Redesign Error type
- The `Error`'s kind is a now a set of variants depending on the context of when an error could occur. - If another error was the cause, it is now always the `source`. Along with the `is_*` methods, this should help in understanding *when* a certain error occurred. For example, an error setting the TLS certificates will return a builder error, with the TLS error as the source. This should help differentiate from a TLS error that happens when connecting to a server. It also makes the internal code less dependent on all the exact dependencies that can be enabled or disabled.
This commit is contained in:
@@ -154,11 +154,11 @@ impl Stream for ImplStream {
|
|||||||
} => {
|
} => {
|
||||||
if let Some(ref mut timeout) = timeout {
|
if let Some(ref mut timeout) = timeout {
|
||||||
if let Poll::Ready(()) = Pin::new(timeout).poll(cx) {
|
if let Poll::Ready(()) = Pin::new(timeout).poll(cx) {
|
||||||
return Poll::Ready(Some(Err(crate::error::timedout(None))));
|
return Poll::Ready(Some(Err(crate::error::body(crate::error::TimedOut))));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
futures_core::ready!(Pin::new(body).poll_data(cx))
|
futures_core::ready!(Pin::new(body).poll_data(cx))
|
||||||
.map(|opt_chunk| opt_chunk.map(Into::into).map_err(crate::error::from))
|
.map(|opt_chunk| opt_chunk.map(Into::into).map_err(crate::error::body))
|
||||||
}
|
}
|
||||||
Inner::Reusable(ref mut bytes) => {
|
Inner::Reusable(ref mut bytes) => {
|
||||||
if bytes.is_empty() {
|
if bytes.is_empty() {
|
||||||
|
|||||||
@@ -746,13 +746,17 @@ impl Future for PendingRequest {
|
|||||||
fn poll(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Self::Output> {
|
fn poll(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<Self::Output> {
|
||||||
if let Some(delay) = self.as_mut().timeout().as_mut().as_pin_mut() {
|
if let Some(delay) = self.as_mut().timeout().as_mut().as_pin_mut() {
|
||||||
if let Poll::Ready(()) = delay.poll(cx) {
|
if let Poll::Ready(()) = delay.poll(cx) {
|
||||||
return Poll::Ready(Err(crate::error::timedout(Some(self.url.clone()))));
|
return Poll::Ready(Err(
|
||||||
|
crate::error::request(crate::error::TimedOut).with_url(self.url.clone())
|
||||||
|
));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
loop {
|
loop {
|
||||||
let res = match self.as_mut().in_flight().as_mut().poll(cx) {
|
let res = match self.as_mut().in_flight().as_mut().poll(cx) {
|
||||||
Poll::Ready(Err(e)) => return Poll::Ready(url_error!(e, &self.url)),
|
Poll::Ready(Err(e)) => {
|
||||||
|
return Poll::Ready(Err(crate::error::request(e).with_url(self.url.clone())));
|
||||||
|
}
|
||||||
Poll::Ready(Ok(res)) => res,
|
Poll::Ready(Ok(res)) => res,
|
||||||
Poll::Pending => return Poll::Pending,
|
Poll::Pending => return Poll::Pending,
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -137,14 +137,14 @@ impl Stream for Decoder {
|
|||||||
let new_value = match self.inner {
|
let new_value = match self.inner {
|
||||||
Inner::Pending(ref mut future) => match Pin::new(future).poll(cx) {
|
Inner::Pending(ref mut future) => match Pin::new(future).poll(cx) {
|
||||||
Poll::Ready(Ok(inner)) => inner,
|
Poll::Ready(Ok(inner)) => inner,
|
||||||
Poll::Ready(Err(e)) => return Poll::Ready(Some(Err(crate::error::from_io(e)))),
|
Poll::Ready(Err(e)) => return Poll::Ready(Some(Err(crate::error::decode_io(e)))),
|
||||||
Poll::Pending => return Poll::Pending,
|
Poll::Pending => return Poll::Pending,
|
||||||
},
|
},
|
||||||
Inner::PlainText(ref mut body) => return Pin::new(body).poll_next(cx),
|
Inner::PlainText(ref mut body) => return Pin::new(body).poll_next(cx),
|
||||||
Inner::Gzip(ref mut decoder) => {
|
Inner::Gzip(ref mut decoder) => {
|
||||||
return match futures_core::ready!(Pin::new(decoder).poll_next(cx)) {
|
return match futures_core::ready!(Pin::new(decoder).poll_next(cx)) {
|
||||||
Some(Ok(bytes)) => Poll::Ready(Some(Ok(bytes))),
|
Some(Ok(bytes)) => Poll::Ready(Some(Ok(bytes))),
|
||||||
Some(Err(err)) => Poll::Ready(Some(Err(crate::error::from_io(err)))),
|
Some(Err(err)) => Poll::Ready(Some(Err(crate::error::decode_io(err)))),
|
||||||
None => Poll::Ready(None),
|
None => Poll::Ready(None),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -203,7 +203,7 @@ impl Part {
|
|||||||
|
|
||||||
/// Tries to set the mime of this part.
|
/// Tries to set the mime of this part.
|
||||||
pub fn mime_str(self, mime: &str) -> crate::Result<Part> {
|
pub fn mime_str(self, mime: &str) -> crate::Result<Part> {
|
||||||
Ok(self.mime(mime.parse().map_err(crate::error::from)?))
|
Ok(self.mime(mime.parse().map_err(crate::error::builder)?))
|
||||||
}
|
}
|
||||||
|
|
||||||
// Re-export when mime 0.4 is available, with split MediaType/MediaRange.
|
// Re-export when mime 0.4 is available, with split MediaType/MediaRange.
|
||||||
|
|||||||
@@ -111,9 +111,9 @@ impl RequestBuilder {
|
|||||||
Ok(value) => {
|
Ok(value) => {
|
||||||
req.headers_mut().append(key, value);
|
req.headers_mut().append(key, value);
|
||||||
}
|
}
|
||||||
Err(e) => error = Some(crate::error::from(e.into())),
|
Err(e) => error = Some(crate::error::builder(e.into())),
|
||||||
},
|
},
|
||||||
Err(e) => error = Some(crate::error::from(e.into())),
|
Err(e) => error = Some(crate::error::builder(e.into())),
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
if let Some(err) = error {
|
if let Some(err) = error {
|
||||||
@@ -250,7 +250,7 @@ impl RequestBuilder {
|
|||||||
let serializer = serde_urlencoded::Serializer::new(&mut pairs);
|
let serializer = serde_urlencoded::Serializer::new(&mut pairs);
|
||||||
|
|
||||||
if let Err(err) = query.serialize(serializer) {
|
if let Err(err) = query.serialize(serializer) {
|
||||||
error = Some(crate::error::from(err));
|
error = Some(crate::error::builder(err));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if let Ok(ref mut req) = self.request {
|
if let Ok(ref mut req) = self.request {
|
||||||
@@ -276,7 +276,7 @@ impl RequestBuilder {
|
|||||||
);
|
);
|
||||||
*req.body_mut() = Some(body.into());
|
*req.body_mut() = Some(body.into());
|
||||||
}
|
}
|
||||||
Err(err) => error = Some(crate::error::from(err)),
|
Err(err) => error = Some(crate::error::builder(err)),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if let Some(err) = error {
|
if let Some(err) = error {
|
||||||
@@ -300,7 +300,7 @@ impl RequestBuilder {
|
|||||||
.insert(CONTENT_TYPE, HeaderValue::from_static("application/json"));
|
.insert(CONTENT_TYPE, HeaderValue::from_static("application/json"));
|
||||||
*req.body_mut() = Some(body.into());
|
*req.body_mut() = Some(body.into());
|
||||||
}
|
}
|
||||||
Err(err) => error = Some(crate::error::from(err)),
|
Err(err) => error = Some(crate::error::builder(err)),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if let Some(err) = error {
|
if let Some(err) = error {
|
||||||
|
|||||||
@@ -227,7 +227,7 @@ impl Response {
|
|||||||
pub async fn json<T: DeserializeOwned>(self) -> crate::Result<T> {
|
pub async fn json<T: DeserializeOwned>(self) -> crate::Result<T> {
|
||||||
let full = self.bytes().await?;
|
let full = self.bytes().await?;
|
||||||
|
|
||||||
serde_json::from_slice(&full).map_err(crate::error::from)
|
serde_json::from_slice(&full).map_err(crate::error::decode)
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Get the full response body as `Bytes`.
|
/// Get the full response body as `Bytes`.
