2023-03-28 23:55:57 +03:00
|
|
|
// Copyright (c) 2019-2023 Alexander Medvednikov. All rights reserved.
|
2019-10-24 19:44:49 +03:00
|
|
|
// Use of this source code is governed by an MIT license
|
|
|
|
// that can be found in the LICENSE file.
|
2019-07-29 19:21:36 +03:00
|
|
|
module vweb
|
|
|
|
|
2020-04-26 14:49:31 +03:00
|
|
|
import os
|
2020-11-15 23:54:47 +03:00
|
|
|
import io
|
2023-04-02 02:24:33 +03:00
|
|
|
import runtime
|
2020-04-26 14:49:31 +03:00
|
|
|
import net
|
|
|
|
import net.http
|
|
|
|
import net.urllib
|
2020-06-23 22:02:17 +03:00
|
|
|
import time
|
2021-10-18 18:25:06 +03:00
|
|
|
import json
|
2022-12-13 23:10:57 +03:00
|
|
|
import encoding.html
|
2023-06-27 01:25:45 +03:00
|
|
|
import context
|
2019-07-29 19:21:36 +03:00
|
|
|
|
2021-10-03 16:26:44 +03:00
|
|
|
// A type which don't get filtered inside templates
|
|
|
|
pub type RawHtml = string
|
|
|
|
|
|
|
|
// A dummy structure that returns from routes to indicate that you actually sent something to a user
|
|
|
|
[noinit]
|
|
|
|
pub struct Result {}
|
|
|
|
|
2019-12-23 13:24:53 +03:00
|
|
|
pub const (
|
2021-07-10 11:58:07 +03:00
|
|
|
methods_with_form = [http.Method.post, .put, .patch]
|
2021-08-04 12:44:41 +03:00
|
|
|
headers_close = http.new_custom_header_from_map({
|
2022-02-16 22:08:29 +03:00
|
|
|
'Server': 'VWeb'
|
2021-07-12 12:16:41 +03:00
|
|
|
http.CommonHeader.connection.str(): 'close'
|
|
|
|
}) or { panic('should never fail') }
|
|
|
|
|
2021-08-20 01:13:36 +03:00
|
|
|
http_302 = http.new_response(
|
|
|
|
status: .found
|
2022-05-29 20:27:18 +03:00
|
|
|
body: '302 Found'
|
2021-08-20 01:13:36 +03:00
|
|
|
header: headers_close
|
|
|
|
)
|
2021-07-24 20:47:45 +03:00
|
|
|
http_400 = http.new_response(
|
|
|
|
status: .bad_request
|
2022-05-29 20:27:18 +03:00
|
|
|
body: '400 Bad Request'
|
2021-07-24 20:47:45 +03:00
|
|
|
header: http.new_header(
|
|
|
|
key: .content_type
|
|
|
|
value: 'text/plain'
|
|
|
|
).join(headers_close)
|
|
|
|
)
|
|
|
|
http_404 = http.new_response(
|
|
|
|
status: .not_found
|
2022-05-29 20:27:18 +03:00
|
|
|
body: '404 Not Found'
|
2021-07-24 20:47:45 +03:00
|
|
|
header: http.new_header(
|
|
|
|
key: .content_type
|
|
|
|
value: 'text/plain'
|
|
|
|
).join(headers_close)
|
|
|
|
)
|
|
|
|
http_500 = http.new_response(
|
|
|
|
status: .internal_server_error
|
2022-05-29 20:27:18 +03:00
|
|
|
body: '500 Internal Server Error'
|
2021-07-24 20:47:45 +03:00
|
|
|
header: http.new_header(
|
|
|
|
key: .content_type
|
|
|
|
value: 'text/plain'
|
|
|
|
).join(headers_close)
|
|
|
|
)
|
2021-08-04 12:44:41 +03:00
|
|
|
mime_types = {
|
2021-08-18 08:51:18 +03:00
|
|
|
'.aac': 'audio/aac'
|
|
|
|
'.abw': 'application/x-abiword'
|
|
|
|
'.arc': 'application/x-freearc'
|
|
|
|
'.avi': 'video/x-msvideo'
|
|
|
|
'.azw': 'application/vnd.amazon.ebook'
|
|
|
|
'.bin': 'application/octet-stream'
|
|
|
|
'.bmp': 'image/bmp'
|
|
|
|
'.bz': 'application/x-bzip'
|
|
|
|
'.bz2': 'application/x-bzip2'
|
|
|
|
'.cda': 'application/x-cdf'
|
|
|
|
'.csh': 'application/x-csh'
|
|
|
|
'.css': 'text/css'
|
|
|
|
'.csv': 'text/csv'
|
|
|
|
'.doc': 'application/msword'
|
|
|
|
'.docx': 'application/vnd.openxmlformats-officedocument.wordprocessingml.document'
|
|
|
|
'.eot': 'application/vnd.ms-fontobject'
|
|
|
|
'.epub': 'application/epub+zip'
|
|
|
|
'.gz': 'application/gzip'
|
|
|
|
'.gif': 'image/gif'
|
|
|
|
'.htm': 'text/html'
|
|
|
|
'.html': 'text/html'
|
|
|
|
'.ico': 'image/vnd.microsoft.icon'
|
|
|
|
'.ics': 'text/calendar'
|
|
|
|
'.jar': 'application/java-archive'
|
|
|
|
'.jpeg': 'image/jpeg'
|
|
|
|
'.jpg': 'image/jpeg'
|
|
|
|
'.js': 'text/javascript'
|
|
|
|
'.json': 'application/json'
|
|
|
|
'.jsonld': 'application/ld+json'
|
|
|
|
'.mid': 'audio/midi audio/x-midi'
|
|
|
|
'.midi': 'audio/midi audio/x-midi'
|
|
|
|
'.mjs': 'text/javascript'
|
|
|
|
'.mp3': 'audio/mpeg'
|
|
|
|
'.mp4': 'video/mp4'
|
|
|
|
'.mpeg': 'video/mpeg'
|
|
|
|
'.mpkg': 'application/vnd.apple.installer+xml'
|
|
|
|
'.odp': 'application/vnd.oasis.opendocument.presentation'
|
|
|
|
'.ods': 'application/vnd.oasis.opendocument.spreadsheet'
|
|
|
|
'.odt': 'application/vnd.oasis.opendocument.text'
|
|
|
|
'.oga': 'audio/ogg'
|
|
|
|
'.ogv': 'video/ogg'
|
|
|
|
'.ogx': 'application/ogg'
|
|
|
|
'.opus': 'audio/opus'
|
|
|
|
'.otf': 'font/otf'
|
|
|
|
'.png': 'image/png'
|
|
|
|
'.pdf': 'application/pdf'
|
|
|
|
'.php': 'application/x-httpd-php'
|
|
|
|
'.ppt': 'application/vnd.ms-powerpoint'
|
|
|
|
'.pptx': 'application/vnd.openxmlformats-officedocument.presentationml.presentation'
|
|
|
|
'.rar': 'application/vnd.rar'
|
|
|
|
'.rtf': 'application/rtf'
|
|
|
|
'.sh': 'application/x-sh'
|
|
|
|
'.svg': 'image/svg+xml'
|
|
|
|
'.swf': 'application/x-shockwave-flash'
|
|
|
|
'.tar': 'application/x-tar'
|
|
|
|
'.tif': 'image/tiff'
|
|
|
|
'.tiff': 'image/tiff'
|
|
|
|
'.ts': 'video/mp2t'
|
|
|
|
'.ttf': 'font/ttf'
|
|
|
|
'.txt': 'text/plain'
|
|
|
|
'.vsd': 'application/vnd.visio'
|
|
|
|
'.wav': 'audio/wav'
|
|
|
|
'.weba': 'audio/webm'
|
|
|
|
'.webm': 'video/webm'
|
|
|
|
'.webp': 'image/webp'
|
|
|
|
'.woff': 'font/woff'
|
|
|
|
'.woff2': 'font/woff2'
|
|
|
|
'.xhtml': 'application/xhtml+xml'
|
|
|
|
'.xls': 'application/vnd.ms-excel'
|
|
|
|
'.xlsx': 'application/vnd.openxmlformats-officedocument.spreadsheetml.sheet'
|
|
|
|
'.xml': 'application/xml'
|
|
|
|
'.xul': 'application/vnd.mozilla.xul+xml'
|
|
|
|
'.zip': 'application/zip'
|
|
|
|
'.3gp': 'video/3gpp'
|
|
|
|
'.3g2': 'video/3gpp2'
|
|
|
|
'.7z': 'application/x-7z-compressed'
|
2019-09-05 15:46:24 +03:00
|
|
|
}
|
2021-04-29 02:17:37 +03:00
|
|
|
max_http_post_size = 1024 * 1024
|
|
|
|
default_port = 8080
|
2019-08-10 10:12:17 +03:00
|
|
|
)
|
|
|
|
|
2021-10-03 16:26:44 +03:00
|
|
|
// The Context struct represents the Context which hold the HTTP request and response.
