HTTP::Tiny - Online Linux Manual PageSection : 3
Updated : 2023-01-20
Source : perl v5.36.0
Note : User Contributed Perl Documentation

NAMEHTTP::Tiny − A small, simple, correct HTTP/1.1 client

VERSIONversion 0.082

SYNOPSIS​ use HTTP::Tiny; ​ ​ my $response = HTTP::Tiny−>new−>get('http://example.com/'); ​ ​ die "Failed!\n" unless $response−>{success}; ​ ​ print "$response−>{status} $response−>{reason}\n"; ​ ​ while (my ($k, $v) = each %{$response−>{headers}}) { ​ for (ref $v eq 'ARRAY' ? @$v : $v) { ​ print "$k: $_\n"; ​ }} ​ ​ print $response−>{content} if length $response−>{content};

DESCRIPTIONThis is a very simple HTTP/1.1 client, designed for doing simple requests without the overhead of a large framework like LWP::UserAgent. It is more correct and more complete than HTTP::Lite. It supports proxies and redirection. It also correctly resumes after EINTR. If IO::Socket::IP 0.25 or later is installed, HTTP::Tiny will use it instead of IO::Socket::INET for transparent support for both IPv4 and IPv6. Cookie support requires HTTP::CookieJar or an equivalent class.

METHODS

new​ $http = HTTP::Tiny−>new( %attributes ); This constructor returns a new HTTP::Tiny object. Valid attributes include: • \*(C`agent\*(C'\fR — A user-agent string (defaults to 'HTTP\-Tiny/$VERSION'). If \f(CW\*(C`agent\*(C'\fR — ends in a space character, the default user-agent string is appended. • \*(C`cookie_jar\*(C'\fR — An instance of HTTP::CookieJar — or equivalent class that supports the \f(CW\*(C`add\*(C'\fR and \f(CW\*(C`cookie_header\*(C'\fR methods • \*(C`default_headers\*(C'\fR — A hashref of default headers to apply to requests • \*(C`local_address\*(C'\fR — The local IP address to bind to • \*(C`keep_alive\*(C'\fR — Whether to reuse the last connection (if for the same scheme, host and port) (defaults to 1) • \*(C`max_redirect\*(C'\fR — Maximum number of redirects allowed (defaults to 5) • \*(C`max_size\*(C'\fR — Maximum response size in bytes (only when not using a data callback). If defined, requests with responses larger than this will return a 599 status code. • \*(C`http_proxy\*(C'\fR — URL of a proxy server to use for HTTP connections (default is \f(CW$ENV{http_proxy}\fR — if set) • \*(C`https_proxy\*(C'\fR — URL of a proxy server to use for HTTPS connections (default is \f(CW$ENV{https_proxy}\fR — if set) • \*(C`proxy\*(C'\fR — URL of a generic proxy server for both HTTP and HTTPS connections (default is \f(CW$ENV{all_proxy}\fR — if set) • \*(C`no_proxy\*(C'\fR — List of domain suffixes that should not be proxied. Must be a comma-separated string or an array reference. (default is \f(CW$ENV{no_proxy}\fR —) • \*(C`timeout\*(C'\fR — Request timeout in seconds (default is 60) If a socket open, read or write takes longer than the timeout, the request response status code will be 599. • \*(C`verify_SSL\*(C'\fR — A boolean that indicates whether to validate the SSL certificate of an \f(CW\*(C`https\*(C'\fR — connection (default is false) • \*(C`SSL_options\*(C'\fR — A hashref of \f(CW\*(C`SSL_*\*(C'\fR — options to pass through to IO::Socket::SSL An accessor/mutator method exists for each attribute. Passing an explicit \*(C`undef\*(C'\fR for \f(CW\*(C`proxy\*(C'\fR, \f(CW\*(C`http_proxy\*(C'\fR or \f(CW\*(C`https_proxy\*(C'\fR will prevent getting the corresponding proxies from the environment. Errors during request execution will result in a pseudo-HTTP status code of 599 and a reason of "Internal Exception". The content field in the response will contain the text of the error. The \*(C`keep_alive\*(C'\fR parameter enables a persistent connection, but only to a single destination scheme, host and port. If any connection-relevant attributes are modified via accessor, or if the process ID or thread ID change, the persistent connection will be dropped. If you want persistent connections across multiple destinations, use multiple HTTP::Tiny objects. See "SSL SUPPORT" for more on the \*(C`verify_SSL\*(C'\fR and \f(CW\*(C`SSL_options\*(C'\fR attributes.

get|head|put|post|patch|delete​ $response = $http−>get($url); ​ $response = $http−>get($url, \%options); ​ $response = $http−>head($url); These methods are shorthand for calling request() for the given method. The URL must have unsafe characters escaped and international domain names encoded. See request() for valid options and a description of the response. The \*(C`success\*(C'\fR field of the response will be true if the status code is 2XX.

post_form​ $response = $http−>post_form($url, $form_data); ​ $response = $http−>post_form($url, $form_data, \%options); This method executes a \*(C`POST\*(C'\fR request and sends the key/value pairs from a form data hash or array reference to the given URL with a \*(C`content\-type\*(C'\fR of ​\*(C`application/x\-www\-form\-urlencoded\*(C'\fR. If data is provided as an array reference, the order is preserved; if provided as a hash reference, the terms are sorted on key and value for consistency. See documentation for the ​\*(C`www_form_urlencode\*(C'\fR method for details on the encoding. The URL must have unsafe characters escaped and international domain names encoded. See request() for valid options and a description of the response. Any \*(C`content\-type\*(C'\fR header or content in the options hashref will be ignored. The \*(C`success\*(C'\fR field of the response will be true if the status code is 2XX.

mirror​ $response = $http−>mirror($url, $file, \%options) ​ if ( $response−>{success} ) { ​ print "$file is up to date\n"; ​ } Executes a \*(C`GET\*(C'\fR request for the URL and saves the response body to the file name provided. The URL must have unsafe characters escaped and international domain names encoded. If the file already exists, the request will include an ​\*(C`If\-Modified\-Since\*(C'\fR header with the modification timestamp of the file. You may specify a different \*(C`If\-Modified\-Since\*(C'\fR header yourself in the \f(CW\*(C`$options\->{headers}\*(C'\fR hash. The \*(C`success\*(C'\fR field of the response will be true if the status code is 2XX or if the status code is 304 (unmodified). If the file was modified and the server response includes a properly formatted \*(C`Last\-Modified\*(C'\fR header, the file modification time will be updated accordingly.

