dudeswave2/cowboy/src/cowboy_req.erl

1055 lines
37 KiB
Erlang

%% Copyright (c) 2011-2024, Loïc Hoguin <essen@ninenines.eu>
%% Copyright (c) 2011, Anthony Ramine <nox@dev-extend.eu>
%%
%% Permission to use, copy, modify, and/or distribute this software for any
%% purpose with or without fee is hereby granted, provided that the above
%% copyright notice and this permission notice appear in all copies.
%%
%% THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
%% WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
%% MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
%% ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
%% WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
%% ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
%% OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
-module(cowboy_req).
%% Request.
-export([method/1]).
-export([version/1]).
-export([peer/1]).
-export([sock/1]).
-export([cert/1]).
-export([scheme/1]).
-export([host/1]).
-export([host_info/1]).
-export([port/1]).
-export([path/1]).
-export([path_info/1]).
-export([qs/1]).
-export([parse_qs/1]).
-export([match_qs/2]).
-export([uri/1]).
-export([uri/2]).
-export([binding/2]).
-export([binding/3]).
-export([bindings/1]).
-export([header/2]).
-export([header/3]).
-export([headers/1]).
-export([parse_header/2]).
-export([parse_header/3]).
-export([filter_cookies/2]).
-export([parse_cookies/1]).
-export([match_cookies/2]).
%% Request body.
-export([has_body/1]).
-export([body_length/1]).
-export([read_body/1]).
-export([read_body/2]).
-export([read_urlencoded_body/1]).
-export([read_urlencoded_body/2]).
-export([read_and_match_urlencoded_body/2]).
-export([read_and_match_urlencoded_body/3]).
%% Multipart.
-export([read_part/1]).
-export([read_part/2]).
-export([read_part_body/1]).
-export([read_part_body/2]).
%% Response.
-export([set_resp_cookie/3]).
-export([set_resp_cookie/4]).
-export([resp_header/2]).
-export([resp_header/3]).
-export([resp_headers/1]).
-export([set_resp_header/3]).
-export([set_resp_headers/2]).
-export([has_resp_header/2]).
-export([delete_resp_header/2]).
-export([set_resp_body/2]).
%% @todo set_resp_body/3 with a ContentType or even Headers argument, to set content headers.
-export([has_resp_body/1]).
-export([inform/2]).
-export([inform/3]).
-export([reply/2]).
-export([reply/3]).
-export([reply/4]).
-export([stream_reply/2]).
-export([stream_reply/3]).
%% @todo stream_body/2 (nofin)
-export([stream_body/3]).
%% @todo stream_events/2 (nofin)
-export([stream_events/3]).
-export([stream_trailers/2]).
-export([push/3]).
-export([push/4]).
%% Stream handlers.
-export([cast/2]).
%% Internal.
-export([response_headers/2]).
-type read_body_opts() :: #{
length => non_neg_integer() | infinity,
period => non_neg_integer(),
timeout => timeout()
}.
-export_type([read_body_opts/0]).
%% While sendfile allows a Len of 0 that means "everything past Offset",
%% Cowboy expects the real length as it is used as metadata.
-type resp_body() :: iodata()
| {sendfile, non_neg_integer(), non_neg_integer(), file:name_all()}.
-export_type([resp_body/0]).
-type push_opts() :: #{
method => binary(),
scheme => binary(),
host => binary(),
port => inet:port_number(),
qs => binary()
}.
-export_type([push_opts/0]).
-type req() :: #{
%% Public interface.
method := binary(),
version := cowboy:http_version() | atom(),
scheme := binary(),
host := binary(),
port := inet:port_number(),
path := binary(),
qs := binary(),
headers := cowboy:http_headers(),
peer := {inet:ip_address(), inet:port_number()},
sock := {inet:ip_address(), inet:port_number()},
cert := binary() | undefined,
%% Private interface.
ref := ranch:ref(),
pid := pid(),
streamid := cowboy_stream:streamid(),
host_info => cowboy_router:tokens(),
path_info => cowboy_router:tokens(),
bindings => cowboy_router:bindings(),
has_body := boolean(),
body_length := non_neg_integer() | undefined,
has_read_body => true,
multipart => {binary(), binary()} | done,
has_sent_resp => headers | true,
resp_cookies => #{iodata() => iodata()},
resp_headers => #{binary() => iodata()},
resp_body => resp_body(),
proxy_header => ranch_proxy_header:proxy_info(),
media_type => {binary(), binary(), [{binary(), binary()}]},
language => binary() | undefined,
charset => binary() | undefined,
range => {binary(), binary()
| [{non_neg_integer(), non_neg_integer() | infinity} | neg_integer()]},
websocket_version => 7 | 8 | 13,
%% The user is encouraged to use the Req to store information
%% when no better solution is available.
_ => _
}.
-export_type([req/0]).
%% Request.
-spec method(req()) -> binary().
method(#{method := Method}) ->
Method.
-spec version(req()) -> cowboy:http_version().
version(#{version := Version}) ->
Version.
-spec peer(req()) -> {inet:ip_address(), inet:port_number()}.
peer(#{peer := Peer}) ->
Peer.
-spec sock(req()) -> {inet:ip_address(), inet:port_number()}.
sock(#{sock := Sock}) ->
Sock.
-spec cert(req()) -> binary() | undefined.
cert(#{cert := Cert}) ->
Cert.
-spec scheme(req()) -> binary().
scheme(#{scheme := Scheme}) ->
Scheme.
-spec host(req()) -> binary().
host(#{host := Host}) ->
Host.
%% @todo The host_info is undefined if cowboy_router isn't used. Do we want to crash?
