faraday 1.1.0 → 1.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +104 -0
- data/README.md +1 -2
- data/lib/faraday.rb +57 -41
- data/lib/faraday/adapter.rb +1 -11
- data/lib/faraday/autoload.rb +1 -8
- data/lib/faraday/connection.rb +10 -3
- data/lib/faraday/dependency_loader.rb +1 -3
- data/lib/faraday/error.rb +12 -0
- data/lib/faraday/methods.rb +6 -0
- data/lib/faraday/middleware.rb +14 -4
- data/lib/faraday/options/proxy_options.rb +4 -0
- data/lib/faraday/request/retry.rb +2 -2
- data/lib/faraday/response.rb +0 -6
- data/lib/faraday/version.rb +5 -0
- data/spec/faraday/connection_spec.rb +45 -0
- data/spec/faraday/error_spec.rb +15 -0
- data/spec/faraday/middleware_spec.rb +32 -6
- data/spec/faraday/options/proxy_options_spec.rb +7 -0
- data/spec/faraday/request/retry_spec.rb +1 -1
- data/spec/faraday/response/raise_error_spec.rb +30 -0
- data/spec/support/shared_examples/adapter.rb +2 -1
- data/spec/support/shared_examples/request_method.rb +36 -8
- metadata +106 -16
- data/lib/faraday/adapter/em_http.rb +0 -286
- data/lib/faraday/adapter/em_http_ssl_patch.rb +0 -62
- data/lib/faraday/adapter/em_synchrony.rb +0 -150
- data/lib/faraday/adapter/em_synchrony/parallel_manager.rb +0 -69
- data/lib/faraday/adapter/excon.rb +0 -124
- data/lib/faraday/adapter/httpclient.rb +0 -152
- data/lib/faraday/adapter/net_http.rb +0 -219
- data/lib/faraday/adapter/net_http_persistent.rb +0 -91
- data/lib/faraday/adapter/patron.rb +0 -132
- data/spec/faraday/adapter/net_http_persistent_spec.rb +0 -57
@@ -1,69 +0,0 @@
|
|
1
|
-
# frozen_string_literal: true
|
2
|
-
|
3
|
-
module Faraday
|
4
|
-
class Adapter
|
5
|
-
class EMSynchrony < Faraday::Adapter
|
6
|
-
# A parallel manager for EMSynchrony.
|
7
|
-
class ParallelManager
|
8
|
-
# Add requests to queue.
|
9
|
-
#
|
10
|
-
# @param request [EM::HttpRequest]
|
11
|
-
# @param method [Symbol, String] HTTP method
|
12
|
-
# @param args [Array] the rest of the positional arguments
|
13
|
-
def add(request, method, *args, &block)
|
14
|
-
queue << {
|
15
|
-
request: request,
|
16
|
-
method: method,
|
17
|
-
args: args,
|
18
|
-
block: block
|
19
|
-
}
|
20
|
-
end
|
21
|
-
|
22
|
-
# Run all requests on queue with `EM::Synchrony::Multi`, wrapping
|
23
|
-
# it in a reactor and fiber if needed.
|
24
|
-
def run
|
25
|
-
result = nil
|
26
|
-
if !EM.reactor_running?
|
27
|
-
EM.run do
|
28
|
-
Fiber.new do
|
29
|
-
result = perform
|
30
|
-
EM.stop
|
31
|
-
end.resume
|
32
|
-
end
|
33
|
-
else
|
34
|
-
result = perform
|
35
|
-
end
|
36
|
-
result
|
37
|
-
end
|
38
|
-
|
39
|
-
private
|
40
|
-
|
41
|
-
# The request queue.
|
42
|
-
def queue
|
43
|
-
@queue ||= []
