2021-01-18 13:20:06 +01:00
|
|
|
// Copyright (c) 2019-2021 Alexander Medvednikov. All rights reserved.
|
2019-10-24 18:44:49 +02:00
|
|
|
// Use of this source code is governed by an MIT license
|
|
|
|
// that can be found in the LICENSE file.
|
2019-07-29 18:21:36 +02:00
|
|
|
module vweb
|
|
|
|
|
2020-04-26 13:49:31 +02:00
|
|
|
import os
|
2020-11-15 21:54:47 +01:00
|
|
|
import io
|
2020-04-26 13:49:31 +02:00
|
|
|
import net
|
|
|
|
import net.http
|
|
|
|
import net.urllib
|
|
|
|
import strings
|
2020-06-23 21:02:17 +02:00
|
|
|
import time
|
2019-07-29 18:21:36 +02:00
|
|
|
|
2019-12-23 11:24:53 +01:00
|
|
|
pub const (
|
2020-11-14 12:55:10 +01:00
|
|
|
methods_with_form = [http.Method.post, .put, .patch]
|
|
|
|
header_server = 'Server: VWeb\r\n'
|
2020-05-22 17:36:09 +02:00
|
|
|
header_connection_close = 'Connection: close\r\n'
|
2020-11-14 12:55:10 +01:00
|
|
|
headers_close = '$header_server$header_connection_close\r\n'
|
2021-03-04 17:00:03 +01:00
|
|
|
// TODO: use http.response structs
|
|
|
|
http_400 = 'HTTP/1.1 400 Bad Request\r\nContent-Type: text/plain\r\nContent-Length: 15\r\n${headers_close}400 Bad Request'
|
2020-11-14 12:55:10 +01:00
|
|
|
http_404 = 'HTTP/1.1 404 Not Found\r\nContent-Type: text/plain\r\nContent-Length: 13\r\n${headers_close}404 Not Found'
|
|
|
|
http_500 = 'HTTP/1.1 500 Internal Server Error\r\nContent-Type: text/plain\r\n${headers_close}500 Internal Server Error'
|
2021-02-08 15:57:42 +01:00
|
|
|
mime_types = map{
|
2020-12-27 10:38:12 +01:00
|
|
|
'.css': 'text/css; charset=utf-8'
|
|
|
|
'.gif': 'image/gif'
|
|
|
|
'.htm': 'text/html; charset=utf-8'
|
2020-11-14 12:55:10 +01:00
|
|
|
'.html': 'text/html; charset=utf-8'
|
2020-12-27 10:38:12 +01:00
|
|
|
'.jpg': 'image/jpeg'
|
|
|
|
'.js': 'application/javascript'
|
2020-11-14 12:55:10 +01:00
|
|
|
'.json': 'application/json'
|
2020-12-27 10:38:12 +01:00
|
|
|
'.md': 'text/markdown; charset=utf-8'
|
|
|
|
'.pdf': 'application/pdf'
|
|
|
|
'.png': 'image/png'
|
|
|
|
'.svg': 'image/svg+xml'
|
|
|
|
'.txt': 'text/plain; charset=utf-8'
|
2020-11-14 12:55:10 +01:00
|
|
|
'.wasm': 'application/wasm'
|
2020-12-27 10:38:12 +01:00
|
|
|
'.xml': 'text/xml; charset=utf-8'
|
2019-09-05 14:46:24 +02:00
|
|
|
}
|
2021-04-29 01:17:37 +02:00
|
|
|
max_http_post_size = 1024 * 1024
|
|
|
|
default_port = 8080
|
2019-08-10 09:12:17 +02:00
|
|
|
)
|
|
|
|
|
2019-10-24 18:44:49 +02:00
|
|
|
pub struct Context {
|
2020-05-27 06:53:48 +02:00
|
|
|
mut:
|
2021-01-12 04:38:43 +01:00
|
|
|
content_type string = 'text/plain'
|
|
|
|
status string = '200 OK'
|
2019-10-24 18:44:49 +02:00
|
|
|
pub:
|
2021-01-20 11:11:01 +01:00
|
|
|
req http.Request
|
2019-10-24 18:44:49 +02:00
|
|
|
// TODO Response
|
2020-05-27 03:38:21 +02:00
|
|
|
pub mut:
|
2021-01-20 11:11:01 +01:00
|
|
|
conn &net.TcpConn
|
2020-12-31 17:07:24 +01:00
|
|
|
static_files map[string]string
|
|
|
|
static_mime_types map[string]string
|
2020-11-14 12:55:10 +01:00
|
|
|
form map[string]string