-spec host_info(req()) -> cowboy_router:tokens() | undefined.
host_info(#{host_info := HostInfo}) ->
HostInfo.
-spec port(req()) -> inet:port_number().
port(#{port := Port}) ->
Port.
-spec path(req()) -> binary().
path(#{path := Path}) ->
Path.
%% @todo The path_info is undefined if cowboy_router isn't used. Do we want to crash?
-spec path_info(req()) -> cowboy_router:tokens() | undefined.
path_info(#{path_info := PathInfo}) ->
PathInfo.
-spec qs(req()) -> binary().
qs(#{qs := Qs}) ->
Qs.
%% @todo Might be useful to limit the number of keys.
-spec parse_qs(req()) -> [{binary(), binary() | true}].
parse_qs(#{qs := Qs}) ->
try
cow_qs:parse_qs(Qs)
catch _:_:Stacktrace ->
erlang:raise(exit, {request_error, qs,
'Malformed query string; application/x-www-form-urlencoded expected.'
}, Stacktrace)
end.
-spec match_qs(cowboy:fields(), req()) -> map().
match_qs(Fields, Req) ->
case filter(Fields, kvlist_to_map(Fields, parse_qs(Req))) of
{ok, Map} ->
Map;
{error, Errors} ->
exit({request_error, {match_qs, Errors},
'Query string validation constraints failed for the reasons provided.'})
end.
-spec uri(req()) -> iodata().
uri(Req) ->
uri(Req, #{}).
-spec uri(req(), map()) -> iodata().
uri(#{scheme := Scheme0, host := Host0, port := Port0,
path := Path0, qs := Qs0}, Opts) ->
Scheme = case maps:get(scheme, Opts, Scheme0) of
S = undefined -> S;
S -> iolist_to_binary(S)
end,
Host = maps:get(host, Opts, Host0),
Port = maps:get(port, Opts, Port0),
{Path, Qs} = case maps:get(path, Opts, Path0) of
<<"*">> -> {<<>>, <<>>};
P -> {P, maps:get(qs, Opts, Qs0)}
end,
Fragment = maps:get(fragment, Opts, undefined),
[uri_host(Scheme, Scheme0, Port, Host), uri_path(Path), uri_qs(Qs), uri_fragment(Fragment)].
uri_host(_, _, _, undefined) -> <<>>;
uri_host(Scheme, Scheme0, Port, Host) ->
case iolist_size(Host) of
0 -> <<>>;
_ -> [uri_scheme(Scheme), <<"//">>, Host, uri_port(Scheme, Scheme0, Port)]
end.
uri_scheme(undefined) -> <<>>;
uri_scheme(Scheme) ->
case iolist_size(Scheme) of
0 -> Scheme;
_ -> [Scheme, $:]
end.
uri_port(_, _, undefined) -> <<>>;
uri_port(undefined, <<"http">>, 80) -> <<>>;
uri_port(undefined, <<"https">>, 443) -> <<>>;
uri_port(<<"http">>, _, 80) -> <<>>;
uri_port(<<"https">>, _, 443) -> <<>>;
uri_port(_, _, Port) ->
[$:, integer_to_binary(Port)].
uri_path(undefined) -> <<>>;
uri_path(Path) -> Path.
uri_qs(undefined) -> <<>>;
uri_qs(Qs) ->
case iolist_size(Qs) of
0 -> Qs;
_ -> [$?, Qs]
end.
uri_fragment(undefined) -> <<>>;
uri_fragment(Fragment) ->
case iolist_size(Fragment) of
0 -> Fragment;
_ -> [$#, Fragment]
end.
-ifdef(TEST).
uri1_test() ->
<<"http://localhost/path">> = iolist_to_binary(uri(#{
scheme => <<"http">>, host => <<"localhost">>, port => 80,
path => <<"/path">>, qs => <<>>})),
<<"http://localhost:443/path">> = iolist_to_binary(uri(#{
scheme => <<"http">>, host => <<"localhost">>, port => 443,
path => <<"/path">>, qs => <<>>})),
<<"http://localhost:8080/path">> = iolist_to_binary(uri(#{
scheme => <<"http">>, host => <<"localhost">>, port => 8080,
path => <<"/path">>, qs => <<>>})),
<<"http://localhost:8080/path?dummy=2785">> = iolist_to_binary(uri(#{
scheme => <<"http">>, host => <<"localhost">>, port => 8080,
path => <<"/path">>, qs => <<"dummy=2785">>})),
<<"https://localhost/path">> = iolist_to_binary(uri(#{
scheme => <<"https">>, host => <<"localhost">>, port => 443,
path => <<"/path">>, qs => <<>>})),
<<"https://localhost:8443/path">> = iolist_to_binary(uri(#{
scheme => <<"https">>, host => <<"localhost">>, port => 8443,
path => <<"/path">>, qs => <<>>})),
<<"https://localhost:8443/path?dummy=2785">> = iolist_to_binary(uri(#{
scheme => <<"https">>, host => <<"localhost">>, port => 8443,
path => <<"/path">>, qs => <<"dummy=2785">>})),
ok.
uri2_test() ->
Req = #{
scheme => <<"http">>, host => <<"localhost">>, port => 8080,
path => <<"/path">>, qs => <<"dummy=2785">>
},
<<"http://localhost:8080/path?dummy=2785">> = iolist_to_binary(uri(Req, #{})),
%% Disable individual components.
