use std::fmt;
use std::io::{self, Write};
use std::net::{self, TcpStream, ToSocketAddrs};
use std::path::PathBuf;
use std::str::{from_utf8, FromStr};
use std::time::Duration;
use crate::cmd::{cmd, pipe, Pipeline};
use crate::parser::Parser;
use crate::types::{
from_redis_value, ErrorKind, FromRedisValue, RedisError, RedisResult, ToRedisArgs, Value,
};
#[cfg(unix)]
use std::os::unix::net::UnixStream;
#[cfg(feature = "tls")]
use native_tls::{TlsConnector, TlsStream};
static DEFAULT_PORT: u16 = 6379;
pub fn parse_redis_url(input: &str) -> Result<url::Url, ()> {
match url::Url::parse(input) {
Ok(result) => match result.scheme() {
"redis" | "rediss" | "redis+unix" | "unix" => Ok(result),
_ => Err(()),
},
Err(_) => Err(()),
}
}
#[derive(Clone, Debug, PartialEq)]
pub enum ConnectionAddr {
Tcp(String, u16),
TcpTls {
host: String,
port: u16,
insecure: bool,
},
Unix(PathBuf),
}
impl ConnectionAddr {
pub fn is_supported(&self) -> bool {
match *self {
ConnectionAddr::Tcp(_, _) => true,
ConnectionAddr::TcpTls { .. } => cfg!(feature = "tls"),
ConnectionAddr::Unix(_) => cfg!(unix),
}
}
}
impl fmt::Display for ConnectionAddr {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
match *self {
ConnectionAddr::Tcp(ref host, port) => write!(f, "{}:{}", host, port),
ConnectionAddr::TcpTls { ref host, port, .. } => write!(f, "{}:{}", host, port),
ConnectionAddr::Unix(ref path) => write!(f, "{}", path.display()),
}
}
}
#[derive(Clone, Debug)]
pub struct ConnectionInfo {
pub addr: Box<ConnectionAddr>,
pub db: i64,
pub username: Option<String>,
pub passwd: Option<String>,
}
impl FromStr for ConnectionInfo {
type Err = RedisError;
fn from_str(s: &str) -> Result<Self, Self::Err> {
s.into_connection_info()
}
}
pub trait IntoConnectionInfo {
fn into_connection_info(self) -> RedisResult<ConnectionInfo>;
}
impl IntoConnectionInfo for ConnectionInfo {
fn into_connection_info(self) -> RedisResult<ConnectionInfo> {
Ok(self)
}
}
impl<'a> IntoConnectionInfo for &'a str {
fn into_connection_info(self) -> RedisResult<ConnectionInfo> {
match parse_redis_url(self) {
Ok(u) => u.into_connection_info(),
Err(_) => fail!((ErrorKind::InvalidClientConfig, "Redis URL did not parse")),
}
}
}
impl<T> IntoConnectionInfo for (T, u16)
where
T: Into<String>,
{
fn into_connection_info(self) -> RedisResult<ConnectionInfo> {
Ok(ConnectionInfo {
addr: Box::new(ConnectionAddr::Tcp(self.0.into(), self.1)),
db: 0,
username: None,
passwd: None,
})
}
}
impl IntoConnectionInfo for String {
fn into_connection_info(self) -> RedisResult<ConnectionInfo> {
match parse_redis_url(&self) {
Ok(u) => u.into_connection_info(),
Err(_) => fail!((ErrorKind::InvalidClientConfig, "Redis URL did not parse")),
}
}
}
fn url_to_tcp_connection_info(url: url::Url) -> RedisResult<ConnectionInfo> {
let host = match url.host() {
Some(host) => host.to_string(),
None => fail!((ErrorKind::InvalidClientConfig, "Missing hostname")),
};
let port = url.port().unwrap_or(DEFAULT_PORT);
let addr = if url.scheme() == "rediss" {
#[cfg(feature = "tls")]
{
match url.fragment() {
Some("insecure") => ConnectionAddr::TcpTls {
host,
port,
insecure: true,
},
Some(_) => fail!((
ErrorKind::InvalidClientConfig,
"only #insecure is supported as URL fragment"
)),
_ => ConnectionAddr::TcpTls {
host,
port,
insecure: false,
},
}
}
#[cfg(not(feature = "tls"))]
fail!((
ErrorKind::InvalidClientConfig,
"can't connect with TLS, the feature is not enabled"
));
} else {
ConnectionAddr::Tcp(host, port)
};
Ok(ConnectionInfo {
