901 lines
21 KiB
Rust
901 lines
21 KiB
Rust
// Static file server that can plug into the PTTH reverse server
|
|
|
|
use std::{
|
|
borrow::Cow,
|
|
cmp::min,
|
|
collections::*,
|
|
convert::{Infallible, TryInto},
|
|
error::Error,
|
|
fmt::Debug,
|
|
io::SeekFrom,
|
|
path::{Path, PathBuf},
|
|
};
|
|
|
|
use handlebars::Handlebars;
|
|
use percent_encoding::*;
|
|
use serde::Serialize;
|
|
use tokio::{
|
|
fs::{
|
|
DirEntry,
|
|
File,
|
|
read_dir,
|
|
ReadDir,
|
|
},
|
|
io::AsyncReadExt,
|
|
sync::mpsc::{
|
|
channel,
|
|
},
|
|
};
|
|
use tracing::instrument;
|
|
|
|
use regex::Regex;
|
|
|
|
#[cfg (test)]
|
|
use always_equal::test::AlwaysEqual;
|
|
|
|
#[cfg (not (test))]
|
|
use always_equal::prod::AlwaysEqual;
|
|
|
|
use ptth_core::{
|
|
http_serde::{
|
|
Method,
|
|
Response,
|
|
StatusCode,
|
|
},
|
|
prelude::*,
|
|
prefix_match,
|
|
};
|
|
|
|
#[derive (Debug, Serialize)]
|
|
pub struct ServerInfo {
|
|
pub server_name: String,
|
|
}
|
|
|
|
#[derive (Serialize)]
|
|
struct TemplateDirEntry {
|
|
icon: &'static str,
|
|
trailing_slash: &'static str,
|
|
|
|
// Unfortunately file_name will allocate as long as some platforms
|
|
// (Windows!) aren't UTF-8. Cause I don't want to write separate code
|
|
// for such a small problem.
|
|
|
|
file_name: String,
|
|
|
|
// This could be a Cow with file_name if no encoding was done but
|
|
// it's simpler to allocate.
|
|
|
|
encoded_file_name: String,
|
|
|
|
size: Cow <'static, str>,
|
|
|
|
error: bool,
|
|
}
|
|
|
|
#[derive (Serialize)]
|
|
struct TemplateDirPage <'a> {
|
|
#[serde (flatten)]
|
|
server_info: &'a ServerInfo,
|
|
|
|
path: Cow <'a, str>,
|
|
entries: Vec <TemplateDirEntry>,
|
|
}
|
|
|
|
fn parse_range_header (range_str: &str) -> (Option <u64>, Option <u64>) {
|
|
use lazy_static::*;
|
|
|
|
lazy_static! {
|
|
static ref RE: Regex = Regex::new (r"^bytes=(\d*)-(\d*)$").expect ("Couldn't compile regex for Range header");
|
|
}
|
|
|
|
debug! ("{}", range_str);
|
|
|
|
let caps = match RE.captures (range_str) {
|
|
Some (x) => x,
|
|
_ => return (None, None),
|
|
};
|
|
let start = caps.get (1).map (|x| x.as_str ());
|
|
let end = caps.get (2).map (|x| x.as_str ());
|
|
|
|
let start = start.map (|x| u64::from_str_radix (x, 10).ok ()).flatten ();
|
|
|
|
// HTTP specifies ranges as [start inclusive, end inclusive]
|
|
// But that's dumb and [start inclusive, end exclusive) is better
|
|
|
|
let end = end.map (|x| u64::from_str_radix (x, 10).ok ().map (|x| x + 1)).flatten ();
|
|
|
|
(start, end)
|
|
}
|
|
|
|
use std::ops::Range;
|
|
|
|
#[derive (Debug, PartialEq)]
|
|
enum ParsedRange {
|
|
Ok (Range <u64>),
|
|
PartialContent (Range <u64>),
|
|
RangeNotSatisfiable (u64),
|
|
}
|
|
|
|
fn check_range (range_str: Option <&str>, file_len: u64)
|
|
-> ParsedRange
|
|
{
|
|
use ParsedRange::*;
|
|
|
|
let not_satisfiable = RangeNotSatisfiable (file_len);
|
|
|
|
