cargo fix --edition
This commit is contained in:
committed by
Sean McArthur
parent
c3b2a26c46
commit
86d9cbc66e
@@ -7,7 +7,7 @@ extern crate tokio;
|
||||
use std::mem;
|
||||
use std::io::{self, Cursor};
|
||||
use futures::{Future, Stream};
|
||||
use reqwest::async::{Client, Decoder};
|
||||
use reqwest::r#async::{Client, Decoder};
|
||||
|
||||
|
||||
fn fetch() -> impl Future<Item=(), Error=()> {
|
||||
|
||||
@@ -7,7 +7,7 @@ extern crate serde;
|
||||
extern crate serde_json;
|
||||
|
||||
use futures::Future;
|
||||
use reqwest::async::{Client, Response};
|
||||
use reqwest::r#async::{Client, Response};
|
||||
use serde::Deserialize;
|
||||
|
||||
#[derive(Deserialize, Debug)]
|
||||
|
||||
@@ -13,7 +13,7 @@ use std::path::Path;
|
||||
|
||||
use bytes::Bytes;
|
||||
use futures::{Async, Future, Poll, Stream};
|
||||
use reqwest::async::{Client, Decoder};
|
||||
use reqwest::r#async::{Client, Decoder};
|
||||
use tokio::fs::File;
|
||||
use tokio::io::AsyncRead;
|
||||
|
||||
|
||||
@@ -72,7 +72,7 @@ impl Body {
|
||||
|
||||
impl Stream for Body {
|
||||
type Item = Chunk;
|
||||
type Error = ::Error;
|
||||
type Error = crate::Error;
|
||||
|
||||
#[inline]
|
||||
fn poll(&mut self) -> Poll<Option<Self::Item>, Self::Error> {
|
||||
@@ -80,10 +80,10 @@ impl Stream for Body {
|
||||
Inner::Hyper { ref mut body, ref mut timeout } => {
|
||||
if let Some(ref mut timeout) = timeout {
|
||||
if let Async::Ready(()) = try_!(timeout.poll()) {
|
||||
return Err(::error::timedout(None));
|
||||
return Err(crate::error::timedout(None));
|
||||
}
|
||||
}
|
||||
try_ready!(body.poll_data().map_err(::error::from))
|
||||
try_ready!(body.poll_data().map_err(crate::error::from))
|
||||
},
|
||||
Inner::Reusable(ref mut bytes) => {
|
||||
return if bytes.is_empty() {
|
||||
|
||||
@@ -5,7 +5,7 @@ use std::net::IpAddr;
|
||||
|
||||
use bytes::Bytes;
|
||||
use futures::{Async, Future, Poll};
|
||||
use header::{
|
||||
use crate::header::{
|
||||
Entry,
|
||||
HeaderMap,
|
||||
HeaderValue,
|
||||
@@ -31,16 +31,16 @@ use tokio::{clock, timer::Delay};
|
||||
|
||||
use super::request::{Request, RequestBuilder};
|
||||
use super::response::Response;
|
||||
use connect::Connector;
|
||||
use into_url::{expect_uri, try_uri};
|
||||
use cookie;
|
||||
use redirect::{self, RedirectPolicy, remove_sensitive_headers};
|
||||
use {IntoUrl, Method, Proxy, StatusCode, Url};
|
||||
use ::proxy::get_proxies;
|
||||
use crate::connect::Connector;
|
||||
use crate::into_url::{expect_uri, try_uri};
|
||||
use crate::cookie;
|
||||
use crate::redirect::{self, RedirectPolicy, remove_sensitive_headers};
|
||||
use crate::{IntoUrl, Method, Proxy, StatusCode, Url};
|
||||
use crate::proxy::get_proxies;
|
||||
#[cfg(feature = "tls")]
|
||||
use {Certificate, Identity};
|
||||
use crate::{Certificate, Identity};
|
||||
#[cfg(feature = "tls")]
|
||||
use ::tls::TlsBackend;
|
||||
use crate::tls::TlsBackend;
|
||||
|
||||
static DEFAULT_USER_AGENT: &'static str =
|
||||
concat!(env!("CARGO_PKG_NAME"), "/", env!("CARGO_PKG_VERSION"));
|
||||
@@ -133,7 +133,7 @@ impl ClientBuilder {
|
||||
///
|
||||
/// This method fails if TLS backend cannot be initialized, or the resolver
|
||||
/// cannot load the system configuration.
|
||||
pub fn build(self) -> ::Result<Client> {
|
||||
pub fn build(self) -> crate::Result<Client> {
|
||||
let config = self.config;
|
||||
let proxies = Arc::new(config.proxies);
|
||||
|
||||
@@ -545,7 +545,7 @@ impl Client {
|
||||
///
|
||||
/// This method fails if there was an error while sending request,
|
||||
/// redirect loop was detected or redirect limit was exhausted.
|
||||
pub fn execute(&self, request: Request) -> impl Future<Item = Response, Error = ::Error> {
|
||||
pub fn execute(&self, request: Request) -> impl Future<Item = Response, Error = crate::Error> {
|
||||
self.execute_request(request)
|
||||
}
|
||||
|
||||
@@ -568,7 +568,7 @@ impl Client {
|
||||
|
||||
// Add cookies from the cookie store.
|
||||
if let Some(cookie_store_wrapper) = self.inner.cookie_store.as_ref() {
|
||||
if headers.get(::header::COOKIE).is_none() {
|
||||
if headers.get(crate::header::COOKIE).is_none() {
|
||||
let cookie_store = cookie_store_wrapper.read().unwrap();
|
||||
add_cookie_header(&mut headers, &cookie_store, &url);
|
||||
}
|
||||
@@ -695,7 +695,7 @@ pub(super) struct Pending {
|
||||
|
||||
enum PendingInner {
|
||||
Request(PendingRequest),
|
||||
Error(Option<::Error>),
|
||||
Error(Option<crate::Error>),
|
||||
}
|
||||
|
||||
struct PendingRequest {
|
||||
@@ -713,7 +713,7 @@ struct PendingRequest {
|
||||
}
|
||||
|
||||
impl Pending {
|
||||
pub(super) fn new_err(err: ::Error) -> Pending {
|
||||
pub(super) fn new_err(err: crate::Error) -> Pending {
|
||||
Pending {
|
||||
inner: PendingInner::Error(Some(err)),
|
||||
}
|
||||
@@ -722,7 +722,7 @@ impl Pending {
|
||||
|
||||
impl Future for Pending {
|
||||
type Item = Response;
|
||||
type Error = ::Error;
|
||||
type Error = crate::Error;
|
||||
|
||||
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
|
||||
match self.inner {
|
||||
@@ -734,12 +734,12 @@ impl Future for Pending {
|
||||
|
||||
impl Future for PendingRequest {
|
||||
type Item = Response;
|
||||
type Error = ::Error;
|
||||
type Error = crate::Error;
|
||||
|
||||
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
|
||||
if let Some(ref mut delay) = self.timeout {
|
||||
if let Async::Ready(()) = try_!(delay.poll(), &self.url) {
|
||||
return Err(::error::timedout(Some(self.url.clone())));
|
||||
return Err(crate::error::timedout(Some(self.url.clone())));
|
||||
}
|
||||
}
|
||||
|
||||
@@ -850,10 +850,10 @@ impl Future for PendingRequest {
|
||||
debug!("redirect_policy disallowed redirection to '{}'", loc);
|
||||
},
|
||||
redirect::Action::LoopDetected => {
|
||||
return Err(::error::loop_detected(self.url.clone()));
|
||||
return Err(crate::error::loop_detected(self.url.clone()));
|
||||
},
|
||||
redirect::Action::TooManyRedirects => {
|
||||
return Err(::error::too_many_redirects(self.url.clone()));
|
||||
return Err(crate::error::too_many_redirects(self.url.clone()));
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -903,7 +903,7 @@ fn add_cookie_header(headers: &mut HeaderMap, cookie_store: &cookie::CookieStore
|
||||
.join("; ");
|
||||
if !header.is_empty() {
|
||||
headers.insert(
|
||||
::header::COOKIE,
|
||||
crate::header::COOKIE,
|
||||
HeaderValue::from_bytes(header.as_bytes()).unwrap()
|
||||
);
|
||||
}
|
||||
|
||||
@@ -32,7 +32,7 @@ use hyper::{HeaderMap};
|
||||
use hyper::header::{CONTENT_ENCODING, CONTENT_LENGTH, TRANSFER_ENCODING};
|
||||
|
||||
use super::{Body, Chunk};
|
||||
use error;
|
||||
use crate::error;
|
||||
|
||||
const INIT_BUFFER_SIZE: usize = 8192;
|
||||
|
||||
|
||||
@@ -199,7 +199,7 @@ impl Part {
|
||||
}
|
||||
|
||||
/// Tries to set the mime of this part.
