SILENT KILLERPanel

Current Path: > > opt > alt > ruby32 > > share > rubygems > rubygems


Operation   : Linux premium131.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
Software     : Apache
Server IP    : 162.0.232.56 | Your IP: 216.73.216.111
Domains      : 1034 Domain(s)
Permission   : [ 0755 ]

Files and Folders in: //opt/alt/ruby32//share/rubygems/rubygems

NameTypeSizeLast ModifiedActions
commands Directory - -
core_ext Directory - -
defaults Directory - -
ext Directory - -
gemcutter_utilities Directory - -
optparse Directory - -
package Directory - -
request Directory - -
request_set Directory - -
resolver Directory - -
security Directory - -
source Directory - -
ssl_certs Directory - -
tsort Directory - -
util Directory - -
available_set.rb File 3086 bytes April 24 2025 07:53:50.
basic_specification.rb File 7836 bytes April 24 2025 07:53:50.
bundler_version_finder.rb File 2010 bytes April 24 2025 07:53:50.
command.rb File 16463 bytes April 24 2025 07:53:50.
command_manager.rb File 5726 bytes April 24 2025 07:53:50.
compatibility.rb File 1027 bytes April 24 2025 07:53:50.
config_file.rb File 14367 bytes April 24 2025 07:53:50.
defaults.rb File 7122 bytes April 24 2025 07:53:50.
dependency.rb File 8854 bytes April 24 2025 07:53:50.
dependency_installer.rb File 10256 bytes April 24 2025 07:53:50.
dependency_list.rb File 5676 bytes April 24 2025 07:53:50.
deprecate.rb File 5007 bytes April 24 2025 07:53:50.
doctor.rb File 3205 bytes April 24 2025 07:53:50.
errors.rb File 4634 bytes April 24 2025 07:53:50.
exceptions.rb File 7516 bytes April 24 2025 07:53:50.
ext.rb File 498 bytes April 24 2025 07:53:50.
gem_runner.rb File 1839 bytes April 24 2025 07:53:50.
gemcutter_utilities.rb File 10788 bytes April 24 2025 07:53:50.
indexer.rb File 11169 bytes April 24 2025 07:53:50.
install_default_message.rb File 349 bytes April 24 2025 07:53:50.
install_message.rb File 323 bytes April 24 2025 07:53:50.
install_update_options.rb File 6507 bytes April 24 2025 07:53:50.
installer.rb File 27885 bytes April 24 2025 07:53:50.
installer_uninstaller_utils.rb File 773 bytes April 24 2025 07:53:50.
local_remote_options.rb File 3647 bytes April 24 2025 07:53:50.
mock_gem_ui.rb File 1413 bytes April 24 2025 07:53:50.
name_tuple.rb File 2445 bytes April 24 2025 07:53:50.
openssl.rb File 125 bytes April 24 2025 07:53:50.
optparse.rb File 72 bytes April 24 2025 07:53:50.
package.rb File 18120 bytes April 24 2025 07:53:50.
package_task.rb File 3885 bytes April 24 2025 07:53:50.
path_support.rb File 1828 bytes April 24 2025 07:53:50.
platform.rb File 7663 bytes April 24 2025 07:53:50.
psych_tree.rb File 795 bytes April 24 2025 07:53:50.
query_utils.rb File 8699 bytes April 24 2025 07:53:50.
rdoc.rb File 232 bytes April 24 2025 07:53:50.
remote_fetcher.rb File 9417 bytes April 24 2025 07:53:50.
request.rb File 8803 bytes April 24 2025 07:53:50.
request_set.rb File 11582 bytes April 24 2025 07:53:50.
requirement.rb File 7055 bytes April 24 2025 07:53:50.
resolver.rb File 9870 bytes April 24 2025 07:53:50.
s3_uri_signer.rb File 6066 bytes April 24 2025 07:53:50.
safe_yaml.rb File 1578 bytes April 24 2025 07:53:50.
security.rb File 22476 bytes April 24 2025 07:53:50.
security_option.rb File 1084 bytes April 24 2025 07:53:50.
shellwords.rb File 66 bytes April 24 2025 07:53:50.
source.rb File 5710 bytes April 24 2025 07:53:50.
source_list.rb File 2466 bytes April 24 2025 07:53:50.
spec_fetcher.rb File 6515 bytes April 24 2025 07:53:50.
specification.rb File 72144 bytes April 24 2025 07:53:50.
specification_policy.rb File 14124 bytes April 24 2025 07:53:50.
stub_specification.rb File 4569 bytes April 24 2025 07:53:50.
text.rb File 2117 bytes April 24 2025 07:53:50.
tsort.rb File 66 bytes April 24 2025 07:53:50.
uninstaller.rb File 10445 bytes April 24 2025 07:53:50.
unknown_command_spell_checker.rb File 411 bytes April 24 2025 07:53:50.
update_suggestion.rb File 2313 bytes April 24 2025 07:53:50.
uri.rb File 2382 bytes April 24 2025 07:53:50.
uri_formatter.rb File 781 bytes April 24 2025 07:53:50.
user_interaction.rb File 13354 bytes April 24 2025 07:53:50.
util.rb File 2465 bytes April 24 2025 07:53:50.
validator.rb File 3744 bytes April 24 2025 07:53:50.
version.rb File 12870 bytes April 24 2025 07:53:50.
version_option.rb File 2262 bytes April 24 2025 07:53:50.

