HoneyryderChuck
a9010c5837
bugfix: reset handshake when resetting the connection, as to let the negotiation flow on reconnect
2021-06-02 23:05:36 +01:00
HoneyryderChuck
7326b07bee
fixing 0.14.4's bug again, by making the connection header more
...
predictable
* it's keep-alive if the connection is persistent and the conn requests
have been exhausted;
* it's closed otherwise
2021-06-02 22:57:52 +01:00
HoneyryderChuck
68955c14b0
added regression test to fix misbehaviour spotted before releasing 0.14.4
2021-06-02 22:56:46 +01:00
HoneyryderChuck
c4e8d7f55f
run regression tests only for latest ruby
2021-06-02 19:03:03 +01:00
HoneyryderChuck
dbea29cca8
regressions for bugs fixed in 0.14.2 and 0.14.1
2021-06-02 19:00:14 +01:00
HoneyryderChuck
c9427ca21f
renamed files
2021-06-02 18:59:49 +01:00
HoneyryderChuck
537a2be178
added regression test for bug released with 0.14.3
2021-06-02 18:44:05 +01:00
HoneyryderChuck
06f1a041e6
bugfix: fixing clogged connection requests after a jumbo one
...
In an already initiated connection, when piping multiple requests to be
sent concurrently, a case happened where the first filled the write
buffer, leaving the second in the connection pending queue; the initial
request would finish without ever taking the subsequent request from the
pending queue, leaving the connection hanging.
this was fixed by making flushing the queue part of the #consume work.
2021-06-02 18:44:05 +01:00
HoneyryderChuck
a14fa26c7c
added new regression testing task
2021-06-02 18:44:05 +01:00
HoneyryderChuck
d52f22230c
bumping version to 0.14.4
2021-06-01 10:09:58 +01:00
HoneyryderChuck
3a904ffcd0
bugfix: http1 was miscalculating the last possible request for a given connection, and freezing it
2021-06-01 10:09:58 +01:00
HoneyryderChuck
76f0973f2d
Merge branch 'issue-123' into 'master'
...
sending goaway frame with settings_timeout code when timeout happens
Closes #123
See merge request honeyryderchuck/httpx!136
2021-05-31 13:41:16 +00:00
HoneyryderChuck
8b9da51c4b
bumping delta checks for truffleruby
2021-05-31 14:29:25 +01:00
HoneyryderChuck
bf8c265756
skip reads if no interests, or no io whatsoever
2021-05-31 13:56:16 +01:00
HoneyryderChuck
2025491cda
moar info for tests
2021-05-31 13:55:18 +01:00
HoneyryderChuck
a0ac3354dc
disabling grpc for truffleruby
2021-05-31 13:55:18 +01:00
HoneyryderChuck
a49fcc65f5
call #consume in a specific close_handshake instead
2021-05-31 13:55:18 +01:00
HoneyryderChuck
1907a00d19
fixing the select loop: when closed selectables are discarded, one has to reselect them from start, otherwise it's a loop
2021-05-31 13:29:11 +01:00
HoneyryderChuck
a80b9d84b9
sending goaway frame with settings_timeout code when timeout happens at
...
handshake time
The current timeout is set for settings timeout; a specific goaway is
crafted when handling timeout errors in the parser at handshake time.
2021-05-30 00:58:43 +01:00
HoneyryderChuck
5cfb494d50
allow parsers to define a connection timeout, and channge it via callback
2021-05-30 00:57:54 +01:00
HoneyryderChuck
b569cc9984
adding the settings timeout as an option, as well as a specific error
2021-05-30 00:53:37 +01:00
HoneyryderChuck
77c86c0c22
added test to check whether client times out on settings
2021-05-29 22:53:14 +01:00
HoneyryderChuck
9a34af9e27
moved test servlets to separate folder
2021-05-29 15:50:23 +01:00
HoneyryderChuck
2b7d55f81f
update website's plugins list
2021-05-29 15:38:34 +01:00
HoneyryderChuck
26eb72c170
Merge branch 'issue-126' into 'master'
...
