faraday 0.9.1 → 0.16.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +5 -5
- data/LICENSE.md +1 -1
- data/README.md +30 -195
- data/lib/faraday/adapter/em_http.rb +148 -99
- data/lib/faraday/adapter/em_http_ssl_patch.rb +24 -18
- data/lib/faraday/adapter/em_synchrony/parallel_manager.rb +18 -15
- data/lib/faraday/adapter/em_synchrony.rb +107 -49
- data/lib/faraday/adapter/excon.rb +102 -55
- data/lib/faraday/adapter/httpclient.rb +80 -36
- data/lib/faraday/adapter/net_http.rb +119 -44
- data/lib/faraday/adapter/net_http_persistent.rb +68 -27
- data/lib/faraday/adapter/patron.rb +76 -34
- data/lib/faraday/adapter/rack.rb +28 -12
- data/lib/faraday/adapter/test.rb +136 -52
- data/lib/faraday/adapter/typhoeus.rb +7 -115
- data/lib/faraday/adapter.rb +43 -20
- data/lib/faraday/adapter_registry.rb +28 -0
- data/lib/faraday/autoload.rb +47 -36
- data/lib/faraday/connection.rb +359 -165
- data/lib/faraday/dependency_loader.rb +37 -0
- data/lib/faraday/encoders/flat_params_encoder.rb +94 -0
- data/lib/faraday/encoders/nested_params_encoder.rb +171 -0
- data/lib/faraday/error.rb +71 -24
- data/lib/faraday/file_part.rb +128 -0
- data/lib/faraday/logging/formatter.rb +92 -0
- data/lib/faraday/middleware.rb +4 -28
- data/lib/faraday/middleware_registry.rb +129 -0
- data/lib/faraday/options/connection_options.rb +22 -0
- data/lib/faraday/options/env.rb +181 -0
- data/lib/faraday/options/proxy_options.rb +28 -0
- data/lib/faraday/options/request_options.rb +21 -0
- data/lib/faraday/options/ssl_options.rb +59 -0
- data/lib/faraday/options.rb +57 -185
- data/lib/faraday/param_part.rb +53 -0
- data/lib/faraday/parameters.rb +4 -180
- data/lib/faraday/rack_builder.rb +74 -38
- data/lib/faraday/request/authorization.rb +42 -31
- data/lib/faraday/request/basic_authentication.rb +14 -7
- data/lib/faraday/request/instrumentation.rb +45 -27
- data/lib/faraday/request/multipart.rb +81 -45
- data/lib/faraday/request/retry.rb +212 -121
- data/lib/faraday/request/token_authentication.rb +15 -10
- data/lib/faraday/request/url_encoded.rb +41 -23
- data/lib/faraday/request.rb +84 -30
- data/lib/faraday/response/logger.rb +22 -48
- data/lib/faraday/response/raise_error.rb +36 -14
- data/lib/faraday/response.rb +29 -18
- data/lib/faraday/utils/headers.rb +139 -0
- data/lib/faraday/utils/params_hash.rb +61 -0
- data/lib/faraday/utils.rb +28 -216
- data/lib/faraday.rb +102 -204
- data/spec/external_adapters/faraday_specs_setup.rb +14 -0
- metadata +24 -94
- data/.document +0 -6
- data/CHANGELOG.md +0 -20
- data/CONTRIBUTING.md +0 -36
- data/Gemfile +0 -25
- data/Rakefile +0 -71
- data/faraday.gemspec +0 -34
- data/lib/faraday/upload_io.rb +0 -67
- data/script/cached-bundle +0 -46
- data/script/console +0 -7
- data/script/generate_certs +0 -42
- data/script/package +0 -7
- data/script/proxy-server +0 -42
- data/script/release +0 -17
- data/script/s3-put +0 -71
- data/script/server +0 -36
- data/script/test +0 -172
- data/test/adapters/default_test.rb +0 -14
- data/test/adapters/em_http_test.rb +0 -20
