faraday 0.15.0 → 2.2.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +570 -0
- data/LICENSE.md +1 -1
- data/README.md +25 -351
- data/Rakefile +7 -0
- data/examples/client_spec.rb +97 -0
- data/examples/client_test.rb +118 -0
- data/lib/faraday/adapter/test.rb +127 -72
- data/lib/faraday/adapter.rb +69 -22
- data/lib/faraday/adapter_registry.rb +30 -0
- data/lib/faraday/connection.rb +309 -232
- data/lib/faraday/encoders/flat_params_encoder.rb +105 -0
- data/lib/faraday/encoders/nested_params_encoder.rb +176 -0
- data/lib/faraday/error.rb +119 -38
- data/lib/faraday/logging/formatter.rb +106 -0
- data/lib/faraday/methods.rb +6 -0
- data/lib/faraday/middleware.rb +18 -25
- data/lib/faraday/middleware_registry.rb +83 -0
- data/lib/faraday/options/connection_options.rb +22 -0
- data/lib/faraday/options/env.rb +181 -0
- data/lib/faraday/options/proxy_options.rb +32 -0
- data/lib/faraday/options/request_options.rb +22 -0
- data/lib/faraday/options/ssl_options.rb +59 -0
- data/lib/faraday/options.rb +41 -195
- data/lib/faraday/parameters.rb +4 -196
- data/lib/faraday/rack_builder.rb +91 -76
- data/lib/faraday/request/authorization.rb +37 -29
- data/lib/faraday/request/instrumentation.rb +47 -27
- data/lib/faraday/request/json.rb +55 -0
- data/lib/faraday/request/url_encoded.rb +45 -23
- data/lib/faraday/request.rb +74 -32
- data/lib/faraday/response/json.rb +54 -0
- data/lib/faraday/response/logger.rb +22 -69
- data/lib/faraday/response/raise_error.rb +57 -14
- data/lib/faraday/response.rb +26 -33
- data/lib/faraday/utils/headers.rb +139 -0
- data/lib/faraday/utils/params_hash.rb +61 -0
- data/lib/faraday/utils.rb +47 -251
- data/lib/faraday/version.rb +5 -0
- data/lib/faraday.rb +108 -199
- data/spec/external_adapters/faraday_specs_setup.rb +14 -0
- data/spec/faraday/adapter/test_spec.rb +377 -0
- data/spec/faraday/adapter_registry_spec.rb +28 -0
- data/spec/faraday/adapter_spec.rb +55 -0
- data/spec/faraday/connection_spec.rb +787 -0
- data/spec/faraday/error_spec.rb +60 -0
- data/spec/faraday/middleware_registry_spec.rb +31 -0
- data/spec/faraday/middleware_spec.rb +52 -0
- data/spec/faraday/options/env_spec.rb +70 -0
- data/spec/faraday/options/options_spec.rb +297 -0
- data/spec/faraday/options/proxy_options_spec.rb +44 -0
- data/spec/faraday/options/request_options_spec.rb +19 -0
- data/spec/faraday/params_encoders/flat_spec.rb +42 -0
- data/spec/faraday/params_encoders/nested_spec.rb +142 -0
- data/spec/faraday/rack_builder_spec.rb +317 -0
- data/spec/faraday/request/authorization_spec.rb +83 -0
- data/spec/faraday/request/instrumentation_spec.rb +74 -0
- data/spec/faraday/request/json_spec.rb +111 -0
- data/spec/faraday/request/url_encoded_spec.rb +82 -0
- data/spec/faraday/request_spec.rb +109 -0
- data/spec/faraday/response/json_spec.rb +117 -0
- data/spec/faraday/response/logger_spec.rb +220 -0
- data/spec/faraday/response/raise_error_spec.rb +172 -0
- data/spec/faraday/response_spec.rb +75 -0
- data/spec/faraday/utils/headers_spec.rb +82 -0
- data/spec/faraday/utils_spec.rb +117 -0
- data/spec/faraday_spec.rb +37 -0
- data/spec/spec_helper.rb +132 -0
- data/spec/support/disabling_stub.rb +14 -0
- data/spec/support/fake_safe_buffer.rb +15 -0
- data/spec/support/helper_methods.rb +96 -0
- data/spec/support/shared_examples/adapter.rb +104 -0
- data/spec/support/shared_examples/params_encoder.rb +18 -0
- data/spec/support/shared_examples/request_method.rb +249 -0
- data/spec/support/streaming_response_checker.rb +35 -0
- metadata +86 -34
- data/lib/faraday/adapter/em_http.rb +0 -243
- data/lib/faraday/adapter/em_http_ssl_patch.rb +0 -56
