OXIESEC PANEL
- Current Dir:
/
/
usr
/
lib
/
ruby
/
2.5.0
/
rubygems
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
05/09/2024 07:14:11 AM
rwxr-xr-x
📄
available_set.rb
3.02 KB
02/01/2016 12:43:26 PM
rw-r--r--
📄
basic_specification.rb
7.36 KB
10/20/2017 09:03:37 AM
rw-r--r--
📄
bundler_version_finder.rb
3.09 KB
10/08/2017 01:32:22 AM
rw-r--r--
📄
command.rb
13.98 KB
12/25/2017 05:54:27 AM
rw-r--r--
📄
command_manager.rb
4.77 KB
05/15/2023 11:41:43 AM
rw-r--r--
📁
commands
-
05/09/2024 07:14:11 AM
rwxr-xr-x
📄
compatibility.rb
1.66 KB
02/01/2016 12:43:26 PM
rw-r--r--
📄
config_file.rb
12.51 KB
03/19/2018 08:27:04 AM
rw-r--r--
📁
core_ext
-
05/09/2024 07:14:11 AM
rwxr-xr-x
📄
defaults.rb
4.46 KB
06/24/2016 04:13:11 AM
rw-r--r--
📄
dependency.rb
8.38 KB
10/08/2017 01:32:18 AM
rw-r--r--
📄
dependency_installer.rb
14.17 KB
10/08/2017 01:32:18 AM
rw-r--r--
📄
dependency_list.rb
5.55 KB
05/01/2017 11:40:46 AM
rw-r--r--
📄
deprecate.rb
1.73 KB
02/01/2016 12:43:26 PM
rw-r--r--
📄
doctor.rb
3.06 KB
02/01/2016 12:43:26 PM
rw-r--r--
📄
errors.rb
4.62 KB
10/08/2017 01:32:18 AM
rw-r--r--
📄
exceptions.rb
6.39 KB
10/08/2017 01:32:18 AM
rw-r--r--
📁
ext
-
05/09/2024 07:14:11 AM
rwxr-xr-x
📄
ext.rb
461 bytes
02/01/2016 12:43:26 PM
rw-r--r--
📄
gem_runner.rb
2.18 KB
10/08/2017 01:32:18 AM
rw-r--r--
📄
gemcutter_utilities.rb
4.37 KB
05/15/2023 11:41:43 AM
rw-r--r--
📄
indexer.rb
11.06 KB
03/19/2018 08:27:04 AM
rw-r--r--
📄
install_default_message.rb
337 bytes
02/01/2016 12:43:26 PM
rw-r--r--
📄
install_message.rb
311 bytes
02/01/2016 12:43:26 PM
rw-r--r--
📄
install_update_options.rb
6.89 KB
10/08/2017 01:32:18 AM
rw-r--r--
📄
installer.rb
25.11 KB
05/15/2023 11:41:43 AM
rw-r--r--
📄
installer_test_case.rb
4.41 KB
10/08/2017 01:32:18 AM
rw-r--r--
📄
local_remote_options.rb
3.4 KB
02/01/2016 12:43:26 PM
rw-r--r--
📄
mock_gem_ui.rb
1.38 KB
02/01/2016 12:43:26 PM
rw-r--r--
📄
name_tuple.rb
2.41 KB
02/01/2016 12:43:26 PM
rw-r--r--
📁
package
-
05/09/2024 07:14:11 AM
rwxr-xr-x
📄
package.rb
16.47 KB
05/15/2023 11:41:43 AM
rw-r--r--
📄
package_task.rb
3.8 KB
02/01/2016 12:43:26 PM
rw-r--r--
📄
path_support.rb
1.72 KB
03/04/2016 12:29:40 AM
rw-r--r--
📄
platform.rb
6.25 KB
05/01/2017 11:40:46 AM
rw-r--r--
📄
psych_additions.rb
300 bytes
02/01/2016 12:43:26 PM
rw-r--r--
📄
psych_tree.rb
793 bytes
02/01/2016 12:43:26 PM
rw-r--r--
📄
rdoc.rb
7.74 KB
02/01/2016 12:43:26 PM
rw-r--r--
📄
remote_fetcher.rb
11.65 KB
08/28/2017 08:31:28 AM
rw-r--r--
📁
request
-
05/09/2024 07:14:11 AM
rwxr-xr-x
📄
request.rb
8.66 KB
10/08/2017 01:32:18 AM
rw-r--r--
📁
request_set
-
05/09/2024 07:14:11 AM
rwxr-xr-x
📄
request_set.rb
10.77 KB
10/08/2017 01:32:18 AM
rw-r--r--
📄
requirement.rb
6.59 KB
10/08/2017 01:32:18 AM
rw-r--r--
📁
resolver
-
05/09/2024 07:14:11 AM
rwxr-xr-x
📄
resolver.rb
9.53 KB
10/08/2017 01:32:18 AM
rw-r--r--
📄
safe_yaml.rb
1.15 KB
11/02/2017 04:25:37 AM
rw-r--r--
📁
security
-
05/09/2024 07:14:11 AM
rwxr-xr-x
📄
security.rb
21.13 KB
03/19/2018 08:27:04 AM
rw-r--r--
📄
security_option.rb
1.06 KB
10/08/2017 01:32:22 AM