let range_str = match range_str {
|
|
None => return Ok (0..file_len),
|
|
Some (x) => x,
|
|
};
|
|
|
|
let (start, end) = parse_range_header (range_str);
|
|
|
|
let start = start.unwrap_or (0);
|
|
if start >= file_len {
|
|
return not_satisfiable;
|
|
}
|
|
|
|
let end = end.unwrap_or (file_len);
|
|
if end > file_len {
|
|
return not_satisfiable;
|
|
}
|
|
if end < start {
|
|
return not_satisfiable;
|
|
}
|
|
|
|
PartialContent (start..end)
|
|
}
|
|
|
|
fn get_icon (file_name: &str) -> &'static str {
|
|
// Because my editor actually doesn't render these
|
|
|
|
let video = "🎞️";
|
|
let picture = "📷";
|
|
let file = "📄";
|
|
|
|
if
|
|
file_name.ends_with (".mp4") ||
|
|
file_name.ends_with (".avi") ||
|
|
file_name.ends_with (".mkv") ||
|
|
file_name.ends_with (".webm")
|
|
{
|
|
video
|
|
}
|
|
else if
|
|
file_name.ends_with (".jpg") ||
|
|
file_name.ends_with (".jpeg") ||
|
|
file_name.ends_with (".png") ||
|
|
file_name.ends_with (".bmp")
|
|
{
|
|
picture
|
|
}
|
|
else {
|
|
file
|
|
}
|
|
}
|
|
|
|
async fn read_dir_entry (entry: DirEntry) -> TemplateDirEntry
|
|
{
|
|
let file_name = match entry.file_name ().into_string () {
|
|
Ok (x) => x,
|
|
Err (_) => return TemplateDirEntry {
|
|
icon: "⚠️",
|
|
trailing_slash: "",
|
|
file_name: "File / directory name is not UTF-8".into (),
|
|
encoded_file_name: "".into (),
|
|
size: "".into (),
|
|
error: true,
|
|
},
|
|
};
|
|
|
|
let metadata = match entry.metadata ().await {
|
|
Ok (x) => x,
|
|
Err (_) => return TemplateDirEntry {
|
|
icon: "⚠️",
|
|
trailing_slash: "",
|
|
file_name: "Could not fetch metadata".into (),
|
|
encoded_file_name: "".into (),
|
|
size: "".into (),
|
|
error: true,
|
|
},
|
|
};
|
|
|
|
let (trailing_slash, icon, size) = {
|
|
let t = metadata.file_type ();
|
|
let icon_folder = "📁";
|
|
|
|
if t.is_dir () {
|
|
("/", icon_folder, "".into ())
|
|
}
|
|
else {
|
|
("", get_icon (&file_name), pretty_print_bytes (metadata.len ()).into ())
|
|
}
|
|
};
|
|
|
|
use percent_encoding::*;
|
|
|
|
let encoded_file_name = utf8_percent_encode (&file_name, CONTROLS).to_string ();
|
|
|
|
TemplateDirEntry {
|
|
icon,
|
|
trailing_slash: &trailing_slash,
|
|
file_name,
|
|
encoded_file_name,
|
|
size,
|
|
error: false,
|
|
}
|
|
}
|
|
|
|
async fn serve_root (
|
|
handlebars: &Handlebars <'static>,
|
|
server_info: &ServerInfo
|
|
) -> Response
|
|
{
|
|
let s = handlebars.render ("file_server_root", &server_info).unwrap ();
|
|
|
|
serve_html (s)
|
|
}
|
|
|
|
fn serve_html (s: String) -> Response {
|
|
let mut resp = Response::default ();
|
|
resp
|
|
.header ("content-type".to_string (), "text/html; charset=UTF-8".to_string ().into_bytes ())
|
|
.body_bytes (s.into_bytes ())
|
|
;
|
|
resp
|
|
}
|
|
|
|
#[instrument (level = "debug", skip (handlebars, dir))]
|
|
async fn serve_dir (
|
|
handlebars: &Handlebars <'static>,
|
|
server_info: &ServerInfo,
|
|