|
|
|
|
query map[string]string
|
2021-01-21 11:08:51 +01:00
|
|
|
files map[string][]FileData
|
2020-11-14 12:55:10 +01:00
|
|
|
headers string // response headers
|
|
|
|
done bool
|
|
|
|
page_gen_start i64
|
|
|
|
form_error string
|
2021-01-18 13:04:21 +01:00
|
|
|
chunked_transfer bool
|
|
|
|
max_chunk_len int = 20
|
2019-09-05 14:46:24 +02:00
|
|
|
}
|
|
|
|
|
2021-01-21 11:08:51 +01:00
|
|
|
struct FileData {
|
|
|
|
pub:
|
|
|
|
filename string
|
|
|
|
content_type string
|
|
|
|
data string
|
|
|
|
}
|
|
|
|
|
2021-03-30 14:30:16 +02:00
|
|
|
struct UnexpectedExtraAttributeError {
|
|
|
|
msg string
|
|
|
|
code int
|
|
|
|
}
|
|
|
|
|
|
|
|
struct MultiplePathAttributesError {
|
|
|
|
msg string = 'Expected at most one path attribute'
|
|
|
|
code int
|
|
|
|
}
|
|
|
|
|
2021-04-15 05:27:24 +02:00
|
|
|
// declaring init_server in your App struct is optional
|
|
|
|
pub fn (ctx Context) init_server() {}
|
2021-01-01 17:24:54 +01:00
|
|
|
|
2021-04-15 05:27:24 +02:00
|
|
|
// declaring before_request in your App struct is optional
|
|
|
|
pub fn (ctx Context) before_request() {}
|
2021-01-01 17:24:54 +01:00
|
|
|
|
2020-07-05 16:44:23 +02:00
|
|
|
pub struct Cookie {
|
2020-11-14 12:55:10 +01:00
|
|
|
name string
|
|
|
|
value string
|
|
|
|
expires time.Time
|
|
|
|
secure bool
|
2020-07-05 16:44:23 +02:00
|
|
|
http_only bool
|
|
|
|
}
|
|
|
|
|
2021-01-08 04:49:13 +01:00
|
|
|
[noinit]
|
2020-11-14 12:55:10 +01:00
|
|
|
pub struct Result {
|
|
|
|
}
|
2020-06-20 03:12:35 +02:00
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// vweb intern function
|
2021-03-11 23:11:39 +01:00
|
|
|
[manualfree]
|
2020-12-31 17:07:24 +01:00
|
|
|
pub fn (mut ctx Context) send_response_to_client(mimetype string, res string) bool {
|
2020-11-14 12:55:10 +01:00
|
|
|
if ctx.done {
|
|
|
|
return false
|
|
|
|
}
|
2019-12-11 15:32:54 +01:00
|
|
|
ctx.done = true
|
|
|
|
mut sb := strings.new_builder(1024)
|
2020-11-14 12:55:10 +01:00
|
|
|
defer {
|
2021-02-15 16:15:52 +01:00
|
|
|
unsafe { sb.free() }
|
2020-11-14 12:55:10 +01:00
|
|
|
}
|
2021-02-22 12:18:11 +01:00
|
|
|
sb.write_string('HTTP/1.1 $ctx.status')
|
|
|
|
sb.write_string('\r\nContent-Type: $mimetype')
|
|
|
|
sb.write_string('\r\nContent-Length: $res.len')
|
2021-01-18 13:04:21 +01:00
|
|
|
if ctx.chunked_transfer {
|
2021-02-22 12:18:11 +01:00
|
|
|
sb.write_string('\r\nTransfer-Encoding: chunked')
|
2021-01-18 13:04:21 +01:00
|
|
|
}
|
2021-02-22 12:18:11 +01:00
|
|
|
sb.write_string(ctx.headers)
|
|
|
|
sb.write_string('\r\n')
|
|
|
|
sb.write_string(vweb.headers_close)
|
2021-01-18 13:04:21 +01:00
|
|
|
if ctx.chunked_transfer {
|
|
|
|
mut i := 0
|
|
|
|
mut len := res.len
|
|
|
|
for {
|
|
|
|
if len <= 0 {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
mut chunk := ''
|
|
|
|
if len > ctx.max_chunk_len {
|
|
|
|
chunk = res[i..i + ctx.max_chunk_len]
|
|
|
|
i += ctx.max_chunk_len
|
|
|
|
len -= ctx.max_chunk_len
|
|
|
|
} else {
|
|
|
|
chunk = res[i..]