rw-r--r--
📄
server.rb
22.72 KB
03/19/2018 08:27:04 AM
rw-r--r--
📁
source
-
05/09/2024 07:14:11 AM
rwxr-xr-x
📄
source.rb
5.42 KB
03/19/2018 08:27:04 AM
rw-r--r--
📄
source_list.rb
2.53 KB
03/04/2016 12:29:40 AM
rw-r--r--
📄
source_local.rb
275 bytes
10/08/2017 01:32:18 AM
rw-r--r--
📄
source_specific_file.rb
272 bytes
10/08/2017 01:32:18 AM
rw-r--r--
📄
spec_fetcher.rb
6.47 KB
10/08/2017 01:32:18 AM
rw-r--r--
📄
specification.rb
82.65 KB
05/15/2023 11:41:43 AM
rw-r--r--
📁
ssl_certs
-
11/26/2019 12:32:04 PM
rwxr-xr-x
📄
stub_specification.rb
4.86 KB
03/19/2018 08:27:04 AM
rw-r--r--
📄
syck_hack.rb
2.12 KB
02/01/2016 12:43:26 PM
rw-r--r--
📄
test_case.rb
40.33 KB
03/19/2018 08:27:04 AM
rw-r--r--
📄
test_utilities.rb
8.63 KB
03/19/2018 08:27:04 AM
rw-r--r--
📄
text.rb
1.88 KB
08/28/2017 08:31:28 AM
rw-r--r--
📄
uninstaller.rb
8.74 KB
02/01/2016 12:43:26 PM
rw-r--r--
📄
uri_formatter.rb
792 bytes
02/01/2016 12:43:26 PM
rw-r--r--
📄
user_interaction.rb
14.54 KB
05/15/2023 11:41:43 AM
rw-r--r--
📁
util
-
05/09/2024 07:14:11 AM
rwxr-xr-x
📄
util.rb
2.57 KB
03/19/2018 08:27:04 AM
rw-r--r--
📄
validator.rb
4.23 KB
03/19/2018 08:27:04 AM
rw-r--r--
📄
version.rb
11.97 KB
10/08/2017 01:32:18 AM
rw-r--r--
📄
version_option.rb
2.03 KB
10/08/2017 01:32:18 AM
rw-r--r--
Editing: request.rb
Close
# frozen_string_literal: true require 'net/http' require 'thread' require 'time' require 'rubygems/user_interaction' class Gem::Request extend Gem::UserInteraction include Gem::UserInteraction ### # Legacy. This is used in tests. def self.create_with_proxy uri, request_class, last_modified, proxy # :nodoc: cert_files = get_cert_files proxy ||= get_proxy_from_env(uri.scheme) pool = ConnectionPools.new proxy_uri(proxy), cert_files new(uri, request_class, last_modified, pool.pool_for(uri)) end def self.proxy_uri proxy # :nodoc: case proxy when :no_proxy then nil when URI::HTTP then proxy else URI.parse(proxy) end end def initialize(uri, request_class, last_modified, pool) @uri = uri @request_class = request_class @last_modified = last_modified @requests = Hash.new 0 @user_agent = user_agent @connection_pool = pool end def proxy_uri; @connection_pool.proxy_uri; end def cert_files; @connection_pool.cert_files; end def self.get_cert_files pattern = File.expand_path("./ssl_certs/*/*.pem", File.dirname(__FILE__)) Dir.glob(pattern) end def self.configure_connection_for_https(connection, cert_files) require 'net/https' connection.use_ssl = true connection.verify_mode = Gem.configuration.ssl_verify_mode || OpenSSL::SSL::VERIFY_PEER store = OpenSSL::X509::Store.new if Gem.configuration.ssl_client_cert then pem = File.read Gem.configuration.ssl_client_cert connection.cert = OpenSSL::X509::Certificate.new pem connection.key = OpenSSL::PKey::RSA.new pem end store.set_default_paths cert_files.each do |ssl_cert_file| store.add_file ssl_cert_file end if Gem.configuration.ssl_ca_cert if File.directory? Gem.configuration.ssl_ca_cert store.add_path Gem.configuration.ssl_ca_cert else store.add_file Gem.configuration.ssl_ca_cert end end connection.cert_store = store connection.verify_callback = proc do |preverify_ok, store_context| verify_certificate store_context unless preverify_ok preverify_ok end connection rescue LoadError => e raise unless (e.respond_to?