text
stringlengths 12
786k
|
---|
module Suite = struct exception TestFailure of string type result = | Error of exn | Fail of string | Pass type outcome = { label : string ; result : result ; time_s : float ; } let string_of_result = function | Error e -> Printf . sprintf " Error : % s " ( Printexc . to_string e ) | Fail msg -> Printf . sprintf " Fail : % s " msg | Pass -> " Pass " let finally f cleanup = let result = try f ( ) with e -> cleanup ( ) ; raise e in cleanup ( ) ; result module Sync = struct type test_fun = unit -> unit let bracket setup test teardown ( ) = let state = setup ( ) in finally ( fun ( ) -> test state ) ( fun ( ) -> teardown state ) end module Async = struct type callback = unit -> unit let noop ( ) = ( ) type wrapper = callback -> unit type test_fun = wrapper -> unit let bracket setup test teardown = ( fun wrapper -> let state = setup ( ) in let wrapper ' f = wrapper ( fun ( ) -> finally f ( fun ( ) -> teardown state ) ) in try test state wrapper ' with e -> teardown state ; raise e ) let run_one label test log handle_outcome = let handled = ref false in let start_time = ref 0 . 0 in let handle_result_once result = if not ! handled then begin handled := true ; log " End " ; log ( string_of_result result ) ; handle_outcome { label ; result ; time_s = Sys . time ( ) . - ! start_time } end in let catch_all f = try f ( ) with | TestFailure msg -> handle_result_once ( Fail msg ) | e -> handle_result_once ( Error e ) in catch_all ( fun ( ) -> log " Start " ; start_time := Sys . time ( ) ; test ( fun callback -> catch_all ( fun ( ) -> callback ( ) ; handle_result_once Pass ) ) ) let of_sync test wrapper = test ( ) ; wrapper noop end type t = | TestCase of string * Async . test_fun | TestList of string * t list let ( ) >:: label test_fun = TestCase ( label , Async . of_sync test_fun ) let ( ) >:~ label test_fun = TestCase ( label , test_fun ) let ( ) >::: label tests = TestList ( label , tests ) let string_of_opt = function | Some value -> Printf . sprintf " ( % s ) " value | None -> " " let assert_true ? label value = if not value then begin let msg = Printf . sprintf " test value was false % s " ( string_of_opt label ) in raise ( TestFailure msg ) end let assert_equal ( ? equal = ( ) ) = ? label ? printer a b = if not ( equal a b ) then begin let values = match printer with | Some printer -> Printf . sprintf " : % s % s " ( printer a ) ( printer b ) | None -> " " in let msg = Printf . sprintf " not equal % s % s " ( string_of_opt label ) values in raise ( TestFailure msg ) end let assert_raises ? label expected_exn task = match try task ( ) ; None with raised_exn -> Some raised_exn with | None -> let msg = Printf . sprintf " expected exception not raised % s " ( string_of_opt label ) in raise ( TestFailure msg ) | Some raised_exn when raised_exn = expected_exn -> ( ) | Some raised_exn -> let msg = Printf . sprintf " unexpected exception raised % s : % s " ( string_of_opt label ) ( Printexc . to_string raised_exn ) in raise ( TestFailure msg ) let assert_raises_string ? label expected_exn_string task = match try task ( ) ; None with raised_exn -> Some raised_exn with | None -> let msg = Printf . sprintf " expected exception not raised % s " ( string_of_opt label ) in raise ( TestFailure msg ) | Some raised_exn when ( Printexc . to_string raised_exn ) = expected_exn_string -> ( ) | Some raised_exn -> let msg = Printf . sprintf " unexpected exception raised % s : % s " ( string_of_opt label ) ( Printexc . to_string raised_exn ) in raise ( TestFailure msg ) end |
module Zipper = struct type crumb = { left : Suite . t list ; label : string ; right : Suite . t list ; } type t = { crumbs : crumb list ; location : Suite . t ; } let of_suite suite = { crumbs = [ ] ; location = suite ; } let to_suite { location ; _ } = location let move_up { crumbs ; location } = match crumbs with | [ ] -> None | { left ; label ; right } :: other_crumbs -> Some { crumbs = other_crumbs ; location = Suite . TestList ( label , List . rev_append ( location :: left ) right ) ; } let move_down { crumbs ; location } = match location with | Suite . TestCase _ -> None | Suite . TestList ( _ , [ ] ) -> None | Suite . TestList ( label , first_child :: other_children ) -> Some { crumbs = { left = [ ] ; label ; right = other_children ; } :: crumbs ; location = first_child ; } let move_right { crumbs ; location } = match crumbs with | [ ] -> None | { right = [ ] ; _ } :: _ -> None | { left ; label ; right = first_right :: other_right } :: other_crumbs -> Some { crumbs = { left = location :: left ; label ; right = other_right ; } :: other_crumbs ; location = first_right ; } let rec next_sibling zipper = match move_right zipper with | ( Some _ ) as result -> result | None -> begin match move_up zipper with | Some zipper ' -> next_sibling zipper ' | None -> None end let next_location zipper = match move_down zipper with | Some _ as result -> result | None -> next_sibling zipper let get_labels { crumbs ; location } = let location_label = match location with | Suite . TestCase ( label , _ ) -> label | Suite . TestList ( label , _ ) -> label in location_label :: ( List . map ( fun crumb -> crumb . label ) crumbs ) |> List . rev end |
module Utils = struct type output = { log : string list ; outcomes : Suite . outcome list ; } type raw_summary = { total : int ; errors : int ; failures : int ; passes : int ; passed : bool } type summary = { report : string ; passed : bool ; } let run suite callback = let log = ref [ ] in let log_with_prefix prefix msg = let line = Printf . sprintf " % s :% s " prefix msg in log := ( line :: ! log ) in let zipper = Zipper . of_suite suite in let rec run ' ( { Zipper . location ; _ } as zipper ) outcomes = let continue zipper outcomes ' = match Zipper . next_location zipper with | Some zipper ' -> run ' zipper ' outcomes ' | None -> callback { log = List . rev ! log ; outcomes = List . rev outcomes ' } in match location with | Suite . TestCase ( _ , test_fun ) -> let prefix = Zipper . get_labels zipper |> String . concat " " : in let log = log_with_prefix prefix in Suite . Async . run_one prefix test_fun log ( fun outcome -> continue zipper ( outcome :: outcomes ) ) | Suite . TestList ( _ , _ ) -> continue zipper outcomes in run ' zipper [ ] let summarise_raw outcomes = let total , errors , failures , passes = List . fold_left ( fun ( total , errors , failures , passes ) outcome -> let open Suite in match outcome . result with | Error _ -> total + 1 , errors + 1 , failures , passes | Fail _ -> total + 1 , errors , failures + 1 , passes | Pass -> total + 1 , errors , failures , passes + 1 ) ( 0 , 0 , 0 , 0 ) outcomes in { total ; errors ; failures ; passes ; passed = ( total = passes ) } let summary_of_raw raw = let report = String . concat " \ n " [ Printf . sprintf " % d tests run " raw . total ; Printf . sprintf " % d errors " raw . errors ; Printf . sprintf " % d failures " raw . failures ; Printf . sprintf " % d passes " raw . passes ; ] in { report ; passed = raw . passed ; } let summarise outcomes = summarise_raw outcomes |> summary_of_raw end |