NTLM Authenticationn Plugin
Closes #126 and #121
See merge request honeyryderchuck/httpx!135
2021-05-28 15:36:27 +00:00
HoneyryderChuck
77fbfca33e
simplified and unified the authentication strategies code a bit more
2021-05-28 13:40:11 +01:00
HoneyryderChuck
31a6baf69f
bumped to 0.14.3
v0.14.3
2021-05-28 12:44:52 +01:00
HoneyryderChuck
1901450f33
Merge branch 'issue-128' into 'master'
...
bugfix: Connection: close is being set 2 times, and leaking into
Closes #128
See merge request honeyryderchuck/httpx!134
2021-05-28 11:37:12 +00:00
HoneyryderChuck
44b418acd6
do not use the master of rbs (seems to have stabilized features for us)
2021-05-28 12:16:21 +01:00
HoneyryderChuck
fb3b795f29
adding missing grpc sigs (+ other missing stuff in plugin calls)
2021-05-28 12:15:09 +01:00
HoneyryderChuck
3628db1495
removing options from Call (unneeded)
2021-05-28 12:15:09 +01:00
HoneyryderChuck
bb7f348a2c
improving digest auth plugin, and aligning it with ntlm auth plugin
...
* both now only accept one request at a time
* code is more similar
2021-05-28 12:15:09 +01:00
HoneyryderChuck
7c4bd3e7a1
bugfix: Connection: close is being set 2 times, and leaking into
...
redirect follows
this means that http -> https redirects carries over that header, which
is invalid there
2021-05-28 12:05:41 +01:00
HoneyryderChuck
5b9793752c
fixing other plugin signatures
2021-05-27 19:11:15 +01:00
HoneyryderChuck
df489676ac
adding ntlm auth plugin
2021-05-27 19:11:15 +01:00
HoneyryderChuck
498e6da26e
fixed docs versioning
2021-05-27 19:11:15 +01:00
HoneyryderChuck
63ec59bb0e
scoping squid config
2021-05-27 19:11:15 +01:00
HoneyryderChuck
dda1315db4
adding tests to enure that field order is respected, even when repeated, when performing form/multipart requests ( Closes #126 )
2021-05-27 19:11:15 +01:00
HoneyryderChuck
393c4adfd3
bumped to 0.14.2
v0.14.2
2021-05-27 18:25:38 +01:00
HoneyryderChuck
f34eb85f22
Merge branch 'moar-multipart' into 'master'
...
do not forget the filename in those multipart spoofs
See merge request honeyryderchuck/httpx!133
2021-05-27 17:12:13 +00:00
HoneyryderChuck
c61007ba0f
do not forget the filename in those multipart spoofs
2021-05-27 17:53:45 +01:00
HoneyryderChuck
357344f2f9
bumped to 0.14.1
v0.14.1
2021-05-27 17:00:00 +01:00
HoneyryderChuck
35df9c7683
fix: allow setting arbitrary content types for multipart requests
...
very useful when testing spoof requests.
2021-05-27 16:50:38 +01:00
HoneyryderChuck
40be0f6aff
Merge branch 'issue-128' into 'master'
...
do not mutate request headers with protocol headers
Closes #128
See merge request honeyryderchuck/httpx!132
2021-05-26 17:42:51 +00:00
HoneyryderChuck
8e1e6b3c6a
set_protocol_headers now returns extra fields, that can be yielded in the handler, instead of merged into the request
...
this implicit mutation of the request was causing issue in insecure
redirects, which kept the same HTTP/2 specific headers in HTTP/1
payloads
2021-05-26 18:13:53 +01:00
HoneyryderChuck
e5a8e76d62
allow Headers#each to be passed extra headers to yield
2021-05-26 18:13:53 +01:00
HoneyryderChuck
a65104e19f
added test for the reported bug
2021-05-26 17:30:50 +01:00
HoneyryderChuck
5d4ac62bf2
bumping version to 0.14.0
v0.14.0
2021-05-22 16:19:52 +01:00
HoneyryderChuck
e6fbe82b41
removing unused code
2021-05-22 16:19:24 +01:00
HoneyryderChuck
2c3280b6d0
Merge branch 'issue-119' into 'master'
...
new option: origin
See merge request honeyryderchuck/httpx!131
2021-05-22 14:23:05 +00:00