Lines Matching +full:queue +full:- +full:tick
24 from six.moves import http_client, queue
147 content_length_string = msg.headers.get("content-length", "")
151 elif msg.headers.get("transfer-encoding") == "chunked":
282 :param fun: fun(client_sock, tick) called after successful accept().
283 …:param request_count: test succeeds after exactly this number of requests, triggered by tick(reque…
286 "" - build normal http/https URI.
287 string - build normal URI using supplied scheme.
288 None - yield (addr, port) tuple.
290 None (default) - plain HTTP.
291 … True - HTTPS with reasonable defaults. Likely you want httplib2.Http(ca_certs=tests.CA_CERTS)
292 string - path to custom server cert+key PEM file.
293 callable - function(context, listener, skip_errors) -> ssl_wrapped_listener
301 def tick(request): function
321 fun(client, tick)
378 q = queue.Queue(1)
381 def server_yield_socket_handler(sock, tick): argument
395 if not tick(request):
402 def server_request_socket_handler(sock, tick): argument
409 # print("--- debug request\n" + request.raw.decode("ascii", "replace"))
414 # print("--- debug response\n" + response.decode("ascii", "replace"))
417 if not tick(request):
455 headers.setdefault("content-length", str(len(body)))
464 and "content-length" not in headers
530 """https://tools.ietf.org/html/rfc7235#section-2.1
562 …"""allow_scheme - 'basic', 'digest', etc allow_credentials - sequence of ('name', 'password') out_…
567 out_requests - None | []
601 deny_headers = {"www-authenticate": authenticate}
647 # TODO: client_qop auth-int
655 return deny(body=b"auth-info nc missing")
658 body="auth-info opaque mismatch expected={} actual={}".format(
689 "authentication-info": " ".join(
743 do = zlib.compressobj(9, zlib.DEFLATED, -zlib.MAX_WBITS)
748 return zlib.decompress(bs, -zlib.MAX_WBITS)