faraday 1.1.0 → 1.5.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +104 -0
- data/README.md +1 -2
- data/lib/faraday.rb +57 -41
- data/lib/faraday/adapter.rb +1 -11
- data/lib/faraday/autoload.rb +1 -8
- data/lib/faraday/connection.rb +10 -3
- data/lib/faraday/dependency_loader.rb +1 -3
- data/lib/faraday/error.rb +12 -0
- data/lib/faraday/methods.rb +6 -0
- data/lib/faraday/middleware.rb +14 -4
- data/lib/faraday/options/proxy_options.rb +4 -0
- data/lib/faraday/request/retry.rb +2 -2
- data/lib/faraday/response.rb +0 -6
- data/lib/faraday/version.rb +5 -0
- data/spec/faraday/connection_spec.rb +45 -0
- data/spec/faraday/error_spec.rb +15 -0
- data/spec/faraday/middleware_spec.rb +32 -6
- data/spec/faraday/options/proxy_options_spec.rb +7 -0
- data/spec/faraday/request/retry_spec.rb +1 -1
- data/spec/faraday/response/raise_error_spec.rb +30 -0
- data/spec/support/shared_examples/adapter.rb +2 -1
- data/spec/support/shared_examples/request_method.rb +36 -8
- metadata +106 -16
- data/lib/faraday/adapter/em_http.rb +0 -286
- data/lib/faraday/adapter/em_http_ssl_patch.rb +0 -62
- data/lib/faraday/adapter/em_synchrony.rb +0 -150
- data/lib/faraday/adapter/em_synchrony/parallel_manager.rb +0 -69
- data/lib/faraday/adapter/excon.rb +0 -124
- data/lib/faraday/adapter/httpclient.rb +0 -152
- data/lib/faraday/adapter/net_http.rb +0 -219
- data/lib/faraday/adapter/net_http_persistent.rb +0 -91
- data/lib/faraday/adapter/patron.rb +0 -132
- data/spec/faraday/adapter/net_http_persistent_spec.rb +0 -57
@@ -1,69 +0,0 @@
|
|
1
|
-
# frozen_string_literal: true
|
2
|
-
|
3
|
-
module Faraday
|
4
|
-
class Adapter
|
5
|
-
class EMSynchrony < Faraday::Adapter
|
6
|
-
# A parallel manager for EMSynchrony.
|
7
|
-
class ParallelManager
|
8
|
-
# Add requests to queue.
|
9
|
-
#
|
10
|
-
# @param request [EM::HttpRequest]
|
11
|
-
# @param method [Symbol, String] HTTP method
|
12
|
-
# @param args [Array] the rest of the positional arguments
|
13
|
-
def add(request, method, *args, &block)
|
14
|
-
queue << {
|
15
|
-
request: request,
|
16
|
-
method: method,
|
17
|
-
args: args,
|
18
|
-
block: block
|
19
|
-
}
|
20
|
-
end
|
21
|
-
|
22
|
-
# Run all requests on queue with `EM::Synchrony::Multi`, wrapping
|
23
|
-
# it in a reactor and fiber if needed.
|
24
|
-
def run
|
25
|
-
result = nil
|
26
|
-
if !EM.reactor_running?
|
27
|
-
EM.run do
|
28
|
-
Fiber.new do
|
29
|
-
result = perform
|
30
|
-
EM.stop
|
31
|
-
end.resume
|
32
|
-
end
|
33
|
-
else
|
34
|
-
result = perform
|
35
|
-
end
|
36
|
-
result
|
37
|
-
end
|
38
|
-
|
39
|
-
private
|
40
|
-
|
41
|
-
# The request queue.
|
42
|
-
def queue
|
43
|
-
@queue ||= []