module Runner = struct let paint color string = match color with | ` Red -> " \ 027 [ 31m " ^ string ^ " \ 027 [ 0m " | ` Green -> " \ 027 [ 32m " ^ string ^ " \ 027 [ 0m " | ` Yellow -> " \ 027 [ 33m " ^ string ^ " \ 027 [ 0m " | _ -> string let colored_string_of_result r = let s = Webtest . Suite . string_of_result r in let c = match r with | Webtest . Suite . Error _ -> ` Yellow | Webtest . Suite . Fail _ -> ` Red | Webtest . Suite . Pass -> ` Green in paint c s let show v = Printf . kprintf ( fun b -> Firebug . console ## info ( Js . string b ) ) v let run ( ? with_colors = true ) suite = let open Webtest . Suite in let open Webtest . Utils in run suite ( fun { log = _ ; outcomes } -> show " Tests results " ; : let raw_summary = summarise_raw outcomes in List . iter ( fun { label ; result ; time_s } -> let sresult = if with_colors then colored_string_of_result result else string_of_result result in show " Test % s . . . % s ( took . % 4fs ) " label sresult time_s ) outcomes ; let test_result = if raw_summary . passed then paint ` Green " Pass " else paint ` Red " Failed " in show " " ; show " Test result : % s . % d in total ; % d passed ; % d failed ; % d errored . " test_result raw_summary . total raw_summary . passes raw_summary . failures raw_summary . errors ; exit ( if raw_summary . passed then 0 else 1 ) ) let install_webtest suite = let webtest = Js . Unsafe . obj [ ] || in webtest . ## finished := Js . _false ; webtest . ## log := Js . string " " ; webtest . ## passed := Js . _false ; webtest . ## run := Js . wrap_callback ( fun ( ) -> let open Webtest in Utils . run suite ( fun { Utils . log ; outcomes } -> let { Utils . report ; passed } = Utils . summarise outcomes in webtest . ## log := Js . string ( ( String . concat " \ n " log ) ^ " \ n " ^ report ) ; webtest . ## passed := if passed then Js . _true else Js . _false ; webtest . ## finished := Js . _true ) ) ; Js . Unsafe . global . ## webtest := webtest let setup suite = let module Html = Dom_html in Html . window . ## onload := Html . handler ( fun _ -> let ( ) = install_webtest suite in Js . _false ) end |
module type S = sig type t type data val create : filename : string -> logger : Logger . t -> t Deferred . t val store : t -> data -> unit Deferred . t end |
module type Storage_intf = sig type data type location val store : location -> data -> unit Deferred . t end |
module Make ( Data : sig type t end ) end type t = { filename : string ; reader : Data . t Linear_pipe . Reader . t ; writer : Data . t Linear_pipe . Writer . t } let write_to_storage { filename ; _ } request data = let % bind ( ) = Store . store filename data in Request . put request filename let create ~ filename ~ logger = let reader , writer = Linear_pipe . create ( ) in let t = { filename ; reader ; writer } in let % map ( ) = match % map Request . create ( ) with | Ok request -> don ' t_wait_for ( Linear_pipe . iter reader ~ f ( : fun data -> match % map write_to_storage t request data with | Ok ( ) -> ( ) | Error e -> [ % log error ] error " Error writing Web client pipe data : $ error " ~ metadata [ : ( " error " , Error_json . error_to_yojson e ) e ] ) ) | Error e -> [ % log error ] error " Unable to create request : $ error " ~ metadata [ : ( " error " , Error_json . error_to_yojson e ) e ] in t let store { reader ; writer ; _ } data = Linear_pipe . force_write_maybe_drop_head ~ capacity : 1 writer reader data ; Deferred . unit end |
let can_parse_uri_safe _ ( ) = let open Csrf . Crypto in let with_secret = Sihl . Configuration . read_secret ( ) |> Secret . make in let value = Nocrypto . Rng . generate token_length in let enc = Encrypted_token . from_struct ~ with_secret value in let parsed = enc |> Encrypted_token . to_uri_safe_string |> Encrypted_token . of_uri_safe_string |> Option . get in let open Alcotest in check bool " Same decrypted CSRF tokens " true @@ Encrypted_token . equal enc parsed ; Lwt . return ( ) ; ; |
let crypto_undo_helper encrypt decrypt = let open Csrf . Crypto in let with_secret = Sihl . Configuration . read_secret ( ) |> Secret . make in let value = Nocrypto . Rng . generate token_length in let dec = encrypt ~ with_secret value |> decrypt ~ with_secret in let open Alcotest in check bool " Same decrypted CSRF tokens " true @@ Decrypted_token . equal_struct dec value ; Lwt . return ( ) ; ; |
let decrypt_random_undoes_encrypt_random _ ( ) = let open Csrf . Crypto in crypto_undo_helper Encrypted_token . from_struct_random Decrypted_token . from_encrypted_random ; ; |
let decrypt_undoes_encrypt _ ( ) = let open Csrf . Crypto in crypto_undo_helper Encrypted_token . from_struct Decrypted_token . from_encrypted ; ; |
let csrf_simulation _ ( ) = let open Csrf . Crypto in let with_secret = Sihl . Configuration . read_secret ( ) |> Secret . make in let value = Nocrypto . Rng . generate token_length in let enc = Encrypted_token . from_struct ~ with_secret value in let req = Decrypted_token . from_encrypted_to_encrypted_random ~ with_secret enc |> Encrypted_token . to_uri_safe_string in let ck = enc |> Encrypted_token . to_uri_safe_string in let received = Encrypted_token . of_uri_safe_string req |> Option . get in let stored = ck |> Encrypted_token . of_uri_safe_string |> Option . get in let dec_received = received |> Decrypted_token . from_encrypted_random ~ with_secret in let dec_stored = stored |> Decrypted_token . from_encrypted ~ with_secret in let open Alcotest in let non_empty tkn = check bool " Non empty encrypted token " false ( Cstruct . is_empty @@ tkn ) in non_empty @@ Encrypted_token . to_struct received ; non_empty @@ Encrypted_token . to_struct stored ; non_empty @@ Cstruct . of_string req ; non_empty @@ Cstruct . of_string ck ; check bool " Same decrypted CSRF tokens " true @@ Decrypted_token . equal dec_stored dec_received ; Lwt . return ( ) ; ; |