|
44
|
-
end
|
45
|
-
|
46
|
-
# Main `EM::Synchrony::Multi` performer.
|
47
|
-
def perform
|
48
|
-
multi = ::EM::Synchrony::Multi.new
|
49
|
-
|
50
|
-
queue.each do |item|
|
51
|
-
method = "a#{item[:method]}".to_sym
|
52
|
-
|
53
|
-
req = item[:request].send(method, *item[:args])
|
54
|
-
req.callback(&item[:block])
|
55
|
-
|
56
|
-
req_name = "req_#{multi.requests.size}".to_sym
|
57
|
-
multi.add(req_name, req)
|
58
|
-
end
|
59
|
-
|
60
|
-
# Clear the queue, so parallel manager objects can be reused.
|
61
|
-
@queue = []
|
62
|
-
|
63
|
-
# Block fiber until all requests have returned.
|
64
|
-
multi.perform
|
65
|
-
end
|
66
|
-
end
|
67
|
-
end
|
68
|
-
end
|
69
|
-
end
|
@@ -1,124 +0,0 @@
|
|
1
|
-
# frozen_string_literal: true
|
2
|
-
|
3
|
-
module Faraday
|
4
|
-
class Adapter
|
5
|
-
# Excon adapter.
|
6
|
-
class Excon < Faraday::Adapter
|
7
|
-
dependency 'excon'
|
8
|
-
|
9
|
-
def build_connection(env)
|
10
|
-
opts = opts_from_env(env)
|
11
|
-
::Excon.new(env[:url].to_s, opts.merge(@connection_options))
|
12
|
-
end
|
13
|
-
|
14
|
-
def call(env)
|
15
|
-
super
|
16
|
-
|
17
|
-
req_opts = {
|
18
|
-
method: env[:method].to_s.upcase,
|
19
|
-
headers: env[:request_headers],
|
20
|
-
body: read_body(env)
|
21
|
-
}
|
22
|
-
|
23
|
-
req = env[:request]
|
24
|
-
if req&.stream_response?
|
25
|
-
total = 0
|
26
|
-
req_opts[:response_block] = lambda do |chunk, _remain, _total|
|
27
|
-
req.on_data.call(chunk, total += chunk.size)
|
28
|
-
end
|
29
|
-
end
|
30
|
-
|
31
|
-
resp = connection(env) { |http| http.request(req_opts) }
|
32
|
-
save_response(env, resp.status.to_i, resp.body, resp.headers,
|
33
|
-
resp.reason_phrase)
|
34
|
-
|
35
|
-
@app.call(env)
|
36
|
-
rescue ::Excon::Errors::SocketError => e
|
37
|
-
raise Faraday::TimeoutError, e if e.message.match?(/\btimeout\b/)
|
38
|
-
|
39
|
-
raise Faraday::SSLError, e if e.message.match?(/\bcertificate\b/)
|
40
|
-
|
41
|
-
raise Faraday::ConnectionFailed, e
|
42
|
-
rescue ::Excon::Errors::Timeout => e
|
43
|
-
raise Faraday::TimeoutError, e
|
44
|
-
end
|
45
|
-
|
46
|
-
# TODO: support streaming requests
|
47
|
-
def read_body(env)
|
48
|
-
env[:body].respond_to?(:read) ? env[:body].read : env[:body]
|
49
|
-
end
|
50
|
-
|
51
|
-
private
|
52
|
-
|
53
|
-
def opts_from_env(env)
|
54
|
-
opts = {}
|
55
|
-
amend_opts_with_ssl!(opts, env[:ssl]) if needs_ssl_settings?(env)
|
56
|
-
|
57
|
-
if (req = env[:request])
|
58
|
-
amend_opts_with_timeouts!(opts, req)
|
59
|
-
amend_opts_with_proxy_settings!(opts, req)
|
60
|
-
end
|
61
|
-
|
62
|
-
opts
|
63
|
-
end
|
64
|
-
|
65
|
-
def needs_ssl_settings?(env)
|
66
|
-
env[:url].scheme == 'https' && env[:ssl]
|
67
|
-
end
|
68
|
-
|
69
|
-
OPTS_KEYS = [
|
70
|
-
%i[client_cert client_cert],
|
71
|
-
%i[client_key client_key],
|
72
|
-
%i[certificate certificate],
|
73
|
-
%i[private_key private_key],
|
