1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
use crate::{
error::SizedLimitError, web::headers::HeaderMapExt, Endpoint, Middleware, Request, Result,
};
pub struct SizeLimit {
max_size: usize,
}
impl SizeLimit {
pub fn new(max_size: usize) -> Self {
Self { max_size }
}
}
impl<E: Endpoint> Middleware<E> for SizeLimit {
type Output = SizeLimitEndpoint<E>;
fn transform(&self, ep: E) -> Self::Output {
SizeLimitEndpoint {
inner: ep,
max_size: self.max_size,
}
}
}
pub struct SizeLimitEndpoint<E> {
inner: E,
max_size: usize,
}
#[async_trait::async_trait]
impl<E: Endpoint> Endpoint for SizeLimitEndpoint<E> {
type Output = E::Output;
async fn call(&self, req: Request) -> Result<Self::Output> {
let content_length = req
.headers()
.typed_get::<headers::ContentLength>()
.ok_or(SizedLimitError::MissingContentLength)?;
if content_length.0 as usize > self.max_size {
return Err(SizedLimitError::PayloadTooLarge.into());
}
self.inner.call(req).await
}
}
#[cfg(test)]
mod tests {
use http::StatusCode;
use super::*;
use crate::{
endpoint::{make_sync, EndpointExt},
test::TestClient,
};
#[tokio::test]
async fn size_limit() {
let ep = make_sync(|_| ()).with(SizeLimit::new(5));
let cli = TestClient::new(ep);
cli.post("/")
.send()
.await
.assert_status(StatusCode::LENGTH_REQUIRED);
cli.post("/")
.header("content-length", 6)
.body(&b"123456"[..])
.send()
.await
.assert_status(StatusCode::PAYLOAD_TOO_LARGE);
cli.post("/")
.header("content-length", 4)
.body(&b"1234"[..])
.send()
.await
.assert_status_is_ok();
cli.post("/")
.header("content-length", 5)
.body(&b"12345"[..])
.send()
.await
.assert_status_is_ok();
}
}