let apply_middlewares handler ? not_allowed_handler = handler |> Rock . Middleware . apply ( Sihl . Web . Middleware . csrf ? not_allowed_handler ~ key : csrf_name ( ) ) ; ; |
let default_response ? status ( ) = Lwt . return @@ Response . of_plain_text ? status " Pizzas " ; ; |
let get_csrf req = Csrf . find req |> Option . get |
let uri_decrypt token = let open Csrf . Crypto in let with_secret = Sihl . Configuration . read_secret ( ) |> Secret . make in token |> Encrypted_token . of_uri_safe_string |> Option . get |> Decrypted_token . from_encrypted_random ~ with_secret ; ; |
let get_request_without_token_succeeds _ ( ) = let req = Request . get route in let handler _ = default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt response = wrapped_handler req in let status = Response . status response |> Opium . Status . to_code in let open Alcotest in check int " Has status 200 " 200 status ; Lwt . return ( ) ; ; |
let get_request_yields_token _ ( ) = let req = Request . get route in let token = ref " " in let handler req = token := get_csrf req ; default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt response = wrapped_handler req in let value = Sihl . Test . Session . find_resp csrf_name response in let open Alcotest in check bool " Has CSRF token " true ( not @@ CCString . is_empty ! token ) ; check bool " Has CSRF cookie " true ( not @@ CCString . is_empty value ) ; Lwt . return ( ) ; ; |
let two_get_requests_yield_correct_tokens _ ( ) = let req = Request . get route in let token1 = ref " " in let token2 = ref " " in let handler tkn req = tkn := get_csrf req ; default_response ( ) in let wrapped_handler1 = apply_middlewares @@ handler token1 in let % lwt resp1 = wrapped_handler1 req in let cookie = resp1 |> Response . cookie " _session " |> Option . get in let status = Response . status resp1 |> Opium . Status . to_code in let get_req = Request . get route |> Request . add_cookie cookie . Cookie . value in let wrapped_handler2 = apply_middlewares @@ handler token2 in let % lwt resp2 = wrapped_handler2 get_req in let find_cookie response = Sihl . Test . Session . find_resp csrf_name response in let cookie_token1 = find_cookie resp1 in let cookie_token2 = find_cookie resp2 in let open Csrf . Crypto in let open Alcotest in check int " Has status 200 " 200 status ; check bool " First has CSRF token " true ( not @@ CCString . is_empty ! token1 ) ; check bool " Second has CSRF token " true ( not @@ CCString . is_empty ! token2 ) ; check ( neg string ) " Different encrypted CSRF tokens " ! token1 ! token2 ; let decrypt_same str tk1 tk2 = check bool str true ( Decrypted_token . equal ( uri_decrypt tk1 ) ( uri_decrypt tk2 ) ) in decrypt_same " Same decrypted CSRF tokens " ! token1 ! token2 ; check string " Same encrypted CSRF tokens in cookie " cookie_token1 cookie_token2 ; decrypt_same " Same decrypted CSRF tokens in cookie " cookie_token1 cookie_token1 ; Lwt . return ( ) ; ; |
let post_request_yields_token _ ( ) = let post_req = Request . post route in let token = ref " " in let not_allowed_handler req = token := get_csrf req ; default_response ~ status ` : Forbidden ( ) in let handler _ = default_response ( ) in let wrapped_handler = apply_middlewares handler ~ not_allowed_handler in let % lwt response = wrapped_handler post_req in let status = Response . status response |> Opium . Status . to_code in let cookie_token = Sihl . Test . Session . find_resp csrf_name response in let open Alcotest in check int " Has status 403 " 403 status ; check bool " Has CSRF token " true ( not @@ CCString . is_empty ! token ) ; check bool " Has CSRF cookie " true ( not @@ CCString . is_empty cookie_token ) ; Lwt . return ( ) ; ; |
let two_post_requests_yield_different_token _ ( ) = let req = Request . post route in let token1 = ref " " in let token2 = ref " " in let not_allowed_handler tkn req = tkn := get_csrf req ; default_response ( ) in let handler _ = default_response ( ) in let wrapped_handler1 = apply_middlewares handler ~ not_allowed_handler ( : not_allowed_handler token1 ) in let % lwt resp1 = wrapped_handler1 req in let wrapped_handler2 = apply_middlewares handler ~ not_allowed_handler ( : not_allowed_handler token2 ) in let % lwt resp2 = wrapped_handler2 req in let find_cookie response = Sihl . Test . Session . find_resp csrf_name response in let cookie_token1 = find_cookie resp1 in let cookie_token2 = find_cookie resp2 in let open Alcotest in check bool " First has CSRF token " true ( not @@ CCString . is_empty ! token1 ) ; check bool " Second has CSRF token " true ( not @@ CCString . is_empty ! token2 ) ; check bool " Different decrypted CSRF tokens " false ( Csrf . Crypto . Decrypted_token . equal ( uri_decrypt ! token1 ) ( uri_decrypt ! token2 ) ) ; check ( neg string ) " Different encrypted CSRF tokens in cookie " cookie_token1 cookie_token2 ; Lwt . return ( ) ; ; |
let post_request_both_invalid_tokens_fails _ ( ) = let requests = CCList . map ( fun body -> Request . of_urlencoded ~ body route ` POST ) [ [ ] ; [ csrf_name , [ " garbage " ] ] ] in let add_cookie = [ CCFun . id ; Sihl . Test . Session . set_value_req [ csrf_name , " garbage " ] ] in let reqs = CCList . product CCFun . ( @@ ) add_cookie requests in let allowed = ref 0 in let handler _ = allowed := ! allowed + 1 ; default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt responses = Lwt_list . map_s wrapped_handler reqs in let statuses = CCList . map ( fun r -> Opium . Status . to_code @@ Response . status r ) responses in let open Alcotest in check bool " Has status 403 " true ( CCList . for_all ( ( == ) 403 ) statuses ) ; check int " Is disallowed " 0 ! allowed ; Lwt . return ( ) ; ; |