request​ $response = $http−>request($method, $url); ​ $response = $http−>request($method, $url, \%options); Executes an HTTP request of the given method type ('GET', 'HEAD', 'POST', ​'PUT', etc.) on the given URL. The URL must have unsafe characters escaped and international domain names encoded. NOTE: Method names are case-sensitive per the HTTP/1.1 specification. Don't use \*(C`get\*(C'\fR when you really want \f(CW\*(C`GET\*(C'\fR. See LIMITATIONS for how this applies to redirection. If the URL includes a "user:password" stanza, they will be used for Basic-style authorization headers. (Authorization headers will not be included in a redirected request.) For example: ​ $http−>request('GET', 'http://Aladdin:open sesame@example.com/'); If the "user:password" stanza contains reserved characters, they must be percent-escaped: ​ $http−>request('GET', 'http://john%40example.com:password@example.com/'); A hashref of options may be appended to modify the request. Valid options are: • \*(C`headers\*(C'\fR — A hashref containing headers to include with the request. If the value for a header is an array reference, the header will be output multiple times with each value in the array. These headers over-write any default headers. • \*(C`content\*(C'\fR — A scalar to include as the body of the request OR a code reference that will be called iteratively to produce the body of the request • \*(C`trailer_callback\*(C'\fR — A code reference that will be called if it exists to provide a hashref of trailing headers (only used with chunked transfer-encoding) • \*(C`data_callback\*(C'\fR — A code reference that will be called for each chunks of the response body received. • \*(C`peer\*(C'\fR — Override host resolution and force all connections to go only to a specific peer address, regardless of the URL of the request. This will include any redirections! This options should be used with extreme caution (e.g. debugging or very special circumstances). It can be given as either a scalar or a code reference that will receive the hostname and whose response will be taken as the address. The \*(C`Host\*(C'\fR header is generated from the URL in accordance with RFC 2616. It is a fatal error to specify \*(C`Host\*(C'\fR in the \f(CW\*(C`headers\*(C'\fR option. Other headers may be ignored or overwritten if necessary for transport compliance. If the \*(C`content\*(C'\fR option is a code reference, it will be called iteratively to provide the content body of the request. It should return the empty string or undef when the iterator is exhausted. If the \*(C`content\*(C'\fR option is the empty string, no \f(CW\*(C`content\-type\*(C'\fR or ​\*(C`content\-length\*(C'\fR headers will be generated. If the \*(C`data_callback\*(C'\fR option is provided, it will be called iteratively until the entire response body is received. The first argument will be a string containing a chunk of the response body, the second argument will be the in-progress response hash reference, as described below. (This allows customizing the action of the callback based on the \*(C`status\*(C'\fR or \f(CW\*(C`headers\*(C'\fR received prior to the content body.) Content data in the request/response is handled as "raw bytes". Any encoding/decoding (with associated headers) are the responsibility of the caller. The \*(C`request\*(C'\fR method returns a hashref containing the response. The hashref will have the following keys: • \*(C`success\*(C'\fR — Boolean indicating whether the operation returned a 2XX status code • \*(C`url\*(C'\fR — URL that provided the response. This is the URL of the request unless there were redirections, in which case it is the last URL queried in a redirection chain • \*(C`status\*(C'\fR — The HTTP status code of the response • \*(C`reason\*(C'\fR — The response phrase returned by the server • \*(C`content\*(C'\fR — The body of the response. If the response does not have any content or if a data callback is provided to consume the response body, this will be the empty string • \*(C`headers\*(C'\fR — A hashref of header fields. All header field names will be normalized to be lower case. If a header is repeated, the value will be an arrayref; it will otherwise be a scalar string containing the value • \*(C`protocol\*(C'\fR \- If this field exists, it is the protocol of the response such as HTTP/1.0 or HTTP/1.1 • \*(C`redirects\*(C'\fR If this field exists, it is an arrayref of response hash references from redirects in the same order that redirections occurred. If it does not exist, then no redirections occurred. On an error during the execution of the request, the \*(C`status\*(C'\fR field will contain 599, and the \*(C`content\*(C'\fR field will contain the text of the error.

www_form_urlencode​ $params = $http−>www_form_urlencode( $data ); ​ $response = $http−>get("http://example.com/query?$params"); This method converts the key/value pairs from a data hash or array reference into a \*(C`x\-www\-form\-urlencoded\*(C'\fR string. The keys and values from the data reference will be UTF−8 encoded and escaped per RFC 3986. If a value is an array reference, the key will be repeated with each of the values of the array reference. If data is provided as a hash reference, the key/value pairs in the resulting string will be sorted by key and value for consistent ordering.

can_ssl​ $ok = HTTP::Tiny−>can_ssl; ​ ($ok, $why) = HTTP::Tiny−>can_ssl; ​ ($ok, $why) = $http−>can_ssl; Indicates if SSL support is available. When called as a class object, it checks for the correct version of Net::SSLeay and IO::Socket::SSL. When called as an object methods, if \*(C`SSL_verify\*(C'\fR is true or if \f(CW\*(C`SSL_verify_mode\*(C'\fR is set in \*(C`SSL_options\*(C'\fR, it checks that a CA file is available. In scalar context, returns a boolean indicating if SSL is available. In list context, returns the boolean and a (possibly multi-line) string of errors indicating why SSL isn't available.

connected​ $host = $http−>connected; ​ ($host, $port) = $http−>connected; Indicates if a connection to a peer is being kept alive, per the \*(C`keep_alive\*(C'\fR option. In scalar context, returns the peer host and port, joined with a colon, or ​\*(C`undef\*(C'\fR (if no peer is connected). In list context, returns the peer host and port or an empty list (if no peer is connected). Note: This method cannot reliably be used to discover whether the remote host has closed its end of the socket.

