spikard 0.3.6 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +21 -6
- data/ext/spikard_rb/Cargo.toml +2 -2
- data/lib/spikard/app.rb +33 -14
- data/lib/spikard/testing.rb +47 -12
- data/lib/spikard/version.rb +1 -1
- data/vendor/crates/spikard-bindings-shared/Cargo.toml +63 -0
- data/vendor/crates/spikard-bindings-shared/examples/config_extraction.rs +132 -0
- data/vendor/crates/spikard-bindings-shared/src/config_extractor.rs +752 -0
- data/vendor/crates/spikard-bindings-shared/src/conversion_traits.rs +194 -0
- data/vendor/crates/spikard-bindings-shared/src/di_traits.rs +246 -0
- data/vendor/crates/spikard-bindings-shared/src/error_response.rs +401 -0
- data/vendor/crates/spikard-bindings-shared/src/handler_base.rs +238 -0
- data/vendor/crates/spikard-bindings-shared/src/lib.rs +24 -0
- data/vendor/crates/spikard-bindings-shared/src/lifecycle_base.rs +292 -0
- data/vendor/crates/spikard-bindings-shared/src/lifecycle_executor.rs +616 -0
- data/vendor/crates/spikard-bindings-shared/src/response_builder.rs +305 -0
- data/vendor/crates/spikard-bindings-shared/src/test_client_base.rs +248 -0
- data/vendor/crates/spikard-bindings-shared/src/validation_helpers.rs +351 -0
- data/vendor/crates/spikard-bindings-shared/tests/comprehensive_coverage.rs +454 -0
- data/vendor/crates/spikard-bindings-shared/tests/error_response_edge_cases.rs +383 -0
- data/vendor/crates/spikard-bindings-shared/tests/handler_base_integration.rs +280 -0
- data/vendor/crates/spikard-core/Cargo.toml +4 -4
- data/vendor/crates/spikard-core/src/debug.rs +64 -0
- data/vendor/crates/spikard-core/src/di/container.rs +3 -27
- data/vendor/crates/spikard-core/src/di/factory.rs +1 -5
- data/vendor/crates/spikard-core/src/di/graph.rs +8 -47
- data/vendor/crates/spikard-core/src/di/mod.rs +1 -1
- data/vendor/crates/spikard-core/src/di/resolved.rs +1 -7
- data/vendor/crates/spikard-core/src/di/value.rs +2 -4
- data/vendor/crates/spikard-core/src/errors.rs +30 -0
- data/vendor/crates/spikard-core/src/http.rs +262 -0
- data/vendor/crates/spikard-core/src/lib.rs +1 -1
- data/vendor/crates/spikard-core/src/lifecycle.rs +764 -0
- data/vendor/crates/spikard-core/src/metadata.rs +389 -0
- data/vendor/crates/spikard-core/src/parameters.rs +1962 -159
- data/vendor/crates/spikard-core/src/problem.rs +34 -0
- data/vendor/crates/spikard-core/src/request_data.rs +966 -1
- data/vendor/crates/spikard-core/src/router.rs +263 -2
- data/vendor/crates/spikard-core/src/validation/error_mapper.rs +688 -0
- data/vendor/crates/spikard-core/src/{validation.rs → validation/mod.rs} +26 -268
- data/vendor/crates/spikard-http/Cargo.toml +12 -16
- data/vendor/crates/spikard-http/examples/sse-notifications.rs +148 -0
- data/vendor/crates/spikard-http/examples/websocket-chat.rs +92 -0
- data/vendor/crates/spikard-http/src/auth.rs +65 -16
- data/vendor/crates/spikard-http/src/background.rs +1614 -3
- data/vendor/crates/spikard-http/src/cors.rs +515 -0
- data/vendor/crates/spikard-http/src/debug.rs +65 -0
- data/vendor/crates/spikard-http/src/di_handler.rs +1322 -77
- data/vendor/crates/spikard-http/src/handler_response.rs +711 -0
- data/vendor/crates/spikard-http/src/handler_trait.rs +607 -5
- data/vendor/crates/spikard-http/src/handler_trait_tests.rs +6 -0
- data/vendor/crates/spikard-http/src/lib.rs +33 -28
- data/vendor/crates/spikard-http/src/lifecycle/adapter.rs +81 -0
- data/vendor/crates/spikard-http/src/lifecycle.rs +765 -0
- data/vendor/crates/spikard-http/src/middleware/mod.rs +372 -117
- data/vendor/crates/spikard-http/src/middleware/multipart.rs +836 -10
- data/vendor/crates/spikard-http/src/middleware/urlencoded.rs +409 -43
- data/vendor/crates/spikard-http/src/middleware/validation.rs +513 -65
- data/vendor/crates/spikard-http/src/openapi/parameter_extraction.rs +345 -0
- data/vendor/crates/spikard-http/src/openapi/schema_conversion.rs +1055 -0
- data/vendor/crates/spikard-http/src/openapi/spec_generation.rs +473 -3
- data/vendor/crates/spikard-http/src/query_parser.rs +455 -31
- data/vendor/crates/spikard-http/src/response.rs +321 -0
