2019-05-03 06:17:27 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2017-10-17 13:22:38 +08:00
|
|
|
require 'socket'
|
|
|
|
require 'ipaddr'
|
2017-05-23 00:23:04 +08:00
|
|
|
require 'excon'
|
2017-05-24 03:03:04 +08:00
|
|
|
require 'rate_limiter'
|
2017-12-13 00:50:39 +08:00
|
|
|
require 'url_helper'
|
2017-05-23 00:23:04 +08:00
|
|
|
|
|
|
|
# Determine the final endpoint for a Web URI, following redirects
|
|
|
|
class FinalDestination
|
|
|
|
|
2017-10-17 13:22:38 +08:00
|
|
|
def self.clear_https_cache!(domain)
|
|
|
|
key = redis_https_key(domain)
|
|
|
|
$redis.without_namespace.del(key)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.cache_https_domain(domain)
|
|
|
|
key = redis_https_key(domain)
|
|
|
|
$redis.without_namespace.setex(key, "1", 1.day.to_i).present?
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.is_https_domain?(domain)
|
|
|
|
key = redis_https_key(domain)
|
|
|
|
$redis.without_namespace.get(key).present?
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.redis_https_key(domain)
|
|
|
|
"HTTPS_DOMAIN_#{domain}"
|
|
|
|
end
|
|
|
|
|
2018-08-26 22:31:02 +08:00
|
|
|
attr_reader :status, :cookie, :status_code, :ignored
|
2017-05-23 00:23:04 +08:00
|
|
|
|
2017-07-28 09:20:09 +08:00
|
|
|
def initialize(url, opts = nil)
|
2017-07-30 00:42:04 +08:00
|
|
|
@url = url
|
2018-03-28 16:20:08 +08:00
|
|
|
@uri = uri(escape_url) if @url
|
2017-07-18 08:50:06 +08:00
|
|
|
|
2017-05-23 00:23:04 +08:00
|
|
|
@opts = opts || {}
|
2017-08-08 17:44:27 +08:00
|
|
|
@force_get_hosts = @opts[:force_get_hosts] || []
|
2018-12-19 14:27:07 +08:00
|
|
|
@preserve_fragment_url_hosts = @opts[:preserve_fragment_url_hosts] || []
|
2017-05-23 00:23:04 +08:00
|
|
|
@opts[:max_redirects] ||= 5
|
2018-03-28 16:20:08 +08:00
|
|
|
@opts[:lookup_ip] ||= lambda { |host| FinalDestination.lookup_ip(host) }
|
2018-08-26 22:31:02 +08:00
|
|
|
|
|
|
|
@ignored = @opts[:ignore_hostnames] || []
|
2019-05-28 08:28:57 +08:00
|
|
|
@limit = @opts[:max_redirects]
|
2018-09-04 10:16:21 +08:00
|
|
|
|
2019-05-28 08:28:57 +08:00
|
|
|
if @limit > 0
|
|
|
|
ignore_redirects = [Discourse.base_url_no_prefix]
|
2018-09-04 10:16:21 +08:00
|
|
|
|
2019-05-28 08:28:57 +08:00
|
|
|
if @opts[:ignore_redirects]
|
|
|
|
ignore_redirects.concat(@opts[:ignore_redirects])
|
|
|
|
end
|
2018-09-04 10:16:21 +08:00
|
|
|
|
2019-05-28 08:28:57 +08:00
|
|
|
ignore_redirects.each do |ignore_redirect|
|
|
|
|
ignore_redirect = uri(ignore_redirect)
|
|
|
|
if ignore_redirect.present? && ignore_redirect.hostname
|
|
|
|
@ignored << ignore_redirect.hostname
|
|
|
|
end
|
2018-08-26 22:31:02 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-05-23 00:23:04 +08:00
|
|
|
@status = :ready
|
2017-08-08 17:44:27 +08:00
|
|
|
@http_verb = @force_get_hosts.any? { |host| hostname_matches?(host) } ? :get : :head
|
2017-06-07 01:53:49 +08:00
|
|
|
@cookie = nil
|
2017-10-17 13:22:38 +08:00
|
|
|
@limited_ips = []
|
2017-11-01 00:03:03 +08:00
|
|
|
@verbose = @opts[:verbose] || false
|
2018-01-29 12:36:52 +08:00
|
|
|
@timeout = @opts[:timeout] || nil
|
2018-12-19 14:27:07 +08:00
|
|
|
@preserve_fragment_url = @preserve_fragment_url_hosts.any? { |host| hostname_matches?(host) }
|
2019-05-28 08:28:57 +08:00
|
|
|
@validate_uri = @opts.fetch(:validate_uri) { true }
|
2017-06-07 01:53:49 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.connection_timeout
|
|
|
|
20
|
2017-05-23 00:23:04 +08:00
|
|
|
end
|
|
|
|
|
2018-01-29 12:36:52 +08:00
|
|
|
def timeout
|
|
|
|
@timeout || FinalDestination.connection_timeout
|
|
|
|
end
|
|
|
|
|
2017-05-23 00:23:04 +08:00
|
|
|
def redirected?
