2020-02-11 08:12:57 +01:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-03 13:44:13 +01:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2020-02-11 08:12:57 +01:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2020-03-03 16:53:44 +01:00
|
|
|
defmodule Pleroma.HTTP.AdapterHelper.Gun do
|
|
|
|
@behaviour Pleroma.HTTP.AdapterHelper
|
2020-02-11 08:12:57 +01:00
|
|
|
|
2020-03-06 19:04:18 +01:00
|
|
|
alias Pleroma.HTTP.AdapterHelper
|
2020-02-11 08:12:57 +01:00
|
|
|
alias Pleroma.Pool.Connections
|
|
|
|
|
2020-03-06 19:24:19 +01:00
|
|
|
require Logger
|
|
|
|
|
2020-02-11 08:12:57 +01:00
|
|
|
@defaults [
|
2020-02-24 17:56:27 +01:00
|
|
|
connect_timeout: 5_000,
|
2020-02-11 08:12:57 +01:00
|
|
|
domain_lookup_timeout: 5_000,
|
|
|
|
tls_handshake_timeout: 5_000,
|
2020-03-03 16:01:35 +01:00
|
|
|
retry: 1,
|
|
|
|
retry_timeout: 1000,
|
2020-02-11 08:12:57 +01:00
|
|
|
await_up_timeout: 5_000
|
|
|
|
]
|
|
|
|
|
|
|
|
@spec options(keyword(), URI.t()) :: keyword()
|
|
|
|
def options(connection_opts \\ [], %URI{} = uri) do
|
2020-03-06 19:04:18 +01:00
|
|
|
formatted_proxy =
|
|
|
|
Pleroma.Config.get([:http, :proxy_url], nil)
|
|
|
|
|> AdapterHelper.format_proxy()
|
|
|
|
|
|
|
|
config_opts = Pleroma.Config.get([:http, :adapter], [])
|
2020-02-11 08:12:57 +01:00
|
|
|
|
|
|
|
@defaults
|
2020-03-06 19:04:18 +01:00
|
|
|
|> Keyword.merge(config_opts)
|
2020-02-11 08:12:57 +01:00
|
|
|
|> add_scheme_opts(uri)
|
2020-03-06 19:04:18 +01:00
|
|
|
|> AdapterHelper.maybe_add_proxy(formatted_proxy)
|
2020-02-11 08:12:57 +01:00
|
|
|
|> maybe_get_conn(uri, connection_opts)
|
|
|
|
end
|
|
|
|
|
|
|
|
@spec after_request(keyword()) :: :ok
|
|
|
|
def after_request(opts) do
|
2020-03-06 19:04:18 +01:00
|
|
|
if opts[:conn] && opts[:body_as] != :chunks do
|
|
|
|
Connections.checkout(opts[:conn], self(), :gun_connections)
|
2020-02-11 08:12:57 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
:ok
|
|
|
|
end
|
|
|
|
|
|
|
|
defp add_scheme_opts(opts, %URI{scheme: "http"}), do: opts
|
|
|
|
|
2020-03-04 16:13:24 +01:00
|
|
|
defp add_scheme_opts(opts, %URI{scheme: "https", host: host}) do
|
2020-02-11 08:12:57 +01:00
|
|
|
adapter_opts = [
|
|
|
|
certificates_verification: true,
|
2020-03-04 16:13:24 +01:00
|
|
|
transport: :tls,
|
2020-02-11 08:12:57 +01:00
|
|
|
tls_opts: [
|
|
|
|
verify: :verify_peer,
|
|
|
|
cacertfile: CAStore.file_path(),
|
|
|
|
depth: 20,
|
|
|
|
reuse_sessions: false,
|
2020-03-03 13:44:13 +01:00
|
|
|
verify_fun: {&:ssl_verify_hostname.verify_fun/3, [check_hostname: format_host(host)]},
|
2020-02-21 12:28:16 +01:00
|
|
|
log_level: :warning
|
2020-02-11 08:12:57 +01:00
|
|
|
]
|
|
|
|
]
|
|
|
|
|
|
|
|
Keyword.merge(opts, adapter_opts)
|
|
|
|
end
|
|
|
|
|
|
|
|
defp maybe_get_conn(adapter_opts, uri, connection_opts) do
|
|
|
|
{receive_conn?, opts} =
|
|
|
|
adapter_opts
|
|
|
|
|> Keyword.merge(connection_opts)
|
|
|
|
|> Keyword.pop(:receive_conn, true)
|
|
|
|
|
|
|
|
if Connections.alive?(:gun_connections) and receive_conn? do
|
|
|
|
try_to_get_conn(uri, opts)
|
|
|
|
else
|
|
|
|
opts
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
defp try_to_get_conn(uri, opts) do
|
2020-03-03 15:44:04 +01:00
|
|
|
case Connections.checkin(uri, :gun_connections) do
|
|
|
|
nil ->
|
|
|
|
Logger.debug(
|
|
|
|
"Gun connections pool checkin was not successful. Trying to open conn for next request."
|
2020-02-19 10:19:03 +01:00
|
|
|
)
|
|
|
|
|
2020-03-03 15:44:04 +01:00
|
|
|
Task.start(fn -> Pleroma.Gun.Conn.open(uri, :gun_connections, opts) end)
|
2020-02-11 08:12:57 +01:00
|
|
|
opts
|
|
|
|
|
2020-03-03 15:44:04 +01:00
|
|
|
conn when is_pid(conn) ->
|
|
|
|
Logger.debug("received conn #{inspect(conn)} #{Connections.compose_uri_log(uri)}")
|
2020-02-19 10:19:03 +01:00
|
|
|
|
2020-02-11 08:12:57 +01:00
|
|
|
opts
|
2020-03-03 15:44:04 +01:00
|
|
|
|> Keyword.put(:conn, conn)
|
|
|
|
|> Keyword.put(:close_conn, false)
|
2020-02-11 08:12:57 +01:00
|
|
|
end
|
|
|
|
end
|
2020-03-03 13:44:13 +01:00
|
|
|
|
|
|
|
@spec format_host(String.t()) :: charlist()
|
|
|
|
def format_host(host) do
|
|
|
|
host_charlist = to_charlist(host)
|
|
|
|
|
|
|
|
case :inet.parse_address(host_charlist) do
|
|
|
|
{:error, :einval} ->
|
|
|
|
:idna.encode(host_charlist)
|
|
|
|
|
|
|
|
{:ok, _ip} ->
|
|
|
|
host_charlist
|
|
|
|
end
|
|
|
|
end
|
2020-02-11 08:12:57 +01:00
|
|
|
end
|