|
||||||
|
|||||||
@@ -258,9 +258,8 @@ async fn send_future(sender: Sender) -> Result<(), crate::Error> {
|
|||||||
buf.advance_mut(n);
|
buf.advance_mut(n);
|
||||||
},
|
},
|
||||||
Err(e) => {
|
Err(e) => {
|
||||||
let ret = io::Error::new(e.kind(), e.to_string());
|
|
||||||
tx.take().expect("tx only taken on error").abort();
|
tx.take().expect("tx only taken on error").abort();
|
||||||
return Err(crate::error::from(ret));
|
return Err(crate::error::body(e));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -273,7 +272,7 @@ async fn send_future(sender: Sender) -> Result<(), crate::Error> {
|
|||||||
.expect("tx only taken on error")
|
.expect("tx only taken on error")
|
||||||
.send_data(buf.take().freeze().into())
|
.send_data(buf.take().freeze().into())
|
||||||
.await
|
.await
|
||||||
.map_err(crate::error::from)?;
|
.map_err(crate::error::body)?;
|
||||||
|
|
||||||
written += buf_len;
|
written += buf_len;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -550,7 +550,7 @@ impl ClientHandle {
|
|||||||
.spawn(move || {
|
.spawn(move || {
|
||||||
use tokio::runtime::current_thread::Runtime;
|
use tokio::runtime::current_thread::Runtime;
|
||||||
|
|
||||||
let mut rt = match Runtime::new().map_err(crate::error::from) {
|
let mut rt = match Runtime::new().map_err(crate::error::builder) {
|
||||||
Err(e) => {
|
Err(e) => {
|
||||||
if let Err(e) = spawn_tx.send(Err(e)) {
|
if let Err(e) = spawn_tx.send(Err(e)) {
|
||||||
error!("Failed to communicate runtime creation failure: {:?}", e);
|
error!("Failed to communicate runtime creation failure: {:?}", e);
|
||||||
@@ -587,7 +587,7 @@ impl ClientHandle {
|
|||||||
|
|
||||||
rt.block_on(f)
|
rt.block_on(f)
|
||||||
})
|
})
|
||||||
.map_err(crate::error::from)?;
|
.map_err(crate::error::builder)?;
|
||||||
|
|
||||||
// Wait for the runtime thread to start up...
|
// Wait for the runtime thread to start up...
|
||||||
match wait::timeout(spawn_rx, None) {
|
match wait::timeout(spawn_rx, None) {
|
||||||
@@ -639,8 +639,8 @@ impl ClientHandle {
|
|||||||
self.timeout.0,
|
self.timeout.0,
|
||||||
KeepCoreThreadAlive(Some(self.inner.clone())),
|
KeepCoreThreadAlive(Some(self.inner.clone())),
|
||||||
)),
|
)),
|
||||||
Err(wait::Waited::TimedOut) => Err(crate::error::timedout(Some(url))),
|
Err(wait::Waited::TimedOut(e)) => Err(crate::error::request(e).with_url(url)),
|
||||||
Err(wait::Waited::Executor(err)) => Err(crate::error::from(err).with_url(url)),
|
Err(wait::Waited::Executor(err)) => Err(crate::error::request(err).with_url(url)),
|
||||||
Err(wait::Waited::Inner(err)) => Err(err.with_url(url)),
|
Err(wait::Waited::Inner(err)) => Err(err.with_url(url)),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -60,8 +60,6 @@ mod request;
|
|||||||
mod response;
|
mod response;
|
||||||
mod wait;
|
mod wait;
|
||||||
|
|
||||||
pub(crate) use self::wait::Waited;
|
|
||||||
|
|
||||||
pub use self::body::Body;
|
pub use self::body::Body;
|
||||||
pub use self::client::{Client, ClientBuilder};
|
pub use self::client::{Client, ClientBuilder};
|
||||||
pub use self::request::{Request, RequestBuilder};
|
pub use self::request::{Request, RequestBuilder};
|
||||||
|
|||||||
@@ -234,7 +234,7 @@ impl Part {
|
|||||||
|
|
||||||
/// Tries to set the mime of this part.
|
/// Tries to set the mime of this part.
|
||||||
pub fn mime_str(self, mime: &str) -> crate::Result<Part> {
|
pub fn mime_str(self, mime: &str) -> crate::Result<Part> {
|
||||||
Ok(self.mime(mime.parse().map_err(crate::error::from)?))
|
Ok(self.mime(mime.parse().map_err(crate::error::builder)?))
|
||||||
}
|
}
|
||||||
|
|
||||||
// Re-export when mime 0.4 is available, with split MediaType/MediaRange.
|
// Re-export when mime 0.4 is available, with split MediaType/MediaRange.
|
||||||
|
|||||||
@@ -149,9 +149,9 @@ impl RequestBuilder {
|
|||||||
Ok(value) => {
|
Ok(value) => {
|
||||||
req.headers_mut().append(key, value);
|
req.headers_mut().append(key, value);
|
||||||
}
|
}
|
||||||
Err(e) => error = Some(crate::error::from(e.into())),
|
Err(e) => error = Some(crate::error::builder(e.into())),
|
||||||
},
|
},
|
||||||
Err(e) => error = Some(crate::error::from(e.into())),
|
Err(e) => error = Some(crate::error::builder(e.into())),
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
if let Some(err) = error {
|
if let Some(err) = error {
|
||||||
@@ -323,7 +323,7 @@ impl RequestBuilder {
|
|||||||
let serializer = serde_urlencoded::Serializer::new(&mut pairs);
|
let serializer = serde_urlencoded::Serializer::new(&mut pairs);
|
||||||
|
|
||||||
if let Err(err) = query.serialize(serializer) {
|
if let Err(err) = query.serialize(serializer) {
|
||||||
error = Some(crate::error::from(err));
|
error = Some(crate::error::builder(err));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if let Ok(ref mut req) = self.request {
|
if let Ok(ref mut req) = self.request {
|
||||||
@@ -374,7 +374,7 @@ impl RequestBuilder {
|
|||||||
);
|
);
|
||||||
*req.body_mut() = Some(body.into());
|
*req.body_mut() = Some(body.into());
|
||||||
}
|
}
|
||||||
Err(err) => error = Some(crate::error::from(err)),
|
Err(err) => error = Some(crate::error::builder(err)),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if let Some(err) = error {
|
if let Some(err) = error {
|
||||||
@@ -417,7 +417,7 @@ impl RequestBuilder {
|
|||||||
.insert(CONTENT_TYPE, HeaderValue::from_static("application/json"));
|
.insert(CONTENT_TYPE, HeaderValue::from_static("application/json"));
|
||||||
*req.body_mut() = Some(body.into());
|
*req.body_mut() = Some(body.into());
|
||||||
}
|
}
|
||||||
Err(err) => error = Some(crate::error::from(err)),
|
Err(err) => error = Some(crate::error::builder(err)),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if let Some(err) = error {
|
if let Some(err) = error {
|
||||||
@@ -797,8 +797,9 @@ mod tests {
|
|||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn add_json_fail() {
|
fn add_json_fail() {
|
||||||
use serde::ser::Error;
|
use serde::ser::Error as _;
|
||||||
use serde::{Serialize, Serializer};
|
use serde::{Serialize, Serializer};
|
||||||
|
use std::error::Error as _;
|
||||||
struct MyStruct;
|
struct MyStruct;
|
||||||
impl Serialize for MyStruct {
|
impl Serialize for MyStruct {
|
||||||
fn serialize<S>(&self, _serializer: S) -> Result<S::Ok, S::Error>
|
fn serialize<S>(&self, _serializer: S) -> Result<S::Ok, S::Error>
|
||||||
@@ -813,7 +814,9 @@ mod tests {
|
|||||||
let some_url = "https://google.com/";
|
let some_url = "https://google.com/";
|
||||||
let r = client.post(some_url);
|
let r = client.post(some_url);
|
||||||
let json_data = MyStruct;
|
let json_data = MyStruct;
|
||||||
assert!(r.json(&json_data).build().unwrap_err().is_serialization());
|
let err = r.json(&json_data).build().unwrap_err();
|
||||||
|
assert!(err.is_builder()); // well, duh ;)
|
||||||
|
assert!(err.source().unwrap().is::<serde_json::Error>());
|
||||||
}
|
}
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
|
|||||||
@@ -205,8 +205,8 @@ impl Response {
|
|||||||
/// [`serde_json::from_reader`]: https://docs.serde.rs/serde_json/fn.from_reader.html
|
/// [`serde_json::from_reader`]: https://docs.serde.rs/serde_json/fn.from_reader.html
|
||||||
pub fn json<T: DeserializeOwned>(self) -> crate::Result<T> {
|
pub fn json<T: DeserializeOwned>(self) -> crate::Result<T> {
|
||||||
wait::timeout(self.inner.json(), self.timeout).map_err(|e| match e {
|
wait::timeout(self.inner.json(), self.timeout).map_err(|e| match e {
|
||||||
wait::Waited::TimedOut => crate::error::timedout(None),
|
wait::Waited::TimedOut(e) => crate::error::decode(e),
|
||||||
wait::Waited::Executor(e) => crate::error::from(e),
|
wait::Waited::Executor(e) => crate::error::decode(e),
|
||||||
wait::Waited::Inner(e) => e,
|
wait::Waited::Inner(e) => e,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
@@ -253,8 +253,8 @@ impl Response {
|
|||||||
pub fn text_with_charset(self, default_encoding: &str) -> crate::Result<String> {
|
pub fn text_with_charset(self, default_encoding: &str) -> crate::Result<String> {
|
||||||
wait::timeout(self.inner.text_with_charset(default_encoding), self.timeout).map_err(|e| {
|
wait::timeout(self.inner.text_with_charset(default_encoding), self.timeout).map_err(|e| {
|
||||||
match e {
|
match e {
|
||||||
wait::Waited::TimedOut => crate::error::timedout(None),
|
wait::Waited::TimedOut(e) => crate::error::decode(e),
|
||||||
wait::Waited::Executor(e) => crate::error::from(e),
|
wait::Waited::Executor(e) => crate::error::decode(e),
|
||||||
wait::Waited::Inner(e) => e,
|
wait::Waited::Inner(e) => e,
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
@@ -284,7 +284,7 @@ impl Response {
|
|||||||
where
|
where
|
||||||
W: io::Write,
|
W: io::Write,
|
||||||
{
|
{
|
||||||
io::copy(self, w).map_err(crate::error::from)
|
io::copy(self, w).map_err(crate::error::response)
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Turn a response into an error if the server returned an error.
