v/vlib/vweb/vweb.v

664 lines
17 KiB
V
Raw Normal View History

// Copyright (c) 2019-2021 Alexander Medvednikov. All rights reserved.
2019-10-24 18:44:49 +02:00
// Use of this source code is governed by an MIT license
// that can be found in the LICENSE file.
2019-07-29 18:21:36 +02:00
module vweb
2020-04-26 13:49:31 +02:00
import os
import io
2020-04-26 13:49:31 +02:00
import net
import net.http
import net.urllib
import strings
2020-06-23 21:02:17 +02:00
import time
2019-07-29 18:21:36 +02:00
pub const (
methods_with_form = [http.Method.post, .put, .patch]
2020-12-18 07:34:06 +01:00
methods_without_first = ['ost', 'ut', 'et', 'atch', 'ptions', 'elete', 'ead'] // needed for method checking as method parameter
header_server = 'Server: VWeb\r\n'
2020-05-22 17:36:09 +02:00
header_connection_close = 'Connection: close\r\n'
headers_close = '$header_server$header_connection_close\r\n'
http_404 = 'HTTP/1.1 404 Not Found\r\nContent-Type: text/plain\r\nContent-Length: 13\r\n${headers_close}404 Not Found'
http_500 = 'HTTP/1.1 500 Internal Server Error\r\nContent-Type: text/plain\r\n${headers_close}500 Internal Server Error'
mime_types = map{
'.css': 'text/css; charset=utf-8'
'.gif': 'image/gif'
'.htm': 'text/html; charset=utf-8'
'.html': 'text/html; charset=utf-8'
'.jpg': 'image/jpeg'
'.js': 'application/javascript'
'.json': 'application/json'
'.md': 'text/markdown; charset=utf-8'
'.pdf': 'application/pdf'
'.png': 'image/png'
'.svg': 'image/svg+xml'
'.txt': 'text/plain; charset=utf-8'
'.wasm': 'application/wasm'
'.xml': 'text/xml; charset=utf-8'
2019-09-05 14:46:24 +02:00
}
max_http_post_size = 1024 * 1024
default_port = 8080
)
2019-10-24 18:44:49 +02:00
pub struct Context {
2020-05-27 06:53:48 +02:00
mut:
content_type string = 'text/plain'
status string = '200 OK'
2019-10-24 18:44:49 +02:00
pub:
req http.Request
2019-10-24 18:44:49 +02:00
// TODO Response
2020-05-27 03:38:21 +02:00
pub mut:
conn &net.TcpConn
2020-12-31 17:07:24 +01:00
static_files map[string]string
static_mime_types map[string]string
form map[string]string
query map[string]string
files map[string][]FileData
headers string // response headers
done bool
page_gen_start i64
form_error string
chunked_transfer bool
max_chunk_len int = 20
2019-09-05 14:46:24 +02:00
}
struct FileData {
pub:
filename string
content_type string
data string
}
2021-01-01 17:24:54 +01:00
// declaring init_once in your App struct is optional
pub fn (ctx Context) init_once() {}
// declaring init in your App struct is optional
pub fn (ctx Context) init() {}
pub struct Cookie {
name string
value string
expires time.Time
secure bool
http_only bool
}
2021-01-08 04:49:13 +01:00
[noinit]
pub struct Result {
}
2020-06-20 03:12:35 +02:00
// vweb intern function
2020-12-31 17:07:24 +01:00
pub fn (mut ctx Context) send_response_to_client(mimetype string, res string) bool {
if ctx.done {
return false
}
ctx.done = true
mut sb := strings.new_builder(1024)
defer {
unsafe { sb.free() }
}
sb.write_string('HTTP/1.1 $ctx.status')
sb.write_string('\r\nContent-Type: $mimetype')
sb.write_string('\r\nContent-Length: $res.len')
if ctx.chunked_transfer {
sb.write_string('\r\nTransfer-Encoding: chunked')
}
sb.write_string(ctx.headers)
sb.write_string('\r\n')
sb.write_string(vweb.headers_close)
if ctx.chunked_transfer {
mut i := 0
mut len := res.len
for {
if len <= 0 {
break
}
mut chunk := ''
if len > ctx.max_chunk_len {
chunk = res[i..i + ctx.max_chunk_len]
i += ctx.max_chunk_len
len -= ctx.max_chunk_len
} else {
chunk = res[i..]
