124 lines
3.2 KiB
Elixir
124 lines
3.2 KiB
Elixir
|
# Pleroma: A lightweight social networking server
|
||
|
# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
|
||
|
# SPDX-License-Identifier: AGPL-3.0-only
|
||
|
|
||
|
defmodule Pleroma.HTTP.Adapter.Gun do
|
||
|
@behaviour Pleroma.HTTP.Adapter
|
||
|
|
||
|
alias Pleroma.HTTP.Adapter
|
||
|
|
||
|
require Logger
|
||
|
|
||
|
alias Pleroma.Pool.Connections
|
||
|
|
||
|
@defaults [
|
||
|
connect_timeout: 20_000,
|
||
|
domain_lookup_timeout: 5_000,
|
||
|
tls_handshake_timeout: 5_000,
|
||
|
retry_timeout: 100,
|
||
|
await_up_timeout: 5_000
|
||
|
]
|
||
|
|
||
|
@spec options(keyword(), URI.t()) :: keyword()
|
||
|
def options(connection_opts \\ [], %URI{} = uri) do
|
||
|
proxy = Pleroma.Config.get([:http, :proxy_url], nil)
|
||
|
|
||
|
@defaults
|
||
|
|> Keyword.merge(Pleroma.Config.get([:http, :adapter], []))
|
||
|
|> add_original(uri)
|
||
|
|> add_scheme_opts(uri)
|
||
|
|> Adapter.maybe_add_proxy(Adapter.format_proxy(proxy))
|
||
|
|> maybe_get_conn(uri, connection_opts)
|
||
|
end
|
||
|
|
||
|
@spec after_request(keyword()) :: :ok
|
||
|
def after_request(opts) do
|
||
|
with conn when not is_nil(conn) <- opts[:conn],
|
||
|
body_as when body_as != :chunks <- opts[:body_as] do
|
||
|
Connections.checkout(conn, self(), :gun_connections)
|
||
|
end
|
||
|
|
||
|
:ok
|
||
|
end
|
||
|
|
||
|
defp add_original(opts, %URI{host: host, port: port}) do
|
||
|
formatted_host = Adapter.domain_or_fallback(host)
|
||
|
|
||
|
Keyword.put(opts, :original, "#{formatted_host}:#{port}")
|
||
|
end
|
||
|
|
||
|
defp add_scheme_opts(opts, %URI{scheme: "http"}), do: opts
|
||
|
|
||
|
defp add_scheme_opts(opts, %URI{scheme: "https", host: host, port: port}) do
|
||
|
adapter_opts = [
|
||
|
certificates_verification: true,
|
||
|
tls_opts: [
|
||
|
verify: :verify_peer,
|
||
|
cacertfile: CAStore.file_path(),
|
||
|
depth: 20,
|
||
|
reuse_sessions: false,
|
||
|
verify_fun:
|
||
|
{&:ssl_verify_hostname.verify_fun/3, [check_hostname: Adapter.domain_or_fallback(host)]}
|
||
|
]
|
||
|
]
|
||
|
|
||
|
adapter_opts =
|
||
|
if port != 443 do
|
||
|
Keyword.put(adapter_opts, :transport, :tls)
|
||
|
else
|
||
|
adapter_opts
|
||
|
end
|
||
|
|
||
|
Keyword.merge(opts, adapter_opts)
|
||
|
end
|
||
|
|
||
|
defp maybe_get_conn(adapter_opts, uri, connection_opts) do
|
||
|
{receive_conn?, opts} =
|
||
|
adapter_opts
|
||
|
|> Keyword.merge(connection_opts)
|
||
|
|> Keyword.pop(:receive_conn, true)
|
||
|
|
||
|
if Connections.alive?(:gun_connections) and receive_conn? do
|
||
|
try_to_get_conn(uri, opts)
|
||
|
else
|
||
|
opts
|
||
|
end
|
||
|
end
|
||
|
|
||
|
defp try_to_get_conn(uri, opts) do
|
||
|
try do
|
||
|
case Connections.checkin(uri, :gun_connections) do
|
||
|
nil ->
|
||
|
Logger.info(
|
||
|
"Gun connections pool checkin was not succesfull. Trying to open conn for next request."
|
||
|
)
|
||
|
|
||
|
:ok = Connections.open_conn(uri, :gun_connections, opts)
|
||
|
opts
|
||
|
|
||
|
conn when is_pid(conn) ->
|
||
|
Logger.debug("received conn #{inspect(conn)} #{Connections.compose_uri(uri)}")
|
||
|
|
||
|
opts
|
||
|
|> Keyword.put(:conn, conn)
|
||
|
|> Keyword.put(:close_conn, false)
|
||
|
end
|
||
|
rescue
|
||
|
error ->
|
||
|
Logger.warn("Gun connections pool checkin caused error #{inspect(error)}")
|
||
|
opts
|
||
|
catch
|
||
|
:exit, {:timeout, _} ->
|
||
|
Logger.info(
|
||
|
"Gun connections pool checkin with timeout error #{Connections.compose_uri(uri)}"
|
||
|
)
|
||
|
|
||
|
opts
|
||
|
|
||
|
:exit, error ->
|
||
|
Logger.warn("Gun pool checkin exited with error #{inspect(error)}")
|
||
|
opts
|
||
|
end
|
||
|
end
|
||
|
end
|