forked from opsdis/aci-exporter
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathhttpclient.go
91 lines (82 loc) · 2.38 KB
/
httpclient.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License
// along with this program. If not, see <https://www.gnu.org/licenses/>.
//
// Copyright 2020 Opsdis AB
package main
import (
"crypto/tls"
"crypto/x509"
"net"
"net/http"
"time"
)
// HTTPClient used for retrieve data from a HTTP based api
type HTTPClient struct {
InsecureHTTPS bool
Timeout int
Keepalive int
Tlshandshaketimeout int
cookieJar http.CookieJar
}
// GetJar return the the client jar
func (c HTTPClient) GetJar() http.CookieJar {
return c.cookieJar
}
// GetClient return a http client
func (c HTTPClient) GetClient() *http.Client {
//if c.Timeout == 0 {
// c.Timeout = 3
//}
//if c.Keepalive == 0 {
// c.Keepalive = 10
//}
//if c.Tlshandshaketimeout == 0 {
// c.Tlshandshaketimeout = 10
//}
//
rootCAs, _ := x509.SystemCertPool()
if rootCAs == nil {
rootCAs = x509.NewCertPool()
}
/*
/ Read in the cert file
const (
localCertFile = "/usr/local/internal-ca/ca.crt"
)
certs, err := ioutil.ReadFile(localCertFile)
if err != nil {
log.Fatalf("Failed to append %q to RootCAs: %v", localCertFile, err)
}
/ Append our cert to the system pool
if ok := rootCAs.AppendCertsFromPEM(certs); !ok {
log.Println("No certs appended, using system certs only")
}
*/
//
var client = &http.Client{
Timeout: time.Duration(c.Timeout) * time.Second,
Transport: &http.Transport{
DialContext: (&net.Dialer{
//Timeout: time.Duration(c.Timeout) * time.Second,
KeepAlive: time.Duration(c.Keepalive) * time.Second,
}).DialContext,
//TLSHandshakeTimeout: time.Duration(c.Tlshandshaketimeout) * time.Second,
TLSClientConfig: &tls.Config{
InsecureSkipVerify: c.InsecureHTTPS,
//RootCAs: rootCAs,
},
//ExpectContinueTimeout: 4 * time.Second,
//ResponseHeaderTimeout: 3 * time.Second,
},
Jar: c.cookieJar,
}
return client
}