|
44
|
-
end
|
45
|
-
|
46
|
-
# Main `EM::Synchrony::Multi` performer.
|
47
|
-
def perform
|
48
|
-
multi = ::EM::Synchrony::Multi.new
|
49
|
-
|
50
|
-
queue.each do |item|
|
51
|
-
method = "a#{item[:method]}".to_sym
|
52
|
-
|
53
|
-
req = item[:request].send(method, *item[:args])
|
54
|
-
req.callback(&item[:block])
|
55
|
-
|
56
|
-
req_name = "req_#{multi.requests.size}".to_sym
|
57
|
-
multi.add(req_name, req)
|
58
|
-
end
|
59
|
-
|
60
|
-
# Clear the queue, so parallel manager objects can be reused.
|
61
|
-
@queue = []
|
62
|
-
|
63
|
-
# Block fiber until all requests have returned.
|
64
|
-
multi.perform
|
65
|
-
end
|
66
|
-
end
|
67
|
-
end
|
68
|
-
end
|
69
|
-
end
|
@@ -1,124 +0,0 @@
|
|
1
|
-
# frozen_string_literal: true
|
2
|
-
|
3
|
-
module Faraday
|
4
|
-
class Adapter
|
5
|
-
# Excon adapter.
|
6
|
-
class Excon < Faraday::Adapter
|
7
|
-
dependency 'excon'
|
8
|
-
|
9
|
-
def build_connection(env)
|
10
|
-
opts = opts_from_env(env)
|
11
|
-
::Excon.new(env[:url].to_s, opts.merge(@connection_options))
|
12
|
-
end
|
13
|
-
|
14
|
-
def call(env)
|
15
|
-
super
|
16
|
-
|
17
|
-
req_opts = {
|
18
|
-
method: env[:method].to_s.upcase,
|
19
|
-
headers: env[:request_headers],
|
20
|
-
body: read_body(env)
|
21
|
-
}
|
22
|
-
|
23
|
-
req = env[:request]
|
24
|
-
if req&.stream_response?
|
25
|
-
total = 0
|
26
|
-
req_opts[:response_block] = lambda do |chunk, _remain, _total|
|
27
|
-
req.on_data.call(chunk, total += chunk.size)
|
28
|
-
end
|
29
|
-
end
|
30
|
-
|
31
|
-
resp = connection(env) { |http| http.request(req_opts) }
|
32
|
-
save_response(env, resp.status.to_i, resp.body, resp.headers,
|
33
|
-
resp.reason_phrase)
|
34
|
-
|
35
|
-
@app.call(env)
|
36
|
-
rescue ::Excon::Errors::SocketError => e
|
37
|
-
raise Faraday::TimeoutError, e if e.message.match?(/\btimeout\b/)
|
38
|
-
|
39
|
-
raise Faraday::SSLError, e if e.message.match?(/\bcertificate\b/)
|
40
|
-
|
41
|
-
raise Faraday::ConnectionFailed, e
|
42
|
-
rescue ::Excon::Errors::Timeout => e
|
43
|
-
raise Faraday::TimeoutError, e
|
44
|
-
end
|
45
|
-
|
46
|
-
# TODO: support streaming requests
|
47
|
-
def read_body(env)
|
48
|
-
env[:body].respond_to?(:read) ? env[:body].read : env[:body]
|
49
|
-
end
|
50
|
-
|
51
|
-
private
|
52
|
-
|
53
|
-
def opts_from_env(env)
|
54
|
-
opts = {}
|
55
|
-
amend_opts_with_ssl!(opts, env[:ssl]) if needs_ssl_settings?(env)
|
56
|
-
|
57
|
-
if (req = env[:request])
|
58
|
-
amend_opts_with_timeouts!(opts, req)
|
59
|
-
amend_opts_with_proxy_settings!(opts, req)
|
60
|
-
end
|
61
|
-
|
62
|
-
opts
|
63
|
-
end
|
64
|
-
|
65
|
-
def needs_ssl_settings?(env)
|
66
|
-
env[:url].scheme == 'https' && env[:ssl]
|
67
|
-
end
|
68
|
-
|
69
|
-
OPTS_KEYS = [
|
70
|
-
%i[client_cert client_cert],
|
71
|
-
%i[client_key client_key],
|
72
|
-
%i[certificate certificate],
|
73
|
-
%i[private_key private_key],
|
