faraday 0.15.4 → 0.16.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/LICENSE.md +1 -1
- data/README.md +18 -344
- data/lib/faraday.rb +93 -175
- data/lib/faraday/adapter.rb +36 -22
- data/lib/faraday/adapter/em_http.rb +142 -99
- data/lib/faraday/adapter/em_http_ssl_patch.rb +23 -17
- data/lib/faraday/adapter/em_synchrony.rb +104 -60
- data/lib/faraday/adapter/em_synchrony/parallel_manager.rb +18 -15
- data/lib/faraday/adapter/excon.rb +100 -55
- data/lib/faraday/adapter/httpclient.rb +61 -39
- data/lib/faraday/adapter/net_http.rb +104 -51
- data/lib/faraday/adapter/net_http_persistent.rb +48 -27
- data/lib/faraday/adapter/patron.rb +54 -35
- data/lib/faraday/adapter/rack.rb +28 -12
- data/lib/faraday/adapter/test.rb +86 -53
- data/lib/faraday/adapter/typhoeus.rb +4 -1
- data/lib/faraday/adapter_registry.rb +28 -0
- data/lib/faraday/autoload.rb +47 -36
- data/lib/faraday/connection.rb +321 -179
- data/lib/faraday/dependency_loader.rb +37 -0
- data/lib/faraday/encoders/flat_params_encoder.rb +94 -0
- data/lib/faraday/encoders/nested_params_encoder.rb +171 -0
- data/lib/faraday/error.rb +67 -33
- data/lib/faraday/file_part.rb +128 -0
- data/lib/faraday/logging/formatter.rb +92 -0
- data/lib/faraday/middleware.rb +4 -28
- data/lib/faraday/middleware_registry.rb +129 -0
- data/lib/faraday/options.rb +35 -186
- data/lib/faraday/options/connection_options.rb +22 -0
- data/lib/faraday/options/env.rb +181 -0
- data/lib/faraday/options/proxy_options.rb +28 -0
- data/lib/faraday/options/request_options.rb +21 -0
- data/lib/faraday/options/ssl_options.rb +59 -0
- data/lib/faraday/param_part.rb +53 -0
- data/lib/faraday/parameters.rb +4 -197
- data/lib/faraday/rack_builder.rb +67 -56
- data/lib/faraday/request.rb +68 -36
- data/lib/faraday/request/authorization.rb +42 -30
- data/lib/faraday/request/basic_authentication.rb +14 -7
- data/lib/faraday/request/instrumentation.rb +45 -27
- data/lib/faraday/request/multipart.rb +79 -48
- data/lib/faraday/request/retry.rb +198 -169
- data/lib/faraday/request/token_authentication.rb +15 -10
- data/lib/faraday/request/url_encoded.rb +41 -23
- data/lib/faraday/response.rb +23 -16
- data/lib/faraday/response/logger.rb +22 -69
- data/lib/faraday/response/raise_error.rb +36 -14
- data/lib/faraday/utils.rb +28 -245
- data/lib/faraday/utils/headers.rb +139 -0
- data/lib/faraday/utils/params_hash.rb +61 -0
- data/spec/external_adapters/faraday_specs_setup.rb +14 -0
- metadata +21 -5
- data/lib/faraday/upload_io.rb +0 -67
@@ -1,8 +1,12 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
1
3
|
module Faraday
|
2
4
|
class Adapter
|
5
|
+
# HTTPClient adapter.
|
3
6
|
class HTTPClient < Faraday::Adapter