- data/test/adapters/em_synchrony_test.rb +0 -20
- data/test/adapters/excon_test.rb +0 -20
- data/test/adapters/httpclient_test.rb +0 -21
- data/test/adapters/integration.rb +0 -254
- data/test/adapters/logger_test.rb +0 -82
- data/test/adapters/net_http_persistent_test.rb +0 -20
- data/test/adapters/net_http_test.rb +0 -14
- data/test/adapters/patron_test.rb +0 -20
- data/test/adapters/rack_test.rb +0 -31
- data/test/adapters/test_middleware_test.rb +0 -114
- data/test/adapters/typhoeus_test.rb +0 -28
- data/test/authentication_middleware_test.rb +0 -65
- data/test/composite_read_io_test.rb +0 -111
- data/test/connection_test.rb +0 -522
- data/test/env_test.rb +0 -218
- data/test/helper.rb +0 -81
- data/test/live_server.rb +0 -67
- data/test/middleware/instrumentation_test.rb +0 -88
- data/test/middleware/retry_test.rb +0 -177
- data/test/middleware_stack_test.rb +0 -173
- data/test/multibyte.txt +0 -1
- data/test/options_test.rb +0 -252
- data/test/parameters_test.rb +0 -64
- data/test/request_middleware_test.rb +0 -142
- data/test/response_middleware_test.rb +0 -72
- data/test/strawberry.rb +0 -2
- data/test/utils_test.rb +0 -58
@@ -1,8 +1,12 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
1
3
|
module Faraday
|
2
4
|
class Adapter
|
5
|
+
# HTTPClient adapter.
|
3
6
|
class HTTPClient < Faraday::Adapter
|
4
7
|
dependency 'httpclient'
|
5
8
|
|
9
|
+
# @return [HTTPClient]
|
6
10
|
def client
|
7
11
|
@client ||= ::HTTPClient.new
|
8
12
|
end
|
@@ -10,92 +14,132 @@ module Faraday
|
|
10
14
|
def call(env)
|
11
15
|
super
|
12
16
|
|
13
|
-
|
14
|
-
|
17
|
+
# enable compression
|
18
|
+
client.transparent_gzip_decompression = true
|
19
|
+
|
20
|
+
if (req = env[:request])
|
21
|
+
if (proxy = req[:proxy])
|
15
22
|
configure_proxy proxy
|
16
23
|
end
|
17
24
|
|
18
|
-
if bind = req[:bind]
|
25
|
+
if (bind = req[:bind])
|
19
26
|
configure_socket bind
|
20
27
|
end
|
21
28
|
|
22
29
|
configure_timeouts req
|
23
30
|
end
|
24
31
|
|
25
|
-
if env[:url].scheme == 'https' && ssl = env[:ssl]
|
32
|
+
if env[:url].scheme == 'https' && (ssl = env[:ssl])
|
26
33
|
configure_ssl ssl
|
27
34
|
end
|
28
35
|
|
29
|
-
|
36
|
+
configure_client
|
37
|
+
|
38
|
+
# TODO: Don't stream yet.
|
30
39
|
# https://github.com/nahi/httpclient/pull/90
|
31
40
|
env[:body] = env[:body].read if env[:body].respond_to? :read
|
32
41
|
|
33
42
|
resp = client.request env[:method], env[:url],
|
34
|
-
|
35
|
-
|
43
|
+
body: env[:body],
|
44
|
+
header: env[:request_headers]
|
36
45
|
|
37
|
-
|
46
|
+
if (req = env[:request]).stream_response?
|
47
|
+
warn "Streaming downloads for #{self.class.name} " \
|
48
|
+
'are not yet implemented.'
|
49
|
+
req.on_data.call(resp.body, resp.body.bytesize)
|
50
|
+
end
|
51
|
+
save_response env, resp.status, resp.body, resp.headers, resp.reason
|
38
52
|
|
39
53
|
@app.call env
|
40
|
-
rescue ::HTTPClient::TimeoutError
|
41
|
-
raise Faraday::
|
42
|
-
rescue ::HTTPClient::BadResponseError =>
|
43
|
-
if
|
44
|
-
raise Faraday::
|
45
|
-
|
46
|
-
raise Faraday::Error::ClientError, $!
