forked from Versent/saml2aws
-
Notifications
You must be signed in to change notification settings - Fork 0
/
http.go
51 lines (40 loc) · 1.18 KB
/
http.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
package provider
import (
"crypto/tls"
"net/http"
"net/http/cookiejar"
"golang.org/x/net/publicsuffix"
)
// HTTPClient saml2aws http client which extends the existing client
type HTTPClient struct {
http.Client
}
// NewDefaultTransport configure a transport with the TLS skip verify option
func NewDefaultTransport(skipVerify bool) http.RoundTripper {
return &http.Transport{
Proxy: http.ProxyFromEnvironment,
TLSClientConfig: &tls.Config{InsecureSkipVerify: skipVerify},
}
}
// NewHTTPClient configure the default http client used by the providers
func NewHTTPClient(tr http.RoundTripper) (*HTTPClient, error) {
options := &cookiejar.Options{
PublicSuffixList: publicsuffix.List,
}
jar, err := cookiejar.New(options)
if err != nil {
return nil, err
}
client := http.Client{Transport: tr, Jar: jar}
return &HTTPClient{client}, nil
}
// DisableFollowRedirect disable redirects
func (client *HTTPClient) DisableFollowRedirect() {
client.CheckRedirect = func(req *http.Request, via []*http.Request) error {
return http.ErrUseLastResponse
}
}
// EnableFollowRedirect enable redirects
func (client *HTTPClient) EnableFollowRedirect() {
client.CheckRedirect = nil
}