FusionInventory-Agent
view release on metacpan or search on metacpan
lib/FusionInventory/Agent/HTTP/Client.pm view on Meta::CPAN
$self->{user},
$self->{password}
);
# replay request
eval {
if ($OSNAME eq 'MSWin32' && $scheme eq 'https') {
alarm $self->{ua}->{timeout};
}
$result = $self->{ua}->request($request, $file);
alarm 0;
};
if (!$result->is_success()) {
$logger->error(
$log_prefix .
"authentication required, wrong credentials"
);
}
} else {
# abort
$logger->error(
$log_prefix .
"authentication required, no credentials available"
);
}
} elsif ($result->code() == 407) {
$logger->error(
$log_prefix .
"proxy authentication required, wrong or no proxy credentials"
);
} else {
# check we request through a proxy
my $proxyreq = defined $result->request->{proxy};
$logger->error(
$log_prefix .
($proxyreq ? "proxy" : "communication") .
" error: " . $result->status_line()
);
}
}
# Always restore timeout
$self->{ua}->timeout($current_timeout);
return $result;
}
sub _setSSLOptions {
my ($self) = @_;
# SSL handling
if ($self->{no_ssl_check}) {
# LWP 6 default behaviour is to check hostname
# Fedora also backported this behaviour change in its LWP5 package, so
# just checking on LWP version is not enough
$self->{ua}->ssl_opts(verify_hostname => 0, SSL_verify_mode => 0)
if $self->{ua}->can('ssl_opts');
} else {
# only IO::Socket::SSL can perform full server certificate validation,
# Net::SSL is only able to check certification authority, and not
# certificate hostname
IO::Socket::SSL->require();
die
"IO::Socket::SSL Perl module not available, " .
"unable to validate SSL certificates " .
"(workaround: use 'no-ssl-check' configuration parameter)"
if $EVAL_ERROR;
# Activate SSL Debug if Stderr is in backends
my $DEBUG_SSL = 0;
$DEBUG_SSL = grep { ref($_) =~/Stderr$/ } @{$self->{logger}{backends}}
if (ref($self->{logger}{backends}) eq 'ARRAY');
if ( $DEBUG_SSL && $self->{logger}->debug_level() >= 2 ) {
$Net::SSLeay::trace = 3;
}
if ($LWP::VERSION >= 6) {
$self->{ua}->ssl_opts(SSL_ca_file => $self->{ca_cert_file})
if $self->{ca_cert_file};
$self->{ua}->ssl_opts(SSL_ca_path => $self->{ca_cert_dir})
if $self->{ca_cert_dir};
} else {
# SSL_verifycn_scheme and SSL_verifycn_name are required
die
"IO::Socket::SSL Perl module too old " .
"(available: $IO::Socket::SSL::VERSION, required: 1.14), " .
"unable to validate SSL certificates " .
"(workaround: use 'no-ssl-check' configuration parameter)"
if $IO::Socket::SSL::VERSION < 1.14;
# use a custom HTTPS handler to workaround default LWP5 behaviour
FusionInventory::Agent::HTTP::Protocol::https->use(
ca_cert_file => $self->{ca_cert_file},
ca_cert_dir => $self->{ca_cert_dir},
);
LWP::Protocol::implementor(
'https', 'FusionInventory::Agent::HTTP::Protocol::https'
);
# abuse user agent internal to pass values to the handler, so
# as to have different behaviors in the same process
$self->{ua}->{ssl_check} = $self->{no_ssl_check} ? 0 : 1;
}
}
$self->{ssl_set} = 1;
}
1;
__END__
=head1 NAME
FusionInventory::Agent::HTTP::Client - An abstract HTTP client
=head1 DESCRIPTION
This is an abstract class for HTTP clients. It can send messages through HTTP
or HTTPS, directly or through a proxy, and validate SSL certificates.
=head1 METHODS
=head2 new(%params)
The constructor. The following parameters are allowed, as keys of the %params
hash:
=over
=item I<logger>
the logger object to use (default: a new stderr logger)
=item I<proxy>
the URL of an HTTP proxy
=item I<user>
the user for HTTP authentication
=item I<password>
the password for HTTP authentication
=item I<no_ssl_check>
a flag allowing to ignore untrusted server certificates (default: false)
( run in 0.735 second using v1.01-cache-2.11-cpan-39bf76dae61 )