akkoma/lib/pleroma/http/adapter_helper/gun.ex

121 lines
3.1 KiB
Elixir
Raw Normal View History

2020-02-11 00:12:57 -07:00
# Pleroma: A lightweight social networking server
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
2020-02-11 00:12:57 -07:00
# SPDX-License-Identifier: AGPL-3.0-only
2020-03-03 08:53:44 -07:00
defmodule Pleroma.HTTP.AdapterHelper.Gun do
@behaviour Pleroma.HTTP.AdapterHelper
2020-02-11 00:12:57 -07:00
2020-03-03 08:53:44 -07:00
alias Pleroma.HTTP.AdapterHelper
2020-02-11 00:12:57 -07:00
require Logger
alias Pleroma.Pool.Connections
@defaults [
2020-02-24 09:56:27 -07:00
connect_timeout: 5_000,
2020-02-11 00:12:57 -07:00
domain_lookup_timeout: 5_000,
tls_handshake_timeout: 5_000,
retry: 1,
retry_timeout: 1000,
2020-02-11 00:12:57 -07:00
await_up_timeout: 5_000
]
@spec options(keyword(), URI.t()) :: keyword()
def options(connection_opts \\ [], %URI{} = uri) do
proxy = Pleroma.Config.get([:http, :proxy_url], nil)
@defaults
|> Keyword.merge(Pleroma.Config.get([:http, :adapter], []))
|> add_original(uri)
|> add_scheme_opts(uri)
2020-03-03 08:53:44 -07:00
|> AdapterHelper.maybe_add_proxy(AdapterHelper.format_proxy(proxy))
2020-02-11 00:12:57 -07:00
|> maybe_get_conn(uri, connection_opts)
end
@spec after_request(keyword()) :: :ok
def after_request(opts) do
with conn when not is_nil(conn) <- opts[:conn],
body_as when body_as != :chunks <- opts[:body_as] do
Connections.checkout(conn, self(), :gun_connections)
end
:ok
end
defp add_original(opts, %URI{host: host, port: port}) do
formatted_host = format_host(host)
2020-02-11 00:12:57 -07:00
Keyword.put(opts, :original, "#{formatted_host}:#{port}")
end
defp add_scheme_opts(opts, %URI{scheme: "http"}), do: opts
defp add_scheme_opts(opts, %URI{scheme: "https", host: host, port: port}) do
adapter_opts = [
certificates_verification: true,
tls_opts: [
verify: :verify_peer,
cacertfile: CAStore.file_path(),
depth: 20,
reuse_sessions: false,
verify_fun: {&:ssl_verify_hostname.verify_fun/3, [check_hostname: format_host(host)]},
2020-02-21 04:28:16 -07:00
log_level: :warning
2020-02-11 00:12:57 -07:00
]
]
adapter_opts =
if port != 443 do
Keyword.put(adapter_opts, :transport, :tls)
else
adapter_opts
end
Keyword.merge(opts, adapter_opts)
end
defp maybe_get_conn(adapter_opts, uri, connection_opts) do
{receive_conn?, opts} =
adapter_opts
|> Keyword.merge(connection_opts)
|> Keyword.pop(:receive_conn, true)
if Connections.alive?(:gun_connections) and receive_conn? do
try_to_get_conn(uri, opts)
else
opts
end
end
defp try_to_get_conn(uri, opts) do
2020-03-03 07:44:04 -07:00
case Connections.checkin(uri, :gun_connections) do
nil ->
Logger.debug(
"Gun connections pool checkin was not successful. Trying to open conn for next request."
)
2020-03-03 07:44:04 -07:00
Task.start(fn -> Pleroma.Gun.Conn.open(uri, :gun_connections, opts) end)
2020-02-11 00:12:57 -07:00
opts
2020-03-03 07:44:04 -07:00
conn when is_pid(conn) ->
Logger.debug("received conn #{inspect(conn)} #{Connections.compose_uri_log(uri)}")
2020-02-11 00:12:57 -07:00
opts
2020-03-03 07:44:04 -07:00
|> Keyword.put(:conn, conn)
|> Keyword.put(:close_conn, false)
2020-02-11 00:12:57 -07:00
end
end
@spec format_host(String.t()) :: charlist()
def format_host(host) do
host_charlist = to_charlist(host)
case :inet.parse_address(host_charlist) do
{:error, :einval} ->
:idna.encode(host_charlist)
{:ok, _ip} ->
host_charlist
end
end
2020-02-11 00:12:57 -07:00
end