len = 0
}
sb.write_string(chunk.len.hex())
sb.write_string('\r\n$chunk\r\n')
}
sb.write_string('0\r\n\r\n') // End of chunks
} else {
sb.write_string(res)
}
2020-06-28 19:55:53 +02:00
s := sb.str()
defer {
unsafe { s.free() }
2020-06-28 19:55:53 +02:00
}
send_string(mut ctx.conn, s) or { return false }
return true
}
// Response HTTP_OK with s as payload with content-type `text/html`
2021-01-08 05:05:29 +01:00
pub fn (mut ctx Context) html(s string) Result {
ctx.send_response_to_client('text/html', s)
2021-01-08 05:05:29 +01:00
return Result{}
2019-09-05 14:46:24 +02:00
}
// Response HTTP_OK with s as payload with content-type `text/plain`
2020-06-27 13:56:15 +02:00
pub fn (mut ctx Context) text(s string) Result {
ctx.send_response_to_client('text/plain', s)
2020-06-27 23:22:37 +02:00
return Result{}
2019-09-05 14:46:24 +02:00
}
2019-07-29 18:21:36 +02:00
// Response HTTP_OK with s as payload with content-type `application/json`
2020-06-27 13:56:15 +02:00
pub fn (mut ctx Context) json(s string) Result {
ctx.send_response_to_client('application/json', s)
2020-06-27 23:22:37 +02:00
return Result{}
}
// Response HTTP_OK with s as payload
2020-06-27 23:22:37 +02:00
pub fn (mut ctx Context) ok(s string) Result {
ctx.send_response_to_client(ctx.content_type, s)
return Result{}
2019-09-05 14:46:24 +02:00
}
2019-07-29 18:21:36 +02:00
// Response a server error
pub fn (mut ctx Context) server_error(ecode int) Result {
$if debug {
eprintln('> ctx.server_error ecode: $ecode')
}
if ctx.done {
return Result{}
}
send_string(mut ctx.conn, vweb.http_500) or { }
return Result{}
}
// Redirect to an url
2020-06-30 21:04:00 +02:00
pub fn (mut ctx Context) redirect(url string) Result {
if ctx.done {
return Result{}
}
ctx.done = true
2021-01-25 10:26:20 +01:00
send_string(mut ctx.conn, 'HTTP/1.1 302 Found\r\nLocation: $url$ctx.headers\r\n$vweb.headers_close') or {
return Result{}
}
2020-06-30 21:04:00 +02:00
return Result{}
2019-09-05 14:46:24 +02:00
}
2019-07-29 18:21:36 +02:00
// Send an not_found response
2020-06-27 13:56:15 +02:00
pub fn (mut ctx Context) not_found() Result {
if ctx.done {
return Result{}
}
ctx.done = true
2021-01-25 10:26:20 +01:00
send_string(mut ctx.conn, vweb.http_404) or { }
return Result{}
2019-09-05 14:46:24 +02:00
}
2019-08-02 04:04:48 +02:00
// Enables chunk transfer with max_chunk_len per chunk
pub fn (mut ctx Context) enable_chunked_transfer(max_chunk_len int) {
ctx.chunked_transfer = true
ctx.max_chunk_len = max_chunk_len
}
// Sets a cookie
pub fn (mut ctx Context) set_cookie(cookie Cookie) {
mut cookie_data := []string{}
mut secure := if cookie.secure { 'Secure;' } else { '' }
secure += if cookie.http_only { ' HttpOnly' } else { ' ' }
cookie_data << secure
if cookie.expires.unix > 0 {
cookie_data << 'expires=$cookie.expires.utc_string()'
}
data := cookie_data.join(' ')
ctx.add_header('Set-Cookie', '$cookie.name=$cookie.value; $data')
}
// Old function
[deprecated]
pub fn (mut ctx Context) set_cookie_old(key string, val string) {
// TODO support directives, escape cookie value (https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie)
// ctx.add_header('Set-Cookie', '${key}=${val}; Secure; HttpOnly')
ctx.add_header('Set-Cookie', '$key=$val; HttpOnly')
2019-09-05 14:46:24 +02:00
}
2019-07-29 18:21:36 +02:00
// Sets the response content type
2020-06-27 23:22:37 +02:00
pub fn (mut ctx Context) set_content_type(typ string) {
