httpclient 2.2.0.2 → 2.2.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/lib/httpclient.rb +5 -5
- data/lib/httpclient/cacert.p7s +12 -12
- data/lib/httpclient/cacert_sha1.p7s +12 -12
- data/lib/httpclient/http.rb +15 -8
- data/lib/httpclient/session.rb +6 -1
- data/lib/httpclient/ssl_config.rb +18 -14
- data/sample/async.rb +8 -0
- data/sample/auth.rb +11 -0
- data/sample/cookie.rb +18 -0
- data/sample/dav.rb +103 -0
- data/sample/howto.rb +49 -0
- data/sample/oauth_buzz.rb +57 -0
- data/sample/oauth_friendfeed.rb +59 -0
- data/sample/oauth_twitter.rb +61 -0
- data/sample/ssl/0cert.pem +22 -0
- data/sample/ssl/0key.pem +30 -0
- data/sample/ssl/1000cert.pem +19 -0
- data/sample/ssl/1000key.pem +18 -0
- data/sample/ssl/htdocs/index.html +10 -0
- data/sample/ssl/ssl_client.rb +22 -0
- data/sample/ssl/webrick_httpsd.rb +29 -0
- data/sample/stream.rb +21 -0
- data/sample/thread.rb +27 -0
- data/sample/wcat.rb +21 -0
- data/test/ca.cert +23 -0
- data/test/client.cert +19 -0
- data/test/client.key +15 -0
- data/test/helper.rb +99 -0
- data/test/htdigest +1 -0
- data/test/htpasswd +2 -0
- data/test/runner.rb +2 -0
- data/test/server.cert +19 -0
- data/test/server.key +15 -0
- data/test/sslsvr.rb +65 -0
- data/test/subca.cert +21 -0
- data/test/test_auth.rb +196 -0
- data/test/test_cookie.rb +398 -0
- data/test/test_http-access2.rb +497 -0
- data/test/test_httpclient.rb +1544 -0
- data/test/test_ssl.rb +215 -0
- metadata +53 -38
- data/lib/http-access2.rbc +0 -732
- data/lib/httpclient.rbc +0 -13559
- data/lib/httpclient/auth.rbc +0 -13772
- data/lib/httpclient/connection.rbc +0 -767
- data/lib/httpclient/cookie.rbc +0 -8442
- data/lib/httpclient/http.rbc +0 -14163
- data/lib/httpclient/session.rbc +0 -15846
- data/lib/httpclient/ssl_config.rbc +0 -5575
- data/lib/httpclient/timeout.rbc +0 -2411
- data/lib/httpclient/util.rbc +0 -1278
@@ -0,0 +1,57 @@
|
|
1
|
+
require 'oauthclient'
|
2
|
+
require 'zlib'
|
3
|
+
require 'stringio'
|
4
|
+
|
5
|
+
# Get your own consumer token from http://code.google.com/apis/accounts/docs/RegistrationForWebAppsAuto.html
|
6
|
+
consumer_key = nil
|
7
|
+
consumer_secret = nil
|
8
|
+
|
9
|
+
callback = 'http://localhost/' # should point somewhere else...
|
10
|
+
scope = 'https://www.googleapis.com/auth/buzz'
|
11
|
+
request_token_url = 'https://www.google.com/accounts/OAuthGetRequestToken'
|
12
|
+
access_token_url = 'https://www.google.com/accounts/OAuthGetAccessToken'
|
13
|
+
|
14
|
+
STDOUT.sync = true
|
15
|
+
|
16
|
+
# create OAuth client.
|
17
|
+
client = OAuthClient.new
|
18
|
+
client.oauth_config.consumer_key = consumer_key
|
19
|
+
client.oauth_config.consumer_secret = consumer_secret
|
20
|
+
client.oauth_config.signature_method = 'HMAC-SHA1'
|
21
|
+
client.oauth_config.http_method = :get # Twitter does not allow :post
|
22
|
+
client.debug_dev = STDERR if $DEBUG
|
23
|
+
|
24
|
+
# Get request token.
|
25
|
+
res = client.get_request_token(request_token_url, callback, :scope => scope)
|
26
|
+
p res.status
|
27
|
+
p res.oauth_params
|
28
|
+
p res.content
|
29
|
+
p client.oauth_config
|
30
|
+
token = res.oauth_params['oauth_token']
|
31
|
+
secret = res.oauth_params['oauth_token_secret']
|
32
|
+
raise if token.nil? or secret.nil?
|
33
|
+
|
34
|
+
# You need to confirm authorization out of band.
|
35
|
+
puts
|
36
|
+
puts "Go here and do confirm: https://www.google.com/buzz/api/auth/OAuthAuthorizeToken?oauth_token=#{token}&domain=#{consumer_key}&scope=#{scope}"
|
37
|
+
puts "Type oauth_verifier (if given) and hit [enter] to go"
|
38
|
+
require 'cgi'
|
39
|
+
verifier = CGI.unescape(gets.chomp)
|
40
|
+
verifier = nil if verifier.empty?