addr: Box::new(addr),
db: match url.path().trim_matches('/') {
"" => 0,
path => unwrap_or!(
path.parse::<i64>().ok(),
fail!((ErrorKind::InvalidClientConfig, "Invalid database number"))
),
},
username: if url.username().is_empty() {
None
} else {
match percent_encoding::percent_decode(url.username().as_bytes()).decode_utf8() {
Ok(decoded) => Some(decoded.into_owned()),
Err(_) => fail!((
ErrorKind::InvalidClientConfig,
"Username is not valid UTF-8 string"
)),
}
},
passwd: match url.password() {
Some(pw) => match percent_encoding::percent_decode(pw.as_bytes()).decode_utf8() {
Ok(decoded) => Some(decoded.into_owned()),
Err(_) => fail!((
ErrorKind::InvalidClientConfig,
"Password is not valid UTF-8 string"
)),
},
None => None,
},
})
}
#[cfg(unix)]
fn url_to_unix_connection_info(url: url::Url) -> RedisResult<ConnectionInfo> {
let query: std::collections::HashMap<_, _> = url.query_pairs().collect();
Ok(ConnectionInfo {
addr: Box::new(ConnectionAddr::Unix(unwrap_or!(
url.to_file_path().ok(),
fail!((ErrorKind::InvalidClientConfig, "Missing path"))
))),
db: match query.get("db") {
Some(db) => unwrap_or!(
db.parse::<i64>().ok(),
fail!((ErrorKind::InvalidClientConfig, "Invalid database number"))
),
None => 0,
},
username: query.get("user").map(|username| username.to_string()),
passwd: query.get("pass").map(|password| password.to_string()),
})
}
#[cfg(not(unix))]
fn url_to_unix_connection_info(_: url::Url) -> RedisResult<ConnectionInfo> {
fail!((
ErrorKind::InvalidClientConfig,
"Unix sockets are not available on this platform."
));
}
impl IntoConnectionInfo for url::Url {
fn into_connection_info(self) -> RedisResult<ConnectionInfo> {
match self.scheme() {
"redis" | "rediss" => url_to_tcp_connection_info(self),
"unix" | "redis+unix" => url_to_unix_connection_info(self),
_ => fail!((
ErrorKind::InvalidClientConfig,
"URL provided is not a redis URL"
)),
}
}
}
struct TcpConnection {
reader: TcpStream,
open: bool,
}
#[cfg(feature = "tls")]
struct TcpTlsConnection {
reader: TlsStream<TcpStream>,
open: bool,
}
#[cfg(unix)]
struct UnixConnection {
sock: UnixStream,
open: bool,
}
enum ActualConnection {
Tcp(TcpConnection),
#[cfg(feature = "tls")]
TcpTls(TcpTlsConnection),
#[cfg(unix)]
Unix(UnixConnection),
}
pub struct Connection {
con: ActualConnection,
parser: Parser,
db: i64,
pubsub: bool,
}
pub struct PubSub<'a> {
con: &'a mut Connection,
}
#[derive(Debug)]
pub struct Msg {
payload: Value,
channel: Value,
pattern: Option<Value>,
}
impl ActualConnection {
pub fn new(addr: &ConnectionAddr, timeout: Option<Duration>) -> RedisResult<ActualConnection> {
Ok(match *addr {
ConnectionAddr::Tcp(ref host, ref port) => {
let host: &str = &*host;
let tcp = match timeout {
None => TcpStream::connect((host, *port))?,
Some(timeout) => {
let mut tcp = None;
let mut last_error = None;
for addr in (host, *port).to_socket_addrs()? {
match TcpStream::connect_timeout(&addr, timeout) {
Ok(l) => {
tcp = Some(l);
break;
}
Err(e) => {
last_error = Some(e);
}
};
}
match (tcp, last_error) {
(Some(tcp), _) => tcp,
(None, Some(e)) => {
fail!(e);
}
(None, None) => {
fail!((
ErrorKind::InvalidClientConfig,
"could not resolve to any addresses"
));
}
}
}
};
ActualConnection::Tcp(TcpConnection {
reader: tcp,
open: true,
})
}
#[cfg(feature = "tls")]
ConnectionAddr::TcpTls {
ref host,
port,
insecure,
} => {
let tls_connector = if insecure {
TlsConnector::builder()
.danger_accept_invalid_certs(true)
.danger_accept_invalid_hostnames(true)
.use_sni(false)
.build()?