<<"//localhost:8080/path?dummy=2785">> = iolist_to_binary(uri(Req, #{scheme => undefined})),
<<"/path?dummy=2785">> = iolist_to_binary(uri(Req, #{host => undefined})),
<<"http://localhost/path?dummy=2785">> = iolist_to_binary(uri(Req, #{port => undefined})),
<<"http://localhost:8080?dummy=2785">> = iolist_to_binary(uri(Req, #{path => undefined})),
<<"http://localhost:8080/path">> = iolist_to_binary(uri(Req, #{qs => undefined})),
<<"http://localhost:8080/path?dummy=2785">> = iolist_to_binary(uri(Req, #{fragment => undefined})),
<<"http://localhost:8080">> = iolist_to_binary(uri(Req, #{path => undefined, qs => undefined})),
<<>> = iolist_to_binary(uri(Req, #{host => undefined, path => undefined, qs => undefined})),
%% Empty values.
<<"//localhost:8080/path?dummy=2785">> = iolist_to_binary(uri(Req, #{scheme => <<>>})),
<<"//localhost:8080/path?dummy=2785">> = iolist_to_binary(uri(Req, #{scheme => ""})),
<<"//localhost:8080/path?dummy=2785">> = iolist_to_binary(uri(Req, #{scheme => [<<>>]})),
<<"/path?dummy=2785">> = iolist_to_binary(uri(Req, #{host => <<>>})),
<<"/path?dummy=2785">> = iolist_to_binary(uri(Req, #{host => ""})),
<<"/path?dummy=2785">> = iolist_to_binary(uri(Req, #{host => [<<>>]})),
<<"http://localhost:8080?dummy=2785">> = iolist_to_binary(uri(Req, #{path => <<>>})),
<<"http://localhost:8080?dummy=2785">> = iolist_to_binary(uri(Req, #{path => ""})),
<<"http://localhost:8080?dummy=2785">> = iolist_to_binary(uri(Req, #{path => [<<>>]})),
<<"http://localhost:8080/path">> = iolist_to_binary(uri(Req, #{qs => <<>>})),
<<"http://localhost:8080/path">> = iolist_to_binary(uri(Req, #{qs => ""})),
<<"http://localhost:8080/path">> = iolist_to_binary(uri(Req, #{qs => [<<>>]})),
<<"http://localhost:8080/path?dummy=2785">> = iolist_to_binary(uri(Req, #{fragment => <<>>})),
<<"http://localhost:8080/path?dummy=2785">> = iolist_to_binary(uri(Req, #{fragment => ""})),
<<"http://localhost:8080/path?dummy=2785">> = iolist_to_binary(uri(Req, #{fragment => [<<>>]})),
%% Port is integer() | undefined.
{'EXIT', _} = (catch iolist_to_binary(uri(Req, #{port => <<>>}))),
{'EXIT', _} = (catch iolist_to_binary(uri(Req, #{port => ""}))),
{'EXIT', _} = (catch iolist_to_binary(uri(Req, #{port => [<<>>]}))),
%% Update components.
<<"https://localhost:8080/path?dummy=2785">> = iolist_to_binary(uri(Req, #{scheme => "https"})),
<<"http://example.org:8080/path?dummy=2785">> = iolist_to_binary(uri(Req, #{host => "example.org"})),
<<"http://localhost:123/path?dummy=2785">> = iolist_to_binary(uri(Req, #{port => 123})),
<<"http://localhost:8080/custom?dummy=2785">> = iolist_to_binary(uri(Req, #{path => "/custom"})),
<<"http://localhost:8080/path?smart=42">> = iolist_to_binary(uri(Req, #{qs => "smart=42"})),
<<"http://localhost:8080/path?dummy=2785#intro">> = iolist_to_binary(uri(Req, #{fragment => "intro"})),
%% Interesting combinations.
<<"http://localhost/path?dummy=2785">> = iolist_to_binary(uri(Req, #{port => 80})),
<<"https://localhost/path?dummy=2785">> = iolist_to_binary(uri(Req, #{scheme => "https", port => 443})),
ok.
-endif.
-spec binding(atom(), req()) -> any() | undefined.
binding(Name, Req) ->
binding(Name, Req, undefined).
-spec binding(atom(), req(), Default) -> any() | Default when Default::any().
binding(Name, #{bindings := Bindings}, Default) when is_atom(Name) ->
case Bindings of
#{Name := Value} -> Value;
_ -> Default
end;
binding(Name, _, Default) when is_atom(Name) ->
Default.
-spec bindings(req()) -> cowboy_router:bindings().
bindings(#{bindings := Bindings}) ->
Bindings;
bindings(_) ->
#{}.
-spec header(binary(), req()) -> binary() | undefined.
header(Name, Req) ->
header(Name, Req, undefined).
-spec header(binary(), req(), Default) -> binary() | Default when Default::any().
header(Name, #{headers := Headers}, Default) ->
maps:get(Name, Headers, Default).
-spec headers(req()) -> cowboy:http_headers().
headers(#{headers := Headers}) ->
Headers.
-spec parse_header(binary(), Req) -> any() when Req::req().
parse_header(Name = <<"content-length">>, Req) ->
parse_header(Name, Req, 0);
parse_header(Name = <<"cookie">>, Req) ->
parse_header(Name, Req, []);
parse_header(Name, Req) ->
parse_header(Name, Req, undefined).
-spec parse_header(binary(), Req, any()) -> any() when Req::req().
parse_header(Name, Req, Default) ->
try
parse_header(Name, Req, Default, parse_header_fun(Name))
catch _:_:Stacktrace ->
erlang:raise(exit, {request_error, {header, Name},
'Malformed header. Please consult the relevant specification.'