|
|
|
|
@limit < @opts[:max_redirects]
|
|
|
|
end
|
|
|
|
|
|
|
|
def request_headers
|
2017-06-07 01:53:49 +08:00
|
|
|
result = {
|
|
|
|
"User-Agent" => "Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36",
|
2017-11-18 00:24:35 +08:00
|
|
|
"Accept" => "*/*",
|
2017-06-07 01:53:49 +08:00
|
|
|
"Host" => @uri.hostname
|
|
|
|
}
|
|
|
|
|
2018-02-18 23:08:07 +08:00
|
|
|
result['Cookie'] = @cookie if @cookie
|
2017-06-07 01:53:49 +08:00
|
|
|
|
|
|
|
result
|
|
|
|
end
|
|
|
|
|
2019-03-09 04:36:49 +08:00
|
|
|
def small_get(request_headers)
|
|
|
|
status_code, response_headers = nil
|
2019-02-27 11:51:15 +08:00
|
|
|
|
|
|
|
catch(:done) do
|
|
|
|
Net::HTTP.start(@uri.host, @uri.port, use_ssl: @uri.is_a?(URI::HTTPS)) do |http|
|
|
|
|
http.open_timeout = timeout
|
|
|
|
http.read_timeout = timeout
|
2019-03-09 04:36:49 +08:00
|
|
|
http.request_get(@uri.request_uri, request_headers) do |resp|
|
2019-02-27 11:51:15 +08:00
|
|
|
status_code = resp.code.to_i
|
2019-03-09 04:36:49 +08:00
|
|
|
response_headers = resp.to_hash
|
2019-02-27 11:51:15 +08:00
|
|
|
|
|
|
|
# see: https://bugs.ruby-lang.org/issues/15624
|
|
|
|
# if we allow response to return then body will be read
|
|
|
|
# got to abort without reading body
|
|
|
|
throw :done
|
|
|
|
end
|
|
|
|
end
|
2017-06-07 01:53:49 +08:00
|
|
|
end
|
2019-02-27 11:51:15 +08:00
|
|
|
|
2019-03-09 04:36:49 +08:00
|
|
|
[status_code, response_headers]
|
2017-05-23 00:23:04 +08:00
|
|
|
end
|
|
|
|
|
2018-01-29 12:36:52 +08:00
|
|
|
# this is a new interface for simply getting
|
|
|
|
# N bytes accounting for all internal logic
|
|
|
|
def get(uri = @uri, redirects = @limit, extra_headers: {}, &blk)
|
|
|
|
raise "Must specify block" unless block_given?