|
|
|
|
len = 0
|
|
|
|
}
|
2021-02-22 12:18:11 +01:00
|
|
|
sb.write_string(chunk.len.hex())
|
|
|
|
sb.write_string('\r\n$chunk\r\n')
|
2021-01-18 13:04:21 +01:00
|
|
|
}
|
2021-02-22 12:18:11 +01:00
|
|
|
sb.write_string('0\r\n\r\n') // End of chunks
|
2021-01-18 13:04:21 +01:00
|
|
|
} else {
|
2021-02-22 12:18:11 +01:00
|
|
|
sb.write_string(res)
|
2021-01-18 13:04:21 +01:00
|
|
|
}
|
2020-06-28 19:55:53 +02:00
|
|
|
s := sb.str()
|
|
|
|
defer {
|
2021-02-14 19:31:42 +01:00
|
|
|
unsafe { s.free() }
|
2020-06-28 19:55:53 +02:00
|
|
|
}
|
2021-01-20 11:11:01 +01:00
|
|
|
send_string(mut ctx.conn, s) or { return false }
|
2019-12-11 15:32:54 +01:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Response HTTP_OK with s as payload with content-type `text/html`
|
2021-01-08 05:05:29 +01:00
|
|
|
pub fn (mut ctx Context) html(s string) Result {
|
2019-12-11 15:32:54 +01:00
|
|
|
ctx.send_response_to_client('text/html', s)
|
2021-01-08 05:05:29 +01:00
|
|
|
return Result{}
|
2019-09-05 14:46:24 +02:00
|
|
|
}
|
2019-07-30 15:46:10 +02:00
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Response HTTP_OK with s as payload with content-type `text/plain`
|
2020-06-27 13:56:15 +02:00
|
|
|
pub fn (mut ctx Context) text(s string) Result {
|
2019-12-11 15:32:54 +01:00
|
|
|
ctx.send_response_to_client('text/plain', s)
|
2020-06-27 23:22:37 +02:00
|
|
|
return Result{}
|
2019-09-05 14:46:24 +02:00
|
|
|
}
|
2019-07-29 18:21:36 +02:00
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Response HTTP_OK with s as payload with content-type `application/json`
|
2020-06-27 13:56:15 +02:00
|
|
|
pub fn (mut ctx Context) json(s string) Result {
|
2019-12-11 15:32:54 +01:00
|
|
|
ctx.send_response_to_client('application/json', s)
|
2020-06-27 23:22:37 +02:00
|
|
|
return Result{}
|
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Response HTTP_OK with s as payload
|
2020-06-27 23:22:37 +02:00
|
|
|
pub fn (mut ctx Context) ok(s string) Result {
|
|
|
|
ctx.send_response_to_client(ctx.content_type, s)
|
|
|
|
return Result{}
|
2019-09-05 14:46:24 +02:00
|
|
|
}
|
2019-07-29 18:21:36 +02:00
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Response a server error
|
2021-02-03 14:40:06 +01:00
|
|
|
pub fn (mut ctx Context) server_error(ecode int) Result {
|
|
|
|
$if debug {
|
|
|
|
eprintln('> ctx.server_error ecode: $ecode')
|
|
|
|
}
|
|
|
|
if ctx.done {
|
|
|
|
return Result{}
|
|
|
|
}
|
2021-03-06 20:04:51 +01:00
|
|
|
send_string(mut ctx.conn, vweb.http_500) or {}
|
2021-02-03 14:40:06 +01:00
|
|
|
return Result{}
|
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Redirect to an url
|
2020-06-30 21:04:00 +02:00
|
|
|
pub fn (mut ctx Context) redirect(url string) Result {
|
2020-11-14 12:55:10 +01:00
|
|
|
if ctx.done {
|
|
|
|
return Result{}
|
|
|
|
}
|
2019-12-11 15:32:54 +01:00
|
|
|
ctx.done = true
|
2021-01-25 10:26:20 +01:00
|
|
|
send_string(mut ctx.conn, 'HTTP/1.1 302 Found\r\nLocation: $url$ctx.headers\r\n$vweb.headers_close') or {
|
2020-12-27 10:38:12 +01:00
|
|
|
return Result{}
|
|
|
|
}
|
2020-06-30 21:04:00 +02:00
|
|
|
return Result{}
|
2019-09-05 14:46:24 +02:00
|
|
|
}
|
2019-07-29 18:21:36 +02:00
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Send an not_found response
|
2020-06-27 13:56:15 +02:00
|
|
|
pub fn (mut ctx Context) not_found() Result {
|
2020-11-14 12:55:10 +01:00
|
|
|
if ctx.done {
|
|
|
|
return Result{}
|
|
|
|
}
|
2019-12-11 15:32:54 +01:00
|
|
|
ctx.done = true
|
2021-03-06 20:04:51 +01:00
|
|
|
send_string(mut ctx.conn, vweb.http_404) or {}
|
2020-12-27 10:38:12 +01:00
|
|
|
return Result{}
|
2019-09-05 14:46:24 +02:00
|
|
|
}
|
2019-08-02 04:04:48 +02:00
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Enables chunk transfer with max_chunk_len per chunk
|
2021-01-18 13:04:21 +01:00
|
|
|
pub fn (mut ctx Context) enable_chunked_transfer(max_chunk_len int) {
|
|
|
|
ctx.chunked_transfer = true
|
|
|
|
ctx.max_chunk_len = max_chunk_len
|
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Sets a cookie
|
2020-07-05 16:44:23 +02:00
|
|
|
pub fn (mut ctx Context) set_cookie(cookie Cookie) {
|
2020-07-19 21:42:50 +02:00
|
|
|
mut cookie_data := []string{}
|
2020-11-14 12:55:10 +01:00
|
|
|