}, Stacktrace)
end.
parse_header_fun(<<"accept">>) -> fun cow_http_hd:parse_accept/1;
parse_header_fun(<<"accept-charset">>) -> fun cow_http_hd:parse_accept_charset/1;
parse_header_fun(<<"accept-encoding">>) -> fun cow_http_hd:parse_accept_encoding/1;
parse_header_fun(<<"accept-language">>) -> fun cow_http_hd:parse_accept_language/1;
parse_header_fun(<<"access-control-request-headers">>) -> fun cow_http_hd:parse_access_control_request_headers/1;
parse_header_fun(<<"access-control-request-method">>) -> fun cow_http_hd:parse_access_control_request_method/1;
parse_header_fun(<<"authorization">>) -> fun cow_http_hd:parse_authorization/1;
parse_header_fun(<<"connection">>) -> fun cow_http_hd:parse_connection/1;
parse_header_fun(<<"content-encoding">>) -> fun cow_http_hd:parse_content_encoding/1;
parse_header_fun(<<"content-language">>) -> fun cow_http_hd:parse_content_language/1;
parse_header_fun(<<"content-length">>) -> fun cow_http_hd:parse_content_length/1;
parse_header_fun(<<"content-type">>) -> fun cow_http_hd:parse_content_type/1;
parse_header_fun(<<"cookie">>) -> fun cow_cookie:parse_cookie/1;
parse_header_fun(<<"expect">>) -> fun cow_http_hd:parse_expect/1;
parse_header_fun(<<"if-match">>) -> fun cow_http_hd:parse_if_match/1;
parse_header_fun(<<"if-modified-since">>) -> fun cow_http_hd:parse_if_modified_since/1;
parse_header_fun(<<"if-none-match">>) -> fun cow_http_hd:parse_if_none_match/1;
parse_header_fun(<<"if-range">>) -> fun cow_http_hd:parse_if_range/1;
parse_header_fun(<<"if-unmodified-since">>) -> fun cow_http_hd:parse_if_unmodified_since/1;
parse_header_fun(<<"max-forwards">>) -> fun cow_http_hd:parse_max_forwards/1;
parse_header_fun(<<"origin">>) -> fun cow_http_hd:parse_origin/1;
parse_header_fun(<<"proxy-authorization">>) -> fun cow_http_hd:parse_proxy_authorization/1;
parse_header_fun(<<"range">>) -> fun cow_http_hd:parse_range/1;
parse_header_fun(<<"sec-websocket-extensions">>) -> fun cow_http_hd:parse_sec_websocket_extensions/1;
parse_header_fun(<<"sec-websocket-protocol">>) -> fun cow_http_hd:parse_sec_websocket_protocol_req/1;
parse_header_fun(<<"sec-websocket-version">>) -> fun cow_http_hd:parse_sec_websocket_version_req/1;
parse_header_fun(<<"trailer">>) -> fun cow_http_hd:parse_trailer/1;
parse_header_fun(<<"upgrade">>) -> fun cow_http_hd:parse_upgrade/1;
parse_header_fun(<<"x-forwarded-for">>) -> fun cow_http_hd:parse_x_forwarded_for/1.
parse_header(Name, Req, Default, ParseFun) ->
case header(Name, Req) of
undefined -> Default;
Value -> ParseFun(Value)
end.
-spec filter_cookies([atom() | binary()], Req) -> Req when Req::req().
filter_cookies(Names0, Req=#{headers := Headers}) ->
Names = [if
is_atom(N) -> atom_to_binary(N, utf8);
true -> N
end || N <- Names0],
case header(<<"cookie">>, Req) of
undefined -> Req;
Value0 ->
Cookies0 = binary:split(Value0, <<$;>>),
Cookies = lists:filter(fun(Cookie) ->
lists:member(cookie_name(Cookie), Names)
end, Cookies0),
Value = iolist_to_binary(lists:join($;, Cookies)),
Req#{headers => Headers#{<<"cookie">> => Value}}
end.
%% This is a specialized function to extract a cookie name
%% regardless of whether the name is valid or not. We skip
%% whitespace at the beginning and take whatever's left to
%% be the cookie name, up to the = sign.
cookie_name(<<$\s, Rest/binary>>) -> cookie_name(Rest);
cookie_name(<<$\t, Rest/binary>>) -> cookie_name(Rest);
cookie_name(Name) -> cookie_name(Name, <<>>).
cookie_name(<<>>, Name) -> Name;
cookie_name(<<$=, _/bits>>, Name) -> Name;
cookie_name(<<C, Rest/bits>>, Acc) -> cookie_name(Rest, <<Acc/binary, C>>).
-spec parse_cookies(req()) -> [{binary(), binary()}].
parse_cookies(Req) ->
parse_header(<<"cookie">>, Req).
-spec match_cookies(cowboy:fields(), req()) -> map().
match_cookies(Fields, Req) ->
case filter(Fields, kvlist_to_map(Fields, parse_cookies(Req))) of
{ok, Map} ->
Map;
{error, Errors} ->
exit({request_error, {match_cookies, Errors},
'Cookie validation constraints failed for the reasons provided.'})
end.
%% Request body.
-spec has_body(req()) -> boolean().
has_body(#{has_body := HasBody}) ->
HasBody.
%% The length may not be known if HTTP/1.1 with a transfer-encoding;
%% or HTTP/2 with no content-length header. The length is always
%% known once the body has been completely read.
-spec body_length(req()) -> undefined | non_neg_integer().
body_length(#{body_length := Length}) ->
Length.
-spec read_body(Req) -> {ok, binary(), Req} | {more, binary(), Req} when Req::req().
read_body(Req) ->
read_body(Req, #{}).
-spec read_body(Req, read_body_opts()) -> {ok, binary(), Req} | {more, binary(), Req} when Req::req().
read_body(Req=#{has_body := false}, _) ->
{ok, <<>>, Req};
read_body(Req=#{has_read_body := true}, _) ->
{ok, <<>>, Req};
read_body(Req, Opts) ->
Length = maps:get(length, Opts, 8000000),
Period = maps:get(period, Opts, 15000),
DefaultTimeout = case Period of
infinity -> infinity; %% infinity + 1000 = infinity.