74
|
-
%i[ssl_ca_path ca_path],
|
75
|
-
%i[ssl_ca_file ca_file],
|
76
|
-
%i[ssl_version version],
|
77
|
-
%i[ssl_min_version min_version],
|
78
|
-
%i[ssl_max_version max_version]
|
79
|
-
].freeze
|
80
|
-
|
81
|
-
def amend_opts_with_ssl!(opts, ssl)
|
82
|
-
opts[:ssl_verify_peer] = !!ssl.fetch(:verify, true)
|
83
|
-
# https://github.com/geemus/excon/issues/106
|
84
|
-
# https://github.com/jruby/jruby-ossl/issues/19
|
85
|
-
opts[:nonblock] = false
|
86
|
-
|
87
|
-
OPTS_KEYS.each do |(key_in_opts, key_in_ssl)|
|
88
|
-
next unless ssl[key_in_ssl]
|
89
|
-
|
90
|
-
opts[key_in_opts] = ssl[key_in_ssl]
|
91
|
-
end
|
92
|
-
end
|
93
|
-
|
94
|
-
def amend_opts_with_timeouts!(opts, req)
|
95
|
-
if (sec = request_timeout(:read, req))
|
96
|
-
opts[:read_timeout] = sec
|
97
|
-
end
|
98
|
-
|
99
|
-
if (sec = request_timeout(:write, req))
|
100
|
-
opts[:write_timeout] = sec
|
101
|
-
end
|
102
|
-
|
103
|
-
return unless (sec = request_timeout(:open, req))
|
104
|
-
|
105
|
-
opts[:connect_timeout] = sec
|
106
|
-
end
|
107
|
-
|
108
|
-
def amend_opts_with_proxy_settings!(opts, req)
|
109
|
-
opts[:proxy] = proxy_settings_for_opts(req[:proxy]) if req[:proxy]
|
110
|
-
end
|
111
|
-
|
112
|
-
def proxy_settings_for_opts(proxy)
|
113
|
-
{
|
114
|
-
host: proxy[:uri].host,
|
115
|
-
hostname: proxy[:uri].hostname,
|
116
|
-
port: proxy[:uri].port,
|
117
|
-
scheme: proxy[:uri].scheme,
|
118
|
-
user: proxy[:user],
|
119
|
-
password: proxy[:password]
|
120
|
-
}
|
121
|
-
end
|
122
|
-
end
|
123
|
-
end
|
124
|
-
end
|
@@ -1,152 +0,0 @@
|
|
1
|
-
# frozen_string_literal: true
|
2
|
-
|
3
|
-
module Faraday
|
4
|
-
class Adapter
|
5
|
-
# HTTPClient adapter.
|
6
|
-
class HTTPClient < Faraday::Adapter
|
7
|
-
dependency 'httpclient'
|
8
|
-
|
9
|
-
def build_connection(env)
|
10
|
-
@client ||= ::HTTPClient.new.tap do |cli|
|
11
|
-
# enable compression
|
12
|
-
cli.transparent_gzip_decompression = true
|
13
|
-
end
|
14
|
-
|
15
|
-
if (req = env[:request])
|
16
|
-
if (proxy = req[:proxy])
|
17
|
-
configure_proxy @client, proxy
|
18
|
-
end
|
19
|
-
|
20
|
-
if (bind = req[:bind])
|
21
|
-
configure_socket @client, bind
|
22
|
-
end
|
23
|
-
|
24
|
-
configure_timeouts @client, req
|
25
|
-
end
|
26
|
-
|
27
|
-
if env[:url].scheme == 'https' && (ssl = env[:ssl])
|
28
|
-
configure_ssl @client, ssl
|
29
|
-
end
|
30
|
-
|
31
|
-
configure_client @client
|
32
|
-
|
33
|
-
@client
|
34
|
-
end
|
35
|
-
|
36
|
-
def call(env)
|
37
|
-
super
|
38
|
-
|
39
|
-
# TODO: Don't stream yet.
|
40
|
-
# https://github.com/nahi/httpclient/pull/90
|
41
|
-
env[:body] = env[:body].read if env[:body].respond_to? :read
|
42
|
-
|
43
|
-
connection(env) do |http|
|
44
|
-
resp = http.request env[:method], env[:url],
|
45
|
-
body: env[:body],
|
46
|
-
header: env[:request_headers]
|
47
|
-
|
48
|
-
if (req = env[:request]).stream_response?