|
41
|
+
|
42
|
+
# Get access token.
|
43
|
+
res = client.get_access_token(access_token_url, token, secret, verifier)
|
44
|
+
p res.status
|
45
|
+
p res.oauth_params
|
46
|
+
p res.content
|
47
|
+
p client.oauth_config
|
48
|
+
id = res.oauth_params['user_id']
|
49
|
+
|
50
|
+
puts
|
51
|
+
puts "Access token usage example"
|
52
|
+
puts "Hit [enter] to go"
|
53
|
+
gets
|
54
|
+
|
55
|
+
# Access to a protected resource.
|
56
|
+
# @consumption requires Buzz API
|
57
|
+
puts client.get_content("https://www.googleapis.com/buzz/v1/activities/@me/@consumption", :alt => :json, :prettyprint => true)
|
@@ -0,0 +1,59 @@
|
|
1
|
+
require 'oauthclient'
|
2
|
+
|
3
|
+
# Get your own consumer token from http://friendfeed.com/api/applications
|
4
|
+
consumer_key = 'EDIT HERE'
|
5
|
+
consumer_secret = 'EDIT HERE'
|
6
|
+
|
7
|
+
request_token_url = 'https://friendfeed.com/account/oauth/request_token'
|
8
|
+
oob_authorize_url = 'https://friendfeed.com/account/oauth/authorize'
|
9
|
+
access_token_url = 'https://friendfeed.com/account/oauth/access_token'
|
10
|
+
|
11
|
+
STDOUT.sync = true
|
12
|
+
|
13
|
+
# create OAuth client.
|
14
|
+
client = OAuthClient.new
|
15
|
+
client.oauth_config.consumer_key = consumer_key
|
16
|
+
client.oauth_config.consumer_secret = consumer_secret
|
17
|
+
client.oauth_config.signature_method = 'HMAC-SHA1'
|
18
|
+
client.oauth_config.http_method = :get # FriendFeed does not allow :post
|
19
|
+
client.debug_dev = STDERR if $DEBUG
|
20
|
+
|
21
|
+
# Get request token.
|
22
|
+
res = client.get_request_token(request_token_url)
|
23
|
+
p res.status
|
24
|
+
p res.oauth_params
|
25
|
+
p res.content
|
26
|
+
p client.oauth_config
|
27
|
+
token = res.oauth_params['oauth_token']
|
28
|
+
secret = res.oauth_params['oauth_token_secret']
|
29
|
+
raise if token.nil? or secret.nil?
|
30
|
+
|
31
|
+
# You need to confirm authorization out of band.
|
32
|
+
puts
|
33
|
+
puts "Go here and do confirm: #{oob_authorize_url}?oauth_token=#{token}"
|
34
|
+
puts "Hit [enter] to go"
|
35
|
+
gets
|
36
|
+
|
37
|
+
# Get access token.
|
38
|
+
# FYI: You may need to re-construct OAuthClient instance here.
|
39
|
+
# In normal web app flow, getting access token and getting request token
|
40
|
+
# must be done in different HTTP requests.
|
41
|
+
# client = OAuthClient.new
|
42
|
+
# client.oauth_config.consumer_key = consumer_key
|
43
|
+
# client.oauth_config.consumer_secret = consumer_secret
|
44
|
+
# client.oauth_config.signature_method = 'HMAC-SHA1'
|
45
|
+
# client.oauth_config.http_method = :get # Twitter does not allow :post
|
46
|
+
res = client.get_access_token(access_token_url, token, secret)
|
47
|
+
p res.status
|
48
|
+
p res.oauth_params
|
49
|
+
p res.content
|
50
|
+
p client.oauth_config
|
51
|
+
username = res.oauth_params['username']
|
52
|
+
|
53
|
+
puts
|
54
|
+
puts "Access token usage example"
|
55
|
+
puts "Hit [enter] to go"
|
56
|
+
gets
|
57
|
+
|
58
|
+
# Access to a protected resource. (user profile)
|
59
|
+
puts client.get("http://friendfeed-api.com/v2/feedinfo/#{username}?format=json")
|
@@ -0,0 +1,61 @@
|
|
1
|
+
require 'oauthclient'
|
2
|
+
|
3
|
+
# Get your own consumer token from http://twitter.com/apps
|
4
|
+
consumer_key = 'EDIT HERE'
|
5
|
+
consumer_secret = 'EDIT HERE'
|
6
|
+
|
7
|
+
callback = ARGV.shift # can be nil for OAuth 1.0. (not 1.0a)
|
8
|
+
request_token_url = 'http://twitter.com/oauth/request_token'
|
9
|
+
oob_authorize_url = 'http://twitter.com/oauth/authorize'
|
10
|
+
access_token_url = 'http://twitter.com/oauth/access_token'