74
|
-
%i[ssl_ca_path ca_path],
|
75
|
-
%i[ssl_ca_file ca_file],
|
76
|
-
%i[ssl_version version],
|
77
|
-
%i[ssl_min_version min_version],
|
78
|
-
%i[ssl_max_version max_version]
|
79
|
-
].freeze
|
80
|
-
|
81
|
-
def amend_opts_with_ssl!(opts, ssl)
|
82
|
-
opts[:ssl_verify_peer] = !!ssl.fetch(:verify, true)
|
83
|
-
# https://github.com/geemus/excon/issues/106
|
84
|
-
# https://github.com/jruby/jruby-ossl/issues/19
|
85
|
-
opts[:nonblock] = false
|
86
|
-
|
87
|
-
OPTS_KEYS.each do |(key_in_opts, key_in_ssl)|
|
88
|
-
next unless ssl[key_in_ssl]
|
89
|
-
|
90
|
-
opts[key_in_opts] = ssl[key_in_ssl]
|
91
|
-
end
|
92
|
-
end
|
93
|
-
|
94
|
-
def amend_opts_with_timeouts!(opts, req)
|
95
|
-
if (sec = request_timeout(:read, req))
|
96
|
-
opts[:read_timeout] = sec
|
97
|
-
end
|
98
|
-
|
99
|
-
if (sec = request_timeout(:write, req))
|
100
|
-
opts[:write_timeout] = sec
|
101
|
-
end
|
102
|
-
|
103
|
-
return unless (sec = request_timeout(:open, req))
|
104
|
-
|
105
|
-
opts[:connect_timeout] = sec
|
106
|
-
end
|
107
|
-
|
108
|
-
def amend_opts_with_proxy_settings!(opts, req)
|
109
|
-
opts[:proxy] = proxy_settings_for_opts(req[:proxy]) if req[:proxy]
|
110
|
-
end
|
111
|
-
|
112
|
-
def proxy_settings_for_opts(proxy)
|
113
|
-
{
|
114
|
-
host: proxy[:uri].host,
|
115
|
-
hostname: proxy[:uri].hostname,
|
116
|
-
port: proxy[:uri].port,
|
117
|
-
scheme: proxy[:uri].scheme,
|
118
|
-
user: proxy[:user],
|
119
|
-
password: proxy[:password]
|
120
|
-
}
|
121
|
-
end
|
122
|
-
end
|
123
|
-
end
|
124
|
-
end
|
@@ -1,152 +0,0 @@
|
|
1
|
-
# frozen_string_literal: true
|
2
|
-
|
3
|
-
module Faraday
|
4
|
-
class Adapter
|
5
|
-
# HTTPClient adapter.
|
6
|
-
class HTTPClient < Faraday::Adapter
|
7
|
-
dependency 'httpclient'
|
8
|
-
|
9
|
-
def build_connection(env)
|
10
|
-
@client ||= ::HTTPClient.new.tap do |cli|
|
11
|
-
# enable compression
|
12
|
-
cli.transparent_gzip_decompression = true
|
13
|
-
end
|
14
|
-
|
15
|
-
if (req = env[:request])
|
16
|
-
if (proxy = req[:proxy])
|
17
|
-
configure_proxy @client, proxy
|
18
|
-
end
|
19
|
-
|
20
|
-
if (bind = req[:bind])
|
21
|
-
configure_socket @client, bind
|
22
|
-
end
|
23
|
-
|
24
|
-
configure_timeouts @client, req
|
25
|
-
end
|
26
|
-
|
27
|
-
if env[:url].scheme == 'https' && (ssl = env[:ssl])
|
28
|
-
configure_ssl @client, ssl
|
29
|
-
end
|
30
|
-
|
31
|
-
configure_client @client
|
32
|
-
|
33
|
-
@client
|
34
|
-
end
|
35
|
-
|
36
|
-
def call(env)
|
37
|
-
super
|
38
|
-
|
39
|
-
# TODO: Don't stream yet.
|
40
|
-
# https://github.com/nahi/httpclient/pull/90
|
41
|
-
env[:body] = env[:body].read if env[:body].respond_to? :read
|
42
|
-
|
43
|
-
connection(env) do |http|
|
44
|
-
resp = http.request env[:method], env[:url],
|
45
|
-
body: env[:body],
|
46
|
-
header: env[:request_headers]
|
47
|
-
|
48
|
-
if (req = env[:request]).stream_response?
