mirror of
https://gitlab.bertha.cloud/partitio/Nextcloud-Partitio/gonextcloud
synced 2024-11-13 06:46:25 +00:00
103 lines
2.9 KiB
Go
103 lines
2.9 KiB
Go
package grequests
|
|
|
|
import (
|
|
"errors"
|
|
"io"
|
|
"net/http"
|
|
"runtime"
|
|
"time"
|
|
)
|
|
|
|
const (
|
|
localUserAgent = "GRequests/0.10"
|
|
|
|
// Default value for net.Dialer Timeout
|
|
dialTimeout = 30 * time.Second
|
|
|
|
// Default value for net.Dialer KeepAlive
|
|
dialKeepAlive = 30 * time.Second
|
|
|
|
// Default value for http.Transport TLSHandshakeTimeout
|
|
tlsHandshakeTimeout = 10 * time.Second
|
|
|
|
// Default value for Request Timeout
|
|
requestTimeout = 90 * time.Second
|
|
)
|
|
|
|
var (
|
|
// ErrRedirectLimitExceeded is the error returned when the request responded
|
|
// with too many redirects
|
|
ErrRedirectLimitExceeded = errors.New("grequests: Request exceeded redirect count")
|
|
|
|
// RedirectLimit is a tunable variable that specifies how many times we can
|
|
// redirect in response to a redirect. This is the global variable, if you
|
|
// wish to set this on a request by request basis, set it within the
|
|
// `RequestOptions` structure
|
|
RedirectLimit = 30
|
|
|
|
// SensitiveHTTPHeaders is a map of sensitive HTTP headers that a user
|
|
// doesn't want passed on a redirect. This is the global variable, if you
|
|
// wish to set this on a request by request basis, set it within the
|
|
// `RequestOptions` structure
|
|
SensitiveHTTPHeaders = map[string]struct{}{
|
|
"Www-Authenticate": {},
|
|
"Authorization": {},
|
|
"Proxy-Authorization": {},
|
|
}
|
|
)
|
|
|
|
// XMLCharDecoder is a helper type that takes a stream of bytes (not encoded in
|
|
// UTF-8) and returns a reader that encodes the bytes into UTF-8. This is done
|
|
// because Go's XML library only supports XML encoded in UTF-8
|
|
type XMLCharDecoder func(charset string, input io.Reader) (io.Reader, error)
|
|
|
|
func addRedirectFunctionality(client *http.Client, ro *RequestOptions) {
|
|
if client.CheckRedirect != nil {
|
|
return
|
|
}
|
|
client.CheckRedirect = func(req *http.Request, via []*http.Request) error {
|
|
if ro.RedirectLimit == 0 {
|
|
ro.RedirectLimit = RedirectLimit
|
|
}
|
|
|
|
if len(via) >= ro.RedirectLimit {
|
|
return ErrRedirectLimitExceeded
|
|
}
|
|
|
|
if ro.SensitiveHTTPHeaders == nil {
|
|
ro.SensitiveHTTPHeaders = SensitiveHTTPHeaders
|
|
}
|
|
|
|
for k, vv := range via[0].Header {
|
|
// Is this a sensitive header?
|
|
if _, found := ro.SensitiveHTTPHeaders[k]; found {
|
|
continue
|
|
}
|
|
|
|
for _, v := range vv {
|
|
req.Header.Add(k, v)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// EnsureTransporterFinalized will ensure that when the HTTP client is GCed
|
|
// the runtime will close the idle connections (so that they won't leak)
|
|
// this function was adopted from Hashicorp's go-cleanhttp package
|
|
func EnsureTransporterFinalized(httpTransport *http.Transport) {
|
|
runtime.SetFinalizer(&httpTransport, func(transportInt **http.Transport) {
|
|
(*transportInt).CloseIdleConnections()
|
|
})
|
|
}
|
|
|
|
// EnsureResponseFinalized will ensure that when the Response is GCed
|
|
// the request body is closed so we aren't leaking fds
|
|
// func EnsureResponseFinalized(httpResp *Response) {
|
|
// runtime.SetFinalizer(&httpResp, func(httpResponseInt **Response) {
|
|
// (*httpResponseInt).RawResponse.Body.Close()
|
|
// })
|
|
// }
|
|
// This will come back in 1.0
|