- data/vendor/crates/spikard-http/src/server/handler.rs +1572 -9
- data/vendor/crates/spikard-http/src/server/lifecycle_execution.rs +136 -0
- data/vendor/crates/spikard-http/src/server/mod.rs +875 -178
- data/vendor/crates/spikard-http/src/server/request_extraction.rs +674 -23
- data/vendor/crates/spikard-http/src/server/routing_factory.rs +599 -0
- data/vendor/crates/spikard-http/src/sse.rs +983 -21
- data/vendor/crates/spikard-http/src/testing/form.rs +38 -0
- data/vendor/crates/spikard-http/src/testing/test_client.rs +0 -2
- data/vendor/crates/spikard-http/src/testing.rs +7 -7
- data/vendor/crates/spikard-http/src/websocket.rs +1055 -4
- data/vendor/crates/spikard-http/tests/background_behavior.rs +832 -0
- data/vendor/crates/spikard-http/tests/common/handlers.rs +309 -0
- data/vendor/crates/spikard-http/tests/common/mod.rs +26 -0
- data/vendor/crates/spikard-http/tests/di_integration.rs +192 -0
- data/vendor/crates/spikard-http/tests/doc_snippets.rs +5 -0
- data/vendor/crates/spikard-http/tests/lifecycle_execution.rs +1093 -0
- data/vendor/crates/spikard-http/tests/multipart_behavior.rs +656 -0
- data/vendor/crates/spikard-http/tests/server_config_builder.rs +314 -0
- data/vendor/crates/spikard-http/tests/sse_behavior.rs +620 -0
- data/vendor/crates/spikard-http/tests/websocket_behavior.rs +663 -0
- data/vendor/crates/spikard-rb/Cargo.toml +10 -4
- data/vendor/crates/spikard-rb/build.rs +196 -5
- data/vendor/crates/spikard-rb/src/config/mod.rs +5 -0
- data/vendor/crates/spikard-rb/src/{config.rs → config/server_config.rs} +100 -109
- data/vendor/crates/spikard-rb/src/conversion.rs +121 -20
- data/vendor/crates/spikard-rb/src/di/builder.rs +100 -0
- data/vendor/crates/spikard-rb/src/{di.rs → di/mod.rs} +12 -46
- data/vendor/crates/spikard-rb/src/handler.rs +100 -107
- data/vendor/crates/spikard-rb/src/integration/mod.rs +3 -0
- data/vendor/crates/spikard-rb/src/lib.rs +467 -1428
- data/vendor/crates/spikard-rb/src/lifecycle.rs +1 -0
- data/vendor/crates/spikard-rb/src/metadata/mod.rs +5 -0
- data/vendor/crates/spikard-rb/src/metadata/route_extraction.rs +447 -0
- data/vendor/crates/spikard-rb/src/runtime/mod.rs +5 -0
- data/vendor/crates/spikard-rb/src/runtime/server_runner.rs +324 -0
- data/vendor/crates/spikard-rb/src/server.rs +47 -22
- data/vendor/crates/spikard-rb/src/{test_client.rs → testing/client.rs} +187 -40
- data/vendor/crates/spikard-rb/src/testing/mod.rs +7 -0
- data/vendor/crates/spikard-rb/src/testing/websocket.rs +635 -0
- data/vendor/crates/spikard-rb/src/websocket.rs +178 -37
- metadata +46 -13
- data/vendor/crates/spikard-http/src/parameters.rs +0 -1
- data/vendor/crates/spikard-http/src/problem.rs +0 -1
- data/vendor/crates/spikard-http/src/router.rs +0 -1
- data/vendor/crates/spikard-http/src/schema_registry.rs +0 -1
- data/vendor/crates/spikard-http/src/type_hints.rs +0 -1
- data/vendor/crates/spikard-http/src/validation.rs +0 -1
- data/vendor/crates/spikard-rb/src/test_websocket.rs +0 -221
- /data/vendor/crates/spikard-rb/src/{test_sse.rs → testing/sse.rs} +0 -0
|
@@ -9,14 +9,20 @@ pub mod validation;
|
|
|
9
9
|
|
|
10
10
|
use axum::{
|
|
11
11
|
body::Body,
|
|
12
|
+
extract::State,
|
|
12
13
|
extract::{FromRequest, Multipart, Request},
|
|
13
14
|
http::StatusCode,
|
|
14
15
|
middleware::Next,
|
|
15
16
|
response::{IntoResponse, Response},
|
|
16
17
|
};
|
|
17
18
|
use serde_json::json;
|
|
18
|
-
use std::
|
|
19
|
-
use std::
|
|
19
|
+
use std::cell::RefCell;
|
|
20
|
+
use std::num::NonZeroUsize;
|
|
21
|
+
|
|
22
|
+
thread_local! {
|
|
23
|
+
static URLENCODED_JSON_CACHE: RefCell<lru::LruCache<bytes::Bytes, bytes::Bytes>> =
|
|
24
|
+
RefCell::new(lru::LruCache::new(NonZeroUsize::new(256).expect("non-zero cache size")));
|
|
25
|
+
}
|
|
20
26
|
|
|
21
27
|
/// Route information for middleware validation
|
|
22
28
|
#[derive(Debug, Clone)]
|
|
@@ -25,8 +31,12 @@ pub struct RouteInfo {
|
|
|
25
31
|
pub expects_json_body: bool,
|
|
26
32
|
}
|
|
27
33
|
|
|
28
|
-
///
|
|
29
|
-
|
|
34
|
+
/// Request extension carrying the already-collected request body.