|
||||
pub fn mime_str(self, mime: &str) -> ::Result<Part> {
|
||||
pub fn mime_str(self, mime: &str) -> crate::Result<Part> {
|
||||
Ok(self.mime(try_!(mime.parse())))
|
||||
}
|
||||
|
||||
|
||||
@@ -10,9 +10,9 @@ use super::body::{Body};
|
||||
use super::client::{Client, Pending};
|
||||
use super::multipart;
|
||||
use super::response::Response;
|
||||
use header::{CONTENT_LENGTH, CONTENT_TYPE, HeaderMap, HeaderName, HeaderValue};
|
||||
use crate::header::{CONTENT_LENGTH, CONTENT_TYPE, HeaderMap, HeaderName, HeaderValue};
|
||||
use http::HttpTryFrom;
|
||||
use {Method, Url};
|
||||
use crate::{Method, Url};
|
||||
|
||||
/// A request which can be executed with `Client::execute()`.
|
||||
pub struct Request {
|
||||
@@ -25,7 +25,7 @@ pub struct Request {
|
||||
/// A builder to construct the properties of a `Request`.
|
||||
pub struct RequestBuilder {
|
||||
client: Client,
|
||||
request: ::Result<Request>,
|
||||
request: crate::Result<Request>,
|
||||
}
|
||||
|
||||
impl Request {
|
||||
@@ -94,7 +94,7 @@ impl Request {
|
||||
}
|
||||
|
||||
impl RequestBuilder {
|
||||
pub(super) fn new(client: Client, request: ::Result<Request>) -> RequestBuilder {
|
||||
pub(super) fn new(client: Client, request: crate::Result<Request>) -> RequestBuilder {
|
||||
RequestBuilder {
|
||||
client,
|
||||
request,
|
||||
@@ -113,10 +113,10 @@ impl RequestBuilder {
|
||||
Ok(key) => {
|
||||
match <HeaderValue as HttpTryFrom<V>>::try_from(value) {
|
||||
Ok(value) => { req.headers_mut().append(key, value); }
|
||||
Err(e) => error = Some(::error::from(e.into())),
|
||||
Err(e) => error = Some(crate::error::from(e.into())),
|
||||
}
|
||||
},
|
||||
Err(e) => error = Some(::error::from(e.into())),
|
||||
Err(e) => error = Some(crate::error::from(e.into())),
|
||||
};
|
||||
}
|
||||
if let Some(err) = error {
|
||||
@@ -128,7 +128,7 @@ impl RequestBuilder {
|
||||
/// Add a set of Headers to the existing ones on this Request.
|
||||
///
|
||||
/// The headers will be merged in to any already set.
|
||||
pub fn headers(mut self, headers: ::header::HeaderMap) -> RequestBuilder {
|
||||
pub fn headers(mut self, headers: crate::header::HeaderMap) -> RequestBuilder {
|
||||
if let Ok(ref mut req) = self.request {
|
||||
replace_headers(req.headers_mut(), headers);
|
||||
}
|
||||
@@ -171,7 +171,7 @@ impl RequestBuilder {
|
||||
None => format!("{}:", username)
|
||||
};
|
||||
let header_value = format!("Basic {}", encode(&auth));
|
||||
self.header(::header::AUTHORIZATION, &*header_value)
|
||||
self.header(crate::header::AUTHORIZATION, &*header_value)
|
||||
}
|
||||
|
||||
/// Enable HTTP bearer authentication.
|
||||
@@ -180,7 +180,7 @@ impl RequestBuilder {
|
||||
T: fmt::Display,
|
||||
{
|
||||
let header_value = format!("Bearer {}", token);
|
||||
self.header(::header::AUTHORIZATION, &*header_value)
|
||||
self.header(crate::header::AUTHORIZATION, &*header_value)
|
||||
}
|
||||
|
||||
/// Set the request body.
|
||||
@@ -264,7 +264,7 @@ impl RequestBuilder {
|
||||
let serializer = serde_urlencoded::Serializer::new(&mut pairs);
|
||||
|
||||
if let Err(err) = query.serialize(serializer) {
|
||||
error = Some(::error::from(err));
|
||||
error = Some(crate::error::from(err));
|
||||
}
|
||||
}
|
||||
if let Ok(ref mut req) = self.request {
|
||||
@@ -290,7 +290,7 @@ impl RequestBuilder {
|
||||
);
|
||||
*req.body_mut() = Some(body.into());
|
||||
},
|
||||
Err(err) => error = Some(::error::from(err)),
|
||||
Err(err) => error = Some(crate::error::from(err)),
|
||||
}
|
||||
}
|
||||
if let Some(err) = error {
|
||||
@@ -316,7 +316,7 @@ impl RequestBuilder {
|
||||
);
|
||||
*req.body_mut() = Some(body.into());
|
||||
},
|
||||
Err(err) => error = Some(::error::from(err)),
|
||||
Err(err) => error = Some(crate::error::from(err)),
|
||||
}
|
||||
}
|
||||
if let Some(err) = error {
|
||||
@@ -327,7 +327,7 @@ impl RequestBuilder {
|
||||
|
||||
/// Build a `Request`, which can be inspected, modified and executed with
|
||||
/// `Client::execute()`.