_ -> Period + 1000
end,
Timeout = maps:get(timeout, Opts, DefaultTimeout),
Ref = make_ref(),
cast({read_body, self(), Ref, Length, Period}, Req),
receive
{request_body, Ref, nofin, Body} ->
{more, Body, Req};
{request_body, Ref, fin, BodyLength, Body} ->
{ok, Body, set_body_length(Req, BodyLength)}
after Timeout ->
exit(timeout)
end.
set_body_length(Req=#{headers := Headers}, BodyLength) ->
Req#{
headers => Headers#{<<"content-length">> => integer_to_binary(BodyLength)},
body_length => BodyLength,
has_read_body => true
}.
-spec read_urlencoded_body(Req) -> {ok, [{binary(), binary() | true}], Req} when Req::req().
read_urlencoded_body(Req) ->
read_urlencoded_body(Req, #{length => 64000, period => 5000}).
-spec read_urlencoded_body(Req, read_body_opts()) -> {ok, [{binary(), binary() | true}], Req} when Req::req().
read_urlencoded_body(Req0, Opts) ->
case read_body(Req0, Opts) of
{ok, Body, Req} ->
try
{ok, cow_qs:parse_qs(Body), Req}
catch _:_:Stacktrace ->
erlang:raise(exit, {request_error, urlencoded_body,
'Malformed body; application/x-www-form-urlencoded expected.'
}, Stacktrace)
end;
{more, Body, _} ->
Length = maps:get(length, Opts, 64000),
if
byte_size(Body) < Length ->
exit({request_error, timeout,
'The request body was not received within the configured time.'});
true ->
exit({request_error, payload_too_large,
'The request body is larger than allowed by configuration.'})
end
end.
-spec read_and_match_urlencoded_body(cowboy:fields(), Req)
-> {ok, map(), Req} when Req::req().
read_and_match_urlencoded_body(Fields, Req) ->
read_and_match_urlencoded_body(Fields, Req, #{length => 64000, period => 5000}).
-spec read_and_match_urlencoded_body(cowboy:fields(), Req, read_body_opts())
-> {ok, map(), Req} when Req::req().
read_and_match_urlencoded_body(Fields, Req0, Opts) ->
{ok, Qs, Req} = read_urlencoded_body(Req0, Opts),
case filter(Fields, kvlist_to_map(Fields, Qs)) of
{ok, Map} ->
{ok, Map, Req};
{error, Errors} ->
exit({request_error, {read_and_match_urlencoded_body, Errors},
'Urlencoded request body validation constraints failed for the reasons provided.'})
end.
%% Multipart.
-spec read_part(Req)
-> {ok, cowboy:http_headers(), Req} | {done, Req}
when Req::req().
read_part(Req) ->
read_part(Req, #{length => 64000, period => 5000}).
-spec read_part(Req, read_body_opts())
-> {ok, cowboy:http_headers(), Req} | {done, Req}
when Req::req().
read_part(Req, Opts) ->
case maps:is_key(multipart, Req) of
true ->
{Data, Req2} = stream_multipart(Req, Opts, headers),
read_part(Data, Opts, Req2);
false ->
read_part(init_multipart(Req), Opts)
end.
read_part(Buffer, Opts, Req=#{multipart := {Boundary, _}}) ->
try cow_multipart:parse_headers(Buffer, Boundary) of
more ->
{Data, Req2} = stream_multipart(Req, Opts, headers),
read_part(<< Buffer/binary, Data/binary >>, Opts, Req2);
{more, Buffer2} ->
{Data, Req2} = stream_multipart(Req, Opts, headers),
read_part(<< Buffer2/binary, Data/binary >>, Opts, Req2);
{ok, Headers0, Rest} ->
Headers = maps:from_list(Headers0),
%% Reject multipart content containing duplicate headers.
true = map_size(Headers) =:= length(Headers0),
{ok, Headers, Req#{multipart => {Boundary, Rest}}};
%% Ignore epilogue.
{done, _} ->
{done, Req#{multipart => done}}
catch _:_:Stacktrace ->
erlang:raise(exit, {request_error, {multipart, headers},
'Malformed body; multipart expected.'
}, Stacktrace)
end.
-spec read_part_body(Req)
-> {ok, binary(), Req} | {more, binary(), Req}
when Req::req().
read_part_body(Req) ->
read_part_body(Req, #{}).
-spec read_part_body(Req, read_body_opts())
-> {ok, binary(), Req} | {more, binary(), Req}
when Req::req().
read_part_body(Req, Opts) ->
case maps:is_key(multipart, Req) of
true ->
read_part_body(<<>>, Opts, Req, <<>>);
false ->
read_part_body(init_multipart(Req), Opts)
end.
read_part_body(Buffer, Opts, Req=#{multipart := {Boundary, _}}, Acc) ->
Length = maps:get(length, Opts, 8000000),
case byte_size(Acc) > Length of
true ->
{more, Acc, Req#{multipart => {Boundary, Buffer}}};
false ->
{Data, Req2} = stream_multipart(Req, Opts, body),
case cow_multipart:parse_body(<< Buffer/binary, Data/binary >>, Boundary) of
{ok, Body} ->
read_part_body(<<>>, Opts, Req2, << Acc/binary, Body/binary >>);
{ok, Body, Rest} ->
read_part_body(Rest, Opts, Req2, << Acc/binary, Body/binary >>);
done ->
{ok, Acc, Req2};
{done, Body} ->
{ok, << Acc/binary, Body/binary >>, Req2};
{done, Body, Rest} ->
{ok, << Acc/binary, Body/binary >>,
Req2#{multipart => {Boundary, Rest}}}
end
end.