mut secure := if cookie.secure { 'Secure;' } else { '' }
|
|
|
|
secure += if cookie.http_only { ' HttpOnly' } else { ' ' }
|
2020-07-19 21:42:50 +02:00
|
|
|
cookie_data << secure
|
|
|
|
if cookie.expires.unix > 0 {
|
2020-11-14 12:55:10 +01:00
|
|
|
cookie_data << 'expires=$cookie.expires.utc_string()'
|
2020-07-19 21:42:50 +02:00
|
|
|
}
|
|
|
|
data := cookie_data.join(' ')
|
|
|
|
ctx.add_header('Set-Cookie', '$cookie.name=$cookie.value; $data')
|
2020-07-05 16:44:23 +02:00
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Old function
|
|
|
|
[deprecated]
|
2020-10-15 21:04:42 +02:00
|
|
|
pub fn (mut ctx Context) set_cookie_old(key string, val string) {
|
2019-12-11 15:32:54 +01:00
|
|
|
// TODO support directives, escape cookie value (https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie)
|
2020-11-14 12:55:10 +01:00
|
|
|
// ctx.add_header('Set-Cookie', '${key}=${val}; Secure; HttpOnly')
|
|
|
|
ctx.add_header('Set-Cookie', '$key=$val; HttpOnly')
|
2019-09-05 14:46:24 +02:00
|
|
|
}
|
2019-07-29 18:21:36 +02:00
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Sets the response content type
|
2020-06-27 23:22:37 +02:00
|
|
|
pub fn (mut ctx Context) set_content_type(typ string) {
|
|
|
|
ctx.content_type = typ
|
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Sets a cookie with a `expire_data`
|
2020-10-15 21:04:42 +02:00
|
|
|
pub fn (mut ctx Context) set_cookie_with_expire_date(key string, val string, expire_date time.Time) {
|
2020-11-14 12:55:10 +01:00
|
|
|
ctx.add_header('Set-Cookie', '$key=$val; Secure; HttpOnly; expires=$expire_date.utc_string()')
|
2020-06-29 21:14:36 +02:00
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Gets a cookie by a key
|
2019-12-06 13:24:53 +01:00
|
|
|
pub fn (ctx &Context) get_cookie(key string) ?string { // TODO refactor
|
2019-12-13 19:11:40 +01:00
|
|
|
mut cookie_header := ctx.get_header('cookie')
|
|
|
|
if cookie_header == '' {
|
|
|
|
cookie_header = ctx.get_header('Cookie')
|
|
|
|
}
|
|
|
|
cookie_header = ' ' + cookie_header
|
2020-11-14 12:55:10 +01:00
|
|
|
// println('cookie_header="$cookie_header"')
|
|
|
|
// println(ctx.req.headers)
|
2021-02-06 21:46:52 +01:00
|
|
|
cookie := if cookie_header.contains(';') {
|
|
|
|
cookie_header.find_between(' $key=', ';')
|
|
|
|
} else {
|
|
|
|
cookie_header.find_between(' $key=', '\r')
|
|
|
|
}
|
2019-09-05 14:46:24 +02:00
|
|
|
if cookie != '' {
|
2019-12-07 23:48:49 +01:00
|
|
|
return cookie.trim_space()
|
2019-09-05 14:46:24 +02:00
|
|
|
}
|
|
|
|
return error('Cookie not found')
|
|
|
|
}
|
2019-07-29 18:21:36 +02:00
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Sets the response status
|
2020-08-09 18:05:06 +02:00
|
|
|
pub fn (mut ctx Context) set_status(code int, desc string) {
|
|
|
|
if code < 100 || code > 599 {
|
|
|
|
ctx.status = '500 Internal Server Error'
|
|
|
|
} else {
|
|
|
|
ctx.status = '$code $desc'
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Adds an header to the response with key and val
|
2020-10-15 21:04:42 +02:00
|
|
|
pub fn (mut ctx Context) add_header(key string, val string) {
|
2020-11-14 12:55:10 +01:00
|
|
|
// println('add_header($key, $val)')
|
2019-12-11 15:32:54 +01:00
|
|
|
ctx.headers = ctx.headers + '\r\n$key: $val'
|
2020-11-14 12:55:10 +01:00
|
|
|
// println(ctx.headers)
|
2019-07-29 18:21:36 +02:00
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Returns the header data from the key
|
2019-12-23 11:24:53 +01:00
|
|
|
pub fn (ctx &Context) get_header(key string) string {
|
2021-04-09 18:17:33 +02:00
|
|
|
return ctx.req.header.get_custom(key) or { '' }
|
2019-09-05 14:46:24 +02:00
|
|
|
}
|
2019-07-29 18:21:36 +02:00
|
|
|
|
2021-05-11 08:30:01 +02:00
|
|
|
/*
|
2019-12-20 01:02:16 +01:00
|
|
|
pub fn run<T>(port int) {
|
2021-05-11 08:30:01 +02:00
|
|
|
mut x := &T{}
|
|
|
|
run_app(mut x, port)
|
2020-06-10 11:23:41 +02:00
|
|
|
}
|
2021-05-11 08:30:01 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
interface DbInterface {
|
|
|
|
db voidptr
|
|
|
|
}
|
|
|
|
|
|
|
|
// run_app
|
|
|
|
pub fn run<T>(global_app &T, port int) {
|
|
|
|
// x := global_app.clone()
|
|
|
|
// mut global_app := &T{}
|
|
|
|
// mut app := &T{}
|
|
|
|
// run_app<T>(mut app, port)