let cookie_invalid_helper reqs = let req = Request . get route in let token = ref " " in let allowed = ref 0 in let handler1 req = token := get_csrf req ; default_response ( ) in let handler2 _ = allowed := ! allowed + 1 ; default_response ( ) in let wrapped_handler = apply_middlewares handler1 in let % lwt response = wrapped_handler req in let wrapped_handler = apply_middlewares handler2 in let cookie = response |> Response . cookies |> List . hd in let % lwt responses = Lwt_list . map_s wrapped_handler @@ reqs ( ! token , cookie ) in let statuses = CCList . map ( fun r -> Opium . Status . to_code @@ Response . status r ) responses in print_endline @@ CCString . concat " , " @@ List . map string_of_int statuses ; let open Alcotest in check bool " Has status 403 " true ( CCList . for_all ( ( == ) 403 ) statuses ) ; check int " Is disallowed " 0 ! allowed ; Lwt . return ( ) ; ; |
let post_request_cookie_invalid_token_fails _ ( ) = let reqs ( token , _ ) = CCList . map ( fun add_cookie -> Request . of_urlencoded ~ body [ : csrf_name , [ token ] ] route ` POST |> add_cookie ) [ CCFun . id ; Sihl . Test . Session . set_value_req [ csrf_name , " garbage " ] ] in cookie_invalid_helper reqs ; ; |
let post_request_request_invalid_token_fails _ ( ) = let reqs ( _ , cookie ) = CCList . map ( fun body -> Request . of_urlencoded ~ body route ` POST |> Request . add_cookie cookie . Cookie . value ) [ [ ] ; [ csrf_name , [ " garbage " ] ] ] in cookie_invalid_helper reqs ; ; |
let post_request_with_nonmatching_token_fails _ ( ) = let open Csrf . Crypto in let req = Request . get route in let token = ref " " in let handler req = token := get_csrf req ; default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt response = wrapped_handler req in let cookie = response |> Response . cookie " _session " |> Option . get in let with_secret = Sihl . Configuration . read_secret ( ) |> Secret . make in let tkn = Nocrypto . Rng . generate token_length |> Encrypted_token . from_struct_random ~ with_secret |> Encrypted_token . to_uri_safe_string in let post_req = Request . of_urlencoded ~ body [ : csrf_name , [ tkn ] ] route ` POST |> Request . add_cookie cookie . Cookie . value in let handler _ = default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt response = wrapped_handler post_req in let status = Response . status response |> Opium . Status . to_code in Alcotest . ( check int " Has status 403 " 403 status ) ; Lwt . return ( ) ; ; |
let post_request_with_nonmatching_cookie_fails _ ( ) = let open Csrf . Crypto in let req = Request . get route in let token = ref " " in let handler req = token := get_csrf req ; default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt _ = wrapped_handler req in let with_secret = Sihl . Configuration . read_secret ( ) |> Secret . make in let tkn = Nocrypto . Rng . generate token_length |> Encrypted_token . from_struct ~ with_secret |> Encrypted_token . to_uri_safe_string in let post_req = Request . of_urlencoded ~ body [ : csrf_name , [ ! token ] ] route ` POST |> Sihl . Test . Session . set_value_req [ csrf_name , tkn ] in let handler _ = default_response ( ) in let open Alcotest in let not_allowed_handler req = let key , _ = req |> Request . cookies |> List . hd in check string " Has cookie set " " _session " key ; default_response ( ) ~ status ` : Forbidden in let wrapped_handler = apply_middlewares handler ~ not_allowed_handler in let % lwt response = wrapped_handler post_req in let key = response |> Response . cookies |> List . hd in check string " Has cookie set " " _session " @@ fst key . Cookie . value ; let status = Response . status response |> Opium . Status . to_code in check int " Has status 403 " 403 status ; Lwt . return ( ) ; ; |
let post_request_with_valid_token_succeeds _ ( ) = let req = Request . get route in let token = ref " " in let handler req = token := get_csrf req ; default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt response = wrapped_handler req in let cookie = response |> Response . cookies |> List . hd in let post_req = Request . of_urlencoded ~ body [ : csrf_name , [ ! token ] ] route ` POST |> Request . add_cookie cookie . Cookie . value in let handler _ = default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt response = wrapped_handler post_req in let status = Response . status response |> Opium . Status . to_code in Alcotest . ( check int " Has status 200 " 200 status ) ; Lwt . return ( ) ; ; |
let two_post_requests_succeed _ ( ) = let req = Request . get route in let token1 = ref " " in let token2 = ref " " in let token3 = ref " " in let handler tkn req = tkn := get_csrf req ; default_response ( ) in let wrapped_handler = apply_middlewares @@ handler token1 in let % lwt response = wrapped_handler req in let cookie = response |> Response . cookies |> List . hd in let status1 = Response . status response |> Opium . Status . to_code in let post_req = Request . of_urlencoded ~ body [ : csrf_name , [ ! token1 ] ] route ` POST |> Request . add_cookie cookie . Cookie . value in let wrapped_handler = apply_middlewares @@ handler token2 in let % lwt response = wrapped_handler post_req in let status2 = Response . status response |> Opium . Status . to_code in let % lwt response = wrapped_handler req in let cookie = response |> Response . cookies |> List . hd in let session_key , session_val = " test_key " , " test_val " in let post_req = Request . of_urlencoded ~ body [ : csrf_name , [ ! token2 ] ] route ` POST |> Request . add_cookie cookie . Cookie . value |> Sihl . Test . Session . set_value_req [ session_key , session_val ] in let wrapped_handler = apply_middlewares @@ handler token3 in let % lwt response = wrapped_handler post_req in let status3 = Response . status response |> Opium . Status . to_code in let session = Sihl . Test . Session . find_resp session_key response in let open Alcotest in check string " Session is not overwritten " session_val session ; CCList . iter ( check int " Has status 200 " 200 ) [ status1 ; status2 ; status3 ] ; CCList . iter ( fun tkn -> check bool " Has CSRF token " true ( String . length tkn > 0 ) ) [ ! token1 ; ! token2 ; ! token3 ] ; CCList . iter ( fun ( tkn1 , tkn2 ) -> check bool " Different CSRF tokens " false ( String . equal tkn1 tkn2 ) ) [ ! token1 , ! token2 ; ! token1 , ! token3 ; ! token2 , ! token3 ] ; Lwt . return ( ) ; ; |