|
49
|
-
warn "Streaming downloads for #{self.class.name} " \
|
50
|
-
'are not yet implemented.'
|
51
|
-
req.on_data.call(resp.body, resp.body.bytesize)
|
52
|
-
end
|
53
|
-
save_response env, resp.status, resp.body, resp.headers, resp.reason
|
54
|
-
|
55
|
-
@app.call env
|
56
|
-
end
|
57
|
-
rescue ::HTTPClient::TimeoutError, Errno::ETIMEDOUT
|
58
|
-
raise Faraday::TimeoutError, $ERROR_INFO
|
59
|
-
rescue ::HTTPClient::BadResponseError => e
|
60
|
-
if e.message.include?('status 407')
|
61
|
-
raise Faraday::ConnectionFailed,
|
62
|
-
%(407 "Proxy Authentication Required ")
|
63
|
-
end
|
64
|
-
|
65
|
-
raise Faraday::ClientError, $ERROR_INFO
|
66
|
-
rescue Errno::EADDRNOTAVAIL, Errno::ECONNREFUSED, IOError, SocketError
|
67
|
-
raise Faraday::ConnectionFailed, $ERROR_INFO
|
68
|
-
rescue StandardError => e
|
69
|
-
if defined?(::OpenSSL::SSL::SSLError) && \
|
70
|
-
e.is_a?(::OpenSSL::SSL::SSLError)
|
71
|
-
raise Faraday::SSLError, e
|
72
|
-
end
|
73
|
-
|
74
|
-
raise
|
75
|
-
end
|
76
|
-
|
77
|
-
# @param bind [Hash]
|
78
|
-
def configure_socket(client, bind)
|
79
|
-
client.socket_local.host = bind[:host]
|
80
|
-
client.socket_local.port = bind[:port]
|
81
|
-
end
|
82
|
-
|
83
|
-
# Configure proxy URI and any user credentials.
|
84
|
-
#
|
85
|
-
# @param proxy [Hash]
|
86
|
-
def configure_proxy(client, proxy)
|
87
|
-
client.proxy = proxy[:uri]
|
88
|
-
return unless proxy[:user] && proxy[:password]
|
89
|
-
|
90
|
-
client.set_proxy_auth(proxy[:user], proxy[:password])
|
91
|
-
end
|
92
|
-
|
93
|
-
# @param ssl [Hash]
|
94
|
-
def configure_ssl(client, ssl)
|
95
|
-
ssl_config = client.ssl_config
|
96
|
-
ssl_config.verify_mode = ssl_verify_mode(ssl)
|
97
|
-
ssl_config.cert_store = ssl_cert_store(ssl)
|
98
|
-
|
99
|
-
ssl_config.add_trust_ca ssl[:ca_file] if ssl[:ca_file]
|
100
|
-
ssl_config.add_trust_ca ssl[:ca_path] if ssl[:ca_path]
|
101
|
-
ssl_config.client_cert = ssl[:client_cert] if ssl[:client_cert]
|
102
|
-
ssl_config.client_key = ssl[:client_key] if ssl[:client_key]
|
103
|
-
ssl_config.verify_depth = ssl[:verify_depth] if ssl[:verify_depth]
|
104
|
-
end
|
105
|
-
|
106
|
-
# @param req [Hash]
|
107
|
-
def configure_timeouts(client, req)
|
108
|
-
if (sec = request_timeout(:open, req))
|
109
|
-
client.connect_timeout = sec
|
110
|
-
end
|
111
|
-
|
112
|
-
if (sec = request_timeout(:write, req))
|
113
|
-
client.send_timeout = sec
|
114
|
-
end
|
115
|
-
|
116
|
-
return unless (sec = request_timeout(:read, req))
|
117
|
-
|
118
|
-
client.receive_timeout = sec
|
119
|
-
end
|
120
|
-
|
121
|
-
def configure_client(client)
|
122
|
-
@config_block&.call(client)
|
123
|
-
end
|
124
|
-
|
125
|