|
|
35
|
+
///
|
|
36
|
+
/// This avoids double-reading the body stream: middleware can read once for
|
|
37
|
+
/// content-length / syntax checks, and request extraction can reuse the bytes.
|
|
38
|
+
#[derive(Debug, Clone)]
|
|
39
|
+
pub struct PreReadBody(pub bytes::Bytes);
|
|
30
40
|
|
|
31
41
|
/// Middleware to validate Content-Type headers and related requirements
|
|
32
42
|
///
|
|
@@ -50,7 +60,7 @@ pub type RouteRegistry = Arc<HashMap<(String, String), RouteInfo>>;
|
|
|
50
60
|
/// # Behavior
|
|
51
61
|
///
|
|
52
62
|
/// For request methods POST, PUT, and PATCH:
|
|
53
|
-
/// 1. Checks if the route expects a JSON body (via
|
|
63
|
+
/// 1. Checks if the route expects a JSON body (via route state)
|
|
54
64
|
/// 2. Validates Content-Type headers based on route configuration
|
|
55
65
|
/// 3. Parses the request body according to Content-Type:
|
|
56
66
|
/// - `multipart/form-data` → JSON (form fields as object properties)
|
|
@@ -76,99 +86,107 @@ pub type RouteRegistry = Arc<HashMap<(String, String), RouteInfo>>;
|
|
|
76
86
|
/// // This is typically used as middleware in an Axum router:
|
|
77
87
|
/// // router.layer(axum::middleware::from_fn(validate_content_type_middleware))
|
|
78
88
|
/// ```
|
|
79
|
-
|
|
89
|
+
///
|
|
90
|
+
/// Coverage: Tested via integration tests (multipart and form parsing tested end-to-end)
|
|
91
|
+
#[cfg(not(tarpaulin_include))]
|
|
92
|
+
pub async fn validate_content_type_middleware(
|
|
93
|
+
State(route_info): State<RouteInfo>,
|
|
94
|
+
request: Request,
|
|
95
|
+
next: Next,
|
|
96
|
+
) -> Result<Response, Response> {
|
|
80
97
|
use axum::body::to_bytes;
|
|
81
98
|
use axum::http::Request as HttpRequest;
|
|
82
99
|
|
|
83
|
-
let (parts, body) = request.into_parts();
|
|
100
|
+
let (mut parts, body) = request.into_parts();
|
|
84
101
|
let headers = &parts.headers;
|
|
85
102
|
|
|
86
|
-
let route_info = parts.extensions.get::<RouteRegistry>().and_then(|registry| {
|
|
87
|
-
let method = parts.method.as_str();
|
|
88
|
-
let path = parts.uri.path();
|
|
89
|
-
registry.get(&(method.to_string(), path.to_string())).cloned()
|
|
90
|
-
});
|
|
91
|
-
|
|
92
103
|
let method = &parts.method;
|
|
93
104
|
if method == axum::http::Method::POST || method == axum::http::Method::PUT || method == axum::http::Method::PATCH {
|
|
94
|
-
if
|
|
95
|
-
&& info.expects_json_body
|
|
96
|
-
{
|
|
105
|
+
if route_info.expects_json_body {
|
|
97
106
|
validation::validate_json_content_type(headers)?;
|
|
98
107
|
}
|
|
99
108
|
|
|
100
109
|
validation::validate_content_type_headers(headers, 0)?;
|
|
101
110
|
|
|
102
|
-
let
|
|
103
|
-
|
|
104
|
-
|
|
111
|
+
let out_bytes: bytes::Bytes = if let Some(content_type) = headers.get(axum::http::header::CONTENT_TYPE) {
|
|
112
|
+
// `validate_content_type_headers()` already enforced basic Content-Type validity for us.