let stale_duplicated_token_post_request_succeed _ ( ) = let req = Request . get route in let token = ref " " in let handler req = token := get_csrf req ; default_response ( ) in let wrapped_handler = apply_middlewares handler in let % lwt response = wrapped_handler req in let old_token = ! token in let cookie = response |> Response . cookies |> List . hd in let post_req = Request . of_urlencoded ~ body [ : csrf_name , [ old_token ] ] route ` POST |> Request . add_cookie cookie . Cookie . value in let % lwt _ = wrapped_handler req in let % lwt response1 = wrapped_handler post_req in let % lwt response2 = wrapped_handler post_req in let statuses = CCList . map ( fun resp -> Response . status resp |> Opium . Status . to_code ) [ response1 ; response2 ] in let open Alcotest in CCList . iter ( check int " Has status 200 " 200 ) statuses ; Lwt . return ( ) ; ; |
let suite = [ ( " csrf crypto " , [ test_case " uri safe encoded string can be decoded " ` Quick can_parse_uri_safe ; test_case " decryption accounting for random undoes random encryption " ` Quick decrypt_random_undoes_encrypt_random ; test_case " decryption undoes encryption " ` Quick decrypt_undoes_encrypt ; test_case " simulate entire CSRF crypto lifecycle " ` Quick csrf_simulation ] ) ; ( " csrf " , [ test_case " get request without CSRF token succeeds " ` Quick get_request_without_token_succeeds ; test_case " get request yields CSRF token " ` Quick get_request_yields_token ; test_case " two get requests yield correct CSRF token " ` Quick two_get_requests_yield_correct_tokens ; test_case " two post requests yield different CSRF token " ` Quick two_post_requests_yield_different_token ; test_case " post request with invalid CSRF token in cookie and request fails " ` Quick post_request_both_invalid_tokens_fails ; test_case " post request with invalid CSRF token in cookie fails " ` Quick post_request_cookie_invalid_token_fails ; test_case " post request with invalid CSRF token in request fails " ` Quick post_request_request_invalid_token_fails ; test_case " post request with non - matching CSRF token fails " ` Quick post_request_with_nonmatching_token_fails ; test_case " post request with non - matching CSRF cookie fails " ` Quick post_request_with_nonmatching_cookie_fails ; test_case " post request with valid CSRF token succeeds " ` Quick post_request_with_valid_token_succeeds ; test_case " two post requests with a valid CSRF token succeed " ` Quick two_post_requests_succeed ; test_case " post request with stale and duplicated token succeeds " ` Quick stale_duplicated_token_post_request_succeed ] ) ] ; ; |
let ( ) = Unix . putenv " CHECK_CSRF " " true " ; Logs . set_level ( Sihl . Log . get_log_level ( ) ) ; Logs . set_reporter ( Sihl . Log . cli_reporter ( ) ) ; Lwt_main . run ( Alcotest_lwt . run " csrf " suite ) ; ; |
let log_src = Logs . Src . create " sihl . middleware . error " |
module Logs = ( val Logs . src_log log_src : Logs . LOG ) |
let page request_id = Format . asprintf { | < head > < meta charset " = utf - 8 " > < meta name " = viewport " content " = width = device - width , initial - scale = 1 , shrink - to - fit = no " > < title > Internal Server Error </ title > < style > % s </ style > </ head > < div class " = py - 4 sm : py - 12 " > < div class " = max - w - 8xl mx - auto px - 4 sm : px - 6 lg : px - 8 " > < h2 class " = text - 2xl leading - 8 font - semibold font - display text - gray - 900 sm : text - 3xl sm : leading - 9 " > Internal Server Error </ h2 > < div class " = mt - 0 mb - 4 text - gray - 600 " > An error has been caught while handling the request . </ div > < p > Our administrators have been notified . Please note your request ID < b >% s </ b > when contacting us . </ p > </ div > </ div > </ body > </ html > } | Web . style request_id ; ; |
let site_error_handler req = let request_id = Web_id . find req |> Option . value ~ default " " :- in let site = page request_id in Opium . Response . of_plain_text site |> Opium . Response . set_content_type " text / html ; charset = utf - 8 " |> Lwt . return ; ; |
let json_error_handler req = let request_id = Web_id . find req |> Option . value ~ default " " :- in let msg = Format . sprintf " Something went wrong , our administrators have been notified . " in let body = Format . sprintf { " { " | errors " : [ " % s " ] , " request_id " : " % s " } " } | msg request_id in Opium . Response . of_plain_text body |> Opium . Response . set_content_type " application / json ; charset = utf - 8 " |> Opium . Response . set_status ` Internal_server_error |> Lwt . return ; ; |
let exn_to_string exn req = let msg = Printexc . to_string exn and stack = Printexc . get_backtrace ( ) in let request_id = Web_id . find req |> Option . value ~ default " " :- in let req_str = Format . asprintf " % a " Opium . Request . pp_hum req in Format . asprintf " Request id % s : % s \ nError : % s \ nStacktrace : % s " request_id req_str msg stack ; ; |
let create_error_email ( sender , recipient ) error = Contract_email . create ~ sender ~ recipient ~ subject " : Exception caught " error ; ; |
let middleware ? email_config ( ? reporter = fun _ _ -> Lwt . return ( ) ) ? error_handler ( ) = let filter handler req = Lwt . catch ( fun ( ) -> handler req ) ( fun exn -> let error = exn_to_string exn req in Logs . err ( fun m -> m " % s " error ) ; let _ = match email_config with | Some ( sender , recipient , send_fn ) -> let email = create_error_email ( sender , recipient ) error in Lwt . catch ( fun ( ) -> send_fn email ) ( fun exn -> let msg = Printexc . to_string exn in Logs . err ( fun m -> m " Failed to report error per email : % s " msg ) ; Lwt . return ( ) ) | _ -> Lwt . return ( ) in let _ = Lwt . catch ( fun ( ) -> reporter req error ) ( fun exn -> let msg = Printexc . to_string exn in Logs . err ( fun m -> m " Failed to run custom error reporter : % s " msg ) ; Lwt . return ( ) ) in let content_type = try req |> Opium . Request . header " Content - Type " |> Option . map ( String . split_on_char ' ; ' ) |> Option . map List . hd with | _ -> None in match error_handler with | Some error_handler -> error_handler req | None -> ( match content_type with | Some " application / json " -> json_error_handler req | _ -> site_error_handler req ) ) in if Core_configuration . is_production ( ) then Rock . Middleware . create ~ name " : error " ~ filter else Opium . Middleware . debugger ; ; |
let assert_delete_cookie cookie = Alcotest . ( check ( pair string string ) " flash is empty " ( " _flash " , " " ) cookie . Opium . Cookie . value ) ; match cookie . Opium . Cookie . expires with | ` Max_age value -> if Int64 . equal value Int64 . zero then ( ) else Alcotest . fail " Flash cookie did not expire " | _ -> Alcotest . fail " Flash cookie did not expire " ; ; |