|
4
7
|
dependency 'httpclient'
|
5
8
|
|
9
|
+
# @return [HTTPClient]
|
6
10
|
def client
|
7
11
|
@client ||= ::HTTPClient.new
|
8
12
|
end
|
@@ -13,65 +17,76 @@ module Faraday
|
|
13
17
|
# enable compression
|
14
18
|
client.transparent_gzip_decompression = true
|
15
19
|
|
16
|
-
if req = env[:request]
|
17
|
-
if proxy = req[:proxy]
|
20
|
+
if (req = env[:request])
|
21
|
+
if (proxy = req[:proxy])
|
18
22
|
configure_proxy proxy
|
19
23
|
end
|
20
24
|
|
21
|
-
if bind = req[:bind]
|
25
|
+
if (bind = req[:bind])
|
22
26
|
configure_socket bind
|
23
27
|
end
|
24
28
|
|
25
29
|
configure_timeouts req
|
26
30
|
end
|
27
31
|
|
28
|
-
if env[:url].scheme == 'https' && ssl = env[:ssl]
|
32
|
+
if env[:url].scheme == 'https' && (ssl = env[:ssl])
|
29
33
|
configure_ssl ssl
|
30
34
|
end
|
31
35
|
|
32
36
|
configure_client
|
33
37
|
|
34
|
-
# TODO Don't stream yet.
|
38
|
+
# TODO: Don't stream yet.
|
35
39
|
# https://github.com/nahi/httpclient/pull/90
|
36
40
|
env[:body] = env[:body].read if env[:body].respond_to? :read
|
37
41
|
|
38
42
|
resp = client.request env[:method], env[:url],
|
39
|
-
|
40
|
-
|
43
|
+
body: env[:body],
|
44
|
+
header: env[:request_headers]
|
41
45
|
|
46
|
+
if (req = env[:request]).stream_response?
|
47
|
+
warn "Streaming downloads for #{self.class.name} " \
|
48
|
+
'are not yet implemented.'
|
49
|
+
req.on_data.call(resp.body, resp.body.bytesize)
|
50
|
+
end
|
42
51
|
save_response env, resp.status, resp.body, resp.headers, resp.reason
|
43
52
|
|
44
53
|
@app.call env
|
45
54
|
rescue ::HTTPClient::TimeoutError, Errno::ETIMEDOUT
|
46
|
-
raise Faraday::
|
47
|
-
rescue ::HTTPClient::BadResponseError =>
|
48
|
-
if
|
49
|
-
raise Faraday::
|
50
|
-
|
51
|
-
raise Faraday::Error::ClientError, $!
|
55
|
+
raise Faraday::TimeoutError, $ERROR_INFO
|
56
|
+
rescue ::HTTPClient::BadResponseError => e
|
57
|
+
if e.message.include?('status 407')
|
58
|
+
raise Faraday::ConnectionFailed,
|
59
|
+
%(407 "Proxy Authentication Required ")
|
52
60
|
end
|
53
|
-
|
54
|
-
raise Faraday::
|
55
|
-
rescue
|
56
|
-
|
57
|
-
|
58
|
-
|
59
|
-
raise
|
61
|
+
|
62
|
+
raise Faraday::ClientError, $ERROR_INFO
|
63
|
+
rescue Errno::EADDRNOTAVAIL, Errno::ECONNREFUSED, IOError, SocketError
|
64
|
+
raise Faraday::ConnectionFailed, $ERROR_INFO
|
65
|
+
rescue StandardError => e
|
66
|
+
if defined?(OpenSSL) && e.is_a?(OpenSSL::SSL::SSLError)
|
67
|
+
raise Faraday::SSLError, e
|
60
68
|
end
|
69
|
+
|
70
|
+
raise
|
61
71
|
end
|
62
72
|
|
73
|
+
# @param bind [Hash]
|
63
74
|
def configure_socket(bind)
|
64
75
|
client.socket_local.host = bind[:host]
|
65
76
|
client.socket_local.port = bind[:port]