- data/lib/faraday/adapter/em_synchrony/parallel_manager.rb +0 -66
- data/lib/faraday/adapter/em_synchrony.rb +0 -106
- data/lib/faraday/adapter/excon.rb +0 -79
- data/lib/faraday/adapter/httpclient.rb +0 -128
- data/lib/faraday/adapter/net_http.rb +0 -137
- data/lib/faraday/adapter/net_http_persistent.rb +0 -63
- data/lib/faraday/adapter/patron.rb +0 -100
- data/lib/faraday/adapter/rack.rb +0 -58
- data/lib/faraday/adapter/typhoeus.rb +0 -12
- data/lib/faraday/autoload.rb +0 -84
- data/lib/faraday/request/basic_authentication.rb +0 -13
- data/lib/faraday/request/multipart.rb +0 -68
- data/lib/faraday/request/retry.rb +0 -211
- data/lib/faraday/request/token_authentication.rb +0 -15
- data/lib/faraday/upload_io.rb +0 -67
@@ -1,243 +0,0 @@
|
|
1
|
-
module Faraday
|
2
|
-
class Adapter
|
3
|
-
# EventMachine adapter is useful for either asynchronous requests
|
4
|
-
# when in EM reactor loop or for making parallel requests in
|
5
|
-
# synchronous code.
|
6
|
-
class EMHttp < Faraday::Adapter
|
7
|
-
module Options
|
8
|
-
def connection_config(env)
|
9
|
-
options = {}
|
10
|
-
configure_proxy(options, env)
|
11
|
-
configure_timeout(options, env)
|
12
|
-
configure_socket(options, env)
|
13
|
-
configure_ssl(options, env)
|
14
|
-
options
|
15
|
-
end
|
16
|
-
|
17
|
-
def request_config(env)
|
18
|
-
options = {
|
19
|
-
:body => read_body(env),
|
20
|
-
:head => env[:request_headers],
|
21
|
-
# :keepalive => true,
|
22
|
-
# :file => 'path/to/file', # stream data off disk
|
23
|
-
}
|
24
|
-
configure_compression(options, env)
|
25
|
-
options
|
26
|
-
end
|
27
|
-
|
28
|
-
def read_body(env)
|
29
|
-
body = env[:body]
|
30
|
-
body.respond_to?(:read) ? body.read : body
|
31
|
-
end
|
32
|
-
|
33
|
-
def configure_proxy(options, env)
|
34
|
-
if proxy = request_options(env)[:proxy]
|
35
|
-
options[:proxy] = {
|
36
|
-
:host => proxy[:uri].host,
|
37
|
-
:port => proxy[:uri].port,
|
38
|
-
:authorization => [proxy[:user], proxy[:password]]
|
39
|
-
}
|
40
|
-
end
|
41
|
-
end
|
42
|
-
|
43
|
-
def configure_socket(options, env)
|
44
|
-
if bind = request_options(env)[:bind]
|
45
|
-
options[:bind] = {
|
46
|
-
:host => bind[:host],
|
47
|
-
:port => bind[:port]
|
48
|
-
}
|
49
|
-
end
|
50
|
-
end
|
51
|
-
|
52
|
-
def configure_ssl(options, env)
|
53
|
-
if env[:url].scheme == 'https' && env[:ssl]
|
54
|
-
options[:ssl] = {
|
55
|
-
:cert_chain_file => env[:ssl][:ca_file],
|
56
|
-
:verify_peer => env[:ssl].fetch(:verify, true)
|
57
|
-
}
|
58
|
-
end
|
59
|
-
end
|
60
|
-
|
61
|
-
def configure_timeout(options, env)
|
62
|
-
timeout, open_timeout = request_options(env).values_at(:timeout, :open_timeout)
|
63
|
-
options[:connect_timeout] = options[:inactivity_timeout] = timeout
|
64
|
-
options[:connect_timeout] = open_timeout if open_timeout
|
65
|
-
end
|
66
|
-
|
67
|
-
def configure_compression(options, env)
|
68
|
-
if env[:method] == :get and not options[:head].key? 'accept-encoding'
|
69
|
-
options[:head]['accept-encoding'] = 'gzip, compressed'
|
70
|
-
end
|
71
|
-
end
|
72
|
-
|
73
|
-
def request_options(env)
|
74
|
-
env[:request]
|
75
|
-
end
|
76
|
-
end
|
77
|
-
|
78
|
-
include Options
|
79
|
-
|
80
|
-
dependency 'em-http'
|
81
|
-
|
82
|
-
self.supports_parallel = true
|
83
|
-
|
84
|
-
def self.setup_parallel_manager(options = nil)
|
85
|
-
Manager.new
|
86
|
-
end
|
87
|
-
|
88
|
-
def call(env)
|
89
|
-
super
|
90
|
-
perform_request env
|
91
|
-
@app.call env
|
92
|
-
end
|
93
|
-
|
94
|
-
def perform_request(env)
|
95
|
-
if parallel?(env)
|
96
|
-
manager = env[:parallel_manager]
|
97
|
-
manager.add {
|
98
|
-
perform_single_request(env).
