httpclient-jgraichen 2.3.4.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/README.txt +759 -0
- data/bin/httpclient +65 -0
- data/lib/hexdump.rb +50 -0
- data/lib/http-access2.rb +55 -0
- data/lib/http-access2/cookie.rb +1 -0
- data/lib/http-access2/http.rb +1 -0
- data/lib/httpclient.rb +1156 -0
- data/lib/httpclient/auth.rb +899 -0
- data/lib/httpclient/cacert.p7s +1912 -0
- data/lib/httpclient/connection.rb +88 -0
- data/lib/httpclient/cookie.rb +438 -0
- data/lib/httpclient/http.rb +1046 -0
- data/lib/httpclient/include_client.rb +83 -0
- data/lib/httpclient/session.rb +1028 -0
- data/lib/httpclient/ssl_config.rb +405 -0
- data/lib/httpclient/timeout.rb +140 -0
- data/lib/httpclient/util.rb +178 -0
- data/lib/httpclient/version.rb +3 -0
- data/lib/oauthclient.rb +110 -0
- data/sample/async.rb +8 -0
- data/sample/auth.rb +11 -0
- data/sample/cookie.rb +18 -0
- data/sample/dav.rb +103 -0
- data/sample/howto.rb +49 -0
- data/sample/oauth_buzz.rb +57 -0
- data/sample/oauth_friendfeed.rb +59 -0
- data/sample/oauth_twitter.rb +61 -0
- data/sample/ssl/0cert.pem +22 -0
- data/sample/ssl/0key.pem +30 -0
- data/sample/ssl/1000cert.pem +19 -0
- data/sample/ssl/1000key.pem +18 -0
- data/sample/ssl/htdocs/index.html +10 -0
- data/sample/ssl/ssl_client.rb +22 -0
- data/sample/ssl/webrick_httpsd.rb +29 -0
- data/sample/stream.rb +21 -0
- data/sample/thread.rb +27 -0
- data/sample/wcat.rb +21 -0
- data/test/ca-chain.cert +44 -0
- data/test/ca.cert +23 -0
- data/test/client.cert +19 -0
- data/test/client.key +15 -0
- data/test/helper.rb +129 -0
- data/test/htdigest +1 -0
- data/test/htpasswd +2 -0
- data/test/runner.rb +2 -0
- data/test/server.cert +19 -0
- data/test/server.key +15 -0
- data/test/sslsvr.rb +65 -0
- data/test/subca.cert +21 -0
- data/test/test_auth.rb +348 -0
- data/test/test_cookie.rb +412 -0
- data/test/test_hexdump.rb +14 -0
- data/test/test_http-access2.rb +507 -0
- data/test/test_httpclient.rb +1783 -0
- data/test/test_include_client.rb +52 -0
- data/test/test_ssl.rb +235 -0
- metadata +100 -0
@@ -0,0 +1,57 @@
|
|
1
|
+
require 'oauthclient'
|
2
|
+
require 'zlib'
|
3
|
+
require 'stringio'
|
4
|
+
|
5
|
+
# Get your own consumer token from http://code.google.com/apis/accounts/docs/RegistrationForWebAppsAuto.html
|
6
|
+
consumer_key = nil
|
7
|
+
consumer_secret = nil
|
8
|
+
|
9
|
+
callback = 'http://localhost/' # should point somewhere else...
|
10
|
+
scope = 'https://www.googleapis.com/auth/buzz'
|
11
|
+
request_token_url = 'https://www.google.com/accounts/OAuthGetRequestToken'
|
12
|
+
access_token_url = 'https://www.google.com/accounts/OAuthGetAccessToken'
|
13
|
+
|
14
|
+
STDOUT.sync = true
|
15
|
+
|
16
|
+
# create OAuth client.
|
17
|
+
client = OAuthClient.new
|
18
|
+
client.oauth_config.consumer_key = consumer_key
|
19
|
+
client.oauth_config.consumer_secret = consumer_secret
|
20
|
+
client.oauth_config.signature_method = 'HMAC-SHA1'
|
21
|
+
client.oauth_config.http_method = :get # Twitter does not allow :post
|
22
|
+
client.debug_dev = STDERR if $DEBUG
|
23
|
+
|
24
|
+
# Get request token.
|
25
|
+
res = client.get_request_token(request_token_url, callback, :scope => scope)
|
26
|
+
p res.status
|
27
|
+
p res.oauth_params
|
28
|
+
p res.content
|
29
|
+
p client.oauth_config
|
30
|
+
token = res.oauth_params['oauth_token']
|
31
|
+
secret = res.oauth_params['oauth_token_secret']
|
32
|
+
raise if token.nil? or secret.nil?
