2018-06-28 15:55:15 +00:00
|
|
|
#[macro_use] extern crate rocket;
|
2016-12-24 19:58:24 +00:00
|
|
|
|
2016-12-26 23:18:15 +00:00
|
|
|
use rocket::http::uri::Segments;
|
2016-12-24 19:58:24 +00:00
|
|
|
|
|
|
|
#[get("/test/<path..>")]
|
2019-06-13 01:48:02 +00:00
|
|
|
fn test(path: Segments<'_>) -> String {
|
2016-12-26 23:18:15 +00:00
|
|
|
path.collect::<Vec<_>>().join("/")
|
2016-12-24 19:58:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[get("/two/<path..>")]
|
2019-06-13 01:48:02 +00:00
|
|
|
fn two(path: Segments<'_>) -> String {
|
2016-12-26 23:18:15 +00:00
|
|
|
path.collect::<Vec<_>>().join("/")
|
2016-12-24 19:58:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[get("/one/two/<path..>")]
|
2019-06-13 01:48:02 +00:00
|
|
|
fn one_two(path: Segments<'_>) -> String {
|
2016-12-26 23:18:15 +00:00
|
|
|
path.collect::<Vec<_>>().join("/")
|
2016-12-24 19:58:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[get("/<path..>", rank = 2)]
|
2019-06-13 01:48:02 +00:00
|
|
|
fn none(path: Segments<'_>) -> String {
|
2016-12-26 23:18:15 +00:00
|
|
|
path.collect::<Vec<_>>().join("/")
|
2016-12-24 19:58:24 +00:00
|
|
|
}
|
|
|
|
|
2016-12-31 05:51:23 +00:00
|
|
|
#[get("/static/<user>/is/<path..>")]
|
2019-06-13 01:48:02 +00:00
|
|
|
fn dual(user: String, path: Segments<'_>) -> String {
|
2016-12-31 05:51:23 +00:00
|
|
|
user + "/is/" + &path.collect::<Vec<_>>().join("/")
|
|
|
|
}
|
|
|
|
|
2017-01-05 20:51:00 +00:00
|
|
|
mod tests {
|
|
|
|
use super::*;
|
2020-07-05 18:35:36 +00:00
|
|
|
use rocket::local::blocking::Client;
|
2017-01-05 20:51:00 +00:00
|
|
|
|
2020-07-05 18:35:36 +00:00
|
|
|
#[test]
|
|
|
|
fn segments_works() {
|
2021-04-08 08:07:52 +00:00
|
|
|
let rocket = rocket::build()
|
2017-01-05 20:51:00 +00:00
|
|
|
.mount("/", routes![test, two, one_two, none, dual])
|
|
|
|
.mount("/point", routes![test, two, one_two, dual]);
|
Test 'secret_key' validation, now on pre-launch.
Prior to this commit, it was not possible to test Rocket crates in
production mode without setting a global secret key or bypassing secret
key checking - the testing script did the latter. The consequence is
that it became impossible to test secret key related failures because
the tests passed regardless.
This commit undoes this. As a consequence, all tests are now aware of
the difference between debug and release configurations, the latter of
which validates 'secret_key' by default. New 'Client::debug()' and
'Client::debug_with()' simplify creating an instance of 'Client' with
configuration in debug mode to avoid undesired test failures.
The summary of changes in this commit are:
* Config 'secret_key' success and failure are now tested.
* 'secret_key' validation was moved to pre-launch from 'Config:from()'.
* 'Config::from()' only extracts the config.
* Added 'Config::try_from()' for non-panicking extraction.
* 'Config' now knows the profile it was extracted from.
* The 'Config' provider sets a profile of 'Config.profile'.
* 'Rocket', 'Client', 'Fairings', implement 'Debug'.
* 'fairing::Info' implements 'Copy', 'Clone'.
* 'Fairings' keeps track of, logs attach fairings.
* 'Rocket::reconfigure()' was added to allow modifying a config.
Internally, the testing script was refactored to properly test the
codebase with the new changes. In particular, it no longer sets a rustc
'cfg' to avoid secret-key checking.
Resolves #1543.
Fixes #1564.
2021-03-09 08:07:43 +00:00
|
|
|
let client = Client::debug(rocket).unwrap();
|
2017-01-05 20:51:00 +00:00
|
|
|
|
|
|
|
// We construct a path that matches each of the routes above. We ensure the
|
|
|
|
// prefix is stripped, confirming that dynamic segments are working.
|
|
|
|
for prefix in &["", "/test", "/two", "/one/two",
|
|
|
|
"/point/test", "/point/two", "/point/one/two",
|
|
|
|
"/static", "/point/static"]
|
|
|
|
{
|
|
|
|
let path = "this/is/the/path/we/want";
|
2020-07-05 18:35:36 +00:00
|
|
|
let response = client.get(format!("{}/{}", prefix, path)).dispatch();
|
|
|
|
assert_eq!(response.into_string(), Some(path.into()));
|
2017-01-05 20:51:00 +00:00
|
|
|
}
|
2016-12-24 19:58:24 +00:00
|
|
|
}
|
|
|
|
}
|