} else {
TlsConnector::new()?
};
let host: &str = &*host;
let tls = match timeout {
None => {
let tcp = TcpStream::connect((host, port))?;
tls_connector.connect(host, tcp).unwrap()
}
Some(timeout) => {
let mut tcp = None;
let mut last_error = None;
for addr in (host, port).to_socket_addrs()? {
match TcpStream::connect_timeout(&addr, timeout) {
Ok(l) => {
tcp = Some(l);
break;
}
Err(e) => {
last_error = Some(e);
}
};
}
match (tcp, last_error) {
(Some(tcp), _) => tls_connector.connect(host, tcp).unwrap(),
(None, Some(e)) => {
fail!(e);
}
(None, None) => {
fail!((
ErrorKind::InvalidClientConfig,
"could not resolve to any addresses"
));
}
}
}
};
ActualConnection::TcpTls(TcpTlsConnection {
reader: tls,
open: true,
})
}
#[cfg(not(feature = "tls"))]
ConnectionAddr::TcpTls { .. } => {
fail!((
ErrorKind::InvalidClientConfig,
"Cannot connect to TCP with TLS without the tls feature"
));
}
#[cfg(unix)]
ConnectionAddr::Unix(ref path) => ActualConnection::Unix(UnixConnection {
sock: UnixStream::connect(path)?,
open: true,
}),
#[cfg(not(unix))]
ConnectionAddr::Unix(ref _path) => {
fail!((
ErrorKind::InvalidClientConfig,
"Cannot connect to unix sockets \
on this platform"
));
}
})
}
pub fn send_bytes(&mut self, bytes: &[u8]) -> RedisResult<Value> {
match *self {
ActualConnection::Tcp(ref mut connection) => {
let res = connection.reader.write_all(bytes).map_err(RedisError::from);
match res {
Err(e) => {
if e.is_connection_dropped() {
connection.open = false;
}
Err(e)
}
Ok(_) => Ok(Value::Okay),
}
}
#[cfg(feature = "tls")]
ActualConnection::TcpTls(ref mut connection) => {
let res = connection.reader.write_all(bytes).map_err(RedisError::from);
match res {
Err(e) => {
if e.is_connection_dropped() {
connection.open = false;
}
Err(e)
}
Ok(_) => Ok(Value::Okay),
}
}
#[cfg(unix)]
ActualConnection::Unix(ref mut connection) => {
let result = connection.sock.write_all(bytes).map_err(RedisError::from);
match result {
Err(e) => {
if e.is_connection_dropped() {
connection.open = false;
}
Err(e)
}
Ok(_) => Ok(Value::Okay),
}
}
}
}
pub fn set_write_timeout(&self, dur: Option<Duration>) -> RedisResult<()> {
match *self {
ActualConnection::Tcp(TcpConnection { ref reader, .. }) => {
reader.set_write_timeout(dur)?;
}
#[cfg(feature = "tls")]
ActualConnection::TcpTls(TcpTlsConnection { ref reader, .. }) => {
reader.get_ref().set_write_timeout(dur)?;
}
#[cfg(unix)]
ActualConnection::Unix(UnixConnection { ref sock, .. }) => {
sock.set_write_timeout(dur)?;
}
}
Ok(())
}
pub fn set_read_timeout(&self, dur: Option<Duration>) -> RedisResult<()> {
match *self {
ActualConnection::Tcp(TcpConnection { ref reader, .. }) => {
reader.set_read_timeout(dur)?;
}
#[cfg(feature = "tls")]
ActualConnection::TcpTls(TcpTlsConnection { ref reader, .. }) => {