|
/// Turn a response into an error if the server returned an error.
|
||||||
@@ -359,8 +359,8 @@ impl Read for Response {
|
|||||||
|
|
||||||
let timeout = self.timeout;
|
let timeout = self.timeout;
|
||||||
wait::timeout(self.body_mut().read(buf), timeout).map_err(|e| match e {
|
wait::timeout(self.body_mut().read(buf), timeout).map_err(|e| match e {
|
||||||
wait::Waited::TimedOut => crate::error::timedout(None).into_io(),
|
wait::Waited::TimedOut(e) => crate::error::response(e).into_io(),
|
||||||
wait::Waited::Executor(e) => crate::error::from(e).into_io(),
|
wait::Waited::Executor(e) => crate::error::response(e).into_io(),
|
||||||
wait::Waited::Inner(e) => e,
|
wait::Waited::Inner(e) => e,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -7,14 +7,14 @@ use tokio::clock;
|
|||||||
use tokio_executor::{
|
use tokio_executor::{
|
||||||
enter,
|
enter,
|
||||||
park::{Park, ParkThread, Unpark, UnparkThread},
|
park::{Park, ParkThread, Unpark, UnparkThread},
|
||||||
EnterError,
|
|
||||||
};
|
};
|
||||||
|
|
||||||
pub(crate) fn timeout<F, I, E>(fut: F, timeout: Option<Duration>) -> Result<I, Waited<E>>
|
pub(crate) fn timeout<F, I, E>(fut: F, timeout: Option<Duration>) -> Result<I, Waited<E>>
|
||||||
where
|
where
|
||||||
F: Future<Output = Result<I, E>>,
|
F: Future<Output = Result<I, E>>,
|
||||||
{
|
{
|
||||||
let _entered = enter().map_err(Waited::Executor)?;
|
let _entered =
|
||||||
|
enter().map_err(|_| Waited::Executor(crate::error::BlockingClientInAsyncContext))?;
|
||||||
let deadline = timeout.map(|d| {
|
let deadline = timeout.map(|d| {
|
||||||
log::trace!("wait at most {:?}", d);
|
log::trace!("wait at most {:?}", d);
|
||||||
clock::now() + d
|
clock::now() + d
|
||||||
@@ -39,7 +39,7 @@ where
|
|||||||
let now = clock::now();
|
let now = clock::now();
|
||||||
if now >= deadline {
|
if now >= deadline {
|
||||||
log::trace!("wait timeout exceeded");
|
log::trace!("wait timeout exceeded");
|
||||||
return Err(Waited::TimedOut);
|
return Err(Waited::TimedOut(crate::error::TimedOut));
|
||||||
}
|
}
|
||||||
|
|
||||||
log::trace!("park timeout {:?}", deadline - now);
|
log::trace!("park timeout {:?}", deadline - now);
|
||||||
@@ -53,8 +53,8 @@ where
|
|||||||
|
|
||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
pub(crate) enum Waited<E> {
|
pub(crate) enum Waited<E> {
|
||||||
TimedOut,
|
TimedOut(crate::error::TimedOut),
|
||||||
Executor(EnterError),
|
Executor(crate::error::BlockingClientInAsyncContext),
|
||||||
Inner(E),
|
Inner(E),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -75,7 +75,7 @@ impl Connector {
|
|||||||
where
|
where
|
||||||
T: Into<Option<IpAddr>>,
|
T: Into<Option<IpAddr>>,
|
||||||
{
|
{
|
||||||
let tls = tls.build().map_err(crate::error::from)?;
|
let tls = tls.build().map_err(crate::error::builder)?;
|
||||||
|
|
||||||
let mut http = http_connector()?;
|
let mut http = http_connector()?;
|
||||||
http.set_local_address(local_addr.into());
|
http.set_local_address(local_addr.into());
|
||||||
|
|||||||
619
src/error.rs
619
src/error.rs
@@ -4,69 +4,33 @@ use std::io;
|
|||||||
|
|
||||||
use crate::{StatusCode, Url};
|
use crate::{StatusCode, Url};
|
||||||
|
|
||||||
|
/// A `Result` alias where the `Err` case is `reqwest::Error`.
|
||||||
|
pub type Result<T> = std::result::Result<T, Error>;
|
||||||
|
|
||||||
/// The Errors that may occur when processing a `Request`.
|
/// The Errors that may occur when processing a `Request`.
|
||||||
///
|
|
||||||
/// # Examples
|
|
||||||
///
|
|
||||||
/// ```
|
|
||||||
/// extern crate serde;
|
|
||||||
/// extern crate reqwest;
|
|
||||||
///
|
|
||||||
/// use serde::Deserialize;
|
|
||||||
///
|
|
||||||
/// #[derive(Deserialize)]
|
|
||||||
/// struct Simple {
|
|
||||||
/// key: String
|
|
||||||
/// }
|
|
||||||
/// # fn main() { }
|
|
||||||
///
|
|
||||||
/// async fn run() {
|
|
||||||
/// match make_request().await {
|
|
||||||
/// Err(e) => handler(e),
|
|
||||||
/// Ok(_) => return,
|
|
||||||
/// }
|
|
||||||
/// }
|
|
||||||
/// // Response is not a json object conforming to the Simple struct
|
|
||||||
/// async fn make_request() -> Result<Simple, reqwest::Error> {
|
|
||||||
/// reqwest::get("http://httpbin.org/ip").await?.json().await
|
|
||||||
/// }
|
|
||||||
///
|
|
||||||
/// fn handler(e: reqwest::Error) {
|
|
||||||
/// if e.is_http() {
|
|
||||||
/// match e.url() {
|
|
||||||
/// None => println!("No Url given"),
|
|
||||||
/// Some(url) => println!("Problem making request to: {}", url),
|
|
||||||
/// }
|
|
||||||
/// }
|
|
||||||
/// // Inspect the internal error and output it
|
|
||||||
/// if e.is_serialization() {
|
|
||||||
/// let serde_error = match e.get_ref() {
|
|
||||||
/// None => return,
|
|
||||||
/// Some(err) => err,
|
|
||||||
/// };
|
|
||||||
/// println!("problem parsing information {}", serde_error);
|
|
||||||
/// }
|
|
||||||
/// if e.is_redirect() {
|
|
||||||
/// println!("server redirecting too many times or making loop");
|
|
||||||
/// }
|
|
||||||
/// }
|
|
||||||
/// ```
|
|
||||||
pub struct Error {
|
pub struct Error {
|
||||||
inner: Box<Inner>,
|
inner: Box<Inner>,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type BoxError = Box<dyn StdError + Send + Sync>;
|
||||||
|
|
||||||
struct Inner {
|
struct Inner {
|
||||||
kind: Kind,
|
kind: Kind,
|
||||||
|
source: Option<BoxError>,
|
||||||
url: Option<Url>,
|
url: Option<Url>,
|
||||||
}
|
}
|
||||||
|
|
||||||
/// A `Result` alias where the `Err` case is `reqwest::Error`.