init_multipart(Req) ->
{<<"multipart">>, _, Params} = parse_header(<<"content-type">>, Req),
case lists:keyfind(<<"boundary">>, 1, Params) of
{_, Boundary} ->
Req#{multipart => {Boundary, <<>>}};
false ->
exit({request_error, {multipart, boundary},
'Missing boundary parameter for multipart media type.'})
end.
stream_multipart(Req=#{multipart := done}, _, _) ->
{<<>>, Req};
stream_multipart(Req=#{multipart := {_, <<>>}}, Opts, Type) ->
case read_body(Req, Opts) of
{more, Data, Req2} ->
{Data, Req2};
%% We crash when the data ends unexpectedly.
{ok, <<>>, _} ->
exit({request_error, {multipart, Type},
'Malformed body; multipart expected.'});
{ok, Data, Req2} ->
{Data, Req2}
end;
stream_multipart(Req=#{multipart := {Boundary, Buffer}}, _, _) ->
{Buffer, Req#{multipart => {Boundary, <<>>}}}.
%% Response.
-spec set_resp_cookie(iodata(), iodata(), Req)
-> Req when Req::req().
set_resp_cookie(Name, Value, Req) ->
set_resp_cookie(Name, Value, Req, #{}).
%% The cookie name cannot contain any of the following characters:
%% =,;\s\t\r\n\013\014
%%
%% The cookie value cannot contain any of the following characters:
%% ,; \t\r\n\013\014
-spec set_resp_cookie(binary(), iodata(), Req, cow_cookie:cookie_opts())
-> Req when Req::req().
set_resp_cookie(Name, Value, Req, Opts) ->
Cookie = cow_cookie:setcookie(Name, Value, Opts),
RespCookies = maps:get(resp_cookies, Req, #{}),
Req#{resp_cookies => RespCookies#{Name => Cookie}}.
%% @todo We could add has_resp_cookie and unset_resp_cookie now.
-spec set_resp_header(binary(), iodata(), Req)
-> Req when Req::req().
set_resp_header(<<"set-cookie">>, _, _) ->
exit({response_error, invalid_header,
'Response cookies must be set using cowboy_req:set_resp_cookie/3,4.'});
set_resp_header(Name, Value, Req=#{resp_headers := RespHeaders}) ->
Req#{resp_headers => RespHeaders#{Name => Value}};
set_resp_header(Name,Value, Req) ->
Req#{resp_headers => #{Name => Value}}.
-spec set_resp_headers(cowboy:http_headers(), Req)
-> Req when Req::req().
set_resp_headers(#{<<"set-cookie">> := _}, _) ->
exit({response_error, invalid_header,
'Response cookies must be set using cowboy_req:set_resp_cookie/3,4.'});
set_resp_headers(Headers, Req=#{resp_headers := RespHeaders}) ->
Req#{resp_headers => maps:merge(RespHeaders, Headers)};
set_resp_headers(Headers, Req) ->
Req#{resp_headers => Headers}.
-spec resp_header(binary(), req()) -> binary() | undefined.
resp_header(Name, Req) ->
resp_header(Name, Req, undefined).
-spec resp_header(binary(), req(), Default)
-> binary() | Default when Default::any().
resp_header(Name, #{resp_headers := Headers}, Default) ->
maps:get(Name, Headers, Default);
resp_header(_, #{}, Default) ->
Default.
-spec resp_headers(req()) -> cowboy:http_headers().
resp_headers(#{resp_headers := RespHeaders}) ->
RespHeaders;
resp_headers(#{}) ->
#{}.
-spec set_resp_body(resp_body(), Req) -> Req when Req::req().
set_resp_body(Body, Req) ->
Req#{resp_body => Body}.
-spec has_resp_header(binary(), req()) -> boolean().
has_resp_header(Name, #{resp_headers := RespHeaders}) ->
maps:is_key(Name, RespHeaders);
has_resp_header(_, _) ->
false.
-spec has_resp_body(req()) -> boolean().
has_resp_body(#{resp_body := {sendfile, _, _, _}}) ->
true;
has_resp_body(#{resp_body := RespBody}) ->
iolist_size(RespBody) > 0;
has_resp_body(_) ->
false.
-spec delete_resp_header(binary(), Req)
-> Req when Req::req().
delete_resp_header(Name, Req=#{resp_headers := RespHeaders}) ->
Req#{resp_headers => maps:remove(Name, RespHeaders)};
%% There are no resp headers so we have nothing to delete.
delete_resp_header(_, Req) ->
Req.
-spec inform(cowboy:http_status(), req()) -> ok.
inform(Status, Req) ->
inform(Status, #{}, Req).
-spec inform(cowboy:http_status(), cowboy:http_headers(), req()) -> ok.
inform(_, _, #{has_sent_resp := _}) ->
exit({response_error, response_already_sent,
'The final response has already been sent.'});
inform(_, #{<<"set-cookie">> := _}, _) ->
exit({response_error, invalid_header,
'Response cookies must be set using cowboy_req:set_resp_cookie/3,4.'});
inform(Status, Headers, Req) when is_integer(Status); is_binary(Status) ->
cast({inform, Status, Headers}, Req).
-spec reply(cowboy:http_status(), Req) -> Req when Req::req().
reply(Status, Req) ->
reply(Status, #{}, Req).