|
||||
pub fn build(self) -> ::Result<Request> {
|
||||
pub fn build(self) -> crate::Result<Request> {
|
||||
self.request
|
||||
}
|
||||
|
||||
@@ -358,7 +358,7 @@ impl RequestBuilder {
|
||||
/// rt.block_on(response)
|
||||
/// # }
|
||||
/// ```
|
||||
pub fn send(self) -> impl Future<Item = Response, Error = ::Error> {
|
||||
pub fn send(self) -> impl Future<Item = Response, Error = crate::Error> {
|
||||
match self.request {
|
||||
Ok(req) => self.client.execute_request(req),
|
||||
Err(err) => Pending::new_err(err),
|
||||
|
||||
@@ -18,7 +18,7 @@ use serde_json;
|
||||
use url::Url;
|
||||
|
||||
|
||||
use cookie;
|
||||
use crate::cookie;
|
||||
use super::Decoder;
|
||||
use super::body::Body;
|
||||
|
||||
@@ -139,14 +139,14 @@ impl Response {
|
||||
}
|
||||
|
||||
/// Get the response text
|
||||
pub fn text(&mut self) -> impl Future<Item = String, Error = ::Error> {
|
||||
pub fn text(&mut self) -> impl Future<Item = String, Error = crate::Error> {
|
||||
self.text_with_charset("utf-8")
|
||||
}
|
||||
|
||||
/// Get the response text given a specific encoding
|
||||
pub fn text_with_charset(&mut self, default_encoding: &str) -> impl Future<Item = String, Error = ::Error> {
|
||||
pub fn text_with_charset(&mut self, default_encoding: &str) -> impl Future<Item = String, Error = crate::Error> {
|
||||
let body = mem::replace(&mut self.body, Decoder::empty());
|
||||
let content_type = self.headers.get(::header::CONTENT_TYPE)
|
||||
let content_type = self.headers.get(crate::header::CONTENT_TYPE)
|
||||
.and_then(|value| {
|
||||
value.to_str().ok()
|
||||
})
|
||||
@@ -170,7 +170,7 @@ impl Response {
|
||||
|
||||
/// Try to deserialize the response body as JSON using `serde`.
|
||||
#[inline]
|
||||
pub fn json<T: DeserializeOwned>(&mut self) -> impl Future<Item = T, Error = ::Error> {
|
||||
pub fn json<T: DeserializeOwned>(&mut self) -> impl Future<Item = T, Error = crate::Error> {
|
||||
let body = mem::replace(&mut self.body, Decoder::empty());
|
||||
|
||||
Json {
|
||||
@@ -201,9 +201,9 @@ impl Response {
|
||||
/// # fn main() {}
|
||||
/// ```
|
||||
#[inline]
|
||||
pub fn error_for_status(self) -> ::Result<Self> {
|
||||
pub fn error_for_status(self) -> crate::Result<Self> {
|
||||
if self.status.is_client_error() || self.status.is_server_error() {
|
||||
Err(::error::status_code(*self.url, self.status))
|
||||
Err(crate::error::status_code(*self.url, self.status))
|
||||
} else {
|
||||
Ok(self)
|
||||
}
|
||||
@@ -231,9 +231,9 @@ impl Response {
|
||||
/// # fn main() {}
|
||||
/// ```
|
||||
#[inline]
|
||||
pub fn error_for_status_ref(&self) -> ::Result<&Self> {
|
||||
pub fn error_for_status_ref(&self) -> crate::Result<&Self> {
|
||||
if self.status.is_client_error() || self.status.is_server_error() {
|
||||
Err(::error::status_code(*self.url.clone(), self.status))
|
||||
Err(crate::error::status_code(*self.url.clone(), self.status))
|
||||
} else {
|
||||
Ok(self)
|
||||
}
|
||||
@@ -278,7 +278,7 @@ struct Json<T> {
|
||||
|
||||
impl<T: DeserializeOwned> Future for Json<T> {
|
||||
type Item = T;
|
||||
type Error = ::Error;
|
||||
type Error = crate::Error;
|
||||
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
|
||||
let bytes = try_ready!(self.concat.poll());
|
||||
let t = try_!(serde_json::from_slice(&bytes));
|
||||
@@ -301,7 +301,7 @@ struct Text {
|
||||
|
||||
impl Future for Text {
|
||||
type Item = String;
|
||||
type Error = ::Error;
|
||||
type Error = crate::Error;
|
||||
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
|
||||
let bytes = try_ready!(self.concat.poll());
|
||||
// a block because of borrow checker
|
||||
|
||||
10
src/body.rs
10
src/body.rs
@@ -6,7 +6,7 @@ use bytes::Bytes;
|
||||
use futures::Future;
|
||||
use hyper::{self};
|
||||
|
||||
use {async_impl};
|
||||
use crate::{async_impl};
|
||||
|
||||
/// The body of a `Request`.
|
||||
///
|
||||
@@ -218,7 +218,7 @@ pub(crate) struct Sender {
|
||||
impl Sender {
|
||||
// A `Future` that may do blocking read calls.
|
||||
// As a `Future`, this integrates easily with `wait::timeout`.
|
||||
pub(crate) fn send(self) -> impl Future<Item=(), Error=::Error> {
|
||||
pub(crate) fn send(self) -> impl Future<Item=(), Error=crate::Error> {
|
||||
use std::cmp;
|
||||
use bytes::{BufMut, BytesMut};
|
||||
use futures::future;
|
||||
@@ -270,7 +270,7 @@ impl Sender {
|
||||
.take()
|
||||
.expect("tx only taken on error")
|
||||
.abort();
|
||||
return Err(::error::from(ret));
|
||||
return Err(crate::error::from(ret));
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -281,12 +281,12 @@ impl Sender {
|
||||
.as_mut()
|
||||
.expect("tx only taken on error")
|
||||
.poll_ready()
|
||||
.map_err(::error::from));
|
||||
.map_err(crate::error::from));
|
||||
|
||||
written += buf.len() as u64;
|
||||
let tx = tx.as_mut().expect("tx only taken on error");
|
||||
if let Err(_) = tx.send_data(buf.take().freeze().into()) {
|
||||
return Err(::error::timedout(None));
|
||||
return Err(crate::error::timedout(None));
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
@@ -8,11 +8,11 @@ use futures::{Async, Future, Stream};
|
||||
use futures::future::{self, Either};
|
||||
use futures::sync::{mpsc, oneshot};
|
||||
|
||||
use request::{Request, RequestBuilder};
|
||||
use response::Response;
|
||||
use {async_impl, header, Method, IntoUrl, Proxy, RedirectPolicy, wait};
|
||||
use crate::request::{Request, RequestBuilder};
|
||||
use crate::response::Response;
|
||||
use crate::{async_impl, header, Method, IntoUrl, Proxy, RedirectPolicy, wait};
|
||||
#[cfg(feature = "tls")]
|
||||
use {Certificate, Identity};
|
||||
use crate::{Certificate, Identity};
|
||||
|
||||
/// A `Client` to make Requests with.
|
||||
///
|
||||
@@ -78,7 +78,7 @@ impl ClientBuilder {
|
||||
///
|
||||
/// This method fails if TLS backend cannot be initialized, or the resolver
|
||||
/// cannot load the system configuration.
|
||||
pub fn build(self) -> ::Result<Client> {
|
||||
pub fn build(self) -> crate::Result<Client> {
|
||||
ClientHandle::new(self).map(|handle| Client {
|
||||
inner: handle,
|
||||
})
|
||||
@@ -502,7 +502,7 @@ impl Client {
|
||||
///
|
||||
/// This method fails if there was an error while sending request,
|
||||
/// redirect loop was detected or redirect limit was exhausted.