|
|
||||||
pub type Result<T> = std::result::Result<T, Error>;
|
|
||||||
|
|
||||||
impl Error {
|
impl Error {
|
||||||
fn new(kind: Kind, url: Option<Url>) -> Error {
|
pub(crate) fn new<E>(kind: Kind, source: Option<E>) -> Error
|
||||||
|
where
|
||||||
|
E: Into<BoxError>,
|
||||||
|
{
|
||||||
Error {
|
Error {
|
||||||
inner: Box::new(Inner { kind, url }),
|
inner: Box::new(Inner {
|
||||||
|
kind,
|
||||||
|
source: source.map(Into::into),
|
||||||
|
url: None,
|
||||||
|
}),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -87,95 +51,14 @@ impl Error {
|
|||||||
/// }
|
/// }
|
||||||
/// # }
|
/// # }
|
||||||
/// ```
|
/// ```
|
||||||
#[inline]
|
|
||||||
pub fn url(&self) -> Option<&Url> {
|
pub fn url(&self) -> Option<&Url> {
|
||||||
self.inner.url.as_ref()
|
self.inner.url.as_ref()
|
||||||
}
|
}
|
||||||
|
|
||||||
pub(crate) fn with_url(mut self, url: Url) -> Error {
|
/// Returns true if the error is from a type Builder.
|
||||||
self.inner.url = Some(url);
|
pub fn is_builder(&self) -> bool {
|
||||||
self
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Returns a reference to the internal error, if available.
|
|
||||||
///
|
|
||||||
/// The `'static` bounds allows using `downcast_ref` to check the
|
|
||||||
/// details of the error.
|
|
||||||
///
|
|
||||||
/// # Examples
|
|
||||||
///
|
|
||||||
/// ```
|
|
||||||
/// extern crate url;
|
|
||||||
/// # extern crate reqwest;
|
|
||||||
/// // retries requests with no host on localhost
|
|
||||||
/// # async fn run() {
|
|
||||||
/// let invalid_request = "http://";
|
|
||||||
/// let mut response = reqwest::get(invalid_request).await;
|
|
||||||
/// if let Err(e) = response {
|
|
||||||
/// match e.get_ref().and_then(|e| e.downcast_ref::<url::ParseError>()) {
|
|
||||||
/// Some(&url::ParseError::EmptyHost) => {
|
|
||||||
/// let valid_request = format!("{}{}",invalid_request, "localhost");
|
|
||||||
/// response = reqwest::get(&valid_request).await;
|
|
||||||
/// },
|
|
||||||
/// _ => (),
|
|
||||||
/// }
|
|
||||||
/// }
|
|
||||||
/// # }
|
|
||||||
/// # fn main() {}
|
|
||||||
/// ```
|
|
||||||
pub fn get_ref(&self) -> Option<&(dyn StdError + Send + Sync + 'static)> {
|
|
||||||
match self.inner.kind {
|
match self.inner.kind {
|
||||||
Kind::Http(ref e) => Some(e),
|
Kind::Builder => true,
|
||||||
Kind::Hyper(ref e) => Some(e),
|
|
||||||
Kind::Mime(ref e) => Some(e),
|
|
||||||
Kind::Url(ref e) => Some(e),
|
|
||||||
#[cfg(all(feature = "default-tls", feature = "rustls-tls"))]
|
|
||||||
Kind::TlsIncompatible => None,
|
|
||||||
#[cfg(feature = "default-tls")]
|
|
||||||
Kind::NativeTls(ref e) => Some(e),
|
|
||||||
#[cfg(feature = "rustls-tls")]
|
|
||||||
Kind::Rustls(ref e) => Some(e),
|
|
||||||
#[cfg(feature = "trust-dns")]
|
|
||||||
Kind::DnsSystemConf(ref e) => Some(e),
|
|
||||||
Kind::Io(ref e) => Some(e),
|
|
||||||
Kind::UrlEncoded(ref e) => Some(e),
|
|
||||||
Kind::Json(ref e) => Some(e),
|
|
||||||
Kind::UrlBadScheme
|
|
||||||
| Kind::TooManyRedirects
|
|
||||||
| Kind::RedirectLoop
|
|
||||||
| Kind::Status(_)
|
|
||||||
| Kind::UnknownProxyScheme
|
|
||||||
| Kind::Timer
|
|
||||||
| Kind::BlockingClientInFutureContext => None,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Returns true if the error is related to HTTP.
|
|
||||||
pub fn is_http(&self) -> bool {
|
|
||||||
match self.inner.kind {
|
|
||||||
Kind::Http(_) => true,
|
|
||||||
Kind::Hyper(_) => true,
|
|
||||||
_ => false,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Returns true if the error is related to a timeout.
|
|
||||||
pub fn is_timeout(&self) -> bool {
|
|
||||||
match self.inner.kind {
|
|
||||||
Kind::Io(ref io) => io.kind() == io::ErrorKind::TimedOut,
|
|
||||||
Kind::Hyper(ref error) => error
|
|
||||||
.source()
|
|
||||||
.and_then(|cause| cause.downcast_ref::<io::Error>())
|
|
||||||
.map(|io| io.kind() == io::ErrorKind::TimedOut)
|
|
||||||
.unwrap_or(false),
|
|
||||||
_ => false,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Returns true if the error is serialization related.
|
|
||||||
pub fn is_serialization(&self) -> bool {
|
|
||||||
match self.inner.kind {
|
|
||||||
Kind::Json(_) | Kind::UrlEncoded(_) => true,
|
|
||||||
_ => false,
|
_ => false,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -183,25 +66,22 @@ impl Error {
|
|||||||
/// Returns true if the error is from a `RedirectPolicy`.
|
/// Returns true if the error is from a `RedirectPolicy`.
|
||||||
pub fn is_redirect(&self) -> bool {
|
pub fn is_redirect(&self) -> bool {
|
||||||
match self.inner.kind {
|
match self.inner.kind {
|
||||||
Kind::TooManyRedirects | Kind::RedirectLoop => true,
|
Kind::Redirect => true,
|
||||||
_ => false,
|
_ => false,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Returns true if the error is from a request returning a 4xx error.
|
/// Returns true if the error is from `Response::error_for_status`.
|
||||||
pub fn is_client_error(&self) -> bool {
|
pub fn is_status(&self) -> bool {
|
||||||
match self.inner.kind {
|
match self.inner.kind {
|
||||||
Kind::Status(code) => code.is_client_error(),
|
Kind::Status(_) => true,
|
||||||
_ => false,
|
_ => false,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Returns true if the error is from a request returning a 5xx error.
|
/// Returns true if the error is related to a timeout.
|
||||||
pub fn is_server_error(&self) -> bool {
|
pub fn is_timeout(&self) -> bool {
|
||||||
match self.inner.kind {
|
self.source().map(|e| e.is::<TimedOut>()).unwrap_or(false)
|
||||||
Kind::Status(code) => code.is_server_error(),
|
|
||||||
_ => false,
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Returns the status code, if the error was generated from a response.
|
/// Returns the status code, if the error was generated from a response.