|
49
|
-
warn "Streaming downloads for #{self.class.name} " \
|
50
|
-
'are not yet implemented.'
|
51
|
-
req.on_data.call(resp.body, resp.body.bytesize)
|
52
|
-
end
|
53
|
-
save_response env, resp.status, resp.body, resp.headers, resp.reason
|
54
|
-
|
55
|
-
@app.call env
|
56
|
-
end
|
57
|
-
rescue ::HTTPClient::TimeoutError, Errno::ETIMEDOUT
|
58
|
-
raise Faraday::TimeoutError, $ERROR_INFO
|
59
|
-
rescue ::HTTPClient::BadResponseError => e
|
60
|
-
if e.message.include?('status 407')
|
61
|
-
raise Faraday::ConnectionFailed,
|
62
|
-
%(407 "Proxy Authentication Required ")
|
63
|
-
end
|
64
|
-
|
65
|
-
raise Faraday::ClientError, $ERROR_INFO
|
66
|
-
rescue Errno::EADDRNOTAVAIL, Errno::ECONNREFUSED, IOError, SocketError
|
67
|
-
raise Faraday::ConnectionFailed, $ERROR_INFO
|
68
|
-
rescue StandardError => e
|
69
|
-
if defined?(::OpenSSL::SSL::SSLError) && \
|
70
|
-
e.is_a?(::OpenSSL::SSL::SSLError)
|
71
|
-
raise Faraday::SSLError, e
|
72
|
-
end
|
73
|
-
|
74
|
-
raise
|
75
|
-
end
|
76
|
-
|
77
|
-
# @param bind [Hash]
|
78
|
-
def configure_socket(client, bind)
|
79
|
-
client.socket_local.host = bind[:host]
|
80
|
-
client.socket_local.port = bind[:port]
|
81
|
-
end
|
82
|
-
|
83
|
-
# Configure proxy URI and any user credentials.
|
84
|
-
#
|
85
|
-
# @param proxy [Hash]
|
86
|
-
def configure_proxy(client, proxy)
|
87
|
-
client.proxy = proxy[:uri]
|
88
|
-
return unless proxy[:user] && proxy[:password]
|
89
|
-
|
90
|
-
client.set_proxy_auth(proxy[:user], proxy[:password])
|
91
|
-
end
|
92
|
-
|
93
|
-
# @param ssl [Hash]
|
94
|
-
def configure_ssl(client, ssl)
|
95
|
-
ssl_config = client.ssl_config
|
96
|
-
ssl_config.verify_mode = ssl_verify_mode(ssl)
|
97
|
-
ssl_config.cert_store = ssl_cert_store(ssl)
|
98
|
-
|
99
|
-
ssl_config.add_trust_ca ssl[:ca_file] if ssl[:ca_file]
|
100
|
-
ssl_config.add_trust_ca ssl[:ca_path] if ssl[:ca_path]
|
101
|
-
ssl_config.client_cert = ssl[:client_cert] if ssl[:client_cert]
|
102
|
-
ssl_config.client_key = ssl[:client_key] if ssl[:client_key]
|
103
|
-
ssl_config.verify_depth = ssl[:verify_depth] if ssl[:verify_depth]
|
104
|
-
end
|
105
|
-
|
106
|
-
# @param req [Hash]
|
107
|
-
def configure_timeouts(client, req)
|
108
|
-
if (sec = request_timeout(:open, req))
|
109
|
-
client.connect_timeout = sec
|
110
|
-
end
|
111
|
-
|
112
|
-
if (sec = request_timeout(:write, req))
|
113
|
-
client.send_timeout = sec
|
114
|
-
end
|
115
|
-
|
116
|
-
return unless (sec = request_timeout(:read, req))
|
117
|
-
|
118
|
-
client.receive_timeout = sec
|
119
|
-
end
|
120
|
-
|
121
|
-
def configure_client(client)
|
122
|
-
@config_block&.call(client)
|
123
|
-
end
|
124
|
-
|
125
|