|
|
113
|
+
let is_multipart = validation::is_multipart_form_data(content_type);
|
|
114
|
+
let is_form_urlencoded = validation::is_form_urlencoded(content_type);
|
|
105
115
|
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
if is_multipart {
|
|
117
|
-
let mut response_headers = parts.headers.clone();
|
|
116
|
+
if is_multipart {
|
|
117
|
+
let body_bytes = match to_bytes(body, usize::MAX).await {
|
|
118
|
+
Ok(bytes) => bytes,
|
|
119
|
+
Err(_) => {
|
|
120
|
+
let error_body = json!({
|
|
121
|
+
"error": "Failed to read request body"
|
|
122
|
+
});
|
|
123
|
+
return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
|
|
124
|
+
}
|
|
125
|
+
};
|
|
118
126
|
|
|
119
|
-
|
|
120
|
-
let multipart = match Multipart::from_request(request, &()).await {
|
|
121
|
-
Ok(mp) => mp,
|
|
122
|
-
Err(e) => {
|
|
123
|
-
let error_body = json!({
|
|
124
|
-
"error": format!("Failed to parse multipart data: {}", e)
|
|
125
|
-
});
|
|
126
|
-
return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
|
|
127
|
-
}
|
|
128
|
-
};
|
|
127
|
+
validation::validate_content_length(headers, body_bytes.len())?;
|
|
129
128
|
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
Err(e) => {
|
|
133
|
-
let error_body = json!({
|
|
134
|
-
"error": format!("Failed to process multipart data: {}", e)
|
|
135
|
-
});
|
|
136
|
-
return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
|
|
137
|
-
}
|
|
138
|
-
};
|
|
129
|
+
let mut parse_request = HttpRequest::new(Body::from(body_bytes));
|
|
130
|
+
*parse_request.headers_mut() = parts.headers.clone();
|
|
139
131
|
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
|
|
147
|
-
|
|
148
|
-
|
|
132
|
+
let multipart = match Multipart::from_request(parse_request, &()).await {
|
|
133
|
+
Ok(mp) => mp,
|
|
134
|
+
Err(e) => {
|
|
135
|
+
let error_body = json!({
|
|
136
|
+
"error": format!("Failed to parse multipart data: {}", e)
|
|
137
|
+
});
|
|
138
|
+
return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
|
|
139
|
+
}
|
|
140
|
+
};
|
|
149
141
|
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
|
|
153
|
-
|
|
142
|
+
let json_body = match multipart::parse_multipart_to_json(multipart).await {
|
|
143
|
+
Ok(json) => json,
|
|
144
|
+
Err(e) => {
|
|
145
|
+
let error_body = json!({
|
|
146
|
+
"error": format!("Failed to process multipart data: {}", e)
|
|
147
|
+
});
|
|
148
|
+
return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
|
|
149
|
+
}
|
|
150
|
+
};
|
|
154
151
|
|
|
155
|
-
|
|
156
|
-
|
|
152
|
+
let json_bytes = match serde_json::to_vec(&json_body) {
|
|
153
|
+
Ok(bytes) => bytes,
|
|
154
|
+
Err(e) => {
|
|
155
|
+
let error_body = json!({
|
|
156
|
+
"error": format!("Failed to serialize multipart data to JSON: {}", e)
|
|
157
|
+
});
|
|
158
|
+
return Err((StatusCode::INTERNAL_SERVER_ERROR, axum::Json(error_body)).into_response());
|
|
159
|
+
}
|
|
160
|
+
};
|
|
157
161
|
|
|
158
|
-
|
|
159
|
-
|
|
160
|
-
|
|
161
|
-
|
|
162
|
-
|
|
163
|
-
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
|
|
167
|
-
|
|
168
|
-
|
|
162
|
+
parts.headers.insert(
|
|
163
|
+
axum::http::header::CONTENT_TYPE,
|
|
164
|
+
axum::http::HeaderValue::from_static("application/json"),
|
|
165
|
+
);
|
|
166
|
+
if let Ok(value) = axum::http::HeaderValue::from_str(&json_bytes.len().to_string()) {
|
|
167
|
+
parts.headers.insert(axum::http::header::CONTENT_LENGTH, value);
|
|
168
|
+
}
|
|
169
|
+
bytes::Bytes::from(json_bytes)
|
|
170
|
+
} else if is_form_urlencoded {
|
|
171
|
+
let body_bytes = match to_bytes(body, usize::MAX).await {