-
# @param ssl [Hash]
|
126
|
-
# @return [OpenSSL::X509::Store]
|
127
|
-
def ssl_cert_store(ssl)
|
128
|
-
return ssl[:cert_store] if ssl[:cert_store]
|
129
|
-
|
130
|
-
# Memoize the cert store so that the same one is passed to
|
131
|
-
# HTTPClient each time, to avoid resyncing SSL sessions when
|
132
|
-
# it's changed
|
133
|
-
@ssl_cert_store ||= begin
|
134
|
-
# Use the default cert store by default, i.e. system ca certs
|
135
|
-
OpenSSL::X509::Store.new.tap(&:set_default_paths)
|
136
|
-
end
|
137
|
-
end
|
138
|
-
|
139
|
-
# @param ssl [Hash]
|
140
|
-
def ssl_verify_mode(ssl)
|
141
|
-
ssl[:verify_mode] || begin
|
142
|
-
if ssl.fetch(:verify, true)
|
143
|
-
OpenSSL::SSL::VERIFY_PEER |
|
144
|
-
OpenSSL::SSL::VERIFY_FAIL_IF_NO_PEER_CERT
|
145
|
-
else
|
146
|
-
OpenSSL::SSL::VERIFY_NONE
|
147
|
-
end
|
148
|
-
end
|
149
|
-
end
|
150
|
-
end
|
151
|
-
end
|
152
|
-
end
|
@@ -1,219 +0,0 @@
|
|
1
|
-
# frozen_string_literal: true
|
2
|
-
|
3
|
-
begin
|
4
|
-
require 'net/https'
|
5
|
-
rescue LoadError
|
6
|
-
warn 'Warning: no such file to load -- net/https. ' \
|
7
|
-
'Make sure openssl is installed if you want ssl support'
|
8
|
-
require 'net/http'
|
9
|
-
end
|
10
|
-
require 'zlib'
|
11
|
-
|
12
|
-
module Faraday
|
13
|
-
class Adapter
|
14
|
-
# Net::HTTP adapter.
|
15
|
-
class NetHttp < Faraday::Adapter
|
16
|
-
exceptions = [
|
17
|
-
IOError,
|
18
|
-
Errno::EADDRNOTAVAIL,
|
19
|
-
Errno::ECONNABORTED,
|
20
|
-
Errno::ECONNREFUSED,
|
21
|
-
Errno::ECONNRESET,
|
22
|
-
Errno::EHOSTUNREACH,
|
23
|
-
Errno::EINVAL,
|
24
|
-
Errno::ENETUNREACH,
|
25
|
-
Errno::EPIPE,
|
26
|
-
Net::HTTPBadResponse,
|
27
|
-
Net::HTTPHeaderSyntaxError,
|
28
|
-
Net::ProtocolError,
|
29
|
-
SocketError,
|
30
|
-
Zlib::GzipFile::Error
|
31
|
-
]
|
32
|
-
|
33
|
-
if defined?(::OpenSSL::SSL::SSLError)
|
34
|
-
exceptions << ::OpenSSL::SSL::SSLError
|
35
|
-
end
|
36
|
-
exceptions << ::Net::OpenTimeout if defined?(::Net::OpenTimeout)
|
37
|
-
|
38
|
-
NET_HTTP_EXCEPTIONS = exceptions.freeze
|
39
|
-
|
40
|
-
def initialize(app = nil, opts = {}, &block)
|
41
|
-
@ssl_cert_store = nil
|
42
|
-
super(app, opts, &block)
|
43
|
-
end
|
44
|
-
|
45
|
-
def build_connection(env)
|
46
|
-
net_http_connection(env).tap do |http|
|
47
|
-
if http.respond_to?(:use_ssl=)
|
48
|
-
http.use_ssl = env[:url].scheme == 'https'
|
49
|
-
end
|
50
|
-
configure_ssl(http, env[:ssl])
|
51
|
-
configure_request(http, env[:request])
|
52
|
-
end
|
53
|
-
end
|
54
|
-
|
55
|
-
def net_http_connection(env)
|
56
|
-
klass = if (proxy = env[:request][:proxy])
|
57
|
-
Net::HTTP::Proxy(proxy[:uri].hostname, proxy[:uri].port,
|
58
|
-
proxy[:user], proxy[:password])