|
54
|
+
rescue ::HTTPClient::TimeoutError, Errno::ETIMEDOUT
|
55
|
+
raise Faraday::TimeoutError, $ERROR_INFO
|
56
|
+
rescue ::HTTPClient::BadResponseError => e
|
57
|
+
if e.message.include?('status 407')
|
58
|
+
raise Faraday::ConnectionFailed,
|
59
|
+
%(407 "Proxy Authentication Required ")
|
47
60
|
end
|
48
|
-
|
49
|
-
raise Faraday::
|
50
|
-
rescue
|
51
|
-
|
52
|
-
|
53
|
-
|
54
|
-
raise
|
61
|
+
|
62
|
+
raise Faraday::ClientError, $ERROR_INFO
|
63
|
+
rescue Errno::EADDRNOTAVAIL, Errno::ECONNREFUSED, IOError, SocketError
|
64
|
+
raise Faraday::ConnectionFailed, $ERROR_INFO
|
65
|
+
rescue StandardError => e
|
66
|
+
if defined?(OpenSSL) && e.is_a?(OpenSSL::SSL::SSLError)
|
67
|
+
raise Faraday::SSLError, e
|
55
68
|
end
|
69
|
+
|
70
|
+
raise
|
56
71
|
end
|
57
72
|
|
73
|
+
# @param bind [Hash]
|
58
74
|
def configure_socket(bind)
|
59
75
|
client.socket_local.host = bind[:host]
|
60
76
|
client.socket_local.port = bind[:port]
|
61
77
|
end
|
62
78
|
|
79
|
+
# Configure proxy URI and any user credentials.
|
80
|
+
#
|
81
|
+
# @param proxy [Hash]
|
63
82
|
def configure_proxy(proxy)
|
64
83
|
client.proxy = proxy[:uri]
|
65
|
-
|
66
|
-
|
67
|
-
|
84
|
+
return unless proxy[:user] && proxy[:password]
|
85
|
+
|
86
|
+
client.set_proxy_auth(proxy[:user], proxy[:password])
|
68
87
|
end
|
69
88
|
|
89
|
+
# @param ssl [Hash]
|
70
90
|
def configure_ssl(ssl)
|
71
91
|
ssl_config = client.ssl_config
|
92
|
+
ssl_config.verify_mode = ssl_verify_mode(ssl)
|
93
|
+
ssl_config.cert_store = ssl_cert_store(ssl)
|
72
94
|
|
73
95
|
ssl_config.add_trust_ca ssl[:ca_file] if ssl[:ca_file]
|
74
96
|
ssl_config.add_trust_ca ssl[:ca_path] if ssl[:ca_path]
|
75
|
-
ssl_config.cert_store = ssl[:cert_store] if ssl[:cert_store]
|
76
97
|
ssl_config.client_cert = ssl[:client_cert] if ssl[:client_cert]
|
77
98
|
ssl_config.client_key = ssl[:client_key] if ssl[:client_key]
|
78
99
|
ssl_config.verify_depth = ssl[:verify_depth] if ssl[:verify_depth]
|
79
|
-
ssl_config.verify_mode = ssl_verify_mode(ssl)
|
80
100
|
end
|
81
101
|
|
102
|
+
# @param req [Hash]
|
82
103
|
def configure_timeouts(req)
|
83
|
-
if req[:timeout]
|
84
|
-
|
85
|
-
|
86
|
-
|
87
|
-
|
104
|
+
configure_timeout(req) if req[:timeout]
|
105
|
+
configure_open_timeout(req) if req[:open_timeout]
|
106
|
+
end
|
107
|
+
|
108
|
+
def configure_timeout(req)
|
109
|
+
client.connect_timeout = req[:timeout]
|
110
|
+
client.receive_timeout = req[:timeout]
|
111
|
+
client.send_timeout = req[:timeout]
|
112
|
+
end
|
113
|
+
|
114
|
+
def configure_open_timeout(req)
|
115
|
+
client.connect_timeout = req[:open_timeout]
|
116
|
+
client.send_timeout = req[:open_timeout]
|
117
|
+
end
|
118
|
+
|
119
|
+
def configure_client
|
120
|
+
@config_block&.call(client)
|
121
|
+
end
|
88
122
|
|
89
|
-
|
90
|
-
|
91
|
-
|
123
|
+
# @param ssl [Hash]
|
124
|
+
# @return [OpenSSL::X509::Store]
|
125
|
+
def ssl_cert_store(ssl)
|
126
|
+
return ssl[:cert_store] if ssl[:cert_store]
|
127
|
+
|
128
|
+
# Memoize the cert store so that the same one is passed to
|
129
|
+
# HTTPClient each time, to avoid resyncing SSL sessions when
|
130
|
+
# it's changed
|
131
|
+
@ssl_cert_store ||= begin
|
132
|
+
# Use the default cert store by default, i.e. system ca certs
|
133
|
+
OpenSSL::X509::Store.new.tap(&:set_default_paths)
|
92
134
|
end
|
93
135
|
end
|
94
136
|
|
137
|
+
# @param ssl [Hash]
|
95
138
|
def ssl_verify_mode(ssl)
|
96
139
|
ssl[:verify_mode] || begin
|
97
140
|
if ssl.fetch(:verify, true)
|
98
|
-
OpenSSL::SSL::VERIFY_PEER |
|
141
|
+
OpenSSL::SSL::VERIFY_PEER |
|
142
|
+
OpenSSL::SSL::VERIFY_FAIL_IF_NO_PEER_CERT
|
99
143
|
else
|
100
144
|
OpenSSL::SSL::VERIFY_NONE
|
101
145
|
end
|
@@ -1,52 +1,66 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
1
3
|
begin
|
2
4
|
require 'net/https'
|
3
5
|
rescue LoadError
|
4
|
-
warn
|
6
|
+
warn 'Warning: no such file to load -- net/https. ' \
|
7
|
+
'Make sure openssl is installed if you want ssl support'
|
5
8
|
require 'net/http'
|
6
9
|
end
|
7
10
|
require 'zlib'