|
2020-06-07 10:02:35 +02:00
|
|
|
|
2021-01-20 11:11:01 +01:00
|
|
|
mut l := net.listen_tcp(port) or { panic('failed to listen') }
|
2021-02-09 10:31:25 +01:00
|
|
|
println('[Vweb] Running app on http://localhost:$port')
|
2021-05-11 08:30:01 +02:00
|
|
|
// app.Context = Context{
|
|
|
|
// conn: 0
|
|
|
|
//}
|
|
|
|
// app.init_server()
|
|
|
|
// global_app.init_server()
|
|
|
|
//$for method in T.methods {
|
|
|
|
//$if method.return_type is Result {
|
|
|
|
// check routes for validity
|
|
|
|
//}
|
|
|
|
//}
|
2019-07-29 18:21:36 +02:00
|
|
|
for {
|
2021-05-11 08:30:01 +02:00
|
|
|
// Create a new app object for each connection, copy global data like db connections
|
|
|
|
mut request_app := T{}
|
|
|
|
$if T is DbInterface {
|
|
|
|
request_app.db = global_app.db
|
|
|
|
} $else {
|
|
|
|
// println('vweb no db')
|
|
|
|
}
|
|
|
|
// request_app.Context = Context{
|
|
|
|
// conn: 0
|
|
|
|
//}
|
2020-11-15 21:54:47 +01:00
|
|
|
mut conn := l.accept() or { panic('accept() failed') }
|
2021-05-11 08:30:01 +02:00
|
|
|
handle_conn<T>(mut conn, mut request_app)
|
2019-12-20 01:02:16 +01:00
|
|
|
}
|
|
|
|
}
|
2019-12-13 19:11:40 +01:00
|
|
|
|
2021-03-17 01:33:31 +01:00
|
|
|
[manualfree]
|
2020-11-15 21:54:47 +01:00
|
|
|
fn handle_conn<T>(mut conn net.TcpConn, mut app T) {
|
2021-01-21 11:08:38 +01:00
|
|
|
conn.set_read_timeout(30 * time.second)
|
|
|
|
conn.set_write_timeout(30 * time.second)
|
2020-12-27 10:38:12 +01:00
|
|
|
defer {
|
2021-03-06 20:04:51 +01:00
|
|
|
conn.close() or {}
|
2020-12-27 10:38:12 +01:00
|
|
|
}
|
2020-11-15 21:54:47 +01:00
|
|
|
mut reader := io.new_buffered_reader(reader: io.make_reader(conn))
|
2021-03-15 21:25:19 +01:00
|
|
|
defer {
|
|
|
|
reader.free()
|
|
|
|
}
|
2020-06-23 21:02:17 +02:00
|
|
|
page_gen_start := time.ticks()
|
2021-03-01 11:50:52 +01:00
|
|
|
req := parse_request(mut reader) or {
|
2021-04-16 07:45:46 +02:00
|
|
|
// Prevents errors from being thrown when BufferedReader is empty
|
|
|
|
if '$err' != 'none' {
|
|
|
|
eprintln('error parsing request: $err')
|
|
|
|
}
|
2021-03-01 11:50:52 +01:00
|
|
|
return
|
|
|
|
}
|
2020-12-31 17:07:24 +01:00
|
|
|
app.Context = Context{
|
2019-12-20 01:02:16 +01:00
|
|
|
req: req
|
2021-05-07 14:58:48 +02:00
|
|
|
conn: unsafe { conn }
|
2020-11-14 12:55:10 +01:00
|
|
|
form: map[string]string{}
|
2020-12-31 17:07:24 +01:00
|
|
|
static_files: app.static_files
|
|
|
|
static_mime_types: app.static_mime_types
|
2020-06-23 21:02:17 +02:00
|
|
|
page_gen_start: page_gen_start
|
2019-12-20 01:02:16 +01:00
|
|
|
}
|
2021-01-25 10:26:20 +01:00
|
|
|
if req.method in vweb.methods_with_form {
|
2021-04-16 07:46:06 +02:00
|
|
|
ct := req.header.get(.content_type) or { '' }.split(';').map(it.trim_left(' \t'))
|
|
|
|
if 'multipart/form-data' in ct {
|
|
|
|
boundary := ct.filter(it.starts_with('boundary='))
|
2021-02-27 23:18:25 +01:00
|
|
|
if boundary.len != 1 {
|
2021-03-06 20:04:51 +01:00
|
|
|
send_string(mut conn, vweb.http_400) or {}
|
2021-02-27 23:18:25 +01:00
|
|
|
return
|
|
|
|
}
|
2021-03-04 17:00:03 +01:00
|
|
|
form, files := parse_multipart_form(req.data, boundary[0][9..])
|
|
|
|
for k, v in form {
|
|
|
|
app.form[k] = v
|
|
|
|
}
|
|
|
|
for k, v in files {
|
|
|
|
app.files[k] = v
|
|
|
|
}
|
2021-01-21 11:08:51 +01:00
|
|
|
} else {
|
2021-03-04 17:00:03 +01:00
|
|
|
form := parse_form(req.data)
|
|
|
|
for k, v in form {
|
|
|
|
app.form[k] = v
|
|
|
|
}
|
2021-01-21 11:08:51 +01:00
|
|
|
}
|
2019-12-20 01:02:16 +01:00
|
|
|
}
|
2020-06-20 01:39:55 +02:00
|
|
|
// Serve a static file if it is one
|
2021-03-01 11:50:52 +01:00
|
|
|
// TODO: get the real path
|
2021-04-28 06:46:36 +02:00
|
|
|
url := urllib.parse(app.req.url) or {
|
2021-03-01 11:50:52 +01:00
|
|
|
eprintln('error parsing path: $err')
|
2020-06-05 21:04:18 +02:00
|
|
|
return
|
2020-03-07 14:16:03 +01:00
|
|
|
}
|
2021-03-01 11:50:52 +01:00
|
|
|
if serve_static<T>(mut app, url) {
|
|
|
|
// successfully served a static file
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-04-15 05:27:24 +02:00
|
|
|
app.before_request()
|
2019-12-20 01:02:16 +01:00
|
|
|
// Call the right action
|
2020-08-31 19:39:46 +02:00
|
|
|
$if debug {
|
|
|
|
println('route matching...')
