2004-03-06 12:08:21 -05:00
|
|
|
=begin
|
|
|
|
|
2010-01-08 07:17:15 -05:00
|
|
|
= net/https -- SSL/TLS enhancement for Net::HTTP.
|
2004-03-06 12:08:21 -05:00
|
|
|
|
|
|
|
== Info
|
|
|
|
'OpenSSL for Ruby 2' project
|
|
|
|
Copyright (C) 2001 GOTOU Yuuzou <gotoyuzo@notwork.org>
|
|
|
|
All rights reserved.
|
|
|
|
|
|
|
|
== Licence
|
|
|
|
This program is licenced under the same licence as Ruby.
|
|
|
|
(See the file 'LICENCE'.)
|
|
|
|
|
|
|
|
== Example
|
|
|
|
|
|
|
|
Here is a simple HTTP client:
|
|
|
|
|
|
|
|
require 'net/http'
|
|
|
|
require 'uri'
|
|
|
|
|
|
|
|
uri = URI.parse(ARGV[0] || 'http://localhost/')
|
|
|
|
http = Net::HTTP.new(uri.host, uri.port)
|
|
|
|
http.start {
|
|
|
|
http.request_get(uri.path) {|res|
|
|
|
|
print res.body
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
It can be replaced by the following code:
|
|
|
|
|
|
|
|
require 'net/https'
|
|
|
|
require 'uri'
|
|
|
|
|
|
|
|
uri = URI.parse(ARGV[0] || 'https://localhost/')
|
|
|
|
http = Net::HTTP.new(uri.host, uri.port)
|
|
|
|
http.use_ssl = true if uri.scheme == "https" # enable SSL/TLS
|
|
|
|
http.start {
|
|
|
|
http.request_get(uri.path) {|res|
|
|
|
|
print res.body
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
== class Net::HTTP
|
|
|
|
|
|
|
|
=== Instance Methods
|
|
|
|
|
|
|
|
: use_ssl?
|
|
|
|
returns true if use SSL/TLS with HTTP.
|
|
|
|
|
|
|
|
: use_ssl=((|true_or_false|))
|
|
|
|
sets use_ssl.
|
|
|
|
|
|
|
|
: peer_cert
|
|
|
|
return the X.509 certificates the server presented.
|
|
|
|
|
|
|
|
: key, key=((|key|))
|
|
|
|
Sets an OpenSSL::PKey::RSA or OpenSSL::PKey::DSA object.
|
2008-06-04 05:37:38 -04:00
|
|
|
(This method is appeared in Michal Rokos's OpenSSL extension.)
|
2004-03-06 12:08:21 -05:00
|
|
|
|
|
|
|
: cert, cert=((|cert|))
|
|
|
|
Sets an OpenSSL::X509::Certificate object as client certificate
|
2008-06-04 05:37:38 -04:00
|
|
|
(This method is appeared in Michal Rokos's OpenSSL extension).
|
2004-03-06 12:08:21 -05:00
|
|
|
|
|
|
|
: ca_file, ca_file=((|path|))
|
|
|
|
Sets path of a CA certification file in PEM format.
|
2009-02-03 02:30:52 -05:00
|
|
|
The file can contrain several CA certificates.
|
2004-03-06 12:08:21 -05:00
|
|
|
|
|
|
|
: ca_path, ca_path=((|path|))
|
|
|
|
Sets path of a CA certification directory containing certifications
|
|
|
|
in PEM format.
|
|
|
|
|
|
|
|
: verify_mode, verify_mode=((|mode|))
|
|
|
|
Sets the flags for server the certification verification at
|
2010-03-19 23:30:59 -04:00
|
|
|
beginning of SSL/TLS session.
|
2004-03-06 12:08:21 -05:00
|
|
|
OpenSSL::SSL::VERIFY_NONE or OpenSSL::SSL::VERIFY_PEER is acceptable.
|
|
|
|
|
|
|
|
: verify_callback, verify_callback=((|proc|))
|
|
|
|
Sets the verify callback for the server certification verification.
|
|
|
|
|
|
|
|
: verify_depth, verify_depth=((|num|))
|
|
|
|
Sets the maximum depth for the certificate chain verification.
|
|
|
|
|
|
|
|
: cert_store, cert_store=((|store|))
|
|
|
|
Sets the X509::Store to verify peer certificate.
|
|
|
|
|
|
|
|
: ssl_timeout, ssl_timeout=((|sec|))
|
|
|
|
Sets the SSL timeout seconds.
|
|
|
|
|
|
|
|
=end
|
|
|
|
|
|
|
|
require 'net/http'
|
|
|
|
require 'openssl'
|