|
|
|
|
// It has fields for the query, form, files.
|
2019-10-24 19:44:49 +03:00
|
|
|
pub struct Context {
|
2020-05-27 07:53:48 +03:00
|
|
|
mut:
|
2021-01-12 06:38:43 +03:00
|
|
|
content_type string = 'text/plain'
|
|
|
|
status string = '200 OK'
|
2023-06-27 01:25:45 +03:00
|
|
|
ctx context.Context = context.EmptyContext{}
|
2019-10-24 19:44:49 +03:00
|
|
|
pub:
|
2021-10-03 16:26:44 +03:00
|
|
|
// HTTP Request
|
2021-01-20 13:11:01 +03:00
|
|
|
req http.Request
|
2019-10-24 19:44:49 +03:00
|
|
|
// TODO Response
|
2020-05-27 04:38:21 +03:00
|
|
|
pub mut:
|
2021-10-03 16:26:44 +03:00
|
|
|
done bool
|
|
|
|
// time.ticks() from start of vweb connection handle.
|
|
|
|
// You can use it to determine how much time is spent on your request.
|
|
|
|
page_gen_start i64
|
|
|
|
// TCP connection to client.
|
|
|
|
// But beware, do not store it for further use, after request processing vweb will close connection.
|
2022-09-15 07:59:31 +03:00
|
|
|
conn &net.TcpConn = unsafe { nil }
|
2020-12-31 19:07:24 +03:00
|
|
|
static_files map[string]string
|
|
|
|
static_mime_types map[string]string
|
2023-06-02 10:55:59 +03:00
|
|
|
static_hosts map[string]string
|
2021-10-03 16:26:44 +03:00
|
|
|
// Map containing query params for the route.
|
2022-03-31 19:32:32 +03:00
|
|
|
// http://localhost:3000/index?q=vpm&order_by=desc => { 'q': 'vpm', 'order_by': 'desc' }
|
2021-10-03 16:26:44 +03:00
|
|
|
query map[string]string
|
|
|
|
// Multipart-form fields.
|
|
|
|
form map[string]string
|
|
|
|
// Files from multipart-form.
|
|
|
|
files map[string][]http.FileData
|
|
|
|
|
|
|
|
header http.Header // response headers
|
|
|
|
// ? It doesn't seem to be used anywhere
|
2023-03-16 23:00:47 +03:00
|
|
|
form_error string
|
|
|
|
livereload_poll_interval_ms int = 250
|
2019-09-05 15:46:24 +03:00
|
|
|
}
|
|
|
|
|
2021-01-21 13:08:51 +03:00
|
|
|
struct FileData {
|
|
|
|
pub:
|
|
|
|
filename string
|
|
|
|
content_type string
|
|
|
|
data string
|
|
|
|
}
|
|
|
|
|
2021-10-03 16:26:44 +03:00
|
|
|
struct Route {
|
2023-03-26 02:57:42 +03:00
|
|
|
methods []http.Method
|
|
|
|
path string
|
|
|
|
middleware string
|
2023-05-29 03:11:10 +03:00
|
|
|
host string
|
2021-03-30 15:30:16 +03:00
|
|
|
}
|
|
|
|
|
2021-10-03 16:26:44 +03:00
|
|
|
// Defining this method is optional.
|
|
|
|
// This method called at server start.
|
|
|
|
// You can use it for initializing globals.
|
2021-08-03 15:41:43 +03:00
|
|
|
pub fn (ctx Context) init_server() {
|
|
|
|
eprintln('init_server() has been deprecated, please init your web app in `fn main()`')
|
|
|
|
}
|
2021-01-01 19:24:54 +03:00
|
|
|
|
2021-10-03 16:26:44 +03:00
|
|
|
// Defining this method is optional.
|
2023-03-16 23:00:47 +03:00
|
|
|
// This method is called before every request (aka middleware).
|
|
|
|
// You can use it for checking user session cookies or to add headers.
|
2021-04-15 06:27:24 +03:00
|
|
|
pub fn (ctx Context) before_request() {}
|
2021-01-01 19:24:54 +03:00
|
|
|
|
2022-08-20 12:06:24 +03:00
|
|
|
// TODO - test
|
2021-02-21 21:01:29 +03:00
|
|
|
// vweb intern function
|
2021-03-12 01:11:39 +03:00
|
|
|
[manualfree]
|
2020-12-31 19:07:24 +03:00
|
|
|
pub fn (mut ctx Context) send_response_to_client(mimetype string, res string) bool {
|
2020-11-14 14:55:10 +03:00
|
|
|
if ctx.done {
|
|
|
|
return false
|
|
|
|
}
|
2019-12-11 17:32:54 +03:00
|
|
|
ctx.done = true
|
2023-03-16 23:00:47 +03:00
|
|
|
//
|
2021-07-24 20:47:45 +03:00
|
|
|
mut resp := http.Response{
|
2022-05-29 20:27:18 +03:00
|
|
|
body: res
|
2020-06-28 20:55:53 +03:00
|
|
|
}
|
2023-03-16 23:00:47 +03:00
|
|
|
$if vweb_livereload ? {
|
|
|
|
if mimetype == 'text/html' {
|
|
|
|
resp.body = res.replace('</html>', '<script src="/vweb_livereload/${vweb_livereload_server_start}/script.js"></script>\n</html>')
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// build the header after the potential modification of resp.body from above
|
|
|
|
header := http.new_header_from_map({
|
|
|
|
http.CommonHeader.content_type: mimetype
|
|
|
|
http.CommonHeader.content_length: resp.body.len.str()
|
|
|
|
}).join(ctx.header)
|
|
|
|
resp.header = header.join(vweb.headers_close)
|
|
|
|
//
|
2021-07-24 20:47:45 +03:00
|
|
|
resp.set_version(.v1_1)
|
|
|
|
resp.set_status(http.status_from_int(ctx.status.int()))
|
2021-07-18 12:21:07 +03:00
|
|
|
send_string(mut ctx.conn, resp.bytestr()) or { return false }
|
2019-12-11 17:32:54 +03:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2021-02-21 21:01:29 +03:00
|
|
|
// Response HTTP_OK with s as payload with content-type `text/html`
|
2021-01-08 07:05:29 +03:00
|
|
|
pub fn (mut ctx Context) html(s string) Result {
|
2019-12-11 17:32:54 +03:00
|
|
|
ctx.send_response_to_client('text/html', s)
|
2021-01-08 07:05:29 +03:00
|
|
|
return Result{}
|
2019-09-05 15:46:24 +03:00
|
|
|
}
|
2019-07-30 16:46:10 +03:00
|
|
|
|
2021-02-21 21:01:29 +03:00
|
|
|
// Response HTTP_OK with s as payload with content-type `text/plain`
|
2020-06-27 14:56:15 +03:00
|
|
|
pub fn (mut ctx Context) text(s string) Result {
|
2019-12-11 17:32:54 +03:00
|
|
|
ctx.send_response_to_client('text/plain', s)
|
2020-06-28 00:22:37 +03:00
|
|
|
return Result{}
|
2019-09-05 15:46:24 +03:00
|
|
|
}
|
2019-07-29 19:21:36 +03:00
|
|
|
|
2021-10-18 18:25:06 +03:00
|
|
|
// Response HTTP_OK with json_s as payload with content-type `application/json`
|
2022-11-26 19:23:26 +03:00
|
|
|
pub fn (mut ctx Context) json[T](j T) Result {
|
2021-10-18 18:25:06 +03:00
|
|
|
json_s := json.encode(j)
|
|
|
|
ctx.send_response_to_client('application/json', json_s)
|
|
|
|
return Result{}
|
|
|
|
}
|
|
|
|
|
2021-12-07 01:31:17 +03:00
|
|
|
// Response HTTP_OK with a pretty-printed JSON result
|
2022-11-26 19:23:26 +03:00
|
|
|
pub fn (mut ctx Context) json_pretty[T](j T) Result {
|
2021-12-07 01:31:17 +03:00
|
|
|
json_s := json.encode_pretty(j)
|
|
|
|
ctx.send_response_to_client('application/json', json_s)
|
|
|
|
return Result{}
|
|
|
|
}
|
|
|
|
|
2022-08-20 12:06:24 +03:00
|
|
|
// TODO - test
|
2021-10-18 18:25:06 +03:00
|
|
|
// Response HTTP_OK with file as payload
|
|
|
|
pub fn (mut ctx Context) file(f_path string) Result {
|
2023-05-21 16:23:43 +03:00
|
|
|
if !os.exists(f_path) {
|
|
|
|
eprintln('[vweb] file ${f_path} does not exist')