ctx.content_type = typ
}
// Sets a cookie with a `expire_data`
pub fn (mut ctx Context) set_cookie_with_expire_date(key string, val string, expire_date time.Time) {
ctx.add_header('Set-Cookie', '$key=$val; Secure; HttpOnly; expires=$expire_date.utc_string()')
2020-06-29 21:14:36 +02:00
}
// Gets a cookie by a key
pub fn (ctx &Context) get_cookie(key string) ?string { // TODO refactor
2019-12-13 19:11:40 +01:00
mut cookie_header := ctx.get_header('cookie')
if cookie_header == '' {
cookie_header = ctx.get_header('Cookie')
}
cookie_header = ' ' + cookie_header
// println('cookie_header="$cookie_header"')
// println(ctx.req.headers)
cookie := if cookie_header.contains(';') {
cookie_header.find_between(' $key=', ';')
} else {
cookie_header.find_between(' $key=', '\r')
}
2019-09-05 14:46:24 +02:00
if cookie != '' {
2019-12-07 23:48:49 +01:00
return cookie.trim_space()
2019-09-05 14:46:24 +02:00
}
return error('Cookie not found')
}
2019-07-29 18:21:36 +02:00
// Sets the response status
2020-08-09 18:05:06 +02:00
pub fn (mut ctx Context) set_status(code int, desc string) {
if code < 100 || code > 599 {
ctx.status = '500 Internal Server Error'
} else {
ctx.status = '$code $desc'
}
}
// Adds an header to the response with key and val
pub fn (mut ctx Context) add_header(key string, val string) {
// println('add_header($key, $val)')
ctx.headers = ctx.headers + '\r\n$key: $val'
// println(ctx.headers)
2019-07-29 18:21:36 +02:00
}
// Returns the header data from the key
pub fn (ctx &Context) get_header(key string) string {
return ctx.req.lheaders[key.to_lower()]
2019-09-05 14:46:24 +02:00
}
2019-07-29 18:21:36 +02:00
2019-12-20 01:02:16 +01:00
pub fn run<T>(port int) {
mut app := T{}
run_app<T>(mut app, port)
2020-06-10 11:23:41 +02:00
}
pub fn run_app<T>(mut app T, port int) {
mut l := net.listen_tcp(port) or { panic('failed to listen') }
println('[Vweb] Running app on http://localhost:$port')
app.Context = Context{
conn: 0
}
2020-06-10 11:23:41 +02:00
app.init_once()
$for method in T.methods {
$if method.return_type is Result {
// check routes for validity
}
}
2019-07-29 18:21:36 +02:00
for {
mut conn := l.accept() or { panic('accept() failed') }
// TODO: running handle_conn concurrently results in a race-condition
handle_conn<T>(mut conn, mut app)
2019-12-20 01:02:16 +01:00
}
}
2019-12-13 19:11:40 +01:00
fn handle_conn<T>(mut conn net.TcpConn, mut app T) {
2021-01-21 11:08:38 +01:00
conn.set_read_timeout(30 * time.second)
conn.set_write_timeout(30 * time.second)
defer {
conn.close() or { }
}
mut reader := io.new_buffered_reader(reader: io.make_reader(conn))
2020-06-23 21:02:17 +02:00
page_gen_start := time.ticks()
2021-03-01 11:50:52 +01:00
req := parse_request(mut reader) or {
eprintln('error parsing request: $err')
return
}
2020-12-31 17:07:24 +01:00
app.Context = Context{
2019-12-20 01:02:16 +01:00
req: req
conn: conn
form: map[string]string{}
2020-12-31 17:07:24 +01:00
static_files: app.static_files
static_mime_types: app.static_mime_types
2020-06-23 21:02:17 +02:00
page_gen_start: page_gen_start
2019-12-20 01:02:16 +01:00
}
2021-01-25 10:26:20 +01:00
if req.method in vweb.methods_with_form {
if 'multipart/form-data' in req.lheaders['content-type'].split('; ') {
boundary := req.lheaders['content-type'].split('; ').filter(it.starts_with('boundary '))
if boundary.len != 1 {
// TODO: send 400 error
return
}
app.parse_multipart_form(req.data, boundary[0][9..])