|
|
|
|
|
|
|
|
if uri && uri.port == 80 && FinalDestination.is_https_domain?(uri.hostname)
|
|
|
|
uri.scheme = "https"
|
|
|
|
uri = URI(uri.to_s)
|
|
|
|
end
|
|
|
|
|
2018-02-24 19:35:57 +08:00
|
|
|
return nil unless validate_uri
|
2018-01-29 12:36:52 +08:00
|
|
|
|
|
|
|
result, (location, cookie) = safe_get(uri, &blk)
|
|
|
|
|
|
|
|
if result == :redirect && (redirects == 0 || !location)
|
|
|
|
return nil
|
|
|
|
end
|
|
|
|
|
|
|
|
if result == :redirect
|
|
|
|
old_port = uri.port
|
|
|
|
location = "#{uri.scheme}://#{uri.host}#{location}" if location[0] == "/"
|
2018-03-28 16:20:08 +08:00
|
|
|
uri = uri(location)
|
2018-01-29 12:36:52 +08:00
|
|
|
|
|
|
|
# https redirect, so just cache that whole new domain is https
|
|
|
|
if old_port == 80 && uri&.port == 443 && (URI::HTTPS === uri)
|
|
|
|
FinalDestination.cache_https_domain(uri.hostname)
|
|
|
|
end
|
|
|
|
|
|
|
|
return nil if !uri
|
|
|
|
|
|
|
|
extra = nil
|
2018-02-24 19:35:57 +08:00
|
|
|
extra = { 'Cookie' => cookie } if cookie
|
2018-01-29 12:36:52 +08:00
|
|
|
|
|
|
|
get(uri, redirects - 1, extra_headers: extra, &blk)
|
|
|
|
elsif result == :ok
|
|
|
|
uri.to_s
|
|
|
|
else
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-05-23 00:23:04 +08:00
|
|
|
def resolve
|
2017-10-17 13:22:38 +08:00
|
|
|
if @uri && @uri.port == 80 && FinalDestination.is_https_domain?(@uri.hostname)
|
|
|
|
@uri.scheme = "https"
|
|
|
|
@uri = URI(@uri.to_s)
|
|
|
|
end
|
|
|
|
|
2017-05-23 00:23:04 +08:00
|
|
|
if @limit < 0
|
|
|
|
@status = :too_many_redirects
|
2017-11-01 00:03:03 +08:00
|
|
|
log(:warn, "FinalDestination could not resolve URL (too many redirects): #{@uri}") if @verbose
|
2017-05-23 00:23:04 +08:00
|
|
|
return nil
|
|
|
|
end
|
|
|
|
|
2018-08-26 22:31:02 +08:00
|
|
|
unless validate_uri
|
|
|
|
log(:warn, "FinalDestination could not resolve URL (invalid URI): #{@uri}") if @verbose
|
|
|
|
return nil
|
|
|
|
end
|
|
|
|
|
2017-06-27 03:38:23 +08:00
|
|
|
@ignored.each do |host|
|
2018-08-26 22:31:02 +08:00
|
|
|
if @uri&.hostname&.match?(host)
|
2017-06-27 03:38:23 +08:00
|
|
|
@status = :resolved
|
|
|
|
return @uri
|
|
|
|
end
|
2017-06-13 01:22:29 +08:00
|
|
|
end
|
|
|
|
|
2017-05-23 00:23:04 +08:00
|
|
|
headers = request_headers
|
2017-08-08 17:44:27 +08:00
|
|
|
response = Excon.public_send(@http_verb,
|
2017-06-07 01:53:49 +08:00
|
|
|
@uri.to_s,
|
2018-01-29 12:36:52 +08:00
|
|
|
read_timeout: timeout,
|
2017-06-07 01:53:49 +08:00
|
|
|
headers: headers
|
|
|
|
)
|
|
|
|
|
|
|
|
location = nil
|
2018-02-18 23:08:07 +08:00
|
|
|
response_headers = nil
|
2017-09-28 14:35:27 +08:00
|
|
|
|
|
|
|
response_status = response.status.to_i
|
|
|
|
|
2017-06-07 01:53:49 +08:00
|
|
|
case response.status
|
|
|
|
when 200
|
2017-05-23 00:23:04 +08:00
|
|
|
@status = :resolved
|
|
|
|
return @uri
|
2018-02-27 19:05:48 +08:00
|
|
|
when 400, 405, 406, 409, 501
|
2019-02-27 11:51:15 +08:00
|
|
|
response_status, small_headers = small_get(request_headers)
|
2017-06-07 01:53:49 +08:00
|
|
|
|
2017-09-28 14:35:27 +08:00
|
|
|
if response_status == 200
|
2017-06-07 01:53:49 +08:00
|
|
|
@status = :resolved
|
|
|
|
return @uri
|
|