|
|
|
|
return ctx.not_found()
|
|
|
|
}
|
2021-10-18 18:25:06 +03:00
|
|
|
ext := os.file_ext(f_path)
|
|
|
|
data := os.read_file(f_path) or {
|
2022-02-11 16:52:33 +03:00
|
|
|
eprint(err.msg())
|
2021-10-18 18:25:06 +03:00
|
|
|
ctx.server_error(500)
|
|
|
|
return Result{}
|
|
|
|
}
|
|
|
|
content_type := vweb.mime_types[ext]
|
2022-06-07 18:33:08 +03:00
|
|
|
if content_type.len == 0 {
|
2023-04-02 02:24:33 +03:00
|
|
|
eprintln('[vweb] no MIME type found for extension ${ext}')
|
2021-10-18 18:25:06 +03:00
|
|
|
ctx.server_error(500)
|
|
|
|
} else {
|
|
|
|
ctx.send_response_to_client(content_type, data)
|
|
|
|
}
|
2020-06-28 00:22:37 +03:00
|
|
|
return Result{}
|
|
|
|
}
|
|
|
|
|
2021-02-21 21:01:29 +03:00
|
|
|
// Response HTTP_OK with s as payload
|
2020-06-28 00:22:37 +03:00
|
|
|
pub fn (mut ctx Context) ok(s string) Result {
|
|
|
|
ctx.send_response_to_client(ctx.content_type, s)
|
|
|
|
return Result{}
|
2019-09-05 15:46:24 +03:00
|
|
|
}
|
2019-07-29 19:21:36 +03:00
|
|
|
|
2022-08-20 12:06:24 +03:00
|
|
|
// TODO - test
|
2021-02-21 21:01:29 +03:00
|
|
|
// Response a server error
|
2021-02-03 16:40:06 +03:00
|
|
|
pub fn (mut ctx Context) server_error(ecode int) Result {
|
|
|
|
$if debug {
|
2022-11-15 16:53:13 +03:00
|
|
|
eprintln('> ctx.server_error ecode: ${ecode}')
|
2021-02-03 16:40:06 +03:00
|
|
|
}
|
|
|
|
if ctx.done {
|
|
|
|
return Result{}
|
|
|
|
}
|
2021-07-10 11:58:07 +03:00
|
|
|
send_string(mut ctx.conn, vweb.http_500.bytestr()) or {}
|
2021-02-03 16:40:06 +03:00
|
|
|
return Result{}
|
|
|
|
}
|
|
|
|
|
2021-02-21 21:01:29 +03:00
|
|
|
// Redirect to an url
|
2020-06-30 22:04:00 +03:00
|
|
|
pub fn (mut ctx Context) redirect(url string) Result {
|
2020-11-14 14:55:10 +03:00
|
|
|
if ctx.done {
|
|
|
|
return Result{}
|
|
|
|
}
|
2019-12-11 17:32:54 +03:00
|
|
|
ctx.done = true
|
2021-08-20 01:13:36 +03:00
|
|
|
mut resp := vweb.http_302
|
|
|
|
resp.header = resp.header.join(ctx.header)
|
|
|
|
resp.header.add(.location, url)
|
|
|
|
send_string(mut ctx.conn, resp.bytestr()) or { return Result{} }
|
2020-06-30 22:04:00 +03:00
|
|
|
return Result{}
|
2019-09-05 15:46:24 +03:00
|
|
|
}
|
2019-07-29 19:21:36 +03:00
|
|
|
|
2021-02-21 21:01:29 +03:00
|
|
|
// Send an not_found response
|
2020-06-27 14:56:15 +03:00
|
|
|
pub fn (mut ctx Context) not_found() Result {
|
2020-11-14 14:55:10 +03:00
|
|
|
if ctx.done {
|
|
|
|
return Result{}
|
|
|
|
}
|
2019-12-11 17:32:54 +03:00
|
|
|
ctx.done = true
|
2021-07-10 11:58:07 +03:00
|
|
|
send_string(mut ctx.conn, vweb.http_404.bytestr()) or {}
|
2020-12-27 12:38:12 +03:00
|
|
|
return Result{}
|
2019-09-05 15:46:24 +03:00
|
|
|
}
|
2019-08-02 05:04:48 +03:00
|
|
|
|
2022-08-20 12:06:24 +03:00
|
|
|
// TODO - test
|
2021-02-21 21:01:29 +03:00
|
|
|
// Sets a cookie
|
2022-06-04 06:52:46 +03:00
|
|
|
pub fn (mut ctx Context) set_cookie(cookie http.Cookie) {
|
2023-03-28 23:27:01 +03:00
|
|
|
cookie_raw := cookie.str()
|
|
|
|
if cookie_raw == '' {
|
2023-04-02 02:24:33 +03:00
|
|
|
eprintln('[vweb] error setting cookie: name of cookie is invalid')
|
2023-03-28 23:27:01 +03:00
|
|
|
return
|
2020-07-19 22:42:50 +03:00
|
|
|
}
|
2023-03-28 23:27:01 +03:00
|
|
|
ctx.add_header('Set-Cookie', cookie_raw)
|
2020-07-05 17:44:23 +03:00
|
|
|
}
|
|
|
|
|
2021-02-21 21:01:29 +03:00
|
|
|
// Sets the response content type
|
2020-06-28 00:22:37 +03:00
|
|
|
pub fn (mut ctx Context) set_content_type(typ string) {
|
|
|
|
ctx.content_type = typ
|
|
|
|
}
|
|
|
|
|
2022-08-20 12:06:24 +03:00
|
|
|
// TODO - test
|
2023-03-28 23:27:01 +03:00
|
|
|
// Sets a cookie with a `expire_date`
|
2020-10-15 22:04:42 +03:00
|
|
|
pub fn (mut ctx Context) set_cookie_with_expire_date(key string, val string, expire_date time.Time) {
|
2023-03-28 23:27:01 +03:00
|
|
|
cookie := http.Cookie{
|
|
|
|
name: key
|
|
|
|
value: val
|
|
|
|
expires: expire_date
|
|
|
|
}
|
|
|
|
ctx.set_cookie(cookie)
|
2020-06-29 22:14:36 +03:00
|
|
|
}
|
|
|
|
|
2021-02-21 21:01:29 +03:00
|
|
|
// Gets a cookie by a key
|
2023-03-28 23:27:01 +03:00
|
|
|
pub fn (ctx &Context) get_cookie(key string) !string {
|
|
|
|
if value := ctx.req.cookies[key] {
|
|
|
|
return value
|
2019-09-05 15:46:24 +03:00
|
|
|
}
|
|
|
|
return error('Cookie not found')
|
|
|
|
}
|
2019-07-29 19:21:36 +03:00
|
|
|
|
2022-08-20 12:06:24 +03:00
|
|
|
// TODO - test
|
2021-02-21 21:01:29 +03:00
|
|
|
// Sets the response status
|
2020-08-09 19:05:06 +03:00
|
|
|
pub fn (mut ctx Context) set_status(code int, desc string) {
|
|
|
|
if code < 100 || code > 599 {
|
|
|
|
ctx.status = '500 Internal Server Error'
|
|
|
|
} else {
|
2022-11-15 16:53:13 +03:00
|
|
|
ctx.status = '${code} ${desc}'
|
2020-08-09 19:05:06 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-08-20 12:06:24 +03:00
|
|
|
// TODO - test
|
2021-02-21 21:01:29 +03:00
|
|
|
// Adds an header to the response with key and val
|
2020-10-15 22:04:42 +03:00
|
|
|
pub fn (mut ctx Context) add_header(key string, val string) {
|
2021-07-18 12:21:07 +03:00
|
|
|
ctx.header.add_custom(key, val) or {}
|
2019-07-29 19:21:36 +03:00
|
|
|
}
|
|
|
|
|
2022-08-20 12:06:24 +03:00
|
|
|
// TODO - test
|
2021-02-21 21:01:29 +03:00
|
|
|
// Returns the header data from the key
|
2019-12-23 13:24:53 +03:00
|
|
|
pub fn (ctx &Context) get_header(key string) string {
|
2021-04-09 19:17:33 +03:00
|
|
|
return ctx.req.header.get_custom(key) or { '' }
|
2019-09-05 15:46:24 +03:00
|
|
|
}
|
2019-07-29 19:21:36 +03:00
|
|
|
|
2023-06-27 01:25:45 +03:00
|
|
|
// set_value sets a value on the context
|
|
|
|
pub fn (mut ctx Context) set_value(key context.Key, value context.Any) {
|
|
|
|
ctx.ctx = context.with_value(ctx.ctx, key, value)
|
|
|
|
}
|
|
|
|
|
|
|
|
// get_value gets a value from the context
|
|
|
|
pub fn (ctx &Context) get_value[T](key context.Key) ?T {
|
|
|
|
if val := ctx.ctx.value(key) {
|
|
|
|
match val {
|
|
|
|
T {
|
|
|
|
// `context.value()` always returns a reference
|
|
|
|
// if we send back `val` the returntype becomes `?&T` and this can be problematic
|
|
|
|
// for end users since they won't be able to do something like
|
|
|
|
// `app.get_value[string]('a') or { '' }
|
|
|
|
// since V expects the value in the or block to be of type `&string`.