} else {
app.parse_form(req.data)
}
2019-12-20 01:02:16 +01:00
}
// Serve a static file if it is one
2021-03-01 11:50:52 +01:00
// TODO: get the real path
url := urllib.parse(app.req.url.to_lower()) or {
eprintln('error parsing path: $err')
2020-06-05 21:04:18 +02:00
return
2020-03-07 14:16:03 +01:00
}
2021-03-01 11:50:52 +01:00
if serve_static<T>(mut app, url) {
// successfully served a static file
return
}
app.init()
2019-12-20 01:02:16 +01:00
// Call the right action
2020-08-31 19:39:46 +02:00
$if debug {
println('route matching...')
}
2021-03-01 11:50:52 +01:00
url_words := url.path.split('/').filter(it != '')
// copy query args to app.query
for k, v in url.query().data {
app.query[k] = v.data[0]
2020-07-07 12:35:45 +02:00
}
2021-03-01 11:50:52 +01:00
$for method in T.methods {
$if method.return_type is Result {
2021-03-01 11:50:52 +01:00
mut method_args := []string{}
// TODO: move to server start
http_methods, route_path := parse_attrs(method.name, method.attrs) or {
eprintln('error parsing method attributes: $err')
return
}
2021-01-21 11:08:38 +01:00
2021-03-01 11:50:52 +01:00
// Used for route matching
route_words := route_path.split('/').filter(it != '')
// Skip if the HTTP request method does not match the attributes
if app.req.method in http_methods {
// Route immediate matches first
// For example URL `/register` matches route `/:user`, but `fn register()`
// should be called first.
if !route_path.contains('/:') && url_words == route_words {
// We found a match
app.$method(method_args)
return
2020-07-23 17:19:37 +02:00
}
2021-03-01 11:50:52 +01:00
if url_words.len == 0 && route_words == ['index'] && method.name == 'index' {
app.$method(method_args)
return
}
if params := route_matches(url_words, route_words) {
method_args = params.clone()
if method_args.len != method.args.len {
eprintln('warning: uneven parameters count ($method.args.len) in `$method.name`, compared to the vweb route `$method.attrs` ($method_args.len)')
}
2021-03-01 11:50:52 +01:00
app.$method(method_args)
return
}
}
}
}
2021-03-01 11:50:52 +01:00
// site not found
send_string(mut conn, vweb.http_404) or { }
}
fn route_matches(url_words []string, route_words []string) ?[]string {
// URL path should be at least as long as the route path
if url_words.len < route_words.len {
return none
}
2021-03-01 11:50:52 +01:00
mut params := []string{cap: url_words.len}
if url_words.len == route_words.len {
for i in 0 .. url_words.len {
if route_words[i].starts_with(':') {
// We found a path paramater
params << url_words[i]
} else if route_words[i] != url_words[i] {
// This url does not match the route
return none
}
}
return params
}
// The last route can end with ... indicating an array
if !route_words[route_words.len - 1].ends_with('...') {
return none
}
for i in 0 .. route_words.len - 1 {
if route_words[i].starts_with(':') {
// We found a path paramater
params << url_words[i]
} else if route_words[i] != url_words[i] {
// This url does not match the route