|
||||
pub fn execute(&self, request: Request) -> ::Result<Response> {
|
||||
pub fn execute(&self, request: Request) -> crate::Result<Response> {
|
||||
self.inner.execute_request(request)
|
||||
}
|
||||
}
|
||||
@@ -530,7 +530,7 @@ struct ClientHandle {
|
||||
inner: Arc<InnerClientHandle>
|
||||
}
|
||||
|
||||
type ThreadSender = mpsc::UnboundedSender<(async_impl::Request, oneshot::Sender<::Result<async_impl::Response>>)>;
|
||||
type ThreadSender = mpsc::UnboundedSender<(async_impl::Request, oneshot::Sender<crate::Result<async_impl::Response>>)>;
|
||||
|
||||
struct InnerClientHandle {
|
||||
tx: Option<ThreadSender>,
|
||||
@@ -545,11 +545,11 @@ impl Drop for InnerClientHandle {
|
||||
}
|
||||
|
||||
impl ClientHandle {
|
||||
fn new(builder: ClientBuilder) -> ::Result<ClientHandle> {
|
||||
fn new(builder: ClientBuilder) -> crate::Result<ClientHandle> {
|
||||
let timeout = builder.timeout;
|
||||
let builder = builder.inner;
|
||||
let (tx, rx) = mpsc::unbounded();
|
||||
let (spawn_tx, spawn_rx) = oneshot::channel::<::Result<()>>();
|
||||
let (spawn_tx, spawn_rx) = oneshot::channel::<crate::Result<()>>();
|
||||
let handle = try_!(thread::Builder::new().name("reqwest-internal-sync-runtime".into()).spawn(move || {
|
||||
use tokio::runtime::current_thread::Runtime;
|
||||
|
||||
@@ -573,7 +573,7 @@ impl ClientHandle {
|
||||
};
|
||||
|
||||
let work = rx.for_each(move |(req, tx)| {
|
||||
let mut tx_opt: Option<oneshot::Sender<::Result<async_impl::Response>>> = Some(tx);
|
||||
let mut tx_opt: Option<oneshot::Sender<crate::Result<async_impl::Response>>> = Some(tx);
|
||||
let mut res_fut = client.execute(req);
|
||||
|
||||
let task = future::poll_fn(move || {
|
||||
@@ -631,7 +631,7 @@ impl ClientHandle {
|
||||
})
|
||||
}
|
||||
|
||||
fn execute_request(&self, req: Request) -> ::Result<Response> {
|
||||
fn execute_request(&self, req: Request) -> crate::Result<Response> {
|
||||
let (tx, rx) = oneshot::channel();
|
||||
let (req, body) = req.into_async();
|
||||
let url = req.url().clone();
|
||||
@@ -654,9 +654,9 @@ impl ClientHandle {
|
||||
|
||||
let res = match wait::timeout(fut, self.timeout.0) {
|
||||
Ok(res) => res,
|
||||
Err(wait::Waited::TimedOut) => return Err(::error::timedout(Some(url))),
|
||||
Err(wait::Waited::TimedOut) => return Err(crate::error::timedout(Some(url))),
|
||||
Err(wait::Waited::Executor(err)) => {
|
||||
return Err(::error::from(err).with_url(url))
|
||||
return Err(crate::error::from(err).with_url(url))
|
||||
},
|
||||
Err(wait::Waited::Inner(err)) => {
|
||||
return Err(err.with_url(url));
|
||||
|
||||
@@ -19,7 +19,7 @@ use std::time::Duration;
|
||||
|
||||
#[cfg(feature = "trust-dns")]
|
||||
use dns::TrustDnsResolver;
|
||||
use proxy::{Proxy, ProxyScheme};
|
||||
use crate::proxy::{Proxy, ProxyScheme};
|
||||
|
||||
#[cfg(feature = "trust-dns")]
|
||||
type HttpConnector = ::hyper::client::HttpConnector<TrustDnsResolver>;
|
||||
@@ -70,7 +70,7 @@ impl Connector {
|
||||
tls: TlsConnectorBuilder,
|
||||
proxies: Arc<Vec<Proxy>>,
|
||||
local_addr: T,
|
||||
nodelay: bool) -> ::Result<Connector>
|
||||
nodelay: bool) -> crate::Result<Connector>
|
||||
where
|
||||
T: Into<Option<IpAddr>>,
|
||||
{
|
||||
@@ -204,7 +204,7 @@ fn http_connector() -> ::Result<HttpConnector> {
|
||||
}
|
||||
|
||||
#[cfg(not(feature = "trust-dns"))]
|
||||
fn http_connector() -> ::Result<HttpConnector> {
|
||||
fn http_connector() -> crate::Result<HttpConnector> {
|
||||
Ok(HttpConnector::new(4))
|
||||
}
|
||||
|
||||
@@ -697,7 +697,7 @@ mod tests {
|
||||
use tokio::runtime::current_thread::Runtime;
|
||||
use self::tokio_tcp::TcpStream;
|
||||
use super::tunnel;
|
||||
use proxy;
|
||||
use crate::proxy;
|
||||
|
||||
static TUNNEL_OK: &'static [u8] = b"\
|
||||
HTTP/1.1 200 OK\r\n\
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
//! The cookies module contains types for working with request and response cookies.
|
||||
|
||||
use cookie_crate;
|
||||
use header;
|
||||
use crate::cookie_crate;
|
||||
use crate::header;
|
||||
use std::borrow::Cow;
|
||||
use std::fmt;
|
||||
use std::time::SystemTime;
|
||||
@@ -55,7 +55,7 @@ impl Cookie<'static> {
|
||||
}
|
||||
|
||||
impl<'a> Cookie<'a> {
|
||||
fn parse(value: &'a ::header::HeaderValue) -> Result<Cookie<'a>, CookieParseError> {
|
||||
fn parse(value: &'a crate::header::HeaderValue) -> Result<Cookie<'a>, CookieParseError> {
|
||||
std::str::from_utf8(value.as_bytes())
|
||||
.map_err(cookie::ParseError::from)
|
||||
.and_then(cookie::Cookie::parse)
|
||||
|
||||
22
src/error.rs
22
src/error.rs
@@ -4,7 +4,7 @@ use std::io;
|
||||
|
||||
use tokio_executor::EnterError;
|
||||
|
||||
use {StatusCode, Url};
|
||||
use crate::{StatusCode, Url};
|
||||
|
||||
/// The Errors that may occur when processing a `Request`.