|
|
|
|
// And if a reference was allowed it would enable mutating the context directly
|
|
|
|
return *val
|
|
|
|
}
|
|
|
|
else {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return none
|
|
|
|
}
|
|
|
|
|
2023-04-23 03:37:15 +03:00
|
|
|
pub type DatabasePool[T] = fn (tid int) T
|
|
|
|
|
|
|
|
interface DbPoolInterface {
|
|
|
|
db_handle voidptr
|
|
|
|
mut:
|
|
|
|
db voidptr
|
|
|
|
}
|
|
|
|
|
2021-05-11 09:30:01 +03:00
|
|
|
interface DbInterface {
|
2023-04-23 03:37:15 +03:00
|
|
|
mut:
|
2021-05-11 09:30:01 +03:00
|
|
|
db voidptr
|
|
|
|
}
|
|
|
|
|
2023-03-26 02:57:42 +03:00
|
|
|
pub type Middleware = fn (mut Context) bool
|
|
|
|
|
|
|
|
interface MiddlewareInterface {
|
|
|
|
middlewares map[string][]Middleware
|
|
|
|
}
|
|
|
|
|
2023-04-02 16:46:43 +03:00
|
|
|
// Generate route structs for an app
|
|
|
|
fn generate_routes[T](app &T) !map[string]Route {
|
|
|
|
// Parsing methods attributes
|
|
|
|
mut routes := map[string]Route{}
|
|
|
|
$for method in T.methods {
|
2023-05-29 03:11:10 +03:00
|
|
|
http_methods, route_path, middleware, host := parse_attrs(method.name, method.attrs) or {
|
2023-04-02 16:46:43 +03:00
|
|
|
return error('error parsing method attributes: ${err}')
|
|
|
|
}
|
|
|
|
|
|
|
|
routes[method.name] = Route{
|
|
|
|
methods: http_methods
|
|
|
|
path: route_path
|
|
|
|
middleware: middleware
|
2023-05-29 03:11:10 +03:00
|
|
|
host: host
|
2023-04-02 16:46:43 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return routes
|
|
|
|
}
|
|
|
|
|
2023-05-29 03:11:10 +03:00
|
|
|
type ControllerHandler = fn (ctx Context, mut url urllib.URL, host string, tid int)
|
2023-04-02 16:46:43 +03:00
|
|
|
|
|
|
|
pub struct ControllerPath {
|
2023-05-30 15:22:23 +03:00
|
|
|
pub:
|
2023-04-02 16:46:43 +03:00
|
|
|
path string
|
2023-08-03 21:06:32 +03:00
|
|
|
handler ControllerHandler = unsafe { nil }
|
2023-05-30 15:22:23 +03:00
|
|
|
pub mut:
|
|
|
|
host string
|
2023-04-02 16:46:43 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
interface ControllerInterface {
|
|
|
|
controllers []&ControllerPath
|
|
|
|
}
|
|
|
|
|
|
|
|
pub struct Controller {
|
2023-05-10 18:31:43 +03:00
|
|
|
pub mut:
|
2023-04-02 16:46:43 +03:00
|
|
|
controllers []&ControllerPath
|
|
|
|
}
|
|
|
|
|
|
|
|
// controller generates a new Controller for the main app
|
|
|
|
pub fn controller[T](path string, global_app &T) &ControllerPath {
|
|
|
|
routes := generate_routes(global_app) or { panic(err.msg()) }
|
|
|
|
|
|
|
|
// generate struct with closure so the generic type is encapsulated in the closure
|
|
|
|
// no need to type `ControllerHandler` as generic since it's not needed for closures
|
|
|
|
return &ControllerPath{
|
|
|
|
path: path
|
2023-05-29 03:11:10 +03:00
|
|
|
handler: fn [global_app, path, routes] [T](ctx Context, mut url urllib.URL, host string, tid int) {
|
2023-04-02 16:46:43 +03:00
|
|
|
// request_app is freed in `handle_route`
|
2023-04-23 03:37:15 +03:00
|
|
|
mut request_app := new_request_app[T](global_app, ctx, tid)
|
2023-04-02 16:46:43 +03:00
|
|
|
// transform the url
|
|
|
|
url.path = url.path.all_after_first(path)
|
2023-05-29 03:11:10 +03:00
|
|
|
handle_route[T](mut request_app, url, host, &routes, tid)
|
2023-04-02 16:46:43 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-05-30 15:22:23 +03:00
|
|
|
// controller_host generates a controller which only handles incoming requests from the `host` domain
|
|
|
|
pub fn controller_host[T](host string, path string, global_app &T) &ControllerPath {
|
|
|
|
mut ctrl := controller(path, global_app)
|
|
|
|
ctrl.host = host
|
|
|
|
return ctrl
|
|
|
|
}
|
|
|
|
|
2022-02-01 19:41:12 +03:00
|
|
|
// run - start a new VWeb server, listening to all available addresses, at the specified `port`
|
2022-11-26 19:23:26 +03:00
|
|
|
pub fn run[T](global_app &T, port int) {
|
|
|
|
run_at[T](global_app, host: '', port: port, family: .ip6) or { panic(err.msg()) }
|
2022-02-18 11:18:04 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
[params]
|
|
|
|
pub struct RunParams {
|
2023-03-17 23:41:25 +03:00
|
|
|
family net.AddrFamily = .ip6 // use `family: .ip, host: 'localhost'` when you want it to bind only to 127.0.0.1
|
2023-04-02 02:24:33 +03:00
|
|
|
host string
|
|
|
|
port int = 8080
|
|
|
|
nr_workers int = runtime.nr_jobs()
|
|
|
|
pool_channel_slots int = 1000
|
2023-03-17 23:41:25 +03:00
|
|
|
show_startup_message bool = true
|
2022-02-01 19:41:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// run_at - start a new VWeb server, listening only on a specific address `host`, at the specified `port`
|
2022-08-20 12:06:24 +03:00
|
|
|
// Example: vweb.run_at(new_app(), vweb.RunParams{ host: 'localhost' port: 8099 family: .ip }) or { panic(err) }
|
2022-02-01 19:41:12 +03:00
|
|
|
[manualfree]
|
2022-11-26 19:23:26 +03:00
|
|
|
pub fn run_at[T](global_app &T, params RunParams) ! {
|
2022-07-11 07:55:33 +03:00
|
|
|
if params.port <= 0 || params.port > 65535 {
|
2022-11-15 16:53:13 +03:00
|
|
|
return error('invalid port number `${params.port}`, it should be between 1 and 65535')
|
2022-07-11 07:55:33 +03:00
|
|
|
}
|
2023-04-02 02:24:33 +03:00
|
|
|
if params.pool_channel_slots < 1 {
|
|
|
|
return error('invalid pool_channel_slots `${params.pool_channel_slots}`, it should be above 0, preferably higher than 10 x nr_workers')
|
|
|
|
}
|
|
|
|
if params.nr_workers < 1 {
|
|
|
|
return error('invalid nr_workers `${params.nr_workers}`, it should be above 0')
|
|
|
|
}
|
|
|
|
|
2022-11-15 16:53:13 +03:00
|
|
|
mut l := net.listen_tcp(params.family, '${params.host}:${params.port}') or {
|
2022-04-12 13:38:40 +03:00
|
|
|
ecode := err.code()
|
2022-11-15 16:53:13 +03:00
|
|
|
return error('failed to listen ${ecode} ${err}')
|
2022-02-18 11:18:04 +03:00
|
|
|
}
|
2021-06-13 23:53:38 +03:00
|
|
|
|
2023-04-02 16:46:43 +03:00
|
|
|
routes := generate_routes(global_app)!