|
66
77
|
end
|
67
78
|
|
79
|
+
# Configure proxy URI and any user credentials.
|
80
|
+
#
|
81
|
+
# @param proxy [Hash]
|
68
82
|
def configure_proxy(proxy)
|
69
83
|
client.proxy = proxy[:uri]
|
70
|
-
|
71
|
-
|
72
|
-
|
84
|
+
return unless proxy[:user] && proxy[:password]
|
85
|
+
|
86
|
+
client.set_proxy_auth(proxy[:user], proxy[:password])
|
73
87
|
end
|
74
88
|
|
89
|
+
# @param ssl [Hash]
|
75
90
|
def configure_ssl(ssl)
|
76
91
|
ssl_config = client.ssl_config
|
77
92
|
ssl_config.verify_mode = ssl_verify_mode(ssl)
|
@@ -84,40 +99,47 @@ module Faraday
|
|
84
99
|
ssl_config.verify_depth = ssl[:verify_depth] if ssl[:verify_depth]
|
85
100
|
end
|
86
101
|
|
102
|
+
# @param req [Hash]
|
87
103
|
def configure_timeouts(req)
|
88
|
-
if req[:timeout]
|
89
|
-
|
90
|
-
|
91
|
-
client.send_timeout = req[:timeout]
|
92
|
-
end
|
104
|
+
configure_timeout(req) if req[:timeout]
|
105
|
+
configure_open_timeout(req) if req[:open_timeout]
|
106
|
+
end
|
93
107
|
|
94
|
-
|
95
|
-
|
96
|
-
|
97
|
-
|
108
|
+
def configure_timeout(req)
|
109
|
+
client.connect_timeout = req[:timeout]
|
110
|
+
client.receive_timeout = req[:timeout]
|
111
|
+
client.send_timeout = req[:timeout]
|
112
|
+
end
|
113
|
+
|
114
|
+
def configure_open_timeout(req)
|
115
|
+
client.connect_timeout = req[:open_timeout]
|
116
|
+
client.send_timeout = req[:open_timeout]
|
98
117
|
end
|
99
118
|
|
100
119
|
def configure_client
|
101
|
-
@config_block
|
120
|
+
@config_block&.call(client)
|
102
121
|
end
|
103
122
|
|
123
|
+
# @param ssl [Hash]
|
124
|
+
# @return [OpenSSL::X509::Store]
|
104
125
|
def ssl_cert_store(ssl)
|
105
126
|
return ssl[:cert_store] if ssl[:cert_store]
|
127
|
+
|
106
128
|
# Memoize the cert store so that the same one is passed to
|
107
|
-
# HTTPClient each time, to avoid resyncing SSL
|
129
|
+
# HTTPClient each time, to avoid resyncing SSL sessions when
|
108
130
|
# it's changed
|
109
|
-
@
|
131
|
+
@ssl_cert_store ||= begin
|
110
132
|
# Use the default cert store by default, i.e. system ca certs
|
111
|
-
|
112
|
-
cert_store.set_default_paths
|
113
|
-
cert_store
|
133
|
+
OpenSSL::X509::Store.new.tap(&:set_default_paths)
|
114
134
|
end
|
115
135
|
end
|
116
136
|
|
137
|
+
# @param ssl [Hash]
|
117
138
|
def ssl_verify_mode(ssl)
|
118
139
|
ssl[:verify_mode] || begin
|
119
140
|
if ssl.fetch(:verify, true)
|
120
|
-
OpenSSL::SSL::VERIFY_PEER |
|
141
|
+
OpenSSL::SSL::VERIFY_PEER |
|
142
|
+
OpenSSL::SSL::VERIFY_FAIL_IF_NO_PEER_CERT
|
121
143
|
else
|
122
144
|
OpenSSL::SSL::VERIFY_NONE
|
123
145
|
end
|
@@ -1,16 +1,21 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
1
3
|
begin
|
2
4
|
require 'net/https'
|
3
5
|
rescue LoadError
|
4
|
-
warn
|
6
|
+
warn 'Warning: no such file to load -- net/https. ' \
|
7
|
+
'Make sure openssl is installed if you want ssl support'
|
5
8
|
require 'net/http'
|
6
9
|
end
|
7
10
|
require 'zlib'
