Open LLBlumire opened 7 years ago
Having a "native" built in support would be better. We did something for iron, which was quite simple (https://github.com/fxbox/iron-cors/).
Info a little more readable than the w3 spec :wink:: http://enable-cors.org/server.html
I agree that Rocket should have a nicer way to handle this, and it's on my list of things to determine how to do better. For now, I've added the ability to use #[route(OPTIONS, "/", ...)]
to manually handle OPTIONS
requests in https://github.com/SergioBenitez/Rocket/commit/2de006d9f91589a885924acc8712e87d310692e4. As soon as #83 is resolved, you'll be able to use options
as a decorator directly.
I'd love to see a full CORS example :) Did someone already made experiences?
This is what I'm currently doing to handle the preflight request:
#[route(OPTIONS, "/endpoint/")]
fn options_handler<'a>() -> Response<'a> {
Response::build()
.raw_header("Access-Control-Allow-Origin", "http://host.tld")
.raw_header("Access-Control-Allow-Methods", "OPTIONS, POST")
.raw_header("Access-Control-Allow-Headers", "Content-Type")
.finalize()
}
However, for a handler returning data, I can't still find a way to wrap the existing response in a Response
to add the headers. The existing handler looks like this:
#[post("/endpoint/", format = "application/json", data = "<config>")]
fn post_handler(config: JSON<Config>) -> Option<JSON<Wrapper>> {
let wrapper = factory(report_id);
match wrapper {
Some(f) => Some(JSON(f(&(config.unwrap())))),
None => None
}
}
Is this a correct approach? How could I add headers to the JSON
response?
@sebasmagri JSON impliments the Responder trait. Something like this should work:
#[post("/endpoint/", format = "application/json", data = "<config>")]
fn post_handler<'request>(config: JSON<Config>)
-> Option<Result<Response<'request>, &'str>> {
let wrapper = factory(report_id);
match wrapper {
Some(f) => {
let response = Response::build_from(JSON(f(&(config.unwrap()))).respond().unwrap());
response.header(hyper::header::AccessControlAllowOrigin::Any)
Some(response.ok())
},
None => None
}
}
@kybishop's got the right idea, but you should rarely, if ever, be constructing a Response
object in your handler. Instead, create a new type and implement Responder
for it. You can then return it directly from your handler. See the wrapping Responder section of the guide for more info.
For this problem in particular, I would create a new CORS
type and implement Responder
for it. I implemented a small one, and I copy the code below. It's incomplete, inefficient, and could be made less error-prone, but it works, and using it is clean.
use std::collections::HashSet;
use rocket::response::{self, Response, Responder};
use rocket::http::Method;
struct CORS<R> {
responder: R,
allow_origin: &'static str,
expose_headers: HashSet<&'static str>,
allow_credentials: bool,
allow_headers: HashSet<&'static str>,
allow_methods: HashSet<Method>,
max_age: Option<usize>
}
type PreflightCORS = CORS<()>;
impl PreflightCORS {
pub fn preflight(origin: &'static str) -> PreflightCORS {
CORS::origin((), origin)
}
}
impl<'r, R: Responder<'r>> CORS<R> {
pub fn origin(responder: R, origin: &'static str) -> CORS<R> {
CORS {
responder: responder,
allow_origin: origin,
expose_headers: HashSet::new(),
allow_credentials: false,
allow_headers: HashSet::new(),
allow_methods: HashSet::new(),
max_age: None
}
}
pub fn any(responder: R) -> CORS<R> {
CORS::origin(responder, "*")
}
pub fn credentials(mut self, value: bool) -> CORS<R> {
self.allow_credentials = value;
self
}
pub fn methods(mut self, methods: Vec<Method>) -> CORS<R> {
for method in methods {
self.allow_methods.insert(method);
}
self
}
pub fn headers(mut self, headers: Vec<&'static str>) -> CORS<R> {
for header in headers {
self.allow_headers.insert(header);
}
self
}
// TODO: Add more builder methods to set the rest of the fields.
}
impl<'r, R: Responder<'r>> Responder<'r> for CORS<R> {
fn respond(self) -> response::Result<'r> {
let mut response = Response::build_from(self.responder.respond()?)