-
# @param ssl [Hash]
|
126
|
-
# @return [OpenSSL::X509::Store]
|
127
|
-
def ssl_cert_store(ssl)
|
128
|
-
return ssl[:cert_store] if ssl[:cert_store]
|
129
|
-
|
130
|
-
# Memoize the cert store so that the same one is passed to
|
131
|
-
# HTTPClient each time, to avoid resyncing SSL sessions when
|
132
|
-
# it's changed
|
133
|
-
@ssl_cert_store ||= begin
|
134
|
-
# Use the default cert store by default, i.e. system ca certs
|
135
|
-
OpenSSL::X509::Store.new.tap(&:set_default_paths)
|
136
|
-
end
|
137
|
-
end
|
138
|
-
|
139
|
-
# @param ssl [Hash]
|
140
|
-
def ssl_verify_mode(ssl)
|
141
|
-
ssl[:verify_mode] || begin
|
142
|
-
if ssl.fetch(:verify, true)
|
143
|
-
OpenSSL::SSL::VERIFY_PEER |
|
144
|
-
OpenSSL::SSL::VERIFY_FAIL_IF_NO_PEER_CERT
|
145
|
-
else
|
146
|
-
OpenSSL::SSL::VERIFY_NONE
|
147
|
-
end
|
148
|
-
end
|
149
|
-
end
|
150
|
-
end
|
151
|
-
end
|
152
|
-
end
|
@@ -1,219 +0,0 @@
|
|
1
|
-
# frozen_string_literal: true
|
2
|
-
|
3
|
-
begin
|
4
|
-
require 'net/https'
|
5
|
-
rescue LoadError
|
6
|
-
warn 'Warning: no such file to load -- net/https. ' \
|
7
|
-
'Make sure openssl is installed if you want ssl support'
|
8
|
-
require 'net/http'
|
9
|
-
end
|
10
|
-
require 'zlib'
|
11
|
-
|
12
|
-
module Faraday
|
13
|
-
class Adapter
|
14
|
-
# Net::HTTP adapter.
|
15
|
-
class NetHttp < Faraday::Adapter
|
16
|
-
exceptions = [
|
17
|
-
IOError,
|
18
|
-
Errno::EADDRNOTAVAIL,
|
19
|
-
Errno::ECONNABORTED,
|
20
|
-
Errno::ECONNREFUSED,
|
21
|
-
Errno::ECONNRESET,
|
22
|
-
Errno::EHOSTUNREACH,
|
23
|
-
Errno::EINVAL,
|
24
|
-
Errno::ENETUNREACH,
|
25
|
-
Errno::EPIPE,
|
26
|
-
Net::HTTPBadResponse,
|
27
|
-
Net::HTTPHeaderSyntaxError,
|
28
|
-
Net::ProtocolError,
|
29
|
-
SocketError,
|
30
|
-
Zlib::GzipFile::Error
|
31
|
-
]
|
32
|
-
|
33
|
-
if defined?(::OpenSSL::SSL::SSLError)
|
34
|
-
exceptions << ::OpenSSL::SSL::SSLError
|
35
|
-
end
|
36
|
-
exceptions << ::Net::OpenTimeout if defined?(::Net::OpenTimeout)
|
37
|
-
|
38
|
-
NET_HTTP_EXCEPTIONS = exceptions.freeze
|
39
|
-
|
40
|
-
def initialize(app = nil, opts = {}, &block)
|
41
|
-
@ssl_cert_store = nil
|
42
|
-
super(app, opts, &block)
|
43
|
-
end
|
44
|
-
|
45
|
-
def build_connection(env)
|
46
|
-
net_http_connection(env).tap do |http|
|
47
|
-
if http.respond_to?(:use_ssl=)
|
48
|
-
http.use_ssl = env[:url].scheme == 'https'
|
49
|
-
end
|
50
|
-
configure_ssl(http, env[:ssl])
|
51
|
-
configure_request(http, env[:request])
|
52
|
-
end
|
53
|
-
end
|
54
|
-
|
55
|
-
def net_http_connection(env)
|
56
|
-
klass = if (proxy = env[:request][:proxy])
|
57
|
-
Net::HTTP::Proxy(proxy[:uri].hostname, proxy[:uri].port,
|
58
|
-
proxy[:user], proxy[:password])