|
||||||
@@ -212,363 +92,172 @@ impl Error {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// private
|
||||||
|
|
||||||
|
pub(crate) fn with_url(mut self, url: Url) -> Error {
|
||||||
|
self.inner.url = Some(url);
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
pub(crate) fn into_io(self) -> io::Error {
|
pub(crate) fn into_io(self) -> io::Error {
|
||||||
match self.inner.kind {
|
io::Error::new(io::ErrorKind::Other, self)
|
||||||
Kind::Io(io) => io,
|
|
||||||
_ => io::Error::new(io::ErrorKind::Other, self),
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl fmt::Debug for Error {
|
impl fmt::Debug for Error {
|
||||||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||||||
|
let mut builder = f.debug_struct("reqwest::Error");
|
||||||
|
|
||||||
|
builder.field("kind", &self.inner.kind);
|
||||||
|
|
||||||
if let Some(ref url) = self.inner.url {
|
if let Some(ref url) = self.inner.url {
|
||||||
f.debug_tuple("Error")
|
builder.field("url", url);
|
||||||
.field(&self.inner.kind)
|
|
||||||
.field(url)
|
|
||||||
.finish()
|
|
||||||
} else {
|
|
||||||
f.debug_tuple("Error").field(&self.inner.kind).finish()
|
|
||||||
}
|
}
|
||||||
|
if let Some(ref source) = self.inner.source {
|
||||||
|
builder.field("source", source);
|
||||||
|
}
|
||||||
|
|
||||||
|
builder.finish()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static BLOCK_IN_FUTURE: &str = "blocking Client used inside a Future context";
|
|
||||||
|
|
||||||
impl fmt::Display for Error {
|
impl fmt::Display for Error {
|
||||||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||||||
if let Some(ref url) = self.inner.url {
|
struct ForUrl<'a>(Option<&'a Url>);
|
||||||
fmt::Display::fmt(url, f)?;
|
|
||||||
f.write_str(": ")?;
|
impl fmt::Display for ForUrl<'_> {
|
||||||
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||||||
|
if let Some(url) = self.0 {
|
||||||
|
write!(f, " for url ({})", url.as_str())
|
||||||
|
} else {
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
match self.inner.kind {
|
match self.inner.kind {
|
||||||
Kind::Http(ref e) => fmt::Display::fmt(e, f),
|
Kind::Builder => f.write_str("builder error")?,
|
||||||
Kind::Hyper(ref e) => fmt::Display::fmt(e, f),
|
Kind::Request => f.write_str("error sending request")?,
|
||||||
Kind::Mime(ref e) => fmt::Display::fmt(e, f),
|
Kind::Response => f.write_str("error reading response")?,
|
||||||
Kind::Url(ref e) => fmt::Display::fmt(e, f),
|
Kind::Body => f.write_str("request or response body error")?,
|
||||||
Kind::UrlBadScheme => f.write_str("URL scheme is not allowed"),
|
Kind::Decode => f.write_str("error decoding response body")?,
|
||||||
#[cfg(all(feature = "default-tls", feature = "rustls-tls"))]
|
Kind::Redirect => f.write_str("error following redirect")?,
|
||||||
Kind::TlsIncompatible => f.write_str("Incompatible TLS identity type"),
|
|
||||||
#[cfg(feature = "default-tls")]
|
|
||||||
Kind::NativeTls(ref e) => fmt::Display::fmt(e, f),
|
|
||||||
#[cfg(feature = "rustls-tls")]
|
|
||||||
Kind::Rustls(ref e) => fmt::Display::fmt(e, f),
|
|
||||||
#[cfg(feature = "trust-dns")]
|
|
||||||
Kind::DnsSystemConf(ref e) => write!(f, "failed to load DNS system conf: {}", e),
|
|
||||||
Kind::Io(ref e) => fmt::Display::fmt(e, f),
|
|
||||||
Kind::UrlEncoded(ref e) => fmt::Display::fmt(e, f),
|
|
||||||
Kind::Json(ref e) => fmt::Display::fmt(e, f),
|
|
||||||
Kind::TooManyRedirects => f.write_str("Too many redirects"),
|
|
||||||
Kind::RedirectLoop => f.write_str("Infinite redirect loop"),
|
|
||||||
Kind::Status(ref code) => {
|
Kind::Status(ref code) => {
|
||||||
let prefix = if code.is_client_error() {
|
let prefix = if code.is_client_error() {
|
||||||
"Client Error"
|
"HTTP status client error"
|
||||||
} else if code.is_server_error() {
|
|
||||||
"Server Error"
|
|
||||||
} else {
|
} else {
|
||||||
unreachable!("non-error status code: {:?}", code);
|
debug_assert!(code.is_server_error());
|
||||||
|
"HTTP status server error"
|
||||||
};
|
};
|
||||||
write!(f, "{}: {}", prefix, code)
|
write!(f, "{} ({})", prefix, code)?;
|
||||||
}
|
}
|
||||||
Kind::UnknownProxyScheme => f.write_str("Unknown proxy scheme"),
|
};
|
||||||
Kind::Timer => f.write_str("timer unavailable"),
|
|
||||||
Kind::BlockingClientInFutureContext => f.write_str(BLOCK_IN_FUTURE),
|
ForUrl(self.inner.url.as_ref()).fmt(f)?;
|
||||||
|
|
||||||
|
if let Some(ref e) = self.inner.source {
|
||||||
|
write!(f, ": {}", e)?;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl StdError for Error {
|
impl StdError for Error {
|
||||||
fn description(&self) -> &str {
|
|
||||||
match self.inner.kind {
|
|
||||||
Kind::Http(ref e) => e.description(),
|
|
||||||
Kind::Hyper(ref e) => e.description(),
|
|
||||||
Kind::Mime(ref e) => e.description(),
|
|
||||||
Kind::Url(ref e) => e.description(),
|
|
||||||
Kind::UrlBadScheme => "URL scheme is not allowed",
|
|
||||||
#[cfg(all(feature = "default-tls", feature = "rustls-tls"))]
|
|
||||||
Kind::TlsIncompatible => "Incompatible TLS identity type",
|
|
||||||
#[cfg(feature = "default-tls")]
|
|
||||||
Kind::NativeTls(ref e) => e.description(),
|
|
||||||
#[cfg(feature = "rustls-tls")]
|
|
||||||
Kind::Rustls(ref e) => e.description(),
|
|
||||||
#[cfg(feature = "trust-dns")]
|
|
||||||
Kind::DnsSystemConf(_) => "failed to load DNS system conf",
|
|
||||||
Kind::Io(ref e) => e.description(),
|
|
||||||
Kind::UrlEncoded(ref e) => e.description(),
|
|
||||||
Kind::Json(ref e) => e.description(),
|
|
||||||
Kind::TooManyRedirects => "Too many redirects",
|
|
||||||
Kind::RedirectLoop => "Infinite redirect loop",
|
|
||||||
Kind::Status(code) => {
|
|
||||||
if code.is_client_error() {
|
|
||||||
"Client Error"
|
|
||||||
} else if code.is_server_error() {
|
|
||||||
"Server Error"
|
|
||||||
} else {
|
|
||||||
unreachable!("non-error status code: {:?}", code);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
Kind::UnknownProxyScheme => "Unknown proxy scheme",
|
|
||||||
Kind::Timer => "timer unavailable",
|
|
||||||
Kind::BlockingClientInFutureContext => BLOCK_IN_FUTURE,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Keep this for now, as std::io::Error didn't support source() until 1.35
|
|
||||||
#[allow(deprecated)]
|
|
||||||
fn cause(&self) -> Option<&dyn StdError> {
|
|
||||||
match self.inner.kind {
|
|
||||||
Kind::Http(ref e) => e.cause(),
|
|
||||||
Kind::Hyper(ref e) => e.cause(),
|
|
||||||
Kind::Mime(ref e) => e.cause(),
|
|
||||||
Kind::Url(ref e) => e.cause(),
|
|
||||||
#[cfg(all(feature = "default-tls", feature = "rustls-tls"))]
|
|
||||||
Kind::TlsIncompatible => None,
|
|
||||||
#[cfg(feature = "default-tls")]
|
|
||||||
Kind::NativeTls(ref e) => e.cause(),
|
|
||||||
#[cfg(feature = "rustls-tls")]
|
|
||||||
Kind::Rustls(ref e) => e.cause(),
|
|
||||||
#[cfg(feature = "trust-dns")]
|
|
||||||
Kind::DnsSystemConf(ref e) => e.cause(),
|
|
||||||
Kind::Io(ref e) => e.cause(),
|
|
||||||
Kind::UrlEncoded(ref e) => e.cause(),
|
|
||||||
Kind::Json(ref e) => e.cause(),
|
|
||||||
Kind::UrlBadScheme
|
|
||||||
| Kind::TooManyRedirects
|
|
||||||
| Kind::RedirectLoop
|
|
||||||
| Kind::Status(_)
|
|
||||||
| Kind::UnknownProxyScheme
|
|
||||||
| Kind::Timer
|
|
||||||
| Kind::BlockingClientInFutureContext => None,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn source(&self) -> Option<&(dyn StdError + 'static)> {
|
fn source(&self) -> Option<&(dyn StdError + 'static)> {
|
||||||