.raw_header("Access-Control-Allow-Origin", self.allow_origin)
.finalize();
match self.allow_credentials {
true => response.set_raw_header("Access-Control-Allow-Credentials", "true"),
false => response.set_raw_header("Access-Control-Allow-Credentials", "false")
};
if !self.allow_methods.is_empty() {
let mut methods = String::with_capacity(self.allow_methods.len() * 7);
for (i, method) in self.allow_methods.iter().enumerate() {
if i != 0 { methods.push_str(", ") }
methods.push_str(method.as_str());
}
response.set_raw_header("Access-Control-Allow-Methods", methods);
}
// FIXME: Get rid of this dupe.
if !self.allow_headers.is_empty() {
let mut headers = String::with_capacity(self.allow_headers.len() * 15);
for (i, header) in self.allow_headers.iter().enumerate() {
if i != 0 { headers.push_str(", ") }
headers.push_str(header);
}
response.set_raw_header("Access-Control-Allow-Headers", headers);
}
// TODO: Inspect and set the rest of the fields.
Ok(response)
}
}
You would then use it in routes like:
#[route(OPTIONS, "/item")]
fn cors_preflight() -> PreflightCORS {
CORS::preflight("http://host.tld")
.methods(vec![Method::Options, Method::Post])
.headers(vec!["Content-Type"])
}
#[post("/item")]
fn cors_demo() -> CORS<&'static str> {
CORS::any("This is the response.")
}
In the particular POST
route above, you could do:
#[post("/item")]
fn cors_demo() -> CORS<Option<JSON<Wrapper>>> {
CORS::any(option_json_wrapper)
}
I believe having this type into the framework would be really good. Thanks @SergioBenitez
Regarding the code from https://github.com/SergioBenitez/Rocket/issues/25#issuecomment-271065434, I have found this:
The only valid value for this header is true (case-sensitive). If you don't need credentials, omit this header entirely (rather than setting its value to false).
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Access-Control-Allow-Credentials
Now that #55 has landed, we can add proper support for CORS to Rocket! I'm happy to field any design ideas and/or mentor anyone who might be willing to implement some CORS related fairings and structures for contrib
.
This could be a fun way to use fairings for the first time & contribute to rocket something that would be super helpful for a project of mine. I'm going to get started trying to implement this into contrib
via. fairings. @SergioBenitez I'll take some of the code you provided for a CORS type to make this come in faster. (I realize some work is to be done on that example, just part of the fun) I'll send in a pr today or tomorrow with a basic implementation for it.
EDIT: I'm waiting on 0.3.0 as there's more work to be done on fairings, I'm still working on it, but I'm planning to really get a pr in after 0.3 is out.
@SirDoctors Just a heads up: the fairings implementation that just landed in master
is very likely to be the version that ships in 0.3.
Just for future reference, here is the fairing I wrote for easy CORS:
use rocket::{Request, Response};
use rocket::fairing::{Fairing, Info, Kind};
use rocket::http::{Header, ContentType, Method};
use std::io::Cursor;
pub struct CORS();
impl Fairing for CORS {
fn info(&self) -> Info {
Info {
name: "Add CORS headers to requests",
kind: Kind::Response
}
}
fn on_response(&self, request: &Request, response: &mut Response) {
if request.method() == Method::Options || response.content_type() == Some(ContentType::JSON) {
response.set_header(Header::new("Access-Control-Allow-Origin", "http://localhost:9000"));
response.set_header(Header::new("Access-Control-Allow-Methods", "POST, GET, OPTIONS"));
response.set_header(Header::new("Access-Control-Allow-Headers", "Content-Type"));
response.set_header(Header::new("Access-Control-Allow-Credentials", "true"));
}
if request.method() == Method::Options {
response.set_header(ContentType::Plain);
response.set_sized_body(Cursor::new(""));
}
}
}
You just have to attach it like this:
rocket::ignite()
.attach(CORS())
@nicholasday perhaps this fairing could be added to contrib?
Now that Rocket v0.3 is here a formalized ( and configurable, see https://echo.labstack.com/middleware/cors for an idea ) should definitely be added to contrib.
I have implemented CORS both as Fairing and for ad-hoc route based usage in a rocket_cors
crate. Hopefully the documentation is sufficient. The options are configurable.
The problem with @nicholasday's implementation is that if the routes have any side effects, it will be too late to reverse them if the CORS check fails in on_response
.