|
|
|
|
// check duplicate routes in controllers
|
|
|
|
$if T is ControllerInterface {
|
|
|
|
mut paths := []string{}
|
|
|
|
for controller in global_app.controllers {
|
2023-05-30 15:22:23 +03:00
|
|
|
if controller.host == '' {
|
|
|
|
paths << controller.path
|
|
|
|
}
|
2023-04-02 16:46:43 +03:00
|
|
|
}
|
|
|
|
for method_name, route in routes {
|
|
|
|
for controller_path in paths {
|
|
|
|
if route.path.starts_with(controller_path) {
|
2023-05-30 15:22:23 +03:00
|
|
|
return error('conflicting paths: method "${method_name}" with route "${route.path}" should be handled by the Controller of path "${controller_path}"')
|
2023-04-02 16:46:43 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-04-02 02:24:33 +03:00
|
|
|
host := if params.host == '' { 'localhost' } else { params.host }
|
|
|
|
if params.show_startup_message {
|
|
|
|
println('[Vweb] Running app on http://${host}:${params.port}/')
|
|
|
|
}
|
|
|
|
|
|
|
|
ch := chan &RequestParams{cap: params.pool_channel_slots}
|
|
|
|
mut ws := []thread{cap: params.nr_workers}
|
|
|
|
for worker_number in 0 .. params.nr_workers {
|
|
|
|
ws << new_worker[T](ch, worker_number)
|
|
|
|
}
|
|
|
|
if params.show_startup_message {
|
|
|
|
println('[Vweb] We have ${ws.len} workers')
|
|
|
|
}
|
|
|
|
flush_stdout()
|
|
|
|
|
|
|
|
// Forever accept every connection that comes, and
|
|
|
|
// pass it through the channel, to the thread pool:
|
2019-07-29 19:21:36 +03:00
|
|
|
for {
|
2023-04-02 02:24:33 +03:00
|
|
|
mut connection := l.accept_only() or {
|
|
|
|
// failures should not panic
|
|
|
|
eprintln('[vweb] accept() failed with error: ${err.msg()}')
|
|
|
|
continue
|
2023-03-26 02:57:42 +03:00
|
|
|
}
|
2023-04-02 02:24:33 +03:00
|
|
|
ch <- &RequestParams{
|
|
|
|
connection: connection
|
|
|
|
global_app: unsafe { global_app }
|
|
|
|
routes: &routes
|
2021-05-11 09:30:01 +03:00
|
|
|
}
|
2023-04-02 02:24:33 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-04-23 03:37:15 +03:00
|
|
|
fn new_request_app[T](global_app &T, ctx Context, tid int) &T {
|
2023-04-02 02:24:33 +03:00
|
|
|
// Create a new app object for each connection, copy global data like db connections
|
|
|
|
mut request_app := &T{}
|
|
|
|
$if T is MiddlewareInterface {
|
|
|
|
request_app = &T{
|
|
|
|
middlewares: global_app.middlewares.clone()
|
|
|
|
}
|
|
|
|
}
|
2023-04-23 03:37:15 +03:00
|
|
|
|
|
|
|
$if T is DbPoolInterface {
|
|
|
|
// get database connection from the connection pool
|
|
|
|
request_app.db = global_app.db_handle(tid)
|
|
|
|
} $else $if T is DbInterface {
|
|
|
|
// copy a database to a app without pooling
|
2023-04-02 02:24:33 +03:00
|
|
|
request_app.db = global_app.db
|
|
|
|
}
|
2023-04-23 03:37:15 +03:00
|
|
|
|
2023-04-02 02:24:33 +03:00
|
|
|
$for field in T.fields {
|
|
|
|
if field.is_shared {
|
|
|
|
unsafe {
|
|
|
|
// TODO: remove this horrible hack, when copying a shared field at comptime works properly!!!
|
|
|
|
raptr := &voidptr(&request_app.$(field.name))
|
|
|
|
gaptr := &voidptr(&global_app.$(field.name))
|
|
|
|
*raptr = *gaptr
|
|
|
|
_ = raptr // TODO: v produces a warning that `raptr` is unused otherwise, even though it was on the previous line
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if 'vweb_global' in field.attrs {
|
2021-06-16 23:35:14 +03:00
|
|
|
request_app.$(field.name) = global_app.$(field.name)
|
|
|
|
}
|
2021-06-16 20:33:30 +03:00
|
|
|
}
|
2019-12-20 03:02:16 +03:00
|
|
|
}
|
2023-04-06 04:10:23 +03:00
|
|
|
request_app.Context = ctx // copy request data such as form and query etc
|
|
|
|
|
|
|
|
// copy static files
|
|
|
|
request_app.Context.static_files = global_app.static_files.clone()
|
|
|
|
request_app.Context.static_mime_types = global_app.static_mime_types.clone()
|
2023-06-02 10:55:59 +03:00
|
|
|
request_app.Context.static_hosts = global_app.static_hosts.clone()
|
2023-04-06 04:10:23 +03:00
|
|
|
|
2023-04-02 02:24:33 +03:00
|
|
|
return request_app
|
2019-12-20 03:02:16 +03:00
|
|
|
}
|
2019-12-13 21:11:40 +03:00
|
|
|
|
2021-03-17 03:33:31 +03:00
|
|
|
[manualfree]
|
2023-04-02 02:24:33 +03:00
|
|
|
fn handle_conn[T](mut conn net.TcpConn, global_app &T, routes &map[string]Route, tid int) {
|
2021-01-21 13:08:38 +03:00
|
|
|
conn.set_read_timeout(30 * time.second)
|
|
|
|
conn.set_write_timeout(30 * time.second)
|
2020-12-27 12:38:12 +03:00
|
|
|
defer {
|
2021-03-06 22:04:51 +03:00
|
|
|
conn.close() or {}
|
2020-12-27 12:38:12 +03:00
|
|
|
}
|
2021-10-03 16:26:44 +03:00
|
|
|
|
2023-04-02 02:24:33 +03:00
|
|
|
conn.set_sock() or {
|
|
|
|
eprintln('[vweb] tid: ${tid:03d}, error setting socket')
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-05-13 10:26:10 +03:00
|
|
|
mut reader := io.new_buffered_reader(reader: conn)
|
2021-03-15 23:25:19 +03:00
|
|
|
defer {
|
2022-08-20 08:03:07 +03:00
|
|
|
unsafe {
|
|
|
|
reader.free()
|
|
|
|
}
|
2021-03-15 23:25:19 +03:00
|
|
|
}
|
2021-10-03 16:26:44 +03:00
|
|
|
|
2020-06-23 22:02:17 +03:00
|
|
|
page_gen_start := time.ticks()
|
2021-10-03 16:26:44 +03:00
|
|
|
|
|
|
|
// Request parse
|
|
|
|
req := http.parse_request(mut reader) or {
|
2021-04-16 08:45:46 +03:00
|
|
|
// Prevents errors from being thrown when BufferedReader is empty
|
2022-11-15 16:53:13 +03:00
|
|
|
if '${err}' != 'none' {
|
2023-04-02 02:24:33 +03:00
|
|
|
eprintln('[vweb] tid: ${tid:03d}, error parsing request: ${err}')
|
2021-04-16 08:45:46 +03:00
|
|
|
}
|
2021-03-01 13:50:52 +03:00
|
|
|
return
|
|
|
|
}
|
2022-03-21 20:48:47 +03:00
|
|
|
$if trace_request ? {
|
|
|
|
dump(req)
|
|
|
|
}
|
|
|
|
$if trace_request_url ? {
|
|
|
|
dump(req.url)
|
|
|
|
}
|
2021-10-03 16:26:44 +03:00
|
|
|
// URL Parse
|
2023-04-02 16:46:43 +03:00
|
|
|
mut url := urllib.parse(req.url) or {
|
2023-04-02 02:24:33 +03:00
|
|
|
eprintln('[vweb] tid: ${tid:03d}, error parsing path: ${err}')
|
2021-10-03 16:26:44 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Query parse
|
|
|
|
query := parse_query_from_url(url)
|
|
|
|
|
|
|
|
// Form parse
|
|
|
|
form, files := parse_form_from_request(req) or {
|
|
|
|
// Bad request
|
|
|
|
conn.write(vweb.http_400.bytes()) or {}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-05-30 15:22:23 +03:00
|
|
|
// remove the port from the HTTP Host header
|
|
|
|
host_with_port := req.header.get(.host) or { '' }
|
|
|
|
host, _ := urllib.split_host_port(host_with_port)
|
2023-05-29 03:11:10 +03:00
|
|
|
|
2023-04-06 04:10:23 +03:00
|
|
|
// Create Context with request data
|
2023-04-02 16:46:43 +03:00
|
|
|
ctx := Context{
|
2023-06-27 01:25:45 +03:00
|
|
|
ctx: context.background()
|
2019-12-20 03:02:16 +03:00
|
|
|
req: req
|
2021-10-03 16:26:44 +03:00
|
|
|
page_gen_start: page_gen_start
|
2021-05-16 04:28:11 +03:00
|
|
|
conn: conn
|
2021-10-03 16:26:44 +03:00
|
|
|
query: query
|
|
|
|
form: form
|
|
|
|
files: files
|
2020-03-07 16:16:03 +03:00
|
|
|
}
|
2021-10-03 16:26:44 +03:00
|
|
|
|
2023-04-02 16:46:43 +03:00
|
|
|
// match controller paths
|
|
|
|
$if T is ControllerInterface {
|
|
|
|
for controller in global_app.controllers {
|
2023-05-30 15:22:23 +03:00
|
|
|
// skip controller if the hosts don't match
|
|
|
|
if controller.host != '' && host != controller.host {
|
|
|
|
continue
|
|
|
|
}
|
2023-04-02 16:46:43 +03:00
|
|
|
if url.path.len >= controller.path.len && url.path.starts_with(controller.path) {
|
|
|
|
// pass route handling to the controller
|
2023-05-29 03:11:10 +03:00
|
|
|
controller.handler(ctx, mut url, host, tid)
|
2023-04-02 16:46:43 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-04-23 03:37:15 +03:00
|
|
|
mut request_app := new_request_app(global_app, ctx, tid)
|
2023-05-29 03:11:10 +03:00
|
|
|
handle_route(mut request_app, url, host, routes, tid)
|
2023-04-02 16:46:43 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
[manualfree]
|
2023-05-29 03:11:10 +03:00
|
|
|
fn handle_route[T](mut app T, url urllib.URL, host string, routes &map[string]Route, tid int) {
|
2023-04-02 16:46:43 +03:00
|
|
|
defer {
|
|
|
|
unsafe {
|
|
|
|
free(app)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
url_words := url.path.split('/').filter(it != '')
|
|
|
|
|
2021-10-03 16:26:44 +03:00
|
|
|
// Calling middleware...