|
8
11
|
|
9
12
|
module Faraday
|
10
13
|
class Adapter
|
14
|
+
# Net::HTTP adapter.
|
11
15
|
class NetHttp < Faraday::Adapter
|
12
|
-
|
13
|
-
|
16
|
+
exceptions = [
|
17
|
+
IOError,
|
18
|
+
Errno::EADDRNOTAVAIL,
|
14
19
|
Errno::ECONNABORTED,
|
15
20
|
Errno::ECONNREFUSED,
|
16
21
|
Errno::ECONNRESET,
|
17
22
|
Errno::EHOSTUNREACH,
|
18
23
|
Errno::EINVAL,
|
19
24
|
Errno::ENETUNREACH,
|
25
|
+
Errno::EPIPE,
|
20
26
|
Net::HTTPBadResponse,
|
21
27
|
Net::HTTPHeaderSyntaxError,
|
22
28
|
Net::ProtocolError,
|
23
29
|
SocketError,
|
24
|
-
Zlib::GzipFile::Error
|
30
|
+
Zlib::GzipFile::Error
|
25
31
|
]
|
26
32
|
|
27
|
-
|
28
|
-
|
33
|
+
exceptions << OpenSSL::SSL::SSLError if defined?(OpenSSL)
|
34
|
+
exceptions << Net::OpenTimeout if defined?(Net::OpenTimeout)
|
35
|
+
|
36
|
+
NET_HTTP_EXCEPTIONS = exceptions.freeze
|
37
|
+
|
38
|
+
def initialize(app = nil, opts = {}, &block)
|
39
|
+
@ssl_cert_store = nil
|
40
|
+
super(app, opts, &block)
|
41
|
+
end
|
29
42
|
|
30
43
|
def call(env)
|
31
44
|
super
|
32
45
|
with_net_http_connection(env) do |http|
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
http
|
37
|
-
http.open_timeout = req[:open_timeout] if req[:open_timeout]
|
46
|
+
if (env[:url].scheme == 'https') && env[:ssl]
|
47
|
+
configure_ssl(http, env[:ssl])
|
48
|
+
end
|
49
|
+
configure_request(http, env[:request])
|
38
50
|
|
39
51
|
begin
|
40
52
|
http_response = perform_request(http, env)
|
41
|
-
rescue *NET_HTTP_EXCEPTIONS =>
|
42
|
-
if defined?(OpenSSL) && OpenSSL::SSL::SSLError
|
43
|
-
raise Faraday::SSLError,
|
44
|
-
else
|
45
|
-
raise Error::ConnectionFailed, err
|
53
|
+
rescue *NET_HTTP_EXCEPTIONS => e
|
54
|
+
if defined?(OpenSSL) && e.is_a?(OpenSSL::SSL::SSLError)
|
55
|
+
raise Faraday::SSLError, e
|
46
56
|
end
|
57
|
+
|
58
|
+
raise Faraday::ConnectionFailed, e
|
47
59
|
end
|
48
60
|
|
49
|
-
save_response(env, http_response.code.to_i,
|
61
|
+
save_response(env, http_response.code.to_i,
|
62
|
+
http_response.body || '', nil,
|
63
|
+
http_response.message) do |response_headers|
|
50
64
|
http_response.each_header do |key, value|
|
51
65
|
response_headers[key] = value
|
52
66
|
end
|
@@ -54,17 +68,19 @@ module Faraday
|
|
54
68
|
end
|
55
69
|
|
56
70
|
@app.call env
|
57
|
-
rescue Timeout::Error =>
|
58
|
-
raise Faraday::
|
71
|
+
rescue Timeout::Error, Errno::ETIMEDOUT => e
|
72
|
+
raise Faraday::TimeoutError, e
|
59
73
|
end
|
60
74
|
|
75
|
+
private
|
76
|
+
|
61
77
|
def create_request(env)
|
62
78
|
request = Net::HTTPGenericRequest.new \
|
63
|
-
env[:method].to_s.upcase,
|
64
|
-
!!env[:body],
|
65
|
-
:
|
66
|
-
env[:url].request_uri,
|
67
|
-
env[:request_headers]
|
79
|
+
env[:method].to_s.upcase, # request method
|
80
|
+
!!env[:body], # is there request body
|
81
|
+
env[:method] != :head, # is there response body
|
82
|
+
env[:url].request_uri, # request uri path
|
83
|
+
env[:request_headers] # request headers
|
68
84
|
|
69
85
|
if env[:body].respond_to?(:read)
|
70
86
|
request.body_stream = env[:body]
|
@@ -75,9 +91,44 @@ module Faraday
|
|
75
91
|
end
|
76
92
|
|
77
93
|
def perform_request(http, env)
|
78
|
-
if
|
94
|
+
if env[:request].stream_response?