reader.get_ref().set_read_timeout(dur)?;
}
#[cfg(unix)]
ActualConnection::Unix(UnixConnection { ref sock, .. }) => {
sock.set_read_timeout(dur)?;
}
}
Ok(())
}
pub fn is_open(&self) -> bool {
match *self {
ActualConnection::Tcp(TcpConnection { open, .. }) => open,
#[cfg(feature = "tls")]
ActualConnection::TcpTls(TcpTlsConnection { open, .. }) => open,
#[cfg(unix)]
ActualConnection::Unix(UnixConnection { open, .. }) => open,
}
}
}
fn connect_auth(con: &mut Connection, connection_info: &ConnectionInfo) -> RedisResult<()> {
let mut command = cmd("AUTH");
if let Some(username) = &connection_info.username {
command.arg(username);
}
let passwd = connection_info.passwd.as_ref().unwrap();
let err = match command.arg(passwd).query::<Value>(con) {
Ok(Value::Okay) => return Ok(()),
Ok(_) => {
fail!((
ErrorKind::ResponseError,
"Redis server refused to authenticate, returns Ok() != Value::Okay"
));
}
Err(e) => e,
};
let err_msg = err.detail().ok_or((
ErrorKind::AuthenticationFailed,
"Password authentication failed",
))?;
if !err_msg.contains("wrong number of arguments for 'auth' command") {
fail!((
ErrorKind::AuthenticationFailed,
"Password authentication failed",
));
}
let mut command = cmd("AUTH");
match command.arg(passwd).query::<Value>(con) {
Ok(Value::Okay) => Ok(()),
_ => fail!((
ErrorKind::AuthenticationFailed,
"Password authentication failed",
)),
}
}
pub fn connect(
connection_info: &ConnectionInfo,
timeout: Option<Duration>,
) -> RedisResult<Connection> {
let con = ActualConnection::new(&connection_info.addr, timeout)?;
let mut rv = Connection {
con,
parser: Parser::new(),
db: connection_info.db,
pubsub: false,
};
if connection_info.passwd.is_some() {
connect_auth(&mut rv, connection_info)?;
}
if connection_info.db != 0 {
match cmd("SELECT")
.arg(connection_info.db)
.query::<Value>(&mut rv)
{
Ok(Value::Okay) => {}
_ => fail!((
ErrorKind::ResponseError,
"Redis server refused to switch database"
)),
}
}
Ok(rv)
}
pub trait ConnectionLike {
fn req_packed_command(&mut self, cmd: &[u8]) -> RedisResult<Value>;
fn req_packed_commands(
&mut self,
cmd: &[u8],
offset: usize,
count: usize,
) -> RedisResult<Vec<Value>>;
fn get_db(&self) -> i64;
#[doc(hidden)]
fn supports_pipelining(&self) -> bool {
true
}
fn check_connection(&mut self) -> bool;
fn is_open(&self) -> bool;
}
impl Connection {
pub fn send_packed_command(&mut self, cmd: &[u8]) -> RedisResult<()> {
self.con.send_bytes(cmd)?;
Ok(())
}
pub fn recv_response(&mut self) -> RedisResult<Value> {
self.read_response()
}
pub fn set_write_timeout(&self, dur: Option<Duration>) -> RedisResult<()> {
self.con.set_write_timeout(dur)
}
pub fn set_read_timeout(&self, dur: Option<Duration>) -> RedisResult<()> {
self.con.set_read_timeout(dur)
}
