@Override public void addHeaderValue(final String name, final String value) { clientRequest.getHeaders().add(name, value); } }
@Override public void filter(ClientRequestContext ctx) throws IOException { // append ctx.getHeaders().putSingle(headerName, headerValue); } }
@Override public void filter(ClientRequestContext context) throws IOException { if (context.hasEntity() && context.getHeaders().getFirst(HttpHeaders.CONTENT_ENCODING) == null && this.forceEncoding) { context.getHeaders().add(HttpHeaders.CONTENT_ENCODING, "gzip"); } }
@Override public void filter(ClientRequestContext requestContext) throws IOException { if (!requestContext.getHeaders().containsKey(HttpHeaders.ACCEPT_ENCODING)) { requestContext.getHeaders().add(HttpHeaders.ACCEPT_ENCODING, "gzip"); } if (hasEntity(requestContext) && isCompressionEnabled()) { Object contentEncoding = requestContext.getHeaders().getFirst(HttpHeaders.CONTENT_ENCODING); if (!"gzip".equals(contentEncoding)) { requestContext.getHeaders().add(HttpHeaders.CONTENT_ENCODING, "gzip"); } } }
public void filter(ClientRequestContext requestContext) { requestContext.getHeaders().putSingle(PRIVATE_TOKEN, gitlabApiToken); } }
@Override public void filter(ClientRequestContext requestContext) { requestContext.getHeaders().put(HttpHeaders.USER_AGENT, Collections.<Object>singletonList(fullUserAgentName)); } });
@Override public void filter(ClientRequestContext requestContext) throws IOException { if (authInfo != null) { requestContext.getHeaders().putSingle(AbstractEurekaIdentity.AUTH_NAME_HEADER_KEY, authInfo.getName()); requestContext.getHeaders().putSingle(AbstractEurekaIdentity.AUTH_VERSION_HEADER_KEY, authInfo.getVersion()); if (authInfo.getId() != null) { requestContext.getHeaders().putSingle(AbstractEurekaIdentity.AUTH_ID_HEADER_KEY, authInfo.getId()); } } } }
@Override public void filter(ClientRequestContext requestContext) throws IOException { if (authInfo != null) { requestContext.getHeaders().putSingle(AbstractEurekaIdentity.AUTH_NAME_HEADER_KEY, authInfo.getName()); requestContext.getHeaders().putSingle(AbstractEurekaIdentity.AUTH_VERSION_HEADER_KEY, authInfo.getVersion()); if (authInfo.getId() != null) { requestContext.getHeaders().putSingle(AbstractEurekaIdentity.AUTH_ID_HEADER_KEY, authInfo.getId()); } } } }
@Override public void filter(ClientRequestContext rc) throws IOException { if (!METHODS_TO_IGNORE.contains(rc.getMethod()) && !rc.getHeaders().containsKey(HEADER_NAME)) { rc.getHeaders().add(HEADER_NAME, requestedBy); } } }
@Override public void filter(ClientRequestContext rc) throws IOException { if (!METHODS_TO_IGNORE.contains(rc.getMethod()) && !rc.getHeaders().containsKey(HEADER_NAME)) { rc.getHeaders().add(HEADER_NAME, requestedBy); } } }
@Override public void filter(ClientRequestContext requestContext) throws IOException { int size = 0; for (Map.Entry<String, String> entry : RpcContext.getContext().getAttachments().entrySet()) { String key = entry.getKey(); String value = entry.getKey(); if (illegalForRest(key) || illegalForRest(value)) { throw new IllegalArgumentException("The attachments of " + RpcContext.class.getSimpleName() + " must not contain ',' or '=' when using rest protocol"); } // TODO for now we don't consider the differences of encoding and server limit if (value != null) { size += value.getBytes("UTF-8").length; } if (size > MAX_HEADER_SIZE) { throw new IllegalArgumentException("The attachments of " + RpcContext.class.getSimpleName() + " is too big"); } String attachments = key + "=" + value; requestContext.getHeaders().add(DUBBO_ATTACHMENT_HEADER, attachments); } }