path: Cow <'_, str>,
|
|
mut dir: ReadDir
|
|
) -> Response
|
|
{
|
|
let mut entries = vec! [];
|
|
|
|
while let Ok (Some (entry)) = dir.next_entry ().await {
|
|
entries.push (read_dir_entry (entry).await);
|
|
}
|
|
|
|
entries.sort_unstable_by (|a, b| a.file_name.partial_cmp (&b.file_name).unwrap ());
|
|
|
|
let s = handlebars.render ("file_server_dir", &TemplateDirPage {
|
|
path,
|
|
entries,
|
|
server_info,
|
|
}).unwrap ();
|
|
|
|
serve_html (s)
|
|
}
|
|
|
|
#[instrument (level = "debug", skip (f))]
|
|
async fn serve_file (
|
|
mut f: File,
|
|
should_send_body: bool,
|
|
range: Range <u64>,
|
|
range_requested: bool
|
|
)
|
|
-> Response
|
|
{
|
|
let (tx, rx) = channel (1);
|
|
let body = if should_send_body {
|
|
Some (rx)
|
|
}
|
|
else {
|
|
None
|
|
};
|
|
|
|
info! ("Serving range {}-{}", range.start, range.end);
|
|
|
|
let content_length = range.end - range.start;
|
|
|
|
let seek = SeekFrom::Start (range.start);
|
|
|
|
if should_send_body {
|
|
tokio::spawn (async move {
|
|
f.seek (seek).await.unwrap ();
|
|
|
|
let mut tx = tx;
|
|
let mut bytes_sent = 0;
|
|
let mut bytes_left = content_length;
|
|
|
|
let mark_interval = 200_000;
|
|
let mut next_mark = mark_interval;
|
|
|
|
loop {
|
|
let mut buffer = vec! [0u8; 65_536];
|
|
let bytes_read: u64 = f.read (&mut buffer).await.unwrap ().try_into ().unwrap ();
|
|
|
|
let bytes_read = min (bytes_left, bytes_read);
|
|
|
|
buffer.truncate (bytes_read.try_into ().unwrap ());
|
|
|
|
if bytes_read == 0 {
|
|
break;
|
|
}
|
|
|
|
if tx.send (Ok::<_, Infallible> (buffer)).await.is_err () {
|
|
warn! ("Cancelling file stream (Sent {} out of {} bytes)", bytes_sent, content_length);
|
|
break;
|
|
}
|
|
|
|
bytes_left -= bytes_read;
|
|
if bytes_left == 0 {
|
|
debug! ("Finished");
|
|
break;
|
|
}
|
|
|
|
bytes_sent += bytes_read;
|
|
while next_mark <= bytes_sent {
|
|
trace! ("Sent {} bytes", next_mark);
|
|
next_mark += mark_interval;
|
|
}
|
|
|
|
//delay_for (Duration::from_millis (50)).await;
|
|
}
|
|
});
|
|
}
|
|
|
|
let mut response = Response::default ();
|
|
|
|
response.header (String::from ("accept-ranges"), b"bytes".to_vec ());
|
|
|
|
if range_requested {
|
|
response.status_code (StatusCode::PartialContent);
|
|
response.header (String::from ("content-range"), format! ("bytes {}-{}/{}", range.start, range.end - 1, range.end).into_bytes ());
|
|
}
|
|
else {
|
|
response.status_code (StatusCode::Ok);
|
|
response.header (String::from ("content-length"), range.end.to_string ().into_bytes ());
|
|
}
|
|
|
|
if ! should_send_body {
|
|
response.status_code (StatusCode::NoContent);
|
|
}
|
|
else {
|
|
response.content_length = Some (content_length);
|
|
}
|
|
|
|
if let Some (body) = body {
|
|
response.body (body);
|
|
}
|
|
|
|
response
|
|
}
|
|
|
|
fn serve_error (
|
|
status_code: StatusCode,
|
|
msg: &str
|
|
)
|
|
-> Response
|
|
{
|
|