pub fn as_pubsub(&mut self) -> PubSub<'_> {
PubSub::new(self)
}
fn exit_pubsub(&mut self) -> RedisResult<()> {
let res = self.clear_active_subscriptions();
if res.is_ok() {
self.pubsub = false;
} else {
self.pubsub = true;
}
res
}
fn clear_active_subscriptions(&mut self) -> RedisResult<()> {
{
let unsubscribe = cmd("UNSUBSCRIBE").get_packed_command();
let punsubscribe = cmd("PUNSUBSCRIBE").get_packed_command();
let con = &mut self.con;
con.send_bytes(&unsubscribe)?;
con.send_bytes(&punsubscribe)?;
}
let mut received_unsub = false;
let mut received_punsub = false;
loop {
let res: (Vec<u8>, (), isize) = from_redis_value(&self.recv_response()?)?;
match res.0.first() {
Some(&b'u') => received_unsub = true,
Some(&b'p') => received_punsub = true,
_ => (),
}
if received_unsub && received_punsub && res.2 == 0 {
break;
}
}
Ok(())
}
fn read_response(&mut self) -> RedisResult<Value> {
let result = match self.con {
ActualConnection::Tcp(TcpConnection { ref mut reader, .. }) => {
self.parser.parse_value(reader)
}
#[cfg(feature = "tls")]
ActualConnection::TcpTls(TcpTlsConnection { ref mut reader, .. }) => {
self.parser.parse_value(reader)
}
#[cfg(unix)]
ActualConnection::Unix(UnixConnection { ref mut sock, .. }) => {
self.parser.parse_value(sock)
}
};
if let Err(e) = &result {
let shutdown = match e.as_io_error() {
Some(e) => e.kind() == io::ErrorKind::UnexpectedEof,
None => false,
};
if shutdown {
match self.con {
ActualConnection::Tcp(ref mut connection) => {
let _ = connection.reader.shutdown(net::Shutdown::Both);
connection.open = false;
}
#[cfg(feature = "tls")]
ActualConnection::TcpTls(ref mut connection) => {
let _ = connection.reader.shutdown();
connection.open = false;
}
#[cfg(unix)]
ActualConnection::Unix(ref mut connection) => {
let _ = connection.sock.shutdown(net::Shutdown::Both);
connection.open = false;
}
}
}
}
result
}
}
impl ConnectionLike for Connection {
fn req_packed_command(&mut self, cmd: &[u8]) -> RedisResult<Value> {
if self.pubsub {
self.exit_pubsub()?;
}
self.con.send_bytes(cmd)?;
self.read_response()
}
fn req_packed_commands(
&mut self,
cmd: &[u8],
offset: usize,
count: usize,
) -> RedisResult<Vec<Value>> {
if self.pubsub {
self.exit_pubsub()?;
}
self.con.send_bytes(cmd)?;
let mut rv = vec![];
for idx in 0..(offset + count) {
let item = self.read_response()?;
if idx >= offset {
rv.push(item);
}
}
Ok(rv)
}
fn get_db(&self) -> i64 {
self.db
}
fn is_open(&self) -> bool {
self.con.is_open()
}
fn check_connection(&mut self) -> bool {
cmd("PING").query::<String>(self).is_ok()
}
}
impl<'a> PubSub<'a> {
fn new(con: &'a mut Connection) -> Self {
Self { con }
}
pub fn subscribe<T: ToRedisArgs>(&mut self, channel: T) -> RedisResult<()> {
Ok(cmd("SUBSCRIBE").arg(channel).query(self.con)?)