|
|
172
|
+
Ok(bytes) => bytes,
|
|
173
|
+
Err(_) => {
|
|
174
|
+
let error_body = json!({
|
|
175
|
+
"error": "Failed to read request body"
|
|
176
|
+
});
|
|
177
|
+
return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
|
|
178
|
+
}
|
|
179
|
+
};
|
|
169
180
|
|
|
170
|
-
|
|
181
|
+
validation::validate_content_length(headers, body_bytes.len())?;
|
|
171
182
|
|
|
183
|
+
parts.headers.insert(
|
|
184
|
+
axum::http::header::CONTENT_TYPE,
|
|
185
|
+
axum::http::HeaderValue::from_static("application/json"),
|
|
186
|
+
);
|
|
187
|
+
if let Some(cached) = URLENCODED_JSON_CACHE.with(|cache| cache.borrow_mut().get(&body_bytes).cloned()) {
|
|
188
|
+
cached
|
|
189
|
+
} else {
|
|
172
190
|
let json_body = if body_bytes.is_empty() {
|
|
173
191
|
serde_json::json!({})
|
|
174
192
|
} else {
|
|
@@ -193,42 +211,11 @@ pub async fn validate_content_type_middleware(request: Request, next: Next) -> R
|
|
|
193
211
|
}
|
|
194
212
|
};
|
|
195
213
|
|
|
196
|
-
let
|
|
197
|
-
|
|
198
|
-
|
|
199
|
-
|
|
200
|
-
|
|
201
|
-
|
|
202
|
-
(new_parts, Body::from(json_bytes))
|
|
203
|
-
} else {
|
|
204
|
-
let body_bytes = match to_bytes(body, usize::MAX).await {
|
|
205
|
-
Ok(bytes) => bytes,
|
|
206
|
-
Err(_) => {
|
|
207
|
-
let error_body = json!({
|
|
208
|
-
"error": "Failed to read request body"
|
|
209
|
-
});
|
|
210
|
-
return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
|
|
211
|
-
}
|
|
212
|
-
};
|
|
213
|
-
|
|
214
|
-
validation::validate_content_length(headers, body_bytes.len())?;
|
|
215
|
-
|
|
216
|
-
let is_json = parsed_mime
|
|
217
|
-
.as_ref()
|
|
218
|
-
.map(validation::is_json_content_type)
|
|
219
|
-
.unwrap_or(false);
|
|
220
|
-
|
|
221
|
-
if is_json
|
|
222
|
-
&& !body_bytes.is_empty()
|
|
223
|
-
&& serde_json::from_slice::<serde_json::Value>(&body_bytes).is_err()
|
|
224
|
-
{
|
|
225
|
-
let error_body = json!({
|
|
226
|
-
"detail": "Invalid request format"
|
|
227
|
-
});
|
|
228
|
-
return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
|
|
229
|
-
}
|
|
230
|
-
|
|
231
|
-
(parts, Body::from(body_bytes))
|
|
214
|
+
let json_bytes = bytes::Bytes::from(json_bytes);
|
|
215
|
+
URLENCODED_JSON_CACHE.with(|cache| {
|
|
216
|
+
cache.borrow_mut().put(body_bytes.clone(), json_bytes.clone());
|
|
217
|
+
});
|
|
218
|
+
json_bytes
|
|
232
219
|
}
|
|
233
220
|
} else {
|
|
234
221
|
let body_bytes = match to_bytes(body, usize::MAX).await {
|
|
@@ -243,7 +230,18 @@ pub async fn validate_content_type_middleware(request: Request, next: Next) -> R
|
|
|
243
230
|
|
|
244
231
|
validation::validate_content_length(headers, body_bytes.len())?;
|
|
245
232
|
|
|
246
|
-
|
|
233
|
+
let should_validate_json = route_info.expects_json_body && validation::is_json_like(content_type);
|
|
234
|
+
if should_validate_json
|
|
235
|
+
&& !body_bytes.is_empty()
|
|
236
|
+
&& serde_json::from_slice::<serde_json::Value>(&body_bytes).is_err()
|
|
237
|
+
{
|
|
238
|
+
let error_body = json!({
|
|
239
|
+
"detail": "Invalid request format"
|
|
240
|
+
});
|
|
241
|
+
return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
|
|
242
|
+
}
|
|
243
|
+
|
|
244
|
+
body_bytes
|
|
247
245
|
}
|
|
248
246
|
} else {
|
|
249
247
|
let body_bytes = match to_bytes(body, usize::MAX).await {
|
|
@@ -257,11 +255,12 @@ pub async fn validate_content_type_middleware(request: Request, next: Next) -> R
|
|
|
257
255
|
};
|
|
258
256
|
|
|
259
257
|
validation::validate_content_length(headers, body_bytes.len())?;
|
|
260
|
-
|
|
261
|
-
(parts, Body::from(body_bytes))