|
33
|
+
|
34
|
+
# You need to confirm authorization out of band.
|
35
|
+
puts
|
36
|
+
puts "Go here and do confirm: https://www.google.com/buzz/api/auth/OAuthAuthorizeToken?oauth_token=#{token}&domain=#{consumer_key}&scope=#{scope}"
|
37
|
+
puts "Type oauth_verifier (if given) and hit [enter] to go"
|
38
|
+
require 'cgi'
|
39
|
+
verifier = CGI.unescape(gets.chomp)
|
40
|
+
verifier = nil if verifier.empty?
|
41
|
+
|
42
|
+
# Get access token.
|
43
|
+
res = client.get_access_token(access_token_url, token, secret, verifier)
|
44
|
+
p res.status
|
45
|
+
p res.oauth_params
|
46
|
+
p res.content
|
47
|
+
p client.oauth_config
|
48
|
+
id = res.oauth_params['user_id']
|
49
|
+
|
50
|
+
puts
|
51
|
+
puts "Access token usage example"
|
52
|
+
puts "Hit [enter] to go"
|
53
|
+
gets
|
54
|
+
|
55
|
+
# Access to a protected resource.
|
56
|
+
# @consumption requires Buzz API
|
57
|
+
puts client.get_content("https://www.googleapis.com/buzz/v1/activities/@me/@consumption", :alt => :json, :prettyprint => true)
|
@@ -0,0 +1,59 @@
|
|
1
|
+
require 'oauthclient'
|
2
|
+
|
3
|
+
# Get your own consumer token from http://friendfeed.com/api/applications
|
4
|
+
consumer_key = 'EDIT HERE'
|
5
|
+
consumer_secret = 'EDIT HERE'
|
6
|
+
|
7
|
+
request_token_url = 'https://friendfeed.com/account/oauth/request_token'
|
8
|
+
oob_authorize_url = 'https://friendfeed.com/account/oauth/authorize'
|
9
|
+
access_token_url = 'https://friendfeed.com/account/oauth/access_token'
|
10
|
+
|
11
|
+
STDOUT.sync = true
|
12
|
+
|
13
|
+
# create OAuth client.
|
14
|
+
client = OAuthClient.new
|
15
|
+
client.oauth_config.consumer_key = consumer_key
|
16
|
+
client.oauth_config.consumer_secret = consumer_secret
|
17
|
+
client.oauth_config.signature_method = 'HMAC-SHA1'
|
18
|
+
client.oauth_config.http_method = :get # FriendFeed does not allow :post
|
19
|
+
client.debug_dev = STDERR if $DEBUG
|
20
|
+
|
21
|
+
# Get request token.
|
22
|
+
res = client.get_request_token(request_token_url)
|
23
|
+
p res.status
|
24
|
+
p res.oauth_params
|
25
|
+
p res.content
|
26
|
+
p client.oauth_config
|
27
|
+
token = res.oauth_params['oauth_token']
|
28
|
+
secret = res.oauth_params['oauth_token_secret']
|
29
|
+
raise if token.nil? or secret.nil?
|
30
|
+
|
31
|
+
# You need to confirm authorization out of band.
|
32
|
+
puts
|
33
|
+
puts "Go here and do confirm: #{oob_authorize_url}?oauth_token=#{token}"
|
34
|
+
puts "Hit [enter] to go"
|
35
|
+
gets
|
36
|
+
|
37
|
+
# Get access token.
|
38
|
+
# FYI: You may need to re-construct OAuthClient instance here.
|
39
|
+
# In normal web app flow, getting access token and getting request token
|
40
|
+
# must be done in different HTTP requests.
|
41
|
+
# client = OAuthClient.new
|
42
|
+
# client.oauth_config.consumer_key = consumer_key
|
43
|
+
# client.oauth_config.consumer_secret = consumer_secret
|
44
|
+
# client.oauth_config.signature_method = 'HMAC-SHA1'
|
45
|
+
# client.oauth_config.http_method = :get # Twitter does not allow :post
|
46
|
+
res = client.get_access_token(access_token_url, token, secret)
|
47
|
+
p res.status
|
48
|
+
p res.oauth_params
|
49
|
+
p res.content
|
50
|
+
p client.oauth_config
|
51
|
+
username = res.oauth_params['username']
|
52
|
+
|
53
|
+
puts
|
54
|
+
puts "Access token usage example"
|
55
|
+
puts "Hit [enter] to go"
|
56
|
+
gets
|
57
|
+
|
58
|
+
# Access to a protected resource. (user profile)
|
59
|
+
puts client.get("http://friendfeed-api.com/v2/feedinfo/#{username}?format=json")
|
@@ -0,0 +1,61 @@
|
|
1
|
+
require 'oauthclient'
|
2
|
+
|
3
|
+
# Get your own consumer token from http://twitter.com/apps
|
4
|
+
consumer_key = 'EDIT HERE'
|
5
|
+
consumer_secret = 'EDIT HERE'
|
6
|
+
|
7
|
+
callback = ARGV.shift # can be nil for OAuth 1.0. (not 1.0a)
|
8
|
+
request_token_url = 'http://twitter.com/oauth/request_token'
|
9
|
+
oob_authorize_url = 'http://twitter.com/oauth/authorize'
|
10
|
+
access_token_url = 'http://twitter.com/oauth/access_token'
