class Faraday::Adapter::HTTPClient

def call(env)

def call(env)
  super
  # enable compression
  client.transparent_gzip_decompression = true
  if req = env[:request]
    if proxy = req[:proxy]
      configure_proxy proxy
    end
    if bind = req[:bind]
      configure_socket bind
    end
    configure_timeouts req
  end
  if env[:url].scheme == 'https' && ssl = env[:ssl]
    configure_ssl ssl
  end
  configure_client
  # TODO Don't stream yet.
  # https://github.com/nahi/httpclient/pull/90
  env[:body] = env[:body].read if env[:body].respond_to? :read
  resp = client.request env[:method], env[:url],
    :body   => env[:body],
    :header => env[:request_headers]
  save_response env, resp.status, resp.body, resp.headers, resp.reason
  @app.call env
rescue ::HTTPClient::TimeoutError, Errno::ETIMEDOUT
  raise Faraday::Error::TimeoutError, $!
rescue ::HTTPClient::BadResponseError => err
  if err.message.include?('status 407')
    raise Faraday::Error::ConnectionFailed, %{407 "Proxy Authentication Required "}
  else
    raise Faraday::Error::ClientError, $!
  end
rescue Errno::ECONNREFUSED, IOError
  raise Faraday::Error::ConnectionFailed, $!
rescue => err
  if defined?(OpenSSL) && OpenSSL::SSL::SSLError === err
    raise Faraday::SSLError, err
  else
    raise
  end
end

def client

def client
  @client ||= ::HTTPClient.new
end

def configure_client

def configure_client
  @config_block.call(client) if @config_block
end

def configure_proxy(proxy)

def configure_proxy(proxy)
  client.proxy = proxy[:uri]
  if proxy[:user] && proxy[:password]
    client.set_proxy_auth proxy[:user], proxy[:password]
  end
end

def configure_socket(bind)

def configure_socket(bind)
  client.socket_local.host = bind[:host]
  client.socket_local.port = bind[:port]
end

def configure_ssl(ssl)

def configure_ssl(ssl)
  ssl_config = client.ssl_config
  ssl_config.verify_mode = ssl_verify_mode(ssl)
  ssl_config.cert_store = ssl_cert_store(ssl)
  ssl_config.add_trust_ca ssl[:ca_file]        if ssl[:ca_file]
  ssl_config.add_trust_ca ssl[:ca_path]        if ssl[:ca_path]
  ssl_config.client_cert  = ssl[:client_cert]  if ssl[:client_cert]
  ssl_config.client_key   = ssl[:client_key]   if ssl[:client_key]
  ssl_config.verify_depth = ssl[:verify_depth] if ssl[:verify_depth]
end

def configure_timeouts(req)

def configure_timeouts(req)
  if req[:timeout]
    client.connect_timeout   = req[:timeout]
    client.receive_timeout   = req[:timeout]
    client.send_timeout      = req[:timeout]
  end
  if req[:open_timeout]
    client.connect_timeout   = req[:open_timeout]
    client.send_timeout      = req[:open_timeout]
  end
end

def ssl_cert_store(ssl)

def ssl_cert_store(ssl)
  return ssl[:cert_store] if ssl[:cert_store]
  # Memoize the cert store so that the same one is passed to
  # HTTPClient each time, to avoid resyncing SSL sesions when
  # it's changed
  @cert_store ||= begin
    # Use the default cert store by default, i.e. system ca certs
    cert_store = OpenSSL::X509::Store.new
    cert_store.set_default_paths
    cert_store
  end
end

def ssl_verify_mode(ssl)

def ssl_verify_mode(ssl)
  ssl[:verify_mode] || begin
    if ssl.fetch(:verify, true)
      OpenSSL::SSL::VERIFY_PEER | OpenSSL::SSL::VERIFY_FAIL_IF_NO_PEER_CERT
    else
      OpenSSL::SSL::VERIFY_NONE
    end
  end
end