|
|
258
|
+
body_bytes
|
|
262
259
|
};
|
|
263
260
|
|
|
264
|
-
|
|
261
|
+
parts.extensions.insert(PreReadBody(out_bytes));
|
|
262
|
+
|
|
263
|
+
let request = HttpRequest::from_parts(parts, Body::empty());
|
|
265
264
|
Ok(next.run(request).await)
|
|
266
265
|
} else {
|
|
267
266
|
validation::validate_content_type_headers(headers, 0)?;
|
|
@@ -274,6 +273,8 @@ pub async fn validate_content_type_middleware(request: Request, next: Next) -> R
|
|
|
274
273
|
#[cfg(test)]
|
|
275
274
|
mod tests {
|
|
276
275
|
use super::*;
|
|
276
|
+
use axum::body::Body;
|
|
277
|
+
use axum::http::Request;
|
|
277
278
|
|
|
278
279
|
#[test]
|
|
279
280
|
fn test_route_info_creation() {
|
|
@@ -282,4 +283,258 @@ mod tests {
|
|
|
282
283
|
};
|
|
283
284
|
assert!(info.expects_json_body);
|
|
284
285
|
}
|
|
286
|
+
|
|
287
|
+
#[test]
|
|
288
|
+
fn test_route_info_expects_json_body_true() {
|
|
289
|
+
let info = RouteInfo {
|
|
290
|
+
expects_json_body: true,
|
|
291
|
+
};
|
|
292
|
+
assert_eq!(info.expects_json_body, true);
|
|
293
|
+
}
|
|
294
|
+
|
|
295
|
+
#[test]
|
|
296
|
+
fn test_route_info_expects_json_body_false() {
|
|
297
|
+
let info = RouteInfo {
|
|
298
|
+
expects_json_body: false,
|
|
299
|
+
};
|
|
300
|
+
assert_eq!(info.expects_json_body, false);
|
|
301
|
+
}
|
|
302
|
+
|
|
303
|
+
#[test]
|
|
304
|
+
fn test_request_with_zero_content_length() {
|
|
305
|
+
let headers = axum::http::HeaderMap::new();
|
|
306
|
+
assert!(headers.get(axum::http::header::CONTENT_LENGTH).is_none());
|
|
307
|
+
}
|
|
308
|
+
|
|
309
|
+
#[test]
|
|
310
|
+
fn test_request_with_very_large_content_length() {
|
|
311
|
+
let mut headers = axum::http::HeaderMap::new();
|
|
312
|
+
let large_size = usize::MAX - 1;
|
|
313
|
+
headers.insert(
|
|
314
|
+
axum::http::header::CONTENT_LENGTH,
|
|
315
|
+
axum::http::HeaderValue::from_str(&large_size.to_string()).unwrap(),
|
|
316
|
+
);
|
|
317
|
+
assert!(headers.get(axum::http::header::CONTENT_LENGTH).is_some());
|
|
318
|
+
}
|
|
319
|
+
|
|
320
|
+
#[test]
|
|
321
|
+
fn test_request_body_smaller_than_declared_length() {
|
|
322
|
+
let mut headers = axum::http::HeaderMap::new();
|
|
323
|
+
headers.insert(
|
|
324
|
+
axum::http::header::CONTENT_LENGTH,
|
|
325
|
+
axum::http::HeaderValue::from_static("1000"),
|
|
326
|
+
);
|
|
327
|
+
let result = super::validation::validate_content_length(&headers, 500);
|
|
328
|
+
assert!(
|
|
329
|
+
result.is_err(),
|
|
330
|
+
"Should reject when actual body is smaller than declared"
|
|
331
|
+
);
|
|
332
|
+
}
|
|
333
|
+
|
|
334
|
+
#[test]
|
|
335
|
+
fn test_request_body_larger_than_declared_length() {
|
|
336
|
+
let mut headers = axum::http::HeaderMap::new();
|
|
337
|
+
headers.insert(
|
|
338
|
+
axum::http::header::CONTENT_LENGTH,
|
|
339
|
+
axum::http::HeaderValue::from_static("500"),
|
|
340
|
+
);
|
|
341
|
+
let result = super::validation::validate_content_length(&headers, 1000);
|
|
342
|
+
assert!(
|
|
343
|
+
result.is_err(),
|
|
344
|
+
"Should reject when actual body is larger than declared"
|
|
345
|
+
);
|
|
346
|
+
}
|
|
347
|
+
|
|
348
|
+
#[test]
|
|
349
|
+
fn test_get_request_no_body_validation() {
|
|
350
|
+
let request = Request::builder()
|
|
351
|
+
.method(axum::http::Method::GET)
|
|
352
|
+
.uri("/api/users")
|
|
353
|
+
.body(Body::empty())
|
|
354
|
+
.unwrap();
|
|
355
|
+
|
|
356
|
+
let (parts, _body) = request.into_parts();
|
|
357
|
+
assert_eq!(parts.method, axum::http::Method::GET);
|
|
358
|
+
}
|
|
359
|
+
|
|
360
|
+
#[test]
|
|
361
|
+