|
||||
///
|
||||
@@ -253,8 +253,8 @@ static BLOCK_IN_FUTURE: &'static str = "blocking Client used inside a Future con
|
||||
impl fmt::Display for Error {
|
||||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||||
if let Some(ref url) = self.inner.url {
|
||||
try!(fmt::Display::fmt(url, f));
|
||||
try!(f.write_str(": "));
|
||||
r#try!(fmt::Display::fmt(url, f));
|
||||
r#try!(f.write_str(": "));
|
||||
}
|
||||
match self.inner.kind {
|
||||
Kind::Http(ref e) => fmt::Display::fmt(e, f),
|
||||
@@ -477,13 +477,13 @@ impl From<::rustls::TLSError> for Kind {
|
||||
}
|
||||
}
|
||||
|
||||
impl<T> From<::wait::Waited<T>> for Kind
|
||||
impl<T> From<crate::wait::Waited<T>> for Kind
|
||||
where T: Into<Kind> {
|
||||
fn from(err: ::wait::Waited<T>) -> Kind {
|
||||
fn from(err: crate::wait::Waited<T>) -> Kind {
|
||||
match err {
|
||||
::wait::Waited::TimedOut => io_timeout().into(),
|
||||
::wait::Waited::Executor(e) => e.into(),
|
||||
::wait::Waited::Inner(e) => e.into(),
|
||||
crate::wait::Waited::TimedOut => io_timeout().into(),
|
||||
crate::wait::Waited::Executor(e) => e.into(),
|
||||
crate::wait::Waited::Inner(e) => e.into(),
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -558,7 +558,7 @@ macro_rules! try_ {
|
||||
match $e {
|
||||
Ok(v) => v,
|
||||
Err(err) => {
|
||||
return Err(::error::from(err));
|
||||
return Err(crate::error::from(err));
|
||||
}
|
||||
}
|
||||
);
|
||||
@@ -566,7 +566,7 @@ macro_rules! try_ {
|
||||
match $e {
|
||||
Ok(v) => v,
|
||||
Err(err) => {
|
||||
return Err(::Error::from(::error::InternalFrom(err, Some($url.clone()))));
|
||||
return Err(crate::Error::from(crate::error::InternalFrom(err, Some($url.clone()))));
|
||||
}
|
||||
}
|
||||
)
|
||||
@@ -580,7 +580,7 @@ macro_rules! try_io {
|
||||
return Ok(::futures::Async::NotReady);
|
||||
}
|
||||
Err(err) => {
|
||||
return Err(::error::from_io(err));
|
||||
return Err(crate::error::from_io(err));
|
||||
}
|
||||
}
|
||||
)
|
||||
|
||||
@@ -12,28 +12,28 @@ impl<T: PolyfillTryInto> IntoUrl for T {}
|
||||
pub trait PolyfillTryInto {
|
||||
// Besides parsing as a valid `Url`, the `Url` must be a valid
|
||||
// `http::Uri`, in that it makes sense to use in a network request.
|
||||
fn into_url(self) -> ::Result<Url>;
|
||||
fn into_url(self) -> crate::Result<Url>;
|
||||
}
|
||||
|
||||
impl PolyfillTryInto for Url {
|
||||
fn into_url(self) -> ::Result<Url> {
|
||||
fn into_url(self) -> crate::Result<Url> {
|
||||
if self.has_host() {
|
||||
Ok(self)
|
||||
} else {
|
||||
Err(::error::url_bad_scheme(self))
|
||||
Err(crate::error::url_bad_scheme(self))
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl<'a> PolyfillTryInto for &'a str {
|
||||
fn into_url(self) -> ::Result<Url> {
|
||||
fn into_url(self) -> crate::Result<Url> {
|
||||
try_!(Url::parse(self))
|
||||
.into_url()
|
||||
}
|
||||
}
|
||||
|
||||
impl<'a> PolyfillTryInto for &'a String {
|
||||
fn into_url(self) -> ::Result<Url> {
|
||||
fn into_url(self) -> crate::Result<Url> {
|
||||
(&**self).into_url()
|
||||
}
|
||||
}
|
||||
|
||||
@@ -267,8 +267,8 @@ mod wait;
|
||||
pub mod multipart;
|
||||
|
||||
/// An 'async' implementation of the reqwest `Client`.
|
||||
pub mod async {
|
||||
pub use ::async_impl::{
|
||||
pub mod r#async {
|
||||
pub use crate::async_impl::{
|
||||
Body,
|
||||
Chunk,
|
||||
Decoder,
|
||||
@@ -311,7 +311,7 @@ pub mod async {
|
||||
/// - there was an error while sending request
|
||||
/// - redirect loop was detected
|
||||
/// - redirect limit was exhausted
|
||||
pub fn get<T: IntoUrl>(url: T) -> ::Result<Response> {
|
||||
pub fn get<T: IntoUrl>(url: T) -> crate::Result<Response> {
|
||||
Client::builder()
|
||||
.build()?
|
||||
.get(url)
|
||||
|
||||
@@ -44,8 +44,8 @@ use std::path::Path;
|
||||
|
||||
use mime_guess::{self, Mime};
|
||||
|
||||
use async_impl::multipart::{FormParts, PartMetadata, PartProps};
|
||||
use {Body};
|
||||
use crate::async_impl::multipart::{FormParts, PartMetadata, PartProps};
|
||||
use crate::{Body};
|
||||
|
||||
/// A multipart/form-data request.
|
||||
pub struct Form {
|
||||
@@ -233,7 +233,7 @@ impl Part {
|
||||
}
|
||||
|
||||
/// Tries to set the mime of this part.
|
||||
pub fn mime_str(self, mime: &str) -> ::Result<Part> {
|
||||
pub fn mime_str(self, mime: &str) -> crate::Result<Part> {
|
||||
Ok(self.mime(try_!(mime.parse())))
|
||||
}
|
||||
|
||||
|
||||
24
src/proxy.rs
24
src/proxy.rs
@@ -6,7 +6,7 @@ use std::net::{SocketAddr, ToSocketAddrs};
|
||||
use http::{header::HeaderValue, Uri};
|
||||
use hyper::client::connect::Destination;
|
||||
use url::percent_encoding::percent_decode;
|
||||
use {IntoUrl, Url};
|
||||
use crate::{IntoUrl, Url};
|
||||
use std::collections::HashMap;
|
||||
use std::env;
|
||||
#[cfg(target_os = "windows")]
|
||||
@@ -66,17 +66,17 @@ pub enum ProxyScheme {
|
||||
/// parsing from a URL-like type, whilst also supporting proxy schemes
|
||||
/// built directly using the factory methods.
|
||||
pub trait IntoProxyScheme {
|
||||
fn into_proxy_scheme(self) -> ::Result<ProxyScheme>;
|
||||
fn into_proxy_scheme(self) -> crate::Result<ProxyScheme>;
|
||||
}
|
||||
|
||||
impl<T: IntoUrl> IntoProxyScheme for T {
|
||||
fn into_proxy_scheme(self) -> ::Result<ProxyScheme> {
|
||||
fn into_proxy_scheme(self) -> crate::Result<ProxyScheme> {
|
||||
ProxyScheme::parse(self.into_url()?)
|
||||
}
|
||||
}
|
||||
|
||||
impl IntoProxyScheme for ProxyScheme {
|
||||
fn into_proxy_scheme(self) -> ::Result<ProxyScheme> {
|
||||
fn into_proxy_scheme(self) -> crate::Result<ProxyScheme> {
|
||||
Ok(self)
|
||||
}
|
||||
}
|
||||
@@ -96,7 +96,7 @@ impl Proxy {
|
||||
/// # }
|
||||
/// # fn main() {}
|
||||
/// ```
|
||||
pub fn http<U: IntoProxyScheme>(proxy_scheme: U) -> ::Result<Proxy> {
|
||||
pub fn http<U: IntoProxyScheme>(proxy_scheme: U) -> crate::Result<Proxy> {
|
||||
Ok(Proxy::new(Intercept::Http(
|
||||
proxy_scheme.into_proxy_scheme()?
|
||||
)))
|
||||
@@ -116,7 +116,7 @@ impl Proxy {
|
||||
/// # }
|
||||
/// # fn main() {}
|
||||
/// ```
|
||||
pub fn https<U: IntoProxyScheme>(proxy_scheme: U) -> ::Result<Proxy> {
|
||||
pub fn https<U: IntoProxyScheme>(proxy_scheme: U) -> crate::Result<Proxy> {
|
||||
Ok(Proxy::new(Intercept::Https(
|
||||
proxy_scheme.into_proxy_scheme()?