|
95
|
+
size = 0
|
96
|
+
yielded = false
|
97
|
+
http_response = request_with_wrapped_block(http, env) do |chunk|
|
98
|
+
if chunk.bytesize.positive? || size.positive?
|
99
|
+
yielded = true
|
100
|
+
size += chunk.bytesize
|
101
|
+
env[:request].on_data.call(chunk, size)
|
102
|
+
end
|
103
|
+
end
|
104
|
+
env[:request].on_data.call('', 0) unless yielded
|
105
|
+
# Net::HTTP returns something,
|
106
|
+
# but it's not meaningful according to the docs.
|
107
|
+
http_response.body = nil
|
108
|
+
http_response
|
109
|
+
else
|
110
|
+
request_with_wrapped_block(http, env)
|
111
|
+
end
|
112
|
+
end
|
113
|
+
|
114
|
+
def request_with_wrapped_block(http, env, &block)
|
115
|
+
if (env[:method] == :get) && !env[:body]
|
79
116
|
# prefer `get` to `request` because the former handles gzip (ruby 1.9)
|
80
|
-
http
|
117
|
+
request_via_get_method(http, env, &block)
|
118
|
+
else
|
119
|
+
request_via_request_method(http, env, &block)
|
120
|
+
end
|
121
|
+
end
|
122
|
+
|
123
|
+
def request_via_get_method(http, env, &block)
|
124
|
+
http.get env[:url].request_uri, env[:request_headers], &block
|
125
|
+
end
|
126
|
+
|
127
|
+
def request_via_request_method(http, env, &block)
|
128
|
+
if block_given?
|
129
|
+
http.request create_request(env) do |response|
|
130
|
+
response.read_body(&block)
|
131
|
+
end
|
81
132
|
else
|
82
133
|
http.request create_request(env)
|
83
134
|
end
|
@@ -88,32 +139,56 @@ module Faraday
|
|
88
139
|
end
|
89
140
|
|
90
141
|
def net_http_connection(env)
|
91
|
-
if proxy = env[:request][:proxy]
|
92
|
-
|
93
|
-
|
94
|
-
|
95
|
-
|
142
|
+
klass = if (proxy = env[:request][:proxy])
|
143
|
+
Net::HTTP::Proxy(proxy[:uri].hostname, proxy[:uri].port,
|
144
|
+
proxy[:user], proxy[:password])
|
145
|
+
else
|
146
|
+
Net::HTTP
|
147
|
+
end
|
148
|
+
port = env[:url].port || (env[:url].scheme == 'https' ? 443 : 80)
|
149
|
+
klass.new(env[:url].hostname, port)
|
96
150
|
end
|
97
151
|
|
98
152
|
def configure_ssl(http, ssl)
|
99
|
-
http.use_ssl
|
100
|
-
http.verify_mode
|
101
|
-
http.cert_store
|
102
|
-
|
103
|
-
http.cert
|
104
|
-
http.key
|
105
|
-
http.ca_file
|
106
|
-
http.ca_path
|
153
|
+
http.use_ssl = true
|
154
|
+
http.verify_mode = ssl_verify_mode(ssl)
|
155
|
+
http.cert_store = ssl_cert_store(ssl)
|
156
|
+
|
157
|
+
http.cert = ssl[:client_cert] if ssl[:client_cert]
|
158
|
+
http.key = ssl[:client_key] if ssl[:client_key]
|
159
|
+
http.ca_file = ssl[:ca_file] if ssl[:ca_file]
|
160
|
+
http.ca_path = ssl[:ca_path] if ssl[:ca_path]
|
107
161
|
http.verify_depth = ssl[:verify_depth] if ssl[:verify_depth]
|
108
|
-
http.ssl_version
|
162
|
+
http.ssl_version = ssl[:version] if ssl[:version]
|
163
|
+
http.min_version = ssl[:min_version] if ssl[:min_version]
|
164
|
+
http.max_version = ssl[:max_version] if ssl[:max_version]
|
165
|
+
end
|
166
|
+
|
167
|
+
def configure_request(http, req)
|
168
|
+
if req[:timeout]
|
169
|
+
http.read_timeout = req[:timeout]
|
170
|
+
http.open_timeout = req[:timeout]