|
59
|
-
else
|
60
|
-
Net::HTTP
|
61
|
-
end
|
62
|
-
port = env[:url].port || (env[:url].scheme == 'https' ? 443 : 80)
|
63
|
-
klass.new(env[:url].hostname, port)
|
64
|
-
end
|
65
|
-
|
66
|
-
def call(env)
|
67
|
-
super
|
68
|
-
http_response = connection(env) do |http|
|
69
|
-
begin
|
70
|
-
perform_request(http, env)
|
71
|
-
rescue *NET_HTTP_EXCEPTIONS => e
|
72
|
-
if defined?(OpenSSL) && e.is_a?(OpenSSL::SSL::SSLError)
|
73
|
-
raise Faraday::SSLError, e
|
74
|
-
end
|
75
|
-
|
76
|
-
raise Faraday::ConnectionFailed, e
|
77
|
-
end
|
78
|
-
end
|
79
|
-
|
80
|
-
save_response(env, http_response.code.to_i,
|
81
|
-
http_response.body || +'', nil,
|
82
|
-
http_response.message) do |response_headers|
|
83
|
-
http_response.each_header do |key, value|
|
84
|
-
response_headers[key] = value
|
85
|
-
end
|
86
|
-
end
|
87
|
-
|
88
|
-
@app.call env
|
89
|
-
rescue Timeout::Error, Errno::ETIMEDOUT => e
|
90
|
-
raise Faraday::TimeoutError, e
|
91
|
-
end
|
92
|
-
|
93
|
-
private
|
94
|
-
|
95
|
-
def create_request(env)
|
96
|
-
request = Net::HTTPGenericRequest.new \
|
97
|
-
env[:method].to_s.upcase, # request method
|
98
|
-
!!env[:body], # is there request body
|
99
|
-
env[:method] != :head, # is there response body
|
100
|
-
env[:url].request_uri, # request uri path
|
101
|
-
env[:request_headers] # request headers
|
102
|
-
|
103
|
-
if env[:body].respond_to?(:read)
|
104
|
-
request.body_stream = env[:body]
|
105
|
-
else
|
106
|
-
request.body = env[:body]
|
107
|
-
end
|
108
|
-
request
|
109
|
-
end
|
110
|
-
|
111
|
-
def perform_request(http, env)
|
112
|
-
if env[:request].stream_response?
|
113
|
-
size = 0
|
114
|
-
yielded = false
|
115
|
-
http_response = request_with_wrapped_block(http, env) do |chunk|
|
116
|
-
if chunk.bytesize.positive? || size.positive?
|
117
|
-
yielded = true
|
118
|
-
size += chunk.bytesize
|
119
|
-
env[:request].on_data.call(chunk, size)
|
120
|
-
end
|
121
|
-
end
|
122
|
-
env[:request].on_data.call(+'', 0) unless yielded
|
123
|
-
# Net::HTTP returns something,
|
124
|
-
# but it's not meaningful according to the docs.
|
125
|
-
http_response.body = nil
|
126
|
-
http_response
|
127
|
-
else
|
128
|
-
request_with_wrapped_block(http, env)
|
129
|
-
end
|
130
|
-
end
|
131
|
-
|
132
|
-
def request_with_wrapped_block(http, env, &block)
|
133
|
-
if (env[:method] == :get) && !env[:body]
|
134
|
-
# prefer `get` to `request` because the former handles gzip (ruby 1.9)
|
135
|
-
request_via_get_method(http, env, &block)
|
136
|
-
else
|
137
|
-
request_via_request_method(http, env, &block)
|
138
|
-
end
|
139
|
-
end
|
140
|
-
|
141
|
-
def request_via_get_method(http, env, &block)