}
pub fn psubscribe<T: ToRedisArgs>(&mut self, pchannel: T) -> RedisResult<()> {
Ok(cmd("PSUBSCRIBE").arg(pchannel).query(self.con)?)
}
pub fn unsubscribe<T: ToRedisArgs>(&mut self, channel: T) -> RedisResult<()> {
Ok(cmd("UNSUBSCRIBE").arg(channel).query(self.con)?)
}
pub fn punsubscribe<T: ToRedisArgs>(&mut self, pchannel: T) -> RedisResult<()> {
Ok(cmd("PUNSUBSCRIBE").arg(pchannel).query(self.con)?)
}
pub fn get_message(&mut self) -> RedisResult<Msg> {
loop {
if let Some(msg) = Msg::from_value(&self.con.recv_response()?) {
return Ok(msg);
} else {
continue;
}
}
}
pub fn set_read_timeout(&self, dur: Option<Duration>) -> RedisResult<()> {
self.con.set_read_timeout(dur)
}
}
impl<'a> Drop for PubSub<'a> {
fn drop(&mut self) {
let _ = self.con.exit_pubsub();
}
}
impl Msg {
pub fn from_value(value: &Value) -> Option<Self> {
let raw_msg: Vec<Value> = from_redis_value(value).ok()?;
let mut iter = raw_msg.into_iter();
let msg_type: String = from_redis_value(&iter.next()?).ok()?;
let mut pattern = None;
let payload;
let channel;
if msg_type == "message" {
channel = iter.next()?;
payload = iter.next()?;
} else if msg_type == "pmessage" {
pattern = Some(iter.next()?);
channel = iter.next()?;
payload = iter.next()?;
} else {
return None;
}
Some(Msg {
payload,
channel,
pattern,
})
}
pub fn get_channel<T: FromRedisValue>(&self) -> RedisResult<T> {
from_redis_value(&self.channel)
}
pub fn get_channel_name(&self) -> &str {
match self.channel {
Value::Data(ref bytes) => from_utf8(bytes).unwrap_or("?"),
_ => "?",
}
}
pub fn get_payload<T: FromRedisValue>(&self) -> RedisResult<T> {
from_redis_value(&self.payload)
}
pub fn get_payload_bytes(&self) -> &[u8] {
match self.payload {
Value::Data(ref bytes) => bytes,
_ => b"",
}
}
#[allow(clippy::wrong_self_convention)]
pub fn from_pattern(&self) -> bool {
self.pattern.is_some()
}
pub fn get_pattern<T: FromRedisValue>(&self) -> RedisResult<T> {
match self.pattern {
None => from_redis_value(&Value::Nil),
Some(ref x) => from_redis_value(x),
}
}
}
pub fn transaction<
C: ConnectionLike,
K: ToRedisArgs,
T,
F: FnMut(&mut C, &mut Pipeline) -> RedisResult<Option<T>>,
>(
con: &mut C,
keys: &[K],
func: F,
) -> RedisResult<T> {
let mut func = func;
loop {
cmd("WATCH").arg(keys).query::<()>(con)?;
let mut p = pipe();
let response: Option<T> = func(con, p.atomic())?;
match response {
None => {
continue;
}
Some(response) => {
cmd("UNWATCH").query::<()>(con)?;
return Ok(response);
}
}
}
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn test_parse_redis_url() {
let cases = vec![
("redis://127.0.0.1", true),
("redis+unix:///run/redis.sock", true),
("unix:///run/redis.sock", true),
("http://127.0.0.1", false),
("tcp://127.0.0.1", false),
];
for (url, expected) in cases.into_iter() {
let res = parse_redis_url(&url);
assert_eq!(
res.is_ok(),
expected,
"Parsed result of `{}` is not expected",
url,
);
}
}
#[test]
fn test_url_to_tcp_connection_info() {
let cases = vec![
(
url::Url::parse("redis://127.0.0.1").unwrap(),
ConnectionInfo {