|
|
end
|
|
|
|
|
2018-02-18 23:08:07 +08:00
|
|
|
response_headers = {}
|
2019-02-27 11:51:15 +08:00
|
|
|
if cookie_val = small_headers['set-cookie']
|
2018-02-18 23:08:07 +08:00
|
|
|
response_headers[:cookies] = cookie_val
|
2017-06-07 01:53:49 +08:00
|
|
|
end
|
|
|
|
|
2019-02-27 11:51:15 +08:00
|
|
|
if location_val = small_headers['location']
|
2018-02-18 23:08:07 +08:00
|
|
|
response_headers[:location] = location_val.join
|
2017-06-07 01:53:49 +08:00
|
|
|
end
|
2017-09-28 14:35:27 +08:00
|
|
|
end
|
|
|
|
|
2018-02-18 23:08:07 +08:00
|
|
|
unless response_headers
|
|
|
|
response_headers = {
|
|
|
|
cookies: response.data[:cookies] || response.headers[:"set-cookie"],
|
|
|
|
location: response.headers[:location]
|
|
|
|
}
|
2017-05-23 00:23:04 +08:00
|
|
|
end
|
|
|
|
|
2017-09-28 14:35:27 +08:00
|
|
|
if (300..399).include?(response_status)
|
2018-02-18 23:08:07 +08:00
|
|
|
location = response_headers[:location]
|
2017-09-28 14:35:27 +08:00
|
|
|
end
|
|
|
|
|
2018-02-18 23:08:07 +08:00
|
|
|
if cookies = response_headers[:cookies]
|
|
|
|
@cookie = Array.wrap(cookies).map { |c| c.split(';').first.strip }.join('; ')
|
2017-09-28 14:35:27 +08:00
|
|
|
end
|
|
|
|
|
2017-05-23 00:23:04 +08:00
|
|
|
if location
|
2017-10-17 13:22:38 +08:00
|
|
|
old_port = @uri.port
|
2018-12-19 14:27:07 +08:00
|
|
|
location = "#{location}##{@uri.fragment}" if @preserve_fragment_url && @uri.fragment.present?
|
2017-05-23 00:23:04 +08:00
|
|
|
location = "#{@uri.scheme}://#{@uri.host}#{location}" if location[0] == "/"
|
2018-03-28 16:20:08 +08:00
|
|
|
@uri = uri(location)
|
2017-05-23 00:23:04 +08:00
|
|
|
@limit -= 1
|
2017-10-17 13:22:38 +08:00
|
|
|
|
|
|
|
# https redirect, so just cache that whole new domain is https
|
|
|
|
if old_port == 80 && @uri.port == 443 && (URI::HTTPS === @uri)
|
|
|
|
FinalDestination.cache_https_domain(@uri.hostname)
|
|
|
|
end
|
|
|
|
|
2017-05-23 00:23:04 +08:00
|
|
|
return resolve
|
|
|
|
end
|
|
|
|
|
2017-09-28 14:35:27 +08:00
|
|
|
# this is weird an exception seems better
|
|
|
|
@status = :failure
|
|
|
|
@status_code = response.status
|
|
|
|
|
2017-11-01 00:03:03 +08:00
|
|
|
log(:warn, "FinalDestination could not resolve URL (status #{response.status}): #{@uri}") if @verbose
|
2017-09-27 14:52:49 +08:00
|
|
|
nil
|
|
|
|
rescue Excon::Errors::Timeout
|
2017-11-01 00:03:03 +08:00
|
|
|
log(:warn, "FinalDestination could not resolve URL (timeout): #{@uri}") if @verbose
|
2017-05-23 00:23:04 +08:00
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
|
|
|
def validate_uri
|
2019-05-28 08:28:57 +08:00
|
|
|
!@validate_uri || (validate_uri_format && is_dest_valid?)
|
2017-05-23 00:23:04 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def validate_uri_format
|
|
|
|
return false unless @uri
|
|
|
|
return false unless ['https', 'http'].include?(@uri.scheme)
|
2017-05-24 01:07:18 +08:00
|
|
|
return false if @uri.scheme == 'http' && @uri.port != 80
|
|
|
|
return false if @uri.scheme == 'https' && @uri.port != 443
|
2017-05-23 00:23:04 +08:00
|
|
|
|
2017-05-24 01:07:18 +08:00
|
|
|
# Disallow IP based crawling
|
|
|
|
(IPAddr.new(@uri.hostname) rescue nil).nil?