|
|
|
|
app.before_request()
|
|
|
|
|
2023-03-16 23:00:47 +03:00
|
|
|
$if vweb_livereload ? {
|
|
|
|
if url.path.starts_with('/vweb_livereload/') {
|
|
|
|
if url.path.ends_with('current') {
|
|
|
|
app.handle_vweb_livereload_current()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if url.path.ends_with('script.js') {
|
|
|
|
app.handle_vweb_livereload_script()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-10-03 16:26:44 +03:00
|
|
|
// Static handling
|
2023-06-02 10:55:59 +03:00
|
|
|
if serve_if_static[T](mut app, url, host) {
|
2021-03-01 13:50:52 +03:00
|
|
|
// successfully served a static file
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-10-03 16:26:44 +03:00
|
|
|
// Route matching
|
2020-07-25 01:02:44 +03:00
|
|
|
$for method in T.methods {
|
2020-11-08 11:14:24 +03:00
|
|
|
$if method.return_type is Result {
|
2023-04-02 02:24:33 +03:00
|
|
|
route := (*routes)[method.name] or {
|
|
|
|
eprintln('[vweb] tid: ${tid:03d}, parsed attributes for the `${method.name}` are not found, skipping...')
|
2021-10-03 16:26:44 +03:00
|
|
|
Route{}
|
2021-01-01 23:57:45 +03:00
|
|
|
}
|
2021-01-21 13:08:38 +03:00
|
|
|
|
2021-03-01 13:50:52 +03:00
|
|
|
// Skip if the HTTP request method does not match the attributes
|
2023-04-02 16:46:43 +03:00
|
|
|
if app.req.method in route.methods {
|
2021-10-03 16:26:44 +03:00
|
|
|
// Used for route matching
|
|
|
|
route_words := route.path.split('/').filter(it != '')
|
|
|
|
|
2023-05-29 03:11:10 +03:00
|
|
|
// Skip if the host does not match or is empty
|
|
|
|
if route.host == '' || route.host == host {
|
|
|
|
// Route immediate matches first
|
|
|
|
// For example URL `/register` matches route `/:user`, but `fn register()`
|
|
|
|
// should be called first.
|
|
|
|
if !route.path.contains('/:') && url_words == route_words {
|
|
|
|
// We found a match
|
|
|
|
$if T is MiddlewareInterface {
|
|
|
|
if validate_middleware(mut app, url.path) == false {
|
|
|
|
return
|
|
|
|
}
|
2023-03-26 02:57:42 +03:00
|
|
|
}
|
|
|
|
|
2023-05-29 03:11:10 +03:00
|
|
|
if app.req.method == .post && method.args.len > 0 {
|
|
|
|
// Populate method args with form values
|
|
|
|
mut args := []string{cap: method.args.len}
|
|
|
|
for param in method.args {
|
|
|
|
args << app.form[param.name]
|
|
|
|
}
|
|
|
|
|
|
|
|
if route.middleware == '' {
|
|
|
|
app.$method(args)
|
|
|
|
} else if validate_app_middleware(mut app, route.middleware,
|
|
|
|
method.name)
|
|
|
|
{
|
|
|
|
app.$method(args)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if route.middleware == '' {
|
|
|
|
app.$method()
|
|
|
|
} else if validate_app_middleware(mut app, route.middleware,
|
|
|
|
method.name)
|
|
|
|
{
|
|
|
|
app.$method()
|
|
|
|
}
|
2021-10-12 07:09:56 +03:00
|
|
|
}
|
2023-05-29 03:11:10 +03:00
|
|
|
return
|
|
|
|
}
|
2023-03-26 02:57:42 +03:00
|
|
|
|
2023-05-29 03:11:10 +03:00
|
|
|
if url_words.len == 0 && route_words == ['index'] && method.name == 'index' {
|
|
|
|
$if T is MiddlewareInterface {
|
|
|
|
if validate_middleware(mut app, url.path) == false {
|
|
|
|
return
|
|
|
|
}
|
2023-03-26 02:57:42 +03:00
|
|
|
}
|
|
|
|
if route.middleware == '' {
|
|
|
|
app.$method()
|
|
|
|
} else if validate_app_middleware(mut app, route.middleware, method.name) {
|
|
|
|
app.$method()
|
|
|
|
}
|
2023-05-29 03:11:10 +03:00
|
|
|
return
|
2021-10-12 07:09:56 +03:00
|
|
|
}
|
2021-03-01 13:50:52 +03:00
|
|
|
|
2023-05-29 03:11:10 +03:00
|
|
|
if params := route_matches(url_words, route_words) {
|
|
|
|
method_args := params.clone()
|
|
|
|
if method_args.len != method.args.len {
|
|
|
|
eprintln('[vweb] tid: ${tid:03d}, warning: uneven parameters count (${method.args.len}) in `${method.name}`, compared to the vweb route `${method.attrs}` (${method_args.len})')
|
2023-03-26 02:57:42 +03:00
|
|
|
}
|
|
|
|
|
2023-05-29 03:11:10 +03:00
|
|
|
$if T is MiddlewareInterface {
|
|
|
|
if validate_middleware(mut app, url.path) == false {
|
|
|
|
return
|
|
|
|
}
|
2023-03-26 02:57:42 +03:00
|
|
|
}
|
2023-05-29 03:11:10 +03:00
|
|
|
if route.middleware == '' {
|
|
|
|
app.$method(method_args)
|
|
|
|
} else if validate_app_middleware(mut app, route.middleware, method.name) {
|
|
|
|
app.$method(method_args)
|
|
|
|
}
|
|
|
|
return
|
2023-03-26 02:57:42 +03:00
|
|
|
}
|
2020-07-05 17:44:23 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-07-03 16:10:39 +03:00
|
|
|
}
|
2021-10-03 16:26:44 +03:00
|
|
|
// Route not found
|
2023-04-12 00:50:03 +03:00
|
|
|
app.not_found()
|
2021-03-01 13:50:52 +03:00
|
|
|
}
|
|
|
|
|
2023-03-26 02:57:42 +03:00
|
|
|
// validate_middleware validates and fires all middlewares that are defined in the global app instance
|
|
|
|
fn validate_middleware[T](mut app T, full_path string) bool {
|
|
|
|
for path, middleware_chain in app.middlewares {
|
|
|
|
// only execute middleware if route.path starts with `path`
|
|
|
|
if full_path.len >= path.len && full_path.starts_with(path) {
|
|
|
|
// there is middleware for this route
|
|
|
|
for func in middleware_chain {
|
|
|
|
if func(mut app.Context) == false {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// passed all middleware checks
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// validate_app_middleware validates all middlewares as a method of `app`
|
|
|
|
fn validate_app_middleware[T](mut app T, middleware string, method_name string) bool {
|
|
|
|
// then the middleware that is defined for this route specifically
|
|
|
|
valid := fire_app_middleware(mut app, middleware) or {
|
2023-04-02 02:24:33 +03:00
|
|
|
eprintln('[vweb] warning: middleware `${middleware}` for the `${method_name}` are not found')
|
2023-03-26 02:57:42 +03:00
|
|
|
true
|
|
|
|
}
|
|
|
|
return valid
|
|
|
|
}
|
|
|
|
|
|
|
|
// fire_app_middleware fires all middlewares that are defined as a method of `app`
|
|
|
|
fn fire_app_middleware[T](mut app T, method_name string) ?bool {
|
|
|
|
$for method in T.methods {
|
|
|
|
if method_name == method.name {
|
|
|
|
$if method.return_type is bool {
|
|
|
|
return app.$method()
|
|
|
|
} $else {
|
2023-04-02 02:24:33 +03:00
|
|
|
eprintln('[vweb] error in `${method.name}, middleware functions must return bool')
|
2023-03-26 02:57:42 +03:00
|
|
|
return none
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// no middleware function found
|
|
|
|
return none
|
|
|
|
}
|
|
|
|
|
2021-03-01 13:50:52 +03:00
|
|
|
fn route_matches(url_words []string, route_words []string) ?[]string {
|
|
|
|
// URL path should be at least as long as the route path