fn test_delete_request_no_body_validation() {
|
|
362
|
+
let request = Request::builder()
|
|
363
|
+
.method(axum::http::Method::DELETE)
|
|
364
|
+
.uri("/api/users/1")
|
|
365
|
+
.body(Body::empty())
|
|
366
|
+
.unwrap();
|
|
367
|
+
|
|
368
|
+
let (parts, _body) = request.into_parts();
|
|
369
|
+
assert_eq!(parts.method, axum::http::Method::DELETE);
|
|
370
|
+
}
|
|
371
|
+
|
|
372
|
+
#[test]
|
|
373
|
+
fn test_post_request_requires_validation() {
|
|
374
|
+
let request = Request::builder()
|
|
375
|
+
.method(axum::http::Method::POST)
|
|
376
|
+
.uri("/api/users")
|
|
377
|
+
.body(Body::empty())
|
|
378
|
+
.unwrap();
|
|
379
|
+
|
|
380
|
+
let (parts, _body) = request.into_parts();
|
|
381
|
+
assert_eq!(parts.method, axum::http::Method::POST);
|
|
382
|
+
}
|
|
383
|
+
|
|
384
|
+
#[test]
|
|
385
|
+
fn test_put_request_requires_validation() {
|
|
386
|
+
let request = Request::builder()
|
|
387
|
+
.method(axum::http::Method::PUT)
|
|
388
|
+
.uri("/api/users/1")
|
|
389
|
+
.body(Body::empty())
|
|
390
|
+
.unwrap();
|
|
391
|
+
|
|
392
|
+
let (parts, _body) = request.into_parts();
|
|
393
|
+
assert_eq!(parts.method, axum::http::Method::PUT);
|
|
394
|
+
}
|
|
395
|
+
|
|
396
|
+
#[test]
|
|
397
|
+
fn test_patch_request_requires_validation() {
|
|
398
|
+
let request = Request::builder()
|
|
399
|
+
.method(axum::http::Method::PATCH)
|
|
400
|
+
.uri("/api/users/1")
|
|
401
|
+
.body(Body::empty())
|
|
402
|
+
.unwrap();
|
|
403
|
+
|
|
404
|
+
let (parts, _body) = request.into_parts();
|
|
405
|
+
assert_eq!(parts.method, axum::http::Method::PATCH);
|
|
406
|
+
}
|
|
407
|
+
|
|
408
|
+
#[test]
|
|
409
|
+
fn test_content_type_header_case_insensitive() {
|
|
410
|
+
let mut headers = axum::http::HeaderMap::new();
|
|
411
|
+
headers.insert(
|
|
412
|
+
axum::http::header::CONTENT_TYPE,
|
|
413
|
+
axum::http::HeaderValue::from_static("application/json"),
|
|
414
|
+
);
|
|
415
|
+
|
|
416
|
+
assert!(headers.get(axum::http::header::CONTENT_TYPE).is_some());
|
|
417
|
+
}
|
|
418
|
+
|
|
419
|
+
#[test]
|
|
420
|
+
fn test_content_length_header_case_insensitive() {
|
|
421
|
+
let mut headers = axum::http::HeaderMap::new();
|
|
422
|
+
headers.insert(
|
|
423
|
+
axum::http::header::CONTENT_LENGTH,
|
|
424
|
+
axum::http::HeaderValue::from_static("100"),
|
|
425
|
+
);
|
|
426
|
+
|
|
427
|
+
assert!(headers.get(axum::http::header::CONTENT_LENGTH).is_some());
|
|
428
|
+
}
|
|
429
|
+
|
|
430
|
+
#[test]
|
|
431
|
+
fn test_custom_headers_case_preserved() {
|
|
432
|
+
let mut headers = axum::http::HeaderMap::new();
|
|
433
|
+
let custom_header: axum::http::HeaderName = "X-Custom-Header".parse().unwrap();
|
|
434
|
+
headers.insert(custom_header.clone(), axum::http::HeaderValue::from_static("value"));
|
|
435
|
+
|
|
436
|
+
assert!(headers.get(&custom_header).is_some());
|
|
437
|
+
}
|
|
438
|
+
|
|
439
|
+
#[test]
|
|
440
|
+
fn test_multipart_boundary_minimal() {
|
|
441
|
+
let mut headers = axum::http::HeaderMap::new();
|
|
442
|
+
headers.insert(
|
|
443
|
+
axum::http::header::CONTENT_TYPE,
|
|
444
|
+
axum::http::HeaderValue::from_static("multipart/form-data; boundary=x"),
|
|
445
|
+
);
|
|
446
|
+
|
|
447
|
+
let result = super::validation::validate_content_type_headers(&headers, 0);
|
|
448
|
+
assert!(result.is_ok(), "Minimal boundary should be accepted");
|
|
449
|
+
}
|
|
450
|
+
|
|
451
|
+
#[test]
|
|
452
|
+
fn test_multipart_boundary_with_numbers() {
|
|
453
|
+
let mut headers = axum::http::HeaderMap::new();
|
|
454
|
+
headers.insert(
|
|
455
|
+
axum::http::header::CONTENT_TYPE,