let mut resp = Response::default ();
|
|
resp.status_code (status_code);
|
|
resp.body_bytes (msg.as_bytes ().to_vec ());
|
|
resp
|
|
}
|
|
|
|
fn serve_307 (location: String) -> Response {
|
|
let mut resp = Response::default ();
|
|
resp.status_code (StatusCode::TemporaryRedirect);
|
|
resp.header ("location".to_string (), location.into_bytes ());
|
|
resp.body_bytes (b"Redirecting...".to_vec ());
|
|
resp
|
|
}
|
|
|
|
fn render_markdown (bytes: &[u8], out: &mut String) -> Result <(), MarkdownError> {
|
|
use pulldown_cmark::{Parser, Options, html};
|
|
|
|
let markdown_input = match std::str::from_utf8 (bytes) {
|
|
Err (_) => return Err (MarkdownError::NotUtf8),
|
|
Ok (x) => x,
|
|
};
|
|
|
|
let mut options = Options::empty ();
|
|
options.insert (Options::ENABLE_STRIKETHROUGH);
|
|
let parser = Parser::new_ext (markdown_input, options);
|
|
|
|
html::push_html (out, parser);
|
|
|
|
Ok (())
|
|
}
|
|
|
|
fn render_markdown_styled (bytes: &[u8]) -> Result <String, MarkdownError> {
|
|
// Write to String buffer.
|
|
let mut out = String::new ();
|
|
|
|
out.push_str ("<body style=\"font-family: sans-serif;\">");
|
|
render_markdown (bytes, &mut out)?;
|
|
out.push_str ("</body>");
|
|
|
|
Ok (out)
|
|
}
|
|
|
|
// Sort of an internal API endpoint to make testing work better.
|
|
// Eventually we could expose this as JSON or Msgpack or whatever. For now
|
|
// it's just a Rust struct that we can test on without caring about
|
|
// human-readable HTML
|
|
|
|
#[derive (Debug, PartialEq)]
|
|
struct ServeDirParams {
|
|
path: PathBuf,
|
|
dir: AlwaysEqual <ReadDir>,
|
|
}
|
|
|
|
#[derive (Debug, PartialEq)]
|
|
struct ServeFileParams {
|
|
send_body: bool,
|
|
range: Range <u64>,
|
|
range_requested: bool,
|
|
file: AlwaysEqual <File>,
|
|
}
|
|
|
|
#[derive (Debug, PartialEq)]
|
|
enum MarkdownError {
|
|
TooBig,
|
|
// NotMarkdown,
|
|
NotUtf8,
|
|
}
|
|
|
|
#[derive (Debug, PartialEq)]
|
|
enum InternalResponse {
|
|
Favicon,
|
|
Forbidden,
|
|
InvalidUri,
|
|
InvalidQuery,
|
|
MethodNotAllowed,
|
|
NotFound,
|
|
RangeNotSatisfiable (u64),
|
|
Redirect (String),
|
|
Root,
|
|
ServeDir (ServeDirParams),
|
|
ServeFile (ServeFileParams),
|
|
|
|
MarkdownErr (MarkdownError),
|
|
MarkdownPreview (String),
|
|
}
|
|
|
|
async fn internal_serve_all (
|
|
root: &Path,
|
|
method: Method,
|
|
uri: &str,
|
|
headers: &HashMap <String, Vec <u8>>,
|
|
hidden_path: Option <&Path>
|
|
)
|
|
-> InternalResponse
|
|
{
|
|
use std::str::FromStr;
|
|
use InternalResponse::*;
|
|
|
|
info! ("Client requested {}", uri);
|
|
|
|
let uri = match hyper::Uri::from_str (uri) {
|
|
Err (_) => return InvalidUri,
|
|
Ok (x) => x,
|
|
};
|
|
|
|
let send_body = match &method {
|
|
Method::Get => true,
|
|
Method::Head => false,
|
|
m => {
|
|
debug! ("Unsupported method {:?}", m);
|
|
return MethodNotAllowed;
|
|
}
|
|
};
|
|
|
|
if uri.path () == "/favicon.ico" {
|