|
||||
)))
|
||||
@@ -136,7 +136,7 @@ impl Proxy {
|
||||
/// # }
|
||||
/// # fn main() {}
|
||||
/// ```
|
||||
pub fn all<U: IntoProxyScheme>(proxy_scheme: U) -> ::Result<Proxy> {
|
||||
pub fn all<U: IntoProxyScheme>(proxy_scheme: U) -> crate::Result<Proxy> {
|
||||
Ok(Proxy::new(Intercept::All(
|
||||
proxy_scheme.into_proxy_scheme()?
|
||||
)))
|
||||
@@ -266,10 +266,10 @@ impl ProxyScheme {
|
||||
// To start conservative, keep builders private for now.
|
||||
|
||||
/// Proxy traffic via the specified URL over HTTP
|
||||
fn http<T: IntoUrl>(url: T) -> ::Result<Self> {
|
||||
fn http<T: IntoUrl>(url: T) -> crate::Result<Self> {
|
||||
Ok(ProxyScheme::Http {
|
||||
auth: None,
|
||||
uri: ::into_url::expect_uri(&url.into_url()?),
|
||||
uri: crate::into_url::expect_uri(&url.into_url()?),
|
||||
})
|
||||
}
|
||||
|
||||
@@ -326,7 +326,7 @@ impl ProxyScheme {
|
||||
///
|
||||
/// Supported schemes: HTTP, HTTPS, (SOCKS5, SOCKS5H if `socks` feature is enabled).
|
||||
// Private for now...
|
||||
fn parse(url: Url) -> ::Result<Self> {
|
||||
fn parse(url: Url) -> crate::Result<Self> {
|
||||
// Resolve URL to a host and port
|
||||
#[cfg(feature = "socks")]
|
||||
let to_addr = || {
|
||||
@@ -346,7 +346,7 @@ impl ProxyScheme {
|
||||
"socks5" => Self::socks5(to_addr()?)?,
|
||||
#[cfg(feature = "socks")]
|
||||
"socks5h" => Self::socks5h(to_addr()?)?,
|
||||
_ => return Err(::error::unknown_proxy_scheme())
|
||||
_ => return Err(crate::error::unknown_proxy_scheme())
|
||||
};
|
||||
|
||||
if let Some(pwd) = url.password() {
|
||||
@@ -387,7 +387,7 @@ impl Intercept {
|
||||
struct Custom {
|
||||
// This auth only applies if the returned ProxyScheme doesn't have an auth...
|
||||
auth: Option<HeaderValue>,
|
||||
func: Arc<dyn Fn(&Url) -> Option<::Result<ProxyScheme>> + Send + Sync + 'static>,
|
||||
func: Arc<dyn Fn(&Url) -> Option<crate::Result<ProxyScheme>> + Send + Sync + 'static>,
|
||||
}
|
||||
|
||||
impl Custom {
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
use std::fmt;
|
||||
|
||||
use header::{
|
||||
use crate::header::{
|
||||
HeaderMap,
|
||||
AUTHORIZATION,
|
||||
COOKIE,
|
||||
@@ -10,7 +10,7 @@ use header::{
|
||||
};
|
||||
use hyper::StatusCode;
|
||||
|
||||
use Url;
|
||||
use crate::Url;
|
||||
|
||||
/// A type that controls the policy on how to handle the following of redirects.
|
||||
///
|
||||
|
||||
@@ -5,10 +5,10 @@ use serde::Serialize;
|
||||
use serde_json;
|
||||
use serde_urlencoded;
|
||||
|
||||
use body::{self, Body};
|
||||
use header::{HeaderMap, HeaderName, HeaderValue, CONTENT_TYPE};
|
||||
use crate::body::{self, Body};
|
||||
use crate::header::{HeaderMap, HeaderName, HeaderValue, CONTENT_TYPE};
|
||||
use http::HttpTryFrom;
|
||||
use {async_impl, Client, Method, Url};
|
||||
use crate::{async_impl, Client, Method, Url};
|
||||
|
||||
/// A request which can be executed with `Client::execute()`.
|
||||
pub struct Request {
|
||||
@@ -20,7 +20,7 @@ pub struct Request {
|
||||
#[derive(Debug)]
|
||||
pub struct RequestBuilder {
|
||||
client: Client,
|
||||
request: ::Result<Request>,
|
||||
request: crate::Result<Request>,
|
||||
}
|
||||
|
||||
impl Request {
|
||||
@@ -102,7 +102,7 @@ impl Request {
|
||||
}
|
||||
|
||||
pub(crate) fn into_async(self) -> (async_impl::Request, Option<body::Sender>) {
|
||||
use header::CONTENT_LENGTH;
|
||||
use crate::header::CONTENT_LENGTH;
|
||||
|
||||
let mut req_async = self.inner;
|
||||
let body = self.body.and_then(|body| {
|
||||
@@ -118,7 +118,7 @@ impl Request {
|
||||
}
|
||||
|
||||
impl RequestBuilder {
|
||||
pub(crate) fn new(client: Client, request: ::Result<Request>) -> RequestBuilder {
|
||||
pub(crate) fn new(client: Client, request: crate::Result<Request>) -> RequestBuilder {
|
||||
RequestBuilder {
|
||||
client,
|
||||
request,
|
||||
@@ -149,10 +149,10 @@ impl RequestBuilder {
|
||||
Ok(key) => {
|
||||
match <HeaderValue as HttpTryFrom<V>>::try_from(value) {
|
||||
Ok(value) => { req.headers_mut().append(key, value); }
|
||||
Err(e) => error = Some(::error::from(e.into())),
|
||||
Err(e) => error = Some(crate::error::from(e.into())),
|
||||
}
|
||||
},
|
||||
Err(e) => error = Some(::error::from(e.into())),
|
||||
Err(e) => error = Some(crate::error::from(e.into())),
|
||||
};
|
||||
}
|
||||
if let Some(err) = error {
|
||||
@@ -186,7 +186,7 @@ impl RequestBuilder {
|
||||
/// # Ok(())
|
||||
/// # }
|
||||
/// ```
|
||||
pub fn headers(mut self, headers: ::header::HeaderMap) -> RequestBuilder {
|
||||
pub fn headers(mut self, headers: crate::header::HeaderMap) -> RequestBuilder {
|
||||
if let Ok(ref mut req) = self.request {
|
||||
async_impl::request::replace_headers(req.headers_mut(), headers);
|
||||
}
|
||||
@@ -239,7 +239,7 @@ impl RequestBuilder {
|
||||
None => format!("{}:", username)
|
||||
};
|
||||
let header_value = format!("Basic {}", encode(&auth));
|
||||
self.header(::header::AUTHORIZATION, &*header_value)
|
||||
self.header(crate::header::AUTHORIZATION, &*header_value)
|
||||
}
|
||||
|
||||
/// Enable HTTP bearer authentication.
|
||||
@@ -258,7 +258,7 @@ impl RequestBuilder {
|
||||
T: fmt::Display,
|
||||
{
|
||||
let header_value = format!("Bearer {}", token);
|
||||
self.header(::header::AUTHORIZATION, &*header_value)
|
||||
self.header(crate::header::AUTHORIZATION, &*header_value)
|
||||
}
|
||||
|
||||
/// Set the request body.