|
8
11
|
|
9
12
|
module Faraday
|
10
13
|
class Adapter
|
14
|
+
# Net::HTTP adapter.
|
11
15
|
class NetHttp < Faraday::Adapter
|
12
|
-
|
16
|
+
exceptions = [
|
13
17
|
IOError,
|
18
|
+
Errno::EADDRNOTAVAIL,
|
14
19
|
Errno::ECONNABORTED,
|
15
20
|
Errno::ECONNREFUSED,
|
16
21
|
Errno::ECONNRESET,
|
@@ -22,34 +27,40 @@ module Faraday
|
|
22
27
|
Net::HTTPHeaderSyntaxError,
|
23
28
|
Net::ProtocolError,
|
24
29
|
SocketError,
|
25
|
-
Zlib::GzipFile::Error
|
30
|
+
Zlib::GzipFile::Error
|
26
31
|
]
|
27
32
|
|
28
|
-
|
29
|
-
|
33
|
+
exceptions << OpenSSL::SSL::SSLError if defined?(OpenSSL)
|
34
|
+
exceptions << Net::OpenTimeout if defined?(Net::OpenTimeout)
|
35
|
+
|
36
|
+
NET_HTTP_EXCEPTIONS = exceptions.freeze
|
30
37
|
|
31
38
|
def initialize(app = nil, opts = {}, &block)
|
32
|
-
@
|
39
|
+
@ssl_cert_store = nil
|
33
40
|
super(app, opts, &block)
|
34
41
|
end
|
35
42
|
|
36
43
|
def call(env)
|
37
44
|
super
|
38
45
|
with_net_http_connection(env) do |http|
|
39
|
-
|
46
|
+
if (env[:url].scheme == 'https') && env[:ssl]
|
47
|
+
configure_ssl(http, env[:ssl])
|
48
|
+
end
|
40
49
|
configure_request(http, env[:request])
|
41
50
|
|
42
51
|
begin
|
43
52
|
http_response = perform_request(http, env)
|
44
|
-
rescue *NET_HTTP_EXCEPTIONS =>
|
45
|
-
if defined?(OpenSSL) && OpenSSL::SSL::SSLError
|
46
|
-
raise Faraday::SSLError,
|
47
|
-
else
|
48
|
-
raise Error::ConnectionFailed, err
|
53
|
+
rescue *NET_HTTP_EXCEPTIONS => e
|
54
|
+
if defined?(OpenSSL) && e.is_a?(OpenSSL::SSL::SSLError)
|
55
|
+
raise Faraday::SSLError, e
|
49
56
|
end
|
57
|
+
|
58
|
+
raise Faraday::ConnectionFailed, e
|
50
59
|
end
|
51
60
|
|
52
|
-
save_response(env, http_response.code.to_i,
|
61
|
+
save_response(env, http_response.code.to_i,
|
62
|
+
http_response.body || '', nil,
|
63
|
+
http_response.message) do |response_headers|
|
53
64
|
http_response.each_header do |key, value|
|
54
65
|
response_headers[key] = value
|
55
66
|
end
|
@@ -57,19 +68,19 @@ module Faraday
|
|
57
68
|
end
|
58
69
|
|
59
70
|
@app.call env
|
60
|
-
rescue Timeout::Error, Errno::ETIMEDOUT =>
|
61
|
-
raise Faraday::
|
71
|
+
rescue Timeout::Error, Errno::ETIMEDOUT => e
|
72
|
+
raise Faraday::TimeoutError, e
|
62
73
|
end
|
63
74
|
|
64
75
|
private
|
65
76
|
|
66
77
|
def create_request(env)
|
67
78
|
request = Net::HTTPGenericRequest.new \
|
68
|
-
env[:method].to_s.upcase,
|
69
|
-
!!env[:body],
|
70
|
-
:
|
71
|
-
env[:url].request_uri,
|
72
|
-
env[:request_headers]
|
79
|
+
env[:method].to_s.upcase, # request method
|
80
|
+
!!env[:body], # is there request body
|
81
|
+
env[:method] != :head, # is there response body
|
82
|
+
env[:url].request_uri, # request uri path
|
83
|
+
env[:request_headers] # request headers
|
73
84
|
|
74
85
|
if env[:body].respond_to?(:read)
|
75
86
|
request.body_stream = env[:body]
|
@@ -80,9 +91,44 @@ module Faraday
|
|
80
91
|
end
|
81
92
|
|
82
93
|
def perform_request(http, env)
|
83
|
-
if
|
94
|
+
if env[:request].stream_response?