|
11
|
+
|
12
|
+
STDOUT.sync = true
|
13
|
+
|
14
|
+
# create OAuth client.
|
15
|
+
client = OAuthClient.new
|
16
|
+
client.oauth_config.consumer_key = consumer_key
|
17
|
+
client.oauth_config.consumer_secret = consumer_secret
|
18
|
+
client.oauth_config.signature_method = 'HMAC-SHA1'
|
19
|
+
client.oauth_config.http_method = :get # Twitter does not allow :post
|
20
|
+
client.debug_dev = STDERR if $DEBUG
|
21
|
+
|
22
|
+
# Get request token.
|
23
|
+
res = client.get_request_token(request_token_url, callback)
|
24
|
+
p res.status
|
25
|
+
p res.oauth_params
|
26
|
+
p res.content
|
27
|
+
p client.oauth_config
|
28
|
+
token = res.oauth_params['oauth_token']
|
29
|
+
secret = res.oauth_params['oauth_token_secret']
|
30
|
+
raise if token.nil? or secret.nil?
|
31
|
+
|
32
|
+
# You need to confirm authorization out of band.
|
33
|
+
puts
|
34
|
+
puts "Go here and do confirm: #{oob_authorize_url}?oauth_token=#{token}"
|
35
|
+
puts "Type oauth_verifier/PIN (if given) and hit [enter] to go"
|
36
|
+
verifier = gets.chomp
|
37
|
+
verifier = nil if verifier.empty?
|
38
|
+
|
39
|
+
# Get access token.
|
40
|
+
# FYI: You may need to re-construct OAuthClient instance here.
|
41
|
+
# In normal web app flow, getting access token and getting request token
|
42
|
+
# must be done in different HTTP requests.
|
43
|
+
# client = OAuthClient.new
|
44
|
+
# client.oauth_config.consumer_key = consumer_key
|
45
|
+
# client.oauth_config.consumer_secret = consumer_secret
|
46
|
+
# client.oauth_config.signature_method = 'HMAC-SHA1'
|
47
|
+
# client.oauth_config.http_method = :get # Twitter does not allow :post
|
48
|
+
res = client.get_access_token(access_token_url, token, secret, verifier)
|
49
|
+
p res.status
|
50
|
+
p res.oauth_params
|
51
|
+
p res.content
|
52
|
+
p client.oauth_config
|
53
|
+
id = res.oauth_params['user_id']
|
54
|
+
|
55
|
+
puts
|
56
|
+
puts "Access token usage example"
|
57
|
+
puts "Hit [enter] to go"
|
58
|
+
gets
|
59
|
+
|
60
|
+
# Access to a protected resource. (DM)
|
61
|
+
puts client.get("http://twitter.com/direct_messages.json")
|
@@ -0,0 +1,22 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIDjzCCAnegAwIBAgIBADANBgkqhkiG9w0BAQUFADAtMQswCQYDVQQGEwJDWjEN
|
3
|
+
MAsGA1UEChMEUnVieTEPMA0GA1UEAxMGUnVieUNBMB4XDTAzMDUzMTAyNDcyOFoX