return none
}
}
params << url_words[route_words.len - 1..url_words.len].join('/')
return params
}
// parse function attribute list for methods and a path
fn parse_attrs(name string, attrs []string) ?([]http.Method, string) {
if attrs.len == 0 {
return [http.Method.get], '/$name'
}
mut x := attrs.clone()
mut methods := []http.Method{}
mut path := ''
for i := 0; i < x.len; {
attr := x[i]
attru := attr.to_upper()
m := http.method_from_str(attru)
if attru == 'GET' || m != .get {
methods << m
x.delete(i)
continue
}
if attr.starts_with('/') {
if path != '' {
return error('Expected at most one path attribute')
}
2021-03-01 11:50:52 +01:00
path = attr
x.delete(i)
continue
2020-07-08 15:22:03 +02:00
}
2021-03-01 11:50:52 +01:00
i++
}
if x.len > 0 {
return error('Encountered unexpected extra attributes: $x')
}
if methods.len == 0 {
methods = [http.Method.get]
}
if path == '' {
path = '/$name'
2019-07-29 18:21:36 +02:00
}
2021-03-01 11:50:52 +01:00
// Make path lowercase for case-insensitive comparisons
return methods, path.to_lower()
}
// check if request is for a static file and serves it
// returns true if we served a static file, false otherwise
fn serve_static<T>(mut app T, url urllib.URL) bool {
// TODO: handle url parameters properly - for now, ignore them
static_file := app.static_files[url.path]
mime_type := app.static_mime_types[url.path]
if static_file == '' || mime_type == '' {
return false
}
data := os.read_file(static_file) or {
send_string(mut app.conn, vweb.http_404) or { }
return true
}
app.send_response_to_client(mime_type, data)
unsafe { data.free() }
return true
2019-09-05 14:46:24 +02:00
}
2019-07-29 18:21:36 +02:00
// vweb intern function
2020-12-31 17:07:24 +01:00
pub fn (mut ctx Context) parse_form(s string) {
2021-01-25 10:26:20 +01:00
if ctx.req.method !in vweb.methods_with_form {
2019-10-24 18:44:49 +02:00
return
}
// pos := s.index('\r\n\r\n')
// if pos > -1 {
mut str_form := s // [pos..s.len]
2019-11-26 11:54:41 +01:00
str_form = str_form.replace('+', ' ')
words := str_form.split('&')
for word in words {
$if debug {
println('parse form keyval="$word"')
}
keyval := word.trim_space().split('=')
if keyval.len != 2 {
continue
}
key := urllib.query_unescape(keyval[0]) or { continue }
val := urllib.query_unescape(keyval[1]) or { continue }
2019-11-26 11:54:41 +01:00
$if debug {
println('http form "$key" => "$val"')
2019-07-29 18:21:36 +02:00
}
2019-11-26 11:54:41 +01:00
ctx.form[key] = val
2019-07-29 18:21:36 +02:00
}
// }
2019-12-11 17:20:46 +01:00
// todo: parse form-data and application/json
// ...
2019-09-05 14:46:24 +02:00
}
2019-07-29 18:21:36 +02:00
// vweb intern function
[manualfree]
pub fn (mut ctx Context) parse_multipart_form(s string, b string) {
2021-01-25 10:26:20 +01:00
if ctx.req.method !in vweb.methods_with_form {
return
}
a := s.split('$b')[1..]
fields := a[..a.len - 1]
for field in fields {
lines := field.split_into_lines()[1..]
mut l := 0
// Parse name
disposition_data := lines[l].split('; ')[1..]