|
|
|
|
}
|
2021-03-01 11:50:52 +01:00
|
|
|
url_words := url.path.split('/').filter(it != '')
|
|
|
|
// copy query args to app.query
|
|
|
|
for k, v in url.query().data {
|
|
|
|
app.query[k] = v.data[0]
|
2020-07-07 12:35:45 +02:00
|
|
|
}
|
2021-03-01 11:50:52 +01:00
|
|
|
|
2020-07-25 00:02:44 +02:00
|
|
|
$for method in T.methods {
|
2020-11-08 09:14:24 +01:00
|
|
|
$if method.return_type is Result {
|
2021-03-01 11:50:52 +01:00
|
|
|
mut method_args := []string{}
|
|
|
|
// TODO: move to server start
|
|
|
|
http_methods, route_path := parse_attrs(method.name, method.attrs) or {
|
|
|
|
eprintln('error parsing method attributes: $err')
|
|
|
|
return
|
2021-01-01 21:57:45 +01:00
|
|
|
}
|
2021-01-21 11:08:38 +01:00
|
|
|
|
2021-03-01 11:50:52 +01:00
|
|
|
// Used for route matching
|
|
|
|
route_words := route_path.split('/').filter(it != '')
|
|
|
|
|
|
|
|
// Skip if the HTTP request method does not match the attributes
|
|
|
|
if app.req.method in http_methods {
|
|
|
|
// Route immediate matches first
|
|
|
|
// For example URL `/register` matches route `/:user`, but `fn register()`
|
|
|
|
// should be called first.
|
|
|
|
if !route_path.contains('/:') && url_words == route_words {
|
|
|
|
// We found a match
|
2021-03-11 14:04:34 +01:00
|
|
|
app.$method()
|
2020-07-25 00:02:44 +02:00
|
|
|
return
|
2020-07-23 17:19:37 +02:00
|
|
|
}
|
2021-03-01 11:50:52 +01:00
|
|
|
|
|
|
|
if url_words.len == 0 && route_words == ['index'] && method.name == 'index' {
|
2021-03-11 14:04:34 +01:00
|
|
|
app.$method()
|
2021-03-01 11:50:52 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if params := route_matches(url_words, route_words) {
|
|
|
|
method_args = params.clone()
|
|
|
|
if method_args.len != method.args.len {
|
|
|
|
eprintln('warning: uneven parameters count ($method.args.len) in `$method.name`, compared to the vweb route `$method.attrs` ($method_args.len)')
|
2020-07-05 16:44:23 +02:00
|
|
|
}
|
2021-03-01 11:50:52 +01:00
|
|
|
app.$method(method_args)
|
|
|
|
return
|
2020-07-05 16:44:23 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-07-03 15:10:39 +02:00
|
|
|
}
|
2021-03-01 11:50:52 +01:00
|
|
|
// site not found
|
2021-03-06 20:04:51 +01:00
|
|
|
send_string(mut conn, vweb.http_404) or {}
|
2021-03-01 11:50:52 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
fn route_matches(url_words []string, route_words []string) ?[]string {
|
|
|
|
// URL path should be at least as long as the route path
|
|
|
|
if url_words.len < route_words.len {
|
|
|
|
return none
|
2020-07-05 16:44:23 +02:00
|
|
|
}
|
2021-03-01 11:50:52 +01:00
|
|
|
|
|
|
|
mut params := []string{cap: url_words.len}
|
|
|
|
if url_words.len == route_words.len {
|
|
|
|
for i in 0 .. url_words.len {
|
|
|
|
if route_words[i].starts_with(':') {
|
|
|
|
// We found a path paramater
|
|
|
|
params << url_words[i]
|
|
|
|
} else if route_words[i] != url_words[i] {
|
|
|
|
// This url does not match the route
|
|
|
|
return none
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return params
|
|
|
|
}
|
|
|
|
|
|
|
|
// The last route can end with ... indicating an array
|
2021-05-05 13:20:40 +02:00
|
|
|
if route_words.len == 0 || !route_words[route_words.len - 1].ends_with('...') {
|
2021-03-01 11:50:52 +01:00
|
|
|
return none
|
|
|
|
}
|
|
|
|
|
|
|
|
for i in 0 .. route_words.len - 1 {
|
|
|
|
if route_words[i].starts_with(':') {
|
|
|
|
// We found a path paramater
|
|
|
|
params << url_words[i]
|
|
|
|
} else if route_words[i] != url_words[i] {
|
|
|
|
// This url does not match the route
|
|
|
|
return none
|
|
|
|
}
|
|
|
|
}
|
|
|
|
params << url_words[route_words.len - 1..url_words.len].join('/')
|
|
|
|
return params
|
|
|
|
}
|
|
|
|
|
|
|
|
// parse function attribute list for methods and a path
|
|
|
|
fn parse_attrs(name string, attrs []string) ?([]http.Method, string) {
|
|
|
|
if attrs.len == 0 {
|
|
|
|
return [http.Method.get], '/$name'