|
99
|
-
callback { env[:response].finish(env) }
|
100
|
-
}
|
101
|
-
else
|
102
|
-
unless EventMachine.reactor_running?
|
103
|
-
error = nil
|
104
|
-
# start EM, block until request is completed
|
105
|
-
EventMachine.run do
|
106
|
-
perform_single_request(env).
|
107
|
-
callback { EventMachine.stop }.
|
108
|
-
errback { |client|
|
109
|
-
error = error_message(client)
|
110
|
-
EventMachine.stop
|
111
|
-
}
|
112
|
-
end
|
113
|
-
raise_error(error) if error
|
114
|
-
else
|
115
|
-
# EM is running: instruct upstream that this is an async request
|
116
|
-
env[:parallel_manager] = true
|
117
|
-
perform_single_request(env).
|
118
|
-
callback { env[:response].finish(env) }.
|
119
|
-
errback {
|
120
|
-
# TODO: no way to communicate the error in async mode
|
121
|
-
raise NotImplementedError
|
122
|
-
}
|
123
|
-
end
|
124
|
-
end
|
125
|
-
rescue EventMachine::Connectify::CONNECTError => err
|
126
|
-
if err.message.include?("Proxy Authentication Required")
|
127
|
-
raise Error::ConnectionFailed, %{407 "Proxy Authentication Required "}
|
128
|
-
else
|
129
|
-
raise Error::ConnectionFailed, err
|
130
|
-
end
|
131
|
-
rescue => err
|
132
|
-
if defined?(OpenSSL) && OpenSSL::SSL::SSLError === err
|
133
|
-
raise Faraday::SSLError, err
|
134
|
-
else
|
135
|
-
raise
|
136
|
-
end
|
137
|
-
end
|
138
|
-
|
139
|
-
# TODO: reuse the connection to support pipelining
|
140
|
-
def perform_single_request(env)
|
141
|
-
req = create_request(env)
|
142
|
-
req.setup_request(env[:method], request_config(env)).callback { |client|
|
143
|
-
status = client.response_header.status
|
144
|
-
reason = client.response_header.http_reason
|
145
|
-
save_response(env, status, client.response, nil, reason) do |resp_headers|
|
146
|
-
client.response_header.each do |name, value|
|
147
|
-
resp_headers[name.to_sym] = value
|
148
|
-
end
|
149
|
-
end
|
150
|
-
}
|
151
|
-
end
|
152
|
-
|
153
|
-
def create_request(env)
|
154
|
-
EventMachine::HttpRequest.new(env[:url], connection_config(env).merge(@connection_options))
|
155
|
-
end
|
156
|
-
|
157
|
-
def error_message(client)
|
158
|
-
client.error or "request failed"
|
159
|
-
end
|
160
|
-
|
161
|
-
def raise_error(msg)
|
162
|
-
errklass = Faraday::Error::ClientError
|
163
|
-
if msg == Errno::ETIMEDOUT
|
164
|
-
errklass = Faraday::Error::TimeoutError
|
165
|
-
msg = "request timed out"
|
166
|
-
elsif msg == Errno::ECONNREFUSED
|
167
|
-
errklass = Faraday::Error::ConnectionFailed
|
168
|
-
msg = "connection refused"
|
169
|
-
elsif msg == "connection closed by server"
|
170
|
-
errklass = Faraday::Error::ConnectionFailed
|
171
|
-
end
|
172
|
-
raise errklass, msg
|
173
|
-
end
|
174
|
-
|
175
|
-
def parallel?(env)
|
176
|
-
!!env[:parallel_manager]
|
177
|
-
end
|
178
|
-
|
179
|
-
# The parallel manager is designed to start an EventMachine loop
|
180
|
-
# and block until all registered requests have been completed.
|
181
|
-
class Manager
|
182
|
-
def initialize
|
183
|
-
reset
|
184
|
-
end
|
185
|
-
|
186
|
-
def reset
|
187
|
-
@registered_procs = []
|
188
|
-
@num_registered = 0
|
189
|
-
@num_succeeded = 0
|
190
|
-
@errors = []
|
191
|
-
@running = false
|
192
|
-
end
|
193
|
-
|
194
|
-
def running?() @running end
|
195
|
-
|
196
|
-
def add
|
197
|
-
if running?