I have been using the @nicholasday solution for my project, and it works fine for GET requests. Now I am adding my first POST request and not sure how I can use Rocket for this. Rocket claims success on the request:
POST /image/label/submit application/x-www-form-urlencoded; charset=UTF-8:
=> Matched: POST /image/label/submit (add_label)
=> Outcome: Success
=> Response succeeded.
but Chrome tells a different story:
Failed to load http://localhost:8000/image/label/submit: No 'Access-Control-Allow-Origin' header is present on the requested resource. Origin 'http://localhost:7700' is therefore not allowed access.
Is there a way I can modify that code to work with POST requests? Am I missing something? Not to sound too negative, but I don't think CORS is intuitive or simple enough that everyone who wants to write an API with Rocket should be required to slog through custom solutions like this...
#[post("/image/label/submit", data = "<data>")]
fn add_label(data: String) -> String {
data
}
This is the API call, in case the mistake is here.
EDIT: Of course, as is standard for asking questions on the internet, I figured it out almost immediately after asking. The problem is that I have the String return type for this POST request, and the fairing only applies to JSON return types. Not that hard to tell if you read the code, but if you can't read like me, my adventure may be helpful! @nicholasday 's solution only works for JSON requests, so if you have issues, make sure your requests return JSON (as I am now going to do), or add a check for ContentType::Plain just like the response.content_type() == Some(ContentType::JSON)
in the code.
@tkondrashov I might be wrong but I think that CORS only applies to json.
Is this considered stalled?
@LeviSchuck I believe this is kinda blocked on fairings being able to return early (because for preflight requests there is no need to go to any route handler - we can just intercept the request early and return whatever parameters are set for Access-Control-Allow-Origin et. al.)
@LeviSchuck you may be interested in https://crates.io/crates/rocket_cors
options requests need to be handle in the routing layer somewhere, where it checks a route matches but doesn't invoke the handler. This way there is no need to duplicate handlers just to return CORS headers.
Has anyone worked this with async and v 0.5.0-dev (as of this writing)?
I tried implementing the same mechanism suggested by @nicholasday but I wasn't able to do it.
Here's my Fair:
#![feature(proc_macro_hygiene, decl_macro)]
#[macro_use]
extern crate rocket;
mod mongo;
use rocket::http::{ContentType, Header, Method};
use rocket::{Request, Response};
use std::io::Cursor;
use std::str::FromStr;
use rocket::fairing::{Fairing, Info, Kind};
use rocket_cors::{AllowedMethods, AllowedOrigins, CorsOptions};
pub struct CORS;
#[rocket::async_trait]
impl Fairing for CORS {
fn info(&self) -> Info {
Info {
name: "Add CORS headers to responses",
kind: Kind::Response,
}
}
async fn on_response<'r>(&self, _request: &'r Request<'_>, response: &mut Response<'r>) {
println!("Setting access control allow origin");
response.set_header(Header::new("Access-Control-Allow-Origin", "*"));
response.set_header(Header::new(
"Access-Control-Allow-Methods",
"POST, GET, PATCH, OPTIONS",
));
response.set_header(Header::new("Access-Control-Allow-Headers", "*"));
response.set_header(Header::new("Access-Control-Allow-Credentials", "true"));
}
}
#[get("/")]
async fn index() -> &'static str {
"Hello, world!"
}
#[post("/test")]
async fn testing() -> &'static str {
let r = mongo::create().await;
return "Bibibiii";
}
/**
* This is the Rocket file
*/
#[launch]
fn rocket() -> _ {
rocket::build()
.attach(CORS)
.mount("/", routes![index, testing])
}
I'm still getting hit by:
Access to fetch at 'http://localhost:8000/test' from origin 'http://localhost:8080' has been blocked by CORS policy: Response to preflight request doesn't pass access control check: It does not have HTTP ok status.
I even opened a Stack Overflow question: https://stackoverflow.com/questions/67478789/how-do-i-enable-cors-in-rust-rocket-v-0-5?noredirect=1#comment119270650_67478789
This helped me do it when I was using sync: https://stackoverflow.com/questions/62412361/how-to-set-up-cors-or-options-for-rocket-rs/64904947?noredirect=1#comment119272533_64904947
I even tried using the master branch version of rocket_cors
but it didn't work.