|
|
|
|
}
|
|
|
|
|
|
|
|
mut x := attrs.clone()
|
|
|
|
mut methods := []http.Method{}
|
|
|
|
mut path := ''
|
|
|
|
|
|
|
|
for i := 0; i < x.len; {
|
|
|
|
attr := x[i]
|
|
|
|
attru := attr.to_upper()
|
|
|
|
m := http.method_from_str(attru)
|
|
|
|
if attru == 'GET' || m != .get {
|
|
|
|
methods << m
|
|
|
|
x.delete(i)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if attr.starts_with('/') {
|
|
|
|
if path != '' {
|
2021-03-30 14:30:16 +02:00
|
|
|
return IError(&MultiplePathAttributesError{})
|
2020-07-25 00:02:44 +02:00
|
|
|
}
|
2021-03-01 11:50:52 +01:00
|
|
|
path = attr
|
|
|
|
x.delete(i)
|
|
|
|
continue
|
2020-07-08 15:22:03 +02:00
|
|
|
}
|
2021-03-01 11:50:52 +01:00
|
|
|
i++
|
|
|
|
}
|
|
|
|
if x.len > 0 {
|
2021-03-30 14:30:16 +02:00
|
|
|
return IError(&UnexpectedExtraAttributeError{
|
|
|
|
msg: 'Encountered unexpected extra attributes: $x'
|
|
|
|
})
|
2021-03-01 11:50:52 +01:00
|
|
|
}
|
|
|
|
if methods.len == 0 {
|
|
|
|
methods = [http.Method.get]
|
|
|
|
}
|
|
|
|
if path == '' {
|
|
|
|
path = '/$name'
|
2019-07-29 18:21:36 +02:00
|
|
|
}
|
2021-03-01 11:50:52 +01:00
|
|
|
// Make path lowercase for case-insensitive comparisons
|
|
|
|
return methods, path.to_lower()
|
|
|
|
}
|
|
|
|
|
|
|
|
// check if request is for a static file and serves it
|
|
|
|
// returns true if we served a static file, false otherwise
|
|
|
|
fn serve_static<T>(mut app T, url urllib.URL) bool {
|
|
|
|
// TODO: handle url parameters properly - for now, ignore them
|
|
|
|
static_file := app.static_files[url.path]
|
|
|
|
mime_type := app.static_mime_types[url.path]
|
|
|
|
if static_file == '' || mime_type == '' {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
data := os.read_file(static_file) or {
|
2021-03-06 20:04:51 +01:00
|
|
|
send_string(mut app.conn, vweb.http_404) or {}
|
2021-03-01 11:50:52 +01:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
app.send_response_to_client(mime_type, data)
|
|
|
|
unsafe { data.free() }
|
|
|
|
return true
|
2019-09-05 14:46:24 +02:00
|
|
|
}
|
2019-07-29 18:21:36 +02:00
|
|
|
|
2020-10-15 21:04:42 +02:00
|
|
|
fn (mut ctx Context) scan_static_directory(directory_path string, mount_path string) {
|
2021-03-01 00:18:14 +01:00
|
|
|
files := os.ls(directory_path) or { panic(err) }
|
2019-07-31 06:10:53 +02:00
|
|
|
if files.len > 0 {
|
2019-09-05 14:46:24 +02:00
|
|
|
for file in files {
|
2021-03-02 20:30:18 +01:00
|
|
|
full_path := os.join_path(directory_path, file)
|
2020-12-12 18:13:43 +01:00
|
|
|
if os.is_dir(full_path) {
|
|
|
|
ctx.scan_static_directory(full_path, mount_path + '/' + file)
|
2020-11-14 12:55:10 +01:00
|
|
|
} else if file.contains('.') && !file.starts_with('.') && !file.ends_with('.') {
|
2020-03-26 14:18:08 +01:00
|
|
|
ext := os.file_ext(file)
|
2020-03-07 14:16:03 +01:00
|
|
|
// Rudimentary guard against adding files not in mime_types.
|
|
|
|
// Use serve_static directly to add non-standard mime types.
|
2021-01-25 10:26:20 +01:00
|
|
|
if ext in vweb.mime_types {
|
|
|
|
ctx.serve_static(mount_path + '/' + file, full_path, vweb.mime_types[ext])
|
2020-03-07 14:16:03 +01:00
|
|
|
}
|
2019-07-31 06:10:53 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Handles a directory static
|
2021-03-01 00:18:14 +01:00
|
|
|
// If `root` is set the mount path for the dir will be in '/'
|
2021-02-21 19:01:29 +01:00
|
|
|
pub fn (mut ctx Context) handle_static(directory_path string, root bool) bool {
|
2020-11-14 12:55:10 +01:00
|
|
|
if ctx.done || !os.exists(directory_path) {
|
2020-03-07 14:16:03 +01:00
|
|
|
return false
|
|
|
|
}
|
2020-03-08 15:41:59 +01:00
|
|
|
dir_path := directory_path.trim_space().trim_right('/')
|
2020-03-07 14:16:03 +01:00
|
|
|
mut mount_path := ''
|
2021-02-21 19:01:29 +01:00
|
|
|
if dir_path != '.' && os.is_dir(dir_path) && !root {
|
2020-03-08 15:41:59 +01:00
|
|
|
// Mount point hygene, "./assets" => "/assets".