|
return Favicon;
|
|
}
|
|
|
|
let path = match prefix_match ("/files", uri.path ()) {
|
|
Some (x) => x,
|
|
None => return Root,
|
|
};
|
|
|
|
if path == "" {
|
|
return Redirect ("files/".to_string ());
|
|
}
|
|
|
|
// TODO: There is totally a dir traversal attack in here somewhere
|
|
|
|
let encoded_path = &path [1..];
|
|
|
|
let path_s = percent_decode (encoded_path.as_bytes ()).decode_utf8 ().unwrap ();
|
|
let path = Path::new (&*path_s);
|
|
|
|
let full_path = root.join (path);
|
|
|
|
debug! ("full_path = {:?}", full_path);
|
|
|
|
if let Some (hidden_path) = hidden_path {
|
|
if full_path == hidden_path {
|
|
return Forbidden;
|
|
}
|
|
}
|
|
|
|
let has_trailing_slash = path_s.is_empty () || path_s.ends_with ('/');
|
|
|
|
if let Ok (dir) = read_dir (&full_path).await {
|
|
if ! has_trailing_slash {
|
|
return Redirect (format! ("{}/", path.file_name ().unwrap ().to_str ().unwrap ()));
|
|
}
|
|
|
|
if uri.query ().is_some () {
|
|
return InvalidQuery;
|
|
}
|
|
|
|
let dir = dir.into ();
|
|
|
|
ServeDir (ServeDirParams {
|
|
dir,
|
|
path: full_path,
|
|
})
|
|
}
|
|
else if let Ok (mut file) = File::open (&full_path).await {
|
|
use std::os::unix::fs::PermissionsExt;
|
|
|
|
let file_md = file.metadata ().await.unwrap ();
|
|
if file_md.permissions ().mode () == super::load_toml::CONFIG_PERMISSIONS_MODE
|
|
{
|
|
return Forbidden;
|
|
}
|
|
|
|
let file_len = file_md.len ();
|
|
|
|
let range_header = headers.get ("range").map (|v| std::str::from_utf8 (v).ok ()).flatten ();
|
|
|
|
match check_range (range_header, file_len) {
|
|
ParsedRange::RangeNotSatisfiable (file_len) => RangeNotSatisfiable (file_len),
|
|
ParsedRange::Ok (range) => {
|
|
if uri.query () == Some ("as_markdown") {
|
|
const MAX_BUF_SIZE: u32 = 1_000_000;
|
|
if file_len > MAX_BUF_SIZE.try_into ().unwrap () {
|
|
MarkdownErr (MarkdownError::TooBig)
|
|
}
|
|
else {
|
|
let mut buffer = vec! [0u8; MAX_BUF_SIZE.try_into ().unwrap ()];
|
|
let bytes_read = file.read (&mut buffer).await.unwrap ();
|
|
buffer.truncate (bytes_read);
|
|
|
|
MarkdownPreview (render_markdown_styled (&buffer).unwrap ())
|
|
}
|
|
}
|
|
else {
|
|
let file = file.into ();
|
|
|
|
ServeFile (ServeFileParams {
|
|
file,
|
|
send_body,
|
|
range,
|
|
range_requested: false,
|
|
})
|
|
}
|
|
},
|
|
ParsedRange::PartialContent (range) => {
|
|
if uri.query ().is_some () {
|
|
InvalidQuery
|
|
}
|
|
else {
|
|
let file = file.into ();
|
|
|
|
ServeFile (ServeFileParams {
|
|
file,
|
|
send_body,
|
|
range,
|
|
range_requested: true,
|
|
})
|
|
}
|
|
},
|
|
}
|
|
}
|
|
else {
|
|
NotFound
|
|
}
|
|
}
|
|
|
|
#[instrument (level = "debug", skip (handlebars, headers))]
|
|
pub async fn serve_all (
|
|
handlebars: &Handlebars <'static>,
|
|
server_info: &ServerInfo,
|
|
root: &Path,
|
|
method: Method,
|
|
uri: &str,
|
|
headers: &HashMap <String, Vec <u8>>,
|
|
hidden_path: Option <&Path>