|
2017-05-23 00:23:04 +08:00
|
|
|
end
|
|
|
|
|
2017-06-13 01:22:29 +08:00
|
|
|
def hostname_matches?(url)
|
2018-03-28 16:20:08 +08:00
|
|
|
url = uri(url)
|
|
|
|
@uri && url.present? && @uri.hostname == url&.hostname
|
2017-06-13 01:22:29 +08:00
|
|
|
end
|
2017-05-24 04:32:54 +08:00
|
|
|
|
2017-06-13 01:22:29 +08:00
|
|
|
def is_dest_valid?
|
2017-05-23 00:23:04 +08:00
|
|
|
return false unless @uri && @uri.host
|
|
|
|
|
2017-06-13 01:22:29 +08:00
|
|
|
# Whitelisted hosts
|
2017-10-06 13:20:01 +08:00
|
|
|
return true if hostname_matches?(SiteSetting.Upload.s3_cdn_url) ||
|
2017-06-13 01:22:29 +08:00
|
|
|
hostname_matches?(GlobalSetting.try(:cdn_url)) ||
|
|
|
|
hostname_matches?(Discourse.base_url_no_prefix)
|
|
|
|
|
2017-06-14 00:59:54 +08:00
|
|
|
if SiteSetting.whitelist_internal_hosts.present?
|
2018-02-24 19:35:57 +08:00
|
|
|
return true if SiteSetting.whitelist_internal_hosts.split("|").any? { |h| h.downcase == @uri.hostname.downcase }
|
2017-06-14 00:59:54 +08:00
|
|
|
end
|
|
|
|
|
2017-05-23 00:23:04 +08:00
|
|
|
address_s = @opts[:lookup_ip].call(@uri.hostname)
|
|
|
|
return false unless address_s
|
|
|
|
|
|
|
|
address = IPAddr.new(address_s)
|
|
|
|
|
2017-07-28 09:20:09 +08:00
|
|
|
if private_ranges.any? { |r| r === address }
|
2017-05-23 00:23:04 +08:00
|
|
|
@status = :invalid_address
|
|
|
|
return false
|
|
|
|
end
|
|
|
|
|
2017-05-24 03:03:04 +08:00
|
|
|
# Rate limit how often this IP can be crawled
|
2017-10-17 13:22:38 +08:00
|
|
|
if !@opts[:skip_rate_limit] && !@limited_ips.include?(address)
|
|
|
|
@limited_ips << address
|
|
|
|
RateLimiter.new(nil, "crawl-destination-ip:#{address_s}", 1000, 1.hour).performed!
|
2017-05-25 01:46:57 +08:00
|
|
|
end
|
2017-05-24 03:03:04 +08:00
|
|
|
|
2017-05-23 00:23:04 +08:00
|
|
|
true
|
2017-05-24 03:03:04 +08:00
|
|
|
rescue RateLimiter::LimitExceeded
|
|
|
|
false
|
2017-05-23 00:23:04 +08:00
|
|
|
end
|
|
|
|
|
2017-07-30 00:42:04 +08:00
|
|
|
def escape_url
|
2017-12-13 00:50:39 +08:00
|
|
|
UrlHelper.escape_uri(
|
2017-09-26 18:34:54 +08:00
|
|
|
CGI.unescapeHTML(@url),
|
|
|
|
Regexp.new("[^#{URI::PATTERN::UNRESERVED}#{URI::PATTERN::RESERVED}#]")
|
|
|
|
)
|
2017-07-30 00:42:04 +08:00
|
|
|
end
|
|
|
|
|
2017-05-23 23:51:23 +08:00
|
|
|
def private_ranges
|
|
|
|
FinalDestination.standard_private_ranges +
|
2017-07-28 09:20:09 +08:00
|
|
|
SiteSetting.blacklist_ip_blocks.split('|').map { |r| IPAddr.new(r) rescue nil }.compact
|
2017-05-23 23:51:23 +08:00
|
|
|
end
|
|
|
|
|
2017-10-31 19:08:34 +08:00
|
|
|
def log(log_level, message)
|
2018-05-25 10:11:16 +08:00
|
|
|
return if @status_code == 404
|
2017-11-17 22:38:26 +08:00
|
|
|
|
2017-10-31 19:08:34 +08:00
|
|
|
Rails.logger.public_send(
|
|
|
|
log_level,
|
|
|
|
"#{RailsMultisite::ConnectionManagement.current_db}: #{message}"
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2017-05-23 23:51:23 +08:00
|
|
|
def self.standard_private_ranges
|
2017-05-23 00:23:04 +08:00
|
|
|
@private_ranges ||= [
|
2018-07-24 23:15:37 +08:00
|
|
|
IPAddr.new('0.0.0.0/8'),
|
2017-05-23 00:23:04 +08:00
|
|
|
IPAddr.new('127.0.0.1'),
|
|
|
|
IPAddr.new('172.16.0.0/12'),
|
|
|
|
IPAddr.new('192.168.0.0/16'),
|
|
|
|
IPAddr.new('10.0.0.0/8'),
|
|
|
|
IPAddr.new('fc00::/7')
|
|
|
|
]
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.lookup_ip(host)
|
2018-03-28 14:44:42 +08:00
|
|
|
if Rails.env.test?