Reading File: //opt/alt/ruby32//share/rubygems/rubygems/request.rb

# frozen_string_literal: true

require "net/http"
require_relative "user_interaction"

class Gem::Request
  extend Gem::UserInteraction
  include Gem::UserInteraction

  ###
  # Legacy.  This is used in tests.
  def self.create_with_proxy(uri, request_class, last_modified, proxy) # :nodoc:
    cert_files = get_cert_files
    proxy ||= get_proxy_from_env(uri.scheme)
    pool = ConnectionPools.new proxy_uri(proxy), cert_files

    new(uri, request_class, last_modified, pool.pool_for(uri))
  end

  def self.proxy_uri(proxy) # :nodoc:
    require "uri"
    case proxy
    when :no_proxy then nil
    when URI::HTTP then proxy
    else URI.parse(proxy)
    end
  end

  def initialize(uri, request_class, last_modified, pool)
    @uri = uri
    @request_class = request_class
    @last_modified = last_modified
    @requests = Hash.new 0
    @user_agent = user_agent

    @connection_pool = pool
  end

  def proxy_uri; @connection_pool.proxy_uri; end
  def cert_files; @connection_pool.cert_files; end

  def self.get_cert_files
    pattern = File.expand_path("./ssl_certs/*/*.pem", __dir__)
    Dir.glob(pattern)
  end

  def self.configure_connection_for_https(connection, cert_files)
    raise Gem::Exception.new("OpenSSL is not available. Install OpenSSL and rebuild Ruby (preferred) or use non-HTTPS sources") unless Gem::HAVE_OPENSSL

    connection.use_ssl = true
    connection.verify_mode =
      Gem.configuration.ssl_verify_mode || OpenSSL::SSL::VERIFY_PEER
    store = OpenSSL::X509::Store.new

    if Gem.configuration.ssl_client_cert
      pem = File.read Gem.configuration.ssl_client_cert
      connection.cert = OpenSSL::X509::Certificate.new pem
      connection.key = OpenSSL::PKey::RSA.new pem
    end

    store.set_default_paths
    cert_files.each do |ssl_cert_file|
      store.add_file ssl_cert_file
    end
    if Gem.configuration.ssl_ca_cert
      if File.directory? Gem.configuration.ssl_ca_cert
        store.add_path Gem.configuration.ssl_ca_cert
      else
        store.add_file Gem.configuration.ssl_ca_cert
      end
    end
    connection.cert_store = store

    connection.verify_callback = proc do |preverify_ok, store_context|
      verify_certificate store_context unless preverify_ok

      preverify_ok
    end

    connection
  end

  def self.verify_certificate(store_context)
    depth  = store_context.error_depth
    error  = store_context.error_string
    number = store_context.error
    cert   = store_context.current_cert

    ui.alert_error "SSL verification error at depth #{depth}: #{error} (#{number})"

    extra_message = verify_certificate_message number, cert

    ui.alert_error extra_message if extra_message
  end

  def self.verify_certificate_message(error_number, cert)
    return unless cert
    case error_number
    when OpenSSL::X509::V_ERR_CERT_HAS_EXPIRED then
      require "time"
      "Certificate #{cert.subject} expired at #{cert.not_after.iso8601}"
    when OpenSSL::X509::V_ERR_CERT_NOT_YET_VALID then
      require "time"
      "Certificate #{cert.subject} not valid until #{cert.not_before.iso8601}"
    when OpenSSL::X509::V_ERR_CERT_REJECTED then
      "Certificate #{cert.subject} is rejected"
    when OpenSSL::X509::V_ERR_CERT_UNTRUSTED then
      "Certificate #{cert.subject} is not trusted"
    when OpenSSL::X509::V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT then
      "Certificate #{cert.issuer} is not trusted"
    when OpenSSL::X509::V_ERR_INVALID_CA then
      "Certificate #{cert.subject} is an invalid CA certificate"
    when OpenSSL::X509::V_ERR_INVALID_PURPOSE then
      "Certificate #{cert.subject} has an invalid purpose"
    when OpenSSL::X509::V_ERR_SELF_SIGNED_CERT_IN_CHAIN then
      "Root certificate is not trusted (#{cert.subject})"
    when OpenSSL::X509::V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY then
      "You must add #{cert.issuer} to your local trusted store"
    when
      OpenSSL::X509::V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE then
      "Cannot verify certificate issued by #{cert.issuer}"
    end
  end