|
|
456
|
+
axum::http::HeaderValue::from_static("multipart/form-data; boundary=boundary123456"),
|
|
457
|
+
);
|
|
458
|
+
|
|
459
|
+
let result = super::validation::validate_content_type_headers(&headers, 0);
|
|
460
|
+
assert!(result.is_ok());
|
|
461
|
+
}
|
|
462
|
+
|
|
463
|
+
#[test]
|
|
464
|
+
fn test_multipart_boundary_with_special_chars() {
|
|
465
|
+
let mut headers = axum::http::HeaderMap::new();
|
|
466
|
+
headers.insert(
|
|
467
|
+
axum::http::header::CONTENT_TYPE,
|
|
468
|
+
axum::http::HeaderValue::from_static("multipart/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW"),
|
|
469
|
+
);
|
|
470
|
+
|
|
471
|
+
let result = super::validation::validate_content_type_headers(&headers, 0);
|
|
472
|
+
assert!(result.is_ok(), "Boundary with dashes should be accepted");
|
|
473
|
+
}
|
|
474
|
+
|
|
475
|
+
#[test]
|
|
476
|
+
fn test_multipart_empty_boundary() {
|
|
477
|
+
let mut headers = axum::http::HeaderMap::new();
|
|
478
|
+
headers.insert(
|
|
479
|
+
axum::http::header::CONTENT_TYPE,
|
|
480
|
+
axum::http::HeaderValue::from_static("multipart/form-data; boundary="),
|
|
481
|
+
);
|
|
482
|
+
|
|
483
|
+
let _result = super::validation::validate_content_type_headers(&headers, 0);
|
|
484
|
+
assert!(headers.get(axum::http::header::CONTENT_TYPE).is_some());
|
|
485
|
+
}
|
|
486
|
+
|
|
487
|
+
#[test]
|
|
488
|
+
fn test_invalid_json_body_detection() {
|
|
489
|
+
let invalid_json = r#"{"invalid": json without quotes}"#;
|
|
490
|
+
let _mime = "application/json".parse::<mime::Mime>().unwrap();
|
|
491
|
+
|
|
492
|
+
let result = serde_json::from_str::<serde_json::Value>(invalid_json);
|
|
493
|
+
assert!(result.is_err(), "Invalid JSON should fail parsing");
|
|
494
|
+
}
|
|
495
|
+
|
|
496
|
+
#[test]
|
|
497
|
+
fn test_valid_json_parsing() {
|
|
498
|
+
let valid_json = r#"{"key": "value"}"#;
|
|
499
|
+
let result = serde_json::from_str::<serde_json::Value>(valid_json);
|
|
500
|
+
assert!(result.is_ok(), "Valid JSON should parse successfully");
|
|
501
|
+
}
|
|
502
|
+
|
|
503
|
+
#[test]
|
|
504
|
+
fn test_empty_json_object() {
|
|
505
|
+
let empty_json = "{}";
|
|
506
|
+
let result = serde_json::from_str::<serde_json::Value>(empty_json);
|
|
507
|
+
assert!(result.is_ok());
|
|
508
|
+
let value = result.unwrap();
|
|
509
|
+
assert!(value.is_object());
|
|
510
|
+
assert_eq!(value.as_object().unwrap().len(), 0);
|
|
511
|
+
}
|
|
512
|
+
|
|
513
|
+
#[test]
|
|
514
|
+
fn test_form_data_mime_type() {
|
|
515
|
+
let mime = "multipart/form-data; boundary=xyz".parse::<mime::Mime>().unwrap();
|
|
516
|
+
assert_eq!(mime.type_(), mime::MULTIPART);
|
|
517
|
+
assert_eq!(mime.subtype(), "form-data");
|
|
518
|
+
}
|
|
519
|
+
|
|
520
|
+
#[test]
|
|
521
|
+
fn test_form_urlencoded_mime_type() {
|
|
522
|
+
let mime = "application/x-www-form-urlencoded".parse::<mime::Mime>().unwrap();
|
|
523
|
+
assert_eq!(mime.type_(), mime::APPLICATION);
|
|
524
|
+
assert_eq!(mime.subtype(), "x-www-form-urlencoded");
|
|
525
|
+
}
|
|
526
|
+
|
|
527
|
+
#[test]
|
|
528
|
+
fn test_json_mime_type() {
|
|
529
|
+
let mime = "application/json".parse::<mime::Mime>().unwrap();
|
|
530
|
+
assert_eq!(mime.type_(), mime::APPLICATION);
|
|
531
|
+
assert_eq!(mime.subtype(), mime::JSON);
|
|
532
|
+
}
|
|
533
|
+
|
|
534
|
+
#[test]
|
|
535
|
+
fn test_text_plain_mime_type() {
|
|
536
|
+
let mime = "text/plain".parse::<mime::Mime>().unwrap();
|
|
537
|
+
assert_eq!(mime.type_(), mime::TEXT);
|
|
538
|
+
assert_eq!(mime.subtype(), "plain");
|
|
539
|
+
}
|
|
285
540
|
}
|