|
||||
@@ -350,7 +350,7 @@ impl RequestBuilder {
|
||||
let serializer = serde_urlencoded::Serializer::new(&mut pairs);
|
||||
|
||||
if let Err(err) = query.serialize(serializer) {
|
||||
error = Some(::error::from(err));
|
||||
error = Some(crate::error::from(err));
|
||||
}
|
||||
}
|
||||
if let Ok(ref mut req) = self.request {
|
||||
@@ -401,7 +401,7 @@ impl RequestBuilder {
|
||||
);
|
||||
*req.body_mut() = Some(body.into());
|
||||
},
|
||||
Err(err) => error = Some(::error::from(err)),
|
||||
Err(err) => error = Some(crate::error::from(err)),
|
||||
}
|
||||
}
|
||||
if let Some(err) = error {
|
||||
@@ -446,7 +446,7 @@ impl RequestBuilder {
|
||||
);
|
||||
*req.body_mut() = Some(body.into());
|
||||
},
|
||||
Err(err) => error = Some(::error::from(err)),
|
||||
Err(err) => error = Some(crate::error::from(err)),
|
||||
}
|
||||
}
|
||||
if let Some(err) = error {
|
||||
@@ -474,7 +474,7 @@ impl RequestBuilder {
|
||||
/// ```
|
||||
///
|
||||
/// See [`multipart`](multipart/) for more examples.
|
||||
pub fn multipart(self, mut multipart: ::multipart::Form) -> RequestBuilder {
|
||||
pub fn multipart(self, mut multipart: crate::multipart::Form) -> RequestBuilder {
|
||||
let mut builder = self.header(
|
||||
CONTENT_TYPE,
|
||||
format!(
|
||||
@@ -493,7 +493,7 @@ impl RequestBuilder {
|
||||
|
||||
/// Build a `Request`, which can be inspected, modified and executed with
|
||||
/// `Client::execute()`.
|
||||
pub fn build(self) -> ::Result<Request> {
|
||||
pub fn build(self) -> crate::Result<Request> {
|
||||
self.request
|
||||
}
|
||||
|
||||
@@ -503,7 +503,7 @@ impl RequestBuilder {
|
||||
///
|
||||
/// This method fails if there was an error while sending request,
|
||||
/// redirect loop was detected or redirect limit was exhausted.
|
||||
pub fn send(self) -> ::Result<::Response> {
|
||||
pub fn send(self) -> crate::Result<crate::Response> {
|
||||
self.client.execute(self.request?)
|
||||
}
|
||||
|
||||
@@ -579,8 +579,8 @@ fn fmt_request_fields<'a, 'b>(f: &'a mut fmt::DebugStruct<'a, 'b>, req: &Request
|
||||
|
||||
#[cfg(test)]
|
||||
mod tests {
|
||||
use {body, Client, Method};
|
||||
use header::{ACCEPT, HOST, HeaderMap, HeaderValue, CONTENT_TYPE};
|
||||
use crate::{body, Client, Method};
|
||||
use crate::header::{ACCEPT, HOST, HeaderMap, HeaderValue, CONTENT_TYPE};
|
||||
use std::collections::{BTreeMap, HashMap};
|
||||
use serde::Serialize;
|
||||
use serde_json;
|
||||
|
||||
@@ -8,10 +8,10 @@ use futures::{Async, Poll, Stream};
|
||||
use http;
|
||||
use serde::de::DeserializeOwned;
|
||||
|
||||
use cookie;
|
||||
use client::KeepCoreThreadAlive;
|
||||
use crate::cookie;
|
||||
use crate::client::KeepCoreThreadAlive;
|
||||
use hyper::header::HeaderMap;
|
||||
use {async_impl, StatusCode, Url, Version, wait};
|
||||
use crate::{async_impl, StatusCode, Url, Version, wait};
|
||||
|
||||
/// A Response to a submitted `Request`.
|
||||
pub struct Response {
|
||||
@@ -201,11 +201,11 @@ impl Response {
|
||||
/// details please see [`serde_json::from_reader`].
|
||||
/// [`serde_json::from_reader`]: https://docs.serde.rs/serde_json/fn.from_reader.html
|
||||
#[inline]
|
||||
pub fn json<T: DeserializeOwned>(&mut self) -> ::Result<T> {
|
||||
pub fn json<T: DeserializeOwned>(&mut self) -> crate::Result<T> {
|
||||
wait::timeout(self.inner.json(), self.timeout).map_err(|e| {
|
||||
match e {
|
||||
wait::Waited::TimedOut => ::error::timedout(None),
|
||||
wait::Waited::Executor(e) => ::error::from(e),
|
||||
wait::Waited::TimedOut => crate::error::timedout(None),
|
||||
wait::Waited::Executor(e) => crate::error::from(e),
|
||||
wait::Waited::Inner(e) => e,
|
||||
}
|
||||
})
|
||||
@@ -232,7 +232,7 @@ impl Response {
|
||||
///
|
||||
/// This consumes the body. Trying to read more, or use of `response.json()`
|
||||
/// will return empty values.
|
||||
pub fn text(&mut self) -> ::Result<String> {
|
||||
pub fn text(&mut self) -> crate::Result<String> {
|
||||
self.text_with_charset("utf-8")
|
||||
}
|
||||
|
||||
@@ -259,11 +259,11 @@ impl Response {
|
||||
///
|
||||
/// This consumes the body. Trying to read more, or use of `response.json()`
|
||||
/// will return empty values.
|
||||
pub fn text_with_charset(&mut self, default_encoding: &str) -> ::Result<String> {
|
||||
pub fn text_with_charset(&mut self, default_encoding: &str) -> crate::Result<String> {
|
||||
wait::timeout(self.inner.text_with_charset(default_encoding), self.timeout).map_err(|e| {
|
||||
match e {
|
||||
wait::Waited::TimedOut => ::error::timedout(None),
|
||||
wait::Waited::Executor(e) => ::error::from(e),
|
||||
wait::Waited::TimedOut => crate::error::timedout(None),
|
||||
wait::Waited::Executor(e) => crate::error::from(e),
|
||||
wait::Waited::Inner(e) => e,
|
||||
}
|
||||
})
|
||||
@@ -290,10 +290,10 @@ impl Response {
|
||||
/// # }
|
||||
/// ```
|
||||
#[inline]
|
||||
pub fn copy_to<W: ?Sized>(&mut self, w: &mut W) -> ::Result<u64>
|
||||
pub fn copy_to<W: ?Sized>(&mut self, w: &mut W) -> crate::Result<u64>
|
||||
where W: io::Write
|
||||
{
|
||||
io::copy(self, w).map_err(::error::from)
|
||||
io::copy(self, w).map_err(crate::error::from)
|
||||
}
|
||||
|
||||
/// Turn a response into an error if the server returned an error.