let not_touching_flash_without_set_cookie_doesnt_set_cookie _ ( ) = let req = Opium . Request . get " " / in let % lwt res = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun _ -> Lwt . return @@ Opium . Response . of_plain_text " " ) req in let cookie = Opium . Response . cookie " _flash " res in Alcotest . ( check bool " no cookie set " false ( Option . is_some cookie ) ) ; Lwt . return ( ) ; ; |
let not_touching_flash_removes_cookie _ ( ) = let req = Opium . Request . get " " / |> Opium . Request . add_cookie ( " _flash " , { { " | alert " : null , " notice " : null , " custom " [ ] } } ) :| in let % lwt res = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun _ -> Lwt . return @@ Opium . Response . of_plain_text " " ) req in let cookie = Opium . Response . cookie " _flash " res |> Option . get in Alcotest . ( check ( pair string string ) " was removed " ( " _flash " , " " ) cookie . Opium . Cookie . value ) ; Lwt . return ( ) ; ; |
let flash_is_cleared_after_request _ ( ) = let req = Opium . Request . get " " / in let % lwt res = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun _ -> let res = Opium . Response . of_plain_text " " |> Sihl . Web . Flash . set_alert " foobar " in Lwt . return res ) req in let cookie = Opium . Response . cookie " _flash " res |> Option . get in let cookie_value = cookie . Opium . Cookie . value in let req = Opium . Request . get " " in let req = Opium . Request . add_cookie cookie_value req in let % lwt res = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun req -> let alert = Sihl . Web . Flash . find_alert req in Alcotest . ( check ( option string ) " has alert " ( Some " foobar " ) alert ) ; Lwt . return @@ Opium . Response . of_plain_text " " ) req in let cookie = Opium . Response . cookie " _flash " res |> Option . get in let cookie_value = cookie . Opium . Cookie . value in let req = Opium . Request . get " " / in let req = Opium . Request . add_cookie cookie_value req in let % lwt _ = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun req -> let alert = Sihl . Web . Flash . find_alert req in Alcotest . ( check ( option string ) " alert was cleared " None alert ) ; Lwt . return @@ Opium . Response . of_plain_text " " ) req in assert_delete_cookie cookie ; Lwt . return ( ) ; ; |
let set_and_read_flash_message _ ( ) = let req = Opium . Request . get " " / in let % lwt res = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun req -> let alert = Sihl . Web . Flash . find_alert req in let notice = Sihl . Web . Flash . find_notice req in Alcotest . ( check ( option string ) " has no alert " None alert ) ; Alcotest . ( check ( option string ) " has no notice " None notice ) ; let res = Opium . Response . of_plain_text " " in let res = Sihl . Web . Flash . set_alert " foobar " res in Lwt . return res ) req in let cookie = Opium . Response . cookie " _flash " res |> Option . get in let cookie_value = cookie . Opium . Cookie . value in let req = Opium . Request . get " " in let req = Opium . Request . add_cookie cookie_value req in let % lwt res = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun req -> let alert = Sihl . Web . Flash . find_alert req in let notice = Sihl . Web . Flash . find_notice req in Alcotest . ( check ( option string ) " has alert " ( Some " foobar " ) alert ) ; Alcotest . ( check ( option string ) " has no notice " None notice ) ; let res = Opium . Response . of_plain_text " " in let res = Sihl . Web . Flash . set_alert " nextfoo " res in let res = Sihl . Web . Flash . set [ " hello " , " other " ] res in Lwt . return res ) req in let cookie = Opium . Response . cookie " _flash " res |> Option . get in let cookie_value = cookie . Opium . Cookie . value in let req = Opium . Request . get " " |> Opium . Request . add_cookie cookie_value in let % lwt response = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun req -> let alert = Sihl . Web . Flash . find_alert req in let custom = Sihl . Web . Flash . find " hello " req in Alcotest . ( check ( option string ) " has alert " ( Some " nextfoo " ) alert ) ; Alcotest . ( check ( option string ) " has custom " ( Some " other " ) custom ) ; let res = Opium . Response . of_plain_text " " in Lwt . return res ) req in let cookie = Opium . Response . cookie " _flash " response |> Option . get in assert_delete_cookie cookie ; let cookie_value = cookie . Opium . Cookie . value in let req = Opium . Request . get " " |> Opium . Request . add_cookie cookie_value in let % lwt resp = Rock . Middleware . apply ( Sihl . Web . Middleware . flash ( ) ) ( fun req -> let flash = Sihl . Web . Flash . find_alert req in Alcotest . ( check ( option string ) " has no alert " None flash ) ; let res = Opium . Response . of_plain_text " " in Lwt . return res ) req in let cookie = Opium . Response . cookie " _flash " resp |> Option . get in Alcotest . ( check ( pair string string ) " was removed " ( " _flash " , " " ) cookie . Opium . Cookie . value ) ; Lwt . return ( ) ; ; |
let suite = [ ( " flash " , [ test_case " not touching flash without set cookie doesn ' t change cookie " ` Quick not_touching_flash_without_set_cookie_doesnt_set_cookie ; test_case " not touching flash removes cookie " ` Quick not_touching_flash_removes_cookie ; test_case " flash is cleared after request " ` Quick flash_is_cleared_after_request ; test_case " set and read flash message " ` Quick set_and_read_flash_message ] ) ] ; ; |
let ( ) = Logs . set_level ( Sihl . Log . get_log_level ( ) ) ; Logs . set_reporter ( Sihl . Log . cli_reporter ( ) ) ; Lwt_main . run ( Alcotest_lwt . run " flash " suite ) ; ; |
let log_src = Logs . Src . create " sihl . middleware . htmx " |
module Logs = ( val Logs . src_log log_src : Logs . LOG ) |
let is_htmx req = Opium . Request . header " HX - Request " req |> Option . is_some |
let current_url req = Opium . Request . header " HX - Current - URL " req |
let prompt req = Opium . Request . header " HX - Prompt " req |
let set_prompt prompt req = Opium . Request . add_header_or_replace ( " HX - Prompt " , prompt ) req ; ; |
let target req = Opium . Request . header " HX - Target " req |
let set_target target req = Opium . Request . add_header_or_replace ( " HX - Target " , target ) req ; ; |
let trigger_name req = Opium . Request . header " HX - Trigger - Name " req |