|
|
|
|
mount_path = '/' + dir_path.trim_left('.').trim('/')
|
2019-10-24 18:44:49 +02:00
|
|
|
}
|
2020-03-08 15:41:59 +01:00
|
|
|
ctx.scan_static_directory(dir_path, mount_path)
|
2020-03-07 14:16:03 +01:00
|
|
|
return true
|
2019-10-24 18:44:49 +02:00
|
|
|
}
|
2019-07-30 15:46:10 +02:00
|
|
|
|
2021-03-02 20:30:18 +01:00
|
|
|
// mount_static_folder_at - makes all static files in `directory_path` and inside it, available at http://server/mount_path
|
|
|
|
// For example: suppose you have called .mount_static_folder_at('/var/share/myassets', '/assets'),
|
|
|
|
// and you have a file /var/share/myassets/main.css .
|
|
|
|
// => That file will be available at URL: http://server/assets/main.css .
|
|
|
|
pub fn (mut ctx Context) mount_static_folder_at(directory_path string, mount_path string) bool {
|
|
|
|
if ctx.done || mount_path.len < 1 || mount_path[0] != `/` || !os.exists(directory_path) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
dir_path := directory_path.trim_right('/')
|
|
|
|
ctx.scan_static_directory(dir_path, mount_path[1..])
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Serves a file static
|
2021-03-01 00:18:14 +01:00
|
|
|
// `url` is the access path on the site, `file_path` is the real path to the file, `mime_type` is the file type
|
2020-10-15 21:04:42 +02:00
|
|
|
pub fn (mut ctx Context) serve_static(url string, file_path string, mime_type string) {
|
2019-10-24 18:44:49 +02:00
|
|
|
ctx.static_files[url] = file_path
|
2019-07-31 06:10:53 +02:00
|
|
|
ctx.static_mime_types[url] = mime_type
|
2019-08-11 14:07:22 +02:00
|
|
|
}
|
2019-12-11 17:20:46 +01:00
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Returns the ip address from the current user
|
2020-07-16 00:48:10 +02:00
|
|
|
pub fn (ctx &Context) ip() string {
|
2021-04-09 18:17:33 +02:00
|
|
|
mut ip := ctx.req.header.get(.x_forwarded_for) or { '' }
|
2020-07-16 21:23:35 +02:00
|
|
|
if ip == '' {
|
2021-04-09 18:17:33 +02:00
|
|
|
ip = ctx.req.header.get_custom('X-Real-Ip') or { '' }
|
2020-07-16 21:23:35 +02:00
|
|
|
}
|
2021-02-27 23:18:25 +01:00
|
|
|
|
2020-07-16 21:23:35 +02:00
|
|
|
if ip.contains(',') {
|
|
|
|
ip = ip.all_before(',')
|
|
|
|
}
|
2020-09-17 09:38:39 +02:00
|
|
|
if ip == '' {
|
2020-11-15 21:54:47 +01:00
|
|
|
ip = ctx.conn.peer_ip() or { '' }
|
2020-09-17 09:38:39 +02:00
|
|
|
}
|
2020-07-16 21:23:35 +02:00
|
|
|
return ip
|
2020-07-16 00:48:10 +02:00
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Set s to the form error
|
2020-07-07 21:35:56 +02:00
|
|
|
pub fn (mut ctx Context) error(s string) {
|
|
|
|
ctx.form_error = s
|
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// Returns an empty result
|
2020-06-22 17:13:57 +02:00
|
|
|
pub fn not_found() Result {
|
|
|
|
return Result{}
|
|
|
|
}
|
2020-06-24 22:12:33 +02:00
|
|
|
|
|
|
|
fn filter(s string) string {
|
2020-06-24 22:38:25 +02:00
|
|
|
return s.replace_each([
|
2020-11-14 12:55:10 +01:00
|
|
|
'<',
|
|
|
|
'<',
|
|
|
|
'"',
|
|
|
|
'"',
|
|
|
|
'&',
|
|
|
|
'&',
|
2020-06-24 22:38:25 +02:00
|
|
|
])
|
2020-06-24 22:12:33 +02:00
|
|
|
}
|
|
|
|
|
2021-02-21 19:01:29 +01:00
|
|
|
// A type which don't get filtered inside templates
|
2020-06-24 22:12:33 +02:00
|
|
|
pub type RawHtml = string
|
2020-11-15 21:54:47 +01:00
|
|
|
|
2021-01-20 11:11:01 +01:00
|
|
|
fn send_string(mut conn net.TcpConn, s string) ? {
|
2020-12-27 10:38:12 +01:00
|
|
|
conn.write(s.bytes()) ?
|
2020-11-15 21:54:47 +01:00
|
|
|
}
|