|
11
|
+
|
12
|
+
STDOUT.sync = true
|
13
|
+
|
14
|
+
# create OAuth client.
|
15
|
+
client = OAuthClient.new
|
16
|
+
client.oauth_config.consumer_key = consumer_key
|
17
|
+
client.oauth_config.consumer_secret = consumer_secret
|
18
|
+
client.oauth_config.signature_method = 'HMAC-SHA1'
|
19
|
+
client.oauth_config.http_method = :get # Twitter does not allow :post
|
20
|
+
client.debug_dev = STDERR if $DEBUG
|
21
|
+
|
22
|
+
# Get request token.
|
23
|
+
res = client.get_request_token(request_token_url, callback)
|
24
|
+
p res.status
|
25
|
+
p res.oauth_params
|
26
|
+
p res.content
|
27
|
+
p client.oauth_config
|
28
|
+
token = res.oauth_params['oauth_token']
|
29
|
+
secret = res.oauth_params['oauth_token_secret']
|
30
|
+
raise if token.nil? or secret.nil?
|
31
|
+
|
32
|
+
# You need to confirm authorization out of band.
|
33
|
+
puts
|
34
|
+
puts "Go here and do confirm: #{oob_authorize_url}?oauth_token=#{token}"
|
35
|
+
puts "Type oauth_verifier/PIN (if given) and hit [enter] to go"
|
36
|
+
verifier = gets.chomp
|
37
|
+
verifier = nil if verifier.empty?
|
38
|
+
|
39
|
+
# Get access token.
|
40
|
+
# FYI: You may need to re-construct OAuthClient instance here.
|
41
|
+
# In normal web app flow, getting access token and getting request token
|
42
|
+
# must be done in different HTTP requests.
|
43
|
+
# client = OAuthClient.new
|
44
|
+
# client.oauth_config.consumer_key = consumer_key
|
45
|
+
# client.oauth_config.consumer_secret = consumer_secret
|
46
|
+
# client.oauth_config.signature_method = 'HMAC-SHA1'
|
47
|
+
# client.oauth_config.http_method = :get # Twitter does not allow :post
|
48
|
+
res = client.get_access_token(access_token_url, token, secret, verifier)
|
49
|
+
p res.status
|
50
|
+
p res.oauth_params
|
51
|
+
p res.content
|
52
|
+
p client.oauth_config
|
53
|
+
id = res.oauth_params['user_id']
|
54
|
+
|
55
|
+
puts
|
56
|
+
puts "Access token usage example"
|
57
|
+
puts "Hit [enter] to go"
|
58
|
+
gets
|
59
|
+
|
60
|
+
# Access to a protected resource. (DM)
|
61
|
+
puts client.get("http://twitter.com/direct_messages.json")
|
@@ -0,0 +1,22 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIDjzCCAnegAwIBAgIBADANBgkqhkiG9w0BAQUFADAtMQswCQYDVQQGEwJDWjEN
|
3
|
+
MAsGA1UEChMEUnVieTEPMA0GA1UEAxMGUnVieUNBMB4XDTAzMDUzMTAyNDcyOFoX