|
2021-08-12 19:05:50 +03:00
|
|
|
// except for the catchall route (`/:path...`)
|
|
|
|
if route_words.len == 1 && route_words[0].starts_with(':') && route_words[0].ends_with('...') {
|
|
|
|
return ['/' + url_words.join('/')]
|
|
|
|
}
|
2021-03-01 13:50:52 +03:00
|
|
|
if url_words.len < route_words.len {
|
|
|
|
return none
|
2020-07-05 17:44:23 +03:00
|
|
|
}
|
2021-03-01 13:50:52 +03:00
|
|
|
|
|
|
|
mut params := []string{cap: url_words.len}
|
|
|
|
if url_words.len == route_words.len {
|
|
|
|
for i in 0 .. url_words.len {
|
|
|
|
if route_words[i].starts_with(':') {
|
|
|
|
// We found a path paramater
|
|
|
|
params << url_words[i]
|
|
|
|
} else if route_words[i] != url_words[i] {
|
|
|
|
// This url does not match the route
|
|
|
|
return none
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return params
|
|
|
|
}
|
|
|
|
|
|
|
|
// The last route can end with ... indicating an array
|
2021-05-05 14:20:40 +03:00
|
|
|
if route_words.len == 0 || !route_words[route_words.len - 1].ends_with('...') {
|
2021-03-01 13:50:52 +03:00
|
|
|
return none
|
|
|
|
}
|
|
|
|
|
|
|
|
for i in 0 .. route_words.len - 1 {
|
|
|
|
if route_words[i].starts_with(':') {
|
|
|
|
// We found a path paramater
|
|
|
|
params << url_words[i]
|
|
|
|
} else if route_words[i] != url_words[i] {
|
|
|
|
// This url does not match the route
|
|
|
|
return none
|
|
|
|
}
|
|
|
|
}
|
|
|
|
params << url_words[route_words.len - 1..url_words.len].join('/')
|
|
|
|
return params
|
|
|
|
}
|
|
|
|
|
|
|
|
// check if request is for a static file and serves it
|
|
|
|
// returns true if we served a static file, false otherwise
|
2021-05-16 04:28:11 +03:00
|
|
|
[manualfree]
|
2023-06-02 10:55:59 +03:00
|
|
|
fn serve_if_static[T](mut app T, url urllib.URL, host string) bool {
|
2021-03-01 13:50:52 +03:00
|
|
|
// TODO: handle url parameters properly - for now, ignore them
|
2022-12-17 19:04:50 +03:00
|
|
|
static_file := app.static_files[url.path] or { return false }
|
|
|
|
mime_type := app.static_mime_types[url.path] or { return false }
|
2023-06-02 10:55:59 +03:00
|
|
|
static_host := app.static_hosts[url.path] or { '' }
|
2021-03-01 13:50:52 +03:00
|
|
|
if static_file == '' || mime_type == '' {
|
|
|
|
return false
|
|
|
|
}
|
2023-06-02 10:55:59 +03:00
|
|
|
if static_host != '' && static_host != host {
|
|
|
|
return false
|
|
|
|
}
|
2021-03-01 13:50:52 +03:00
|
|
|
data := os.read_file(static_file) or {
|
2021-07-10 11:58:07 +03:00
|
|
|
send_string(mut app.conn, vweb.http_404.bytestr()) or {}
|
2021-03-01 13:50:52 +03:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
app.send_response_to_client(mime_type, data)
|
|
|
|
unsafe { data.free() }
|
|
|
|
return true
|
2019-09-05 15:46:24 +03:00
|
|
|
}
|
2019-07-29 19:21:36 +03:00
|
|
|
|
2023-06-02 10:55:59 +03:00
|
|
|
fn (mut ctx Context) scan_static_directory(directory_path string, mount_path string, host string) {
|
2021-03-01 02:18:14 +03:00
|
|
|
files := os.ls(directory_path) or { panic(err) }
|
2019-07-31 07:10:53 +03:00
|
|
|
if files.len > 0 {
|
2019-09-05 15:46:24 +03:00
|
|
|
for file in files {
|
2021-03-02 22:30:18 +03:00
|
|
|
full_path := os.join_path(directory_path, file)
|
2020-12-12 20:13:43 +03:00
|
|
|
if os.is_dir(full_path) {
|
2023-06-02 10:55:59 +03:00
|
|
|
ctx.scan_static_directory(full_path, mount_path.trim_right('/') + '/' + file,
|
|
|
|
host)
|
2020-11-14 14:55:10 +03:00
|
|
|
} else if file.contains('.') && !file.starts_with('.') && !file.ends_with('.') {
|
2020-03-26 16:18:08 +03:00
|
|
|
ext := os.file_ext(file)
|
2020-03-07 16:16:03 +03:00
|
|
|
// Rudimentary guard against adding files not in mime_types.
|
2023-06-02 10:55:59 +03:00
|
|
|
// Use host_serve_static directly to add non-standard mime types.
|
2021-01-25 12:26:20 +03:00
|
|
|
if ext in vweb.mime_types {
|
2023-06-02 10:55:59 +03:00
|
|
|
ctx.host_serve_static(host, mount_path.trim_right('/') + '/' + file,
|
|
|
|
full_path)
|
2020-03-07 16:16:03 +03:00
|
|
|
}
|
2019-07-31 07:10:53 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-21 20:05:18 +03:00
|
|
|
// handle_static is used to mark a folder (relative to the current working folder)
|
|
|
|
// as one that contains only static resources (css files, images etc).
|
2021-03-01 02:18:14 +03:00
|
|
|
// If `root` is set the mount path for the dir will be in '/'
|
2022-03-21 20:05:18 +03:00
|
|
|
// Usage:
|
|
|
|
// ```v
|
2022-05-13 06:56:21 +03:00
|
|
|
// os.chdir( os.executable() )?
|
2022-03-21 20:05:18 +03:00
|
|
|
// app.handle_static('assets', true)
|
|
|
|
// ```
|
2021-02-21 21:01:29 +03:00
|
|
|
pub fn (mut ctx Context) handle_static(directory_path string, root bool) bool {
|
2023-06-02 10:55:59 +03:00
|
|
|
return ctx.host_handle_static('', directory_path, root)
|
|
|
|
}
|
|
|
|
|
|
|
|
// host_handle_static is used to mark a folder (relative to the current working folder)
|
|
|
|
// as one that contains only static resources (css files, images etc).
|
|
|
|
// If `root` is set the mount path for the dir will be in '/'
|
|
|
|
// Usage:
|
|
|
|
// ```v
|
|
|
|
// os.chdir( os.executable() )?
|
|
|
|
// app.host_handle_static('localhost', 'assets', true)
|
|
|
|
// ```
|
|
|
|
pub fn (mut ctx Context) host_handle_static(host string, directory_path string, root bool) bool {
|
2020-11-14 14:55:10 +03:00
|
|
|
if ctx.done || !os.exists(directory_path) {
|
2020-03-07 16:16:03 +03:00
|
|
|
return false
|
|
|
|
}
|
2020-03-08 17:41:59 +03:00
|
|
|
dir_path := directory_path.trim_space().trim_right('/')
|
2020-03-07 16:16:03 +03:00
|
|
|
mut mount_path := ''
|
2021-02-21 21:01:29 +03:00
|
|
|
if dir_path != '.' && os.is_dir(dir_path) && !root {
|
2020-03-08 17:41:59 +03:00
|
|
|
// Mount point hygene, "./assets" => "/assets".
|
|
|
|
mount_path = '/' + dir_path.trim_left('.').trim('/')
|
2019-10-24 19:44:49 +03:00
|
|
|
}
|
2023-06-02 10:55:59 +03:00
|
|
|
ctx.scan_static_directory(dir_path, mount_path, host)
|
2020-03-07 16:16:03 +03:00
|
|
|
return true
|
2019-10-24 19:44:49 +03:00
|
|
|
}
|
2019-07-30 16:46:10 +03:00
|
|
|
|
2022-08-20 12:06:24 +03:00
|
|
|
// TODO - test
|
2021-03-02 22:30:18 +03:00
|
|
|
// mount_static_folder_at - makes all static files in `directory_path` and inside it, available at http://server/mount_path
|
|
|
|
// For example: suppose you have called .mount_static_folder_at('/var/share/myassets', '/assets'),
|
|
|
|
// and you have a file /var/share/myassets/main.css .
|
|
|
|
// => That file will be available at URL: http://server/assets/main.css .