match self.inner.kind {
|
self.inner.source.as_ref().map(|e| &**e as _)
|
||||||
Kind::Http(ref e) => e.source(),
|
|
||||||
Kind::Hyper(ref e) => e.source(),
|
|
||||||
Kind::Mime(ref e) => e.source(),
|
|
||||||
Kind::Url(ref e) => e.source(),
|
|
||||||
#[cfg(all(feature = "default-tls", feature = "rustls-tls"))]
|
|
||||||
Kind::TlsIncompatible => None,
|
|
||||||
#[cfg(feature = "default-tls")]
|
|
||||||
Kind::NativeTls(ref e) => e.source(),
|
|
||||||
#[cfg(feature = "rustls-tls")]
|
|
||||||
Kind::Rustls(ref e) => e.source(),
|
|
||||||
#[cfg(feature = "trust-dns")]
|
|
||||||
Kind::DnsSystemConf(ref e) => e.source(),
|
|
||||||
Kind::Io(ref e) => e.source(),
|
|
||||||
Kind::UrlEncoded(ref e) => e.source(),
|
|
||||||
Kind::Json(ref e) => e.source(),
|
|
||||||
Kind::UrlBadScheme
|
|
||||||
| Kind::TooManyRedirects
|
|
||||||
| Kind::RedirectLoop
|
|
||||||
| Kind::Status(_)
|
|
||||||
| Kind::UnknownProxyScheme
|
|
||||||
| Kind::Timer
|
|
||||||
| Kind::BlockingClientInFutureContext => None,
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
pub(crate) enum Kind {
|
pub(crate) enum Kind {
|
||||||
Http(http::Error),
|
Builder,
|
||||||
Hyper(hyper::Error),
|
Request,
|
||||||
Mime(mime::FromStrError),
|
Response,
|
||||||
Url(url::ParseError),
|
Redirect,
|
||||||
UrlBadScheme,
|
|
||||||
#[cfg(all(feature = "default-tls", feature = "rustls-tls"))]
|
|
||||||
TlsIncompatible,
|
|
||||||
#[cfg(feature = "default-tls")]
|
|
||||||
NativeTls(native_tls::Error),
|
|
||||||
#[cfg(feature = "rustls-tls")]
|
|
||||||
Rustls(rustls::TLSError),
|
|
||||||
#[cfg(feature = "trust-dns")]
|
|
||||||
DnsSystemConf(io::Error),
|
|
||||||
Io(io::Error),
|
|
||||||
UrlEncoded(serde_urlencoded::ser::Error),
|
|
||||||
Json(serde_json::Error),
|
|
||||||
TooManyRedirects,
|
|
||||||
RedirectLoop,
|
|
||||||
Status(StatusCode),
|
Status(StatusCode),
|
||||||
UnknownProxyScheme,
|
Body,
|
||||||
Timer,
|
Decode,
|
||||||
BlockingClientInFutureContext,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl From<http::Error> for Kind {
|
// constructors
|
||||||
#[inline]
|
|
||||||
fn from(err: http::Error) -> Kind {
|
pub(crate) fn builder<E: Into<BoxError>>(e: E) -> Error {
|
||||||
Kind::Http(err)
|
Error::new(Kind::Builder, Some(e))
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl From<hyper::Error> for Kind {
|
pub(crate) fn body<E: Into<BoxError>>(e: E) -> Error {
|
||||||
#[inline]
|
Error::new(Kind::Body, Some(e))
|
||||||
fn from(err: hyper::Error) -> Kind {
|
|
||||||
Kind::Hyper(err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl From<mime::FromStrError> for Kind {
|
pub(crate) fn decode<E: Into<BoxError>>(e: E) -> Error {
|
||||||
#[inline]
|
Error::new(Kind::Decode, Some(e))
|
||||||
fn from(err: mime::FromStrError) -> Kind {
|
|
||||||
Kind::Mime(err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl From<io::Error> for Kind {
|
pub(crate) fn request<E: Into<BoxError>>(e: E) -> Error {
|
||||||
#[inline]
|
Error::new(Kind::Request, Some(e))
|
||||||
fn from(err: io::Error) -> Kind {
|
|
||||||
Kind::Io(err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl From<url::ParseError> for Kind {
|
pub(crate) fn response<E: Into<BoxError>>(e: E) -> Error {
|
||||||
#[inline]
|
Error::new(Kind::Response, Some(e))
|
||||||
fn from(err: url::ParseError) -> Kind {
|
|
||||||
Kind::Url(err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl From<serde_urlencoded::ser::Error> for Kind {
|
pub(crate) fn loop_detected(url: Url) -> Error {
|
||||||
#[inline]
|
Error::new(Kind::Redirect, Some("infinite redirect loop detected")).with_url(url)
|
||||||
fn from(err: serde_urlencoded::ser::Error) -> Kind {
|
|
||||||
Kind::UrlEncoded(err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl From<serde_json::Error> for Kind {
|
pub(crate) fn too_many_redirects(url: Url) -> Error {
|
||||||
#[inline]
|
Error::new(Kind::Redirect, Some("too many redirects")).with_url(url)
|
||||||
fn from(err: serde_json::Error) -> Kind {
|
|
||||||
Kind::Json(err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(feature = "default-tls")]
|
pub(crate) fn status_code(url: Url, status: StatusCode) -> Error {
|
||||||
impl From<native_tls::Error> for Kind {
|
Error::new(Kind::Status(status), None::<Error>).with_url(url)
|
||||||
fn from(err: native_tls::Error) -> Kind {
|
|
||||||
Kind::NativeTls(err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(feature = "rustls-tls")]
|
pub(crate) fn url_bad_scheme(url: Url) -> Error {
|
||||||
impl From<rustls::TLSError> for Kind {
|
Error::new(Kind::Builder, Some("URL scheme is not allowed")).with_url(url)
|
||||||
fn from(err: rustls::TLSError) -> Kind {
|
|
||||||
Kind::Rustls(err)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<T> From<crate::blocking::Waited<T>> for Kind
|
// io::Error helpers
|
||||||
where
|
|
||||||
T: Into<Kind>,
|
|
||||||
{
|
|
||||||
fn from(err: crate::blocking::Waited<T>) -> Kind {
|
|
||||||
match err {
|
|
||||||
crate::blocking::Waited::TimedOut => io_timeout().into(),
|
|
||||||
crate::blocking::Waited::Executor(e) => e.into(),
|
|
||||||
crate::blocking::Waited::Inner(e) => e.into(),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl From<tokio_executor::EnterError> for Kind {
|
|
||||||
fn from(_err: tokio_executor::EnterError) -> Kind {
|
|
||||||
Kind::BlockingClientInFutureContext
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl From<tokio::timer::Error> for Kind {
|
|
||||||
fn from(_err: tokio::timer::Error) -> Kind {
|
|
||||||
Kind::Timer
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn io_timeout() -> io::Error {
|
|
||||||
io::Error::new(io::ErrorKind::TimedOut, "timed out")
|
|
||||||
}
|
|
||||||
|
|
||||||
#[allow(missing_debug_implementations)]
|
|
||||||
pub(crate) struct InternalFrom<T>(pub T, pub Option<Url>);
|
|
||||||
|
|
||||||
#[doc(hidden)] // https://github.com/rust-lang/rust/issues/42323
|
|
||||||
impl From<InternalFrom<Error>> for Error {
|
|
||||||
#[inline]
|
|
||||||
fn from(other: InternalFrom<Error>) -> Error {
|
|
||||||
other.0
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[doc(hidden)] // https://github.com/rust-lang/rust/issues/42323
|
|
||||||
impl<T> From<InternalFrom<T>> for Error
|
|
||||||
where
|
|
||||||
T: Into<Kind>,
|
|
||||||
{
|
|
||||||
#[inline]
|
|
||||||
fn from(other: InternalFrom<T>) -> Error {
|
|
||||||
Error::new(other.0.into(), other.1)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub(crate) fn from<T>(err: T) -> Error
|
|
||||||
where
|
|
||||||
T: Into<Kind>,
|
|
||||||
{
|
|
||||||
InternalFrom(err, None).into()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub(crate) fn into_io(e: Error) -> io::Error {
|
pub(crate) fn into_io(e: Error) -> io::Error {
|
||||||
e.into_io()
|
e.into_io()
|
||||||
}
|
}
|
||||||
|
|
||||||
pub(crate) fn from_io(e: io::Error) -> Error {
|
pub(crate) fn decode_io(e: io::Error) -> Error {
|
||||||
if e.get_ref().map(|r| r.is::<Error>()).unwrap_or(false) {
|
if e.get_ref().map(|r| r.is::<Error>()).unwrap_or(false) {
|
||||||
*e.into_inner()
|
*e.into_inner()
|
||||||
.expect("io::Error::get_ref was Some(_)")
|
.expect("io::Error::get_ref was Some(_)")
|
||||||
.downcast::<Error>()
|
.downcast::<Error>()
|
||||||
.expect("StdError::is() was true")
|
.expect("StdError::is() was true")
|
||||||
} else {
|
} else {
|
||||||
from(e)
|
decode(e)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
macro_rules! url_error {
|