|
95
|
+
size = 0
|
96
|
+
yielded = false
|
97
|
+
http_response = request_with_wrapped_block(http, env) do |chunk|
|
98
|
+
if chunk.bytesize.positive? || size.positive?
|
99
|
+
yielded = true
|
100
|
+
size += chunk.bytesize
|
101
|
+
env[:request].on_data.call(chunk, size)
|
102
|
+
end
|
103
|
+
end
|
104
|
+
env[:request].on_data.call('', 0) unless yielded
|
105
|
+
# Net::HTTP returns something,
|
106
|
+
# but it's not meaningful according to the docs.
|
107
|
+
http_response.body = nil
|
108
|
+
http_response
|
109
|
+
else
|
110
|
+
request_with_wrapped_block(http, env)
|
111
|
+
end
|
112
|
+
end
|
113
|
+
|
114
|
+
def request_with_wrapped_block(http, env, &block)
|
115
|
+
if (env[:method] == :get) && !env[:body]
|
84
116
|
# prefer `get` to `request` because the former handles gzip (ruby 1.9)
|
85
|
-
http
|
117
|
+
request_via_get_method(http, env, &block)
|
118
|
+
else
|
119
|
+
request_via_request_method(http, env, &block)
|
120
|
+
end
|
121
|
+
end
|
122
|
+
|
123
|
+
def request_via_get_method(http, env, &block)
|
124
|
+
http.get env[:url].request_uri, env[:request_headers], &block
|
125
|
+
end
|
126
|
+
|
127
|
+
def request_via_request_method(http, env, &block)
|
128
|
+
if block_given?
|
129
|
+
http.request create_request(env) do |response|
|
130
|
+
response.read_body(&block)
|
131
|
+
end
|
86
132
|
else
|
87
133
|
http.request create_request(env)
|
88
134
|
end
|
@@ -93,49 +139,56 @@ module Faraday
|
|
93
139
|
end
|
94
140
|
|
95
141
|
def net_http_connection(env)
|
96
|
-
if proxy = env[:request][:proxy]
|
97
|
-
|
98
|
-
|
99
|
-
|
100
|
-
|
142
|
+
klass = if (proxy = env[:request][:proxy])
|
143
|
+
Net::HTTP::Proxy(proxy[:uri].hostname, proxy[:uri].port,
|
144
|
+
proxy[:user], proxy[:password])
|
145
|
+
else
|
146
|
+
Net::HTTP
|
147
|
+
end
|
148
|
+
port = env[:url].port || (env[:url].scheme == 'https' ? 443 : 80)
|
149
|
+
klass.new(env[:url].hostname, port)
|
101
150
|
end
|
102
151
|
|
103
152
|
def configure_ssl(http, ssl)
|
104
|
-
http.use_ssl
|
105
|
-
http.verify_mode
|
106
|
-
http.cert_store
|
107
|
-
|
108
|
-
http.cert
|
109
|
-
http.key
|
