// This file is part of Windmark . // Copyright (C) 2022-2022 Fuwn // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, version 3. // // This program is distributed in the hope that it will be useful, but // WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU // General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program. If not, see . // // Copyright (C) 2022-2022 Fuwn // SPDX-License-Identifier: GPL-3.0-only //! `cargo run --example windmark --features logger` #[macro_use] extern crate log; use windmark::{response::Response, returnable::CallbackContext, Router}; #[derive(Default)] struct Clicker { clicks: isize, } impl windmark::Module for Clicker { fn on_attach(&mut self, _: &mut Router) { println!("clicker has been attached!"); } fn on_pre_route(&mut self, context: CallbackContext<'_>) { self.clicks += 1; info!( "clicker has been called pre-route on {} with {} clicks!", context.url.path(), self.clicks ); } fn on_post_route(&mut self, context: CallbackContext<'_>) { info!( "clicker has been called post-route on {} with {} clicks!", context.url.path(), self.clicks ); } } #[windmark::main] async fn main() -> Result<(), Box> { let mut error_count = 0; let mut router = Router::new(); router.set_private_key_file("windmark_private.pem"); router.set_certificate_file("windmark_public.pem"); #[cfg(feature = "logger")] router.enable_default_logger(true); router.set_error_handler(Box::new(move |_| { error_count += 1; println!("{} errors so far", error_count); Response::permanent_failure("e") })); router.set_fix_path(true); router.attach_stateless(|r| { r.mount( "/module", Box::new(|_| Response::success("This is a module!")), ); }); router.attach(Clicker::default()); router.set_pre_route_callback(Box::new(|context| { info!( "accepted connection from {} to {}", context.tcp.peer_addr().unwrap().ip(), context.url.to_string() ) })); router.set_post_route_callback(Box::new(|context, content| { *content = content.replace("Welcome!", "Welcome to Windmark!"); info!( "closed connection from {}", context.tcp.peer_addr().unwrap().ip() ) })); router.add_header(Box::new(|_| "```\nART IS COOL\n```\nhi".to_string())); router.add_footer(Box::new(|_| "Copyright 2022".to_string())); router.add_footer(Box::new(|context| { format!("Another footer, but lower! (from {})", context.url.path()) })); router.mount( "/", Box::new(|_| { Response::success( "# INDEX\n\nWelcome!\n\n=> /test Test Page\n=> /time Unix Epoch", ) }), ); router.mount( "/specific-mime", Box::new(|_| { Response::success("hi".to_string()) .with_mime("text/plain") .clone() }), ); router.mount( "/ip", Box::new(|context| { Response::success(format!( "Hello, {}", context.tcp.peer_addr().unwrap().ip() )) }), ); router.mount( "/test", Box::new(|_| Response::success("hi there\n=> / back")), ); router.mount( "/temporary-failure", Box::new(|_| Response::temporary_failure("Woops, temporarily...")), ); router.mount( "/time", Box::new(|_| { Response::success( std::time::UNIX_EPOCH .elapsed() .unwrap() .as_nanos() .to_string(), ) }), ); router.mount( "/query", Box::new(|context| { Response::success(format!( "queries: {:?}", windmark::utilities::queries_from_url(&context.url) )) }), ); router.mount( "/param/:lang", Box::new(|context| { Response::success(format!( "Parameter lang is {}", context.params.get("lang").unwrap() )) }), ); router.mount( "/names/:first/:last", Box::new(|context| { Response::success(format!( "{} {}", context.params.get("first").unwrap(), context.params.get("last").unwrap() )) }), ); router.mount( "/input", Box::new(|context| { if let Some(name) = context.url.query() { Response::success(format!("Your name is {}!", name)) } else { Response::input("What is your name?") } }), ); router.mount( "/sensitive-input", Box::new(|context| { if let Some(password) = context.url.query() { Response::success(format!("Your password is {}!", password)) } else { Response::sensitive_input("What is your password?") } }), ); router.mount( "/error", Box::new(|_| Response::certificate_not_valid("no")), ); router.mount( "/redirect", Box::new(|_| Response::permanent_redirect("gemini://localhost/test")), ); #[cfg(feature = "auto-deduce-mime")] router.mount("/auto-file", { Box::new(|_| Response::binary_success_auto(include_bytes!("../LICENSE"))) }); router.mount("/file", { Box::new(|_| { Response::binary_success(include_bytes!("../LICENSE"), "text/plain") .clone() }) }); router.mount( "/secret", Box::new(|context| { if let Some(certificate) = context.certificate { Response::success(format!("Your public key: {}.", { (|| -> Result { Ok(format!( "{:?}", certificate.public_key()?.rsa()?.public_key_to_pem()? )) })() .unwrap_or_else(|_| "Unknown".to_string()) },)) } else { Response::client_certificate_required( "This is a secret route! Identify yourself!", ) } }), ); router.run().await }