|
171
|
+
if http.respond_to?(:write_timeout=)
|
172
|
+
http.write_timeout = req[:timeout]
|
173
|
+
end
|
174
|
+
end
|
175
|
+
http.open_timeout = req[:open_timeout] if req[:open_timeout]
|
176
|
+
if req[:write_timeout] && http.respond_to?(:write_timeout=)
|
177
|
+
http.write_timeout = req[:write_timeout]
|
178
|
+
end
|
179
|
+
# Only set if Net::Http supports it, since Ruby 2.5.
|
180
|
+
http.max_retries = 0 if http.respond_to?(:max_retries=)
|
181
|
+
|
182
|
+
@config_block&.call(http)
|
109
183
|
end
|
110
184
|
|
111
185
|
def ssl_cert_store(ssl)
|
112
186
|
return ssl[:cert_store] if ssl[:cert_store]
|
113
|
-
|
114
|
-
|
115
|
-
|
116
|
-
|
187
|
+
|
188
|
+
@ssl_cert_store ||= begin
|
189
|
+
# Use the default cert store by default, i.e. system ca certs
|
190
|
+
OpenSSL::X509::Store.new.tap(&:set_default_paths)
|
191
|
+
end
|
117
192
|
end
|
118
193
|
|
119
194
|
def ssl_verify_mode(ssl)
|
@@ -1,47 +1,88 @@
|
|
1
|
-
#
|
2
|
-
# initialized constant" warning on Ruby 1.8.7 when NetHttp is refereced below.
|
3
|
-
# require 'faraday/adapter/net_http'
|
1
|
+
# frozen_string_literal: true
|
4
2
|
|
5
3
|
module Faraday
|
6
4
|
class Adapter
|
7
|
-
#
|
5
|
+
# Net::HTTP::Persistent adapter.
|
8
6
|
class NetHttpPersistent < NetHttp
|
9
7
|
dependency 'net/http/persistent'
|
10
8
|
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
9
|
+
private
|
10
|
+
|
11
|
+
def net_http_connection(env)
|
12
|
+
@cached_connection ||=
|
13
|
+
if Net::HTTP::Persistent.instance_method(:initialize)
|
14
|
+
.parameters.first == %i[key name]
|
15
|
+
options = { name: 'Faraday' }
|
16
|
+
if @connection_options.key?(:pool_size)
|
17
|
+
options[:pool_size] = @connection_options[:pool_size]
|
18
|
+
end
|
19
|
+
Net::HTTP::Persistent.new(options)
|
20
|
+
else
|
21
|
+
Net::HTTP::Persistent.new('Faraday')
|
22
|
+
end
|
23
|
+
|
24
|
+
proxy_uri = proxy_uri(env)
|
25
|
+
if @cached_connection.proxy_uri != proxy_uri
|
26
|
+
@cached_connection.proxy = proxy_uri
|
20
27
|
end
|
28
|
+
@cached_connection
|
29
|
+
end
|
21
30
|
|
22
|
-
|
31
|
+
def proxy_uri(env)
|
32
|
+
proxy_uri = nil
|
33
|
+
if (proxy = env[:request][:proxy])
|
34
|
+
proxy_uri = if proxy[:uri].is_a?(::URI::HTTP)
|
35
|
+
proxy[:uri].dup
|
36
|
+
else
|
37
|
+
::URI.parse(proxy[:uri].to_s)
|
38
|
+
end
|
39
|
+
proxy_uri.user = proxy_uri.password = nil
|
40
|
+
# awful patch for net-http-persistent 2.8
|
41
|
+
# not unescaping user/password
|
42
|
+
if proxy[:user]
|
43
|
+
(class << proxy_uri; self; end).class_eval do
|
44
|
+
define_method(:user) { proxy[:user] }
|
45
|
+
define_method(:password) { proxy[:password] }
|
46
|
+
end
|
47
|
+
end
|
48
|
+
end
|
49
|
+
proxy_uri
|
23
50
|
end
|
24
51
|
|
25
52
|
def perform_request(http, env)
|
26
53
|
http.request env[:url], create_request(env)
|
27
|
-
rescue
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
raise
|
54
|
+
rescue Errno::ETIMEDOUT => e
|
55
|
+
raise Faraday::TimeoutError, e
|
56
|
+
rescue Net::HTTP::Persistent::Error => e