|
59
|
-
else
|
60
|
-
Net::HTTP
|
61
|
-
end
|
62
|
-
port = env[:url].port || (env[:url].scheme == 'https' ? 443 : 80)
|
63
|
-
klass.new(env[:url].hostname, port)
|
64
|
-
end
|
65
|
-
|
66
|
-
def call(env)
|
67
|
-
super
|
68
|
-
http_response = connection(env) do |http|
|
69
|
-
begin
|
70
|
-
perform_request(http, env)
|
71
|
-
rescue *NET_HTTP_EXCEPTIONS => e
|
72
|
-
if defined?(OpenSSL) && e.is_a?(OpenSSL::SSL::SSLError)
|
73
|
-
raise Faraday::SSLError, e
|
74
|
-
end
|
75
|
-
|
76
|
-
raise Faraday::ConnectionFailed, e
|
77
|
-
end
|
78
|
-
end
|
79
|
-
|
80
|
-
save_response(env, http_response.code.to_i,
|
81
|
-
http_response.body || +'', nil,
|
82
|
-
http_response.message) do |response_headers|
|
83
|
-
http_response.each_header do |key, value|
|
84
|
-
response_headers[key] = value
|
85
|
-
end
|
86
|
-
end
|
87
|
-
|
88
|
-
@app.call env
|
89
|
-
rescue Timeout::Error, Errno::ETIMEDOUT => e
|
90
|
-
raise Faraday::TimeoutError, e
|
91
|
-
end
|
92
|
-
|
93
|
-
private
|
94
|
-
|
95
|
-
def create_request(env)
|
96
|
-
request = Net::HTTPGenericRequest.new \
|
97
|
-
env[:method].to_s.upcase, # request method
|
98
|
-
!!env[:body], # is there request body
|
99
|
-
env[:method] != :head, # is there response body
|
100
|
-
env[:url].request_uri, # request uri path
|
101
|
-
env[:request_headers] # request headers
|
102
|
-
|
103
|
-
if env[:body].respond_to?(:read)
|
104
|
-
request.body_stream = env[:body]
|
105
|
-
else
|
106
|
-
request.body = env[:body]
|
107
|
-
end
|
108
|
-
request
|
109
|
-
end
|
110
|
-
|
111
|
-
def perform_request(http, env)
|
112
|
-
if env[:request].stream_response?
|
113
|
-
size = 0
|
114
|
-
yielded = false
|
115
|
-
http_response = request_with_wrapped_block(http, env) do |chunk|
|
116
|
-
if chunk.bytesize.positive? || size.positive?
|
117
|
-
yielded = true
|
118
|
-
size += chunk.bytesize
|
119
|
-
env[:request].on_data.call(chunk, size)
|
120
|
-
end
|
121
|
-
end
|
122
|
-
env[:request].on_data.call(+'', 0) unless yielded
|
123
|
-
# Net::HTTP returns something,
|
124
|
-
# but it's not meaningful according to the docs.
|
125
|
-
http_response.body = nil
|
126
|
-
http_response
|
127
|
-
else
|
128
|
-
request_with_wrapped_block(http, env)
|
129
|
-
end
|
130
|
-
end
|
131
|
-
|
132
|
-
def request_with_wrapped_block(http, env, &block)
|
133
|
-
if (env[:method] == :get) && !env[:body]
|
134
|
-
# prefer `get` to `request` because the former handles gzip (ruby 1.9)
|
135
|
-
request_via_get_method(http, env, &block)
|
136
|
-
else
|
137
|
-
request_via_request_method(http, env, &block)
|
138
|
-
end
|
139
|
-
end
|
140
|
-
|
141
|
-
def request_via_get_method(http, env, &block)