|
4
|
+
DTA1MDUzMDAyNDcyOFowLTELMAkGA1UEBhMCQ1oxDTALBgNVBAoTBFJ1YnkxDzAN
|
5
|
+
BgNVBAMTBlJ1YnlDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANfw
|
6
|
+
JSR2OxME6WBRYekhvN1M7uZwJLC3qHhRtBm583x7MS3yzF/HwFNH1oAmOmzUcDSz
|
7
|
+
Y9OmTDVIMU9b0bSYHuu8KswrRWmx/iEhgU/hODS1MQKi+uHoMTtY/dVXwTLAfw5d
|
8
|
+
UMPQ9F5EhiV57sKWrS7vIVBtpxUNgfJW61FP+Ru3Lr8uhUgXPECHck8fjFu8w2Sw
|
9
|
+
JQBQ8ePrfKBiTHpOzKmDVXXWzVYzIQN0zQfpu/FSjOJ4xWV3wmfltN4FK+UkpALW
|
10
|
+
3RKsNFx+Pmji0fr2/PeEPhzKkhWk5b+pYrIlTNkagS7u8EoeLtY1y3LSZvopbcPI
|
11
|
+
l0QFQHCMtxS7ngC6wsECAwEAAaOBuTCBtjAPBgNVHRMECDAGAQH/AgEAMC0GCWCG
|
12
|
+
SAGG+EIBDQQgFh5HZW5lcmF0ZWQgYnkgT3BlblNTTCBmb3IgUnVieS4wHQYDVR0O
|
13
|
+
BBYEFA2IpXrgDnpJ9p6bfBmtM6j0IejmMFUGA1UdIwROMEyAFA2IpXrgDnpJ9p6b
|
14
|
+
fBmtM6j0IejmoTGkLzAtMQswCQYDVQQGEwJDWjENMAsGA1UEChMEUnVieTEPMA0G
|
15
|
+
A1UEAxMGUnVieUNBggEAMA0GCSqGSIb3DQEBBQUAA4IBAQB1b4iTezqgZj6FhcAc
|
16
|
+
0AtleAc8TpUn8YOX6zSlHG6I7tKcLfnWen9eFs4Jx73Bup5wHvcrHF6U+/nAdpb5
|
17
|
+
R7lkNbjWFWwoi5cQC36mh4ym8GWhUZUf8362yPzimbdKMBIiDoIBY8NyIBBORU2m
|
18
|
+
BlXsHr0dqGpeTmNnFhgi1FCN+F/VitplOUP9E8NzsgLS/GY9HO160HbPXoZc4yp5
|
19
|
+
KFweqmyhbxZvkrrD6LanvB23cJP+TeHzA5mLJtIBciFq+AJe+cDTlJYjtLcsxkAy
|
20
|
+
Evojd//5gePjgSz3gbzU5Zq0/tI2T0rQYnmySoSQ1u2+i5FrMvEjh/H6tZtQ6nO0
|
21
|
+
ROTL
|
22
|
+
-----END CERTIFICATE-----
|
data/sample/ssl/0key.pem
ADDED
@@ -0,0 +1,30 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
Proc-Type: 4,ENCRYPTED
|
3
|
+
DEK-Info: DES-EDE3-CBC,BC9A85421E11A052
|
4
|
+
|
5
|
+
dlFN8woboqu1mLWHSe6HnBCzrJUFw1NLv4sJM8MFPcSGkPEJoqceRQ5XFFlwnhwT
|
6
|
+
WStidVQLAaCqWxPlQbvKs/eW2yEZRX3JhNHlGkuZUbAuqC7FGcIPCFtXmshmR3/K
|
7
|
+
wSxM3DuEBA31kHoyH/DGPEOcp/L9M95fU2w/1Zz895nXgECdlYfMB7KEXJ7S0TVD
|
8
|
+
NvcH6dcNS2I56ikUfRd9MA+tTtJTDsolBii3HpNkI+i8GeAAznfuyhCa+RasbMnR
|
9
|
+
3SRHSgiZpK01JkepKEumG1iyGXBE4GMlF3dK9TL4UTfK7PjbW1BRGVdmGayA5L8X
|
10
|
+
vpn9uIMbpFUD7nU/cSs6+ECYy9Fdq/d8oE7YRVpqGA2mX+Vvjzc6ZByiW8eH8uYW
|
11
|
+
d1YCySAzttQUcDFx4YlpbQN+NSE67amGY/nkXn3CnQuB2uDiUm6818p1jjhEbIj6
|
12
|
+
SQpNgpuhHPhyawMuC98BvxEXoSTFRmXx5h+Qgo8nfCBUpGUCA8STuJG+EebIXMHH
|
13
|
+
yNdZGYMdkkuzow1G+bcHaIV4pgD0hOX6D+AzhO8/11gsJNiZHWAkxRtXres0B7JQ
|
14
|
+
BTv6mrpmRsr1TbY7K55y5QePkvroiqI4BX2//RgAcUw+aBzPCSt87YU55pPxxDCv
|
15
|
+
KnoMQJapUIlXgYBs+2GBiFQlr3dAnzduXrXkZa/TuE0853QDDnKWN3aWapW0EieH