|
4
|
+
DTA1MDUzMDAyNDcyOFowLTELMAkGA1UEBhMCQ1oxDTALBgNVBAoTBFJ1YnkxDzAN
|
5
|
+
BgNVBAMTBlJ1YnlDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANfw
|
6
|
+
JSR2OxME6WBRYekhvN1M7uZwJLC3qHhRtBm583x7MS3yzF/HwFNH1oAmOmzUcDSz
|
7
|
+
Y9OmTDVIMU9b0bSYHuu8KswrRWmx/iEhgU/hODS1MQKi+uHoMTtY/dVXwTLAfw5d
|
8
|
+
UMPQ9F5EhiV57sKWrS7vIVBtpxUNgfJW61FP+Ru3Lr8uhUgXPECHck8fjFu8w2Sw
|
9
|
+
JQBQ8ePrfKBiTHpOzKmDVXXWzVYzIQN0zQfpu/FSjOJ4xWV3wmfltN4FK+UkpALW
|
10
|
+
3RKsNFx+Pmji0fr2/PeEPhzKkhWk5b+pYrIlTNkagS7u8EoeLtY1y3LSZvopbcPI
|
11
|
+
l0QFQHCMtxS7ngC6wsECAwEAAaOBuTCBtjAPBgNVHRMECDAGAQH/AgEAMC0GCWCG
|
12
|
+
SAGG+EIBDQQgFh5HZW5lcmF0ZWQgYnkgT3BlblNTTCBmb3IgUnVieS4wHQYDVR0O
|
13
|
+
BBYEFA2IpXrgDnpJ9p6bfBmtM6j0IejmMFUGA1UdIwROMEyAFA2IpXrgDnpJ9p6b
|
14
|
+
fBmtM6j0IejmoTGkLzAtMQswCQYDVQQGEwJDWjENMAsGA1UEChMEUnVieTEPMA0G
|
15
|
+
A1UEAxMGUnVieUNBggEAMA0GCSqGSIb3DQEBBQUAA4IBAQB1b4iTezqgZj6FhcAc
|
16
|
+
0AtleAc8TpUn8YOX6zSlHG6I7tKcLfnWen9eFs4Jx73Bup5wHvcrHF6U+/nAdpb5
|
17
|
+
R7lkNbjWFWwoi5cQC36mh4ym8GWhUZUf8362yPzimbdKMBIiDoIBY8NyIBBORU2m
|
18
|
+
BlXsHr0dqGpeTmNnFhgi1FCN+F/VitplOUP9E8NzsgLS/GY9HO160HbPXoZc4yp5
|
19
|
+
KFweqmyhbxZvkrrD6LanvB23cJP+TeHzA5mLJtIBciFq+AJe+cDTlJYjtLcsxkAy
|
20
|
+
Evojd//5gePjgSz3gbzU5Zq0/tI2T0rQYnmySoSQ1u2+i5FrMvEjh/H6tZtQ6nO0
|
21
|
+
ROTL
|
22
|
+
-----END CERTIFICATE-----
|
data/sample/ssl/0key.pem
ADDED
@@ -0,0 +1,30 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
Proc-Type: 4,ENCRYPTED
|
3
|
+
DEK-Info: DES-EDE3-CBC,BC9A85421E11A052
|
4
|
+
|
5
|
+
dlFN8woboqu1mLWHSe6HnBCzrJUFw1NLv4sJM8MFPcSGkPEJoqceRQ5XFFlwnhwT
|
6
|
+
WStidVQLAaCqWxPlQbvKs/eW2yEZRX3JhNHlGkuZUbAuqC7FGcIPCFtXmshmR3/K
|
7
|
+
wSxM3DuEBA31kHoyH/DGPEOcp/L9M95fU2w/1Zz895nXgECdlYfMB7KEXJ7S0TVD
|
8
|
+
NvcH6dcNS2I56ikUfRd9MA+tTtJTDsolBii3HpNkI+i8GeAAznfuyhCa+RasbMnR
|
9
|
+
3SRHSgiZpK01JkepKEumG1iyGXBE4GMlF3dK9TL4UTfK7PjbW1BRGVdmGayA5L8X
|
10
|
+
vpn9uIMbpFUD7nU/cSs6+ECYy9Fdq/d8oE7YRVpqGA2mX+Vvjzc6ZByiW8eH8uYW
|
11
|
+
d1YCySAzttQUcDFx4YlpbQN+NSE67amGY/nkXn3CnQuB2uDiUm6818p1jjhEbIj6
|
12
|
+
SQpNgpuhHPhyawMuC98BvxEXoSTFRmXx5h+Qgo8nfCBUpGUCA8STuJG+EebIXMHH
|
13
|
+
yNdZGYMdkkuzow1G+bcHaIV4pgD0hOX6D+AzhO8/11gsJNiZHWAkxRtXres0B7JQ
|
14
|
+
BTv6mrpmRsr1TbY7K55y5QePkvroiqI4BX2//RgAcUw+aBzPCSt87YU55pPxxDCv
|
15
|
+
KnoMQJapUIlXgYBs+2GBiFQlr3dAnzduXrXkZa/TuE0853QDDnKWN3aWapW0EieH