|
57
|
+
raise Faraday::TimeoutError, e if e.message.include? 'Timeout'
|
58
|
+
|
59
|
+
if e.message.include? 'connection refused'
|
60
|
+
raise Faraday::ConnectionFailed, e
|
34
61
|
end
|
62
|
+
|
63
|
+
raise
|
35
64
|
end
|
36
65
|
|
66
|
+
SSL_CONFIGURATIONS = {
|
67
|
+
certificate: :client_cert,
|
68
|
+
private_key: :client_key,
|
69
|
+
ca_file: :ca_file,
|
70
|
+
ssl_version: :version,
|
71
|
+
min_version: :min_version,
|
72
|
+
max_version: :max_version
|
73
|
+
}.freeze
|
74
|
+
|
37
75
|
def configure_ssl(http, ssl)
|
38
|
-
http
|
39
|
-
http
|
76
|
+
http_set(http, :verify_mode, ssl_verify_mode(ssl))
|
77
|
+
http_set(http, :cert_store, ssl_cert_store(ssl))
|
78
|
+
|
79
|
+
SSL_CONFIGURATIONS
|
80
|
+
.select { |_, key| ssl[key] }
|
81
|
+
.each { |target, key| http_set(http, target, ssl[key]) }
|
82
|
+
end
|
40
83
|
|
41
|
-
|
42
|
-
http.
|
43
|
-
http.ca_file = ssl[:ca_file] if ssl[:ca_file]
|
44
|
-
http.ssl_version = ssl[:version] if ssl[:version]
|
84
|
+
def http_set(http, attr, value)
|
85
|
+
http.send("#{attr}=", value) if http.send(attr) != value
|
45
86
|
end
|
46
87
|
end
|
47
88
|
end
|
@@ -1,71 +1,113 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
1
3
|
module Faraday
|
2
4
|
class Adapter
|
5
|
+
# Patron adapter.
|
3
6
|
class Patron < Faraday::Adapter
|
4
7
|
dependency 'patron'
|
5
8
|
|
6
|
-
def initialize(app, &block)
|
7
|
-
super(app)
|
8
|
-
@block = block
|
9
|
-
end
|
10
|
-
|
11
9
|
def call(env)
|
12
10
|
super
|
13
|
-
|
14
11
|
# TODO: support streaming requests
|
15
12
|
env[:body] = env[:body].read if env[:body].respond_to? :read
|
16
13
|
|
17
|
-
session =
|
14
|
+
session = ::Patron::Session.new
|
15
|
+
@config_block&.call(session)
|
16
|
+
if (env[:url].scheme == 'https') && env[:ssl]
|
17
|
+
configure_ssl(session, env[:ssl])
|
18
|
+
end
|
18
19
|
|
19
|
-
if req = env[:request]
|
20
|
-
|
21
|
-
|
20
|
+
if (req = env[:request])
|
21
|
+
if req[:timeout]
|
22
|
+
session.timeout = session.connect_timeout = req[:timeout]
|
23
|
+
end
|
24
|
+
session.connect_timeout = req[:open_timeout] if req[:open_timeout]
|
22
25
|
|
23
|
-
if proxy = req[:proxy]
|
26
|
+
if (proxy = req[:proxy])
|
24
27
|
proxy_uri = proxy[:uri].dup
|
25
|
-
proxy_uri.user = proxy[:user] &&
|
26
|
-
|
28
|
+
proxy_uri.user = proxy[:user] &&
|
29
|
+
Utils.escape(proxy[:user]).gsub('+', '%20')
|
30
|
+
proxy_uri.password = proxy[:password] &&
|
31
|
+
Utils.escape(proxy[:password]).gsub('+', '%20')
|
27
32
|
session.proxy = proxy_uri.to_s
|
28
33
|
end
|
29
34
|
end
|
30
35
|
|
31
36
|
response = begin
|
32
37
|
data = env[:body] ? env[:body].to_s : nil
|
33
|
-
session.request(env[:method], env[:url].to_s,
|
34
|
-
|
35
|
-
|
38
|
+
session.request(env[:method], env[:url].to_s,
|
39
|
+
env[:request_headers], data: data)
|
40
|
+
rescue Errno::ECONNREFUSED, ::Patron::ConnectionFailed
|
41
|
+
raise Faraday::ConnectionFailed, $ERROR_INFO
|
42
|
+
end
|
43
|
+
|
44
|
+
if (req = env[:request]).stream_response?