|
|
)
|
|
-> Response
|
|
{
|
|
use InternalResponse::*;
|
|
|
|
match internal_serve_all (root, method, uri, headers, hidden_path).await {
|
|
Favicon => serve_error (StatusCode::NotFound, ""),
|
|
Forbidden => serve_error (StatusCode::Forbidden, "403 Forbidden"),
|
|
InvalidUri => serve_error (StatusCode::BadRequest, "Invalid URI"),
|
|
InvalidQuery => serve_error (StatusCode::BadRequest, "Query is invalid for this object"),
|
|
MethodNotAllowed => serve_error (StatusCode::MethodNotAllowed, "Unsupported method"),
|
|
NotFound => serve_error (StatusCode::NotFound, "404 Not Found"),
|
|
RangeNotSatisfiable (file_len) => {
|
|
let mut resp = Response::default ();
|
|
resp.status_code (StatusCode::RangeNotSatisfiable)
|
|
.header ("content-range".to_string (), format! ("bytes */{}", file_len).into_bytes ());
|
|
resp
|
|
},
|
|
Redirect (location) => serve_307 (location),
|
|
|
|
Root => serve_root (handlebars, server_info).await,
|
|
ServeDir (ServeDirParams {
|
|
path,
|
|
dir,
|
|
}) => serve_dir (handlebars, server_info, path.to_string_lossy (), dir.into_inner ()).await,
|
|
ServeFile (ServeFileParams {
|
|
file,
|
|
send_body,
|
|
range,
|
|
range_requested,
|
|
}) => serve_file (file.into_inner (), send_body, range, range_requested).await,
|
|
MarkdownErr (e) => match e {
|
|
MarkdownError::TooBig => serve_error (StatusCode::InternalServerError, "File is too big to preview as Markdown"),
|
|
//MarkdownError::NotMarkdown => serve_error (StatusCode::BadRequest, "File is not Markdown"),
|
|
MarkdownError::NotUtf8 => serve_error (StatusCode::BadRequest, "File is not UTF-8"),
|
|
},
|
|
MarkdownPreview (s) => serve_html (s),
|
|
}
|
|
}
|
|
|
|
pub fn load_templates (
|
|
asset_root: &Path
|
|
)
|
|
-> Result <Handlebars <'static>, Box <dyn Error>>
|
|
{
|
|
let mut handlebars = Handlebars::new ();
|
|
handlebars.set_strict_mode (true);
|
|
|
|
let asset_root = asset_root.join ("handlebars/server");
|
|
|
|
for (k, v) in vec! [
|
|
("file_server_dir", "file_server_dir.html"),
|
|
("file_server_root", "file_server_root.html"),
|
|
].into_iter () {
|
|
handlebars.register_template_file (k, asset_root.join (v))?;
|
|
}
|
|
|
|
Ok (handlebars)
|
|
}
|
|
|
|
fn pretty_print_bytes (b: u64) -> String {
|
|
if b < 1024 {
|
|
format! ("{} B", b)
|
|
}
|
|
else if (b + 512) < 1024 * 1024 {
|
|
format! ("{} KiB", (b + 512) / 1024)
|
|
}
|
|
else if (b + 512 * 1024) < 1024 * 1024 * 1024 {
|
|
format! ("{} MiB", (b + 512 * 1024) / 1024 / 1024)
|
|
}
|
|
else {
|
|
format! ("{} GiB", (b + 512 * 1024 * 1024) / 1024 / 1024 / 1024)
|
|
}
|
|
}
|
|
|
|
#[cfg (test)]
|
|
mod tests {
|
|
use std::{
|
|
ffi::OsStr,
|
|
path::{
|
|
Component,
|
|
Path,
|
|
},
|
|
};
|
|
|
|
use maplit::*;
|
|
use tokio::runtime::Runtime;
|
|
|
|
#[test]
|
|
fn icons () {
|
|
let video = "🎞️";
|
|
let picture = "📷";
|
|
let file = "📄";
|
|
|
|
for (input, expected) in vec! [