SSL SUPPORTDirect \*(C`https\*(C'\fR connections are supported only if IO::Socket::SSL 1.56 or greater and Net::SSLeay 1.49 or greater are installed. An error will occur if new enough versions of these modules are not installed or if the SSL encryption fails. You can also use HTTP::Tiny::can_ssl() utility function that returns boolean to see if the required modules are installed. An \*(C`https\*(C'\fR connection may be made via an \f(CW\*(C`http\*(C'\fR proxy that supports the CONNECT command (i.e. RFC 2817). You may not proxy \*(C`https\*(C'\fR via a proxy that itself requires \*(C`https\*(C'\fR to communicate. SSL provides two distinct capabilities: • Encrypted communication channel • Verification of server identity By default, HTTP::Tiny does not verify server identity. Server identity verification is controversial and potentially tricky because it depends on a (usually paid) third-party Certificate Authority (CA) trust model to validate a certificate as legitimate. This discriminates against servers with self-signed certificates or certificates signed by free, community-driven CA's such as CAcert.org <http://cacert.org>. By default, HTTP::Tiny does not make any assumptions about your trust model, threat level or risk tolerance. It just aims to give you an encrypted channel when you need one. Setting the \*(C`verify_SSL\*(C'\fR attribute to a true value will make HTTP::Tiny verify that an SSL connection has a valid SSL certificate corresponding to the host name of the connection and that the SSL certificate has been verified by a CA. Assuming you trust the CA, this will protect against a man-in-the-middle attack <http://en.wikipedia.org/wiki/Man-in-the-middle_attack>. If you are concerned about security, you should enable this option. Certificate verification requires a file containing trusted CA certificates. If the environment variable \*(C`SSL_CERT_FILE\*(C'\fR is present, HTTP::Tiny will try to find a CA certificate file in that location. If the Mozilla::CA module is installed, HTTP::Tiny will use the CA file included with it as a source of trusted CA's. (This means you trust Mozilla, the author of Mozilla::CA, the CPAN mirror where you got Mozilla::CA, the toolchain used to install it, and your operating system security, right?) If that module is not available, then HTTP::Tiny will search several system-specific default locations for a CA certificate file: • /etc/ssl/certs/ca−certificates.crt • /etc/pki/tls/certs/ca−bundle.crt • /etc/ssl/ca−bundle.pem An error will be occur if \*(C`verify_SSL\*(C'\fR is true and no CA certificate file is available. If you desire complete control over SSL connections, the \*(C`SSL_options\*(C'\fR attribute lets you provide a hash reference that will be passed through to ​IO::Socket::SSL::start_SSL(), overriding any options set by HTTP::Tiny. For example, to provide your own trusted CA file: ​ SSL_options => { ​ SSL_ca_file => $file_path, ​ } The \*(C`SSL_options\*(C'\fR attribute could also be used for such things as providing a client certificate for authentication to a server or controlling the choice of cipher used for the SSL connection. See IO::Socket::SSL documentation for details.

PROXY SUPPORTHTTP::Tiny can proxy both \*(C`http\*(C'\fR and \f(CW\*(C`https\*(C'\fR requests. Only Basic proxy authorization is supported and it must be provided as part of the proxy URL: ​\*(C`http://user:pass@proxy.example.com/\*(C'\fR. HTTP::Tiny supports the following proxy environment variables: • http_proxy or HTTP_PROXY • https_proxy or HTTPS_PROXY • all_proxy or ALL_PROXY If the \*(C`REQUEST_METHOD\*(C'\fR environment variable is set, then this might be a CGI process and \*(C`HTTP_PROXY\*(C'\fR would be set from the \f(CW\*(C`Proxy:\*(C'\fR header, which is a security risk. If \*(C`REQUEST_METHOD\*(C'\fR is set, \f(CW\*(C`HTTP_PROXY\*(C'\fR (the upper case variant only) is ignored, but \*(C`CGI_HTTP_PROXY\*(C'\fR is considered instead. Tunnelling \*(C`https\*(C'\fR over an \f(CW\*(C`http\*(C'\fR proxy using the CONNECT method is supported. If your proxy uses \*(C`https\*(C'\fR itself, you can not tunnel \f(CW\*(C`https\*(C'\fR over it. Be warned that proxying an \*(C`https\*(C'\fR connection opens you to the risk of a man-in-the-middle attack by the proxy server. The \*(C`no_proxy\*(C'\fR environment variable is supported in the format of a comma-separated list of domain extensions proxy should not be used for. Proxy arguments passed to \*(C`new\*(C'\fR will override their corresponding environment variables.

LIMITATIONSHTTP::Tiny is conditionally compliant with the HTTP/1.1 specifications <http://www.w3.org/Protocols/>: • "Message Syntax and Routing" [RFC7230] • "Semantics and Content" [RFC7231] • "Conditional Requests" [RFC7232] • "Range Requests" [RFC7233] • "Caching" [RFC7234] • "Authentication" [RFC7235] It attempts to meet all "MUST" requirements of the specification, but does not implement all "SHOULD" requirements. (Note: it was developed against the earlier RFC 2616 specification and may not yet meet the revised RFC 7230−7235 spec.) Additionally, HTTP::Tiny supports the \*(C`PATCH\*(C'\fR method of RFC 5789. Some particular limitations of note include: • HTTP::Tiny focuses on correct transport. Users are responsible for ensuring that user-defined headers and content are compliant with the HTTP/1.1 specification. • Users must ensure that URLs are properly escaped for unsafe characters and that international domain names are properly encoded to ASCII. See URI::Escape, URI::_punycode and Net::IDN::Encode. • Redirection is very strict against the specification. Redirection is only automatic for response codes 301, 302, 307 and 308 if the request method is ​'GET' or 'HEAD'. Response code 303 is always converted into a 'GET' redirection, as mandated by the specification. There is no automatic support for status 305 ("Use proxy") redirections. • There is no provision for delaying a request body using an \*(C`Expect\*(C'\fR header. Unexpected \*(C`1XX\*(C'\fR responses are silently ignored as per the specification. • Only 'chunked' \*(C`Transfer\-Encoding\*(C'\fR is supported. • There is no support for a Request-URI of '*' for the 'OPTIONS' request. • Headers mentioned in the RFCs and some other, well-known headers are generated with their canonical case. Other headers are sent in the case provided by the user. Except for control headers (which are sent first), headers are sent in arbitrary order. Despite the limitations listed above, HTTP::Tiny is considered feature-complete. New feature requests should be directed to HTTP::Tiny::UA.