|
198
|
-
perform_request { yield }
|
199
|
-
else
|
200
|
-
@registered_procs << Proc.new
|
201
|
-
end
|
202
|
-
@num_registered += 1
|
203
|
-
end
|
204
|
-
|
205
|
-
def run
|
206
|
-
if @num_registered > 0
|
207
|
-
@running = true
|
208
|
-
EventMachine.run do
|
209
|
-
@registered_procs.each do |proc|
|
210
|
-
perform_request(&proc)
|
211
|
-
end
|
212
|
-
end
|
213
|
-
if @errors.size > 0
|
214
|
-
raise Faraday::Error::ClientError, @errors.first || "connection failed"
|
215
|
-
end
|
216
|
-
end
|
217
|
-
ensure
|
218
|
-
reset
|
219
|
-
end
|
220
|
-
|
221
|
-
def perform_request
|
222
|
-
client = yield
|
223
|
-
client.callback { @num_succeeded += 1; check_finished }
|
224
|
-
client.errback { @errors << client.error; check_finished }
|
225
|
-
end
|
226
|
-
|
227
|
-
def check_finished
|
228
|
-
if @num_succeeded + @errors.size == @num_registered
|
229
|
-
EventMachine.stop
|
230
|
-
end
|
231
|
-
end
|
232
|
-
end
|
233
|
-
end
|
234
|
-
end
|
235
|
-
end
|
236
|
-
|
237
|
-
begin
|
238
|
-
require 'openssl'
|
239
|
-
rescue LoadError
|
240
|
-
warn "Warning: no such file to load -- openssl. Make sure it is installed if you want HTTPS support"
|
241
|
-
else
|
242
|
-
require 'faraday/adapter/em_http_ssl_patch'
|
243
|
-
end if Faraday::Adapter::EMHttp.loaded?
|
@@ -1,56 +0,0 @@
|
|
1
|
-
require 'openssl'
|
2
|
-
require 'em-http'
|
3
|
-
|
4
|
-
module EmHttpSslPatch
|
5
|
-
def ssl_verify_peer(cert_string)
|
6
|
-
cert = nil
|
7
|
-
begin
|
8
|
-
cert = OpenSSL::X509::Certificate.new(cert_string)
|
9
|
-
rescue OpenSSL::X509::CertificateError
|
10
|
-
return false
|
11
|
-
end
|
12
|
-
|
13
|
-
@last_seen_cert = cert
|
14
|
-
|
15
|
-
if certificate_store.verify(@last_seen_cert)
|
16
|
-
begin
|
17
|
-
certificate_store.add_cert(@last_seen_cert)
|
18
|
-
rescue OpenSSL::X509::StoreError => e
|
19
|
-
raise e unless e.message == 'cert already in hash table'
|
20
|
-
end
|
21
|
-
true
|
22
|
-
else
|
23
|
-
raise OpenSSL::SSL::SSLError.new(%(unable to verify the server certificate for "#{host}"))
|
24
|
-
end
|
25
|
-
end
|
26
|
-
|
27
|
-
def ssl_handshake_completed
|
28
|
-
return true unless verify_peer?
|
29
|
-
|
30
|
-
unless OpenSSL::SSL.verify_certificate_identity(@last_seen_cert, host)
|
31
|
-
raise OpenSSL::SSL::SSLError.new(%(host "#{host}" does not match the server certificate))
|
32
|
-
else
|
33
|
-
true
|
34
|
-
end
|
35
|
-
end
|
36
|
-
|
37
|
-
def verify_peer?