let set_trigger_name trigger_name req = Opium . Request . add_header_or_replace ( " HX - Trigger - Name " , trigger_name ) req ; ; |
let trigger_req req = Opium . Request . header " HX - Trigger " req |
let set_trigger_req trigger req = Opium . Request . add_header_or_replace ( " HX - Trigger " , trigger ) req ; ; |
let set_push push resp = Opium . Response . add_header_or_replace ( " HX - Push " , push ) resp ; ; |
let set_redirect redirect resp = Opium . Response . add_header_or_replace ( " HX - Redirect " , redirect ) resp ; ; |
let set_refresh refresh resp = Opium . Response . add_header_or_replace ( " HX - Refresh " , refresh ) resp ; ; |
let set_trigger trigger resp = Opium . Response . add_header_or_replace ( " HX - Trigger " , trigger ) resp ; ; |
let set_trigger_after_settle trigger_after_settle resp = Opium . Response . add_header_or_replace ( " HX - Trigger - After - Settle " , trigger_after_settle ) resp ; ; |
let set_trigger_after_swap trigger_after_swap resp = Opium . Response . add_header_or_replace ( " HX - Trigger - After - Swap " , trigger_after_swap ) resp ; ; |
let combine_routers_matches_first_route _ ( ) = let was_called1 = ref false in let was_called2 = ref false in let handler1 _ = was_called1 := true ; Lwt . return ( Opium . Response . of_plain_text " ello 1 " ) in let handler2 _ = was_called2 := true ; Lwt . return ( Opium . Response . of_plain_text " ello 2 " ) in let route1 = Sihl . Web . get " / some / path " handler1 in let route2 = Sihl . Web . get " " /** handler2 in let router = Sihl . Web . choose ~ scope " :/ scope " [ route1 ; route2 ] in let service = Sihl . Web . Http . register router in let % lwt ( ) = Sihl . Container . Service . start service in let % lwt _ = Cohttp_lwt_unix . Client . get ( Uri . of_string " http :// localhost : 3000 / scope / some / path " ) in Alcotest . ( check bool " was called " true ! was_called1 ) ; Alcotest . ( check bool " was not called " false ! was_called2 ) ; Sihl . Container . Service . stop service ; ; |
let combine_routers_calls_middlewares _ ( ) = let root_middleware_was_called = ref false in let sub_middleware_was_called = ref false in let index_was_called = ref false in let foo_was_called = ref false in let bar_was_called = ref false in let reset_assert_state ( ) = root_middleware_was_called := false ; sub_middleware_was_called := false ; index_was_called := false ; foo_was_called := false ; bar_was_called := false in reset_assert_state ( ) ; let middleware_root = Rock . Middleware . create ~ name " : root " ~ filter ( : fun hander req -> root_middleware_was_called := true ; hander req ) in let middleware_sub = Rock . Middleware . create ~ name " : sub " ~ filter ( : fun hander req -> sub_middleware_was_called := true ; hander req ) in let middleware_foo = Rock . Middleware . create ~ name " : foo " ~ filter ( : fun _ _ -> Lwt . return @@ Sihl . Web . Response . of_plain_text " foo middleware " ) in let middleware_bar = Rock . Middleware . create ~ name " : bar " ~ filter ( : fun _ _ -> Lwt . return @@ Sihl . Web . Response . of_plain_text " bar middleware " ) in let router = Sihl . Web . ( choose ~ middlewares [ : middleware_root ] ~ scope " :/ root " [ choose ~ middlewares [ : middleware_sub ] ~ scope " :/ sub " [ get " " / ( fun _ -> index_was_called := true ; Lwt . return ( Opium . Response . of_plain_text " " ) ) / ; get ~ middlewares [ : middleware_foo ] " / foo " ( fun _ -> foo_was_called := true ; Lwt . return ( Opium . Response . of_plain_text " / foo " ) ) ; get " / fooz " ( fun _ -> Lwt . return ( Opium . Response . of_plain_text " / fooz " ) ) ] ; get " / bar " ~ middlewares [ : middleware_bar ] ( fun _ -> bar_was_called := true ; Lwt . return ( Opium . Response . of_plain_text " / bar " ) ) ] ) in let service = Sihl . Web . Http . register router in let status_of_resp resp = resp |> Lwt . map fst |> Lwt . map Cohttp . Response . status |> Lwt . map Cohttp . Code . code_of_status in let % lwt ( ) = Sihl . Container . Service . start service in reset_assert_state ( ) ; let % lwt status = Cohttp_lwt_unix . Client . get ( Uri . of_string " http :// localhost : 3000 / root " ) |> status_of_resp in Alcotest . ( check int " / root not found " 404 status ) ; Alcotest . ( check bool " / root middleware not called " false ! root_middleware_was_called ) ; reset_assert_state ( ) ; let % lwt status = Cohttp_lwt_unix . Client . get ( Uri . of_string " http :// localhost : 3000 / root " ) / |> status_of_resp in Alcotest . ( check int " / root / not found " 404 status ) ; Alcotest . ( check bool " / root middleware not called " false ! root_middleware_was_called ) ; reset_assert_state ( ) ; let % lwt status = Cohttp_lwt_unix . Client . get ( Uri . of_string " http :// localhost : 3000 / root / sub " ) |> status_of_resp in Alcotest . ( check int " / root / sub not found " 404 status ) ; reset_assert_state ( ) ; let % lwt status = Cohttp_lwt_unix . Client . get ( Uri . of_string " http :// localhost : 3000 / root / sub " ) / |> status_of_resp in Alcotest . ( check int " / root / sub / found " 200 status ) ; Alcotest . ( check bool " root middleware called " true ! root_middleware_was_called ) ; Alcotest . ( check bool " sub middleware called " true ! sub_middleware_was_called ) ; reset_assert_state ( ) ; let % lwt body = Cohttp_lwt_unix . Client . get ( Uri . of_string " http :// localhost : 3000 / root / sub / foo " ) |> Lwt . map snd in let % lwt body = Cohttp_lwt . Body . to_string body in Alcotest . ( check string " foo middleware called " " foo middleware " body ) ; Alcotest . ( check bool " root middleware called " true ! root_middleware_was_called ) ; Alcotest . ( check bool " sub middleware called " true ! sub_middleware_was_called ) ; reset_assert_state ( ) ; let % lwt body = Cohttp_lwt_unix . Client . get ( Uri . of_string " http :// localhost : 3000 / root / bar " ) |> Lwt . map snd in let % lwt body = Cohttp_lwt . Body . to_string body in Alcotest . ( check string " bar middleware called " " bar middleware " body ) ; Alcotest . ( check bool " root middleware called " true ! root_middleware_was_called ) ; Alcotest . ( check bool " sub middleware not called " false ! sub_middleware_was_called ) ; Sihl . Container . Service . stop service ; ; |