|
16
|
+
sDxYz6kZ6c/vjDJtNjjgysKvi2ZFnJMk92fi1sNd2MrH9w1vSmjHw6+b9REH+r6K
|
17
|
+
YCcMzCUnIV5Y5jgbnrY5jWlB5Jt5PlU+QDFTBNsdctyoES3h5yQh48hcpnJOy4YT
|
18
|
+
tn9jEmIAYM7QZtGZrY5yiZRZbM5tLL7VeXA0M7N0ivjZUVP4NBUV1IFhLpeus3Yo
|
19
|
+
yXB99Sib/M8fqlmnRlyKKaRseB9a80/LJdLJC7Q1aJG9JYTTpumydppDzvwwUFV/
|
20
|
+
yHQibPzWhnHTElyXSGeWWQ/4gKJXJFkSyrBeKt/DcDggEnpsVw7kAeo0KJLWvBq2
|
21
|
+
0CwnWxPsseIYSLdwE0wOZTnWvHC6viCCqxaFwROa+bHsgCtRR8xwOKVg0RQRexQi
|
22
|
+
SKsCEyq4hfKH3Kd7KkI5c4iCHrNDxQiYVAHGo0kuVWPNP9PH8XrRuP7f2Aq6ObEU
|
23
|
+
cGLN+OKlzChKJQZZzdthGTjO52cZERokS7etLs5yPNM27CUZIy2gUsWwANG700ov
|
24
|
+
DYi4S9j4y2fK9qVFGuNmZ7nNQ6juHIN8ZpZObmzGz/GEsVy8zYGV7jH2bC8fhCg1
|
25
|
+
wiTn0CHyfI0AfJ5zQMQ48z/ATI5+/pP5DuJ4kPLYU90EdIlIQ/9zQDRxVPvUalas
|
26
|
+
kskX8qdsbILaLqKzqvPa6jkhncV7SVQPhxIrs6vU2RWrsU1Qw9wHhzaITu9yb1l1
|
27
|
+
s8uialiJWnWOwkhIAUULOoGRnBB7U6sseFh7LcYHc2sZYJzQQO3g14ANvtsu/ILT
|
28
|
+
abUPXtGHSUlI4kUjI82NEkyQz/pDD9VkhTefiFHNymIkUaZBulmR5QdcEcQn6bku
|
29
|
+
J/P3M/T7CtsCPdBUrzDI71eAYqXPjikg+8unKWk9c/p+V7wXtvsdgJf3+xht/YUQ
|
30
|
+
-----END RSA PRIVATE KEY-----
|
@@ -0,0 +1,19 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIDCTCCAfGgAwIBAgICA+gwDQYJKoZIhvcNAQEFBQAwLTELMAkGA1UEBhMCQ1ox
|
3
|
+
DTALBgNVBAoTBFJ1YnkxDzANBgNVBAMTBlJ1YnlDQTAeFw0wMzA1MzEwMzUwNDFa
|
4
|
+
Fw0wNDA1MzAwMzUwNDFaMDAxCzAJBgNVBAYTAkNaMQ0wCwYDVQQKEwRSdWJ5MRIw
|
5
|
+
EAYDVQQDEwlsb2NhbGhvc3QwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALhs
|
6
|
+
fh4i1c+K57vFG7SUDfdxuSlbPUqaV0sbiuvWb0f7B2T7bHicaIRsDYW7PQRLLwwR
|
7
|
+
Pd+aKg3KuwhWN47faRam19Z3yWCD7Tg+BhXDqlXnz6snnr4APpAxc22kJKjzuil6
|
8
|
+
sp+QTkl/EFKI3+ocDur1UB+kSOmTzsDmepaWUZwTAgMBAAGjgbMwgbAwCQYDVR0T
|
9
|
+
BAIwADAtBglghkgBhvhCAQ0EIBYeR2VuZXJhdGVkIGJ5IE9wZW5TU0wgZm9yIFJ1
|
10
|
+
YnkuMB0GA1UdDgQWBBQlYESgTYdkTOYy02+/jGSqa+OpzjBVBgNVHSMETjBMgBQN
|
11
|
+
iKV64A56Sfaem3wZrTOo9CHo5qExpC8wLTELMAkGA1UEBhMCQ1oxDTALBgNVBAoT
|
12
|
+
BFJ1YnkxDzANBgNVBAMTBlJ1YnlDQYIBADANBgkqhkiG9w0BAQUFAAOCAQEAJh9v
|
13
|
+
ehhUv69oilVWGvGB6xCr8LgErnO9QdAyqJE2xBhbNaB3crjWDdQTz4UNvCQoJG/4
|
14
|
+
Oa9Vp10vM8E0ZMVHer87WM9tPEOg09r38U/1c7gSYBkPSGQfeWtZNjQ1YOm6RDx4
|
15
|
+
JJp9sp9v/CdBlVXaBQQd+MQFny7E+EkMHRfiv89KTfOs0wYdirLrM1C90CZUEj0i
|
16
|
+
cMcBdHzH5XcNpWB1ag4cNiUn2ljsaWlUpEg48gLe2FLJVPBio+iZnOm/C6KIwBMO
|
17
|
+