|
16
|
+
sDxYz6kZ6c/vjDJtNjjgysKvi2ZFnJMk92fi1sNd2MrH9w1vSmjHw6+b9REH+r6K
|
17
|
+
YCcMzCUnIV5Y5jgbnrY5jWlB5Jt5PlU+QDFTBNsdctyoES3h5yQh48hcpnJOy4YT
|
18
|
+
tn9jEmIAYM7QZtGZrY5yiZRZbM5tLL7VeXA0M7N0ivjZUVP4NBUV1IFhLpeus3Yo
|
19
|
+
yXB99Sib/M8fqlmnRlyKKaRseB9a80/LJdLJC7Q1aJG9JYTTpumydppDzvwwUFV/
|
20
|
+
yHQibPzWhnHTElyXSGeWWQ/4gKJXJFkSyrBeKt/DcDggEnpsVw7kAeo0KJLWvBq2
|
21
|
+
0CwnWxPsseIYSLdwE0wOZTnWvHC6viCCqxaFwROa+bHsgCtRR8xwOKVg0RQRexQi
|
22
|
+
SKsCEyq4hfKH3Kd7KkI5c4iCHrNDxQiYVAHGo0kuVWPNP9PH8XrRuP7f2Aq6ObEU
|
23
|
+
cGLN+OKlzChKJQZZzdthGTjO52cZERokS7etLs5yPNM27CUZIy2gUsWwANG700ov
|
24
|
+
DYi4S9j4y2fK9qVFGuNmZ7nNQ6juHIN8ZpZObmzGz/GEsVy8zYGV7jH2bC8fhCg1
|
25
|
+
wiTn0CHyfI0AfJ5zQMQ48z/ATI5+/pP5DuJ4kPLYU90EdIlIQ/9zQDRxVPvUalas
|
26
|
+
kskX8qdsbILaLqKzqvPa6jkhncV7SVQPhxIrs6vU2RWrsU1Qw9wHhzaITu9yb1l1
|
27
|
+
s8uialiJWnWOwkhIAUULOoGRnBB7U6sseFh7LcYHc2sZYJzQQO3g14ANvtsu/ILT
|
28
|
+
abUPXtGHSUlI4kUjI82NEkyQz/pDD9VkhTefiFHNymIkUaZBulmR5QdcEcQn6bku
|
29
|
+
J/P3M/T7CtsCPdBUrzDI71eAYqXPjikg+8unKWk9c/p+V7wXtvsdgJf3+xht/YUQ
|
30
|
+
-----END RSA PRIVATE KEY-----
|
@@ -0,0 +1,19 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIDCTCCAfGgAwIBAgICA+gwDQYJKoZIhvcNAQEFBQAwLTELMAkGA1UEBhMCQ1ox
|
3
|
+
DTALBgNVBAoTBFJ1YnkxDzANBgNVBAMTBlJ1YnlDQTAeFw0wMzA1MzEwMzUwNDFa
|
4
|
+
Fw0wNDA1MzAwMzUwNDFaMDAxCzAJBgNVBAYTAkNaMQ0wCwYDVQQKEwRSdWJ5MRIw
|
5
|
+
EAYDVQQDEwlsb2NhbGhvc3QwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALhs
|
6
|
+
fh4i1c+K57vFG7SUDfdxuSlbPUqaV0sbiuvWb0f7B2T7bHicaIRsDYW7PQRLLwwR
|
7
|
+
Pd+aKg3KuwhWN47faRam19Z3yWCD7Tg+BhXDqlXnz6snnr4APpAxc22kJKjzuil6
|
8
|
+
sp+QTkl/EFKI3+ocDur1UB+kSOmTzsDmepaWUZwTAgMBAAGjgbMwgbAwCQYDVR0T
|
9
|
+
BAIwADAtBglghkgBhvhCAQ0EIBYeR2VuZXJhdGVkIGJ5IE9wZW5TU0wgZm9yIFJ1
|
10
|
+
YnkuMB0GA1UdDgQWBBQlYESgTYdkTOYy02+/jGSqa+OpzjBVBgNVHSMETjBMgBQN
|
11
|
+
iKV64A56Sfaem3wZrTOo9CHo5qExpC8wLTELMAkGA1UEBhMCQ1oxDTALBgNVBAoT
|
12
|
+
BFJ1YnkxDzANBgNVBAMTBlJ1YnlDQYIBADANBgkqhkiG9w0BAQUFAAOCAQEAJh9v
|
13
|
+
ehhUv69oilVWGvGB6xCr8LgErnO9QdAyqJE2xBhbNaB3crjWDdQTz4UNvCQoJG/4
|
14
|
+
Oa9Vp10vM8E0ZMVHer87WM9tPEOg09r38U/1c7gSYBkPSGQfeWtZNjQ1YOm6RDx4
|
15
|
+
JJp9sp9v/CdBlVXaBQQd+MQFny7E+EkMHRfiv89KTfOs0wYdirLrM1C90CZUEj0i
|
16
|
+
cMcBdHzH5XcNpWB1ag4cNiUn2ljsaWlUpEg48gLe2FLJVPBio+iZnOm/C6KIwBMO
|
17
|
+