|
|
("copying_is_not_theft.mp4", video),
|
|
("copying_is_not_theft.avi", video),
|
|
("copying_is_not_theft.mkv", video),
|
|
("copying_is_not_theft.webm", video),
|
|
("lolcats.jpg", picture),
|
|
("lolcats.jpeg", picture),
|
|
("lolcats.png", picture),
|
|
("lolcats.bmp", picture),
|
|
("ptth.log", file),
|
|
("README.md", file),
|
|
("todo.txt", file),
|
|
].into_iter () {
|
|
assert_eq! (super::get_icon (input), expected);
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn parse_range_header () {
|
|
for (input, expected) in vec! [
|
|
("", (None, None)),
|
|
("bytes=0-", (Some (0), None)),
|
|
("bytes=0-999", (Some (0), Some (1000))),
|
|
("bytes=111-999", (Some (111), Some (1000))),
|
|
].into_iter () {
|
|
let actual = super::parse_range_header (input);
|
|
assert_eq! (actual, expected);
|
|
}
|
|
|
|
use super::ParsedRange::*;
|
|
|
|
for (header, file_len, expected) in vec! [
|
|
(None, 0, Ok (0..0)),
|
|
(None, 1024, Ok (0..1024)),
|
|
|
|
(Some (""), 0, RangeNotSatisfiable (0)),
|
|
(Some (""), 1024, PartialContent (0..1024)),
|
|
|
|
(Some ("bytes=0-"), 1024, PartialContent (0..1024)),
|
|
(Some ("bytes=0-999"), 1024, PartialContent (0..1000)),
|
|
(Some ("bytes=0-1023"), 1024, PartialContent (0..1024)),
|
|
(Some ("bytes=111-999"), 1024, PartialContent (111..1000)),
|
|
(Some ("bytes=111-1023"), 1024, PartialContent (111..1024)),
|
|
(Some ("bytes=200-100"), 1024, RangeNotSatisfiable (1024)),
|
|
|
|
(Some ("bytes=0-"), 512, PartialContent (0..512)),
|
|
(Some ("bytes=0-1023"), 512, RangeNotSatisfiable (512)),
|
|
(Some ("bytes=1000-1023"), 512, RangeNotSatisfiable (512)),
|
|
].into_iter () {
|
|
let actual = super::check_range (header, file_len);
|
|
assert_eq! (actual, expected);
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn pretty_print_bytes () {
|
|
for (input_after, expected_before, expected_after) in vec! [
|
|
(1, "0 B", "1 B"),
|
|
(1024, "1023 B", "1 KiB"),
|
|
(1024 + 512, "1 KiB", "2 KiB"),
|
|
(1023 * 1024 + 512, "1023 KiB", "1 MiB"),
|
|
((1024 + 512) * 1024, "1 MiB", "2 MiB"),
|
|
(1023 * 1024 * 1024 + 512 * 1024, "1023 MiB", "1 GiB"),
|
|
((1024 + 512) * 1024 * 1024, "1 GiB", "2 GiB"),
|
|
|
|
].into_iter () {
|
|
let actual = super::pretty_print_bytes (input_after - 1);
|
|
assert_eq! (&actual, expected_before);
|
|
|
|
let actual = super::pretty_print_bytes (input_after);
|
|
assert_eq! (&actual, expected_after);
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn i_hate_paths () {
|
|
let mut components = Path::new ("/home/user").components ();
|
|
|
|
assert_eq! (components.next (), Some (Component::RootDir));
|
|
assert_eq! (components.next (), Some (Component::Normal (OsStr::new ("home"))));
|
|
assert_eq! (components.next (), Some (Component::Normal (OsStr::new ("user"))));
|
|
assert_eq! (components.next (), None);
|
|
|
|
let mut components = Path::new ("./home/user").components ();