110
|
-
http.ca_file
|
111
|
-
http.ca_path
|
153
|
+
http.use_ssl = true
|
154
|
+
http.verify_mode = ssl_verify_mode(ssl)
|
155
|
+
http.cert_store = ssl_cert_store(ssl)
|
156
|
+
|
157
|
+
http.cert = ssl[:client_cert] if ssl[:client_cert]
|
158
|
+
http.key = ssl[:client_key] if ssl[:client_key]
|
159
|
+
http.ca_file = ssl[:ca_file] if ssl[:ca_file]
|
160
|
+
http.ca_path = ssl[:ca_path] if ssl[:ca_path]
|
112
161
|
http.verify_depth = ssl[:verify_depth] if ssl[:verify_depth]
|
113
|
-
http.ssl_version
|
114
|
-
http.min_version
|
115
|
-
http.max_version
|
162
|
+
http.ssl_version = ssl[:version] if ssl[:version]
|
163
|
+
http.min_version = ssl[:min_version] if ssl[:min_version]
|
164
|
+
http.max_version = ssl[:max_version] if ssl[:max_version]
|
116
165
|
end
|
117
166
|
|
118
167
|
def configure_request(http, req)
|
119
168
|
if req[:timeout]
|
120
|
-
http.read_timeout
|
121
|
-
http.open_timeout
|
122
|
-
|
169
|
+
http.read_timeout = req[:timeout]
|
170
|
+
http.open_timeout = req[:timeout]
|
171
|
+
if http.respond_to?(:write_timeout=)
|
172
|
+
http.write_timeout = req[:timeout]
|
173
|
+
end
|
174
|
+
end
|
175
|
+
http.open_timeout = req[:open_timeout] if req[:open_timeout]
|
176
|
+
if req[:write_timeout] && http.respond_to?(:write_timeout=)
|
177
|
+
http.write_timeout = req[:write_timeout]
|
123
178
|
end
|
124
|
-
|
125
|
-
http.
|
126
|
-
# Only set if Net::Http supports it, since Ruby 2.5.
|
127
|
-
http.max_retries = 0 if http.respond_to?(:max_retries=)
|
179
|
+
# Only set if Net::Http supports it, since Ruby 2.5.
|
180
|
+
http.max_retries = 0 if http.respond_to?(:max_retries=)
|
128
181
|
|
129
|
-
@config_block
|
182
|
+
@config_block&.call(http)
|
130
183
|
end
|
131
184
|
|
132
185
|
def ssl_cert_store(ssl)
|
133
186
|
return ssl[:cert_store] if ssl[:cert_store]
|
134
|
-
|
135
|
-
|
136
|
-
|
137
|
-
|
138
|
-
|
187
|
+
|
188
|
+
@ssl_cert_store ||= begin
|
189
|
+
# Use the default cert store by default, i.e. system ca certs
|
190
|
+
OpenSSL::X509::Store.new.tap(&:set_default_paths)
|
191
|
+
end
|
139
192
|
end
|
140
193
|
|
141
194
|
def ssl_verify_mode(ssl)