BCVxkZ6oIR87JT4xbr8SxRS9d/irhVU9MtGYwMe4MPSztefASdmEyj59ZFCLKQHV
|
18
|
+
+ltGb7/b7DetoT1spA==
|
19
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,18 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
Proc-Type: 4,ENCRYPTED
|
3
|
+
DEK-Info: DES-EDE3-CBC,5E9A9AC8F0F62A4A
|
4
|
+
|
5
|
+
3/VDlc8E13xKZr+MXt+HVZCiuWN1gsVx1bTZE5fN5FVoJ45Bgy2zAegnqZiP1NNy
|
6
|
+
j/76Vy9Ru/G9HPh5QPbIPl+md+tOyJV2M23a+5jESk1tLuWt5lRqmTtHN000844l
|
7
|
+
uCgZPPhRV7nhYPC5f6Gqw/xDl/EZsElqJM/hl2JbqiVKfT5/1i0STU8LNkoaLWrJ
|
8
|
+
kQhc7hOR5ihmDPeD8mA99bmGD+UyyqzzLTtKvRbBObyi9dy7cQ5Q+iptQWTUuEKI
|
9
|
+
+W7b8f8/Iiin4JJZGpFuhQSx0ARjT0fuYNXddmz1L3Gu3sjzN1GvT2T3GlpiF4/7
|
10
|
+
ERS8Q43zjoCP8nC2MTSvdNRRoPMBg2SDS2ZIq4GSiKsKjeN+GnPCycAMeZSr5yG6
|
11
|
+
VMBJLoAJ7XIcl3se8gF6hH1AfhCzDaK/2pKLP9jH/W4g6VvUBazKEQCNbZXSTpQ4
|
12
|
+
8EfvJBPpplFs3Zid6iwC/WjKhFBuBBfycwNJjXG9x1fMPkBM8HeiZXgrXoUXJMEP
|
13
|
+
RF05Beo0HPPEOPIxcG6EVmnpDvs8uC+xIQ6UE6DrLGK5TnR6kdz3BDpeAehujSss
|
14
|
+
wfZiOvuJQZQl+oovOH54pcwAwhicgRcNdIX47kHrXNL1vQMYTXte+ZzDGyoOXd0W
|
15
|
+
qf1CZbrjULT9nfJFWMMicTnLM/6iQx+3bTkXXvk0qP0qAoIPqtY4rwt6yHgq937A
|
16
|
+
LubDxudMWV0hqcnH8cBCPHfWdE4HELw4RcVXmQH43yHs1gwShyG9rTS+PCKoRr8u
|
17
|
+
bpssW6J0xJmilf1KprbNWJyof9i0CtSVOlUt6ttoinwqj8Me01dHqQ==
|
18
|
+
-----END RSA PRIVATE KEY-----
|
@@ -0,0 +1,22 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
$:.unshift(File.join('..', '..', 'lib'))
|
4
|
+
require 'httpclient'
|
5
|
+
|
6
|
+
url = ARGV.shift || 'https://localhost:8808/'
|
7
|
+
uri = URI.parse(url)
|
8
|
+
|
9
|
+
#ca_file = "0cert.pem"
|
10
|
+
#crl_file = '0crl.pem'
|
11
|
+
|
12
|
+
# create CA's cert in pem format and run 'c_rehash' in trust_certs dir. before
|
13
|
+
# using this.
|
14
|
+
ca_path = File.join(File.dirname(File.expand_path(__FILE__)), "trust_certs")
|
15
|
+
|
16
|
+
proxy = ENV['HTTP_PROXY'] || ENV['http_proxy'] || nil
|
17
|
+
h = HTTPClient.new(proxy)
|
18
|
+
#h.ssl_config.add_trust_ca(ca_file)
|
19
|
+
#h.ssl_config.add_crl(crl_file)
|
20
|
+
h.ssl_config.add_trust_ca(ca_path)
|
21
|
+
|
22
|
+
print h.get_content(url)
|
@@ -0,0 +1,29 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
require 'webrick/https'
|
4
|
+
require 'getopts'
|
5
|
+
|
6
|
+
getopts nil, 'r:', 'p:8808'
|
7
|
+
|
8
|
+
dir = File::dirname(File::expand_path(__FILE__))