|
|
|
|
pub fn (mut ctx Context) mount_static_folder_at(directory_path string, mount_path string) bool {
|
2023-06-02 10:55:59 +03:00
|
|
|
return ctx.host_mount_static_folder_at('', directory_path, mount_path)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO - test
|
|
|
|
// host_mount_static_folder_at - makes all static files in `directory_path` and inside it, available at http://host/mount_path
|
|
|
|
// For example: suppose you have called .host_mount_static_folder_at('localhost', '/var/share/myassets', '/assets'),
|
|
|
|
// and you have a file /var/share/myassets/main.css .
|
|
|
|
// => That file will be available at URL: http://localhost/assets/main.css .
|
|
|
|
pub fn (mut ctx Context) host_mount_static_folder_at(host string, directory_path string, mount_path string) bool {
|
2021-03-02 22:30:18 +03:00
|
|
|
if ctx.done || mount_path.len < 1 || mount_path[0] != `/` || !os.exists(directory_path) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
dir_path := directory_path.trim_right('/')
|
2022-02-05 16:10:26 +03:00
|
|
|
|
|
|
|
trim_mount_path := mount_path.trim_left('/').trim_right('/')
|
2023-06-02 10:55:59 +03:00
|
|
|
ctx.scan_static_directory(dir_path, '/${trim_mount_path}', host)
|
2021-03-02 22:30:18 +03:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2022-08-20 12:06:24 +03:00
|
|
|
// TODO - test
|
2021-02-21 21:01:29 +03:00
|
|
|
// Serves a file static
|
2021-03-01 02:18:14 +03:00
|
|
|
// `url` is the access path on the site, `file_path` is the real path to the file, `mime_type` is the file type
|
2021-05-22 07:02:21 +03:00
|
|
|
pub fn (mut ctx Context) serve_static(url string, file_path string) {
|
2023-06-02 10:55:59 +03:00
|
|
|
ctx.host_serve_static('', url, file_path)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO - test
|
|
|
|
// Serves a file static
|
|
|
|
// `url` is the access path on the site, `file_path` is the real path to the file
|
|
|
|
// `mime_type` is the file type, `host` is the host to serve the file from
|
|
|
|
pub fn (mut ctx Context) host_serve_static(host string, url string, file_path string) {
|
2019-10-24 19:44:49 +03:00
|
|
|
ctx.static_files[url] = file_path
|
2021-05-22 07:02:21 +03:00
|
|
|
// ctx.static_mime_types[url] = mime_type
|
|
|
|
ext := os.file_ext(file_path)
|
|
|
|
ctx.static_mime_types[url] = vweb.mime_types[ext]
|
2023-06-02 10:55:59 +03:00
|
|
|
ctx.static_hosts[url] = host
|
2019-08-11 15:07:22 +03:00
|
|
|
}
|
2019-12-11 19:20:46 +03:00
|
|
|
|
2021-02-21 21:01:29 +03:00
|
|
|
// Returns the ip address from the current user
|
2020-07-16 01:48:10 +03:00
|
|
|
pub fn (ctx &Context) ip() string {
|
2021-04-09 19:17:33 +03:00
|
|
|
mut ip := ctx.req.header.get(.x_forwarded_for) or { '' }
|
2020-07-16 22:23:35 +03:00
|
|
|
if ip == '' {
|
2021-04-09 19:17:33 +03:00
|
|
|
ip = ctx.req.header.get_custom('X-Real-Ip') or { '' }
|
2020-07-16 22:23:35 +03:00
|
|
|
}
|
2021-02-28 01:18:25 +03:00
|
|
|
|
2020-07-16 22:23:35 +03:00
|
|
|
if ip.contains(',') {
|
|
|
|
ip = ip.all_before(',')
|
|
|
|
}
|
2020-09-17 10:38:39 +03:00
|
|
|
if ip == '' {
|
2020-11-15 23:54:47 +03:00
|
|
|
ip = ctx.conn.peer_ip() or { '' }
|
2020-09-17 10:38:39 +03:00
|
|
|
}
|
2020-07-16 22:23:35 +03:00
|
|
|
return ip
|
2020-07-16 01:48:10 +03:00
|
|
|
}
|
|
|
|
|
2021-02-21 21:01:29 +03:00
|
|
|
// Set s to the form error
|
2020-07-07 22:35:56 +03:00
|
|
|
pub fn (mut ctx Context) error(s string) {
|
2023-04-02 02:24:33 +03:00
|
|
|
eprintln('[vweb] Context.error: ${s}')
|
2020-07-07 22:35:56 +03:00
|
|
|
ctx.form_error = s
|
|
|
|
}
|
|
|
|
|
2021-02-21 21:01:29 +03:00
|
|
|
// Returns an empty result
|
2020-06-22 18:13:57 +03:00
|
|
|
pub fn not_found() Result {
|
|
|
|
return Result{}
|
|
|
|
}
|
2020-06-24 23:12:33 +03:00
|
|
|
|
2022-10-16 09:28:57 +03:00
|
|
|
fn send_string(mut conn net.TcpConn, s string) ! {
|
2022-12-17 20:08:59 +03:00
|
|
|
$if trace_send_string_conn ? {
|
|
|
|
eprintln('> send_string: conn: ${ptr_str(conn)}')
|
|
|
|
}
|
2022-03-21 20:48:47 +03:00
|
|
|
$if trace_response ? {
|
2022-11-15 16:53:13 +03:00
|
|
|
eprintln('> send_string:\n${s}\n')
|
2022-03-21 20:48:47 +03:00
|
|
|
}
|
2022-12-17 20:08:59 +03:00
|
|
|
if voidptr(conn) == unsafe { nil } {
|
|
|
|
return error('connection was closed before send_string')
|
|
|
|
}
|
|
|
|
conn.write_string(s)!
|
2021-10-03 16:26:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Do not delete.
|
|
|
|
// It used by `vlib/v/gen/c/str_intp.v:130` for string interpolation inside vweb templates
|
|
|
|
// TODO: move it to template render
|
2020-06-24 23:12:33 +03:00
|
|
|
fn filter(s string) string {
|
2022-12-13 23:10:57 +03:00
|
|
|
return html.escape(s)
|
2020-06-24 23:12:33 +03:00
|
|
|
}
|
2023-04-02 02:24:33 +03:00
|
|
|
|
|
|
|
// Worker functions for the thread pool:
|
|
|
|
struct RequestParams {
|
|
|
|
global_app voidptr
|
|
|
|
routes &map[string]Route
|
|
|
|
mut:
|
|
|
|
connection &net.TcpConn
|
|
|
|
}
|
|
|
|
|
|
|
|
struct Worker[T] {
|
|
|
|
id int
|
|
|
|
ch chan &RequestParams
|
|
|
|
}
|
|
|
|
|
|
|
|
fn new_worker[T](ch chan &RequestParams, id int) thread {
|
|
|
|
mut w := &Worker[T]{
|
|
|
|
id: id
|
|
|
|
ch: ch
|
|
|
|
}
|
|
|
|
return spawn w.process_incomming_requests[T]()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn (mut w Worker[T]) process_incomming_requests() {
|
|
|
|
sid := '[vweb] tid: ${w.id:03d} received request'
|
|
|
|
for {
|
|
|
|
mut params := <-w.ch or { break }
|
|
|
|
$if vweb_trace_worker_scan ? {
|
|
|
|
eprintln(sid)
|
|
|
|
}
|
|
|
|
handle_conn[T](mut params.connection, params.global_app, params.routes, w.id)
|
|
|
|
}
|
|
|
|
$if vweb_trace_worker_scan ? {
|
|
|
|
eprintln('[vweb] closing worker ${w.id}.')
|
|
|
|
}
|
|
|
|
}
|
2023-04-23 03:37:15 +03:00
|
|
|
|
|
|
|
[params]
|
|
|
|
pub struct PoolParams[T] {
|
2023-08-03 21:06:32 +03:00
|
|
|
handler fn () T [required] = unsafe { nil }
|
2023-04-23 03:37:15 +03:00
|
|
|
nr_workers int = runtime.nr_jobs()
|
|
|
|
}
|
|
|
|
|
|
|
|
// database_pool creates a pool of database connections
|
|
|
|
pub fn database_pool[T](params PoolParams[T]) DatabasePool[T] {
|
|
|
|
mut connections := []T{}
|
|
|
|
// create a database connection for each worker
|
|
|
|
for _ in 0 .. params.nr_workers {
|
|
|
|
connections << params.handler()
|
|
|
|
}
|
|
|
|
|
|
|
|
return fn [connections] [T](tid int) T {
|
|
|
|
$if vweb_trace_worker_scan ? {
|
|
|
|
eprintln('[vweb] worker ${tid} received database connection')
|
|
|
|
}
|
|
|
|
return connections[tid]
|
|
|
|
}
|
|
|
|
}
|