let global_middleware_before_router _ ( ) = let filter _ _ = Lwt . return @@ Opium . Response . of_plain_text " all good " ! in let middleware = Rock . Middleware . create ~ name " : test " ~ filter in let router = Sihl . Web . choose ~ middlewares [ ] : ~ scope " " :/ [ ] in let service = Sihl . Web . Http . register ~ middlewares [ : middleware ] router in let % lwt ( ) = Sihl . Container . Service . start service in let % lwt resp , body = Cohttp_lwt_unix . Client . get ( Uri . of_string " http :// localhost : 3000 / non / existing " ) in let status = resp |> Cohttp . Response . status |> Cohttp . Code . code_of_status in let % lwt body = Cohttp_lwt . Body . to_string body in Alcotest . ( check int " matched without route " 200 status ) ; Alcotest . ( check string " responds " " all good " ! body ) ; Sihl . Container . Service . stop service ; ; |
let suite = [ ( " http " , [ test_case " combine routers matches first route " ` Quick combine_routers_matches_first_route ; test_case " combine routers calls middlewares " ` Quick combine_routers_calls_middlewares ; test_case " global middleware before router " ` Quick global_middleware_before_router ] ) ] ; ; |
let ( ) = Logs . set_level ( Sihl . Log . get_log_level ( ) ) ; Logs . set_reporter ( Sihl . Log . cli_reporter ( ) ) ; Lwt_main . run ( Alcotest_lwt . run " http " suite ) ; ; |
let generate_random_id _ ( ) = let middleware = Sihl . Web . Middleware . id ( ) in let req = Opium . Request . get " / foo / bar " in let id_first = ref " " in let handler req = let id = Sihl . Web . Id . find req |> Option . get in id_first := id ; Alcotest . ( check bool " non empty string " true ( String . length id > 0 ) ) ; Lwt . return @@ Opium . Response . of_plain_text " " in let % lwt _ = Rock . Middleware . apply middleware handler req in let id_second = ref " " in let handler req = let id = Sihl . Web . Id . find req |> Option . get in id_second := id ; Alcotest . ( check bool " non empty string " true ( String . length id > 0 ) ) ; Lwt . return @@ Opium . Response . of_plain_text " " in let % lwt _ = Rock . Middleware . apply middleware handler req in Alcotest . ( check bool " different ids " false ( String . equal ! id_first ! id_second ) ) ; Lwt . return ( ) ; ; |
let use_provided_id _ ( ) = let middleware = Sihl . Web . Middleware . id ( ) in let req = Opium . Request . get " / foo / bar " |> Opium . Request . add_header ( " X - Request - ID " , " randomid123 " ) in let handler req = let id = Sihl . Web . Id . find req |> Option . get in Alcotest . ( check string " is provided id " " randomid123 " id ) ; Lwt . return @@ Opium . Response . of_plain_text " " in let % lwt _ = Rock . Middleware . apply middleware handler req in Lwt . return ( ) ; ; |
let suite = [ ( " id " , [ test_case " generate random id " ` Quick generate_random_id ; test_case " use provided id " ` Quick use_provided_id ] ) ] ; ; |
let ( ) = Logs . set_level ( Sihl . Log . get_log_level ( ) ) ; Logs . set_reporter ( Sihl . Log . cli_reporter ( ) ) ; Lwt_main . run ( Alcotest_lwt . run " id " suite ) ; ; |
type t = < href : string [ @ bs . get ] [ @ bs . set ] ; protocol : string [ @ bs . get ] [ @ bs . set ] ; host : string [ @ bs . get ] [ @ bs . set ] ; hostname : string [ @ bs . get ] [ @ bs . set ] ; port : string [ @ bs . get ] [ @ bs . set ] ; pathname : string [ @ bs . get ] [ @ bs . set ] ; search : string [ @ bs . get ] [ @ bs . set ] ; hash : string [ @ bs . get ] [ @ bs . set ] ; username : string [ @ bs . get ] [ @ bs . set ] ; password : string [ @ bs . get ] [ @ bs . set ] ; origin : string [ @ bs . get ] ; |
let getHref location = location ## href |
let setHref location value = location ## href #= value |
let getProtocol location = location ## protocol |
let setProtocol location value = location ## protocol #= value |
let getHost location = location ## host |
let setHost location value = location ## host #= value |
let getHostname location = location ## hostname |
let setHostname location value = location ## hostname #= value |
let getPort location = location ## port |
let setPort location value = location ## port #= value |
let getPathname location = location ## pathname |
let setPathname location value = location ## pathname #= value |
let getSearch location = location ## search |
let setSearch location value = location ## search #= value |
let getHash location = location ## hash |
let setHash location value = location ## hash #= value |
let getUsername location = location ## username |
let setUsername location value = location ## username #= value |
let getPassword location = location ## password |
let setPassword location value = location ## password #= value |
let getOrigin location = location ## origin |
type location = { href : string ; protocol : string ; host : string ; hostname : string ; port : string ; pathname : string ; search : string ; hash : string ; username : string ; password : string ; origin : string } |
let asRecord location = { href = location ## href ; protocol = location ## protocol ; host = location ## host ; hostname = location ## hostname ; port = location ## port ; pathname = location ## pathname ; search = location ## search ; hash = location ## hash ; username = location ## username ; password = location ## password ; origin = location ## origin } |
type style = < setProperty : Web_json . t Js . undefined [ @ bs . get ] ; setProperty__ : string -> string Js . null -> string Js . null -> unit [ @ bs . meth ] ; > Js . t |
type t = < style : style [ @ bs . get ] ; value : string Js . undefined [ @ bs . set ] [ @ bs . get ] ; checked : bool Js . undefined [ @ bs . set ] [ @ bs . get ] ; childNodes : t Js . Array . t [ @ bs . get ] ; firstChild : t Js . Null . t [ @ bs . get ] ; appendChild : t -> t [ @ bs . meth ] ; removeChild : t -> t [ @ bs . meth ] ; insertBefore : t -> t -> t [ @ bs . meth ] ; remove : unit -> unit [ @ bs . meth ] ; setAttributeNS : string -> string -> string -> unit [ @ bs . meth ] ; setAttribute : string -> string -> unit [ @ bs . meth ] ; removeAttributeNS : string -> string -> unit [ @ bs . meth ] ; removeAttribute : string -> unit [ @ bs . meth ] ; addEventListener : string -> t Web_event . cb -> Web_event . options -> unit [ @ bs . meth ] ; removeEventListener : string -> t Web_event . cb -> Web_event . options -> unit [ @ bs . meth ] ; focus : unit -> unit [ @ bs . meth ] ; nodeValue : string [ @ bs . set ] [ @ bs . get { null } ] ; |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.