addr: Box::new(ConnectionAddr::Tcp("127.0.0.1".to_string(), 6379)),
db: 0,
username: None,
passwd: None,
},
),
(
url::Url::parse("redis://%25johndoe%25:%23%40%3C%3E%24@example.com/2").unwrap(),
ConnectionInfo {
addr: Box::new(ConnectionAddr::Tcp("example.com".to_string(), 6379)),
db: 2,
username: Some("%johndoe%".to_string()),
passwd: Some("#@<>$".to_string()),
},
),
];
for (url, expected) in cases.into_iter() {
let res = url_to_tcp_connection_info(url.clone()).unwrap();
assert_eq!(res.addr, expected.addr, "addr of {} is not expected", url);
assert_eq!(res.db, expected.db, "db of {} is not expected", url);
assert_eq!(
res.username, expected.username,
"username of {} is not expected",
url
);
assert_eq!(
res.passwd, expected.passwd,
"passwd of {} is not expected",
url
);
}
}
#[test]
fn test_url_to_tcp_connection_info_failed() {
let cases = vec![
(url::Url::parse("redis://").unwrap(), "Missing hostname"),
(
url::Url::parse("redis://127.0.0.1/db").unwrap(),
"Invalid database number",
),
(
url::Url::parse("redis://C3%B0@127.0.0.1").unwrap(),
"Username is not valid UTF-8 string",
),
(
url::Url::parse("redis://:C3%B0@127.0.0.1").unwrap(),
"Password is not valid UTF-8 string",
),
];
for (url, expected) in cases.into_iter() {
let res = url_to_tcp_connection_info(url);
assert_eq!(
res.as_ref().unwrap_err().kind(),
crate::ErrorKind::InvalidClientConfig,
"{}",
res.as_ref().unwrap_err(),
);
assert_eq!(
res.as_ref().unwrap_err().to_string(),
expected,
"{}",
res.as_ref().unwrap_err(),
);
}
}
#[test]
#[cfg(unix)]
fn test_url_to_unix_connection_info() {
let cases = vec![
(
url::Url::parse("unix:///var/run/redis.sock").unwrap(),
ConnectionInfo {
addr: Box::new(ConnectionAddr::Unix("/var/run/redis.sock".into())),
db: 0,
username: None,
passwd: None,
},
),
(
url::Url::parse("redis+unix:///var/run/redis.sock?db=1").unwrap(),
ConnectionInfo {
addr: Box::new(ConnectionAddr::Unix("/var/run/redis.sock".into())),
db: 1,
username: None,
passwd: None,
},
),
(
url::Url::parse(
"unix:///example.sock?user=%25johndoe%25&pass=%23%40%3C%3E%24&db=2",
)
.unwrap(),
ConnectionInfo {
addr: Box::new(ConnectionAddr::Unix("/example.sock".into())),
db: 2,
username: Some("%johndoe%".to_string()),
passwd: Some("#@<>$".to_string()),
},
),
(
url::Url::parse(
"redis+unix:///example.sock?pass=%26%3F%3D+%2A%2B&db=2&user=%25johndoe%25",
)
.unwrap(),
ConnectionInfo {
addr: Box::new(ConnectionAddr::Unix("/example.sock".into())),
db: 2,
username: Some("%johndoe%".to_string()),
passwd: Some("&?= *+".to_string()),
},
),
];
for (url, expected) in cases.into_iter() {
assert_eq!(
ConnectionAddr::Unix(url.to_file_path().unwrap()),
*expected.addr,
"addr of {} is not expected",
url
);
let res = url_to_unix_connection_info(url.clone()).unwrap();
assert_eq!(res.addr, expected.addr, "addr of {} is not expected", url);
assert_eq!(res.db, expected.db, "db of {} is not expected", url);
assert_eq!(
res.username, expected.username,
"username of {} is not expected",
url
);
assert_eq!(
res.passwd, expected.passwd,
"passwd of {} is not expected",
url
);
}
}
}