SEE ALSO• HTTP::Tiny::UA − Higher level UA features for HTTP::Tiny • HTTP::Thin − HTTP::Tiny wrapper with HTTP::Request/HTTP::Response compatibility • HTTP::Tiny::Mech − Wrap WWW::Mechanize instance in HTTP::Tiny compatible interface • IO::Socket::IP − Required for IPv6 support • IO::Socket::SSL − Required for SSL support • LWP::UserAgent − If HTTP::Tiny isn't enough for you, this is the "standard" way to do things • Mozilla::CA − Required if you want to validate SSL certificates • Net::SSLeay − Required for SSL support

SUPPORT

Bugs / Feature RequestsPlease report any bugs or feature requests through the issue tracker at <https://github.com/chansen/p5−http−tiny/issues>. You will be notified automatically of any progress on your issue.

Source CodeThis is open source software. The code repository is available for public review and contribution under the terms of the license. <https://github.com/chansen/p5−http−tiny> ​ git clone https://github.com/chansen/p5−http−tiny.git

AUTHORS• Christian Hansen <chansen@cpan.org> • David Golden <dagolden@cpan.org>

CONTRIBUTORS• Alan Gardner <gardner@pythian.com> • Alessandro Ghedini <al3xbio@gmail.com> • A. Sinan Unur <nanis@cpan.org> • Brad Gilbert <bgills@cpan.org> • brian m. carlson <sandals@crustytoothpaste.net> • Chris Nehren <apeiron@cpan.org> • Chris Weyl <cweyl@alumni.drew.edu> • Claes Jakobsson <claes@surfar.nu> • Clinton Gormley <clint@traveljury.com> • Craig A. Berry <craigberry@mac.com> • Craig Berry <cberry@cpan.org> • David Golden <xdg@xdg.me> • David Mitchell <davem@iabyn.com> • Dean Pearce <pearce@pythian.com> • Edward Zborowski <ed@rubensteintech.com> • Felipe Gasper <felipe@felipegasper.com> • Graham Knop <haarg@haarg.org> • Greg Kennedy <kennedy.greg@gmail.com> • James E Keenan <jkeenan@cpan.org> • James Raspass <jraspass@gmail.com> • Jeremy Mates <jmates@cpan.org> • Jess Robinson <castaway@desert−island.me.uk> • Karen Etheridge <ether@cpan.org> • Lukas Eklund <leklund@gmail.com> • Martin J. Evans <mjegh@ntlworld.com> • Martin-Louis Bright <mlbright@gmail.com> • Matthew Horsfall <wolfsage@gmail.com> • Michael R. Davis <mrdvt92@users.noreply.github.com> • Mike Doherty <doherty@cpan.org> • Nicolas Rochelemagne <rochelemagne@cpanel.net> • Olaf Alders <olaf@wundersolutions.com> • Olivier Mengué <dolmen@cpan.org> • Petr Písař <ppisar@redhat.com> • sanjay-cpu <snjkmr32@gmail.com> • Serguei Trouchelle <stro@cpan.org> • Shoichi Kaji <skaji@cpan.org> • SkyMarshal <skymarshal1729@gmail.com> • Sören Kornetzki <soeren.kornetzki@delti.com> • Steve Grazzini <steve.grazzini@grantstreet.com> • Syohei YOSHIDA <syohex@gmail.com> • Tatsuhiko Miyagawa <miyagawa@bulknews.net> • Tom Hukins <tom@eborcom.com> • Tony Cook <tony@develop−help.com> • Xavier Guimard <yadd@debian.org>

COPYRIGHT AND LICENSEThis software is copyright (c) 2022 by Christian Hansen. This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.
0
Johanes Gumabo
Data Size   :   80,687 byte
man-HTTP::Tiny.3pmBuild   :   2024-12-05, 20:55   :  
Visitor Screen   :   x
Visitor Counter ( page / site )   :   3 / 168,609
Visitor ID   :     :  
Visitor IP   :   18.221.221.171   :  
Visitor Provider   :   AMAZON-02   :  
Provider Position ( lat x lon )   :   39.962500 x -83.006100   :   x
Provider Accuracy Radius ( km )   :   1000   :  
Provider City   :   Columbus   :  
Provider Province   :   Ohio ,   :   ,
Provider Country   :   United States   :  
Provider Continent   :   North America   :  
Visitor Recorder   :   Version   :  
Visitor Recorder   :   Library   :  
Online Linux Manual Page   :   Version   :   Online Linux Manual Page - Fedora.40 - march=x86-64 - mtune=generic - 24.12.05
Online Linux Manual Page   :   Library   :   lib_c - 24.10.03 - march=x86-64 - mtune=generic - Fedora.40
Online Linux Manual Page   :   Library   :   lib_m - 24.10.03 - march=x86-64 - mtune=generic - Fedora.40
Data Base   :   Version   :   Online Linux Manual Page Database - 24.04.13 - march=x86-64 - mtune=generic - fedora-38
Data Base   :   Library   :   lib_c - 23.02.07 - march=x86-64 - mtune=generic - fedora.36

Very long time ago, I have the best tutor, Wenzel Svojanovsky . If someone knows the email address of Wenzel Svojanovsky , please send an email to johanes_gumabo@yahoo.co.id .
If error, please print screen and send to johanes_gumabo@yahoo.co.id
Under development. Support me via PayPal.