-spec reply(cowboy:http_status(), cowboy:http_headers(), Req)
-> Req when Req::req().
reply(Status, Headers, Req=#{resp_body := Body}) ->
reply(Status, Headers, Body, Req);
reply(Status, Headers, Req) ->
reply(Status, Headers, <<>>, Req).
-spec reply(cowboy:http_status(), cowboy:http_headers(), resp_body(), Req)
-> Req when Req::req().
reply(_, _, _, #{has_sent_resp := _}) ->
exit({response_error, response_already_sent,
'The final response has already been sent.'});
reply(_, #{<<"set-cookie">> := _}, _, _) ->
exit({response_error, invalid_header,
'Response cookies must be set using cowboy_req:set_resp_cookie/3,4.'});
reply(Status, Headers, {sendfile, _, 0, _}, Req)
when is_integer(Status); is_binary(Status) ->
do_reply(Status, Headers#{
<<"content-length">> => <<"0">>
}, <<>>, Req);
reply(Status, Headers, SendFile = {sendfile, _, Len, _}, Req)
when is_integer(Status); is_binary(Status) ->
do_reply(Status, Headers#{
<<"content-length">> => integer_to_binary(Len)
}, SendFile, Req);
%% 204 responses must not include content-length. 304 responses may
%% but only when set explicitly. (RFC7230 3.3.1, RFC7230 3.3.2)
%% Neither status code must include a response body. (RFC7230 3.3)
reply(Status, Headers, Body, Req)
when Status =:= 204; Status =:= 304 ->
do_reply_ensure_no_body(Status, Headers, Body, Req);
reply(Status = <<"204",_/bits>>, Headers, Body, Req) ->
do_reply_ensure_no_body(Status, Headers, Body, Req);
reply(Status = <<"304",_/bits>>, Headers, Body, Req) ->
do_reply_ensure_no_body(Status, Headers, Body, Req);
reply(Status, Headers, Body, Req)
when is_integer(Status); is_binary(Status) ->
do_reply(Status, Headers#{
<<"content-length">> => integer_to_binary(iolist_size(Body))
}, Body, Req).
do_reply_ensure_no_body(Status, Headers, Body, Req) ->
case iolist_size(Body) of
0 ->
do_reply(Status, Headers, Body, Req);
_ ->
exit({response_error, payload_too_large,
'204 and 304 responses must not include a body. (RFC7230 3.3)'})
end.
%% Don't send any body for HEAD responses. While the protocol code is
%% supposed to enforce this rule, we prefer to avoid copying too much
%% data around if we can avoid it.
do_reply(Status, Headers, _, Req=#{method := <<"HEAD">>}) ->
cast({response, Status, response_headers(Headers, Req), <<>>}, Req),
done_replying(Req, true);
do_reply(Status, Headers, Body, Req) ->
cast({response, Status, response_headers(Headers, Req), Body}, Req),
done_replying(Req, true).
done_replying(Req, HasSentResp) ->
maps:without([resp_cookies, resp_headers, resp_body], Req#{has_sent_resp => HasSentResp}).
-spec stream_reply(cowboy:http_status(), Req) -> Req when Req::req().
stream_reply(Status, Req) ->
stream_reply(Status, #{}, Req).
-spec stream_reply(cowboy:http_status(), cowboy:http_headers(), Req)
-> Req when Req::req().
stream_reply(_, _, #{has_sent_resp := _}) ->
exit({response_error, response_already_sent,
'The final response has already been sent.'});
stream_reply(_, #{<<"set-cookie">> := _}, _) ->
exit({response_error, invalid_header,
'Response cookies must be set using cowboy_req:set_resp_cookie/3,4.'});
%% 204 and 304 responses must NOT send a body. We therefore
%% transform the call to a full response and expect the user
%% to NOT call stream_body/3 afterwards. (RFC7230 3.3)
stream_reply(Status, Headers=#{}, Req)
when Status =:= 204; Status =:= 304 ->
reply(Status, Headers, <<>>, Req);
stream_reply(Status = <<"204",_/bits>>, Headers=#{}, Req) ->
reply(Status, Headers, <<>>, Req);
stream_reply(Status = <<"304",_/bits>>, Headers=#{}, Req) ->
reply(Status, Headers, <<>>, Req);
stream_reply(Status, Headers=#{}, Req) when is_integer(Status); is_binary(Status) ->
cast({headers, Status, response_headers(Headers, Req)}, Req),
done_replying(Req, headers).
-spec stream_body(resp_body(), fin | nofin, req()) -> ok.
%% Error out if headers were not sent.
%% Don't send any body for HEAD responses.
stream_body(_, _, #{method := <<"HEAD">>, has_sent_resp := headers}) ->
ok;
%% Don't send a message if the data is empty, except for the
%% very last message with IsFin=fin. When using sendfile this
%% is converted to a data tuple, however.
stream_body({sendfile, _, 0, _}, nofin, _) ->
ok;
stream_body({sendfile, _, 0, _}, IsFin=fin, Req=#{has_sent_resp := headers}) ->
stream_body({data, self(), IsFin, <<>>}, Req);
stream_body({sendfile, O, B, P}, IsFin, Req=#{has_sent_resp := headers})
when is_integer(O), O >= 0, is_integer(B), B > 0 ->
stream_body({data, self(), IsFin, {sendfile, O, B, P}}, Req);
stream_body(Data, IsFin=nofin, Req=#{has_sent_resp := headers})
when not is_tuple(Data) ->
case iolist_size(Data) of
0 -> ok;
_ -> stream_body({data, self(), IsFin, Data}, Req)
end;
stream_body(Data, IsFin, Req=#{has_sent_resp := headers})
when not is_tuple(Data) ->
stream_body({data, self(), IsFin, Data}, Req).