|
|
|
|
assert_eq! (components.next (), Some (Component::CurDir));
|
|
assert_eq! (components.next (), Some (Component::Normal (OsStr::new ("home"))));
|
|
assert_eq! (components.next (), Some (Component::Normal (OsStr::new ("user"))));
|
|
assert_eq! (components.next (), None);
|
|
|
|
let mut components = Path::new (".").components ();
|
|
|
|
assert_eq! (components.next (), Some (Component::CurDir));
|
|
assert_eq! (components.next (), None);
|
|
}
|
|
|
|
#[test]
|
|
fn file_server () {
|
|
use ptth_core::{
|
|
http_serde::Method,
|
|
};
|
|
use super::*;
|
|
|
|
tracing_subscriber::fmt ().try_init ().ok ();
|
|
let mut rt = Runtime::new ().unwrap ();
|
|
|
|
rt.block_on (async {
|
|
let file_server_root = PathBuf::from ("./");
|
|
let headers = Default::default ();
|
|
|
|
{
|
|
use InternalResponse::*;
|
|
|
|
let bad_passwords_path = "/files/src/bad_passwords.txt";
|
|
|
|
for (uri_path, expected) in vec! [
|
|
("/", Root),
|
|
("/files", Redirect ("files/".to_string ())),
|
|
("/files/?", InvalidQuery),
|
|
("/files/src", Redirect ("src/".to_string ())),
|
|
("/files/src/?", InvalidQuery),
|
|
(bad_passwords_path, ServeFile (ServeFileParams {
|
|
send_body: true,
|
|
range: 0..1_048_576,
|
|
range_requested: false,
|
|
file: AlwaysEqual::testing_blank (),
|
|
})),
|
|
("/files/test/test.md", ServeFile (ServeFileParams {
|
|
send_body: true,
|
|
range: 0..144,
|
|
range_requested: false,
|
|
file: AlwaysEqual::testing_blank (),
|
|
})),
|
|
("/ ", InvalidUri),
|
|
].into_iter () {
|
|
let resp = internal_serve_all (
|
|
&file_server_root,
|
|
Method::Get,
|
|
uri_path,
|
|
&headers,
|
|
None
|
|
).await;
|
|
|
|
assert_eq! (resp, expected);
|
|
}
|
|
|
|
let resp = internal_serve_all (
|
|
&file_server_root,
|
|
Method::Get,
|
|
bad_passwords_path,
|
|
&hashmap! {
|
|
"range".into () => b"bytes=0-2000000".to_vec (),
|
|
},
|
|
None
|
|
).await;
|
|
|
|
assert_eq! (resp, RangeNotSatisfiable (1_048_576));
|
|
|
|
let resp = internal_serve_all (
|
|
&file_server_root,
|
|
Method::Head,
|
|
bad_passwords_path,
|
|
&headers,
|
|
None
|
|
).await;
|
|
|
|
assert_eq! (resp, ServeFile (ServeFileParams {
|
|
send_body: false,
|
|
range: 0..1_048_576,
|
|
range_requested: false,
|
|
file: AlwaysEqual::testing_blank (),
|
|
}));
|
|
}
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn parse_uri () {
|
|
use hyper::Uri;
|
|
|
|
assert! (Uri::from_maybe_shared ("/").is_ok ());
|
|
}
|
|
|
|
#[test]
|
|
fn markdown () {
|
|
use super::*;
|
|
|
|
for (input, expected) in vec! [
|
|
("", ""),
|
|
(
|
|
"Hello world, this is a ~~complicated~~ *very simple* example.",
|
|
"<p>Hello world, this is a <del>complicated</del> <em>very simple</em> example.</p>\n"
|
|
),
|
|
].into_iter () {
|
|
let mut out = String::default ();
|
|
render_markdown (input.as_bytes (), &mut out).unwrap ();
|
|
assert_eq! (expected, &out);
|
|
}
|
|
}
|
|
}
|