@Override public void filter(ClientRequestContext requestContext) throws IOException { int size = 0; for (Map.Entry<String, String> entry : RpcContext.getContext().getAttachments().entrySet()) { String key = entry.getKey(); String value = entry.getKey(); if (illegalForRest(key) || illegalForRest(value)) { throw new IllegalArgumentException("The attachments of " + RpcContext.class.getSimpleName() + " must not contain ',' or '=' when using rest protocol"); } // TODO for now we don't consider the differences of encoding and server limit if (value != null) { size += value.getBytes("UTF-8").length; } if (size > MAX_HEADER_SIZE) { throw new IllegalArgumentException("The attachments of " + RpcContext.class.getSimpleName() + " is too big"); } String attachments = key + "=" + value; requestContext.getHeaders().add(DUBBO_ATTACHMENT_HEADER, attachments); } }
@Override public void filter(ClientRequestContext context) throws IOException { // Unless the content type is in the list of those we want to ellide, then just have // our super-class handle things. Object contentType = context.getHeaders().getFirst(HttpHeaders.CONTENT_TYPE); if (contentType == null || !SKIPPED_CONTENT.contains(contentType.toString())) { super.filter(context); } }
@Override public void filter(ClientRequestContext clientRequestContext) { clientRequestContext.getHeaders().remove("Accept-Encoding"); } }
@Override public void filter(ClientRequestContext rc) throws IOException { if (!METHODS_TO_IGNORE.contains(rc.getMethod()) && !rc.getHeaders().containsKey(HEADER_NAME)) { rc.getHeaders().add(HEADER_NAME, requestedBy); } } }
@Override public void filter(ClientRequestContext request) throws IOException { String token = this.accessToken; final String propertyToken = (String) request.getProperty(OAuth2ClientSupport.OAUTH2_PROPERTY_ACCESS_TOKEN); if (propertyToken != null) { token = propertyToken; } request.removeProperty(OAuth2ClientSupport.OAUTH2_PROPERTY_ACCESS_TOKEN); if (token == null) { return; } String authentication = "Bearer " + token; if (!request.getHeaders().containsKey(HttpHeaders.AUTHORIZATION)) { request.getHeaders().add(HttpHeaders.AUTHORIZATION, authentication); } } }
@Override public void filter(ClientRequestContext request) { Span span = handler.handleSend(injector, request.getHeaders(), request); request.setProperty(SpanInScope.class.getName(), tracer.withSpanInScope(span)); }
@Override public void filter(ClientRequestContext context) { if (LOGGER.isLoggable(Level.FINEST)) { LOGGER.log(Level.FINEST, "Call GitLab:\nHTTP method: {0}\nURL: {1}\nRequest headers: [\n{2}\n]", LoggerUtil.toArray(context.getMethod(), context.getUri(), toFilteredString(context.getHeaders()))); } }
/** * Adds authentication information to the request. * * @param request Request context. * @throws RequestAuthenticationException in case that basic credentials missing or are in invalid format */ public void filterRequest(ClientRequestContext request) throws RequestAuthenticationException { HttpAuthenticationFilter.Credentials credentials = HttpAuthenticationFilter.getCredentials(request, defaultCredentials, HttpAuthenticationFilter.Type.BASIC); if (credentials == null) { throw new RequestAuthenticationException(LocalizationMessages.AUTHENTICATION_CREDENTIALS_MISSING_BASIC()); } request.getHeaders().add(HttpHeaders.AUTHORIZATION, calculateAuthentication(credentials)); }
/** * Adds authentication information to the request. * * @param request Request context. * @throws RequestAuthenticationException in case that basic credentials missing or are in invalid format */ public void filterRequest(ClientRequestContext request) throws RequestAuthenticationException { HttpAuthenticationFilter.Credentials credentials = HttpAuthenticationFilter.getCredentials(request, defaultCredentials, HttpAuthenticationFilter.Type.BASIC); if (credentials == null) { throw new RequestAuthenticationException(LocalizationMessages.AUTHENTICATION_CREDENTIALS_MISSING_BASIC()); } request.getHeaders().add(HttpHeaders.AUTHORIZATION, calculateAuthentication(credentials)); }