BCVxkZ6oIR87JT4xbr8SxRS9d/irhVU9MtGYwMe4MPSztefASdmEyj59ZFCLKQHV
|
18
|
+
+ltGb7/b7DetoT1spA==
|
19
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,18 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
Proc-Type: 4,ENCRYPTED
|
3
|
+
DEK-Info: DES-EDE3-CBC,5E9A9AC8F0F62A4A
|
4
|
+
|
5
|
+
3/VDlc8E13xKZr+MXt+HVZCiuWN1gsVx1bTZE5fN5FVoJ45Bgy2zAegnqZiP1NNy
|
6
|
+
j/76Vy9Ru/G9HPh5QPbIPl+md+tOyJV2M23a+5jESk1tLuWt5lRqmTtHN000844l
|
7
|
+
uCgZPPhRV7nhYPC5f6Gqw/xDl/EZsElqJM/hl2JbqiVKfT5/1i0STU8LNkoaLWrJ
|
8
|
+
kQhc7hOR5ihmDPeD8mA99bmGD+UyyqzzLTtKvRbBObyi9dy7cQ5Q+iptQWTUuEKI
|
9
|
+
+W7b8f8/Iiin4JJZGpFuhQSx0ARjT0fuYNXddmz1L3Gu3sjzN1GvT2T3GlpiF4/7
|
10
|
+
ERS8Q43zjoCP8nC2MTSvdNRRoPMBg2SDS2ZIq4GSiKsKjeN+GnPCycAMeZSr5yG6
|
11
|
+
VMBJLoAJ7XIcl3se8gF6hH1AfhCzDaK/2pKLP9jH/W4g6VvUBazKEQCNbZXSTpQ4
|
12
|
+
8EfvJBPpplFs3Zid6iwC/WjKhFBuBBfycwNJjXG9x1fMPkBM8HeiZXgrXoUXJMEP
|
13
|
+
RF05Beo0HPPEOPIxcG6EVmnpDvs8uC+xIQ6UE6DrLGK5TnR6kdz3BDpeAehujSss
|
14
|
+
wfZiOvuJQZQl+oovOH54pcwAwhicgRcNdIX47kHrXNL1vQMYTXte+ZzDGyoOXd0W
|
15
|
+
qf1CZbrjULT9nfJFWMMicTnLM/6iQx+3bTkXXvk0qP0qAoIPqtY4rwt6yHgq937A
|
16
|
+
LubDxudMWV0hqcnH8cBCPHfWdE4HELw4RcVXmQH43yHs1gwShyG9rTS+PCKoRr8u
|
17
|
+
bpssW6J0xJmilf1KprbNWJyof9i0CtSVOlUt6ttoinwqj8Me01dHqQ==
|
18
|
+
-----END RSA PRIVATE KEY-----
|
@@ -0,0 +1,22 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
$:.unshift(File.join('..', '..', 'lib'))
|
4
|
+
require 'httpclient'
|
5
|
+
|
6
|
+
url = ARGV.shift || 'https://localhost:8808/'
|
7
|
+
uri = URI.parse(url)
|
8
|
+
|
9
|
+
#ca_file = "0cert.pem"
|
10
|
+
#crl_file = '0crl.pem'
|
11
|
+
|
12
|
+
# create CA's cert in pem format and run 'c_rehash' in trust_certs dir. before
|
13
|
+
# using this.
|
14
|
+
ca_path = File.join(File.dirname(File.expand_path(__FILE__)), "trust_certs")
|
15
|
+
|
16
|
+
proxy = ENV['HTTP_PROXY'] || ENV['http_proxy'] || nil
|
17
|
+
h = HTTPClient.new(proxy)
|
18
|
+
#h.ssl_config.add_trust_ca(ca_file)
|
19
|
+
#h.ssl_config.add_crl(crl_file)
|
20
|
+
h.ssl_config.add_trust_ca(ca_path)
|
21
|
+
|
22
|
+
print h.get_content(url)
|
@@ -0,0 +1,29 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
require 'webrick/https'
|
4
|
+
require 'getopts'
|
5
|
+
|
6
|
+
getopts nil, 'r:', 'p:8808'
|
7
|
+
|
8
|
+
dir = File::dirname(File::expand_path(__FILE__))