|
38
|
-
parent.connopts.tls[:verify_peer]
|
39
|
-
end
|
40
|
-
|
41
|
-
def host
|
42
|
-
parent.uri.host
|
43
|
-
end
|
44
|
-
|
45
|
-
def certificate_store
|
46
|
-
@certificate_store ||= begin
|
47
|
-
store = OpenSSL::X509::Store.new
|
48
|
-
store.set_default_paths
|
49
|
-
ca_file = parent.connopts.tls[:cert_chain_file]
|
50
|
-
store.add_file(ca_file) if ca_file
|
51
|
-
store
|
52
|
-
end
|
53
|
-
end
|
54
|
-
end
|
55
|
-
|
56
|
-
EventMachine::HttpStubConnection.send(:include, EmHttpSslPatch)
|
@@ -1,66 +0,0 @@
|
|
1
|
-
module Faraday
|
2
|
-
class Adapter
|
3
|
-
class EMSynchrony < Faraday::Adapter
|
4
|
-
class ParallelManager
|
5
|
-
|
6
|
-
# Add requests to queue. The `request` argument should be a
|
7
|
-
# `EM::HttpRequest` object.
|
8
|
-
def add(request, method, *args, &block)
|
9
|
-
queue << {
|
10
|
-
:request => request,
|
11
|
-
:method => method,
|
12
|
-
:args => args,
|
13
|
-
:block => block
|
14
|
-
}
|
15
|
-
end
|
16
|
-
|
17
|
-
# Run all requests on queue with `EM::Synchrony::Multi`, wrapping
|
18
|
-
# it in a reactor and fiber if needed.
|
19
|
-
def run
|
20
|
-
result = nil
|
21
|
-
if !EM.reactor_running?
|
22
|
-
EM.run {
|
23
|
-
Fiber.new do
|
24
|
-
result = perform
|
25
|
-
EM.stop
|
26
|
-
end.resume
|
27
|
-
}
|
28
|
-
else
|
29
|
-
result = perform
|
30
|
-
end
|
31
|
-
result
|
32
|
-
end
|
33
|
-
|
34
|
-
|
35
|
-
private
|
36
|
-
|
37
|
-
# The request queue.
|
38
|
-
def queue
|
39
|
-
@queue ||= []
|
40
|
-
end
|
41
|
-
|
42
|
-
# Main `EM::Synchrony::Multi` performer.
|
43
|
-
def perform
|
44
|
-
multi = ::EM::Synchrony::Multi.new
|
45
|
-
|
46
|
-
queue.each do |item|
|
47
|
-
method = "a#{item[:method]}".to_sym
|
48
|
-
|
49
|
-
req = item[:request].send(method, *item[:args])
|
50
|
-
req.callback(&item[:block])
|
51
|
-
|
52
|
-
req_name = "req_#{multi.requests.size}".to_sym
|
53
|
-
multi.add(req_name, req)
|
54
|
-
end
|
55
|
-
|
56
|
-
# Clear the queue, so parallel manager objects can be reused.
|
57
|
-
@queue = []
|
58
|
-
|
59
|
-
# Block fiber until all requests have returned.
|
60
|
-
multi.perform
|
61
|
-
end
|
62
|
-
|
63
|
-
end # ParallelManager
|
64
|
-
end # EMSynchrony
|
65
|
-
end # Adapter
|
66
|
-
end # Faraday
|
@@ -1,106 +0,0 @@
|
|
1
|
-
require 'uri'
|
2
|
-
|
3
|
-
module Faraday
|
4
|
-
class Adapter
|
5
|
-
class EMSynchrony < Faraday::Adapter
|
6
|
-
include EMHttp::Options
|
7
|
-
|
8
|
-
dependency do
|
9
|
-
require 'em-synchrony/em-http'
|
10
|
-
require 'em-synchrony/em-multi'
|
11
|
-
require 'fiber'
|
12
|
-
end
|
13
|
-
|
14
|
-
self.supports_parallel = true
|
15
|
-
|
16
|
-
def self.setup_parallel_manager(options = {})
|
17
|
-
ParallelManager.new
|
18
|
-
end
|
19
|
-
|
20
|
-
def call(env)
|
21
|
-
super
|
22
|
-
request = create_request(env)
|
23
|
-
|
24
|
-
http_method = env[:method].to_s.downcase.to_sym
|
25
|
-
|
26
|
-
# Queue requests for parallel execution.
|
27
|
-
if env[:parallel_manager]
|
28
|
-
env[:parallel_manager].add(request, http_method, request_config(env)) do |resp|
|
29
|
-
save_response(env, resp.response_header.status, resp.response) do |resp_headers|
|
30
|
-
resp.response_header.each do |name, value|
|
31
|
-
resp_headers[name.to_sym] = value
|
32
|
-
end
|
33
|
-
end
|
34
|
-
|
35
|
-
# Finalize the response object with values from `env`.
|
36
|
-
env[:response].finish(env)
|
37
|
-
end
|
38
|
-
|
39
|
-
# Execute single request.
|
40
|
-
else
|
41
|
-
client = nil
|
42
|
-
block = lambda { request.send(http_method, request_config(env)) }
|
43
|
-
|
44
|
-
if !EM.reactor_running?