|
||||
@@ -313,7 +313,7 @@ impl Response {
|
||||
/// # fn main() {}
|
||||
/// ```
|
||||
#[inline]
|
||||
pub fn error_for_status(self) -> ::Result<Self> {
|
||||
pub fn error_for_status(self) -> crate::Result<Self> {
|
||||
let Response { body, inner, timeout, _thread_handle } = self;
|
||||
inner.error_for_status().map(move |inner| {
|
||||
Response {
|
||||
@@ -342,7 +342,7 @@ impl Response {
|
||||
/// # fn main() {}
|
||||
/// ```
|
||||
#[inline]
|
||||
pub fn error_for_status_ref(&self) -> ::Result<&Self> {
|
||||
pub fn error_for_status_ref(&self) -> crate::Result<&Self> {
|
||||
self.inner.error_for_status_ref().and_then(|_| Ok(self))
|
||||
}
|
||||
}
|
||||
@@ -377,8 +377,8 @@ impl Stream for WaitBody {
|
||||
Some(Ok(chunk)) => Ok(Async::Ready(Some(chunk))),
|
||||
Some(Err(e)) => {
|
||||
let req_err = match e {
|
||||
wait::Waited::TimedOut => ::error::timedout(None),
|
||||
wait::Waited::Executor(e) => ::error::from(e),
|
||||
wait::Waited::TimedOut => crate::error::timedout(None),
|
||||
wait::Waited::Executor(e) => crate::error::from(e),
|
||||
wait::Waited::Inner(e) => e,
|
||||
};
|
||||
|
||||
|
||||
@@ -52,7 +52,7 @@ impl Certificate {
|
||||
/// # Ok(())
|
||||
/// # }
|
||||
/// ```
|
||||
pub fn from_der(der: &[u8]) -> ::Result<Certificate> {
|
||||
pub fn from_der(der: &[u8]) -> crate::Result<Certificate> {
|
||||
Ok(Certificate {
|
||||
#[cfg(feature = "default-tls")]
|
||||
native: try_!(::native_tls::Certificate::from_der(der)),
|
||||
@@ -78,7 +78,7 @@ impl Certificate {
|
||||
/// # Ok(())
|
||||
/// # }
|
||||
/// ```
|
||||
pub fn from_pem(pem: &[u8]) -> ::Result<Certificate> {
|
||||
pub fn from_pem(pem: &[u8]) -> crate::Result<Certificate> {
|
||||
Ok(Certificate {
|
||||
#[cfg(feature = "default-tls")]
|
||||
native: try_!(::native_tls::Certificate::from_pem(pem)),
|
||||
@@ -149,7 +149,7 @@ impl Identity {
|
||||
/// # }
|
||||
/// ```
|
||||
#[cfg(feature = "default-tls")]
|
||||
pub fn from_pkcs12_der(der: &[u8], password: &str) -> ::Result<Identity> {
|
||||
pub fn from_pkcs12_der(der: &[u8], password: &str) -> crate::Result<Identity> {
|
||||
Ok(Identity {
|
||||
inner: ClientCert::Pkcs12(
|
||||
try_!(::native_tls::Identity::from_pkcs12(der, password))
|
||||
@@ -218,7 +218,7 @@ impl Identity {
|
||||
pub(crate) fn add_to_native_tls(
|
||||
self,
|
||||
tls: &mut ::native_tls::TlsConnectorBuilder,
|
||||
) -> ::Result<()> {
|
||||
) -> crate::Result<()> {
|
||||
match self.inner {
|
||||
ClientCert::Pkcs12(id) => {
|
||||
tls.identity(id);
|
||||
|
||||
@@ -14,8 +14,8 @@ use std::time::Duration;
|
||||
use futures::{Future, Stream};
|
||||
use tokio::runtime::current_thread::Runtime;
|
||||
|
||||
use reqwest::async::Client;
|
||||
use reqwest::async::multipart::{Form, Part};
|
||||
use reqwest::r#async::Client;
|
||||
use reqwest::r#async::multipart::{Form, Part};
|
||||
|
||||
use bytes::Bytes;
|
||||
|
||||
|
||||
@@ -6,7 +6,7 @@ mod support;
|
||||
#[test]
|
||||
fn cookie_response_accessor() {
|
||||
let mut rt = tokio::runtime::current_thread::Runtime::new().expect("new rt");
|
||||
let client = reqwest::async::Client::new();
|
||||
let client = reqwest::r#async::Client::new();
|
||||
|
||||
let server = server! {
|
||||
request: b"\
|
||||
@@ -81,7 +81,7 @@ fn cookie_response_accessor() {
|
||||
#[test]
|
||||
fn cookie_store_simple() {
|
||||
let mut rt = tokio::runtime::current_thread::Runtime::new().expect("new rt");
|
||||
let client = reqwest::async::Client::builder().cookie_store(true).build().unwrap();
|
||||
let client = reqwest::r#async::Client::builder().cookie_store(true).build().unwrap();
|
||||
|
||||
let server = server! {
|
||||
request: b"\
|
||||
@@ -125,7 +125,7 @@ fn cookie_store_simple() {
|
||||
#[test]
|
||||
fn cookie_store_overwrite_existing() {
|
||||
let mut rt = tokio::runtime::current_thread::Runtime::new().expect("new rt");
|
||||
let client = reqwest::async::Client::builder().cookie_store(true).build().unwrap();
|
||||
let client = reqwest::r#async::Client::builder().cookie_store(true).build().unwrap();
|
||||
|
||||
let server = server! {
|
||||
request: b"\
|
||||
@@ -189,7 +189,7 @@ fn cookie_store_overwrite_existing() {
|
||||
#[test]
|
||||
fn cookie_store_max_age() {
|
||||
let mut rt = tokio::runtime::current_thread::Runtime::new().expect("new rt");
|
||||
let client = reqwest::async::Client::builder().cookie_store(true).build().unwrap();
|
||||
let client = reqwest::r#async::Client::builder().cookie_store(true).build().unwrap();
|
||||
|
||||
let server = server! {
|
||||
request: b"\
|
||||
@@ -232,7 +232,7 @@ fn cookie_store_max_age() {
|
||||
#[test]
|
||||
fn cookie_store_expires() {
|
||||
let mut rt = tokio::runtime::current_thread::Runtime::new().expect("new rt");
|
||||
let client = reqwest::async::Client::builder().cookie_store(true).build().unwrap();
|
||||
let client = reqwest::r#async::Client::builder().cookie_store(true).build().unwrap();
|
||||
|
||||
let server = server! {
|
||||
request: b"\
|
||||
@@ -275,7 +275,7 @@ fn cookie_store_expires() {
|
||||
#[test]
|
||||
fn cookie_store_path() {
|
||||
let mut rt = tokio::runtime::current_thread::Runtime::new().expect("new rt");
|
||||
let client = reqwest::async::Client::builder().cookie_store(true).build().unwrap();
|
||||
let client = reqwest::r#async::Client::builder().cookie_store(true).build().unwrap();
|
||||
|
||||
let server = server! {
|
||||
request: b"\
|
||||
|
||||
@@ -196,14 +196,14 @@ macro_rules! server {
|
||||
$($f: $v,)+
|
||||
}),*
|
||||
];
|
||||
::support::server::spawn(txns)
|
||||
crate::support::server::spawn(txns)
|
||||
})
|
||||
}
|
||||
|
||||
#[macro_export]
|
||||
macro_rules! __internal__txn {
|
||||
($($field:ident: $val:expr,)+) => (
|
||||
::support::server::Txn {
|
||||
crate::support::server::Txn {
|
||||
$( $field: __internal__prop!($field: $val), )+
|
||||
.. Default::default()
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user