|
9
|
+
|
10
|
+
# Pass phrase of '1000key.pem' is '1000'.
|
11
|
+
data = open(File::join(dir, "1000key.pem")){|io| io.read }
|
12
|
+
pkey = OpenSSL::PKey::RSA.new(data)
|
13
|
+
data = open(File::join(dir, "1000cert.pem")){|io| io.read }
|
14
|
+
cert = OpenSSL::X509::Certificate.new(data)
|
15
|
+
|
16
|
+
s = WEBrick::HTTPServer.new(
|
17
|
+
:BindAddress => "localhost",
|
18
|
+
:Port => $OPT_p.to_i,
|
19
|
+
:Logger => nil,
|
20
|
+
:DocumentRoot => $OPT_r || File::join(dir, "/htdocs"),
|
21
|
+
:SSLEnable => true,
|
22
|
+
:SSLVerifyClient => ::OpenSSL::SSL::VERIFY_NONE,
|
23
|
+
:SSLCertificate => cert,
|
24
|
+
:SSLPrivateKey => pkey,
|
25
|
+
:SSLCertName => nil,
|
26
|
+
:SSLCACertificateFile => "all.pem"
|
27
|
+
)
|
28
|
+
trap("INT"){ s.shutdown }
|
29
|
+
s.start
|
data/sample/stream.rb
ADDED
@@ -0,0 +1,21 @@
|
|
1
|
+
$:.unshift(File.join('..', 'lib'))
|
2
|
+
require "httpclient"
|
3
|
+
|
4
|
+
c = HTTPClient.new
|
5
|
+
|
6
|
+
piper, pipew = IO.pipe
|
7
|
+
conn = c.post_async("http://localhost:8080/stream", piper)
|
8
|
+
|
9
|
+
Thread.new do
|
10
|
+
res = conn.pop
|
11
|
+
while str = res.content.read(10)
|
12
|
+
p str
|
13
|
+
end
|
14
|
+
end
|
15
|
+
|
16
|
+
p "type here"
|
17
|
+
while line = STDIN.gets
|
18
|
+
pipew << line
|
19
|
+
end
|
20
|
+
pipew.close
|
21
|
+
sleep 5
|
data/sample/thread.rb
ADDED
@@ -0,0 +1,27 @@
|
|
1
|
+
$:.unshift(File.join('..', 'lib'))
|
2
|
+
require 'httpclient'
|
3
|
+
|
4
|
+
urlstr = ARGV.shift
|
5
|
+
|
6
|
+
proxy = ENV['HTTP_PROXY'] || ENV['http_proxy']
|
7
|
+
h = HTTPClient.new(proxy)
|
8
|
+
|
9
|
+
count = 20
|
10
|
+
|
11
|
+
res = []
|
12
|
+
g = []
|
13
|
+
for i in 0..count
|
14
|
+
g << Thread.new {
|
15
|
+
res[i] = h.get(urlstr)
|
16
|
+
}
|
17
|
+
end
|
18
|
+
|
19
|
+
g.each do |th|
|
20
|
+
th.join
|
21
|
+
end
|
22
|
+
|
23
|
+
for i in 0..(count - 1)
|
24
|
+
raise unless (res[i].content == res[i + 1].content)
|
25
|
+
end
|
26
|
+
|
27
|
+
puts 'ok'
|
data/sample/wcat.rb
ADDED
@@ -0,0 +1,21 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
# wcat for http-access2
|
4
|
+
# Copyright (C) 2001 TAKAHASHI Masayoshi
|
5
|
+
|
6
|
+
$:.unshift(File.join('..', 'lib'))
|
7
|
+
require 'httpclient'
|
8
|
+
|
9
|
+
if ENV['HTTP_PROXY']
|
10
|
+
h = HTTPClient.new(ENV['HTTP_PROXY'])
|
11
|
+
else
|
12
|
+
h = HTTPClient.new()
|
13
|
+
end
|
14
|
+
|
15
|
+
while urlstr = ARGV.shift
|
16
|
+
response = h.get(urlstr){ |data|
|
17
|
+
print data
|
18
|
+
}
|
19
|
+
p response.contenttype
|
20
|
+
p response.peer_cert if /^https/i =~ urlstr
|
21
|
+
end
|
data/test/ca-chain.cert
ADDED
@@ -0,0 +1,44 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIID0DCCArigAwIBAgIBADANBgkqhkiG9w0BAQUFADA8MQswCQYDVQQGDAJKUDES
|
3
|
+
MBAGA1UECgwJSklOLkdSLkpQMQwwCgYDVQQLDANSUlIxCzAJBgNVBAMMAkNBMB4X
|
4
|
+
