn validate_content_type_middleware(request: Request, next: Next) -> R
243
230
 
244
231
  validation::validate_content_length(headers, body_bytes.len())?;
245
232
 
246
- (parts, Body::from(body_bytes))
233
+ let should_validate_json = route_info.expects_json_body && validation::is_json_like(content_type);
234
+ if should_validate_json
235
+ && !body_bytes.is_empty()
236
+ && serde_json::from_slice::<serde_json::Value>(&body_bytes).is_err()
237
+ {
238
+ let error_body = json!({
239
+ "detail": "Invalid request format"
240
+ });
241
+ return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
242
+ }
243
+
244
+ body_bytes
247
245
  }
248
246
  } else {
249
247
  let body_bytes = match to_bytes(body, usize::MAX).await {
@@ -257,11 +255,12 @@ pub async fn validate_content_type_middleware(request: Request, next: Next) -> R
257
255
  };
258
256
 
259
257
  validation::validate_content_length(headers, body_bytes.len())?;
260
-
261
- (parts, Body::from(body_bytes))
258
+ body_bytes
262
259
  };
263
260
 
264
- let request = HttpRequest::from_parts(final_parts, final_body);
261
+ parts.extensions.insert(PreReadBody(out_bytes));
262
+
263
+ let request = HttpRequest::from_parts(parts, Body::empty());
265
264
  Ok(next.run(request).await)
266
265
  } else {
267
266
  validation::validate_content_type_headers(headers, 0)?;
@@ -274,6 +273,8 @@ pub async fn validate_content_type_middleware(request: Request, next: Next) -> R
274
273
  #[cfg(test)]
275
274
  mod tests {
276
275
  use super::*;
276
+ use axum::body::Body;
277
+ use axum::http::Request;
277
278
 