|
9
|
+
|
10
|
+
# Pass phrase of '1000key.pem' is '1000'.
|
11
|
+
data = open(File::join(dir, "1000key.pem")){|io| io.read }
|
12
|
+
pkey = OpenSSL::PKey::RSA.new(data)
|
13
|
+
data = open(File::join(dir, "1000cert.pem")){|io| io.read }
|
14
|
+
cert = OpenSSL::X509::Certificate.new(data)
|
15
|
+
|
16
|
+
s = WEBrick::HTTPServer.new(
|
17
|
+
:BindAddress => "localhost",
|
18
|
+
:Port => $OPT_p.to_i,
|
19
|
+
:Logger => nil,
|
20
|
+
:DocumentRoot => $OPT_r || File::join(dir, "/htdocs"),
|
21
|
+
:SSLEnable => true,
|
22
|
+
:SSLVerifyClient => ::OpenSSL::SSL::VERIFY_NONE,
|
23
|
+
:SSLCertificate => cert,
|
24
|
+
:SSLPrivateKey => pkey,
|
25
|
+
:SSLCertName => nil,
|
26
|
+
:SSLCACertificateFile => "all.pem"
|
27
|
+
)
|
28
|
+
trap("INT"){ s.shutdown }
|
29
|
+
s.start
|
data/sample/stream.rb
ADDED
@@ -0,0 +1,21 @@
|
|
1
|
+
$:.unshift(File.join('..', 'lib'))
|
2
|
+
require "httpclient"
|
3
|
+
|
4
|
+
c = HTTPClient.new
|
5
|
+
|
6
|
+
piper, pipew = IO.pipe
|
7
|
+
conn = c.post_async("http://localhost:8080/stream", piper)
|
8
|
+
|
9
|
+
Thread.new do
|
10
|
+
res = conn.pop
|
11
|
+
while str = res.content.read(10)
|
12
|
+
p str
|
13
|
+
end
|
14
|
+
end
|
15
|
+
|
16
|
+
p "type here"
|
17
|
+
while line = STDIN.gets
|
18
|
+
pipew << line
|
19
|
+
end
|
20
|
+
pipew.close
|
21
|
+
sleep 5
|
data/sample/thread.rb
ADDED
@@ -0,0 +1,27 @@
|
|
1
|
+
$:.unshift(File.join('..', 'lib'))
|
2
|
+
require 'httpclient'
|
3
|
+
|
4
|
+
urlstr = ARGV.shift
|
5
|
+
|
6
|
+
proxy = ENV['HTTP_PROXY'] || ENV['http_proxy']
|
7
|
+
h = HTTPClient.new(proxy)
|
8
|
+
|
9
|
+
count = 20
|
10
|
+
|
11
|
+
res = []
|
12
|
+
g = []
|
13
|
+
for i in 0..count
|
14
|
+
g << Thread.new {
|
15
|
+
res[i] = h.get(urlstr)
|
16
|
+
}
|
17
|
+
end
|
18
|
+
|
19
|
+
g.each do |th|
|
20
|
+
th.join
|
21
|
+
end
|
22
|
+
|
23
|
+
for i in 0..(count - 1)
|
24
|
+
raise unless (res[i].content == res[i + 1].content)
|
25
|
+
end
|
26
|
+
|
27
|
+
puts 'ok'
|
data/sample/wcat.rb
ADDED
@@ -0,0 +1,21 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
# wcat for http-access2
|
4
|
+
# Copyright (C) 2001 TAKAHASHI Masayoshi
|
5
|
+
|
6
|
+
$:.unshift(File.join('..', 'lib'))
|
7
|
+
require 'httpclient'
|
8
|
+
|
9
|
+
if ENV['HTTP_PROXY']
|
10
|
+
h = HTTPClient.new(ENV['HTTP_PROXY'])
|
11
|
+
else
|
12
|
+
h = HTTPClient.new()
|
13
|
+
end
|
14
|
+
|
15
|
+
while urlstr = ARGV.shift
|
16
|
+
response = h.get(urlstr){ |data|
|
17
|
+
print data
|
18
|
+
}
|
19
|
+
p response.contenttype
|
20
|
+
p response.peer_cert if /^https/i =~ urlstr
|
21
|
+
end
|
data/test/ca.cert
ADDED
@@ -0,0 +1,23 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIID0DCCArigAwIBAgIBADANBgkqhkiG9w0BAQUFADA8MQswCQYDVQQGDAJKUDES
|
3
|
+
MBAGA1UECgwJSklOLkdSLkpQMQwwCgYDVQQLDANSUlIxCzAJBgNVBAMMAkNBMB4X