|
45
|
+
warn "Streaming downloads for #{self.class.name} " \
|
46
|
+
'are not yet implemented.'
|
47
|
+
req.on_data.call(response.body, response.body.bytesize)
|
36
48
|
end
|
49
|
+
# Remove the "HTTP/1.1 200", leaving just the reason phrase
|
50
|
+
reason_phrase = response.status_line.gsub(/^.* \d{3} /, '')
|
37
51
|
|
38
|
-
save_response(env, response.status, response.body,
|
52
|
+
save_response(env, response.status, response.body,
|
53
|
+
response.headers, reason_phrase)
|
39
54
|
|
40
55
|
@app.call env
|
41
|
-
rescue ::Patron::TimeoutError =>
|
42
|
-
if
|
43
|
-
raise Faraday::
|
44
|
-
else
|
45
|
-
raise Faraday::Error::TimeoutError, err
|
56
|
+
rescue ::Patron::TimeoutError => e
|
57
|
+
if connection_timed_out_message?(e.message)
|
58
|
+
raise Faraday::ConnectionFailed, e
|
46
59
|
end
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
raise
|
60
|
+
|
61
|
+
raise Faraday::TimeoutError, e
|
62
|
+
rescue ::Patron::Error => e
|
63
|
+
if e.message.include?('code 407')
|
64
|
+
raise Faraday::ConnectionFailed,
|
65
|
+
%(407 "Proxy Authentication Required ")
|
52
66
|
end
|
67
|
+
|
68
|
+
raise Faraday::ConnectionFailed, e
|
53
69
|
end
|
54
70
|
|
55
71
|
if loaded? && defined?(::Patron::Request::VALID_ACTIONS)
|
56
72
|
# HAX: helps but doesn't work completely
|
57
73
|
# https://github.com/toland/patron/issues/34
|
58
74
|
::Patron::Request::VALID_ACTIONS.tap do |actions|
|
59
|
-
|
60
|
-
|
75
|
+
if actions[0].is_a?(Symbol)
|
76
|
+
actions << :patch unless actions.include? :patch
|
77
|
+
actions << :options unless actions.include? :options
|
78
|
+
else
|
79
|
+
# Patron 0.4.20 and up
|
80
|
+
actions << 'PATCH' unless actions.include? 'PATCH'
|
81
|
+
actions << 'OPTIONS' unless actions.include? 'OPTIONS'
|
82
|
+
end
|
61
83
|
end
|
62
84
|
end
|
63
85
|
|
64
|
-
def
|
65
|
-
|
66
|
-
|
67
|
-
|
68
|
-
|
86
|
+
def configure_ssl(session, ssl)
|
87
|
+
if ssl.fetch(:verify, true)
|
88
|
+
session.cacert = ssl[:ca_file]
|
89
|
+
else
|
90
|
+
session.insecure = true
|
91
|
+
end
|
92
|
+
end
|
93
|
+
|
94
|
+
private
|
95
|
+
|
96
|
+
CURL_TIMEOUT_MESSAGES = [
|
97
|
+
'Connection time-out',
|
98
|
+
'Connection timed out',
|
99
|
+
'Timed out before name resolve',
|
100
|
+
'server connect has timed out',
|
101
|
+
'Resolving timed out',
|
102
|
+
'name lookup timed out',
|
103
|
+
'timed out before SSL',
|
104
|
+
'connect() timed out'
|
105
|
+
].freeze
|
106
|
+
|
107
|
+
def connection_timed_out_message?(message)
|
108
|
+
CURL_TIMEOUT_MESSAGES.any? do |curl_message|
|
109
|
+
message.include?(curl_message)
|
110
|
+
end
|
69
111
|
end
|
70
112
|
end
|
71
113
|
end
|