Just for reference, here's my cargo.toml
[dependencies]
rocket = "0.5.0-dev"
rocket_cors = "0.5.2"
mongodb = "2.0.0-alpha.1"
[dependencies.rocket_contrib]
version = "0.5.0-dev"
default-features = false
features = ["diesel_postgres_pool", "json"]
[patch.crates-io]
rocket = { git = 'https://github.com/SergioBenitez/Rocket', branch = "master" }
rocket_contrib = { git = 'https://github.com/SergioBenitez/Rocket', branch = "master" }
rocket_cors = { git = "https:
@superjose I know this is quite old, but I think the problem you're having is because you don't have an #[options("<ENDPOINT>")]
for each endpoint, meaning your options requests are receiving a non-successful response, 404.
The browser then likely ignores any CORS headers in the non-successful response.
Ooohhh I see @hwoodiwiss !!! Thank you very much!!! What I ended up doing was rerouting my front-end so it uses a proxy instead. Thanks for the help!!!
I met exact the same problem. the options request got a 404 response. i am still not clear how to add OPTIONS support. it seems someone said rocket_cors may help, but i seems can not use it with 0.5-rc.
I met exact the same problem. the options request got a 404 response. i am still not clear how to add OPTIONS support. it seems someone said rocket_cors may help, but i seems can not use it with 0.5-rc.
You need to use their git branch for 0.5-rc, see https://github.com/SergioBenitez/Rocket/issues/1701
@superjose I keep getting the preflight request doesn't pass access control check: No 'Access-Control-Allow-Origin' but when I look at the network response from the rocket server that header is present in other responses for different requests. Are the preflight requests different?
What is the current purpose of this issue? Will rocket support CORS, or is it intended to continue using external projects like rocket_cors?
@ta32 me too, and i don't really know what to do. Anyone help?
Since fairings cannot directly respond to any request, this means that every request have to go through the "routing process" to find a matched route handler (and if failed to find one rocket will respond with 404 in v5.0). So maybe it would be a good idea if we can do something like (if we don't want to enable CORS globally through fairing):
specify cors
settings in the router annotation and generates a corresponding OPTIONS route handler...
#[get("/path", cors = /* some cors settings */)]
pub fn handler() -> _ {
// ...
}
/*
// rocket generated endpoint
#[options("/path")]
pub fn generated() -> _ {
// ...
}
*/
or have a dedicated cors
annotation, which generates a corresponding OPTIONS route handler.
#[cors(/* some cors settings */)]
#[get("/path"]
pub fn handler() -> _ {
// ...
}
/*
// rocket generated endpoint
#[options("/path")]
pub fn generated() -> _ {
// ...
}
*/
CORS's OPTIONS preflight doesn't necessarily need to go through that "routing process". So maybe have something being able to answer a request directly would be a solution (if we want to enable CORS globally). However, this may go against rocket's initial design.
#[launch]
fn rocket() -> _ {
rocket::build()
// something that shields the entire server,
// answering preflight requests, or maybe
// being able to do more things.
.equip(cors_preflight_answerer) // <- this method doesn't actually exist
.mount("/", routes![/* ... */])
}
Currently the solution would be rocket_cors's catch-all route handler combined with their CORS fairing)
(hope my thought would be helpful and sorry if it doesn't or offends somebody)
Would be really nice to provide a first party solution for this ! This is a big issue when creating an API.
For rocket users just specifying what origins are authorized should be enough, rocket has enough information to generate responses to OPTIONS requests on its own.
In order for a server to provide an external API it needs to be able to deal with Cross Origin Resource Sharing. These are done by web browsers sending a preflight OPTIONS request asking what resources it is allowed to access on the server, then after being given a resonse containing certain information in it's header a browser will send the actual GET/PUT/POST/etc query to the server, with no response it will not do this and cause Cross Site Scripting errors to be reported.
There are two obvious ways this can be handled, the first and simplest is to add an "OPTIONS" annotation of the same ilk as the existing HTTP Methods, this will allow users of Rocket to manually implement the correct preflight request handling for api endpoints that need to provide CORS.
The other is to provide some form of automatic CORS handling, this can be seen in a number of other libraries used for web server development (outside the realm of rust) such as spring.io (http://docs.spring.io/spring/docs/current/spring-framework-reference/html/cors.html) or flasks (https://pypi.python.org/pypi/Flask-Cors).
W3 Specification on CORS: https://www.w3.org/TR/cors/