|
45
|
-
EM.run do
|
46
|
-
Fiber.new {
|
47
|
-
client = block.call
|
48
|
-
EM.stop
|
49
|
-
}.resume
|
50
|
-
end
|
51
|
-
else
|
52
|
-
client = block.call
|
53
|
-
end
|
54
|
-
|
55
|
-
raise client.error if client.error
|
56
|
-
|
57
|
-
status = client.response_header.status
|
58
|
-
reason = client.response_header.http_reason
|
59
|
-
save_response(env, status, client.response, nil, reason) do |resp_headers|
|
60
|
-
client.response_header.each do |name, value|
|
61
|
-
resp_headers[name.to_sym] = value
|
62
|
-
end
|
63
|
-
end
|
64
|
-
end
|
65
|
-
|
66
|
-
@app.call env
|
67
|
-
rescue Errno::ECONNREFUSED
|
68
|
-
raise Error::ConnectionFailed, $!
|
69
|
-
rescue EventMachine::Connectify::CONNECTError => err
|
70
|
-
if err.message.include?("Proxy Authentication Required")
|
71
|
-
raise Error::ConnectionFailed, %{407 "Proxy Authentication Required "}
|
72
|
-
else
|
73
|
-
raise Error::ConnectionFailed, err
|
74
|
-
end
|
75
|
-
rescue Errno::ETIMEDOUT => err
|
76
|
-
raise Error::TimeoutError, err
|
77
|
-
rescue RuntimeError => err
|
78
|
-
if err.message == "connection closed by server"
|
79
|
-
raise Error::ConnectionFailed, err
|
80
|
-
else
|
81
|
-
raise
|
82
|
-
end
|
83
|
-
rescue => err
|
84
|
-
if defined?(OpenSSL) && OpenSSL::SSL::SSLError === err
|
85
|
-
raise Faraday::SSLError, err
|
86
|
-
else
|
87
|
-
raise
|
88
|
-
end
|
89
|
-
end
|
90
|
-
|
91
|
-
def create_request(env)
|
92
|
-
EventMachine::HttpRequest.new(Utils::URI(env[:url].to_s), connection_config(env).merge(@connection_options))
|
93
|
-
end
|
94
|
-
end
|
95
|
-
end
|
96
|
-
end
|
97
|
-
|
98
|
-
require 'faraday/adapter/em_synchrony/parallel_manager'
|
99
|
-
|
100
|
-
begin
|
101
|
-
require 'openssl'
|
102
|
-
rescue LoadError
|
103
|
-
warn "Warning: no such file to load -- openssl. Make sure it is installed if you want HTTPS support"
|
104
|
-
else
|
105
|
-
require 'faraday/adapter/em_http_ssl_patch'
|
106
|
-
end if Faraday::Adapter::EMSynchrony.loaded?