278
279
  #[test]
279
280
  fn test_route_info_creation() {
@@ -282,4 +283,258 @@ mod tests {
282
283
  };
283
284
  assert!(info.expects_json_body);
284
285
  }
286
+
287
+ #[test]
288
+ fn test_route_info_expects_json_body_true() {
289
+ let info = RouteInfo {
290
+ expects_json_body: true,
291
+ };
292
+ assert_eq!(info.expects_json_body, true);
293
+ }
294
+
295
+ #[test]
296
+ fn test_route_info_expects_json_body_false() {
297
+ let info = RouteInfo {
298
+ expects_json_body: false,
299
+ };
300
+ assert_eq!(info.expects_json_body, false);
301
+ }
302
+
303
+ #[test]
304
+ fn test_request_with_zero_content_length() {
305
+ let headers = axum::http::HeaderMap::new();
306
+ assert!(headers.get(axum::http::header::CONTENT_LENGTH).is_none());
307
+ }
308
+
309
+ #[test]
310
+ fn test_request_with_very_large_content_length() {
311
+ let mut headers = axum::http::HeaderMap::new();
312
+ let large_size = usize::MAX - 1;
313
+ headers.insert(
314
+ axum::http::header::CONTENT_LENGTH,
315
+ axum::http::HeaderValue::from_str(&large_size.to_string()).unwrap(),
316
+ );
317
+ assert!(headers.get(axum::http::header::CONTENT_LENGTH).is_some());
318
+ }
319
+
320
+ #[test]
321
+ fn test_request_body_smaller_than_declared_length() {
322
+ let mut headers = axum::http::HeaderMap::new();
323
+ headers.insert(
324
+ axum::http::header::CONTENT_LENGTH,
325
+ axum::http::HeaderValue::from_static("1000"),
326
+ );
327
+ let result = super::validation::validate_content_length(&headers, 500);
328
+ assert!(
329
+ result.is_err(),
330
+ "Should reject when actual body is smaller than declared"
331
+ );
332
+ }
333
+
334
+ #[test]
335
+ fn test_request_body_larger_than_declared_length() {
336
+ let mut headers = axum::http::HeaderMap::new();
337
+ headers.insert(
338
+ axum::http::header::CONTENT_LENGTH,
339
+ axum::http::HeaderValue::from_static("500"),
340
+ );
341
+ let result = super::validation::validate_content_length(&headers, 1000);
342
+ assert!(
343
+ result.is_err(),
344
+ "Should reject when actual body is larger than declared"
345
+ );
346
+ }
347
+
348
+ #[test]
349
+ fn test_get_request_no_body_validation() {
350
+ let request = Request::builder()
351
+ .method(axum::http::Method::GET)
352
+ .uri("/api/users")
353
+ .body(Body::empty())
354
+ .unwrap();
355
+
356
+ let (parts, _body) = request.into_parts();
357
+ assert_eq!(parts.method, axum::http::Method::GET);
358
+ }
359
+
360
+ #[test]
361
+ fn test_delete_request_no_body_validation() {
362
+ let request = Request::builder()
363
+ .method(axum::http::Method::DELETE)
364
+ .uri("/api/users/1")
365
+ .body(Body::empty())
366
+ .unwrap();
367
+
368
+ let (parts, _body) = request.into_parts();
369
+ assert_eq!(parts.method, axum::http::Method::DELETE);
370
+ }
371
+
372
+ #[test]
373
+ fn test_post_request_requires_validation() {
374
+ let request = Request::builder()
375
+ .method(axum::http::Method::POST)
376
+ .uri("/api/users")
377
+ .body(Body::empty())
378
+ .unwrap();
379
+
380
+ let (parts, _body) = request.into_parts();
381
+ assert_eq!(parts.method, axum::http::Method::POST);
382
+ }
383
+
384
+ #[test]
385
+ fn test_put_request_requires_validation() {
386
+ let request = Request::builder()
387
+ .method(axum::http::Method::PUT)
388
+ .uri("/api/users/1")
389
+ .body(Body::empty())
390
+ .unwrap();
391
+
392
+ let (parts, _body) = request.into_parts();
393
+ assert_eq!(parts.method, axum::http::Method::PUT);
394
+ }
395
+
396
+ #[test]
397
+ fn test_patch_request_requires_validation() {
398
+ let request = Request::builder()
399
+ .method(axum::http::Method::PATCH)
400
+ .uri("/api/users/1")
401
+ .body(Body::empty())
402
+ .unwrap();
403
+
404
+ let (parts, _body) = request.into_parts();
405
+ assert_eq!(parts.method, axum::http::Method::PATCH);
406
+ }
407
+
408
+ #[test]
409
+ fn test_content_type_header_case_insensitive() {
410
+ let mut headers = axum::http::HeaderMap::new();
411
+ headers.insert(
412
+ axum::http::header::CONTENT_TYPE,
413
+ axum::http::HeaderValue::from_static("application/json"),
414
+ );
415
+
416
+ assert!(headers.get(axum::http::header::CONTENT_TYPE).is_some());
417
+ }
418
+
419
+ #[test]
420
+ fn test_content_length_header_case_insensitive() {
421
+ let mut headers = axum::http::HeaderMap::new();