// internal Error "sources"
|
||||||
($e:expr, $url:expr) => {
|
|
||||||
Err(crate::Error::from(crate::error::InternalFrom(
|
#[derive(Debug)]
|
||||||
$e,
|
pub(crate) struct TimedOut;
|
||||||
Some($url.clone()),
|
|
||||||
)))
|
#[derive(Debug)]
|
||||||
};
|
pub(crate) struct BlockingClientInAsyncContext;
|
||||||
|
|
||||||
|
impl fmt::Display for TimedOut {
|
||||||
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||||||
|
f.write_str("operation timed out")
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub(crate) fn loop_detected(url: Url) -> Error {
|
impl StdError for TimedOut {}
|
||||||
Error::new(Kind::RedirectLoop, Some(url))
|
|
||||||
|
impl fmt::Display for BlockingClientInAsyncContext {
|
||||||
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||||||
|
f.write_str("blocking Client used inside a Future context")
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub(crate) fn too_many_redirects(url: Url) -> Error {
|
impl StdError for BlockingClientInAsyncContext {}
|
||||||
Error::new(Kind::TooManyRedirects, Some(url))
|
|
||||||
}
|
|
||||||
|
|
||||||
pub(crate) fn timedout(url: Option<Url>) -> Error {
|
|
||||||
Error::new(Kind::Io(io_timeout()), url)
|
|
||||||
}
|
|
||||||
|
|
||||||
pub(crate) fn status_code(url: Url, status: StatusCode) -> Error {
|
|
||||||
Error::new(Kind::Status(status), Some(url))
|
|
||||||
}
|
|
||||||
|
|
||||||
pub(crate) fn url_bad_scheme(url: Url) -> Error {
|
|
||||||
Error::new(Kind::UrlBadScheme, Some(url))
|
|
||||||
}
|
|
||||||
|
|
||||||
#[cfg(feature = "trust-dns")]
|
|
||||||
pub(crate) fn dns_system_conf(io: io::Error) -> Error {
|
|
||||||
Error::new(Kind::DnsSystemConf(io), None)
|
|
||||||
}
|
|
||||||
|
|
||||||
pub(crate) fn unknown_proxy_scheme() -> Error {
|
|
||||||
Error::new(Kind::UnknownProxyScheme, None)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
mod tests {
|
mod tests {
|
||||||
@@ -577,51 +266,13 @@ mod tests {
|
|||||||
fn assert_send<T: Send>() {}
|
fn assert_send<T: Send>() {}
|
||||||
fn assert_sync<T: Sync>() {}
|
fn assert_sync<T: Sync>() {}
|
||||||
|
|
||||||
#[allow(deprecated)]
|
|
||||||
#[test]
|
#[test]
|
||||||
fn test_cause_chain() {
|
fn test_source_chain() {
|
||||||
#[derive(Debug)]
|
let root = Error::new(Kind::Request, None::<Error>);
|
||||||
struct Chain<T>(Option<T>);
|
assert!(root.source().is_none());
|
||||||
|
|
||||||
impl<T: fmt::Display> fmt::Display for Chain<T> {
|
let link = super::response(root);
|
||||||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
assert!(link.source().is_some());
|
||||||
if let Some(ref link) = self.0 {
|
|
||||||
write!(f, "chain: {}", link)
|
|
||||||
} else {
|
|
||||||
f.write_str("root")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl<T: StdError> StdError for Chain<T> {
|
|
||||||
fn description(&self) -> &str {
|
|
||||||
if self.0.is_some() {
|
|
||||||
"chain"
|
|
||||||
} else {
|
|
||||||
"root"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
fn cause(&self) -> Option<&dyn StdError> {
|
|
||||||
if let Some(ref e) = self.0 {
|
|
||||||
Some(e)
|
|
||||||
} else {
|
|
||||||
None
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
let root = Chain(None::<Error>);
|
|
||||||
let io = std::io::Error::new(std::io::ErrorKind::Other, root);
|
|
||||||
let err = Error::new(Kind::Io(io), None);
|
|
||||||
assert!(err.cause().is_none());
|
|
||||||
assert_eq!(err.to_string(), "root");
|
|
||||||
|
|
||||||
let root = std::io::Error::new(std::io::ErrorKind::Other, Chain(None::<Error>));
|
|
||||||
let link = Chain(Some(root));
|
|
||||||
let io = std::io::Error::new(std::io::ErrorKind::Other, link);
|
|
||||||
let err = Error::new(Kind::Io(io), None);
|
|
||||||
assert!(err.cause().is_some());
|
|
||||||
assert_eq!(err.to_string(), "chain: root");
|
|
||||||
assert_send::<Error>();
|
assert_send::<Error>();
|
||||||
assert_sync::<Error>();
|
assert_sync::<Error>();
|
||||||
}
|
}
|
||||||
@@ -634,14 +285,24 @@ mod tests {
|
|||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn roundtrip_io_error() {
|
fn roundtrip_io_error() {
|
||||||
let orig = unknown_proxy_scheme();
|
let orig = super::request("orig");
|
||||||
// Convert reqwest::Error into an io::Error...
|
// Convert reqwest::Error into an io::Error...
|
||||||
let io = into_io(orig);
|
let io = super::into_io(orig);
|
||||||
// Convert that io::Error back into a reqwest::Error...
|
// Convert that io::Error back into a reqwest::Error...
|
||||||
let err = from_io(io);
|
let err = super::decode_io(io);
|
||||||
// It should have pulled out the original, not nested it...
|
// It should have pulled out the original, not nested it...
|
||||||
match err.inner.kind {
|
match err.inner.kind {
|
||||||
Kind::UnknownProxyScheme => (),
|
Kind::Request => (),
|
||||||
|
_ => panic!("{:?}", err),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn from_unknown_io_error() {
|
||||||
|
let orig = io::Error::new(io::ErrorKind::Other, "orly");
|
||||||
|
let err = super::decode_io(orig);
|
||||||
|
match err.inner.kind {
|
||||||
|
Kind::Decode => (),
|
||||||
_ => panic!("{:?}", err),
|
_ => panic!("{:?}", err),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -27,7 +27,7 @@ impl PolyfillTryInto for Url {
|
|||||||
|
|
||||||
impl<'a> PolyfillTryInto for &'a str {
|
impl<'a> PolyfillTryInto for &'a str {
|
||||||
fn into_url(self) -> crate::Result<Url> {
|
fn into_url(self) -> crate::Result<Url> {
|
||||||
Url::parse(self).map_err(crate::error::from)?.into_url()
|
Url::parse(self).map_err(crate::error::builder)?.into_url()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -56,7 +56,7 @@ mod tests {
|
|||||||
let err = "file:///etc/hosts".into_url().unwrap_err();
|
let err = "file:///etc/hosts".into_url().unwrap_err();
|
||||||
assert_eq!(
|
assert_eq!(
|
||||||
err.to_string(),
|
err.to_string(),
|
||||||
"file:///etc/hosts: URL scheme is not allowed"
|
"builder error for url (file:///etc/hosts): URL scheme is not allowed"
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -350,7 +350,7 @@ impl ProxyScheme {
|
|||||||
"socks5" => Self::socks5(to_addr()?)?,
|
"socks5" => Self::socks5(to_addr()?)?,
|
||||||
#[cfg(feature = "socks")]
|
#[cfg(feature = "socks")]
|
||||||
"socks5h" => Self::socks5h(to_addr()?)?,
|
"socks5h" => Self::socks5h(to_addr()?)?,
|
||||||
_ => return Err(crate::error::unknown_proxy_scheme()),
|
_ => return Err(crate::error::builder("unknown proxy scheme")),
|
||||||
};
|
};
|
||||||
|
|
||||||
if let Some(pwd) = url.password() {
|
if let Some(pwd) = url.password() {
|
||||||
|
|||||||
22
src/tls.rs
22
src/tls.rs
@@ -55,7 +55,7 @@ impl Certificate {
|
|||||||
pub fn from_der(der: &[u8]) -> crate::Result<Certificate> {
|
pub fn from_der(der: &[u8]) -> crate::Result<Certificate> {
|
||||||
Ok(Certificate {
|
Ok(Certificate {
|
||||||
#[cfg(feature = "default-tls")]
|
#[cfg(feature = "default-tls")]
|
||||||
native: native_tls::Certificate::from_der(der).map_err(crate::error::from)?,
|
native: native_tls::Certificate::from_der(der).map_err(crate::error::builder)?,
|
||||||
#[cfg(feature = "rustls-tls")]
|
#[cfg(feature = "rustls-tls")]
|
||||||
original: Cert::Der(der.to_owned()),
|
original: Cert::Der(der.to_owned()),
|
||||||
})
|
})
|
||||||
@@ -80,7 +80,7 @@ impl Certificate {
|
|||||||
pub fn from_pem(pem: &[u8]) -> crate::Result<Certificate> {
|
pub fn from_pem(pem: &[u8]) -> crate::Result<Certificate> {
|
||||||
Ok(Certificate {
|
Ok(Certificate {