|
2018-07-25 00:00:23 +08:00
|
|
|
"1.1.1.1"
|
2018-03-28 14:44:42 +08:00
|
|
|
else
|
|
|
|
IPSocket::getaddress(host)
|
|
|
|
end
|
2017-11-13 08:19:06 +08:00
|
|
|
rescue SocketError
|
|
|
|
nil
|
2017-05-23 00:23:04 +08:00
|
|
|
end
|
|
|
|
|
2018-01-29 12:36:52 +08:00
|
|
|
protected
|
|
|
|
|
|
|
|
def safe_get(uri)
|
|
|
|
result = nil
|
|
|
|
unsafe_close = false
|
|
|
|
|
|
|
|
safe_session(uri) do |http|
|
|
|
|
headers = request_headers.merge(
|
|
|
|
'Accept-Encoding' => 'gzip',
|
|
|
|
'Host' => uri.host
|
|
|
|
)
|
|
|
|
|
|
|
|
req = Net::HTTP::Get.new(uri.request_uri, headers)
|
|
|
|
|
|
|
|
http.request(req) do |resp|
|
|
|
|
if Net::HTTPRedirection === resp
|
|
|
|
result = :redirect, [resp['location'], resp['Set-Cookie']]
|
|
|
|
end
|
|
|
|
|
|
|
|
if Net::HTTPSuccess === resp
|
|
|
|
resp.decode_content = true
|
2018-02-24 19:35:57 +08:00
|
|
|
resp.read_body do |chunk|
|
2018-01-29 12:36:52 +08:00
|
|
|
read_next = true
|
|
|
|
|
|
|
|
catch(:done) do
|
|
|
|
if read_next
|
|
|
|
read_next = false
|
|
|
|
yield resp, chunk, uri
|
|
|
|
read_next = true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# no clean way of finishing abruptly cause
|
|
|
|
# response likes reading till the end
|
|
|
|
if !read_next
|
|
|
|
unsafe_close = true
|
|
|
|
http.finish
|
|
|
|
raise StandardError
|
|
|
|
end
|
2018-02-24 19:35:57 +08:00
|
|
|
end
|
2018-01-29 12:36:52 +08:00
|
|
|
result = :ok
|
2018-02-24 19:35:57 +08:00
|
|
|
else
|
|
|
|
catch(:done) do
|
|
|
|
yield resp, nil, nil
|
|
|
|
end
|
2018-01-29 12:36:52 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
result
|
|
|
|
rescue StandardError
|
2018-02-24 19:35:57 +08:00
|
|
|
unsafe_close ? :ok : raise
|
2018-01-29 12:36:52 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def safe_session(uri)
|
|
|
|
Net::HTTP.start(uri.host, uri.port, use_ssl: (uri.scheme == "https")) do |http|
|
|
|
|
http.read_timeout = timeout
|
|
|
|
http.open_timeout = timeout
|
|
|
|
yield http
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-03-28 16:20:08 +08:00
|
|
|
private
|
|
|
|
|
|
|
|
def uri(location)
|
|
|
|
begin
|
2018-08-14 18:23:32 +08:00
|
|
|
URI.parse(location)
|
|
|
|
rescue URI::Error
|
2018-03-28 16:20:08 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-05-23 00:23:04 +08:00
|
|
|
end
|