422
+ headers.insert(
423
+ axum::http::header::CONTENT_LENGTH,
424
+ axum::http::HeaderValue::from_static("100"),
425
+ );
426
+
427
+ assert!(headers.get(axum::http::header::CONTENT_LENGTH).is_some());
428
+ }
429
+
430
+ #[test]
431
+ fn test_custom_headers_case_preserved() {
432
+ let mut headers = axum::http::HeaderMap::new();
433
+ let custom_header: axum::http::HeaderName = "X-Custom-Header".parse().unwrap();
434
+ headers.insert(custom_header.clone(), axum::http::HeaderValue::from_static("value"));
435
+
436
+ assert!(headers.get(&custom_header).is_some());
437
+ }
438
+
439
+ #[test]
440
+ fn test_multipart_boundary_minimal() {
441
+ let mut headers = axum::http::HeaderMap::new();
442
+ headers.insert(
443
+ axum::http::header::CONTENT_TYPE,
444
+ axum::http::HeaderValue::from_static("multipart/form-data; boundary=x"),
445
+ );
446
+
447
+ let result = super::validation::validate_content_type_headers(&headers, 0);
448
+ assert!(result.is_ok(), "Minimal boundary should be accepted");
449
+ }
450
+
451
+ #[test]
452
+ fn test_multipart_boundary_with_numbers() {
453
+ let mut headers = axum::http::HeaderMap::new();
454
+ headers.insert(
455
+ axum::http::header::CONTENT_TYPE,
456
+ axum::http::HeaderValue::from_static("multipart/form-data; boundary=boundary123456"),
457
+ );
458
+
459
+ let result = super::validation::validate_content_type_headers(&headers, 0);
460
+ assert!(result.is_ok());
461
+ }
462
+
463
+ #[test]
464
+ fn test_multipart_boundary_with_special_chars() {
465
+ let mut headers = axum::http::HeaderMap::new();
466
+ headers.insert(
467
+ axum::http::header::CONTENT_TYPE,
468
+ axum::http::HeaderValue::from_static("multipart/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW"),
469
+ );
470
+
471
+ let result = super::validation::validate_content_type_headers(&headers, 0);
472
+ assert!(result.is_ok(), "Boundary with dashes should be accepted");
473
+ }
474
+
475
+ #[test]
476
+ fn test_multipart_empty_boundary() {
477
+ let mut headers = axum::http::HeaderMap::new();
478
+ headers.insert(
479
+ axum::http::header::CONTENT_TYPE,
480
+ axum::http::HeaderValue::from_static("multipart/form-data; boundary="),
481
+ );
482
+
483
+ let _result = super::validation::validate_content_type_headers(&headers, 0);
484
+ assert!(headers.get(axum::http::header::CONTENT_TYPE).is_some());
485
+ }
486
+
487
+ #[test]
488
+ fn test_invalid_json_body_detection() {
489
+ let invalid_json = r#"{"invalid": json without quotes}"#;
490
+ let _mime = "application/json".parse::<mime::Mime>().unwrap();
491
+
492
+ let result = serde_json::from_str::<serde_json::Value>(invalid_json);
493
+ assert!(result.is_err(), "Invalid JSON should fail parsing");
494
+ }
495
+
496
+ #[test]
497
+ fn test_valid_json_parsing() {
498
+ let valid_json = r#"{"key": "value"}"#;
499
+ let result = serde_json::from_str::<serde_json::Value>(valid_json);
500
+ assert!(result.is_ok(), "Valid JSON should parse successfully");
501
+ }
502
+
503
+ #[test]
504
+ fn test_empty_json_object() {
505
+ let empty_json = "{}";
506
+ let result = serde_json::from_str::<serde_json::Value>(empty_json);
507
+ assert!(result.is_ok());
508
+ let value = result.unwrap();
509
+ assert!(value.is_object());
510
+ assert_eq!(value.as_object().unwrap().len(), 0);
511
+ }
512
+
513
+ #[test]
514
+ fn test_form_data_mime_type() {
515
+ let mime = "multipart/form-data; boundary=xyz".parse::<mime::Mime>().unwrap();
516
+ assert_eq!(mime.type_(), mime::MULTIPART);
517
+ assert_eq!(mime.subtype(), "form-data");
518
+ }
519
+
520
+ #[test]
521
+ fn test_form_urlencoded_mime_type() {
522
+ let mime = "application/x-www-form-urlencoded".parse::<mime::Mime>().unwrap();
523
+ assert_eq!(mime.type_(), mime::APPLICATION);
524
+ assert_eq!(mime.subtype(), "x-www-form-urlencoded");
525
+ }
526
+
527
+ #[test]
528
+ fn test_json_mime_type() {
529
+ let mime = "application/json".parse::<mime::Mime>().unwrap();
530
+ assert_eq!(mime.type_(), mime::APPLICATION);
531
+ assert_eq!(mime.subtype(), mime::JSON);
532
+ }
533
+
534
+ #[test]
535
+ fn test_text_plain_mime_type() {
536
+ let mime = "text/plain".parse::<mime::Mime>().unwrap();
537
+ assert_eq!(mime.type_(), mime::TEXT);
538
+ assert_eq!(mime.subtype(), "plain");
539
+ }
285
540
  }