(:path) && e.path == 'openssl') || e.message =~ / -- openssl$/ raise Gem::Exception.new( 'Unable to require openssl, install OpenSSL and rebuild Ruby (preferred) or use non-HTTPS sources') end def self.verify_certificate store_context depth = store_context.error_depth error = store_context.error_string number = store_context.error cert = store_context.current_cert ui.alert_error "SSL verification error at depth #{depth}: #{error} (#{number})" extra_message = verify_certificate_message number, cert ui.alert_error extra_message if extra_message end def self.verify_certificate_message error_number, cert return unless cert case error_number when OpenSSL::X509::V_ERR_CERT_HAS_EXPIRED then "Certificate #{cert.subject} expired at #{cert.not_after.iso8601}" when OpenSSL::X509::V_ERR_CERT_NOT_YET_VALID then "Certificate #{cert.subject} not valid until #{cert.not_before.iso8601}" when OpenSSL::X509::V_ERR_CERT_REJECTED then "Certificate #{cert.subject} is rejected" when OpenSSL::X509::V_ERR_CERT_UNTRUSTED then "Certificate #{cert.subject} is not trusted" when OpenSSL::X509::V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT then "Certificate #{cert.issuer} is not trusted" when OpenSSL::X509::V_ERR_INVALID_CA then "Certificate #{cert.subject} is an invalid CA certificate" when OpenSSL::X509::V_ERR_INVALID_PURPOSE then "Certificate #{cert.subject} has an invalid purpose" when OpenSSL::X509::V_ERR_SELF_SIGNED_CERT_IN_CHAIN then "Root certificate is not trusted (#{cert.subject})" when OpenSSL::X509::V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, OpenSSL::X509::V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE then "You must add #{cert.issuer} to your local trusted store" end end ## # Creates or an HTTP connection based on +uri+, or retrieves an existing # connection, using a proxy if needed. def connection_for(uri) @connection_pool.checkout rescue defined?(OpenSSL::SSL) ? OpenSSL::SSL::SSLError : Errno::EHOSTDOWN, Errno::EHOSTDOWN => e raise Gem::RemoteFetcher::FetchError.new(e.message, uri) end def fetch request = @request_class.new @uri.request_uri unless @uri.nil? || @uri.user.nil? || @uri.user.empty? then request.basic_auth Gem::UriFormatter.new(@uri.user).unescape, Gem::UriFormatter.new(@uri.password).unescape end request.add_field 'User-Agent', @user_agent request.add_field 'Connection', 'keep-alive' request.add_field 'Keep-Alive', '30' if @last_modified then request.add_field 'If-Modified-Since', @last_modified.httpdate end yield request if block_given? perform_request request end ## # Returns a proxy URI for the given +scheme+ if one is set in the # environment variables. def self.get_proxy_from_env scheme = 'http' _scheme = scheme.downcase _SCHEME = scheme.upcase env_proxy = ENV["#{_scheme}_proxy"] || ENV["#{_SCHEME}_PROXY"] no_env_proxy = env_proxy.nil? || env_proxy.empty? return get_proxy_from_env 'http' if no_env_proxy and _scheme != 'http' return :no_proxy if no_env_proxy uri = URI(Gem::UriFormatter.new(env_proxy).normalize) if uri and uri.user.nil? and uri.password.nil? then user = ENV["#{_scheme}_proxy_user"] || ENV["#{_SCHEME}_PROXY_USER"] password = ENV["#{_scheme}_proxy_pass"] || ENV["#{_SCHEME}_PROXY_PASS"] uri.user = Gem::UriFormatter.new(user).escape uri.password = Gem::UriFormatter.new(password).escape end uri end def perform_request request # :nodoc: connection = connection_for @uri retried = false bad_response = false begin @requests[connection.object_id] += 1 verbose "#{request.method} #{@uri}" file_name = File.basename(@uri.path) # perform download progress reporter only for gems if request.response_body_permitted? && file_name =~ /\.gem$/ reporter = ui.download_reporter response = connection.request(request) do |incomplete_response| if Net::HTTPOK === incomplete_response reporter.fetch(file_name, incomplete_response.content_length) downloaded = 0 data = String.new incomplete_response.read_body do |segment| data << segment downloaded += segment.length reporter.update(downloaded) end reporter.done if incomplete_response.respond_to? :body= incomplete_response.body = data else incomplete_response.instance_variable_set(:@body, data) end end end else response = connection.request request end verbose "#{response.code} #{response.message}" rescue Net::HTTPBadResponse verbose "bad response" reset connection raise Gem::RemoteFetcher::FetchError.new('too many bad responses', @uri) if bad_response bad_response = true retry rescue Net::HTTPFatalError verbose "fatal error" raise Gem::RemoteFetcher::FetchError.new('fatal error', @uri) # HACK work around EOFError bug in Net::HTTP # NOTE Errno::ECONNABORTED raised a lot on Windows, and make impossible # to install gems. rescue EOFError, Timeout::Error, Errno::ECONNABORTED, Errno::ECONNRESET, Errno::EPIPE requests = @requests[connection.object_id] verbose "connection reset after #{requests} requests, retrying" raise Gem::RemoteFetcher::FetchError.new('too many connection resets', @uri) if retried reset connection retried = true retry end response ensure @connection_pool.checkin connection end ## # Resets HTTP connection +connection+. def reset(connection) @requests.delete connection.object_id connection.finish connection.start end def user_agent ua = "RubyGems/#{Gem::VERSION} #{Gem::Platform.local}".dup ruby_version = RUBY_VERSION ruby_version += 'dev' if RUBY_PATCHLEVEL == -1 ua << " Ruby/#{ruby_version} (#{RUBY_RELEASE_DATE}" if RUBY_PATCHLEVEL >= 0 then ua << " patchlevel #{RUBY_PATCHLEVEL}" elsif defined?(RUBY_REVISION) then ua << " revision #{RUBY_REVISION}" end ua << ")" ua << " #{RUBY_ENGINE}" if defined?(RUBY_ENGINE) and RUBY_ENGINE != 'ruby' ua end end require 'rubygems/request/http_pool' require 'rubygems/request/https_pool' require 'rubygems/request/connection_pools'