|
4
|
+
DTA0MDEzMDAwNDIzMloXDTM2MDEyMjAwNDIzMlowPDELMAkGA1UEBgwCSlAxEjAQ
|
5
|
+
BgNVBAoMCUpJTi5HUi5KUDEMMAoGA1UECwwDUlJSMQswCQYDVQQDDAJDQTCCASIw
|
6
|
+
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANbv0x42BTKFEQOE+KJ2XmiSdZpR
|
7
|
+
wjzQLAkPLRnLB98tlzs4xo+y4RyY/rd5TT9UzBJTIhP8CJi5GbS1oXEerQXB3P0d
|
8
|
+
L5oSSMwGGyuIzgZe5+vZ1kgzQxMEKMMKlzA73rbMd4Jx3u5+jdbP0EDrPYfXSvLY
|
9
|
+
bS04n2aX7zrN3x5KdDrNBfwBio2/qeaaj4+9OxnwRvYP3WOvqdW0h329eMfHw0pi
|
10
|
+
JI0drIVdsEqClUV4pebT/F+CPUPkEh/weySgo9wANockkYu5ujw2GbLFcO5LXxxm
|
11
|
+
dEfcVr3r6t6zOA4bJwL0W/e6LBcrwiG/qPDFErhwtgTLYf6Er67SzLyA66UCAwEA
|
12
|
+
AaOB3DCB2TAPBgNVHRMBAf8EBTADAQH/MDEGCWCGSAGG+EIBDQQkFiJSdWJ5L09w
|
13
|
+
ZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRJ7Xd380KzBV7f
|
14
|
+
USKIQ+O/vKbhDzAOBgNVHQ8BAf8EBAMCAQYwZAYDVR0jBF0wW4AUSe13d/NCswVe
|
15
|
+
31EiiEPjv7ym4Q+hQKQ+MDwxCzAJBgNVBAYMAkpQMRIwEAYDVQQKDAlKSU4uR1Iu
|
16
|
+
SlAxDDAKBgNVBAsMA1JSUjELMAkGA1UEAwwCQ0GCAQAwDQYJKoZIhvcNAQEFBQAD
|
17
|
+
ggEBAIu/mfiez5XN5tn2jScgShPgHEFJBR0BTJBZF6xCk0jyqNx/g9HMj2ELCuK+
|
18
|
+
r/Y7KFW5c5M3AQ+xWW0ZSc4kvzyTcV7yTVIwj2jZ9ddYMN3nupZFgBK1GB4Y05GY
|
19
|
+
MJJFRkSu6d/Ph5ypzBVw2YMT/nsOo5VwMUGLgS7YVjU+u/HNWz80J3oO17mNZllj
|
20
|
+
PvORJcnjwlroDnS58KoJ7GDgejv3ESWADvX1OHLE4cRkiQGeLoEU4pxdCxXRqX0U
|
21
|
+
PbwIkZN9mXVcrmPHq8MWi4eC/V7hnbZETMHuWhUoiNdOEfsAXr3iP4KjyyRdwc7a
|
22
|
+
d/xgcK06UVQRL/HbEYGiQL056mc=
|
23
|
+
-----END CERTIFICATE-----
|
data/test/client.cert
ADDED
@@ -0,0 +1,19 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIDKDCCAhCgAwIBAgIBAjANBgkqhkiG9w0BAQUFADA8MQswCQYDVQQGDAJKUDES
|
3
|
+
MBAGA1UECgwJSklOLkdSLkpQMQwwCgYDVQQLDANSUlIxCzAJBgNVBAMMAkNBMB4X
|
4
|
+
DTA0MDEzMTAzMTQ1OFoXDTM1MDEyMzAzMTQ1OFowZTELMAkGA1UEBgwCSlAxEjAQ
|
5
|
+
BgNVBAoMCUpJTi5HUi5KUDEMMAoGA1UECwwDUlJSMRAwDgYDVQQDDAdleGFtcGxl
|
6
|
+
MSIwIAYJKoZIhvcNAQkBDBNleGFtcGxlQGV4YW1wbGUub3JnMIGfMA0GCSqGSIb3
|
7
|
+
DQEBAQUAA4GNADCBiQKBgQDRWssrK8Gyr+500hpLjCGR3+AHL8/hEJM5zKi/MgLW
|
8
|
+
jTkvsgOwbYwXOiNtAbR9y4/ucDq7EY+cMUMHES4uFaPTcOaAV0aZRmk8AgslN1tQ
|
9
|
+
gNS6ew7/Luq3DcVeWkX8PYgR9VG0mD1MPfJ6+IFA5d3vKpdBkBgN4l46jjO0/2Xf
|
10
|
+
ewIDAQABo4GPMIGMMAwGA1UdEwEB/wQCMAAwMQYJYIZIAYb4QgENBCQWIlJ1Ynkv
|
11
|
+
T3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFOFvay0H7lr2
|
12
|
+
xUx6waYEV2bVDYQhMAsGA1UdDwQEAwIF4DAdBgNVHSUEFjAUBggrBgEFBQcDAgYI
|
13
|
+
KwYBBQUHAwQwDQYJKoZIhvcNAQEFBQADggEBABd2dYWqbDIWf5sWFvslezxJv8gI
|
14
|
+
w64KCJBuyJAiDuf+oazr3016kMzAlt97KecLZDusGNagPrq02UX7YMoQFsWJBans
|
15
|
+
cDtHrkM0al5r6/WGexNMgtYbNTYzt/IwodISGBgZ6dsOuhznwms+IBsTNDAvWeLP
|
16
|
+
lt2tOqD8kEmjwMgn0GDRuKjs4EoboA3kMULb1p9akDV9ZESU3eOtpS5/G5J5msLI
|
17
|
+
9WXbYBjcjvkLuJH9VsJhb+R58Vl0ViemvAHhPilSl1SPWVunGhv6FcIkdBEi1k9F
|
18
|
+
e8BNMmsEjFiANiIRvpdLRbiGBt0KrKTndVfsmoKCvY48oCOvnzxtahFxfs8=
|
19
|
+
-----END CERTIFICATE-----
|