|
||||||
#[cfg(feature = "default-tls")]
|
#[cfg(feature = "default-tls")]
|
||||||
native: native_tls::Certificate::from_pem(pem).map_err(crate::error::from)?,
|
native: native_tls::Certificate::from_pem(pem).map_err(crate::error::builder)?,
|
||||||
#[cfg(feature = "rustls-tls")]
|
#[cfg(feature = "rustls-tls")]
|
||||||
original: Cert::Pem(pem.to_owned()),
|
original: Cert::Pem(pem.to_owned()),
|
||||||
})
|
})
|
||||||
@@ -100,18 +100,18 @@ impl Certificate {
|
|||||||
Cert::Der(buf) => tls
|
Cert::Der(buf) => tls
|
||||||
.root_store
|
.root_store
|
||||||
.add(&::rustls::Certificate(buf))
|
.add(&::rustls::Certificate(buf))
|
||||||
.map_err(|e| crate::error::from(TLSError::WebPKIError(e)))?,
|
.map_err(|e| crate::error::builder(TLSError::WebPKIError(e)))?,
|
||||||
Cert::Pem(buf) => {
|
Cert::Pem(buf) => {
|
||||||
let mut pem = Cursor::new(buf);
|
let mut pem = Cursor::new(buf);
|
||||||
let certs = pemfile::certs(&mut pem).map_err(|_| {
|
let certs = pemfile::certs(&mut pem).map_err(|_| {
|
||||||
crate::error::from(TLSError::General(String::from(
|
crate::error::builder(TLSError::General(String::from(
|
||||||
"No valid certificate was found",
|
"No valid certificate was found",
|
||||||
)))
|
)))
|
||||||
})?;
|
})?;
|
||||||
for c in certs {
|
for c in certs {
|
||||||
tls.root_store
|
tls.root_store
|
||||||
.add(&c)
|
.add(&c)
|
||||||
.map_err(|e| crate::error::from(TLSError::WebPKIError(e)))?;
|
.map_err(|e| crate::error::builder(TLSError::WebPKIError(e)))?;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -151,7 +151,7 @@ impl Identity {
|
|||||||
pub fn from_pkcs12_der(der: &[u8], password: &str) -> crate::Result<Identity> {
|
pub fn from_pkcs12_der(der: &[u8], password: &str) -> crate::Result<Identity> {
|
||||||
Ok(Identity {
|
Ok(Identity {
|
||||||
inner: ClientCert::Pkcs12(
|
inner: ClientCert::Pkcs12(
|
||||||
native_tls::Identity::from_pkcs12(der, password).map_err(crate::error::from)?,
|
native_tls::Identity::from_pkcs12(der, password).map_err(crate::error::builder)?,
|
||||||
),
|
),
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
@@ -184,7 +184,7 @@ impl Identity {
|
|||||||
let mut pem = Cursor::new(buf);
|
let mut pem = Cursor::new(buf);
|
||||||
let certs = pemfile::certs(&mut pem)
|
let certs = pemfile::certs(&mut pem)
|
||||||
.map_err(|_| TLSError::General(String::from("No valid certificate was found")))
|
.map_err(|_| TLSError::General(String::from("No valid certificate was found")))
|
||||||
.map_err(crate::error::from)?;
|
.map_err(crate::error::builder)?;
|
||||||
pem.set_position(0);
|
pem.set_position(0);
|
||||||
let mut sk = pemfile::pkcs8_private_keys(&mut pem)
|
let mut sk = pemfile::pkcs8_private_keys(&mut pem)
|
||||||
.and_then(|pkcs8_keys| {
|
.and_then(|pkcs8_keys| {
|
||||||
@@ -199,11 +199,11 @@ impl Identity {
|
|||||||
pemfile::rsa_private_keys(&mut pem)
|
pemfile::rsa_private_keys(&mut pem)
|
||||||
})
|
})
|
||||||
.map_err(|_| TLSError::General(String::from("No valid private key was found")))
|
.map_err(|_| TLSError::General(String::from("No valid private key was found")))
|
||||||
.map_err(crate::error::from)?;
|
.map_err(crate::error::builder)?;
|
||||||
if let (Some(sk), false) = (sk.pop(), certs.is_empty()) {
|
if let (Some(sk), false) = (sk.pop(), certs.is_empty()) {
|
||||||
(sk, certs)
|
(sk, certs)
|
||||||
} else {
|
} else {
|
||||||
return Err(crate::error::from(TLSError::General(String::from(
|
return Err(crate::error::builder(TLSError::General(String::from(
|
||||||
"private key or certificate not found",
|
"private key or certificate not found",
|
||||||
))));
|
))));
|
||||||
}
|
}
|
||||||
@@ -225,7 +225,7 @@ impl Identity {
|
|||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
#[cfg(feature = "rustls-tls")]
|
#[cfg(feature = "rustls-tls")]
|
||||||
ClientCert::Pem { .. } => Err(crate::error::from(crate::error::Kind::TlsIncompatible)),
|
ClientCert::Pem { .. } => Err(crate::error::builder("incompatible TLS identity type")),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -237,7 +237,7 @@ impl Identity {
|
|||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
#[cfg(feature = "default-tls")]
|
#[cfg(feature = "default-tls")]
|
||||||
ClientCert::Pkcs12(..) => Err(crate::error::from(crate::error::Kind::TlsIncompatible)),
|
ClientCert::Pkcs12(..) => Err(crate::error::builder("incompatible TLS identity type")),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -270,8 +270,8 @@ fn test_error_for_status_4xx() {
|
|||||||
let url = format!("http://{}/1", server.addr());
|
let url = format!("http://{}/1", server.addr());
|
||||||
let res = reqwest::blocking::get(&url).unwrap();
|
let res = reqwest::blocking::get(&url).unwrap();
|
||||||
|
|
||||||
let err = res.error_for_status().err().unwrap();
|
let err = res.error_for_status().unwrap_err();
|
||||||
assert!(err.is_client_error());
|
assert!(err.is_status());
|
||||||
assert_eq!(err.status(), Some(reqwest::StatusCode::BAD_REQUEST));
|
assert_eq!(err.status(), Some(reqwest::StatusCode::BAD_REQUEST));
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -299,8 +299,8 @@ fn test_error_for_status_5xx() {
|
|||||||
let url = format!("http://{}/1", server.addr());
|
let url = format!("http://{}/1", server.addr());
|
||||||
let res = reqwest::blocking::get(&url).unwrap();
|
let res = reqwest::blocking::get(&url).unwrap();
|
||||||
|
|
||||||
let err = res.error_for_status().err().unwrap();
|
let err = res.error_for_status().unwrap_err();
|
||||||
assert!(err.is_server_error());
|
assert!(err.is_status());
|
||||||
assert_eq!(
|
assert_eq!(
|
||||||
err.status(),
|
err.status(),
|
||||||
Some(reqwest::StatusCode::INTERNAL_SERVER_ERROR)
|
Some(reqwest::StatusCode::INTERNAL_SERVER_ERROR)
|
||||||
|
|||||||
@@ -38,7 +38,7 @@ fn timeout_closes_connection() {
|
|||||||
let url = format!("http://{}/closes", server.addr());
|
let url = format!("http://{}/closes", server.addr());
|
||||||
let err = client.get(&url).send().unwrap_err();
|
let err = client.get(&url).send().unwrap_err();
|
||||||
|
|
||||||
assert_eq!(err.get_ref().unwrap().to_string(), "timed out");
|
assert!(err.is_timeout());
|
||||||
assert_eq!(err.url().map(|u| u.as_str()), Some(url.as_str()));
|
assert_eq!(err.url().map(|u| u.as_str()), Some(url.as_str()));
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -84,7 +84,7 @@ fn write_timeout_large_body() {
|
|||||||
.send()
|
.send()
|
||||||
.unwrap_err();
|
.unwrap_err();
|
||||||
|
|
||||||
assert_eq!(err.get_ref().unwrap().to_string(), "timed out");
|
assert!(err.is_timeout());
|
||||||
assert_eq!(err.url().map(|u| u.as_str()), Some(url.as_str()));
|
assert_eq!(err.url().map(|u| u.as_str()), Some(url.as_str()));
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -116,7 +116,7 @@ fn test_response_timeout() {
|
|||||||
.send()
|
.send()
|
||||||
.unwrap_err();
|
.unwrap_err();
|
||||||
|
|
||||||
assert_eq!(err.get_ref().unwrap().to_string(), "timed out");
|
assert!(err.is_timeout());
|
||||||
assert_eq!(err.url().map(|u| u.as_str()), Some(url.as_str()));
|
assert_eq!(err.url().map(|u| u.as_str()), Some(url.as_str()));
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -158,5 +158,5 @@ fn test_read_timeout() {
|
|||||||
);
|
);
|
||||||
|
|
||||||
let err = res.text().unwrap_err();
|
let err = res.text().unwrap_err();
|
||||||
assert_eq!(err.to_string(), "timed out");
|
assert!(err.is_timeout());
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user