l++
name := disposition_data[0][6..disposition_data[0].len - 1]
// Parse files
if disposition_data.len > 1 {
filename := disposition_data[1][10..disposition_data[1].len - 1]
ct := lines[l].split(': ')[1]
l++
if name !in ctx.files {
ctx.files[name] = []FileData{}
}
mut sb := strings.new_builder(field.len)
for i in l + 1 .. lines.len - 1 {
sb.writeln(lines[i])
}
ctx.files[name] << FileData{
filename: filename
content_type: ct
data: sb.str()
}
unsafe {
sb.free()
}
continue
}
mut sb := strings.new_builder(field.len)
for i in l + 1 .. lines.len - 1 {
sb.writeln(lines[i])
}
ctx.form[name] = sb.str()
unsafe {
disposition_data.free()
name.free()
sb.free()
}
}
}
fn (mut ctx Context) scan_static_directory(directory_path string, mount_path string) {
files := os.ls(directory_path) or { panic(err) }
if files.len > 0 {
2019-09-05 14:46:24 +02:00
for file in files {
full_path := directory_path + '/' + file
if os.is_dir(full_path) {
ctx.scan_static_directory(full_path, mount_path + '/' + file)
} else if file.contains('.') && !file.starts_with('.') && !file.ends_with('.') {
2020-03-26 14:18:08 +01:00
ext := os.file_ext(file)
2020-03-07 14:16:03 +01:00
// Rudimentary guard against adding files not in mime_types.
// Use serve_static directly to add non-standard mime types.
2021-01-25 10:26:20 +01:00
if ext in vweb.mime_types {
ctx.serve_static(mount_path + '/' + file, full_path, vweb.mime_types[ext])
2020-03-07 14:16:03 +01:00
}
}
}
}
}
// Handles a directory static
// If `root` is set the mount path for the dir will be in '/'
pub fn (mut ctx Context) handle_static(directory_path string, root bool) bool {
if ctx.done || !os.exists(directory_path) {
2020-03-07 14:16:03 +01:00
return false
}
dir_path := directory_path.trim_space().trim_right('/')
2020-03-07 14:16:03 +01:00
mut mount_path := ''
if dir_path != '.' && os.is_dir(dir_path) && !root {
// Mount point hygene, "./assets" => "/assets".
mount_path = '/' + dir_path.trim_left('.').trim('/')
2019-10-24 18:44:49 +02:00
}
ctx.scan_static_directory(dir_path, mount_path)
2020-03-07 14:16:03 +01:00
return true
2019-10-24 18:44:49 +02:00
}
// Serves a file static
// `url` is the access path on the site, `file_path` is the real path to the file, `mime_type` is the file type
pub fn (mut ctx Context) serve_static(url string, file_path string, mime_type string) {
2019-10-24 18:44:49 +02:00
ctx.static_files[url] = file_path
ctx.static_mime_types[url] = mime_type
}
2019-12-11 17:20:46 +01:00
// Returns the ip address from the current user
2020-07-16 00:48:10 +02:00
pub fn (ctx &Context) ip() string {
mut ip := ctx.req.lheaders['x-forwarded-for']
2020-07-16 21:23:35 +02:00
if ip == '' {
ip = ctx.req.lheaders['x-real-ip']
2020-07-16 21:23:35 +02:00
}
2020-07-16 21:23:35 +02:00
if ip.contains(',') {
ip = ip.all_before(',')
}
if ip == '' {
ip = ctx.conn.peer_ip() or { '' }
}
2020-07-16 21:23:35 +02:00
return ip
2020-07-16 00:48:10 +02:00
}
// Set s to the form error
2020-07-07 21:35:56 +02:00
pub fn (mut ctx Context) error(s string) {
ctx.form_error = s
}
2019-12-11 17:20:46 +01:00
fn strip(s string) string {
// strip('\nabc\r\n') => 'abc'
return s.trim('\r\n')
}
2020-06-22 17:13:57 +02:00
// Returns an empty result
2020-06-22 17:13:57 +02:00
pub fn not_found() Result {
return Result{}
}
fn filter(s string) string {
2020-06-24 22:38:25 +02:00
return s.replace_each([
'<',
'&lt;',
'"',
'&quot;',
'&',
'&amp;',
2020-06-24 22:38:25 +02:00
])
}
// A type which don't get filtered inside templates
pub type RawHtml = string
fn send_string(mut conn net.TcpConn, s string) ? {
conn.write(s.bytes()) ?
}