|
142
|
-
# Must use Net::HTTP#start and pass it a block otherwise the server's
|
143
|
-
# TCP socket does not close correctly.
|
144
|
-
http.start do |opened_http|
|
145
|
-
opened_http.get env[:url].request_uri, env[:request_headers], &block
|
146
|
-
end
|
147
|
-
end
|
148
|
-
|
149
|
-
def request_via_request_method(http, env, &block)
|
150
|
-
# Must use Net::HTTP#start and pass it a block otherwise the server's
|
151
|
-
# TCP socket does not close correctly.
|
152
|
-
http.start do |opened_http|
|
153
|
-
if block_given?
|
154
|
-
opened_http.request create_request(env) do |response|
|
155
|
-
response.read_body(&block)
|
156
|
-
end
|
157
|
-
else
|
158
|
-
opened_http.request create_request(env)
|
159
|
-
end
|
160
|
-
end
|
161
|
-
end
|
162
|
-
|
163
|
-
def configure_ssl(http, ssl)
|
164
|
-
return unless ssl
|
165
|
-
|
166
|
-
http.verify_mode = ssl_verify_mode(ssl)
|
167
|
-
http.cert_store = ssl_cert_store(ssl)
|
168
|
-
|
169
|
-
http.cert = ssl[:client_cert] if ssl[:client_cert]
|
170
|
-
http.key = ssl[:client_key] if ssl[:client_key]
|
171
|
-
http.ca_file = ssl[:ca_file] if ssl[:ca_file]
|
172
|
-
http.ca_path = ssl[:ca_path] if ssl[:ca_path]
|
173
|
-
http.verify_depth = ssl[:verify_depth] if ssl[:verify_depth]
|
174
|
-
http.ssl_version = ssl[:version] if ssl[:version]
|
175
|
-
http.min_version = ssl[:min_version] if ssl[:min_version]
|
176
|
-
http.max_version = ssl[:max_version] if ssl[:max_version]
|
177
|
-
end
|
178
|
-
|
179
|
-
def configure_request(http, req)
|
180
|
-
if (sec = request_timeout(:read, req))
|
181
|
-
http.read_timeout = sec
|
182
|
-
end
|
183
|
-
|
184
|
-
if (sec = http.respond_to?(:write_timeout=) &&
|
185
|
-
request_timeout(:write, req))
|
186
|
-
http.write_timeout = sec
|
187
|
-
end
|
188
|
-
|
189
|
-
if (sec = request_timeout(:open, req))
|
190
|
-
http.open_timeout = sec
|
191
|
-
end
|
192
|
-
|
193
|
-
# Only set if Net::Http supports it, since Ruby 2.5.
|
194
|
-
http.max_retries = 0 if http.respond_to?(:max_retries=)
|
195
|
-
|
196
|
-
@config_block&.call(http)
|
197
|
-
end
|
198
|
-
|
199
|
-
def ssl_cert_store(ssl)
|
200
|
-
return ssl[:cert_store] if ssl[:cert_store]
|
201
|
-
|
202
|
-
@ssl_cert_store ||= begin
|
203
|
-
# Use the default cert store by default, i.e. system ca certs
|
204
|
-
OpenSSL::X509::Store.new.tap(&:set_default_paths)
|
205
|
-
end
|
206
|
-
end
|
207
|
-
|
208
|
-
def ssl_verify_mode(ssl)
|
209
|
-
ssl[:verify_mode] || begin
|
210
|
-
if ssl.fetch(:verify, true)
|
211
|
-
OpenSSL::SSL::VERIFY_PEER
|
212
|
-
else
|
213
|
-
OpenSSL::SSL::VERIFY_NONE
|
214
|
-
end
|
215
|
-
end
|
216
|
-
end
|
217
|
-
end
|
218
|
-
end
|
219
|
-
end
|