  ##
  # Creates or an HTTP connection based on +uri+, or retrieves an existing
  # connection, using a proxy if needed.

  def connection_for(uri)
    @connection_pool.checkout
  rescue Gem::HAVE_OPENSSL ? OpenSSL::SSL::SSLError : Errno::EHOSTDOWN,
         Errno::EHOSTDOWN => e
    raise Gem::RemoteFetcher::FetchError.new(e.message, uri)
  end

  def fetch
    request = @request_class.new @uri.request_uri

    unless @uri.nil? || @uri.user.nil? || @uri.user.empty?
      request.basic_auth Gem::UriFormatter.new(@uri.user).unescape,
                         Gem::UriFormatter.new(@uri.password).unescape
    end

    request.add_field "User-Agent", @user_agent
    request.add_field "Connection", "keep-alive"
    request.add_field "Keep-Alive", "30"

    if @last_modified
      require "time"
      request.add_field "If-Modified-Since", @last_modified.httpdate
    end

    yield request if block_given?

    perform_request request
  end

  ##
  # Returns a proxy URI for the given +scheme+ if one is set in the
  # environment variables.

  def self.get_proxy_from_env(scheme = "http")
    _scheme = scheme.downcase
    _SCHEME = scheme.upcase
    env_proxy = ENV["#{_scheme}_proxy"] || ENV["#{_SCHEME}_PROXY"]

    no_env_proxy = env_proxy.nil? || env_proxy.empty?

    if no_env_proxy
      return (_scheme == "https" || _scheme == "http") ?
        :no_proxy : get_proxy_from_env("http")
    end

    require "uri"
    uri = URI(Gem::UriFormatter.new(env_proxy).normalize)

    if uri && uri.user.nil? && uri.password.nil?
      user     = ENV["#{_scheme}_proxy_user"] || ENV["#{_SCHEME}_PROXY_USER"]
      password = ENV["#{_scheme}_proxy_pass"] || ENV["#{_SCHEME}_PROXY_PASS"]

      uri.user     = Gem::UriFormatter.new(user).escape
      uri.password = Gem::UriFormatter.new(password).escape
    end

    uri
  end

  def perform_request(request) # :nodoc:
    connection = connection_for @uri

    retried = false
    bad_response = false

    begin
      @requests[connection.object_id] += 1

      verbose "#{request.method} #{Gem::Uri.redact(@uri)}"

      file_name = File.basename(@uri.path)
      # perform download progress reporter only for gems
      if request.response_body_permitted? && file_name =~ /\.gem$/
        reporter = ui.download_reporter
        response = connection.request(request) do |incomplete_response|
          if Net::HTTPOK === incomplete_response
            reporter.fetch(file_name, incomplete_response.content_length)
            downloaded = 0
            data = String.new

            incomplete_response.read_body do |segment|
              data << segment
              downloaded += segment.length
              reporter.update(downloaded)
            end
            reporter.done
            if incomplete_response.respond_to? :body=
              incomplete_response.body = data
            else
              incomplete_response.instance_variable_set(:@body, data)
            end
          end
        end
      else
        response = connection.request request
      end

      verbose "#{response.code} #{response.message}"

    rescue Net::HTTPBadResponse
      verbose "bad response"

      reset connection

      raise Gem::RemoteFetcher::FetchError.new("too many bad responses", @uri) if bad_response

      bad_response = true
      retry
    rescue Net::HTTPFatalError
      verbose "fatal error"

      raise Gem::RemoteFetcher::FetchError.new("fatal error", @uri)
    # HACK work around EOFError bug in Net::HTTP
    # NOTE Errno::ECONNABORTED raised a lot on Windows, and make impossible
    # to install gems.
    rescue EOFError, Timeout::Error,
           Errno::ECONNABORTED, Errno::ECONNRESET, Errno::EPIPE

      requests = @requests[connection.object_id]
      verbose "connection reset after #{requests} requests, retrying"

      raise Gem::RemoteFetcher::FetchError.new("too many connection resets", @uri) if retried

      reset connection

      retried = true
      retry
    end

    response
  ensure
    @connection_pool.checkin connection
  end

  ##
  # Resets HTTP connection +connection+.

  def reset(connection)
    @requests.delete connection.object_id

    connection.finish
    connection.start
  end

  def user_agent
    ua = "RubyGems/#{Gem::VERSION} #{Gem::Platform.local}".dup

    ruby_version = RUBY_VERSION
    ruby_version += "dev" if RUBY_PATCHLEVEL == -1

    ua << " Ruby/#{ruby_version} (#{RUBY_RELEASE_DATE}"
    if RUBY_PATCHLEVEL >= 0
      ua << " patchlevel #{RUBY_PATCHLEVEL}"
    elsif defined?(RUBY_REVISION)
      ua << " revision #{RUBY_REVISION}"
    end
    ua << ")"

    ua << " #{RUBY_ENGINE}" if RUBY_ENGINE != "ruby"

    ua
  end
end

require_relative "request/http_pool"
require_relative "request/https_pool"
require_relative "request/connection_pools"

SILENT KILLER Tool