|
@@ -1,79 +0,0 @@
|
|
1
|
-
module Faraday
|
2
|
-
class Adapter
|
3
|
-
class Excon < Faraday::Adapter
|
4
|
-
dependency 'excon'
|
5
|
-
|
6
|
-
def call(env)
|
7
|
-
super
|
8
|
-
|
9
|
-
opts = {}
|
10
|
-
if env[:url].scheme == 'https' && ssl = env[:ssl]
|
11
|
-
opts[:ssl_verify_peer] = !!ssl.fetch(:verify, true)
|
12
|
-
opts[:ssl_ca_path] = ssl[:ca_path] if ssl[:ca_path]
|
13
|
-
opts[:ssl_ca_file] = ssl[:ca_file] if ssl[:ca_file]
|
14
|
-
opts[:client_cert] = ssl[:client_cert] if ssl[:client_cert]
|
15
|
-
opts[:client_key] = ssl[:client_key] if ssl[:client_key]
|
16
|
-
opts[:certificate] = ssl[:certificate] if ssl[:certificate]
|
17
|
-
opts[:private_key] = ssl[:private_key] if ssl[:private_key]
|
18
|
-
|
19
|
-
# https://github.com/geemus/excon/issues/106
|
20
|
-
# https://github.com/jruby/jruby-ossl/issues/19
|
21
|
-
opts[:nonblock] = false
|
22
|
-
end
|
23
|
-
|
24
|
-
if ( req = env[:request] )
|
25
|
-
if req[:timeout]
|
26
|
-
opts[:read_timeout] = req[:timeout]
|
27
|
-
opts[:connect_timeout] = req[:timeout]
|
28
|
-
opts[:write_timeout] = req[:timeout]
|
29
|
-
end
|
30
|
-
|
31
|
-
if req[:open_timeout]
|
32
|
-
opts[:connect_timeout] = req[:open_timeout]
|
33
|
-
end
|
34
|
-
|
35
|
-
if req[:proxy]
|
36
|
-
opts[:proxy] = {
|
37
|
-
:host => req[:proxy][:uri].host,
|
38
|
-
:hostname => req[:proxy][:uri].hostname,
|
39
|
-
:port => req[:proxy][:uri].port,
|
40
|
-
:scheme => req[:proxy][:uri].scheme,
|
41
|
-
:user => req[:proxy][:user],
|
42
|
-
:password => req[:proxy][:password]
|
43
|
-
}
|
44
|
-
end
|
45
|
-
end
|
46
|
-
|
47
|
-
conn = create_connection(env, opts)
|
48
|
-
|
49
|
-
resp = conn.request \
|
50
|
-
:method => env[:method].to_s.upcase,
|
51
|
-
:headers => env[:request_headers],
|
52
|
-
:body => read_body(env)
|
53
|
-
|
54
|
-
save_response(env, resp.status.to_i, resp.body, resp.headers, resp.reason_phrase)
|
55
|
-
|
56
|
-
@app.call env
|
57
|
-
rescue ::Excon::Errors::SocketError => err
|
58
|
-
if err.message =~ /\btimeout\b/
|
59
|
-
raise Error::TimeoutError, err
|
60
|
-
elsif err.message =~ /\bcertificate\b/
|
61
|
-
raise Faraday::SSLError, err
|
62
|
-
else
|
63
|
-
raise Error::ConnectionFailed, err
|
64
|
-
end
|
65
|
-
rescue ::Excon::Errors::Timeout => err
|
66
|
-
raise Error::TimeoutError, err
|
67
|
-
end
|
68
|
-
|
69
|
-
def create_connection(env, opts)
|
70
|
-
::Excon.new(env[:url].to_s, opts.merge(@connection_options))
|
71
|
-
end
|
72
|
-
|
73
|
-
# TODO: support streaming requests
|
74
|
-
def read_body(env)
|
75
|
-
env[:body].respond_to?(:read) ? env[:body].read : env[:body]
|
76
|
-
end
|
77
|
-
end
|
78
|
-
end
|
79
|
-
end
|
@@ -1,128 +0,0 @@
|
|
1
|
-
module Faraday
|
2
|
-
class Adapter
|
3
|
-
class HTTPClient < Faraday::Adapter
|
4
|
-
dependency 'httpclient'
|
5
|
-
|
6
|
-
def client
|
7
|
-
@client ||= ::HTTPClient.new
|
8
|
-
end
|
9
|
-
|
10
|
-
def call(env)
|
11
|
-
super
|
12
|
-
|
13
|
-
# enable compression
|
14
|
-
client.transparent_gzip_decompression = true
|
15
|
-
|
16
|
-
if req = env[:request]
|
17
|
-
if proxy = req[:proxy]
|
18
|
-
configure_proxy proxy
|
19
|
-
end
|
20
|
-
|
21
|
-
if bind = req[:bind]
|
22
|
-
configure_socket bind
|
23
|
-
end
|
24
|
-
|
25
|
-
configure_timeouts req
|
26
|
-
end
|
27
|
-
|
28
|
-
if env[:url].scheme == 'https' && ssl = env[:ssl]
|
29
|
-
configure_ssl ssl
|
30
|
-
end
|
31
|
-
|
32
|
-
configure_client
|
33
|
-
|
34
|
-
# TODO Don't stream yet.
|
35
|
-
# https://github.com/nahi/httpclient/pull/90
|
36
|
-
env[:body] = env[:body].read if env[:body].respond_to? :read
|
37
|
-
|
38
|
-
resp = client.request env[:method], env[:url],
|
39
|
-
:body => env[:body],
|
40
|
-
:header => env[:request_headers]
|
41
|
-
|
42
|
-
save_response env, resp.status, resp.body, resp.headers, resp.reason
|
43
|
-
|
44
|
-
@app.call env
|
45
|
-
rescue ::HTTPClient::TimeoutError, Errno::ETIMEDOUT
|
46
|
-
raise Faraday::Error::TimeoutError, $!