|
@@ -1,5 +1,8 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
1
3
|
module Faraday
|
2
4
|
class Adapter
|
5
|
+
# Net::HTTP::Persistent adapter.
|
3
6
|
class NetHttpPersistent < NetHttp
|
4
7
|
dependency 'net/http/persistent'
|
5
8
|
|
@@ -7,61 +10,79 @@ module Faraday
|
|
7
10
|
|
8
11
|
def net_http_connection(env)
|
9
12
|
@cached_connection ||=
|
10
|
-
if Net::HTTP::Persistent.instance_method(:initialize)
|
11
|
-
|
12
|
-
options
|
13
|
+
if Net::HTTP::Persistent.instance_method(:initialize)
|
14
|
+
.parameters.first == %i[key name]
|
15
|
+
options = { name: 'Faraday' }
|
16
|
+
if @connection_options.key?(:pool_size)
|
17
|
+
options[:pool_size] = @connection_options[:pool_size]
|
18
|
+
end
|
13
19
|
Net::HTTP::Persistent.new(options)
|
14
20
|
else
|
15
21
|
Net::HTTP::Persistent.new('Faraday')
|
16
22
|
end
|
17
23
|
|
18
24
|
proxy_uri = proxy_uri(env)
|
19
|
-
|
25
|
+
if @cached_connection.proxy_uri != proxy_uri
|
26
|
+
@cached_connection.proxy = proxy_uri
|
27
|
+
end
|
20
28
|
@cached_connection
|
21
29
|
end
|
22
30
|
|
23
31
|
def proxy_uri(env)
|
24
32
|
proxy_uri = nil
|
25
33
|
if (proxy = env[:request][:proxy])
|
26
|
-
proxy_uri =
|
34
|
+
proxy_uri = if proxy[:uri].is_a?(::URI::HTTP)
|
35
|
+
proxy[:uri].dup
|
36
|
+
else
|
37
|
+
::URI.parse(proxy[:uri].to_s)
|
38
|
+
end
|
27
39
|
proxy_uri.user = proxy_uri.password = nil
|
28
|
-
# awful patch for net-http-persistent 2.8
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
40
|
+
# awful patch for net-http-persistent 2.8
|
41
|
+
# not unescaping user/password
|
42
|
+
if proxy[:user]
|
43
|
+
(class << proxy_uri; self; end).class_eval do
|
44
|
+
define_method(:user) { proxy[:user] }
|
45
|
+
define_method(:password) { proxy[:password] }
|
46
|
+
end
|
47
|
+
end
|
33
48
|
end
|
34
49
|
proxy_uri
|
35
50
|
end
|
36
51
|
|
37
52
|
def perform_request(http, env)
|
38
53
|
http.request env[:url], create_request(env)
|
39
|
-
rescue Errno::ETIMEDOUT =>
|
40
|
-
raise Faraday::
|
41
|
-
rescue Net::HTTP::Persistent::Error =>
|
42
|
-
if
|
43
|
-
|
44
|
-
|
45
|
-
raise Faraday::
|
46
|
-
else
|
47
|
-
raise
|
54
|
+
rescue Errno::ETIMEDOUT => e
|
55
|
+
raise Faraday::TimeoutError, e
|
56
|
+
rescue Net::HTTP::Persistent::Error => e
|
57
|
+
raise Faraday::TimeoutError, e if e.message.include? 'Timeout'
|
58
|
+
|
59
|
+
if e.message.include? 'connection refused'
|
60
|
+
raise Faraday::ConnectionFailed, e
|
48
61
|
end
|
62
|
+
|
63
|
+
raise
|
49
64
|
end
|
50
65
|
|
66
|
+
SSL_CONFIGURATIONS = {
|
67
|
+
certificate: :client_cert,
|
68
|
+
private_key: :client_key,
|
69
|
+
ca_file: :ca_file,
|
70
|
+
ssl_version: :version,
|
71
|
+
min_version: :min_version,
|
72
|
+
max_version: :max_version
|
73
|
+
}.freeze
|
74
|
+
|
51
75
|
def configure_ssl(http, ssl)
|
52
76
|
http_set(http, :verify_mode, ssl_verify_mode(ssl))
|
53
|
-
http_set(http, :cert_store,
|
77
|
+
http_set(http, :cert_store, ssl_cert_store(ssl))
|
54
78
|
|
55
|
-
|
56
|
-
|
57
|
-
|
58
|
-
http_set(http, :ssl_version, ssl[:version]) if ssl[:version]
|
79
|
+
SSL_CONFIGURATIONS
|
80
|
+
.select { |_, key| ssl[key] }
|
81
|
+
.each { |target, key| http_set(http, target, ssl[key]) }
|
59
82
|
end
|
60
83
|
|
61
84
|
def http_set(http, attr, value)
|
62
|
-
if http.send(attr) != value
|
63
|
-
http.send("#{attr}=", value)
|
64
|
-
end
|
85
|
+
http.send("#{attr}=", value) if http.send(attr) != value
|
65
86
|
end
|
66
87
|
end
|
67
88
|
end
|