ERROR : Need New Coding :         (parse_manual_page_|249|HTTP::Tiny.3pm|24/25|el══─{─══.|.el══─{─══. ds C` )         (htmlprn|149|HTTP::Tiny.3pm|24/25|.el══─{─══. ds C` |.el══─{─══. ds C` )         (parse_manual_page_|249|HTTP::Tiny.3pm|27|br══─}─══|'br══─}─══ )         (htmlprn|149|HTTP::Tiny.3pm|27|'br══─}─══ |'br══─}─══ )         (rof_escape_sequence|91|HTTP::Tiny.3pm|109|\*(C`agent\*(C'\fR — A user-agent string (defaults to 'HTTP\-Tiny/$VERSION'). If \f(CW\*(C`agent\*(C'\fR — ends in a space character, the default user-agent string is appended. |\&\f(CW\*(C`agent\*(C'\fR — A user-agent string (defaults to 'HTTP\-Tiny/$VERSION'). If \f(CW\*(C`agent\*(C'\fR — ends in a space character, the default user-agent string is appended. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|111|\*(C`cookie_jar\*(C'\fR — An instance of HTTP::CookieJar — or equivalent class that supports the \f(CW\*(C`add\*(C'\fR and \f(CW\*(C`cookie_header\*(C'\fR methods |\&\f(CW\*(C`cookie_jar\*(C'\fR — An instance of HTTP::CookieJar — or equivalent class that supports the \f(CW\*(C`add\*(C'\fR and \f(CW\*(C`cookie_header\*(C'\fR methods )         (rof_escape_sequence|91|HTTP::Tiny.3pm|113|\*(C`default_headers\*(C'\fR — A hashref of default headers to apply to requests |\&\f(CW\*(C`default_headers\*(C'\fR — A hashref of default headers to apply to requests )         (rof_escape_sequence|91|HTTP::Tiny.3pm|115|\*(C`local_address\*(C'\fR — The local IP address to bind to |\&\f(CW\*(C`local_address\*(C'\fR — The local IP address to bind to )         (rof_escape_sequence|91|HTTP::Tiny.3pm|117|\*(C`keep_alive\*(C'\fR — Whether to reuse the last connection (if for the same scheme, host and port) (defaults to 1) |\&\f(CW\*(C`keep_alive\*(C'\fR — Whether to reuse the last connection (if for the same scheme, host and port) (defaults to 1) )         (rof_escape_sequence|91|HTTP::Tiny.3pm|119|\*(C`max_redirect\*(C'\fR — Maximum number of redirects allowed (defaults to 5) |\&\f(CW\*(C`max_redirect\*(C'\fR — Maximum number of redirects allowed (defaults to 5) )         (rof_escape_sequence|91|HTTP::Tiny.3pm|121|\*(C`max_size\*(C'\fR — Maximum response size in bytes (only when not using a data callback). If defined, requests with responses larger than this will return a 599 status code. |\&\f(CW\*(C`max_size\*(C'\fR — Maximum response size in bytes (only when not using a data callback). If defined, requests with responses larger than this will return a 599 status code. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|123|\*(C`http_proxy\*(C'\fR — URL of a proxy server to use for HTTP connections (default is \f(CW$ENV{http_proxy}\fR — if set) |\&\f(CW\*(C`http_proxy\*(C'\fR — URL of a proxy server to use for HTTP connections (default is \f(CW$ENV{http_proxy}\fR — if set) )         (rof_escape_sequence|91|HTTP::Tiny.3pm|125|\*(C`https_proxy\*(C'\fR — URL of a proxy server to use for HTTPS connections (default is \f(CW$ENV{https_proxy}\fR — if set) |\&\f(CW\*(C`https_proxy\*(C'\fR — URL of a proxy server to use for HTTPS connections (default is \f(CW$ENV{https_proxy}\fR — if set) )         (rof_escape_sequence|91|HTTP::Tiny.3pm|127|\*(C`proxy\*(C'\fR — URL of a generic proxy server for both HTTP and HTTPS connections (default is \f(CW$ENV{all_proxy}\fR — if set) |\&\f(CW\*(C`proxy\*(C'\fR — URL of a generic proxy server for both HTTP and HTTPS connections (default is \f(CW$ENV{all_proxy}\fR — if set) )         (rof_escape_sequence|91|HTTP::Tiny.3pm|129|\*(C`no_proxy\*(C'\fR — List of domain suffixes that should not be proxied. Must be a comma-separated string or an array reference. (default is \f(CW$ENV{no_proxy}\fR —) |\&\f(CW\*(C`no_proxy\*(C'\fR — List of domain suffixes that should not be proxied. Must be a comma-separated string or an array reference. (default is \f(CW$ENV{no_proxy}\fR —) )         (rof_escape_sequence|91|HTTP::Tiny.3pm|131|\*(C`timeout\*(C'\fR — Request timeout in seconds (default is 60) If a socket open, read or write takes longer than the timeout, the request response status code will be 599. |\&\f(CW\*(C`timeout\*(C'\fR — Request timeout in seconds (default is 60) If a socket open, read or write takes longer than the timeout, the request response status code will be 599. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|133|\*(C`verify_SSL\*(C'\fR — A boolean that indicates whether to validate the SSL certificate of an \f(CW\*(C`https\*(C'\fR — connection (default is false) |\&\f(CW\*(C`verify_SSL\*(C'\fR — A boolean that indicates whether to validate the SSL certificate of an \f(CW\*(C`https\*(C'\fR — connection (default is false) )         (rof_escape_sequence|91|HTTP::Tiny.3pm|135|\*(C`SSL_options\*(C'\fR — A hashref of \f(CW\*(C`SSL_*\*(C'\fR — options to pass through to IO::Socket::SSL |\&\f(CW\*(C`SSL_options\*(C'\fR — A hashref of \f(CW\*(C`SSL_*\*(C'\fR — options to pass through to IO::Socket::SSL )         (rof_escape_sequence|91|HTTP::Tiny.3pm|139|\*(C`undef\*(C'\fR for \f(CW\*(C`proxy\*(C'\fR, \f(CW\*(C`http_proxy\*(C'\fR or \f(CW\*(C`https_proxy\*(C'\fR will |Passing an explicit \f(CW\*(C`undef\*(C'\fR for \f(CW\*(C`proxy\*(C'\fR, \f(CW\*(C`http_proxy\*(C'\fR or \f(CW\*(C`https_proxy\*(C'\fR will )         (rof_escape_sequence|91|HTTP::Tiny.3pm|146|\*(C`keep_alive\*(C'\fR parameter enables a persistent connection, but only to a |The \f(CW\*(C`keep_alive\*(C'\fR parameter enables a persistent connection, but only to a )         (rof_escape_sequence|91|HTTP::Tiny.3pm|152|\*(C`verify_SSL\*(C'\fR and \f(CW\*(C`SSL_options\*(C'\fR attributes. |See "SSL SUPPORT" for more on the \f(CW\*(C`verify_SSL\*(C'\fR and \f(CW\*(C`SSL_options\*(C'\fR attributes. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|165|\*(C`success\*(C'\fR field of the response will be true if the status code is 2XX. |The \f(CW\*(C`success\*(C'\fR field of the response will be true if the status code is 2XX. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|173|\*(C`POST\*(C'\fR request and sends the key/value pairs from a |This method executes a \f(CW\*(C`POST\*(C'\fR request and sends the key/value pairs from a )         (rof_escape_sequence|91|HTTP::Tiny.3pm|174|\*(C`content\-type\*(C'\fR of |form data hash or array reference to the given URL with a \f(CW\*(C`content\-type\*(C'\fR of )         (rof_escape_sequence|91|HTTP::Tiny.3pm|175|\*(C`application/x\-www\-form\-urlencoded\*(C'\fR. If data is provided as an array |\&\f(CW\*(C`application/x\-www\-form\-urlencoded\*(C'\fR. If data is provided as an array )         (rof_escape_sequence|91|HTTP::Tiny.3pm|178|\*(C`www_form_urlencode\*(C'\fR method for details on the encoding. |\&\f(CW\*(C`www_form_urlencode\*(C'\fR method for details on the encoding. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|182|\*(C`content\-type\*(C'\fR header or content in the options hashref will be ignored. |Any \f(CW\*(C`content\-type\*(C'\fR header or content in the options hashref will be ignored. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|184|\*(C`success\*(C'\fR field of the response will be true if the status code is 2XX. |The \f(CW\*(C`success\*(C'\fR field of the response will be true if the status code is 2XX. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|194|\*(C`GET\*(C'\fR request for the URL and saves the response body to the file |Executes a \f(CW\*(C`GET\*(C'\fR request for the URL and saves the response body to the file )         (rof_escape_sequence|91|HTTP::Tiny.3pm|197|\*(C`If\-Modified\-Since\*(C'\fR header with the modification timestamp of the file. You |\&\f(CW\*(C`If\-Modified\-Since\*(C'\fR header with the modification timestamp of the file. You )         (rof_escape_sequence|91|HTTP::Tiny.3pm|198|\*(C`If\-Modified\-Since\*(C'\fR header yourself in the \f(CW\*(C`$options\->{headers}\*(C'\fR hash. |may specify a different \f(CW\*(C`If\-Modified\-Since\*(C'\fR header yourself in the \f(CW\*(C`$options\->{headers}\*(C'\fR hash. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|200|\*(C`success\*(C'\fR field of the response will be true if the status code is 2XX |The \f(CW\*(C`success\*(C'\fR field of the response will be true if the status code is 2XX )         (rof_escape_sequence|91|HTTP::Tiny.3pm|204|\*(C`Last\-Modified\*(C'\fR header, the file modification time will |formatted \f(CW\*(C`Last\-Modified\*(C'\fR header, the file modification time will )         (rof_escape_sequence|91|HTTP::Tiny.3pm|218|\*(C`get\*(C'\fR when you really want \f(CW\*(C`GET\*(C'\fR. See LIMITATIONS for |Don't use \f(CW\*(C`get\*(C'\fR when you really want \f(CW\*(C`GET\*(C'\fR. See LIMITATIONS for )         (rof_escape_sequence|91|HTTP::Tiny.3pm|240|\*(C`headers\*(C'\fR — A hashref containing headers to include with the request. If the value for a header is an array reference, the header will be output multiple times with each value in the array. These headers over-write any default headers. |\&\f(CW\*(C`headers\*(C'\fR — A hashref containing headers to include with the request. If the value for a header is an array reference, the header will be output multiple times with each value in the array. These headers over-write any default headers. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|242|\*(C`content\*(C'\fR — A scalar to include as the body of the request OR a code reference that will be called iteratively to produce the body of the request |\&\f(CW\*(C`content\*(C'\fR — A scalar to include as the body of the request OR a code reference that will be called iteratively to produce the body of the request )         (rof_escape_sequence|91|HTTP::Tiny.3pm|244|\*(C`trailer_callback\*(C'\fR — A code reference that will be called if it exists to provide a hashref of trailing headers (only used with chunked transfer-encoding) |\&\f(CW\*(C`trailer_callback\*(C'\fR — A code reference that will be called if it exists to provide a hashref of trailing headers (only used with chunked transfer-encoding) )         (rof_escape_sequence|91|HTTP::Tiny.3pm|246|\*(C`data_callback\*(C'\fR — A code reference that will be called for each chunks of the response body received. |\&\f(CW\*(C`data_callback\*(C'\fR — A code reference that will be called for each chunks of the response body received. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|248|\*(C`peer\*(C'\fR — Override host resolution and force all connections to go only to a specific peer address, regardless of the URL of the request. This will include any redirections! This options should be used with extreme caution (e.g. debugging or very special circumstances). It can be given as either a scalar or a code reference that will receive the hostname and whose response will be taken as the address. |\&\f(CW\*(C`peer\*(C'\fR — Override host resolution and force all connections to go only to a specific peer address, regardless of the URL of the request. This will include any redirections! This options should be used with extreme caution (e.g. debugging or very special circumstances). It can be given as either a scalar or a code reference that will receive the hostname and whose response will be taken as the address. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|250|\*(C`Host\*(C'\fR header is generated from the URL in accordance with RFC 2616. It |The \f(CW\*(C`Host\*(C'\fR header is generated from the URL in accordance with RFC 2616. It )         (rof_escape_sequence|91|HTTP::Tiny.3pm|251|\*(C`Host\*(C'\fR in the \f(CW\*(C`headers\*(C'\fR option. Other headers |is a fatal error to specify \f(CW\*(C`Host\*(C'\fR in the \f(CW\*(C`headers\*(C'\fR option. Other headers )         (rof_escape_sequence|91|HTTP::Tiny.3pm|254|\*(C`content\*(C'\fR option is a code reference, it will be called iteratively |If the \f(CW\*(C`content\*(C'\fR option is a code reference, it will be called iteratively )         (rof_escape_sequence|91|HTTP::Tiny.3pm|258|\*(C`content\*(C'\fR option is the empty string, no \f(CW\*(C`content\-type\*(C'\fR or |If the \f(CW\*(C`content\*(C'\fR option is the empty string, no \f(CW\*(C`content\-type\*(C'\fR or )         (rof_escape_sequence|91|HTTP::Tiny.3pm|259|\*(C`content\-length\*(C'\fR headers will be generated. |\&\f(CW\*(C`content\-length\*(C'\fR headers will be generated. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|261|\*(C`data_callback\*(C'\fR option is provided, it will be called iteratively until |If the \f(CW\*(C`data_callback\*(C'\fR option is provided, it will be called iteratively until )         (rof_escape_sequence|91|HTTP::Tiny.3pm|265|\*(C`status\*(C'\fR or \f(CW\*(C`headers\*(C'\fR |customizing the action of the callback based on the \f(CW\*(C`status\*(C'\fR or \f(CW\*(C`headers\*(C'\fR )         (rof_escape_sequence|91|HTTP::Tiny.3pm|272|\*(C`request\*(C'\fR method returns a hashref containing the response. The hashref |The \f(CW\*(C`request\*(C'\fR method returns a hashref containing the response. The hashref )         (rof_escape_sequence|91|HTTP::Tiny.3pm|275|\*(C`success\*(C'\fR — Boolean indicating whether the operation returned a 2XX status code |\&\f(CW\*(C`success\*(C'\fR — Boolean indicating whether the operation returned a 2XX status code )         (rof_escape_sequence|91|HTTP::Tiny.3pm|277|\*(C`url\*(C'\fR — URL that provided the response. This is the URL of the request unless there were redirections, in which case it is the last URL queried in a redirection chain |\&\f(CW\*(C`url\*(C'\fR — URL that provided the response. This is the URL of the request unless there were redirections, in which case it is the last URL queried in a redirection chain )         (rof_escape_sequence|91|HTTP::Tiny.3pm|279|\*(C`status\*(C'\fR — The HTTP status code of the response |\&\f(CW\*(C`status\*(C'\fR — The HTTP status code of the response )         (rof_escape_sequence|91|HTTP::Tiny.3pm|281|\*(C`reason\*(C'\fR — The response phrase returned by the server |\&\f(CW\*(C`reason\*(C'\fR — The response phrase returned by the server )         (rof_escape_sequence|91|HTTP::Tiny.3pm|283|\*(C`content\*(C'\fR — The body of the response. If the response does not have any content or if a data callback is provided to consume the response body, this will be the empty string |\&\f(CW\*(C`content\*(C'\fR — The body of the response. If the response does not have any content or if a data callback is provided to consume the response body, this will be the empty string )         (rof_escape_sequence|91|HTTP::Tiny.3pm|285|\*(C`headers\*(C'\fR — A hashref of header fields. All header field names will be normalized to be lower case. If a header is repeated, the value will be an arrayref; it will otherwise be a scalar string containing the value |\&\f(CW\*(C`headers\*(C'\fR — A hashref of header fields. All header field names will be normalized to be lower case. If a header is repeated, the value will be an arrayref; it will otherwise be a scalar string containing the value )         (rof_escape_sequence|91|HTTP::Tiny.3pm|287|\*(C`protocol\*(C'\fR \- If this field exists, it is the protocol of the response such as HTTP/1.0 or HTTP/1.1 |\&\f(CW\*(C`protocol\*(C'\fR \- If this field exists, it is the protocol of the response such as HTTP/1.0 or HTTP/1.1 )         (rof_escape_sequence|91|HTTP::Tiny.3pm|289|\*(C`redirects\*(C'\fR If this field exists, it is an arrayref of response hash references from redirects in the same order that redirections occurred. If it does not exist, then no redirections occurred. |\&\f(CW\*(C`redirects\*(C'\fR If this field exists, it is an arrayref of response hash references from redirects in the same order that redirections occurred. If it does not exist, then no redirections occurred. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|291|\*(C`status\*(C'\fR field will |On an error during the execution of the request, the \f(CW\*(C`status\*(C'\fR field will )         (rof_escape_sequence|91|HTTP::Tiny.3pm|292|\*(C`content\*(C'\fR field will contain the text of the error. |contain 599, and the \f(CW\*(C`content\*(C'\fR field will contain the text of the error. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|301|\*(C`x\-www\-form\-urlencoded\*(C'\fR string. The keys and values from the data |into a \f(CW\*(C`x\-www\-form\-urlencoded\*(C'\fR string. The keys and values from the data )         (rof_escape_sequence|91|HTTP::Tiny.3pm|316|\*(C`SSL_verify\*(C'\fR is true or if \f(CW\*(C`SSL_verify_mode\*(C'\fR |When called as an object methods, if \f(CW\*(C`SSL_verify\*(C'\fR is true or if \f(CW\*(C`SSL_verify_mode\*(C'\fR )         (rof_escape_sequence|91|HTTP::Tiny.3pm|317|\*(C`SSL_options\*(C'\fR, it checks that a CA file is available. |is set in \f(CW\*(C`SSL_options\*(C'\fR, it checks that a CA file is available. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|329|\*(C`keep_alive\*(C'\fR |Indicates if a connection to a peer is being kept alive, per the \f(CW\*(C`keep_alive\*(C'\fR )         (rof_escape_sequence|91|HTTP::Tiny.3pm|333|\*(C`undef\*(C'\fR (if no peer is connected). |\&\f(CW\*(C`undef\*(C'\fR (if no peer is connected). )         (rof_escape_sequence|91|HTTP::Tiny.3pm|341|\*(C`https\*(C'\fR connections are supported only if IO::Socket::SSL 1.56 or |Direct \f(CW\*(C`https\*(C'\fR connections are supported only if IO::Socket::SSL 1.56 or )         (rof_escape_sequence|91|HTTP::Tiny.3pm|347|\*(C`https\*(C'\fR connection may be made via an \f(CW\*(C`http\*(C'\fR proxy that supports the CONNECT |An \f(CW\*(C`https\*(C'\fR connection may be made via an \f(CW\*(C`http\*(C'\fR proxy that supports the CONNECT )         (rof_escape_sequence|91|HTTP::Tiny.3pm|348|\*(C`https\*(C'\fR via a proxy that itself |command (i.e. RFC 2817). You may not proxy \f(CW\*(C`https\*(C'\fR via a proxy that itself )         (rof_escape_sequence|91|HTTP::Tiny.3pm|349|\*(C`https\*(C'\fR to communicate. |requires \f(CW\*(C`https\*(C'\fR to communicate. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|369|\*(C`verify_SSL\*(C'\fR attribute to a true value will make HTTP::Tiny verify |Setting the \f(CW\*(C`verify_SSL\*(C'\fR attribute to a true value will make HTTP::Tiny verify )         (rof_escape_sequence|91|HTTP::Tiny.3pm|378|\*(C`SSL_CERT_FILE\*(C'\fR is present, HTTP::Tiny |If the environment variable \f(CW\*(C`SSL_CERT_FILE\*(C'\fR is present, HTTP::Tiny )         (rof_escape_sequence|91|HTTP::Tiny.3pm|395|\*(C`verify_SSL\*(C'\fR is true and no CA certificate file |An error will be occur if \f(CW\*(C`verify_SSL\*(C'\fR is true and no CA certificate file )         (rof_escape_sequence|91|HTTP::Tiny.3pm|398|\*(C`SSL_options\*(C'\fR attribute |If you desire complete control over SSL connections, the \f(CW\*(C`SSL_options\*(C'\fR attribute )         (rof_escape_sequence|91|HTTP::Tiny.3pm|409|\*(C`SSL_options\*(C'\fR attribute could also be used for such things as providing a |The \f(CW\*(C`SSL_options\*(C'\fR attribute could also be used for such things as providing a )         (rof_escape_sequence|91|HTTP::Tiny.3pm|415|\*(C`http\*(C'\fR and \f(CW\*(C`https\*(C'\fR requests. Only Basic proxy |HTTP::Tiny can proxy both \f(CW\*(C`http\*(C'\fR and \f(CW\*(C`https\*(C'\fR requests. Only Basic proxy )         (rof_escape_sequence|91|HTTP::Tiny.3pm|417|\*(C`http://user:pass@proxy.example.com/\*(C'\fR. |\&\f(CW\*(C`http://user:pass@proxy.example.com/\*(C'\fR. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|427|\*(C`REQUEST_METHOD\*(C'\fR environment variable is set, then this might be a CGI |If the \f(CW\*(C`REQUEST_METHOD\*(C'\fR environment variable is set, then this might be a CGI )         (rof_escape_sequence|91|HTTP::Tiny.3pm|428|\*(C`HTTP_PROXY\*(C'\fR would be set from the \f(CW\*(C`Proxy:\*(C'\fR header, which is a |process and \f(CW\*(C`HTTP_PROXY\*(C'\fR would be set from the \f(CW\*(C`Proxy:\*(C'\fR header, which is a )         (rof_escape_sequence|91|HTTP::Tiny.3pm|429|\*(C`REQUEST_METHOD\*(C'\fR is set, \f(CW\*(C`HTTP_PROXY\*(C'\fR (the upper case |security risk. If \f(CW\*(C`REQUEST_METHOD\*(C'\fR is set, \f(CW\*(C`HTTP_PROXY\*(C'\fR (the upper case )         (rof_escape_sequence|91|HTTP::Tiny.3pm|430|\*(C`CGI_HTTP_PROXY\*(C'\fR is considered instead. |variant only) is ignored, but \f(CW\*(C`CGI_HTTP_PROXY\*(C'\fR is considered instead. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|432|\*(C`https\*(C'\fR over an \f(CW\*(C`http\*(C'\fR proxy using the CONNECT method is |Tunnelling \f(CW\*(C`https\*(C'\fR over an \f(CW\*(C`http\*(C'\fR proxy using the CONNECT method is )         (rof_escape_sequence|91|HTTP::Tiny.3pm|433|\*(C`https\*(C'\fR itself, you can not tunnel \f(CW\*(C`https\*(C'\fR |supported. If your proxy uses \f(CW\*(C`https\*(C'\fR itself, you can not tunnel \f(CW\*(C`https\*(C'\fR )         (rof_escape_sequence|91|HTTP::Tiny.3pm|436|\*(C`https\*(C'\fR connection opens you to the risk of a |Be warned that proxying an \f(CW\*(C`https\*(C'\fR connection opens you to the risk of a )         (rof_escape_sequence|91|HTTP::Tiny.3pm|439|\*(C`no_proxy\*(C'\fR environment variable is supported in the format of a |The \f(CW\*(C`no_proxy\*(C'\fR environment variable is supported in the format of a )         (rof_escape_sequence|91|HTTP::Tiny.3pm|442|\*(C`new\*(C'\fR will override their corresponding |Proxy arguments passed to \f(CW\*(C`new\*(C'\fR will override their corresponding )         (rof_escape_sequence|91|HTTP::Tiny.3pm|464|\*(C`PATCH\*(C'\fR method of RFC 5789. |spec.) Additionally, HTTP::Tiny supports the \f(CW\*(C`PATCH\*(C'\fR method of RFC 5789. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|482|\*(C`Expect\*(C'\fR header. |There is no provision for delaying a request body using an \f(CW\*(C`Expect\*(C'\fR header. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|483|\*(C`1XX\*(C'\fR responses are silently ignored as per the specification. |Unexpected \f(CW\*(C`1XX\*(C'\fR responses are silently ignored as per the specification. )         (rof_escape_sequence|91|HTTP::Tiny.3pm|485|\*(C`Transfer\-Encoding\*(C'\fR is supported. |Only 'chunked' \f(CW\*(C`Transfer\-Encoding\*(C'\fR is supported. )