|
47
|
-
rescue ::HTTPClient::BadResponseError => err
|
48
|
-
if err.message.include?('status 407')
|
49
|
-
raise Faraday::Error::ConnectionFailed, %{407 "Proxy Authentication Required "}
|
50
|
-
else
|
51
|
-
raise Faraday::Error::ClientError, $!
|
52
|
-
end
|
53
|
-
rescue Errno::ECONNREFUSED, IOError, SocketError
|
54
|
-
raise Faraday::Error::ConnectionFailed, $!
|
55
|
-
rescue => err
|
56
|
-
if defined?(OpenSSL) && OpenSSL::SSL::SSLError === err
|
57
|
-
raise Faraday::SSLError, err
|
58
|
-
else
|
59
|
-
raise
|
60
|
-
end
|
61
|
-
end
|
62
|
-
|
63
|
-
def configure_socket(bind)
|
64
|
-
client.socket_local.host = bind[:host]
|
65
|
-
client.socket_local.port = bind[:port]
|
66
|
-
end
|
67
|
-
|
68
|
-
def configure_proxy(proxy)
|
69
|
-
client.proxy = proxy[:uri]
|
70
|
-
if proxy[:user] && proxy[:password]
|
71
|
-
client.set_proxy_auth proxy[:user], proxy[:password]
|
72
|
-
end
|
73
|
-
end
|
74
|
-
|
75
|
-
def configure_ssl(ssl)
|
76
|
-
ssl_config = client.ssl_config
|
77
|
-
ssl_config.verify_mode = ssl_verify_mode(ssl)
|
78
|
-
ssl_config.cert_store = ssl_cert_store(ssl)
|
79
|
-
|
80
|
-
ssl_config.add_trust_ca ssl[:ca_file] if ssl[:ca_file]
|
81
|
-
ssl_config.add_trust_ca ssl[:ca_path] if ssl[:ca_path]
|
82
|
-
ssl_config.client_cert = ssl[:client_cert] if ssl[:client_cert]
|
83
|
-
ssl_config.client_key = ssl[:client_key] if ssl[:client_key]
|
84
|
-
ssl_config.verify_depth = ssl[:verify_depth] if ssl[:verify_depth]
|
85
|
-
end
|
86
|
-
|
87
|
-
def configure_timeouts(req)
|
88
|
-
if req[:timeout]
|
89
|
-
client.connect_timeout = req[:timeout]
|
90
|
-
client.receive_timeout = req[:timeout]
|
91
|
-
client.send_timeout = req[:timeout]
|
92
|
-
end
|
93
|
-
|
94
|
-
if req[:open_timeout]
|
95
|
-
client.connect_timeout = req[:open_timeout]
|
96
|
-
client.send_timeout = req[:open_timeout]
|
97
|
-
end
|
98
|
-
end
|
99
|
-
|
100
|
-
def configure_client
|
101
|
-
@config_block.call(client) if @config_block
|
102
|
-
end
|
103
|
-
|
104
|
-
def ssl_cert_store(ssl)
|
105
|
-
return ssl[:cert_store] if ssl[:cert_store]
|
106
|
-
# Memoize the cert store so that the same one is passed to
|
107
|
-
# HTTPClient each time, to avoid resyncing SSL sesions when
|
108
|
-
# it's changed
|
109
|
-
@cert_store ||= begin
|
110
|
-
# Use the default cert store by default, i.e. system ca certs
|
111
|
-
cert_store = OpenSSL::X509::Store.new
|
112
|
-
cert_store.set_default_paths
|
113
|
-
cert_store
|
114
|
-
end
|
115
|
-
end
|
116
|
-
|
117
|
-
def ssl_verify_mode(ssl)
|
118
|
-
ssl[:verify_mode] || begin
|
119
|
-
if ssl.fetch(:verify, true)
|
120
|
-
OpenSSL::SSL::VERIFY_PEER | OpenSSL::SSL::VERIFY_FAIL_IF_NO_PEER_CERT
|
121
|
-
else
|
122
|
-
OpenSSL::SSL::VERIFY_NONE
|
123
|
-
end
|
124
|
-
end
|
125
|
-
end
|
126
|
-
end
|
127
|
-
end
|
128
|
-
end
|