%% @todo Do we need a timeout?
stream_body(Msg, Req=#{pid := Pid}) ->
cast(Msg, Req),
receive {data_ack, Pid} -> ok end.
-spec stream_events(cow_sse:event() | [cow_sse:event()], fin | nofin, req()) -> ok.
stream_events(Event, IsFin, Req) when is_map(Event) ->
stream_events([Event], IsFin, Req);
stream_events(Events, IsFin, Req=#{has_sent_resp := headers}) ->
stream_body({data, self(), IsFin, cow_sse:events(Events)}, Req).
-spec stream_trailers(cowboy:http_headers(), req()) -> ok.
stream_trailers(#{<<"set-cookie">> := _}, _) ->
exit({response_error, invalid_header,
'Response cookies must be set using cowboy_req:set_resp_cookie/3,4.'});
stream_trailers(Trailers, Req=#{has_sent_resp := headers}) ->
cast({trailers, Trailers}, Req).
-spec push(iodata(), cowboy:http_headers(), req()) -> ok.
push(Path, Headers, Req) ->
push(Path, Headers, Req, #{}).
%% @todo Optimization: don't send anything at all for HTTP/1.0 and HTTP/1.1.
%% @todo Path, Headers, Opts, everything should be in proper binary,
%% or normalized when creating the Req object.
-spec push(iodata(), cowboy:http_headers(), req(), push_opts()) -> ok.
push(_, _, #{has_sent_resp := _}, _) ->
exit({response_error, response_already_sent,
'The final response has already been sent.'});
push(Path, Headers, Req=#{scheme := Scheme0, host := Host0, port := Port0}, Opts) ->
Method = maps:get(method, Opts, <<"GET">>),
Scheme = maps:get(scheme, Opts, Scheme0),
Host = maps:get(host, Opts, Host0),
Port = maps:get(port, Opts, Port0),
Qs = maps:get(qs, Opts, <<>>),
cast({push, Method, Scheme, Host, Port, Path, Qs, Headers}, Req).
%% Stream handlers.
-spec cast(any(), req()) -> ok.
cast(Msg, #{pid := Pid, streamid := StreamID}) ->
Pid ! {{Pid, StreamID}, Msg},
ok.
%% Internal.
%% @todo What about set-cookie headers set through set_resp_header or reply?
-spec response_headers(Headers, req()) -> Headers when Headers::cowboy:http_headers().
response_headers(Headers0, Req) ->
RespHeaders = maps:get(resp_headers, Req, #{}),
Headers = maps:merge(#{
<<"date">> => cowboy_clock:rfc1123(),
<<"server">> => <<"Cowboy">>
}, maps:merge(RespHeaders, Headers0)),
%% The set-cookie header is special; we can only send one cookie per header.
%% We send the list of values for many cookies in one key of the map,
%% and let the protocols deal with it directly.
case maps:get(resp_cookies, Req, undefined) of
undefined -> Headers;
RespCookies -> Headers#{<<"set-cookie">> => maps:values(RespCookies)}
end.
%% Create map, convert keys to atoms and group duplicate keys into lists.
%% Keys that are not found in the user provided list are entirely skipped.
%% @todo Can probably be done directly while parsing.
kvlist_to_map(Fields, KvList) ->
Keys = [case K of
{Key, _} -> Key;
{Key, _, _} -> Key;
Key -> Key
end || K <- Fields],
kvlist_to_map(Keys, KvList, #{}).
kvlist_to_map(_, [], Map) ->
Map;
kvlist_to_map(Keys, [{Key, Value}|Tail], Map) ->
try binary_to_existing_atom(Key, utf8) of
Atom ->
case lists:member(Atom, Keys) of
true ->
case maps:find(Atom, Map) of
{ok, MapValue} when is_list(MapValue) ->
kvlist_to_map(Keys, Tail,
Map#{Atom => [Value|MapValue]});
{ok, MapValue} ->
kvlist_to_map(Keys, Tail,
Map#{Atom => [Value, MapValue]});
error ->
kvlist_to_map(Keys, Tail,
Map#{Atom => Value})
end;
false ->
kvlist_to_map(Keys, Tail, Map)
end
catch error:badarg ->
kvlist_to_map(Keys, Tail, Map)
end.
filter(Fields, Map0) ->
filter(Fields, Map0, #{}).
%% Loop through fields, if value is missing and no default,
%% record the error; else if value is missing and has a
%% default, set default; otherwise apply constraints. If
%% constraint fails, record the error.
%%
%% When there is an error at the end, crash.
filter([], Map, Errors) ->
case maps:size(Errors) of
0 -> {ok, Map};
_ -> {error, Errors}
end;
filter([{Key, Constraints}|Tail], Map, Errors) ->
case maps:find(Key, Map) of
{ok, Value} ->
filter_constraints(Tail, Map, Errors, Key, Value, Constraints);
error ->
filter(Tail, Map, Errors#{Key => required})
end;
filter([{Key, Constraints, Default}|Tail], Map, Errors) ->
case maps:find(Key, Map) of
{ok, Value} ->
filter_constraints(Tail, Map, Errors, Key, Value, Constraints);
error ->
filter(Tail, Map#{Key => Default}, Errors)
end;
filter([Key|Tail], Map, Errors) ->
case maps:is_key(Key, Map) of
true ->
filter(Tail, Map, Errors);
false ->
filter(Tail, Map, Errors#{Key => required})
end.
filter_constraints(Tail, Map, Errors, Key, Value0, Constraints) ->
case cowboy_constraints:validate(Value0, Constraints) of
{ok, Value} ->
filter(Tail, Map#{Key => Value}, Errors);
{error, Reason} ->
filter(Tail, Map, Errors#{Key => Reason})
end.