|
142
|
-
# Must use Net::HTTP#start and pass it a block otherwise the server's
|
143
|
-
# TCP socket does not close correctly.
|
144
|
-
http.start do |opened_http|
|
145
|
-
opened_http.get env[:url].request_uri, env[:request_headers], &block
|
146
|
-
end
|
147
|
-
end
|
148
|
-
|
149
|
-
def request_via_request_method(http, env, &block)
|
150
|
-
# Must use Net::HTTP#start and pass it a block otherwise the server's
|
151
|
-
# TCP socket does not close correctly.
|
152
|
-
http.start do |opened_http|
|
153
|
-
if block_given?
|
154
|
-
opened_http.request create_request(env) do |response|
|
155
|
-
response.read_body(&block)
|
156
|
-
end
|
157
|
-
else
|
158
|
-
opened_http.request create_request(env)
|
159
|
-
end
|
160
|
-
end
|
161
|
-
end
|
162
|
-
|
163
|
-
def configure_ssl(http, ssl)
|
164
|
-
return unless ssl
|
165
|
-
|
166
|
-
http.verify_mode = ssl_verify_mode(ssl)
|
167
|
-
http.cert_store = ssl_cert_store(ssl)
|
168
|
-
|
169
|
-
http.cert = ssl[:client_cert] if ssl[:client_cert]
|
170
|
-
http.key = ssl[:client_key] if ssl[:client_key]
|
171
|
-
http.ca_file = ssl[:ca_file] if ssl[:ca_file]
|
172
|
-
http.ca_path = ssl[:ca_path] if ssl[:ca_path]
|
173
|
-
http.verify_depth = ssl[:verify_depth] if ssl[:verify_depth]
|
174
|
-
http.ssl_version = ssl[:version] if ssl[:version]
|
175
|
-
http.min_version = ssl[:min_version] if ssl[:min_version]
|
176
|
-
http.max_version = ssl[:max_version] if ssl[:max_version]
|
177
|
-
end
|
178
|
-
|
179
|
-
def configure_request(http, req)
|
180
|
-
if (sec = request_timeout(:read, req))
|
181
|
-
http.read_timeout = sec
|
182
|
-
end
|
183
|
-
|
184
|
-
if (sec = http.respond_to?(:write_timeout=) &&
|
185
|
-
request_timeout(:write, req))
|
186
|
-
http.write_timeout = sec
|
187
|
-
end
|
188
|
-
|
189
|
-
if (sec = request_timeout(:open, req))
|
190
|
-
http.open_timeout = sec
|
191
|
-
end
|
192
|
-
|
193
|
-
# Only set if Net::Http supports it, since Ruby 2.5.
|
194
|
-
http.max_retries = 0 if http.respond_to?(:max_retries=)
|
195
|
-
|
196
|
-
@config_block&.call(http)
|
197
|
-
end
|
198
|
-
|
199
|
-
def ssl_cert_store(ssl)
|
200
|
-
return ssl[:cert_store] if ssl[:cert_store]
|
201
|
-
|
202
|
-
@ssl_cert_store ||= begin
|
203
|
-
# Use the default cert store by default, i.e. system ca certs
|
204
|
-
OpenSSL::X509::Store.new.tap(&:set_default_paths)
|
205
|
-
end
|
206
|
-
end
|
207
|
-
|
208
|
-
def ssl_verify_mode(ssl)
|
209
|
-
ssl[:verify_mode] || begin
|
210
|
-
if ssl.fetch(:verify, true)
|
211
|
-
OpenSSL::SSL::VERIFY_PEER
|
212
|
-
else
|
213
|
-
OpenSSL::SSL::VERIFY_NONE
|
214
|
-
end
|
215
|
-
end
|
216
|
-
end
|
217
|
-
end
|
218
|
-
end
|
219
|
-
end
|