DTA0MDEzMDAwNDIzMloXDTM2MDEyMjAwNDIzMlowPDELMAkGA1UEBgwCSlAxEjAQ
|
5
|
+
BgNVBAoMCUpJTi5HUi5KUDEMMAoGA1UECwwDUlJSMQswCQYDVQQDDAJDQTCCASIw
|
6
|
+
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANbv0x42BTKFEQOE+KJ2XmiSdZpR
|
7
|
+
wjzQLAkPLRnLB98tlzs4xo+y4RyY/rd5TT9UzBJTIhP8CJi5GbS1oXEerQXB3P0d
|
8
|
+
L5oSSMwGGyuIzgZe5+vZ1kgzQxMEKMMKlzA73rbMd4Jx3u5+jdbP0EDrPYfXSvLY
|
9
|
+
bS04n2aX7zrN3x5KdDrNBfwBio2/qeaaj4+9OxnwRvYP3WOvqdW0h329eMfHw0pi
|
10
|
+
JI0drIVdsEqClUV4pebT/F+CPUPkEh/weySgo9wANockkYu5ujw2GbLFcO5LXxxm
|
11
|
+
dEfcVr3r6t6zOA4bJwL0W/e6LBcrwiG/qPDFErhwtgTLYf6Er67SzLyA66UCAwEA
|
12
|
+
AaOB3DCB2TAPBgNVHRMBAf8EBTADAQH/MDEGCWCGSAGG+EIBDQQkFiJSdWJ5L09w
|
13
|
+
ZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRJ7Xd380KzBV7f
|
14
|
+
USKIQ+O/vKbhDzAOBgNVHQ8BAf8EBAMCAQYwZAYDVR0jBF0wW4AUSe13d/NCswVe
|
15
|
+
31EiiEPjv7ym4Q+hQKQ+MDwxCzAJBgNVBAYMAkpQMRIwEAYDVQQKDAlKSU4uR1Iu
|
16
|
+
SlAxDDAKBgNVBAsMA1JSUjELMAkGA1UEAwwCQ0GCAQAwDQYJKoZIhvcNAQEFBQAD
|
17
|
+
ggEBAIu/mfiez5XN5tn2jScgShPgHEFJBR0BTJBZF6xCk0jyqNx/g9HMj2ELCuK+
|
18
|
+
r/Y7KFW5c5M3AQ+xWW0ZSc4kvzyTcV7yTVIwj2jZ9ddYMN3nupZFgBK1GB4Y05GY
|
19
|
+
MJJFRkSu6d/Ph5ypzBVw2YMT/nsOo5VwMUGLgS7YVjU+u/HNWz80J3oO17mNZllj
|
20
|
+
PvORJcnjwlroDnS58KoJ7GDgejv3ESWADvX1OHLE4cRkiQGeLoEU4pxdCxXRqX0U
|
21
|
+
PbwIkZN9mXVcrmPHq8MWi4eC/V7hnbZETMHuWhUoiNdOEfsAXr3iP4KjyyRdwc7a
|
22
|
+
d/xgcK06UVQRL/HbEYGiQL056mc=
|
23
|
+
-----END CERTIFICATE-----
|
24
|
+
-----BEGIN CERTIFICATE-----
|
25
|
+
MIIDaDCCAlCgAwIBAgIBATANBgkqhkiG9w0BAQUFADA8MQswCQYDVQQGDAJKUDES
|
26
|
+
MBAGA1UECgwJSklOLkdSLkpQMQwwCgYDVQQLDANSUlIxCzAJBgNVBAMMAkNBMB4X
|
27
|
+
DTA0MDEzMDAwNDMyN1oXDTM1MDEyMjAwNDMyN1owPzELMAkGA1UEBgwCSlAxEjAQ
|
28
|
+
BgNVBAoMCUpJTi5HUi5KUDEMMAoGA1UECwwDUlJSMQ4wDAYDVQQDDAVTdWJDQTCC
|
29
|
+
ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJ0Ou7AyRcRXnB/kVHv/6kwe
|
30
|
+
ANzgg/DyJfsAUqW90m7Lu1nqyug8gK0RBd77yU0w5HOAMHTVSdpjZK0g2sgx4Mb1
|
31
|
+
d/213eL9TTl5MRVEChTvQr8q5DVG/8fxPPE7fMI8eOAzd98/NOAChk+80r4Sx7fC
|
32
|
+
kGVEE1bKwY1MrUsUNjOY2d6t3M4HHV3HX1V8ShuKfsHxgCmLzdI8U+5CnQedFgkm
|
33
|
+
3e+8tr8IX5RR1wA1Ifw9VadF7OdI/bGMzog/Q8XCLf+WPFjnK7Gcx6JFtzF6Gi4x
|
34
|
+
4dp1Xl45JYiVvi9zQ132wu8A1pDHhiNgQviyzbP+UjcB/tsOpzBQF8abYzgEkWEC
|
35
|
+
AwEAAaNyMHAwDwYDVR0TAQH/BAUwAwEB/zAxBglghkgBhvhCAQ0EJBYiUnVieS9P
|
36
|
+
cGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUlCjXWLsReYzH
|
37
|
+
LzsxwVnCXmKoB/owCwYDVR0PBAQDAgEGMA0GCSqGSIb3DQEBBQUAA4IBAQCJ/OyN
|
38
|
+
rT8Cq2Y+G2yA/L1EMRvvxwFBqxavqaqHl/6rwsIBFlB3zbqGA/0oec6MAVnYynq4
|
39
|
+
c4AcHTjx3bQ/S4r2sNTZq0DH4SYbQzIobx/YW8PjQUJt8KQdKMcwwi7arHP7A/Ha
|
40
|
+
LKu8eIC2nsUBnP4NhkYSGhbmpJK+PFD0FVtD0ZIRlY/wsnaZNjWWcnWF1/FNuQ4H
|
41
|
+
ySjIblqVQkPuzebv3Ror6ZnVDukn96Mg7kP4u6zgxOeqlJGRe1M949SS9Vudjl8X
|
42
|
+
SF4aZUUB9pQGhsqQJVqaz2OlhGOp9D0q54xko/rekjAIcuDjl1mdX4F2WRrzpUmZ
|
43
|
+
uY/bPeOBYiVsOYVe
|
44
|
+
-----END CERTIFICATE-----
|